tokens
sequencelengths
2
296
ner_tags
sequencelengths
2
296
[ "]", "infoacount-manager", "[", "." ]
[ 9, 9, 1, 9 ]
[ "THREAT", "ANALYSIS", "Infection", "Vector", ":", "Smishing", "Your", "Device", "Thus", "far", ",", "FakeSpy", "campaigns", "are", "characterized", "by", "SMS", "phishing", "(", "a.k.a", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Win32.VB!O", "Trojan.VB", "Trojan/VB.bmd", "Win32.Trojan.WisdomEyes.16070401.9500.9998", "W32/Trojan.ZJNQ-3376", "TROJ_VB.FVH", "Win.Trojan.VB-3241", "Trojan.Win32.VB.bmd", "Trojan.Win32.VB.crkyqv", "Troj.W32.Vb!c", "Trojan.Win32.VB.aae", "Trojan.SimSun", "Trojan.VB.Win32.1599", "TROJ_VB.FVH", "BehavesLike.Win32.PJTbinder.qz", "Trojan.Win32.Elkmil", "W32/Trojan2.YLV", "W32/VB.QRB!tr", "Trojan/Win32.VB", "Win32.Troj.VB.kcloud", "Trojan.Heur.E1F0CA", "Trojan.Win32.VB.28672.K", "Trojan.Win32.VB.bmd", "Trojan/Win32.Xema.R125410", "TScope.Trojan.VB", "Trj/QQPass.AWP", "Virus.Win32.HideDoc.C" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "]", "orgmary-crawley", "[", "." ]
[ 9, 9, 1, 9 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor/W32.PPdoor.159232", "Backdoor.Win32.PPdoor!O", "Win32.Trojan.WisdomEyes.16070401.9500.9989", "Backdoor.Trojan", "BKDR_PPDOOR.AL", "Win.Trojan.PPDoor-3", "Backdoor.Win32.PPdoor.bo", "Trojan.Win32.PPdoor.qstx", "Backdoor.Win32.PPdoor.A", "BackDoor.Srvlite", "BKDR_PPDOOR.AL", "BehavesLike.Win32.Pykse.ch", "W32/PPdoor.GR", "Backdoor/PPdoor.bo", "DR/Pere.103936.E.2", "Trojan[Backdoor]/Win32.PPdoor", "Backdoor:Win32/Ppdoor.AJ", "Backdoor.Win32.PPdoor.bo", "Trojan/Win32.Ppdoor.C139757", "Virus.Win32.Bayan-based", "Backdoor.PPdoor!lYc+pVWanGQ", "Backdoor.Win32.PPdoor", "Trj/PPDoor.FD" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Check", "Point", "Mobile", "Threat", "Prevention", "has", "detected", "a", "new,", "unknown", "mobile", "malware", "that", "targeted", "two", "customer", "Android", "devices", "belonging", "to", "employees", "at", "a", "large", "financial", "services", "institution." ]
[ 4, 12, 12, 12, 12, 16, 16, 16, 16, 3, 12, 11, 16, 16, 16, 16, 5, 13, 16, 16, 4, 16, 16, 4, 12, 12, 12 ]
[ "This", "is", "further", "corroborated", "by", "some", "older", "and", "unobfuscated", "samples", "from", "2016", ",", "whose", "primary", "classes", "are", "named", "CheckValidTarget", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "FireEye", "recommends", "that", "Microsoft", "Office", "users", "apply", "the", "patch", "from", "Microsoft." ]
[ 4, 16, 16, 5, 13, 16, 16, 16, 16, 16, 4 ]
[ "It", "is", "very", "easy", "to", "trick", "victims", "to", "fall", "for", "such", "attacks", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Hacktool.Flystudio.16558", "TSPY_AKSULA_CA083865.TOMC", "Win32.Trojan-PSW.Alipay.a", "TSPY_AKSULA_CA083865.TOMC", "Trojan-PSW.Win32.Alipay.peq", "Troj.Downloader.W32.BaiDload.lhQG", "TR/Aksula.jqeqy", "Trojan:Win32/Aksula.A", "Trojan.Mikey.D906C", "Trojan-PSW.Win32.Alipay.peq", "Trojan/Win32.Aksula.R27086", "Win32.Trojan-qqpass.Qqrob.Phqe" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "IOCs", "C", "&", "C", "IP", "addresses", ":", "155.133.82.181", "155.133.82.240", "155.133.82.244", "185.234.218.59", "195.22.126.160", "195.22.126.163", "195.22.126.80", "195.22.126.81", "5.45.73.24", "5.45.74.130", "IP", "addresses", "from", "which", "the", "Trojan", "was", "downloaded", ":", "185.174.173.31", "185.234.218.59", "188.166.156.110", "195.22.126.160", "195.22.126.80", "195.22.126.81", "195.22.126.82", "195.22.126.83", "SHA256", ":", "158c7688877853ffedb572ccaa8aa9eff47fa379338151f486e46d8983ce1b67", "3aedbe7057130cf359b9b57fa533c2b85bab9612c34697585497734530e7457d", "f3ae6762df3f2c56b3fe598a9e3ff96ddf878c553be95bacbd192bd14debd637", "df61a75b7cfa128d4912e5cb648cfc504a8e7b25f6c83ed19194905fef8624c8", "c0cfd462ab21f6798e962515ac0c15a92036edd3e2e63639263bf2fd2a10c184", "d791e0ce494104e2ae0092bb4adc398ce740fef28fa2280840ae7f61d4734514", "38dcec47e2f4471b032a8872ca695044ddf0c61b9e8d37274147158f689d65b9", "27cea60e23b0f62b4b131da29fdda916bc4539c34bb142fb6d3f8bb82380fe4c", "31edacd064debdae892ab0bc788091c58a03808997e11b6c46a6a5de493ed25d", "87ffec0fe0e7a83e6433694d7f24cfde2f70fc45800aa2acb8e816ceba428951", "eabc604fe6b5943187c12b8635755c303c450f718cc0c8e561df22a27264f101", "Kernel", "Backdoor", "found", "in", "Gadgets", "Powered", "by", "Popular", "Chinese", "ARM", "Maker", "May", "12", ",", "2016", "Mohit", "Kumar", "How", "to", "Hack", "an", "Android", "device", "?", "It", "is", "possibly", "one", "of", "the", "most", "frequently", "asked", "questions", "on", "the", "Internet", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 9, 9, 16, 16, 16, 16, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "All", "born", "in", "the", "90s,", "these", "neophytes", "are", "not", "afraid", "to", "get", "caught,", "carelessly", "leaving", "a", "trail", "of", "traceable", "contact", "details", "online." ]
[ 16, 16, 16, 16, 0, 16, 6, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 9, 9, 9, 9, 16 ]
[ "]", "975685", "[", "." ]
[ 9, 9, 9, 9 ]
[ "A", "backdoor", "also", "known", "as:", "W32.DefayliLTO.Trojan", "Trojan.Win32.Cosmu!O", "Trojan.Hosts", "Trojan.Cosmu.Win32.8116", "Win32.Trojan.Qhost.y", "W32/Trojan2.OIIF", "Trojan.Qhosts", "TROJ_COSMU_000001b.TOMA", "Win.Trojan.Cosmu-1352", "Trojan.Win32.Hosts2.wog", "Trojan.Win32.Drop.rqzxb", "Troj.W32.Hosts2.toz0", "Virus.Win32.Virut.ua", "TrojWare.Win32.Qhost.rqj", "Trojan.MulDrop3.7647", "TROJ_COSMU_000001b.TOMA", "BehavesLike.Win32.PUPXAN.tz", "W32/Trojan.VWTG-6346", "Win32/Virut.bv", "TR/Cosmu.oiqea", "Trojan/Win32.Cosmu", "Worm:Win32/Makc.A", "Trojan.Graftor.D2333", "Trojan.Win32.A.Cosmu.577633", "Trojan.Win32.Hosts2.wog", "HEUR/Fakon.mwf", "BScope.Trojan.IRCbot", "Win32/Qhost.ONX", "Trojan.Cosmu!mnslE6bxKwc", "Worm.Win32.AutoIt", "W32/Qhost.ONX!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "As", "soon", "as", "a", "user", "tries", "to", "open", "the", "app", ",", "it", "launches", "a", "fake", "notification", "and", "soon", "the", "notification", "as", "well", "as", "the", "app", "icon", "disappears", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.Gezak", "Trojan.Vir.HLL", "Trojan.Heur.ED5CCE", "WORM_GEZAK.A", "W32/Risk.GNIP-0600", "W32.Osapex", "Win32/Gezak.A", "WORM_GEZAK.A", "Win.Trojan.Gezak-1", "Virus.Win32.HLLW.Gezak", "Virus.Win32.HLLW.gjmh", "W32.HLLW.Gezak!c", "Win32.HLLW.Gezak", "Win32.HLLW.Osapex", "Virus.Gezak.Win32.1", "W32/Osapex.b.worm", "Win32/HLLW.Gezak", "Virus/Win32.Gezak", "Win32.HLLW.kcloud", "Virus.Win32.HLLW.Gezak", "Win32/Osapex.worm.31744", "W32/Osapex.b.worm", "Trojan.Worm", "Univ.AP.K", "Win32/HLLW.Gezak", "Win32.Virus.Hllw.Hnbi", "Win32.HLLW.Gezak", "Virus.Win32.HLLW", "W32/Gezak.A!worm", "Win32/Worm.fc8" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Some", "examples", "are", "email", "messages", "claiming", "to", "be", "in", "regards", "to", "an", "overdue", "bill", "or", "invoice,", "utilizing", "such", "terminology", "in", "the", "subject", "line", "and", "given", "file", "name,", "such", "as", "invoice.zip", "or", "payment_doc_298427.zip" ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 16, 1, 16, 16, 1, 16, 16, 1, 9, 16, 1, 9, 9, 16, 16, 1, 16, 1 ]
[ "Figure", "13", ":", "Popup", "asking", "for", "a", "credit", "card", "number", "The", "application", "also", "supports", "stealing", "credit", "card", "verification", "information", "(", "Figures", "14", "and", "15", ")", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "It", "is", "important", "to", "note", "that", "the", "activity", "conducted", "by", "the", "malware", "is", "not", "borderline", "advertising", ",", "but", "definitely", "an", "illegitimate", "use", "of", "the", "users", "’", "mobile", "devices", "for", "generating", "fraudulent", "clicks", ",", "benefiting", "the", "attackers", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "We", "haven't", "seen", "Locky", "for", "a", "long", "time,", "so", "I", "was", "quite", "surprised", "to", "see", "this", "one." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Zen", "'s", "rooting", "trojan", "apps", "target", "a", "specific", "device", "model", "with", "a", "very", "specific", "system", "image", "." ]
[ 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "WHO", "IS", "BEHIND", "FAKESPY", "’", "S", "SMISHING", "CAMPAIGNS", "?", "The", "Cybereason", "Nocturnus", "team", "suspects", "that", "the", "malware", "operators", "and", "authors", "are", "Chinese", "speakers", "." ]
[ 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 4, 12, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "It", "was", "hosting", "an", "Adobe", "Flash", "exploit", "targeting", "one", "of", "the", "newly", "disclosed", "vulnerabilities", "from", "the", "Hacking", "Team", "data", "breach,", "CVE-2015-5122." ]
[ 16, 16, 16, 16, 5, 13, 3, 16, 16, 16, 16, 16, 16, 7, 16, 16, 4, 12, 16, 16, 1 ]
[ "After", "that", "it", "’", "s", "necessary", "to", "send", "β€œ", "stop_blocker", "”", "to", "the", "same", "number", "–", "this", "will", "disable", "the", "display", "of", "HTML", "pages", "that", "extort", "money", "and", "block", "the", "screen", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/W32.Small.14848.GD", "Trojan.Win32.Small!O", "Trojan/Small.cnp", "Trojan.Conjar.8", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Trojan.Ransomlock", "TROJ_IKYTOK.SMI", "Trojan.Win32.Small.djdxj", "TROJ_IKYTOK.SMI", "Trojan/Small.kgz", "TR/Zapchast.I", "Trojan:Win32/Ikytoky.A", "Trojan.Win32.A.Small.14848", "Trojan/Win32.Menti.R9065", "Trojan.Karagany", "Trojan.Downloader.MB", "Trj/Hexas.HEU" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/Injector.dtxv", "TROJ_INJECTOR_HA010038.UVPM", "Win32.Trojan-PSW.Fareit.a", "W32/Injector.GBX", "TROJ_INJECTOR_HA010038.UVPM", "Win.Trojan.Fareit-403", "Riskware.Win32.Stealer.evlqpt", "Trojan.PWS.Stealer.18592", "Trojan.Ekstak.Win32.3539", "W32/Injector.ELVO-4299", "DR/Delphi.rghyi", "Trojan/Win32.Ekstak.R214290", "Backdoor.Androm", "Trojan.Injector", "Win32/PSW.Fareit.A", "Trojan.Win32.Injector", "W32/Kryptik.GCFM!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "]", "site/gate_cb8a5aea1ab302f0_c", "online", "208.91.197", "[", "." ]
[ 9, 9, 16, 1, 9, 9 ]
[ "Many", "domains", "in", "this", "report", "are", "compromised", "domains", "-", "traffic", "to", "them", "may", "not", "be", "malicious." ]
[ 1, 9, 16, 16, 16, 16, 1, 9, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "tweet", "stated", "that", "TrickBot", ",", "a", "well-known", "banking", "Trojan", "owned", "by", "an", "organized", "cybercrime", "gang", ",", "uses", "man-in-the-browser", "(", "MITB", ")", "web", "injects", "in", "online", "banking", "sessions", "to", "ask", "infected", "users", "for", "their", "mobile", "phone", "number", "and", "device", "type", "." ]
[ 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Figure", "14", "." ]
[ 16, 16, 16 ]
[ "It", "can", "not", "act", "independently", "and", "operates", "strictly", "in", "accordance", "with", "commands", "received", "from", "the", "C", "&", "C", "server", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Analysis", "of", "TG-3390's", "operations,", "targeting,", "and", "tools", "led", "CTU", "researchers", "to", "assess", "with", "moderate", "confidence", "the", "group", "is", "located", "in", "the", "People's", "Republic", "of", "China." ]
[ 16, 16, 6, 14, 16, 16, 3, 16, 4, 9, 16, 16, 16, 16, 16, 16, 12, 16, 16, 16, 2, 10, 10, 10, 10 ]
[ "In", "January", "2016", "Forcepoint", "Security", "Labs", "reported", "an", "email", "campaign", "delivering", "the", "Ursnif", "banking", "Trojan", "which", "used", "the", "Range'", "feature", "within", "its", "initial", "HTTP", "requests", "to", "avoid", "detection." ]
[ 16, 0, 8, 4, 12, 12, 16, 16, 6, 14, 16, 16, 3, 11, 11, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 16, 16, 16 ]
[ "The", "Lazarus", "group,", "which", "has", "been", "identified", "as", "the", "backbone", "of", "the", "report,", "has", "been", "active", "in", "the", "past,", "and", "Novetta's", "research", "is", "helping", "to", "preemptively", "counteract", "and", "prevent", "Lazarus", "attacks", "around", "the", "world." ]
[ 6, 14, 14, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 12, 16, 16, 16, 16, 16, 16, 16, 6, 1, 16, 16, 2 ]
[ "While", "vertical", "targeting", "varies,", "we", "observed", "a", "significant", "focus", "on", "Financial", "Services." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 12 ]
[ "Figure", "6", ":", "bit.ly", "statistics", "for", "the", "fake", "Bank", "Austria", "Android", "app", "download", "link", "From", "this", "small", "sample", ",", "we", "see", "that", "7", "%", "of", "visitors", "clicked", "through", "to", "download", "the", "application", ",", "which", "is", "actually", "a", "version", "of", "the", "Marcher", "banking", "Trojan", "named", "β€œ", "BankAustria.apk", "”", ",", "continuing", "the", "fraudulent", "use", "of", "the", "bank", "’", "s", "branding", "to", "fool", "potential", "victims", "." ]
[ 16, 16, 16, 1, 16, 16, 16, 16, 5, 13, 13, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 11, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.LRSgzengelSvrA.Trojan", "Trojan/W32.Rootkit.78592", "Trojan.Festi.C6", "Trojan/Tent.cow", "Trojan.Rootkit.1", "RTKT_FESTI.SM", "Win32.Trojan.WisdomEyes.16070401.9500.9989", "Trojan.Festi", "RTKT_FESTI.SM", "Win.Trojan.Rootkit-4345", "Trojan.Win32.Tent.ddfje", "Trojan.NtRootKit.12267", "Rootkit.Tent.Win32.134", "Rootkit.Tent.fc", "RKIT/Tent.aui", "Trojan[Rootkit]/Win32.Tent", "Backdoor:WinNT/Festi.C", "Win-Trojan/Festi.78592", "TScope.Malware-Cryptor.SB", "Trj/CI.A", "Win32.Exploit.Tent.cmvx" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "In", "order", "to", "simulate", "this", "technique", ",", "we", "took", "two", "videos", "side", "by", "side", "of", "how", "FakeSpy", "(", "the", "Royal", "Mail", "sample", ")", "behaves", "differently", "on", "a", "physical", "device", "versus", "an", "emulator", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 4, 12, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.downCN.Adware", "Trojan-Downloader.Win32.Petus!O", "Win32.Trojan.WisdomEyes.16070401.9500.9998", "TROJ_DLDR.SMIH", "Trojan.Win32.Petus.efjtuk", "Trojan.Win32.A.Downloader.69153", "Troj.Dropper.W32.StartPage.lmCy", "Trojan.DownLoader4.54937", "Downloader.Petus.Win32.9", "TROJ_DLDR.SMIH", "Trojan-Downloader.Win32.Petus", "Trojan[Downloader]/Win32.Petus", "TrojanDownloader:Win32/Petus.C", "Trojan/Win32.Petus.R4023", "Win32/Trojan.c81" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "Android", "malware", "Android.Oldboot", "is", "almost", "impossible", "to", "remove", ",", "not", "even", "with", "formatting", "your", "device", "." ]
[ 16, 5, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.FamVT.Cosmu.PE", "Win32.Worm.VB.NZQ", "Trojan.Win32.Cosmu!O", "W32.Lamer.EL3", "Trojan.Downloader", "Worm.VB.Win32.26804", "Trojan/VB.nup", "Win32.Virus.VBbind.a", "W32.Besverit", "Win32/VB.JU", "TROJ_DLOADR.SMM", "Win.Trojan.Cosmu-4", "Virus.Win32.Lamer.el", "Win32.Worm.VB.NZQ", "Trojan.Win32.VB.ltch", "Trojan.Win32.Cosmu.887991", "Worm.Win32.VB.kp", "Win32.Worm.VB.NZQ", "Win32.Worm.VB.NZQ", "Win32.HLLW.Autoruner.6014", "TROJ_DLOADR.SMM", "BehavesLike.Win32.Autorun.vh", "Worm.Win32.VB", "Trojan/Cosmu.lan", "Win32.Worm.VB.NZQ", "Troj.Downloader.W32.VB.l4ji", "Virus.Win32.Lamer.el", "Win32.Worm.VB.NZQ", "Win32/Lamer.D", "Win32.Worm.VB.NZQ", "SIM.Trojan.VBO.0859", "Win32/VB.NUP", "W32/AutoRun.RPV!worm", "W32/OverDoom.A", "Virus.Win32.Lamer.B" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "In", "early", "2015,", "FIN1", "updated", "their", "toolset", "to", "include", "a", "utility", "that", "modifies", "the", "legitimate", "system", "Volume", "Boot", "Record", "VBR", "and", "hijacks", "the", "system", "boot", "process", "to", "begin", "loading", "Nemesis", "components", "before", "the", "Windows", "operating", "system", "code." ]
[ 16, 0, 8, 6, 16, 16, 16, 16, 16, 16, 16, 16, 7, 1, 9, 9, 9, 9, 9, 9, 16, 1, 1, 1, 1, 1, 16, 16, 16, 3, 11, 16, 16, 5, 13, 13, 1 ]
[ "The", "precautions", "you", "take", "online", "have", "been", "covered", "extensively", "in", "almost", "all", "of", "our", "blogs", ";", "even", "so", ",", "we", "believe", "this", "information", "bears", "repeating", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Exploit.Java.CVE20130422.crcqcf", "Exploit:Java/CVE-2013-0422.A", "heur:Exploit.CVE-2013-0422", "Exploit:Java/Obfuscator.AS", "Trojan.Java.Downloader", "virus.java.bot.a" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1 ]
[ "All", "encrypted", "archives", "can", "be", "divided", "into", "two", "groups", ":", "the", "first", "comprises", "Game321.res", ",", "Game322.res", ",", "Game323.res", "and", "Game642.res", "–", "and", "these", "are", "used", "in", "the", "initial", "phase", "of", "infection", ",", "while", "the", "second", "group", ":", "Game324.res", "and", "Game644.res", ",", "are", "used", "in", "the", "main", "phase", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 1, 16, 1, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.PasistA.Worm", "Worm.Sfone.A3", "Worm.Sform", "Worm.Sfone", "W32/Worm.BLGI", "W32.SillyWNSE", "Win32/Sfone.A", "BehavesLike.Win32.Trojan.ch", "W32/Worm.KOKR-0749", "Worm:Win32/Sfone.A", "Worm.Sfone.A", "W32/WinSxsBot.A.worm" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Malicious", "iOS", "profile", "In", "the", "case", "of", "Apple", "devices", ",", "the", "downloaded", "malicious", "iOS", "profile", "gathers", "the", "following", ":", "Unique", "device", "identifier", "(", "UDID", ")", "International", "Mobile", "Equipment", "Identity", "(", "IMEI", ")", "Integrated", "Circuit", "Card", "ID", "(", "ICCID", ")", "Mobile", "equipment", "identifier", "(", "MEID", ")", "Version", "number", "Product", "number", "The", "profile", "installations", "differ", "depending", "on", "the", "iOS", "." ]
[ 16, 5, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16 ]
[ "]", "com", "Counter", "Measures", "Use", "an", "up", "to", "date", "anti-malware", "software", "that", "is", "capable", "of", "identifying", "this", "threat", "." ]
[ 9, 9, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Communicates", "via", "TOR" ]
[ 1, 16, 5 ]
[ "ONLINE", "–", "send", "information", "about", "Trojan", "’", "s", "current", "status", "to", "C", "&", "C", ":", "whether", "it", "has", "device", "administrator", "privileges", ",", "which", "HTML", "page", "is", "currently", "displayed", ",", "whether", "screen", "is", "on", "or", "off", ",", "etc", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Without", "the", "use", "of", "SSL", "interception", "traditional", "IDS/IPS", "systems", "could", "cease", "to", "detect", "compromised", "systems." ]
[ 16, 16, 16, 16, 1, 9, 16, 5, 13, 16, 16, 16, 16, 5, 13 ]
[ "A", "backdoor", "also", "known", "as:", "Worm.Theals", "W32/Theals.dam", "Worm.Theals.Win32.2", "Win32.Trojan.WisdomEyes.16070401.9500.9975", "Win32/VB.VOMRAe", "Win.Exploit.DCOM-5", "Net-Worm.Win32.Theals.c", "Virus.Win32.Theals.vvbf", "Net.Worm.W32!c", "Virus.Win32.Theals_re.c", "Win32.Zombie.4214", "BehavesLike.Win32.Virut.ch", "Worm/Theals.i", "W32/Theals.D", "Win32.Theals.bd.8704", "Net-Worm.Win32.Theals.c", "Worm/Win32.Theals.C1456665", "Virus.Win32.Stealth.c", "W32/Theals.C!worm.im", "Win32/Trojan.529" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.Delf.S10", "Trojan.Delf.Win32.63014", "Troj.W32.Bcex.tnto", "Win32.Trojan.Delf.ah", "Downloader.Ponik", "Win.Trojan.Delf-33216", "Win32.Trojan-Dropper.FakeDoc.B", "Trojan.Win32.Broskod.rb", "Trojan.Win32.Delf.cqqvkh", "TrojWare.Win32.Delf.DHHK", "BehavesLike.Win32.AdwareDealPly.ch", "Worm.Win32.Takc", "Trojan/Win32.Unknown", "Worm:Win32/Takc.A", "Trojan.Win32.Broskod.rb", "Hoax.Blocker", "Win32.Virus.Delf.Wsjq", "Trojan.Delf!8gjXiSoqNjg", "W32/Delf.NBJ!tr", "Win32/Trojan.Delf.I" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "very", "unique", "technique", "is", "being", "used", "to", "inject", "this", "Trojan", "into", "an", "Android", "system", "where", "an", "attacker", "places", "a", "component", "of", "it", "into", "the", "boot", "partition", "of", "the", "file", "system", "and", "modify", "the", "'init", "'", "script", "(", "initialize", "the", "operating", "system", ")", "to", "re-load", "the", "malware", "as", "you", "switch", "on", "your", "android", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Ransom.Apollo", "Ransom.Apollo", "Ransom_Apollo.R058C0TLR17", "Win32.Trojan.WisdomEyes.16070401.9500.9925", "W32/Trojan.MNOB-4766", "Ransom_Apollo.R058C0TLR17", "Win32.Trojan-Ransom.ApolloLocker.A", "Trojan.Win32.Crypted.ewmuiu", "W32.Troj.Ransom!c", "Ransom.Win32.Apollo", "Ransom:Win32/Apollo.A", "Trj/CI.A", "Win32/Trojan.160" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.JobLaunch.ODB", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Backdoor.Memsyl", "TROJ_NECURS.SMJ10", "Trojan.Win32.Crypted.dgzzxe", "Trojan.DownLoader11.38598", "TROJ_NECURS.SMJ10", "W32/Trojan.TVCC-2701", "TrojanDropper.Injector.atzu", "Trojan.Zusy.D1B5A0", "Dropper/Win32.Necurs.R121870", "TrojanDropper.Injector", "Trojan.MSIL.Inject", "MSIL/Injector.FWI!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "HW32.Packed.C675", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "W32/Trojan2.IUJL", "SecurityRisk.Downldr", "Trojan.DownLoad.42343", "W32.Malware.Downloader", "Trojan.Kelios.1", "TScope.Malware-Cryptor.SB", "Trojan.Win32.Dogrobot" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Initial", "research", "identified", "that", "the", "filename", "suggested", "a", "relationship", "to", "the", "D-30", "122mm", "towed", "howitzer,", "an", "artillery", "weapon", "first", "manufactured", "in", "the", "Soviet", "Union", "in", "the", "1960s", "but", "still", "in", "use", "today." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 12, 12, 12, 12, 16, 4, 12, 16, 16, 16, 2, 10, 10, 16, 16, 0, 16, 16, 16, 16, 0 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9772", "Win.Trojan.Adwind-9", "W32/Trojan.YEAY-3186", "W32.Dropper.Java", "Trj/CI.A", "Win32/Application.22f" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "HW32.Packed.38CB", "Virus.Win32.Virut" ]
[ 16, 3, 16, 16, 16, 1, 1 ]
[ "This", "ransomware", "family", "is", "known", "for", "being", "hosted", "on", "arbitrary", "websites", "and", "circulated", "on", "online", "forums", "using", "various", "social", "engineering", "lures", ",", "including", "masquerading", "as", "popular", "apps", ",", "cracked", "games", ",", "or", "video", "players", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Until", "now,", "it", "was", "widely", "believed", "the", "actor's", "activities", "had", "largely", "subsided", "in", "2013,", "following", "numerous", "public", "disclosures", "and", "detailed", "analyses", "of", "their", "backdoors." ]
[ 16, 16, 16, 16, 16, 16, 16, 6, 16, 16, 16, 16, 16, 0, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3 ]
[ "Surprisingly,", "there", "is", "a", "lot", "of", "media", "attention", "going", "on", "at", "the", "moment", "on", "a", "macOS", "malware", "called", "OSX/Dok." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 3, 16, 3 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Symmi.DEFF7", "W32.Extrat", "Win.Trojan.B-471", "BackDoor.Cybergate.4022", "BehavesLike.Win32.Backdoor.gc", "Troj.W32.Scar.lByG", "Trojan.Win32.Xtrat.ldu", "Backdoor/Win32.Poison.R139029", "Trojan.Xtrat", "Trojan.Win32.Remtasu" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "If", "that", "doesn", "’", "t", "work", ",", "they", "try", "to", "use", "queryUsageStats", ":", "When", "the", "malware", "invokes", "queryUsageStats", ",", "it", "asks", "for", "the", "list", "of", "applications", "that", "ran", "in", "the", "last", "1", "million", "milliseconds", "(", "16", "minutes", "and", "40", "seconds", ")", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "Trojan", "may", "send", "the", "following", "information", "to", "one", "of", "the", "remote", "locations:", "Computer", "name" ]
[ 16, 3, 16, 16, 16, 16, 12, 16, 16, 16, 16, 1, 9, 9, 9 ]
[ "Mobile", "implant", "evolution", "timeline", "However", ",", "some", "facts", "indicate", "that", "the", "APK", "samples", "from", "stage", "two", "can", "also", "be", "used", "separately", "as", "the", "first", "step", "of", "the", "infection", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/W32.DoS.751104", "DoS.Win32.Delf!O", "Trojan/DOS.Delf.j", "DoS.Delf!7331ealGHQM", "W32/Worm.ATZ", "Hacktool.Flooder", "TROJ_DELF.FOE", "DoS.Delf", "DoS.Win32.Delf.j", "Trojan.Win32.Delf.hdtu", "PE:Hack.DDoSer.Win32.Delf.j!1074949418", "Tool.Delf.Win32.630", "TROJ_DELF.FOE", "BehavesLike.Win32.Trojan.bh", "W32/Worm.OXOE-7458", "Trojan/DDoS.Delf.f", "DDOS/Delf.J.4", "HackTool[DoS]/Win32.Delf", "Win32.Hack.Delf.j.kcloud", "Trojan.Win32.Dos-Delf.626688[h]", "Win-Trojan/Xema.variant", "DoS.Delf", "Trojan.Win32.Delf.j", "Win32.Trojan.Delf.brp", "Trojan-Dropper.Delf", "W32/Delf.A!tr", "DoS.BRY", "Win32/Trojan.2ff" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "In", "the", "months", "leading", "up", "to", "August,", "the", "Sofacy", "group", "launched", "several", "waves", "of", "attacks", "relying", "on", "zero-day", "exploits", "in", "Microsoft", "Office,", "Oracle", "Sun", "Java,", "Adobe", "Flash", "Player", "and", "Windows", "itself." ]
[ 16, 16, 0, 16, 16, 16, 0, 16, 6, 14, 16, 16, 16, 16, 1, 16, 16, 7, 15, 16, 5, 13, 13, 13, 13, 13, 13, 13, 16, 5, 16 ]
[ "A", "new", "variant", "of", "the", "notorious", "ransomware", "Petya", "is", "back", "-", "again", "-", "and", "with", "yet", "another", "James", "Bond", "reference", "for", "a", "name:", "Goldeneye." ]
[ 16, 3, 11, 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3 ]
[ "This", "particular", "HenBox", "variant", ",", "as", "listed", "in", "Table", "3", "above", ",", "harvests", "data", "from", "two", "popular", "messaging", "and", "social", "media", "apps", ":", "Voxer", "Walkie", "Talkie", "Messenger", "(", "com.rebelvox.voxer", ")", "and", "Tencent", "’", "s", "WeChat", "(", "com.tencent.mm", ")", "." ]
[ 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 5, 13, 5, 16, 1, 16, 16, 4, 16, 16, 5, 16, 1, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9996", "Trojan.Cridex", "Trojan.Win64.Kryptik.exmlew", "Trojan.Win32.Z.Mikey.577536.K", "Trojan.Kryptik.Win64.1541", "Trojan.Win64.Crypt", "W64/Trojan.WNTM-1890", "TR/Crypt.ZPACK.fzarm", "Trojan/Win64.Dridex", "Trojan.Mikey.D123A2", "Backdoor.NanoCore", "Trj/CI.A", "Win32.Trojan.Mikey.Szbg", "Win32/Trojan.4d2" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "REQUEST_INSTALL_PACKAGES", "-", "make", "a", "request", "to", "install", "packages", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.PePatch.Win32.108052", "Trojan.Razy.D2AD35", "Win32.Trojan.WisdomEyes.16070401.9500.9515", "Trojan.Win32.Wencho.eqsozv", "Backdoor.Win32.Wencho", "Backdoor:Win32/Wencho.A", "Downloader/Win32.Paph.C1961981", "TrojanDownloader.Paph", "Trj/GdSda.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan-Exploit/W32.IMG-WMF.23552.O", "Trojan-GameThief.Win32.OnLineGames!O", "Exploit.IMG.Win32.498", "Trojan/Exploit.IMG-WMF.axd", "TROJ_BEHAV.FL", "Win32.Trojan.WisdomEyes.16070401.9500.9981", "TROJ_BEHAV.FL", "Win.Trojan.Exploit-289", "Exploit.Win32.IMGWMF.bekdjb", "Exploit.W32.IMG-WMF.loBk", "TrojWare.Win32.GameThief.Magania.~EV", "Trojan.DownLoad.15186", "BehavesLike.Win32.Worm.mc", "Exploit.IMG-WMF.agp", "Rootkit.Small", "Trojan.Win32.KillAv.hd", "Exploit.Win32.IMG-WMF", "Win32/Trojan.Exploit.a54" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "While", "Google", "did", "not", "share", "with", "us", "the", "total", "number", "of", "infected", "devices", ",", "they", "confirmed", "that", "one", "of", "these", "malicious", "apps", "collected", "over", "350", "installations", "through", "the", "Play", "Store", ",", "while", "other", "variants", "collected", "few", "dozens", "each", ",", "and", "that", "all", "infections", "were", "located", "in", "Italy", "." ]
[ 16, 12, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Delf", "Trojan.Heur.iO0au4aNrMf", "Win32.Trojan.WisdomEyes.16070401.9500.9705", "W32/Trojan.UNZI-1320", "W32.Datom.Worm", "Trojan.Win32.Delf.enaz", "Trojan.Win32.Datom.euwmlv", "Worm.Win32.Datom.A~1", "Win32.HLLW.Datom", "BehavesLike.Win32.Sality.cc", "Virus.Worm.Datom", "Trojan.Win32.Delf.enaz", "Trojan/Win32.Buzus.C104859", "Trojan.Delf", "Win32.Trojan.Delf.Swlf" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "keylogger", "can", "track", "three", "different", "events", "(", "Figure", "5", ")", ":", "TYPE_VIEW_CLICKED", "Represents", "the", "event", "of", "clicking", "on", "a", "View-like", "Button", ",", "CompoundButton", ",", "etc", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "This", "allows", "the", "source", "process", "to", "trace", "the", "target", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "SANS", "has", "published", "a", "new", "blog", "regarding", "a", "tax", "filing", "service", "that", "has", "been", "compromised." ]
[ 4, 16, 16, 16, 16, 16, 16, 5, 13, 13, 13, 16, 16, 16, 7 ]
[ "A", "backdoor", "also", "known", "as:", "Application.NirSoft.PSPassView.C", "PSWTool.Win32.PassView!O", "HackTool.Pspv.SD4", "W32/PWS.IMQI-4038", "Hacktool.PStorRevealer", "Application.NirSoft.PSPassView.C", "not-a-virus:PSWTool.Win32.PassView.iv", "Application.NirSoft.PSPassView.C", "Riskware.Win32.PassView.exmcew", "Application.NirSoft.PSPassView.C", "ApplicUnsaf.Win32.PSWTool.PassView.A", "Tool.PassView", "Tool.PassView.Win32.6", "W32/PWStealer.CAT", "PSWTool.PassView.k", "Trojan[PSWTool]/Win32.PassView", "Application.NirSoft.PSPassView.C", "not-a-virus:PSWTool.Win32.PassView.iv", "TScope.Malware-Cryptor.SB", "PUP.Optional.PassView", "Trj/CI.A", "HackTool.IcqSmiley.A", "not-a-virus:PSWTool.Win32.PassView", "Win32/Application.40e" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Unit", "42", "recently", "identified", "a", "targeted", "attack", "against", "an", "individual", "working", "for", "the", "Foreign", "Ministry", "of", "Afghanistan", "in", "China." ]
[ 4, 12, 16, 16, 16, 1, 9, 16, 16, 4, 12, 11, 4, 12, 12, 12, 12, 16, 2 ]
[ "What", "we", "found", "were", "several", "other", "fake", "apps", "developed", "using", "the", "SpyNote", "builder", ",", "which", "should", "come", "as", "a", "warning", "to", "Android", "users", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16 ]
[ "This", "threat", "targets", "Russians", "but", "the", "apps", "are", "accessible", "worldwide." ]
[ 16, 3, 16, 2, 16, 16, 5, 16, 1, 9 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Qhost.Win32.10597", "Trojan/Qhost.pdq", "Trojan.Zusy.D5AFC", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Trojan.Win32.Hosts.bgaqwt", "Troj.Banker.W32.Qhost.lE9S", "Trojan.Hosts.5268", "Trojan.Win32.Hider", "Trojan/Win32.Unknown", "Trojan:WinNT/QHosts.B", "Win32/Qhost.PDQ", "Trojan.Qhost!QXppfUGnhzI", "W32/Kryptic.QHS!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Spymel.A4", "Trojan.ReconycCRTD.Win32.8402", "Trojan.Zusy.D1E1BE", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Trojan.Win32.Reconyc.inec", "Trojan.DownLoader13.49710", "Trojan/Win32.Reconyc", "Backdoor:MSIL/Moidirat.A", "Trojan.Win32.Reconyc.inec", "Trojan.MSIL.Spy", "Win32/Backdoor.a11" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/W32.Nymaim.561152", "Trojan.NymaimCS.S1199370", "TROJ_NYMAIM.SMR2", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "TROJ_NYMAIM.SMR2", "Trojan.Win32.Nymaim.eqlfnf", "TrojWare.Win32.Nymaim.CH", "Trojan.Nymaim.143", "BehavesLike.Win32.MultiPlug.hh", "Trojan-Downloader.Nymaim", "Trojan.Nymaim.czv", "TR/Crypt.Xpack.owrka", "Trojan/Win32.Nymaim", "Win32.Trojan.Nymaim.M", "Trojan/Win32.Nymaim.C2027429", "Trojan.Nymaim", "Trojan.Nymaim", "Win32/TrojanDownloader.Nymaim.BA", "Trojan.Nymaim!ovdfLq+hmM4", "W32/Nymaim.BA!tr", "Trj/GdSda.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "In", "this", "case", "we", "found", "traces", "of", "dx/dexmerge", "compilers", ",", "which", "means", "that", ",", "this", "time", ",", "the", "attackers", "just", "imported", "the", "original", "source", "code", "into", "an", "Android", "IDE", "(", "such", "as", "Android", "Studio", ",", "for", "instance", ")", "and", "compiled", "it", "with", "their", "own", "modifications", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 5, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "On", "installation", ",", "the", "app", "requests", "the", "user", "to", "provide", "SMS", "storage", "access", "and", "high", "Android", "privileges", "such", "as", "Device", "Admin", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Java.Downloader.1096", "BehavesLike.Win32.Trojan.vc", "Java.Obfus" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1 ]
[ "By", "comparison", ",", "the", "DataLust", "ransomware", "demanded", "merely", "$", "15", "." ]
[ 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16 ]
[ "Microsoft", "Publisher", "is", "included", "and", "installed", "by", "default", "in", "Office", "365." ]
[ 4, 12, 16, 16, 16, 16, 16, 16, 16, 5, 13 ]
[ "Kaspersky", "Lab", "began", "this", "ongoing", "research", "in", "the", "autumn", "of", "2011." ]
[ 4, 12, 16, 16, 16, 4, 16, 16, 0, 8, 8 ]
[ "In", "this", "post", "we", "will", "review", "the", "research", "results", "of", "Votiro", "Labs", "and", "ClearSky,", "the", "weaponized", "documents", "and", "campaign", "infrastructure." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 12, 16, 4, 1, 9, 9, 16, 5, 13 ]
[ "At", "the", "same", "time", ",", "it", "hides", "an", "icon", "and", "starts", "background", "services", "to", "hide", "further", "actions", "from", "the", "user", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Heur.TP.ED1233C", "Win32.Trojan.WisdomEyes.16070401.9500.9998", "Trojan.Win32.Z.Starter.204271", "Trojan.Win32.Starter", "Exploit.ShellCode", "Trojan:Win32/Starter.P", "Trojan.Win32.Starter", "Trj/CI.A", "Win32.Trojan.Crypt.Dzkb", "Win32/Trojan.6f7" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "DustySky", "called", "NeD", "Worm", "by", "its", "developer", "is", "a", "multi-stage", "malware", "in", "use", "since", "May", "2015." ]
[ 3, 16, 3, 11, 16, 16, 6, 16, 16, 3, 11, 16, 16, 16, 0, 8 ]
[ "When", "a", "user", "opens", "the", ".zip", "file", "and", "double", "clicks", "the", "JavaScript,", "the", "default", "browser", "Internet", "Explorer,", "Mozilla,", "etc.", "opens", "and", "executes", "JavaScript." ]
[ 16, 16, 4, 16, 16, 1, 9, 16, 1, 9, 9, 9, 16, 16, 16, 5, 13, 13, 16, 16, 16, 1, 9 ]
[ "We", "have", "identified", "a", "new", "distribution", "campaign", "which", "took", "place", "on", "4th", "July." ]
[ 16, 16, 16, 16, 16, 6, 14, 16, 16, 16, 16, 0, 8 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Minxer", "Win32.Trojan.WisdomEyes.16070401.9500.9994", "W32/Trojan.CFWS-6788", "Win32.Application.Bitcoinminer.W", "Riskware.Win64.BtcMine.eiegeg", "Trojan.BtcMine.604", "Worm.WBNA.Win32.419008", "W32.Trojan.Minxer", "Trojan.Razy.D197C7", "Trojan.BitCoinMiner", "Trj/CI.A", "Riskware.BitCoinMiner!", "Win32/Trojan.582" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]