From 833a6e0a8d72b3b6bf5a6b921c38fabefc0c0348 Mon Sep 17 00:00:00 2001 From: Daniel Plohmann Date: Wed, 2 Feb 2022 09:40:10 +0100 Subject: [PATCH] updated URLs for Gamaredon with Shuckworm alias reference --- clusters/threat-actor.json | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/clusters/threat-actor.json b/clusters/threat-actor.json index 5178c5db..239a323d 100644 --- a/clusters/threat-actor.json +++ b/clusters/threat-actor.json @@ -4197,7 +4197,8 @@ "https://attack.mitre.org/groups/G0047/", "https://github.com/StrangerealIntel/CyberThreatIntel/tree/master/Russia/APT/Gamaredon", "https://go.crowdstrike.com/rs/281-OBQ-266/images/Report2020CrowdStrikeGlobalThreatReport.pdf", - "https://www.welivesecurity.com/2020/06/18/digging-up-invisimole-hidden-arsenal/" + "https://www.welivesecurity.com/2020/06/18/digging-up-invisimole-hidden-arsenal/", + "https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/shuckworm-gamaredon-espionage-ukraine" ], "synonyms": [ "Primitive Bear",