From 8da36c09e1b71c43f032ed2e2d6275a03ffcc55a Mon Sep 17 00:00:00 2001 From: Alexandre Dulaunoy Date: Sun, 8 Dec 2019 09:03:14 +0100 Subject: [PATCH] chg: [threat-actor] jq --- clusters/threat-actor.json | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/clusters/threat-actor.json b/clusters/threat-actor.json index 3dad8c1..e38fee0 100644 --- a/clusters/threat-actor.json +++ b/clusters/threat-actor.json @@ -7811,7 +7811,7 @@ "uuid": "39925aa0-c7bf-4b9b-97d6-7d600329453d", "value": "TA2101" }, -{ + { "description": "As reported by ZDNet, Chinese cyber-security vendor Qihoo 360 published a report on 2019-11-29 exposing an extensive hacking operation targeting the country of Kazakhstan. Targets included individuals and organizations involving all walks of life, such as government agencies, military personnel, foreign diplomats, researchers, journalists, private companies, the educational sector, religious figures, government dissidents, and foreign diplomats alike. The campaign, Qihoo 360 said, was broad, and appears to have been carried by a threat actor with considerable resources, and one who had the ability to develop their private hacking tools, buy expensive spyware off the surveillance market, and even invest in radio communications interception hardware.", "meta": { "refs": [