From ed26f4d246e84bb790682014f9a2867f666214a9 Mon Sep 17 00:00:00 2001 From: Mathieu4141 Date: Thu, 15 Feb 2024 03:42:28 -0800 Subject: [PATCH] [threat-actors] Add TA2725 --- clusters/threat-actor.json | 10 ++++++++++ 1 file changed, 10 insertions(+) diff --git a/clusters/threat-actor.json b/clusters/threat-actor.json index ec1afc5..ca2f74f 100644 --- a/clusters/threat-actor.json +++ b/clusters/threat-actor.json @@ -14981,6 +14981,16 @@ }, "uuid": "a1527821-fe84-44ec-ad29-8d3040463bc9", "value": "Operation Emmental" + }, + { + "description": "TA2725 is a threat actor that has been tracked since March 2022. They primarily target organizations in Brazil and Mexico using Brazilian banking malware and phishing techniques. Recently, they have expanded their operations to also target victims in Spain and Mexico simultaneously. TA2725 typically uses GoDaddy virtual hosting for their URL redirector and hosts malicious files on legitimate cloud hosting providers like Amazon AWS, Google Cloud, or Microsoft Azure. They have been known to spoof legitimate companies, such as ÉSECÈ Group, to deceive their victims.", + "meta": { + "refs": [ + "https://www.proofpoint.com/us/blog/threat-insight/copacabana-barcelona-cross-continental-threat-brazilian-banking-malware" + ] + }, + "uuid": "1697dace-fe21-452c-acee-bef62fc5e386", + "value": "TA2725" } ], "version": 300