Alias Description | Votes |
---|---|
Pikabot is a possible alias for TA577. Pikabot is a malicious software (malware) that has been used extensively by various threat groups to exploit and damage computer systems. Initially, the BlackBasta group used phishing and vishing to deliver malware types such as DarkGate and Pikabot but quickly sought alternatives for further malici | 4 |
Alias Description | Association Type | Votes |
---|---|---|
The Qbot Malware is associated with TA577. Qbot, also known as Qakbot or Pinkslipbot, is a sophisticated malware that initially emerged in 2007 as a banking trojan. It has since evolved into an advanced strain used by various cybercriminal groups to infiltrate networks and prepare them for ransomware attacks. The first known use of an ITG23 | Unspecified | 5 |
The QakBot Malware is associated with TA577. Qakbot is a type of malware, or malicious software, that infiltrates computer systems to exploit and damage them. This harmful program can infect devices through suspicious downloads, emails, or websites, often without the user's knowledge. Once inside, it can steal personal information, disrupt ope | Unspecified | 4 |
The Latrodectus Malware is associated with TA577. Latrodectus, a harmful malware discovered in late 2023, has been gaining momentum among threat actors, with a significant increase in activity noted throughout February and March. This malicious software is being employed by initial access brokers (IABs) in email threat campaigns and uses MSI files | Unspecified | 4 |
The IcedID Malware is associated with TA577. IcedID is a malicious software (malware) that has been implicated in numerous cybercrime campaigns. It has been associated with other notable malware such as Qakbot, BazarLoader, CobaltStrike, Conti, Gozi, Trickbot, Quantum, Emotet, Pikabot, and SystemBC. Its distribution often involves the use of d | Unspecified | 2 |
Alias Description | Association Type | Votes |
---|---|---|
The Battleroyal Threat Actor is associated with TA577. BattleRoyal, a threat actor group, has been observed using a variety of attack channels to deliver the DarkGate remote access trojan (RAT). These include phishing emails, fake browser updates, traffic distribution systems (TDSs), malicious VBScript, steganography, and notably, a Windows SmartScreen | Unspecified | 2 |
Preview | Source Link | CreatedAt | Title |
---|---|---|---|
Recorded Future | 5 months ago | ||
Pulsedive | 6 months ago | ||
InfoSecurity-magazine | 8 months ago | ||
BankInfoSecurity | 8 months ago | ||
DARKReading | 8 months ago | ||
CERT-EU | 9 months ago | ||
CERT-EU | 9 months ago | ||
CERT-EU | 9 months ago | ||
CERT-EU | 9 months ago | ||
CERT-EU | a year ago | ||
Recorded Future | a year ago | ||
CSO Online | 2 years ago | ||
CERT-EU | a year ago | ||
CERT-EU | a year ago | ||
DARKReading | a year ago | ||
Malwarebytes | a year ago | ||
Malware-traffic-analysis.net | a year ago | ||
Malware-traffic-analysis.net | a year ago |