From 7ede54c76c91edd4b1656b2e601b9b7771ffac23 Mon Sep 17 00:00:00 2001 From: Alexandre Dulaunoy Date: Fri, 13 Jan 2017 08:18:41 +0100 Subject: [PATCH] "the shoemaker's son always goes barefoot" Regin added --- clusters/tool.json | 9 +++++++-- 1 file changed, 7 insertions(+), 2 deletions(-) diff --git a/clusters/tool.json b/clusters/tool.json index 6988a9c..8a9858b 100644 --- a/clusters/tool.json +++ b/clusters/tool.json @@ -359,7 +359,12 @@ "value": "FireMalv" }, { - "value": "Regin" + "value": "Regin", + "description": "Regin (also known as Prax or WarriorPride) is a sophisticated malware toolkit revealed by Kaspersky Lab, Symantec, and The Intercept in November 2014. The malware targets specific users of Microsoft Windows-based computers and has been linked to the US intelligence gathering agency NSA and its British counterpart, the GCHQ. The Intercept provided samples of Regin for download including malware discovered at Belgian telecommunications provider, Belgacom. Kaspersky Lab says it first became aware of Regin in spring 2012, but that some of the earliest samples date from 2003. The name Regin is first found on the VirusTotal website on 9 March 2011.", + "meta": { + "refs": ["https://en.wikipedia.org/wiki/Regin_(malware)"], + "synonyms": ["Prax","WarriorPride"] + } }, { "value": "Duqu" @@ -1156,7 +1161,7 @@ "value": "Shamoon" } ], - "version": 12, + "version": 13, "uuid": "0d821b68-9d82-4c6d-86a6-1071a9e0f79f", "description": "threat-actor-tools is an enumeration of tools used by adversaries. The list includes malware but also common software regularly used by the adversaries.", "author": [