mirror of https://github.com/MISP/misp-galaxy
[threat-actors] Add TA2722
parent
be8e127590
commit
57016ac3ae
|
@ -14755,6 +14755,19 @@
|
||||||
},
|
},
|
||||||
"uuid": "e9de47f0-3e68-465c-b91e-7a2b7371955c",
|
"uuid": "e9de47f0-3e68-465c-b91e-7a2b7371955c",
|
||||||
"value": "TA2552"
|
"value": "TA2552"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"description": "TA2722 is a highly active threat actor that targets various industries including Shipping/Logistics, Manufacturing, Business Services, Pharmaceutical, and Energy. They primarily focus on organizations in North America, Europe, and Southeast Asia. This threat actor impersonates Philippine government entities and uses themes related to the government to gain remote access to target computers. Their objectives include information gathering, installing follow-on malware, and engaging in business email compromise activities.",
|
||||||
|
"meta": {
|
||||||
|
"refs": [
|
||||||
|
"https://www.proofpoint.com/us/blog/threat-insight/new-threat-actor-spoofs-philippine-government-covid-19-health-data-widespread"
|
||||||
|
],
|
||||||
|
"synonyms": [
|
||||||
|
"Balikbayan Foxes"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"uuid": "625c3fb4-16fc-4992-9ff2-4fad869750ac",
|
||||||
|
"value": "TA2722"
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"version": 298
|
"version": 298
|
||||||
|
|
Loading…
Reference in New Issue