Common Information
Type Value
Value
mshta.exe
Category
Type File
Misp Type
Description
Details Published Attributes CTI Title
Details Website 2024-09-09 11 TODDLERSHARK: ScreenConnect Vulnerability Exploited to Deploy BABYSHARK Variant
Details Website 2024-09-06 147 Gamaredon’s Spear-Phishing Assault On Ukraine’s Military - Cyble
Details Website 2024-09-06 2 Red team tool ‘MacroPack’ abused in attacks to deploy Brute Ratel
Details Website 2024-09-06 35 每周高级威胁情报解读(2024.09.06~09.12)
Details Website 2024-09-03 45 Threat actors using MacroPack to deploy Brute Ratel, Havoc and PhantomCore payloads
Details Website 2024-09-03 45 Threat actors using MacroPack to deploy Brute Ratel, Havoc and PhantomCore payloads
Details Website 2024-09-03 176 Unraveling SloppyLemming’s operations across South Asia
Details Website 2024-09-02 2 2024-08-22 PEAKLIGHT Stealthy Memory-Only Malware Samples
Details Website 2024-09-02 3 PEAKLIGHT Dropper: Hackers Target Windows With Downloads
Details Website 2024-08-30 17 Snake Keylogger Attack Windows Using Weaponized Excel Doc
Details Website 2024-08-29 6 New Snake Keylogger Variant Slithers Into Phishing Campaigns
Details Website 2024-08-28 4 LummaC2 Infostealer Resurfaces With Obfuscated PowerShell Tactics
Details Website 2024-08-28 27 Deep Analysis of Snake Keylogger’s New Variant | FortiGuard Labs
Details Website 2024-08-27 49 Exposed and Encrypted: Inside a Mallox Ransomware Attack
Details Website 2024-08-27 1 PEAKLIGHT Malware Detection: New Stealthy Downloader Leveraged in Attacks Against Windows Systems - SOC Prime
Details Website 2024-08-27 18 PUABundler:Win32/DriverPack Analysis & Removal Guide – Gridinsoft Blog
Details Website 2024-08-26 38 Kimsuky A Gift That Keeps on Giving
Details Website 2024-08-23 1 PEAKLIGHT Downloader Deployed in Attacks Targeting Windows with Malicious Movie Downloads
Details Website 2024-08-23 94 PEAKLIGHT: Decoding the Stealthy Memory-Only Malware | Google Cloud Blog
Details Website 2024-08-20 17 Adversary at the Door - Initial Access and what's currently on the menu | JUMPSEC LABS
Details Website 2024-08-12 5 MonikerLink: Outlook's Achilles' Heel, Navigating the Perilous Waters…
Details Website 2024-08-12 6 Cyber Storm Unleashed: Unmasking STORM-0978's Exploitation of the…
Details Website 2024-07-25 59 How APT groups operate in Southeast Asia
Details Website 2024-06-24 126 Armageddon is more than a Grammy-nominated album
Details Website 2024-06-10 4 CVE-2024-4577 RCE in PHP CGI: Everything you need to know | Wiz Blog