ID | Votes | Profile Description |
---|---|---|
Curkeep | 1 | CurKeep is a malware that was first discovered in 2021 as part of an espionage campaign known as "Stayin' Alive". This campaign targeted the telecommunications industry and governments in Vietnam, Uzbekistan, and Kazakhstan. The attack chain began with a spear-phishing email containing a ZIP file at |
ID | Type | Votes | Profile Description |
---|---|---|---|
No associations to display |
ID | Type | Votes | Profile Description |
---|---|---|---|
Toddycat | Unspecified | 1 | ToddyCat is a sophisticated Advanced Persistent Threat (APT) actor, likely Chinese-speaking, that has been active since at least December 2020. It primarily operates in Asia, targeting government entities in Malaysia, Thailand, and Pakistan. In 2022, Kaspersky reported finding ToddyCat actors using |
ID | Type | Votes | Profile Description |
---|---|---|---|
No associations to display |
Source | CreatedAt | Title |
---|---|---|
CERT-EU | 9 months ago | ToddyCat hackers use 'disposable' malware to target Asian telecoms |
InfoSecurity-magazine | 9 months ago | Chinese APT ToddyCat Targets Asian Telecoms, Governments |
CERT-EU | 10 months ago | Chinese 'Stayin' Alive' Attacks Dance Onto Targets With Dumb Malware |
Checkpoint | 10 months ago | Stayin’ Alive - Targeted Attacks Against Telecoms and Government Ministries in Asia - Check Point Research |