Alias Description | Votes |
---|---|
Putinkrab is a possible alias for LockBitSupp. Putinkrab, a threat actor, is known for its involvement in the development and use of highly successful ransomware strains. Emerging onto the scene in 2019, Putinkrab first appeared on Russian cybercrime forums such as XSS, Exploit, and UFOLabs, where they sold ransomware source code written in C. T | 2 |
Dmitry Yuryevich Khoroshev is a possible alias for LockBitSupp. Dmitry Yuryevich Khoroshev, a Russian national from Voronezh, has been identified as a significant threat actor in the cybersecurity landscape. Known by his alias "LockBitSupp," Khoroshev is allegedly the creator, developer, and administrator of LockBit, a notorious ransomware group. His real identi | 2 |
Lockbit Black is a possible alias for LockBitSupp. LockBit Black, also known as LockBit 3.0, is a malicious software that emerged in early 2022 following the release of its predecessor, LockBit 2.0 (or LockBit Red) in mid-2021. The malware has been developed to exploit and damage computer systems by encrypting files, often leading to ransom demands | 2 |
Alias Description | Association Type | Votes |
---|---|---|
The Lockbit Malware is associated with LockBitSupp. LockBit is a prominent ransomware-as-a-service (RaaS) malware that has been involved in numerous cyberattacks, demonstrating its staying power and adaptability. The malware, which can infiltrate systems through suspicious downloads, emails, or websites, is designed to exploit and damage computers or | is related to | 11 |
The Conti Malware is associated with LockBitSupp. Conti is a type of malware, specifically ransomware, which is designed to infiltrate and damage computer systems. This malicious software can enter systems through various methods such as suspicious downloads, emails, or websites, often without the user's knowledge. Once inside, it can steal persona | Unspecified | 2 |
The Clop Malware is associated with LockBitSupp. Clop, a malicious software (malware), is linked to a Russian-speaking cybercriminal group also known as Cl0p. It is designed to exploit and damage computer systems by stealing personal information, disrupting operations, or holding data hostage for ransom. In May 2023, the Clop group began exploitin | Unspecified | 2 |
The Conti Encryptor Malware is associated with LockBitSupp. Conti Encryptor is a type of malware, a malicious software designed to exploit and damage computer systems. It can infiltrate systems through various channels such as suspicious downloads, emails, or websites, often without the user's knowledge. Once it has gained access, Conti Encryptor can cause s | Unspecified | 2 |
Alias Description | Association Type | Votes |
---|---|---|
The Zeon Threat Actor is associated with LockBitSupp. Zeon, a known threat actor in the cybersecurity landscape, has been linked to several high-profile ransomware attacks. It was instrumental in crypting SVCReady and CargoBay loaders, observed in Quantum and Royal ransomware attacks respectively. Zeon has also employed third-party ransomware such as B | is related to | 2 |
The Blackmatter Threat Actor is associated with LockBitSupp. BlackMatter, a threat actor in the cybersecurity realm, is known for its malicious activities and has been linked to several ransomware strains. The group emerged as a successor to the DarkSide ransomware, which was responsible for the high-profile attack on the Colonial Pipeline in May 2021. Howeve | Unspecified | 2 |
The DarkSide Threat Actor is associated with LockBitSupp. DarkSide is a threat actor known for its malicious activities, primarily in the realm of ransomware attacks. One of their most notable exploits occurred on May 7, 2021, when they targeted Colonial Pipeline Co., a major player in the U.S. energy sector. The attack disrupted the gasoline supply across | Unspecified | 2 |
The FIN7 Threat Actor is associated with LockBitSupp. FIN7, also known as Carbanak, Carbon Spider, Cobalt Group, and Navigator Group, is a notorious cybercrime group that has been active since 2012. The group is recognized for its advanced combination of malware and social engineering tactics, having executed numerous successful attacks against global | Unspecified | 2 |
The Alphv Threat Actor is associated with LockBitSupp. Alphv, also known as BlackCat, is a threat actor group that has been linked to numerous cyberattacks, particularly targeting the healthcare sector. The group made headlines when it stole 5TB of data from Morrison Community Hospital, causing significant disruption and raising concerns about patient p | Unspecified | 2 |
Preview | Source Link | CreatedAt | Title |
---|---|---|---|
InfoSecurity-magazine | 4 days ago | ||
BankInfoSecurity | 2 months ago | ||
InfoSecurity-magazine | 3 months ago | ||
BankInfoSecurity | 3 months ago | ||
BankInfoSecurity | 4 months ago | ||
CERT-EU | 10 months ago | ||
DARKReading | 9 months ago | ||
Flashpoint | 5 months ago | ||
DARKReading | 5 months ago | ||
InfoSecurity-magazine | 5 months ago | ||
Securityaffairs | 5 months ago | ||
Securityaffairs | 5 months ago | ||
InfoSecurity-magazine | 6 months ago | ||
Securityaffairs | 7 months ago | ||
Checkpoint | 7 months ago | ||
Krebs on Security | 7 months ago | ||
Securityaffairs | 8 months ago | ||
Flashpoint | 8 months ago | ||
DARKReading | 8 months ago | ||
Securityaffairs | 8 months ago |