Silobreaker Update 2021年09月16日
インターネット上でトレンドとなっている脅威アクター、マルウェアのランキングです。
Silobreaker の API を使用して作成しています。このページに関する説明はこちらをご覧ください。
Threat Actor
Name | Move | Volume 1d | Volume 7d | Volume 30d |
---|---|---|---|---|
TA511 | ![]() |
1 | 1 | 1 |
TeleBots | ![]() |
1 | 1 | 1 |
Cobalt Group | ![]() |
3 | 6 | 9 |
Kasablanka | ![]() |
2 | 2 | 5 |
APT27 | ![]() |
2 | 3 | 7 |
Malware
Name | Move | Volume 1d | Volume 7d | Volume 30d |
---|---|---|---|---|
Ghimob | ![]() |
2 | 2 | 2 |
PlugX Trojan | ![]() |
6 | 15 | 20 |
Hancitor | ![]() |
6 | 6 | 20 |
Zloader Malware | ![]() |
5 | 9 | 12 |
Vermilion Strike | ![]() |
5 | 15 | 15 |
Related documents
- ThreatActor:TA511
- Hancitor campaign abusing Microsoft’s OneDrive, (Wed, Sep 15th)
- Published by SANS Internet Storm Center, InfoCON: green (2021-09-16 02:56:47)
- Entities:
- Malware:Hancitor, Keyphrase:Word Document, Software:Microsoft OneDrive, Keyphrase:Base64, Keyphrase:Abuse
- ThreatActor:TeleBots
- Teaching Capa New Tricks: Analyzing Capabilities in PE and ELF Files
- Published by Intezer – RSS (2021-09-15 22:03:23)
- Entities:
- Malware:ELF Malware, Company:Intezer Labs, Keyphrase:Malware, Malware:Olympic Destroyer, Malware:XData Ransomware
- ThreatActor:Cobalt Group
- Cybercriminals recreate Cobalt Strike in Linux
- Published by ZDNet | security RSS (2021-09-15 19:55:11)
- Entities:
- Software:Cobalt Strike, Malware:Vermilion Strike, Software:Linux OS, Keyphrase:C2 Command & Control, Company:Intezer Labs
- ThreatActor:Kasablanka
- 888 RAT
- Published by Remove Spyware & Malware with SpyHunter – Enigma Software Group USA LLC (2021-09-16 03:03:16)
- Entities:
- Malware:888 RAT, Keyphrase:Android, Keyphrase:C2 Command & Control, Keyphrase:Malware, Software:Facebook
- ThreatActor:APT27
- Operation ‘Harvest’: A Deep Dive into a Long-term Campaign
- Published by McAfee – Blog – RSS (2021-09-15 13:01:21)
- Entities:
- Malware:PlugX Trojan, ThreatActor:Winnti Group, Keyphrase:Malware, Keyphrase:C2 Command & Control, Domain:brushupdata.com
- Malware:Ghimob
- virusbtn – Ghimob, TwMobo & BRata are here to stay and ready to expand worldwide, stealing your ‘mobile money’ – is the securi… https://t.co/hh3vtPhTtO
- Published by virusbtn – Twitter (2021-09-15 19:30:02)
- Entities:
- Malware:Ghimob, HashTag:#vblocalhost, Username:@assolini, Username:@virusbtn, Keyphrase:Mobile Money
- Malware:PlugX Trojan
- Operation ‘Harvest’: A Deep Dive into a Long-term Campaign
- Published by McAfee – Blog – RSS (2021-09-15 13:01:21)
- Entities:
- Malware:PlugX Trojan, ThreatActor:Winnti Group, Keyphrase:Malware, Keyphrase:C2 Command & Control, Domain:brushupdata.com
- Malware:Hancitor
- 2021-09-14 – Pcap and malware for an ISC diary (Hancitor with Cobalt Strike)
- Published by Malware-Traffic-Analysis.net – Blog Entries (2021-09-15 14:29:00)
- Entities:
- Malware:Hancitor, Software:Cobalt Strike, Keyphrase:Malware
- Malware:Zloader Malware
- Dangerous banking trojan in Google ads in search results
- Published by Tek Deeps (2021-09-16 03:10:00)
- Entities:
- Malware:Zloader Malware, AttackType:Banking Trojan, Company:Google Inc, Keyphrase:Malware, Software:Microsoft Windows Defender
- Malware:Vermilion Strike
- Cybercriminals recreate Cobalt Strike in Linux
- Published by ZDNet | security RSS (2021-09-15 19:55:11)
- Entities:
- Software:Cobalt Strike, Malware:Vermilion Strike, Software:Linux OS, Keyphrase:C2 Command & Control, Company:Intezer Labs