diff --git a/clusters/threat-actor.json b/clusters/threat-actor.json index 29a66e05..4c06eec3 100644 --- a/clusters/threat-actor.json +++ b/clusters/threat-actor.json @@ -12777,6 +12777,16 @@ }, "uuid": "533af03d-e160-4312-a92f-0500055f2b56", "value": "TwoSail Junk" + }, + { + "description": "Cloud security company Lacework says it discovered a threat actor group named Xcatze that uses a Python named AndroxGh0st to take over AWS servers and send out massive email spam campaigns. Lacework says the malware operates by scanning web apps written in the Laravel PHP framework for exposed configuration files to identify and steal server credentials. Researchers said AndroxGh0st specifically searches for AWS, SendGrid, and Twilio credentials, which it uses to take control of email servers and accounts and send out the spam campaigns.", + "meta": { + "refs": [ + "https://www.lacework.com/blog/androxghost-the-python-malware-exploiting-your-aws-keys/" + ] + }, + "uuid": "83764206-8012-47c6-9c7a-dc04c99559e7", + "value": "Xcatze" } ], "version": 293