ID | Votes | Profile Description |
---|---|---|
Ishak | 1 | Ishak is a threat actor that has been used in cyberattacks attributed to the group known as Rocket Kitten. This relationship became apparent around Fall 2015 when Rocket Kitten was the subject of multiple publications, and a shift in behavior was observed. The preference for Ishak scripts over anoth |
Rocket Kitten | 1 | Rocket Kitten is a recognized threat actor in the cybersecurity world, known for its malicious activities. This group was particularly active in 2016, using domains such as yahoo-drive.signin-useraccount-mail.com and yahoo-reset.signin-useraccount-mail.com to execute their operations. The group's mo |
Operation Saffron Rose | 1 | Operation Saffron Rose was a significant cyber threat operation executed by an Iranian threat actor group known as Flying Kitten. The operation, first systematically described in FireEye's report, focused on the deployment of malware to target and infiltrate the defense sector. These malicious activ |
Oyun | 1 | Oyun is identified as a threat actor, a term used in cybersecurity to denote an entity that executes actions with malicious intent. This entity has been linked to a set of tools and scripts named after an individual called Yaser Balaghi, including Gholee, Woolger, MPK, and Oyun itself. The shift in |
ID | Type | Votes | Profile Description |
---|---|---|---|
No associations to display |
ID | Type | Votes | Profile Description |
---|---|---|---|
No associations to display |
ID | Type | Votes | Profile Description |
---|---|---|---|
No associations to display |