Type stringclasses 5
values | Text stringlengths 1 70 | Score float64 0.17 1 | Original Sentence stringlengths 6 383 |
|---|---|---|---|
Malware | HTTP | 0.765342 | The malware used by the B-Hack I-Hack has ties to the HTTPBrowser malware family, and uses DNS requests as a command and control mechanism . |
System | B | 0.399496 | The malware used by the B-Hack I-Hack has ties to the HTTPBrowser malware family, and uses DNS requests as a command and control mechanism . |
Malware | ser | 0.428446 | The malware used by the B-Hack I-Hack has ties to the HTTPBrowser malware family, and uses DNS requests as a command and control mechanism . |
Malware | HTTPBrowser | 0.376543 | These URIs result in the download of an installer, which creates a PE of the malware typically known as HTTPBrowser, but called Token Control by the B-Hack I-Hack themselves (based upon the PDB strings found within many of the samples). |
Malware | B-Hack | 0.808561 | B-Hack seemed to be going after B- I- I-, Chinese dissident groups and B-, B-, B- and B- I- that could benefit the Chinese economy . |
Malware | B-Hack | 0.818209 | B-Hack seemed to be going after B- I- I-, Chinese dissident groups and other B- target, as well as certain B- targets and other B- targets in B- and B- I- that could benefit the Chinese economy . |
Malware | B-Hack I-Hack | 0.901771 | B-Hack I-Hack (also known as B-Hack or B-Hack I-Hack) is a separate Russian-based B-Hack I-Hack, which has been active since mid 2000s, and has been responsible for targeted B- I- against the B-, B-, B-, B- and B- I- . |
Malware | B-Hack | 0.859877 | B-Hack I-Hack (also known as B-Hack or B-Hack I-Hack) is a separate Russian-based B-Hack I-Hack, which has been active since mid 2000s, and has been responsible for targeted B- I- against the B-, B-, B-, B- and B- I- . |
Malware | B-Hack I-Hack | 0.819772 | B-Hack I-Hack (also known as B-Hack or B-Hack I-Hack) is a separate Russian-based B-Hack I-Hack, which has been active since mid 2000s, and has been responsible for targeted B- I- against the B-, B-, B-, B- and B- I- . |
Malware | B-Hack | 0.752822 | B-Hack I-Hack (also known as B-Hack or B-Hack I-Hack) is a separate Russian-based B-Hack I-Hack, which has been active since mid 2000s, and has been responsible for targeted B- I- against the B-, B-, B-, B- and B- I- . |
Malware | Ha | 0.738855 | B-Hack I-Hack (also known as B-Hack or B-Hack I-Hack) is a separate Russian-based B-Hack I-Hack, which has been active since mid 2000s, and has been responsible for targeted B- I- against the B-, B-, B-, B- and B- I- . |
Malware | APT28 | 0.933793 | APT28 malware, in particular the family of modular backdoors that we call CHOPSTICK, indicates a formal code development environment . |
Malware | CHOPSTICK | 0.931774 | APT28 malware, in particular the family of modular backdoors that we call CHOPSTICK, indicates a formal code development environment . |
Malware | B-Hack | 0.646303 | However, three themes in B-Hack's targeting clearly reflects areas of specific interest to an Eastern European B-, most likely the Russian government . |
Malware | B-Hack | 0.85095 | We identified three themes in B-Hack's lures and registered domains, which together are particularly relevant to the Russian government . |
Organization | NATO | 0.738313 | cooperation and NATO, provide a strong incentive for Russian state-sponsored B-Hack I-Hack to steal information that sheds light on these topics . |
Organization | B | 0.963482 | cooperation and NATO, provide a strong incentive for Russian state-sponsored B-Hack I-Hack to steal information that sheds light on these topics . |
Indicator | -Ha | 0.384945 | cooperation and NATO, provide a strong incentive for Russian state-sponsored B-Hack I-Hack to steal information that sheds light on these topics . |
Organization | ck | 0.424073 | cooperation and NATO, provide a strong incentive for Russian state-sponsored B-Hack I-Hack to steal information that sheds light on these topics . |
Indicator | I-Ha | 0.568213 | cooperation and NATO, provide a strong incentive for Russian state-sponsored B-Hack I-Hack to steal information that sheds light on these topics . |
Organization | ck | 0.651402 | cooperation and NATO, provide a strong incentive for Russian state-sponsored B-Hack I-Hack to steal information that sheds light on these topics . |
Malware | B-Hack I-Hack | 0.738282 | Instead, we observed the two Russian B-Hack I-Hack compromise the same systems and engage separately in the theft of identical credentials . |
Organization | B-Hack | 0.756355 | B-Hack's malware settings suggest that the developers have done the majority of their work in a Russian language build environment during Russian business hours, which suggests that the Russian government is B-Hack's sponsor . |
Organization | B-Hack | 0.780971 | B-Hack's malware settings suggest that the developers have done the majority of their work in a Russian language build environment during Russian business hours, which suggests that the Russian government is B-Hack's sponsor . |
Organization | B-Hack | 0.80172 | We believe that B-Hack's targeting of the MOD aligns with Russian threat perceptions . |
Malware | B-Hack | 0.833219 | We assess that B-Hack is most likely sponsored by the Russian government . |
Malware | B-Hack | 0.70961 | Given the available data, we assess that B-Hack's work is sponsored by the Russian government . |
Malware | B-Hack | 0.653712 | Some of B-Hack's more commonly used tools are the SOURFACE downloader, its second stage backdoor EVILTOSS, and a modular family of implants that we call CHOPSTICK . |
Malware | SOURFACE | 0.905016 | Some of B-Hack's more commonly used tools are the SOURFACE downloader, its second stage backdoor EVILTOSS, and a modular family of implants that we call CHOPSTICK . |
Malware | EVILTOS | 0.833851 | Some of B-Hack's more commonly used tools are the SOURFACE downloader, its second stage backdoor EVILTOSS, and a modular family of implants that we call CHOPSTICK . |
Malware | CHOPSTICK | 0.889016 | Some of B-Hack's more commonly used tools are the SOURFACE downloader, its second stage backdoor EVILTOSS, and a modular family of implants that we call CHOPSTICK . |
Malware | B-Hack | 0.731321 | While B-Hack continues to primarily threaten organizations and individuals operating in Russia and former Soviet states, this B- illustrates its willingness to expand its scope to other targets that have intelligence of interest to the Russian government . |
Organization | CTU | 0.902411 | CTU researchers assess with moderate confidence that the B-Hack is operating from the Russian Federation and is gathering intelligence on behalf of the Russian government . |
Malware | B-Hack | 0.810702 | CTU researchers assess with moderate confidence that the B-Hack is operating from the Russian Federation and is gathering intelligence on behalf of the Russian government . |
Malware | B-Hack | 0.893184 | Our visibility into the operations of B-Hack - a B-Hack we believe the Russian Government sponsors - has given us insight into some of the B-'s targets, as well as its objectives and the B- designed to further them . |
Organization | B-Hack | 0.862674 | Since at least 2007, B-Hack has engaged in extensive operations in support of Russian strategic interests . |
Indicator | I | 0.508638 | B- I- I- has primarily targeted entities in the U.S., Europe, and the countries of the former Soviet Union, including B-, B-, B- I-, B- I-, and B- and B- opposed to the current Russian Government . |
Indicator | I | 0.557935 | B- I- I- has primarily targeted entities in the U.S., Europe, and the countries of the former Soviet Union, including B- and B-, B- I-, B- I-, and B- and B- opposed to the current Russian Government . |
Malware | B-Ha | 0.558343 | Over the past two years, Russia appears to have increasingly leveraged B-Hack to conduct information operations commensurate with broader strategic military doctrine . |
Organization | ck | 0.417479 | Over the past two years, Russia appears to have increasingly leveraged B-Hack to conduct information operations commensurate with broader strategic military doctrine . |
Malware | B-Hack | 0.582398 | After compromising a victim organization, B-Hack will steal internal data that is then leaked to further political narratives aligned with Russian interests . |
Malware | B | 0.94751 | After compromising a B- I-, B-Hack will steal internal data . |
Malware | Hack | 0.572324 | After compromising a B- I-, B-Hack will steal internal data . |
Organization | Department of Homeland Security | 0.926802 | On December 29, 2016, the Department of Homeland Security (DHS) and Federal Bureau of Investigation (FBI) released a Joint Analysis Report confirming FireEye's long held public assessment that the Russian Government sponsors B-Hack . |
Organization | DHS | 0.733731 | On December 29, 2016, the Department of Homeland Security (DHS) and Federal Bureau of Investigation (FBI) released a Joint Analysis Report confirming FireEye's long held public assessment that the Russian Government sponsors B-Hack . |
Organization | Federal Bureau of Investigation | 0.970731 | On December 29, 2016, the Department of Homeland Security (DHS) and Federal Bureau of Investigation (FBI) released a Joint Analysis Report confirming FireEye's long held public assessment that the Russian Government sponsors B-Hack . |
Organization | FBI | 0.95777 | On December 29, 2016, the Department of Homeland Security (DHS) and Federal Bureau of Investigation (FBI) released a Joint Analysis Report confirming FireEye's long held public assessment that the Russian Government sponsors B-Hack . |
Organization | FireEye | 0.967372 | On December 29, 2016, the Department of Homeland Security (DHS) and Federal Bureau of Investigation (FBI) released a Joint Analysis Report confirming FireEye's long held public assessment that the Russian Government sponsors B-Hack . |
Malware | B-Hack | 0.838668 | On December 29, 2016, the Department of Homeland Security (DHS) and Federal Bureau of Investigation (FBI) released a Joint Analysis Report confirming FireEye's long held public assessment that the Russian Government sponsors B-Hack . |
Organization | FireEye | 0.984466 | In October 2014, FireEye released B-Hack: A Window into Russia's B- I- I-, and characterized B-Hack's B- as aligning with the Russian Government's strategic intelligence requirements . |
Malware | B-Hack | 0.958432 | In October 2014, FireEye released B-Hack: A Window into Russia's B- I- I-, and characterized B-Hack's B- as aligning with the Russian Government's strategic intelligence requirements . |
Malware | B-Hack | 0.957377 | In October 2014, FireEye released B-Hack: A Window into Russia's B- I- I-, and characterized B-Hack's B- as aligning with the Russian Government's strategic intelligence requirements . |
Organization | FireEye | 0.98397 | In October 2014, FireEye released B-Hack: A Window into Russia's Cyber Espionage Operations', and characterized B-Hack's B- as aligning with the Russian Government's strategic intelligence requirements . |
Malware | B-Hack | 0.945739 | In October 2014, FireEye released B-Hack: A Window into Russia's Cyber Espionage Operations', and characterized B-Hack's B- as aligning with the Russian Government's strategic intelligence requirements . |
Malware | B-Hack | 0.933255 | In October 2014, FireEye released B-Hack: A Window into Russia's Cyber Espionage Operations', and characterized B-Hack's B- as aligning with the Russian Government's strategic intelligence requirements . |
Malware | B-Hack | 0.906695 | B-Hack targets Russian B- and B- Pussy Riot via spear-phishing emails . |
Malware | Pussy Rio | 0.87156 | B-Hack targets Russian B- and B- Pussy Riot via spear-phishing emails . |
Organization | B-Hack | 0.897298 | Our investigation of B-Hack's compromise of WADA's network, and our observations of the surrounding events reveal how Russia sought to counteract a damaging narrative and delegitimize the institutions leveling criticism . |
Organization | WADA | 0.767432 | Our investigation of B-Hack's compromise of WADA's network, and our observations of the surrounding events reveal how Russia sought to counteract a damaging narrative and delegitimize the institutions leveling criticism . |
Malware | B-Hack | 0.87444 | Since releasing our 2014 report, we continue to assess that B-Hack is sponsored by the Russian Government . |
Malware | B-Hack | 0.863079 | In our 2014 report, we identified B-Hack as a suspected Russian government-sponsored B-Hack I-Hack . |
Malware | B-Hack I-Hack | 0.814558 | In our 2014 report, we identified B-Hack as a suspected Russian government-sponsored B-Hack I-Hack . |
Organization | Department of Homeland Security (DHS | 0.901258 | Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) is linked to the Russian government, returned to low-key intelligence-gathering operations during 2017 and into 2018, targeting a range of B- and B- targets in Europe and South America . |
Organization | Federal Bureau of Investigation (FBI | 0.920828 | Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) is linked to the Russian government, returned to low-key intelligence-gathering operations during 2017 and into 2018, targeting a range of B- and B- targets in Europe and South America . |
Malware | B-Hack | 0.655849 | Another B-Hack I-Hack, B-Hack (aka B-Hack), has been active since at least May 2016 and is involved in what appears to be intelligence gathering operations against military targets in Europe, Central Asia, and Eastern Asia . |
Malware | Ha | 0.407386 | Another B-Hack I-Hack, B-Hack (aka B-Hack), has been active since at least May 2016 and is involved in what appears to be intelligence gathering operations against military targets in Europe, Central Asia, and Eastern Asia . |
Malware | B-Hack | 0.785057 | Another B-Hack I-Hack, B-Hack (aka B-Hack), has been active since at least May 2016 and is involved in what appears to be intelligence gathering operations against military targets in Europe, Central Asia, and Eastern Asia . |
Malware | B-Hack | 0.791813 | Another B-Hack I-Hack, B-Hack (aka B-Hack), has been active since at least May 2016 and is involved in what appears to be intelligence gathering operations against military targets in Europe, Central Asia, and Eastern Asia . |
Malware | B-Hack | 0.907707 | Several sources consider B-Hack a B-Hack of CyberMercs based in Russia . |
Malware | B-Hack | 0.848466 | The primary targets of B-Hack are potential victims in several countries such as Ukraine, Spain, Russia, Romania, the United States and Canada . |
System | B | 0.566208 | We have reasons to believe that the B-Hack of the B-Hack network are either Russian B- or B- of a neighboring country that speak Russian . |
Malware | Hack | 0.42653 | We have reasons to believe that the B-Hack of the B-Hack network are either Russian B- or B- of a neighboring country that speak Russian . |
Organization | FireEye | 0.980806 | Previous work published by security vendor FireEye in October 2014 suggests the B-Hack might be of Russian origin . |
Malware | B-Hack | 0.868413 | Previous work published by security vendor FireEye in October 2014 suggests the B-Hack might be of Russian origin . |
Organization | B-Hack | 0.857415 | Finally, the use of recent domestic events and a prominent US B- exercise focused on deterring Russian aggression highlight B-Hack's ability and interest in exploiting B- events for their operations . |
Malware | B-Hack I-Hack | 0.692501 | In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM, JHUHUGIT, AZZY and a few others . |
Malware | CORESHELL | 0.855888 | In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM, JHUHUGIT, AZZY and a few others . |
Malware | SPLM | 0.791623 | In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM, JHUHUGIT, AZZY and a few others . |
Malware | JHUHUGIT | 0.843762 | In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM, JHUHUGIT, AZZY and a few others . |
Malware | AZZY | 0.807102 | In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM, JHUHUGIT, AZZY and a few others . |
Organization | B- | 0.444859 | In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM (aka Xagent, aka CHOPSTICK), JHUHUGIT (which is built with code from the Carberp sources), AZZY (aka ADVSTORESHELL, NETUI, EVILTOSS, and spans across 4-5 generations) and a few others . |
Malware | Ha | 0.377198 | In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM (aka Xagent, aka CHOPSTICK), JHUHUGIT (which is built with code from the Carberp sources), AZZY (aka ADVSTORESHELL, NETUI, EVILTOSS, and spans across 4-5 generations) and a few others . |
Organization | ck I- | 0.387465 | In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM (aka Xagent, aka CHOPSTICK), JHUHUGIT (which is built with code from the Carberp sources), AZZY (aka ADVSTORESHELL, NETUI, EVILTOSS, and spans across 4-5 generations) and a few others . |
Malware | Ha | 0.3248 | In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM (aka Xagent, aka CHOPSTICK), JHUHUGIT (which is built with code from the Carberp sources), AZZY (aka ADVSTORESHELL, NETUI, EVILTOSS, and spans across 4-5 generations) and a few others . |
Organization | ck | 0.715013 | In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM (aka Xagent, aka CHOPSTICK), JHUHUGIT (which is built with code from the Carberp sources), AZZY (aka ADVSTORESHELL, NETUI, EVILTOSS, and spans across 4-5 generations) and a few others . |
Malware | CORESHELL | 0.85198 | In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM (aka Xagent, aka CHOPSTICK), JHUHUGIT (which is built with code from the Carberp sources), AZZY (aka ADVSTORESHELL, NETUI, EVILTOSS, and spans across 4-5 generations) and a few others . |
Malware | SPLM | 0.828894 | In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM (aka Xagent, aka CHOPSTICK), JHUHUGIT (which is built with code from the Carberp sources), AZZY (aka ADVSTORESHELL, NETUI, EVILTOSS, and spans across 4-5 generations) and a few others . |
Malware | Xagent | 0.759889 | In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM (aka Xagent, aka CHOPSTICK), JHUHUGIT (which is built with code from the Carberp sources), AZZY (aka ADVSTORESHELL, NETUI, EVILTOSS, and spans across 4-5 generations) and a few others . |
Malware | CHOPSTICK | 0.903296 | In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM (aka Xagent, aka CHOPSTICK), JHUHUGIT (which is built with code from the Carberp sources), AZZY (aka ADVSTORESHELL, NETUI, EVILTOSS, and spans across 4-5 generations) and a few others . |
Malware | JHUHUGIT | 0.801394 | In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM (aka Xagent, aka CHOPSTICK), JHUHUGIT (which is built with code from the Carberp sources), AZZY (aka ADVSTORESHELL, NETUI, EVILTOSS, and spans across 4-5 generations) and a few others . |
Malware | Carberp | 0.807725 | In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM (aka Xagent, aka CHOPSTICK), JHUHUGIT (which is built with code from the Carberp sources), AZZY (aka ADVSTORESHELL, NETUI, EVILTOSS, and spans across 4-5 generations) and a few others . |
Malware | AZZY | 0.740452 | In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM (aka Xagent, aka CHOPSTICK), JHUHUGIT (which is built with code from the Carberp sources), AZZY (aka ADVSTORESHELL, NETUI, EVILTOSS, and spans across 4-5 generations) and a few others . |
Malware | ADVSTORESHELL | 0.76345 | In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM (aka Xagent, aka CHOPSTICK), JHUHUGIT (which is built with code from the Carberp sources), AZZY (aka ADVSTORESHELL, NETUI, EVILTOSS, and spans across 4-5 generations) and a few others . |
Malware | NET | 0.624744 | In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM (aka Xagent, aka CHOPSTICK), JHUHUGIT (which is built with code from the Carberp sources), AZZY (aka ADVSTORESHELL, NETUI, EVILTOSS, and spans across 4-5 generations) and a few others . |
System | UI | 0.556274 | In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM (aka Xagent, aka CHOPSTICK), JHUHUGIT (which is built with code from the Carberp sources), AZZY (aka ADVSTORESHELL, NETUI, EVILTOSS, and spans across 4-5 generations) and a few others . |
Malware | EVILTOSS | 0.682959 | In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM (aka Xagent, aka CHOPSTICK), JHUHUGIT (which is built with code from the Carberp sources), AZZY (aka ADVSTORESHELL, NETUI, EVILTOSS, and spans across 4-5 generations) and a few others . |
Malware | B-Hack I-Hack | 0.925289 | The B-Hack I-Hack spearphished targets in several waves with Flash exploits leading to their Carberp based JHUHUGIT downloaders and further stages of malware . |
System | Flash | 0.99278 | The B-Hack I-Hack spearphished targets in several waves with Flash exploits leading to their Carberp based JHUHUGIT downloaders and further stages of malware . |
Malware | Carberp | 0.82111 | The B-Hack I-Hack spearphished targets in several waves with Flash exploits leading to their Carberp based JHUHUGIT downloaders and further stages of malware . |
Malware | JHUHUGIT | 0.82933 | The B-Hack I-Hack spearphished targets in several waves with Flash exploits leading to their Carberp based JHUHUGIT downloaders and further stages of malware . |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.