Alias Description | Votes |
---|---|
Iron Tiger is a possible alias for SysUpdate. Iron Tiger, also known as Iron Taurus or APT27, is a threat actor group believed to be aligned with China. The group has been involved in numerous cyber-espionage campaigns, targeting various entities including United States defense contractors and other international organizations. Their activities | 4 |
Emissary Panda is a possible alias for SysUpdate. Emissary Panda, also known as APT27, Iron Tiger, Bronze Union, Budworm, Lucky Mouse, and Red Phoenix, is a threat actor linked to China. This group has been involved in cyberespionage activities with the primary goal of stealing intellectual property from organizations in sectors that China perceive | 4 |
inicore_v2.3.30.dll is a possible alias for SysUpdate. The malware inicore_v2.3.30.dll is a harmful program designed to exploit and damage computer systems, often infiltrating them via suspicious downloads, emails, or websites without the user's knowledge. Once inside, it can steal personal information, disrupt operations, or even hold data hostage for | 3 |
APT27 is a possible alias for SysUpdate. APT27, also known as Emissary Panda or Iron Taurus, is a threat actor suspected to be associated with China and has been involved in cyber operations primarily aimed at intellectual property theft. The group targets organizations globally, including those in North and South America, Europe, and the | 3 |
LuckyMouse is a possible alias for SysUpdate. LuckyMouse, also known as Budworm, Emissary Panda, and APT27, is a threat actor that has been involved in several high-profile cyber-espionage activities. The group has demonstrated its ability to develop and deploy advanced cyber tools, targeting various operating systems including MacOS, Linux, an | 2 |
Alias Description | Association Type | Votes |
---|---|---|
The Budworm Threat Actor is associated with SysUpdate. Budworm, also known as LuckyMouse or APT 27, is a threat actor that has been associated with various high-profile cyber attacks. This group has been found to utilize tools such as the Korplug backdoor, which is commonly used by multiple Advanced Persistent Threats (APTs) including Budworm and APT41, | Unspecified | 2 |
Preview | Source Link | CreatedAt | Title |
---|---|---|---|
Checkpoint | 2 months ago | ||
Securityaffairs | a year ago | ||
CERT-EU | a year ago | ||
Checkpoint | a year ago | ||
CERT-EU | a year ago | ||
CERT-EU | a year ago | ||
InfoSecurity-magazine | a year ago | ||
CERT-EU | a year ago | ||
MITRE | 2 years ago | ||
MITRE | 2 years ago | ||
MITRE | 2 years ago | ||
Trend Micro | 2 years ago | ||
DARKReading | 2 years ago | ||
CERT-EU | 2 years ago | ||
CERT-EU | 2 years ago | ||
CERT-EU | 2 years ago | ||
Checkpoint | 2 years ago | ||
CERT-EU | 2 years ago |