diff --git a/elements/adversary-groups.json b/elements/adversary-groups.json index be9bffe..edd6a05 100644 --- a/elements/adversary-groups.json +++ b/elements/adversary-groups.json @@ -209,11 +209,13 @@ "PLA Unit 78020", "APT 30", "Override Panda", - "Camerashy" + "Camerashy", + "APT.Naikon" ], "country": "CN", "refs": [ - "https://securelist.com/analysis/publications/69953/the-naikon-apt/" + "https://securelist.com/analysis/publications/69953/the-naikon-apt/", + "http://www.fireeye.com/blog/technical/malware-research/2014/03/spear-phishing-the-news-cycle-apt-actors-leverage-interest-in-the-disappearance-of-malaysian-flight-mh-370.html" ], "group": "Naikon" }, @@ -351,6 +353,12 @@ "country": "CN", "group": "Pitty Panda" }, + { + "group": "Roaming Tiger", + "refs": [ + "http://researchcenter.paloaltonetworks.com/2015/12/bbsrat-attacks-targeting-russian-organizations-linked-to-roaming-tiger/" + ] + }, { "country": "CN", "refs": [ @@ -370,6 +378,13 @@ "country": "CN", "group": "Dagger Panda" }, + { + "group": "APT.3102", + "country": "CN", + "refs": [ + "http://researchcenter.paloaltonetworks.com/2015/09/chinese-actors-use-3102-malware-in-attacks-on-us-government-and-eu-media/" + ] + }, { "synonyms": [ "PLA Navy",