Silobreaker Update 2021年12月22日
インターネット上でトレンドとなっている脅威アクター、マルウェアのランキングです。
Silobreaker の API を使用して作成しています。このページに関する説明はこちらをご覧ください。
Threat Actor
Name | Move | Volume 1d | Volume 7d | Volume 30d |
---|---|---|---|---|
Unit 26165 | ![]() |
1 | 1 | 1 |
Tropic Trooper | ![]() |
9 | 27 | 32 |
Winnti Group | ![]() |
2 | 3 | 5 |
Anonymous Islamic | ![]() |
2 | 6 | 10 |
APT35 | ![]() |
8 | 63 | 71 |
Malware
Name | Move | Volume 1d | Volume 7d | Volume 30d |
---|---|---|---|---|
StealBit | ![]() |
3 | 3 | 3 |
Abcbot | ![]() |
4 | 4 | 5 |
Dridex Malware | ![]() |
15 | 24 | 50 |
Formbook Malware | ![]() |
4 | 4 | 17 |
Pegasus Malware | ![]() |
81 | 365 | 1329 |
Related documents
- ThreatActor:Unit 26165
- Russian national extradited to US for trading on stolen Information
- Published by Security Affairs (2021-12-22 06:42:48)
- Entities:
- Keyphrase:Extradition, Keyphrase:Stolen, Country:Russia, Person:Ivan Yermakov, Keyphrase:Trading
- ThreatActor:Tropic Trooper
- Tropic Trooper Cyber Espionage Hackers Targeting Transportation Sector
- Published by THN : The Hacker News (2021-12-21 21:40:36)
- Entities:
- ThreatActor:Tropic Trooper, Keyphrase:Cyber Espionage, Keyphrase:Hacker, Keyphrase:Transportation, Keyphrase:Transportation Industry
- ThreatActor:Winnti Group
- Anomali Cyber Watch: ‘PseudoManuscrypt’ Mass Spyware Campaign Targets 35K Systems, APT31 Intrusion Set Campaign: Description, Countermeasures and Code, State-sponsored hackers abuse Slack API to steal
- Published by ThreatStream Blog (2021-12-22 01:57:00)
- Entities:
- Keyphrase:MITRE ATT&CK Framework, ThreatActor:APT31, Malware:PseudoManuscrypt, Company:Anomali Inc, Keyphrase:C2 Command & Control
- ThreatActor:Anonymous Islamic
- Treadstone71LLC – Post from Israeli Cyber Firm on Saudi and Anonymous Islamic TeamHacking Network attacks https://t.co/2bu03uXFJ3
- Published by Treadstone71LLC – Twitter (2021-12-22 06:31:43)
- Entities:
- ThreatActor:Anonymous Islamic, Username:@treadstone71llc, Keyphrase:Israeli, Keyphrase:Cyber, Domain:cybershafarat.com
- ThreatActor:APT35
- Iranian Charming Kitten Enters Israeli Networks via Log4Shell
- Published by Cyware (2021-12-22 00:36:00)
- Entities:
- ThreatActor:APT35, Vulnerability:CVE-2021-44228 (Log4Shell), Keyphrase:Iranians, Keyphrase:Israeli, Keyphrase:Vulnerability
- Malware:StealBit
- vxunderground – We’ve made a massive update to our Malware sample collection.
Included is AlphV (Blackcat) ransomware groups Linu… https://t.co/DZ9kQXchoc - Published by vxunderground – Twitter (2021-12-21 22:40:07)
- Entities:
- Malware:ALPHV Ransomware, UrlFull:https://www.vx-underground.org/, Subdomain:www.vx-underground.org, Malware:StealBit, Domain:vx-underground.org
- Malware:Abcbot
- New Abcbot botnet goes after Chinese cloud providers
- Published by Record by Recorded Future (2021-12-21 23:00:06)
- Entities:
- Malware:Abcbot, Keyphrase:Botnet, Company:Cado Security, Software:Huawei Cloud, Keyphrase:Chinese
- Malware:Dridex Malware
- Dridex Banking Malware Now Installed Using Log4j Vulnerability
- Published by Cyberintel Magazine (2021-12-21 18:46:47)
- Entities:
- Malware:Dridex Malware, Software:Apache Log4J, Keyphrase:Meterpreter, Keyphrase:Threat Actor, Keyphrase:Java (IT)
- Malware:Formbook Malware
- Hackers bypass patched Microsoft Office flaw to inject Formbook malware
- Published by techcentral.ie (2021-12-22 01:02:48)
- Entities:
- Malware:Formbook Malware, Software:Microsoft Office, Keyphrase:Malware, Incident:Attack, Keyphrase:Hacker
- Malware:Pegasus Malware
- Log Exploits, Pegasus Methods, and Willful Ignorance
- Published by Beyond Search (2021-12-21 19:15:00)
- Entities:
- Malware:Pegasus Malware, Keyphrase:Open Source, Keyphrase:Ignorance, Keyphrase:Java (IT), Company:SolarWinds Inc