From 8240934eb53eadab5b2be564cd2684915be6b156 Mon Sep 17 00:00:00 2001 From: Deborah Servili Date: Thu, 11 Jan 2018 16:01:19 +0100 Subject: [PATCH] fix forgotten value Microcin --- clusters/threat-actor.json | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/clusters/threat-actor.json b/clusters/threat-actor.json index c684238..d85ca33 100644 --- a/clusters/threat-actor.json +++ b/clusters/threat-actor.json @@ -2246,7 +2246,7 @@ "value": "MoneyTaker" }, { - "value": "", + "value": "Microcin", "description": "We’re already used to the fact that complex cyberattacks use 0-day vulnerabilities, bypassing digital signature checks, virtual file systems, non-standard encryption algorithms and other tricks. Sometimes, however, all of this may be done in much simpler ways, as was the case in the malicious campaign that we detected a while ago – we named it ‘Microcin’ after microini, one of the malicious components used in it.", "meta": { "refs": [