adding threat actor "Moses Staff"

This commit is contained in:
Daniel Plohmann 2022-03-02 15:50:39 +01:00 committed by GitHub
parent 089cb39891
commit a817324cd4
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23

View file

@ -8951,7 +8951,24 @@
},
"uuid": "a57e5bf5-d7f4-43a1-9c15-8a44cdb95079",
"value": "TA2541"
}
},
{
"description": "Cybereason Nocturnus describes Moses Staff as an Iranian hacker group, first spotted in October 2021. Their motivation appears to be to harm Israeli companies by leaking sensitive, stolen data.",
"meta": {
"country": "IR",
"refs": [
"https://twitter.com/campuscodi/status/1450455259202166799",
"https://research.checkpoint.com/2021/mosesstaff-targeting-israeli-companies/",
"https://www.cybereason.com/blog/strifewater-rat-iranian-apt-moses-staff-adds-new-trojan-to-ransomware-operations",
"https://www.fortinet.com/blog/threat-research/guard-your-drive-from-driveguard"
],
"version": 212
"synonyms": [
"Moses Staff"
]
},
"uuid": "d45dd940-b38d-4b2c-9f2f-3e4a0eac841c",
"value": "MosesStaff"
},
],
"version": 213
}