id
int64
1
978
title
stringlengths
1
120
start_line
int64
59
237k
end_line
int64
132
237k
lines
int64
30
3.31k
path
stringlengths
27
27
text
stringlengths
577
300k
901
Juniper Advanced Threat Prevention Cloud detects the Muhstik bot as follows.
196,211
196,607
397
data/reports_final/0901.txt
Juniper Advanced Threat Prevention Cloud detects the Muhstik bot as follows. Indicators of Compromise 192[. ]31.52.174 34[. ]221.40.237 157[. ]230.189.52 18[. ]235.127.50 fe98548300025a46de1e06b94252af601a215b985dad31353596af3c1813efb0 *dk32 0e574fd30e806fe4298b3cbccb8d1089454f42f52892f87554325cb352646049 *dk86 39db1c5...
902
Indicators of Compromise Domains: gtmpbeaxruxy[.
196,622
196,676
55
data/reports_final/0902.txt
Indicators of Compromise Domains: gtmpbeaxruxy[. ]myftp.org URLs: http://gtmpbeaxruxy[. ]myftp.org/setup.py http://gtmpbeaxruxy[. ]myftp.org/setup http://gtmpbeaxruxy[. ]myftp.org/xmrig http://gtmpbeaxruxy[. ]myftp.org/xmrig1 Files: File Hash File Name Eb4a48a32af138e9444f87c4706e5c03d8dc313fabb7ea88c733ef1be9372899 se...
903
Botnet HTTP.Unix.
196,677
196,850
174
data/reports_final/0903.txt
Botnet HTTP.Unix. Shell. IFS.Remote. Code. Execution FortiGuard Labs also provides IPS signatures against the following vulnerabilities. CVE-2017-17215 - Huawei.HG532.Remote. Code. Execution CVE-2016-5674 - NUUO.Surveillance. Application. UNAUTH.Remote. Code. Execution The FortiGuard Web Filtering Service blocks downlo...
904
RDP shop overview Systems for sale: The advertised systems ranged from Windows XP through Windows 10.
196,851
197,218
368
data/reports_final/0904.txt
RDP shop overview Systems for sale: The advertised systems ranged from Windows XP through Windows 10. Windows 2008 and 2012 Server were the most abundant systems, with around 11,000 and 6,500, respectively, for sale. Prices ranged from around US $3 for a simple configuration to $19 for a high-bandwidth system that offe...
905
In Q3 we saw two new exploit kits: Fallout and Underminer.
197,219
197,265
47
data/reports_final/0905.txt
In Q3 we saw two new exploit kits: Fallout and Underminer. Fallout almost certainly had a bearing on the spread of GandCrab, the leading ransomware. Five years ago we published the report “Cybercrime Exposed,” which detailed the rise of cybercrime as a service. Exploit kits are the epitome of this economy, affording an...
906
Backdoor.
197,305
197,399
95
data/reports_final/0906.txt
Backdoor. Emdivi are persistently used as a payload. All attacks arrive on the target computers as an attachment to email messages. Mostly the attachments are in a simple executable format with a fake icon. However, some of the files exploit software vulnerabilities, and the aforementioned vulnerability in Ichitaro sof...
907
Backdoor.
197,400
197,458
59
data/reports_final/0907.txt
Backdoor. Emdivi. The compromised cloud hosting company has been notified but, at the time of writing, has not replied. Symantec offers two IPS signatures that detect and block network communication between infected computers and the Emdivi C&C server: System Infected: Backdoor. Emdivi Activity System Infected: Backdoo...
908
System Infected: Backdoor.
197,470
197,975
506
data/reports_final/0908.txt
System Infected: Backdoor. Emdivi Activity System Infected: Backdoor. Emdivi Activity 2 NetTraveler APT Gets a Makeover for 10th Birthday We have written about NetTraveler before HERE and HERE. Earlier this year, we observed an uptick in the number of attacks against Uyghur and Tibetan supporters using an updated versi...
909
197,987
198,431
445
data/reports_final/0909.txt
• %System%\config\SystemLog.evt: Contains Stage 5 user mode DLLs. They constitute Regin’s payload. • %System%\config\SecurityLog.evt: Contains Stage 5 data files, used by the Stage 4 and 5 components to store various data items • %System%\config\ApplicationLog.evt: Another Stage 5 log container, which is referenced ...
910
INTELLIGENCE TEAM REPORT VER.
198,432
198,464
33
data/reports_final/0910.txt
INTELLIGENCE TEAM REPORT VER. 1.0 DEEP PANDA 11 EXECUTIVE SUMMARY 2 12 TECHNICAL ANALYSIS 3 Dropper Sample (MD5: 14c04f88dc97aef3e9b516ef208a2bf5) ...
911
Appendix D: Raw bytes of example Authentication packet.
198,465
199,237
773
data/reports_final/0911.txt
Appendix D: Raw bytes of example Authentication packet. 30 Appendix E: Initialization of KEY and IV for AES 30 Appendix F: Command & Control Servers 31 Appendix G: Edward Sun’s kernel network hook code ...
912
Appendix D: Raw bytes of example Authentication packet.
199,238
201,921
2,684
data/reports_final/0912.txt
Appendix D: Raw bytes of example Authentication packet. 03 01 74 80 82 21 b5 64 c2 74 22 e3 02 00 00 00 49 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Appendix E: Initialization of KEY and IV for AES for (int i = 0; i < 0x20; ++i ) { for (int i = 0; i < 0x20; ++i ) { buffer[i] = (byte)((i + 8) + ((byte)password[...
913
000000E0 06 3C AA D8 F0 49 52 DB 22 A5 0D 7B 2B 4D 8A D1 .<...IR.”..{+M..
201,937
202,557
621
data/reports_final/0913.txt
000000E0 06 3C AA D8 F0 49 52 DB 22 A5 0D 7B 2B 4D 8A D1 .<...IR.”..{+M.. 000000F0 21 5C 62 11 E6 13 E2 CA AF A5 4F 5A 9E 1C AF AE !\b.......OZ.... 00000100 C4 1C 36 4D A0 E4 72 3A CD 07 A3 01 AE E6 0A 84 ..6M..r...
914
The answer: No.
202,558
203,577
1,020
data/reports_final/0914.txt
The answer: No. Bootkits must overwrite the Master Boot Record (MBR) and antivirus products are well trained to catch that kind of bad behavior. The masterminds behind Snake rootkit seem to be well aware of this so what they resorted to instead is leveraging a vulnerability in a well-known virtualization product called...
915
recipient – the CEO of a large Russian bank.
203,578
204,044
467
data/reports_final/0915.txt
recipient – the CEO of a large Russian bank. The email was apparently sent from “Mrs. World”; note the Mrs., and not Miss - World. The weaponized Microsoft Word document attached to the email message (“photo.doc”) contained two separate exploits: one targeting the vulnerability detailed in CVE-2012-0158 (MSCOMCTL Activ...
916
Apparently a rented server at AS52048 DATACLUB DataClub S.A. Latvia.
204,045
204,157
113
data/reports_final/0916.txt
Apparently a rented server at AS52048 DATACLUB DataClub S.A. Latvia. Traffic from this IP had a very specific purpose: It unlocked routers for proxying in connection with the sending of phishing emails. In the wild we observed this IP connect to our router on the malware management port and specify a SOCKSS proxy port ...
917
other : Serve MMS phishing content.
204,158
204,346
189
data/reports_final/0917.txt
other : Serve MMS phishing content. The code identifies mobile operator and determines which logo will be displayed when the user follows the link. 35 MMS Phishing We have no sample of the actual MMS phishing messages apparently being sent, but we can see the page served when a user clicks a spammed link. This is just ...
918
periods: 6:00 -10:00 UTC and 17:00 - 21:00 UTC.
204,347
204,391
45
data/reports_final/0918.txt
periods: 6:00 -10:00 UTC and 17:00 - 21:00 UTC. No uploads were seen between 23:00 and 05:00 UTC. It is however doubtful how indicative these timeframes are. To illustrate, we looked into another and more obscure timing factor: The timing of the AES InitVector random seeds. A random seed is the initial value passed int...
919
classical Chinese APT implant.
204,392
207,702
3,311
data/reports_final/0919.txt
classical Chinese APT implant. It is a downloader and remote shell program, designed to connect to a C&C server to interact with the attacker and/or download more malware. The C&C server in this case is ict32.msname.org. When connecting to this server, sccm.exe issues the following request: POST /check.jsp HTTP/1.1 Acc...
920
Image 1: Example of an online threat made against RSS.
207,703
209,613
1,911
data/reports_final/0920.txt
Image 1: Example of an online threat made against RSS. The image, which cannot be confirmed, purports to show CCTV installed around Raqqah. In addition, RSS is targeted online by ISIS supporters with harassment, including threats to the physical safety of its members. For example, ISIS supporters have claimed that ISIS...
921
Loaders.
209,614
210,887
1,274
data/reports_final/0921.txt
Loaders. Both versions of the Loader begin by loading the embedded DLL from the Loader’s resources (item 102 under the Group Icons resource tree), decrypting and decompressing the image into memory, then manually loading the DLL into memory using a custom loading routine. The function LoadEmbeddedImage, as seen in part...
922
Cyber war: The next threat to national security and what to do about it.
210,888
210,933
46
data/reports_final/0922.txt
Cyber war: The next threat to national security and what to do about it. New York, NY: Ecco. 128 maps.google.com Figure 12 A satellite view of the Chilbosan Hotel.129 Several entities are nested under the Workers’ Party. The Central Party Committee oversees the Central Party Investigative Group, also known as Unit ...
923
Cyber war: The next threat to national security and what to do about it.
210,934
211,834
901
data/reports_final/0923.txt
Cyber war: The next threat to national security and what to do about it. New York, NY: Ecco. 131 https://www.usnwc.edu/getattachment/8e487165-a3ef-4ebc-83ce-0ddd7898e16a/The-Republic-of-Korea-s-Counter-asymmetric-Strateg 132 http://goodfriendsusa.blogspot.co.uk/2008/07/north-korea-today-no174.html 133 https://www.usnwc...
924
 DarkSeoul Backdoor.
211,835
212,394
560
data/reports_final/0924.txt
 DarkSeoul Backdoor. Prioxer detected (June) 283  Korean Central News Agency website becomes North Korea’s first known direct connection to the Internet (October)284 273 http://www.nbcnews.com/news/other/north-korean-ship-carrying-hidden-missile-equipment-detained-after-leaving-f6C10647045 274 http://www....
925
published in our annual HP Cyber Risk Report 2013.
212,395
213,083
689
data/reports_final/0925.txt
published in our annual HP Cyber Risk Report 2013. Analysis of this malware is included in Appendix C. Analysis of additional malware used in these campaigns produced no new findings and only corroborated what was found by external security researchers. These publicly available analyses have been cited throughout the r...
926
• SecureCRT—a commercial SSH and Telnet client by VanDyke Software.
213,084
214,251
1,168
data/reports_final/0926.txt
• SecureCRT—a commercial SSH and Telnet client by VanDyke Software. If an mRemote installation is located, the dropper reads the configuration file and checks if there’s a NODE that is defined with “Username=root”, “Protocol=SSH”, and a password that is not blank. If those conditions are satisfied it extracts the infor...
927
Targeted Attacks: Understanding the Characteristics of an Escalating Threat.
214,262
216,279
2,018
data/reports_final/0927.txt
Targeted Attacks: Understanding the Characteristics of an Escalating Threat. In Proc. Of the 15th International conference on Research in Attacks, Intrusions, and Defenses (RAID), 2012. [5] Symantec Internet Security Threat Report (ISTR), Volume 17, April 2012. Page 28 Author Candid Wueest Principal Software Engineer ...
928
day Government Spy Assembler 0x29A Micro Backdoorand shortly after in a paper by Bitdefender.
216,280
216,549
270
data/reports_final/0928.txt
day Government Spy Assembler 0x29A Micro Backdoorand shortly after in a paper by Bitdefender. Some of the characteristics of MiniDuke — such as its small size (20 KB), its crafty use of assembly programming, and the use of zero-day exploits for distribution — made it an intriguing threat. Although the backdoor is still...
929
“Threat Intelligence Briefing Episode 11”.
216,550
216,599
50
data/reports_final/0929.txt
“Threat Intelligence Briefing Episode 11”. February 2014. 2 Perlroth, N. “In Cyberattack on Saudi Firm, U.S. Sees Iran Firing Back”. October 2012. 3 Gallagher, S. “Iranians hacked Navy network for four months? Not a surprise”. February 2014. 4 Key. “Honker Union of China to launch network attacks against Japan is a rum...
930
“Iran strengthened cyber capabilities after Stuxnet: U.S. general”.
216,636
216,694
59
data/reports_final/0930.txt
“Iran strengthened cyber capabilities after Stuxnet: U.S. general”. January 2013, Lim, K. “Iran’s cyber posture”. November 2013. 3 www.fireeye.com Fireeye: Operation Saffron Rose 2013 Attack Vectors registered the domain “aeroconf2014[. ]org” in We have ob...
931
“After the Green Movement: Internet Controls in Iran 2009 – 2012”.
216,695
217,150
456
data/reports_final/0931.txt
“After the Green Movement: Internet Controls in Iran 2009 – 2012”. February 2013. 19 Torbati, Y. “Iran blocks use of tool to get around Internet filter”. March 2013. 20 Marquis-Boire, M. “Iranian anti-censorship software ‘Simurgh’ circulated with malicious backdoor”. May 2012. 5 www.fireeye.com Fireeye: Operation Saffr...
932
“Beyond Attribution: Seeking National Responsibility for Cyber Attacks”.
217,151
217,936
786
data/reports_final/0932.txt
“Beyond Attribution: Seeking National Responsibility for Cyber Attacks”. January 2012. 18 www.fireeye.com Fireeye: Operation Saffron Rose 2013 Conclusion About FireEye The increased politicization of the Ajax Security FireEye has invented a purpose-built, virtual Tea...
933
The FireEye Threat Prevention Platform Fortune 500.
217,937
218,136
200
data/reports_final/0933.txt
The FireEye Threat Prevention Platform Fortune 500. FireEye, Inc. | 1440 McCarthy Blvd. Milpitas, CA 95035 | 408.321.6300 | 877.FIREEYE (347.3393) | info@fireeye.com | www.fireeye.com © 2014 FireEye, Inc. All rights reserved. FireEye is a registered trademark of FireEye, Inc. All other brands, products, or service...
934
Exploit.
218,154
218,801
648
data/reports_final/0934.txt
Exploit. Win32.CVE-2012-0158.j Exploit. Win32.CVE-2012-0158.eu Exploit. Win32.CVE-2012-0158.aw Exploit.MSWord.CVE-2012-0158.ea HEUR:Trojan. Win32.CloudAtlas.gen HEUR:Trojan. Win32.Generic HEUR:Trojan. Script. Generic Trojan-Spy. Win32.Agent.ctda Trojan-Spy. Win32.Agent.cteq Trojan-Spy. Win32.Agent.ctgm Trojan-Spy. Win3...
935
HackTool.
218,855
219,174
320
data/reports_final/0935.txt
HackTool. Win32.Agent.vhs HackTool. Win64.Agent.b Rootkit. Win32.Turla.d Trojan-Dropper. Win32.Dapato.dwua Trojan-Dropper. Win32.Demp.rib Trojan-Dropper. Win32.Injector.jtxs Trojan-Dropper. Win32.Injector.jtxt Trojan-Dropper. Win32.Injector.jznj Trojan-Dropper. Win32.Injector.jznk Trojan-Dropper. Win32.Injector.khqw Tr...
936
Operation Cleaver.
219,175
220,514
1,340
data/reports_final/0936.txt
Operation Cleaver. 6 #OPCLEAVER While previously reported operations attributed to Iran have largely focused on Defense Industrial Base (DIB) companies, the United States Federal Government, or targets in Middle Eastern countries, Operation Cleaver has instead focused on a wide array of targets, including energy produc...
937
Exploit Team.
220,515
220,761
247
data/reports_final/0937.txt
Exploit Team. Pivoting is the process of leveraging access from one compromised computer in order to gain access to additional systems on the target network. This can involve launching attacks from the compromised computer, or simply abusing access once it has been gained. Cached Credential Dumping A very common method...
938
The –h argument enables HTTP mode.
220,762
221,552
791
data/reports_final/0938.txt
The –h argument enables HTTP mode. This makes the traffic between zhCat instances look like benign HTTP traffic. For instance, if the attackers set up a zhCat instance listening on port 1000 on 192.168.116.128 in HTTP mode, the client instance of zhCat would use the following command: b2 zhcat.exe –h –p 1000 –i 192.168...
939
impersonate Adobe Report Service.
221,553
222,179
627
data/reports_final/0939.txt
impersonate Adobe Report Service. WndTest starts using PHP servers for its command and control server, some of which are listed as defaced sites. 58 #OPCLEAVER We have seen wndTest communicate with the following servers: • 209.208.97.44, Orlando, Florida, USA, www.lat(dot)am • 23.238.17.181, Tulsa, Oklahoma, USA, r...
940
This Appendix details the IOCs discovered in the investigation of Operation Cleaver.
222,180
222,875
696
data/reports_final/0940.txt
This Appendix details the IOCs discovered in the investigation of Operation Cleaver. CylancePROTECT prevents the malware used in Operation Cleaver from ever executing. Domains doosan-job(dot)com downloadsservers(dot)com drivercenterupdate(dot)com easyresumecreatorpro(dot)com googleproductupdate(dot)com googleproductupd...
941
Operation “Arachnophobia”.
222,876
225,341
2,466
data/reports_final/0941.txt
Operation “Arachnophobia”. The following report is a product of collaborative research and threat intelligence sharing between Cyber Squared Inc.’s TCIRT and FireEye Labs. Key Findings • While we are not conclusively attributing BITTERBUG activity to Tranchulas or a specific Pakistani entity, we can confidently point ...
942
associated with Operation Poisoned Hurricane.
225,342
225,932
591
data/reports_final/0942.txt
associated with Operation Poisoned Hurricane. However, the malicious document.write driveby URLs listed above both result in 403 Forbidden errors as of December 18, 2014. While the 403 Forbidden errors may seem like an analytic dead end, the TCIRT also identified a malicious Java applet submission to VirusTotal that co...
943
FinSpy Campaign.
225,933
225,962
30
data/reports_final/0943.txt
FinSpy Campaign. Beginning in April 2012, the authors received 5 suspicious e-mails from US and UK-based activists 4 Case Studies: Three Countries and journalists working on Bahrain. We found that some of the attachments contained a PE (.exe) file designed to This fo...
944
Identification as FinSpy: By running the sample using ated with another government [4].
225,963
226,568
606
data/reports_final/0944.txt
Identification as FinSpy: By running the sample using ated with another government [4]. However, a proxy would Windows Virtual PC, we found the following string in mem- show gaps in a global IPID as it forwarded traffic; our frequent ory: y:\lsvn_branches\finspyv4.01\finspyv2\. observat...
945
Appin: In early 2013 UAE H.R.
226,569
226,649
81
data/reports_final/0945.txt
Appin: In early 2013 UAE H.R. activist E forwarded nu- servers We note some interesting master locations in Table 4. merous documents that included a particular CVE-2012-0158 Server locations: In all, our fingerprints matched 92 dis- exploit for Microsoft Word. In all, these totaled 17 ...
946
Fingerprints: We probed the C&C servers of the RCS and Team [76].
226,650
226,843
194
data/reports_final/0946.txt
Fingerprints: We probed the C&C servers of the RCS and Team [76]. The domain hackingteam.it resolves to an FSBSpy samples, and found that they responded in a distinc- address in this range. (2) An address belonging to Omantel, a tive way to HTTP requests, and returned distinctive SSL cer- ...
947
sorship in China: Where Does the Filtering Occur?” in cessed: 11-November-2013.
226,844
226,989
146
data/reports_final/0947.txt
sorship in China: Where Does the Filtering Occur?” in cessed: 11-November-2013. [Online]. Available: Proc. PAM, 2011. http://bit.ly/1aRUZ4b [12] M. Sherr, G. Shah, E. Cronin, S. Clark, and M. Blaze, [31] “Unionist Questioned,” 2013, a...
948
[49] “Free Syrian Army Sex Tape—Abdul Razzaq Tlass 2012.
226,990
227,143
154
data/reports_final/0948.txt
[49] “Free Syrian Army Sex Tape—Abdul Razzaq Tlass 2012. [NSFW],” accessed: 5-August-2013. [Online]. Available: [69] “Democracy Index 2012: Democracy at a Standstill,” http://bit.ly/1gHqDDH 2012, accessed: 7-August-2013. [Online]. Available:...
949
SMB Worm Tool: This worm uses a brute force authentication attack to propagate via Windows SMB shares.
227,144
227,187
44
data/reports_final/0949.txt
SMB Worm Tool: This worm uses a brute force authentication attack to propagate via Windows SMB shares. It connects home every five minutes to send log data back to command and control (C2) infrastructure if it has successfully spread to other Windows hosts via SMB port 445. The tool also accepts new scan tasking when i...
950
US-CERT recommends reviewing the Security Tip Handling Destructive Malware #ST13-003.
227,210
227,896
687
data/reports_final/0950.txt
US-CERT recommends reviewing the Security Tip Handling Destructive Malware #ST13-003. Description Cyber threat actors are using an SMB worm to conduct cyber exploitation activities. This tool contains five components – a listening implant, lightweight backdoor, proxy tool, destructive hard drive tool, and destructive t...
951
LegalCopyright: Copyright 2012 Google Inc. All rights reserved.
227,897
228,215
319
data/reports_final/0951.txt
LegalCopyright: Copyright 2012 Google Inc. All rights reserved. InternalName: chrome_exe ProcuctShortName: Chrome FileVersion: 34.0.1847.131 CompanyName: Google Inc. OrginaLFilename: chrome.exe LegalTrademarks: ProductName: Google Chrome ComparyShortName: Google LastChange: 265687 FileDescription: Google Chrome Offcial...
952
including Operation Poisoned Hurricane.
228,216
228,411
196
data/reports_final/0952.txt
including Operation Poisoned Hurricane. Specifically, 17bc9d2a640da75db6cbb66e5898feb1 is a PlugX variant signed by the QTI International certificate. This PlugX variant connected to a Google Code project at code.google[. ]com/p/udom/, where it decoded a command that configured its C2 server. The sample 0b54ae49fd5a841...
953
against US Defense companies under the code name Operation DeathClick.
228,412
228,725
314
data/reports_final/0953.txt
against US Defense companies under the code name Operation DeathClick. Traditional malvertizing has been an effective but indiscriminate method cyber crime gangs use to compromise endpoints to perpetrate ad fraud, identity fraud, and banking credential theft. In this new targeted variation of malvertizing, the perpetra...
954
Audience Targeting: Bid on the audiences most valuable to you.
228,726
229,027
302
data/reports_final/0954.txt
Audience Targeting: Bid on the audiences most valuable to you. Each impression in the PubMatic auction can be enhanced with first- and third-party data; giving buyers targeting capabilities across display, mobile, tablet and video inventory. Media buyers can also cookie sync with publisher audiences to incorporate CRM,...
955
ad placement ran on sports.yahoo.com – an Alexa Top 4 rated site.
229,028
229,315
288
data/reports_final/0955.txt
ad placement ran on sports.yahoo.com – an Alexa Top 4 rated site. Highlighted in order in Figure 22 is the common filename of obupdat.exe, which has ever changing hashes, followed by the TOR port, and the 3rd party ad platform of first-impression.com. Analysis (Original report): Figure 22: CryptoWall 2.0 infection repo...
956
to both Operation DeputyDog and Operation Ephemeral Hydra.
229,316
229,644
329
data/reports_final/0956.txt
to both Operation DeputyDog and Operation Ephemeral Hydra. Figure 1 illustrates the infrastructure overlaps and connections we observed between the strategic Web compromise campaign leveraging the VFW’s website, the DeputyDog, and the Ephemeral Hydra operations. Figure 1: Ties between Operation SnowMan, DeputyDog, and ...
957
PANDA resolved to this same IP address: login.
229,645
229,861
217
data/reports_final/0957.txt
PANDA resolved to this same IP address: login. several PUTTER PANDA associated aolon1ine.com. Additionally, for a brief period in April domains have resolved to IP 2012, update8.firefoxupdata.com also resolved to address 100.42.216.230: this IP address. • news.decipherment.net • res.decipherment.net The use of the same...
958
– specifically the PLA Army.
229,862
230,214
353
data/reports_final/0958.txt
– specifically the PLA Army. In addition to his declaration on his personal blog that he works for the “military/ police”, and contacts with actors such as Linxder that have been previously associated with hacking units within the PLA, cpyy’s Picasa site contains several photographs that hint at military connections. F...
959
• CCommandCD – Change the working directory for the current C2 session.
230,215
230,956
742
data/reports_final/0959.txt
• CCommandCD – Change the working directory for the current C2 session. •C CommandCMD – Execute a command, with standard input/output/error Screenshot of Truecaller redirected over the C2 channel. Database Shared by • CCommandNOP – List the current working directory. DEADEYE JACKAL on Their Twitter Account (names reda...
960
description: Detects the DLL-Sideloading of windowscodecs.dll by calc.exe.
230,957
231,334
378
data/reports_final/0960.txt
description: Detects the DLL-Sideloading of windowscodecs.dll by calc.exe. date: 04/08/2022 logsource: product: windows category: image_load detection: selection: - ImageLoaded|endswith: - '\WindowsCodecs.dll' - Image|endswith: - 'calc.exe' filter: - Imageloaded|startswith: - 'C:\Windows\System32\' - 'C:\Windows\Syswow...
961
Trellix conducts research in accordance with its Vulnerability Reasonable Disclosure Policy | Trellix.
231,335
231,898
564
data/reports_final/0961.txt
Trellix conducts research in accordance with its Vulnerability Reasonable Disclosure Policy | Trellix. Any attempt to recreate part or all of the activities described is solely at the user’s risk, and neither Trellix nor its affiliates will bear any responsibility or liability. Countering Follina Attack (CVE- 2022-3019...
962
Deploy XSOAR Playbook - Ransomware Manual for incident response.
231,899
232,128
230
data/reports_final/0962.txt
Deploy XSOAR Playbook - Ransomware Manual for incident response. These capabilities are part of the NGFW cloud-delivered security subscriptions service Conclusion BlackByte ransomware operators have been active since at least July 2021. Due to the high-profile nature and steady stream of BlackByte attacks identified gl...
963
Trellix conducts research in accordance with its Vulnerability Reasonable Disclosure Policy | Trellix.
232,129
232,341
213
data/reports_final/0963.txt
Trellix conducts research in accordance with its Vulnerability Reasonable Disclosure Policy | Trellix. Any attempt to recreate part or all of the activities described is solely at the user’s risk, and neither Trellix nor its affiliates will bear any responsibility or liability. Damart clothing store hit by Hive ransomw...
964
Trellix conducts research in accordance with its Vulnerability Reasonable Disclosure Policy.
232,342
232,584
243
data/reports_final/0964.txt
Trellix conducts research in accordance with its Vulnerability Reasonable Disclosure Policy. Any attempt to recreate part or all of the activities described is solely at the user’s risk, and neither Trellix nor its affiliates will bear any responsibility or liability. Threat Brief: CVE-2022-30190 – MSDT Code Execution ...
965
Another suspected Phishing page.
232,585
232,824
240
data/reports_final/0965.txt
Another suspected Phishing page. Figure 11. Another suspected Phishing page. The IP address 82.221.139[. ]137 was observed in other spear phishing campaigns impersonating the cybersecurity center and CSOC in Ukraine. Wipers Communication is vital to survive during wartime, and the adversarial use of malware attacks to ...
966
Cloud security: Detect and remediate account compromises and third-party application abuse.
232,825
232,897
73
data/reports_final/0966.txt
Cloud security: Detect and remediate account compromises and third-party application abuse. Proofpoint CASB integrates with Proofpoint Nexus Threat Graph and third-party threat intelligence to stop account takeovers and third-party application abuse. Data loss prevention: Prevent sensitive data downloads and large-scal...
967
MVISION Insights API to pull Campaign Threat Intelligence for further correlation across data events.
232,920
233,229
310
data/reports_final/0967.txt
MVISION Insights API to pull Campaign Threat Intelligence for further correlation across data events. Figure 6. MVISION Insights API to pull Campaign Threat Intelligence for further correlation across data events. Utilizing expert and behavioral rules in trellix endpoint security Trellix ENS Threat Prevention and Adapt...
968
Microsoft – The Threat Actor’s Playground.
233,230
233,588
359
data/reports_final/0968.txt
Microsoft – The Threat Actor’s Playground. A Blog Series. This post is an ongoing series of blogs on different types of people-centric email attacks slipping past Microsoft’s detection. These attacks cost organizations millions of dollars every year in losses and cause frustration for information security teams and use...
969
Encrypted Channel
233,645
233,774
130
data/reports_final/0969.txt
Encrypted Channel Uses Qakbot primarily and Cobalt Strike. TA0040 Impact T1486. Data Encrypted for Impact Black Basta modifies the Desktop background by adding a .jpg in C:\Temp and creating a registry key HKCU\Control Panel\Desktop. Additionally modifies the registry to change the icon of encrypted files. It encrypt...
970
Palo Alto Networks Cortex XDR contains an Anti-Ransomware Protection module.
233,775
234,717
943
data/reports_final/0970.txt
Palo Alto Networks Cortex XDR contains an Anti-Ransomware Protection module. This module targets encryption-based activity associated with ransomware. Cortex XDR contains defined behavioral indicators of compromise designed to detect anomalies within your network. More information on ransomware can be found in the 2021...
971
Password reuse: 44% of organizations allow IAM password reuse.
234,734
234,833
100
data/reports_final/0971.txt
Password reuse: 44% of organizations allow IAM password reuse. Weak passwords (<14 characters): 53% of cloud accounts allow weak password usage. Cloud identities are too permissive: 99% of cloud users, roles, services, and resources were granted excessive permissions which were ultimately left unused (we consider permi...
972
From: Financeiro UNIMED <financeiro@unimed-corporated[.
234,858
234,902
45
data/reports_final/0972.txt
From: Financeiro UNIMED <financeiro@unimed-corporated[. ]com> Subject: Reserva Replyto: cdt[name]cdt@gmail[. ]com Attachment: OficioCircularencaminhadoaoSetorFinanceiroUNIMED.docx SHA256: 2f0f99cbac828092c0ec23e12ecb44cbf53f5a671a80842a2447e6114e4f6979 Emails masqueraded as Unimed, a Brazilian medical work cooperative ...
973
From: Mauricio Fortunato <contato@155hotel[.]com[.
234,903
235,408
506
data/reports_final/0973.txt
From: Mauricio Fortunato <contato@155hotel[.]com[. ]br> Subject: Enc: Reserva Familiar The URL purported to be a legitimate 155 Hotel reservation link that led to an ISO file and an embedded batch file. The execution of the BAT file led to a PowerShell helper script that downloaded a follow-on payload, AsyncRAT. Simila...
974
Update: Added more info on Kochava's lawsuit against the FTC.
235,409
235,741
333
data/reports_final/0974.txt
Update: Added more info on Kochava's lawsuit against the FTC. Fake 'Cthulhu World' P2E project used to push info-stealing malware Hackers have created a fake 'Cthulhu World' play-to-earn community, including websites, Discord groups, social accounts, and a Medium developer site, to distribute the Raccoon Stealer, Async...
975
ImpacketObf — a slightly obfuscated version of the open-source Impacket framework.
235,742
235,836
95
data/reports_final/0975.txt
ImpacketObf — a slightly obfuscated version of the open-source Impacket framework. This python-based framework implements various network protocols and contains utilities like smbexec.py and wmiexec.py, which can be used for lateral movement Obfuscated impacket wmiexec (utility) [FireEye Tools][IOC0111] Obfuscated impa...
976
From: Binance Team <root@mensagem1[.]bnb-naoresponda[.
235,837
236,289
453
data/reports_final/0976.txt
From: Binance Team <root@mensagem1[.]bnb-naoresponda[. ]com> Subject: Listagem de criptoativos em breve - 09/05/2022 (Machine translation: Crypto asset listing coming soon - 05/09/2022) The email contained a link to a Binance-themed landing page with a popup listing several cryptocurrency wallets. If a user attempted t...
977
Don’t forget about your Achilles heel – the seemingly innocent employees at their desks.
236,290
236,499
210
data/reports_final/0977.txt
Don’t forget about your Achilles heel – the seemingly innocent employees at their desks. A little training can go a long way to limit the number of incidents caused by bad employee behavior. A crucial part of setting up your network is to make sure all the necessary monitoring and logging tools are in place to collect ...
978
Trellix conducts research in accordance with its Vulnerability Reasonable Disclosure Policy | Trellix.
236,500
237,205
706
data/reports_final/0978.txt
Trellix conducts research in accordance with its Vulnerability Reasonable Disclosure Policy | Trellix. Any attempt to recreate part or all of the activities described is solely at the user’s risk, and neither Trellix nor its affiliates will bear any responsibility or liability. Microsoft found TikTok Android flaw that ...