mirror of https://github.com/MISP/misp-galaxy
[threat-actors] Remove DustStorm alias from APT10
parent
015650c6d7
commit
21d4292faf
|
@ -100,6 +100,7 @@
|
||||||
"value": "Nitro"
|
"value": "Nitro"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
"description": "Threat actors behind the Operation Dust Storm have been active since at least 2010, the hackers targeted several organizations in Japan, South Korea, the US, Europe, and other Asian countries.",
|
||||||
"meta": {
|
"meta": {
|
||||||
"refs": [
|
"refs": [
|
||||||
"https://www.cylance.com/content/dam/cylance/pdfs/reports/Op_Dust_Storm_Report.pdf",
|
"https://www.cylance.com/content/dam/cylance/pdfs/reports/Op_Dust_Storm_Report.pdf",
|
||||||
|
@ -871,6 +872,7 @@
|
||||||
"value": "APT27"
|
"value": "APT27"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
"description": "menuPass is a threat group that has been active since at least 2006. Individual members of menuPass are known to have acted in association with the Chinese Ministry of State Security's (MSS) Tianjin State Security Bureau and worked for the Huaying Haitai Science and Technology Development Company.",
|
||||||
"meta": {
|
"meta": {
|
||||||
"attribution-confidence": "50",
|
"attribution-confidence": "50",
|
||||||
"cfr-suspected-state-sponsor": "China",
|
"cfr-suspected-state-sponsor": "China",
|
||||||
|
@ -921,7 +923,6 @@
|
||||||
"Menupass Team",
|
"Menupass Team",
|
||||||
"happyyongzi",
|
"happyyongzi",
|
||||||
"POTASSIUM",
|
"POTASSIUM",
|
||||||
"DustStorm",
|
|
||||||
"Red Apollo",
|
"Red Apollo",
|
||||||
"CVNX",
|
"CVNX",
|
||||||
"HOGFISH",
|
"HOGFISH",
|
||||||
|
|
Loading…
Reference in New Issue