mirror of
https://github.com/MISP/misp-galaxy.git
synced 2024-11-26 08:47:18 +00:00
[threat-actors] Add UTA0218
This commit is contained in:
parent
6ca498872a
commit
337c21be5b
1 changed files with 11 additions and 0 deletions
|
@ -15885,6 +15885,17 @@
|
||||||
},
|
},
|
||||||
"uuid": "0e4ed0ab-87e2-4588-8fc0-3d720e0efebd",
|
"uuid": "0e4ed0ab-87e2-4588-8fc0-3d720e0efebd",
|
||||||
"value": "GhostR"
|
"value": "GhostR"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"description": "UTA0218 is a threat actor with advanced capabilities, targeting organizations to establish a reverse shell, acquire tools, and extract data. They exploit vulnerabilities in firewall devices to move laterally within victim networks, focusing on obtaining domain backup keys and active directory credentials. The actor deploys a custom Python backdoor named UPSTYLE to execute commands and download additional tools. UTA0218 is likely state-backed, utilizing a mix of infrastructure including VPNs and compromised routers to store malicious files.",
|
||||||
|
"meta": {
|
||||||
|
"refs": [
|
||||||
|
"https://www.enigmasoftware.com/cve20243400vulnerability-removal/",
|
||||||
|
"https://www.volexity.com/blog/2024/04/12/zero-day-exploitation-of-unauthenticated-remote-code-execution-vulnerability-in-globalprotect-cve-2024-3400/"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"uuid": "ee8b8fc4-59f4-4442-a4e6-3686d09c6509",
|
||||||
|
"value": "UTA0218"
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"version": 307
|
"version": 307
|
||||||
|
|
Loading…
Reference in a new issue