diff --git a/clusters/threat-actor.json b/clusters/threat-actor.json index 23b98e75..e8039bd0 100644 --- a/clusters/threat-actor.json +++ b/clusters/threat-actor.json @@ -17454,6 +17454,16 @@ }, "uuid": "305fbff0-d3ff-43e3-8741-63bad68e47ee", "value": "BrazenBamboo" + }, + { + "description": "Water Barghest is a cybercriminal group that has compromised over 20,000 IoT devices by October 2024, monetizing them through a residential proxy marketplace. They automate the entire process from identifying vulnerable devices using n-day and zero-day exploits to deploying Ngioweb malware and selling the compromised assets. Their operations include leveraging Ubiquiti EdgeRouter devices for espionage and utilizing automated scripts to exploit vulnerabilities within minutes of discovery. Water Barghest has maintained a low profile for years, but their activities gained attention due to the deployment of a zero-day vulnerability against Cisco IOS XE devices in October 2023.", + "meta": { + "refs": [ + "https://www.trendmicro.com/en_us/research/24/k/water-barghest.html" + ] + }, + "uuid": "314325cd-5972-46a9-af1e-4b1e5585619d", + "value": "Water Barghest" } ], "version": 320