Common Information
Type Value
Value
Data Encrypted
Category Cmtmf-Attack-Pattern
Type Cmtmf-Attack-Pattern
Misp Type Cluster
Description TBD
Details Published Attributes CTI Title
Details Website 2020-12-01 0 Forensically Sound Cold System Analysis
Details Website 2020-11-19 2 Advanced Threat predictions for 2021
Details Website 2020-11-17 3 Ransomware attack forces web hosting provider Managed.com to take servers offline
Details Website 2020-09-15 0 Boosting Impact for Profit Evolving Ransomware Techniques for Targeted Attacks
Details Website 2020-08-03 36 McAfee Defender’s Blog: NetWalker | McAfee Blog
Details Website 2020-08-03 46 Take a "NetWalk" on the Wild Side | McAfee Blog
Details Website 2020-07-07 5 Clop, Clop! It's a TA505 HTML malspam analysis
Details Website 2020-06-18 76 Digging up InvisiMole’s hidden arsenal | WeLiveSecurity
Details Website 2020-06-17 27 AcidBox: Rare Malware Repurposing Turla Group Exploit Targeted Russian Organizations
Details Website 2020-06-11 25 マルウエアLODEINFOの進化 - JPCERT/CC Eyes
Details Website 2020-06-11 91 Return of the Higaisa APT | Zscaler Blog
Details Website 2020-06-09 39 RagnarLocker Ransomware Threatens to Release Confidential Information | McAfee Blog
Details Website 2020-05-09 29 Lazarus group leverages Covid themed HWP Document
Details Website 2020-05-07 1 ENS 10.7 Rolls Back the Curtain on Ransomware | McAfee Blog
Details Website 2020-04-20 39 WINNTI GROUP: Insights From the Past
Details Website 2020-03-18 0 France warns of new ransomware gang targeting local governments
Details Website 2020-02-20 14 日本国内の組織を狙ったマルウエアLODEINFO - JPCERT/CC Eyes
Details Website 2020-01-31 37 Winnti Group targeting universities in Hong Kong | WeLiveSecurity
Details Website 2020-01-29 0 DOD contractor suffers ransomware infection
Details Website 2019-10-28 126 SWEED Targeting Precision Engineering Companies in Italy
Details Website 2019-10-23 147 CyberThreatIntel/analysis.md at master · StrangerealIntel/CyberThreatIntel
Details Website 2019-10-10 41 ESET discovers Attor, a spy platform with curious GSM fingerprinting | WeLiveSecurity
Details Website 2019-10-10 13 Mahalo FIN7: Responding to the Criminal Operators’ New Tools and Techniques | Mandiant
Details Website 2019-10-03 23 COMpfun successor Reductor infects files on the fly to compromise TLS traffic | Securelist
Details Website 2019-09-09 39 ESET discovered an undocumented backdoor used by the infamous Stealth Falcon group | WeLiveSecurity