Alias Description | Votes |
---|---|
Putinkrab is a possible alias for LockBitSupp. Putinkrab, a threat actor, is known for its involvement in the development and use of highly successful ransomware strains. Emerging onto the scene in 2019, Putinkrab first appeared on Russian cybercrime forums such as XSS, Exploit, and UFOLabs, where they sold ransomware source code written in C. T | 2 |
Dmitry Yuryevich Khoroshev is a possible alias for LockBitSupp. Dmitry Yuryevich Khoroshev, a Russian national from Voronezh, has been identified as a significant threat actor in the cybersecurity landscape. Known by his alias "LockBitSupp," Khoroshev is allegedly the creator, developer, and administrator of LockBit, a notorious ransomware group. His real identi | 2 |
Lockbit Black is a possible alias for LockBitSupp. LockBit Black, also known as LockBit 3.0, is a malicious software that emerged in early 2022 following the release of its predecessor, LockBit 2.0 (or LockBit Red) in mid-2021. The malware has been developed to exploit and damage computer systems by encrypting files, often leading to ransom demands | 2 |
Alias Description | Association Type | Votes |
---|---|---|
The Lockbit Malware is associated with LockBitSupp. LockBit is a malicious software, or malware, known for its damaging and exploitative functions. It infiltrates systems via dubious downloads, emails, or websites, often without the user's knowledge, and can steal personal information, disrupt operations, or hold data hostage for ransom. The LockBit | is related to | 11 |
The Conti Malware is associated with LockBitSupp. Conti is a type of malware, specifically ransomware, that infiltrates systems to exploit and damage them. Often spreading through suspicious downloads, emails, or websites, it can steal personal information, disrupt operations, or hold data hostage for ransom. Notably, Conti was linked to several ra | Unspecified | 2 |
The Clop Malware is associated with LockBitSupp. Clop, a malicious software (malware), is linked to a Russian-speaking cybercriminal group also known as Cl0p. It is designed to exploit and damage computer systems by stealing personal information, disrupting operations, or holding data hostage for ransom. In May 2023, the Clop group began exploitin | Unspecified | 2 |
Alias Description | Association Type | Votes |
---|---|---|
The Zeon Threat Actor is associated with LockBitSupp. Zeon, a known threat actor in the cybersecurity landscape, has been linked to several high-profile ransomware attacks. It was instrumental in crypting SVCReady and CargoBay loaders, observed in Quantum and Royal ransomware attacks respectively. Zeon has also employed third-party ransomware such as B | is related to | 2 |
The Blackmatter Threat Actor is associated with LockBitSupp. BlackMatter, a threat actor in the cybersecurity realm, is known for its malicious activities and has been linked to several ransomware strains. The group emerged as a successor to the DarkSide ransomware, which was responsible for the high-profile attack on the Colonial Pipeline in May 2021. Howeve | Unspecified | 2 |
The DarkSide Threat Actor is associated with LockBitSupp. DarkSide is a threat actor known for its malicious activities, primarily in the realm of ransomware attacks. One of their most notable exploits occurred on May 7, 2021, when they targeted Colonial Pipeline Co., a major player in the U.S. energy sector. The attack disrupted the gasoline supply across | Unspecified | 2 |
The FIN7 Threat Actor is associated with LockBitSupp. FIN7, also known as Carbanak, Carbon Spider, Cobalt Group, and Navigator Group, is a notorious cybercrime group that has been active since 2012. The group is recognized for its advanced combination of malware and social engineering tactics, having executed numerous successful attacks against global | Unspecified | 2 |
The Alphv Threat Actor is associated with LockBitSupp. Alphv, also known as BlackCat, is a notable threat actor in the cybersecurity landscape. Originating from Russia, this cybercriminal group has been involved in multiple high-profile ransomware attacks, specifically targeting healthcare providers. They gained significant attention after stealing 5TB | Unspecified | 2 |
Preview | Source Link | CreatedAt | Title |
---|---|---|---|
BankInfoSecurity | 19 days ago | ||
InfoSecurity-magazine | 2 months ago | ||
BankInfoSecurity | 2 months ago | ||
BankInfoSecurity | 3 months ago | ||
CERT-EU | 9 months ago | ||
DARKReading | 8 months ago | ||
Flashpoint | 4 months ago | ||
DARKReading | 4 months ago | ||
InfoSecurity-magazine | 4 months ago | ||
Securityaffairs | 4 months ago | ||
Securityaffairs | 4 months ago | ||
InfoSecurity-magazine | 4 months ago | ||
Securityaffairs | 6 months ago | ||
Checkpoint | 6 months ago | ||
Krebs on Security | 6 months ago | ||
Securityaffairs | 6 months ago | ||
Flashpoint | 7 months ago | ||
DARKReading | 7 months ago | ||
Securityaffairs | 7 months ago | ||
InfoSecurity-magazine | 7 months ago |