From 9f0869097a110e5a9ca2665625e94d27295b793f Mon Sep 17 00:00:00 2001 From: Mathieu Beligon Date: Wed, 2 Nov 2022 18:09:20 -0700 Subject: [PATCH] [threat-actors] Remove cobalt dickens duplicate --- clusters/threat-actor.json | 14 -------------- 1 file changed, 14 deletions(-) diff --git a/clusters/threat-actor.json b/clusters/threat-actor.json index b4923fb4..1cfaace8 100644 --- a/clusters/threat-actor.json +++ b/clusters/threat-actor.json @@ -6210,20 +6210,6 @@ "uuid": "bea5e256-bcc0-11e8-a478-bbf7e7585a1e", "value": "Unnamed Actor" }, - { - "description": "”A threat group associated with the Iranian government. The threat group created lookalike domains to phish targets and used credentials to steal intellectual property from specific resources, including library systems.”", - "meta": { - "refs": [ - "https://www.bleepingcomputer.com/news/security/iranian-hackers-charged-in-march-are-still-actively-phishing-universities/", - "https://www.cyberscoop.com/cobalt-dickens-iran-mabna-institiute-dell-secureworks/" - ], - "synonyms": [ - "Cobalt Dickens" - ] - }, - "uuid": "6c79bd1a-bfde-11e8-8c33-db4d9968671a", - "value": "COBALT DICKENS" - }, { "description": "Digital threat management company RiskIQ tracks the activity of MageCart group and reported their use of web-based card skimmers since 2016.", "meta": {