Datasets:
text stringlengths 3 21.4k | spans unknown | info unknown |
|---|---|---|
Incident Response Summary: On detection of anomalous traffic to 71.227.188.3, the Europol IR team identified Dridex running as C:\Users\admin\Downloads\lsass.dmp. The threat actor, believed to be Velvet Tempest, used Brute Ratel for credential harvesting and Havoc for lateral movement. Exfiltrated data was sent to upda... | {
"Indicator: 71.227.188.3": [
[
64,
76
]
],
"Organization: Europol": [
[
82,
89
]
],
"Malware: Dridex": [
[
109,
115
]
],
"Indicator: update-cache.cc": [
[
316,
331
]
],
"Indicator: syncauth.link": [
[
336,
... | {
"id": "synth_v2_00337",
"source": "synthetic_v2"
} |
A backdoor also known as: Trojan.Downloader.Farfly.L Multi.Threats.InArchive W32/Risk.NCBB-0700 Trojan.Farfli Win.Trojan.Downloader-2275 Trojan.Downloader.Farfly.L Trojan.Downloader.Farfly.L Trojan.Win32.Crypted.dkwpfn Trojan.Win32.Z.Downloader.266845 Trojan.Downloader.Farfly.L Trojan.DownLoader4.59614 Downloader.Selvi... | {
"Malware: backdoor": [
[
2,
10
]
]
} | {
"id": "cyner2_train_002149",
"source": "cyner2_train"
} |
Forensic Investigation Notes: Analysis of the compromised host revealed Metasploit artifacts at /dev/shm/csrss.exe. Memory dump analysis confirmed execution of Chisel. Registry modifications pointed to persistence via /home/user/.config/csrss.exe. Network forensics identified connections to 159.70.34.15 and storageupda... | {
"Indicator: 159.70.34.15": [
[
292,
304
]
],
"Indicator: storageupdate.link": [
[
309,
327
]
],
"Indicator: security@identity-verify.cc": [
[
372,
399
]
],
"Indicator: 846560ce3c1096a71b0c9faffc5c7d6e": [
[
445,
477
]
],
... | {
"id": "synth_v2_01202",
"source": "synthetic_v2"
} |
There are 3 types of lists recognized by ZxShell : plain ip addresses , HTTP and FTP addresses . | {
"Malware: ZxShell": [
[
41,
48
]
]
} | {
"id": "aptner_train_001616",
"source": "aptner_train"
} |
A backdoor also known as: W32.KloggerQKA.Trojan Trojan-Downloader.Win32.Delf!O Backdoor.Gobot Downloader.Delf.Win32.70 Backdoor.W32.Gobot.lfDt Trojan/Downloader.Delf.bm Win32.Trojan.WisdomEyes.16070401.9500.9965 W32/Avokado.SIKN-9031 W32.Gobot.A Backdoor.Gobot Win32/Gobot.B WORM_GOBOT.G Win.Downloader.Delf-144 Trojan.W... | {
"Malware: backdoor": [
[
2,
10
]
]
} | {
"id": "cyner2_train_001268",
"source": "cyner2_train"
} |
CVE-2025-8893: A maliciously crafted PDF file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process. | {
"Vulnerability: CVE-2025-8893": [
[
0,
13
]
],
"Vulnerability: Out-of-Bounds Write": [
[
107,
126
]
]
} | {
"id": "nvd_2025_8893",
"source": "nvd_cve"
} |
More recent variants blend rooting capabilities and click fraud . | {} | {
"id": "cyner_train_002259",
"source": "cyner_train"
} |
A backdoor also known as: Trojan/W32.ShipUp.90112 W32.VisuDir.A3 Trojan.Zusy.D2CF33 PE_SHIPUP.A Win32.Worm.ShipUp.h Win32/Gamarue.ISACBfC PE_SHIPUP.A Trojan.Win32.ShipUp.futk TrojWare.Win32.ShipUp.AR Trojan.KillFiles.28137 Worm.Win32.ShipUp Worm:Win32/Lecna.A!dha Trojan.Win32.ShipUp.futk Trojan/Win32.Cossta.R120893 Tro... | {
"Malware: backdoor": [
[
2,
10
]
]
} | {
"id": "cyner2_train_001406",
"source": "cyner2_train"
} |
ApostropheCMS is an open-source Node.js content management system. Versions 4.28.0 and prior contain a stored cross-site scripting vulnerability in the @apostrophecms/color-field module, where color values prefixed with -- bypass TinyColor validation intended for CSS custom properties, and the launder.string() call per... | {
"Vulnerability: cross-site scripting": [
[
110,
130
]
],
"Vulnerability: privilege escalation": [
[
827,
847
]
]
} | {
"source": "nvd_v2",
"cve_id": "CVE-2026-33889"
} |
Definition of populateConfigMap , which loads the map with values Correlating the last two steps , one can observe that the malware payload receives the configuration for the following properties : number – The default number to be send to the server ( in case the number is not available from the device ) api – The API... | {
"Organization: NCC Group": [
[
624,
633
]
],
"System: Windows": [
[
704,
711
]
],
"Indicator: SHIPPING_MX00034900_PL_INV_pdf.zip": [
[
745,
783
]
]
} | {
"id": "cyberner_stix_train_002704",
"source": "defanged_augment"
} |
QuickMute is a malware developed using the C/C++ programming language. Functionally provides download, RC4 decryption, and in-memory launch of the payload (waiting for a PE file with the export function "HttpsVictimMain"). To communicate with the management server, a number of protocols are provided, in particular: TCP... | {
"Malware: QuickMute": [
[
0,
9
]
]
} | {
"source": "apt_reports",
"name": "QUICKMUTE"
} |
Exbyte is an exfiltration tool written in Go that is uniquely associated with BlackByte operations. Observed since 2022, Exbyte transfers collected files to online file sharing and hosting services. | {
"Malware: Exbyte": [
[
0,
6
],
[
121,
127
]
]
} | {
"source": "mitre_attack_v2",
"mitre_id": "S1179"
} |
In the Linux kernel, the following vulnerability has been resolved:
thermal/drivers/cpufreq_cooling: Fix slab OOB issue
Slab OOB issue is scanned by KASAN in cpu_power_to_freq().
If power is limited below the power of OPP0 in EM table,
it will cause slab out-of-bound issue with negative array
index.
Return the lowes... | {
"System: Linux kernel": [
[
7,
19
]
]
} | {
"source": "nvd_v2",
"cve_id": "CVE-2020-36776"
} |
A backdoor also known as: JS/Iframe.DGS Script.Trojan-Downloader.IFrame.AE Trojan-Downloader.JS.Iframe.deg Trojan.Script.Expack.bvtkmp PDF.DownLoader.3 BehavesLike.PDF.BadFile.db JS/BlacoleRef.CZ.29 Trojan[Downloader]/JS.Iframe.deg Trojan-Downloader.JS.Iframe.deg JS/Moat.241E54F!tr | {
"Malware: backdoor": [
[
2,
10
]
],
"Indicator: BlacoleRef.CZ": [
[
182,
195
]
]
} | {
"id": "cyner2_train_004650",
"source": "cyner2_train"
} |
Artifact Analysis for Latrodectus campaign:
Stage 1 dropper at /etc/cron.d/implant.so - SHA256: accc7052c902d2b2636309be15d3d4d65bffd2583e1456d80074bea4275ffe18
Stage 2 loader at C:\Users\admin\Desktop\runtime.dll - SHA1: 40ead3e906eb0e2d3667075fce34060da216fc36
Final payload at /opt/app/bin/chrome_helper.exe - SHA256:... | {
"Malware: Latrodectus": [
[
22,
33
]
],
"Indicator: accc7052c902d2b2636309be15d3d4d65bffd2583e1456d80074bea4275ffe18": [
[
96,
160
]
],
"Indicator: 40ead3e906eb0e2d3667075fce34060da216fc36": [
[
222,
262
]
],
"Indicator: 9d42da2cf1008f90ad71e25... | {
"id": "synth_v2_01958",
"source": "synthetic_v2"
} |
A backdoor also known as: Trojan.VBS.UAJ Trojan.VBS.UAJ Win32.Trojan.WisdomEyes.16070401.9500.9853 Trojan.VBS.UAJ Vbs.Trojan.Vbs.Ljjs Trojan.VBS.UAJ Trojan.VBS.UAJ Trojan.DownLoader19.25627 BehavesLike.Win32.Downloader.qh Trojan.Barys Trojan.MSIL.amcc Trojan.VBS.UAJ Trojan.VBS.UAJ Trojan.MSIL.Zapchast VBS/Shutdown.NAH | {
"Malware: backdoor": [
[
2,
10
]
]
} | {
"id": "cyner2_train_002549",
"source": "cyner2_train"
} |
Vulnerability Advisory: CVE-2023-39714 is a critical race condition affecting Windows 11. SentinelOne confirmed active exploitation by Storm-0558 in the wild. Exploitation delivers RemcosRAT (SHA1: fe45c5659a9c6ddcaad6797958a6154e98cc6fe9) which is dropped to /var/tmp/ntds.dit. The exploit payload is hosted at http://d... | {
"Vulnerability: CVE-2023-39714": [
[
24,
38
]
],
"Vulnerability: race condition": [
[
53,
67
]
],
"System: Windows 11": [
[
78,
88
]
],
"Organization: SentinelOne": [
[
90,
101
]
],
"Malware: RemcosRAT": [
[
18... | {
"id": "synth_v2_00751",
"source": "synthetic_v2"
} |
The real C & C address is encoded in the Twitter names , and can only be revealed once decoded . FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while APT12 developed a completely new malware toolset . Below is a list of AdrGen . Mandiant used these s... | {
"Organization: Twitter": [
[
41,
48
]
],
"Organization: FireEye": [
[
97,
104
]
],
"Malware: attacker payloads": [
[
364,
381
]
]
} | {
"id": "cyberner_stix_train_001462",
"source": "cyberner_stix_train"
} |
InvisibleFerret is a modular python malware that is leveraged for data exfiltration and remote access capabilities. InvisibleFerret consists of four modules: main, payload, browser, and AnyDesk. InvisibleFerret malware has been leveraged by North Korea-affiliated threat actors identified as DeceptiveDevelopment or C... | {
"Malware: InvisibleFerret": [
[
0,
15
],
[
118,
133
],
[
198,
213
],
[
353,
368
]
],
"Malware: BeaverTail": [
[
451,
461
]
]
} | {
"source": "mitre_attack_v2",
"mitre_id": "S1245"
} |
Once the file has been downloaded and executed , the new process will launch a legitimate executable , such as “ msiexec.exe ” , and inject code into it . | {
"Indicator: msiexec.exe": [
[
113,
124
]
]
} | {
"id": "cyberner_stix_train_002750",
"source": "cyberner_stix_train"
} |
Artifact Analysis for Gootloader campaign:
Stage 1 dropper at /var/tmp/loader.exe - SHA256: 0a05928a49b4a37219ddd89de71269ec113beed92be59803be9b5f08fcaccd47
Stage 2 loader at C:\Users\admin\Downloads\loader.exe - SHA1: 72f3968e91bcc323136dd30d85ae887382c487e2
Final payload at /etc/cron.d/update.dll - SHA1: 346f216583a1... | {
"Malware: Gootloader": [
[
22,
32
]
],
"Indicator: 0a05928a49b4a37219ddd89de71269ec113beed92be59803be9b5f08fcaccd47": [
[
92,
156
]
],
"Indicator: 72f3968e91bcc323136dd30d85ae887382c487e2": [
[
219,
259
]
],
"Indicator: 346f216583a1460bb97ebeee... | {
"id": "synth_v2_01899",
"source": "synthetic_v2"
} |
ARS Loader, also known as ARS VBS Loader, is written in Visual Basic Script and its main purpose is to control an infected machine via different available commands, acting as a remote access trojan (RAT). Its code is based on ASPC, another Visual Basic Script malware, which at the same time seems to be based on SafeLoa... | {
"Malware: ARS VBS Loader": [
[
26,
40
]
]
} | {
"source": "apt_reports",
"name": "ARS VBS Loader"
} |
Incident Response Summary: On detection of anomalous traffic to 22.5.240.35, the INTERPOL IR team identified BumbleBee running as C:\Users\admin\AppData\Local\Temp\winlogon.exe. The threat actor, believed to be BlackTech, used BITSAdmin for credential harvesting and PowerView for lateral movement. Exfiltrated data was ... | {
"Indicator: 22.5.240.35": [
[
64,
75
]
],
"Organization: INTERPOL": [
[
81,
89
]
],
"Malware: BumbleBee": [
[
109,
118
]
],
"Indicator: gatewaystatic.info": [
[
328,
346
]
],
"Indicator: auth-edge.com": [
[
351... | {
"id": "synth_v2_00264",
"source": "synthetic_v2"
} |
Vulnerability in the Oracle One-to-One Fulfillment product of Oracle E-Business Suite (component: Print Server). Supported versions that are affected are 12.1.1-12.1.3 and 12.2.3-12.2.9. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle One-to-One Fulfill... | {
"Organization: Oracle": [
[
21,
27
],
[
62,
68
],
[
295,
301
],
[
443,
449
],
[
646,
652
],
[
759,
765
]
]
} | {
"source": "nvd_v2",
"cve_id": "CVE-2020-2870"
} |
A backdoor also known as: Win32.Wurmark.A@mm Win32.Wurmark.A@mm W32/Mugly.h@MM W32.W.Wurmark.g!c W32/Wurmark.g Win32.Wurmark.A@mm Win32.Wurmark.E90817 I-Worm.Wurmark!utsCc3R91ZU W32/Wurmark.F W32.Mugly.G@mm Win32/Wurmark.G WORM_MUGLY.H Worm.Wurmark.G Email-Worm.Win32.Wurmark.g Trojan.Win32.Wurmark.fsml Virus.Win32.Heur... | {
"Malware: backdoor": [
[
2,
10
]
]
} | {
"id": "cyner2_train_001418",
"source": "cyner2_train"
} |
It turned out that they are also atypical by many means. | {} | {
"id": "cyner2_train_003246",
"source": "cyner2_train"
} |
ZxFunction002 This will either bind the calling process to a port or has the calling process connect to a remote host . | {} | {
"id": "aptner_train_001681",
"source": "aptner_train"
} |
A backdoor also known as: Backdoor/W32.SdBot.25088.Q Backdoor/Afbot.a BKDR_POEBOT.DK Win32.Trojan.WisdomEyes.16070401.9500.9999 Backdoor.Trojan BKDR_POEBOT.DK Backdoor.Win32.Afbot.a Trojan.Win32.Afbot.daze Backdoor.Win32.S.Afbot.25088 Backdoor.W32.Afbot.a!c Backdoor.Win32.Afbot.~A BackDoor.IRC.Afbot Backdoor.Afbot.Win3... | {
"Malware: backdoor": [
[
2,
10
]
],
"Indicator: Iroffer.BG": [
[
435,
447
]
]
} | {
"id": "cyner2_train_003084",
"source": "defanged_augment"
} |
IOC Bulletin - Gootloader Campaign:
Network Indicators:
- 183.148.21.61
- 7.227.211.153
- 89.180.107.95
- nodenode.net
- node-login.top
URLs:
- http://storagebackup.online/admin/config
- hxxp://proxysync.tech/secure/token
Email Senders:
- finance@secure-verify.net
- noreply@login-portal.tech
File Indicators:
- SHA256: ... | {
"Malware: Gootloader": [
[
15,
25
]
],
"Indicator: 183.148.21.61": [
[
58,
71
]
],
"Indicator: 7.227.211.153": [
[
74,
87
]
],
"Indicator: 89.180.107.95": [
[
90,
103
]
],
"Indicator: nodenode.net": [
[
106,
... | {
"id": "synth_v2_01356",
"source": "synthetic_v2"
} |
PANW Unit 42 describes this malware as capable of up and downloading files as well as loading additional shellcode payloads into selected target processes. It uses the Microsoft Graph API and Dropbox API as C&C channel. | {
"Organization: Microsoft": [
[
168,
177
]
],
"Organization: Unit 42": [
[
5,
12
]
]
} | {
"source": "apt_reports",
"name": "GraphDrop"
} |
In December 2012 Mofang started a campaign against a new target , called ' seg ' for the purpose of this report . | {} | {
"id": "dnrti_train_002235",
"source": "dnrti_train"
} |
so TAU is looking for newer versions ANEL samples . | {
"Organization: TAU": [
[
3,
6
]
],
"Organization: ANEL": [
[
37,
41
]
]
} | {
"id": "aptner_train_000489",
"source": "aptner_train"
} |
The next most common is port 53 . | {} | {
"id": "aptner_train_001735",
"source": "aptner_train"
} |
A backdoor also known as: Win32.Trojan.WisdomEyes.16070401.9500.9962 Trojan.Win32.Graftor.dcgcrd TrojWare.Win32.Kryptik.~NT Trojan-Downloader.Win32.Banload Trojan:Win32/BrobanAda.A TScope.Trojan.Delf | {
"Malware: backdoor": [
[
2,
10
]
]
} | {
"id": "cyner2_train_001562",
"source": "cyner2_train"
} |
BanPolMex is a remote access trojan that uses TCP for communication.
It uses an RC4-like stream cipher called Spritz for encryption of its configuration and network traffic.
It sends detailed information about the victim's environment, like computer name, Windows version, free space of memory and all drives, proc... | {
"Malware: BanPolMex RAT": [
[
1163,
1176
]
],
"System: Windows": [
[
262,
269
]
],
"Vulnerability: watering hole": [
[
1208,
1221
]
],
"Malware: HOTWAX": [
[
1342,
1348
]
]
} | {
"source": "apt_reports",
"name": "BanPolMex RAT"
} |
In a separate incident , CTU researchers identified a file named s.txt , which is consistent with the output of the Netview host-enumeration tool . | {
"Organization: CTU": [
[
25,
28
]
],
"Malware: s.txt": [
[
65,
70
]
]
} | {
"id": "dnrti_train_001425",
"source": "dnrti_train"
} |
FakeSpy Chunghwa Post version installation process and application UI . Bitdefender’s investigation shows the attackers’ main methods remain to quietly infiltrate the infrastructure by establishing a foothold on an employee’s system , then move laterally across the infrastructure or elevate privileges to find critical ... | {
"Malware: FakeSpy": [
[
0,
7
]
],
"Organization: Chunghwa Post": [
[
8,
21
]
],
"Organization: financial transactions": [
[
340,
362
]
],
"Organization: ATM networks": [
[
366,
378
]
]
} | {
"id": "cyberner_stix_train_007743",
"source": "cyberner_stix_train"
} |
A backdoor also known as: NetTool.Tor Backdoor.Bot Tool.Tor.Win32.4 Win32.Trojan.WisdomEyes.16070401.9500.9989 Backdoor.Trojan not-a-virus:NetTool.Win32.Tor.f Trojan.Win32.MLW.dbcsxd Trojan.DownLoader8.56801 Sefnit.ag W32/Trojan.OTFO-7506 HackTool[NetTool]/Win32.Tor TrojanDropper:Win32/Sefnit.A not-a-virus:NetTool.Win3... | {
"Malware: backdoor": [
[
2,
10
]
]
} | {
"id": "cyner2_train_002268",
"source": "cyner2_train"
} |
delivery : to deliver specified text to all victim ’ s contacts ( SMS worming ) . | {} | {
"id": "cyner_train_001136",
"source": "cyner_train"
} |
The earliest evidence obtained shows it has been in use since at least November 2016. | {} | {
"id": "cyner2_train_007356",
"source": "cyner2_train"
} |
A backdoor also known as: Trojan.Win32.PopUpper!O Worm.Shamli.A3 Trojan.PopUpper.Win32.66 Trojan.ShellStartup.E6CAF2 Win32.Trojan.WisdomEyes.16070401.9500.9949 Trojan.Win32.PopUpper.eg W32.Virut.low6 Trojan.MulDrop3.38938 BehavesLike.Win32.VBObfus.tz Trojan/PopUpper.bi Trojan/Win32.PopUpper Worm:Win32/Shamli.A Trojan.W... | {
"Malware: backdoor": [
[
2,
10
]
]
} | {
"id": "cyner2_train_005762",
"source": "cyner2_train"
} |
This and following versions were masquerading as fake “ Adobe Flash Player ” apps . The OSB functions as the interface between CIA operational staff and the relevant technical support staff . CopyKittens is an Iranian cyber espionage group that has been operating since at least 2013 . | {
"System: Adobe Flash Player": [
[
56,
74
]
]
} | {
"id": "cyberner_stix_train_003811",
"source": "cyberner_stix_train"
} |
In the Linux kernel, the following vulnerability has been resolved:
nvmem: Fix shift-out-of-bound (UBSAN) with byte size cells
If a cell has 'nbits' equal to a multiple of BITS_PER_BYTE the logic
*p &= GENMASK((cell->nbits%BITS_PER_BYTE) - 1, 0);
will become undefined behavior because nbits modulo BITS_PER_BYTE is... | {
"System: Linux kernel": [
[
7,
19
]
],
"Organization: Google": [
[
689,
695
]
]
} | {
"source": "nvd_v2",
"cve_id": "CVE-2021-47497"
} |
A backdoor also known as: TROJ_KREP.D Trojan.DownLoad3.10695 Trojan.Swisyn.Win32.8140 TROJ_KREP.D Trojan/Swisyn.jnt Trojan:Win32/Trixpi.A Trojan-Downloader.win32.Delf.xoq W32/Mdrop.CQO!tr Trojan.Win32.Trixpi.A | {
"Malware: backdoor": [
[
2,
10
]
]
} | {
"id": "cyner2_train_003083",
"source": "cyner2_train"
} |
http : //www.himobilephone [ . While investigating a 2016 intrusion , Secureworks incident responders identified BRONZE BUTLER exploiting a then-unpatched remote code execution vulnerability ( CVE-2016-7836 ) in SKYSEA Client View , a popular Japanese product used to manage an organization . Seedworm then uses open-sou... | {
"Organization: Secureworks": [
[
70,
81
]
],
"Vulnerability: CVE-2016-7836": [
[
193,
206
]
],
"Malware: LaZagne": [
[
338,
345
]
],
"Malware: Crackmapexec": [
[
350,
362
]
],
"System: Windows": [
[
373,
... | {
"id": "cyberner_stix_train_005360",
"source": "cyberner_stix_train"
} |
AllaKore is a simple Remote Access Tool written in Delphi, first observed in 2015 but still in early stages of development. It implements the RFB protocol which uses frame buffers and thus is able to send back only the changes of screen frames to the controller, speeding up the transport and visualization control. | {
"Malware: AllaKore": [
[
0,
8
]
]
} | {
"source": "apt_reports",
"name": "AllaKore"
} |
In 2016 , Group-IB identified 10 attacks conducted by MoneyTaker , 6 attacks on banks in the US , 1 attack on a US service provider , 1 attack on a bank in the UK and 2 attacks on Russian banks . | {
"Organization: Group-IB": [
[
10,
18
]
],
"Organization: service provider": [
[
115,
131
]
]
} | {
"id": "dnrti_train_002265",
"source": "dnrti_train"
} |
A backdoor also known as: Riskware.Win32.MyBeeSearch.euqqpm Adware.Mybeesearch.17920 Adware.MyBeeSearch.Win32.35 W32/Trojan.ZETF-8401 ADWARE/MyBeeSearch.yttss Adware.BeeSearch/Variant Trj/GdSda.A Msil.Adware.Mybeesearch.Ednu PUA.MyBeeSearch! AdWare.MSIL.Mybeesearch | {
"Malware: backdoor": [
[
2,
10
]
]
} | {
"id": "cyner2_train_002367",
"source": "cyner2_train"
} |
Both of these libraries are runtime libraries related to Dalvik and ART runtime environments . | {
"System: Dalvik": [
[
57,
63
]
],
"System: ART": [
[
68,
71
]
]
} | {
"id": "cyner_train_001943",
"source": "cyner_train"
} |
A backdoor also known as: Virus.W32.Virus!c Trojan/Spy.KeyLogger.au Trojan.Raw.KeyLog.epwywq BehavesLike.Win32.Cutwail.tc Trojan.Shelma.bbh Trojan/Win32.Shelma Trojan:Win32/Ronohu.A Trj/CI.A Python/Spy.KeyLogger.V Trojan.Python.Spy Python/KeyLogger.V!tr.spy | {
"Malware: backdoor": [
[
2,
10
]
],
"Indicator: Spy.KeyLogger.au": [
[
51,
67
]
]
} | {
"id": "cyner2_train_004120",
"source": "cyner2_train"
} |
The iOS malware that is installed over USB by osx.wirelurker | {
"Malware: wirelurker": [
[
50,
60
]
],
"System: iOS": [
[
4,
7
]
]
} | {
"source": "apt_reports",
"name": "WireLurker"
} |
In the Linux kernel, the following vulnerability has been resolved:
arm64: ftrace: fix module PLTs with mcount
Li Huafei reports that mcount-based ftrace with module PLTs was broken
by commit:
a6253579977e4c6f ("arm64: ftrace: consistently handle PLTs.")
When a module PLTs are used and a module is loaded sufficie... | {
"System: Linux kernel": [
[
7,
19
]
]
} | {
"source": "nvd_v2",
"cve_id": "CVE-2022-50579"
} |
An interesting part of the script is the continuous killing of every “ rundll32.exe ” process running into the victim machine , generates a huge amount of noise , as visible in the following process explorer view . | {
"Indicator: rundll32.exe": [
[
71,
83
]
]
} | {
"id": "aptner_train_002542",
"source": "aptner_train"
} |
Note that the 104.168.167.16 server is used as a C2 server . | {
"Indicator: 104.168.167.16": [
[
14,
28
]
]
} | {
"id": "cyberner_stix_train_007272",
"source": "cyberner_stix_train"
} |
HyperBro is a custom in-memory backdoor used by Threat Group-3390. | {
"Malware: HyperBro": [
[
0,
8
]
]
} | {
"source": "mitre_attack_v2",
"mitre_id": "S0398"
} |
An individual who goes by the name LZX in some online forums is believed to be the original author of ZxShell . | {
"Malware: ZxShell": [
[
102,
109
]
]
} | {
"id": "aptner_train_001548",
"source": "aptner_train"
} |
A command injection vulnerability in tcpdump command processing on Juniper Networks Junos OS Evolved allows an attacker with authenticated CLI access to be able to bypass configured access protections to execute arbitrary shell commands within the context of the current user. The vulnerability allows an attacker to byp... | {
"Organization: Juniper": [
[
67,
74
],
[
881,
888
]
],
"Vulnerability: command injection": [
[
2,
19
]
]
} | {
"source": "nvd_v2",
"cve_id": "CVE-2021-31357"
} |
A backdoor also known as: Win32.Trojan.WisdomEyes.16070401.9500.9894 Trojan.Win32.CsDown.bdcfvq Trojan.CsDown.25 TrojanDropper:Win32/Waltrodock.B Trojan.Graftor.D4ACD Trojan.CsNowDown!qDe+BhsdQ1Y W32/WDockDrp.A!tr Trj/CI.A Win32/Trojan.8ea | {
"Malware: backdoor": [
[
2,
10
]
]
} | {
"id": "cyner2_train_002467",
"source": "cyner2_train"
} |
Google TAG published a threat intelligence report linking Lazarus Group to a new campaign exploiting CVE-2025-17185 in Progress Telerik. The attackers deployed XLoader via Ligolo, establishing C2 communication with 80.170.101.183 and authrelay.info. A secondary payload was downloaded from hxxp://proxydata.xyz/collect. ... | {
"Organization: Google TAG": [
[
0,
10
]
],
"Vulnerability: CVE-2025-17185": [
[
101,
115
]
],
"System: Progress Telerik": [
[
119,
135
]
],
"Malware: XLoader": [
[
160,
167
]
],
"Indicator: 80.170.101.183": [
[
... | {
"id": "synth_v2_00207",
"source": "synthetic_v2"
} |
Ben Baker , Edmund Brumaghin and Jonah Samost of Talos have a fantastic write-up of this process here . | {
"Organization: Talos": [
[
49,
54
]
]
} | {
"id": "cyberner_stix_train_006361",
"source": "cyberner_stix_train"
} |
Although we have only observed APT33 use DROPSHOT to deliver TURNEDUP , we have identified multiple DROPSHOT samples in the wild that delivered wiper malware we call SHAPESHIFT . | {} | {
"id": "dnrti_train_000815",
"source": "dnrti_train"
} |
Incident Response Summary: On detection of anomalous traffic to 192[.]227[.]43[.]207, the NCSC IR team identified TrickBot running as C:\Users\admin\Desktop\backdoor.elf. The threat actor, believed to be FIN11, used GhostPack for credential harvesting and SharpHound for lateral movement. Exfiltrated data was sent to st... | {
"Indicator: 192.227.43.207": [
[
64,
84
]
],
"Organization: NCSC": [
[
90,
94
]
],
"Malware: TrickBot": [
[
114,
122
]
],
"Indicator: storage-gateway.org": [
[
318,
339
]
],
"Indicator: updatenode.tech": [
[
34... | {
"id": "synth_v2_00288",
"source": "defanged_augment"
} |
] infoacount-manager [ . | {} | {
"id": "cyner_train_002032",
"source": "cyner_train"
} |
According to Mandiant, PINEFLOWER is an Android malware family capable of a wide range of backdoor functionality, including stealing system inform information, logging and recording phone calls, initiating audio recordings, reading SMS inboxes and sending SMS messages. The malware also has features to facilitate device... | {
"Malware: PINEFLOWER": [
[
23,
33
]
],
"System: Android": [
[
40,
47
]
],
"Organization: Mandiant": [
[
13,
21
]
]
} | {
"source": "apt_reports",
"name": "PINEFLOWER"
} |
A backdoor also known as: Win32.Trojan.WisdomEyes.16070401.9500.9982 Trojan.Win32.Dwn.eenglt Win32.Trojan.Spy.Peqf Trojan.DownLoader14.35508 BehavesLike.Win32.HToolMimiKatz.dc Trojan.Symmi.D8341 PWS:Win32/Banker.UC!bit Trj/CI.A | {
"Malware: backdoor": [
[
2,
10
]
]
} | {
"id": "cyner2_train_000760",
"source": "cyner2_train"
} |
FBI published a threat intelligence report linking MuddyWater to a new campaign exploiting CVE-2022-22601 in Microsoft Exchange. The attackers deployed Conti via Sharphound, establishing C2 communication with 91.136.216.71 and nodenode.live. A secondary payload was downloaded from https://proxy-edge.top/gate.php. The m... | {
"Organization: FBI": [
[
0,
3
]
],
"Vulnerability: CVE-2022-22601": [
[
91,
105
]
],
"System: Microsoft Exchange": [
[
109,
127
]
],
"Malware: Conti": [
[
152,
157
]
],
"Indicator: 91.136.216.71": [
[
209,
... | {
"id": "synth_v2_00233",
"source": "synthetic_v2"
} |
The Callisto Group is an advanced threat actor whose known targets include military personnel, government officials, think tanks, and journalists in Europe and the South Caucasus. | {
"Organization: The Callisto Group": [
[
0,
18
]
],
"Organization: military personnel, government officials, think tanks,": [
[
75,
129
]
],
"Organization: journalists": [
[
134,
145
]
]
} | {
"id": "cyner2_train_003333",
"source": "cyner2_train"
} |
PlushDaemon is a China-aligned APT group that has conducted cyberespionage operations against targets in China, Taiwan, Hong Kong, South Korea, the United States, and New Zealand. They executed a supply chain attack on the South Korean VPN provider IPany, compromising its installer to deploy the SlowStepper backdoor, w... | {
"System: VPN": [
[
236,
239
]
],
"Vulnerability: supply chain attack": [
[
196,
215
]
],
"Malware: SlowStepper": [
[
297,
308
]
]
} | {
"source": "apt_reports",
"name": "PlushDaemon"
} |
In August 2015 , the admin@338 sent spear phishing emails to a number of Hong Kong-based media organizations , including newspapers , radio , and television . | {
"Organization: media organizations": [
[
89,
108
]
]
} | {
"id": "dnrti_train_000004",
"source": "dnrti_train"
} |
Valak is a multi-stage modular malware that can function as a standalone information stealer or downloader, first observed in 2019 targeting enterprises in the US and Germany. | {
"Malware: Valak": [
[
0,
5
]
]
} | {
"source": "mitre_attack_v2",
"mitre_id": "S0476"
} |
DarkKomet is a freeware remote access trojan that was released by an independent software developer. | {
"Malware: DarkKomet": [
[
0,
9
]
],
"Malware: freeware remote access trojan": [
[
15,
44
]
]
} | {
"id": "cyner2_train_007207",
"source": "cyner2_train"
} |
A longstanding cyberespionage campaign has been targeting mainly Japanese organizations with its own, custom-developed, malware Backdoor.Daserf. | {
"Organization: Japanese organizations": [
[
65,
87
]
],
"Malware: malware": [
[
120,
127
]
]
} | {
"id": "cyner2_train_002236",
"source": "cyner2_train"
} |
NATS-Server is a High-Performance server for NATS[ . ]io, a cloud and edge native messaging system. Prior to versions 2.11.15 and 2.12.6, when using mTLS for client identity, with `verify_and_map` to derive a NATS identity from the client certificate's Subject DN, certain patterns of RDN would not be correctly enforced... | {
"Indicator: NATS.io": [
[
45,
56
]
],
"Vulnerability: authentication bypass": [
[
335,
356
]
]
} | {
"source": "defanged_augment",
"cve_id": "CVE-2026-33248"
} |
In this case, though, running the troubleshooter leads to the installation of LatentBot, a well-documented modular bot used for surveillance, information stealing, and remote access. | {
"System: troubleshooter": [
[
34,
48
]
],
"Malware: LatentBot,": [
[
78,
88
]
],
"Malware: bot": [
[
115,
118
]
]
} | {
"id": "cyner2_train_001588",
"source": "cyner2_train"
} |
Much like the MiniDuke expose in February 2013 , the Dukes again appeared to prioritize continuing operations over staying hidden . | {
"Malware: MiniDuke": [
[
14,
22
]
]
} | {
"id": "cyberner_stix_train_001380",
"source": "cyberner_stix_train"
} |
COATHANGER is a remote access tool (RAT) targeting FortiGate networking appliances. First used in 2023 in targeted intrusions against military and government entities in the Netherlands along with other victims, COATHANGER was disclosed in early 2024, with a high confidence assessment linking this malware to a state-sp... | {
"Malware: COATHANGER": [
[
0,
10
]
],
"System: FortiGate": [
[
51,
60
]
],
"Vulnerability: CVE-2022-42475": [
[
494,
508
]
]
} | {
"source": "mitre_attack_v2",
"mitre_id": "S1105"
} |
In the Linux kernel, the following vulnerability has been resolved:
nvmet: fix freeing unallocated p2pmem
In case p2p device was found but the p2p pool is empty, the nvme target
is still trying to free the sgl from the p2p pool instead of the
regular sgl pool and causing a crash (BUG() is called). Instead, assign
the... | {
"System: Linux kernel": [
[
7,
19
]
]
} | {
"source": "nvd_v2",
"cve_id": "CVE-2021-47130"
} |
An Improper Check or Handling of Exceptional Conditions vulnerability in packet processing of Juniper Networks Junos OS on QFX10002 allows an unauthenticated, adjacent attacker on the local broadcast domain sending a malformed packet to the device, causing all PFEs other than the inbound PFE to wedge and to eventually ... | {
"Organization: Juniper": [
[
94,
101
],
[
2072,
2079
]
],
"Vulnerability: Denial of Service": [
[
344,
361
],
[
451,
468
]
]
} | {
"source": "nvd_v2",
"cve_id": "CVE-2023-28959"
} |
LibreNMS is an auto-discovering PHP/MySQL/SNMP based network monitoring tool. Versions 25.12.0 and below contain an SQL Injection vulnerability in the ajax_table.php endpoint. The application fails to properly sanitize or parameterize user input when processing IPv6 address searches. Specifically, the address parameter... | {
"System: PHP": [
[
32,
35
]
],
"Vulnerability: SQL Injection": [
[
116,
129
]
]
} | {
"source": "nvd_v2",
"cve_id": "CVE-2026-26988"
} |
Vulnerability Advisory: CVE-2023-45005 is a critical race condition affecting Citrix NetScaler. CrowdStrike confirmed active exploitation by Star Blizzard in the wild. Exploitation delivers DanaBot (SHA1: 8694a04b8d7eaf0d405abd673d69d9878663e9cd) which is dropped to /etc/cron.d/payload.bin. The exploit payload is hoste... | {
"Vulnerability: CVE-2023-45005": [
[
24,
38
]
],
"Vulnerability: race condition": [
[
53,
67
]
],
"System: Citrix NetScaler": [
[
78,
94
]
],
"Organization: CrowdStrike": [
[
96,
107
]
],
"Malware: DanaBot": [
[
... | {
"id": "synth_v2_00721",
"source": "synthetic_v2"
} |
A Bootkit is a rootkit malware variant which infects the device at start-up and may encrypt disk or steal data , remove the application , open connection for Command and controller . | {} | {
"id": "cyner_train_001972",
"source": "cyner_train"
} |
In this case , like others before , the event of a popular game release became an opportunity to trick unsuspecting users into downloading the RAT . The APT actor , active since 2008 , has been seen targeting organizations in the financial services , telecoms , government , and defense sectors . 3[ . ]doc : d4eb4035e11... | {
"Organization: organizations": [
[
209,
222
]
],
"Organization: financial services": [
[
230,
248
]
],
"Organization: telecoms": [
[
251,
259
]
],
"Organization: government": [
[
262,
272
]
],
"Organization: defense sect... | {
"id": "cyberner_stix_train_005185",
"source": "defanged_augment"
} |
In the Linux kernel, the following vulnerability has been resolved:
scsi: ufs: core: mcq: Fix &hwq->cq_lock deadlock issue
When ufshcd_err_handler() is executed, CQ event interrupt can enter waiting
for the same lock. This can happen in ufshcd_handle_mcq_cq_events() and
also in ufs_mtk_mcq_intr(). The following warni... | {
"System: Linux kernel": [
[
7,
19
]
]
} | {
"source": "nvd_v2",
"cve_id": "CVE-2023-53760"
} |
A vulnerability named 'Non-Responsive Delegation Attack' (NRDelegation Attack) has been discovered in various DNS resolving software. The NRDelegation Attack works by having a malicious delegation with a considerable number of non responsive nameservers. The attack starts by querying a resolver for a record that relies... | {
"Vulnerability: denial of service": [
[
732,
749
]
]
} | {
"source": "nvd_v2",
"cve_id": "CVE-2022-3204"
} |
Pacu is an open-source AWS exploitation framework. The tool is written in Python and publicly available on GitHub. | {
"System: AWS": [
[
23,
26
]
],
"System: Python": [
[
74,
80
]
],
"Organization: GitHub": [
[
107,
113
]
]
} | {
"source": "mitre_attack_v2",
"mitre_id": "S1091"
} |
The first DNS query by Glimpse requests the mode to be used in future communications with the controller (i.e., ping mode or text mode ) . | {
"Malware: Glimpse": [
[
23,
30
]
]
} | {
"id": "aptner_train_000042",
"source": "aptner_train"
} |
APT15 was targeting information related to UK government departments and military technology . | {} | {
"id": "dnrti_train_000506",
"source": "dnrti_train"
} |
Our friends over at Bellingcat, which conducts open source investigations and writes extensively on Russia-related issues, recently shared a new tranche of spear-phishing emails they had received. | {
"Organization: Bellingcat,": [
[
20,
31
]
]
} | {
"id": "cyner2_train_000503",
"source": "cyner2_train"
} |
Starloader is a loader component that has been observed loading Felismus and associated tools. | {
"Malware: Starloader": [
[
0,
10
]
],
"Malware: Felismus": [
[
64,
72
]
]
} | {
"source": "mitre_attack_v2",
"mitre_id": "S0188"
} |
Malware Analysis Report: TrickBot (SHA1: 5ba325473f41beb4cb02c4a65e20e8074e1fb9d8). Upon execution on Fortinet FortiGate, the sample creates C:\Windows\Tasks\backdoor.elf and injects into legitimate processes. Network analysis shows beaconing to 192.131.150.214 every 60 seconds and DNS queries to updatestorage.site. Th... | {
"Malware: TrickBot": [
[
25,
33
]
],
"Indicator: 5ba325473f41beb4cb02c4a65e20e8074e1fb9d8": [
[
41,
81
]
],
"System: Fortinet FortiGate": [
[
102,
120
]
],
"Indicator: 192.131.150.214": [
[
246,
261
]
],
"Indicator: upda... | {
"id": "synth_v2_00485",
"source": "synthetic_v2"
} |
The main payload is usually Imminent Monitor RAT; however , at the beginning of 2018 , we also observed the use of LuminosityLink RAT , NetWire RAT , and NjRAT . | {
"Malware: Monitor RAT;": [
[
37,
49
]
],
"Malware: LuminosityLink RAT": [
[
115,
133
]
],
"Malware: NetWire RAT": [
[
136,
147
]
],
"Malware: NjRAT": [
[
154,
159
]
]
} | {
"id": "dnrti_train_003472",
"source": "dnrti_train"
} |
] ir . In recent APT incidents , Dark Hydruns tend to adopt Office VBA macro instead of Office 0day vulnerability in the consideration of cost reduction . ScarCruft tools : 22aaf617a86e026424edb7c868742495 AV Remover . | {
"Indicator: 22aaf617a86e026424edb7c868742495": [
[
173,
205
]
]
} | {
"id": "cyberner_stix_train_002549",
"source": "cyberner_stix_train"
} |
In previous instances, Cyble Research and Intelligence Labs CRIL has exposed numerous phishing websites that have been used to steal sensitive data by utilizing a range of malware types, such as stealers, RATs, and bots. | {
"Organization: Cyble Research": [
[
23,
37
]
],
"Organization: Intelligence Labs CRIL": [
[
42,
64
]
],
"Malware: malware": [
[
172,
179
]
],
"Malware: stealers, RATs,": [
[
195,
210
]
],
"Malware: bots.": [
[
... | {
"id": "cyner2_train_003141",
"source": "cyner2_train"
} |
Adversaries may use a Login Hook to establish persistence executed upon user logon. A login hook is a plist file that points to a specific script to execute with root privileges upon user logon. The plist file is located in the /Library/Preferences/com.apple.loginwindow.plist file and can be modified using the defaults... | {
"System: macOS": [
[
942,
947
]
]
} | {
"source": "mitre_attack_v2",
"mitre_id": "T1037.002"
} |
This background image likely contains a fake “ software update ” screen . Alternatively , OurMine might have used social engineering to trick WikiLeaks 's DNS provider into handing over the credentials , or simple requested that a password reset link be sent to a compromised email address . The group has maintained a l... | {
"Organization: WikiLeaks": [
[
142,
151
]
],
"Organization: DNS provider": [
[
155,
167
]
],
"Organization: intelligence services": [
[
451,
472
]
]
} | {
"id": "cyberner_stix_train_000496",
"source": "cyberner_stix_train"
} |
IOC Bulletin - Play Campaign:
Network Indicators:
- 172.189.37.110
- 126.47.86.29
- 192.220.24.213
- edge-api.dev
- login-data.live
URLs:
- https://cloud-cdn.org/secure/token
- http://cachelogin.com/download/update.exe
Email Senders:
- helpdesk@secure-verify.net
- finance@auth-check.org
File Indicators:
- SHA1: 58b25e5... | {
"Malware: Play": [
[
15,
19
]
],
"Indicator: 172.189.37.110": [
[
52,
66
]
],
"Indicator: 126.47.86.29": [
[
69,
81
]
],
"Indicator: 192.220.24.213": [
[
84,
98
]
],
"Indicator: edge-api.dev": [
[
101,
11... | {
"id": "synth_v2_01328",
"source": "synthetic_v2"
} |
In the Linux kernel, the following vulnerability has been resolved:
vduse: fix NULL pointer dereference
vduse_vdpa_set_vq_affinity callback can be called
with NULL value as cpu_mask when deleting the vduse
device.
This patch resets virtqueue's IRQ affinity mask value
to set all CPUs instead of dereferencing NULL cpu... | {
"System: Linux kernel": [
[
7,
19
]
],
"Organization: Dell": [
[
697,
701
]
],
"Vulnerability: NULL pointer dereference": [
[
80,
104
],
[
355,
379
]
]
} | {
"source": "nvd_v2",
"cve_id": "CVE-2023-54291"
} |
Typhon is an info stealer first that was reported in mid-2022 for the first time. | {
"Malware: Typhon": [
[
0,
6
]
],
"Malware: stealer": [
[
18,
25
]
]
} | {
"id": "cyner2_train_001410",
"source": "cyner2_train"
} |
A backdoor also known as: Trojan.Win32.VBKrypt!O Worm.Rebhip.B3 Troj.W32.Scar!c Trojan/Injector.eyu Trojan.Win32.Scar.odxb Trojan.Win32.VBKrypt.ecjqdh Trojan.Win32.A.VBKrypt.200710 TrojWare.Win32.VBKrypt.cjb Trojan.Inject.27856 Trojan.VBKrypt.Win32.39868 BehavesLike.Win32.PWSSpyeye.cc W32/Trojan.FNVH-2986 Trojan/VBKryp... | {
"Malware: backdoor": [
[
2,
10
]
],
"Indicator: BehavesLike.Win32.PWSSpyeye.cc": [
[
255,
285
]
]
} | {
"id": "cyner2_train_001497",
"source": "cyner2_train"
} |
The investigation found a supply chain-focused attack at M.E.Doc software that delivered a destructive payload disguised as ransomware. | {
"Malware: at": [
[
54,
56
]
],
"Malware: M.E.Doc software": [
[
57,
73
]
],
"Malware: payload": [
[
103,
110
]
],
"Malware: ransomware.": [
[
124,
135
]
]
} | {
"id": "cyner2_train_002172",
"source": "cyner2_train"
} |
Arcspan Cybersecurity NER Dataset
A multi-source cybersecurity named entity recognition dataset in OPF (OpenAI Privacy Filter) JSONL format, covering 5 entity classes across threat intelligence reports, CVE descriptions, MITRE ATT&CK entries, APT reports, and more.
Built as the training and evaluation corpus for the Arcspan project — fine-tuning OpenAI's sparse MoE Privacy Filter for cybersecurity IOC extraction.
Dataset Summary
| Split | File | Records | Spans | Purpose |
|---|---|---|---|---|
| R9 Train | r9_5class_train.jsonl |
24,518 | 63,457 | Main training set (latest, leakage-clean) |
| R9 Valid | r9_5class_valid.jsonl |
2,821 | 5,681 | Validation set |
| R8 Train | r8_5class_train.jsonl |
26,079 | 76,824 | Previous training set |
| R8 Valid | r8_5class_valid.jsonl |
2,821 | 5,681 | R8 validation set |
| APTNER Test | aptner_5class_test_clean.jsonl |
172 | 340 | Independent benchmark (APT reports) |
| CyNER Test | cyner_test.jsonl |
748 | 892 | CyNER benchmark test set |
| SecureBERT2 Test | securebert2_5class_test.jsonl |
200 | 283 | SecureBERT2 benchmark test set |
| Enriched Test | enriched_5class_test.jsonl |
3,853 | 5,512 | Held-out enriched evaluation set |
Label Space
5-class cybersecurity NER schema:
| Label | Description | R9 Train Count |
|---|---|---|
Indicator |
IOCs — IPs, domains, URLs, file hashes, file paths, registry keys, email addresses | 16,265 |
Malware |
Malware families, ransomware, trojans, backdoors, botnets, campaigns | 15,585 |
Organization |
Threat actors, APT groups, vendors, affected organizations | 13,546 |
System |
Operating systems, software, platforms, infrastructure components | 11,947 |
Vulnerability |
CVEs, exploit names, vulnerability descriptions | 6,114 |
Data Format
All files are JSONL in OPF (OpenAI Privacy Filter) format. Each line is a JSON object:
{
"text": "APT29 deployed Cobalt Strike via CVE-2021-44228 against Exchange servers.",
"spans": {
"Organization: APT29": [[0, 5]],
"Malware: Cobalt Strike": [[16, 28]],
"Vulnerability: CVE-2021-44228": [[33, 47]],
"System: Exchange": [[56, 64]]
},
"info": {
"id": "apt_reports_00042",
"source": "apt_reports"
}
}
Span key format: "Label: surface_text" → [[start_char, end_char], ...]
Offsets are character-level, zero-indexed, half-open [start, end).
Training Data Sources (R9)
The R9 training set aggregates 22 sources, deduplicated and leakage-cleaned:
| Source | Records | Description |
|---|---|---|
cyner2_train |
4,563 | CyNER v2 training split |
cyberner_stix_train |
3,723 | CyberNER harmonized (STIX-mapped) |
dnrti_train |
2,834 | DNRTI dataset training split |
aptner_train |
2,584 | APTNER training split |
apt_reports |
2,263 | APT reports (LLM-annotated) |
nvd_v2 |
1,995 | NVD CVE descriptions v2 (LLM-annotated) |
mitre_attack_v2 |
1,485 | MITRE ATT&CK v2 (LLM-annotated) |
synthetic_v2 |
1,292 | Synthetically generated IOC examples v2 |
cyberner |
1,204 | CyberNER base |
cyner_train |
717 | Original CyNER training split |
defanged_augment |
652 | Defanged IOC augmentation (e.g. 192[.]168[.]1[.]1) |
exploitdb |
500 | ExploitDB entries (LLM-annotated) |
nvd_cve |
338 | NVD CVE descriptions (original) |
synthetic_ioc |
92 | Synthetically generated IOC examples v1 |
vendor_blogs |
61 | Security vendor blog posts (LLM-annotated) |
security_news |
45 | Security news articles (LLM-annotated) |
cisa_advisories |
39 | CISA advisories (LLM-annotated) |
mitre_attack |
39 | MITRE ATT&CK (original) |
alienvault_otx |
37 | AlienVault OTX pulses (LLM-annotated) |
securebert2_train |
22 | SecureBERT2 training split |
malware_reports |
21 | Malware analysis reports (LLM-annotated) |
dnrti_valid |
12 | DNRTI validation (included in train) |
Leakage Audit (R9)
Zero overlap between training data and all held-out evaluation sets:
| Held-out Set | Records | Exact Overlap | Prefix-80 Overlap |
|---|---|---|---|
| R9 Validation | 2,821 | 0 | 0 |
| Enriched Test | 3,853 | 0 | 0 |
| CyNER Test | 748 | 0 | 0 |
| SecureBERT2 Test | 200 | 0 | 0 |
| APTNER Test | 172 | 0 | 0 |
Internal duplicates: 0 exact, 0 prefix-80.
Benchmark Evaluation Results
Evaluated using the Arcspan R8 checkpoint with strict exact-match scoring (seqeval-style):
APTNER (Independent benchmark — APT report style)
| Class | F1 | Precision | Recall | Support |
|---|---|---|---|---|
| Malware | 0.707 | 0.793 | 0.637 | 102 |
| Indicator | 0.667 | 0.661 | 0.673 | 55 |
| Vulnerability | 0.500 | 0.429 | 0.600 | 5 |
| Organization | 0.326 | 0.500 | 0.242 | 91 |
| System | 0.160 | 0.615 | 0.092 | 87 |
| Micro avg | 0.498 | 0.668 | 0.397 | 340 |
CyNER Test
| Class | F1 | Precision | Recall | Support |
|---|---|---|---|---|
| Malware | 0.577 | 0.585 | 0.570 | 242 |
| System | 0.399 | 0.412 | 0.387 | 248 |
| Vulnerability | 0.375 | 0.500 | 0.300 | 10 |
| Organization | 0.316 | 0.288 | 0.351 | 131 |
| Indicator | 0.250 | 0.518 | 0.165 | 261 |
| Micro avg | 0.405 | 0.454 | 0.365 | 892 |
Usage
Loading with Hugging Face datasets
from datasets import load_dataset
ds = load_dataset("chairulridjal/arcspan-cyber-ner")
# Splits: r9_train, r9_valid, aptner_test, cyner_test, securebert2_test, enriched_test
Loading manually
import json
with open("r9_5class_train.jsonl") as f:
examples = [json.loads(line) for line in f]
# Access spans
for ex in examples[:3]:
print(ex["text"][:80])
for key, offsets in ex["spans"].items():
label, surface = key.split(": ", 1)
for start, end in offsets:
print(f" [{label}] {ex['text'][start:end]!r} @ {start}:{end}")
Using with OpenAI Privacy Filter / Arcspan
# Evaluate directly with opf
opf eval r9_5class_train.jsonl \
--checkpoint chairulridjal/arcspan \
--device cpu
Related Resources
- Model: chairulridjal/arcspan — Fine-tuned cybersecurity NER model
- Base model: openai/privacy-filter — OpenAI's sparse MoE Privacy Filter
- Source datasets: CyNER, APTNER, DNRTI, CyberNER, MITRE ATT&CK, NVD, ExploitDB
License
Apache 2.0. Note that individual source datasets may carry their own licenses — see the original dataset repositories for details. LLM-annotated portions were generated from publicly available text.
- Downloads last month
- 36