diff --git a/clusters/threat-actor.json b/clusters/threat-actor.json index 6265681..ada6030 100644 --- a/clusters/threat-actor.json +++ b/clusters/threat-actor.json @@ -7047,7 +7047,18 @@ }, "uuid": "bc8390aa-8c4e-11e9-a9cb-e37c361210af", "value": "Group5" + }, + { + "description": "McAfee Advanced Threat Research analysts have discovered a new operation targeting humanitarian aid organizations and using North Korean political topics as bait to lure victims into opening malicious Microsoft Word documents. Our analysts have named this Operation Honeybee, based on the names of the malicious documents used in the attacks.\nAdvanced Threat Research analysts have also discovered malicious documents authored by the same actor that indicate a tactical shift. These documents do not contain the typical lures by this actor, instead using Word compatibility messages to entice victims into opening them.\nThe Advanced Threat Research team also observed a heavy concentration of the implant in Vietnam from January 15–17.", + "meta": { + "refs": [ + "https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/mcafee-uncovers-operation-honeybee-malicious-document-campaign-targeting-humanitarian-aid-groups/", + "https://attack.mitre.org/groups/G0072/" + ] + }, + "uuid": "2d82a18e-8c53-11e9-b0ec-536b62fa3d86", + "value": "Honeybee" } ], - "version": 112 + "version": 113 }