text stringlengths 306 1.51k |
|---|
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The malicious loader will use dynamic-link library ( DLL ) hijacking β injecting malicious code into a process of a file/application β on sidebar.exe and launch dllhost.exe ( a normal file ) .' [/INST] [The:O, malicious:O, loader:O, will:O, use:O, dynamic-link:O, library:O, (:O, DLL:O, ):O, hijacking:O, β:O, injecting:O, malicious:O, code:O, into:O, a:O, process:O, of:O, a:O, file/application:O, β:O, on:O, sidebar.exe:B-SamFile, and:O, launch:O, dllhost.exe:B-SamFile, (:O, a:O, normal:O, file:O, ):O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'TClient , for instance , uses DLL hijacking and injection that may not be as noticeable to others .' [/INST] [TClient:B-Tool, ,:O, for:O, instance:O, ,:O, uses:O, DLL:B-Way, hijacking:I-Way, and:I-Way, injection:I-Way, that:O, may:O, not:O, be:O, as:O, noticeable:O, to:O, others:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The backdoor noted by other security researchers was encoded with different algorithms and configured with different parameter names in 2016 , for instance .' [/INST] [The:O, backdoor:O, noted:O, by:O, other:O, security:O, researchers:O, was:O, encoded:O, with:O, different:O, algorithms:O, and:O, configured:O, with:O, different:O, parameter:O, names:O, in:O, 2016:B-Time, ,:O, for:O, instance:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Taiwan has been a regular target of cyber espionage threat actors for a number of years .' [/INST] [Taiwan:B-Area, has:O, been:O, a:O, regular:O, target:O, of:O, cyber:O, espionage:O, threat:O, actors:O, for:O, a:O, number:O, of:O, years:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In early August , Unit 42 identified two attacks using similar techniques .' [/INST] [In:O, early:O, August:B-Time, ,:O, Unit:B-SecTeam, 42:I-SecTeam, identified:O, two:O, attacks:B-OffAct, using:O, similar:O, techniques:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'which has been active since at least 2011 .' [/INST] [which:O, has:O, been:O, active:O, since:O, at:O, least:O, 2011:B-Time, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'One of the attacks used Tropic Trooper 's known Yahoyah malware , but the other attack deployed the widely available Poison Ivy RAT .' [/INST] [One:O, of:O, the:O, attacks:B-OffAct, used:O, Tropic:O, Trooper:O, 's:O, known:O, Yahoyah:B-Tool, malware:I-Tool, ,:O, but:O, the:O, other:O, attack:B-OffAct, deployed:O, the:O, widely:O, available:O, Poison:B-Way, Ivy:I-Way, RAT:I-Way, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'This confirms the actors are using Poison Ivy as part of their toolkit , something speculated in the original Trend Micro report but not confirmed by them .' [/INST] [This:O, confirms:O, the:O, actors:O, are:O, using:O, Poison:B-Tool, Ivy:I-Tool, as:O, part:O, of:O, their:O, toolkit:O, ,:O, something:O, speculated:O, in:O, the:O, original:O, Trend:B-SecTeam, Micro:I-SecTeam, report:O, but:O, not:O, confirmed:O, by:O, them:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The document attached to this e-mail exploits CVE-2012-0158 .' [/INST] [The:O, document:O, attached:O, to:O, this:O, e-mail:B-Exp, exploits:I-Exp, CVE-2012-0158:B-Exp, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'As we have noted in many earlier reports , attackers commonly use decoy files to trick victims into thinking a malicious document is actually legitimate .' [/INST] [As:O, we:O, have:O, noted:O, in:O, many:O, earlier:O, reports:O, ,:O, attackers:O, commonly:O, use:O, decoy:B-SamFile, files:I-SamFile, to:O, trick:O, victims:O, into:O, thinking:O, a:O, malicious:O, document:O, is:O, actually:O, legitimate:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Further analysis uncovered a handful of ties indicating the actors may also be using the PCShare malware family , which has not been previously tied to the group .' [/INST] [Further:O, analysis:O, uncovered:O, a:O, handful:O, of:O, ties:O, indicating:O, the:O, actors:O, may:O, also:O, be:O, using:O, the:O, PCShare:B-Tool, malware:I-Tool, family:I-Tool, ,:O, which:O, has:O, not:O, been:O, previously:O, tied:O, to:O, the:O, group:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'This matches with known Tactics , Techniques , and Procedures ( TTPs ) for Tropic Trooper , targeting both government institutions and also the energy industry in Taiwan .' [/INST] [This:O, matches:O, with:O, known:O, Tactics:O, ,:O, Techniques:O, ,:O, and:O, Procedures:O, (:O, TTPs:O, ):O, for:O, Tropic:B-HackOrg, Trooper:I-HackOrg, ,:O, targeting:O, both:O, government:B-Org, institutions:I-Org, and:O, also:O, the:O, energy:B-Idus, industry:I-Idus, in:O, Taiwan:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Tropic Trooper is also still exploiting CVE-2012-0158 , as are many threat actors .' [/INST] [Tropic:B-HackOrg, Trooper:I-HackOrg, is:O, also:O, still:O, exploiting:O, CVE-2012-0158:B-Exp, ,:O, as:O, are:O, many:O, threat:O, actors:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The Tropic Trooper threat actor group has been known to target governments and organizations in the Asia Pacific region for at least six years .' [/INST] [The:O, Tropic:B-HackOrg, Trooper:I-HackOrg, threat:I-HackOrg, actor:I-HackOrg, group:I-HackOrg, has:O, been:O, known:O, to:O, target:O, governments:B-Idus, and:O, organizations:O, in:O, the:O, Asia:B-Area, Pacific:I-Area, region:O, for:O, at:O, least:O, six:O, years:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Turla is a notorious group that has been targeting governments .' [/INST] [Turla:B-HackOrg, is:O, a:O, notorious:O, group:O, that:O, has:O, been:O, targeting:O, governments:B-Idus, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Turla is known to run watering hole and spearphishing campaigns to better pinpoint their targets .' [/INST] [Turla:B-HackOrg, is:O, known:O, to:O, run:O, watering:B-OffAct, hole:I-OffAct, and:O, spearphishing:B-OffAct, campaigns:I-OffAct, to:O, better:O, pinpoint:O, their:O, targets:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Turla is a notorious group that has been targeting government officials .' [/INST] [Turla:B-HackOrg, is:O, a:O, notorious:O, group:O, that:O, has:O, been:O, targeting:O, government:B-Org, officials:I-Org, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The documents attached to spear-phishing e-mails used in both attacks contain code that exploits CVE-2012-0158 , which despite its age remains one of the most common Microsoft Word vulnerabilities being exploited by multiple threat actors .' [/INST] [The:O, documents:B-SamFile, attached:O, to:O, spear-phishing:B-Way, e-mails:I-Way, used:O, in:O, both:O, attacks:B-OffAct, contain:O, code:O, that:O, exploits:O, CVE-2012-0158:B-Exp, ,:O, which:O, despite:O, its:O, age:O, remains:O, one:O, of:O, the:O, most:O, common:O, Microsoft:B-Exp, Word:I-Exp, vulnerabilities:I-Exp, being:O, exploited:O, by:O, multiple:O, threat:O, actors:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Turla is a notorious group that has been targeting diplomats .' [/INST] [Turla:B-HackOrg, is:O, a:O, notorious:O, group:O, that:O, has:O, been:O, targeting:O, diplomats:B-Org, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The codename for Turla APT group in this presentation is MAKERSMARK .' [/INST] [The:O, codename:O, for:O, Turla:B-HackOrg, APT:I-HackOrg, group:I-HackOrg, in:O, this:O, presentation:O, is:O, MAKERSMARK:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The Intercept reported that there exists a 2011 presentation by Canada 's Communication Security Establishment ( CSE ) outlining the errors made by the Turla operators during their operations even though the tools they use are quite advanced .' [/INST] [The:O, Intercept:O, reported:O, that:O, there:O, exists:O, a:O, 2011:B-Time, presentation:O, by:O, Canada:B-Org, 's:I-Org, Communication:I-Org, Security:I-Org, Establishment:I-Org, (:O, CSE:B-Org, ):O, outlining:O, the:O, errors:O, made:O, by:O, the:O, Turla:B-HackOrg, operators:I-HackOrg, during:O, their:O, operations:O, even:O, though:O, the:O, tools:O, they:O, use:O, are:O, quite:O, advanced:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The witnessed techniques , tactics and procedures ( TTPs ) are in-line with what we usuallysee in Turla 's operation : a first stage backdoor , such as Skipper , likely delivered through spearphishing followed by the appearance on the compromised system of a second stage backdoor , Gazerin this case .' [/INST] [The:O, witnessed:O, techniques:O, ,:O, tactics:O, and:O, procedures:O, (:O, TTPs:O, ):O, are:O, in-line:O, with:O, what:O, we:O, usuallysee:O, in:O, Turla:B-HackOrg, 's:I-HackOrg, operation:I-HackOrg, ::O, a:O, first:O, stage:B-Way, backdoor:I-Way, ,:O, such:O, as:O, Skipper:B-Tool, ,:O, likely:O, delivered:O, through:O, spearphishing:B-Way, followed:O, by:O, the:O, appearance:O, on:O, the:O, compromised:O, system:O, of:O, a:O, second:O, stage:O, backdoor:O, ,:O, Gazerin:O, this:O, case:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Southeastern Europe as well as countries in the former Soviet Union Republichas recently been the main target .' [/INST] [Southeastern:B-Area, Europe:I-Area, as:O, well:O, as:O, countries:O, in:O, the:O, former:O, Soviet:B-Area, Union:I-Area, Republichas:I-Area, recently:O, been:O, the:O, main:O, target:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Finally , there are many similarities between Gazer and other second stage backdoors used by the Turla group such as Carbon and Kazuar .' [/INST] [Finally:O, ,:O, there:O, are:O, many:O, similarities:O, between:O, Gazer:B-Tool, and:O, other:O, second:O, stage:O, backdoors:B-Tool, used:O, by:O, the:O, Turla:B-HackOrg, group:O, such:O, as:O, Carbon:B-HackOrg, and:O, Kazuar:B-HackOrg, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Skipper , which has been linked to Turla in the past , was found alongside Gazer in most cases we investigated .' [/INST] [Skipper:B-Tool, ,:O, which:O, has:O, been:O, linked:O, to:O, Turla:O, in:O, the:O, past:O, ,:O, was:O, found:O, alongside:O, Gazer:B-Tool, in:O, most:O, cases:O, we:O, investigated:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Turla APT group makes an extra effort to avoid detection by wiping files securely , changing the strings and randomizing what could be simple markers through the different backdoor versions .' [/INST] [Turla:B-HackOrg, APT:I-HackOrg, group:I-HackOrg, makes:O, an:O, extra:O, effort:O, to:O, avoid:O, detection:O, by:O, wiping:O, files:O, securely:O, ,:O, changing:O, the:O, strings:O, and:O, randomizing:O, what:O, could:O, be:O, simple:O, markers:O, through:O, the:O, different:O, backdoor:O, versions:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The attackers behind Epic Turla have infected several hundred computers in more than 45 countries , including government institutions .' [/INST] [The:O, attackers:O, behind:O, Epic:B-Tool, Turla:I-Tool, have:O, infected:O, several:O, hundred:O, computers:O, in:O, more:O, than:O, 45:O, countries:O, ,:O, including:O, government:B-Org, institutions:I-Org, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Turla all uses an encrypted container to store the malware 's components and configuration and they also log their actions in a file .' [/INST] [Turla:B-HackOrg, all:O, uses:O, an:O, encrypted:B-Tool, container:I-Tool, to:O, store:O, the:O, malware:O, 's:O, components:O, and:O, configuration:O, and:O, they:O, also:O, log:O, their:O, actions:O, in:O, a:O, file:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Over the last 10 months , Kaspersky Lab researchers have analyzed a massive cyber-espionage operation which we call , Epic Turla , .' [/INST] [Over:O, the:O, last:O, 10:O, months:O, ,:O, Kaspersky:B-SecTeam, Lab:I-SecTeam, researchers:O, have:O, analyzed:O, a:O, massive:O, cyber-espionage:O, operation:O, which:O, we:O, call:O, ,:O, Epic:B-Tool, Turla:I-Tool, ,:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'We also observed exploits against older ( patched ) vulnerabilities , social engineering techniques and watering hole strategies in these attacks .' [/INST] [We:O, also:O, observed:O, exploits:O, against:O, older:O, (:O, patched:O, ):O, vulnerabilities:O, ,:O, social:B-Idus, engineering:I-Idus, techniques:O, and:O, watering:B-OffAct, hole:I-OffAct, strategies:O, in:O, these:O, attacks:B-OffAct, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The attackers behind Epic Turla have infected several hundred computers in more than 45 countries , including embassies .' [/INST] [The:O, attackers:O, behind:O, Epic:B-Tool, Turla:I-Tool, have:O, infected:O, several:O, hundred:O, computers:O, in:O, more:O, than:O, 45:O, countries:O, ,:O, including:O, embassies:B-Org, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The attackers behind Epic Turla have infected several hundred computers in more than 45 countries , including military .' [/INST] [The:O, attackers:O, behind:O, Epic:B-Tool, Turla:I-Tool, have:O, infected:O, several:O, hundred:O, computers:O, in:O, more:O, than:O, 45:O, countries:O, ,:O, including:O, military:B-Idus, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The attackers behind Epic Turla have infected several hundred computers in more than 45 countries , including education .' [/INST] [The:O, attackers:O, behind:O, Epic:B-Tool, Turla:I-Tool, have:O, infected:O, several:O, hundred:O, computers:O, in:O, more:O, than:O, 45:O, countries:O, ,:O, including:O, education:B-Idus, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'When G-Data published on Turla/Uroburos back in February , several questions remained unanswered .' [/INST] [When:O, G-Data:B-SecTeam, published:O, on:O, Turla/Uroburos:B-HackOrg, back:O, in:O, February:O, ,:O, several:O, questions:O, remained:O, unanswered:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The attackers behind Epic Turla have infected several hundred computers in more than 45 countries , including research and pharmaceutical companies .' [/INST] [The:O, attackers:O, behind:O, Epic:B-Tool, Turla:I-Tool, have:O, infected:O, several:O, hundred:O, computers:O, in:O, more:O, than:O, 45:O, countries:O, ,:O, including:O, research:O, and:O, pharmaceutical:B-Org, companies:I-Org, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The primary backdoor used in the Epic attacks is also known as , WorldCupSec , , , TadjMakhal , , , Wipbot , or , Tavdig , .' [/INST] [The:O, primary:O, backdoor:O, used:O, in:O, the:O, Epic:B-OffAct, attacks:I-OffAct, is:O, also:O, known:O, as:O, ,:O, WorldCupSec:B-HackOrg, ,:O, ,:O, ,:O, TadjMakhal:B-HackOrg, ,:O, ,:O, ,:O, Wipbot:B-HackOrg, ,:O, or:O, ,:O, Tavdig:B-HackOrg, ,:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Thrip 's motive is likely espionage and its targets include those in the communications , geospatial imaging , and defense sectors , both in the United States and Southeast Asia .' [/INST] [Thrip:O, 's:O, motive:O, is:O, likely:O, espionage:O, and:O, its:O, targets:O, include:O, those:O, in:O, the:O, communications:B-Idus, ,:O, geospatial:B-Idus, imaging:I-Idus, ,:O, and:O, defense:B-Org, sectors:I-Org, ,:O, both:O, in:O, the:O, United:B-Area, States:I-Area, and:O, Southeast:B-Area, Asia:I-Area, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'One big unknown was the infection vector for Turla ( aka Snake or Uroburos ) .' [/INST] [One:O, big:O, unknown:O, was:O, the:O, infection:O, vector:O, for:O, Turla:O, (:O, aka:O, Snake:B-HackOrg, or:O, Uroburos:B-HackOrg, ):O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The mothership server is generally a VPS , which runs the Control panel software used to interact with the victims .' [/INST] [The:O, mothership:O, server:O, is:O, generally:O, a:O, VPS:B-Tool, ,:O, which:O, runs:O, the:O, Control:O, panel:O, software:O, used:O, to:O, interact:O, with:O, the:O, victims:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'the backdoor is packaged together with the CVE-2013-5065 EoP exploit and heavily obfuscated .' [/INST] [the:O, backdoor:O, is:O, packaged:O, together:O, with:O, the:O, CVE-2013-5065:B-Exp, EoP:B-Exp, exploit:I-Exp, and:O, heavily:O, obfuscated:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Once a victim is confirmed as , interesting , , the attackers upload another Epic backdoor which has a unique ID used to control this specific victim .' [/INST] [Once:O, a:O, victim:O, is:O, confirmed:O, as:O, ,:O, interesting:O, ,:O, ,:O, the:O, attackers:O, upload:O, another:O, Epic:B-Tool, backdoor:I-Tool, which:O, has:O, a:O, unique:O, ID:O, used:O, to:O, control:O, this:O, specific:O, victim:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Our analysis indicates this is a sophisticated multi-stage infection ; which begins with Epic Turla .' [/INST] [Our:O, analysis:O, indicates:O, this:O, is:O, a:O, sophisticated:O, multi-stage:O, infection:O, ;:O, which:O, begins:O, with:O, Epic:B-Tool, Turla:I-Tool, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'this attack against a Kaspersky Lab user on August 5 , 2014 .' [/INST] [this:O, attack:B-OffAct, against:O, a:O, Kaspersky:B-SecTeam, Lab:I-SecTeam, user:O, on:O, August:B-Time, 5:I-Time, ,:O, 2014:B-Time, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'VENOMOUS BEAR is an advanced , Russia-based adversary that's been active since at least 2004 .' [/INST] [VENOMOUS:B-HackOrg, BEAR:I-HackOrg, is:O, an:O, advanced:O, ,:O, Russia-based:B-Area, adversary:O, that's:O, been:O, active:O, since:O, at:O, least:O, 2004:B-Time, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Venomous Bear has deployed malware to targets using several novel methods .' [/INST] [Venomous:B-HackOrg, Bear:I-HackOrg, has:O, deployed:O, malware:O, to:O, targets:O, using:O, several:O, novel:B-Way, methods:I-Way, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'For years , Turla has relied , among other impersonations , on fake Flash installers to compromise victims .' [/INST] [For:O, years:O, ,:O, Turla:B-HackOrg, has:O, relied:O, ,:O, among:O, other:O, impersonations:O, ,:O, on:O, fake:B-Tool, Flash:I-Tool, installers:I-Tool, to:O, compromise:O, victims:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Turla merely uses the Adobe brand to trick users into downloading the malware .' [/INST] [Turla:B-HackOrg, merely:O, uses:O, the:O, Adobe:O, brand:O, to:O, trick:O, users:O, into:O, downloading:O, the:O, malware:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'By looking at our telemetry , we found evidence that Turla installers were exfiltrating information to get.adobe.com URLs since at least July 2016 .' [/INST] [By:O, looking:O, at:O, our:O, telemetry:O, ,:O, we:O, found:O, evidence:O, that:O, Turla:B-HackOrg, installers:O, were:O, exfiltrating:O, information:O, to:O, get.adobe.com:O, URLs:O, since:O, at:O, least:O, July:B-Time, 2016:I-Time, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Thus , it is clear they are trying to be as stealthy as possible by hiding in the network traffic of the targeted organizations .' [/INST] [Thus:O, ,:O, it:O, is:O, clear:O, they:O, are:O, trying:O, to:O, be:O, as:O, stealthy:O, as:O, possible:O, by:O, hiding:O, in:O, the:O, network:B-Way, traffic:I-Way, of:O, the:O, targeted:O, organizations:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Finally , some of the victims are also infected with other Turla-related malware such as ComRAT or Gazer .' [/INST] [Finally:O, ,:O, some:O, of:O, the:O, victims:O, are:O, also:O, infected:O, with:O, other:O, Turla-related:B-HackOrg, malware:B-Tool, such:O, as:O, ComRAT:B-Tool, or:O, Gazer:B-Tool, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Kaspersky Lab documented this behavior in 2014 .' [/INST] [Kaspersky:B-SecTeam, Lab:I-SecTeam, documented:O, this:O, behavior:O, in:O, 2014:B-Time, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'It is not a new tactic for Turla to rely on fake Flash installers to try to trick the user to install one of their backdoors .' [/INST] [It:O, is:O, not:O, a:O, new:O, tactic:O, for:O, Turla:O, to:O, rely:O, on:O, fake:B-Tool, Flash:I-Tool, installers:I-Tool, to:O, try:O, to:O, trick:O, the:O, user:O, to:O, install:O, one:O, of:O, their:O, backdoors:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Turla operators could use an already-compromised machine in the network of the victim 's organization to perform a local MitM attack .' [/INST] [Turla:O, operators:O, could:O, use:O, an:O, already-compromised:O, machine:O, in:O, the:O, network:O, of:O, the:O, victim:O, 's:O, organization:O, to:O, perform:O, a:O, local:O, MitM:B-OffAct, attack:I-OffAct, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Our January 2018 white paper was the first public analysis of a Turla campaign called Mosquito .' [/INST] [Our:O, January:B-Time, 2018:I-Time, white:O, paper:O, was:O, the:O, first:O, public:O, analysis:O, of:O, a:O, Turla:B-OffAct, campaign:I-OffAct, called:O, Mosquito:B-OffAct, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'It is not the first time Turla has used generic tools .' [/INST] [It:O, is:O, not:O, the:O, first:O, time:O, Turla:B-HackOrg, has:O, used:O, generic:B-Tool, tools:I-Tool, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In the past , we have seen the group using open-source password dumpers such as Mimikatz .' [/INST] [In:O, the:O, past:O, ,:O, we:O, have:O, seen:O, the:O, group:O, using:O, open-source:B-Tool, password:I-Tool, dumpers:I-Tool, such:O, as:O, Mimikatz:B-Tool, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Starting in March 2018 , we observed a significant change in the campaign : it now leverages the open source exploitation framework Metasploit before dropping the custom Mosquito backdoor .' [/INST] [Starting:O, in:O, March:B-Time, 2018:I-Time, ,:O, we:O, observed:O, a:O, significant:O, change:O, in:O, the:O, campaign:B-OffAct, ::O, it:O, now:O, leverages:O, the:O, open:O, source:O, exploitation:O, framework:O, Metasploit:B-Tool, before:O, dropping:O, the:O, custom:O, Mosquito:O, backdoor:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Even an experienced user can be fooled by downloading a malicious file that is apparently from adobe.com , since the URL and the IP address correspond to Adobe 's legitimate infrastructure .' [/INST] [Even:O, an:O, experienced:O, user:O, can:O, be:O, fooled:O, by:O, downloading:O, a:O, malicious:B-SamFile, file:I-SamFile, that:O, is:O, apparently:O, from:O, adobe.com:B-Way, ,:O, since:O, the:O, URL:O, and:O, the:O, IP:O, address:O, correspond:O, to:O, Adobe:O, 's:O, legitimate:O, infrastructure:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'However , to our knowledge , this is the first time Turla has used Metasploit as a first stage backdoor , instead of relying on one of its own tools such as Skipper .' [/INST] [However:O, ,:O, to:O, our:O, knowledge:O, ,:O, this:O, is:O, the:O, first:O, time:O, Turla:O, has:O, used:O, Metasploit:B-Tool, as:O, a:O, first:O, stage:O, backdoor:O, ,:O, instead:O, of:O, relying:O, on:O, one:O, of:O, its:O, own:O, tools:O, such:O, as:O, Skipper:B-Tool, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Traffic was intercepted on a node between the end machine and the Adobe servers , allowing Turla 's operators to replace the legitimate Flash executable with a trojanized version .' [/INST] [Traffic:O, was:O, intercepted:O, on:O, a:O, node:O, between:O, the:O, end:O, machine:O, and:O, the:O, Adobe:O, servers:O, ,:O, allowing:O, Turla:O, 's:O, operators:O, to:O, replace:B-Way, the:I-Way, legitimate:I-Way, Flash:I-Way, executable:I-Way, with:O, a:O, trojanized:O, version:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'At the beginning of March 2018 , as part of our regular tracking of Turla 's activities , we observed some changes in the Mosquito campaign .' [/INST] [At:O, the:O, beginning:O, of:O, March:B-Time, 2018:I-Time, ,:O, as:O, part:O, of:O, our:O, regular:O, tracking:O, of:O, Turla:B-HackOrg, 's:O, activities:B-OffAct, ,:O, we:O, observed:O, some:O, changes:O, in:O, the:O, Mosquito:B-OffAct, campaign:I-OffAct, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In this post , we have presented the evolutions of the Turla Mosquito campaign over the last few months .' [/INST] [In:O, this:O, post:O, ,:O, we:O, have:O, presented:O, the:O, evolutions:O, of:O, the:O, Turla:B-OffAct, Mosquito:I-OffAct, campaign:I-OffAct, over:O, the:O, last:O, few:O, months:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Primary targets for this adversary are in the government , aerospace , NGO , defense , cryptology and education sectors .' [/INST] [Primary:O, targets:O, for:O, this:O, adversary:O, are:O, in:O, the:O, government:B-Idus, ,:O, aerospace:B-Idus, ,:O, NGO:B-Idus, ,:O, defense:B-Idus, ,:O, cryptology:B-Idus, and:O, education:B-Org, sectors:I-Org, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Turla 's campaign still relies on a fake Flash installer but , instead of directly dropping the two malicious DLLs , it executes a Metasploit shellcode and drops , or downloads from Google Drive , a legitimate Flash installer .' [/INST] [Turla:O, 's:O, campaign:B-OffAct, still:O, relies:O, on:O, a:O, fake:O, Flash:O, installer:O, but:O, ,:O, instead:O, of:O, directly:O, dropping:O, the:O, two:O, malicious:O, DLLs:O, ,:O, it:O, executes:O, a:O, Metasploit:B-Tool, shellcode:I-Tool, and:I-Tool, drops:I-Tool, ,:O, or:O, downloads:O, from:O, Google:O, Drive:O, ,:O, a:O, legitimate:O, Flash:O, installer:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The Turla espionage group has been targeting various institutions for many years .' [/INST] [The:O, Turla:O, espionage:O, group:O, has:O, been:O, targeting:O, various:O, institutions:O, for:O, many:O, years:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Recently , we found several new versions of Carbon , a second stage backdoor in the Turla group arsenal .' [/INST] [Recently:O, ,:O, we:O, found:O, several:O, new:O, versions:O, of:O, Carbon:B-Tool, ,:O, a:O, second:O, stage:O, backdoor:O, in:O, the:O, Turla:O, group:O, arsenal:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The Turla group is known to be painstaking and work in stages , first doing reconnaissance on their victims' systems before deploying their most sophisticated tools such as Carbon .' [/INST] [The:O, Turla:O, group:O, is:O, known:O, to:O, be:O, painstaking:O, and:O, work:O, in:O, stages:O, ,:O, first:O, doing:O, reconnaissance:O, on:O, their:O, victims':O, systems:O, before:O, deploying:O, their:O, most:O, sophisticated:O, tools:O, such:O, as:O, Carbon:B-Tool, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Kaspersky APT Intelligence Reporting subscription , customers received an update in mid-February 2017 .' [/INST] [Kaspersky:B-SecTeam, APT:I-SecTeam, Intelligence:I-SecTeam, Reporting:I-SecTeam, subscription:I-SecTeam, ,:O, customers:O, received:O, an:O, update:O, in:O, mid-February:B-Time, 2017:B-Time, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Like previous Turla activity , WhiteBear leverages compromised websites and hijacked satellite connections for command and control ( C2 ) infrastructure .' [/INST] [Like:O, previous:O, Turla:B-OffAct, activity:I-OffAct, ,:O, WhiteBear:B-Tool, leverages:O, compromised:B-Way, websites:I-Way, and:O, hijacked:O, satellite:O, connections:O, for:O, command:O, and:O, control:O, (:O, C2:O, ):O, infrastructure:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'WhiteBear is a parallel project or second stage of the Skipper Turla cluster of activity documented in another private intelligence report , Skipper Turla β the White Atlas framework , from mid-2016 .' [/INST] [WhiteBear:B-Tool, is:O, a:O, parallel:O, project:O, or:O, second:O, stage:O, of:O, the:O, Skipper:B-Tool, Turla:I-Tool, cluster:O, of:O, activity:B-OffAct, documented:O, in:O, another:O, private:O, intelligence:O, report:O, ,:O, Skipper:B-Tool, Turla:I-Tool, β:O, the:O, White:B-Tool, Atlas:I-Tool, framework:O, ,:O, from:O, mid-2016:B-Time, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'However , despite the similarities to previous Turla campaigns , we believe that WhiteBear is a distinct project with a separate focus .' [/INST] [However:O, ,:O, despite:O, the:O, similarities:O, to:O, previous:O, Turla:B-OffAct, campaigns:I-OffAct, ,:O, we:O, believe:O, that:O, WhiteBear:B-Tool, is:O, a:O, distinct:O, project:O, with:O, a:O, separate:O, focus:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'From February to September 2016 , WhiteBear activity was narrowly focused on embassies and consular operations around the world .' [/INST] [From:O, February:B-Time, to:O, September:B-Time, 2016:I-Time, ,:O, WhiteBear:B-OffAct, activity:I-OffAct, was:O, narrowly:O, focused:O, on:O, embassies:B-Org, and:O, consular:O, operations:O, around:O, the:O, world:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Continued WhiteBear activity later shifted to include defense-related organizations into June 2017 .' [/INST] [Continued:O, WhiteBear:B-OffAct, activity:I-OffAct, later:O, shifted:O, to:O, include:O, defense-related:B-Org, organizations:I-Org, into:O, June:B-Time, 2017:I-Time, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'All of these early WhiteBear targets were related to embassies and diplomatic/foreign affair organizations .' [/INST] [All:O, of:O, these:O, early:O, WhiteBear:B-Tool, targets:O, were:O, related:O, to:O, embassies:B-Org, and:O, diplomatic/foreign:O, affair:O, organizations:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Thus , Turla operators had access to some highly sensitive information ( such as emails sent by the German Foreign Office staff ) for almost a year .' [/INST] [Thus:O, ,:O, Turla:B-HackOrg, operators:O, had:O, access:O, to:O, some:O, highly:O, sensitive:O, information:O, (:O, such:O, as:O, emails:B-Way, sent:O, by:O, the:O, German:B-Org, Foreign:I-Org, Office:I-Org, staff:I-Org, ):O, for:O, almost:O, a:O, year:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Our investigation also led to the discovery of dozens of email addresses registered by Turla operators for this campaign and used to receive exfiltrated data from the victims .' [/INST] [Our:O, investigation:O, also:O, led:O, to:O, the:O, discovery:O, of:O, dozens:O, of:O, email:O, addresses:O, registered:O, by:O, Turla:O, operators:O, for:O, this:O, campaign:B-OffAct, and:O, used:O, to:O, receive:O, exfiltrated:O, data:O, from:O, the:O, victims:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'It mainly targets Microsoft Outlook , a widely used mail client , but also targets The Bat! , a mail client very popular in Eastern Europe .' [/INST] [It:O, mainly:O, targets:O, Microsoft:O, Outlook:O, ,:O, a:O, widely:O, used:O, mail:O, client:O, ,:O, but:O, also:O, targets:O, The:O, Bat!:O, ,:O, a:O, mail:O, client:O, very:O, popular:O, in:O, Eastern:O, Europe:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'First , Turla steals emails by forwarding all outgoing emails to the attackers .' [/INST] [First:O, ,:O, Turla:B-HackOrg, steals:O, emails:B-Way, by:O, forwarding:O, all:O, outgoing:O, emails:B-Way, to:O, the:O, attackers:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'We identified several European governments and defense companies compromised with this group .' [/INST] [We:O, identified:O, several:O, European:B-Idus, governments:I-Idus, and:O, defense:B-Org, companies:I-Org, compromised:O, with:O, this:O, group:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'What actually happens is that the malware is able to decode data from the PDF documents and interpret it as commands for the backdoor .' [/INST] [What:O, actually:O, happens:O, is:O, that:O, the:O, malware:O, is:O, able:O, to:O, decode:O, data:O, from:O, the:O, PDF:B-Tool, documents:I-Tool, and:O, interpret:O, it:O, as:O, commands:O, for:O, the:O, backdoor:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In early 2018 , multiple media claimed that Turla operators used mail attachments to control infected machines .' [/INST] [In:O, early:O, 2018:B-Time, ,:O, multiple:O, media:B-Idus, claimed:O, that:O, Turla:O, operators:O, used:O, mail:B-Way, attachments:I-Way, to:O, control:O, infected:O, machines:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'As detailed in the previous section , this malware is able to manipulate and exfiltrate emails .' [/INST] [As:O, detailed:O, in:O, the:O, previous:O, section:O, ,:O, this:O, malware:O, is:O, able:O, to:O, manipulate:B-Features, and:I-Features, exfiltrate:I-Features, emails:I-Features, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'To our knowledge , Turla is the only espionage group that currently uses a backdoor entirely controlled by emails , and more specifically via PDF attachments .' [/INST] [To:O, our:O, knowledge:O, ,:O, Turla:O, is:O, the:O, only:O, espionage:O, group:O, that:O, currently:O, uses:O, a:O, backdoor:O, entirely:O, controlled:O, by:O, emails:B-Way, ,:O, and:O, more:O, specifically:O, via:O, PDF:B-Tool, attachments:I-Tool, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The attackers first infected in March 2017 .' [/INST] [The:O, attackers:O, first:O, infected:O, in:O, March:B-Time, 2017:I-Time, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Our research shows that compromised organizations are at risk of not only being spied on by the Turla group who planted the backdoor , but also by other attackers .' [/INST] [Our:O, research:O, shows:O, that:O, compromised:O, organizations:O, are:O, at:O, risk:O, of:O, not:O, only:O, being:O, spied:O, on:O, by:O, the:O, Turla:O, group:O, who:O, planted:O, the:O, backdoor:O, ,:O, but:O, also:O, by:O, other:O, attackers:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The developers refer to this tool by the name Kazuar , which is a Trojan written using the Microsoft.NET Framework that offers actors complete access to compromised systems targeted by its operator .' [/INST] [The:O, developers:O, refer:O, to:O, this:O, tool:O, by:O, the:O, name:O, Kazuar:B-Tool, ,:O, which:O, is:O, a:O, Trojan:O, written:O, using:O, the:O, Microsoft.NET:O, Framework:O, that:O, offers:O, actors:O, complete:O, access:O, to:O, compromised:O, systems:O, targeted:O, by:O, its:O, operator:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'We suspect the Kazuar tool may be linked to the Turla threat actor group ( also known as Uroburos and Snake ) , who have been reported to have compromised embassies , defense contractors , educational institutions , and research organizations across the globe .' [/INST] [We:O, suspect:O, the:O, Kazuar:B-Tool, tool:I-Tool, may:O, be:O, linked:O, to:O, the:O, Turla:O, threat:O, actor:O, group:O, (:O, also:O, known:O, as:O, Uroburos:B-HackOrg, and:O, Snake:B-HackOrg, ):O, ,:O, who:O, have:O, been:O, reported:O, to:O, have:O, compromised:O, embassies:B-Org, ,:O, defense:B-Org, contractors:I-Org, ,:O, educational:B-Org, institutions:I-Org, ,:O, and:O, research:B-Org, organizations:I-Org, across:O, the:O, globe:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'This is also a full-featured backdoor controlled by email , and which can work independently of any other Turla component .' [/INST] [This:O, is:O, also:O, a:O, full-featured:B-Tool, backdoor:I-Tool, controlled:O, by:O, email:B-Way, ,:O, and:O, which:O, can:O, work:O, independently:O, of:O, any:O, other:O, Turla:O, component:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'A hallmark of Turla operations is iterations of their tools and code lineage in Kazuar can be traced back to at least 2005 .' [/INST] [A:O, hallmark:O, of:O, Turla:O, operations:O, is:O, iterations:O, of:O, their:O, tools:O, and:O, code:B-Way, lineage:I-Way, in:O, Kazuar:B-Tool, can:O, be:O, traced:O, back:O, to:O, at:O, least:O, 2005:B-Time, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'If the hypothesis is correct and the Turla threat group is using Kazuar , we believe they may be using it as a replacement for Carbon and its derivatives .' [/INST] [If:O, the:O, hypothesis:O, is:O, correct:O, and:O, the:O, Turla:B-HackOrg, threat:O, group:O, is:O, using:O, Kazuar:B-Tool, ,:O, we:O, believe:O, they:O, may:O, be:O, using:O, it:O, as:O, a:O, replacement:O, for:O, Carbon:B-Tool, and:O, its:O, derivatives:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'We used a combination of tools such as NoFuserEx , ConfuserEx Fixer , ConfuserEx Switch Killer , and de4d0t in order to deobfuscate the code for in depth analysis .' [/INST] [We:O, used:O, a:O, combination:O, of:O, tools:O, such:O, as:O, NoFuserEx:B-Tool, ,:O, ConfuserEx:B-Tool, Fixer:I-Tool, ,:O, ConfuserEx:B-Tool, Switch:I-Tool, Killer:I-Tool, ,:O, and:O, de4d0t:B-Tool, in:O, order:O, to:O, deobfuscate:O, the:O, code:O, for:O, in:O, depth:O, analysis:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Kazuar generates its mutex by using a process that begins with obtaining the MD5 hash of a string , [username]=>singleton-instance-mutex , .' [/INST] [Kazuar:B-SecTeam, generates:B-Features, its:I-Features, mutex:I-Features, by:O, using:O, a:O, process:O, that:O, begins:O, with:O, obtaining:O, the:O, MD5:O, hash:O, of:O, a:O, string:O, ,:O, [username]=>singleton-instance-mutex:O, ,:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The subject is a series of targeted attacks against private companies .' [/INST] [The:O, subject:O, is:O, a:O, series:O, of:O, targeted:B-OffAct, attacks:I-OffAct, against:O, private:B-Org, companies:I-Org, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'e uncovered the activity of a hacking group which has Chinese origins .' [/INST] [e:O, uncovered:O, the:O, activity:B-OffAct, of:O, a:O, hacking:O, group:O, which:O, has:O, Chinese:O, origins:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Also , by creating this type of API access , Turla could use one accessible server as a single point to dump data to and exfiltrate data from .' [/INST] [Also:O, ,:O, by:O, creating:O, this:O, type:O, of:O, API:B-Way, access:I-Way, ,:O, Turla:O, could:O, use:O, one:O, accessible:O, server:O, as:O, a:O, single:O, point:O, to:O, dump:O, data:O, to:O, and:O, exfiltrate:B-Purp, data:I-Purp, from:I-Purp, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'According to our estimations , this group has been active for several years and specializes in cyberattacks against the online video game industry .' [/INST] [According:O, to:O, our:O, estimations:O, ,:O, this:O, group:O, has:O, been:O, active:O, for:O, several:O, years:O, and:O, specializes:O, in:O, cyberattacks:B-OffAct, against:O, the:O, online:B-Idus, video:I-Idus, game:I-Idus, industry:I-Idus, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Based on our analysis , we believe that threat actors may compile Windows and Unix based payloads using the same code to deploy Kazuar against both platforms .' [/INST] [Based:O, on:O, our:O, analysis:O, ,:O, we:O, believe:O, that:O, threat:O, actors:O, may:O, compile:O, Windows:O, and:O, Unix:O, based:O, payloads:O, using:O, the:O, same:O, code:O, to:O, deploy:O, Kazuar:B-SecTeam, against:O, both:O, platforms:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The group 's main objective is to steal source codes .' [/INST] [The:O, group:O, 's:O, main:O, objective:O, is:O, to:O, steal:O, source:O, codes:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In 2010 HBGary investigated an information security incident related to the Winnti group at one of HBGary 's customers β an American video game company .' [/INST] [In:O, 2010:B-Time, HBGary:B-SecTeam, investigated:O, an:O, information:O, security:O, incident:O, related:O, to:O, the:O, Winnti:O, group:O, at:O, one:O, of:O, HBGary:B-SecTeam, 's:O, customers:O, β:O, an:O, American:B-Org, video:I-Org, game:I-Org, company:I-Org, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In 2010 US-based HBGary investigated an information security incident related to the Winnti group at one of HBGary 's customers β an American video game company .' [/INST] [In:O, 2010:B-Time, US-based:B-Area, HBGary:B-SecTeam, investigated:O, an:O, information:O, security:O, incident:O, related:O, to:O, the:O, Winnti:O, group:O, at:O, one:O, of:O, HBGary:B-SecTeam, 's:O, customers:O, β:O, an:O, American:B-Area, video:B-Org, game:I-Org, company:I-Org, .:O] </s> |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.