mirror of https://github.com/MISP/misp-galaxy
fix iso codes
parent
b83ca4e186
commit
afc4972e25
|
@ -1186,7 +1186,7 @@
|
||||||
"synonyms": [
|
"synonyms": [
|
||||||
"FruityArmor"
|
"FruityArmor"
|
||||||
],
|
],
|
||||||
"country": "UAE"
|
"country": "AE"
|
||||||
},
|
},
|
||||||
"value": "Stealth Falcon",
|
"value": "Stealth Falcon",
|
||||||
"description": "Group targeting Emirati journalists, activists, and dissidents."
|
"description": "Group targeting Emirati journalists, activists, and dissidents."
|
||||||
|
@ -1471,7 +1471,7 @@
|
||||||
"synonyms": [
|
"synonyms": [
|
||||||
"StrongPity"
|
"StrongPity"
|
||||||
],
|
],
|
||||||
"country": "TU"
|
"country": "TR"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -1526,7 +1526,7 @@
|
||||||
"value": "Sath-ı Müdafaa",
|
"value": "Sath-ı Müdafaa",
|
||||||
"description": "A Turkish hacking group, Sath-ı Müdafaa, is encouraging individuals to join its DDoS-for-Points platform that features points and prizes for carrying out distributed denial-of-service (DDoS) attacks against a list of predetermined targets. Their DDoS tool also contains a backdoor to hack the hackers. So the overarching motivation and allegiance of the group is not entirely clear.",
|
"description": "A Turkish hacking group, Sath-ı Müdafaa, is encouraging individuals to join its DDoS-for-Points platform that features points and prizes for carrying out distributed denial-of-service (DDoS) attacks against a list of predetermined targets. Their DDoS tool also contains a backdoor to hack the hackers. So the overarching motivation and allegiance of the group is not entirely clear.",
|
||||||
"meta": {
|
"meta": {
|
||||||
"country": "TU",
|
"country": "TR",
|
||||||
"motive": "Hacktivists-Nationalists"
|
"motive": "Hacktivists-Nationalists"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
|
@ -1534,7 +1534,7 @@
|
||||||
"value": "Aslan Neferler Tim",
|
"value": "Aslan Neferler Tim",
|
||||||
"description": "Turkish nationalist hacktivist group that has been active for roughly one year. According to Domaintools, the group’s site has been registered since December 2015, with an active Twitter account since January 2016. The group carries out distributed denial-of-service (DDoS) attacks and defacements against the sites of news organizations and governments perceived to be critical of Turkey’s policies or leadership, and purports to act in defense of Islam",
|
"description": "Turkish nationalist hacktivist group that has been active for roughly one year. According to Domaintools, the group’s site has been registered since December 2015, with an active Twitter account since January 2016. The group carries out distributed denial-of-service (DDoS) attacks and defacements against the sites of news organizations and governments perceived to be critical of Turkey’s policies or leadership, and purports to act in defense of Islam",
|
||||||
"meta": {
|
"meta": {
|
||||||
"country": "TU",
|
"country": "TR",
|
||||||
"synonyms": [
|
"synonyms": [
|
||||||
"Lion Soldiers Team",
|
"Lion Soldiers Team",
|
||||||
"Phantom Turk"
|
"Phantom Turk"
|
||||||
|
@ -1546,7 +1546,7 @@
|
||||||
"value": "Ayyıldız Tim",
|
"value": "Ayyıldız Tim",
|
||||||
"description": "Ayyıldız (Crescent and Star) Tim is a nationalist hacking group founded in 2002. It performs defacements and DDoS attacks against the websites of governments that it considers to be repressing Muslim minorities or engaged in Islamophobic policies.",
|
"description": "Ayyıldız (Crescent and Star) Tim is a nationalist hacking group founded in 2002. It performs defacements and DDoS attacks against the websites of governments that it considers to be repressing Muslim minorities or engaged in Islamophobic policies.",
|
||||||
"meta": {
|
"meta": {
|
||||||
"country": "TU",
|
"country": "TR",
|
||||||
"synonyms": [
|
"synonyms": [
|
||||||
"Crescent and Star"
|
"Crescent and Star"
|
||||||
],
|
],
|
||||||
|
@ -1557,7 +1557,7 @@
|
||||||
"value": "TurkHackTeam",
|
"value": "TurkHackTeam",
|
||||||
"description": "Founded in 2004, Turkhackteam is one of Turkey’s oldest and most high-profile hacking collectives. According to a list compiled on Turkhackteam’s forum, the group has carried out almost 30 highly publicized hacking campaigns targeting foreign government and commercial websites, including websites of international corporations. ",
|
"description": "Founded in 2004, Turkhackteam is one of Turkey’s oldest and most high-profile hacking collectives. According to a list compiled on Turkhackteam’s forum, the group has carried out almost 30 highly publicized hacking campaigns targeting foreign government and commercial websites, including websites of international corporations. ",
|
||||||
"meta": {
|
"meta": {
|
||||||
"country": "TU",
|
"country": "TR",
|
||||||
"synonyms": [
|
"synonyms": [
|
||||||
"Turk Hack Team"
|
"Turk Hack Team"
|
||||||
],
|
],
|
||||||
|
@ -1642,7 +1642,7 @@
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"meta": {
|
"meta": {
|
||||||
"country": "CHN",
|
"country": "CN",
|
||||||
"synonyms": [
|
"synonyms": [
|
||||||
"Cloudy Omega"
|
"Cloudy Omega"
|
||||||
],
|
],
|
||||||
|
@ -1656,7 +1656,7 @@
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"meta": {
|
"meta": {
|
||||||
"country": "UKR",
|
"country": "UA",
|
||||||
"refs": [
|
"refs": [
|
||||||
"http://www.welivesecurity.com/2016/05/18/groundbait"
|
"http://www.welivesecurity.com/2016/05/18/groundbait"
|
||||||
]
|
]
|
||||||
|
|
Loading…
Reference in New Issue