add Razdel

This commit is contained in:
Deborah Servili 2019-02-25 16:35:06 +01:00
parent f7367ef887
commit bd3fce00e1
No known key found for this signature in database
GPG key ID: 7E3A832850D4D7D1
2 changed files with 18 additions and 5 deletions

View file

@ -269,7 +269,7 @@
"description": "Vibleaker was an app available on the Google Play Store named Beaver Gang Counter that contained malicious code that after specific orders from its maker would scan the user's phone for the Viber app, and then steal photos and videos recorded or sent through the app.", "description": "Vibleaker was an app available on the Google Play Store named Beaver Gang Counter that contained malicious code that after specific orders from its maker would scan the user's phone for the Viber app, and then steal photos and videos recorded or sent through the app.",
"meta": { "meta": {
"refs": [ "refs": [
"http://news.softpedia.com/news/malicious-android-app-steals-viber-photos-and-videos-505758.shtml" "http://news.softpedia.com/news/malicious-android-app-steals-viber-photos-and-BankBot-505758.shtml"
] ]
}, },
"uuid": "27354d65-ca90-4f73-b942-13046e61700c", "uuid": "27354d65-ca90-4f73-b942-13046e61700c",
@ -4642,7 +4642,18 @@
}, },
"uuid": "64ee0ae8-2e78-43bf-b81b-e7e5c2e30cd0", "uuid": "64ee0ae8-2e78-43bf-b81b-e7e5c2e30cd0",
"value": "AndroidOS_HidenAd" "value": "AndroidOS_HidenAd"
},
{
"description": "The Banking Trojan found in Google Play is identified as Razdel, a variant of BankBot mobile banking Trojan. This newly observed variant has taken mobile threats to the next level incorporating: Remote access Trojan functions, SMS interception, UI (User Interface) Overlay with masqueraded pages etc.",
"meta": {
"refs": [
"http://www.virusremovalguidelines.com/tag/what-is-bankbot",
"https://mobile.twitter.com/pr3wtd/status/1097477833625088000"
]
},
"uuid": "aef548fb-76f5-4eb9-9942-f189cb0d16f6",
"value": "Razdel"
} }
], ],
"version": 18 "version": 19
} }

View file

@ -3469,7 +3469,8 @@
"meta": { "meta": {
"refs": [ "refs": [
"https://www.fireeye.com/blog/threat-research/2013/08/operation-molerats-middle-east-cyber-attacks-using-poison-ivy.html", "https://www.fireeye.com/blog/threat-research/2013/08/operation-molerats-middle-east-cyber-attacks-using-poison-ivy.html",
"http://blog.vectranetworks.com/blog/moonlight-middle-east-targeted-attacks" "http://blog.vectranetworks.com/blog/moonlight-middle-east-targeted-attacks",
"https://ti.360.net/blog/articles/suspected-molerats-new-attack-in-the-middle-east/"
], ],
"synonyms": [ "synonyms": [
"Gaza Hackers Team", "Gaza Hackers Team",
@ -3574,7 +3575,8 @@
"meta": { "meta": {
"country": "IR", "country": "IR",
"refs": [ "refs": [
"https://www.symantec.com/connect/blogs/iran-based-attackers-use-back-door-threats-spy-middle-eastern-targets" "https://www.symantec.com/connect/blogs/iran-based-attackers-use-back-door-threats-spy-middle-eastern-targets",
"https://www.symantec.com/blogs/threat-intelligence/chafer-latest-attacks-reveal-heightened-ambitions"
] ]
}, },
"uuid": "ddd95696-3d9a-4d0c-beec-a34d396182f3", "uuid": "ddd95696-3d9a-4d0c-beec-a34d396182f3",
@ -6387,5 +6389,5 @@
"value": "STOLEN PENCIL" "value": "STOLEN PENCIL"
} }
], ],
"version": 93 "version": 94
} }