Alias Description | Votes |
---|---|
Bronze Highland is a possible alias for Daggerfly. Bronze Highland, also known as Evasive Panda and Daggerfly, is a Chinese-speaking Advanced Persistent Threat (APT) group that has been active since at least 2012. This threat actor conducts cyberespionage against individuals in mainland China, Hong Kong, Macao, and Nigeria, along with specific organ | 5 |
Evasive Panda is a possible alias for Daggerfly. Evasive Panda, also known as StormBamboo and DaggerFly, is a threat actor group linked to China, primarily targeting organizations across Asia that have interest in the Chinese state. The group has been observed deploying custom implants such as MgBot, Nightdoor, and a macOS downloader component, al | 5 |
APT41 is a possible alias for Daggerfly. APT41, also known as Winnti, Wicked Panda, and Brass Typhoon, is a threat actor suspected to be linked to China. This group has been active since at least 2012 and has targeted organizations in over 14 countries. They have used a variety of sophisticated techniques and malware, including at least 46 | 2 |
Alias Description | Association Type | Votes |
---|---|---|
The Mgbot Malware is associated with Daggerfly. MgBot is a custom malware framework known for its use by the cyber espionage group, Daggerfly. Active for at least a decade, Daggerfly has deployed MgBot in various attacks, demonstrating its ability to uninstall itself, delete files, and collect information about processes. Notably, both MgBot and | Unspecified | 4 |
The MacMa Malware is associated with Daggerfly. Macma is a malware, first detailed by Google in 2021, that has been used since at least 2019. It is a modular backdoor that supports multiple functionalities such as device fingerprinting, executing commands, screen capture, keylogging, audio capture, and uploading and downloading files. Macma, ofte | Unspecified | 3 |
The Nightdoor Malware is associated with Daggerfly. Nightdoor is a complex malware attributed to the Evasive Panda Advanced Persistent Threat (APT) group, a China-linked cyber-espionage team. This group has typically focused on surveillance of individuals and organizations in Asia and Africa. The malware was first introduced by the group in 2020 and | Unspecified | 2 |
Preview | Source Link | CreatedAt | Title |
---|---|---|---|
Securityaffairs | 21 days ago | ||
DARKReading | 2 months ago | ||
Securityaffairs | 2 months ago | ||
Securityaffairs | 3 months ago | ||
DARKReading | 3 months ago | ||
InfoSecurity-magazine | 3 months ago | ||
BankInfoSecurity | 3 months ago | ||
CERT-EU | 7 months ago | ||
CERT-EU | 7 months ago | ||
CERT-EU | 7 months ago | ||
CERT-EU | 7 months ago | ||
InfoSecurity-magazine | 7 months ago | ||
CERT-EU | 7 months ago | ||
DARKReading | 7 months ago | ||
DARKReading | a year ago | ||
InfoSecurity-magazine | a year ago | ||
CERT-EU | a year ago | ||
CERT-EU | a year ago | ||
CERT-EU | a year ago | ||
CERT-EU | a year ago |