Name | Tags | Incidents | Techniques |
---|---|---|---|
CommercialDual-use | |||
EnumerationActive Directory | |||
RAT | |||
Ransomware | |||
Attacker-sideToolkit | |||
Toolkit | |||
TrojanMalware | |||
CommercialDual-use | |||
OffSecDual-use | |||
OffSecK8sAttacker-sideDual-use | |||
CryptominerCloud | |||
OffSecToolkitAttacker-sideDual-use | |||
OffSecToolkitAttacker-sideCloudDual-use | |||
Ransomware | |||
Ransomware | |||
OffSecDual-use | |||
Malware | |||
Dual-use | |||
Malware | |||
RansomwareMalware | |||
OffSecK8sDual-use | |||
WormCryptominer | |||
Backdoor | |||
RAT | |||
Ransomware | |||
Webshell | |||
Proxy | |||
Trojan | |||
OffSecCloudDual-use | |||
OffSecAttacker-sideCloudDual-use | |||
OffSecDual-use | |||
OffSecDual-use | |||
Cryptominer | |||
OffSecDual-use | |||
Dual-use | |||
Ransomware | |||
DDoS | |||
MalwareWindows | |||
Cryptominer | |||
ToolkitOffSecCloudDual-use | |||
Cryptominer | |||
Rootkit | |||
RAT | |||
Proxy | |||
Botnet | |||
OffSecDual-use | |||
ToolkitOffSecCloudDual-use | |||
ToolkitMalwareAttacker-side | |||
OffSecDual-use | |||
ToolkitCI/CDDual-use | |||
MalwareRAT | |||
Malware | |||
Cryptominer | |||
Botnet | |||
Webshell | |||
Botnet | |||
WormCryptominer | |||
ToolkitAttacker-side | |||
OffSecDual-use | |||
Cryptominer | |||
Cryptominer | |||
DDoSBotnet | |||
Ransomware | |||
Ransomware | |||
OffSecDual-use | |||
OffSecToolkitDual-use | |||
OffSecDual-use | |||
CommercialDual-useProxy | |||
DDoS | |||
Cloud | |||
RAT | |||
OffSecK8sDual-use | |||
K8sOffSecDual-use | |||
OffSecK8sDual-use | |||
OffSecK8sDual-use | |||
OffSecDual-use | |||
OffSecMalware | |||
ToolkitAttacker-side | |||
OffSecToolkitCloudDual-use | |||
MalwareRATReverse shell | |||
MalwareBackdoor | |||
OffSecDual-use | |||
OffSecDual-use | |||
Ransomware | |||
Cryptominer | |||
Botnet | |||
OffSecDual-use | |||
Malware | |||
OffSecDual-use | |||
OffSecDual-use | |||
Ransomware | |||
Dual-use | |||
OffSecMalwareDual-use | |||
OffSecDual-use | |||
Cryptominer | |||
Ransomware | |||
MalwareTrojanRATBackdoor | |||
Dual-use | |||
Ransomware | |||
OffSecDual-use | |||
Reverse shell | |||
BotnetCryptominer | |||
RAT | |||
DDoSBotnet | |||
OffSecDual-use | |||
ProxyDual-use | |||
OffSecK8sDual-use | |||
ToolkitCloudDual-use | |||
OffSecDual-use | |||
Botnet | |||
OffSecDual-use | |||
CommercialDual-useProxy | |||
Dual-use | |||
Cryptominer | |||
OffSecProxyDual-use | |||
Ransomware | |||
OffSecK8sDual-use | |||
Malware | |||
Rootkit | |||
Cloud | |||
OffSecDual-use | |||
Cryptominer | |||
OffSecDual-use | |||
OffSecDual-use | |||
Dual-use | |||
Dual-use | |||
Linux | |||
Botnet | |||
MalwareCryptominer | |||
Malware | |||
CryptominerMalware | |||
OffSecDual-use | |||
OffSecDual-use | |||
LinuxRootkit | |||
ToolkitAttacker-side | |||
ProxyDual-use | |||
Cryptominer | |||
OffSecWormDual-use | |||
OffSecToolkitCloudDual-use | |||
OffSecK8sCloudDual-use | |||
Backdoor | |||
BackdoorOffSec | |||
CryptominerBotnet | |||
Malware | |||
Dropper | |||
Ransomware | |||
OffSecDual-use | |||
ToolkitAttacker-side | |||
Ransomware | |||
OffSecDual-use | |||
Backdoor | |||
Cryptominer | |||
Cryptominer | SilentBob cryptomining campaignApache server Cryptojacking with Cobalt StrikeDreambus campaign (2021)ScarletEel campaign (Feb ‘23)ScarletEel campaign (July ‘23)Denonia campaignDreambus campaign (2023)9hits Docker campaignMimo cryptomining campaignCommando Cat campaignECS Fargate cryptojackingMigo cryptominer targeting RedisLucifer Botnet targeting HadoopSliver deployment via Confluence vulnerabilityz0Miner targeting WebLogic serversWidespread TeamCity exploitation (March ‘24)RUBYCARP: Botnet Exploiting Vulnerabilities for CryptoCryptojacking via Azure BatchKinsing targeting cloud serversMexals cryptojacking campaignRedTail Cryptomining campaign PG_MEM Malware Exploiting Misconfigured PostreSQL InstancesConfluence exploited for cryptojackingperfctl Malware Targeting Linux | ||
BotnetDDoS | |||
Backdoor | |||
OffSecDual-use | |||