Alias Description | Votes |
---|---|
APT15 is a possible alias for Ke3chang. APT15, also known as Vixen Panda, Nickel, Flea, KE3CHANG, Royal APT, and Playful Dragon, is a threat actor group suspected to be of Chinese origin. The group targets global sectors including trade, economic and financial, energy, and military, aligning with the interests of the Chinese government. I | 2 |
Alias Description | Association Type | Votes |
---|---|---|
The Ketrican Malware is associated with Ke3chang. Ketrican is a type of malware, or malicious software, that was developed to exploit and damage computer systems. It's associated with the Ke3chang group and is known for its ability to infiltrate systems through suspicious downloads, emails, or websites. Once inside a system, Ketrican can steal pers | Unspecified | 2 |
Alias Description | Association Type | Votes |
---|---|---|
The Mustang Panda Threat Actor is associated with Ke3chang. Mustang Panda, a China-aligned Advanced Persistent Threat (APT) group, has been identified as a significant cyber threat actor involved in a series of malicious activities. Notably, Mustang Panda was found to be associated with the BRONZE PRESIDENT phishing lure, which delivered PlugX and used modif | Unspecified | 4 |
The APT27 Threat Actor is associated with Ke3chang. APT27, also known as Emissary Panda, is a threat actor group suspected to be affiliated with China. The group's primary objective is the theft of intellectual property, focusing on data and projects that make organizations competitive within their respective fields. APT27 has targeted multiple organ | Unspecified | 2 |
The APT30 Threat Actor is associated with Ke3chang. APT30, a threat actor suspected to be attributed to China, has been active since at least 2005. This group primarily targets members of the Association of Southeast Asian Nations (ASEAN). APT30 is notable for its sustained activity over an extended period and its ability to adapt and modify source c | Unspecified | 2 |
The APT31 Threat Actor is associated with Ke3chang. APT31, also known as Zirconium, is a threat actor believed to be working on behalf of China's Ministry of State Security in Wuhan. The group's primary mission, according to security vendors like Mandiant, involves gathering information from rival nations that could be of economic, military, and poli | Unspecified | 2 |
The GALLIUM Threat Actor is associated with Ke3chang. Gallium, also known as Alloy Taurus, is a China-aligned threat actor known for executing actions with malicious intent in the cyber domain. In recent years, Gallium has been associated with various significant cyber-espionage campaigns. The group targeted telecommunication entities in the Middle Eas | Unspecified | 2 |
Preview | Source Link | CreatedAt | Title |
---|---|---|---|
MITRE | 2 years ago | ||
CERT-EU | a year ago | ||
CERT-EU | a year ago | ||
BankInfoSecurity | a year ago | ||
CrowdStrike | a year ago | ||
CERT-EU | a year ago | ||
CERT-EU | a year ago | ||
CERT-EU | a year ago | ||
MITRE | 2 years ago | ||
Unit42 | 2 years ago | ||
CERT-EU | 2 years ago | ||
Securityaffairs | 2 years ago | ||
CERT-EU | a year ago | ||
DARKReading | a year ago | ||
ESET | a year ago |