Silobreaker Update 2021年10月07日
インターネット上でトレンドとなっている脅威アクター、マルウェアのランキングです。
Silobreaker の API を使用して作成しています。このページに関する説明はこちらをご覧ください。
Threat Actor
Name | Move | Volume 1d | Volume 7d | Volume 30d |
---|---|---|---|---|
Team GhostShell | ![]() |
5 | 5 | 5 |
APT39 | ![]() |
3 | 3 | 3 |
Xing Team | ![]() |
1 | 1 | 1 |
Proxy Phantom | ![]() |
4 | 11 | 11 |
Agrius APT | ![]() |
2 | 5 | 5 |
Malware
Name | Move | Volume 1d | Volume 7d | Volume 30d |
---|---|---|---|---|
ESPecter | ![]() |
24 | 32 | 32 |
AZORult Stealer | ![]() |
2 | 2 | 3 |
LokiBot Trojan | ![]() |
2 | 3 | 4 |
Hancitor | ![]() |
4 | 6 | 19 |
StealBit | ![]() |
2 | 2 | 5 |
Related documents
- ThreatActor:Team GhostShell
- Cybereason Exposes Iranian State-Sponsored Cyber Espionage Campaign Targeting Global Aerospace and Telecommunications Companies
- Published by Jotup (2021-10-07 00:48:00)
- Entities:
- Company:Cybereason, ThreatActor:Team GhostShell, Keyphrase:Cyber Espionage, Keyphrase:State-Sponsored Cybercrime, Keyphrase:Aerospace
- ThreatActor:APT39
- Newly-found Iranian cyber-espionage may pose ‘real threat’ to Israel
- Published by Jerusalem Post (2021-10-06 19:12:00)
- Entities:
- Keyphrase:Iranians, Keyphrase:Cyber Espionage, Software:Dropbox, Company:Cybereason, Keyphrase:C2 Command & Control
- ThreatActor:Xing Team
- IL: OSF Healthcare discloses ransomware incident
- Published by DataBreaches.net (2021-10-06 21:53:35)
- Entities:
- Organization:OSF Healthcare, Domain:DataBreaches.net, ThreatActor:Xing Team, Company:Little Company of Mary, Keyphrase:Ransomware
- ThreatActor:Proxy Phantom
- ATO attacks increased 307% between 2019 and 2021
- Published by Help Net Security – RSS (2021-10-06 13:00:06)
- Entities:
- Keyphrase:Account Takeover, AttackType:Credential Stuffing, ThreatActor:Proxy Phantom, Keyphrase:Fraud, Keyphrase:IP Address
- ThreatActor:Agrius APT
- Newly-found Iranian cyber-espionage may pose ‘real threat’ to Israel
- Published by Jerusalem Post (2021-10-06 19:12:00)
- Entities:
- Keyphrase:Iranians, Keyphrase:Cyber Espionage, Software:Dropbox, Company:Cybereason, Keyphrase:C2 Command & Control
- Malware:ESPecter
- Dinosn – ESPecter Bootkit Malware Haunts Victims with Persistent Espionage https://t.co/qQtQlWW6hh
- Published by Dinosn – Twitter (2021-10-07 03:37:42)
- Entities:
- Malware:ESPecter, Keyphrase:Bootkit, Username:@dinosn, Incident:Espionage, Keyphrase:Malware
- Malware:AZORult Stealer
- Mana Tools: A Malware C2 Panel with a Past
- Published by RiskIQ Blog (2021-10-06 22:00:50)
- Entities:
- Keyphrase:Malware, Keyphrase:C2 Command & Control, Malware:AZORult Stealer, Keyphrase:Infrastructure, Malware:Revenge RAT
- Malware:LokiBot Trojan
- Mana Tools: A Malware C2 Panel with a Past
- Published by RiskIQ Blog (2021-10-06 22:00:50)
- Entities:
- Keyphrase:Malware, Keyphrase:C2 Command & Control, Malware:AZORult Stealer, Keyphrase:Infrastructure, Malware:Revenge RAT
- Malware:Hancitor
- Quick Malware Analysis: Hancitor and Cobalt Strike pcap from 2021-09-29
- Published by Security Onion (2021-10-07 05:22:06)
- Entities:
- Domain:securityonion.net, Malware:Hancitor, Software:Cobalt Strike, Keyphrase:Malware, UrlFull:https://www.malware-traffic-analysis.net/2021/09/29/index.html
- Malware:StealBit
- Analyzing LockBit’s Data Exfiltration Model
- Published by Cyware (2021-10-06 08:10:00)
- Entities:
- Malware:StealBit, Malware:LockBit Ransomware, Keyphrase:data exfiltration, Keyphrase:Malware, Keyphrase:IP Address