misp-circl-feed/feeds/circl/misp/59003edc-eee8-4a2e-90c0-4d2e950d210f.json

1 line
3.7 KiB
JSON
Raw Normal View History

2023-04-21 13:25:09 +00:00
{"Event": {"info": "OSINT - From Espionage to Cyber Propaganda: Pawn Storm's Activities over the Past Two Years", "Tag": [{"colour": "#12e000", "exportable": true, "name": "misp-galaxy:threat-actor=\"Sofacy\""}, {"colour": "#0088cc", "exportable": true, "name": "misp-galaxy:microsoft-activity-group=\"STRONTIUM\""}, {"colour": "#ffffff", "exportable": true, "name": "tlp:white"}], "publish_timestamp": "0", "timestamp": "1493188544", "analysis": "2", "Attribute": [{"comment": "", "category": "External analysis", "uuid": "59003f1d-3750-4d9f-a840-4547950d210f", "timestamp": "1493188505", "to_ids": false, "value": "Pawn Storm\u2014also known as Sednit, Fancy Bear, APT28, Sofacy, and STRONTIUM\u2014is an active cyber espionage organization that has been very aggressive and ambitious in recent years. Pawn Storm\u2019s activities show that foreign and domestic espionage and influence on geopolitics are the group\u2019s main motives, with targets that include armed forces, the defense industry, news media, and politicians.\r\n\r\nThe group has been operating for years; in fact, Trend Micro first took note of their activities way back in 2004. But Pawn Storm has become increasingly relevant over the past two years, particularly because the group has been found to be doing more than espionage alone. In 2016, Pawn Storm attempted to influence public opinion, influence elections, and attempted to sway the mainstream media with stolen data. Earlier, Pawn Storm may seem to have limited their activities to political, military, and domestic espionage. Today the impact can be felt by various industries and enterprises operating throughout the world. Even the average citizen might be impacted as Pawn Storm tries to manipulate people\u2019s opinions about domestic and international affairs. The group's operations and methods might also serve as an example for other actors, who may copy tactics and repurpose them to fit their own objectives.", "Tag": [{"colour": "#002b4a", "exportable": true, "name": "osint:source-type=\"technical-report\""}, {"colour": "#001cad", "exportable": true, "name": "estimative-language:likelihood-probability=\"very-likely\""}, {"colour": "#075200", "exportable": true, "name": "admiralty-scale:source-reliability=\"b\""}], "disable_correlation": false, "object_relation": null, "type": "text"}, {"comment": "", "category": "External analysis", "uuid": "59003f2c-2050-4d29-8362-448f950d210f", "timestamp": "1493188504", "to_ids": false, "value": "https://www.trendmicro.com/vinfo/us/security/news/cyber-attacks/espionage-cyber-propaganda-two-years-of-pawn-storm", "Tag": [{"colour": "#002b4a", "exportable": true, "name": "osint:source-type=\"technical-report\""}, {"colour": "#001cad", "exportable": true, "name": "estimative-language:likelihood-probability=\"very-likely\""}, {"colour": "#075200", "exportable": true, "name": "admiralty-scale:source-reliability=\"b\""}], "disable_correlation": false, "object_relation": null, "type": "link"}, {"comment": "", "category": "External analysis", "uuid": "59003f3d-35b0-4876-90a9-42cc950d210f", "timestamp": "1493188504", "to_ids": false, "value": "https://documents.trendmicro.com/assets/wp/wp-two-years-of-pawn-storm.pdf", "Tag": [{"colour": "#002b4a", "exportable": true, "name": "osint:source-type=\"technical-report\""}, {"colour": "#001cad", "exportable": true, "name": "estimative-language:likelihood-probability=\"very-likely\""}, {"colour": "#075200", "exportable": true, "name": "admiralty-scale:source-reliability=\"b\""}], "disable_correlation": false, "object_relation": null, "type": "link"}], "extends_uuid": "", "published": false, "date": "2017-04-26", "Orgc": {"uuid": "55f6ea5e-2c60-40e5-964f-47a8950d210f", "name": "CIRCL"}, "threat_level_id": "3", "uuid": "59003edc-eee8-4a2e-90c0-4d2e950d210f"}}