mirror of
https://github.com/MISP/misp-galaxy.git
synced 2024-11-22 23:07:19 +00:00
[threat-actors] Add SilverFish
This commit is contained in:
parent
ee2a8bec32
commit
29baf77740
1 changed files with 12 additions and 0 deletions
|
@ -13352,6 +13352,18 @@
|
||||||
},
|
},
|
||||||
"uuid": "aad291eb-08d1-4af4-9dd1-e90fe1f2d6c6",
|
"uuid": "aad291eb-08d1-4af4-9dd1-e90fe1f2d6c6",
|
||||||
"value": "TA402"
|
"value": "TA402"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"description": "SilverFish is believed to be a Russian cyberespionage group that has been involved in various cyberattacks, including the use of the SolarWinds breach as an attack vector. SilverFish has been linked to the Wasted Locker ransomware and has displayed a high level of skill and organization in their cyber operations. There are also connections between SilverFish and the threat actor Evil Corp, suggesting a possible evolution or collaboration between the two groups.",
|
||||||
|
"meta": {
|
||||||
|
"refs": [
|
||||||
|
"https://www.truesec.com/hub/blog/are-the-notorious-cyber-criminals-evil-corp-actually-russian-spies",
|
||||||
|
"https://www.prodaft.com/resource/detail/silverfish-global-cyber-espionage-campaign-case-report",
|
||||||
|
"https://www.mandiant.com/resources/blog/unc2165-shifts-to-evade-sanctions"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"uuid": "55bcc595-2442-4f98-9477-7fe9b507607c",
|
||||||
|
"value": "SilverFish"
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"version": 294
|
"version": 294
|
||||||
|
|
Loading…
Reference in a new issue