mirror of
https://github.com/MISP/misp-galaxy.git
synced 2024-11-22 23:07:19 +00:00
[threat-actors] Add OilAlpha
This commit is contained in:
parent
152ab38b10
commit
bfb03504a9
1 changed files with 11 additions and 0 deletions
|
@ -12430,6 +12430,17 @@
|
||||||
},
|
},
|
||||||
"uuid": "a1315451-326f-4185-8d71-80f9243f395f",
|
"uuid": "a1315451-326f-4185-8d71-80f9243f395f",
|
||||||
"value": "GhostSec"
|
"value": "GhostSec"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"description": "OilAlpha has almost exclusively relied on infrastructure associated with the Public Telecommunication Corporation (PTC), a Yemeni government-owned enterprise reported to be under the direct control of the Houthi authorities. OilAlpha used encrypted chat messengers like WhatsApp to launch social engineering attacks against its targets. It has also used URL link shorteners. Per victimology assessment, it appears a majority of the targeted entities were Arabic-language speakers and operated Android devices.",
|
||||||
|
"meta": {
|
||||||
|
"refs": [
|
||||||
|
"https://www.zimperium.com/blog/zimperium-mtd-against-oilalpha-a-comprehensive-defense-strategy/",
|
||||||
|
"https://www.recordedfuture.com/oilalpha-likely-pro-houthi-group-targeting-arabian-peninsula"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"uuid": "ae2b897d-f285-4d03-9bab-0ff59d6657a7",
|
||||||
|
"value": "OilAlpha"
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"version": 289
|
"version": 289
|
||||||
|
|
Loading…
Reference in a new issue