Common Information
Type | Value |
---|---|
Value |
up.php |
Category | |
Type | File |
Misp Type | |
Description |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-11-01 | 291 | Identifying Traffic from Shell Finder Bots | ||
Details | Website | 2023-11-20 | 44 | Konni Campaign Distributed Via Malicious Document | FortiGuard Labs | ||
Details | Website | 2023-04-06 | 138 | Balada Injector: Synopsis of a Massive Ongoing WordPress Malware Campaign | ||
Details | Website | 2022-12-31 | 94 | Mass Scanning Android Malware Samples of 2022: A Brief Report | ||
Details | Website | 2022-07-20 | 36 | Cyber National Mission Force discloses IOCs from Ukrainian networks | ||
Details | Website | 2022-07-20 | 120 | Securonix Threat Labs Initial Coverage Advisory: STIFF#BIZON Detection Using Securonix – New Attack Campaign Observed Possibly Linked to Konni/APT37 (North Korea) | ||
Details | Website | 2022-04-21 | 64 | Warez users fell for Certishell - Avast Threat Labs | ||
Details | Website | 2022-02-21 | 59 | APT-C-28(ScarCruft)组织对韩国地区攻击活动分析 | ||
Details | Website | 2022-01-05 | 35 | New Konni Campaign Kicks Off the New Year by Targeting Russian Ministry of Foreign Affairs - Lumen | ||
Details | Website | 2021-08-20 | 43 | New variant of Konni malware used in campaign targetting Russia | ||
Details | Website | 2020-11-17 | 9 | 바이든 시대, ‘북한 비핵화 협상과 체제 안전 내용’ 담은 APT 공격 징후 발견 | ||
Details | Website | 2020-11-02 | 93 | Back to the Future: Inside the Kimsuky KGH Spyware Suite | ||
Details | Website | 2019-10-24 | 42 | 穷源溯流:KONNI APT组织伪装韩国Android聊天应用的攻击活动剖析 | ||
Details | Website | 2019-08-08 | 10 | InfoSec Handlers Diary Blog - SANS Internet Storm Center | ||
Details | Website | 2018-11-08 | 5 | Active Exploitation of Newly Patched ColdFusion Vulnerability (CVE-2018-15961) | Volexity | ||
Details | 2018-10-10 | 45 | TrendLabs | |||
Details | 2013-05-14 | 1066 | OPERATION HANGOVER |