Sign up
Login
MALWARE
//
THREAT ACTORS
//
VULNERABILITIES
2595
Malware Objects
30104
Documents talking Malware
50
Active Sources
6
Updates so far today
Hot threats you should care about.
CVE-2023-46805
Fudmodule
Alphv
Moobot
Lummac2
2 updates this week.
300%
malware
payload
vidar
lummac2 stea...
redline
infostealer
infostealers
lumma
credentials
sandbox
+39 other associations
LummaC2 is a malicious software (malware) that was initially identified in Russian-speaking forums in 2022. The malware, written in C and distributed as Malware-as-a-Service (MaaS), has been actively developed over time, with researchers noting that LummaC2 4.0 operates as a dynamic malware strain.
ThreatNeedle
2 updates this week.
300%
lazarus group
backdoor
malware
loader
downloader
+4 other associations
ThreatNeedle is a malicious software (malware) that has been identified as a tool used by the notorious North Korean Advanced Persistent Threat (APT) group, Lazarus. This malware, designed to exploit and damage computer systems, can infiltrate systems through suspicious downloads, emails, or website
Clop
2 updates this week.
-33.33%
ransomware
vulnerability
exploit
moveit
lockbit
mft
ransom
extortion
cve-2023-34362
exploited
+287 other associations
Clop, a malicious software (malware), is linked to a Russian-speaking cybercriminal group also known as Cl0p. It is designed to exploit and damage computer systems by stealing personal information, disrupting operations, or holding data hostage for ransom. In May 2023, the Clop group began exploitin
Lumma Stealer
2 updates this week.
166.7%
malware
lumma
windows
payload
infostealer
youtube
credentials
redline
trojan
powershell
+89 other associations
Lumma Stealer is a potent malware designed to exfiltrate information from compromised systems, including system details, web browsers, and browser extensions. The malware was primarily delivered to victims through websites hosting cracked games, specifically targeting gamers. In July 2024, it was di
Babuk
2 updates this week.
166.7%
ransomware
lockbit
source
linux
esxi
ransom
encryption
revil
malware
locker
+110 other associations
Babuk is a form of malware, specifically ransomware, that infiltrates computer systems and encrypts files, rendering them inaccessible to the user. It typically infects systems through suspicious downloads, emails, or websites, often without the user's knowledge. Once inside, it can disrupt operatio
Dragonforce
2 updates this week.
300%
ransomware
lockbit
malware
data leak
cybercrime
exploit
dragonforce ...
hacktivist
lockbit black
extortion
+33 other associations
DragonForce is a malicious software (malware) developed by a hacktivist group of the same name. This malware has been used in a series of attacks targeting various organizations globally. In 2022, DragonForce targeted over 70 government and commercial entities in India, disrupting their web resource
Lockbit
2 updates this week.
60%
ransomware
alphv
ransom
conti
raas
lockbit
encryption
malware
extortion
exploit
+485 other associations
LockBit is a prominent ransomware-as-a-service (RaaS) malware that has been involved in numerous cyberattacks, demonstrating its staying power and adaptability. The malware, which can infiltrate systems through suspicious downloads, emails, or websites, is designed to exploit and damage computers or
Readme
2 updates this week.
166.7%
github
ransom
ransomware
malware
source
adhubllka
tool
phishing
proxy
+26 other associations
The "readme" malware is a harmful program that has been identified to exploit and damage computer systems. It can infiltrate systems through suspicious downloads, emails, or websites, often without the user's knowledge. Once inside, it can steal personal information, disrupt operations, or even hold