Skip to content

Commit 2aa5c1e

Browse files
authored
Merge pull request #1156 from Mathieu4141/threat-actors/574c8257-c623-4b40-b414-22358c97cabc
[Threat actors] Add 10 actors
2 parents 68f01b7 + 11698b5 commit 2aa5c1e

2 files changed

Lines changed: 125 additions & 1 deletion

File tree

README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -720,7 +720,7 @@ Category: *threat-actor* - source: *https://www.publicsafety.gc.ca/cnt/_xml/lstd
720720

721721
[Threat Actor](https://www.misp-galaxy.org/threat-actor) - Known or estimated adversary groups targeting organizations and employees. Adversary groups are regularly confused with their initial operation or campaign. threat-actor-classification meta can be used to clarify the understanding of the threat-actor if also considered as operation, campaign or activity group.
722722

723-
Category: *actor* - source: *MISP Project* - total: *953* elements
723+
Category: *actor* - source: *MISP Project* - total: *963* elements
724724

725725
[[HTML](https://www.misp-galaxy.org/threat-actor)] - [[JSON](https://github.com/MISP/misp-galaxy/blob/main/clusters/threat-actor.json)]
726726

clusters/threat-actor.json

Lines changed: 124 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -19976,6 +19976,130 @@
1997619976
},
1997719977
"uuid": "266af6b4-1f11-4043-9de1-90527406f406",
1997819978
"value": "NetRunnerPR"
19979+
},
19980+
{
19981+
"description": "CL-STA-1087 is a suspected state-sponsored espionage campaign operating out of China, targeting military organizations in Southeast Asia. The actor has demonstrated operational patience, maintaining dormant access for extended periods while focusing on precision intelligence collection and employing robust operational security measures. Their infrastructure includes the use of a legitimate cloud service for C2 operations, indicating a cloud-native approach. File timestamps and other indicators trace the campaign's activity back to 2020, suggesting a long-running operation.",
19982+
"meta": {
19983+
"country": "CN",
19984+
"refs": [
19985+
"https://origin-unit42.paloaltonetworks.com/espionage-campaign-against-military-targets/"
19986+
]
19987+
},
19988+
"uuid": "8d8cbe24-0552-421e-9a3f-42bd2b6c8824",
19989+
"value": "CL-STA-1087"
19990+
},
19991+
{
19992+
"description": "UNC6426 exploited a supply chain compromise of the nx npm package to steal a developer's GitHub Personal Access Token and gain access to a victim's cloud environment. They abused the GitHub-to-AWS OpenID Connect trust to create a new administrator role, leveraging overly permissive permissions associated with the compromised GitHub-Actions-CloudFormation role. Using the legitimate open-source tool Nord Stream, UNC6426 conducted reconnaissance and extracted secrets from CI/CD environments, leading to the exfiltration of files from AWS S3 buckets and data destruction. The actor escalated to full AWS administrator permissions in under 72 hours.",
19993+
"meta": {
19994+
"refs": [
19995+
"https://cloud.google.com/security/report/resources/cloud-threat-horizons-report-h1-2026"
19996+
]
19997+
},
19998+
"uuid": "1515f68c-5b42-479a-bb38-adcb6f11e8af",
19999+
"value": "UNC6426"
20000+
},
20001+
{
20002+
"description": "Z-Pentest Alliance is a pro-Russian hacktivist group known for targeting industrial control systems and operational technology systems, particularly in Italy and Israel. The group has claimed responsibility for various attacks, including gaining control of a water supply management system and disrupting aviation authorities' websites. Z-Pentest Alliance operates within a larger alliance of hacktivist groups, often collaborating on politically motivated operations, including DDoS campaigns. The group has been linked to the GRU and is associated with the NoName057 group, sharing tools and intelligence.",
20003+
"meta": {
20004+
"country": "RU",
20005+
"refs": [
20006+
"https://socradar.io/blog/telegram-activity-timeline-iran-israel-us-war/",
20007+
"https://www.intel471.com/blog/winter-olympics-2026-hacktivism-surges-ahead-of-protests-and-suspected-sabotage",
20008+
"https://www.picussecurity.com/resource/blog/how-noname05716-uses-ddosia-to-attack-nato-targets"
20009+
],
20010+
"synonyms": [
20011+
"Z-Pentest"
20012+
]
20013+
},
20014+
"uuid": "af5320b8-07a9-4703-a657-a11f728ef570",
20015+
"value": "Z-Pentest Alliance"
20016+
},
20017+
{
20018+
"description": "313 Team is an Iraq-based threat actor that has conducted coordinated DDoS campaigns targeting multiple government servers in the UAE, Kuwait, and Romania, often in response to political statements. They have claimed responsibility for significant disruptions, including a one-hour shutdown of Romania’s National Tax Agency and an 18-hour outage of Kuwait's national e-government portal. The group has also engaged in website defacements, showcasing coordinated branding with other aligned groups. Their operations reflect a focus on government infrastructure, employing DDoS techniques and leveraging public political discourse as justification for their attacks.",
20019+
"meta": {
20020+
"country": "IQ",
20021+
"refs": [
20022+
"https://socradar.io/blog/telegram-activity-timeline-iran-israel-us-war/"
20023+
]
20024+
},
20025+
"uuid": "ffd700a7-c540-421f-a52a-9fd6fba8d18b",
20026+
"value": "313 Team"
20027+
},
20028+
{
20029+
"description": "TA2723 is a financially-motivated, high-volume credential phishing threat actor known for spoofing Microsoft OneDrive, LinkedIn, and DocuSign. Proofpoint Threat Research has observed TA2723 conducting OAuth device code phishing campaigns, utilizing tools like Squarephish and Graphish to enhance their operations. The use of these tools allows TA2723 to mitigate the short-lived nature of device codes, facilitating larger campaigns. Successful attacks can lead to M365 account takeover, data exfiltration, and lateral movement.",
20030+
"meta": {
20031+
"refs": [
20032+
"https://www.proofpoint.com/us/blog/threat-insight/access-granted-phishing-device-code-authorization-account-takeover"
20033+
]
20034+
},
20035+
"uuid": "7223da47-59b4-4c5c-9f97-d7ceb5866651",
20036+
"value": "TA2723"
20037+
},
20038+
{
20039+
"description": "Dark Engine has emerged as a significant threat actor targeting industrial control systems and SCADA systems in sectors such as metallurgy and food processing. The group has conducted multiple ICS-targeted incidents, with a pronounced operational surge in June 2025. Additionally, Dark Engine is involved in a campaign that embeds fraudulent CAPTCHA prompts into legitimate WordPress sites, utilizing SEO poisoning to harvest login credentials. Reports also indicate a data leak from Dark Engine that exposed sensitive phone data in the U.S.",
20040+
"meta": {
20041+
"country": "RU",
20042+
"refs": [
20043+
"https://cloud.google.com/blog/topics/threat-intelligence/threats-to-defense-industrial-base",
20044+
"https://securitybrief.com.au/story/fake-captcha-scam-targets-2-353-wordpress-sites-warns-cybercx"
20045+
],
20046+
"synonyms": [
20047+
"Dark Engine"
20048+
]
20049+
},
20050+
"uuid": "f1622e18-f1dc-40b4-aca9-992e29b8fb40",
20051+
"value": "Infrastructure Destruction Squad"
20052+
},
20053+
{
20054+
"description": "Cyber Islamic Resistance is a hacktivist collective ideologically aligned with Iran, engaging in operations such as website defacements, DDoS attacks, and data exfiltration targeting Israeli and Western entities. They have claimed breaches of Israeli cybersecurity firms and academic platforms, framing their actions as part of a broader narrative of retaliation. The group has also targeted critical infrastructure, asserting access to industrial control systems and operational technology environments. Their activities are often presented as part of a coordinated cyber mobilization campaign, emphasizing psychological and reputational impacts.",
20055+
"meta": {
20056+
"country": "IR",
20057+
"refs": [
20058+
"https://www.rapid7.com/blog/post/tr-iran-cyber-playbook-escalating-regional-conflict/",
20059+
"https://socradar.io/blog/telegram-activity-timeline-iran-israel-us-war/"
20060+
]
20061+
},
20062+
"uuid": "3eab2d9f-8258-4b2f-9bc9-4dabcabfefb0",
20063+
"value": "Cyber Islamic Resistance"
20064+
},
20065+
{
20066+
"description": "Conquerors Electronic Army operates under the “Wa’d al-Akhira” banner and has claimed multiple attacks against Israeli targets, including civil emergency alerting and healthcare sectors, utilizing rented stresser infrastructure and CheckHost proof-of-disruption links. The group has embedded links to a UK-registered charity in their operations, suggesting a potential disruption attempt rather than solely an information operation. Security company Radware identified Conquerors Electronic Army as one of the primary actors behind a series of DDoS attacks targeting government entities in the Middle East. Their activities indicate a focus on both disruptive and influence operations.",
20067+
"meta": {
20068+
"refs": [
20069+
"https://socradar.io/blog/telegram-activity-timeline-iran-israel-us-war/",
20070+
"https://www.radware.com/security/threat-advisories-and-attack-reports/ddos-activity-following-operation-epic-fury-roaring-lion/"
20071+
]
20072+
},
20073+
"uuid": "20912a84-43b0-4fad-a30b-9ee3253da721",
20074+
"value": "Conquerors Electronic Army"
20075+
},
20076+
{
20077+
"description": "Keymous is a threat actor known for executing extensive DDoS attacks across multiple Arab countries, targeting government ministries and critical infrastructure. The group has claimed access to sensitive data, including over 300,000 records from Israel's Ministry of Education, and has engaged in reconnaissance activities against various ministries in Bahrain and other nations. Keymous employs diverse infrastructure, including compromised IoT devices and DDoS-for-hire platforms, to amplify attack bandwidth. Their operations have been characterized by a focus on politically motivated cyberattacks, particularly in the context of regional conflicts.",
20078+
"meta": {
20079+
"refs": [
20080+
"https://socradar.io/blog/telegram-activity-timeline-iran-israel-us-war/",
20081+
"https://www.netscout.com/blog/asert/keymous-threat-actor-profile",
20082+
"https://www.cyfirma.com/research/firewalls-and-frontlines-the-india-pakistan-cyber-battlefield-crisis/"
20083+
],
20084+
"synonyms": [
20085+
"keymous",
20086+
"Keymous Plus"
20087+
]
20088+
},
20089+
"uuid": "c6e6d7fe-e8c3-4a33-8603-4bf44dec3b75",
20090+
"value": "Keymous+"
20091+
},
20092+
{
20093+
"description": "APTIran has claimed responsibility for a large-scale campaign targeting Israeli critical infrastructure, asserting infiltration of government ministries, hospitals, universities, and financial institutions as retaliation for Israeli military operations. The group has leaked over 350,000 Israeli government login credentials and approximately 300 internal databases, while also threatening to create a 'zombie' network from infected devices. They have reportedly deployed ransomware strains such as ALPHV and LockBit as part of their offensive toolkit. Additionally, APTIran has made unverified claims of compromising Israeli water control systems and the state-owned food security agency Jordan Silos and Supply General Co.",
20094+
"meta": {
20095+
"country": "IR",
20096+
"refs": [
20097+
"https://www.sophos.com/en-us/blog/hacktivist-campaigns-increase-as-united-states-iran-and-israel-conflict-intensifies",
20098+
"https://blog.talosintelligence.com/talos-developing-situation-in-the-middle-east/"
20099+
]
20100+
},
20101+
"uuid": "207fea73-aebd-40c0-a8de-63bb605cada2",
20102+
"value": "APTIran"
1997920103
}
1998020104
],
1998120105
"version": 339

0 commit comments

Comments
 (0)