mirror of
https://github.com/MISP/misp-galaxy.git
synced 2024-11-26 16:57:18 +00:00
chg: [tool] jq all the things
This commit is contained in:
parent
088e7477a6
commit
094f0e0684
1 changed files with 3 additions and 3 deletions
|
@ -7632,14 +7632,14 @@
|
|||
"value": "Brushaloader"
|
||||
},
|
||||
{
|
||||
"uuid": "a9fc6d3d-09d5-45c3-a91e-e8c61ef37908",
|
||||
"value": "Karkoff",
|
||||
"description": "In addition to increased reports of threat activity, we have also discovered new evidence that the threat actors behind the DNSpionage campaign continue to change their tactics, likely in an attempt to improve the efficacy of their operations. In February, we discovered some changes to the actors' tactics, techniques and procedures (TTPs), including the use of a new reconnaissance phase that selectively chooses which targets to infect with malware. In April 2019, we also discovered the actors using a new malware, which we are calling Karkoff.",
|
||||
"meta": {
|
||||
"refs": [
|
||||
"https://blog.talosintelligence.com/2019/04/dnspionage-brings-out-karkoff.html"
|
||||
]
|
||||
},
|
||||
"description": "In addition to increased reports of threat activity, we have also discovered new evidence that the threat actors behind the DNSpionage campaign continue to change their tactics, likely in an attempt to improve the efficacy of their operations. In February, we discovered some changes to the actors' tactics, techniques and procedures (TTPs), including the use of a new reconnaissance phase that selectively chooses which targets to infect with malware. In April 2019, we also discovered the actors using a new malware, which we are calling Karkoff."
|
||||
"uuid": "a9fc6d3d-09d5-45c3-a91e-e8c61ef37908",
|
||||
"value": "Karkoff"
|
||||
}
|
||||
],
|
||||
"version": 117
|
||||
|
|
Loading…
Reference in a new issue