Common Information
Type | Value |
---|---|
Value |
mshta.exe |
Category | |
Type | File |
Misp Type | |
Description |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-09-09 | 11 | TODDLERSHARK: ScreenConnect Vulnerability Exploited to Deploy BABYSHARK Variant | ||
Details | Website | 2024-09-06 | 147 | Gamaredon’s Spear-Phishing Assault On Ukraine’s Military - Cyble | ||
Details | Website | 2024-09-06 | 2 | Red team tool ‘MacroPack’ abused in attacks to deploy Brute Ratel | ||
Details | Website | 2024-09-06 | 35 | 每周高级威胁情报解读(2024.09.06~09.12) | ||
Details | Website | 2024-09-03 | 45 | Threat actors using MacroPack to deploy Brute Ratel, Havoc and PhantomCore payloads | ||
Details | Website | 2024-09-03 | 45 | Threat actors using MacroPack to deploy Brute Ratel, Havoc and PhantomCore payloads | ||
Details | Website | 2024-09-03 | 176 | Unraveling SloppyLemming’s operations across South Asia | ||
Details | Website | 2024-09-02 | 2 | 2024-08-22 PEAKLIGHT Stealthy Memory-Only Malware Samples | ||
Details | Website | 2024-09-02 | 3 | PEAKLIGHT Dropper: Hackers Target Windows With Downloads | ||
Details | Website | 2024-08-30 | 17 | Snake Keylogger Attack Windows Using Weaponized Excel Doc | ||
Details | Website | 2024-08-29 | 6 | New Snake Keylogger Variant Slithers Into Phishing Campaigns | ||
Details | Website | 2024-08-28 | 4 | LummaC2 Infostealer Resurfaces With Obfuscated PowerShell Tactics | ||
Details | Website | 2024-08-28 | 27 | Deep Analysis of Snake Keylogger’s New Variant | FortiGuard Labs | ||
Details | Website | 2024-08-27 | 49 | Exposed and Encrypted: Inside a Mallox Ransomware Attack | ||
Details | Website | 2024-08-27 | 1 | PEAKLIGHT Malware Detection: New Stealthy Downloader Leveraged in Attacks Against Windows Systems - SOC Prime | ||
Details | Website | 2024-08-27 | 18 | PUABundler:Win32/DriverPack Analysis & Removal Guide – Gridinsoft Blog | ||
Details | Website | 2024-08-26 | 38 | Kimsuky A Gift That Keeps on Giving | ||
Details | Website | 2024-08-23 | 1 | PEAKLIGHT Downloader Deployed in Attacks Targeting Windows with Malicious Movie Downloads | ||
Details | Website | 2024-08-23 | 94 | PEAKLIGHT: Decoding the Stealthy Memory-Only Malware | Google Cloud Blog | ||
Details | Website | 2024-08-20 | 17 | Adversary at the Door - Initial Access and what's currently on the menu | JUMPSEC LABS | ||
Details | Website | 2024-08-12 | 5 | MonikerLink: Outlook's Achilles' Heel, Navigating the Perilous Waters… | ||
Details | Website | 2024-08-12 | 6 | Cyber Storm Unleashed: Unmasking STORM-0978's Exploitation of the… | ||
Details | Website | 2024-07-25 | 59 | How APT groups operate in Southeast Asia | ||
Details | Website | 2024-06-24 | 126 | Armageddon is more than a Grammy-nominated album | ||
Details | Website | 2024-06-10 | 4 | CVE-2024-4577 RCE in PHP CGI: Everything you need to know | Wiz Blog |