add several references for Emotet and others

This commit is contained in:
Deborah Servili 2018-11-22 08:37:45 +01:00
parent ce61b2d2dd
commit 2f5031b845
No known key found for this signature in database
GPG key ID: 7E3A832850D4D7D1
3 changed files with 15 additions and 7 deletions

View file

@ -379,7 +379,8 @@
"https://blog.malwarebytes.com/threat-analysis/2016/10/trick-bot-dyrezas-successor/", "https://blog.malwarebytes.com/threat-analysis/2016/10/trick-bot-dyrezas-successor/",
"https://blog.malwarebytes.com/threat-analysis/2017/08/trickbot-comes-with-new-tricks-attacking-outlook-and-browsing-data/", "https://blog.malwarebytes.com/threat-analysis/2017/08/trickbot-comes-with-new-tricks-attacking-outlook-and-browsing-data/",
"http://www.pwc.co.uk/issues/cyber-security-data-privacy/research/trickbots-bag-of-tricks.html", "http://www.pwc.co.uk/issues/cyber-security-data-privacy/research/trickbots-bag-of-tricks.html",
"https://www.flashpoint-intel.com/blog/new-version-trickbot-adds-worm-propagation-module/" "https://www.flashpoint-intel.com/blog/new-version-trickbot-adds-worm-propagation-module/",
"https://www.bleepingcomputer.com/news/security/trickbot-banking-trojan-starts-stealing-windows-problem-history/"
], ],
"synonyms": [ "synonyms": [
"Trickster", "Trickster",
@ -477,7 +478,10 @@
"date": "Discovered ~Summer 2014", "date": "Discovered ~Summer 2014",
"refs": [ "refs": [
"https://feodotracker.abuse.ch/", "https://feodotracker.abuse.ch/",
"http://blog.trendmicro.com/trendlabs-security-intelligence/new-banking-malware-uses-network-sniffing-for-data-theft/" "http://blog.trendmicro.com/trendlabs-security-intelligence/new-banking-malware-uses-network-sniffing-for-data-theft/",
"https://www.bleepingcomputer.com/news/security/emotet-banking-trojan-loves-usa-internet-providers/",
"https://www.bleepingcomputer.com/news/security/emotet-returns-with-thanksgiving-theme-and-better-phishing-tricks/",
"https://www.forcepoint.com/blog/security-labs/thanks-giving-emotet"
], ],
"synonyms": [ "synonyms": [
"Feodo Version C", "Feodo Version C",
@ -1176,5 +1180,5 @@
"value": "CamuBot" "value": "CamuBot"
} }
], ],
"version": 15 "version": 16
} }

View file

@ -5921,7 +5921,9 @@
"refs": [ "refs": [
"https://www.bleepingcomputer.com/news/security/british-airways-fell-victim-to-card-scraping-attack/", "https://www.bleepingcomputer.com/news/security/british-airways-fell-victim-to-card-scraping-attack/",
"https://www.bleepingcomputer.com/news/security/feedify-hacked-with-magecart-information-stealing-script/", "https://www.bleepingcomputer.com/news/security/feedify-hacked-with-magecart-information-stealing-script/",
"https://www.bleepingcomputer.com/news/security/magecart-group-compromises-plugin-used-in-thousands-of-stores-makes-rookie-mistake/" "https://www.bleepingcomputer.com/news/security/magecart-group-compromises-plugin-used-in-thousands-of-stores-makes-rookie-mistake/",
"https://www.bleepingcomputer.com/news/security/visiondirect-data-breach-caused-by-magecart-attack/",
"https://www.bleepingcomputer.com/news/security/magecart-group-sabotages-rival-to-ruin-data-and-reputation/"
] ]
}, },
"uuid": "0768fd50-c547-11e8-9aa5-776183769eab", "uuid": "0768fd50-c547-11e8-9aa5-776183769eab",
@ -6017,5 +6019,5 @@
"value": "HookAds" "value": "HookAds"
} }
], ],
"version": 79 "version": 80
} }

View file

@ -1994,7 +1994,9 @@
{ {
"meta": { "meta": {
"refs": [ "refs": [
"https://securelist.com/analysis/publications/69560/the-banking-trojan-emotet-detailed-analysis/" "https://securelist.com/analysis/publications/69560/the-banking-trojan-emotet-detailed-analysis/",
"https://www.forcepoint.com/blog/security-labs/thanks-giving-emotet",
"https://www.bleepingcomputer.com/news/security/emotet-returns-with-thanksgiving-theme-and-better-phishing-tricks/"
], ],
"synonyms": [ "synonyms": [
"Geodo" "Geodo"
@ -7404,5 +7406,5 @@
"value": "China Chopper" "value": "China Chopper"
} }
], ],
"version": 100 "version": 101
} }