diff --git a/clusters/threat-actor.json b/clusters/threat-actor.json index 68690db..8d45b84 100644 --- a/clusters/threat-actor.json +++ b/clusters/threat-actor.json @@ -17644,6 +17644,16 @@ }, "uuid": "80872d9a-1d0c-4c12-9543-feca1fbd2ac2", "value": "CoughingDown" + }, + { + "description": "EC2 Grouper is a prolific threat actor known for leveraging AWS tools for PowerShell to conduct automated attacks in cloud environments. They typically utilize the CreateSecurityGroup API to establish remote access and exhibit a consistent security group naming convention. Credential acquisition is believed to stem from compromised cloud access keys, often sourced from public code repositories. Notably, their activities do not include calls to AuthorizeSecurityGroupIngress, suggesting a selective approach to escalation.", + "meta": { + "refs": [ + "https://www.fortinet.com/blog/threat-research/catching-ec2-grouper-no-indicators-required" + ] + }, + "uuid": "7f7b20e7-e704-4b47-b230-b5d232493fce", + "value": "EC2 Grouper" } ], "version": 322