ID | Votes | Profile Description |
---|
ID | Type | Votes | Profile Description |
---|---|---|---|
No associations to display |
ID | Type | Votes | Profile Description |
---|---|---|---|
Winnti | Unspecified | 1 | Winnti is a sophisticated threat actor group, first identified by Kaspersky in 2013, with activities dating back to at least 2007. The group has been associated with the Chinese nation-state and is part of a collective known as APT41, which also includes subgroups like Wicked Panda, Suckfly, and Bar |
APT41 | Unspecified | 1 | APT41, also known as Winnti, Wicked Panda, and Wicked Spider, is a sophisticated threat actor attributed to China. This group has been active since at least 2012, targeting organizations across 14 countries. The group is known for its extensive use of various code families and tools, with at least 4 |
ID | Type | Votes | Profile Description |
---|---|---|---|
Winnti Apt41 | Unspecified | 1 | None |
Source | CreatedAt | Title |
---|---|---|
MITRE | a year ago | COVID-19 and New Year greetings: an investigation into the tools and methods used by the Higaisa group |
MITRE | a year ago | Return of the Higaisa APT | Zscaler Blog |
MITRE | a year ago | New LNK attack tied to Higaisa APT discovered | Malwarebytes Labs |
CERT-EU | a year ago | Higaisa or Winnti? APT41 backdoors, old and new |