ID | Votes | Profile Description |
---|---|---|
TeamTNT | 1 | TeamTNT, a threat actor group known for its malicious activities, has been implicated in a series of sophisticated attacks on Kubernetes, one of the most complex to date. The group is notorious for deploying malware, specifically the Hildegard malware, which was identified during a new campaign. The |
ID | Type | Votes | Profile Description |
---|---|---|---|
Tntfeatb0rg | Unspecified | 1 | TNTFeatB0RG is a malicious software (malware) identified within the "dockgeddon" Docker image, designed to exploit and damage computer systems. It can infiltrate systems via suspicious downloads, emails, or websites, often unbeknownst to the user. Once inside, TNTFeatB0RG has the capability to steal |
Xmrig | Unspecified | 1 | XMRig is a type of malware that is particularly harmful to computer systems and devices. It infiltrates the system through suspicious downloads, emails, or websites, often unbeknownst to the user. Once inside, it can steal personal information, disrupt operations, or even hold your data hostage for |
Tsunami | Unspecified | 1 | The "Tsunami" malware, a malicious software designed to exploit and damage computer systems, has caused significant cybersecurity disruptions globally. This malware, whose variants include xmrigDeamon, Bioset, dns3, xmrigMiner, docker-update, dns, 64[watchdogd], 64bioset, 64tshd, armbioset, armdns, |
ID | Type | Votes | Profile Description |
---|---|---|---|
No associations to display |
ID | Type | Votes | Profile Description |
---|---|---|---|
Tsunami Tntfeatb0rg | Unspecified | 1 | None |
Source | CreatedAt | Title |
---|---|---|
MITRE | a year ago | Taking TeamTNT’s Docker Images Offline - Lacework |