Type stringclasses 5
values | Text stringlengths 1 70 | Score float64 0.17 1 | Original Sentence stringlengths 6 383 |
|---|---|---|---|
Malware | Poison I | 0.509997 | The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . |
Vulnerability | vy | 0.472894 | The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . |
Malware | B-Hack | 0.639093 | In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . |
Malware | B | 0.639087 | In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . |
Indicator | - | 0.326976 | In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . |
Malware | Hack | 0.499963 | In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . |
Indicator | I- | 0.479866 | In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . |
Malware | Hack | 0.449168 | In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . |
Organization | B- | 0.464885 | In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- . |
Malware | Ha | 0.56927 | In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- . |
Organization | ck | 0.582262 | In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- . |
Indicator | I | 0.596476 | In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- . |
Malware | LOWBALL | 0.977435 | Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer . |
System | Dropbox | 0.963676 | Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer . |
Indicator | upload.bat | 0.935677 | Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer . |
Malware | B-Hack | 0.829692 | We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command . |
Malware | BUBBLEWRAP | 0.931767 | We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command . |
Indicator | Backdoor.APT.FakeWinHTTPHelper | 0.757575 | We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command . |
System | Dropbox | 0.983996 | We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command . |
System | B | 0.908694 | We have previously observed the B-Hack I-Hack use BUBBLEWRAP . |
System | Ha | 0.839069 | We have previously observed the B-Hack I-Hack use BUBBLEWRAP . |
System | Ha | 0.81714 | We have previously observed the B-Hack I-Hack use BUBBLEWRAP . |
System | BUBBLEWRAP | 0.755166 | We have previously observed the B-Hack I-Hack use BUBBLEWRAP . |
Malware | LOWBALL | 0.991841 | The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets . |
Malware | BUBBLEWRAP | 0.973986 | The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets . |
Malware | Ha | 0.569378 | The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . |
System | B-Hack I | 0.527285 | The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . |
System | Ha | 0.503507 | The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . |
Organization | FireEye | 0.968587 | In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations . |
Organization | B-Hack | 0.882944 | In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations . |
Malware | Poison Ivy RAT | 0.902927 | In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations . |
Organization | B-Hack | 0.708643 | In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . |
System | Malaysia Airlines Flight MH370 | 0.927813 | In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . |
Organization | B-Hack | 0.708643 | In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . |
System | Malaysia Airlines Flight MH370 | 0.927813 | In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . |
Organization | FireEye | 0.960378 | According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . |
Organization | B-Hack | 0.774017 | According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . |
Vulnerability | Microsoft Office vulnerabilities | 0.887841 | According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . |
Malware | LOWBALL | 0.973628 | According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . |
Organization | FireEye | 0.960378 | According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . |
Organization | B-Hack | 0.774017 | According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . |
Vulnerability | Microsoft Office vulnerabilities | 0.887841 | According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . |
Malware | LOWBALL | 0.973628 | According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . |
Organization | B-Hack | 0.852179 | The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . |
System | Dropbox | 0.981636 | The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . |
Malware | BUBBLEWRAP | 0.949787 | The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . |
Malware | B | 0.31581 | Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . |
Indicator | -Hack I-Ha | 0.715077 | Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . |
Indicator | - I | 0.751592 | Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . |
Malware | B-Hack | 0.774287 | Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . |
Organization | FireEye | 0.974297 | This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . |
Malware | B | 0.719279 | This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . |
Malware | Hack | 0.767133 | This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . |
Malware | B-Hack | 0.583375 | This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . |
Malware | B-Hack | 0.710736 | This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . |
Malware | MH370 | 0.912999 | This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . |
Malware | Ha | 0.799204 | This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . |
Malware | B | 0.802907 | This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . |
Malware | Ha | 0.823753 | This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . |
Malware | Ha | 0.470358 | This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . |
Malware | Poison Ivy RAT | 0.969063 | The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . |
Malware | Win | 0.849634 | The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . |
System | HTTP | 0.87924 | The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . |
Malware | Helper | 0.718672 | The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . |
Malware | Poison Ivy RAT | 0.969063 | The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . |
Malware | Win | 0.849634 | The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . |
System | HTTP | 0.87924 | The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . |
Malware | Helper | 0.718672 | The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . |
Organization | FireEye | 0.991103 | FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper . |
Malware | B-Hack I | 0.83878 | FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper . |
Malware | Hack | 0.882142 | FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper . |
Malware | Poison Ivy | 0.696365 | FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper . |
Organization | B- | 0.562104 | The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . |
Malware | Ha | 0.492751 | The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . |
Organization | ck | 0.544635 | The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . |
Malware | B-Hack | 0.884683 | Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . |
Malware | B-Hack | 0.777664 | Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . |
Malware | Ha | 0.603568 | Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . |
Malware | Ha | 0.496734 | Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . |
Organization | FireEye | 0.988711 | FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . |
Malware | B-Hack | 0.782438 | FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . |
Malware | B-Hack | 0.751828 | FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . |
Organization | B-Hack | 0.790838 | The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai . |
Malware | B | 0.595033 | These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . |
Organization | - | 0.577936 | These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . |
Malware | Ha | 0.711315 | These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . |
Organization | ck | 0.690098 | These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . |
Malware | B | 0.495747 | These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . |
Organization | - | 0.566055 | These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . |
Malware | Ha | 0.67856 | These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . |
Organization | ck | 0.749665 | These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . |
Organization | B-Hack | 0.803005 | B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . |
Malware | BISCUIT | 0.825483 | B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . |
Malware | B-Hack | 0.963537 | While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . |
Malware | Poison Ivy | 0.755209 | While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . |
Malware | Gh0st RAT | 0.804621 | While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . |
Malware | B-Hack I-Hack I-Hack | 0.935567 | Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . |
Malware | B-Hack I-Hack I-Hack | 0.948526 | Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . |
System | B | 0.510743 | Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . |
Malware | Ha | 0.338203 | Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . |
End of preview. Expand in Data Studio
README.md exists but content is empty.
- Downloads last month
- 6