mirror of
https://github.com/MISP/misp-galaxy.git
synced 2024-11-29 18:27:19 +00:00
[threat-actors] Add TA2719
This commit is contained in:
parent
fc173c1a78
commit
4699f65425
1 changed files with 10 additions and 0 deletions
|
@ -14774,6 +14774,16 @@
|
||||||
},
|
},
|
||||||
"uuid": "625c3fb4-16fc-4992-9ff2-4fad869750ac",
|
"uuid": "625c3fb4-16fc-4992-9ff2-4fad869750ac",
|
||||||
"value": "TA2722"
|
"value": "TA2722"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"description": "In late March 2020, Proofpoint researchers began tracking a new actor with a penchant for using NanoCore and later AsyncRAT, popular commodity remote access trojans (RATs). Dubbed TA2719 by Proofpoint, the actor uses localized lures with colorful images that impersonate local banks, law enforcement, and shipping services. Proofpoint has observed this actor send low volume campaigns to recipients in Austria, Chile, Greece, Hungary, Italy, North Macedonia, Netherlands, Spain, Sweden, Taiwan, United States, and Uruguay. ",
|
||||||
|
"meta": {
|
||||||
|
"refs": [
|
||||||
|
"https://www.proofpoint.com/us/blog/threat-insight/threat-actor-profile-ta2719-uses-colorful-lures-deliver-rats-local-languages"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"uuid": "33bfb09d-c6f4-4403-b434-1d4d4733ec52",
|
||||||
|
"value": "TA2719"
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"version": 298
|
"version": 298
|
||||||
|
|
Loading…
Reference in a new issue