diff --git a/clusters/tool.json b/clusters/tool.json index c4144c4..f922271 100644 --- a/clusters/tool.json +++ b/clusters/tool.json @@ -7915,7 +7915,27 @@ }, "uuid": "a0736351-1721-42ed-a057-19b4b93b585e", "value": "NBTScan" + }, + { + "description": "ZeroCleare was used to execute a destructive attack that affected organizations in the energy and industrial sectorsin the Middle East. Based on the analysis of the malware and the attackers’ behavior, we suspect Iran-based nation state adversaries were involved to develop and deploy this new wiper. ", + "meta": { + "refs": [ + "https://www.ibm.com/downloads/cas/OAJ4VZNJ" + ] + }, + "uuid": "40fdcaac-a733-4088-9058-7b15a415b943", + "value": "ZeroCleare" + }, + { + "description": "At the heart of the recent Bapco attack is a new strain of malware named Dustman. According to an analysis by Saudi Arabia's cyber-security agency, Dustman is a so-called data wiper -- malware designed to delete data on infected computers, once launched into execution.\nDustman represents the third different data-wiping malware linked to the Tehran regime. Iranian state-backed hackers have a long history of developing data-wiping malware.", + "meta": { + "refs": [ + "https://mobile.twitter.com/IntezerLabs/status/1215252764080644098" + ] + }, + "uuid": "ff692a4c-23ff-4e86-a03b-2de8d36bc98f", + "value": "Dustman" } ], - "version": 129 + "version": 130 }