Alias Description | Votes |
---|---|
Alphv is a possible alias for Trigona. Alphv, also known as BlackCat, is a threat actor group that has been linked to numerous cyberattacks, particularly targeting the healthcare sector. The group made headlines when it stole 5TB of data from Morrison Community Hospital, causing significant disruption and raising concerns about patient p | 5 |
Crylock is a possible alias for Trigona. CryLock is a form of malware, specifically ransomware, known for its capability to infiltrate systems and hold data hostage for ransom. This malicious software can infect systems through suspicious downloads, emails, or websites, often without the knowledge of the user. Once inside, CryLock can disr | 4 |
svchost.exe is a possible alias for Trigona. Svchost.exe, a malware, has been involved in several incidents of cyber-attacks over the years. Malware is a harmful software designed to infiltrate and damage computers or devices without the user's knowledge. It can be introduced into a system through suspicious downloads, emails, or websites. In | 2 |
Akira is a possible alias for Trigona. Akira is a potent ransomware that has been active since 2023, known for its aggressive encryption tactics and swift deployment. This malware, which brings a unique '80s aesthetic to the dark web, has quickly risen in prominence within the cybercrime landscape. It has targeted hundreds of victims glo | 2 |
Blackmatter is a possible alias for Trigona. BlackMatter, a threat actor in the cybersecurity realm, is known for its malicious activities and has been linked to several ransomware strains. The group emerged as a successor to the DarkSide ransomware, which was responsible for the high-profile attack on the Colonial Pipeline in May 2021. Howeve | 2 |
Alias Description | Association Type | Votes |
---|---|---|
The Lockbit Malware is associated with Trigona. LockBit is a prominent ransomware-as-a-service (RaaS) malware that has been involved in numerous cyberattacks, demonstrating its staying power and adaptability. The malware, which can infiltrate systems through suspicious downloads, emails, or websites, is designed to exploit and damage computers or | Unspecified | 2 |
The REvil Malware is associated with Trigona. REvil, also known as Sodinokibi, is a malicious software (malware) that operates on a Ransomware as a Service (RaaS) model. This model became increasingly popular in 2020, with first-stage malware like Dridex and Gootkit being linked to ransomware attacks such as BitPaymer and REvil respectively. Th | Unspecified | 2 |
Alias Description | Association Type | Votes |
---|---|---|
The DarkSide Threat Actor is associated with Trigona. DarkSide is a threat actor known for its malicious activities, primarily in the realm of ransomware attacks. One of their most notable exploits occurred on May 7, 2021, when they targeted Colonial Pipeline Co., a major player in the U.S. energy sector. The attack disrupted the gasoline supply across | Unspecified | 2 |
The Alphv Group Threat Actor is associated with Trigona. The Alphv group, a recognized threat actor in the cybersecurity landscape, has been involved in numerous malicious activities. Notably, they claimed responsibility for the hacking of Clarion, a global manufacturer of audio and video equipment for cars. This particular incident highlighted their capa | Unspecified | 2 |
Alias Description | Association Type | Votes |
---|---|---|
The vulnerability CVE-2021-40539 is associated with Trigona. | Unspecified | 3 |
The CVE-2023-22515 Vulnerability is associated with Trigona. CVE-2023-22515 is a critical Broken Access Control vulnerability discovered in October 2023, affecting the Confluence Data Center and Server. This flaw in software design or implementation allowed unauthenticated attackers to create unauthorized administrator accounts and gain access to Confluence i | Unspecified | 3 |
Preview | Source Link | CreatedAt | Title |
---|---|---|---|
Securityaffairs | 5 months ago | ||
Securityaffairs | 5 months ago | ||
Unit42 | a year ago | ||
CERT-EU | a year ago | ||
CERT-EU | a year ago | ||
Malwarebytes | a year ago | ||
CERT-EU | a year ago | ||
CERT-EU | a year ago | ||
CERT-EU | a year ago | ||
CERT-EU | a year ago | ||
CERT-EU | a year ago | ||
CERT-EU | a year ago | ||
CERT-EU | a year ago | ||
CERT-EU | a year ago | ||
BankInfoSecurity | a year ago | ||
BankInfoSecurity | a year ago | ||
CERT-EU | a year ago | ||
CERT-EU | a year ago | ||
CERT-EU | a year ago | ||
BankInfoSecurity | a year ago |