ID | Votes | Profile Description |
---|---|---|
TrickBot | 5 | TrickBot is a notorious malware that has been used extensively by cybercriminals to exploit and damage computer systems. It operates as a crimeware-as-a-service platform, infecting systems through suspicious downloads, emails, or websites, often without the user's knowledge. Once inside, it can stea |
FIN12 | 2 | FIN12, also known as DEV-0237 and Pistachio Tempest, is a threat actor group notorious for its malicious cyber activities. Tracked by Microsoft, this group is primarily engaged in the distribution of Hive, Conti, and Ryuk ransomware. The group has been responsible for several high-profile ransomware |
Trickbot Group | 2 | The Trickbot Group, also known as ITG23, Wizard Spider, and DEV-0193, is a threat actor group notorious for its malicious activities. The group has been consistently analyzed by IBM Security X-Force researchers due to their development and use of several crypters. In the fall of 2020, efforts were m |
ITG23 | 2 | ITG23, also known as the Trickbot/Conti syndicate, is a significant threat actor that has been active since 2016 in the East European cybercrime arena. This group is renowned for its use of Reflective DLL Injection code in many of its crypters, with the presence of these crypters on a file sample be |
ID | Type | Votes | Profile Description |
---|---|---|---|
Conti | Unspecified | 4 | Conti is a notorious malware and ransomware operation that has caused significant damage to computer systems worldwide. The Conti group, believed to have around 200 employees, operated like a regular business, with internal communications revealing the organization's structure and operations. It was |
Ryuk | Unspecified | 3 | Ryuk is a type of malware known as ransomware, which has been utilized by the threat group ITG23 for several years. This group has been notorious for crypting their malware, with crypters seen in use with other malware such as Trickbot, Emotet, Cobalt Strike, and Ryuk. In 2019, most ransomware inves |
Preview | Source Link | CreatedAt | Title |
---|---|---|---|
BankInfoSecurity | 3 months ago | European Union Sanctions Russian State Hackers | |
CERT-EU | 6 months ago | Authorities Claim LockBit Admin "LockBitSupp" Has Engaged with Law Enforcement | #cybercrime | #infosec | National Cyber Security Consulting | |
MITRE | 9 months ago | Trickbot Rising — Gang Doubles Down on Infection Efforts to Amass Network Footholds | |
CERT-EU | 9 months ago | CyberTalk with Ray Canzanese | |
SecurityIntelligence.com | 10 months ago | ITG23 Crypters Highlight Cooperation Between Cybercriminal Groups | |
CERT-EU | 10 months ago | US sanctions Russian for cleaning Ryuk's and oligarchs' cash | |
CERT-EU | a year ago | Netskope Threat Labs report says highest percentage of cybercrime activity originates in Russia | |
CERT-EU | a year ago | Criminal groups focus on Australia and US | |
CERT-EU | a year ago | Malware increasingly spread through cloud apps | |
CERT-EU | a year ago | 11 alleged Conti criminals hit with UK and US sanctions | #ransomware | #cybercrime | National Cyber Security Consulting | |
CERT-EU | a year ago | US, UK sanction more Russians linked to Trickbot crime gang | |
MITRE | 2 years ago | Exposing initial access broker with ties to Conti | |
MITRE | 2 years ago | Wizard Spider Modifies and Expands Toolset [Adversary Update] | |
MITRE | 2 years ago | Bumblebee: New Loader Rapidly Assuming Central Position in Cyber-crime Ecosystem | |
MITRE | 2 years ago | Diavol - A New Ransomware Used By Wizard Spider? | Fortinet | |
MITRE | 2 years ago | Diavol Ransomware | |
Recorded Future | 2 years ago | Dark Covenant 2.0: Cybercrime, the Russian State, and War in Ukraine | Recored Future | |
CERT-EU | 2 years ago | Russian Hacker Pleads Guilty to Money Laundering Linked to Ryuk Ransomware | |
CERT-EU | 2 years ago | US, UK sanctions members of 'notorious cyber gang' TrickBot | |
Krebs on Security | 2 years ago | U.S., U.K. Sanction 7 Men Tied to Trickbot Hacking Group |