tokens
sequencelengths
2
296
ner_tags
sequencelengths
2
296
[ "A", "backdoor", "also", "known", "as:", "Backdoor/Bifrose.sxu", "Win32.Trojan.WisdomEyes.16070401.9500.9583", "W32/Backdoor.BVIJ-4494", "BKDR_BIFROSE_0000025.TOMA", "Win.Trojan.Bifrose-3481", "Trojan.Win32.Bifrose.isow", "Backdoor.Win32.A.Bifrose.51712.B[h]", "Trojan.MulDrop.16295", "Backdoor.Bifrose.Win32.79774", "W32/Backdoor2.BVUS", "Backdoor/SdBot.ees", "WORM/IrcBot.353792", "Trojan[Backdoor]/Win32.Bifrose", "Trojan:Win32/Mdrop.A", "Backdoor/Win32.Bifrose.C64544", "Backdoor.Bifrose!Gi2ynDtXmII", "Backdoor.Win32.Bifrose" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "With", "the", "malware", "now", "in", "place", ",", "a", "number", "of", "actions", "can", "be", "performed", ",", "including", "allowing", "attackers", "to", "secretly", "monitor", "and", "control", "smartphones", "via", "a", "backdoor", ",", "send", "messages", "to", "premium-rate", "numbers", ",", "and", "intercept", "two-factor", "authentication", "codes", "sent", "by", "online", "banking", "apps", "and", "the", "like", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.PDF.Phishing.UX", "Trojan.PDF.Phish.ve", "Trojan.PDF.Phishing.UX", "Trojan.PDF.Phishing.UX", "EXP/Pidief.EB.523", "Trojan.PDF.Phishing.UX", "Trojan.PDF.Phish.ve", "Trojan.PDF.Phishing.UX", "Trojan.PDF.Phishing.UX" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.FamVT.ExpiroPC.PE", "Worm/W32.Small.6084.H", "Email-Worm.Win32.Zhelatin!O", "Email-Worm.Win32.Zhelatin.h", "W32.W.Zhelatin.l03u", "TrojWare.Win32.Small.DBY", "Worm.Zhelatin.Win32.4001", "Downloader-BAI.dam", "Worm/Zhelatin.ok", "TR/Small.DBY.Y", "Worm[Email]/Win32.Zhelatin", "Email-Worm.Win32.Zhelatin.h", "Win32/Luder.O", "Downloader-BAI.dam", "Email-Worm.Win32.Zhelatin", "W32/DldBAI.H!dam", "Trj/Alanchum.PH" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "Locky", "ransomware", "has", "been", "very", "active", "since", "its", "return", "which", "we", "documented", "in", "a", "previous", "blog", "post." ]
[ 3, 11, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "About", "two-thirds", "of", "these", "apps", "show", "some", "kind", "of", "malicious", "behavior,", "including", "displaying", "ads", "and", "downloading", "apps", "without", "the", "user's", "consent." ]
[ 16, 3, 16, 16, 3, 16, 16, 16, 16, 3, 11, 16, 1, 9, 16, 1, 9, 9, 9, 9, 9 ]
[ "However,", "we", "just", "recently", "found", "new", "Sage", "samples", "that,", "while", "they", "appear", "to", "still", "be", "Sage", "2.2,", "now", "have", "added", "tricks", "focused", "on", "anti-analysis", "and", "privilege", "escalation." ]
[ 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 7, 15 ]
[ "A", "backdoor", "also", "known", "as:", "W32/Spamtool.Y", "Trojan.Dropper", "Win32/Mendrem.A", "Win.Trojan.Proxy-4705", "Troj.Proxy.W32!c", "Trojan.MulDrop.4012", "BehavesLike.Win32.Backdoor.cm", "Trojan-Downloader.Win32.LoadAdv", "W32/Spamtool.LPPN-6055", "Spammer:Win32/Kukunefo.A", "TScope.Malware-Cryptor.SB", "Trj/CI.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "When", "the", "files", "are", "encrypted", "they", "DO", "NOT", "change", "file", "name", "or", "extensions", "and", "appear", "normal", "to", "the", "victim", "until", "you", "try", "to", "open", "them." ]
[ 16, 16, 1, 16, 16, 16, 16, 16, 16, 1, 9, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Based", "on", "our", "detection", "statistics", ",", "the", "main", "infection", "vector", "is", "the", "spread", "of", "Trojanized", "applications", "directly", "to", "victims", "via", "Telegram", "and", "WhatsApp", "messengers", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "During", "the", "installation", ",", "the", "malware", "asks", "for", "the", "following", "permissions", ":", "READ_PHONE_STATE", "-", "Allows", "read-only", "access", "to", "the", "phone", "state", ",", "including", "the", "current", "cellular", "network", "information", ",", "the", "status", "of", "any", "ongoing", "calls", ",", "and", "a", "list", "of", "any", "PhoneAccounts", "registered", "on", "the", "device", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "If", "the", "malware", "determines", "that", "is", "not", "running", "on", "an", "emulator", ",", "it", "then", "performs", "additional", "checks", "to", "ensure", "that", "it", "wo", "n't", "be", "detected", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/W32.NForwarded.401408.F", "Trojan.Beaugrit.A.mue", "Trojan/Spy.Banhguo.a", "Win32.Trojan-Spy.Banhguo.a", "Trojan.Win32.KillFiles.dmlrmm", "Trojan.Win32.PSWIGames.401408.J", "TrojWare.Win32.Lmir.RL", "Trojan.KillFiles.17459", "Backdoor.PePatch.Win32.55641", "BehavesLike.Win32.Dropper.fc", "TR/Banhguo.aone", "Trojan.Symmi.DBA11", "Trojan/Win32.OnLineGames.R127640", "W32/Banhguo.A!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.FamVT.ExpiroPC.PE", "Virus.W32.Hupigon.Fqm!c", "BehavesLike.Win32.RAHack.fc", "KIT/Mac.Walrus.121", "HackTool[Constructor]/Win32.Walrus", "Constructor:W97M/Walrus.1_21.dam#2", "Trj/CI.A", "Win32/Trojan.488" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "This", "information", "can", "give", "the", "attacker", "access", "to", "personal", "and", "business", "bank", "accounts", ",", "personal", "and", "business", "data", ",", "and", "more", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Uds.Dangerousobject.Multi!c", "Win32.Trojan.WisdomEyes.151026.9950.9988", "Heur.AdvML.C", "Trojan.Win32.MulDrop5.dbmdce", "BehavesLike.Win32.BrowseFox.nh", "W32/CoinMiner.QR!tr", "Trojan.Zusy.D17C80", "PUP/Win32.BitCoinMiner.C350160", "Trojan:Win32/Figyek.A", "Win32.Trojan.Adware.Wnmi", "Trojan.CoinMiner", "CoinMiner.BLK", "Trojan.Win32.CoinMiner.QR", "Win32/Trojan.713" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Packed.Krap.b.3", "Packer.Malware.NSAnti.1", "Trojan:Win32/Inhoo.A", "Packer.Malware.NSAnti.1", "Trojan-GameThief.Win32.Magania.aigw" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Dropper.Axesoft.A", "Trojan-Dropper/W32.Axesoft.800094", "Trojandropper.Axesoft", "Trojan.Dropper.Axesoft.A", "Trojan/Dropper.Axesoft", "TROJ_AXESOFT.A", "TROJ_AXESOFT.A", "Trojan.Dropper.Axesoft.A", "Trojan-Dropper.Win32.Axesoft", "Trojan.Dropper.Axesoft.A", "Trojan.Win32.Axesoft-Drp.fdro", "Troj.Dropper.W32.Axesoft!c", "Trojan.Dropper.Axesoft.A", "Trojan.Dropper.Axesoft.A", "Trojan.MulDrop.216", "Dropper.Axesoft.Win32.2", "BehavesLike.Win32.Dropper.bc", "Trojan-PWS.Win32.QQPass", "W32/Trojan.RHJF-8903", "TrojanDropper.Axesoft", "W32.Trojan.Dropper-AxeSoft", "BDS/GWGirl.12.C", "Trojan.Dropper.Axesoft.A", "Trojan-Dropper.Win32.Axesoft", "BackDoor-SP.dr", "TrojanDropper.Axesoft", "Win32/TrojanDropper.Axesoft", "Win32.Trojan-dropper.Axesoft.Apde", "Trojan.DR.Axesoft!crjcgQTkDRg", "W32/Bdoor.SP!tr", "Win32/Trojan.Dropper.d68" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Initial", "reports", "of", "a", "new", "variant", "of", "ransomware", "called", "LockCrypt", "started", "in", "June", "of", "this", "year." ]
[ 16, 16, 16, 16, 3, 11, 16, 3, 16, 3, 16, 16, 0, 8, 8, 8 ]
[ "But", "the", "3rd", "ASEAN-United", "States", "Summit", "on", "21", "November", "2015", "did", "not", "disappoint." ]
[ 16, 16, 4, 12, 12, 12, 16, 0, 8, 8, 16, 16, 16 ]
[ "The", "cybercriminals", "then", "send", "this", "money", "to", "a", "digital", "wallet", "or", "to", "a", "premium", "number", "and", "cash", "it", "in", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.OnGamesLT180912HKGHAAI.Trojan", "Trojan-Downloader.Win32.Losabel!O", "Downloader.Losabel.Win32.540", "Trojan/Downloader.Losabel.nx", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Trojan.Popwin", "BehavesLike.Win32.Trojan.fh", "TrojanDownloader.Losabel.cx", "Trojan[Downloader]/Win32.Losabel", "TrojanDropper:Win32/Idicaf.A", "Trojan/Win32.OnlineGameHack.C187141", "Trojan.DL.Losabel!C2fG9tSV6gk", "Trj/Pupack.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "Intent", "object", "carries", "a", "string", "value", "as", "β€œ", "action", "”", "parameter", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Among", "the", "over", "1.4", "billion", "devices", "protected", "by", "Verify", "Apps", ",", "we", "observed", "fewer", "than", "3", "dozen", "installs", "of", "Chrysaor", "on", "victim", "devices", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16 ]
[ "It", "appears", "to", "be", "run", "by", "a", "Russian-speaking", "group", "of", "hackers." ]
[ 16, 16, 16, 16, 16, 16, 16, 6, 14, 14, 14 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Kazy.D54BC4", "Win32.Trojan.WisdomEyes.16070401.9500.9993", "Tool.PassView.859", "Trojan/Blocker.jhq", "Win32.Troj.Foxhiex.a.kcloud", "Trojan/Win32.Zbot.C284570", "Trojan.MSIL.CryptoObfuscator", "Trj/GdSda.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "P2P-Worm.Win32.Krepper!O", "Worm.Krepper.A.mue", "Worm.Krepper.Win32.1", "W32/Krepper.c", "W32.IRCBot", "Win32/Sndc.A", "WORM_SHAREBOT.A", "Win.Worm.Poom-1", "P2P-Worm.Win32.Krepper.c", "Trojan.Win32.Krepper.dqeaqt", "Troj.GameThief.W32.OnLineGames.lgKp", "Win32.Worm-p2p.Krepper.Ljjq", "Worm.Win32.Krepper.C", "Win32.HLLW.Krepper", "WORM_SHAREBOT.A", "BehavesLike.Win32.PUPXAX.lz", "W32/Pcbot.A@p2p", "Trojan/Krepper.ad", "WORM/Krepper.C", "Worm[P2P]/Win32.Krepper", "Worm:Win32/Krepper.B", "Trojan.Win32.Krepper.11808", "P2P-Worm.Win32.Krepper.c", "Worm.Krepper", "I-Worm.Krepper.C", "Win32/Krepper.C", "Worm.P2P.Krepper!dcAWP425Bzk", "P2P-Worm.Win32.Krepper", "W32/Krepper.C!worm" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Mobile", "developers", "have", "recently", "begun", "eschewing", "traditional", "app", "stores", "and", "instead", "want", "to", "deliver", "their", "software", "directly", "through", "their", "own", "means", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Worryingly", ",", "some", "of", "the", "modifications", "enforced", "by", "the", "spyware", "might", "expose", "the", "infected", "devices", "to", "further", "compromise", "or", "data", "tampering", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "This", "sort", "of", "conversion", "allows", "Python", "code", "to", "be", "run", "in", "a", "Windows", "environment", "without", "pre-installed", "Python", "binaries", "." ]
[ 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 5, 16, 16 ]
[ "Through", "our", "on-going", "investigation", "and", "monitoring", "of", "this", "targeted", "attack", "campaign,", "we", "found", "suspicious", "URLs", "that", "hosted", "a", "newly", "discovered", "zero-day", "exploit", "in", "Java", "now", "identified", "by", "Oracle", "as", "CVE-2015-2590." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 6, 14, 16, 16, 1, 9, 16, 16, 16, 16, 16, 7, 15, 16, 5, 16, 16, 16, 4, 16, 1 ]
[ "The", "campaign", "was", "identified", "starting", "with", "the", "registration", "on", "2023-04-05", "16:04:51", "up", "to", "the", "latest", "registration", "on", "2023-04-10", "08:33:28." ]
[ 6, 14, 16, 16, 16, 16, 16, 16, 16, 0, 8, 16, 16, 16, 16, 16, 16, 0, 8 ]
[ "It", "has", "been", "attacking", "Iranian", "users." ]
[ 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/W32.Makecall.20484", "Trojan.Makecall", "Trojan.Makecall.Win32.5", "TROJ_MAKECALL.A", "W32/MalwareF.VJTB", "W32.Makecall.Trojan", "TROJ_MAKECALL.A", "Trojan.Win32.Makecall.a", "Trojan.Win32.Makecall.fkdu", "Trojan.Win32.S.Makecall.20484", "Troj.W32.Makecall.a!c", "Trojan.MulDrop.717", "BehavesLike.Win32.VBObfus.mz", "W32/Risk.QDBN-9051", "Trojan/MakeCall.d", "TR/Makecall.a", "Trojan/Win32.Makecall", "Trojan:Win32/Makecall.A", "Trojan.Win32.Makecall.a", "Trojan/Win32.Makecall.R109087", "SScope.Trojan.VBRA.3284", "Win32/Makecall.A", "Win32.Trojan.Makecall.Ecul", "Trojan.Makecall!Hu8pme7fStI", "Trojan.Win32.Makecall", "W32/Makecall.A!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Win32/Sipay.ADV", "Trojan.Crypt.GU", "Trojan/W32.Small.15872.S", "Trojan.Small.Win32.4658", "Trojan/Small.xut", "Trojan.Win32.Small.glefu", "Win32/TrojanDownloader.FakeAlert.JI", "WORM_SMALL.MDA", "Trojan.Small-8598", "Trojan.Crypt.GU", "Trojan.Crypt.GU", "Trojan.Small!AZKO6qCeQTg", "Trojan.Win32.Small.15872.Q[h]", "Trojan.Dropper/AdobeFake", "Trojan.Crypt.GU", "TrojWare.Win32.Small.~YE", "Trojan.Crypt.GU", "Trojan.DownLoader10.48865", "WORM_SMALL.MDA", "W32/Trojan2.EQHY", "Trojan/Small.fnb", "Trojan/Win32.Small", "Win32.Troj.Small.kcloud", "Trojan.Crypt.GU", "Win-Trojan/Downloader.15872.GU", "TrojanDownloader:Win32/Bofang.C", "Trojan.Crypt.GU", "Trojan.Small", "Trojan-Downloader.HG", "W32/FakeAlert.JI!tr.dldr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "In", "addition,", "Xbot", "will", "steal", "all", "SMS", "messages", "and", "contact", "information,", "intercept", "certain", "SMS", "messages,", "and", "parse", "SMS", "messages", "for", "mTANs", "Mobile", "Transaction", "Authentication", "Number", "from", "banks." ]
[ 16, 16, 3, 16, 1, 9, 9, 9, 16, 1, 9, 16, 16, 1, 9, 16, 16, 1, 9, 9, 9, 9, 9, 9, 9, 16, 4 ]
[ "Using", "both", "the", "Elknot", "and", "BillGates", "DDoS", "malware,", "these", "attackers", "have", "continued", "to", "infect", "vulnerable", "Elasticsearch", "servers", "in", "order", "to", "enhance", "their", "DDoS", "capabilities." ]
[ 16, 16, 16, 3, 16, 3, 11, 11, 16, 6, 16, 16, 16, 16, 7, 5, 13, 16, 16, 16, 16, 16, 1, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/KillAV.a", "TROJ_SPNR.38J614", "Backdoor.Trojan", "TROJ_SPNR.38J614", "Uds.Dangerousobject.Multi!c", "Trojan.Patched.Win64.2566", "W64/Trojan.HLJR-4976", "Trojan.KillAV!apRF/prfUvc", "Trojan.Win64.Killav", "W64/KillAV.A!tr", "Trj/CI.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "It", "now", "appears", "to", "be", "in", "the", "league", "of", "full-blown", "banking", "trojans", "such", "as", "Dyreza,", "Neverquest/Vawtrak,", "Zeus,", "etc." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 3, 11, 11, 16 ]
[ "DIMNIE", "is", "a", "modular", "information", "stealer", "profiled", "earlier", "this", "year", "by", "security", "researchers", "at", "PaloAlto", "s", "Unit", "42,", "who", "found", "the", "malware", "in", "targeted", "phishing", "attacks", "against", "open-source", "developers." ]
[ 3, 16, 16, 1, 9, 9, 16, 0, 8, 8, 16, 4, 12, 16, 4, 16, 4, 12, 16, 16, 16, 3, 16, 1, 9, 9, 16, 4, 12 ]
[ "History", "has", "shown", "us", "that", ",", "in", "time", ",", "these", "attacks", "will", "use", "zero-day", "vulnerabilities", ",", "exploits", "or", "a", "combination", "of", "techniques", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 7, 15, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.UserinitWininit.Trojan", "Trojan.Delf.QEO", "Trojan.Bancteian.CB4", "Trojan.Delf.QEO", "Trojan/Spy.Delf.qgs", "Trojan.Delf.QEO", "Win32.Virus.Delf.c", "W32/Delf.UD", "TROJ_BANCTEIAN.SM", "Win.Trojan.Bancteian-0-6418983-0", "Trojan.Delf.QEO", "Trojan.Delf.QEO", "Trojan.Win32.Delf.3301398", "Trojan.Delf.QEO", "Backdoor.Win32.Delf.~DD", "Trojan.Delf.QEO", "Adware.BrowseFox.Win32.220566", "TROJ_BANCTEIAN.SM", "BehavesLike.Win32.Trojan.wh", "Trojan.Win32.Bancteian", "W32/Delf.CERT-0413", "Trojan.Reconyc.apf", "W32.Trojan.Delf", "TR/BAS.Samca.lsswh", "Trojan/Win32.Delf.nbw", "Trojan:Win32/Bancteian.B", "Trojan/Win32.Bancteian.R174475", "Trojan.Reconyc", "Trojan.Win32.Delf.qgs", "W32/Delf.QGS!tr.spy" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Depending", "on", "the", "intent", "triggered", ",", "one", "of", "two", "Receivers", "would", "be", "called", ",", "in", "this", "instance", "they", "are", "called", "Boot", "or", "Time", "but", "the", "name", "is", "somewhat", "immaterial", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Text", "message", "and", "call", "logs", "were", "transmitted", "every", "72", "hours", "to", "the", "Shanghai", "server", ",", "and", "once", "a", "day", "for", "other", "personally", "identifiable", "data", ",", "the", "company", "says", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Until", "now", ",", "we", "haven", "’", "t", "seen", "targeted", "attacks", "against", "mobile", "phones", ",", "although", "we", "’", "ve", "seen", "indications", "that", "these", "were", "in", "development", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "In", "one", "of", "our", "previous", "blog", "entries,", "we", "covered", "how", "the", "threat", "actor", "known", "as", "Winnti", "was", "using", "GitHub", "to", "spread", "malware", "–", "a", "development", "that", "shows", "how", "the", "group", "is", "starting", "to", "evolve", "and", "use", "new", "attack", "methods", "beyond", "their", "previous", "tactics", "involving", "targeted", "attacks", "against", "gaming,", "pharmaceutical,", "and", "telecommunications", "companies." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 6, 14, 14, 16, 16, 6, 16, 16, 5, 16, 16, 3, 16, 16, 16, 16, 16, 16, 6, 14, 16, 16, 16, 16, 16, 16, 1, 9, 9, 16, 16, 16, 16, 16, 16, 1, 16, 4, 12, 16, 4, 12 ]
[ "The", "malware", "simulates", "clicks", "on", "app", "advertisements", "provided", "by", "legitimate", "ad", "networks", "and", "forces", "the", "app", "to", "install", "on", "a", "device", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.MSIL.Downloader.AD", "Trojan.MSIL.Downloader.AD", "Trojan.MSIL.Downloader.AD", "Trojan.MSIL.Downloader.AD", "Trojan.Win32.Inject.ewmdhe", "Troj.MSIL.Disfa.mCrY", "Trojan.MSIL.Downloader.AD", "TrojWare.MSIL.Inject.TEQ", "Trojan.MSIL.Downloader.AD", "TR/Inject.xbeihg", "TrojanDownloader:MSIL/Datsup.A", "Trojan.MSIL.Downloader.AD", "Trj/CI.A", "MSIL/Dloader.AWE!tr", "Win32/Trojan.cd2" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Exp.RTF.CVE-2017-8759.D", "Trojan.Mdropper", "Win32/Exploit.CVE-2017-8759.A", "TROJ_ARTIEF.JEJOWP", "Rtf.Downloader.CVE_2017-6336326-3", "Exploit.MSOffice.CVE-2017-8759.a", "Exploit.Ole2.CVE-2017-8759.estduh", "RTF.S.Exploit.44738", "Exploit.Msoffice.Cve!c", "Exploit.CVE-2017-8759.5", "TROJ_ARTIEF.JEJOWP", "RTF/Trojan.BGKX-2", "HEUR:Exploit.MSOffice.CVE-2017-8759.a", "Exploit.CVE-2017-8759", "Office.Exploit.Cve-2017-8759.Ajle", "Trojan.Win32.Exploit", "Malicious_Behavior.SB", "Win32/Trojan.Exploit.024" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Downloader.Farfly.L", "Multi.Threats.InArchive", "W32/Risk.NCBB-0700", "Trojan.Farfli", "Win.Trojan.Downloader-2275", "Trojan.Downloader.Farfly.L", "Trojan.Downloader.Farfly.L", "Trojan.Win32.Crypted.dkwpfn", "Trojan.Win32.Z.Downloader.266845", "Trojan.Downloader.Farfly.L", "Trojan.DownLoader4.59614", "Downloader.Selvice.Win32.747", "TROJ_DLOADR.SMQ", "Trojan-Downloader.Win32.Selvice", "W32/MalwareS.ASNW", "Trojan.Downloader.Farfly.L", "TrojanDownloader:Win32/Caxnet.B", "Worm.WhiteIce", "Trojan.Downloader.Farfly.L", "Trojan.Downloader.Farfly.L", "Trojan.DL.Selvice!qQfZyIPcdpU", "Win32/Trojan.Downloader.6fb" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Win32.Hijacker.kvdpi", "TROJ_DYER.BMC", "Trojan.Enfal-7", "HEUR:Trojan.Win32.Invader", "Trojan.Hijacker!h2YIjU+BiQU", "Trojan.DownLoader7.14277", "TROJ_DYER.BMC", "Trojan/Invader.exe", "W32/Bfr.2!tr", "Trojan[:HEUR]/Win32.Invader", "Win-Trojan/Inject.16896.IT", "Win32.Trojan.Hijacker.Ebqw", "Trojan.Win32.Sanpec", "Win32/Trojan.1da" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "attacks", "we", "attribute", "to", "Scarlet", "Mimic", "have", "primarily", "targeted", "Uyghur", "and", "Tibetan", "activists", "as", "well", "as", "those", "who", "are", "interested", "in", "their", "causes." ]
[ 16, 1, 16, 16, 16, 6, 14, 16, 16, 16, 4, 12, 12, 12, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "This", "new", "threat", "also", "uses", "a", "macro", "to", "infect", "the", "target's", "computer,", "but", "rather", "than", "retrieving", "a", "binary", "payload,", "it", "relies", "on", "various", "scripts", "to", "maintain", "its", "presence", "and", "to", "communicate", "via", "hacked", "websites,", "acting", "as", "proxies", "for", "the", "command", "and", "control", "server." ]
[ 16, 3, 11, 16, 16, 16, 3, 16, 3, 5, 13, 13, 16, 16, 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 1, 9, 16, 16, 1, 16, 1, 9, 9, 9, 9 ]
[ "After", "the", "next", "run", "of", "the", "infected", "application", ",", "the", "β€œ", "boot", "”", "module", "will", "run", "the", "β€œ", "patch", "”", "module", ",", "which", "hooks", "the", "methods", "from", "known", "ad", "SDKs", "to", "its", "own", "implementation", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Downloader.Myxa.Win32.113", "Trojan/Downloader.Myxa.cit", "Trojan.Kazy.D6034", "TROJ_MONKIF.SMKP", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Downloader.Monkif", "TROJ_MONKIF.SMKP", "Win.Downloader.100478-1", "Trojan.Win32.Myxa.bqhvc", "Trojan.Win32.A.Downloader.22672.B", "Trojan.DownLoad3.32720", "Trojan-Downloader.Win32.Myxa", "TrojanDownloader.Myxa.cx", "TrojanDownloader:Win32/Monkif.T", "Downloader/Win32.Monkif.R1925", "TrojanDownloader.Myxa", "Trj/Myxa.A", "Trojan.DL.Myxa!oB3ehXmv9m8" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "When", "we", "talk", "about", "the", "attackers,", "there", "is", "this", "misconception", "that", "they", "are", "these", "super", "villains", "who", "can", "only", "do", "evil,", "but", "keep", "in", "mind", "they", "are", "humans", "too." ]
[ 16, 16, 16, 16, 16, 6, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "His", "repository", "proves", "that", "he", "is", "indeed", "an", "Android", "developer", ",", "but", "it", "contained", "no", "publicly", "available", "code", "of", "the", "Ashas", "adware", "at", "the", "time", "of", "writing", "of", "this", "blogpost", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "This", "macro", "comes", "into", "users'", "systems", "through", "a", "spam", "email", "with", "subjects", "such", "as", "My", "Resume,", "Openings,", "Internship,", "etc." ]
[ 16, 3, 16, 16, 5, 13, 16, 16, 1, 9, 16, 1, 16, 16, 1, 9, 9, 9, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Android.FakeToken.B", "A.H.Pay.Erop.YG", "Android.Trojan.SMSBot.B", "AndroidOS/FakeToken.B", "HEUR:Trojan-Banker.AndroidOS.Faketoken.a", "Android.Trojan.SMSBot.B", "Trojan.Android.SMSBot.b", "Android.Malware.Trojan", "Trojan:Android/SmsSpy.K", "Android.SmsSend.419.origin", "AndroidOS/FakeToken.B", "Trojan[Banker]/Android.Faketoken", "Android.Troj.at_Stealer.g.kcloud", "HEUR:Trojan-Banker.AndroidOS.Faketoken.a", "Android.Trojan.SMSBot.B", "Trojan.AndroidOS.SendSMS", "Android/FkToken.B" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "actor", "can", "even", "take", "his", "malicious", "activities", "to", "the", "next", "level", "by", "installing", "a", "remote", "application", "from", "a", "designated", "server", ",", "thus", "allowing", "him", "to", "install", "new", "malware", "once", "it", "is", "required", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Android", "malware", "creators", "have", "recently", "been", "mixing", "business", "with", "play." ]
[ 6, 14, 14, 16, 16, 16, 16, 16, 16, 16 ]
[ "DNS", "is", "an", "ideal", "fit", "for", "frequently", "exporting", "small", "chunks", "of", "custom", "encoded", "data", "i.e.", "credit", "card", "track", "1", "and", "track", "2", "data", "to", "an", "external,", "remote", "location." ]
[ 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 9, 16, 1, 9, 16, 16, 16, 16, 16, 16, 16, 16, 2, 10, 10 ]
[ "We", "have", "recently", "encountered", "very", "aggressive", "jabber", "spam", "campaign,", "advertising", "the", "Philadelphia", "ransomware." ]
[ 16, 16, 16, 16, 16, 16, 6, 14, 14, 16, 3, 11, 11 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Zusy.D39A16", "Win32.Trojan.WisdomEyes.16070401.9500.9800", "Backdoor.Trojan", "TSPY_REALTIME.A", "Trojan.RealSpy", "TSPY_REALTIME.A", "W32/Risk.KQTT-6320", "Trojan/Win32.HDC.C24097" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/Downloader.Delf.quw", "Win32.Trojan.WisdomEyes.16070401.9500.9770", "Win.Trojan.Downloader-57555", "Trojan.DownLoad2.37645", "BehavesLike.Win32.PUPXAS.ch", "Trojan.Graftor.D1EFD7", "TrojanDownloader:Win32/Blortios.C", "Trojan/Win32.Downloader.R18903", "Win32/Trojan.88b" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "In", "recent", "weeks,", "Unit", "42", "has", "been", "analyzing", "delivery", "documents", "used", "in", "spear-phishing", "attacks", "that", "drop", "a", "custom", "downloader", "used", "in", "cyber", "espionage", "attacks." ]
[ 16, 16, 16, 4, 12, 16, 16, 16, 16, 16, 16, 16, 1, 9, 16, 16, 16, 3, 11, 16, 16, 1, 9, 9 ]
[ "But", "over", "the", "past", "week,", "while", "performing", "research", "using", "Palo", "Alto", "Networks", "AutoFocus,", "we", "noticed", "a", "large", "uptick", "in", "the", "delivery", "of", "the", "Hancitor", "malware", "family", "as", "they", "shifted", "away", "from", "H1N1", "to", "distribute", "Pony", "and", "Vawtrak", "executables." ]
[ 16, 16, 0, 8, 8, 16, 16, 16, 16, 4, 12, 12, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 11, 11, 16, 16, 16, 16, 16, 3, 16, 16, 3, 16, 3, 11 ]
[ "Ransomware", "sure", "has", "had", "an", "uptick", "the", "past", "years;", "more", "and", "more", "variants", "appear", "while", "some", "have", "been", "leading", "the", "pack", "for", "the", "past", "years." ]
[ 3, 16, 16, 16, 16, 16, 16, 0, 8, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 11, 11, 16, 0, 8 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/Clicker.Small.ht", "Win32/TrojanClicker.Small.HT", "W32/TrojanX.MXY", "Smalltroj.BDN", "Win32.Small.ht", "Trojan-Clicker.Win32.Small.ht", "Trojan.Clicker.Small.HT", "TrojWare.Win32.TrojanClicker.Small.HT", "Trojan-Clicker.Win32.Small.ht", "Win32/TrojanClicker.Small.HT", "TR/Click.Small.HT", "W32/TrojanX.MXY", "Trojan-Downloader.Win32.Small!IK", "Trojan.Click.Small.HT", "TrojanClicker:Win32/Small.BB", "Trojan.Clicker.Small.HT", "Win-Trojan/Downloader.120895", "Trojan-Clicker.Win32.Small.ht", "Trojan-Clicker.Small.HT", "Trojan-Clicker.Small.HT", "Trojan.Clicker.Autoit", "Trojan-Downloader.Win32.Small", "W32/Small.HT!tr", "Trj/Downloader.MDW" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "source", "process", "looks", "at", "its", "own", "memory", "to", "calculate", "the", "offset", "between", "the", "beginning", "of", "the", "libc", "library", "and", "the", "mmap", "address", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Win32.Badur!O", "Win32.Trojan.WisdomEyes.16070401.9500.9996", "TR/Rogue.1517892", "Trojan/Win32.Badur", "TrojanDownloader:MSIL/Balamid.A", "Trojan.Zusy.D13D03", "Trojan.Badur", "Trojan.Badur!" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "company", "later", "released", "a", "whitepaper", "which", "described", "Qbot", "version", "910", "in", "great", "detail." ]
[ 16, 4, 16, 16, 16, 16, 16, 16, 3, 11, 11, 16, 16, 16 ]
[ "The", "investigation", "found", "a", "supply", "chain-focused", "attack", "at", "M.E.Doc", "software", "that", "delivered", "a", "destructive", "payload", "disguised", "as", "ransomware." ]
[ 16, 16, 16, 16, 1, 9, 9, 3, 3, 11, 16, 16, 16, 16, 3, 16, 16, 3 ]
[ "There", "were", "several", "things", "that", "struck", "us", "as", "both", "interesting", "and", "concerning", "about", "the", "details;", "a", "threat", "actor", "known", "to", "operate", "in", "South", "East", "Asia", "is", "now", "using", "secure", "sockets", "layer", "SSL", "encryption", "in", "their", "malware." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 6, 14, 14, 16, 16, 16, 16, 2, 10, 10, 16, 16, 16, 1, 9, 9, 1, 1, 16, 16, 3 ]
[ "The", "path", "that", "is", "used", "for", "the", "uploads", "is", ":", "http", ":", "//", "/apps/d/p/op.php", "The", "communication", "looks", "like", "this", ":", "First", "Phase", "The", "first", "phase", "of", "the", "app", "’", "s", "attack", "flow", "collects", "device", "information", "and", "a", "list", "of", "apps", "installed", "on", "the", "device", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 9, 9, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Downloader.Banload.10000", "Trojan.Banker", "Win32.Trojan.WisdomEyes.16070401.9500.9955", "Trojan.DownLoader13.22599", "W32/Banker.ABCU!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Downloader.Braidupdate.C", "Trojan.Downloader.Braidupdate.C", "Trojan.Win32.Braidupdate.frhy", "W32/Downloader.AAJ", "Adware.BrowserAid", "Win32/TrojanDownloader.Braidupdate.C", "TROJ_BRAIDUPDT.C", "Worm.WinUpToDate", "Trojan-Downloader.Win32.Braidupdate.c", "Trojan.Downloader.Braidupdate.C", "Trojan.DL.Braidupdate!ucpSRQWfQfk", "Win32.Trojan-downloader.Braidupdate.Tayo", "Trojan.Downloader.Braidupdate.C", "TrojWare.Win32.TrojanDownloader.Braidupdate.C", "Trojan.Downloader.Braidupdate.C", "Trojan.Braid", "Downloader.Braidupdate.Win32.3", "TROJ_BRAIDUPDT.C", "W32/Downloader.IZKY-4160", "TR/Dldr.Braidupda.C", "W32/Braidupdate.C!tr.dldr", "Trojan[Downloader]/Win32.Braidupdate", "Trojan.Downloader.Braidupdate.C", "Troj.Downloader.W32.Braidupdate.c!c", "Trojan/Win32.Braidupdate", "TrojanDownloader:Win32/Braidupdate.C", "Trojan.Downloader.Braidupdate.C", "TrojanDownloader.Braidupdate", "not-a-virus:AdWare.Win32.Cash", "Trojan.Downloader.Braidupdate.C", "Downloader.Braidupdate.C", "Win32/Trojan.Downloader.2d9" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "Angler", "Exploti", "Kit", "has", "integrated", "CVE-2015-5119", "leaked", "from", "HackingTeam." ]
[ 16, 3, 11, 11, 16, 16, 1, 16, 16, 4 ]
[ "Although", "something", "had", "already", "been", "published", ",", "we", "decided", "to", "do", "something", "different", "with", "the", "data", "we", "acquired", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "From", "a", "technical", "point", "of", "view", ",", "the", "sample", "is", "a", "unique", "spy", "implant", "with", "stand-out", "features", "such", "as", "device", "sensors", "listeners", ",", "including", "motion", "detectors", "that", "have", "been", "implemented", "with", "a", "degree", "of", "originality", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "cyber", "industry", "of", "mobile", "malware", "is", "becoming", "more", "focused", "on", "making", "profits", "more", "effectively", ",", "i.e.", ",", "mobile", "phishing", ",", "theft", "of", "credit", "card", "information", ",", "money", "transfers", "from", "bank", "cards", "to", "mobile", "phones", "and", "from", "phones", "to", "the", "criminalas", "’", "e-wallets", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Google", "Cloud", "Messaging", "is", "designed", "to", "send", "short", "message", "(", "up", "to", "4", "KB", ")", "to", "mobile", "devices", "via", "Google", "services", "." ]
[ 5, 13, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16, 16 ]
[ "Gafgyt", "botnet", "attacking", "Netcore", "routers" ]
[ 3, 11, 16, 5, 13 ]
[ "During", "our", "continued", "research", "on", "Sofacy's", "Komplex", "Trojan,", "we", "have", "found", "a", "sample", "of", "a", "backdoor", "Trojan", "that", "we", "believe", "the", "Sofacy", "group", "uses", "when", "targeting", "individuals", "running", "macOS", "systems." ]
[ 16, 16, 16, 16, 16, 6, 3, 3, 11, 16, 16, 16, 3, 16, 16, 3, 11, 16, 16, 16, 6, 14, 14, 16, 16, 16, 4, 16, 5, 13 ]
[ "There", "are", "two", "variations", "of", "the", "emails:", "one", "is", "an", "order", "confirmation", "from", "a", "Japanese", "equipment", "supplier", "and", "the", "other", "pretends", "to", "come", "from", "a", "local", "printing", "company." ]
[ 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 1, 9, 9, 9, 9, 9, 9, 16, 16, 16, 16, 16, 16, 16, 1, 9, 9, 9 ]
[ "It", "is", "issued", "by", "Google", "once", "a", "user", "successfully", "logged", "into", "this", "account", "." ]
[ 16, 16, 16, 16, 4, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "To", "surface", "its", "ransom", "note", ",", "it", "uses", "a", "series", "of", "techniques", "that", "take", "advantage", "of", "the", "following", "components", "on", "Android", ":", "The", "β€œ", "call", "”", "notification", ",", "among", "several", "categories", "of", "notifications", "that", "Android", "supports", ",", "which", "requires", "immediate", "user", "attention", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "This", "post", "will", "start", "to", "explore", "some", "of", "these", "obfuscations", "to", "get", "a", "better", "understanding", "of", "how", "FormBook", "works." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "[Zscaler]", "has", "covered", "Dridex", "Banking", "Trojan", "being", "delivered", "via", "various", "campaigns", "involving", "Office", "documents", "with", "malicious", "VBA", "macros", "in", "the", "past." ]
[ 4, 16, 16, 3, 11, 11, 16, 16, 16, 16, 6, 16, 1, 9, 16, 7, 15, 15, 16, 16, 0 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan-GameThief.Win32.OnLineGames!O", "Win32.Trojan.WisdomEyes.16070401.9500.9987", "Trojan.Drondog", "Win.Downloader.29758-2", "Worm.Win32.Downloader.bldi", "Trojan.Win32.MLW.xzlu", "W32.W.Downloader.hq!c", "Trojan.MulDrop.15154", "Trojan.Win32.KillAV", "Worm/Downloader.fd", "TR/Sorri.O", "Worm/Win32.Downloader", "Win32.Troj.DownLoaderT.hu.147456", "Trojan:Win32/Wiessy.A", "Worm/Win32.Downloader.R2522" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "\"", "Tracking", "tool", "''", "or", "an", "\"", "Admin", "tool", "''", "are", "often", "cited", "for", "these", "kinds", "of", "tools", "for", "\"", "commercial", "''", "or", "\"", "enterprise", "''", "usage", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "malware", "is", "able", "to", "control", "banking", "transactions", "conducted", "using", "Internet", "Explorer,", "and", "harvest", "email", "credentials,", "which", "are", "in", "turn", "used", "to", "spread", "the", "malware", "further." ]
[ 16, 3, 16, 16, 16, 1, 9, 9, 16, 16, 5, 13, 16, 1, 9, 9, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.DownLoader4.13271" ]
[ 16, 3, 16, 16, 16, 1 ]
[ "Tap", "Menu", ">", "Play", "Protect", "." ]
[ 16, 16, 16, 16, 16, 16 ]
[ "Other", "variants", "use", "other", "names", "and", "logos", ",", "as", "described", "later", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "However", ",", "Proofpoint", "researchers", "have", "recently", "observed", "phishing", "attacks", "that", "incorporate", "all", "of", "these", "elements", "in", "a", "single", ",", "multistep", "scheme", "involving", "the", "Marcher", "Android", "banking", "Trojan", "targeting", "customers", "of", "large", "Austrian", "banks", "." ]
[ 16, 16, 4, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.DelfiDelfi.Win32.301", "Trojan.Win32.DelfiDelfi.cho", "Trojan.Win32.DelfiDelfi.etgljb", "W32/Trojan.AITA-6805", "Trojan.Win32.DelfiDelfi.cho", "TrojanDownloader:Win32/Banavkill.A", "Trj/GdSda.A", "Trojan.DelfiDelfi!", "W32/Banker.AEAY!tr.spy", "Win32/Trojan.af4" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan-PWS/W32.WebGame.37860.B", "Trojan-PSW.Win32.Yahu.YPager!O", "Trojan/PSW.Yahu.YPager.r", "Trojan.Kazy.D15AC9", "Win32.Trojan.WisdomEyes.16070401.9500.9973", "W32/Pws.BHSA", "Win32/YPager.D", "Trojan.Win32.Scar.kjpu", "Troj.W32.Scar!c", "TrojWare.Win32.PSW.YahooPager.R0", "Trojan.DownLoader6.48717", "Trojan.Yahoo.Win32.38", "BehavesLike.Win32.Virus.nt", "Trojan-PWS.Win32.Yahoo", "W32/PWS.TYKP-7651", "Trojan/PSW.Yahu.y", "Trojan[PSW]/Win32.Yahu", "Trojan.Win32.Scar.kjpu", "Trojan/Win32.Jorik.C1078", "Win32/PSW.Yahoo.YPager.R", "Win32.Trojan.Scar.Pfsz", "W32/Yahoo_YPager.R!tr.pws" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "samples", "we", "identified", "target", "the", "ATM", "vendor", "Diebold." ]
[ 16, 16, 16, 16, 16, 16, 5, 13, 13 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan-Dropper.Win32.Taob.ag", "Trojan.DR.Taob!NlMVsECgQGE", "Trojan.MulDrop4.3634", "TR/PSW.OnlineGames.wtog", "TrojanDropper.Taob.o", "Win32.Troj.Taob.ag.kcloud", "Trojan:Win32/Cortheaper.A", "Trojan-GameThief.Win32.OnLineGames" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]