Decoding Threats: How Cyber Avengers and Voltzite Exploit Vulnerabilities — and How to Stop Them
Common Information
Type Value
UUID 672f803d-8a01-423e-8a26-936fe51f3738
Fingerprint e740108bd803c483
Analysis status DONE
Considered CTI value -2
Text language
Published Nov. 21, 2024, 9:09 a.m.
Added to db Nov. 21, 2024, 11:10 a.m.
Last updated Dec. 19, 2024, 4:24 a.m.
Headline Decoding Threats: How Cyber Avengers and Voltzite Exploit Vulnerabilities — and How to Stop Them
Title Decoding Threats: How Cyber Avengers and Voltzite Exploit Vulnerabilities — and How to Stop Them
Detected Hints/Tags/Attributes 66/2/12
RSS Feed
Details Id Enabled Feed title Url Added to db
Details 167 Cybersecurity on Medium https://medium.com/feed/tag/cybersecurity 2024-08-30 22:08
Attributes
Details Type #Events CTI Value
Details Domain 537
www.cisa.gov
Details Domain 111
www.secureworks.com
Details Domain 57
www.dragos.com
Details Domain 427
securelist.com
Details MITRE ATT&CK Techniques 586
T1190
Details MITRE ATT&CK Techniques 62
T1498
Details MITRE ATT&CK Techniques 66
T1491
Details Url 2
https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-335a
Details Url 1
https://www.secureworks.com/blog/iranian-cyber-av3ngers-compromise-unitronics-systems
Details Url 2
https://www.dragos.com/blog/cyber-av3ngers-hacktivist-group-targeting-israel-made-ot-devices
Details Url 1
https://securelist.com/a-hack-in-hand-is-worth-two-in-the-bush/110794
Details Url 2
https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-038a