mirror of
https://github.com/MISP/misp-galaxy.git
synced 2024-11-22 23:07:19 +00:00
[threat-actors] Add Lancefly
This commit is contained in:
parent
73c73606ff
commit
9c502d0d1f
1 changed files with 10 additions and 0 deletions
|
@ -12227,6 +12227,16 @@
|
||||||
},
|
},
|
||||||
"uuid": "8e93e09a-734d-4b16-933f-9feb58f6ce7d",
|
"uuid": "8e93e09a-734d-4b16-933f-9feb58f6ce7d",
|
||||||
"value": "GoldenJackal"
|
"value": "GoldenJackal"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"description": "Lancefly targets government, aviation, and telecom organizations in South and Southeast Asia. They use a custom backdoor named Merdoor, developed since 2018, and employ various tactics to gain access, including phishing emails, SSH credential brute-forcing, and exploiting server vulnerabilities. Additionally, Lancefly has been observed using a newer version of the ZXShell rootkit and tools like PlugX and ShadowPad RAT, which are typically associated with Chinese-speaking APT groups.",
|
||||||
|
"meta": {
|
||||||
|
"refs": [
|
||||||
|
"https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/lancefly-merdoor-zxshell-custom-backdoor"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"uuid": "2ceeab57-85e3-468b-a1b8-c035c496dcdc",
|
||||||
|
"value": "Lancefly"
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"version": 288
|
"version": 288
|
||||||
|
|
Loading…
Reference in a new issue