tokens
sequencelengths
2
296
ner_tags
sequencelengths
2
296
[ "Linux.Rekoobe", "variant" ]
[ 1, 3 ]
[ "Sex", "sells,", "and", "nowhere", "is", "that", "more", "true", "than", "the", "Chinese", "mobile", "landscape." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "BAIJIU's", "goal", "in", "this", "attack", "was", "to", "deploy", "a", "set", "of", "espionage", "tools", "through", "a", "downloader", "we", "call", "TYPHOON", "and", "a", "set", "of", "backdoors", "we", "call", "LIONROCK." ]
[ 6, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 3, 16, 16, 3, 16, 16, 16, 16, 3, 16, 16, 3 ]
[ "Adding", "AV", "exceptions" ]
[ 16, 5, 1 ]
[ "The", "first", "one", "is", "used", "to", "receive", "a", "list", "of", "logins", "and", "passwords,", "the", "second", "one—for", "operation", "of", "the", "SOCKS", "proxy", "server." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 1, 16, 16, 16, 16, 16, 5, 13, 13, 13 ]
[ "Variants", "of", "H-Worm,", "primarily", "connecting", "to", "command", "and", "control", "servers", "located", "in", "Algeria." ]
[ 3, 16, 3, 16, 16, 16, 1, 9, 9, 9, 16, 16, 2 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/W32.ShipUp.90112", "W32.VisuDir.A3", "Trojan.Zusy.D2CF33", "PE_SHIPUP.A", "Win32.Worm.ShipUp.h", "Win32/Gamarue.ISACBfC", "PE_SHIPUP.A", "Trojan.Win32.ShipUp.futk", "TrojWare.Win32.ShipUp.AR", "Trojan.KillFiles.28137", "Worm.Win32.ShipUp", "Worm:Win32/Lecna.A!dha", "Trojan.Win32.ShipUp.futk", "Trojan/Win32.Cossta.R120893", "Trojan.FakeDoc", "Trojan.Win32.Csyr.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Some", "recent", "campaigns", "against", "other", "bank", "customers", "also", "used", "“", ".gdn", "”", "TLDs", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "malicious", "macro", "inside", "the", "Office", "document", "is", "obfuscated", "as", "shown", "in", "the", "code", "snapshot", "below", "-Recently", "[Kaspersky]", "came", "across", "a", "new", "family", "of", "cross-platform", "backdoors", "for", "desktop", "environments." ]
[ 16, 7, 15, 16, 1, 9, 9, 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 4, 16, 16, 16, 16, 3, 11, 11, 11, 16, 5, 5 ]
[ "The", "user", "needs", "to", "press", "the", "\"", "close", "''", "button", "to", "finish", "the", "installation", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Typhon", "is", "an", "info", "stealer", "first", "that", "was", "reported", "in", "mid-2022", "for", "the", "first", "time." ]
[ 3, 16, 16, 16, 3, 16, 16, 16, 16, 16, 0, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Zenshirsh.SL7", "Trojan.Win32.Pigeon.cxszod", "Uds.Dangerousobject.Multi!c", "Win32.Trojan.Mikey.Swlc", "BackDoor.Pigeon.8805", "Backdoor.Hupigon.Win32.185096", "Trojan.Mikey.D9181", "HackTool:Win32/Goldoseri.A", "Win32/HackTool.DoSer.AE", "BackDoor.Pigeon!", "Win32/Trojan.6bf" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "On", "July", "6,", "2017,", "RSA", "FirstWatch", "noted", "renewed", "MONSOON", "APT", "campaign", "activity", "submitted", "from", "a", "community", "user", "in", "India", "to", "Virus", "Total." ]
[ 16, 0, 8, 8, 4, 12, 16, 16, 6, 14, 14, 16, 16, 16, 16, 4, 12, 16, 2, 16, 4, 12 ]
[ "A", "backdoor", "also", "known", "as:", "RDN/BackDoor-AWQ.b", "Heur.Corrupt.PE", "Backdoor.Win32.Hupigon", "TrojanDropper:Win32/Arbinder.B.dam#2", "Backdoor/Win32.Graybird.C194482" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1 ]
[ "Overlay", "attack", "Ginp", "uses", "the", "Accessibility", "Service", "to", "check", "which", "application", "runs", "is", "the", "foreground", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Zenshirsh.SL7", "Hacktool.Flooder", "BehavesLike.Win32.RAHack.xc", "Trojan-DDoS.Win32.Resod", "TrojanDDoS.Resod.g", "TR/DDoS.Maker.11.B", "Trojan[DDoS]/Win32.Resod", "DDoS:Win32/Resod.dam#2", "Win32/Trojan.DDoS.835" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "FakeSpy", "Masquerades", "as", "Postal", "Service", "Apps", "Around", "the", "World", "July", "1", ",", "2020", "KEY", "FINDINGS", "The", "Cybereason", "Nocturnus", "team", "is", "investigating", "a", "new", "campaign", "involving", "FakeSpy", ",", "an", "Android", "mobile", "malware", "that", "emerged", "around", "October", "2017", "." ]
[ 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 12, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "60", "%", "of", "devices", "containing", "or", "accessing", "enterprise", "data", "are", "mobile", ",", "and", "mobile", "devices", "tend", "to", "include", "a", "significant", "amount", "of", "personal", "and", "business", "data", ",", "assuming", "the", "organization", "has", "a", "bring-your-own-device", "policy", "in", "place", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Wurmark.A@mm", "Win32.Wurmark.A@mm", "W32/Mugly.h@MM", "W32.W.Wurmark.g!c", "W32/Wurmark.g", "Win32.Wurmark.A@mm", "Win32.Wurmark.E90817", "I-Worm.Wurmark!utsCc3R91ZU", "W32/Wurmark.F", "W32.Mugly.G@mm", "Win32/Wurmark.G", "WORM_MUGLY.H", "Worm.Wurmark.G", "Email-Worm.Win32.Wurmark.g", "Trojan.Win32.Wurmark.fsml", "Virus.Win32.Heur.c", "Win32.Wurmark.A@mm", "Worm.Win32.Wurmark.G", "Win32.Wurmark.A@mm", "Worm.Wurmark.Win32.11", "WORM_MUGLY.H", "BehavesLike.Win32.VBObfus.fc", "W32/Wurmark.JPAN-1543", "I-Worm.Wurmark.a", "WORM/Uglatad.2", "Worm[Email]/Win32.Wurmark", "Worm:Win32/Mugly.H@mm", "Win32/Mugly.worm.351744", "Win32.Wurmark.A@mm", "Win32/Mugly.G", "Worm.Wurmark", "Win32.Wurmark.A@mm", "Virus.Win32.QQRob.AS", "W32/Mugly.H@mm", "I-Worm/Wurmark.E", "Worm.Win32.Wurmark.AGmW" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Device", "admin", "policies", "Looking", "at", "the", "policy", "'s", "definition", ",", "we", "can", "see", "that", "it", "lists", "all", "the", "available", "policies", "even", "if", "most", "of", "them", "are", "deprecated", "on", "Android", "10.0", "and", "their", "usage", "results", "in", "a", "security", "exception", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Darkhotel", "APT", "attacks", "dated", "2014", "and", "earlier", "are", "characterized", "by", "the", "misuse", "of", "stolen", "certificates,", "the", "deployment", "of", ".hta", "files", "with", "multiple", "techniques,", "and", "the", "use", "of", "unusual", "methods", "like", "the", "infiltration", "of", "hotel", "Wi-Fi", "to", "place", "backdoors", "in", "targets'", "systems." ]
[ 6, 14, 16, 16, 0, 16, 16, 16, 16, 16, 16, 1, 9, 9, 9, 16, 16, 16, 1, 9, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 9, 9, 16, 16, 3, 16, 5, 13 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Symmi.D11236", "Win32.Trojan.WisdomEyes.16070401.9500.9993", "DLOADER.Trojan", "Trojan-Downloader.Win32.Small", "Trojan/Win32.Rozepads.R172444", "BScope.Trojan.Win32.Inject.2" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1 ]
[ "Smartphones", "are", "the", "dominant", "form", "of", "internet", "access", "in", "the", "region", "and", "Xinjiang", "was", "recently", "above", "the", "national", "average", "of", "internet", "users", "in", "China", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor/W32.Androm.1289728", "Trojan.Skeeyah", "Backdoor.Bot", "Win32.Trojan.WisdomEyes.16070401.9500.9989", "W32/Trojan.UWVT-1669", "W32.Golroted", "TROJ_INJECTOR_FE31022B.UVPM", "Backdoor.Win32.Androm.hjzg", "Trojan.PWS.Stealer.13025", "TROJ_INJECTOR_FE31022B.UVPM", "BehavesLike.Win32.Trojan.tc", "W32/Trojan2.PTAY", "Backdoor/Androm.gyi", "Trojan[Backdoor]/Win32.Androm", "Trojan.MSIL.Androm.9", "Backdoor.Win32.Androm.hjzg", "Trojan:MSIL/Loksec.A", "Trojan/Win32.Inject.R140951", "Backdoor.Androm", "Trojan.Injector", "Trj/CI.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/Dropper.Delf.bl", "TROJ_DROPPER.IPJ", "W32/Risk.CLFC-1497", "Backdoor.Acropolis", "TrojanDropper.Delf", "TROJ_DROPPER.IPJ", "Win.Trojan.Acropolis-1", "Trojan-Dropper.Win32.Delf.bl", "Trojan.Win32.Delf.ffej", "Dropper.Delf.972288", "Troj.Dropper.W32.Delf.bl!c", "TrojWare.Win32.TrojanDropper.Delf.BL", "BackDoor.Acropolis.10", "Dropper.Delf.Win32.1638", "Trojan-Dropper.Win32.Delf", "W32/Dropper.HL", "TrojanDropper.Delf.cj", "W32.Trojan.Dropper-Tetris", "BDS/Acropolis.3", "Trojan[Dropper]/Win32.Delf", "Win32.Troj.Delf.bl.kcloud", "Backdoor:Win32/Tetris.A", "Trojan.Graftor.D2B929", "Trojan-Dropper.Win32.Delf.bl", "Win32/TrojanDropper.Delf.BL", "Win32.Trojan-dropper.Delf.Efao", "TrojanDropper.Delf!n6JtRIRZLjo", "W32/Acrop.A!tr.bdr", "Win32/Trojan.Dropper.605" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.FamVT.ExpiroPC.PE", "Backdoor.Win32.Nucleroot!O", "Win32.Trojan.WisdomEyes.16070401.9500.9750", "Adware.Lop", "Win32/Talpalk.C", "Win.Trojan.Maha-2", "Backdoor.Win32.Nucleroot.c", "Trojan.Win32.Maha.gubp", "Packer.W32.PePatch.l5Ml", "Packed.Win32.Klone.~KE", "Trojan.Maya", "BehavesLike.Win32.Ipamor.ch", "Trojan-Dropper.Delf", "Backdoor/Nucleroot.fk", "Trojan[PSW]/Win32.Maha", "Backdoor.Win32.A.Nucleroot.130560", "Backdoor.Win32.Nucleroot.c", "PWS:Win32/Bividon.A", "Backdoor.Nucleroot", "W32/Nucleroot.C!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Earlier", "this", "year", ",", "the", "actor", "used", "“", ".pw", "”", "TLDs", "while", "the", "Bank", "Austria", "scheme", "highlighted", "above", "used", "“", ".info", "”", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Security", "researchers", "have", "identified", "and", "identified", "a", "new", "type", "of", "malware,", "which", "they", "believe", "is", "being", "developed", "by", "threat", "actors", "operating", "from", "North,", "East", "and", "South-East", "Asia,", "and", "is", "capable", "of", "being", "fully", "undetectable." ]
[ 4, 12, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 6, 14, 16, 16, 2, 10, 16, 2, 10, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9998", "Trojan.Zbot", "Backdoor.Win32.DarkKomet.zvj", "Trojan.Win32.DarkKomet.dklzqc", "Trojan-Dropper.Win32.Injector", "Trojan[Backdoor]/Win32.DarkKomet", "Trojan.MSIL.Krypt.3", "Backdoor.Win32.DarkKomet.zvj", "PWS:MSIL/Skonpri.A", "Backdoor/Win32.DarkKomet.R90638", "Backdoor.DarkKomet", "Trj/CI.A", "Trojan.Krypt!XrXGvmn0xR4", "W32/DarkKomet.FZ!tr.bdr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "main", "goal", "of", "the", "xDedic", "forum", "is", "to", "facilitate", "the", "buying", "and", "selling", "of", "credentials", "for", "hacked", "servers", "which", "are", "available", "through", "RDP." ]
[ 16, 16, 16, 16, 16, 6, 14, 16, 16, 16, 16, 16, 16, 16, 16, 16, 11, 5, 13, 16, 16, 16, 16, 5 ]
[ "This", "report", "is", "the", "first", "to", "detail", "the", "attack", "against", "strategic", "US", "interests", "to", "China." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 2, 16, 16, 2 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Archbomb.ZIP", "Trojan-ArcBomb.ZIP.Bubl.b", "Trojan.Zip.Arch-Bomb.yngkq", "BehavesLike.Win32.Trojan.dh", "Trojan.Archbomb", "BOMB/ArcBomb.O", "Trojan-ArcBomb.ZIP.Bubl.b" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "threat", "actors", "registered", "at", "least", "seven", "subdomains", "through", "the", "hosting", "provider", ",", "each", "consisting", "of", "eight", "random-looking", "characters", "(", "asdfgjcr", ",", "cacama18", ",", "cacamadf", ",", "konkonq2", ",", "mmsmtsh5", ",", "riveroer", ",", "and", "sdfkjhl2", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 1, 16, 1, 16, 1, 16, 1, 16, 1, 16, 16, 1, 16 ]
[ "The", "abuse", "of", "shortcut", "LNK", "files", "is", "steadily", "gaining", "traction", "among", "cybercriminals." ]
[ 16, 1, 16, 1, 9, 9, 16, 16, 16, 16, 16, 6 ]
[ "Initially,", "we've", "called", "it", "Matrix", "Banker", "based", "on", "its", "command", "and", "control", "C2", "login", "panel,", "but", "it", "seems", "that", "Matrix", "Admin", "is", "a", "template", "available", "for", "the", "Bootstrap", "web", "framework." ]
[ 16, 16, 16, 16, 3, 11, 16, 16, 16, 1, 9, 9, 9, 9, 9, 16, 16, 16, 16, 1, 9, 16, 16, 16, 16, 16, 5, 13, 13, 13 ]
[ "Visually", ",", "this", "can", "be", "represented", "as", "follows", ":", "Android", "ID", "When", "combined", "with", "our", "analysis", "of", "indexed", "directories", "on", "C2", "infrastructure", ",", "we", "were", "able", "to", "easily", "automate", "the", "generation", "of", "the", "password", "used", "by", "each", "device", "and", ",", "in", "turn", ",", "successfully", "decompress", "all", "exfiltrated", "content", "from", "compromised", "devices", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Win32/Shuq.B", "W32/Shuq.g", "I-Worm.Shuq!TBLjXfxv+A8", "W32.SillyFDC", "Win32/Shuq.NAA", "TROJ_ANGEL.F", "Worm.Shuq.B", "Email-Worm.Win32.Shuq.g", "Trojan.Win32.Shuq.epjd", "Trojan.Win32.S.HDC.66048[h]", "W32.W.Shuq.g!c", "Backdoor.Win32.Shuq.NAA", "BackDoor.HSV.1013", "Worm.Shuq.Win32.5", "TROJ_ANGEL.F", "W32/Risk.OPXF-7688", "Worm/Sramota.aws", "W32/ANGEL.G@mm", "Worm[Email]/Win32.Shuq", "Trojan/Win32.HDC", "Backdoor:Win32/Shuq.A", "Worm.Shuq", "Win32.Worm-email.Shuq.Eerm", "Email-Worm.Win32.Shuq", "I-Worm/Shuqing.E" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Update", "as", "of", "July", "23", ",", "2015", "1:00", "AM", "PDT", "(", "UTC-7", ")", "We", "have", "added", "a", "link", "to", "a", "previous", "report", "discussing", "this", "threat", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Reasons", "for", "Taiwan", "being", "targeted", "range", "from", "being", "one", "of", "the", "sovereign", "states", "of", "the", "disputed", "South", "China", "Sea", "region", "to", "its", "emerging", "economy", "and", "growth", "with", "Taiwan", "being", "one", "of", "the", "most", "innovative", "countries", "in", "the", "High-Tech", "industry", "in", "Asia." ]
[ 16, 16, 2, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 2, 10, 10, 10, 16, 16, 16, 16, 16, 16, 16, 2, 16, 16, 16, 16, 16, 16, 2, 16, 16, 4, 12, 16, 2 ]
[ "A", "backdoor", "also", "known", "as:", "Worm/W32.DipNet.139264", "W32/DipNet.f", "Trojan.Win32.DipNet.emkm", "W32/Dipnet.F", "Trojan.Netdepix.B", "Win32/Dipnet.NAD", "Net-Worm.Win32.DipNet.f", "Worm.DipNet!vTuZ7jF3dLw", "Worm.Win32.DipNet.139264[h]", "W32.W.DipNet.f!c", "Virus.Win32.Part.a", "Worm.Win32.Dipnet.NAD", "BackDoor.Xdoor.351", "Worm.DipNet.Win32.8", "BehavesLike.Win32.Trojan.ch", "W32/Dipnet.XULH-0302", "Worm/DipNet.a", "WORM/DipNet.b", "W32/Netdepix.B!worm", "Worm[Net]/Win32.DipNet", "Win32/Dipnet.worm.139264", "Worm:Win32/DipNet.H", "Win32/Oddbob.E", "Net-Worm.DipNet", "W32/Oddbob.E.worm", "Backdoor.Win32.Xdoor", "Worm/Dipnet.M", "Worm.Win32.DipNet.aMVE" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "RECEIVE_SMS", "-", "allow", "the", "application", "to", "receive", "text", "messages", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.DL.VB.IHEW", "Trojan-Spy.Win32.Bancos.alh!IK", "Trojan-Downloader.Win32.VB.tbx", "TR/Spy.65536.194", "TSPY_ZBOT.SMDM", "Trojan.Spy.65536.194", "TrojanDownloader.VB.vhu", "TrojanSpy:Win32/Bancos.KY", "Trojan-Downloader.Win32.VB.tbx", "Trojan-Spy.Win32.Bancos.alh" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "On", "July", "5,", "2015", "an", "unknown", "hacker", "publicly", "announced", "on", "Twitter", "that", "he", "had", "breached", "the", "internal", "network", "of", "Hacking", "Team", "–", "an", "Italian", "pentesting", "company", "known", "to", "purchase", "0-day", "exploits", "and", "produce", "their", "own", "trojans." ]
[ 16, 0, 8, 8, 16, 6, 14, 16, 16, 16, 4, 16, 16, 16, 1, 16, 1, 9, 16, 4, 12, 16, 16, 2, 4, 12, 16, 16, 16, 3, 11, 16, 16, 16, 16, 3 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan-Downloader.Win32.Harnig!O", "Win32.Trojan-Downloader.Harnig.cu", "Trojan.Gobrena", "TROJ_HARNIG.FC", "Trojan-Downloader.Win32.Harnig.cu", "Trojan.Win32.Harnig.dpsezu", "PE:Trojan.DL.Tibs.fxl!1074175505", "Trojan.DownLoader.13549", "Downloader.Harnig.Win32.2", "TROJ_HARNIG.FC", "TrojanDownloader.Harnig.alh", "TR/Dldr.Small.dib.6", "Trojan[Downloader]/Win32.Harnig.cu", "Win32.TrojDownloader.Harnig.co.kcloud", "Trojan/Win32.Harnig", "Trojan-Downloader.Revelation.Tibs.B", "Trojan-Downloader.Win32.Harnig.cr", "W32/Harnig.CU!tr.dldr", "Downloader.Harnig.AP", "Trojan.Win32.Harnig.Aj" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Receiver", "was", "involved", "in", "receiving", "commands", "from", "the", "Server", "and", "the", "main", "functionality", "of", "Sender", "was", "to", "send", "all", "the", "data", "collected", "to", "the", "C", "&", "C", "over", "Wi-Fi", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Every", "one", "of", "these", "campaigns", "involved", "a", "Windows", "version", "of", "Derusbi." ]
[ 16, 16, 16, 16, 6, 16, 16, 5, 13, 16, 3 ]
[ "On", "October", "10,", "2017,", "Kaspersky", "Lab's", "advanced", "exploit", "prevention", "systems", "identified", "a", "new", "Adobe", "Flash", "zero", "day", "exploit", "used", "in", "the", "wild", "against", "our", "customers." ]
[ 16, 0, 8, 8, 4, 12, 5, 13, 13, 13, 16, 16, 16, 7, 15, 15, 15, 3, 16, 16, 16, 16, 16, 16, 4 ]
[ "The", "service", "offers", "a", "binder", "tool", "that", "allows", "users", "to", "masquerade", "their", "malware", "as", "legitimate", "software." ]
[ 16, 16, 16, 16, 3, 11, 16, 16, 16, 16, 1, 16, 3, 16, 1, 9 ]
[ "]", "com", "(", "and", "third-levels", "of", "this", "domain", ")", "www3.mefound", "[", "." ]
[ 9, 9, 16, 16, 16, 16, 16, 16, 16, 1, 9, 9 ]
[ "Malwarebytes", "has", "been", "observing", "a", "surge", "in", "drive-by", "download", "attacks", "since", "the", "recent", "Flash", "zero-day", "now", "patched." ]
[ 4, 16, 16, 16, 16, 16, 16, 1, 9, 9, 16, 16, 16, 7, 15, 16, 16 ]
[ "Android", "remains", "a", "prime", "target", "for", "malicious", "attacks", "." ]
[ 5, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "TrojanAPT.BrowsPass.ST3", "Trojan.MSIL.Ubibila.1", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "MSIL.Trojan.Pinject.A", "Trojan-Dropper.Win32.Sysn.bgns", "Trojan.Win32.MailPassView.dzxrgp", "Tool.MailPassView.236", "BehavesLike.Win32.Trojan.gc", "Trojan.PSW.Fareit.te", "TR/Dropper.MSIL.sbcsg", "Trojan:MSIL/Golbla.B", "Trojan-Dropper.Win32.Sysn.bgns", "Trojan/Win32.Golbla.C1246680", "Trj/CI.A", "Win32.Trojan-dropper.Sysn.Akyi", "Trojan.Inject", "MSIL/Injector.MRD!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.AutorunXjyv.Worm", "Trojan.Dropper.VIO", "Trojan/W32.Chydo.569344.E", "Trojan.KillAv.DR", "Trojan.Chydo", "Win32.Worm.Autorun.j", "Win32/Pykspa.C", "WORM_MESSEN.SMF", "Trojan.Dropper.VIO", "Worm.Win32.AutoRun.iea", "Trojan.Dropper.VIO", "Trojan.Win32.Chydo.eahreo", "Trojan.Win32.Chydo.516096.B", "Trojan.Dropper.VIO", "Trojan.MulDrop5.14836", "Worm.AutoRun.Win32.116380", "WORM_MESSEN.SMF", "BehavesLike.Win32.Backdoor.hc", "Trojan/Chydo.bj", "Trojan.Dropper.VIO", "Worm.Win32.AutoRun.iea", "TrojanDropper:Win32/Pykspa.A", "Trojan/Win32.Chydo.R40147", "Trojan.Dropper.VIO", "Trojan.Chydo", "Trojan.Win32.FakeAlert.ate", "Trojan.Win32.KillAV.Y" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "In", "this", "post,", "we", "will", "be", "pulling", "apart", "and", "dissecting", "the", "Rambo", "backdoor", "and", "discussing", "several", "of", "its", "evasion", "techniques." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 11, 16, 16, 16, 16, 16, 16, 16 ]
[ "DarkKomet", "variant,", "often", "dropped", "as", "patcher.exe" ]
[ 3, 11, 16, 16, 16, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.Clodee5.Trojan.2bfc", "Trojan.Proxy.Wopla.Q", "Trojan-Proxy/W32.Wopla.20992.D", "Trojan.Wopla.Win32.59", "Trojan/Proxy.Wopla.q", "Trojan.PR.Wopla!heGrkrdKLNg", "Trojan.Tannick.B", "Win32/Pokier.V", "TSPY_WOPLA.Q", "Trojan.Proxy.Wopla.Q", "Trojan-Proxy.Win32.Wopla.q", "Trojan.Proxy.Wopla.Q", "Trojan.Win32.Wopla.csuaej", "PE:Trojan.Proxy.Wopla.ay!100004534", "Trojan.Proxy.Wopla.Q", "TrojWare.Win32.TrojanDownloader.Small.AA", "Trojan.Proxy.Wopla.Q", "TSPY_WOPLA.Q", "BehavesLike.Win32.Downloader.mc", "W32/Trojan.AXS", "TrojanProxy.Wopla.d", "TR/Proxy.Wopla.Q.4", "Win32.Troj.Wopla.q.kcloud", "Trojan.Proxy.Wopla.Q", "Win-Trojan/Wopla.20992", "TrojanProxy.Wopla", "Trj/Alpiok.A", "Trojan-Proxy.Win32.Wopla.Q", "Multidr.J!tr", "Proxy.BKA.dropper", "Trojan.Win32.Wopla.AdJ" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "We", "rapidly", "determined", "that", "this", "spam", "campaign", "was", "attempting", "to", "broadly", "deliver", "TeslaCrypt", "4.1A", "to", "individuals." ]
[ 16, 16, 16, 16, 16, 6, 14, 16, 16, 16, 16, 16, 3, 11, 16, 4 ]
[ "The", "red", "fields", "are", "used", "as", "the", "shortcode", "and", "keyword", "for", "SMS", "billing", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "This", "appears", "to", "be", "necessary", "to", "determine", "the", "number", "of", "banks", "the", "victim", "may", "use", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "FireEye", "Threat", "Intelligence", "analysts", "identified", "a", "spear", "phishing", "campaign", "carried", "out", "in", "August", "2015", "targeting", "Hong", "Kong-based", "media", "organizations." ]
[ 4, 12, 12, 16, 16, 16, 6, 14, 14, 16, 16, 16, 0, 8, 16, 2, 10, 4, 12 ]
[ "A", "backdoor", "also", "known", "as:", "DoS.Small", "W32/VirTool.OH", "Bloodhound.W32.EP", "DoS.Win32.Small.e", "Trojan.Win32.Small.dosb", "Flooder.Upsend", "W32/Tool.GNXW-3960", "DoS.Small.c", "HackTool[DoS]/Win32.Small", "DoS:Win32/Small.E", "DoS.Win32.Small.e", "DoS.Small", "Win32.Trojan.Small.Lnoh", "DoS.Win32.Small", "W32/Small.E!dos" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Code", "snippet", "showing", "GolfSpy", "generating", "UUID", "The", "value", "of", "%", "is", "in", "the", "range", "of", "1-9", "or", "a-j", "." ]
[ 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.UsernameReimuatH.Trojan", "Worm/W32.WBNA.294912.AU", "Trojan.Win32.Diple!O", "Trojan.Beebone.D", "Trojan/VBObfus.fz", "Win32.Worm.Pronny.d", "Win32/VB.KXfdHDB", "WORM_VOBFUS.SM37", "Win.Packer.VBCrypt-5731517-0", "Worm.Win32.Vobfus.erof", "Trojan.Win32.Vobfus.enwdjc", "Win32.Worm.Vobfus.Wvay", "Win32.HLLW.Autoruner2.18084", "WORM_VOBFUS.SM37", "BehavesLike.Win32.Autorun.dh", "Win32.Virut.ce.57344", "Trojan.Symmi.D13A73", "Trojan.Win32.A.Diple.299008.BAT", "Worm.Win32.Vobfus.erof", "Worm/Win32.WBNA.R108353", "TScope.Trojan.VB", "Worm.Win32.Vobfus" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "source", "process", "tries", "to", "determine", "the", "location", "of", "dlopen", ",", "dlsym", ",", "and", "dlclose", "functions", "in", "the", "target", "process", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "capabilities", "remained", "unchanged", ",", "but", "a", "new", "endpoint", "was", "added", "to", "the", "Trojan", "C2", "allowing", "it", "to", "handle", "the", "generic", "card", "grabber", "overlay", "and", "specific", "target", "overlays", "(", "banking", "apps", ")", "separately", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Once", "OSX/Dok", "infection", "is", "complete,", "the", "attackers", "gain", "complete", "access", "to", "all", "victim", "communication,", "including", "communication", "encrypted", "by", "SSL." ]
[ 16, 3, 16, 16, 16, 16, 6, 1, 9, 9, 16, 16, 1, 9, 9, 9, 9, 9, 9 ]
[ "By", "going", "on", "the", "offensive", "and", "hunting", "the", "attackers", ",", "our", "team", "was", "able", "to", "unearth", "the", "early", "stages", "of", "what", "may", "be", "a", "very", "dangerous", "mobile", "malware", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Once", "in", "the", "live", "session,", "if", "there", "is", "a", "file", "in", "/var/lib/man.cy,", "then", "this", "is", "an", "infected", "ISO." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 3, 11 ]
[ "At", "a", "high", "level,", "Romberik", "is", "a", "complex", "piece", "of", "malware", "that", "is", "designed", "to", "hook", "into", "the", "user's", "browser", "to", "read", "credentials", "and", "other", "sensitive", "information", "for", "exfiltration", "to", "an", "attacker", "controlled", "server,", "similar", "to", "Dyre." ]
[ 3, 16, 16, 16, 3, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 1, 9, 9, 9, 9, 16, 1, 9, 16, 16, 1, 9, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan-PWS/W32.Avisa.69632", "Trojan-PSW.Win32!O", "W32/Inttest.worm", "PWS-Inttest.B", "TROJ_AVISA.B", "Win32.Trojan.WisdomEyes.16070401.9500.9757", "W32/Risk.CNKX-3667", "Infostealer.Avisa", "Win32/PSW.Cript.B", "Trojan-PSW.Win32.Deintel", "Trojan.Win32.Avisa-Psw.fdrj", "Trojan.Win32.Avisa.69632", "Trojan.Avisa.Win32.2", "BehavesLike.Win32.PJTbinder.km", "Worm.Pws.Inttest", "Trojan/PSW.Avisa", "Trojan[PSW]/Win32.Deintel", "Trojan-PSW.Win32.Deintel", "Trojan/Win32.HDC.C89238", "TrojanPSW.Deintel", "Trj/PSW.Intetest", "Win32/PSW.Avisa.A", "Win32.Trojan-qqpass.Qqrob.Sxoe", "Trojan.PSW.Avisa", "W32/Avisa.A!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "This", "new", "mobile", "ransomware", "variant", "is", "an", "important", "discovery", "because", "the", "malware", "exhibits", "behaviors", "that", "have", "not", "been", "seen", "before", "and", "could", "open", "doors", "for", "other", "malware", "to", "follow", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "To", "maximize", "profit", ",", "variants", "with", "“", "MinSDK", "”", "or", "“", "OTA", "”", "SDK", "are", "present", "to", "further", "infect", "victims", "with", "other", "adware", "families", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Related", "insfrastructure", "shows", "another", "suspicious", "looking", "domain", "that", "mimics", "the", "Court", "of", "Arbitration", "for", "Sport" ]
[ 16, 5, 16, 16, 16, 16, 1, 16, 16, 4, 12, 12, 12, 12, 12 ]
[ "Their", "primary", "interest", "appears", "to", "be", "gathering", "intelligence", "related", "to", "foreign", "and", "security", "policy", "in", "the", "Eastern", "Europe", "and", "South", "Caucasus", "regions." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16, 4, 12, 16, 2, 10, 10, 16, 2, 10, 10 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9998", "Backdoor.Bifrose", "Trojan.Win32.Small.cup", "Trojan.Win32.Buzus.rbpz", "Trojan.Win32.Buzus.86895", "Trojan.MulDrop.18143", "BehavesLike.Win32.Backdoor.hc", "Trojan/Buzus.fcx", "Virus.Trojan.Win32.Buzus.acj", "W32/Trojan2.AGMZ", "Trojan/Buzus.cf", "TrojanDropper:Win32/Buzus.B", "W32.W.Ridnu.ls5O", "Trojan.Win32.Small.cup", "Trojan/Win32.Buzus.C71809", "Trojan.Buzus", "W32/Kryptix.KZB!tr", "Win32/Trojan.6a2" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "HW32.Packed.771B", "Ransom.Cerber.A4", "Ransom.Cerber", "Trojan.Symmi.D13E52", "Ransom_HPCERBER.SM3", "Win32.Trojan.Kryptik.avs", "Ransom_HPCERBER.SM3", "Trojan-Ransom.Win32.Rack.hly", "Trojan.Win32.Rack.evkhfe", "Trojan.Encoder.761", "BehavesLike.Win32.Ransomware.gh", "Ransom.Win32.Teerac", "Trojan.Rack.dk", "Trojan-Ransom.Win32.Rack.hly", "Trojan.Menti", "Trj/GdSda.A", "W32/Kryptik.FSUS!tr", "Win32/Trojan.Ransom.7c1" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Coronavirus", "Update", "App", "Leads", "to", "Project", "Spy", "Android", "and", "iOS", "Spyware", "We", "discovered", "a", "cyberespionage", "campaign", "we", "have", "named", "Project", "Spy", "infecting", "Android", "and", "iOS", "devices", "with", "spyware", "by", "using", "the", "coronavirus", "disease", "(", "Covid-19", ")", "as", "a", "lure", "." ]
[ 5, 13, 13, 16, 16, 3, 11, 5, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 16, 5, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "In", "addition", "to", "the", "feature", "base", "it", "already", "possesses", "and", "the", "money", "that", "can", "be", "made", "from", "the", "rental", ",", "it", "could", "evolve", "to", "compete", "with", "the", "mightiest", "Android", "banking", "Trojans", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16 ]
[ "For", "example", ",", "the", "botnet", "Trojan-SMS.AndroidOS.Opfake.a", ",", "in", "addition", "to", "its", "own", "activity", ",", "also", "spread", "Backdoor.AndroidOS.Obad.a", "by", "sending", "spam", "containing", "a", "link", "to", "the", "malware", "to", "the", "victim", "’", "s", "list", "of", "contacts", "." ]
[ 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "TrojanDownloader.Yafive.A.mue", "Win32.Trojan.WisdomEyes.16070401.9500.9991", "Trojan-Downloader.Win32.QQHelper.air", "Troj.Spy.W32.Zbot.kYVW", "TrojWare.Win32.TrojanDownloader.Tiny.~CA", "BackDoor.Update.293", "Win32.Hack.XComp.a.410674", "TrojanDownloader:Win32/Yafive.A", "Trojan-Downloader.Win32.QQHelper.air", "TrojanDownloader.QQHelper", "Trojan-Downloader.Win32.QQHelper" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Malware", "Features", "Android", "According", "to", "the", "observed", "samples", "and", "their", "signatures", ",", "early", "versions", "of", "this", "Android", "malware", "were", "developed", "by", "the", "end", "of", "2014", "and", "the", "campaign", "has", "remained", "active", "ever", "since", "." ]
[ 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "It", "recently", "resurfaced", "in", "November", "2016", "W32.Disttrack.B,", "again", "attacking", "targets", "in", "Saudi", "Arabia." ]
[ 16, 16, 16, 16, 0, 8, 1, 16, 16, 16, 16, 4, 12 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Yodo.A@mm", "Worm/W32.Yodo.1273856", "W32/Yodo.a", "Win32.Yodo.E90817", "WORM_YODO.F", "W32.Yodo@mm", "Win32/Yodo.D", "WORM_YODO.F", "Win32.Yodo.A@mm", "Email-Worm.Win32.Yodo.a", "Win32.Yodo.A@mm", "Trojan.Win32.Yodo.bdnumu", "W32.W.Yodo.a!c", "Win32.Yodo.A@mm", "Worm.Win32.Yodo.B.Dropper", "Win32.Yodo.A@mm", "Trojan.MulDrop.572", "Worm.Yodo.Win32.1", "BehavesLike.Win32.VBObfus.tm", "W32/Risk.OQBD-6759", "Worm/Yodo.b", "Worm:Win32/Yodo.B.dr", "WORM/Yodo.A.1", "Worm[Email]/Win32.Yodo", "Worm.Yodo.a.kcloud", "Worm:Win32/Yodo.B.dr", "Email-Worm.Win32.Yodo.a", "Worm.Yodo", "Win32/Yodo.B.Dropper", "Win32.Worm-email.Yodo.Eddu", "I-Worm.Yodo!uEen0717POE", "W32/Yodo.A!worm", "Win32/Worm.bde" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "We", "don't", "have", "the", "statistics", "of", "devices", "vulnerable", "to", "both", "issues", "at", "the", "same", "time." ]
[ 16, 16, 16, 16, 16, 16, 7, 15, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Krypt.8", "TROJ_TDSS.SMA", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "TROJ_TDSS.SMA", "Packed.Win32.TDSS.aa", "Trojan.Win32.Tdss.btyvr", "Win32.PkdTdss", "Trojan.Packed.2936", "BehavesLike.Win32.Adware.kc", "TrojanDropper:Win32/Sudiet.A", "Packer.W32.Tdss!c", "Packed.Win32.TDSS.aa", "Trojan/Win32.ADH.R21764", "Trojan.TDSS.01414", "Win32.Packed.Tdss.Akox", "Packer.Win32.Tdss", "W32/PackTDss.K!tr", "Win32/Trojan.5b8" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "But", "Dvmap", "is", "very", "special", "rooting", "malware", "." ]
[ 16, 3, 16, 16, 16, 16, 16, 16 ]
[ "Potential", "targets", "The", "actors", "behind", "FrozenCell", "used", "an", "online", "service", "that", "geolocates", "mobile", "devices", "based", "on", "nearby", "cell", "towers", "to", "track", "targets", "." ]
[ 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Worm.Bundpil.d", "Win32.Worm.Resparc.B", "Trojan:Win32/Lodbak.A", "Trojan/Win32.Lodbak.R151670", "Trj/Gamarue.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1 ]
[ "Intrusions", "began", "as", "early", "as", "1996." ]
[ 1, 16, 16, 16, 16, 0 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Win32.Scrop.exbmlp", "BehavesLike.Win32.AdwareConvertAd.fh", "W32/Trojan.YEZU-6096", "TrojanDropper.Scrop.ns", "Trojan[Dropper]/Win32.Scrop", "Backdoor:Win32/Blopod.A!bit", "Trojan.Symmi.D13661", "Dropper/Win32.Scrop.C2319178", "TrojanDropper.Scrop", "Trj/GdSda.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Data", "is", "eventually", "exfiltrated", "over", "a", "TLS", "connection", "to", "the", "Command", "&", "Control", "server", "ws.my-local-weather", "[", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 9, 9 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Netstop.A", "Backdoor.Padmin", "Backdoor.W32.Padmin.08!c", "Trojan/wGet.d", "Backdoor.Padmin.0.8", "W32/Risk.LANR-3940", "Win.Trojan.Padmin-2", "Backdoor.Padmin.0.8", "Trojan.Netstop.A", "Trojan.Win32.Padmin.dyyica", "Backdoor.Win32.Padmin.08", "Trojan.Netstop.A", "BackDoor-ATM.dr", "Backdoor/Padmin.08.Install", "DR/Padmin.08", "BackDoor-ATM.dr", "Backdoor.Padmin", "Bck/Iroffer.BG", "Win32/Padmin.08.A.dropper", "W32/Padmin.A!tr.bdr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Adware.Heur.cmSfNKMeS5mk", "WORM_AMBLER.SMI", "Win32.Trojan.WisdomEyes.16070401.9500.9938", "WORM_AMBLER.SMI", "Trojan.Win32.BHO.bmciwr", "Trojan.PWS.Finanz.origin", "W32/Ambler.dll", "TrojanDownloader:Win32/BHO.A", "TrojanDownloader.BHO", "Trj/CI.A", "Win32.Trojan.Spy.Hrza", "TrojanSpy.Banker!l0YgZsorMww", "Trojan-Spy.Finanz.J", "W32/Ambler.A!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "app", "then", "continues", "to", "run", "in", "the", "background", "without", "the", "user", "’", "s", "knowledge", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "This", "new", "report", "is", "an", "updated", "dissection", "of", "the", "group's", "attacks", "and", "methodologies—something", "to", "help", "organizations", "gain", "a", "more", "comprehensive", "and", "current", "view", "of", "these", "processes", "and", "what", "can", "be", "done", "to", "defend", "against", "them." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 6, 1, 16, 16, 16, 16, 4, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "email", "messages", "used", "in", "the", "attacks", "leverage", "themes", "related", "to", "economic", "development", "and", "politics", "in", "Burma,", "which", "is", "relevant", "to", "the", "work", "of", "the", "NGO." ]
[ 16, 1, 9, 16, 16, 16, 1, 9, 9, 9, 9, 9, 9, 16, 1, 16, 2, 16, 16, 16, 16, 16, 16, 16, 16, 4 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan:Win32/Vareids.A", "Trojan.FakeAV" ]
[ 16, 3, 16, 16, 16, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Win32.VBKrypt!O", "Worm.Rebhip.B3", "Troj.W32.Scar!c", "Trojan/Injector.eyu", "Trojan.Win32.Scar.odxb", "Trojan.Win32.VBKrypt.ecjqdh", "Trojan.Win32.A.VBKrypt.200710", "TrojWare.Win32.VBKrypt.cjb", "Trojan.Inject.27856", "Trojan.VBKrypt.Win32.39868", "BehavesLike.Win32.PWSSpyeye.cc", "W32/Trojan.FNVH-2986", "Trojan/VBKrypt.bgwm", "Trojan/Win32.VBKrypt", "Trojan.ManBat.1", "Trojan.Win32.Scar.odxb", "Trojan/Win32.VBKrypt.C66955", "PWS-Spyeye.el", "SScope.Malware-Cryptor.VBCR.1841", "Win32.Trojan.Scar.Tccd", "Trojan.VBKrypt!joEshOiwspo", "Win32/Trojan.00c" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/VB.qtt", "Backdoor.Win32.Sdbot.aeua", "Trojan.Win32.Nifclop.bbwtga", "Trojan.DownLoader6.34031", "TR/Nifclop.A.6", "Trojan:Win32/Nifclop.A", "Backdoor.Win32.Sdbot.aeua", "Win32/VB.QTT", "Trojan.Win32.Nifclop", "Win32/Trojan.fdb" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "During", "the", "last", "few", "days,", "we", "have", "observed", "a", "campaign", "redirecting", "visitors", "from", "large", "websites", "to", "the", "Angler", "EK." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 6, 16, 16, 16, 1, 9, 16, 16, 3, 11 ]