ID | Type | Votes | Profile Description |
---|---|---|---|
Qbot | Unspecified | 2 | Qbot, also known as Qakbot or Pinkslipbot, is a modular information-stealing malware that emerged in 2007 as a banking trojan. Over the years, it has evolved into an advanced malware strain used by multiple cybercriminal groups to compromise networks and prepare them for ransomware attacks. The firs |
IcedID | Unspecified | 2 | IcedID is a malicious software (malware) that has been linked to various cybercrime operations. The malware can infiltrate systems via suspicious downloads, emails, or websites and proceed to steal personal information, disrupt operations, or hold data for ransom. IcedID has been associated with oth |
Conti | Unspecified | 2 | Conti is a notorious malware and ransomware operation that has caused significant damage to computer systems worldwide. The Conti group, believed to have around 200 employees, operated like a regular business, with internal communications revealing the organization's structure and operations. It was |
Anubis | Unspecified | 2 | Anubis, also known as IcedID or Bokbot, is a sophisticated piece of malware primarily functioning as a banking trojan. It was first discovered by X-Force in September 2017 and has since evolved to target a wide range of financial applications. Notably, Anubis has consistently ranked among the top fi |
Preview | Source Link | CreatedAt | Title |
---|---|---|---|
CERT-EU | 6 months ago | A patched Windows attack surface is still exploitable | |
Securityaffairs | a year ago | In 2022, more than 40% of zero-day exploits used in the wild were variations of previous issues | |
BankInfoSecurity | a year ago | Royal Ransomware Group Builds Its Own Malware Loader | |
CERT-EU | a year ago | Royal Ransomware Group Builds Its Own Malware Loader | #ransomware | #cybercrime – National Cyber Security Consulting |