Type stringclasses 5
values | Text stringlengths 1 70 | Score float64 0.17 1 | Original Sentence stringlengths 6 383 |
|---|---|---|---|
Malware | B-Hack | 0.785716 | B-Hack were a highly prolific B-Hack I-Hack operating out of China . |
Malware | B | 0.935241 | B-Hack were a highly prolific B-Hack I-Hack operating out of China . |
Malware | Ha | 0.739531 | B-Hack were a highly prolific B-Hack I-Hack operating out of China . |
Malware | Ha | 0.573745 | B-Hack were a highly prolific B-Hack I-Hack operating out of China . |
Malware | B-Hack | 0.861203 | B-Hack is a China-based B-Hack I-Hack, active since mid-2006 . |
System | B | 0.847392 | B-Hack is a China-based B-Hack I-Hack, active since mid-2006 . |
System | Hack | 0.49579 | B-Hack is a China-based B-Hack I-Hack, active since mid-2006 . |
System | Ha | 0.462108 | B-Hack is a China-based B-Hack I-Hack, active since mid-2006 . |
Malware | B-Hack | 0.829563 | B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . |
Organization | Arbor | 0.830469 | Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . |
Organization | FireEye | 0.98843 | Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . |
Malware | B-Hack | 0.841121 | Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . |
Organization | B-Hack | 0.484352 | However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack . |
Organization | FireEye | 0.98697 | From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . |
Malware | B-Hack | 0.67049 | From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . |
Malware | RIPTIDE | 0.883725 | From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . |
Malware | B-Hack | 0.894439 | Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . |
System | Microsoft Word (.doc | 0.813062 | Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . |
Vulnerability | CVE-2012-0158 | 0.659746 | Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . |
Organization | FireEye | 0.985713 | FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . |
Malware | RIPTIDE | 0.876574 | FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . |
Malware | HIGHTIDE | 0.846049 | FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . |
Organization | B-Hack | 0.917771 | FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . |
Malware | Poison Ivy | 0.788956 | They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . |
Malware | B-Hack I-Hack I-Hack | 0.560256 | A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . |
Organization | FireEye | 0.974788 | A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . |
Malware | B-Hack | 0.718617 | A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . |
Indicator | ( | 0.370555 | A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . |
Malware | I-Hack) I-Hack | 0.633782 | A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . |
Malware | B-Hack | 0.72013 | A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . |
Indicator | B- I- I- I- | 0.93668 | About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families . |
Malware | B | 0.738766 | About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families . |
Indicator | - | 0.450572 | About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families . |
Malware | Ha | 0.561421 | About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families . |
Indicator | Backdoor.APT.Aumlib | 0.940962 | About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families . |
Indicator | Backdoor.APT.Ixeshe | 0.945449 | About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families . |
Malware | B-Hack I-Hack | 0.854498 | With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc . |
Malware | B-Hack I-Hack | 0.868182 | With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc . |
Malware | B-Hack | 0.577441 | With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc . |
System | B- | 0.472066 | With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc . |
Malware | Hack | 0.635523 | With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc . |
System | B- | 0.557596 | With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc . |
Malware | Ha | 0.47442 | With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc . |
System | ck I- | 0.462968 | With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc . |
Malware | Hack | 0.564015 | With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc . |
System | B | 0.487888 | With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc . |
Malware | -Hack | 0.579656 | With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc . |
Malware | B-Hack I-Hack | 0.885449 | B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc . |
Malware | B | 0.487542 | B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc . |
System | - | 0.36291 | B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc . |
Malware | Hack | 0.702592 | B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc . |
System | B- | 0.458449 | B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc . |
Malware | Hack | 0.68727 | B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc . |
System | B- | 0.560635 | B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc . |
Malware | Ha | 0.584832 | B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc . |
System | ck I- | 0.589406 | B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc . |
Malware | Hack | 0.547335 | B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc . |
System | B- | 0.485762 | B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc . |
Malware | Hack | 0.647364 | B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc . |
Malware | B-Hack | 0.838782 | The new B- mark the first significant stirrings from the B-Hack since it went silent in January in the wake of a detailed expose of the B-Hack and its exploits — and a retooling of what security researchers believe is a massive spying operation based in China . |
Malware | B-Hack | 0.865865 | The new B- mark the first significant stirrings from the B-Hack since it went silent in January in the wake of a detailed expose of the B-Hack and its exploits — and a retooling of what security researchers believe is a massive spying operation based in China . |
Organization | B-Hack | 0.725603 | Between November 26, 2015, and December 1, 2015, known and suspected China-based B-Hack launched several B- I- I- targeting Japan and Taiwan in the B-, B- I-, B- and B- I- I- . |
Organization | B-Hack I-Hack | 0.867914 | Between November 26, 2015, and December 1, 2015, known and suspected China-based B-Hack I-Hack launched several B- I- I- targeting Japanese and Taiwanese organizations in the B-, B- I-, B- and B- I- I- . |
Organization | B | 0.704315 | On November 26, 2015, a suspected China-based B-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I- . |
Organization | Ha | 0.410883 | On November 26, 2015, a suspected China-based B-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I- . |
Organization | B | 0.456269 | On November 26, 2015, a suspected China-based B-Hack I-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I- . |
Indicator | - | 0.447817 | On November 26, 2015, a suspected China-based B-Hack I-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I- . |
Malware | Hack I | 0.437154 | On November 26, 2015, a suspected China-based B-Hack I-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I- . |
Indicator | - | 0.345264 | On November 26, 2015, a suspected China-based B-Hack I-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I- . |
Malware | Ha | 0.56956 | On November 26, 2015, a suspected China-based B-Hack I-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I- . |
Organization | ck | 0.609931 | On November 26, 2015, a suspected China-based B-Hack I-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I- . |
System | B | 0.475607 | While attribution of the first two B- I- I- is still uncertain, we attribute the second December B- I- to the China-based B-Hack I-Hack that we refer to as B-Hack . |
Malware | Ha | 0.369595 | While attribution of the first two B- I- I- is still uncertain, we attribute the second December B- I- to the China-based B-Hack I-Hack that we refer to as B-Hack . |
Malware | B-Hack | 0.40655 | While attribution of the first two B- I- I- is still uncertain, we attribute the second December B- I- to the China-based B-Hack I-Hack that we refer to as B-Hack . |
Malware | B-Hack | 0.871437 | On the same date that B-Hack targeted Taiwanese B-, suspected Chinese B-Hack I-Hack also targeted a Taiwanese B- I-, sending a lure document that contained instructions for registration and subsequent listing of goods on a local Taiwanese auction website . |
Malware | B-Hack I-Hack | 0.858308 | On the same date that B-Hack targeted Taiwanese B-, suspected Chinese B-Hack I-Hack also targeted a Taiwanese B- I-, sending a lure document that contained instructions for registration and subsequent listing of goods on a local Taiwanese auction website . |
Indicator | - I | 0.702974 | On the same date that B-Hack targeted Taiwanese B-, suspected Chinese B-Hack I-Hack also targeted a Taiwanese B- I-, sending a lure document that contained instructions for registration and subsequent listing of goods on a local Taiwanese auction website . |
Organization | B-Hack | 0.842659 | It is possible, although not confirmed, that B-Hack was also responsible for targeting this B- I-, given both the timeframe and the use of the same n-day to eventually deploy the ELMER backdoor . |
Malware | ELMER | 0.868569 | It is possible, although not confirmed, that B-Hack was also responsible for targeting this B- I-, given both the timeframe and the use of the same n-day to eventually deploy the ELMER backdoor . |
Indicator | I | 0.5906 | Despite the differing sponsorship, penetration of Hong Kong and Taiwan-based B- I- continues to be a priority for China-based B-Hack . |
Organization | B-Hack | 0.722606 | Despite the differing sponsorship, penetration of Hong Kong and Taiwan-based B- I- continues to be a priority for China-based B-Hack . |
Organization | B-Hack | 0.869961 | B-Hack was embedding the encoded CnC IP address for the BLACKCOFFEE malware in legitimate Microsoft TechNet profiles pages and forum threads, a method some in the information security community call a " dead drop resolver " . |
Malware | BLACKCOFFEE | 0.97311 | B-Hack was embedding the encoded CnC IP address for the BLACKCOFFEE malware in legitimate Microsoft TechNet profiles pages and forum threads, a method some in the information security community call a " dead drop resolver " . |
Organization | Microsoft TechNet | 0.979214 | B-Hack was embedding the encoded CnC IP address for the BLACKCOFFEE malware in legitimate Microsoft TechNet profiles pages and forum threads, a method some in the information security community call a " dead drop resolver " . |
Malware | B-Hack | 0.904483 | B-Hack, also known as B-Hack, is a China-based B-Hack I-Hack that FireEye Intelligence has observed conducting network intrusions against U.S. |
Malware | B-Hack | 0.867612 | B-Hack, also known as B-Hack, is a China-based B-Hack I-Hack that FireEye Intelligence has observed conducting network intrusions against U.S. |
Malware | B-Hack I-Ha | 0.781358 | B-Hack, also known as B-Hack, is a China-based B-Hack I-Hack that FireEye Intelligence has observed conducting network intrusions against U.S. |
Organization | FireEye Intelligence | 0.990066 | B-Hack, also known as B-Hack, is a China-based B-Hack I-Hack that FireEye Intelligence has observed conducting network intrusions against U.S. |
Organization | FireEye | 0.986303 | FireEye has monitored B-Hack's use of BLACKCOFFEE variants since 2013 to masquerade malicious communication as normal web traffic by disguising the CnC communication as queries to web search engines . |
Organization | B-Hack | 0.945064 | FireEye has monitored B-Hack's use of BLACKCOFFEE variants since 2013 to masquerade malicious communication as normal web traffic by disguising the CnC communication as queries to web search engines . |
Malware | BLACKCOFFEE | 0.863672 | FireEye has monitored B-Hack's use of BLACKCOFFEE variants since 2013 to masquerade malicious communication as normal web traffic by disguising the CnC communication as queries to web search engines . |
Malware | BLACKCOFFEE | 0.85537 | The use of BLACKCOFFEE demonstrates B-Hack's evolving use of public websites to hide in plain sight . |
Organization | B-Hack | 0.886053 | The use of BLACKCOFFEE demonstrates B-Hack's evolving use of public websites to hide in plain sight . |
Malware | B-Hack | 0.899165 | B-Hack is a stealthy and extremely successful B-Hack I-Hack I-Hack (B-Hack) I-Hack known to target a broad range of verticals since at least 2009, including B-, B-, B-, B- I- I-, B-, B-, and B- I- . |
Malware | B-Hack I-Hack I-Hack | 0.854234 | B-Hack is a stealthy and extremely successful B-Hack I-Hack I-Hack (B-Hack) I-Hack known to target a broad range of verticals since at least 2009, including B-, B-, B-, B- I- I-, B-, B-, and B- I- . |
Malware | B-Hack) | 0.893988 | B-Hack is a stealthy and extremely successful B-Hack I-Hack I-Hack (B-Hack) I-Hack known to target a broad range of verticals since at least 2009, including B-, B-, B-, B- I- I-, B-, B-, and B- I- . |
Malware | Ha | 0.885499 | B-Hack is a stealthy and extremely successful B-Hack I-Hack I-Hack (B-Hack) I-Hack known to target a broad range of verticals since at least 2009, including B-, B-, B-, B- I- I-, B-, B-, and B- I- . |
Indicator | cdLoader | 0.741663 | The B-Hack then installed the hcdLoader RAT, which installs as a Windows service and provides command line access to the compromised system . |
System | Windows | 0.995523 | The B-Hack then installed the hcdLoader RAT, which installs as a Windows service and provides command line access to the compromised system . |
Malware | B-Hack I-Hack | 0.857273 | The malware used by the B-Hack I-Hack has ties to the HTTPBrowser malware family, and uses DNS requests as a command and control mechanism . |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.