From ab49b58b02b9089a061fa386172a3961b31f3fb0 Mon Sep 17 00:00:00 2001 From: Nils Kuhnert Date: Mon, 6 Aug 2018 08:33:34 +0200 Subject: [PATCH] Added DarkHydrus --- clusters/threat-actor.json | 10 ++++++++++ 1 file changed, 10 insertions(+) diff --git a/clusters/threat-actor.json b/clusters/threat-actor.json index b14316bc..a419b631 100644 --- a/clusters/threat-actor.json +++ b/clusters/threat-actor.json @@ -3777,6 +3777,16 @@ "https://researchcenter.paloaltonetworks.com/2018/08/unit42-gorgon-group-slithering-nation-state-cybercrime/" ] } + }, + { + "value": "DarkHydrus", + "description": "In July 2018, Unit 42 analyzed a targeted attack using a novel file type against at least one government agency in the Middle East. It was carried out by a previously unpublished threat group we track as DarkHydrus. Based on our telemetry, we were able to uncover additional artifacts leading us to believe this adversary group has been in operation with their current playbook since early 2016. This attack diverged from previous attacks we observed from this group as it involved spear-phishing emails sent to targeted organizations with password protected RAR archive attachments that contained malicious Excel Web Query files (.iqy).", + "uuid": "ce2c2dfd-2445-4fbc-a747-9e7092e383f9", + "meta": { + "refs": [ + "https://researchcenter.paloaltonetworks.com/2018/07/unit42-new-threat-actor-group-darkhydrus-targets-middle-east-government/" + ] + } } ], "name": "Threat actor",