fixed typo in actor name (CLOCKWORD -> CLOCKWORK SPIDER)

This commit is contained in:
Daniel Plohmann 2021-08-19 06:02:40 +02:00 committed by GitHub
parent 959b919dc6
commit 3272960a14
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23

View file

@ -7973,7 +7973,7 @@
] ]
}, },
"uuid": "2d2f3b53-c544-4823-a65f-da53ff8f594e", "uuid": "2d2f3b53-c544-4823-a65f-da53ff8f594e",
"value": "CLOCKWORD SPIDER" "value": "CLOCKWORK SPIDER"
}, },
{ {
"description": "In June 2019, CrowdStrike Intelligence observed a source code fork of BitPaymer and began tracking the new ransomware strain as DoppelPaymer. Further technical analysis revealed an increasing divergence between two versions of Dridex, with the new version dubbed DoppelDridex. Based on this evidence, CrowdStrike Intelligence assessed with high confidence that a new group split off from INDRIK SPIDER to form the adversary DOPPEL SPIDER. Following DOPPEL SPIDERs inception, CrowdStrike Intelligence observed multiple BGH incidents attributed to the group, with the largest known ransomware demand being 250 BTC. Other demands were not nearly as high, suggesting that the group conducts network reconnaissance to determine the value of the victim organization.", "description": "In June 2019, CrowdStrike Intelligence observed a source code fork of BitPaymer and began tracking the new ransomware strain as DoppelPaymer. Further technical analysis revealed an increasing divergence between two versions of Dridex, with the new version dubbed DoppelDridex. Based on this evidence, CrowdStrike Intelligence assessed with high confidence that a new group split off from INDRIK SPIDER to form the adversary DOPPEL SPIDER. Following DOPPEL SPIDERs inception, CrowdStrike Intelligence observed multiple BGH incidents attributed to the group, with the largest known ransomware demand being 250 BTC. Other demands were not nearly as high, suggesting that the group conducts network reconnaissance to determine the value of the victim organization.",