fix duplicate

pull/416/head
Deborah Servili 2019-06-20 16:35:49 +02:00
parent a984786c8b
commit 30f042211b
No known key found for this signature in database
GPG Key ID: 7E3A832850D4D7D1
1 changed files with 17 additions and 19 deletions

View File

@ -665,8 +665,7 @@
"https://www.bleepingcomputer.com/news/security/teamviewer-confirms-undisclosed-breach-from-2016/",
"https://blog.trendmicro.com/trendlabs-security-intelligence/winnti-abuses-github/",
"https://www.dw.com/en/bayer-points-finger-at-wicked-panda-in-cyberattack/a-48196004",
"https://www.welivesecurity.com/2019/03/11/gaming-industry-scope-attackers-asia/",
"https://securelist.com/winnti-more-than-just-a-game/37029/",
"https://www.welivesecurity.com/2019/03/11/gaming-industry-scope-attackers-asia/",,
"https://401trg.com/burning-umbrella/",
"https://attack.mitre.org/groups/G0044/",
"https://www.crowdstrike.com/blog/meet-crowdstrikes-adversary-of-the-month-for-july-wicked-spider/"
@ -2530,29 +2529,28 @@
"cfr-type-of-incident": "Espionage",
"country": "RU",
"refs": [
"https://www.first.org/resources/papers/tbilisi2014/turla-operations_and_development.pdf",
"https://www.circl.lu/pub/tr-25/",
"https://www.theguardian.com/technology/2014/aug/07/turla-hackers-spying-governments-researcher-kaspersky-symantec",
"https://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/waterbug-attack-group.pdf",
"https://securelist.com/analysis/publications/65545/the-epic-turla-operation/",
"https://securelist.com/blog/research/72081/satellite-turla-apt-command-and-control-in-the-sky/",
"https://securelist.com/blog/research/67962/the-penquin-turla-2/",
"https://www2.fireeye.com/rs/848-DID-242/images/rpt-witchcoven.pdf",
"https://www.welivesecurity.com/2017/03/30/carbon-paper-peering-turlas-second-stage-backdoor/",
"https://www.cfr.org/interactive/cyber-operations/turla",
"https://www.bleepingcomputer.com/news/security/turla-outlook-backdoor-uses-clever-tactics-for-stealth-and-persistence/",
"https://www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2018/november/turla-png-dropper-is-back/",
"http://download.bitdefender.com/resources/files/News/CaseStudies/study/115/Bitdefender-Whitepaper-PAC-A4-en-EN1.pdf",
"https://www.kaspersky.com/blog/moonlight-maze-the-lessons/6713/",
"https://www.nytimes.com/2010/08/26/technology/26cyber.html",
"https://yle.fi/uutiset/osasto/news/russian_group_behind_2013_foreign_ministry_hack/8591548",
"https://securelist.com/introducing-whitebear/81638/",
"https://securelist.com/the-epic-turla-operation/65545/",
"https://www.melani.admin.ch/melani/en/home/dokumentation/reports/technical-reports/technical-report_apt_case_ruag.html",
"https://www.cfr.org/interactive/cyber-operations/turla",
"https://www.nytimes.com/2010/08/26/technology/26cyber.html",
"https://securelist.com/blog/research/67962/the-penquin-turla-2/",
"https://www.kaspersky.com/blog/moonlight-maze-the-lessons/6713/",
"https://www2.fireeye.com/rs/848-DID-242/images/rpt-witchcoven.pdf",
"https://securelist.com/analysis/publications/65545/the-epic-turla-operation/",
"https://threatpost.com/linux-modules-connected-to-turla-apt-discovered/109765/",
"https://securelist.com/satellite-turla-apt-command-and-control-in-the-sky/72081/",
"https://www.welivesecurity.com/2018/05/22/turla-mosquito-shift-towards-generic-tools/",
"https://securelist.com/introducing-whitebear/81638/",
"https://www.first.org/resources/papers/tbilisi2014/turla-operations_and_development.pdf",
"https://yle.fi/uutiset/osasto/news/russian_group_behind_2013_foreign_ministry_hack/8591548",
"https://www.welivesecurity.com/2017/03/30/carbon-paper-peering-turlas-second-stage-backdoor/",
"https://securelist.com/blog/research/72081/satellite-turla-apt-command-and-control-in-the-sky/",
"https://www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2018/november/turla-png-dropper-is-back/",
"https://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/waterbug-attack-group.pdf",
"https://www.theguardian.com/technology/2014/aug/07/turla-hackers-spying-governments-researcher-kaspersky-symantec",
"https://www.bleepingcomputer.com/news/security/turla-outlook-backdoor-uses-clever-tactics-for-stealth-and-persistence/",
"http://download.bitdefender.com/resources/files/News/CaseStudies/study/115/Bitdefender-Whitepaper-PAC-A4-en-EN1.pdf",
"https://www.melani.admin.ch/melani/en/home/dokumentation/reports/technical-reports/technical-report_apt_case_ruag.html",
"https://unit42.paloaltonetworks.com/unit42-kazuar-multiplatform-espionage-backdoor-api-access/",
"https://www.engadget.com/2017/06/07/russian-malware-hidden-britney-spears-instagram/",
"https://www.welivesecurity.com/wp-content/uploads/2017/08/eset-gazer.pdf",