Back to Results
First PageMeta Content
Computing / Hacking / Spamming / Electronic commerce / Secure communication / Denial-of-service attack / Zero-day attack / Vulnerability / Attack / Computer network security / Cyberwarfare / Computer security


Infrastructure Security 1. Infrastructure Security The PlugX RAT Used in Targeted Attacks In this report, we discuss the PlugX RAT used in targeted attacks, and look at examples of
Add to Reading List

Document Date: 2015-05-20 03:08:06


Open Document

File Size: 4,02 MB

Share Result on Facebook

Company

IIJ / V 5th / LINE Corporation / Motorola / Facebook / Network Solutions / Trend Micro / ASP.NET / Dell / FireEye / Oracle / Adobe Systems / Google / GitHub / Apache Software Foundation / Microsoft / Twitter Inc. / The New York Times / /

Country

Netherlands / France / Japan / Pakistan / United Kingdom / China / Philippines / India / Palestinian Territories / Belgium / Malaysia / United States / South Korea / Lebanon / /

Currency

pence / /

Facility

TCP port / Diet Members’ Building / IT Strategic Headquarters / National Institute of Standards and Technology / /

IndustryTerm

work systems / Web application framework / Internet Explorer Could Allow Remote Code Execution / media outlets / cryptographic communications / external Web services / wireless authentication / Web server compromises / email services / vehicle control systems / Web server / mobile social networking sites / Internet users / paid news site / cross-site / Web content / industry / Internet Systems Consortium / Web Alterations / server equipment / external networks / streaming communications / Internet Banking / e-commerce sites / Web servers / telecommunications carriers / Similar communications / telecommunications carrier organizations / encryption algorithms / Wireless PEAP-MS-CHAPv2 Authentication Could Allow Information Disclosure / server applications / Web alteration incidents / external services / similar services / Internet Explorer / Web services / /

NaturalFeature

Senkaku Islands / /

OperatingSystem

Microsoft Windows / Android / /

Organization

National Information Security Center / Kaspersky Lab / Turkish government / IN JP / DE FR / National Police Agency / Pakistan military / Anonymous / National Institute of Standards and Technology / Ministry of Internal Affairs and Communications / U.S. Congress / Japan Aerospace Exploration Agency / Syrian Electronic Army / Investigative Commission on Personal Data / European Union / NAVER / Spamhaus / Association of Southeast Asian Nations / Council for Promotion of Information Security Measures / Software Foundation / Federal Emergency Management Agency / U.S. National Security Agency / Commission on Personal Data / Council on ICT Strategy / JPCERT Coordination Center / IIJ DDoS Protection Service / /

Person

Charlie Miller / Jeff Forristal / Ben Lincoln / Reader / Chris Valasek / /

Position

domain registrar / Shockwave Player / administrator / Acrobat / and Shockwave Player / researcher / Acrobat / ccTLD registrar / director / security researcher / registrar / Flash Player / /

Product

SQL injections / Transparency Report / SQL injection / SharePoint Server / /

ProgrammingLanguage

ASP.NET / SQL / /

PublishedMedium

The New York Times / The Tor Blog post / /

Technology

encryption algorithms / html / mobile devices / encryption / Java / ISP / Flash / SMS / Smartphone / Android / UDP / SSL / pdf / DNS / smartphones / http / Web server / Acrobat / /

URL

http /

SocialTag