From eec91d14653a9a903a53164009359c948e119574 Mon Sep 17 00:00:00 2001 From: Mathieu4141 Date: Thu, 6 Jun 2024 01:27:06 -0700 Subject: [PATCH] [threat-actors] Add StucxTeam --- clusters/threat-actor.json | 11 +++++++++++ 1 file changed, 11 insertions(+) diff --git a/clusters/threat-actor.json b/clusters/threat-actor.json index 4263776..1849d48 100644 --- a/clusters/threat-actor.json +++ b/clusters/threat-actor.json @@ -16034,6 +16034,17 @@ }, "uuid": "58e75098-8edc-48ce-b1de-c1a8647e33d3", "value": "Unfading Sea Haze" + }, + { + "description": "Stucx is a threat actor known for targeting Israeli systems, including SCADA systems and the Red Alert missile protection system. Stucx Team has also developed a mobile application called MyOPECS for coordinating attacks, which includes features like DDoS attacks and is expected to add more capabilities in the future. Additionally, they have been observed using VPNs and proxy software to conceal their activities and have a history of making threats against those who cooperate with Israel.", + "meta": { + "refs": [ + "https://socradar.io/reflections-of-the-israel-palestine-conflict-on-the-cyber-world/", + "https://www.darkowl.com/blog-content/2-month-review-of-cyber-activities-in-the-israel-hamas-conflict/" + ] + }, + "uuid": "ee13ddb3-e8c0-4568-b56c-82d82c30f48b", + "value": "StucxTeam" } ], "version": 310