diff --git a/clusters/threat-actor.json b/clusters/threat-actor.json index 8e45759..0053c0f 100644 --- a/clusters/threat-actor.json +++ b/clusters/threat-actor.json @@ -14755,6 +14755,19 @@ }, "uuid": "e9de47f0-3e68-465c-b91e-7a2b7371955c", "value": "TA2552" + }, + { + "description": "TA2722 is a highly active threat actor that targets various industries including Shipping/Logistics, Manufacturing, Business Services, Pharmaceutical, and Energy. They primarily focus on organizations in North America, Europe, and Southeast Asia. This threat actor impersonates Philippine government entities and uses themes related to the government to gain remote access to target computers. Their objectives include information gathering, installing follow-on malware, and engaging in business email compromise activities.", + "meta": { + "refs": [ + "https://www.proofpoint.com/us/blog/threat-insight/new-threat-actor-spoofs-philippine-government-covid-19-health-data-widespread" + ], + "synonyms": [ + "Balikbayan Foxes" + ] + }, + "uuid": "625c3fb4-16fc-4992-9ff2-4fad869750ac", + "value": "TA2722" } ], "version": 298