text stringlengths 306 1.51k |
|---|
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'This mode of operation is typical of many hacker groups—and especially of Winnti .' [/INST] [This:O, mode:O, of:O, operation:O, is:O, typical:O, of:O, many:O, hacker:B-HackOrg, groups—and:O, especially:O, of:O, Winnti:B-HackOrg, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'They are a very , very persistent group , ” says Costin Raiu , who has been watching Winnti since 2011 .' [/INST] [They:O, are:O, a:O, very:O, ,:O, very:O, persistent:O, group:O, ,:O, ”:O, says:O, Costin:B-SecTeam, Raiu:I-SecTeam, ,:O, who:O, has:O, been:O, watching:O, Winnti:B-HackOrg, since:O, 2011:B-Time, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Raiu and his team have followed the digital tracks left behind by some of the Winnti hackers .' [/INST] [Raiu:B-SecTeam, and:O, his:O, team:O, have:O, followed:O, the:O, digital:O, tracks:O, left:O, behind:O, by:O, some:O, of:O, the:O, Winnti:B-HackOrg, hackers:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'One government official puts it very matter-of-factly: Winnti is very specific to Germany .' [/INST] [One:O, government:O, official:O, puts:O, it:O, very:O, matter-of-factly::O, Winnti:B-HackOrg, is:O, very:O, specific:O, to:O, Germany:B-Area, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'By 2014 , the Winnti malware code was no longer limited to game manufacturers .' [/INST] [By:O, 2014:B-Time, ,:O, the:O, Winnti:B-HackOrg, malware:O, code:O, was:O, no:O, longer:O, limited:O, to:O, game:B-Idus, manufacturers:I-Idus, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Winnti is targeting high-tech companies as well as chemical and pharmaceutical companies .' [/INST] [Winnti:B-HackOrg, is:O, targeting:O, high-tech:B-Org, companies:I-Org, as:O, well:O, as:O, chemical:O, and:O, pharmaceutical:B-Org, companies:I-Org, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Winnti is attacking companies in Japan , France , the U.S. and Germany .' [/INST] [Winnti:B-HackOrg, is:O, attacking:O, companies:O, in:O, Japan:B-Area, ,:O, France:B-Area, ,:O, the:B-Area, U.S.:I-Area, and:O, Germany:B-Area, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The Winnti hackers broke into Henkel’s network in 2014 .' [/INST] [The:O, Winnti:B-HackOrg, hackers:O, broke:O, into:O, Henkel’s:B-Org, network:O, in:O, 2014:B-Time, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Henkel confirms the Winnti incident and issues the following statement: The cyberattack was discovered in the summer of 2014 and Henkel promptly took all necessary precautions .' [/INST] [Henkel:B-SecTeam, confirms:O, the:O, Winnti:B-HackOrg, incident:O, and:O, issues:O, the:O, following:O, statement::O, The:O, cyberattack:O, was:O, discovered:O, in:O, the:O, summer:O, of:O, 2014:O, and:O, Henkel:O, promptly:O, took:O, all:O, necessary:O, precautions:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Far from attacking Henkel and the other companies arbitrarily , Winnti takes a highly strategic approach .' [/INST] [Far:O, from:O, attacking:O, Henkel:B-Org, and:O, the:O, other:O, companies:O, arbitrarily:O, ,:O, Winnti:B-HackOrg, takes:O, a:O, highly:O, strategic:O, approach:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The hackers behind Winnti have also set their sights on Japan’s biggest chemical company , Shin-Etsu Chemical .' [/INST] [The:O, hackers:B-HackOrg, behind:O, Winnti:O, have:O, also:O, set:O, their:O, sights:O, on:O, Japan’s:B-Area, biggest:O, chemical:B-Idus, company:I-Idus, ,:O, Shin-Etsu:B-Org, Chemical:I-Org, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In the case of another Japanese company , Sumitomo Electric , Winnti apparently penetrated their networks during the summer of 2016 .' [/INST] [In:O, the:O, case:O, of:O, another:O, Japanese:O, company:O, ,:O, Sumitomo:B-Org, Electric:I-Org, ,:O, Winnti:B-HackOrg, apparently:O, penetrated:O, their:O, networks:O, during:O, the:O, summer:B-Time, of:I-Time, 2016:I-Time, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Winnti hackers also penetrated the BASF and Siemens networks .' [/INST] [Winnti:B-HackOrg, hackers:O, also:O, penetrated:O, the:O, BASF:B-Org, and:O, Siemens:B-Org, networks:B-Org, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Thanks to this tool , we found out back in March 2019 that the Bayer pharmaceutical group had been hacked by Winnti .' [/INST] [Thanks:O, to:O, this:O, tool:O, ,:O, we:O, found:O, out:O, back:O, in:O, March:B-Time, 2019:I-Time, that:O, the:O, Bayer:B-Org, pharmaceutical:I-Org, group:O, had:O, been:O, hacked:O, by:O, Winnti:B-HackOrg, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'At Gameforge , the Winnti hackers had already been removed from the networks when a staff member noticed a Windows start screen with Chinese characters .' [/INST] [At:O, Gameforge:B-Idus, ,:O, the:O, Winnti:B-HackOrg, hackers:O, had:O, already:O, been:O, removed:O, from:O, the:O, networks:O, when:O, a:O, staff:O, member:O, noticed:O, a:O, Windows:O, start:O, screen:O, with:O, Chinese:O, characters:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'To witnesses , the spy appears to be running a program showing videos (e.g VLC) , presenting slides (Prezi) , playing a computer game (Breakout2 , 2048) or even running a fake virus scanner .' [/INST] [To:O, witnesses:O, ,:O, the:O, spy:B-HackOrg, appears:O, to:O, be:O, running:O, a:O, program:O, showing:O, videos:O, (e.g:O, VLC):O, ,:O, presenting:B-Tool, slides:I-Tool, (Prezi):O, ,:O, playing:O, a:O, computer:O, game:O, (Breakout2:O, ,:O, 2048):O, or:O, even:O, running:O, a:O, fake:B-Tool, virus:I-Tool, scanner:I-Tool, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'From the time of file creation , the attacker started working at least as early as July 2018 .' [/INST] [From:O, the:O, time:O, of:O, file:O, creation:O, ,:O, the:O, attacker:B-HackOrg, started:O, working:O, at:O, least:O, as:O, early:O, as:O, July:B-Time, 2018:I-Time, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The link to feeds.rapidfeeds.com left in its XML configuration file was also mentioned by Kaspersky’s report in the reference section , which confirms that the APT-C-09 group keeps updating its C2 configuration channel and the recent one reserves some past features .' [/INST] [The:O, link:O, to:O, feeds.rapidfeeds.com:O, left:O, in:O, its:O, XML:O, configuration:O, file:O, was:O, also:O, mentioned:O, by:O, Kaspersky’s:B-SecTeam, report:O, in:O, the:O, reference:O, section:O, ,:O, which:O, confirms:O, that:O, the:O, APT-C-09:B-HackOrg, group:O, keeps:O, updating:O, its:O, C2:O, configuration:O, channel:O, and:O, the:O, recent:O, one:O, reserves:O, some:O, past:O, features:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'For example , Donot and Bitter disguised as Kashmiri Voice to attack Pakistan , Transparent Tribe attacked India with decoy document regarding terrorist attacks in Kashmir .' [/INST] [For:O, example:O, ,:O, Donot:B-HackOrg, and:O, Bitter:B-HackOrg, disguised:O, as:O, Kashmiri:O, Voice:O, to:O, attack:O, Pakistan:B-Area, ,:O, Transparent:O, Tribe:O, attacked:O, India:O, with:O, decoy:O, document:O, regarding:O, terrorist:O, attacks:O, in:O, Kashmir:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Considering APT-C-09 , Bitter and Donot have carried out targeted attacks against China , we must take actions in advance and keep a close eye on their recent activities .' [/INST] [Considering:O, APT-C-09:B-HackOrg, ,:O, Bitter:B-HackOrg, and:O, Donot:B-HackOrg, have:O, carried:O, out:O, targeted:O, attacks:O, against:O, China:B-Area, ,:O, we:O, must:O, take:O, actions:O, in:O, advance:O, and:O, keep:O, a:O, close:O, eye:O, on:O, their:O, recent:O, activities:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'APT41 espionage operations against the healthcare , high-tech , and telecommunications sectors include establishing and maintaining strategic access , and through mid-2015 , the theft of intellectual property .' [/INST] [APT41:B-HackOrg, espionage:O, operations:O, against:O, the:O, healthcare:B-Idus, ,:O, high-tech:B-Idus, ,:O, and:O, telecommunications:B-Idus, sectors:I-Idus, include:O, establishing:O, and:O, maintaining:O, strategic:O, access:O, ,:O, and:O, through:O, mid-2015:B-Time, ,:O, the:O, theft:B-OffAct, of:O, intellectual:O, property:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'FireEye Threat Intelligence assesses with high confidence that APT41 carries out an array of financially motivated intrusions , particularly against the video game industry , including stealing source code and digital certificates , virtual currency manipulation , and attempting to deploy ransomware .' [/INST] [FireEye:B-SecTeam, Threat:O, Intelligence:O, assesses:O, with:O, high:O, confidence:O, that:O, APT41:B-HackOrg, carries:O, out:O, an:O, array:O, of:O, financially:B-OffAct, motivated:I-OffAct, intrusions:I-OffAct, ,:O, particularly:O, against:O, the:O, video:B-Idus, game:I-Idus, industry:I-Idus, ,:O, including:O, stealing:B-OffAct, source:I-OffAct, code:I-OffAct, and:O, digital:B-OffAct, certificates:I-OffAct, ,:O, virtual:B-OffAct, currency:I-OffAct, manipulation:I-OffAct, ,:O, and:O, attempting:O, to:O, deploy:B-OffAct, ransomware:I-OffAct, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'APT41 has executed multiple software supply chain compromises , gaining access to software companies to inject malicious code into legitimate files before distributing updates .' [/INST] [APT41:B-HackOrg, has:O, executed:B-OffAct, multiple:I-OffAct, software:I-OffAct, supply:O, chain:O, compromises:O, ,:O, gaining:O, access:O, to:O, software:O, companies:O, to:O, inject:B-Purp, malicious:I-Purp, code:I-Purp, into:O, legitimate:O, files:O, before:O, distributing:O, updates:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'APT41 is unique among tracked China-based actors in that it leverages non-public malware typically reserved for espionage operations in what appears to be activity that falls outside the scope of state-sponsored missions .' [/INST] [APT41:B-HackOrg, is:O, unique:O, among:O, tracked:O, China-based:B-Area, actors:O, in:O, that:O, it:O, leverages:B-Way, non-public:I-Way, malware:I-Way, typically:O, reserved:O, for:O, espionage:O, operations:O, in:O, what:O, appears:O, to:O, be:O, activity:O, that:O, falls:O, outside:O, the:O, scope:O, of:O, state-sponsored:O, missions:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Based on early observed activity , consistent behavior , and APT41's unusual focus on the video game industry , we believe the group's cyber crime activities are most likely motivated by personal financial gain or hobbyist interests .' [/INST] [Based:O, on:O, early:O, observed:O, activity:O, ,:O, consistent:O, behavior:O, ,:O, and:O, APT41's:B-HackOrg, unusual:O, focus:O, on:O, the:O, video:B-Idus, game:I-Idus, industry:I-Idus, ,:O, we:O, believe:O, the:O, group's:O, cyber:O, crime:O, activities:O, are:O, most:O, likely:O, motivated:O, by:O, personal:O, financial:O, gain:O, or:O, hobbyist:O, interests:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'APT41 campaigns include most of the incidents previously attributed in FireEye Threat Intelligence reporting to GREF Team and a number of additional clusters that were previously unnamed .' [/INST] [APT41:B-HackOrg, campaigns:O, include:O, most:O, of:O, the:O, incidents:O, previously:O, attributed:O, in:O, FireEye:B-SecTeam, Threat:O, Intelligence:O, reporting:O, to:O, GREF:O, Team:O, and:O, a:O, number:O, of:O, additional:O, clusters:O, that:O, were:O, previously:O, unnamed:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Activity traces back to 2012 when individual members of APT41 conducted primarily financially motivated operations focused on the video game industry before expanding into likely statesponsored activity .' [/INST] [Activity:O, traces:O, back:O, to:O, 2012:B-Time, when:O, individual:O, members:O, of:O, APT41:B-HackOrg, conducted:O, primarily:O, financially:O, motivated:O, operations:O, focused:O, on:O, the:O, video:O, game:O, industry:O, before:O, expanding:O, into:O, likely:O, statesponsored:O, activity:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Learning to access video game production environments enabled APT41 to develop the tactics , techniques , and procedures (TTPs) that were later leveraged against software companies to inject malicious code into software updates .' [/INST] [Learning:O, to:O, access:O, video:O, game:O, production:O, environments:O, enabled:O, APT41:B-HackOrg, to:O, develop:O, the:O, tactics:O, ,:O, techniques:O, ,:O, and:O, procedures:O, (TTPs):O, that:O, were:O, later:O, leveraged:O, against:O, software:O, companies:O, to:O, inject:B-Purp, malicious:I-Purp, code:I-Purp, into:O, software:O, updates:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'APT41 has targeted organizations in 14 countries (and Hong Kong) over seven years , including: France , India , Italy , Japan , Myanmar , the Netherlands , Singapore , South Korea , South Africa , Switzerland , Thailand , Turkey , the United Kingdom , and the United States (Figure 1) .' [/INST] [APT41:B-HackOrg, has:O, targeted:O, organizations:O, in:O, 14:O, countries:O, (and:O, Hong:O, Kong):O, over:O, seven:O, years:O, ,:O, including::O, France:B-Area, ,:O, India:B-Area, ,:O, Italy:B-Area, ,:O, Japan:B-Area, ,:O, Myanmar:B-Area, ,:O, the:B-Area, Netherlands:I-Area, ,:O, Singapore:B-Area, ,:O, South:B-Area, Korea:I-Area, ,:O, South:B-Area, Africa:I-Area, ,:O, Switzerland:B-Area, ,:O, Thailand:B-Area, ,:O, Turkey:B-Area, ,:O, the:B-Area, United:I-Area, Kingdom:I-Area, ,:O, and:O, the:B-Area, United:I-Area, States:I-Area, (Figure:O, 1):O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'APT41 espionage operations against entities in these countries follow targeting of verticals consistent with Chinese national policy priorities .' [/INST] [APT41:B-HackOrg, espionage:O, operations:O, against:O, entities:B-Idus, in:O, these:O, countries:O, follow:O, targeting:O, of:O, verticals:O, consistent:O, with:O, Chinese:O, national:O, policy:O, priorities:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'We believe that like other Chinese espionage operators , APT41 has moved toward strategic intelligence collection and establishing access , but away from direct intellectual property theft .' [/INST] [We:O, believe:O, that:O, like:O, other:O, Chinese:O, espionage:O, operators:O, ,:O, APT41:B-HackOrg, has:O, moved:O, toward:O, strategic:B-Purp, intelligence:I-Purp, collection:I-Purp, and:O, establishing:B-Purp, access:I-Purp, ,:O, but:O, away:O, from:O, direct:O, intellectual:O, property:O, theft:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In 2014 , APT41 was observed carrying out espionage campaigns concurrently with financially motivated intrusions , demonstrating that they could balance different objectives simultaneously .' [/INST] [In:O, 2014:B-Time, ,:O, APT41:B-HackOrg, was:O, observed:O, carrying:O, out:O, espionage:O, campaigns:O, concurrently:O, with:O, financially:O, motivated:O, intrusions:O, ,:O, demonstrating:O, that:O, they:O, could:O, balance:O, different:O, objectives:O, simultaneously:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Since 2017 , APT41's activities have included a series of supply chain compromises .' [/INST] [Since:O, 2017:B-Time, ,:O, APT41's:B-HackOrg, activities:O, have:O, included:O, a:O, series:O, of:O, supply:B-OffAct, chain:I-OffAct, compromises:I-OffAct, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The group also targeted companies involved in producing motherboards , processors , and server solutions for enterprises .' [/INST] [The:O, group:B-HackOrg, also:O, targeted:O, companies:O, involved:O, in:O, producing:B-Idus, motherboards:I-Idus, ,:O, processors:B-Idus, ,:O, and:O, server:B-Idus, solutions:I-Idus, for:O, enterprises:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Since 2013 , APT41 has targeted organizations involved in the research , development , and sale of computer components used for machine-learning , autonomous vehicles , medical imaging , and the consumer market .' [/INST] [Since:O, 2013:B-Time, ,:O, APT41:B-HackOrg, has:O, targeted:O, organizations:B-Idus, involved:O, in:O, the:O, research:O, ,:O, development:O, ,:O, and:O, sale:O, of:O, computer:O, components:O, used:O, for:O, machine-learning:B-Idus, ,:O, autonomous:B-Idus, vehicles:I-Idus, ,:O, medical:B-Idus, imaging:I-Idus, ,:O, and:O, the:O, consumer:B-Idus, market:I-Idus, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In a 2014 compromise , APT41 targeted a European conglomerate and specifically focused on systems physically located in China .' [/INST] [In:O, a:O, 2014:B-Time, compromise:O, ,:O, APT41:B-HackOrg, targeted:O, a:O, European:B-Idus, conglomerate:I-Idus, and:O, specifically:O, focused:O, on:O, systems:O, physically:O, located:O, in:O, China:B-Area, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In spring 2015 , APT41 targeted information related to two entities undergoing a merger announced the previous year .' [/INST] [In:O, spring:B-Time, 2015:I-Time, ,:O, APT41:B-HackOrg, targeted:O, information:O, related:O, to:O, two:O, entities:O, undergoing:O, a:O, merger:O, announced:O, the:O, previous:O, year:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Since 2017 , APT41 has consistently targeted telecommunications companies , possibly a crucial first step to establish a foothold in targeting a particular region .' [/INST] [Since:O, 2017:B-Time, ,:O, APT41:B-HackOrg, has:O, consistently:O, targeted:O, telecommunications:B-Idus, companies:I-Idus, ,:O, possibly:O, a:O, crucial:O, first:O, step:O, to:O, establish:O, a:O, foothold:O, in:O, targeting:O, a:O, particular:O, region:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Targeted telecom companies spanned several countries , and recently identified intrusions were concentrated in countries where we had not identified any prior APT41 activity .' [/INST] [Targeted:O, telecom:B-Org, companies:I-Org, spanned:O, several:O, countries:O, ,:O, and:O, recently:O, identified:O, intrusions:O, were:O, concentrated:O, in:O, countries:O, where:O, we:O, had:O, not:O, identified:O, any:O, prior:O, APT41:B-HackOrg, activity:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In July and August 2016 , APT41 sent spear-phishing emails to Hong Kong media organizations known for pro-democracy editorial content .' [/INST] [In:O, July:O, and:O, August:B-Time, 2016:I-Time, ,:O, APT41:B-HackOrg, sent:O, spear-phishing:B-Way, emails:O, to:O, Hong:B-Idus, Kong:I-Idus, media:I-Idus, organizations:O, known:O, for:O, pro-democracy:O, editorial:O, content:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'This was the first instance we have observed of APT41 targeting pro-democracy groups in Hong Kong .' [/INST] [This:O, was:O, the:O, first:O, instance:O, we:O, have:O, observed:O, of:O, APT41:B-HackOrg, targeting:O, pro-democracy:B-Idus, groups:O, in:O, Hong:B-Area, Kong:B-Area, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'APT41 frequently leverages timely news stories as the lure content in their spear-phishing emails , although social engineering content does not always correlate with targeted users or organizations .' [/INST] [APT41:B-HackOrg, frequently:O, leverages:O, timely:O, news:O, stories:O, as:O, the:O, lure:O, content:O, in:O, their:O, spear-phishing:B-Way, emails:I-Way, ,:O, although:O, social:O, engineering:O, content:O, does:O, not:O, always:O, correlate:O, with:O, targeted:O, users:O, or:O, organizations:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In 2015 , APT41 targeted a Japanese media organization with a lure document (Figure 3) titled 中東呼吸器症候 群(MERS)の予防 , ” which translates to Prevention of Middle East Respiratory Syndrome (MERS) .' [/INST] [In:O, 2015:B-Time, ,:O, APT41:B-HackOrg, targeted:O, a:O, Japanese:B-Idus, media:I-Idus, organization:I-Idus, with:O, a:O, lure:O, document:O, (Figure:O, 3):O, titled:O, 中東呼吸器症候:O, 群(MERS)の予防:O, ,:O, ”:O, which:O, translates:O, to:O, Prevention:O, of:O, Middle:O, East:O, Respiratory:O, Syndrome:O, (MERS):O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'APT41 activity aimed at medical device companies and pharmaceuticals is demonstrative of the group's capacity to collect sensitive and highly valuable intellectual property (IP) , although we have not observed evidence of IP theft since late 2015 .' [/INST] [APT41:B-HackOrg, activity:O, aimed:O, at:O, medical:B-Idus, device:I-Idus, companies:I-Idus, and:O, pharmaceuticals:O, is:O, demonstrative:O, of:O, the:O, group's:O, capacity:O, to:O, collect:O, sensitive:O, and:O, highly:O, valuable:O, intellectual:O, property:O, (IP):O, ,:O, although:O, we:O, have:O, not:O, observed:O, evidence:O, of:O, IP:O, theft:O, since:O, late:O, 2015:B-Time, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Unlike other observed Chinese espionage operators , APT41 conducts explicit financially motivated activity , which has included the use of tools that are otherwise exclusively used in campaigns supporting state interests .' [/INST] [Unlike:O, other:O, observed:O, Chinese:O, espionage:O, operators:O, ,:O, APT41:B-HackOrg, conducts:O, explicit:O, financially:B-Idus, motivated:O, activity:O, ,:O, which:O, has:O, included:O, the:O, use:O, of:O, tools:O, that:O, are:O, otherwise:O, exclusively:O, used:O, in:O, campaigns:O, supporting:O, state:O, interests:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Although APT41 initially targeted the parent company , 30 percent of the victimized hosts were related to a subsidiary specialized in manufacturing medical devices .' [/INST] [Although:O, APT41:B-HackOrg, initially:O, targeted:O, the:O, parent:B-Idus, company:I-Idus, ,:O, 30:O, percent:O, of:O, the:O, victimized:O, hosts:O, were:O, related:O, to:O, a:O, subsidiary:O, specialized:O, in:O, manufacturing:O, medical:O, devices:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In 2018 , we observed APT41 target a third healthcare company , although their goals during this compromise were unclear .' [/INST] [In:O, 2018:B-Time, ,:O, we:O, observed:O, APT41:B-HackOrg, target:O, a:O, third:B-Idus, healthcare:I-Idus, company:O, ,:O, although:O, their:O, goals:O, during:O, this:O, compromise:O, were:O, unclear:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In June 2018 , APT41 sent spear-phishing emails using an invitation lure to join a decentralized gaming platform linked to a cryptocurrency service (Figure 5) that had positioned itself as a medium of exchange for online games and gambling sites .' [/INST] [In:O, June:B-Time, 2018:I-Time, ,:O, APT41:B-HackOrg, sent:O, spear-phishing:B-Way, emails:O, using:O, an:O, invitation:O, lure:O, to:O, join:O, a:O, decentralized:B-Purp, gaming:I-Purp, platform:I-Purp, linked:O, to:O, a:O, cryptocurrency:O, service:O, (Figure:O, 5):O, that:O, had:O, positioned:O, itself:O, as:O, a:O, medium:O, of:O, exchange:O, for:O, online:O, games:O, and:O, gambling:O, sites:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'This provides another connection between the targeting of the cryptocurrency organizations and video game targeting .' [/INST] [This:O, provides:O, another:O, connection:O, between:O, the:O, targeting:O, of:O, the:O, cryptocurrency:B-Idus, organizations:I-Idus, and:O, video:B-Idus, game:I-Idus, targeting:I-Idus, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In October 2018 , the group compiled an instance of XMRig , a Monero cryptocurrency mining tool , demonstrating a continued interest in cryptocurrency .' [/INST] [In:O, October:B-Time, 2018:I-Time, ,:O, the:O, group:B-HackOrg, compiled:O, an:O, instance:O, of:O, XMRig:B-Tool, ,:O, a:O, Monero:O, cryptocurrency:O, mining:O, tool:O, ,:O, demonstrating:O, a:O, continued:O, interest:O, in:O, cryptocurrency:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'APT41 campaigns focused on the video game sector have largely affected studios and distributors in East and Southeast Asia , although global companies based in the United States have also been targeted .' [/INST] [APT41:B-HackOrg, campaigns:O, focused:O, on:O, the:O, video:B-Idus, game:I-Idus, sector:I-Idus, have:O, largely:O, affected:O, studios:O, and:O, distributors:O, in:O, East:O, and:O, Southeast:O, Asia:O, ,:O, although:O, global:B-Idus, companies:I-Idus, based:O, in:O, the:B-Area, United:I-Area, States:I-Area, have:O, also:O, been:O, targeted:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'APT41 continuously returns to targeting the video game sector and seems to have matured its campaigns through lessons learned in operations against the industry .' [/INST] [APT41:B-HackOrg, continuously:O, returns:O, to:O, targeting:O, the:O, video:B-Idus, game:I-Idus, sector:I-Idus, and:O, seems:O, to:O, have:O, matured:O, its:O, campaigns:O, through:O, lessons:O, learned:O, in:O, operations:O, against:O, the:O, industry:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'We believe these operations include broadly malicious activity that can enable further operations , such as targeting game source code and compromising digital certificates , while other activities are explicitly financially motivated , such as abusing in-game currency mechanics .' [/INST] [We:O, believe:O, these:O, operations:O, include:O, broadly:O, malicious:B-OffAct, activity:I-OffAct, that:O, can:O, enable:O, further:O, operations:O, ,:O, such:O, as:O, targeting:O, game:B-Tool, source:I-Tool, code:I-Tool, and:O, compromising:O, digital:B-Tool, certificates:I-Tool, ,:O, while:O, other:O, activities:O, are:O, explicitly:O, financially:O, motivated:O, ,:O, such:O, as:O, abusing:O, in-game:O, currency:O, mechanics:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In October 2012 , APT41 used captured credentials to compromise a jump server and access a production environment where they deployed a Linux version of PHOTO .' [/INST] [In:O, October:B-Time, 2012:I-Time, ,:O, APT41:B-HackOrg, used:O, captured:O, credentials:O, to:O, compromise:O, a:O, jump:O, server:O, and:O, access:O, a:O, production:O, environment:O, where:O, they:O, deployed:O, a:O, Linux:O, version:O, of:O, PHOTO:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Since at least 2012 , APT41 has repeatedly gained access to game development environments within affected companies , including online multiplayer networks , as well as targeting of production database administrators .' [/INST] [Since:O, at:O, least:O, 2012:B-Time, ,:O, APT41:B-HackOrg, has:O, repeatedly:O, gained:O, access:O, to:O, game:O, development:O, environments:O, within:O, affected:O, companies:O, ,:O, including:O, online:B-Idus, multiplayer:I-Idus, networks:I-Idus, ,:O, as:O, well:O, as:O, targeting:O, of:O, production:O, database:O, administrators:B-Org, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'APT41 has been observed inserting malicious code into legitimate video game files to distribute malware .' [/INST] [APT41:B-HackOrg, has:O, been:O, observed:O, inserting:B-Way, malicious:I-Way, code:I-Way, into:O, legitimate:O, video:O, game:O, files:O, to:O, distribute:O, malware:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In 2018 , the group inserted CRACKSHOT malware into game files that were signed with legitimate codesigning certificates , most likely indicating access to the production environment , which facilitated a supply chain compromise .' [/INST] [In:O, 2018:B-Time, ,:O, the:O, group:B-HackOrg, inserted:B-OffAct, CRACKSHOT:I-OffAct, malware:I-OffAct, into:O, game:O, files:O, that:O, were:O, signed:O, with:O, legitimate:O, codesigning:O, certificates:O, ,:O, most:O, likely:O, indicating:O, access:O, to:O, the:O, production:O, environment:O, ,:O, which:O, facilitated:O, a:O, supply:O, chain:O, compromise:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'We have also observed APT41 limitedly deploy rootkits on Linux systems and Master Boot Record (MBR) bootkits , such as ROCKBOOT , on Windows systems to hide their malware and maintain persistence on victim systems .' [/INST] [We:O, have:O, also:O, observed:O, APT41:B-HackOrg, limitedly:O, deploy:O, rootkits:B-Way, on:O, Linux:O, systems:O, and:O, Master:O, Boot:O, Record:O, (MBR):O, bootkits:O, ,:O, such:O, as:O, ROCKBOOT:B-Tool, ,:O, on:O, Windows:O, systems:O, to:O, hide:O, their:O, malware:O, and:O, maintain:O, persistence:O, on:O, victim:O, systems:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Selective deployment of ROCKBOOT suggests that APT41 reserves more advanced TTPs and malware only for high-value targets .' [/INST] [Selective:O, deployment:O, of:O, ROCKBOOT:B-SecTeam, suggests:O, that:O, APT41:B-HackOrg, reserves:O, more:O, advanced:O, TTPs:O, and:O, malware:O, only:O, for:O, high-value:O, targets:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'APT41 has blatantly engaged in financially motivated activity targeting the video game industry , including manipulating virtual currencies .' [/INST] [APT41:B-HackOrg, has:O, blatantly:O, engaged:O, in:O, financially:O, motivated:O, activity:O, targeting:O, the:O, video:B-Idus, game:I-Idus, industry:I-Idus, ,:O, including:O, manipulating:O, virtual:O, currencies:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In a highly unusual case , APT41 attempted to extort a game company by deploying the Encryptor RaaS ransomware .' [/INST] [In:O, a:O, highly:O, unusual:O, case:O, ,:O, APT41:B-HackOrg, attempted:O, to:O, extort:O, a:O, game:O, company:O, by:O, deploying:B-Way, the:O, Encryptor:O, RaaS:O, ransomware:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'APT41 is well-known for leveraging compromised digital certificates from video game studios to sign malware .' [/INST] [APT41:B-HackOrg, is:O, well-known:O, for:O, leveraging:B-OffAct, compromised:O, digital:O, certificates:O, from:O, video:O, game:O, studios:O, to:O, sign:O, malware:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'We suggest that APT41 sought to target in-game currency but found they could not monetize the specific targeted game , so the group resorted to ransomware to attempt to salvage their efforts and profit from the compromise .' [/INST] [We:O, suggest:O, that:O, APT41:B-HackOrg, sought:O, to:O, target:O, in-game:O, currency:O, but:O, found:O, they:O, could:O, not:O, monetize:O, the:O, specific:O, targeted:O, game:O, ,:O, so:O, the:O, group:O, resorted:B-Way, to:I-Way, ransomware:I-Way, to:O, attempt:O, to:O, salvage:B-Purp, their:I-Purp, efforts:I-Purp, and:O, profit:B-Purp, from:O, the:O, compromise:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'APT41 has also used credentials compromised in previous operations .' [/INST] [APT41:B-HackOrg, has:O, also:O, used:B-Way, credentials:I-Way, compromised:I-Way, in:O, previous:O, operations:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In 2014 , APT41 compromised an online billing/payment service using VPN access between a third-party service provider and the targeted payment service .' [/INST] [In:O, 2014:B-Time, ,:O, APT41:B-HackOrg, compromised:B-OffAct, an:O, online:O, billing/payment:O, service:O, using:O, VPN:O, access:O, between:O, a:O, third-party:O, service:B-Org, provider:I-Org, and:O, the:O, targeted:O, payment:B-Org, service:B-Org, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Although we do not have first-hand evidence of APT41's compromise of TeamViewer , we have observed APT41 use compromised TeamViewer credentials as an entry point at multiple organizations .' [/INST] [Although:O, we:O, do:O, not:O, have:O, first-hand:O, evidence:O, of:O, APT41's:O, compromise:O, of:O, TeamViewer:B-Tool, ,:O, we:O, have:O, observed:O, APT41:B-HackOrg, use:O, compromised:O, TeamViewer:O, credentials:O, as:O, an:O, entry:O, point:O, at:O, multiple:O, organizations:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Public reports of supply chain compromises linked to APT41 date back to at least 2014 , and technical evidence associated with these incidents was used to determine a relationship , if any , with APT41 .' [/INST] [Public:O, reports:O, of:O, supply:O, chain:O, compromises:O, linked:O, to:O, APT41:B-HackOrg, date:O, back:O, to:O, at:O, least:O, 2014:B-Time, ,:O, and:O, technical:O, evidence:O, associated:O, with:O, these:O, incidents:O, was:O, used:O, to:O, determine:O, a:O, relationship:O, ,:O, if:O, any:O, ,:O, with:O, APT41:B-HackOrg, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'As demonstrated in operations targeting the video game industry , APT41 leverages a variety of TTPs to access production environments where they can inject malicious code into legitimate files .' [/INST] [As:O, demonstrated:O, in:O, operations:O, targeting:O, the:O, video:O, game:O, industry:O, ,:O, APT41:B-HackOrg, leverages:O, a:O, variety:B-Tool, of:I-Tool, TTPs:I-Tool, to:O, access:O, production:O, environments:O, where:O, they:O, can:O, inject:B-Way, malicious:O, code:O, into:O, legitimate:O, files:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In March 2017 , suspected Chinese espionage operators targeted CCleaner , a utility that assists in the removal of unwanted files from a computer .' [/INST] [In:O, March:B-Time, 2017:I-Time, ,:O, suspected:O, Chinese:B-HackOrg, espionage:I-HackOrg, operators:I-HackOrg, targeted:O, CCleaner:B-Area, ,:O, a:O, utility:O, that:O, assists:O, in:O, the:O, removal:O, of:O, unwanted:O, files:O, from:O, a:O, computer:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In July 2017 , APT41 injected malicious code into a software update package maintained by Netsarang and signed it with a legitimate Netsarang certificate in an operation referred to as ShadowPad by Kaspersky .' [/INST] [In:O, July:B-Time, 2017:B-Time, ,:O, APT41:B-HackOrg, injected:B-Way, malicious:I-Way, code:I-Way, into:O, a:O, software:O, update:O, package:O, maintained:O, by:O, Netsarang:O, and:O, signed:O, it:O, with:O, a:O, legitimate:O, Netsarang:O, certificate:O, in:O, an:O, operation:O, referred:O, to:O, as:O, ShadowPad:O, by:O, Kaspersky:B-SecTeam, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Both APT41 and the actors in the CCleaner incident used TeamViewer during initial compromise .' [/INST] [Both:O, APT41:B-HackOrg, and:O, the:O, actors:O, in:O, the:O, CCleaner:B-Area, incident:O, used:O, TeamViewer:B-Tool, during:O, initial:O, compromise:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Supply chain compromises are most likely an extension of APT41's tactics used in gaining access to gaming development environments and to other gaming organizations via third-party service providers .' [/INST] [Supply:B-Way, chain:I-Way, compromises:I-Way, are:O, most:O, likely:O, an:O, extension:O, of:O, APT41's:B-HackOrg, tactics:O, used:O, in:O, gaining:O, access:O, to:O, gaming:O, development:O, environments:O, and:O, to:O, other:O, gaming:O, organizations:O, via:O, third-party:O, service:O, providers:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Beginning in July 2018 , APT41 appeared to have directly targeted several East and Southeast Asia-based video game developers and distributors to inject legitimate executables with the CRACKSHOT backdoor .' [/INST] [Beginning:O, in:O, July:B-Time, 2018:I-Time, ,:O, APT41:B-HackOrg, appeared:O, to:O, have:O, directly:O, targeted:O, several:O, East:O, and:O, Southeast:B-Area, Asia-based:I-Area, video:B-Idus, game:I-Idus, developers:I-Idus, and:O, distributors:O, to:O, inject:O, legitimate:O, executables:O, with:O, the:O, CRACKSHOT:O, backdoor:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The lure used to target the cryptocurrency exchange (displayed in Figure 5 and translated in Figure 6) referenced an online gaming platform , tying the cryptocurrency targeting to APT41's focus on video game-related targeting .' [/INST] [The:O, lure:O, used:O, to:O, target:O, the:O, cryptocurrency:O, exchange:O, (displayed:O, in:O, Figure:O, 5:O, and:O, translated:O, in:O, Figure:O, 6):O, referenced:O, an:O, online:O, gaming:O, platform:O, ,:O, tying:O, the:O, cryptocurrency:O, targeting:O, to:O, APT41's:B-HackOrg, focus:O, on:O, video:B-Idus, game-related:I-Idus, targeting:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'FireEye malware analysis identified source code overlaps between malware used by APT41 in May 2016 targeting of a U.S.-based game development studio and the malware observed in supply chain compromises in 2017 and 2018 .' [/INST] [FireEye:B-SecTeam, malware:O, analysis:O, identified:O, source:O, code:O, overlaps:O, between:O, malware:O, used:O, by:O, APT41:B-HackOrg, in:O, May:B-Time, 2016:I-Time, targeting:O, of:O, a:O, U.S.-based:O, game:B-Idus, development:I-Idus, studio:O, and:O, the:O, malware:O, observed:O, in:O, supply:O, chain:O, compromises:O, in:O, 2017:B-Time, and:O, 2018:B-Time, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In May 2016 , APT41 deployed a POISONPLUG sample at a U.S.-based game development studio .' [/INST] [In:O, May:B-Time, 2016:I-Time, ,:O, APT41:B-HackOrg, deployed:O, a:O, POISONPLUG:O, sample:O, at:O, a:O, U.S.-based:O, game:O, development:O, studio:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Alternatively , it is also possible that APT41 injected malicious code into the package prior to compilation , circumventing the need to steal the code-signing certificate and compile it on their own .' [/INST] [Alternatively:O, ,:O, it:O, is:O, also:O, possible:O, that:O, APT41:B-HackOrg, injected:B-Way, malicious:I-Way, code:I-Way, into:O, the:O, package:O, prior:O, to:O, compilation:O, ,:O, circumventing:B-Purp, the:O, need:O, to:O, steal:O, the:O, code-signing:O, certificate:O, and:O, compile:O, it:O, on:O, their:O, own:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Either APT41 is operating outside of state control but still working with other Chinese APT malware actors , tools , and infrastructure on a parttime or contractual basis , or APT41 is a full-time .' [/INST] [Either:O, APT41:B-HackOrg, is:O, operating:O, outside:O, of:O, state:O, control:O, but:O, still:O, working:O, with:O, other:O, Chinese:O, APT:O, malware:O, actors:B-Area, ,:O, tools:O, ,:O, and:O, infrastructure:O, on:O, a:O, parttime:O, or:O, contractual:O, basis:O, ,:O, or:O, APT41:B-HackOrg, is:O, a:O, full-time:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'APT41 uses many of the same tools and compromised digital certificates that have been leveraged by other Chinese espionage operators .' [/INST] [APT41:B-HackOrg, uses:O, many:O, of:O, the:O, same:O, tools:O, and:O, compromised:O, digital:B-Tool, certificates:I-Tool, that:O, have:O, been:O, leveraged:O, by:O, other:O, Chinese:O, espionage:O, operators:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Initial reports about HIGHNOON and its variants reported publicly as Winnti dating back to at least 2013 indicated the tool was exclusive to a single group , contributing to significant conflation across multiple distinct espionage operations .' [/INST] [Initial:O, reports:O, about:O, HIGHNOON:B-SamFile, and:O, its:O, variants:O, reported:O, publicly:O, as:O, Winnti:B-HackOrg, dating:O, back:O, to:O, at:O, least:O, 2013:B-Time, indicated:O, the:O, tool:O, was:O, exclusive:O, to:O, a:O, single:O, group:O, ,:O, contributing:O, to:O, significant:B-Features, conflation:I-Features, across:O, multiple:O, distinct:O, espionage:O, operations:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'APT41 has used several malware families that have also been used by other Chinese espionage operators , including variants of HIGHNOON , HOMEUNIX , PHOTO , SOGU , and ZXSHELL , among others .' [/INST] [APT41:B-HackOrg, has:O, used:O, several:O, malware:O, families:O, that:O, have:O, also:O, been:O, used:O, by:O, other:O, Chinese:O, espionage:O, operators:O, ,:O, including:O, variants:O, of:O, HIGHNOON:B-Tool, ,:O, HOMEUNIX:B-Tool, ,:O, PHOTO:B-Tool, ,:O, SOGU:B-Tool, ,:O, and:O, ZXSHELL:B-Tool, ,:O, among:O, others:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'HIGHNOON , one of the main code families observed being used by APT41 , was also used by APT17 in 2015 to target semiconductor and chemical manufacturers .' [/INST] [HIGHNOON:B-Tool, ,:O, one:O, of:O, the:O, main:O, code:O, families:O, observed:O, being:O, used:O, by:O, APT41:B-HackOrg, ,:O, was:O, also:O, used:O, by:O, APT17:B-HackOrg, in:O, 2015:O, to:O, target:O, semiconductor:B-Idus, and:O, chemical:B-Idus, manufacturers:I-Idus, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'HOMEUNIX , another popular backdoor used by APT41 , has been used by at least 14 separate Chinese espionage groups , including APT1 , APT10 , APT17 , APT18 , and APT20 .' [/INST] [HOMEUNIX:B-Tool, ,:O, another:O, popular:O, backdoor:B-Tool, used:O, by:O, APT41:B-HackOrg, ,:O, has:O, been:O, used:O, by:O, at:O, least:O, 14:O, separate:O, Chinese:B-Area, espionage:O, groups:B-HackOrg, ,:O, including:O, APT1:B-HackOrg, ,:O, APT10:B-HackOrg, ,:O, APT17:B-HackOrg, ,:O, APT18:B-HackOrg, ,:O, and:O, APT20:B-HackOrg, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'APT41 has used CROSSWALK.BIN , a kernel driver , to circumvent firewalls and covertly send data .' [/INST] [APT41:B-HackOrg, has:O, used:O, CROSSWALK.BIN:B-Tool, ,:O, a:O, kernel:O, driver:O, ,:O, to:O, circumvent:O, firewalls:O, and:O, covertly:O, send:O, data:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Another Chinese espionage group used a similar tool , CLASSFON , to covertly proxy network communications in 2011 .' [/INST] [Another:O, Chinese:O, espionage:B-HackOrg, group:I-HackOrg, used:O, a:O, similar:O, tool:O, ,:O, CLASSFON:B-Tool, ,:O, to:O, covertly:O, proxy:O, network:O, communications:O, in:O, 2011:B-Time, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'At least two of these malware families , HIGHNOON.CLI and GEARSHIFT , have been used by APT17 and another suspected Chinese espionage group .' [/INST] [At:O, least:O, two:O, of:O, these:O, malware:O, families:O, ,:O, HIGHNOON.CLI:B-Tool, and:O, GEARSHIFT:B-Tool, ,:O, have:O, been:O, used:O, by:O, APT17:B-HackOrg, and:O, another:O, suspected:O, Chinese:O, espionage:O, group:B-HackOrg, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'APT41 regularly leverages code-signing certificates to sign malware when targeting both gaming and nongaming organizations .' [/INST] [APT41:B-HackOrg, regularly:O, leverages:B-OffAct, code-signing:B-Tool, certificates:I-Tool, to:O, sign:O, malware:O, when:O, targeting:O, both:O, gaming:O, and:O, nongaming:B-Idus, organizations:I-Idus, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In July 2017 , APT41 initiated a TeamViewer session and transferred files that were later deleted .' [/INST] [In:O, July:B-Time, 2017:I-Time, ,:O, APT41:B-HackOrg, initiated:O, a:O, TeamViewer:O, session:O, and:O, transferred:O, files:O, that:O, were:O, later:O, deleted:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In these instances , APT41 leveraged TeamViewer to transfer malware into the compromised environment , although we do not have direct evidence of APT41 compromising TeamViewer .' [/INST] [In:O, these:O, instances:O, ,:O, APT41:B-HackOrg, leveraged:O, TeamViewer:B-Tool, to:O, transfer:B-Purp, malware:I-Purp, into:O, the:O, compromised:O, environment:O, ,:O, although:O, we:O, do:O, not:O, have:O, direct:O, evidence:O, of:O, APT41:B-HackOrg, compromising:O, TeamViewer:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In May 2018 , APT41 used TeamViewer for initial entry in the compromise of a healthcare company .' [/INST] [In:O, May:B-Time, 2018:I-Time, ,:O, APT41:B-HackOrg, used:O, TeamViewer:B-Tool, for:O, initial:O, entry:O, in:O, the:O, compromise:O, of:O, a:O, healthcare:B-Idus, company:B-Idus, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Notably , APT41 was observed using proof-of-concept exploit code for CVE-2019-3396 within 23 days after the Confluence .' [/INST] [Notably:O, ,:O, APT41:B-HackOrg, was:O, observed:O, using:B-Way, proof-of-concept:I-Way, exploit:B-Exp, code:O, for:O, CVE-2019-3396:B-Exp, within:O, 23:O, days:O, after:O, the:O, Confluence:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'APT41 has targeted payment services specializing in handling in-game transactions and real money transfer (RMT) purchases .' [/INST] [APT41:B-HackOrg, has:O, targeted:O, payment:B-Idus, services:I-Idus, specializing:O, in:O, handling:B-Purp, in-game:I-Purp, transactions:I-Purp, and:O, real:O, money:O, transfer:O, (RMT):O, purchases:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'We observed APT41 using a compromised account to create a scheduled task on a system , write a binary component of HIGHNOON containing the payload and C&C information to disk , and then modify the legitimate Windows WMI Performance Adaptor (wmiApSrv) to execute the HIGHNOON payload .' [/INST] [We:O, observed:O, APT41:B-HackOrg, using:O, a:O, compromised:O, account:O, to:O, create:O, a:O, scheduled:O, task:O, on:O, a:O, system:O, ,:O, write:B-Way, a:O, binary:O, component:O, of:O, HIGHNOON:O, containing:O, the:O, payload:O, and:O, C&C:O, information:O, to:O, disk:O, ,:O, and:O, then:O, modify:O, the:O, legitimate:O, Windows:O, WMI:O, Performance:O, Adaptor:O, (wmiApSrv):O, to:O, execute:B-Way, the:O, HIGHNOON:O, payload:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The group will also use a compromised account to create scheduled tasks on systems or modify legitimate Windows services to install the HIGHNOON and SOGU backdoors .' [/INST] [The:O, group:B-HackOrg, will:O, also:O, use:B-OffAct, a:I-OffAct, compromised:I-OffAct, account:I-OffAct, to:O, create:O, scheduled:O, tasks:O, on:O, systems:O, or:O, modify:B-OffAct, legitimate:O, Windows:O, services:O, to:O, install:O, the:O, HIGHNOON:B-Tool, and:O, SOGU:B-Tool, backdoors:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'APT41 uses multiple methods to perform lateral movement in an environment , including RDP sessions , using stolen credentials , adding accounts to User and Admin groups , and password brute-forcing utilities .' [/INST] [APT41:B-HackOrg, uses:O, multiple:O, methods:O, to:O, perform:O, lateral:O, movement:O, in:O, an:O, environment:O, ,:O, including:O, RDP:B-Way, sessions:I-Way, ,:O, using:B-Way, stolen:I-Way, credentials:I-Way, ,:O, adding:B-Way, accounts:I-Way, to:O, User:O, and:O, Admin:O, groups:O, ,:O, and:O, password:B-Way, brute-forcing:I-Way, utilities:I-Way, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'To maintain presence , APT41 relies on backdoors , a Sticky Keys vulnerability , scheduled tasks , bootkits , rootkits , registry modifications , and creating or modifying startup files .' [/INST] [To:O, maintain:O, presence:O, ,:O, APT41:B-HackOrg, relies:O, on:O, backdoors:O, ,:O, a:O, Sticky:B-Tool, Keys:I-Tool, vulnerability:O, ,:O, scheduled:B-Tool, tasks:I-Tool, ,:O, bootkits:B-Tool, ,:O, rootkits:B-Tool, ,:O, registry:B-Tool, modifications:I-Tool, ,:O, and:O, creating:O, or:O, modifying:O, startup:O, files:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'APT41 leveraged ROCKBOOT as a persistence mechanism for PHOTO and TERA backdoors .' [/INST] [APT41:B-HackOrg, leveraged:O, ROCKBOOT:B-Tool, as:O, a:O, persistence:O, mechanism:O, for:O, PHOTO:O, and:O, TERA:O, backdoors:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'APT41 has also been observed modifying firewall rules to enable file and printer sharing to allow for inbound Server Message Block (SMB) traffic .' [/INST] [APT41:B-HackOrg, has:O, also:O, been:O, observed:O, modifying:B-OffAct, firewall:I-OffAct, rules:I-OffAct, to:O, enable:O, file:O, and:O, printer:O, sharing:O, to:O, allow:O, for:O, inbound:O, Server:O, Message:O, Block:O, (SMB):O, traffic:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In some instances , APT41 leveraged POISONPLUG as a first-stage backdoor to deploy the HIGHNOON backdoor in the targeted environment .' [/INST] [In:O, some:O, instances:O, ,:O, APT41:B-HackOrg, leveraged:O, POISONPLUG:B-Tool, as:O, a:O, first-stage:O, backdoor:O, to:O, deploy:B-Purp, the:O, HIGHNOON:B-Tool, backdoor:O, in:O, the:O, targeted:O, environment:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The group also deploys the SOGU and CROSSWALK malware families as means to maintain presence .' [/INST] [The:O, group:B-HackOrg, also:O, deploys:B-Way, the:O, SOGU:O, and:O, CROSSWALK:O, malware:O, families:O, as:O, means:O, to:O, maintain:O, presence:O, .:O] </s> |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.