{"uuid": "81f5e2e4-60c1-4066-bfb0-15c073e1051e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-1388", "type": "exploited", "source": "https://t.me/vxunderground/1297", "content": "We've updated the vx-underground APT collection. \n\n2013.03.20/The Teamspy Story\n2013.03.20/Teamspy - Technical Report\n2016.03.02/New self\u2011protecting USB trojan able to avoid detection\n2019.04.10/Gaza Cybergang Group1, operation SneakyPastes\n2017.04.13/Teamspy - A deeper look into malware abusing TeamViewer\n2017.04.14/PlexingEagle: A surprise encounter with a Telco APT\n2019.11.05/DarkUniverse \u2013 the mysterious APT framework #27\n2022.04.06/Continued Targeting of Indian Power Grid Assets by Chinese State-Sponsored Activity Group\n2022.09.15/F5 BIG-IP Vulnerability (CVE-2022-1388) Exploited by BlackTech\n2022.09.30/Amazon\u2011themed campaigns of Lazarus in the Netherlands and Belgium\n2022.10.11/The Russian SpyAgent (Teamspy) \u2013 a Decade Later and RAT Tools Remain at Risk\n2022.10.12/WIP19 Espionage | New Chinese APT Targets IT Service Providers and Telcos With Signed Malware\n2022.10.12/Winnti APT group docks in Sri Lanka for new campaign\n2022.10.13/Budworm: Espionage Group Returns to Targeting U.S. Organizations\n2022.10.13/Alchimist: A new attack framework in Chinese for Mac, Linux and Windows\n2022.10.14/New \u201cPrestige\u201d ransomware impacts organizations in Ukraine and Poland\n2022.10.17/DiceyF deploys GamePlayerFramework in online casino development studio\n2022.10.18/Unknown Actor: Powershell Backdoor disguising itself as part of a Windows update process\n2022.10.18/Spyder Loader: Malware Seen in Recent Campaign Targeting Organizations in Hong Kong (Winnti)\n2022.10.20/Domestic Kitten campaign spying on Iranian citizens with new FurBall malware\n2022.10.21/WarHawk: the New Backdoor in the Arsenal of the SideWinder APT Group\n\nCheck it out here: https://vx-underground.org/malware.html", "creation_timestamp": "2022-10-23T13:37:25.000000Z"}