mirror of https://github.com/MISP/misp-galaxy
[threat-actors] Add UNC215
parent
79210345d0
commit
d155f1e05d
|
@ -13703,6 +13703,18 @@
|
||||||
},
|
},
|
||||||
"uuid": "590ecec6-4047-4d0f-9143-2e367700423d",
|
"uuid": "590ecec6-4047-4d0f-9143-2e367700423d",
|
||||||
"value": "UNC2447"
|
"value": "UNC2447"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"description": "UNC215 is a Chinese nation-state threat actor that has been active since at least 2014. They have targeted organizations in various sectors, including government, technology, telecommunications, defense, finance, entertainment, and healthcare. UNC215 has been observed using tools such as Mimikatz, FOCUSFJORD, and HYPERBRO for initial access and post-compromise activities. They have demonstrated a focus on evading detection and have employed tactics such as using trusted third parties, minimizing forensic evidence, and incorporating false flags. UNC215's targets are located globally, with a particular focus on the Middle East, Europe, Asia, and North America.",
|
||||||
|
"meta": {
|
||||||
|
"country": "CN",
|
||||||
|
"refs": [
|
||||||
|
"https://www.esentire.com/security-advisories/ransomware-hackers-attack-a-top-safety-testing-org-using-tactics-and-techniques-borrowed-from-chinese-espionage-groups",
|
||||||
|
"https://www.fireeye.com/blog/threat-research/2021/08/unc215-chinese-espionage-campaign-in-israel.html"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"uuid": "9795249f-8954-4632-830f-7e1f0ebc1dd5",
|
||||||
|
"value": "UNC215"
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"version": 295
|
"version": 295
|
||||||
|
|
Loading…
Reference in New Issue