tokens
listlengths
2
296
ner_tags
listlengths
2
296
[ "FAKESPY", "CODE", "ANALYSIS", "Once", "the", "user", "clicks", "on", "the", "malicious", "link", "from", "the", "SMS", "message", ",", "the", "app", "asks", "them", "to", "approve", "installation", "from", "unknown", "resources", "." ]
[ 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojandropper.Exebundle2X", "Worm.WBNA.Win32.421402", "Win.Worm.Drefir-14", "Trojan.Win32.ExeBundle.exrqtj", "Trojan.Win32.Z.Exebundle.8609956", "Trojan.MulDrop.1611", "W32/Trojan.EGST-2925", "TR/ExeBundle.272", "Trojan[Downloader]/Win32.Small", ...
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Kaspersky", "Lab", "mobile", "products", "prevented", "2,500", "infections", "by", "banking", "Trojans", "." ]
[ 5, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Our", "friends", "over", "at", "Bellingcat,", "which", "conducts", "open", "source", "investigations", "and", "writes", "extensively", "on", "Russia-related", "issues,", "recently", "shared", "a", "new", "tranche", "of", "spear-phishing", "emails", "they", "had", ...
[ 16, 16, 16, 16, 4, 16, 16, 1, 9, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "TrojWare.Win32.ChePro.RHZ", "TrojanDownloader:Win32/Hormelex.B", "Trojan/Win32.ChePro", "Trojan.Win32.Delf.PQD" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Startsurf", "not-a-virus:AdWare.Win32.StartSurf.azas", "Riskware.Win32.StartSurf.expyou", "Adware.StartSurf.Win32.40359", "BehavesLike.Win32.Dropper.jc", "TR/Drop.Kaymundler.bldbf", "Trojan.Application.Strictor.D1C262", "Trojan.Win32.Z.Stricto...
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "attacks", "employed", "PlugX,", "a", "Remote", "Access", "Trojan", "RAT", "widely", "used", "in", "targeted", "attacks." ]
[ 16, 1, 16, 3, 11, 11, 11, 11, 11, 16, 16, 16, 16, 1 ]
[ "AdWind,", "also", "known", "as", "Frutas,", "UNRECOM,", "AlienSpy,", "and", "JSocket,", "is", "a", "Java-based", "RAT." ]
[ 3, 16, 16, 16, 3, 11, 11, 16, 3, 16, 16, 3, 11 ]
[ "All", "the", "detections", "of", "this", "backdoored", "app", "were", "geolocated", "in", "Iran", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9537", "BehavesLike.Win32.AdwareWajam.rc", "Trojan:Win32/WebHijack.A!dll" ]
[ 16, 3, 16, 16, 16, 1, 1, 1 ]
[ "In", "this", "example", ",", "the", "requests", "to", "the", "server", "take", "the", "following", "form", ":", "Here", ",", "the", "“", "operator", "”", "query", "parameter", "is", "the", "Mobile", "Country", "Code", "and", "Mobile", "Network", "Code", ...
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "On", "March", "4,", "we", "detected", "that", "the", "Transmission", "BitTorrent", "ailient", "installer", "for", "OS", "X", "was", "infected", "with", "ransomware,", "just", "a", "few", "hours", "after", "installers", "were", "initially", "posted." ]
[ 16, 0, 8, 16, 16, 16, 16, 1, 9, 9, 9, 11, 5, 13, 16, 16, 16, 3, 16, 16, 0, 8, 8, 16, 16, 16, 16 ]
[ "XLoader", "6.0", "also", "mirrors", "the", "way", "FakeSpy", "hides", "its", "real", "C", "&", "C", "server", "." ]
[ 3, 11, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "ransom", "payment", "is", "typically", "collected", "using", "a", "form", "of", "crypto-currency,", "such", "as", "Bitcoin." ]
[ 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 1 ]
[ "Whilst", "we", "would", "prefer", "to", "disassociate", "ourselves", "with", "APT", "attacks", "against", "Governments", "our", "interest", "was", "piqued", "by", "a", "particular", "blog", "written", "by", "our", "friends", "over", "at", "TrendMicro" ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 6, 1, 16, 4, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4 ]
[ "Since", "January", "2016,", "a", "financially", "motivated", "threat", "actor", "whom", "Proofpoint", "has", "been", "tracking", "as", "TA530", "has", "been", "targeting", "executives", "and", "other", "high-level", "employees,", "often", "through", "campaigns", ...
[ 16, 0, 8, 16, 16, 16, 6, 14, 16, 4, 16, 16, 16, 16, 6, 16, 16, 16, 4, 16, 16, 4, 12, 16, 16, 6, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Injector.Win32.85625", "Trojan/Injector.oqf", "Win32.Trojan.WisdomEyes.16070401.9500.9619", "TSPY_INJECTOR_BL210174.TOMC", "Trojan.Win32.Inject.efoq", "Trojan.Win32.Inject.dzombd", "Trojan.Win32.A.Inject.172053", "TSPY_INJECTOR_BL210174.TOMC",...
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "IoCs", "C", "&", "C", "100.51.100.00", "108.62.118.131", "172.81.134.165", "172.86.120.207", "185.212.128.152", "185.212.128.192", "185.61.000.108", "185.61.138.108", "185.61.138.37", "188.209.52.101", "5.206.225.57", "alr992.date", "avito-app.pw", "backfround2.pw", "background1...
[ 16, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, ...
[ "However", ",", "at", "the", "time", "of", "writing", ",", "we", "were", "unable", "to", "identify", "relevant", "conversations", "about", "the", "EventBot", "malware", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16 ]
[ "The", "campaign", "was", "able", "to", "steal", "large", "amounts", "of", "data", "despite", "using", "relatively", "simple", "malware", "because", "it", "used", "clever", "social", "engineering", "tactics", "against", "its", "targets." ]
[ 16, 6, 16, 16, 16, 1, 9, 9, 9, 9, 16, 16, 16, 16, 3, 16, 16, 16, 16, 6, 14, 16, 16, 16, 4 ]
[ "Although", "the", "propagation", "trend", "seems", "to", "be", "slowing", "down", "a", "bit", ",", "the", "figure", "tells", "us", "that", "RuMMS", "malware", "is", "still", "alive", "in", "the", "wild", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "It", "may", "also", "download", "potentially", "malicious", "files." ]
[ 16, 16, 16, 16, 16, 3, 11 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/Kryptik.byz", "Trojan.Win32.Malware.1", "Trojan.Kryptik.HFN", "Packed:W32/RoxorCrypt.A", "Trojan.DownLoad.35818", "TROJ_RENOS.BHAM" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1 ]
[ "To", "that", "end,", "we", "are", "elevating", "the", "OilRig", "attack", "campaign", "to", "be", "known", "as", "the", "OilRig", "group." ]
[ 16, 16, 16, 16, 16, 16, 6, 14, 14, 14, 16, 16, 16, 16, 6, 14, 14 ]
[ "This", "can", "also", "define", "what", "kind", "of", "evidences", "to", "collect", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "If", "the", "returned", "JSON", "object", "has", "the", "“", "4", "”", "key", ",", "it", "will", "turn", "on", "the", "kill", "switch", "and", "initiate", "its", "own", "removal", "by", "sending", "an", "intent", "and", "seamlessly", "confirming", "the"...
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "First", "off", ",", "the", "Trojan", "registers", "in", "the", "administration", "panel", "and", "receives", "the", "information", "it", "needs", "to", "operate", "from", "the", "C", "&", "C", "(", "the", "SMS", "interception", "templates", "and", "the", ...
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, ...
[ "We", "believe", "the", "espionage", "factor", "and", "political", "context", "make", "their", "attacks", "unique", "and", "very", "different", "from", "traditional", "targeted", "attacks." ]
[ 16, 16, 6, 14, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 1 ]
[ "In", "particular,", "the", "focus", "was", "on", "Italian", "and", "Belgian", "users,", "but", "the", "StrongPity", "watering", "holes", "affected", "systems", "in", "far", "more", "locations", "than", "just", "those", "two." ]
[ 16, 16, 16, 16, 16, 16, 2, 16, 2, 16, 16, 16, 6, 1, 9, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Due", "to", "this", "obfuscation", ",", "a", "part", "of", "the", "previously", "mentioned", "cfg", "class", "is", "now", "mapped", "to", "c/b/a/a/a", "or", "c/a/a/a/a", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "]", "com", "hxxp", ":", "//www", "[", "." ]
[ 9, 9, 1, 9, 9, 9, 9 ]
[ "Just", "like", "in", "previous", "examples", ",", "the", "malware", "author", "does", "not", "use", "this", "package", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.MiadheardLTO.Trojan", "Trojan/W32.Mask.348264", "Trojandropper.Seedna", "Troj.W32.Careto!c", "Trojan/Appetite.c", "BKDR_CARETO.A", "W32/Mask.B", "Backdoor.Weevil.B", "BKDR_CARETO.A", "Trojan.Win32.Careto.au", "Trojan.Win32.Careto.dtnkyq", ...
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Symantec", "believes", "that", "the", "attackers", "behind", "the", "Anthem", "breach", "are", "part", "of", "a", "highly", "resourceful", "cyberespionage", "group", "called", "Black", "Vine." ]
[ 4, 16, 16, 16, 6, 16, 16, 4, 1, 16, 16, 16, 16, 16, 16, 6, 14, 16, 6, 14 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9998", "BehavesLike.Win32.Multiplug.ch", "Trojan:Win32/Autophyte.A!dha", "Backdoor/Win32.Akdoor.R198284" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1 ]
[ "In", "the", "first", "iteration", ",", "the", "screen", "recording", "is", "started", "and", "will", "only", "stop", "when", "the", "RAT", "determines", "that", "WhatsApp", "is", "not", "running", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16 ]
[ "The", "information", "is", "ideal", "for", "security", "professionals", "who", "investigate", "suspicious", "network", "activity", "in", "an", "Active", "Directory", "AD", "environment." ]
[ 16, 16, 16, 16, 16, 4, 12, 16, 16, 1, 9, 9, 16, 16, 5, 13, 13, 13 ]
[ "Beyond", "the", "previously", "mentioned", "DroidVPN", "example", ",", "other", "viable", "embedded", "apps", "we", "found", "include", "apps", "currently", "available", "on", "Google", "Play", ",", "as", "well", "as", "many", "third-party", "app", "stores", ...
[ 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor/W32.Visel.249856", "Win32.Trojan.WisdomEyes.16070401.9500.9992", "W32/Downldr2.DGSB", "BKDR_VISEL.DEN", "Win.Trojan.Visel-58", "Trojan.Win32.Kebot.wbjcg", "Trojan.Win32.Downloader.249856.G", "Backdoor.Win32.Visel.~C", "BackDoor.Pigeon.1269...
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "This", "is", "not", "the", "first", "time", "the", "country", "has", "been", "a", "victim", "of", "an", "APT." ]
[ 16, 16, 16, 16, 16, 16, 16, 2, 16, 16, 16, 16, 16, 16, 6 ]
[ "The", "Command", "&", "Control", "server", "also", "displays", "a", "favicon", "image", "which", "looks", "like", "a", "small", "orange", "ball", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Droma.S60541", "TrojWare.Win32.Sventore.A", "Trojan.MulDrop7.3471", "W32/Trojan.IGFK-3098", "TR/Aenjaris.ofeiu", "Trojan[Dropper]/Win32.Injector", "Trojan:Win32/Aenjaris.AI!bit", "Trojan.Zusy.D3FD29", "Dropper/Win32.Injector.C1617864", "BS...
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "use", "of", "the", "obfuscation", "techniques", "was", "novel", "and", "this", "advisory", "discusses", "those", "in", "detail,", "along", "with", "how", "we", "detected", "them." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "DiamondFox", "list", "of", "panels." ]
[ 4, 16, 16, 16 ]
[ "It", "tends", "to", "reuse", "old", "exploits", "and", "doesn't", "make", "an", "effort", "to", "disguise", "their", "activity." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "This", "framework", "allows", "anyone", "to", "develop", "a", "malicious", "app", "with", "the", "desired", "icon", "and", "communication", "address", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Its", "main", "target", "was", "larger", "organizations", "with", "an", "annual", "income", "of", "USD", "5", "million", "or", "higher." ]
[ 16, 16, 16, 16, 16, 4, 16, 16, 1, 9, 9, 9, 9, 9, 9, 9 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Downloader.Quanader", "TROJ_PLISKAL.SM", "Trojan.Win32.Pliskal.etapgz", "Trojan.DownLoader25.64837", "Trojan.Pliskal.Win32.48", "TROJ_PLISKAL.SM", "Trojan.Win32.Pliskal", "Trojan.Zusy.D3EBDA", "Trojan...
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "new", "threat", "actor", "group", "from", "Europe", "is", "selling", "malware,", "including", "the", "Typhon", "Stealer,", "RootFinder", "Miner,", "and", "the", "Cryptonic", "Crypter,", "according", "to", "CYFIRMA", "research", "team." ]
[ 16, 6, 14, 14, 14, 16, 2, 16, 16, 3, 16, 3, 11, 11, 11, 11, 16, 3, 11, 11, 16, 16, 4, 12, 12 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Buzy.D9C9", "Downloader.Pelfpoi", "TROJ_PELPOI.SMIA", "Trojan.Win32.Snojan.bxtm", "TROJ_PELPOI.SMIA", "BehavesLike.Win32.PUPXAQ.wc", "Worm/Win32.AutoRun", "TrojanDownloader:Win32/Pelfpoi.L", "Trojan.Win32.Snojan.bxtm", "Downloader/Win32.Ko...
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Phrovon.A", "TROJ_DLOADER.ZZT", "TROJ_DLOADER.ZZT", "Trojan.Win32.VB.euylta", "TrojWare.Win32.TrojanDownloader.VB.PMEA", "Trojan.DownLoader6.39644", "BehavesLike.Win32.VBObfus.nz", "W32.Malware.Downloader", "TR/Dldr.VB.WNE", "TrojanDownloa...
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "There", "is", "a", "new", "malware", "called", "Rurktar." ]
[ 16, 16, 16, 3, 11, 16, 3 ]
[ "A", "backdoor", "also", "known", "as:", "Worm.Win32.VBNA!O", "Trojan.VB.Win32.37651", "Trojan.Heur.VP.E1E33B", "Win32.Trojan.WisdomEyes.16070401.9500.9951", "Win.Trojan.VB-23833", "Worm.Win32.VBNA.b", "Trojan.Win32.VB.etozpu", "W32.W.VBNA.lrnh", "Win32.Worm.Vbna.Sxew", "Trojan.DownLoade...
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "app", "connects", "to", "the", "MQTT", "broker", "with", "hardcoded", "username", "and", "password", "and", "a", "unique", "device", "identifier", "generated", "for", "each", "device", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Technical", "Analysis", "Permissions", "Marcher", "’", "s", "APK", "size", "is", "fairly", "small", "(", "only", "683KB", "for", "sample", "eb8f02fc30ec49e4af1560e54b53d1a7", ")", ",", "much", "smaller", "than", "most", "legitimate", "apps", "and", "other", "po...
[ 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Crypt.i", "Trojan/Crypt.i", "Win32/TrojanProxy.Lager.F", "W32/Lager.AI", "Trojan.Abwiz.D", "Klone.R", "Trojan.Crypt", "Trojan-Proxy.Win32.Lager.q", "Trojan.Proxy.Lager.Q", "Trojan-Proxy.Win32.Lager!IK", "TrojWare.Win32.TrojanProxy.Lager....
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "This", "is", "an", "interesting", "attack", "of", "the", "infamous", "Syrian", "Electronic", "Army", "SEA." ]
[ 16, 16, 16, 16, 16, 16, 16, 6, 14, 14, 14, 14 ]
[ "Many", "of", "the", "targets", "are", "involved", "in", "litigation", "with", "the", "government", "of", "Kazakhstan", "in", "European", "and", "American", "courts", "whose", "substance", "ranges", "from", "attempts", "by", "the", "government", "of", "Kazakhsta...
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 12, 12, 12, 16, 2, 16, 4, 12, 16, 16, 16, 16, 16, 16, 4, 12, 12, 12, 16, 16, 16, 16, 16, 16, 1, 9, 16, 1, 9, 9, 9, 9, 9, 9, 9, 9, 9 ]
[ "Of", "course", ",", "this", "does", "not", "mean", "the", "digital", "signature", "of", "the", "software", "developer", "can", "be", "used", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "system", "service", "‘", "AccountManagerService", "’", "looks", "for", "the", "application", "that", "can", "process", "this", "request", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "ESET", "researchers", "have", "since", "analyzed", "samples", "of", "malware,", "detected", "by", "ESET", "as", "Win32/Industroyer,", "capable", "of", "performing", "exactly", "that", "type", "of", "attack." ]
[ 4, 12, 16, 16, 16, 16, 16, 3, 16, 16, 4, 16, 1, 16, 16, 16, 16, 16, 16, 16, 1 ]
[ "To", "infect", "a", "Windows", "computer,", "the", "user", "has", "to", "execute", "the", "malware", "by", "double-clicking", "on", "the", ".jar", "file." ]
[ 16, 16, 16, 5, 13, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 1, 9 ]
[ "The", "command", "is", "a", "constructed", "string", "split", "into", "three", "parts", "using", "\"", "\"", "as", "a", "separator", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "]", "99", "[", "." ]
[ 9, 9, 9, 9 ]
[ "ServStart", "is", "primarily", "used", "by", "attackers", "located", "in", "China,", "in", "a", "mix", "of", "targeted", "and", "opportunistic", "attacks." ]
[ 3, 16, 16, 16, 16, 6, 16, 16, 2, 16, 16, 16, 16, 16, 16, 16, 1 ]
[ "FireEye", "recently", "observed", "a", "FIN7", "spear", "phishing", "campaign", "targeting", "personnel", "involved", "with", "United", "States", "Securities", "and", "Exchange", "Commission", "SEC", "filings", "at", "various", "organizations." ]
[ 4, 16, 16, 16, 6, 14, 14, 14, 16, 4, 16, 16, 4, 12, 12, 12, 12, 12, 12, 16, 16, 4, 12 ]
[ "Originally", "intended", "to", "target", "the", "Russian", "audience", ",", "the", "banker", "was", "later", "adapted", ",", "with", "minimal", "modifications", ",", "for", "the", "European", "“", "market.", "”", "The", "bulk", "of", "its", "victims", "(", ...
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.Win32.Hupigon!O", "Win32.Trojan.WisdomEyes.16070401.9500.9976", "Backdoor.Win32.Hupigon.pjz", "BackDoor.Klj.25", "BehavesLike.Win32.PWSGamania.fc", "Backdoor.Win32.Hupigon", "Trojan.Zilix.1", "Backdoor.Win32.Hupigon.pjz", "Trojan/Win32.Hup...
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Ursu.D15C9E", "Win32.Trojan.WisdomEyes.16070401.9500.9977", "Backdoor.Trojan", "BKDR_ZEGOST.SM44", "Trojan.Win32.Farfli.extksh", "Trojan.Win32.Z.Zegost.671744.A", "TrojWare.Win32.AntiAV.~D", "BKDR_ZEGOST.SM44", "BehavesLike.Win32.Dropper.jm"...
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "It", "’", "s", "also", "possible", "that", "the", "apps", "are", "being", "used", "to", "test", "other", "possible", "techniques", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "By", "mid-1998", "the", "FBI", "and", "Department", "of", "Defense", "investigators", "had", "forensic", "evidence", "pointing", "to", "Russian", "ISPs." ]
[ 16, 0, 4, 12, 16, 4, 12, 12, 12, 16, 16, 16, 16, 16, 1, 9 ]
[ "To", "make", "sure", "the", "trojan", "survives", "a", "device", "restart", ",", "it", "abuses", "already", "activated", "accessibility", "services", "that", "will", "launch", "the", "trojan", "right", "after", "start", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Win32.Diple!O", "Worm.Yames", "W32/VBTrojan.9!Maximus", "WORM_YAMES.A", "WORM_YAMES.A", "Worm.Win32.VB", "W32/VBTrojan.9!Maximus", "Worm:Win32/Yames.A", "Trj/CI.A", "Win32/VB.ODO", "Win32.Worm.Vb.Sxeo", "W32/Vb.A!worm" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Regin", "has", "a", "wide", "range", "of", "standard", "capabilities,", "particularly", "around", "monitoring", "targets", "and", "stealing", "data." ]
[ 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Due", "to", "the", "violation", "of", "the", "integrity", "and", "availability", "of", "the", "web", "resources", "of", "a", "number", "of", "state", "organizations,", "the", "Government", "Computer", "Emergency", "Response", "Team", "of", "Ukraine", "CERT-UA",...
[ 16, 16, 16, 16, 16, 16, 7, 16, 16, 16, 16, 5, 13, 16, 16, 16, 16, 4, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 0, 8, 8 ]
[ "A", "backdoor", "also", "known", "as:", "HackTool.Mimikatz.S1196261", "Tool.Mimikatz.Win32.409", "W32/Petya.S", "Ransom.Petya", "Win.Trojan.Mimikatz-6331391-0", "Riskware.Win32.Mimikatz.eqnxjb", "Troj.PSW32.W.WinCred.tp7F", "Win32.Trojan.Mimipet.Aiin", "Trojan:W32/Petya.H", "Tool.Mimika...
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.BitcodeN.Trojan", "Trojan.Dropper.VRM", "Trojan.FakeAV", "Trojan.Dropper.VRM", "TSPY_VBKEYLOG.SM", "Win32.Trojan.WisdomEyes.16070401.9500.9793", "Win32/Tnega.ASRH", "TSPY_VBKEYLOG.SM", "Trojan.Dropper.VRM", "Trojan.Dropper.VRM", "Trojan.Dro...
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Since", "then,", "we've", "encountered", "more", "samples", "in", "the", "wild." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "W32/Trojan2.GJUE", "Hacktool.Rootkit", "Win32/Fuzfle.BZ", "Trojan.Win32.Sentinel.cquvjc", "Trojan.Sentinel.based", "Trojan.Spammer", "W32/Trojan.UUTE-6344", "Trojan/Win32.Unknown", "Spammer:WinNT/Sriz...
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "spyware", "also", "appears", "to", "have", "an", "additional", "payload", "stored", "under", "the", "/res/raw/", "directory", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.FamVT.RazyNHmA.Trojan", "Trojan.Kryptik.Win32.1323308", "Win32.Trojan.Kryptik.aio", "Ransom.TeslaCrypt!g6", "WORM_HPKASIDET.SM0", "Trojan.Win32.Kryptik.evtvij", "Trojan.DownLoader25.63634", "WORM_HPKASIDET.SM0", "BehavesLike.Win32.Downloader.cc...
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "At", "the", "request", "of", "the", "German", "Bundestag", "the", "BSI", "analyzed", "these", "problems", "in", "network", "traffic." ]
[ 16, 16, 16, 16, 4, 12, 12, 12, 12, 16, 16, 1, 16, 5, 13 ]
[ "The", "source", "process", "writes", "the", "native", "shellcode", "into", "the", "memory", "region", "allocated", "by", "mmap", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Use", "of", "a", "shared", "hosting", "service", "to", "distribute", "malware", "is", "highly", "flexible", "and", "low", "cost", "for", "the", "threat", "actors", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "VB:Trojan.Valyria.335", "W97M.Downloader.AFY", "W97M/Downloader.bxd", "VB:Trojan.Valyria.335", "W97M.Downloader", "Win32/DarkNeuron.A", "W2KM_DARKNEURON.A", "VB:Trojan.Valyria.335", "Trojan.Ole2.Vbs-heuristic.druvzi", "Heur:Trojan.Script.Download...
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Exploit.Win32.BypassUAC.gmk", "Trojan.MulDrop7.677", "BehavesLike.Win32.BadFile.ch", "Trojan-Downloader.MSIL.Tiny", "W32/Trojan.RVEW-7367", "Exploit.Win32.BypassUAC.gmk", "TrojanDownloader:MSIL/BrobanDel....
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Svpeng", "does", "this", "to", "check", "if", "the", "cards", "from", "these", "banks", "are", "attached", "to", "the", "number", "of", "the", "infected", "phone", "and", "to", "find", "out", "the", "account", "balance", "." ]
[ 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "U.S.", "President", "Donald", "Trump", "has", "ordered", "ByteDance", ",", "the", "parent", "company", "of", "TikTok", ",", "to", "sell", "its", "U.S.", "TikTok", "assets", "and", "also", "issued", "executive", "orders", "that", "would", "ban", "the", "soci...
[ 16, 16, 16, 16, 16, 16, 4, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.DowlodN.Trojan", "W32/Downldr2.BCPJ", "Win.Downloader.24666-2", "Trojan.Spambot.3004", "BehavesLike.Win32.MoonLight.mc", "W32/Downloader.EITQ-0059", "Trojan:Win32/Pramro.A", "Trojan.Win32.Downloader.28160.AO", "Trojan/Win32.CSon.R2002", "Viru...
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Ovidiy", "Stealer", "is", "priced", "at", "450-750", "Rubles", "~$7-13", "USD", "for", "one", "build,", "a", "price", "that", "includes", "a", "precompiled", "executable", "that", "is", "also", "crypted", "to", "thwart", "analysis", "and", "detection." ]
[ 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 1, 9, 9, 9 ]
[ "A", "backdoor", "also", "known", "as:", "TrojanPWS.Sekur.14236", "Win32.Trojan.WisdomEyes.16070401.9500.9974", "Trojan.Win32.Z.Sirefef.150528", "Win32.Trojan.Crypt.Ligd", "BackDoor.Anunak.8", "W32/Trojan.RFBB-7838", "Trojan.Sirefef.181", "PWS:Win32/Sekur.A", "Trj/GdSda.A", "Win32/Trojan...
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "main", "difference", "is", "that", "Smaps", "transmits", "data", "as", "plain", "text", ",", "while", "Asacub", "encrypts", "data", "with", "the", "RC4", "algorithm", "and", "then", "encodes", "it", "into", "base64", "format", "." ]
[ 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Once", "they", "have", "access", "to", "the", "network", "they", "proceed", "to", "encrypt", "multiple", "Windows", "systems", "using", "SamSam." ]
[ 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 1, 9, 5, 13, 16, 3 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Bladabindi.FC.2865", "Trojan/Bladabindi.u", "TROJ_SPNR.0BGN14", "Win32.Trojan.WisdomEyes.16070401.9500.9994", "Win32/Tnega.MAGYUTC", "TROJ_SPNR.0BGN14", "MSIL.Backdoor.Bladabindi.AX", "BackDoor.NJRat.355", "HackTool.MSIL", "W32/Trojan.UVRI...
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Once", "executed", ",", "the", "module", "attempts", "to", "get", "root", "privileges", "on", "the", "device", "by", "exploiting", "the", "following", "vulnerabilities", ":", "CVE-2013-2094", "CVE-2013-2595", "CVE-2013-6282", "CVE-2014-3153", "(", "futex", "aka", ...
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 7, 7, 7, 7, 16, 7, 16, 7, 16, 7, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "ITG03", "actors", "stole", "money", "from", "multiple", "international", "banks", "via", "the", "compromise", "of", "the", "interbank", "funds", "transfer", "system", "SWIFT", "in", "2016." ]
[ 6, 14, 16, 16, 16, 4, 12, 12, 16, 16, 16, 16, 4, 12, 12, 5, 13, 13, 16, 0 ]
[ "This", "appears", "to", "be", "an", "attack", "campaign", "focused", "on", "espionage." ]
[ 16, 16, 16, 16, 16, 6, 14, 16, 16, 6 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Symmi.DC2FF", "Win32.Trojan.WisdomEyes.16070401.9500.9877", "Trojan.Win32.VB.ctxv", "Troj.W32.VB.mgqM", "Win32.Trojan.Vb.Ahyc", "TrojWare.Win32.Injector.DSTF", "Trojan:W32/Bepush.B", "Trojan.Blocker.Win32.25483", "BehavesLike.Win32.Dropper.j...
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "LINKS", "TO", "WOLF", "INTELLIGENCE", "During", "the", "Virus", "Bulletin", "conference", "in", "2018", ",", "CSIS", "researchers", "Benoît", "Ancel", "and", "Aleksejs", "Kuprins", "did", "a", "presentation", "on", "Wolf", "Research", "and", "the", "offensive",...
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 12, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "call_number", ":", "to", "forward", "phone", "calls", "to", "intercept", "voice", "based", "two-factor", "authentication", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]