Silobreaker Update 2021年04月01日
インターネット上でトレンドとなっている脅威アクター、マルウェアのランキングです。
Silobreaker の API を使用して作成しています。このページに関する説明はこちらをご覧ください。
Threat Actor
Name | Move | Volume 1d | Volume 7d | Volume 30d |
---|---|---|---|---|
BeagleBoyz | ![]() |
1 | 1 | 1 |
APT35 | ![]() |
37 | 41 | 76 |
Bluenoroff | ![]() |
2 | 3 | 7 |
Lazarus Group | ![]() |
11 | 30 | 122 |
APT10 | ![]() |
10 | 27 | 72 |
Malware
Name | Move | Volume 1d | Volume 7d | Volume 30d |
---|---|---|---|---|
Xtreme RAT | ![]() |
3 | 3 | 3 |
BazarLoader | ![]() |
11 | 21 | 52 |
Ecipekac | ![]() |
9 | 26 | 29 |
Fonix Ransomware | ![]() |
4 | 10 | 12 |
Formbook Malware | ![]() |
4 | 7 | 17 |
Related documents
- ThreatActor:BeagleBoyz
- North Korea can likely arm missiles with nuclear warheads: UN
- Published by Nikkei Asian Review (2021-04-01 07:19:00)
- Entities:
- Country:North Korea, Keyphrase:Nuclear Warhead, Keyphrase:Missile, Keyphrase:Ballistic Missile, Keyphrase:Nuclear
- ThreatActor:APT35
- APT Charming Kitten Pounces on Medical Researchers
- Published by Cyber Security Review (2021-03-31 22:39:00)
- Entities:
- ThreatActor:APT35, Keyphrase:Medical, Company:Proofpoint Inc, Organization:IRGC Iranian Revolutionary Guards Corps, Keyphrase:BadBlood Campaign
- ThreatActor:Bluenoroff
- vxunderground – Happy Wanted-By-The-FBI Wednesday!
Park Jin Hyok: alleged member of Lazarus Group / APT38 https://t.co/VCjnjWRVcu
- Published by vxunderground – Twitter (2021-03-31 22:42:00)
- Entities:
- Person:Park Jin, Username:@vxunderground, ThreatActor:Bluenoroff, ThreatActor:Lazarus Group, Domain:twitter.com
- ThreatActor:Lazarus Group
- vxunderground – Happy Wanted-By-The-FBI Wednesday!
Park Jin Hyok: alleged member of Lazarus Group / APT38 https://t.co/VCjnjWRVcu
- Published by vxunderground – Twitter (2021-03-31 22:42:00)
- Entities:
- Person:Park Jin, Username:@vxunderground, ThreatActor:Bluenoroff, ThreatActor:Lazarus Group, Domain:twitter.com
- ThreatActor:APT10
- LouiseMensch – RT @780thC: menuPass (Stone Panda) is a threat group that appears to originate from China and has been active since 2009. The group has tar…
- Published by LouiseMensch – Twitter (2021-04-01 05:59:29)
- Entities:
- ThreatActor:APT10, Username:@louisemensch, Keyphrase:Hacker Group, Keyphrase:Aerospace, UrlFull:https://attack.mitre.org/groups/G0045/
- Malware:Xtreme RAT
- The latest malware hiding in video game cheat codes
- Published by Cyberscoop – News (2021-03-31 22:33:31)
- Entities:
- Keyphrase:Malware, Keyphrase:Video Games, Keyphrase:Computer Hacker, Keyphrase:Campaign, Malware:Xtreme RAT
- Malware:BazarLoader
- Securityblog – RT @campuscodi: NEW: The operators of the BazarLoader malware are working together with underground call centers to trick the victims of th…
- Published by Securityblog – Twitter (2021-04-01 00:17:20)
- Entities:
- Keyphrase:Malware, UrlFull:https://therecord.media/malware-uses-underground-call-centers-to-trick-users-into-infecting-themselves/, Domain:therecord.media, Malware:BazarLoader, Username:@campuscodi
- Malware:Ecipekac
- Securityblog – APT10: sophisticated multi-layered loader Ecipekac discovered in A41APT campaign | Securelist https://t.co/Uk5uBmWh6K
- Published by Securityblog – Twitter (2021-04-01 00:01:44)
- Entities:
- Malware:Ecipekac, Keyphrase:A41APT, ThreatActor:APT10, Username:@securityblog, UrlFull:https://securelist.com/apt10-sophisticated-multi-layered-loader-ecipekac-discovered-in-a41apt-campaign/101519/
- Malware:Fonix Ransomware
- InfoSecHotSpot – Ziggy Ransomware Gang Offers Refunds to Victims Ziggy joins Fonix ransomware group and shuts down, with apologies t… https://t.co/5P02ozqNIL
- Published by InfoSecHotSpot – Twitter (2021-03-31 17:41:10)
- Entities:
- Malware:Ziggy Ransomware, Malware:Fonix Ransomware, Username:@infosechotspot, Keyphrase:Victim, Domain:bit.ly
- Malware:Formbook Malware
- F-Secure: Online extortion, data theft gain traction among cybercriminals
- Published by Health, Safety and Security Review Middle East (2021-03-31 14:18:44)
- Entities:
- Keyphrase:Ransomware, Keyphrase:Malware, Company:F-Secure Oyj, Keyphrase:Cybercrime, AttackType:Data Theft