mirror of
https://github.com/MISP/misp-galaxy.git
synced 2024-11-26 08:47:18 +00:00
[threat-actors] Add HellHounds
This commit is contained in:
parent
41cf08a038
commit
c6fc6f248b
1 changed files with 11 additions and 0 deletions
|
@ -16272,6 +16272,17 @@
|
||||||
},
|
},
|
||||||
"uuid": "06a615dc-fa13-4d6a-ac8b-3d2a8c9501c4",
|
"uuid": "06a615dc-fa13-4d6a-ac8b-3d2a8c9501c4",
|
||||||
"value": "BlueHornet"
|
"value": "BlueHornet"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"description": "Hellhounds is an APT group targeting organizations in Russia, using a modified version of Pupy RAT called Decoy Dog. They gain initial access through vulnerable web services and trusted relationships, with a focus on the public sector and IT companies. The group has been active since at least 2019, maintaining covert presence inside compromised organizations by modifying open-source projects to evade detection. Hellhounds have successfully targeted at least 48 victims, including a telecom operator where they disrupted services.",
|
||||||
|
"meta": {
|
||||||
|
"refs": [
|
||||||
|
"https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/hellhounds-operation-lahat-part-2/",
|
||||||
|
"https://ics-cert.kaspersky.com/publications/reports/2024/04/02/apt-and-financial-attacks-on-industrial-organizations-in-h2-2023/"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"uuid": "46ef6903-deac-415a-afaf-97e3ce067d7e",
|
||||||
|
"value": "HellHounds"
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"version": 312
|
"version": 312
|
||||||
|
|
Loading…
Reference in a new issue