From 667d5b885098cee344e6f446dfbea624ec3ca09e Mon Sep 17 00:00:00 2001 From: itayc0hen Date: Wed, 22 Apr 2020 19:44:38 +0300 Subject: [PATCH] Add ItaDuke/DarkUniverse actor --- clusters/threat-actor.json | 16 ++++++++++++++++ 1 file changed, 16 insertions(+) diff --git a/clusters/threat-actor.json b/clusters/threat-actor.json index c8117b7..b72f522 100644 --- a/clusters/threat-actor.json +++ b/clusters/threat-actor.json @@ -8098,6 +8098,22 @@ }, "uuid": "86b4e2f3-8bbf-48fd-9d27-034d3ac3b187", "value": "VENOM SPIDER" + }, + { + "description": "ItaDuke is an actor known since 2013. It used PDF exploits for dropping malware and Twitter accounts to store C2 server urls. On 2018, an actor named DarkUniverse, which was active between 2009 to 2017, was attributed to this ItaDuke by Kaspersky.", + "meta": { + "refs": [ + "https://securelist.com/darkuniverse-the-mysterious-apt-framework-27/94897/", + "https://www.fireeye.com/blog/threat-research/2013/02/the-number-of-the-beast.html", + "https://securelist.com/new-uyghur-and-tibetan-themed-attacks-using-pdf-exploits/35465" + ], + "synonyms": [ + "DarkUniverse", + "SIG27" + ] + }, + "uuid": "d0b900fa-84b4-11ea-bc55-0242ac130003", + "value": "ItaDuke" } ], "version": 157