ID | Votes | Profile Description |
---|---|---|
Zeus | 4 | Zeus is a type of malware, short for malicious software, designed to exploit and damage computers or devices. It infiltrates systems through suspicious downloads, emails, or websites, often unbeknownst to the user. Once inside, Zeus can steal personal information, disrupt operations, or even hold da |
P2P ZeuS | 1 | None |
Goz | 1 | None |
ID | Type | Votes | Profile Description |
---|---|---|---|
cryptolocker | Unspecified | 3 | CryptoLocker is a type of malware, specifically ransomware, that emerged as a significant threat to cybersecurity worldwide. This malicious software infiltrated systems through suspicious downloads, emails, or websites, often unbeknownst to the user. Once inside a system, CryptoLocker encrypted user |
Dridex | Unspecified | 2 | Dridex is a well-known malware, specifically a banking Trojan, that has been utilized by cybercriminals to exploit and damage computer systems. The malware infiltrates systems through dubious downloads, emails, or websites, often unbeknownst to the user, and can steal personal information, disrupt o |
Emotet | Unspecified | 1 | Emotet is a highly dangerous and insidious malware that has resurfaced with increased activity this summer. Originally distributed via email attachments, it infiltrates systems often without the user's knowledge, forming botnets under the control of criminals for large-scale attacks. Once infected, |
TrickBot | Unspecified | 1 | TrickBot is a notorious form of malware that infiltrates systems to exploit and damage them, often through suspicious downloads, emails, or websites. Once it has breached a system, TrickBot can steal personal information, disrupt operations, and even hold data hostage for ransom. It has been linked |
ID | Type | Votes | Profile Description |
---|---|---|---|
Evil Corp | Unspecified | 2 | Evil Corp, a threat actor group based in Russia, has been identified as a significant cybercrime entity responsible for the execution of malicious actions. The alleged leader of this group is Maksim Yakubets, who is notably associated with Dridex malware operations. The U.S. Treasury imposed sanctio |
ID | Type | Votes | Profile Description |
---|---|---|---|
Gozi Neverquest | Unspecified | 1 | None |
Source | CreatedAt | Title |
---|---|---|
CERT-EU | a year ago | Emotet Rises Again: Evades Macro Security via OneNote Attachments |
Krebs on Security | a year ago | U.S., U.K. Sanction 7 Men Tied to Trickbot Hacking Group |
Recorded Future | a year ago | Dark Covenant 2.0: Cybercrime, the Russian State, and War in Ukraine | Recored Future |
CERT-EU | a year ago | How the ZeuS Trojan Info Stealer Changed Cybersecurity |
CERT-EU | a year ago | What Is Domain Generation Algorithm? Definition and Role in Malware Attacks |
MITRE | a year ago | Treasury Sanctions Evil Corp, the Russia-Based Cybercriminal Group Behind Dridex Malware |
CERT-EU | 7 months ago | Behind the Scenes of Matveev's Ransomware Empire: Tactics and Team |
MITRE | a year ago | Dridex (Bugat v5) Botnet Takeover Operation |
CERT-EU | 10 months ago | How the FBI Fights Back Against Worldwide Cyberattacks |
GovCERT CH | a year ago | Detecting And Mitigating GameOver ZeuS (GOZ) |
CERT-EU | 4 months ago | Heimdal’s 10th Anniversary - Our Finest Hours |