Silobreaker Update 2021年05月06日
インターネット上でトレンドとなっている脅威アクター、マルウェアのランキングです。
Silobreaker の API を使用して作成しています。このページに関する説明はこちらをご覧ください。
Threat Actor
Name | Move | Volume 1d | Volume 7d | Volume 30d |
---|---|---|---|---|
Taidoor | ![]() |
2 | 2 | 2 |
Ghost Security Group | ![]() |
11 | 12 | 13 |
Anonymous Colombia | ![]() |
7 | 7 | 9 |
UNC2529 | ![]() |
11 | 20 | 20 |
DarkPath Scammers | ![]() |
5 | 9 | 9 |
Malware
Name | Move | Volume 1d | Volume 7d | Volume 30d |
---|---|---|---|---|
SpyAgent | ![]() |
4 | 4 | 4 |
Android.SmsSpy | ![]() |
4 | 4 | 4 |
FakeSpy Malware | ![]() |
4 | 6 | 6 |
Avaddon Ransomware | ![]() |
34 | 42 | 74 |
DOUBLEDRAG | ![]() |
12 | 27 | 27 |
Related documents
- ThreatActor:Taidoor
- Daily Summary Cyberattacks 5 May
- Published by S21sec (2021-05-05 18:28:00)
- Entities:
- ThreatActor:Taidoor, Keyphrase:Cyber Attack, Keyphrase:Malware, Organization:Government of the United States, Product:Google Android
- ThreatActor:Ghost Security Group
- JTSEC13 – #TangoDown #OpKilluminati #JTSEC #GhostsecMafia #KnownYourEnemy #FUckBill #GhostSec #BillCopylesautreapetiteecole… https://t.co/2BOg66sgWq
- Published by JTSEC13 – Twitter (2021-05-05 10:41:37)
- Entities:
- HashTag:#GhostSecMafia, HashTag:#RotchildCompagny, HashTag:#KnownYourEnemy, HashTag:#OpKilluminati, HashTag:#JTSEC
- ThreatActor:Anonymous Colombia
- Hackers Announce Attack on Colombian Government, Military Websites, Claiming Data Leak
- Published by UrduPoint.com (2021-05-05 18:46:00)
- Entities:
- Country:Colombia, Keyphrase:Computer Hacker, Organization:Government of Colombia, Keyphrase:Data Leakage, Organization:National Army of Colombia
- ThreatActor:UNC2529
- UNC2529, a new sophisticated cybercrime gang that targets U.S. orgs with 3 malware
- Published by Security Affairs (2021-05-06 00:27:31)
- Entities:
- ThreatActor:UNC2529, Keyphrase:Malware, Malware:DOUBLEBACK, Malware:DOUBLEDRAG, Keyphrase:Cybercrime
- ThreatActor:DarkPath Scammers
- Massive WHO scam busted – ‘DarkPath Scammers’ group suspected
- Published by SecurityBrief Asia – RSS (2021-05-06 05:35:00)
- Entities:
- ThreatActor:DarkPath Scammers, Keyphrase:Online Scams, Keyphrase:Campaign
- Malware:SpyAgent
- Roaming Mantis Amplifies Smishing Campaign with OS-Specific Android Malware
- Published by McAfee Blogs (2021-05-06 03:17:02)
- Entities:
- AttackType:SMS Phishing, ThreatActor:Roaming Mantis, Product:Google Play, Keyphrase:Malware, Keyphrase:C2 Command & Control
- Malware:Android.SmsSpy
- Roaming Mantis Amplifies Smishing Campaign with OS-Specific Android Malware
- Published by McAfee Blogs (2021-05-06 03:17:02)
- Entities:
- AttackType:SMS Phishing, ThreatActor:Roaming Mantis, Product:Google Play, Keyphrase:Malware, Keyphrase:C2 Command & Control
- Malware:FakeSpy Malware
- Roaming Mantis Amplifies Smishing Campaign with OS-Specific Android Malware
- Published by McAfee Blogs (2021-05-06 03:17:02)
- Entities:
- AttackType:SMS Phishing, ThreatActor:Roaming Mantis, Product:Google Play, Keyphrase:Malware, Keyphrase:C2 Command & Control
- Malware:Avaddon Ransomware
- NSW Labor takes a hit from Windows Avaddon ransomware
- Published by ITWire (2021-05-05 13:14:00)
- Entities:
- Malware:Avaddon Ransomware, Province:New South Wales, Organization:NSW Labor Party, Keyphrase:Ransomware, Keyphrase:Labor
- Malware:DOUBLEDRAG
- virusbtn – FireEye’s Mandiant researchers look at a global phishing campaign and three new malware families: DOUBLEDRAG, DOUBL… https://t.co/5g78BKiHKc
- Published by virusbtn – Twitter (2021-05-05 22:56:02)
- Entities:
- Malware:DOUBLEBACK, Malware:DOUBLEDRAG, Malware:DOUBLEDROP, Username:@virusbtn, Company:Mandiant Corp