default to HTTPS to be consistent with other links to same page

This commit is contained in:
Daniel Plohmann (jupiter) 2020-05-27 09:27:52 +02:00
parent 8a0a4cb02d
commit 171f272a1e

View file

@ -391,7 +391,7 @@
"https://www.cfr.org/interactive/cyber-operations/darkhotel",
"https://www.securityweek.com/darkhotel-apt-uses-new-methods-target-politicians",
"https://attack.mitre.org/groups/G0012/",
"http://www.secureworks.com/research/threat-profiles/tungsten-bridge",
"https://www.secureworks.com/research/threat-profiles/tungsten-bridge",
"https://www.antiy.cn/research/notice&report/research_report/20200522.html"
],
"synonyms": [
@ -1133,7 +1133,7 @@
"https://www.fireeye.com/blog/threat-research/2018/09/apt10-targeting-japanese-corporations-using-updated-ttps.html",
"https://www.fbi.gov/news/stories/chinese-hackers-indicted-122018",
"https://attack.mitre.org/groups/G0045/",
"http://www.secureworks.com/research/threat-profiles/bronze-riverside"
"https://www.secureworks.com/research/threat-profiles/bronze-riverside"
],
"synonyms": [
"APT10",
@ -1266,7 +1266,7 @@
"https://www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2018/march/apt15-is-alive-and-strong-an-analysis-of-royalcli-and-royaldns/",
"https://www.intezer.com/miragefox-apt15-resurfaces-with-new-tools-based-on-old-ones/",
"https://attack.mitre.org/groups/G0004/",
"http://www.secureworks.com/research/threat-profiles/bronze-palace"
"https://www.secureworks.com/research/threat-profiles/bronze-palace"
],
"synonyms": [
"Vixen Panda",
@ -1467,7 +1467,7 @@
"refs": [
"https://unit42.paloaltonetworks.com/bbsrat-attacks-targeting-russian-organizations-linked-to-roaming-tiger/",
"http://2014.zeronights.org/assets/files/slides/roaming_tiger_zeronights_2014.pdf",
"http://www.secureworks.com/research/threat-profiles/bronze-woodland"
"https://www.secureworks.com/research/threat-profiles/bronze-woodland"
],
"synonyms": [
"BRONZE WOODLAND",
@ -2019,7 +2019,7 @@
"https://blog.trendmicro.com/trendlabs-security-intelligence/more-than-a-dozen-obfuscated-apt33-botnets-used-for-extreme-narrow-targeting/",
"https://www.brighttalk.com/webcast/10703/275683",
"https://symantec-blogs.broadcom.com/blogs/threat-intelligence/elfin-apt33-espionage",
"http://www.secureworks.com/research/threat-profiles/cobalt-trinity"
"https://www.secureworks.com/research/threat-profiles/cobalt-trinity"
],
"synonyms": [
"APT 33",
@ -2511,7 +2511,7 @@
"https://www.cfr.org/interactive/cyber-operations/dukes",
"https://pylos.co/2018/11/18/cozybear-in-from-the-cold/",
"https://cloudblogs.microsoft.com/microsoftsecure/2018/12/03/analysis-of-cyberattack-on-u-s-think-tanks-non-profits-public-sector-by-unidentified-attackers/",
"http://www.secureworks.com/research/threat-profiles/iron-hemlock"
"https://www.secureworks.com/research/threat-profiles/iron-hemlock"
],
"synonyms": [
"Dukes",
@ -2604,7 +2604,7 @@
"https://www.trendmicro.com/vinfo/vn/security/news/cyber-attacks/cyberespionage-group-turla-deploys-backdoor-ahead-of-g20-summit",
"https://www.zdnet.com/article/this-hacking-gang-just-updated-the-malware-it-uses-against-uk-targets/",
"https://attack.mitre.org/groups/G0010/",
"http://www.secureworks.com/research/threat-profiles/iron-hunter"
"https://www.secureworks.com/research/threat-profiles/iron-hunter"
],
"synonyms": [
"Turla",
@ -2859,7 +2859,7 @@
"https://www.fireeye.com/blog/threat-research/2018/08/fin7-pursuing-an-enigmatic-and-evasive-global-criminal-operation.html",
"https://attack.mitre.org/groups/G0046/",
"https://go.crowdstrike.com/rs/281-OBQ-266/images/Report2020CrowdStrikeGlobalThreatReport.pdf",
"http://www.secureworks.com/research/threat-profiles/gold-niagara"
"https://www.secureworks.com/research/threat-profiles/gold-niagara"
],
"synonyms": [
"Carbanak",
@ -3117,7 +3117,7 @@
"https://threatpost.com/banco-de-chile-wiper-attack-just-a-cover-for-10m-swift-heist/132796/",
"https://www.darkreading.com/attacks-breaches/north-korean-hacking-group-steals-$135-million-from-indian-bank-/d/d-id/1332678",
"https://www.zdnet.com/article/north-korean-hackers-infiltrate-chiles-atm-network-after-skype-job-interview/",
"http://www.secureworks.com/research/threat-profiles/nickel-gladstone"
"https://www.secureworks.com/research/threat-profiles/nickel-gladstone"
],
"synonyms": [
"Operation DarkSeoul",
@ -3303,7 +3303,7 @@
"https://cysinfo.com/cyber-attack-targeting-cbi-and-possibly-indian-army-officials",
"https://s.tencent.com/research/report/669.html",
"https://www.fireeye.com/blog/threat-research/2016/06/apt_group_sends_spea.html",
"http://www.secureworks.com/research/threat-profiles/copper-fieldstone"
"https://www.secureworks.com/research/threat-profiles/copper-fieldstone"
],
"synonyms": [
"C-Major",
@ -3436,7 +3436,7 @@
"https://documents.trendmicro.com/assets/tech-brief-untangling-the-patchwork-cyberespionage-group.pdf",
"https://securelist.com/the-dropping-elephant-actor/75328/",
"https://www.forcepoint.com/sites/default/files/resources/files/forcepoint-security-labs-monsoon-analysis-report.pdf",
"http://www.secureworks.com/research/threat-profiles/zinc-emerson"
"https://www.secureworks.com/research/threat-profiles/zinc-emerson"
],
"synonyms": [
"Chinastrats",
@ -3537,7 +3537,7 @@
"https://www.phnompenhpost.com/national/kingdom-targeted-new-malware",
"https://attack.mitre.org/groups/G0017/",
"https://attack.mitre.org/groups/G0002/",
"http://www.secureworks.com/research/threat-profiles/bronze-overbrook"
"https://www.secureworks.com/research/threat-profiles/bronze-overbrook"
],
"synonyms": [
"Moafee",
@ -3883,7 +3883,7 @@
"https://www.clearskysec.com/oilrig/",
"https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/shamoon-attackers-employ-new-tool-kit-to-wipe-infected-systems/",
"https://attack.mitre.org/groups/G0049/",
"http://www.secureworks.com/research/threat-profiles/cobalt-gypsy"
"https://www.secureworks.com/research/threat-profiles/cobalt-gypsy"
],
"synonyms": [
"Twisted Kitten",
@ -4246,7 +4246,7 @@
"https://en.wikipedia.org/wiki/Stuxnet",
"https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2018/03/08064459/Equation_group_questions_and_answers.pdf",
"https://attack.mitre.org/groups/G0020/",
"http://www.secureworks.com/research/threat-profiles/platinum-terminal"
"https://www.secureworks.com/research/threat-profiles/platinum-terminal"
],
"synonyms": [
"Tilded Team",
@ -4514,7 +4514,7 @@
"https://github.com/eset/malware-research/tree/master/oceanlotus",
"https://www.cfr.org/interactive/cyber-operations/ocean-lotus",
"https://www.accenture.com/us-en/blogs/blogs-pond-loach-delivers-badcake-malware",
"http://www.secureworks.com/research/threat-profiles/tin-woodlawn"
"https://www.secureworks.com/research/threat-profiles/tin-woodlawn"
],
"synonyms": [
"OceanLotus Group",
@ -5012,7 +5012,7 @@
"https://blog.fox-it.com/2016/06/15/mofang-a-politically-motivated-information-stealing-adversary/",
"https://www.cfr.org/interactive/cyber-operations/mofang",
"https://foxitsecurity.files.wordpress.com/2016/06/fox-it_mofang_threatreport_tlp-white.pdf",
"http://www.secureworks.com/research/threat-profiles/bronze-walker"
"https://www.secureworks.com/research/threat-profiles/bronze-walker"
],
"synonyms": [
"Superman",
@ -6242,7 +6242,7 @@
"https://labs.bitdefender.com/2018/02/operation-pzchao-a-possible-return-of-the-iron-tiger-apt/",
"https://securelist.com/luckymouse-hits-national-data-center/86083/",
"https://attack.mitre.org/groups/G0027/",
"http://www.secureworks.com/research/threat-profiles/bronze-union"
"https://www.secureworks.com/research/threat-profiles/bronze-union"
],
"synonyms": [
"Emissary Panda",
@ -6558,7 +6558,7 @@
"https://www.cfr.org/interactive/cyber-operations/mustang-panda",
"https://www.crowdstrike.com/blog/meet-crowdstrikes-adversary-of-the-month-for-june-mustang-panda/",
"https://go.crowdstrike.com/rs/281-OBQ-266/images/Report2020CrowdStrikeGlobalThreatReport.pdf",
"http://www.secureworks.com/research/threat-profiles/bronze-president"
"https://www.secureworks.com/research/threat-profiles/bronze-president"
],
"synonyms": [
"BRONZE PRESIDENT",
@ -6910,7 +6910,7 @@
"https://www.fireeye.com/blog/threat-research/2019/01/global-dns-hijacking-campaign-dns-record-manipulation-at-scale.html",
"https://www.crowdstrike.com/blog/widespread-dns-hijacking-activity-targets-multiple-sectors/",
"https://krebsonsecurity.com/tag/dnspionage/",
"http://www.secureworks.com/research/threat-profiles/cobalt-edgewater"
"https://www.secureworks.com/research/threat-profiles/cobalt-edgewater"
],
"synonyms": [
"COBALT EDGEWATER"
@ -7019,7 +7019,7 @@
"https://threatpost.com/ta505-servhelper-malware/140792/",
"https://blog.yoroi.company/research/the-stealthy-email-stealer-in-the-ta505-arsenal/",
"https://threatrecon.nshc.net/2019/08/29/sectorj04-groups-increased-activity-in-2019/",
"http://www.secureworks.com/research/threat-profiles/gold-tahoe"
"https://www.secureworks.com/research/threat-profiles/gold-tahoe"
],
"synonyms": [
"SectorJ04 Group",
@ -7055,7 +7055,7 @@
"https://www.crowdstrike.com/blog/wizard-spider-adds-new-feature-to-ryuk-ransomware/",
"https://www.cybereason.com/blog/dropping-anchor-from-a-trickbot-infection-to-the-discovery-of-the-anchor-malware",
"https://www.fireeye.com/blog/threat-research/2019/01/a-nasty-trick-from-credential-theft-malware-to-business-disruption.html",
"http://www.secureworks.com/research/threat-profiles/gold-ulrick"
"https://www.secureworks.com/research/threat-profiles/gold-ulrick"
],
"synonyms": [
"TEMP.MixMaster"
@ -7071,7 +7071,7 @@
"https://www.crowdstrike.com/blog/big-game-hunting-with-ryuk-another-lucrative-targeted-ransomware/",
"https://www.crowdstrike.com/blog/meet-crowdstrikes-adversary-of-the-month-for-february-mummy-spider/",
"https://www.proofpoint.com/us/threat-insight/post/threat-actor-profile-ta542-banker-malware-distribution-service",
"http://www.secureworks.com/research/threat-profiles/gold-crestwood"
"https://www.secureworks.com/research/threat-profiles/gold-crestwood"
],
"synonyms": [
"TA542",
@ -7139,7 +7139,7 @@
"https://www.symantec.com/connect/blogs/iran-based-attackers-use-back-door-threats-spy-middle-eastern-targets",
"https://attack.mitre.org/groups/G0087/",
"https://go.crowdstrike.com/rs/281-OBQ-266/images/Report2020CrowdStrikeGlobalThreatReport.pdf",
"http://www.secureworks.com/research/threat-profiles/cobalt-hickman"
"https://www.secureworks.com/research/threat-profiles/cobalt-hickman"
],
"synonyms": [
"APT 39",
@ -7176,7 +7176,7 @@
"meta": {
"refs": [
"https://www.crowdstrike.com/resources/reports/2019-crowdstrike-global-threat-report/",
"http://www.secureworks.com/research/threat-profiles/gold-lowell"
"https://www.secureworks.com/research/threat-profiles/gold-lowell"
],
"synonyms": [
"GOLD LOWELL"
@ -7276,7 +7276,7 @@
"https://www.crowdstrike.com/resources/reports/2019-crowdstrike-global-threat-report/",
"https://www.crowdstrike.com/blog/wizard-spider-lunar-spider-shared-proxy-module/",
"https://www.crowdstrike.com/blog/sin-ful-spiders-wizard-spider-and-lunar-spider-sharing-the-same-web/",
"http://www.secureworks.com/research/threat-profiles/gold-swathmore"
"https://www.secureworks.com/research/threat-profiles/gold-swathmore"
],
"synonyms": [
"GOLD SWATHMORE"
@ -7408,7 +7408,7 @@
"https://www.secureworks.com/blog/back-to-school-cobalt-dickens-targets-universities",
"https://www.proofpoint.com/us/threat-insight/post/seems-phishy-back-school-lures-target-university-students-and-staff",
"https://www.proofpoint.com/us/threat-insight/post/threat-actor-profile-ta407-silent-librarian",
"http://www.secureworks.com/research/threat-profiles/cobalt-dickens"
"https://www.secureworks.com/research/threat-profiles/cobalt-dickens"
],
"synonyms": [
"COBALT DICKENS",
@ -7428,7 +7428,7 @@
"https://duo.com/decipher/apt-groups-moving-down-the-supply-chain",
"https://redalert.nshc.net/2019/12/03/threat-actor-targeting-hong-kong-activists",
"https:/twitter.com/bkMSFT/status/1201876664667582466",
"http://www.secureworks.com/research/threat-profiles/bronze-vinewood"
"https://www.secureworks.com/research/threat-profiles/bronze-vinewood"
],
"synonyms": [
"APT 31",
@ -7796,7 +7796,7 @@
"meta": {
"refs": [
"https://www.secureworks.com/blog/lyceum-takes-center-stage-in-middle-east-campaign",
"http://www.secureworks.com/research/threat-profiles/cobalt-lyceum"
"https://www.secureworks.com/research/threat-profiles/cobalt-lyceum"
],
"synonyms": [
"COBALT LYCEUM"
@ -8314,7 +8314,7 @@
"description": "COBALT JUNO has operated since at least 2013 and focused on targets located in the Middle East including Iran, Jordan, Egypt & Lebanon. COBALT JUNO custom spyware families SABER1 and SABER2, include surveillance functionality and masquerade as legitimate software utilities such as Adobe Updater, StickyNote and ASKDownloader. CTU researchers assess with moderate confidence that COBALT JUNO operated the ZooPark Android spyware since at least mid-2015. ZooPark was publicly exposed in 2018 in both vendor reporting and a high profile leak of C2 server data. COBALT JUNO is linked to a private security company in Iran and outsources aspects of tool development work to commercial software developers. CTU researchers have observed the group using strategic web compromises to deliver malware. CTU researchers discovery of new C2 domains in 2019 suggest the group is still actively performing operations.",
"meta": {
"refs": [
"http://www.secureworks.com/research/threat-profiles/cobalt-juno"
"https://www.secureworks.com/research/threat-profiles/cobalt-juno"
],
"synonyms": [
"APT-C-38 (QiAnXin)",
@ -8329,7 +8329,7 @@
"description": "COBALT KATANA has been active since at least March 2018, and it focuses many of its operations on organizations based in or associated with Kuwait. The group has targeted government, logistics, and shipping organizations. The threat actors gain initial access to targets using DNS hijacking, strategic web compromise with SMB forced authentication, and password brute force attacks. COBALT KATANA operates a custom platform referred to as the Sakabota Framework, also referred to as Sakabota Core, with a complimentary set of modular backdoors and accessory tools including Gon, Hisoka, Hisoka Netero, Killua, Diezen, and Eye. The group has implemented DNS tunnelling in its malware and malicious scripts and also operates the HyphenShell web shell to strengthen post-intrusion access. CTU researchers assess with moderate confidence that COBALT KATANA operates on behalf of Iran, and elements of its operations such as overlapping infrastructure, use of DNS hijacking, implementation of DNS-based C2 channels in malware and web shell security mechanisms suggest connections to COBALT GYPSY and COBALT EDGEWATER.",
"meta": {
"refs": [
"http://www.secureworks.com/research/threat-profiles/cobalt-katana"
"https://www.secureworks.com/research/threat-profiles/cobalt-katana"
],
"synonyms": [
"Hive0081 (IBM)",