Dataset Viewer
Auto-converted to Parquet Duplicate
Type
stringclasses
5 values
Text
stringlengths
1
77
Fixed Text
stringlengths
1
78
Score
float64
0.18
1
Original Sentence ID
int64
0
663
Original Sentence
stringlengths
823
2.47k
Decoded Sentence
stringlengths
813
2.19k
__index_level_0__
int64
0
16.6k
Malware
B
B-Hack
0.842463
0
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China . Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past . The B-Hack has targeted B- I- I- in the past . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer . We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command .
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors. The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China. Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past. The B-Hack has targeted B- I- I- in the past. In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television. In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television. In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-. The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B-. Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer. We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command.
0
Malware
Poison Ivy
Poison Ivy,
0.759196
0
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China . Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past . The B-Hack has targeted B- I- I- in the past . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer . We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command .
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors. The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China. Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past. The B-Hack has targeted B- I- I- in the past. In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television. In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television. In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-. The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B-. Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer. We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command.
2
Malware
B-Hack I-Hack I
B-Hack I-Hack I-Hack
0.677099
0
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China . Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past . The B-Hack has targeted B- I- I- in the past . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer . We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command .
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors. The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China. Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past. The B-Hack has targeted B- I- I- in the past. In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television. In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television. In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-. The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B-. Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer. We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command.
4
Malware
Hack
I-Hack
0.798637
0
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China . Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past . The B-Hack has targeted B- I- I- in the past . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer . We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command .
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors. The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China. Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past. The B-Hack has targeted B- I- I- in the past. In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television. In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television. In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-. The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B-. Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer. We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command.
6
Indicator
I
I-
0.65947
0
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China . Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past . The B-Hack has targeted B- I- I- in the past . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer . We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command .
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors. The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China. Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past. The B-Hack has targeted B- I- I- in the past. In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television. In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television. In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-. The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B-. Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer. We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command.
7
Malware
B-Hack I
B-Hack I-Hack
0.737819
0
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China . Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past . The B-Hack has targeted B- I- I- in the past . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer . We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command .
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors. The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China. Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past. The B-Hack has targeted B- I- I- in the past. In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television. In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television. In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-. The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B-. Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer. We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command.
11
Malware
LOWBALL
LOWBALL
0.980675
0
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China . Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past . The B-Hack has targeted B- I- I- in the past . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer . We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command .
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors. The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China. Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past. The B-Hack has targeted B- I- I- in the past. In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television. In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television. In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-. The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B-. Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer. We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command.
16
Indicator
upload.bat
upload.bat
0.674888
0
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China . Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past . The B-Hack has targeted B- I- I- in the past . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer . We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command .
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors. The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China. Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past. The B-Hack has targeted B- I- I- in the past. In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television. In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television. In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-. The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B-. Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer. We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command.
20
Malware
BUBBLEWRAP
BUBBLEWRAP
0.910917
0
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China . Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past . The B-Hack has targeted B- I- I- in the past . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer . We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command .
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors. The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China. Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past. The B-Hack has targeted B- I- I- in the past. In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television. In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television. In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-. The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B-. Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer. We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command.
23
Indicator
Backdoor.APT.FakeWinHTTPHelper
Backdoor.APT.FakeWinHTTPHelper)
0.796803
0
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China . Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past . The B-Hack has targeted B- I- I- in the past . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer . We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command .
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors. The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China. Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past. The B-Hack has targeted B- I- I- in the past. In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television. In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television. In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-. The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B-. Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer. We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command.
24
System
Dropbox
Dropbox
0.995472
0
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China . Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past . The B-Hack has targeted B- I- I- in the past . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer . We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command .
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors. The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China. Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past. The B-Hack has targeted B- I- I- in the past. In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television. In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television. In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-. The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B-. Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer. We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command.
25
Malware
BUBBLEWRAP
BUBBLEWRAP.
0.983197
1
We have previously observed the B-Hack I-Hack use BUBBLEWRAP . The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets . The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations . In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- .
We have previously observed the B-Hack I-Hack use BUBBLEWRAP. The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets. The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong. An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong. The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy. The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy. The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I-. The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I-. In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations. In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-.
28
Malware
LOWBALL
LOWBALL
0.992205
1
We have previously observed the B-Hack I-Hack use BUBBLEWRAP . The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets . The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations . In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- .
We have previously observed the B-Hack I-Hack use BUBBLEWRAP. The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets. The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong. An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong. The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy. The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy. The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I-. The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I-. In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations. In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-.
29
Malware
BUBBLEWRAP
BUBBLEWRAP
0.938959
1
We have previously observed the B-Hack I-Hack use BUBBLEWRAP . The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets . The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations . In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- .
We have previously observed the B-Hack I-Hack use BUBBLEWRAP. The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets. The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong. An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong. The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy. The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy. The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I-. The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I-. In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations. In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-.
30
Malware
Poison Ivy
Poison Ivy
0.882531
1
We have previously observed the B-Hack I-Hack use BUBBLEWRAP . The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets . The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations . In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- .
We have previously observed the B-Hack I-Hack use BUBBLEWRAP. The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets. The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong. An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong. The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy. The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy. The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I-. The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I-. In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations. In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-.
38
Malware
B
B-Hack
0.987141
1
We have previously observed the B-Hack I-Hack use BUBBLEWRAP . The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets . The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations . In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- .
We have previously observed the B-Hack I-Hack use BUBBLEWRAP. The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets. The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong. An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong. The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy. The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy. The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I-. The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I-. In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations. In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-.
41
Malware
B-Hack
B-Hack,
0.73144
1
We have previously observed the B-Hack I-Hack use BUBBLEWRAP . The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets . The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations . In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- .
We have previously observed the B-Hack I-Hack use BUBBLEWRAP. The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets. The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong. An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong. The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy. The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy. The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I-. The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I-. In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations. In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-.
44
Malware
B-Hack I-Hack
B-Hack I-Hack,
0.748079
1
We have previously observed the B-Hack I-Hack use BUBBLEWRAP . The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets . The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations . In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- .
We have previously observed the B-Hack I-Hack use BUBBLEWRAP. The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets. The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong. An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong. The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy. The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy. The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I-. The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I-. In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations. In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-.
45
Organization
FireEye
FireEye
0.981952
1
We have previously observed the B-Hack I-Hack use BUBBLEWRAP . The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets . The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations . In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- .
We have previously observed the B-Hack I-Hack use BUBBLEWRAP. The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets. The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong. An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong. The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy. The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy. The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I-. The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I-. In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations. In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-.
46
Malware
Poison Ivy RAT
Poison Ivy RAT
0.870152
1
We have previously observed the B-Hack I-Hack use BUBBLEWRAP . The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets . The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations . In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- .
We have previously observed the B-Hack I-Hack use BUBBLEWRAP. The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets. The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong. An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong. The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy. The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy. The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I-. The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I-. In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations. In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-.
48
System
Malaysia Airlines Flight MH370
Malaysia Airlines Flight MH370
0.807569
1
We have previously observed the B-Hack I-Hack use BUBBLEWRAP . The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets . The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations . In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- .
We have previously observed the B-Hack I-Hack use BUBBLEWRAP. The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets. The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong. An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong. The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy. The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy. The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I-. The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I-. In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations. In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-.
50
System
Malaysia Airlines Flight MH370
Malaysia Airlines Flight MH370
0.925088
2
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP. Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper.
52
Indicator
- I
B- I-.
0.590108
2
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP. Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper.
53
Malware
LOWBALL
LOWBALL.
0.989813
2
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP. Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper.
58
Organization
FireEye
FireEye,
0.972959
2
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP. Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper.
59
System
Microsoft Office
Microsoft Office
0.625747
2
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP. Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper.
61
Vulnerability
vulnerabilities
vulnerabilities
0.895214
2
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP. Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper.
62
Malware
B
B-Hack's
0.735661
2
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP. Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper.
64
System
Dropbox
Dropbox
0.995977
2
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP. Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper.
66
Malware
BUBBLEWRAP
BUBBLEWRAP.
0.946254
2
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP. Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper.
67
Indicator
- I
B- I-,
0.637247
2
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP. Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper.
69
Malware
B-Hack
B-Hack
0.758959
2
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP. Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper.
76
Malware
MH370
MH370-themed
0.662341
2
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP. Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper.
77
Indicator
I
I-
0.542928
2
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP. Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper.
79
Malware
B-Hack I-Hack
B-Hack I-Hack
0.832244
2
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP. Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper.
80
Malware
Poison Ivy RAT
Poison Ivy RAT
0.936333
2
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP. Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper.
82
Malware
WinHTTPHelper
WinHTTPHelper
0.872568
2
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP. Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper.
88
Malware
B
B-
0.803492
2
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP. Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper.
89
Malware
I
I-.
0.468197
2
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP. Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper.
91
Organization
FireEye
FireEye
0.984038
2
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP. Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper.
92
Malware
B-Hack I-Hack
B-Hack I-Hack's
0.826789
2
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP. Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper.
93
Malware
Poison Ivy
Poison Ivy:
0.941438
2
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP. Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper.
94
Malware
B
B-
0.891325
3
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai . These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . B-Hack were a highly prolific B-Hack I-Hack operating out of China . B-Hack is a China-based B-Hack I-Hack, active since mid-2006 .
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March. Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack. FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I-. The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai. These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are. B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently. While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT. Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack. B-Hack were a highly prolific B-Hack I-Hack operating out of China. B-Hack is a China-based B-Hack I-Hack, active since mid-2006.
96
Malware
I
I-
0.722438
3
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai . These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . B-Hack were a highly prolific B-Hack I-Hack operating out of China . B-Hack is a China-based B-Hack I-Hack, active since mid-2006 .
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March. Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack. FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I-. The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai. These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are. B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently. While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT. Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack. B-Hack were a highly prolific B-Hack I-Hack operating out of China. B-Hack is a China-based B-Hack I-Hack, active since mid-2006.
98
Malware
B-Hack I-Hack I-Hack
B-Hack I-Hack I-Hack.
0.897796
3
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai . These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . B-Hack were a highly prolific B-Hack I-Hack operating out of China . B-Hack is a China-based B-Hack I-Hack, active since mid-2006 .
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March. Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack. FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I-. The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai. These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are. B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently. While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT. Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack. B-Hack were a highly prolific B-Hack I-Hack operating out of China. B-Hack is a China-based B-Hack I-Hack, active since mid-2006.
100
Organization
FireEye
FireEye
0.974321
3
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai . These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . B-Hack were a highly prolific B-Hack I-Hack operating out of China . B-Hack is a China-based B-Hack I-Hack, active since mid-2006 .
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March. Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack. FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I-. The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai. These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are. B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently. While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT. Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack. B-Hack were a highly prolific B-Hack I-Hack operating out of China. B-Hack is a China-based B-Hack I-Hack, active since mid-2006.
101
Malware
B-Hack
B-Hack's
0.893538
3
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai . These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . B-Hack were a highly prolific B-Hack I-Hack operating out of China . B-Hack is a China-based B-Hack I-Hack, active since mid-2006 .
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March. Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack. FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I-. The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai. These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are. B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently. While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT. Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack. B-Hack were a highly prolific B-Hack I-Hack operating out of China. B-Hack is a China-based B-Hack I-Hack, active since mid-2006.
102
Indicator
I
I-.
0.519386
3
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai . These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . B-Hack were a highly prolific B-Hack I-Hack operating out of China . B-Hack is a China-based B-Hack I-Hack, active since mid-2006 .
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March. Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack. FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I-. The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai. These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are. B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently. While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT. Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack. B-Hack were a highly prolific B-Hack I-Hack operating out of China. B-Hack is a China-based B-Hack I-Hack, active since mid-2006.
104
Malware
BISCUIT
BISCUIT
0.862613
3
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai . These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . B-Hack were a highly prolific B-Hack I-Hack operating out of China . B-Hack is a China-based B-Hack I-Hack, active since mid-2006 .
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March. Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack. FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I-. The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai. These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are. B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently. While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT. Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack. B-Hack were a highly prolific B-Hack I-Hack operating out of China. B-Hack is a China-based B-Hack I-Hack, active since mid-2006.
111
Malware
B-Hack
B-Hack
0.930773
3
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai . These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . B-Hack were a highly prolific B-Hack I-Hack operating out of China . B-Hack is a China-based B-Hack I-Hack, active since mid-2006 .
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March. Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack. FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I-. The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai. These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are. B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently. While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT. Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack. B-Hack were a highly prolific B-Hack I-Hack operating out of China. B-Hack is a China-based B-Hack I-Hack, active since mid-2006.
112
Malware
Poison Ivy
Poison Ivy
0.982215
3
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai . These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . B-Hack were a highly prolific B-Hack I-Hack operating out of China . B-Hack is a China-based B-Hack I-Hack, active since mid-2006 .
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March. Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack. FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I-. The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai. These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are. B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently. While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT. Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack. B-Hack were a highly prolific B-Hack I-Hack operating out of China. B-Hack is a China-based B-Hack I-Hack, active since mid-2006.
113
Malware
Gh0st RAT
Gh0st RAT.
0.857019
3
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai . These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . B-Hack were a highly prolific B-Hack I-Hack operating out of China . B-Hack is a China-based B-Hack I-Hack, active since mid-2006 .
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March. Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack. FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I-. The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai. These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are. B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently. While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT. Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack. B-Hack were a highly prolific B-Hack I-Hack operating out of China. B-Hack is a China-based B-Hack I-Hack, active since mid-2006.
114
Malware
B-Hack I-Hack I-Hack
B-Hack I-Hack I-Hack,
0.940081
3
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai . These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . B-Hack were a highly prolific B-Hack I-Hack operating out of China . B-Hack is a China-based B-Hack I-Hack, active since mid-2006 .
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March. Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack. FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I-. The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai. These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are. B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently. While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT. Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack. B-Hack were a highly prolific B-Hack I-Hack operating out of China. B-Hack is a China-based B-Hack I-Hack, active since mid-2006.
115
Malware
B-Hack I-Hack I-Hack
B-Hack I-Hack I-Hack
0.927681
3
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai . These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . B-Hack were a highly prolific B-Hack I-Hack operating out of China . B-Hack is a China-based B-Hack I-Hack, active since mid-2006 .
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March. Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack. FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I-. The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai. These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are. B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently. While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT. Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack. B-Hack were a highly prolific B-Hack I-Hack operating out of China. B-Hack is a China-based B-Hack I-Hack, active since mid-2006.
116
Malware
B-Hack
B-Hack.
0.887859
3
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai . These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . B-Hack were a highly prolific B-Hack I-Hack operating out of China . B-Hack is a China-based B-Hack I-Hack, active since mid-2006 .
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March. Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack. FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I-. The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai. These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are. B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently. While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT. Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack. B-Hack were a highly prolific B-Hack I-Hack operating out of China. B-Hack is a China-based B-Hack I-Hack, active since mid-2006.
117
Malware
B-Hack I-Hack
B-Hack I-Hack
0.837088
3
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai . These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . B-Hack were a highly prolific B-Hack I-Hack operating out of China . B-Hack is a China-based B-Hack I-Hack, active since mid-2006 .
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March. Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack. FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I-. The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai. These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are. B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently. While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT. Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack. B-Hack were a highly prolific B-Hack I-Hack operating out of China. B-Hack is a China-based B-Hack I-Hack, active since mid-2006.
119
Malware
B-Hack I
B-Hack I-Hack,
0.820453
3
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai . These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . B-Hack were a highly prolific B-Hack I-Hack operating out of China . B-Hack is a China-based B-Hack I-Hack, active since mid-2006 .
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March. Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack. FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I-. The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai. These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are. B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently. While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT. Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack. B-Hack were a highly prolific B-Hack I-Hack operating out of China. B-Hack is a China-based B-Hack I-Hack, active since mid-2006.
121
Malware
Hack
I-Hack,
0.809488
3
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai . These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . B-Hack were a highly prolific B-Hack I-Hack operating out of China . B-Hack is a China-based B-Hack I-Hack, active since mid-2006 .
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March. Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack. FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I-. The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai. These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are. B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently. While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT. Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack. B-Hack were a highly prolific B-Hack I-Hack operating out of China. B-Hack is a China-based B-Hack I-Hack, active since mid-2006.
123
Malware
B-Hack
B-Hack's
0.699573
4
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack . From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families .
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals. Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE. However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack. From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server. Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158. FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset. They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors. A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B-. The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B-. About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families.
124
Organization
Arbor
Arbor
0.823305
4
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack . From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families .
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals. Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE. However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack. From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server. Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158. FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset. They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors. A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B-. The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B-. About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families.
125
Organization
FireEye
FireEye
0.984457
4
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack . From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families .
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals. Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE. However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack. From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server. Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158. FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset. They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors. A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B-. The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B-. About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families.
126
Malware
B-Hack
B-Hack
0.847108
4
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack . From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families .
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals. Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE. However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack. From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server. Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158. FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset. They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors. A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B-. The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B-. About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families.
127
Malware
HIGHTIDE
HIGHTIDE.
0.857273
4
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack . From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families .
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals. Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE. However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack. From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server. Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158. FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset. They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors. A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B-. The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B-. About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families.
128
Malware
B-Hack
B-Hack.
0.811271
4
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack . From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families .
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals. Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE. However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack. From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server. Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158. FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset. They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors. A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B-. The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B-. About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families.
131
Malware
RIPTIDE
RIPTIDE,
0.867159
4
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack . From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families .
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals. Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE. However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack. From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server. Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158. FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset. They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors. A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B-. The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B-. About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families.
134
End of preview. Expand in Data Studio
README.md exists but content is empty.
Downloads last month
1