mirror of
https://github.com/MISP/misp-galaxy.git
synced 2024-11-26 08:47:18 +00:00
[threat-actors] Add UNC2970
This commit is contained in:
parent
5dcf22e4ef
commit
0d8e535b88
1 changed files with 11 additions and 0 deletions
|
@ -16558,6 +16558,17 @@
|
||||||
},
|
},
|
||||||
"uuid": "c54b9a98-1436-4e29-b194-e5bde003dd4d",
|
"uuid": "c54b9a98-1436-4e29-b194-e5bde003dd4d",
|
||||||
"value": "ZeroSevenGroup"
|
"value": "ZeroSevenGroup"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"description": "UNC2970 is a North Korean threat actor that primarily targets organizations through spear-phishing emails with job recruitment themes, often utilizing fake LinkedIn accounts to engage victims. The group employs the PLANKWALK backdoor and other malware families, leveraging compromised WordPress sites for command and control. They have been observed using BYOVD techniques to exploit vulnerable drivers for evading detection. Mandiant has noted a shift in UNC2970's targeting strategy, including a focus on security researchers and advancements in their operational capabilities against EDR tools.",
|
||||||
|
"meta": {
|
||||||
|
"country": "KP",
|
||||||
|
"refs": [
|
||||||
|
"https://www.mandiant.com/resources/blog/lightshow-north-korea-unc2970"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"uuid": "e40cf515-f155-46d4-b174-88b38383f9bb",
|
||||||
|
"value": "UNC2970"
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"version": 313
|
"version": 313
|
||||||
|
|
Loading…
Reference in a new issue