mirror of
https://github.com/MISP/misp-galaxy.git
synced 2024-11-30 02:37:17 +00:00
Yahoyah added
This commit is contained in:
parent
4c657eecac
commit
f0678ac63a
1 changed files with 6 additions and 0 deletions
|
@ -622,6 +622,12 @@
|
||||||
"value": "KeyBoy",
|
"value": "KeyBoy",
|
||||||
"description": "The actors used a new version of “KeyBoy,” a custom backdoor first disclosed by researchers at Rapid7 in June 2013. Their work outlined the capabilities of the backdoor, and exposed the protocols and algorithms used to hide the network communication and configuration data",
|
"description": "The actors used a new version of “KeyBoy,” a custom backdoor first disclosed by researchers at Rapid7 in June 2013. Their work outlined the capabilities of the backdoor, and exposed the protocols and algorithms used to hide the network communication and configuration data",
|
||||||
"refs": ["https://citizenlab.org/2016/11/parliament-keyboy/", "https://community.rapid7.com/community/infosec/blog/2013/06/07/keyboy-targeted-attacks-against-vietnam-and-india"]
|
"refs": ["https://citizenlab.org/2016/11/parliament-keyboy/", "https://community.rapid7.com/community/infosec/blog/2013/06/07/keyboy-targeted-attacks-against-vietnam-and-india"]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"value": "Yahoyah",
|
||||||
|
"description": "The attacks in this case are associated with a campaign called Tropic Trooper, which has been active since at least 2011 and is known for heavily targeting Taiwan. One of the attacks used their known Yahoyah malware...",
|
||||||
|
"refs": ["http://researchcenter.paloaltonetworks.com/2016/11/unit42-tropic-trooper-targets-taiwanese-government-and-fossil-fuel-provider-with-poison-ivy/"],
|
||||||
|
"synonyms": ["W32/Seeav"]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"version": 2,
|
"version": 2,
|
||||||
|
|
Loading…
Reference in a new issue