ID | Votes | Profile Description |
---|---|---|
Gh0st | 5 | Gh0st is a form of malware, or malicious software, that has been used in a variety of cyber attacks to exploit and damage computer systems. Notably, it was used in Operation Diplomatic Specter, where the Gh0st RAT (Remote Access Trojan) sample and Specter malware family were deployed. The malware co |
Gh0stcringe | 4 | Gh0stCringe is a variant of Gh0st RAT, a notorious malware that has been used in numerous cyber attacks. This malicious software is designed to exploit and damage computers or devices by infiltrating the system through suspicious downloads, emails, or websites, often unbeknownst to the user. Once in |
Sugargh0st | 3 | SugarGh0st is a malicious software (malware) variant first identified by Cisco Talos in November of the previous year. The malware, believed to be connected to China, has been deployed in cyberespionage campaigns primarily targeting the Ministry of Foreign Affairs in Uzbekistan and users in South Ko |
win32/farfli.cuo | 2 | Win32/Farfli.CUO is a highly malicious software, also known as malware, that has been specifically designed to exploit and damage computer systems. This particular strain of malware can infiltrate systems through various channels such as suspicious downloads, emails, or websites, often unbeknownst t |
Sainbox | 2 | Sainbox, also known as FatalRAT, is a variant of the Gh0st RAT trojan malware that has been increasingly deployed in cybercrime activities, particularly those associated with suspected Chinese cybercrime operations. Proofpoint researchers have observed over 30 separate campaigns leveraging this malw |
Fatalrat | 2 | FatalRAT, also known as Sainbox, is a variant of the Gh0st RAT malware that targets Windows platforms. Initially identified by Proofpoint in 2020, it has become popular with the PurpleFox threat actor group. Once infiltrated into a system, FatalRAT can log keystrokes and download and install additio |
Sugargh0st Rat | 2 | SugarGh0st RAT is a relatively new variant of the Gh0st RAT malware, first identified by researchers at Cisco Talos in November 2023. This Remote Access Trojan (RAT) has been used to carry out cyberespionage and surveillance campaigns against various targets, including government officials in Uzbeki |
win.noodlerat | 2 | Win.NOODLERAT is a malware variant that functions as a backdoor into infected systems, allowing unauthorized access and control. It is part of the Noodle RAT family, which has two versions: one for Windows (Win.NOODLERAT) and another for Linux (Linux.NOODLERAT). This malicious software infiltrates s |
ID | Type | Votes | Profile Description |
---|---|---|---|
Noodle RAT | Unspecified | 2 | Noodle RAT, also known as ANGRYREBEL or Nood RAT, is a new strain of malware that has been active since at least 2018. This malicious software, used by Chinese-speaking groups for espionage or cybercrime, was introduced in a Botconf 2024 presentation by Trend Micro Research. The Windows version of N |
win32/farfli.bur Gh0st Rat | Unspecified | 2 | None |
win32/farfli.cuo Gh0st Rat | Unspecified | 2 | The Win32/Farfli.CUO Gh0st RAT is a significant vulnerability that poses a threat to the security of Windows systems. It represents a flaw in software, design, or implementation that allows unauthorized access and control over affected systems. This variant of the Gh0st RAT (Remote Access Trojan) ha |
Mirai | Unspecified | 2 | Mirai is a type of malware that specifically targets Internet of Things (IoT) devices such as smart speakers, cameras, and connected home equipment. It exploits weak Telnet (port 23) and SSH (port 22) credentials to gain control over these devices. Once infected, these devices are then incorporated |
ID | Type | Votes | Profile Description |
---|---|---|---|
Iron Tiger | Unspecified | 3 | Iron Tiger, also known as Iron Taurus or APT27, is a threat actor group known for executing malicious actions with the intent of espionage. The group became prominent after its involvement in Operation Iron Tiger, which was reported in 2015. This operation was a series of Chinese cyber-espionage att |
APT1 | has used | 2 | APT1, also known as Unit 61398 or Comment Crew, is a notorious cyber-espionage group believed to be part of China's People's Liberation Army (PLA) General Staff Department's 3rd Department. This threat actor has been linked with several high-profile Remote Access Trojans (RATs), enabling them to tak |
ID | Type | Votes | Profile Description |
---|---|---|---|
A51a0bcce028966c4fcbb1581303980cf10669e0 templatex.txt win32/farfli.cuo Gh0st Rat | Unspecified | 2 | None |
Preview | Source Link | CreatedAt | Title |
---|---|---|---|
BankInfoSecurity | 2 months ago | Multiple Threat Actors Moving Quickly to Exploit PHP Flaw | |
Securityaffairs | 2 months ago | Multiple threat actors exploit PHP flaw CVE-2024-4577 to deliver malware | |
DARKReading | 3 months ago | 'SneakyChef' APT Slices Up Foreign Affairs With SugarGh0st | |
InfoSecurity-magazine | 3 months ago | Chinese Hackers Leveraging 'Noodle RAT' Backdoor | |
Trend Micro | 3 months ago | Noodle RAT Reviewing the New Backdoor Used by Chinese-Speaking Groups | |
Checkpoint | 3 months ago | 27th May – Threat Intelligence Report - Check Point Research | |
BankInfoSecurity | 4 months ago | Active Chinese Cyberespionage Campaign Rifling Email Servers | |
Unit42 | 4 months ago | Operation Diplomatic Specter: An Active Chinese Cyberespionage Campaign Leverages Rare Tool Set to Target Governmental Entities in the Middle East, Africa and Asia | |
DARKReading | 4 months ago | China APT Stole Geopolitical Secrets From Middle East, Africa & Asia | |
Securityaffairs | 4 months ago | Chinese actor 'Unfading Sea Haze' remained undetected for five years | |
BankInfoSecurity | 4 months ago | Unfading Sea Haze APT Targeting South China Sea Governments | |
BankInfoSecurity | 4 months ago | Hackers Target US AI Experts With Customized RAT | |
DARKReading | 4 months ago | US AI Experts Targeted in SugarGh0st RAT Campaign | |
Checkpoint | 5 months ago | Malware Spotlight: Linodas aka DinodasRAT for Linux - Check Point Research | |
Malwarebytes | 7 months ago | Malicious ads for restricted messaging applications target Chinese users | Malwarebytes | |
CERT-EU | 9 months ago | Suspected China-based hackers target Uzbekistan gov’t, South Koreans, Cisco says | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker | National Cyber Security Consulting | |
DARKReading | 9 months ago | A New, Spookier Gh0st RAT Malware Haunts Global Cyber Targets | |
CERT-EU | a year ago | New Report Uncovers 3 Distinct Clusters of China-Nexus Attacks on Southeast Asian Government | |
Unit42 | a year ago | Persistent Attempts at Cyberespionage Against Southeast Asian Government Target Have Links to Alloy Taurus | |
CERT-EU | a year ago | Sophisticated Phishing Campaign Targeting Chinese Users with ValleyRAT and Gh0st RAT | #cybercrime | #infosec | National Cyber Security Consulting |