Skip to content

Commit ecb4f92

Browse files
authored
Merge branch 'MISP:main' into main
2 parents cdf4425 + 18ac33c commit ecb4f92

File tree

9 files changed

+1602
-7
lines changed

9 files changed

+1602
-7
lines changed

README.md

Lines changed: 12 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,6 @@
11
# misp-galaxy
22

3+
![misp galaxy logo](https://raw.githubusercontent.com/MISP/misp-galaxy/refs/heads/main/doc/images/misp-galaxy-logo.png)
34
![Python application](https://github.com/MISP/misp-galaxy/workflows/Python%20application/badge.svg)
45

56
![Screenshot - MISP galaxy integeration in MISP threat intelligence platform](https://raw.githubusercontent.com/MISP/misp-galaxy/aa41337fd78946a60aef3783f58f337d2342430a/doc/images/galaxy.png)
@@ -199,7 +200,7 @@ Category: *actor* - source: *MISP Project* - total: *4* elements
199200

200201
[Exploit-Kit](https://www.misp-galaxy.org/exploit-kit) - Exploit-Kit is an enumeration of some exploitation kits used by adversaries. The list includes document, browser and router exploit kits.It's not meant to be totally exhaustive but aim at covering the most seen in the past 5 years
201202

202-
Category: *tool* - source: *MISP Project* - total: *52* elements
203+
Category: *tool* - source: *MISP Project* - total: *53* elements
203204

204205
[[HTML](https://www.misp-galaxy.org/exploit-kit)] - [[JSON](https://github.com/MISP/misp-galaxy/blob/main/clusters/exploit-kit.json)]
205206

@@ -707,11 +708,19 @@ Category: *tea-matrix* - source: ** - total: *7* elements
707708

708709
[[HTML](https://www.misp-galaxy.org/tea-matrix)] - [[JSON](https://github.com/MISP/misp-galaxy/blob/main/clusters/tea-matrix.json)]
709710

711+
## Canada Listed Terrorist Entities
712+
713+
[Canada Listed Terrorist Entities](https://www.misp-galaxy.org/terrorist-groups) - Entities listed under Canada's Criminal Code as terrorist entities.
714+
715+
Category: *threat-actor* - source: *https://www.publicsafety.gc.ca/cnt/_xml/lstd-ntts-eng.xml* - total: *90* elements
716+
717+
[[HTML](https://www.misp-galaxy.org/terrorist-groups)] - [[JSON](https://github.com/MISP/misp-galaxy/blob/main/clusters/terrorist-groups.json)]
718+
710719
## Threat Actor
711720

712721
[Threat Actor](https://www.misp-galaxy.org/threat-actor) - Known or estimated adversary groups targeting organizations and employees. Adversary groups are regularly confused with their initial operation or campaign. threat-actor-classification meta can be used to clarify the understanding of the threat-actor if also considered as operation, campaign or activity group.
713722

714-
Category: *actor* - source: *MISP Project* - total: *941* elements
723+
Category: *actor* - source: *MISP Project* - total: *953* elements
715724

716725
[[HTML](https://www.misp-galaxy.org/threat-actor)] - [[JSON](https://github.com/MISP/misp-galaxy/blob/main/clusters/threat-actor.json)]
717726

@@ -783,7 +792,7 @@ Category: *tool* - source: *MISP Project* - total: *606* elements
783792

784793
[UAVs/UCAVs](https://www.misp-galaxy.org/uavs) - OSINT Database of Unmanned Combat Aerial Vehicle
785794

786-
Category: *Military equipment* - source: *OSINT* - total: *661* elements
795+
Category: *Military equipment* - source: *OSINT* - total: *663* elements
787796

788797
[[HTML](https://www.misp-galaxy.org/uavs)] - [[JSON](https://github.com/MISP/misp-galaxy/blob/main/clusters/uavs.json)]
789798

clusters/exploit-kit.json

Lines changed: 27 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -794,7 +794,33 @@
794794
},
795795
"uuid": "00715961-2249-3e2e-8420-bb47feb73bb2",
796796
"value": "SpelevoEK"
797+
},
798+
{
799+
"description": "The Coruna exploit kit provides another example of how sophisticated capabilities proliferate. Over the course of 2025, GTIG tracked its use in highly targeted operations initially conducted by a customer of a surveillance vendor, then observed its deployment in watering hole attacks targeting Ukrainian users by UNC6353, a suspected Russian espionage group. We then retrieved the complete exploit kit when it was later used in broad-scale campaigns by UNC6691, a financially motivated threat actor operating from China. How this proliferation occurred is unclear, but suggests an active market for \"second hand\" zero-day exploits. Beyond these identified exploits, multiple threat actors have now acquired advanced exploitation techniques that can be re-used and modified with newly identified vulnerabilities.",
800+
"meta": {
801+
"refs": [
802+
"https://cloud.google.com/blog/topics/threat-intelligence/coruna-powerful-ios-exploit-kit?linkId=59478481"
803+
]
804+
},
805+
"related": [
806+
{
807+
"dest-uuid": "989a795c-efed-4528-90c8-9807a49f84ce",
808+
"tags": [
809+
"estimative-language:likelihood-probability=\"likely\""
810+
],
811+
"type": "used-by"
812+
},
813+
{
814+
"dest-uuid": "8420e351-be40-40c4-8d6a-84155830cb34",
815+
"tags": [
816+
"estimative-language:likelihood-probability=\"likely\""
817+
],
818+
"type": "used-by"
819+
}
820+
],
821+
"uuid": "8420e351-be40-40c4-8d6a-84155830cb34",
822+
"value": "Coruna"
797823
}
798824
],
799-
"version": 14
825+
"version": 15
800826
}

0 commit comments

Comments
 (0)