ID | Votes | Profile Description |
---|---|---|
TA551 | 2 | TA551, also known as Hive0106, Shathak, and UNC2420, is a financially motivated threat group that has been active in the cybercrime landscape. This threat actor has been linked to various malware distribution activities, including those involving QakBot, IcedID, Emotet, Bumblebee, Gozi, and other ma |
ID | Type | Votes | Profile Description |
---|---|---|---|
TrickBot | Unspecified | 2 | TrickBot is a notorious malware that has been used extensively by cybercriminals to exploit and damage computer systems. It operates as a crimeware-as-a-service platform, infecting systems through suspicious downloads, emails, or websites, often without the user's knowledge. Once inside, it can stea |
QakBot | Unspecified | 2 | Qakbot is a type of malware that has been linked to various cybercriminal activities, with its presence first observed as early as 2020. It gained notoriety for its role in the operations of the Black Basta ransomware group, which used Qakbot extensively in sophisticated phishing campaigns. The malw |
ID | Type | Votes | Profile Description |
---|---|---|---|
ITG23 | Unspecified | 2 | ITG23, also known as the Trickbot/Conti syndicate, is a significant threat actor that has been active since 2016 in the East European cybercrime arena. This group is renowned for its use of Reflective DLL Injection code in many of its crypters, with the presence of these crypters on a file sample be |
Preview | Source Link | CreatedAt | Title |
---|---|---|---|
MITRE | 9 months ago | Trickbot Rising — Gang Doubles Down on Infection Efforts to Amass Network Footholds | |
SecurityIntelligence.com | 10 months ago | ITG23 Crypters Highlight Cooperation Between Cybercriminal Groups |