Common Information
Type Value
Value
plink.exe
Category
Type File
Misp Type
Description
Details Published Attributes CTI Title
Details Website 2024-09-23 120 Inside SnipBot: The Latest RomCom Malware Variant
Details Website 2024-09-01 62 Case: LNK File-WinRM
Details Pdf 2024-01-04 21 NoJustice Wiper
Details Pdf 2023-11-23 147 Threat Advisory
Details Pdf 2023-11-09 1572 Modern Asian APT Groups
Details Website 2023-10-19 77 Crambus: New Campaign Targets Middle Eastern Government
Details Website 2023-08-24 21 Lazarus Group's infrastructure reuse leads to discovery of new malware
Details Website 2023-07-11 5 UNKNOWN
Details Website 2023-05-30 64 Void Rabisu’s Use of RomCom Backdoor Shows a Growing Shift in Threat Actors’ Goals
Details Website 2023-05-30 66 Void Rabisu’s Use of RomCom Backdoor Shows a Growing Shift in Threat Actors’ Goals
Details Website 2022-12-08 93 DeathStalker targets legal entities with new Janicab variant
Details Pdf 2022-08-25 116 Macintosh HD:Users:Shared:dd:4work:Bitdefender-PR-Whitepaper-BADHATCH-creat5237-en_EN:Bitdefender-PR-Whitepaper-BADHATCH-creat5237-en_EN.indd
Details Website 2022-08-09 58 Novel News on Cuba Ransomware: Greetings From Tropical Scorpius
Details Website 2022-07-26 38 Malicious IIS extensions quietly open persistent backdoors into servers - Microsoft Security Blog
Details Pdf 2022-06-07 165 | People’s Republic of China State-Sponsored Cyber Actors Exploit Network Providers and Devices
Details Website 2022-06-06 51 Will the Real Msiexec Please Stand Up? Exploit Leads to Data Exfiltration
Details Website 2022-05-26 44 Janicab Series: Further Steps in the Infection Chain
Details Pdf 2022-04-19 76 Microsoft Word - Blackcat_FLASH_FINAL 04192022
Details Website 2021-12-02 125 Magnat campaigns use malvertising to deliver information stealer, backdoor and malicious Chrome extension
Details Website 2021-11-15 93 Exchange Exploit Leads to Domain Wide Ransomware
Details Website 2021-09-03 6 Dissecting Sodinokibi Ransomware Attacks: Bringing Incident Response and Intelligence Together in the Fight
Details Website 2021-08-14 51 Creating an undetectable custom SSH backdoor in Python [A – Z] | Infosec Resources
Details Website 2020-03-16 76 Pen Testing Tools Cheat Sheet
Details Website 2019-01-24 7 Bypassing Network Restrictions Through RDP Tunneling | Mandiant
Details Website 2018-01-26 80 Windows Privilege Escalation Guide