mirror of https://github.com/MISP/misp-galaxy
pull/98/head
parent
2fd3d3221d
commit
814c19841f
|
@ -2618,7 +2618,7 @@
|
|||
"https://www.fireeye.com/blog/threat-research/2017/04/cve-2017-0199_useda.html"
|
||||
],
|
||||
"synonyms": [
|
||||
"BlackOasis"
|
||||
"BlackOasis"
|
||||
]
|
||||
},
|
||||
"description": "Though we have not identified the targets, FINSPY is sold by Gamma Group to multiple nation-state clients, and we assess with moderate confidence that it was being used along with the zero-day to carry out cyber espionage.",
|
||||
|
@ -2988,7 +2988,7 @@
|
|||
"value": "IoT_reaper",
|
||||
"description": "IoT_reaper is fairly large now and is actively expanding. For example, there are multiple C2s we are tracking, the most recently data (October 19) from just one C2 shows the number of unique active bot IP address is more than 10k per day. While at the same time, there are millions of potential vulnerable device IPs being queued into the c2 system waiting to be processed by an automatic loader that injects malicious code to the devices to expand the size of the botnet.",
|
||||
"meta": {
|
||||
"refs" : [
|
||||
"refs": [
|
||||
"http://blog.netlab.360.com/iot_reaper-a-rappid-spreading-new-iot-botnet-en/"
|
||||
]
|
||||
}
|
||||
|
|
Loading…
Reference in New Issue