From 871d90cfc2dcd198f65c37318cd37c126c7d0225 Mon Sep 17 00:00:00 2001 From: Alexandre Dulaunoy Date: Mon, 11 Nov 2019 13:34:54 +0100 Subject: [PATCH] chg: [threat-actor] Calypso group added Ref: https://www.ptsecurity.com/upload/corporate/ru-ru/analytics/calypso-apt-2019-rus.pdf MISP UUID: 5ca4718b-7f38-4822-83b7-0a1a0a00b412 --- clusters/threat-actor.json | 16 +++++++++++++++- 1 file changed, 15 insertions(+), 1 deletion(-) diff --git a/clusters/threat-actor.json b/clusters/threat-actor.json index 59040c9..ba947c4 100644 --- a/clusters/threat-actor.json +++ b/clusters/threat-actor.json @@ -7778,7 +7778,21 @@ }, "uuid": "75db4269-924b-4771-8f62-0de600a43634", "value": "Operation WizardOpium" + }, + { + "description": "For the first time, the activity of the Calypso group was detected by specialists of PT Expert Security Center in March 2019, during the work to detect cyber threats. As a result, many malware samples of this group were obtained, affected organizations and control servers of intruders were identified. According to our data, the group has been active since at least September 2016. The main goal of the group is to steal confidential data, the main victims are government agencies from Brazil, India, Kazakhstan, Russia, Thailand, Turkey. Our data suggest that the group has Asian roots. Description translated from Russian.", + "value": "Calypso group", + "uuid": "200d04c8-a11f-45c4-86fd-35bb5de3f7a3", + "meta": { + "refs": [ + "https://www.ptsecurity.com/upload/corporate/ru-ru/analytics/calypso-apt-2019-rus.pdf" + ], + "synonyms": [ + "Calypso", + "Calypso APT" + ] + } } ], - "version": 139 + "version": 140 }