Type
stringclasses
5 values
Text
stringlengths
1
70
Score
float64
0.17
1
Original Sentence
stringlengths
6
383
Malware
B-Hack
0.785716
B-Hack were a highly prolific B-Hack I-Hack operating out of China .
Malware
B
0.935241
B-Hack were a highly prolific B-Hack I-Hack operating out of China .
Malware
Ha
0.739531
B-Hack were a highly prolific B-Hack I-Hack operating out of China .
Malware
Ha
0.573745
B-Hack were a highly prolific B-Hack I-Hack operating out of China .
Malware
B-Hack
0.861203
B-Hack is a China-based B-Hack I-Hack, active since mid-2006 .
System
B
0.847392
B-Hack is a China-based B-Hack I-Hack, active since mid-2006 .
System
Hack
0.49579
B-Hack is a China-based B-Hack I-Hack, active since mid-2006 .
System
Ha
0.462108
B-Hack is a China-based B-Hack I-Hack, active since mid-2006 .
Malware
B-Hack
0.829563
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals .
Organization
Arbor
0.830469
Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE .
Organization
FireEye
0.98843
Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE .
Malware
B-Hack
0.841121
Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE .
Organization
B-Hack
0.484352
However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack .
Organization
FireEye
0.98697
From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server .
Malware
B-Hack
0.67049
From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server .
Malware
RIPTIDE
0.883725
From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server .
Malware
B-Hack
0.894439
Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 .
System
Microsoft Word (.doc
0.813062
Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 .
Vulnerability
CVE-2012-0158
0.659746
Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 .
Organization
FireEye
0.985713
FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset .
Malware
RIPTIDE
0.876574
FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset .
Malware
HIGHTIDE
0.846049
FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset .
Organization
B-Hack
0.917771
FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset .
Malware
Poison Ivy
0.788956
They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors .
Malware
B-Hack I-Hack I-Hack
0.560256
A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- .
Organization
FireEye
0.974788
A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- .
Malware
B-Hack
0.718617
A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- .
Indicator
(
0.370555
A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- .
Malware
I-Hack) I-Hack
0.633782
A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- .
Malware
B-Hack
0.72013
A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- .
Indicator
B- I- I- I-
0.93668
About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families .
Malware
B
0.738766
About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families .
Indicator
-
0.450572
About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families .
Malware
Ha
0.561421
About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families .
Indicator
Backdoor.APT.Aumlib
0.940962
About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families .
Indicator
Backdoor.APT.Ixeshe
0.945449
About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families .
Malware
B-Hack I-Hack
0.854498
With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc .
Malware
B-Hack I-Hack
0.868182
With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc .
Malware
B-Hack
0.577441
With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc .
System
B-
0.472066
With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc .
Malware
Hack
0.635523
With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc .
System
B-
0.557596
With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc .
Malware
Ha
0.47442
With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc .
System
ck I-
0.462968
With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc .
Malware
Hack
0.564015
With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc .
System
B
0.487888
With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc .
Malware
-Hack
0.579656
With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc .
Malware
B-Hack I-Hack
0.885449
B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc .
Malware
B
0.487542
B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc .
System
-
0.36291
B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc .
Malware
Hack
0.702592
B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc .
System
B-
0.458449
B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc .
Malware
Hack
0.68727
B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc .
System
B-
0.560635
B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc .
Malware
Ha
0.584832
B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc .
System
ck I-
0.589406
B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc .
Malware
Hack
0.547335
B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc .
System
B-
0.485762
B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc .
Malware
Hack
0.647364
B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc .
Malware
B-Hack
0.838782
The new B- mark the first significant stirrings from the B-Hack since it went silent in January in the wake of a detailed expose of the B-Hack and its exploits — and a retooling of what security researchers believe is a massive spying operation based in China .
Malware
B-Hack
0.865865
The new B- mark the first significant stirrings from the B-Hack since it went silent in January in the wake of a detailed expose of the B-Hack and its exploits — and a retooling of what security researchers believe is a massive spying operation based in China .
Organization
B-Hack
0.725603
Between November 26, 2015, and December 1, 2015, known and suspected China-based B-Hack launched several B- I- I- targeting Japan and Taiwan in the B-, B- I-, B- and B- I- I- .
Organization
B-Hack I-Hack
0.867914
Between November 26, 2015, and December 1, 2015, known and suspected China-based B-Hack I-Hack launched several B- I- I- targeting Japanese and Taiwanese organizations in the B-, B- I-, B- and B- I- I- .
Organization
B
0.704315
On November 26, 2015, a suspected China-based B-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I- .
Organization
Ha
0.410883
On November 26, 2015, a suspected China-based B-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I- .
Organization
B
0.456269
On November 26, 2015, a suspected China-based B-Hack I-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I- .
Indicator
-
0.447817
On November 26, 2015, a suspected China-based B-Hack I-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I- .
Malware
Hack I
0.437154
On November 26, 2015, a suspected China-based B-Hack I-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I- .
Indicator
-
0.345264
On November 26, 2015, a suspected China-based B-Hack I-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I- .
Malware
Ha
0.56956
On November 26, 2015, a suspected China-based B-Hack I-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I- .
Organization
ck
0.609931
On November 26, 2015, a suspected China-based B-Hack I-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I- .
System
B
0.475607
While attribution of the first two B- I- I- is still uncertain, we attribute the second December B- I- to the China-based B-Hack I-Hack that we refer to as B-Hack .
Malware
Ha
0.369595
While attribution of the first two B- I- I- is still uncertain, we attribute the second December B- I- to the China-based B-Hack I-Hack that we refer to as B-Hack .
Malware
B-Hack
0.40655
While attribution of the first two B- I- I- is still uncertain, we attribute the second December B- I- to the China-based B-Hack I-Hack that we refer to as B-Hack .
Malware
B-Hack
0.871437
On the same date that B-Hack targeted Taiwanese B-, suspected Chinese B-Hack I-Hack also targeted a Taiwanese B- I-, sending a lure document that contained instructions for registration and subsequent listing of goods on a local Taiwanese auction website .
Malware
B-Hack I-Hack
0.858308
On the same date that B-Hack targeted Taiwanese B-, suspected Chinese B-Hack I-Hack also targeted a Taiwanese B- I-, sending a lure document that contained instructions for registration and subsequent listing of goods on a local Taiwanese auction website .
Indicator
- I
0.702974
On the same date that B-Hack targeted Taiwanese B-, suspected Chinese B-Hack I-Hack also targeted a Taiwanese B- I-, sending a lure document that contained instructions for registration and subsequent listing of goods on a local Taiwanese auction website .
Organization
B-Hack
0.842659
It is possible, although not confirmed, that B-Hack was also responsible for targeting this B- I-, given both the timeframe and the use of the same n-day to eventually deploy the ELMER backdoor .
Malware
ELMER
0.868569
It is possible, although not confirmed, that B-Hack was also responsible for targeting this B- I-, given both the timeframe and the use of the same n-day to eventually deploy the ELMER backdoor .
Indicator
I
0.5906
Despite the differing sponsorship, penetration of Hong Kong and Taiwan-based B- I- continues to be a priority for China-based B-Hack .
Organization
B-Hack
0.722606
Despite the differing sponsorship, penetration of Hong Kong and Taiwan-based B- I- continues to be a priority for China-based B-Hack .
Organization
B-Hack
0.869961
B-Hack was embedding the encoded CnC IP address for the BLACKCOFFEE malware in legitimate Microsoft TechNet profiles pages and forum threads, a method some in the information security community call a " dead drop resolver " .
Malware
BLACKCOFFEE
0.97311
B-Hack was embedding the encoded CnC IP address for the BLACKCOFFEE malware in legitimate Microsoft TechNet profiles pages and forum threads, a method some in the information security community call a " dead drop resolver " .
Organization
Microsoft TechNet
0.979214
B-Hack was embedding the encoded CnC IP address for the BLACKCOFFEE malware in legitimate Microsoft TechNet profiles pages and forum threads, a method some in the information security community call a " dead drop resolver " .
Malware
B-Hack
0.904483
B-Hack, also known as B-Hack, is a China-based B-Hack I-Hack that FireEye Intelligence has observed conducting network intrusions against U.S.
Malware
B-Hack
0.867612
B-Hack, also known as B-Hack, is a China-based B-Hack I-Hack that FireEye Intelligence has observed conducting network intrusions against U.S.
Malware
B-Hack I-Ha
0.781358
B-Hack, also known as B-Hack, is a China-based B-Hack I-Hack that FireEye Intelligence has observed conducting network intrusions against U.S.
Organization
FireEye Intelligence
0.990066
B-Hack, also known as B-Hack, is a China-based B-Hack I-Hack that FireEye Intelligence has observed conducting network intrusions against U.S.
Organization
FireEye
0.986303
FireEye has monitored B-Hack's use of BLACKCOFFEE variants since 2013 to masquerade malicious communication as normal web traffic by disguising the CnC communication as queries to web search engines .
Organization
B-Hack
0.945064
FireEye has monitored B-Hack's use of BLACKCOFFEE variants since 2013 to masquerade malicious communication as normal web traffic by disguising the CnC communication as queries to web search engines .
Malware
BLACKCOFFEE
0.863672
FireEye has monitored B-Hack's use of BLACKCOFFEE variants since 2013 to masquerade malicious communication as normal web traffic by disguising the CnC communication as queries to web search engines .
Malware
BLACKCOFFEE
0.85537
The use of BLACKCOFFEE demonstrates B-Hack's evolving use of public websites to hide in plain sight .
Organization
B-Hack
0.886053
The use of BLACKCOFFEE demonstrates B-Hack's evolving use of public websites to hide in plain sight .
Malware
B-Hack
0.899165
B-Hack is a stealthy and extremely successful B-Hack I-Hack I-Hack (B-Hack) I-Hack known to target a broad range of verticals since at least 2009, including B-, B-, B-, B- I- I-, B-, B-, and B- I- .
Malware
B-Hack I-Hack I-Hack
0.854234
B-Hack is a stealthy and extremely successful B-Hack I-Hack I-Hack (B-Hack) I-Hack known to target a broad range of verticals since at least 2009, including B-, B-, B-, B- I- I-, B-, B-, and B- I- .
Malware
B-Hack)
0.893988
B-Hack is a stealthy and extremely successful B-Hack I-Hack I-Hack (B-Hack) I-Hack known to target a broad range of verticals since at least 2009, including B-, B-, B-, B- I- I-, B-, B-, and B- I- .
Malware
Ha
0.885499
B-Hack is a stealthy and extremely successful B-Hack I-Hack I-Hack (B-Hack) I-Hack known to target a broad range of verticals since at least 2009, including B-, B-, B-, B- I- I-, B-, B-, and B- I- .
Indicator
cdLoader
0.741663
The B-Hack then installed the hcdLoader RAT, which installs as a Windows service and provides command line access to the compromised system .
System
Windows
0.995523
The B-Hack then installed the hcdLoader RAT, which installs as a Windows service and provides command line access to the compromised system .
Malware
B-Hack I-Hack
0.857273
The malware used by the B-Hack I-Hack has ties to the HTTPBrowser malware family, and uses DNS requests as a command and control mechanism .