Type
stringclasses
5 values
Text
stringlengths
1
70
Score
float64
0.17
1
Original Sentence
stringlengths
6
383
Malware
HTTP
0.765342
The malware used by the B-Hack I-Hack has ties to the HTTPBrowser malware family, and uses DNS requests as a command and control mechanism .
System
B
0.399496
The malware used by the B-Hack I-Hack has ties to the HTTPBrowser malware family, and uses DNS requests as a command and control mechanism .
Malware
ser
0.428446
The malware used by the B-Hack I-Hack has ties to the HTTPBrowser malware family, and uses DNS requests as a command and control mechanism .
Malware
HTTPBrowser
0.376543
These URIs result in the download of an installer, which creates a PE of the malware typically known as HTTPBrowser, but called Token Control by the B-Hack I-Hack themselves (based upon the PDB strings found within many of the samples).
Malware
B-Hack
0.808561
B-Hack seemed to be going after B- I- I-, Chinese dissident groups and B-, B-, B- and B- I- that could benefit the Chinese economy .
Malware
B-Hack
0.818209
B-Hack seemed to be going after B- I- I-, Chinese dissident groups and other B- target, as well as certain B- targets and other B- targets in B- and B- I- that could benefit the Chinese economy .
Malware
B-Hack I-Hack
0.901771
B-Hack I-Hack (also known as B-Hack or B-Hack I-Hack) is a separate Russian-based B-Hack I-Hack, which has been active since mid 2000s, and has been responsible for targeted B- I- against the B-, B-, B-, B- and B- I- .
Malware
B-Hack
0.859877
B-Hack I-Hack (also known as B-Hack or B-Hack I-Hack) is a separate Russian-based B-Hack I-Hack, which has been active since mid 2000s, and has been responsible for targeted B- I- against the B-, B-, B-, B- and B- I- .
Malware
B-Hack I-Hack
0.819772
B-Hack I-Hack (also known as B-Hack or B-Hack I-Hack) is a separate Russian-based B-Hack I-Hack, which has been active since mid 2000s, and has been responsible for targeted B- I- against the B-, B-, B-, B- and B- I- .
Malware
B-Hack
0.752822
B-Hack I-Hack (also known as B-Hack or B-Hack I-Hack) is a separate Russian-based B-Hack I-Hack, which has been active since mid 2000s, and has been responsible for targeted B- I- against the B-, B-, B-, B- and B- I- .
Malware
Ha
0.738855
B-Hack I-Hack (also known as B-Hack or B-Hack I-Hack) is a separate Russian-based B-Hack I-Hack, which has been active since mid 2000s, and has been responsible for targeted B- I- against the B-, B-, B-, B- and B- I- .
Malware
APT28
0.933793
APT28 malware, in particular the family of modular backdoors that we call CHOPSTICK, indicates a formal code development environment .
Malware
CHOPSTICK
0.931774
APT28 malware, in particular the family of modular backdoors that we call CHOPSTICK, indicates a formal code development environment .
Malware
B-Hack
0.646303
However, three themes in B-Hack's targeting clearly reflects areas of specific interest to an Eastern European B-, most likely the Russian government .
Malware
B-Hack
0.85095
We identified three themes in B-Hack's lures and registered domains, which together are particularly relevant to the Russian government .
Organization
NATO
0.738313
cooperation and NATO, provide a strong incentive for Russian state-sponsored B-Hack I-Hack to steal information that sheds light on these topics .
Organization
B
0.963482
cooperation and NATO, provide a strong incentive for Russian state-sponsored B-Hack I-Hack to steal information that sheds light on these topics .
Indicator
-Ha
0.384945
cooperation and NATO, provide a strong incentive for Russian state-sponsored B-Hack I-Hack to steal information that sheds light on these topics .
Organization
ck
0.424073
cooperation and NATO, provide a strong incentive for Russian state-sponsored B-Hack I-Hack to steal information that sheds light on these topics .
Indicator
I-Ha
0.568213
cooperation and NATO, provide a strong incentive for Russian state-sponsored B-Hack I-Hack to steal information that sheds light on these topics .
Organization
ck
0.651402
cooperation and NATO, provide a strong incentive for Russian state-sponsored B-Hack I-Hack to steal information that sheds light on these topics .
Malware
B-Hack I-Hack
0.738282
Instead, we observed the two Russian B-Hack I-Hack compromise the same systems and engage separately in the theft of identical credentials .
Organization
B-Hack
0.756355
B-Hack's malware settings suggest that the developers have done the majority of their work in a Russian language build environment during Russian business hours, which suggests that the Russian government is B-Hack's sponsor .
Organization
B-Hack
0.780971
B-Hack's malware settings suggest that the developers have done the majority of their work in a Russian language build environment during Russian business hours, which suggests that the Russian government is B-Hack's sponsor .
Organization
B-Hack
0.80172
We believe that B-Hack's targeting of the MOD aligns with Russian threat perceptions .
Malware
B-Hack
0.833219
We assess that B-Hack is most likely sponsored by the Russian government .
Malware
B-Hack
0.70961
Given the available data, we assess that B-Hack's work is sponsored by the Russian government .
Malware
B-Hack
0.653712
Some of B-Hack's more commonly used tools are the SOURFACE downloader, its second stage backdoor EVILTOSS, and a modular family of implants that we call CHOPSTICK .
Malware
SOURFACE
0.905016
Some of B-Hack's more commonly used tools are the SOURFACE downloader, its second stage backdoor EVILTOSS, and a modular family of implants that we call CHOPSTICK .
Malware
EVILTOS
0.833851
Some of B-Hack's more commonly used tools are the SOURFACE downloader, its second stage backdoor EVILTOSS, and a modular family of implants that we call CHOPSTICK .
Malware
CHOPSTICK
0.889016
Some of B-Hack's more commonly used tools are the SOURFACE downloader, its second stage backdoor EVILTOSS, and a modular family of implants that we call CHOPSTICK .
Malware
B-Hack
0.731321
While B-Hack continues to primarily threaten organizations and individuals operating in Russia and former Soviet states, this B- illustrates its willingness to expand its scope to other targets that have intelligence of interest to the Russian government .
Organization
CTU
0.902411
CTU researchers assess with moderate confidence that the B-Hack is operating from the Russian Federation and is gathering intelligence on behalf of the Russian government .
Malware
B-Hack
0.810702
CTU researchers assess with moderate confidence that the B-Hack is operating from the Russian Federation and is gathering intelligence on behalf of the Russian government .
Malware
B-Hack
0.893184
Our visibility into the operations of B-Hack - a B-Hack we believe the Russian Government sponsors - has given us insight into some of the B-'s targets, as well as its objectives and the B- designed to further them .
Organization
B-Hack
0.862674
Since at least 2007, B-Hack has engaged in extensive operations in support of Russian strategic interests .
Indicator
I
0.508638
B- I- I- has primarily targeted entities in the U.S., Europe, and the countries of the former Soviet Union, including B-, B-, B- I-, B- I-, and B- and B- opposed to the current Russian Government .
Indicator
I
0.557935
B- I- I- has primarily targeted entities in the U.S., Europe, and the countries of the former Soviet Union, including B- and B-, B- I-, B- I-, and B- and B- opposed to the current Russian Government .
Malware
B-Ha
0.558343
Over the past two years, Russia appears to have increasingly leveraged B-Hack to conduct information operations commensurate with broader strategic military doctrine .
Organization
ck
0.417479
Over the past two years, Russia appears to have increasingly leveraged B-Hack to conduct information operations commensurate with broader strategic military doctrine .
Malware
B-Hack
0.582398
After compromising a victim organization, B-Hack will steal internal data that is then leaked to further political narratives aligned with Russian interests .
Malware
B
0.94751
After compromising a B- I-, B-Hack will steal internal data .
Malware
Hack
0.572324
After compromising a B- I-, B-Hack will steal internal data .
Organization
Department of Homeland Security
0.926802
On December 29, 2016, the Department of Homeland Security (DHS) and Federal Bureau of Investigation (FBI) released a Joint Analysis Report confirming FireEye's long held public assessment that the Russian Government sponsors B-Hack .
Organization
DHS
0.733731
On December 29, 2016, the Department of Homeland Security (DHS) and Federal Bureau of Investigation (FBI) released a Joint Analysis Report confirming FireEye's long held public assessment that the Russian Government sponsors B-Hack .
Organization
Federal Bureau of Investigation
0.970731
On December 29, 2016, the Department of Homeland Security (DHS) and Federal Bureau of Investigation (FBI) released a Joint Analysis Report confirming FireEye's long held public assessment that the Russian Government sponsors B-Hack .
Organization
FBI
0.95777
On December 29, 2016, the Department of Homeland Security (DHS) and Federal Bureau of Investigation (FBI) released a Joint Analysis Report confirming FireEye's long held public assessment that the Russian Government sponsors B-Hack .
Organization
FireEye
0.967372
On December 29, 2016, the Department of Homeland Security (DHS) and Federal Bureau of Investigation (FBI) released a Joint Analysis Report confirming FireEye's long held public assessment that the Russian Government sponsors B-Hack .
Malware
B-Hack
0.838668
On December 29, 2016, the Department of Homeland Security (DHS) and Federal Bureau of Investigation (FBI) released a Joint Analysis Report confirming FireEye's long held public assessment that the Russian Government sponsors B-Hack .
Organization
FireEye
0.984466
In October 2014, FireEye released B-Hack: A Window into Russia's B- I- I-, and characterized B-Hack's B- as aligning with the Russian Government's strategic intelligence requirements .
Malware
B-Hack
0.958432
In October 2014, FireEye released B-Hack: A Window into Russia's B- I- I-, and characterized B-Hack's B- as aligning with the Russian Government's strategic intelligence requirements .
Malware
B-Hack
0.957377
In October 2014, FireEye released B-Hack: A Window into Russia's B- I- I-, and characterized B-Hack's B- as aligning with the Russian Government's strategic intelligence requirements .
Organization
FireEye
0.98397
In October 2014, FireEye released B-Hack: A Window into Russia's Cyber Espionage Operations', and characterized B-Hack's B- as aligning with the Russian Government's strategic intelligence requirements .
Malware
B-Hack
0.945739
In October 2014, FireEye released B-Hack: A Window into Russia's Cyber Espionage Operations', and characterized B-Hack's B- as aligning with the Russian Government's strategic intelligence requirements .
Malware
B-Hack
0.933255
In October 2014, FireEye released B-Hack: A Window into Russia's Cyber Espionage Operations', and characterized B-Hack's B- as aligning with the Russian Government's strategic intelligence requirements .
Malware
B-Hack
0.906695
B-Hack targets Russian B- and B- Pussy Riot via spear-phishing emails .
Malware
Pussy Rio
0.87156
B-Hack targets Russian B- and B- Pussy Riot via spear-phishing emails .
Organization
B-Hack
0.897298
Our investigation of B-Hack's compromise of WADA's network, and our observations of the surrounding events reveal how Russia sought to counteract a damaging narrative and delegitimize the institutions leveling criticism .
Organization
WADA
0.767432
Our investigation of B-Hack's compromise of WADA's network, and our observations of the surrounding events reveal how Russia sought to counteract a damaging narrative and delegitimize the institutions leveling criticism .
Malware
B-Hack
0.87444
Since releasing our 2014 report, we continue to assess that B-Hack is sponsored by the Russian Government .
Malware
B-Hack
0.863079
In our 2014 report, we identified B-Hack as a suspected Russian government-sponsored B-Hack I-Hack .
Malware
B-Hack I-Hack
0.814558
In our 2014 report, we identified B-Hack as a suspected Russian government-sponsored B-Hack I-Hack .
Organization
Department of Homeland Security (DHS
0.901258
Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) is linked to the Russian government, returned to low-key intelligence-gathering operations during 2017 and into 2018, targeting a range of B- and B- targets in Europe and South America .
Organization
Federal Bureau of Investigation (FBI
0.920828
Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) is linked to the Russian government, returned to low-key intelligence-gathering operations during 2017 and into 2018, targeting a range of B- and B- targets in Europe and South America .
Malware
B-Hack
0.655849
Another B-Hack I-Hack, B-Hack (aka B-Hack), has been active since at least May 2016 and is involved in what appears to be intelligence gathering operations against military targets in Europe, Central Asia, and Eastern Asia .
Malware
Ha
0.407386
Another B-Hack I-Hack, B-Hack (aka B-Hack), has been active since at least May 2016 and is involved in what appears to be intelligence gathering operations against military targets in Europe, Central Asia, and Eastern Asia .
Malware
B-Hack
0.785057
Another B-Hack I-Hack, B-Hack (aka B-Hack), has been active since at least May 2016 and is involved in what appears to be intelligence gathering operations against military targets in Europe, Central Asia, and Eastern Asia .
Malware
B-Hack
0.791813
Another B-Hack I-Hack, B-Hack (aka B-Hack), has been active since at least May 2016 and is involved in what appears to be intelligence gathering operations against military targets in Europe, Central Asia, and Eastern Asia .
Malware
B-Hack
0.907707
Several sources consider B-Hack a B-Hack of CyberMercs based in Russia .
Malware
B-Hack
0.848466
The primary targets of B-Hack are potential victims in several countries such as Ukraine, Spain, Russia, Romania, the United States and Canada .
System
B
0.566208
We have reasons to believe that the B-Hack of the B-Hack network are either Russian B- or B- of a neighboring country that speak Russian .
Malware
Hack
0.42653
We have reasons to believe that the B-Hack of the B-Hack network are either Russian B- or B- of a neighboring country that speak Russian .
Organization
FireEye
0.980806
Previous work published by security vendor FireEye in October 2014 suggests the B-Hack might be of Russian origin .
Malware
B-Hack
0.868413
Previous work published by security vendor FireEye in October 2014 suggests the B-Hack might be of Russian origin .
Organization
B-Hack
0.857415
Finally, the use of recent domestic events and a prominent US B- exercise focused on deterring Russian aggression highlight B-Hack's ability and interest in exploiting B- events for their operations .
Malware
B-Hack I-Hack
0.692501
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM, JHUHUGIT, AZZY and a few others .
Malware
CORESHELL
0.855888
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM, JHUHUGIT, AZZY and a few others .
Malware
SPLM
0.791623
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM, JHUHUGIT, AZZY and a few others .
Malware
JHUHUGIT
0.843762
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM, JHUHUGIT, AZZY and a few others .
Malware
AZZY
0.807102
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM, JHUHUGIT, AZZY and a few others .
Organization
B-
0.444859
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM (aka Xagent, aka CHOPSTICK), JHUHUGIT (which is built with code from the Carberp sources), AZZY (aka ADVSTORESHELL, NETUI, EVILTOSS, and spans across 4-5 generations) and a few others .
Malware
Ha
0.377198
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM (aka Xagent, aka CHOPSTICK), JHUHUGIT (which is built with code from the Carberp sources), AZZY (aka ADVSTORESHELL, NETUI, EVILTOSS, and spans across 4-5 generations) and a few others .
Organization
ck I-
0.387465
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM (aka Xagent, aka CHOPSTICK), JHUHUGIT (which is built with code from the Carberp sources), AZZY (aka ADVSTORESHELL, NETUI, EVILTOSS, and spans across 4-5 generations) and a few others .
Malware
Ha
0.3248
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM (aka Xagent, aka CHOPSTICK), JHUHUGIT (which is built with code from the Carberp sources), AZZY (aka ADVSTORESHELL, NETUI, EVILTOSS, and spans across 4-5 generations) and a few others .
Organization
ck
0.715013
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM (aka Xagent, aka CHOPSTICK), JHUHUGIT (which is built with code from the Carberp sources), AZZY (aka ADVSTORESHELL, NETUI, EVILTOSS, and spans across 4-5 generations) and a few others .
Malware
CORESHELL
0.85198
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM (aka Xagent, aka CHOPSTICK), JHUHUGIT (which is built with code from the Carberp sources), AZZY (aka ADVSTORESHELL, NETUI, EVILTOSS, and spans across 4-5 generations) and a few others .
Malware
SPLM
0.828894
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM (aka Xagent, aka CHOPSTICK), JHUHUGIT (which is built with code from the Carberp sources), AZZY (aka ADVSTORESHELL, NETUI, EVILTOSS, and spans across 4-5 generations) and a few others .
Malware
Xagent
0.759889
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM (aka Xagent, aka CHOPSTICK), JHUHUGIT (which is built with code from the Carberp sources), AZZY (aka ADVSTORESHELL, NETUI, EVILTOSS, and spans across 4-5 generations) and a few others .
Malware
CHOPSTICK
0.903296
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM (aka Xagent, aka CHOPSTICK), JHUHUGIT (which is built with code from the Carberp sources), AZZY (aka ADVSTORESHELL, NETUI, EVILTOSS, and spans across 4-5 generations) and a few others .
Malware
JHUHUGIT
0.801394
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM (aka Xagent, aka CHOPSTICK), JHUHUGIT (which is built with code from the Carberp sources), AZZY (aka ADVSTORESHELL, NETUI, EVILTOSS, and spans across 4-5 generations) and a few others .
Malware
Carberp
0.807725
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM (aka Xagent, aka CHOPSTICK), JHUHUGIT (which is built with code from the Carberp sources), AZZY (aka ADVSTORESHELL, NETUI, EVILTOSS, and spans across 4-5 generations) and a few others .
Malware
AZZY
0.740452
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM (aka Xagent, aka CHOPSTICK), JHUHUGIT (which is built with code from the Carberp sources), AZZY (aka ADVSTORESHELL, NETUI, EVILTOSS, and spans across 4-5 generations) and a few others .
Malware
ADVSTORESHELL
0.76345
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM (aka Xagent, aka CHOPSTICK), JHUHUGIT (which is built with code from the Carberp sources), AZZY (aka ADVSTORESHELL, NETUI, EVILTOSS, and spans across 4-5 generations) and a few others .
Malware
NET
0.624744
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM (aka Xagent, aka CHOPSTICK), JHUHUGIT (which is built with code from the Carberp sources), AZZY (aka ADVSTORESHELL, NETUI, EVILTOSS, and spans across 4-5 generations) and a few others .
System
UI
0.556274
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM (aka Xagent, aka CHOPSTICK), JHUHUGIT (which is built with code from the Carberp sources), AZZY (aka ADVSTORESHELL, NETUI, EVILTOSS, and spans across 4-5 generations) and a few others .
Malware
EVILTOSS
0.682959
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM (aka Xagent, aka CHOPSTICK), JHUHUGIT (which is built with code from the Carberp sources), AZZY (aka ADVSTORESHELL, NETUI, EVILTOSS, and spans across 4-5 generations) and a few others .
Malware
B-Hack I-Hack
0.925289
The B-Hack I-Hack spearphished targets in several waves with Flash exploits leading to their Carberp based JHUHUGIT downloaders and further stages of malware .
System
Flash
0.99278
The B-Hack I-Hack spearphished targets in several waves with Flash exploits leading to their Carberp based JHUHUGIT downloaders and further stages of malware .
Malware
Carberp
0.82111
The B-Hack I-Hack spearphished targets in several waves with Flash exploits leading to their Carberp based JHUHUGIT downloaders and further stages of malware .
Malware
JHUHUGIT
0.82933
The B-Hack I-Hack spearphished targets in several waves with Flash exploits leading to their Carberp based JHUHUGIT downloaders and further stages of malware .