mirror of
https://github.com/MISP/misp-galaxy.git
synced 2024-11-22 23:07:19 +00:00
added TA2101
This commit is contained in:
parent
e88b1e07ea
commit
bd3cc6d8ee
1 changed files with 11 additions and 1 deletions
|
@ -7800,7 +7800,17 @@
|
|||
},
|
||||
"uuid": "200d04c8-a11f-45c4-86fd-35bb5de3f7a3",
|
||||
"value": "Calypso group"
|
||||
},
|
||||
{
|
||||
"description": "Proofpoint researchers detected campaigns from a relatively new actor, tracked internally as TA2101, targeting German companies and organizations to deliver and install backdoor malware. The actor initiated their campaigns impersonating the Bundeszentralamt fur Steuern, the German Federal Ministry of Finance, with lookalike domains, verbiage, and stolen branding in the emails. For their campaigns in Germany, the actor chose Cobalt Strike, a commercially licensed software tool that is generally used for penetration testing and emulates the type of backdoor framework used by Metasploit, a similar penetration testing tool. Proofpoint researchers have also observed this actor distributing Maze ransomware, employing similar social engineering techniques to those it uses for Cobalt Strike, while also targeting organizations in Italy and impersonating the Agenzia Delle Entrate, the Italian Revenue Agency. We have also recently observed the actor targeting organizations in the United States using the IcedID banking Trojan while impersonating the United States Postal Service (USPS).",
|
||||
"meta": {
|
||||
"refs": [
|
||||
"https://www.proofpoint.com/us/threat-insight/post/ta2101-plays-government-imposter-distribute-malware-german-italian-and-us"
|
||||
]
|
||||
},
|
||||
"uuid": "39925aa0-c7bf-4b9b-97d6-7d600329453d",
|
||||
"value": "TA2101"
|
||||
}
|
||||
],
|
||||
"version": 143
|
||||
"version": 144
|
||||
}
|
||||
|
|
Loading…
Reference in a new issue