mirror of
https://github.com/MISP/misp-galaxy.git
synced 2024-11-22 14:57:18 +00:00
fix duplicate
This commit is contained in:
parent
a984786c8b
commit
30f042211b
1 changed files with 17 additions and 19 deletions
|
@ -665,8 +665,7 @@
|
|||
"https://www.bleepingcomputer.com/news/security/teamviewer-confirms-undisclosed-breach-from-2016/",
|
||||
"https://blog.trendmicro.com/trendlabs-security-intelligence/winnti-abuses-github/",
|
||||
"https://www.dw.com/en/bayer-points-finger-at-wicked-panda-in-cyberattack/a-48196004",
|
||||
"https://www.welivesecurity.com/2019/03/11/gaming-industry-scope-attackers-asia/",
|
||||
"https://securelist.com/winnti-more-than-just-a-game/37029/",
|
||||
"https://www.welivesecurity.com/2019/03/11/gaming-industry-scope-attackers-asia/",,
|
||||
"https://401trg.com/burning-umbrella/",
|
||||
"https://attack.mitre.org/groups/G0044/",
|
||||
"https://www.crowdstrike.com/blog/meet-crowdstrikes-adversary-of-the-month-for-july-wicked-spider/"
|
||||
|
@ -2530,29 +2529,28 @@
|
|||
"cfr-type-of-incident": "Espionage",
|
||||
"country": "RU",
|
||||
"refs": [
|
||||
"https://www.first.org/resources/papers/tbilisi2014/turla-operations_and_development.pdf",
|
||||
"https://www.circl.lu/pub/tr-25/",
|
||||
"https://www.theguardian.com/technology/2014/aug/07/turla-hackers-spying-governments-researcher-kaspersky-symantec",
|
||||
"https://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/waterbug-attack-group.pdf",
|
||||
"https://securelist.com/analysis/publications/65545/the-epic-turla-operation/",
|
||||
"https://securelist.com/blog/research/72081/satellite-turla-apt-command-and-control-in-the-sky/",
|
||||
"https://securelist.com/blog/research/67962/the-penquin-turla-2/",
|
||||
"https://www2.fireeye.com/rs/848-DID-242/images/rpt-witchcoven.pdf",
|
||||
"https://www.welivesecurity.com/2017/03/30/carbon-paper-peering-turlas-second-stage-backdoor/",
|
||||
"https://www.cfr.org/interactive/cyber-operations/turla",
|
||||
"https://www.bleepingcomputer.com/news/security/turla-outlook-backdoor-uses-clever-tactics-for-stealth-and-persistence/",
|
||||
"https://www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2018/november/turla-png-dropper-is-back/",
|
||||
"http://download.bitdefender.com/resources/files/News/CaseStudies/study/115/Bitdefender-Whitepaper-PAC-A4-en-EN1.pdf",
|
||||
"https://www.kaspersky.com/blog/moonlight-maze-the-lessons/6713/",
|
||||
"https://www.nytimes.com/2010/08/26/technology/26cyber.html",
|
||||
"https://yle.fi/uutiset/osasto/news/russian_group_behind_2013_foreign_ministry_hack/8591548",
|
||||
"https://securelist.com/introducing-whitebear/81638/",
|
||||
"https://securelist.com/the-epic-turla-operation/65545/",
|
||||
"https://www.melani.admin.ch/melani/en/home/dokumentation/reports/technical-reports/technical-report_apt_case_ruag.html",
|
||||
"https://www.cfr.org/interactive/cyber-operations/turla",
|
||||
"https://www.nytimes.com/2010/08/26/technology/26cyber.html",
|
||||
"https://securelist.com/blog/research/67962/the-penquin-turla-2/",
|
||||
"https://www.kaspersky.com/blog/moonlight-maze-the-lessons/6713/",
|
||||
"https://www2.fireeye.com/rs/848-DID-242/images/rpt-witchcoven.pdf",
|
||||
"https://securelist.com/analysis/publications/65545/the-epic-turla-operation/",
|
||||
"https://threatpost.com/linux-modules-connected-to-turla-apt-discovered/109765/",
|
||||
"https://securelist.com/satellite-turla-apt-command-and-control-in-the-sky/72081/",
|
||||
"https://www.welivesecurity.com/2018/05/22/turla-mosquito-shift-towards-generic-tools/",
|
||||
"https://securelist.com/introducing-whitebear/81638/",
|
||||
"https://www.first.org/resources/papers/tbilisi2014/turla-operations_and_development.pdf",
|
||||
"https://yle.fi/uutiset/osasto/news/russian_group_behind_2013_foreign_ministry_hack/8591548",
|
||||
"https://www.welivesecurity.com/2017/03/30/carbon-paper-peering-turlas-second-stage-backdoor/",
|
||||
"https://securelist.com/blog/research/72081/satellite-turla-apt-command-and-control-in-the-sky/",
|
||||
"https://www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2018/november/turla-png-dropper-is-back/",
|
||||
"https://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/waterbug-attack-group.pdf",
|
||||
"https://www.theguardian.com/technology/2014/aug/07/turla-hackers-spying-governments-researcher-kaspersky-symantec",
|
||||
"https://www.bleepingcomputer.com/news/security/turla-outlook-backdoor-uses-clever-tactics-for-stealth-and-persistence/",
|
||||
"http://download.bitdefender.com/resources/files/News/CaseStudies/study/115/Bitdefender-Whitepaper-PAC-A4-en-EN1.pdf",
|
||||
"https://www.melani.admin.ch/melani/en/home/dokumentation/reports/technical-reports/technical-report_apt_case_ruag.html",
|
||||
"https://unit42.paloaltonetworks.com/unit42-kazuar-multiplatform-espionage-backdoor-api-access/",
|
||||
"https://www.engadget.com/2017/06/07/russian-malware-hidden-britney-spears-instagram/",
|
||||
"https://www.welivesecurity.com/wp-content/uploads/2017/08/eset-gazer.pdf",
|
||||
|
|
Loading…
Reference in a new issue