tokens
sequencelengths
2
296
ner_tags
sequencelengths
2
296
[ "A", "backdoor", "also", "known", "as:", "Trojan.Multi", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Backdoor.Trojan", "Uds.Dangerousobject.Multi!c", "W32/Trojan.YSQI-3970", "Trojan.Symmi.D3C9A", "Backdoor:Win32/Touasper.A", "Win32.Trojan.Spy.Efvi", "W32/Injector.AQM!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Razy.D3C7E6", "Win32.Trojan.WisdomEyes.16070401.9500.9953", "BehavesLike.Win32.Trojan.jm", "Trojan:Win32/Ceatrg.A", "Trojan/Win32.RemoteAdmin.C2229526", "Trojan.MSIL.Bladabindi", "Trj/CI.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "attackers", "compromised", "the", "website", "of", "the", "Evangelical", "Lutheran", "Church", "of", "Hong", "Kong", "and", "modified", "it", "to", "host", "a", "malicious", "iFrame", "which", "redirected", "visitors", "to", "another", "website", "hosting", "an", "exploit", "of", "the", "Internet", "Explorer", "Microsoft", "Internet", "Explorer", "Remote", "Memory", "Corruption", "Vulnerability", "CVE-2015-2502." ]
[ 16, 6, 7, 16, 1, 16, 16, 4, 12, 12, 16, 2, 10, 16, 16, 16, 16, 16, 16, 3, 1, 16, 16, 16, 16, 16, 1, 16, 16, 3, 16, 16, 5, 13, 13, 13, 13, 7, 15, 15, 15, 1 ]
[ "This", "action", "changes", "the", "original", "file", "size", "of", "the", "DEX", "file", ",", "which", "makes", "the", "malicious", "resources", "a", "part", "of", "the", "DEX", "file", ",", "a", "section", "that", "is", "ignored", "by", "the", "signature", "validation", "process", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Detected", "as", "TROJ_WERDLOD,", "this", "new", "malware", "has", "been", "causing", "problems", "in", "the", "country", "since", "December", "2014", "with", "more", "than", "400", "confirmed", "victims." ]
[ 16, 16, 1, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 0, 8, 16, 16, 16, 16, 16, 16 ]
[ "In", "a", "root", "broken", "device", ",", "security", "is", "a", "fairy", "tale", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan-Dropper.Win32.Joiner!O", "Worm.Rebhip.A8", "Trojan/Dropper.Joiner.k", "TROJ_MULTIDROP.Q", "W32/Dropper.ANIA", "Backdoor.Colfusion", "Win32/TheJoiner.15x.C", "TROJ_MULTIDROP.Q", "Trojan-Dropper.Win32.Joiner.k", "Trojan.Win32.Joiner.epmz", "Trojan.Win32.Z.Joiner.417292", "Backdoor.W32.l8Tn", "TrojWare.Win32.TrojanDropper.Joiner.K", "Trojan.MulDrop.32", "Dropper.Joiner.Win32.430", "BehavesLike.Win32.Downloader.gc", "Trojan-Dropper.Win32.Joiner", "W32/Risk.SFJA-2732", "TrojanDropper.Win32.Joiner.k", "Trojan/Win32.Llac.cxsz", "Trojan-Dropper.Win32.Joiner.k", "Trojan.Llac", "Trj/Runner.Joiner.K", "Win32/TrojanDropper.Joiner.K", "Win32.Trojan-dropper.Joiner.Lkdg", "Trojan.DR.Joiner!ZtouwF9CQqA", "RAT.CyberGate", "W32/SkyRat.DLE!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Flood.Vb.DN", "Trojan/W32.Flooder.20992.B", "Trojan.Flood.Vb.DN", "Trojan/VB.dn", "Trojan.Flood.Vb.DN", "W32/VirTool.GZ", "Hacktool.Flooder", "Win32/Flooder.VB.DN", "Win.Trojan.Nudgema-1", "IM-Flooder.Win32.VB.dn", "Trojan.Win32.VB.mdnh", "Win32.Trojan.Vb.Wrhd", "Trojan.Flood.Vb.DN", "TrojWare.Win32.Flooder.VB.DN", "Trojan.Flood.Vb.DN", "FDOS.IM.451", "Tool.VB.Win32.1591", "BehavesLike.Win32.Trojan.mh", "W32/Tool.QSEE-8541", "IM-Flooder.VB.fg", "TR/Flood.VB.DN.1", "HackTool[Flooder]/Win32.VB", "HackTool:Win32/Aflooder.D", "Trojan.Flood.Vb.DN", "IM-Flooder.W32.VB.dn!c", "Trojan.Flood.Vb.DN", "Trojan/Win32.Xema.N61964869", "IMFlooder.VB", "Trojan-PWS.Win32.Executant.d", "Malware_fam.gw", "Flooder.LZ", "Flooder/Nudge.B" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "In", "mid-October", "2016,", "he", "received", "an", "unexpected", "phone", "call." ]
[ 16, 0, 8, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.MoonLight.Trojan", "Win32.Emailworm.LW", "Worm.Lightmoon.MF.213", "Win32.Emailworm.LW", "Worm.VB.Win32.314", "W32/VB.by", "Win32.Emailworm.LW", "Win32.Worm.VB.a", "W32/Worm.CIPA-1476", "W32.Rontokbro@mm", "Win32/Lightmoon.D", "WORM_VB.VV", "Email-Worm.Win32.VB.by", "Trojan.Win32.VB.dyztaz", "I-Worm.Win32.VB.35176", "W32.W.VBNA.mhOD", "Worm.Win32.NoonLight.F", "BehavesLike.Win32.Trojan.nc", "W32/EmailWorm.LW", "Worm.VB.gi", "TR/BAS.Samca.12113913", "Worm:Win32/Lightmoon.H", "Win32.Emailworm.LW", "Email-Worm.Win32.VB.by", "Win32.Emailworm.LW", "HEUR/Fakon.mwf", "Win32.Emailworm.LW", "W32/Moonlight.B.worm", "I-Worm.NoonLight.F", "Win32/NoonLight.F", "Win32.Worm-email.Vb.Hssm", "I-Worm.VB.WEI" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "One", "of", "those", "binaries", "was", "initially", "thought", "to", "be", "a", "new", "variant", "of", "the", "Padpin", "ATM", "malware", "family." ]
[ 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 3, 16, 3, 11, 11, 11, 11 ]
[ "Accessing", "the", "β€œ", "Cmd", "”", "folder", "in", "the", "attacker", "’", "s", "email", "box", "Moreover", ",", "it", "can", "send", "a", "specified", "file", "or", "all", "the", "gathered", "data", "from", "the", "victim", "device", "via", "email", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "First", ",", "we", "launched", "a", "banking", "app", "and", "entered", "the", "credentials", "there", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "It", "turns", "out", ",", "however", ",", "that", "other", "security", "researchers", "noticed", "suspicious", "and", "faulty", "code", "on", "BLU", "devices", "as", "early", "as", "March", "2015", ",", "and", "it", "has", "taken", "nearly", "that", "long", "to", "remove", "it", "from", "the", "company", "'s", "devices", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "Trojan", "displays", "a", "fake", "HTML", "update", "page", "(", "update.html", ")", "that", "blocks", "the", "device", "’", "s", "screen", "for", "a", "long", "period", "of", "time", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "infection", "chain", "is", "slightly", "more", "roundabout", "in", "the", "case", "of", "Apple", "devices", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16 ]
[ "The", "infection", "has", "not", "spread", "very", "widely", "at", "the", "time", "of", "writing", ",", "but", "we", "’", "ve", "seen", "that", "many", "users", "have", "already", "received", "its", "SMS", "content", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "attacks", "use", "Domain", "Name", "System", "(", "DNS", ")", "cache", "poisoning/DNS", "spoofing", ",", "possibly", "through", "infringement", "techniques", "such", "as", "brute-force", "or", "dictionary", "attacks", ",", "to", "distribute", "and", "install", "malicious", "Android", "apps", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9786", "TROJ_ONKODS.SMFF", "Trojan.DownLoader13.29927", "TROJ_ONKODS.SMFF", "TrojanDownloader:Win32/Cerber.A", "Trojan.Zbot.188", "Trojan/Win32.Fakeavlock.R144660", "Trojan-Downloader.Win32.Tiny" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "These", "solutions", "are", "typical", "in", "enterprise", "environments." ]
[ 16, 16, 16, 16, 16, 5, 13 ]
[ "Installing", "apps", "on", "the", "system", "partition", "makes", "it", "harder", "for", "the", "user", "to", "remove", "the", "app", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "ransomware", "is", "designed", "to", "infect", "Microsoft", "Windows", "computers." ]
[ 16, 3, 16, 16, 16, 16, 5, 13, 13 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Worm.Delf.NGA", "Worm.Win32.Delf!O", "Worm.Delf", "Win32.Worm.Delf.NGA", "Win32.Worm.Delf.bd", "W32/Trojan2.MIZZ", "W32.Screentief", "Win32/Screentief.A", "WORM_AUTORUN.GKP", "Worm.Win32.Delf.vn", "Win32.Worm.Delf.NGA", "Win32.Worm.Delf.clov", "Win32.Worm.Delf.NGA", "TrojWare.Win32.PSW.OnLineGames.~LDK", "Win32.Worm.Delf.NGA", "Trojan.DownLoader4.55571", "WORM_AUTORUN.GKP", "W32/Trojan.DZCT-6244", "Worm:Win32/Screenthif.A", "Worm/Win32.Delf", "Worm:Win32/ScreenThif.A", "Win32.Worm.Delf.NGA", "Trojan.Win32.Scar.702464", "Worm.Win32.Delf.vn", "Win32.Worm.Delf.NGA", "HEUR/Fakon.mwf", "Win32.Delf", "Win32/Delf.NQC", "W32/Delf.NQC!worm" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "seller", ",", "known", "as", "\"", "bestoffer", ",", "''", "was", ",", "at", "some", "point", ",", "expelled", "from", "the", "forum", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.DontovoF.Trojan", "Trojan.Hacktool.Httptunnel.A", "Trojan/W32.HackTool.36864.I", "Trojan.Hacktool.Httptunnel.A", "Tool.HTTPTunnel.Win32.1", "Trojan/Hacktool.HTTPTunnel", "Trojan.Hacktool.Httptunnel.A", "Trojan.Hacktool.Httptunnel.A", "W32/Tool.UFFD-0015", "TROJ_HTTPTUNE.A", "Trojan.Hacktool.Httptunnel.A", "HackTool.Win32.HTTPTunnel", "Riskware.Win32.HTTPTunnel.hskj", "HackTool.W32.HTTPTunnel!c", "Trojan.Hacktool.Httptunnel.A", "Application.Win32.HackTool.HTTPTunnel", "BehavesLike.Win32.PUP.nz", "W32/HackTool.EG", "Hacktool.HttpTunnel", "W32.Hack.Tool", "HackTool/Win32.HTTPTunnel", "HackTool.Win32.HTTPTunnel", "Win32/HackTool.HTTPTunnel", "Win32.Hacktool.Httptunnel.Ljul" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "β€œ", "In", "the", "future", ",", "we", "can", "expect", "that", "the", "bad", "guys", "will", "try", "to", "make", "use", "of", "Facebook", "statuses", "or", "deploy", "LinkedIn", "and", "other", "social", "networks", "”", ",", "states", "ESET", "’", "s", "researcher", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 4, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32/Trojan.KGEI-2537", "Trojan-Spy.Win32.Alinaos.as", "Trojan.Win32.Z.Zusy.575488.M", "BehavesLike.Win32.Trojan.hc", "Trojan.MSIL.Krypt", "Trojan.Zusy.D3371D", "Trojan/Win32.Inject.C1647442", "Trojan-Spy.Win32.Alinaos.as", "Trojan:MSIL/Proseus.A!bit", "Trj/CI.A", "Msil.Trojan.Dropper.Sxdx", "Win32/Trojan.Dropper.6f6" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "In", "a", "three-month", "period", "from", "August", "to", "October", "2018", ",", "it", "launched", "over", "70,000", "attacks", "against", "users", "located", "primarily", "in", "Russia", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "These", "attacks", "caused", "significant", "financial", "impact", "for", "major", "cryptocurrency", "markets,", "with", "one", "cryptocurrency", "cloud", "provider", "losing", "over", "$12", "million", "in", "assets,", "allegedly", "to", "ITG03." ]
[ 16, 1, 16, 16, 16, 16, 16, 16, 4, 12, 16, 16, 4, 12, 12, 16, 16, 16, 16, 16, 16, 16, 16, 6 ]
[ "A", "backdoor", "also", "known", "as:", "Virus.Win32.Delf!O", "Worm.Zorin", "W32.Looked.P", "Win32/Looked.C", "PE_LEOX.A", "Worm.Win32.Zorin.a", "Trojan.Win32.Zorin.wmfe", "W32.W.Viking.l3Va", "Virus.Win32.Zorin.a", "Win32.HLLW.Looked", "Virus.Delf.Win32.16", "PE_LEOX.A", "BehavesLike.Win32.Backdoor.lh", "Worm.Win32.Viking", "W32/Zorin.A", "Worm/Zorin.a", "Virus/Win32.Delf.dpee", "Worm.Logo.f.67072", "Worm:Win32/Zorin.A", "Worm.Win32.A.Zorin.67072", "Worm.Win32.Zorin.a", "Win32/Zorin.67072", "Trojan.Delf.62976", "Win32/Viking.NAI", "Worm.Zorin.A", "W32/Zorin.A.worm", "Win32/Worm.Zorin.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "focus", "of", "the", "Android", "banking", "malware", "in", "Google", "Play", "is", "different", "from", "any", "other", "Android", "malware", "we", "have", "investigated." ]
[ 16, 16, 16, 16, 3, 11, 11, 16, 5, 13, 16, 16, 16, 16, 16, 3, 11, 16, 16, 16 ]
[ "EventBot", "Sending", "the", "pin", "code", "back", "to", "the", "C2", "Sending", "the", "pin", "code", "back", "to", "the", "C2", "." ]
[ 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Actually,", "this", "is", "not", "the", "first", "ransomware", "to", "come", "out", "of", "Brazil." ]
[ 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 2 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan-PWS/W32.WebGame.12356.C", "TrojanPSW.OnLineGames.gyv", "Trojan.DL.Hover!hoKEWysDbsk", "W32/Packed_Upack.A", "Trojan.Onlinegames-2021", "Trojan-Downloader.Win32.Hover.ae", "Heur.Packed.Unknown", "Trojan.AVKill.425", "TR/CHover.AE", "Trojan/PSW.OnLineGames.aogk", "TrojanDownloader:Win32/Idicaf.C", "Win-Trojan/OnlineGameHack.12356.D", "Trojan-PSW.Win32.OnLineGames.alse", "HeurEngine.ZeroDayThreat", "W32/OnLineGames.ALSE!tr.pws", "PSW.OnlineGames.ATXK", "Trj/Lineage.KMQ" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Win32.Nsis.hgnwk", "TROJ_SPNR.07JB11", "Trj/CI.A", "Win32.Troj.DeepScan.x.kcloud", "Trojan:Win32/Sinis.C", "W32/Bfr.CV!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1 ]
[ "Unit", "42", "has", "uncovered", "a", "new", "campaign", "from", "the", "CozyDuke", "threat", "actors,", "aka", "CozyCar", "leveraging", "malware", "that", "appears", "to", "be", "related", "to", "the", "Seaduke", "malware", "described", "earlier", "this", "week", "by", "Symantec." ]
[ 4, 12, 16, 16, 16, 16, 6, 16, 16, 6, 14, 16, 16, 6, 16, 3, 16, 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 4 ]
[ "There", "is", "no", "way", "to", "access", "the", "original", "app", "again", "even", "if", "victims", "terminate", "the", "overlay", "process", "and", "reopen", "app", ",", "until", "credit", "card", "(", "name", ",", "number", ",", "expiry", "date", ",", "security", "code", ")", "and/or", "bank", "information", "(", "PIN", ",", "VBV", "passcode", ",", "date", "of", "birth", ",", "etc", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "It", "leaves", "a", "ransom", "note", "with", "the", "following", "filename:", "!!!", "how", "to", "decrypt", "files", "!!!.txt" ]
[ 16, 16, 16, 3, 16, 16, 16, 16, 1, 9, 9, 9, 9, 9, 9 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan-Downloader/W32.Mutant.32128", "TrojanDownloader.Mutant.aim", "Trojan.DR.Wigon.K", "Win32/Wigon.CK", "W32/Trojan3.GG", "Trojan.Pandex", "W32/DLoader.JDXM", "Trojan.Downloader-55828", "Trojan-Downloader.Win32.Mutant.aim", "Trojan.Downloader.Wigon.A", "TrojWare.Win32.Wigon.CK", "Trojan-Downloader.Win32.Mutant.aim", "Trojan.Rntm.10", "Win32/Wigon.CK", "W32/Trojan3.GG", "TrojanDropper:Win32/Cutwail.AG", "Trojan.Downloader.Wigon.A", "Trojan.Pandex.ILG", "Trojan.Win32.Undef.qqp", "Trojan-Dropper.Cutwail", "BackDoor.Ntrootkit", "Trj/BedeTres.R" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "To", "prevent", "this", ",", "Android", "’", "s", "engineers", "regularly", "release", "updates", "that", "contain", "bug", "fixes", "designed", "to", "prevent", "apps", "from", "getting", "the", "list", "of", "currently", "running", "apps", "without", "explicit", "permission", "." ]
[ 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Dropped:Trojan.Spy.Delf.PY", "Backdoor.Win32.Swz!O", "Backdoor/Swz.c", "Trojan.Spy.Delf.PY", "Win32.Trojan.WisdomEyes.16070401.9500.9990", "W32/Trojan.XFMU-4902", "TSPY_DELF.EGM", "Win.Spyware.3595-2", "Backdoor.Win32.Swz.c", "Dropped:Trojan.Spy.Delf.PY", "Trojan.Win32.Swz.bcbdrt", "Dropped:Trojan.Spy.Delf.PY", "TrojWare.Win32.Dialer.LA", "Dropped:Trojan.Spy.Delf.PY", "Trojan.DownLoader.18593", "TSPY_DELF.EGM", "BehavesLike.Win32.HLLP.dh", "Trojan-Dropper.Delf", "W32/Trojan.YLD", "Backdoor/Delf.sn", "Trojan[Backdoor]/Win32.Swz", "Backdoor.Win32.Hupigon.159240", "Backdoor.Win32.Swz.c", "Dropped:Trojan.Spy.Delf.PY", "Trojan/Win32.Llac.R36500", "Dropped:Trojan.Spy.Delf.PY", "Backdoor.Win32.Hupigon.axbc", "TrojanSpy.Delf!ehn0gq0J77k" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9955", "BKDR_ZEGOST.SM17", "Trojan.Win32.FBOK.exmdmr", "TR/Crypt.Xpack.drajw", "Trojan.Johnnie.D15B42", "Trojan:Win32/Redosdru.AB", "Trj/GdSda.A", "Win32/Backdoor.d55" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "Mumblehard", "infected", "server", "opens", "a", "backdoor", "for", "the", "cybercriminals", "that", "allows", "them", "full", "control", "of", "the", "system", "by", "running", "arbitrary", "code." ]
[ 16, 3, 16, 16, 1, 9, 9, 16, 16, 6, 16, 16, 16, 1, 9, 16, 16, 16, 16, 16, 7, 15 ]
[ "The", "app", "then", "uses", "JavaScript", "injection", "to", "create", "a", "new", "script", "in", "the", "carrier", "’", "s", "web", "page", "to", "run", "the", "new", "function", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Skeeyah", "Worm.EternalRocks", "Win32.Trojan.WisdomEyes.16070401.9500.9972", "W32.Eternalrocks", "Win.Trojan.EternalRocks-6320096-0", "Worm.EternalRocks.t", "Trojan/Win32.Fsysna", "Trojan:Win32/Eterock.A", "Win-Trojan/MDA.630F094C", "Trojan.Fsysna", "Worm.DoomsDay", "W32/Eterocks.B!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "fields", "it", "collects", "are", ":", "Mobile", "-", "The", "phone", "number", "which", "sent", "the", "SMS", "Content", "-", "The", "message", "body", "Sender", "-", "The", "contact", "name", "who", "sent", "the", "message", "Time", "-", "The", "time", "the", "message", "was", "received", "onReceive", "function", "used", "to", "intercept", "incoming", "SMS", "messages", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "In", "addition", "to", "the", "commoditized", "EKs,", "this", "exploit", "code", "has", "been", "leveraged", "in", "numerous", "one-shot", "and", "gated", "web-exploitation", "campaigns,", "delivered", "through", "a", "mix", "of", "the", "usual", "malvertising", "networks", "and", "compromised", "websites." ]
[ 16, 16, 16, 16, 16, 3, 16, 1, 9, 16, 16, 16, 16, 16, 16, 16, 6, 14, 14, 16, 16, 16, 16, 16, 16, 16, 1, 9, 16, 1, 9 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Skeeyah.8391", "Trojan.Win32.Drop.bbwlfj", "Trojan.MulDrop4.627", "TR/MiniMal.A.120", "Trojan.Graftor.D4750", "W32/Redosdru.BED!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1 ]
[ "Zen", "requires", "root", "to", "work", "correctly", "on", "the", "Android", "operating", "system", "." ]
[ 3, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "TrojanDownloader.Tinyloader", "Trojan.Zusy.D258DB", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Trojan.Win32.Tiny.dztpub", "Trojan.Win32.Tiny", "TrojanDownloader:Win32/Tinyloader.D", "Trj/CI.A", "Win32.Trojan.Crypt.Wrqf" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Orbus.S11689", "Trojan.Zusy.DE453", "W32/Trojan2.OGNI", "Backdoor.Salgorea", "Win32/Tnega.WCBBKMB", "TROJ_CUEGOE.SM", "Win.Trojan.Cuegoe-6336261-0", "Application.Win32.Amonetize.NE", "TROJ_CUEGOE.SM", "W32/Trojan.WOEU-3966", "TR/Zusy.htd.1", "Trojan.Dropper", "Trojan.Zusy!G5SenpWt4dI", "W32/Salgorea.C!tr", "Backdoor.Win32.OceanLotus.X" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "TrojanPWS.AutoIt.Zbot.S", "Win32.Trojan.WisdomEyes.16070401.9500.9823", "W32/Trojan.FKJB-3819", "Trojan.Win32.Autoit.abnef", "BehavesLike.Win32.Dropper.bh", "DR/Autoit.dhgia", "TrojanDownloader:VBS/Banload.BEP", "Trojan.Win32.Autoit.abnef", "Trj/CI.A", "W32/Injector.DMUI!tr", "Win32/Trojan.3cd" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "MSIL.Trojan.Injector.q", "TrojWare.MSIL.Injector.AB", "Trojan.Starter.4871", "BehavesLike.Win32.Ransomware.ch", "W32/Trojan.QQTT-3117", "Trojan:MSIL/Ranos.A", "Trojan.Msil", "Win32/Trojan.ead" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Zusy.D1BC52", "Win32.Trojan.WisdomEyes.16070401.9500.9998", "Backdoor.Memsyl", "Trojan.Win32.Inject1.dkmaoo", "Trojan.Inject1.45689", "Trojan.Injector.Win32.256336", "Trojan.MSIL.Inject", "Trojan[Dropper]/Win32.Injector", "Dropper/Win32.Necurs.R121870", "Trojan.JobLaunch.ODB", "Trj/CI.A", "Trojan.Injector!pUXRB6SMd/g" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Alibaba", "researchers", "then", "posted", "an", "analysis", "report", "on", "the", "malware,", "giving", "it", "the", "name", "XcodeGhost." ]
[ 4, 12, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 3 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.Bayrob.c", "W32/Trojan.RXRB-1881", "Trojan.Win32.Dwn.eeedhz", "Trojan.Win32.Z.Bayrob.1075712.R", "Trojan.DownLoader22.1800", "BehavesLike.Win32.Trojan.tc", "TR/Nivdort.knzgo", "Trojan:Win32/Nivdort.A", "Trojan.Kazy.DC0934", "Trojan/Win32.Nivdort.C1321145", "Trojan.Win32.Bayrob", "W32/Bayrob.BL!tr", "Win32/Trojan.f19" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "FireEye", "believes", "that", "two", "actors", "–", "Turla", "and", "an", "unknown", "financially", "motivated", "actor", "–", "were", "using", "the", "first", "EPS", "zero-day", "CVE-2017-0261,", "and", "APT28", "was", "using", "the", "second", "EPS", "zero-day", "CVE-2017-0262", "along", "with", "a", "new", "Escalation", "of", "Privilege", "EOP", "zero-day", "CVE-2017-0263." ]
[ 4, 16, 16, 6, 14, 16, 6, 16, 16, 6, 14, 14, 14, 16, 16, 16, 16, 16, 7, 15, 1, 16, 6, 16, 16, 16, 16, 7, 15, 1, 16, 16, 16, 16, 7, 15, 15, 15, 15, 1 ]
[ "However", ",", "the", "persistent", "presence", "of", "Italian", "language", "both", "on", "the", "Google", "Play", "Store", "pages", "as", "well", "as", "inside", "the", "spyware", "code", "was", "a", "clear", "sign", "that", "an", "Italian", "actor", "was", "behind", "the", "creation", "of", "this", "platform", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Microsoft", "’", "s", "mobile", "threat", "defense", "capabilities", "further", "enrich", "the", "visibility", "that", "organizations", "have", "on", "threats", "in", "their", "networks", ",", "as", "well", "as", "provide", "more", "tools", "to", "detect", "and", "respond", "to", "threats", "across", "domains", "and", "across", "platforms", "." ]
[ 4, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9946", "Trojan.Win32.Shifu.aoc", "Packed.Win32.TDSS.~AA", "Packed:W32/PeCan.A", "FDOS.Chalcol", "BehavesLike.Win32.Virut.cc", "Dos.Chalcol.a", "DoS:Win32/Chalcol.A", "Trojan.Win32.Shifu.aoc", "DoS.Chalcol", "Win32/DoS.Chalcol.A", "Win32.Trojan.Chalcol.Wpsv", "DoS.Win32.Chalcol", "Win32/Trojan.DoS.0cc" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Figure", "5", ":", "core", "module", "mixes", "malicious", "payload", "with", "the", "original", "application", "While", "decompiling", "the", "original", "app", ",", "β€œ", "Agent", "Smith", "”", "has", "the", "opportunity", "to", "modify", "the", "methods", "inside", ",", "replace", "some", "of", "the", "methods", "in", "the", "original", "application", "that", "handles", "advertisement", "with", "its", "own", "code", "and", "focus", "on", "methods", "communicating", "with", "β€˜", "AdMob", "’", ",", "β€˜", "Facebook", "’", ",", "β€˜", "MoPub", "’", "and", "β€˜", "Unity", "Ads", "’", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 5, 16, 16, 16, 5, 16, 16, 16, 5, 13, 16, 16 ]
[ "Extract", "the", "address", "book", "." ]
[ 16, 16, 5, 13, 16 ]
[ "The", "developers", "of", "Charger", "gave", "it", "everything", "they", "had", "to", "boost", "its", "evasion", "capabilities", "and", "so", "it", "could", "stay", "hidden", "on", "Google", "Play", "for", "as", "long", "as", "possible", "." ]
[ 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 16, 16, 16, 16, 16, 16 ]
[ "However", ",", "the", "security", "of", "these", "stores", "and", "the", "apps", "they", "sell", "aren", "’", "t", "always", "verified", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "After", "getting", "a", "command", "from", "the", "C", "&", "C", ",", "the", "app", "is", "able", "to", "download", "a", "malicious", "payload", "in", "the", "form", "of", "a", ".dex", "file", "that", "is", "being", "dynamically", "loaded", "adding", "the", "additional", "malicious", "capabilities", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Then", ",", "it", "will", "add", "the", "result", "of", "the", "public", "method", "localDate.getTime", "(", ")", ",", "which", "simply", "gets", "the", "current", "date", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "This", "vulnerability", "allows", "an", "attacker", "to", "escape", "the", "Internet", "Explorer", "sandbox", "with", "a", "VBScript", "script", "and", "execute", "an", "arbitrary", "binary", "file", "downloaded", "from", "the", "Internet." ]
[ 16, 7, 16, 16, 1, 16, 16, 16, 5, 13, 13, 16, 16, 1, 9, 16, 16, 16, 3, 11, 11, 16, 16, 16, 16 ]
[ "Since", "first", "writing", "about", "the", "discovery", "of", "HDDCryptor", "back", "in", "September,", "we", "have", "been", "tracking", "this", "ransomware", "closely", "as", "it", "has", "evolved." ]
[ 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 0, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16 ]
[ "In", "a", "previous", "campaign", "reported", "by", "JPCERT", ",", "mobile", "users", "were", "alerted", "by", "phishy", "messages", "containing", "β€œ", "delivery", "updates", "”", "purportedly", "from", "Sagawa", "Express", "." ]
[ 16, 16, 16, 16, 16, 16, 4, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 12, 16 ]
[ "Figure", "11", ":", "β€˜", "Agent", "Smith", "’", "uses", "man-in-disk", "to", "install", "the", "malicious", "update", "Technical", "Analysis", "–", "Boot", "Module", "The", "β€œ", "boot", "”", "module", "is", "basically", "another", "β€œ", "loader", "”", "module", ",", "but", "this", "time", "it", "’", "s", "executed", "in", "the", "infected", "application", "." ]
[ 16, 16, 16, 16, 3, 11, 16, 16, 7, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "While", "there", "are", "many", "distinct", "malware", "families", "that", "scrape", "unencrypted", "process", "memory", "to", "obtain", "cards,", "some", "of", "these", "malware", "capabilities", "overlap", "with", "generic", "information", "stealing", "trojans", "such", "as", "Flokibot", "that", "obtain", "and", "exfiltrate", "HTTPS", "GET", "and", "POST", "data", "and", "other", "materials", "from", "compromised", "machines." ]
[ 16, 16, 16, 16, 16, 3, 11, 16, 16, 7, 15, 15, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 3, 16, 16, 3, 16, 16, 16, 1, 9, 9, 9, 9, 9, 16, 16, 16, 16, 5, 13 ]
[ "Magnitude", "EK", "is", "notorious", "for", "distributing", "the", "Cerber", "ransomware", "specifically", "to", "certain", "geolocations,", "and", "in", "particular", "South", "Korea,", "via", "its", "own", "gate,", "called", "Magnigate." ]
[ 3, 11, 16, 16, 16, 16, 3, 11, 11, 16, 16, 16, 16, 16, 16, 16, 2, 10, 16, 16, 16, 16, 16, 4 ]
[ "In", "the", "native", "library", ",", "it", "stores", "the", "strings", "to", "access", "the", "SMS", "API", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "During", "our", "extended", "threat", "hunting", ",", "we", "uncovered", "11", "apps", "on", "the", "Google", "Play", "store", "that", "contain", "a", "malicious", "yet", "dormant", "SDK", "related", "to", "β€œ", "Agent", "Smith", "”", "actor", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 16 ]
[ "Office", "365", "ATP", "blocks", "unsafe", "attachments", ",", "malicious", "links", ",", "and", "linked-to", "files", "using", "time-of-click", "protection", "." ]
[ 5, 13, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Bepush.H3", "Dropper.Dapato.Win32.26115", "Win32.Trojan.WisdomEyes.16070401.9500.9850", "TROJ_BEPUSH_EK040412.UVPM", "Trojan.Win32.Dapato.dzszpp", "Trojan.Win32.Z.Bepush.943616.C", "Trojan.DownLoader14.14903", "TROJ_BEPUSH_EK040412.UVPM", "BehavesLike.Win32.Backdoor.dh", "Trojan.Win32.Bepush", "TR/Dropper.A.7849", "MSIL/Dropper.UTIT!tr", "Trojan[Dropper]/Win32.Dapato", "Trojan.Zusy.D262FF", "Trojan:MSIL/Bepush.H", "TrojanDropper.Dapato", "Win32.Trojan-dropper.Dapato.Hsik", "Trojan.DR.Dapato!MYHy5uvhZGg", "Trj/CI.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Talos", "first", "analyzed", "this", "threat", "in", "our", "2020", "blog", "post,", "highlighting", "its", "large", "repertoire", "of", "modules,", "multiple", "methods", "of", "spreading,", "and", "continuous", "development." ]
[ 4, 16, 16, 16, 3, 16, 16, 0, 16, 16, 16, 16, 16, 3, 11, 11, 16, 1, 9, 9, 16, 16, 16 ]
[ "Error", "when", "trying", "to", "debug", "the", "malware", "using", "the", "Android", "Studio", "IDE", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 13, 16 ]
[ "In", "this", "situation,", "the", "threat", "actors", "decided", "to", "take", "advantage", "of", "this", "behavior", "by", "using", "Search", "Engine", "Optimization", "SEO", "to", "make", "their", "malicious", "links", "more", "prevalent", "in", "the", "search", "results,", "enabling", "them", "to", "target", "users", "with", "the", "Zeus", "Panda", "banking", "Trojan." ]
[ 16, 16, 16, 6, 14, 14, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 13, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16, 3, 11, 11, 11, 11 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9976", "Trojan.Farfli", "Win32/Covesmer.AT", "TROJ_FARFLI.XM", "Html.Trojan.RootkitVimponey-1", "TrojanDownloader:Win32/Vimponey.A", "Trojan.Win32.Downloader.56320.BV", "Trojan.NtRootKit.2772", "TROJ_FARFLI.XM", "Trojan.Graftor.D2B9F3", "TScope.Malware-Cryptor.SB", "Win32/Trojan.d21" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "In", "the", "end,", "I", "bring", "considerations", "and", "reflections", "on", "OTP", "Tokens", "effectiveness", "as", "a", "second", "factor", "authentication", "solution." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "We", "have", "discovered", "apps", "using", "AES", ",", "Blowfish", ",", "and", "DES", "as", "well", "as", "combinations", "of", "these", "to", "encrypt", "their", "strings", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "chat", "details", ",", "WhatsApp", "records", ",", "messengers", "and", "SMSs", "of", "the", "world", "carry", "some", "sensitive", "information", "which", "people", "often", "forget", "when", "communicating", "with", "their", "devices", "." ]
[ 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Dropper.Interlac.1.0.B", "Trojan-Dropper.Win32.Interlac.10!O", "TrojanDropper.Interlac", "Dropper.Interlac.Win32.61", "Trojan/Dropper.Interlac.10.b", "TROJ_INTERLAC.B", "W32/Trojan.PMPA-6139", "Win32/Interlaced.10.B", "Win.Dropper.Delf-619", "Backdoor.Bifrose", "Backdoor.Win32.Bifrose.te", "Trojan.Dropper.Interlac.1.0.B", "Trojan.Win32.Delf.hitv", "Backdoor.Win32.Bifrose.23040.R", "TrojWare.Win32.TrojanDropper.Interlac.B", "Trojan.KillFiles", "Trojan-Dropper.Win32.Interlac.B", "W32/Trojan.FIF", "TrojanDropper.Interlac.10.b", "TR/Drop.Inte.10.b.3", "Trojan[Backdoor]/MSIL.Bladabindi.as", "TrojanDropper:Win32/Interlac.B", "Trojan.Dropper.Interlac.1.0.B", "Backdoor.Win32.Bifrose.te", "Trojan.Dropper.Interlac.1.0.B", "Trojan/Win32.KillFiles.C37985", "Trojan.Dropper.Interlac.1.0.B", "Trojan.Dropper.Interlac.1.0.B", "Trj/Interlac.A", "Win32/TrojanDropper.Interlac.10.B" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "It", "turns", "out", ",", "that", "Trojans", "behave", "quite", "the", "same", "way", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.Rycii.Worm", "Worm/W32.Nency.229376", "Worm.Win32.VB!O", "Worm.VB.Win32.295", "Trojan.Heur.EE8D5F", "Win32.Trojan.WisdomEyes.16070401.9500.9987", "Win32/Shur.A", "WORM_VB.FNX", "Worm.Win32.VB.cj", "Trojan.Win32.VB.ntmf", "Worm.Win32.VB.229376.D", "Worm.Win32.VB.~FF", "Win32.HLLW.Brontok", "WORM_VB.FNX", "BehavesLike.Win32.Vilsel.dm", "Worm.Win32.VB", "Worm/VB.ca", "WORM/Bugus.A", "Worm/Win32.VB.cj", "Worm.VB.cj.kcloud", "Trojan:Win32/Brontok.A", "Worm.Win32.VB.cj", "Trojan.VBRA.08344", "I-Worm.VB.CJ", "Win32.Worm.Vb.Pkhb" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Changes", "include", "an", "increase", "in", "the", "quantity", "of", "injection", "varieties,", "as", "well", "as", "payloads", "deviating", "from", "the", "standard", "SocGholish", "Fake", "Update", "JavaScript", "packages." ]
[ 16, 16, 16, 1, 9, 9, 9, 9, 9, 16, 16, 16, 16, 3, 16, 16, 3, 11, 11, 11, 11, 11, 11 ]
[ "In", "addition", "we", "were", "also", "able", "to", "resolve", "the", "hosting", "IP", "212.192.14.3", "as", "well", "as", "the", "ASN", "AS39144", "located", "in", "the", "United", "Kingdom", "to", "all", "registered", "domains." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 9, 9, 16, 16, 16, 16, 1, 9, 16, 16, 2, 10, 10, 16, 16, 1, 9 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9526", "Win.Worm.VB-698", "BehavesLike.Win32.Autorun.dt", "W32.W.Otwycal.l4av", "Win32/RiskWare.PEMalform.E", "Trojan-Banker.Win32.Bancos" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32/Opanki.worm", "Backdoor.SDBot", "W32.W.Pakes!c", "Win32.Trojan.WisdomEyes.16070401.9500.9915", "W32/Opanki.AY", "Backdoor.Sdbot", "Win.Trojan.Pakes-927", "Backdoor.Win32.IRCBot.cq", "Trojan.Win32.Pakes.flbf", "Worm.Win32.IM-Pakes.150528", "Worm.Win32.Oscarbot.BL", "BackDoor.IRC.Sdbot.170", "Worm.Pakes.Win32.1", "BehavesLike.Win32.Sdbot.cc", "W32/Opanki.NEXW-4186", "Backdoor/IRCBot.etu", "WORM/Pakes.A", "Worm.Pakes.kcloud", "Backdoor.Win32.IRCBot.cq", "Worm/Win32.IRCBot.C2420", "SScope.Backdoor.Sdbot", "Backdoor.SDBot", "Trj/Pakes.EB", "Win32/Oscarbot.BL", "Win32.Worm-im.Pakes.Aexo", "Worm.IRCBot!NcS/fGqoMio", "Backdoor.Win32.Aimbot", "W32/Opanki!worm.im" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "At", "the", "time", "of", "that", "discovery,", "the", "latest", "versions", "we", "had", "seen", "were", "1.5.x,", "months", "before." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Once", "this", "malware", "was", "detected", "on", "a", "device", ",", "Mobile", "Threat", "Prevention", "adjusted", "security", "policies", "on", "the", "Mobile", "Device", "Management", "solution", "(", "MobileIron", ")", "managing", "the", "affected", "devices", "automatically", ",", "thereby", "blocking", "enterprise", "access", "from", "the", "infected", "devices", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/PSW.Sagic.15.d", "Win32/PSW.Sagic.15.D", "W32/Packed_Mew.C", "TSPY_SAGIC.X", "Win32.Stration", "Trojan.Spy-6657", "TrojWare.Win32.PSW.Sagic.D", "Trojan.DownLoader.5739", "TR/PSW.Sagic.F", "Win32/Sagic.F", "PWS:Win32/Sagic.F", "Trojan.PSW.Sagic.15.e", "W32/Sagic.D!tr.pws", "Trj/Sagic.L" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "WebView-based", "overlay", "is", "loading", "an", "HTML", "page", "provided", "by", "the", "C2", "in", "response", "to", "the", "package", "name", "provided", "by", "the", "bot", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "This", "is", "the", "first", "time", "that", "we", "have", "seen", "Cerber", "distributed", "via", "the", "use", "of", "WSFs." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 1, 9, 9, 9, 9 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.Goicu.A", "BackDoor-ANF.cli", "BKDR_NETTROJAN.A", "BKDR_NETTROJAN.A", "Win.Trojan.Nettrojan-1", "Backdoor.Goicu.A", "Backdoor.Win32.NetTrojan", "Backdoor.Goicu.A", "Trojan.Win32.NetTrojan.bhgtue", "Backdoor.Win32.NetTrojan.518144", "Backdoor.W32.NetTroj!c", "Backdoor.Goicu.A", "Backdoor.Win32.DNetTrojan.A", "Backdoor.Goicu.A", "Backdoor.NetTrojan.Win32.4", "BackDoor-ANF.cli", "W32/Risk.VTVG-6810", "Trojan/NetTrojan.c", "BDC/NetTrojan.Cli", "Trojan[Backdoor]/Win32.NetTrojan", "Backdoor.Goicu.A", "Backdoor.Win32.NetTrojan", "Backdoor.Goicu.A", "Win32/DNetTrojan.A", "Win32.Backdoor.Nettrojan.Tcmd", "Backdoor.ANF.A", "W32/BDoor.NetTrojan!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Zusy.D36A22", "Win32.Trojan.WisdomEyes.16070401.9500.9942", "Backdoor:MSIL/Draliz.A", "Trj/GdSda.A", "PUA.MSIL.NetSeal" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.KotispaLTL.Trojan", "Trojan/Glupteba.ao", "W32/Trojan2.PAMI", "HT_GLUPTEBA_GA310456.UVPM", "Win32.Trojan-Downloader.Glupteba.A", "Trojan.Win32.Glupteba.egxnjb", "Trojan.Glupteba.Win32.3453", "HT_GLUPTEBA_GA310456.UVPM", "W32/Trojan.NEJE-6779", "TrojanProxy.Glupteba.vg", "TR/ATRAPS.hbngn", "Trojan[Proxy]/Win32.Glupteba", "Trojan.Zusy.D33746", "Trojan/Win32.Glupteba.C1592487", "TrojanProxy.Glupteba", "Trj/GdSda.A", "Trojan.PR.Glupteba!", "Trojan.Win32.Glupteba", "W32/Glupteba.AO!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Sabresac.A5", "Adware.Elex", "Trojan.Sabres.Win32.1", "Troj.W32.Excalibur.tnrv", "Trojan/Sabresac.a", "Win32.Trojan.WisdomEyes.16070401.9500.9998", "Trojan.Win32.Sabres.h", "TrojWare.Win32.Excalibur.A", "BehavesLike.Win32.Adware.fm", "Adware.Elex/Variant", "Trojan.Win32.Sabres.h", "Trojan.Excalibur", "Trj/GdSda.A", "Trojan.Zusy.D2E5F4", "Win32.Trojan.Sabres.Aenw", "Trojan.Win32.Sabresac", "Win32/Trojan.6a0" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "As", "the", "development", "phase", "supposedly", "ended,", "malware", "started", "spreading", "from", "India,", "the", "United", "States", "and", "Israel", "to", "other", "countries", "around", "the", "globe." ]
[ 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 2, 10, 10, 10, 10, 2, 16, 16, 2, 16, 16, 2 ]