mirror of
https://github.com/MISP/misp-galaxy.git
synced 2024-11-26 08:47:18 +00:00
Update threat-actor.json
Moved the JUDGMENT PANDA references to APT31 following the previous commit. Off note, Crowdstrike quietly removed the JUDGMENT PANDA section from its GTR-2019 report. However if anyone wants to grab the unchanged report, they can get it [here](https://b-ok.asia/book/3697424/2ab30a).
This commit is contained in:
parent
b77b9d374c
commit
c33f4c7611
1 changed files with 4 additions and 13 deletions
|
@ -7177,17 +7177,6 @@
|
|||
"uuid": "7e37be6b-5a94-45f3-bdeb-f494c520eee3",
|
||||
"value": "Salty Spider"
|
||||
},
|
||||
{
|
||||
"description": "This adversary is suspected of continuing to target upstream providers (e.g., law firms and managed service providers) to support additional intrusions against high-profile assets. In 2018, CrowdStrike observed this adversary using spear-phishing, URL 'web bugs' and scheduled tasks to automate credential harvesting.",
|
||||
"meta": {
|
||||
"refs": [
|
||||
"https://www.crowdstrike.com/resources/reports/2019-crowdstrike-global-threat-report/",
|
||||
"https://go.crowdstrike.com/rs/281-OBQ-266/images/Report2020CrowdStrikeGlobalThreatReport.pdf"
|
||||
]
|
||||
},
|
||||
"uuid": "d7a41ada-6687-4a6b-8b5c-396808cdd758",
|
||||
"value": "Judgment Panda"
|
||||
},
|
||||
{
|
||||
"description": "In the first quarter of 2018, CrowdStrike Intelligence identified NOMAD PANDA activity targeting Central Asian nations with exploit documents built with the 8.t tool.",
|
||||
"meta": {
|
||||
|
@ -7379,7 +7368,7 @@
|
|||
"value": "Silent Librarian"
|
||||
},
|
||||
{
|
||||
"description": "FireEye characterizes APT31 as an actor specialized on intellectual property theft, focusing on data and projects that make a particular organization competetive in its field. Based on available data (April 2016), FireEye assesses that APT31 conducts network operations at the behest of the Chinese Government.",
|
||||
"description": "FireEye characterizes APT31 as an actor specialized on intellectual property theft, focusing on data and projects that make a particular organization competetive in its field. Based on available data (April 2016), FireEye assesses that APT31 conducts network operations at the behest of the Chinese Government. Also according to Crowdstrike, this adversary is suspected of continuing to target upstream providers (e.g., law firms and managed service providers) to support additional intrusions against high-profile assets. In 2018, CrowdStrike observed this adversary using spear-phishing, URL “web bugs” and scheduled tasks to automate credential harvesting.",
|
||||
"meta": {
|
||||
"country": "CN",
|
||||
"refs": [
|
||||
|
@ -7390,7 +7379,9 @@
|
|||
"https://twitter.com/bkMSFT/status/1201876664667582466",
|
||||
"https://www.secureworks.com/research/bronz-vinewood-uses-hanaloader-to-target-government-supply-chain",
|
||||
"https://www.secureworks.com/research/bronze-vinewood-targets-supply-chains",
|
||||
"https://www.secureworks.com/research/threat-profiles/bronze-vinewood"
|
||||
"https://www.secureworks.com/research/threat-profiles/bronze-vinewood",
|
||||
"https://www.crowdstrike.com/resources/reports/2019-crowdstrike-global-threat-report",
|
||||
"https://go.crowdstrike.com/rs/281-OBQ-266/images/Report2020CrowdStrikeGlobalThreatReport.pdf"
|
||||
],
|
||||
"synonyms": [
|
||||
"APT 31",
|
||||
|
|
Loading…
Reference in a new issue