mirror of
https://github.com/MISP/misp-galaxy.git
synced 2024-11-26 08:47:18 +00:00
[threat-actors] Add RomCom aliases
This commit is contained in:
parent
ebd216e315
commit
79210345d0
1 changed files with 10 additions and 2 deletions
|
@ -11185,11 +11185,19 @@
|
||||||
"value": "APT-C-60"
|
"value": "APT-C-60"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"description": "RomCom",
|
"description": "ROMCOM is an evolving and sophisticated threat actor group that has been using the malware tool ROMCOM for espionage and financially motivated attacks. They have targeted organizations in Ukraine and NATO countries, including military personnel, government agencies, and political leaders. The ROMCOM backdoor is capable of stealing sensitive information and deploying other malware, showcasing the group's adaptability and growing sophistication.",
|
||||||
"meta": {
|
"meta": {
|
||||||
"refs": [
|
"refs": [
|
||||||
"https://blogs.blackberry.com/en/2022/11/romcom-spoofing-solarwinds-keepass",
|
"https://blogs.blackberry.com/en/2022/11/romcom-spoofing-solarwinds-keepass",
|
||||||
"https://blogs.blackberry.com/en/2022/10/unattributed-romcom-threat-actor-spoofing-popular-apps-now-hits-ukrainian-militaries"
|
"https://blogs.blackberry.com/en/2022/10/unattributed-romcom-threat-actor-spoofing-popular-apps-now-hits-ukrainian-militaries",
|
||||||
|
"https://www.trendmicro.com/en_us/research/23/j/void-rabisu-targets-female-leaders-with-new-romcom-variant.html",
|
||||||
|
"https://labs.k7computing.com/index.php/romcom-rat-not-your-typical-love-story/",
|
||||||
|
"https://blogs.blackberry.com/en/2023/07/decoding-romcom-behaviors-and-opportunities-for-detection",
|
||||||
|
"https://www.trendmicro.com/en_us/research/23/e/void-rabisu-s-use-of-romcom-backdoor-shows-a-growing-shift-in-th.html"
|
||||||
|
],
|
||||||
|
"country": "RU",
|
||||||
|
"synonyms": [
|
||||||
|
"Storm-0978"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"uuid": "ba9e1ed2-e142-48d0-a593-f73ac6d59ccd",
|
"uuid": "ba9e1ed2-e142-48d0-a593-f73ac6d59ccd",
|
||||||
|
|
Loading…
Reference in a new issue