Threat Playbooks

FortiGuard Labs Playbooks provide up to date analysis and insight on the latest Advanced Persistent Threat (APT) groups and malware campaigns to date. Each playbook is designed to provide the reader with a general overview of the techniques, tactics and procedures (TTPs) displayed within the MITRE ATT&CK framework. Ultimately, the goal is to provide first responders, network defenders and anyone interested with actionable information that can help provide:

  1. An understanding of the motivations and TTPs of the threat actors or malware variants
  2. Indicators of compromise (IOCs) and techniques, tactics and procedures (TTPs)
  3. A historical overview of malware and threat actors

and ultimately allow for deeper understanding of campaigns in an easy to follow format.

FortiGuard Labs discovered an interesting spearphishing email sent to a telecommunication agency in South Asia in Mid-May ...

ID: 8
Ranion is a Ransomware as a Service that is based off of the open source HiddenTear ransomware. First discovered in 2017, ...

ID: 7
FortiGuard Labs discovered an interesting spearphishing attack that we decided to investigate further, which led us to ide...

ID: 6
SPRING is a threat actor that relies on specially crafted spearphishing attacks that contain vertical specific verbiage to...

ID: 5
Emotet was first discovered in 2014 as a "simple" banking Trojan aimed at stealing financial data. Simple is in quotes bec...

ID: 4
Zegost has been historically attributed to Chinese cybercriminals, a fact that has been documented in various worldwide gl...

ID: 3
Active since 2016, Silence Group is a cybercriminal organization that targets banks, specifically stealing information use...

ID: 2
Active since 2014, Goblin Panda is a threat actor that is focused on interests in Southeast Asia. Goblin Panda has been do...

ID: 1