|
| 1 | +def get_content(): |
| 2 | + return { |
| 3 | + "id": "G0059", |
| 4 | + "url_id": "Magic_Hound", |
| 5 | + "title": "Magic Hound", |
| 6 | + "tags": ["Iranian-sponsored", "cyber espionage", "long-term operations"], |
| 7 | + "description": "Magic Hound is an Iranian-sponsored threat group likely aligned with the Islamic Revolutionary Guard Corps. It has conducted sophisticated cyber espionage operations since at least 2014, targeting government, military, academic, and health organizations, including the WHO. The group is known for complex social engineering and spearphishing campaigns.", |
| 8 | + "associated_groups": [ |
| 9 | + "TA453", "COBALT ILLUSION", "Charming Kitten", "ITG18", |
| 10 | + "Phosphorus", "Newscaster", "APT35", "Mint Sandstorm" |
| 11 | + ], |
| 12 | + "campaigns": [], |
| 13 | + "techniques": [ |
| 14 | + "T1087.003", "T1098.002", "T1098.007", "T1583.001", "T1583.006", "T1595.002", |
| 15 | + "T1071", "T1071.001", "T1560.001", "T1547.001", "T1059.001", "T1059.003", |
| 16 | + "T1059.005", "T1586.002", "T1584.001", "T1136.001", "T1486", "T1005", "T1482", |
| 17 | + "T1189", "T1114", "T1114.001", "T1114.002", "T1573", "T1585.001", "T1585.002", |
| 18 | + "T1567", "T1190", "T1083", "T1592.002", "T1589", "T1589.001", "T1589.002", |
| 19 | + "T1590.005", "T1591.001", "T1564.003", "T1562", "T1562.001", "T1562.002", |
| 20 | + "T1562.004", "T1070.003", "T1070.004", "T1105", "T1056.001", "T1570", "T1036.004", |
| 21 | + "T1036.005", "T1036.010", "T1112", "T1046", "T1571", "T1027.010", "T1027.013", |
| 22 | + "T1588.002", "T1003.001", "T1566.002", "T1566.003", "T1598.003", "T1057", "T1572", |
| 23 | + "T1090", "T1021.001", "T1018", "T1053.005", "T1113", "T1505.003", "T1218.011", |
| 24 | + "T1082", "T1016", "T1016.001", "T1016.002", "T1049", "T1033", "T1204.001", |
| 25 | + "T1204.002", "T1078.001", "T1078.002", "T1102.002", "T1047" |
| 26 | + ], |
| 27 | + "contributors": ["Anastasios Pingios", "Bryan Lee", "Daniyal Naeem, BT Security"], |
| 28 | + "version": "6.1", |
| 29 | + "created": "16 January 2018", |
| 30 | + "last_modified": "17 November 2024", |
| 31 | + "navigator": "", # Can be filled with a URL if a navigator layer is available |
| 32 | + "references": [ |
| 33 | + {"source": "MITRE ATT&CK", "url": "https://attack.mitre.org/groups/G0059/"}, |
| 34 | + {"source": "Check Point", "url": "https://research.checkpoint.com"}, |
| 35 | + {"source": "MSTIC", "url": "https://www.microsoft.com/security/blog"} |
| 36 | + ], |
| 37 | + "resources": [ |
| 38 | + "https://attack.mitre.org/groups/G0059/", |
| 39 | + "https://www.clearskysec.com/charming-kitten/", |
| 40 | + "https://www.secureworks.com/research/threat-profiles/cobalt-illusion" |
| 41 | + ], |
| 42 | + "remediation": "Implement application whitelisting, monitor and restrict use of PowerShell, deploy endpoint detection and response (EDR) tools, and segment networks to minimize lateral movement.", |
| 43 | + "improvements": "Enhance phishing detection, improve mail filtering, educate users on social engineering risks, and implement behavioral monitoring on endpoints.", |
| 44 | + "hunt_steps": [ |
| 45 | + "Look for PowerShell scripts with base64-encoded commands", |
| 46 | + "Monitor for usage of rundll32 with comsvcs.dll", |
| 47 | + "Identify anomalous mailbox export requests in Exchange logs", |
| 48 | + "Inspect creation of local accounts like 'DefaultAccount' or 'help'" |
| 49 | + ], |
| 50 | + "expected_outcomes": [ |
| 51 | + "Detection of unauthorized mailbox access", |
| 52 | + "Identification of suspicious PowerShell activity", |
| 53 | + "Discovery of adversary-created user accounts", |
| 54 | + "Alerts on potential C2 traffic over non-standard ports" |
| 55 | + ], |
| 56 | + "false_positive": "Legitimate admin tools (e.g., PowerShell, RDP) may resemble adversary use. Validate against expected behavior and timing patterns.", |
| 57 | + "clearing_steps": [ |
| 58 | + "Disable and remove unauthorized user accounts", |
| 59 | + "Restore firewall rules to default", |
| 60 | + "Re-enable and configure LSA protection", |
| 61 | + "Audit and clean Exchange mailbox export history" |
| 62 | + ], |
| 63 | + "ioc": { |
| 64 | + "sha256": [], |
| 65 | + "md5": [], |
| 66 | + "ip": [], |
| 67 | + "domain": [], |
| 68 | + "resources": [ |
| 69 | + "https://www.mandiant.com/resources/m-trends-2018", |
| 70 | + "https://www.clearskysec.com/the-kittens-are-back-in-town/", |
| 71 | + "https://www.microsoft.com/security/blog/2021/11/16/evolving-trends-in-iranian-threat-actor-activity" |
| 72 | + ] |
| 73 | + } |
| 74 | + } |
0 commit comments