Compare commits

...

2 Commits

Author SHA1 Message Date
Delta-Sierra 0e3bab72d9 Fix uuid 2024-04-26 11:39:43 +02:00
Delta-Sierra 177fadbc10 Add Arcane Door 2024-04-26 10:36:26 +02:00
2 changed files with 12 additions and 2 deletions

View File

@ -7,7 +7,7 @@
"name": "Entity",
"source": "MISP Project",
"type": "entity",
"uuid": "54e00-adc1-496c-a3ed-d067983a3b86",
"uuid": "cd80fe0d-b905-449c-89f5-9a6b0ea09fc3",
"values": [
{
"description": "An individual involved in an event.",

View File

@ -15907,7 +15907,17 @@
},
"uuid": "f5f6d4eb-1ec3-494e-807d-5b767122f9b2",
"value": "UAC-0149"
},
{
"description": "ArcaneDoor is a campaign that is the latest example of state-sponsored actors targeting perimeter network devices from multiple vendors. Coveted by these actors, perimeter network devices are the perfect intrusion point for espionage-focused campaigns. As a critical path for data into and out of the network, these devices need to be routinely and promptly patched; using up-to-date hardware and software versions and configurations; and be closely monitored from a security perspective. Gaining a foothold on these devices allows an actor to directly pivot into an organization, reroute or modify traffic and monitor network communications. In the past two years, we have seen a dramatic and sustained increase in the targeting of these devices in areas such as telecommunications providers and energy sector organizations — critical infrastructure entities that are likely strategic targets of interest for many foreign governments.",
"meta": {
"refs": [
"https://blog.talosintelligence.com/arcanedoor-new-espionage-focused-campaign-found-targeting-perimeter-network-devices/"
]
},
"uuid": "97a10d3b-5cb5-4df9-856c-515994f3e953",
"value": "ArcaneDoor"
}
],
"version": 307
"version": 308
}