From bf0d1d27cae4a9b2aa2b65f1363d15550b337127 Mon Sep 17 00:00:00 2001 From: Siri Bromander Date: Tue, 7 Nov 2017 11:07:23 +0100 Subject: [PATCH 1/5] Updated with data from APT Groups and Operations --- clusters/threat-actor.json | 710 ++++++++++++++++++++++++++++++++++--- 1 file changed, 652 insertions(+), 58 deletions(-) diff --git a/clusters/threat-actor.json b/clusters/threat-actor.json index 18832e5b..c44713f3 100644 --- a/clusters/threat-actor.json +++ b/clusters/threat-actor.json @@ -11,7 +11,8 @@ "Byzantine Candor", "Group 3", "TG-8223", - "Comment Group" + "Comment Group", + "Brown Fox" ], "country": "CN", "refs": [ @@ -48,10 +49,14 @@ "country": "CN", "refs": [ "https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks", + "http://www.isightpartners.com/2015/02/codoso/#sthash.VJMDVPQB.dpuf", + "http://researchcenter.paloaltonetworks.com/2016/01/new-attacks-linked-to-c0d0s0-group/", "https://www.nytimes.com/2016/06/12/technology/the-chinese-hackers-in-the-back-office.html" ], "synonyms": [ "C0d0so", + "APT19", + "APT 19", "Sunshop Group" ] } @@ -76,44 +81,65 @@ }, { "meta": { - "country": "CN" + "country": "CN", + "synonyms": [ + "temp.bottle" + ] }, "value": "Keyhole Panda" }, { "meta": { - "country": "CN" + "country": "CN", + "refs": [ + "http://go.crowdstrike.com/rs/281-OBQ-266/images/ReportGlobalThreatIntelligence.pdf" + ] }, "value": "Wet Panda" }, { "meta": { - "country": "CN" + "country": "CN", + "refs": [ + "https://files.sans.org/summit/Threat_Hunting_Incident_Response_Summit_2016/PDFs/Detecting-and-Responding-to-Pandas-and-Bears-Christopher-Scott-CrowdStrike-and-Wendi-Whitmore-IBM.pdf" + ] }, "value": "Foxy Panda", "description": "Adversary group targeting telecommunication and technology organizations." }, { "meta": { - "country": "CN" + "country": "CN", + "refs": [ + "http://go.crowdstrike.com/rs/281-OBQ-266/images/ReportGlobalThreatIntelligence.pdf" + ] }, "value": "Predator Panda" }, { "meta": { - "country": "CN" + "country": "CN", + "refs": [ + "http://files.sans.org/summit/Threat_Hunting_Incident_Response_Summit_2016/PDFs/Detecting-and-Responding-to-Pandas-and-Bears-Christopher-Scott-CrowdStrike-and-Wendi-Whitmore-IBM.pdf" + ] }, "value": "Union Panda" }, { "meta": { - "country": "CN" + "country": "CN", + "refs": [ + "http://go.crowdstrike.com/rs/281-OBQ-266/images/ReportGlobalThreatIntelligence.pdf" + ] }, "value": "Spicy Panda" }, { "meta": { - "country": "CN" + "country": "CN", + "refs": [ + "http://files.sans.org/summit/Threat_Hunting_Incident_Response_Summit_2016/PDFs/Detecting-and-Responding-to-Pandas-and-Bears-Christopher-Scott-CrowdStrike-and-Wendi-Whitmore-IBM.pdf" + ] }, "value": "Eloquent Panda" }, @@ -169,11 +195,18 @@ "meta": { "synonyms": [ "DUBNIUM", - "Fallout Team" + "Fallout Team", + "Karba", + "Luder", + "Nemim", + "Tapaoux" ], "refs": [ "https://securelist.com/blog/research/71713/darkhotels-attacks-in-2015/", - "https://blogs.technet.microsoft.com/mmpc/2016/06/09/reverse-engineering-dubnium-2" + "https://blogs.technet.microsoft.com/mmpc/2016/06/09/reverse-engineering-dubnium-2", + "https://securelist.com/blog/research/66779/the-darkhotel-apt/", + "http://drops.wooyun.org/tips/11726", + "https://labs.bitdefender.com/wp-content/uploads/downloads/inexsmar-an-unusual-darkhotel-campaign/" ] }, "value": "DarkHotel", @@ -187,6 +220,8 @@ "BeeBus", "Group 22", "DynCalc", + "Calc Team", + "DNSCalc", "Crimson Iron", "APT12", "APT 12" @@ -234,6 +269,7 @@ "TG-0416", "APT 18", "SCANDIUM", + "PLA Navy", "APT18" ], "country": "CN", @@ -269,6 +305,11 @@ "Blackfly", "Lead", "Wicked Spider", + "APT17", + "APT 17", + "Dogfish", + "Deputy Dog", + "Wicked Panda", "Barium" ], "country": "CN", @@ -306,6 +347,8 @@ "meta": { "synonyms": [ "PLA Unit 78020", + "APT 30", + "APT30", "Override Panda", "Camerashy", "APT.Naikon" @@ -338,14 +381,22 @@ "synonyms": [ "Elise" ], - "country": "CN" + "country": "CN", + "refs": [ + "http://www.crowdstrike.com/blog/rhetoric-foreshadows-cyber-activity-in-the-south-china-sea/" + ] }, "value": "Lotus Panda" }, { "meta": { + "synonyms": [ + "Black Vine", + "TEMP.Avengers" + ], "country": "CN", "refs": [ + "http://www.crowdstrike.com/blog/cyber-deterrence-in-action-a-story-of-one-long-hurricane-panda-campaign/", "http://www.crowdstrike.com/blog/cyber-deterrence-in-action-a-story-of-one-long-hurricane-panda-campaign/" ] }, @@ -358,6 +409,8 @@ "APT 27", "TEMP.Hippo", "Group 35", + "Bronze Union", + "ZipToken", "HIPPOTeam", "APT27", "Operation Iron Tiger" @@ -436,11 +489,13 @@ "Playful Dragon", "APT 15", "Metushy", + "Lurid", "Social Network Team" ], "country": "CN", "refs": [ - "https://www.fireeye.com/blog/threat-research/2014/09/forced-to-adapt-xslcmd-backdoor-now-on-os-x.html" + "https://www.fireeye.com/blog/threat-research/2014/09/forced-to-adapt-xslcmd-backdoor-now-on-os-x.html", + "http://arstechnica.com/security/2015/04/elite-cyber-crime-group-strikes-back-after-attack-by-rival-apt-gang/" ] }, "value": "Mirage" @@ -482,7 +537,8 @@ ], "country": "CN", "refs": [ - "https://securelist.com/blog/research/57331/the-icefog-apt-a-tale-of-cloak-and-three-daggers/" + "https://securelist.com/blog/research/57331/the-icefog-apt-a-tale-of-cloak-and-three-daggers/", + "https://securelist.com/blog/incidents/58209/the-icefog-apt-hits-us-targets-with-java-backdoor/" ] }, "value": "Ice Fog", @@ -543,6 +599,7 @@ "PLA Navy", "APT4", "APT 4", + "Wisp Team", "Getkys", "SykipotGroup", "Wkysol" @@ -569,6 +626,8 @@ "synonyms": [ "APT20", "APT 20", + "APT8", + "APT 8", "TH3Bug" ] }, @@ -605,7 +664,8 @@ "meta": { "country": "CN", "refs": [ - "https://community.rapid7.com/community/infosec/blog/2013/06/07/keyboy-targeted-attacks-against-vietnam-and-india" + "https://community.rapid7.com/community/infosec/blog/2013/06/07/keyboy-targeted-attacks-against-vietnam-and-india", + "http://www.crowdstrike.com/blog/rhetoric-foreshadows-cyber-activity-in-the-south-china-sea/" ], "synonyms": [ "APT23", @@ -625,7 +685,8 @@ "Group 26" ], "refs": [ - "https://www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/rpt-operation-saffron-rose.pdf" + "https://www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/rpt-operation-saffron-rose.pdf", + "https://www.crowdstrike.com/blog/cat-scratch-fever-crowdstrike-tracks-newly-reported-iranian-actor-flying-kitten/" ] }, "value": "Flying Kitten", @@ -653,11 +714,20 @@ "synonyms": [ "Newscaster", "Parastoo", + "iKittens", "Group 83", "Newsbeef" ], "refs": [ - "https://en.wikipedia.org/wiki/Operation_Newscaster" + "https://en.wikipedia.org/wiki/Operation_Newscaster", + "https://iranthreats.github.io/resources/macdownloader-macos-malware/", + "https://www.isightpartners.com/2014/05/newscaster-iranian-threat-inside-social-media/", + "https://www.forbes.com/sites/thomasbrewster/2017/07/27/iran-hackers-oilrig-use-fake-personas-on-facebook-linkedin-for-cyberespionage/", + "https://cryptome.org/2012/11/parastoo-hacks-iaea.htm", + "https://securelist.com/files/2017/03/Report_Shamoon_StoneDrill_final.pdf", + "https://securelist.com/blog/software/74503/freezer-paper-around-free-meat/", + "https://www.verfassungsschutz.de/download/broschuere-2016-10-bfv-cyber-brief-2016-04.pdf", + "https://github.com/gasgas4/APT_CyberCriminal_Campagin/tree/master/2014/2014.05.28.NewsCaster_An_Iranian_Threat_Within_Social_Networks" ] }, "value": "Charming Kitten", @@ -692,7 +762,8 @@ "synonyms": [ "TEMP.Beanie", "Operation Woolen Goldfish", - "Thamar Reservoir" + "Thamar Reservoir", + "Timberworm" ], "country": "IR", "refs": [ @@ -700,7 +771,10 @@ "https://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-the-spy-kittens-are-back.pdf", "http://www.clearskysec.com/thamar-reservoir/", "https://citizenlab.org/2015/08/iran_two_factor_phishing/", - "https://blog.checkpoint.com/wp-content/uploads/2015/11/rocket-kitten-report.pdf" + "https://blog.checkpoint.com/wp-content/uploads/2015/11/rocket-kitten-report.pdf", + "https://www.symantec.com/connect/blogs/shamoon-multi-staged-destructive-attacks-limited-specific-targets", + "https://researchcenter.paloaltonetworks.com/2017/02/unit42-magic-hound-campaign-attacks-saudi-targets/", + "https://en.wikipedia.org/wiki/Rocket_Kitten" ] }, "description": "Targets Saudi Arabia, Israel, US, Iran, high ranking defense officials, embassies of various target countries, notable Iran researchers, human rights activists, media and journalists, academic institutions and various scholars, including scientists in the fields of physics and nuclear sciences.", @@ -714,10 +788,15 @@ "Tarh Andishan", "Alibaba", "2889", - "TG-2889" + "TG-2889", + "Cobalt Gypsy", + "Ghambar", + "Cutting Kitten" ], "refs": [ - "http://cdn2.hubspot.net/hubfs/270968/assets/Cleaver/Cylance_Operation_Cleaver_Report.pdf" + "http://cdn2.hubspot.net/hubfs/270968/assets/Cleaver/Cylance_Operation_Cleaver_Report.pdf", + "https://www.secureworks.com/research/the-curious-case-of-mia-ash", + "http://www.secureworks.com/cyber-threat-intelligence/threats/suspected-iran-based-hacker-group-creates-network-of-fake-linkedin-profiles/" ] }, "value": "Cleaver", @@ -763,11 +842,17 @@ "STRONTIUM", "TAG_0700", "Swallowtail", - "IRON TWILIGHT" + "IRON TWILIGHT", + "Group 74" ], "country": "RU", "refs": [ - "https://en.wikipedia.org/wiki/Sofacy_Group" + "https://en.wikipedia.org/wiki/Sofacy_Group", + "https://aptnotes.malwareconfig.com/web/viewer.html?file=../APTnotes/2014/apt28.pdf", + "http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-operation-pawn-storm.pdf", + "https://www2.fireeye.com/rs/848-DID-242/images/wp-mandiant-matryoshka-mining.pdf", + "https://www.crowdstrike.com/blog/bears-midst-intrusion-democratic-national-committee/", + "http://researchcenter.paloaltonetworks.com/2016/06/unit42-new-sofacy-attacks-against-us-government-agency/" ] }, "description": "The Sofacy Group (also known as APT28, Pawn Storm, Fancy Bear and Sednit) is a cyber espionage group believed to have ties to the Russian government. Likely operating since 2007, the group is known to target government, military, and security organizations. It has been characterized as an advanced persistent threat.", @@ -790,11 +875,15 @@ "Cozy Bear", "The Dukes", "Minidionis", - "SeaDuke" + "SeaDuke", + "Hammer Toss" ], "country": "RU", "refs": [ - "https://labsblog.f-secure.com/2015/09/17/the-dukes-7-years-of-russian-cyber-espionage/" + "https://labsblog.f-secure.com/2015/09/17/the-dukes-7-years-of-russian-cyber-espionage/", + "https://www2.fireeye.com/rs/848-DID-242/images/rpt-apt29-hammertoss.pdf", + "https://www.us-cert.gov/sites/default/files/publications/AR-17-20045_Enhanced_Analysis_of_GRIZZLY_STEPPE_Activity.pdf", + "https://www.fireeye.com/blog/threat-research/2017/03/dissecting_one_ofap.html" ] }, "value": "APT 29", @@ -819,7 +908,13 @@ "refs": [ "https://www.first.org/resources/papers/tbilisi2014/turla-operations_and_development.pdf", "https://www.circl.lu/pub/tr-25/", - "https://www.theguardian.com/technology/2014/aug/07/turla-hackers-spying-governments-researcher-kaspersky-symantec" + "https://www.theguardian.com/technology/2014/aug/07/turla-hackers-spying-governments-researcher-kaspersky-symantec", + "https://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/waterbug-attack-group.pdf", + "https://securelist.com/analysis/publications/65545/the-epic-turla-operation/", + "https://securelist.com/blog/research/72081/satellite-turla-apt-command-and-control-in-the-sky/", + "https://securelist.com/blog/research/67962/the-penquin-turla-2/", + "https://www2.fireeye.com/rs/848-DID-242/images/rpt-witchcoven.pdf", + "https://www.welivesecurity.com/2017/03/30/carbon-paper-peering-turlas-second-stage-backdoor/" ], "country": "RU" }, @@ -838,7 +933,10 @@ ], "country": "RU", "refs": [ - "http://www.scmagazineuk.com/iran-and-russia-blamed-for-state-sponsored-espionage/article/330401/" + "http://www.scmagazineuk.com/iran-and-russia-blamed-for-state-sponsored-espionage/article/330401/", + "http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/Dragonfly_Threat_Against_Western_Energy_Suppliers.pdf", + "http://www.netresec.com/?page=Blog&month=2014-10&post=Full-Disclosure-of-Havex-Trojans", + "https://threatpost.com/energy-watering-hole-attack-used-lightsout-exploit-kit/104772/" ] }, "description": "A Russian group that collects intelligence on the energy industry.", @@ -851,11 +949,16 @@ "Black Energy", "BlackEnergy", "Quedagh", - "Voodoo Bear" + "Voodoo Bear", + "TEMP.Noble" ], "country": "RU", "refs": [ - "http://www.isightpartners.com/2014/10/cve-2014-4114/" + "http://www.isightpartners.com/2014/10/cve-2014-4114/", + "http://www.isightpartners.com/2016/01/ukraine-and-sandworm-team/", + "https://dragos.com/blog/crashoverride/CrashOverride-01.pdf", + "https://www.us-cert.gov/ncas/alerts/TA17-163A", + "https://ics.sans.org/blog/2016/01/09/confirmation-of-a-coordinated-attack-on-the-ukrainian-power-grid" ] }, "value": "Sandworm" @@ -865,6 +968,9 @@ "country": "RU", "refs": [ "http://www.welivesecurity.com/2016/12/13/rise-telebots-analyzing-disruptive-killdisk-attacks/" + ], + "synonyms": [ + "Sandworm" ] }, "value": "TeleBots", @@ -880,7 +986,13 @@ "country": "RU", "refs": [ "https://en.wikipedia.org/wiki/Carbanak", - "https://www.proofpoint.com/us/threat-insight/post/fin7carbanak-threat-actor-unleashes-bateleur-jscript-backdoor" + "https://www.proofpoint.com/us/threat-insight/post/fin7carbanak-threat-actor-unleashes-bateleur-jscript-backdoor", + "https://securelist.com/files/2015/02/Carbanak_APT_eng.pdf", + "http://2014.zeronights.ru/assets/files/slides/ivanovb-zeronights.pdf", + "https://www.symantec.com/connect/blogs/odinaff-new-trojan-used-high-level-financial-attacks", + "https://blog.cyber4sight.com/2017/04/similarities-between-carbanak-and-fin7-malware-suggest-actors-are-closely-related/", + "https://www.proofpoint.com/us/threat-insight/post/fin7carbanak-threat-actor-unleashes-bateleur-jscript-backdoor", + "https://www.icebrg.io/blog/footprints-of-fin7-tracking-actor-patterns" ], "motive": "Cybercrime" }, @@ -892,7 +1004,8 @@ "synonyms": [ "TeamSpy", "Team Bear", - "Berserk Bear" + "Berserk Bear", + "Anger Bear" ], "country": "RU", "refs": [ @@ -969,11 +1082,20 @@ "country": "KP", "synonyms": [ "Operation DarkSeoul", - "Hidden Cobra" + "Dark Seoul", + "Hidden Cobra", + "Hastati Group", + "Andariel", + "Unit 121", + "Bureau 121", + "NewRomanic Cyber Army Team", + "Bluenoroff" ], "refs": [ "https://threatpost.com/operation-blockbuster-coalition-ties-destructive-attacks-to-lazarus-group/116422/", - "https://www.us-cert.gov/ncas/alerts/TA17-164A" + "https://www.us-cert.gov/ncas/alerts/TA17-164A", + "https://securelist.com/lazarus-under-the-hood/77908/", + "http://www.mcafee.com/us/resources/white-papers/wp-dissecting-operation-troy.pdf" ] }, "value": "Lazarus Group", @@ -1007,7 +1129,10 @@ "synonyms": [ "TunisianCyberArmy" ], - "country": "TN" + "country": "TN", + "refs": [ + "https://www.crowdstrike.com/blog/regional-conflict-and-cyber-blowback/" + ] }, "value": "Corsair Jackal" }, @@ -1016,7 +1141,11 @@ "meta": { "country": "FR", "refs": [ - "https://securelist.com/blog/research/69114/animals-in-the-apt-farm/" + "https://securelist.com/blog/research/69114/animals-in-the-apt-farm/", + "https://motherboard.vice.com/read/meet-babar-a-new-malware-almost-certainly-created-by-france", + "http://www.cyphort.com/evilbunny-malware-instrumented-lua/", + "http://www.cyphort.com/babar-suspected-nation-state-spyware-spotlight/", + "https://blog.gdatasoftware.com/blog/article/babar-espionage-software-finally-found-and-put-under-the-microscope.html" ], "synonyms": [ "Animal Farm" @@ -1059,7 +1188,7 @@ "synonyms": [ "FruityArmor" ], - "country": "AE" + "country": "UAE" }, "value": "Stealth Falcon", "description": "Group targeting Emirati journalists, activists, and dissidents." @@ -1111,7 +1240,9 @@ ], "refs": [ "https://securelist.com/blog/research/75328/the-dropping-elephant-actor/", - "http://www.symantec.com/connect/blogs/patchwork-cyberespionage-group-expands-targets-governments-wide-range-industries" + "http://www.symantec.com/connect/blogs/patchwork-cyberespionage-group-expands-targets-governments-wide-range-industries", + "https://blogs.forcepoint.com/security-labs/monsoon-analysis-apt-campaign", + "https://www.cymmetria.com/patchwork-targeted-attack/" ] }, "description": "Dropping Elephant (also known as “Chinastrats” and “Patchwork“) is a relatively new threat actor that is targeting a variety of high profile diplomatic and economic targets using a custom set of attack tools. Its victims are all involved with China’s foreign relations in some way, and are generally caught through spear-phishing or watering hole attacks.", @@ -1155,7 +1286,11 @@ ], "refs": [ "https://www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/wp-operation-quantum-entanglement.pdf", - "https://attack.mitre.org/wiki/Groups" + "https://attack.mitre.org/wiki/Groups", + "http://researchcenter.paloaltonetworks.com/2015/04/unit-42-identifies-new-dragonok-backdoor-malware-deployed-against-japanese-targets/", + "http://researchcenter.paloaltonetworks.com/2017/01/unit42-dragonok-updates-toolset-targets-multiple-geographic-regions/", + "https://blogs.forcepoint.com/security-labs/trojanized-adobe-installer-used-install-dragonok%E2%80%99s-new-custom-backdoor", + "http://www.morphick.com/resources/news/deep-dive-dragonok-rambo-backdoor" ], "country": "CN" }, @@ -1224,7 +1359,8 @@ { "meta": { "refs": [ - "http://www.symantec.com/connect/blogs/suckfly-revealing-secret-life-your-code-signing-certificates" + "http://www.symantec.com/connect/blogs/suckfly-revealing-secret-life-your-code-signing-certificates", + "http://www.symantec.com/connect/blogs/indian-organizations-targeted-suckfly-attacks" ], "country": "CN" }, @@ -1242,7 +1378,7 @@ }, { "meta": { - "country": "LY" + "country": "LBY" }, "description": "Libyan Scorpions is a malware operation in use since September 2015 and operated by a politically motivated group whose main objective is intelligence gathering, spying on influentials and political figures and operate an espionage campaign within Libya.", "value": "Libyan Scorpions" @@ -1262,9 +1398,22 @@ { "meta": { "refs": [ - "http://researchcenter.paloaltonetworks.com/2016/05/the-oilrig-campaign-attacks-on-saudi-arabian-organizations-deliver-helminth-backdoor/" + "http://researchcenter.paloaltonetworks.com/2016/05/the-oilrig-campaign-attacks-on-saudi-arabian-organizations-deliver-helminth-backdoor/", + "https://www.fireeye.com/blog/threat-research/2016/05/targeted_attacksaga.html", + "http://researchcenter.paloaltonetworks.com/2016/10/unit42-oilrig-malware-campaign-updates-toolset-and-expands-targets/", + "http://researchcenter.paloaltonetworks.com/2016/05/the-oilrig-campaign-attacks-on-saudi-arabian-organizations-deliver-helminth-backdoor/", + "http://www.clearskysec.com/oilrig/", + "https://cert.gov.il/Updates/Alerts/SiteAssets/CERT-IL-ALERT-W-120.pdf", + "http://researchcenter.paloaltonetworks.com/2017/04/unit42-oilrig-actors-provide-glimpse-development-testing-efforts/", + "http://blog.morphisec.com/iranian-fileless-cyberattack-on-israel-word-vulnerability%20", + "https://www.forbes.com/sites/thomasbrewster/2017/02/15/oilrig-iran-hackers-cyberespionage-us-turkey-saudi-arabia/#56749aa2468a", + "https://researchcenter.paloaltonetworks.com/2017/07/unit42-twoface-webshell-persistent-access-point-lateral-movement/" ], - "country": "IR" + "country": "IR", + "synonyms": [ + "Twisted Kitten", + "Cobalt Gypsy" + ] }, "value": "OilRig", "description": "Iranian threat agent OilRig has been targeting multiple organisations in Israel and other countries in the Middle East since the end of 2015." @@ -1307,6 +1456,7 @@ ], "synonyms": [ "Gaza Hackers Team", + "Gaza cybergang", "Operation Molerats", "Extreme Jackal", "Moonlight" @@ -1324,7 +1474,7 @@ "synonyms": [ "StrongPity" ], - "country": "TR" + "country": "TU" } }, { @@ -1379,7 +1529,7 @@ "value": "Sath-ı Müdafaa", "description": "A Turkish hacking group, Sath-ı Müdafaa, is encouraging individuals to join its DDoS-for-Points platform that features points and prizes for carrying out distributed denial-of-service (DDoS) attacks against a list of predetermined targets. Their DDoS tool also contains a backdoor to hack the hackers. So the overarching motivation and allegiance of the group is not entirely clear.", "meta": { - "country": "TR", + "country": "TU", "motive": "Hacktivists-Nationalists" } }, @@ -1387,7 +1537,7 @@ "value": "Aslan Neferler Tim", "description": "Turkish nationalist hacktivist group that has been active for roughly one year. According to Domaintools, the group’s site has been registered since December 2015, with an active Twitter account since January 2016. The group carries out distributed denial-of-service (DDoS) attacks and defacements against the sites of news organizations and governments perceived to be critical of Turkey’s policies or leadership, and purports to act in defense of Islam", "meta": { - "country": "TR", + "country": "TU", "synonyms": [ "Lion Soldiers Team", "Phantom Turk" @@ -1399,7 +1549,7 @@ "value": "Ayyıldız Tim", "description": "Ayyıldız (Crescent and Star) Tim is a nationalist hacking group founded in 2002. It performs defacements and DDoS attacks against the websites of governments that it considers to be repressing Muslim minorities or engaged in Islamophobic policies.", "meta": { - "country": "TR", + "country": "TU", "synonyms": [ "Crescent and Star" ], @@ -1410,7 +1560,7 @@ "value": "TurkHackTeam", "description": "Founded in 2004, Turkhackteam is one of Turkey’s oldest and most high-profile hacking collectives. According to a list compiled on Turkhackteam’s forum, the group has carried out almost 30 highly publicized hacking campaigns targeting foreign government and commercial websites, including websites of international corporations. ", "meta": { - "country": "TR", + "country": "TU", "synonyms": [ "Turk Hack Team" ], @@ -1424,6 +1574,11 @@ "country": "US", "refs": [ "https://en.wikipedia.org/wiki/Equation_Group" + ], + "synonyms": [ + "Tilded Team", + "Lamberts", + "EQGRP" ] } }, @@ -1432,8 +1587,10 @@ "description": "Greenbug was discovered targeting a range of organizations in the Middle East including companies in the aviation, energy, government, investment, and education sectors.", "meta": { "refs": [ - "https://www.symantec.com/connect/blogs/greenbug-cyberespionage-group-targeting-middle-east-possible-links-shamoon" - ] + "https://www.symantec.com/connect/blogs/greenbug-cyberespionage-group-targeting-middle-east-possible-links-shamoon", + "https://researchcenter.paloaltonetworks.com/2017/07/unit42-oilrig-uses-ismdoor-variant-possibly-linked-greenbug-threat-group/" + ], + "country": "IR" } }, { @@ -1449,7 +1606,8 @@ "meta": { "country": "CN", "synonyms": [ - "Zhenbao" + "Zhenbao", + "TEMP.Zhenbao" ], "refs": [ "http://www.darkreading.com/endpoint/chinese-cyberspies-pivot-to-russia-in-wake-of-obama-xi-pact/d/d-id/1324242" @@ -1465,7 +1623,10 @@ "Operation Mermaid" ], "refs": [ - "https://www.blackhat.com/docs/us-16/materials/us-16-Guarnieri-Iran-And-The-Soft-War-For-Internet-Dominance-wp.pdf" + "https://www.blackhat.com/docs/us-16/materials/us-16-Guarnieri-Iran-And-The-Soft-War-For-Internet-Dominance-wp.pdf", + "https://iranthreats.github.io/", + "http://researchcenter.paloaltonetworks.com/2016/05/prince-of-persia-infy-malware-active-in-decade-of-targeted-attacks/", + "https://researchcenter.paloaltonetworks.com/2017/08/unit42-prince-persia-ride-lightning-infy-returns-foudre/" ] }, "value": "Infy", @@ -1475,7 +1636,8 @@ "meta": { "country": "IR", "refs": [ - "https://www.blackhat.com/docs/us-16/materials/us-16-Guarnieri-Iran-And-The-Soft-War-For-Internet-Dominance-wp.pdf" + "https://www.blackhat.com/docs/us-16/materials/us-16-Guarnieri-Iran-And-The-Soft-War-For-Internet-Dominance-wp.pdf", + "https://iranthreats.github.io/" ] }, "value": "Sima", @@ -1483,12 +1645,13 @@ }, { "meta": { - "country": "CN", + "country": "CHN", "synonyms": [ "Cloudy Omega" ], "refs": [ - "https://securelist.com/blog/research/71876/new-activity-of-the-blue-termite-apt/" + "https://securelist.com/blog/research/71876/new-activity-of-the-blue-termite-apt/", + "http://www.kaspersky.com/about/news/virus/2015/Blue-Termite-A-Sophisticated-Cyber-Espionage-Campaign-is-After-High-Profile-Japanese-Targets" ] }, "value": "Blue Termite", @@ -1496,7 +1659,7 @@ }, { "meta": { - "country": "UA", + "country": "UKR", "refs": [ "http://www.welivesecurity.com/2016/05/18/groundbait" ] @@ -1507,7 +1670,8 @@ { "meta": { "refs": [ - "https://www.symantec.com/connect/blogs/longhorn-tools-used-cyberespionage-group-linked-vault-7" + "https://www.symantec.com/connect/blogs/longhorn-tools-used-cyberespionage-group-linked-vault-7", + "https://www.bleepingcomputer.com/news/security/longhorn-cyber-espionage-group-is-actually-the-cia/" ], "country": "US" }, @@ -1528,11 +1692,17 @@ "synonyms": [ "OceanLotus Group", "Ocean Lotus", + "Cobalt Kitty", + "APT-C-00", + "SeaLotus", "APT-32", "APT 32" ], "refs": [ - "https://www.fireeye.com/blog/threat-research/2017/05/cyber-espionage-apt32.html" + "https://www.fireeye.com/blog/threat-research/2017/05/cyber-espionage-apt32.html", + "https://www.cybereason.com/labs-operation-cobalt-kitty-a-large-scale-apt-in-asia-carried-out-by-the-oceanlotus-group/", + "https://www.scmagazineuk.com/ocean-lotus-groupapt-32-identified-as-vietnamese-apt-group/article/663565/", + "https://www.brighttalk.com/webcast/10703/261205" ] }, "value": "APT32", @@ -1571,6 +1741,9 @@ "refs": [ "http://download.microsoft.com/download/2/2/5/225BFE3E-E1DE-4F5B-A77B-71200928D209/Platinum%20feature%20article%20-%20Targeted%20attacks%20in%20South%20and%20Southeast%20Asia%20April%202016.pdf", "https://blogs.technet.microsoft.com/mmpc/2016/04/26/digging-deep-for-platinum/" + ], + "synonyms": [ + "TwoForOne" ] } }, @@ -1581,6 +1754,9 @@ "refs": [ "https://dragos.com/blog/crashoverride/CrashOverride-01.pdf", "https://www.welivesecurity.com/wp-content/uploads/2017/06/Win32_Industroyer.pdf" + ], + "synonyms": [ + "Sandworm" ] } }, @@ -1618,6 +1794,424 @@ "Cobalt gang" ] } + }, + { + "meta": { + "country": "CN", + "refs": [ + "https://www.proofpoint.com/us/threat-insight/post/apt-targets-financial-analysts#.WS3IBVFV4no.twitter" + ] + }, + "value": "TA459" + }, + { + "meta": { + "refs": [ + "https://www.threatconnect.com/blog/russia-hacks-bellingcat-mh17-investigation/#.V-wnrubaeEU.twitter" + ], + "country": "RU" + }, + "value": "Cyber Berkut" + }, + { + "meta": { + "country": "CN", + "refs": [ + "https://www.wsj.com/articles/chinas-secret-weapon-in-south-korea-missile-fight-hackers-1492766403?emailToken=JRrydPtyYnqTg9EyZsw31FwuZ7JNEOKCXF7LaW/HM1DLsjnUp6e6wLgph560pnmiTAN/5ssf7moyADPQj2p2Gc+YkL1yi0zhIiUM9M6aj1HTYQ==", + "https://arstechnica.com/information-technology/2017/04/researchers-claim-china-trying-to-hack-south-korea-missile-defense-efforts/" + ] + }, + "value": "Tonto Team" + }, + { + "value": "Danti", + "meta": { + "refs": [ + "https://securelist.com/analysis/publications/74828/cve-2015-2545-overview-of-current-threats/" + ] + } + }, + { + "value": "APT5", + "meta": { + "refs": [ + "https://www.fireeye.com/current-threats/apt-groups.html" + ] + } + }, + { + "meta": { + "country": "CN", + "synonyms": [ + "APT22" + ], + "refs": [ + "http://www.slideshare.net/CTruncer/ever-present-persistence-established-footholds-seen-in-the-wild" + ] + }, + "value": "APT 22" + }, + { + "meta": { + "synonyms": [ + "Bronze Butler" + ], + "country": "CN", + "refs": [ + "https://www.symantec.com/connect/blogs/tick-cyberespionage-group-zeros-japan", + "https://www.secureworks.jp/resources/rp-bronze-butler", + "https://researchcenter.paloaltonetworks.com/2017/07/unit42-tick-group-continues-attacks/", + "http://blog.jpcert.or.jp/2017/08/detecting-datper-malware-from-proxy-logs.html" + ] + }, + "value": "Tick" + }, + { + "meta": { + "synonyms": [ + "APT26", + "Hippo Team", + "JerseyMikes" + ], + "country": "CN" + }, + "value": "APT 26" + }, + { + "meta": { + "country": "CN", + "refs": [ + "http://go.crowdstrike.com/rs/281-OBQ-266/images/ReportGlobalThreatIntelligence.pdf" + ] + }, + "value": "Sabre Panda" + }, + { + "meta": { + "country": "CN", + "refs": [ + "http://www.darkreading.com/attacks-and-breaches/crowdstrike-falcon-traces-attacks-back-to-hackers/d/d-id/1110402?" + ] + }, + "value": "Big Panda" + }, + { + "meta": { + "country": "CN", + "refs": [ + "http://files.sans.org/summit/Threat_Hunting_Incident_Response_Summit_2016/PDFs/Detecting-and-Responding-to-Pandas-and-Bears-Christopher-Scott-CrowdStrike-and-Wendi-Whitmore-IBM.pdf" + ] + }, + "value": "Poisonous Panda" + }, + { + "value": "Ghost Jackal", + "meta": { + "refs": [ + "https://www.rsaconference.com/writable/presentations/file_upload/anf-t07b-the-art-of-attribution-identifying-and-pursuing-your-cyber-adversaries_final.pdf" + ] + } + }, + { + "meta": { + "country": "KP", + "refs": [ + "https://www.isightpartners.com/2016/02/threatscape-media-highlights-update-week-of-february-17th/" + ] + }, + "value": "TEMP.Hermit" + }, + { + "meta": { + "synonyms": [ + "Superman" + ], + "country": "CN", + "refs": [ + "https://blog.fox-it.com/2016/06/15/mofang-a-politically-motivated-information-stealing-adversary/", + "https://www.threatconnect.com/china-superman-apt/" + ] + }, + "value": "Mofang" + }, + { + "meta": { + "country": "IR", + "synonyms": [ + "Slayer Kitten" + ], + "refs": [ + "https://s3-eu-west-1.amazonaws.com/minervaresearchpublic/CopyKittens/CopyKittens.pdf", + "https://blog.domaintools.com/2017/03/hunt-case-study-hunting-campaign-indicators-on-privacy-protected-attack-infrastructure/", + "http://www.clearskysec.com/copykitten-jpost/", + "http://www.clearskysec.com/tulip/" + ] + }, + "value": "CopyKittens" + }, + { + "value": "EvilPost", + "meta": { + "refs": [ + "https://www.fireeye.com/blog/threat-research/2015/12/the-eps-awakens-part-two.html" + ] + } + }, + { + "meta": { + "country": "CN", + "refs": [ + "https://securelist.com/analysis/publications/74828/cve-2015-2545-overview-of-current-threats/" + ] + }, + "value": "SVCMONDR", + "description": "The referenced link links this group to Temper Panda" + }, + { + "value": "Test Panda", + "meta": { + "country": "CN", + "refs": [ + "http://www.slideshare.net/CrowdStrike/crowd-casts-monthly-you-have-an-adversary-problem" + ] + } + }, + { + "meta": { + "country": "IR", + "refs": [ + "https://securelist.com/blog/incidents/33693/the-madi-campaign-part-i-5/", + "https://securelist.com/blog/incidents/33701/the-madi-campaign-part-ii-53/" + ] + }, + "value": "Madi" + }, + { + "meta": { + "country": "CN", + "refs": [ + "http://www.slideshare.net/CrowdStrike/crowd-casts-monthly-you-have-an-adversary-problem" + ] + }, + "value": "Electric Panda" + }, + { + "meta": { + "country": "CN", + "synonyms": [ + "PLA Navy", + "Sykipot" + ], + "refs": [ + "https://www.alienvault.com/open-threat-exchange/blog/new-sykipot-developments", + "http://blog.trendmicro.com/trendlabs-security-intelligence/sykipot-now-targeting-us-civil-aviation-sector-information/", + "https://www.sans.org/reading-room/whitepapers/malicious/detailed-analysis-sykipot-smartcard-proxy-variant-33919" + ] + }, + "value": "Maverick Panda" + }, + { + "meta": { + "country": "KP", + "refs": [ + "http://securelist.com/analysis/57915/the-kimsuky-operation-a-north-korean-apt/" + ] + }, + "value": "Kimsuki" + }, + { + "value": "Snake Wine", + "meta": { + "refs": [ + "https://www.cylance.com/en_us/blog/the-deception-project-a-new-japanese-centric-threat.html" + ] + } + }, + { + "value": "Careto", + "meta": { + "refs": [ + "https://securelist.com/blog/research/58254/the-caretomask-apt-frequently-asked-questions/" + ], + "synonyms": [ + "The Mask" + ] + } + }, + { + "meta": { + "country": "CN", + "refs": [ + "http://www.slideshare.net/CrowdStrike/crowd-casts-monthly-you-have-an-adversary-problem" + ] + }, + "value": "Gibberish Panda" + }, + { + "meta": { + "country": "KP", + "refs": [ + "http://news.softpedia.com/news/korean-energy-and-transportation-targets-attacked-by-oniondog-apt-501534.shtml" + ] + }, + "value": "OnionDog" + }, + { + "meta": { + "country": "IR", + "synonyms": [ + "Group 41" + ], + "refs": [ + "http://www.crowdstrike.com/blog/whois-clever-kitten/" + ] + }, + "value": "Clever Kitten" + }, + { + "meta": { + "refs": [ + "https://www.rsaconference.com/writable/presentations/file_upload/anf-t07b-the-art-of-attribution-identifying-and-pursuing-your-cyber-adversaries_final.pdf" + ] + }, + "value": "Andromeda Spider" + }, + { + "value": "Cyber Caliphate Army", + "meta": { + "refs": [ + "https://en.wikipedia.org/wiki/Islamic_State_Hacking_Division", + "https://ent.siteintelgroup.com/index.php?option=com_customproperties&view=search&task=tag&bind_to_category=content:37&tagId=697" + ], + "synonyms": [ + "Islamic State Hacking Division", + "CCA", + "United Cyber Caliphate", + "UUC" + ] + } + }, + { + "meta": { + "country": "RU", + "refs": [ + "http://go.crowdstrike.com/rs/281-OBQ-266/images/ReportGlobalThreatIntelligence.pdf" + ] + }, + "value": "Magnetic Spider" + }, + { + "meta": { + "country": "CN", + "refs": [ + "https://www.arbornetworks.com/blog/asert/wp-content/uploads/2016/01/ASERT-Threat-Intelligence-Brief-2015-08-Uncovering-the-Seven-Pointed-Dagger.pdf" + ] + }, + "value": "Group 27" + }, + { + "meta": { + "refs": [ + "https://www.rsaconference.com/writable/presentations/file_upload/anf-t07b-the-art-of-attribution-identifying-and-pursuing-your-cyber-adversaries_final.pdf" + ] + }, + "value": "Singing Spider" + }, + { + "meta": { + "country": "IR", + "synonyms": [ + "Fraternal Jackal" + ], + "refs": [ + "http://pastebin.com/u/QassamCyberFighters", + "http://ddanchev.blogspot.com.es/2012/09/dissecting-operation-ababil-osint.html" + ] + }, + "value": "Cyber fighters of Izz Ad-Din Al Qassam" + }, + { + "meta": { + "synonyms": [ + "1.php Group", + "APT6" + ], + "country": "CN" + }, + "value": "APT 6" + }, + { + "value": "AridViper", + "meta": { + "refs": [ + "http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-operation-arid-viper.pdf", + "http://securityaffairs.co/wordpress/33785/cyber-crime/arid-viper-israel-sex-video.html", + "https://securelist.com/blog/research/68817/the-desert-falcons-targeted-attacks/", + "https://ti.360.com/upload/report/file/APTSWXLVJ8fnjoxck.pdf", + "https://blog.lookout.com/blog/2017/02/16/viperrat-mobile-apt/", + "https://securelist.com/blog/incidents/77562/breaking-the-weakest-link-of-the-strongest-chain/", + "https://www.proofpoint.com/us/threat-insight/post/Operation-Arid-Viper-Slithers-Back-Into-View", + "https://www.ci-project.org/blog/2017/3/4/arid-viper", + "http://blog.talosintelligence.com/2017/06/palestine-delphi.html", + "https://www.threatconnect.com/blog/kasperagent-malware-campaign/" + ], + "synonyms": [ + "Desert Falcon", + "Arid Viper", + "APT-C-23" + ] + } + }, + { + "meta": { + "refs": [ + "https://www.rsaconference.com/writable/presentations/file_upload/anf-t07b-the-art-of-attribution-identifying-and-pursuing-your-cyber-adversaries_final.pdf" + ] + }, + "value": "Dextorous Spider" + }, + { + "value": "Unit 8200", + "meta": { + "country": "IL", + "refs": [ + "https://securelist.com/blog/research/70504/the-mystery-of-duqu-2-0-a-sophisticated-cyberespionage-actor-returns/", + "https://archive.org/details/Stuxnet" + ], + "synonyms": [ + "Duqu Group" + ] + } + }, + { + "meta": { + "refs": [ + "https://securelist.com/introducing-whitebear/81638/" + ], + "synonyms": [ + "Skipper Turla" + ], + "country": "RU" + }, + "value": "White Bear" + }, + { + "meta": { + "country": "CN", + "refs": [ + "http://go.crowdstrike.com/rs/281-OBQ-266/images/ReportGlobalThreatIntelligence.pdf" + ] + }, + "value": "Pale Panda" + }, + { + "meta": { + "country": "CN", + "refs": [ + "https://www.isightpartners.com/2016/02/threatscape-media-highlights-update-week-of-february-17th/" + ] + }, + "value": "Mana Team" } ], "name": "Threat actor", @@ -1632,5 +2226,5 @@ ], "description": "Known or estimated adversary groups targeting organizations and employees. Adversary groups are regularly confused with their initial operation or campaign.", "uuid": "7cdff317-a673-4474-84ec-4f1754947823", - "version": 26 -} + "version": 27 +} \ No newline at end of file From 7f3ab79962d2a397e0ee82103d06397b425b39ba Mon Sep 17 00:00:00 2001 From: Fredrik Borg Date: Tue, 7 Nov 2017 13:19:50 +0100 Subject: [PATCH 2/5] Replace tab with space and add newline at end of file --- clusters/threat-actor.json | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/clusters/threat-actor.json b/clusters/threat-actor.json index c44713f3..bdd3b7b0 100644 --- a/clusters/threat-actor.json +++ b/clusters/threat-actor.json @@ -1607,7 +1607,7 @@ "country": "CN", "synonyms": [ "Zhenbao", - "TEMP.Zhenbao" + "TEMP.Zhenbao" ], "refs": [ "http://www.darkreading.com/endpoint/chinese-cyberspies-pivot-to-russia-in-wake-of-obama-xi-pact/d/d-id/1324242" @@ -2227,4 +2227,4 @@ "description": "Known or estimated adversary groups targeting organizations and employees. Adversary groups are regularly confused with their initial operation or campaign.", "uuid": "7cdff317-a673-4474-84ec-4f1754947823", "version": 27 -} \ No newline at end of file +} From 53a6a8d26f4eaf17be6fafa3fc51c6e736e48a83 Mon Sep 17 00:00:00 2001 From: Fredrik Borg Date: Tue, 7 Nov 2017 13:34:44 +0100 Subject: [PATCH 3/5] remove duplicate references --- clusters/threat-actor.json | 7 ++----- 1 file changed, 2 insertions(+), 5 deletions(-) diff --git a/clusters/threat-actor.json b/clusters/threat-actor.json index c44713f3..0cf072de 100644 --- a/clusters/threat-actor.json +++ b/clusters/threat-actor.json @@ -396,7 +396,6 @@ ], "country": "CN", "refs": [ - "http://www.crowdstrike.com/blog/cyber-deterrence-in-action-a-story-of-one-long-hurricane-panda-campaign/", "http://www.crowdstrike.com/blog/cyber-deterrence-in-action-a-story-of-one-long-hurricane-panda-campaign/" ] }, @@ -986,7 +985,6 @@ "country": "RU", "refs": [ "https://en.wikipedia.org/wiki/Carbanak", - "https://www.proofpoint.com/us/threat-insight/post/fin7carbanak-threat-actor-unleashes-bateleur-jscript-backdoor", "https://securelist.com/files/2015/02/Carbanak_APT_eng.pdf", "http://2014.zeronights.ru/assets/files/slides/ivanovb-zeronights.pdf", "https://www.symantec.com/connect/blogs/odinaff-new-trojan-used-high-level-financial-attacks", @@ -1398,7 +1396,6 @@ { "meta": { "refs": [ - "http://researchcenter.paloaltonetworks.com/2016/05/the-oilrig-campaign-attacks-on-saudi-arabian-organizations-deliver-helminth-backdoor/", "https://www.fireeye.com/blog/threat-research/2016/05/targeted_attacksaga.html", "http://researchcenter.paloaltonetworks.com/2016/10/unit42-oilrig-malware-campaign-updates-toolset-and-expands-targets/", "http://researchcenter.paloaltonetworks.com/2016/05/the-oilrig-campaign-attacks-on-saudi-arabian-organizations-deliver-helminth-backdoor/", @@ -1607,7 +1604,7 @@ "country": "CN", "synonyms": [ "Zhenbao", - "TEMP.Zhenbao" + "TEMP.Zhenbao" ], "refs": [ "http://www.darkreading.com/endpoint/chinese-cyberspies-pivot-to-russia-in-wake-of-obama-xi-pact/d/d-id/1324242" @@ -2227,4 +2224,4 @@ "description": "Known or estimated adversary groups targeting organizations and employees. Adversary groups are regularly confused with their initial operation or campaign.", "uuid": "7cdff317-a673-4474-84ec-4f1754947823", "version": 27 -} \ No newline at end of file +} From afc4972e251b3016e54d355d66b94291d018fa28 Mon Sep 17 00:00:00 2001 From: Fredrik Borg Date: Tue, 7 Nov 2017 14:04:04 +0100 Subject: [PATCH 4/5] fix iso codes --- clusters/threat-actor.json | 16 ++++++++-------- 1 file changed, 8 insertions(+), 8 deletions(-) diff --git a/clusters/threat-actor.json b/clusters/threat-actor.json index 0cf072de..b48f6896 100644 --- a/clusters/threat-actor.json +++ b/clusters/threat-actor.json @@ -1186,7 +1186,7 @@ "synonyms": [ "FruityArmor" ], - "country": "UAE" + "country": "AE" }, "value": "Stealth Falcon", "description": "Group targeting Emirati journalists, activists, and dissidents." @@ -1471,7 +1471,7 @@ "synonyms": [ "StrongPity" ], - "country": "TU" + "country": "TR" } }, { @@ -1526,7 +1526,7 @@ "value": "Sath-ı Müdafaa", "description": "A Turkish hacking group, Sath-ı Müdafaa, is encouraging individuals to join its DDoS-for-Points platform that features points and prizes for carrying out distributed denial-of-service (DDoS) attacks against a list of predetermined targets. Their DDoS tool also contains a backdoor to hack the hackers. So the overarching motivation and allegiance of the group is not entirely clear.", "meta": { - "country": "TU", + "country": "TR", "motive": "Hacktivists-Nationalists" } }, @@ -1534,7 +1534,7 @@ "value": "Aslan Neferler Tim", "description": "Turkish nationalist hacktivist group that has been active for roughly one year. According to Domaintools, the group’s site has been registered since December 2015, with an active Twitter account since January 2016. The group carries out distributed denial-of-service (DDoS) attacks and defacements against the sites of news organizations and governments perceived to be critical of Turkey’s policies or leadership, and purports to act in defense of Islam", "meta": { - "country": "TU", + "country": "TR", "synonyms": [ "Lion Soldiers Team", "Phantom Turk" @@ -1546,7 +1546,7 @@ "value": "Ayyıldız Tim", "description": "Ayyıldız (Crescent and Star) Tim is a nationalist hacking group founded in 2002. It performs defacements and DDoS attacks against the websites of governments that it considers to be repressing Muslim minorities or engaged in Islamophobic policies.", "meta": { - "country": "TU", + "country": "TR", "synonyms": [ "Crescent and Star" ], @@ -1557,7 +1557,7 @@ "value": "TurkHackTeam", "description": "Founded in 2004, Turkhackteam is one of Turkey’s oldest and most high-profile hacking collectives. According to a list compiled on Turkhackteam’s forum, the group has carried out almost 30 highly publicized hacking campaigns targeting foreign government and commercial websites, including websites of international corporations. ", "meta": { - "country": "TU", + "country": "TR", "synonyms": [ "Turk Hack Team" ], @@ -1642,7 +1642,7 @@ }, { "meta": { - "country": "CHN", + "country": "CN", "synonyms": [ "Cloudy Omega" ], @@ -1656,7 +1656,7 @@ }, { "meta": { - "country": "UKR", + "country": "UA", "refs": [ "http://www.welivesecurity.com/2016/05/18/groundbait" ] From 72d8bfc28a6f7bd682d99f342e905f82bf42c16a Mon Sep 17 00:00:00 2001 From: Fredrik Borg Date: Tue, 7 Nov 2017 14:15:40 +0100 Subject: [PATCH 5/5] fix-iso-code-3 --- clusters/threat-actor.json | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/clusters/threat-actor.json b/clusters/threat-actor.json index b48f6896..1d7e6222 100644 --- a/clusters/threat-actor.json +++ b/clusters/threat-actor.json @@ -1376,7 +1376,7 @@ }, { "meta": { - "country": "LBY" + "country": "LY" }, "description": "Libyan Scorpions is a malware operation in use since September 2015 and operated by a politically motivated group whose main objective is intelligence gathering, spying on influentials and political figures and operate an espionage campaign within Libya.", "value": "Libyan Scorpions"