{
	"id": "ca8dad02-a9df-4d9a-bee1-23954e252cf6",
	"created_at": "2026-04-06T00:08:56.482336Z",
	"updated_at": "2026-04-10T03:20:19.08092Z",
	"deleted_at": null,
	"sha1_hash": "4ea3fe006298614d348366d4139603eba1767cd7",
	"title": "APT_vs_ISP.pdf",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 31660,
	"plain_text": "APT_vs_ISP.pdf\r\nArchived: 2026-04-05 13:45:09 UTC\r\nSida 3 av 16\r\npag. 3\r\nThis paper exposes the contents originally designed for my participation in a\r\nconference as a speaker. This conference, originally scheduled for April 18, 2020, was\r\nlater canceled (for the current year) due to the problems resulting from the COVID- 19 pandemic. For more\r\ninformation about it, see the link\r\nhttps://www.malwareanalystconference.com/.\r\nThe information contained herein relates to what I observed throughout 2019 during\r\nmy analysis and research activities. For my speech I originally chose the\r\ntelecommunications sector because it is a vital component for nearly every existing\r\noperating entity. Due to their critical role for today's society, these organizations are\r\nnow faced with a multitude of threats in the cyber landscape ranging from targeted\r\nattacks to malicious actions attributable to the criminal or activist world. Adversaries\r\nthat are targeting this sector have included those suspected by the industry of\r\noperating in support of China, Iran, Russia, Vietnam, and the Democratic People’s\r\nRepublic of Korea (DPRK). Hacktivism also poses a big threat to ISP due the\r\ninvolvement of telco companies in government directives and digital regulations.\r\n1. Protecting ISPs is today an high priority from a nation’s national security\r\nperspective\r\n2. Internal research activities have shown that all the ISP-related intrusions that are\r\nattributable to organized adversaries (or APT) are aimed at digital espionage\r\noperations towards third parties or at accessing customer data / database.\r\nhttps://drive.google.com/file/d/1oA4YSwXLxEF-EXJcrM76Bc4_7ZfBGYE4/view\r\nPage 1 of 2\n\nSource: https://drive.google.com/file/d/1oA4YSwXLxEF-EXJcrM76Bc4_7ZfBGYE4/view\r\nhttps://drive.google.com/file/d/1oA4YSwXLxEF-EXJcrM76Bc4_7ZfBGYE4/view\r\nPage 2 of 2",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"Malpedia"
	],
	"references": [
		"https://drive.google.com/file/d/1oA4YSwXLxEF-EXJcrM76Bc4_7ZfBGYE4/view"
	],
	"report_names": [
		"view"
	],
	"threat_actors": [],
	"ts_created_at": 1775434136,
	"ts_updated_at": 1775791219,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/4ea3fe006298614d348366d4139603eba1767cd7.pdf",
		"text": "https://archive.orkl.eu/4ea3fe006298614d348366d4139603eba1767cd7.txt",
		"img": "https://archive.orkl.eu/4ea3fe006298614d348366d4139603eba1767cd7.jpg"
	}
}