ID | Votes | Profile Description |
---|---|---|
Emissary Panda | 1 | Emissary Panda, also known as Iron Tiger, APT27, Budworm, Bronze Union, Lucky Mouse, and Red Phoenix, is a threat actor group associated with malicious cyber activities. The group has been active since at least 2013, targeting various industry verticals across Europe, North and South America, Africa |
ID | Type | Votes | Profile Description |
---|---|---|---|
HyperBro | Unspecified | 1 | HyperBro is a malicious software (malware) that has been utilized in a sophisticated cyber espionage campaign targeting semiconductor industries primarily in Taiwan, Hong Kong, and Singapore. This malware was discovered being used in conjunction with a lure purporting to be from the Taiwan Semicondu |
China Chopper | Unspecified | 1 | China Chopper is a notorious malware that has been widely used by various Advanced Persistent Threat (APT) groups, notably BRONZE UNION. This web shell was found embedded in multiple web shells on SharePoint servers, such as stylecs.aspx, test.aspx, and stylecss.aspx. It is believed to be associated |
SysUpdate | Unspecified | 1 | SysUpdate is a malicious software variant that has been exclusively used by Budworm, also known as APT27, Emissary Panda, Bronze Union, Lucky Mouse, Iron Tiger, and Red Phoenix. In December 2020, a sample of the SysUpdate malware variant was found, with its payload being a new version of SysUpdate. |
Elise | Unspecified | 1 | Elise is a malicious software (malware) that is part of the LStudio malware group, which also includes the Emissary Trojan. Both Elise and Emissary share code overlap and utilize a custom algorithm to decrypt their configurations, using the "srand" function to set a seed value for the "rand" functio |
python33.dll | Unspecified | 1 | Python33.dll is a harmful malware that can infiltrate your system through various channels, including suspicious downloads, emails, or websites. Once inside, it can steal personal information, disrupt operations, or even hold your data hostage for ransom. This malicious software has been observed be |
inicore_v2.3.30.dll | Unspecified | 1 | The malware inicore_v2.3.30.dll is a harmful program designed to exploit and damage computer systems, often infiltrating them via suspicious downloads, emails, or websites without the user's knowledge. Once inside, it can steal personal information, disrupt operations, or even hold data hostage for |
Lucky Mouse | Unspecified | 1 | Lucky Mouse, also known as Emissary Panda, APT27, Threat Group 3390, Bronze Union, and several other names, is a malicious software (malware) attributed to a China-linked Advanced Persistent Threat (APT) group. This malware has been active since at least 2013, targeting various industry verticals fo |
Antak | Unspecified | 1 | Antak is a type of malware, specifically a webshell, that has been detected on SharePoint servers. The Antak webshell, as depicted in Figure 2, was loaded onto the server and used to upload additional tools for post-exploitation. In addition to Antak, several other webshells were also installed on t |
ID | Type | Votes | Profile Description |
---|---|---|---|
BRONZE UNION | Unspecified | 1 | Bronze Union, also known as APT27, Emissary Panda, Lucky Mouse, Iron Tiger, and Red Phoenix, is a threat actor with alleged connections to the Chinese government. The group has been observed targeting organizations across Europe, North and South America, Africa, the Middle East, and the Asia-Pacific |
Lotus Blossom | Unspecified | 1 | Lotus Blossom, also known as Billbug and Thrip, is a threat actor that has been active since 2009, engaging in persistent cyber espionage campaigns primarily targeting government and military organizations in Southeast Asia. The group is notorious for its use of sophisticated delivery techniques and |
APT27 | Unspecified | 1 | APT27, also known as Iron Taurus, is a Chinese threat actor group that primarily engages in cyber operations with the goal of intellectual property theft. The group targets multiple organizations worldwide, including those in North and South America, Europe, and the Middle East. APT27 utilizes vario |
Turla | Unspecified | 1 | Turla, also known as Pensive Ursa, is a sophisticated threat actor linked to Russia that has been active for many years. The group is known for its advanced cyber-espionage capabilities and has been associated with numerous high-profile breaches. According to the MITRE ATT&CK and MITRE Ingenuity dat |
Venomous Bear | Unspecified | 1 | Venomous Bear, also known as Turla, Urobouros, Snake, and other names, is a threat actor group attributed to Center 16 of the Federal Security Service (FSB) of the Russian Federation. The group has been active since at least 2004, targeting diplomatic and government organizations, as well as private |
Ke3chang | Unspecified | 1 | Ke3chang, also known as APT15, Mirage, Vixen Panda GREF, and Playful Dragon, is a prominent threat actor that has been active since at least 2010. According to the European Union Agency for Cybersecurity (ENISA), this group has consistently targeted energy, government, and military sectors. Ke3chang |
ID | Type | Votes | Profile Description |
---|---|---|---|
CVE-2014-6332 | Unspecified | 1 | None |
CVE-2019-0604 | Unspecified | 1 | None |
Source | CreatedAt | Title |
---|---|---|
CERT-EU | 8 months ago | Cybersecurity, ICT and Media Policies | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware | National Cyber Security Consulting |
CrowdStrike | a year ago | CrowdStrike Scores 100% in SE Labs 2023 Q2 EAS Test | CrowdStrike |
CERT-EU | a year ago | Links 18/07/2023: Akademy 2023 Videos and Debian Brainwashing |
MITRE | a year ago | Attack on French Diplomat Linked to Operation Lotus Blossom |
MITRE | a year ago | Emissary Panda Attacks Middle East Government SharePoint Servers |
MITRE | a year ago | Newly discovered Chinese hacking group hacked 100+ websites to use as “watering holes” |
CERT-EU | a year ago | FBI: Crooks posing as PRC agents prey on Chinese in the US |