Version 15.1 16.0
Groups : ICS ATT&CK Changelog
Modified Groups
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2024-04-06 19:05:38.712000+00:00 | 2024-09-12 17:37:44.040000+00:00 |
| external_references[21]['description'] | Pompeo, M. (2020, February 20). The United States Condemns Russian Cyber Attack Against the Country of Georgia. Retrieved June 18, 2020. | Pompeo, M. (2020, February 20). The United States Condemns Russian Cyber Attack Against the Country of Georgia. Retrieved September 12, 2024. |
| external_references[21]['url'] | https://2017-2021.state.gov/the-united-states-condemns-russian-cyber-attack-against-the-country-of-georgia//index.html | https://2017-2021.state.gov/the-united-states-condemns-russian-cyber-attack-against-the-country-of-georgia/index.html |
| x_mitre_version | 4.0 | 4.1 |
Iterable Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| aliases | APT44 | |
| external_references | {'source_name': 'APT44', 'description': '(Citation: mandiant_apt44_unearthing_sandworm)'} | |
| external_references | {'source_name': 'mandiant_apt44_unearthing_sandworm', 'description': 'Roncone, G. et al. (n.d.). APT44: Unearthing Sandworm. Retrieved July 11, 2024.', 'url': 'https://services.google.com/fh/files/misc/apt44-unearthing-sandworm.pdf'} | |
| x_mitre_contributors | Hakan KARABACAK |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2024-04-11 16:06:34.698000+00:00 | 2024-09-04 20:33:04.739000+00:00 |
| x_mitre_version | 4.0 | 4.1 |
Iterable Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| aliases | ITG13 | |
| external_references | {'source_name': 'ITG13', 'description': '(Citation: IBM ZeroCleare Wiper December 2019)'} | |
| external_references | {'source_name': 'IBM ZeroCleare Wiper December 2019', 'description': 'Kessem, L. (2019, December 4). New Destructive Wiper ZeroCleare Targets Energy Sector in the Middle East. Retrieved September 4, 2024.', 'url': 'https://securityintelligence.com/posts/new-destructive-wiper-zerocleare-targets-energy-sector-in-the-middle-east/'} |
| Description |
|---|
APT38 is a North Korean state-sponsored threat group that specializes in financial cyber operations; it has been attributed to the Reconnaissance General Bureau.[1] Active since at least 2014, APT38 has targeted banks, financial institutions, casinos, cryptocurrency exchanges, SWIFT system endpoints, and ATMs in at least 38 countries worldwide. Significant operations include the 2016 Bank of Bangladesh heist, during which APT38 stole $81 million, as well as attacks against Bancomext [2] and Banco de Chile [2]; some of their attacks have been destructive.[1][2][3][4] North Korean group definitions are known to have significant overlap, and some security researchers report all North Korean state-sponsored cyber activity under the name Lazarus Group instead of tracking clusters or subgroups. References:
|
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2024-04-17 22:08:29.146000+00:00 | 2024-08-26 16:33:33.984000+00:00 |
| external_references[11]['url'] | https://content.fireeye.com/apt/rpt-apt38 | https://www.mandiant.com/sites/default/files/2021-09/rpt-apt38-2018-web_v5-1.pdf |
| Description |
|---|
HEXANE is a cyber espionage threat group that has targeted oil & gas, telecommunications, aviation, and internet service provider organizations since at least 2017. Targeted companies have been located in the Middle East and Africa, including Israel, Saudi Arabia, Kuwait, Morocco, and Tunisia. HEXANE's TTPs appear similar to APT33 and OilRig but due to differences in victims and tools it is tracked as a separate entity.[1][2][3][4] References:
|
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2024-02-09 19:27:00.371000+00:00 | 2024-08-14 15:24:19.141000+00:00 |
| x_mitre_version | 2.2 | 2.3 |