mirror of https://github.com/MISP/misp-galaxy
chg: [threat-actor] UNC2452/DarkHalo added - ref. #614
parent
184d57f0a2
commit
2b356a9eb0
|
@ -8504,7 +8504,25 @@
|
|||
},
|
||||
"uuid": "c8b961fe-3698-41ac-aba1-002ee3c19531",
|
||||
"value": "Operation Skeleton Key"
|
||||
},
|
||||
{
|
||||
"description": "Reporting regarding activity related to the SolarWinds supply chain injection has grown quickly since initial disclosure on 13 December 2020. A significant amount of press reporting has focused on the identification of the actor(s) involved, victim organizations, possible campaign timeline, and potential impact. The US Government and cyber community have also provided detailed information on how the campaign was likely conducted and some of the malware used. MITRE’s ATT&CK team — with the assistance of contributors — has been mapping techniques used by the actor group, referred to as UNC2452/Dark Halo by FireEye and Volexity respectively, as well as SUNBURST and TEARDROP malware.",
|
||||
"meta": {
|
||||
"refs": [
|
||||
"https://medium.com/mitre-attack/identifying-unc2452-related-techniques-9f7b6c7f3714",
|
||||
"https://www.fireeye.com/blog/threat-research/2020/12/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor.html",
|
||||
"https://news.sophos.com/en-us/2020/12/21/how-sunburst-malware-does-defense-evasion/",
|
||||
"https://www.microsoft.com/security/blog/2020/12/18/analyzing-solorigate-the-compromised-dll-file-that-started-a-sophisticated-cyberattack-and-how-microsoft-defender-helps-protect/",
|
||||
"https://pastebin.com/6EDgCKxd",
|
||||
"https://github.com/fireeye/sunburst_countermeasures"
|
||||
],
|
||||
"synonyms": [
|
||||
"DarkHalo"
|
||||
]
|
||||
},
|
||||
"uuid": "2ee5ed7a-c4d0-40be-a837-20817474a15b",
|
||||
"value": "UNC2452"
|
||||
}
|
||||
],
|
||||
"version": 195
|
||||
"version": 196
|
||||
}
|
||||
|
|
Loading…
Reference in New Issue