mirror of
https://github.com/MISP/misp-galaxy.git
synced 2024-11-27 01:07:18 +00:00
commit
f427d5933e
1 changed files with 5 additions and 18 deletions
|
@ -2312,7 +2312,8 @@
|
||||||
"https://www.welivesecurity.com/2017/03/30/carbon-paper-peering-turlas-second-stage-backdoor/",
|
"https://www.welivesecurity.com/2017/03/30/carbon-paper-peering-turlas-second-stage-backdoor/",
|
||||||
"https://www.cfr.org/interactive/cyber-operations/turla",
|
"https://www.cfr.org/interactive/cyber-operations/turla",
|
||||||
"https://www.bleepingcomputer.com/news/security/turla-outlook-backdoor-uses-clever-tactics-for-stealth-and-persistence/",
|
"https://www.bleepingcomputer.com/news/security/turla-outlook-backdoor-uses-clever-tactics-for-stealth-and-persistence/",
|
||||||
"https://www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2018/november/turla-png-dropper-is-back/"
|
"https://www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2018/november/turla-png-dropper-is-back/",
|
||||||
|
"http://download.bitdefender.com/resources/files/News/CaseStudies/study/115/Bitdefender-Whitepaper-PAC-A4-en-EN1.pdf"
|
||||||
],
|
],
|
||||||
"synonyms": [
|
"synonyms": [
|
||||||
"Turla",
|
"Turla",
|
||||||
|
@ -2326,7 +2327,9 @@
|
||||||
"Pfinet",
|
"Pfinet",
|
||||||
"TAG_0530",
|
"TAG_0530",
|
||||||
"KRYPTON",
|
"KRYPTON",
|
||||||
"Hippo Team"
|
"Hippo Team",
|
||||||
|
"Pacifier APT",
|
||||||
|
"Popeye"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"related": [
|
"related": [
|
||||||
|
@ -2988,22 +2991,6 @@
|
||||||
"uuid": "bb446dc2-4fee-4212-8b2c-3ffa2917e338",
|
"uuid": "bb446dc2-4fee-4212-8b2c-3ffa2917e338",
|
||||||
"value": "ScarCruft"
|
"value": "ScarCruft"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"description": "Bitdefender detected and blocked an ongoing cyber-espionage campaign against Romanian institutions and other foreign targets. The attacks started in 2014, with the latest reported occurrences in May of 2016. The APT, dubbed Pacifier by Bitdefender researchers, makes use of malicious .doc documents and .zip files distributed via spear phishing e-mail.",
|
|
||||||
"meta": {
|
|
||||||
"attribution-confidence": "50",
|
|
||||||
"country": "RU",
|
|
||||||
"refs": [
|
|
||||||
"http://download.bitdefender.com/resources/files/News/CaseStudies/study/115/Bitdefender-Whitepaper-PAC-A4-en-EN1.pdf"
|
|
||||||
],
|
|
||||||
"synonyms": [
|
|
||||||
"Skipper",
|
|
||||||
"Popeye"
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"uuid": "32db3cc1-bb79-4b08-a7a4-747a37221afa",
|
|
||||||
"value": "Pacifier APT"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"description": "This group created a malware that takes over Android devices and generates $300,000 per month in fraudulent ad revenue. The group effectively controls an arsenal of over 85 million mobile devices around the world. With the potential to sell access to these devices to the highest bidder",
|
"description": "This group created a malware that takes over Android devices and generates $300,000 per month in fraudulent ad revenue. The group effectively controls an arsenal of over 85 million mobile devices around the world. With the potential to sell access to these devices to the highest bidder",
|
||||||
"meta": {
|
"meta": {
|
||||||
|
|
Loading…
Reference in a new issue