From 88025a541fc4f7a78ebb3b8f1d482104c1f17b74 Mon Sep 17 00:00:00 2001 From: Deborah Servili Date: Mon, 14 Oct 2019 16:07:35 +0200 Subject: [PATCH] add operation soft cell --- clusters/threat-actor.json | 12 +++++++++++- 1 file changed, 11 insertions(+), 1 deletion(-) diff --git a/clusters/threat-actor.json b/clusters/threat-actor.json index b6e836a..bd4f5fe 100644 --- a/clusters/threat-actor.json +++ b/clusters/threat-actor.json @@ -7744,7 +7744,17 @@ }, "uuid": "5cd95926-0098-435e-892d-9c9f61763ad7", "value": "LookBack" + }, + { + "description": "In 2018, the Cybereason Nocturnus team identified an advanced, persistent attack targeting global telecommunications providers carried out by a threat actor using tools and techniques commonly associated with Chinese-affiliated threat actors, such as APT10. This multi-wave attacks focused on obtaining data of specific, high-value targets and resulted in a complete takeover of the network.", + "meta": { + "refs": [ + "https://www.cybereason.com/blog/operation-soft-cell-a-worldwide-campaign-against-telecommunications-providers" + ] + }, + "uuid": "8dda51ef-9a30-48f7-b0fd-5b6f0a62262d", + "value": "Operation Soft Cell" } ], - "version": 135 + "version": 136 }