mirror of
https://github.com/MISP/misp-galaxy.git
synced 2024-11-22 23:07:19 +00:00
[threat-actors] Add Lifting Zmiy
This commit is contained in:
parent
6e3a94f3e0
commit
1a7f2beb1a
1 changed files with 12 additions and 0 deletions
|
@ -16378,6 +16378,18 @@
|
|||
},
|
||||
"uuid": "feeab818-a9bd-4bff-9923-bf8421abd6c5",
|
||||
"value": "CRYSTALRAY"
|
||||
},
|
||||
{
|
||||
"description": "Rostelecom's security team has discovered a new APT group that is breaching companies via industrial PLCs. Named Lifting Zmiy, the group's first attacks were traced back to October 2023. The group targeted PLCs from Russian company Tech-Automatics usually used with elevators and which were still using their default passwords. Rostelecom has linked the group to intrusions at a Russian government contractor, two telecom operators, and an IT company. The company says the group collected and exfiltrated data and then destroyed the victim's infrastructure. Rostelecom says Lifting Zmiy uses Starlink infrastructure for attacks and appears to operate out of Eastern Europe.",
|
||||
"meta": {
|
||||
"refs": [
|
||||
"https://www.rbc.ru/technology_and_media/08/07/2024/6687f9af9a7947780a5d1a31",
|
||||
"https://tadviser.com/index.php/Company:Tecon-Automatics_NGO",
|
||||
"https://news.risky.biz/risky-biz-news-us-takes-down-rts-twitter-bot-farm/"
|
||||
]
|
||||
},
|
||||
"uuid": "b9968b5f-0a5a-4be6-9dd2-428244741323",
|
||||
"value": "Lifting Zmiy"
|
||||
}
|
||||
],
|
||||
"version": 312
|
||||
|
|
Loading…
Reference in a new issue