tokens
sequencelengths 2
296
| ner_tags
sequencelengths 2
296
|
---|---|
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Multi",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Backdoor.Trojan",
"Uds.Dangerousobject.Multi!c",
"W32/Trojan.YSQI-3970",
"Trojan.Symmi.D3C9A",
"Backdoor:Win32/Touasper.A",
"Win32.Trojan.Spy.Efvi",
"W32/Injector.AQM!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Razy.D3C7E6",
"Win32.Trojan.WisdomEyes.16070401.9500.9953",
"BehavesLike.Win32.Trojan.jm",
"Trojan:Win32/Ceatrg.A",
"Trojan/Win32.RemoteAdmin.C2229526",
"Trojan.MSIL.Bladabindi",
"Trj/CI.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"attackers",
"compromised",
"the",
"website",
"of",
"the",
"Evangelical",
"Lutheran",
"Church",
"of",
"Hong",
"Kong",
"and",
"modified",
"it",
"to",
"host",
"a",
"malicious",
"iFrame",
"which",
"redirected",
"visitors",
"to",
"another",
"website",
"hosting",
"an",
"exploit",
"of",
"the",
"Internet",
"Explorer",
"Microsoft",
"Internet",
"Explorer",
"Remote",
"Memory",
"Corruption",
"Vulnerability",
"CVE-2015-2502."
] | [
16,
6,
7,
16,
1,
16,
16,
4,
12,
12,
16,
2,
10,
16,
16,
16,
16,
16,
16,
3,
1,
16,
16,
16,
16,
16,
1,
16,
16,
3,
16,
16,
5,
13,
13,
13,
13,
7,
15,
15,
15,
1
] |
[
"This",
"action",
"changes",
"the",
"original",
"file",
"size",
"of",
"the",
"DEX",
"file",
",",
"which",
"makes",
"the",
"malicious",
"resources",
"a",
"part",
"of",
"the",
"DEX",
"file",
",",
"a",
"section",
"that",
"is",
"ignored",
"by",
"the",
"signature",
"validation",
"process",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Detected",
"as",
"TROJ_WERDLOD,",
"this",
"new",
"malware",
"has",
"been",
"causing",
"problems",
"in",
"the",
"country",
"since",
"December",
"2014",
"with",
"more",
"than",
"400",
"confirmed",
"victims."
] | [
16,
16,
1,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
0,
8,
16,
16,
16,
16,
16,
16
] |
[
"In",
"a",
"root",
"broken",
"device",
",",
"security",
"is",
"a",
"fairy",
"tale",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan-Dropper.Win32.Joiner!O",
"Worm.Rebhip.A8",
"Trojan/Dropper.Joiner.k",
"TROJ_MULTIDROP.Q",
"W32/Dropper.ANIA",
"Backdoor.Colfusion",
"Win32/TheJoiner.15x.C",
"TROJ_MULTIDROP.Q",
"Trojan-Dropper.Win32.Joiner.k",
"Trojan.Win32.Joiner.epmz",
"Trojan.Win32.Z.Joiner.417292",
"Backdoor.W32.l8Tn",
"TrojWare.Win32.TrojanDropper.Joiner.K",
"Trojan.MulDrop.32",
"Dropper.Joiner.Win32.430",
"BehavesLike.Win32.Downloader.gc",
"Trojan-Dropper.Win32.Joiner",
"W32/Risk.SFJA-2732",
"TrojanDropper.Win32.Joiner.k",
"Trojan/Win32.Llac.cxsz",
"Trojan-Dropper.Win32.Joiner.k",
"Trojan.Llac",
"Trj/Runner.Joiner.K",
"Win32/TrojanDropper.Joiner.K",
"Win32.Trojan-dropper.Joiner.Lkdg",
"Trojan.DR.Joiner!ZtouwF9CQqA",
"RAT.CyberGate",
"W32/SkyRat.DLE!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Flood.Vb.DN",
"Trojan/W32.Flooder.20992.B",
"Trojan.Flood.Vb.DN",
"Trojan/VB.dn",
"Trojan.Flood.Vb.DN",
"W32/VirTool.GZ",
"Hacktool.Flooder",
"Win32/Flooder.VB.DN",
"Win.Trojan.Nudgema-1",
"IM-Flooder.Win32.VB.dn",
"Trojan.Win32.VB.mdnh",
"Win32.Trojan.Vb.Wrhd",
"Trojan.Flood.Vb.DN",
"TrojWare.Win32.Flooder.VB.DN",
"Trojan.Flood.Vb.DN",
"FDOS.IM.451",
"Tool.VB.Win32.1591",
"BehavesLike.Win32.Trojan.mh",
"W32/Tool.QSEE-8541",
"IM-Flooder.VB.fg",
"TR/Flood.VB.DN.1",
"HackTool[Flooder]/Win32.VB",
"HackTool:Win32/Aflooder.D",
"Trojan.Flood.Vb.DN",
"IM-Flooder.W32.VB.dn!c",
"Trojan.Flood.Vb.DN",
"Trojan/Win32.Xema.N61964869",
"IMFlooder.VB",
"Trojan-PWS.Win32.Executant.d",
"Malware_fam.gw",
"Flooder.LZ",
"Flooder/Nudge.B"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"In",
"mid-October",
"2016,",
"he",
"received",
"an",
"unexpected",
"phone",
"call."
] | [
16,
0,
8,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.MoonLight.Trojan",
"Win32.Emailworm.LW",
"Worm.Lightmoon.MF.213",
"Win32.Emailworm.LW",
"Worm.VB.Win32.314",
"W32/VB.by",
"Win32.Emailworm.LW",
"Win32.Worm.VB.a",
"W32/Worm.CIPA-1476",
"W32.Rontokbro@mm",
"Win32/Lightmoon.D",
"WORM_VB.VV",
"Email-Worm.Win32.VB.by",
"Trojan.Win32.VB.dyztaz",
"I-Worm.Win32.VB.35176",
"W32.W.VBNA.mhOD",
"Worm.Win32.NoonLight.F",
"BehavesLike.Win32.Trojan.nc",
"W32/EmailWorm.LW",
"Worm.VB.gi",
"TR/BAS.Samca.12113913",
"Worm:Win32/Lightmoon.H",
"Win32.Emailworm.LW",
"Email-Worm.Win32.VB.by",
"Win32.Emailworm.LW",
"HEUR/Fakon.mwf",
"Win32.Emailworm.LW",
"W32/Moonlight.B.worm",
"I-Worm.NoonLight.F",
"Win32/NoonLight.F",
"Win32.Worm-email.Vb.Hssm",
"I-Worm.VB.WEI"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"One",
"of",
"those",
"binaries",
"was",
"initially",
"thought",
"to",
"be",
"a",
"new",
"variant",
"of",
"the",
"Padpin",
"ATM",
"malware",
"family."
] | [
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
3,
16,
3,
11,
11,
11,
11
] |
[
"Accessing",
"the",
"β",
"Cmd",
"β",
"folder",
"in",
"the",
"attacker",
"β",
"s",
"email",
"box",
"Moreover",
",",
"it",
"can",
"send",
"a",
"specified",
"file",
"or",
"all",
"the",
"gathered",
"data",
"from",
"the",
"victim",
"device",
"via",
"email",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"First",
",",
"we",
"launched",
"a",
"banking",
"app",
"and",
"entered",
"the",
"credentials",
"there",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"It",
"turns",
"out",
",",
"however",
",",
"that",
"other",
"security",
"researchers",
"noticed",
"suspicious",
"and",
"faulty",
"code",
"on",
"BLU",
"devices",
"as",
"early",
"as",
"March",
"2015",
",",
"and",
"it",
"has",
"taken",
"nearly",
"that",
"long",
"to",
"remove",
"it",
"from",
"the",
"company",
"'s",
"devices",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"Trojan",
"displays",
"a",
"fake",
"HTML",
"update",
"page",
"(",
"update.html",
")",
"that",
"blocks",
"the",
"device",
"β",
"s",
"screen",
"for",
"a",
"long",
"period",
"of",
"time",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"infection",
"chain",
"is",
"slightly",
"more",
"roundabout",
"in",
"the",
"case",
"of",
"Apple",
"devices",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16
] |
[
"The",
"infection",
"has",
"not",
"spread",
"very",
"widely",
"at",
"the",
"time",
"of",
"writing",
",",
"but",
"we",
"β",
"ve",
"seen",
"that",
"many",
"users",
"have",
"already",
"received",
"its",
"SMS",
"content",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"attacks",
"use",
"Domain",
"Name",
"System",
"(",
"DNS",
")",
"cache",
"poisoning/DNS",
"spoofing",
",",
"possibly",
"through",
"infringement",
"techniques",
"such",
"as",
"brute-force",
"or",
"dictionary",
"attacks",
",",
"to",
"distribute",
"and",
"install",
"malicious",
"Android",
"apps",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9786",
"TROJ_ONKODS.SMFF",
"Trojan.DownLoader13.29927",
"TROJ_ONKODS.SMFF",
"TrojanDownloader:Win32/Cerber.A",
"Trojan.Zbot.188",
"Trojan/Win32.Fakeavlock.R144660",
"Trojan-Downloader.Win32.Tiny"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"These",
"solutions",
"are",
"typical",
"in",
"enterprise",
"environments."
] | [
16,
16,
16,
16,
16,
5,
13
] |
[
"Installing",
"apps",
"on",
"the",
"system",
"partition",
"makes",
"it",
"harder",
"for",
"the",
"user",
"to",
"remove",
"the",
"app",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"ransomware",
"is",
"designed",
"to",
"infect",
"Microsoft",
"Windows",
"computers."
] | [
16,
3,
16,
16,
16,
16,
5,
13,
13
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Worm.Delf.NGA",
"Worm.Win32.Delf!O",
"Worm.Delf",
"Win32.Worm.Delf.NGA",
"Win32.Worm.Delf.bd",
"W32/Trojan2.MIZZ",
"W32.Screentief",
"Win32/Screentief.A",
"WORM_AUTORUN.GKP",
"Worm.Win32.Delf.vn",
"Win32.Worm.Delf.NGA",
"Win32.Worm.Delf.clov",
"Win32.Worm.Delf.NGA",
"TrojWare.Win32.PSW.OnLineGames.~LDK",
"Win32.Worm.Delf.NGA",
"Trojan.DownLoader4.55571",
"WORM_AUTORUN.GKP",
"W32/Trojan.DZCT-6244",
"Worm:Win32/Screenthif.A",
"Worm/Win32.Delf",
"Worm:Win32/ScreenThif.A",
"Win32.Worm.Delf.NGA",
"Trojan.Win32.Scar.702464",
"Worm.Win32.Delf.vn",
"Win32.Worm.Delf.NGA",
"HEUR/Fakon.mwf",
"Win32.Delf",
"Win32/Delf.NQC",
"W32/Delf.NQC!worm"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"seller",
",",
"known",
"as",
"\"",
"bestoffer",
",",
"''",
"was",
",",
"at",
"some",
"point",
",",
"expelled",
"from",
"the",
"forum",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.DontovoF.Trojan",
"Trojan.Hacktool.Httptunnel.A",
"Trojan/W32.HackTool.36864.I",
"Trojan.Hacktool.Httptunnel.A",
"Tool.HTTPTunnel.Win32.1",
"Trojan/Hacktool.HTTPTunnel",
"Trojan.Hacktool.Httptunnel.A",
"Trojan.Hacktool.Httptunnel.A",
"W32/Tool.UFFD-0015",
"TROJ_HTTPTUNE.A",
"Trojan.Hacktool.Httptunnel.A",
"HackTool.Win32.HTTPTunnel",
"Riskware.Win32.HTTPTunnel.hskj",
"HackTool.W32.HTTPTunnel!c",
"Trojan.Hacktool.Httptunnel.A",
"Application.Win32.HackTool.HTTPTunnel",
"BehavesLike.Win32.PUP.nz",
"W32/HackTool.EG",
"Hacktool.HttpTunnel",
"W32.Hack.Tool",
"HackTool/Win32.HTTPTunnel",
"HackTool.Win32.HTTPTunnel",
"Win32/HackTool.HTTPTunnel",
"Win32.Hacktool.Httptunnel.Ljul"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"β",
"In",
"the",
"future",
",",
"we",
"can",
"expect",
"that",
"the",
"bad",
"guys",
"will",
"try",
"to",
"make",
"use",
"of",
"Facebook",
"statuses",
"or",
"deploy",
"LinkedIn",
"and",
"other",
"social",
"networks",
"β",
",",
"states",
"ESET",
"β",
"s",
"researcher",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
4,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32/Trojan.KGEI-2537",
"Trojan-Spy.Win32.Alinaos.as",
"Trojan.Win32.Z.Zusy.575488.M",
"BehavesLike.Win32.Trojan.hc",
"Trojan.MSIL.Krypt",
"Trojan.Zusy.D3371D",
"Trojan/Win32.Inject.C1647442",
"Trojan-Spy.Win32.Alinaos.as",
"Trojan:MSIL/Proseus.A!bit",
"Trj/CI.A",
"Msil.Trojan.Dropper.Sxdx",
"Win32/Trojan.Dropper.6f6"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"In",
"a",
"three-month",
"period",
"from",
"August",
"to",
"October",
"2018",
",",
"it",
"launched",
"over",
"70,000",
"attacks",
"against",
"users",
"located",
"primarily",
"in",
"Russia",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"These",
"attacks",
"caused",
"significant",
"financial",
"impact",
"for",
"major",
"cryptocurrency",
"markets,",
"with",
"one",
"cryptocurrency",
"cloud",
"provider",
"losing",
"over",
"$12",
"million",
"in",
"assets,",
"allegedly",
"to",
"ITG03."
] | [
16,
1,
16,
16,
16,
16,
16,
16,
4,
12,
16,
16,
4,
12,
12,
16,
16,
16,
16,
16,
16,
16,
16,
6
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Virus.Win32.Delf!O",
"Worm.Zorin",
"W32.Looked.P",
"Win32/Looked.C",
"PE_LEOX.A",
"Worm.Win32.Zorin.a",
"Trojan.Win32.Zorin.wmfe",
"W32.W.Viking.l3Va",
"Virus.Win32.Zorin.a",
"Win32.HLLW.Looked",
"Virus.Delf.Win32.16",
"PE_LEOX.A",
"BehavesLike.Win32.Backdoor.lh",
"Worm.Win32.Viking",
"W32/Zorin.A",
"Worm/Zorin.a",
"Virus/Win32.Delf.dpee",
"Worm.Logo.f.67072",
"Worm:Win32/Zorin.A",
"Worm.Win32.A.Zorin.67072",
"Worm.Win32.Zorin.a",
"Win32/Zorin.67072",
"Trojan.Delf.62976",
"Win32/Viking.NAI",
"Worm.Zorin.A",
"W32/Zorin.A.worm",
"Win32/Worm.Zorin.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"focus",
"of",
"the",
"Android",
"banking",
"malware",
"in",
"Google",
"Play",
"is",
"different",
"from",
"any",
"other",
"Android",
"malware",
"we",
"have",
"investigated."
] | [
16,
16,
16,
16,
3,
11,
11,
16,
5,
13,
16,
16,
16,
16,
16,
3,
11,
16,
16,
16
] |
[
"EventBot",
"Sending",
"the",
"pin",
"code",
"back",
"to",
"the",
"C2",
"Sending",
"the",
"pin",
"code",
"back",
"to",
"the",
"C2",
"."
] | [
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Actually,",
"this",
"is",
"not",
"the",
"first",
"ransomware",
"to",
"come",
"out",
"of",
"Brazil."
] | [
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
2
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan-PWS/W32.WebGame.12356.C",
"TrojanPSW.OnLineGames.gyv",
"Trojan.DL.Hover!hoKEWysDbsk",
"W32/Packed_Upack.A",
"Trojan.Onlinegames-2021",
"Trojan-Downloader.Win32.Hover.ae",
"Heur.Packed.Unknown",
"Trojan.AVKill.425",
"TR/CHover.AE",
"Trojan/PSW.OnLineGames.aogk",
"TrojanDownloader:Win32/Idicaf.C",
"Win-Trojan/OnlineGameHack.12356.D",
"Trojan-PSW.Win32.OnLineGames.alse",
"HeurEngine.ZeroDayThreat",
"W32/OnLineGames.ALSE!tr.pws",
"PSW.OnlineGames.ATXK",
"Trj/Lineage.KMQ"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Win32.Nsis.hgnwk",
"TROJ_SPNR.07JB11",
"Trj/CI.A",
"Win32.Troj.DeepScan.x.kcloud",
"Trojan:Win32/Sinis.C",
"W32/Bfr.CV!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1
] |
[
"Unit",
"42",
"has",
"uncovered",
"a",
"new",
"campaign",
"from",
"the",
"CozyDuke",
"threat",
"actors,",
"aka",
"CozyCar",
"leveraging",
"malware",
"that",
"appears",
"to",
"be",
"related",
"to",
"the",
"Seaduke",
"malware",
"described",
"earlier",
"this",
"week",
"by",
"Symantec."
] | [
4,
12,
16,
16,
16,
16,
6,
16,
16,
6,
14,
16,
16,
6,
16,
3,
16,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
4
] |
[
"There",
"is",
"no",
"way",
"to",
"access",
"the",
"original",
"app",
"again",
"even",
"if",
"victims",
"terminate",
"the",
"overlay",
"process",
"and",
"reopen",
"app",
",",
"until",
"credit",
"card",
"(",
"name",
",",
"number",
",",
"expiry",
"date",
",",
"security",
"code",
")",
"and/or",
"bank",
"information",
"(",
"PIN",
",",
"VBV",
"passcode",
",",
"date",
"of",
"birth",
",",
"etc",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"It",
"leaves",
"a",
"ransom",
"note",
"with",
"the",
"following",
"filename:",
"!!!",
"how",
"to",
"decrypt",
"files",
"!!!.txt"
] | [
16,
16,
16,
3,
16,
16,
16,
16,
1,
9,
9,
9,
9,
9,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan-Downloader/W32.Mutant.32128",
"TrojanDownloader.Mutant.aim",
"Trojan.DR.Wigon.K",
"Win32/Wigon.CK",
"W32/Trojan3.GG",
"Trojan.Pandex",
"W32/DLoader.JDXM",
"Trojan.Downloader-55828",
"Trojan-Downloader.Win32.Mutant.aim",
"Trojan.Downloader.Wigon.A",
"TrojWare.Win32.Wigon.CK",
"Trojan-Downloader.Win32.Mutant.aim",
"Trojan.Rntm.10",
"Win32/Wigon.CK",
"W32/Trojan3.GG",
"TrojanDropper:Win32/Cutwail.AG",
"Trojan.Downloader.Wigon.A",
"Trojan.Pandex.ILG",
"Trojan.Win32.Undef.qqp",
"Trojan-Dropper.Cutwail",
"BackDoor.Ntrootkit",
"Trj/BedeTres.R"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"To",
"prevent",
"this",
",",
"Android",
"β",
"s",
"engineers",
"regularly",
"release",
"updates",
"that",
"contain",
"bug",
"fixes",
"designed",
"to",
"prevent",
"apps",
"from",
"getting",
"the",
"list",
"of",
"currently",
"running",
"apps",
"without",
"explicit",
"permission",
"."
] | [
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Dropped:Trojan.Spy.Delf.PY",
"Backdoor.Win32.Swz!O",
"Backdoor/Swz.c",
"Trojan.Spy.Delf.PY",
"Win32.Trojan.WisdomEyes.16070401.9500.9990",
"W32/Trojan.XFMU-4902",
"TSPY_DELF.EGM",
"Win.Spyware.3595-2",
"Backdoor.Win32.Swz.c",
"Dropped:Trojan.Spy.Delf.PY",
"Trojan.Win32.Swz.bcbdrt",
"Dropped:Trojan.Spy.Delf.PY",
"TrojWare.Win32.Dialer.LA",
"Dropped:Trojan.Spy.Delf.PY",
"Trojan.DownLoader.18593",
"TSPY_DELF.EGM",
"BehavesLike.Win32.HLLP.dh",
"Trojan-Dropper.Delf",
"W32/Trojan.YLD",
"Backdoor/Delf.sn",
"Trojan[Backdoor]/Win32.Swz",
"Backdoor.Win32.Hupigon.159240",
"Backdoor.Win32.Swz.c",
"Dropped:Trojan.Spy.Delf.PY",
"Trojan/Win32.Llac.R36500",
"Dropped:Trojan.Spy.Delf.PY",
"Backdoor.Win32.Hupigon.axbc",
"TrojanSpy.Delf!ehn0gq0J77k"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9955",
"BKDR_ZEGOST.SM17",
"Trojan.Win32.FBOK.exmdmr",
"TR/Crypt.Xpack.drajw",
"Trojan.Johnnie.D15B42",
"Trojan:Win32/Redosdru.AB",
"Trj/GdSda.A",
"Win32/Backdoor.d55"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"Mumblehard",
"infected",
"server",
"opens",
"a",
"backdoor",
"for",
"the",
"cybercriminals",
"that",
"allows",
"them",
"full",
"control",
"of",
"the",
"system",
"by",
"running",
"arbitrary",
"code."
] | [
16,
3,
16,
16,
1,
9,
9,
16,
16,
6,
16,
16,
16,
1,
9,
16,
16,
16,
16,
16,
7,
15
] |
[
"The",
"app",
"then",
"uses",
"JavaScript",
"injection",
"to",
"create",
"a",
"new",
"script",
"in",
"the",
"carrier",
"β",
"s",
"web",
"page",
"to",
"run",
"the",
"new",
"function",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Skeeyah",
"Worm.EternalRocks",
"Win32.Trojan.WisdomEyes.16070401.9500.9972",
"W32.Eternalrocks",
"Win.Trojan.EternalRocks-6320096-0",
"Worm.EternalRocks.t",
"Trojan/Win32.Fsysna",
"Trojan:Win32/Eterock.A",
"Win-Trojan/MDA.630F094C",
"Trojan.Fsysna",
"Worm.DoomsDay",
"W32/Eterocks.B!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"fields",
"it",
"collects",
"are",
":",
"Mobile",
"-",
"The",
"phone",
"number",
"which",
"sent",
"the",
"SMS",
"Content",
"-",
"The",
"message",
"body",
"Sender",
"-",
"The",
"contact",
"name",
"who",
"sent",
"the",
"message",
"Time",
"-",
"The",
"time",
"the",
"message",
"was",
"received",
"onReceive",
"function",
"used",
"to",
"intercept",
"incoming",
"SMS",
"messages",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"In",
"addition",
"to",
"the",
"commoditized",
"EKs,",
"this",
"exploit",
"code",
"has",
"been",
"leveraged",
"in",
"numerous",
"one-shot",
"and",
"gated",
"web-exploitation",
"campaigns,",
"delivered",
"through",
"a",
"mix",
"of",
"the",
"usual",
"malvertising",
"networks",
"and",
"compromised",
"websites."
] | [
16,
16,
16,
16,
16,
3,
16,
1,
9,
16,
16,
16,
16,
16,
16,
16,
6,
14,
14,
16,
16,
16,
16,
16,
16,
16,
1,
9,
16,
1,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Skeeyah.8391",
"Trojan.Win32.Drop.bbwlfj",
"Trojan.MulDrop4.627",
"TR/MiniMal.A.120",
"Trojan.Graftor.D4750",
"W32/Redosdru.BED!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1
] |
[
"Zen",
"requires",
"root",
"to",
"work",
"correctly",
"on",
"the",
"Android",
"operating",
"system",
"."
] | [
3,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"TrojanDownloader.Tinyloader",
"Trojan.Zusy.D258DB",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Trojan.Win32.Tiny.dztpub",
"Trojan.Win32.Tiny",
"TrojanDownloader:Win32/Tinyloader.D",
"Trj/CI.A",
"Win32.Trojan.Crypt.Wrqf"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Orbus.S11689",
"Trojan.Zusy.DE453",
"W32/Trojan2.OGNI",
"Backdoor.Salgorea",
"Win32/Tnega.WCBBKMB",
"TROJ_CUEGOE.SM",
"Win.Trojan.Cuegoe-6336261-0",
"Application.Win32.Amonetize.NE",
"TROJ_CUEGOE.SM",
"W32/Trojan.WOEU-3966",
"TR/Zusy.htd.1",
"Trojan.Dropper",
"Trojan.Zusy!G5SenpWt4dI",
"W32/Salgorea.C!tr",
"Backdoor.Win32.OceanLotus.X"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"TrojanPWS.AutoIt.Zbot.S",
"Win32.Trojan.WisdomEyes.16070401.9500.9823",
"W32/Trojan.FKJB-3819",
"Trojan.Win32.Autoit.abnef",
"BehavesLike.Win32.Dropper.bh",
"DR/Autoit.dhgia",
"TrojanDownloader:VBS/Banload.BEP",
"Trojan.Win32.Autoit.abnef",
"Trj/CI.A",
"W32/Injector.DMUI!tr",
"Win32/Trojan.3cd"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"MSIL.Trojan.Injector.q",
"TrojWare.MSIL.Injector.AB",
"Trojan.Starter.4871",
"BehavesLike.Win32.Ransomware.ch",
"W32/Trojan.QQTT-3117",
"Trojan:MSIL/Ranos.A",
"Trojan.Msil",
"Win32/Trojan.ead"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Zusy.D1BC52",
"Win32.Trojan.WisdomEyes.16070401.9500.9998",
"Backdoor.Memsyl",
"Trojan.Win32.Inject1.dkmaoo",
"Trojan.Inject1.45689",
"Trojan.Injector.Win32.256336",
"Trojan.MSIL.Inject",
"Trojan[Dropper]/Win32.Injector",
"Dropper/Win32.Necurs.R121870",
"Trojan.JobLaunch.ODB",
"Trj/CI.A",
"Trojan.Injector!pUXRB6SMd/g"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Alibaba",
"researchers",
"then",
"posted",
"an",
"analysis",
"report",
"on",
"the",
"malware,",
"giving",
"it",
"the",
"name",
"XcodeGhost."
] | [
4,
12,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
3
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.Bayrob.c",
"W32/Trojan.RXRB-1881",
"Trojan.Win32.Dwn.eeedhz",
"Trojan.Win32.Z.Bayrob.1075712.R",
"Trojan.DownLoader22.1800",
"BehavesLike.Win32.Trojan.tc",
"TR/Nivdort.knzgo",
"Trojan:Win32/Nivdort.A",
"Trojan.Kazy.DC0934",
"Trojan/Win32.Nivdort.C1321145",
"Trojan.Win32.Bayrob",
"W32/Bayrob.BL!tr",
"Win32/Trojan.f19"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"FireEye",
"believes",
"that",
"two",
"actors",
"β",
"Turla",
"and",
"an",
"unknown",
"financially",
"motivated",
"actor",
"β",
"were",
"using",
"the",
"first",
"EPS",
"zero-day",
"CVE-2017-0261,",
"and",
"APT28",
"was",
"using",
"the",
"second",
"EPS",
"zero-day",
"CVE-2017-0262",
"along",
"with",
"a",
"new",
"Escalation",
"of",
"Privilege",
"EOP",
"zero-day",
"CVE-2017-0263."
] | [
4,
16,
16,
6,
14,
16,
6,
16,
16,
6,
14,
14,
14,
16,
16,
16,
16,
16,
7,
15,
1,
16,
6,
16,
16,
16,
16,
7,
15,
1,
16,
16,
16,
16,
7,
15,
15,
15,
15,
1
] |
[
"However",
",",
"the",
"persistent",
"presence",
"of",
"Italian",
"language",
"both",
"on",
"the",
"Google",
"Play",
"Store",
"pages",
"as",
"well",
"as",
"inside",
"the",
"spyware",
"code",
"was",
"a",
"clear",
"sign",
"that",
"an",
"Italian",
"actor",
"was",
"behind",
"the",
"creation",
"of",
"this",
"platform",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Microsoft",
"β",
"s",
"mobile",
"threat",
"defense",
"capabilities",
"further",
"enrich",
"the",
"visibility",
"that",
"organizations",
"have",
"on",
"threats",
"in",
"their",
"networks",
",",
"as",
"well",
"as",
"provide",
"more",
"tools",
"to",
"detect",
"and",
"respond",
"to",
"threats",
"across",
"domains",
"and",
"across",
"platforms",
"."
] | [
4,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9946",
"Trojan.Win32.Shifu.aoc",
"Packed.Win32.TDSS.~AA",
"Packed:W32/PeCan.A",
"FDOS.Chalcol",
"BehavesLike.Win32.Virut.cc",
"Dos.Chalcol.a",
"DoS:Win32/Chalcol.A",
"Trojan.Win32.Shifu.aoc",
"DoS.Chalcol",
"Win32/DoS.Chalcol.A",
"Win32.Trojan.Chalcol.Wpsv",
"DoS.Win32.Chalcol",
"Win32/Trojan.DoS.0cc"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Figure",
"5",
":",
"core",
"module",
"mixes",
"malicious",
"payload",
"with",
"the",
"original",
"application",
"While",
"decompiling",
"the",
"original",
"app",
",",
"β",
"Agent",
"Smith",
"β",
"has",
"the",
"opportunity",
"to",
"modify",
"the",
"methods",
"inside",
",",
"replace",
"some",
"of",
"the",
"methods",
"in",
"the",
"original",
"application",
"that",
"handles",
"advertisement",
"with",
"its",
"own",
"code",
"and",
"focus",
"on",
"methods",
"communicating",
"with",
"β",
"AdMob",
"β",
",",
"β",
"Facebook",
"β",
",",
"β",
"MoPub",
"β",
"and",
"β",
"Unity",
"Ads",
"β",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
5,
16,
16,
16,
5,
16,
16,
16,
5,
13,
16,
16
] |
[
"Extract",
"the",
"address",
"book",
"."
] | [
16,
16,
5,
13,
16
] |
[
"The",
"developers",
"of",
"Charger",
"gave",
"it",
"everything",
"they",
"had",
"to",
"boost",
"its",
"evasion",
"capabilities",
"and",
"so",
"it",
"could",
"stay",
"hidden",
"on",
"Google",
"Play",
"for",
"as",
"long",
"as",
"possible",
"."
] | [
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
16,
16
] |
[
"However",
",",
"the",
"security",
"of",
"these",
"stores",
"and",
"the",
"apps",
"they",
"sell",
"aren",
"β",
"t",
"always",
"verified",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"After",
"getting",
"a",
"command",
"from",
"the",
"C",
"&",
"C",
",",
"the",
"app",
"is",
"able",
"to",
"download",
"a",
"malicious",
"payload",
"in",
"the",
"form",
"of",
"a",
".dex",
"file",
"that",
"is",
"being",
"dynamically",
"loaded",
"adding",
"the",
"additional",
"malicious",
"capabilities",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Then",
",",
"it",
"will",
"add",
"the",
"result",
"of",
"the",
"public",
"method",
"localDate.getTime",
"(",
")",
",",
"which",
"simply",
"gets",
"the",
"current",
"date",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"vulnerability",
"allows",
"an",
"attacker",
"to",
"escape",
"the",
"Internet",
"Explorer",
"sandbox",
"with",
"a",
"VBScript",
"script",
"and",
"execute",
"an",
"arbitrary",
"binary",
"file",
"downloaded",
"from",
"the",
"Internet."
] | [
16,
7,
16,
16,
1,
16,
16,
16,
5,
13,
13,
16,
16,
1,
9,
16,
16,
16,
3,
11,
11,
16,
16,
16,
16
] |
[
"Since",
"first",
"writing",
"about",
"the",
"discovery",
"of",
"HDDCryptor",
"back",
"in",
"September,",
"we",
"have",
"been",
"tracking",
"this",
"ransomware",
"closely",
"as",
"it",
"has",
"evolved."
] | [
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
0,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16
] |
[
"In",
"a",
"previous",
"campaign",
"reported",
"by",
"JPCERT",
",",
"mobile",
"users",
"were",
"alerted",
"by",
"phishy",
"messages",
"containing",
"β",
"delivery",
"updates",
"β",
"purportedly",
"from",
"Sagawa",
"Express",
"."
] | [
16,
16,
16,
16,
16,
16,
4,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
12,
16
] |
[
"Figure",
"11",
":",
"β",
"Agent",
"Smith",
"β",
"uses",
"man-in-disk",
"to",
"install",
"the",
"malicious",
"update",
"Technical",
"Analysis",
"β",
"Boot",
"Module",
"The",
"β",
"boot",
"β",
"module",
"is",
"basically",
"another",
"β",
"loader",
"β",
"module",
",",
"but",
"this",
"time",
"it",
"β",
"s",
"executed",
"in",
"the",
"infected",
"application",
"."
] | [
16,
16,
16,
16,
3,
11,
16,
16,
7,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"While",
"there",
"are",
"many",
"distinct",
"malware",
"families",
"that",
"scrape",
"unencrypted",
"process",
"memory",
"to",
"obtain",
"cards,",
"some",
"of",
"these",
"malware",
"capabilities",
"overlap",
"with",
"generic",
"information",
"stealing",
"trojans",
"such",
"as",
"Flokibot",
"that",
"obtain",
"and",
"exfiltrate",
"HTTPS",
"GET",
"and",
"POST",
"data",
"and",
"other",
"materials",
"from",
"compromised",
"machines."
] | [
16,
16,
16,
16,
16,
3,
11,
16,
16,
7,
15,
15,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
3,
16,
16,
3,
16,
16,
16,
1,
9,
9,
9,
9,
9,
16,
16,
16,
16,
5,
13
] |
[
"Magnitude",
"EK",
"is",
"notorious",
"for",
"distributing",
"the",
"Cerber",
"ransomware",
"specifically",
"to",
"certain",
"geolocations,",
"and",
"in",
"particular",
"South",
"Korea,",
"via",
"its",
"own",
"gate,",
"called",
"Magnigate."
] | [
3,
11,
16,
16,
16,
16,
3,
11,
11,
16,
16,
16,
16,
16,
16,
16,
2,
10,
16,
16,
16,
16,
16,
4
] |
[
"In",
"the",
"native",
"library",
",",
"it",
"stores",
"the",
"strings",
"to",
"access",
"the",
"SMS",
"API",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"During",
"our",
"extended",
"threat",
"hunting",
",",
"we",
"uncovered",
"11",
"apps",
"on",
"the",
"Google",
"Play",
"store",
"that",
"contain",
"a",
"malicious",
"yet",
"dormant",
"SDK",
"related",
"to",
"β",
"Agent",
"Smith",
"β",
"actor",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
16
] |
[
"Office",
"365",
"ATP",
"blocks",
"unsafe",
"attachments",
",",
"malicious",
"links",
",",
"and",
"linked-to",
"files",
"using",
"time-of-click",
"protection",
"."
] | [
5,
13,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Bepush.H3",
"Dropper.Dapato.Win32.26115",
"Win32.Trojan.WisdomEyes.16070401.9500.9850",
"TROJ_BEPUSH_EK040412.UVPM",
"Trojan.Win32.Dapato.dzszpp",
"Trojan.Win32.Z.Bepush.943616.C",
"Trojan.DownLoader14.14903",
"TROJ_BEPUSH_EK040412.UVPM",
"BehavesLike.Win32.Backdoor.dh",
"Trojan.Win32.Bepush",
"TR/Dropper.A.7849",
"MSIL/Dropper.UTIT!tr",
"Trojan[Dropper]/Win32.Dapato",
"Trojan.Zusy.D262FF",
"Trojan:MSIL/Bepush.H",
"TrojanDropper.Dapato",
"Win32.Trojan-dropper.Dapato.Hsik",
"Trojan.DR.Dapato!MYHy5uvhZGg",
"Trj/CI.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Talos",
"first",
"analyzed",
"this",
"threat",
"in",
"our",
"2020",
"blog",
"post,",
"highlighting",
"its",
"large",
"repertoire",
"of",
"modules,",
"multiple",
"methods",
"of",
"spreading,",
"and",
"continuous",
"development."
] | [
4,
16,
16,
16,
3,
16,
16,
0,
16,
16,
16,
16,
16,
3,
11,
11,
16,
1,
9,
9,
16,
16,
16
] |
[
"Error",
"when",
"trying",
"to",
"debug",
"the",
"malware",
"using",
"the",
"Android",
"Studio",
"IDE",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
13,
16
] |
[
"In",
"this",
"situation,",
"the",
"threat",
"actors",
"decided",
"to",
"take",
"advantage",
"of",
"this",
"behavior",
"by",
"using",
"Search",
"Engine",
"Optimization",
"SEO",
"to",
"make",
"their",
"malicious",
"links",
"more",
"prevalent",
"in",
"the",
"search",
"results,",
"enabling",
"them",
"to",
"target",
"users",
"with",
"the",
"Zeus",
"Panda",
"banking",
"Trojan."
] | [
16,
16,
16,
6,
14,
14,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
13,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
3,
11,
11,
11,
11
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9976",
"Trojan.Farfli",
"Win32/Covesmer.AT",
"TROJ_FARFLI.XM",
"Html.Trojan.RootkitVimponey-1",
"TrojanDownloader:Win32/Vimponey.A",
"Trojan.Win32.Downloader.56320.BV",
"Trojan.NtRootKit.2772",
"TROJ_FARFLI.XM",
"Trojan.Graftor.D2B9F3",
"TScope.Malware-Cryptor.SB",
"Win32/Trojan.d21"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"In",
"the",
"end,",
"I",
"bring",
"considerations",
"and",
"reflections",
"on",
"OTP",
"Tokens",
"effectiveness",
"as",
"a",
"second",
"factor",
"authentication",
"solution."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"We",
"have",
"discovered",
"apps",
"using",
"AES",
",",
"Blowfish",
",",
"and",
"DES",
"as",
"well",
"as",
"combinations",
"of",
"these",
"to",
"encrypt",
"their",
"strings",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"chat",
"details",
",",
"WhatsApp",
"records",
",",
"messengers",
"and",
"SMSs",
"of",
"the",
"world",
"carry",
"some",
"sensitive",
"information",
"which",
"people",
"often",
"forget",
"when",
"communicating",
"with",
"their",
"devices",
"."
] | [
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Dropper.Interlac.1.0.B",
"Trojan-Dropper.Win32.Interlac.10!O",
"TrojanDropper.Interlac",
"Dropper.Interlac.Win32.61",
"Trojan/Dropper.Interlac.10.b",
"TROJ_INTERLAC.B",
"W32/Trojan.PMPA-6139",
"Win32/Interlaced.10.B",
"Win.Dropper.Delf-619",
"Backdoor.Bifrose",
"Backdoor.Win32.Bifrose.te",
"Trojan.Dropper.Interlac.1.0.B",
"Trojan.Win32.Delf.hitv",
"Backdoor.Win32.Bifrose.23040.R",
"TrojWare.Win32.TrojanDropper.Interlac.B",
"Trojan.KillFiles",
"Trojan-Dropper.Win32.Interlac.B",
"W32/Trojan.FIF",
"TrojanDropper.Interlac.10.b",
"TR/Drop.Inte.10.b.3",
"Trojan[Backdoor]/MSIL.Bladabindi.as",
"TrojanDropper:Win32/Interlac.B",
"Trojan.Dropper.Interlac.1.0.B",
"Backdoor.Win32.Bifrose.te",
"Trojan.Dropper.Interlac.1.0.B",
"Trojan/Win32.KillFiles.C37985",
"Trojan.Dropper.Interlac.1.0.B",
"Trojan.Dropper.Interlac.1.0.B",
"Trj/Interlac.A",
"Win32/TrojanDropper.Interlac.10.B"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"It",
"turns",
"out",
",",
"that",
"Trojans",
"behave",
"quite",
"the",
"same",
"way",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.Rycii.Worm",
"Worm/W32.Nency.229376",
"Worm.Win32.VB!O",
"Worm.VB.Win32.295",
"Trojan.Heur.EE8D5F",
"Win32.Trojan.WisdomEyes.16070401.9500.9987",
"Win32/Shur.A",
"WORM_VB.FNX",
"Worm.Win32.VB.cj",
"Trojan.Win32.VB.ntmf",
"Worm.Win32.VB.229376.D",
"Worm.Win32.VB.~FF",
"Win32.HLLW.Brontok",
"WORM_VB.FNX",
"BehavesLike.Win32.Vilsel.dm",
"Worm.Win32.VB",
"Worm/VB.ca",
"WORM/Bugus.A",
"Worm/Win32.VB.cj",
"Worm.VB.cj.kcloud",
"Trojan:Win32/Brontok.A",
"Worm.Win32.VB.cj",
"Trojan.VBRA.08344",
"I-Worm.VB.CJ",
"Win32.Worm.Vb.Pkhb"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Changes",
"include",
"an",
"increase",
"in",
"the",
"quantity",
"of",
"injection",
"varieties,",
"as",
"well",
"as",
"payloads",
"deviating",
"from",
"the",
"standard",
"SocGholish",
"Fake",
"Update",
"JavaScript",
"packages."
] | [
16,
16,
16,
1,
9,
9,
9,
9,
9,
16,
16,
16,
16,
3,
16,
16,
3,
11,
11,
11,
11,
11,
11
] |
[
"In",
"addition",
"we",
"were",
"also",
"able",
"to",
"resolve",
"the",
"hosting",
"IP",
"212.192.14.3",
"as",
"well",
"as",
"the",
"ASN",
"AS39144",
"located",
"in",
"the",
"United",
"Kingdom",
"to",
"all",
"registered",
"domains."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9,
9,
16,
16,
16,
16,
1,
9,
16,
16,
2,
10,
10,
16,
16,
1,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9526",
"Win.Worm.VB-698",
"BehavesLike.Win32.Autorun.dt",
"W32.W.Otwycal.l4av",
"Win32/RiskWare.PEMalform.E",
"Trojan-Banker.Win32.Bancos"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32/Opanki.worm",
"Backdoor.SDBot",
"W32.W.Pakes!c",
"Win32.Trojan.WisdomEyes.16070401.9500.9915",
"W32/Opanki.AY",
"Backdoor.Sdbot",
"Win.Trojan.Pakes-927",
"Backdoor.Win32.IRCBot.cq",
"Trojan.Win32.Pakes.flbf",
"Worm.Win32.IM-Pakes.150528",
"Worm.Win32.Oscarbot.BL",
"BackDoor.IRC.Sdbot.170",
"Worm.Pakes.Win32.1",
"BehavesLike.Win32.Sdbot.cc",
"W32/Opanki.NEXW-4186",
"Backdoor/IRCBot.etu",
"WORM/Pakes.A",
"Worm.Pakes.kcloud",
"Backdoor.Win32.IRCBot.cq",
"Worm/Win32.IRCBot.C2420",
"SScope.Backdoor.Sdbot",
"Backdoor.SDBot",
"Trj/Pakes.EB",
"Win32/Oscarbot.BL",
"Win32.Worm-im.Pakes.Aexo",
"Worm.IRCBot!NcS/fGqoMio",
"Backdoor.Win32.Aimbot",
"W32/Opanki!worm.im"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"At",
"the",
"time",
"of",
"that",
"discovery,",
"the",
"latest",
"versions",
"we",
"had",
"seen",
"were",
"1.5.x,",
"months",
"before."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Once",
"this",
"malware",
"was",
"detected",
"on",
"a",
"device",
",",
"Mobile",
"Threat",
"Prevention",
"adjusted",
"security",
"policies",
"on",
"the",
"Mobile",
"Device",
"Management",
"solution",
"(",
"MobileIron",
")",
"managing",
"the",
"affected",
"devices",
"automatically",
",",
"thereby",
"blocking",
"enterprise",
"access",
"from",
"the",
"infected",
"devices",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/PSW.Sagic.15.d",
"Win32/PSW.Sagic.15.D",
"W32/Packed_Mew.C",
"TSPY_SAGIC.X",
"Win32.Stration",
"Trojan.Spy-6657",
"TrojWare.Win32.PSW.Sagic.D",
"Trojan.DownLoader.5739",
"TR/PSW.Sagic.F",
"Win32/Sagic.F",
"PWS:Win32/Sagic.F",
"Trojan.PSW.Sagic.15.e",
"W32/Sagic.D!tr.pws",
"Trj/Sagic.L"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"WebView-based",
"overlay",
"is",
"loading",
"an",
"HTML",
"page",
"provided",
"by",
"the",
"C2",
"in",
"response",
"to",
"the",
"package",
"name",
"provided",
"by",
"the",
"bot",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"is",
"the",
"first",
"time",
"that",
"we",
"have",
"seen",
"Cerber",
"distributed",
"via",
"the",
"use",
"of",
"WSFs."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
1,
9,
9,
9,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.Goicu.A",
"BackDoor-ANF.cli",
"BKDR_NETTROJAN.A",
"BKDR_NETTROJAN.A",
"Win.Trojan.Nettrojan-1",
"Backdoor.Goicu.A",
"Backdoor.Win32.NetTrojan",
"Backdoor.Goicu.A",
"Trojan.Win32.NetTrojan.bhgtue",
"Backdoor.Win32.NetTrojan.518144",
"Backdoor.W32.NetTroj!c",
"Backdoor.Goicu.A",
"Backdoor.Win32.DNetTrojan.A",
"Backdoor.Goicu.A",
"Backdoor.NetTrojan.Win32.4",
"BackDoor-ANF.cli",
"W32/Risk.VTVG-6810",
"Trojan/NetTrojan.c",
"BDC/NetTrojan.Cli",
"Trojan[Backdoor]/Win32.NetTrojan",
"Backdoor.Goicu.A",
"Backdoor.Win32.NetTrojan",
"Backdoor.Goicu.A",
"Win32/DNetTrojan.A",
"Win32.Backdoor.Nettrojan.Tcmd",
"Backdoor.ANF.A",
"W32/BDoor.NetTrojan!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Zusy.D36A22",
"Win32.Trojan.WisdomEyes.16070401.9500.9942",
"Backdoor:MSIL/Draliz.A",
"Trj/GdSda.A",
"PUA.MSIL.NetSeal"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.KotispaLTL.Trojan",
"Trojan/Glupteba.ao",
"W32/Trojan2.PAMI",
"HT_GLUPTEBA_GA310456.UVPM",
"Win32.Trojan-Downloader.Glupteba.A",
"Trojan.Win32.Glupteba.egxnjb",
"Trojan.Glupteba.Win32.3453",
"HT_GLUPTEBA_GA310456.UVPM",
"W32/Trojan.NEJE-6779",
"TrojanProxy.Glupteba.vg",
"TR/ATRAPS.hbngn",
"Trojan[Proxy]/Win32.Glupteba",
"Trojan.Zusy.D33746",
"Trojan/Win32.Glupteba.C1592487",
"TrojanProxy.Glupteba",
"Trj/GdSda.A",
"Trojan.PR.Glupteba!",
"Trojan.Win32.Glupteba",
"W32/Glupteba.AO!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Sabresac.A5",
"Adware.Elex",
"Trojan.Sabres.Win32.1",
"Troj.W32.Excalibur.tnrv",
"Trojan/Sabresac.a",
"Win32.Trojan.WisdomEyes.16070401.9500.9998",
"Trojan.Win32.Sabres.h",
"TrojWare.Win32.Excalibur.A",
"BehavesLike.Win32.Adware.fm",
"Adware.Elex/Variant",
"Trojan.Win32.Sabres.h",
"Trojan.Excalibur",
"Trj/GdSda.A",
"Trojan.Zusy.D2E5F4",
"Win32.Trojan.Sabres.Aenw",
"Trojan.Win32.Sabresac",
"Win32/Trojan.6a0"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"As",
"the",
"development",
"phase",
"supposedly",
"ended,",
"malware",
"started",
"spreading",
"from",
"India,",
"the",
"United",
"States",
"and",
"Israel",
"to",
"other",
"countries",
"around",
"the",
"globe."
] | [
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
2,
10,
10,
10,
10,
2,
16,
16,
2,
16,
16,
2
] |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.