diff --git a/clusters/ransomware.json b/clusters/ransomware.json index a137f2d..55d6e9d 100644 --- a/clusters/ransomware.json +++ b/clusters/ransomware.json @@ -13627,6 +13627,7 @@ "type": "related-to" } ], + "uuid": "c60776a6-91dd-499b-8b4c-7940479e71fc", "value": "Maze" }, { diff --git a/clusters/threat-actor.json b/clusters/threat-actor.json index 857c60f..d3bb454 100644 --- a/clusters/threat-actor.json +++ b/clusters/threat-actor.json @@ -7953,7 +7953,11 @@ "https://blog.trendmicro.com/trendlabs-security-intelligence/first-active-attack-exploiting-cve-2019-2215-found-on-google-play-linked-to-sidewinder-apt-group/", "https://malpedia.caad.fkie.fraunhofer.de/details/win.sidewinder", "https://otx.alienvault.com/pulse/5fd10760f9afb730d37c4742/", - " https://www.trendmicro.com/en_us/research/20/l/sidewinder-leverages-south-asian-territorial-issues-for-spear-ph.html" + "https://www.trendmicro.com/en_us/research/20/l/sidewinder-leverages-south-asian-territorial-issues-for-spear-ph.html", + "https://s.tencent.com/research/report/659.html", + "https://www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/fireeye-sidewinder-targeted-attack.pdf", + "https://s.tencent.com/research/report/479.html", + "https://medium.com/@Sebdraven/apt-sidewinder-tricks-powershell-anti-forensics-and-execution-side-loading-5bc1a7e7c84c" ], "synonyms": [ "RAZOR TIGER",