mirror of
https://github.com/MISP/misp-galaxy.git
synced 2024-11-22 23:07:19 +00:00
add Razdel
This commit is contained in:
parent
f7367ef887
commit
bd3fce00e1
2 changed files with 18 additions and 5 deletions
|
@ -269,7 +269,7 @@
|
||||||
"description": "Vibleaker was an app available on the Google Play Store named Beaver Gang Counter that contained malicious code that after specific orders from its maker would scan the user's phone for the Viber app, and then steal photos and videos recorded or sent through the app.",
|
"description": "Vibleaker was an app available on the Google Play Store named Beaver Gang Counter that contained malicious code that after specific orders from its maker would scan the user's phone for the Viber app, and then steal photos and videos recorded or sent through the app.",
|
||||||
"meta": {
|
"meta": {
|
||||||
"refs": [
|
"refs": [
|
||||||
"http://news.softpedia.com/news/malicious-android-app-steals-viber-photos-and-videos-505758.shtml"
|
"http://news.softpedia.com/news/malicious-android-app-steals-viber-photos-and-BankBot-505758.shtml"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"uuid": "27354d65-ca90-4f73-b942-13046e61700c",
|
"uuid": "27354d65-ca90-4f73-b942-13046e61700c",
|
||||||
|
@ -4642,7 +4642,18 @@
|
||||||
},
|
},
|
||||||
"uuid": "64ee0ae8-2e78-43bf-b81b-e7e5c2e30cd0",
|
"uuid": "64ee0ae8-2e78-43bf-b81b-e7e5c2e30cd0",
|
||||||
"value": "AndroidOS_HidenAd"
|
"value": "AndroidOS_HidenAd"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"description": "The Banking Trojan found in Google Play is identified as Razdel, a variant of BankBot mobile banking Trojan. This newly observed variant has taken mobile threats to the next level incorporating: Remote access Trojan functions, SMS interception, UI (User Interface) Overlay with masqueraded pages etc.",
|
||||||
|
"meta": {
|
||||||
|
"refs": [
|
||||||
|
"http://www.virusremovalguidelines.com/tag/what-is-bankbot",
|
||||||
|
"https://mobile.twitter.com/pr3wtd/status/1097477833625088000"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"uuid": "aef548fb-76f5-4eb9-9942-f189cb0d16f6",
|
||||||
|
"value": "Razdel"
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"version": 18
|
"version": 19
|
||||||
}
|
}
|
||||||
|
|
|
@ -3469,7 +3469,8 @@
|
||||||
"meta": {
|
"meta": {
|
||||||
"refs": [
|
"refs": [
|
||||||
"https://www.fireeye.com/blog/threat-research/2013/08/operation-molerats-middle-east-cyber-attacks-using-poison-ivy.html",
|
"https://www.fireeye.com/blog/threat-research/2013/08/operation-molerats-middle-east-cyber-attacks-using-poison-ivy.html",
|
||||||
"http://blog.vectranetworks.com/blog/moonlight-middle-east-targeted-attacks"
|
"http://blog.vectranetworks.com/blog/moonlight-middle-east-targeted-attacks",
|
||||||
|
"https://ti.360.net/blog/articles/suspected-molerats-new-attack-in-the-middle-east/"
|
||||||
],
|
],
|
||||||
"synonyms": [
|
"synonyms": [
|
||||||
"Gaza Hackers Team",
|
"Gaza Hackers Team",
|
||||||
|
@ -3574,7 +3575,8 @@
|
||||||
"meta": {
|
"meta": {
|
||||||
"country": "IR",
|
"country": "IR",
|
||||||
"refs": [
|
"refs": [
|
||||||
"https://www.symantec.com/connect/blogs/iran-based-attackers-use-back-door-threats-spy-middle-eastern-targets"
|
"https://www.symantec.com/connect/blogs/iran-based-attackers-use-back-door-threats-spy-middle-eastern-targets",
|
||||||
|
"https://www.symantec.com/blogs/threat-intelligence/chafer-latest-attacks-reveal-heightened-ambitions"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"uuid": "ddd95696-3d9a-4d0c-beec-a34d396182f3",
|
"uuid": "ddd95696-3d9a-4d0c-beec-a34d396182f3",
|
||||||
|
@ -6387,5 +6389,5 @@
|
||||||
"value": "STOLEN PENCIL"
|
"value": "STOLEN PENCIL"
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"version": 93
|
"version": 94
|
||||||
}
|
}
|
||||||
|
|
Loading…
Reference in a new issue