mirror of
https://github.com/MISP/misp-galaxy.git
synced 2024-11-22 23:07:19 +00:00
[threat-actors] Add UAC-0063
This commit is contained in:
parent
d9af67d1df
commit
49093ecf16
1 changed files with 11 additions and 0 deletions
|
@ -16412,6 +16412,17 @@
|
|||
},
|
||||
"uuid": "8f31b9b1-44c9-4b7f-b850-7cf02c306e25",
|
||||
"value": "Threat Actor 888"
|
||||
},
|
||||
{
|
||||
"description": "UAC-0063 is a threat actor linked to Russian APT28, known for targeting government entities in Ukraine and Central Asia for cyber espionage operations. They utilize keyloggers, backdoors, and malware like Hatvibe and Cherryspy to compromise systems and exfiltrate sensitive information. The group has been active since at least 2021 and has shown interest in targeting organizations in Mongolia, Kazakhstan, Kyrgyzstan, Israel, and India. Their TTPs include spear-phishing campaigns and exploiting vulnerabilities in software products like HFS HTTP File Server and Rejetto file-sharing servers.",
|
||||
"meta": {
|
||||
"refs": [
|
||||
"https://socprime.com/blog/uac-0063-attack-detection-hackers-target-ukrainian-research-institutions-using-hatvibe-cherryspy-and-cve-2024-23692/",
|
||||
"https://cert.gov.ua/article/4697016"
|
||||
]
|
||||
},
|
||||
"uuid": "9565bf78-7c9c-41cd-9ed0-58031f6d8978",
|
||||
"value": "UAC-0063"
|
||||
}
|
||||
],
|
||||
"version": 312
|
||||
|
|
Loading…
Reference in a new issue