ID | Votes | Profile Description |
---|---|---|
RIPTIDE | 1 | Riptide is a form of malware, or malicious software, that was utilized by the cyber espionage group known as APT12 from October 2012 to May 2014. This proxy-aware backdoor communicates via HTTP with a hard-coded command and control (C2) server. The initial communication with the C2 server fetches an |
ID | Type | Votes | Profile Description |
---|---|---|---|
Waterspout | Unspecified | 1 | Waterspout is a newly discovered malware, sharing traits with other malicious software such as RIPTIDE, HIGHTIDE, and THREEBYTE. It is an HTTP-based backdoor that communicates with its command and control (C2) server, infecting systems through phishing emails sent from valid but compromised accounts |
ID | Type | Votes | Profile Description |
---|---|---|---|
APT12 | Unspecified | 1 | APT12, also known as Calc Team, is a cyber espionage group believed to be connected to the Chinese People's Liberation Army. The group primarily targets journalists, government entities, and the defense industrial base. Their preferred method of attack is phishing emails sent from legitimate but com |
ID | Type | Votes | Profile Description |
---|---|---|---|
CVE-2012-0158 | Unspecified | 1 | CVE-2012-0158 is a significant vulnerability in the software design and implementation of Microsoft Office, specifically related to the parsing of Rich-text-format (.rtf) files. This flaw was first exploited in spear-phishing attacks where emails contained three different attachments, each exploitin |
Source | CreatedAt | Title |
---|---|---|
MITRE | a year ago | Darwin’s Favorite APT Group | Mandiant |