From aa34775390ef947fafeb92c132ee0734a04c1abd Mon Sep 17 00:00:00 2001 From: Rony Date: Sun, 19 Apr 2020 23:17:44 +0530 Subject: [PATCH] typo thanks to @patricksvgr --- clusters/threat-actor.json | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/clusters/threat-actor.json b/clusters/threat-actor.json index 0863f75..30c2ee7 100644 --- a/clusters/threat-actor.json +++ b/clusters/threat-actor.json @@ -3067,7 +3067,7 @@ "https://web.archive.org/web/20160527050022/https://www.symantec.com/connect/blogs/swift-attackers-malware-linked-more-financial-attacks", "https://symantec-blogs.broadcom.com/blogs/threat-intelligence/fastcash-lazarus-atm-malware", "https://blog.trendmicro.com/trendlabs-security-intelligence/what-we-can-learn-from-the-bangladesh-central-bank-cyber-heist/", - "https://www.symantec.com/connect/blogs/attackers-target-dozens-global-banks-new-malware-0", + "https://www.symantec.com/connect/blogs/attackers-target-dozens-global-banks-new-malware", "https://baesystemsai.blogspot.com/2017/10/taiwan-heist-lazarus-tools.html", "https://www.bloomberg.com/news/articles/2018-05-29/mexico-foiled-a-110-million-bank-heist-then-kept-it-a-secret", "https://threatpost.com/banco-de-chile-wiper-attack-just-a-cover-for-10m-swift-heist/132796/",