diff --git a/BlogPosts/README.MD b/BlogPosts/README.MD index 480d4f2..ee77af5 100644 --- a/BlogPosts/README.MD +++ b/BlogPosts/README.MD @@ -1,19 +1,19 @@ This folder contains Indicators of Compromise (IOCs) for blog posts which have not been attributed to a particular attack group. This includes IOCs for the following blog posts: -* [Operation Poisoned Handover: Unveiling Ties Between APT Activity in Hong Kong’s Pro-Democracy Movement] (http://www.fireeye.com/blog/technical/2014/11/operation-poisoned-handover-unveiling-ties-between-apt-activity-in-hong-kongs-pro-democracy-movement.html) +* [Operation Poisoned Handover: Unveiling Ties Between APT Activity in Hong Kong’s Pro-Democracy Movement](http://www.fireeye.com/blog/technical/2014/11/operation-poisoned-handover-unveiling-ties-between-apt-activity-in-hong-kongs-pro-democracy-movement.html) 6037663c-680c-4a28-ad58-40622d206e1d.ioc operation_poisoned_handover.yara -* [Razor Blades in the Candy Jar] (http://www.fireeye.com/blog/technical/2014/11/razor-blades-in-the-candy-jar.html) +* [Razor Blades in the Candy Jar](http://www.fireeye.com/blog/technical/2014/11/razor-blades-in-the-candy-jar.html) 113e561e-60d2-48db-979d-02f207550125.ioc -* [A Different Exploit Angle on Adobe's Recent Zero-Day] (https://www.fireeye.com/blog/threat-research/2015/01/a_different_exploit.html) +* [A Different Exploit Angle on Adobe's Recent Zero-Day](https://www.fireeye.com/blog/threat-research/2015/01/a_different_exploit.html) 60a6de64-7308-4af1-9003-dc23a73fdf01.ioc -* [Behind The Syrian Conflict's Digital Front Lines] (https://www.fireeye.com/blog/threat-research/2015/02/behind_the_syrianco.html) +* [Behind The Syrian Conflict's Digital Front Lines](https://www.fireeye.com/blog/threat-research/2015/02/behind_the_syrianco.html) 0b879284-0c37-4bfa-9dd8-34505a9c5175.ioc 5a8d6878-2649-4ddc-a1f6-c98932a54f91.ioc @@ -21,19 +21,19 @@ This folder contains Indicators of Compromise (IOCs) for blog posts which have n de99badf-b448-49e7-885a-4d8688ddf02d.ioc e598231d-8584-4535-a0de-94e822f04c0b.ioc -* [Anatomy of a Brute Force Campaign] (https://www.fireeye.com/blog/threat-research/2015/02/anatomy_of_a_brutef.html) +* [Anatomy of a Brute Force Campaign](https://www.fireeye.com/blog/threat-research/2015/02/anatomy_of_a_brutef.html) 9a7a6929-25ea-4254-a300-13fd6b39c490.ioc -* [Ads Gone Bad] (https://www.fireeye.com/blog/threat-research/2015/03/ads_gone_bad.html) +* [Ads Gone Bad](https://www.fireeye.com/blog/threat-research/2015/03/ads_gone_bad.html) 4fdb0f45-8151-4941-a9e1-a31e21000659.ioc -* [Second Adobe Flash Zero-Day CVE-2015-5122 from HackingTeam Exploited in Strategic Web Compromise Targeting Japanese Victims] (https://www.fireeye.com/blog/threat-research/2015/07/second_adobe_flashz.html) +* [Second Adobe Flash Zero-Day CVE-2015-5122 from HackingTeam Exploited in Strategic Web Compromise Targeting Japanese Victims](https://www.fireeye.com/blog/threat-research/2015/07/second_adobe_flashz.html) b513e829-b023-426a-b7d4-accd511be3c0.ioc -* [IRONGATE ICS Malware: Nothing to See Here, Masking Malicious Activity on SCADA Systems] (https://www.fireeye.com/blog/threat-research/2016/06/irongate_ics_malware.html) +* [IRONGATE ICS Malware: Nothing to See Here, Masking Malicious Activity on SCADA Systems](https://www.fireeye.com/blog/threat-research/2016/06/irongate_ics_malware.html) 9cee306d-5441-4cd3-932d-f3119752634c.ioc