ID | Votes | Profile Description |
---|---|---|
GOLD KINGSWOOD | 1 | Gold Kingswood is an advanced persistent cybercrime group that has been successfully targeting financial organizations since at least 2016. The group is highly sophisticated, financially motivated, and uses a tool called SpicyOmelette during initial exploitation of an organization. Once installed, S |
ITG08 | 1 | ITG08 is a notable threat actor in the cybersecurity landscape, known for its malicious activities and strategic partnerships with other threat actors. This group has been linked to a series of attacks through Tactics, Techniques, and Procedures (TTPs) consistent with their known modus operandi. Whi |
Excobalt | 1 | ExCobalt, an active cybercrime group since at least 2016, is a significant threat actor known for targeting Russian organizations across multiple sectors. Researchers believe that ExCobalt is linked to the notorious Cobalt Gang, a connection supported by their shared use of the CobInt tool, which be |
ID | Type | Votes | Profile Description |
---|---|---|---|
More_eggs | Unspecified | 1 | More_eggs, also known as Golden Chickens, is a malware suite utilized by financially motivated cybercrime actors such as Cobalt Group and FIN6. This malware-as-a-service (MaaS) offering has been identified as the "cyber weapon of choice" by Russia-based cyber gangs. It was first seen in email campai |
ID | Type | Votes | Profile Description |
---|---|---|---|
Fancy Bear | Unspecified | 1 | Fancy Bear is a sophisticated Russian-based threat actor, also known as Sofacy or APT 28, that has been active since the mid-2000s. Fancy Bear is responsible for targeted intrusion campaigns against the Aerospace, Defense, Energy, Government and Media sectors. At the DNC, both Cozy Bear and Fancy Be |
APT28 | Unspecified | 1 | APT28, also known as Fancy Bear, is a threat actor linked to Russia and has been involved in numerous cyber espionage campaigns. The group is notorious for its sophisticated tactics, techniques, and procedures (TTPs). Recently, NATO and the EU formally condemned APT28's activities, acknowledging the |
MuddyWater | Unspecified | 1 | MuddyWater is an advanced persistent threat (APT) group, also known as Earth Vetala, MERCURY, Static Kitten, Seedworm, and TEMP.Zagros. This threat actor has been linked to the Iranian Ministry of Intelligence and Security (MOIS) according to a joint advisory from cybersecurity firms. The group empl |
ID | Type | Votes | Profile Description |
---|---|---|---|
No associations to display |
Source | CreatedAt | Title |
---|---|---|
Securityaffairs | a month ago | ExCobalt Cybercrime group targets Russian organizations in multiple sectors |
MITRE | a year ago | ITG08 (aka FIN6) Partners With TrickBot Gang, Uses Anchor Framework |
MITRE | a year ago | Cobalt Group 2.0 |
MITRE | a year ago | Cybercriminals Increasingly Trying to Ensnare the Big Financial Fish |