diff --git a/clusters/threat-actor.json b/clusters/threat-actor.json index 1105c38..38a35ba 100644 --- a/clusters/threat-actor.json +++ b/clusters/threat-actor.json @@ -16839,6 +16839,16 @@ }, "uuid": "bed7279c-4ae4-459a-a862-8c69e0cfdb93", "value": "Storm-0494" + }, + { + "description": "DragonRank is a threat actor primarily targeting web application services in Asia and Europe, utilizing TTPs associated with Simplified Chinese-speaking hacking groups. They exploit vulnerabilities in platforms like phpMyAdmin and WordPress to deploy web shells, enabling the installation of PlugX and BadIIS malware for black hat SEO practices. Their operations involve lateral movement within compromised networks to maintain control and elevate privileges, while also engaging in unethical online marketing strategies. DragonRank's activities include manipulating search engine rankings and distributing scam websites through compromised Windows IIS servers.", + "meta": { + "refs": [ + "https://blog.talosintelligence.com/dragon-rank-seo-poisoning/" + ] + }, + "uuid": "28157c93-0b9f-4341-983a-3a521cee12bb", + "value": "DragonRank" } ], "version": 315