mirror of
https://github.com/MISP/misp-galaxy.git
synced 2024-11-27 01:07:18 +00:00
chg: [threat-actor] JSON fix
This commit is contained in:
parent
067e449a41
commit
c3b65a2d15
1 changed files with 14 additions and 14 deletions
|
@ -9801,13 +9801,6 @@
|
||||||
{
|
{
|
||||||
"description": "Void Balaur is a highly active hack-for-hire / cyber mercenary group with a wide range of known target types across the globe. Their services have been observed for sale to the public online since at least 2016. Services include the collection of private data and access to specific online email and social media services, such as Gmail, Outlook, Telegram, Yandex, Facebook, Instagram, and business emails.",
|
"description": "Void Balaur is a highly active hack-for-hire / cyber mercenary group with a wide range of known target types across the globe. Their services have been observed for sale to the public online since at least 2016. Services include the collection of private data and access to specific online email and social media services, such as Gmail, Outlook, Telegram, Yandex, Facebook, Instagram, and business emails.",
|
||||||
"meta": {
|
"meta": {
|
||||||
"refs": [
|
|
||||||
"https://www.sentinelone.com/labs/the-sprawling-infrastructure-of-a-careless-mercenary/",
|
|
||||||
"https://blog.google/threat-analysis-group/countering-hack-for-hire-groups/",
|
|
||||||
"https://documents.trendmicro.com/assets/white_papers/wp-void-balaur-tracking-a-cybermercenarys-activities.pdf",
|
|
||||||
"https://www.amnesty.org/en/latest/research/2020/03/targeted-surveillance-attacks-in-uzbekistan-an-old-threat-with-new-techniques/",
|
|
||||||
"https://equalit.ie/deflect-labs-report-6/"
|
|
||||||
],
|
|
||||||
"cfr-suspected-victims": [
|
"cfr-suspected-victims": [
|
||||||
"Brazil",
|
"Brazil",
|
||||||
"Central African Republic",
|
"Central African Republic",
|
||||||
|
@ -9821,6 +9814,13 @@
|
||||||
"Ukraine",
|
"Ukraine",
|
||||||
"United Kingdom",
|
"United Kingdom",
|
||||||
"United States"
|
"United States"
|
||||||
|
],
|
||||||
|
"refs": [
|
||||||
|
"https://www.sentinelone.com/labs/the-sprawling-infrastructure-of-a-careless-mercenary/",
|
||||||
|
"https://blog.google/threat-analysis-group/countering-hack-for-hire-groups/",
|
||||||
|
"https://documents.trendmicro.com/assets/white_papers/wp-void-balaur-tracking-a-cybermercenarys-activities.pdf",
|
||||||
|
"https://www.amnesty.org/en/latest/research/2020/03/targeted-surveillance-attacks-in-uzbekistan-an-old-threat-with-new-techniques/",
|
||||||
|
"https://equalit.ie/deflect-labs-report-6/"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"uuid": "ca310f0a-1131-4c67-b0a7-f1cd4ce0f87f",
|
"uuid": "ca310f0a-1131-4c67-b0a7-f1cd4ce0f87f",
|
||||||
|
|
Loading…
Reference in a new issue