ID | Votes | Profile Description |
---|---|---|
Powerstar | 5 | Powerstar is a malicious software (malware) utilized by the Iranian state-sponsored threat operation, Charming Kitten, also known as APT35, Mint Sandstorm, Cobalt Illusion, and Yellow Garuda. This malware has been deployed in spear-phishing attacks targeting US political and government entities sinc |
Noknok | 2 | NokNok is a malicious software (malware) developed by the Iranian hacking group APT35, also known as Charming Kitten. It was discovered after the group targeted a US-based nuclear security expert with a sophisticated phishing attack. The attackers initiated several non-threatening email interactions |
GorjolEcho | 2 | GorjolEcho is a sophisticated malware, identified by Proofpoint and attributed with high confidence to the Iranian group TA453, based on code similarities with previously recognized malware such as GhostEcho, CharmPower, and MacDownloader. The malware is delivered via a new infection chain involving |
ID | Type | Votes | Profile Description |
---|---|---|---|
Charming Kitten | Unspecified | 3 | Charming Kitten, also known as APT42, Storm-2035, Damselfly, Mint Sandstorm, TA453, and Yellow Garuda, is an Iranian threat actor group that has been linked to various cyber attacks. It has targeted entities in Brazil, Israel, and the United Arab Emirates using a new backdoor, as revealed by securit |
Mint Sandstorm | Unspecified | 2 | Mint Sandstorm, an Advanced Persistent Threat (APT) group linked to Iran's Islamic Revolutionary Guard Corps (IRGC), has been identified as a significant cyber threat actor. This group is known for its highly skilled operators and sophisticated social engineering techniques, often lacking the typica |
Preview | Source Link | CreatedAt | Title |
---|---|---|---|
DARKReading | 25 days ago | IRGC-Linked Hackers Roll Malware into Monolithic Trojan | |
Recorded Future | 25 days ago | GreenCharlie Infrastructure Targeting US Political Entities with Advanced Phishing and Malware | |
Securityaffairs | a year ago | Iran-linked APT TA453 targets Windows and macOS systems | |
CERT-EU | a year ago | Iranian Hackers' Sophisticated Malware Targets Windows and macOS Users | |
CERT-EU | a year ago | Iranian Cyberspies Target US-Based Think Tank With New macOS Malware | |
CERT-EU | a year ago | Iranian APT Group Charming Kitten Updates Powerstar Backdoor | IT Security News | |
BankInfoSecurity | a year ago | Iranian APT Group Charming Kitten Updates Powerstar Backdoor | |
CERT-EU | a year ago | Iran-Linked APT35 Targets Israeli Media With Upgraded Spear-Phishing Tools | |
Securityaffairs | a year ago | Iran-linked Charming Kitten APT enhanced its POWERSTAR Backdoor | |
CERT-EU | a year ago | Charming Kitten APT Group Uses Innovative Spear-phishing Methods | |
CERT-EU | a year ago | Charming Kitten Updates POWERSTAR with an InterPlanetary Twist | |
MITRE | 2 years ago | APT35 exploits Log4j vulnerability to distribute new modular PowerShell toolkit - Check Point Research | |
CERT-EU | a year ago | Microsoft: Iranian Hackers Moved From Recon to Targeting US Critical Infrastructure | |
CERT-EU | a year ago | Iranian Hackers Target U.S. Energy and Transit Systems | |
CERT-EU | a year ago | Hacking Groups Rapidly Weaponizing N-Day Vulnerabilities to Attack Enterprise Targets |