2016-02-29 08:42:40 +00:00
{
2016-05-16 10:00:05 +00:00
"version" : 1 ,
"description" : "Known or estimated adversary groups targeting organizations and employees. Adversary groups are regularly confused with their initial operation or campaign." ,
"authors" : [
"Alexandre Dulaunoy" ,
"Florian Roth" ,
"Thomas Schreck" ,
"Timo Steffens" ,
"Various"
] ,
"type" : "Adversary Groups" ,
"groups" : [
"Operation C-Major" ,
"Comment Crew" ,
"Sofacy" ,
"APT 29" ,
"Turla Group" ,
"Energetic Bear" ,
"Sandworm" ,
"Anunak" ,
"TeamSpy Crew" ,
"BuhTrap" ,
"Putter Panda" ,
"UPS" ,
"IXESHE" ,
"APT 16" ,
"Aurora Panda" ,
"Wekby" ,
"Axiom" ,
"Shell Crew" ,
"Naikon" ,
"Lotus Blossom" ,
"Hurricane Panda" ,
"Emissary Panda" ,
"Stone Panda" ,
"Nightshade Panda" ,
"Hellsing" ,
"Night Dragon" ,
"Mirage" ,
"Anchor Panda" ,
"NetTraveler" ,
"Ice Fog" ,
"HiddenLynx" ,
"Beijing Group" ,
"Pirate Panda" ,
"Radio Panda" ,
"Dagger Panda" ,
"Samurai Panda" ,
"Impersonating Panda" ,
"Violin Panda" ,
"Toxic Panda" ,
"Temper Panda" ,
"Flying Kitten" ,
"Viking Jackal" ,
"Cutting Kitten" ,
"Rebel Jackal" ,
"Stalker Panda" ,
"Berserk Bear" ,
"Dizzy Panda" ,
"Predator Panda" ,
"Pitty Panda" ,
"Wet Panda" ,
"Union Panda" ,
"Wolf Spider" ,
"Boulder Bear" ,
"Lotus Panda" ,
"Shark Spider" ,
"Silent Chollima" ,
"Viceroy Tiger" ,
"Pizzo Spider" ,
"Corsair Jackal" ,
"Charming Kitten" ,
"Deadeye Jackal" ,
"Spicy Panda" ,
"Magic Kitten" ,
"Keyhole Panda" ,
"Union Spider" ,
"Karma Panda" ,
"Foxy Panda" ,
"SNOWGLOBE" ,
"Sands Casino" ,
"Cleaver" ,
"Threat Group-2889" ,
"Codoso" ,
2016-05-30 13:22:24 +00:00
"Nitro" ,
2016-07-01 07:48:26 +00:00
"Stealth Falcon" ,
2016-07-05 20:19:31 +00:00
"Pacifier APT" ,
2016-07-10 10:14:54 +00:00
"HummingBad" ,
2016-08-01 13:31:44 +00:00
"Dropping Elephant" ,
2016-08-01 14:31:00 +00:00
"Operation Transparent Tribe" ,
"Poseidon Group"
2016-05-16 10:00:05 +00:00
] ,
2016-03-03 06:22:28 +00:00
"details" : [
{
2016-05-16 10:00:05 +00:00
"group" : "Comment Crew" ,
"description" : "PLA Unit 61398 (Chinese: 61398部队, Pinyin: 61398 bùduì) is the Military Unit Cover Designator (MUCD)[1] of a People's Liberation Army advanced persistent threat unit that has been alleged to be a source of Chinese computer hacking attacks" ,
"refs" : [
"https://en.wikipedia.org/wiki/PLA_Unit_61398" ,
"http://intelreport.mandiant.com/Mandiant_APT1_Report.pdf"
] ,
"country" : "CN" ,
2016-03-03 06:22:28 +00:00
"synonyms" : [
"Comment Panda" ,
"PLA Unit 61398" ,
"APT 1" ,
"Advanced Persistent Threat 1" ,
"Byzantine Candor" ,
"Group 3" ,
"TG-8223"
2016-05-16 10:00:05 +00:00
]
2016-03-03 06:22:28 +00:00
} ,
{
2016-05-16 10:00:05 +00:00
"group" : "Stalker Panda" ,
"country" : "CN"
2016-03-03 06:22:28 +00:00
} ,
2016-03-07 20:36:23 +00:00
{
2016-05-16 10:00:05 +00:00
"synonyms" : [
"Covert Grove"
] ,
2016-03-07 20:36:23 +00:00
"refs" : [
"http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/the_nitro_attacks.pdf"
] ,
2016-05-16 10:00:05 +00:00
"group" : "Nitro" ,
"country" : "CN"
2016-03-07 20:36:23 +00:00
} ,
2016-03-07 20:31:50 +00:00
{
2016-05-16 10:00:05 +00:00
"synonyms" : [
"C0d0so"
] ,
2016-03-07 20:31:50 +00:00
"refs" : [
"https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks"
] ,
2016-05-16 10:00:05 +00:00
"group" : "Codoso" ,
"country" : "CN"
2016-03-07 20:31:50 +00:00
} ,
2016-03-04 06:37:54 +00:00
{
"refs" : [
2016-05-16 10:00:05 +00:00
"http://www.rsaconference.com/writable/presentations/file_upload/anf-t07b-the-art-of-attribution-identifying-and-pursuing-your-cyber-adversaries_final.pdf"
] ,
"description" : "Adversary targeting dissident groups in China and its surroundings." ,
"group" : "Karma Panda" ,
"country" : "CN"
2016-03-04 06:37:54 +00:00
} ,
2016-03-04 06:34:14 +00:00
{
2016-05-16 10:00:05 +00:00
"group" : "Keyhole Panda" ,
"country" : "CN"
2016-03-04 06:34:14 +00:00
} ,
2016-03-03 06:22:28 +00:00
{
2016-05-16 10:00:05 +00:00
"group" : "Wet Panda" ,
"country" : "CN"
2016-03-03 06:22:28 +00:00
} ,
2016-03-04 06:41:06 +00:00
{
2016-05-16 10:00:05 +00:00
"description" : "Adversary group targeting telecommunication and technology organizations." ,
2016-03-04 06:41:06 +00:00
"group" : "Foxy Panda" ,
2016-05-16 10:00:05 +00:00
"country" : "CN"
2016-03-04 06:41:06 +00:00
} ,
2016-03-03 06:22:28 +00:00
{
2016-05-16 10:00:05 +00:00
"group" : "Predator Panda" ,
"country" : "CN"
2016-03-03 06:22:28 +00:00
} ,
{
2016-05-16 10:00:05 +00:00
"group" : "Union Panda" ,
"country" : "CN"
2016-03-03 06:22:28 +00:00
} ,
{
2016-05-16 10:00:05 +00:00
"group" : "Spicy Panda" ,
"country" : "CN"
2016-03-03 06:22:28 +00:00
} ,
{
2016-05-16 10:00:05 +00:00
"group" : "Eloquent Panda" ,
"country" : "CN"
2016-03-03 06:22:28 +00:00
} ,
{
2016-05-16 10:00:05 +00:00
"group" : "Emissary Panda" ,
"description" : "A China-based actor that targets foreign embassies to collect data on government, defence, and technology sectors." ,
2016-03-03 06:22:28 +00:00
"refs" : [
"http://www.scmagazineuk.com/iran-and-russia-blamed-for-state-sponsored-espionage/article/330401/"
] ,
2016-05-16 10:00:05 +00:00
"country" : "CN"
2016-03-03 06:22:28 +00:00
} ,
{
2016-05-16 10:00:05 +00:00
"group" : "Dizzy Panda" ,
2016-03-03 06:22:28 +00:00
"synonyms" : [
"LadyBoyle"
2016-05-16 10:00:05 +00:00
]
2016-03-03 06:22:28 +00:00
} ,
{
2016-05-16 10:00:05 +00:00
"group" : "Putter Panda" ,
"description" : "The CrowdStrike Intelligence team has been tracking this particular unit since 2012, under the codename PUTTER PANDA, and has documented activity dating back to 2007. The report identifies Chen Ping, aka cpyy, and the primary location of Unit 61486. " ,
"refs" : [
"http://cdn0.vox-cdn.com/assets/4589853/crowdstrike-intelligence-report-putter-panda.original.pdf"
] ,
"country" : "CN" ,
2016-03-03 06:22:28 +00:00
"synonyms" : [
"PLA Unit 61486" ,
"APT 2" ,
"Group 36" ,
"APT-2" ,
"MSUpdater" ,
"4HCrew" ,
"SULPHUR"
2016-05-16 10:00:05 +00:00
]
2016-03-03 06:22:28 +00:00
} ,
{
2016-05-16 10:00:05 +00:00
"group" : "UPS" ,
"refs" : [
"https://www.fireeye.com/blog/threat-research/2015/06/operation-clandestine-wolf-adobe-flash-zero-day.html"
] ,
"country" : "CN" ,
2016-03-03 06:22:28 +00:00
"synonyms" : [
"Gothic Panda" ,
"TG-0110" ,
"APT 3" ,
"Group 6"
2016-05-16 10:00:05 +00:00
]
2016-03-03 06:22:28 +00:00
} ,
2016-06-12 15:07:33 +00:00
{
"group" : "darkhotel" ,
"refs" : [
"https://securelist.com/blog/research/71713/darkhotels-attacks-in-2015/" , "https://blogs.technet.microsoft.com/mmpc/2016/06/09/reverse-engineering-dubnium-2"
] ,
"synonyms" : [
"DUBNIUM"
]
} ,
2016-03-03 06:22:28 +00:00
{
2016-05-16 10:00:05 +00:00
"group" : "IXESHE" ,
"description" : "A group of China-based attackers, who conducted a number of spear phishing attacks in 2013." ,
"refs" : [
"http://www.crowdstrike.com/blog/whois-numbered-panda/"
] ,
"country" : "CN" ,
2016-03-03 06:22:28 +00:00
"synonyms" : [
"Numbered Panda" ,
"TG-2754" ,
"BeeBus" ,
"Group 22" ,
"DynCalc" ,
"Crimson Iron"
2016-05-16 10:00:05 +00:00
]
2016-03-03 06:22:28 +00:00
} ,
{
2016-05-16 10:00:05 +00:00
"group" : "APT 16" ,
2016-03-03 06:22:28 +00:00
"refs" : [
"https://www.fireeye.com/blog/threat-research/2015/12/the_eps_awakens.html"
] ,
2016-05-16 10:00:05 +00:00
"country" : "CN"
2016-03-03 06:22:28 +00:00
} ,
{
2016-05-16 10:00:05 +00:00
"group" : "Aurora Panda" ,
"refs" : [
"http://www.fireeye.com/blog/technical/cyber-exploits/2013/09/operation-deputydog-zero-day-cve-2013-3893-attack-against-japanese-targets.html"
] ,
"country" : "CN" ,
2016-03-03 06:22:28 +00:00
"synonyms" : [
"APT 17" ,
"Deputy Dog" ,
"Group 8"
2016-05-16 10:00:05 +00:00
]
2016-03-03 06:22:28 +00:00
} ,
{
2016-05-16 10:00:05 +00:00
"group" : "Wekby" ,
"refs" : [
"https://threatpost.com/apt-gang-branches-out-to-medical-espionage-in-community-health-breach/107828"
] ,
"country" : "CN" ,
2016-03-03 06:22:28 +00:00
"synonyms" : [
"Dynamite Panda" ,
"TG-0416" ,
"APT 18" ,
"SCANDIUM"
2016-05-16 10:00:05 +00:00
]
2016-03-03 06:22:28 +00:00
} ,
{
2016-05-16 10:00:05 +00:00
"group" : "Axiom" ,
"refs" : [
2016-06-01 07:06:58 +00:00
"http://securelist.com/blog/research/57585/winnti-faq-more-than-just-a-game/" ,
"http://williamshowalter.com/a-universal-windows-bootkit/"
2016-05-16 10:00:05 +00:00
] ,
"country" : "CN" ,
2016-03-03 06:22:28 +00:00
"synonyms" : [
"Winnti Group" ,
"Tailgater Team" ,
"Group 72" ,
"Group72" ,
"Tailgater" ,
"Ragebeast"
2016-05-16 10:00:05 +00:00
]
2016-03-03 06:22:28 +00:00
} ,
{
2016-05-16 10:00:05 +00:00
"group" : "Shell Crew" ,
"refs" : [
"http://cybercampaigns.net/wp-content/uploads/2013/06/Deep-Panda.pdf" ,
"http://www.rsaconference.com/writable/presentations/file_upload/anf-t07b-the-art-of-attribution-identifying-and-pursuing-your-cyber-adversaries_final.pdf"
] ,
"country" : "CN" ,
"description" : "Adversary group targeting financial, technology, non-profit organisations." ,
2016-03-03 06:22:28 +00:00
"synonyms" : [
"Deep Panda" ,
"WebMasters" ,
"APT 19" ,
"KungFu Kittens" ,
"Black Vine" ,
"Group 13" ,
"PinkPanther" ,
"Sh3llCr3w"
2016-05-16 10:00:05 +00:00
]
2016-03-03 06:22:28 +00:00
} ,
{
2016-05-16 10:00:05 +00:00
"group" : "Naikon" ,
"refs" : [
"https://securelist.com/analysis/publications/69953/the-naikon-apt/" ,
"http://www.fireeye.com/blog/technical/malware-research/2014/03/spear-phishing-the-news-cycle-apt-actors-leverage-interest-in-the-disappearance-of-malaysian-flight-mh-370.html"
] ,
"country" : "CN" ,
2016-03-03 06:22:28 +00:00
"synonyms" : [
"PLA Unit 78020" ,
"APT 30" ,
"Override Panda" ,
2016-03-23 06:17:15 +00:00
"Camerashy" ,
"APT.Naikon"
2016-05-16 10:00:05 +00:00
]
2016-03-03 06:22:28 +00:00
} ,
{
2016-05-16 10:00:05 +00:00
"group" : "Lotus Blossom" ,
2016-03-03 06:22:28 +00:00
"refs" : [
"https://securelist.com/blog/research/70726/the-spring-dragon-apt/"
] ,
2016-05-16 10:00:05 +00:00
"country" : "CN" ,
"synonyms" : [
"Spring Dragon" ,
"ST Group"
]
2016-03-03 06:22:28 +00:00
} ,
{
2016-05-16 10:00:05 +00:00
"group" : "Lotus Panda" ,
"country" : "CN" ,
2016-03-03 06:22:28 +00:00
"synonyms" : [
"Elise"
2016-05-16 10:00:05 +00:00
]
2016-03-03 06:22:28 +00:00
} ,
{
2016-05-16 10:00:05 +00:00
"group" : "Hurricane Panda" ,
2016-03-03 06:22:28 +00:00
"refs" : [
"http://www.crowdstrike.com/blog/cyber-deterrence-in-action-a-story-of-one-long-hurricane-panda-campaign/"
] ,
2016-05-16 10:00:05 +00:00
"country" : "CN"
2016-03-03 06:22:28 +00:00
} ,
{
2016-05-16 10:00:05 +00:00
"group" : "Emissary Panda" ,
"refs" : [
"http://www.secureworks.com/cyber-threat-intelligence/threats/threat-group-3390-targets-organizations-for-cyberespionage/"
] ,
"country" : "CN" ,
2016-03-03 06:22:28 +00:00
"synonyms" : [
"TG-3390" ,
"APT 27" ,
"TEMP.Hippo" ,
"Group 35" ,
"HIPPOTeam" ,
"APT27"
2016-05-16 10:00:05 +00:00
]
2016-03-03 06:22:28 +00:00
} ,
{
2016-05-16 10:00:05 +00:00
"group" : "Stone Panda" ,
"country" : "CN" ,
2016-03-03 06:22:28 +00:00
"synonyms" : [
"APT10" ,
"APT 10" ,
"menuPass" ,
"happyyongzi" ,
"POTASSIUM"
2016-05-16 10:00:05 +00:00
]
2016-03-03 06:22:28 +00:00
} ,
{
2016-05-16 10:00:05 +00:00
"group" : "Nightshade Panda" ,
"refs" : [
"https://otx.alienvault.com/pulse/55bbc68e67db8c2d547ae393/"
] ,
"country" : "CN" ,
2016-03-03 06:22:28 +00:00
"synonyms" : [
"APT 9" ,
"Flowerlady/Flowershow" ,
"Flowerlady" ,
"Flowershow"
2016-05-16 10:00:05 +00:00
]
2016-03-03 06:22:28 +00:00
} ,
{
2016-05-16 10:00:05 +00:00
"group" : "Hellsing" ,
2016-03-03 06:22:28 +00:00
"refs" : [
"https://securelist.com/analysis/publications/69567/the-chronicles-of-the-hellsing-apt-the-empire-strikes-back/"
] ,
2016-05-16 10:00:05 +00:00
"country" : "CN" ,
"synonyms" : [
"Goblin Panda" ,
"Cycldek"
]
2016-03-03 06:22:28 +00:00
} ,
{
2016-05-16 10:00:05 +00:00
"group" : "Night Dragon" ,
2016-03-03 06:22:28 +00:00
"refs" : [
"https://kc.mcafee.com/corporate/index?page=content&id=KB71150"
] ,
2016-05-16 10:00:05 +00:00
"country" : "CN"
2016-03-03 06:22:28 +00:00
} ,
{
2016-05-16 10:00:05 +00:00
"group" : "Mirage" ,
"refs" : [
"https://www.fireeye.com/blog/threat-research/2014/09/forced-to-adapt-xslcmd-backdoor-now-on-os-x.html"
] ,
"country" : "CN" ,
2016-03-03 06:22:28 +00:00
"synonyms" : [
"Vixen Panda" ,
"Ke3Chang" ,
"GREF" ,
"Playful Dragon"
2016-05-16 10:00:05 +00:00
]
2016-03-03 06:22:28 +00:00
} ,
{
2016-05-16 10:00:05 +00:00
"group" : "Anchor Panda" ,
"refs" : [
"http://www.crowdstrike.com/blog/whois-anchor-panda/"
] ,
2016-03-03 06:22:28 +00:00
"synonyms" : [
"APT14" ,
"APT 14" ,
"QAZTeam" ,
"ALUMINUM"
] ,
2016-05-16 10:00:05 +00:00
"country" : "CN"
2016-03-03 06:22:28 +00:00
} ,
{
2016-05-16 10:00:05 +00:00
"group" : "NetTraveler" ,
2016-03-03 06:22:28 +00:00
"refs" : [
"https://securelist.com/blog/research/35936/nettraveler-is-running-red-star-apt-attacks-compromise-high-profile-victims/"
] ,
2016-05-16 10:00:05 +00:00
"country" : "CN"
2016-03-03 06:22:28 +00:00
} ,
{
2016-05-16 10:00:05 +00:00
"group" : "Ice Fog" ,
2016-03-03 06:22:28 +00:00
"refs" : [
"https://securelist.com/blog/research/57331/the-icefog-apt-a-tale-of-cloak-and-three-daggers/"
] ,
2016-05-16 10:00:05 +00:00
"country" : "CN" ,
"synomyns" : [
"IceFog" ,
"Dagger Panda"
]
2016-03-03 06:22:28 +00:00
} ,
{
2016-05-16 10:00:05 +00:00
"group" : "Pitty Panda" ,
"country" : "CN" ,
2016-03-03 06:22:28 +00:00
"synonyms" : [
"PittyTiger" ,
"MANGANESE"
2016-05-16 10:00:05 +00:00
]
2016-03-03 06:22:28 +00:00
} ,
2016-03-23 06:17:15 +00:00
{
"refs" : [
2016-05-16 10:00:05 +00:00
"http://researchcenter.paloaltonetworks.com/2015/12/bbsrat-attacks-targeting-russian-organizations-linked-to-roaming-tiger/"
] ,
"group" : "Roaming Tiger"
2016-03-23 06:17:15 +00:00
} ,
2016-03-03 06:22:28 +00:00
{
2016-05-16 10:00:05 +00:00
"group" : "HiddenLynx" ,
2016-03-03 06:22:28 +00:00
"refs" : [
"http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/hidden_lynx.pdf"
] ,
2016-05-16 10:00:05 +00:00
"country" : "CN"
2016-03-03 06:22:28 +00:00
} ,
{
2016-05-16 10:00:05 +00:00
"group" : "Beijing Group" ,
"country" : "CN"
2016-03-03 06:22:28 +00:00
} ,
{
2016-05-16 10:00:05 +00:00
"group" : "Radio Panda" ,
"country" : "CN"
2016-03-03 06:22:28 +00:00
} ,
{
2016-05-16 10:00:05 +00:00
"group" : "Dagger Panda" ,
"country" : "CN"
2016-03-03 06:22:28 +00:00
} ,
2016-03-23 06:17:15 +00:00
{
"refs" : [
"http://researchcenter.paloaltonetworks.com/2015/09/chinese-actors-use-3102-malware-in-attacks-on-us-government-and-eu-media/"
2016-05-16 10:00:05 +00:00
] ,
"country" : "CN" ,
"group" : "APT.3102"
2016-03-23 06:17:15 +00:00
} ,
2016-03-03 06:22:28 +00:00
{
2016-05-16 10:00:05 +00:00
"group" : "Samurai Panda" ,
"refs" : [
"http://www.crowdstrike.com/blog/whois-samurai-panda/"
] ,
"country" : "CN" ,
2016-03-03 06:22:28 +00:00
"synonyms" : [
"PLA Navy" ,
"APT4" ,
2016-03-26 21:09:04 +00:00
"APT 4" ,
"Getkys" ,
"SykipotGroup" ,
"Wkysol"
2016-05-16 10:00:05 +00:00
]
2016-03-03 06:22:28 +00:00
} ,
{
2016-05-16 10:00:05 +00:00
"group" : "Impersonating Panda" ,
"country" : "CN"
2016-03-03 06:22:28 +00:00
} ,
{
2016-05-16 10:00:05 +00:00
"group" : "Violin Panda" ,
2016-03-03 06:22:28 +00:00
"synonyms" : [
"APT20" ,
"APT 20" ,
"TH3Bug"
] ,
2016-05-16 10:00:05 +00:00
"country" : "CN"
2016-03-03 06:22:28 +00:00
} ,
{
2016-05-16 10:00:05 +00:00
"group" : "Toxic Panda" ,
2016-03-03 06:22:28 +00:00
"refs" : [
"http://www.rsaconference.com/writable/presentations/file_upload/anf-t07b-the-art-of-attribution-identifying-and-pursuing-your-cyber-adversaries_final.pdf"
] ,
2016-05-16 10:00:05 +00:00
"description" : "A group targeting dissident groups in China and at the boundaries." ,
"country" : "CN"
2016-03-03 06:22:28 +00:00
} ,
{
2016-05-16 10:00:05 +00:00
"group" : "Temper Panda" ,
"refs" : [
2016-08-01 14:15:52 +00:00
"https://www.fireeye.com/blog/threat-research/2013/10/know-your-enemy-tracking-a-rapidly-evolving-apt-actor.html" ,
"https://www.fireeye.com/blog/threat-research/2015/11/china-based-threat.html"
2016-05-16 10:00:05 +00:00
] ,
"country" : "CN" ,
2016-03-03 06:22:28 +00:00
"synonyms" : [
"Admin338" ,
"Team338" ,
"MAGNESIUM" ,
"admin@338"
2016-08-01 14:15:52 +00:00
] ,
"description" : "China-based cyber threat group. It has previously used newsworthy events as lures to deliver malware and has primarily targeted organizations involved in financial, economic, and trade policy, typically using publicly available RATs such as PoisonIvy, as well as some non-public backdoors."
2016-03-03 06:22:28 +00:00
} ,
{
2016-05-16 10:00:05 +00:00
"group" : "Pirate Panda" ,
2016-03-03 06:22:28 +00:00
"synonyms" : [
"APT23" ,
"KeyBoy"
] ,
2016-05-16 10:00:05 +00:00
"country" : "CN"
2016-03-03 06:22:28 +00:00
} ,
{
2016-05-16 10:00:05 +00:00
"group" : "Flying Kitten" ,
2016-03-03 06:22:28 +00:00
"synonyms" : [
"SaffronRose" ,
"AjaxSecurityTeam"
] ,
2016-05-16 10:00:05 +00:00
"country" : "IR"
2016-03-03 06:22:28 +00:00
} ,
{
2016-05-16 10:00:05 +00:00
"group" : "Cutting Kitten" ,
2016-03-03 06:22:28 +00:00
"synonyms" : [
"ITSecTeam"
] ,
2016-05-16 10:00:05 +00:00
"country" : "IR"
2016-03-03 06:22:28 +00:00
} ,
{
2016-05-16 10:00:05 +00:00
"group" : "Charming Kitten" ,
2016-03-03 06:22:28 +00:00
"synonyms" : [
"Newscaster" ,
"Parastoo"
] ,
2016-05-16 10:00:05 +00:00
"country" : "IR"
2016-03-03 06:22:28 +00:00
} ,
{
2016-05-16 10:00:05 +00:00
"group" : "Magic Kitten" ,
"description" : "An established group of cyber attackers based in Iran, who carried on several campaigns in 2013, including a series of attacks targeting political dissidents and those supporting Iranian political opposition." ,
2016-03-03 06:22:28 +00:00
"refs" : [
"http://www.scmagazineuk.com/iran-and-russia-blamed-for-state-sponsored-espionage/article/330401/"
] ,
2016-05-16 10:00:05 +00:00
"country" : "IR"
2016-03-03 06:22:28 +00:00
} ,
2016-03-07 20:17:56 +00:00
{
2016-05-16 10:00:05 +00:00
"group" : "Cleaver" ,
2016-03-07 20:17:56 +00:00
"refs" : [
"http://cdn2.hubspot.net/hubfs/270968/assets/Cleaver/Cylance_Operation_Cleaver_Report.pdf"
] ,
2016-05-16 10:00:05 +00:00
"synonyms" : [
"Operation Cleaver"
] ,
"country" : "IR"
2016-03-07 20:17:56 +00:00
} ,
2016-03-07 20:20:54 +00:00
{
2016-05-16 10:00:05 +00:00
"group" : "Sands Casino" ,
"country" : "IR"
2016-03-07 20:20:54 +00:00
} ,
2016-03-07 20:24:24 +00:00
{
2016-05-16 10:00:05 +00:00
"group" : "Threat Group-2889" ,
"description" : "While tracking a suspected Iran-based threat group known as Threat Group-2889[1] (TG-2889), Dell SecureWorks Counter Threat Unit™ (CTU) researchers uncovered a network of fake LinkedIn profiles. These convincing profiles form a self-referenced network of seemingly established LinkedIn users. CTU researchers assess with high confidence the purpose of this network is to target potential victims through social engineering. Most of the legitimate LinkedIn accounts associated with the fake accounts belong to individuals in the Middle East, and CTU researchers assess with medium confidence that these individuals are likely targets of TG-2889." ,
2016-03-07 20:24:24 +00:00
"refs" : [
"http://www.secureworks.com/cyber-threat-intelligence/threats/suspected-iran-based-hacker-group-creates-network-of-fake-linkedin-profiles/"
] ,
2016-05-16 10:00:05 +00:00
"synonyms" : [
"TG-2889"
] ,
"country" : "IR"
2016-03-07 20:24:24 +00:00
} ,
2016-03-03 06:22:28 +00:00
{
2016-05-16 10:00:05 +00:00
"group" : "Rebel Jackal" ,
2016-03-03 06:22:28 +00:00
"synonyms" : [
"FallagaTeam"
] ,
2016-05-16 10:00:05 +00:00
"country" : "TN"
2016-03-03 06:22:28 +00:00
} ,
{
2016-05-16 10:00:05 +00:00
"group" : "Viking Jackal" ,
2016-03-03 06:22:28 +00:00
"synonyms" : [
"Vikingdom"
] ,
2016-05-16 10:00:05 +00:00
"country" : "AE"
2016-03-03 06:22:28 +00:00
} ,
{
2016-05-16 10:00:05 +00:00
"group" : "Sofacy" ,
"description" : "The Sofacy Group (also known as APT28, Pawn Storm, Fancy Bear and Sednit) is a cyber espionage group believed to have ties to the Russian government. Likely operating since 2007, the group is known to target government, military, and security organizations. It has been characterized as an advanced persistent threat." ,
"refs" : [
"https://en.wikipedia.org/wiki/Sofacy_Group"
] ,
"country" : "RU" ,
2016-03-03 06:22:28 +00:00
"synonyms" : [
"APT 28" ,
"APT28" ,
"Pawn Storm" ,
"Fancy Bear" ,
"Sednit" ,
"TsarTeam"
2016-05-16 10:00:05 +00:00
]
2016-03-03 06:22:28 +00:00
} ,
{
2016-05-16 10:00:05 +00:00
"group" : "APT 29" ,
"refs" : [
"https://labsblog.f-secure.com/2015/09/17/the-dukes-7-years-of-russian-cyber-espionage/"
] ,
"country" : "RU" ,
2016-03-03 06:22:28 +00:00
"synonyms" : [
"Dukes" ,
"Group 100" ,
"Cozy Duke" ,
"CozyDuke" ,
"EuroAPT" ,
"CozyBear" ,
"CozyCar" ,
"Cozer" ,
"Office Monkeys" ,
"OfficeMonkeys" ,
"APT29"
2016-05-16 10:00:05 +00:00
]
2016-03-03 06:22:28 +00:00
} ,
{
2016-05-16 10:00:05 +00:00
"group" : "Turla Group" ,
"country" : "RU" ,
2016-03-03 06:22:28 +00:00
"synonyms" : [
"Turla" ,
"Snake" ,
"Venomous Bear" ,
2016-08-01 14:12:42 +00:00
"Group 88" ,
"Waterbug"
2016-05-16 10:00:05 +00:00
]
2016-03-03 06:22:28 +00:00
} ,
{
2016-05-16 10:00:05 +00:00
"group" : "Energetic Bear" ,
"description" : "A Russian group that collects intelligence on the energy industry." ,
"refs" : [
"http://www.scmagazineuk.com/iran-and-russia-blamed-for-state-sponsored-espionage/article/330401/"
] ,
"country" : "RU" ,
2016-03-03 06:22:28 +00:00
"synonyms" : [
"Dragonfly" ,
"Crouching Yeti" ,
"Group 24" ,
"Havex" ,
"CrouchingYeti"
2016-05-16 10:00:05 +00:00
]
2016-03-03 06:22:28 +00:00
} ,
{
2016-05-16 10:00:05 +00:00
"group" : "Sandworm" ,
"refs" : [
"http://www.isightpartners.com/2014/10/cve-2014-4114/"
] ,
"country" : "RU" ,
2016-03-03 06:22:28 +00:00
"synonyms" : [
2016-03-12 20:30:40 +00:00
"Sandworm Team" ,
"Black Energy" ,
"BlackEnergy"
2016-05-16 10:00:05 +00:00
]
2016-03-03 06:22:28 +00:00
} ,
{
2016-05-16 10:00:05 +00:00
"group" : "Anunak" ,
"description" : "Groups targeting financial organizations or people with significant financial assets." ,
"country" : "RU" ,
2016-03-03 06:22:28 +00:00
"synonyms" : [
"Carbanak"
2016-05-16 10:00:05 +00:00
]
2016-03-03 06:22:28 +00:00
} ,
{
2016-05-16 10:00:05 +00:00
"group" : "TeamSpy Crew" ,
2016-03-03 06:22:28 +00:00
"refs" : [
"https://securelist.com/blog/incidents/35520/the-teamspy-crew-attacks-abusing-teamviewer-for-cyberespionage-8/"
] ,
2016-05-16 10:00:05 +00:00
"country" : "RU" ,
"synonyms" : [
"TeamSpy" ,
"Team Bear"
]
2016-03-03 06:22:28 +00:00
} ,
{
2016-05-16 10:00:05 +00:00
"group" : "BuhTrap" ,
2016-03-03 06:22:28 +00:00
"refs" : [
"http://www.welivesecurity.com/2015/11/11/operathion-buhtrap-malware-distributed-via-ammyy-com/"
] ,
2016-05-16 10:00:05 +00:00
"country" : "RU" ,
"synonyms" : [
""
]
2016-03-03 06:22:28 +00:00
} ,
{
2016-05-16 10:00:05 +00:00
"group" : "Berserk Bear" ,
"country" : "RU"
2016-03-03 06:22:28 +00:00
} ,
{
2016-05-16 10:00:05 +00:00
"group" : "Wolf Spider" ,
"country" : "RO"
2016-03-03 06:22:28 +00:00
} ,
{
2016-05-16 10:00:05 +00:00
"group" : "Boulder Bear" ,
"country" : "RU"
2016-03-03 06:22:28 +00:00
} ,
{
2016-05-16 10:00:05 +00:00
"group" : "Shark Spider" ,
"country" : "RU"
2016-03-03 06:22:28 +00:00
} ,
2016-03-04 06:34:14 +00:00
{
2016-05-16 10:00:05 +00:00
"description" : "Adversary targeting manufacturing and industrial organizations." ,
2016-03-04 06:34:14 +00:00
"refs" : [
"http://www.rsaconference.com/writable/presentations/file_upload/anf-t07b-the-art-of-attribution-identifying-and-pursuing-your-cyber-adversaries_final.pdf"
] ,
2016-05-16 10:00:05 +00:00
"country" : "RU" ,
"group" : "Union Spider"
2016-03-04 06:34:14 +00:00
} ,
2016-03-03 06:22:28 +00:00
{
2016-05-16 10:00:05 +00:00
"refs" : [
"http://www.rsaconference.com/writable/presentations/file_upload/anf-t07b-the-art-of-attribution-identifying-and-pursuing-your-cyber-adversaries_final.pdf"
] ,
"group" : "Silent Chollima" ,
2016-03-03 06:22:28 +00:00
"synonyms" : [
"OperationTroy"
] ,
2016-05-16 10:00:05 +00:00
"country" : "KP"
2016-03-03 06:22:28 +00:00
} ,
2016-05-16 09:59:14 +00:00
{
"refs" : [
"https://threatpost.com/operation-blockbuster-coalition-ties-destructive-attacks-to-lazarus-group/116422/"
2016-05-16 10:00:05 +00:00
] ,
"synonyms" : [
"Operation DarkSeoul"
] ,
"group" : "Lazarus Group" ,
"country" : "KP"
2016-05-16 09:59:14 +00:00
} ,
2016-03-03 06:22:28 +00:00
{
2016-05-16 10:00:05 +00:00
"group" : "Viceroy Tiger" ,
"country" : "IN" ,
2016-03-03 06:22:28 +00:00
"synonyms" : [
"Appin" ,
"OperationHangover"
2016-05-16 10:00:05 +00:00
]
2016-03-03 06:22:28 +00:00
} ,
{
2016-05-16 10:00:05 +00:00
"group" : "Pizzo Spider" ,
"country" : "US" ,
2016-03-03 06:22:28 +00:00
"synonyms" : [
"DD4BC" ,
"Ambiorx"
2016-05-16 10:00:05 +00:00
]
2016-03-03 06:22:28 +00:00
} ,
{
2016-05-16 10:00:05 +00:00
"group" : "Corsair Jackal" ,
"country" : "TN" ,
2016-03-03 06:22:28 +00:00
"synonyms" : [
"TunisianCyberArmy"
2016-05-16 10:00:05 +00:00
]
2016-03-03 06:22:28 +00:00
} ,
2016-03-07 20:12:16 +00:00
{
"synonyms" : [
"Animal Farm"
2016-05-16 10:00:05 +00:00
] ,
"group" : "SNOWGLOBE" ,
"country" : "FR"
2016-03-07 20:12:16 +00:00
} ,
2016-03-03 06:22:28 +00:00
{
2016-05-16 10:00:05 +00:00
"group" : "Deadeye Jackal" ,
"description" : "The Syrian Electronic Army (SEA) is a group of computer hackers which first surfaced online in 2011 to support the government of Syrian President Bashar al-Assad. Using spamming, website defacement, malware, phishing, and denial of service attacks, it has targeted political opposition groups, western news organizations, human rights groups and websites that are seemingly neutral to the Syrian conflict. It has also hacked government websites in the Middle East and Europe, as well as US defense contractors. As of 2011 the SEA has been *the first Arab country to have a public Internet Army hosted on its national networks to openly launch cyber attacks on its enemies*. The precise nature of SEA's relationship with the Syrian government has changed over time and is unclear" ,
2016-03-03 06:22:28 +00:00
"refs" : [
"https://en.wikipedia.org/wiki/Syrian_Electronic_Army"
] ,
2016-05-16 10:00:05 +00:00
"country" : "SY" ,
"synonyms" : [
"SyrianElectronicArmy" ,
"SEA"
]
2016-04-02 07:48:25 +00:00
} ,
{
2016-05-16 10:00:05 +00:00
"description" : "Group targeting Indian Army or related assets in India. Attribution to a Pakistani connection has been made by TrendMicro." ,
"refs" : [
2016-04-02 07:48:25 +00:00
"http://documents.trendmicro.com/assets/pdf/Indian-military-personnel-targeted-by-information-theft-campaign-cmajor.pdf"
2016-05-16 10:00:05 +00:00
] ,
"synonyms" : [
"C-Major"
] ,
"group" : "Operation C-Major" ,
"country" : "PK"
2016-05-30 13:22:24 +00:00
} ,
{
"description" : "Group targeting Emirati journalists, activists, and dissidents." ,
"group" : "Stealth Falcon" ,
"country" : "UAE" ,
"refs" : [
"https://citizenlab.org/2016/05/stealth-falcon/"
]
2016-06-16 01:00:43 +00:00
} ,
{
"description" : "ScarCruft is a relatively new APT group; victims have been observed in several countries, including Russia, Nepal, South Korea, China, India, Kuwait and Romania. The group has several ongoing operations utilizing multiple exploits — two for Adobe Flash and one for Microsoft Internet Explorer." ,
"group" : "ScarCruft" ,
"refs" : [
"https://securelist.com/blog/research/75082/cve-2016-4171-adobe-flash-zero-day-used-in-targeted-attacks/"
] ,
"synonyms" : [
"Operation Daybreak" ,
"Operation Erebus"
]
2016-07-01 07:48:26 +00:00
} ,
{
"description" : "Bitdefender detected and blocked an ongoing cyber-espionage campaign against Romanian institutions and other foreign targets. The attacks started in 2014, with the latest reported occurrences in May of 2016. The APT, dubbed Pacifier by Bitdefender researchers, makes use of malicious .doc documents and .zip files distributed via spear phishing e-mail." ,
"group" : "Pacifier APT" ,
"refs" : [
"http://download.bitdefender.com/resources/files/News/CaseStudies/study/115/Bitdefender-Whitepaper-PAC-A4-en-EN1.pdf"
]
2016-07-05 20:19:31 +00:00
} ,
{
"country" : "CN" ,
"group" : "HummingBad" ,
2016-07-10 10:14:54 +00:00
"description" : "This group created a malware that takes over Android devices and generates $300,000 per month in fraudulent ad revenue. The group effectively controls an arsenal of over 85 million mobile devices around the world. With the potential to sell access to these devices to the highest bidder" ,
2016-07-05 20:19:31 +00:00
"refs" : [
"http://blog.checkpoint.com/wp-content/uploads/2016/07/HummingBad-Research-report_FINAL-62916.pdf"
]
2016-07-10 10:14:54 +00:00
} ,
{
"group" : "Dropping Elephant" ,
"description" : "Dropping Elephant (also known as “Chinastrats” and “Patchwork“) is a relatively new threat actor that is targeting a variety of high profile diplomatic and economic targets using a custom set of attack tools. Its victims are all involved with China’ s foreign relations in some way, and are generally caught through spear-phishing or watering hole attacks." ,
"refs" : [
2016-07-26 12:24:49 +00:00
"https://securelist.com/blog/research/75328/the-dropping-elephant-actor/" ,
"http://www.symantec.com/connect/blogs/patchwork-cyberespionage-group-expands-targets-governments-wide-range-industries"
2016-07-10 10:14:54 +00:00
] ,
"synonyms" : [
"Chinastrats" ,
"Patchwork"
]
2016-08-01 13:31:44 +00:00
} ,
{
"group" : "Operation Transparent Tribe" ,
"description" : "Proofpoint researchers recently uncovered evidence of an advanced persistent threat (APT) against Indian diplomatic and military resources. Our investigation began with malicious emails sent to Indian embassies in Saudi Arabia and Kazakstan but turned up connections to watering hole sites focused on Indian military personnel and designed to drop a remote access Trojan (RAT) with a variety of data exfiltration functions." ,
"refs" : [
"https://www.proofpoint.com/sites/default/files/proofpoint-operation-transparent-tribe-threat-insight-en.pdf"
]
2016-08-01 14:18:55 +00:00
} ,
{
"group" : "Scarlet Mimic" ,
"description" : "Scarlet Mimic is a threat group that has targeted minority rights activists. This group has not been directly linked to a government source, but the group's motivations appear to overlap with those of the Chinese government. While there is some overlap between IP addresses used by Scarlet Mimic and Putter Panda, it has not been concluded that the groups are the same." ,
"refs" : [ "https://attack.mitre.org/wiki/Groups" , "http://researchcenter.paloaltonetworks.com/2016/01/scarlet-mimic-years-long-espionage-targets-minority-activists/" ] ,
"country" : "CN"
2016-08-01 14:31:00 +00:00
} ,
{
"group" : "Poseidon Group" ,
"description" : "Poseidon Group is a Portuguese-speaking threat group that has been active since at least 2005. The group has a history of using information exfiltrated from victims to blackmail victim companies into contracting the Poseidon Group as a security firm." ,
"refs" : [ "https://securelist.com/blog/research/73673/poseidon-group-a-targeted-attack-boutique-specializing-in-global-cyber-espionage/" , "https://attack.mitre.org/wiki/Groups" ]
2016-07-10 10:14:54 +00:00
}
2016-05-16 10:00:05 +00:00
]
2016-02-29 08:42:40 +00:00
}