Type stringclasses 20
values | Text stringlengths 1 236 | Score float64 0.18 0.97 | Original Sentence ID int64 0 663 | Original Sentence stringlengths 823 2.47k | __index_level_0__ int64 1 17.4k |
|---|---|---|---|---|---|
MAL | Backdoor.APT.Aumlib | 0.603999 | 4 | B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack .... | 176 |
MAL | Backdoor.APT.Ixeshe | 0.627975 | 4 | B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack .... | 177 |
APT | B-Hack, B-Hack, B-Hack I-Hack, B-Hack, | 0.904875 | 5 | With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc . B-Hack I-Hack has a long list of high-profile victim... | 182 |
TIME | January | 0.640428 | 5 | With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc . B-Hack I-Hack has a long list of high-profile victim... | 184 |
LOC | China | 0.914417 | 5 | With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc . B-Hack I-Hack has a long list of high-profile victim... | 185 |
TIME | November 26, 2015, | 0.863783 | 5 | With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc . B-Hack I-Hack has a long list of high-profile victim... | 186 |
TIME | December 1, 2015, | 0.818881 | 5 | With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc . B-Hack I-Hack has a long list of high-profile victim... | 187 |
LOC | China-based | 0.931692 | 5 | With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc . B-Hack I-Hack has a long list of high-profile victim... | 188 |
APT | B-Hack | 0.921823 | 5 | With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc . B-Hack I-Hack has a long list of high-profile victim... | 189 |
LOC | Japan | 0.888699 | 5 | With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc . B-Hack I-Hack has a long list of high-profile victim... | 190 |
LOC | Taiwan | 0.921307 | 5 | With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc . B-Hack I-Hack has a long list of high-profile victim... | 191 |
APT | B-Hack I-Hack | 0.888627 | 5 | With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc . B-Hack I-Hack has a long list of high-profile victim... | 195 |
TIME | November 26, | 0.764094 | 5 | With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc . B-Hack I-Hack has a long list of high-profile victim... | 200 |
ACT | spear phishing | 0.933504 | 5 | With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc . B-Hack I-Hack has a long list of high-profile victim... | 203 |
TOOL | emails | 0.933654 | 5 | With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc . B-Hack I-Hack has a long list of high-profile victim... | 204 |
MAL | ELMER backdoor | 0.774481 | 6 | It is possible, although not confirmed, that B-Hack was also responsible for targeting this B- I-, given both the timeframe and the use of the same n-day to eventually deploy the ELMER backdoor . Despite the differing sponsorship, penetration of Hong Kong and Taiwan-based B- I- continues to be a priority for China-base... | 212 |
LOC | Hong Kong | 0.906468 | 6 | It is possible, although not confirmed, that B-Hack was also responsible for targeting this B- I-, given both the timeframe and the use of the same n-day to eventually deploy the ELMER backdoor . Despite the differing sponsorship, penetration of Hong Kong and Taiwan-based B- I- continues to be a priority for China-base... | 213 |
LOC | Taiwan-based | 0.867878 | 6 | It is possible, although not confirmed, that B-Hack was also responsible for targeting this B- I-, given both the timeframe and the use of the same n-day to eventually deploy the ELMER backdoor . Despite the differing sponsorship, penetration of Hong Kong and Taiwan-based B- I- continues to be a priority for China-base... | 214 |
LOC | China-based | 0.923365 | 6 | It is possible, although not confirmed, that B-Hack was also responsible for targeting this B- I-, given both the timeframe and the use of the same n-day to eventually deploy the ELMER backdoor . Despite the differing sponsorship, penetration of Hong Kong and Taiwan-based B- I- continues to be a priority for China-base... | 215 |
PROT | IP | 0.917571 | 6 | It is possible, although not confirmed, that B-Hack was also responsible for targeting this B- I-, given both the timeframe and the use of the same n-day to eventually deploy the ELMER backdoor . Despite the differing sponsorship, penetration of Hong Kong and Taiwan-based B- I- continues to be a priority for China-base... | 219 |
IDTY | Microsoft | 0.89548 | 6 | It is possible, although not confirmed, that B-Hack was also responsible for targeting this B- I-, given both the timeframe and the use of the same n-day to eventually deploy the ELMER backdoor . Despite the differing sponsorship, penetration of Hong Kong and Taiwan-based B- I- continues to be a priority for China-base... | 221 |
SECTEAM | information | 0.70592 | 6 | It is possible, although not confirmed, that B-Hack was also responsible for targeting this B- I-, given both the timeframe and the use of the same n-day to eventually deploy the ELMER backdoor . Despite the differing sponsorship, penetration of Hong Kong and Taiwan-based B- I- continues to be a priority for China-base... | 222 |
APT | B-Hack, | 0.808799 | 6 | It is possible, although not confirmed, that B-Hack was also responsible for targeting this B- I-, given both the timeframe and the use of the same n-day to eventually deploy the ELMER backdoor . Despite the differing sponsorship, penetration of Hong Kong and Taiwan-based B- I- continues to be a priority for China-base... | 223 |
SECTEAM | FireEye | 0.927723 | 6 | It is possible, although not confirmed, that B-Hack was also responsible for targeting this B- I-, given both the timeframe and the use of the same n-day to eventually deploy the ELMER backdoor . Despite the differing sponsorship, penetration of Hong Kong and Taiwan-based B- I- continues to be a priority for China-base... | 226 |
LOC | U.S. | 0.73334 | 6 | It is possible, although not confirmed, that B-Hack was also responsible for targeting this B- I-, given both the timeframe and the use of the same n-day to eventually deploy the ELMER backdoor . Despite the differing sponsorship, penetration of Hong Kong and Taiwan-based B- I- continues to be a priority for China-base... | 227 |
MAL | BLACKCOFFEE | 0.913768 | 6 | It is possible, although not confirmed, that B-Hack was also responsible for targeting this B- I-, given both the timeframe and the use of the same n-day to eventually deploy the ELMER backdoor . Despite the differing sponsorship, penetration of Hong Kong and Taiwan-based B- I- continues to be a priority for China-base... | 230 |
TIME | 2013 | 0.493996 | 6 | It is possible, although not confirmed, that B-Hack was also responsible for targeting this B- I-, given both the timeframe and the use of the same n-day to eventually deploy the ELMER backdoor . Despite the differing sponsorship, penetration of Hong Kong and Taiwan-based B- I- continues to be a priority for China-base... | 231 |
APT | B-Hack's | 0.914795 | 6 | It is possible, although not confirmed, that B-Hack was also responsible for targeting this B- I-, given both the timeframe and the use of the same n-day to eventually deploy the ELMER backdoor . Despite the differing sponsorship, penetration of Hong Kong and Taiwan-based B- I- continues to be a priority for China-base... | 233 |
APT | B-Hack | 0.914758 | 6 | It is possible, although not confirmed, that B-Hack was also responsible for targeting this B- I-, given both the timeframe and the use of the same n-day to eventually deploy the ELMER backdoor . Despite the differing sponsorship, penetration of Hong Kong and Taiwan-based B- I- continues to be a priority for China-base... | 235 |
OS | Windows | 0.936077 | 6 | It is possible, although not confirmed, that B-Hack was also responsible for targeting this B- I-, given both the timeframe and the use of the same n-day to eventually deploy the ELMER backdoor . Despite the differing sponsorship, penetration of Hong Kong and Taiwan-based B- I- continues to be a priority for China-base... | 236 |
APT | B-Hack I-Hack | 0.795287 | 7 | The malware used by the B-Hack I-Hack has ties to the HTTPBrowser malware family, and uses DNS requests as a command and control mechanism . These URIs result in the download of an installer, which creates a PE of the malware typically known as HTTPBrowser, but called Token Control by the B-Hack I-Hack themselves (base... | 237 |
MAL | HTTPBrowser malware family, | 0.799312 | 7 | The malware used by the B-Hack I-Hack has ties to the HTTPBrowser malware family, and uses DNS requests as a command and control mechanism . These URIs result in the download of an installer, which creates a PE of the malware typically known as HTTPBrowser, but called Token Control by the B-Hack I-Hack themselves (base... | 238 |
PROT | DNS | 0.808313 | 7 | The malware used by the B-Hack I-Hack has ties to the HTTPBrowser malware family, and uses DNS requests as a command and control mechanism . These URIs result in the download of an installer, which creates a PE of the malware typically known as HTTPBrowser, but called Token Control by the B-Hack I-Hack themselves (base... | 239 |
MAL | HTTPBrowser, | 0.899708 | 7 | The malware used by the B-Hack I-Hack has ties to the HTTPBrowser malware family, and uses DNS requests as a command and control mechanism . These URIs result in the download of an installer, which creates a PE of the malware typically known as HTTPBrowser, but called Token Control by the B-Hack I-Hack themselves (base... | 240 |
MAL | Token Control | 0.848601 | 7 | The malware used by the B-Hack I-Hack has ties to the HTTPBrowser malware family, and uses DNS requests as a command and control mechanism . These URIs result in the download of an installer, which creates a PE of the malware typically known as HTTPBrowser, but called Token Control by the B-Hack I-Hack themselves (base... | 241 |
APT | B-Hack | 0.903224 | 7 | The malware used by the B-Hack I-Hack has ties to the HTTPBrowser malware family, and uses DNS requests as a command and control mechanism . These URIs result in the download of an installer, which creates a PE of the malware typically known as HTTPBrowser, but called Token Control by the B-Hack I-Hack themselves (base... | 243 |
LOC | Chinese | 0.744175 | 7 | The malware used by the B-Hack I-Hack has ties to the HTTPBrowser malware family, and uses DNS requests as a command and control mechanism . These URIs result in the download of an installer, which creates a PE of the malware typically known as HTTPBrowser, but called Token Control by the B-Hack I-Hack themselves (base... | 248 |
TIME | mid 2000s, | 0.897556 | 7 | The malware used by the B-Hack I-Hack has ties to the HTTPBrowser malware family, and uses DNS requests as a command and control mechanism . These URIs result in the download of an installer, which creates a PE of the malware typically known as HTTPBrowser, but called Token Control by the B-Hack I-Hack themselves (base... | 250 |
APT | APT28 | 0.900272 | 7 | The malware used by the B-Hack I-Hack has ties to the HTTPBrowser malware family, and uses DNS requests as a command and control mechanism . These URIs result in the download of an installer, which creates a PE of the malware typically known as HTTPBrowser, but called Token Control by the B-Hack I-Hack themselves (base... | 251 |
MAL | CHOPSTICK, | 0.913982 | 7 | The malware used by the B-Hack I-Hack has ties to the HTTPBrowser malware family, and uses DNS requests as a command and control mechanism . These URIs result in the download of an installer, which creates a PE of the malware typically known as HTTPBrowser, but called Token Control by the B-Hack I-Hack themselves (base... | 252 |
LOC | Eastern European | 0.820358 | 7 | The malware used by the B-Hack I-Hack has ties to the HTTPBrowser malware family, and uses DNS requests as a command and control mechanism . These URIs result in the download of an installer, which creates a PE of the malware typically known as HTTPBrowser, but called Token Control by the B-Hack I-Hack themselves (base... | 254 |
IDTY | Russian government | 0.721596 | 7 | The malware used by the B-Hack I-Hack has ties to the HTTPBrowser malware family, and uses DNS requests as a command and control mechanism . These URIs result in the download of an installer, which creates a PE of the malware typically known as HTTPBrowser, but called Token Control by the B-Hack I-Hack themselves (base... | 255 |
APT | B-Hack's | 0.913842 | 7 | The malware used by the B-Hack I-Hack has ties to the HTTPBrowser malware family, and uses DNS requests as a command and control mechanism . These URIs result in the download of an installer, which creates a PE of the malware typically known as HTTPBrowser, but called Token Control by the B-Hack I-Hack themselves (base... | 256 |
LOC | U.S. | 0.814979 | 7 | The malware used by the B-Hack I-Hack has ties to the HTTPBrowser malware family, and uses DNS requests as a command and control mechanism . These URIs result in the download of an installer, which creates a PE of the malware typically known as HTTPBrowser, but called Token Control by the B-Hack I-Hack themselves (base... | 258 |
LOC | Russian | 0.803623 | 7 | The malware used by the B-Hack I-Hack has ties to the HTTPBrowser malware family, and uses DNS requests as a command and control mechanism . These URIs result in the download of an installer, which creates a PE of the malware typically known as HTTPBrowser, but called Token Control by the B-Hack I-Hack themselves (base... | 259 |
IDTY | Russian government | 0.759677 | 8 | Instead, we observed the two Russian B-Hack I-Hack compromise the same systems and engage separately in the theft of identical credentials . B-Hack's malware settings suggest that the developers have done the majority of their work in a Russian language build environment during Russian business hours, which suggests th... | 262 |
APT | B-Hack | 0.917047 | 8 | Instead, we observed the two Russian B-Hack I-Hack compromise the same systems and engage separately in the theft of identical credentials . B-Hack's malware settings suggest that the developers have done the majority of their work in a Russian language build environment during Russian business hours, which suggests th... | 265 |
APT | B-Hack's | 0.918445 | 8 | Instead, we observed the two Russian B-Hack I-Hack compromise the same systems and engage separately in the theft of identical credentials . B-Hack's malware settings suggest that the developers have done the majority of their work in a Russian language build environment during Russian business hours, which suggests th... | 267 |
TIME | 2015 | 0.92251 | 8 | Instead, we observed the two Russian B-Hack I-Hack compromise the same systems and engage separately in the theft of identical credentials . B-Hack's malware settings suggest that the developers have done the majority of their work in a Russian language build environment during Russian business hours, which suggests th... | 269 |
LOC | Russia | 0.886432 | 8 | Instead, we observed the two Russian B-Hack I-Hack compromise the same systems and engage separately in the theft of identical credentials . B-Hack's malware settings suggest that the developers have done the majority of their work in a Russian language build environment during Russian business hours, which suggests th... | 270 |
LOC | former Soviet | 0.858877 | 8 | Instead, we observed the two Russian B-Hack I-Hack compromise the same systems and engage separately in the theft of identical credentials . B-Hack's malware settings suggest that the developers have done the majority of their work in a Russian language build environment during Russian business hours, which suggests th... | 271 |
LOC | U.S. | 0.472964 | 8 | Instead, we observed the two Russian B-Hack I-Hack compromise the same systems and engage separately in the theft of identical credentials . B-Hack's malware settings suggest that the developers have done the majority of their work in a Russian language build environment during Russian business hours, which suggests th... | 272 |
LOC | Europe, | 0.897534 | 8 | Instead, we observed the two Russian B-Hack I-Hack compromise the same systems and engage separately in the theft of identical credentials . B-Hack's malware settings suggest that the developers have done the majority of their work in a Russian language build environment during Russian business hours, which suggests th... | 273 |
TOOL | email | 0.891234 | 8 | Instead, we observed the two Russian B-Hack I-Hack compromise the same systems and engage separately in the theft of identical credentials . B-Hack's malware settings suggest that the developers have done the majority of their work in a Russian language build environment during Russian business hours, which suggests th... | 274 |
TIME | November 2016 | 0.921165 | 8 | Instead, we observed the two Russian B-Hack I-Hack compromise the same systems and engage separately in the theft of identical credentials . B-Hack's malware settings suggest that the developers have done the majority of their work in a Russian language build environment during Russian business hours, which suggests th... | 275 |
LOC | United States | 0.870429 | 8 | Instead, we observed the two Russian B-Hack I-Hack compromise the same systems and engage separately in the theft of identical credentials . B-Hack's malware settings suggest that the developers have done the majority of their work in a Russian language build environment during Russian business hours, which suggests th... | 276 |
MAL | SOURFACE downloader, | 0.845556 | 8 | Instead, we observed the two Russian B-Hack I-Hack compromise the same systems and engage separately in the theft of identical credentials . B-Hack's malware settings suggest that the developers have done the majority of their work in a Russian language build environment during Russian business hours, which suggests th... | 279 |
MAL | EVILTOSS, | 0.90429 | 8 | Instead, we observed the two Russian B-Hack I-Hack compromise the same systems and engage separately in the theft of identical credentials . B-Hack's malware settings suggest that the developers have done the majority of their work in a Russian language build environment during Russian business hours, which suggests th... | 280 |
MAL | modular family of implants | 0.777207 | 8 | Instead, we observed the two Russian B-Hack I-Hack compromise the same systems and engage separately in the theft of identical credentials . B-Hack's malware settings suggest that the developers have done the majority of their work in a Russian language build environment during Russian business hours, which suggests th... | 281 |
MAL | CHOPSTICK | 0.909571 | 8 | Instead, we observed the two Russian B-Hack I-Hack compromise the same systems and engage separately in the theft of identical credentials . B-Hack's malware settings suggest that the developers have done the majority of their work in a Russian language build environment during Russian business hours, which suggests th... | 282 |
IDTY | Russian | 0.760151 | 8 | Instead, we observed the two Russian B-Hack I-Hack compromise the same systems and engage separately in the theft of identical credentials . B-Hack's malware settings suggest that the developers have done the majority of their work in a Russian language build environment during Russian business hours, which suggests th... | 286 |
SECTEAM | CTU | 0.913115 | 9 | CTU researchers assess with moderate confidence that the B-Hack is operating from the Russian Federation and is gathering intelligence on behalf of the Russian government . This intelligence has been critical to protecting and informing our clients, exposing this threat, and strengthening our confidence in attributing ... | 287 |
APT | B-'s | 0.915239 | 9 | CTU researchers assess with moderate confidence that the B-Hack is operating from the Russian Federation and is gathering intelligence on behalf of the Russian government . This intelligence has been critical to protecting and informing our clients, exposing this threat, and strengthening our confidence in attributing ... | 291 |
TIME | 2007, | 0.835666 | 9 | CTU researchers assess with moderate confidence that the B-Hack is operating from the Russian Federation and is gathering intelligence on behalf of the Russian government . This intelligence has been critical to protecting and informing our clients, exposing this threat, and strengthening our confidence in attributing ... | 292 |
APT | B- I- I- | 0.693374 | 9 | CTU researchers assess with moderate confidence that the B-Hack is operating from the Russian Federation and is gathering intelligence on behalf of the Russian government . This intelligence has been critical to protecting and informing our clients, exposing this threat, and strengthening our confidence in attributing ... | 294 |
LOC | Europe, | 0.905499 | 9 | CTU researchers assess with moderate confidence that the B-Hack is operating from the Russian Federation and is gathering intelligence on behalf of the Russian government . This intelligence has been critical to protecting and informing our clients, exposing this threat, and strengthening our confidence in attributing ... | 295 |
APT | B- | 0.6653 | 9 | CTU researchers assess with moderate confidence that the B-Hack is operating from the Russian Federation and is gathering intelligence on behalf of the Russian government . This intelligence has been critical to protecting and informing our clients, exposing this threat, and strengthening our confidence in attributing ... | 297 |
LOC | former Soviet | 0.749437 | 9 | CTU researchers assess with moderate confidence that the B-Hack is operating from the Russian Federation and is gathering intelligence on behalf of the Russian government . This intelligence has been critical to protecting and informing our clients, exposing this threat, and strengthening our confidence in attributing ... | 299 |
LOC | Russia | 0.915497 | 9 | CTU researchers assess with moderate confidence that the B-Hack is operating from the Russian Federation and is gathering intelligence on behalf of the Russian government . This intelligence has been critical to protecting and informing our clients, exposing this threat, and strengthening our confidence in attributing ... | 300 |
MAL | B-Hack | 0.914545 | 9 | CTU researchers assess with moderate confidence that the B-Hack is operating from the Russian Federation and is gathering intelligence on behalf of the Russian government . This intelligence has been critical to protecting and informing our clients, exposing this threat, and strengthening our confidence in attributing ... | 301 |
TIME | December | 0.760498 | 9 | CTU researchers assess with moderate confidence that the B-Hack is operating from the Russian Federation and is gathering intelligence on behalf of the Russian government . This intelligence has been critical to protecting and informing our clients, exposing this threat, and strengthening our confidence in attributing ... | 304 |
TIME | 2016, | 0.571786 | 9 | CTU researchers assess with moderate confidence that the B-Hack is operating from the Russian Federation and is gathering intelligence on behalf of the Russian government . This intelligence has been critical to protecting and informing our clients, exposing this threat, and strengthening our confidence in attributing ... | 305 |
SECTEAM | Department | 0.853991 | 9 | CTU researchers assess with moderate confidence that the B-Hack is operating from the Russian Federation and is gathering intelligence on behalf of the Russian government . This intelligence has been critical to protecting and informing our clients, exposing this threat, and strengthening our confidence in attributing ... | 306 |
SECTEAM | (DHS) | 0.682417 | 9 | CTU researchers assess with moderate confidence that the B-Hack is operating from the Russian Federation and is gathering intelligence on behalf of the Russian government . This intelligence has been critical to protecting and informing our clients, exposing this threat, and strengthening our confidence in attributing ... | 307 |
SECTEAM | FireEye's | 0.924904 | 9 | CTU researchers assess with moderate confidence that the B-Hack is operating from the Russian Federation and is gathering intelligence on behalf of the Russian government . This intelligence has been critical to protecting and informing our clients, exposing this threat, and strengthening our confidence in attributing ... | 308 |
TIME | October 2014, | 0.834619 | 10 | In October 2014, FireEye released B-Hack: A Window into Russia's B- I- I-, and characterized B-Hack's B- as aligning with the Russian Government's strategic intelligence requirements . In October 2014, FireEye released B-Hack: A Window into Russia's Cyber Espionage Operations', and characterized B-Hack's B- as aligning... | 310 |
SECTEAM | FireEye | 0.910072 | 10 | In October 2014, FireEye released B-Hack: A Window into Russia's B- I- I-, and characterized B-Hack's B- as aligning with the Russian Government's strategic intelligence requirements . In October 2014, FireEye released B-Hack: A Window into Russia's Cyber Espionage Operations', and characterized B-Hack's B- as aligning... | 314 |
ACT | spear-phishing | 0.923855 | 10 | In October 2014, FireEye released B-Hack: A Window into Russia's B- I- I-, and characterized B-Hack's B- as aligning with the Russian Government's strategic intelligence requirements . In October 2014, FireEye released B-Hack: A Window into Russia's Cyber Espionage Operations', and characterized B-Hack's B- as aligning... | 317 |
TOOL | emails | 0.92104 | 10 | In October 2014, FireEye released B-Hack: A Window into Russia's B- I- I-, and characterized B-Hack's B- as aligning with the Russian Government's strategic intelligence requirements . In October 2014, FireEye released B-Hack: A Window into Russia's Cyber Espionage Operations', and characterized B-Hack's B- as aligning... | 318 |
APT | B-Hack's | 0.898519 | 10 | In October 2014, FireEye released B-Hack: A Window into Russia's B- I- I-, and characterized B-Hack's B- as aligning with the Russian Government's strategic intelligence requirements . In October 2014, FireEye released B-Hack: A Window into Russia's Cyber Espionage Operations', and characterized B-Hack's B- as aligning... | 319 |
IDTY | WADA's | 0.758893 | 10 | In October 2014, FireEye released B-Hack: A Window into Russia's B- I- I-, and characterized B-Hack's B- as aligning with the Russian Government's strategic intelligence requirements . In October 2014, FireEye released B-Hack: A Window into Russia's Cyber Espionage Operations', and characterized B-Hack's B- as aligning... | 320 |
LOC | Russia | 0.841572 | 10 | In October 2014, FireEye released B-Hack: A Window into Russia's B- I- I-, and characterized B-Hack's B- as aligning with the Russian Government's strategic intelligence requirements . In October 2014, FireEye released B-Hack: A Window into Russia's Cyber Espionage Operations', and characterized B-Hack's B- as aligning... | 321 |
TIME | 2014 | 0.898182 | 10 | In October 2014, FireEye released B-Hack: A Window into Russia's B- I- I-, and characterized B-Hack's B- as aligning with the Russian Government's strategic intelligence requirements . In October 2014, FireEye released B-Hack: A Window into Russia's Cyber Espionage Operations', and characterized B-Hack's B- as aligning... | 322 |
APT | B-Hack | 0.908886 | 10 | In October 2014, FireEye released B-Hack: A Window into Russia's B- I- I-, and characterized B-Hack's B- as aligning with the Russian Government's strategic intelligence requirements . In October 2014, FireEye released B-Hack: A Window into Russia's Cyber Espionage Operations', and characterized B-Hack's B- as aligning... | 325 |
LOC | Russia's | 0.494487 | 10 | In October 2014, FireEye released B-Hack: A Window into Russia's B- I- I-, and characterized B-Hack's B- as aligning with the Russian Government's strategic intelligence requirements . In October 2014, FireEye released B-Hack: A Window into Russia's Cyber Espionage Operations', and characterized B-Hack's B- as aligning... | 327 |
LOC | U.S. | 0.896566 | 10 | In October 2014, FireEye released B-Hack: A Window into Russia's B- I- I-, and characterized B-Hack's B- as aligning with the Russian Government's strategic intelligence requirements . In October 2014, FireEye released B-Hack: A Window into Russia's Cyber Espionage Operations', and characterized B-Hack's B- as aligning... | 329 |
TIME | 2017 | 0.876932 | 10 | In October 2014, FireEye released B-Hack: A Window into Russia's B- I- I-, and characterized B-Hack's B- as aligning with the Russian Government's strategic intelligence requirements . In October 2014, FireEye released B-Hack: A Window into Russia's Cyber Espionage Operations', and characterized B-Hack's B- as aligning... | 330 |
TIME | 2018, | 0.907782 | 10 | In October 2014, FireEye released B-Hack: A Window into Russia's B- I- I-, and characterized B-Hack's B- as aligning with the Russian Government's strategic intelligence requirements . In October 2014, FireEye released B-Hack: A Window into Russia's Cyber Espionage Operations', and characterized B-Hack's B- as aligning... | 331 |
LOC | Europe | 0.922132 | 10 | In October 2014, FireEye released B-Hack: A Window into Russia's B- I- I-, and characterized B-Hack's B- as aligning with the Russian Government's strategic intelligence requirements . In October 2014, FireEye released B-Hack: A Window into Russia's Cyber Espionage Operations', and characterized B-Hack's B- as aligning... | 332 |
LOC | South America | 0.908388 | 10 | In October 2014, FireEye released B-Hack: A Window into Russia's B- I- I-, and characterized B-Hack's B- as aligning with the Russian Government's strategic intelligence requirements . In October 2014, FireEye released B-Hack: A Window into Russia's Cyber Espionage Operations', and characterized B-Hack's B- as aligning... | 333 |
APT | B-Hack, | 0.917493 | 10 | In October 2014, FireEye released B-Hack: A Window into Russia's B- I- I-, and characterized B-Hack's B- as aligning with the Russian Government's strategic intelligence requirements . In October 2014, FireEye released B-Hack: A Window into Russia's Cyber Espionage Operations', and characterized B-Hack's B- as aligning... | 334 |
TIME | May 2016 | 0.921642 | 11 | Another B-Hack I-Hack, B-Hack (aka B-Hack), has been active since at least May 2016 and is involved in what appears to be intelligence gathering operations against military targets in Europe, Central Asia, and Eastern Asia . Several sources consider B-Hack a B-Hack of CyberMercs based in Russia . The primary targets of... | 339 |
LOC | Europe, Central Asia, | 0.908577 | 11 | Another B-Hack I-Hack, B-Hack (aka B-Hack), has been active since at least May 2016 and is involved in what appears to be intelligence gathering operations against military targets in Europe, Central Asia, and Eastern Asia . Several sources consider B-Hack a B-Hack of CyberMercs based in Russia . The primary targets of... | 340 |
LOC | Eastern Asia | 0.912954 | 11 | Another B-Hack I-Hack, B-Hack (aka B-Hack), has been active since at least May 2016 and is involved in what appears to be intelligence gathering operations against military targets in Europe, Central Asia, and Eastern Asia . Several sources consider B-Hack a B-Hack of CyberMercs based in Russia . The primary targets of... | 341 |
LOC | Russia | 0.918443 | 11 | Another B-Hack I-Hack, B-Hack (aka B-Hack), has been active since at least May 2016 and is involved in what appears to be intelligence gathering operations against military targets in Europe, Central Asia, and Eastern Asia . Several sources consider B-Hack a B-Hack of CyberMercs based in Russia . The primary targets of... | 343 |
LOC | Ukraine, Spain, Russia, Romania, | 0.92282 | 11 | Another B-Hack I-Hack, B-Hack (aka B-Hack), has been active since at least May 2016 and is involved in what appears to be intelligence gathering operations against military targets in Europe, Central Asia, and Eastern Asia . Several sources consider B-Hack a B-Hack of CyberMercs based in Russia . The primary targets of... | 345 |
LOC | Canada | 0.917078 | 11 | Another B-Hack I-Hack, B-Hack (aka B-Hack), has been active since at least May 2016 and is involved in what appears to be intelligence gathering operations against military targets in Europe, Central Asia, and Eastern Asia . Several sources consider B-Hack a B-Hack of CyberMercs based in Russia . The primary targets of... | 346 |
LOC | Russian | 0.56208 | 11 | Another B-Hack I-Hack, B-Hack (aka B-Hack), has been active since at least May 2016 and is involved in what appears to be intelligence gathering operations against military targets in Europe, Central Asia, and Eastern Asia . Several sources consider B-Hack a B-Hack of CyberMercs based in Russia . The primary targets of... | 348 |
SECTEAM | FireEye | 0.919685 | 11 | Another B-Hack I-Hack, B-Hack (aka B-Hack), has been active since at least May 2016 and is involved in what appears to be intelligence gathering operations against military targets in Europe, Central Asia, and Eastern Asia . Several sources consider B-Hack a B-Hack of CyberMercs based in Russia . The primary targets of... | 350 |
TIME | October 2014 | 0.902273 | 11 | Another B-Hack I-Hack, B-Hack (aka B-Hack), has been active since at least May 2016 and is involved in what appears to be intelligence gathering operations against military targets in Europe, Central Asia, and Eastern Asia . Several sources consider B-Hack a B-Hack of CyberMercs based in Russia . The primary targets of... | 351 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.