mirror of
https://github.com/MISP/misp-galaxy.git
synced 2024-11-22 23:07:19 +00:00
add Operation Comando - hit version 100
This commit is contained in:
parent
5db30ba974
commit
5ce8aae89e
1 changed files with 11 additions and 1 deletions
|
@ -6620,7 +6620,17 @@
|
||||||
},
|
},
|
||||||
"uuid": "dc15f388-a353-4185-b28e-015745f708ba",
|
"uuid": "dc15f388-a353-4185-b28e-015745f708ba",
|
||||||
"value": "SandCat"
|
"value": "SandCat"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"description": "Operation Comando is a pure cybercrime campaign, possibly with Brazilian origin, with a concrete and persistent focus on the hospitality sector, which proves how a threat actor can be successful in pursuing its objectives while maintaining a cheap budget. The use of DDNS services, publicly available remote access tools, and having a minimum knowledge on software development (in this case VB.NET) has been enough for running a campaign lasting month, and potentially gathering credit card information and other possible data. ",
|
||||||
|
"meta": {
|
||||||
|
"refs": [
|
||||||
|
"https://unit42.paloaltonetworks.com/operation-comando-or-how-to-run-a-cheap-and-effective-credit-card-business/"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"uuid": "35c40ce2-57c0-479e-8a56-efbb8695e395",
|
||||||
|
"value": "Operation Comando"
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"version": 99
|
"version": 100
|
||||||
}
|
}
|
||||||
|
|
Loading…
Reference in a new issue