From 16e22180f1a4bff4cf7478ad19e42c884cbc3d17 Mon Sep 17 00:00:00 2001 From: Mathieu4141 Date: Thu, 11 Jan 2024 08:25:33 -0800 Subject: [PATCH] [threat-actors] Add UTA0178 --- clusters/threat-actor.json | 11 +++++++++++ 1 file changed, 11 insertions(+) diff --git a/clusters/threat-actor.json b/clusters/threat-actor.json index f58ab0e..4a3578b 100644 --- a/clusters/threat-actor.json +++ b/clusters/threat-actor.json @@ -14025,6 +14025,17 @@ }, "uuid": "a36266ce-2374-472a-a715-13b99e38e74e", "value": "Water Curupira" + }, + { + "description": "While Volexity largely observed the attacker essentially living off the land, they still deployed a handful of malware files and tools during the course of the incident which primarily consisted of webshells, proxy utilities, and file modifications to allow credential harvesting. Once UTA0178 had access into the network via the ICS VPN appliance, their general approach was to pivot from system to system using compromised credentials. They would then further compromise credentials of users on any new system that was breached, and use these credentials to log into additional systems via RDP. Volexity observed the attacker obtaining credentials in a variety of ways.", + "meta": { + "country": "CN", + "refs": [ + "https://www.volexity.com/blog/2024/01/10/active-exploitation-of-two-zero-day-vulnerabilities-in-ivanti-connect-secure-vpn/" + ] + }, + "uuid": "f288f686-b5b3-4c86-9960-5f8fb18709a3", + "value": "UTA0178" } ], "version": 297