mirror of https://github.com/MISP/misp-galaxy
Merge pull request #685 from danielplohmann/patch-14
adding threat actor "Moses Staff"pull/688/head
commit
8e09c9b30c
|
@ -8964,6 +8964,23 @@
|
||||||
},
|
},
|
||||||
"uuid": "a57e5bf5-d7f4-43a1-9c15-8a44cdb95079",
|
"uuid": "a57e5bf5-d7f4-43a1-9c15-8a44cdb95079",
|
||||||
"value": "TA2541"
|
"value": "TA2541"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"description": "Cybereason Nocturnus describes Moses Staff as an Iranian hacker group, first spotted in October 2021. Their motivation appears to be to harm Israeli companies by leaking sensitive, stolen data.",
|
||||||
|
"meta": {
|
||||||
|
"country": "IR",
|
||||||
|
"refs": [
|
||||||
|
"https://twitter.com/campuscodi/status/1450455259202166799",
|
||||||
|
"https://research.checkpoint.com/2021/mosesstaff-targeting-israeli-companies/",
|
||||||
|
"https://www.cybereason.com/blog/strifewater-rat-iranian-apt-moses-staff-adds-new-trojan-to-ransomware-operations",
|
||||||
|
"https://www.fortinet.com/blog/threat-research/guard-your-drive-from-driveguard"
|
||||||
|
],
|
||||||
|
"synonyms": [
|
||||||
|
"Moses Staff"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"uuid": "d45dd940-b38d-4b2c-9f2f-3e4a0eac841c",
|
||||||
|
"value": "MosesStaff"
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"version": 213
|
"version": 213
|
||||||
|
|
Loading…
Reference in New Issue