[threat-actors] Add Witchetty

This commit is contained in:
Mathieu4141 2023-11-06 05:26:25 -08:00
parent eb43d9faf2
commit 84fec96df9

View file

@ -12370,6 +12370,22 @@
}, },
"uuid": "b813c6a2-f8c7-4071-83bd-24c181ff2bd4", "uuid": "b813c6a2-f8c7-4071-83bd-24c181ff2bd4",
"value": "RedStinger" "value": "RedStinger"
},
{
"description": "Witchetty was first documented by ESET in April 2022, who concluded that it was one of three sub-groups of TA410, a broad cyber-espionage operation with some links to the Cicada group (aka APT10). Witchettys activity was characterized by the use of two pieces of malware, a first-stage backdoor known as X4 and a second-stage payload known as LookBack. ESET reported that the group had targeted governments, diplomatic missions, charities, and industrial/manufacturing organizations.",
"meta": {
"aliases": [
"LookingFrog"
],
"country": "CN",
"refs": [
"https://www.rewterz.com/rewterz-news/rewterz-threat-alert-witchetty-apt-group-active-iocs",
"https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/witchetty-steganography-espionage",
"https://www.welivesecurity.com/2022/04/27/lookback-ta410-umbrella-cyberespionage-ttps-activity/"
]
},
"uuid": "202f5481-7bae-4a0b-b117-0642ea1dbe65",
"value": "Witchetty"
} }
], ],
"version": 289 "version": 289