mirror of
https://github.com/MISP/misp-galaxy.git
synced 2024-11-23 07:17:17 +00:00
[threat-actors] Add UNC5325
This commit is contained in:
parent
e18e5c16c6
commit
6490424201
1 changed files with 11 additions and 0 deletions
|
@ -15340,6 +15340,17 @@
|
||||||
},
|
},
|
||||||
"uuid": "69a944ef-4962-432e-a1b9-575b646ee2ed",
|
"uuid": "69a944ef-4962-432e-a1b9-575b646ee2ed",
|
||||||
"value": "R00tK1T"
|
"value": "R00tK1T"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"description": "UNC5325 is a suspected Chinese cyber espionage operator that exploited CVE-2024-21893 to compromise Ivanti Connect Secure appliances. UNC5325 leveraged code from open-source projects, installed custom malware, and modified the appliance's settings in order to evade detection and attempt to maintain persistence. UNC5325 has been observed deploying LITTLELAMB.WOOLTEA, PITSTOP, PITDOG, PITJET, and PITHOOK. Mandiant identified TTPs and malware code overlaps in LITTLELAMB.WOOLTEA and PITHOOK with malware leveraged by UNC3886. Mandiant assesses with moderate confidence that UNC5325 is associated with UNC3886.",
|
||||||
|
"meta": {
|
||||||
|
"country": "CN",
|
||||||
|
"refs": [
|
||||||
|
"https://www.mandiant.com/resources/blog/investigating-ivanti-exploitation-persistence"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"uuid": "ffb28c09-16a6-483a-817a-89c89751c9d4",
|
||||||
|
"value": "UNC5325"
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"version": 304
|
"version": 304
|
||||||
|
|
Loading…
Reference in a new issue