diff --git a/clusters/threat-actor.json b/clusters/threat-actor.json index 52a55d7..888f4af 100644 --- a/clusters/threat-actor.json +++ b/clusters/threat-actor.json @@ -45,7 +45,14 @@ "https://en.wikipedia.org/wiki/PLA_Unit_61398", "http://intelreport.mandiant.com/Mandiant_APT1_Report.pdf", "https://www.cfr.org/interactive/cyber-operations/pla-unit-61398", - "https://www.fireeye.com/content/dam/fireeye-www/services/pdfs/mandiant-apt1-report.pdf" + "https://www.fireeye.com/content/dam/fireeye-www/services/pdfs/mandiant-apt1-report.pdf", + "https://blog.trendmicro.com/trendlabs-security-intelligence/the-siesta-campaign-a-new-targeted-attack-awakens/", + "https://www.fireeye.com/blog/threat-research/2014/03/a-detailed-examination-of-the-siesta-campaign.html", + "https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/operation-oceansalt-delivers-wave-after-wave/", + "https://www.mcafee.com/enterprise/en-us/assets/reports/rp-operation-oceansalt.pdf", + "https://www.symantec.com/connect/blogs/apt1-qa-attacks-comment-crew", + "https://attack.mitre.org/groups/G0006/", + "https://www.nytimes.com/2014/05/20/us/us-to-charge-chinese-workers-with-cyberspying.html" ], "synonyms": [ "Comment Panda", @@ -58,7 +65,9 @@ "TG-8223", "Comment Group", "Brown Fox", - "GIF89a" + "GIF89a", + "ShadyRAT", + "Shanghai Group" ] }, "related": [ @@ -367,9 +376,12 @@ "https://securelist.com/blog/research/71713/darkhotels-attacks-in-2015/", "https://blogs.technet.microsoft.com/mmpc/2016/06/09/reverse-engineering-dubnium-2", "https://securelist.com/blog/research/66779/the-darkhotel-apt/", + "https://securelist.com/the-darkhotel-apt/66779/", "http://drops.wooyun.org/tips/11726", "https://labs.bitdefender.com/wp-content/uploads/downloads/inexsmar-an-unusual-darkhotel-campaign/", - "https://www.cfr.org/interactive/cyber-operations/darkhotel" + "https://www.cfr.org/interactive/cyber-operations/darkhotel", + "https://www.securityweek.com/darkhotel-apt-uses-new-methods-target-politicians", + "https://attack.mitre.org/groups/G0012/" ], "synonyms": [ "DUBNIUM", @@ -377,9 +389,12 @@ "Karba", "Luder", "Nemim", + "Nemin", "Tapaoux", "Pioneer", - "Shadow Crane" + "Shadow Crane", + "APT-C-06", + "SIG25" ] }, "related": [ @@ -696,7 +711,25 @@ "refs": [ "http://cybercampaigns.net/wp-content/uploads/2013/06/Deep-Panda.pdf", "http://www.rsaconference.com/writable/presentations/file_upload/anf-t07b-the-art-of-attribution-identifying-and-pursuing-your-cyber-adversaries_final.pdf", - "https://www.cfr.org/interactive/cyber-operations/deep-panda" + "https://www.cfr.org/interactive/cyber-operations/deep-panda", + "https://eromang.zataz.com/2012/12/29/attack-and-ie-0day-informations-used-against-council-on-foreign-relations/", + "https://eromang.zataz.com/2013/01/02/capstone-turbine-corporation-also-targeted-in-the-cfr-watering-hole-attack-and-more/", + "https://www.crowdstrike.com/blog/department-labor-strategic-web-compromise/", + "https://www.crowdstrike.com/blog/deep-thought-chinese-targeting-national-security-think-tanks/", + "https://krebsonsecurity.com/2015/06/catching-up-on-the-opm-breach/", + "https://krebsonsecurity.com/2015/02/anthem-breach-may-have-started-in-april-2014/", + "https://www.nextgov.com/cybersecurity/2015/05/third-party-software-was-entry-point-background-check-system-hack/112354/", + "https://www.crowdstrike.com/blog/ironman-deep-panda-uses-sakula-malware-target-organizations-multiple-sectors/", + "https://www.abc.net.au/news/2014-11-13/g20-china-affliliated-hackers-breaches-australian-media/5889442", + "https://www.washingtonpost.com/business/economy/keypoint-suffers-network-breach-thousands-of-fed-workers-could-be-affected/2014/12/18/e6c7146c-86e1-11e4-a702-fa31ff4ae98e_story.html", + "https://www.seattletimes.com/business/local-business/feds-warned-premera-about-security-flaws-before-breach/", + "https://krebsonsecurity.com/2015/05/carefirst-blue-cross-breach-hits-1-1m/", + "https://threatvector.cylance.com/en_us/home/shell-crew-variants-continue-to-fly-under-big-avs-radar.html", + "https://www.bleepingcomputer.com/news/security/us-arrests-chinese-man-involved-with-sakula-malware-used-in-opm-and-anthem-hacks/", + "https://gizmodo.com/u-s-indicts-chinese-hacker-spies-in-conspiracy-to-stea-1830111695", + "https://www.cyberscoop.com/anthem-breach-indictment-chinese-national/", + "https://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/the-black-vine-cyberespionage-group.pdf", + "https://attack.mitre.org/groups/G0009/" ], "synonyms": [ "Deep Panda", @@ -4606,7 +4639,9 @@ "https://blog.domaintools.com/2017/03/hunt-case-study-hunting-campaign-indicators-on-privacy-protected-attack-infrastructure/", "http://www.clearskysec.com/copykitten-jpost/", "http://www.clearskysec.com/tulip/", - "https://www.cfr.org/interactive/cyber-operations/copykittens" + "https://www.cfr.org/interactive/cyber-operations/copykittens", + "https://www.clearskysec.com/wp-content/uploads/2017/07/Operation_Wilted_Tulip.pdf", + "https://attack.mitre.org/groups/G0052/" ], "synonyms": [ "Slayer Kitten" @@ -5041,7 +5076,9 @@ "https://www.proofpoint.com/us/threat-insight/post/Operation-Arid-Viper-Slithers-Back-Into-View", "https://www.ci-project.org/blog/2017/3/4/arid-viper", "http://blog.talosintelligence.com/2017/06/palestine-delphi.html", - "https://www.threatconnect.com/blog/kasperagent-malware-campaign/" + "https://www.threatconnect.com/blog/kasperagent-malware-campaign/", + "https://www.trendmicro.com/vinfo/us/security/news/cyber-attacks/sexually-explicit-material-used-as-lures-in-cyber-attacks?linkId=12425812", + "