{
  "type": "URL",
  "indicator": "https://usaid.theyardservice.com/d/",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://usaid.theyardservice.com/d/",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 3011494341,
      "indicator": "https://usaid.theyardservice.com/d/",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 1,
      "pulses": [
        {
          "id": "60afece345be6dfd2a66ea3c",
          "name": "Suspected APT29 Operation Launches Election Fraud Themed Phishing Campaigns",
          "description": "Volexity, a security firm, has identified and identified a phishing campaign targeting government agencies across the United States and Europe that is believed to be related to APT29.",
          "modified": "2021-07-02T00:00:45.508000",
          "created": "2021-05-27T19:02:59.218000",
          "tags": [
            "cobaltstrike",
            "apt29",
            "dark halo",
            "lnk file",
            "usaid",
            "europe",
            "malware",
            "NOBELIUM"
          ],
          "references": [
            "https://www.volexity.com/blog/2021/05/27/suspected-apt29-operation-launches-election-fraud-themed-phishing-campaigns/",
            "https://www.microsoft.com/security/blog/2021/05/27/new-sophisticated-email-based-attack-from-nobelium/",
            "https://us-cert.cisa.gov/ncas/analysis-reports/ar21-148a",
            "https://us-cert.cisa.gov/ncas/alerts/aa21-148a",
            "https://github.com/microsoft/mstic/blob/master/Indicators/May21-NOBELIUM/May21NOBELIUMIoCs.csv"
          ],
          "public": 1,
          "adversary": "APT29",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "CobaltStrike",
              "display_name": "CobaltStrike",
              "target": null
            },
            {
              "id": "FreshFire",
              "display_name": "FreshFire",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1610",
              "name": "Deploy Container",
              "display_name": "T1610 - Deploy Container"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1204.001",
              "name": "Malicious Link",
              "display_name": "T1204.001 - Malicious Link"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1055.001",
              "name": "Dynamic-link Library Injection",
              "display_name": "T1055.001 - Dynamic-link Library Injection"
            },
            {
              "id": "T1566.002",
              "name": "Spearphishing Link",
              "display_name": "T1566.002 - Spearphishing Link"
            }
          ],
          "industries": [
            "Government",
            "NGO"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 327,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "AlienVault",
            "id": "2",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_2/resized/80/avatar_dacfad0ca8.png",
            "is_subscribed": true,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 19,
            "FileHash-MD5": 42,
            "FileHash-SHA256": 74,
            "FileHash-SHA1": 62,
            "domain": 21,
            "URL": 5,
            "YARA": 3
          },
          "indicator_count": 226,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 377532,
          "modified_text": "1752 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "https://www.microsoft.com/security/blog/2021/05/27/new-sophisticated-email-based-attack-from-nobelium/",
        "https://us-cert.cisa.gov/ncas/analysis-reports/ar21-148a",
        "https://www.volexity.com/blog/2021/05/27/suspected-apt29-operation-launches-election-fraud-themed-phishing-campaigns/",
        "https://us-cert.cisa.gov/ncas/alerts/aa21-148a",
        "https://github.com/microsoft/mstic/blob/master/Indicators/May21-NOBELIUM/May21NOBELIUMIoCs.csv"
      ],
      "related": {
        "alienvault": {
          "adversary": [
            "APT29"
          ],
          "malware_families": [
            "Freshfire",
            "Cobaltstrike"
          ],
          "industries": [
            "Ngo",
            "Government"
          ],
          "unique_indicators": 235
        },
        "other": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/theyardservice.com",
    "whois": "http://whois.domaintools.com/theyardservice.com",
    "domain": "theyardservice.com",
    "hostname": "usaid.theyardservice.com"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 1,
  "pulses": [
    {
      "id": "60afece345be6dfd2a66ea3c",
      "name": "Suspected APT29 Operation Launches Election Fraud Themed Phishing Campaigns",
      "description": "Volexity, a security firm, has identified and identified a phishing campaign targeting government agencies across the United States and Europe that is believed to be related to APT29.",
      "modified": "2021-07-02T00:00:45.508000",
      "created": "2021-05-27T19:02:59.218000",
      "tags": [
        "cobaltstrike",
        "apt29",
        "dark halo",
        "lnk file",
        "usaid",
        "europe",
        "malware",
        "NOBELIUM"
      ],
      "references": [
        "https://www.volexity.com/blog/2021/05/27/suspected-apt29-operation-launches-election-fraud-themed-phishing-campaigns/",
        "https://www.microsoft.com/security/blog/2021/05/27/new-sophisticated-email-based-attack-from-nobelium/",
        "https://us-cert.cisa.gov/ncas/analysis-reports/ar21-148a",
        "https://us-cert.cisa.gov/ncas/alerts/aa21-148a",
        "https://github.com/microsoft/mstic/blob/master/Indicators/May21-NOBELIUM/May21NOBELIUMIoCs.csv"
      ],
      "public": 1,
      "adversary": "APT29",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "CobaltStrike",
          "display_name": "CobaltStrike",
          "target": null
        },
        {
          "id": "FreshFire",
          "display_name": "FreshFire",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1070",
          "name": "Indicator Removal on Host",
          "display_name": "T1070 - Indicator Removal on Host"
        },
        {
          "id": "T1573",
          "name": "Encrypted Channel",
          "display_name": "T1573 - Encrypted Channel"
        },
        {
          "id": "T1610",
          "name": "Deploy Container",
          "display_name": "T1610 - Deploy Container"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1204.001",
          "name": "Malicious Link",
          "display_name": "T1204.001 - Malicious Link"
        },
        {
          "id": "T1204",
          "name": "User Execution",
          "display_name": "T1204 - User Execution"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1055.001",
          "name": "Dynamic-link Library Injection",
          "display_name": "T1055.001 - Dynamic-link Library Injection"
        },
        {
          "id": "T1566.002",
          "name": "Spearphishing Link",
          "display_name": "T1566.002 - Spearphishing Link"
        }
      ],
      "industries": [
        "Government",
        "NGO"
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 327,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 1,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "AlienVault",
        "id": "2",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_2/resized/80/avatar_dacfad0ca8.png",
        "is_subscribed": true,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 19,
        "FileHash-MD5": 42,
        "FileHash-SHA256": 74,
        "FileHash-SHA1": 62,
        "domain": 21,
        "URL": 5,
        "YARA": 3
      },
      "indicator_count": 226,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 377532,
      "modified_text": "1752 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://usaid.theyardservice.com/d/",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://usaid.theyardservice.com/d/",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776611816.084275
}