[threat-actors] Remove DustStorm alias from APT10

pull/790/head
Mathieu Beligon 2022-11-02 23:31:31 -07:00
parent 015650c6d7
commit 21d4292faf
1 changed files with 2 additions and 1 deletions

View File

@ -100,6 +100,7 @@
"value": "Nitro" "value": "Nitro"
}, },
{ {
"description": "Threat actors behind the Operation Dust Storm have been active since at least 2010, the hackers targeted several organizations in Japan, South Korea, the US, Europe, and other Asian countries.",
"meta": { "meta": {
"refs": [ "refs": [
"https://www.cylance.com/content/dam/cylance/pdfs/reports/Op_Dust_Storm_Report.pdf", "https://www.cylance.com/content/dam/cylance/pdfs/reports/Op_Dust_Storm_Report.pdf",
@ -871,6 +872,7 @@
"value": "APT27" "value": "APT27"
}, },
{ {
"description": "menuPass is a threat group that has been active since at least 2006. Individual members of menuPass are known to have acted in association with the Chinese Ministry of State Security's (MSS) Tianjin State Security Bureau and worked for the Huaying Haitai Science and Technology Development Company.",
"meta": { "meta": {
"attribution-confidence": "50", "attribution-confidence": "50",
"cfr-suspected-state-sponsor": "China", "cfr-suspected-state-sponsor": "China",
@ -921,7 +923,6 @@
"Menupass Team", "Menupass Team",
"happyyongzi", "happyyongzi",
"POTASSIUM", "POTASSIUM",
"DustStorm",
"Red Apollo", "Red Apollo",
"CVNX", "CVNX",
"HOGFISH", "HOGFISH",