ID | Votes | Profile Description |
---|---|---|
CARROTBALL | 1 | None |
SYSCON | 1 | In January 2023, the McAfee Advanced Threat Research team discovered a new variant of the SYSCON backdoor malware being used in an operation. This variant appeared in a malicious Word document containing a Visual Basic macro that dropped and executed an upgraded version of the implant. The malware w |
KONNI | 1 | Konni is a malware, short for malicious software, that poses a significant threat to computer systems and data. It's designed to infiltrate systems surreptitiously through suspicious downloads, emails, or websites, often unbeknownst to the user. Once inside a system, Konni can wreak havoc by stealin |
NOKKI | 1 | NOKKI is a malicious software (malware) that was first identified in January 2018, with activities traced throughout the year. It originated from an investigation into a new malware family named NOKKI, which showed significant code overlap and other ties to KONNI, a previously identified malware. Th |
Fracturedstatue | 1 | None |
ID | Type | Votes | Profile Description |
---|---|---|---|
OceanSalt | Unspecified | 1 | None |
ID | Type | Votes | Profile Description |
---|---|---|---|
Konni Group | Unspecified | 1 | The Konni Group, also known as TA406, is a threat actor believed to be associated with North Korean cyberespionage activities. According to cybersecurity firm DuskRise, the group has been involved in sophisticated cyberattacks, including one where they compromised a foreign ministry email account to |
ID | Type | Votes | Profile Description |
---|---|---|---|
No associations to display |