Alias Description | Votes |
---|---|
Socgholish is a possible alias for Evil Corp. SocGholish is a malicious software (malware) that has been significantly prevalent in cyber threats over recent years. In 2022, it was observed being used in conjunction with the Parrot TDS to deliver the FakeUpdates downloader to unsuspecting visitors on compromised websites. By late 2022, Microsof | 4 |
Unc2165 is a possible alias for Evil Corp. UNC2165, a threat actor group with financial motivations, has been identified as the force behind multiple LockBit ransomware intrusions. This group shares several characteristics with another publically known group, Evil Corp. Research conducted by Mandiant reveals that UNC2165 has been shifting it | 3 |
Whisper Spider is a possible alias for Evil Corp. Whisper Spider, also known as Silence, is a financially motivated threat actor that has been linked to multiple dangerous groups including Evil Corp. This entity has primarily targeted financial institutions in various countries such as Ukraine, Russia, Azerbaijan, Poland, and Kazakhstan. As a threa | 2 |
Raspberry Robin is a possible alias for Evil Corp. Raspberry Robin is a sophisticated malware that uses advanced techniques to infiltrate and exploit computer systems. The malicious software is designed to stealthily enter a system through suspicious downloads, emails, or websites, often unbeknownst to the user. Once inside, it can wreak havoc by st | 2 |
FIN7 is a possible alias for Evil Corp. FIN7, also known as Carbanak, Carbon Spider, Cobalt Group, and Navigator Group, is a notorious cybercrime group that has been active since 2012. The group is recognized for its advanced combination of malware and social engineering tactics, having executed numerous successful attacks against global | 2 |
Alias Description | Association Type | Votes |
---|---|---|
The Lockbit Malware is associated with Evil Corp. LockBit is a prominent ransomware-as-a-service (RaaS) malware that has been involved in numerous cyberattacks, demonstrating its staying power and adaptability. The malware, which can infiltrate systems through suspicious downloads, emails, or websites, is designed to exploit and damage computers or | is related to | 7 |
The Dridex Malware is associated with Evil Corp. Dridex is a notorious malware, specifically a banking Trojan, designed to exploit and damage computer systems, often infiltrating through suspicious downloads, emails, or websites. This malicious software was primarily used by the Russian cybercriminal group, Evil Corp, founded in 2014. The group ta | Unspecified | 5 |
The Zeus Malware is associated with Evil Corp. Zeus is a notorious malware, short for malicious software, designed to exploit and damage computer systems. It is often spread through suspicious downloads, emails, or websites and can infiltrate systems without the user's knowledge. Once inside, it can steal personal information, disrupt operations | Unspecified | 3 |
The WastedLocker Malware is associated with Evil Corp. WastedLocker is a sophisticated malware developed by the Evil Corp Group, a notorious cybercriminal organization. This malware is a form of ransomware that targets both Windows and Android devices, encrypting users' data and demanding a ransom for its release. Originating in 2020, WastedLocker utili | Unspecified | 3 |
The BitPaymer Malware is associated with Evil Corp. BitPaymer is a type of malware, specifically ransomware, that was operated by the cybercriminal group known as GOLD DRAKE. It is designed to infiltrate systems and encrypt data, holding it hostage until a ransom is paid. This malicious software became prominent in conjunction with the rise of Ransom | Unspecified | 3 |
The Gameover Zeus Malware is associated with Evil Corp. GameOver Zeus is a variant of the ZeuS malware, used by malicious actors to steal banking credentials and distribute other types of malware, including ransomware such as Cryptolocker. It operated as a banking Trojan, infecting systems and stealing sensitive information. The botnet was closely associ | Unspecified | 2 |
The Truebot Malware is associated with Evil Corp. Truebot is a malicious software (malware) utilized by the CL0P actors, designed to exploit and damage computer systems. This malware can infiltrate systems through suspicious downloads, emails, or websites, often without the user's knowledge. Once inside, Truebot serves multiple purposes: it can dow | Unspecified | 2 |
Alias Description | Association Type | Votes |
---|---|---|
The TA505 Threat Actor is associated with Evil Corp. TA505, also known as Cl0p Ransomware Gang and Lace Tempest, is a highly active and sophisticated cybercriminal group. The group has been associated with various high-profile cyber-attacks, demonstrating adaptability through a multi-vector approach to their operations. In June 2023, the U.S. Cybersec | Unspecified | 4 |
The Indrik Spider Threat Actor is associated with Evil Corp. Indrik Spider is a notable threat actor known for its cybercriminal activities, particularly in the realm of ransomware. In July 2017, the group entered the targeted ransomware sphere with BitPaymer, using file-sharing platforms to distribute the BitPaymer decryptor. This shift in operations saw Ind | Unspecified | 2 |
Preview | Source Link | CreatedAt | Title |
---|---|---|---|
BankInfoSecurity | 2 months ago | ||
BankInfoSecurity | 3 months ago | ||
BankInfoSecurity | 3 months ago | ||
BankInfoSecurity | 3 months ago | ||
BankInfoSecurity | 3 months ago | ||
BankInfoSecurity | 3 months ago | ||
InfoSecurity-magazine | 3 months ago | ||
DARKReading | 3 months ago | ||
BankInfoSecurity | 3 months ago | ||
BankInfoSecurity | 3 months ago | ||
BankInfoSecurity | 3 months ago | ||
BankInfoSecurity | 3 months ago | ||
Securityaffairs | 3 months ago | ||
DARKReading | 3 months ago | ||
InfoSecurity-magazine | 3 months ago | ||
BankInfoSecurity | 3 months ago | ||
DARKReading | 5 months ago | ||
CERT-EU | 10 months ago | ||
CERT-EU | 10 months ago | ||
BankInfoSecurity | 10 months ago |