Alias Description | Votes |
---|---|
APT27 is a possible alias for Iron Tiger. APT27, also known as Emissary Panda or Iron Taurus, is a threat actor suspected to be associated with China and has been involved in cyber operations primarily aimed at intellectual property theft. The group targets organizations globally, including those in North and South America, Europe, and the | 4 |
SysUpdate is a possible alias for Iron Tiger. SysUpdate is a malicious software (malware) predominantly utilized by the Budworm group, also known as APT27, Emissary Panda, LuckyMouse, among other names. This malware variant is designed to exploit and damage computer systems, often infiltrating through suspicious downloads, emails, or websites w | 4 |
Iron Taurus is a possible alias for Iron Tiger. Iron Taurus, also known as APT27, is a malware that has been linked to various cyber-espionage activities. This malicious software is designed to infiltrate systems surreptitiously through suspicious downloads, emails, or websites, and once inside, it can steal personal information, disrupt operatio | 3 |
Emissary Panda is a possible alias for Iron Tiger. Emissary Panda, also known as APT27, Iron Tiger, Bronze Union, Budworm, Lucky Mouse, and Red Phoenix, is a threat actor linked to China. This group has been involved in cyberespionage activities with the primary goal of stealing intellectual property from organizations in sectors that China perceive | 2 |
Alias Description | Association Type | Votes |
---|---|---|
The gh0st RAT Malware is associated with Iron Tiger. Gh0st RAT is a malicious software (malware) that has been in use for over 15 years. It is an open-source remote access tool known for exploiting vulnerabilities in systems, most notably the PHP flaw which it targeted within 24 hours of disclosure. This malware was observed as part of Operation Diplo | Unspecified | 3 |
The ASPXSpy Malware is associated with Iron Tiger. ASPXSpy is a type of malware, specifically a web shell, that has been used by various threat actors to exploit and damage computer systems. The earliest deployment attempts date back to 2022 when this malicious software was deployed to multiple hosted websites. It's typically installed on vulnerable | Unspecified | 2 |
Preview | Source Link | CreatedAt | Title |
---|---|---|---|
Checkpoint | 2 months ago | ||
InfoSecurity-magazine | 5 months ago | ||
Trend Micro | 5 months ago | ||
BankInfoSecurity | 6 months ago | ||
Unit42 | 6 months ago | ||
CERT-EU | a year ago | ||
Securityaffairs | a year ago | ||
Unit42 | a year ago | ||
Unit42 | a year ago | ||
CERT-EU | 2 years ago | ||
CERT-EU | a year ago | ||
CERT-EU | 2 years ago | ||
MITRE | 2 years ago | ||
MITRE | 2 years ago | ||
MITRE | 2 years ago | ||
Trend Micro | 2 years ago | ||
DARKReading | 2 years ago | ||
CERT-EU | 2 years ago | ||
Checkpoint | 2 years ago | ||
CERT-EU | 2 years ago |