Alias Description | Votes |
---|---|
Lockbit Green is a possible alias for Conti Encryptor. LockBit, also known as Gold Mystic and Water Selkie, is a notorious ransomware group that has been active since its inception in September 2019. It has developed several variants of its malware over the years, including LockBit 1.0, LockBit 2.0, LockBit 3.0, and most recently, LockBit Green. The gro | 3 |
Alias Description | Association Type | Votes |
---|---|---|
The Lockbit Malware is associated with Conti Encryptor. LockBit is a prominent ransomware-as-a-service (RaaS) malware that has been involved in numerous cyberattacks, demonstrating its staying power and adaptability. The malware, which can infiltrate systems through suspicious downloads, emails, or websites, is designed to exploit and damage computers or | Unspecified | 3 |
The Conti Malware is associated with Conti Encryptor. Conti is a type of malware, specifically ransomware, which is designed to infiltrate and damage computer systems. This malicious software can enter systems through various methods such as suspicious downloads, emails, or websites, often without the user's knowledge. Once inside, it can steal persona | Unspecified | 2 |
Alias Description | Association Type | Votes |
---|---|---|
The LockBitSupp Threat Actor is associated with Conti Encryptor. LockBitSupp, a prominent threat actor, has been identified as Russian national Dmitry Yuryevich Khoroshev. The group's activities have been under scrutiny due to its involvement in ransomware attacks and other cybercrimes. Khoroshev, who was operating under the aliases "LockBit" and "LockBitSupp," i | Unspecified | 2 |
Preview | Source Link | CreatedAt | Title |
---|---|---|---|
InfoSecurity-magazine | 5 days ago | ||
InfoSecurity-magazine | 8 months ago | ||
BankInfoSecurity | 10 months ago | ||
CERT-EU | 10 months ago | ||
CERT-EU | 10 months ago |