Resources

Cybersecurity resources provide the industry with a centralized source of trusted information. If you have any questions, especially about our membership process, contact us.

Download and share these materials that tell the story of CTA, including CTA’s Joint Analysis reports, which focus on specific threats and campaign activity.

No CTA Assets Found

CTA members routinely provide other members with access to and review of blogs and intelligence reports describing malicious cyber activity.  By sharing research on significant issues, CTA members leverage their data, analysis, and cybersecurity products to expose malicious activity, prevent additional harm, and mitigate any of the activity’s effects as early and as effectively as possible.  Since May 2018, CTA members have shared over 200 blogs and intelligence reports with each other.

Use the search function to search by CTA member company name or research title. Results can also be filtered by date of publication.

270 results found.
Jan 2019

DarkHydrus delivers new Trojan that can use Google Drive for C2 communications

Palo Alto Networks
View >
Jan 2019

Malware Used by “Rocke” Group Evolves to Evade Detection by Cloud Security Products

Palo Alto Networks
View >
Jan 2019

West African Financial Institutions Hit by Wave of Attacks

Symantec
View >
Jan 2019

.Net RAT Malware Being Spread by MS Word Documents

Fortinet
View >
Dec 2018

Fake Tsunami Alert Brings Malware to Japan

Fortinet
View >
Dec 2018

Shamoon 3: Modified Open-Source Wiper Contains Verse from the Quran

Palo Alto Networks
View >
Dec 2018

Connecting the dots between recently active cryptominers

Cisco
View >
Dec 2018

Shamoon 3 Targets Oil and Gas Organization

Palo Alto Networks
View >
Dec 2018

‘Operation Sharpshooter’ Targets Global Defense, Critical Infrastructure

McAfee
View >
Dec 2018

Dear Joohn: The Sofacy Group’s Global Campaign

Palo Alto Networks
View >
Dec 2018

Seedworm: Group Compromises Government Agencies, Oil & Gas, NGOs, Telecoms, and IT Firms

Symantec
View >
Nov 2018

The Fractured Block Campaign: CARROTBAT Used to Deliver Malware Targeting Southeast Asia

Palo Alto Networks
View >
Nov 2018

DNSpionage Campaign Targets Middle East

Cisco
View >
Nov 2018

New Wine in Old Bottle: New Azorult Variant Found in FindMyName Campaign using Fallout Exploit Kit

Palo Alto Networks
View >
Nov 2018

Sofacy Continues Global Attacks and Wheels Out New ‘Cannon’ Trojan

Palo Alto Networks
View >
Utilize CTA’s curated selection of respected and comprehensive cybersecurity resources.

No Recommended Resources Found

Adversary Playbooks are an attempt to capture the complete collection of tools, techniques, and procedures that adversaries use to achieve their goals, arrayed in a logical sequence using the Lockheed Martin Cyber Kill Chain. If the cybersecurity community and network defenders have access to these playbooks, they can make their defensive actions more effective and impose increased costs on our adversaries. The Cyber Threat Alliance (CTA) is committed to sharing actionable intelligence that can be used to create Adversary Playbooks. Since our cyber adversaries adapt very rapidly, CTA also automates the sharing and updating of this intelligence.

This page serves as a resource for the cybersecurity community with useful tools for creating Adversary Playbooks and links to the Playbooks created by our members. If you have any questions or feedback, please contact us at admin@cyberthreatalliance.org.

Use the search function to find playbooks by CTA member author, adversary group, or threat actor.

0 results found.

No Results Found!

Sorry, but we couldn't find anything based on your search criteria.
Please try a different keyword.