ID | Votes | Profile Description |
---|---|---|
Pupy | 1 | Pupy is a cross-platform, multi-function Remote Access Trojan (RAT) and post-exploitation tool primarily developed in Python. It has the capability to operate on several platforms including Windows, Linux, and mobile devices, although its support for Android and OSX is limited and it has not been th |
DarkHydrus | 1 | DarkHydrus is a notable threat actor known for executing malicious activities. The group has been associated with several well-known campaigns including DarkHydrus, OilRig, xHunt, SUNBURST, and Decoy Dog. These campaigns have leveraged DNS tunneling for Command and Control (C2) communications, a tec |
OilRig | 1 | OilRig is a well-known threat actor in the cybersecurity landscape, notorious for its sophisticated attacks on various targets, including Middle Eastern telecommunications organizations and Israel's critical infrastructure sector. This entity has been linked to several high-profile campaigns such as |
ID | Type | Votes | Profile Description |
---|---|---|---|
SUNBURST | Unspecified | 1 | Sunburst is a sophisticated malware that has been linked to the Kazuar code, indicating its complexity. It was used in several well-known cyber attack campaigns such as SUNBURST, OilRig, xHunt, DarkHydrus, and Decoy Dog, which employed DNS tunneling techniques for command and control (C2) communicat |
ID | Type | Votes | Profile Description |
---|---|---|---|
Mantis | Unspecified | 1 | Mantis is a recognized threat actor, known for its sophisticated cyber operations. This group has been linked to several high-profile attacks and campaigns, including one that was tracked by Recorded Future as TAG-63, also known as APT-C-23. Mantis has shown connections to other notable threat group |
Roaming Mantis | Unspecified | 1 | Roaming Mantis, also known as Shaoye, is a financially motivated threat actor first reported in 2017. The group primarily targets mobile device users across several countries, with a particular focus on the Asian region, including Japan, South Korea, and Taiwan. This long-term cyberattack campaign u |
ID | Type | Votes | Profile Description |
---|---|---|---|
CVE-2013-3900 | Unspecified | 1 | None |
Source | CreatedAt | Title |
---|---|---|
Securityaffairs | 2 months ago | Security Affairs newsletter Round 475 by Pierluigi Paganini – INTERNATIONAL EDITION |
Unit42 | 2 months ago | Leveraging DNS Tunneling for Tracking and Scanning |
CERT-EU | 6 months ago | Cloud Atlas Phishing Attacks: Russian Companies Beware |
Unit42 | 9 months ago | Understanding DNS Tunneling Traffic in the Wild |
Malwarebytes | a year ago | Decoy dog toolkit plays the long game with Pupy RAT |
CERT-EU | a year ago | Decoy Dog: New Breed of Malware Posing Serious Threats to Enterprise Networks |
CERT-EU | a year ago | New Decoy Dog Malware Toolkit Targets Enterprise Networks |
CERT-EU | a year ago | Decoy Dog Malware Upgraded to Include New Features |
CERT-EU | a year ago | Cyber Security Today, April 26, 2023 – New reports on ransomware and cyber attacks | IT World Canada News |
CERT-EU | a year ago | Cyber Security Today, Week in Review for the week ending Friday, July 28, 2023 | IT World Canada News |
CERT-EU | a year ago | RSAC 2023 | Cybersecurity research on edge computing generates big interest - Cybersecurity Insiders |
DARKReading | a year ago | Infoblox Uncovers DNS Malware Toolkit & Urges Companies to Block Malicious Domains |
DARKReading | a year ago | Decoy Dog Gets an Upgrade With New Persistence Features |
CERT-EU | a year ago | Infoblox Uncovers DNS Malware Toolkit & Urges Companies to Block Malicious Domains |
DARKReading | a year ago | Infoblox Blows Whistle On ‘Decoy Dog,’ Advocates For Better DNS Monitoring |
CERT-EU | a year ago | New P2Pinfect malware campaign against Redis servers detailed |
CERT-EU | a year ago | Decoy Dog Malware Tool Kit Spotted Via Malicious DNS Queries | IT Security News |
CERT-EU | a year ago | New AI phishing tool FraudGPT tied to same group behind WormGPT |
CERT-EU | a year ago | Decoy Dog is No Ordinary Pupy - Infoblox Reveals Shift in Malware Tactics After Initial Discovery |
Securityaffairs | a year ago | Experts spotted a sophisticated malware toolkit called Decoy Dog |