mirror of
https://github.com/MISP/misp-galaxy.git
synced 2024-11-29 18:27:19 +00:00
Add Arcane Door
This commit is contained in:
parent
de0b4145c9
commit
177fadbc10
1 changed files with 11 additions and 1 deletions
|
@ -15907,7 +15907,17 @@
|
||||||
},
|
},
|
||||||
"uuid": "f5f6d4eb-1ec3-494e-807d-5b767122f9b2",
|
"uuid": "f5f6d4eb-1ec3-494e-807d-5b767122f9b2",
|
||||||
"value": "UAC-0149"
|
"value": "UAC-0149"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"description": "ArcaneDoor is a campaign that is the latest example of state-sponsored actors targeting perimeter network devices from multiple vendors. Coveted by these actors, perimeter network devices are the perfect intrusion point for espionage-focused campaigns. As a critical path for data into and out of the network, these devices need to be routinely and promptly patched; using up-to-date hardware and software versions and configurations; and be closely monitored from a security perspective. Gaining a foothold on these devices allows an actor to directly pivot into an organization, reroute or modify traffic and monitor network communications. In the past two years, we have seen a dramatic and sustained increase in the targeting of these devices in areas such as telecommunications providers and energy sector organizations — critical infrastructure entities that are likely strategic targets of interest for many foreign governments.",
|
||||||
|
"meta": {
|
||||||
|
"refs": [
|
||||||
|
"https://blog.talosintelligence.com/arcanedoor-new-espionage-focused-campaign-found-targeting-perimeter-network-devices/"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"uuid": "97a10d3b-5cb5-4df9-856c-515994f3e953",
|
||||||
|
"value": "ArcaneDoor"
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"version": 307
|
"version": 308
|
||||||
}
|
}
|
||||||
|
|
Loading…
Reference in a new issue