This repository was archived by the owner on Oct 13, 2025. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 45
Expand file tree
/
Copy pathplaybooks.json
More file actions
85 lines (85 loc) · 24 KB
/
playbooks.json
File metadata and controls
85 lines (85 loc) · 24 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
[
{"id": "report--af2cb8e5-5d1c-4964-bfe1-75ebc90f8627", "pb_file": "evasive-serpens.json", "last_updated": "2022-04-14T10:14:09.491Z", "title": "EVASIVE SERPENS", "industries": ["communications", "education", "financial-services", "government-regional", "infrastructure", "insurance", "technology", "telecommunications"], "regions": ["AE", "IL", "SA"], "malwares": ["Clayslide", "Helminth", "ISMAgent", "ISMInjector", "OopsIE", "ThreeDollars"]},
{"id": "report--708d589b-8d99-48fd-bbb6-2d47648f807f", "pb_file": "fighting-ursa.json", "last_updated": "2024-06-25T16:47:00.800Z", "title": "FIGHTING URSA", "industries": ["defence", "government-national", "government-regional", "healthcare"], "regions": ["AU", "CH", "ES", "GB", "KZ", "NO", "US", "ZA"], "malwares": ["Cannon", "Zebrocy"]},
{"id": "report--a615392f-4e01-4cb9-8b6c-ef9862f87da5", "pb_file": "pryinglibra.json", "last_updated": "2021-09-30T00:00:00.000Z", "title": "PRYING LIBRA", "industries": [], "regions": ["BR", "DZ", "EG", "ID", "PE", "PH", "TH", "TR", "VE", "VN"], "malwares": ["XMRIG"]},
{"id": "report--59afb48d-0f9c-434d-be6a-69515424b0c3", "pb_file": "obscureserpens.json", "last_updated": "2021-09-30T00:00:00.000Z", "title": "OBSCURE SERPENS", "industries": ["education", "government-regional"], "regions": [], "malwares": ["Phishery"]},
{"id": "report--c88a51b6-e28d-40bd-88c8-c14f2686d221", "pb_file": "moldypisces.json", "last_updated": "2021-09-30T00:00:00.000Z", "title": "MOLDY PISCES", "industries": ["entertainment", "financial-services", "government-local"], "regions": ["KR"], "malwares": ["DogCall", "Freenki", "PoohMilk", "ROKRAT"]},
{"id": "report--186d2f1b-1b39-451b-9003-d23498cc09e3", "pb_file": "rancortaurus.json", "last_updated": "2021-09-30T00:00:00.000Z", "title": "RANCOR TAURUS", "industries": ["government-local"], "regions": ["KH", "SG"], "malwares": ["DDKONG", "DUDELL", "KHRAT", "PLAINTEE"]},
{"id": "report--c671b3a3-2964-40ae-a80a-382b6598ea43", "pb_file": "stalkertaurus.json", "last_updated": "2021-09-30T00:00:00.000Z", "title": "STALKER TAURUS", "industries": ["defence", "technology"], "regions": ["JP", "KR"], "malwares": ["HomamDownloader", "Muirim", "Symonloader"]},
{"id": "report--071bdbfe-2933-4ad2-baf1-3d77d654a079", "pb_file": "shallowtaurus.json", "last_updated": "2021-09-30T00:00:00.000Z", "title": "SHALLOW TAURUS", "industries": ["education", "energy", "manufacturing", "technology"], "regions": ["JP", "RU", "TW"], "malwares": ["FormerFirstRAT", "IsSpace", "Sysget", "Sysget Version 2", "Sysget Version 3"]},
{"id": "report--9d8ecf25-ca54-4516-b68d-3d165e6f816b", "pb_file": "granite-taurus.json", "last_updated": "2021-09-30T00:00:00.000Z", "title": "GRANITE TAURUS", "industries": ["education", "manufacturing", "pharmaceuticals"], "regions": ["JP", "US"], "malwares": ["ChChes"]},
{"id": "report--64e83256-077b-41e7-a729-357ad21ce60c", "pb_file": "iron-taurus.json", "last_updated": "2021-09-30T00:00:00.000Z", "title": "IRON TAURUS", "industries": ["government-national"], "regions": [], "malwares": ["China Chopper", "HyperBro"]},
{"id": "report--ff121304-29ad-476f-9659-9e79cc464cf6", "pb_file": "boggyserpens.json", "last_updated": "2021-09-30T00:00:00.000Z", "title": "BOGGY SERPENS", "industries": ["government-regional"], "regions": ["AE", "GE", "IL", "IN", "IQ", "PK", "SA", "TR", "US"], "malwares": ["POWERSTATS", "laZagne"]},
{"id": "report--ac138246-23c7-4d83-ac03-d991444af59a", "pb_file": "radioserpens.json", "last_updated": "2021-09-30T00:00:00.000Z", "title": "RADIO SERPENS", "industries": ["government-national"], "regions": ["TR"], "malwares": ["Mechaflounder"]},
{"id": "report--abfa8e35-d096-4e77-bdc3-f7a9ad8c2ace", "pb_file": "agedlibra.json", "last_updated": "2022-04-13T20:13:24.103Z", "title": "AGED LIBRA", "industries": [], "regions": [], "malwares": ["CoinMiner", "Godlua", "XBash"]},
{"id": "report--f36a1e63-90a1-4353-a1e7-f63c0608a422", "pb_file": "mulelibra.json", "last_updated": "2021-09-30T00:00:00.000Z", "title": "MULE LIBRA", "industries": ["financial-services"], "regions": [], "malwares": []},
{"id": "report--42b0b7d0-1f78-463d-90e5-e69bafa85a38", "pb_file": "clean-ursa.json", "last_updated": "2021-09-30T00:00:00.000Z", "title": "CLEAN URSA", "industries": ["government-national"], "regions": ["FR", "RU", "UA"], "malwares": ["POWERSHOWER"]},
{"id": "report--ea9edd05-0c5a-454f-a266-b093515a8c9d", "pb_file": "pastydraco.json", "last_updated": "2021-09-30T00:00:00.000Z", "title": "PASTY DRACO", "industries": ["government-national"], "regions": ["ES", "GB", "RU", "US"], "malwares": ["NanoCoreRAT"]},
{"id": "report--75faa9a4-d2c6-4fc1-83d0-d918edba9faa", "pb_file": "golfing-taurus.json", "last_updated": "2021-09-30T00:00:00.000Z", "title": "GOLFING TAURUS", "industries": ["defence", "government-national", "technology"], "regions": ["CN", "IN", "RU"], "malwares": ["CallMe", "FakeM", "Psylo"]},
{"id": "report--0e80709c-a2c8-4b54-9769-562f1d0405ef", "pb_file": "crawling-taurus.json", "last_updated": "2021-09-30T00:00:00.000Z", "title": "CRAWLING TAURUS", "industries": ["education", "financial-services", "manufacturing", "retail", "technology"], "regions": ["US"], "malwares": ["PoisonIvy"]},
{"id": "report--6439e5d9-b8fc-4f65-91f1-e1f981731df9", "pb_file": "windyphoenix.json", "last_updated": "2021-09-30T00:00:00.000Z", "title": "WINDY PHOENIX", "industries": ["government-national"], "regions": [], "malwares": ["WINDTAIL.B"]},
{"id": "report--85df8a85-dd04-4a63-8a9a-1e6323f52bcd", "pb_file": "statelytaurus.json", "last_updated": "2021-09-30T00:00:00.000Z", "title": "STATELY TAURUS", "industries": ["healthcare"], "regions": ["CN", "JP", "MM", "MN", "TW"], "malwares": ["9002", "Farseer", "Henbox", "PlugX", "PoisonIvy"]},
{"id": "report--cfe5cbe7-bbe5-48e4-89df-d8c1f561df25", "pb_file": "crooked-pisces.json", "last_updated": "2021-09-30T00:00:00.000Z", "title": "CROOKED PISCES", "industries": ["financial-services", "government-national", "government-regional"], "regions": ["KH", "KR", "RU", "US"], "malwares": ["CARROTBALL", "CARROTBAT", "NOKKI", "SYSCON"]},
{"id": "report--d5c8bfcf-e2f7-4427-8fa8-6fbc05a8938e", "pb_file": "hunter-serpens.json", "last_updated": "2021-09-30T00:00:00.000Z", "title": "HUNTER SERPENS", "industries": ["government-national", "transportation"], "regions": ["KW"], "malwares": ["EYE", "Gon", "Hisoka", "Killua", "Netero", "Sakabota", "Snugy", "TriFive"]},
{"id": "report--0f86dccd-29bd-46c6-83fd-e79ba040bf05", "pb_file": "maze-ransomware.json", "last_updated": "2021-09-30T00:00:00.000Z", "title": "MAZE RANSOMWARE", "industries": ["construction", "financial-services", "healthcare", "pharmaceuticals", "technology"], "regions": ["AU", "BR", "CN", "ES", "IT", "US"], "malwares": ["Maze"]},
{"id": "report--e06ff13e-810a-4f46-be1c-0ede839825d0", "pb_file": "temp-acidbox.json", "last_updated": "2021-09-30T00:00:00.000Z", "title": "ACIDBOX MALWARE", "industries": [], "regions": ["RU"], "malwares": []},
{"id": "report--def4456e-1b28-4686-a3e7-128d06b99895", "pb_file": "ekans-ransomware.json", "last_updated": "2021-09-30T00:00:00.000Z", "title": "EKANS RANSOMWARE", "industries": ["automotive", "energy", "healthcare"], "regions": [], "malwares": ["EKANS"]},
{"id": "report--7596f10d-e0f7-4a9c-b7e3-b76e2ea3a476", "pb_file": "wastedlocker-ransomware.json", "last_updated": "2021-09-30T00:00:00.000Z", "title": "WASTEDLOCKER RANSOMWARE", "industries": ["energy", "engineering", "financial-services", "healthcare", "manufacturing", "pharmaceuticals", "retail", "technology", "transportation"], "regions": ["US"], "malwares": ["SocGholish", "WastedLocker"]},
{"id": "report--fd15aae1-84df-4d71-ad89-c1c8eac28fc6", "pb_file": "adept-libra.json", "last_updated": "2022-04-13T20:18:15.506Z", "title": "ADEPT LIBRA", "industries": ["defence", "education", "financial-services", "healthcare", "retail", "technology"], "regions": [], "malwares": ["Peirates", "XMRIG"]},
{"id": "report--3d690b19-f459-4a76-a5dd-b76d289251c5", "pb_file": "ryuk-ransomware.json", "last_updated": "2021-09-30T00:00:00.000Z", "title": "RYUK RANSOMWARE", "industries": ["healthcare"], "regions": [], "malwares": ["Ryuk"]},
{"id": "report--61813f09-8b0b-4080-bced-731b6c8281c4", "pb_file": "trickbot.json", "last_updated": "2021-09-30T00:00:00.000Z", "title": "TRICKBOT MALWARE", "industries": ["healthcare"], "regions": ["US"], "malwares": ["Trickbot"]},
{"id": "report--fd8718e6-bf57-4bfe-8184-551e2d93d7c8", "pb_file": "egregor-ransomware.json", "last_updated": "2021-09-30T00:00:00.000Z", "title": "EGREGOR RANSOMWARE", "industries": ["entertainment", "retail", "technology"], "regions": ["CL", "US"], "malwares": ["Egregor"]},
{"id": "report--158e7478-d86b-45ac-93f2-9ab70eadfd68", "pb_file": "solarphoenix.json", "last_updated": "2021-09-30T00:00:00.000Z", "title": "SOLAR PHOENIX", "industries": ["communications", "government-national", "technology", "telecommunications"], "regions": ["AE", "BE", "CA", "DE", "ES", "GB", "HK", "IL", "MX", "US"], "malwares": ["Bloodhound", "Rubeus", "SUNBURST", "TEARDROP"]},
{"id": "report--acc78161-ef51-4349-a675-8d3e2f87b9ae", "pb_file": "monsterlibra.json", "last_updated": "2022-08-16T00:00:00.000Z", "title": "MONSTER LIBRA", "industries": [], "regions": ["DE", "IT", "JP", "US"], "malwares": ["IcedID", "Ursnif/Gozi ISFB", "Valak"]},
{"id": "report--c0648594-fe95-42f3-bbe1-5460444e159a", "pb_file": "mangataurus.json", "last_updated": "2021-09-30T00:00:00.000Z", "title": "MANGA TAURUS", "industries": ["government-national"], "regions": ["TW"], "malwares": ["BendyBear"]},
{"id": "report--6709b342-a101-4365-b55f-47e69db38ef0", "pb_file": "zero-day-microsoft-exchange-vulnerabilities.json", "last_updated": "2021-09-30T00:00:00.000Z", "title": "ZERO-DAY-MICROSOFT-EXCHANGE-VULNERABILITIES", "industries": ["education", "financial-services", "government-local", "healthcare"], "regions": ["AE", "BD", "BR", "CA", "GB", "IL", "IT", "KR", "KZ", "MX", "PK", "RU", "SI", "TR", "US", "UZ", "ZA"], "malwares": ["China Chopper"]},
{"id": "report--44db0986-9e10-4d15-a3b1-9260ab52d613", "pb_file": "dearcry-ransomware.json", "last_updated": "2021-09-30T00:00:00.000Z", "title": "DEARCRY RANSOMWARE", "industries": [], "regions": ["AU", "CA", "US"], "malwares": ["DEARCRY"]},
{"id": "report--70d827ca-ec87-423a-8ad5-b5eb94f86ae2", "pb_file": "clop-ransomware.json", "last_updated": "2021-09-30T00:00:00.000Z", "title": "CLOP RANSOMWARE", "industries": ["aerospace", "automotive", "education", "energy", "engineering", "financial-services", "healthcare", "manufacturing", "pharmaceuticals", "retail", "technology", "telecommunications", "transportation"], "regions": ["AU", "DK", "GB", "IN", "MX", "SG", "TR", "US"], "malwares": ["Clop"]},
{"id": "report--5d071ccc-4030-49a0-94f5-ac68488f4c4f", "pb_file": "darkside-ransomware.json", "last_updated": "2021-09-30T00:00:00.000Z", "title": "DARKSIDE RANSOMWARE", "industries": ["energy", "entertainment", "financial-services", "manufacturing", "retail", "technology", "utilities"], "regions": ["DE", "ES", "FR", "GB", "IT", "QA", "US", "ZA"], "malwares": ["Darkside"]},
{"id": "report--be4f89e6-5df0-4e33-8173-c2566264552c", "pb_file": "prometheus-ransomware.json", "last_updated": "2021-09-30T00:00:00.000Z", "title": "PROMETHEUS RANSOMWARE", "industries": ["agriculture", "energy", "financial-services", "government-regional", "healthcare", "insurance", "manufacturing", "transportation", "utilities"], "regions": ["AT", "BR", "CH", "CL", "FR", "GB", "GH", "IN", "IT", "MX", "MY", "PE", "SV", "US"], "malwares": ["Prometheus"]},
{"id": "report--ef0b4ddc-97ae-4094-a18c-d93d3eca1455", "pb_file": "conti-ransomware.json", "last_updated": "2021-09-30T00:00:00.000Z", "title": "CONTI RANSOMWARE", "industries": ["construction", "education", "energy", "entertainment", "financial-services", "government-public-services", "healthcare", "hospitality-leisure", "manufacturing", "mining", "non-profit", "pharmaceuticals", "retail", "technology", "telecommunications", "utilities"], "regions": ["AU", "BS", "CA", "CH", "DE", "ES", "FR", "GB", "IE", "IN", "IT", "JP", "MX", "NZ", "TW", "US"], "malwares": ["Conti"]},
{"id": "report--9c560179-d00d-4835-a74f-c55b9be25276", "pb_file": "revil-ransomware.json", "last_updated": "2022-06-03T20:36:25.220Z", "title": "REVIL RANSOMWARE", "industries": ["agriculture", "automotive", "energy", "financial-services", "healthcare", "hospitality-leisure", "manufacturing", "retail", "technology"], "regions": ["AR", "BR", "CA", "CL", "ES", "GB", "MX", "SE", "US", "ZA"], "malwares": ["REvil"]},
{"id": "report--9d2263e3-41d8-4a29-8066-37bb5581ac25", "pb_file": "mespinoza-ransomware.json", "last_updated": "2021-09-30T00:00:00.000Z", "title": "MESPINOZA RANSOMWARE", "industries": ["construction", "defence", "education", "engineering", "entertainment", "financial-services", "government-local", "hospitality-leisure", "manufacturing", "mining", "non-profit", "pharmaceuticals", "retail", "technology", "telecommunications", "transportation", "utilities"], "regions": ["AR", "AU", "BE", "BR", "CA", "CH", "CO", "DE", "DK", "ES", "FR", "GB", "IE", "IL", "IT", "KE", "MX", "NL", "NO", "PT", "RO", "SA", "SK", "US", "ZA"], "malwares": ["Gasket", "MagicSocks", "Mespinoza"]},
{"id": "report--178b7328-66f7-49bd-a205-14511dd14b08", "pb_file": "hive-ransomware.json", "last_updated": "2021-09-30T08:54:43.305Z", "title": "HIVE RANSOMWARE", "industries": ["aerospace", "communications", "construction", "education", "financial-services", "hospitality-leisure", "non-profit", "retail", "technology", "transportation"], "regions": ["GB", "IN", "PE", "US"], "malwares": ["Hive"]},
{"id": "report--c67a9b09-e3a1-407c-942c-d0bea138be04", "pb_file": "hellokitty-ransomware.json", "last_updated": "2021-09-30T08:58:13.728Z", "title": "HELLOKITTY RANSOMWARE", "industries": ["healthcare", "manufacturing", "pharmaceuticals"], "regions": ["DE", "IT", "NL", "US"], "malwares": ["Hello Kitty"]},
{"id": "report--70f299df-402b-474a-bf7d-a7e5a7d1866c", "pb_file": "avoslocker-ransomware.json", "last_updated": "2021-09-30T09:17:51.756Z", "title": "AVOSLOCKER RANSOMWARE", "industries": ["financial-services", "government-local", "transportation"], "regions": ["AE", "BE", "ES", "GB", "LB", "US"], "malwares": []},
{"id": "report--81ff21f8-6955-4b70-91dc-dce2608512ac", "pb_file": "lockbit-2.0-ransomware.json", "last_updated": "2021-09-30T09:20:18.487Z", "title": "LOCKBIT-2.0 RANSOMWARE", "industries": ["automotive", "communications", "construction", "defence", "energy", "engineering", "financial-services", "government-local", "manufacturing", "non-profit", "retail", "technology", "transportation", "utilities"], "regions": ["AR", "AT", "AU", "BE", "BR", "CH", "DE", "GB", "IT", "MX", "MY", "RO", "US"], "malwares": ["Lockbit 2.0"]},
{"id": "report--3d788681-9bb9-4a86-94bc-f13746ec6582", "pb_file": "tiltedtemple.json", "last_updated": "2022-02-23T16:03:53.797Z", "title": "TILTEDTEMPLE CAMPAIGN", "industries": ["defense", "education", "energy", "entertainment", "financial-services", "healthcare", "hospitality-leisure", "insurance", "technology"], "regions": ["GB", "US"], "malwares": []},
{"id": "report--74ffc262-d3d5-4d3d-9f6c-7786ad60ade6", "pb_file": "ruinousursa.json", "last_updated": "2022-02-07T09:29:47.826Z", "title": "RUINOUS URSA", "industries": [], "regions": ["UA"], "malwares": []},
{"id": "report--69c257d9-a57c-4d8e-9f9b-0d7f3dae1ed3", "pb_file": "agent-tesla.json", "last_updated": "2022-03-03T10:29:24.017Z", "title": "AGENT TESLA", "industries": ["education", "financial-services", "government", "manufacturing", "pharmaceuticals", "retail", "technology", "telecommunications", "transportation"], "regions": ["CH", "DE", "EE", "FR", "ID", "IT", "NO", "US"], "malwares": []},
{"id": "report--afe1a8b7-58ab-4232-971f-b96abae8657c", "pb_file": "blackcat-ransomware.json", "last_updated": "2022-01-27T14:18:25.222Z", "title": "BLACKCAT RANSOMWARE", "industries": ["aerospace", "commercial", "construction", "engineering", "financial-services", "government-local", "healthcare", "hospitality-leisure", "insurance", "manufacturing", "retail", "technology", "telecommunications", "transportation"], "regions": ["DE", "ES", "FR", "NL", "PH", "US"], "malwares": []},
{"id": "report--bc25e190-73e4-4151-81af-b86764439d17", "pb_file": "tridentursa.json", "last_updated": "2022-02-16T11:07:56.387Z", "title": "TRIDENT URSA", "industries": ["government"], "regions": ["UA"], "malwares": []},
{"id": "report--e5388435-2f21-4cb1-bf43-3e2b990461e1", "pb_file": "hermeticwiper.json", "last_updated": "2022-02-28T13:15:07.029Z", "title": "HERMETICWIPER MALWARE", "industries": ["government"], "regions": ["LT", "LV", "UA"], "malwares": []},
{"id": "report--6c17e96c-85b5-4a11-b16d-8888cca8af21", "pb_file": "nascentursa.json", "last_updated": "2022-02-28T12:46:55.714Z", "title": "NASCENT URSA", "industries": ["energy"], "regions": ["UA"], "malwares": []},
{"id": "report--3721a9aa-ea5e-43d9-b85e-05548586818e", "pb_file": "thieflibra.json", "last_updated": "2022-04-13T20:15:46.952Z", "title": "THIEF LIBRA", "industries": [], "regions": [], "malwares": []},
{"id": "report--df91a877-a1c4-4ce4-8f68-74699f29bed3", "pb_file": "moneylibra.json", "last_updated": "2022-04-13T20:09:39.059Z", "title": "MONEY LIBRA", "industries": [], "regions": [], "malwares": []},
{"id": "report--0f3ef0b3-e580-4028-9bbe-c43ac8f281c4", "pb_file": "returnedlibra.json", "last_updated": "2022-04-13T20:03:34.105Z", "title": "RETURNED LIBRA", "industries": [], "regions": [], "malwares": []},
{"id": "report--a9087b33-df53-4658-9cc5-791dda7191c8", "pb_file": "solarmarker.json", "last_updated": "2022-04-14T09:34:44.717Z", "title": "SOLARMARKER MALWARE", "industries": [], "regions": ["US"], "malwares": ["SolarMarker"]},
{"id": "report--630b19de-5964-4eaf-a8bc-96cef23ff9d8", "pb_file": "f5-big-ip-cve-2022-1388.json", "last_updated": "2022-05-11T15:09:24.609Z", "title": "F5-BIG-IP CVE-2022-1388", "industries": [], "regions": [], "malwares": []},
{"id": "report--121dcd55-360d-46f8-b5ce-d89bfbdc77ae", "pb_file": "emotet.json", "last_updated": "2022-05-18T14:48:44.051Z", "title": "EMOTET MALWARE", "industries": [], "regions": [], "malwares": []},
{"id": "report--1ca63b8e-378f-4492-bfba-1f3ae574f1d0", "pb_file": "vmware-vulnerabilities.json", "last_updated": "2022-05-19T18:40:30.071Z", "title": "VMWARE VULNERABILITIES", "industries": [], "regions": [], "malwares": []},
{"id": "report--9821788e-22c9-45a8-981f-8054b30c8c46", "pb_file": "popping-eagle.json", "last_updated": "2022-06-02T18:48:57.202Z", "title": "POPPING-EAGLE MALWARE", "industries": [], "regions": [], "malwares": []},
{"id": "report--e5c8f5ec-725b-4f77-b3af-621b96ef0b3c", "pb_file": "atlassian-confluence-CVE-2022-26134.json", "last_updated": "2022-06-15T19:54:09.010Z", "title": "ATLASSIAN-CONFLUENCE-CVE-2022-26134", "industries": [], "regions": [], "malwares": []},
{"id": "report--a6ffa1c5-a15a-4eea-b4f5-48f39a13b327", "last_updated": "2022-07-01T02:00:04.914Z", "pb_file": "brute-ratel.json", "title": "BRUTE-RATEL TOOL", "industries": [], "regions": [], "malwares": []},
{"id": "report--59fb0b01-8874-4c03-b499-54cc8b2e8f19", "pb_file": "chromeloader.json", "last_updated": "2022-06-09T17:59:08.930Z", "title": "CHROMELOADER", "industries": [], "regions": [], "malwares": []},
{"id": "report--523c204a-d965-4a7b-95d6-25c63e86a2d5", "pb_file": "api-hammering-technique.json", "last_updated": "2022-05-10T18:16:57.138Z", "title": "API-HAMMERING-TECHNIQUE", "industries": [], "regions": [], "malwares": []},
{"id": "report--1ddc8d15-53dd-4d86-9b9d-b57c76a6ce30", "pb_file": "web-shells-in-digium-phones.json", "last_updated": "2022-07-14T18:17:12.205Z", "title": "WEB-SHELLS-IN-DIGIUM-PHONES", "industries": [], "regions": [], "malwares": []},
{"id": "report--393c1aa8-3e17-41b0-adb7-bbc2ede6c3a3", "pb_file": "thirstygemini.json", "last_updated": "2021-09-30T00:00:00.000Z", "title": "THIRSTY GEMINI", "industries": ["Defence", "government-national"], "regions": ["PK", "BD"], "malwares": ["BADNEWS", "BACKCONFIG"]},
{"id": "report--bb37cc00-8e88-4223-beb3-9bc53a6192c9", "last_updated": "2022-07-19T01:50:51.327Z", "pb_file": "cloaked-ursa.json", "title": "CLOAKED URSA", "industries": ["government", "education", "government-national"], "regions": ["BR", "PT", "US"], "malwares": []},
{"id": "report--dc1f546c-575c-4124-98ea-86635e25ab60", "last_updated": "2022-08-03T11:33:36.767Z", "pb_file": "projector-libra.json", "title": "PROJECTOR LIBRA", "industries": [], "regions": [], "malwares": ["Bumblebee"]},
{"id": "report--a5f43de8-dd66-4650-8796-78833c6bfb0b", "last_updated": "2022-08-09T14:46:52.539Z", "pb_file": "tropicalscorpius.json", "title": "TROPICAL SCORPIUS", "industries": ["construction", "education", "energy", "financial-services", "government", "government-local", "healthcare", "manufacturing", "retail", "technology", "transportation", "utilities"], "regions": ["AU", "CA", "CO", "IN", "IT", "NZ", "PL", "TW", "US"], "malwares": []},
{"id": "report--04a58319-7269-4bce-b67c-0a70e3b97ad7", "last_updated": "2022-08-29T12:57:16.796Z", "pb_file": "blackbasta-ransomware.json", "title": "BLACK BASTA RANSOMWARE", "industries": ["energy", "manufacturing", "agriculture", "transportation", "real estate"], "regions": ["Australia", "Canada", "New Zealand", "U.K.", "U.S."], "malwares": []},
{"id": "report--959e0017-c770-4387-b9d8-fb310ae0f251", "pb_file": "icedid.json", "last_updated": "2022-09-20T19:44:28.675Z", "title": "ICEDID MALWARE", "industries": [], "regions": [], "malwares": []},
{"id": "report--a26ac824-d370-44d8-8e54-d8ee9eda3dc8", "pb_file": "ransom-cartel.json", "last_updated": "2022-09-23T13:44:47.892Z", "title": "RANSOM-CARTEL RANSOMWARE", "industries": [], "regions": [], "malwares": []},
{"id": "report--a26ac824-d370-44d8-8e54-d8ee9eda3dc8", "pb_file": "bluesky-ransomware.json", "last_updated": "2022-08-10T13:45:02.404Z", "title": "BLUESKY RANSOMWARE", "industries": [], "regions": [], "malwares": []},
{"id": "report--798aa679-5c2e-4652-afc6-77c545e8ce46", "pb_file": "vicesociety.json", "last_updated": "2022-12-05T13:46:10.005Z", "title": "VICE-SOCIETY RANSOMWARE", "industries": ["education"], "regions": [], "malwares": []},
{"id": "report--c856a568-f444-44a7-8ac5-d090f051cca2", "pb_file": "owassrf-vulnerability-exploitation.json", "last_updated": "2023-01-02T18:17:18.952Z", "title": "OWASSRF-VULNERABILITY EXPLOITATION", "industries": [], "regions": [], "malwares": []},
{"id": "report--f08aedaa-c8c7-47d8-bba6-f678cc2aff65", "last_updated": "2023-01-19T20:37:39.428Z", "pb_file": "playful-taurus.json", "title": "PLAYFUL TAURUS", "industries": ["government"], "regions": ["IR"], "malwares": []},
{"id": "report--be1f6941-f0c4-44cf-8af5-b3a41fa43b25", "last_updated": "2023-01-26T18:28:33.621Z", "pb_file": "plugx-malware.json", "title": "PLUGX MALWARE", "industries": [], "regions": [], "malwares": []},
{"id": "report--cb94c513-f1aa-496b-8a45-ba1f8396ae53", "pb_file": "lokibot.json", "last_updated": "2023-02-21T13:17:42.849Z", "title": "LOKIBOT", "industries": [], "regions": [], "malwares": []},
{"id": "report--e5dacf3f-7772-4237-9b58-7c7de5d2570c", "pb_file": "gobruteforcer.json", "last_updated": "2023-01-10T16:36:56.375Z", "title": "GOBRUTEFORCER", "industries": [], "regions": [], "malwares": []},
{"id": "report--d9fd4cdf-5362-49f6-9b57-7cf54f6040cb", "last_updated": "2023-03-03T13:44:46.658Z", "pb_file": "trigona-ransomware.json", "title": "TRIGONA-RANSOMWARE", "industries": ["agriculture", "commercial", "construction", "financial-services", "manufacturing", "technology"], "regions": ["AU", "DE", "FR", "IT", "NZ", "US"], "malwares": []},
{"id": "report--1e492f5f-4ade-44f3-ad3b-2f80094be978", "last_updated": "2023-03-01T13:37:15.634Z", "pb_file": "javascript-injection.json", "title": "JAVASCRIPT-INJECTION", "industries": [], "regions": [], "malwares": []},
{"id": "report--63e4c116-3913-4b53-9afc-7640a9760d63", "last_updated": "2023-04-04T15:54:51.031Z", "pb_file": "cryptoclippy.json", "title": "CRYPTOCLIPPY", "industries": [], "regions": [], "malwares": []},
{"id": "report--8504a61a-9b69-4929-95bf-537b0ab88f29", "last_updated": "2023-06-02T14:05:41.820Z", "pb_file": "muddled-libra.json", "title": "MUDDLED LIBRA", "industries": [], "regions": [], "malwares": []}
]