mirror of
https://github.com/MISP/misp-galaxy.git
synced 2025-01-19 11:06:16 +00:00
fix: [threat-actor] synonyms are always arraus
This commit is contained in:
parent
ece56dff38
commit
1fdf47d509
1 changed files with 1 additions and 1 deletions
|
@ -2692,7 +2692,7 @@
|
||||||
"description": "Dragos has identified a new activity group targeting access operations in the electric utility sector. We call this activity group RASPITE. Analysis of RASPITE tactics, techniques, and procedures (TTPs) indicate the group has been active in some form since early- to mid-2017. RASPITE targeting includes entities in the US, Middle East, Europe, and East Asia. Operations against electric utility organizations appear limited to the US at this time. RASPITE leverages strategic website compromise to gain initial access to target networks. RASPITE uses the same methodology as DYMALLOY and ALLANITE in embedding a link to a resource to prompt an SMB connection, from which it harvests Windows credentials. The group then deploys install scripts for a malicious service to beacon back to RASPITE-controlled infrastructure, allowing the adversary to remotely access the victim machine.",
|
"description": "Dragos has identified a new activity group targeting access operations in the electric utility sector. We call this activity group RASPITE. Analysis of RASPITE tactics, techniques, and procedures (TTPs) indicate the group has been active in some form since early- to mid-2017. RASPITE targeting includes entities in the US, Middle East, Europe, and East Asia. Operations against electric utility organizations appear limited to the US at this time. RASPITE leverages strategic website compromise to gain initial access to target networks. RASPITE uses the same methodology as DYMALLOY and ALLANITE in embedding a link to a resource to prompt an SMB connection, from which it harvests Windows credentials. The group then deploys install scripts for a malicious service to beacon back to RASPITE-controlled infrastructure, allowing the adversary to remotely access the victim machine.",
|
||||||
"uuid": "2c8994ba-367c-46f6-bfb0-390c8760dd9e",
|
"uuid": "2c8994ba-367c-46f6-bfb0-390c8760dd9e",
|
||||||
"meta": {
|
"meta": {
|
||||||
"synonyms": "LeafMiner",
|
"synonyms": ["LeafMiner"],
|
||||||
"since": "2017",
|
"since": "2017",
|
||||||
"victimology": "Electric utility sector",
|
"victimology": "Electric utility sector",
|
||||||
"refs": [
|
"refs": [
|
||||||
|
|
Loading…
Add table
Reference in a new issue