Alias Description | Votes |
---|---|
REvil is a possible alias for Sodinokibi. REvil, also known as Sodinokibi, is a malicious software (malware) that operates on a Ransomware as a Service (RaaS) model. This model became increasingly popular in 2020, with first-stage malware like Dridex and Gootkit being linked to ransomware attacks such as BitPaymer and REvil respectively. Th | 10 |
Maze is a possible alias for Sodinokibi. Maze is a form of malicious software, or malware, that pioneered a novel double-extortion tactic in the cyber threat landscape. Its modus operandi involves stealing victims' files before encrypting them, thereby enabling the threat actors to threaten both the disruption of operations and the release | 3 |
Gandcrab is a possible alias for Sodinokibi. GandCrab, a threat actor, is known for its malicious activities involving ransomware attacks. Originating from Russian origins and evolving from Team Truniger, a former GandCrab affiliate, the group has been linked to numerous ransomware variants including Bad Rabbit, LockBit 2.0, STOP/DJVU, and REv | 2 |
Sodin is a possible alias for Sodinokibi. Sodin, also known as Sodinokibi or REvil, is a sophisticated threat actor that emerged in the first half of 2019. This entity quickly drew attention due to its unique methods of distribution and attack. It exploited an Oracle Weblogic vulnerability to distribute itself and targeted Managed Service P | 2 |
Alias Description | Association Type | Votes |
---|---|---|
The Conti Malware is associated with Sodinokibi. Conti is a type of malware, specifically ransomware, which is designed to infiltrate and damage computer systems. This malicious software can enter systems through various methods such as suspicious downloads, emails, or websites, often without the user's knowledge. Once inside, it can steal persona | Unspecified | 3 |
The Ryuk Malware is associated with Sodinokibi. Ryuk is a type of malware known as ransomware, which has been utilized by the threat group ITG23 for several years. This group has been notorious for crypting their malware, with crypters seen in use with other malware such as Trickbot, Emotet, Cobalt Strike, and Ryuk. In 2019, most ransomware inves | Unspecified | 3 |
The Lockbit Malware is associated with Sodinokibi. LockBit is a prominent ransomware-as-a-service (RaaS) malware that has been involved in numerous cyberattacks, demonstrating its staying power and adaptability. The malware, which can infiltrate systems through suspicious downloads, emails, or websites, is designed to exploit and damage computers or | Unspecified | 3 |
The Netwalker Malware is associated with Sodinokibi. NetWalker is a highly profitable ransomware kit, known for its ability to disable antivirus software on Windows 10 systems and encrypt files, adding a random extension to the encrypted ones. Once executed, it disrupts operations and can even hold data hostage for ransom. It has been observed that Ne | Unspecified | 2 |
Alias Description | Association Type | Votes |
---|---|---|
The DarkSide Threat Actor is associated with Sodinokibi. DarkSide is a threat actor known for its malicious activities, primarily in the realm of ransomware attacks. One of their most notable exploits occurred on May 7, 2021, when they targeted Colonial Pipeline Co., a major player in the U.S. energy sector. The attack disrupted the gasoline supply across | Unspecified | 3 |
The Alphv Threat Actor is associated with Sodinokibi. Alphv, also known as BlackCat, is a threat actor group that has been linked to numerous cyberattacks, particularly targeting the healthcare sector. The group made headlines when it stole 5TB of data from Morrison Community Hospital, causing significant disruption and raising concerns about patient p | Unspecified | 2 |
Preview | Source Link | CreatedAt | Title |
---|---|---|---|
BankInfoSecurity | a month ago | ||
Securityaffairs | 5 months ago | ||
Krebs on Security | 7 months ago | ||
CERT-EU | a year ago | ||
BankInfoSecurity | 10 months ago | ||
CERT-EU | a year ago | ||
CERT-EU | 2 years ago | ||
MITRE | 2 years ago | ||
BankInfoSecurity | 10 months ago | ||
BankInfoSecurity | 7 months ago | ||
DARKReading | 8 months ago | ||
CERT-EU | 9 months ago | ||
CERT-EU | 10 months ago | ||
BankInfoSecurity | 10 months ago | ||
Flashpoint | 10 months ago | ||
BankInfoSecurity | 10 months ago | ||
CERT-EU | 10 months ago | ||
CERT-EU | 10 months ago | ||
CERT-EU | 10 months ago | ||
Krebs on Security | 10 months ago |