text stringlengths 306 1.51k |
|---|
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The analyzed RTF files share the same object dimension (objw2180\objh300) used to track the RTF weaponizer in our previous report , however , the sample was not exploiting CVE-2017-11882 or CVE-2018-0802 .' [/INST] [The:O, analyzed:O, RTF:O, files:O, share:O, the:O, same:O, object:O, dimension:O, (objw2180\objh300):O, used:O, to:O, track:O, the:O, RTF:O, weaponizer:O, in:O, our:O, previous:O, report:O, ,:O, however:O, ,:O, the:O, sample:B-SamFile, was:O, not:O, exploiting:O, CVE-2017-11882:B-Exp, or:O, CVE-2018-0802:B-Exp, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'After further analysis , it was discovered that the RTF files were exploiting the CVE-2018-0798 vulnerability in Microsoft’s Equation Editor (EQNEDT32) .' [/INST] [After:O, further:O, analysis:O, ,:O, it:O, was:O, discovered:O, that:O, the:O, RTF:B-SamFile, files:I-SamFile, were:O, exploiting:O, the:O, CVE-2018-0798:B-Exp, vulnerability:O, in:O, Microsoft’s:O, Equation:O, Editor:O, (EQNEDT32):O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Anomali Researchers were able to identify multiple samples of malicious RTF documents ITW using the same exploit for CVE-2018-0798 .' [/INST] [Anomali:B-SecTeam, Researchers:O, were:O, able:O, to:O, identify:O, multiple:O, samples:O, of:O, malicious:O, RTF:O, documents:O, ITW:B-SamFile, using:O, the:O, same:O, exploit:O, for:O, CVE-2018-0798:B-Exp, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The earliest use of the exploit ITW we were able to identify and confirm is a sample (e228045ef57fb8cc1226b62ada7eee9b) dating back to October 2018 (VirusTotal submission of 2018-10-29) with the RTF creation time 2018-10-23 .' [/INST] [The:O, earliest:O, use:O, of:O, the:O, exploit:O, ITW:B-SamFile, we:O, were:O, able:O, to:O, identify:O, and:O, confirm:O, is:O, a:O, sample:O, (e228045ef57fb8cc1226b62ada7eee9b):O, dating:O, back:O, to:O, October:B-Time, 2018:I-Time, (VirusTotal:O, submission:O, of:O, 2018-10-29):O, with:O, the:O, RTF:B-SamFile, creation:O, time:O, 2018-10-23:B-Time, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Upon decrypting and executing , it drops two additional files wsc_proxy.exe” (legitimate Avast executable) and a malicious DLL wsc.dll” in the %TEMP% folder .' [/INST] [Upon:O, decrypting:O, and:O, executing:O, ,:O, it:O, drops:O, two:O, additional:O, files:O, wsc_proxy.exe”:B-SamFile, (legitimate:O, Avast:O, executable):O, and:O, a:O, malicious:O, DLL:O, wsc.dll”:B-SamFile, in:O, the:O, %TEMP%:O, folder:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'However , Beginning on 25 June 2019 , we started observing multiple commodity campaigns Mostly dropping AsyncRAT using the updated RTF weaponizer with the same exploit (CVE-2018-0798) .' [/INST] [However:O, ,:O, Beginning:O, on:O, 25:O, June:O, 2019:O, ,:O, we:B-SecTeam, started:O, observing:O, multiple:O, commodity:O, campaigns:O, Mostly:O, dropping:O, AsyncRAT:B-SamFile, using:O, the:O, updated:O, RTF:O, weaponizer:O, with:O, the:O, same:O, exploit:O, (CVE-2018-0798):O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In addition , a current ANY.RUN playback of our observed Elise infection is also available .' [/INST] [In:O, addition:O, ,:O, a:O, current:O, ANY.RUN:B-SamFile, playback:O, of:O, our:O, observed:O, Elise:B-SamFile, infection:O, is:O, also:O, available:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Upon opening of the MS Word document , our embedded file exploits CVE-2017-11882 to drop a malicious fake Norton Security Shell Extension module , 'NavShExt.dll' , which is then injected into iexplore.exe to install the backdoor , begin collection , and activate command and control .' [/INST] [Upon:O, opening:O, of:O, the:O, MS:O, Word:O, document:O, ,:O, our:O, embedded:O, file:O, exploits:O, CVE-2017-11882:B-Exp, to:O, drop:O, a:O, malicious:O, fake:O, Norton:O, Security:O, Shell:O, Extension:O, module:O, ,:O, 'NavShExt.dll':B-SamFile, ,:O, which:O, is:O, then:O, injected:O, into:O, iexplore.exe:B-SamFile, to:O, install:O, the:O, backdoor:O, ,:O, begin:O, collection:O, ,:O, and:O, activate:O, command:O, and:O, control:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Moving through the infection process , NetWitness Endpoint detects the initial exploit CVE-2017-1182 in action as the Microsoft Equation Editor , 'EQNEDT32.exe' , scores high for potentially malicious activity .' [/INST] [Moving:O, through:O, the:O, infection:O, process:O, ,:O, NetWitness:O, Endpoint:O, detects:O, the:O, initial:O, exploit:O, CVE-2017-1182:B-Exp, in:O, action:O, as:O, the:O, Microsoft:B-SamFile, Equation:I-SamFile, Editor:I-SamFile, ,:O, 'EQNEDT32.exe':B-SamFile, ,:O, scores:O, high:O, for:O, potentially:O, malicious:O, activity:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The well-crafted and socially engineered malicious documents then become the first stage of a long and mainly fileless infection chain that eventually delivers POWERSTATS , a signature PowerShell backdoor of this threat group .' [/INST] [The:O, well-crafted:O, and:O, socially:O, engineered:O, malicious:O, documents:O, then:O, become:O, the:O, first:O, stage:O, of:O, a:O, long:O, and:O, mainly:O, fileless:O, infection:O, chain:O, that:O, eventually:O, delivers:O, POWERSTATS:B-SamFile, ,:O, a:O, signature:O, PowerShell:B-SamFile, backdoor:I-SamFile, of:O, this:O, threat:B-HackOrg, group:I-HackOrg, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'This powerful backdoor can receive commands from the attackers , enabling it to exfiltrate files from the system it is running on , execute additional scripts , delete files , and more .' [/INST] [This:O, powerful:O, backdoor:B-SamFile, can:O, receive:O, commands:O, from:O, the:O, attackers:O, ,:O, enabling:O, it:O, to:O, exfiltrate:B-Features, files:I-Features, from:O, the:O, system:O, it:O, is:O, running:O, on:O, ,:O, execute:B-Features, additional:I-Features, scripts:I-Features, ,:O, delete:B-Features, files:I-Features, ,:O, and:O, more:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'If the macros in SPK KANUN DEĞİŞİKLİĞİ GİB GÖRÜŞÜ.doc” are enabled , an embedded payload is decoded and saved in the %APPDATA% directory with the name CiscoAny.exe” .' [/INST] [If:O, the:O, macros:O, in:O, SPK:B-SamFile, KANUN:I-SamFile, DEĞİŞİKLİĞİ:O, GİB:O, GÖRÜŞÜ.doc”:O, are:O, enabled:O, ,:O, an:O, embedded:O, payload:O, is:O, decoded:O, and:O, saved:O, in:O, the:O, %APPDATA%:O, directory:O, with:O, the:O, name:O, CiscoAny.exe”:B-SamFile, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'INF files have been used in the past by MuddyWater , although they were launched using Advpack.dll and not IEAdvpack.dll .' [/INST] [INF:B-Tool, files:I-Tool, have:O, been:O, used:O, in:O, the:O, past:O, by:O, MuddyWater:B-HackOrg, ,:O, although:O, they:O, were:O, launched:O, using:O, Advpack.dll:B-Tool, and:O, not:O, IEAdvpack.dll:B-Tool, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In addition , by using VBA2Graph , we were able to visualize the VBA call graph in the macros of each document .' [/INST] [In:O, addition:O, ,:O, by:O, using:O, VBA2Graph:B-SamFile, ,:O, we:O, were:O, able:O, to:O, visualize:O, the:O, VBA:O, call:B-Features, graph:I-Features, in:O, the:O, macros:O, of:O, each:O, document:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'We assume that RunPow stands for run PowerShell , ” and triggers the PowerShell code embedded inside the .dll file .' [/INST] [We:O, assume:O, that:O, RunPow:O, stands:O, for:O, run:O, PowerShell:B-SamFile, ,:O, ”:O, and:O, triggers:O, the:O, PowerShell:O, code:O, embedded:O, inside:O, the:O, .dll:B-SamFile, file:I-SamFile, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The main delivery method of this type of backdoor is spear phishing emails or spam that uses social engineering to manipulate targets into enabling malicious documents .' [/INST] [The:O, main:O, delivery:O, method:O, of:O, this:O, type:O, of:O, backdoor:B-SamFile, is:O, spear:B-Way, phishing:B-Way, emails:O, or:O, spam:B-Way, that:O, uses:O, social:O, engineering:O, to:O, manipulate:O, targets:O, into:O, enabling:O, malicious:O, documents:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'This includes Python scripts .' [/INST] [This:O, includes:O, Python:O, scripts:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Usually , the Stageless Meterpreter has the Ext_server_stdapi.x64.dll” , Ext_server_extapi.x64.dll” , and Ext_server_espia.x64.dll” extensions .' [/INST] [Usually:O, ,:O, the:O, Stageless:B-SamFile, Meterpreter:I-SamFile, has:O, the:O, Ext_server_stdapi.x64.dll”:B-SamFile, ,:O, Ext_server_extapi.x64.dll”:B-SamFile, ,:O, and:O, Ext_server_espia.x64.dll”:B-SamFile, extensions:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'However , Kaspersky Security Network (KSN) records also contain links that victims clicked from the Outlook web client outlook.live.com” as well as attachments arriving through the Outlook desktop application .' [/INST] [However:O, ,:O, Kaspersky:B-SecTeam, Security:O, Network:O, (KSN):O, records:O, also:O, contain:O, links:O, that:O, victims:O, clicked:O, from:O, the:O, Outlook:O, web:O, client:O, outlook.live.com”:B-SamFile, as:O, well:O, as:O, attachments:O, arriving:O, through:O, the:O, Outlook:O, desktop:O, application:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The JavaScript forces visiting web browsers to collect and send (via a POST request) web browser , browser version , country of origin , and IP address data to the attacker controlled server jquerycodedownload.live/check.aspx” .' [/INST] [The:O, JavaScript:B-SamFile, forces:B-Features, visiting:O, web:O, browsers:O, to:O, collect:B-Features, and:O, send:O, (via:O, a:O, POST:O, request):O, web:O, browser:O, ,:O, browser:O, version:O, ,:O, country:O, of:O, origin:O, ,:O, and:O, IP:O, address:O, data:O, to:O, the:O, attacker:O, controlled:O, server:O, jquerycodedownload.live/check.aspx”:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'We identified two methods to deliver the KerrDown downloader to targets .' [/INST] [We:B-SecTeam, identified:O, two:O, methods:O, to:O, deliver:O, the:O, KerrDown:B-SamFile, downloader:O, to:O, targets:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The link to the final payload of KerrDown was still active during the time of analysis and hence we were able to download a copy which turned out to be a variant of Cobalt Strike Beacon .' [/INST] [The:O, link:O, to:O, the:O, final:O, payload:O, of:O, KerrDown:B-SamFile, was:O, still:O, active:O, during:O, the:O, time:O, of:O, analysis:O, and:O, hence:O, we:B-SecTeam, were:O, able:O, to:O, download:O, a:O, copy:O, which:O, turned:O, out:O, to:O, be:O, a:O, variant:O, of:O, Cobalt:O, Strike:O, Beacon:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'While investigating KerrDown we found multiple RAR files containing a variant of the malware .' [/INST] [While:O, investigating:O, KerrDown:B-SamFile, we:B-SecTeam, found:O, multiple:O, RAR:O, files:O, containing:O, a:O, variant:O, of:O, the:O, malware:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The dropped PE file has the distinctive file name 8.t” .' [/INST] [The:O, dropped:O, PE:B-Tool, file:O, has:O, the:O, distinctive:O, file:O, name:O, 8.t”:B-SamFile, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The malware was first seen packed with VMProtect; when unpacked the sample didn’t show any similarities with previously known malware .' [/INST] [The:O, malware:B-SamFile, was:O, first:O, seen:O, packed:O, with:O, VMProtect;:B-Features, when:O, unpacked:O, the:O, sample:O, didn’t:O, show:O, any:O, similarities:O, with:O, previously:O, known:O, malware:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The malware starts communicating with the C&C server by sending basic information about the infected machine .' [/INST] [The:O, malware:B-SamFile, starts:O, communicating:B-Features, with:I-Features, the:I-Features, C&C:I-Features, server:O, by:O, sending:O, basic:O, information:O, about:O, the:O, infected:O, machine:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The malware basically provides a remote CMD/PowerShell terminal for the attackers , enabling them to execute scripts/commands and receive the results via HTTP requests .' [/INST] [The:O, malware:B-SamFile, basically:O, provides:B-Features, a:O, remote:O, CMD/PowerShell:B-Tool, terminal:O, for:O, the:O, attackers:B-HackOrg, ,:O, enabling:O, them:O, to:O, execute:B-Purp, scripts/commands:I-Purp, and:O, receive:O, the:O, results:O, via:O, HTTP:O, requests:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'This time the document purported to be about the involvement of the Emir of Qatar in funding ISIS , which was seemingly copied from a website critical of Qatar .' [/INST] [This:O, time:O, the:O, document:B-SamFile, purported:O, to:O, be:O, about:O, the:O, involvement:O, of:O, the:O, Emir:B-Area, of:O, Qatar:B-Area, in:O, funding:O, ISIS:B-Area, ,:O, which:O, was:O, seemingly:O, copied:O, from:O, a:O, website:O, critical:O, of:O, Qatar:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The SDK , named SWAnalytics is integrated into seemingly innocent Android applications published on major 3rd party Chinese app stores such as Tencent MyApp , Wandoujia , Huawei App Store , and Xiaomi App Store .' [/INST] [The:O, SDK:B-Tool, ,:O, named:O, SWAnalytics:B-SamFile, is:O, integrated:O, into:O, seemingly:O, innocent:O, Android:O, applications:O, published:B-Way, on:I-Way, major:O, 3rd:O, party:O, Chinese:O, app:O, stores:O, such:O, as:O, Tencent:B-Idus, MyApp:I-Idus, ,:O, Wandoujia:B-Idus, ,:O, Huawei:B-Idus, App:I-Idus, Store:I-Idus, ,:O, and:O, Xiaomi:B-Idus, App:I-Idus, Store:I-Idus, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'After app installation , whenever SWAnalytics senses victims opening up infected applications or rebooting their phones , it silently uploads their entire contacts list to Hangzhou Shun Wang Technologies controlled servers .' [/INST] [After:O, app:O, installation:O, ,:O, whenever:O, SWAnalytics:B-SamFile, senses:O, victims:O, opening:O, up:O, infected:O, applications:O, or:O, rebooting:O, their:O, phones:O, ,:O, it:O, silently:O, uploads:B-Features, their:O, entire:O, contacts:O, list:O, to:O, Hangzhou:O, Shun:O, Wang:O, Technologies:O, controlled:O, servers:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'This module monitors a wide range of device activities including application installation / remove / update , phone restart and battery charge .' [/INST] [This:O, module:B-SamFile, monitors:O, a:O, wide:O, range:O, of:O, device:O, activities:O, including:O, application:B-Features, installation:I-Features, /:O, remove:B-Features, /:O, update:B-Features, ,:O, phone:B-Features, restart:I-Features, and:O, battery:B-Features, charge:I-Features, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'It turns out that contacts data isn’t the only unusual data SWAnalytics is interested in .' [/INST] [It:O, turns:O, out:O, that:O, contacts:B-Features, data:I-Features, isn’t:O, the:O, only:O, unusual:O, data:O, SWAnalytics:B-SamFile, is:O, interested:O, in:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'With default settings , SWAnalytics will scan through an Android device’s external storage , looking for directory tencent/MobileQQ/WebViewCheck” .' [/INST] [With:O, default:O, settings:O, ,:O, SWAnalytics:B-SamFile, will:O, scan:B-Features, through:O, an:O, Android:O, device’s:O, external:O, storage:O, ,:O, looking:O, for:O, directory:O, tencent/MobileQQ/WebViewCheck”:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'From our first malicious sample encounter back in mid-September until now , we have observed 12 infected applications , the majority of which are in the system utility category .' [/INST] [From:O, our:O, first:O, malicious:B-SamFile, sample:I-SamFile, encounter:O, back:O, in:O, mid-September:B-Time, until:O, now:O, ,:O, we:O, have:O, observed:O, 12:O, infected:O, applications:O, ,:O, the:O, majority:O, of:O, which:O, are:O, in:O, the:O, system:O, utility:O, category:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'By listing sub-folders , SWAnalytics is able to infer QQ accounts which have never been used on the device .' [/INST] [By:O, listing:B-Features, sub-folders:I-Features, ,:O, SWAnalytics:B-SamFile, is:O, able:O, to:O, infer:B-Features, QQ:I-Features, accounts:I-Features, which:O, have:O, never:O, been:O, used:O, on:O, the:O, device:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'To make this data harvesting operation flexible , SWAnalytics equips the ability to receive and process configuration files from a remote Command-and-Control .' [/INST] [To:O, make:O, this:O, data:O, harvesting:O, operation:O, flexible:O, ,:O, SWAnalytics:B-SamFile, equips:O, the:O, ability:O, to:O, receive:B-Features, and:O, process:B-Features, configuration:I-Features, files:I-Features, from:O, a:O, remote:B-Features, Command-and-Control:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Whenever users reboot their device or open up Network Speed Master , SWAnalytics will fetch the latest configuration file from http[:]//mbl[.]shunwang[.]com/cfg/config[.]json” .' [/INST] [Whenever:O, users:O, reboot:O, their:O, device:O, or:O, open:O, up:O, Network:B-Way, Speed:I-Way, Master:I-Way, ,:O, SWAnalytics:B-SamFile, will:O, fetch:O, the:O, latest:O, configuration:O, file:O, from:O, http[:]//mbl[.]shunwang[.]com/cfg/config[.]json”:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In order to understand SWAnalytics’ impact , we turned to public download volume data available on Chandashi , one of the app store optimization vendors specialized in Chinese mobile application markets .' [/INST] [In:O, order:O, to:O, understand:O, SWAnalytics’:B-SamFile, impact:O, ,:O, we:O, turned:O, to:O, public:O, download:O, volume:O, data:O, available:O, on:O, Chandashi:O, ,:O, one:O, of:O, the:O, app:O, store:O, optimization:O, vendors:O, specialized:O, in:O, Chinese:B-Area, mobile:O, application:O, markets:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'According to Cheetah Mobile’s follow-up investigation , fraudulent behaviors came from two 3rd party SDKs Batmobi , Duapps integrated inside Cheetah SDK .' [/INST] [According:O, to:O, Cheetah:O, Mobile’s:O, follow-up:O, investigation:O, ,:O, fraudulent:O, behaviors:O, came:O, from:O, two:O, 3rd:O, party:O, SDKs:O, Batmobi:B-SamFile, ,:O, Duapps:B-SamFile, integrated:O, inside:O, Cheetah:B-SamFile, SDK:I-SamFile, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'It is likely a new campaign or actor started using Panda Banker since in addition to the previously unseen Japanese targeting , Arbor has not seen any indicator of compromise (IOC) overlaps with previous Panda Banker campaigns .' [/INST] [It:O, is:O, likely:O, a:O, new:O, campaign:O, or:O, actor:B-HackOrg, started:O, using:O, Panda:B-Tool, Banker:I-Tool, since:O, in:O, addition:O, to:O, the:O, previously:O, unseen:O, Japanese:B-Area, targeting:O, ,:O, Arbor:B-SecTeam, has:O, not:O, seen:O, any:O, indicator:O, of:O, compromise:O, (IOC):O, overlaps:O, with:O, previous:O, Panda:B-SamFile, Banker:I-SamFile, campaigns:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Webinjects targeting Japan , a country we haven’t seen targeted by Panda Banker before .' [/INST] [Webinjects:O, targeting:O, Japan:B-Area, ,:O, a:O, country:O, we:O, haven’t:O, seen:O, targeted:O, by:O, Panda:B-SamFile, Banker:I-SamFile, before:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Japan is no stranger to banking malware .' [/INST] [Japan:B-Area, is:O, no:O, stranger:O, to:O, banking:B-SamFile, malware:B-SamFile, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Based on recent reports , the country has been plagued by attacks using the Ursnif and Urlzone banking malware .' [/INST] [Based:O, on:O, recent:O, reports:O, ,:O, the:O, country:B-Area, has:O, been:O, plagued:O, by:O, attacks:O, using:O, the:O, Ursnif:B-SamFile, and:O, Urlzone:B-SamFile, banking:O, malware:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'This post was our first analysis of the first Panda Banker campaign that we’ve seen to target financial institutions in Japan .' [/INST] [This:O, post:O, was:O, our:O, first:O, analysis:O, of:O, the:O, first:O, Panda:B-SamFile, Banker:I-SamFile, campaign:O, that:O, we’ve:O, seen:O, to:O, target:O, financial:B-Idus, institutions:I-Idus, in:O, Japan:B-Area, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'We believe the iOS malware gets installed on already compromised systems , and it is very similar to next stage SEDNIT malware we have found for Microsoft Windows’ systems .' [/INST] [We:B-SecTeam, believe:O, the:O, iOS:O, malware:O, gets:O, installed:O, on:O, already:O, compromised:O, systems:O, ,:O, and:O, it:O, is:O, very:O, similar:O, to:O, next:O, stage:O, SEDNIT:B-SamFile, malware:O, we:O, have:O, found:O, for:O, Microsoft:O, Windows’:O, systems:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'One is called XAgent detected as IOS_XAGENT.A and the other one uses the name of a legitimate iOS game , MadCap detected as IOS_ XAGENT.B .' [/INST] [One:O, is:O, called:O, XAgent:B-SamFile, detected:O, as:O, IOS_XAGENT.A:B-SamFile, and:O, the:O, other:O, one:O, uses:O, the:O, name:O, of:O, a:O, legitimate:O, iOS:O, game:O, ,:O, MadCap:B-SamFile, detected:O, as:O, IOS_:O, XAGENT.B:B-SamFile, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Madcap” is similar to the XAgent malware , but the former is focused on recording audio .' [/INST] [Madcap”:B-SamFile, is:O, similar:O, to:O, the:O, XAgent:B-SamFile, malware:O, ,:O, but:O, the:O, former:O, is:O, focused:O, on:O, recording:O, audio:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'This full-blown spying framework consists of two packages named ‘Tokyo’ and ‘Yokohama’ .' [/INST] [This:O, full-blown:O, spying:O, framework:O, consists:O, of:O, two:O, packages:O, named:O, ‘Tokyo’:B-SamFile, and:O, ‘Yokohama’:B-SamFile, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Just to highlight its capabilities , TajMahal is able to steal data from a CD burnt by a victim as well as from the printer queue .' [/INST] [Just:O, to:O, highlight:O, its:O, capabilities:O, ,:O, TajMahal:B-SamFile, is:O, able:O, to:O, steal:B-Features, data:I-Features, from:O, a:O, CD:O, burnt:O, by:O, a:O, victim:O, as:O, well:O, as:O, from:O, the:O, printer:O, queue:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The first confirmed date when TajMahal samples were seen on a victim’s machine is August 2014 .' [/INST] [The:O, first:O, confirmed:O, date:O, when:O, TajMahal:B-SamFile, samples:O, were:O, seen:O, on:O, a:O, victim’s:O, machine:O, is:O, August:B-Time, 2014:B-Time, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'More details about TajMahal are available to customers of the Kaspersky Intelligence Reporting service (contact intelreports@kaspersky.com) .' [/INST] [More:O, details:O, about:O, TajMahal:B-SamFile, are:O, available:O, to:O, customers:O, of:O, the:O, Kaspersky:B-SecTeam, Intelligence:O, Reporting:O, service:O, (contact:O, intelreports@kaspersky.com):O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The delivery of KopiLuwak in this instance is currently unknown as the MSIL dropper has only been observed by Proofpoint researchers on a public malware repository .' [/INST] [The:O, delivery:O, of:O, KopiLuwak:O, in:O, this:O, instance:O, is:O, currently:O, unknown:O, as:O, the:O, MSIL:B-SamFile, dropper:I-SamFile, has:O, only:O, been:O, observed:O, by:O, Proofpoint:B-SecTeam, researchers:O, on:O, a:O, public:O, malware:O, repository:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The earliest step in any possible attack(s) involving this variant of KopiLuwak of which Proofpoint researchers are currently aware begin with the MSIL dropper .' [/INST] [The:O, earliest:O, step:O, in:O, any:O, possible:O, attack(s):O, involving:O, this:O, variant:O, of:O, KopiLuwak:B-SamFile, of:O, which:O, Proofpoint:O, researchers:O, are:O, currently:O, aware:O, begin:O, with:O, the:O, MSIL:B-SamFile, dropper:I-SamFile, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The basic chain of events upon execution of the MSIL dropper include dropping and executing both a PDF decoy and a Javascript (JS) dropper .' [/INST] [The:O, basic:O, chain:O, of:O, events:O, upon:O, execution:O, of:O, the:O, MSIL:B-SamFile, dropper:I-SamFile, include:O, dropping:O, and:O, executing:O, both:O, a:O, PDF:O, decoy:O, and:O, a:O, Javascript:B-SamFile, (JS):I-SamFile, dropper:I-SamFile, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'As explained in further detail below , the JS dropper ultimately installs a JS decryptor onto an infected machine that will then finally decrypt and execute the actual KopiLuwak backdoor in memory only .' [/INST] [As:O, explained:O, in:O, further:O, detail:O, below:O, ,:O, the:O, JS:B-SamFile, dropper:I-SamFile, ultimately:O, installs:O, a:O, JS:B-SamFile, decryptor:I-SamFile, onto:O, an:O, infected:O, machine:O, that:O, will:O, then:O, finally:O, decrypt:O, and:O, execute:O, the:O, actual:O, KopiLuwak:B-SamFile, backdoor:O, in:O, memory:O, only:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'As Proofpoint has not yet observed this attack in the wild it is likely that there is an additional component that leads to the execution of the MSIL payload .' [/INST] [As:O, Proofpoint:B-SecTeam, has:O, not:O, yet:O, observed:O, this:O, attack:O, in:O, the:O, wild:O, it:O, is:O, likely:O, that:O, there:O, is:O, an:O, additional:O, component:O, that:O, leads:O, to:O, the:O, execution:O, of:O, the:O, MSIL:B-SamFile, payload:I-SamFile, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The newer variant of KopiLuwak is now capable of exfiltrating files to the C&C as well as downloading files and saving them to the infected machine .' [/INST] [The:O, newer:O, variant:O, of:O, KopiLuwak:B-SamFile, is:O, now:O, capable:O, of:O, exfiltrating:B-Features, files:I-Features, to:O, the:O, C&C:O, as:O, well:O, as:O, downloading:B-Features, files:I-Features, and:O, saving:O, them:O, to:O, the:O, infected:O, machine:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'We didn’t choose to name it after a vegetable; the .NET malware developers named it Topinambour themselves .' [/INST] [We:O, didn’t:O, choose:O, to:O, name:O, it:O, after:O, a:O, vegetable;:O, the:O, .NET:B-SamFile, malware:I-SamFile, developers:O, named:O, it:O, Topinambour:B-SamFile, themselves:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The role of the .NET module is to deliver the known KopiLuwak JavaScript Trojan .' [/INST] [The:O, role:O, of:O, the:O, .NET:B-SamFile, module:I-SamFile, is:O, to:O, deliver:O, the:O, known:O, KopiLuwak:B-SamFile, JavaScript:I-SamFile, Trojan:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'RocketMan!” (probably a reference to Donald Trump’s nickname for Kim Jong Un) and MiamiBeach” serve as the first beacon messages from the victim to the control server .' [/INST] [RocketMan!”:B-SamFile, (probably:O, a:O, reference:O, to:O, Donald:O, Trump’s:O, nickname:O, for:O, Kim:O, Jong:O, Un):O, and:O, MiamiBeach”:B-SamFile, serve:O, as:O, the:O, first:O, beacon:O, messages:O, from:O, the:O, victim:O, to:O, the:O, control:O, server:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'These could be tools to circumvent internet censorship , such as Softether VPN 4.12” and psiphon3” , or Microsoft Office activators” .' [/INST] [These:O, could:O, be:O, tools:O, to:O, circumvent:O, internet:O, censorship:O, ,:O, such:O, as:O, Softether:B-SamFile, VPN:I-SamFile, 4.12”:I-SamFile, and:O, psiphon3”:B-SamFile, ,:O, or:O, Microsoft:B-SamFile, Office:I-SamFile, activators”:I-SamFile, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'These campaign-related VPSs are located in South Africa .' [/INST] [These:O, campaign-related:O, VPSs:B-HackOrg, are:O, located:O, in:O, South:B-Area, Africa:B-Area, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The tool does all that a typical Trojan needs to accomplish: upload , download and execute files , fingerprint target systems .' [/INST] [The:O, tool:O, does:O, all:O, that:O, a:O, typical:O, Trojan:B-SamFile, needs:O, to:O, accomplish::O, upload:B-Features, ,:O, download:B-Features, and:O, execute:B-Features, files:I-Features, ,:O, fingerprint:B-Features, target:I-Features, systems:I-Features, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The PowerShell version of the Trojan also has the ability to get screenshots .' [/INST] [The:O, PowerShell:B-SamFile, version:O, of:O, the:O, Trojan:O, also:O, has:O, the:O, ability:O, to:O, get:B-Features, screenshots:B-Features, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The Trojan is quite similar to the .NET RocketMan Trojan and can handle the same commands; additionally , it includes the #screen” command to take a screenshot .' [/INST] [The:O, Trojan:B-SamFile, is:O, quite:O, similar:O, to:O, the:O, .NET:B-SamFile, RocketMan:I-SamFile, Trojan:I-SamFile, and:O, can:O, handle:O, the:O, same:O, commands;:O, additionally:O, ,:O, it:O, includes:O, the:O, #screen”:O, command:O, to:O, take:O, a:O, screenshot:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Initial reports about HIGHNOON and its variants reported publicly as Winnti dating back to at least 2013 indicated the tool was exclusive to a single group , contributing to significant conflation across multiple distinct espionage operations .' [/INST] [Initial:O, reports:O, about:O, HIGHNOON:B-SamFile, and:O, its:O, variants:O, reported:O, publicly:O, as:O, Winnti:B-HackOrg, dating:O, back:O, to:O, at:O, least:O, 2013:B-Time, indicated:O, the:O, tool:O, was:O, exclusive:O, to:O, a:O, single:O, group:O, ,:O, contributing:O, to:O, significant:B-Features, conflation:I-Features, across:O, multiple:O, distinct:O, espionage:O, operations:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'BalkanRAT enables the attacker to remotely control the compromised computer via a graphical interface , i.e , manually; BalkanDoor enables them to remotely control the compromised computer via a command line , i.e , possibly en masse .' [/INST] [BalkanRAT:B-SamFile, enables:O, the:O, attacker:O, to:O, remotely:O, control:B-Features, the:O, compromised:O, computer:O, via:O, a:O, graphical:O, interface:O, ,:O, i.e:O, ,:O, manually;:O, BalkanDoor:B-SamFile, enables:O, them:O, to:O, remotely:O, control:O, the:O, compromised:O, computer:O, via:O, a:O, command:O, line:O, ,:O, i.e:O, ,:O, possibly:O, en:O, masse:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Both BalkanRAT and BalkanDoor spread in Croatia , Serbia , Montenegro , and Bosnia and Herzegovina .' [/INST] [Both:O, BalkanRAT:B-SamFile, and:O, BalkanDoor:B-SamFile, spread:O, in:O, Croatia:B-Area, ,:O, Serbia:B-Area, ,:O, Montenegro:B-Area, ,:O, and:O, Bosnia:B-Area, and:O, Herzegovina:B-Area, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In some of the latest samples of BalkanDoor detected in 2019 , the malware is distributed as an ACE archive , disguised as a RAR archive (i.e , not an executable file) , specially crafted to exploit the WinRAR ACE vulnerability CVE-2018-20250 .' [/INST] [In:O, some:O, of:O, the:O, latest:O, samples:O, of:O, BalkanDoor:B-SamFile, detected:O, in:O, 2019:B-Time, ,:O, the:O, malware:O, is:O, distributed:O, as:O, an:O, ACE:O, archive:O, ,:O, disguised:O, as:O, a:O, RAR:O, archive:O, (i.e:O, ,:O, not:O, an:O, executable:O, file):O, ,:O, specially:O, crafted:O, to:O, exploit:O, the:O, WinRAR:O, ACE:O, vulnerability:O, CVE-2018-20250:B-Exp, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The backdoor can connect to any of the C&Cs from a hardcoded list – a measure to increase resilience .' [/INST] [The:O, backdoor:B-SamFile, can:O, connect:B-Features, to:O, any:O, of:O, the:O, C&Cs:O, from:O, a:O, hardcoded:O, list:O, –:O, a:O, measure:O, to:O, increase:O, resilience:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The main part of the BalkanRAT malware is a copy of the Remote Utilities software for remote access .' [/INST] [The:O, main:O, part:O, of:O, the:O, BalkanRAT:B-SamFile, malware:I-SamFile, is:O, a:O, copy:O, of:O, the:O, Remote:O, Utilities:O, software:O, for:O, remote:B-OffAct, access:I-OffAct, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'China Chopper is a tool that allows attackers to remotely control the target system that needs to be running a web server application before it can be targeted by the tool .' [/INST] [China:B-SamFile, Chopper:I-SamFile, is:O, a:O, tool:O, that:O, allows:O, attackers:B-HackOrg, to:O, remotely:O, control:B-Features, the:O, target:O, system:O, that:O, needs:O, to:O, be:O, running:O, a:O, web:O, server:O, application:O, before:O, it:O, can:O, be:O, targeted:O, by:O, the:O, tool:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'China Chopper contains a remote shell (Virtual Terminal) function that has a first suggested command of netstat an|find ESTABLISHED .' [/INST] [China:B-SamFile, Chopper:I-SamFile, contains:O, a:O, remote:O, shell:O, (Virtual:O, Terminal):O, function:O, that:O, has:O, a:O, first:O, suggested:O, command:B-Features, of:O, netstat:O, an|find:O, ESTABLISHED:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'They download and install an archive containing executables and trivially modified source code of the password-stealing tool Mimikatz Lite as GetPassword.exe .' [/INST] [They:O, download:O, and:O, install:O, an:O, archive:O, containing:O, executables:O, and:O, trivially:O, modified:O, source:O, code:O, of:O, the:O, password-stealing:O, tool:O, Mimikatz:B-SamFile, Lite:I-SamFile, as:O, GetPassword.exe:B-SamFile, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The tool investigates the Local Security Authority Subsystem memory space in order to find , decrypt and display retrieved passwords .' [/INST] [The:O, tool:B-SamFile, investigates:B-Features, the:O, Local:O, Security:O, Authority:O, Subsystem:O, memory:O, space:O, in:O, order:O, to:O, find:O, ,:O, decrypt:O, and:O, display:O, retrieved:O, passwords:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The China Chopper actor activity starts with the download and execution of two exploit files which attempt to exploit the Windows vulnerabilities CVE-2015-0062 , CVE-2015-1701 and CVE-2016-0099 to allow the attacker to modify other objects on the server .' [/INST] [The:O, China:B-SamFile, Chopper:I-SamFile, actor:O, activity:O, starts:O, with:O, the:O, download:O, and:O, execution:O, of:O, two:O, exploit:O, files:O, which:O, attempt:O, to:O, exploit:O, the:O, Windows:O, vulnerabilities:O, CVE-2015-0062:B-Exp, ,:O, CVE-2015-1701:B-Exp, and:O, CVE-2016-0099:B-Exp, to:O, allow:O, the:O, attacker:B-HackOrg, to:O, modify:O, other:O, objects:O, on:O, the:O, server:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The following archive caught our attention for exploiting a WinRAR unacev2 module vulnerability and for having interesting content .' [/INST] [The:O, following:O, archive:B-SamFile, caught:O, our:O, attention:O, for:O, exploiting:O, a:O, WinRAR:O, unacev2:O, module:O, vulnerability:B-Exp, and:O, for:O, having:O, interesting:O, content:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Let’s take a closer look at ITG08’s TTPs that are relevant to the campaign we investigated , starting with its spear phishing and intrusion tactics and covering information on its use of the More_eggs backdoor .' [/INST] [Let’s:O, take:O, a:O, closer:O, look:O, at:O, ITG08’s:B-HackOrg, TTPs:O, that:O, are:O, relevant:O, to:O, the:O, campaign:O, we:O, investigated:O, ,:O, starting:O, with:O, its:O, spear:B-Way, phishing:I-Way, and:O, intrusion:B-Way, tactics:I-Way, and:O, covering:B-Way, information:I-Way, on:O, its:O, use:O, of:O, the:O, More_eggs:B-SamFile, backdoor:I-SamFile, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Additional capabilities of the More_eggs malware include the download and execution of files and scripts and running commands using cmd.exe .' [/INST] [Additional:O, capabilities:O, of:O, the:O, More_eggs:B-SamFile, malware:I-SamFile, include:O, the:O, download:B-Features, and:O, execution:B-Features, of:I-Features, files:I-Features, and:O, scripts:O, and:O, running:O, commands:O, using:O, cmd.exe:B-SamFile, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'X-Force IRIS determined that the More_eggs backdoor later downloaded additional files , including a signed binary shellcode loader and a signed Dynamic Link Library (DLL) , as described below , to create a reverse shell and connect to a remote host .' [/INST] [X-Force:B-SecTeam, IRIS:I-SecTeam, determined:O, that:O, the:O, More_eggs:B-SamFile, backdoor:I-SamFile, later:O, downloaded:O, additional:O, files:O, ,:O, including:O, a:O, signed:O, binary:O, shellcode:O, loader:O, and:O, a:O, signed:O, Dynamic:O, Link:O, Library:O, (DLL):O, ,:O, as:O, described:O, below:O, ,:O, to:O, create:O, a:O, reverse:O, shell:O, and:O, connect:O, to:O, a:O, remote:O, host:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The document exploited CVE-2012-0158 and will decode and write an executable to disk upon infection .' [/INST] [The:O, document:O, exploited:O, CVE-2012-0158:B-Exp, and:O, will:O, decode:O, and:O, write:O, an:O, executable:O, to:O, disk:O, upon:O, infection:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'iSiGHT Partners has tracked Sandworm Team for some time - and we publicly reported on some of their activities in October 2014 , when we discovered their use of a zero-day exploit , CVE-2014-4114 .' [/INST] [iSiGHT:B-SecTeam, Partners:I-SecTeam, has:O, tracked:O, Sandworm:B-HackOrg, Team:I-HackOrg, for:O, some:O, time:O, -:O, and:O, we:O, publicly:O, reported:O, on:O, some:O, of:O, their:O, activities:B-OffAct, in:O, October:B-Time, 2014:I-Time, ,:O, when:O, we:O, discovered:O, their:O, use:O, of:O, a:O, zero-day:B-Exp, exploit:I-Exp, ,:O, CVE-2014-4114:B-Exp, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In July of 2015 , we identified a full e-mail uploaded to an antivirus scanning service that carried a Scarlet Mimic exploit document .' [/INST] [In:O, July:B-Time, of:I-Time, 2015:I-Time, ,:O, we:O, identified:O, a:O, full:O, e-mail:B-Way, uploaded:O, to:O, an:O, antivirus:O, scanning:O, service:O, that:O, carried:O, a:O, Scarlet:B-Exp, Mimic:I-Exp, exploit:I-Exp, document:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The group uses legitimate administration tools to fly under the radar in their post-exploitation phase , which makes detection of malicious activity , as well as attribution more complicated .' [/INST] [The:O, group:B-HackOrg, uses:O, legitimate:B-Tool, administration:I-Tool, tools:I-Tool, to:O, fly:B-Purp, under:I-Purp, the:I-Purp, radar:I-Purp, in:O, their:O, post-exploitation:O, phase:O, ,:O, which:O, makes:O, detection:O, of:O, malicious:B-OffAct, activity:I-OffAct, ,:O, as:O, well:O, as:O, attribution:O, more:O, complicated:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Through the exploitation of the HTA handler vulnerability described in CVE-2017-1099 , the observed RTF attachments download .' [/INST] [Through:O, the:O, exploitation:O, of:O, the:O, HTA:O, handler:O, vulnerability:O, described:O, in:O, CVE-2017-1099:B-Exp, ,:O, the:O, observed:O, RTF:B-SamFile, attachments:I-SamFile, download:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In early May , the phishing lures leveraged RTF attachments that exploited the Microsoft Windows vulnerability described in CVE-2017-0199 .' [/INST] [In:O, early:O, May:B-Time, ,:O, the:O, phishing:B-Way, lures:I-Way, leveraged:O, RTF:B-SamFile, attachments:I-SamFile, that:O, exploited:O, the:O, Microsoft:O, Windows:O, vulnerability:O, described:O, in:O, CVE-2017-0199:B-Exp, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'As early as March 4 , 2017 , malicious documents exploiting CVE-2017-0199 were used to deliver the LATENTBOT malware .' [/INST] [As:O, early:O, as:O, March:B-Time, 4:I-Time, ,:O, 2017:B-Time, ,:O, malicious:B-SamFile, documents:I-SamFile, exploiting:O, CVE-2017-0199:B-Exp, were:O, used:O, to:O, deliver:O, the:O, LATENTBOT:B-Tool, malware:I-Tool, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'FireEye believes that two actors – Turla and an unknown financially motivated actor – were using the first EPS zero-day CVE-2017-0261 , and APT28 was using the second EPS zero-day CVE-2017-0262 along with a new Escalation of Privilege (EOP) zero-day CVE-2017-0263 .' [/INST] [FireEye:B-SecTeam, believes:O, that:O, two:O, actors:B-HackOrg, –:O, Turla:O, and:O, an:O, unknown:O, financially:B-Idus, motivated:O, actor:O, –:O, were:O, using:O, the:O, first:O, EPS:O, zero-day:O, CVE-2017-0261:B-Exp, ,:O, and:O, APT28:B-HackOrg, was:O, using:O, the:O, second:O, EPS:O, zero-day:O, CVE-2017-0262:B-Exp, along:O, with:O, a:O, new:O, Escalation:O, of:O, Privilege:O, (EOP):O, zero-day:O, CVE-2017-0263:B-Exp, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The first , st07383.en17.docx , continues by utilizing 32 or 64 bit versions of CVE-2017-0001 to escalate privileges before executing a final JavaScript payload containing a malware implant known as SHIRIME .' [/INST] [The:O, first:O, ,:O, st07383.en17.docx:B-SamFile, ,:O, continues:O, by:O, utilizing:O, 32:O, or:O, 64:O, bit:O, versions:O, of:O, CVE-2017-0001:B-Exp, to:O, escalate:O, privileges:O, before:O, executing:O, a:O, final:O, JavaScript:O, payload:O, containing:O, a:O, malware:O, implant:O, known:O, as:O, SHIRIME:B-SamFile, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'This vulnerability was found in a document named Trump's_Attack_on_Syria_English.docx” .' [/INST] [This:O, vulnerability:O, was:O, found:O, in:O, a:O, document:B-SamFile, named:O, Trump's_Attack_on_Syria_English.docx”:B-Exp, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'It is possible that CVE-2017-8759 was being used by additional actors .' [/INST] [It:O, is:O, possible:O, that:O, CVE-2017-8759:B-Exp, was:O, being:O, used:O, by:O, additional:O, actors:B-HackOrg, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The addition of the EternalBlue exploit to Metasploit has made it easy for threat actors to exploit these vulnerabilities .' [/INST] [The:O, addition:O, of:O, the:O, EternalBlue:B-Exp, exploit:O, to:O, Metasploit:B-Tool, has:O, made:O, it:O, easy:O, for:O, threat:O, actors:B-HackOrg, to:O, exploit:O, these:O, vulnerabilities:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The Magnitude EK landing page consisted of CVE-2016-0189 , which was first reported by FireEye as being used in Neutrino Exploit Kit after it was patched .' [/INST] [The:O, Magnitude:B-Tool, EK:I-Tool, landing:O, page:O, consisted:O, of:O, CVE-2016-0189:B-Exp, ,:O, which:O, was:O, first:O, reported:O, by:O, FireEye:B-SecTeam, as:O, being:O, used:O, in:O, Neutrino:B-Tool, Exploit:I-Tool, Kit:I-Tool, after:O, it:O, was:O, patched:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The malware leverages an exploit , codenamed EternalBlue” , that was released by the Shadow Brokers on April 14 , 2017 .' [/INST] [The:O, malware:O, leverages:O, an:O, exploit:O, ,:O, codenamed:O, EternalBlue”:B-Exp, ,:O, that:O, was:O, released:O, by:O, the:O, Shadow:B-HackOrg, Brokers:I-HackOrg, on:O, April:B-Time, 14:I-Time, ,:O, 2017:B-Time, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Some hackers even went onto use the Cisco exploits in the wild .' [/INST] [Some:O, hackers:O, even:O, went:O, onto:O, use:O, the:O, Cisco:B-Exp, exploits:I-Exp, in:O, the:O, wild:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'DanderSpritz is the framework for controlling infected machines , different from FuZZbuNch as the latter provides a limited toolkit for the post-exploitation stage with specific functions such as DisableSecurity and EnableSecurity for DarkPulsar .' [/INST] [DanderSpritz:B-Tool, is:O, the:O, framework:O, for:O, controlling:O, infected:O, machines:O, ,:O, different:O, from:O, FuZZbuNch:B-Tool, as:O, the:O, latter:O, provides:O, a:O, limited:O, toolkit:O, for:O, the:O, post-exploitation:O, stage:O, with:O, specific:O, functions:O, such:O, as:O, DisableSecurity:B-Tool, and:O, EnableSecurity:B-Tool, for:O, DarkPulsar:B-Tool, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In their latest leak , they have released the UNITEDRAKE NSA exploit , which is a remote access and control tool that can remotely target Windows-based systems to capture desired information and transfer it to a server .' [/INST] [In:O, their:O, latest:O, leak:O, ,:O, they:O, have:O, released:O, the:O, UNITEDRAKE:B-Exp, NSA:I-Exp, exploit:I-Exp, ,:O, which:O, is:O, a:O, remote:O, access:O, and:O, control:O, tool:O, that:O, can:O, remotely:O, target:O, Windows-based:O, systems:O, to:O, capture:B-Features, desired:I-Features, information:I-Features, and:O, transfer:B-Features, it:O, to:O, a:O, server:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'On the other hand , ShadowBrokers group made headlines in 2016 when it claimed to have robbed various exploitation tools used by the NSA including the notorious ETERNALBLUE that was a vital component in the WannaCry ransomware campaign causing damages to systems worldwide .' [/INST] [On:O, the:O, other:O, hand:O, ,:O, ShadowBrokers:O, group:O, made:O, headlines:O, in:O, 2016:B-Time, when:O, it:O, claimed:O, to:O, have:O, robbed:O, various:O, exploitation:O, tools:O, used:O, by:O, the:O, NSA:B-Org, including:O, the:O, notorious:O, ETERNALBLUE:B-Exp, that:O, was:O, a:O, vital:O, component:O, in:O, the:O, WannaCry:B-OffAct, ransomware:I-OffAct, campaign:I-OffAct, causing:O, damages:O, to:O, systems:O, worldwide:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In all emails sent to these government officials , the actor used the same attachment : a malicious Microsoft Word document that exploited the CVE-2012-0158 vulnerability to drop a malicious payload .' [/INST] [In:O, all:O, emails:B-Way, sent:O, to:O, these:O, government:B-Org, officials:I-Org, ,:O, the:O, actor:O, used:O, the:O, same:O, attachment:O, ::O, a:O, malicious:B-SamFile, Microsoft:I-SamFile, Word:I-SamFile, document:I-SamFile, that:O, exploited:O, the:O, CVE-2012-0158:B-Exp, vulnerability:O, to:O, drop:O, a:O, malicious:O, payload:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Despite being an older vulnerability , many threat actors continue to leverage CVE-2012-0158 to exploit Microsoft Word .' [/INST] [Despite:O, being:O, an:O, older:O, vulnerability:O, ,:O, many:O, threat:O, actors:O, continue:O, to:O, leverage:O, CVE-2012-0158:B-Exp, to:O, exploit:O, Microsoft:B-SamFile, Word:I-SamFile, .:O] </s> |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.