Skip to content

Commit

Permalink
Merge pull request #1042 from Mathieu4141/threat-actors/90533794-86ec…
Browse files Browse the repository at this point in the history
…-434a-b6b5-3a3f8d16e51e

[threat actors] 3 new, 1 alias
  • Loading branch information
adulau authored Jan 9, 2025
2 parents 0ff2369 + 75405a3 commit 756c710
Show file tree
Hide file tree
Showing 2 changed files with 36 additions and 3 deletions.
2 changes: 1 addition & 1 deletion README.md
Original file line number Diff line number Diff line change
Expand Up @@ -599,7 +599,7 @@ Category: *tea-matrix* - source: ** - total: *7* elements

[Threat Actor](https://www.misp-galaxy.org/threat-actor) - Known or estimated adversary groups targeting organizations and employees. Adversary groups are regularly confused with their initial operation or campaign. threat-actor-classification meta can be used to clarify the understanding of the threat-actor if also considered as operation, campaign or activity group.

Category: *actor* - source: *MISP Project* - total: *793* elements
Category: *actor* - source: *MISP Project* - total: *796* elements

[[HTML](https://www.misp-galaxy.org/threat-actor)] - [[JSON](https://github.com/MISP/misp-galaxy/blob/main/clusters/threat-actor.json)]

Expand Down
37 changes: 35 additions & 2 deletions clusters/threat-actor.json
Original file line number Diff line number Diff line change
Expand Up @@ -3939,7 +3939,9 @@
"https://attack.mitre.org/groups/G0037/",
"https://securityintelligence.com/posts/more_eggs-anyone-threat-actor-itg08-strikes-again/",
"http://www.secureworks.com/research/threat-profiles/gold-franklin",
"https://www.crowdstrike.com/resources/reports/2019-crowdstrike-global-threat-report/"
"https://www.crowdstrike.com/resources/reports/2019-crowdstrike-global-threat-report/",
"https://www.proofpoint.com/us/blog/threat-insight/security-brief-ta4557-targets-recruiters-directly-email",
"https://www.proofpoint.com/us/threat-insight/post/fake-jobs-campaigns-delivering-moreeggs-backdoor-fake-job-offers"
],
"synonyms": [
"SKELETON SPIDER",
Expand All @@ -3949,7 +3951,8 @@
"GOLD FRANKLIN",
"ATK88",
"G0037",
"Camouflage Tempest"
"Camouflage Tempest",
"TA4557"
]
},
"related": [
Expand Down Expand Up @@ -17624,6 +17627,36 @@
},
"uuid": "fba00660-d18c-4af7-831c-25757e495907",
"value": "Wassonite"
},
{
"description": "Natohub is a hacker who claimed to have stolen 42,000 documents from the UN’s International Civil Aviation Organization and is offering the data for sale on underground forums. The compromised documents allegedly contain personal records of ICAO staff and others associated with the agency. While ICAO is investigating the potential breach, Natohub has also made unverified claims about accessing personal data on thousands of UN delegates. The actor's track record of leaks is limited, raising questions about the credibility of their assertions.",
"meta": {
"refs": [
"https://cisoseries.com/cyber-security-news-cyber-trust-label-uk-deepfake-laws-treasury-attack-details/"
]
},
"uuid": "43e2a6bc-0b62-456a-b5ae-a40770b8b8e1",
"value": "Natohub"
},
{
"description": "CoughingDown is a threat group attributed to various cyber campaigns, including the deployment of the EAGERBEE backdoor, which utilizes service manipulation and privilege escalation techniques. The group has been linked to malware infrastructure that abuses legitimate services like MSDTC, IKEEXT, and SessionEnv to load malicious DLLs, including oci.dll. Analysis of supply-chain attacks, particularly involving Trojanized packages, has revealed similarities between CoughingDown malware and post-compromise tools used in these incidents. Evidence such as consistent service creation and C2 domain overlap further supports the connection between EAGERBEE and CoughingDown.",
"meta": {
"refs": [
"https://securelist.com/eagerbee-backdoor/115175/"
]
},
"uuid": "80872d9a-1d0c-4c12-9543-feca1fbd2ac2",
"value": "CoughingDown"
},
{
"description": "EC2 Grouper is a prolific threat actor known for leveraging AWS tools for PowerShell to conduct automated attacks in cloud environments. They typically utilize the CreateSecurityGroup API to establish remote access and exhibit a consistent security group naming convention. Credential acquisition is believed to stem from compromised cloud access keys, often sourced from public code repositories. Notably, their activities do not include calls to AuthorizeSecurityGroupIngress, suggesting a selective approach to escalation.",
"meta": {
"refs": [
"https://www.fortinet.com/blog/threat-research/catching-ec2-grouper-no-indicators-required"
]
},
"uuid": "7f7b20e7-e704-4b47-b230-b5d232493fce",
"value": "EC2 Grouper"
}
],
"version": 322
Expand Down

0 comments on commit 756c710

Please sign in to comment.