Alias Description | Votes |
---|---|
Pikabot is a possible alias for TA577. Pikabot is a type of malware that serves as a trojan, providing initial access to infected computers. This enables the execution of ransomware deployments, remote takeovers, and data theft. It is part of a wider array of malicious software, including IcedID, Qakbot, Gozi, DarkGate, AsyncRAT, JinxLoa | 4 |
Alias Description | Association Type | Votes |
---|---|---|
The Qbot Malware is associated with TA577. Qbot, also known as Qakbot or Pinkslipbot, is a modular information stealer malware that first emerged in 2007 as a banking trojan. Its evolution has seen it become an advanced strain of malware used by multiple cybercriminal groups to prepare compromised networks for ransomware infestations. The fi | Unspecified | 5 |
The QakBot Malware is associated with TA577. Qakbot is a potent piece of malware, or malicious software, that infiltrates computer systems through suspicious downloads, emails, or websites. Once installed, it can steal personal information, disrupt operations, or even hold data hostage for ransom. This malware, built by various groups includin | Unspecified | 4 |
The Latrodectus Malware is associated with TA577. Latrodectus is a malicious software (malware) first discovered in late 2023, which has been gaining momentum among threat actors. Named after a string of code found during analysis, the malware is not a variant of IcedID but shares similar characteristics. This led researchers to conclude that both | Unspecified | 4 |
The IcedID Malware is associated with TA577. IcedID is a prominent malware that has been utilized in various cyber-attacks. It functions as a malicious software designed to infiltrate and damage computer systems, often through suspicious downloads, emails, or websites. Once inside a system, IcedID can steal personal information, disrupt operat | Unspecified | 2 |
Alias Description | Association Type | Votes |
---|---|---|
The Battleroyal Threat Actor is associated with TA577. BattleRoyal, a threat actor group, has been observed using a variety of attack channels to deliver the DarkGate remote access trojan (RAT). These include phishing emails, fake browser updates, traffic distribution systems (TDSs), malicious VBScript, steganography, and notably, a Windows SmartScreen | Unspecified | 2 |
Preview | Source Link | CreatedAt | Title |
---|---|---|---|
Recorded Future | 3 months ago | ||
Pulsedive | 5 months ago | ||
InfoSecurity-magazine | 6 months ago | ||
BankInfoSecurity | 7 months ago | ||
DARKReading | 7 months ago | ||
CERT-EU | 8 months ago | ||
CERT-EU | 8 months ago | ||
CERT-EU | 8 months ago | ||
CERT-EU | 8 months ago | ||
CERT-EU | 9 months ago | ||
Recorded Future | 9 months ago | ||
CSO Online | 2 years ago | ||
CERT-EU | a year ago | ||
CERT-EU | 10 months ago | ||
DARKReading | 10 months ago | ||
Malwarebytes | 10 months ago | ||
Malware-traffic-analysis.net | a year ago | ||
Malware-traffic-analysis.net | a year ago |