text stringlengths 306 1.51k |
|---|
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'According to the security firm , this campaign targeted Indian military officials via spear-phishing emails , distributing spyware to its victims via an Adobe Reader vulnerability .' [/INST] [According:O, to:O, the:O, security:B-Org, firm:I-Org, ,:O, this:O, campaign:B-OffAct, targeted:O, Indian:O, military:B-Org, officials:I-Org, via:O, spear-phishing:B-Way, emails:I-Way, ,:O, distributing:O, spyware:O, to:O, its:O, victims:O, via:O, an:O, Adobe:B-Exp, Reader:I-Exp, vulnerability:I-Exp, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In order to carry out this operation , it uses publicly available tools , including Mimikatz ( Hacktool.Mimikatz ) and an open-source tool that exploits a known Windows privilege escalation vulnerability ( CVE-2016-0051 ) on unpatched computers .' [/INST] [In:O, order:O, to:O, carry:O, out:O, this:O, operation:O, ,:O, it:O, uses:O, publicly:B-Tool, available:I-Tool, tools:I-Tool, ,:O, including:O, Mimikatz:B-Tool, (:O, Hacktool.Mimikatz:B-Tool, ):O, and:O, an:O, open-source:O, tool:O, that:O, exploits:O, a:O, known:O, Windows:O, privilege:O, escalation:O, vulnerability:O, (:O, CVE-2016-0051:B-Exp, ):O, on:O, unpatched:O, computers:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Each of the spear phishing attacks contained links to .doc files , which were really RTF documents that attempt to exploit CVE-2017-8570 ( Composite Moniker ) .' [/INST] [Each:O, of:O, the:O, spear:B-OffAct, phishing:I-OffAct, attacks:I-OffAct, contained:O, links:O, to:O, .doc:B-Tool, files:I-Tool, ,:O, which:O, were:O, really:O, RTF:B-SamFile, documents:I-SamFile, that:O, attempt:O, to:O, exploit:O, CVE-2017-8570:B-Exp, (:O, Composite:B-Exp, Moniker:B-Exp, ):O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The Word document usually exploits CVE-2012-0158 .' [/INST] [The:O, Word:B-SamFile, document:I-SamFile, usually:O, exploits:O, CVE-2012-0158:B-Exp, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Sometimes the attackers send an MS PowerPoint document instead , which exploits CVE-2014-6352 .' [/INST] [Sometimes:O, the:O, attackers:B-HackOrg, send:O, an:O, MS:B-SamFile, PowerPoint:I-SamFile, document:I-SamFile, instead:O, ,:O, which:O, exploits:O, CVE-2014-6352:B-Exp, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Sometimes Patchwork send an MS PowerPoint document instead , which exploits CVE-2014-6352 .' [/INST] [Sometimes:O, Patchwork:B-HackOrg, send:O, an:O, MS:B-SamFile, PowerPoint:I-SamFile, document:I-SamFile, instead:O, ,:O, which:O, exploits:O, CVE-2014-6352:B-Exp, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The malicious documents that Unit 42 examined contained legitimate decoy lures as well as malicious embedded EPS files targeting the CVE-2015-2545 and CVE-2017-0261 vulnerabilities .' [/INST] [The:O, malicious:O, documents:O, that:O, Unit:B-SecTeam, 42:I-SecTeam, examined:O, contained:O, legitimate:O, decoy:O, lures:O, as:O, well:O, as:O, malicious:O, embedded:O, EPS:B-SamFile, files:I-SamFile, targeting:O, the:O, CVE-2015-2545:B-Exp, and:O, CVE-2017-0261:B-Exp, vulnerabilities:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'One of the favorite methods used by the Pitty Tiger group to infect users is to use a Microsoft Office Word document which exploits a specific vulnerability ( CVE-2012-0158 ) .' [/INST] [One:O, of:O, the:O, favorite:O, methods:O, used:O, by:O, the:O, Pitty:B-HackOrg, Tiger:I-HackOrg, group:I-HackOrg, to:O, infect:O, users:O, is:O, to:O, use:O, a:O, Microsoft:B-SamFile, Office:I-SamFile, Word:I-SamFile, document:I-SamFile, which:O, exploits:O, a:O, specific:O, vulnerability:O, (:O, CVE-2012-0158:B-Exp, ):O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The document , when opened , used an embedded ActiveX control to download a JavaScript file from a remote site that used a previously unknown vulnerability in some versions of Windows ( later designated CVE-2013-7331 ) to read information about the browser 's installed components .' [/INST] [The:O, document:O, ,:O, when:O, opened:O, ,:O, used:O, an:O, embedded:O, ActiveX:B-Tool, control:I-Tool, to:O, download:O, a:O, JavaScript:B-SamFile, file:I-SamFile, from:O, a:O, remote:O, site:O, that:O, used:O, a:O, previously:O, unknown:O, vulnerability:O, in:O, some:O, versions:O, of:O, Windows:O, (:O, later:O, designated:O, CVE-2013-7331:B-Exp, ):O, to:O, read:O, information:O, about:O, the:O, browser:O, 's:O, installed:O, components:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The document files exploit at least three known vulnerabilities in Microsoft Office , which we discuss in the Infection Techniques section .' [/INST] [The:O, document:B-SamFile, files:I-SamFile, exploit:O, at:O, least:O, three:O, known:O, vulnerabilities:B-Exp, in:O, Microsoft:O, Office:O, ,:O, which:O, we:O, discuss:O, in:O, the:O, Infection:O, Techniques:O, section:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In all emails sent to these government officials , the actor used the same attachment : a malicious Microsoft Word document that exploited the CVE-2012-0158 vulnerability to drop a malicious payload .' [/INST] [In:O, all:O, emails:B-Way, sent:O, to:O, these:O, government:B-Org, officials:I-Org, ,:O, the:O, actor:O, used:O, the:O, same:O, attachment:O, ::O, a:O, malicious:B-SamFile, Microsoft:I-SamFile, Word:I-SamFile, document:I-SamFile, that:O, exploited:O, the:O, CVE-2012-0158:B-Exp, vulnerability:O, to:O, drop:O, a:O, malicious:O, payload:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'According to the security firm , this campaign targeted Indian military officials via spear-phishing emails , distributing spyware to its victims via an Adobe Reader vulnerability .' [/INST] [According:O, to:O, the:O, security:B-Org, firm:I-Org, ,:O, this:O, campaign:B-OffAct, targeted:O, Indian:O, military:B-Org, officials:I-Org, via:O, spear-phishing:B-Way, emails:I-Way, ,:O, distributing:O, spyware:O, to:O, its:O, victims:O, via:O, an:O, Adobe:B-Exp, Reader:I-Exp, vulnerability:I-Exp, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'PLATINUM 's persistent use of spear phishing tactics ( phishing attempts aimed at specific individuals ) and access to previously undiscovered zero-day exploits have made it a highly resilient threat .' [/INST] [PLATINUM:B-HackOrg, 's:O, persistent:O, use:O, of:O, spear:B-Way, phishing:I-Way, tactics:I-Way, (:O, phishing:B-Way, attempts:O, aimed:O, at:O, specific:B-Org, individuals:I-Org, ):O, and:O, access:O, to:O, previously:O, undiscovered:O, zero-day:B-Exp, exploits:I-Exp, have:O, made:O, it:O, a:O, highly:O, resilient:O, threat:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The group 's persistent use of spear phishing tactics ( phishing attempts aimed at specific individuals ) and access to previously undiscovered zero-day exploits have made it a highly resilient threat .' [/INST] [The:O, group:B-HackOrg, 's:O, persistent:O, use:O, of:O, spear:B-Way, phishing:I-Way, tactics:I-Way, (:O, phishing:B-Way, attempts:O, aimed:O, at:O, specific:B-Org, individuals:I-Org, ):O, and:O, access:O, to:O, previously:O, undiscovered:O, zero-day:B-Exp, exploits:I-Exp, have:O, made:O, it:O, a:O, highly:O, resilient:O, threat:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'We believe that the Carbanak campaign is a clear indicator of a new era in cybercrime in which criminals use APT techniques directly against the financial industry instead of through its customers .' [/INST] [We:O, believe:O, that:O, the:O, Carbanak:B-Exp, campaign:B-OffAct, is:O, a:O, clear:O, indicator:O, of:O, a:O, new:O, era:O, in:O, cybercrime:O, in:O, which:O, criminals:B-HackOrg, use:O, APT:B-Way, techniques:I-Way, directly:O, against:O, the:O, financial:B-Idus, industry:I-Idus, instead:O, of:O, through:O, its:O, customers:B-Org, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Carbanak has its origin in more common financial fraud including theft from consumer and corporate bank accounts in Europe and Russia , using standard banking malware , mainly Carberp .' [/INST] [Carbanak:B-Exp, has:O, its:O, origin:O, in:O, more:O, common:O, financial:O, fraud:O, including:O, theft:O, from:O, consumer:B-Org, and:O, corporate:O, bank:O, accounts:O, in:O, Europe:B-Area, and:O, Russia:B-Area, ,:O, using:O, standard:O, banking:O, malware:O, ,:O, mainly:O, Carberp:B-Tool, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'However , in September last year , our friends at CSIS published a blog detailing a new Carbanak variant affecting one of its customers .' [/INST] [However:O, ,:O, in:O, September:B-Time, last:O, year:O, ,:O, our:O, friends:O, at:O, CSIS:B-SecTeam, published:O, a:O, blog:O, detailing:O, a:O, new:O, Carbanak:B-Exp, variant:O, affecting:O, one:O, of:O, its:O, customers:B-Org, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'PIVY also played a key role in the 2011 campaign known as Nitro that targeted chemical makers , government agencies , defense contractors , and human rights groups.10,11 Still active a year later , the Nitro attackers used a zero-day vulnerability in Java to deploy PIVY in 2012 .' [/INST] [PIVY:B-Tool, also:O, played:O, a:O, key:O, role:O, in:O, the:O, 2011:B-OffAct, campaign:I-OffAct, known:O, as:O, Nitro:O, that:O, targeted:O, chemical:B-Org, makers:I-Org, ,:O, government:B-Org, agencies:I-Org, ,:O, defense:B-Org, contractors:I-Org, ,:O, and:O, human:O, rights:O, groups.10,11:O, Still:O, active:O, a:O, year:O, later:O, ,:O, the:O, Nitro:O, attackers:B-HackOrg, used:O, a:O, zero-day:B-Exp, vulnerability:I-Exp, in:O, Java:O, to:O, deploy:O, PIVY:B-Tool, in:O, 2012:B-Time, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Each of the spear phishing attacks contained links to .doc files , which were really RTF documents that attempt to exploit CVE-2017-8570 ( Composite Moniker ) .' [/INST] [Each:O, of:O, the:O, spear:B-OffAct, phishing:I-OffAct, attacks:I-OffAct, contained:O, links:O, to:O, .doc:B-Tool, files:I-Tool, ,:O, which:O, were:O, really:O, RTF:B-SamFile, documents:I-SamFile, that:O, attempt:O, to:O, exploit:O, CVE-2017-8570:B-Exp, (:O, Composite:B-Exp, Moniker:B-Exp, ):O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The Word document usually exploits CVE-2012-0158 .' [/INST] [The:O, Word:B-SamFile, document:I-SamFile, usually:O, exploits:O, CVE-2012-0158:B-Exp, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Sometimes the attackers send an MS PowerPoint document instead , which exploits CVE-2014-6352 .' [/INST] [Sometimes:O, the:O, attackers:B-HackOrg, send:O, an:O, MS:B-SamFile, PowerPoint:I-SamFile, document:I-SamFile, instead:O, ,:O, which:O, exploits:O, CVE-2014-6352:B-Exp, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Sometimes Patchwork send an MS PowerPoint document instead , which exploits CVE-2014-6352 .' [/INST] [Sometimes:O, Patchwork:B-HackOrg, send:O, an:O, MS:B-SamFile, PowerPoint:I-SamFile, document:I-SamFile, instead:O, ,:O, which:O, exploits:O, CVE-2014-6352:B-Exp, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The malicious documents that Unit 42 examined contained legitimate decoy lures as well as malicious embedded EPS files targeting the CVE-2015-2545 and CVE-2017-0261 vulnerabilities .' [/INST] [The:O, malicious:O, documents:O, that:O, Unit:B-SecTeam, 42:I-SecTeam, examined:O, contained:O, legitimate:O, decoy:O, lures:O, as:O, well:O, as:O, malicious:O, embedded:O, EPS:B-SamFile, files:I-SamFile, targeting:O, the:O, CVE-2015-2545:B-Exp, and:O, CVE-2017-0261:B-Exp, vulnerabilities:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Older documents used by Patchwork focused on the CVE-2017-0261 vulnerability , however in late January 2018 when , paradoxically , newer documents abandoned this vulnerability to attack the older CVE-2015-2545 vulnerability .' [/INST] [Older:O, documents:O, used:O, by:O, Patchwork:B-HackOrg, focused:O, on:O, the:O, CVE-2017-0261:B-Exp, vulnerability:O, ,:O, however:O, in:O, late:B-Time, January:I-Time, 2018:I-Time, when:O, ,:O, paradoxically:O, ,:O, newer:O, documents:O, abandoned:O, this:O, vulnerability:O, to:O, attack:O, the:O, older:O, CVE-2015-2545:B-Exp, vulnerability:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'PittyTiger has also been seen using Heartbleed vulnerability in order to directly get valid credentials .' [/INST] [PittyTiger:B-HackOrg, has:O, also:O, been:O, seen:O, using:O, Heartbleed:B-Exp, vulnerability:I-Exp, in:O, order:O, to:O, directly:O, get:B-Purp, valid:I-Purp, credentials:I-Purp, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'They have also been seen using Heartbleed vulnerability in order to directly get valid credentials .' [/INST] [They:O, have:O, also:O, been:O, seen:O, using:O, Heartbleed:B-Exp, vulnerability:I-Exp, in:O, order:O, to:O, directly:O, get:B-Purp, valid:I-Purp, credentials:I-Purp, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'One of the favorite methods used by the Pitty Tiger group to infect users is to use a Microsoft Office Word document which exploits a specific vulnerability ( CVE-2012-0158 ) .' [/INST] [One:O, of:O, the:O, favorite:O, methods:O, used:O, by:O, the:O, Pitty:B-HackOrg, Tiger:I-HackOrg, group:I-HackOrg, to:O, infect:O, users:O, is:O, to:O, use:O, a:O, Microsoft:B-SamFile, Office:I-SamFile, Word:I-SamFile, document:I-SamFile, which:O, exploits:O, a:O, specific:O, vulnerability:O, (:O, CVE-2012-0158:B-Exp, ):O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'PittyTiger could also use CVE-2014-1761 , which is more recent .' [/INST] [PittyTiger:B-HackOrg, could:O, also:O, use:O, CVE-2014-1761:B-Exp, ,:O, which:O, is:O, more:O, recent:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'PLATINUM is known to have used a number of zero-day exploits , for which no security update is available at the time of transmission , in these attempts .' [/INST] [PLATINUM:B-HackOrg, is:O, known:O, to:O, have:O, used:O, a:O, number:O, of:O, zero-day:B-Exp, exploits:I-Exp, ,:O, for:O, which:O, no:O, security:O, update:O, is:O, available:O, at:O, the:O, time:O, of:O, transmission:O, ,:O, in:O, these:O, attempts:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The document , when opened , used an embedded ActiveX control to download a JavaScript file from a remote site that used a previously unknown vulnerability in some versions of Windows ( later designated CVE-2013-7331 ) to read information about the browser 's installed components .' [/INST] [The:O, document:O, ,:O, when:O, opened:O, ,:O, used:O, an:O, embedded:O, ActiveX:B-Tool, control:I-Tool, to:O, download:O, a:O, JavaScript:B-SamFile, file:I-SamFile, from:O, a:O, remote:O, site:O, that:O, used:O, a:O, previously:O, unknown:O, vulnerability:O, in:O, some:O, versions:O, of:O, Windows:O, (:O, later:O, designated:O, CVE-2013-7331:B-Exp, ):O, to:O, read:O, information:O, about:O, the:O, browser:O, 's:O, installed:O, components:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'When the document was opened in Word , PLATINUM exploited a previously unknown vulnerability in the Microsoft Office PostScript interpreter ( designated CVE-2015-2545 ) that enabled it to execute the attacker 's code and drop an attacker-generated malicious DLL onto the computer .' [/INST] [When:O, the:O, document:O, was:O, opened:O, in:O, Word:B-Tool, ,:O, PLATINUM:B-HackOrg, exploited:O, a:O, previously:O, unknown:O, vulnerability:O, in:O, the:O, Microsoft:O, Office:O, PostScript:O, interpreter:O, (:O, designated:O, CVE-2015-2545:B-Exp, ):O, that:O, enabled:O, it:O, to:O, execute:O, the:O, attacker:B-HackOrg, 's:O, code:O, and:O, drop:O, an:O, attacker-generated:O, malicious:B-Way, DLL:I-Way, onto:O, the:O, computer:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The DLL exploited another previously unknown vulnerability ( designated CVE-2015-2546 ) in the Windows kernel , which enabled it to elevate privileges for the Word executable and subsequently install a backdoor through the application .' [/INST] [The:O, DLL:B-Tool, exploited:O, another:O, previously:O, unknown:O, vulnerability:O, (:O, designated:O, CVE-2015-2546:B-Exp, ):O, in:O, the:O, Windows:O, kernel:O, ,:O, which:O, enabled:O, it:O, to:O, elevate:O, privileges:O, for:O, the:O, Word:B-Tool, executable:O, and:O, subsequently:O, install:O, a:O, backdoor:O, through:O, the:O, application:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'When the document was opened in Word , it exploited a previously unknown vulnerability in the Microsoft Office PostScript interpreter ( designated CVE-2015-2545 ) that enabled it to execute the attacker 's code and drop an attacker-generated malicious DLL onto the computer .' [/INST] [When:O, the:O, document:O, was:O, opened:O, in:O, Word:B-Tool, ,:O, it:O, exploited:O, a:O, previously:O, unknown:O, vulnerability:O, in:O, the:O, Microsoft:O, Office:O, PostScript:O, interpreter:O, (:O, designated:O, CVE-2015-2545:B-Exp, ):O, that:O, enabled:O, it:O, to:O, execute:O, the:O, attacker:B-HackOrg, 's:O, code:O, and:O, drop:O, an:O, attacker-generated:O, malicious:B-Way, DLL:I-Way, onto:O, the:O, computer:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In total , PLATINUM made use of four zero-day exploits during these two attack campaigns ( two remote code execution bugs , one privilege escalation , and one information disclosure ) , showing an ability to spend a non-trivial amount of resources to either acquire professionally written zero-day exploits from unknown markets , or research and utilize the zero-day exploits themselves .' [/INST] [In:O, total:O, ,:O, PLATINUM:B-HackOrg, made:O, use:O, of:O, four:O, zero-day:B-Exp, exploits:I-Exp, during:O, these:O, two:O, attack:B-OffAct, campaigns:I-OffAct, (:O, two:O, remote:B-Way, code:I-Way, execution:I-Way, bugs:O, ,:O, one:O, privilege:O, escalation:O, ,:O, and:O, one:O, information:O, disclosure:O, ):O, ,:O, showing:O, an:O, ability:O, to:O, spend:O, a:O, non-trivial:O, amount:O, of:O, resources:O, to:O, either:O, acquire:O, professionally:O, written:O, zero-day:B-Exp, exploits:I-Exp, from:O, unknown:O, markets:O, ,:O, or:O, research:O, and:O, utilize:O, the:O, zero-day:B-Exp, exploits:I-Exp, themselves:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'PLATINUM has used several zero-day exploits against their victims .' [/INST] [PLATINUM:B-HackOrg, has:O, used:O, several:O, zero-day:B-Exp, exploits:I-Exp, against:O, their:O, victims:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Even if CVE-2015-2546 affected Windows 10 , the exploitation would have required much more technical prowess to succeed ; ultimately , SMEP makes it more difficult for attackers .' [/INST] [Even:O, if:O, CVE-2015-2546:B-Exp, affected:O, Windows:O, 10:O, ,:O, the:O, exploitation:O, would:O, have:O, required:O, much:O, more:O, technical:O, prowess:O, to:O, succeed:O, ;:O, ultimately:O, ,:O, SMEP:O, makes:O, it:O, more:O, difficult:O, for:O, attackers:B-HackOrg, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'For example , one zero-day vulnerability exploit ( CVE-2015-2545 ) used by PLATINUM was addressed immediately in September 2015 .' [/INST] [For:O, example:O, ,:O, one:O, zero-day:B-Exp, vulnerability:I-Exp, exploit:O, (:O, CVE-2015-2545:B-Exp, ):O, used:O, by:O, PLATINUM:B-HackOrg, was:O, addressed:O, immediately:O, in:O, September:B-Time, 2015:I-Time, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'It possesses a wide range of technical exploitation capabilities , significant resources for researching or purchasing complicated zero-day exploits , the ability to sustain persistence across victim networks for years , and the manpower to develop and maintain a large number of tools to use within unique victim networks .' [/INST] [It:O, possesses:O, a:O, wide:O, range:O, of:O, technical:B-Tool, exploitation:I-Tool, capabilities:I-Tool, ,:O, significant:O, resources:O, for:O, researching:O, or:O, purchasing:O, complicated:O, zero-day:B-Exp, exploits:I-Exp, ,:O, the:O, ability:O, to:O, sustain:O, persistence:O, across:O, victim:O, networks:O, for:O, years:O, ,:O, and:O, the:O, manpower:O, to:O, develop:O, and:O, maintain:O, a:O, large:O, number:O, of:O, tools:O, to:O, use:O, within:O, unique:O, victim:O, networks:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In 2016 , an attack campaign by this group was recorded in early May that made use of an exploit for CVE-2016-4117 , a vulnerability in Adobe Flash Player , which at the time was both unknown and unpatched .' [/INST] [In:O, 2016:B-Time, ,:O, an:O, attack:B-OffAct, campaign:I-OffAct, by:O, this:O, group:B-HackOrg, was:O, recorded:O, in:O, early:B-Time, May:I-Time, that:O, made:O, use:O, of:O, an:O, exploit:O, for:O, CVE-2016-4117:B-Exp, ,:O, a:O, vulnerability:O, in:O, Adobe:O, Flash:O, Player:O, ,:O, which:O, at:O, the:O, time:O, was:O, both:O, unknown:O, and:O, unpatched:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'To deliver the malware to the victim machines , the Rocke group exploits vulnerabilities in Apache Struts 2 , Oracle WebLogic , and Adobe ColdFusion .' [/INST] [To:O, deliver:O, the:O, malware:O, to:O, the:O, victim:O, machines:O, ,:O, the:O, Rocke:B-Exp, group:I-Exp, exploits:I-Exp, vulnerabilities:I-Exp, in:O, Apache:O, Struts:O, 2:O, ,:O, Oracle:O, WebLogic:O, ,:O, and:O, Adobe:O, ColdFusion:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'However , around a month ago , Rocke started targeting systems that run Jenkins by attempting to exploit CVE-2018-1000861 and CVE-2019-1003000 .' [/INST] [However:O, ,:O, around:O, a:O, month:O, ago:O, ,:O, Rocke:B-HackOrg, started:O, targeting:O, systems:O, that:O, run:O, Jenkins:O, by:O, attempting:O, to:O, exploit:O, CVE-2018-1000861:B-Exp, and:O, CVE-2019-1003000:B-Exp, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The Shadow Brokers first emerged in August , when they posted links to a selection of NSA exploits and hacking tools onto Github and other websites .' [/INST] [The:O, Shadow:O, Brokers:O, first:O, emerged:O, in:O, August:B-Time, ,:O, when:O, they:O, posted:O, links:O, to:O, a:O, selection:O, of:O, NSA:B-Exp, exploits:I-Exp, and:O, hacking:O, tools:O, onto:O, Github:O, and:O, other:O, websites:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In April , 2018 , the 360 Core Security takes the lead in capturing the APT-C-06 group’s new APT attack using 0-day vulnerabilities (CVE-2018-8174) in the wild .' [/INST] [In:O, April:B-Time, ,:O, 2018:B-Time, ,:O, the:O, 360:B-SecTeam, Core:I-SecTeam, Security:I-SecTeam, takes:O, the:O, lead:O, in:O, capturing:O, the:O, APT-C-06:B-HackOrg, group’s:O, new:O, APT:O, attack:O, using:O, 0-day:O, vulnerabilities:O, (CVE-2018-8174):B-Exp, in:O, the:O, wild:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The group has demonstrated access to zero-day vulnerabilities (CVE-2018-0802) , and the ability to incorporate them into operations .' [/INST] [The:O, group:B-HackOrg, has:O, demonstrated:O, access:O, to:O, zero-day:O, vulnerabilities:O, (CVE-2018-0802):B-Exp, ,:O, and:O, the:O, ability:O, to:O, incorporate:O, them:O, into:O, operations:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'FireEye observed a high volume of activity associated with the exploitation of CVE-2017-10271 following the public posting of proof of concept code in December 2017 .' [/INST] [FireEye:B-SecTeam, observed:O, a:O, high:O, volume:O, of:O, activity:O, associated:O, with:O, the:O, exploitation:O, of:O, CVE-2017-10271:B-Exp, following:O, the:O, public:O, posting:O, of:O, proof:O, of:O, concept:O, code:O, in:O, December:B-Time, 2017:I-Time, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'If the lateral movement with credentials fails , then the malware uses PingCastle MS17-010 scanner (PingCastle is a French Active Directory security tool) to scan that particular host to determine if its vulnerable to EternalBlue , and uses it to spread to that host .' [/INST] [If:O, the:O, lateral:O, movement:O, with:O, credentials:O, fails:O, ,:O, then:O, the:O, malware:O, uses:O, PingCastle:B-Tool, MS17-010:I-Tool, scanner:O, (PingCastle:O, is:O, a:O, French:B-Area, Active:O, Directory:O, security:O, tool):O, to:O, scan:O, that:O, particular:O, host:O, to:O, determine:O, if:O, its:O, vulnerable:O, to:O, EternalBlue:B-Exp, ,:O, and:O, uses:O, it:O, to:O, spread:O, to:O, that:O, host:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Tactic #1: Delivering the miner directly to a vulnerable serverSome tactics we've observed involve exploiting CVE-2017-10271 , leveraging PowerShell to download the miner directly onto the victim’s system (Figure 1) , and executing it using ShellExecute() .' [/INST] [Tactic:O, #1::O, Delivering:O, the:O, miner:O, directly:O, to:O, a:O, vulnerable:O, serverSome:O, tactics:O, we've:O, observed:O, involve:O, exploiting:O, CVE-2017-10271:B-Exp, ,:O, leveraging:O, PowerShell:B-Tool, to:O, download:B-Purp, the:O, miner:O, directly:O, onto:O, the:O, victim’s:O, system:O, (Figure:O, 1):O, ,:O, and:O, executing:B-Way, it:O, using:B-Way, ShellExecute():I-Way, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'We assess that the actors employing this latest Flash zero-day are a suspected North Korean group we track as TEMP.Reaper .' [/INST] [We:O, assess:O, that:O, the:O, actors:O, employing:O, this:O, latest:O, Flash:O, zero-day:B-Exp, are:O, a:O, suspected:O, North:B-Area, Korean:I-Area, group:O, we:O, track:O, as:O, TEMP.Reaper:B-HackOrg, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Figure 2: Zyklon attack flowInfection Techniques CVE-2017-8759 .' [/INST] [Figure:O, 2::O, Zyklon:B-HackOrg, attack:O, flowInfection:O, Techniques:O, CVE-2017-8759:B-Exp, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'This vulnerability was discovered by FireEye in September 2017 , and it is a vulnerability we have observed being exploited in the wild .' [/INST] [This:O, vulnerability:B-Exp, was:O, discovered:O, by:O, FireEye:B-SecTeam, in:O, September:B-Time, 2017:I-Time, ,:O, and:O, it:O, is:O, a:O, vulnerability:O, we:O, have:O, observed:O, being:O, exploited:O, in:O, the:O, wild:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Figure 3: Embedded URL in OLE object CVE-2017-11882 Similarly , we have also observed actors leveraging another recently discovered vulnerability (CVE-2017-11882) in Microsoft Office .' [/INST] [Figure:O, 3::O, Embedded:O, URL:O, in:O, OLE:O, object:O, CVE-2017-11882:B-Exp, Similarly:O, ,:O, we:O, have:O, also:O, observed:O, actors:B-HackOrg, leveraging:O, another:O, recently:O, discovered:O, vulnerability:O, (CVE-2017-11882):B-Exp, in:O, Microsoft:O, Office:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The other overlapping files are tools used by the adversary to locate other systems on the network (etool.exe) , check to see if they are vulnerable to CVE-2017-0144 (EternalBlue) patched in MS07-010 (checker1.exe) and pivot to them using remote execution functionality offered by a tool similar to PsExec offered by Impacket (psexec.exe) .' [/INST] [The:O, other:O, overlapping:O, files:O, are:O, tools:O, used:O, by:O, the:O, adversary:O, to:O, locate:O, other:O, systems:O, on:O, the:O, network:O, (etool.exe):O, ,:O, check:O, to:O, see:O, if:O, they:O, are:O, vulnerable:O, to:O, CVE-2017-0144:B-Exp, (EternalBlue):O, patched:O, in:O, MS07-010:B-SamFile, (checker1.exe):O, and:O, pivot:O, to:O, them:O, using:O, remote:O, execution:O, functionality:O, offered:O, by:O, a:O, tool:O, similar:O, to:O, PsExec:B-SamFile, offered:O, by:O, Impacket:O, (psexec.exe):O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The files uploaded to this webshell included the same compiled python script that would scan remote systems that were vulnerable to CVE-2017-0144 (EternalBlue) that we saw uploaded to the other errr.aspx webshell .' [/INST] [The:O, files:O, uploaded:O, to:O, this:O, webshell:O, included:O, the:O, same:O, compiled:O, python:B-Tool, script:I-Tool, that:O, would:O, scan:O, remote:O, systems:O, that:O, were:O, vulnerable:O, to:O, CVE-2017-0144:B-Exp, (EternalBlue):O, that:O, we:O, saw:O, uploaded:O, to:O, the:O, other:O, errr.aspx:B-SamFile, webshell:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'We believe the actors pivoted to other systems on the network using stolen credentials and by exploiting the CVE-2017-0144 (EternalBlue) vulnerability patched in MS17-010 .' [/INST] [We:O, believe:O, the:O, actors:B-HackOrg, pivoted:O, to:O, other:O, systems:O, on:O, the:O, network:O, using:O, stolen:B-OffAct, credentials:I-OffAct, and:O, by:O, exploiting:O, the:O, CVE-2017-0144:B-Exp, (EternalBlue):O, vulnerability:O, patched:O, in:O, MS17-010:B-SamFile, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Code contained inside one of the slides triggers an exploit for CVE-2017-8759 , a remote code execution vulnerability in Microsoft .NET framework .' [/INST] [Code:O, contained:O, inside:O, one:O, of:O, the:O, slides:B-SamFile, triggers:O, an:O, exploit:O, for:O, CVE-2017-8759:B-Exp, ,:O, a:O, remote:O, code:O, execution:O, vulnerability:O, in:O, Microsoft:B-Tool, .NET:I-Tool, framework:I-Tool, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'According to FireEye , the admin@338 sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL .' [/INST] [According:O, to:O, FireEye:B-SecTeam, ,:O, the:O, admin@338:B-HackOrg, sent:O, out:O, emails:B-Way, containing:O, malicious:O, documents:O, designed:O, to:O, exploit:O, Microsoft:B-Exp, Office:I-Exp, vulnerabilities:I-Exp, in:O, an:O, effort:O, to:O, deliver:O, a:O, piece:O, of:O, malware:O, dubbed:O, LOWBALL:B-Tool, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'According to FireEye , the attackers sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL .' [/INST] [According:O, to:O, FireEye:B-SecTeam, ,:O, the:O, attackers:B-HackOrg, sent:O, out:O, emails:B-Way, containing:O, malicious:O, documents:O, designed:O, to:O, exploit:O, Microsoft:B-Exp, Office:I-Exp, vulnerabilities:I-Exp, in:O, an:O, effort:O, to:O, deliver:O, a:O, piece:O, of:O, malware:O, dubbed:O, LOWBALL:B-Tool, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Similar to RIPTIDE campaigns , APT12 infects target systems with HIGHTIDE using a Microsoft Word ( .doc ) document that exploits CVE-2012-0158 .' [/INST] [Similar:O, to:O, RIPTIDE:B-OffAct, campaigns:I-OffAct, ,:O, APT12:B-HackOrg, infects:O, target:O, systems:O, with:O, HIGHTIDE:B-Tool, using:O, a:O, Microsoft:B-Tool, Word:I-Tool, (:O, .doc:B-Tool, ):O, document:O, that:O, exploits:O, CVE-2012-0158:B-Exp, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The Sofacy group spearphished targets in several waves with Flash exploits leading to their Carberp based JHUHUGIT downloaders and further stages of malware .' [/INST] [The:O, Sofacy:B-HackOrg, group:I-HackOrg, spearphished:O, targets:O, in:O, several:O, waves:O, with:O, Flash:B-Exp, exploits:I-Exp, leading:O, to:O, their:O, Carberp:B-Tool, based:O, JHUHUGIT:B-Tool, downloaders:I-Tool, and:O, further:O, stages:O, of:O, malware:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'APT28 spearphished targets in several waves with Flash exploits leading to their Carberp based JHUHUGIT downloaders and further stages of malware .' [/INST] [APT28:B-HackOrg, spearphished:O, targets:O, in:O, several:O, waves:O, with:O, Flash:B-Exp, exploits:I-Exp, leading:O, to:O, their:O, Carberp:B-Tool, based:O, JHUHUGIT:B-Tool, downloaders:I-Tool, and:O, further:O, stages:O, of:O, malware:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The group spearphished targets in several waves with Flash exploits leading to their Carberp based JHUHUGIT downloaders and further stages of malware .' [/INST] [The:O, group:B-HackOrg, spearphished:O, targets:O, in:O, several:O, waves:O, with:O, Flash:B-Exp, exploits:I-Exp, leading:O, to:O, their:O, Carberp:B-Tool, based:O, JHUHUGIT:B-Tool, downloaders:I-Tool, and:O, further:O, stages:O, of:O, malware:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'APT28 is using novel techniques involving the EternalBlue exploit and the open source tool Responder to spread laterally through networks and likely target travelers .' [/INST] [APT28:B-HackOrg, is:O, using:O, novel:O, techniques:O, involving:O, the:O, EternalBlue:B-Exp, exploit:I-Exp, and:O, the:O, open:B-Tool, source:I-Tool, tool:I-Tool, Responder:B-Tool, to:O, spread:B-Purp, laterally:I-Purp, through:I-Purp, networks:I-Purp, and:O, likely:O, target:O, travelers:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The JHUHUGIT implant became a relatively popular first stage for the Sofacy attacks and was used again with a Java zero-day ( CVE-2015-2590 ) in July 2015 .' [/INST] [The:O, JHUHUGIT:B-Tool, implant:O, became:O, a:O, relatively:O, popular:O, first:O, stage:O, for:O, the:O, Sofacy:B-OffAct, attacks:I-OffAct, and:O, was:O, used:O, again:O, with:O, a:O, Java:B-Exp, zero-day:I-Exp, (:O, CVE-2015-2590:B-Exp, ):O, in:O, July:B-Time, 2015:I-Time, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'We are however only aware of one instance - the exploitation of CVE-2013-0640 to deploy MiniDuke - where we believe the exploited vulnerability was a zero-day at the time that the group acquired the exploit .' [/INST] [We:O, are:O, however:O, only:O, aware:O, of:O, one:O, instance:O, -:O, the:O, exploitation:O, of:O, CVE-2013-0640:B-Exp, to:O, deploy:O, MiniDuke:B-Tool, -:O, where:O, we:O, believe:O, the:O, exploited:O, vulnerability:O, was:O, a:O, zero-day:B-Exp, at:O, the:O, time:O, that:O, the:O, group:B-HackOrg, acquired:O, the:O, exploit:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'FireEye confirmed that since at least November 2017 , APT37 exploited a zero-day Adobe Flash vulnerability , CVE-2018-4878 , to distribute DOGCALL malware to South Korean victims .' [/INST] [FireEye:B-SecTeam, confirmed:O, that:O, since:O, at:O, least:O, November:B-Time, 2017:I-Time, ,:O, APT37:B-HackOrg, exploited:O, a:O, zero-day:B-Exp, Adobe:I-Exp, Flash:I-Exp, vulnerability:I-Exp, ,:O, CVE-2018-4878:B-Exp, ,:O, to:O, distribute:O, DOGCALL:B-Tool, malware:I-Tool, to:O, South:B-Area, Korean:I-Area, victims:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'FireEye iSIGHT Intelligence confirmed that since at least November 2017 , APT37 exploited a zero-day Adobe Flash vulnerability , CVE-2018-4878 , to distribute DOGCALL malware to South Korean victims .' [/INST] [FireEye:B-SecTeam, iSIGHT:I-SecTeam, Intelligence:I-SecTeam, confirmed:O, that:O, since:O, at:O, least:O, November:B-Time, 2017:I-Time, ,:O, APT37:B-HackOrg, exploited:O, a:O, zero-day:B-Exp, Adobe:I-Exp, Flash:I-Exp, vulnerability:I-Exp, ,:O, CVE-2018-4878:B-Exp, ,:O, to:O, distribute:O, DOGCALL:B-Tool, malware:I-Tool, to:O, South:B-Area, Korean:I-Area, victims:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'A well-funded , highly active group of Middle Eastern hackers was caught , yet again , using a lucrative zero-day exploit in the wild to break into computers and infect them with powerful spyware developed by an infamous cyberweapons dealer named Gamma Group .' [/INST] [A:O, well-funded:O, ,:O, highly:O, active:O, group:B-HackOrg, of:O, Middle:B-Area, Eastern:I-Area, hackers:B-HackOrg, was:O, caught:O, ,:O, yet:O, again:O, ,:O, using:O, a:O, lucrative:O, zero-day:B-Exp, exploit:I-Exp, in:O, the:O, wild:O, to:O, break:O, into:O, computers:O, and:O, infect:O, them:O, with:O, powerful:O, spyware:O, developed:O, by:O, an:O, infamous:O, cyberweapons:O, dealer:O, named:O, Gamma:B-HackOrg, Group:I-HackOrg, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'A well-funded , highly active BlackOasis group of Middle Eastern hackers was caught , yet again , using a lucrative zero-day exploit in the wild to break into computers and infect them with powerful spyware developed by an infamous cyberweapons dealer named Gamma Group .' [/INST] [A:O, well-funded:O, ,:O, highly:O, active:O, BlackOasis:B-HackOrg, group:I-HackOrg, of:O, Middle:B-Area, Eastern:I-Area, hackers:B-HackOrg, was:O, caught:O, ,:O, yet:O, again:O, ,:O, using:O, a:O, lucrative:O, zero-day:B-Exp, exploit:I-Exp, in:O, the:O, wild:O, to:O, break:O, into:O, computers:O, and:O, infect:O, them:O, with:O, powerful:O, spyware:O, developed:O, by:O, an:O, infamous:O, cyberweapons:O, dealer:O, named:O, Gamma:B-HackOrg, Group:I-HackOrg, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Kaspersky found the BlackOasis group was exploiting a Adobe Flash Player zero-day vulnerability ( CVE-2016-4117 ) to remotely deliver the latest version of , FinSpy , malware , according to a new blog post published Monday .' [/INST] [Kaspersky:B-SecTeam, found:O, the:O, BlackOasis:B-HackOrg, group:I-HackOrg, was:O, exploiting:O, a:O, Adobe:B-Exp, Flash:I-Exp, Player:I-Exp, zero-day:I-Exp, vulnerability:I-Exp, (:O, CVE-2016-4117:B-Exp, ):O, to:O, remotely:O, deliver:O, the:O, latest:O, version:O, of:O, ,:O, FinSpy:B-Tool, ,:O, malware:O, ,:O, according:O, to:O, a:O, new:O, blog:O, post:O, published:O, Monday:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Kaspersky found the group was exploiting a Adobe Flash Player zero-day vulnerability ( CVE-2016-4117 ) to remotely deliver the latest version of , FinSpy , malware , according to a new blog post published Monday .' [/INST] [Kaspersky:B-SecTeam, found:O, the:O, group:B-HackOrg, was:O, exploiting:O, a:O, Adobe:B-Exp, Flash:I-Exp, Player:I-Exp, zero-day:I-Exp, vulnerability:I-Exp, (:O, CVE-2016-4117:B-Exp, ):O, to:O, remotely:O, deliver:O, the:O, latest:O, version:O, of:O, ,:O, FinSpy:B-Tool, ,:O, malware:O, ,:O, according:O, to:O, a:O, new:O, blog:O, post:O, published:O, Monday:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'BRONZE BUTLER has demonstrated the ability to identify a significant zero-day vulnerability within a popular Japanese corporate tool and then use scan-and-exploit techniques to indiscriminately compromise Japanese Internet-facing enterprise systems .' [/INST] [BRONZE:B-HackOrg, BUTLER:I-HackOrg, has:O, demonstrated:O, the:O, ability:O, to:O, identify:O, a:O, significant:O, zero-day:B-Exp, vulnerability:I-Exp, within:O, a:O, popular:O, Japanese:B-Area, corporate:O, tool:O, and:O, then:O, use:O, scan-and-exploit:B-Way, techniques:I-Way, to:O, indiscriminately:O, compromise:O, Japanese:B-Area, Internet-facing:O, enterprise:O, systems:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The group has demonstrated the ability to identify a significant zero-day vulnerability within a popular Japanese corporate tool and then use scan-and-exploit techniques to indiscriminately compromise Japanese Internet-facing enterprise systems .' [/INST] [The:O, group:B-HackOrg, has:O, demonstrated:O, the:O, ability:O, to:O, identify:O, a:O, significant:O, zero-day:B-Exp, vulnerability:I-Exp, within:O, a:O, popular:O, Japanese:B-Area, corporate:O, tool:O, and:O, then:O, use:O, scan-and-exploit:B-Way, techniques:I-Way, to:O, indiscriminately:O, compromise:O, Japanese:B-Area, Internet-facing:O, enterprise:O, systems:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'BRONZE BUTLER has used phishing emails with Flash animation attachments to download and execute Daserf malware , and has also leveraged Flash exploits for SWC attacks .' [/INST] [BRONZE:B-HackOrg, BUTLER:I-HackOrg, has:O, used:O, phishing:B-Way, emails:I-Way, with:O, Flash:O, animation:O, attachments:O, to:O, download:O, and:O, execute:O, Daserf:B-Tool, malware:I-Tool, ,:O, and:O, has:O, also:O, leveraged:O, Flash:B-Exp, exploits:I-Exp, for:O, SWC:B-OffAct, attacks:I-OffAct, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The group has used phishing emails with Flash animation attachments to download and execute Daserf malware , and has also leveraged Flash exploits for SWC attacks .' [/INST] [The:O, group:B-HackOrg, has:O, used:O, phishing:B-Way, emails:I-Way, with:O, Flash:O, animation:O, attachments:O, to:O, download:O, and:O, execute:O, Daserf:B-Tool, malware:I-Tool, ,:O, and:O, has:O, also:O, leveraged:O, Flash:B-Exp, exploits:I-Exp, for:O, SWC:B-OffAct, attacks:I-OffAct, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'While investigating a 2016 intrusion , Secureworks identified BRONZE BUTLER exploiting a then-unpatched remote code execution vulnerability ( CVE-2016-7836 ) in SKYSEA Client View , a popular Japanese product used to manage an organization .' [/INST] [While:O, investigating:O, a:O, 2016:B-Time, intrusion:O, ,:O, Secureworks:B-SecTeam, identified:O, BRONZE:B-HackOrg, BUTLER:I-HackOrg, exploiting:O, a:O, then-unpatched:O, remote:B-Way, code:I-Way, execution:I-Way, vulnerability:O, (:O, CVE-2016-7836:B-Exp, ):O, in:O, SKYSEA:O, Client:O, View:O, ,:O, a:O, popular:O, Japanese:B-Area, product:O, used:O, to:O, manage:O, an:O, organization:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'While investigating a 2016 intrusion , Secureworks incident responders identified BRONZE BUTLER exploiting a then-unpatched remote code execution vulnerability ( CVE-2016-7836 ) in SKYSEA Client View , a popular Japanese product used to manage an organization .' [/INST] [While:O, investigating:O, a:O, 2016:B-Time, intrusion:O, ,:O, Secureworks:B-SecTeam, incident:O, responders:O, identified:O, BRONZE:B-HackOrg, BUTLER:I-HackOrg, exploiting:O, a:O, then-unpatched:O, remote:B-Way, code:I-Way, execution:I-Way, vulnerability:O, (:O, CVE-2016-7836:B-Exp, ):O, in:O, SKYSEA:O, Client:O, View:O, ,:O, a:O, popular:O, Japanese:B-Area, product:O, used:O, to:O, manage:O, an:O, organization:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Carbanak is a remote backdoor ( initially based on Carberp ) , designed for espionage , data exfiltration and to provide remote access to infected machines .' [/INST] [Carbanak:B-Exp, is:O, a:O, remote:O, backdoor:O, (:O, initially:O, based:O, on:O, Carberp:B-Tool, ):O, ,:O, designed:O, for:O, espionage:B-HackOrg, ,:O, data:B-Purp, exfiltration:I-Purp, and:O, to:O, provide:B-Purp, remote:I-Purp, access:I-Purp, to:O, infected:O, machines:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'If found on the target system , Carbanak will try to exploit a known vulnerability in Windows XP , Windows Server 2003 , Windows Vista , Windows Server 2008 , Windows 7 , Windows 8 , and Windows Server 2012 , CVE-2013-3660 , for local privilege escalation .' [/INST] [If:O, found:O, on:O, the:O, target:O, system:O, ,:O, Carbanak:B-Exp, will:O, try:O, to:O, exploit:O, a:O, known:O, vulnerability:O, in:O, Windows:O, XP:O, ,:O, Windows:O, Server:O, 2003:O, ,:O, Windows:O, Vista:O, ,:O, Windows:O, Server:O, 2008:O, ,:O, Windows:O, 7:O, ,:O, Windows:O, 8:O, ,:O, and:O, Windows:O, Server:O, 2012:O, ,:O, CVE-2013-3660:B-Exp, ,:O, for:O, local:B-Purp, privilege:I-Purp, escalation:I-Purp, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'To enable connections to the infected computer using the Remote Desktop Protocol ( RDP ) , Carbanak sets Termservice service execution mode to Auto .' [/INST] [To:O, enable:O, connections:B-Purp, to:I-Purp, the:I-Purp, infected:I-Purp, computer:I-Purp, using:O, the:O, Remote:B-Tool, Desktop:I-Tool, Protocol:I-Tool, (:O, RDP:B-Tool, ):O, ,:O, Carbanak:B-Exp, sets:O, Termservice:O, service:O, execution:O, mode:O, to:O, Auto:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Carbanak is also aware of the IFOBS banking application and can , on command , substitute the details of payment documents in the IFOBS system .' [/INST] [Carbanak:B-Exp, is:O, also:O, aware:O, of:O, the:O, IFOBS:O, banking:O, application:O, and:O, can:O, ,:O, on:O, command:O, ,:O, substitute:O, the:O, details:O, of:O, payment:O, documents:O, in:O, the:O, IFOBS:O, system:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Sensitive bank documents have be found on the servers that were controlling Carbanak .' [/INST] [Sensitive:O, bank:O, documents:O, have:O, be:O, found:O, on:O, the:O, servers:O, that:O, were:O, controlling:O, Carbanak:B-Exp, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Existing telemetry indicates that the Carbanak attackers are trying to expand operations to other Baltic and Central Europe countries , the Middle East , Asia and Africa .' [/INST] [Existing:O, telemetry:O, indicates:O, that:O, the:O, Carbanak:B-Exp, attackers:B-HackOrg, are:O, trying:O, to:O, expand:O, operations:O, to:O, other:O, Baltic:B-Area, and:O, Central:B-Area, Europe:I-Area, countries:O, ,:O, the:O, Middle:B-Area, East:I-Area, ,:O, Asia:B-Area, and:O, Africa:B-Area, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'We believe that the Carbanak campaign is a clear indicator of a new era in cybercrime in which criminals use APT techniques directly against the financial industry instead of through its customers .' [/INST] [We:O, believe:O, that:O, the:O, Carbanak:B-Exp, campaign:B-OffAct, is:O, a:O, clear:O, indicator:O, of:O, a:O, new:O, era:O, in:O, cybercrime:O, in:O, which:O, criminals:B-HackOrg, use:O, APT:B-Way, techniques:I-Way, directly:O, against:O, the:O, financial:B-Idus, industry:I-Idus, instead:O, of:O, through:O, its:O, customers:B-Org, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'This report describes the details and type of operations carried out by Carbanak that focuses on financial industry , such as payment providers , retail industry and PR companies .' [/INST] [This:O, report:O, describes:O, the:O, details:O, and:O, type:O, of:O, operations:O, carried:O, out:O, by:O, Carbanak:B-Exp, that:O, focuses:O, on:O, financial:B-Idus, industry:I-Idus, ,:O, such:O, as:O, payment:B-Org, providers:I-Org, ,:O, retail:B-Idus, industry:I-Idus, and:O, PR:B-Org, companies:I-Org, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Carbanak has its origin in more common financial fraud including theft from consumer and corporate bank accounts in Europe and Russia , using standard banking malware , mainly Carberp .' [/INST] [Carbanak:B-Exp, has:O, its:O, origin:O, in:O, more:O, common:O, financial:O, fraud:O, including:O, theft:O, from:O, consumer:B-Org, and:O, corporate:O, bank:O, accounts:O, in:O, Europe:B-Area, and:O, Russia:B-Area, ,:O, using:O, standard:O, banking:O, malware:O, ,:O, mainly:O, Carberp:B-Tool, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'From 2013 Carbanak intensified its activity focused on banks and electronic payment systems in Russia and in the post-Soviet space .' [/INST] [From:O, 2013:B-Time, Carbanak:B-Exp, intensified:O, its:O, activity:B-OffAct, focused:O, on:O, banks:B-Idus, and:O, electronic:B-Idus, payment:I-Idus, systems:O, in:O, Russia:B-Area, and:O, in:O, the:O, post-Soviet:B-Area, space:B-Idus, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Since 2013 Carbanak has successfully gained access to networks of more than 50 banks and 5 payment systems .' [/INST] [Since:O, 2013:B-Time, Carbanak:B-Exp, has:O, successfully:O, gained:O, access:O, to:O, networks:O, of:O, more:O, than:O, 50:O, banks:B-Idus, and:O, 5:O, payment:B-Idus, systems:I-Idus, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'To reduce the risk of losing access to the internal bank network , the Carbanak , in addition to malicious programs , also used for remote access legitimate programs such as Ammy Admin and Team Viewer .' [/INST] [To:O, reduce:O, the:O, risk:O, of:O, losing:O, access:O, to:O, the:O, internal:O, bank:O, network:O, ,:O, the:O, Carbanak:B-Exp, ,:O, in:O, addition:O, to:O, malicious:O, programs:O, ,:O, also:O, used:O, for:O, remote:O, access:O, legitimate:O, programs:O, such:O, as:O, Ammy:B-Tool, Admin:I-Tool, and:O, Team:B-Tool, Viewer:I-Tool, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Additionally the reports on Carbanak show a different picture , where banks targeted outside of Russia , specifically Europe , USA and Japan are mentioned , which does not match our research .' [/INST] [Additionally:O, the:O, reports:O, on:O, Carbanak:B-Exp, show:O, a:O, different:O, picture:O, ,:O, where:O, banks:B-Idus, targeted:O, outside:O, of:O, Russia:B-Area, ,:O, specifically:O, Europe:B-Area, ,:O, USA:B-Area, and:O, Japan:B-Area, are:O, mentioned:O, ,:O, which:O, does:O, not:O, match:O, our:O, research:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'These attacks have included criminal groups responsible for the delivery of NewPosThings , MalumPOS and PoSeidon point of sale Malware , as well as Carbanak from the Russian criminal organization we track as Carbon Spider .' [/INST] [These:O, attacks:B-OffAct, have:O, included:O, criminal:B-HackOrg, groups:I-HackOrg, responsible:O, for:O, the:O, delivery:O, of:O, NewPosThings:O, ,:O, MalumPOS:O, and:O, PoSeidon:B-HackOrg, point:O, of:O, sale:O, Malware:O, ,:O, as:O, well:O, as:O, Carbanak:B-Exp, from:O, the:O, Russian:B-Area, criminal:B-HackOrg, organization:I-HackOrg, we:O, track:O, as:O, Carbon:B-HackOrg, Spider:I-HackOrg, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The leader of the crime gang behind the Carbanak and Cobalt malware attacks targeting over a 100 financial institutions worldwide has been arrested in Alicante , Spain , after a complex investigation conducted by the Spanish National Police .' [/INST] [The:O, leader:O, of:O, the:O, crime:B-HackOrg, gang:I-HackOrg, behind:O, the:O, Carbanak:B-Exp, and:O, Cobalt:B-OffAct, malware:I-OffAct, attacks:I-OffAct, targeting:O, over:O, a:O, 100:O, financial:B-Org, institutions:I-Org, worldwide:O, has:O, been:O, arrested:O, in:O, Alicante:O, ,:O, Spain:B-Area, ,:O, after:O, a:O, complex:O, investigation:O, conducted:O, by:O, the:O, Spanish:O, National:O, Police:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Since 2013 , the cybercrime gang have attempted to attack banks , e-payment systems and financial institutions using pieces of malware they designed , known as Carbanak and Cobalt .' [/INST] [Since:O, 2013:B-Time, ,:O, the:O, cybercrime:B-HackOrg, gang:I-HackOrg, have:O, attempted:O, to:O, attack:O, banks:B-Idus, ,:O, e-payment:B-Idus, systems:O, and:O, financial:B-Org, institutions:I-Org, using:O, pieces:O, of:O, malware:O, they:O, designed:O, ,:O, known:O, as:O, Carbanak:B-Exp, and:O, Cobalt:B-Tool, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Other public tools used by the CopyKittens are Metasploit , a well-known free and open source framework for developing and executing exploit code against a remote target machine ; Mimikatz , a post-exploitation tool that performs credential dumping ; and Empire , a PowerShell and Python post-exploitation agent .' [/INST] [Other:O, public:O, tools:O, used:O, by:O, the:O, CopyKittens:B-HackOrg, are:O, Metasploit:B-Tool, ,:O, a:O, well-known:O, free:O, and:O, open:O, source:O, framework:O, for:O, developing:O, and:O, executing:O, exploit:O, code:O, against:O, a:O, remote:O, target:O, machine:O, ;:O, Mimikatz:B-Tool, ,:O, a:O, post-exploitation:O, tool:O, that:O, performs:O, credential:O, dumping:O, ;:O, and:O, Empire:B-Tool, ,:O, a:O, PowerShell:B-Tool, and:O, Python:O, post-exploitation:O, agent:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Just a few months later , in February 2015 , we announced the discovery of Carbanak , a cyber-criminal gang that used custom malware and APT techniques to steal millions of dollars while infecting hundreds of financial institutions in at least 30 countries .' [/INST] [Just:O, a:O, few:O, months:O, later:O, ,:O, in:O, February:B-Time, 2015:I-Time, ,:O, we:O, announced:O, the:O, discovery:O, of:O, Carbanak:B-Exp, ,:O, a:O, cyber-criminal:B-HackOrg, gang:I-HackOrg, that:O, used:O, custom:O, malware:O, and:O, APT:B-Way, techniques:I-Way, to:O, steal:B-Purp, millions:I-Purp, of:I-Purp, dollars:I-Purp, while:O, infecting:O, hundreds:O, of:O, financial:B-Org, institutions:I-Org, in:O, at:O, least:O, 30:O, countries:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'However , in September last year , our friends at CSIS published a blog detailing a new Carbanak variant affecting one of its customers .' [/INST] [However:O, ,:O, in:O, September:B-Time, last:O, year:O, ,:O, our:O, friends:O, at:O, CSIS:B-SecTeam, published:O, a:O, blog:O, detailing:O, a:O, new:O, Carbanak:B-Exp, variant:O, affecting:O, one:O, of:O, its:O, customers:B-Org, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In one remarkable case , the Carbanak 2.0 gang used its access to a financial institution that stores information about shareholders to change the ownership details of a large company .' [/INST] [In:O, one:O, remarkable:O, case:O, ,:O, the:O, Carbanak:B-Exp, 2.0:O, gang:O, used:O, its:O, access:O, to:O, a:O, financial:B-Org, institution:I-Org, that:O, stores:O, information:O, about:O, shareholders:O, to:O, change:O, the:O, ownership:O, details:O, of:O, a:O, large:O, company:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'This Gorgon Group campaign leveraged spear phishing emails with Microsoft Word documents exploiting CVE-2017-0199 .' [/INST] [This:O, Gorgon:B-OffAct, Group:I-OffAct, campaign:I-OffAct, leveraged:O, spear:B-Way, phishing:I-Way, emails:I-Way, with:O, Microsoft:B-SamFile, Word:I-SamFile, documents:I-SamFile, exploiting:O, CVE-2017-0199:B-Exp, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Ke3chang has also leveraged a Java zero-day vulnerability ( CVE-2012-4681 ) , as well as older , reliable exploits for Microsoft Word ( CVE-2010-3333 ) and Adobe PDF Reader ( CVE-2010-2883 ) .' [/INST] [Ke3chang:B-HackOrg, has:O, also:O, leveraged:O, a:O, Java:B-Exp, zero-day:I-Exp, vulnerability:I-Exp, (:O, CVE-2012-4681:B-Exp, ):O, ,:O, as:O, well:O, as:O, older:O, ,:O, reliable:O, exploits:O, for:O, Microsoft:B-SamFile, Word:I-SamFile, (:O, CVE-2010-3333:B-Exp, ):O, and:O, Adobe:B-Tool, PDF:I-Tool, Reader:I-Tool, (:O, CVE-2010-2883:B-Exp, ):O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'While the URL acts similarly to how eye-watch.in : 443 delivers payloads , we also saw the URL leveraging and exploiting security flaws in Flash : CVE-2015-8651 , CVE-2016-1019 , and CVE-2016-4117 .' [/INST] [While:O, the:O, URL:O, acts:O, similarly:O, to:O, how:O, eye-watch.in:O, ::O, 443:O, delivers:O, payloads:O, ,:O, we:O, also:O, saw:O, the:O, URL:O, leveraging:O, and:O, exploiting:O, security:O, flaws:O, in:O, Flash:O, ::O, CVE-2015-8651:B-Exp, ,:O, CVE-2016-1019:B-Exp, ,:O, and:O, CVE-2016-4117:B-Exp, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The exploit , which takes advantage of CVE-2018-4878 , allows an attacker to execute arbitrary code such as an implant .' [/INST] [The:O, exploit:O, ,:O, which:O, takes:O, advantage:O, of:O, CVE-2018-4878:B-Exp, ,:O, allows:O, an:O, attacker:B-HackOrg, to:O, execute:O, arbitrary:O, code:O, such:O, as:O, an:O, implant:O, .:O] </s> |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.