mirror of
https://github.com/MISP/misp-galaxy.git
synced 2024-11-23 07:17:17 +00:00
Add Tortoiseshell thrat actor
This commit is contained in:
parent
42f457fc22
commit
b9b4b9c651
1 changed files with 10 additions and 0 deletions
|
@ -7709,6 +7709,16 @@
|
||||||
"description": "SectorJ04 is a Russian-based cybercrime group that began operating about five years ago and conducted hacking activities for financial profit using malware such as banking trojans and ransomware against national and industrial sectors located across Europe, North America and West Africa.\nIn 2019, the SectorJ04 group expanded its hacking activities to cover various industrial sectors located across Southeast Asia and East Asia, and is changing the pattern of their attacks from targeted attacks to searching for random victims. This report includes details related to the major hacking targets of the SectorJ04 group in 2019, how those targets were hacked, characteristics of their hacking activities this year and recent cases of the SectorJ04 group’s hacking.",
|
"description": "SectorJ04 is a Russian-based cybercrime group that began operating about five years ago and conducted hacking activities for financial profit using malware such as banking trojans and ransomware against national and industrial sectors located across Europe, North America and West Africa.\nIn 2019, the SectorJ04 group expanded its hacking activities to cover various industrial sectors located across Southeast Asia and East Asia, and is changing the pattern of their attacks from targeted attacks to searching for random victims. This report includes details related to the major hacking targets of the SectorJ04 group in 2019, how those targets were hacked, characteristics of their hacking activities this year and recent cases of the SectorJ04 group’s hacking.",
|
||||||
"uuid": "50e25cfb-8b4d-408d-a7c6-bd0672662d39",
|
"uuid": "50e25cfb-8b4d-408d-a7c6-bd0672662d39",
|
||||||
"value": "SectorJ04"
|
"value": "SectorJ04"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"description": "A previously undocumented attack group is using both custom and off-the-shelf malware to target IT providers in Saudi Arabia in what appear to be supply chain attacks with the end goal of compromising the IT providers’ customers.\nThe group, which we are calling Tortoiseshell, has been active since at least July 2018. Symantec has identified a total of 11 organizations hit by the group, the majority of which are based in Saudi Arabia. In at least two organizations, evidence suggests that the attackers gained domain admin-level access.",
|
||||||
|
"meta": {
|
||||||
|
"refs": [
|
||||||
|
"https://www.symantec.com/blogs/threat-intelligence/tortoiseshell-apt-supply-chain"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"uuid": "5f108484-db7f-11e9-aaa4-fb0176425734",
|
||||||
|
"value": "Tortoiseshell"
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"version": 132
|
"version": 132
|
||||||
|
|
Loading…
Reference in a new issue