-
Notifications
You must be signed in to change notification settings - Fork 270
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
UNC2452 missing #614
Comments
CrowdStrike has released a blog on UNC2452 (StellarParticle). They explain about the new malware, named SUNSPOT, found on Build Servers of Solar Winds. |
There is a set of tools to add. StellarParticle would need to be added a synonym. |
Threat actor galaxy {
"description": "Reporting regarding activity related to the SolarWinds supply chain injection has grown quickly since initial disclosure on 13 December 2020. A significant amount of press reporting has focused on the identification of the actor(s) involved, victim organizations, possible campaign timeline, and potential impact. The US Government and cyber community have also provided detailed information on how the campaign was likely conducted and some of the malware used. MITRE’s ATT&CK team — with the assistance of contributors — has been mapping techniques used by the actor group, referred to as UNC2452/Dark Halo by FireEye and Volexity respectively, as well as SUNBURST and TEARDROP malware.",
"meta": {
"refs": [
"https://medium.com/mitre-attack/identifying-unc2452-related-techniques-9f7b6c7f3714",
"https://www.fireeye.com/blog/threat-research/2020/12/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor.html",
"https://news.sophos.com/en-us/2020/12/21/how-sunburst-malware-does-defense-evasion/",
"https://www.microsoft.com/security/blog/2020/12/18/analyzing-solorigate-the-compromised-dll-file-that-started-a-sophisticated-cyberattack-and-how-microsoft-defender-helps-protect/",
"https://pastebin.com/6EDgCKxd",
"https://github.com/fireeye/sunburst_countermeasures"
],
"synonyms": [
"DarkHalo"
]
},
"uuid": "2ee5ed7a-c4d0-40be-a837-20817474a15b",
"value": "UNC2452"
} SUNSPOT added in 4692ced |
Relationships to add |
added in #631. |
Hi! Apologies for the delay on my end. I had finals so was a bit busy. I had found reports that a malware strain named Sunspot had been active since 2019 on one of the Build servers of Solar Winds. Sunspot had only one purpose: To watch the build server for commands that built Orion. I had covered the entire hack in a report that I wished to forward. I would also add that Microsoft has renamed Solorigate to Nobelium (FireEye still uses UNC2452) Also 3 more strains of malware have been detected by Microsoft, namely GoldMax (FireEye identifies it as Sunshuttle), GoldFinder, and Sibot. According to Microsoft's report:
|
I think this is fixed in recent release of the Threat-Actor galaxy. Feel free to re-open if it's not the case. |
This is in relation with Solar Winds Supply Chain Hack. UNC2452 is not stated in the list.
UNC2452 TTP
FireEye's Blog
Sophos Blog
Microsoft's Blog
Sunburst Domains
FireEye Stated Countermeasures
Sophos IoCs
The text was updated successfully, but these errors were encountered: