diff --git a/clusters/threat-actor.json b/clusters/threat-actor.json index ca984f6..568f6d9 100644 --- a/clusters/threat-actor.json +++ b/clusters/threat-actor.json @@ -1097,6 +1097,9 @@ "NICKEL", "G0004", "Red Vulture" + ], + "targeted-sector": [ + "Government, Administration" ] }, "related": [ @@ -4130,6 +4133,9 @@ "motive": "Hacktivists-Nationalists", "synonyms": [ "Crescent and Star" + ], + "targeted-sector": [ + "Government, Administration" ] }, "uuid": "ab1771de-25bb-4688-b132-eabb5d6452a1", @@ -8084,6 +8090,9 @@ ], "synonyms": [ "BRONZE MEDLEY" + ], + "targeted-sector": [ + "Government, Administration" ] }, "uuid": "200d04c8-a11f-45c4-86fd-35bb5de3f7a3", @@ -8270,6 +8279,9 @@ "synonyms": [ "Empire Monkey", "CobaltGoblin" + ], + "targeted-sector": [ + "Finance" ] }, "uuid": "559a64d8-8657-4a93-9208-060d52efdec4", @@ -8590,6 +8602,9 @@ "https://www.welivesecurity.com/2020/10/02/xdspy-stealing-government-secrets-since-2011/", "https://vblocalhost.com/uploads/VB2020-Faou-Labelle.pdf", "https://github.com/eset/malware-ioc/tree/master/xdspy/" + ], + "targeted-sector": [ + "Government, Administration" ] }, "uuid": "b205584e-db93-433a-b97a-7f2e19d8c188", @@ -8618,6 +8633,9 @@ "country": "IR", "refs": [ "https://go.crowdstrike.com/rs/281-OBQ-266/images/Report2020OverWatchNowheretoHide.pdf" + ], + "targeted-sector": [ + "Telecoms" ] }, "uuid": "6cc574c0-3dfa-459c-933a-4c63490c4e93", @@ -8956,6 +8974,9 @@ "meta": { "refs": [ "https://go.crowdstrike.com/rs/281-OBQ-266/images/Report2021GTR.pdf" + ], + "targeted-sector": [ + "Finance" ] }, "uuid": "f65103ad-f051-47c3-b90e-c77239a4d65c", @@ -9039,6 +9060,9 @@ "https://www.crowdstrike.com/blog/double-trouble-ransomware-data-leak-extortion-part-1", "https://go.crowdstrike.com/rs/281-OBQ-266/images/Report2021GTR.pdf", "https://go.crowdstrike.com/rs/281-OBQ-266/images/Report2020CrowdStrikeServicesCyberFrontLines.pdf" + ], + "targeted-sector": [ + "Government, Administration" ] }, "uuid": "ae121063-3960-4834-90d7-66aad69c5e8b",