From 8aeed60a249592bb0a8075fabc0120e9e7dd50da Mon Sep 17 00:00:00 2001 From: Deborah Servili Date: Mon, 11 Feb 2019 16:30:46 +0100 Subject: [PATCH] Add Siesta campaign --- clusters/threat-actor.json | 13 ++++++++++++- 1 file changed, 12 insertions(+), 1 deletion(-) diff --git a/clusters/threat-actor.json b/clusters/threat-actor.json index 3a0fc8a..e88965b 100644 --- a/clusters/threat-actor.json +++ b/clusters/threat-actor.json @@ -999,7 +999,8 @@ "refs": [ "http://researchcenter.paloaltonetworks.com/2017/02/unit42-menupass-returns-new-malware-new-attacks-japanese-academics-organizations/", "https://www.cfr.org/interactive/cyber-operations/apt-10", - "https://www.ncsc.gov.uk/content/files/protected_files/article_files/Joint%20report%20on%20publicly%20available%20hacking%20tools%20%28NCSC%29.pdf" + "https://www.ncsc.gov.uk/content/files/protected_files/article_files/Joint%20report%20on%20publicly%20available%20hacking%20tools%20%28NCSC%29.pdf", + "https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-report-final-v4.pdf" ], "synonyms": [ "APT10", @@ -6221,6 +6222,16 @@ }, "uuid": "c2c64bd3-a325-446f-91a8-b4c0f173a30b", "value": "APT39" + }, + { + "description": "FireEye recently looked deeper into the activity discussed in TrendMicro’s blog and dubbed the “Siesta” campaign. The tools, modus operandi, and infrastructure used in the campaign present two possibilities: either the Chinese cyber-espionage unit APT1 is perpetrating this activity, or another group is using the same tactics and tools as the legacy APT1.\nThe Siesta campaign reinforces the fact that analysts and network defenders should remain on the lookout for known, public indicators and for shared attributes that allow security experts to detect multiple actors with one signature.", + "meta": { + "refs": [ + "https://www.fireeye.com/blog/threat-research/2014/03/a-detailed-examination-of-the-siesta-campaign.html" + ] + }, + "uuid": "27c97181-b8e9-43e1-93c0-f953cac45326", + "value": "Siesta" } ], "version": 89