ID | Votes | Profile Description |
---|---|---|
Tortoiseshell | 2 | Tortoiseshell is a prominent threat actor associated with multiple Iranian Advanced Persistent Threat (APT) groups, including MASN. It has been linked to a multi-year cyberattack campaign that targeted over a dozen US companies and government entities, including the Department of the Treasury. The c |
Unc1549 | 2 | UNC1549, also known as Smoke Sandstorm and Tortoiseshell, is a suspected Iranian threat actor targeting the aerospace and defense sectors in the Middle East, specifically Israel and the United Arab Emirates. The group's activities have been discovered and tracked by Google Cloud’s Mandiant, who have |
Yellow Liderc | 2 | Yellow Liderc, also known as Imperial Kitten, Tortoiseshell, TA456, and Crimson Sandstorm, is a threat actor with malicious intent. This group has been active since 2022, engaging in cyber espionage against maritime, shipping, and logistics companies primarily in the Mediterranean region. Their meth |
Crimson Sandstorm | 2 | Crimson Sandstorm, an Advanced Persistent Threat (APT) group linked to Iran, has been identified as a significant threat actor in the cybersecurity landscape. This entity, potentially connected to the Islamic Revolutionary Guard Corps and active since at least 2017, targets victims across diverse se |
Ta456 | 1 | TA456, also known as Imperial Kitten, Tortoiseshell, and Crimson Sandstorm, is a threat actor believed to be based in Iran. This group has been implicated in various cyber-espionage activities, leveraging social engineering tactics and malware distribution to compromise their targets. In one notable |
Apt42 | 1 | APT42, also known as Charming Kitten, CharmingCypress, Mint Sandstorm, and TA453, is a threat actor associated with Iran. The group has been linked to the Islamic Revolutionary Guard Corps (IRGC) and is recognized for its use of sophisticated tactics, techniques, and procedures (TTPs), such as enhan |
Charming Kitten | 1 | Charming Kitten, an Iranian Advanced Persistent Threat (APT) group, also known as ITG18, Phosphorous, and TA453, is a significant cybersecurity threat. This threat actor has been associated with numerous malicious activities, exhibiting advanced and sophisticated social-engineering efforts. The grou |
ID | Type | Votes | Profile Description |
---|---|---|---|
No associations to display |
ID | Type | Votes | Profile Description |
---|---|---|---|
Tortoiseshell Group | Unspecified | 2 | None |
MuddyWater | Unspecified | 1 | MuddyWater is an advanced persistent threat (APT) group, also known as Earth Vetala, MERCURY, Static Kitten, Seedworm, and TEMP.Zagros. This threat actor has been linked to the Iranian Ministry of Intelligence and Security (MOIS) according to a joint advisory from cybersecurity firms. The group empl |
APT35 | Unspecified | 1 | APT35, also known as the Newscaster Team, Charming Kitten, and Mint Sandstorm, is an Iranian government-sponsored cyber espionage group. The group focuses on long-term, resource-intensive operations to collect strategic intelligence. They primarily target sectors in the U.S., Western Europe, and the |
Rocket Kitten | Unspecified | 1 | Rocket Kitten is a recognized threat actor in the cybersecurity world, known for its malicious activities. This group was particularly active in 2016, using domains such as yahoo-drive.signin-useraccount-mail.com and yahoo-reset.signin-useraccount-mail.com to execute their operations. The group's mo |
Marcella Flores | Unspecified | 1 | None |
Aquatic Panda | Unspecified | 1 | Aquatic Panda, also known as Budworm, Charcoal Typhoon, ControlX, RedHotel, and Bronze University, is a significant threat actor suspected of state-backed cyber espionage activities. This group has been particularly active in the recent quarter, ranking amongst the top geopolitical groups targeting |
ID | Type | Votes | Profile Description |
---|---|---|---|
No associations to display |
Source | CreatedAt | Title |
---|---|---|
CERT-EU | 5 months ago | 'Illusive' Iranian Hacking Group Ensnares Israeli, UAE Aerospace and Defense Firms | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker | National Cyber Security Consulting |
CERT-EU | 5 months ago | Iran hacking group impersonates defense firms, hostage campaigners | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker | National Cyber Security Consulting |
CERT-EU | 5 months ago | Report Says Iranian Hackers Targeting Israeli Defense Sector |
CERT-EU | 5 months ago | Middle East subjected to suspected Iranian state-backed cyberespionage attacks |
BankInfoSecurity | 5 months ago | Report Says Iranian Hackers Targeting Israeli Defense Sector |
DARKReading | 5 months ago | 'Illusive' Iranian Hacking Group Ensnares Israeli, UAE Aerospace and Defense Firms |
CERT-EU | 5 months ago | Iran hacking group impersonates defense firms, hostage campaigners |
CERT-EU | 5 months ago | Global AI Developers Need to Set Some Standards – Now |
DARKReading | 6 months ago | Iran's 'Cyber Centers' Dodge Sanctions to Sell Cyber Operations |
CERT-EU | 8 months ago | IMPERIAL KITTEN Deploys Novel Malware Families |
CrowdStrike | 8 months ago | IMPERIAL KITTEN Deploys Novel Malware Families |
CERT-EU | 8 months ago | Iranian hackers launch malware attacks on Israel’s tech sector |
CERT-EU | 9 months ago | Israel subjected to Charming Kitten attacks |
CERT-EU | 9 months ago | Ukraine's power grid targeted by Sandworm hackers last year |
CERT-EU | 9 months ago | Iran-Linked Imperial Kitten Cyber Group Targeting Middle East's Tech Sectors |
CERT-EU | 9 months ago | Iran’s role in Israel-Hamas war largely 'opportunistic' |
DARKReading | 9 months ago | Imperial Kitten APT Claws at Israeli Industry with Multiyear Spy Effort |
BankInfoSecurity | 9 months ago | Iranian Hackers Target Israeli Logistics and IT Companies |
InfoSecurity-magazine | 9 months ago | Iran-Affiliated Group Targets Israeli Firms Amid Israel-Hamas Conflict |