Skip to content

Commit

Permalink
Merge pull request #1001 from Mathieu4141/threat-actors/a66522b9-9e27…
Browse files Browse the repository at this point in the history
…-47a5-97cf-c8450acfb06c

[threat actors] Add 2 actors
  • Loading branch information
adulau authored Jul 20, 2024
2 parents 6e3a94f + 5e83abb commit e69f200
Show file tree
Hide file tree
Showing 2 changed files with 23 additions and 1 deletion.
2 changes: 1 addition & 1 deletion README.md
Original file line number Diff line number Diff line change
Expand Up @@ -535,7 +535,7 @@ Category: *tea-matrix* - source: ** - total: *7* elements

[Threat Actor](https://www.misp-galaxy.org/threat-actor) - Known or estimated adversary groups targeting organizations and employees. Adversary groups are regularly confused with their initial operation or campaign. threat-actor-classification meta can be used to clarify the understanding of the threat-actor if also considered as operation, campaign or activity group.

Category: *actor* - source: *MISP Project* - total: *709* elements
Category: *actor* - source: *MISP Project* - total: *711* elements

[[HTML](https://www.misp-galaxy.org/threat-actor)] - [[JSON](https://github.com/MISP/misp-galaxy/blob/main/clusters/threat-actor.json)]

Expand Down
22 changes: 22 additions & 0 deletions clusters/threat-actor.json
Original file line number Diff line number Diff line change
Expand Up @@ -16378,6 +16378,28 @@
},
"uuid": "feeab818-a9bd-4bff-9923-bf8421abd6c5",
"value": "CRYSTALRAY"
},
{
"description": "Rostelecom's security team has discovered a new APT group that is breaching companies via industrial PLCs. Named Lifting Zmiy, the group's first attacks were traced back to October 2023. The group targeted PLCs from Russian company Tech-Automatics usually used with elevators and which were still using their default passwords. Rostelecom has linked the group to intrusions at a Russian government contractor, two telecom operators, and an IT company. The company says the group collected and exfiltrated data and then destroyed the victim's infrastructure. Rostelecom says Lifting Zmiy uses Starlink infrastructure for attacks and appears to operate out of Eastern Europe.",
"meta": {
"refs": [
"https://www.rbc.ru/technology_and_media/08/07/2024/6687f9af9a7947780a5d1a31",
"https://tadviser.com/index.php/Company:Tecon-Automatics_NGO",
"https://news.risky.biz/risky-biz-news-us-takes-down-rts-twitter-bot-farm/"
]
},
"uuid": "b9968b5f-0a5a-4be6-9dd2-428244741323",
"value": "Lifting Zmiy"
},
{
"description": "NullBulge is a cybercriminal threat group targeting AI and gaming focused entities. They weaponize code in publicly available repositories to distribute malware, including LockBit ransomware. The group claims to be motivated by a pro-art, anti-AI cause, but their activities indicate a financial focus. NullBulge uses obfuscated code in public repositories and malicious mods to target their victims.",
"meta": {
"refs": [
"https://www.sentinelone.com/labs/nullbulge-threat-actor-masquerades-as-hacktivist-group-rebelling-against-ai/"
]
},
"uuid": "000d8bbf-cb6f-4f7b-89a4-9c136ac4bc5a",
"value": "Nullbulge"
}
],
"version": 312
Expand Down

0 comments on commit e69f200

Please sign in to comment.