| IOC / Reference | Classification | Actor | Risk Score |
|---|---|---|---|
| CVE-2026-82928 | Phishing | APT41 (Double Dragon) | 55/100 |
| CVE-2026-35230 | Rainbow Table | Rocket Kitten | 46/100 |
| CVE-2026-61082 | Spyware | Cleaver | 12/100 |
| CVE-2026-35725 | Rootkit | Lazarus Group | 27/100 |
| CVE-2026-5991 | XSS | Cicada | 10/100 |
| CVE-2026-23466 | Remote Code Execution (RCE) | Generic Botnet | 21/100 |
| CVE-2026-56157 | Cryptojacking | Wizard Spider | 98/100 |
| CVE-2026-9553 | C2 Communication | LockBit | 49/100 |
| CVE-2026-10004 | C2 Communication | MuddyWater | 55/100 |
| CVE-2026-32913 | Privilege Escalation | Script Kiddie | 29/100 |
| CVE-2026-94130 | Phishing | Turla | 73/100 |
| CVE-2026-20475 | Rootkit | LockBit | 83/100 |
| CVE-2026-78904 | Polymorphic Packer | Unattributed Cluster | 47/100 |
| CVE-2026-10779 | Supply Chain Attack | Lazarus Group | 55/100 |
| CVE-2026-66899 | Beaconing | APT41 (Double Dragon) | 79/100 |
| CVE-2026-61468 | Zero-Day Exploit | Lazarus Group | 95/100 |
| CVE-2026-43918 | Data Exfiltration | Charming Kitten | 43/100 |
| CVE-2026-88785 | Advanced Persistent Threat (APT) | Clop | 45/100 |
| CVE-2026-19387 | Macro Virus | Mustang Panda | 57/100 |
| CVE-2026-83205 | CSRF | Maze | 22/100 |
| CVE-2026-88506 | Spear Phishing | Cobalt Group | 48/100 |
| CVE-2026-54207 | Spear Phishing | Unknown Actor | 66/100 |
| CVE-2026-35729 | DDoS | REvil (Sodinokibi) | 11/100 |
| CVE-2026-64545 | Adware | OceanLotus | 88/100 |
| CVE-2026-53366 | Keylogger | Clop | 59/100 |
| CVE-2026-46593 | Rainbow Table | Sandworm | 33/100 |
| CVE-2026-50159 | Business Email Compromise (BEC) | Script Kiddie | 17/100 |
| CVE-2026-81989 | Worm | Wizard Spider | 43/100 |
| CVE-2026-21923 | Supply Chain Attack | Konni | 56/100 |
| CVE-2026-96298 | Dictionary Attack | Kimsuky | 46/100 |
| CVE-2026-26740 | Man-in-the-Middle | Deep Panda | 59/100 |
| CVE-2026-88924 | Whaling | Cobalt Group | 13/100 |
| CVE-2026-32692 | Zero-Day Exploit | Magecart | 64/100 |
| CVE-2026-69642 | Lateral Movement | MuddyWater | 31/100 |
| CVE-2026-50569 | Worm | Konni | 56/100 |
| CVE-2026-50957 | Botnet Activity | Gamaredon | 12/100 |
| CVE-2026-75441 | CSRF | Rocket Kitten | 19/100 |
| CVE-2026-16575 | Brute Force | Ryuk | 80/100 |
| CVE-2026-63061 | Bootkit | OceanLotus | 52/100 |
| CVE-2026-45706 | Remote Code Execution (RCE) | Generic Botnet | 12/100 |
| CVE-2026-9319 | DDoS | Fin7 | 58/100 |
| CVE-2026-91875 | Lateral Movement | Fin7 | 44/100 |
| CVE-2026-93502 | DNS Tunneling | Ryuk | 98/100 |
| CVE-2026-95218 | Cryptojacking | Deep Panda | 89/100 |
| CVE-2026-1251 | Advanced Persistent Threat (APT) | APT41 (Double Dragon) | 94/100 |
| CVE-2026-24566 | Adware | Stone Panda | 49/100 |
| CVE-2026-9891 | Polymorphic Packer | Charming Kitten | 93/100 |
| CVE-2026-70839 | Spyware | Cicada | 18/100 |
| CVE-2026-17773 | CSRF | Generic Botnet | 33/100 |
| CVE-2026-65208 | Remote Code Execution (RCE) | Magecart | 34/100 |
| CVE-2026-69113 | Whaling | Cleaver | 90/100 |
IOC Report 98F13708 - Active Campaigns
STATUS: ARCHIVED | HASH: e2dca80cf8fa8eb2
Real-time threat intelligence feed for Energy sector. Report #98F13708 contains IoCs, TTPs, and risk scoring for active campaigns detected in the last 24 hours.
Real-time threat intelligence feed for Energy sector. Report #98F13708 contains IoCs, TTPs, and risk scoring for active campaigns detected in the last 24 hours.