tokens
sequencelengths
2
296
ner_tags
sequencelengths
2
296
[ "It", "then", "calls", "a", "routine", "that", "adds", "a", "code", "section", "to", "a", "target", "module", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Ransom.Kangaroo", "Win32.Trojan.WisdomEyes.16070401.9500.9872", "Trojan.Randsom.A", "Ransom_Apocalypse.R039C0DAT18", "Win32.Trojan-Ransom.Apocalypse.D", "Trojan-Ransom.Win32.Kangar.a", "Trojan.Win32.Filecoder.epdfna", "Trojan.Encoder.5883", "Ransom_Apocalypse.R039C0DAT18", "BehavesLike.Win32.Worm.lt", "W32/Trojan.ATNA-2545", "Ransom:Win32/Apocalypse.A!bit", "Trojan-Ransom.Win32.Kangar.a", "Trojan/Win32.Kangaroo.R194907", "Trj/GdSda.A", "Trojan.Mikey.D127AA", "Win32/Filecoder.NIC" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.AceDeciever.15", "Trojan:Win32/AceDeceiver.A", "Trojan.Win32.Acedeceiver" ]
[ 16, 3, 16, 16, 16, 1, 1, 1 ]
[ "The", "last", "time", "I", "saw", "proshuto8.exe", "it", "was", "Trickbot,", "but", "these", "malware", "gangs", "do", "mix", "match", "and", "reuse", "file", "names", "and", "delivery", "methods", "to", "deliver", "multiple", "different", "malwares." ]
[ 16, 16, 16, 16, 16, 1, 16, 16, 3, 16, 16, 6, 14, 16, 16, 16, 16, 16, 1, 9, 16, 16, 16, 16, 16, 16, 16, 3 ]
[ "The", "emergence", "of", "XLoader", "6.0", "does", "not", "only", "indicate", "that", "the", "threat", "actors", "behind", "it", "remain", "active", ";", "it", "also", "holds", "fresh", "evidence", "of", "its", "connection", "to", "FakeSpy", "." ]
[ 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16 ]
[ "A", "backdoor", "also", "known", "as:", "PE:Malware.XPACK/RDM!5.1" ]
[ 16, 3, 16, 16, 16, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32/Dropper.ALXP", "Trojan.Dropper", "Trojan.Dropper-23429", "Trojan-Dropper.Win32.Injector.hrpm", "Exploit.Servu!8cjzV0go40I", "Trojan.MulDrop.30820", "Muster.c", "W32/Risk.XPXS-2512", "TR/Expl.Servu.AK", "Trojan/Win32.Sasfis", "TrojanDropper:Win32/Apptom.B", "Virus.Win32.Part.a", "BScope.Trojan.Win32.Inject.2", "Exploit.Win32.Servu" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "core", "malware", "extracts", "the", "device", "’", "s", "installed", "app", "list", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "And", ",", "of", "course", ",", "remember", "to", "always", "be", "wary", "of", "unsolicited", ",", "unusual", "text", "messages", "and", "installing", "apps", "from", "third-party", "sources", "on", "your", "Android", "smartphone", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 16 ]
[ "The", "first", "variant", "involves", "social", "engineering", "the", "target", "into", "downloading", "a", "trojanized", "app", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "review", "of", "the", "bit.ly", "statistics", "for", "these", "campaigns", "shows", "that", "they", "were", "at", "least", "as", "effective", "in", "driving", "end-user", "clicks", "as", "the", "Bank", "Austria", "campaign", "analyzed", "above", "." ]
[ 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 16, 16, 16, 16 ]
[ "The", "overwriting", "of", "the", "data", "files", "will", "make", "it", "extremley", "difficult", "and", "costly,", "if", "not", "impossible,", "to", "recover", "the", "data", "using", "standard", "forensic", "methods." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Android.Bankosy", "is", "a", "Trojan", "horse", "for", "Android", "devices", "that", "steals", "information", "from", "the", "compromised", "device." ]
[ 1, 16, 16, 3, 11, 11, 5, 13, 16, 1, 9, 16, 16, 5, 13 ]
[ "Series", "of", "attacks", "mostly", "against", "Israel-based", "organisations." ]
[ 16, 16, 16, 16, 16, 4, 12 ]
[ "The", "commands", "supported", "by", "the", "analyzed", "version", "of", "the", "Cerberus", "bot", "are", "listed", "below", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16 ]
[ "You", "can", "find", "a", "full", "list", "with", "short", "descriptions", "in", "the", "Appendix", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "On", "Android", ",", "an", "Intent", "is", "a", "software", "mechanism", "that", "allows", "users", "to", "coordinate", "the", "functions", "of", "different", "Activities", "to", "achieve", "a", "task", "." ]
[ 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "David", "Manouchehri", "released", "the", "information", "about", "the", "backdoor", "through", "its", "own", "Github", "account", "(", "Pastebin", ")", "and", "then", "apparently", "deleted", "it", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16, 16, 4, 16, 16, 16, 16, 16, 16, 16 ]
[ "As", "we", "’", "ve", "seen", "in", "last", "year", "’", "s", "mobile", "threat", "landscape", ",", "we", "expect", "more", "cyberespionage", "campaigns", "targeting", "the", "mobile", "platform", "given", "its", "ubiquity", ",", "employing", "tried-and-tested", "techniques", "to", "lure", "unwitting", "users", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.OnlineGameGLISC.Trojan", "W32/Mydoom.cf.dll", "WORM_MYDOOM.EA", "W32/Downloader.EZUZ-6892", "Trojan.Dozer", "Win32/Mydoom.BS", "WORM_MYDOOM.EA", "Win.Downloader.73527-1", "DDoS.Config.6", "W32/Mydoom.cf.dll", "Trojan.Win32.Lyzapo", "W32/Downldr2.FZUB", "W32.Trojan.Worm-myDoom", "Trojan:Win32/Lyzapo.A", "Trojan/Win32.DDoS.R528", "W32/MyDoom.HN.worm", "Win32/Lyzapo.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "TrojanDownloader.Win32.Theefdl", "Trojan-Downloader.Win32!O", "Trojandownloader.Theefdl", "Downloader.Theefdl.Win32.5", "TrojanDownloader.Win32.Theefdl", "W32/Theef.G@bd", "Downloader.Trojan", "Win32/TrojanDownloader.Theefdl", "TROJ_THEEFDL.A", "TrojanDownloader.Win32.Theefdl", "Trojan-Downloader.Win32.Theefdl", "TrojanDownloader.Win32.Theefdl", "Trojan.Win32.Theefdl.fydt", "Trojan.Win32.A.Downloader.81920.VZ", "TrojanDownloader.Win32.Theefdl", "TrojWare.Win32.TrojanDownloader.Theefdl", "Trojan.Thedl", "BehavesLike.Win32.Backdoor.mh", "Trojan-Downloader.Win32.Theefdl", "W32/Theef.TVQD-5666", "TrojanDownloader.Theefdl", "Trojan[Downloader]/Win32.Theefdl", "TrojanDownloader:Win32/Theefdl.1_0", "Trojan/Win32.Downloader.R94200", "Trojan-Downloader.Win32.Theefdl", "TrojanDownloader.Win32.Theefdl", "TrojanDownloader.Theefdl", "Trojan.DL.Theefdl!lWNJHAF8U1M", "W32/Theefdl.G!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Next", ",", "the", "dropper", "checks", "its", "own", "parent", "process", "for", "indications", "that", "it", "is", "running", "in", "a", "sandbox", "setup", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.NSAnti.1", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Win32.Riskware.NoobyProtect.B", "Trojan.Win32.NobodyProtect.eviakq", "TrojWare.Win32.Amtar.KNB", "Trojan.DownLoader4.12788", "BehavesLike.Win32.Pate.tc", "Trojan:Win32/Gee.B", "Dropper/Win32.PcClient.R6061", "Trojan.Cryptic" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "At", "the", "same", "time,", "in", "previous", "update", "activities,", "due", "to", "the", "setting", "of", "a", "specific", "named", "planned", "task,", "the", "researchers", "named", "it", "Blue", "Tea", "Action", "based", "on", "the", "name", "and", "Operation", "Black", "Ball", "。" ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 12, 16, 16, 3, 11, 11, 16, 16, 16, 16, 16, 6, 14, 14, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.SunimodG.Trojan", "Worm.Win32.Juched!O", "WORM_GANELP.SMIA", "W32.Griptolo", "WORM_GANELP.SMIA", "Win.Worm.Autorun-9195", "Worm.Win32.Juched.209429", "Worm.Win32.Jushed.KA", "Trojan.Proxy.20270", "Trojan.Win32.Webprefix", "W32.Worm.Ganelp", "Worm/Win32.Juched", "Worm.Juched.d.kcloud", "Worm:Win32/Ganelp.E", "Trojan/Win32.Npkon.R18258", "Worm.Juched", "Trojan.FakeJava", "Trojan.Win32.FakeFolder.bba" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.WpechkLTD.Trojan", "Trojan-Spy/W32.Vskim.160256", "Trojan.Mauvaise.SL1", "Dropper.Dapato.Win32.16801", "Trojan/Spy.POSCardStealer.k", "Win32.Trojan.WisdomEyes.16070401.9500.9904", "Backdoor.Trojan", "BKDR_HESETOX.SMJ", "Trojan.Win32.Vskim.cqipth", "Backdoor.Win32.Hesetox.160260", "Trojan.DownLoader8.15980", "BKDR_HESETOX.SMJ", "BehavesLike.Win32.Dropper.ch", "Trojan[Dropper]/Win32.Dapato", "Backdoor:Win32/Hesetox.A", "Win-Trojan/Hesetox.160256", "TrojanSpy.Vskim", "Backdoor.Bot.X", "Backdoor.Win32.Hesetox", "Win32/Trojan.IM.73c" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Here", "are", "some", "highlights", "." ]
[ 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "HW32.Packed.4904", "Trojan.Clicker.Delf.CN", "Trojan.Clicker.Delf.CN", "Trojan/Clicker.Delf.cn", "Trojan.Win32.Delf.ifph", "Trojan.Adclicker", "TROJ_ADCLICKE.AS", "Trojan-Clicker.Win32.Delf.cn", "Trojan.CL.Delf!GHMyZMRoBZw", "Trojan.Win32.Clicker.197194[h]", "Troj.Clicker.W32.Delf.cn!c", "Virus.Win32.Heur.e", "Trojan.Clicker.Delf.CN", "Backdoor.Win32.Popwin.~IQ", "Trojan.Clicker.Delf.CN", "Trojan.Dasist", "Trojan.Delf.Win32.8103", "TROJ_ADCLICKE.AS", "BehavesLike.Win32.PWSZbot.cc", "Trojan/Delf.ab", "TR/Click.Delf.CN.5", "Trojan[Clicker]/Win32.Delf", "Trojan.Clicker.Delf.CN", "Win-Trojan/Xema.variant", "Trojan:Win32/Adcliker.K", "TrojanClicker.Delf", "Win32.Trojan.Delf.Lhxa", "Trojan.Clicker.Delf.CN", "Clicker.CSA" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.Win32.Noobot!O", "Backdoor.Poftsyun", "Backdoor.W32.Noobot.h!c", "Win32.Trojan.WisdomEyes.16070401.9500.9997", "Trojan.Ecltys", "Backdoor.Win32.Noobot.h", "Trojan.Win32.Noobot.ylgzy", "Backdoor.Win32.A.Noobot.158756", "Backdoor.Noobot.Win32.6", "BehavesLike.Win32.Downloader.ch", "Backdoor.Win32.Ecltys", "W32/Trojan.SKHW-8707", "Backdoor/Noobot.d", "BDS/Noobot.A.14", "Backdoor:Win32/Poftsyun.A", "Backdoor.Win32.Noobot.h", "Trojan/Win32.Noobot.R214072", "Backdoor.Noobot", "Trojan.Zusy.D49A6", "Win32.Backdoor.Noobot.Pfts", "Backdoor.Noobot!KDSSDgztHWQ", "W32/Noobot.H!tr.bdr", "Win32/Trojan.231" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Strazzere", "'s", "colleague", ",", "Jon", "Sawyer", ",", "suggested", "on", "Twitter", "that", "the", "vulnerabilities", "might", "have", "not", "been", "there", "by", "mistake", ",", "but", "rather", "included", "as", "intentionally", "coded", "backdoors", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan-Downloader.Win32.ChePro.aaa", "WIN.MACRO.SCRIPT.IRC.WORM.Virus", "Trojan-Downloader.Win32.ChePro.aaa", "PUP/Win32.Avdownloader.C2126268" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1 ]
[ "Threat", "actors", "keep", "taking", "advantage", "of", "the", "tax", "season", "in", "the", "US,", "using", "tax-related", "phishing", "scams", "to", "US-based", "victims", "to", "infect", "systems", "with", "stealthy", "malware." ]
[ 6, 14, 16, 16, 16, 16, 16, 16, 16, 16, 16, 2, 16, 16, 1, 9, 16, 4, 12, 16, 5, 13, 16, 16, 3 ]
[ "In", "early", "May,", "the", "phishing", "lures", "leveraged", "RTF", "attachments", "that", "exploited", "the", "Microsoft", "Windows", "vulnerability", "described", "in", "CVE", "2017-0199." ]
[ 16, 0, 8, 16, 1, 16, 16, 1, 9, 16, 7, 15, 15, 15, 15, 16, 16, 1, 9 ]
[ "Back", "then", "it", "was", "detected", "as", "Trojan-Spy.AndroidOS.SmsThief", ",", "but", "later", "versions", "were", "assigned", "to", "another", "family", "–", "Trojan-Banker.AndroidOS.Rotexy", "." ]
[ 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16 ]
[ "These", "threats", "are", "usually", "exacerbated", "by", "the", "further", "abuse", "of", "legitimate", "tools", "such", "as", "PowerShell,", "or", "script", "automation", "utility", "AutoIt.", "It's", "thus", "not", "surprising", "that", "we", "discovered", "an", "information", "stealer", "employing", "LNK", "files,", "which", "our", "sensors", "detected", "in", "Israeli", "hospitals." ]
[ 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 16, 16, 1, 16, 1, 9, 9, 3, 16, 16, 16, 16, 15, 16, 16, 16, 12, 1, 9, 9, 9, 16, 16, 16, 16, 16, 4, 12 ]
[ "]", "251", "2d108ff3a735dea1d1fdfa430f37fab2", "com.psiphon3", "dexlib", "2.x", "188.165.49", "[", "." ]
[ 9, 9, 1, 1, 16, 16, 1, 9, 9 ]
[ "INDEX", "MNEMONIC", "DESCRIPTION", "0x0", "JMP", "Special", "obfuscated", "conditional", "Jump", "(", "always", "taken", "or", "always", "ignored", ")", "0x1", "JMP", "Jump", "to", "a", "function", "(", "same", "as", "opcode", "0x10", ")", "0x2", "CALL", "Call", "to", "the", "function", "pointed", "by", "the", "internal", "VM", "value", "0x3", "CALL", "Optimized", "CALL", "function", "(", "like", "the", "0x1E", "opcode", "of", "the", "32-bit", "VM", ")", "0x4", "EXEC", "Execute", "code", "and", "move", "to", "the", "next", "packet", "0x5", "JMP", "Jump", "to", "an", "internal", "function", "0x6", "NOP", "No", "operation", ",", "move", "to", "the", "next", "packet", "0x7", "CALL", "Call", "an", "imported", "API", "(", "whose", "address", "is", "stored", "in", "the", "internal", "VM", "value", ")", "0x8", "LOAD", "Load", "a", "value", "into", "the", "VM", "descriptor", "structure", "*", "0x9", "STORE", "Store", "the", "internal", "VM", "value", "inside", "a", "register", "0xA", "WRITE", "Resolve", "a", "pointer", "and", "store", "the", "value", "of", "a", "register", "in", "its", "content", "0xB", "READ", "Move", "the", "value", "pointed", "by", "the", "VM", "internal", "value", "into", "a", "register", "0xC", "LOAD", "Load", "a", "value", "into", "the", "VM", "descriptor", "structure", "(", "not", "optimized", ")", "0xD", "CMP", "Compare", "the", "value", "pointed", "by", "the", "internal", "VM", "descriptor", "with", "a", "register", "0xE", "CMP", "Compare", "the", "value", "pointed", "by", "the", "internal", "VM", "descriptor", "with", "an", "immediate", "value", "0xF", "XCHG", "Exchange", "the", "value", "pointed", "by", "the", "internal", "VM", "descriptor", "with", "a", "register", "0x10", "SHL", "Jump", "to", "a", "function", "(", "same", "as", "opcode", "0x1", ")", "This", "additional", "virtual", "machine", "performs", "the", "same", "duties", "as", "the", "one", "already", "described", "but", "in", "a", "64-bit", "environment", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "campaign", "was", "found", "to", "have", "delivered", "several", "types", "of", "malware", "including", "Redline", "Stealer,", "AgentTesla,", "Eternity,", "Blackmoon", "and", "Philadelphia", "Ransomware." ]
[ 6, 14, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 3, 11, 11, 11, 11, 16, 3, 11 ]
[ "A", "backdoor", "also", "known", "as:", "W32.Otwyacal.C", "Win32.Trojan.WisdomEyes.16070401.9500.9748", "W32.Wapomi.C!inf", "Win.Trojan.Vjadtre-6170948-0", "Win32.HLLP.Protil.1", "BehavesLike.Win32.Virut.ch", "W32/Jadtre.C", "Trojan.Symmi.D4E83", "Trj/CI.A", "Win32/Wapomi.Z", "Virus.Win32.Wapomi.a", "Exploit.Win32.ShellCode" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Trojan.Msil", "Trojan.Kazy.D4D672", "TrojanDownloader:MSIL/Winpud.A", "Trojan/Win32.Inject.C149530", "Win32/Trojan.a9f" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1 ]
[ "Enlarge", "/", "Hummingbad/Shedun", "infections", "by", "Android", "version", "." ]
[ 16, 16, 3, 16, 16, 5, 16, 16 ]
[ "However,", "the", "attacks", "against", "targets", "in", "the", "Middle", "East", "except", "Israel", "were", "renewed", "in", "less", "than", "20", "days." ]
[ 16, 16, 1, 16, 16, 16, 16, 2, 10, 16, 2, 16, 16, 16, 0, 8, 8, 8 ]
[ "rename", ".APK", "Android", "application", "package", "files", "used", "to", "install", "the", "malicious", "apps," ]
[ 1, 9, 5, 13, 13, 1, 16, 16, 16, 16, 3, 11 ]
[ "Malicious", "code", "was", "appended", "to", "the", "compromised", "script", "file,", "which", "redirected", "a", "visitor." ]
[ 3, 11, 16, 16, 16, 16, 1, 9, 9, 16, 16, 16, 16 ]
[ "The", "backdoor", "provided", "an", "alternative", "foothold", "in", "several", "observed", "instances", "for", "the", "group", "and", "employed", "a", "few", "tricks", "like", "using", "the", "Intel", "SSE", "extended", "instruction", "set", "to", "avoid", "emulation", "and", "obscure", "analysis." ]
[ 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16, 16, 16, 16, 16, 16, 16, 7, 15, 15, 15, 15, 15, 16, 16, 16, 16, 16, 16 ]
[ "The", "malware", "uses", "the", "Tor", "anonymity", "network", "for", "command", "and", "control", "C2", "and", "does", "not", "require", "network", "connectivity", "to", "encrypt", "files,", "which", "complicates", "detection,", "prevention,", "and", "remediation." ]
[ 16, 3, 16, 16, 1, 9, 9, 16, 1, 9, 9, 9, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "trojan", "will", "receive", "instructions", "from", "the", "C2", "to", "spread", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "list", "of", "vulnerable", "devices,", "as", "well", "as", "the", "logins", "and", "passwords", "that", "go", "with", "them,", "are", "stored", "on", "the", "server", "belonging", "to", "the", "cybercriminals." ]
[ 16, 16, 16, 7, 15, 16, 16, 16, 16, 7, 16, 7, 16, 16, 16, 16, 16, 16, 16, 5, 13, 16, 16, 16, 6 ]
[ "NexusLogger", "is", "a", "cloud-based", "keylogger", "that", "uses", "the", "Microsoft", ".NET", "Framework", "and", "has", "a", "low", "level", "of", "sophistication." ]
[ 3, 16, 16, 3, 11, 16, 16, 16, 5, 13, 13, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Crypt.CC", "Packed.Win32.CPEX-based!O", "Backdoor.PePatch.Win32.2676", "Trojan.Crypt.CC", "W32/Trojan.GQIB-3577", "TrojanSpy.KeyLogger", "Trojan.Win32.Llac.laav", "Trojan.Win32.CPEXbased.oyaq", "Trojan.Win32.Buzus.589824[UPX]", "Packer.W32.CPEX-based.kZ3Y", "Trojan.Crypt.CC", "Trojan.PWS.Lineage.4319", "BehavesLike.Win32.PUPXAO.dh", "W32/Trojan2.ANIR", "Trojan/Buzus.afzu", "TR/Dldr.Buzus.dhk", "Trojan[Packed]/Win32.CPEX-based", "TrojanDropper:Win32/Sharke.C", "Trojan.Crypt.CC", "Trojan.Win32.Llac.laav", "Trojan.Crypt.CC", "Trojan/Win32.Buzus.C22005", "Trojan.Crypt.CC", "Trojan.Crypt.CC", "HackTool.Win32.Crypt" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "URLs", "for", "Sundown", "requests", "for", "Flash", "files", "end", "in", ".swf,", "while", "Silverlight", "requests", "end", "in", ".xap." ]
[ 16, 1, 16, 3, 16, 16, 1, 9, 9, 9, 9, 16, 3, 1, 9, 9, 9 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.Trojan", "Trojan.Win32.Mlw.euwoug", "Backdoor:Win32/DarkEnergy.A!bit", "Backdoor.Bot", "Trj/GdSda.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1 ]
[ "After", "laying", "low", "for", "a", "few", "years,", "it", "had", "a", "sudden", "resurgence", "last", "May." ]
[ 16, 16, 16, 16, 16, 0, 8, 16, 16, 16, 16, 16, 16, 0 ]
[ "This", "archive", "is", "stored", "in", "the", "same", "host", "has", "the", "webviews", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.Surabaya.Worm", "Worm.Win32.AutoRun!O", "Worm.SillyShare.EE2", "W32/Pitin.worm", "Worm.AutoRun", "W32.W.AutoRun.luA8", "WORM_VB.DTH", "Win32.Trojan.VB.iy", "W32/Worm.BGBK", "W32.SillyFDC", "Win32/Dodaykil.B", "WORM_VB.DTH", "Win.Worm.VB-632", "Worm.Win32.AutoRun.bant", "Trojan.Win32.AutoRun.cnwrek", "Trojan.Win32.Autorun.40960.R", "Worm.Win32.VB.~E", "Win32.HLLW.Autoruner.874", "Virus.VB.Win32.86", "BehavesLike.Win32.Dropper.ch", "Worm.Win32.AutoRun", "W32/Worm.DPLM-0673", "Worm/AutoRun.tyn", "TR/VB.aei", "Worm/Win32.AutoRun", "Trojan.Heur.E9EB80", "Worm.Win32.AutoRun.bant", "Worm:Win32/SillyShareCopy.E", "HEUR/Fakon.mwf", "SScope.Trojan.VBO.0348", "Trj/Yabarasu.A", "Worm.Pitin", "Win32/VB.DG", "Trojan.Win32.Autorun.bep", "Worm.SillyShareCopy!GFdqFqCX45w" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W97M.Dropper.MM", "W97M/Dropper.x", "W97M/Mdropper.G", "W2KM_FAREIT.IAV", "Trojan.Script.Drop.dyxcgh", "Trojan-Dropper:W97M/MaliciousDoc.A", "Trojan.PWS.Stealer.4118", "W2KM_FAREIT.IAV", "W97M/Mdropper.G", "TR/Crypt.Xpack.310779", "Trojan[PSW]/Win32.Fareit", "TrojanPSW.Fareit", "possible-Threat.Embedded.ExeInOffice", "virus.office.qexvmc.1100" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Operation", "Groundbait", "Russian:", "Прикормка,", "Prikormka", "is", "an", "ongoing", "cyber-surveillance" ]
[ 6, 14, 16, 6, 14, 16, 16, 16, 16 ]
[ "This", "malicious", "app", ",", "detected", "by", "ESET", "as", "a", "variant", "of", "Android/Twitoor.A", ",", "can", "’", "t", "be", "found", "on", "any", "official", "Android", "app", "store", "–", "it", "probably", "spreads", "by", "SMS", "or", "via", "malicious", "URLs", "." ]
[ 16, 16, 16, 16, 16, 16, 4, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "It", "has", "been", "shortened", "for", "brevity", "." ]
[ 16, 16, 16, 16, 16, 16, 16 ]
[ "July", "21", "Analysis", "of", "the", "RCSAndroid", "spying", "tool", "revealed", "that", "Hacking", "Team", "can", "listen", "to", "calls", "and", "roots", "devices", "to", "get", "in", "." ]
[ 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "When", "reviewing", "the", "decrypted", "packet", ",", "it", "’", "s", "clear", "it", "has", "the", "same", "content", "as", "previous", "versions", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "]", "net", "." ]
[ 9, 9, 16 ]
[ "The", "entered", "data", "is", "then", "checked", "and", "the", "last", "four", "digits", "of", "the", "bank", "card", "number", "are", "also", "checked", "against", "the", "data", "sent", "in", "the", "C", "&", "C", "command", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "separate", "app", "from", "Check", "Point", "competitor", "Lookout", "also", "detects", "the", "threat", "as", "a", "variant", "of", "the", "Shedun", "malware", "family", "." ]
[ 16, 16, 16, 16, 4, 12, 16, 4, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16 ]
[ "]", "com", "www5.zyns", "[", "." ]
[ 9, 9, 1, 9, 9 ]
[ "Microsoft", "Defender", "for", "Endpoint", "on", "Android", "further", "enriches", "organizations", "’", "visibility", "into", "malicious", "activity", ",", "empowering", "them", "to", "comprehensively", "prevent", ",", "detect", ",", "and", "respond", "to", "against", "attack", "sprawl", "and", "cross-domain", "incidents", "." ]
[ 5, 13, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "next", "stage", "in", "device", "infection", "could", "be", "the", "use", "of", "exploit", "kits", "and", "malvertising", ",", "which", "would", "be", "quite", "effective", "due", "the", "many", "Android", "vulnerabilities", "and", "consumers", "with", "unpatched", "devices", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 7, 15, 16, 16, 16, 7, 15, 16 ]
[ "The", "developer", "name", "used", ",", "GAS", "Brazil", ",", "suggests", "the", "criminals", "behind", "the", "app", "targeted", "Brazilian", "users", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "VB:Trojan.Valyria.849", "W97M.Downloader.BLR", "Troj.Downloader.Msoffice!c", "W97M.Downloader", "W2KM_HANCITOR.YYSYN", "VB:Trojan.Valyria.849", "VB:Trojan.Valyria.849", "Trojan.Script.Downloader.espmja", "VB:Trojan.Valyria.849", "VB:Trojan.Valyria.849", "W2KM_HANCITOR.YYSYN", "TrojanDownloader:O97M/Damatak.A", "VB:Trojan.Valyria.849", "virus.office.qexvmc.1080" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Extract", "data", "from", "WeChat", "app", "." ]
[ 16, 16, 16, 5, 16, 16 ]
[ "Volexity", "has", "tied", "this", "attack", "campaign", "to", "an", "advanced", "persistent", "threat", "APT", "group", "first", "identified", "as", "OceanLotus", "by", "SkyEye", "Labs", "in", "2015." ]
[ 4, 16, 16, 16, 6, 14, 16, 16, 6, 14, 14, 14, 14, 16, 16, 16, 6, 16, 4, 12, 16, 0 ]
[ "Probably,", "attackers", "used", "web", "site", "vulnerabilities", "for", "placing", "malicious", "files." ]
[ 16, 6, 16, 1, 9, 7, 16, 16, 1, 9 ]
[ "Since", "our", "previous", "publication,", "we", "have", "found", "another,", "similar", "but", "different", "payload", "used", "to", "target", "a", "second", "organization", "in", "Saudi", "Arabia", "that", "was", "configured", "to", "wipe", "systems", "twelve", "days", "later", "on", "November", "29,", "2016." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 2, 10, 15, 16, 16, 16, 5, 13, 0, 8, 8, 16, 0, 8, 8 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/Losya.gg", "Trojan-Ransom.Win32.Losya.gg", "Trojan-Ransom.Win32.Losya!IK", "Trojan.Winlock.2932", "Trojan/Losya.cs", "Trojan:Win32/LockScreen.BA", "Hoax.Losya.bd", "Trojan-Ransom.Win32.Losya", "W32/Krap.A!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Servers", "of", "The", "Left", "in", "German", "Bundestag", "have", "been", "infected", "with", "malware,", "apparently", "by", "a", "state-sponsored", "group", "of", "Russian", "origin." ]
[ 5, 13, 13, 13, 16, 2, 10, 16, 16, 16, 16, 3, 16, 16, 16, 6, 14, 16, 2, 10 ]
[ "Sakula", "also", "leverages", "single-byte", "XOR", "encoding", "to", "obfuscate", "various", "strings", "and", "files", "embedded", "in", "the", "resource", "section,", "which", "are", "subsequently", "used", "for", "User", "Account", "Control", "UAC", "bypass", "on", "both", "32", "and", "64-bit", "systems." ]
[ 3, 16, 16, 1, 9, 9, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 13, 13 ]
[ "Svpeng", "is", "capable", "of", "doing", "lots", "of", "things", "." ]
[ 3, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/W32.ICQNuker.19456", "Trojan.ICQNuker!jj+ciDVRnhs", "Hacktool.Nuker", "Smalltroj.EAH", "TROJ_ICQNUKER.A", "Trojan.ICQNuker", "Trojan.Win32.ICQNuker", "Trojan.Win32.ICQNuker", "Trojan.Win32.ICQNuker.dhzl", "TrojWare.Win32.ICQNuker", "Trojan.Win32.ICQNuker", "Trojan.ICQNuker", "TROJ_ICQNUKER.A", "Trojan/Win32.ICQNuker", "Trojan.Win32.ICQNuker.19456", "Trojan.Win32.ICQNuker", "Win32.Trojan.ICQNuker", "Hacktool.Nuker" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Linux", "malware", "is", "slowly", "becoming", "more", "popular." ]
[ 15, 3, 16, 16, 16, 16, 16 ]
[ "This", "porn", "clicker", "Trojan,", "which", "we", "detect", "as", "Android/Clicker,", "has", "once", "more", "become", "available", "for", "download", "from", "Play", "Store." ]
[ 16, 3, 11, 11, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Downloader.LoadAdv.ABV", "Trojan.Piptea", "Downloader.Small.Win32.11983", "Trojan.Downloader.LoadAdv.ABV", "Multi.Threats.InArchive", "W32/Downldr2.FZLV", "Trojan.Dropper", "Win.Downloader.65024-1", "Trojan-Downloader.Win32.Small.agns", "Trojan.Downloader.LoadAdv.ABV", "Trojan.Win32.Small.bcwtvk", "Trojan.Win32.Downloader.246584", "Trojan.Downloader.LoadAdv.ABV", "W32/Downloader.UPFZ-7129", "Trojan[Downloader]/Win32.Small", "Trojan:Win32/Piptea.E", "Trojan-Downloader.Win32.Small.agns", "Trojan.DL.Small!mUFJjjvpkTw", "Email-Worm.Win32.Joleee", "Win32/Trojan.8ed" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Win32/Adclicker.DH", "Trojan-Clicker.Win32.Small!O", "Trojan/Clicker.Small.tc", "Trojan.Zusy.D730F", "Win32.Trojan.WisdomEyes.16070401.9500.9905", "W32/Trojan.HWTO-6812", "Trojan.KillAV", "Win32/TrojanClicker.Small.QZ", "TROJ_CLICKER.UU", "Win.Trojan.Clicker-1328", "Trojan.Win32.Small.pbsu", "Trojan.Win32.Clicker.20480.C", "TrojWare.Win32.TrojanClicker.Small.QZ", "Trojan.PWS.Gamania.16782", "Trojan.Small.Win32.16009", "W32/Trojan2.AUEO", "TrojanClicker.Small.aps", "W32.Email.Worm.Silly", "TR/Click.Mon.1", "Trojan[Clicker]/Win32.Small", "Dropper/Win32.Small.R41509", "TrojanClicker.Small", "Trj/CI.A", "Trojan-Downloader.Win32.Small", "W32/CLICKER.UU!tr", "Win32/Trojan.d06" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Another", "chunk", "is", "used", "to", "copy", "a", "basic", "Ntdll", "and", "Kernel32", "import", "address", "table", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Sometimes", ",", "we", "can", "attribute", "different", "apps", "to", "the", "same", "author", "based", "on", "a", "small", ",", "unique", "pieces", "of", "evidence", "that", "suggest", "similarity", ",", "such", "as", "a", "repetition", "of", "an", "exceptionally", "rare", "code", "snippet", ",", "asset", ",", "or", "a", "particular", "string", "in", "the", "debug", "logs", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "It", "seems", "that", "the", "people", "who", "filled", "these", "roles", "are", "key", "to", "“", "Agent", "Smith", "’", "s", "success", ",", "yet", "not", "quite", "necessary", "for", "actor", "’", "s", "legitimate", "side", "of", "business", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "SpyNote", "RAT", "is", "capable", "of", "performing", "a", "variety", "of", "alarming", "functions", "that", "includes", ":", "Activating", "the", "device", "’", "s", "microphone", "and", "listening", "to", "live", "conversations", "Executing", "commands", "on", "the", "device", "Copying", "files", "from", "the", "device", "to", "a", "Command", "&", "Control", "(", "C", "&", "C", ")", "center", "Recording", "screen", "captures", "Viewing", "contacts", "Reading", "SMS", "messages", "The", "screenshot", "below", "shows", "part", "of", "the", "sandbox", "’", "s", "report", "on", "the", "SpyNote", "RAT", "’", "s", "signature", "and", "detected", "functions", ":", "The", "fake", "Netflix", "app", "we", "are", "analyzing", "in", "this", "blog", "appears", "to", "be", "built", "using", "an", "updated", "version", "of", "SpyNote", "RAT", "builder", ",", "which", "was", "leaked", "last", "year", "." ]
[ 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "details", "we", "are", "releasing", "are", "to", "provide", "insight", "into", "attack", "methodologies", "being", "employed", "by", "sophisticated", "groups", "such", "as", "FIN7", "who", "are", "consistently", "changing", "techniques", "between", "attacks", "to", "avoid", "detection." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 6, 16, 16, 6, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16 ]
[ "The", "Dyre", "group,", "a", "major", "malware", "spam", "producer,", "has", "changed", "their", "initial", "malware", "dropper", "to", "utilize", "Microsoft", "Word", "document", "macros", "instead", "of", "the", "usual", "executable", "types,", "such", "as", ".exe", "files", "contained", "in", "a", ".zip." ]
[ 6, 14, 14, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 5, 13, 13, 13, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Ransom_Shieldcrypt.R00WC0DEQ17", "Win32.Trojan.WisdomEyes.16070401.9500.9998", "W32/Ransom.WTYO-5087", "Ransom.Troldesh", "Ransom_Shieldcrypt.R00WC0DEQ17", "Win32.Trojan-Ransom.Filecoder.BO", "Trojan.Win32.Encoder.ephyjr", "Trojan.Encoder.11787", "Ransom:Win32/Shieldcrypt.A", "Trj/GdSda.A", "Win32.Trojan.Raas.Auto", "Trojan-Ransom.Shieldcrypt" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32/Backdoor2.DBLT", "WS.Reputation.1", "Win32.TRVirtl", "HackTool.Patcher!7MmWKbVM2EE", "Tool.DVTPatch", "TR/Virtl.7341", "Trojan/Virtl.b", "Win32.HACKTOOL.pocomail.cx.kcloud", "W32/Backdoor2.DBLT", "Trojan.Virtl.7341" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "IOC", "s", "for", "the", "Wildifre", "ransomware" ]
[ 1, 16, 16, 16, 3, 11 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/PinkBlocker.arw", "Trojan.Heloag", "BKDR_HELOAG.SM", "PUA.Packed.ASPack", "BDS/Heloag.A.30", "BKDR_HELOAG.SM", "Backdoor.Win32.Heloag!IK", "Backdoor:Win32/Heloag.A", "Trojan.Heloag", "Backdoor.Win32.Heloag", "Trj/CI.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Symantec", "discovered", "the", "Greenbug", "cyberespionage", "group", "during", "its", "investigation", "into", "previous", "attacks", "involving", "W32.Disttrack.B", "aka", "Shamoon." ]
[ 4, 16, 16, 6, 14, 14, 16, 16, 16, 16, 16, 1, 16, 1, 16, 6 ]
[ "Most", "of", "the", "network", "traffic", "we", "’", "ve", "observed", "is", "HTTP", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16 ]
[ "In", "this", "post", ",", "we", "show", "how", "Google", "Play", "Protect", "has", "defended", "against", "a", "well", "organized", ",", "persistent", "attacker", "and", "share", "examples", "of", "their", "techniques", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 5, 13, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.Win32.Rbot!O", "Backdoor.Rbot.20414", "Win32.Trojan.WisdomEyes.16070401.9500.9964", "Win.Trojan.Mybot-4324", "Trojan.Win32.Rbot.cuqnmc", "Win32.HLLW.MyBot.based", "Backdoor.RBot.Win32.38765", "BehavesLike.Win32.Msposer.jz", "Backdoor.Win32.SdBot", "EXP/DameWare.ggg", "Trojan[Backdoor]/Win32.Rbot", "Win32.Hack.RBotT.a.83968", "Backdoor.Win32.Sdbot.yx", "W32/SdBot.IT!tr.bdr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Cylance", "SPEAR", "has", "uncovered", "a", "long-standing", "persistent", "threat", "targeting", "numerous", "major", "industries", "spread", "across", "Japan,", "South", "Korea,", "the", "United", "States,", "Europe,", "and", "several", "other", "Southeast", "Asian", "countries." ]
[ 4, 12, 16, 16, 16, 16, 6, 14, 16, 16, 16, 4, 16, 16, 2, 10, 10, 10, 10, 10, 10, 16, 16, 16, 2, 10, 10 ]
[ "After", "obtaining", "the", "desired", "rights", ",", "the", "Trojan", "sets", "itself", "as", "the", "default", "SMS", "app", "(", "by", "independently", "clicking", "Yes", "in", "AccessibilityService", ")", ",", "before", "vanishing", "from", "the", "device", "screen", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojandownloader.Script", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Trojan.Win32.Drop.etdypm", "Trojan.MulDrop7.42636", "BehavesLike.Win32.Dropper.fh", "W32/Trojan.EURA-7093", "Trojan:VBS/Sminager.D", "Exploit.UACSkip", "Trj/CI.A", "Exploit.UACSkip!", "Win32/Trojan.Downloader.251" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.HfsAutoB.424D", "Virus.Hupigon.Win32.5", "Trojan/PSW.QQShou.is", "TSPY_QQSHOU.GY", "Win32.Trojan.WisdomEyes.16070401.9500.9956", "W32/Trojan.KBAU-5151", "Trojan.PWS.QQPass", "TSPY_QQSHOU.GY", "Backdoor.Win32.Hupigon.vpk", "Trojan.Win32.QQShou.lofh", "Backdoor.W32.Rbot.lgxa", "Backdoor.Win32.Popwin.~IQ", "Trojan.PWS.Gamania.5830", "W32/Trojan.LGV", "Trojan/PSW.QQShou.eu", "Trojan[Backdoor]/Win32.Hupigon.vpk", "PWS:Win32/Whoran.A", "Backdoor.Win32.Hupigon.vpk", "Trojan.PWS.QQShou!NqwrJPeZllY", "W32/Hupigon.VPK!tr.pws" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]