mirror of
https://github.com/MISP/misp-galaxy.git
synced 2024-11-22 23:07:19 +00:00
[threat-actors] Add Operation Red Signature
This commit is contained in:
parent
859d3f7ac0
commit
baaf153229
1 changed files with 12 additions and 0 deletions
|
@ -14920,6 +14920,18 @@
|
|||
},
|
||||
"uuid": "f34962a4-a792-4f23-af23-a8bf0f053fcf",
|
||||
"value": "Ferocious Kitten"
|
||||
},
|
||||
{
|
||||
"description": "The threat actors compromised the update server of a remote support solutions provider to deliver a remote access tool called 9002 RAT to their targets of interest through the update process. They carried this out by first stealing the company’s certificate then using it to sign the malware. They also configured the update server to only deliver malicious files if the client is located in the range of IP addresses of their target organisations.",
|
||||
"meta": {
|
||||
"country": "CN",
|
||||
"refs": [
|
||||
"https://decoded.avast.io/threatintel/avast-finds-backdoor-on-us-government-commission-network/?utm_source=rss&utm_medium=rss&utm_campaign=avast-finds-backdoor-on-us-government-commission-network",
|
||||
"https://www.trendmicro.com/en_my/research/18/h/supply-chain-attack-operation-red-signature-targets-south-korean-organizations.html"
|
||||
]
|
||||
},
|
||||
"uuid": "3e9b98d9-0c61-4050-bafa-486622de0080",
|
||||
"value": "Operation Red Signature"
|
||||
}
|
||||
],
|
||||
"version": 299
|
||||
|
|
Loading…
Reference in a new issue