removed duplicates

This commit is contained in:
Christophe Vandeplas 2016-11-16 10:36:36 +01:00
parent 0b0821db60
commit ea0f727aac
2 changed files with 7 additions and 24 deletions

View file

@ -98,14 +98,6 @@
"value": "Eloquent Panda", "value": "Eloquent Panda",
"country": "CN" "country": "CN"
}, },
{
"value": "Emissary Panda",
"description": "A China-based actor that targets foreign embassies to collect data on government, defence, and technology sectors.",
"refs": [
"http://www.scmagazineuk.com/iran-and-russia-blamed-for-state-sponsored-espionage/article/330401/"
],
"country": "CN"
},
{ {
"value": "Dizzy Panda", "value": "Dizzy Panda",
"synonyms": [ "synonyms": [
@ -288,8 +280,10 @@
}, },
{ {
"value": "Emissary Panda", "value": "Emissary Panda",
"description": "A China-based actor that targets foreign embassies to collect data on government, defence, and technology sectors.",
"refs": [ "refs": [
"http://www.secureworks.com/cyber-threat-intelligence/threats/threat-group-3390-targets-organizations-for-cyberespionage/" "http://www.secureworks.com/cyber-threat-intelligence/threats/threat-group-3390-targets-organizations-for-cyberespionage/",
"http://www.scmagazineuk.com/iran-and-russia-blamed-for-state-sponsored-espionage/article/330401/"
], ],
"country": "CN", "country": "CN",
"synonyms": [ "synonyms": [
@ -506,6 +500,10 @@
}, },
{ {
"value": "Cutting Kitten", "value": "Cutting Kitten",
"description": "While tracking a suspected Iran-based threat group known as Threat Group-2889[1] (TG-2889), Dell SecureWorks Counter Threat Unit™ (CTU) researchers uncovered a network of fake LinkedIn profiles. These convincing profiles form a self-referenced network of seemingly established LinkedIn users. CTU researchers assess with high confidence the purpose of this network is to target potential victims through social engineering. Most of the legitimate LinkedIn accounts associated with the fake accounts belong to individuals in the Middle East, and CTU researchers assess with medium confidence that these individuals are likely targets of TG-2889.",
"refs": [
"http://www.secureworks.com/cyber-threat-intelligence/threats/suspected-iran-based-hacker-group-creates-network-of-fake-linkedin-profiles/"
],
"synonyms": [ "synonyms": [
"ITSecTeam", "ITSecTeam",
"Threat Group 2889", "Threat Group 2889",
@ -565,17 +563,6 @@
"value": "Sands Casino", "value": "Sands Casino",
"country": "IR" "country": "IR"
}, },
{
"value": "Threat Group-2889",
"description": "While tracking a suspected Iran-based threat group known as Threat Group-2889[1] (TG-2889), Dell SecureWorks Counter Threat Unit™ (CTU) researchers uncovered a network of fake LinkedIn profiles. These convincing profiles form a self-referenced network of seemingly established LinkedIn users. CTU researchers assess with high confidence the purpose of this network is to target potential victims through social engineering. Most of the legitimate LinkedIn accounts associated with the fake accounts belong to individuals in the Middle East, and CTU researchers assess with medium confidence that these individuals are likely targets of TG-2889.",
"refs": [
"http://www.secureworks.com/cyber-threat-intelligence/threats/suspected-iran-based-hacker-group-creates-network-of-fake-linkedin-profiles/"
],
"synonyms": [
"TG-2889"
],
"country": "IR"
},
{ {
"value": "Rebel Jackal", "value": "Rebel Jackal",
"synonyms": [ "synonyms": [

View file

@ -342,10 +342,6 @@
{ {
"value": "Preshin" "value": "Preshin"
}, },
{
"value": "Rekaf",
"refs": ["https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks"]
},
{ {
"value": "Oficla" "value": "Oficla"
}, },