diff --git a/clusters/tool.json b/clusters/tool.json index 9e4ac50..21bb1b5 100644 --- a/clusters/tool.json +++ b/clusters/tool.json @@ -8268,7 +8268,21 @@ "related": [], "uuid": "95174297-6dff-47d9-bcb9-263f9b2efcfb", "value": "Exaramel" + }, + { + "description": "RDAT is a backdoor used by the suspected Iranian threat group OilRig. RDAT was originally identified in 2017 and targeted companies in the telecommunications sector.", + "meta": { + "refs": [ + "https://unit42.paloaltonetworks.com/oilrig-novel-c2-channel-steganography/" + ], + "type": [ + "backdoor" + ] + }, + "related": [], + "uuid": "d357a6ff-00e5-4fcc-8b9e-4a9d98a736e7", + "value": "RDAT" } ], - "version": 142 + "version": 143 }