Alias Description | Votes |
---|---|
Winnti is a possible alias for APT17. Winnti is a threat actor group known for its malicious activities, primarily originating from Chinese Advanced Persistent Threat (APT) operational infrastructure. The group, which has been active since at least 2007, was first spotted by Kaspersky in 2013. It is associated with several aliases such | 3 |
GREF is a possible alias for APT17. GREF, a China-aligned Advanced Persistent Threat (APT) group, has been identified as the orchestrator of two active Android malware campaigns. The campaigns have been distributing a malicious software called BadBazaar via two applications, Signal Plus Messenger and FlyGram, through the Google Play s | 2 |
Alias Description | Association Type | Votes |
---|---|---|
The ZxShell Malware is associated with APT17. ZXShell is a malicious software (malware) that has been used by various cyber threat actors to exploit and damage computer systems. It is known to be associated with other malware such as PANDORA, SOGU, GHOST, WIDEBERTH, QUICKPULSE, FLOWERPOT, QIAC, Gh0st, Poison Ivy, BEACON, HOMEUNIX, STEW, among o | has used | 2 |
Alias Description | Association Type | Votes |
---|---|---|
The CVE-2015-5119 Vulnerability is associated with APT17. CVE-2015-5119 is a software vulnerability, specifically a flaw in the design or implementation of Adobe Flash. This vulnerability was discovered as part of the Hacking Team data breach that took place in 2015. In this leak, internal data of the Italian cybersecurity firm Hacking Team was exposed, in | Targets | 2 |
Preview | Source Link | CreatedAt | Title |
---|---|---|---|
Securityaffairs | 7 hours ago | ||
CERT-EU | a year ago | ||
MITRE | 2 years ago | ||
CERT-EU | 2 years ago | ||
CERT-EU | 2 years ago | ||
MITRE | 2 years ago | ||
MITRE | 2 years ago | ||
MITRE | 2 years ago | ||
CERT-EU | 2 years ago | ||
CERT-EU | 2 years ago |