Alias Description | Votes |
---|---|
Lizar is a possible alias for Tirion. Lizar, also known as Tirion or Diceloader, is a malicious software developed by the threat group ITG14. It's designed to exploit and damage computers or devices, infiltrating systems through suspicious downloads, emails, or websites. Once installed, it can steal personal information, disrupt operati | 4 |
Diceloader is a possible alias for Tirion. Diceloader is a type of malware, short for malicious software, that is designed to infiltrate and damage computer systems. It can infect systems through various means such as suspicious downloads, emails, or websites, often without the user's knowledge. Once inside a system, it can steal personal in | 4 |
FIN7 is a possible alias for Tirion. FIN7, also known as Carbanak, Carbon Spider, Cobalt Group, and Navigator Group, is a notorious cybercrime group that has been active since 2012. The group is recognized for its advanced combination of malware and social engineering tactics, having executed numerous successful attacks against global | 3 |
ITG14 is a possible alias for Tirion. ITG14, a threat actor identified in the cybersecurity industry, has recently been linked to malicious activities involving the Domino Backdoor. X-Force researchers have found substantial evidence connecting the Domino Backdoor to ITG14’s Carbanak Backdoor. The Domino Backdoor not only shares signifi | 2 |
Domino Backdoor is a possible alias for Tirion. The Domino Backdoor is a type of malware that has been linked to multiple threat groups, highlighting the complexity of tracking these actors and their operations. This malicious software, designed to exploit and damage computers or devices, can steal personal information, disrupt operations, or hol | 2 |
Alias Description | Association Type | Votes |
---|---|---|
The Domino Malware is associated with Tirion. Domino is a malicious software that infiltrated various systems, most notably IBM Domino Server and ESET Mail Security for IBM Domino, causing significant disruptions and data breaches. The malware was particularly potent due to its ability to exploit vulnerabilities in one system and trigger a domi | Unspecified | 3 |
Preview | Source Link | CreatedAt | Title |
---|---|---|---|
CERT-EU | 2 years ago | ||
SecurityIntelligence.com | 2 years ago | ||
SecurityIntelligence.com | 2 years ago | ||
Securityaffairs | 2 years ago | ||
DARKReading | 2 years ago |