Common Information
Type | Value |
---|---|
Value |
cve-2018-8453 |
Category | |
Type | Cve |
Misp Type | |
Description |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-08-12 | 2 | Sodinokibi | ||
Details | 2024-02-07 | 100 | Patterns and Targets for Ransomware Exploitation of Vulnerabilities: 2017–2023 | |||
Details | Website | 2023-06-13 | 961 | Known Exploited Vulnerabilities Catalog | CISA | ||
Details | 2023-03-02 | 72 | Behind the Breaches Mapping Threat Actors and Their CVE Exploits | |||
Details | Website | 2023-01-28 | 48 | REvil Ransomware-as-a-Service: An analysis of a ransomware affiliate… | ||
Details | Website | 2022-11-01 | 8 | APT trends report Q3 2022 | ||
Details | 2022-02-02 | 34 | The Rise and Imminent Fall of the N-Day Exploit Market in the Cybercriminal Underground | |||
Details | Website | 2021-12-20 | 51 | Ransomware Spotlight: REvil - Security News | ||
Details | Website | 2021-09-09 | 17 | LockBit 2.0: Ransomware Attacks Surge After Successful Affiliate Recruitment | ||
Details | 2021-09-02 | 73 | Title | |||
Details | Website | 2021-07-21 | 14 | This Chat is Being Recorded: Egregor Ransomware Negotiations Uncovered | ||
Details | 2021-07-13 | 35 | The Rise and Imminent Fall of the N-Day Exploit Market in the Cybercriminal Underground | |||
Details | Website | 2021-07-09 | 6 | REvil-ution - A Persistent Ransomware Operation | ||
Details | Website | 2021-06-25 | 13 | Deep analysis of REvil Ransomware | Written in Korean | ||
Details | Website | 2021-06-15 | 86 | Ransomware Double Extortion and Beyond: REvil, Clop, and Conti - Security News | ||
Details | Website | 2021-04-16 | 4 | Adversary Dossier: Ryuk Ransomware Anatomy of an Attack in 2021 | ||
Details | 2021-04-14 | 38 | Macintosh HD:Users:Shared:dd:4work:Bitdefender-TRR-Whitepaper-Maze-creat4351-en_EN:Bitdefender-TRR-Whitepaper-Maze-creat4351-en_EN.indd | |||
Details | 2021-03-02 | 229 | RANSOMWARE UNCOVERED 2020—2021 | |||
Details | Website | 2020-10-26 | 19 | Exploit Developer Spotlight: The Story of PlayBit - Check Point Research | ||
Details | Website | 2020-10-02 | 39 | Graphology of an Exploit - Hunting for exploits by looking for the author's fingerprints - Check Point Research | ||
Details | 2020-07-10 | 52 | |Sodinokibi | |||
Details | 2020-07-08 | 2403 | Threat Group Cards: A Threat Actor Encyclopedia | |||
Details | 2020-06-11 | 35 | Sodinokibi 勒索病毒利用 CVE-2018- 8453 发起攻击 传播 | |||
Details | 2019-12-23 | 22 | 2019年勒索病毒疫情分析报告 | |||
Details | Website | 2019-10-02 | 7 | McAfee ATR Analyzes Sodinokibi aka REvil Ransomware-as-a-Service - What The Code Tells Us | McAfee Blog |