diff --git a/clusters/threat-actor.json b/clusters/threat-actor.json index c684238b..d85ca336 100644 --- a/clusters/threat-actor.json +++ b/clusters/threat-actor.json @@ -2246,7 +2246,7 @@ "value": "MoneyTaker" }, { - "value": "", + "value": "Microcin", "description": "We’re already used to the fact that complex cyberattacks use 0-day vulnerabilities, bypassing digital signature checks, virtual file systems, non-standard encryption algorithms and other tricks. Sometimes, however, all of this may be done in much simpler ways, as was the case in the malicious campaign that we detected a while ago – we named it ‘Microcin’ after microini, one of the malicious components used in it.", "meta": { "refs": [