ID | Votes | Profile Description |
---|---|---|
Shadow Brokers | 3 | The Shadow Brokers, a threat actor group, made headlines in the cybersecurity world for their leaks of sophisticated cyber tools believed to be developed by the Equation Group, an Advanced Persistent Threat (APT) group associated with the NSA's Tailored Access Operations unit. The most notable among |
ID | Type | Votes | Profile Description |
---|---|---|---|
jian | Unspecified | 2 | Jian, a cyber espionage tool used by the China-linked APT31 group (also known as Zirconium, Judgment Panda, and Red Keres), has been implicated in multiple cyber espionage operations. The tool was first brought to public attention in 2022 when it was discovered by the Check Point Research team. Nota |
ZIRCONIUM | Unspecified | 2 | Zirconium, also known as APT31, Judgment Panda, and Red Keres, is a threat actor linked to numerous cyber espionage operations. The group came into the spotlight in 2022 when the Check Point Research team discovered that it had used a tool called "Jian," a clone of the NSA Equation Group's hacking t |
APT31 | Unspecified | 2 | APT31, also known as Zirconium, is a threat actor group linked to the Chinese government that has been implicated in numerous cyber espionage activities. One of their most notable exploits was the cloning of the Equation Group's exploit, EpMe (CVE-2017-0005). This exploit was initially discovered du |
ID | Type | Votes | Profile Description |
---|---|---|---|
Epme | Unspecified | 2 | EpMe is a software vulnerability (CVE-2017-0005) that was first discovered within the Equation Group's exploit arsenal, with its existence traced back to at least 2013. The Equation Group, believed to be linked to the NSA, developed this exploit as part of their cyber toolset which also included Dan |
Eternalblue | Unspecified | 2 | EternalBlue is a significant software vulnerability that exists in the design or implementation of certain systems. This flaw has been exploited by various cyber threats, with one notable instance being its use as an enabler for the widespread WannaCry ransomware attack. The exploit allows attackers |
Preview | Source Link | CreatedAt | Title |
---|---|---|---|
Securityaffairs | 6 months ago | US Treasury Dep announced sanctions against members of China-linked APT31 | |
CERT-EU | 6 months ago | Complete Guide to Advanced Persistent Threat (APT) Security | |
CERT-EU | 2 years ago | WannaRen Returns as Life Ransomware, Targets India | |
Krypos Logic | 2 years ago | WannaCry: Two Weeks and 16 Million Averted Ransoms Later | |
MITRE | 2 years ago | Waterbug: Espionage Group Rolls Out Brand-New Toolset in Attacks Against Governments | |
MITRE | 2 years ago | Unraveling the Lamberts Toolkit | |
MITRE | 2 years ago | The Story of Jian - How APT31 Stole and Used an Unknown Equation Group 0-Day - Check Point Research | |
MITRE | 2 years ago | APT Trends report Q2 2017 | |
CERT-EU | 10 months ago | StripedFly Malware's Covert Cryptocurrency Mining Operation | |
CERT-EU | 10 months ago | StripedFly Malware Operated Unnoticed for 5 Years, Infecting 1 Million Devices | |
CERT-EU | 10 months ago | Advanced ‘StripedFly’ Malware With 1 Million Infections Shows Similarities to NSA-Linked Tools | |
CERT-EU | 10 months ago | Kaspersky reveals 'elegant' malware resembling NSA code |