mirror of https://github.com/MISP/misp-galaxy
add Razdel
parent
f7367ef887
commit
bd3fce00e1
|
@ -269,7 +269,7 @@
|
|||
"description": "Vibleaker was an app available on the Google Play Store named Beaver Gang Counter that contained malicious code that after specific orders from its maker would scan the user's phone for the Viber app, and then steal photos and videos recorded or sent through the app.",
|
||||
"meta": {
|
||||
"refs": [
|
||||
"http://news.softpedia.com/news/malicious-android-app-steals-viber-photos-and-videos-505758.shtml"
|
||||
"http://news.softpedia.com/news/malicious-android-app-steals-viber-photos-and-BankBot-505758.shtml"
|
||||
]
|
||||
},
|
||||
"uuid": "27354d65-ca90-4f73-b942-13046e61700c",
|
||||
|
@ -4642,7 +4642,18 @@
|
|||
},
|
||||
"uuid": "64ee0ae8-2e78-43bf-b81b-e7e5c2e30cd0",
|
||||
"value": "AndroidOS_HidenAd"
|
||||
},
|
||||
{
|
||||
"description": "The Banking Trojan found in Google Play is identified as Razdel, a variant of BankBot mobile banking Trojan. This newly observed variant has taken mobile threats to the next level incorporating: Remote access Trojan functions, SMS interception, UI (User Interface) Overlay with masqueraded pages etc.",
|
||||
"meta": {
|
||||
"refs": [
|
||||
"http://www.virusremovalguidelines.com/tag/what-is-bankbot",
|
||||
"https://mobile.twitter.com/pr3wtd/status/1097477833625088000"
|
||||
]
|
||||
},
|
||||
"uuid": "aef548fb-76f5-4eb9-9942-f189cb0d16f6",
|
||||
"value": "Razdel"
|
||||
}
|
||||
],
|
||||
"version": 18
|
||||
"version": 19
|
||||
}
|
||||
|
|
|
@ -3469,7 +3469,8 @@
|
|||
"meta": {
|
||||
"refs": [
|
||||
"https://www.fireeye.com/blog/threat-research/2013/08/operation-molerats-middle-east-cyber-attacks-using-poison-ivy.html",
|
||||
"http://blog.vectranetworks.com/blog/moonlight-middle-east-targeted-attacks"
|
||||
"http://blog.vectranetworks.com/blog/moonlight-middle-east-targeted-attacks",
|
||||
"https://ti.360.net/blog/articles/suspected-molerats-new-attack-in-the-middle-east/"
|
||||
],
|
||||
"synonyms": [
|
||||
"Gaza Hackers Team",
|
||||
|
@ -3574,7 +3575,8 @@
|
|||
"meta": {
|
||||
"country": "IR",
|
||||
"refs": [
|
||||
"https://www.symantec.com/connect/blogs/iran-based-attackers-use-back-door-threats-spy-middle-eastern-targets"
|
||||
"https://www.symantec.com/connect/blogs/iran-based-attackers-use-back-door-threats-spy-middle-eastern-targets",
|
||||
"https://www.symantec.com/blogs/threat-intelligence/chafer-latest-attacks-reveal-heightened-ambitions"
|
||||
]
|
||||
},
|
||||
"uuid": "ddd95696-3d9a-4d0c-beec-a34d396182f3",
|
||||
|
@ -6387,5 +6389,5 @@
|
|||
"value": "STOLEN PENCIL"
|
||||
}
|
||||
],
|
||||
"version": 93
|
||||
"version": 94
|
||||
}
|
||||
|
|
Loading…
Reference in New Issue