diff --git a/clusters/target-information.json b/clusters/target-information.json index 7cd4d59..941779c 100644 --- a/clusters/target-information.json +++ b/clusters/target-information.json @@ -8118,7 +8118,27 @@ }, "uuid": "da228f94-4412-4226-9113-e19a55cd4aa5", "value": "Zimbabwe" + }, + { + "meta": { + "capital": "El AaiĂșn", + "currency": "Sahrawi peseta", + "iso-code": [ + "EH" + ], + "official-languages": [ + "Arabic", + "Spanish" + ], + "synonyms": [ + "Sahrawi Republic", + "Western Sahara" + ], + "top-level-domain": ".eh" + }, + "uuid": "e21d3329-62f1-4ee3-8441-586d988a22e2", + "value": "Sahrawi Arab Democratic Republic" } ], - "version": 8 + "version": 9 } diff --git a/clusters/threat-actor.json b/clusters/threat-actor.json index 29d54af..ec362ef 100644 --- a/clusters/threat-actor.json +++ b/clusters/threat-actor.json @@ -2829,7 +2829,9 @@ "https://www.recordedfuture.com/russia-nexus-uac-0113-emulating-telecommunication-providers-in-ukraine", "https://cert.gov.ua/article/405538", "https://cip.gov.ua/services/cm/api/attachment/download?id=60068", - "https://packetstormsecurity.com/news/view/35790/Recent-OT-And-Espionage-Attacks-Linked-To-Russias-Sandworm-Now-Named-APT44.html" + "https://packetstormsecurity.com/news/view/35790/Recent-OT-And-Espionage-Attacks-Linked-To-Russias-Sandworm-Now-Named-APT44.html", + "https://cloud.google.com/blog/topics/threat-intelligence/apt44-unearthing-sandworm?linkId=9627235", + "https://services.google.com/fh/files/misc/apt44-unearthing-sandworm.pdf" ], "synonyms": [ "Quedagh", @@ -15646,5 +15648,5 @@ "value": "Starry Addax" } ], - "version": 305 + "version": 306 }