From dc059d1f4dc89b591c94de287d8240a5e24c914b Mon Sep 17 00:00:00 2001 From: Daniel Plohmann Date: Tue, 3 Mar 2020 19:40:50 +0100 Subject: [PATCH] Accenture calls APT32 - "POND LOACH" --- clusters/threat-actor.json | 8 +++++--- 1 file changed, 5 insertions(+), 3 deletions(-) diff --git a/clusters/threat-actor.json b/clusters/threat-actor.json index 439c2b6..72388a9 100644 --- a/clusters/threat-actor.json +++ b/clusters/threat-actor.json @@ -4472,7 +4472,8 @@ "https://www.scmagazineuk.com/ocean-lotus-groupapt-32-identified-as-vietnamese-apt-group/article/663565/", "https://www.brighttalk.com/webcast/10703/261205", "https://github.com/eset/malware-research/tree/master/oceanlotus", - "https://www.cfr.org/interactive/cyber-operations/ocean-lotus" + "https://www.cfr.org/interactive/cyber-operations/ocean-lotus", + "https://www.accenture.com/us-en/blogs/blogs-pond-loach-delivers-badcake-malware" ], "synonyms": [ "OceanLotus Group", @@ -4484,7 +4485,8 @@ "Sea Lotus", "APT-32", "APT 32", - "Ocean Buffalo" + "Ocean Buffalo", + "POND LOACH" ] }, "related": [ @@ -7967,5 +7969,5 @@ "value": "InvisiMole" } ], - "version": 155 + "version": 156 }