diff --git a/elements/adversary-groups.json b/elements/adversary-groups.json index 569f4f23..41b02ef1 100644 --- a/elements/adversary-groups.json +++ b/elements/adversary-groups.json @@ -19,7 +19,7 @@ { "group": "Wet Panda", "country": "CN" - } + }, { "group": "Predator Panda", "country": "CN" @@ -65,7 +65,7 @@ "group": "Wekby", "refs": ["https://threatpost.com/apt-gang-branches-out-to-medical-espionage-in-community-health-breach/107828"], "country": "CN", - "synonyms": ["Dynamite Panda", "TG-0416", "APT 18" ] + "synonyms": ["Dynamite Panda", "TG-0416", "APT 18", "SCANDIUM"] }, { "group": "Axiom", @@ -83,7 +83,7 @@ "group": "Naikon", "refs": ["https://securelist.com/analysis/publications/69953/the-naikon-apt/"], "country": "CN", - "synonyms": ["PLA Unit 78020", "APT 30"] + "synonyms": ["PLA Unit 78020", "APT 30", "Override Panda", "Camerashy"] }, { "group": "Lotus Blossom", @@ -232,7 +232,7 @@ "group": "APT 29", "refs": ["https://labsblog.f-secure.com/2015/09/17/the-dukes-7-years-of-russian-cyber-espionage/"], "country": "RU", - "synonyms": ["Dukes", "Group 100", "Cozy Duke", "EuroAPT", "CozyBear", "CozyCar", "Cozer", "Office Monkeys"] + "synonyms": ["Dukes", "Group 100", "Cozy Duke", "CozyDuke", "EuroAPT", "CozyBear", "CozyCar", "Cozer", "Office Monkeys", "OfficeMonkeys", "APT29"] }, { "group": "Turla Group",