Skip to content

Commit c64dc1f

Browse files
authored
Merge pull request #1060 from Mathieu4141/threat-actors/76fdf7b7-41f6-40ac-9d7a-a9ac8b3a30dc
[threat actors] Add 12 actors, 1 alias
2 parents bcf6c89 + 89b453c commit c64dc1f

File tree

2 files changed

+147
-3
lines changed

2 files changed

+147
-3
lines changed

README.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -607,7 +607,7 @@ Category: *tea-matrix* - source: ** - total: *7* elements
607607

608608
[Threat Actor](https://www.misp-galaxy.org/threat-actor) - Known or estimated adversary groups targeting organizations and employees. Adversary groups are regularly confused with their initial operation or campaign. threat-actor-classification meta can be used to clarify the understanding of the threat-actor if also considered as operation, campaign or activity group.
609609

610-
Category: *actor* - source: *MISP Project* - total: *804* elements
610+
Category: *actor* - source: *MISP Project* - total: *816* elements
611611

612612
[[HTML](https://www.misp-galaxy.org/threat-actor)] - [[JSON](https://github.com/MISP/misp-galaxy/blob/main/clusters/threat-actor.json)]
613613

clusters/threat-actor.json

+146-2
Original file line numberDiff line numberDiff line change
@@ -15311,12 +15311,14 @@
1531115311
"https://www.ncsc.gov.uk/files/NCSC-MAR-SparrowDoor.pdf",
1531215312
"https://cloud.google.com/blog/topics/threat-intelligence/unc4841-post-barracuda-zero-day-remediation",
1531315313
"https://www.sygnia.co/blog/ghost-emperor-demodex-rootkit/",
15314-
"https://www.wsj.com/politics/national-security/china-cyberattack-internet-providers-260bd835"
15314+
"https://www.wsj.com/politics/national-security/china-cyberattack-internet-providers-260bd835",
15315+
"https://www.recordedfuture.com/research/redmike-salt-typhoon-exploits-vulnerable-devices"
1531515316
],
1531615317
"synonyms": [
1531715318
"FamousSparrow",
1531815319
"UNC2286",
15319-
"Salt Typhoon"
15320+
"Salt Typhoon",
15321+
"RedMike"
1532015322
]
1532115323
},
1532215324
"related": [
@@ -17809,6 +17811,148 @@
1780917811
},
1781017812
"uuid": "835c7fc6-a066-447d-a0fc-b096bd9c412f",
1781117813
"value": "GOLD REBELLION"
17814+
},
17815+
{
17816+
"description": "JavaGhost is a threat actor group that has targeted cloud environments, particularly AWS, for phishing campaigns without engaging in data theft for extortion. They exploit overly permissive IAM permissions and utilize long-term access keys to gain initial access, employing the GetFederationToken API to acquire temporary credentials for console access. JavaGhost has demonstrated advanced evasion techniques, avoiding common detection methods by not using the GetCallerIdentity API call. Their activities generate detectable logging footprints in CloudTrail, allowing organizations to identify and respond to their tactics.",
17817+
"meta": {
17818+
"refs": [
17819+
"https://unit42.paloaltonetworks.com/javaghost-cloud-phishing/"
17820+
]
17821+
},
17822+
"uuid": "eedb23e9-49f4-45ad-90b6-9ff3e9d7e2b6",
17823+
"value": "JavaGhost"
17824+
},
17825+
{
17826+
"description": "Angry Likho is an APT group that has been active since 2023, primarily targeting large organizations and government agencies in Russia and Belarus. Their attacks typically involve spear-phishing emails with malicious attachments, such as RAR archives, and utilize a known payload, the Lumma stealer, for data exfiltration. The group employs a compact infrastructure and has been linked to espionage activities, particularly in sectors like aviation and pharmaceuticals. Their operations have shown a focus on collecting sensitive information, including cryptowallet files and user credentials.",
17827+
"meta": {
17828+
"country": "RU",
17829+
"refs": [
17830+
"https://securelist.com/angry-likho-apt-attacks-with-lumma-stealer/115663/",
17831+
"https://www.morphisec.com/blog/sticky-werewolfs-aviation-attacks/"
17832+
],
17833+
"synonyms": [
17834+
"Sticky Werewolf"
17835+
]
17836+
},
17837+
"uuid": "a6ca6148-d49f-4b72-a4ad-181a00dfec68",
17838+
"value": "Angry Likho"
17839+
},
17840+
{
17841+
"description": "PlushDaemon is a China-aligned APT group that has conducted cyberespionage operations against targets in China, Taiwan, Hong Kong, South Korea, the United States, and New Zealand. They executed a supply chain attack on the South Korean VPN provider IPany, compromising its installer to deploy the SlowStepper backdoor, which features a toolkit of over 30 components. PlushDaemon primarily gains initial access by hijacking legitimate updates of Chinese applications and has also exploited vulnerabilities in legitimate web servers. Additionally, they have utilized the Visual Studio command line utility regcap.exe to side-load a malicious DLL named lregdll.dll.",
17842+
"meta": {
17843+
"country": "CN",
17844+
"refs": [
17845+
"https://www.welivesecurity.com/en/eset-research/plushdaemon-compromises-supply-chain-korean-vpn-service/"
17846+
]
17847+
},
17848+
"uuid": "bdb9ac86-fd43-41e1-a06e-7cff2b5a922d",
17849+
"value": "PlushDaemon"
17850+
},
17851+
{
17852+
"description": "Storm-2139 is a cybercrime group that exploited stolen API keys from compromised Azure OpenAI Service accounts to generate harmful content, including non-consensual intimate imagery, using the DALL-E model. The group utilized reverse proxy infrastructure and custom software to bypass guardrails in Microsoft’s GenAI services. Microsoft has filed a lawsuit against four individuals associated with Storm-2139, alleging they modified customer systems and resold access to these capabilities. The group systematically harvested authentication tokens from U.S.-based enterprises and is linked to a broader network of illicit AI tool development and distribution.",
17853+
"meta": {
17854+
"refs": [
17855+
"https://blogs.microsoft.com/on-the-issues/2025/02/27/disrupting-cybercrime-abusing-gen-ai/"
17856+
]
17857+
},
17858+
"uuid": "07e1bbc4-19ad-4706-a5fe-cf28f0b67300",
17859+
"value": "Storm-2139"
17860+
},
17861+
{
17862+
"description": "LARVA-208 is a financially motivated threat actor employing sophisticated phishing campaigns to harvest credentials and deploy ransomware. The actor uses multiple tactics, including Open URL Redirection, fake login pages, and social engineering, to bypass MFA and gain access to corporate networks. LARVA-208 has compromised over 618 organizations since June 2024, often deploying ransomware payloads. The threat actor is linked to LARVA-148, a threat actor managing domain acquisitions and attacks.",
17863+
"meta": {
17864+
"refs": [
17865+
"https://www.scworld.com/brief/over-600-organizations-subjected-to-global-encrypthub-attacks",
17866+
"https://catalyst.prodaft.com/public/report/larva-208/overview"
17867+
],
17868+
"synonyms": [
17869+
"EncryptHub"
17870+
]
17871+
},
17872+
"uuid": "22bdf6e8-49c8-42a9-994e-9b6e90868543",
17873+
"value": "Larva-208"
17874+
},
17875+
{
17876+
"description": "Cyber Alliance is a hacktivist group that has demonstrated capabilities in exploiting vulnerabilities, such as CVE-2023-22515 in Confluence, to escalate privileges and access targeted infrastructure. They successfully accessed Trigona's systems, exfiltrating sensitive data and ultimately defacing and deleting the organization's site.",
17877+
"meta": {
17878+
"country": "UA",
17879+
"refs": [
17880+
"https://unit42.paloaltonetworks.com/unit-42-ransomware-leak-site-data-analysis/",
17881+
"https://securelist.com/cyber-anarchy-squad-attacks-with-uncommon-trojans/114990/",
17882+
"https://www.darkowl.com/blog-content/what-are-cves/"
17883+
],
17884+
"synonyms": [
17885+
"UCA"
17886+
]
17887+
},
17888+
"uuid": "e8ff09b5-8291-454a-8ab5-df39bed2f99f",
17889+
"value": "Ukrainian Cyber Alliance"
17890+
},
17891+
{
17892+
"description": "Larva-24005 is a threat actor that breaches servers in Korea to establish a web server and PHP environment for phishing attacks, primarily targeting individuals involved with North Korea and university professors researching the regime. They exploit the BlueKeep vulnerability for initial access and utilize RDPWrap and a custom keylogger post-compromise. Phishing emails are crafted to appear as legitimate communications, often containing malicious URLs or compressed files. The actor has been observed storing phishing pages in the IIS_USER account and XAMPP home folder, although traces of these pages were later deleted.",
17893+
"meta": {
17894+
"country": "KP",
17895+
"refs": [
17896+
"https://asec.ahnlab.com/en/86535/"
17897+
]
17898+
},
17899+
"uuid": "558e7697-7195-4086-a0d0-cd3b4c7b3747",
17900+
"value": "Larva-24005"
17901+
},
17902+
{
17903+
"description": "GreenSpot is an APT group believed to operate from Taiwan, active since at least 2007, primarily targeting government, academic, and military entities in China through phishing campaigns. The group frequently targets 163.com, aiming to steal login credentials using deceptive domains, manipulated TLS certificates, and counterfeit interfaces. Their tactics highlight the sophistication of modern credential theft operations, necessitating detection efforts focused on irregular domain registrations and certificate anomalies.",
17904+
"meta": {
17905+
"country": "TW",
17906+
"refs": [
17907+
"https://hunt.io/blog/greenspot-apt-targets-163com-fake-downloads-spoofing",
17908+
"https://www.antiy.net/p/greenspotoperations-grow-for-many-years/"
17909+
]
17910+
},
17911+
"uuid": "cff9cc85-6f34-4deb-9239-730e34e639f3",
17912+
"value": "GreenSpot"
17913+
},
17914+
{
17915+
"description": "Teleboyi is a threat actor reportedly based in China, associated with the PlugX RAT. TeamT5 identified a custom PlugX loader used by Teleboyi that employs a similar string decryption algorithm as seen in the McUtil.dll loader from Operation Harvest. While there are weak links to the dsqurey[.]com domain, the connection remains uncertain due to the domain's registration history.",
17916+
"meta": {
17917+
"country": "CN",
17918+
"refs": [
17919+
"https://www.trendmicro.com/en_us/research/25/b/updated-shadowpad-malware-leads-to-ransomware-deployment.html"
17920+
]
17921+
},
17922+
"uuid": "60b13884-76cf-4152-b78f-85ba2c4faf67",
17923+
"value": "Teleboyi"
17924+
},
17925+
{
17926+
"description": "TRIPLESTRENGTH is a financially motivated threat actor targeting cloud environments and on-premises infrastructures for cryptojacking, ransomware, and extortion. They exploit stolen credentials, cookies, and information stealer logs to gain unauthorized access to platforms like Google Cloud, AWS, and Microsoft Azure, deploying the unMiner application for cryptocurrency mining. Their ransomware operations utilize lockers such as Phobos, LokiLocker, and RCRU64, involving lateral movement and mass encryption. TRIPLESTRENGTH also engages in account hijacking and collaborates with partners for ransomware and blackmail operations, advertising their services in hacking-focused Telegram channels.",
17927+
"meta": {
17928+
"refs": [
17929+
"https://services.google.com/fh/files/misc/threat_horizons_report_h1_2025.pdf",
17930+
"https://www.cyfirma.com/research/tracking-ransomware-january-2025/"
17931+
]
17932+
},
17933+
"uuid": "4d1692ca-8022-4258-9f35-149e3d0564bb",
17934+
"value": "TRIPLESTRENGTH"
17935+
},
17936+
{
17937+
"description": "Storm-2372 is a suspected nation-state actor aligned with Russian interests, engaging in device code phishing campaigns targeting governments, NGOs, and various industries across Europe, North America, Africa, and the Middle East. The actor employs tactics that involve impersonating prominent individuals through third-party messaging services like WhatsApp and Signal to gain rapport before sending phishing invitations. These invitations lure users into completing device code authentication requests, granting Storm-2372 initial access to victim accounts and enabling Graph API data collection activities, including email harvesting. Microsoft has observed the actor utilizing keyword searches within compromised accounts to exfiltrate sensitive information.",
17938+
"meta": {
17939+
"country": "RU",
17940+
"refs": [
17941+
"https://www.microsoft.com/en-us/security/blog/2025/02/13/storm-2372-conducts-device-code-phishing-campaign/"
17942+
]
17943+
},
17944+
"uuid": "9c2600e2-d9e6-42ea-963c-972a4b5673c6",
17945+
"value": "Storm-2372"
17946+
},
17947+
{
17948+
"description": "GamaCopy is a threat actor first discovered in June 2023, known for launching cyberattacks against Russia’s defense and critical infrastructure sectors by mimicking the TTPs of Gamaredon. The organization has been active since at least August 2021 and primarily uses Russian-language bait documents related to military facilities. Analysis of attack samples shows considerable overlap in code structure and tactics, including the use of 7z-SFX documentation to install UltraVNC and connecting via port 443. GamaCopy employs open-source tools to obfuscate its activities while targeting sensitive information in the context of the Russia-Ukraine conflict.",
17949+
"meta": {
17950+
"refs": [
17951+
"https://medium.com/@knownsec404team/love-and-hate-under-war-the-gamacopy-organization-which-imitates-the-russian-gamaredon-uses-560ba5e633fa?source=rss-f1efd6b74751------2"
17952+
]
17953+
},
17954+
"uuid": "d424f90d-fc2b-428a-bbe6-41e390308fb3",
17955+
"value": "GamaCopy"
1781217956
}
1781317957
],
1781417958
"version": 322

0 commit comments

Comments
 (0)