ID | Votes | Profile Description |
---|---|---|
Powerstar | 3 | Powerstar is a malicious software (malware) deployed by the Iranian Advanced Persistent Threat (APT) group known as Charming Kitten, also referred to as APT35, Mint Sandstorm, Cobalt Illusion, and Yellow Garuda. This malware was used in a series of spear-phishing attacks launched by the group since |
Noknok | 2 | NokNok is a malicious software (malware) developed by the Iranian hacking group APT35, also known as Charming Kitten. It was discovered after the group targeted a US-based nuclear security expert with a sophisticated phishing attack. The attackers initiated several non-threatening email interactions |
GorjolEcho | 1 | GorjolEcho is a malicious software, or malware, linked to the Iranian group TA453 and identified by Proofpoint researchers. This sophisticated backdoor malware is designed to infiltrate computer systems, establish persistence, and exfiltrate information to command-and-control servers. The stealthy n |
Ghostecho | 1 | None |
ID | Type | Votes | Profile Description |
---|---|---|---|
No associations to display |
ID | Type | Votes | Profile Description |
---|---|---|---|
Charming Kitten | Unspecified | 3 | Charming Kitten, an Iranian Advanced Persistent Threat (APT) group, also known as ITG18, Phosphorous, and TA453, is a significant cybersecurity threat. This threat actor has been associated with numerous malicious activities, exhibiting advanced and sophisticated social-engineering efforts. The grou |
Mint Sandstorm | Unspecified | 2 | Mint Sandstorm, an Iranian nation-state threat actor also known as APT35 and Charming Kitten, has been identified by Microsoft as a significant cybersecurity concern. The group is linked to Iran's Islamic Revolutionary Guard Corps and is known for its sophisticated cyber campaigns targeting high-val |
APT35 | Unspecified | 1 | APT35, also known as the Newscaster Team, Charming Kitten, and Mint Sandstorm, is an Iranian government-sponsored cyber espionage group. The group focuses on long-term, resource-intensive operations to collect strategic intelligence. They primarily target sectors in the U.S., Western Europe, and the |
ID | Type | Votes | Profile Description |
---|---|---|---|
No associations to display |
Source | CreatedAt | Title |
---|---|---|
Securityaffairs | a year ago | Iran-linked APT TA453 targets Windows and macOS systems |
CERT-EU | a year ago | Iranian Hackers' Sophisticated Malware Targets Windows and macOS Users |
CERT-EU | a year ago | Iranian Cyberspies Target US-Based Think Tank With New macOS Malware |
CERT-EU | a year ago | Iranian APT Group Charming Kitten Updates Powerstar Backdoor | IT Security News |
BankInfoSecurity | a year ago | Iranian APT Group Charming Kitten Updates Powerstar Backdoor |
CERT-EU | a year ago | Iran-Linked APT35 Targets Israeli Media With Upgraded Spear-Phishing Tools |
Securityaffairs | a year ago | Iran-linked Charming Kitten APT enhanced its POWERSTAR Backdoor |
CERT-EU | a year ago | Charming Kitten APT Group Uses Innovative Spear-phishing Methods |
CERT-EU | a year ago | Charming Kitten Updates POWERSTAR with an InterPlanetary Twist |
MITRE | a year ago | APT35 exploits Log4j vulnerability to distribute new modular PowerShell toolkit - Check Point Research |
CERT-EU | a year ago | Microsoft: Iranian Hackers Moved From Recon to Targeting US Critical Infrastructure |
CERT-EU | a year ago | Iranian Hackers Target U.S. Energy and Transit Systems |
CERT-EU | a year ago | Hacking Groups Rapidly Weaponizing N-Day Vulnerabilities to Attack Enterprise Targets |