Sign up
Login
MALWARE
//
THREAT ACTORS
//
VULNERABILITIES
2526
Malware Objects
27622
Documents talking Malware
50
Active Sources
44
Updates so far today
Hot threats you should care about.
CVE-2023-46805
Fudmodule
Alphv
Moobot
Lockbit
4 updates this week.
-36%
ransomware
alphv
ransom
raas
conti
clop
malware
extortion
encryption
vulnerability
+458 other associations
LockBit is a notorious malware that operates on a ransomware-as-a-service model, which has been responsible for significant cyber attacks across the globe. One of its most high-profile targets was Boeing, from whom the LockBit gang claimed to have stolen data. This incident not only disrupted operat
Akira
3 updates this week.
300%
ransomware
windows
ransom
vulnerability
vpn
linux
alphv
extortion
exploit
encryption
+167 other associations
Akira is a notorious malware, specifically a ransomware, that has been active since April 2023. It utilizes dual extortion tactics to compromise various industries, as outlined in a technical analysis shared by cybersecurity researchers. The ransomware's modus operandi includes stealing sensitive da
Beavertail
3 updates this week.
300%
malware
macos
state-sponso...
downloader
browser exte...
+2 other associations
BeaverTail is a harmful malware strain developed by North Korean state-sponsored hackers, specifically designed to exploit macOS users. The cybercriminals have been found spreading this new variant through a malicious version of the video-calling service Microtalk. These threat actors often masquera
Ghost
2 updates this week.
-11.11%
malware
ransomware
ghostsec
ghostlocker
lockbit
phishing
fraud
akira
rhadamanthys
space kook
+86 other associations
"Ghost" refers to a sophisticated malware and an encrypted communication platform used by criminals for various illicit activities. Check Point Research discovered a network of GitHub accounts, known as the Stargazers Ghost Network, that were distributing this malware or malicious links via phishing
Telekopye
2 updates this week.
300%
phishing
scams
neanderthals
eset
telegram
scammer
bot
scam
malware
+7 other associations
Telekopye is a custom malware toolkit employed by Russian hackers, notably the threat operation group known as Neanderthals, to conduct extensive phishing attacks. The toolkit allows operators to create counterfeit websites, phishing emails, and text messages that are used to trick users into reveal
Bibi Wiper
1 updates this week.
300%
bibi
wiper
+4 other associations
The BiBi wiper is a custom malware developed and utilized by the cyber threat group, Void Manticore. This malicious software, named after Israeli Prime Minister Benjamin Netanyahu's nickname "BiBi," is used to disrupt computer operations, exfiltrate email data, and in some instances, hold data for r
Xworm
1 updates this week.
300%
malware
rat
remcos
payload
trojan
agenttesla
ransomware
github
windows
screenconnect
+54 other associations
XWorm is a sophisticated piece of malware designed to infiltrate and exploit computer systems, often without the user's knowledge. It can be delivered through various means such as suspicious downloads, emails, or websites, and once inside a system, it can steal personal information, disrupt operati
svchost.exe
1 updates this week.
300%
payload
malware
backdoor
windows
loader
trojan
ransomware
shellcode
tinyturla
malware payl...
+54 other associations
Svchost.exe is a malicious software, or malware, that has been associated with multiple cyber threats over the years. It is known to be used by various malware families like Winnti, Nightdoor, MgBot, and Kazuar for injecting their shellcode into processes such as explorer.exe, winlogon.exe, wmplayer