Common Information
Type | Value |
---|---|
Value |
Frankenstein - G0101 |
Category | Actor |
Type | Mitre-Intrusion-Set |
Misp Type | Cluster |
Description | [Frankenstein](https://attack.mitre.org/groups/G0101) is a campaign carried out between January and April 2019 by unknown threat actors. The campaign name comes from the actors' ability to piece together several unrelated components.(Citation: Talos Frankenstein June 2019) |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2023-01-10 | 0 | New Year, New You: Start Fresh With McAfee Protection Score | McAfee Blog | ||
Details | Website | 2022-09-02 | 0 | ‘May the best spy win’: Australia’s intelligence chiefs open up on cyber threats – and feminism | ||
Details | Website | 2021-10-21 | 110 | Franken-phish: TodayZoo built from other phishing kits - Microsoft Security Blog | ||
Details | Website | 2021-02-16 | 13 | Shielder - Hunting for bugs in Telegram's animated stickers remote attack surface | ||
Details | Website | 2021-01-01 | 12 | MassLogger - Frankenstein's Creation | ||
Details | Website | 2020-09-08 | 305 | ShadowPad: новая активность группировки Winnti | ||
Details | Website | 2019-12-18 | 0 | 2019: The year in malware | ||
Details | Website | 2019-06-06 | 17 | Threat Source newsletter (June 6) | ||
Details | Website | 2019-06-04 | 21 | It's alive: Threat actors cobble together open-source pieces into monstrous Frankenstein campaign | ||
Details | Website | 2019-01-30 | 2 | Hackers Are Passing Around a Megaleak of 2.2 Billion Records | ||
Details | Website | 2018-12-02 | 4 | watch free movieeees | ||
Details | Website | 2018-10-16 | 7 | How to build your own motion-activated security camera | Malwarebytes Labs | ||
Details | Website | 2018-10-03 | 0 | Black Hat | ||
Details | Website | 2018-06-12 | 17 | I can be Apple, and so can you | ||
Details | Website | 2018-02-25 | 2 | Hexacorn | Blog How to become the best SOC Analyst E-V-E-R | ||
Details | Website | 2017-04-03 | 0 | Introducing RubySMB: The Protocol Library Nobody Else Wanted To Write | Rapid7 Blog | ||
Details | Website | 2016-10-11 | 1 | Pokemon Go, Security, and Obsolescence | Rapid7 Blog | ||
Details | Website | 2016-07-19 | 1 | Why We Code | ||
Details | Website | 2012-09-06 | 0 | On the (provable) security of TLS: Part 1 | ||
Details | Website | 2010-12-13 | 9 | Internet Anarchy: Anonymous Crowds Flex their Muscles |