diff --git a/clusters/threat-actor.json b/clusters/threat-actor.json index 897b5c5..2ef6b65 100644 --- a/clusters/threat-actor.json +++ b/clusters/threat-actor.json @@ -12356,6 +12356,20 @@ }, "uuid": "27e11cc5-1688-4aea-a98d-96e6c275d005", "value": "UNC3890" + }, + { + "description": "In October 2022, Kaspersky identified an active infection of government, agriculture and transportation organizations located in the Donetsk, Lugansk, and Crimea regions. Although the initial vector of compromise is unclear, the details of the next stage imply the use of spear phishing or similar methods. The victims navigated to a URL pointing to a ZIP archive hosted on a malicious web server.", + "meta": { + "aliases": [ + "Bad Magic" + ], + "refs": [ + "https://www.malwarebytes.com/blog/threat-intelligence/2023/05/redstinger", + "https://securelist.com/bad-magic-apt/109087/" + ] + }, + "uuid": "b813c6a2-f8c7-4071-83bd-24c181ff2bd4", + "value": "RedStinger" } ], "version": 289