From 082d506b64ccdc2c747d24259e854ebef6146107 Mon Sep 17 00:00:00 2001 From: Daniel Plohmann Date: Tue, 19 Jul 2022 08:45:09 +0200 Subject: [PATCH] adding new Unit 42 names First PR: those are the directly mappable names. I will follow up after deconfliction and then with a few new entries. --- clusters/threat-actor.json | 152 +++++++++++++++++++++++++------------ 1 file changed, 105 insertions(+), 47 deletions(-) diff --git a/clusters/threat-actor.json b/clusters/threat-actor.json index 5e8eb7b..2c66884 100644 --- a/clusters/threat-actor.json +++ b/clusters/threat-actor.json @@ -1042,7 +1042,8 @@ "https://arstechnica.com/information-technology/2015/08/newly-discovered-chinese-hacking-group-hacked-100-websites-to-use-as-watering-holes/", "https://securelist.com/luckymouse-hits-national-data-center/86083/", "https://attack.mitre.org/groups/G0027/", - "https://www.secureworks.com/research/threat-profiles/bronze-union" + "https://www.secureworks.com/research/threat-profiles/bronze-union", + "https://unit42.paloaltonetworks.com/atoms/iron-taurus/" ], "synonyms": [ "TG-3390", @@ -1056,7 +1057,8 @@ "Iron Tiger", "BRONZE UNION", "Lucky Mouse", - "G0027" + "G0027", + "Iron Taurus" ] }, "related": [ @@ -1111,7 +1113,8 @@ "https://www.fireeye.com/blog/threat-research/2018/09/apt10-targeting-japanese-corporations-using-updated-ttps.html", "https://www.fbi.gov/news/stories/chinese-hackers-indicted-122018", "https://attack.mitre.org/groups/G0045/", - "https://www.secureworks.com/research/threat-profiles/bronze-riverside" + "https://www.secureworks.com/research/threat-profiles/bronze-riverside", + "https://unit42.paloaltonetworks.com/atoms/granite-taurus/" ], "synonyms": [ "APT10", @@ -1129,7 +1132,8 @@ "Cloud Hopper", "BRONZE RIVERSIDE", "ATK41", - "G0045" + "G0045", + "Granite Taurus" ] }, "related": [ @@ -1584,13 +1588,15 @@ "refs": [ "http://researchcenter.paloaltonetworks.com/2014/09/recent-watering-hole-attacks-attributed-apt-group-th3bug-using-poison-ivy/", "https://www.fox-it.com/nl/actueel/whitepapers/operation-wocao-shining-a-light-on-one-of-chinas-hidden-hacking-groups/", - "https://paper.seebug.org/papers/APT/APT_CyberCriminal_Campagin/2015/Aug.10.The_Italian_Connection_An_analysis_of_exploit_supply_chains_and_digital_quartermasters/HTExploitTelemetry.pdf" + "https://paper.seebug.org/papers/APT/APT_CyberCriminal_Campagin/2015/Aug.10.The_Italian_Connection_An_analysis_of_exploit_supply_chains_and_digital_quartermasters/HTExploitTelemetry.pdf", + "https://unit42.paloaltonetworks.com/atoms/crawling-taurus/" ], "synonyms": [ "APT20", "APT 20", "TH3Bug", - "Twivy" + "Twivy", + "Crawling Taurus" ] }, "uuid": "8bcd855f-a4c1-453a-bede-ff36582f4f40", @@ -2413,7 +2419,8 @@ "https://marcoramilli.com/2019/12/05/apt28-attacks-evolution/", "https://www.microsoft.com/security/blog/2020/09/10/strontium-detecting-new-patters-credential-harvesting/", "https://www.bleepingcomputer.com/news/security/russian-hackers-use-fake-nato-training-docs-to-breach-govt-networks/", - "https://quointelligence.eu/2020/09/apt28-zebrocy-malware-campaign-nato-theme/" + "https://quointelligence.eu/2020/09/apt28-zebrocy-malware-campaign-nato-theme/", + "https://unit42.paloaltonetworks.com/atoms/fighting-ursa/" ], "synonyms": [ "APT 28", @@ -2436,7 +2443,8 @@ "Grizzly Steppe", "apt_sofacy", "G0007", - "ATK5" + "ATK5", + "Fighting Ursa" ] }, "related": [ @@ -2495,7 +2503,8 @@ "https://pylos.co/2018/11/18/cozybear-in-from-the-cold/", "https://cloudblogs.microsoft.com/microsoftsecure/2018/12/03/analysis-of-cyberattack-on-u-s-think-tanks-non-profits-public-sector-by-unidentified-attackers/", "https://www.secureworks.com/research/threat-profiles/iron-hemlock", - "https://attack.mitre.org/groups/G0016" + "https://attack.mitre.org/groups/G0016", + "https://unit42.paloaltonetworks.com/atoms/cloaked-ursa/" ], "synonyms": [ "Dukes", @@ -2518,7 +2527,8 @@ "Iron Hemlock", "Grizzly Steppe", "G0016", - "ATK7" + "ATK7", + "Cloaked Ursa" ] }, "related": [ @@ -3437,7 +3447,8 @@ "https://www.forcepoint.com/sites/default/files/resources/files/forcepoint-security-labs-monsoon-analysis-report.pdf", "https://www.secureworks.com/research/threat-profiles/zinc-emerson", "https://www.pwc.com/gx/en/issues/cybersecurity/cyber-threat-intelligence/cyber-year-in-retrospect/yir-cyber-threats-report-download.pdf", - "https://ti.qianxin.com/blog/articles/analysis-of-the-attack-activities-of-patchwork-using-the-documents-of-relevant-government-agencies-in-pakistan-as-bait" + "https://ti.qianxin.com/blog/articles/analysis-of-the-attack-activities-of-patchwork-using-the-documents-of-relevant-government-agencies-in-pakistan-as-bait", + "https://unit42.paloaltonetworks.com/atoms/thirstygemini/" ], "synonyms": [ "Chinastrats", @@ -3449,7 +3460,8 @@ "ZINC EMERSON", "ATK11", "G0040", - "Orannge Athos" + "Orange Athos", + "Thirsty Gemini" ] }, "related": [ @@ -3479,10 +3491,12 @@ "refs": [ "https://attack.mitre.org/wiki/Groups", "https://unit42.paloaltonetworks.com/scarlet-mimic-years-long-espionage-targets-minority-activists/", - "https://attack.mitre.org/groups/G0029/" + "https://attack.mitre.org/groups/G0029/", + "https://unit42.paloaltonetworks.com/atoms/golfing-taurus/" ], "synonyms": [ - "G0029" + "G0029", + "Golfing Taurus" ] }, "related": [ @@ -3862,7 +3876,8 @@ "https://unit42.paloaltonetworks.com/oilrig-novel-c2-channel-steganography/", "https://www.secureworks.com/research/threat-profiles/cobalt-gypsy", "https://www.fireeye.com/content/dam/collateral/en/mtrends-2018.pdf", - "https://www.wired.com/story/apt-34-iranian-hackers-critical-infrastructure-companies/" + "https://www.wired.com/story/apt-34-iranian-hackers-critical-infrastructure-companies/", + "https://unit42.paloaltonetworks.com/atoms/evasive-serpens/" ], "synonyms": [ "Twisted Kitten", @@ -3873,7 +3888,8 @@ "APT34", "IRN2", "ATK40", - "G0049" + "G0049", + "Evasive Serpens" ] }, "related": [ @@ -4312,13 +4328,15 @@ "https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/shuckworm-gamaredon-espionage-ukraine", "https://www.microsoft.com/security/blog/2022/02/04/actinium-targets-ukrainian-organizations/", "https://www.welivesecurity.com/2020/06/11/gamaredon-group-grows-its-game/", - "https://unit42.paloaltonetworks.com/gamaredon-primitive-bear-ukraine-update-2021/" + "https://unit42.paloaltonetworks.com/gamaredon-primitive-bear-ukraine-update-2021/", + "https://unit42.paloaltonetworks.com/atoms/tridentursa/" ], "synonyms": [ "Primitive Bear", "Shuckworm", "ACTINIUM", - "G0047" + "G0047", + "Trident Ursa" ] }, "related": [ @@ -4788,14 +4806,16 @@ "https://www.computerweekly.com/news/252446153/Three-Carbanak-cyber-heist-gang-members-arrested", "https://www.ptsecurity.com/upload/corporate/ww-en/analytics/Cobalt-2017-eng.pdf", "https://attack.mitre.org/groups/G0080/", - "http://www.secureworks.com/research/threat-profiles/gold-kingswood" + "http://www.secureworks.com/research/threat-profiles/gold-kingswood", + "https://unit42.paloaltonetworks.com/atoms/mulelibra/" ], "synonyms": [ "Cobalt Group", "Cobalt Gang", "GOLD KINGSWOOD", "COBALT SPIDER", - "G0080" + "G0080", + "Mule Libra" ] }, "uuid": "01967480-c49b-4d4a-a7fa-aef0eaf535fe", @@ -4935,14 +4955,16 @@ "https://www.secureworks.com/research/bronze-butler-targets-japanese-businesses", "https://blog.trendmicro.com/trendlabs-security-intelligence/redbaldknight-bronze-butler-daserf-backdoor-now-using-steganography/", "https://attack.mitre.org/groups/G0060/", - "https://www.secureworks.com/research/threat-profiles/bronze-butler" + "https://www.secureworks.com/research/threat-profiles/bronze-butler", + "https://unit42.paloaltonetworks.com/atoms/stalkertaurus/" ], "synonyms": [ "Nian", "BRONZE BUTLER", "REDBALDKNIGHT", "STALKER PANDA", - "G0060" + "G0060", + "Stalker Taurus" ] }, "related": [ @@ -5710,7 +5732,8 @@ "https://blog.talosintelligence.com/2019/05/recent-muddywater-associated-blackwater.html", "https://www.zdnet.com/article/new-leaks-of-iranian-cyber-espionage-operations-hit-telegram-and-the-dark-web/", "https://attack.mitre.org/groups/G0069/", - "http://www.secureworks.com/research/threat-profiles/cobalt-ulster" + "http://www.secureworks.com/research/threat-profiles/cobalt-ulster", + "https://unit42.paloaltonetworks.com/atoms/boggyserpens/" ], "synonyms": [ "TEMP.Zagros", @@ -5719,7 +5742,8 @@ "MERCURY", "COBALT ULSTER", "G0069", - "ATK51" + "ATK51", + "Boggy Serpens" ] }, "related": [ @@ -6222,13 +6246,15 @@ "refs": [ "https://unit42.paloaltonetworks.com/unit42-rancor-targeted-attacks-south-east-asia-using-plaintee-ddkong-malware-families/", "https://www.cfr.org/interactive/cyber-operations/rancor", - "https://attack.mitre.org/groups/G0075/" + "https://attack.mitre.org/groups/G0075/", + "https://unit42.paloaltonetworks.com/atoms/rancortaurus/" ], "synonyms": [ "Rancor group", "Rancor", "Rancor Group", - "G0075" + "G0075", + "Rancor Taurus" ] }, "uuid": "79c7c7e0-79d5-11e8-9b9c-1ff96be20c0b", @@ -6262,13 +6288,15 @@ "https://unit42.paloaltonetworks.com/unit42-gorgon-group-slithering-nation-state-cybercrime/", "https://unit42.paloaltonetworks.com/unit42-tracking-subaat-targeted-phishing-attacks-point-leader-threat-actors-repository/", "https://unit42.paloaltonetworks.com/aggah-campaign-bit-ly-blogspot-and-pastebin-used-for-c2-in-large-scale-campaign/", - "https://attack.mitre.org/groups/G0078/" + "https://attack.mitre.org/groups/G0078/", + "https://unit42.paloaltonetworks.com/atoms/pastygemini/" ], "synonyms": [ "Gorgon Group", "Subaat", "ATK92", - "G0078" + "G0078", + "Pasty Gemini" ] }, "uuid": "e47c2c4d-706b-4098-92a2-b93e7103e131", @@ -6283,11 +6311,13 @@ "https://ti.360.net/blog/articles/latest-target-attack-of-darkhydruns-group-against-middle-east-en/", "https://unit42.paloaltonetworks.com/unit42-darkhydrus-uses-phishery-harvest-credentials-middle-east/", "https://unit42.paloaltonetworks.com/darkhydrus-delivers-new-trojan-that-can-use-google-drive-for-c2-communications/", - "https://attack.mitre.org/groups/G0079/" + "https://attack.mitre.org/groups/G0079/", + "https://unit42.paloaltonetworks.com/atoms/obscureserpens/" ], "synonyms": [ "LazyMeerkat", - "G0079" + "G0079", + "Obscure Serpens" ] }, "uuid": "ce2c2dfd-2445-4fbc-a747-9e7092e383f9", @@ -6399,7 +6429,11 @@ "https://securelist.com/red-october-diplomatic-cyber-attacks-investigation/36740/", "https://www.symantec.com/blogs/threat-intelligence/inception-framework-hiding-behind-proxies", "https://securelist.com/cloud-atlas-redoctober-apt-is-back-in-style/68083/", - "https://www.akamai.com/uk/en/multimedia/documents/white-paper/upnproxy-blackhat-proxies-via-nat-injections-white-paper.pdf" + "https://www.akamai.com/uk/en/multimedia/documents/white-paper/upnproxy-blackhat-proxies-via-nat-injections-white-paper.pdf", + "https://unit42.paloaltonetworks.com/atoms/clean-ursa/" + ], + "synonyms": [ + "Clean Ursa" ] }, "uuid": "71ef51ca-a791-11e8-a026-07980ca910ca", @@ -7084,13 +7118,15 @@ "https://www.symantec.com/connect/blogs/iran-based-attackers-use-back-door-threats-spy-middle-eastern-targets", "https://attack.mitre.org/groups/G0087/", "https://go.crowdstrike.com/rs/281-OBQ-266/images/Report2020CrowdStrikeGlobalThreatReport.pdf", - "https://www.secureworks.com/research/threat-profiles/cobalt-hickman" + "https://www.secureworks.com/research/threat-profiles/cobalt-hickman", + "https://unit42.paloaltonetworks.com/atoms/radioserpens/" ], "synonyms": [ "Chafer", "REMIX KITTEN", "COBALT HICKMAN", - "G0087" + "G0087", + "Radio Serpens" ] }, "uuid": "c2c64bd3-a325-446f-91a8-b4c0f173a30b", @@ -7437,7 +7473,8 @@ "https://www.welivesecurity.com/2019/05/14/plead-malware-mitm-asus-webstorage/", "https://go.crowdstrike.com/rs/281-OBQ-266/images/Report2020CrowdStrikeGlobalThreatReport.pdf", "https://www.slideshare.net/codeblue_jp/cb19-cyber-threat-landscape-in-japan-revealing-threat-in-the-shadow-by-chi-en-shen-ashley-oleg-bondarenko", - "https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/palmerworm-blacktech-espionage-apt" + "https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/palmerworm-blacktech-espionage-apt", + "https://unit42.paloaltonetworks.com/atoms/mangataurus/" ], "synonyms": [ "CIRCUIT PANDA", @@ -7445,7 +7482,8 @@ "HUAPI", "Palmerworm", "G0098", - "T-APT-03" + "T-APT-03", + "Manga Taurus" ] }, "uuid": "320c42f7-eab7-4ef9-b09a-74396caa6c3e", @@ -7627,7 +7665,11 @@ "meta": { "refs": [ "https://unit42.paloaltonetworks.com/shifting-in-the-wind-windshift-attacks-target-middle-eastern-governments/", - "https://gsec.hitb.org/materials/sg2018/D1%20COMMSEC%20-%20In%20the%20Trails%20of%20WINDSHIFT%20APT%20-%20Taha%20Karim.pdf" + "https://gsec.hitb.org/materials/sg2018/D1%20COMMSEC%20-%20In%20the%20Trails%20of%20WINDSHIFT%20APT%20-%20Taha%20Karim.pdf", + "https://unit42.paloaltonetworks.com/atoms/windyphoenix/" + ], + "synonyms": [ + "Windy Phoenix" ] }, "uuid": "cbbbfc82-9294-11e9-8e19-2bc14137b25b", @@ -7719,7 +7761,11 @@ "refs": [ "https://blog.talosintelligence.com/2018/08/rocke-champion-of-monero-miners.html", "https://unit42.paloaltonetworks.com/malware-used-by-rocke-group-evolves-to-evade-detection-by-cloud-security-products/", - "https://www.intezer.com/blog-technical-analysis-cryptocurrency-mining-war-on-the-cloud/" + "https://www.intezer.com/blog-technical-analysis-cryptocurrency-mining-war-on-the-cloud/", + "https://unit42.paloaltonetworks.com/atoms/agedlibra/" + ], + "synonyms": [ + "Aged Libra" ] }, "uuid": "53583c40-935e-11e9-b4fc-d7e217a306d2", @@ -8346,12 +8392,14 @@ "description": "COBALT KATANA has been active since at least March 2018, and it focuses many of its operations on organizations based in or associated with Kuwait. The group has targeted government, logistics, and shipping organizations. The threat actors gain initial access to targets using DNS hijacking, strategic web compromise with SMB forced authentication, and password brute force attacks. COBALT KATANA operates a custom platform referred to as the Sakabota Framework, also referred to as Sakabota Core, with a complimentary set of modular backdoors and accessory tools including Gon, Hisoka, Hisoka Netero, Killua, Diezen, and Eye. The group has implemented DNS tunnelling in its malware and malicious scripts and also operates the HyphenShell web shell to strengthen post-intrusion access. CTU researchers assess with moderate confidence that COBALT KATANA operates on behalf of Iran, and elements of its operations such as overlapping infrastructure, use of DNS hijacking, implementation of DNS-based C2 channels in malware and web shell security mechanisms suggest connections to COBALT GYPSY and COBALT EDGEWATER.", "meta": { "refs": [ - "https://www.secureworks.com/research/threat-profiles/cobalt-katana" + "https://www.secureworks.com/research/threat-profiles/cobalt-katana", + "https://unit42.paloaltonetworks.com/atoms/hunter-serpens/" ], "synonyms": [ "Hive0081 (IBM)", "SectorD01 (NHSC)", - "xHunt campaign (Palo Alto)" + "xHunt campaign (Palo Alto)", + "Hunter Serpens" ] }, "uuid": "d1c25b0e-e4c5-4b7c-b790-2e185cb2f07e", @@ -8374,10 +8422,12 @@ "refs": [ "https://www.microsoft.com/security/blog/2019/12/12/gallium-targeting-global-telecom/", "https://www.youtube.com/watch?v=fBFm2fiEPTg", - "https://troopers.de/troopers22/talks/7cv8pz/" + "https://troopers.de/troopers22/talks/7cv8pz/", + "https://unit42.paloaltonetworks.com/atoms/alloytaurus/" ], "synonyms": [ - "Red Dev 4" + "Red Dev 4", + "Alloy Taurus" ] }, "related": [ @@ -8574,7 +8624,11 @@ "https://www.intezer.com/blog/cloud-security/top-linux-cloud-threats-of-2020/", "https://www.trendmicro.com/en_us/research/20/l/teamtnt-now-deploying-ddos-capable-irc-bot-tntbotinger.html", "https://cyware.com/news/hildegard-teamtnts-new-feature-rich-malware-targeting-kubernetes-6587eb45", - "https://www.lacework.com/teamtnt-builds-botnet-from-chinese-cloud-servers/" + "https://www.lacework.com/teamtnt-builds-botnet-from-chinese-cloud-servers/", + "https://unit42.paloaltonetworks.com/atoms/adept-libra/" + ], + "synonyms": [ + "Adept Libra" ] }, "uuid": "27de6a09-844b-4dcb-9ff9-7292aad826ba", @@ -8868,13 +8922,15 @@ "meta": { "refs": [ "https://www.secureworks.com/research/threat-profiles/gold-cabin", - "https://attack.mitre.org/groups/G0127/" + "https://attack.mitre.org/groups/G0127/", + "https://unit42.paloaltonetworks.com/atoms/monsterlibra/" ], "synonyms": [ "Shakthak", "TA551", "ATK236", - "G0127" + "G0127", + "Monster Libra" ] }, "uuid": "36e8c848-4d20-47ea-9fc2-31aa17bf82d1", @@ -9352,12 +9408,14 @@ "https://cert.gov.ua/article/38374", "https://blog.malwarebytes.com/threat-intelligence/2022/04/new-uac-0056-activity-theres-a-go-elephant-in-the-room/", "https://www.intezer.com/blog/research/elephant-malware-targeting-ukrainian-orgs/", - "https://www.sentinelone.com/blog/threat-actor-uac-0056-targeting-ukraine-with-fake-translation-software/" + "https://www.sentinelone.com/blog/threat-actor-uac-0056-targeting-ukraine-with-fake-translation-software/", + "https://unit42.paloaltonetworks.com/atoms/nascentursa/" ], "synonyms": [ "UNC2589", "TA471", - "UAC-0056" + "UAC-0056", + "Nascent Ursa" ] }, "uuid": "c67d3dfb-ab39-46e1-a971-5efdfe6a5b9f", @@ -9595,5 +9653,5 @@ "value": "Predatory Sparrow" } ], - "version": 231 + "version": 232 }