text stringlengths 284 8.14k |
|---|
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'We attribute the attacks on these customers using three popular IoT devices to an activity group that Microsoft refers to as STRONTIUM .' [/INST] [We:O, attribute:O, the:O, attacks:O, on:O, these:O, customers:O, using:O, three:O, popular:O, IoT:S-TOOL, devices:O, to:O, an:O, activity:O, group:O, that:O, Microsoft:S-IDTY, refers:O, to:O, as:O, STRONTIUM:S-APT, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Since we identified these attacks in the early stages , we have not been able to conclusively determine what STRONTIUM βs ultimate objectives were in these intrusions .' [/INST] [Since:O, we:O, identified:O, these:O, attacks:O, in:O, the:O, early:O, stages:O, ,:O, we:O, have:O, not:O, been:O, able:O, to:O, conclusively:O, determine:O, what:O, STRONTIUM:S-APT, βs:O, ultimate:O, objectives:O, were:O, in:O, these:O, intrusions:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Over the last twelve months , Microsoft has delivered nearly 1400 nation-state notifications to those who have been targeted or compromised by STRONTIUM .' [/INST] [Over:O, the:O, last:O, twelve:O, months:O, ,:O, Microsoft:S-IDTY, has:O, delivered:O, nearly:O, 1400:O, nation-state:O, notifications:O, to:O, those:O, who:O, have:O, been:O, targeted:O, or:O, compromised:O, by:O, STRONTIUM:S-APT, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'One in five notifications of STRONTIUM activity were tied to attacks against non-governmental organizations , think tanks , or politically affiliated organizations around the world .' [/INST] [One:O, in:O, five:O, notifications:O, of:O, STRONTIUM:S-APT, activity:O, were:O, tied:O, to:O, attacks:O, against:O, non-governmental:O, organizations:O, ,:O, think:O, tanks:O, ,:O, or:O, politically:O, affiliated:O, organizations:O, around:O, the:O, world:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The remaining 80% of STRONTIUM attacks have largely targeted organizations in the following sectors : government , IT , military , defense , medicine , education , and engineering .' [/INST] [The:O, remaining:O, 80%:O, of:O, STRONTIUM:S-APT, attacks:O, have:O, largely:O, targeted:O, organizations:O, in:O, the:O, following:O, sectors:O, ::O, government:O, ,:O, IT:O, ,:O, military:O, ,:O, defense:O, ,:O, medicine:O, ,:O, education:O, ,:O, and:O, engineering:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'We have also observed and notified STRONTIUM attacks against Olympic organizing committees , anti-doping agencies , and the hospitality industry .' [/INST] [We:O, have:O, also:O, observed:O, and:O, notified:O, STRONTIUM:S-APT, attacks:O, against:O, Olympic:S-IDTY, organizing:O, committees:O, ,:O, anti-doping:O, agencies:O, ,:O, and:O, the:O, hospitality:O, industry:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The β VPN Filter β malware has also been attributed to STRONTIUM by the FBI .' [/INST] [The:O, β:O, VPN:B-MAL, Filter:E-MAL, β:O, malware:O, has:O, also:O, been:O, attributed:O, to:O, STRONTIUM:S-APT, by:O, the:O, FBI:S-IDTY, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Below are a series of indicators Microsoft has observed as active during the STRONTIUM activity discussed in this article .' [/INST] [Below:O, are:O, a:O, series:O, of:O, indicators:O, Microsoft:O, has:O, observed:O, as:O, active:O, during:O, the:O, STRONTIUM:S-APT, activity:O, discussed:O, in:O, this:O, article:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'BRONZE PRESIDENT Targets NGOs .' [/INST] [BRONZE:B-APT, PRESIDENT:E-APT, Targets:O, NGOs:S-IDTY, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The activities of some non-governmental organizations ( NGOs ) challenge governments on politically sensitive issues such as social , humanitarian , and environmental policies .' [/INST] [The:O, activities:O, of:O, some:O, non-governmental:B-IDTY, organizations:E-IDTY, (:O, NGOs:S-IDTY, ):O, challenge:O, governments:O, on:O, politically:O, sensitive:O, issues:O, such:O, as:O, social:O, ,:O, humanitarian:O, ,:O, and:O, environmental:O, policies:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'As a result , these organizations are often exposed to increased government-directed threats aimed at monitoring their activities , discrediting their work , or stealing their intellectual property .' [/INST] [As:O, a:O, result:O, ,:O, these:O, organizations:O, are:O, often:O, exposed:O, to:O, increased:O, government-directed:O, threats:O, aimed:O, at:O, monitoring:O, their:O, activities:O, ,:O, discrediting:O, their:O, work:O, ,:O, or:O, stealing:O, their:O, intellectual:O, property:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'BRONZE PRESIDENT is a likely People's Republic of China ( PRC )-based targeted cyberespionage group that uses both proprietary and publicly available tools to target NGO networks .' [/INST] [BRONZE:B-APT, PRESIDENT:E-APT, is:O, a:O, likely:O, People's:B-IDTY, Republic:I-IDTY, of:I-IDTY, China:E-IDTY, (:O, PRC:S-IDTY, )-based:O, targeted:O, cyberespionage:O, group:O, that:O, uses:O, both:O, proprietary:O, and:O, publicly:O, available:O, tools:O, to:O, target:O, NGO:S-IDTY, networks:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Secureworks Counter Threat Unit ( CTU ) researchers have observed BRONZE PRESIDENT activity since mid-2018 but identified artifacts suggesting that the threat actors may have been conducting network intrusions as far back as 2014 .' [/INST] [Secureworks:B-SECTEAM, Counter:I-SECTEAM, Threat:I-SECTEAM, Unit:E-SECTEAM, (:O, CTU:S-SECTEAM, ):O, researchers:O, have:O, observed:O, BRONZE:B-APT, PRESIDENT:E-APT, activity:O, since:O, mid-2018:S-TIME, but:O, identified:O, artifacts:O, suggesting:O, that:O, the:O, threat:O, actors:O, may:O, have:O, been:O, conducting:O, network:O, intrusions:O, as:O, far:O, back:O, as:O, 2014:S-TIME, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The BRONZE PRESIDENT cyberespionage group targets NGOs , as well as political and law enforcement organizations in countries in South and East Asia .' [/INST] [The:O, BRONZE:B-APT, PRESIDENT:E-APT, cyberespionage:O, group:O, targets:O, NGOs:O, ,:O, as:O, well:O, as:O, political:O, and:O, law:O, enforcement:O, organizations:O, in:O, countries:O, in:O, South:B-LOC, and:I-LOC, East:I-LOC, Asia:E-LOC, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The threat group appears to have developed its own remote access tools that it uses alongside publicly available remote access and post-compromise toolsets .' [/INST] [The:O, threat:O, group:O, appears:O, to:O, have:O, developed:O, its:O, own:O, remote:O, access:O, tools:O, that:O, it:O, uses:O, alongside:O, publicly:O, available:O, remote:O, access:O, and:O, post-compromise:O, toolsets:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'After compromising a network , the threat actors elevate their privileges and install malware on a large proportion of systems .' [/INST] [After:O, compromising:O, a:O, network:O, ,:O, the:O, threat:O, actors:O, elevate:O, their:O, privileges:O, and:O, install:O, malware:O, on:O, a:O, large:O, proportion:O, of:O, systems:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The group runs custom batch scripts to collect specific file types and takes proactive steps to minimize detection of its activities .' [/INST] [The:O, group:O, runs:O, custom:O, batch:O, scripts:O, to:O, collect:O, specific:O, file:O, types:O, and:O, takes:O, proactive:O, steps:O, to:O, minimize:O, detection:O, of:O, its:O, activities:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Analysis of a threat group's targeting , origin , and competencies can determine which organizations could be at risk .' [/INST] [Analysis:O, of:O, a:O, threat:O, group's:O, targeting:O, ,:O, origin:O, ,:O, and:O, competencies:O, can:O, determine:O, which:O, organizations:O, could:O, be:O, at:O, risk:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'This information can help organizations make strategic defensive decisions in relation to the BRONZE PRESIDENT threat group .' [/INST] [This:O, information:O, can:O, help:O, organizations:O, make:O, strategic:O, defensive:O, decisions:O, in:O, relation:O, to:O, the:O, BRONZE:B-APT, PRESIDENT:E-APT, threat:O, group:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'CTU researchers have observed BRONZE PRESIDENT targeting multiple NGOs .' [/INST] [CTU:S-SECTEAM, researchers:O, have:O, observed:O, BRONZE:B-APT, PRESIDENT:E-APT, targeting:O, multiple:O, NGOs:S-IDTY, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The threat actors steal data from compromised systems over a long period of time , which likely indicates a long-term objective of monitoring the target's network .' [/INST] [The:O, threat:O, actors:O, steal:O, data:O, from:O, compromised:O, systems:O, over:O, a:O, long:O, period:O, of:O, time:O, ,:O, which:O, likely:O, indicates:O, a:O, long-term:O, objective:O, of:O, monitoring:O, the:O, target's:O, network:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'BRONZE PRESIDENT uses custom batch scripts to collect either specific file types ( including files with .pptx , .xlsx , .pdf extensions ) or all files within a specific location .' [/INST] [BRONZE:B-APT, PRESIDENT:E-APT, uses:O, custom:O, batch:O, scripts:O, to:O, collect:O, either:O, specific:O, file:O, types:O, (:O, including:O, files:O, with:O, .pptx:S-FILE, ,:O, .xlsx:S-FILE, ,:O, .pdf:S-FILE, extensions:O, ):O, or:O, all:O, files:O, within:O, a:O, specific:O, location:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'CTU researchers also observed evidence that the threat actors collect credentials from high-privilege network accounts and reputationally sensitive accounts , such as social media and webmail accounts .' [/INST] [CTU:S-SECTEAM, researchers:O, also:O, observed:O, evidence:O, that:O, the:O, threat:O, actors:O, collect:O, credentials:O, from:O, high-privilege:O, network:O, accounts:O, and:O, reputationally:O, sensitive:O, accounts:O, ,:O, such:O, as:O, social:O, media:O, and:O, webmail:O, accounts:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Additionally , CTU researchers have observed evidence of BRONZE PRESIDENT targeting political and law enforcement organizations in countries adjacent to the PRC , including Mongolia and India .' [/INST] [Additionally:O, ,:O, CTU:S-SECTEAM, researchers:O, have:O, observed:O, evidence:O, of:O, BRONZE:B-APT, PRESIDENT:E-APT, targeting:O, political:O, and:O, law:O, enforcement:O, organizations:O, in:O, countries:O, adjacent:O, to:O, the:O, PRC:S-IDTY, ,:O, including:O, Mongolia:S-LOC, and:O, India:S-LOC, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Some of the group's phishing lures suggest an interest in national security , humanitarian , and law enforcement organizations in the East , South , and Southeast Asia ( see Figure 1 ) .' [/INST] [Some:O, of:O, the:O, group's:O, phishing:E-ACT, lures:O, suggest:O, an:O, interest:O, in:O, national:O, security:O, ,:O, humanitarian:O, ,:O, and:O, law:O, enforcement:O, organizations:O, in:O, the:O, East:B-LOC, ,:I-LOC, South:I-LOC, ,:I-LOC, and:I-LOC, Southeast:I-LOC, Asia:E-LOC, (:O, see:O, Figure:O, 1:O, ):O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'These examples reveal BRONZE PRESIDENT 's likely intent to conduct political espionage in other countries in addition to targeting NGOs .' [/INST] [These:O, examples:O, reveal:O, BRONZE:B-APT, PRESIDENT:E-APT, 's:O, likely:O, intent:O, to:O, conduct:O, political:O, espionage:O, in:O, other:O, countries:O, in:O, addition:O, to:O, targeting:O, NGOs:S-IDTY, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'It is highly likely that BRONZE PRESIDENT is based in the PRC due to the following observations :' [/INST] [It:O, is:O, highly:O, likely:O, that:O, BRONZE:B-APT, PRESIDENT:E-APT, is:O, based:O, in:O, the:O, PRC:S-IDTY, due:O, to:O, the:O, following:O, observations:O, ::O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The NGOs targeted by BRONZE PRESIDENT conduct research on issues relevant to the PRC .' [/INST] [The:O, NGOs:S-IDTY, targeted:O, by:O, BRONZE:B-APT, PRESIDENT:E-APT, conduct:O, research:O, on:O, issues:O, relevant:O, to:O, the:O, PRC:S-IDTY, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Strong evidence links BRONZE PRESIDENT 's infrastructure to entities within the PRC .' [/INST] [Strong:O, evidence:O, links:O, BRONZE:B-APT, PRESIDENT:E-APT, 's:O, infrastructure:O, to:O, entities:O, within:O, the:O, PRC:S-IDTY, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'There are connections between a subset of the group's operational infrastructure and PRC-based Internet service providers .' [/INST] [There:O, are:O, connections:O, between:O, a:O, subset:O, of:O, the:O, group's:O, operational:O, infrastructure:O, and:O, PRC-based:S-IDTY, Internet:O, service:O, providers:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Tools such as PlugX have historically been leveraged by threat groups operating in the PRC .' [/INST] [Tools:O, such:O, as:O, PlugX:S-MAL, have:O, historically:O, been:O, leveraged:O, by:O, threat:O, groups:O, operating:O, in:O, the:O, PRC:S-IDTY, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'It is likely that BRONZE PRESIDENT is sponsored or at least tolerated by the PRC government .' [/INST] [It:O, is:O, likely:O, that:O, BRONZE:B-APT, PRESIDENT:E-APT, is:O, sponsored:O, or:O, at:O, least:O, tolerated:O, by:O, the:O, PRC:S-IDTY, government:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The threat group's systemic long-term targeting of NGO and political networks does not align with patriotic or criminal threat groups .' [/INST] [The:O, threat:O, group's:O, systemic:O, long-term:O, targeting:O, of:O, NGO:S-IDTY, and:O, political:O, networks:O, does:O, not:O, align:O, with:O, patriotic:O, or:O, criminal:O, threat:O, groups:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'BRONZE PRESIDENT has deployed a variety of remote access tools .' [/INST] [BRONZE:B-APT, PRESIDENT:E-APT, has:O, deployed:O, a:O, variety:O, of:O, remote:O, access:O, tools:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The use of tools not previously observed by CTU researchers suggests that the group could have access to malware development capabilities .' [/INST] [The:O, use:O, of:O, tools:O, not:O, previously:O, observed:O, by:O, CTU:S-SECTEAM, researchers:O, suggests:O, that:O, the:O, group:O, could:O, have:O, access:O, to:O, malware:O, development:O, capabilities:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'BRONZE PRESIDENT also uses widely available or modified open-source tools , which could be a strategic effort to reduce the risk of attribution or to minimize the need for tool development resources .' [/INST] [BRONZE:B-APT, PRESIDENT:E-APT, also:O, uses:O, widely:O, available:O, or:O, modified:O, open-source:O, tools:O, ,:O, which:O, could:O, be:O, a:O, strategic:O, effort:O, to:O, reduce:O, the:O, risk:O, of:O, attribution:O, or:O, to:O, minimize:O, the:O, need:O, for:O, tool:O, development:O, resources:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Following a network compromise , the threat actors typically delete their tools and processes .' [/INST] [Following:O, a:O, network:O, compromise:O, ,:O, the:O, threat:O, actors:O, typically:O, delete:O, their:O, tools:O, and:O, processes:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'However , the group is content leaving some malware on the network , likely to provide a contingency if other access channels are removed .' [/INST] [However:O, ,:O, the:O, group:O, is:O, content:O, leaving:O, some:O, malware:O, on:O, the:O, network:O, ,:O, likely:O, to:O, provide:O, a:O, contingency:O, if:O, other:O, access:O, channels:O, are:O, removed:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'When the group's activities were detected in one incident , it had elevated privileges and had maintained access to the targeted environment for several months .' [/INST] [When:O, the:O, group's:O, activities:O, were:O, detected:O, in:O, one:O, incident:O, ,:O, it:O, had:O, elevated:O, privileges:O, and:O, had:O, maintained:O, access:O, to:O, the:O, targeted:O, environment:O, for:O, several:O, months:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'This finding indicates the group's effectiveness at maintaining long-term access to a targeted network .' [/INST] [This:O, finding:O, indicates:O, the:O, group's:O, effectiveness:O, at:O, maintaining:O, long-term:O, access:O, to:O, a:O, targeted:O, network:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'CTU researchers and Secureworks incident responders have observed BRONZE PRESIDENT using the following tools , along with several custom batch scripts for locating and archiving specific file types :' [/INST] [CTU:S-SECTEAM, researchers:O, and:O, Secureworks:O, incident:O, responders:O, have:O, observed:O, BRONZE:B-APT, PRESIDENT:E-APT, using:O, the:O, following:O, tools:O, ,:O, along:O, with:O, several:O, custom:O, batch:O, scripts:O, for:O, locating:O, and:O, archiving:O, specific:O, file:O, types:O, ::O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Cobalt Strike β This popular and commercially available penetration tool gains shell access to an infected system .' [/INST] [Cobalt:B-TOOL, Strike:E-TOOL, β:O, This:O, popular:O, and:O, commercially:O, available:O, penetration:O, tool:O, gains:O, shell:O, access:O, to:O, an:O, infected:O, system:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'It allows threat actors to execute additional tools and perform post-intrusion actions on compromised systems .' [/INST] [It:O, allows:O, threat:O, actors:O, to:O, execute:O, additional:O, tools:O, and:O, perform:O, post-intrusion:O, actions:O, on:O, compromised:O, systems:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Cobalt Strike appears to be one of BRONZE PRESIDENT 's preferred remote access tools .' [/INST] [Cobalt:B-TOOL, Strike:E-TOOL, appears:O, to:O, be:O, one:O, of:O, BRONZE:B-APT, PRESIDENT:E-APT, 's:O, preferred:O, remote:O, access:O, tools:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'During one intrusion , the threat actors installed it on over 70% of accessible hosts .' [/INST] [During:O, one:O, intrusion:O, ,:O, the:O, threat:O, actors:O, installed:O, it:O, on:O, over:O, 70%:O, of:O, accessible:O, hosts:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The group's Cobalt Strike installation typically uses a payload named svchost.exe in an attempt to disguise Cobalt Strike activity as the legitimate Windows svchost.exe executable .' [/INST] [The:O, group's:O, Cobalt:B-TOOL, Strike:E-TOOL, installation:O, typically:O, uses:O, a:O, payload:O, named:O, svchost.exe:S-FILE, in:O, an:O, attempt:O, to:O, disguise:O, Cobalt:B-TOOL, Strike:E-TOOL, activity:O, as:O, the:O, legitimate:O, Windows:S-OS, svchost.exe:S-FILE, executable:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'PlugX β This remote access Trojan ( RAT ) is popular among PRC-based targeted threat groups .' [/INST] [PlugX:S-MAL, β:O, This:O, remote:O, access:O, Trojan:S-MAL, (:O, RAT:O, ):O, is:O, popular:O, among:O, PRC-based:S-IDTY, targeted:O, threat:O, groups:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Its functionality includes uploading and downloading files , and it has configurable network protocols .' [/INST] [Its:O, functionality:O, includes:O, uploading:O, and:O, downloading:O, files:O, ,:O, and:O, it:O, has:O, configurable:O, network:O, protocols:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'BRONZE PRESIDENT installs PlugX using DLL side-loading .' [/INST] [BRONZE:B-APT, PRESIDENT:E-APT, installs:O, PlugX:S-MAL, using:O, DLL:S-TOOL, side-loading:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In June and August 2019 , BRONZE PRESIDENT delivered PlugX via government and law enforcement-themed phishing lures .' [/INST] [In:O, June:B-TIME, and:I-TIME, August:I-TIME, 2019:E-TIME, ,:O, BRONZE:B-APT, PRESIDENT:E-APT, delivered:O, PlugX:S-MAL, via:O, government:O, and:O, law:O, enforcement-themed:O, phishing:E-ACT, lures:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'ORat β CTU researchers have only observed this basic loader tool in the context of BRONZE PRESIDENT intrusions .' [/INST] [ORat:S-MAL, β:O, CTU:S-SECTEAM, researchers:O, have:O, only:O, observed:O, this:O, basic:O, loader:O, tool:O, in:O, the:O, context:O, of:O, BRONZE:B-APT, PRESIDENT:E-APT, intrusions:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'ORat is the name assigned by the malware author , as denoted by the program debug database string in the analyzed sample : D:\vswork\Plugin\ORat\build\Release\ORatServer\Loader.pdb .' [/INST] [ORat:S-MAL, is:O, the:O, name:O, assigned:O, by:O, the:O, malware:O, author:O, ,:O, as:O, denoted:O, by:O, the:O, program:O, debug:O, database:O, string:O, in:O, the:O, analyzed:O, sample:O, ::O, D:\vswork\Plugin\ORat\build\Release\ORatServer\Loader.pdb:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The tool uses the Windows Management Instrumentation ( WMI ) event consumer for persistence by installing a script to the system's WMI registry .' [/INST] [The:O, tool:O, uses:O, the:O, Windows:S-OS, Management:B-TOOL, Instrumentation:E-TOOL, (:O, WMI:S-TOOL, ):O, event:O, consumer:O, for:O, persistence:O, by:O, installing:O, a:O, script:O, to:O, the:O, system's:O, WMI:S-TOOL, registry:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Messages sent from ORat to its command and control ( C2 ) server start with the string "VIEWS0018x" .' [/INST] [Messages:O, sent:O, from:O, ORat:S-MAL, to:O, its:O, command:B-TOOL, and:I-TOOL, control:E-TOOL, (:O, C2:S-TOOL, ):O, server:O, start:O, with:O, the:O, string:O, "VIEWS0018x":O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'If the data received from the C2 server starts with the same string , then the remainder of the payload is decompressed using ORat 's "deflate" algorithm and called as a function .' [/INST] [If:O, the:O, data:O, received:O, from:O, the:O, C2:S-TOOL, server:O, starts:O, with:O, the:O, same:O, string:O, ,:O, then:O, the:O, remainder:O, of:O, the:O, payload:O, is:O, decompressed:O, using:O, ORat:S-MAL, 's:O, "deflate":O, algorithm:O, and:O, called:O, as:O, a:O, function:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'ORat acts as a flexible loader tool rather than a fully featured remote access tool .' [/INST] [ORat:S-MAL, acts:O, as:O, a:O, flexible:O, loader:O, tool:O, rather:O, than:O, a:O, fully:O, featured:O, remote:O, access:O, tool:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'RCSession β This basic RAT is installed via DLL side-loading , and CTU researchers observed BRONZE PRESIDENT installing it on multiple hosts during intrusions .' [/INST] [RCSession:S-MAL, β:O, This:O, basic:O, RAT:O, is:O, installed:O, via:O, DLL:S-TOOL, side-loading:O, ,:O, and:O, CTU:S-SECTEAM, researchers:O, observed:O, BRONZE:B-APT, PRESIDENT:E-APT, installing:O, it:O, on:O, multiple:O, hosts:O, during:O, intrusions:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'RCSession was extracted from a file called English.rtf and launched via a hollowed svchost.exe process .' [/INST] [RCSession:S-MAL, was:O, extracted:O, from:O, a:O, file:O, called:O, English.rtf:S-FILE, and:O, launched:O, via:O, a:O, hollowed:O, svchost.exe:S-FILE, process:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'RCSession connects to its C2 server via a custom protocol , can remotely execute commands , and can launch additional tools .' [/INST] [RCSession:S-MAL, connects:O, to:O, its:O, C2:S-TOOL, server:O, via:O, a:O, custom:O, protocol:O, ,:O, can:O, remotely:O, execute:O, commands:O, ,:O, and:O, can:O, launch:O, additional:O, tools:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'CTU researchers have no evidence of other threat actors using RCSession or of wide proliferation of the tool , suggesting it may be exclusively used by BRONZE PRESIDENT .' [/INST] [CTU:S-SECTEAM, researchers:O, have:O, no:O, evidence:O, of:O, other:O, threat:O, actors:O, using:O, RCSession:S-MAL, or:O, of:O, wide:O, proliferation:O, of:O, the:O, tool:O, ,:O, suggesting:O, it:O, may:O, be:O, exclusively:O, used:O, by:O, BRONZE:B-APT, PRESIDENT:E-APT, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Nbtscan β This publicly available command-line tool scans systems for NetBIOS name information ( see Figure 2 ) .' [/INST] [Nbtscan:S-TOOL, β:O, This:O, publicly:O, available:O, command-line:O, tool:O, scans:O, systems:O, for:O, NetBIOS:S-PROT, name:O, information:O, (:O, see:O, Figure:O, 2:O, ):O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In an example observed by CTU researchers , the Nbtscan executable was named Adobe.exe and was installed in several working directories on compromised hosts , including : C:\Recovery\ .' [/INST] [In:O, an:O, example:O, observed:O, by:O, CTU:S-SECTEAM, researchers:O, ,:O, the:O, Nbtscan:S-TOOL, executable:O, was:O, named:O, Adobe.exe:S-FILE, and:O, was:O, installed:O, in:O, several:O, working:O, directories:O, on:O, compromised:O, hosts:O, ,:O, including:O, ::O, C:\Recovery\:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Nmap β BRONZE PRESIDENT used this freely available network scanning tool from the C:\PerfLogs\ folder .' [/INST] [Nmap:S-TOOL, β:O, BRONZE:B-APT, PRESIDENT:E-APT, used:O, this:O, freely:O, available:O, network:O, scanning:O, tool:O, from:O, the:O, C:\PerfLogs\:O, folder:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Wmiexec β This publicly available tool uses WMI to create SYSTEM-level shells on remote hosts .' [/INST] [Wmiexec:S-TOOL, β:O, This:O, publicly:O, available:O, tool:O, uses:O, WMI:S-TOOL, to:O, create:O, SYSTEM-level:O, shells:O, on:O, remote:O, hosts:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'While analyzing hosts compromised by BRONZE PRESIDENT , CTU researchers identified other malware artifacts .' [/INST] [While:O, analyzing:O, hosts:O, compromised:O, by:O, BRONZE:B-APT, PRESIDENT:E-APT, ,:O, CTU:S-SECTEAM, researchers:O, identified:O, other:O, malware:O, artifacts:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Although there was no evidence of the group using the malware , the threat actors may have leveraged its access or capabilities during earlier phases of the intrusions .' [/INST] [Although:O, there:O, was:O, no:O, evidence:O, of:O, the:O, group:O, using:O, the:O, malware:O, ,:O, the:O, threat:O, actors:O, may:O, have:O, leveraged:O, its:O, access:O, or:O, capabilities:O, during:O, earlier:O, phases:O, of:O, the:O, intrusions:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The BRONZE PRESIDENT intrusions observed by CTU researchers appear to have taken place over several months or years .' [/INST] [The:O, BRONZE:B-APT, PRESIDENT:E-APT, intrusions:O, observed:O, by:O, CTU:S-SECTEAM, researchers:O, appear:O, to:O, have:O, taken:O, place:O, over:O, several:O, months:O, or:O, years:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'China Chopper web shell files named error404.aspx included the "eval (Request.Item["|"] ,"unsafe" ) ; , string .' [/INST] [China:S-LOC, Chopper:S-TOOL, web:O, shell:O, files:O, named:O, error404.aspx:S-FILE, included:O, the:O, "eval:O, (Request.Item["|"]:O, ,"unsafe":O, ):O, ;:O, ,:O, string:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'To successfully interact with the web shell , a threat actor sent HTTP requests that included the "|" parameter .' [/INST] [To:O, successfully:O, interact:O, with:O, the:O, web:O, shell:O, ,:O, a:O, threat:O, actor:O, sent:O, HTTP:S-PROT, requests:O, that:O, included:O, the:O, "|":O, parameter:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The web shell files appeared to be installed during the timeframe that BRONZE PRESIDENT was active on the system .' [/INST] [The:O, web:O, shell:O, files:O, appeared:O, to:O, be:O, installed:O, during:O, the:O, timeframe:O, that:O, BRONZE:B-APT, PRESIDENT:E-APT, was:O, active:O, on:O, the:O, system:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'CTU researchers identified a variety of post-compromise tools stored under %AppData% ( e.g. , \AppData\Roaming\Temp ) on several compromised systems .' [/INST] [CTU:S-SECTEAM, researchers:O, identified:O, a:O, variety:O, of:O, post-compromise:O, tools:O, stored:O, under:O, %AppData%:O, (:O, e.g.:O, ,:O, \AppData\Roaming\Temp:O, ):O, on:O, several:O, compromised:O, systems:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The widespread proliferation and use of the following tools suggest that the group likely has the knowledge and capability to use them as part of its operations :' [/INST] [The:O, widespread:O, proliferation:O, and:O, use:O, of:O, the:O, following:O, tools:O, suggest:O, that:O, the:O, group:O, likely:O, has:O, the:O, knowledge:O, and:O, capability:O, to:O, use:O, them:O, as:O, part:O, of:O, its:O, operations:O, ::O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Powerview.ps1 β This PowerShell-based module for network reconnaissance is part of the PowerSploit penetration testing framework .' [/INST] [Powerview.ps1:S-FILE, β:O, This:O, PowerShell-based:S-TOOL, module:O, for:O, network:O, reconnaissance:O, is:O, part:O, of:O, the:O, PowerSploit:S-TOOL, penetration:O, testing:O, framework:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'PVE Find AD User β This command-line tool identifies login locations of Active Directory ( AD ) users .' [/INST] [PVE:B-TOOL, Find:I-TOOL, AD:I-TOOL, User:E-TOOL, β:O, This:O, command-line:O, tool:O, identifies:O, login:O, locations:O, of:O, Active:B-TOOL, Directory:E-TOOL, (:O, AD:S-TOOL, ):O, users:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'AdFind β This command-line tool conducts AD queries .' [/INST] [AdFind:S-TOOL, β:O, This:O, command-line:O, tool:O, conducts:O, AD:S-TOOL, queries:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'NetSess β This publicly available tool enumerates NetBIOS sessions .' [/INST] [NetSess:S-TOOL, β:O, This:O, publicly:O, available:O, tool:O, enumerates:O, NetBIOS:S-TOOL, sessions:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Netview β This tool enumerates networks .' [/INST] [Netview:S-TOOL, β:O, This:O, tool:O, enumerates:O, networks:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'TeamViewer β This remote control and desktop-sharing tool has applications for legitimate and malicious system users .' [/INST] [TeamViewer:S-TOOL, β:O, This:O, remote:O, control:O, and:O, desktop-sharing:O, tool:O, has:O, applications:O, for:O, legitimate:O, and:O, malicious:O, system:O, users:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Its installation in a temporary directory alongside network reconnaissance and enumeration tools likely indicates malicious intent .' [/INST] [Its:O, installation:O, in:O, a:O, temporary:O, directory:O, alongside:O, network:O, reconnaissance:O, and:O, enumeration:O, tools:O, likely:O, indicates:O, malicious:O, intent:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'At the time of detection , observed BRONZE PRESIDENT incidents had likely been ongoing for several months or even years .' [/INST] [At:O, the:O, time:O, of:O, detection:O, ,:O, observed:O, BRONZE:B-APT, PRESIDENT:E-APT, incidents:O, had:O, likely:O, been:O, ongoing:O, for:O, several:O, months:O, or:O, even:O, years:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'As a result , CTU researchers were unable to ascertain the initial access vector .' [/INST] [As:O, a:O, result:O, ,:O, CTU:S-SECTEAM, researchers:O, were:O, unable:O, to:O, ascertain:O, the:O, initial:O, access:O, vector:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In October 2019 , third-party researchers described a phishing campaign that used C2 infrastructure that CTU researchers attribute to BRONZE PRESIDENT .' [/INST] [In:O, October:B-TIME, 2019:E-TIME, ,:O, third-party:O, researchers:O, described:O, a:O, phishing:E-ACT, campaign:O, that:O, used:O, C2:S-TOOL, infrastructure:O, that:O, CTU:S-SECTEAM, researchers:O, attribute:O, to:O, BRONZE:B-APT, PRESIDENT:E-APT, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'This connection suggests that the group uses phishing emails with ZIP attachments that contain LNK files as an initial access vector .' [/INST] [This:O, connection:O, suggests:O, that:O, the:O, group:O, uses:O, phishing:E-ACT, emails:S-TOOL, with:O, ZIP:S-TOOL, attachments:O, that:O, contain:O, LNK:S-TOOL, files:O, as:O, an:O, initial:O, access:O, vector:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'During one intrusion , the threat actors gained administrator access to all systems within a targeted business unit and installed their remote access tools on 80% of the hosts .' [/INST] [During:O, one:O, intrusion:O, ,:O, the:O, threat:O, actors:O, gained:O, administrator:O, access:O, to:O, all:O, systems:O, within:O, a:O, targeted:O, business:O, unit:O, and:O, installed:O, their:O, remote:O, access:O, tools:O, on:O, 80%:O, of:O, the:O, hosts:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The group installed multiple tools within the environment , including three different tools on a strategically important server , likely to provide contingency access options .' [/INST] [The:O, group:O, installed:O, multiple:O, tools:O, within:O, the:O, environment:O, ,:O, including:O, three:O, different:O, tools:O, on:O, a:O, strategically:O, important:O, server:O, ,:O, likely:O, to:O, provide:O, contingency:O, access:O, options:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'During multiple intrusions , the threat actors employed various tools and techniques to understand the network environments .' [/INST] [During:O, multiple:O, intrusions:O, ,:O, the:O, threat:O, actors:O, employed:O, various:O, tools:O, and:O, techniques:O, to:O, understand:O, the:O, network:O, environments:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'For example , they used Nmap to scan various internal IP address ranges and SMB ports .' [/INST] [For:O, example:O, ,:O, they:O, used:O, Nmap:S-TOOL, to:O, scan:O, various:O, internal:O, IP:O, address:O, ranges:O, and:O, SMB:S-PROT, ports:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'They also relied on Nbtscan , net user , and ping commands to obtain insights and identify opportunities for lateral movement .' [/INST] [They:O, also:O, relied:O, on:O, Nbtscan:O, ,:O, net:O, user:O, ,:O, and:O, ping:O, commands:O, to:O, obtain:O, insights:O, and:O, identify:O, opportunities:O, for:O, lateral:O, movement:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'BRONZE PRESIDENT regularly leverages Wmiexec to move laterally .' [/INST] [BRONZE:B-APT, PRESIDENT:E-APT, regularly:O, leverages:O, Wmiexec:S-TOOL, to:O, move:O, laterally:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'During one intrusion , the threat actors extensively used this tool to execute WMI commands on remote hosts in the environment .' [/INST] [During:O, one:O, intrusion:O, ,:O, the:O, threat:O, actors:O, extensively:O, used:O, this:O, tool:O, to:O, execute:O, WMI:S-TOOL, commands:O, on:O, remote:O, hosts:O, in:O, the:O, environment:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The threat actors retrieved the NTDS.dit file from the volume shadow copy .' [/INST] [The:O, threat:O, actors:O, retrieved:O, the:O, NTDS.dit:S-FILE, file:O, from:O, the:O, volume:O, shadow:O, copy:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'NTDS.dit contains Active Directory data , including password hashes for all users on a domain .' [/INST] [NTDS.dit:S-FILE, contains:O, Active:B-TOOL, Directory:E-TOOL, data:O, ,:O, including:O, password:O, hashes:O, for:O, all:O, users:O, on:O, a:O, domain:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Extracting hashes from the NTDS.dit file requires access to the SYSTEM file in the system registry .' [/INST] [Extracting:O, hashes:O, from:O, the:O, NTDS.dit:S-FILE, file:O, requires:O, access:O, to:O, the:O, SYSTEM:O, file:O, in:O, the:O, system:O, registry:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The threat actors saved both the SYSTEM file ( system.hive ) and NTDS.dit in the compromised host's c:\windows\temp directory .' [/INST] [The:O, threat:O, actors:O, saved:O, both:O, the:O, SYSTEM:O, file:O, (:O, system.hive:S-FILE, ):O, and:O, NTDS.dit:S-FILE, in:O, the:O, compromised:O, host's:O, c:\windows\temp:O, directory:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'These files were likely exfiltrated and exploited offline to retrieve user password hashes , which could then be cracked or used to perform pass-the-hash attacks .' [/INST] [These:O, files:O, were:O, likely:O, exfiltrated:O, and:O, exploited:O, offline:O, to:O, retrieve:O, user:O, password:O, hashes:O, ,:O, which:O, could:O, then:O, be:O, cracked:O, or:O, used:O, to:O, perform:O, pass-the-hash:O, attacks:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'BRONZE PRESIDENT 's C2 techniques are dictated by its remote access tools .' [/INST] [BRONZE:B-APT, PRESIDENT:E-APT, 's:O, C2:S-TOOL, techniques:O, are:O, dictated:O, by:O, its:O, remote:O, access:O, tools:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The group's primary and likely proprietary RCSession RAT communicates with a hard-coded C2 server using a custom protocol over TCP port 443 .' [/INST] [The:O, group's:O, primary:O, and:O, likely:O, proprietary:O, RCSession:S-MAL, RAT:O, communicates:O, with:O, a:O, hard-coded:O, C2:S-TOOL, server:O, using:O, a:O, custom:O, protocol:O, over:O, TCP:S-PROT, port:O, 443:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'After connecting to its C2 server , RCSession checks in with an encrypted beacon and then awaits instruction .' [/INST] [After:O, connecting:O, to:O, its:O, C2:S-TOOL, server:O, ,:O, RCSession:S-MAL, checks:O, in:O, with:O, an:O, encrypted:O, beacon:O, and:O, then:O, awaits:O, instruction:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The ORat tool , which appears to be used less frequently by the group , communicates over TCP port 80 using a raw socket protocol ( not HTTP ) .' [/INST] [The:O, ORat:S-MAL, tool:O, ,:O, which:O, appears:O, to:O, be:O, used:O, less:O, frequently:O, by:O, the:O, group:O, ,:O, communicates:O, over:O, TCP:S-PROT, port:O, 80:O, using:O, a:O, raw:O, socket:O, protocol:O, (:O, not:O, HTTP:S-PROT, ):O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The Cobalt Strike tool has malleable C2 profiles .' [/INST] [The:O, Cobalt:B-TOOL, Strike:E-TOOL, tool:O, has:O, malleable:O, C2:S-TOOL, profiles:O, .:O] </s> |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.