diff --git a/clusters/threat-actor.json b/clusters/threat-actor.json index 13a886a..1b42415 100644 --- a/clusters/threat-actor.json +++ b/clusters/threat-actor.json @@ -16547,6 +16547,17 @@ }, "uuid": "6f394add-1703-41e7-be27-d79613f9929c", "value": "Actor240524" + }, + { + "description": "ZeroSevenGroup is a threat actor that claims to have breached a U.S. branch of Toyota, stealing 240GB of sensitive data, including employee and customer information, contracts, and financial details. They have also allegedly gained full network access to critical Israeli infrastructure, with access to 80TB of sensitive data across various sectors. The group has threatened to use the stolen data for malicious activities, including ransomware attacks. Their operations involve exploiting vulnerabilities, as indicated by their reference to manipulating memory through buffer overflow techniques.", + "meta": { + "refs": [ + "https://siliconangle.com/2024/08/20/toyota-alleges-stolen-customer-data-published-hacking-site-came-outside-supplier/", + "https://www.oodaloop.com/briefs/2024/08/21/toyota-customer-employee-data-leaked-in-confirmed-data-breach/" + ] + }, + "uuid": "c54b9a98-1436-4e29-b194-e5bde003dd4d", + "value": "ZeroSevenGroup" } ], "version": 313