mirror of
https://github.com/MISP/misp-galaxy.git
synced 2024-11-22 23:07:19 +00:00
adding Proofpoint's TA428
This commit is contained in:
parent
dbb67dd7d2
commit
a4a72d0698
1 changed files with 12 additions and 1 deletions
|
@ -7622,7 +7622,18 @@
|
|||
},
|
||||
"uuid": "64ac8827-89d9-4738-9df3-cd955c628bee",
|
||||
"value": "SWEED"
|
||||
},
|
||||
{
|
||||
"description": "Proofpoint researchers have identified a targeted APT campaign that utilized malicious RTF documents to deliver custom malware to unsuspecting victims. We dubbed this campaign “Operation LagTime IT” based on entities that were targeted and the distinctive domains registered to C&C IP infrastructure. Beginning in early 2019, these threat actors targeted a number of government agencies in East Asia overseeing government information technology, domestic affairs, foreign affairs, economic development, and political processes. We determined that the infection vector observed in this campaign was spear phishing, with emails originating from both free email accounts and compromised user accounts. Attackers relied on Microsoft Equation Editor exploit CVE-2018-0798 to deliver a custom malware that Proofpoint researchers have dubbed Cotx RAT. Additionally, this APT group utilizes Poison Ivy payloads that share overlapping command and control (C&C) infrastructure with the newly identified Cotx campaigns. Based on infrastructure overlaps, post-exploitation techniques, and historic TTPs utilized in this operation, Proofpoint analysts attribute this activity to the Chinese APT group tracked internally as TA428. Researchers believe that this activity has an operational and tactical resemblance to the Maudi Surveillance Operation which was previously reported in 2013.",
|
||||
"meta": {
|
||||
"country": "CN",
|
||||
"refs": [
|
||||
"https://www.proofpoint.com/us/threat-insight/post/chinese-apt-operation-lagtime-it-targets-government-information-technology"
|
||||
]
|
||||
},
|
||||
"uuid": "5533d062-18ab-4c70-9472-0eac03f95a1d",
|
||||
"value": "TA428"
|
||||
}
|
||||
],
|
||||
"version": 122
|
||||
"version": 123
|
||||
}
|
||||
|
|
Loading…
Reference in a new issue