From 300d6087704c36c499fd92b61bf4a925b56a6c87 Mon Sep 17 00:00:00 2001 From: Delta-Sierra Date: Tue, 12 Jul 2022 10:54:37 +0200 Subject: [PATCH] jq --- clusters/ransomware.json | 1 - 1 file changed, 1 deletion(-) diff --git a/clusters/ransomware.json b/clusters/ransomware.json index b0311a0..371526c 100644 --- a/clusters/ransomware.json +++ b/clusters/ransomware.json @@ -24555,7 +24555,6 @@ }, "uuid": "5617e6fa-4e6a-4011-9385-6b1165786563", "value": "HelloXD" - }, { "description": "Maui ransomware stand out because of a lack of several key features commonly seen with tooling from RaaS providers, such as an embedded ransom note to provide recovery instructions or automated means of transmitting encryption keys to attackers. Instead, it is believed that Maui is manually operated, in which operators will specify which files to encrypt when executing it and then exfiltrate the resulting runtime artifacts. There are many aspects to Maui ransomware that are unknown, including usage context.",