{
	"id": "d5187f52-0f6c-4885-a741-2cde15b70f4f",
	"created_at": "2026-04-06T00:12:06.567621Z",
	"updated_at": "2026-04-10T13:11:48.425385Z",
	"deleted_at": null,
	"sha1_hash": "3c9ec53ce467388bc380af1f9bf6fc90b83040a5",
	"title": "Threat Group Cards: A Threat Actor Encyclopedia",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 44949,
	"plain_text": "Threat Group Cards: A Threat Actor Encyclopedia\nArchived: 2026-04-05 19:05:26 UTC\nHome \u003e List all groups \u003e List all tools \u003e List all groups using tool NB65\n Tool: NB65\nNames NB65\nCategory Malware\nType Ransomware, Big Game Hunting\nDescription\n(BleepingComputer) More recently, the NB65 hackers have turned to a new tactic — targeting\nRussian organizations with ransomware attacks since the end of March.\nWhat makes this more interesting, is that the hacking group created their ransomware using the\nleaked source code for the Conti Ransomware operation, which are Russian threat actors who\nprohibit their members from attacking entities in Russia.\nInformation\nLast change to this tool card: 04 May 2022\nDownload this tool card in JSON format\nAll groups using tool NB65\nChanged Name Country Observed\nAPT groups\n NB65 [Unknown] 2022-Apr 2022\n1 group listed (1 APT, 0 other, 0 unknown)\nSource: https://apt.etda.or.th/cgi-bin/listgroups.cgi?u=12cda93a-49bc-4821-9178-9ee3638a7594\nhttps://apt.etda.or.th/cgi-bin/listgroups.cgi?u=12cda93a-49bc-4821-9178-9ee3638a7594\nPage 1 of 1",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://apt.etda.or.th/cgi-bin/listgroups.cgi?u=12cda93a-49bc-4821-9178-9ee3638a7594"
	],
	"report_names": [
		"listgroups.cgi?u=12cda93a-49bc-4821-9178-9ee3638a7594"
	],
	"threat_actors": [
		{
			"id": "f547e816-ea17-442e-915d-c5c76a30669b",
			"created_at": "2022-10-25T16:07:23.891717Z",
			"updated_at": "2026-04-10T02:00:04.780944Z",
			"deleted_at": null,
			"main_name": "NB65",
			"aliases": [],
			"source_name": "ETDA:NB65",
			"tools": [
				"NB65"
			],
			"source_id": "ETDA",
			"reports": null
		},
		{
			"id": "8754f54b-7154-4996-b065-94f04f846022",
			"created_at": "2023-11-07T02:00:07.095161Z",
			"updated_at": "2026-04-10T02:00:03.405596Z",
			"deleted_at": null,
			"main_name": "NB65",
			"aliases": [
				"Network Battalion 65"
			],
			"source_name": "MISPGALAXY:NB65",
			"tools": [],
			"source_id": "MISPGALAXY",
			"reports": null
		}
	],
	"ts_created_at": 1775434326,
	"ts_updated_at": 1775826708,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/3c9ec53ce467388bc380af1f9bf6fc90b83040a5.pdf",
		"text": "https://archive.orkl.eu/3c9ec53ce467388bc380af1f9bf6fc90b83040a5.txt",
		"img": "https://archive.orkl.eu/3c9ec53ce467388bc380af1f9bf6fc90b83040a5.jpg"
	}
}