mirror of
https://github.com/MISP/misp-galaxy.git
synced 2025-09-03 08:32:39 +00:00
jq sort keys
Allows automation to edit the files
This commit is contained in:
parent
4ff2a45cbb
commit
2fbd8ce485
49 changed files with 6527 additions and 6526 deletions
|
@ -4463,8 +4463,6 @@
|
|||
"https://researchcenter.paloaltonetworks.com/2018/04/unit42-henbox-inside-coop/"
|
||||
]
|
||||
},
|
||||
"uuid": "72c37e24-4ead-11e8-8f08-db3ec8f8db86§",
|
||||
"value": "HenBox",
|
||||
"related": [
|
||||
{
|
||||
"dest-uuid": "36ee04f4-a9df-11e8-b92b-d7ddfd3a8896",
|
||||
|
@ -4473,7 +4471,9 @@
|
|||
],
|
||||
"type": "similar"
|
||||
}
|
||||
]
|
||||
],
|
||||
"uuid": "72c37e24-4ead-11e8-8f08-db3ec8f8db86§",
|
||||
"value": "HenBox"
|
||||
},
|
||||
{
|
||||
"description": "Cybercriminals are currently developing a new strain of malware targeting Android devices which blends the features of a banking trojan, keylogger, and mobile ransomware.",
|
||||
|
@ -4496,24 +4496,24 @@
|
|||
"value": "Skygofree"
|
||||
},
|
||||
{
|
||||
"value": "BusyGasper",
|
||||
"description": "A new family of spyware for Android grabbed the attention of security researchers through its unusual set of features and their original implementation. Tagged BusyGasper by security experts at Kaspersky, the malware stands out through its ability to monitor the various sensors present on the targeted phone. Based on the motion detection logs, it can recognize the opportune time for running and stopping its activity.",
|
||||
"meta": {
|
||||
"refs": [
|
||||
"https://www.bleepingcomputer.com/news/security/unsophisticated-android-spyware-monitors-device-sensors/"
|
||||
]
|
||||
},
|
||||
"uuid": "1c8e8070-bfe2-11e8-8c3e-7f31c66687a2"
|
||||
"uuid": "1c8e8070-bfe2-11e8-8c3e-7f31c66687a2",
|
||||
"value": "BusyGasper"
|
||||
},
|
||||
{
|
||||
"value": "Triout",
|
||||
"description": "Bitdefender says Triout samples they discovered were masquerading in a clone of a legitimate application, but they were unable to discover where this malicious app was being distributed from. The obvious guess would be via third-party Android app stores, or app-sharing forums, popular in some areas of the globe.",
|
||||
"meta": {
|
||||
"refs": [
|
||||
"https://www.bleepingcomputer.com/news/security/new-android-triout-malware-can-record-phone-calls-steal-pictures/"
|
||||
]
|
||||
},
|
||||
"uuid": "08965226-c8a9-11e8-ad82-b3fe44882268"
|
||||
"uuid": "08965226-c8a9-11e8-ad82-b3fe44882268",
|
||||
"value": "Triout"
|
||||
}
|
||||
],
|
||||
"version": 14
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue