tokens
sequencelengths 2
296
| ner_tags
sequencelengths 2
296
|
---|---|
[
"We",
"recently",
"noted",
"the",
"non-linear",
"growth",
"of",
"ransomware",
"variants",
"and",
"now",
"a",
"new",
"type",
"has",
"emerged,",
"dubbed",
"MarsJoke."
] | [
16,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
3
] |
[
"Analysis",
"of",
"the",
"malware",
"shows",
"that",
"it",
"uses",
"the",
"common",
"string",
"obfuscation",
"of",
"character",
"replacement",
"(",
"Figure",
"7",
")",
":",
"Figure",
"7",
":",
"Encoded",
"Marcher",
"Strings",
"Figure",
"8",
":",
"Decoded",
"Marcher",
"Strings",
"As",
"noted",
",",
"the",
"application",
"requests",
"extensive",
"permissions",
"during",
"installation",
";",
"Figure",
"9",
"shows",
"the",
"request",
"to",
"act",
"as",
"device",
"administrator",
",",
"a",
"particular",
"permission",
"that",
"should",
"very",
"rarely",
"be",
"granted",
"to",
"an",
"app",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"It",
"has",
"a",
"very",
"low",
"volume",
"in",
"this",
"two-year",
"period,",
"totaling",
"roughly",
"27",
"total",
"samples."
] | [
16,
16,
16,
16,
16,
16,
16,
0,
8,
8,
16,
16,
16,
16,
3
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Win32.Scar!O",
"Trojan.Scar",
"Win32.Trojan.WisdomEyes.16070401.9500.9982",
"Trojan.Win32.Scar.bwre",
"Trojan.Win32.VB.etyztu",
"Trojan.Win32.Z.Scar.3042496",
"Troj.Downloader.W32.VB.l4ji",
"Trojan.DownLoader25.47210",
"Trojan.Scar.Win32.27021",
"BehavesLike.Win32.Autorun.vm",
"Trojan.Heur.VB.EDB7EC",
"Trojan.Win32.Scar.bwre",
"Worm:Win32/Sowndegg.B",
"Trojan/Win32.VB.C16539",
"Trojan.Scar",
"Trj/CI.A",
"Win32/VB.SNU",
"Win32.Trojan.Scar.Pgcp",
"Trojan.Scar!yxP8tXFqxTQ",
"Trojan-Downloader.Win32.VB",
"W32/VB.SNU!tr",
"Win32/Trojan.1c6"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"objective",
"of",
"this",
"blog",
"is",
"to",
"highlight",
"some",
"of",
"the",
"capabilities",
"of",
"this",
"new",
"RAT",
"family",
"and",
"the",
"impact",
"seen",
"so",
"far."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16
] |
[
"The",
"leaked",
"RCSAndroid",
"code",
"is",
"a",
"commercial",
"weapon",
"now",
"in",
"the",
"wild",
"."
] | [
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Since",
"mid-2014,",
"the",
"Kudelski",
"Security",
"Cyber",
"Fusion",
"Center",
"has",
"been",
"monitoring",
"and",
"investigating",
"Sphinx",
"Moth."
] | [
16,
0,
16,
4,
12,
12,
12,
12,
16,
16,
16,
16,
16,
6,
14
] |
[
"But",
"Android.Oldboot",
"malware",
"is",
"a",
"bit",
"more",
"dangerous",
"because",
"even",
"if",
"you",
"remove",
"all",
"working",
"components",
"of",
"it",
"from",
"your",
"android",
"successfully",
",",
"the",
"component",
"imei_chk",
"will",
"persist",
"in",
"a",
"protected",
"boot",
"memory",
"area",
"and",
"hence",
"will",
"reinstall",
"itself",
"on",
"next",
"boot",
"and",
"continuously",
"infect",
"the",
"Smartphone",
"."
] | [
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Espionage",
"and",
"Asymmetric",
"Operation",
"Targeting"
] | [
6,
16,
6,
14,
14
] |
[
"SWC",
"campaign",
"impacted",
"global",
"aerospace,",
"government,",
"and",
"technology",
"organizations",
"Uses",
".via",
"extension"
] | [
6,
14,
16,
4,
12,
12,
16,
4,
12,
16,
1,
9
] |
[
"There",
"are",
"a",
"lot",
"of",
"small",
"Trojans",
"for",
"Android",
"capable",
"of",
"leveraging",
"access",
"privileges",
",",
"in",
"other",
"words",
"—",
"gaining",
"root",
"access",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.HfsAutoB.17AD",
"Trojan/W32.KRDDoS.950784",
"TROJ_DIDKR.A",
"Win32.Trojan.WisdomEyes.16070401.9500.9770",
"Downloader.Castov",
"TROJ_DIDKR.A",
"Trojan.DownLoader9.34810",
"trojan.win32.miuref.c",
"BehavesLike.Win32.Miuref.dc",
"Trojan.Spy",
"TR/Spy.950784.12",
"W32/KRDNSDDoS.A!tr",
"TrojanDownloader:Win32/Simkor.A",
"Win-Trojan/Ddkr.950784",
"Trj/CI.A",
"Win32.Trojan.Spy.Hrpb"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"second",
"method",
"uses",
"intents",
",",
"broadcasts",
",",
"and",
"receivers",
"to",
"execute",
"HenBox",
"code",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"Trojan",
"named",
"Linux.PNScan.1",
"can",
"infect",
"devices",
"with",
"ARM,",
"MIPS,",
"or",
"PowerPC",
"architectures."
] | [
16,
3,
16,
1,
16,
16,
15,
16,
5,
13,
16,
5,
13
] |
[
"We",
"have",
"investigated",
"the",
"malware",
"to",
"identify",
"how",
"it",
"spreads,",
"the",
"techniques",
"it",
"uses",
"and",
"its",
"impact."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Currently",
"Running",
"Applications",
"Banking",
"Trojans",
"that",
"rely",
"on",
"the",
"overlay",
"mechanism",
"to",
"steal",
"information",
"need",
"to",
"know",
"what",
"application",
"is",
"in",
"the",
"foreground",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.Win32.R2D2!O",
"Backdoor.R2d2",
"Backdoor.R2D2",
"BKDR_R2D2.SMR",
"Backdoor.Win32.R2D2.a",
"Trojan.Win32.R2D2.esyktw",
"Backdoor.Win32.R2D2.360448[UPX]",
"Backdoor.W32.R2D2!c",
"Backdoor.Win32.R2D2.~B1",
"BackDoor.RTwoDTwo.1",
"BKDR_R2D2.SMR",
"BehavesLike.Win32.Fake.cc",
"Backdoor.Win32.R2D2",
"Backdoor/R2D2.b",
"TR/GruenFink.1",
"Backdoor.Win32.R2D2.a",
"Backdoor:Win32/R2d2.A",
"Trj/Bundestrojaner.A",
"Win32/R2D2.A",
"Win32.Backdoor.R2d2.Sudy",
"Backdoor.R2D2!w/vENfl9bd8",
"W32/R2D2.A!tr.bdr",
"Win32/Trojan.fd5"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"name",
"Carbanak",
"comes",
"from",
"Carberp,",
"a",
"banking",
"Trojan",
"whose",
"source",
"code",
"was",
"leaked,",
"and",
"Anunak,",
"a",
"custom",
"Trojan",
"that",
"has",
"evolved",
"over",
"the",
"years."
] | [
16,
16,
3,
16,
16,
3,
16,
3,
11,
16,
3,
11,
16,
16,
16,
3,
16,
3,
11,
16,
16,
16,
16,
16,
0
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.OverlayUPXDPM.PE",
"W32.Lamer.FG8",
"PE_SILLY.T",
"Win32.Virus.Lamer.f",
"W32/SillyP2P.BO",
"W32.SillyP2P",
"Win32/Xolxo.A",
"PE_SILLY.T",
"Win.Worm.Delf-13898",
"Virus.Win32.Lamer.fg",
"Trojan.Win32.Delf.oxkq",
"Win32.BagarBubba.A",
"W32.W.AutoRun.kYNN",
"TrojWare.Win32.Pincav.AV",
"Win32.HLLP.Bagar",
"Worm.Delf.Win32.340",
"BehavesLike.Win32.Fesber.tm",
"W32/Delf.aj",
"W32/P2P_Worm.WULF-7526",
"Worm/Delf.vm",
"Worm:Win32/Xolxo.A",
"Virus.Win32.Lamer.fg",
"W32/HLLP.11042",
"Worm.Delf",
"Win32/Delf.NAY",
"Virus.Win32.Lamer.fg",
"Worm.SillyP2P!Dqe8+ZFutPA",
"P2P-Worm.Win32.Delf.aj",
"Virus.Win32.Viking.LG"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Downloader.Shutit.A",
"Trojandownloader.Shutit",
"Trojan.Downloader.Shutit.A",
"Downloader.Shutit.Win32.4",
"Troj.Downloader.W32.Shutit.10!c",
"Trojan/Downloader.Shutit.10",
"Trojan.Downloader.Shutit.A",
"Win32.Trojan.WisdomEyes.16070401.9500.9998",
"W32/Risk.EKPI-0804",
"Win32/DlShut.A",
"TROJ_SHUTIT.10.A",
"Win.Trojan.Revell-1",
"Trojan.Downloader.Shutit.A",
"Trojan-Downloader.Win32.Shutit.10",
"Trojan.Downloader.Shutit.A",
"Trojan.Win32.Shutit.vmoy",
"Trojan.Downloader.Shutit.A",
"Trojan.Aphex.10",
"TROJ_SHUTIT.10.A",
"BehavesLike.Win32.Downloader.zt",
"Trojan-Downloader.Win32.Aphex",
"TrojanDownloader.Shutit.10",
"TR/Shutit.10.A",
"Trojan[Downloader]/Win32.Shutit",
"Win32.Troj.Downloader.b.kcloud",
"TrojanDownloader:Win32/Shutit.1_0",
"Trojan-Downloader.Win32.Shutit.10",
"TrojanDownloader.Shutit",
"Trj/Dwn.Shutit.10",
"Win32/TrojanDownloader.Shutit.10",
"Win32.Trojan-downloader.Shutit.Ahxq",
"Trojan.DL.Small!IxJNSrLVynM"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"However,",
"Bookworm",
"expands",
"on",
"its",
"capabilities",
"through",
"its",
"ability",
"to",
"load",
"additional",
"modules",
"directly",
"from",
"its",
"command",
"and",
"control",
"C2",
"server."
] | [
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9,
9,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.FakeMS",
"Trojan.Win32.XPACK.bdmoql",
"WS.Reputation.1",
"W32/Swisyn.CB",
"Packed.Win32.Cryptcf.A",
"Trojan.DownLoader7.26386",
"Packed.Multi.dlw",
"Win32.Hack.Packed.f.kcloud",
"Backdoor:Win32/Racdr.A",
"BScope.Trojan.SvcHorse.01643",
"Backdoor.Win32.BlackHole",
"W32/Multi.E!tr",
"Trj/CI.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"As",
"we",
"’",
"ve",
"mentioned",
"earlier",
",",
"Triada",
"is",
"downloaded",
"by",
"smaller",
"Trojans",
"that",
"have",
"leveraged",
"the",
"access",
"privileges",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"JS:Trojan.JS.Likejack.A",
"JS.Faceliker.NC",
"JS/Faceliker.a",
"JS/Faceliker.A!Eldorado",
"JS:Trojan.JS.Likejack.A",
"JS:Trojan.JS.Likejack.A",
"TrojWare.JS.TrojanClicker.FbLiker.A",
"JS:Trojan.JS.Likejack.A",
"JS/Faceliker.a",
"JS/Faceliker.A!Eldorado",
"JS/FBJack.I!tr",
"JS:Trojan.JS.Likejack.A",
"TrojanClicker:JS/Faceliker.S",
"Trojan-Clicker.JS.Faceliker",
"Script.Trojan.JSClicker.A",
"trojan.js.likejack.a"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"report",
"details",
"how",
"many",
"seemingly",
"unrelated",
"cyber",
"attacks",
"may,",
"in",
"fact,",
"be",
"part",
"of",
"a",
"broader",
"offensive",
"fueled",
"by",
"a",
"shared",
"development",
"and",
"logistics",
"infrastructure",
"—",
"a",
"finding",
"that",
"suggests",
"some",
"targets",
"are",
"facing",
"a",
"more",
"organized",
"menace",
"than",
"they",
"realize."
] | [
16,
16,
16,
16,
16,
16,
16,
1,
9,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
12,
16,
5,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9997",
"HT_GM_GL290013.UVPM",
"Trojan.Heur.Win32.10174",
"HT_GM_GL290013.UVPM",
"BehavesLike.Win32.Trojan.vh",
"Trojan.Heur.GM.D5FC4D76",
"Trojan/Win32.Buzus.R1005",
"Trojan.Win32.Tiggre"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"We",
"refer",
"to",
"these",
"attacks",
"as",
"MuddyWater",
"due",
"to",
"the",
"confusion",
"in",
"attributing",
"these",
"attacks."
] | [
16,
16,
16,
16,
1,
16,
6,
16,
16,
16,
16,
16,
16,
16,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.Bot",
"Packed.Win32.Klone.bn",
"TrojWare.Win32.VB.oks",
"Win32.Hack.Klone.bn.kcloud",
"Backdoor:Win32/Blohi.B",
"Packed/Win32.Klone",
"Backdoor.Win32.Blohi",
"W32/VB.QIK!tr",
"Trj/CI.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Unit",
"42",
"has",
"collected",
"multiple",
"spear",
"phishing",
"emails,",
"weaponized",
"document",
"files,",
"and",
"payloads",
"all",
"targeting",
"various",
"offices",
"of",
"the",
"Mongolian",
"government",
"and",
"deployed",
"between",
"August",
"2015",
"and",
"February",
"2016."
] | [
4,
12,
16,
16,
16,
6,
14,
1,
9,
9,
9,
9,
9,
16,
16,
16,
4,
12,
12,
12,
12,
16,
16,
16,
0,
8,
16,
0,
8
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.Miancha.r5",
"Trojan.PR.Preshin!uX45uZVdtBM",
"Backdoor.Readomesa",
"Backdoor.Win32.Miancha.f",
"Trojan.Win32.Miancha.dfftbq",
"Trojan.Starter.3690",
"Backdoor.Miancha.Win32.5",
"Backdoor/Miancha.c",
"TR/Cudofows.A.1",
"W32/Miancha.F!tr.bdr",
"Trojan[Backdoor]/Win32.Miancha",
"Trojan.Inject.28",
"Trojan:Win32/Cudofows.A",
"Backdoor.Miancha",
"Trj/CI.A",
"Backdoor.Win32.Miancha",
"Proxy.BEPF",
"Win32/Trojan.b2e"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Recently,",
"we",
"came",
"across",
"an",
"email",
"exploit",
"attempt,",
"aimed",
"at",
"a",
"European",
"Point",
"of",
"Sales",
"POS",
"vendor."
] | [
16,
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
5,
13,
13,
13,
13,
13
] |
[
"The",
"Bergard",
"Trojan",
"and",
"the",
"C0d0so",
"group",
"that",
"made",
"it",
"famous",
"with",
"the",
"November",
"2014",
"watering",
"hole",
"attack",
"via",
"Forbes.com",
"have",
"received",
"renewed",
"attention",
"recently,",
"with",
"other",
"researchers",
"potentially",
"linking",
"emerging",
"tools",
"and",
"recent",
"attacks",
"to",
"the",
"group."
] | [
3,
11,
11,
16,
6,
14,
14,
15,
16,
16,
16,
16,
16,
0,
8,
1,
9,
9,
16,
1,
16,
16,
16,
16,
16,
16,
16,
4,
16,
16,
16,
3,
16,
16,
1,
16,
6,
14
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan-PWS/W32.Mist.111104",
"Troj.PSW32.W.Mist.a!c",
"Win32.Trojan.WisdomEyes.16070401.9500.9977",
"Trojan-PSW.Win32.Mist.a",
"Trojan.Win32.Mist.dboecq",
"Trojan.DownLoad3.33938",
"Trojan-PSW.Win32.Mist",
"W32.Malware.Heur",
"PWS:Win32/Steam.J",
"Trojan-PSW.Win32.Mist.a",
"TrojanPSW.Mist",
"Win32.Trojan-qqpass.Qqrob.Ajli",
"Trojan.PWS.Mist!",
"W32/Mist.A!tr.pws",
"Win32/Trojan.PSW.db7"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Recently,",
"Palo",
"Alto",
"Networks",
"Unit",
"42",
"reported",
"on",
"a",
"new",
"exploitation",
"platform",
"that",
"we",
"called",
"DealersChoice",
"in",
"use",
"by",
"the",
"Sofacy",
"group",
"AKA",
"APT28,",
"Fancy",
"Bear,",
"STRONTIUM,",
"Pawn",
"Storm,",
"Sednit."
] | [
16,
4,
12,
12,
12,
12,
16,
16,
16,
16,
7,
15,
15,
16,
16,
6,
16,
16,
16,
16,
6,
14,
16,
6,
14,
14,
14,
14,
14,
14
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Collti",
"Adware.ShandaAdd!DlXR6+5TT0o",
"WS.Reputation.1",
"TR/Collti.A.24",
"Heuristic.BehavesLike.Win32.ModifiedUPX.C",
"Trojan:Win32/Collti.A",
"Trojan.Win32.Collti",
"Trj/CI.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"This",
"process",
"is",
"defined",
"in",
"the",
"app",
"’",
"s",
"AndroidManifest.xml",
"config",
"file",
",",
"as",
"shown",
"in",
"the",
"following",
"snippet",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"dropper",
"automatically",
"decrypts",
"and",
"installs",
"its",
"core",
"malware",
"APK",
"which",
"later",
"conducts",
"malicious",
"patching",
"and",
"app",
"updates",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"TrendMicro",
"recently",
"came",
"across",
"a",
"variant",
"of",
"the",
"BIFROSE",
"malware",
"that",
"has",
"been",
"rewritten",
"for",
"UNIX",
"and",
"UNIX-like",
"systems."
] | [
4,
16,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
5,
16,
5,
13
] |
[
"The",
"code",
"is",
"not",
"only",
"obfuscated",
"but",
"also",
"packed",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Banker/W32.Banbra.186368",
"Trojan/ProxyChanger.g",
"Win32.Trojan.WisdomEyes.16070401.9500.9844",
"Trojan-Banker.Win32.Banbra.tnul",
"Win32.Trojan-banker.Banbra.Wtxw",
"Trojan-Downloader.Win32.Murlo",
"W32/Trojan.IUVC-7922",
"TR/StealthProxy.B.11",
"Trojan[Downloader]/Win32.Banload",
"Win32.Troj.Undef.kcloud",
"Trojan-Banker.Win32.Banbra.tnul",
"Trojan:Win32/StealthProxy.B",
"Trojan/Win32.Scar.R17882",
"Trojan.ProxyChanger!31A84p0+A4o",
"W32/ProxyChanger.NM!tr",
"Trj/CI.A",
"Win32/Trojan.Proxy.d23"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"We",
"collect",
"all",
"data",
"about",
"your",
"friends",
"and",
"family",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.Win32.Aebot!O",
"Backdoor.GTbot.Win32.124",
"Trojan/Aebot.k",
"Win32.Backdoor.Aebot.f",
"Win.Trojan.Sdbot-2505",
"Backdoor.Aebot",
"Backdoor.Win32.GTbot.c",
"Trojan.Win32.GTbot.craqxn",
"TrojWare.Win32.Aebot.EF",
"BackDoor.IRC.Sdbot.based",
"BehavesLike.Win32.Ipamor.gz",
"Backdoor/GTbot.bj",
"Backdoor.Win32.GTbot.c",
"Win32/Aebot.K",
"Backdoor.Aebot!dwOGgEtXe1I",
"Backdoor.Win32.Aebot.K",
"W32/Aebot.K!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Derkziel",
"info",
"stealer",
"Steam,",
"Opera,",
"Yandex,",
"..."
] | [
3,
16,
11,
5,
13,
13,
16
] |
[
"What",
"are",
"Google",
"authorization",
"tokens",
"?",
"A",
"Google",
"authorization",
"token",
"is",
"a",
"way",
"to",
"access",
"the",
"Google",
"account",
"and",
"the",
"related",
"services",
"of",
"a",
"user",
"."
] | [
16,
16,
4,
16,
16,
16,
16,
4,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Mdropper",
"TROJ_ARTIEF.CR",
"Exploit.MSWord.CVE-2010-3333.ci",
"Exploit.Rtf.CVE-2010-3333.hzts",
"Exploit.Rtf.based",
"TROJ_ARTIEF.CR",
"TrojanDropper.RTF.b",
"NORMAL:Hack.Exploit.Script.CVE-2010-3333.a!1609827",
"Data/CVE20103333.A!exploit",
"Luhe.Exploit.RTF.CVE-2010-3333.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"With",
"the",
"capability",
"to",
"open",
"a",
"given",
"URL",
"in",
"a",
"browser",
",",
"the",
"actor",
"behind",
"‘",
"SimBad",
"’",
"can",
"generate",
"phishing",
"pages",
"for",
"multiple",
"platforms",
"and",
"open",
"them",
"in",
"a",
"browser",
",",
"thus",
"performing",
"spear-phishing",
"attacks",
"on",
"the",
"user",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"In",
"December",
"2015,",
"several",
"researchers",
"reported",
"that",
"websites",
"hosting",
"the",
"Rig",
"Exploit",
"Kit",
"were",
"serving",
"an",
"updated",
"version",
"of",
"Qbot.3",
"4",
"5",
"Then",
"in",
"January",
"2016,",
"over",
"500",
"devices",
"at",
"a",
"large",
"public",
"organisation",
"wereinfected",
"with",
"Qbot."
] | [
16,
0,
8,
16,
4,
16,
16,
1,
9,
3,
11,
11,
11,
16,
16,
16,
16,
16,
16,
3,
11,
11,
16,
16,
0,
8,
16,
16,
5,
16,
16,
4,
12,
12,
16,
16,
3
] |
[
"Monitoring",
"efforts",
"on",
"this",
"new",
"variant",
"revealed",
"that",
"the",
"malicious",
"websites",
"are",
"spread",
"through",
"smishing",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.SpamlesEI1.Trojan",
"Rootkit.KillAv.B",
"Trojan/W32.Rootkit.3712.K",
"Trojan.Kapa.A",
"Rootkit.W32.Small.to6t",
"Trojan/AutoRun.AntiAV.r",
"Rootkit.KillAv.B",
"RTKT_SMALL.SMB",
"Hacktool.Rootkit",
"Win32/SillyAutorun.DCA",
"RTKT_SMALL.SMB",
"Rootkit.KillAv.B",
"Rootkit.Win32.Small.sfn",
"Rootkit.KillAv.B",
"Trojan.Win32.NtRootKit.chvyyx",
"Rootkit.KillAv.B",
"TrojWare.Win32.Rootkit.Small.AA",
"Trojan.NtRootKit.10455",
"Trojan:Winnt/Kapa.A",
"Trojan:WinNT/Kapa.A",
"Rootkit.Win32.Small.sfn",
"Backdoor/Win32.Rootkit.R1193",
"Rootkit.KillAv.B",
"Trojan.Win32.KillAV.af",
"Worm.Orbina!Ypp8YqYGicY",
"Trojan.WinNT.Kapa",
"RootKit.Win32.KillAV.B"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.eHeur.Malware03",
"Trojanspy.Banker.16710",
"Win32/Tnega.EcVXcGD",
"Trojan.Win32.Small.csf",
"Troj.W32.Small.mfSA",
"Trojan.Starter.3499",
"Trojan.Small.Win32.24377",
"Trojan/Small.paq",
"TR/Rogue.30781",
"Trojan/Win32.Small",
"Trojan:Win32/Meicater.A!bit",
"Trojan.Strictor.D240AB",
"Trojan.Win32.Small.csf",
"Trojan.Small",
"Trojan.Small!+nCz0Wnah68",
"Trojan.Win32.Small"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Win32.Mahato!O",
"Backdoor.Bifrose.F8",
"Trojan/Mahato.caj",
"Win32.Trojan.WisdomEyes.16070401.9500.9964",
"TROJ_CALYPS.SMUJ",
"Win.Trojan.Mahato-1",
"Trojan.Win32.Mahato.caj",
"Trojan.Win32.Mahato.ijlmo",
"Trojan.Win32.Scar.118272[UPX]",
"TrojWare.Win32.Mahato.A",
"BehavesLike.Win32.Sytro.cc",
"Trojan/Mahato.ob",
"W32.Backdoor.Apocalypse",
"Trojan/Win32.Mahato",
"Win32.Troj.Scar.15.kcloud",
"Trojan.Zusy.DAAC",
"W32.W.AutoRun.lkXC",
"Trojan.Win32.Mahato.caj",
"Trojan:Win32/Lypsacop.A",
"Trojan/Win32.Mahato.R2854",
"Backdoor.Bifrose",
"Virus.Win32.Delf",
"Trojan.Mahato"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.eHeur.Malware10",
"Trojan.Mauvaise.SL1",
"TROJ_NITOL.SMD",
"Win32.Trojan.WisdomEyes.16070401.9500.9997",
"W32/Trojan2.PAML",
"TROJ_NITOL.SMD",
"Win32.Trojan-DDoS.Yoddos.A",
"Trojan-Dropper.Win32.Dinwod.wkn",
"Trojan.Win32.Staser.demkhd",
"Troj.Dropper.W32.Dinwod.toj0",
"TrojWare.Win32.Nitol.KA",
"DDoS.Attack.384",
"Trojan.Staser.Win32.2253",
"BehavesLike.Win32.Downloader.nm",
"Trojan.Win32.Yoddos",
"W32/Trojan.QEFN-2077",
"Trojan/Staser.le",
"TR/Dropper.cgytn",
"Trojan-Dropper.Win32.Dinwod.wkn",
"Trojan:Win32/Wepiall.A",
"Backdoor/Win32.Farfli.R119148",
"Trojan.Staser",
"Trj/CI.A",
"Win32/Yoddos.BW",
"Trojan.Win32.Staser.anbya",
"W32/Yoddos.BW!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"For",
"testing",
"purposes",
"we",
"inserted",
"a",
"fake",
"contacts",
"list",
"to",
"our",
"Android",
"Emulator",
"and",
"observed",
"resultant",
"behavior",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"VB:Trojan.Valyria.1167",
"O97M.Downloader.4967",
"VB:Trojan.Valyria.1167",
"VB:Trojan.Valyria.1167",
"Trojan.Ole2.Vbs-heuristic.druvzi",
"VB:Trojan.Valyria.1167",
"VB:Trojan.Valyria.1167",
"HEUR.VBA.Trojan.e",
"W97M.Downloader.GOX",
"virus.office.qexvmc.1085"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"targetting",
"Linux",
"also",
"known",
"as:",
"Backdoor.Linux.Tsunami.A",
"Linux.Backdoor.Kaiten",
"ELF_KAITEN.SM",
"HEUR:Backdoor.Linux.Tsunami.bh",
"Trojan.Tsunami.exnldy",
"Backdoor.Linux.Tsunami!c",
"Linux.BackDoor.Tsunami.761",
"ELF_KAITEN.SM",
"ELF/Backdoor.EWHJ-",
"Backdoor.Linux.aego",
"LINUX/Tsunami.bkdwv",
"Trojan[Backdoor]/Linux.Tsunami.bh",
"Trojan.Backdoor.Linux.Tsunami.1",
"HEUR:Backdoor.Linux.Tsunami.bh",
"Backdoor.Linux.Tsunami.b",
"Trojan.Linux.Tsunami",
"ELF/Tsunami.NBV!tr",
"Win32/Trojan.fba"
] | [
16,
3,
16,
11,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"This",
"sample",
"is",
"similar",
"to",
"those",
"presented",
"in",
"other",
"recent",
"Marcher",
"analyses",
"[",
"1",
"]",
"[",
"2",
"]",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Recently",
"we",
"detected",
"a",
"more",
"sophisticated",
"technique",
"that",
"a",
"handful",
"of",
"countries",
"across",
"Asia",
"are",
"actively",
"using",
"to",
"infect",
"systems",
"with",
"RATs.",
"This",
"new",
"technique",
"ensures",
"that",
"the",
"payload/file",
"remains",
"in",
"memory",
"through",
"its",
"execution,",
"never",
"touching",
"the",
"disk",
"in",
"a",
"de-encrypted",
"state."
] | [
16,
16,
16,
16,
16,
1,
9,
15,
16,
16,
16,
2,
16,
2,
16,
16,
16,
16,
5,
13,
16,
3,
16,
16,
16,
16,
16,
16,
3,
16,
16,
7,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Win32.Cossta!O",
"Trojan.Cossta",
"Trojan.Win32.Cossta.vjk",
"Trojan.Win32.Drop.dxlfgu",
"Trojan.Win32.Cossta.49152",
"Trojan.KillFiles.18641",
"Trojan/Cossta.ett",
"Trojan/Win32.Cossta",
"Worm:Win32/Vobirue.A",
"W32.W.AutoRun.l6mI",
"Trojan.Win32.Cossta.vjk",
"HEUR/Fakon.mwf",
"Win32/VB.OPD"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"With",
"this",
"latest",
"report,",
"we",
"have",
"now",
"identified",
"at",
"least",
"21",
"cases",
"in",
"Mexico",
"of",
"abusive,",
"improper",
"targeting",
"with",
"NSO",
"Group's",
"Pegasus",
"spyware"
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
2,
16,
16,
16,
16,
16,
6,
14,
3,
11
] |
[
"However",
",",
"many",
"users",
"are",
"in",
"no",
"hurry",
"to",
"update",
"the",
"operating",
"systems",
"of",
"their",
"products",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.FakeAlert.TK",
"Rootkit.Win32.Clbd!O",
"Trojan/Clbd.dt",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Trojan.FakeAlert.TK",
"Trojan.FakeAlert.TK",
"Trojan.Win32.Clbd.oyzd",
"Trojan.Win32.Z.Clbd.68100",
"Trojan.FakeAlert.TK",
"Trojan.FakeAlert.TK",
"Rootkit.Clbd.Win32.6",
"BehavesLike.Win32.VirRansom.kc",
"Trojan.Win32.Waledac",
"Rootkit.Clbd.av",
"Trojan.FakeAlert.TK",
"TrojanDropper:Win32/Pasich.A",
"Trojan/Win32.Bredlab.R17",
"Trojan.FakeAlert.TK",
"MalwareScope.Worm.Nuwar-Glowa.1",
"Rootkit.Clbd!+/k5iv7h7q8",
"Win32/Trojan.df3"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Veil.5",
"W32/Trojan.UYPJ-5875",
"Ruby/Rozena.H",
"Trojan.Win32.Ruby.emhncx",
"Trojan.SkypeSpam.11018",
"TR/AD.Rozena.uidpc",
"Trojan.Win32.Z.Veil.654486.A",
"Trojan.SkypeSpam!",
"Trojan.Ruby.Rozena",
"Win32/Trojan.34d"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Apart",
"from",
"infecting",
"systems",
"with",
"it,",
"we",
"also",
"spotted",
"instances",
"where",
"common",
"lateral",
"movement",
"tools",
"were",
"detected",
"around",
"the",
"same",
"time",
"they",
"were",
"actively",
"compromising",
"the",
"endpoint",
"with",
"MajikPOS."
] | [
16,
16,
5,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3
] |
[
"The",
"malicious",
"code",
"only",
"makes",
"for",
"a",
"small",
"part",
"of",
"the",
"app,",
"making",
"it",
"difficult",
"to",
"detect."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Starting",
"content",
"observers",
"and",
"the",
"main",
"task",
"loop",
"to",
"receive",
"remote",
"commands",
"and",
"exfiltrate",
"data",
"The",
"app",
"uses",
"six",
"techniques",
"to",
"collect",
"user",
"data",
":",
"Repeated",
"commands",
":",
"use",
"alarms",
"to",
"periodically",
"repeat",
"actions",
"on",
"the",
"device",
"to",
"expose",
"data",
",",
"including",
"gathering",
"location",
"data",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Android.Trojan.FakeInst.BD",
"Android.Opfake.E",
"Android.Trojan.FakeInst.BD",
"AndroidOS/Opfake.AR",
"ANDROIDOS_SMSUPDATE.C",
"Andr.Trojan.Opfake-4",
"Android.Trojan.FakeInst.BD",
"HEUR:Trojan-SMS.AndroidOS.Opfake.a",
"A.H.Pay.ApuAte",
"Trojan.Android.Opfake.emekxt",
"Trojan:Android/Fakeinst.CG",
"Android.SmsSend.2293",
"ANDROIDOS_SMSUPDATE.C",
"AndroidOS/Opfake.AR",
"Trojan/AndroidOS.r",
"Trojan[SMS]/Android.Opfake",
"Android.Troj.Opfake.b.kcloud",
"Android.Trojan.FakeInst.BD",
"HEUR:Trojan-SMS.AndroidOS.Opfake.a",
"Android-Trojan/FakeInst.1b13",
"Trojan.AndroidOS.Opfake.A",
"Trojan.Android.FakeInstall.p",
"Trojan-SMS.AndroidOS.Opfake"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"They",
"only",
"compromise",
"specific",
"high-value",
"targets",
"and",
"once",
"inside",
"the",
"company",
"networks,",
"move",
"laterally",
"to",
"hosts",
"that",
"can",
"be",
"monetized."
] | [
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16,
16,
16,
5,
16,
16,
16,
16
] |
[
"Moreover",
",",
"there",
"are",
"many",
"toolkits",
"like",
"the",
"SpyNote",
"Trojan",
"builder",
"that",
"enable",
"users",
"to",
"build",
"malware",
"with",
"ease",
"and",
"few",
"clicks",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Our",
"analysis",
"indicates",
"that",
"this",
"trojan",
"is",
"in",
"its",
"testing",
"stage",
"but",
"given",
"its",
"potential",
",",
"every",
"mobile",
"user",
"should",
"be",
"aware",
"of",
"GPlayed",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16
] |
[
"We've",
"recently",
"discussed",
"Corebot",
"malware",
"and",
"its",
"possible",
"ties",
"to",
"btcshop.cc,",
"a",
"site",
"selling",
"stolen",
"data."
] | [
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
1,
16,
1,
16,
16,
16
] |
[
"We",
"are",
"continuing",
"to",
"watch",
"it",
"closely",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"Makop",
"ransomware",
"gang",
"is",
"still",
"using",
"the",
"same",
"tools",
"used",
"in",
"their",
"first",
"operations",
"in",
"2020,",
"according",
"to",
"a",
"recent",
"investigation",
"by",
"Lifars",
"security",
"team,",
"which",
"has",
"identified",
"four",
"of",
"the",
"gang's",
"tools."
] | [
6,
14,
14,
14,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
6,
16,
0,
16,
16,
16,
16,
16,
16,
4,
12,
12,
16,
16,
16,
16,
16,
4,
12,
3
] |
[
"]",
"comuseraccount",
"[",
"."
] | [
16,
16,
16,
16
] |
[
"This",
"mobile",
"malware",
"masquerades",
"as",
"legitimate",
",",
"trusted",
"postal",
"service",
"applications",
"so",
"that",
"it",
"can",
"gain",
"the",
"users",
"trust",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"If",
"the",
"value",
"of",
"this",
"field",
"failed",
"to",
"arrive",
"from",
"the",
"C",
"&",
"C",
",",
"it",
"was",
"selected",
"from",
"the",
"file",
"data.db",
"using",
"a",
"pseudo-random",
"algorithm",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16
] |
[
"It",
"listens",
"to",
"events",
"like",
"TYPE_VIEW_TEXT_CHANGED",
"."
] | [
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9531",
"Win.Trojan.AutoIT-6333854-0",
"AutoIt/injector.E",
"AutoIt/injector.E",
"Win32/Injector.Autoit.DFJ",
"Trojan.Win32.Injector"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1
] |
[
"Port",
"6209",
":",
"Telegram",
"extraction",
"service",
"."
] | [
1,
9,
16,
5,
16,
16,
16
] |
[
"However",
",",
"due",
"to",
"the",
"absence",
"of",
"certification",
"centers",
"verifying",
"the",
"digital",
"signatures",
"of",
"Android",
"programs",
",",
"nothing",
"prevents",
"criminals",
"from",
"adding",
"their",
"own",
"signature",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"file",
"contained",
"embedded",
"macro",
"code",
"that",
"executed",
"a",
"commonly",
"observed",
"PowerShell",
"command",
"to",
"download",
"and",
"execute",
"a",
"file."
] | [
16,
16,
16,
3,
11,
11,
16,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
16,
1
] |
[
"MONSOON",
"is",
"the",
"name",
"given",
"to",
"the",
"Forcepoint",
"Security",
"Labs"
] | [
4,
16,
16,
16,
16,
16,
4,
12,
12,
12
] |
[
"In",
"some",
"cases",
",",
"malicious",
"components",
"are",
"dynamically",
"downloaded",
"onto",
"a",
"device",
"after",
"an",
"infected",
"app",
"is",
"installed",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Myanmar",
"is",
"a",
"country",
"currently",
"engaged",
"in",
"an",
"important",
"political",
"process."
] | [
2,
16,
16,
2,
16,
16,
16,
16,
16,
16,
16
] |
[
"]",
"today",
"admin",
"[",
".databit",
"[",
".today",
"cendata",
"[",
"."
] | [
9,
9,
1,
9,
9,
9,
9,
1,
9,
9
] |
[
"The",
"attackers",
"involved",
"in",
"these",
"email",
"campaigns",
"leveraged",
"a",
"variety",
"of",
"distribution",
"mechanisms",
"to",
"deliver",
"the",
"information",
"stealing",
"FormBook",
"malware,",
"including:"
] | [
6,
14,
16,
16,
16,
6,
14,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
16
] |
[
"CryptoWall",
"is",
"a",
"type",
"of",
"malware",
"known",
"as",
"ransomware,",
"which",
"encrypts",
"a",
"victim's",
"files",
"and",
"subsequently",
"demands",
"payment",
"in",
"exchange",
"for",
"the",
"decryption",
"key."
] | [
3,
16,
16,
16,
16,
3,
16,
16,
3,
16,
1,
16,
1,
9,
16,
16,
1,
9,
16,
1,
9,
9,
9,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Exploit.Win32.MS04-028!O",
"Trojan.Diztakun",
"W32.W.Ridnu.ls5O",
"Trojan/Exploit.MS04-028.g",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Win32/HideinPic.A",
"Win.Trojan.Ag-1",
"Trojan.Win32.Diztakun.xnd",
"Exploit.Win32.MS04028.lhyh",
"Trojan.MulDrop3.32325",
"Exploit.MS04.Win32.105",
"BehavesLike.Win32.Vilsel.qc",
"Trojan-Banker.Win32.Bancos",
"Exploit.MS04-028.h",
"Trojan[Exploit]/Win32.MS04-028",
"Trojan:Win32/Greener.A",
"Trojan.Win32.Diztakun.xnd",
"Trojan/Win32.Xema.C6210",
"Exploit.MS04028",
"Trojan.Heur.dmHfrf5Ccil",
"Win32/Greener.A",
"Win32.Virus.Greener.Pdct",
"Worm.Kilada.A",
"W32/Greener.A!tr",
"Win32/Trojan.cae"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"In",
"fact,",
"this",
"concept",
"is",
"nothing",
"novel",
"–",
"we",
"already",
"saw",
"many",
"ransomware",
"families",
"that",
"can",
"do",
"the",
"same."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"malware",
"has",
"the",
"capability",
"to",
"overwrite",
"a",
"victim",
"host's",
"master",
"boot",
"record",
"MBR",
"and",
"all",
"data",
"files."
] | [
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Barys.DD90F",
"Trojan:Win32/Rozena.D!bit",
"Trojan.PowerShell.Rozena"
] | [
16,
3,
16,
16,
16,
1,
1,
1
] |
[
"Pro",
"PoS",
"is",
"simple-to-use",
"PoS",
"malware",
"that",
"is",
"available",
"for",
"purchase,",
"enabling",
"multiple",
"threat",
"actors",
"to",
"easily",
"take",
"advantage",
"of",
"this",
"malware",
"to",
"target",
"businesses."
] | [
3,
11,
16,
16,
3,
11,
16,
16,
16,
11,
16,
16,
6,
14,
14,
16,
16,
16,
16,
16,
16,
3,
16,
4,
12
] |
[
"Lookout",
"has",
"determined",
"ViperRAT",
"is",
"a",
"very",
"sophisticated",
"threat",
"that",
"adds",
"to",
"the",
"mounting",
"evidence",
"that",
"targeted",
"mobile",
"attacks",
"against",
"governments",
"and",
"business",
"is",
"a",
"real",
"problem",
"."
] | [
4,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"HenBox",
"is",
"not",
"running",
"as",
"a",
"system",
"app",
")",
",",
"another",
"ELF",
"library",
"is",
"loaded",
"to",
"aid",
"with",
"executing",
"super-user",
"commands",
"."
] | [
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"For",
"many",
"years,",
"one",
"of",
"the",
"go-to",
"families",
"of",
"malware",
"used",
"by",
"both",
"less-skilled",
"and",
"advanced",
"actors",
"has",
"been",
"the",
"Poison",
"Ivy",
"aka",
"PIVY",
"RAT."
] | [
16,
0,
8,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
6,
16,
6,
14,
16,
16,
16,
3,
11,
16,
3,
11
] |
[
"Content",
"observers",
":",
"use",
"Android",
"'s",
"ContentObserver",
"framework",
"to",
"gather",
"changes",
"in",
"SMS",
",",
"Calendar",
",",
"Contacts",
",",
"Cell",
"info",
",",
"Email",
",",
"WhatsApp",
",",
"Facebook",
",",
"Twitter",
",",
"Kakao",
",",
"Viber",
",",
"and",
"Skype",
"."
] | [
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
5,
16,
5,
16,
5,
16,
5,
13,
16,
5,
16,
5,
16,
5,
16,
5,
16,
5,
16,
5,
16,
16,
5,
16
] |
[
"Following",
"discovery,",
"we",
"alerted",
"our",
"customers",
"and",
"began",
"working",
"with",
"Microsoft",
"through",
"the",
"responsible",
"disclosure",
"process."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"On",
"July",
"8,",
"2015,",
"Unit",
"42",
"used",
"the",
"AutoFocus",
"Threat",
"Intelligence",
"service",
"to",
"locate",
"and",
"investigate",
"activity",
"consistent",
"with",
"a",
"spear-phishing",
"attack",
"targeting",
"the",
"US",
"Government."
] | [
16,
0,
8,
8,
4,
12,
16,
16,
4,
12,
12,
12,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
16,
16,
4,
12
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Banker/W32.Alreay.639100",
"TrojanSpy.Banker.SW4",
"Trojan.Banswift",
"Win.Trojan.BBSwift-4",
"Trojan-Banker.Win32.Alreay.b",
"Trojan.Win32.Alreay.eigudw",
"Win32.Trojan-banker.Alreay.Edxl",
"Trojan.Swifter.1",
"Trojan.Banker.Alreay.f",
"W32/Alreay.ADAQ!tr",
"Troj.Banker.W32!c",
"Trojan-Banker.Win32.Alreay.b",
"Trojan:Win32/Tokser.A",
"Trojan/Win32.Alreay.C1768016",
"Spyware.Banker.Alreay",
"TrojanBanker.Alreay",
"Win32/Spy.Banker.ADAQ",
"Trj/GdSda.A",
"Win32/Trojan.c8b"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Infostealer.Gampass",
"Trojan.DownLoad1.59715",
"Trojan-Downloader.Win32.Adload!IK",
"Trojan/Win32.Adload",
"Trojan-Spy.Win32.Filka.ld",
"Trojan-PSW.Gampass",
"Trojan-Downloader.Win32.Adload",
"Trj/Lineage.BZE"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Cybercriminals",
"also",
"exploit",
"the",
"Master",
"Key",
"vulnerability",
"and",
"have",
"learned",
"to",
"embed",
"unsigned",
"executable",
"files",
"in",
"Android",
"installation",
"packages",
"."
] | [
16,
16,
16,
16,
7,
15,
15,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16
] |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.