1 line
8.9 KiB
JSON
1 line
8.9 KiB
JSON
|
{"Event": {"info": "OSINT - Attack on Critical Infrastructure Leverages Template Injection", "Tag": [{"colour": "#ffffff", "exportable": true, "name": "tlp:white"}, {"colour": "#ff8e41", "exportable": true, "name": "certsi:critical-sector=\"energy\""}, {"colour": "#00223b", "exportable": true, "name": "osint:source-type=\"blog-post\""}], "publish_timestamp": "1499463607", "timestamp": "1511418228", "analysis": "2", "Attribute": [{"comment": "", "category": "External analysis", "uuid": "595ffec5-ab90-496e-8edf-41bc02de0b81", "timestamp": "1499463588", "to_ids": false, "value": "http://blog.talosintelligence.com/2017/07/template-injection.html", "Tag": [{"colour": "#00223b", "exportable": true, "name": "osint:source-type=\"blog-post\""}], "disable_correlation": false, "object_relation": null, "type": "link"}, {"comment": "", "category": "External analysis", "uuid": "595ffed7-8f20-4ae7-839f-419c02de0b81", "timestamp": "1499463588", "to_ids": false, "value": "Attackers are continually trying to find new ways to target users with malware sent via email. Talos has identified an email-based attack targeting the energy sector, including nuclear power, that puts a new spin on the classic word document attachment phish. Typically, malicious Word documents that are sent as attachments to phishing emails will themselves contain a script or macro that executes malicious code. In this case, there is no malicious code in the attachment itself. The attachment instead tries to download a template file over an SMB connection so that the user's credentials can be silently harvested. In addition, this template file could also potentially be used to download other malicious payloads to the victim's computer.", "Tag": [{"colour": "#00223b", "exportable": true, "name": "osint:source-type=\"blog-post\""}], "disable_correlation": false, "object_relation": null, "type": "text"}, {"comment": "Related IP Address", "category": "Network activity", "uuid": "595fff2d-3c18-4ae2-98c6-46f902de0b81", "timestamp": "1499463555", "to_ids": true, "value": "184.154.150.66", "disable_correlation": false, "object_relation": null, "type": "ip-dst"}, {"comment": "Related IP Address", "category": "Network activity", "uuid": "595fff2d-b108-4f78-bd75-437a02de0b81", "timestamp": "1499463555", "to_ids": true, "value": "5.153.58.45", "disable_correlation": false, "object_relation": null, "type": "ip-dst"}, {"comment": "Related IP Address", "category": "Network activity", "uuid": "595fff2d-e9fc-439a-b74a-417c02de0b81", "timestamp": "1499463555", "to_ids": true, "value": "62.8.193.206", "disable_correlation": false, "object_relation": null, "type": "ip-dst"}, {"comment": "Controls Engineer.docx", "category": "Payload delivery", "uuid": "595fff43-ea00-4f5c-b80d-478f02de0b81", "timestamp": "1499463555", "to_ids": true, "value": "b02508baf8567e62f3c0fd14833c82fb24e8ba4f0dc84aeb7690d9ea83385baa", "disable_correlation": false, "object_relation": null, "type": "sha256"}, {"comment": "Controls Engineer.docx", "category": "Payload delivery", "uuid": "595fff43-ef64-46c8-a17f-42e302de0b81", "timestamp": "1499463555", "to_ids": true, "value": "3d6eadf0f0b3fb7f996e6eb3d540945c2d736822df1a37dcd0e25371fa2d75a0", "disable_correlation": false, "object_relation": null, "type": "sha256"}, {"comment": "Controls Engineer.docx", "category": "Payload delivery", "uuid": "595fff43-90e4-4bab-896b-41df02de0b81", "timestamp": "1499463555", "to_ids": true, "value": "ac6c1df3895af63b864bb33bf30cb31059e247443ddb8f23517849362ec94f08", "disable_correlation": false, "object_relation": null, "type": "sha256"}, {"comment": "", "category": "Payload delivery", "uuid": "595fff5c-5e24-4630-851a-4a4b02de0b81", "timestamp": "1499463555", "to_ids": true, "value": "Report03-23-2017.docx", "disable_correlation": false, "object_relation": null, "type": "filename"}, {"comment": "Report03-23-2017.docx", "category": "Payload delivery", "uuid": "595fff5c-89b0-40fc-83ce-498702de0b81", "timestamp": "1499463555", "to_ids": true, "value": "93cd6696e150caf6106e6066b58107372dcf43377bf4420c848007c10ff80bc9", "disable_correlat
|