test_scratch
/
cti-ATT-CK-v13.1
/ics-attack
/intrusion-set
/intrusion-set--76d59913-1d24-4992-a8ac-05a3eb093f71.json
{ | |
"type": "bundle", | |
"id": "bundle--21b8d210-516c-4cf9-a725-8c65bb30f9af", | |
"spec_version": "2.0", | |
"objects": [ | |
{ | |
"aliases": [ | |
"Dragonfly 2.0", | |
"IRON LIBERTY", | |
"DYMALLOY", | |
"Berserk Bear" | |
], | |
"x_mitre_domains": [ | |
"ics-attack", | |
"enterprise-attack" | |
], | |
"object_marking_refs": [ | |
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" | |
], | |
"type": "intrusion-set", | |
"id": "intrusion-set--76d59913-1d24-4992-a8ac-05a3eb093f71", | |
"created": "2018-10-17T00:14:20.652Z", | |
"x_mitre_version": "2.1", | |
"external_references": [ | |
{ | |
"source_name": "mitre-attack", | |
"external_id": "G0074", | |
"url": "https://attack.mitre.org/groups/G0074" | |
}, | |
{ | |
"source_name": "DYMALLOY", | |
"description": "(Citation: Dragos DYMALLOY )" | |
}, | |
{ | |
"source_name": "Berserk Bear", | |
"description": "(Citation: Fortune Dragonfly 2.0 Sept 2017)" | |
}, | |
{ | |
"source_name": "IRON LIBERTY", | |
"description": "(Citation: Secureworks MCMD July 2019)(Citation: Secureworks IRON LIBERTY)" | |
}, | |
{ | |
"source_name": "Dragonfly 2.0", | |
"description": "(Citation: US-CERT TA18-074A) (Citation: Symantec Dragonfly Sept 2017) (Citation: Fortune Dragonfly 2.0 Sept 2017)" | |
}, | |
{ | |
"source_name": "Dragos DYMALLOY ", | |
"url": "https://www.dragos.com/threat/dymalloy/", | |
"description": "Dragos. (n.d.). DYMALLOY. Retrieved August 20, 2020." | |
}, | |
{ | |
"source_name": "Fortune Dragonfly 2.0 Sept 2017", | |
"url": "http://fortune.com/2017/09/06/hack-energy-grid-symantec/", | |
"description": "Hackett, R. (2017, September 6). Hackers Have Penetrated Energy Grid, Symantec Warns. Retrieved June 6, 2018." | |
}, | |
{ | |
"source_name": "Secureworks MCMD July 2019", | |
"url": "https://www.secureworks.com/research/mcmd-malware-analysis", | |
"description": "Secureworks. (2019, July 24). MCMD Malware Analysis. Retrieved August 13, 2020." | |
}, | |
{ | |
"source_name": "Secureworks IRON LIBERTY", | |
"url": "https://www.secureworks.com/research/threat-profiles/iron-liberty", | |
"description": "Secureworks. (n.d.). IRON LIBERTY. Retrieved October 15, 2020." | |
}, | |
{ | |
"source_name": "Symantec Dragonfly Sept 2017", | |
"url": "https://www.symantec.com/connect/blogs/dragonfly-western-energy-sector-targeted-sophisticated-attack-group", | |
"description": "Symantec Security Response. (2017, September 6). Dragonfly: Western energy sector targeted by sophisticated attack group. Retrieved September 9, 2017." | |
}, | |
{ | |
"source_name": "US-CERT TA18-074A", | |
"url": "https://www.us-cert.gov/ncas/alerts/TA18-074A", | |
"description": "US-CERT. (2018, March 16). Alert (TA18-074A): Russian Government Cyber Activity Targeting Energy and Other Critical Infrastructure Sectors. Retrieved June 6, 2018." | |
} | |
], | |
"x_mitre_deprecated": false, | |
"revoked": true, | |
"description": "[Dragonfly 2.0](https://attack.mitre.org/groups/G0074) is a suspected Russian group that has targeted government entities and multiple U.S. critical infrastructure sectors since at least December 2015. (Citation: US-CERT TA18-074A) (Citation: Symantec Dragonfly Sept 2017) There is debate over the extent of overlap between [Dragonfly 2.0](https://attack.mitre.org/groups/G0074) and [Dragonfly](https://attack.mitre.org/groups/G0035), but there is sufficient evidence to lead to these being tracked as two separate groups. (Citation: Fortune Dragonfly 2.0 Sept 2017)(Citation: Dragos DYMALLOY )", | |
"modified": "2022-05-11T14:00:00.188Z", | |
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", | |
"name": "Dragonfly 2.0", | |
"x_mitre_attack_spec_version": "2.1.0", | |
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" | |
} | |
] | |
} |