ID | Votes | Profile Description |
---|
ID | Type | Votes | Profile Description |
---|---|---|---|
PLEAD | Unspecified | 1 | The PLEAD malware is a malicious software that was discovered by ESET researchers in 2019 to be utilized by the Chinese APT group known as BlackTech. The group was found to be performing Man-in-the-Middle (MitM) attacks through compromised ASUS routers and delivering the PLEAD malware through ASUS W |
ID | Type | Votes | Profile Description |
---|---|---|---|
APT17 | Targets | 2 | APT17, also known as Tailgator Team and Deputy Dog, is a threat actor suspected to be affiliated with the Chinese intelligence apparatus. This group has been associated with various aliases including Winnti, PassCV, Axiom, LEAD, BARIUM, Wicked Panda, and GREF. The primary targets of APT17 are the U. |
APT3 | Unspecified | 1 | APT3, also known as the UPS Team, is a highly sophisticated threat group suspected to be based in China and attributed to the Chinese Ministry of State Security (MSS) and Boyusec. This threat actor targets sectors including Aerospace and Defense, Construction and Engineering, High Tech, Telecommunic |
APT18 | Unspecified | 1 | APT18, also known as Wekby, is a threat actor suspected to be attributed to China. This group has targeted multiple sectors including Aerospace and Defense, Construction and Engineering, Education, Health and Biotechnology, High Tech, Telecommunications, and Transportation. Despite the significant i |
Deputy Dog | Unspecified | 1 | Deputy Dog is a threat actor group that conducts network intrusions against targeted organizations, with a suspected attribution to China. The group is also known as Tailgator Team or APT17 and has primarily targeted the U.S. government, international law firms, and information technology companies. |
BlackOasis | Unspecified | 1 | BlackOasis is a prominent threat actor known for its execution of actions with malicious intent, primarily through the use of zero-day exploits. The cybersecurity industry first became aware of BlackOasis' activities in May 2016 while investigating an Adobe Flash zero day. Notably, this group has re |
ID | Type | Votes | Profile Description |
---|---|---|---|
No associations to display |
Source | CreatedAt | Title |
---|---|---|
MITRE | a year ago | The Trail of BlackTech’s Cyber Espionage Campaigns |
MITRE | a year ago | APT Trends report Q2 2017 |
MITRE | a year ago | BlackOasis APT and new targeted attacks leveraging zero-day exploit |
MITRE | a year ago | Advanced Persistent Threats (APTs) | Threat Actors & Groups |
MITRE | a year ago | Demonstrating Hustle, Chinese APT Groups Quickly Use Zero-Day Vulnerability (CVE-2015-5119) Following Hacking Team Leak | Mandiant |