mirror of
https://github.com/MISP/misp-galaxy.git
synced 2024-11-26 00:37:18 +00:00
Merge pull request #1035 from Mathieu4141/threat-actors/a3284f2a-3ca4-4c0c-a1fc-758cd5f14970
[threat actors] Add 2 actors
This commit is contained in:
commit
cce72b69e6
2 changed files with 22 additions and 1 deletions
|
@ -599,7 +599,7 @@ Category: *tea-matrix* - source: ** - total: *7* elements
|
|||
|
||||
[Threat Actor](https://www.misp-galaxy.org/threat-actor) - Known or estimated adversary groups targeting organizations and employees. Adversary groups are regularly confused with their initial operation or campaign. threat-actor-classification meta can be used to clarify the understanding of the threat-actor if also considered as operation, campaign or activity group.
|
||||
|
||||
Category: *actor* - source: *MISP Project* - total: *779* elements
|
||||
Category: *actor* - source: *MISP Project* - total: *781* elements
|
||||
|
||||
[[HTML](https://www.misp-galaxy.org/threat-actor)] - [[JSON](https://github.com/MISP/misp-galaxy/blob/main/clusters/threat-actor.json)]
|
||||
|
||||
|
|
|
@ -17443,6 +17443,27 @@
|
|||
},
|
||||
"uuid": "4d3c9666-6e08-4186-854c-cc0f8c28f5b6",
|
||||
"value": "Kairos"
|
||||
},
|
||||
{
|
||||
"description": "BrazenBamboo is a Chinese state-affiliated threat actor known for developing the LIGHTSPY, DEEPDATA, and DEEPPOST malware families. Their infrastructure includes capabilities for zero-day exploitation, specifically targeting vulnerabilities like FortiClient, and employs a command-and-control architecture that supports multi-platform operations. Volexity's analysis indicates that BrazenBamboo is a well-resourced entity with a focus on domestic targets, utilizing custom analyst software to manage data collected from their malware. The ongoing development of their malware families is evidenced by the timestamps associated with their latest payloads.",
|
||||
"meta": {
|
||||
"country": "CN",
|
||||
"refs": [
|
||||
"https://www.volexity.com/blog/2024/11/15/brazenbamboo-weaponizes-forticlient-vulnerability-to-steal-vpn-credentials-via-deepdata/"
|
||||
]
|
||||
},
|
||||
"uuid": "305fbff0-d3ff-43e3-8741-63bad68e47ee",
|
||||
"value": "BrazenBamboo"
|
||||
},
|
||||
{
|
||||
"description": "Water Barghest is a cybercriminal group that has compromised over 20,000 IoT devices by October 2024, monetizing them through a residential proxy marketplace. They automate the entire process from identifying vulnerable devices using n-day and zero-day exploits to deploying Ngioweb malware and selling the compromised assets. Their operations include leveraging Ubiquiti EdgeRouter devices for espionage and utilizing automated scripts to exploit vulnerabilities within minutes of discovery. Water Barghest has maintained a low profile for years, but their activities gained attention due to the deployment of a zero-day vulnerability against Cisco IOS XE devices in October 2023.",
|
||||
"meta": {
|
||||
"refs": [
|
||||
"https://www.trendmicro.com/en_us/research/24/k/water-barghest.html"
|
||||
]
|
||||
},
|
||||
"uuid": "314325cd-5972-46a9-af1e-4b1e5585619d",
|
||||
"value": "Water Barghest"
|
||||
}
|
||||
],
|
||||
"version": 320
|
||||
|
|
Loading…
Reference in a new issue