mirror of
https://github.com/MISP/misp-galaxy.git
synced 2024-11-22 23:07:19 +00:00
chg: [backdoor] Adds BOLDMOVE
Signed-off-by: Jürgen Löhel <juergen.loehel@inlyse.com>
This commit is contained in:
parent
150e3152cc
commit
33513241bd
1 changed files with 13 additions and 1 deletions
|
@ -193,7 +193,19 @@
|
||||||
},
|
},
|
||||||
"uuid": "0c3b1aa5-3a33-493e-9126-28ebced4ed09",
|
"uuid": "0c3b1aa5-3a33-493e-9126-28ebced4ed09",
|
||||||
"value": "BPFDoor"
|
"value": "BPFDoor"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"description": "According to Mandiant, this malware family is attributed to potential chinese background and its Linux variant is related to exploitation of Fortinet's SSL-VPN (CVE-2022-42475).",
|
||||||
|
"meta": {
|
||||||
|
"refs": [
|
||||||
|
"https://malpedia.caad.fkie.fraunhofer.de/details/win.boldmove",
|
||||||
|
"https://malpedia.caad.fkie.fraunhofer.de/details/elf.boldmove",
|
||||||
|
"https://www.mandiant.com/resources/blog/chinese-actors-exploit-fortios-flaw"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"uuid": "2cef78bd-f097-4477-8888-79359042b515",
|
||||||
|
"value": "BOLDMOVE"
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"version": 13
|
"version": 14
|
||||||
}
|
}
|
||||||
|
|
Loading…
Reference in a new issue