diff --git a/clusters/threat-actor.json b/clusters/threat-actor.json index 9f44df9..a9b4333 100644 --- a/clusters/threat-actor.json +++ b/clusters/threat-actor.json @@ -12700,6 +12700,21 @@ }, "uuid": "167bd5f9-fa61-4a4e-91bc-3ca0d17294b2", "value": "TheDarkOverlord" + }, + { + "description": "UNC2565 is a threat group that has used the GOOTLOADER downloader to deliver Cobalt Strike BEACON. These intrusions have stemmed from victims accessing malicious websites that use SEO techniques to improve Google search rankings. After obtaining a foothold in the environment, UNC2565 has conducted reconnaissance and credential harvesting activity using common tools such as BLOODHOUND and KERBEROAST. UNC2565's motivations are currently unknown but overlaps with activity that has led to SODINOKIBI ransomware. This suggests that the threat group may be financially motivated.", + "meta": { + "refs": [ + "https://www.mandiant.com/resources/blog/tracking-evolution-gootloader-operations", + "https://socradar.io/new-gootloader-variant-gootbot-changes-the-game-in-malware-tactics/", + "https://securityintelligence.com/x-force/gootbot-gootloaders-new-approach-to-post-exploitation/" + ], + "synonyms": [ + "Hive0127" + ] + }, + "uuid": "d7d270d2-b91f-4978-a9e9-76fa7f0d8f06", + "value": "UNC2565" } ], "version": 293