{
	"id": "051aebd3-028b-426f-b8f7-e5c7f0289c6e",
	"created_at": "2026-04-06T00:14:33.418712Z",
	"updated_at": "2026-04-10T03:21:36.309839Z",
	"deleted_at": null,
	"sha1_hash": "3ea11b99a013e64740dd3a3e74fc45b9739b10d1",
	"title": "Threat Group Cards: A Threat Actor Encyclopedia",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 28053,
	"plain_text": "Threat Group Cards: A Threat Actor Encyclopedia\r\nArchived: 2026-04-05 13:46:01 UTC\r\nDescription(Varonis) The Darkside ransomware attack campaigns stood out for their use of stealthy techniques,\r\nespecially in the early stages. The group performed careful reconnaissance and took steps to ensure that their\r\nattack tools and techniques would evade detection on monitored devices and endpoints.\r\nWhile their initial entry vectors vary, their techniques are more standardized once inside, and their endgame is\r\ncoldly efficient.\r\nSource: https://apt.etda.or.th/cgi-bin/listgroups.cgi?u=f1c9260c-3f22-42ce-a6fc-eed1a89e5c64\r\nhttps://apt.etda.or.th/cgi-bin/listgroups.cgi?u=f1c9260c-3f22-42ce-a6fc-eed1a89e5c64\r\nPage 1 of 1",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"references": [
		"https://apt.etda.or.th/cgi-bin/listgroups.cgi?u=f1c9260c-3f22-42ce-a6fc-eed1a89e5c64"
	],
	"report_names": [
		"listgroups.cgi?u=f1c9260c-3f22-42ce-a6fc-eed1a89e5c64"
	],
	"threat_actors": [],
	"ts_created_at": 1775434473,
	"ts_updated_at": 1775791296,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/3ea11b99a013e64740dd3a3e74fc45b9739b10d1.pdf",
		"text": "https://archive.orkl.eu/3ea11b99a013e64740dd3a3e74fc45b9739b10d1.txt",
		"img": "https://archive.orkl.eu/3ea11b99a013e64740dd3a3e74fc45b9739b10d1.jpg"
	}
}