| IOC / Reference | Classification | Actor | Risk Score |
|---|---|---|---|
| CVE-2026-74321 | Phishing | Dragonfly | 31/100 |
| CVE-2026-66125 | Adware | Cleaver | 50/100 |
| CVE-2026-15330 | Spear Phishing | Mustang Panda | 78/100 |
| CVE-2026-30120 | Worm | Stone Panda | 67/100 |
| CVE-2026-88984 | SQL Injection | Cicada | 30/100 |
| CVE-2026-88993 | Lateral Movement | Wicked Panda | 67/100 |
| CVE-2026-68462 | Brute Force | Magecart | 79/100 |
| CVE-2026-8461 | Spear Phishing | Carbanak | 55/100 |
| CVE-2026-39179 | Domain Shadowing | Carbanak | 73/100 |
| CVE-2026-70712 | Credential Stuffing | Sandworm | 37/100 |
| CVE-2026-53621 | Trojan | Sandworm | 64/100 |
| CVE-2026-53539 | Whaling | Turla | 69/100 |
| CVE-2026-11006 | Remote Code Execution (RCE) | Stone Panda | 83/100 |
| CVE-2026-82869 | Rainbow Table | Fin7 | 44/100 |
| CVE-2026-48964 | Buffer Overflow | Energetic Bear | 21/100 |
| CVE-2026-3993 | Advanced Persistent Threat (APT) | REvil (Sodinokibi) | 100/100 |
| CVE-2026-5733 | DDoS | Clop | 27/100 |
| CVE-2026-7073 | Domain Shadowing | MenuPass | 94/100 |
| CVE-2026-24726 | Buffer Overflow | Lazarus Group | 21/100 |
| CVE-2026-44703 | Zero-Day Exploit | Cicada | 18/100 |
| CVE-2026-45521 | Rainbow Table | REvil (Sodinokibi) | 97/100 |
| CVE-2026-98694 | Phishing | Ryuk | 67/100 |
| CVE-2026-36534 | Fileless Malware | APT33 | 39/100 |
| CVE-2026-66156 | Brute Force | Deep Panda | 78/100 |
| CVE-2026-53146 | Botnet Activity | Wicked Panda | 21/100 |
| CVE-2026-44322 | Logic Bomb | Rocket Kitten | 58/100 |
| CVE-2026-49429 | Trojan | Script Kiddie | 56/100 |
| CVE-2026-65883 | Fileless Malware | APT41 (Double Dragon) | 36/100 |
| CVE-2026-84590 | Botnet Activity | APT29 (Cozy Bear) | 82/100 |
| CVE-2026-86434 | Credential Stuffing | Sandworm | 90/100 |
| CVE-2026-92904 | SQL Injection | DarkHotel | 92/100 |
| CVE-2026-85401 | XSS | DarkHotel | 19/100 |
| CVE-2026-15962 | Polymorphic Packer | Clop | 52/100 |
| CVE-2026-24302 | Fileless Malware | Mustang Panda | 26/100 |
| CVE-2026-81994 | Keylogger | Carbanak | 97/100 |
| CVE-2026-26664 | DDoS | Cleaver | 31/100 |
| CVE-2026-43542 | SQL Injection | Kimsuky | 23/100 |
| CVE-2026-81520 | Rootkit | DarkHotel | 23/100 |
| CVE-2026-39654 | DDoS | Conti | 21/100 |
| CVE-2026-93133 | Whaling | Lazarus Group | 67/100 |
| CVE-2026-95987 | Brute Force | Cobalt Group | 64/100 |
| CVE-2026-79227 | Spear Phishing | Sandworm | 84/100 |
| CVE-2026-19807 | CSRF | APT33 | 66/100 |
| CVE-2026-73646 | Ransomware | Unattributed Cluster | 11/100 |
| CVE-2026-48402 | Logic Bomb | Unknown Actor | 19/100 |
| CVE-2026-76682 | Business Email Compromise (BEC) | Charming Kitten | 17/100 |
| CVE-2026-83050 | Business Email Compromise (BEC) | MuddyWater | 55/100 |
| CVE-2026-23098 | XSS | APT35 | 17/100 |
| CVE-2026-36430 | Rainbow Table | Mustang Panda | 28/100 |
IOC Report 45C48CCE - Active Campaigns
STATUS: ARCHIVED | HASH: ee42e1707a9dded7
Real-time threat intelligence feed for Telecom sector. Report #45C48CCE contains IoCs, TTPs, and risk scoring for active campaigns detected in the last 24 hours.
Real-time threat intelligence feed for Telecom sector. Report #45C48CCE contains IoCs, TTPs, and risk scoring for active campaigns detected in the last 24 hours.