{ "type": "bundle", "id": "bundle--8b75c87a-b24f-4c55-9d6c-760d747c3a81", "spec_version": "2.0", "objects": [ { "aliases": [ "GALLIUM", "Operation Soft Cell" ], "x_mitre_domains": [ "enterprise-attack" ], "x_mitre_contributors": [ "Daniyal Naeem, BT Security", "Cybereason Nocturnus, @nocturnus" ], "object_marking_refs": [ "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" ], "type": "intrusion-set", "id": "intrusion-set--06a11b7e-2a36-47fe-8d3e-82c265df3258", "created": "2019-07-18T20:47:50.050Z", "x_mitre_version": "3.0", "external_references": [ { "source_name": "mitre-attack", "external_id": "G0093", "url": "https://attack.mitre.org/groups/G0093" }, { "source_name": "Operation Soft Cell", "description": "(Citation: Cybereason Soft Cell June 2019)" }, { "source_name": "GALLIUM", "description": "(Citation: Microsoft GALLIUM December 2019)" }, { "source_name": "Cybereason Soft Cell June 2019", "url": "https://www.cybereason.com/blog/operation-soft-cell-a-worldwide-campaign-against-telecommunications-providers", "description": "Cybereason Nocturnus. (2019, June 25). Operation Soft Cell: A Worldwide Campaign Against Telecommunications Providers. Retrieved July 18, 2019." }, { "source_name": "Microsoft GALLIUM December 2019", "url": "https://www.microsoft.com/security/blog/2019/12/12/gallium-targeting-global-telecom/", "description": "MSTIC. (2019, December 12). GALLIUM: Targeting global telecom. Retrieved January 13, 2021." }, { "source_name": "Unit 42 PingPull Jun 2022", "url": "https://unit42.paloaltonetworks.com/pingpull-gallium/", "description": "Unit 42. (2022, June 13). GALLIUM Expands Targeting Across Telecommunications, Government and Finance Sectors With New PingPull Tool. Retrieved August 7, 2022." } ], "x_mitre_deprecated": false, "revoked": false, "description": "[GALLIUM](https://attack.mitre.org/groups/G0093) is a cyberespionage group that has been active since at least 2012, primarily targeting telecommunications companies, financial institutions, and government entities in Afghanistan, Australia, Belgium, Cambodia, Malaysia, Mozambique, the Philippines, Russia, and Vietnam. Security researchers have identified [GALLIUM](https://attack.mitre.org/groups/G0093) as a likely Chinese state-sponsored group, based in part on tools used and TTPs commonly associated with Chinese threat actors.(Citation: Cybereason Soft Cell June 2019)(Citation: Microsoft GALLIUM December 2019)(Citation: Unit 42 PingPull Jun 2022)", "modified": "2022-08-12T21:26:22.303Z", "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", "name": "GALLIUM", "x_mitre_attack_spec_version": "2.1.0", "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" } ] }