Alias Description | Votes |
---|---|
TA453 is a possible alias for Apt42. TA453, also known as Charming Kitten, APT35, Phosphorus, Newscaster, and Ajax Security Team, is a threat actor group suspected to be linked with the Iranian government. Researchers from Proofpoint have attributed cyberattacks on affiliates of former National Security Adviser John Bolton and nuclear | 4 |
Charming Kitten is a possible alias for Apt42. Charming Kitten, also known as APT35 or APT42 among other names, is a threat actor believed to be linked to the Iranian government. The group has been implicated in a series of cyber-attacks against various entities in Brazil, Israel, and the U.A.E., deploying a new backdoor that initiates an infect | 4 |
APT35 is a possible alias for Apt42. APT35, also known as the Newscaster Team, Charming Kitten, and Mint Sandstorm, is an Iranian government-sponsored cyber espionage team. This threat actor conducts long-term, resource-intensive operations to collect strategic and tactical intelligence on behalf of the Islamic Revolutionary Guard Corp | 3 |
Mint Sandstorm is a possible alias for Apt42. Mint Sandstorm, an Advanced Persistent Threat (APT) group linked to Iran's Islamic Revolutionary Guard Corps (IRGC), has been identified as a significant cybersecurity threat. The group has demonstrated its capability to rapidly weaponize N-day vulnerabilities in common enterprise applications and c | 3 |
Phosphorus is a possible alias for Apt42. Phosphorus, also known as APT35 or Charming Kitten, is a prominent threat actor linked to the Islamic Revolutionary Guard Corps (IRGC) of Iran. The group is notorious for its cyberespionage activities and has been actively targeting high-profile individuals involved in Middle Eastern affairs at univ | 3 |
Imperial Kitten is a possible alias for Apt42. Imperial Kitten, also known as Tortoiseshell and UNC1549, is a significant threat actor identified by cybersecurity firms CrowdStrike and Mandiant. The group has been associated with various malicious activities, including the distribution of malware through SWC, and the use of IMAPLoader and other | 2 |
MuddyWater is a possible alias for Apt42. MuddyWater is an Advanced Persistent Threat (APT) actor that first surfaced in 2017, primarily targeting countries in the Middle East, Europe, and the USA. The group uses a range of techniques for its cyber-espionage activities, including PowerShell for execution, HTTP for C2 communications, and mal | 2 |
Preview | Source Link | CreatedAt | Title |
---|---|---|---|
Unit42 | 14 hours ago | ||
DARKReading | 9 months ago | ||
Malwarebytes | 10 months ago | ||
Checkpoint | 10 months ago | ||
InfoSecurity-magazine | 10 months ago | ||
Recorded Future | 10 months ago | ||
BankInfoSecurity | 10 months ago | ||
Securityaffairs | 10 months ago | ||
Securityaffairs | 10 months ago | ||
DARKReading | 10 months ago | ||
InfoSecurity-magazine | 10 months ago | ||
BankInfoSecurity | a year ago | ||
DARKReading | a year ago | ||
CERT-EU | a year ago | ||
CERT-EU | 2 years ago | ||
CERT-EU | 2 years ago | ||
Securityaffairs | 2 years ago | ||
BankInfoSecurity | 2 years ago | ||
Securityaffairs | 2 years ago | ||
Recorded Future | 2 years ago |