diff --git a/clusters/threat-actor.json b/clusters/threat-actor.json index b55b01a..8aff309 100644 --- a/clusters/threat-actor.json +++ b/clusters/threat-actor.json @@ -12430,6 +12430,17 @@ }, "uuid": "a1315451-326f-4185-8d71-80f9243f395f", "value": "GhostSec" + }, + { + "description": "OilAlpha has almost exclusively relied on infrastructure associated with the Public Telecommunication Corporation (PTC), a Yemeni government-owned enterprise reported to be under the direct control of the Houthi authorities. OilAlpha used encrypted chat messengers like WhatsApp to launch social engineering attacks against its targets. It has also used URL link shorteners. Per victimology assessment, it appears a majority of the targeted entities were Arabic-language speakers and operated Android devices.", + "meta": { + "refs": [ + "https://www.zimperium.com/blog/zimperium-mtd-against-oilalpha-a-comprehensive-defense-strategy/", + "https://www.recordedfuture.com/oilalpha-likely-pro-houthi-group-targeting-arabian-peninsula" + ] + }, + "uuid": "ae2b897d-f285-4d03-9bab-0ff59d6657a7", + "value": "OilAlpha" } ], "version": 289