create botnet galaxy

pull/157/head
Deborah Servili 2018-02-20 15:33:24 +01:00
parent 6147b89c4a
commit 384e26a1b4
3 changed files with 45 additions and 0 deletions

22
clusters/botnet.json Normal file
View File

@ -0,0 +1,22 @@
{
"values": [
{
"value": "ADB.miner",
"description": "A new botnet appeared over the weekend, and it's targeting Android devices by scanning for open debug ports so it can infect victims with malware that mines the Monero cryptocurrency.\n\nThe botnet came to life on Saturday, February 3, and is targeting port 5555, which on devices running the Android OS is the port used by the operating system's native Android Debug Bridge (ADB), a debugging interface that grants access to some of the operating system's most sensitive features.\n\nOnly devices running the Android OS have been infected until now, such as smartphones, smart TVs, and TV top boxes, according to security researchers from Qihoo 360's Network Security Research Lab [Netlab] division, the ones who discovered the botnet, which the named ADB.miner.",
"meta": {
"refs": [
"https://www.bleepingcomputer.com/news/security/android-devices-targeted-by-new-monero-mining-botnet/"
]
}
}
],
"name": "Botnet",
"type": "botnet",
"source": "MISP Project",
"authors": [
"Various"
],
"description": "botnet galaxy",
"uuid": "a91732f4-164a-11e8-924a-ffd4097eb03f",
"version": 1
}

View File

@ -8732,6 +8732,21 @@
],
"date": "Febuary 2018"
}
},
{
"value": "Cryakl",
"description": "ransomware",
"meta": {
"refs": [
"https://sensorstechforum.com/fr/fairytail-files-virus-cryakl-ransomware-remove-restore-data/",
"https://www.technologynews.tech/cryakl-ransomware-virus",
"http://www.zdnet.com/article/cryakl-ransomware-decryption-keys-now-available-for-free/"
],
"date": "January 2018",
"extensions": [
".fairytail"
]
}
}
],
"source": "Various",

8
galaxies/botnet.json Normal file
View File

@ -0,0 +1,8 @@
{
"description": "Botnet galaxy.",
"type": "botnet",
"version": 1,
"name": "Botnet",
"icon": "sitemap",
"uuid": "90ccdf38-1649-11e8-b8bf-e7326d553087"
}