diff --git a/clusters/threat-actor.json b/clusters/threat-actor.json index f7d4221..2aaafb3 100644 --- a/clusters/threat-actor.json +++ b/clusters/threat-actor.json @@ -13340,6 +13340,18 @@ }, "uuid": "5587f082-349b-46ab-9e6f-303d9bfd1e1b", "value": "CostaRicto" + }, + { + "description": "TA402 is an APT group that has been tracked by Proofpoint since 2020. They primarily target government entities in the Middle East and North Africa, with a focus on intelligence collection. TA402 is known for using sophisticated phishing campaigns and constantly updating their malware implants and delivery methods to evade detection. They have been observed using cloud services like Dropbox and Google Drive for hosting malicious payloads and command-and-control infrastructure.", + "meta": { + "country": "PS", + "refs": [ + "https://www.proofpoint.com/us/blog/threat-insight/ta402-uses-complex-ironwind-infection-chains-target-middle-east-based-government", + "https://www.proofpoint.com/us/blog/threat-insight/ugg-boots-4-sale-tale-palestinian-aligned-espionage" + ] + }, + "uuid": "aad291eb-08d1-4af4-9dd1-e90fe1f2d6c6", + "value": "TA402" } ], "version": 294