tokens
sequencelengths
2
296
ner_tags
sequencelengths
2
296
[ "SMS", "Billing", "Carriers", "may", "partner", "with", "vendors", "to", "allow", "users", "to", "pay", "for", "services", "by", "SMS", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "]", "com/api/s2s/tracks/", "and", "is", "used", "for", "activation", "." ]
[ 9, 9, 16, 16, 16, 16, 16, 16 ]
[ "In", "later", "versions", ",", "instead", "of", "the", "name", "of", "the", "command", ",", "its", "numerical", "code", "was", "transmitted", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Rotbrow.KK6", "PUP.Optional.BProtector", "Trojan.Bromngr.Win32.445", "Win32.Adware.Bprotector.a", "Adware.GoonSquad", "Win.Adware.BProtector-1", "Win32.Application.BHO.A", "Trojan.Win32.BGuard.cunxgw", "Application.Win32.bProtector.KA", "Adware.BGuard.47", "Trojan-Dropper.Win32.Rotbrow", "Trojan.Bromngr.ed", "W32.Adware.Installbrain", "Trojan.Adware.BHO.Bprotector.1", "TrojanDropper:Win32/Rotbrow.A", "W32/Bprotect.B!tr", "Trj/CI.A", "Win32/Trojan.10d" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Kryptik.ASES", "Trojan.MulDrop1.32726", "Win32/Tnega.CZG" ]
[ 16, 3, 16, 16, 16, 1, 1, 1 ]
[ "What", "was", "taken", "The", "actors", "behind", "ViperRAT", "seem", "to", "be", "particularly", "interested", "in", "image", "data", "." ]
[ 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Further", "research", "of", "the", "attacker", "’", "s", "infrastructure", "revealed", "more", "related", "mimicking", "domains", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Crypt.Delf.AL", "Worm/W32.G_Spot.200704", "Backdoor.G_Spot.r8", "W32/Grandspot.worm!p2p", "Trojan.Crypt.Delf.AL", "W32/G_Spot.c", "Trojan.Win32.GSpot.dzdidh", "W32.HLLW.Sambut", "Win32/GrandSpot.C", "BKDR_GSPOT.15", "P2P-Worm.Win32.G_Spot.c", "Worm.P2P.G_Spot!iWsciEZCFG4", "W32.W.G_Spot.c!c", "Trojan-Downloader.win32.Delf.xoq", "Trojan.Crypt.Delf.AL", "Worm.Win32.GrandSpot.C", "Trojan.Crypt.Delf.AL", "WIN.WORM.Virus", "Worm.GSpot.Win32.1", "BKDR_GSPOT.15", "BehavesLike.Win32.Eggnog.ch", "Worm/Sramota.qs", "BDS/GSpot.15.Srv", "W32/G_Spot.C", "Trojan[Backdoor]/Win32.G_Spot", "Trojan.Crypt.Delf.AL", "Win32/KorGameHack.worm.200704", "Worm:Win32/Gespo.C", "Win32/Spotbot.15", "Worm.G_Spot", "Trojan-PWS.Win32.Lmir.mw", "Trojan.Crypt.Delf.AL", "Worm/Gspot.C" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan-Dropper.Win32.Exetemp!O", "W32/Backdoor.GJUL-4537", "TROJ_DROPER.SMJN", "Trojan-Dropper.Win32.Exetemp.a", "Troj.Dropper.W32.Exetemp.tnGD", "Trojan.MulDrop.30795", "TROJ_DROPER.SMJN", "W32/Backdoor2.FAQY", "Backdoor/Huigezi.2009.api", "W32.Trojan.Exetemp", "Trojan[Dropper]/Win32.Exetemp", "TrojanDropper:Win32/Exetemp.A!bit", "Trojan.Graftor.D45DD", "Trojan-Dropper.Win32.Exetemp.a", "TrojanDropper.Exetemp", "Trojan.DL.Win32.Small.grn", "W32/Exetemp.A!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Hydrochasma,", "the", "threat", "actor", "behind", "this", "campaign,", "has", "not", "been", "linked", "to", "any", "previously", "identified", "group,", "but", "appears", "to", "have", "a", "possible", "interest", "in", "industries", "that", "may", "be", "involved", "in", "COVID-19-related", "treatments", "or", "vaccines." ]
[ 6, 14, 14, 14, 16, 16, 6, 16, 16, 16, 16, 16, 16, 16, 16, 6, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "malware", "is", "usually", "packaged", "with", "apps", "that", "users", "may", "download", "from", "third-party", "app", "stores." ]
[ 3, 11, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 5, 13, 13 ]
[ "Analysis", "from", "cyintanalysis.com", "describing", "infrastructure", "of", "an", "actor", "using", "PoisonIvy", "and", "PlugX", "implants." ]
[ 16, 16, 4, 16, 5, 16, 16, 6, 16, 3, 16, 3, 11 ]
[ "Once", "infected,", "Mansoor's", "phone", "would", "have", "become", "a", "digital", "spy", "in", "his", "pocket,", "capable", "of", "employing", "his", "iPhone's", "camera", "and", "microphone", "to", "snoop", "on", "activity", "in", "the", "vicinity", "of", "the", "device,", "recording", "his", "WhatsApp", "and", "Viber", "calls,", "logging", "messages", "sent", "in", "mobile", "chat", "apps,", "and", "tracking", "his", "movements." ]
[ 16, 16, 16, 5, 16, 16, 16, 5, 13, 13, 16, 16, 16, 16, 16, 16, 16, 7, 15, 16, 7, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 5, 13, 16, 16, 16, 16, 5, 13, 13, 16, 16, 16, 16 ]
[ "Once", "installed,", "it", "hides", "itself", "and", "then", "tricks", "the", "user", "into", "typing", "his", "or", "her", "credentials", "into", "fake", "bank", "web", "pages", "that", "have", "been", "injected", "onto", "the", "device's", "screen." ]
[ 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 1, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 16, 5, 13, 13 ]
[ "EventBot", "uses", "this", "permission", "in", "order", "to", "achieve", "persistence", "and", "run", "in", "the", "background", "as", "a", "service", "." ]
[ 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "As", "a", "modern", "Android", "spyware", "it", "is", "also", "capable", "of", "exfiltrating", "data", "from", "messaging", "applications", "(", "WhatsApp", ",", "Viber", ",", "Facebook", ")", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 5, 16, 5, 16, 16 ]
[ "Extract", "information", "from", "th", "GMail", "app", "." ]
[ 16, 16, 16, 16, 5, 16, 16 ]
[ "It", "requires", "root", "privileges", "to", "be", "installed,", "and", "relies", "on:", "A", "userland", "binary,", "providing", "an", "encrypted", "backdoor", "with", "remote", "code", "execution", "and", "proxy", "functionalities", "A", "lightweight", "Linux", "Loadable", "Kernel", "Module,", "providing", "an", "additional", "port-knocking", "service", "for", "the", "userland", "backdoor" ]
[ 16, 16, 1, 9, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 16, 1, 9, 9, 16, 1, 9, 16, 5, 13, 13, 13, 13, 16, 16, 16, 5, 13, 16, 16, 16, 3 ]
[ "This", "may", "imply", "the", "β€œ", "Concipit1248", "”", "app", "is", "still", "incubating", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Recently,", "FortiGuard", "Labs", "found", "a", "phishing", "campaign", "targeting", "French", "Nationals." ]
[ 16, 4, 12, 16, 6, 14, 14, 16, 4, 12 ]
[ "Palo", "Alto", "Networks", "has", "discovered", "a", "previously", "unknown", "remote", "access", "Trojan", "RAT", "that", "has", "been", "active", "for", "over", "two", "years." ]
[ 4, 12, 12, 16, 16, 16, 16, 3, 11, 11, 11, 11, 16, 16, 16, 16, 16, 0, 8, 8 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Mauvaise.SL1", "TROJ_ETERNALROM.A", "TROJ_ETERNALROM.A", "Win32.Exploit.EqEternalRomance.A", "Exploit.Win32.ShadowBrokers.aj", "Exploit.Win32.ShadowBrokers.epajub", "Exploit.Win32.ShadowBrokers.~", "Trojan.Equation.37", "Exploit.ShadowBrokers.Win32.13", "Trojan.Exploit.Equation", "Exploit.ShadowBrokers.v", "W32.Hacktool.Equation", "TR/Eqtonex.HG", "Trojan[Exploit]/Win32.ShadowBrokers", "Uds.Dangerousobject.Multi!c", "Exploit.Win32.ShadowBrokers.aj", "Exploit:Win32/Eqtonex.A", "Trojan/Win32.ShadowBrokers.C1919146", "Exploit.ShadowBrokers", "Trj/CI.A", "Win32/Exploit.Equation.EternalRomance.A", "HackTool.Win32.ShadowB.a", "Exploit.ShadowBrokers!", "Win32/Trojan.Multi.daf" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "Corebot", "malware", "family", "is", "relatively", "new", "and", "was", "first", "documented", "by", "Security", "Intelligence." ]
[ 3, 11, 11, 11, 16, 16, 16, 16, 16, 16, 16, 16, 4, 12 ]
[ "A", "backdoor", "also", "known", "as:", "W32.FamVT.Cosmu.PE", "Win32.Worm.VB.NZQ", "Trojan.Win32.Cosmu!O", "W32.Lamer.EL3", "Downloader.VB.Win32.95", "Trojan/Downloader.VB.eex", "Win32.Virus.VBbind.a", "W32.Besverit", "Win32/VB.JU", "TROJ_DLOADR.SMM", "Win.Trojan.Cosmu-4", "Virus.Win32.Lamer.el", "Win32.Worm.VB.NZQ", "Trojan.Win32.VB.ltch", "Troj.Downloader.W32.VB.l4ji", "Worm.Win32.VB.kp", "Win32.Worm.VB.NZQ", "Win32.Worm.VB.NZQ", "Win32.HLLW.Autoruner.6014", "TROJ_DLOADR.SMM", "BehavesLike.Win32.Autorun.th", "Trojan/Cosmu.lan", "Trojan.Win32.Cosmu.887991", "Virus.Win32.Lamer.el", "Win32.Worm.VB.NZQ", "Win32/Lamer.D", "Win32.Worm.VB.NZQ", "SIM.Trojan.VBO.0859", "Trojan.Downloader", "Win32/VB.NUP", "Worm.Win32", "W32/AutoRun.RPV!worm", "W32/OverDoom.A", "Virus.Win32.Lamer.B" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "This", "mechanism", "is", "similar", "to", "premium", "rate", "SMS", "messages", "but", "Trojans", "do", "not", "need", "to", "send", "any", "SMS", "in", "this", "case", "–", "they", "just", "need", "to", "click", "on", "a", "button", "on", "a", "web-page", "with", "WAP-billing." ]
[ 16, 16, 16, 16, 16, 16, 16, 1, 9, 16, 3, 16, 16, 16, 16, 1, 9, 9, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 9, 9 ]
[ "The", "stages", "of", "the", "FinFisher", "multi-layered", "protection", "mechanisms", "Stage", "0", ":", "Dropper", "with", "custom", "virtual", "machine", "The", "main", "dropper", "implements", "the", "VM", "dispatcher", "loop", "and", "can", "use", "32", "different", "opcodes", "handlers", "." ]
[ 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Conclusion", "Gooligan", "has", "breached", "over", "a", "million", "Google", "accounts", "." ]
[ 16, 3, 16, 16, 16, 16, 16, 4, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Keylogger.88", "Win32.Backdoor.Ciadoor.13.y.2.Pack", "Backdoor/Ciadoor.13", "Backdoor.Ciadoor!4PAHfVwkIvk", "W32/BackdoorX.FCC", "Backdoor.Ciadoor", "Win32/Ciadoor.J", "BKDR_CIADOOR.E", "Win32.Stration", "Backdoor.Win32.Ciadoor.cia", "Trojan.Keylogger.88", "Backdoor.Win32.Ciadoor.13", "Trojan.Keylogger.88", "Trojan.DownLoader.62487", "BDS/Ciadoor.13.A", "BKDR_CIADOOR.E", "Backdoor.Win32.Ciadoor!IK", "Backdoor/Ciadoor.az", "Backdoor/Win32.Ciadoor", "VirTool:Win32/VB.L", "Backdoor.Win32.Ciadoor.60726", "Trojan.Keylogger.88", "W32/BackdoorX.FCC", "OScope.Backdoor.VB", "Win32/Ciadoor.13", "Backdoor.Win32.Ciadoor", "W32/Ciadoor.13!tr.bdr", "BackDoor.Ciadoor.3.AH", "Bck/Ciadoor.FQ" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Indicators", "for", "the", "TripleNine", "backdoor", "used", "by", "an", "actor." ]
[ 1, 16, 16, 3, 11, 16, 16, 16, 6 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Pakes", "Troj.W32.Pakes!c", "Win32.Trojan.WisdomEyes.16070401.9500.9997", "W32/Trojan.ZCVD-4026", "Trojan.Win32.Encoder.euxeay", "Trojan.Encoder.15133", "Trojan.Pakes.Win32.41830", "Trojan.Win32.Injector", "Backdoor.Backboot.s", "TR/Crypt.Xpack.frnur", "W32/Injector.DSRQ!tr", "Trojan.Graftor.D67C49", "Ransom:Win32/Criakl.D", "Backdoor.Backboot", "Ransom.FileCryptor", "Trj/GdSda.A", "Trojan.Pakes!3sBO8Lnk+/0", "Win32/Trojan.7d4" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Some", "of", "the", "stolen", "Skype", "databases", "included", "chat", "history", "going", "back", "to", "2012", "and", "activity", "as", "recent", "as", "January", "2014" ]
[ 16, 16, 16, 16, 5, 13, 16, 16, 16, 16, 16, 16, 0, 16, 16, 16, 16, 16, 0, 8 ]
[ "A", "backdoor", "also", "known", "as:", "Rootkit.Win32.Xanfpezes!O", "Trojan.Rootkitdrv", "Rootkit.Xanfpezes.Win32.13", "Trojan/Xanfpezes.bru", "Trojan.Symmi.DC01B", "Win32.Trojan.WisdomEyes.16070401.9500.9873", "W32/Trojan.VQCP-2977", "Win32/Rootkit.KX", "RTKT_HIDEPROC.BB", "Win.Trojan.Hideproc-77", "Rootkit.Win32.Xanfpezes.bru", "Riskware.Win32.HideProc.crvalg", "Trojan.Fakealert.28173", "RTKT_HIDEPROC.BB", "BehavesLike.Win32.PUP.wc", "Downloader.Delphi", "TrojanDropper.Delf.cdq", "RiskWare[RiskTool]/Win32.HideProc", "Win32.Hack.Rootkit.kcloud", "Rootkit.Win32.Xanfpezes.bru", "Backdoor/Win32.Xanfpezes.C131817", "TrojanDownloader.Banload", "HackTool.Win32.ProcHide.ad", "Rootkit.Xanfpezes!kqbV3Mm24ww" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Nsis.Ocna.eqkruk", "Trojan.InstallCoreCRTD.Win32.3467", "Win32/RA-based.AB" ]
[ 16, 3, 16, 16, 16, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Worm.Mariofev.O", "Win32.Worm.Mariofev.O", "WORM_MARIOFEV.TO", "Win32.Trojan.WisdomEyes.16070401.9500.9961", "W32/Backdoor2.CSNQ", "W32.Spamuzle", "WORM_MARIOFEV.TO", "Win.Spyware.53855-2", "Worm.Win32.Pinit.piv", "Win32.Worm.Mariofev.O", "Trojan.Win32.Pinit.bmcqcd", "W32.W.Pinit.piv!c", "Win32.Worm.Pinit.Ljul", "Win32.Worm.Mariofev.O", "Win32.Worm.Mariofev.O", "BackDoor.Zapinit.81", "BehavesLike.Win32.VTFlooder.nc", "Trojan-Ransom.HydraCrypt", "W32/Backdoor.CNPZ-8382", "TrojanDropper:Win32/Mariofev.H", "Worm.Win32.Pinit.piv", "Worm.Pinit", "Worm.Mariofev!HCn84tcMG2k" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "This", "capability", "was", "confirmed", "when", "the", "Android", "permission", ",", "called", "android.permission.RECORD_AUDIO", ",", "was", "being", "requested", "along", "with", "code", "found", "in", "the", "app", "." ]
[ 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Readers", "who", "are", "interested", "in", "this", "campaign", "should", "start", "with", "our", "first", "blog", "that", "lays", "out", "the", "overall", "functionality", "of", "the", "malware", "and", "introduces", "its", "many", "components." ]
[ 16, 16, 16, 16, 16, 16, 6, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16 ]
[ "The", "fake", "applications", "are", "built", "using", "WebView", ",", "a", "popular", "extension", "of", "Android", "’", "s", "View", "class", "that", "lets", "the", "developer", "show", "a", "webpage", "." ]
[ 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Novel.DOS.1", "PSW.Novel", "TROJ_PSWNOVEL.A", "Trojan-PSW.DOS.Novel", "Trojan.Dos.Novel.fnqs", "DOS.S.PSWNovel.7120", "Troj.PSW.DOS.Novel!c", "TrojWare.PSW.Novel", "TROJ_PSWNOVEL.A", "Trojan/PSW.Novel", "TR/PSW.Novel", "Trojan[PSW]/DOS.Novel", "Trojan-PSW.DOS.Novel", "Login.7120", "Dos.Trojan-qqpass.Qqrob.Aenr", "W32/HLLW_NewStory.A!tr.pws", "Win32/Trojan.99d" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Losicoa.S18597", "Trojan.Zusy.D39F92", "TrojanDownloader:Win32/Qdownb.A", "Trojan.Win32.BHO", "Win32/Trojan.cb1" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1 ]
[ "The", "group", "effectively", "controls", "an", "arsenal", "of", "over", "85", "million", "mobile", "devices", "around", "the", "world." ]
[ 16, 6, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 16, 16, 16 ]
[ "Last", "week,", "a", "new", "version", "was", "spotted", "in", "the", "wild,", "and", "based", "on", "our", "analysis,", "we", "believe", "that", "this", "variant", "is", "the", "one", "used", "in", "a", "recent", "attack", "against", "San", "Francisco", "Municipal", "Transport", "Agency", "SFMTA." ]
[ 0, 8, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 1, 16, 4, 12, 12, 12, 12, 12 ]
[ "Retrieve", "the", "browsing", "history", "and", "bookmarks", "from", "Chrome", "and", "SBrowser", "(", "the", "browser", "shipped", "with", "Samsung", "phones", ")", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 5, 16, 5, 16, 16, 16, 16, 16, 4, 16, 16, 16 ]
[ "Interestingly", ",", "\"", "mundizza", "''", "is", "typical", "of", "Calabria", ",", "a", "region", "in", "the", "south", "of", "Italy", ",", "and", "more", "specifically", "it", "appears", "to", "be", "language", "native", "of", "the", "city", "of", "Catanzaro", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "We", "observed", "3", "squatting", "domain", "registrations", "related", "to", "a", "victim", "in", "the", "media", "sector." ]
[ 16, 16, 16, 16, 1, 16, 16, 16, 16, 4, 16, 4, 12, 12 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Razy.D1558E", "Win32.Trojan.WisdomEyes.16070401.9500.9566", "Trojan.MSIL.Crypt", "W32/Trojan.UXDY-5009", "TR/Kryptik.udtxo", "TrojanDropper:MSIL/Vibes.A", "Trj/GdSda.A", "MSIL/Kryptik.GXI!tr", "Win32/Trojan.855" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "PowerShell.DownLoader.36", "BehavesLike.Win32.Trojan.dh", "Trojan-Dropper.PowerShell.Ploty", "W32/Trojan.ZKDA-3628", "TrojanDropper:PowerShell/Ploty.C", "Trj/CI.A", "JS/Psdl.A!tr.dldr", "Win32/Trojan.f31" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Analysis", "of", "HackingTeam", "Android", "malware" ]
[ 16, 16, 4, 3, 11 ]
[ "We", "refer", "to", "this", "backdoor", "as", "T9000,", "which", "is", "a", "newer", "variant", "of", "the", "T5000", "malware", "family,", "also", "known", "as", "Plat1." ]
[ 16, 16, 16, 16, 3, 16, 3, 16, 16, 16, 16, 3, 16, 16, 3, 11, 11, 16, 16, 16, 3 ]
[ "In", "2016", ",", "these", "services", "protected", "over", "1.4", "billion", "devices", ",", "making", "Google", "one", "of", "the", "largest", "providers", "of", "on-device", "security", "services", "in", "the", "world", ":", "Identify", "PHAs", "using", "people", ",", "systems", "in", "the", "cloud", ",", "and", "data", "sent", "to", "us", "from", "devices", "Warn", "users", "about", "or", "blocking", "users", "from", "installing", "PHAs", "Continually", "scan", "devices", "for", "PHAs", "and", "other", "harmful", "threats", "Additionally", ",", "we", "are", "providing", "detailed", "technical", "information", "to", "help", "the", "security", "industry", "in", "our", "collective", "work", "against", "PHAs", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Check", "Point", "Software", "So", "far", ",", "HummingBad", "has", "been", "observed", "using", "its", "highly", "privileged", "status", "only", "to", "engage", "in", "click", "fraud", ",", "display", "pop-up", "ads", ",", "tamper", "with", "Google", "Play", ",", "and", "install", "additional", "apps", "that", "do", "more", "of", "the", "same", "." ]
[ 4, 12, 12, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Ransom.Pottieq", "Win32.Trojan.WisdomEyes.16070401.9500.9786", "Trojan.Win32.Aura.evxqqg", "Trojan.Encoder.2667", "BehavesLike.Win32.BadFile.th", "TrojanDropper.FrauDrop.annq", "Trojan[Ransom]/Win32.Aura", "Ransom:Win32/Pottieq.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "]", "6", "2020-02-29", "http", ":", "//themoil", "[", "." ]
[ 9, 9, 16, 1, 9, 9, 9, 9 ]
[ "The", "Trapwot", "malware", "family", "is", "considered", "scareware", "or", "rogue", "antivirus", "because", "it", "attempts", "to", "mislead", "victims", "into", "believing", "their", "machine", "is", "infected", "with", "malware." ]
[ 16, 3, 11, 11, 16, 16, 3, 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16 ]
[ "In", "comparison", "to", "other", "threat", "groups,", "TG-3390", "is", "notable", "for", "its", "tendency", "to", "compromise", "Microsoft", "Exchange", "servers", "using", "a", "custom", "backdoor", "and", "credential", "logger." ]
[ 16, 16, 16, 16, 6, 14, 14, 16, 16, 11, 16, 16, 16, 16, 5, 13, 13, 16, 16, 3, 11, 16, 3, 11 ]
[ "The", "malware", "sets", "a", "registry", "value", "(", "whose", "name", "is", "read", "from", "the", "configuration", "file", ")", "to", "β€œ", "C", ":", "\\Windows\\system32\\rundll32.exe", "c", ":", "\\ProgramData\\AuditApp\\d3d9.dll", ",", "Control_Run", "”", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 9, 1, 9, 9, 9, 1, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Dynamer", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "MSIL.Packed.Skaldring.D", "Win32.Trojan.Fsysna.Hwwo", "Trojan.DownLoader14.15241", "BehavesLike.Win32.Trojan.cc", "Trojan.Crypt", "TR/Dropper.MSIL.rpjh", "Trojan.Barys.DCAFA", "Trojan:Win32/Bshan.A", "Trojan.Fsysna!", "MSIL/Injector.PKZ!tr", "Trj/GdSda.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Yamato", "Transport", "-", "One", "of", "Japan", "'s", "largest", "door-to-door", "delivery", "service", "companies", ",", "also", "in", "Tokyo", "." ]
[ 4, 12, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Worm.Alien", "Trojan.Zusy.D3E06C", "Win32.Trojan.WisdomEyes.16070401.9500.9952", "Worm.Win32.Alien.oe", "W32/Trojan.RDLO-7674", "WORM/Alien.ugxeq", "TrojanDownloader:VBS/Kaloki.A", "Worm.Win32.Alien.oe", "Trj/CI.A", "Win32/Trojan.9de" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "malware", "was", "included", "as", "an", "attachment", "intended", "to", "trick", "the", "user", "into", "opening", "the", "malware." ]
[ 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3 ]
[ "Cybercriminals,", "however,", "are", "equal", "opportunity", "exploiters,", "so", "just", "recently", "an", "interesting", "targeted", "malware", "campaign", "was", "found", "to", "be", "using", "another", "document", "vulnerability." ]
[ 6, 16, 16, 16, 16, 6, 16, 16, 16, 16, 16, 16, 6, 14, 16, 16, 16, 16, 16, 16, 16, 7 ]
[ "The", "backdoor", "code", "was", "found", "between", "Display", "Widgets", "version", "2.6.1", "released", "June", "30", "and", "version", "2.6.3", "released", "September", "2." ]
[ 1, 9, 9, 16, 16, 16, 1, 9, 9, 9, 16, 0, 8, 16, 1, 9, 16, 0, 8 ]
[ "Most", "devices", "can", "be", "controlled", "by", "Xiaomi", "’", "s", "β€œ", "MiHome", "”", "Android", "app", ",", "which", "is", "available", "on", "Google", "Play", "with", "between", "1,000,000", "and", "5,000,000", "downloads", "." ]
[ 16, 16, 16, 16, 16, 16, 4, 16, 16, 16, 5, 16, 5, 16, 16, 16, 16, 16, 16, 5, 13, 16, 16, 16, 16, 16, 16, 16 ]
[ "However,", "over", "the", "past", "few", "years,", "we", "have", "been", "tracking", "a", "separate,", "less", "widely", "known", "suspected", "Iranian", "group", "with", "potential", "destructive", "capabilities,", "whom", "we", "call", "APT33." ]
[ 16, 16, 0, 8, 8, 8, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 6, 14, 16, 16, 16, 16, 16, 16, 16, 6 ]
[ "Because", "all", "the", "URLs", "used", "in", "this", "campaign", "have", "the", "form", "of", "hxxp", ":", "//yyyyyyyy", "[", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 9, 9, 9 ]
[ "If", "the", "registration", "is", "successful,", "it", "uses", "the", "received", "unique", "identifier", "to", "further", "communicate", "with", "the", "C&C", "server", "and", "receive", "commands." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 16, 16, 16, 16, 16, 1, 9, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.Avosim", "Backdoor.Trojan", "W32/Trojan.BPEV-1033", "BDS/Avosim.azmiq", "W32/ISMdoor.5E1D!tr", "Trj/GdSda.A", "Win32/Backdoor.ed0" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1 ]
[ "run", "a", "malicious", "DEX", "file", "without", "notification," ]
[ 16, 16, 3, 1, 9, 12, 16 ]
[ "As", "this", "approach", "was", "not", "a", "great", "success", ",", "their", "last", "attempt", "was", "to", "quickly", "create", "a", "World", "Cup", "app", "and", "this", "time", "distribute", "it", "to", "Israeli", "citizens", ",", "not", "just", "soldiers", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "further", "blog", "by", "FireEye", "titled", "Acknowledgement", "of", "Attacks", "Leveraging", "Microsoft", "Zero-Day", "provided", "additional", "useful", "information." ]
[ 16, 16, 16, 16, 4, 16, 16, 16, 1, 7, 15, 15, 16, 16, 16, 16 ]
[ "The", "Trojan", "uses", "this", "counter", "to", "activate", "the", "bot", "-", "if", "aforementioned", "step", "counter", "hits", "the", "pre-configured", "threshold", "it", "considers", "running", "on", "the", "device", "to", "be", "safe", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "Sage", "ransomware", "variant", "appears", "to", "have", "been", "out", "of", "circulation", "for", "a", "while", "in", "the", "malware", "scene." ]
[ 3, 11, 11, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16 ]
[ "A", "backdoor", "also", "known", "as:", "PDF/Trojan.PGPW-0" ]
[ 16, 3, 16, 16, 16, 1 ]
[ "After", "further", "research,", "we", "found", "the", "malware", "has", "been", "repackaged", "into", "several", "pirated", "iOS", "apps", "that", "are", "available", "for", "download", "via", "multiple", "channels." ]
[ 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 1, 9, 9, 15, 16, 16, 16, 16, 16, 1, 9 ]
[ "Crypt0l0cker", "has", "gone", "through", "a", "long", "evolution,", "the", "adversaries", "are", "updating", "and", "improving", "the", "malware", "on", "a", "regular", "basis." ]
[ 3, 16, 16, 16, 16, 16, 16, 6, 14, 16, 16, 16, 16, 16, 3, 16, 0, 8, 8 ]
[ "These", "attacks", "are", "only", "becoming", "more", "common", ",", "with", "one", "third", "of", "all", "malware", "now", "targeting", "mobile", "endpoints", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Handover", "from", "initial", "module", "to", "the", "main", "payload", "As", "mentioned", ",", "the", "initial", "handover", "component", "called", "triggerInfection", "with", "an", "instance", "of", "appObj", "and", "a", "method", "that", "returns", "the", "value", "for", "the", "variable", "config", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Let", "’", "s", "take", "a", "closer", "look", "at", "the", "suspicious", "file", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "Sofacy", "group,", "also", "known", "as", "APT28", "and", "Sednit,", "is", "a", "fairly", "well", "known", "cyber", "espionage", "group", "believed", "to", "have", "ties", "to", "Russia." ]
[ 6, 14, 14, 16, 16, 16, 6, 16, 6, 16, 16, 16, 16, 16, 6, 14, 14, 16, 16, 16, 16, 16, 2 ]
[ "Even", "harder", "is", "when", "you", "do", "not", "receive", "telemetry", "data", "from", "products", "that", "contains", "information", "about", "infected", "machines." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 16, 16, 16, 16, 16, 16, 5, 13 ]
[ "]", "205", "[", "." ]
[ 9, 9, 9, 9 ]
[ "What", "is", "more,", "they", "are", "tied", "to", "the", "attacked", "applications,", "which", "creates", "an", "illusion", "that", "they", "are", "legitimate", "and", "belong", "to", "the", "corresponding", "software." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 1, 5, 16, 16, 16, 1, 15, 16, 16, 1, 16, 1, 9, 9, 9, 9 ]
[ "However,", "there", "are", "several", "good", "reasons", "for", "an", "attacker", "to", "use", "this", "particular", "feature." ]
[ 16, 16, 16, 16, 16, 16, 11, 16, 6, 16, 16, 16, 16, 7 ]
[ "NCC", "Group", "is", "monitoring", "a", "number", "of", "OOXML", "and", "RTF", "techniques", "our", "red", "team", "has", "been", "using", "since", "September", "2016,", "which", "uncovered", "multiple", "malicious", "documents", "from", "around", "August", "2017." ]
[ 4, 12, 16, 16, 16, 16, 16, 1, 16, 1, 9, 16, 4, 12, 16, 16, 16, 16, 0, 8, 16, 16, 1, 9, 9, 16, 16, 0, 8 ]
[ "β€œ", "Agent", "Smith", "”", "will", "replace", "the", "original", "application", "’", "s", "activities", "with", "an", "in-house", "SDK", "’", "s", "activity", ",", "which", "will", "show", "the", "banner", "received", "from", "the", "server", "." ]
[ 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "It", "has", "modular", "architecture", "implemented", "in", "the", "form", "of", "plugins", ",", "or", "it", "can", "receive", "new", ".NET", "source", "code", ",", "which", "will", "be", "compiled", "on", "the", "device", "in", "runtime", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Virus.Win32.Sality!O", "Tool.Transmit.Win32.60", "Win32.Trojan.WisdomEyes.16070401.9500.9549", "not-a-virus:NetTool.Win32.Transmit.a", "Riskware.Win32.Transmit.exlakv", "Trojan.Win32.Z.Transmit.67795", "Backdoor.Win32.VanBot.24", "Tool.Transmit", "BehavesLike.Win32.VirRansom.kc", "Trojan/Pakes.emd", "not-a-virus:NetTool.Win32.Transmit.a", "Trj/CI.A", "Trojan.TenThief.DNFTrojan.tnh" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "attacks", "leveraged", "a", "malware", "named", "EyePyramid", "to", "target", "a", "dozen", "politicians,", "bankers,", "prominent", "freemasons", "and", "law", "enforcement", "personalities", "in", "Italy." ]
[ 16, 1, 16, 16, 3, 16, 3, 16, 16, 16, 16, 4, 12, 12, 12, 16, 4, 12, 12, 16, 2 ]
[ "Recently,", "we've", "seen", "a", "number", "of", "reports", "related", "to", "9002", "remote", "access", "Trojan", "RAT." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 11, 11, 11 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Kadena.B4", "Trojan.Ipatre.1", "Win32.Trojan.Kryptik.lx", "TROJ_UPATRE.SMX7", "Win32.Trojan.Kryptik.CI", "Trojan.Win32.Kryptik.expevv", "Trojan.Win32.Z.Upatre.71168.AI", "TrojWare.Win32.TrojanDownloader.Upatre.EMD", "Trojan.DownLoader26.15470", "TROJ_UPATRE.SMX7", "W32/Trojan.DPWC-8231", "TR/Crypt.ZPACK.karjs", "Trojan/Win32.Upatre.R160419", "Trojan-Downloader.Win32.Waski", "W32/Kryptic.ABGK!tr", "Win32/Trojan.8c5" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Under", "these", "conditions", ",", "the", "app", "continues", "executing", "and", "the", "intent", "of", "targeting", "Xiaomi", "devices", "and", "users", "could", "be", "inferred", ",", "however", "poorly", "written", "code", "results", "in", "execution", "in", "more", "environments", "than", "perhaps", "intended", ";", "further", "checks", "are", "made", "to", "ascertain", "whether", "the", "app", "is", "running", "on", "an", "emulator", ",", "perhaps", "to", "evade", "researcher", "analysis", "environments", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "EventBot", "Updated", "library", "naming", "convention", "EventBot", "New", "library", "naming", "convention", "." ]
[ 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16 ]
[ "When", "clicked", "it", "launches", "an", "infection", "chain", "made", "up", "of", "JavaScript,", "and", "a", "final", "shellcode", "payload", "that", "makes", "use", "of", "DNS", "to", "load", "additional", "shellcode", "from", "a", "remote", "command", "and", "control", "server." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 1, 9, 9, 16, 16, 16, 16, 5, 16, 16, 16, 3, 16, 1, 9, 9, 9, 9, 9 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.IRC.MRAK.A", "Virus.Win32.Mkar!O", "W32.Mkar.A4", "Backdoor.IRC.MRAK.A", "Virus.Mkar.Win32.5", "Backdoor.IRC.MRAK.A", "Win32.Trojan.WisdomEyes.16070401.9500.9981", "W32/Mkar.C", "W32.Marak", "PE_MKAR.A.DAM", "Win.Trojan.Mkar-3", "Virus.Win32.Mkar.a", "Backdoor.IRC.MRAK.A", "Virus.Win32.Mkar.cyau", "Backdoor.IRC.MRAK.A", "Win32.Mkar.A", "Backdoor.IRC.MRAK.A", "Win32.HLLP.Mrak.9", "PE_MKAR.A.DAM", "BehavesLike.Win32.Koobface.mc", "W32/Mkar.LNJG-1026", "WORM/Mkar.A", "Backdoor:Win32/Mkar.A", "Win32.Mrak.A", "Virus.Win32.Mkar.a", "Backdoor.IRC.MRAK.A", "Malware/Win32.Mkar.C408081", "Win32/Mkar.A", "Win32.Mkar.E", "Virus.Win32.Mkar", "W32/Mkar.D", "W32/Mkar.E" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "CrowdStrike", "Services", "Inc.,", "our", "Incident", "Response", "group,", "was", "called", "by", "the", "Democratic", "National", "Committee", "DNC,", "the", "formal", "governing", "body", "for", "the", "US", "Democratic", "Party,", "to", "respond", "to", "a", "suspected", "breach." ]
[ 4, 12, 12, 16, 16, 16, 12, 16, 16, 16, 4, 12, 12, 12, 16, 16, 4, 12, 12, 16, 16, 4, 12, 12, 16, 16, 16, 16, 1, 9 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/W32.Buzus.32878.D", "TrojanDownloader.Small.grk", "Trojan/Downloader.Small.grk", "Trojan.DL.Small.ALEE", "Win32/SlhBack.B", "W32/Downldr2.BDIE", "W32/DLoader.DZIA", "Trojan.Downloader-20119", "Trojan-Downloader.Win32.Small.grk", "Trojan.Downloader.Delf.OJS", "Backdoor.Win32.SlhBack.B", "Trojan.Downloader.Delf.OJS", "Trojan.DownLoader.50258", "TR/Dldr.Small.grk.24", "TROJ_DELF.HXO", "Heuristic.BehavesLike.Win32.Backdoor.H", "Win32/SillyDl.ETL", "W32/Downldr2.BDIE", "TrojanDownloader.Small.zhn", "Trojan-PWS.Win32.OnLineGames!IK", "TrojanDownloader:Win32/Small.AAAL", "Trojan.Win32.Downloader.35496", "Trojan.Downloader.Delf.OJS", "Win-Trojan/Downloader.32877", "Trojan-Downloader.Win32.Small.grk", "Trojan.DL.Small.AJEZ", "Trojan.DL.Win32.Small.grk", "Trojan-PWS.Win32.OnLineGames", "W32/Small.GRK!tr", "Trj/Downloader.REB" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "C", "&", "C", "server", "IP", "addresses", "used", "also", "appear", "to", "be", "disparate", ",", "as", "they", "were", "located", "in", "many", "European", "countries", "like", "Russia", ",", "France", ",", "Holland", ",", "and", "Germany", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "McAfee", "Labs", "research", "team", "has", "tracked", "an", "advanced", "persistent", "threat", "for", "the", "past", "couple", "of", "months." ]
[ 16, 4, 12, 12, 12, 16, 16, 16, 6, 14, 14, 11, 16, 0, 8, 8, 8 ]
[ "Install", "a", "mobile", "security", "solution", "to", "secure", "your", "device", "from", "threats", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "This", "means", "that", "the", "malware", "can", "be", "remotely", "eliminated", "by", "an", "SMS", "message", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Win32.Vilsel!O", "BackDoor-EZO.a", "Trojan/Bewymids.a", "Trojan.Vilsel!fjBL+ssgwjs", "Infostealer.Hoardy", "Win.Trojan.Vilsel-265", "Trojan.Win32.Vilsel.aybc", "Trojan.Win32.Vilsel.djwjt", "Trojan.Win32.S.Vilsel.61544[h]", "Trojan.DownLoader2.44985", "Trojan.Vilsel.Win32.20666", "BehavesLike.Win32.Downloader.km", "Trojan/Vilsel.uxx", "TR/Bewymids.A.2", "Trojan/Win32.Vilsel", "Win32.Troj.Vilsel.kcloud", "Trojan:Win32/Bewymids.A", "Trojan/Win32.Vilsel", "Spyware.Infostealer.Flea.APT", "Trojan.Vilsel", "Win32.Trojan.Vilsel.Phqe", "Trojan.Win32.Vilsel", "W32/Vilsel.AYBC!tr", "Trojan.Win32.Bewymids.BA", "Win32/Trojan.bab" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]