From 380e9c1e862ad40602e2142e457525ea71d5f585 Mon Sep 17 00:00:00 2001 From: Mathieu4141 Date: Thu, 9 Jan 2025 03:10:46 -0800 Subject: [PATCH] [threat-actors] Add EC2 Grouper --- clusters/threat-actor.json | 10 ++++++++++ 1 file changed, 10 insertions(+) diff --git a/clusters/threat-actor.json b/clusters/threat-actor.json index 68690db..8d45b84 100644 --- a/clusters/threat-actor.json +++ b/clusters/threat-actor.json @@ -17644,6 +17644,16 @@ }, "uuid": "80872d9a-1d0c-4c12-9543-feca1fbd2ac2", "value": "CoughingDown" + }, + { + "description": "EC2 Grouper is a prolific threat actor known for leveraging AWS tools for PowerShell to conduct automated attacks in cloud environments. They typically utilize the CreateSecurityGroup API to establish remote access and exhibit a consistent security group naming convention. Credential acquisition is believed to stem from compromised cloud access keys, often sourced from public code repositories. Notably, their activities do not include calls to AuthorizeSecurityGroupIngress, suggesting a selective approach to escalation.", + "meta": { + "refs": [ + "https://www.fortinet.com/blog/threat-research/catching-ec2-grouper-no-indicators-required" + ] + }, + "uuid": "7f7b20e7-e704-4b47-b230-b5d232493fce", + "value": "EC2 Grouper" } ], "version": 322