text stringlengths 306 1.51k |
|---|
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Seedworm likely functions as a cyber espionage group to secure actionable intelligence that could benefit their sponsor 's interests .' [/INST] [Seedworm:B-HackOrg, likely:O, functions:O, as:O, a:O, cyber:B-HackOrg, espionage:I-HackOrg, group:I-HackOrg, to:O, secure:O, actionable:O, intelligence:O, that:O, could:O, benefit:B-Purp, their:I-Purp, sponsor:I-Purp, 's:I-Purp, interests:I-Purp, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'During the operations , the group used tools consistent with those leveraged during past intrusions including Powermud , a custom tool used by the Seedworm group , and customized PowerShell , LaZagne , and Crackmapexec scripts .' [/INST] [During:O, the:O, operations:O, ,:O, the:O, group:B-HackOrg, used:O, tools:O, consistent:O, with:O, those:O, leveraged:O, during:O, past:O, intrusions:O, including:O, Powermud:B-Tool, ,:O, a:O, custom:O, tool:O, used:O, by:O, the:O, Seedworm:B-HackOrg, group:I-HackOrg, ,:O, and:O, customized:B-Tool, PowerShell:I-Tool, ,:O, LaZagne:B-Tool, ,:O, and:O, Crackmapexec:B-Tool, scripts:I-Tool, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The Seedworm group controls its Powermud backdoor from behind a proxy network to hide the ultimate command-and-control ( C&C ) location .' [/INST] [The:O, Seedworm:B-HackOrg, group:I-HackOrg, controls:O, its:O, Powermud:B-Tool, backdoor:I-Tool, from:O, behind:O, a:O, proxy:O, network:O, to:O, hide:O, the:O, ultimate:O, command-and-control:B-Tool, (:O, C&C:O, ):O, location:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'After compromising a system , typically by installing Powermud or Powemuddy , Seedworm first runs a tool that steals passwords saved in users ' web browsers and email , demonstrating that access to the victim 's email , social media , and chat accounts is one of their likely goals .' [/INST] [After:O, compromising:O, a:O, system:O, ,:O, typically:O, by:O, installing:O, Powermud:B-Tool, or:O, Powemuddy:B-Tool, ,:O, Seedworm:B-HackOrg, first:O, runs:O, a:O, tool:O, that:O, steals:O, passwords:O, saved:O, in:O, users:O, ':O, web:B-Way, browsers:I-Way, and:O, email:B-Way, ,:O, demonstrating:B-Way, that:O, access:B-Purp, to:I-Purp, the:I-Purp, victim:I-Purp, 's:I-Purp, email:I-Purp, ,:O, social:B-Purp, media:I-Purp, ,:O, and:O, chat:B-Purp, accounts:I-Purp, is:O, one:O, of:O, their:O, likely:O, goals:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Seedworm then uses open-source tools such as LaZagne and Crackmapexec to obtain Windows authorization credentials .' [/INST] [Seedworm:B-HackOrg, then:O, uses:O, open-source:O, tools:O, such:O, as:O, LaZagne:B-Tool, and:O, Crackmapexec:B-Tool, to:O, obtain:O, Windows:O, authorization:O, credentials:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The group , which we call Seedworm ( aka MuddyWater ) , has been operating since at least 2017 , with its most recent activity observed in December 2018 .' [/INST] [The:O, group:B-HackOrg, ,:O, which:O, we:O, call:O, Seedworm:B-HackOrg, (:O, aka:O, MuddyWater:B-HackOrg, ):O, ,:O, has:O, been:O, operating:O, since:O, at:O, least:O, 2017:B-Time, ,:O, with:O, its:O, most:O, recent:O, activity:B-OffAct, observed:O, in:O, December:B-Time, 2018:I-Time, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The Seedworm group is the only group known to use the Powermud backdoor .' [/INST] [The:O, Seedworm:B-HackOrg, group:I-HackOrg, is:O, the:O, only:O, group:B-HackOrg, known:O, to:O, use:O, the:O, Powermud:B-Tool, backdoor:I-Tool, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Additionally , the group compromised organizations in Europe and North America that have ties to the Middle East .' [/INST] [Additionally:O, ,:O, the:O, group:B-HackOrg, compromised:O, organizations:O, in:O, Europe:B-Area, and:O, North:B-Area, America:I-Area, that:O, have:O, ties:O, to:O, the:O, Middle:B-Area, East:I-Area, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'MuddyWater is an Iranian high-profile threat actor that 's been seen active since 2017 .' [/INST] [MuddyWater:B-HackOrg, is:O, an:O, Iranian:B-Area, high-profile:O, threat:B-HackOrg, actor:I-HackOrg, that:O, 's:O, been:O, seen:O, active:O, since:O, 2017:B-Time, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Little detail is given on the nature of how the connection between DNSMessenger and MuddyWater was discovered it isn't possible for us to verify this link .' [/INST] [Little:O, detail:O, is:O, given:O, on:O, the:O, nature:O, of:O, how:O, the:O, connection:O, between:O, DNSMessenger:B-Tool, and:O, MuddyWater:B-Tool, was:O, discovered:O, it:O, isn't:O, possible:O, for:O, us:O, to:O, verify:O, this:O, link:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Over the past year , we've seen the group extensively targeting a wide gamut of entities in various sectors , including Governments , Academy , Crypto-Currency , Telecommunications and the Oil sectors .' [/INST] [Over:O, the:O, past:O, year:O, ,:O, we've:O, seen:O, the:O, group:B-HackOrg, extensively:O, targeting:O, a:O, wide:O, gamut:O, of:O, entities:O, in:O, various:O, sectors:O, ,:O, including:O, Governments:B-Idus, ,:O, Academy:B-Idus, ,:O, Crypto-Currency:B-Idus, ,:O, Telecommunications:B-Idus, and:O, the:O, Oil:B-Org, sectors:I-Org, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Little detail is given on the nature of how the connection between DNSMessenger and MuddyWater was discovered it isn't possible for us to verify this link .' [/INST] [Little:O, detail:O, is:O, given:O, on:O, the:O, nature:O, of:O, how:O, the:O, connection:O, between:O, DNSMessenger:B-Tool, and:O, MuddyWater:B-Tool, was:O, discovered:O, it:O, isn't:O, possible:O, for:O, us:O, to:O, verify:O, this:O, link:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Depending on each sample , the content of document is either a fake resume application , or a letter from the Ministry of Justice in Lebanon or Saudi Arabia .' [/INST] [Depending:O, on:O, each:O, sample:O, ,:O, the:O, content:O, of:O, document:O, is:O, either:O, a:O, fake:B-Tool, resume:I-Tool, application:I-Tool, ,:O, or:O, a:O, letter:B-Tool, from:O, the:O, Ministry:O, of:O, Justice:O, in:O, Lebanon:B-Area, or:O, Saudi:B-Area, Arabia:I-Area, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Analysts in our DeepSight Managed Adversary and Threat Intelligence ( MATI ) team have found a new backdoor , Backdoor.Powemuddy , new variants of Seedworm 's Powermud backdoor ( aka POWERSTATS ) , a GitHub repository used by the group to store their scripts , as well as several post-compromise tools the group uses to exploit victims once they have established a foothold in their network .' [/INST] [Analysts:O, in:O, our:O, DeepSight:B-SecTeam, Managed:I-SecTeam, Adversary:I-SecTeam, and:I-SecTeam, Threat:I-SecTeam, Intelligence:I-SecTeam, (:O, MATI:B-SecTeam, ):O, team:O, have:O, found:O, a:O, new:O, backdoor:O, ,:O, Backdoor.Powemuddy:B-SamFile, ,:O, new:O, variants:O, of:O, Seedworm:B-HackOrg, 's:O, Powermud:B-SamFile, backdoor:I-SamFile, (:O, aka:O, POWERSTATS:B-Tool, ):O, ,:O, a:O, GitHub:O, repository:O, used:O, by:O, the:O, group:B-HackOrg, to:O, store:O, their:O, scripts:O, ,:O, as:O, well:O, as:O, several:O, post-compromise:O, tools:O, the:O, group:B-HackOrg, uses:O, to:O, exploit:O, victims:O, once:O, they:O, have:O, established:O, a:O, foothold:O, in:O, their:O, network:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'From January 2018 to March 2018 , through FireEye 's Dynamic Threat Intelligence , we observed attackers leveraging the latest code execution and persistence techniques to distribute malicious macro-based documents to individuals in Asia and the Middle East .' [/INST] [From:O, January:B-Time, 2018:I-Time, to:O, March:B-Time, 2018:I-Time, ,:O, through:O, FireEye:B-SecTeam, 's:I-SecTeam, Dynamic:I-SecTeam, Threat:I-SecTeam, Intelligence:I-SecTeam, ,:O, we:O, observed:O, attackers:B-HackOrg, leveraging:O, the:O, latest:O, code:O, execution:O, and:O, persistence:O, techniques:O, to:O, distribute:O, malicious:O, macro-based:O, documents:O, to:O, individuals:O, in:O, Asia:B-Area, and:O, the:O, Middle:B-Area, East:I-Area, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'MuddyWater has engaged in prolific spear phishing of government and defense entities in Central and Southwest Asia .' [/INST] [MuddyWater:B-HackOrg, has:O, engaged:O, in:O, prolific:O, spear:B-Way, phishing:I-Way, of:O, government:I-Idus, and:O, defense:B-Org, entities:I-Org, in:O, Central:B-Area, and:O, Southwest:B-Area, Asia:I-Area, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'This actor has engaged in prolific spear phishing of government and defense entities in Central and Southwest Asia .' [/INST] [This:O, actor:B-HackOrg, has:O, engaged:O, in:O, prolific:O, spear:B-Way, phishing:I-Way, of:O, government:I-Idus, and:O, defense:B-Org, entities:I-Org, in:O, Central:B-Area, and:O, Southwest:B-Area, Asia:I-Area, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'When successfully executed , the malicious documents install a backdoor we track as POWERSTATS .' [/INST] [When:O, successfully:O, executed:O, ,:O, the:O, malicious:O, documents:O, install:O, a:O, backdoor:B-Tool, we:O, track:O, as:O, POWERSTATS:B-Tool, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The group is known for espionage campaigns in the Middle East .' [/INST] [The:O, group:B-HackOrg, is:O, known:O, for:O, espionage:B-OffAct, campaigns:I-OffAct, in:O, the:O, Middle:B-Area, East:I-Area, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The threat group in this recently observed campaign – TEMP.Zagros – weaponized their malware using the following techniques .' [/INST] [The:O, threat:B-HackOrg, group:I-HackOrg, in:O, this:O, recently:O, observed:O, campaign:B-OffAct, –:O, TEMP.Zagros:O, –:O, weaponized:O, their:O, malware:O, using:O, the:O, following:O, techniques:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The MuddyWater campaign was first sighted in 2017 when it targeted the Saudi government using an attack involving PowerShell scripts deployed via Microsoft Office Word macro .' [/INST] [The:O, MuddyWater:B-OffAct, campaign:I-OffAct, was:O, first:O, sighted:O, in:O, 2017:B-Time, when:O, it:O, targeted:O, the:O, Saudi:B-Area, government:B-Idus, using:O, an:O, attack:B-OffAct, involving:O, PowerShell:B-Tool, scripts:I-Tool, deployed:O, via:O, Microsoft:B-Tool, Office:B-Tool, Word:I-Tool, macro:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The threat group in this recently observed campaign a TEMP.Zagros a weaponized their malware using the following techniques .' [/INST] [The:O, threat:B-HackOrg, group:I-HackOrg, in:O, this:O, recently:O, observed:O, campaign:B-OffAct, a:O, TEMP.Zagros:O, a:O, weaponized:O, their:O, malware:O, using:O, the:O, following:O, techniques:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Like the previous campaigns , these samples again involve a Microsoft Word document embedded with a malicious macro that is capable of executing PowerShell ( PS ) scripts leading to a backdoor payload .' [/INST] [Like:O, the:O, previous:O, campaigns:B-OffAct, ,:O, these:O, samples:O, again:O, involve:O, a:O, Microsoft:B-SamFile, Word:I-SamFile, document:I-SamFile, embedded:O, with:O, a:O, malicious:O, macro:O, that:O, is:O, capable:O, of:O, executing:O, PowerShell:O, (:O, PS:O, ):O, scripts:O, leading:B-Features, to:I-Features, a:I-Features, backdoor:I-Features, payload:I-Features, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'MuddyWater is a relatively new APT that surfaced in 2017 .' [/INST] [MuddyWater:B-HackOrg, is:O, a:O, relatively:O, new:O, APT:B-HackOrg, that:O, surfaced:O, in:O, 2017:B-Time, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'We attribute this activity to TEMP.Zagros ( reported by Palo Alto Networks and Trend Micro as MuddyWater ) , an Iran-nexus actor that has been active since at least May 2017 .' [/INST] [We:O, attribute:O, this:O, activity:B-OffAct, to:O, TEMP.Zagros:B-HackOrg, (:O, reported:O, by:O, Palo:B-SecTeam, Alto:I-SecTeam, Networks:I-SecTeam, and:O, Trend:B-SecTeam, Micro:I-SecTeam, as:O, MuddyWater:B-HackOrg, ):O, ,:O, an:O, Iran-nexus:B-Area, actor:B-HackOrg, that:O, has:O, been:O, active:O, since:O, at:O, least:O, May:B-Time, 2017:I-Time, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'We attribute this activity to TEMP.Zagros ( reported by Palo Alto Networks and Trend Micro ) , an Iran-nexus actor that has been active since at least May 2017 .' [/INST] [We:O, attribute:O, this:O, activity:B-OffAct, to:O, TEMP.Zagros:B-HackOrg, (:O, reported:O, by:O, Palo:B-SecTeam, Alto:I-SecTeam, Networks:I-SecTeam, and:O, Trend:B-SecTeam, Micro:I-SecTeam, ):O, ,:O, an:O, Iran-nexus:B-Area, actor:B-HackOrg, that:O, has:O, been:O, active:O, since:O, at:O, least:O, May:B-Time, 2017:I-Time, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Entities in these sectors are often , enabling victims , as telecommunications providers or IT services agencies and vendors could provide Seedworm actors with further victims to compromise .' [/INST] [Entities:O, in:O, these:O, sectors:O, are:O, often:O, ,:O, enabling:O, victims:O, ,:O, as:O, telecommunications:B-Org, providers:I-Org, or:O, IT:B-Org, services:I-Org, agencies:I-Org, and:O, vendors:O, could:O, provide:O, Seedworm:B-HackOrg, actors:I-HackOrg, with:O, further:O, victims:O, to:O, compromise:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The group mainly targets the telecommunications and IT services sectors .' [/INST] [The:O, group:B-HackOrg, mainly:O, targets:O, the:O, telecommunications:B-Org, and:O, IT:B-Org, services:I-Org, sectors:I-Org, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'However , the group behind MuddyWater has been known to target other countries in the Middle East , Europe and the US .' [/INST] [However:O, ,:O, the:O, group:B-HackOrg, behind:O, MuddyWater:B-HackOrg, has:O, been:O, known:O, to:O, target:O, other:O, countries:O, in:O, the:O, Middle:B-Area, East:I-Area, ,:O, Europe:B-Area, and:O, the:O, US:B-Area, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The group has focused mainly on governmental targets in Iraq and Saudi Arabia , according to past telemetry .' [/INST] [The:O, group:B-HackOrg, has:O, focused:O, mainly:O, on:O, governmental:B-Idus, targets:O, in:O, Iraq:B-Area, and:O, Saudi:B-Area, Arabia:I-Area, ,:O, according:O, to:O, past:O, telemetry:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The new spear-phishing docs used by MuddyWater rely on social engineering to persuade users to enable macros .' [/INST] [The:O, new:O, spear-phishing:B-Way, docs:O, used:O, by:O, MuddyWater:B-HackOrg, rely:O, on:O, social:B-Idus, engineering:I-Idus, to:O, persuade:O, users:O, to:O, enable:O, macros:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'MuddyWater has recently been targeting victims likely from Lebanon and Oman , while leveraging compromised domains , one of which is owned by an Israeli web developer .' [/INST] [MuddyWater:B-HackOrg, has:O, recently:O, been:O, targeting:O, victims:O, likely:O, from:O, Lebanon:B-Area, and:O, Oman:B-Area, ,:O, while:O, leveraging:O, compromised:O, domains:O, ,:O, one:O, of:O, which:O, is:O, owned:O, by:O, an:O, Israeli:B-Area, web:O, developer:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'As MuddyWater has consistently been using POWERSTATS as its main tool , they are relatively easy to distinguish from other actors .' [/INST] [As:O, MuddyWater:B-HackOrg, has:O, consistently:O, been:O, using:O, POWERSTATS:B-Tool, as:O, its:O, main:O, tool:O, ,:O, they:O, are:O, relatively:O, easy:O, to:O, distinguish:O, from:O, other:O, actors:B-HackOrg, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In March 2018 , Trend Micro provided a detailed analysis of another campaign that bore the hallmarks of MuddyWater .' [/INST] [In:O, March:B-Time, 2018:I-Time, ,:O, Trend:B-SecTeam, Micro:I-SecTeam, provided:O, a:O, detailed:O, analysis:O, of:O, another:O, campaign:B-OffAct, that:O, bore:O, the:O, hallmarks:O, of:O, MuddyWater:B-HackOrg, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In May 2018 , Trend Micro found a new sample ( Detected as W2KM_DLOADR.UHAOEEN ) that may be related to this campaign .' [/INST] [In:O, May:B-Time, 2018:I-Time, ,:O, Trend:B-SecTeam, Micro:I-SecTeam, found:O, a:O, new:O, sample:O, (:O, Detected:O, as:O, W2KM_DLOADR.UHAOEEN:B-SamFile, ):O, that:O, may:O, be:O, related:O, to:O, this:O, campaign:B-OffAct, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In May 2018 , Trend Micro found a new sample ( Detected as W2KM_DLOADR.UHAOEEN ) that may be related to this campaign .' [/INST] [In:O, May:B-Time, 2018:I-Time, ,:O, Trend:B-SecTeam, Micro:I-SecTeam, found:O, a:O, new:O, sample:O, (:O, Detected:O, as:O, W2KM_DLOADR.UHAOEEN:B-SamFile, ):O, that:O, may:O, be:O, related:O, to:O, this:O, campaign:B-OffAct, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Given the use of lure documents designed with social engineering in mind , it is likely that MuddyWater use phishing or spam to target users who are unaware of these documents ' malicious nature .' [/INST] [Given:O, the:O, use:O, of:O, lure:O, documents:O, designed:O, with:O, social:B-Idus, engineering:I-Idus, in:O, mind:O, ,:O, it:O, is:O, likely:O, that:O, MuddyWater:B-HackOrg, use:O, phishing:B-Way, or:O, spam:B-Way, to:O, target:O, users:O, who:O, are:O, unaware:O, of:O, these:O, documents:O, ':O, malicious:O, nature:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'We recently noticed the group behind MuddyWater that appear to be targeting government bodies , military entities , telcos and educational institutions in Jordan , Turkey , Azerbaijan and Pakistan , in addition to the continuous targeting of Iraq and Saudi Arabia , other victims were also detected in Mali , Austria , Russia , Iran and Bahrain. .' [/INST] [We:O, recently:O, noticed:O, the:O, group:B-HackOrg, behind:O, MuddyWater:B-HackOrg, that:O, appear:O, to:O, be:O, targeting:O, government:B-Org, bodies:I-Org, ,:O, military:B-Org, entities:I-Org, ,:O, telcos:O, and:O, educational:B-Org, institutions:I-Org, in:O, Jordan:B-Area, ,:O, Turkey:B-Area, ,:O, Azerbaijan:B-Area, and:O, Pakistan:B-Area, ,:O, in:O, addition:O, to:O, the:O, continuous:O, targeting:O, of:O, Iraq:B-Area, and:O, Saudi:B-Area, Arabia:I-Area, ,:O, other:O, victims:O, were:O, also:O, detected:O, in:O, Mali:B-Area, ,:O, Austria:B-Area, ,:O, Russia:B-Area, ,:O, Iran:B-Area, and:O, Bahrain.:B-Area, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Observed Seedworm victims were located primarily in Pakistan and Turkey , but also in Russia , Saudi Arabia , Afghanistan , Jordan , and elsewhere .' [/INST] [Observed:O, Seedworm:B-HackOrg, victims:O, were:O, located:O, primarily:O, in:O, Pakistan:B-Area, and:O, Turkey:B-Area, ,:O, but:O, also:O, in:O, Russia:B-Area, ,:O, Saudi:B-Area, Arabia:I-Area, ,:O, Afghanistan:B-Area, ,:O, Jordan:B-Area, ,:O, and:O, elsewhere:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The MuddyWaters group has carried out a large number of attacks and demonstrated advanced social engineering , in addition to the active development of attacks , infrastructure and the use of new methods and techniques .' [/INST] [The:O, MuddyWaters:B-HackOrg, group:I-HackOrg, has:O, carried:O, out:O, a:O, large:O, number:O, of:O, attacks:B-OffAct, and:O, demonstrated:O, advanced:O, social:B-Way, engineering:I-Way, ,:O, in:O, addition:O, to:O, the:O, active:O, development:O, of:O, attacks:B-OffAct, ,:O, infrastructure:O, and:O, the:O, use:O, of:O, new:O, methods:O, and:O, techniques:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Cisco Talos assesses with moderate confidence that a campaign we recently discovered called , BlackWater , is associated with suspected persistent threat actor MuddyWater .' [/INST] [Cisco:B-SecTeam, Talos:I-SecTeam, assesses:O, with:O, moderate:O, confidence:O, that:O, a:O, campaign:B-OffAct, we:O, recently:O, discovered:O, called:O, ,:O, BlackWater:O, ,:O, is:O, associated:O, with:O, suspected:O, persistent:O, threat:B-HackOrg, actor:I-HackOrg, MuddyWater:I-HackOrg, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In this latest activity , BlackWater first added an obfuscated Visual Basic for Applications ( VBA ) script to establish persistence as a registry key .' [/INST] [In:O, this:O, latest:O, activity:B-OffAct, ,:O, BlackWater:O, first:O, added:O, an:O, obfuscated:O, Visual:B-Tool, Basic:I-Tool, for:I-Tool, Applications:I-Tool, (:O, VBA:B-Tool, ):O, script:O, to:O, establish:O, persistence:O, as:O, a:O, registry:O, key:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Talos has uncovered documents that we assess with moderate confidence are associated with suspected persistent threat actor MuddyWater .' [/INST] [Talos:B-SecTeam, has:O, uncovered:O, documents:O, that:O, we:O, assess:O, with:O, moderate:O, confidence:O, are:O, associated:O, with:O, suspected:O, persistent:O, threat:B-HackOrg, actor:I-HackOrg, MuddyWater:I-HackOrg, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'MuddyWater has been active since at least November 2017 and has been known to primarily target entities in the Middle East .' [/INST] [MuddyWater:B-HackOrg, has:O, been:O, active:O, since:O, at:O, least:O, November:B-Time, 2017:I-Time, and:O, has:O, been:O, known:O, to:O, primarily:O, target:O, entities:O, in:O, the:O, Middle:B-Area, East:I-Area, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Between February and March 2019 , probable MuddyWater-associated samples indicated that BlackWater established persistence on the compromised host , at used PowerShell commands to enumerate the victim 's machine and contained the IP address of the actor 's command and control ( C2 ) .' [/INST] [Between:O, February:B-Time, and:O, March:B-Time, 2019:I-Time, ,:O, probable:O, MuddyWater-associated:B-Tool, samples:I-Tool, indicated:O, that:O, BlackWater:O, established:O, persistence:O, on:O, the:O, compromised:O, host:O, ,:O, at:O, used:O, PowerShell:B-Tool, commands:I-Tool, to:O, enumerate:O, the:O, victim:O, 's:O, machine:O, and:O, contained:O, the:O, IP:O, address:O, of:O, the:O, actor:B-HackOrg, 's:O, command:O, and:O, control:O, (:O, C2:O, ):O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Despite last month 's report on aspects of the MuddyWater campaign , the group is undeterred and continues to perform operations .' [/INST] [Despite:O, last:O, month:O, 's:O, report:O, on:O, aspects:O, of:O, the:O, MuddyWater:B-OffAct, campaign:I-OffAct, ,:O, the:O, group:B-HackOrg, is:O, undeterred:O, and:O, continues:O, to:O, perform:O, operations:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Based on these observations , as well as MuddyWater 's history of targeting Turkey-based entities , we assess with moderate confidence that this campaign is associated with the MuddyWater threat actor group .' [/INST] [Based:O, on:O, these:O, observations:O, ,:O, as:O, well:O, as:O, MuddyWater:B-HackOrg, 's:O, history:O, of:O, targeting:O, Turkey-based:B-Area, entities:O, ,:O, we:O, assess:O, with:O, moderate:O, confidence:O, that:O, this:O, campaign:B-OffAct, is:O, associated:O, with:O, the:O, MuddyWater:B-HackOrg, threat:B-HackOrg, actor:I-HackOrg, group:I-HackOrg, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Our recent report , , The Chronicles of the Hellsing APT : the Empire Strikes Back , began with an introduction to the Naikon APT , describing it as , One of the most active APTs in Asia , especially around the South China Sea , .' [/INST] [Our:O, recent:O, report:O, ,:O, ,:O, The:O, Chronicles:O, of:O, the:O, Hellsing:B-HackOrg, APT:I-HackOrg, ::O, the:O, Empire:B-Tool, Strikes:I-Tool, Back:I-Tool, ,:O, began:O, with:O, an:O, introduction:O, to:O, the:O, Naikon:B-HackOrg, APT:I-HackOrg, ,:O, describing:O, it:O, as:O, ,:O, One:O, of:O, the:O, most:O, active:O, APTs:O, in:O, Asia:B-Area, ,:O, especially:O, around:O, the:O, South:B-Area, China:I-Area, Sea:I-Area, ,:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'It came in the form of a , Tran Duy Linh , CVE-2012-0158 exploit kit document MD5 : de8a242af3794a8be921df0cfa51885f61 and was observed on April 10 , 2014 .' [/INST] [It:O, came:O, in:O, the:O, form:O, of:O, a:O, ,:O, Tran:B-Tool, Duy:I-Tool, Linh:I-Tool, ,:O, CVE-2012-0158:B-Exp, exploit:O, kit:O, document:O, MD5:O, ::O, de8a242af3794a8be921df0cfa51885f61:O, and:O, was:O, observed:O, on:O, April:B-Time, 10:I-Time, ,:I-Time, 2014:I-Time, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Considering the volume of Naikon activity observed and its relentless , repeated attack attempts , such a confrontation was worth looking into , so we did .' [/INST] [Considering:O, the:O, volume:O, of:O, Naikon:B-OffAct, activity:I-OffAct, observed:O, and:O, its:O, relentless:O, ,:O, repeated:O, attack:B-OffAct, attempts:O, ,:O, such:O, a:O, confrontation:O, was:O, worth:O, looking:O, into:O, ,:O, so:O, we:O, did:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The attackers appeared to be Chinese-speaking and targeted mainly top-level government agencies and civil and military organizations in countries such as the Philippines , Malaysia , Cambodia , Indonesia , Vietnam , Myanmar , Singapore , Nepal , Thailand , Laos and China .' [/INST] [The:O, attackers:B-HackOrg, appeared:O, to:O, be:O, Chinese-speaking:B-Area, and:O, targeted:O, mainly:O, top-level:O, government:B-Org, agencies:I-Org, and:O, civil:B-Org, and:I-Org, military:I-Org, organizations:I-Org, in:O, countries:O, such:O, as:O, the:O, Philippines:B-Area, ,:O, Malaysia:B-Area, ,:O, Cambodia:B-Area, ,:O, Indonesia:B-Area, ,:O, Vietnam:B-Area, ,:O, Myanmar:B-Area, ,:O, Singapore:B-Area, ,:O, Nepal:B-Area, ,:O, Thailand:B-Area, ,:O, Laos:B-Area, and:O, China:B-Area, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The oil and gas infrastructure nexus observed in connection with greensky27.vicp.net and other Unit 78020 ( Naikon ) infrastructure suggests targeting patterns supportive of the PRC 's strategic interests over energy resources within the South China Sea and Southeast Asia .' [/INST] [The:O, oil:B-Idus, and:I-Idus, gas:I-Idus, infrastructure:O, nexus:O, observed:O, in:O, connection:O, with:O, greensky27.vicp.net:O, and:O, other:O, Unit:O, 78020:O, (:O, Naikon:B-HackOrg, ):O, infrastructure:O, suggests:O, targeting:O, patterns:O, supportive:O, of:O, the:O, PRC:B-Area, 's:O, strategic:O, interests:O, over:O, energy:B-Idus, resources:I-Idus, within:O, the:O, South:B-Area, China:I-Area, Sea:I-Area, and:O, Southeast:B-Area, Asia:I-Area, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'This Naikon report will be complemented by a follow-on report that will examine the Naikon TTP and the incredible volume of attack activity around the South China Sea that has been going on since at least 2010 .' [/INST] [This:O, Naikon:B-HackOrg, report:O, will:O, be:O, complemented:O, by:O, a:O, follow-on:O, report:O, that:O, will:O, examine:O, the:O, Naikon:B-HackOrg, TTP:O, and:O, the:O, incredible:O, volume:O, of:O, attack:B-OffAct, activity:I-OffAct, around:O, the:O, South:B-Area, China:I-Area, Sea:I-Area, that:O, has:O, been:O, going:O, on:O, since:O, at:O, least:O, 2010:B-Time, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The attackers appeared to be Chinese-speaking and targeted mainly top-level government agencies and civil and military organizations in countries such as the Philippines , Malaysia , Cambodia , Indonesia , Vietnam , Myanmar , Singapore , Nepal .' [/INST] [The:O, attackers:B-HackOrg, appeared:O, to:O, be:O, Chinese-speaking:B-Area, and:O, targeted:O, mainly:O, top-level:O, government:B-Org, agencies:I-Org, and:O, civil:B-Org, and:I-Org, military:I-Org, organizations:I-Org, in:O, countries:O, such:O, as:O, the:O, Philippines:B-Area, ,:O, Malaysia:B-Area, ,:O, Cambodia:B-Area, ,:O, Indonesia:B-Area, ,:O, Vietnam:B-Area, ,:O, Myanmar:B-Area, ,:O, Singapore:B-Area, ,:O, Nepal:B-Area, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'This bait document , or email attachment , appears to be a standard Word document , but is in fact an CVE-2012-0158 exploit , an executable with a double extension , or an executable with an RTLO filename , so it can execute code without the user 's knowledge or consent .' [/INST] [This:O, bait:B-SamFile, document:I-SamFile, ,:O, or:O, email:B-Way, attachment:I-Way, ,:O, appears:O, to:O, be:O, a:O, standard:O, Word:B-SamFile, document:I-SamFile, ,:O, but:O, is:O, in:O, fact:O, an:O, CVE-2012-0158:B-Exp, exploit:O, ,:O, an:O, executable:O, with:O, a:O, double:O, extension:O, ,:O, or:O, an:O, executable:O, with:O, an:O, RTLO:O, filename:O, ,:O, so:O, it:O, can:O, execute:O, code:O, without:O, the:O, user:O, 's:O, knowledge:O, or:O, consent:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In the Naikon scheme , a C&C server can be specialized XSControl software running on the host machine .' [/INST] [In:O, the:O, Naikon:B-HackOrg, scheme:O, ,:O, a:O, C&C:B-Tool, server:I-Tool, can:O, be:O, specialized:O, XSControl:O, software:O, running:O, on:O, the:O, host:O, machine:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'It was during operator X 's network monitoring that the attackers placed Naikon proxies within the countries ' borders , to cloak and support real-time outbound connections and data exfiltration from high-profile victim organizations .' [/INST] [It:O, was:O, during:O, operator:O, X:O, 's:O, network:O, monitoring:O, that:O, the:O, attackers:B-HackOrg, placed:O, Naikon:B-Tool, proxies:I-Tool, within:O, the:O, countries:O, ':O, borders:O, ,:O, to:O, cloak:O, and:O, support:O, real-time:O, outbound:O, connections:O, and:O, data:B-Purp, exfiltration:I-Purp, from:O, high-profile:O, victim:O, organizations:I-Org, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In addition to stealing keystrokes , Naikon also intercepted network traffic .' [/INST] [In:O, addition:O, to:O, stealing:B-Purp, keystrokes:I-Purp, ,:O, Naikon:B-HackOrg, also:O, intercepted:O, network:B-Way, traffic:I-Way, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Operator X also took advantage of cultural idiosyncrasies in its target countries , for example , the regular and widely accepted use of personal Gmail accounts for work .' [/INST] [Operator:O, X:O, also:O, took:O, advantage:O, of:O, cultural:O, idiosyncrasies:O, in:O, its:O, target:O, countries:O, ,:O, for:O, example:O, ,:O, the:O, regular:O, and:O, widely:O, accepted:O, use:O, of:O, personal:O, Gmail:O, accounts:O, for:O, work:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In the spring of 2014 , we noticed an increase in the volume of attack activity by the Naikon APT .' [/INST] [In:O, the:O, spring:B-Time, of:I-Time, 2014:I-Time, ,:O, we:O, noticed:O, an:O, increase:O, in:O, the:O, volume:O, of:O, attack:B-OffAct, activity:I-OffAct, by:O, the:O, Naikon:B-HackOrg, APT:I-HackOrg, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In particular , we noticed that the Naikon group was spear-phished by an actor we now call , Hellsing , .' [/INST] [In:O, particular:O, ,:O, we:O, noticed:O, that:O, the:O, Naikon:B-HackOrg, group:I-HackOrg, was:O, spear-phished:O, by:O, an:O, actor:B-HackOrg, we:O, now:O, call:O, ,:O, Hellsing:B-HackOrg, ,:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'More details about the cloak and dagger games between Naikon and Hellsing can be found in our blogpost : , The Chronicles of the Hellsing APT : The Empire Strikes Back , .' [/INST] [More:O, details:O, about:O, the:O, cloak:O, and:O, dagger:O, games:O, between:O, Naikon:B-HackOrg, and:O, Hellsing:B-HackOrg, can:O, be:O, found:O, in:O, our:O, blogpost:O, ::O, ,:O, The:O, Chronicles:O, of:O, the:O, Hellsing:B-HackOrg, APT:I-HackOrg, ::O, The:O, Empire:B-Tool, Strikes:I-Tool, Back:I-Tool, ,:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Truvasys has been involved in several attack campaigns , where it has masqueraded as one of server common computer utilities , including WinUtils , TrueCrypt , WinRAR , or SanDisk .' [/INST] [Truvasys:B-Tool, has:O, been:O, involved:O, in:O, several:O, attack:B-OffAct, campaigns:I-OffAct, ,:O, where:O, it:O, has:O, masqueraded:O, as:O, one:O, of:O, server:O, common:O, computer:B-Org, utilities:I-Org, ,:O, including:O, WinUtils:B-Org, ,:O, TrueCrypt:B-Org, ,:O, WinRAR:B-Org, ,:O, or:O, SanDisk:B-Org, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'PROMETHIUM is an activity group that has been active as early as 2012 .' [/INST] [PROMETHIUM:B-HackOrg, is:O, an:O, activity:B-HackOrg, group:I-HackOrg, that:O, has:O, been:O, active:O, as:O, early:O, as:O, 2012:B-Time, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The group primarily uses Truvasys , a first-stage malware that has been in circulation for several years .' [/INST] [The:O, group:B-HackOrg, primarily:O, uses:O, Truvasys:B-Tool, ,:O, a:O, first-stage:O, malware:O, that:O, has:O, been:O, in:O, circulation:O, for:O, several:O, years:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'NEODYMIUM is an activity group that is known to use a backdoor malware detected by Microsoft as Wingbird .' [/INST] [NEODYMIUM:B-HackOrg, is:O, an:O, activity:B-HackOrg, group:I-HackOrg, that:O, is:O, known:O, to:O, use:O, a:O, backdoor:O, malware:O, detected:O, by:O, Microsoft:B-Org, as:O, Wingbird:B-Tool, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'PROMETHIUM and NEODYMIUM both used an exploit for CVE-2016-4117 , a vulnerability in Adobe Flash Player that , at the time , was both unknown and unpatched .' [/INST] [PROMETHIUM:B-HackOrg, and:O, NEODYMIUM:B-HackOrg, both:O, used:O, an:O, exploit:O, for:O, CVE-2016-4117:B-Exp, ,:O, a:O, vulnerability:O, in:O, Adobe:O, Flash:O, Player:O, that:O, ,:O, at:O, the:O, time:O, ,:O, was:O, both:O, unknown:O, and:O, unpatched:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Data about Wingbird activity indicate that it is typically used to attack individual computers instead of networks .' [/INST] [Data:O, about:O, Wingbird:B-OffAct, activity:I-OffAct, indicate:O, that:O, it:O, is:O, typically:O, used:O, to:O, attack:O, individual:O, computers:O, instead:O, of:O, networks:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In early May 2016 , both PROMETHIUM and NEODYMIUM started conducting attack campaigns against specific individuals in Europe .' [/INST] [In:O, early:B-Time, May:I-Time, 2016:I-Time, ,:O, both:O, PROMETHIUM:B-HackOrg, and:O, NEODYMIUM:B-HackOrg, started:O, conducting:O, attack:B-OffAct, campaigns:I-OffAct, against:O, specific:B-Org, individuals:I-Org, in:O, Europe:B-Area, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Meanwhile , NEODYMIUM used well-tailored spear-phishing emails with attachments that delivered the exploit code , ultimately leading to Wingbird 's installation on victim computers .' [/INST] [Meanwhile:O, ,:O, NEODYMIUM:B-HackOrg, used:O, well-tailored:O, spear-phishing:B-Way, emails:I-Way, with:O, attachments:O, that:O, delivered:O, the:O, exploit:O, code:O, ,:O, ultimately:O, leading:O, to:O, Wingbird:B-Tool, 's:O, installation:O, on:O, victim:O, computers:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'PROMETHIUM and NEODYMIUM both used a zero-day exploit that executed code to download a malicious payload .' [/INST] [PROMETHIUM:B-HackOrg, and:O, NEODYMIUM:B-HackOrg, both:O, used:O, a:O, zero-day:B-Exp, exploit:I-Exp, that:O, executed:O, code:O, to:O, download:O, a:O, malicious:O, payload:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Wingbird , the advanced malware used by NEODYMIUM , has several behaviors that trigger alerts in Windows Defender ATP .' [/INST] [Wingbird:B-Tool, ,:O, the:O, advanced:O, malware:O, used:O, by:O, NEODYMIUM:B-HackOrg, ,:O, has:O, several:O, behaviors:O, that:O, trigger:O, alerts:O, in:O, Windows:B-SecTeam, Defender:I-SecTeam, ATP:I-SecTeam, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'This volume chronicles two activity groups , code-named PROMETHIUM and NEODYMIUM , both of which target individuals in a specific area of Europe .' [/INST] [This:O, volume:O, chronicles:O, two:O, activity:B-HackOrg, groups:I-HackOrg, ,:O, code-named:O, PROMETHIUM:B-HackOrg, and:O, NEODYMIUM:B-HackOrg, ,:O, both:O, of:O, which:O, target:O, individuals:O, in:O, a:O, specific:O, area:O, of:O, Europe:B-Area, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Although most malware today either seeks monetary gain or conducts espionage for economic advantage , both of these activity groups appear to seek information about specific individuals .' [/INST] [Although:O, most:O, malware:O, today:O, either:O, seeks:O, monetary:O, gain:O, or:O, conducts:O, espionage:B-HackOrg, for:O, economic:B-Idus, advantage:O, ,:O, both:O, of:O, these:O, activity:B-HackOrg, groups:I-HackOrg, appear:O, to:O, seek:B-Purp, information:I-Purp, about:O, specific:B-Org, individuals:I-Org, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In May 2016 , both PROMETHIUM and NEODYMIUM were observed to launch attack campaigns .' [/INST] [In:O, May:B-Time, 2016:I-Time, ,:O, both:O, PROMETHIUM:B-HackOrg, and:O, NEODYMIUM:B-HackOrg, were:O, observed:O, to:O, launch:O, attack:B-OffAct, campaigns:I-OffAct, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'NEODYMIUM is an activity group that , like PROMETHIUM , conducted an attack campaign in early May 2016 .' [/INST] [NEODYMIUM:B-HackOrg, is:O, an:O, activity:B-HackOrg, group:I-HackOrg, that:O, ,:O, like:O, PROMETHIUM:B-HackOrg, ,:O, conducted:O, an:O, attack:B-OffAct, campaign:I-OffAct, in:O, early:B-Time, May:I-Time, 2016:I-Time, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Data about Wingbird activity indicates that it is typically used to attack individuals and individual computers instead of networks .' [/INST] [Data:O, about:O, Wingbird:B-OffAct, activity:I-OffAct, indicates:O, that:O, it:O, is:O, typically:O, used:O, to:O, attack:O, individuals:O, and:O, individual:O, computers:O, instead:O, of:O, networks:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'NEODYMIUM also used the exact same CVE-2016-4117 exploit code that PROMETHIUM used , prior to public knowledge of the vulnerability 's existence .' [/INST] [NEODYMIUM:B-HackOrg, also:O, used:O, the:O, exact:O, same:O, CVE-2016-4117:B-Exp, exploit:O, code:O, that:O, PROMETHIUM:B-HackOrg, used:O, ,:O, prior:O, to:O, public:O, knowledge:O, of:O, the:O, vulnerability:O, 's:O, existence:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'NEODYMIUM used a backdoor detected by Windows Defender as Wingbird , whose characteristics closely match FinFisher , a government-grade commercial surveillance package .' [/INST] [NEODYMIUM:B-HackOrg, used:O, a:O, backdoor:O, detected:O, by:O, Windows:O, Defender:O, as:O, Wingbird:B-Tool, ,:O, whose:O, characteristics:O, closely:O, match:O, FinFisher:B-Org, ,:O, a:O, government-grade:O, commercial:O, surveillance:O, package:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In May 2016 , two apparently unrelated activity groups , PROMETHIUM and NEODYMIUM , conducted attack campaigns in Europe that used the same zeroday exploit while the vulnerability was publicly unknown .' [/INST] [In:O, May:B-Time, 2016:I-Time, ,:O, two:O, apparently:O, unrelated:O, activity:B-HackOrg, groups:I-HackOrg, ,:O, PROMETHIUM:B-HackOrg, and:O, NEODYMIUM:B-HackOrg, ,:O, conducted:O, attack:B-OffAct, campaigns:I-OffAct, in:O, Europe:B-Area, that:O, used:O, the:O, same:O, zeroday:B-Exp, exploit:I-Exp, while:O, the:O, vulnerability:O, was:O, publicly:O, unknown:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The Middle Eastern hacker group in this case is codenamed , BlackOasis , Kaspersky found the group was exploiting a Adobe Flash Player zero-day vulnerability ( CVE-2016-4117 ) to remotely deliver the latest version of , FinSpy , malware , according to a new blog post published Monday .' [/INST] [The:O, Middle:B-Area, Eastern:I-Area, hacker:B-HackOrg, group:I-HackOrg, in:O, this:O, case:O, is:O, codenamed:O, ,:O, BlackOasis:B-HackOrg, ,:O, Kaspersky:B-SecTeam, found:O, the:O, group:B-HackOrg, was:O, exploiting:O, a:O, Adobe:B-Exp, Flash:I-Exp, Player:I-Exp, zero-day:I-Exp, vulnerability:I-Exp, (:O, CVE-2016-4117:B-Exp, ):O, to:O, remotely:O, deliver:O, the:O, latest:O, version:O, of:O, ,:O, FinSpy:B-Tool, ,:O, malware:O, ,:O, according:O, to:O, a:O, new:O, blog:O, post:O, published:O, Monday:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'FinSpy , a final-stage payload that allows for an attacker to covertly learn what a target is talking about and who they are communicating with , is associated with Gamma Group — which goes by other names , including FinFisher and Lench IT Solutions .' [/INST] [FinSpy:B-Tool, ,:O, a:O, final-stage:O, payload:O, that:O, allows:O, for:O, an:O, attacker:B-HackOrg, to:O, covertly:O, learn:O, what:O, a:O, target:O, is:O, talking:O, about:O, and:O, who:O, they:O, are:O, communicating:O, with:O, ,:O, is:O, associated:O, with:O, Gamma:B-HackOrg, Group:I-HackOrg, —:O, which:O, goes:O, by:O, other:O, names:O, ,:O, including:O, FinFisher:B-Org, and:O, Lench:O, IT:O, Solutions:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In the past , BlackOasis messages were designed to appear like news articles from 2016 about political relations between Angola and China .' [/INST] [In:O, the:O, past:O, ,:O, BlackOasis:B-HackOrg, messages:O, were:O, designed:O, to:O, appear:O, like:O, news:O, articles:O, from:O, 2016:B-Time, about:O, political:B-Idus, relations:O, between:O, Angola:B-Area, and:O, China:B-Area, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'BlackOasis in recent months sent a wave of phishing emails .' [/INST] [BlackOasis:B-HackOrg, in:O, recent:O, months:O, sent:O, a:O, wave:O, of:O, phishing:B-Way, emails:I-Way, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'PROMETHIUM uses a unique set of tools and methods to perform actions like lateral movement and data exfiltration .' [/INST] [PROMETHIUM:B-HackOrg, uses:O, a:O, unique:O, set:O, of:O, tools:O, and:O, methods:O, to:O, perform:O, actions:O, like:O, lateral:O, movement:O, and:O, data:B-Purp, exfiltration:I-Purp, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Last year , Microsoft researchers described Neodymium 's behavior as unusual : , unlike many activity groups , which typically gather information for monetary gain or economic espionage , PROMETHIUM and NEODYMIUM appear to launch campaigns simply to gather information about certain individuals .' [/INST] [Last:O, year:O, ,:O, Microsoft:B-Org, researchers:O, described:O, Neodymium:B-HackOrg, 's:O, behavior:O, as:O, unusual:O, ::O, ,:O, unlike:O, many:O, activity:B-HackOrg, groups:I-HackOrg, ,:O, which:O, typically:O, gather:B-Purp, information:I-Purp, for:O, monetary:O, gain:O, or:O, economic:B-Idus, espionage:O, ,:O, PROMETHIUM:B-HackOrg, and:O, NEODYMIUM:B-HackOrg, appear:O, to:O, launch:O, campaigns:B-OffAct, simply:O, to:O, gather:B-Purp, information:I-Purp, about:O, certain:O, individuals:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The discovery by Kaspersky marks at least the fifth zero-day exploit used by BlackOasis and exposed by security researchers since June 2015 .' [/INST] [The:O, discovery:O, by:O, Kaspersky:B-SecTeam, marks:O, at:O, least:O, the:O, fifth:O, zero-day:B-Exp, exploit:I-Exp, used:O, by:O, BlackOasis:B-HackOrg, and:O, exposed:O, by:O, security:O, researchers:O, since:O, June:B-Time, 2015:I-Time, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Victims of BlackOasis have been observed in the following countries : Russia , Iraq , Afghanistan , Nigeria , Libya , Jordan , Tunisia , Saudi Arabia , Iran , Netherlands , Bahrain , United Kingdom and Angola .' [/INST] [Victims:O, of:O, BlackOasis:B-HackOrg, have:O, been:O, observed:O, in:O, the:O, following:O, countries:O, ::O, Russia:B-Area, ,:O, Iraq:B-Area, ,:O, Afghanistan:B-Area, ,:O, Nigeria:B-Area, ,:O, Libya:B-Area, ,:O, Jordan:B-Area, ,:O, Tunisia:B-Area, ,:O, Saudi:B-Area, Arabia:I-Area, ,:O, Iran:B-Area, ,:O, Netherlands:B-Area, ,:O, Bahrain:B-Area, ,:O, United:B-Area, Kingdom:I-Area, and:O, Angola:B-Area, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Unlike many activity groups , which typically gather information for monetary gain or economic espionage , PROMETHIUM and NEODYMIUM appear to launch campaigns simply to gather information about certain individuals .' [/INST] [Unlike:O, many:O, activity:B-HackOrg, groups:I-HackOrg, ,:O, which:O, typically:O, gather:B-Purp, information:I-Purp, for:O, monetary:O, gain:O, or:O, economic:B-Idus, espionage:O, ,:O, PROMETHIUM:B-HackOrg, and:O, NEODYMIUM:B-HackOrg, appear:O, to:O, launch:O, campaigns:B-OffAct, simply:O, to:O, gather:B-Purp, information:I-Purp, about:O, certain:O, individuals:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'A cursory review of BlackOasis ' espionage campaign suggests there is some overlap between the group 's actions and Saudi Arabia 's geopolitical interests .' [/INST] [A:O, cursory:O, review:O, of:O, BlackOasis:B-HackOrg, ':O, espionage:B-OffAct, campaign:I-OffAct, suggests:O, there:O, is:O, some:O, overlap:O, between:O, the:O, group:B-HackOrg, 's:O, actions:O, and:O, Saudi:B-Area, Arabia:I-Area, 's:O, geopolitical:B-Idus, interests:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Kaspersky 's research notes that BlackOasis hacked into computers based in Saudi Arabia .' [/INST] [Kaspersky:B-SecTeam, 's:O, research:O, notes:O, that:O, BlackOasis:B-HackOrg, hacked:O, into:O, computers:O, based:O, in:O, Saudi:B-Area, Arabia:I-Area, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'All 13 countries where Kaspersky reportedly observed BlackOasis activity are connected to Saudi Arabia in one of three ways : economically ; from a national security perspective ; or due to established policy agreements .' [/INST] [All:O, 13:O, countries:O, where:O, Kaspersky:B-SecTeam, reportedly:O, observed:O, BlackOasis:B-OffAct, activity:I-OffAct, are:O, connected:O, to:O, Saudi:B-Area, Arabia:I-Area, in:O, one:O, of:O, three:O, ways:O, ::O, economically:O, ;:O, from:O, a:O, national:O, security:O, perspective:O, ;:O, or:O, due:O, to:O, established:O, policy:O, agreements:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The Operation Aurora , named by McAfee and announced in January 2010 , and the WikiLeaks document disclosures of 2010 have highlighted the fact that external and internal threats are nearly impossible to prevent .' [/INST] [The:O, Operation:B-OffAct, Aurora:I-OffAct, ,:O, named:O, by:O, McAfee:B-SecTeam, and:O, announced:O, in:O, January:B-Time, 2010:I-Time, ,:O, and:O, the:O, WikiLeaks:B-SecTeam, document:O, disclosures:O, of:O, 2010:B-Time, have:O, highlighted:O, the:O, fact:O, that:O, external:O, and:O, internal:O, threats:O, are:O, nearly:O, impossible:O, to:O, prevent:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'These attacks have involved social engineering , spearphishing attacks , exploitation of Microsoft Windows operating systems vulnerabilities , Microsoft Active Directory compromises , and the use of remote administration tools ( RATs ) in targeting and harvesting sensitive competitive proprietary operations and project-financing information with regard to oil and gas field bids and operations .' [/INST] [These:O, attacks:B-OffAct, have:O, involved:O, social:B-Idus, engineering:I-Idus, ,:O, spearphishing:B-OffAct, attacks:I-OffAct, ,:O, exploitation:O, of:O, Microsoft:O, Windows:O, operating:O, systems:O, vulnerabilities:O, ,:O, Microsoft:O, Active:O, Directory:O, compromises:O, ,:O, and:O, the:O, use:O, of:O, remote:B-Tool, administration:I-Tool, tools:I-Tool, (:O, RATs:B-Tool, ):O, in:O, targeting:O, and:O, harvesting:O, sensitive:O, competitive:O, proprietary:O, operations:O, and:O, project-financing:O, information:O, with:O, regard:O, to:O, oil:B-Idus, and:I-Idus, gas:I-Idus, field:O, bids:O, and:O, operations:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Night Dragon 's attacks have involved social engineering , spearphishing attacks , exploitation of Microsoft Windows operating systems vulnerabilities , Microsoft Active Directory compromises , and the use of remote administration tools ( RATs ) in targeting and harvesting sensitive competitive proprietary operations and project-financing information with regard to oil and gas field bids and operations .' [/INST] [Night:B-HackOrg, Dragon:I-HackOrg, 's:O, attacks:B-OffAct, have:O, involved:O, social:B-Idus, engineering:I-Idus, ,:O, spearphishing:B-OffAct, attacks:I-OffAct, ,:O, exploitation:O, of:O, Microsoft:O, Windows:O, operating:O, systems:O, vulnerabilities:O, ,:O, Microsoft:O, Active:O, Directory:O, compromises:O, ,:O, and:O, the:O, use:O, of:O, remote:B-Tool, administration:I-Tool, tools:I-Tool, (:O, RATs:B-Tool, ):O, in:O, targeting:O, and:O, harvesting:O, sensitive:O, competitive:O, proprietary:O, operations:O, and:O, project-financing:O, information:O, with:O, regard:O, to:O, oil:B-Idus, and:I-Idus, gas:I-Idus, field:O, bids:O, and:O, operations:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'We have identified the tools , techniques , and network activities used in these continuing attacks—which we have dubbed Night Dragon—as originating primarily in China .' [/INST] [We:O, have:O, identified:O, the:O, tools:O, ,:O, techniques:O, ,:O, and:O, network:B-OffAct, activities:I-OffAct, used:O, in:O, these:O, continuing:O, attacks—which:O, we:O, have:O, dubbed:O, Night:B-HackOrg, Dragon—as:I-HackOrg, originating:O, primarily:O, in:O, China:B-Area, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Attackers using several locations in China have leveraged C&C servers on purchased hosted services in the United States and compromised servers in the Netherlands to wage attacks against global oil , gas , and petrochemical companies , as well as individuals and executives in Kazakhstan , Taiwan , Greece , and the United States to acquire proprietary and highly confidential information .' [/INST] [Attackers:B-HackOrg, using:O, several:O, locations:O, in:O, China:B-Area, have:O, leveraged:O, C&C:O, servers:O, on:O, purchased:O, hosted:O, services:O, in:O, the:O, United:B-Area, States:I-Area, and:O, compromised:O, servers:O, in:O, the:O, Netherlands:B-Area, to:O, wage:O, attacks:B-OffAct, against:O, global:O, oil:B-Idus, ,:O, gas:B-Idus, ,:O, and:O, petrochemical:B-Org, companies:I-Org, ,:O, as:O, well:O, as:O, individuals:O, and:O, executives:B-Org, in:O, Kazakhstan:B-Area, ,:O, Taiwan:B-Area, ,:O, Greece:B-Area, ,:O, and:O, the:O, United:B-Area, States:I-Area, to:O, acquire:O, proprietary:O, and:O, highly:O, confidential:O, information:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Attackers using several locations in China have leveraged C&C servers on purchased hosted services in the United States and compromised servers in the Netherlands to wage attacks against global oil , gas , and petrochemical companies , as well as individuals and executives in Kazakhstan , Taiwan , Greece , and the United States to acquire proprietary and highly confidential information .' [/INST] [Attackers:B-HackOrg, using:O, several:O, locations:O, in:O, China:B-Area, have:O, leveraged:O, C&C:O, servers:O, on:O, purchased:O, hosted:O, services:O, in:O, the:O, United:B-Area, States:I-Area, and:O, compromised:O, servers:O, in:O, the:O, Netherlands:B-Area, to:O, wage:O, attacks:B-OffAct, against:O, global:O, oil:B-Idus, ,:O, gas:B-Idus, ,:O, and:O, petrochemical:B-Org, companies:I-Org, ,:O, as:O, well:O, as:O, individuals:O, and:O, executives:B-Org, in:O, Kazakhstan:B-Area, ,:O, Taiwan:B-Area, ,:O, Greece:B-Area, ,:O, and:O, the:O, United:B-Area, States:I-Area, to:O, acquire:O, proprietary:O, and:O, highly:O, confidential:O, information:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The primary operational technique used by Night Dragon comprised a variety of hacker tools , including privately developed and customized RAT tools that provided complete remote administration capabilities to the attacker .' [/INST] [The:O, primary:O, operational:O, technique:O, used:O, by:O, Night:B-HackOrg, Dragon:I-HackOrg, comprised:O, a:O, variety:O, of:O, hacker:O, tools:O, ,:O, including:O, privately:O, developed:O, and:O, customized:O, RAT:B-Tool, tools:I-Tool, that:O, provided:O, complete:O, remote:O, administration:O, capabilities:O, to:O, the:O, attacker:B-HackOrg, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'While Night Dragon attacks focused specifically on the energy sector , the tools and techniques of this kind can be highly successful when targeting any industry .' [/INST] [While:O, Night:B-OffAct, Dragon:I-OffAct, attacks:I-OffAct, focused:O, specifically:O, on:O, the:O, energy:B-Org, sector:I-Org, ,:O, the:O, tools:O, and:O, techniques:O, of:O, this:O, kind:O, can:O, be:O, highly:O, successful:O, when:O, targeting:O, any:O, industry:O, .:O] </s> |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.