Dataset Viewer
Auto-converted to Parquet Duplicate
Type
stringclasses
5 values
Text
stringlengths
1
70
Score
float64
0.17
1
Original Sentence
stringlengths
6
383
Malware
Poison I
0.509997
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors .
Vulnerability
vy
0.472894
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors .
Malware
B-Hack
0.639093
In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television .
Malware
B
0.639087
In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television .
Indicator
-
0.326976
In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television .
Malware
Hack
0.499963
In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television .
Indicator
I-
0.479866
In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television .
Malware
Hack
0.449168
In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television .
Organization
B-
0.464885
In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- .
Malware
Ha
0.56927
In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- .
Organization
ck
0.582262
In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- .
Indicator
I
0.596476
In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- .
Malware
LOWBALL
0.977435
Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer .
System
Dropbox
0.963676
Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer .
Indicator
upload.bat
0.935677
Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer .
Malware
B-Hack
0.829692
We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command .
Malware
BUBBLEWRAP
0.931767
We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command .
Indicator
Backdoor.APT.FakeWinHTTPHelper
0.757575
We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command .
System
Dropbox
0.983996
We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command .
System
B
0.908694
We have previously observed the B-Hack I-Hack use BUBBLEWRAP .
System
Ha
0.839069
We have previously observed the B-Hack I-Hack use BUBBLEWRAP .
System
Ha
0.81714
We have previously observed the B-Hack I-Hack use BUBBLEWRAP .
System
BUBBLEWRAP
0.755166
We have previously observed the B-Hack I-Hack use BUBBLEWRAP .
Malware
LOWBALL
0.991841
The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets .
Malware
BUBBLEWRAP
0.973986
The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets .
Malware
Ha
0.569378
The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- .
System
B-Hack I
0.527285
The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- .
System
Ha
0.503507
The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- .
Organization
FireEye
0.968587
In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations .
Organization
B-Hack
0.882944
In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations .
Malware
Poison Ivy RAT
0.902927
In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations .
Organization
B-Hack
0.708643
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- .
System
Malaysia Airlines Flight MH370
0.927813
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- .
Organization
B-Hack
0.708643
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- .
System
Malaysia Airlines Flight MH370
0.927813
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- .
Organization
FireEye
0.960378
According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL .
Organization
B-Hack
0.774017
According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL .
Vulnerability
Microsoft Office vulnerabilities
0.887841
According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL .
Malware
LOWBALL
0.973628
According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL .
Organization
FireEye
0.960378
According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL .
Organization
B-Hack
0.774017
According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL .
Vulnerability
Microsoft Office vulnerabilities
0.887841
According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL .
Malware
LOWBALL
0.973628
According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL .
Organization
B-Hack
0.852179
The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP .
System
Dropbox
0.981636
The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP .
Malware
BUBBLEWRAP
0.949787
The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP .
Malware
B
0.31581
Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement .
Indicator
-Hack I-Ha
0.715077
Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement .
Indicator
- I
0.751592
Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement .
Malware
B-Hack
0.774287
Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement .
Organization
FireEye
0.974297
This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose .
Malware
B
0.719279
This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose .
Malware
Hack
0.767133
This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose .
Malware
B-Hack
0.583375
This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose .
Malware
B-Hack
0.710736
This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose .
Malware
MH370
0.912999
This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose .
Malware
Ha
0.799204
This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose .
Malware
B
0.802907
This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose .
Malware
Ha
0.823753
This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose .
Malware
Ha
0.470358
This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose .
Malware
Poison Ivy RAT
0.969063
The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- .
Malware
Win
0.849634
The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- .
System
HTTP
0.87924
The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- .
Malware
Helper
0.718672
The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- .
Malware
Poison Ivy RAT
0.969063
The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- .
Malware
Win
0.849634
The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- .
System
HTTP
0.87924
The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- .
Malware
Helper
0.718672
The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- .
Organization
FireEye
0.991103
FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
Malware
B-Hack I
0.83878
FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
Malware
Hack
0.882142
FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
Malware
Poison Ivy
0.696365
FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
Organization
B-
0.562104
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March .
Malware
Ha
0.492751
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March .
Organization
ck
0.544635
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March .
Malware
B-Hack
0.884683
Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack .
Malware
B-Hack
0.777664
Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack .
Malware
Ha
0.603568
Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack .
Malware
Ha
0.496734
Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack .
Organization
FireEye
0.988711
FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- .
Malware
B-Hack
0.782438
FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- .
Malware
B-Hack
0.751828
FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- .
Organization
B-Hack
0.790838
The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai .
Malware
B
0.595033
These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are .
Organization
-
0.577936
These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are .
Malware
Ha
0.711315
These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are .
Organization
ck
0.690098
These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are .
Malware
B
0.495747
These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are .
Organization
-
0.566055
These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are .
Malware
Ha
0.67856
These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are .
Organization
ck
0.749665
These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are .
Organization
B-Hack
0.803005
B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently .
Malware
BISCUIT
0.825483
B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently .
Malware
B-Hack
0.963537
While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT .
Malware
Poison Ivy
0.755209
While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT .
Malware
Gh0st RAT
0.804621
While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT .
Malware
B-Hack I-Hack I-Hack
0.935567
Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack .
Malware
B-Hack I-Hack I-Hack
0.948526
Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack .
System
B
0.510743
Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack .
Malware
Ha
0.338203
Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack .
End of preview. Expand in Data Studio
README.md exists but content is empty.
Downloads last month
6