Alias Description | Votes |
---|---|
APT41 is a possible alias for Winnti Group. APT41, also known as Winnti, is a threat actor suspected to be originating from China, with its activities dating back to as early as 2012. It has targeted organizations in at least 14 countries and has been associated with the use of at least 46 different code families and tools. The group's activi | 3 |
Calypso is a possible alias for Winnti Group. Calypso is a recognized threat actor, likely linked to the Chinese state-sponsored group APT41. Other groups possibly connected to this network include Hafnium, LuckyMouse, Tick, Calypso, and Winnti Group (tracked by X-Force as Hive0088). Calypso has been associated with various malicious activities | 3 |
LuckyMouse is a possible alias for Winnti Group. LuckyMouse, also known as Budworm, Emissary Panda, and APT27, is a threat actor that has been involved in several high-profile cyber-espionage activities. The group has demonstrated its ability to develop and deploy advanced cyber tools, targeting various operating systems including MacOS, Linux, an | 2 |
Alias Description | Association Type | Votes |
---|---|---|
The ShadowPad Malware is associated with Winnti Group. ShadowPad is a sophisticated malware, known for its modular backdoor capabilities, that has been popular among Chinese threat actors for over seven years. It is designed to infiltrate systems often through suspicious downloads, emails, or websites, and once inside, it can steal personal information, | Unspecified | 2 |
The PipeMon Malware is associated with Winnti Group. PipeMon is a sophisticated, modular backdoor malware discovered in February 2020. It is attributed to the Winnti Group, known for their cyber espionage activities. This malware uses multiple named pipes for inter-module communication, hence its name "PipeMon". Its first stage consists of a password- | Unspecified | 2 |
Alias Description | Association Type | Votes |
---|---|---|
The Winnti Threat Actor is associated with Winnti Group. Winnti is a threat actor group known for its malicious activities, primarily originating from Chinese Advanced Persistent Threat (APT) operational infrastructure. The group, which has been active since at least 2007, was first spotted by Kaspersky in 2013. It is associated with several aliases such | Unspecified | 5 |
Preview | Source Link | CreatedAt | Title |
---|---|---|---|
CERT-EU | a year ago | ||
Securityaffairs | 5 months ago | ||
CERT-EU | 9 months ago | ||
Unit42 | 9 months ago | ||
CERT-EU | 10 months ago | ||
SecurityIntelligence.com | a year ago | ||
CERT-EU | a year ago | ||
CERT-EU | a year ago | ||
DARKReading | a year ago | ||
CERT-EU | a year ago | ||
MITRE | 2 years ago | ||
MITRE | 2 years ago | ||
MITRE | 2 years ago | ||
MITRE | 2 years ago | ||
MITRE | 2 years ago | ||
MITRE | 2 years ago | ||
CERT-EU | 2 years ago | ||
CERT-EU | 2 years ago |