mirror of
https://github.com/MISP/misp-galaxy.git
synced 2024-11-30 02:37:17 +00:00
Merge pull request #634 from Delta-Sierra/master
Serveral updates and additions
This commit is contained in:
commit
f36f246a63
4 changed files with 177 additions and 6 deletions
|
@ -15459,6 +15459,15 @@
|
||||||
"synonyms": [],
|
"synonyms": [],
|
||||||
"type": []
|
"type": []
|
||||||
},
|
},
|
||||||
|
"related": [
|
||||||
|
{
|
||||||
|
"dest-uuid": "c4ce1174-9462-47e9-8038-794f40a184b3",
|
||||||
|
"tags": [
|
||||||
|
"estimative-language:likelihood-probability=\"likely\""
|
||||||
|
],
|
||||||
|
"type": "similar"
|
||||||
|
}
|
||||||
|
],
|
||||||
"uuid": "3c43bd4c-8c40-47b5-ae97-3dd0f0c0e8d8",
|
"uuid": "3c43bd4c-8c40-47b5-ae97-3dd0f0c0e8d8",
|
||||||
"value": "SideWinder"
|
"value": "SideWinder"
|
||||||
},
|
},
|
||||||
|
|
|
@ -2564,6 +2564,13 @@
|
||||||
"estimative-language:likelihood-probability=\"almost-certain\""
|
"estimative-language:likelihood-probability=\"almost-certain\""
|
||||||
],
|
],
|
||||||
"type": "uses"
|
"type": "uses"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"dest-uuid": "e69f9836-873a-43d3-92a8-97ab783a4171",
|
||||||
|
"tags": [
|
||||||
|
"estimative-language:likelihood-probability=\"likely\""
|
||||||
|
],
|
||||||
|
"type": "similar"
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"uuid": "54895630-efd2-4608-9c24-319de972a9eb",
|
"uuid": "54895630-efd2-4608-9c24-319de972a9eb",
|
||||||
|
|
|
@ -5799,6 +5799,7 @@
|
||||||
{
|
{
|
||||||
"description": "Ransomware",
|
"description": "Ransomware",
|
||||||
"meta": {
|
"meta": {
|
||||||
|
"encryption": "AES",
|
||||||
"extensions": [
|
"extensions": [
|
||||||
".crypt",
|
".crypt",
|
||||||
"4 random characters, e.g., .PzZs, .MKJL"
|
"4 random characters, e.g., .PzZs, .MKJL"
|
||||||
|
@ -6094,6 +6095,7 @@
|
||||||
{
|
{
|
||||||
"description": "Ransomware no extension change",
|
"description": "Ransomware no extension change",
|
||||||
"meta": {
|
"meta": {
|
||||||
|
"encryption": "RSA",
|
||||||
"payment-method": "Bitcoin",
|
"payment-method": "Bitcoin",
|
||||||
"price": "0.9 (500$) - 1.9 (1000$) after 4 days",
|
"price": "0.9 (500$) - 1.9 (1000$) after 4 days",
|
||||||
"ransomnotes-filenames": [
|
"ransomnotes-filenames": [
|
||||||
|
@ -6486,8 +6488,9 @@
|
||||||
"value": "CryptoTrooper"
|
"value": "CryptoTrooper"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"description": "Ransomware",
|
"description": "Ransomware, Infection by Phishing",
|
||||||
"meta": {
|
"meta": {
|
||||||
|
"encryption": "RSA",
|
||||||
"payment-method": "Bitcoin",
|
"payment-method": "Bitcoin",
|
||||||
"price": "1.09 (500$)",
|
"price": "1.09 (500$)",
|
||||||
"ransomnotes-filenames": [
|
"ransomnotes-filenames": [
|
||||||
|
@ -8935,8 +8938,9 @@
|
||||||
"value": "Offline ransomware"
|
"value": "Offline ransomware"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"description": "Ransomware",
|
"description": "Ransomware. Infection: drive-by-download; Platform: Windows; Extorsion by Prepaid Voucher",
|
||||||
"meta": {
|
"meta": {
|
||||||
|
"Encryption": "RSA",
|
||||||
"extensions": [
|
"extensions": [
|
||||||
".LOL!",
|
".LOL!",
|
||||||
".OMG!"
|
".OMG!"
|
||||||
|
@ -8946,6 +8950,9 @@
|
||||||
"ransomnotes-filenames": [
|
"ransomnotes-filenames": [
|
||||||
"how to get data.txt"
|
"how to get data.txt"
|
||||||
],
|
],
|
||||||
|
"refs": [
|
||||||
|
"https://arxiv.org/pdf/2102.06249.pdf"
|
||||||
|
],
|
||||||
"synonyms": [
|
"synonyms": [
|
||||||
"GPCode"
|
"GPCode"
|
||||||
]
|
]
|
||||||
|
@ -9530,6 +9537,7 @@
|
||||||
{
|
{
|
||||||
"description": "Ransomware no extension change, Javascript Ransomware",
|
"description": "Ransomware no extension change, Javascript Ransomware",
|
||||||
"meta": {
|
"meta": {
|
||||||
|
"encryption": "AES",
|
||||||
"payment-method": "Bitcoin",
|
"payment-method": "Bitcoin",
|
||||||
"price": "1",
|
"price": "1",
|
||||||
"refs": [
|
"refs": [
|
||||||
|
@ -11209,6 +11217,7 @@
|
||||||
{
|
{
|
||||||
"description": "On October 24, 2017, Cisco Talos was alerted to a widescale ransomware campaign affecting organizations across eastern Europe and Russia. As was the case in previous situations, we quickly mobilized to assess the situation and ensure that customers remain protected from this and other threats as they emerge across the threat landscape. There have been several large scale ransomware campaigns over the last several months. This appears to have some similarities to Nyetya in that it is also based on Petya ransomware. Major portions of the code appear to have been rewritten. The distribution does not appear to have the sophistication of the supply chain attacks we have seen recently.",
|
"description": "On October 24, 2017, Cisco Talos was alerted to a widescale ransomware campaign affecting organizations across eastern Europe and Russia. As was the case in previous situations, we quickly mobilized to assess the situation and ensure that customers remain protected from this and other threats as they emerge across the threat landscape. There have been several large scale ransomware campaigns over the last several months. This appears to have some similarities to Nyetya in that it is also based on Petya ransomware. Major portions of the code appear to have been rewritten. The distribution does not appear to have the sophistication of the supply chain attacks we have seen recently.",
|
||||||
"meta": {
|
"meta": {
|
||||||
|
"encryption": "AES+RSA",
|
||||||
"payment-method": "Bitcoin",
|
"payment-method": "Bitcoin",
|
||||||
"price": "0.05 (300 $)",
|
"price": "0.05 (300 $)",
|
||||||
"ransomnotes": [
|
"ransomnotes": [
|
||||||
|
@ -13609,7 +13618,16 @@
|
||||||
"https://www.proofpoint.com/us/threat-insight/post/ta2101-plays-government-imposter-distribute-malware-german-italian-and-us"
|
"https://www.proofpoint.com/us/threat-insight/post/ta2101-plays-government-imposter-distribute-malware-german-italian-and-us"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"uuid": "5d999c23-11cf-4dee-84bb-f447a4f70dc8",
|
"related": [
|
||||||
|
{
|
||||||
|
"dest-uuid": "e69f9836-873a-43d3-92a8-97ab783a4171",
|
||||||
|
"tags": [
|
||||||
|
"estimative-language:likelihood-probability=\"likely\""
|
||||||
|
],
|
||||||
|
"type": "related-to"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"uuid": "c60776a6-91dd-499b-8b4c-7940479e71fc",
|
||||||
"value": "Maze"
|
"value": "Maze"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -13900,14 +13918,32 @@
|
||||||
"RECOVER-FILES.txt"
|
"RECOVER-FILES.txt"
|
||||||
],
|
],
|
||||||
"ransomnotes-refs": [
|
"ransomnotes-refs": [
|
||||||
"https://www.bleepstatic.com/images/news/columns/week-in-ransomware/2020/september/25/egregor.jpg"
|
"https://www.bleepstatic.com/images/news/columns/week-in-ransomware/2020/september/25/egregor.jpg",
|
||||||
|
"https://2kjpox12cnap3zv36440iue7-wpengine.netdna-ssl.com/wp-content/uploads/2020/10/egregor-ransom-demanding-message.png"
|
||||||
],
|
],
|
||||||
"refs": [
|
"refs": [
|
||||||
"https://www.appgate.com/news-press/appgate-labs-analyzes-new-family-of-ransomware-egregor",
|
"https://www.appgate.com/news-press/appgate-labs-analyzes-new-family-of-ransomware-egregor",
|
||||||
"https://www.bleepingcomputer.com/news/security/crytek-hit-by-egregor-ransomware-ubisoft-data-leaked/",
|
"https://www.bleepingcomputer.com/news/security/crytek-hit-by-egregor-ransomware-ubisoft-data-leaked/",
|
||||||
"https://cybersecuritynews.com/egregor-ransomware/"
|
"https://cybersecuritynews.com/egregor-ransomware/",
|
||||||
|
"https://securityboulevard.com/2020/10/egregor-sekhmets-cousin/"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
"related": [
|
||||||
|
{
|
||||||
|
"dest-uuid": "6fb1ea9e-5389-4932-8b22-c691b74b75a8",
|
||||||
|
"tags": [
|
||||||
|
"estimative-language:likelihood-probability=\"likely\""
|
||||||
|
],
|
||||||
|
"type": "variant-of"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"dest-uuid": "5d999c23-11cf-4dee-84bb-f447a4f70dc8",
|
||||||
|
"tags": [
|
||||||
|
"estimative-language:likelihood-probability=\"likely\""
|
||||||
|
],
|
||||||
|
"type": "successor-of"
|
||||||
|
}
|
||||||
|
],
|
||||||
"uuid": "8bd094a7-103f-465f-8640-18dcc53042e5",
|
"uuid": "8bd094a7-103f-465f-8640-18dcc53042e5",
|
||||||
"value": "Egregor"
|
"value": "Egregor"
|
||||||
},
|
},
|
||||||
|
@ -14025,7 +14061,96 @@
|
||||||
},
|
},
|
||||||
"uuid": "dff71334-c173-45b6-8647-af66be0605d7",
|
"uuid": "dff71334-c173-45b6-8647-af66be0605d7",
|
||||||
"value": "RansomEXX"
|
"value": "RansomEXX"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"description": "Mobile ransomware. The Zscaler ThreatLabZ team recently came across a URL named hxxp://coronavirusapp[.]site/mobile.html, which portrays itself as a download site for an Android app that tracks the coronavirus spread across the globe. In reality, the app is Android ransomware, which locks out the victim and asks for ransom to unlock the device.\nThe app portrays itself as a Coronavirus Tracker. As soon as it starts running, it asks the user for several authorizations, including admin rights.\n In fact, this ransomware does not encrypt nor steal anything and only lock the device with an hard coded code.",
|
||||||
|
"meta": {
|
||||||
|
"ransomnotes-refs": [
|
||||||
|
"https://www.zscaler.com/sites/default/files/images/blogs/covid/covid_lock_screen_edited_4.png",
|
||||||
|
"https://www.zscaler.com/sites/default/files/images/blogs/covid/covid_pastebin_5.png"
|
||||||
|
],
|
||||||
|
"refs": [
|
||||||
|
"https://www.zscaler.com/blogs/security-research/covidlock-android-ransomware-walkthrough-and-unlocking-routine"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"uuid": "b5fe83e9-c5d7-4b0e-99ab-4f1d356d1749",
|
||||||
|
"value": "CovidLock"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"description": "This malware is written in Java and is named after references in the code. Tycoon has been in the wild since December 2019 and has targeted organizations in the education, SMBs, and software industries.\nTycoon is a multi-platform Java ransomware that targets Windows and Linux systems. This ransomware denies access to the system administrator following an attack on the domain controller and file servers. The initial intrusion occurs through an internet-facing remote desktop protocol (RDP) jump-server.",
|
||||||
|
"meta": {
|
||||||
|
"date": "december 2019",
|
||||||
|
"refs": [
|
||||||
|
"https://cyberflorida.org/threat-advisory/tycoon-ransomware/",
|
||||||
|
"https://usf.app.box.com/s/83xh0t5w99klrsoisorir7kgs14o972s"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"uuid": "39781a7a-cd3a-4e24-aeb8-94a767a2551b",
|
||||||
|
"value": "Tycoon"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"description": "Ragnar Locker is a ransomware identified in December 2019 that targetscorporate networks inBig Game Huntingtargeted attacks. This reportpresents recent elements regarding this ransomware.",
|
||||||
|
"meta": {
|
||||||
|
"refs": [
|
||||||
|
"https://www.bleepingcomputer.com/news/security/ragnar-locker-ransomware-targets-msp-enterprise-support-tools/",
|
||||||
|
"https://news.sophos.com/en-us/2020/05/21/ragnar-locker-ransomware-deploys-virtual-machine-to-dodge-security/",
|
||||||
|
"https://www.cybersecurity-insiders.com/ransomware-attack-makes-cwt-pay-4-5-million-in-bitcoins-to-hackers/"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"related": [
|
||||||
|
{
|
||||||
|
"dest-uuid": "54895630-efd2-4608-9c24-319de972a9eb",
|
||||||
|
"tags": [
|
||||||
|
"estimative-language:likelihood-probability=\"likely\""
|
||||||
|
],
|
||||||
|
"type": "similar"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"dest-uuid": "5d999c23-11cf-4dee-84bb-f447a4f70dc8",
|
||||||
|
"tags": [
|
||||||
|
"estimative-language:likelihood-probability=\"likely\""
|
||||||
|
],
|
||||||
|
"type": "related-to"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"uuid": "e69f9836-873a-43d3-92a8-97ab783a4171",
|
||||||
|
"value": "Ragnar Locker"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"description": "Ransom.Sekhmet not only encrypts a victims files, but also threatens to publish them.",
|
||||||
|
"meta": {
|
||||||
|
"ransomnotes-filenames": [
|
||||||
|
"RECOVER-FILES.txt"
|
||||||
|
],
|
||||||
|
"ransomnotes-refs": [
|
||||||
|
"https://blog.malwarebytes.com/wp-content/uploads/2020/11/Sekhmet_ransom_note.png"
|
||||||
|
],
|
||||||
|
"refs": [
|
||||||
|
"https://www.bleepingcomputer.com/news/security/maze-ransomware-is-shutting-down-its-cybercrime-operation/",
|
||||||
|
"https://www.zdnet.com/article/as-maze-ransomware-group-retires-clients-turn-to-sekhmet-ransomware-spin-off-egregor/",
|
||||||
|
"https://blog.malwarebytes.com/detections/ransom-sekhmet/",
|
||||||
|
"https://securityboulevard.com/2020/10/egregor-sekhmets-cousin/"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"related": [
|
||||||
|
{
|
||||||
|
"dest-uuid": "8bd094a7-103f-465f-8640-18dcc53042e5",
|
||||||
|
"tags": [
|
||||||
|
"estimative-language:likelihood-probability=\"likely\""
|
||||||
|
],
|
||||||
|
"type": "similar"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"dest-uuid": "5d999c23-11cf-4dee-84bb-f447a4f70dc8",
|
||||||
|
"tags": [
|
||||||
|
"estimative-language:likelihood-probability=\"likely\""
|
||||||
|
],
|
||||||
|
"type": "successor-of"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"uuid": "6fb1ea9e-5389-4932-8b22-c691b74b75a8",
|
||||||
|
"value": "Sekhmet"
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"version": 92
|
"version": 94
|
||||||
}
|
}
|
||||||
|
|
|
@ -7951,6 +7951,9 @@
|
||||||
"refs": [
|
"refs": [
|
||||||
"https://securelist.com/apt-trends-report-q1-2018/85280/",
|
"https://securelist.com/apt-trends-report-q1-2018/85280/",
|
||||||
"https://blog.trendmicro.com/trendlabs-security-intelligence/first-active-attack-exploiting-cve-2019-2215-found-on-google-play-linked-to-sidewinder-apt-group/",
|
"https://blog.trendmicro.com/trendlabs-security-intelligence/first-active-attack-exploiting-cve-2019-2215-found-on-google-play-linked-to-sidewinder-apt-group/",
|
||||||
|
"https://malpedia.caad.fkie.fraunhofer.de/details/win.sidewinder",
|
||||||
|
"https://otx.alienvault.com/pulse/5fd10760f9afb730d37c4742/",
|
||||||
|
"https://www.trendmicro.com/en_us/research/20/l/sidewinder-leverages-south-asian-territorial-issues-for-spear-ph.html",
|
||||||
"https://s.tencent.com/research/report/659.html",
|
"https://s.tencent.com/research/report/659.html",
|
||||||
"https://www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/fireeye-sidewinder-targeted-attack.pdf",
|
"https://www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/fireeye-sidewinder-targeted-attack.pdf",
|
||||||
"https://s.tencent.com/research/report/479.html",
|
"https://s.tencent.com/research/report/479.html",
|
||||||
|
@ -7963,6 +7966,15 @@
|
||||||
"T-APT-04"
|
"T-APT-04"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
"related": [
|
||||||
|
{
|
||||||
|
"dest-uuid": "3c43bd4c-8c40-47b5-ae97-3dd0f0c0e8d8",
|
||||||
|
"tags": [
|
||||||
|
"estimative-language:likelihood-probability=\"likely\""
|
||||||
|
],
|
||||||
|
"type": "similar"
|
||||||
|
}
|
||||||
|
],
|
||||||
"uuid": "c4ce1174-9462-47e9-8038-794f40a184b3",
|
"uuid": "c4ce1174-9462-47e9-8038-794f40a184b3",
|
||||||
"value": "SideWinder"
|
"value": "SideWinder"
|
||||||
},
|
},
|
||||||
|
@ -8445,6 +8457,24 @@
|
||||||
"uuid": "2ee5ed7a-c4d0-40be-a837-20817474a15b",
|
"uuid": "2ee5ed7a-c4d0-40be-a837-20817474a15b",
|
||||||
"value": "UNC2452"
|
"value": "UNC2452"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"description": "In early Febuary, 2021 TeamTNT launched a new campaign against Docker and Kubernetes environments. Using a collection of container images that are hosted in Docker Hub, the attackers are targeting misconfigured docker daemons, Kubeflow dashboards, and Weave Scope, exploiting these environments in order to steal cloud credentials, open backdoors, mine cryptocurrency, and launch a worm that is looking for the next victim.\nThey're linked to the First Crypto-Mining Worm to Steal AWS Credentials and Hildegard Cryptojacking malware.\nTeamTNT is a relatively recent addition to a growing number of threats targeting the cloud. While they employ some of the same tactics as similar groups, TeamTNT stands out with their social media presence and penchant for self-promotion. Tweets from the TeamTNT’s account are in both English and German although it is unknown if they are located in Germany.",
|
||||||
|
"meta": {
|
||||||
|
"refs": [
|
||||||
|
"https://unit42.paloaltonetworks.com/hildegard-malware-teamtnt/",
|
||||||
|
"https://malpedia.caad.fkie.fraunhofer.de/details/elf.teamtnt",
|
||||||
|
"https://blog.aquasec.com/teamtnt-campaign-against-docker-kubernetes-environment",
|
||||||
|
"https://cybersecurity.att.com/blogs/labs-research/teamtnt-delivers-malware-with-new-detection-evasion-tool",
|
||||||
|
"https://www.cadosecurity.com/post/team-tnt-the-first-crypto-mining-worm-to-steal-aws-credentials",
|
||||||
|
"https://www.intezer.com/blog/cloud-security/top-linux-cloud-threats-of-2020/",
|
||||||
|
"https://www.trendmicro.com/en_us/research/20/l/teamtnt-now-deploying-ddos-capable-irc-bot-tntbotinger.html",
|
||||||
|
"https://cyware.com/news/hildegard-teamtnts-new-feature-rich-malware-targeting-kubernetes-6587eb45",
|
||||||
|
"https://www.lacework.com/teamtnt-builds-botnet-from-chinese-cloud-servers/"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"uuid": "27de6a09-844b-4dcb-9ff9-7292aad826ba",
|
||||||
|
"value": "TeamTNT"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"description": "HAFNIUM primarily targets entities in the United States across a number of industry sectors, including infectious disease researchers, law firms, higher education institutions, defense contractors, policy think tanks, and NGOs. Microsoft Threat Intelligence Center (MSTIC) attributes this campaign with high confidence to HAFNIUM, a group assessed to be state-sponsored and operating out of China, based on observed victimology, tactics and procedures. HAFNIUM has previously compromised victims by exploiting vulnerabilities in internet-facing servers, and has used legitimate open-source frameworks, like Covenant, for command and control. Once they’ve gained access to a victim network, HAFNIUM typically exfiltrates data to file sharing sites like MEGA.In campaigns unrelated to these vulnerabilities, Microsoft has observed HAFNIUM interacting with victim Office 365 tenants. While they are often unsuccessful in compromising customer accounts, this reconnaissance activity helps the adversary identify more details about their targets’ environments. HAFNIUM operates primarily from leased virtual private servers (VPS) in the United States.",
|
"description": "HAFNIUM primarily targets entities in the United States across a number of industry sectors, including infectious disease researchers, law firms, higher education institutions, defense contractors, policy think tanks, and NGOs. Microsoft Threat Intelligence Center (MSTIC) attributes this campaign with high confidence to HAFNIUM, a group assessed to be state-sponsored and operating out of China, based on observed victimology, tactics and procedures. HAFNIUM has previously compromised victims by exploiting vulnerabilities in internet-facing servers, and has used legitimate open-source frameworks, like Covenant, for command and control. Once they’ve gained access to a victim network, HAFNIUM typically exfiltrates data to file sharing sites like MEGA.In campaigns unrelated to these vulnerabilities, Microsoft has observed HAFNIUM interacting with victim Office 365 tenants. While they are often unsuccessful in compromising customer accounts, this reconnaissance activity helps the adversary identify more details about their targets’ environments. HAFNIUM operates primarily from leased virtual private servers (VPS) in the United States.",
|
||||||
"meta": {
|
"meta": {
|
||||||
|
|
Loading…
Reference in a new issue