diff --git a/clusters/threat-actor.json b/clusters/threat-actor.json index ac21e2f..bcc884d 100644 --- a/clusters/threat-actor.json +++ b/clusters/threat-actor.json @@ -5631,7 +5631,8 @@ "PLA Navy", "MAVERICK PANDA", "BRONZE EDISON", - "Sykipot" + "SODIUM", + "Salmon Typhoon" ] }, "uuid": "8e28dbee-4e9e-4491-9a6c-ee9c9ec4b28b", @@ -7069,7 +7070,10 @@ "https://www.proofpoint.com/us/blog/threat-insight/ta416-goes-ground-and-returns-golang-plugx-malware-loader", "https://www.proofpoint.com/us/blog/threat-insight/good-bad-and-web-bug-ta416-increases-operational-tempo-against-european", "https://unit42.paloaltonetworks.com/stately-taurus-targets-philippines-government-cyberespionage/", - "https://www.bsi.bund.de/DE/Themen/Unternehmen-und-Organisationen/Cyber-Sicherheitslage/Analysen-und-Prognosen/Threat-Intelligence/Aktive_APT-Gruppen/aktive-apt-gruppen_node.html" + "https://www.bsi.bund.de/DE/Themen/Unternehmen-und-Organisationen/Cyber-Sicherheitslage/Analysen-und-Prognosen/Threat-Intelligence/Aktive_APT-Gruppen/aktive-apt-gruppen_node.html", + "https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RW1aFyW", + "https://jsac.jpcert.or.jp/archive/2023/pdf/JSAC2023_2_LT4.pdf", + "https://thecyberwire.com/podcasts/microsoft-threat-intelligence/4/notes" ], "synonyms": [ "BRONZE PRESIDENT", @@ -7080,7 +7084,10 @@ "Earth Preta", "TA416", "Stately Taurus", - "LuminousMoth" + "LuminousMoth", + "Polaris", + "TANTALUM", + "Twill Typhoon" ] }, "uuid": "78bf726c-a9e6-11e8-9e43-77249a2f7339", @@ -8118,7 +8125,8 @@ "https://www.verfassungsschutz.de/SharedDocs/publikationen/DE/cyberabwehr/2023-02-bfv-cyber-brief.pdf?__blob=publicationFile&v=6", "https://www.justice.gov/opa/pr/seven-hackers-associated-chinese-government-charged-computer-intrusions-targeting-perceived", "https://www.justice.gov/opa/media/1345141/dl?inline", - "https://www.gov.uk/government/news/uk-holds-china-state-affiliated-organisations-and-individuals-responsible-for-malicious-cyber-activity" + "https://www.gov.uk/government/news/uk-holds-china-state-affiliated-organisations-and-individuals-responsible-for-malicious-cyber-activity", + "https://harfanglab.io/en/insidethelab/apt31-indictment-analysis/" ], "synonyms": [ "ZIRCONIUM", @@ -12358,7 +12366,8 @@ "https://www.microsoft.com/en-us/security/blog/2023/05/24/volt-typhoon-targets-us-critical-infrastructure-with-living-off-the-land-techniques/" ], "synonyms": [ - "BRONZE SILHOUETTE" + "BRONZE SILHOUETTE", + "VANGUARD PANDA" ] }, "uuid": "f02679fa-5e85-4050-8eb5-c2677d93306f", @@ -14462,7 +14471,8 @@ "https://www.crowdstrike.com/global-threat-report/" ], "synonyms": [ - "Ethereal Panda" + "Ethereal Panda", + "Storm-0919" ] }, "uuid": "50ee2b1b-979e-4507-8747-8597a95938f6",