From 94b3c1ec07eacec6045cd39549f0c61a697f489b Mon Sep 17 00:00:00 2001 From: Daniel Plohmann Date: Sat, 7 Dec 2019 12:44:30 +0100 Subject: [PATCH] added APT-C-34 / Golden Falcon --- clusters/threat-actor.json | 16 +++++++++++++++- 1 file changed, 15 insertions(+), 1 deletion(-) diff --git a/clusters/threat-actor.json b/clusters/threat-actor.json index 0cbe8c6..3dad8c1 100644 --- a/clusters/threat-actor.json +++ b/clusters/threat-actor.json @@ -7810,7 +7810,21 @@ }, "uuid": "39925aa0-c7bf-4b9b-97d6-7d600329453d", "value": "TA2101" + }, +{ + "description": "As reported by ZDNet, Chinese cyber-security vendor Qihoo 360 published a report on 2019-11-29 exposing an extensive hacking operation targeting the country of Kazakhstan. Targets included individuals and organizations involving all walks of life, such as government agencies, military personnel, foreign diplomats, researchers, journalists, private companies, the educational sector, religious figures, government dissidents, and foreign diplomats alike. The campaign, Qihoo 360 said, was broad, and appears to have been carried by a threat actor with considerable resources, and one who had the ability to develop their private hacking tools, buy expensive spyware off the surveillance market, and even invest in radio communications interception hardware.", + "meta": { + "refs": [ + "http://blogs.360.cn/post/APT-C-34_Golden_Falcon.html", + "https://www.zdnet.com/article/extensive-hacking-operation-discovered-in-kazakhstan/" + ], + "synonyms": [ + "Golden Falcon" + ] + }, + "uuid": "feb0cfef-0472-4108-83d7-1a322d8ab86b", + "value": "APT-C-34" } ], - "version": 144 + "version": 145 }