From 337c21be5bbd443a7153db65f2e017b712f7f45f Mon Sep 17 00:00:00 2001 From: Mathieu4141 Date: Mon, 22 Apr 2024 07:48:44 -0700 Subject: [PATCH] [threat-actors] Add UTA0218 --- clusters/threat-actor.json | 11 +++++++++++ 1 file changed, 11 insertions(+) diff --git a/clusters/threat-actor.json b/clusters/threat-actor.json index ff4a5e9..3f99ff7 100644 --- a/clusters/threat-actor.json +++ b/clusters/threat-actor.json @@ -15885,6 +15885,17 @@ }, "uuid": "0e4ed0ab-87e2-4588-8fc0-3d720e0efebd", "value": "GhostR" + }, + { + "description": "UTA0218 is a threat actor with advanced capabilities, targeting organizations to establish a reverse shell, acquire tools, and extract data. They exploit vulnerabilities in firewall devices to move laterally within victim networks, focusing on obtaining domain backup keys and active directory credentials. The actor deploys a custom Python backdoor named UPSTYLE to execute commands and download additional tools. UTA0218 is likely state-backed, utilizing a mix of infrastructure including VPNs and compromised routers to store malicious files.", + "meta": { + "refs": [ + "https://www.enigmasoftware.com/cve20243400vulnerability-removal/", + "https://www.volexity.com/blog/2024/04/12/zero-day-exploitation-of-unauthenticated-remote-code-execution-vulnerability-in-globalprotect-cve-2024-3400/" + ] + }, + "uuid": "ee8b8fc4-59f4-4442-a4e6-3686d09c6509", + "value": "UTA0218" } ], "version": 307