| Alias Description | Votes |
|---|---|
| KONNI is a possible alias for Ta406. Konni is a malicious software (malware) linked to North Korea, specifically associated with the state-sponsored Kimsuky group. This advanced persistent threat (APT) has been active since at least 2021, focusing on high-profile targets such as the Russian Ministry of Foreign Affairs, the Russian Emba | 4 |
| Kimsuky is a possible alias for Ta406. Kimsuky is a threat actor group linked to North Korea, known for its malicious cyber activities with a particular focus on espionage. The group has been observed employing a variety of sophisticated tactics and techniques, including the use of malware such as TOGREASE, GREASE, and RandomQuery, which | 2 |
| Thallium is a possible alias for Ta406. Thallium, also known as Kimsuky, APT43, Velvet Chollima, and Black Banshee, is a significant threat actor that has been active since at least 2012. This group, believed to be operating on behalf of the North Korean regime, conducts intelligence collection and uses cybercrime to fund espionage activi | 2 |
| Konni Group is a possible alias for Ta406. The Konni Group, also known as TA406, is a threat actor believed to be associated with North Korean cyberespionage activities. According to cybersecurity firm DuskRise, the group has been involved in sophisticated cyberattacks, including one where they compromised a foreign ministry email account to | 2 |
| Preview | Source Link | CreatedAt | Title |
|---|---|---|---|
| Securityaffairs | 15 days ago | ||
| InfoSecurity-magazine | 6 months ago | ||
| CERT-EU | 2 years ago | ||
| BankInfoSecurity | 2 years ago | ||
| CERT-EU | 2 years ago | ||
| CERT-EU | 2 years ago | ||
| CERT-EU | 2 years ago | ||
| CERT-EU | 2 years ago |