diff --git a/clusters/botnet.json b/clusters/botnet.json index 334058a..714be72 100644 --- a/clusters/botnet.json +++ b/clusters/botnet.json @@ -848,6 +848,9 @@ "refs": [ "https://researchcenter.paloaltonetworks.com/2018/09/unit42-multi-exploit-iotlinux-botnets-mirai-gafgyt-target-apache-struts-sonicwall/", "https://www.symantec.com/security-center/writeup/2014-100222-5658-99" + ], + "synonyms": [ + "Bashlite" ] }, "uuid": "40795af6-b721-11e8-9fcb-570c0b384135" diff --git a/clusters/ransomware.json b/clusters/ransomware.json index c3ba744..7a2a6d7 100644 --- a/clusters/ransomware.json +++ b/clusters/ransomware.json @@ -9608,7 +9608,8 @@ "https://www.bleepingcomputer.com/news/security/gandcrab-ransomware-being-distributed-via-malspam-disguised-as-receipts/", "https://www.bleepingcomputer.com/news/security/gandcrab-ransomware-version-2-released-with-new-crab-extension-and-other-changes/", "https://www.bleepingcomputer.com/news/security/gandcrab-version-3-released-with-autorun-feature-and-desktop-background/", - "https://www.bleepingcomputer.com/news/security/new-fallout-exploit-kit-drops-gandcrab-ransomware-or-redirects-to-pups/" + "https://www.bleepingcomputer.com/news/security/new-fallout-exploit-kit-drops-gandcrab-ransomware-or-redirects-to-pups/", + "https://www.bleepingcomputer.com/news/security/gandcrab-v5-ransomware-utilizing-the-alpc-task-scheduler-exploit/" ] }, "related": [