diff --git a/clusters/threat-actor.json b/clusters/threat-actor.json index cb58587..0dc7848 100644 --- a/clusters/threat-actor.json +++ b/clusters/threat-actor.json @@ -17561,6 +17561,18 @@ }, "uuid": "ceabe862-3d89-4696-9d7f-32a4850334d9", "value": "Aggressive Inventory Zombies" + }, + { + "description": "UNC2465 is a threat actor known for deploying the SMOKEDHAM .NET backdoor and DARKSIDE ransomware, utilizing TTPs such as phishing, Trojanized software installers, and supply chain attacks. They have employed the NGROK utility to expose internal services and facilitate lateral movement within victim environments. UNC2465 has also leveraged tools like UltraVNC, Cobalt Strike BEACON, and conducted credential harvesting via LSASS memory dumping. Their operations have included extortion tactics through a leaks website over TOR, applying pressure on victims by releasing stolen data.", + "meta": { + "refs": [ + "https://www.mandiant.com/resources/shining-a-light-on-darkside-ransomware-operations", + "https://cloud.google.com/blog/topics/threat-intelligence/darkside-affiliate-supply-chain-software-compromise", + "https://cloud.google.com/blog/topics/threat-intelligence/burrowing-your-way-into-vpns" + ] + }, + "uuid": "cbdf8d63-c114-47d5-8f32-f87f365c7c43", + "value": "UNC2465" } ], "version": 321