ID | Votes | Profile Description |
---|---|---|
BISCUIT | 1 | "Biscuit" is a sophisticated malware variant that was notably used in an attack campaign titled "Operation Bitter Biscuit". This operation was first reported by AhnLab in October 2017, targeting entities in South Korea, Japan, India, and Russia. The offensive made use of the Bisonal remote access tr |
BITTER | 1 | Bitter, also known as T-APT-17, is a suspected South Asian threat actor that has been involved in various cyber campaigns. The group has been active since at least August 2021, with its operations primarily targeting government personnel in Bangladesh through spear-phishing emails. The similarities |
ID | Type | Votes | Profile Description |
---|---|---|---|
ShadowPad | Unspecified | 1 | ShadowPad is a modular backdoor malware that has been utilized by several Chinese threat groups since at least 2017. Notably, it was used as the payload in supply chain attacks targeting South Asian governments, as reported in the VB2023 paper. ShadowPad provides near-administrative capabilities in |
Dexbia | Unspecified | 1 | None |
Bioazih | Unspecified | 1 | None |
ID | Type | Votes | Profile Description |
---|---|---|---|
Tonto Team | Unspecified | 2 | Tonto Team is a Chinese government-aligned Advanced Persistent Threat (APT) group, recognized for its malicious cyber activities. The team has been active for over a decade, utilizing various types of malware, notably the Bisonal and ShadowPad backdoors, in campaigns against entities in Japan, Russi |
Operation Bitter Biscuit | Unspecified | 1 | Operation Bitter Biscuit, as reported by AhnLab, was a malicious campaign executed by a threat actor known as the Tonto Team. This operation targeted entities in South Korea, Japan, India, and Russia, with the initial report being published in October 2017. The main tools used in this cyber-attack w |
Tick | Unspecified | 1 | Tick is a threat actor, also known as BRONZE BUTLER, that likely originates from the People's Republic of China. Secureworks® incident responders and Counter Threat Unit™ (CTU) researchers have been investigating activities associated with this group. Tick has deployed various tools and malware fami |
ID | Type | Votes | Profile Description |
---|---|---|---|
No associations to display |
Source | CreatedAt | Title |
---|---|---|
CERT-EU | 6 months ago | Connect the Dots on State-Sponsored Cyber Incidents - Tonto Team |
CERT-EU | 6 months ago | Connect the Dots on State-Sponsored Cyber Incidents - Targeting of Japan, Russia, and South Korean entities |
CERT-EU | 10 months ago | South Korea subjected to multi-year Chinese cyberespionage campaign |
CERT-EU | 10 months ago | Chinese Hackers TAG-74 Targets South Korean Organizations in a Multi-Year Campaign |
CERT-EU | 10 months ago | Chinese Hackers TAG-74 Targets South Korean Organizations in a Multi-Year Campaign | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker | National Cyber Security Consulting |
CERT-EU | 10 months ago | Connect the Dots on State-Sponsored Cyber Incidents - Targeting of Japan, Russia, and South Korean entities |
Recorded Future | 10 months ago | Multi-year Chinese APT Campaign Targets South Korean Academic, Government, and Political Entities | Recorded Future |
CERT-EU | a year ago | Connect the Dots on State-Sponsored Cyber Incidents - Tonto Team |
MITRE | a year ago | Bisonal: 10 years of play |
MITRE | a year ago | Exchange servers under siege from at least 10 APT groups | WeLiveSecurity |
MITRE | a year ago | CactusPete APT group’s updated Bisonal backdoor |
MITRE | a year ago | Bisonal Malware Used in Attacks Against Russia and South Korea |