mirror of https://github.com/MISP/misp-galaxy
Merge branch 'jstnk9-main' into main
commit
99f4454987
|
@ -7224,6 +7224,34 @@
|
|||
{
|
||||
"description": "Wizard Spider is reportedly associated with Grim Spider and Lunar Spider.\nThe WIZARD SPIDER threat group is the Russia-based operator of the TrickBot banking malware. This group represents a growing criminal enterprise of which GRIM SPIDER appears to be a subset. The LUNAR SPIDER threat group is the Eastern European-based operator and developer of the commodity banking malware called BokBot (aka IcedID), which was first observed in April 2017. The BokBot malware provides LUNAR SPIDER affiliates with a variety of capabilities to enable credential theft and wire fraud, through the use of webinjects and a malware distribution function.\nGRIM SPIDER is a sophisticated eCrime group that has been operating the Ryuk ransomware since August 2018, targeting large organizations for a high-ransom return. This methodology, known as “big game hunting,” signals a shift in operations for WIZARD SPIDER, a criminal enterprise of which GRIM SPIDER appears to be a cell. The WIZARD SPIDER threat group, known as the Russia-based operator of the TrickBot banking malware, had focused primarily on wire fraud in the past.",
|
||||
"meta": {
|
||||
"cfr-suspected-state-sponsor": "Russian Federation",
|
||||
"cfr-suspected-victims": [
|
||||
"Australia",
|
||||
"Bahamas",
|
||||
"Canada",
|
||||
"Costa Rica",
|
||||
"France",
|
||||
"Germany",
|
||||
"India",
|
||||
"Ireland",
|
||||
"Italy",
|
||||
"Japan",
|
||||
"Mexico",
|
||||
"New Zealand",
|
||||
"Spain",
|
||||
"Switzerland",
|
||||
"Taiwan",
|
||||
"United Kingdom",
|
||||
"Ukraine",
|
||||
"United States"
|
||||
],
|
||||
"cfr-target-category": [
|
||||
"Defense",
|
||||
"Financial",
|
||||
"Government",
|
||||
"Healthcare",
|
||||
"Telecommunications"
|
||||
],
|
||||
"country": "RU",
|
||||
"refs": [
|
||||
"https://labs.sentinelone.com/top-tier-russian-organized-cybercrime-group-unveils-fileless-stealthy-powertrick-backdoor-for-high-value-targets/",
|
||||
|
@ -7237,7 +7265,9 @@
|
|||
"https://www.secureworks.com/research/dyre-banking-trojan",
|
||||
"https://www.secureworks.com/blog/how-cyber-adversaries-are-adapting-to-exploit-the-global-pandemic",
|
||||
"https://www.secureworks.com/blog/trickbot-modifications-target-us-mobile-users",
|
||||
"http://www.secureworks.com/research/threat-profiles/gold-blackburn"
|
||||
"http://www.secureworks.com/research/threat-profiles/gold-blackburn",
|
||||
"https://strapi.eurepoc.eu/uploads/Eu_Repo_C_APT_profile_Conti_Wizard_Spider_dc2a733e18.pdf",
|
||||
"https://www.prodaft.com/m/reports/WizardSpider_TLPWHITE_v.1.4.pdf"
|
||||
],
|
||||
"synonyms": [
|
||||
"TEMP.MixMaster",
|
||||
|
@ -9600,6 +9630,26 @@
|
|||
{
|
||||
"description": "The Gelsemium group has been active since at least 2014 and was described in the past by a few security companies. Gelsemium’s name comes from one possible translation ESET found while reading a report from VenusTech who dubbed the group 狼毒草 for the first time. It’s the name of a genus of flowering plants belonging to the family Gelsemiaceae, Gelsemium elegans is the species that contains toxic compounds like Gelsemine, Gelsenicine and Gelsevirine, which ESET choses as names for the three components of this malware family.",
|
||||
"meta": {
|
||||
"cfr-suspected-victims": [
|
||||
"North Korea",
|
||||
"South Korea",
|
||||
"Japan",
|
||||
"China",
|
||||
"Mongolia",
|
||||
"Egypt",
|
||||
"Saudi Arabia",
|
||||
"Yemen",
|
||||
"Oman",
|
||||
"Iran",
|
||||
"Iraq",
|
||||
"Kuwait",
|
||||
"Israel",
|
||||
"Jordan",
|
||||
"Gaza",
|
||||
"Syria",
|
||||
"Turkey",
|
||||
"Lebanon"
|
||||
],
|
||||
"cfr-target-category": [
|
||||
"Government",
|
||||
"Electronics Manufacturers",
|
||||
|
|
Loading…
Reference in New Issue