From 4d4a462d7a57bd71fe351eab8a9a4dc7b9d489c8 Mon Sep 17 00:00:00 2001 From: Rony Date: Thu, 17 Sep 2020 00:07:40 +0530 Subject: [PATCH] Update threat-actor.json Adding Fox-Kitten and cleaned (or improved) winnti --- clusters/threat-actor.json | 51 ++++++++++++++++++++++++++------------ 1 file changed, 35 insertions(+), 16 deletions(-) diff --git a/clusters/threat-actor.json b/clusters/threat-actor.json index 340e2f7..31002e9 100644 --- a/clusters/threat-actor.json +++ b/clusters/threat-actor.json @@ -640,31 +640,26 @@ "https://attack.mitre.org/groups/G0044/", "https://www.crowdstrike.com/blog/meet-crowdstrikes-adversary-of-the-month-for-july-wicked-spider/", "https://www.secureworks.com/research/threat-profiles/bronze-atlas", - "https://www.secureworks.com/research/threat-profiles/bronze-export" + "https://www.secureworks.com/research/threat-profiles/bronze-export", + "https://www.pwc.co.uk/cyber-security/assets/cyber-threats-2019-retrospect.pdf", + "https://www.justice.gov/opa/pr/seven-international-cyber-defendants-including-apt41-actors-charged-connection-computer" ], "synonyms": [ "Winnti Umbrella", "Winnti Group", - "WinNTI", - "Tailgater Team", "Suckfly", "APT41", "APT 41", - "Group 72", "Group72", - "Tailgater", - "Ragebeast", + "Group 72", "Blackfly", - "Lead", - "Wicked Spider", - "APT17", - "APT 17", - "Dogfish", - "Deputy Dog", - "Wicked Panda", - "Barium", + "LEAD", + "WICKED SPIDER", + "WICKED PANDA", + "BARIUM", "BRONZE ATLAS", - "BRONZE EXPORT" + "BRONZE EXPORT", + "Red Kelpie" ] }, "related": [ @@ -8364,7 +8359,31 @@ }, "uuid": "b6f3150f-2240-4c57-9dda-5144c5077058", "value": "Evilnum" + }, + { + "description": "PIONEER KITTEN is an Iran-based adversary that has been active since at least 2017 and has a suspected nexus to the Iranian government. This adversary appears to be primarily focused on gaining and maintaining access to entities possessing sensitive information of likely intelligence interest to the Iranian government. According to DRAGOS, they also targeted ICS-related entities using known VPN vulnerabilities. They are widely known to use open source penetration testing tools for reconnaissance and to establish encrypted communications.", + "meta": { + "country": "IR", + "refs": [ + "https://youtu.be/pBDu8EGWRC4?t=2492", + "https://www.dragos.com/threat/parisite", + "https://www.dragos.com/wp-content/uploads/The-ICS-Threat-Landscape.pdf", + "https://www.dragos.com/wp-content/uploads/NA-EL-Threat-Perspective-2019.pdf", + "https://www.clearskysec.com/wp-content/uploads/2020/02/ClearSky-Fox-Kitten-Campaign.pdf", + "https://www.zdnet.com/article/fbi-says-an-iranian-hacking-group-is-attacking-f5-networking-devices", + "https://www.crowdstrike.com/blog/who-is-pioneer-kitten", + "https://www.zdnet.com/article/iranian-hackers-are-selling-access-to-compromised-companies-on-an-underground-forum", + "https://us-cert.cisa.gov/ncas/alerts/aa20-259a" + ], + "synonyms": [ + "PIONEER KITTEN", + "PARISITE", + "UNC757" + ] + }, + "uuid": "bfb0bc20-5bdf-47ff-b07f-dbd9a3cb9772", + "value": "Fox Kitten" } ], - "version": 178 + "version": 179 }