From bfb03504a9368b7056b20079cea538b7c027255c Mon Sep 17 00:00:00 2001 From: Mathieu4141 Date: Mon, 6 Nov 2023 05:26:26 -0800 Subject: [PATCH] [threat-actors] Add OilAlpha --- clusters/threat-actor.json | 11 +++++++++++ 1 file changed, 11 insertions(+) diff --git a/clusters/threat-actor.json b/clusters/threat-actor.json index b55b01a..8aff309 100644 --- a/clusters/threat-actor.json +++ b/clusters/threat-actor.json @@ -12430,6 +12430,17 @@ }, "uuid": "a1315451-326f-4185-8d71-80f9243f395f", "value": "GhostSec" + }, + { + "description": "OilAlpha has almost exclusively relied on infrastructure associated with the Public Telecommunication Corporation (PTC), a Yemeni government-owned enterprise reported to be under the direct control of the Houthi authorities. OilAlpha used encrypted chat messengers like WhatsApp to launch social engineering attacks against its targets. It has also used URL link shorteners. Per victimology assessment, it appears a majority of the targeted entities were Arabic-language speakers and operated Android devices.", + "meta": { + "refs": [ + "https://www.zimperium.com/blog/zimperium-mtd-against-oilalpha-a-comprehensive-defense-strategy/", + "https://www.recordedfuture.com/oilalpha-likely-pro-houthi-group-targeting-arabian-peninsula" + ] + }, + "uuid": "ae2b897d-f285-4d03-9bab-0ff59d6657a7", + "value": "OilAlpha" } ], "version": 289