Add Void Balaur.

This commit is contained in:
Thomas Dupuy 2022-09-27 00:11:20 +00:00
parent eacab6ca27
commit bfd1812cef

View file

@ -9797,7 +9797,35 @@
], ],
"uuid": "ecf4d7cb-9bf7-4d9d-8450-c99e885b9aac", "uuid": "ecf4d7cb-9bf7-4d9d-8450-c99e885b9aac",
"value": "BITWISE SPIDER" "value": "BITWISE SPIDER"
},
{
"description": "Void Balaur is a highly active hack-for-hire / cyber mercenary group with a wide range of known target types across the globe. Their services have been observed for sale to the public online since at least 2016. Services include the collection of private data and access to specific online email and social media services, such as Gmail, Outlook, Telegram, Yandex, Facebook, Instagram, and business emails.",
"meta": {
"refs": [
"https://www.sentinelone.com/labs/the-sprawling-infrastructure-of-a-careless-mercenary/",
"https://blog.google/threat-analysis-group/countering-hack-for-hire-groups/",
"https://documents.trendmicro.com/assets/white_papers/wp-void-balaur-tracking-a-cybermercenarys-activities.pdf",
"https://www.amnesty.org/en/latest/research/2020/03/targeted-surveillance-attacks-in-uzbekistan-an-old-threat-with-new-techniques/",
"https://equalit.ie/deflect-labs-report-6/"
],
"cfr-suspected-victims": [
"Brazil",
"Central African Republic",
"Georgia",
"Kazakhstan",
"Moldova",
"Russia",
"Spain",
"Sudan",
"Taiwan",
"Ukraine",
"United Kingdom",
"United States"
]
},
"uuid": "ca310f0a-1131-4c67-b0a7-f1cd4ce0f87f",
"value": "Void Balaur"
} }
], ],
"version": 247 "version": 248
} }