ID | Votes | Profile Description |
---|---|---|
Bad Rabbit | 1 | Bad Rabbit is a notorious malware that emerged in October 2017, primarily targeting corporate networks. It operates as ransomware, encrypting the victim's files and disk while offering a means of decryption for a ransom. The malicious software uses fake Adobe Flash installer advertisements to lure v |
petya | 1 | Petya is a type of malware, specifically ransomware, that infected Windows-based systems primarily through phishing emails. It was notorious for its ability to disrupt operations and hold data hostage for ransom. Petya, along with other types of ransomware like WannaCry, NotPetya, TeslaCrypt, and Da |
Goldeneye | 1 | GoldenEye is a recognized threat actor in the cybersecurity world, known for its malicious activities. It's often considered a variant of Petya and has been referred to as WannaCry's sibling due to similarities in their operations. GoldenEye appears to be an adaptation of another source code on GitH |
NotPetya | 1 | NotPetya is a notorious malware that was unleashed in 2017, primarily targeting Ukraine but eventually impacting systems worldwide. This malicious software, which initially appeared to be ransomware, was later revealed to be data destructive malware, causing widespread disruption rather than seeking |
win32/diskcoder.petya | 1 | None |
ID | Type | Votes | Profile Description |
---|---|---|---|
Zebrocy | Unspecified | 1 | Zebrocy is a well-documented Trojan malware that infiltrates systems to gather specific system information. Once installed, it sends the collected data to its Command and Control (C2) server via an HTTP POST request. The Zebrocy variant also captures a screenshot of the victim's host and transmits i |
WannaCry | Unspecified | 1 | WannaCry is a type of malware, specifically ransomware, that caused significant global disruption in 2017. It exploited Windows SMBv1 Remote Code Execution Vulnerabilities (CVE-2017-0144, CVE-2017-0145, CVE-2017-0143), which allowed it to spread rapidly and infect over 200,000 machines across more t |
Mosquito | Unspecified | 1 | The "Mosquito" malware is a harmful software designed to exploit and damage computer systems or devices. It operates covertly, infiltrating systems through suspicious downloads, emails, or websites, often unbeknownst to the user. Once inside, it has the capability to steal personal information, disr |
ID | Type | Votes | Profile Description |
---|---|---|---|
APT28 | Unspecified | 1 | APT28, also known as Fancy Bear, is a threat actor linked to Russia and has been involved in numerous cyber espionage campaigns. The group is notorious for its sophisticated tactics, techniques, and procedures (TTPs). Recently, NATO and the EU formally condemned APT28's activities, acknowledging the |
Turla | Unspecified | 1 | Turla, also known as Pensive Ursa, is a sophisticated threat actor linked to Russia that has been active for many years. The group is known for its advanced cyber-espionage capabilities and has been associated with numerous high-profile breaches. According to the MITRE ATT&CK and MITRE Ingenuity dat |
ID | Type | Votes | Profile Description |
---|---|---|---|
Eternalblue | Unspecified | 2 | EternalBlue is a significant software vulnerability that exists in the design or implementation of certain systems. This flaw has been exploited by various cyber threats, with one notable instance being its use as an enabler for the widespread WannaCry ransomware attack. The exploit allows attackers |
Source | CreatedAt | Title |
---|---|---|
CERT-EU | 9 months ago | StripedFly: Perennially flying under the radar |
CERT-EU | 9 months ago | StripedFly: Perennially flying under the radar – GIXtools |
MITRE | a year ago | Bad Rabbit ransomware |
MITRE | a year ago | TeleBots are back: Supply‑chain attacks against Ukraine | WeLiveSecurity |
MITRE | a year ago | APT Trends report Q2 2017 |