ID | Votes | Profile Description |
---|---|---|
APT15 | 2 | APT15, also known as Vixen Panda, Nickel, Flea, KE3CHANG, Royal APT, and Playful Dragon, is a threat actor group suspected to be of Chinese origin. The group targets global sectors including trade, economic and financial, energy, and military, aligning with the interests of the Chinese government. I |
ID | Type | Votes | Profile Description |
---|---|---|---|
Signal Plus Messenger | Unspecified | 2 | Signal Plus Messenger and FlyGram are malware variants of a sophisticated espionage tool named BadBazaar, believed to be orchestrated by a China-linked threat actor known as Gref. These malicious applications were distributed through the Google Play store, Samsung Galaxy Store, and specific websites |
Flygram | has used | 2 | FlyGram is a malicious software (malware) that first appeared on Google Play in July 2020 and was removed in January 2021. It was designed to exploit and damage users' devices by stealing sensitive data, including basic device information, contact lists, call logs, and Google Account data. The malwa |
Badbazaar | Unspecified | 2 | BadBazaar is a malicious software, or malware, employed by EvilBamboo, a threat actor group. This malware is part of three Android spyware families developed by the group, including BADBAZAAR, BADSIGNAL, and BADSOLAR. These are custom-built to target adversaries of the Chinese Communist Party (CCP). |
Preview | Source Link | CreatedAt | Title |
---|---|---|---|
Securityaffairs | 10 months ago | The largest Russian bank Sberbank hit by a massive DDoS attack | |
CERT-EU | 10 months ago | Burning Umbrella: An Intelligence Report on the Winnti Umbrella and Associated State-Sponsored Attackers | |
CERT-EU | a year ago | Delete these 2-fake messaging apps tied to China-aligned hacking group before your personal information is stolen | Technology | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker | National Cyber Security Consulting | |
CERT-EU | a year ago | New China-linked "BadBazaar" targets Android users via fake Signal, Telegram apps | |
Securityaffairs | a year ago | Security Affairs newsletter Round 435 by Pierluigi Paganini | |
CERT-EU | a year ago | BadBazaar Malware Attacking Android Users via Weaponized Telegram & Signal Apps | IT Security News | |
CERT-EU | a year ago | Cyber Security Week in Review: September 1, 2023 | |
CERT-EU | a year ago | BadBazaar Malware Attacking Android Users via Weaponized Telegram & Signal Apps | |
BankInfoSecurity | a year ago | Chinese APT Uses Fake Messenger Apps to Spy on Android Users | |
CERT-EU | a year ago | BadBazaar: Chinese Spyware Shams Signal, Telegram Apps | |
CERT-EU | a year ago | Trojanized Android messaging apps used for BadBazaar spyware distribution | |
CERT-EU | a year ago | Chinese Gref APT targets Android users via fake Signal and Telegram apps | |
CERT-EU | a year ago | Android-Malware: Badbazaar wurde im Google Play Store und Samsung-Store verteilt | |
DARKReading | a year ago | Chinese Group Spreads Android Spyware Via Trojan Signal, Telegram Apps | |
CERT-EU | a year ago | Chinese GREF APT distributes spyware via trojanized Signal and Telegram apps on Google Play and Samsung Galaxy stores | IT Security News | |
InfoSecurity-magazine | a year ago | Chinese APT Group GREF Use BadBazaar in Android Espionage | |
Securityaffairs | a year ago | Chinese GREF APT distributes spyware via trojanized Signal and Telegram apps on Google Play and Samsung Galaxy stores | |
CERT-EU | a year ago | BadBazaar espionage tool targets Android users via trojanized Signal and Telegram apps | |
CERT-EU | a year ago | China-Linked BadBazaar Android Spyware Targeting Signal and Telegram Users – GIXtools | |
CERT-EU | a year ago | Trojanized Signal and Telegram apps on Google Play delivered spyware |