ID | Votes | Profile Description |
---|
ID | Type | Votes | Profile Description |
---|---|---|---|
Pisloader | Unspecified | 1 | Pisloader is a malware family that has been identified and named by Palo Alto Networks. The malware is delivered via HTTP, with the payload contained within an executable file named lsm.exe. Once this file is written and executed, it activates the pisloader payload, which then starts to infect the s |
PlugX | Unspecified | 1 | PlugX is a notorious malware, typically associated with Chinese threat actors, that has been used in various cyberattacks. This malicious software infiltrates systems through suspicious downloads, emails, or websites and can steal personal information, disrupt operations, or hold data for ransom. It |
Aspxtool | Unspecified | 1 | ASPXTool is a type of malware, specifically a modified version of the ASPXSpy web shell. This malicious software is designed to infiltrate and exploit computer systems, often entering undetected through suspicious downloads, emails, or websites. Once inside a system, it can steal personal informatio |
ID | Type | Votes | Profile Description |
---|---|---|---|
Wekby | Unspecified | 1 | Wekby, also known as APT18, is a threat actor suspected to be based in China. This group has been actively involved in executing malicious activities for several years, targeting a wide range of sectors including Aerospace and Defense, Construction and Engineering, Education, Health and Biotechnolog |
ID | Type | Votes | Profile Description |
---|---|---|---|
CVE-2010-0738 | Unspecified | 1 | None |
CVE-2011-3544 | Unspecified | 1 | None |
Source | CreatedAt | Title |
---|---|---|
MITRE | a year ago | Threat Group-3390 Targets Organizations for Cyberespionage |
MITRE | a year ago | Emissary Panda – A potential new malicious tool |
MITRE | a year ago | BRONZE UNION Cyberespionage Persists Despite Disclosures |
MITRE | a year ago | New Wekby Attacks Use DNS Requests As Command and Control Mechanism |