diff --git a/mvt/common/indicators.py b/mvt/common/indicators.py index e57fcec..2c4041e 100644 --- a/mvt/common/indicators.py +++ b/mvt/common/indicators.py @@ -457,7 +457,7 @@ def download_indicators_files(log: logging.Logger) -> None: os.makedirs(data_dir, exist_ok=True) # Download latest list of indicators from the MVT repo. - res = requests.get("https://github.com/mvt-project/mvt/raw/main/public_indicators.json") + res = requests.get("https://raw.githubusercontent.com/mvt-project/mvt-indicators/main/indicators.json") if res.status_code != 200: log.warning("Unable to find retrieve list of indicators from the MVT repository.") return diff --git a/public_indicators.json b/public_indicators.json deleted file mode 100644 index 3714231..0000000 --- a/public_indicators.json +++ /dev/null @@ -1,14 +0,0 @@ -[ - { - "name": "NSO Group Pegasus Indicators of Compromise", - "source": "Amnesty International", - "reference": "https://www.amnesty.org/en/latest/research/2021/07/forensic-methodology-report-how-to-catch-nso-groups-pegasus/", - "stix2_url": "https://raw.githubusercontent.com/AmnestyTech/investigations/master/2021-07-18_nso/pegasus.stix2" - }, - { - "name": "Cytrox Predator Spyware Indicators of Compromise", - "source": "Meta, Amnesty International, Citizen Lab", - "reference": "https://citizenlab.ca/2021/12/pegasus-vs-predator-dissidents-doubly-infected-iphone-reveals-cytrox-mercenary-spyware/", - "stix2_url": "https://raw.githubusercontent.com/AmnestyTech/investigations/master/2021-12-16_cytrox/cytrox.stix2" - } -]