Common Information
Type | Value |
---|---|
Value |
Command and Scripting Interpreter |
Category | Cmtmf-Attack-Pattern |
Type | Cmtmf-Attack-Pattern |
Misp Type | Cluster |
Description | TBD |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-10-14 | 19 | Water Makara Uses Obfuscated JavaScript in Spear Phishing Campaign Targets Brazil With Astaroth Malware | ||
Details | Website | 2024-10-13 | 17 | Fog Ransomware – Technical Analysis | Blog | Dark Atlas | Dark Web Monitoring Platform | Compromised Credentials Monitoring | Account Takeover Prevention Platform | Threat Intelligence | Buguard | ||
Details | Website | 2024-10-11 | 13 | Securing the Quantum Future: The Role of Confidential Computing in Blockchain Networks | ||
Details | Website | 2024-10-11 | 71 | Weekly Intelligence Report - 11 Oct 2024 | #ransomware | #cybercrime | National Cyber Security Consulting | ||
Details | Website | 2024-10-10 | 33 | Malware by the (Bit)Bucket: Uncovering AsyncRAT | ||
Details | Website | 2024-10-10 | 9 | AhnLab EDR을 활용한 BPFDoor 리눅스 악성코드 탐지 - ASEC | ||
Details | Website | 2024-10-10 | 14 | Building a Automated Linux Sandbox for Malware Analysis | ||
Details | Website | 2024-10-09 | 22 | APT 40 Advisory PRC MSS Tradecraft In Action Summary | ||
Details | Website | 2024-10-09 | 9 | BPFDoor Linux Malware Detected by AhnLab EDR - ASEC | ||
Details | Website | 2024-10-08 | 21 | MisterioLNK: The Open-Source Builder Behind Malicious Loaders - Cyble | ||
Details | Website | 2024-10-07 | 67 | Threat Intelligence Report October 1 - October 7 2024 | Red Piranha | ||
Details | Website | 2024-10-07 | 141 | Mind the (air) gap: GoldenJackal gooses government guardrails | ||
Details | Website | 2024-10-06 | 18 | YUNIT STEALER - CYFIRMA | ||
Details | Website | 2024-10-04 | 32 | LemonDuck Unleashes Cryptomining Attacks Through SMB Service Exploits | ||
Details | Website | 2024-10-04 | 100 | Агент SIEM используется в атаках SilentCryptoMiner | ||
Details | Website | 2024-10-04 | 34 | VILSA STEALER - CYFIRMA | ||
Details | Website | 2024-10-04 | 100 | SIEM agent being used in SilentCryptoMiner attacks | ||
Details | Website | 2024-10-01 | 27 | Silent Intrusion: Unraveling The Sophisticated Attack Leveraging VS Code For Unauthorized Access - Cyble | ||
Details | Website | 2024-09-30 | 10 | Microsoft Identifies Storm-0501 as Major Threat in Hybrid Cloud Ransomware Attacks - CyberSRC | ||
Details | Website | 2024-09-27 | 123 | Betting on Bots: Investigating Linux malware, crypto mining, and gambling API abuse — Elastic Security Labs | ||
Details | Website | 2024-09-27 | 5 | Multiple Vulnerabilities in PHP Could Allow for Remote Code Execution | ||
Details | Website | 2024-09-27 | 58 | OSINT Investigation: Hunting Malicious Infrastructure Linked to Transparent Tribe - CYFIRMA | ||
Details | Website | 2024-09-26 | 22 | Avaddon Ransomware Analysis (EN) | ||
Details | Website | 2024-09-23 | 45 | Threat Intelligence Report 17th September – 23rd September 2024 | ||
Details | Website | 2024-09-19 | 142 | Black Basta Ransomware: What You Need to Know | Qualys Security Blog |