{
	"id": "ed97ce1b-8ae3-4e5d-990a-348c275f700b",
	"created_at": "2026-04-06T00:06:31.671991Z",
	"updated_at": "2026-04-10T03:35:28.876457Z",
	"deleted_at": null,
	"sha1_hash": "c7c7870e848fe83a4342c2e23ba92c0ac0f6f043",
	"title": "Security Operations Blog I Anomali",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 4949578,
	"plain_text": "Security Operations Blog I Anomali\r\nArchived: 2026-04-05 21:21:50 UTC\r\nResources\r\nBrowse our library of upcoming and on-demand webinars, brochures and datasheets, industry reports and white\r\npapers, case studies, and more.\r\nMarch 30, 2026\r\nAgentic SOC Platform\r\nFrom Copilots to Digital Employees: How Agentic AI Expands the Attack Surface\r\nRead More\r\nhttps://www.anomali.com/blog/aggah-using-compromised-websites-to-target-businesses-across-asia-including-taiwan-manufacturing-industry\r\nPage 1 of 11\n\nMarch 23, 2026\r\nAgentic SOC Platform\r\nSecuring the Three Pillars of AI: A Practical Framework for Security Leaders\r\nRead More\r\nMarch 19, 2026\r\nAgentic SOC Platform\r\nhttps://www.anomali.com/blog/aggah-using-compromised-websites-to-target-businesses-across-asia-including-taiwan-manufacturing-industry\r\nPage 2 of 11\n\nThe Agentic SOC Platform in Action: From Intelligence to Control\r\nRead More\r\nFebruary 18, 2026\r\nIT Operations\r\nOptimizing Data and Analytics for Security Productivity at Scale\r\nRead More\r\nPUBLIC SECTOR BLOG\r\nThank you! Your submission has been received!\r\nOops! Something went wrong while submitting the form.\r\nhttps://www.anomali.com/blog/aggah-using-compromised-websites-to-target-businesses-across-asia-including-taiwan-manufacturing-industry\r\nPage 3 of 11\n\nApril 3, 2026\r\nAnomali Cyber Watch\r\nIran’s IRGC Names Western Tech Giants as “Legitimate Targets”: What CISOs Must Do Now\r\nRead More\r\nApril 3, 2026\r\nPublic Sector\r\nhttps://www.anomali.com/blog/aggah-using-compromised-websites-to-target-businesses-across-asia-including-taiwan-manufacturing-industry\r\nPage 4 of 11\n\nAnomali Cyber Watch\r\nWhen 766 Systems Fall in 24 Hours: The Threats Bearing Down on State Government Networks\r\nRead More\r\nApril 2, 2026\r\nAnomali Cyber Watch\r\nThe Iran Cyber Threat Machine Isn’t Slowing Down — Here’s What CISOs Need to Know Now\r\nRead More\r\nhttps://www.anomali.com/blog/aggah-using-compromised-websites-to-target-businesses-across-asia-including-taiwan-manufacturing-industry\r\nPage 5 of 11\n\nApril 2, 2026\r\nPublic Sector\r\nAnomali Cyber Watch\r\nRussian Intelligence Weaponizes iOS Exploits, Ransomware Operators Blind Your Defenses, and\r\na Critical Cisco Flaw Has No Workaround: What State Government CISOs Must Do Today\r\nRead More\r\nApril 2, 2026\r\nhttps://www.anomali.com/blog/aggah-using-compromised-websites-to-target-businesses-across-asia-including-taiwan-manufacturing-industry\r\nPage 6 of 11\n\nNo items found.\r\nWhy Analyst Workflow Matters More Than Another Detection Rule\r\nRead More\r\nApril 1, 2026\r\nAnomali Cyber Watch\r\nIran's Cyber War Machine Hits Full Stride: What CISOs Must Do Right Now\r\nRead More\r\nhttps://www.anomali.com/blog/aggah-using-compromised-websites-to-target-businesses-across-asia-including-taiwan-manufacturing-industry\r\nPage 7 of 11\n\nApril 1, 2026\r\nPublic Sector\r\nAnomali Cyber Watch\r\nWhen Federal Cyber Defenses Shrink, State Governments Stand in the Crossfire\r\nRead More\r\nMarch 31, 2026\r\nhttps://www.anomali.com/blog/aggah-using-compromised-websites-to-target-businesses-across-asia-including-taiwan-manufacturing-industry\r\nPage 8 of 11\n\nAnomali Cyber Watch\r\nIran Cyber War, Day 32: FBI Director Breached, Critical Infrastructure Under Siege, and the\r\nSilence That Should Worry You Most\r\nRead More\r\nMarch 31, 2026\r\nPublic Sector\r\nAnomali Cyber Watch\r\nThe 72-Hour Window: Critical Supply Chain and Edge Device Threats Demand Immediate State\r\nGovernment Action\r\nRead More\r\nhttps://www.anomali.com/blog/aggah-using-compromised-websites-to-target-businesses-across-asia-including-taiwan-manufacturing-industry\r\nPage 9 of 11\n\nMarch 30, 2026\r\nAnomali Cyber Watch\r\nWhen Ceasefires Don’t Apply to Cyberspace: 30 Days Into the Iran Cyber War, the Threat Has\r\nNever Been Higher\r\nRead More\r\nMarch 30, 2026\r\nPublic Sector\r\nhttps://www.anomali.com/blog/aggah-using-compromised-websites-to-target-businesses-across-asia-including-taiwan-manufacturing-industry\r\nPage 10 of 11\n\nAnomali Cyber Watch\r\nEdge Appliances Under Siege, Iran Escalates, Supply Chains Fracture: What State CISOs Must\r\nDo This Week\r\nRead More\r\nMarch 30, 2026\r\nAgentic SOC Platform\r\nFrom Copilots to Digital Employees: How Agentic AI Expands the Attack Surface\r\nRead More\r\nSource: https://www.anomali.com/blog/aggah-using-compromised-websites-to-target-businesses-across-asia-including-taiwan-manufacturing-i\r\nndustry\r\nhttps://www.anomali.com/blog/aggah-using-compromised-websites-to-target-businesses-across-asia-including-taiwan-manufacturing-industry\r\nPage 11 of 11",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"references": [
		"https://www.anomali.com/blog/aggah-using-compromised-websites-to-target-businesses-across-asia-including-taiwan-manufacturing-industry"
	],
	"report_names": [
		"aggah-using-compromised-websites-to-target-businesses-across-asia-including-taiwan-manufacturing-industry"
	],
	"threat_actors": [
		{
			"id": "42a6a29d-6b98-4fd6-a742-a45a0306c7b0",
			"created_at": "2022-10-25T15:50:23.710403Z",
			"updated_at": "2026-04-10T02:00:05.281246Z",
			"deleted_at": null,
			"main_name": "Silence",
			"aliases": [
				"Whisper Spider"
			],
			"source_name": "MITRE:Silence",
			"tools": [
				"Winexe",
				"SDelete"
			],
			"source_id": "MITRE",
			"reports": null
		},
		{
			"id": "b0d34dd6-ee90-483b-bb6c-441332274160",
			"created_at": "2022-10-25T16:07:23.296754Z",
			"updated_at": "2026-04-10T02:00:04.526403Z",
			"deleted_at": null,
			"main_name": "Aggah",
			"aliases": [
				"Operation Red Deer",
				"Operation Roma225"
			],
			"source_name": "ETDA:Aggah",
			"tools": [
				"AgenTesla",
				"Agent Tesla",
				"AgentTesla",
				"Aggah",
				"Atros2.CKPN",
				"Bladabindi",
				"Jorik",
				"Nancrat",
				"NanoCore",
				"NanoCore RAT",
				"Negasteal",
				"Origin Logger",
				"Revenge RAT",
				"RevengeRAT",
				"Revetrat",
				"Warzone",
				"Warzone RAT",
				"ZPAQ",
				"Zurten",
				"njRAT"
			],
			"source_id": "ETDA",
			"reports": null
		},
		{
			"id": "eb5915d6-49a0-464d-9e4e-e1e2d3d31bc7",
			"created_at": "2025-03-29T02:05:20.764715Z",
			"updated_at": "2026-04-10T02:00:03.851829Z",
			"deleted_at": null,
			"main_name": "GOLD WYMAN",
			"aliases": [
				"Silence "
			],
			"source_name": "Secureworks:GOLD WYMAN",
			"tools": [
				"Silence"
			],
			"source_id": "Secureworks",
			"reports": null
		},
		{
			"id": "28851008-77b4-47eb-abcd-1bb5b3f19fc2",
			"created_at": "2023-06-20T02:02:10.254614Z",
			"updated_at": "2026-04-10T02:00:03.365336Z",
			"deleted_at": null,
			"main_name": "Hagga",
			"aliases": [
				"TH-157",
				"Aggah"
			],
			"source_name": "MISPGALAXY:Hagga",
			"tools": [
				"Agent Tesla"
			],
			"source_id": "MISPGALAXY",
			"reports": null
		},
		{
			"id": "88e53203-891a-46f8-9ced-81d874a271c4",
			"created_at": "2022-10-25T16:07:24.191982Z",
			"updated_at": "2026-04-10T02:00:04.895327Z",
			"deleted_at": null,
			"main_name": "Silence",
			"aliases": [
				"ATK 86",
				"Contract Crew",
				"G0091",
				"TAG-CR8",
				"TEMP.TruthTeller",
				"Whisper Spider"
			],
			"source_name": "ETDA:Silence",
			"tools": [
				"EDA",
				"EmpireDNSAgent",
				"Farse",
				"Ivoke",
				"Kikothac",
				"LOLBAS",
				"LOLBins",
				"Living off the Land",
				"Meterpreter",
				"ProxyBot",
				"ReconModule",
				"Silence.Downloader",
				"TiniMet",
				"TinyMet",
				"TrueBot",
				"xfs-disp.exe"
			],
			"source_id": "ETDA",
			"reports": null
		}
	],
	"ts_created_at": 1775433991,
	"ts_updated_at": 1775792128,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/c7c7870e848fe83a4342c2e23ba92c0ac0f6f043.pdf",
		"text": "https://archive.orkl.eu/c7c7870e848fe83a4342c2e23ba92c0ac0f6f043.txt",
		"img": "https://archive.orkl.eu/c7c7870e848fe83a4342c2e23ba92c0ac0f6f043.jpg"
	}
}