mirror of
https://github.com/MISP/misp-galaxy.git
synced 2024-11-30 02:37:17 +00:00
[threat-actors] Add UNC3886
This commit is contained in:
parent
7bb54037e8
commit
a91734af6c
1 changed files with 14 additions and 0 deletions
|
@ -12153,6 +12153,20 @@
|
||||||
},
|
},
|
||||||
"uuid": "b7497d28-02de-4722-8b97-1fc53e1d1b68",
|
"uuid": "b7497d28-02de-4722-8b97-1fc53e1d1b68",
|
||||||
"value": "Winter Vivern"
|
"value": "Winter Vivern"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"description": "UNC3886 is an advanced cyber espionage group with unique capabilities in how they operate on-network as well as the tools they utilize in their campaigns. UNC3886 has been observed targeting firewall and virtualization technologies which lack EDR support. Their ability to manipulate firewall firmware and exploit a zero-day indicates they have curated a deeper-level of understanding of such technologies. UNC3886 has modified publicly available malware, specifically targeting *nix operating systems.",
|
||||||
|
"meta": {
|
||||||
|
"refs": [
|
||||||
|
"https://www.mandiant.com/resources/blog/fortinet-malware-ecosystem",
|
||||||
|
"https://www.mandiant.com/resources/blog/esxi-hypervisors-malware-persistence",
|
||||||
|
"https://www.mandiant.com/resources/blog/vmware-esxi-zero-day-bypass",
|
||||||
|
"https://www.mandiant.com/resources/blog/vmware-detection-containment-hardening"
|
||||||
|
],
|
||||||
|
"country": "CN"
|
||||||
|
},
|
||||||
|
"uuid": "8c08dbe7-3ed0-4d7d-b315-22d8774a5bd9",
|
||||||
|
"value": "UNC3886"
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"version": 288
|
"version": 288
|
||||||
|
|
Loading…
Reference in a new issue