TAG EXPLORER
// BROWSE THREAT INTELLIGENCE BY TAG — 416 UNIQUE TAGS IN CACHE
All Tags
supply chain attack 5
rat 5
credential theft 5
infostealer 5
clickfix 4
north korea 4
phishing 4
social engineering 3
coinminer 3
data exfiltration 3
dll sideloading 3
session hijacking 2
xmrig 2
juicypotato 2
ransomware 2
ssh backdoor 2
dprk 2
chm dropper 2
rat-as-a-service 2
android 2
contagious interview 2
plugx 2
korplug 2
spear-phishing 2
botnet 2
javascript 2
seo poisoning 2
cryptocurrency wallet 2
macos 2
oauth 2
exploit 2
apt 2
chrome extensions 1
google identity theft 1
browser backdoor 1
session-hijacking 1
credential-theft 1
banking-stealer 1
apt37 1
zoho workdrive c2 1
rokrat 1
shellcode injection 1
process hollowing 1
installer tampering 1
pretexting 1
facebook reconnaissance 1
shellbot 1
prometei 1
credential attacks 1
ddos botnet 1
chinese attribution 1
mirai 1
xorddos 1
p2pinfect 1
v2ray 1
v2ray proxy 1
honeypot analysis 1
linux servers 1
ssh brute-force 1
gafgyt 1
tsunami 1
dictionary attack 1
brute force 1
scanner 1
loveminer 1
gh0strat 1
database servers 1
shadowforce 1
mysql 1
ice cloud 1
credential stuffing 1
clrshell 1
netcat 1
mykings 1
ms-sql 1
cve-2026-27944 1
cve-2021-30952 1
ghostsaber 1
cve-2026-3909 1
cve-2026-33032 1
cve-2026-3564 1
cve-2026-20963 1
plasmaloader 1
cve-2025-53521 1
cve-2026-20131 1
ghostknife 1
cve-2025-68613 1
cve-2025-32432 1
cve-2026-3910 1
cve-2025-54068 1
ghostblade 1
cve-2023-41974 1
cve-2026-3055 1
deserialization vulnerability 1
cve-2026-26127 1
cve-2026-33634 1
cve-2026-27483 1
cve-2017-7921 1
remote code execution 1
ios exploit kit 1
cve-2026-21262 1
cve-2026-25187 1
plasmagrid 1
cve-2026-21385 1
cve-2026-33017 1
cve-2025-26399 1
zero-day exploitation 1
cisco fmc 1
iis 1
apache tomcat 1
jsprat 1
cve-2019-1458 1
windows web servers 1
privilege escalation 1
badpotato 1
rdp compromise 1
porttranc 1
web shell 1
htran 1
port forwarding 1
printspoofer 1
sleek-pretty 1
authorized_keys persistence 1
polymarket 1
clob api 1
wallet credential exfiltration 1
npm supply chain 1
cryptocurrency theft 1
apt43 1
korean targeting 1
vbscript stager 1
naver phishing 1
credential harvesting 1
powershell keylogger 1
netstruct 1
bigmathlib 1
graphrix 1
terminal-kleur 1
bignum 1
pypi packages 1
graphorbit 1
graphnetworkx 1
bigmathix 1
fake recruitment 1
graphalgo 1
graphnode 1
bignumx 1
graphlibx 1
graphflowx 1
bignumberx 1
npm packages 1
bignumex 1
graphhub 1
javascript developers 1
graphlink 1
graphdict 1
cryptocurrency targeting 1
graphflux 1
graphlibcore 1
graphnet 1
graphsync 1
bigmathex 1
graphkitx 1
graphex 1
graphchain 1
bigmathutils 1
bigpyx 1
blockchain 1
terminalcolor256 1
python developers 1
phishing-as-a-service 1
refundee 1
webdav 1
bulgarian-infrastructure 1
shadow panel 1
shadow-panel 1
powershell 1
cryptocurrency-theft 1
spanish-portuguese-targeting 1
apk-builder 1
arabic-language 1
c2-infrastructure 1
ddns 1
cve-2023-44487 1
surveillance 1
cve-2025-23419 1
syria 1
aso rat 1
mobile-malware 1
cve-2025-8088 1
cve-2025-6218 1
stealer 1
ukraine targeting 1
winrar exploitation 1
phishing campaign 1
giftedcrook 1
powershell payload 1
rc4 encryption 1
koalemos 1
invisibleferret 1
vercel c2 1
beavertail 1
npm 1
ottercookie 1
javascript obfuscation 1
supply-chain 1
adobe reader 1
0-day 1
china-nexus 1
destroyrat 1
arabian gulf 1
doplugs 1
sogu 1
kaba 1
tvt 1
control flow flattening 1
thoper 1
reflective loading 1
lnk file 1
tradedownloader 1
ghostsocks 1
zero trust 1
github delivery 1
vidar 1
vidar stealer 1
trojanized repositories 1
ai security 1
claude code leak 1
ghostsocks trojan 1
mirax 1
spanish targets 1
teabot 1
albiriox 1
residential proxy 1
html overlay 1
banking trojan 1
socks5 1
meta advertisements 1
supply chain compromise 1
cpu-z 1
cryptbase.dll 1
cpuid.com 1
stx rat 1
watering hole attack 1
hwmonitor 1
minidionis 1
cozer 1
cloudlook 1
json-configuration 1
cloudduke 1
cozycar 1
seadaddy 1
seadesk 1
government-targeting 1
seaduke 1
multi-stage-dropper 1
cozyduke 1
cozybear 1
https-c2 1
euroapt 1
forkmeimfamous 1
ddos 1
vulnerability exploitation 1
rondodox 1
iot 1
castlerat 1
deno 1
api abuse 1
fortigate 1
ngfw 1
cve-2025-59719 1
cve-2025-59718 1
rmm tools 1
cve-2026-24858 1
lateral movement 1
iot devices 1
kademlia dht 1
kadnap 1
proxy service 1
malvertising 1
credential phishing 1
cve-2025-27152 1
payroll fraud 1
aitm 1
token theft 1
canadian targeting 1
in-memory execution 1
powershell staging 1
com abuse 1
remote access tool 1
peb manipulation 1
screenconnect 1
vbscript loader 1
uac bypass 1
axios package 1
postinstall script 1
developer environments 1
npm package compromise 1
dependency poisoning 1
ci/cd pipelines 1
rat deployment 1
macsync stealer 1
maas 1
ledger trojanization 1
macsync 1
prospy 1
hack-for-hire 1
civil-society-targeting 1
mena 1
tospy 1
dracarys 1
journalists 1
regional-surveillance 1
windows update 1
france 1
microsoft 1
python 1
electron 1
kela 1
indonesia 1
canis 1
cross platform 1
browser 1
lucidrook 1
spearphishing 1
lucidpawn 1
lucidknight 1
taiwan 1
atomicstealer 1
applescript 1
exfiltration 1
msbuild.exe 1
sysmon.py 1
persistence 1
steganography 1
pypi 1
kubernetes 1
supply chain 1
venom stealer 1
impersonation 1
scare tactics 1
fake antivirus 1
quasar rat 1
stormkitty 1
evasion techniques 1
tp-link 1
dns hijacking 1
russia 1
apt28 1
javascript trojan 1
dprk attribution 1
axios library 1
cross-platform rat 1
plain-crypto-js 1
waveshaper 1
waveshaper overlap 1
npm hijacking 1
developer tooling 1
staged loader 1
pypi npm 1
cross-ecosystem 1
persistence mechanisms 1
remote desktop 1
nightspire 1
ransomware-as-a-service 1
raas 1
file encryption 1
chrome remoting desktop 1
megasync 1
anydesk 1
lumma stealer 1
application-bound encryption bypass 1
blockchain c2 1
tenzor 1
etherhiding 1
64-bit variant 1
remus 1
aurastealer 1
voidstealer 1
rhadamanthys 1
post-install execution 1
axios 1
toneshell 1
cloudflare turnstile 1
TA416 1
React2Shell 1
Kubernetes 1
psexec 1
medusa 1
remote access 1
storm-1175 1
muddywater 1
seedworm 1
government 1
iran 1
stryker 1
dll side-loading 1
iranian 1
rdp 1
fmapp.dll 1
ssh tunnel 1
stealc 1
shellcode 1
lotuslite 1
middle east 1
meme-coin 1
backdoor 1
donation scam 1
superdump 1
xnote 1
antsword 1
scanportplus 1
godzilla 1
sliver 1
fast reverse proxy 1
cyberespionage 1
Pulses tagged "social engineering" — 3
Pretexting-Based Targeted Intrusion: Analysis of Facebook Reconnaissance and Software Tampering Attacks
21
IOCs
Threat Actors Leverage Claude Code Leak as Social Engineering Lure to Distribute Malicious Payloads via GitHub
20
IOCs
CastleRAT attack first to abuse Deno JavaScript runtime to evade enterprise security
6
IOCs