diff --git a/clusters/android.json b/clusters/android.json index b554a733..40ae2559 100644 --- a/clusters/android.json +++ b/clusters/android.json @@ -269,7 +269,7 @@ "description": "Vibleaker was an app available on the Google Play Store named Beaver Gang Counter that contained malicious code that after specific orders from its maker would scan the user's phone for the Viber app, and then steal photos and videos recorded or sent through the app.", "meta": { "refs": [ - "http://news.softpedia.com/news/malicious-android-app-steals-viber-photos-and-videos-505758.shtml" + "http://news.softpedia.com/news/malicious-android-app-steals-viber-photos-and-BankBot-505758.shtml" ] }, "uuid": "27354d65-ca90-4f73-b942-13046e61700c", @@ -4642,7 +4642,18 @@ }, "uuid": "64ee0ae8-2e78-43bf-b81b-e7e5c2e30cd0", "value": "AndroidOS_HidenAd" + }, + { + "description": "The Banking Trojan found in Google Play is identified as Razdel, a variant of BankBot mobile banking Trojan. This newly observed variant has taken mobile threats to the next level incorporating: Remote access Trojan functions, SMS interception, UI (User Interface) Overlay with masqueraded pages etc.", + "meta": { + "refs": [ + "http://www.virusremovalguidelines.com/tag/what-is-bankbot", + "https://mobile.twitter.com/pr3wtd/status/1097477833625088000" + ] + }, + "uuid": "aef548fb-76f5-4eb9-9942-f189cb0d16f6", + "value": "Razdel" } ], - "version": 18 + "version": 19 } diff --git a/clusters/threat-actor.json b/clusters/threat-actor.json index 1207015e..3a0916f2 100644 --- a/clusters/threat-actor.json +++ b/clusters/threat-actor.json @@ -3469,7 +3469,8 @@ "meta": { "refs": [ "https://www.fireeye.com/blog/threat-research/2013/08/operation-molerats-middle-east-cyber-attacks-using-poison-ivy.html", - "http://blog.vectranetworks.com/blog/moonlight-middle-east-targeted-attacks" + "http://blog.vectranetworks.com/blog/moonlight-middle-east-targeted-attacks", + "https://ti.360.net/blog/articles/suspected-molerats-new-attack-in-the-middle-east/" ], "synonyms": [ "Gaza Hackers Team", @@ -3574,7 +3575,8 @@ "meta": { "country": "IR", "refs": [ - "https://www.symantec.com/connect/blogs/iran-based-attackers-use-back-door-threats-spy-middle-eastern-targets" + "https://www.symantec.com/connect/blogs/iran-based-attackers-use-back-door-threats-spy-middle-eastern-targets", + "https://www.symantec.com/blogs/threat-intelligence/chafer-latest-attacks-reveal-heightened-ambitions" ] }, "uuid": "ddd95696-3d9a-4d0c-beec-a34d396182f3", @@ -6387,5 +6389,5 @@ "value": "STOLEN PENCIL" } ], - "version": 93 + "version": 94 }