mirror of https://github.com/MISP/misp-galaxy
remove duplicate references
parent
bf0d1d27ca
commit
53a6a8d26f
|
@ -396,7 +396,6 @@
|
||||||
],
|
],
|
||||||
"country": "CN",
|
"country": "CN",
|
||||||
"refs": [
|
"refs": [
|
||||||
"http://www.crowdstrike.com/blog/cyber-deterrence-in-action-a-story-of-one-long-hurricane-panda-campaign/",
|
|
||||||
"http://www.crowdstrike.com/blog/cyber-deterrence-in-action-a-story-of-one-long-hurricane-panda-campaign/"
|
"http://www.crowdstrike.com/blog/cyber-deterrence-in-action-a-story-of-one-long-hurricane-panda-campaign/"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
@ -986,7 +985,6 @@
|
||||||
"country": "RU",
|
"country": "RU",
|
||||||
"refs": [
|
"refs": [
|
||||||
"https://en.wikipedia.org/wiki/Carbanak",
|
"https://en.wikipedia.org/wiki/Carbanak",
|
||||||
"https://www.proofpoint.com/us/threat-insight/post/fin7carbanak-threat-actor-unleashes-bateleur-jscript-backdoor",
|
|
||||||
"https://securelist.com/files/2015/02/Carbanak_APT_eng.pdf",
|
"https://securelist.com/files/2015/02/Carbanak_APT_eng.pdf",
|
||||||
"http://2014.zeronights.ru/assets/files/slides/ivanovb-zeronights.pdf",
|
"http://2014.zeronights.ru/assets/files/slides/ivanovb-zeronights.pdf",
|
||||||
"https://www.symantec.com/connect/blogs/odinaff-new-trojan-used-high-level-financial-attacks",
|
"https://www.symantec.com/connect/blogs/odinaff-new-trojan-used-high-level-financial-attacks",
|
||||||
|
@ -1398,7 +1396,6 @@
|
||||||
{
|
{
|
||||||
"meta": {
|
"meta": {
|
||||||
"refs": [
|
"refs": [
|
||||||
"http://researchcenter.paloaltonetworks.com/2016/05/the-oilrig-campaign-attacks-on-saudi-arabian-organizations-deliver-helminth-backdoor/",
|
|
||||||
"https://www.fireeye.com/blog/threat-research/2016/05/targeted_attacksaga.html",
|
"https://www.fireeye.com/blog/threat-research/2016/05/targeted_attacksaga.html",
|
||||||
"http://researchcenter.paloaltonetworks.com/2016/10/unit42-oilrig-malware-campaign-updates-toolset-and-expands-targets/",
|
"http://researchcenter.paloaltonetworks.com/2016/10/unit42-oilrig-malware-campaign-updates-toolset-and-expands-targets/",
|
||||||
"http://researchcenter.paloaltonetworks.com/2016/05/the-oilrig-campaign-attacks-on-saudi-arabian-organizations-deliver-helminth-backdoor/",
|
"http://researchcenter.paloaltonetworks.com/2016/05/the-oilrig-campaign-attacks-on-saudi-arabian-organizations-deliver-helminth-backdoor/",
|
||||||
|
@ -1607,7 +1604,7 @@
|
||||||
"country": "CN",
|
"country": "CN",
|
||||||
"synonyms": [
|
"synonyms": [
|
||||||
"Zhenbao",
|
"Zhenbao",
|
||||||
"TEMP.Zhenbao"
|
"TEMP.Zhenbao"
|
||||||
],
|
],
|
||||||
"refs": [
|
"refs": [
|
||||||
"http://www.darkreading.com/endpoint/chinese-cyberspies-pivot-to-russia-in-wake-of-obama-xi-pact/d/d-id/1324242"
|
"http://www.darkreading.com/endpoint/chinese-cyberspies-pivot-to-russia-in-wake-of-obama-xi-pact/d/d-id/1324242"
|
||||||
|
@ -2227,4 +2224,4 @@
|
||||||
"description": "Known or estimated adversary groups targeting organizations and employees. Adversary groups are regularly confused with their initial operation or campaign.",
|
"description": "Known or estimated adversary groups targeting organizations and employees. Adversary groups are regularly confused with their initial operation or campaign.",
|
||||||
"uuid": "7cdff317-a673-4474-84ec-4f1754947823",
|
"uuid": "7cdff317-a673-4474-84ec-4f1754947823",
|
||||||
"version": 27
|
"version": 27
|
||||||
}
|
}
|
||||||
|
|
Loading…
Reference in New Issue