ID | Votes | Profile Description |
---|---|---|
ComRAT | 3 | ComRAT, also known as Agent.BTZ, is a potent malware that has evolved over the years to become a significant threat in the cybersecurity landscape. Developed using C++ and employing a virtual FAT16 file system, ComRAT is often used to exfiltrate sensitive documents. The malware is a remote access tr |
Comrat V4 | 3 | ComRAT v4, also known as Agent.BTZ, is a sophisticated malware developed using C++ and employing a virtual FAT16 file system. This malicious software is a Remote Access Trojan (RAT) primarily used by the Turla group, a cyber-espionage entity. The primary function of ComRAT v4 is to exfiltrate sensit |
Epic Turla | 1 | Epic Turla, also known as Snake or Uroburos, is a sophisticated multi-stage malware attack that was extensively researched and documented in 2014. The campaign, dubbed "Epic Turla," was orchestrated by a group of attackers who utilized the Epic malware family, known for its dynamic and adaptive natu |
ID | Type | Votes | Profile Description |
---|---|---|---|
Maze | Unspecified | 2 | Maze is a type of malware, specifically ransomware, that gained notoriety in 2019 for its double extortion tactic. This malicious software infects systems through suspicious downloads, emails, or websites and can steal personal information, disrupt operations, or hold data hostage for ransom. Maze w |
Moonlight Maze | Unspecified | 2 | Moonlight Maze is a notorious malware that emerged in the 1990s, primarily targeting government, military, and defense sector entities. This malicious software was designed to exploit and damage computer systems, often infiltrating them through suspicious downloads, emails, or websites without the u |
Flame | Unspecified | 1 | Flame is a sophisticated form of malware, designed to exploit and damage computer systems. It can infiltrate systems through suspicious downloads, emails, or websites, often unbeknownst to the user. Once embedded, Flame has the ability to steal personal information, disrupt operations, or hold data |
Red October | Unspecified | 1 | Red October is a sophisticated malware, also known by aliases such as Clean Ursa, Inception, Oxygen, and Cloud Atlas. This malicious software has been utilized by an active cyber espionage group since at least 2014, targeting several countries including Russia, Belarus, Azerbaijan, Turkey, and Slove |
ANDROMEDA | Unspecified | 1 | Andromeda is a type of malware, or malicious software, designed to exploit and damage computer systems. It can infiltrate systems through suspicious downloads, emails, or websites, often without the user's knowledge. Once inside, it can steal personal information, disrupt operations, or hold data ho |
ID | Type | Votes | Profile Description |
---|---|---|---|
Turla | Unspecified | 5 | Turla, also known as Pensive Ursa, is a sophisticated threat actor linked to Russia that has been active for many years. The group is known for its advanced cyber-espionage capabilities and has been associated with numerous high-profile breaches. According to the MITRE ATT&CK and MITRE Ingenuity dat |
Pensive Ursa | Unspecified | 1 | Pensive Ursa, also known as Turla, Uroburos, Venomous Bear, and Waterbug, is a Russian-based advanced persistent threat (APT) group that has been operating since at least 2004. The group, linked to the Russian Federal Security Service (FSB), is renowned for its sophisticated cyber-espionage activiti |
Pensive | Unspecified | 1 | Pensive Ursa, also known as Turla or Uroburos, is a Russian-based threat group that has been active since at least 2004 and is linked to the Russian Federal Security Service (FSB). The group employs advanced and stealthy tools like Kazuar, a .NET backdoor used as a second stage payload. In 2023, Pen |
ID | Type | Votes | Profile Description |
---|---|---|---|
No associations to display |
Source | CreatedAt | Title |
---|---|---|
Trend Micro | 10 months ago | Examining the Activities of the Turla APT Group |
Unit42 | 10 months ago | Threat Group Assessment: Turla (aka Pensive Ursa) |
CERT-EU | a year ago | Connect the Dots on State-Sponsored Cyber Incidents - Agent.btz |
CERT-EU | a year ago | Matthieu Faou | WeLiveSecurity |
MITRE | a year ago | Agent.btz: a Source of Inspiration? |
MITRE | a year ago | The ‘Penquin’ Turla |
CERT-EU | a year ago | Южнокорейские исследователи изобрели скрытый метод эксфильтрации CASPER, задействующий обычный компьютерный спикер |
CERT-EU | a year ago | Air-Gapped Computers Vulnerable to Data Stealing Through Internal Speakers |
CERT-EU | a year ago | FBI disrupts sophisticated Russian cyberespionage operation |
BankInfoSecurity | a year ago | Feds Dismember Russia's 'Snake' Cyberespionage Operation |
DARKReading | a year ago | FBI Disarms Russian FSB 'Snake' Malware Network |
CERT-EU | a year ago | US, partners dismantle malware network used in 20-year Russian spy campaign |
CERT-EU | a year ago | Министерство юстиции США заявило, что оно нарушило работу одного из самых сложных кибершпионских инструментов |