[threat-actors] Add Xcatze

This commit is contained in:
Mathieu4141 2023-11-07 10:37:08 -08:00
parent 44617774b6
commit 59bd2763bc

View file

@ -12777,6 +12777,16 @@
}, },
"uuid": "533af03d-e160-4312-a92f-0500055f2b56", "uuid": "533af03d-e160-4312-a92f-0500055f2b56",
"value": "TwoSail Junk" "value": "TwoSail Junk"
},
{
"description": "Cloud security company Lacework says it discovered a threat actor group named Xcatze that uses a Python named AndroxGh0st to take over AWS servers and send out massive email spam campaigns. Lacework says the malware operates by scanning web apps written in the Laravel PHP framework for exposed configuration files to identify and steal server credentials. Researchers said AndroxGh0st specifically searches for AWS, SendGrid, and Twilio credentials, which it uses to take control of email servers and accounts and send out the spam campaigns.",
"meta": {
"refs": [
"https://www.lacework.com/blog/androxghost-the-python-malware-exploiting-your-aws-keys/"
]
},
"uuid": "83764206-8012-47c6-9c7a-dc04c99559e7",
"value": "Xcatze"
} }
], ],
"version": 293 "version": 293