mirror of
https://github.com/MISP/misp-galaxy.git
synced 2025-01-18 10:36:17 +00:00
Merge pull request #1042 from Mathieu4141/threat-actors/90533794-86ec-434a-b6b5-3a3f8d16e51e
[threat actors] 3 new, 1 alias
This commit is contained in:
commit
756c710645
2 changed files with 36 additions and 3 deletions
|
@ -599,7 +599,7 @@ Category: *tea-matrix* - source: ** - total: *7* elements
|
|||
|
||||
[Threat Actor](https://www.misp-galaxy.org/threat-actor) - Known or estimated adversary groups targeting organizations and employees. Adversary groups are regularly confused with their initial operation or campaign. threat-actor-classification meta can be used to clarify the understanding of the threat-actor if also considered as operation, campaign or activity group.
|
||||
|
||||
Category: *actor* - source: *MISP Project* - total: *793* elements
|
||||
Category: *actor* - source: *MISP Project* - total: *796* elements
|
||||
|
||||
[[HTML](https://www.misp-galaxy.org/threat-actor)] - [[JSON](https://github.com/MISP/misp-galaxy/blob/main/clusters/threat-actor.json)]
|
||||
|
||||
|
|
|
@ -3939,7 +3939,9 @@
|
|||
"https://attack.mitre.org/groups/G0037/",
|
||||
"https://securityintelligence.com/posts/more_eggs-anyone-threat-actor-itg08-strikes-again/",
|
||||
"http://www.secureworks.com/research/threat-profiles/gold-franklin",
|
||||
"https://www.crowdstrike.com/resources/reports/2019-crowdstrike-global-threat-report/"
|
||||
"https://www.crowdstrike.com/resources/reports/2019-crowdstrike-global-threat-report/",
|
||||
"https://www.proofpoint.com/us/blog/threat-insight/security-brief-ta4557-targets-recruiters-directly-email",
|
||||
"https://www.proofpoint.com/us/threat-insight/post/fake-jobs-campaigns-delivering-moreeggs-backdoor-fake-job-offers"
|
||||
],
|
||||
"synonyms": [
|
||||
"SKELETON SPIDER",
|
||||
|
@ -3949,7 +3951,8 @@
|
|||
"GOLD FRANKLIN",
|
||||
"ATK88",
|
||||
"G0037",
|
||||
"Camouflage Tempest"
|
||||
"Camouflage Tempest",
|
||||
"TA4557"
|
||||
]
|
||||
},
|
||||
"related": [
|
||||
|
@ -17624,6 +17627,36 @@
|
|||
},
|
||||
"uuid": "fba00660-d18c-4af7-831c-25757e495907",
|
||||
"value": "Wassonite"
|
||||
},
|
||||
{
|
||||
"description": "Natohub is a hacker who claimed to have stolen 42,000 documents from the UN’s International Civil Aviation Organization and is offering the data for sale on underground forums. The compromised documents allegedly contain personal records of ICAO staff and others associated with the agency. While ICAO is investigating the potential breach, Natohub has also made unverified claims about accessing personal data on thousands of UN delegates. The actor's track record of leaks is limited, raising questions about the credibility of their assertions.",
|
||||
"meta": {
|
||||
"refs": [
|
||||
"https://cisoseries.com/cyber-security-news-cyber-trust-label-uk-deepfake-laws-treasury-attack-details/"
|
||||
]
|
||||
},
|
||||
"uuid": "43e2a6bc-0b62-456a-b5ae-a40770b8b8e1",
|
||||
"value": "Natohub"
|
||||
},
|
||||
{
|
||||
"description": "CoughingDown is a threat group attributed to various cyber campaigns, including the deployment of the EAGERBEE backdoor, which utilizes service manipulation and privilege escalation techniques. The group has been linked to malware infrastructure that abuses legitimate services like MSDTC, IKEEXT, and SessionEnv to load malicious DLLs, including oci.dll. Analysis of supply-chain attacks, particularly involving Trojanized packages, has revealed similarities between CoughingDown malware and post-compromise tools used in these incidents. Evidence such as consistent service creation and C2 domain overlap further supports the connection between EAGERBEE and CoughingDown.",
|
||||
"meta": {
|
||||
"refs": [
|
||||
"https://securelist.com/eagerbee-backdoor/115175/"
|
||||
]
|
||||
},
|
||||
"uuid": "80872d9a-1d0c-4c12-9543-feca1fbd2ac2",
|
||||
"value": "CoughingDown"
|
||||
},
|
||||
{
|
||||
"description": "EC2 Grouper is a prolific threat actor known for leveraging AWS tools for PowerShell to conduct automated attacks in cloud environments. They typically utilize the CreateSecurityGroup API to establish remote access and exhibit a consistent security group naming convention. Credential acquisition is believed to stem from compromised cloud access keys, often sourced from public code repositories. Notably, their activities do not include calls to AuthorizeSecurityGroupIngress, suggesting a selective approach to escalation.",
|
||||
"meta": {
|
||||
"refs": [
|
||||
"https://www.fortinet.com/blog/threat-research/catching-ec2-grouper-no-indicators-required"
|
||||
]
|
||||
},
|
||||
"uuid": "7f7b20e7-e704-4b47-b230-b5d232493fce",
|
||||
"value": "EC2 Grouper"
|
||||
}
|
||||
],
|
||||
"version": 322
|
||||
|
|
Loading…
Add table
Reference in a new issue