{
	"id": "e10a08bf-dbd1-4bcf-ae64-21ba9aa42b41",
	"created_at": "2026-04-06T00:21:48.273555Z",
	"updated_at": "2026-04-10T03:20:05.434811Z",
	"deleted_at": null,
	"sha1_hash": "44e82054f45480032dabfeb7d563d3a9c3de22f8",
	"title": "Threat Group Cards: A Threat Actor Encyclopedia",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 30417,
	"plain_text": "Threat Group Cards: A Threat Actor Encyclopedia\r\nArchived: 2026-04-05 20:46:28 UTC\r\nDescription(Citizen Lab) Israel-based “Cyber Warfare” vendor NSO Group produces and sells a mobile phone\r\nspyware suite called Pegasus. To monitor a target, a government operator of Pegasus must convince the target to\r\nclick on a specially crafted exploit link, which, when clicked, delivers a chain of zero-day exploits to penetrate\r\nsecurity features on the phone and installs Pegasus without the user’s knowledge or permission. Once the phone is\r\nexploited and Pegasus is installed, it begins contacting the operator’s command and control (C\u0026C) servers to\r\nreceive and execute operators’ commands, and send back the target’s private data, including passwords, contact\r\nlists, calendar events, text messages, and live voice calls from popular mobile messaging apps. The operator can\r\neven turn on the phone’s camera and microphone to capture activity in the phone’s vicinity.\r\nSource: https://apt.etda.or.th/cgi-bin/listgroups.cgi?u=ff64b1c1-6846-4f3f-9dae-0e23f866299e\r\nhttps://apt.etda.or.th/cgi-bin/listgroups.cgi?u=ff64b1c1-6846-4f3f-9dae-0e23f866299e\r\nPage 1 of 1",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"references": [
		"https://apt.etda.or.th/cgi-bin/listgroups.cgi?u=ff64b1c1-6846-4f3f-9dae-0e23f866299e"
	],
	"report_names": [
		"listgroups.cgi?u=ff64b1c1-6846-4f3f-9dae-0e23f866299e"
	],
	"threat_actors": [],
	"ts_created_at": 1775434908,
	"ts_updated_at": 1775791205,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/44e82054f45480032dabfeb7d563d3a9c3de22f8.pdf",
		"text": "https://archive.orkl.eu/44e82054f45480032dabfeb7d563d3a9c3de22f8.txt",
		"img": "https://archive.orkl.eu/44e82054f45480032dabfeb7d563d3a9c3de22f8.jpg"
	}
}