{
	"id": "fb9463f8-2304-42ec-9eb7-5b02d66e1017",
	"created_at": "2026-04-06T00:19:27.129056Z",
	"updated_at": "2026-04-10T03:23:38.370516Z",
	"deleted_at": null,
	"sha1_hash": "fb8d704ef4647002abf130bb82021fdf2b9fb481",
	"title": "Threat Group Cards: A Threat Actor Encyclopedia",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 63134,
	"plain_text": "Threat Group Cards: A Threat Actor Encyclopedia\nArchived: 2026-04-05 16:47:10 UTC\nHome \u003e List all groups \u003e List all tools \u003e List all groups using tool Stuxnet\n Tool: Stuxnet\nNames\nStuxnet\nW32.Stuxnet\nCategory Malware\nType ICS malware, Worm, Rootkit, Wiper\nDescription\n(Wikipedia) Stuxnet is a malicious computer worm, first uncovered in 2010, thought to\nhave been in development since at least 2005. Stuxnet targets supervisory control and\ndata acquisition (SCADA) systems and is believed to be responsible for causing\nsubstantial damage to the nuclear program of Iran. Although neither country has openly\nadmitted responsibility, the worm is widely understood to be a cyberweapon built jointly\nby the United States and Israel.\nInformation\nMITRE ATT\u0026CK Malpedia AlienVault OTX Last change to this tool card: 30 December 2022\nDownload this tool card in JSON format\nAll groups using tool Stuxnet\nChanged Name Country Observed\nAPT groups\nhttps://apt.etda.or.th/cgi-bin/listgroups.cgi?u=70c4a5b0-2206-4aa0-860f-128288ed2577\nPage 1 of 2\n\nOperation Olympic Games\r\n \r\n2007  \r\n1 group listed (1 APT, 0 other, 0 unknown)\r\nSource: https://apt.etda.or.th/cgi-bin/listgroups.cgi?u=70c4a5b0-2206-4aa0-860f-128288ed2577\r\nhttps://apt.etda.or.th/cgi-bin/listgroups.cgi?u=70c4a5b0-2206-4aa0-860f-128288ed2577\r\nPage 2 of 2",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"references": [
		"https://apt.etda.or.th/cgi-bin/listgroups.cgi?u=70c4a5b0-2206-4aa0-860f-128288ed2577"
	],
	"report_names": [
		"listgroups.cgi?u=70c4a5b0-2206-4aa0-860f-128288ed2577"
	],
	"threat_actors": [
		{
			"id": "d7c5a1bf-85c9-4d2f-bdbd-1455f5f2ae65",
			"created_at": "2022-10-25T16:07:23.978074Z",
			"updated_at": "2026-04-10T02:00:04.817311Z",
			"deleted_at": null,
			"main_name": "Operation Olympic Games",
			"aliases": [
				"GOSSIPGIRL"
			],
			"source_name": "ETDA:Operation Olympic Games",
			"tools": [
				"Stuxnet",
				"W32.Stuxnet"
			],
			"source_id": "ETDA",
			"reports": null
		}
	],
	"ts_created_at": 1775434767,
	"ts_updated_at": 1775791418,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/fb8d704ef4647002abf130bb82021fdf2b9fb481.pdf",
		"text": "https://archive.orkl.eu/fb8d704ef4647002abf130bb82021fdf2b9fb481.txt",
		"img": "https://archive.orkl.eu/fb8d704ef4647002abf130bb82021fdf2b9fb481.jpg"
	}
}