id
int64
1
978
title
stringlengths
1
120
start_line
int64
59
237k
end_line
int64
132
237k
lines
int64
30
3.31k
path
stringlengths
27
27
text
stringlengths
577
300k
1
Sofacy Group’s Parallel Attacks .
59
132
74
data/reports_final/0001.txt
Sofacy Group’s Parallel Attacks . The Sofacy group remains a persistent global threat . Unit 42 and others have shown in the first half of 2018 how this threat actor group continues to target multiple organizations throughout the world with a strong emphasis on government , diplomatic and other strategic organizations ...
2
Sofacy Uses DealersChoice to Target European Government Agency .
133
193
61
data/reports_final/0002.txt
Sofacy Uses DealersChoice to Target European Government Agency . Back in October 2016 , Unit 42 published an initial analysis on a Flash exploitation framework used by the Sofacy threat group called DealersChoice . The attack consisted of Microsoft Word delivery documents that contained Adobe Flash objects capable of l...
3
Corporate IoT – a path to intrusion .
194
285
92
data/reports_final/0003.txt
Corporate IoT – a path to intrusion . Several sources estimate that by the year 2020 some 50 billion IoT devices will be deployed worldwide . IoT devices are purposefully designed to connect to a network and many are simply connected to the internet with little management or oversight . Such devices still must be ident...
4
Sofacy Attacks Multiple Government Entities .
286
384
99
data/reports_final/0004.txt
Sofacy Attacks Multiple Government Entities . Release_Time : 2018-02-28Report_URL : https://unit42.paloaltonetworks.com/unit42-sofacy-attacks-multiple-government-entities/The Sofacy group ( AKA APT28 , Fancy Bear , STRONTIUM , Sednit , Tsar Team , Pawn Storm ) is a well-known adversary that remains highly active in the...
5
Sofacy Continues Global Attacks and Wheels Out New Cannon Trojan .
385
471
87
data/reports_final/0005.txt
Sofacy Continues Global Attacks and Wheels Out New Cannon Trojan . Release_Time : 2018-11-20Report_URL : https://unit42.paloaltonetworks.com/unit42-sofacy-continues-global-attacks-wheels-new-cannon-trojan/In late October and early November 2018 , Unit 42 intercepted a series of weaponized documents that use a technique...
6
THE DUKES 7 YEARS OF RUSSIAN CYBERESPIONAGE .
472
638
167
data/reports_final/0006.txt
THE DUKES 7 YEARS OF RUSSIAN CYBERESPIONAGE . The Dukes are a well-resourced , highly dedicated and organized cyberespionage group that we believe has been working for the Russian Federation since at least 2008 to collect intelligence in support of foreign and security policy decision-making . The Dukes primarily targe...
7
2015 : The Dukes up the ante .
664
704
41
data/reports_final/0007.txt
2015 : The Dukes up the ante . The end of January 2015 saw the start of the most high- volume Duke campaign seen thus far , with thousands of recipients being sent spear-phishing emails that contained links to compromised websites hosting CozyDuke . Curiously , the spear-phishing emails were strikingly similar to the ...
8
2015 : Continuing surgical strikes with CosmicDuke .
705
754
50
data/reports_final/0008.txt
2015 : Continuing surgical strikes with CosmicDuke . In addition to the notably overt and large-scale campaigns with CozyDuke and CloudDuke , the Dukes also continued to engage in more covert , surgical campaigns using CosmicDuke . The latest of these campaigns that we are aware of occurred during the spring and early...
9
Malware Testing Environment Tied to TEMP.Veles .
772
853
82
data/reports_final/0009.txt
Malware Testing Environment Tied to TEMP.Veles . We identified a malware testing environment that we assess with high confidence was used to refine some TEMP.Veles tools . At times , the use of this malware testing environment correlates to in-network activities of TEMP.Veles , demonstrating direct operational support ...
10
Threat Group 3390 Cyberespionage .
854
976
123
data/reports_final/0010.txt
Threat Group 3390 Cyberespionage . Dell SecureWorks Counter Threat Unit (TM ) ( CTU ) researchers investigated activities associated with Threat Group-3390 ( TG-3390 ) . Analysis of TG-3390 's operations , targeting , and tools led CTU researchers to assess with moderate confidence the group is located in the People's ...
11
APT Targets Financial Analysts with CVE-2017-0199 .
977
1,016
40
data/reports_final/0011.txt
APT Targets Financial Analysts with CVE-2017-0199 . On April 20 , Proofpoint observed a targeted campaign focused on financial analysts working at top global financial firms operating in Russia and neighboring countries . These analysts were linked by their coverage of the telecommunications industry , making this targ...
12
Suckfly : Revealing the secret life of your code signing certificates .
1,017
1,160
144
data/reports_final/0012.txt
Suckfly : Revealing the secret life of your code signing certificates . Release_Time : 2016-03-15 Report_URL : https://community.broadcom.com/symantecenterprise/communities/community-home/librarydocuments/viewdocument?DocumentKey=62e325ae-f551-4855-b9cf-28a7d52d1534&CommunityKey=1ecf5f55-9545-44d6-b0f4-4e4a7f5f5e68&tab...
13
THE DUKES 7 YEARS OF RUSSIAN CYBERESPIONAGE .
1,161
1,258
98
data/reports_final/0013.txt
THE DUKES 7 YEARS OF RUSSIAN CYBERESPIONAGE . TOOLS AND TECHNIQUES OF THE DUKES . PINCHDUKE : First known activity November 2008 , Most recent known activity Summer 2010 , C&C communication methods HTTP(S) , Known toolset components Multiple loaders , Information stealer . The PinchDuke toolset consists of multiple loa...
14
THE DUKES 7 YEARS OF RUSSIAN CYBER ESPIONAGE .
1,259
1,388
130
data/reports_final/0014.txt
THE DUKES 7 YEARS OF RUSSIAN CYBER ESPIONAGE . The Dukes primarily use spear-phishing emails when attempting to infect victims with their malware . These spear-phishing emails range from ones purposely designed to look like spam messages used to spread common crimeware and addressed to large numbers of people , to high...
15
A XENOTIME to Remember : Veles in the Wild .
1,389
1,428
40
data/reports_final/0015.txt
A XENOTIME to Remember : Veles in the Wild . Release_Time : 2019-12-04Report_URL : https://pylos.co/2019/04/12/a-xenotime-to-remember-veles-in-the-wild/“ When I use a word , ” Humpty Dumpty said , in rather a scornful tone , “ it means just what I choose it to mean—neither more nor less. ” – Through the Looking Glass ,...
16
ASPXTool — A modified version of the ASPXSpy web shell .
1,448
1,637
190
data/reports_final/0016.txt
ASPXTool — A modified version of the ASPXSpy web shell . It is deployed to internally accessible servers running Internet Information Services ( IIS ) . TG-3390 actors have also used the following publicly available tools :Windows Credential Editor ( WCE ) — obtains passwords from memory . gsecdump — obtains passwords...
17
It constructs this list using the WMI query : “SELECT displayName FROM AntivirusProduct ” .
1,638
1,713
76
data/reports_final/0017.txt
It constructs this list using the WMI query : “SELECT displayName FROM AntivirusProduct ” . Downeks achieves host persistence through either the registry “ run ” key or with a shortcut in the start-up folder . In another similarity between both variants , Dowenks assesses the victim ’s external IP using an HTTP request...
18
The Curious Case of Notepad and Chthonic : Exposing a Malicious Infrastructure .
1,714
1,822
109
data/reports_final/0018.txt
The Curious Case of Notepad and Chthonic : Exposing a Malicious Infrastructure . Recently , I ’ve been investigating malware utilizing PowerShell and have spent a considerable amount of time refining ways to identify new variants of attacks as they appear . This posting is a follow-up of my previous work on this subjec...
19
File Detail : Info File name : job_titles_itworx.doc .
1,845
1,977
133
data/reports_final/0019.txt
File Detail : Info File name : job_titles_itworx.doc . MD5 : 43fad2d62bc23ffdc6d301571135222c . SHA256 : e5b643cb6ec30d0d0b458e3f2800609f260a5f15c4ac66faf4ebf384f7976df6 . Hosting URL : http://briefl.ink/qhtma . Passive DNS results on a communications domain associated with the Shamoon attack revealed related network i...
20
These vulnerabilities include :CVE-2015-6585 : Hangul Word Processor Vulnerability .
1,978
2,067
90
data/reports_final/0020.txt
These vulnerabilities include :CVE-2015-6585 : Hangul Word Processor Vulnerability . CVE-2015-8651 : Adobe Flash Player 18.0.0.324 and 19.x Vulnerability . CVE-2016-0034 : Microsoft Silverlight 5.1.41212.0 Vulnerability . CVE-2016-1019 : Adobe Flash Player 21.0.0.197 Vulnerability . CVE-2016-4117 : Adobe Flash Player 2...
21
Phantom of the Opaera :New KASPERAGENT Malware Campaign .
2,068
2,135
68
data/reports_final/0021.txt
Phantom of the Opaera :New KASPERAGENT Malware Campaign . ThreatConnect has identified a KASPERAGENT malware campaign leveraging decoy Palestinian Authority documents . The samples date from April – May 2017 , coinciding with the run up to the May 2017 Palestinian Authority elections . Although we do not know who is be...
22
APT28 : New Espionage Operations Target Military and Government Organizations .
2,136
2,211
76
data/reports_final/0022.txt
APT28 : New Espionage Operations Target Military and Government Organizations . Recent campaigns see APT28 group return to covert intelligence gathering operations in Europe and South America . After making headlines during 2016 due to its involvement in cyber attacks against an organization involved in the U.S. presid...
23
System : Presence of the following artifacts .
2,212
2,263
52
data/reports_final/0023.txt
System : Presence of the following artifacts . Persistence mechanism Registry Key :Key : HKCU\Software\Microsoft\Windows\CurrentVersion\Run\AudioMgr Key : HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\GoogleIndexer . On disk artefacts File with the full path : %AppData%\Video\videodrv.exe File with the full path :...
24
APT28 : AT THE CENTER OF THE STORM .
2,264
2,333
70
data/reports_final/0024.txt
APT28 : AT THE CENTER OF THE STORM . The Democratic National Committee ’s ( DNC ) June 2016 announcement attributing its network breach to the Russian Government triggered an international debate over Russia ’s sponsorship of information operations against the U.S.Our visibility into the operations of APT28 - a group w...
25
Threat Group 4127 Targets Hillary Clinton Presidential Campaign .
2,334
2,501
168
data/reports_final/0025.txt
Threat Group 4127 Targets Hillary Clinton Presidential Campaign . The Hillary Clinton email leak was the center of the latest scandal in the news caused by Threat Group-4127 ( TG-4127 ) . SecureWorks Counter Threat Unit ( CTU ) researchers track the activities of Threat Group-4127 , which targets governments , military...
26
Bears in the Midst : Intrusion Into the Democratic National Committee .
2,520
2,569
50
data/reports_final/0026.txt
Bears in the Midst : Intrusion Into the Democratic National Committee . There is rarely a dull day at CrowdStrike where we are not detecting or responding to a breach at a company somewhere around the globe . In all of these cases , we operate under strict confidentiality rules with our customers and cannot reveal publ...
27
BRONZE PRESIDENT Targets NGOs .
2,598
2,635
38
data/reports_final/0027.txt
BRONZE PRESIDENT Targets NGOs . The activities of some non-governmental organizations ( NGOs ) challenge governments on politically sensitive issues such as social , humanitarian , and environmental policies . As a result , these organizations are often exposed to increased government-directed threats aimed at monitori...
28
AdFind — This command-line tool conducts AD queries .
2,661
2,713
53
data/reports_final/0028.txt
AdFind — This command-line tool conducts AD queries . NetSess — This publicly available tool enumerates NetBIOS sessions . Netview — This tool enumerates networks . TeamViewer — This remote control and desktop-sharing tool has applications for legitimate and malicious system users . Its installation in a temporary dire...
29
PlugX C2 server : ipsoftwarelabs.com .
2,714
3,035
322
data/reports_final/0029.txt
PlugX C2 server : ipsoftwarelabs.com . RCSession C2 server : toshibadrive.com . ORat and Cobalt Strike C2 server : strust.club . Cobalt Strike C2 server : svchosts.com , svrhosts.com . Cobalt Strike download location : 116.93.154.250 . ORat malware sample : a0758535cf8eb689782b95d3791d23d5 , 774a9c3ff01a3e734b7bec0c312...
30
Backdoor.SH.SHELLBOT.AA : b68bd3a54622792200b931ee5eebf860acf8b24f4b338b5080193573a81c747d .
3,036
3,091
56
data/reports_final/0030.txt
Backdoor.SH.SHELLBOT.AA : b68bd3a54622792200b931ee5eebf860acf8b24f4b338b5080193573a81c747d . Trojan.Linux.SSHBRUTE.B : 620635aa9685249c87ead1bb0ad25b096714a0073cfd38a615c5eb63c3761976 . Coinminer.Linux.MALXMR.SMDSL32 : fc57bd66c27066104cd6f8962cd463a5dfc05fa59b76b6958cddd3542dfe6a9a . Coinminer.Linux.MALXMR.SMDSL64 : 6...
31
Digital Attack on German Parliament: Investigative Report on the Hack of the Left Party Infrastructure in Bundestag .
3,092
3,154
63
data/reports_final/0031.txt
Digital Attack on German Parliament: Investigative Report on the Hack of the Left Party Infrastructure in Bundestag . Two suspicious artifacts have been retrieved from two separate servers within the Die Linke infrastructure . One is an open source utility used to remotely issue commands on a Windows host from a Linux ...
32
A Slice of 2017 Sofacy Activity .
3,155
3,248
94
data/reports_final/0032.txt
A Slice of 2017 Sofacy Activity . Sofacy , also known as APT28 , Fancy Bear , and Tsar Team , is a highly active and prolific APT . From their high volume 0day deployment to their innovative and broad malware set , Sofacy is one of the top groups that we monitor , report , and protect against . 2017 was not any differ...
33
The TXT record returned contained data: E0000>0 .
3,249
3,461
213
data/reports_final/0033.txt
The TXT record returned contained data: E0000>0 . The controller issued the command to write the base64-decoded and modified data to the file name set earlier in the exchange . After the file is written, the malware moves on to process operations . Glimpse can be set to use ping mode in several ways while performing re...
34
AutoIt backdoor : A custom built backdoor written in the AutoIt scripting language .
3,487
3,531
45
data/reports_final/0034.txt
AutoIt backdoor : A custom built backdoor written in the AutoIt scripting language . In addition to its custom malware , Elfin has also used a number of commodity malware tools , available for purchase on the cyber underground . These include :Remcos ( Backdoor.Remvio ) : A commodity remote administration tool ( RAT ) ...
35
APT33 : 192.119.15.35 [REDACTED].ddns.net .
3,592
3,633
42
data/reports_final/0035.txt
APT33 : 192.119.15.35 [REDACTED].ddns.net . APT33 : 192.119.15.36 [REDACTED].ddns.net . APT33 : 192.119.15.37 mynetwork.ddns.net . APT33 : 192.119.15.38 [REDACTED].ddns.net . APT33 : 192.119.15.39 remote-server.ddns.net . APT33 : 192.119.15.40 [REDACTED].ddns.net . APT33 : 192.119.15.41 mynetwork.cf . APT33 : 192.119.1...
36
Winnti : gxxservice.com 2018-08-14 13:53:41 None or unknown .
3,634
3,680
47
data/reports_final/0036.txt
Winnti : gxxservice.com 2018-08-14 13:53:41 None or unknown . Winnti : infestexe.com 2018-11-07 08:46:44 https://www.facebook.com/infest.in.th . Winnti : bugcheck.xigncodeservice.com 167.99.106.49 , 178.128.180.206 DigitalOcean . Winnti : dump.gxxservice.com 142.93.204.230 DigitalOcean . Winnti : nw.infestexe.com 138.6...
37
Winnti : 4256fa6f6a39add6a1fa10ef1497a74088f12be0 2018-07-25 10:13:41 None .
3,691
3,805
115
data/reports_final/0037.txt
Winnti : 4256fa6f6a39add6a1fa10ef1497a74088f12be0 2018-07-25 10:13:41 None . Winnti : bb4ab0d8d05a3404f1f53f152ebd79f4ba4d4d81 2018-10-10 09:57:31 http://checkin.travelsanignacio.com . Winnti : T1195 Supply Chain Compromise . Winnti : T1050 New Service . Winnti : T1022 Data Encrypted . Winnti : T1079 Multilayer Encrypt...
38
Operation ShadowHammer .
3,834
3,863
30
data/reports_final/0038.txt
Operation ShadowHammer . Earlier today , Motherboard published a story by Kim Zetter on Operation ShadowHammer , a newly discovered supply chain attack that leveraged ASUS Live Update software . While the investigation is still in progress and full results and technical paper will be published during SAS 2019 conferenc...
39
Derusbi : Compile Date and Time : 2012-09-14 09:20:12 AM .
3,919
3,948
30
data/reports_final/0039.txt
Derusbi : Compile Date and Time : 2012-09-14 09:20:12 AM . Derusbi : File Type :P E32 executable ( DLL ) Intel 80386, for MS Windows . Derusbi : File Name : 32.dll . Derusbi is abelieved to be used among a small group of attackers , which includes the Rancor group . This particular sample is a loader that loads an encr...
40
Brief Description : SFX Archive Second Stage .
3,991
4,021
31
data/reports_final/0040.txt
Brief Description : SFX Archive Second Stage . Ssdeep : 24576:vmoO8itbaZiW+qJnmCcpv5lKbbJAiUqKXM : OoZwxVvfoaPu . Exploring it , it is possible to see several files inside of it ,  as well as the 6323 file . In this case , the SFX archive contains 8 files : five of them are legit DLLs used by the “ 6323 ” executable to int...
41
JhoneRAT : Cloud based python RAT targeting Middle Eastern countries .
4,022
4,110
89
data/reports_final/0041.txt
JhoneRAT : Cloud based python RAT targeting Middle Eastern countries . Today , Cisco Talos is unveiling the details of a new RAT we have identified we 're calling " JhoneRAT " . This new RAT is dropped to the victims via malicious MicrosoftThe dropper , along with the Python, attempts to gather information on the victi...
42
ImportError : Unknown magic number 227 in final2 .
4,111
4,288
178
data/reports_final/0042.txt
ImportError : Unknown magic number 227 in final2 . Additionally , the generated code by uncompyle6 varies depending on the version and the impact is important . Based on our analysis and the behaviour of the executed malware , the correct interpretation is the first one based on the oldest version of uncompyle6 . For t...
43
Winnti Group targeting universities in Hong Kong .
4,301
4,538
238
data/reports_final/0043.txt
Winnti Group targeting universities in Hong Kong . In November 2019 , we discovered a new campaign run by the Winnti Group against two Hong Kong universities . We found a new variant of the ShadowPad backdoor , the group ’s flagship backdoor , deployed using a new launcher and embedding numerous modules . The Winnti ma...
44
ZXNC Run ZXNC v1.1 – a simple telnet client .
4,539
4,578
40
data/reports_final/0044.txt
ZXNC Run ZXNC v1.1 – a simple telnet client . ZXHttpProxy Run a HTTP proxy server on the workstation . ZXSockProxy Run a Sock 4 & 5 Proxy server . ZXHttpServer Run a custom HTTP server . PortScan Run TCP Port MultiScanner v1.0 . KeyLog Capture or record the remote computer ’s keystrokes . The implementation is a userla...
45
0x44444444 : Unhook the ZwWriteFile API and hook KiFastCallEntry .
4,579
4,973
395
data/reports_final/0045.txt
0x44444444 : Unhook the ZwWriteFile API and hook KiFastCallEntry . 0x55555555 : Remove the ZxShell Image Load Notify routine . 0x88888888 : Set a special value called “ type ” in Windows registry key HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\DriverMain . The second Loveusd system thread does a lot of things . I...
46
The IXESHE attackers also used an exploit that affected Microsoft Excel — CVE-2009-3129 .
4,974
5,196
223
data/reports_final/0046.txt
The IXESHE attackers also used an exploit that affected Microsoft Excel — CVE-2009-3129 . Every IXESHE case we examined revealed that the original infection vector was a targeted email with a PDF exploit as attachment . Older versions also used an XLS exploit . Opening the .PDF file drops and executes a malware in a vi...
47
FIN7.5 : the infamous cybercrime rig FIN7 continues its activities .
5,221
5,283
63
data/reports_final/0047.txt
FIN7.5 : the infamous cybercrime rig FIN7 continues its activities . On August 1, 2018 , the US Department of Justice announced that it had arrested several individuals suspected of having ties to the FIN7 cybercrime rig . FIN7 operations are linked to numerous intrusion attempts having targeted hundreds of companies s...
48
The macros popped the same “ Document decryption error ” error message—even if macro code remain totally different .
5,284
5,353
70
data/reports_final/0048.txt
The macros popped the same “ Document decryption error ” error message—even if macro code remain totally different . We have a high level of confidence in a historic association between FIN7 and Cobalt , even though we believe that these two clusters of activity are operated by different teams . AveMaria is a new botne...
49
ScarCruft tools : 02681a7fe708f39beb7b3cf1bd557ee9 Bluetooth info harvester .
5,375
5,423
49
data/reports_final/0049.txt
ScarCruft tools : 02681a7fe708f39beb7b3cf1bd557ee9 Bluetooth info harvester . ScarCruft tools : C781f5fad9b47232b3606e4d374900cd Installer . ScarCruft tools : 032ed0cd234f73865d55103bf4ceaa22 Downloader . ScarCruft tools : 22aaf617a86e026424edb7c868742495 AV Remover . ScarCruft tools : 07d2200f5c2d03845adb5b20841faa94 ...
50
Winnti : More than just Windows and Gates .
5,424
5,492
69
data/reports_final/0050.txt
Winnti : More than just Windows and Gates . The Winnti malware family was first reported in 2013 by Kaspersky Lab . Since then , threat actors leveraging Winnti malware have victimized a diverse set of targets forvaried motivations . While the name ‘ Winnti ’ in public reporting was previously used tosignify a single a...
51
Leafminer : Raspite .
5,534
5,587
54
data/reports_final/0051.txt
Leafminer : Raspite . Leafminer is an Iranian threat group that has targeted government organizations and business entities in the Middle East since at least early 2017 . Elderwood : Elderwood Gang , Beijing Group , Sneaky Panda . Elderwood is a suspected Chinese cyber espionage group that was reportedly responsible fo...
52
Tick Group Continues Attacks .
5,619
5,686
68
data/reports_final/0052.txt
Tick Group Continues Attacks . The " Tick " group has conducted cyber espionage attacks against organizations in the Republic of Korea and Japan for several years . The group focuses on companies that have intellectual property or sensitive information like those in the Defense and High-Tech industries . The group is k...
53
Gh0stRAt Downloader : ce47e7827da145823a6f2b755975d1d2f5eda045b4c542c9b9d05544f3a9b974 .
5,687
5,734
48
data/reports_final/0053.txt
Gh0stRAt Downloader : ce47e7827da145823a6f2b755975d1d2f5eda045b4c542c9b9d05544f3a9b974 . Gh0stRAt Downloader : e34f4a9c598ad3bb243cb39969fb9509427ff9c08e63e8811ad26b72af046f0c . Custom Gh0st : 8e5a0a5f733f62712b840e7f5051a2bd68508ea207e582a190c8947a06e26f40 . Datper : 7d70d659c421b50604ce3e0a1bf423ab7e54b9df361360933ba...
54
APT39 : Chafer .
5,735
5,769
35
data/reports_final/0054.txt
APT39 : Chafer . Iranian cyber espionage group that has been active since at least 2014 . They have targeted the telecommunication and travel industries to collect personal information that aligns with Iran 's national priorities . APT41 is a group that carries out Chinese state-sponsored espionage activity in addition...
55
FIN6 : ITG08 .
5,791
6,410
620
data/reports_final/0055.txt
FIN6 : ITG08 . FIN6 is a cyber crime group that has stolen payment card data and sold it for profit on underground marketplaces . This group has aggressively targeted and compromised point of sale ( PoS ) systems in the hospitality and retail sectors . Leviathan : TEMP.Jumper , APT40 , TEMP.Periscope . Leviathan is a c...
56
KONNI : A Malware Under The Radar For Years .
6,411
6,524
114
data/reports_final/0056.txt
KONNI : A Malware Under The Radar For Years . Talos has discovered an unknown Remote Administration Tool that we believe has been in use for over 3 years . During this time it has managed to avoid scrutiny by the security community . The current version of the malware allows the operator to steal files , keystrokes , p...
57
Filename: Pyongyang Directory Group email April 2017.RC_Office_Coordination_Associate.scr .
6,525
6,624
100
data/reports_final/0057.txt
Filename: Pyongyang Directory Group email April 2017.RC_Office_Coordination_Associate.scr . SHA256 : 4585584fe7e14838858b24c18a792b105d18f87d2711c060f09e62d89fc3085b . Filename: adobe distillist.lnk . SHA256 : 39bc918f0080603ac80fe1ec2edfd3099a88dc04322106735bc08188838b2635 . Filename: winload.exe . SHA256 : dd730cc8fc...
58
Symantec identified two strains of custom malware used by the Leafminer group : Trojan.Imecab and Backdoor.Sorgu .
6,625
8,151
1,527
data/reports_final/0058.txt
Symantec identified two strains of custom malware used by the Leafminer group : Trojan.Imecab and Backdoor.Sorgu . Leafminer is a highly active group , responsible for targeting a range of organizations across the Middle East . Leafminer appears to be based in Iran and seems to be eager to learn from and capitalize on ...
59
Chapter 7 explains the working of Mofang 's preferred tools : ShimRat and SimRatReporter .
8,152
8,308
157
data/reports_final/0059.txt
Chapter 7 explains the working of Mofang 's preferred tools : ShimRat and SimRatReporter . The Mofang group has been active in relation to the Kyaukphyu sez . KeyBoy provides basic backdoor functionality , allowing the operators to select from various capabilities used to surveil and steal information from the victim m...
60
We also discovered an interesting piece of rare malware created by this threat actor – a Bluetooth device harvester .
8,309
9,749
1,441
data/reports_final/0060.txt
We also discovered an interesting piece of rare malware created by this threat actor – a Bluetooth device harvester . We believe they may have some links to North Korea , which may explain why ScarCruft decided to closely monitor them . ScarCruft also attacked a diplomatic agency in Hong Kong , and another diplomatic a...
61
We also discovered an interesting piece of rare malware created by this threat actor – a Bluetooth device harvester .
9,750
10,472
723
data/reports_final/0061.txt
We also discovered an interesting piece of rare malware created by this threat actor – a Bluetooth device harvester . For example , Bisonal malware in 2012 used send() and recv() APIs to communicate with its C2. This Bisonal variant used in the latest attack communicates with one of the following hard-coded C2 addresse...
62
OSX Malware Linked to Operation Emmental Hijacks User Network Traffic .
10,473
11,364
892
data/reports_final/0062.txt
OSX Malware Linked to Operation Emmental Hijacks User Network Traffic . The OSX_DOK malware ( Detected by Trend Micro as OSX_DOK.C ) showcases sophisticated features such as certificate abuse and security software evasion that affects machines using Apple ’s OS X operating system . This malware , which specifically tar...
63
Symantec identified two strains of custom malware used by the Leafminer group : Trojan.Imecab and Backdoor.Sorgu .
11,365
12,894
1,530
data/reports_final/0063.txt
Symantec identified two strains of custom malware used by the Leafminer group : Trojan.Imecab and Backdoor.Sorgu . Leafminer is a highly active group , responsible for targeting a range of organizations across the Middle East . Leafminer appears to be based in Iran and seems to be eager to learn from and capitalize on ...
64
Chapter 7 explains the working of Mofang 's preferred tools : ShimRat and SimRatReporter .
12,895
13,051
157
data/reports_final/0064.txt
Chapter 7 explains the working of Mofang 's preferred tools : ShimRat and SimRatReporter . The Mofang group has been active in relation to the Kyaukphyu sez . KeyBoy provides basic backdoor functionality , allowing the operators to select from various capabilities used to surveil and steal information from the victim m...
65
We also discovered an interesting piece of rare malware created by this threat actor – a Bluetooth device harvester .
13,052
13,619
568
data/reports_final/0065.txt
We also discovered an interesting piece of rare malware created by this threat actor – a Bluetooth device harvester . We believe they may have some links to North Korea , which may explain why ScarCruft decided to closely monitor them . ScarCruft also attacked a diplomatic agency in Hong Kong , and another diplomatic a...
66
We found two malicious iOS applications in Operation Pawn Storm .
13,620
14,492
873
data/reports_final/0066.txt
We found two malicious iOS applications in Operation Pawn Storm . One is called XAgent detected as IOS_XAGENT.A and the other one uses the name of a legitimate iOS game , MadCap detected as IOS_ XAGENT.B . The obvious goal of the SEDNIT-related spyware is to steal personal data , record audio , make screenshots , and s...
67
We also discovered an interesting piece of rare malware created by this threat actor – a Bluetooth device harvester .
14,493
16,264
1,772
data/reports_final/0067.txt
We also discovered an interesting piece of rare malware created by this threat actor – a Bluetooth device harvester . For example , Bisonal malware in 2012 used send() and recv() APIs to communicate with its C2 This Bisonal variant used in the latest attack communicates with one of the following hard-coded C2 addresses...
68
360 Helios Team captured the first Trojan of the Poison Ivy Group in December 2007 .
16,265
17,324
1,060
data/reports_final/0068.txt
360 Helios Team captured the first Trojan of the Poison Ivy Group in December 2007 . Through research , 360 Helios Team has found that , since 2007 , the Poison Ivy Group has carried out 11 years of cyber espionage campaigns against Chinese key units and departments , such as national defense , government , science and...
69
We listed some of these along with their functionality below: LZ77: Used to compress and decompress files.
17,325
17,461
137
data/reports_final/0069.txt
We listed some of these along with their functionality below: LZ77: Used to compress and decompress files. UPXShell: Commonly used to pack malware in order to make it more difficult for analysts to reverse-engineer. DebugView: A Microsoft Sysinternals tool that allows you to monitor debug outputs on your local system. ...
70
Network traffic identifiers: Network traffic going to mongolbaatarsonin.
17,462
17,904
443
data/reports_final/0070.txt
Network traffic identifiers: Network traffic going to mongolbaatarsonin. in Network traffic going to withoutcake.com Network traffic going to mongolbaatar.us Network traffic going to getapencil.com User-agent identified as Fantasia Communication with any URL with the sub- URL, /safe/record.php Host-based identifiers: P...
71
Timer 4: Insert time stamps and tags to display screen captures into keylogger logs.
17,905
18,145
241
data/reports_final/0071.txt
Timer 4: Insert time stamps and tags to display screen captures into keylogger logs. Interval: 1 millisecond Timer 4 is responsible for inserting IMG tags inside the keylogger log. It is also responsible for adding the time stamp taken from the CC server (see Miscellaneous section, Timer 7 and 8). Timer 6: Backup keylo...
72
Decoded Gh0st RAT check-in packet.
18,168
18,340
173
data/reports_final/0072.txt
Decoded Gh0st RAT check-in packet. ( Source: Secureworks) The first byte of Figure 3 shows the value 0x66, which is the Gh0st RAT code for login. After sending the initial phone- home request, Gh0st RAT exchanges 22-byte command packets with its command and control (C2) server. Once again, the first five bytes are rand...
73
See the section Attribution.
18,341
18,553
213
data/reports_final/0073.txt
See the section Attribution. 2 Initial infection vector The attackers accessed the internal network of a compromised organization by using an ASPX web shell. They uploaded the web shell by exploiting a vulnerability or, alternately, guessing default credentials for remote access. We managed to obtain live traffic betwe...
74
We found the same dropper-stager but with different payloads: Hussar and FlyingDutchman.
18,554
18,851
298
data/reports_final/0074.txt
We found the same dropper-stager but with different payloads: Hussar and FlyingDutchman. Dropper-stager The main tasks of this dropper are unpacking and mapping the payload, which is encoded and stored in resources. The dropper also stores encoded configuration data and passes it as a parameter to the payload. Figure 2...
75
Stage 1: loader MD5: 43e896ede6fe025ee90f7f27c6d376a4G DATA security solutions detect this as Backdoor.
18,898
18,951
54
data/reports_final/0075.txt
Stage 1: loader MD5: 43e896ede6fe025ee90f7f27c6d376a4G DATA security solutions detect this as Backdoor. TurlaCarbon. A (Engine A) and Win32.Trojan. Cobra. A (Engine B). The first stage is rather small as the number of instructions and actions is rather small. Simply spoken, its purpose is to load the second stage. ...
76
TurlaCarbon.
18,952
19,145
194
data/reports_final/0076.txt
TurlaCarbon. A (Engine A) and Win32.Trojan. Cobra. B (Engine B). Stage 3 is called user by the authors. The internal name of the library is CARBON.dll. The purpose of this stage is to communicate to the outside via web requests. The communication is used to ex-filtrate data and to receive orders (or plugins or code to ...
77
Read Group.
19,146
19,319
174
data/reports_final/0077.txt
Read Group. Read. All Files. Read. All Group. ReadWrite. All The most notable permissions above are the Mail. Read , Files. Read and Member. ReadWrite permissions. These permissions would allow the threat actor to use the Microsoft Staffhub service principal to read all mail and SharePoint/OneDrive files in the org...
78
The Nitro Attacks: Stealing Secrets from the Chemical Industry.
19,320
19,386
67
data/reports_final/0078.txt
The Nitro Attacks: Stealing Secrets from the Chemical Industry. October 2011. 11 GovCERTUK Computer Emergency Response Team. Targeted Email Attack Alert. October 2011. 12 Symantec. Java Zero-Day Used in Targeted Attack Campaign. August 2012. 13 Yichong Lin. IE Zero Day is Used in DoL Watering Hole Attack. May 2013. htt...
79
Mandiant APT1 Report Has Critical Analytic Flaws.
19,443
19,481
39
data/reports_final/0079.txt
Mandiant APT1 Report Has Critical Analytic Flaws. February 2013. http://www.fireeye.com 15 www.fireeye.com Poison Ivy: Assessing Damage and Extracting Intelligence Each PIVY server (the malware that the attacker sends to the target) can be configured to connect to multiple CnC servers using any TCP port. So seeing a ...
80
Vulnerability Summary for CVE-2012-0158.
19,482
19,512
31
data/reports_final/0080.txt
Vulnerability Summary for CVE-2012-0158. April 2012. 30 National Institute of Standards and Technology. Vulnerability Summary for CVE-2009-4324. December 2009. Figure 11: GB2312 encoding in spear-phishing email launched by the admin338 APT group Figure 12: Contents of decoy attachments used by the admin338 APT group ht...
81
Internet Explorer 8 Exploit Found in Watering Hole Campaign Targeting Chinese Dissidents.
19,513
19,713
201
data/reports_final/0081.txt
Internet Explorer 8 Exploit Found in Watering Hole Campaign Targeting Chinese Dissidents. March 2013. http://www.fireeye.com 23 www.fireeye.com Poison Ivy: Assessing Damage and Extracting Intelligence Weaponization In related campaigns, th3bug has used a number of different Java and Internet Explorer exploits, includ...
82
Gazing at Gazer Turlas new second stage backdoor 15 Resources listing 101: RSA private key.
19,739
19,869
131
data/reports_final/0082.txt
Gazing at Gazer Turlas new second stage backdoor 15 Resources listing 101: RSA private key. It is used to decrypt the other resources. 102: an RSA public key. 103: empty 104: unknown 105: store the persistency information 106: the list of processes to use to try to inject the communications module 107: CC communicatio...
83
Backdoor.
19,870
19,904
35
data/reports_final/0083.txt
Backdoor. Syskit is run with the -install parameter to install itself. There are a number of minor variations of the backdoor, but the primary functionality is the following: reads config file: Windir\temp\rconfig.xml writes Base64 encoding of AES encrypted (with key fromhere) version of the data in the url element of ...
84
Syskit Indicators of Compromise SHA256 Name f71732f997c53fa45eef5c988697eb4aa62c8655d8f0be3268636fc23addd193 Backdoor.
19,905
20,989
1,085
data/reports_final/0084.txt
Syskit Indicators of Compromise SHA256 Name f71732f997c53fa45eef5c988697eb4aa62c8655d8f0be3268636fc23addd193 Backdoor. Syskit 02a3296238a3d127a2e517f4949d31914c15d96726fb4902322c065153b364b2 Backdoor. Syskit 07d123364d8d04e3fe0bfa4e0e23ddc7050ef039602ecd72baed70e6553c3ae4 Backdoor. Syskit Backdoor. Syskit CC servers 64...
85
Operation RussianDoll: Adobe Windows Zero-Day Exploits Likely Leveraged by Russias APT28 in High- ly-Targeted Attack.
21,036
21,067
32
data/reports_final/0085.txt
Operation RussianDoll: Adobe Windows Zero-Day Exploits Likely Leveraged by Russias APT28 in High- ly-Targeted Attack. April 18, 2015. https://www.fireeye.com/blog/threat-research/2015/04/probable_apt28_useo.html. 15 Jonathan Leathery. Microsoft Office Zero-Day CVE-2015-2424 Leveraged By Tsar Team.. iSight Partners. Ju...
86
Operation Armageddon: Cyber Espionage as a Strategic Component of Russian Modern Warfare CTIG Re- port.
21,083
21,112
30
data/reports_final/0086.txt
Operation Armageddon: Cyber Espionage as a Strategic Component of Russian Modern Warfare CTIG Re- port. April 28, 2015. https://lgscout.com/operation-armageddon-cyber-espionage-as-a-strategic-component-of-russian-mod- ern-warfare-ctig-report/. 22 Symantec Security Response. Turla: Spying tool targets governments and d...
87
France probes Russian lead in TV5Monde hacking: sources.
21,144
21,387
244
data/reports_final/0087.txt
France probes Russian lead in TV5Monde hacking: sources. Reuters. June 10, 2015. http:// www.reuters.com/article/2015/06/10/us-france-russia-cybercrime-idUSKBN0OQ2GG20150610. 31 Adrian Chen. The Agency. New York Times. June 2, 2015. http://www.nytimes.com/2015/06/07/magazine/the-agency.html?_ r0. http://www.buzzfeed.co...
88
The Art of War in the Early 21st Century: Issues and Opinions.
21,388
21,425
38
data/reports_final/0088.txt
The Art of War in the Early 21st Century: Issues and Opinions. Military Thought, 2015 (24). 11 Igor Panarin. . ( Information warfare and communications. ). Moskva, Russia: Goryachaya Liniya Telekom, 2014a. 12 Ibid. 13 Igor Panarin. Posting on Facebook , 29 June, 2014b. http://www.facebook.com/permalink.php?story_fbid4...
89
Future soldiers: The friendly mens equipment in Crimea.
21,455
21,500
46
data/reports_final/0089.txt
Future soldiers: The friendly mens equipment in Crimea. ). Forbes, 7 March 2014. http://m.forbes.ru/article.php?id251676. 26 Vladimir Putin. : . . ( Putin: There are no Russian soldiers. This is Crimeas popular defense. ). YouTube, 2014b. https://www.youtube.com/watch?vqzKm7uxK8ws. Accessed 20 Decem- ber 2014. The cour...
90
Database query: .
21,520
21,555
36
data/reports_final/0090.txt
Database query: . Accessed 13 December 2014. 37 Tim Maurer and Scott Janz. The Russia-Ukraine Conflict: Cyber and Information Warfare in a Regional Context. http://www.bbc.co.uk/russian/russia/2014/03/140305_crimea_troops_shoigu http://www.bbc.co.uk/russian/russia/2014/03/140305_crimea_troops_shoigu http://courier.cri...
91
Russian Protest On-and Offline: The role of social media in the Moscow opposition demonstrations in De- cember 2011.
21,581
21,769
189
data/reports_final/0091.txt
Russian Protest On-and Offline: The role of social media in the Moscow opposition demonstrations in De- cember 2011. UPI FIIA Briefing Papers 98, 2012. new IW opportunities, even as defenders also have more tools and tactics at their disposal to counter hostile actions. In Ukraine, con- ventional cyber attacks by Russi...
92
Washington: Wilson Center.
21,790
21,838
49
data/reports_final/0092.txt
Washington: Wilson Center. U.S. Office of Naval Research, 2013. 106 of social cyber attack becomes increasingly important as it is based on manipulated information being spread under false identities to networks of users. 4 Understanding Social Cyber Attacks A social cyber attack, as defined by Dr Rebecca Goolsby, invo...
93
Ukraines murky inferno: Odessas fire examined.
21,839
21,911
73
data/reports_final/0093.txt
Ukraines murky inferno: Odessas fire examined. The Economist Eastern Approaches blog. 8 May 2014, http://www.econ- omist.com/blogs/easternapproaches/2014/05/odessas-fire-examined. 10 Ruscist is an invented word with offensive meaning, a combination of the words Russian and fascist. Numerous social media postings appear...
94
Inside the Ring: Cybercoms Michael Rogers Confirms Russia Conducted Cyberattacks against Ukraine.
21,964
22,006
43
data/reports_final/0094.txt
Inside the Ring: Cybercoms Michael Rogers Confirms Russia Conducted Cyberattacks against Ukraine. Washing- ton Times, March 12, 2014. http://www.washingtontimes.com/news/2014/mar/12/inside-the-ring-cybercoms-michael-rogers- confirms-/?pageall. 26 LookingGlass Cyber Threat Intelligence Group Links Russia to Cyber Espion...
95
Securit13 Podcast : 30: Let the Magic Begin.
22,028
22,229
202
data/reports_final/0095.txt
Securit13 Podcast : 30: Let the Magic Begin. March 20, 2015. http://securit13.libsyn.com/-30-let-the- magic-begin. 52 Supra, note 7. 53 Roofing means that the law enforcement agencies do not pay attention to criminals misbehavior in exchange for favors. 54 Supra, note 14. 55 Ibid. 56 Olha Karpenko. IT. AIN, June 18, 2...
96
25 See also: Deeks.
22,230
22,764
535
data/reports_final/0096.txt
25 See also: Deeks. What International Law Says. Russias annexation of Crimea was a breach of international law. https://en.wikipedia.org/wiki/UN_Secretary-General https://en.wikipedia.org/wiki/Ban_Ki-moon https://en.wikipedia.org/wiki/High_Representative_of_the_Union_for_Foreign_Affairs_and_Security_Policy https://en....
97
Sources: State Dept.
22,765
23,058
294
data/reports_final/0097.txt
Sources: State Dept. hack the worst ever, CNN, March 10, 2015, http://www.cnn. com/2015/03/10/politics/state-department-hack-worst-ever/index.html. 9 Ellen Nakashima. Hackers breach some White House computers, The Washington Post, October 28, 2014, http://www.wash- ingtonpost.com/world/national-security/hackers-breach-...
98
He co-au- thored How Insurgencies End and How Terrorist Groups End.
23,059
23,105
47
data/reports_final/0098.txt
He co-au- thored How Insurgencies End and How Terrorist Groups End. Martin is currently writ- ing a textbook (due out in Spring 2016) from which a Cyberwar class can be taught. Jarno Limnll is a Professor of Cybersecurity at Aalto University in Finland, and the Vice President of Cybersecurity at Insta Group plc. Profes...
99
Home FireEye Blogs Threat Research Blog The Mutter Backdoor: Operation Beebus with New Tar...
23,116
23,161
46
data/reports_final/0099.txt
Home FireEye Blogs Threat Research Blog The Mutter Backdoor: Operation Beebus with New Tar... Menu Customer Stories Blogs https://www.fireeye.com/blog/threat-research.html/category/etc/tags/fireeye-blog-authors/cap-james-t-bennett https://www.fireeye.com/blog/threat-research.html/category/etc/tags/fireeye-blog-threat-...
100
WedetectthismalwareasBackdoor.
23,162
24,026
865
data/reports_final/0100.txt
WedetectthismalwareasBackdoor. APT.NS01. https://www.fireeye.com/content/dam/legacy/blog/2013/04/mutter-dll-size.png 4/10/2016 The Mutter Backdoor: Operation Beebus with New Targets Threat Research Blog FireEye Inc https://www.fireeye.com/blog/threat-research/2013/04/the-mutter-backdoor-operation-beebus-with-new-targ...