diff --git a/clusters/threat-actor.json b/clusters/threat-actor.json index c929748..0b964cb 100644 --- a/clusters/threat-actor.json +++ b/clusters/threat-actor.json @@ -669,7 +669,6 @@ "refs": [ "https://securelist.com/analysis/publications/69953/the-naikon-apt/", "https://www.fireeye.com/blog/threat-research/2014/03/spear-phishing-the-news-cycle-apt-actors-leverage-interest-in-the-disappearance-of-malaysian-flight-mh-370.html", - "https://www.cfr.org/interactive/cyber-operations/apt-30", "https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2018/03/07205555/TheNaikonAPT-MsnMM1.pdf", "https://usa.kaspersky.com/resource-center/threats/naikon-targeted-attacks", "https://blog.trendmicro.com/trendlabs-security-intelligence/bkdr_rarstone-new-rat-to-watch-out-for/", @@ -678,10 +677,7 @@ "https://www.secureworks.com/research/threat-profiles/bronze-geneva", "https://cyware.com/news/chinese-naikon-group-back-with-new-espionage-attack-66a8413d", "https://cluster25.io/2022/04/29/lotus-panda-awake-last-strike/", - "https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/eagle-eye-is-back-apt30/", - "https://www2.fireeye.com/rs/fireye/images/rpt-apt30.pdf", "https://attack.mitre.org/wiki/Group/G0013", - "https://www.mandiant.com/sites/default/files/2021-09/rpt-apt30.pdf", "https://www.mandiant.com/resources/insights/apt-groups", "https://www.fireeye.com/content/dam/fireeye-www/summit/cds-2019/presentations/cds19-executive-s08-achievement-unlocked.pdf" ],