ID | Votes | Profile Description |
---|---|---|
Comment Panda | 2 | Comment Panda, also known as Sneaky Panda, Comment Crew, and APT1, is a threat actor associated with Unit 61398 of the People's Liberation Army in China. The term "threat actor" refers to a human entity that executes actions with malicious intent, which could be an individual, a private company, or |
Comment Crew | 2 | Comment Crew, also known as APT1 or Unit 61398, is a significant threat actor attributed to China's People's Liberation Army (PLA) General Staff Department’s 3rd Department. The group has been active since at least 2005-2006, as traced by Mr. Stewart of Dell Secureworks. Among the myriad of Chinese |
Unit 61398 | 1 | None |
ID | Type | Votes | Profile Description |
---|---|---|---|
gh0st RAT | has used | 2 | Gh0st RAT is a notorious malware that was originally developed by the C. Rufus Security Team in China and has been widely used for cyber espionage since its code leaked in 2008. This malicious software can infiltrate systems through suspicious downloads, emails, or websites, often without the user's |
OceanSalt | Unspecified | 1 | None |
Poison Ivy | Unspecified | 1 | Poison Ivy is a type of malware, or malicious software, designed to exploit and damage computer systems. It can infiltrate systems through suspicious downloads, emails, or websites, often without the user's knowledge. Once inside, it can steal personal information, disrupt operations, or even hold d |
ID | Type | Votes | Profile Description |
---|---|---|---|
APT41 | is related to | 2 | APT41, also known as Winnti, Wicked Panda, and Wicked Spider, is a sophisticated threat actor attributed to China. This group has been active since at least 2012, targeting organizations across 14 countries. The group is known for its extensive use of various code families and tools, with at least 4 |
Winnti | Unspecified | 1 | Winnti is a sophisticated threat actor group, first identified by Kaspersky in 2013, with activities dating back to at least 2007. The group has been associated with the Chinese nation-state and is part of a collective known as APT41, which also includes subgroups like Wicked Panda, Suckfly, and Bar |
APT10 | Unspecified | 1 | APT10, also known as the Menupass Team, is a threat actor believed to operate on behalf of the Chinese Ministry of State Security (MSS). The group has been active since 2009 and is suspected to be based in Tianjin, China, according to research by IntrusionTruth in 2018. APT10 has primarily targeted |
DragonOK | Unspecified | 1 | DragonOK, a threat actor group reportedly linked to China, has been associated with various malicious activities, including the deployment of the infamous Remote Access Trojan (RAT) known as FormerFirstRAT. This multi-featured RAT allows threat actors to gain complete control over a targeted machine |
ID | Type | Votes | Profile Description |
---|---|---|---|
No associations to display |
Source | CreatedAt | Title |
---|---|---|
DARKReading | 5 months ago | How to Identify a Cyber Adversary: Standards of Proof |
DARKReading | 6 months ago | China Infiltrates US Critical Infrastructure in Ramp-up to Conflict |
MITRE | a year ago | Operation Soft Cell: A Worldwide Campaign Against Telecommunications Providers |
MITRE | a year ago | Chinese State-Sponsored Activity Group TAG-22 Targets Nepal, the Philippines, and Taiwan |
MITRE | a year ago | Advanced Persistent Threats (APTs) | Threat Actors & Groups |
MITRE | a year ago | The Fractured Block Campaign: CARROTBAT Used to Deliver Malware Targeting Southeast Asia |
MITRE | a year ago | Chinese Actors Use ‘3102’ Malware in Attacks on US Government and EU Media |
Securelist | a year ago | IoC detection experiments with ChatGPT |
Malwarebytes | a year ago | APT attacks: Exploring Advanced Persistent Threats and their evasive techniques |