{
	"id": "56dc7f05-50d9-4209-96af-93490bfac89a",
	"created_at": "2026-04-06T00:06:33.004912Z",
	"updated_at": "2026-04-10T03:29:28.370279Z",
	"deleted_at": null,
	"sha1_hash": "6188734c1524280c50d5079019b0fb33cdcccaa1",
	"title": "Threat Group Cards: A Threat Actor Encyclopedia",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 49421,
	"plain_text": "Threat Group Cards: A Threat Actor Encyclopedia\nArchived: 2026-04-05 17:19:05 UTC\nHome \u003e List all groups \u003e List all tools \u003e List all groups using tool StrongPity2\n Tool: StrongPity2\nNames StrongPity2\nCategory Malware\nType Backdoor, Info stealer, Exfiltration\nDescription\n(Kasperksy) In this campaign, StrongPity updated its latest signature backdoor, named\nStrongPity2, and added more files to exfiltrate to its list of common Office and PDF\ndocuments, including Dagesh Pro Word Processor files used for Hebrew dotting, RiverCAD\nfiles used for river flow and bridge modelling, plain-text files, archives as well as GPG\nencrypted files and PGP keys.\nInformation Last change to this tool card: 01 July 2020\nDownload this tool card in JSON format\nAll groups using tool StrongPity2\nChanged Name Country Observed\nAPT groups\n Promethium, StrongPity 2012-Nov 2021\n1 group listed (1 APT, 0 other, 0 unknown)\nSource: https://apt.etda.or.th/cgi-bin/listgroups.cgi?u=3f522238-dfd3-42d4-b2f9-1f4696c216df\nhttps://apt.etda.or.th/cgi-bin/listgroups.cgi?u=3f522238-dfd3-42d4-b2f9-1f4696c216df\nPage 1 of 1",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"references": [
		"https://apt.etda.or.th/cgi-bin/listgroups.cgi?u=3f522238-dfd3-42d4-b2f9-1f4696c216df"
	],
	"report_names": [
		"listgroups.cgi?u=3f522238-dfd3-42d4-b2f9-1f4696c216df"
	],
	"threat_actors": [
		{
			"id": "67fbc7d7-ba8e-4258-b53c-9a5d755e1960",
			"created_at": "2022-10-25T16:07:24.077859Z",
			"updated_at": "2026-04-10T02:00:04.860725Z",
			"deleted_at": null,
			"main_name": "Promethium",
			"aliases": [
				"APT-C-41",
				"G0056",
				"Magenta Dust",
				"Promethium",
				"StrongPity"
			],
			"source_name": "ETDA:Promethium",
			"tools": [
				"StrongPity",
				"StrongPity2",
				"StrongPity3",
				"Truvasys"
			],
			"source_id": "ETDA",
			"reports": null
		},
		{
			"id": "cbede712-4cc3-47c6-bf78-92fd9f1beac6",
			"created_at": "2022-10-25T15:50:23.777222Z",
			"updated_at": "2026-04-10T02:00:05.399303Z",
			"deleted_at": null,
			"main_name": "PROMETHIUM",
			"aliases": [
				"PROMETHIUM",
				"StrongPity"
			],
			"source_name": "MITRE:PROMETHIUM",
			"tools": [
				"Truvasys",
				"StrongPity"
			],
			"source_id": "MITRE",
			"reports": null
		},
		{
			"id": "4660477f-333f-4a18-b49b-0b4d7c66d482",
			"created_at": "2023-01-06T13:46:38.511962Z",
			"updated_at": "2026-04-10T02:00:03.007466Z",
			"deleted_at": null,
			"main_name": "PROMETHIUM",
			"aliases": [
				"StrongPity",
				"G0056"
			],
			"source_name": "MISPGALAXY:PROMETHIUM",
			"tools": [],
			"source_id": "MISPGALAXY",
			"reports": null
		}
	],
	"ts_created_at": 1775433993,
	"ts_updated_at": 1775791768,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/6188734c1524280c50d5079019b0fb33cdcccaa1.pdf",
		"text": "https://archive.orkl.eu/6188734c1524280c50d5079019b0fb33cdcccaa1.txt",
		"img": "https://archive.orkl.eu/6188734c1524280c50d5079019b0fb33cdcccaa1.jpg"
	}
}