ID | Votes | Profile Description |
---|---|---|
Remcos | 1 | Remcos is a software tool that can be utilized for both benign and malicious activities, including being part of cyberattacks. Recently, Remcos was identified as the most common payload in cyberattack campaigns observed by X-Force, often used by threat actors to exploit vulnerabilities. This tool ha |
ID | Type | Votes | Profile Description |
---|---|---|---|
Tsunami | Unspecified | 1 | The "Tsunami" malware, a malicious software designed to exploit and damage computer systems, has caused significant cybersecurity disruptions globally. This malware, whose variants include xmrigDeamon, Bioset, dns3, xmrigMiner, docker-update, dns, 64[watchdogd], 64bioset, 64tshd, armbioset, armdns, |
Cherry | Unspecified | 1 | Cherry is a malicious software, or malware, that has recently impacted Cherry Health, a Michigan-based healthcare provider. The malware infiltrated the system through unknown means, disrupting operations and causing a significant ransomware attack. This incident underscores the security challenges f |
Redline | Unspecified | 1 | RedLine is a malware designed to exploit and damage computer systems by stealing personal information, disrupting operations, or even holding data hostage for ransom. It has been identified as a favorite infostealer among threat actors selling logs through the marketplace 2easy, which also sells Rac |
Zebrocy | Unspecified | 1 | Zebrocy is a well-documented Trojan malware that infiltrates systems to gather specific system information. Once installed, it sends the collected data to its Command and Control (C2) server via an HTTP POST request. The Zebrocy variant also captures a screenshot of the victim's host and transmits i |
ID | Type | Votes | Profile Description |
---|---|---|---|
Nomadic Octopus | Unspecified | 3 | Nomadic Octopus, a suspected Russian Advanced Persistent Threat (APT) group, has been engaged in a cyber-espionage campaign known as Paperbug since 2020. The group infiltrated a Tajikistani carrier to spy on government officials and public service infrastructures, compromising government networks, i |
DustSquad | Unspecified | 3 | DustSquad, also known as Nomadic Octopus, is a notable threat actor that has been implicated in several cyber-espionage campaigns. Throughout 2018, DustSquad, along with other actors like IndigoZebra and Sofacy, targeted political entities in Central Asia using the Octopus malware. This was revealed |
Sofacy | Unspecified | 2 | Sofacy is a threat actor group that has been observed using multiple languages to create variants of the Zebrocy Trojan and Cannon. In one campaign, they relied heavily on filenames to lure victims into launching weaponized documents. The group packed only Delphi variants in an attempt to increase e |
APT28 | Unspecified | 2 | APT28, also known as Fancy Bear, is a threat actor linked to Russia and has been involved in numerous cyber espionage campaigns. The group is notorious for its sophisticated tactics, techniques, and procedures (TTPs). Recently, NATO and the EU formally condemned APT28's activities, acknowledging the |
Paperbug | Unspecified | 2 | Paperbug is a cyber-espionage campaign executed by a suspected Russian threat actor known as Nomadic Octopus, also referred to as DustSquad. The Swiss cybersecurity company Prodaft has released a report detailing the actions of this group, outlining their tactics, techniques, and procedures (TTPs). |
Frozenlake | Unspecified | 1 | Frozenlake, also known as APT28, Fancy Bear, Forest Blizzard, and several other names, is a threat actor believed to be sponsored by the Russian military. The group has been involved in numerous cyber-attacks, primarily targeting Ukraine's energy sector. Their modus operandi includes exploiting vuln |
ID | Type | Votes | Profile Description |
---|---|---|---|
No associations to display |
Source | CreatedAt | Title |
---|---|---|
CERT-EU | 9 months ago | Search | arXiv e-print repository |
CERT-EU | 9 months ago | Search | arXiv e-print repository |
CERT-EU | 10 months ago | Marvel vs. Capcom 3 Hackers Find Classic Spider-Man Villain In Game | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker | National Cyber Security Consulting |
CERT-EU | 10 months ago | The Media Are Targeting the Public for a War with China - Global Research |
CERT-EU | 10 months ago | Is Your Workforce Ready for Passwordless MFA? |
CERT-EU | 10 months ago | Practice of law: best examples in legal work |
CERT-EU | 10 months ago | Standout examples of in-house lawyers’ work |
CERT-EU | 10 months ago | Meet the top FT 20 in-house legal leaders |
CERT-EU | a year ago | Absolute Software expands application resilience ecosystem |
MITRE | a year ago | Picking Apart Remcos Botnet-In-A-Box |
CERT-EU | a year ago | Venture Capital Investments at Risk : DynaRisk Identifies Critical Cybersecurity Gaps in Companies Backed By Some Of London's Biggest VC Funds – Global Security Mag Online |
CERT-EU | a year ago | Expanding the scope of Cyber Incident Response (CIR) – GIXtools |
CERT-EU | a year ago | MOVEit hack: media watchdog Ofcom data downloaded in cyber attack – GIXtools |
CERT-EU | a year ago | SBOM Executive Order: Ready for the June 11th deadline? |
MITRE | a year ago | Russia-Linked Hackers Target Diplomatic Entities in Central Asia |
MITRE | a year ago | Octopus-infested seas of Central Asia |
CERT-EU | a year ago | How observability prevents developers from flying blind - SD Times |
CSO Online | a year ago | ForgeRock, Secret Double Octopus offer passwordless authentication for enterprises |
CERT-EU | a year ago | «Тактический осьминог» запустил свои щупальца в налоговую службу США |
CERT-EU | a year ago | What does the semiconductor industry need from the Government? |