mirror of
https://github.com/MISP/misp-galaxy.git
synced 2024-11-26 08:47:18 +00:00
Update threat-actor.json
This commit is contained in:
parent
8c3c224e6a
commit
bc97b07089
1 changed files with 3 additions and 2 deletions
|
@ -7891,11 +7891,12 @@
|
|||
"meta": {
|
||||
"refs": [
|
||||
"https://www.proofpoint.com/us/threat-insight/post/lookback-forges-ahead-continued-targeting-united-states-utilities-sector-reveals",
|
||||
"https://www.proofpoint.com/us/threat-insight/post/lookback-malware-targets-united-states-utilities-sector-phishing-attacks"
|
||||
"https://www.proofpoint.com/us/threat-insight/post/lookback-malware-targets-united-states-utilities-sector-phishing-attacks",
|
||||
"https://www.proofpoint.com/us/blog/threat-insight/ta410-group-behind-lookback-attacks-against-us-utilities-sector-returns-new"
|
||||
]
|
||||
},
|
||||
"uuid": "5cd95926-0098-435e-892d-9c9f61763ad7",
|
||||
"value": "LookBack"
|
||||
"value": "TA410"
|
||||
},
|
||||
{
|
||||
"description": "In 2018, the Cybereason Nocturnus team identified an advanced, persistent attack targeting global telecommunications providers carried out by a threat actor using tools and techniques commonly associated with Chinese-affiliated threat actors, such as APT10. This multi-wave attacks focused on obtaining data of specific, high-value targets and resulted in a complete takeover of the network.",
|
||||
|
|
Loading…
Reference in a new issue