From 3272960a146323c008af3e6a1058997c02477f83 Mon Sep 17 00:00:00 2001 From: Daniel Plohmann Date: Thu, 19 Aug 2021 06:02:40 +0200 Subject: [PATCH] fixed typo in actor name (CLOCKWORD -> CLOCKWORK SPIDER) --- clusters/threat-actor.json | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/clusters/threat-actor.json b/clusters/threat-actor.json index e1d2e7d5..53760d1b 100644 --- a/clusters/threat-actor.json +++ b/clusters/threat-actor.json @@ -7973,7 +7973,7 @@ ] }, "uuid": "2d2f3b53-c544-4823-a65f-da53ff8f594e", - "value": "CLOCKWORD SPIDER" + "value": "CLOCKWORK SPIDER" }, { "description": "In June 2019, CrowdStrike Intelligence observed a source code fork of BitPaymer and began tracking the new ransomware strain as DoppelPaymer. Further technical analysis revealed an increasing divergence between two versions of Dridex, with the new version dubbed DoppelDridex. Based on this evidence, CrowdStrike Intelligence assessed with high confidence that a new group split off from INDRIK SPIDER to form the adversary DOPPEL SPIDER. Following DOPPEL SPIDER’s inception, CrowdStrike Intelligence observed multiple BGH incidents attributed to the group, with the largest known ransomware demand being 250 BTC. Other demands were not nearly as high, suggesting that the group conducts network reconnaissance to determine the value of the victim organization.",