Accenture calls APT32 - "POND LOACH"

pull/518/head
Daniel Plohmann 2020-03-03 19:40:50 +01:00 committed by GitHub
parent 809127cb3d
commit dc059d1f4d
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 5 additions and 3 deletions

View File

@ -4472,7 +4472,8 @@
"https://www.scmagazineuk.com/ocean-lotus-groupapt-32-identified-as-vietnamese-apt-group/article/663565/",
"https://www.brighttalk.com/webcast/10703/261205",
"https://github.com/eset/malware-research/tree/master/oceanlotus",
"https://www.cfr.org/interactive/cyber-operations/ocean-lotus"
"https://www.cfr.org/interactive/cyber-operations/ocean-lotus",
"https://www.accenture.com/us-en/blogs/blogs-pond-loach-delivers-badcake-malware"
],
"synonyms": [
"OceanLotus Group",
@ -4484,7 +4485,8 @@
"Sea Lotus",
"APT-32",
"APT 32",
"Ocean Buffalo"
"Ocean Buffalo",
"POND LOACH"
]
},
"related": [
@ -7967,5 +7969,5 @@
"value": "InvisiMole"
}
],
"version": 155
"version": 156
}