Version 14.1 15.0
Groups : Enterprise ATT&CK Changelog
Added Groups
| Description |
|---|
Mustard Tempest is an initial access broker that has operated the SocGholish distribution network since at least 2017. Mustard Tempest has partnered with Indrik Spider to provide access for the download of additional malware including LockBit, WastedLocker, and remote access tools.[1][2][3][4] References:
|
| Description |
|---|
Akira is a ransomware variant and ransomware deployment entity active since at least March 2023.[1] Akira uses compromised credentials to access single-factor external access mechanisms such as VPNs for initial access, then various publicly-available tools and techniques for lateral movement.[1][2] Akira operations are associated with "double extortion" ransomware activity, where data is exfiltrated from victim environments prior to encryption, with threats to publish files if a ransom is not paid. Technical analysis of Akira ransomware indicates multiple overlaps with and similarities to Conti malware.[3] References:
|
| Description |
|---|
Malteiro is a financially motivated criminal group that is likely based in Brazil and has been active since at least November 2019. The group operates and distributes the Mispadu banking trojan via a Malware-as-a-Service (MaaS) business model. Malteiro mainly targets victims throughout Latin America (particularly Mexico) and Europe (particularly Spain and Portugal).[1] References: |
Modified Groups
| Description |
|---|
Ke3chang is a threat group attributed to actors operating out of China. Ke3chang has targeted oil, government, diplomatic, military, and NGOs in Central and South America, the Caribbean, Europe, and North America since at least 2010.[1][2][3][4] References:
|
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2022-07-22 18:52:32.762000+00:00 | 2024-01-08 21:47:14.257000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 2.0 | 3.0 |
Iterable Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| aliases | Nylon Typhoon | |
| external_references | {'source_name': 'Nylon Typhoon', 'description': '(Citation: Microsoft Threat Actor Naming July 2023)'} | |
| external_references | {'source_name': 'Microsoft Threat Actor Naming July 2023', 'description': 'Microsoft . (2023, July 12). How Microsoft names threat actors. Retrieved November 17, 2023.', 'url': 'https://learn.microsoft.com/en-us/microsoft-365/security/intelligence/microsoft-threat-actor-naming?view=o365-worldwide'} |
| Modified Description View changes side-by-side |
|---|
| [APT28](https://attack.mitre.org/groups/G0007) is a threat group that has been attributed to Russia's General Staff Main Intelligence Directorate (GRU) 85th Main Special Service Center (GTsSS) military unit 26165.(Citation: NSA/FBI Drovorub August 2020)(Citation: Cybersecurity Advisory GRU Brute Force Campaign July 2021) This group has been active since at least 2004.(Citation: DOJ GRU Indictment Jul 2018)(Citation: Ars Technica GRU indictment Jul 2018)(Citation: Crowdstrike DNC June 2016)(Citation: FireEye APT28)(Citation: SecureWorks TG-4127)(Citation: FireEye APT28 January 2017)(Citation: GRIZZLY STEPPE JAR)(Citation: Sofacy DealersChoice)(Citation: Palo Alto Sofacy 06-2018)(Citation: Symantec APT28 Oct 2018)(Citation: ESET Zebrocy May 2019) [APT28](https://attack.mitre.org/groups/G0007) reportedly compromised the Hillary Clinton campaign, the Democratic National Committee, and the Democratic Congressional Campaign Committee in 2016 in an attempt to interfere with the U.S. presidential election. (Citation: election.(Citation: Crowdstrike DNC June 2016) In 2018, the US indicted five GRU Unit 26165 officers associated with [APT28](https://attack.mitre.org/groups/G0007) for cyber operations (including close-access operations) conducted between 2014 and 2018 against the World Anti-Doping Agency (WADA), the US Anti-Doping Agency, a US nuclear facility, the Organization for the Prohibition of Chemical Weapons (OPCW), the Spiez Swiss Chemicals Laboratory, and other organizations.(Citation: US District Court Indictment GRU Oct 2018) Some of these were conducted with the assistance of GRU Unit 74455, which is also referred to as [Sandworm Team](https://attack.mitre.org/groups/G0034). |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-03-26 17:51:20.401000+00:00 | 2024-04-04 19:07:48.903000+00:00 |
| description | [APT28](https://attack.mitre.org/groups/G0007) is a threat group that has been attributed to Russia's General Staff Main Intelligence Directorate (GRU) 85th Main Special Service Center (GTsSS) military unit 26165.(Citation: NSA/FBI Drovorub August 2020)(Citation: Cybersecurity Advisory GRU Brute Force Campaign July 2021) This group has been active since at least 2004.(Citation: DOJ GRU Indictment Jul 2018)(Citation: Ars Technica GRU indictment Jul 2018)(Citation: Crowdstrike DNC June 2016)(Citation: FireEye APT28)(Citation: SecureWorks TG-4127)(Citation: FireEye APT28 January 2017)(Citation: GRIZZLY STEPPE JAR)(Citation: Sofacy DealersChoice)(Citation: Palo Alto Sofacy 06-2018)(Citation: Symantec APT28 Oct 2018)(Citation: ESET Zebrocy May 2019) [APT28](https://attack.mitre.org/groups/G0007) reportedly compromised the Hillary Clinton campaign, the Democratic National Committee, and the Democratic Congressional Campaign Committee in 2016 in an attempt to interfere with the U.S. presidential election. (Citation: Crowdstrike DNC June 2016) In 2018, the US indicted five GRU Unit 26165 officers associated with [APT28](https://attack.mitre.org/groups/G0007) for cyber operations (including close-access operations) conducted between 2014 and 2018 against the World Anti-Doping Agency (WADA), the US Anti-Doping Agency, a US nuclear facility, the Organization for the Prohibition of Chemical Weapons (OPCW), the Spiez Swiss Chemicals Laboratory, and other organizations.(Citation: US District Court Indictment GRU Oct 2018) Some of these were conducted with the assistance of GRU Unit 74455, which is also referred to as [Sandworm Team](https://attack.mitre.org/groups/G0034). | [APT28](https://attack.mitre.org/groups/G0007) is a threat group that has been attributed to Russia's General Staff Main Intelligence Directorate (GRU) 85th Main Special Service Center (GTsSS) military unit 26165.(Citation: NSA/FBI Drovorub August 2020)(Citation: Cybersecurity Advisory GRU Brute Force Campaign July 2021) This group has been active since at least 2004.(Citation: DOJ GRU Indictment Jul 2018)(Citation: Ars Technica GRU indictment Jul 2018)(Citation: Crowdstrike DNC June 2016)(Citation: FireEye APT28)(Citation: SecureWorks TG-4127)(Citation: FireEye APT28 January 2017)(Citation: GRIZZLY STEPPE JAR)(Citation: Sofacy DealersChoice)(Citation: Palo Alto Sofacy 06-2018)(Citation: Symantec APT28 Oct 2018)(Citation: ESET Zebrocy May 2019) [APT28](https://attack.mitre.org/groups/G0007) reportedly compromised the Hillary Clinton campaign, the Democratic National Committee, and the Democratic Congressional Campaign Committee in 2016 in an attempt to interfere with the U.S. presidential election.(Citation: Crowdstrike DNC June 2016) In 2018, the US indicted five GRU Unit 26165 officers associated with [APT28](https://attack.mitre.org/groups/G0007) for cyber operations (including close-access operations) conducted between 2014 and 2018 against the World Anti-Doping Agency (WADA), the US Anti-Doping Agency, a US nuclear facility, the Organization for the Prohibition of Chemical Weapons (OPCW), the Spiez Swiss Chemicals Laboratory, and other organizations.(Citation: US District Court Indictment GRU Oct 2018) Some of these were conducted with the assistance of GRU Unit 74455, which is also referred to as [Sandworm Team](https://attack.mitre.org/groups/G0034). |
| x_mitre_attack_spec_version | 3.1.0 | 3.2.0 |
| x_mitre_version | 4.0 | 5.0 |
Iterable Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| aliases | Forest Blizzard | |
| aliases | FROZENLAKE | |
| external_references | {'source_name': 'FROZENLAKE', 'description': '(Citation: Leonard TAG 2023)'} | |
| external_references | {'source_name': 'Forest Blizzard', 'description': '(Citation: Microsoft Threat Actor Naming July 2023)'} | |
| external_references | {'source_name': 'Leonard TAG 2023', 'description': 'Billy Leonard. (2023, April 19). Ukraine remains Russia’s biggest cyber focus in 2023. Retrieved March 1, 2024.', 'url': 'https://blog.google/threat-analysis-group/ukraine-remains-russias-biggest-cyber-focus-in-2023/'} | |
| external_references | {'source_name': 'Microsoft Threat Actor Naming July 2023', 'description': 'Microsoft . (2023, July 12). How Microsoft names threat actors. Retrieved November 17, 2023.', 'url': 'https://learn.microsoft.com/en-us/microsoft-365/security/intelligence/microsoft-threat-actor-naming?view=o365-worldwide'} |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-08-02 19:48:08.774000+00:00 | 2024-04-17 22:12:21.483000+00:00 |
| external_references[1]['source_name'] | Belugasturgeon | BELUGASTURGEON |
| x_mitre_attack_spec_version | 3.1.0 | 3.2.0 |
| x_mitre_version | 4.0 | 5.0 |
Iterable Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| aliases | Secret Blizzard | |
| aliases | BELUGASTURGEON | |
| external_references | {'source_name': 'Secret Blizzard', 'description': '(Citation: Microsoft Threat Actor Naming July 2023)'} | |
| external_references | {'source_name': 'Microsoft Threat Actor Naming July 2023', 'description': 'Microsoft . (2023, July 12). How Microsoft names threat actors. Retrieved November 17, 2023.', 'url': 'https://learn.microsoft.com/en-us/microsoft-365/security/intelligence/microsoft-threat-actor-naming?view=o365-worldwide'} |
Iterable Item Removed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| aliases | Belugasturgeon |
| Description |
|---|
Darkhotel is a suspected South Korean threat group that has targeted victims primarily in East Asia since at least 2004. The group's name is based on cyber espionage operations conducted via hotel Internet networks against traveling executives and other select guests. Darkhotel has also conducted spearphishing campaigns and infected victims through peer-to-peer and file sharing networks.[1][2][3] References:
|
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-10-17 20:21:44.687000+00:00 | 2024-01-08 20:27:56.707000+00:00 |
| x_mitre_version | 2.1 | 3.0 |
Iterable Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| aliases | Zigzag Hail | |
| external_references | {'source_name': 'Zigzag Hail', 'description': '(Citation: Microsoft Threat Actor Naming July 2023)'} | |
| external_references | {'source_name': 'Microsoft Threat Actor Naming July 2023', 'description': 'Microsoft . (2023, July 12). How Microsoft names threat actors. Retrieved November 17, 2023.', 'url': 'https://learn.microsoft.com/en-us/microsoft-365/security/intelligence/microsoft-threat-actor-naming?view=o365-worldwide'} |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-10-02 21:33:07.807000+00:00 | 2024-04-12 21:15:41.833000+00:00 |
| x_mitre_version | 5.0 | 6.0 |
Iterable Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| aliases | Midnight Blizzard | |
| external_references | {'source_name': 'Midnight Blizzard', 'description': '(Citation: Microsoft Threat Actor Naming July 2023)'} | |
| external_references | {'source_name': 'Microsoft Threat Actor Naming July 2023', 'description': 'Microsoft . (2023, July 12). How Microsoft names threat actors. Retrieved November 17, 2023.', 'url': 'https://learn.microsoft.com/en-us/microsoft-365/security/intelligence/microsoft-threat-actor-naming?view=o365-worldwide'} | |
| x_mitre_contributors | Liran Ravich, CardinalOps |
| Description |
|---|
Molerats is an Arabic-speaking, politically-motivated threat group that has been operating since 2012. The group's victims have primarily been in the Middle East, Europe, and the United States.[1][2][3][4] References:
|
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_attack_spec_version | 3.2.0 | |
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2021-04-27 20:16:16.057000+00:00 | 2024-04-11 00:40:46.966000+00:00 |
| x_mitre_version | 2.0 | 2.1 |
| Modified Description View changes side-by-side |
|---|
| [APT3](https://attack.mitre.org/groups/G0022) is a China-based threat group that researchers have attributed to China's Ministry of State Security.(Citation: FireEye Clandestine Wolf)(Citation: Recorded Future APT3 May 2017) This group is responsible for the campaigns known as Operation Clandestine Fox, Operation Clandestine Wolf, and Operation Double Tap.(Citation: FireEye Clandestine Wolf)(Citation: FireEye Operation Double Tap) As of June 2015, the group appears to have shifted from targeting primarily US victims to primarily political organizations in Hong Kong.(Citation: Symantec Buckeye) In 2017, MITRE developed an APT3 Adversary Emulation Plan.(Citation: APT3 Adversary Emulation Plan) |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_attack_spec_version | 3.2.0 | |
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2021-10-01 19:09:20.817000+00:00 | 2024-02-06 17:49:35.261000+00:00 |
| description | [APT3](https://attack.mitre.org/groups/G0022) is a China-based threat group that researchers have attributed to China's Ministry of State Security.(Citation: FireEye Clandestine Wolf)(Citation: Recorded Future APT3 May 2017) This group is responsible for the campaigns known as Operation Clandestine Fox, Operation Clandestine Wolf, and Operation Double Tap.(Citation: FireEye Clandestine Wolf)(Citation: FireEye Operation Double Tap) As of June 2015, the group appears to have shifted from targeting primarily US victims to primarily political organizations in Hong Kong.(Citation: Symantec Buckeye) In 2017, MITRE developed an APT3 Adversary Emulation Plan.(Citation: APT3 Adversary Emulation Plan) | [APT3](https://attack.mitre.org/groups/G0022) is a China-based threat group that researchers have attributed to China's Ministry of State Security.(Citation: FireEye Clandestine Wolf)(Citation: Recorded Future APT3 May 2017) This group is responsible for the campaigns known as Operation Clandestine Fox, Operation Clandestine Wolf, and Operation Double Tap.(Citation: FireEye Clandestine Wolf)(Citation: FireEye Operation Double Tap) As of June 2015, the group appears to have shifted from targeting primarily US victims to primarily political organizations in Hong Kong.(Citation: Symantec Buckeye) |
Iterable Item Removed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| external_references | {'source_name': 'APT3 Adversary Emulation Plan', 'description': 'Korban, C, et al. (2017, September). APT3 Adversary Emulation Plan. Retrieved January 16, 2018.', 'url': 'https://attack.mitre.org/docs/APT3_Adversary_Emulation_Plan.pdf'} |
| Description |
|---|
Putter Panda is a Chinese threat group that has been attributed to Unit 61486 of the 12th Bureau of the PLA’s 3rd General Staff Department (GSD). [1] References: |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_attack_spec_version | 3.2.0 | |
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2020-03-30 19:15:04.771000+00:00 | 2024-04-11 00:24:27.983000+00:00 |
| x_mitre_version | 1.1 | 1.2 |
| Description |
|---|
APT18 is a threat group that has operated since at least 2009 and has targeted a range of industries, including technology, manufacturing, human rights groups, government, and medical. [1] References: |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_attack_spec_version | 3.2.0 | |
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2020-03-30 18:46:16.853000+00:00 | 2024-04-11 03:03:44.056000+00:00 |
| x_mitre_version | 2.1 | 2.2 |
| Description |
|---|
Threat Group-3390 is a Chinese threat group that has extensively used strategic Web compromises to target victims.[1] The group has been active since at least 2010 and has targeted organizations in the aerospace, government, defense, technology, energy, manufacturing and gambling/betting sectors.[2][3][4] References:
|
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-03-29 16:53:17.235000+00:00 | 2024-04-10 22:33:06.500000+00:00 |
| x_mitre_attack_spec_version | 3.1.0 | 3.2.0 |
| x_mitre_version | 2.1 | 2.2 |
| Description |
|---|
Lotus Blossom is a threat group that has targeted government and military organizations in Southeast Asia. [1] References: |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_attack_spec_version | 3.2.0 | |
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2019-03-25 14:17:43.218000+00:00 | 2024-01-08 21:58:31.089000+00:00 |
| x_mitre_version | 2.0 | 3.0 |
Iterable Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| aliases | RADIUM | |
| aliases | Raspberry Typhoon | |
| external_references | {'source_name': 'RADIUM', 'description': '(Citation: Microsoft Threat Actor Naming July 2023)'} | |
| external_references | {'source_name': 'Raspberry Typhoon', 'description': '(Citation: Microsoft Threat Actor Naming July 2023)'} | |
| external_references | {'source_name': 'Microsoft Threat Actor Naming July 2023', 'description': 'Microsoft . (2023, July 12). How Microsoft names threat actors. Retrieved November 17, 2023.', 'url': 'https://learn.microsoft.com/en-us/microsoft-365/security/intelligence/microsoft-threat-actor-naming?view=o365-worldwide'} |
| Modified Description View changes side-by-side |
|---|
| [Lazarus Group](https://attack.mitre.org/groups/G0032) is a North Korean state-sponsored cyber threat group that has been attributed to the Reconnaissance General Bureau.(Citation: US-CERT HIDDEN COBRA June 2017)(Citation: Treasury North Korean Cyber Groups September 2019) The group has been active since at least 2009 and was reportedly responsible for the November 2014 destructive wiper attack against Sony Pictures Entertainment as part of a campaign named Operation Blockbuster by Novetta. Malware used by [Lazarus Group](https://attack.mitre.org/groups/G0032) correlates to other reported campaigns, including Operation Flame, Operation 1Mission, Operation Troy, DarkSeoul, and Ten Days of Rain. (Citation: Rain.(Citation: Novetta Blockbuster) North Korean group definitions are known to have significant overlap, and some security researchers report all North Korean state-sponsored cyber activity under the name [Lazarus Group](https://attack.mitre.org/groups/G0032) instead of tracking clusters or subgroups, such as [Andariel](https://attack.mitre.org/groups/G0138), [APT37](https://attack.mitre.org/groups/G0067), [APT38](https://attack.mitre.org/groups/G0082), and [Kimsuky](https://attack.mitre.org/groups/G0094). |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-03-30 19:01:41.451000+00:00 | 2024-04-11 16:06:34.699000+00:00 |
| description | [Lazarus Group](https://attack.mitre.org/groups/G0032) is a North Korean state-sponsored cyber threat group that has been attributed to the Reconnaissance General Bureau.(Citation: US-CERT HIDDEN COBRA June 2017)(Citation: Treasury North Korean Cyber Groups September 2019) The group has been active since at least 2009 and was reportedly responsible for the November 2014 destructive wiper attack against Sony Pictures Entertainment as part of a campaign named Operation Blockbuster by Novetta. Malware used by [Lazarus Group](https://attack.mitre.org/groups/G0032) correlates to other reported campaigns, including Operation Flame, Operation 1Mission, Operation Troy, DarkSeoul, and Ten Days of Rain. (Citation: Novetta Blockbuster) North Korean group definitions are known to have significant overlap, and some security researchers report all North Korean state-sponsored cyber activity under the name [Lazarus Group](https://attack.mitre.org/groups/G0032) instead of tracking clusters or subgroups, such as [Andariel](https://attack.mitre.org/groups/G0138), [APT37](https://attack.mitre.org/groups/G0067), [APT38](https://attack.mitre.org/groups/G0082), and [Kimsuky](https://attack.mitre.org/groups/G0094). | [Lazarus Group](https://attack.mitre.org/groups/G0032) is a North Korean state-sponsored cyber threat group that has been attributed to the Reconnaissance General Bureau.(Citation: US-CERT HIDDEN COBRA June 2017)(Citation: Treasury North Korean Cyber Groups September 2019) The group has been active since at least 2009 and was reportedly responsible for the November 2014 destructive wiper attack against Sony Pictures Entertainment as part of a campaign named Operation Blockbuster by Novetta. Malware used by [Lazarus Group](https://attack.mitre.org/groups/G0032) correlates to other reported campaigns, including Operation Flame, Operation 1Mission, Operation Troy, DarkSeoul, and Ten Days of Rain.(Citation: Novetta Blockbuster) North Korean group definitions are known to have significant overlap, and some security researchers report all North Korean state-sponsored cyber activity under the name [Lazarus Group](https://attack.mitre.org/groups/G0032) instead of tracking clusters or subgroups, such as [Andariel](https://attack.mitre.org/groups/G0138), [APT37](https://attack.mitre.org/groups/G0067), [APT38](https://attack.mitre.org/groups/G0082), and [Kimsuky](https://attack.mitre.org/groups/G0094). |
| x_mitre_attack_spec_version | 3.1.0 | 3.2.0 |
| x_mitre_version | 3.2 | 4.0 |
| x_mitre_contributors[1] | Dragos Threat Intelligence | Dragos Threat Intelligence |
Iterable Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| aliases | Diamond Sleet | |
| external_references | {'source_name': 'Diamond Sleet', 'description': '(Citation: Microsoft Threat Actor Naming July 2023)'} | |
| external_references | {'source_name': 'Microsoft Threat Actor Naming July 2023', 'description': 'Microsoft . (2023, July 12). How Microsoft names threat actors. Retrieved November 17, 2023.', 'url': 'https://learn.microsoft.com/en-us/microsoft-365/security/intelligence/microsoft-threat-actor-naming?view=o365-worldwide'} |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-10-06 14:13:06.011000+00:00 | 2024-04-06 19:05:38.712000+00:00 |
| x_mitre_version | 3.1 | 4.0 |
Iterable Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| aliases | Seashell Blizzard | |
| aliases | FROZENBARENTS | |
| external_references | {'source_name': 'FROZENBARENTS', 'description': '(Citation: Leonard TAG 2023)'} | |
| external_references | {'source_name': 'Seashell Blizzard', 'description': '(Citation: Microsoft Threat Actor Naming July 2023)'} | |
| external_references | {'source_name': 'Leonard TAG 2023', 'description': 'Billy Leonard. (2023, April 19). Ukraine remains Russia’s biggest cyber focus in 2023. Retrieved March 1, 2024.', 'url': 'https://blog.google/threat-analysis-group/ukraine-remains-russias-biggest-cyber-focus-in-2023/'} | |
| external_references | {'source_name': 'Microsoft Threat Actor Naming July 2023', 'description': 'Microsoft . (2023, July 12). How Microsoft names threat actors. Retrieved November 17, 2023.', 'url': 'https://learn.microsoft.com/en-us/microsoft-365/security/intelligence/microsoft-threat-actor-naming?view=o365-worldwide'} |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-10-01 02:45:48.973000+00:00 | 2024-01-08 20:40:31.822000+00:00 |
| x_mitre_version | 3.2 | 4.0 |
Iterable Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| aliases | Ghost Blizzard | |
| aliases | BROMINE | |
| external_references | {'source_name': 'Ghost Blizzard', 'description': '(Citation: Microsoft Threat Actor Naming July 2023)'} | |
| external_references | {'source_name': 'BROMINE', 'description': '(Citation: Microsoft Threat Actor Naming July 2023)'} | |
| external_references | {'source_name': 'Microsoft Threat Actor Naming July 2023', 'description': 'Microsoft . (2023, July 12). How Microsoft names threat actors. Retrieved November 17, 2023.', 'url': 'https://learn.microsoft.com/en-us/microsoft-365/security/intelligence/microsoft-threat-actor-naming?view=o365-worldwide'} |
| Description |
|---|
FIN6 is a cyber crime group that has stolen payment card data and sold it for profit on underground marketplaces. This group has aggressively targeted and compromised point of sale (PoS) systems in the hospitality and retail sectors.[1][2] References:
|
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-03-22 03:50:17.471000+00:00 | 2024-01-08 22:13:27.588000+00:00 |
| x_mitre_attack_spec_version | 3.1.0 | 3.2.0 |
| x_mitre_version | 3.3 | 4.0 |
Iterable Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| aliases | TAAL | |
| aliases | Camouflage Tempest | |
| external_references | {'source_name': 'TAAL', 'description': '(Citation: Microsoft Threat Actor Naming July 2023)'} | |
| external_references | {'source_name': 'Camouflage Tempest', 'description': '(Citation: Microsoft Threat Actor Naming July 2023)'} | |
| external_references | {'source_name': 'Microsoft Threat Actor Naming July 2023', 'description': 'Microsoft . (2023, July 12). How Microsoft names threat actors. Retrieved November 17, 2023.', 'url': 'https://learn.microsoft.com/en-us/microsoft-365/security/intelligence/microsoft-threat-actor-naming?view=o365-worldwide'} |
| Description |
|---|
Group5 is a threat group with a suspected Iranian nexus, though this attribution is not definite. The group has targeted individuals connected to the Syrian opposition via spearphishing and watering holes, normally using Syrian and Iranian themes. Group5 has used two commonly available remote access tools (RATs), njRAT and NanoCore, as well as an Android RAT, DroidJack. [1] References: |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_attack_spec_version | 3.2.0 | |
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2020-03-30 19:07:39.812000+00:00 | 2024-04-11 02:23:59.598000+00:00 |
| x_mitre_version | 1.2 | 1.3 |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-03-23 15:06:31.019000+00:00 | 2024-04-11 00:47:44.925000+00:00 |
| x_mitre_attack_spec_version | 3.1.0 | 3.2.0 |
| x_mitre_version | 2.1 | 3.0 |
Iterable Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| aliases | BRONZE RIVERSIDE | |
| external_references | {'source_name': 'BRONZE RIVERSIDE', 'description': '(Citation: SecureWorks BRONZE STARLIGHT Ransomware Operations June 2022)'} | |
| external_references | {'source_name': 'SecureWorks BRONZE STARLIGHT Ransomware Operations June 2022', 'description': 'Counter Threat Unit Research Team . (2022, June 23). BRONZE STARLIGHT RANSOMWARE OPERATIONS USE HUI LOADER. Retrieved December 7, 2023.', 'url': 'https://www.secureworks.com/research/bronze-starlight-ransomware-operations-use-hui-loader'} |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-10-04 18:10:49.054000+00:00 | 2024-04-17 22:09:41.004000+00:00 |
| x_mitre_version | 3.0 | 4.0 |
Iterable Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| aliases | ELBRUS | |
| aliases | Sangria Tempest | |
| external_references | {'source_name': 'ELBRUS', 'description': '(Citation: Microsoft Ransomware as a Service)'} | |
| external_references | {'source_name': 'Sangria Tempest', 'description': '(Citation: Microsoft Threat Actor Naming July 2023)'} | |
| external_references | {'source_name': 'Microsoft Threat Actor Naming July 2023', 'description': 'Microsoft . (2023, July 12). How Microsoft names threat actors. Retrieved November 17, 2023.', 'url': 'https://learn.microsoft.com/en-us/microsoft-365/security/intelligence/microsoft-threat-actor-naming?view=o365-worldwide'} | |
| external_references | {'source_name': 'Microsoft Ransomware as a Service', 'description': 'Microsoft. (2022, May 9). Ransomware as a service: Understanding the cybercrime gig economy and how to protect yourself. Retrieved March 10, 2023.', 'url': 'https://www.microsoft.com/en-us/security/blog/2022/05/09/ransomware-as-a-service-understanding-the-cybercrime-gig-economy-and-how-to-protect-yourself/'} |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-03-22 04:29:39.915000+00:00 | 2023-12-04 18:11:02.073000+00:00 |
| x_mitre_attack_spec_version | 3.1.0 | 3.2.0 |
| x_mitre_version | 2.1 | 3.0 |
Iterable Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| aliases | Aqua Blizzard | |
| external_references | {'source_name': 'Aqua Blizzard', 'description': '(Citation: Microsoft Threat Actor Naming July 2023)'} | |
| external_references | {'source_name': 'Microsoft Threat Actor Naming July 2023', 'description': 'Microsoft . (2023, July 12). How Microsoft names threat actors. Retrieved November 17, 2023.', 'url': 'https://learn.microsoft.com/en-us/microsoft-365/security/intelligence/microsoft-threat-actor-naming?view=o365-worldwide'} |
| Modified Description View changes side-by-side |
|---|
| [OilRig](https://attack.mitre.org/groups/G0049) is a suspected Iranian threat group that has targeted Middle Eastern and international victims since at least 2014. The group has targeted a variety of sectors, including financial, government, energy, chemical, and telecommunications. It appears the group carries out supply chain attacks, leveraging the trust relationship between organizations to attack their primary targets. FireEye assesses that the The group works on behalf of the Iranian government based on infrastructure details that contain references to Iran, use of Iranian infrastructure, and targeting that aligns with nation-state interests.(Citation: FireEye APT34 Dec 2017)(Citation: Palo Alto OilRig April 2017)(Citation: ClearSky OilRig Jan 2017)(Citation: Palo Alto OilRig May 2016)(Citation: Palo Alto OilRig Oct 2016)(Citation: Unit42 OilRig Playbook 2023)(Citation: FireEye APT34 Dec 2017)(Citation: Unit 42 QUADAGENT July 2018) |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-02-06 20:58:52.317000+00:00 | 2024-04-11 16:06:34.698000+00:00 |
| description | [OilRig](https://attack.mitre.org/groups/G0049) is a suspected Iranian threat group that has targeted Middle Eastern and international victims since at least 2014. The group has targeted a variety of sectors, including financial, government, energy, chemical, and telecommunications. It appears the group carries out supply chain attacks, leveraging the trust relationship between organizations to attack their primary targets. FireEye assesses that the group works on behalf of the Iranian government based on infrastructure details that contain references to Iran, use of Iranian infrastructure, and targeting that aligns with nation-state interests.(Citation: Palo Alto OilRig April 2017)(Citation: ClearSky OilRig Jan 2017)(Citation: Palo Alto OilRig May 2016)(Citation: Palo Alto OilRig Oct 2016)(Citation: Unit42 OilRig Playbook 2023)(Citation: FireEye APT34 Dec 2017)(Citation: Unit 42 QUADAGENT July 2018) | [OilRig](https://attack.mitre.org/groups/G0049) is a suspected Iranian threat group that has targeted Middle Eastern and international victims since at least 2014. The group has targeted a variety of sectors, including financial, government, energy, chemical, and telecommunications. It appears the group carries out supply chain attacks, leveraging the trust relationship between organizations to attack their primary targets. The group works on behalf of the Iranian government based on infrastructure details that contain references to Iran, use of Iranian infrastructure, and targeting that aligns with nation-state interests.(Citation: FireEye APT34 Dec 2017)(Citation: Palo Alto OilRig April 2017)(Citation: ClearSky OilRig Jan 2017)(Citation: Palo Alto OilRig May 2016)(Citation: Palo Alto OilRig Oct 2016)(Citation: Unit42 OilRig Playbook 2023)(Citation: Unit 42 QUADAGENT July 2018) |
| x_mitre_attack_spec_version | 3.1.0 | 3.2.0 |
| x_mitre_version | 3.1 | 4.0 |
| x_mitre_contributors[2] | Dragos Threat Intelligence | Dragos Threat Intelligence |
Iterable Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| aliases | Hazel Sandstorm | |
| aliases | EUROPIUM | |
| external_references | {'source_name': 'Hazel Sandstorm', 'description': '(Citation: Microsoft Threat Actor Naming July 2023)'} | |
| external_references | {'source_name': 'EUROPIUM', 'description': '(Citation: Microsoft Threat Actor Naming July 2023)'} | |
| external_references | {'source_name': 'Microsoft Threat Actor Naming July 2023', 'description': 'Microsoft . (2023, July 12). How Microsoft names threat actors. Retrieved November 17, 2023.', 'url': 'https://learn.microsoft.com/en-us/microsoft-365/security/intelligence/microsoft-threat-actor-naming?view=o365-worldwide'} |
| Description |
|---|
APT32 is a suspected Vietnam-based threat group that has been active since at least 2014. The group has targeted multiple private sector industries as well as foreign governments, dissidents, and journalists with a strong focus on Southeast Asian countries like Vietnam, the Philippines, Laos, and Cambodia. They have extensively used strategic web compromises to compromise victims.[1][2][3] References:
|
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-10-12 21:15:24.393000+00:00 | 2024-04-17 22:07:49.430000+00:00 |
| x_mitre_version | 2.7 | 3.0 |
Iterable Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| aliases | Canvas Cyclone | |
| aliases | BISMUTH | |
| external_references | {'source_name': 'Canvas Cyclone', 'description': '(Citation: Microsoft Threat Actor Naming July 2023)'} | |
| external_references | {'source_name': 'BISMUTH', 'description': '(Citation: Microsoft Threat Actor Naming July 2023)'} | |
| external_references | {'source_name': 'Microsoft Threat Actor Naming July 2023', 'description': 'Microsoft . (2023, July 12). How Microsoft names threat actors. Retrieved November 17, 2023.', 'url': 'https://learn.microsoft.com/en-us/microsoft-365/security/intelligence/microsoft-threat-actor-naming?view=o365-worldwide'} |
| Description |
|---|
PROMETHIUM is an activity group focused on espionage that has been active since at least 2012. The group has conducted operations globally with a heavy emphasis on Turkish targets. PROMETHIUM has demonstrated similarity to another activity group called NEODYMIUM due to overlapping victim and campaign characteristics.[1][2][3] References:
|
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_attack_spec_version | 3.2.0 | |
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2020-10-22 18:12:48.893000+00:00 | 2024-04-19 19:35:15.637000+00:00 |
| x_mitre_version | 2.0 | 2.1 |
| Description |
|---|
Magic Hound is an Iranian-sponsored threat group that conducts long term, resource-intensive cyber espionage operations, likely on behalf of the Islamic Revolutionary Guard Corps. They have targeted European, U.S., and Middle Eastern government and military personnel, academics, journalists, and organizations such as the World Health Organization (WHO), via complex social engineering campaigns since at least 2014.[1][2][3][4][5] References:
|
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-09-11 20:43:14.739000+00:00 | 2024-01-08 21:54:31.501000+00:00 |
| x_mitre_attack_spec_version | 3.1.0 | 3.2.0 |
| x_mitre_version | 5.2 | 6.0 |
Iterable Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| aliases | Mint Sandstorm | |
| external_references | {'source_name': 'Mint Sandstorm', 'description': '(Citation: Microsoft Threat Actor Naming July 2023)'} | |
| external_references | {'source_name': 'Microsoft Threat Actor Naming July 2023', 'description': 'Microsoft . (2023, July 12). How Microsoft names threat actors. Retrieved November 17, 2023.', 'url': 'https://learn.microsoft.com/en-us/microsoft-365/security/intelligence/microsoft-threat-actor-naming?view=o365-worldwide'} |
| Modified Description View changes side-by-side |
|---|
| [APT33](https://attack.mitre.org/groups/G0064) is a suspected Iranian threat group that has carried out operations since at least 2013. The group has targeted organizations across multiple industries in the United States, Saudi Arabia, and South Korea, with a particular interest in the aviation and energy sectors. (Citation: sectors.(Citation: FireEye APT33 Sept 2017) (Citation: 2017)(Citation: FireEye APT33 Webinar Sept 2017) |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-03-08 22:07:25.123000+00:00 | 2024-04-11 16:06:34.700000+00:00 |
| description | [APT33](https://attack.mitre.org/groups/G0064) is a suspected Iranian threat group that has carried out operations since at least 2013. The group has targeted organizations across multiple industries in the United States, Saudi Arabia, and South Korea, with a particular interest in the aviation and energy sectors. (Citation: FireEye APT33 Sept 2017) (Citation: FireEye APT33 Webinar Sept 2017) | [APT33](https://attack.mitre.org/groups/G0064) is a suspected Iranian threat group that has carried out operations since at least 2013. The group has targeted organizations across multiple industries in the United States, Saudi Arabia, and South Korea, with a particular interest in the aviation and energy sectors.(Citation: FireEye APT33 Sept 2017)(Citation: FireEye APT33 Webinar Sept 2017) |
| x_mitre_attack_spec_version | 3.1.0 | 3.2.0 |
| x_mitre_version | 1.4 | 2.0 |
| x_mitre_contributors[0] | Dragos Threat Intelligence | Dragos Threat Intelligence |
Iterable Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| aliases | Peach Sandstorm | |
| external_references | {'source_name': 'Peach Sandstorm', 'description': '(Citation: Microsoft Threat Actor Naming July 2023)'} | |
| external_references | {'source_name': 'Microsoft Threat Actor Naming July 2023', 'description': 'Microsoft . (2023, July 12). How Microsoft names threat actors. Retrieved November 17, 2023.', 'url': 'https://learn.microsoft.com/en-us/microsoft-365/security/intelligence/microsoft-threat-actor-naming?view=o365-worldwide'} |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2022-04-15 15:15:51.198000+00:00 | 2024-01-08 20:33:16.460000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 3.0 | 4.0 |
Iterable Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| aliases | Gingham Typhoon | |
| external_references | {'source_name': 'Gingham Typhoon', 'description': '(Citation: Microsoft Threat Actor Naming July 2023)'} | |
| external_references | {'source_name': 'Microsoft Threat Actor Naming July 2023', 'description': 'Microsoft . (2023, July 12). How Microsoft names threat actors. Retrieved November 17, 2023.', 'url': 'https://learn.microsoft.com/en-us/microsoft-365/security/intelligence/microsoft-threat-actor-naming?view=o365-worldwide'} |
| Description |
|---|
Elderwood is a suspected Chinese cyber espionage group that was reportedly responsible for the 2009 Google intrusion known as Operation Aurora. [1] The group has targeted defense organizations, supply chain manufacturers, human rights and nongovernmental organizations (NGOs), and IT service providers. [2] [3] References:
|
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_attack_spec_version | 3.2.0 | |
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2021-03-02 22:40:11.097000+00:00 | 2024-04-11 02:36:24.044000+00:00 |
| x_mitre_version | 1.2 | 1.3 |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-03-22 04:59:16.032000+00:00 | 2024-04-17 16:48:06.958000+00:00 |
| x_mitre_attack_spec_version | 3.1.0 | 3.2.0 |
| x_mitre_version | 4.1 | 5.0 |
Iterable Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| aliases | Mango Sandstorm | |
| aliases | TA450 | |
| external_references | {'source_name': 'Mango Sandstorm', 'description': '(Citation: Microsoft Threat Actor Naming July 2023)'} | |
| external_references | {'source_name': 'TA450', 'description': '(Citation: Proofpoint TA450 Phishing March 2024)'} | |
| external_references | {'source_name': 'Microsoft Threat Actor Naming July 2023', 'description': 'Microsoft . (2023, July 12). How Microsoft names threat actors. Retrieved November 17, 2023.', 'url': 'https://learn.microsoft.com/en-us/microsoft-365/security/intelligence/microsoft-threat-actor-naming?view=o365-worldwide'} | |
| external_references | {'source_name': 'Proofpoint TA450 Phishing March 2024', 'description': 'Miller, J. et al. (2024, March 21). Security Brief: TA450 Uses Embedded Links in PDF Attachments in Latest Campaign. Retrieved March 27, 2024.', 'url': 'https://www.proofpoint.com/us/blog/threat-insight/security-brief-ta450-uses-embedded-links-pdf-attachments-latest-campaign'} |
| Description |
|---|
Dark Caracal is threat group that has been attributed to the Lebanese General Directorate of General Security (GDGS) and has operated since at least 2012. [1] References: |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_attack_spec_version | 3.2.0 | |
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2021-10-11 19:08:18.503000+00:00 | 2024-04-11 02:42:07.325000+00:00 |
| x_mitre_version | 1.3 | 1.4 |
| Modified Description View changes side-by-side |
|---|
| [Orangeworm](https://attack.mitre.org/groups/G0071) is a group that has targeted organizations in the healthcare sector in the United States, Europe, and Asia since at least 2015, likely for the purpose of corporate espionage.(Citation: Symantec Orangeworm April 2018) Reverse engineering of [Kwampirs](https://attack.mitre.org/software/S0236), directly associated with [Orangeworm](https://attack.mitre.org/groups/G0071) activity, indicates significant functional and development overlaps with [Shamoon](https://attack.mitre.org/software/S0140).(Citation: Cylera Kwampirs 2022) |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_attack_spec_version | 3.2.0 | |
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2021-10-26 22:29:09.327000+00:00 | 2024-04-10 21:33:28.444000+00:00 |
| description | [Orangeworm](https://attack.mitre.org/groups/G0071) is a group that has targeted organizations in the healthcare sector in the United States, Europe, and Asia since at least 2015, likely for the purpose of corporate espionage.(Citation: Symantec Orangeworm April 2018) | [Orangeworm](https://attack.mitre.org/groups/G0071) is a group that has targeted organizations in the healthcare sector in the United States, Europe, and Asia since at least 2015, likely for the purpose of corporate espionage.(Citation: Symantec Orangeworm April 2018) Reverse engineering of [Kwampirs](https://attack.mitre.org/software/S0236), directly associated with [Orangeworm](https://attack.mitre.org/groups/G0071) activity, indicates significant functional and development overlaps with [Shamoon](https://attack.mitre.org/software/S0140).(Citation: Cylera Kwampirs 2022) |
| x_mitre_version | 1.1 | 2.0 |
Iterable Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| external_references | {'source_name': 'Cylera Kwampirs 2022', 'description': 'Pablo Rincón Crespo. (2022, January). The link between Kwampirs (Orangeworm) and Shamoon APTs. Retrieved February 8, 2024.', 'url': 'https://resources.cylera.com/hubfs/Cylera%20Labs/Cylera%20Labs%20Kwampirs%20Shamoon%20Technical%20Report.pdf'} |
| Description |
|---|
APT19 is a Chinese-based threat group that has targeted a variety of industries, including defense, finance, energy, pharmaceutical, telecommunications, high tech, education, manufacturing, and legal services. In 2017, a phishing campaign was used to target seven law and investment firms. [1] Some analysts track APT19 and Deep Panda as the same group, but it is unclear from open source information if the groups are the same. [2] [3] [4] References:
|
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-03-21 20:44:02.443000+00:00 | 2024-04-11 03:03:02.576000+00:00 |
| x_mitre_attack_spec_version | 3.1.0 | 3.2.0 |
| x_mitre_version | 1.5 | 1.6 |
| Description |
|---|
Rancor is a threat group that has led targeted campaigns against the South East Asia region. Rancor uses politically-motivated lures to entice victims to open malicious documents. [1] References: |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_attack_spec_version | 3.2.0 | |
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2020-03-30 19:15:49.217000+00:00 | 2024-02-09 19:30:38.407000+00:00 |
| x_mitre_version | 1.2 | 1.3 |
| Description |
|---|
Tropic Trooper is an unaffiliated threat group that has led targeted campaigns against targets in Taiwan, the Philippines, and Hong Kong. Tropic Trooper focuses on targeting government, healthcare, transportation, and high-tech industries and has been active since 2011.[1][2][3] References:
|
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_attack_spec_version | 3.2.0 | |
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2021-04-26 14:15:15.610000+00:00 | 2024-04-18 18:24:29.185000+00:00 |
| x_mitre_version | 1.4 | 1.5 |
Iterable Item Removed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_contributors | Bart Parys |
| Modified Description View changes side-by-side |
|---|
| [APT38](https://attack.mitre.org/groups/G0082) is a North Korean state-sponsored threat group that specializes in financial cyber operations; it has been attributed to the Reconnaissance General Bureau.(Citation: CISA AA20-239A BeagleBoyz August 2020) Active since at least 2014, [APT38](https://attack.mitre.org/groups/G0082) has targeted banks, financial institutions, casinos, cryptocurrency exchanges, SWIFT system endpoints, and ATMs in at least 38 countries worldwide. Significant operations include the 2016 Bank of Bangladesh heist, during which [APT38](https://attack.mitre.org/groups/G0082) stole $81 million, as well as attacks against Bancomext (2018) (Citation: FireEye APT38 Oct 2018) and Banco de Chile (2018); (Citation: FireEye APT38 Oct 2018); some of their attacks have been destructive.(Citation: CISA AA20-239A BeagleBoyz August 2020)(Citation: FireEye APT38 Oct 2018)(Citation: DOJ North Korea Indictment Feb 2021)(Citation: Kaspersky Lazarus Under The Hood Blog 2017) North Korean group definitions are known to have significant overlap, and some security researchers report all North Korean state-sponsored cyber activity under the name [Lazarus Group](https://attack.mitre.org/groups/G0032) instead of tracking clusters or subgroups. |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_attack_spec_version | 3.2.0 | |
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2022-01-18 17:13:14.610000+00:00 | 2024-04-17 22:08:29.146000+00:00 |
| description | [APT38](https://attack.mitre.org/groups/G0082) is a North Korean state-sponsored threat group that specializes in financial cyber operations; it has been attributed to the Reconnaissance General Bureau.(Citation: CISA AA20-239A BeagleBoyz August 2020) Active since at least 2014, [APT38](https://attack.mitre.org/groups/G0082) has targeted banks, financial institutions, casinos, cryptocurrency exchanges, SWIFT system endpoints, and ATMs in at least 38 countries worldwide. Significant operations include the 2016 Bank of Bangladesh heist, during which [APT38](https://attack.mitre.org/groups/G0082) stole $81 million, as well as attacks against Bancomext (2018) and Banco de Chile (2018); some of their attacks have been destructive.(Citation: CISA AA20-239A BeagleBoyz August 2020)(Citation: FireEye APT38 Oct 2018)(Citation: DOJ North Korea Indictment Feb 2021)(Citation: Kaspersky Lazarus Under The Hood Blog 2017) North Korean group definitions are known to have significant overlap, and some security researchers report all North Korean state-sponsored cyber activity under the name [Lazarus Group](https://attack.mitre.org/groups/G0032) instead of tracking clusters or subgroups. | [APT38](https://attack.mitre.org/groups/G0082) is a North Korean state-sponsored threat group that specializes in financial cyber operations; it has been attributed to the Reconnaissance General Bureau.(Citation: CISA AA20-239A BeagleBoyz August 2020) Active since at least 2014, [APT38](https://attack.mitre.org/groups/G0082) has targeted banks, financial institutions, casinos, cryptocurrency exchanges, SWIFT system endpoints, and ATMs in at least 38 countries worldwide. Significant operations include the 2016 Bank of Bangladesh heist, during which [APT38](https://attack.mitre.org/groups/G0082) stole $81 million, as well as attacks against Bancomext (Citation: FireEye APT38 Oct 2018) and Banco de Chile (Citation: FireEye APT38 Oct 2018); some of their attacks have been destructive.(Citation: CISA AA20-239A BeagleBoyz August 2020)(Citation: FireEye APT38 Oct 2018)(Citation: DOJ North Korea Indictment Feb 2021)(Citation: Kaspersky Lazarus Under The Hood Blog 2017) North Korean group definitions are known to have significant overlap, and some security researchers report all North Korean state-sponsored cyber activity under the name [Lazarus Group](https://attack.mitre.org/groups/G0032) instead of tracking clusters or subgroups. |
| x_mitre_version | 2.0 | 3.0 |
Iterable Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| aliases | Sapphire Sleet | |
| aliases | COPERNICIUM | |
| external_references | {'source_name': 'Sapphire Sleet', 'description': '(Citation: Microsoft Threat Actor Naming July 2023)'} | |
| external_references | {'source_name': 'COPERNICIUM', 'description': '(Citation: Microsoft Threat Actor Naming July 2023)'} | |
| external_references | {'source_name': 'Microsoft Threat Actor Naming July 2023', 'description': 'Microsoft . (2023, July 12). How Microsoft names threat actors. Retrieved November 17, 2023.', 'url': 'https://learn.microsoft.com/en-us/microsoft-365/security/intelligence/microsoft-threat-actor-naming?view=o365-worldwide'} |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2022-09-02 18:03:29.024000+00:00 | 2024-04-11 02:59:52.392000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 3.1 | 3.2 |
| Description |
|---|
TEMP.Veles is a Russia-based threat group that has targeted critical infrastructure. The group has been observed utilizing TRITON, a malware framework designed to manipulate industrial safety systems.[1][2][3] References:
|
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2022-11-30 22:46:40.135000+00:00 | 2024-04-17 16:13:43.697000+00:00 |
| x_mitre_attack_spec_version | 3.1.0 | 3.2.0 |
| x_mitre_version | 1.3 | 1.4 |
| x_mitre_contributors[0] | Dragos Threat Intelligence | Dragos Threat Intelligence |
| Description |
|---|
TA505 is a cyber criminal group that has been active since at least 2014. TA505 is known for frequently changing malware, driving global trends in criminal malware distribution, and ransomware campaigns involving Clop.[1][2][3][4][5] References:
|
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-03-22 05:38:20.381000+00:00 | 2024-04-10 22:37:02.592000+00:00 |
| x_mitre_attack_spec_version | 3.1.0 | 3.2.0 |
| x_mitre_version | 2.1 | 3.0 |
Iterable Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| aliases | Spandex Tempest | |
| aliases | CHIMBORAZO | |
| external_references | {'source_name': 'Spandex Tempest', 'description': '(Citation: Microsoft Threat Actor Naming July 2023)'} | |
| external_references | {'source_name': 'CHIMBORAZO', 'description': '(Citation: Microsoft Threat Actor Naming July 2023)'} | |
| external_references | {'source_name': 'Microsoft Threat Actor Naming July 2023', 'description': 'Microsoft . (2023, July 12). How Microsoft names threat actors. Retrieved November 17, 2023.', 'url': 'https://learn.microsoft.com/en-us/microsoft-365/security/intelligence/microsoft-threat-actor-naming?view=o365-worldwide'} |
| Modified Description View changes side-by-side |
|---|
| [GALLIUM](https://attack.mitre.org/groups/G0093) is a cyberespionage group that has been active since at least 2012, primarily targeting telecommunications companies, financial institutions, and government entities in Afghanistan, Australia, Belgium, Cambodia, Malaysia, Mozambique, the Philippines, Russia, and Vietnam. This group is particularly known for launching Operation Soft Cell, a long-term campaign targeting telecommunications providers.(Citation: Cybereason Soft Cell June 2019) Security researchers have identified [GALLIUM](https://attack.mitre.org/groups/G0093) as a likely Chinese state-sponsored group, based in part on tools used and TTPs commonly associated with Chinese threat actors.(Citation: Cybereason Soft Cell June 2019)(Citation: Microsoft GALLIUM December 2019)(Citation: Unit 42 PingPull Jun 2022) |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2022-08-12 21:26:22.303000+00:00 | 2024-04-17 22:10:27.139000+00:00 |
| description | [GALLIUM](https://attack.mitre.org/groups/G0093) is a cyberespionage group that has been active since at least 2012, primarily targeting telecommunications companies, financial institutions, and government entities in Afghanistan, Australia, Belgium, Cambodia, Malaysia, Mozambique, the Philippines, Russia, and Vietnam. Security researchers have identified [GALLIUM](https://attack.mitre.org/groups/G0093) as a likely Chinese state-sponsored group, based in part on tools used and TTPs commonly associated with Chinese threat actors.(Citation: Cybereason Soft Cell June 2019)(Citation: Microsoft GALLIUM December 2019)(Citation: Unit 42 PingPull Jun 2022) | [GALLIUM](https://attack.mitre.org/groups/G0093) is a cyberespionage group that has been active since at least 2012, primarily targeting telecommunications companies, financial institutions, and government entities in Afghanistan, Australia, Belgium, Cambodia, Malaysia, Mozambique, the Philippines, Russia, and Vietnam. This group is particularly known for launching Operation Soft Cell, a long-term campaign targeting telecommunications providers.(Citation: Cybereason Soft Cell June 2019) Security researchers have identified [GALLIUM](https://attack.mitre.org/groups/G0093) as a likely Chinese state-sponsored group, based in part on tools used and TTPs commonly associated with Chinese threat actors.(Citation: Cybereason Soft Cell June 2019)(Citation: Microsoft GALLIUM December 2019)(Citation: Unit 42 PingPull Jun 2022) |
| external_references[1]['source_name'] | Operation Soft Cell | Granite Typhoon |
| external_references[1]['description'] | (Citation: Cybereason Soft Cell June 2019) | (Citation: Microsoft Threat Actor Naming July 2023) |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 3.0 | 4.0 |
| aliases[1] | Operation Soft Cell | Granite Typhoon |
Iterable Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| external_references | {'source_name': 'Microsoft Threat Actor Naming July 2023', 'description': 'Microsoft . (2023, July 12). How Microsoft names threat actors. Retrieved November 17, 2023.', 'url': 'https://learn.microsoft.com/en-us/microsoft-365/security/intelligence/microsoft-threat-actor-naming?view=o365-worldwide'} |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-09-27 20:08:25.814000+00:00 | 2024-04-17 22:11:50.321000+00:00 |
| external_references[1]['source_name'] | Thallium | THALLIUM |
| external_references[3]['source_name'] | STOLEN PENCIL | Emerald Sleet |
| external_references[3]['description'] | (Citation: Netscout Stolen Pencil Dec 2018) | (Citation: Microsoft Threat Actor Naming July 2023) |
| x_mitre_version | 3.1 | 4.0 |
Iterable Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| aliases | Emerald Sleet | |
| aliases | THALLIUM | |
| external_references | {'source_name': 'Microsoft Threat Actor Naming July 2023', 'description': 'Microsoft . (2023, July 12). How Microsoft names threat actors. Retrieved November 17, 2023.', 'url': 'https://learn.microsoft.com/en-us/microsoft-365/security/intelligence/microsoft-threat-actor-naming?view=o365-worldwide'} |
Iterable Item Removed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| aliases | STOLEN PENCIL | |
| aliases | Thallium |
| Description |
|---|
APT41 is a threat group that researchers have assessed as Chinese state-sponsored espionage group that also conducts financially-motivated operations. Active since at least 2012, APT41 has been observed targeting healthcare, telecom, technology, and video game industries in 14 countries. APT41 overlaps at least partially with public reporting on groups including BARIUM and Winnti Group.[1][2] References: |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-03-23 15:45:58.846000+00:00 | 2024-04-03 15:20:38.791000+00:00 |
| x_mitre_attack_spec_version | 3.1.0 | 3.2.0 |
| x_mitre_version | 3.1 | 4.0 |
Iterable Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| aliases | Brass Typhoon | |
| aliases | BARIUM | |
| external_references | {'source_name': 'Brass Typhoon', 'description': '(Citation: Microsoft Threat Actor Naming July 2023)'} | |
| external_references | {'source_name': 'BARIUM', 'description': '(Citation: Microsoft Threat Actor Naming July 2023)'} | |
| external_references | {'source_name': 'Microsoft Threat Actor Naming July 2023', 'description': 'Microsoft . (2023, July 12). How Microsoft names threat actors. Retrieved November 17, 2023.', 'url': 'https://learn.microsoft.com/en-us/microsoft-365/security/intelligence/microsoft-threat-actor-naming?view=o365-worldwide'} | |
| x_mitre_contributors | Nikita Rostovcev, Group-IB |
| Description |
|---|
Inception is a cyber espionage group active since at least 2014. The group has targeted multiple industries and governmental entities primarily in Russia, but has also been active in the United States and throughout Europe, Asia, Africa, and the Middle East.[1][2][3] References:
|
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_attack_spec_version | 3.2.0 | |
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2021-10-12 23:21:06.480000+00:00 | 2024-04-11 02:15:23.096000+00:00 |
| x_mitre_version | 1.1 | 1.2 |
| Description |
|---|
Wizard Spider is a Russia-based financially motivated threat group originally known for the creation and deployment of TrickBot since at least 2016. Wizard Spider possesses a diverse aresenal of tools and has conducted ransomware campaigns against a variety of organizations, ranging from major corporations to hospitals.[1][2][3] References:
|
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-09-12 14:35:52.920000+00:00 | 2024-04-03 20:21:34.872000+00:00 |
| external_references[7]['description'] | (Citation: Secureworks Gold Blackburn Mar 2022) | (Citation: Microsoft Threat Actor Naming July 2023) |
| x_mitre_attack_spec_version | 3.1.0 | 3.2.0 |
| x_mitre_version | 3.0 | 4.0 |
Iterable Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| aliases | DEV-0193 | |
| external_references | {'source_name': 'DEV-0193', 'description': '(Citation: Microsoft Threat Actor Naming July 2023)'} | |
| external_references | {'source_name': 'Microsoft Threat Actor Naming July 2023', 'description': 'Microsoft . (2023, July 12). How Microsoft names threat actors. Retrieved November 17, 2023.', 'url': 'https://learn.microsoft.com/en-us/microsoft-365/security/intelligence/microsoft-threat-actor-naming?view=o365-worldwide'} |
| Description |
|---|
Mofang is a likely China-based cyber espionage group, named for its frequent practice of imitating a victim's infrastructure. This adversary has been observed since at least May 2012 conducting focused attacks against government and critical infrastructure in Myanmar, as well as several other countries and sectors including military, automobile, and weapons industries.[1] References: |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_attack_spec_version | 3.2.0 | |
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2020-05-29 03:30:39.739000+00:00 | 2024-04-11 00:41:37.453000+00:00 |
| x_mitre_version | 1.0 | 1.1 |
| Description |
|---|
Whitefly is a cyber espionage group that has been operating since at least 2017. The group has targeted organizations based mostly in Singapore across a wide variety of sectors, and is primarily interested in stealing large amounts of sensitive information. The group has been linked to an attack against Singapore’s largest public health organization, SingHealth.[1] References: |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_attack_spec_version | 3.2.0 | |
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2021-10-12 21:43:24.133000+00:00 | 2024-04-10 20:43:09.698000+00:00 |
| x_mitre_version | 1.1 | 1.2 |
| Description |
|---|
Blue Mockingbird is a cluster of observed activity involving Monero cryptocurrency-mining payloads in dynamic-link library (DLL) form on Windows systems. The earliest observed Blue Mockingbird tools were created in December 2019.[1] References: |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_attack_spec_version | 3.2.0 | |
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2021-10-12 21:46:13.007000+00:00 | 2024-04-11 02:50:01.851000+00:00 |
| x_mitre_version | 1.1 | 1.2 |
| Description |
|---|
Fox Kitten is threat actor with a suspected nexus to the Iranian government that has been active since at least 2017 against entities in the Middle East, North Africa, Europe, Australia, and North America. Fox Kitten has targeted multiple industrial verticals including oil and gas, technology, government, defense, healthcare, manufacturing, and engineering.[1][2][3][4] References:
|
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-03-22 03:53:37.888000+00:00 | 2024-01-08 22:00:34.410000+00:00 |
| x_mitre_attack_spec_version | 3.1.0 | 3.2.0 |
| x_mitre_version | 1.1 | 2.0 |
Iterable Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| aliases | RUBIDIUM | |
| aliases | Lemon Sandstorm | |
| external_references | {'source_name': 'RUBIDIUM', 'description': '(Citation: Microsoft Threat Actor Naming July 2023)'} | |
| external_references | {'source_name': 'Lemon Sandstorm', 'description': '(Citation: Microsoft Threat Actor Naming July 2023)'} | |
| external_references | {'source_name': 'Microsoft Threat Actor Naming July 2023', 'description': 'Microsoft . (2023, July 12). How Microsoft names threat actors. Retrieved November 17, 2023.', 'url': 'https://learn.microsoft.com/en-us/microsoft-365/security/intelligence/microsoft-threat-actor-naming?view=o365-worldwide'} |
| Description |
|---|
Indrik Spider is a Russia-based cybercriminal group that has been active since at least 2014. Indrik Spider initially started with the Dridex banking Trojan, and then by 2017 they began running ransomware operations using BitPaymer, WastedLocker, and Hades ransomware. Following U.S. sanctions and an indictment in 2019, Indrik Spider changed their tactics and diversified their toolset.[1][2][3] References:
|
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-08-03 21:39:36.666000+00:00 | 2024-04-17 22:10:56.266000+00:00 |
| x_mitre_attack_spec_version | 3.1.0 | 3.2.0 |
| x_mitre_version | 3.0 | 4.0 |
Iterable Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| aliases | Manatee Tempest | |
| aliases | DEV-0243 | |
| external_references | {'source_name': 'Manatee Tempest', 'description': '(Citation: Microsoft Threat Actor Naming July 2023)'} | |
| external_references | {'source_name': 'DEV-0243', 'description': '(Citation: Microsoft Threat Actor Naming July 2023)'} | |
| external_references | {'source_name': 'Microsoft Threat Actor Naming July 2023', 'description': 'Microsoft . (2023, July 12). How Microsoft names threat actors. Retrieved November 17, 2023.', 'url': 'https://learn.microsoft.com/en-us/microsoft-365/security/intelligence/microsoft-threat-actor-naming?view=o365-worldwide'} |
| Description |
|---|
Sidewinder is a suspected Indian threat actor group that has been active since at least 2012. They have been observed targeting government, military, and business entities throughout Asia, primarily focusing on Pakistan, China, Nepal, and Afghanistan.[1][2][3] References:
|
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-03-22 05:31:54.382000+00:00 | 2024-04-11 00:07:05.918000+00:00 |
| x_mitre_attack_spec_version | 3.1.0 | 3.2.0 |
| x_mitre_version | 1.1 | 1.2 |
| Description |
|---|
HAFNIUM is a likely state-sponsored cyber espionage group operating out of China that has been active since at least January 2021. HAFNIUM primarily targets entities in the US across a number of industry sectors, including infectious disease researchers, law firms, higher education institutions, defense contractors, policy think tanks, and NGOs.[1][2] References: |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-04-10 21:54:46.756000+00:00 | 2024-01-08 20:45:37.568000+00:00 |
| x_mitre_attack_spec_version | 3.1.0 | 3.2.0 |
| x_mitre_version | 1.3 | 2.0 |
Iterable Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| aliases | Silk Typhoon | |
| external_references | {'source_name': 'Silk Typhoon', 'description': '(Citation: Microsoft Threat Actor Naming July 2023)'} | |
| external_references | {'source_name': 'Microsoft Threat Actor Naming July 2023', 'description': 'Microsoft . (2023, July 12). How Microsoft names threat actors. Retrieved November 17, 2023.', 'url': 'https://learn.microsoft.com/en-us/microsoft-365/security/intelligence/microsoft-threat-actor-naming?view=o365-worldwide'} |
| Description |
|---|
Higaisa is a threat group suspected to have South Korean origins. Higaisa has targeted government, public, and trade organizations in North Korea; however, they have also carried out attacks in China, Japan, Russia, Poland, and other nations. Higaisa was first disclosed in early 2019 but is assessed to have operated as early as 2009.[1][2][3] References:
|
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_attack_spec_version | 3.2.0 | |
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2021-04-22 02:12:43.892000+00:00 | 2024-04-11 02:19:20.934000+00:00 |
| x_mitre_version | 1.0 | 1.1 |
| Description |
|---|
ZIRCONIUM is a threat group operating out of China, active since at least 2017, that has targeted individuals associated with the 2020 US presidential election and prominent leaders in the international affairs community.[1][2] References: |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-03-22 22:10:43.732000+00:00 | 2024-01-08 22:16:18.643000+00:00 |
| x_mitre_attack_spec_version | 3.1.0 | 3.2.0 |
| x_mitre_version | 1.1 | 2.0 |
Iterable Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| aliases | Violet Typhoon | |
| external_references | {'source_name': 'Violet Typhoon', 'description': '(Citation: Microsoft Threat Actor Naming July 2023)'} | |
| external_references | {'source_name': 'Microsoft Threat Actor Naming July 2023', 'description': 'Microsoft . (2023, July 12). How Microsoft names threat actors. Retrieved November 17, 2023.', 'url': 'https://learn.microsoft.com/en-us/microsoft-365/security/intelligence/microsoft-threat-actor-naming?view=o365-worldwide'} |
| Description |
|---|
Transparent Tribe is a suspected Pakistan-based threat group that has been active since at least 2013, primarily targeting diplomatic, defense, and research organizations in India and Afghanistan.[1][2][3] References:
|
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2022-09-22 20:27:21.053000+00:00 | 2024-04-10 22:30:51.062000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.1 | 1.2 |
| Description |
|---|
Andariel is a North Korean state-sponsored threat group that has been active since at least 2009. Andariel has primarily focused its operations--which have included destructive attacks--against South Korean government agencies, military organizations, and a variety of domestic companies; they have also conducted cyber financial operations against ATMs, banks, and cryptocurrency exchanges. Andariel's notable activity includes Operation Black Mine, Operation GoldenAxe, and Campaign Rifle.[1][2][3][4][5] Andariel is considered a sub-set of Lazarus Group, and has been attributed to North Korea's Reconnaissance General Bureau.[6] North Korean group definitions are known to have significant overlap, and some security researchers report all North Korean state-sponsored cyber activity under the name Lazarus Group instead of tracking clusters or subgroups. References:
|
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2022-11-30 22:51:40.270000+00:00 | 2024-01-08 21:55:29.570000+00:00 |
| x_mitre_attack_spec_version | 3.1.0 | 3.2.0 |
| x_mitre_version | 1.0 | 2.0 |
Iterable Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| aliases | PLUTONIUM | |
| aliases | Onyx Sleet | |
| external_references | {'source_name': 'PLUTONIUM', 'description': '(Citation: Microsoft Threat Actor Naming July 2023)'} | |
| external_references | {'source_name': 'Onyx Sleet', 'description': '(Citation: Microsoft Threat Actor Naming July 2023)'} | |
| external_references | {'source_name': 'Microsoft Threat Actor Naming July 2023', 'description': 'Microsoft . (2023, July 12). How Microsoft names threat actors. Retrieved November 17, 2023.', 'url': 'https://learn.microsoft.com/en-us/microsoft-365/security/intelligence/microsoft-threat-actor-naming?view=o365-worldwide'} |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2022-10-19 21:35:03.147000+00:00 | 2024-04-10 22:34:04.070000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.2 | 1.3 |
| Description |
|---|
HEXANE is a cyber espionage threat group that has targeted oil & gas, telecommunications, aviation, and internet service provider organizations since at least 2017. Targeted companies have been located in the Middle East and Africa, including Israel, Saudi Arabia, Kuwait, Morocco, and Tunisia. HEXANE's TTPs appear similar to APT33 and OilRig but due to differences in victims and tools it is tracked as a separate entity.[1][2][3][4] References:
|
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-03-22 04:43:59.082000+00:00 | 2024-02-09 19:27:00.371000+00:00 |
| x_mitre_attack_spec_version | 3.1.0 | 3.2.0 |
| x_mitre_version | 2.1 | 2.2 |
| Modified Description View changes side-by-side |
|---|
| [BITTER](https://attack.mitre.org/groups/G1002) is a suspected South Asian cyber espionage threat group that has been active since at least 2013. [BITTER](https://attack.mitre.org/groups/G1002) has primarily targeted government, energy, and engineering organizations in Pakistan, China, Bangladesh, and Saudi Arabia.(Citation: Cisco Talos Bitter Bangladesh May 2022)(Citation: Forcepoint BITTER Pakistan Oct 2016) |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2022-06-01 21:20:18.113000+00:00 | 2024-04-11 02:52:27.131000+00:00 |
| description | [BITTER](https://attack.mitre.org/groups/G1002) is a suspected South Asian cyber espionage threat group that has been active since at least 2013. [BITTER](https://attack.mitre.org/groups/G1002) has primarily targeted government, energy, and engineering organizations in Pakistan, China, Bangladesh, and Saudi Arabia.(Citation: Cisco Talos Bitter Bangladesh May 2022)(Citation: Forcepoint BITTER Pakistan Oct 2016) | [BITTER](https://attack.mitre.org/groups/G1002) is a suspected South Asian cyber espionage threat group that has been active since at least 2013. [BITTER](https://attack.mitre.org/groups/G1002) has targeted government, energy, and engineering organizations in Pakistan, China, Bangladesh, and Saudi Arabia.(Citation: Cisco Talos Bitter Bangladesh May 2022)(Citation: Forcepoint BITTER Pakistan Oct 2016) |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.0 | 1.1 |
Iterable Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_domains | mobile-attack |
| Description |
|---|
LAPSUS$ is cyber criminal threat group that has been active since at least mid-2021. LAPSUS$ specializes in large-scale social engineering and extortion operations, including destructive attacks without the use of ransomware. The group has targeted organizations globally, including in the government, manufacturing, higher education, energy, healthcare, technology, telecommunications, and media sectors.[1][2][3] References:
|
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-10-20 17:06:10.335000+00:00 | 2024-01-11 21:51:11.405000+00:00 |
| x_mitre_version | 1.2 | 2.0 |
Iterable Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| aliases | Strawberry Tempest | |
| external_references | {'source_name': 'Strawberry Tempest', 'description': '(Citation: Microsoft Threat Actor Naming July 2023)'} | |
| external_references | {'source_name': 'Microsoft Threat Actor Naming July 2023', 'description': 'Microsoft . (2023, July 12). How Microsoft names threat actors. Retrieved November 17, 2023.', 'url': 'https://learn.microsoft.com/en-us/microsoft-365/security/intelligence/microsoft-threat-actor-naming?view=o365-worldwide'} |
| Description |
|---|
POLONIUM is a Lebanon-based group that has primarily targeted Israeli organizations, including critical manufacturing, information technology, and defense industry companies, since at least February 2022. Security researchers assess POLONIUM has coordinated their operations with multiple actors affiliated with Iran’s Ministry of Intelligence and Security (MOIS), based on victim overlap as well as common techniques and tooling.[1] References: |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2022-08-10 12:31:10.192000+00:00 | 2024-01-08 21:56:22.594000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.0 | 2.0 |
Iterable Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| aliases | Plaid Rain | |
| external_references | {'source_name': 'Plaid Rain', 'description': '(Citation: Microsoft Threat Actor Naming July 2023)'} | |
| external_references | {'source_name': 'Microsoft Threat Actor Naming July 2023', 'description': 'Microsoft . (2023, July 12). How Microsoft names threat actors. Retrieved November 17, 2023.', 'url': 'https://learn.microsoft.com/en-us/microsoft-365/security/intelligence/microsoft-threat-actor-naming?view=o365-worldwide'} |
| Description |
|---|
Earth Lusca is a suspected China-based cyber espionage group that has been active since at least April 2019. Earth Lusca has targeted organizations in Australia, China, Hong Kong, Mongolia, Nepal, the Philippines, Taiwan, Thailand, Vietnam, the United Arab Emirates, Nigeria, Germany, France, and the United States. Targets included government institutions, news media outlets, gambling companies, educational institutions, COVID-19 research organizations, telecommunications companies, religious movements banned in China, and cryptocurrency trading platforms; security researchers assess some Earth Lusca operations may be financially motivated.[1] Earth Lusca has used malware commonly used by other Chinese threat groups, including APT41 and the Winnti Group cluster, however security researchers assess Earth Lusca's techniques and infrastructure are separate.[1] References: |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2022-10-17 19:51:56.531000+00:00 | 2024-04-10 21:38:24.226000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.0 | 2.0 |
Iterable Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| aliases | Charcoal Typhoon | |
| aliases | CHROMIUM | |
| aliases | ControlX | |
| external_references | {'source_name': 'Charcoal Typhoon', 'description': '(Citation: Microsoft Threat Actor Naming July 2023)'} | |
| external_references | {'source_name': 'ControlX', 'description': '(Citation: Microsoft Threat Actor Naming July 2023)'} | |
| external_references | {'source_name': 'CHROMIUM', 'description': '(Citation: Microsoft Threat Actor Naming July 2023) (Citation: Recorded Future RedHotel August 2023)'} | |
| external_references | {'source_name': 'Recorded Future RedHotel August 2023', 'description': 'Insikt Group. (2023, August 8). RedHotel: A Prolific, Chinese State-Sponsored Group Operating at a Global Scale. Retrieved March 11, 2024.', 'url': 'https://go.recordedfuture.com/hubfs/reports/cta-2023-0808.pdf'} | |
| external_references | {'source_name': 'Microsoft Threat Actor Naming July 2023', 'description': 'Microsoft . (2023, July 12). How Microsoft names threat actors. Retrieved November 17, 2023.', 'url': 'https://learn.microsoft.com/en-us/microsoft-365/security/intelligence/microsoft-threat-actor-naming?view=o365-worldwide'} |
| Description |
|---|
Moses Staff is a suspected Iranian threat group that has primarily targeted Israeli companies since at least September 2021. Moses Staff openly stated their motivation in attacking Israeli companies is to cause damage by leaking stolen sensitive data and encrypting the victim's networks without a ransom demand.[1] Security researchers assess Moses Staff is politically motivated, and has targeted government, finance, travel, energy, manufacturing, and utility companies outside of Israel as well, including those in Italy, India, Germany, Chile, Turkey, the UAE, and the US.[2] References: |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2022-10-24 18:50:12.653000+00:00 | 2024-04-11 00:39:25.190000+00:00 |
| x_mitre_attack_spec_version | 3.0.0 | 3.2.0 |
| x_mitre_version | 1.0 | 2.0 |
Iterable Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| aliases | DEV-0500 | |
| aliases | Marigold Sandstorm | |
| external_references | {'source_name': 'DEV-0500', 'description': '(Citation: Microsoft Threat Actor Naming July 2023)'} | |
| external_references | {'source_name': 'Marigold Sandstorm', 'description': '(Citation: Microsoft Threat Actor Naming July 2023)'} | |
| external_references | {'source_name': 'Microsoft Threat Actor Naming July 2023', 'description': 'Microsoft . (2023, July 12). How Microsoft names threat actors. Retrieved November 17, 2023.', 'url': 'https://learn.microsoft.com/en-us/microsoft-365/security/intelligence/microsoft-threat-actor-naming?view=o365-worldwide'} |
| Description |
|---|
CURIUM is an Iranian threat group first reported in November 2021 that has invested in building a relationship with potential targets via social media over a period of months to establish trust and confidence before sending malware. Security researchers note CURIUM has demonstrated great patience and persistence by chatting with potential targets daily and sending benign files to help lower their security consciousness.[1] References: |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-04-12 13:21:41.276000+00:00 | 2024-04-17 22:09:00.876000+00:00 |
| x_mitre_attack_spec_version | 3.1.0 | 3.2.0 |
| x_mitre_version | 1.0 | 2.0 |
Iterable Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| aliases | Crimson Sandstorm | |
| aliases | TA456 | |
| aliases | Tortoise Shell | |
| external_references | {'source_name': 'Crimson Sandstorm', 'description': '(Citation: Microsoft Threat Actor Naming July 2023)'} | |
| external_references | {'source_name': 'Tortoise Shell', 'description': '(Citation: Microsoft Threat Actor Naming July 2023)'} | |
| external_references | {'source_name': 'TA456', 'description': '(Citation: Microsoft Threat Actor Naming July 2023)(Citation: Proofpoint TA456 Defense Contractor July 2021)'} | |
| external_references | {'source_name': 'Microsoft Threat Actor Naming July 2023', 'description': 'Microsoft . (2023, July 12). How Microsoft names threat actors. Retrieved November 17, 2023.', 'url': 'https://learn.microsoft.com/en-us/microsoft-365/security/intelligence/microsoft-threat-actor-naming?view=o365-worldwide'} | |
| external_references | {'source_name': 'Proofpoint TA456 Defense Contractor July 2021', 'description': 'Miller, J. et. al. (2021, July 28). I Knew You Were Trouble: TA456 Targets Defense Contractor with Alluring Social Media Persona. Retrieved March 11, 2024.', 'url': 'https://www.proofpoint.com/us/blog/threat-insight/i-knew-you-were-trouble-ta456-targets-defense-contractor-alluring-social-media'} |
| Description |
|---|
Metador is a suspected cyber espionage group that was first reported in September 2022. Metador has targeted a limited number of telecommunication companies, internet service providers, and universities in the Middle East and Africa. Security researchers named the group Metador based on the "I am meta" string in one of the group's malware samples and the expectation of Spanish-language responses from C2 servers.[1] References: |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-04-14 12:25:35.434000+00:00 | 2024-04-11 00:46:59.526000+00:00 |
| x_mitre_attack_spec_version | 3.1.0 | 3.2.0 |
| x_mitre_version | 1.0 | 1.1 |
| Modified Description View changes side-by-side |
|---|
| [Scattered Spider](https://attack.mitre.org/groups/G1015) is a native English-speaking cybercriminal group that has been active since at least 2022 targeting 2022.(Citation: CrowdStrike Scattered Spider Profile)(Citation: MSTIC Octo Tempest Operations October 2023) The group initially targeted customer relationship management and business-process outsourcing (BPO) firms as well as telecommunications and technology companies. Beginning in 2023, [Scattered Spider](https://attack.mitre.org/groups/G1015) expanded its operations to compromise victims in the gaming, hospitality, retail, MSP, manufacturing, and financial sectors.(Citation: MSTIC Octo Tempest Operations October 2023) During campaigns campaigns, [Scattered Spider](https://attack.mitre.org/groups/G1015) has leveraged targeted social-engineering techniques and techniques, attempted to bypass popular endpoint security tools.(Citation: CrowdStrike tools, and more recently, deployed ransomware for financial gain.(Citation: CISA Scattered Spider Profile)(Citation: Advisory November 2023)(Citation: CrowdStrike Scattered Spider BYOVD January 2023)(Citation: CrowdStrike Scattered Spider Profile)(Citation: MSTIC Octo Tempest Operations October 2023)(Citation: Crowdstrike TELCO BPO Campaign December 2022) |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-09-22 18:36:55.117000+00:00 | 2024-04-04 21:24:48.602000+00:00 |
| description | [Scattered Spider](https://attack.mitre.org/groups/G1015) is a cybercriminal group that has been active since at least 2022 targeting customer relationship management and business-process outsourcing (BPO) firms as well as telecommunications and technology companies. During campaigns [Scattered Spider](https://attack.mitre.org/groups/G1015) has leveraged targeted social-engineering techniques and attempted to bypass popular endpoint security tools.(Citation: CrowdStrike Scattered Spider Profile)(Citation: CrowdStrike Scattered Spider BYOVD January 2023)(Citation: Crowdstrike TELCO BPO Campaign December 2022) | [Scattered Spider](https://attack.mitre.org/groups/G1015) is a native English-speaking cybercriminal group that has been active since at least 2022.(Citation: CrowdStrike Scattered Spider Profile)(Citation: MSTIC Octo Tempest Operations October 2023) The group initially targeted customer relationship management and business-process outsourcing (BPO) firms as well as telecommunications and technology companies. Beginning in 2023, [Scattered Spider](https://attack.mitre.org/groups/G1015) expanded its operations to compromise victims in the gaming, hospitality, retail, MSP, manufacturing, and financial sectors.(Citation: MSTIC Octo Tempest Operations October 2023) During campaigns, [Scattered Spider](https://attack.mitre.org/groups/G1015) has leveraged targeted social-engineering techniques, attempted to bypass popular endpoint security tools, and more recently, deployed ransomware for financial gain.(Citation: CISA Scattered Spider Advisory November 2023)(Citation: CrowdStrike Scattered Spider BYOVD January 2023)(Citation: CrowdStrike Scattered Spider Profile)(Citation: MSTIC Octo Tempest Operations October 2023)(Citation: Crowdstrike TELCO BPO Campaign December 2022) |
| x_mitre_attack_spec_version | 3.1.0 | 3.2.0 |
| x_mitre_version | 1.0 | 2.0 |
Iterable Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| aliases | Octo Tempest | |
| aliases | Storm-0875 | |
| external_references | {'source_name': 'Octo Tempest', 'description': '(Citation: Microsoft Threat Actor Naming July 2023)'} | |
| external_references | {'source_name': 'Storm-0875', 'description': '(Citation: Microsoft Threat Actor Naming July 2023)'} | |
| external_references | {'source_name': 'CISA Scattered Spider Advisory November 2023', 'description': 'CISA. (2023, November 16). Cybersecurity Advisory: Scattered Spider (AA23-320A). Retrieved March 18, 2024.', 'url': 'https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-320a'} | |
| external_references | {'source_name': 'Microsoft Threat Actor Naming July 2023', 'description': 'Microsoft . (2023, July 12). How Microsoft names threat actors. Retrieved November 17, 2023.', 'url': 'https://learn.microsoft.com/en-us/microsoft-365/security/intelligence/microsoft-threat-actor-naming?view=o365-worldwide'} | |
| external_references | {'source_name': 'MSTIC Octo Tempest Operations October 2023', 'description': 'Microsoft. (2023, October 25). Octo Tempest crosses boundaries to facilitate extortion, encryption, and destruction. Retrieved March 18, 2024.', 'url': 'https://www.microsoft.com/en-us/security/blog/2023/10/25/octo-tempest-crosses-boundaries-to-facilitate-extortion-encryption-and-destruction/'} | |
| x_mitre_domains | mobile-attack |
| Description |
|---|
Volt Typhoon is a People's Republic of China (PRC) state-sponsored actor that has been active since at least 2021. Volt Typhoon typically focuses on espionage and information gathering and has targeted critical infrastructure organizations in the US including Guam. Volt Typhoon has emphasized stealth in operations using web shells, living-off-the-land (LOTL) binaries, hands on keyboard activities, and stolen credentials.[1][2][3] References:
|
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-10-03 15:45:14.731000+00:00 | 2024-03-28 04:14:40.834000+00:00 |
| x_mitre_version | 1.0 | 1.1 |
| Description |
|---|
TA2541 is a cybercriminal group that has been targeting the aviation, aerospace, transportation, manufacturing, and defense industries since at least 2017. TA2541 campaigns are typically high volume and involve the use of commodity remote access tools obfuscated by crypters and themes related to aviation, transportation, and travel.[1][2] References: |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-10-10 17:19:36.480000+00:00 | 2024-04-10 22:38:45.199000+00:00 |
| x_mitre_version | 1.0 | 1.1 |