From 5dcf22e4eff59d02dc7aa3ebc8d8d137bc7ebcf6 Mon Sep 17 00:00:00 2001 From: Mathieu4141 Date: Mon, 9 Sep 2024 08:18:22 -0700 Subject: [PATCH] [threat-actors] Add ZeroSevenGroup --- clusters/threat-actor.json | 11 +++++++++++ 1 file changed, 11 insertions(+) diff --git a/clusters/threat-actor.json b/clusters/threat-actor.json index 13a886a..1b42415 100644 --- a/clusters/threat-actor.json +++ b/clusters/threat-actor.json @@ -16547,6 +16547,17 @@ }, "uuid": "6f394add-1703-41e7-be27-d79613f9929c", "value": "Actor240524" + }, + { + "description": "ZeroSevenGroup is a threat actor that claims to have breached a U.S. branch of Toyota, stealing 240GB of sensitive data, including employee and customer information, contracts, and financial details. They have also allegedly gained full network access to critical Israeli infrastructure, with access to 80TB of sensitive data across various sectors. The group has threatened to use the stolen data for malicious activities, including ransomware attacks. Their operations involve exploiting vulnerabilities, as indicated by their reference to manipulating memory through buffer overflow techniques.", + "meta": { + "refs": [ + "https://siliconangle.com/2024/08/20/toyota-alleges-stolen-customer-data-published-hacking-site-came-outside-supplier/", + "https://www.oodaloop.com/briefs/2024/08/21/toyota-customer-employee-data-leaked-in-confirmed-data-breach/" + ] + }, + "uuid": "c54b9a98-1436-4e29-b194-e5bde003dd4d", + "value": "ZeroSevenGroup" } ], "version": 313