mirror of https://github.com/MISP/misp-galaxy
commit
a99640532c
|
@ -1042,7 +1042,8 @@
|
|||
"https://arstechnica.com/information-technology/2015/08/newly-discovered-chinese-hacking-group-hacked-100-websites-to-use-as-watering-holes/",
|
||||
"https://securelist.com/luckymouse-hits-national-data-center/86083/",
|
||||
"https://attack.mitre.org/groups/G0027/",
|
||||
"https://www.secureworks.com/research/threat-profiles/bronze-union"
|
||||
"https://www.secureworks.com/research/threat-profiles/bronze-union",
|
||||
"https://unit42.paloaltonetworks.com/atoms/iron-taurus/"
|
||||
],
|
||||
"synonyms": [
|
||||
"TG-3390",
|
||||
|
@ -1056,7 +1057,8 @@
|
|||
"Iron Tiger",
|
||||
"BRONZE UNION",
|
||||
"Lucky Mouse",
|
||||
"G0027"
|
||||
"G0027",
|
||||
"Iron Taurus"
|
||||
]
|
||||
},
|
||||
"related": [
|
||||
|
@ -1111,7 +1113,8 @@
|
|||
"https://www.fireeye.com/blog/threat-research/2018/09/apt10-targeting-japanese-corporations-using-updated-ttps.html",
|
||||
"https://www.fbi.gov/news/stories/chinese-hackers-indicted-122018",
|
||||
"https://attack.mitre.org/groups/G0045/",
|
||||
"https://www.secureworks.com/research/threat-profiles/bronze-riverside"
|
||||
"https://www.secureworks.com/research/threat-profiles/bronze-riverside",
|
||||
"https://unit42.paloaltonetworks.com/atoms/granite-taurus/"
|
||||
],
|
||||
"synonyms": [
|
||||
"APT10",
|
||||
|
@ -1129,7 +1132,8 @@
|
|||
"Cloud Hopper",
|
||||
"BRONZE RIVERSIDE",
|
||||
"ATK41",
|
||||
"G0045"
|
||||
"G0045",
|
||||
"Granite Taurus"
|
||||
]
|
||||
},
|
||||
"related": [
|
||||
|
@ -1584,13 +1588,15 @@
|
|||
"refs": [
|
||||
"http://researchcenter.paloaltonetworks.com/2014/09/recent-watering-hole-attacks-attributed-apt-group-th3bug-using-poison-ivy/",
|
||||
"https://www.fox-it.com/nl/actueel/whitepapers/operation-wocao-shining-a-light-on-one-of-chinas-hidden-hacking-groups/",
|
||||
"https://paper.seebug.org/papers/APT/APT_CyberCriminal_Campagin/2015/Aug.10.The_Italian_Connection_An_analysis_of_exploit_supply_chains_and_digital_quartermasters/HTExploitTelemetry.pdf"
|
||||
"https://paper.seebug.org/papers/APT/APT_CyberCriminal_Campagin/2015/Aug.10.The_Italian_Connection_An_analysis_of_exploit_supply_chains_and_digital_quartermasters/HTExploitTelemetry.pdf",
|
||||
"https://unit42.paloaltonetworks.com/atoms/crawling-taurus/"
|
||||
],
|
||||
"synonyms": [
|
||||
"APT20",
|
||||
"APT 20",
|
||||
"TH3Bug",
|
||||
"Twivy"
|
||||
"Twivy",
|
||||
"Crawling Taurus"
|
||||
]
|
||||
},
|
||||
"uuid": "8bcd855f-a4c1-453a-bede-ff36582f4f40",
|
||||
|
@ -2413,7 +2419,8 @@
|
|||
"https://marcoramilli.com/2019/12/05/apt28-attacks-evolution/",
|
||||
"https://www.microsoft.com/security/blog/2020/09/10/strontium-detecting-new-patters-credential-harvesting/",
|
||||
"https://www.bleepingcomputer.com/news/security/russian-hackers-use-fake-nato-training-docs-to-breach-govt-networks/",
|
||||
"https://quointelligence.eu/2020/09/apt28-zebrocy-malware-campaign-nato-theme/"
|
||||
"https://quointelligence.eu/2020/09/apt28-zebrocy-malware-campaign-nato-theme/",
|
||||
"https://unit42.paloaltonetworks.com/atoms/fighting-ursa/"
|
||||
],
|
||||
"synonyms": [
|
||||
"APT 28",
|
||||
|
@ -2436,7 +2443,8 @@
|
|||
"Grizzly Steppe",
|
||||
"apt_sofacy",
|
||||
"G0007",
|
||||
"ATK5"
|
||||
"ATK5",
|
||||
"Fighting Ursa"
|
||||
]
|
||||
},
|
||||
"related": [
|
||||
|
@ -2495,7 +2503,8 @@
|
|||
"https://pylos.co/2018/11/18/cozybear-in-from-the-cold/",
|
||||
"https://cloudblogs.microsoft.com/microsoftsecure/2018/12/03/analysis-of-cyberattack-on-u-s-think-tanks-non-profits-public-sector-by-unidentified-attackers/",
|
||||
"https://www.secureworks.com/research/threat-profiles/iron-hemlock",
|
||||
"https://attack.mitre.org/groups/G0016"
|
||||
"https://attack.mitre.org/groups/G0016",
|
||||
"https://unit42.paloaltonetworks.com/atoms/cloaked-ursa/"
|
||||
],
|
||||
"synonyms": [
|
||||
"Dukes",
|
||||
|
@ -2518,7 +2527,8 @@
|
|||
"Iron Hemlock",
|
||||
"Grizzly Steppe",
|
||||
"G0016",
|
||||
"ATK7"
|
||||
"ATK7",
|
||||
"Cloaked Ursa"
|
||||
]
|
||||
},
|
||||
"related": [
|
||||
|
@ -3437,7 +3447,8 @@
|
|||
"https://www.forcepoint.com/sites/default/files/resources/files/forcepoint-security-labs-monsoon-analysis-report.pdf",
|
||||
"https://www.secureworks.com/research/threat-profiles/zinc-emerson",
|
||||
"https://www.pwc.com/gx/en/issues/cybersecurity/cyber-threat-intelligence/cyber-year-in-retrospect/yir-cyber-threats-report-download.pdf",
|
||||
"https://ti.qianxin.com/blog/articles/analysis-of-the-attack-activities-of-patchwork-using-the-documents-of-relevant-government-agencies-in-pakistan-as-bait"
|
||||
"https://ti.qianxin.com/blog/articles/analysis-of-the-attack-activities-of-patchwork-using-the-documents-of-relevant-government-agencies-in-pakistan-as-bait",
|
||||
"https://unit42.paloaltonetworks.com/atoms/thirstygemini/"
|
||||
],
|
||||
"synonyms": [
|
||||
"Chinastrats",
|
||||
|
@ -3449,7 +3460,8 @@
|
|||
"ZINC EMERSON",
|
||||
"ATK11",
|
||||
"G0040",
|
||||
"Orannge Athos"
|
||||
"Orange Athos",
|
||||
"Thirsty Gemini"
|
||||
]
|
||||
},
|
||||
"related": [
|
||||
|
@ -3479,10 +3491,12 @@
|
|||
"refs": [
|
||||
"https://attack.mitre.org/wiki/Groups",
|
||||
"https://unit42.paloaltonetworks.com/scarlet-mimic-years-long-espionage-targets-minority-activists/",
|
||||
"https://attack.mitre.org/groups/G0029/"
|
||||
"https://attack.mitre.org/groups/G0029/",
|
||||
"https://unit42.paloaltonetworks.com/atoms/golfing-taurus/"
|
||||
],
|
||||
"synonyms": [
|
||||
"G0029"
|
||||
"G0029",
|
||||
"Golfing Taurus"
|
||||
]
|
||||
},
|
||||
"related": [
|
||||
|
@ -3862,7 +3876,8 @@
|
|||
"https://unit42.paloaltonetworks.com/oilrig-novel-c2-channel-steganography/",
|
||||
"https://www.secureworks.com/research/threat-profiles/cobalt-gypsy",
|
||||
"https://www.fireeye.com/content/dam/collateral/en/mtrends-2018.pdf",
|
||||
"https://www.wired.com/story/apt-34-iranian-hackers-critical-infrastructure-companies/"
|
||||
"https://www.wired.com/story/apt-34-iranian-hackers-critical-infrastructure-companies/",
|
||||
"https://unit42.paloaltonetworks.com/atoms/evasive-serpens/"
|
||||
],
|
||||
"synonyms": [
|
||||
"Twisted Kitten",
|
||||
|
@ -3873,7 +3888,8 @@
|
|||
"APT34",
|
||||
"IRN2",
|
||||
"ATK40",
|
||||
"G0049"
|
||||
"G0049",
|
||||
"Evasive Serpens"
|
||||
]
|
||||
},
|
||||
"related": [
|
||||
|
@ -4312,13 +4328,15 @@
|
|||
"https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/shuckworm-gamaredon-espionage-ukraine",
|
||||
"https://www.microsoft.com/security/blog/2022/02/04/actinium-targets-ukrainian-organizations/",
|
||||
"https://www.welivesecurity.com/2020/06/11/gamaredon-group-grows-its-game/",
|
||||
"https://unit42.paloaltonetworks.com/gamaredon-primitive-bear-ukraine-update-2021/"
|
||||
"https://unit42.paloaltonetworks.com/gamaredon-primitive-bear-ukraine-update-2021/",
|
||||
"https://unit42.paloaltonetworks.com/atoms/tridentursa/"
|
||||
],
|
||||
"synonyms": [
|
||||
"Primitive Bear",
|
||||
"Shuckworm",
|
||||
"ACTINIUM",
|
||||
"G0047"
|
||||
"G0047",
|
||||
"Trident Ursa"
|
||||
]
|
||||
},
|
||||
"related": [
|
||||
|
@ -4788,14 +4806,16 @@
|
|||
"https://www.computerweekly.com/news/252446153/Three-Carbanak-cyber-heist-gang-members-arrested",
|
||||
"https://www.ptsecurity.com/upload/corporate/ww-en/analytics/Cobalt-2017-eng.pdf",
|
||||
"https://attack.mitre.org/groups/G0080/",
|
||||
"http://www.secureworks.com/research/threat-profiles/gold-kingswood"
|
||||
"http://www.secureworks.com/research/threat-profiles/gold-kingswood",
|
||||
"https://unit42.paloaltonetworks.com/atoms/mulelibra/"
|
||||
],
|
||||
"synonyms": [
|
||||
"Cobalt Group",
|
||||
"Cobalt Gang",
|
||||
"GOLD KINGSWOOD",
|
||||
"COBALT SPIDER",
|
||||
"G0080"
|
||||
"G0080",
|
||||
"Mule Libra"
|
||||
]
|
||||
},
|
||||
"uuid": "01967480-c49b-4d4a-a7fa-aef0eaf535fe",
|
||||
|
@ -4935,14 +4955,16 @@
|
|||
"https://www.secureworks.com/research/bronze-butler-targets-japanese-businesses",
|
||||
"https://blog.trendmicro.com/trendlabs-security-intelligence/redbaldknight-bronze-butler-daserf-backdoor-now-using-steganography/",
|
||||
"https://attack.mitre.org/groups/G0060/",
|
||||
"https://www.secureworks.com/research/threat-profiles/bronze-butler"
|
||||
"https://www.secureworks.com/research/threat-profiles/bronze-butler",
|
||||
"https://unit42.paloaltonetworks.com/atoms/stalkertaurus/"
|
||||
],
|
||||
"synonyms": [
|
||||
"Nian",
|
||||
"BRONZE BUTLER",
|
||||
"REDBALDKNIGHT",
|
||||
"STALKER PANDA",
|
||||
"G0060"
|
||||
"G0060",
|
||||
"Stalker Taurus"
|
||||
]
|
||||
},
|
||||
"related": [
|
||||
|
@ -5710,7 +5732,8 @@
|
|||
"https://blog.talosintelligence.com/2019/05/recent-muddywater-associated-blackwater.html",
|
||||
"https://www.zdnet.com/article/new-leaks-of-iranian-cyber-espionage-operations-hit-telegram-and-the-dark-web/",
|
||||
"https://attack.mitre.org/groups/G0069/",
|
||||
"http://www.secureworks.com/research/threat-profiles/cobalt-ulster"
|
||||
"http://www.secureworks.com/research/threat-profiles/cobalt-ulster",
|
||||
"https://unit42.paloaltonetworks.com/atoms/boggyserpens/"
|
||||
],
|
||||
"synonyms": [
|
||||
"TEMP.Zagros",
|
||||
|
@ -5719,7 +5742,8 @@
|
|||
"MERCURY",
|
||||
"COBALT ULSTER",
|
||||
"G0069",
|
||||
"ATK51"
|
||||
"ATK51",
|
||||
"Boggy Serpens"
|
||||
]
|
||||
},
|
||||
"related": [
|
||||
|
@ -6222,13 +6246,15 @@
|
|||
"refs": [
|
||||
"https://unit42.paloaltonetworks.com/unit42-rancor-targeted-attacks-south-east-asia-using-plaintee-ddkong-malware-families/",
|
||||
"https://www.cfr.org/interactive/cyber-operations/rancor",
|
||||
"https://attack.mitre.org/groups/G0075/"
|
||||
"https://attack.mitre.org/groups/G0075/",
|
||||
"https://unit42.paloaltonetworks.com/atoms/rancortaurus/"
|
||||
],
|
||||
"synonyms": [
|
||||
"Rancor group",
|
||||
"Rancor",
|
||||
"Rancor Group",
|
||||
"G0075"
|
||||
"G0075",
|
||||
"Rancor Taurus"
|
||||
]
|
||||
},
|
||||
"uuid": "79c7c7e0-79d5-11e8-9b9c-1ff96be20c0b",
|
||||
|
@ -6262,13 +6288,15 @@
|
|||
"https://unit42.paloaltonetworks.com/unit42-gorgon-group-slithering-nation-state-cybercrime/",
|
||||
"https://unit42.paloaltonetworks.com/unit42-tracking-subaat-targeted-phishing-attacks-point-leader-threat-actors-repository/",
|
||||
"https://unit42.paloaltonetworks.com/aggah-campaign-bit-ly-blogspot-and-pastebin-used-for-c2-in-large-scale-campaign/",
|
||||
"https://attack.mitre.org/groups/G0078/"
|
||||
"https://attack.mitre.org/groups/G0078/",
|
||||
"https://unit42.paloaltonetworks.com/atoms/pastygemini/"
|
||||
],
|
||||
"synonyms": [
|
||||
"Gorgon Group",
|
||||
"Subaat",
|
||||
"ATK92",
|
||||
"G0078"
|
||||
"G0078",
|
||||
"Pasty Gemini"
|
||||
]
|
||||
},
|
||||
"uuid": "e47c2c4d-706b-4098-92a2-b93e7103e131",
|
||||
|
@ -6283,11 +6311,13 @@
|
|||
"https://ti.360.net/blog/articles/latest-target-attack-of-darkhydruns-group-against-middle-east-en/",
|
||||
"https://unit42.paloaltonetworks.com/unit42-darkhydrus-uses-phishery-harvest-credentials-middle-east/",
|
||||
"https://unit42.paloaltonetworks.com/darkhydrus-delivers-new-trojan-that-can-use-google-drive-for-c2-communications/",
|
||||
"https://attack.mitre.org/groups/G0079/"
|
||||
"https://attack.mitre.org/groups/G0079/",
|
||||
"https://unit42.paloaltonetworks.com/atoms/obscureserpens/"
|
||||
],
|
||||
"synonyms": [
|
||||
"LazyMeerkat",
|
||||
"G0079"
|
||||
"G0079",
|
||||
"Obscure Serpens"
|
||||
]
|
||||
},
|
||||
"uuid": "ce2c2dfd-2445-4fbc-a747-9e7092e383f9",
|
||||
|
@ -6399,7 +6429,11 @@
|
|||
"https://securelist.com/red-october-diplomatic-cyber-attacks-investigation/36740/",
|
||||
"https://www.symantec.com/blogs/threat-intelligence/inception-framework-hiding-behind-proxies",
|
||||
"https://securelist.com/cloud-atlas-redoctober-apt-is-back-in-style/68083/",
|
||||
"https://www.akamai.com/uk/en/multimedia/documents/white-paper/upnproxy-blackhat-proxies-via-nat-injections-white-paper.pdf"
|
||||
"https://www.akamai.com/uk/en/multimedia/documents/white-paper/upnproxy-blackhat-proxies-via-nat-injections-white-paper.pdf",
|
||||
"https://unit42.paloaltonetworks.com/atoms/clean-ursa/"
|
||||
],
|
||||
"synonyms": [
|
||||
"Clean Ursa"
|
||||
]
|
||||
},
|
||||
"uuid": "71ef51ca-a791-11e8-a026-07980ca910ca",
|
||||
|
@ -7084,13 +7118,15 @@
|
|||
"https://www.symantec.com/connect/blogs/iran-based-attackers-use-back-door-threats-spy-middle-eastern-targets",
|
||||
"https://attack.mitre.org/groups/G0087/",
|
||||
"https://go.crowdstrike.com/rs/281-OBQ-266/images/Report2020CrowdStrikeGlobalThreatReport.pdf",
|
||||
"https://www.secureworks.com/research/threat-profiles/cobalt-hickman"
|
||||
"https://www.secureworks.com/research/threat-profiles/cobalt-hickman",
|
||||
"https://unit42.paloaltonetworks.com/atoms/radioserpens/"
|
||||
],
|
||||
"synonyms": [
|
||||
"Chafer",
|
||||
"REMIX KITTEN",
|
||||
"COBALT HICKMAN",
|
||||
"G0087"
|
||||
"G0087",
|
||||
"Radio Serpens"
|
||||
]
|
||||
},
|
||||
"uuid": "c2c64bd3-a325-446f-91a8-b4c0f173a30b",
|
||||
|
@ -7437,7 +7473,8 @@
|
|||
"https://www.welivesecurity.com/2019/05/14/plead-malware-mitm-asus-webstorage/",
|
||||
"https://go.crowdstrike.com/rs/281-OBQ-266/images/Report2020CrowdStrikeGlobalThreatReport.pdf",
|
||||
"https://www.slideshare.net/codeblue_jp/cb19-cyber-threat-landscape-in-japan-revealing-threat-in-the-shadow-by-chi-en-shen-ashley-oleg-bondarenko",
|
||||
"https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/palmerworm-blacktech-espionage-apt"
|
||||
"https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/palmerworm-blacktech-espionage-apt",
|
||||
"https://unit42.paloaltonetworks.com/atoms/mangataurus/"
|
||||
],
|
||||
"synonyms": [
|
||||
"CIRCUIT PANDA",
|
||||
|
@ -7445,7 +7482,8 @@
|
|||
"HUAPI",
|
||||
"Palmerworm",
|
||||
"G0098",
|
||||
"T-APT-03"
|
||||
"T-APT-03",
|
||||
"Manga Taurus"
|
||||
]
|
||||
},
|
||||
"uuid": "320c42f7-eab7-4ef9-b09a-74396caa6c3e",
|
||||
|
@ -7627,7 +7665,11 @@
|
|||
"meta": {
|
||||
"refs": [
|
||||
"https://unit42.paloaltonetworks.com/shifting-in-the-wind-windshift-attacks-target-middle-eastern-governments/",
|
||||
"https://gsec.hitb.org/materials/sg2018/D1%20COMMSEC%20-%20In%20the%20Trails%20of%20WINDSHIFT%20APT%20-%20Taha%20Karim.pdf"
|
||||
"https://gsec.hitb.org/materials/sg2018/D1%20COMMSEC%20-%20In%20the%20Trails%20of%20WINDSHIFT%20APT%20-%20Taha%20Karim.pdf",
|
||||
"https://unit42.paloaltonetworks.com/atoms/windyphoenix/"
|
||||
],
|
||||
"synonyms": [
|
||||
"Windy Phoenix"
|
||||
]
|
||||
},
|
||||
"uuid": "cbbbfc82-9294-11e9-8e19-2bc14137b25b",
|
||||
|
@ -7719,7 +7761,11 @@
|
|||
"refs": [
|
||||
"https://blog.talosintelligence.com/2018/08/rocke-champion-of-monero-miners.html",
|
||||
"https://unit42.paloaltonetworks.com/malware-used-by-rocke-group-evolves-to-evade-detection-by-cloud-security-products/",
|
||||
"https://www.intezer.com/blog-technical-analysis-cryptocurrency-mining-war-on-the-cloud/"
|
||||
"https://www.intezer.com/blog-technical-analysis-cryptocurrency-mining-war-on-the-cloud/",
|
||||
"https://unit42.paloaltonetworks.com/atoms/agedlibra/"
|
||||
],
|
||||
"synonyms": [
|
||||
"Aged Libra"
|
||||
]
|
||||
},
|
||||
"uuid": "53583c40-935e-11e9-b4fc-d7e217a306d2",
|
||||
|
@ -8346,12 +8392,14 @@
|
|||
"description": "COBALT KATANA has been active since at least March 2018, and it focuses many of its operations on organizations based in or associated with Kuwait. The group has targeted government, logistics, and shipping organizations. The threat actors gain initial access to targets using DNS hijacking, strategic web compromise with SMB forced authentication, and password brute force attacks. COBALT KATANA operates a custom platform referred to as the Sakabota Framework, also referred to as Sakabota Core, with a complimentary set of modular backdoors and accessory tools including Gon, Hisoka, Hisoka Netero, Killua, Diezen, and Eye. The group has implemented DNS tunnelling in its malware and malicious scripts and also operates the HyphenShell web shell to strengthen post-intrusion access. CTU researchers assess with moderate confidence that COBALT KATANA operates on behalf of Iran, and elements of its operations such as overlapping infrastructure, use of DNS hijacking, implementation of DNS-based C2 channels in malware and web shell security mechanisms suggest connections to COBALT GYPSY and COBALT EDGEWATER.",
|
||||
"meta": {
|
||||
"refs": [
|
||||
"https://www.secureworks.com/research/threat-profiles/cobalt-katana"
|
||||
"https://www.secureworks.com/research/threat-profiles/cobalt-katana",
|
||||
"https://unit42.paloaltonetworks.com/atoms/hunter-serpens/"
|
||||
],
|
||||
"synonyms": [
|
||||
"Hive0081 (IBM)",
|
||||
"SectorD01 (NHSC)",
|
||||
"xHunt campaign (Palo Alto)"
|
||||
"xHunt campaign (Palo Alto)",
|
||||
"Hunter Serpens"
|
||||
]
|
||||
},
|
||||
"uuid": "d1c25b0e-e4c5-4b7c-b790-2e185cb2f07e",
|
||||
|
@ -8374,10 +8422,12 @@
|
|||
"refs": [
|
||||
"https://www.microsoft.com/security/blog/2019/12/12/gallium-targeting-global-telecom/",
|
||||
"https://www.youtube.com/watch?v=fBFm2fiEPTg",
|
||||
"https://troopers.de/troopers22/talks/7cv8pz/"
|
||||
"https://troopers.de/troopers22/talks/7cv8pz/",
|
||||
"https://unit42.paloaltonetworks.com/atoms/alloytaurus/"
|
||||
],
|
||||
"synonyms": [
|
||||
"Red Dev 4"
|
||||
"Red Dev 4",
|
||||
"Alloy Taurus"
|
||||
]
|
||||
},
|
||||
"related": [
|
||||
|
@ -8574,7 +8624,11 @@
|
|||
"https://www.intezer.com/blog/cloud-security/top-linux-cloud-threats-of-2020/",
|
||||
"https://www.trendmicro.com/en_us/research/20/l/teamtnt-now-deploying-ddos-capable-irc-bot-tntbotinger.html",
|
||||
"https://cyware.com/news/hildegard-teamtnts-new-feature-rich-malware-targeting-kubernetes-6587eb45",
|
||||
"https://www.lacework.com/teamtnt-builds-botnet-from-chinese-cloud-servers/"
|
||||
"https://www.lacework.com/teamtnt-builds-botnet-from-chinese-cloud-servers/",
|
||||
"https://unit42.paloaltonetworks.com/atoms/adept-libra/"
|
||||
],
|
||||
"synonyms": [
|
||||
"Adept Libra"
|
||||
]
|
||||
},
|
||||
"uuid": "27de6a09-844b-4dcb-9ff9-7292aad826ba",
|
||||
|
@ -8868,13 +8922,15 @@
|
|||
"meta": {
|
||||
"refs": [
|
||||
"https://www.secureworks.com/research/threat-profiles/gold-cabin",
|
||||
"https://attack.mitre.org/groups/G0127/"
|
||||
"https://attack.mitre.org/groups/G0127/",
|
||||
"https://unit42.paloaltonetworks.com/atoms/monsterlibra/"
|
||||
],
|
||||
"synonyms": [
|
||||
"Shakthak",
|
||||
"TA551",
|
||||
"ATK236",
|
||||
"G0127"
|
||||
"G0127",
|
||||
"Monster Libra"
|
||||
]
|
||||
},
|
||||
"uuid": "36e8c848-4d20-47ea-9fc2-31aa17bf82d1",
|
||||
|
@ -9352,12 +9408,14 @@
|
|||
"https://cert.gov.ua/article/38374",
|
||||
"https://blog.malwarebytes.com/threat-intelligence/2022/04/new-uac-0056-activity-theres-a-go-elephant-in-the-room/",
|
||||
"https://www.intezer.com/blog/research/elephant-malware-targeting-ukrainian-orgs/",
|
||||
"https://www.sentinelone.com/blog/threat-actor-uac-0056-targeting-ukraine-with-fake-translation-software/"
|
||||
"https://www.sentinelone.com/blog/threat-actor-uac-0056-targeting-ukraine-with-fake-translation-software/",
|
||||
"https://unit42.paloaltonetworks.com/atoms/nascentursa/"
|
||||
],
|
||||
"synonyms": [
|
||||
"UNC2589",
|
||||
"TA471",
|
||||
"UAC-0056"
|
||||
"UAC-0056",
|
||||
"Nascent Ursa"
|
||||
]
|
||||
},
|
||||
"uuid": "c67d3dfb-ab39-46e1-a971-5efdfe6a5b9f",
|
||||
|
@ -9595,5 +9653,5 @@
|
|||
"value": "Predatory Sparrow"
|
||||
}
|
||||
],
|
||||
"version": 231
|
||||
"version": 232
|
||||
}
|
||||
|
|
Loading…
Reference in New Issue