diff --git a/clusters/target-information.json b/clusters/target-information.json index b460f6e..ae398fc 100644 --- a/clusters/target-information.json +++ b/clusters/target-information.json @@ -1154,7 +1154,7 @@ "French" ], "territory-type": [ - "Counry" + "Country" ], "top-level-domain": ".bf" }, diff --git a/clusters/threat-actor.json b/clusters/threat-actor.json index 0f24a05..d504609 100644 --- a/clusters/threat-actor.json +++ b/clusters/threat-actor.json @@ -4302,7 +4302,8 @@ "https://unit42.paloaltonetworks.com/unit-42-title-gamaredon-group-toolset-evolution/", "https://attack.mitre.org/groups/G0047/", "https://github.com/StrangerealIntel/CyberThreatIntel/tree/master/Russia/APT/Gamaredon", - "https://go.crowdstrike.com/rs/281-OBQ-266/images/Report2020CrowdStrikeGlobalThreatReport.pdf" + "https://go.crowdstrike.com/rs/281-OBQ-266/images/Report2020CrowdStrikeGlobalThreatReport.pdf", + "https://www.welivesecurity.com/2020/06/18/digging-up-invisimole-hidden-arsenal/" ], "synonyms": [ "Primitive Bear" @@ -8121,7 +8122,8 @@ ], "cfr-type-of-incident": "Espionage", "refs": [ - "https://www.welivesecurity.com/2018/06/07/invisimole-equipped-spyware-undercover/" + "https://www.welivesecurity.com/2018/06/07/invisimole-equipped-spyware-undercover/", + "https://www.welivesecurity.com/2020/06/18/digging-up-invisimole-hidden-arsenal/" ] }, "uuid": "87af83a4-ced4-4e7c-96a6-86612dc095b1",