Common Information
Type | Value |
---|---|
Value |
Data Encrypted |
Category | Cmtmf-Attack-Pattern |
Type | Cmtmf-Attack-Pattern |
Misp Type | Cluster |
Description | TBD |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2017-05-12 | 0 | You Hacked: Cyber-security and the Railways - London Reconnections | ||
Details | Website | 2017-04-28 | 5 | Emotet Changes TTPs and Arrives in United States | ||
Details | Website | 2017-04-26 | 31 | New variant of Geodo/Emotet banking malware targets UK | ||
Details | Website | 2017-04-26 | 0 | Forward secrecy is the most important thing · Alex Gaynor | ||
Details | Website | 2017-04-03 | 9 | RedLeaves - Malware Based on Open Source RAT - JPCERT/CC Eyes | ||
Details | Website | 2017-03-06 | 9 | An Introduction to Ethereum and Smart Contracts: Bitcoin & The Blockchain | ||
Details | Website | 2017-02-23 | 8 | Mac ransomware on piracy sites | Malwarebytes Labs | ||
Details | Website | 2017-01-19 | 1 | Fingerprint Readers in pre-Android 6 Smartphones: A Call for Disaster | ||
Details | Website | 2016-12-30 | 34 | MerryChristmas | ||
Details | Website | 2016-12-05 | 16 | A Closer Look at the Mamba Ransomware that Struck San Francisco Rail System | ||
Details | Website | 2016-11-25 | 0 | US Navy Data Leaked: 10 Tips to Protect Sensitive Data from Theft | ||
Details | Website | 2016-10-08 | 65 | Globe-2 | ||
Details | Website | 2016-09-15 | 44 | HDDCryptor | ||
Details | Website | 2016-05-18 | 3 | The Ultimate Guide to Angler Exploit Kit for Non-Technical People | ||
Details | Website | 2016-04-11 | 5 | Decrypting the Petya Ransomware | Check Point Blog | ||
Details | Website | 2016-03-21 | 0 | Canadian Hospital Serves Ransomware Via Hacked Website | Malwarebytes Labs | ||
Details | Website | 2016-03-09 | 0 | Ransomware’s Everywhere, Even on Macs - F-Secure Blog | ||
Details | Website | 2016-02-18 | 0 | The rise of Android ransomware | WeLiveSecurity | ||
Details | Website | 2016-01-24 | 196 | Scarlet Mimic: Years-Long Espionage Campaign Targets Minority Activists | ||
Details | Website | 2015-11-28 | 0 | Seven Tips for Personal Online Security | ||
Details | Website | 2015-10-28 | 5 | Reversing the C2C HTTP Emmental communication | ||
Details | Website | 2015-10-05 | 0 | A Week in Security (Sep 27 - Oct 03) | Malwarebytes Labs | ||
Details | Website | 2015-09-10 | 2 | Cloud security controls series: Encrypting Data at Rest - Microsoft Security Blog | ||
Details | Website | 2015-01-29 | 0 | Keeping a Secure Mobile Device | Malwarebytes Labs | ||
Details | Website | 2014-10-15 | 0 | POODLE Unleashed: Understanding the SSL 3.0 Vulnerability | Rapid7 Blog |