Type
stringclasses 5
values | Text
stringlengths 1
77
| Fixed Text
stringlengths 1
78
| Score
float64 0.18
1
| Original Sentence ID
int64 0
663
| Original Sentence
stringlengths 823
2.47k
| Decoded Sentence
stringlengths 813
2.19k
| __index_level_0__
int64 0
16.6k
|
|---|---|---|---|---|---|---|---|
Malware
|
B
|
B-Hack
| 0.842463
| 0
|
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China . Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past . The B-Hack has targeted B- I- I- in the past . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer . We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command .
|
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors. The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China. Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past. The B-Hack has targeted B- I- I- in the past. In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television. In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television. In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-. The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B-. Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer. We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command.
| 0
|
Malware
|
Poison Ivy
|
Poison Ivy,
| 0.759196
| 0
|
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China . Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past . The B-Hack has targeted B- I- I- in the past . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer . We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command .
|
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors. The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China. Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past. The B-Hack has targeted B- I- I- in the past. In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television. In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television. In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-. The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B-. Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer. We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command.
| 2
|
Malware
|
B-Hack I-Hack I
|
B-Hack I-Hack I-Hack
| 0.677099
| 0
|
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China . Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past . The B-Hack has targeted B- I- I- in the past . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer . We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command .
|
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors. The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China. Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past. The B-Hack has targeted B- I- I- in the past. In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television. In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television. In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-. The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B-. Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer. We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command.
| 4
|
Malware
|
Hack
|
I-Hack
| 0.798637
| 0
|
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China . Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past . The B-Hack has targeted B- I- I- in the past . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer . We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command .
|
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors. The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China. Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past. The B-Hack has targeted B- I- I- in the past. In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television. In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television. In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-. The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B-. Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer. We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command.
| 6
|
Indicator
|
I
|
I-
| 0.65947
| 0
|
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China . Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past . The B-Hack has targeted B- I- I- in the past . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer . We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command .
|
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors. The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China. Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past. The B-Hack has targeted B- I- I- in the past. In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television. In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television. In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-. The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B-. Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer. We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command.
| 7
|
Malware
|
B-Hack I
|
B-Hack I-Hack
| 0.737819
| 0
|
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China . Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past . The B-Hack has targeted B- I- I- in the past . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer . We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command .
|
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors. The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China. Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past. The B-Hack has targeted B- I- I- in the past. In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television. In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television. In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-. The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B-. Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer. We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command.
| 11
|
Malware
|
LOWBALL
|
LOWBALL
| 0.980675
| 0
|
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China . Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past . The B-Hack has targeted B- I- I- in the past . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer . We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command .
|
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors. The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China. Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past. The B-Hack has targeted B- I- I- in the past. In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television. In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television. In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-. The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B-. Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer. We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command.
| 16
|
Indicator
|
upload.bat
|
upload.bat
| 0.674888
| 0
|
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China . Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past . The B-Hack has targeted B- I- I- in the past . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer . We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command .
|
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors. The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China. Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past. The B-Hack has targeted B- I- I- in the past. In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television. In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television. In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-. The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B-. Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer. We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command.
| 20
|
Malware
|
BUBBLEWRAP
|
BUBBLEWRAP
| 0.910917
| 0
|
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China . Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past . The B-Hack has targeted B- I- I- in the past . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer . We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command .
|
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors. The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China. Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past. The B-Hack has targeted B- I- I- in the past. In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television. In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television. In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-. The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B-. Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer. We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command.
| 23
|
Indicator
|
Backdoor.APT.FakeWinHTTPHelper
|
Backdoor.APT.FakeWinHTTPHelper)
| 0.796803
| 0
|
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China . Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past . The B-Hack has targeted B- I- I- in the past . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer . We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command .
|
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors. The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China. Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past. The B-Hack has targeted B- I- I- in the past. In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television. In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television. In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-. The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B-. Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer. We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command.
| 24
|
System
|
Dropbox
|
Dropbox
| 0.995472
| 0
|
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China . Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past . The B-Hack has targeted B- I- I- in the past . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer . We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command .
|
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors. The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China. Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past. The B-Hack has targeted B- I- I- in the past. In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television. In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television. In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-. The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B-. Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer. We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command.
| 25
|
Malware
|
BUBBLEWRAP
|
BUBBLEWRAP.
| 0.983197
| 1
|
We have previously observed the B-Hack I-Hack use BUBBLEWRAP . The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets . The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations . In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- .
|
We have previously observed the B-Hack I-Hack use BUBBLEWRAP. The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets. The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong. An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong. The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy. The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy. The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I-. The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I-. In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations. In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-.
| 28
|
Malware
|
LOWBALL
|
LOWBALL
| 0.992205
| 1
|
We have previously observed the B-Hack I-Hack use BUBBLEWRAP . The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets . The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations . In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- .
|
We have previously observed the B-Hack I-Hack use BUBBLEWRAP. The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets. The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong. An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong. The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy. The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy. The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I-. The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I-. In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations. In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-.
| 29
|
Malware
|
BUBBLEWRAP
|
BUBBLEWRAP
| 0.938959
| 1
|
We have previously observed the B-Hack I-Hack use BUBBLEWRAP . The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets . The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations . In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- .
|
We have previously observed the B-Hack I-Hack use BUBBLEWRAP. The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets. The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong. An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong. The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy. The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy. The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I-. The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I-. In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations. In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-.
| 30
|
Malware
|
Poison Ivy
|
Poison Ivy
| 0.882531
| 1
|
We have previously observed the B-Hack I-Hack use BUBBLEWRAP . The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets . The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations . In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- .
|
We have previously observed the B-Hack I-Hack use BUBBLEWRAP. The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets. The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong. An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong. The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy. The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy. The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I-. The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I-. In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations. In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-.
| 38
|
Malware
|
B
|
B-Hack
| 0.987141
| 1
|
We have previously observed the B-Hack I-Hack use BUBBLEWRAP . The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets . The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations . In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- .
|
We have previously observed the B-Hack I-Hack use BUBBLEWRAP. The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets. The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong. An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong. The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy. The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy. The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I-. The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I-. In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations. In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-.
| 41
|
Malware
|
B-Hack
|
B-Hack,
| 0.73144
| 1
|
We have previously observed the B-Hack I-Hack use BUBBLEWRAP . The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets . The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations . In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- .
|
We have previously observed the B-Hack I-Hack use BUBBLEWRAP. The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets. The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong. An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong. The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy. The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy. The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I-. The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I-. In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations. In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-.
| 44
|
Malware
|
B-Hack I-Hack
|
B-Hack I-Hack,
| 0.748079
| 1
|
We have previously observed the B-Hack I-Hack use BUBBLEWRAP . The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets . The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations . In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- .
|
We have previously observed the B-Hack I-Hack use BUBBLEWRAP. The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets. The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong. An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong. The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy. The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy. The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I-. The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I-. In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations. In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-.
| 45
|
Organization
|
FireEye
|
FireEye
| 0.981952
| 1
|
We have previously observed the B-Hack I-Hack use BUBBLEWRAP . The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets . The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations . In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- .
|
We have previously observed the B-Hack I-Hack use BUBBLEWRAP. The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets. The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong. An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong. The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy. The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy. The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I-. The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I-. In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations. In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-.
| 46
|
Malware
|
Poison Ivy RAT
|
Poison Ivy RAT
| 0.870152
| 1
|
We have previously observed the B-Hack I-Hack use BUBBLEWRAP . The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets . The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations . In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- .
|
We have previously observed the B-Hack I-Hack use BUBBLEWRAP. The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets. The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong. An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong. The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy. The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy. The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I-. The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I-. In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations. In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-.
| 48
|
System
|
Malaysia Airlines Flight MH370
|
Malaysia Airlines Flight MH370
| 0.807569
| 1
|
We have previously observed the B-Hack I-Hack use BUBBLEWRAP . The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets . The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations . In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- .
|
We have previously observed the B-Hack I-Hack use BUBBLEWRAP. The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets. The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong. An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong. The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy. The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy. The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I-. The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I-. In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations. In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-.
| 50
|
System
|
Malaysia Airlines Flight MH370
|
Malaysia Airlines Flight MH370
| 0.925088
| 2
|
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
|
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP. Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper.
| 52
|
Indicator
|
- I
|
B- I-.
| 0.590108
| 2
|
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
|
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP. Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper.
| 53
|
Malware
|
LOWBALL
|
LOWBALL.
| 0.989813
| 2
|
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
|
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP. Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper.
| 58
|
Organization
|
FireEye
|
FireEye,
| 0.972959
| 2
|
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
|
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP. Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper.
| 59
|
System
|
Microsoft Office
|
Microsoft Office
| 0.625747
| 2
|
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
|
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP. Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper.
| 61
|
Vulnerability
|
vulnerabilities
|
vulnerabilities
| 0.895214
| 2
|
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
|
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP. Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper.
| 62
|
Malware
|
B
|
B-Hack's
| 0.735661
| 2
|
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
|
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP. Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper.
| 64
|
System
|
Dropbox
|
Dropbox
| 0.995977
| 2
|
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
|
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP. Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper.
| 66
|
Malware
|
BUBBLEWRAP
|
BUBBLEWRAP.
| 0.946254
| 2
|
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
|
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP. Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper.
| 67
|
Indicator
|
- I
|
B- I-,
| 0.637247
| 2
|
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
|
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP. Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper.
| 69
|
Malware
|
B-Hack
|
B-Hack
| 0.758959
| 2
|
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
|
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP. Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper.
| 76
|
Malware
|
MH370
|
MH370-themed
| 0.662341
| 2
|
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
|
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP. Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper.
| 77
|
Indicator
|
I
|
I-
| 0.542928
| 2
|
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
|
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP. Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper.
| 79
|
Malware
|
B-Hack I-Hack
|
B-Hack I-Hack
| 0.832244
| 2
|
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
|
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP. Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper.
| 80
|
Malware
|
Poison Ivy RAT
|
Poison Ivy RAT
| 0.936333
| 2
|
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
|
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP. Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper.
| 82
|
Malware
|
WinHTTPHelper
|
WinHTTPHelper
| 0.872568
| 2
|
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
|
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP. Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper.
| 88
|
Malware
|
B
|
B-
| 0.803492
| 2
|
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
|
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP. Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper.
| 89
|
Malware
|
I
|
I-.
| 0.468197
| 2
|
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
|
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP. Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper.
| 91
|
Organization
|
FireEye
|
FireEye
| 0.984038
| 2
|
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
|
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP. Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper.
| 92
|
Malware
|
B-Hack I-Hack
|
B-Hack I-Hack's
| 0.826789
| 2
|
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
|
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP. Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper.
| 93
|
Malware
|
Poison Ivy
|
Poison Ivy:
| 0.941438
| 2
|
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
|
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP. Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper.
| 94
|
Malware
|
B
|
B-
| 0.891325
| 3
|
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai . These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . B-Hack were a highly prolific B-Hack I-Hack operating out of China . B-Hack is a China-based B-Hack I-Hack, active since mid-2006 .
|
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March. Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack. FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I-. The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai. These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are. B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently. While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT. Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack. B-Hack were a highly prolific B-Hack I-Hack operating out of China. B-Hack is a China-based B-Hack I-Hack, active since mid-2006.
| 96
|
Malware
|
I
|
I-
| 0.722438
| 3
|
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai . These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . B-Hack were a highly prolific B-Hack I-Hack operating out of China . B-Hack is a China-based B-Hack I-Hack, active since mid-2006 .
|
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March. Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack. FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I-. The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai. These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are. B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently. While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT. Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack. B-Hack were a highly prolific B-Hack I-Hack operating out of China. B-Hack is a China-based B-Hack I-Hack, active since mid-2006.
| 98
|
Malware
|
B-Hack I-Hack I-Hack
|
B-Hack I-Hack I-Hack.
| 0.897796
| 3
|
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai . These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . B-Hack were a highly prolific B-Hack I-Hack operating out of China . B-Hack is a China-based B-Hack I-Hack, active since mid-2006 .
|
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March. Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack. FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I-. The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai. These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are. B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently. While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT. Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack. B-Hack were a highly prolific B-Hack I-Hack operating out of China. B-Hack is a China-based B-Hack I-Hack, active since mid-2006.
| 100
|
Organization
|
FireEye
|
FireEye
| 0.974321
| 3
|
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai . These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . B-Hack were a highly prolific B-Hack I-Hack operating out of China . B-Hack is a China-based B-Hack I-Hack, active since mid-2006 .
|
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March. Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack. FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I-. The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai. These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are. B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently. While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT. Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack. B-Hack were a highly prolific B-Hack I-Hack operating out of China. B-Hack is a China-based B-Hack I-Hack, active since mid-2006.
| 101
|
Malware
|
B-Hack
|
B-Hack's
| 0.893538
| 3
|
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai . These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . B-Hack were a highly prolific B-Hack I-Hack operating out of China . B-Hack is a China-based B-Hack I-Hack, active since mid-2006 .
|
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March. Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack. FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I-. The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai. These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are. B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently. While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT. Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack. B-Hack were a highly prolific B-Hack I-Hack operating out of China. B-Hack is a China-based B-Hack I-Hack, active since mid-2006.
| 102
|
Indicator
|
I
|
I-.
| 0.519386
| 3
|
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai . These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . B-Hack were a highly prolific B-Hack I-Hack operating out of China . B-Hack is a China-based B-Hack I-Hack, active since mid-2006 .
|
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March. Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack. FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I-. The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai. These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are. B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently. While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT. Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack. B-Hack were a highly prolific B-Hack I-Hack operating out of China. B-Hack is a China-based B-Hack I-Hack, active since mid-2006.
| 104
|
Malware
|
BISCUIT
|
BISCUIT
| 0.862613
| 3
|
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai . These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . B-Hack were a highly prolific B-Hack I-Hack operating out of China . B-Hack is a China-based B-Hack I-Hack, active since mid-2006 .
|
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March. Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack. FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I-. The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai. These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are. B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently. While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT. Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack. B-Hack were a highly prolific B-Hack I-Hack operating out of China. B-Hack is a China-based B-Hack I-Hack, active since mid-2006.
| 111
|
Malware
|
B-Hack
|
B-Hack
| 0.930773
| 3
|
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai . These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . B-Hack were a highly prolific B-Hack I-Hack operating out of China . B-Hack is a China-based B-Hack I-Hack, active since mid-2006 .
|
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March. Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack. FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I-. The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai. These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are. B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently. While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT. Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack. B-Hack were a highly prolific B-Hack I-Hack operating out of China. B-Hack is a China-based B-Hack I-Hack, active since mid-2006.
| 112
|
Malware
|
Poison Ivy
|
Poison Ivy
| 0.982215
| 3
|
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai . These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . B-Hack were a highly prolific B-Hack I-Hack operating out of China . B-Hack is a China-based B-Hack I-Hack, active since mid-2006 .
|
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March. Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack. FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I-. The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai. These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are. B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently. While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT. Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack. B-Hack were a highly prolific B-Hack I-Hack operating out of China. B-Hack is a China-based B-Hack I-Hack, active since mid-2006.
| 113
|
Malware
|
Gh0st RAT
|
Gh0st RAT.
| 0.857019
| 3
|
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai . These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . B-Hack were a highly prolific B-Hack I-Hack operating out of China . B-Hack is a China-based B-Hack I-Hack, active since mid-2006 .
|
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March. Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack. FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I-. The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai. These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are. B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently. While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT. Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack. B-Hack were a highly prolific B-Hack I-Hack operating out of China. B-Hack is a China-based B-Hack I-Hack, active since mid-2006.
| 114
|
Malware
|
B-Hack I-Hack I-Hack
|
B-Hack I-Hack I-Hack,
| 0.940081
| 3
|
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai . These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . B-Hack were a highly prolific B-Hack I-Hack operating out of China . B-Hack is a China-based B-Hack I-Hack, active since mid-2006 .
|
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March. Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack. FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I-. The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai. These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are. B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently. While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT. Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack. B-Hack were a highly prolific B-Hack I-Hack operating out of China. B-Hack is a China-based B-Hack I-Hack, active since mid-2006.
| 115
|
Malware
|
B-Hack I-Hack I-Hack
|
B-Hack I-Hack I-Hack
| 0.927681
| 3
|
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai . These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . B-Hack were a highly prolific B-Hack I-Hack operating out of China . B-Hack is a China-based B-Hack I-Hack, active since mid-2006 .
|
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March. Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack. FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I-. The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai. These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are. B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently. While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT. Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack. B-Hack were a highly prolific B-Hack I-Hack operating out of China. B-Hack is a China-based B-Hack I-Hack, active since mid-2006.
| 116
|
Malware
|
B-Hack
|
B-Hack.
| 0.887859
| 3
|
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai . These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . B-Hack were a highly prolific B-Hack I-Hack operating out of China . B-Hack is a China-based B-Hack I-Hack, active since mid-2006 .
|
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March. Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack. FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I-. The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai. These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are. B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently. While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT. Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack. B-Hack were a highly prolific B-Hack I-Hack operating out of China. B-Hack is a China-based B-Hack I-Hack, active since mid-2006.
| 117
|
Malware
|
B-Hack I-Hack
|
B-Hack I-Hack
| 0.837088
| 3
|
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai . These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . B-Hack were a highly prolific B-Hack I-Hack operating out of China . B-Hack is a China-based B-Hack I-Hack, active since mid-2006 .
|
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March. Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack. FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I-. The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai. These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are. B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently. While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT. Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack. B-Hack were a highly prolific B-Hack I-Hack operating out of China. B-Hack is a China-based B-Hack I-Hack, active since mid-2006.
| 119
|
Malware
|
B-Hack I
|
B-Hack I-Hack,
| 0.820453
| 3
|
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai . These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . B-Hack were a highly prolific B-Hack I-Hack operating out of China . B-Hack is a China-based B-Hack I-Hack, active since mid-2006 .
|
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March. Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack. FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I-. The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai. These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are. B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently. While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT. Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack. B-Hack were a highly prolific B-Hack I-Hack operating out of China. B-Hack is a China-based B-Hack I-Hack, active since mid-2006.
| 121
|
Malware
|
Hack
|
I-Hack,
| 0.809488
| 3
|
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai . These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . B-Hack were a highly prolific B-Hack I-Hack operating out of China . B-Hack is a China-based B-Hack I-Hack, active since mid-2006 .
|
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March. Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack. FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I-. The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai. These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are. B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently. While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT. Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack. B-Hack were a highly prolific B-Hack I-Hack operating out of China. B-Hack is a China-based B-Hack I-Hack, active since mid-2006.
| 123
|
Malware
|
B-Hack
|
B-Hack's
| 0.699573
| 4
|
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack . From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families .
|
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals. Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE. However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack. From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server. Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158. FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset. They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors. A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B-. The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B-. About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families.
| 124
|
Organization
|
Arbor
|
Arbor
| 0.823305
| 4
|
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack . From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families .
|
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals. Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE. However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack. From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server. Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158. FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset. They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors. A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B-. The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B-. About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families.
| 125
|
Organization
|
FireEye
|
FireEye
| 0.984457
| 4
|
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack . From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families .
|
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals. Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE. However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack. From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server. Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158. FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset. They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors. A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B-. The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B-. About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families.
| 126
|
Malware
|
B-Hack
|
B-Hack
| 0.847108
| 4
|
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack . From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families .
|
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals. Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE. However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack. From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server. Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158. FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset. They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors. A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B-. The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B-. About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families.
| 127
|
Malware
|
HIGHTIDE
|
HIGHTIDE.
| 0.857273
| 4
|
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack . From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families .
|
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals. Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE. However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack. From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server. Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158. FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset. They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors. A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B-. The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B-. About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families.
| 128
|
Malware
|
B-Hack
|
B-Hack.
| 0.811271
| 4
|
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack . From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families .
|
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals. Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE. However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack. From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server. Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158. FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset. They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors. A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B-. The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B-. About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families.
| 131
|
Malware
|
RIPTIDE
|
RIPTIDE,
| 0.867159
| 4
|
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack . From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families .
|
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals. Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE. However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack. From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server. Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158. FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset. They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors. A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B-. The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B-. About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families.
| 134
|
End of preview. Expand
in Data Studio
README.md exists but content is empty.
- Downloads last month
- 1