mirror of
https://github.com/MISP/misp-galaxy.git
synced 2024-11-26 16:57:18 +00:00
[threat-actors] Add UNC2717
This commit is contained in:
parent
094f5b700c
commit
b72868b6cd
1 changed files with 12 additions and 0 deletions
|
@ -13639,6 +13639,18 @@
|
||||||
},
|
},
|
||||||
"uuid": "5e32baed-f4b5-4149-8540-7515ad8c4dc0",
|
"uuid": "5e32baed-f4b5-4149-8540-7515ad8c4dc0",
|
||||||
"value": "Daixin Team"
|
"value": "Daixin Team"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"description": "UNC2717 is a threat actor that engages in espionage activities aligned with Chinese government priorities. They demonstrate advanced tradecraft and take measures to avoid detection, making it challenging for network defenders to identify their tools and intrusion methods. UNC2717, along with other Chinese APT actors, has been observed stealing credentials, email communications, and intellectual property. They have targeted global government agencies using malware such as HARDPULSE, QUIETPULSE, and PULSEJUMP.",
|
||||||
|
"meta": {
|
||||||
|
"country": "CN",
|
||||||
|
"refs": [
|
||||||
|
"https://www.fireeye.com/blog/threat-research/2021/05/updates-on-chinese-apt-compromising-pulse-secure-vpn-devices.html",
|
||||||
|
"http://internal-www.fireeye.com/blog/threat-research/2021/04/suspected-apt-actors-leverage-bypass-techniques-pulse-secure-zero-day.html"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"uuid": "f1d90b54-4821-41ff-8e07-ac650e0454b7",
|
||||||
|
"value": "UNC2717"
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"version": 295
|
"version": 295
|
||||||
|
|
Loading…
Reference in a new issue