Skip to content

Commit 8dd41cd

Browse files
authored
Merge pull request #1174 from MISP/codex/review-and-possibly-add-threat-actor
Add Vertigo Panda alias to UNC6384 threat-actor entry
2 parents 26c7eb2 + dacb0ae commit 8dd41cd

1 file changed

Lines changed: 4 additions & 1 deletion

File tree

clusters/threat-actor.json

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19137,11 +19137,14 @@
1913719137
"value": "UNC6485"
1913819138
},
1913919139
{
19140-
"description": "UNC6384 is a Chinese-affiliated APT that conducts targeted espionage campaigns primarily against diplomatic entities in Southeast Asia and Europe, specifically Belgium and Hungary. The group exploits the ZDI-CAN-25373 Windows shortcut vulnerability to gain initial code execution via malicious .LNK files, deploying the PlugX RAT through sophisticated delivery mechanisms, including DLL side-loading and adversary-in-the-middle attacks. Their operations involve social engineering tactics, such as spear-phishing emails themed around diplomatic events, to entice victims into executing malicious payloads. UNC6384's use of valid code signing and HTTPS hosting enhances their evasion of detection and increases the likelihood of user interaction.",
19140+
"description": "UNC6384 (also tracked as Vertigo Panda) is a Chinese-affiliated APT that conducts targeted espionage campaigns primarily against diplomatic entities in Southeast Asia and Europe, specifically Belgium and Hungary. The group exploits the ZDI-CAN-25373 Windows shortcut vulnerability to gain initial code execution via malicious .LNK files, deploying the PlugX RAT through sophisticated delivery mechanisms, including DLL side-loading and adversary-in-the-middle attacks. Their operations involve social engineering tactics, such as spear-phishing emails themed around diplomatic events, to entice victims into executing malicious payloads. UNC6384's use of valid code signing and HTTPS hosting enhances their evasion of detection and increases the likelihood of user interaction.",
1914119141
"meta": {
1914219142
"country": "CN",
1914319143
"refs": [
1914419144
"https://cloud.google.com/blog/topics/threat-intelligence/prc-nexus-espionage-targets-diplomats/"
19145+
],
19146+
"synonyms": [
19147+
"Vertigo Panda"
1914519148
]
1914619149
},
1914719150
"uuid": "a3e4a57e-4b50-4bca-9282-3307e92e5539",

0 commit comments

Comments
 (0)