From 97fd1ed3095d69def602631dfc0bfdf30e342023 Mon Sep 17 00:00:00 2001 From: Alexandre Dulaunoy Date: Sun, 2 Jun 2024 09:30:18 +0200 Subject: [PATCH] chg: [threat-actor] jq all the things --- clusters/threat-actor.json | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/clusters/threat-actor.json b/clusters/threat-actor.json index b25c2922..ac66f12d 100644 --- a/clusters/threat-actor.json +++ b/clusters/threat-actor.json @@ -8967,7 +8967,6 @@ { "description": "An actor mainly targeting Pakistan military targets, active since at least 2012. We have low confidence that this malware might be authored by an Indian company. To spread the malware, they use unique implementations to leverage the exploits of known vulnerabilities (such as CVE-2017-11882) and later deploy a Powershell payload in the final stages.", "meta": { - "country": "IN", "cfr-suspected-state-sponsor": "India", "cfr-suspected-victims": [ "China", @@ -8980,6 +8979,7 @@ "Military", "Private Sector" ], + "country": "IN", "refs": [ "https://securelist.com/apt-trends-report-q1-2018/85280/", "https://blog.trendmicro.com/trendlabs-security-intelligence/first-active-attack-exploiting-cve-2019-2215-found-on-google-play-linked-to-sidewinder-apt-group/",