mirror of
https://github.com/MISP/misp-galaxy.git
synced 2024-11-26 08:47:18 +00:00
[threat-actors] Add TA2552
This commit is contained in:
parent
a456e419d8
commit
3690ab0e24
1 changed files with 10 additions and 0 deletions
|
@ -14731,6 +14731,16 @@
|
||||||
},
|
},
|
||||||
"uuid": "2485a9cb-b41c-43bd-8b1c-c64e919c0a4e",
|
"uuid": "2485a9cb-b41c-43bd-8b1c-c64e919c0a4e",
|
||||||
"value": "Storm-1575"
|
"value": "Storm-1575"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"description": "Since January 2020, Proofpoint researchers have tracked an actor abusing Microsoft Office 365 (O365) third-party application (3PA) access, with suspected activity dating back to August 2019. The actor, known as TA2552, uses well-crafted Spanish language lures that leverage a narrow range of themes and brands. The lures entice users to click a link in the message, taking them to the legitimate Microsoft third-party apps consent page. There they are prompted to grant a third-party application read-only user permissions to their O365 account via OAuth2 or other token-based authorization methods. TA2552 seeks access to specific account resources like the user’s contacts and mail. Requesting read-only permissions for such account resources could be used to conduct account reconnaissance, silently steal data, or to intercept password reset messages from other accounts such as those at financial institutions. While organizations with global presence have received messages from this group, they appear to choose recipients who are likely Spanish speakers. \n\n",
|
||||||
|
"meta": {
|
||||||
|
"refs": [
|
||||||
|
"https://www.proofpoint.com/us/blog/threat-insight/ta2552-uses-oauth-access-token-phishing-exploit-read-only-risks"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"uuid": "e9de47f0-3e68-465c-b91e-7a2b7371955c",
|
||||||
|
"value": "TA2552"
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"version": 298
|
"version": 298
|
||||||
|
|
Loading…
Reference in a new issue