Alias Description | Votes |
---|---|
Nightdoor is a possible alias for Mgbot. Nightdoor is a sophisticated malware developed by the threat group Evasive Panda. This malicious software, designed to exploit and damage computer systems, was first detected in 2022 alongside MgBot, another custom implant developed by the same group. The primary function of Nightdoor is to infiltra | 4 |
MacMa is a possible alias for Mgbot. Macma is a malware, first detailed by Google in 2021, that has been used since at least 2019. It is a modular backdoor that supports multiple functionalities such as device fingerprinting, executing commands, screen capture, keylogging, audio capture, and uploading and downloading files. Macma, ofte | 4 |
Pocostick is a possible alias for Mgbot. Pocostick, also known as MGBot, is a type of malware that exploits and damages computer systems. This malicious software infiltrates systems through suspicious downloads, emails, or websites, often unbeknownst to the user. Once inside, it can steal personal information, disrupt operations, or even h | 2 |
Alias Description | Association Type | Votes |
---|---|---|
The Evasive Panda Threat Actor is associated with Mgbot. Evasive Panda, also known as StormBamboo, Daggerfly, or Bronze Highland, is a threat actor group linked to China that has been operating since at least 2012. The group primarily focuses on cyber espionage against civil society targets and has demonstrated significant technical capabilities. They hav | Unspecified | 5 |
The Daggerfly Threat Actor is associated with Mgbot. DaggerFly, also known as Evasive Panda and StormBamboo, is a Chinese-speaking Advanced Persistent Threat (APT) group that has been active since at least 2012. The group is recognized for its cyber espionage activities against individuals and organizations in mainland China, Hong Kong, Macao, Nigeria | Unspecified | 4 |
The Bronze Highland Threat Actor is associated with Mgbot. Bronze Highland, also known as Evasive Panda and Daggerfly, is a China-linked Advanced Persistent Threat (APT) group that has been active since at least 2012. The group primarily conducts cyber espionage against individuals in mainland China, Hong Kong, Macao, and Nigeria, as well as certain organiz | Unspecified | 3 |
Preview | Source Link | CreatedAt | Title |
---|---|---|---|
DARKReading | a month ago | ||
InfoSecurity-magazine | a month ago | ||
ESET | a month ago | ||
Securityaffairs | 2 months ago | ||
DARKReading | 4 months ago | ||
InfoSecurity-magazine | 4 months ago | ||
Securityaffairs | 4 months ago | ||
Securityaffairs | 4 months ago | ||
DARKReading | 4 months ago | ||
InfoSecurity-magazine | 4 months ago | ||
BankInfoSecurity | 4 months ago | ||
CERT-EU | 9 months ago | ||
CERT-EU | 9 months ago | ||
CERT-EU | 9 months ago | ||
CERT-EU | 9 months ago | ||
CERT-EU | 9 months ago | ||
InfoSecurity-magazine | 9 months ago | ||
CERT-EU | 9 months ago | ||
DARKReading | 9 months ago | ||
CERT-EU | a year ago |