diff --git a/clusters/threat-actor.json b/clusters/threat-actor.json index 24ba9df..5fb5f74 100644 --- a/clusters/threat-actor.json +++ b/clusters/threat-actor.json @@ -220,7 +220,8 @@ ], "country": "CN", "refs": [ - "http://www.fireeye.com/blog/technical/cyber-exploits/2013/09/operation-deputydog-zero-day-cve-2013-3893-attack-against-japanese-targets.html" + "http://www.fireeye.com/blog/technical/cyber-exploits/2013/09/operation-deputydog-zero-day-cve-2013-3893-attack-against-japanese-targets.html", + "http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/hidden_lynx.pdf" ] }, "value": "Aurora Panda", @@ -507,15 +508,6 @@ ] } }, - { - "meta": { - "country": "CN", - "refs": [ - "http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/hidden_lynx.pdf" - ] - }, - "value": "HiddenLynx" - }, { "meta": { "country": "CN", @@ -1083,9 +1075,6 @@ { "meta": { "country": "CN", - "synonyms": [ - "Operation C-Major" - ], "refs": [ "http://blog.checkpoint.com/wp-content/uploads/2016/07/HummingBad-Research-report_FINAL-62916.pdf" ]