Discover the
adversaries targeting your industry
Please select a filter to get Threat Actors!
Top Threat Actors
570000
Audience
6
News
340
IOC
Target Countries:
Albania
Israel
Target Sectors:
Technology -
Entertainment -
NAICS:92 -
Associated Malware/Software:
rhadamanthys
Related CVE's:
No CVE's available.
ATT&CK IDs:
T1106 - Native API
T1574 - Hijack Execution Flow
T1566 - Phishing
T1102 - Web Service
T1036 - Masquerading
+ 3
See Details
429651
Audience
2
News
3044
IOC
Target Countries:
Saudi Arabia
Romania
Bulgaria
USA
Philippines
+ 17
Target Sectors:
Education -
NGOs -
Media -
Government -
Technology -
Associated Malware/Software:
No Malware available.
Related CVE's:
CVE-2018-4878
CVE-2020-1472
CVE-2016-3715
CVE-2019-11510
CVE-2021-34527
ATT&CK IDs:
T1027
T1566.001
T1115 - Clipboard Data
T1071.001
T1140 - Deobfuscate/Decode Files or Information
+ 1
See Details
310000
Audience
4
News
9
IOC
Target Countries:
No target country found.
Target Sectors:
No target sector found.
Associated Malware/Software:
No Malware available.
Related CVE's:
CVE-2020-0601
CVE-2019-11510
CVE-2024-23897
CVE-2021-26855
ATT&CK IDs:
T1087 - Account Discovery
T1190 - Exploit Public-Facing Application
T1003
T1499
T1528 - Steal Application Access Token
+ 19
See Details
303544
Audience
4
News
25981
IOC
Target Countries:
Israel
Worldwide (WannaCry)
USA
South Africa
Canada
+ 23
Target Sectors:
Energy -
Healthcare -
Shipping and Logistics -
Engineering -
Financial -
Related CVE's:
CVE-2022-41973
CVE-2024-43461
CVE-2021-34470
CVE-2021-36955
CVE-2023-20198
+ 169
ATT&CK IDs:
T1441
T1132.001
T1133
T1591.004
T1505
+ 395
See Details
- T1106 - Native API
- T1574 - Hijack Execution Flow
- T1566 - Phishing
- T1102 - Web Service
- T1036 - Masquerading
- T1134 - Access Token Manipulation
- T1027 - Obfuscated Files or Information
- T1547 - Boot or Logon Autostart Execution
-
rhadamanthys
- Saudi Arabia
- Romania
- Bulgaria
- USA
- Philippines
- Canada
- Serbia
- China
- Brazil
- Syria
- Mongolia
- Malaysia
- South Korea
- South Sudan
- India
- Algeria
- Australia
- Russia
- Hungary
- Pakistan
- UAE
- Egypt
- T1027
- T1566.001
- T1115 - Clipboard Data
- T1071.001
- T1140 - Deobfuscate/Decode Files or Information
- T1059.003
- T1087 - Account Discovery
- T1190 - Exploit Public-Facing Application
- T1003
- T1499
- T1528 - Steal Application Access Token
- T1055 - Process Injection
- T1213 - Data from Information Repositories
- T1204 - User Execution
- T1078 - Valid Accounts
- T1071 - Application Layer Protocol
- T1114 - Email Collection
- T1078
- T1053 - Scheduled Task/Job
- T1548 - Abuse Elevation Control Mechanism
- T1552 - Unsecured Credentials
- T1566.001
- T1102 - Web Service
- T1583 - Acquire Infrastructure
- T1134 - Access Token Manipulation
- T1190
- T1206 - Sudo Caching
- T1547 - Boot or Logon Autostart Execution
- T1185 - Man in the Browser
- T1567 - Exfiltration Over Web Service
- Israel
- Worldwide (WannaCry)
- USA
- South Africa
- Canada
- Philippines
- Germany
- Netherlands
- China
- Ecuador
- Brazil
- France
- Taiwan
- Hong Kong
- Bangladesh
- UK
- Vietnam
- Guatemala
- Belgium
- India
- Mexico
- Australia
- Russia
- Poland
- Japan
- Thailand
- Chile
- South Korea
Top Ransomware Groups
1222151
Audience
9
News
107
IOC
Target Countries:
Israel
Hungary
Thailand
Latvia
Chile
+
73
Target Sectors:
Food Manufacturing -
Real Estate -
Hospitals -
Accommodation -
Air Transportation -
Associated Malware/Software:
No Malware available.
Related CVE's:
CVE-2022-26809
CVE-2021-34527
CVE-2021-44228
ATT&CK IDs:
T1566.001
T1078
T1562.001
T1486
T1027
See Details
1011097
Audience
4
News
0
IOC
Target Countries:
Turkey
United Kingdom
Tanzania, United Republic of
United States
Indonesia
+
3
Target Sectors:
Public Administration -
Telecommunications -
Associated Malware/Software:
No Malware available.
Related CVE's:
No CVE's available.
ATT&CK IDs:
No Attack IDs
See Details
793530
Audience
3
News
265
IOC
Target Countries:
Greece
Finland
Czech Republic
Thailand
Netherlands
+
52
Target Sectors:
Food Manufacturing -
Other Information Services -
Rail Transportation -
Software Publishers -
Real Estate -
Related CVE's:
CVE-2017-0147
CVE-2023-27532
CVE-2023-20269
ATT&CK IDs:
T1567 - Exfiltration Over Web Service
T1047 - Windows Management Instrumentation
T1219 - Remote Access Software
T1560 - Archive Collected Data
T1133 - External Remote Services
+
37
See Details
740000
Audience
11
News
27796
IOC
Target Countries:
Croatia
Cuba
Israel
Hungary
Thailand
+
78
Target Sectors:
Food Manufacturing -
Software Publishers -
Real Estate -
Hospitals -
Enterprises & Holding -
Related CVE's:
CVE-2022-36537
CVE-2023-46604
CVE-2023-3519
CVE-2014-3153
CVE-2023-22515
+
50
ATT&CK IDs:
T1038
T1064
TA0003
T1021.001
T1022
+
157
See Details
- Israel
- Hungary
- Thailand
- Latvia
- Chile
- None
- Spain
- Brazil
- Italy
- Argentina
- Russian Federation
- Lebanon
- Sweden
- Austria
- Switzerland
- Slovakia
- United States
- Germany
- Panama
- Costa Rica
- India
- Norway
- Malaysia
- Bangladesh
- Sri Lanka
- Kenya
- China
- Denmark
- Malta
- Paraguay
- Kuwait
- Venezuela, Bolivarian Republic of
- Mexico
- Fiji
- Ecuador
- Peru
- Belgium
- Japan
- Qatar
- Colombia
- South Africa
- Saudi Arabia
- Tunisia
- Greece
- Global
- Australia
- Indonesia
- Taiwan, Province of China
- Poland
- Philippines
- Romania
- Cyprus
- Ireland
- Luxembourg
- Hong Kong
- Lithuania
- United Arab Emirates
- Myanmar
- France
- Serbia
- Ukraine
- Timor-Leste
- Turkey
- Dominican Republic
- Singapore
- Guatemala
- Canada
- New Zealand
- Egypt
- Jamaica
- Netherlands
- El Salvador
- Tuvalu
- Sudan
- United Kingdom
- Oman
- Korea, Republic of
- Iran, Islamic Republic of
- T1566.001
- T1078
- T1562.001
- T1486
- T1027
- Turkey
- United Kingdom
- Tanzania, United Republic of
- United States
- Indonesia
- France
- Israel
- Jordan
- Greece
- Finland
- Czech Republic
- Thailand
- Netherlands
- Denmark
- Nicaragua
- None
- Norway
- Ecuador
- India
- Germany
- Singapore
- Uruguay
- Jersey
- Georgia
- Sweden
- Bahamas
- Colombia
- Chile
- Romania
- Panama
- Kenya
- United Kingdom
- Tunisia
- Hungary
- Russian Federation
- Argentina
- United Arab Emirates
- Poland
- United States
- Italy
- Bangladesh
- Brazil
- Malta
- China
- Spain
- Iceland
- Slovenia
- Turkey
- Global
- [object Object]
- Switzerland
- France
- Mexico
- South Africa
- Australia
- Canada
- Martinique
- Ireland
- Slovakia
- Jordan
- Austria
- Belize
- Saudi Arabia
- Peru
- Japan
- T1567 - Exfiltration Over Web Service
- T1047 - Windows Management Instrumentation
- T1219 - Remote Access Software
- T1560 - Archive Collected Data
- T1133 - External Remote Services
- T1046 - Network Service Scanning
- T1552 - Unsecured Credentials
- T1021 - Remote Services
- T1136 - Create Account
- T1068 - Exploitation for Privilege Escalation
- T1069 - Permission Groups Discovery
- T1040 - Network Sniffing
- T1562 - Impair Defenses
- T1027 - Obfuscated Files or Information
- T1486 - Data Encrypted for Impact
- T1071 - Application Layer Protocol
- T1110 - Brute Force
- T1190 - Exploit Public-Facing Application
- T1041 - Exfiltration Over C2 Channel
- T1485 - Data Destruction
- T1083 - File and Directory Discovery
- T1087 - Account Discovery
- T1490 - Inhibit System Recovery
- T1070 - Indicator Removal on Host
- T1140 - Deobfuscate/Decode Files or Information
- T1059 - Command and Scripting Interpreter
- T1573 - Encrypted Channel
- T1105 - Ingress Tool Transfer
- T1018 - Remote System Discovery
- T1011 - Exfiltration Over Other Network Medium
- T1543 - Create or Modify System Process
- T1570 - Lateral Tool Transfer
- T1003 - OS Credential Dumping
- T1546 - Event Triggered Execution
- T1048 - Exfiltration Over Alternative Protocol
- T1082 - System Information Discovery
- T1569 - System Services
- T1547 - Boot or Logon Autostart Execution
- T1078 - Valid Accounts
- T1112 - Modify Registry
- T1471 - Data Encrypted for Impact
- T1132.001 - Standard Encoding
-
Netwalker - S0457
-
Virus:Win32/Alma
-
APT
-
Backdoor:Win32/Aeon
-
win.crimson
-
Alpha Ransomware
-
win.orcus_rat
-
jar.jrat
-
Ransom:Win32/Nemty
-
win.afrodita
-
#Hacktool:MSIL/Hawkeyelogger
-
Ransom:Win32/Phobos
-
Worm:Win32/Netsky
-
Dharma Ransomware
-
win.cobalt_strike
-
elf.glupteba_proxy
-
elf.conti
-
osx.amos
-
AMOS macOS
-
Revenge RAT - S0379
-
TEL:Trojan:Win32/Emotet
-
Remcos - S0332
-
TEL:TrojanSpy:MSIL/AgentTesla
-
Azorult - S0344
-
win.alina_pos
-
Embarcadero Delphi
-
Maze - S0449
-
Trojan:Win32/Pitou
-
Virus:Win32/Aldebaran
-
Virus:DOS/Abbas
-
NetSupportManagerRAT
-
Dridex - S0384
-
Virus:DOS/Alabama
-
FakeSG
-
win.tofsee
-
win.formbook
-
Hancitor - S0499
-
win.raccoon
-
win.pony
-
Trojan:DOS/ABCD
-
Virus:DOS/Acid
-
win.zloader
-
ALFA Ransomware
-
Joke:Win32/Amigo
-
Adonis
-
ALF:HeraklezEval:HackTool:Win32/PwCrack
-
Ryuk ransomware
-
Akira
-
Trojan:Win32/Aleph
-
win.vidar
-
TrickBot - S0266
- Croatia
- Cuba
- Israel
- Hungary
- Thailand
- Chile
- Afghanistan
- Spain
- Bulgaria
- Brazil
- Italy
- Argentina
- Russian Federation
- Lebanon
- Sweden
- Austria
- Switzerland
- Bolivia, Plurinational State of
- Slovakia
- United States
- Germany
- Panama
- Costa Rica
- Jordan
- India
- Iceland
- Norway
- Malaysia
- Bangladesh
- Kenya
- China
- Martinique
- Kuwait
- Senegal
- Venezuela, Bolivarian Republic of
- Mexico
- Nicaragua
- Peru
- Belgium
- Japan
- Virgin Islands, U.S.
- Colombia
- South Africa
- Saudi Arabia
- Greece
- Global
- Mozambique
- Australia
- Indonesia
- Taiwan, Province of China
- Poland
- Nigeria
- Romania
- Cyprus
- Ireland
- Luxembourg
- Hong Kong
- United Arab Emirates
- Czech Republic
- France
- Ukraine
- Haiti
- Uruguay
- Turkey
- Georgia
- Samoa
- Dominican Republic
- Singapore
- Portugal
- Canada
- Ethiopia
- New Zealand
- Saint Vincent and the Grenadines
- Egypt
- Angola
- Netherlands
- Bahamas
- United Kingdom
- Oman
- Finland
- Korea, Republic of
- Iran, Islamic Republic of
- Trinidad and Tobago
Discover the adversaries targeting your industry
Search Your Enemy