Alias Description | Votes |
---|---|
Syssphinx is a possible alias for FIN8. Syssphinx, also known as FIN8, is a threat actor that has been active since 2016. This group is known for taking extended breaks between attack campaigns to refine its tactics, techniques, and procedures (TTPs). For instance, Syssphinx had used backdoor malware called Badhatch in attacks since 2019, | 5 |
Alphv is a possible alias for FIN8. Alphv, also known as BlackCat, is a threat actor group that has been linked to numerous cyberattacks, particularly targeting the healthcare sector. The group made headlines when it stole 5TB of data from Morrison Community Hospital, causing significant disruption and raising concerns about patient p | 4 |
Noberus is a possible alias for FIN8. Noberus, also known as ALPHV or BlackCat, is a significant threat actor in the cybersecurity landscape. The group, which primarily operates a ransomware-as-a-service (RaaS) model, was the second most active ransomware group in April 2023, responsible for 14% of total observed victims. Originating fr | 3 |
White Rabbit is a possible alias for FIN8. White Rabbit is a notable threat actor in the cybersecurity landscape, known for its malicious activities and association with other prominent hacking groups. The group's name, derived from the character in Alice's Adventures in Quantum Wonderland, signifies its unique approach to cyber attacks. In | 2 |
Alias Description | Association Type | Votes |
---|---|---|
The Sardonic Malware is associated with FIN8. Sardonic is a sophisticated piece of malware, or malicious software, first identified in 2021. It was designed to exploit and damage computer systems, often infiltrating without the user's knowledge through suspicious downloads, emails, or websites. The malware could disrupt operations, steal person | Unspecified | 5 |
The Ragnar Locker Malware is associated with FIN8. Ragnar Locker is a type of malware, specifically ransomware, known for its destructive impact on computer systems. It infiltrates systems primarily through suspicious downloads, emails, or websites, and once inside, it can steal personal information, disrupt operations, or hold data hostage for rans | Unspecified | 2 |
The PUNCHTRACK Malware is associated with FIN8. Punchtrack is a malicious software (malware) utilized by the cybercrime group FIN8 to exploit and damage computer systems, particularly Point-of-Sale (PoS) systems. This malware infiltrates systems through dubious downloads, emails, or websites, often unbeknownst to the user, with the intent to stea | Unspecified | 2 |
The BADHATCH Malware is associated with FIN8. Badhatch is a backdoor malware that has been in use since 2019, primarily by the cybercriminal group known as Syssphinx. The malware is designed to exploit and damage computer systems, often infiltrating them through suspicious downloads, emails, or websites without the user's knowledge. Once inside | Unspecified | 2 |
Alias Description | Association Type | Votes |
---|---|---|
The CVE-2023-3519 Vulnerability is associated with FIN8. CVE-2023-3519 is a critical remote code execution vulnerability that has affected Citrix's NetScaler ADC and NetScaler Gateway products. The vulnerability, which was given a severity rating of 9.8 out of 10 on the CVSS vulnerability scale, allows an attacker to exploit a flaw in software design or i | Unspecified | 4 |
Preview | Source Link | CreatedAt | Title |
---|---|---|---|
MITRE | a year ago | ||
CERT-EU | 9 months ago | ||
CERT-EU | 9 months ago | ||
Recorded Future | 10 months ago | ||
CERT-EU | a year ago | ||
CERT-EU | a year ago | ||
MITRE | a year ago | ||
MITRE | a year ago | ||
CERT-EU | a year ago | ||
CERT-EU | a year ago | ||
CERT-EU | a year ago | ||
CERT-EU | a year ago | ||
SecurityIntelligence.com | a year ago | ||
CERT-EU | a year ago | ||
Checkpoint | a year ago | ||
CERT-EU | a year ago | ||
CERT-EU | a year ago | ||
CERT-EU | a year ago | ||
CERT-EU | a year ago | ||
DARKReading | a year ago |