From 59bd2763bc8341dc2b4b7fe39cd5c7d6b167c78d Mon Sep 17 00:00:00 2001 From: Mathieu4141 Date: Tue, 7 Nov 2023 10:37:08 -0800 Subject: [PATCH] [threat-actors] Add Xcatze --- clusters/threat-actor.json | 10 ++++++++++ 1 file changed, 10 insertions(+) diff --git a/clusters/threat-actor.json b/clusters/threat-actor.json index 29a66e05..4c06eec3 100644 --- a/clusters/threat-actor.json +++ b/clusters/threat-actor.json @@ -12777,6 +12777,16 @@ }, "uuid": "533af03d-e160-4312-a92f-0500055f2b56", "value": "TwoSail Junk" + }, + { + "description": "Cloud security company Lacework says it discovered a threat actor group named Xcatze that uses a Python named AndroxGh0st to take over AWS servers and send out massive email spam campaigns. Lacework says the malware operates by scanning web apps written in the Laravel PHP framework for exposed configuration files to identify and steal server credentials. Researchers said AndroxGh0st specifically searches for AWS, SendGrid, and Twilio credentials, which it uses to take control of email servers and accounts and send out the spam campaigns.", + "meta": { + "refs": [ + "https://www.lacework.com/blog/androxghost-the-python-malware-exploiting-your-aws-keys/" + ] + }, + "uuid": "83764206-8012-47c6-9c7a-dc04c99559e7", + "value": "Xcatze" } ], "version": 293