mirror of
https://github.com/MISP/misp-galaxy.git
synced 2024-11-26 00:37:18 +00:00
Merge pull request #915 from Mathieu4141/threat-actors/b72c2c66-872d-4933-8052-496938c9a5a4
[threat-actors] Add 2 actors
This commit is contained in:
commit
6a325420bf
1 changed files with 21 additions and 0 deletions
|
@ -14015,6 +14015,27 @@
|
|||
},
|
||||
"uuid": "3decddc7-e554-48d8-8304-38b243fc9ccb",
|
||||
"value": "Cyber Toufan"
|
||||
},
|
||||
{
|
||||
"description": "With its emergence in 2022, Water Curupira has established itself as a persistent threat actor targeting organizations primarily in South America and Europe. Their modus operandi involves a combination of social engineering tactics and a diversified malware arsenal, including ransomware variants like Black Basta and credential stealers like Cobalt Strike. This multifaceted approach enables them to gain unauthorized access to victim systems, steal sensitive data, and ultimately extort victims through ransomware demands. It has been actively using Pikabot, a loader malware with similarities to Qakbot, in spam campaigns throughout 2023.",
|
||||
"meta": {
|
||||
"refs": [
|
||||
"https://www.trendmicro.com/en_us/research/24/a/a-look-into-pikabot-spam-wave-campaign.html"
|
||||
]
|
||||
},
|
||||
"uuid": "a36266ce-2374-472a-a715-13b99e38e74e",
|
||||
"value": "Water Curupira"
|
||||
},
|
||||
{
|
||||
"description": "While Volexity largely observed the attacker essentially living off the land, they still deployed a handful of malware files and tools during the course of the incident which primarily consisted of webshells, proxy utilities, and file modifications to allow credential harvesting. Once UTA0178 had access into the network via the ICS VPN appliance, their general approach was to pivot from system to system using compromised credentials. They would then further compromise credentials of users on any new system that was breached, and use these credentials to log into additional systems via RDP. Volexity observed the attacker obtaining credentials in a variety of ways.",
|
||||
"meta": {
|
||||
"country": "CN",
|
||||
"refs": [
|
||||
"https://www.volexity.com/blog/2024/01/10/active-exploitation-of-two-zero-day-vulnerabilities-in-ivanti-connect-secure-vpn/"
|
||||
]
|
||||
},
|
||||
"uuid": "f288f686-b5b3-4c86-9960-5f8fb18709a3",
|
||||
"value": "UTA0178"
|
||||
}
|
||||
],
|
||||
"version": 297
|
||||
|
|
Loading…
Reference in a new issue