From 2b356a9eb094012c6db46366981147aab9eac637 Mon Sep 17 00:00:00 2001 From: Alexandre Dulaunoy Date: Tue, 12 Jan 2021 07:01:36 +0100 Subject: [PATCH] chg: [threat-actor] UNC2452/DarkHalo added - ref. #614 --- clusters/threat-actor.json | 20 +++++++++++++++++++- 1 file changed, 19 insertions(+), 1 deletion(-) diff --git a/clusters/threat-actor.json b/clusters/threat-actor.json index 19e35cf..3227b5e 100644 --- a/clusters/threat-actor.json +++ b/clusters/threat-actor.json @@ -8504,7 +8504,25 @@ }, "uuid": "c8b961fe-3698-41ac-aba1-002ee3c19531", "value": "Operation Skeleton Key" + }, + { + "description": "Reporting regarding activity related to the SolarWinds supply chain injection has grown quickly since initial disclosure on 13 December 2020. A significant amount of press reporting has focused on the identification of the actor(s) involved, victim organizations, possible campaign timeline, and potential impact. The US Government and cyber community have also provided detailed information on how the campaign was likely conducted and some of the malware used. MITRE’s ATT&CK team — with the assistance of contributors — has been mapping techniques used by the actor group, referred to as UNC2452/Dark Halo by FireEye and Volexity respectively, as well as SUNBURST and TEARDROP malware.", + "meta": { + "refs": [ + "https://medium.com/mitre-attack/identifying-unc2452-related-techniques-9f7b6c7f3714", + "https://www.fireeye.com/blog/threat-research/2020/12/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor.html", + "https://news.sophos.com/en-us/2020/12/21/how-sunburst-malware-does-defense-evasion/", + "https://www.microsoft.com/security/blog/2020/12/18/analyzing-solorigate-the-compromised-dll-file-that-started-a-sophisticated-cyberattack-and-how-microsoft-defender-helps-protect/", + "https://pastebin.com/6EDgCKxd", + "https://github.com/fireeye/sunburst_countermeasures" + ], + "synonyms": [ + "DarkHalo" + ] + }, + "uuid": "2ee5ed7a-c4d0-40be-a837-20817474a15b", + "value": "UNC2452" } ], - "version": 195 + "version": 196 }