text stringlengths 306 1.51k |
|---|
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'TG-3390 actors have deployed the OwaAuth web shell to Exchange servers , disguising it as an ISAPI filter .' [/INST] [TG-3390:B-HackOrg, actors:O, have:O, deployed:O, the:O, OwaAuth:B-Tool, web:I-Tool, shell:I-Tool, to:O, Exchange:O, servers:O, ,:O, disguising:O, it:O, as:O, an:O, ISAPI:O, filter:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In other cases , threat actors placed web shells on externally accessible servers , sometimes behind a reverse proxy , to execute commands on the compromised system .' [/INST] [In:O, other:O, cases:O, ,:O, threat:O, actors:O, placed:O, web:B-Tool, shells:I-Tool, on:O, externally:O, accessible:O, servers:O, ,:O, sometimes:O, behind:O, a:O, reverse:O, proxy:O, ,:O, to:O, execute:O, commands:O, on:O, the:O, compromised:O, system:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'CTU researchers have discovered numerous details about TG-3390 operations , including how the adversaries explore a network , move laterally , and exfiltrate data .' [/INST] [CTU:B-SecTeam, researchers:O, have:O, discovered:O, numerous:O, details:O, about:O, TG-3390:B-HackOrg, operations:O, ,:O, including:O, how:O, the:O, adversaries:O, explore:O, a:O, network:O, ,:O, move:O, laterally:O, ,:O, and:O, exfiltrate:B-Purp, data:I-Purp, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'When the adversaries' operations are live , they modify the record again to point the C2 domain to an IP address they can access .' [/INST] [When:O, the:O, adversaries':O, operations:O, are:O, live:O, ,:O, they:O, modify:O, the:O, record:O, again:O, to:O, point:O, the:O, C2:O, domain:O, to:O, an:O, IP:O, address:O, they:O, can:O, access:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'They then identify the Exchange server and attempt to install the OwaAuth web shell .' [/INST] [They:O, then:O, identify:O, the:O, Exchange:O, server:O, and:O, attempt:O, to:O, install:O, the:O, OwaAuth:B-Tool, web:I-Tool, shell:I-Tool, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'If the OwaAuth web shell is ineffective because the victim uses two-factor authentication for webmail , TG-3390 identify other externally accessible servers and deploy ChinaChopper web shells .' [/INST] [If:O, the:O, OwaAuth:B-Tool, web:I-Tool, shell:I-Tool, is:O, ineffective:O, because:O, the:O, victim:O, uses:O, two-factor:O, authentication:O, for:O, webmail:O, ,:O, TG-3390:B-HackOrg, identify:O, other:O, externally:O, accessible:O, servers:O, and:O, deploy:O, ChinaChopper:B-Way, web:I-Way, shells:I-Way, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'After compromising an initial victim 's system ( patient 0 ) , the threat actors use the Baidu search engine to search for the victim 's organization name .' [/INST] [After:O, compromising:O, an:O, initial:O, victim:O, 's:O, system:O, (:O, patient:O, 0:O, ):O, ,:O, the:O, threat:O, actors:O, use:O, the:O, Baidu:B-Tool, search:I-Tool, engine:I-Tool, to:O, search:O, for:O, the:O, victim:O, 's:O, organization:O, name:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'CTU researchers discovered the threat actors searching for , [company] login , , which directed them to the landing page for remote access .' [/INST] [CTU:B-SecTeam, researchers:O, discovered:O, the:O, threat:O, actors:O, searching:O, for:O, ,:O, [company]:O, login:O, ,:O, ,:O, which:O, directed:O, them:O, to:O, the:O, landing:O, page:O, for:O, remote:O, access:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'TG-3390 actors keep track of and leverage existing ASPXTool web shells in their operations , preferring to issue commands via an internally accessible web shell rather than HTTPBrowser or PlugX .' [/INST] [TG-3390:B-HackOrg, actors:O, keep:O, track:O, of:O, and:O, leverage:O, existing:O, ASPXTool:B-Tool, web:I-Tool, shells:I-Tool, in:O, their:O, operations:O, ,:O, preferring:O, to:O, issue:O, commands:O, via:O, an:O, internally:O, accessible:O, web:O, shell:O, rather:O, than:O, HTTPBrowser:B-Tool, or:O, PlugX:B-Tool, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Within six hours of entering the environment , the threat actors compromised multiple systems and stole credentials for the entire domain .' [/INST] [Within:O, six:O, hours:O, of:O, entering:O, the:O, environment:O, ,:O, the:O, threat:O, actors:O, compromised:O, multiple:O, systems:O, and:O, stole:B-Purp, credentials:I-Purp, for:O, the:O, entire:O, domain:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Despite multiple public disclosures of their activities , BRONZE UNION remains an active and formidable threat as of this publication .' [/INST] [Despite:O, multiple:O, public:O, disclosures:O, of:O, their:O, activities:B-OffAct, ,:O, BRONZE:O, UNION:O, remains:O, an:O, active:O, and:O, formidable:O, threat:O, as:O, of:O, this:O, publication:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In 2015 , the SecureWorks® Counter Threat Unit™ ( CTU ) research team documented the BRONZE UNION threat group ( formerly labeled TG-3390 ) , which CTU™ analysis suggests is based in the People's Republic of China ( PRC ) .' [/INST] [In:O, 2015:B-Time, ,:O, the:O, SecureWorks®:B-SecTeam, Counter:I-SecTeam, Threat:I-SecTeam, Unit™:I-SecTeam, (:O, CTU:B-SecTeam, ):O, research:O, team:O, documented:O, the:O, BRONZE:O, UNION:O, threat:O, group:O, (:O, formerly:O, labeled:O, TG-3390:B-HackOrg, ):O, ,:O, which:O, CTU™:B-SecTeam, analysis:O, suggests:O, is:O, based:O, in:O, the:O, People's:B-Area, Republic:I-Area, of:I-Area, China:I-Area, (:O, PRC:B-Area, ):O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'After reestablishing access , the adversaries download tools such as gsecudmp and WCE that are staged temporarily on websites that TG-3390 previously compromised but never used .' [/INST] [After:O, reestablishing:O, access:O, ,:O, the:O, adversaries:O, download:O, tools:O, such:O, as:O, gsecudmp:B-Tool, and:O, WCE:B-Tool, that:O, are:O, staged:O, temporarily:O, on:O, websites:O, that:O, TG-3390:B-HackOrg, previously:O, compromised:O, but:O, never:O, used:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In 2015 , the SecureWorks documented the BRONZE UNION threat group ( formerly labeled TG-3390 ) , which CTU analysis suggests is based in the People's Republic of China ( PRC ) .' [/INST] [In:O, 2015:B-Time, ,:O, the:O, SecureWorks:B-SecTeam, documented:O, the:O, BRONZE:O, UNION:O, threat:O, group:O, (:O, formerly:O, labeled:O, TG-3390:B-HackOrg, ):O, ,:O, which:O, CTU:B-SecTeam, analysis:O, suggests:O, is:O, based:O, in:O, the:O, People's:B-Area, Republic:I-Area, of:I-Area, China:I-Area, (:O, PRC:I-Area, ):O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'BRONZE UNION threat campaigns that illustrate the evolution of the group 's methods and espionage objectives .' [/INST] [BRONZE:B-OffAct, UNION:I-OffAct, threat:I-OffAct, campaigns:I-OffAct, that:O, illustrate:O, the:O, evolution:O, of:O, the:O, group:O, 's:O, methods:O, and:O, espionage:O, objectives:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Based on BRONZE UNION 's targeting activity , CTU researchers assess it is highly likely that the group focuses on political and defense organization networks .' [/INST] [Based:O, on:O, BRONZE:O, UNION:O, 's:O, targeting:O, activity:B-OffAct, ,:O, CTU:B-SecTeam, researchers:O, assess:O, it:O, is:O, highly:O, likely:O, that:O, the:O, group:O, focuses:O, on:O, political:B-Org, and:O, defense:B-Org, organization:I-Org, networks:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'this SWC was used to specifically target Turkish .' [/INST] [this:O, SWC:B-Tool, was:O, used:O, to:O, specifically:O, target:O, Turkish:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In 2016 , the threat actors conducted a strategic web compromise ( SWC ) on the website of an international industry organization that affected aerospace , academic , media , technology , government , and utilities organizations around the world .' [/INST] [In:O, 2016:B-Time, ,:O, the:O, threat:O, actors:O, conducted:O, a:O, strategic:O, web:O, compromise:O, (:O, SWC:B-Tool, ):O, on:O, the:O, website:O, of:O, an:O, international:B-Org, industry:I-Org, organization:I-Org, that:O, affected:O, aerospace:B-Idus, ,:O, academic:B-Idus, ,:O, media:B-Idus, ,:O, technology:B-Idus, ,:O, government:B-Idus, ,:O, and:O, utilities:B-Org, organizations:I-Org, around:O, the:O, world:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In addition , BRONZE UNION activity on multiple U.S.-based defense manufacturer networks included the threat actors seeking information associated with aerospace technologies , combat processes , and naval defense systems .' [/INST] [In:O, addition:O, ,:O, BRONZE:B-OffAct, UNION:I-OffAct, activity:I-OffAct, on:O, multiple:O, U.S.-based:B-Idus, defense:I-Idus, manufacturer:O, networks:O, included:O, the:O, threat:O, actors:O, seeking:O, information:O, associated:O, with:O, aerospace:B-Idus, technologies:I-Idus, ,:O, combat:B-Idus, processes:I-Idus, ,:O, and:O, naval:B-Idus, defense:I-Idus, systems:I-Idus, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'this SWC was used to specifically target Turkish goverment .' [/INST] [this:O, SWC:B-Tool, was:O, used:O, to:O, specifically:O, target:O, Turkish:B-Area, goverment:I-Area, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Since that analysis , CTU researchers have observed multiple BRONZE UNION threat campaigns that illustrate the evolution of the group 's methods and espionage objectives .' [/INST] [Since:O, that:O, analysis:O, ,:O, CTU:B-SecTeam, researchers:O, have:O, observed:O, multiple:O, BRONZE:B-OffAct, UNION:I-OffAct, threat:I-OffAct, campaigns:I-OffAct, that:O, illustrate:O, the:O, evolution:O, of:O, the:O, group:O, 's:O, methods:O, and:O, espionage:O, objectives:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'this SWC was used to specifically target Turkish banking .' [/INST] [this:O, SWC:B-Tool, was:O, used:O, to:O, specifically:O, target:O, Turkish:O, banking:B-Idus, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'this SWC was used to specifically target Turkish academic networks .' [/INST] [this:O, SWC:B-Tool, was:O, used:O, to:O, specifically:O, target:O, Turkish:B-Area, academic:I-Area, networks:I-Area, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'BRONZE UNION has consistently demonstrated the capability to conduct successful large-scale intrusions against high-profile networks and systems .' [/INST] [BRONZE:O, UNION:O, has:O, consistently:O, demonstrated:O, the:O, capability:O, to:O, conduct:O, successful:O, large-scale:O, intrusions:O, against:O, high-profile:O, networks:O, and:O, systems:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The threat actors appear to be able to create and leverage multiple SWCs in parallel .' [/INST] [The:O, threat:O, actors:O, appear:O, to:O, be:O, able:O, to:O, create:O, and:O, leverage:O, multiple:O, SWCs:B-Tool, in:O, parallel:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In a separate incident , CTU researchers identified a file named s.txt , which is consistent with the output of the Netview host-enumeration tool .' [/INST] [In:O, a:O, separate:O, incident:O, ,:O, CTU:B-SecTeam, researchers:O, identified:O, a:O, file:O, named:O, s.txt:B-SamFile, ,:O, which:O, is:O, consistent:O, with:O, the:O, output:O, of:O, the:O, Netview:O, host-enumeration:O, tool:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'BRONZE UNION actors leveraged initial web shell access on Internet-facing systems to conduct internal reconnaissance .' [/INST] [BRONZE:O, UNION:O, actors:O, leveraged:O, initial:O, web:B-Way, shell:I-Way, access:O, on:O, Internet-facing:O, systems:O, to:O, conduct:O, internal:O, reconnaissance:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'BRONZE UNION appears to use a combination of self-registered IP addresses and commercial VPN services in its command and control ( C2 ) and operational infrastructure .' [/INST] [BRONZE:O, UNION:O, appears:O, to:O, use:O, a:O, combination:O, of:O, self-registered:O, IP:O, addresses:O, and:O, commercial:O, VPN:O, services:O, in:O, its:O, command:O, and:O, control:O, (:O, C2:O, ):O, and:O, operational:O, infrastructure:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'This script relays commands and output between the controller and the system .' [/INST] [This:O, script:O, relays:B-Features, commands:I-Features, and:I-Features, output:I-Features, between:O, the:O, controller:O, and:O, the:O, system:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The threat actors used the appcmd command-line tool to unlock and disable the default logging component on the server ( systsm.webServer/httplogging ) and then delete existing logs from the system ( see Figure 4 ) .' [/INST] [The:O, threat:O, actors:O, used:O, the:O, appcmd:O, command-line:O, tool:O, to:O, unlock:O, and:O, disable:O, the:O, default:O, logging:O, component:O, on:O, the:O, server:O, (:O, systsm.webServer/httplogging:O, ):O, and:O, then:O, delete:O, existing:O, logs:O, from:O, the:O, system:O, (:O, see:O, Figure:O, 4:O, ):O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In 2016 , CTU researchers observed the group using native system .' [/INST] [In:O, 2016:B-Time, ,:O, CTU:B-SecTeam, researchers:O, observed:O, the:O, group:O, using:O, native:O, system:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In March 2018 we detected an ongoing campaign .' [/INST] [In:O, March:B-Time, 2018:I-Time, we:O, detected:O, an:O, ongoing:O, campaign:B-OffAct, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'TG-3390 's activities indicate a preference for leveraging SWCs and scan-and-exploit techniques to compromise target systems .' [/INST] [TG-3390:O, 's:O, activities:B-OffAct, indicate:O, a:O, preference:O, for:O, leveraging:B-Way, SWCs:I-Way, and:O, scan-and-exploit:B-Way, techniques:I-Way, to:O, compromise:O, target:O, systems:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'As of this publication , BRONZE UNION remains a formidable threat group that targets intellectual property and executes its operations at a swift pace .' [/INST] [As:O, of:O, this:O, publication:O, ,:O, BRONZE:O, UNION:O, remains:O, a:O, formidable:O, threat:O, group:O, that:O, targets:O, intellectual:B-Purp, property:I-Purp, and:O, executes:O, its:O, operations:O, at:O, a:O, swift:O, pace:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'we detected an ongoing campaign targeting a national data center .' [/INST] [we:O, detected:O, an:O, ongoing:O, campaign:B-OffAct, targeting:O, a:O, national:O, data:O, center:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The operators used the HyperBro Trojan as their last-stage in-memory remote administration tool ( RAT ) .' [/INST] [The:O, operators:O, used:O, the:O, HyperBro:B-Tool, Trojan:I-Tool, as:O, their:O, last-stage:O, in-memory:O, remote:O, administration:O, tool:O, (:O, RAT:B-Tool, ):O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'we detected an ongoing campaign targeting a national data center in the Centeral Asia .' [/INST] [we:O, detected:O, an:O, ongoing:O, campaign:B-OffAct, targeting:O, a:O, national:O, data:O, center:O, in:O, the:O, Centeral:B-Area, Asia:I-Area, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The tools found in this campaign , such as the HyperBro Trojan , are regularly used by a variety of Chinese-speaking actors .' [/INST] [The:O, tools:O, found:O, in:O, this:O, campaign:B-OffAct, ,:O, such:O, as:O, the:O, HyperBro:B-Tool, Trojan:I-Tool, ,:O, are:O, regularly:O, used:O, by:O, a:O, variety:O, of:O, Chinese-speaking:B-Area, actors:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Due to tools and tactics in use we attribute the campaign to LuckyMouse Chinese-speaking actor ( also known as EmissaryPanda and APT27 ) .' [/INST] [Due:O, to:O, tools:O, and:O, tactics:O, in:O, use:O, we:O, attribute:O, the:O, campaign:B-OffAct, to:O, LuckyMouse:B-HackOrg, Chinese-speaking:O, actor:O, (:O, also:O, known:O, as:O, EmissaryPanda:B-HackOrg, and:O, APT27:B-HackOrg, ):O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'It's possible TG-3390 used a waterhole to infect data center employees .' [/INST] [It's:O, possible:O, TG-3390:B-HackOrg, used:O, a:O, waterhole:B-Way, to:O, infect:O, data:B-Org, center:I-Org, employees:I-Org, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Even when we observed LuckyMouse using weaponized documents with CVE-2017-11882 ( Microsoft Office Equation Editor , widely used by Chinese-speaking actors since December 2017 ) , we can′t prove they were related to this particular attack .' [/INST] [Even:O, when:O, we:O, observed:O, LuckyMouse:O, using:O, weaponized:O, documents:O, with:O, CVE-2017-11882:B-Exp, (:O, Microsoft:B-Tool, Office:I-Tool, Equation:I-Tool, Editor:I-Tool, ,:O, widely:O, used:O, by:O, Chinese-speaking:O, actors:O, since:O, December:B-Time, 2017:I-Time, ):O, ,:O, we:O, can′t:O, prove:O, they:O, were:O, related:O, to:O, this:O, particular:O, attack:B-OffAct, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'We suspect this router was hacked as part of the campaign in order to process the malware 's HTTP requests .' [/INST] [We:O, suspect:O, this:O, router:B-Tool, was:O, hacked:O, as:O, part:O, of:O, the:O, campaign:B-OffAct, in:O, order:O, to:O, process:O, the:O, malware:O, 's:O, HTTP:O, requests:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In March 2017 , Wikileaks published details about an exploit affecting Mikrotik called ChimayRed .' [/INST] [In:O, March:B-Time, 2017:I-Time, ,:O, Wikileaks:B-SecTeam, published:O, details:O, about:O, an:O, exploit:O, affecting:O, Mikrotik:B-Tool, called:O, ChimayRed:B-Tool, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'There were traces of HyperBro in the infected data center from mid-November 2017 .' [/INST] [There:O, were:O, traces:O, of:O, HyperBro:B-Tool, in:O, the:O, infected:O, data:O, center:O, from:O, mid-November:B-Time, 2017:I-Time, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In March 2017 , Wikileaks published details about an exploit affecting Mikrotik called ChimayRed .' [/INST] [In:O, March:B-Time, 2017:I-Time, ,:O, Wikileaks:B-SecTeam, published:O, details:O, about:O, an:O, exploit:O, affecting:O, Mikrotik:B-Tool, called:O, ChimayRed:B-Tool, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'This is a hacking group with Chinese origins which targets selected organisations related with education , energy and technology .' [/INST] [This:O, is:O, a:O, hacking:O, group:O, with:O, Chinese:B-Area, origins:I-Area, which:O, targets:O, selected:O, organisations:O, related:O, with:O, education:B-Idus, ,:O, energy:B-Idus, and:O, technology:B-Idus, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Usually , the delivered payload is either the well-known ' PlugX ' or ' HTTPBrowser ' RAT , a tool which is believed to have Chinese origins and to be used only by certain Chinese hacking groups .' [/INST] [Usually:O, ,:O, the:O, delivered:O, payload:O, is:O, either:O, the:O, well-known:O, ':O, PlugX:B-Tool, ':O, or:O, ':O, HTTPBrowser:B-Tool, ':O, RAT:B-Tool, ,:O, a:O, tool:O, which:O, is:O, believed:O, to:O, have:O, Chinese:B-Area, origins:I-Area, and:O, to:O, be:O, used:O, only:O, by:O, certain:O, Chinese:B-Area, hacking:I-Area, groups:I-Area, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Emissary Panda has used many ways with the most notable being the exploits from the Hacking Team leak .' [/INST] [Emissary:O, Panda:O, has:O, used:O, many:O, ways:O, with:O, the:O, most:O, notable:O, being:O, the:O, exploits:O, from:O, the:O, Hacking:O, Team:O, leak:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Emissary Panda is still active and continues to target selected organisations .' [/INST] [Emissary:O, Panda:O, is:O, still:O, active:O, and:O, continues:O, to:O, target:O, selected:O, organisations:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Cybersecurity researchers have uncovered an espionage campaign that has targeted a national data center of an unnamed central Asian country in order to conduct watering hole attacks .' [/INST] [Cybersecurity:B-SecTeam, researchers:O, have:O, uncovered:O, an:O, espionage:B-OffAct, campaign:I-OffAct, that:O, has:O, targeted:O, a:O, national:O, data:O, center:O, of:O, an:O, unnamed:O, central:B-Area, Asian:I-Area, country:O, in:O, order:O, to:O, conduct:O, watering:B-OffAct, hole:I-OffAct, attacks:I-OffAct, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The campaign is believed to be active covertly since fall 2017 .' [/INST] [The:O, campaign:B-OffAct, is:O, believed:O, to:O, be:O, active:O, covertly:O, since:O, fall:O, 2017:B-Time, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'LuckyMouse , also known as Iron Tiger , EmissaryPanda , APT 27 and Threat Group-3390 , is the same group of Chinese hackers who was found targeting Asian countries with Bitcoin mining malware early this year .' [/INST] [LuckyMouse:B-HackOrg, ,:O, also:O, known:O, as:O, Iron:B-HackOrg, Tiger:I-HackOrg, ,:O, EmissaryPanda:B-HackOrg, ,:O, APT:B-HackOrg, 27:I-HackOrg, and:O, Threat:B-HackOrg, Group-3390:I-HackOrg, ,:O, is:O, the:O, same:O, group:O, of:O, Chinese:B-Area, hackers:I-Area, who:O, was:O, found:O, targeting:O, Asian:B-Area, countries:I-Area, with:O, Bitcoin:B-Tool, mining:I-Tool, malware:I-Tool, early:O, this:O, year:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'March by security researchers from Kaspersky Labs .' [/INST] [March:B-Time, by:O, security:O, researchers:O, from:O, Kaspersky:B-SecTeam, Labs:I-SecTeam, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'For example , at the end of 2016 CTU researchers observed the threat actors using native system functionality to disable logging processes and delete logs within a network .' [/INST] [For:O, example:O, ,:O, at:O, the:O, end:O, of:O, 2016:B-Time, CTU:B-SecTeam, researchers:O, observed:O, the:O, threat:O, actors:O, using:O, native:O, system:O, functionality:O, to:O, disable:O, logging:O, processes:O, and:O, delete:O, logs:O, within:O, a:O, network:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The group has been active since at least 2010 and was behind many previous attack campaigns resulting in the theft of massive amounts of data from the directors and managers of US-based defense contractors .' [/INST] [The:O, group:O, has:O, been:O, active:O, since:O, at:O, least:O, 2010:B-Time, and:O, was:O, behind:O, many:O, previous:O, attack:B-OffAct, campaigns:I-OffAct, resulting:O, in:O, the:O, theft:O, of:O, massive:O, amounts:O, of:O, data:O, from:O, the:O, directors:O, and:O, managers:O, of:O, US-based:O, defense:B-Org, contractors:I-Org, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'attacks to a Chinese-speaking threat actor group called LuckyMouse .' [/INST] [attacks:B-OffAct, to:O, a:O, Chinese-speaking:B-Area, threat:I-Area, actor:I-Area, group:I-Area, called:O, LuckyMouse:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'LuckyMouse has been spotted using a widely used Microsoft Office vulnerability ( CVE-2017-11882 ) .' [/INST] [LuckyMouse:O, has:O, been:O, spotted:O, using:O, a:O, widely:O, used:O, Microsoft:B-Exp, Office:I-Exp, vulnerability:I-Exp, (:O, CVE-2017-11882:B-Exp, ):O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'This time the group chose a national data center as its target from an unnamed country in Central Asia in an attempt to gain , access to a wide range of government resources at one fell swoop , .' [/INST] [This:O, time:O, the:O, group:O, chose:O, a:O, national:O, data:O, center:O, as:O, its:O, target:O, from:O, an:O, unnamed:O, country:O, in:O, Central:B-Area, Asia:I-Area, in:O, an:O, attempt:O, to:O, gain:O, ,:O, access:O, to:O, a:O, wide:O, range:O, of:O, government:B-Purp, resources:I-Purp, at:O, one:O, fell:O, swoop:O, ,:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The initial attack vector used in the attack against the data center is unclear , but researchers believe LuckyMouse possibly had conducted watering hole or phishing attacks to compromise accounts belonging to employees at the national data center .' [/INST] [The:O, initial:O, attack:B-OffAct, vector:O, used:O, in:O, the:O, attack:B-OffAct, against:O, the:O, data:O, center:O, is:O, unclear:O, ,:O, but:O, researchers:O, believe:O, LuckyMouse:B-HackOrg, possibly:O, had:O, conducted:O, watering:B-OffAct, hole:I-OffAct, or:O, phishing:B-OffAct, attacks:I-OffAct, to:O, compromise:O, accounts:O, belonging:O, to:O, employees:B-Org, at:O, the:O, national:O, data:O, center:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'According to the researchers , the group injected malicious JavaScript code into the official government websites associated with the data center in order to conduct watering hole attacks .' [/INST] [According:O, to:O, the:O, researchers:O, ,:O, the:O, group:O, injected:O, malicious:O, JavaScript:B-Tool, code:I-Tool, into:O, the:O, official:O, government:O, websites:O, associated:O, with:O, the:O, data:O, center:O, in:O, order:O, to:O, conduct:O, watering:B-OffAct, hole:I-OffAct, attacks:I-OffAct, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'the targeted system with a piece of malware called HyperBro , a Remote Access Trojan ( RAT ) .' [/INST] [the:O, targeted:O, system:O, with:O, a:O, piece:O, of:O, malware:O, called:O, HyperBro:B-Tool, ,:O, a:O, Remote:B-Tool, Access:I-Tool, Trojan:I-Tool, (:O, RAT:B-Tool, ):O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The main command and control ( C&C ) server used in this attack is hosted on an IP address which belongs to a Ukrainian ISP , specifically to a MikroTik router running a firmware version released in March 2016 .' [/INST] [The:O, main:O, command:O, and:O, control:O, (:O, C&C:O, ):O, server:O, used:O, in:O, this:O, attack:B-OffAct, is:O, hosted:O, on:O, an:O, IP:O, address:O, which:O, belongs:O, to:O, a:O, Ukrainian:O, ISP:O, ,:O, specifically:O, to:O, a:O, MikroTik:B-Tool, router:O, running:O, a:O, firmware:O, version:O, released:O, in:O, March:B-Time, 2016:I-Time, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'the targets of the hacking group were in the automotive .' [/INST] [the:O, targets:O, of:O, the:O, hacking:O, group:O, were:O, in:O, the:O, automotive:B-Idus, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Dell SecureWorks researchers unveiled a report on Threat Group-3390 that has targeted companies around the world while stealing massive amounts of industrial data .' [/INST] [Dell:B-SecTeam, SecureWorks:I-SecTeam, researchers:O, unveiled:O, a:O, report:O, on:O, Threat:O, Group-3390:B-HackOrg, that:O, has:O, targeted:O, companies:O, around:O, the:O, world:O, while:O, stealing:B-Purp, massive:I-Purp, amounts:I-Purp, of:I-Purp, industrial:I-Purp, data:I-Purp, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The group , believed to be based in China , has also targeted defense contractors , colleges and universities , law firms , and political organizations — including organizations related to Chinese minority ethnic groups .' [/INST] [The:O, group:O, ,:O, believed:O, to:O, be:O, based:O, in:O, China:B-Area, ,:O, has:O, also:O, targeted:O, defense:B-Org, contractors:I-Org, ,:O, colleges:B-Idus, and:O, universities:B-Idus, ,:O, law:B-Org, firms:I-Org, ,:O, and:O, political:B-Org, organizations:I-Org, —:O, including:O, organizations:O, related:O, to:O, Chinese:O, minority:B-Org, ethnic:I-Org, groups:I-Org, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'LAS VEGAS—Today at the Black Hat information security conference , Dell SecureWorks researchers unveiled a report on a newly detected hacking group that has targeted companies around the world while stealing massive amounts of industrial data .' [/INST] [LAS:O, VEGAS—Today:O, at:O, the:O, Black:O, Hat:O, information:O, security:O, conference:O, ,:O, Dell:B-SecTeam, SecureWorks:I-SecTeam, researchers:O, unveiled:O, a:O, report:O, on:O, a:O, newly:O, detected:O, hacking:O, group:O, that:O, has:O, targeted:O, companies:O, around:O, the:O, world:O, while:O, stealing:B-Purp, massive:I-Purp, amounts:I-Purp, of:I-Purp, industrial:I-Purp, data:I-Purp, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Designated as Threat Group 3390 and nicknamed , Emissary Panda , by researchers , the hacking group has compromised victims' networks largely through , watering hole , attacks launched from over 100 compromised legitimate websites , sites picked because they were known to be frequented by those targeted in the attack .' [/INST] [Designated:O, as:O, Threat:B-HackOrg, Group:I-HackOrg, 3390:I-HackOrg, and:O, nicknamed:O, ,:O, Emissary:B-HackOrg, Panda:I-HackOrg, ,:O, by:O, researchers:O, ,:O, the:O, hacking:O, group:O, has:O, compromised:O, victims':O, networks:O, largely:O, through:O, ,:O, watering:B-OffAct, hole:I-OffAct, ,:O, attacks:B-OffAct, launched:O, from:O, over:O, 100:O, compromised:O, legitimate:O, websites:O, ,:O, sites:O, picked:O, because:O, they:O, were:O, known:O, to:O, be:O, frequented:O, by:O, those:O, targeted:O, in:O, the:O, attack:B-OffAct, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'the United Kingdom had data stolen by members of Emissary Panda .' [/INST] [the:O, United:B-Area, Kingdom:B-Area, had:O, data:O, stolen:O, by:O, members:O, of:O, Emissary:B-HackOrg, Panda:I-HackOrg, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'the US had data stolen by members of Emissary Panda .' [/INST] [the:O, US:B-Area, had:O, data:O, stolen:O, by:O, members:O, of:O, Emissary:B-HackOrg, Panda:I-HackOrg, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'No zero-day vulnerabilities were used to breach targeted networks , instead , TG-3390 relied on old vulnerabilities such as CVE-2011-3544 , — a near-year-old Java security hole — , and CVE-2010-0738 to compromise their targets , , Dell SecureWorks' researchers reported .' [/INST] [No:O, zero-day:B-Exp, vulnerabilities:I-Exp, were:O, used:O, to:O, breach:O, targeted:O, networks:O, ,:O, instead:O, ,:O, TG-3390:O, relied:O, on:O, old:O, vulnerabilities:O, such:O, as:O, CVE-2011-3544:B-Exp, ,:O, —:O, a:O, near-year-old:O, Java:O, security:O, hole:O, —:O, ,:O, and:O, CVE-2010-0738:B-Exp, to:O, compromise:O, their:O, targets:O, ,:O, ,:O, Dell:B-SecTeam, SecureWorks':I-SecTeam, researchers:O, reported:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The group used a number of tools common to other Chinese hacking groups , but they had a few unique tools of their own with interfaces developed for Standard ( Simplified ) Chinese .' [/INST] [The:O, group:O, used:O, a:O, number:O, of:O, tools:O, common:O, to:O, other:O, Chinese:B-Area, hacking:I-Area, groups:I-Area, ,:O, but:O, they:O, had:O, a:O, few:O, unique:O, tools:O, of:O, their:O, own:O, with:O, interfaces:O, developed:O, for:O, Standard:O, (:O, Simplified:O, ):O, Chinese:B-Area, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'If the address falls within ranges that the attackers are interested in , the malicious site waits for their next page view to drop an exploit on the desirable target 's PC .' [/INST] [If:O, the:O, address:O, falls:O, within:O, ranges:O, that:O, the:O, attackers:O, are:O, interested:O, in:O, ,:O, the:O, malicious:O, site:O, waits:O, for:O, their:O, next:O, page:O, view:O, to:O, drop:O, an:O, exploit:O, on:O, the:O, desirable:O, target:O, 's:O, PC:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Visitors to sites exploited by Emissary Panda are directed by code embedded in the sites to a malicious webpage , which screens their IP address .' [/INST] [Visitors:O, to:O, sites:O, exploited:O, by:O, Emissary:O, Panda:O, are:O, directed:O, by:O, code:O, embedded:O, in:O, the:O, sites:O, to:O, a:O, malicious:O, webpage:O, ,:O, which:O, screens:O, their:O, IP:O, address:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'There has also been at least one victim targeted by a spear-phishing attack .' [/INST] [There:O, has:O, also:O, been:O, at:O, least:O, one:O, victim:O, targeted:O, by:O, a:O, spear-phishing:B-OffAct, attack:I-OffAct, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'A variety of malware , including the PlugX tool , was shared with other known Chinese threat groups .' [/INST] [A:O, variety:O, of:O, malware:O, ,:O, including:O, the:O, PlugX:B-Tool, tool:I-Tool, ,:O, was:O, shared:O, with:O, other:O, known:O, Chinese:B-Area, threat:I-Area, groups:I-Area, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Once inside networks , the group generally targeted Windows network domain controllers and Exchange e-mail servers , targeting user credentials to allow them to move to other systems throughout the targeted network .' [/INST] [Once:O, inside:O, networks:O, ,:O, the:O, group:O, generally:O, targeted:O, Windows:O, network:O, domain:O, controllers:O, and:O, Exchange:O, e-mail:B-Way, servers:I-Way, ,:O, targeting:O, user:B-Purp, credentials:I-Purp, to:O, allow:O, them:O, to:O, move:O, to:O, other:O, systems:O, throughout:O, the:O, targeted:O, network:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'They used an exploit of Internet Information Server to inject keylogger and backdoor malware onto the Exchange server .' [/INST] [They:O, used:O, an:O, exploit:O, of:O, Internet:O, Information:O, Server:O, to:O, inject:O, keylogger:B-Tool, and:O, backdoor:B-Tool, malware:I-Tool, onto:O, the:O, Exchange:O, server:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'But two tools used were unique to the group : ASPXTool , an Internet Information Services ( IIS ) specific , Web shell , used to gain access to servers inside a target 's network ; and the OwaAuth credential stealing tool and Web shell , used to attack Microsoft Exchange servers running the Web Outlook interface .' [/INST] [But:O, two:O, tools:O, used:O, were:O, unique:O, to:O, the:O, group:O, ::O, ASPXTool:B-Tool, ,:O, an:O, Internet:O, Information:O, Services:O, (:O, IIS:O, ):O, specific:O, ,:O, Web:O, shell:O, ,:O, used:O, to:O, gain:B-Features, access:I-Features, to:I-Features, servers:I-Features, inside:O, a:O, target:O, 's:O, network:O, ;:O, and:O, the:O, OwaAuth:B-Tool, credential:I-Tool, stealing:I-Tool, tool:I-Tool, and:O, Web:B-Tool, shell:I-Tool, ,:O, used:O, to:O, attack:O, Microsoft:O, Exchange:O, servers:O, running:O, the:O, Web:O, Outlook:O, interface:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'By using such features and tools , attackers are hoping to blend in on the victim 's network and hide their activity in a sea of legitimate processes .' [/INST] [By:O, using:O, such:O, features:O, and:O, tools:O, ,:O, attackers:O, are:O, hoping:O, to:O, blend:O, in:O, on:O, the:O, victim:O, 's:O, network:O, and:O, hide:O, their:O, activity:B-OffAct, in:O, a:O, sea:O, of:O, legitimate:O, processes:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'TAA leverages advanced artificial intelligence and machine learning that combs through Symantec 's data lake of telemetry in order to spot patterns associated with targeted attacks .' [/INST] [TAA:B-SecTeam, leverages:O, advanced:O, artificial:O, intelligence:O, and:O, machine:O, learning:O, that:O, combs:O, through:O, Symantec:B-SecTeam, 's:O, data:O, lake:O, of:O, telemetry:O, in:O, order:O, to:O, spot:O, patterns:O, associated:O, with:O, targeted:B-OffAct, attacks:I-OffAct, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'January 2018 , TAA triggered an alert at a large telecoms operator in Southeast Asia .' [/INST] [January:B-Time, 2018:I-Time, ,:O, TAA:B-SecTeam, triggered:O, an:O, alert:O, at:O, a:O, large:O, telecoms:B-Org, operator:I-Org, in:O, Southeast:B-Area, Asia:I-Area, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Thrip was using PsExec to move laterally between computers on the company 's network .' [/INST] [Thrip:O, was:O, using:O, PsExec:B-Tool, to:O, move:O, laterally:O, between:O, computers:O, on:O, the:O, company:O, 's:O, network:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'TAA triggered an alert at a large telecoms operator in Southeast Asia .' [/INST] [TAA:B-SecTeam, triggered:O, an:O, alert:O, at:O, a:O, large:O, telecoms:B-Org, operator:I-Org, in:O, Southeast:B-Area, Asia:I-Area, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'AA triggered an alert at a large telecoms operator in Southeast Asia .' [/INST] [AA:O, triggered:O, an:O, alert:O, at:O, a:O, large:O, telecoms:B-Org, operator:I-Org, in:O, Southeast:O, Asia:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'PsExec is a Microsoft Sysinternals tool for executing processes on other systems and is one of the most frequently seen legitimate pieces of software used by attackers attempting to live off the land .' [/INST] [PsExec:B-Tool, is:O, a:O, Microsoft:O, Sysinternals:O, tool:O, for:O, executing:B-Features, processes:I-Features, on:O, other:O, systems:O, and:O, is:O, one:O, of:O, the:O, most:O, frequently:O, seen:O, legitimate:O, pieces:O, of:O, software:O, used:O, by:O, attackers:O, attempting:O, to:O, live:O, off:O, the:O, land:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'TAA not only flagged this malicious use of PsExec , it also told us what the attackers were using it for .' [/INST] [TAA:B-SecTeam, not:O, only:O, flagged:O, this:O, malicious:O, use:O, of:O, PsExec:B-Tool, ,:O, it:O, also:O, told:O, us:O, what:O, the:O, attackers:O, were:O, using:O, it:O, for:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Thrip was attempting to remotely install a previously unknown piece of malware ( Infostealer.Catchamas ) on computers within the victim 's network .' [/INST] [Thrip:O, was:O, attempting:O, to:O, remotely:O, install:O, a:O, previously:O, unknown:O, piece:O, of:O, malware:O, (:O, Infostealer.Catchamas:B-SamFile, ):O, on:O, computers:O, within:O, the:O, victim:O, 's:O, network:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'three computers in China being used to launch the Thrip attacks .' [/INST] [three:O, computers:O, in:O, China:B-Area, being:O, used:O, to:O, launch:O, the:O, Thrip:B-OffAct, attacks:I-OffAct, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Perhaps the most worrying discovery we made was that Thrip had targeted a satellite communications operator .' [/INST] [Perhaps:O, the:O, most:O, worrying:O, discovery:O, we:O, made:O, was:O, that:O, Thrip:O, had:O, targeted:O, a:O, satellite:B-Org, communications:I-Org, operator:I-Org, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Thrip seemed to be mainly interested in the operational side of the company .' [/INST] [Thrip:O, seemed:O, to:O, be:O, mainly:O, interested:O, in:O, the:O, operational:O, side:O, of:O, the:O, company:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'This suggests to us that Thrip 's motives go beyond spying and may also include disruption .' [/INST] [This:O, suggests:O, to:O, us:O, that:O, Thrip:O, 's:O, motives:O, go:O, beyond:O, spying:O, and:O, may:O, also:O, include:O, disruption:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Armed with this information about the malware and living off the land tactics being used by this group of attackers whom we named Thrip , we broadened our search to see if we could find similar patterns that indicated Thrip had been targeting other organizations .' [/INST] [Armed:O, with:O, this:O, information:O, about:O, the:O, malware:O, and:O, living:O, off:O, the:O, land:B-Way, tactics:I-Way, being:O, used:O, by:O, this:O, group:O, of:O, attackers:O, whom:O, we:O, named:O, Thrip:O, ,:O, we:O, broadened:O, our:O, search:O, to:O, see:O, if:O, we:O, could:O, find:O, similar:O, patterns:O, that:O, indicated:O, Thrip:O, had:O, been:O, targeting:O, other:O, organizations:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The group had also targeted three different telecoms operators , all based in Southeast Asia .' [/INST] [The:O, group:O, had:O, also:O, targeted:O, three:O, different:O, telecoms:B-Org, operators:I-Org, ,:O, all:O, based:O, in:O, Southeast:B-Area, Asia:I-Area, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In all cases , based on the nature of the computers infected by Thrip , it appeared that the telecoms companies themselves and not their customers were the targets of these attacks .' [/INST] [In:O, all:O, cases:O, ,:O, based:O, on:O, the:O, nature:O, of:O, the:O, computers:O, infected:O, by:O, Thrip:O, ,:O, it:O, appeared:O, that:O, the:O, telecoms:B-Org, companies:I-Org, themselves:O, and:O, not:O, their:O, customers:B-Org, were:O, the:O, targets:O, of:O, these:O, attacks:B-OffAct, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Catchamas is a custom Trojan designed to steal information from an infected computer and contains additional features designed to avoid detection .' [/INST] [Catchamas:B-SamFile, is:O, a:O, custom:O, Trojan:O, designed:O, to:O, steal:B-Features, information:I-Features, from:O, an:O, infected:O, computer:O, and:O, contains:O, additional:O, features:O, designed:O, to:O, avoid:O, detection:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Many of the tools they use now feature new behaviors , including a change in the way they maintain a foothold in the targeted network .' [/INST] [Many:O, of:O, the:O, tools:O, they:O, use:O, now:O, feature:O, new:O, behaviors:O, ,:O, including:O, a:O, change:O, in:O, the:O, way:O, they:O, maintain:O, a:O, foothold:O, in:O, the:O, targeted:O, network:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Execute a command through exploits for CVE-2017-11882 .' [/INST] [Execute:O, a:O, command:O, through:O, exploits:O, for:O, CVE-2017-11882:B-Exp, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Execute a command through exploits for CVE-2018-0802 .' [/INST] [Execute:O, a:O, command:O, through:O, exploits:O, for:O, CVE-2018-0802:B-Exp, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The backdoor will load the encrypted configuration file and decrypt it , then use Secure Sockets Layer ( SSL ) protocol to connect to command-and-control ( C&C ) servers .' [/INST] [The:O, backdoor:O, will:O, load:O, the:O, encrypted:O, configuration:O, file:O, and:O, decrypt:O, it:O, ,:O, then:O, use:O, Secure:B-Tool, Sockets:I-Tool, Layer:I-Tool, (:O, SSL:B-Tool, ):O, protocol:O, to:O, connect:O, to:O, command-and-control:B-Tool, (:O, C&C:O, ):O, servers:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'TClient is actually one of Tropic Trooper 's other backdoors .' [/INST] [TClient:B-Tool, is:O, actually:O, one:O, of:O, Tropic:O, Trooper:O, 's:O, other:O, backdoors:O, .:O] </s> |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.