Merge pull request #580 from r0ny123/patch-2

Update threat-actor.json
This commit is contained in:
Alexandre Dulaunoy 2020-09-16 21:52:41 +02:00 committed by GitHub
commit d6838e8986
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23

View file

@ -640,31 +640,26 @@
"https://attack.mitre.org/groups/G0044/", "https://attack.mitre.org/groups/G0044/",
"https://www.crowdstrike.com/blog/meet-crowdstrikes-adversary-of-the-month-for-july-wicked-spider/", "https://www.crowdstrike.com/blog/meet-crowdstrikes-adversary-of-the-month-for-july-wicked-spider/",
"https://www.secureworks.com/research/threat-profiles/bronze-atlas", "https://www.secureworks.com/research/threat-profiles/bronze-atlas",
"https://www.secureworks.com/research/threat-profiles/bronze-export" "https://www.secureworks.com/research/threat-profiles/bronze-export",
"https://www.pwc.co.uk/cyber-security/assets/cyber-threats-2019-retrospect.pdf",
"https://www.justice.gov/opa/pr/seven-international-cyber-defendants-including-apt41-actors-charged-connection-computer"
], ],
"synonyms": [ "synonyms": [
"Winnti Umbrella", "Winnti Umbrella",
"Winnti Group", "Winnti Group",
"WinNTI",
"Tailgater Team",
"Suckfly", "Suckfly",
"APT41", "APT41",
"APT 41", "APT 41",
"Group 72",
"Group72", "Group72",
"Tailgater", "Group 72",
"Ragebeast",
"Blackfly", "Blackfly",
"Lead", "LEAD",
"Wicked Spider", "WICKED SPIDER",
"APT17", "WICKED PANDA",
"APT 17", "BARIUM",
"Dogfish",
"Deputy Dog",
"Wicked Panda",
"Barium",
"BRONZE ATLAS", "BRONZE ATLAS",
"BRONZE EXPORT" "BRONZE EXPORT",
"Red Kelpie"
] ]
}, },
"related": [ "related": [
@ -8364,7 +8359,31 @@
}, },
"uuid": "b6f3150f-2240-4c57-9dda-5144c5077058", "uuid": "b6f3150f-2240-4c57-9dda-5144c5077058",
"value": "Evilnum" "value": "Evilnum"
},
{
"description": "PIONEER KITTEN is an Iran-based adversary that has been active since at least 2017 and has a suspected nexus to the Iranian government. This adversary appears to be primarily focused on gaining and maintaining access to entities possessing sensitive information of likely intelligence interest to the Iranian government. According to DRAGOS, they also targeted ICS-related entities using known VPN vulnerabilities. They are widely known to use open source penetration testing tools for reconnaissance and to establish encrypted communications.",
"meta": {
"country": "IR",
"refs": [
"https://youtu.be/pBDu8EGWRC4?t=2492",
"https://www.dragos.com/threat/parisite",
"https://www.dragos.com/wp-content/uploads/The-ICS-Threat-Landscape.pdf",
"https://www.dragos.com/wp-content/uploads/NA-EL-Threat-Perspective-2019.pdf",
"https://www.clearskysec.com/wp-content/uploads/2020/02/ClearSky-Fox-Kitten-Campaign.pdf",
"https://www.zdnet.com/article/fbi-says-an-iranian-hacking-group-is-attacking-f5-networking-devices",
"https://www.crowdstrike.com/blog/who-is-pioneer-kitten",
"https://www.zdnet.com/article/iranian-hackers-are-selling-access-to-compromised-companies-on-an-underground-forum",
"https://us-cert.cisa.gov/ncas/alerts/aa20-259a"
],
"synonyms": [
"PIONEER KITTEN",
"PARISITE",
"UNC757"
]
},
"uuid": "bfb0bc20-5bdf-47ff-b07f-dbd9a3cb9772",
"value": "Fox Kitten"
} }
], ],
"version": 178 "version": 179
} }