tokens listlengths 2 296 | ner_tags listlengths 2 296 |
|---|---|
[
"It",
"includes",
"recent",
"incidents",
"as",
"well",
"as",
"older",
"ones",
"that",
"have",
"not",
"been",
"publicly",
"reported;",
"new",
"malware;",
"exploitation,",
"delivery",
"and",
"command",
"and",
"control",
"infrastructure;",
"and",
"the",
"group",
"s... | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
5,
13,
13,
13,
16,
6,
14,
16,
16,
16
] |
[
"That",
"domain,",
"electronicfrontierfoundation.org,",
"is",
"designed",
"to",
"trick",
"users",
"into",
"a",
"false",
"sense",
"of",
"trust",
"and",
"it",
"appears",
"to",
"have",
"been",
"used",
"in",
"a",
"spear",
"phishing",
"attack,",
"though",
"it",
"is... | [
16,
1,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Last",
"week,",
"Unit",
"42",
"came",
"across",
"new",
"Disttrack",
"samples",
"that",
"appear",
"to",
"have",
"been",
"used",
"in",
"an",
"updated",
"attack",
"campaign."
] | [
16,
16,
4,
12,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
6,
14
] |
[
"The",
"proliferation",
"of",
"Android",
"devices",
"–",
"from",
"smartphones",
"to",
"tablets",
"and",
"smart",
"TVs",
"–",
"has",
"opened",
"up",
"new",
"possibilities",
"for",
"malware",
"developers",
",",
"as",
"all",
"these",
"devices",
"pack",
"microphon... | [
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"For",
"instance,",
"its",
"JHUHUGIT",
"implant",
"was",
"delivered",
"through",
"a",
"Flash",
"zero-day",
"and",
"used",
"a",
"Windows",
"EoP",
"exploit",
"to",
"break",
"out",
"of",
"the",
"sandbox."
] | [
16,
16,
16,
3,
11,
16,
16,
16,
16,
7,
15,
16,
16,
16,
3,
11,
11,
16,
16,
16,
16,
16,
16
] |
[
"However",
",",
"our",
"data",
"suggests",
"that",
"there",
"have",
"been",
"at",
"least",
"2,729",
"infections",
"between",
"January",
"2016",
"and",
"early",
"April",
"2016",
",",
"with",
"a",
"peak",
"in",
"March",
"of",
"more",
"than",
"1,100",
"infect... | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"group",
"is",
"well",
"resourced,",
"capable",
"of",
"infiltrating",
"multiple",
"targets",
"simultaneously",
"and",
"will",
"often",
"operate",
"outside",
"the",
"working",
"hours",
"of",
"targeted",
"organizations",
"in",
"order",
"to",
"maintain",
"a",
... | [
6,
14,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
16,
16,
16,
16,
16,
16
] |
[
"All",
"of",
"the",
"files",
"that",
"are",
"being",
"uploaded",
"or",
"downloaded",
"are",
"zip",
"files",
"encrypted",
"by",
"AES",
"with",
"ECB",
"mode",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"TROJ_BREDLAB.SMD",
"Trojan-Spy.Win32.Spenir.as",
"Application.Win32.BlkIC.IMG",
"TROJ_BREDLAB.SMD",
"Backdoor/SdBot.prb",
"HeurEngine.ZeroDayThreat",
"Trojan.Win32.ProcessHijack"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1
] |
[
"]",
"infodavos-seaworth",
"[",
"."
] | [
16,
16,
16,
16
] |
[
"It",
"continues",
"to",
"spread",
"across",
"small",
"and",
"medium-sized",
"businesses",
"across",
"the",
"globe,",
"using",
"the",
"modular",
"Gorynych/Diamond",
"Fox",
"botnet",
"to",
"exfiltrate",
"stolen",
"data."
] | [
16,
16,
16,
16,
16,
4,
16,
4,
12,
16,
16,
2,
16,
16,
16,
3,
11,
11,
16,
1,
9,
9
] |
[
"Find",
"out",
"more",
"about",
"the",
"7",
"Android",
"Security",
"Hacks",
"You",
"Need",
"to",
"Do",
"Right",
"Now",
"to",
"keep",
"your",
"mobile",
"data",
"safe",
"."
] | [
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Hoax.Win32.ArchSMS!O",
"Trojan.Mobsularch",
"Trojan.ArchSMS.Win32.7426",
"Trojan/ArchSMS.nkit",
"Win32.Trojan.WisdomEyes.16070401.9500.9644",
"TROJ_MALICIOUS_BK083028.TOMC",
"Win.Trojan.Archsms-4649",
"Riskware.Win32.ArchSMS.cqmlwf",
"TrojWare.Win3... | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"This",
"is",
"done",
"using",
"a",
"series",
"of",
"syscalls",
"as",
"outlined",
"below",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Palo",
"Alto",
"Networks",
"has",
"collected",
"over",
"20",
"samples",
"of",
"this",
"particular",
"malware",
"family,",
"and",
"we",
"have",
"identified",
"over",
"$70,000",
"USD",
"in",
"Bitcoin",
"payments",
"to",
"the",
"attacker",
"Cisco",
"Talos",
"yes... | [
4,
12,
12,
16,
16,
16,
16,
3,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
1,
9,
9,
9,
9,
16,
16,
6,
4,
12,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"]",
"infokalisi",
"[",
"."
] | [
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Pitit.A3",
"HV_ABTITU_CG093139.RDXN",
"TR/Barys.2445.24",
"Win32.Troj.Undef.kcloud",
"Trojan.Kazy",
"Trojan.Win32.Loader.L"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1
] |
[
"A",
"collection",
"of",
"domains",
"registered",
"by",
"Pawn",
"Storm/Sofacy/APT28/Fancy",
"Bear",
"to",
"target",
"organisations"
] | [
16,
16,
16,
1,
16,
16,
6,
14,
14,
16,
16,
4
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.CoinMiner.A4",
"PUP.Optional.ChinAd",
"W32.XiaobaMiner",
"Win32/Oflwr.A!crypt",
"Win.Trojan.Qhost-160",
"Trojan.Win32.BtcMine.exddfs",
"Tool.BtcMine.1051",
"BehavesLike.Win32.Ransomware.th",
"W32.Trojan.Qhost",
"RiskWare/Win32.BitMiner.h",
... | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"While",
"it",
"has",
"become",
"common",
"to",
"see",
"new",
"ransomware",
"variants",
"being",
"distributed",
"daily,",
"it",
"is",
"not",
"as",
"common",
"to",
"find",
"new",
"ransomware",
"infections",
"being",
"distributed",
"via",
"exploit",
"kits."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
1,
16,
16,
16,
3,
11
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"HW32.Packed.1FBC",
"Win32.Trojan.WisdomEyes.16070401.9500.9950",
"Win.Exploit.Countdown-1",
"BackDoor.Meterpreter.37",
"Troj.W32.Jorik.Skor.lrUS",
"Trojan:Win64/Meterpreter.A",
"Trojan/Win32.Swrort.C695042"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1
] |
[
"We",
"previously",
"highlighted",
"the",
"dangers",
"of",
"installing",
"apps",
"that",
"enable",
"IAPs",
"using",
"SMS",
"messages,",
"as",
"these",
"apps",
"typically",
"have",
"access",
"to",
"all",
"SMS",
"messages",
"sent",
"to",
"the",
"phone."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
7,
15,
15,
15,
15,
15,
16,
16,
16,
16,
16,
7,
15,
15,
15,
15,
16,
16,
16,
16
] |
[
"U.S.",
"Allies",
"and",
"Rivals",
"Digest",
"Trump's",
"Victory",
"-",
"Carnegie",
"Endowment",
"for",
"International",
"Peace.docm"
] | [
4,
12,
16,
4,
12,
12,
12,
16,
16,
16,
16,
16,
1
] |
[
"Intrigued",
",",
"we",
"continued",
"our",
"search",
"and",
"found",
"more",
"interesting",
"clues",
"that",
"could",
"reveal",
"some",
"detailed",
"information",
"about",
"the",
"owners",
"of",
"the",
"infected",
"devices",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"In",
"the",
"example",
"server",
"response",
"below",
",",
"the",
"green",
"fields",
"show",
"text",
"to",
"be",
"shown",
"to",
"the",
"user",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"During",
"the",
"course",
"of",
"our",
"research,",
"it",
"became",
"evident",
"that",
"this",
"actor",
"had",
"not",
"built",
"uWarrior",
"from",
"scratch,",
"but",
"rather",
"opted",
"to",
"borrow",
"components",
"from",
"several",
"off-the-shelf",
"tools."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11
] |
[
"Hackers",
"made",
"a",
"modified",
"Linux",
"Mint",
"ISO,",
"with",
"a",
"backdoor",
"in",
"it,",
"and",
"managed",
"to",
"hack",
"the",
"Linux",
"Mint",
"website",
"to",
"point",
"to",
"it."
] | [
6,
16,
16,
16,
5,
13,
13,
16,
16,
3,
16,
16,
16,
16,
16,
1,
9,
9,
9,
9,
16,
16,
16,
16
] |
[
"Replicating",
"framework.jar",
"allows",
"the",
"app",
"to",
"intercept",
"and",
"modify",
"the",
"behavior",
"of",
"the",
"Android",
"standard",
"API",
"."
] | [
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan-Dropper.Win32.BindFile!O",
"Trojan/Dropper.BindFile.a",
"W32/Dropper.LIP",
"Trojan.Spy-681",
"Trojan-Dropper.Win32.BindFile.e",
"Trojan.Win32.BindFile.dcyo",
"Trojan.Win32.BindFile.188416",
"PE:Dropper.BindFile.h!1173781522",
"TrojWare.Win32... | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"attacks",
"described",
"here",
"begin",
"with",
"a",
"banking",
"credential",
"phishing",
"scheme",
",",
"followed",
"by",
"an",
"attempt",
"to",
"trick",
"the",
"victim",
"into",
"installing",
"Marcher",
",",
"and",
"finally",
"with",
"attempts",
"to"... | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/Kryptik.aspo",
"JAVA_EXPLOIT.TCC",
"JAVA_EXPLOIT.TCC",
"Win.Trojan.Hydraq-219",
"Exploit.Java.CVE20131493.cqvzpg",
"Java.S.EX-CVE-2013-1493.206981",
"Exploit.Java.509",
"EXP/Java.HLP.JM",
"W32/Kryptik.ASPO",
"Trojan.Graftor.D13511",
"Exp... | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"We",
"have",
"seen",
"Angler",
"to",
"be",
"using",
"bedep",
"as",
"its",
"payload",
"but",
"adding",
"vawtrak",
"in",
"its",
"arsenal",
"is",
"something",
"we",
"haven't",
"seen",
"in",
"the",
"past",
"until",
"recently."
] | [
16,
16,
16,
3,
16,
16,
16,
3,
16,
16,
3,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Attackers",
"have",
"been",
"able",
"to",
"successfully",
"implant",
"JavaScript",
"code",
"on",
"the",
"login",
"pages",
"that",
"enables",
"them",
"to",
"surreptitiously",
"steal",
"employee",
"credentials",
"as",
"they",
"login",
"to",
"access",
"internal",
... | [
6,
16,
16,
16,
16,
16,
1,
9,
16,
16,
16,
1,
9,
16,
16,
16,
16,
16,
1,
9,
9,
16,
16,
1,
9,
9,
9,
9,
9
] |
[
"Since",
"then",
",",
"the",
"implant",
"’",
"s",
"functionality",
"has",
"been",
"improving",
"and",
"remarkable",
"new",
"features",
"implemented",
",",
"such",
"as",
"the",
"ability",
"to",
"record",
"audio",
"surroundings",
"via",
"the",
"microphone",
"whe... | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
... |
[
"Figure",
"8",
"."
] | [
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Dropper",
"BKDR_QBOT.SM",
"Win32.Trojan-Dropper.Small.s",
"Win32/Qakbot.KR",
"BKDR_QBOT.SM",
"Trojan.Win32.Gamania.tghgw",
"Trojan.Win32.A.Mbro.191488",
"Trojan.PWS.Gamania.36525",
"W32/Trojan.XMWQ-0223",
"Trojan[Backdoor]/Win32.QBot",
"... | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"You",
"can",
"check",
"the",
"status",
"of",
"Google",
"Play",
"Protect",
"on",
"your",
"device",
":",
"Open",
"your",
"Android",
"device",
"'s",
"Google",
"Play",
"Store",
"app",
"."
] | [
16,
16,
16,
16,
16,
16,
5,
13,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
13,
16,
16
] |
[
"All",
"of",
"these",
"Google",
"Play",
"Store",
"pages",
"have",
"been",
"taken",
"down",
"by",
"Google",
"."
] | [
16,
16,
16,
5,
13,
13,
16,
16,
16,
16,
16,
16,
4,
16
] |
[
"As",
"of",
"September",
"17th",
"Dyreza",
"now",
"counts",
"an",
"additional",
"twenty",
"organizations",
"directly",
"involved",
"in",
"Fulfillment",
"and",
"Warehousing;",
"four",
"software",
"companies",
"that",
"support",
"Fulfillment",
"and",
"Warehousing;",
"... | [
16,
16,
0,
8,
3,
16,
16,
16,
16,
16,
4,
16,
16,
16,
4,
16,
4,
16,
4,
12,
16,
16,
4,
16,
4,
16,
4,
12,
12,
16,
16,
16,
16,
16,
16,
4,
12,
12,
12,
16,
4,
12,
12,
16,
16,
16,
16,
4,
16,
4,
12,
16,
4,
12
] |
[
"This",
"malware",
"possesses",
"the",
"ability",
"to",
"Collect",
"information",
"about",
"an",
"infected",
"computer",
"and",
"transfer",
"it",
"to",
"the",
"command",
"and",
"control",
"server."
] | [
16,
3,
16,
16,
16,
16,
16,
12,
16,
16,
5,
13,
16,
16,
16,
16,
16,
1,
9,
9,
9
] |
[
"Malware",
"isn't",
"usually",
"thought",
"to",
"be",
"old,",
"but",
"a",
"recent",
"phishing",
"campaign",
"using",
"the",
"MyDoom",
"worm",
"has",
"shown",
"that",
"old",
"tools",
"can",
"still",
"be",
"used",
"to",
"lure",
"users",
"into",
"malware."
] | [
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
6,
14,
16,
3,
11,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3
] |
[
"2015–2016",
"Starting",
"from",
"mid-2015",
",",
"the",
"Trojan",
"began",
"using",
"the",
"AES",
"algorithm",
"to",
"encrypt",
"data",
"communicated",
"between",
"the",
"infected",
"device",
"and",
"the",
"C",
"&",
"C",
":",
"Also",
"starting",
"with",
"th... | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
... |
[
"SSL",
"is",
"typically",
"used",
"to",
"encrypt",
"data",
"between",
"the",
"client",
"and",
"the",
"server,",
"thus",
"making",
"the",
"content",
"unreadable",
"by",
"any",
"systems",
"sitting",
"between",
"the",
"two",
"end",
"points,",
"and",
"significantl... | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/W32.Zapchast.113152",
"Backdoor.KeyBoy",
"Trojan.Zapchast.Win32.29227",
"Trojan.Heur.LP.EDDB38",
"Win32.Trojan.WisdomEyes.151026.9950.9999",
"Backdoor.Kboy",
"Trojan.Win32.Zapchast.afhn",
"Trojan.Win32.Zapchast.cjltha",
"Win32.Trojan.Zapchas... | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Bot",
"communicates",
"with",
"the",
"botmaster",
"using",
"non-standard",
"protocol",
"built",
"on",
"top",
"of",
"TCP."
] | [
3,
16,
16,
16,
3,
16,
1,
9,
9,
9,
9,
9,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/W32.QQKiller.183808",
"Trojan.Qqkiller.A",
"Trojan.QQKiller.Win32.2",
"Trojan.Qqkiller.A",
"Trojan/QQKiller.a",
"Trojan.QQKiller!Y2SikmBtqEk",
"Win32/QQKiller.A",
"TROJ_QQKILLER.A",
"Trojan.Win32.QQKiller.a",
"Trojan.Win32.QQKiller.erxn",
... | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/W32.Duqu.24960.B",
"Trojan.Win32.Duqu!O",
"Trojan/Duqu.a",
"Trojan.Duqu.1",
"Win32.Trojan.WisdomEyes.16070401.9500.9896",
"W32/Duqu.C",
"W32.Duqu",
"Win32/Duqu.A",
"RTKT_DUQU.SME",
"Win.Trojan.Duqu-7",
"Trojan.Win32.Duqu.a",
"Trojan.Wi... | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"We",
"identified",
"42",
"apps",
"on",
"Google",
"Play",
"as",
"belonging",
"to",
"the",
"campaign",
",",
"which",
"had",
"been",
"running",
"since",
"July",
"2018",
"."
] | [
16,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"malware",
"takes",
"these",
"steps",
":",
"Check",
"if",
"the",
"system",
"master",
"boot",
"record",
"(",
"MBR",
")",
"contains",
"an",
"infection",
"marker",
"(",
"0xD289C989C089",
"8-bytes",
"value",
"at",
"offset",
"0x2C",
")",
",",
"and",
",",... | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
... |
[
"Versions",
"overview",
"The",
"DenDroid",
"code",
"base",
"was",
"kept",
"to",
"such",
"an",
"extent",
"that",
"even",
"the",
"original",
"base64-encoded",
"password",
"was",
"kept",
"."
] | [
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"small",
"or",
"limited",
"number",
"is",
"understandable",
"given",
"the",
"nature",
"of",
"this",
"campaign",
",",
"but",
"we",
"also",
"expect",
"it",
"to",
"increase",
"or",
"even",
"diversify",
"in",
"terms",
"of",
"distribution",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan-Downloader.Win32.Gamarue.2!O",
"Trojan.Shamoon.1",
"trojan.win32.skeeyah.a!bit",
"Win32.Trojan.WisdomEyes.16070401.9500.9991",
"W32.Disttrack.B",
"WORM_DISTTRACK.SMC",
"Win.Dropper.DistTrack-5744784-0",
"Backdoor.Win32.RemoteConnection.d",
"... | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Perhaps",
"more",
"information",
"on",
"XLoader",
"will",
"be",
"known",
"in",
"the",
"future",
"."
] | [
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"backdoor",
"code",
"is",
"believed",
"to",
"have",
"been",
"left",
"by",
"mistake",
"by",
"the",
"authors",
"after",
"completing",
"the",
"debugging",
"process",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Winsy",
"Trojan.Win32.Winsy",
"Trojan.Winsy",
"Trojan.Winsy",
"W32/Trojan.MBSD-8108",
"Trojan.Winsy",
"Trojan.Win32.Winsy",
"Trojan.Winsy",
"Trj/CI.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"DGA",
"hosted",
"site",
"further",
"serves",
"up",
"a",
"list",
"of",
"domains",
"that",
"are",
"cycled",
"through",
"for",
"C2."
] | [
16,
1,
9,
9,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
1
] |
[
"Some",
"are",
"first",
"uploaded",
"with",
"all",
"the",
"necessary",
"code",
"except",
"the",
"one",
"line",
"that",
"actually",
"initializes",
"the",
"billing",
"process",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"But",
"it",
"would",
"appear",
"that",
"BLU",
"only",
"took",
"action",
"after",
"Kryptowire",
"notified",
"it",
"along",
"with",
"Google",
",",
"Adups",
"and",
"Amazon",
"."
] | [
16,
16,
16,
16,
16,
4,
16,
16,
16,
16,
4,
16,
16,
16,
16,
4,
16,
4,
16,
4,
16
] |
[
"Analysis",
"of",
"the",
"additional",
"spyware",
"modules",
"is",
"future",
"work",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Today's",
"blog",
"reviews",
"recent",
"activity",
"from",
"these",
"EITest",
"HoeflerText",
"popups",
"on",
"August",
"30,",
"2017",
"to",
"discover",
"more",
"about",
"this",
"recent",
"change."
] | [
16,
16,
16,
16,
16,
16,
16,
1,
9,
9,
16,
0,
8,
8,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Exploit.DebPloit.A",
"Trojan-Exploit/W32.DebPloit.45056",
"Exploit.DebPloit.Win32.4",
"Trojan/Exploit.DebPloit",
"Trojan.Exploit.DebPloit.A",
"Trojan.Exploit.DebPloit.A",
"Exploit.DebPloit!VRtQm5q2mnY",
"TROJ_DEPLOIT.A",
"Exploit.Win32.DebPl... | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Around",
"New",
"Year,",
"the",
"Emsisoft",
"Lab",
"team",
"was",
"alerted",
"to",
"the",
"presence",
"of",
"a",
"new",
"Globe",
"variant,",
"Globe3,",
"which",
"was",
"infecting",
"users",
"using",
"a",
"new",
"mode",
"of",
"operation."
] | [
16,
0,
8,
16,
4,
12,
12,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
3,
16,
16,
16,
4,
16,
16,
16,
16,
16,
16
] |
[
"We",
"reverse",
"engineered",
"XLoader",
"and",
"found",
"that",
"it",
"appears",
"to",
"target",
"South",
"Korea-based",
"banks",
"and",
"game",
"development",
"companies",
"."
] | [
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"DNS",
"protocol",
"is",
"unlikely",
"to",
"be",
"blocked",
"allowing",
"free",
"communications",
"out",
"of",
"the",
"network",
"and",
"its",
"use",
"is",
"unlikely",
"to",
"raise",
"suspicion",
"among",
"network",
"defenders."
] | [
16,
5,
7,
15,
15,
15,
15,
15,
16,
7,
15,
15,
15,
15,
15,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"UNIQUE",
"FEATURES",
"BY",
"VERSION",
"EventBot",
"Version",
"0.0.0.1",
"RC4",
"and",
"Base64",
"Packet",
"Encryption",
"EventBot",
"RC4",
"and",
"Base64",
"data",
"decryption",
"from",
"the",
"C2",
"RC4",
"and",
"Base64",
"data",
"decryption",
"from",
"the",
... | [
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"henbox_2",
"Figure",
"1",
"Uyghurapps",
"[",
"."
] | [
16,
16,
16,
1,
9,
9
] |
[
"Phishing",
"targeting",
"Google",
"Docs"
] | [
1,
16,
5,
13
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor/W32.Shiz.102400.S",
"Backdoor.Win32.Shiz!O",
"Backdoor/Shiz.fhrr",
"Win32.Trojan.WisdomEyes.16070401.9500.9971",
"Win.Trojan.Shiz-787",
"Trojan.Win32.Shiz.whgln",
"Trojan.KeyLogger.14845",
"Backdoor.Shiz.Win32.3116",
"BehavesLike.Win32.Bad... | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"]",
"addroider.com",
"’",
"."
] | [
9,
9,
16,
16
] |
[
"When",
"the",
"current",
"app",
"on",
"the",
"foreground",
"matches",
"with",
"an",
"app",
"targeted",
"by",
"the",
"malware",
",",
"the",
"Trojan",
"will",
"show",
"the",
"corresponding",
"phishing",
"overlay",
",",
"making",
"the",
"user",
"think",
"it",
... | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"In",
"one",
"case,",
"the",
"casino",
"website",
"was",
"a",
"direct",
"gateway",
"to",
"Angler",
"EK."
] | [
16,
16,
16,
16,
1,
9,
16,
16,
16,
16,
16,
3,
11
] |
[
"Our",
"analysis",
"of",
"the",
"malware",
"shows",
"it",
"uses",
"multiple",
",",
"advanced",
"techniques",
"to",
"avoid",
"Google",
"Play",
"malware",
"detection",
"and",
"to",
"maintain",
"persistency",
"on",
"target",
"devices",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Version",
"6.0",
"also",
"adds",
"a",
"command",
"called",
"“",
"getPhoneState",
"”",
",",
"which",
"collects",
"unique",
"identifiers",
"of",
"mobile",
"devices",
"such",
"as",
"IMSI",
",",
"ICCID",
",",
"Android",
"ID",
",",
"and",
"device",
"serial",
"... | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16
] |
[
"We",
"’",
"ve",
"documented",
"several",
"interesting",
"attacks",
"(",
"A",
"Gift",
"for",
"Dalai",
"Lamas",
"Birthday",
"and",
"Cyber",
"Attacks",
"Against",
"Uyghur",
"Mac",
"OS",
"X",
"Users",
"Intensify",
")",
"which",
"used",
"ZIP",
"files",
"as",
"... | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.JS.Redirector.xb",
"Js.Trojan.Redirector.Amwl",
"JS/BlacoleRef.CZ.26",
"Trojan/JS.Redirector.xb",
"Trojan.JS.Redirector.xb",
"Exploit.JS.Blacole",
"JS/Iframe.WOR!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.Aphexdoor.Litesock.A",
"Backdoor/W32.Aphexdoor.23040",
"Trojan.Suckspro",
"Backdoor.Aphexdoor.Win32.24",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"W32/Backdoor.YGRL-7760",
"Backdoor.Trojan",
"Win32/Porsux.A",
"Win.Trojan.Aphexdoor-8",... | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Interestingly",
",",
"the",
"command",
"and",
"control",
"server",
"includes",
"a",
"publicly",
"accessible",
"interface",
"to",
"work",
"with",
"the",
"victims",
":",
"Some",
"of",
"the",
"commands",
"with",
"rough",
"translations",
":",
"The",
"command-and-co... | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
... |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Worm.Win32.Chiviper!O",
"Worm.AutoRun.14759",
"W32/AutoRun.sdc",
"Win32.Trojan.WisdomEyes.16070401.9500.9975",
"WORM_OTORUN.SMIF",
"Win.Trojan.Qhost-160",
"Worm.Win32.Chiviper.gk",
"Trojan.Win32.AutoRun.onby",
"Trojan.AVKill.11726",
"Worm.AutoRun... | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Zbot.7",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Win.Trojan.Kazy-50",
"Trojan.Win32.Pamela.hnatv",
"Trojan.Win32.A.Inject.75189",
"DDoS.Pamela",
"Trojan.Inject.Win32.17142",
"BehavesLike.Win32.Dropper.pc",
"Trojan.Win32.Inject",
"Tr... | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Worm/W32.Sober.135968",
"Packed.Win32.TDSS!O",
"Worm.Sober.Win32.7",
"WORM_SOBER.AM",
"Win32.Trojan.WisdomEyes.16070401.9500.9997",
"W32/Sober.DVXC-4063",
"W32.Sober.W@mm",
"Win32/Sober.T",
"WORM_SOBER.AM",
"Win.Worm.Sober-43",
"Email-Worm.Win3... | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"To",
"their",
"credit",
",",
"both",
"Google",
"and",
"Amazon",
"appear",
"to",
"have",
"put",
"pressure",
"on",
"device",
"manufacturers",
"to",
"fix",
"their",
"devices",
"when",
"flaws",
"are",
"found",
",",
"Strazzere",
"says",
"."
] | [
16,
16,
16,
16,
16,
4,
16,
4,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Proofpoint",
"is",
"tracking",
"this",
"attacker,",
"believed",
"to",
"operate",
"out",
"of",
"China,",
"as",
"TA459"
] | [
4,
16,
16,
16,
6,
16,
16,
16,
16,
16,
2,
16,
6
] |
[
"Data",
"Encryption",
"The",
"Curve25519",
"encryption",
"algorithm",
"was",
"implemented",
"as",
"of",
"EventBot",
"Version",
"0.0.0.2",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16
] |
[
"The",
"first",
"anti-sandbox",
"technique",
"is",
"the",
"loader",
"checking",
"the",
"code",
"segment",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"360",
"Network",
"Security",
"Research",
"Lab",
"recently",
"discovered",
"a",
"new",
"botnet",
"that",
"is",
"scanning",
"the",
"entire",
"Internet",
"on",
"a",
"large",
"scale."
] | [
4,
12,
12,
12,
12,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"In",
"addition",
",",
"we",
"did",
"not",
"see",
"traces",
"of",
"the",
"Smali",
"injection",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Recently",
"there",
"was",
"a",
"huge",
"wave",
"of",
"SMS",
"messages",
",",
"as",
"well",
"as",
"Whatsapp",
"messages",
",",
"making",
"the",
"rounds",
"asking",
"users",
"to",
"download",
"the",
"latest",
"version",
"of",
"TikTok",
"at",
"hxxp",
":",
... | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
1,
9,
9,
9,
9
] |
[
"The",
"malware",
"has",
"existed",
"since",
"at",
"least",
"2012,",
"with",
"threat",
"actors",
"using",
"it",
"for",
"mass-spreading",
"malware",
"campaigns",
"and",
"for",
"ongoing",
"targeted",
"attacks."
] | [
16,
3,
16,
16,
16,
16,
16,
0,
16,
6,
14,
16,
16,
16,
6,
14,
14,
16,
16,
16,
16,
1
] |
[
"Triada",
":",
"organized",
"crime",
"on",
"Android",
"Second",
",",
"it",
"substitutes",
"the",
"system",
"functions",
"and",
"conceals",
"its",
"modules",
"from",
"the",
"list",
"of",
"the",
"running",
"processes",
"and",
"installed",
"apps",
"."
] | [
3,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Fragment",
"of",
"the",
"database",
"with",
"targeted",
"devices",
"and",
"specific",
"memory",
"addresses",
"If",
"the",
"infected",
"device",
"is",
"not",
"listed",
"in",
"this",
"database",
",",
"the",
"exploit",
"tries",
"to",
"discover",
"these",
"addres... | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.CareFree.a",
"Win32/Tnega.TaRMRTC",
"Trojan.Win32.Graftor.dogten",
"Trojan.KillFiles.21059",
"BehavesLike.Win32.Downloader.mc",
"TR/Graftor.cpoyxe",
"Trojan.Ursu.D2DC2",
"Trojan/Win32.StartPage.R131400",
"Win32/Trojan.e36"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"This",
"group",
"has",
"been",
"active",
"since",
"at",
"least",
"2014",
"and",
"uses",
"spear-phishing",
"campaigns",
"to",
"target",
"enterprises."
] | [
16,
6,
16,
16,
16,
16,
3,
16,
0,
16,
16,
6,
14,
16,
4,
12
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9992",
"Trojan-Spy.MSIL.KeyLogger.ctnb",
"Trojan.Win32.Z.Keylogger.91136.M",
"Msil.Trojan-spy.Keylogger.Wqde",
"Trojan.DownLoader9.24657",
"TrojanSpy.MSIL.vlt",
"TR/Downloader.gldnp",
"Trojan[Spy]/MSIL.KeyLogger"... | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Instead,",
"MacDownloader",
"is",
"a",
"simple",
"exfiltration",
"agent,",
"with",
"broader",
"ambitions."
] | [
16,
3,
16,
16,
1,
9,
9,
16,
16,
16
] |
[
"Throughout",
"2016,",
"Proofpoint",
"researchers",
"tracked",
"a",
"cyber-espionage",
"campaign",
"targeting",
"victims",
"in",
"Russia",
"and",
"neighboring",
"countries."
] | [
16,
0,
4,
12,
16,
16,
6,
14,
16,
16,
16,
2,
16,
2,
10
] |
[
"This",
"threat",
"actor",
"has",
"been",
"very",
"active",
"in",
"February",
"and",
"March",
"2023",
"targeting",
"individuals",
"in",
"various",
"South",
"Korean",
"organizations."
] | [
16,
6,
14,
16,
16,
16,
16,
16,
0,
16,
0,
8,
16,
4,
16,
16,
4,
12,
12
] |
[
"The",
"Trojan",
"is",
"delivered",
"in",
"emails",
"that",
"mostly",
"target",
"corporate",
"users."
] | [
3,
11,
16,
16,
16,
1,
16,
16,
16,
4,
12
] |
[
"We",
"can",
"trace",
"activities",
"of",
"Pawn",
"Storm",
"back",
"to",
"20041",
"and",
"before",
"our",
"initial",
"report",
"in",
"2014",
"there",
"wasn't",
"much",
"published",
"about",
"this",
"actor",
"group."
] | [
16,
16,
16,
16,
16,
6,
14,
16,
16,
0,
16,
16,
16,
16,
16,
16,
0,
16,
16,
16,
16,
16,
16,
6,
14
] |
[
"Backdoor.Win32.Denis",
"uses",
"DNS",
"tunneling",
"for",
"communication"
] | [
1,
16,
1,
9,
9,
9
] |
[
"A",
"few",
"days",
"before",
"the",
"Kuala",
"Lumpur",
"summit,",
"a",
"subdomain",
"under",
"asean.org",
"for",
"the",
"ASEAN",
"Secretariat",
"Resource",
"Centre",
"ARC",
"was",
"compromised."
] | [
16,
0,
8,
8,
16,
4,
12,
12,
16,
1,
9,
9,
16,
4,
12,
12,
12,
12,
12,
16,
16
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.