text stringlengths 306 1.51k |
|---|
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The standard network protocol for Gh0st RAT 3.6 employs zlib compression , which utilizes ‘Gh0st’ as a static five-byte packet flag that must be included in the first five bytes of initial transmission from the victim .' [/INST] [The:O, standard:O, network:O, protocol:O, for:O, Gh0st:B-HackOrg, RAT:I-HackOrg, 3.6:I-HackOrg, employs:O, zlib:B-Tool, compression:I-Tool, ,:O, which:O, utilizes:O, ‘Gh0st’:O, as:O, a:O, static:O, five-byte:O, packet:O, flag:O, that:O, must:O, be:O, included:O, in:O, the:O, first:O, five:O, bytes:O, of:O, initial:O, transmission:O, from:O, the:O, victim:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In a more recent version of the modified Gh0st RAT malware , Ghost Dragon implemented dynamic packet flags which change the first five bytes of the header in every login request with the controller .' [/INST] [In:O, a:O, more:O, recent:O, version:O, of:O, the:O, modified:O, Gh0st:B-SamFile, RAT:I-SamFile, malware:O, ,:O, Ghost:B-HackOrg, Dragon:I-HackOrg, implemented:O, dynamic:O, packet:O, flags:O, which:O, change:O, the:O, first:O, five:O, bytes:O, of:O, the:O, header:O, in:O, every:O, login:O, request:O, with:O, the:O, controller:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'SPEAR has observed numerous different XOR keys utilized by Ghost Dragon .' [/INST] [SPEAR:O, has:O, observed:O, numerous:O, different:O, XOR:O, keys:O, utilized:O, by:O, Ghost:B-HackOrg, Dragon:I-HackOrg, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Exploit and tools continued to be used after Buckeye's apparent disappearance in 2017 .' [/INST] [Exploit:O, and:O, tools:O, continued:O, to:O, be:O, used:O, after:O, Buckeye's:B-HackOrg, apparent:O, disappearance:O, in:O, 2017:B-Time, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The Buckeye attack group was using Equation Group tools to gain persistent access to target organizations at least a year prior to the Shadow Brokers leak .' [/INST] [The:O, Buckeye:B-HackOrg, attack:O, group:O, was:O, using:O, Equation:B-Tool, Group:I-Tool, tools:I-Tool, to:O, gain:O, persistent:O, access:O, to:O, target:O, organizations:O, at:O, least:O, a:O, year:O, prior:O, to:O, the:O, Shadow:B-OffAct, Brokers:I-OffAct, leak:I-OffAct, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Buckeye's use of Equation Group tools also involved the exploit of a previously unknown Windows zero-day vulnerability .' [/INST] [Buckeye's:B-HackOrg, use:O, of:O, Equation:O, Group:O, tools:O, also:O, involved:O, the:O, exploit:O, of:O, a:O, previously:O, unknown:O, Windows:O, zero-day:B-Way, vulnerability:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'While Buckeye appeared to cease operations in mid-2017 , the Equation Group tools it used continued to be used in attacks until late 2018 .' [/INST] [While:O, Buckeye:B-HackOrg, appeared:O, to:O, cease:O, operations:O, in:O, mid-2017:O, ,:O, the:O, Equation:B-Tool, Group:I-Tool, tools:I-Tool, it:O, used:O, continued:O, to:O, be:O, used:O, in:O, attacks:O, until:O, late:B-Time, 2018:B-Time, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The 2017 leak of Equation Group tools by a mysterious group calling itself the Shadow Brokers was one of the most significant cyber security stories in recent years .' [/INST] [The:O, 2017:B-OffAct, leak:I-OffAct, of:O, Equation:O, Group:O, tools:O, by:O, a:O, mysterious:B-HackOrg, group:I-HackOrg, calling:O, itself:O, the:O, Shadow:O, Brokers:O, was:O, one:O, of:O, the:O, most:O, significant:O, cyber:O, security:O, stories:O, in:O, recent:O, years:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'However , Symantec has now found evidence that the Buckeye cyber espionage group (aka APT3 , Gothic Panda ) began using Equation Group tools in attacks at least a year prior to the Shadow Brokers leak .' [/INST] [However:O, ,:O, Symantec:B-SecTeam, has:O, now:O, found:O, evidence:O, that:O, the:O, Buckeye:B-HackOrg, cyber:O, espionage:O, group:O, (aka:B-HackOrg, APT3:I-HackOrg, ,:O, Gothic:B-HackOrg, Panda:I-HackOrg, ):O, began:O, using:O, Equation:B-Tool, Group:I-Tool, tools:I-Tool, in:O, attacks:O, at:O, least:O, a:O, year:O, prior:O, to:O, the:O, Shadow:O, Brokers:O, leak:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Equation is regarded as one of the most technically adept espionage groups and the release of a trove of its tools had a major impact , with many attackers rushing to deploy the malware and exploits disclosed .' [/INST] [Equation:B-HackOrg, is:O, regarded:O, as:O, one:O, of:O, the:O, most:O, technically:O, adept:O, espionage:O, groups:O, and:O, the:O, release:O, of:O, a:O, trove:B-Tool, of:O, its:O, tools:O, had:O, a:O, major:O, impact:O, ,:O, with:O, many:O, attackers:O, rushing:O, to:O, deploy:O, the:O, malware:O, and:O, exploits:O, disclosed:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'DoublePulsar was delivered to victims using a custom exploit tool (Trojan.Bemstour) that was specifically designed to install DoublePulsar .' [/INST] [DoublePulsar:B-HackOrg, was:O, delivered:O, to:O, victims:O, using:O, a:O, custom:O, exploit:B-Tool, tool:I-Tool, (Trojan.Bemstour):O, that:O, was:O, specifically:O, designed:O, to:O, install:O, DoublePulsar:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'One vulnerability is a Windows zero-day vulnerability (CVE-2019-0703) discovered by Symantec .' [/INST] [One:O, vulnerability:O, is:O, a:O, Windows:O, zero-day:B-Exp, vulnerability:I-Exp, (CVE-2019-0703):O, discovered:O, by:O, Symantec:B-SecTeam, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Bemstour exploits two Windows vulnerabilities in order to achieve remote kernel code execution on targeted computers .' [/INST] [Bemstour:B-HackOrg, exploits:O, two:O, Windows:O, vulnerabilities:B-Exp, in:O, order:O, to:O, achieve:O, remote:O, kernel:O, code:O, execution:O, on:O, targeted:O, computers:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The second Windows vulnerability (CVE-2017-0143) was patched in March 2017 after it was discovered to have been used by two exploit tools—EternalRomance and EternalSynergy—that were also released as part of the Shadow Brokers leak .' [/INST] [The:O, second:O, Windows:O, vulnerability:B-Exp, (CVE-2017-0143):O, was:O, patched:O, in:O, March:B-Time, 2017:I-Time, after:O, it:O, was:O, discovered:O, to:O, have:O, been:O, used:O, by:O, two:O, exploit:O, tools—EternalRomance:O, and:O, EternalSynergy—that:O, were:O, also:O, released:O, as:O, part:O, of:O, the:O, Shadow:B-HackOrg, Brokers:I-HackOrg, leak:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'It was reported by Symantec to Microsoft in September 2018 and was patched on March 12 , 2019 .' [/INST] [It:O, was:O, reported:O, by:O, Symantec:B-SecTeam, to:O, Microsoft:O, in:O, September:B-Time, 2018:I-Time, and:O, was:O, patched:O, on:O, March:O, 12:O, ,:O, 2019:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'How Buckeye obtained Equation Group tools at least a year prior to the Shadow Brokers leak remains unknown .' [/INST] [How:O, Buckeye:B-HackOrg, obtained:O, Equation:B-Tool, Group:I-Tool, tools:I-Tool, at:O, least:O, a:O, year:O, prior:O, to:O, the:O, Shadow:O, Brokers:O, leak:O, remains:O, unknown:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The Buckeye attack group had been active since at least 2009 , when it began mounting a string of espionage attacks , mainly against organizations based in the U.S .' [/INST] [The:O, Buckeye:B-HackOrg, attack:O, group:O, had:O, been:O, active:O, since:O, at:O, least:O, 2009:B-Time, ,:O, when:O, it:O, began:O, mounting:O, a:O, string:O, of:O, espionage:B-Way, attacks:I-Way, ,:O, mainly:O, against:O, organizations:O, based:O, in:O, the:B-Area, U.S:I-Area, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'These include CVE-2010-3962 as part of an attack campaign in 2010 and CVE-2014-1776 in 2014 .' [/INST] [These:O, include:O, CVE-2010-3962:B-Exp, as:O, part:O, of:O, an:O, attack:B-OffAct, campaign:I-OffAct, in:O, 2010:B-Time, and:O, CVE-2014-1776:B-Exp, in:O, 2014:B-Time, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Beginning in August 2016 , a group calling itself the Shadow Brokers began releasing tools it claimed to have originated from the Equation Group .' [/INST] [Beginning:O, in:O, August:B-Time, 2016:I-Time, ,:O, a:O, group:O, calling:O, itself:O, the:O, Shadow:B-HackOrg, Brokers:I-HackOrg, began:O, releasing:O, tools:O, it:O, claimed:O, to:O, have:O, originated:O, from:O, the:O, Equation:B-HackOrg, Group:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Over the coming months , it progressively released more tools , until April 2017 , when it released a final , large cache of tools , including the DoublePulsar backdoor , the FuzzBunch framework , and the EternalBlue , EternalSynergy , and EternalRomance exploit tools .' [/INST] [Over:O, the:O, coming:O, months:O, ,:O, it:O, progressively:O, released:O, more:O, tools:O, ,:O, until:O, April:O, 2017:O, ,:O, when:O, it:O, released:O, a:O, final:O, ,:O, large:O, cache:O, of:O, tools:O, ,:O, including:O, the:O, DoublePulsar:B-Tool, backdoor:B-Tool, ,:O, the:O, FuzzBunch:B-Tool, framework:B-Tool, ,:O, and:O, the:O, EternalBlue:B-Tool, ,:O, EternalSynergy:B-Tool, ,:O, and:O, EternalRomance:B-Tool, exploit:B-Tool, tools:B-Tool, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'However , Buckeye had already been using some of these leaked tools at least a year beforehand .' [/INST] [However:O, ,:O, Buckeye:B-HackOrg, had:O, already:O, been:O, using:O, some:O, of:O, these:O, leaked:B-Tool, tools:I-Tool, at:O, least:O, a:O, year:O, beforehand:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The earliest known use of Equation Group tools by Buckeye is March 31 , 2016 , during an attack on a target in Hong Kong .' [/INST] [The:O, earliest:O, known:O, use:O, of:O, Equation:B-Tool, Group:I-Tool, tools:I-Tool, by:O, Buckeye:B-HackOrg, is:O, March:B-Time, 31:I-Time, ,:O, 2016:B-Time, ,:O, during:O, an:O, attack:O, on:O, a:O, target:O, in:O, Hong:B-Area, Kong:I-Area, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Beginning in March 2016 , Buckeye began using a variant of DoublePulsar (Backdoor.Doublepulsar) , a backdoor that was subsequently released by the Shadow Brokers in 2017 .' [/INST] [Beginning:O, in:O, March:B-Time, 2016:I-Time, ,:O, Buckeye:B-HackOrg, began:O, using:O, a:O, variant:O, of:O, DoublePulsar:O, (Backdoor.Doublepulsar):O, ,:O, a:O, backdoor:O, that:O, was:O, subsequently:O, released:O, by:O, the:O, Shadow:B-HackOrg, Brokers:I-HackOrg, in:O, 2017:B-Time, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'However , while activity involving known Buckeye tools ceased in mid-2017 , the Bemstour exploit tool and the DoublePulsar variant used by Buckeye continued to be used until at least September 2018 in conjunction with different malware .' [/INST] [However:O, ,:O, while:O, activity:O, involving:O, known:O, Buckeye:B-HackOrg, tools:O, ceased:O, in:O, mid-2017:O, ,:O, the:O, Bemstour:B-Tool, exploit:I-Tool, tool:I-Tool, and:O, the:O, DoublePulsar:B-Tool, variant:O, used:O, by:O, Buckeye:O, continued:O, to:O, be:O, used:O, until:O, at:O, least:O, September:B-Time, 2018:I-Time, in:O, conjunction:O, with:O, different:O, malware:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'During this attack , the Bemstour exploit tool was delivered to victims via known Buckeye malware (Backdoor.Pirpi) .' [/INST] [During:O, this:O, attack:O, ,:O, the:O, Bemstour:O, exploit:O, tool:O, was:O, delivered:O, to:O, victims:O, via:O, known:O, Buckeye:B-Tool, malware:I-Tool, (Backdoor.Pirpi):O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'One hour later , Bemstour was used against an educational institution in Belgium .' [/INST] [One:O, hour:O, later:O, ,:O, Bemstour:B-SamFile, was:O, used:O, against:O, an:O, educational:O, institution:O, in:O, Belgium:B-SamFile, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Bemstour is specifically designed to deliver a variant of the DoublePulsar backdoor .' [/INST] [Bemstour:B-SamFile, is:O, specifically:O, designed:O, to:O, deliver:B-Features, a:O, variant:O, of:O, the:O, DoublePulsar:B-Tool, backdoor:I-Tool, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'DoublePulsar is then used to inject a secondary payload , which runs in memory only .' [/INST] [DoublePulsar:B-SamFile, is:O, then:O, used:O, to:O, inject:B-Features, a:O, secondary:O, payload:O, ,:O, which:O, runs:O, in:O, memory:O, only:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'A significantly improved variant of the Bemstour exploit tool was rolled out in September 2016 , when it was used in an attack against an educational institution in Hong Kong .' [/INST] [A:O, significantly:O, improved:O, variant:O, of:O, the:O, Bemstour:B-SamFile, exploit:O, tool:O, was:O, rolled:O, out:O, in:O, September:B-Time, 2016:I-Time, ,:O, when:O, it:O, was:O, used:O, in:O, an:O, attack:O, against:O, an:O, educational:O, institution:O, in:O, Hong:B-Area, Kong:I-Area, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'When used against 32-bit targets , Bemstour still delivered the same DoublePulsar backdoor .' [/INST] [When:O, used:O, against:O, 32-bit:O, targets:O, ,:O, Bemstour:B-Tool, still:O, delivered:O, the:O, same:O, DoublePulsar:B-Tool, backdoor:I-Tool, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Bemstour was used again in June 2017 in an attack against an organization in Luxembourg .' [/INST] [Bemstour:B-SamFile, was:O, used:O, again:O, in:O, June:O, 2017:O, in:O, an:O, attack:O, against:O, an:O, organization:O, in:O, Luxembourg:B-Area, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Between June and September 2017 , Bemstour was also used against targets in the Philippines and Vietnam .' [/INST] [Between:O, June:O, and:O, September:O, 2017:O, ,:O, Bemstour:B-SamFile, was:O, also:O, used:O, against:O, targets:O, in:O, the:O, Philippines:B-Area, and:O, Vietnam:B-Area, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Development of Bemstour has continued into 2019 .' [/INST] [Development:O, of:O, Bemstour:B-SamFile, has:O, continued:O, into:O, 2019:B-Time, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Unlike earlier attacks when Bemstour was delivered using Buckeye's Pirpi backdoor , in this attack Bemstour was delivered to the victim by a different backdoor Trojan (Backdoor.Filensfer) .' [/INST] [Unlike:O, earlier:O, attacks:O, when:O, Bemstour:B-SamFile, was:O, delivered:O, using:O, Buckeye's:O, Pirpi:B-SamFile, backdoor:B-SamFile, ,:O, in:O, this:O, attack:O, Bemstour:O, was:O, delivered:O, to:O, the:O, victim:O, by:O, a:O, different:B-Tool, backdoor:B-Tool, Trojan:O, (Backdoor.Filensfer):O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The most recent sample of Bemstour seen by Symantec appears to have been compiled on March 23 , 2019 , eleven days after the zero-day vulnerability was patched by Microsoft .' [/INST] [The:O, most:O, recent:O, sample:O, of:O, Bemstour:B-SamFile, seen:O, by:O, Symantec:B-SecTeam, appears:O, to:O, have:O, been:O, compiled:O, on:O, March:B-Time, 23:I-Time, ,:O, 2019:O, ,:O, eleven:O, days:O, after:O, the:O, zero-day:O, vulnerability:O, was:O, patched:O, by:O, Microsoft:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Filensfer is a family of malware that has been used in targeted attacks since at least 2013 .' [/INST] [Filensfer:B-SamFile, is:O, a:O, family:O, of:O, malware:O, that:O, has:O, been:O, used:O, in:O, targeted:O, attacks:O, since:O, at:O, least:O, 2013:B-Time, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The zero-day vulnerability found and reported by Symantec (CVE-2019-0703) occurs due to the way the Windows SMB Server handles certain requests .' [/INST] [The:O, zero-day:O, vulnerability:O, found:O, and:O, reported:O, by:O, Symantec:B-SecTeam, (CVE-2019-0703):B-Exp, occurs:O, due:O, to:O, the:O, way:O, the:O, Windows:O, SMB:O, Server:O, handles:O, certain:O, requests:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'While Symantec has never observed the use of Filensfer alongside any known Buckeye tools , information shared privately by another vendor included evidence of Filensfer being used in conjunction with known Buckeye malware (Backdoor.Pirpi) .' [/INST] [While:O, Symantec:B-SecTeam, has:O, never:O, observed:O, the:O, use:O, of:O, Filensfer:B-SamFile, alongside:O, any:O, known:O, Buckeye:O, tools:O, ,:O, information:O, shared:O, privately:O, by:O, another:O, vendor:O, included:O, evidence:O, of:O, Filensfer:O, being:O, used:O, in:O, conjunction:O, with:O, known:O, Buckeye:B-SamFile, malware:I-SamFile, (Backdoor.Pirpi):B-Tool, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'CVE-2017-0143 was also used by two other exploit tools—EternalRomance and EternalSynergy—that were released as part of the Shadow Brokers leak in April 2017 .' [/INST] [CVE-2017-0143:B-Exp, was:O, also:O, used:O, by:O, two:O, other:O, exploit:O, tools—EternalRomance:B-SamFile, and:O, EternalSynergy—that:B-SamFile, were:O, released:O, as:O, part:O, of:O, the:O, Shadow:O, Brokers:O, leak:O, in:O, April:B-Time, 2017:I-Time, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Buckeye's exploit tool , EternalRomance , as well as EternalSynergy , can exploit the CVE-2017-0143 message type confusion vulnerability to perform memory corruption on unpatched victim the case of the Buckeye exploit tool , the attackers exploited their own zero-day vulnerability (CVE-2019-0703) .' [/INST] [Buckeye's:O, exploit:O, tool:O, ,:O, EternalRomance:B-SamFile, ,:O, as:O, well:O, as:O, EternalSynergy:B-SamFile, ,:O, can:O, exploit:O, the:O, CVE-2017-0143:B-SamFile, message:O, type:O, confusion:O, vulnerability:O, to:O, perform:O, memory:O, corruption:O, on:O, unpatched:O, victim:O, the:O, case:O, of:O, the:O, Buckeye:B-Tool, exploit:I-Tool, tool:I-Tool, ,:O, the:O, attackers:O, exploited:O, their:O, own:O, zero-day:O, vulnerability:O, (CVE-2019-0703):O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'It is noteworthy that the attackers never used the FuzzBunch framework in its attacks .' [/INST] [It:O, is:O, noteworthy:O, that:O, the:O, attackers:B-HackOrg, never:O, used:O, the:O, FuzzBunch:B-Tool, framework:I-Tool, in:O, its:O, attacks:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'FuzzBunch is a framework designed to manage DoublePulsar and other Equation Group tools and was leaked by the Shadow Brokers in 2017 .' [/INST] [FuzzBunch:B-Tool, is:O, a:O, framework:O, designed:O, to:O, manage:O, DoublePulsar:O, and:O, other:O, Equation:O, Group:O, tools:O, and:O, was:O, leaked:O, by:O, the:O, Shadow:B-HackOrg, Brokers:I-HackOrg, in:O, 2017:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'There are multiple possibilities as to how Buckeye obtained Equation Group tools before the Shadow Brokers leak .' [/INST] [There:O, are:O, multiple:O, possibilities:O, as:O, to:O, how:O, Buckeye:B-HackOrg, obtained:O, Equation:B-HackOrg, Group:I-HackOrg, tools:O, before:O, the:O, Shadow:O, Brokers:O, leak:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'However , aside from the continued use of the tools , Symantec has found no other evidence suggesting Buckeye has retooled .' [/INST] [However:O, ,:O, aside:O, from:O, the:O, continued:O, use:O, of:O, the:O, tools:O, ,:O, Symantec:B-SecTeam, has:O, found:O, no:O, other:O, evidence:O, suggesting:O, Buckeye:B-HackOrg, has:O, retooled:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'this RTF exploits again the CVE-2017_1882 on eqnedt32.exe .' [/INST] [this:O, RTF:B-SamFile, exploits:O, again:O, the:O, CVE-2017_1882:B-Exp, on:O, eqnedt32.exe:B-SamFile, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'And the dropper execute the iassvcs.exe to make a side loading and make the persistence .' [/INST] [And:O, the:O, dropper:B-SamFile, execute:O, the:O, iassvcs.exe:B-SamFile, to:O, make:O, a:O, side:O, loading:O, and:O, make:O, the:O, persistence:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'This IP is very interesting because it connects with tele.zyns.com and old infrastructures used by chinese APT or DDOS Chinese team against the ancient soviet republics .' [/INST] [This:O, IP:O, is:O, very:O, interesting:O, because:O, it:O, connects:O, with:O, tele.zyns.com:O, and:O, old:O, infrastructures:O, used:O, by:O, chinese:B-HackOrg, APT:I-HackOrg, or:O, DDOS:O, Chinese:O, team:O, against:O, the:O, ancient:B-Idus, soviet:I-Idus, republics:I-Idus, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Over the past three years , Filensfer has been deployed against organizations in Luxembourg , Sweden , Italy , the UK , and the U.S .' [/INST] [Over:O, the:O, past:O, three:O, years:O, ,:O, Filensfer:B-SamFile, has:O, been:O, deployed:O, against:O, organizations:O, in:O, Luxembourg:B-Area, ,:O, Sweden:B-Area, ,:O, Italy:B-Area, ,:O, the:B-Area, UK:I-Area, ,:O, and:O, the:B-Area, U.S:I-Area, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'All zero-day exploits known , or suspected , to have been used by this group are for vulnerabilities in Internet Explorer and Flash .' [/INST] [All:O, zero-day:O, exploits:O, known:O, ,:O, or:O, suspected:O, ,:O, to:O, have:O, been:O, used:O, by:O, this:O, group:B-HackOrg, are:O, for:O, vulnerabilities:O, in:O, Internet:B-Tool, Explorer:I-Tool, and:O, Flash:B-Tool, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'According to reports , the Philippines is the most exposed country in ASEAN to the cyberattacks known as advanced persistent threats , or APTs .' [/INST] [According:O, to:O, reports:O, ,:O, the:O, Philippines:B-Area, is:O, the:O, most:O, exposed:O, country:O, in:O, ASEAN:O, to:O, the:O, cyberattacks:B-HackOrg, known:O, as:O, advanced:O, persistent:O, threats:O, ,:O, or:O, APTs:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Our analysis of this malware shows that it belongs to Hussarini , also known as Sarhust , a backdoor family that has been used actively in APT attacks targeting countries in the ASEAN region since 2014 .' [/INST] [Our:O, analysis:O, of:O, this:O, malware:O, shows:O, that:O, it:O, belongs:O, to:O, Hussarini:B-SamFile, ,:O, also:O, known:O, as:O, Sarhust:O, ,:O, a:O, backdoor:O, family:O, that:O, has:O, been:O, used:O, actively:O, in:O, APT:O, attacks:O, targeting:O, countries:O, in:O, the:O, ASEAN:B-Area, region:I-Area, since:O, 2014:B-Time, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'OutExtra.exe is a signed legitimate application from Microsoft named finder.exe .' [/INST] [OutExtra.exe:B-SamFile, is:O, a:O, signed:O, legitimate:O, application:O, from:O, Microsoft:O, named:O, finder.exe:B-SamFile, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In addition to file-based protection , customers of the DeepSight Intelligence Managed Adversary and Threat Intelligence (MATI) service have received reports on Buckeye , which detail methods of detecting and thwarting activities of this group .' [/INST] [In:O, addition:O, to:O, file-based:O, protection:O, ,:O, customers:O, of:O, the:O, DeepSight:B-SecTeam, Intelligence:O, Managed:O, Adversary:O, and:O, Threat:O, Intelligence:O, (MATI):O, service:O, have:O, received:O, reports:O, on:O, Buckeye:B-HackOrg, ,:O, which:O, detail:O, methods:O, of:O, detecting:O, and:O, thwarting:O, activities:O, of:O, this:O, group:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'However , in this attack , this file is used to load the Hussarini backdoor via DLL hijacking .' [/INST] [However:O, ,:O, in:O, this:O, attack:B-HackOrg, ,:O, this:O, file:O, is:O, used:O, to:O, load:O, the:O, Hussarini:O, backdoor:O, via:O, DLL:B-Tool, hijacking:B-Tool, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Today , this malware is still actively being used against the Philippines .' [/INST] [Today:O, ,:O, this:O, malware:B-SamFile, is:O, still:O, actively:O, being:O, used:O, against:O, the:O, Philippines:B-Area, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Hussarini was first mentioned in APT campaigns targeting the Philippines and Thailand in 2014 .' [/INST] [Hussarini:O, was:O, first:O, mentioned:O, in:O, APT:B-HackOrg, campaigns:O, targeting:O, the:O, Philippines:B-Area, and:O, Thailand:O, in:O, 2014:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Further analysis showed that the Iron cybercrime group used two main functions from HackingTeam's source in both IronStealer and Iron ransomware .' [/INST] [Further:O, analysis:O, showed:O, that:O, the:O, Iron:B-HackOrg, cybercrime:O, group:O, used:O, two:O, main:O, functions:O, from:O, HackingTeam's:O, source:O, in:O, both:O, IronStealer:B-Tool, and:O, Iron:B-Tool, ransomware:I-Tool, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Xagent” is the original filename Xagent.exe whereas seems to be the version of the worm .' [/INST] [Xagent”:B-SamFile, is:O, the:O, original:O, filename:O, Xagent.exe:O, whereas:O, seems:O, to:O, be:O, the:O, version:O, of:O, the:O, worm:B-SamFile, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Xagent – A variant of JbossMiner Mining Worm” – a worm written in Python and compiled using PyInstaller for both Windows and Linux platforms .' [/INST] [Xagent:B-HackOrg, –:O, A:O, variant:O, of:O, JbossMiner:B-HackOrg, Mining:I-HackOrg, Worm”:O, –:O, a:O, worm:O, written:O, in:O, Python:O, and:O, compiled:O, using:O, PyInstaller:O, for:O, both:O, Windows:O, and:O, Linux:O, platforms:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Its activities were traced back to 2010 in FireEye's 2013 report on operation Ke3chang – a cyberespionage campaign directed at diplomatic organizations in Europe .' [/INST] [Its:O, activities:O, were:O, traced:O, back:O, to:O, 2010:B-Time, in:O, FireEye's:B-SecTeam, 2013:O, report:O, on:O, operation:O, Ke3chang:B-HackOrg, –:O, a:O, cyberespionage:O, campaign:O, directed:O, at:O, diplomatic:O, organizations:O, in:O, Europe:B-Area, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'We have been tracking the malicious activities related to this threat actor and discovered a previously undocumented malware family with strong links to the Ke3chang group – a backdoor we named Okrum .' [/INST] [We:O, have:O, been:O, tracking:O, the:O, malicious:O, activities:O, related:O, to:O, this:O, threat:O, actor:O, and:O, discovered:O, a:O, previously:O, undocumented:O, malware:O, family:O, with:O, strong:O, links:O, to:O, the:O, Ke3chang:B-HackOrg, group:O, –:O, a:O, backdoor:B-Tool, we:O, named:O, Okrum:B-Tool, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Furthermore , from 2015 to 2019 , we detected new versions of known malware families attributed to the Ke3chang group – BS2005 backdoors from operation Ke3chang and the RoyalDNS malware , reported by NCC Group in 2018 .' [/INST] [Furthermore:O, ,:O, from:O, 2015:O, to:O, 2019:O, ,:O, we:O, detected:O, new:O, versions:O, of:O, known:O, malware:O, families:O, attributed:O, to:O, the:O, Ke3chang:B-HackOrg, group:O, –:O, BS2005:B-Tool, backdoors:I-Tool, from:O, operation:O, Ke3chang:O, and:O, the:O, RoyalDNS:B-Tool, malware:I-Tool, ,:O, reported:O, by:O, NCC:B-SecTeam, Group:O, in:O, 2018:B-Time, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Ke3chang behind the attacks seemed to have a particular interest in Slovakia , where a big portion of the discovered malware samples was detected; Croatia , the Czech Republic and other countries were also affected .' [/INST] [Ke3chang:B-HackOrg, behind:O, the:O, attacks:O, seemed:O, to:O, have:O, a:O, particular:O, interest:O, in:O, Slovakia:B-Area, ,:O, where:O, a:O, big:O, portion:O, of:O, the:O, discovered:O, malware:O, samples:O, was:O, detected;:O, Croatia:B-Area, ,:O, the:O, Czech:B-Area, Republic:I-Area, and:O, other:O, countries:O, were:O, also:O, affected:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Our technical analysis of the malware used in these attacks showed close ties to BS2005 backdoors from operation Ke3chang , and to a related TidePool malware family discovered by Palo Alto Networks in 2016 that targeted Indian embassies across the globe .' [/INST] [Our:O, technical:O, analysis:O, of:O, the:O, malware:B-SamFile, used:O, in:O, these:O, attacks:O, showed:O, close:O, ties:O, to:O, BS2005:B-SamFile, backdoors:I-SamFile, from:O, operation:O, Ke3chang:O, ,:O, and:O, to:O, a:O, related:O, TidePool:B-SamFile, malware:I-SamFile, family:O, discovered:O, by:O, Palo:B-SecTeam, Alto:I-SecTeam, Networks:O, in:O, 2016:B-Time, that:O, targeted:O, Indian:O, embassies:O, across:O, the:O, globe:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The story continued in late 2016 , when we discovered a new , previously unknown backdoor that we named Okrum .' [/INST] [The:O, story:O, continued:O, in:O, late:O, 2016:B-Time, ,:O, when:O, we:O, discovered:O, a:O, new:O, ,:O, previously:O, unknown:O, backdoor:B-Tool, that:O, we:O, named:O, Okrum:B-Tool, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The malicious actors behind the Okrum malware were focused on the same targets in Slovakia that were previously targeted by Ketrican 2015 backdoors .' [/INST] [The:O, malicious:O, actors:O, behind:O, the:O, Okrum:B-SamFile, malware:I-SamFile, were:O, focused:O, on:O, the:O, same:O, targets:O, in:O, Slovakia:B-Area, that:O, were:O, previously:O, targeted:O, by:O, Ketrican:O, 2015:O, backdoors:B-SamFile, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'We started connecting the dots when we discovered that the Okrum backdoor was used to drop a Ketrican backdoor , freshly compiled in 2017 .' [/INST] [We:O, started:O, connecting:O, the:O, dots:O, when:O, we:O, discovered:O, that:O, the:O, Okrum:B-SamFile, backdoor:I-SamFile, was:O, used:O, to:O, drop:O, a:O, Ketrican:B-SamFile, backdoor:I-SamFile, ,:O, freshly:O, compiled:O, in:O, 2017:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In 2017 , the same entities that were affected by the Okrum malware and by the 2015 Ketrican backdoors again became targets of the malicious actors .' [/INST] [In:O, 2017:O, ,:O, the:O, same:O, entities:O, that:O, were:O, affected:O, by:O, the:O, Okrum:B-SamFile, malware:I-SamFile, and:O, by:O, the:O, 2015:O, Ketrican:B-SamFile, backdoors:I-SamFile, again:O, became:O, targets:O, of:O, the:O, malicious:O, actors:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'This time , the attackers used new versions of the RoyalDNS malware and a Ketrican 2017 backdoor .' [/INST] [This:O, time:O, ,:O, the:O, attackers:O, used:O, new:O, versions:O, of:O, the:O, RoyalDNS:B-SamFile, malware:I-SamFile, and:O, a:O, Ketrican:B-SamFile, 2017:O, backdoor:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'According to ESET telemetry , Okrum was first detected in December 2016 , and targeted diplomatic missions in Slovakia , Belgium , Chile , Guatemala and Brazil throughout 2017 .' [/INST] [According:O, to:O, ESET:B-SecTeam, telemetry:O, ,:O, Okrum:B-SamFile, was:O, first:O, detected:O, in:O, December:B-Time, 2016:I-Time, ,:O, and:O, targeted:O, diplomatic:O, missions:O, in:O, Slovakia:B-Area, ,:O, Belgium:B-Area, ,:O, Chile:B-Area, ,:O, Guatemala:B-Area, and:O, Brazil:B-Area, throughout:O, 2017:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In addition to file-based protection , customers of the DeepSight has received reports on Buckeye , which detail methods of detecting and thwarting activities of this group .' [/INST] [In:O, addition:O, to:O, file-based:O, protection:O, ,:O, customers:O, of:O, the:O, DeepSight:B-SecTeam, has:O, received:O, reports:O, on:O, Buckeye:B-HackOrg, ,:O, which:O, detail:O, methods:O, of:O, detecting:O, and:O, thwarting:O, activities:O, of:O, this:O, group:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In 2018 , we discovered a new version of the Ketrican backdoor that featured some code improvements .' [/INST] [In:O, 2018:B-Time, ,:O, we:B-SecTeam, discovered:O, a:O, new:O, version:O, of:O, the:O, Ketrican:O, backdoor:O, that:O, featured:O, some:O, code:O, improvements:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'According to our telemetry , Okrum was used to target diplomatic missions in Slovakia , Belgium , Chile , Guatemala , and Brazil , with the attackers showing a particular interest in Slovakia .' [/INST] [According:O, to:O, our:O, telemetry:O, ,:O, Okrum:B-SamFile, was:O, used:O, to:O, target:O, diplomatic:O, missions:O, in:O, Slovakia:B-Area, ,:O, Belgium:B-Area, ,:O, Chile:B-Area, ,:O, Guatemala:B-Area, ,:O, and:O, Brazil:B-Area, ,:O, with:O, the:O, attackers:O, showing:O, a:O, particular:O, interest:O, in:O, Slovakia:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Indeed , we have detected various external tools being abused by Okrum , such as a keylogger , tools for dumping passwords , or enumerating network sessions .' [/INST] [Indeed:O, ,:O, we:O, have:O, detected:O, various:O, external:O, tools:O, being:O, abused:O, by:O, Okrum:B-HackOrg, ,:O, such:O, as:O, a:O, keylogger:B-Tool, ,:O, tools:B-Tool, for:O, dumping:O, passwords:O, ,:O, or:O, enumerating:B-Tool, network:I-Tool, sessions:I-Tool, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The detection evasion techniques we observed in the Okrum malware include embedding the malicious payload within a legitimate PNG image , employing several anti-emulation and anti-sandbox tricks , as well as making frequent changes in implementation .' [/INST] [The:O, detection:O, evasion:O, techniques:O, we:O, observed:O, in:O, the:O, Okrum:B-SamFile, malware:O, include:O, embedding:B-Features, the:O, malicious:O, payload:O, within:O, a:O, legitimate:O, PNG:O, image:O, ,:O, employing:O, several:O, anti-emulation:O, and:O, anti-sandbox:O, tricks:O, ,:O, as:O, well:O, as:O, making:O, frequent:O, changes:O, in:O, implementation:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The unnamed company makes products used in the military and aerospace industries , and the hackers could have been after commercial secrets or more traditional espionage , according to ClearSky , the cybersecurity firm that exposed the operation .' [/INST] [The:O, unnamed:O, company:O, makes:O, products:O, used:O, in:O, the:O, military:O, and:O, aerospace:O, industries:O, ,:O, and:O, the:O, hackers:O, could:O, have:O, been:O, after:O, commercial:O, secrets:O, or:O, more:O, traditional:O, espionage:O, ,:O, according:O, to:O, ClearSky:B-SecTeam, ,:O, the:O, cybersecurity:O, firm:O, that:O, exposed:O, the:O, operation:B-OffAct, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'North Korean dictator Kim Jong Un has set ambitious economic goals , and some cybersecurity analysts have predicted he will unleash the Pyongyang-affiliated hackers to meet those deadlines by targeting multinational companies’ trade secrets .' [/INST] [North:O, Korean:O, dictator:O, Kim:O, Jong:O, Un:O, has:O, set:O, ambitious:O, economic:O, goals:O, ,:O, and:O, some:O, cybersecurity:O, analysts:O, have:O, predicted:O, he:O, will:O, unleash:O, the:O, Pyongyang-affiliated:B-HackOrg, hackers:I-HackOrg, to:O, meet:O, those:O, deadlines:O, by:O, targeting:O, multinational:B-Org, companies’:I-Org, trade:O, secrets:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'According to ClearSky , the suspected Lazarus operatives looked to leverage a vulnerability in outdated WinRAR file-archiving software that hackers have been exploiting since it was disclosed last month .' [/INST] [According:O, to:O, ClearSky:B-SecTeam, ,:O, the:O, suspected:O, Lazarus:O, operatives:O, looked:O, to:O, leverage:O, a:O, vulnerability:O, in:O, outdated:O, WinRAR:B-SamFile, file-archiving:O, software:O, that:O, hackers:O, have:O, been:O, exploiting:O, since:O, it:O, was:O, disclosed:O, last:O, month:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'This new Lotus Blossom campaign delivers a malicious RTF document posing as an ASEAN Defence Minister's Meeting (ADMM) directory (decoy) that also carries an executable (payload) embedded as an OLE object , the Elise backdoor .' [/INST] [This:O, new:O, Lotus:B-HackOrg, Blossom:I-HackOrg, campaign:O, delivers:O, a:O, malicious:B-Way, RTF:I-Way, document:O, posing:O, as:O, an:O, ASEAN:B-Area, Defence:O, Minister's:O, Meeting:O, (ADMM):O, directory:O, (decoy):O, that:O, also:O, carries:O, an:O, executable:O, (payload):O, embedded:O, as:O, an:O, OLE:O, object:O, ,:O, the:O, Elise:O, backdoor:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Just months after the APT32 watering hole activity against ASEAN-related websites was observed in Fall 2017 , this new activity clearly indicates the association (ASEAN) clearly remains a priority collection target in the region .' [/INST] [Just:O, months:O, after:O, the:O, APT32:B-HackOrg, watering:B-OffAct, hole:I-OffAct, activity:I-OffAct, against:O, ASEAN-related:O, websites:O, was:O, observed:O, in:O, Fall:O, 2017:O, ,:O, this:O, new:O, activity:O, clearly:O, indicates:O, the:O, association:O, (ASEAN):O, clearly:O, remains:O, a:O, priority:O, collection:O, target:O, in:O, the:O, region:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Researchers implicated Lazarus Group because of digital clues including a malicious implant known as Rising Sun that has been attributed to the group .' [/INST] [Researchers:B-SecTeam, implicated:O, Lazarus:B-HackOrg, Group:O, because:O, of:O, digital:O, clues:O, including:O, a:O, malicious:B-Tool, implant:I-Tool, known:O, as:O, Rising:B-HackOrg, Sun:I-HackOrg, that:O, has:O, been:O, attributed:O, to:O, the:O, group:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The attackers originally embedded an implant into the malicious document as a hypertext application (HTA) file , and then quickly moved to hide it in an image on a remote server and used obfuscated Visual Basic macros to launch the decoder script .' [/INST] [The:O, attackers:B-HackOrg, originally:O, embedded:B-Way, an:O, implant:O, into:O, the:O, malicious:O, document:O, as:O, a:O, hypertext:O, application:O, (HTA):O, file:O, ,:O, and:O, then:O, quickly:O, moved:O, to:O, hide:O, it:O, in:O, an:O, image:O, on:O, a:O, remote:O, server:O, and:O, used:O, obfuscated:O, Visual:O, Basic:O, macros:O, to:O, launch:O, the:O, decoder:O, script:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Lazarus used the open-source tool Invoke-PSImage , released December 20 , to embed the PowerShell script into the image file .' [/INST] [Lazarus:B-HackOrg, used:O, the:O, open-source:O, tool:O, Invoke-PSImage:B-Tool, ,:O, released:O, December:O, 20:O, ,:O, to:O, embed:O, the:O, PowerShell:O, script:O, into:O, the:O, image:O, file:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Once the script runs , it passes the decoded script from the image file to the Windows command line in a variable $x , which uses cmd.exe to execute the obfuscated script and run it via PowerShell .' [/INST] [Once:O, the:O, script:O, runs:O, ,:O, it:B-HackOrg, passes:O, the:O, decoded:O, script:O, from:O, the:O, image:O, file:O, to:O, the:O, Windows:O, command:O, line:O, in:O, a:O, variable:O, $x:O, ,:O, which:O, uses:O, cmd.exe:O, to:O, execute:O, the:O, obfuscated:O, script:O, and:O, run:O, it:O, via:O, PowerShell:B-Tool, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The Department of Homeland Security (DHS) issued an alert about this activity on Jan. 24 2019 , warning that an attacker could redirect user traffic and obtain valid encryption certificates for an organization's domain names .' [/INST] [The:O, Department:O, of:O, Homeland:O, Security:O, (DHS):B-SecTeam, issued:O, an:O, alert:O, about:O, this:O, activity:O, on:O, Jan.:B-Time, 24:I-Time, 2019:I-Time, ,:O, warning:O, that:O, an:O, attacker:O, could:O, redirect:O, user:O, traffic:O, and:O, obtain:O, valid:O, encryption:O, certificates:O, for:O, an:O, organization's:O, domain:O, names:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In the Sea Turtle campaign , Talos was able to identify two distinct groups of victims .' [/INST] [In:O, the:O, Sea:B-OffAct, Turtle:I-OffAct, campaign:O, ,:O, Talos:B-SecTeam, was:O, able:O, to:O, identify:O, two:O, distinct:O, groups:O, of:O, victims:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The first group , we identify as primary victims , includes national security organizations , ministries of foreign affairs , and prominent energy organizations .' [/INST] [The:O, first:O, group:B-HackOrg, ,:O, we:O, identify:O, as:O, primary:O, victims:O, ,:O, includes:O, national:B-Idus, security:I-Idus, organizations:I-Idus, ,:O, ministries:B-Idus, of:O, foreign:O, affairs:O, ,:O, and:O, prominent:B-Idus, energy:I-Idus, organizations:I-Idus, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The threat actors behind the Sea Turtle campaign show clear signs of being highly capable and brazen in their endeavors .' [/INST] [The:O, threat:B-HackOrg, actors:I-HackOrg, behind:O, the:O, Sea:B-OffAct, Turtle:I-OffAct, campaign:O, show:O, clear:O, signs:O, of:O, being:O, highly:O, capable:O, and:O, brazen:O, in:O, their:O, endeavors:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In most cases , threat actors typically stop or slow down their activities once their campaigns are publicly revealed .' [/INST] [In:O, most:O, cases:O, ,:O, threat:B-HackOrg, actors:I-HackOrg, typically:O, stop:O, or:O, slow:B-Way, down:I-Way, their:I-Way, activities:I-Way, once:O, their:O, campaigns:O, are:O, publicly:O, revealed:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The threat actors behind the Sea Turtle campaign were successful in compromising entities by manipulating and falsifying DNS records at various levels in the domain name space .' [/INST] [The:O, threat:B-HackOrg, actors:I-HackOrg, behind:O, the:O, Sea:B-OffAct, Turtle:I-OffAct, campaign:O, were:O, successful:O, in:O, compromising:B-Purp, entities:I-Purp, by:O, manipulating:O, and:O, falsifying:B-Features, DNS:I-Features, records:O, at:O, various:O, levels:O, in:O, the:O, domain:O, name:O, space:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'If an attacker was able to compromise an organization's network administrator credentials , the attacker would be able to change that particular organization's DNS records at will .' [/INST] [If:O, an:O, attacker:B-HackOrg, was:O, able:O, to:O, compromise:B-Purp, an:O, organization's:O, network:O, administrator:O, credentials:O, ,:O, the:O, attacker:O, would:O, be:O, able:O, to:O, change:B-Purp, that:O, particular:O, organization's:O, DNS:O, records:O, at:O, will:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'If the attackers were able to obtain one of these EPP keys , they would be able to modify any DNS records that were managed by that particular registrar .' [/INST] [If:O, the:O, attackers:B-HackOrg, were:O, able:O, to:O, obtain:B-Purp, one:I-Purp, of:I-Purp, these:I-Purp, EPP:I-Purp, keys:I-Purp, ,:O, they:O, would:O, be:O, able:O, to:O, modify:B-Purp, any:O, DNS:O, records:O, that:O, were:O, managed:O, by:O, that:O, particular:O, registrar:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Captured legitimate user credentials when users interacted with these actor - controlled servers .' [/INST] [Captured:B-Purp, legitimate:I-Purp, user:O, credentials:O, when:O, users:O, interacted:O, with:O, these:O, actor:B-HackOrg, -:O, controlled:B-Way, servers:B-Way, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The diagram below illustrates how we believe the actors behind the Sea Turtle campaign used DNS hijacking to achieve their end goals .' [/INST] [The:O, diagram:O, below:O, illustrates:O, how:O, we:O, believe:O, the:O, actors:O, behind:O, the:O, Sea:B-SamFile, Turtle:I-SamFile, campaign:O, used:O, DNS:B-Features, hijacking:I-Features, to:O, achieve:O, their:O, end:O, goals:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'As of early 2019 , the only evidence of the spear-phishing threat vector came from a compromised organization's public disclosure .' [/INST] [As:O, of:O, early:B-Time, 2019:I-Time, ,:O, the:O, only:O, evidence:O, of:O, the:O, spear-phishing:B-Way, threat:B-HackOrg, vector:I-HackOrg, came:O, from:O, a:O, compromised:O, organization's:O, public:O, disclosure:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'On January 4 , Packet Clearing House , which is not an Internet exchange point but rather is an NGO which provides support to Internet exchange points and the core of the domain name system , provided confirmation of this aspect of the actors’ tactics when it publicly revealed its internal DNS had been briefly hijacked as a consequence of the compromise at its domain registrar .' [/INST] [On:O, January:O, 4:O, ,:O, Packet:O, Clearing:O, House:O, ,:O, which:O, is:O, not:O, an:O, Internet:O, exchange:O, point:O, but:O, rather:O, is:O, an:O, NGO:O, which:O, provides:O, support:O, to:O, Internet:O, exchange:O, points:O, and:O, the:O, core:O, of:O, the:O, domain:O, name:O, system:O, ,:O, provided:O, confirmation:O, of:O, this:O, aspect:O, of:O, the:O, actors’:B-HackOrg, tactics:O, when:O, it:O, publicly:O, revealed:O, its:O, internal:O, DNS:O, had:O, been:O, briefly:O, hijacked:B-Way, as:O, a:O, consequence:O, of:O, the:O, compromise:O, at:O, its:O, domain:O, registrar:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'During a typical incident , the actor would modify the NS records for the targeted organization , pointing users to a malicious DNS server that provided actor-controlled responses to all DNS queries .' [/INST] [During:O, a:O, typical:O, incident:O, ,:O, the:O, actor:B-HackOrg, would:O, modify:O, the:O, NS:O, records:O, for:O, the:O, targeted:O, organization:O, ,:O, pointing:O, users:O, to:O, a:O, malicious:O, DNS:B-Purp, server:I-Purp, that:O, provided:O, actor-controlled:O, responses:O, to:O, all:O, DNS:O, queries:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The next step for the actor was to build MitM servers that impersonated legitimate services to capture user credentials .' [/INST] [The:O, next:O, step:O, for:O, the:O, actor:B-HackOrg, was:O, to:O, build:O, MitM:B-Tool, servers:I-Tool, that:O, impersonated:O, legitimate:O, services:O, to:O, capture:O, user:B-Purp, credentials:I-Purp, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In addition to the MitM server IP addresses published in previous reports , Talos identified 16 additional servers leveraged by the actor during the observed attacks .' [/INST] [In:O, addition:O, to:O, the:O, MitM:B-Tool, server:I-Tool, IP:O, addresses:O, published:O, in:O, previous:O, reports:O, ,:O, Talos:B-SecTeam, identified:O, 16:O, additional:B-Tool, servers:I-Tool, leveraged:O, by:O, the:O, actor:B-HackOrg, during:O, the:O, observed:O, attacks:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The attackers would then use the certificate on actor-controlled servers to perform additional MitM operations to harvest additional credentials .' [/INST] [The:O, attackers:B-HackOrg, would:O, then:O, use:O, the:O, certificate:O, on:O, actor-controlled:O, servers:O, to:O, perform:O, additional:O, MitM:B-Tool, operations:O, to:O, harvest:O, additional:O, credentials:O, .:O] </s> |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.