From 18eebc01f652405f5a1522e24139bf502e71a481 Mon Sep 17 00:00:00 2001 From: StefanKelm Date: Tue, 29 Sep 2020 12:02:16 +0200 Subject: [PATCH] Lazarus --- clusters/threat-actor.json | 7 ++++--- 1 file changed, 4 insertions(+), 3 deletions(-) diff --git a/clusters/threat-actor.json b/clusters/threat-actor.json index 68187a1..95394ed 100644 --- a/clusters/threat-actor.json +++ b/clusters/threat-actor.json @@ -3038,7 +3038,7 @@ "https://securelist.com/operation-applejeus/87553/", "https://securelist.com/lazarus-under-the-hood/77908/", "https://www.us-cert.gov/HIDDEN-COBRA-North-Korean-Malicious-Cyber-Activity", - "http://www.mcafee.com/us/resources/white-papers/wp-dissecting-operation-troy.pdf", + "https://www.mcafee.com/enterprise/en-us/assets/white-papers/wp-dissecting-operation-troy.pdf", "https://www.bleepingcomputer.com/news/security/north-korean-hackers-are-up-to-no-good-again/", "https://www.cfr.org/interactive/cyber-operations/lazarus-group", "https://www.cfr.org/interactive/cyber-operations/operation-ghostsecret", @@ -3080,7 +3080,8 @@ "https://www.darkreading.com/attacks-breaches/north-korean-hacking-group-steals-$135-million-from-indian-bank-/d/d-id/1332678", "https://www.zdnet.com/article/north-korean-hackers-infiltrate-chiles-atm-network-after-skype-job-interview/", "https://blogs.jpcert.or.jp/en/2020/08/Lazarus-malware.html", - "https://www.secureworks.com/research/threat-profiles/nickel-gladstone" + "https://www.secureworks.com/research/threat-profiles/nickel-gladstone", + "https://blogs.jpcert.or.jp/en/2020/09/BLINDINGCAN.html" ], "synonyms": [ "Operation DarkSeoul", @@ -8391,5 +8392,5 @@ "value": "Fox Kitten" } ], - "version": 181 + "version": 182 }