From dd4249a17c282cccc1c9a5e1345ee0d0b9b8d66d Mon Sep 17 00:00:00 2001 From: Mathieu4141 Date: Fri, 1 Nov 2024 10:43:27 -0700 Subject: [PATCH] [threat-actors] Add UAC-0215 --- clusters/threat-actor.json | 11 +++++++++++ 1 file changed, 11 insertions(+) diff --git a/clusters/threat-actor.json b/clusters/threat-actor.json index f141011..4c43c22 100644 --- a/clusters/threat-actor.json +++ b/clusters/threat-actor.json @@ -17081,6 +17081,17 @@ }, "uuid": "54bc063d-fc4e-4076-a282-cdb98480da2a", "value": "Water Makara" + }, + { + "description": "UAC-0215 is an APT group that has orchestrated a phishing campaign targeting public institutions, major industries, and military units in Ukraine, utilizing rogue RDP files to gain unauthorized access. The malicious emails are designed to appear legitimate, enticing recipients to open attachments that connect their systems to the attacker's server, allowing extensive access to local resources. CERT-UA has identified this activity as high-risk and has advised organizations to block RDP files at mail gateways and restrict RDP connection capabilities. The campaign's geographical footprint suggests a potential for broader cyberattacks beyond Ukraine.", + "meta": { + "refs": [ + "https://cyble.com/blog/phishing-campaign-targeting-ukraine-uac-0215/", + "https://cert.gov.ua/article/6281076" + ] + }, + "uuid": "0debc8ab-1449-4915-aa33-f6a54df2b2d7", + "value": "UAC-0215" } ], "version": 318