tokens
sequencelengths
2
296
ner_tags
sequencelengths
2
296
[ "We", "recently", "noted", "the", "non-linear", "growth", "of", "ransomware", "variants", "and", "now", "a", "new", "type", "has", "emerged,", "dubbed", "MarsJoke." ]
[ 16, 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 3 ]
[ "Analysis", "of", "the", "malware", "shows", "that", "it", "uses", "the", "common", "string", "obfuscation", "of", "character", "replacement", "(", "Figure", "7", ")", ":", "Figure", "7", ":", "Encoded", "Marcher", "Strings", "Figure", "8", ":", "Decoded", "Marcher", "Strings", "As", "noted", ",", "the", "application", "requests", "extensive", "permissions", "during", "installation", ";", "Figure", "9", "shows", "the", "request", "to", "act", "as", "device", "administrator", ",", "a", "particular", "permission", "that", "should", "very", "rarely", "be", "granted", "to", "an", "app", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "It", "has", "a", "very", "low", "volume", "in", "this", "two-year", "period,", "totaling", "roughly", "27", "total", "samples." ]
[ 16, 16, 16, 16, 16, 16, 16, 0, 8, 8, 16, 16, 16, 16, 3 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Win32.Scar!O", "Trojan.Scar", "Win32.Trojan.WisdomEyes.16070401.9500.9982", "Trojan.Win32.Scar.bwre", "Trojan.Win32.VB.etyztu", "Trojan.Win32.Z.Scar.3042496", "Troj.Downloader.W32.VB.l4ji", "Trojan.DownLoader25.47210", "Trojan.Scar.Win32.27021", "BehavesLike.Win32.Autorun.vm", "Trojan.Heur.VB.EDB7EC", "Trojan.Win32.Scar.bwre", "Worm:Win32/Sowndegg.B", "Trojan/Win32.VB.C16539", "Trojan.Scar", "Trj/CI.A", "Win32/VB.SNU", "Win32.Trojan.Scar.Pgcp", "Trojan.Scar!yxP8tXFqxTQ", "Trojan-Downloader.Win32.VB", "W32/VB.SNU!tr", "Win32/Trojan.1c6" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "objective", "of", "this", "blog", "is", "to", "highlight", "some", "of", "the", "capabilities", "of", "this", "new", "RAT", "family", "and", "the", "impact", "seen", "so", "far." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16 ]
[ "The", "leaked", "RCSAndroid", "code", "is", "a", "commercial", "weapon", "now", "in", "the", "wild", "." ]
[ 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Since", "mid-2014,", "the", "Kudelski", "Security", "Cyber", "Fusion", "Center", "has", "been", "monitoring", "and", "investigating", "Sphinx", "Moth." ]
[ 16, 0, 16, 4, 12, 12, 12, 12, 16, 16, 16, 16, 16, 6, 14 ]
[ "But", "Android.Oldboot", "malware", "is", "a", "bit", "more", "dangerous", "because", "even", "if", "you", "remove", "all", "working", "components", "of", "it", "from", "your", "android", "successfully", ",", "the", "component", "imei_chk", "will", "persist", "in", "a", "protected", "boot", "memory", "area", "and", "hence", "will", "reinstall", "itself", "on", "next", "boot", "and", "continuously", "infect", "the", "Smartphone", "." ]
[ 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Espionage", "and", "Asymmetric", "Operation", "Targeting" ]
[ 6, 16, 6, 14, 14 ]
[ "SWC", "campaign", "impacted", "global", "aerospace,", "government,", "and", "technology", "organizations", "Uses", ".via", "extension" ]
[ 6, 14, 16, 4, 12, 12, 16, 4, 12, 16, 1, 9 ]
[ "There", "are", "a", "lot", "of", "small", "Trojans", "for", "Android", "capable", "of", "leveraging", "access", "privileges", ",", "in", "other", "words", "—", "gaining", "root", "access", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.HfsAutoB.17AD", "Trojan/W32.KRDDoS.950784", "TROJ_DIDKR.A", "Win32.Trojan.WisdomEyes.16070401.9500.9770", "Downloader.Castov", "TROJ_DIDKR.A", "Trojan.DownLoader9.34810", "trojan.win32.miuref.c", "BehavesLike.Win32.Miuref.dc", "Trojan.Spy", "TR/Spy.950784.12", "W32/KRDNSDDoS.A!tr", "TrojanDownloader:Win32/Simkor.A", "Win-Trojan/Ddkr.950784", "Trj/CI.A", "Win32.Trojan.Spy.Hrpb" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "second", "method", "uses", "intents", ",", "broadcasts", ",", "and", "receivers", "to", "execute", "HenBox", "code", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "Trojan", "named", "Linux.PNScan.1", "can", "infect", "devices", "with", "ARM,", "MIPS,", "or", "PowerPC", "architectures." ]
[ 16, 3, 16, 1, 16, 16, 15, 16, 5, 13, 16, 5, 13 ]
[ "We", "have", "investigated", "the", "malware", "to", "identify", "how", "it", "spreads,", "the", "techniques", "it", "uses", "and", "its", "impact." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Currently", "Running", "Applications", "Banking", "Trojans", "that", "rely", "on", "the", "overlay", "mechanism", "to", "steal", "information", "need", "to", "know", "what", "application", "is", "in", "the", "foreground", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.Win32.R2D2!O", "Backdoor.R2d2", "Backdoor.R2D2", "BKDR_R2D2.SMR", "Backdoor.Win32.R2D2.a", "Trojan.Win32.R2D2.esyktw", "Backdoor.Win32.R2D2.360448[UPX]", "Backdoor.W32.R2D2!c", "Backdoor.Win32.R2D2.~B1", "BackDoor.RTwoDTwo.1", "BKDR_R2D2.SMR", "BehavesLike.Win32.Fake.cc", "Backdoor.Win32.R2D2", "Backdoor/R2D2.b", "TR/GruenFink.1", "Backdoor.Win32.R2D2.a", "Backdoor:Win32/R2d2.A", "Trj/Bundestrojaner.A", "Win32/R2D2.A", "Win32.Backdoor.R2d2.Sudy", "Backdoor.R2D2!w/vENfl9bd8", "W32/R2D2.A!tr.bdr", "Win32/Trojan.fd5" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "name", "Carbanak", "comes", "from", "Carberp,", "a", "banking", "Trojan", "whose", "source", "code", "was", "leaked,", "and", "Anunak,", "a", "custom", "Trojan", "that", "has", "evolved", "over", "the", "years." ]
[ 16, 16, 3, 16, 16, 3, 16, 3, 11, 16, 3, 11, 16, 16, 16, 3, 16, 3, 11, 16, 16, 16, 16, 16, 0 ]
[ "A", "backdoor", "also", "known", "as:", "W32.OverlayUPXDPM.PE", "W32.Lamer.FG8", "PE_SILLY.T", "Win32.Virus.Lamer.f", "W32/SillyP2P.BO", "W32.SillyP2P", "Win32/Xolxo.A", "PE_SILLY.T", "Win.Worm.Delf-13898", "Virus.Win32.Lamer.fg", "Trojan.Win32.Delf.oxkq", "Win32.BagarBubba.A", "W32.W.AutoRun.kYNN", "TrojWare.Win32.Pincav.AV", "Win32.HLLP.Bagar", "Worm.Delf.Win32.340", "BehavesLike.Win32.Fesber.tm", "W32/Delf.aj", "W32/P2P_Worm.WULF-7526", "Worm/Delf.vm", "Worm:Win32/Xolxo.A", "Virus.Win32.Lamer.fg", "W32/HLLP.11042", "Worm.Delf", "Win32/Delf.NAY", "Virus.Win32.Lamer.fg", "Worm.SillyP2P!Dqe8+ZFutPA", "P2P-Worm.Win32.Delf.aj", "Virus.Win32.Viking.LG" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Downloader.Shutit.A", "Trojandownloader.Shutit", "Trojan.Downloader.Shutit.A", "Downloader.Shutit.Win32.4", "Troj.Downloader.W32.Shutit.10!c", "Trojan/Downloader.Shutit.10", "Trojan.Downloader.Shutit.A", "Win32.Trojan.WisdomEyes.16070401.9500.9998", "W32/Risk.EKPI-0804", "Win32/DlShut.A", "TROJ_SHUTIT.10.A", "Win.Trojan.Revell-1", "Trojan.Downloader.Shutit.A", "Trojan-Downloader.Win32.Shutit.10", "Trojan.Downloader.Shutit.A", "Trojan.Win32.Shutit.vmoy", "Trojan.Downloader.Shutit.A", "Trojan.Aphex.10", "TROJ_SHUTIT.10.A", "BehavesLike.Win32.Downloader.zt", "Trojan-Downloader.Win32.Aphex", "TrojanDownloader.Shutit.10", "TR/Shutit.10.A", "Trojan[Downloader]/Win32.Shutit", "Win32.Troj.Downloader.b.kcloud", "TrojanDownloader:Win32/Shutit.1_0", "Trojan-Downloader.Win32.Shutit.10", "TrojanDownloader.Shutit", "Trj/Dwn.Shutit.10", "Win32/TrojanDownloader.Shutit.10", "Win32.Trojan-downloader.Shutit.Ahxq", "Trojan.DL.Small!IxJNSrLVynM" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "However,", "Bookworm", "expands", "on", "its", "capabilities", "through", "its", "ability", "to", "load", "additional", "modules", "directly", "from", "its", "command", "and", "control", "C2", "server." ]
[ 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 9, 9, 9 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.FakeMS", "Trojan.Win32.XPACK.bdmoql", "WS.Reputation.1", "W32/Swisyn.CB", "Packed.Win32.Cryptcf.A", "Trojan.DownLoader7.26386", "Packed.Multi.dlw", "Win32.Hack.Packed.f.kcloud", "Backdoor:Win32/Racdr.A", "BScope.Trojan.SvcHorse.01643", "Backdoor.Win32.BlackHole", "W32/Multi.E!tr", "Trj/CI.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "As", "we", "’", "ve", "mentioned", "earlier", ",", "Triada", "is", "downloaded", "by", "smaller", "Trojans", "that", "have", "leveraged", "the", "access", "privileges", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "JS:Trojan.JS.Likejack.A", "JS.Faceliker.NC", "JS/Faceliker.a", "JS/Faceliker.A!Eldorado", "JS:Trojan.JS.Likejack.A", "JS:Trojan.JS.Likejack.A", "TrojWare.JS.TrojanClicker.FbLiker.A", "JS:Trojan.JS.Likejack.A", "JS/Faceliker.a", "JS/Faceliker.A!Eldorado", "JS/FBJack.I!tr", "JS:Trojan.JS.Likejack.A", "TrojanClicker:JS/Faceliker.S", "Trojan-Clicker.JS.Faceliker", "Script.Trojan.JSClicker.A", "trojan.js.likejack.a" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "report", "details", "how", "many", "seemingly", "unrelated", "cyber", "attacks", "may,", "in", "fact,", "be", "part", "of", "a", "broader", "offensive", "fueled", "by", "a", "shared", "development", "and", "logistics", "infrastructure", "—", "a", "finding", "that", "suggests", "some", "targets", "are", "facing", "a", "more", "organized", "menace", "than", "they", "realize." ]
[ 16, 16, 16, 16, 16, 16, 16, 1, 9, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 12, 16, 5, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9997", "HT_GM_GL290013.UVPM", "Trojan.Heur.Win32.10174", "HT_GM_GL290013.UVPM", "BehavesLike.Win32.Trojan.vh", "Trojan.Heur.GM.D5FC4D76", "Trojan/Win32.Buzus.R1005", "Trojan.Win32.Tiggre" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "We", "refer", "to", "these", "attacks", "as", "MuddyWater", "due", "to", "the", "confusion", "in", "attributing", "these", "attacks." ]
[ 16, 16, 16, 16, 1, 16, 6, 16, 16, 16, 16, 16, 16, 16, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.Bot", "Packed.Win32.Klone.bn", "TrojWare.Win32.VB.oks", "Win32.Hack.Klone.bn.kcloud", "Backdoor:Win32/Blohi.B", "Packed/Win32.Klone", "Backdoor.Win32.Blohi", "W32/VB.QIK!tr", "Trj/CI.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Unit", "42", "has", "collected", "multiple", "spear", "phishing", "emails,", "weaponized", "document", "files,", "and", "payloads", "all", "targeting", "various", "offices", "of", "the", "Mongolian", "government", "and", "deployed", "between", "August", "2015", "and", "February", "2016." ]
[ 4, 12, 16, 16, 16, 6, 14, 1, 9, 9, 9, 9, 9, 16, 16, 16, 4, 12, 12, 12, 12, 16, 16, 16, 0, 8, 16, 0, 8 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.Miancha.r5", "Trojan.PR.Preshin!uX45uZVdtBM", "Backdoor.Readomesa", "Backdoor.Win32.Miancha.f", "Trojan.Win32.Miancha.dfftbq", "Trojan.Starter.3690", "Backdoor.Miancha.Win32.5", "Backdoor/Miancha.c", "TR/Cudofows.A.1", "W32/Miancha.F!tr.bdr", "Trojan[Backdoor]/Win32.Miancha", "Trojan.Inject.28", "Trojan:Win32/Cudofows.A", "Backdoor.Miancha", "Trj/CI.A", "Backdoor.Win32.Miancha", "Proxy.BEPF", "Win32/Trojan.b2e" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Recently,", "we", "came", "across", "an", "email", "exploit", "attempt,", "aimed", "at", "a", "European", "Point", "of", "Sales", "POS", "vendor." ]
[ 16, 16, 16, 16, 16, 3, 11, 16, 16, 16, 16, 5, 13, 13, 13, 13, 13 ]
[ "The", "Bergard", "Trojan", "and", "the", "C0d0so", "group", "that", "made", "it", "famous", "with", "the", "November", "2014", "watering", "hole", "attack", "via", "Forbes.com", "have", "received", "renewed", "attention", "recently,", "with", "other", "researchers", "potentially", "linking", "emerging", "tools", "and", "recent", "attacks", "to", "the", "group." ]
[ 3, 11, 11, 16, 6, 14, 14, 15, 16, 16, 16, 16, 16, 0, 8, 1, 9, 9, 16, 1, 16, 16, 16, 16, 16, 16, 16, 4, 16, 16, 16, 3, 16, 16, 1, 16, 6, 14 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan-PWS/W32.Mist.111104", "Troj.PSW32.W.Mist.a!c", "Win32.Trojan.WisdomEyes.16070401.9500.9977", "Trojan-PSW.Win32.Mist.a", "Trojan.Win32.Mist.dboecq", "Trojan.DownLoad3.33938", "Trojan-PSW.Win32.Mist", "W32.Malware.Heur", "PWS:Win32/Steam.J", "Trojan-PSW.Win32.Mist.a", "TrojanPSW.Mist", "Win32.Trojan-qqpass.Qqrob.Ajli", "Trojan.PWS.Mist!", "W32/Mist.A!tr.pws", "Win32/Trojan.PSW.db7" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Recently,", "Palo", "Alto", "Networks", "Unit", "42", "reported", "on", "a", "new", "exploitation", "platform", "that", "we", "called", "DealersChoice", "in", "use", "by", "the", "Sofacy", "group", "AKA", "APT28,", "Fancy", "Bear,", "STRONTIUM,", "Pawn", "Storm,", "Sednit." ]
[ 16, 4, 12, 12, 12, 12, 16, 16, 16, 16, 7, 15, 15, 16, 16, 6, 16, 16, 16, 16, 6, 14, 16, 6, 14, 14, 14, 14, 14, 14 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Collti", "Adware.ShandaAdd!DlXR6+5TT0o", "WS.Reputation.1", "TR/Collti.A.24", "Heuristic.BehavesLike.Win32.ModifiedUPX.C", "Trojan:Win32/Collti.A", "Trojan.Win32.Collti", "Trj/CI.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "This", "process", "is", "defined", "in", "the", "app", "’", "s", "AndroidManifest.xml", "config", "file", ",", "as", "shown", "in", "the", "following", "snippet", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "dropper", "automatically", "decrypts", "and", "installs", "its", "core", "malware", "APK", "which", "later", "conducts", "malicious", "patching", "and", "app", "updates", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "TrendMicro", "recently", "came", "across", "a", "variant", "of", "the", "BIFROSE", "malware", "that", "has", "been", "rewritten", "for", "UNIX", "and", "UNIX-like", "systems." ]
[ 4, 16, 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 5, 16, 5, 13 ]
[ "The", "code", "is", "not", "only", "obfuscated", "but", "also", "packed", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Banker/W32.Banbra.186368", "Trojan/ProxyChanger.g", "Win32.Trojan.WisdomEyes.16070401.9500.9844", "Trojan-Banker.Win32.Banbra.tnul", "Win32.Trojan-banker.Banbra.Wtxw", "Trojan-Downloader.Win32.Murlo", "W32/Trojan.IUVC-7922", "TR/StealthProxy.B.11", "Trojan[Downloader]/Win32.Banload", "Win32.Troj.Undef.kcloud", "Trojan-Banker.Win32.Banbra.tnul", "Trojan:Win32/StealthProxy.B", "Trojan/Win32.Scar.R17882", "Trojan.ProxyChanger!31A84p0+A4o", "W32/ProxyChanger.NM!tr", "Trj/CI.A", "Win32/Trojan.Proxy.d23" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "We", "collect", "all", "data", "about", "your", "friends", "and", "family", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.Win32.Aebot!O", "Backdoor.GTbot.Win32.124", "Trojan/Aebot.k", "Win32.Backdoor.Aebot.f", "Win.Trojan.Sdbot-2505", "Backdoor.Aebot", "Backdoor.Win32.GTbot.c", "Trojan.Win32.GTbot.craqxn", "TrojWare.Win32.Aebot.EF", "BackDoor.IRC.Sdbot.based", "BehavesLike.Win32.Ipamor.gz", "Backdoor/GTbot.bj", "Backdoor.Win32.GTbot.c", "Win32/Aebot.K", "Backdoor.Aebot!dwOGgEtXe1I", "Backdoor.Win32.Aebot.K", "W32/Aebot.K!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Derkziel", "info", "stealer", "Steam,", "Opera,", "Yandex,", "..." ]
[ 3, 16, 11, 5, 13, 13, 16 ]
[ "What", "are", "Google", "authorization", "tokens", "?", "A", "Google", "authorization", "token", "is", "a", "way", "to", "access", "the", "Google", "account", "and", "the", "related", "services", "of", "a", "user", "." ]
[ 16, 16, 4, 16, 16, 16, 16, 4, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Mdropper", "TROJ_ARTIEF.CR", "Exploit.MSWord.CVE-2010-3333.ci", "Exploit.Rtf.CVE-2010-3333.hzts", "Exploit.Rtf.based", "TROJ_ARTIEF.CR", "TrojanDropper.RTF.b", "NORMAL:Hack.Exploit.Script.CVE-2010-3333.a!1609827", "Data/CVE20103333.A!exploit", "Luhe.Exploit.RTF.CVE-2010-3333.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "With", "the", "capability", "to", "open", "a", "given", "URL", "in", "a", "browser", ",", "the", "actor", "behind", "‘", "SimBad", "’", "can", "generate", "phishing", "pages", "for", "multiple", "platforms", "and", "open", "them", "in", "a", "browser", ",", "thus", "performing", "spear-phishing", "attacks", "on", "the", "user", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "In", "December", "2015,", "several", "researchers", "reported", "that", "websites", "hosting", "the", "Rig", "Exploit", "Kit", "were", "serving", "an", "updated", "version", "of", "Qbot.3", "4", "5", "Then", "in", "January", "2016,", "over", "500", "devices", "at", "a", "large", "public", "organisation", "wereinfected", "with", "Qbot." ]
[ 16, 0, 8, 16, 4, 16, 16, 1, 9, 3, 11, 11, 11, 16, 16, 16, 16, 16, 16, 3, 11, 11, 16, 16, 0, 8, 16, 16, 5, 16, 16, 4, 12, 12, 16, 16, 3 ]
[ "Monitoring", "efforts", "on", "this", "new", "variant", "revealed", "that", "the", "malicious", "websites", "are", "spread", "through", "smishing", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.SpamlesEI1.Trojan", "Rootkit.KillAv.B", "Trojan/W32.Rootkit.3712.K", "Trojan.Kapa.A", "Rootkit.W32.Small.to6t", "Trojan/AutoRun.AntiAV.r", "Rootkit.KillAv.B", "RTKT_SMALL.SMB", "Hacktool.Rootkit", "Win32/SillyAutorun.DCA", "RTKT_SMALL.SMB", "Rootkit.KillAv.B", "Rootkit.Win32.Small.sfn", "Rootkit.KillAv.B", "Trojan.Win32.NtRootKit.chvyyx", "Rootkit.KillAv.B", "TrojWare.Win32.Rootkit.Small.AA", "Trojan.NtRootKit.10455", "Trojan:Winnt/Kapa.A", "Trojan:WinNT/Kapa.A", "Rootkit.Win32.Small.sfn", "Backdoor/Win32.Rootkit.R1193", "Rootkit.KillAv.B", "Trojan.Win32.KillAV.af", "Worm.Orbina!Ypp8YqYGicY", "Trojan.WinNT.Kapa", "RootKit.Win32.KillAV.B" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.eHeur.Malware03", "Trojanspy.Banker.16710", "Win32/Tnega.EcVXcGD", "Trojan.Win32.Small.csf", "Troj.W32.Small.mfSA", "Trojan.Starter.3499", "Trojan.Small.Win32.24377", "Trojan/Small.paq", "TR/Rogue.30781", "Trojan/Win32.Small", "Trojan:Win32/Meicater.A!bit", "Trojan.Strictor.D240AB", "Trojan.Win32.Small.csf", "Trojan.Small", "Trojan.Small!+nCz0Wnah68", "Trojan.Win32.Small" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Win32.Mahato!O", "Backdoor.Bifrose.F8", "Trojan/Mahato.caj", "Win32.Trojan.WisdomEyes.16070401.9500.9964", "TROJ_CALYPS.SMUJ", "Win.Trojan.Mahato-1", "Trojan.Win32.Mahato.caj", "Trojan.Win32.Mahato.ijlmo", "Trojan.Win32.Scar.118272[UPX]", "TrojWare.Win32.Mahato.A", "BehavesLike.Win32.Sytro.cc", "Trojan/Mahato.ob", "W32.Backdoor.Apocalypse", "Trojan/Win32.Mahato", "Win32.Troj.Scar.15.kcloud", "Trojan.Zusy.DAAC", "W32.W.AutoRun.lkXC", "Trojan.Win32.Mahato.caj", "Trojan:Win32/Lypsacop.A", "Trojan/Win32.Mahato.R2854", "Backdoor.Bifrose", "Virus.Win32.Delf", "Trojan.Mahato" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.eHeur.Malware10", "Trojan.Mauvaise.SL1", "TROJ_NITOL.SMD", "Win32.Trojan.WisdomEyes.16070401.9500.9997", "W32/Trojan2.PAML", "TROJ_NITOL.SMD", "Win32.Trojan-DDoS.Yoddos.A", "Trojan-Dropper.Win32.Dinwod.wkn", "Trojan.Win32.Staser.demkhd", "Troj.Dropper.W32.Dinwod.toj0", "TrojWare.Win32.Nitol.KA", "DDoS.Attack.384", "Trojan.Staser.Win32.2253", "BehavesLike.Win32.Downloader.nm", "Trojan.Win32.Yoddos", "W32/Trojan.QEFN-2077", "Trojan/Staser.le", "TR/Dropper.cgytn", "Trojan-Dropper.Win32.Dinwod.wkn", "Trojan:Win32/Wepiall.A", "Backdoor/Win32.Farfli.R119148", "Trojan.Staser", "Trj/CI.A", "Win32/Yoddos.BW", "Trojan.Win32.Staser.anbya", "W32/Yoddos.BW!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "For", "testing", "purposes", "we", "inserted", "a", "fake", "contacts", "list", "to", "our", "Android", "Emulator", "and", "observed", "resultant", "behavior", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "VB:Trojan.Valyria.1167", "O97M.Downloader.4967", "VB:Trojan.Valyria.1167", "VB:Trojan.Valyria.1167", "Trojan.Ole2.Vbs-heuristic.druvzi", "VB:Trojan.Valyria.1167", "VB:Trojan.Valyria.1167", "HEUR.VBA.Trojan.e", "W97M.Downloader.GOX", "virus.office.qexvmc.1085" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "targetting", "Linux", "also", "known", "as:", "Backdoor.Linux.Tsunami.A", "Linux.Backdoor.Kaiten", "ELF_KAITEN.SM", "HEUR:Backdoor.Linux.Tsunami.bh", "Trojan.Tsunami.exnldy", "Backdoor.Linux.Tsunami!c", "Linux.BackDoor.Tsunami.761", "ELF_KAITEN.SM", "ELF/Backdoor.EWHJ-", "Backdoor.Linux.aego", "LINUX/Tsunami.bkdwv", "Trojan[Backdoor]/Linux.Tsunami.bh", "Trojan.Backdoor.Linux.Tsunami.1", "HEUR:Backdoor.Linux.Tsunami.bh", "Backdoor.Linux.Tsunami.b", "Trojan.Linux.Tsunami", "ELF/Tsunami.NBV!tr", "Win32/Trojan.fba" ]
[ 16, 3, 16, 11, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "This", "sample", "is", "similar", "to", "those", "presented", "in", "other", "recent", "Marcher", "analyses", "[", "1", "]", "[", "2", "]", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Recently", "we", "detected", "a", "more", "sophisticated", "technique", "that", "a", "handful", "of", "countries", "across", "Asia", "are", "actively", "using", "to", "infect", "systems", "with", "RATs.", "This", "new", "technique", "ensures", "that", "the", "payload/file", "remains", "in", "memory", "through", "its", "execution,", "never", "touching", "the", "disk", "in", "a", "de-encrypted", "state." ]
[ 16, 16, 16, 16, 16, 1, 9, 15, 16, 16, 16, 2, 16, 2, 16, 16, 16, 16, 5, 13, 16, 3, 16, 16, 16, 16, 16, 16, 3, 16, 16, 7, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Win32.Cossta!O", "Trojan.Cossta", "Trojan.Win32.Cossta.vjk", "Trojan.Win32.Drop.dxlfgu", "Trojan.Win32.Cossta.49152", "Trojan.KillFiles.18641", "Trojan/Cossta.ett", "Trojan/Win32.Cossta", "Worm:Win32/Vobirue.A", "W32.W.AutoRun.l6mI", "Trojan.Win32.Cossta.vjk", "HEUR/Fakon.mwf", "Win32/VB.OPD" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "With", "this", "latest", "report,", "we", "have", "now", "identified", "at", "least", "21", "cases", "in", "Mexico", "of", "abusive,", "improper", "targeting", "with", "NSO", "Group's", "Pegasus", "spyware" ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 2, 16, 16, 16, 16, 16, 6, 14, 3, 11 ]
[ "However", ",", "many", "users", "are", "in", "no", "hurry", "to", "update", "the", "operating", "systems", "of", "their", "products", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.FakeAlert.TK", "Rootkit.Win32.Clbd!O", "Trojan/Clbd.dt", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Trojan.FakeAlert.TK", "Trojan.FakeAlert.TK", "Trojan.Win32.Clbd.oyzd", "Trojan.Win32.Z.Clbd.68100", "Trojan.FakeAlert.TK", "Trojan.FakeAlert.TK", "Rootkit.Clbd.Win32.6", "BehavesLike.Win32.VirRansom.kc", "Trojan.Win32.Waledac", "Rootkit.Clbd.av", "Trojan.FakeAlert.TK", "TrojanDropper:Win32/Pasich.A", "Trojan/Win32.Bredlab.R17", "Trojan.FakeAlert.TK", "MalwareScope.Worm.Nuwar-Glowa.1", "Rootkit.Clbd!+/k5iv7h7q8", "Win32/Trojan.df3" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Veil.5", "W32/Trojan.UYPJ-5875", "Ruby/Rozena.H", "Trojan.Win32.Ruby.emhncx", "Trojan.SkypeSpam.11018", "TR/AD.Rozena.uidpc", "Trojan.Win32.Z.Veil.654486.A", "Trojan.SkypeSpam!", "Trojan.Ruby.Rozena", "Win32/Trojan.34d" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Apart", "from", "infecting", "systems", "with", "it,", "we", "also", "spotted", "instances", "where", "common", "lateral", "movement", "tools", "were", "detected", "around", "the", "same", "time", "they", "were", "actively", "compromising", "the", "endpoint", "with", "MajikPOS." ]
[ 16, 16, 5, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3 ]
[ "The", "malicious", "code", "only", "makes", "for", "a", "small", "part", "of", "the", "app,", "making", "it", "difficult", "to", "detect." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Starting", "content", "observers", "and", "the", "main", "task", "loop", "to", "receive", "remote", "commands", "and", "exfiltrate", "data", "The", "app", "uses", "six", "techniques", "to", "collect", "user", "data", ":", "Repeated", "commands", ":", "use", "alarms", "to", "periodically", "repeat", "actions", "on", "the", "device", "to", "expose", "data", ",", "including", "gathering", "location", "data", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Android.Trojan.FakeInst.BD", "Android.Opfake.E", "Android.Trojan.FakeInst.BD", "AndroidOS/Opfake.AR", "ANDROIDOS_SMSUPDATE.C", "Andr.Trojan.Opfake-4", "Android.Trojan.FakeInst.BD", "HEUR:Trojan-SMS.AndroidOS.Opfake.a", "A.H.Pay.ApuAte", "Trojan.Android.Opfake.emekxt", "Trojan:Android/Fakeinst.CG", "Android.SmsSend.2293", "ANDROIDOS_SMSUPDATE.C", "AndroidOS/Opfake.AR", "Trojan/AndroidOS.r", "Trojan[SMS]/Android.Opfake", "Android.Troj.Opfake.b.kcloud", "Android.Trojan.FakeInst.BD", "HEUR:Trojan-SMS.AndroidOS.Opfake.a", "Android-Trojan/FakeInst.1b13", "Trojan.AndroidOS.Opfake.A", "Trojan.Android.FakeInstall.p", "Trojan-SMS.AndroidOS.Opfake" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "They", "only", "compromise", "specific", "high-value", "targets", "and", "once", "inside", "the", "company", "networks,", "move", "laterally", "to", "hosts", "that", "can", "be", "monetized." ]
[ 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 5, 13, 16, 16, 16, 5, 16, 16, 16, 16 ]
[ "Moreover", ",", "there", "are", "many", "toolkits", "like", "the", "SpyNote", "Trojan", "builder", "that", "enable", "users", "to", "build", "malware", "with", "ease", "and", "few", "clicks", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Our", "analysis", "indicates", "that", "this", "trojan", "is", "in", "its", "testing", "stage", "but", "given", "its", "potential", ",", "every", "mobile", "user", "should", "be", "aware", "of", "GPlayed", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16 ]
[ "We've", "recently", "discussed", "Corebot", "malware", "and", "its", "possible", "ties", "to", "btcshop.cc,", "a", "site", "selling", "stolen", "data." ]
[ 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 1, 16, 1, 16, 16, 16 ]
[ "We", "are", "continuing", "to", "watch", "it", "closely", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "Makop", "ransomware", "gang", "is", "still", "using", "the", "same", "tools", "used", "in", "their", "first", "operations", "in", "2020,", "according", "to", "a", "recent", "investigation", "by", "Lifars", "security", "team,", "which", "has", "identified", "four", "of", "the", "gang's", "tools." ]
[ 6, 14, 14, 14, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 6, 16, 0, 16, 16, 16, 16, 16, 16, 4, 12, 12, 16, 16, 16, 16, 16, 4, 12, 3 ]
[ "]", "comuseraccount", "[", "." ]
[ 16, 16, 16, 16 ]
[ "This", "mobile", "malware", "masquerades", "as", "legitimate", ",", "trusted", "postal", "service", "applications", "so", "that", "it", "can", "gain", "the", "users", "trust", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "If", "the", "value", "of", "this", "field", "failed", "to", "arrive", "from", "the", "C", "&", "C", ",", "it", "was", "selected", "from", "the", "file", "data.db", "using", "a", "pseudo-random", "algorithm", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16 ]
[ "It", "listens", "to", "events", "like", "TYPE_VIEW_TEXT_CHANGED", "." ]
[ 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9531", "Win.Trojan.AutoIT-6333854-0", "AutoIt/injector.E", "AutoIt/injector.E", "Win32/Injector.Autoit.DFJ", "Trojan.Win32.Injector" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1 ]
[ "Port", "6209", ":", "Telegram", "extraction", "service", "." ]
[ 1, 9, 16, 5, 16, 16, 16 ]
[ "However", ",", "due", "to", "the", "absence", "of", "certification", "centers", "verifying", "the", "digital", "signatures", "of", "Android", "programs", ",", "nothing", "prevents", "criminals", "from", "adding", "their", "own", "signature", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "This", "file", "contained", "embedded", "macro", "code", "that", "executed", "a", "commonly", "observed", "PowerShell", "command", "to", "download", "and", "execute", "a", "file." ]
[ 16, 16, 16, 3, 11, 11, 16, 16, 16, 16, 16, 5, 13, 16, 16, 16, 16, 16, 1 ]
[ "MONSOON", "is", "the", "name", "given", "to", "the", "Forcepoint", "Security", "Labs" ]
[ 4, 16, 16, 16, 16, 16, 4, 12, 12, 12 ]
[ "In", "some", "cases", ",", "malicious", "components", "are", "dynamically", "downloaded", "onto", "a", "device", "after", "an", "infected", "app", "is", "installed", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Myanmar", "is", "a", "country", "currently", "engaged", "in", "an", "important", "political", "process." ]
[ 2, 16, 16, 2, 16, 16, 16, 16, 16, 16, 16 ]
[ "]", "today", "admin", "[", ".databit", "[", ".today", "cendata", "[", "." ]
[ 9, 9, 1, 9, 9, 9, 9, 1, 9, 9 ]
[ "The", "attackers", "involved", "in", "these", "email", "campaigns", "leveraged", "a", "variety", "of", "distribution", "mechanisms", "to", "deliver", "the", "information", "stealing", "FormBook", "malware,", "including:" ]
[ 6, 14, 16, 16, 16, 6, 14, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 16 ]
[ "CryptoWall", "is", "a", "type", "of", "malware", "known", "as", "ransomware,", "which", "encrypts", "a", "victim's", "files", "and", "subsequently", "demands", "payment", "in", "exchange", "for", "the", "decryption", "key." ]
[ 3, 16, 16, 16, 16, 3, 16, 16, 3, 16, 1, 16, 1, 9, 16, 16, 1, 9, 16, 1, 9, 9, 9, 9 ]
[ "A", "backdoor", "also", "known", "as:", "Exploit.Win32.MS04-028!O", "Trojan.Diztakun", "W32.W.Ridnu.ls5O", "Trojan/Exploit.MS04-028.g", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Win32/HideinPic.A", "Win.Trojan.Ag-1", "Trojan.Win32.Diztakun.xnd", "Exploit.Win32.MS04028.lhyh", "Trojan.MulDrop3.32325", "Exploit.MS04.Win32.105", "BehavesLike.Win32.Vilsel.qc", "Trojan-Banker.Win32.Bancos", "Exploit.MS04-028.h", "Trojan[Exploit]/Win32.MS04-028", "Trojan:Win32/Greener.A", "Trojan.Win32.Diztakun.xnd", "Trojan/Win32.Xema.C6210", "Exploit.MS04028", "Trojan.Heur.dmHfrf5Ccil", "Win32/Greener.A", "Win32.Virus.Greener.Pdct", "Worm.Kilada.A", "W32/Greener.A!tr", "Win32/Trojan.cae" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "In", "fact,", "this", "concept", "is", "nothing", "novel", "–", "we", "already", "saw", "many", "ransomware", "families", "that", "can", "do", "the", "same." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "This", "malware", "has", "the", "capability", "to", "overwrite", "a", "victim", "host's", "master", "boot", "record", "MBR", "and", "all", "data", "files." ]
[ 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Barys.DD90F", "Trojan:Win32/Rozena.D!bit", "Trojan.PowerShell.Rozena" ]
[ 16, 3, 16, 16, 16, 1, 1, 1 ]
[ "Pro", "PoS", "is", "simple-to-use", "PoS", "malware", "that", "is", "available", "for", "purchase,", "enabling", "multiple", "threat", "actors", "to", "easily", "take", "advantage", "of", "this", "malware", "to", "target", "businesses." ]
[ 3, 11, 16, 16, 3, 11, 16, 16, 16, 11, 16, 16, 6, 14, 14, 16, 16, 16, 16, 16, 16, 3, 16, 4, 12 ]
[ "Lookout", "has", "determined", "ViperRAT", "is", "a", "very", "sophisticated", "threat", "that", "adds", "to", "the", "mounting", "evidence", "that", "targeted", "mobile", "attacks", "against", "governments", "and", "business", "is", "a", "real", "problem", "." ]
[ 4, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "HenBox", "is", "not", "running", "as", "a", "system", "app", ")", ",", "another", "ELF", "library", "is", "loaded", "to", "aid", "with", "executing", "super-user", "commands", "." ]
[ 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "For", "many", "years,", "one", "of", "the", "go-to", "families", "of", "malware", "used", "by", "both", "less-skilled", "and", "advanced", "actors", "has", "been", "the", "Poison", "Ivy", "aka", "PIVY", "RAT." ]
[ 16, 0, 8, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 6, 16, 6, 14, 16, 16, 16, 3, 11, 16, 3, 11 ]
[ "Content", "observers", ":", "use", "Android", "'s", "ContentObserver", "framework", "to", "gather", "changes", "in", "SMS", ",", "Calendar", ",", "Contacts", ",", "Cell", "info", ",", "Email", ",", "WhatsApp", ",", "Facebook", ",", "Twitter", ",", "Kakao", ",", "Viber", ",", "and", "Skype", "." ]
[ 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 5, 16, 5, 16, 5, 16, 5, 13, 16, 5, 16, 5, 16, 5, 16, 5, 16, 5, 16, 5, 16, 16, 5, 16 ]
[ "Following", "discovery,", "we", "alerted", "our", "customers", "and", "began", "working", "with", "Microsoft", "through", "the", "responsible", "disclosure", "process." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "On", "July", "8,", "2015,", "Unit", "42", "used", "the", "AutoFocus", "Threat", "Intelligence", "service", "to", "locate", "and", "investigate", "activity", "consistent", "with", "a", "spear-phishing", "attack", "targeting", "the", "US", "Government." ]
[ 16, 0, 8, 8, 4, 12, 16, 16, 4, 12, 12, 12, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 16, 16, 4, 12 ]
[ "A", "backdoor", "also", "known", "as:", "Banker/W32.Alreay.639100", "TrojanSpy.Banker.SW4", "Trojan.Banswift", "Win.Trojan.BBSwift-4", "Trojan-Banker.Win32.Alreay.b", "Trojan.Win32.Alreay.eigudw", "Win32.Trojan-banker.Alreay.Edxl", "Trojan.Swifter.1", "Trojan.Banker.Alreay.f", "W32/Alreay.ADAQ!tr", "Troj.Banker.W32!c", "Trojan-Banker.Win32.Alreay.b", "Trojan:Win32/Tokser.A", "Trojan/Win32.Alreay.C1768016", "Spyware.Banker.Alreay", "TrojanBanker.Alreay", "Win32/Spy.Banker.ADAQ", "Trj/GdSda.A", "Win32/Trojan.c8b" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Infostealer.Gampass", "Trojan.DownLoad1.59715", "Trojan-Downloader.Win32.Adload!IK", "Trojan/Win32.Adload", "Trojan-Spy.Win32.Filka.ld", "Trojan-PSW.Gampass", "Trojan-Downloader.Win32.Adload", "Trj/Lineage.BZE" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Cybercriminals", "also", "exploit", "the", "Master", "Key", "vulnerability", "and", "have", "learned", "to", "embed", "unsigned", "executable", "files", "in", "Android", "installation", "packages", "." ]
[ 16, 16, 16, 16, 7, 15, 15, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16 ]