Merge branch 'jstnk9-main' into main

pull/875/head
Alexandre Dulaunoy 2023-10-13 16:32:19 +02:00
commit 99f4454987
No known key found for this signature in database
GPG Key ID: 09E2CD4944E6CBCD
1 changed files with 51 additions and 1 deletions

View File

@ -7224,6 +7224,34 @@
{
"description": "Wizard Spider is reportedly associated with Grim Spider and Lunar Spider.\nThe WIZARD SPIDER threat group is the Russia-based operator of the TrickBot banking malware. This group represents a growing criminal enterprise of which GRIM SPIDER appears to be a subset. The LUNAR SPIDER threat group is the Eastern European-based operator and developer of the commodity banking malware called BokBot (aka IcedID), which was first observed in April 2017. The BokBot malware provides LUNAR SPIDER affiliates with a variety of capabilities to enable credential theft and wire fraud, through the use of webinjects and a malware distribution function.\nGRIM SPIDER is a sophisticated eCrime group that has been operating the Ryuk ransomware since August 2018, targeting large organizations for a high-ransom return. This methodology, known as “big game hunting,” signals a shift in operations for WIZARD SPIDER, a criminal enterprise of which GRIM SPIDER appears to be a cell. The WIZARD SPIDER threat group, known as the Russia-based operator of the TrickBot banking malware, had focused primarily on wire fraud in the past.",
"meta": {
"cfr-suspected-state-sponsor": "Russian Federation",
"cfr-suspected-victims": [
"Australia",
"Bahamas",
"Canada",
"Costa Rica",
"France",
"Germany",
"India",
"Ireland",
"Italy",
"Japan",
"Mexico",
"New Zealand",
"Spain",
"Switzerland",
"Taiwan",
"United Kingdom",
"Ukraine",
"United States"
],
"cfr-target-category": [
"Defense",
"Financial",
"Government",
"Healthcare",
"Telecommunications"
],
"country": "RU",
"refs": [
"https://labs.sentinelone.com/top-tier-russian-organized-cybercrime-group-unveils-fileless-stealthy-powertrick-backdoor-for-high-value-targets/",
@ -7237,7 +7265,9 @@
"https://www.secureworks.com/research/dyre-banking-trojan",
"https://www.secureworks.com/blog/how-cyber-adversaries-are-adapting-to-exploit-the-global-pandemic",
"https://www.secureworks.com/blog/trickbot-modifications-target-us-mobile-users",
"http://www.secureworks.com/research/threat-profiles/gold-blackburn"
"http://www.secureworks.com/research/threat-profiles/gold-blackburn",
"https://strapi.eurepoc.eu/uploads/Eu_Repo_C_APT_profile_Conti_Wizard_Spider_dc2a733e18.pdf",
"https://www.prodaft.com/m/reports/WizardSpider_TLPWHITE_v.1.4.pdf"
],
"synonyms": [
"TEMP.MixMaster",
@ -9600,6 +9630,26 @@
{
"description": "The Gelsemium group has been active since at least 2014 and was described in the past by a few security companies. Gelsemiums name comes from one possible translation ESET found while reading a report from VenusTech who dubbed the group 狼毒草 for the first time. Its the name of a genus of flowering plants belonging to the family Gelsemiaceae, Gelsemium elegans is the species that contains toxic compounds like Gelsemine, Gelsenicine and Gelsevirine, which ESET choses as names for the three components of this malware family.",
"meta": {
"cfr-suspected-victims": [
"North Korea",
"South Korea",
"Japan",
"China",
"Mongolia",
"Egypt",
"Saudi Arabia",
"Yemen",
"Oman",
"Iran",
"Iraq",
"Kuwait",
"Israel",
"Jordan",
"Gaza",
"Syria",
"Turkey",
"Lebanon"
],
"cfr-target-category": [
"Government",
"Electronics Manufacturers",