Anomali Cyber Watch: Velvet Chollima Steals Emails from Browsers, Austrian Mercenary Leverages Zero-Days, China-Sponsored Group Uses CosmicStrand UEFI Firmware Rootkit, and More
Tags
Common Information
Type | Value |
---|---|
UUID | bf0090da-201d-4c05-8635-af66f7ed49ff |
Fingerprint | cf470813e7875f07 |
Analysis status | DONE |
Considered CTI value | 2 |
Text language | |
Published | Aug. 2, 2022, midnight |
Added to db | Sept. 11, 2022, 12:47 p.m. |
Last updated | Nov. 17, 2024, 6:56 p.m. |
Headline | Anomali Cyber Watch: Velvet Chollima Steals Emails from Browsers, Austrian Mercenary Leverages Zero-Days, China-Sponsored Group Uses CosmicStrand UEFI Firmware Rootkit, and More |
Title | Anomali Cyber Watch: Velvet Chollima Steals Emails from Browsers, Austrian Mercenary Leverages Zero-Days, China-Sponsored Group Uses CosmicStrand UEFI Firmware Rootkit, and More |
Detected Hints/Tags/Attributes | 225/4/57 |
Source URLs
URL Provider
RSS Feed
Details | Id | Enabled | Feed title | Url | Added to db |
---|---|---|---|---|---|
Details | 270 | ✔ | — | https://www.anomali.com/site/blog-rss | 2024-08-30 22:08 |
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | CVE | 19 | cve-2022-22047 |
|
Details | CVE | 11 | cve-2021-28550 |
|
Details | CVE | 6 | cve-2021-36948 |
|
Details | CVE | 9 | cve-2021-31201 |
|
Details | CVE | 10 | cve-2021-31199 |
|
Details | CVE | 2 | cve-2022-22026 |
|
Details | CVE | 2 | cve-2022-22049 |
|
Details | File | 128 | w3wp.exe |
|
Details | MITRE ATT&CK Techniques | 30 | T1176 |
|
Details | MITRE ATT&CK Techniques | 89 | T1114 |
|
Details | MITRE ATT&CK Techniques | 695 | T1059 |
|
Details | MITRE ATT&CK Techniques | 107 | T1564 |
|
Details | MITRE ATT&CK Techniques | 409 | T1566 |
|
Details | MITRE ATT&CK Techniques | 245 | T1203 |
|
Details | MITRE ATT&CK Techniques | 420 | T1204 |
|
Details | MITRE ATT&CK Techniques | 492 | T1105 |
|
Details | MITRE ATT&CK Techniques | 75 | T1001 |
|
Details | MITRE ATT&CK Techniques | 627 | T1027 |
|
Details | MITRE ATT&CK Techniques | 504 | T1140 |
|
Details | MITRE ATT&CK Techniques | 289 | T1003 |
|
Details | MITRE ATT&CK Techniques | 550 | T1112 |
|
Details | MITRE ATT&CK Techniques | 67 | T1505 |
|
Details | MITRE ATT&CK Techniques | 542 | T1190 |
|
Details | MITRE ATT&CK Techniques | 95 | T1572 |
|
Details | MITRE ATT&CK Techniques | 163 | T1573 |
|
Details | MITRE ATT&CK Techniques | 99 | T1539 |
|
Details | MITRE ATT&CK Techniques | 126 | T1567 |
|
Details | MITRE ATT&CK Techniques | 172 | T1555 |
|
Details | MITRE ATT&CK Techniques | 40 | T1528 |
|
Details | MITRE ATT&CK Techniques | 219 | T1113 |
|
Details | MITRE ATT&CK Techniques | 185 | T1518 |
|
Details | MITRE ATT&CK Techniques | 86 | T1124 |
|
Details | MITRE ATT&CK Techniques | 100 | T1007 |
|
Details | MITRE ATT&CK Techniques | 444 | T1071 |
|
Details | MITRE ATT&CK Techniques | 102 | T1020 |
|
Details | MITRE ATT&CK Techniques | 207 | T1547 |
|
Details | MITRE ATT&CK Techniques | 26 | T1037 |
|
Details | MITRE ATT&CK Techniques | 122 | T1543 |
|
Details | MITRE ATT&CK Techniques | 10 | T1542 |
|
Details | MITRE ATT&CK Techniques | 41 | T1014 |
|
Details | MITRE ATT&CK Techniques | 4 | T1495 |
|
Details | MITRE ATT&CK Techniques | 159 | T1095 |
|
Details | MITRE ATT&CK Techniques | 164 | T1574 |
|
Details | MITRE ATT&CK Techniques | 480 | T1053 |
|
Details | MITRE ATT&CK Techniques | 78 | T1569 |
|
Details | MITRE ATT&CK Techniques | 116 | T1134 |
|
Details | MITRE ATT&CK Techniques | 78 | T1548 |
|
Details | MITRE ATT&CK Techniques | 247 | T1070 |
|
Details | MITRE ATT&CK Techniques | 1006 | T1082 |
|
Details | MITRE ATT&CK Techniques | 433 | T1057 |
|
Details | MITRE ATT&CK Techniques | 230 | T1033 |
|
Details | MITRE ATT&CK Techniques | 157 | T1560 |
|
Details | MITRE ATT&CK Techniques | 111 | T1119 |
|
Details | MITRE ATT&CK Techniques | 96 | T1132 |
|
Details | MITRE ATT&CK Techniques | 422 | T1041 |
|
Details | Threat Actor Identifier - APT | 277 | APT37 |
|
Details | Threat Actor Identifier - APT | 783 | APT28 |