ID | Votes | Profile Description |
---|---|---|
Red Stinger | 3 | Red Stinger, also known as Bad Magic, is a previously undetected Advanced Persistent Threat (APT) group that has been linked to cyber-espionage activities targeting Eastern Europe since 2020. The group's operations have primarily focused on both pro-Ukraine and pro-Russia victims in central and east |
Commonmagic | 1 | CommonMagic is a malicious software framework that has been actively used since at least September 2021 to target government, agriculture, and transportation organizations located in the Donetsk, Lugansk, and Crimea regions. It was developed by an APT group linked to the Russo-Ukrainian conflict and |
graphican | 1 | Graphican is a novel malware developed by the Chinese threat actor group known as Flea, APT15, or Nickel. The malware, an evolution of the group's custom backdoor Ketrican, has been used in a series of cyber-attacks against foreign affairs ministries across Central and South America between late 202 |
Powermagic | 1 | PowerMagic is a sophisticated malware, also known as DBoxShell, that has been linked to a series of advanced persistent threat (APT) activities. This malicious software was identified by Kaspersky researchers who traced its connections to previous APT activities such as Operation Groundbait, the Pri |
Dboxshell | 1 | DboxShell is a type of malware that uses cloud storage services as a command and control (C&C) mechanism. It is also known as PowerMagic by Kaspersky. This malicious software infiltrates systems through suspicious downloads, emails, or websites, often unbeknownst to the user. Once inside, it can dis |
Graphshell | 1 | GraphShell is a malicious software (malware) that has been used in cyber-attacks to exploit and damage computer systems. It was first reported in March 2023 by the cybersecurity firm Bad Magic, which documented its use in attacks targeting Russian-occupied territories of Ukraine. The malware, also k |
Ketrican | 1 | Ketrican is a type of malware, or malicious software, that was developed to exploit and damage computer systems. It's associated with the Ke3chang group and is known for its ability to infiltrate systems through suspicious downloads, emails, or websites. Once inside a system, Ketrican can steal pers |
Cloudwizard | 1 | CloudWizard is a sophisticated malware discovered in May 2023, allegedly developed by an unidentified threat actor based in Ukraine. This malicious software has been linked to a broader set of cyber-attacks across the country, marking an evolution from its predecessors by exploiting well-known cloud |
ID | Type | Votes | Profile Description |
---|---|---|---|
No associations to display |
ID | Type | Votes | Profile Description |
---|---|---|---|
Swallowtail | Unspecified | 1 | None |
APT28 | Unspecified | 1 | APT28, also known as Fancy Bear, is a threat actor linked to Russia and has been involved in numerous cyber espionage campaigns. The group is notorious for its sophisticated tactics, techniques, and procedures (TTPs). Recently, NATO and the EU formally condemned APT28's activities, acknowledging the |
ID | Type | Votes | Profile Description |
---|---|---|---|
No associations to display |
Source | CreatedAt | Title |
---|---|---|
Checkpoint | a year ago | 15th May – Threat Intelligence Report - Check Point Research |
Securityaffairs | a year ago | New Bad Magic APT used CommonMagic framework in the area of Russo-Ukrainian conflict |
CERT-EU | a year ago | A Decade of ‘Bad Magic’ In Cyber Espionage |
CERT-EU | a year ago | Novel Graphican backdoor leveraged in Chinese APT attacks against foreign ministries |
BankInfoSecurity | a year ago | Enigmatic Hacking Group Operating in Ukraine |
CERT-EU | a year ago | Bad Magic's Extended Reign in Cyber Espionage Goes Back Over a Decade |
CERT-EU | a year ago | Enigmatic Hacking Group Operating in Ukraine | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker – National Cyber Security Consulting |
CERT-EU | a year ago | Newly identified APT group's motives in Ukraine baffle researchers |
CERT-EU | a year ago | Anomali Cyber Watch: CloudWizard Targets Both Sides in Ukraine, Camaro Dragon Trojanized TP-Link Firmware, RA Group Ransomware Copied Babuk |
CERT-EU | a year ago | A Mysterious Group Has Ties to 15 Years of Ukraine-Russia Hacks | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker – National Cyber Security Consulting |
CERT-EU | a year ago | New APT Group Red Stinger Targets Military and Critical Infrastructure in Eastern Europe |
CERT-EU | a year ago | IT threat evolution in Q2 2023 – GIXtools |
CERT-EU | a year ago | IT threat evolution Q2 2023 |
CERT-EU | a year ago | Chinese Hacker Group 'Flea' Targets American Ministries with Graphican Backdoor |