From ce61b2d2dd94d06553e1a7a7decc10604e4bcbbb Mon Sep 17 00:00:00 2001 From: Deborah Servili Date: Mon, 19 Nov 2018 14:56:13 +0100 Subject: [PATCH] update oilrig related clusters + others --- clusters/rat.json | 17 ++++++++++++++--- clusters/threat-actor.json | 9 ++++++--- 2 files changed, 20 insertions(+), 6 deletions(-) diff --git a/clusters/rat.json b/clusters/rat.json index 42526c0e..d641060c 100644 --- a/clusters/rat.json +++ b/clusters/rat.json @@ -3280,14 +3280,25 @@ "value": "NukeSped" }, { - "value": "TheOneSpy", "description": " Remotely monitor and control any wrong activity of kids on all smartphones & computers", "meta": { "refs": [ "https://www.theonespy.com/" ] - } + }, + "uuid": "da5feaef-d96f-46e2-aad7-bd2745801048", + "value": "TheOneSpy" + }, + { + "description": "BONDUPDATER is a PowerShell-based Trojan first discovered by FireEye in mid-November 2017, when OilRig targeted a different Middle Eastern governmental organization.\nThe BONDUPDATER Trojan contains basic backdoor functionality, allowing threat actors to upload and download files, as well as the ability to execute commands. BONDUPDATER, like other OilRig tools, uses DNS tunneling to communicate with its C2 server. During the past month, Unit 42 observed several attacks against a Middle Eastern government leveraging an updated version of the BONDUPDATER malware, which now includes the ability to use TXT records within its DNS tunneling protocol for its C2 communications.", + "meta": { + "refs": [ + "https://researchcenter.paloaltonetworks.com/2018/09/unit42-oilrig-uses-updated-bondupdater-target-middle-eastern-government/" + ] + }, + "uuid": "ef9f1592-0186-4f5d-a8ea-6c10450d2219", + "value": "BONDUPDATER" } ], - "version": 22 + "version": 23 } diff --git a/clusters/threat-actor.json b/clusters/threat-actor.json index df550bff..3a7230da 100644 --- a/clusters/threat-actor.json +++ b/clusters/threat-actor.json @@ -2170,7 +2170,8 @@ "https://www2.fireeye.com/rs/848-DID-242/images/rpt-apt29-hammertoss.pdf", "https://www.us-cert.gov/sites/default/files/publications/AR-17-20045_Enhanced_Analysis_of_GRIZZLY_STEPPE_Activity.pdf", "https://www.fireeye.com/blog/threat-research/2017/03/dissecting_one_ofap.html", - "https://www.cfr.org/interactive/cyber-operations/dukes" + "https://www.cfr.org/interactive/cyber-operations/dukes", + "https://pylos.co/2018/11/18/cozybear-in-from-the-cold/" ], "synonyms": [ "Dukes", @@ -3314,7 +3315,9 @@ "https://researchcenter.paloaltonetworks.com/2017/12/unit42-introducing-the-adversary-playbook-first-up-oilrig/", "https://pan-unit42.github.io/playbook_viewer/", "https://raw.githubusercontent.com/pan-unit42/playbook_viewer/master/playbook_json/oilrig.json", - "https://www.cfr.org/interactive/cyber-operations/oilrig" + "https://www.cfr.org/interactive/cyber-operations/oilrig", + "https://researchcenter.paloaltonetworks.com/2018/09/unit42-oilrig-uses-updated-bondupdater-target-middle-eastern-government/", + "https://researchcenter.paloaltonetworks.com/2018/11/unit42-analyzing-oilrigs-ops-tempo-testing-weaponization-delivery/" ], "synonyms": [ "Twisted Kitten", @@ -6014,5 +6017,5 @@ "value": "HookAds" } ], - "version": 78 + "version": 79 }