From 56a2a330d1165d623b94cd2a330305f5a1049ccb Mon Sep 17 00:00:00 2001 From: Mathieu4141 Date: Fri, 15 Nov 2024 03:42:18 -0800 Subject: [PATCH] [threat-actors] Add TA455 --- clusters/threat-actor.json | 11 +++++++++++ 1 file changed, 11 insertions(+) diff --git a/clusters/threat-actor.json b/clusters/threat-actor.json index 23541cdd..5ba3c61a 100644 --- a/clusters/threat-actor.json +++ b/clusters/threat-actor.json @@ -17422,6 +17422,17 @@ }, "uuid": "0f4c942f-9491-4844-b782-4ee65033c7e0", "value": "SilkSpecter" + }, + { + "description": "TA455 is an Iranian APT group targeting the aerospace industry through a campaign known as the “Iranian Dream Job Campaign,” utilizing deceptive job offers to lure victims. They employ spearphishing tactics with malicious ZIP files containing the executable “secur32[.]dll” and disguise their C2 communications within the traffic of reputable services like Cloudflare and GitHub. The group intentionally mimics the TTPs of the North Korean Lazarus group to mislead investigators and complicate attribution. Their multi-stage infection strategy enhances the likelihood of success while evading detection.", + "meta": { + "country": "IR", + "refs": [ + "https://informationsecuritybuzz.com/iranian-dream-job-aerospace/" + ] + }, + "uuid": "c2f1f2e3-9573-49be-b01e-6ffff9a9571b", + "value": "TA455" } ], "version": 320