Type
stringclasses
20 values
Text
stringlengths
1
236
Score
float64
0.18
0.97
Original Sentence ID
int64
0
663
Original Sentence
stringlengths
823
2.47k
__index_level_0__
int64
1
17.4k
MAL
Backdoor.APT.Aumlib
0.603999
4
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack ....
176
MAL
Backdoor.APT.Ixeshe
0.627975
4
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack ....
177
APT
B-Hack, B-Hack, B-Hack I-Hack, B-Hack,
0.904875
5
With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc . B-Hack I-Hack has a long list of high-profile victim...
182
TIME
January
0.640428
5
With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc . B-Hack I-Hack has a long list of high-profile victim...
184
LOC
China
0.914417
5
With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc . B-Hack I-Hack has a long list of high-profile victim...
185
TIME
November 26, 2015,
0.863783
5
With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc . B-Hack I-Hack has a long list of high-profile victim...
186
TIME
December 1, 2015,
0.818881
5
With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc . B-Hack I-Hack has a long list of high-profile victim...
187
LOC
China-based
0.931692
5
With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc . B-Hack I-Hack has a long list of high-profile victim...
188
APT
B-Hack
0.921823
5
With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc . B-Hack I-Hack has a long list of high-profile victim...
189
LOC
Japan
0.888699
5
With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc . B-Hack I-Hack has a long list of high-profile victim...
190
LOC
Taiwan
0.921307
5
With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc . B-Hack I-Hack has a long list of high-profile victim...
191
APT
B-Hack I-Hack
0.888627
5
With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc . B-Hack I-Hack has a long list of high-profile victim...
195
TIME
November 26,
0.764094
5
With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc . B-Hack I-Hack has a long list of high-profile victim...
200
ACT
spear phishing
0.933504
5
With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc . B-Hack I-Hack has a long list of high-profile victim...
203
TOOL
emails
0.933654
5
With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc . B-Hack I-Hack has a long list of high-profile victim...
204
MAL
ELMER backdoor
0.774481
6
It is possible, although not confirmed, that B-Hack was also responsible for targeting this B- I-, given both the timeframe and the use of the same n-day to eventually deploy the ELMER backdoor . Despite the differing sponsorship, penetration of Hong Kong and Taiwan-based B- I- continues to be a priority for China-base...
212
LOC
Hong Kong
0.906468
6
It is possible, although not confirmed, that B-Hack was also responsible for targeting this B- I-, given both the timeframe and the use of the same n-day to eventually deploy the ELMER backdoor . Despite the differing sponsorship, penetration of Hong Kong and Taiwan-based B- I- continues to be a priority for China-base...
213
LOC
Taiwan-based
0.867878
6
It is possible, although not confirmed, that B-Hack was also responsible for targeting this B- I-, given both the timeframe and the use of the same n-day to eventually deploy the ELMER backdoor . Despite the differing sponsorship, penetration of Hong Kong and Taiwan-based B- I- continues to be a priority for China-base...
214
LOC
China-based
0.923365
6
It is possible, although not confirmed, that B-Hack was also responsible for targeting this B- I-, given both the timeframe and the use of the same n-day to eventually deploy the ELMER backdoor . Despite the differing sponsorship, penetration of Hong Kong and Taiwan-based B- I- continues to be a priority for China-base...
215
PROT
IP
0.917571
6
It is possible, although not confirmed, that B-Hack was also responsible for targeting this B- I-, given both the timeframe and the use of the same n-day to eventually deploy the ELMER backdoor . Despite the differing sponsorship, penetration of Hong Kong and Taiwan-based B- I- continues to be a priority for China-base...
219
IDTY
Microsoft
0.89548
6
It is possible, although not confirmed, that B-Hack was also responsible for targeting this B- I-, given both the timeframe and the use of the same n-day to eventually deploy the ELMER backdoor . Despite the differing sponsorship, penetration of Hong Kong and Taiwan-based B- I- continues to be a priority for China-base...
221
SECTEAM
information
0.70592
6
It is possible, although not confirmed, that B-Hack was also responsible for targeting this B- I-, given both the timeframe and the use of the same n-day to eventually deploy the ELMER backdoor . Despite the differing sponsorship, penetration of Hong Kong and Taiwan-based B- I- continues to be a priority for China-base...
222
APT
B-Hack,
0.808799
6
It is possible, although not confirmed, that B-Hack was also responsible for targeting this B- I-, given both the timeframe and the use of the same n-day to eventually deploy the ELMER backdoor . Despite the differing sponsorship, penetration of Hong Kong and Taiwan-based B- I- continues to be a priority for China-base...
223
SECTEAM
FireEye
0.927723
6
It is possible, although not confirmed, that B-Hack was also responsible for targeting this B- I-, given both the timeframe and the use of the same n-day to eventually deploy the ELMER backdoor . Despite the differing sponsorship, penetration of Hong Kong and Taiwan-based B- I- continues to be a priority for China-base...
226
LOC
U.S.
0.73334
6
It is possible, although not confirmed, that B-Hack was also responsible for targeting this B- I-, given both the timeframe and the use of the same n-day to eventually deploy the ELMER backdoor . Despite the differing sponsorship, penetration of Hong Kong and Taiwan-based B- I- continues to be a priority for China-base...
227
MAL
BLACKCOFFEE
0.913768
6
It is possible, although not confirmed, that B-Hack was also responsible for targeting this B- I-, given both the timeframe and the use of the same n-day to eventually deploy the ELMER backdoor . Despite the differing sponsorship, penetration of Hong Kong and Taiwan-based B- I- continues to be a priority for China-base...
230
TIME
2013
0.493996
6
It is possible, although not confirmed, that B-Hack was also responsible for targeting this B- I-, given both the timeframe and the use of the same n-day to eventually deploy the ELMER backdoor . Despite the differing sponsorship, penetration of Hong Kong and Taiwan-based B- I- continues to be a priority for China-base...
231
APT
B-Hack's
0.914795
6
It is possible, although not confirmed, that B-Hack was also responsible for targeting this B- I-, given both the timeframe and the use of the same n-day to eventually deploy the ELMER backdoor . Despite the differing sponsorship, penetration of Hong Kong and Taiwan-based B- I- continues to be a priority for China-base...
233
APT
B-Hack
0.914758
6
It is possible, although not confirmed, that B-Hack was also responsible for targeting this B- I-, given both the timeframe and the use of the same n-day to eventually deploy the ELMER backdoor . Despite the differing sponsorship, penetration of Hong Kong and Taiwan-based B- I- continues to be a priority for China-base...
235
OS
Windows
0.936077
6
It is possible, although not confirmed, that B-Hack was also responsible for targeting this B- I-, given both the timeframe and the use of the same n-day to eventually deploy the ELMER backdoor . Despite the differing sponsorship, penetration of Hong Kong and Taiwan-based B- I- continues to be a priority for China-base...
236
APT
B-Hack I-Hack
0.795287
7
The malware used by the B-Hack I-Hack has ties to the HTTPBrowser malware family, and uses DNS requests as a command and control mechanism . These URIs result in the download of an installer, which creates a PE of the malware typically known as HTTPBrowser, but called Token Control by the B-Hack I-Hack themselves (base...
237
MAL
HTTPBrowser malware family,
0.799312
7
The malware used by the B-Hack I-Hack has ties to the HTTPBrowser malware family, and uses DNS requests as a command and control mechanism . These URIs result in the download of an installer, which creates a PE of the malware typically known as HTTPBrowser, but called Token Control by the B-Hack I-Hack themselves (base...
238
PROT
DNS
0.808313
7
The malware used by the B-Hack I-Hack has ties to the HTTPBrowser malware family, and uses DNS requests as a command and control mechanism . These URIs result in the download of an installer, which creates a PE of the malware typically known as HTTPBrowser, but called Token Control by the B-Hack I-Hack themselves (base...
239
MAL
HTTPBrowser,
0.899708
7
The malware used by the B-Hack I-Hack has ties to the HTTPBrowser malware family, and uses DNS requests as a command and control mechanism . These URIs result in the download of an installer, which creates a PE of the malware typically known as HTTPBrowser, but called Token Control by the B-Hack I-Hack themselves (base...
240
MAL
Token Control
0.848601
7
The malware used by the B-Hack I-Hack has ties to the HTTPBrowser malware family, and uses DNS requests as a command and control mechanism . These URIs result in the download of an installer, which creates a PE of the malware typically known as HTTPBrowser, but called Token Control by the B-Hack I-Hack themselves (base...
241
APT
B-Hack
0.903224
7
The malware used by the B-Hack I-Hack has ties to the HTTPBrowser malware family, and uses DNS requests as a command and control mechanism . These URIs result in the download of an installer, which creates a PE of the malware typically known as HTTPBrowser, but called Token Control by the B-Hack I-Hack themselves (base...
243
LOC
Chinese
0.744175
7
The malware used by the B-Hack I-Hack has ties to the HTTPBrowser malware family, and uses DNS requests as a command and control mechanism . These URIs result in the download of an installer, which creates a PE of the malware typically known as HTTPBrowser, but called Token Control by the B-Hack I-Hack themselves (base...
248
TIME
mid 2000s,
0.897556
7
The malware used by the B-Hack I-Hack has ties to the HTTPBrowser malware family, and uses DNS requests as a command and control mechanism . These URIs result in the download of an installer, which creates a PE of the malware typically known as HTTPBrowser, but called Token Control by the B-Hack I-Hack themselves (base...
250
APT
APT28
0.900272
7
The malware used by the B-Hack I-Hack has ties to the HTTPBrowser malware family, and uses DNS requests as a command and control mechanism . These URIs result in the download of an installer, which creates a PE of the malware typically known as HTTPBrowser, but called Token Control by the B-Hack I-Hack themselves (base...
251
MAL
CHOPSTICK,
0.913982
7
The malware used by the B-Hack I-Hack has ties to the HTTPBrowser malware family, and uses DNS requests as a command and control mechanism . These URIs result in the download of an installer, which creates a PE of the malware typically known as HTTPBrowser, but called Token Control by the B-Hack I-Hack themselves (base...
252
LOC
Eastern European
0.820358
7
The malware used by the B-Hack I-Hack has ties to the HTTPBrowser malware family, and uses DNS requests as a command and control mechanism . These URIs result in the download of an installer, which creates a PE of the malware typically known as HTTPBrowser, but called Token Control by the B-Hack I-Hack themselves (base...
254
IDTY
Russian government
0.721596
7
The malware used by the B-Hack I-Hack has ties to the HTTPBrowser malware family, and uses DNS requests as a command and control mechanism . These URIs result in the download of an installer, which creates a PE of the malware typically known as HTTPBrowser, but called Token Control by the B-Hack I-Hack themselves (base...
255
APT
B-Hack's
0.913842
7
The malware used by the B-Hack I-Hack has ties to the HTTPBrowser malware family, and uses DNS requests as a command and control mechanism . These URIs result in the download of an installer, which creates a PE of the malware typically known as HTTPBrowser, but called Token Control by the B-Hack I-Hack themselves (base...
256
LOC
U.S.
0.814979
7
The malware used by the B-Hack I-Hack has ties to the HTTPBrowser malware family, and uses DNS requests as a command and control mechanism . These URIs result in the download of an installer, which creates a PE of the malware typically known as HTTPBrowser, but called Token Control by the B-Hack I-Hack themselves (base...
258
LOC
Russian
0.803623
7
The malware used by the B-Hack I-Hack has ties to the HTTPBrowser malware family, and uses DNS requests as a command and control mechanism . These URIs result in the download of an installer, which creates a PE of the malware typically known as HTTPBrowser, but called Token Control by the B-Hack I-Hack themselves (base...
259
IDTY
Russian government
0.759677
8
Instead, we observed the two Russian B-Hack I-Hack compromise the same systems and engage separately in the theft of identical credentials . B-Hack's malware settings suggest that the developers have done the majority of their work in a Russian language build environment during Russian business hours, which suggests th...
262
APT
B-Hack
0.917047
8
Instead, we observed the two Russian B-Hack I-Hack compromise the same systems and engage separately in the theft of identical credentials . B-Hack's malware settings suggest that the developers have done the majority of their work in a Russian language build environment during Russian business hours, which suggests th...
265
APT
B-Hack's
0.918445
8
Instead, we observed the two Russian B-Hack I-Hack compromise the same systems and engage separately in the theft of identical credentials . B-Hack's malware settings suggest that the developers have done the majority of their work in a Russian language build environment during Russian business hours, which suggests th...
267
TIME
2015
0.92251
8
Instead, we observed the two Russian B-Hack I-Hack compromise the same systems and engage separately in the theft of identical credentials . B-Hack's malware settings suggest that the developers have done the majority of their work in a Russian language build environment during Russian business hours, which suggests th...
269
LOC
Russia
0.886432
8
Instead, we observed the two Russian B-Hack I-Hack compromise the same systems and engage separately in the theft of identical credentials . B-Hack's malware settings suggest that the developers have done the majority of their work in a Russian language build environment during Russian business hours, which suggests th...
270
LOC
former Soviet
0.858877
8
Instead, we observed the two Russian B-Hack I-Hack compromise the same systems and engage separately in the theft of identical credentials . B-Hack's malware settings suggest that the developers have done the majority of their work in a Russian language build environment during Russian business hours, which suggests th...
271
LOC
U.S.
0.472964
8
Instead, we observed the two Russian B-Hack I-Hack compromise the same systems and engage separately in the theft of identical credentials . B-Hack's malware settings suggest that the developers have done the majority of their work in a Russian language build environment during Russian business hours, which suggests th...
272
LOC
Europe,
0.897534
8
Instead, we observed the two Russian B-Hack I-Hack compromise the same systems and engage separately in the theft of identical credentials . B-Hack's malware settings suggest that the developers have done the majority of their work in a Russian language build environment during Russian business hours, which suggests th...
273
TOOL
email
0.891234
8
Instead, we observed the two Russian B-Hack I-Hack compromise the same systems and engage separately in the theft of identical credentials . B-Hack's malware settings suggest that the developers have done the majority of their work in a Russian language build environment during Russian business hours, which suggests th...
274
TIME
November 2016
0.921165
8
Instead, we observed the two Russian B-Hack I-Hack compromise the same systems and engage separately in the theft of identical credentials . B-Hack's malware settings suggest that the developers have done the majority of their work in a Russian language build environment during Russian business hours, which suggests th...
275
LOC
United States
0.870429
8
Instead, we observed the two Russian B-Hack I-Hack compromise the same systems and engage separately in the theft of identical credentials . B-Hack's malware settings suggest that the developers have done the majority of their work in a Russian language build environment during Russian business hours, which suggests th...
276
MAL
SOURFACE downloader,
0.845556
8
Instead, we observed the two Russian B-Hack I-Hack compromise the same systems and engage separately in the theft of identical credentials . B-Hack's malware settings suggest that the developers have done the majority of their work in a Russian language build environment during Russian business hours, which suggests th...
279
MAL
EVILTOSS,
0.90429
8
Instead, we observed the two Russian B-Hack I-Hack compromise the same systems and engage separately in the theft of identical credentials . B-Hack's malware settings suggest that the developers have done the majority of their work in a Russian language build environment during Russian business hours, which suggests th...
280
MAL
modular family of implants
0.777207
8
Instead, we observed the two Russian B-Hack I-Hack compromise the same systems and engage separately in the theft of identical credentials . B-Hack's malware settings suggest that the developers have done the majority of their work in a Russian language build environment during Russian business hours, which suggests th...
281
MAL
CHOPSTICK
0.909571
8
Instead, we observed the two Russian B-Hack I-Hack compromise the same systems and engage separately in the theft of identical credentials . B-Hack's malware settings suggest that the developers have done the majority of their work in a Russian language build environment during Russian business hours, which suggests th...
282
IDTY
Russian
0.760151
8
Instead, we observed the two Russian B-Hack I-Hack compromise the same systems and engage separately in the theft of identical credentials . B-Hack's malware settings suggest that the developers have done the majority of their work in a Russian language build environment during Russian business hours, which suggests th...
286
SECTEAM
CTU
0.913115
9
CTU researchers assess with moderate confidence that the B-Hack is operating from the Russian Federation and is gathering intelligence on behalf of the Russian government . This intelligence has been critical to protecting and informing our clients, exposing this threat, and strengthening our confidence in attributing ...
287
APT
B-'s
0.915239
9
CTU researchers assess with moderate confidence that the B-Hack is operating from the Russian Federation and is gathering intelligence on behalf of the Russian government . This intelligence has been critical to protecting and informing our clients, exposing this threat, and strengthening our confidence in attributing ...
291
TIME
2007,
0.835666
9
CTU researchers assess with moderate confidence that the B-Hack is operating from the Russian Federation and is gathering intelligence on behalf of the Russian government . This intelligence has been critical to protecting and informing our clients, exposing this threat, and strengthening our confidence in attributing ...
292
APT
B- I- I-
0.693374
9
CTU researchers assess with moderate confidence that the B-Hack is operating from the Russian Federation and is gathering intelligence on behalf of the Russian government . This intelligence has been critical to protecting and informing our clients, exposing this threat, and strengthening our confidence in attributing ...
294
LOC
Europe,
0.905499
9
CTU researchers assess with moderate confidence that the B-Hack is operating from the Russian Federation and is gathering intelligence on behalf of the Russian government . This intelligence has been critical to protecting and informing our clients, exposing this threat, and strengthening our confidence in attributing ...
295
APT
B-
0.6653
9
CTU researchers assess with moderate confidence that the B-Hack is operating from the Russian Federation and is gathering intelligence on behalf of the Russian government . This intelligence has been critical to protecting and informing our clients, exposing this threat, and strengthening our confidence in attributing ...
297
LOC
former Soviet
0.749437
9
CTU researchers assess with moderate confidence that the B-Hack is operating from the Russian Federation and is gathering intelligence on behalf of the Russian government . This intelligence has been critical to protecting and informing our clients, exposing this threat, and strengthening our confidence in attributing ...
299
LOC
Russia
0.915497
9
CTU researchers assess with moderate confidence that the B-Hack is operating from the Russian Federation and is gathering intelligence on behalf of the Russian government . This intelligence has been critical to protecting and informing our clients, exposing this threat, and strengthening our confidence in attributing ...
300
MAL
B-Hack
0.914545
9
CTU researchers assess with moderate confidence that the B-Hack is operating from the Russian Federation and is gathering intelligence on behalf of the Russian government . This intelligence has been critical to protecting and informing our clients, exposing this threat, and strengthening our confidence in attributing ...
301
TIME
December
0.760498
9
CTU researchers assess with moderate confidence that the B-Hack is operating from the Russian Federation and is gathering intelligence on behalf of the Russian government . This intelligence has been critical to protecting and informing our clients, exposing this threat, and strengthening our confidence in attributing ...
304
TIME
2016,
0.571786
9
CTU researchers assess with moderate confidence that the B-Hack is operating from the Russian Federation and is gathering intelligence on behalf of the Russian government . This intelligence has been critical to protecting and informing our clients, exposing this threat, and strengthening our confidence in attributing ...
305
SECTEAM
Department
0.853991
9
CTU researchers assess with moderate confidence that the B-Hack is operating from the Russian Federation and is gathering intelligence on behalf of the Russian government . This intelligence has been critical to protecting and informing our clients, exposing this threat, and strengthening our confidence in attributing ...
306
SECTEAM
(DHS)
0.682417
9
CTU researchers assess with moderate confidence that the B-Hack is operating from the Russian Federation and is gathering intelligence on behalf of the Russian government . This intelligence has been critical to protecting and informing our clients, exposing this threat, and strengthening our confidence in attributing ...
307
SECTEAM
FireEye's
0.924904
9
CTU researchers assess with moderate confidence that the B-Hack is operating from the Russian Federation and is gathering intelligence on behalf of the Russian government . This intelligence has been critical to protecting and informing our clients, exposing this threat, and strengthening our confidence in attributing ...
308
TIME
October 2014,
0.834619
10
In October 2014, FireEye released B-Hack: A Window into Russia's B- I- I-, and characterized B-Hack's B- as aligning with the Russian Government's strategic intelligence requirements . In October 2014, FireEye released B-Hack: A Window into Russia's Cyber Espionage Operations', and characterized B-Hack's B- as aligning...
310
SECTEAM
FireEye
0.910072
10
In October 2014, FireEye released B-Hack: A Window into Russia's B- I- I-, and characterized B-Hack's B- as aligning with the Russian Government's strategic intelligence requirements . In October 2014, FireEye released B-Hack: A Window into Russia's Cyber Espionage Operations', and characterized B-Hack's B- as aligning...
314
ACT
spear-phishing
0.923855
10
In October 2014, FireEye released B-Hack: A Window into Russia's B- I- I-, and characterized B-Hack's B- as aligning with the Russian Government's strategic intelligence requirements . In October 2014, FireEye released B-Hack: A Window into Russia's Cyber Espionage Operations', and characterized B-Hack's B- as aligning...
317
TOOL
emails
0.92104
10
In October 2014, FireEye released B-Hack: A Window into Russia's B- I- I-, and characterized B-Hack's B- as aligning with the Russian Government's strategic intelligence requirements . In October 2014, FireEye released B-Hack: A Window into Russia's Cyber Espionage Operations', and characterized B-Hack's B- as aligning...
318
APT
B-Hack's
0.898519
10
In October 2014, FireEye released B-Hack: A Window into Russia's B- I- I-, and characterized B-Hack's B- as aligning with the Russian Government's strategic intelligence requirements . In October 2014, FireEye released B-Hack: A Window into Russia's Cyber Espionage Operations', and characterized B-Hack's B- as aligning...
319
IDTY
WADA's
0.758893
10
In October 2014, FireEye released B-Hack: A Window into Russia's B- I- I-, and characterized B-Hack's B- as aligning with the Russian Government's strategic intelligence requirements . In October 2014, FireEye released B-Hack: A Window into Russia's Cyber Espionage Operations', and characterized B-Hack's B- as aligning...
320
LOC
Russia
0.841572
10
In October 2014, FireEye released B-Hack: A Window into Russia's B- I- I-, and characterized B-Hack's B- as aligning with the Russian Government's strategic intelligence requirements . In October 2014, FireEye released B-Hack: A Window into Russia's Cyber Espionage Operations', and characterized B-Hack's B- as aligning...
321
TIME
2014
0.898182
10
In October 2014, FireEye released B-Hack: A Window into Russia's B- I- I-, and characterized B-Hack's B- as aligning with the Russian Government's strategic intelligence requirements . In October 2014, FireEye released B-Hack: A Window into Russia's Cyber Espionage Operations', and characterized B-Hack's B- as aligning...
322
APT
B-Hack
0.908886
10
In October 2014, FireEye released B-Hack: A Window into Russia's B- I- I-, and characterized B-Hack's B- as aligning with the Russian Government's strategic intelligence requirements . In October 2014, FireEye released B-Hack: A Window into Russia's Cyber Espionage Operations', and characterized B-Hack's B- as aligning...
325
LOC
Russia's
0.494487
10
In October 2014, FireEye released B-Hack: A Window into Russia's B- I- I-, and characterized B-Hack's B- as aligning with the Russian Government's strategic intelligence requirements . In October 2014, FireEye released B-Hack: A Window into Russia's Cyber Espionage Operations', and characterized B-Hack's B- as aligning...
327
LOC
U.S.
0.896566
10
In October 2014, FireEye released B-Hack: A Window into Russia's B- I- I-, and characterized B-Hack's B- as aligning with the Russian Government's strategic intelligence requirements . In October 2014, FireEye released B-Hack: A Window into Russia's Cyber Espionage Operations', and characterized B-Hack's B- as aligning...
329
TIME
2017
0.876932
10
In October 2014, FireEye released B-Hack: A Window into Russia's B- I- I-, and characterized B-Hack's B- as aligning with the Russian Government's strategic intelligence requirements . In October 2014, FireEye released B-Hack: A Window into Russia's Cyber Espionage Operations', and characterized B-Hack's B- as aligning...
330
TIME
2018,
0.907782
10
In October 2014, FireEye released B-Hack: A Window into Russia's B- I- I-, and characterized B-Hack's B- as aligning with the Russian Government's strategic intelligence requirements . In October 2014, FireEye released B-Hack: A Window into Russia's Cyber Espionage Operations', and characterized B-Hack's B- as aligning...
331
LOC
Europe
0.922132
10
In October 2014, FireEye released B-Hack: A Window into Russia's B- I- I-, and characterized B-Hack's B- as aligning with the Russian Government's strategic intelligence requirements . In October 2014, FireEye released B-Hack: A Window into Russia's Cyber Espionage Operations', and characterized B-Hack's B- as aligning...
332
LOC
South America
0.908388
10
In October 2014, FireEye released B-Hack: A Window into Russia's B- I- I-, and characterized B-Hack's B- as aligning with the Russian Government's strategic intelligence requirements . In October 2014, FireEye released B-Hack: A Window into Russia's Cyber Espionage Operations', and characterized B-Hack's B- as aligning...
333
APT
B-Hack,
0.917493
10
In October 2014, FireEye released B-Hack: A Window into Russia's B- I- I-, and characterized B-Hack's B- as aligning with the Russian Government's strategic intelligence requirements . In October 2014, FireEye released B-Hack: A Window into Russia's Cyber Espionage Operations', and characterized B-Hack's B- as aligning...
334
TIME
May 2016
0.921642
11
Another B-Hack I-Hack, B-Hack (aka B-Hack), has been active since at least May 2016 and is involved in what appears to be intelligence gathering operations against military targets in Europe, Central Asia, and Eastern Asia . Several sources consider B-Hack a B-Hack of CyberMercs based in Russia . The primary targets of...
339
LOC
Europe, Central Asia,
0.908577
11
Another B-Hack I-Hack, B-Hack (aka B-Hack), has been active since at least May 2016 and is involved in what appears to be intelligence gathering operations against military targets in Europe, Central Asia, and Eastern Asia . Several sources consider B-Hack a B-Hack of CyberMercs based in Russia . The primary targets of...
340
LOC
Eastern Asia
0.912954
11
Another B-Hack I-Hack, B-Hack (aka B-Hack), has been active since at least May 2016 and is involved in what appears to be intelligence gathering operations against military targets in Europe, Central Asia, and Eastern Asia . Several sources consider B-Hack a B-Hack of CyberMercs based in Russia . The primary targets of...
341
LOC
Russia
0.918443
11
Another B-Hack I-Hack, B-Hack (aka B-Hack), has been active since at least May 2016 and is involved in what appears to be intelligence gathering operations against military targets in Europe, Central Asia, and Eastern Asia . Several sources consider B-Hack a B-Hack of CyberMercs based in Russia . The primary targets of...
343
LOC
Ukraine, Spain, Russia, Romania,
0.92282
11
Another B-Hack I-Hack, B-Hack (aka B-Hack), has been active since at least May 2016 and is involved in what appears to be intelligence gathering operations against military targets in Europe, Central Asia, and Eastern Asia . Several sources consider B-Hack a B-Hack of CyberMercs based in Russia . The primary targets of...
345
LOC
Canada
0.917078
11
Another B-Hack I-Hack, B-Hack (aka B-Hack), has been active since at least May 2016 and is involved in what appears to be intelligence gathering operations against military targets in Europe, Central Asia, and Eastern Asia . Several sources consider B-Hack a B-Hack of CyberMercs based in Russia . The primary targets of...
346
LOC
Russian
0.56208
11
Another B-Hack I-Hack, B-Hack (aka B-Hack), has been active since at least May 2016 and is involved in what appears to be intelligence gathering operations against military targets in Europe, Central Asia, and Eastern Asia . Several sources consider B-Hack a B-Hack of CyberMercs based in Russia . The primary targets of...
348
SECTEAM
FireEye
0.919685
11
Another B-Hack I-Hack, B-Hack (aka B-Hack), has been active since at least May 2016 and is involved in what appears to be intelligence gathering operations against military targets in Europe, Central Asia, and Eastern Asia . Several sources consider B-Hack a B-Hack of CyberMercs based in Russia . The primary targets of...
350
TIME
October 2014
0.902273
11
Another B-Hack I-Hack, B-Hack (aka B-Hack), has been active since at least May 2016 and is involved in what appears to be intelligence gathering operations against military targets in Europe, Central Asia, and Eastern Asia . Several sources consider B-Hack a B-Hack of CyberMercs based in Russia . The primary targets of...
351