mirror of
https://github.com/MISP/misp-galaxy.git
synced 2024-11-30 02:37:17 +00:00
[threat-actors] Add Water Curupira
This commit is contained in:
parent
f9ecc163ea
commit
8c32c674cd
1 changed files with 10 additions and 0 deletions
|
@ -14015,6 +14015,16 @@
|
||||||
},
|
},
|
||||||
"uuid": "3decddc7-e554-48d8-8304-38b243fc9ccb",
|
"uuid": "3decddc7-e554-48d8-8304-38b243fc9ccb",
|
||||||
"value": "Cyber Toufan"
|
"value": "Cyber Toufan"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"description": "With its emergence in 2022, Water Curupira has established itself as a persistent threat actor targeting organizations primarily in South America and Europe. Their modus operandi involves a combination of social engineering tactics and a diversified malware arsenal, including ransomware variants like Black Basta and credential stealers like Cobalt Strike. This multifaceted approach enables them to gain unauthorized access to victim systems, steal sensitive data, and ultimately extort victims through ransomware demands. It has been actively using Pikabot, a loader malware with similarities to Qakbot, in spam campaigns throughout 2023.",
|
||||||
|
"meta": {
|
||||||
|
"refs": [
|
||||||
|
"https://www.trendmicro.com/en_us/research/24/a/a-look-into-pikabot-spam-wave-campaign.html"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"uuid": "a36266ce-2374-472a-a715-13b99e38e74e",
|
||||||
|
"value": "Water Curupira"
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"version": 297
|
"version": 297
|
||||||
|
|
Loading…
Reference in a new issue