From 1f2e59addb1e2b5cd26f5e106d26cba8f7a14d93 Mon Sep 17 00:00:00 2001 From: Deborah Servili Date: Fri, 7 Jun 2019 16:34:43 +0200 Subject: [PATCH] update Threat actor galaxy --- clusters/threat-actor.json | 42 ++++++++++++++++++++++++++++++-------- 1 file changed, 34 insertions(+), 8 deletions(-) diff --git a/clusters/threat-actor.json b/clusters/threat-actor.json index 6ec6e3c..888f4af 100644 --- a/clusters/threat-actor.json +++ b/clusters/threat-actor.json @@ -375,13 +375,13 @@ "refs": [ "https://securelist.com/blog/research/71713/darkhotels-attacks-in-2015/", "https://blogs.technet.microsoft.com/mmpc/2016/06/09/reverse-engineering-dubnium-2", - "https://securelist.com/blog/research/66779/the-darkhotel-apt/",, - "https://securelist.com/the-darkhotel-apt/66779/" + "https://securelist.com/blog/research/66779/the-darkhotel-apt/", + "https://securelist.com/the-darkhotel-apt/66779/", "http://drops.wooyun.org/tips/11726", "https://labs.bitdefender.com/wp-content/uploads/downloads/inexsmar-an-unusual-darkhotel-campaign/", "https://www.cfr.org/interactive/cyber-operations/darkhotel", "https://www.securityweek.com/darkhotel-apt-uses-new-methods-target-politicians", - "https://attack.mitre.org/groups/G0012/>" + "https://attack.mitre.org/groups/G0012/" ], "synonyms": [ "DUBNIUM", @@ -389,7 +389,7 @@ "Karba", "Luder", "Nemim", - "Nemin" + "Nemin", "Tapaoux", "Pioneer", "Shadow Crane", @@ -711,7 +711,25 @@ "refs": [ "http://cybercampaigns.net/wp-content/uploads/2013/06/Deep-Panda.pdf", "http://www.rsaconference.com/writable/presentations/file_upload/anf-t07b-the-art-of-attribution-identifying-and-pursuing-your-cyber-adversaries_final.pdf", - "https://www.cfr.org/interactive/cyber-operations/deep-panda" + "https://www.cfr.org/interactive/cyber-operations/deep-panda", + "https://eromang.zataz.com/2012/12/29/attack-and-ie-0day-informations-used-against-council-on-foreign-relations/", + "https://eromang.zataz.com/2013/01/02/capstone-turbine-corporation-also-targeted-in-the-cfr-watering-hole-attack-and-more/", + "https://www.crowdstrike.com/blog/department-labor-strategic-web-compromise/", + "https://www.crowdstrike.com/blog/deep-thought-chinese-targeting-national-security-think-tanks/", + "https://krebsonsecurity.com/2015/06/catching-up-on-the-opm-breach/", + "https://krebsonsecurity.com/2015/02/anthem-breach-may-have-started-in-april-2014/", + "https://www.nextgov.com/cybersecurity/2015/05/third-party-software-was-entry-point-background-check-system-hack/112354/", + "https://www.crowdstrike.com/blog/ironman-deep-panda-uses-sakula-malware-target-organizations-multiple-sectors/", + "https://www.abc.net.au/news/2014-11-13/g20-china-affliliated-hackers-breaches-australian-media/5889442", + "https://www.washingtonpost.com/business/economy/keypoint-suffers-network-breach-thousands-of-fed-workers-could-be-affected/2014/12/18/e6c7146c-86e1-11e4-a702-fa31ff4ae98e_story.html", + "https://www.seattletimes.com/business/local-business/feds-warned-premera-about-security-flaws-before-breach/", + "https://krebsonsecurity.com/2015/05/carefirst-blue-cross-breach-hits-1-1m/", + "https://threatvector.cylance.com/en_us/home/shell-crew-variants-continue-to-fly-under-big-avs-radar.html", + "https://www.bleepingcomputer.com/news/security/us-arrests-chinese-man-involved-with-sakula-malware-used-in-opm-and-anthem-hacks/", + "https://gizmodo.com/u-s-indicts-chinese-hacker-spies-in-conspiracy-to-stea-1830111695", + "https://www.cyberscoop.com/anthem-breach-indictment-chinese-national/", + "https://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/the-black-vine-cyberespionage-group.pdf", + "https://attack.mitre.org/groups/G0009/" ], "synonyms": [ "Deep Panda", @@ -5058,7 +5076,9 @@ "https://www.proofpoint.com/us/threat-insight/post/Operation-Arid-Viper-Slithers-Back-Into-View", "https://www.ci-project.org/blog/2017/3/4/arid-viper", "http://blog.talosintelligence.com/2017/06/palestine-delphi.html", - "https://www.threatconnect.com/blog/kasperagent-malware-campaign/" + "https://www.threatconnect.com/blog/kasperagent-malware-campaign/", + "https://www.trendmicro.com/vinfo/us/security/news/cyber-attacks/sexually-explicit-material-used-as-lures-in-cyber-attacks?linkId=12425812", + "