From 63bcac4ed9fb9e86f792234c0efde88c2f0ff577 Mon Sep 17 00:00:00 2001 From: Mathieu4141 Date: Mon, 9 Sep 2024 08:18:23 -0700 Subject: [PATCH] [threat-actors] Add Fail0verflow --- clusters/threat-actor.json | 15 +++++++++++++++ 1 file changed, 15 insertions(+) diff --git a/clusters/threat-actor.json b/clusters/threat-actor.json index 574c4b2..dc53ae0 100644 --- a/clusters/threat-actor.json +++ b/clusters/threat-actor.json @@ -16652,6 +16652,21 @@ }, "uuid": "10582c97-90de-4f2b-8e4d-21513c3971fc", "value": "Storm-1679" + }, + { + "description": "Fail0verflow is a hacking group known for exploiting vulnerabilities in gaming consoles, notably the Nintendo Wii and PlayStation 3. They utilized techniques such as RAM shorting, buffer overflow, and a signing bug to achieve code execution and develop the Homebrew Channel for the Wii. In 2010, they compromised an ECDSA key for the PS3, and later announced the retrieval of PS5 symmetric root keys, enabling the potential for custom firmware and homebrew software. Their exploits often involve kernel access and have raised concerns about the implications for piracy and litigation in the gaming community.", + "meta": { + "refs": [ + "https://blog.0x7d0.dev/history/how-the-nintendo-wii-security-was-defeated/", + "https://arstechnica.com/gaming/2021/11/uncovered-ps5-encryption-keys-are-the-first-step-to-unlocking-the-console/", + "https://malware.news/t/playstation-5-hacked-twice/54441/1" + ], + "synonyms": [ + "Team Twiizer" + ] + }, + "uuid": "096c57c1-263f-463e-8089-e553872db149", + "value": "Fail0verflow" } ], "version": 313