tokens
sequencelengths 2
296
| ner_tags
sequencelengths 2
296
|
---|---|
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor/Bifrose.sxu",
"Win32.Trojan.WisdomEyes.16070401.9500.9583",
"W32/Backdoor.BVIJ-4494",
"BKDR_BIFROSE_0000025.TOMA",
"Win.Trojan.Bifrose-3481",
"Trojan.Win32.Bifrose.isow",
"Backdoor.Win32.A.Bifrose.51712.B[h]",
"Trojan.MulDrop.16295",
"Backdoor.Bifrose.Win32.79774",
"W32/Backdoor2.BVUS",
"Backdoor/SdBot.ees",
"WORM/IrcBot.353792",
"Trojan[Backdoor]/Win32.Bifrose",
"Trojan:Win32/Mdrop.A",
"Backdoor/Win32.Bifrose.C64544",
"Backdoor.Bifrose!Gi2ynDtXmII",
"Backdoor.Win32.Bifrose"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"With",
"the",
"malware",
"now",
"in",
"place",
",",
"a",
"number",
"of",
"actions",
"can",
"be",
"performed",
",",
"including",
"allowing",
"attackers",
"to",
"secretly",
"monitor",
"and",
"control",
"smartphones",
"via",
"a",
"backdoor",
",",
"send",
"messages",
"to",
"premium-rate",
"numbers",
",",
"and",
"intercept",
"two-factor",
"authentication",
"codes",
"sent",
"by",
"online",
"banking",
"apps",
"and",
"the",
"like",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.PDF.Phishing.UX",
"Trojan.PDF.Phish.ve",
"Trojan.PDF.Phishing.UX",
"Trojan.PDF.Phishing.UX",
"EXP/Pidief.EB.523",
"Trojan.PDF.Phishing.UX",
"Trojan.PDF.Phish.ve",
"Trojan.PDF.Phishing.UX",
"Trojan.PDF.Phishing.UX"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.FamVT.ExpiroPC.PE",
"Worm/W32.Small.6084.H",
"Email-Worm.Win32.Zhelatin!O",
"Email-Worm.Win32.Zhelatin.h",
"W32.W.Zhelatin.l03u",
"TrojWare.Win32.Small.DBY",
"Worm.Zhelatin.Win32.4001",
"Downloader-BAI.dam",
"Worm/Zhelatin.ok",
"TR/Small.DBY.Y",
"Worm[Email]/Win32.Zhelatin",
"Email-Worm.Win32.Zhelatin.h",
"Win32/Luder.O",
"Downloader-BAI.dam",
"Email-Worm.Win32.Zhelatin",
"W32/DldBAI.H!dam",
"Trj/Alanchum.PH"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"Locky",
"ransomware",
"has",
"been",
"very",
"active",
"since",
"its",
"return",
"which",
"we",
"documented",
"in",
"a",
"previous",
"blog",
"post."
] | [
3,
11,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"About",
"two-thirds",
"of",
"these",
"apps",
"show",
"some",
"kind",
"of",
"malicious",
"behavior,",
"including",
"displaying",
"ads",
"and",
"downloading",
"apps",
"without",
"the",
"user's",
"consent."
] | [
16,
3,
16,
16,
3,
16,
16,
16,
16,
3,
11,
16,
1,
9,
16,
1,
9,
9,
9,
9,
9
] |
[
"However,",
"we",
"just",
"recently",
"found",
"new",
"Sage",
"samples",
"that,",
"while",
"they",
"appear",
"to",
"still",
"be",
"Sage",
"2.2,",
"now",
"have",
"added",
"tricks",
"focused",
"on",
"anti-analysis",
"and",
"privilege",
"escalation."
] | [
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
7,
15
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32/Spamtool.Y",
"Trojan.Dropper",
"Win32/Mendrem.A",
"Win.Trojan.Proxy-4705",
"Troj.Proxy.W32!c",
"Trojan.MulDrop.4012",
"BehavesLike.Win32.Backdoor.cm",
"Trojan-Downloader.Win32.LoadAdv",
"W32/Spamtool.LPPN-6055",
"Spammer:Win32/Kukunefo.A",
"TScope.Malware-Cryptor.SB",
"Trj/CI.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"When",
"the",
"files",
"are",
"encrypted",
"they",
"DO",
"NOT",
"change",
"file",
"name",
"or",
"extensions",
"and",
"appear",
"normal",
"to",
"the",
"victim",
"until",
"you",
"try",
"to",
"open",
"them."
] | [
16,
16,
1,
16,
16,
16,
16,
16,
16,
1,
9,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Based",
"on",
"our",
"detection",
"statistics",
",",
"the",
"main",
"infection",
"vector",
"is",
"the",
"spread",
"of",
"Trojanized",
"applications",
"directly",
"to",
"victims",
"via",
"Telegram",
"and",
"WhatsApp",
"messengers",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"During",
"the",
"installation",
",",
"the",
"malware",
"asks",
"for",
"the",
"following",
"permissions",
":",
"READ_PHONE_STATE",
"-",
"Allows",
"read-only",
"access",
"to",
"the",
"phone",
"state",
",",
"including",
"the",
"current",
"cellular",
"network",
"information",
",",
"the",
"status",
"of",
"any",
"ongoing",
"calls",
",",
"and",
"a",
"list",
"of",
"any",
"PhoneAccounts",
"registered",
"on",
"the",
"device",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"If",
"the",
"malware",
"determines",
"that",
"is",
"not",
"running",
"on",
"an",
"emulator",
",",
"it",
"then",
"performs",
"additional",
"checks",
"to",
"ensure",
"that",
"it",
"wo",
"n't",
"be",
"detected",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/W32.NForwarded.401408.F",
"Trojan.Beaugrit.A.mue",
"Trojan/Spy.Banhguo.a",
"Win32.Trojan-Spy.Banhguo.a",
"Trojan.Win32.KillFiles.dmlrmm",
"Trojan.Win32.PSWIGames.401408.J",
"TrojWare.Win32.Lmir.RL",
"Trojan.KillFiles.17459",
"Backdoor.PePatch.Win32.55641",
"BehavesLike.Win32.Dropper.fc",
"TR/Banhguo.aone",
"Trojan.Symmi.DBA11",
"Trojan/Win32.OnLineGames.R127640",
"W32/Banhguo.A!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.FamVT.ExpiroPC.PE",
"Virus.W32.Hupigon.Fqm!c",
"BehavesLike.Win32.RAHack.fc",
"KIT/Mac.Walrus.121",
"HackTool[Constructor]/Win32.Walrus",
"Constructor:W97M/Walrus.1_21.dam#2",
"Trj/CI.A",
"Win32/Trojan.488"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"This",
"information",
"can",
"give",
"the",
"attacker",
"access",
"to",
"personal",
"and",
"business",
"bank",
"accounts",
",",
"personal",
"and",
"business",
"data",
",",
"and",
"more",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Uds.Dangerousobject.Multi!c",
"Win32.Trojan.WisdomEyes.151026.9950.9988",
"Heur.AdvML.C",
"Trojan.Win32.MulDrop5.dbmdce",
"BehavesLike.Win32.BrowseFox.nh",
"W32/CoinMiner.QR!tr",
"Trojan.Zusy.D17C80",
"PUP/Win32.BitCoinMiner.C350160",
"Trojan:Win32/Figyek.A",
"Win32.Trojan.Adware.Wnmi",
"Trojan.CoinMiner",
"CoinMiner.BLK",
"Trojan.Win32.CoinMiner.QR",
"Win32/Trojan.713"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Packed.Krap.b.3",
"Packer.Malware.NSAnti.1",
"Trojan:Win32/Inhoo.A",
"Packer.Malware.NSAnti.1",
"Trojan-GameThief.Win32.Magania.aigw"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Dropper.Axesoft.A",
"Trojan-Dropper/W32.Axesoft.800094",
"Trojandropper.Axesoft",
"Trojan.Dropper.Axesoft.A",
"Trojan/Dropper.Axesoft",
"TROJ_AXESOFT.A",
"TROJ_AXESOFT.A",
"Trojan.Dropper.Axesoft.A",
"Trojan-Dropper.Win32.Axesoft",
"Trojan.Dropper.Axesoft.A",
"Trojan.Win32.Axesoft-Drp.fdro",
"Troj.Dropper.W32.Axesoft!c",
"Trojan.Dropper.Axesoft.A",
"Trojan.Dropper.Axesoft.A",
"Trojan.MulDrop.216",
"Dropper.Axesoft.Win32.2",
"BehavesLike.Win32.Dropper.bc",
"Trojan-PWS.Win32.QQPass",
"W32/Trojan.RHJF-8903",
"TrojanDropper.Axesoft",
"W32.Trojan.Dropper-AxeSoft",
"BDS/GWGirl.12.C",
"Trojan.Dropper.Axesoft.A",
"Trojan-Dropper.Win32.Axesoft",
"BackDoor-SP.dr",
"TrojanDropper.Axesoft",
"Win32/TrojanDropper.Axesoft",
"Win32.Trojan-dropper.Axesoft.Apde",
"Trojan.DR.Axesoft!crjcgQTkDRg",
"W32/Bdoor.SP!tr",
"Win32/Trojan.Dropper.d68"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Initial",
"reports",
"of",
"a",
"new",
"variant",
"of",
"ransomware",
"called",
"LockCrypt",
"started",
"in",
"June",
"of",
"this",
"year."
] | [
16,
16,
16,
16,
3,
11,
16,
3,
16,
3,
16,
16,
0,
8,
8,
8
] |
[
"But",
"the",
"3rd",
"ASEAN-United",
"States",
"Summit",
"on",
"21",
"November",
"2015",
"did",
"not",
"disappoint."
] | [
16,
16,
4,
12,
12,
12,
16,
0,
8,
8,
16,
16,
16
] |
[
"The",
"cybercriminals",
"then",
"send",
"this",
"money",
"to",
"a",
"digital",
"wallet",
"or",
"to",
"a",
"premium",
"number",
"and",
"cash",
"it",
"in",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.OnGamesLT180912HKGHAAI.Trojan",
"Trojan-Downloader.Win32.Losabel!O",
"Downloader.Losabel.Win32.540",
"Trojan/Downloader.Losabel.nx",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Trojan.Popwin",
"BehavesLike.Win32.Trojan.fh",
"TrojanDownloader.Losabel.cx",
"Trojan[Downloader]/Win32.Losabel",
"TrojanDropper:Win32/Idicaf.A",
"Trojan/Win32.OnlineGameHack.C187141",
"Trojan.DL.Losabel!C2fG9tSV6gk",
"Trj/Pupack.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"Intent",
"object",
"carries",
"a",
"string",
"value",
"as",
"β",
"action",
"β",
"parameter",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Among",
"the",
"over",
"1.4",
"billion",
"devices",
"protected",
"by",
"Verify",
"Apps",
",",
"we",
"observed",
"fewer",
"than",
"3",
"dozen",
"installs",
"of",
"Chrysaor",
"on",
"victim",
"devices",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16
] |
[
"It",
"appears",
"to",
"be",
"run",
"by",
"a",
"Russian-speaking",
"group",
"of",
"hackers."
] | [
16,
16,
16,
16,
16,
16,
16,
6,
14,
14,
14
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Kazy.D54BC4",
"Win32.Trojan.WisdomEyes.16070401.9500.9993",
"Tool.PassView.859",
"Trojan/Blocker.jhq",
"Win32.Troj.Foxhiex.a.kcloud",
"Trojan/Win32.Zbot.C284570",
"Trojan.MSIL.CryptoObfuscator",
"Trj/GdSda.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"P2P-Worm.Win32.Krepper!O",
"Worm.Krepper.A.mue",
"Worm.Krepper.Win32.1",
"W32/Krepper.c",
"W32.IRCBot",
"Win32/Sndc.A",
"WORM_SHAREBOT.A",
"Win.Worm.Poom-1",
"P2P-Worm.Win32.Krepper.c",
"Trojan.Win32.Krepper.dqeaqt",
"Troj.GameThief.W32.OnLineGames.lgKp",
"Win32.Worm-p2p.Krepper.Ljjq",
"Worm.Win32.Krepper.C",
"Win32.HLLW.Krepper",
"WORM_SHAREBOT.A",
"BehavesLike.Win32.PUPXAX.lz",
"W32/Pcbot.A@p2p",
"Trojan/Krepper.ad",
"WORM/Krepper.C",
"Worm[P2P]/Win32.Krepper",
"Worm:Win32/Krepper.B",
"Trojan.Win32.Krepper.11808",
"P2P-Worm.Win32.Krepper.c",
"Worm.Krepper",
"I-Worm.Krepper.C",
"Win32/Krepper.C",
"Worm.P2P.Krepper!dcAWP425Bzk",
"P2P-Worm.Win32.Krepper",
"W32/Krepper.C!worm"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Mobile",
"developers",
"have",
"recently",
"begun",
"eschewing",
"traditional",
"app",
"stores",
"and",
"instead",
"want",
"to",
"deliver",
"their",
"software",
"directly",
"through",
"their",
"own",
"means",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Worryingly",
",",
"some",
"of",
"the",
"modifications",
"enforced",
"by",
"the",
"spyware",
"might",
"expose",
"the",
"infected",
"devices",
"to",
"further",
"compromise",
"or",
"data",
"tampering",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"sort",
"of",
"conversion",
"allows",
"Python",
"code",
"to",
"be",
"run",
"in",
"a",
"Windows",
"environment",
"without",
"pre-installed",
"Python",
"binaries",
"."
] | [
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
5,
16,
16
] |
[
"Through",
"our",
"on-going",
"investigation",
"and",
"monitoring",
"of",
"this",
"targeted",
"attack",
"campaign,",
"we",
"found",
"suspicious",
"URLs",
"that",
"hosted",
"a",
"newly",
"discovered",
"zero-day",
"exploit",
"in",
"Java",
"now",
"identified",
"by",
"Oracle",
"as",
"CVE-2015-2590."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
6,
14,
16,
16,
1,
9,
16,
16,
16,
16,
16,
7,
15,
16,
5,
16,
16,
16,
4,
16,
1
] |
[
"The",
"campaign",
"was",
"identified",
"starting",
"with",
"the",
"registration",
"on",
"2023-04-05",
"16:04:51",
"up",
"to",
"the",
"latest",
"registration",
"on",
"2023-04-10",
"08:33:28."
] | [
6,
14,
16,
16,
16,
16,
16,
16,
16,
0,
8,
16,
16,
16,
16,
16,
16,
0,
8
] |
[
"It",
"has",
"been",
"attacking",
"Iranian",
"users."
] | [
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/W32.Makecall.20484",
"Trojan.Makecall",
"Trojan.Makecall.Win32.5",
"TROJ_MAKECALL.A",
"W32/MalwareF.VJTB",
"W32.Makecall.Trojan",
"TROJ_MAKECALL.A",
"Trojan.Win32.Makecall.a",
"Trojan.Win32.Makecall.fkdu",
"Trojan.Win32.S.Makecall.20484",
"Troj.W32.Makecall.a!c",
"Trojan.MulDrop.717",
"BehavesLike.Win32.VBObfus.mz",
"W32/Risk.QDBN-9051",
"Trojan/MakeCall.d",
"TR/Makecall.a",
"Trojan/Win32.Makecall",
"Trojan:Win32/Makecall.A",
"Trojan.Win32.Makecall.a",
"Trojan/Win32.Makecall.R109087",
"SScope.Trojan.VBRA.3284",
"Win32/Makecall.A",
"Win32.Trojan.Makecall.Ecul",
"Trojan.Makecall!Hu8pme7fStI",
"Trojan.Win32.Makecall",
"W32/Makecall.A!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32/Sipay.ADV",
"Trojan.Crypt.GU",
"Trojan/W32.Small.15872.S",
"Trojan.Small.Win32.4658",
"Trojan/Small.xut",
"Trojan.Win32.Small.glefu",
"Win32/TrojanDownloader.FakeAlert.JI",
"WORM_SMALL.MDA",
"Trojan.Small-8598",
"Trojan.Crypt.GU",
"Trojan.Crypt.GU",
"Trojan.Small!AZKO6qCeQTg",
"Trojan.Win32.Small.15872.Q[h]",
"Trojan.Dropper/AdobeFake",
"Trojan.Crypt.GU",
"TrojWare.Win32.Small.~YE",
"Trojan.Crypt.GU",
"Trojan.DownLoader10.48865",
"WORM_SMALL.MDA",
"W32/Trojan2.EQHY",
"Trojan/Small.fnb",
"Trojan/Win32.Small",
"Win32.Troj.Small.kcloud",
"Trojan.Crypt.GU",
"Win-Trojan/Downloader.15872.GU",
"TrojanDownloader:Win32/Bofang.C",
"Trojan.Crypt.GU",
"Trojan.Small",
"Trojan-Downloader.HG",
"W32/FakeAlert.JI!tr.dldr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"In",
"addition,",
"Xbot",
"will",
"steal",
"all",
"SMS",
"messages",
"and",
"contact",
"information,",
"intercept",
"certain",
"SMS",
"messages,",
"and",
"parse",
"SMS",
"messages",
"for",
"mTANs",
"Mobile",
"Transaction",
"Authentication",
"Number",
"from",
"banks."
] | [
16,
16,
3,
16,
1,
9,
9,
9,
16,
1,
9,
16,
16,
1,
9,
16,
16,
1,
9,
9,
9,
9,
9,
9,
9,
16,
4
] |
[
"Using",
"both",
"the",
"Elknot",
"and",
"BillGates",
"DDoS",
"malware,",
"these",
"attackers",
"have",
"continued",
"to",
"infect",
"vulnerable",
"Elasticsearch",
"servers",
"in",
"order",
"to",
"enhance",
"their",
"DDoS",
"capabilities."
] | [
16,
16,
16,
3,
16,
3,
11,
11,
16,
6,
16,
16,
16,
16,
7,
5,
13,
16,
16,
16,
16,
16,
1,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/KillAV.a",
"TROJ_SPNR.38J614",
"Backdoor.Trojan",
"TROJ_SPNR.38J614",
"Uds.Dangerousobject.Multi!c",
"Trojan.Patched.Win64.2566",
"W64/Trojan.HLJR-4976",
"Trojan.KillAV!apRF/prfUvc",
"Trojan.Win64.Killav",
"W64/KillAV.A!tr",
"Trj/CI.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"It",
"now",
"appears",
"to",
"be",
"in",
"the",
"league",
"of",
"full-blown",
"banking",
"trojans",
"such",
"as",
"Dyreza,",
"Neverquest/Vawtrak,",
"Zeus,",
"etc."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
3,
11,
11,
16
] |
[
"DIMNIE",
"is",
"a",
"modular",
"information",
"stealer",
"profiled",
"earlier",
"this",
"year",
"by",
"security",
"researchers",
"at",
"PaloAlto",
"s",
"Unit",
"42,",
"who",
"found",
"the",
"malware",
"in",
"targeted",
"phishing",
"attacks",
"against",
"open-source",
"developers."
] | [
3,
16,
16,
1,
9,
9,
16,
0,
8,
8,
16,
4,
12,
16,
4,
16,
4,
12,
16,
16,
16,
3,
16,
1,
9,
9,
16,
4,
12
] |
[
"History",
"has",
"shown",
"us",
"that",
",",
"in",
"time",
",",
"these",
"attacks",
"will",
"use",
"zero-day",
"vulnerabilities",
",",
"exploits",
"or",
"a",
"combination",
"of",
"techniques",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
7,
15,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.UserinitWininit.Trojan",
"Trojan.Delf.QEO",
"Trojan.Bancteian.CB4",
"Trojan.Delf.QEO",
"Trojan/Spy.Delf.qgs",
"Trojan.Delf.QEO",
"Win32.Virus.Delf.c",
"W32/Delf.UD",
"TROJ_BANCTEIAN.SM",
"Win.Trojan.Bancteian-0-6418983-0",
"Trojan.Delf.QEO",
"Trojan.Delf.QEO",
"Trojan.Win32.Delf.3301398",
"Trojan.Delf.QEO",
"Backdoor.Win32.Delf.~DD",
"Trojan.Delf.QEO",
"Adware.BrowseFox.Win32.220566",
"TROJ_BANCTEIAN.SM",
"BehavesLike.Win32.Trojan.wh",
"Trojan.Win32.Bancteian",
"W32/Delf.CERT-0413",
"Trojan.Reconyc.apf",
"W32.Trojan.Delf",
"TR/BAS.Samca.lsswh",
"Trojan/Win32.Delf.nbw",
"Trojan:Win32/Bancteian.B",
"Trojan/Win32.Bancteian.R174475",
"Trojan.Reconyc",
"Trojan.Win32.Delf.qgs",
"W32/Delf.QGS!tr.spy"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Depending",
"on",
"the",
"intent",
"triggered",
",",
"one",
"of",
"two",
"Receivers",
"would",
"be",
"called",
",",
"in",
"this",
"instance",
"they",
"are",
"called",
"Boot",
"or",
"Time",
"but",
"the",
"name",
"is",
"somewhat",
"immaterial",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Text",
"message",
"and",
"call",
"logs",
"were",
"transmitted",
"every",
"72",
"hours",
"to",
"the",
"Shanghai",
"server",
",",
"and",
"once",
"a",
"day",
"for",
"other",
"personally",
"identifiable",
"data",
",",
"the",
"company",
"says",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Until",
"now",
",",
"we",
"haven",
"β",
"t",
"seen",
"targeted",
"attacks",
"against",
"mobile",
"phones",
",",
"although",
"we",
"β",
"ve",
"seen",
"indications",
"that",
"these",
"were",
"in",
"development",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"In",
"one",
"of",
"our",
"previous",
"blog",
"entries,",
"we",
"covered",
"how",
"the",
"threat",
"actor",
"known",
"as",
"Winnti",
"was",
"using",
"GitHub",
"to",
"spread",
"malware",
"β",
"a",
"development",
"that",
"shows",
"how",
"the",
"group",
"is",
"starting",
"to",
"evolve",
"and",
"use",
"new",
"attack",
"methods",
"beyond",
"their",
"previous",
"tactics",
"involving",
"targeted",
"attacks",
"against",
"gaming,",
"pharmaceutical,",
"and",
"telecommunications",
"companies."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
6,
14,
14,
16,
16,
6,
16,
16,
5,
16,
16,
3,
16,
16,
16,
16,
16,
16,
6,
14,
16,
16,
16,
16,
16,
16,
1,
9,
9,
16,
16,
16,
16,
16,
16,
1,
16,
4,
12,
16,
4,
12
] |
[
"The",
"malware",
"simulates",
"clicks",
"on",
"app",
"advertisements",
"provided",
"by",
"legitimate",
"ad",
"networks",
"and",
"forces",
"the",
"app",
"to",
"install",
"on",
"a",
"device",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.MSIL.Downloader.AD",
"Trojan.MSIL.Downloader.AD",
"Trojan.MSIL.Downloader.AD",
"Trojan.MSIL.Downloader.AD",
"Trojan.Win32.Inject.ewmdhe",
"Troj.MSIL.Disfa.mCrY",
"Trojan.MSIL.Downloader.AD",
"TrojWare.MSIL.Inject.TEQ",
"Trojan.MSIL.Downloader.AD",
"TR/Inject.xbeihg",
"TrojanDownloader:MSIL/Datsup.A",
"Trojan.MSIL.Downloader.AD",
"Trj/CI.A",
"MSIL/Dloader.AWE!tr",
"Win32/Trojan.cd2"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Exp.RTF.CVE-2017-8759.D",
"Trojan.Mdropper",
"Win32/Exploit.CVE-2017-8759.A",
"TROJ_ARTIEF.JEJOWP",
"Rtf.Downloader.CVE_2017-6336326-3",
"Exploit.MSOffice.CVE-2017-8759.a",
"Exploit.Ole2.CVE-2017-8759.estduh",
"RTF.S.Exploit.44738",
"Exploit.Msoffice.Cve!c",
"Exploit.CVE-2017-8759.5",
"TROJ_ARTIEF.JEJOWP",
"RTF/Trojan.BGKX-2",
"HEUR:Exploit.MSOffice.CVE-2017-8759.a",
"Exploit.CVE-2017-8759",
"Office.Exploit.Cve-2017-8759.Ajle",
"Trojan.Win32.Exploit",
"Malicious_Behavior.SB",
"Win32/Trojan.Exploit.024"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Downloader.Farfly.L",
"Multi.Threats.InArchive",
"W32/Risk.NCBB-0700",
"Trojan.Farfli",
"Win.Trojan.Downloader-2275",
"Trojan.Downloader.Farfly.L",
"Trojan.Downloader.Farfly.L",
"Trojan.Win32.Crypted.dkwpfn",
"Trojan.Win32.Z.Downloader.266845",
"Trojan.Downloader.Farfly.L",
"Trojan.DownLoader4.59614",
"Downloader.Selvice.Win32.747",
"TROJ_DLOADR.SMQ",
"Trojan-Downloader.Win32.Selvice",
"W32/MalwareS.ASNW",
"Trojan.Downloader.Farfly.L",
"TrojanDownloader:Win32/Caxnet.B",
"Worm.WhiteIce",
"Trojan.Downloader.Farfly.L",
"Trojan.Downloader.Farfly.L",
"Trojan.DL.Selvice!qQfZyIPcdpU",
"Win32/Trojan.Downloader.6fb"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Win32.Hijacker.kvdpi",
"TROJ_DYER.BMC",
"Trojan.Enfal-7",
"HEUR:Trojan.Win32.Invader",
"Trojan.Hijacker!h2YIjU+BiQU",
"Trojan.DownLoader7.14277",
"TROJ_DYER.BMC",
"Trojan/Invader.exe",
"W32/Bfr.2!tr",
"Trojan[:HEUR]/Win32.Invader",
"Win-Trojan/Inject.16896.IT",
"Win32.Trojan.Hijacker.Ebqw",
"Trojan.Win32.Sanpec",
"Win32/Trojan.1da"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"attacks",
"we",
"attribute",
"to",
"Scarlet",
"Mimic",
"have",
"primarily",
"targeted",
"Uyghur",
"and",
"Tibetan",
"activists",
"as",
"well",
"as",
"those",
"who",
"are",
"interested",
"in",
"their",
"causes."
] | [
16,
1,
16,
16,
16,
6,
14,
16,
16,
16,
4,
12,
12,
12,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"new",
"threat",
"also",
"uses",
"a",
"macro",
"to",
"infect",
"the",
"target's",
"computer,",
"but",
"rather",
"than",
"retrieving",
"a",
"binary",
"payload,",
"it",
"relies",
"on",
"various",
"scripts",
"to",
"maintain",
"its",
"presence",
"and",
"to",
"communicate",
"via",
"hacked",
"websites,",
"acting",
"as",
"proxies",
"for",
"the",
"command",
"and",
"control",
"server."
] | [
16,
3,
11,
16,
16,
16,
3,
16,
3,
5,
13,
13,
16,
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
1,
9,
16,
16,
1,
16,
1,
9,
9,
9,
9
] |
[
"After",
"the",
"next",
"run",
"of",
"the",
"infected",
"application",
",",
"the",
"β",
"boot",
"β",
"module",
"will",
"run",
"the",
"β",
"patch",
"β",
"module",
",",
"which",
"hooks",
"the",
"methods",
"from",
"known",
"ad",
"SDKs",
"to",
"its",
"own",
"implementation",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Downloader.Myxa.Win32.113",
"Trojan/Downloader.Myxa.cit",
"Trojan.Kazy.D6034",
"TROJ_MONKIF.SMKP",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Downloader.Monkif",
"TROJ_MONKIF.SMKP",
"Win.Downloader.100478-1",
"Trojan.Win32.Myxa.bqhvc",
"Trojan.Win32.A.Downloader.22672.B",
"Trojan.DownLoad3.32720",
"Trojan-Downloader.Win32.Myxa",
"TrojanDownloader.Myxa.cx",
"TrojanDownloader:Win32/Monkif.T",
"Downloader/Win32.Monkif.R1925",
"TrojanDownloader.Myxa",
"Trj/Myxa.A",
"Trojan.DL.Myxa!oB3ehXmv9m8"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"When",
"we",
"talk",
"about",
"the",
"attackers,",
"there",
"is",
"this",
"misconception",
"that",
"they",
"are",
"these",
"super",
"villains",
"who",
"can",
"only",
"do",
"evil,",
"but",
"keep",
"in",
"mind",
"they",
"are",
"humans",
"too."
] | [
16,
16,
16,
16,
16,
6,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"His",
"repository",
"proves",
"that",
"he",
"is",
"indeed",
"an",
"Android",
"developer",
",",
"but",
"it",
"contained",
"no",
"publicly",
"available",
"code",
"of",
"the",
"Ashas",
"adware",
"at",
"the",
"time",
"of",
"writing",
"of",
"this",
"blogpost",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"macro",
"comes",
"into",
"users'",
"systems",
"through",
"a",
"spam",
"email",
"with",
"subjects",
"such",
"as",
"My",
"Resume,",
"Openings,",
"Internship,",
"etc."
] | [
16,
3,
16,
16,
5,
13,
16,
16,
1,
9,
16,
1,
16,
16,
1,
9,
9,
9,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Android.FakeToken.B",
"A.H.Pay.Erop.YG",
"Android.Trojan.SMSBot.B",
"AndroidOS/FakeToken.B",
"HEUR:Trojan-Banker.AndroidOS.Faketoken.a",
"Android.Trojan.SMSBot.B",
"Trojan.Android.SMSBot.b",
"Android.Malware.Trojan",
"Trojan:Android/SmsSpy.K",
"Android.SmsSend.419.origin",
"AndroidOS/FakeToken.B",
"Trojan[Banker]/Android.Faketoken",
"Android.Troj.at_Stealer.g.kcloud",
"HEUR:Trojan-Banker.AndroidOS.Faketoken.a",
"Android.Trojan.SMSBot.B",
"Trojan.AndroidOS.SendSMS",
"Android/FkToken.B"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"actor",
"can",
"even",
"take",
"his",
"malicious",
"activities",
"to",
"the",
"next",
"level",
"by",
"installing",
"a",
"remote",
"application",
"from",
"a",
"designated",
"server",
",",
"thus",
"allowing",
"him",
"to",
"install",
"new",
"malware",
"once",
"it",
"is",
"required",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Android",
"malware",
"creators",
"have",
"recently",
"been",
"mixing",
"business",
"with",
"play."
] | [
6,
14,
14,
16,
16,
16,
16,
16,
16,
16
] |
[
"DNS",
"is",
"an",
"ideal",
"fit",
"for",
"frequently",
"exporting",
"small",
"chunks",
"of",
"custom",
"encoded",
"data",
"i.e.",
"credit",
"card",
"track",
"1",
"and",
"track",
"2",
"data",
"to",
"an",
"external,",
"remote",
"location."
] | [
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9,
16,
1,
9,
16,
16,
16,
16,
16,
16,
16,
16,
2,
10,
10
] |
[
"We",
"have",
"recently",
"encountered",
"very",
"aggressive",
"jabber",
"spam",
"campaign,",
"advertising",
"the",
"Philadelphia",
"ransomware."
] | [
16,
16,
16,
16,
16,
16,
6,
14,
14,
16,
3,
11,
11
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Zusy.D39A16",
"Win32.Trojan.WisdomEyes.16070401.9500.9800",
"Backdoor.Trojan",
"TSPY_REALTIME.A",
"Trojan.RealSpy",
"TSPY_REALTIME.A",
"W32/Risk.KQTT-6320",
"Trojan/Win32.HDC.C24097"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/Downloader.Delf.quw",
"Win32.Trojan.WisdomEyes.16070401.9500.9770",
"Win.Trojan.Downloader-57555",
"Trojan.DownLoad2.37645",
"BehavesLike.Win32.PUPXAS.ch",
"Trojan.Graftor.D1EFD7",
"TrojanDownloader:Win32/Blortios.C",
"Trojan/Win32.Downloader.R18903",
"Win32/Trojan.88b"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"In",
"recent",
"weeks,",
"Unit",
"42",
"has",
"been",
"analyzing",
"delivery",
"documents",
"used",
"in",
"spear-phishing",
"attacks",
"that",
"drop",
"a",
"custom",
"downloader",
"used",
"in",
"cyber",
"espionage",
"attacks."
] | [
16,
16,
16,
4,
12,
16,
16,
16,
16,
16,
16,
16,
1,
9,
16,
16,
16,
3,
11,
16,
16,
1,
9,
9
] |
[
"But",
"over",
"the",
"past",
"week,",
"while",
"performing",
"research",
"using",
"Palo",
"Alto",
"Networks",
"AutoFocus,",
"we",
"noticed",
"a",
"large",
"uptick",
"in",
"the",
"delivery",
"of",
"the",
"Hancitor",
"malware",
"family",
"as",
"they",
"shifted",
"away",
"from",
"H1N1",
"to",
"distribute",
"Pony",
"and",
"Vawtrak",
"executables."
] | [
16,
16,
0,
8,
8,
16,
16,
16,
16,
4,
12,
12,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
11,
11,
16,
16,
16,
16,
16,
3,
16,
16,
3,
16,
3,
11
] |
[
"Ransomware",
"sure",
"has",
"had",
"an",
"uptick",
"the",
"past",
"years;",
"more",
"and",
"more",
"variants",
"appear",
"while",
"some",
"have",
"been",
"leading",
"the",
"pack",
"for",
"the",
"past",
"years."
] | [
3,
16,
16,
16,
16,
16,
16,
0,
8,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
11,
11,
16,
0,
8
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/Clicker.Small.ht",
"Win32/TrojanClicker.Small.HT",
"W32/TrojanX.MXY",
"Smalltroj.BDN",
"Win32.Small.ht",
"Trojan-Clicker.Win32.Small.ht",
"Trojan.Clicker.Small.HT",
"TrojWare.Win32.TrojanClicker.Small.HT",
"Trojan-Clicker.Win32.Small.ht",
"Win32/TrojanClicker.Small.HT",
"TR/Click.Small.HT",
"W32/TrojanX.MXY",
"Trojan-Downloader.Win32.Small!IK",
"Trojan.Click.Small.HT",
"TrojanClicker:Win32/Small.BB",
"Trojan.Clicker.Small.HT",
"Win-Trojan/Downloader.120895",
"Trojan-Clicker.Win32.Small.ht",
"Trojan-Clicker.Small.HT",
"Trojan-Clicker.Small.HT",
"Trojan.Clicker.Autoit",
"Trojan-Downloader.Win32.Small",
"W32/Small.HT!tr",
"Trj/Downloader.MDW"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"source",
"process",
"looks",
"at",
"its",
"own",
"memory",
"to",
"calculate",
"the",
"offset",
"between",
"the",
"beginning",
"of",
"the",
"libc",
"library",
"and",
"the",
"mmap",
"address",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Win32.Badur!O",
"Win32.Trojan.WisdomEyes.16070401.9500.9996",
"TR/Rogue.1517892",
"Trojan/Win32.Badur",
"TrojanDownloader:MSIL/Balamid.A",
"Trojan.Zusy.D13D03",
"Trojan.Badur",
"Trojan.Badur!"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"company",
"later",
"released",
"a",
"whitepaper",
"which",
"described",
"Qbot",
"version",
"910",
"in",
"great",
"detail."
] | [
16,
4,
16,
16,
16,
16,
16,
16,
3,
11,
11,
16,
16,
16
] |
[
"The",
"investigation",
"found",
"a",
"supply",
"chain-focused",
"attack",
"at",
"M.E.Doc",
"software",
"that",
"delivered",
"a",
"destructive",
"payload",
"disguised",
"as",
"ransomware."
] | [
16,
16,
16,
16,
1,
9,
9,
3,
3,
11,
16,
16,
16,
16,
3,
16,
16,
3
] |
[
"There",
"were",
"several",
"things",
"that",
"struck",
"us",
"as",
"both",
"interesting",
"and",
"concerning",
"about",
"the",
"details;",
"a",
"threat",
"actor",
"known",
"to",
"operate",
"in",
"South",
"East",
"Asia",
"is",
"now",
"using",
"secure",
"sockets",
"layer",
"SSL",
"encryption",
"in",
"their",
"malware."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
6,
14,
14,
16,
16,
16,
16,
2,
10,
10,
16,
16,
16,
1,
9,
9,
1,
1,
16,
16,
3
] |
[
"The",
"path",
"that",
"is",
"used",
"for",
"the",
"uploads",
"is",
":",
"http",
":",
"//",
"/apps/d/p/op.php",
"The",
"communication",
"looks",
"like",
"this",
":",
"First",
"Phase",
"The",
"first",
"phase",
"of",
"the",
"app",
"β",
"s",
"attack",
"flow",
"collects",
"device",
"information",
"and",
"a",
"list",
"of",
"apps",
"installed",
"on",
"the",
"device",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9,
9,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Downloader.Banload.10000",
"Trojan.Banker",
"Win32.Trojan.WisdomEyes.16070401.9500.9955",
"Trojan.DownLoader13.22599",
"W32/Banker.ABCU!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Downloader.Braidupdate.C",
"Trojan.Downloader.Braidupdate.C",
"Trojan.Win32.Braidupdate.frhy",
"W32/Downloader.AAJ",
"Adware.BrowserAid",
"Win32/TrojanDownloader.Braidupdate.C",
"TROJ_BRAIDUPDT.C",
"Worm.WinUpToDate",
"Trojan-Downloader.Win32.Braidupdate.c",
"Trojan.Downloader.Braidupdate.C",
"Trojan.DL.Braidupdate!ucpSRQWfQfk",
"Win32.Trojan-downloader.Braidupdate.Tayo",
"Trojan.Downloader.Braidupdate.C",
"TrojWare.Win32.TrojanDownloader.Braidupdate.C",
"Trojan.Downloader.Braidupdate.C",
"Trojan.Braid",
"Downloader.Braidupdate.Win32.3",
"TROJ_BRAIDUPDT.C",
"W32/Downloader.IZKY-4160",
"TR/Dldr.Braidupda.C",
"W32/Braidupdate.C!tr.dldr",
"Trojan[Downloader]/Win32.Braidupdate",
"Trojan.Downloader.Braidupdate.C",
"Troj.Downloader.W32.Braidupdate.c!c",
"Trojan/Win32.Braidupdate",
"TrojanDownloader:Win32/Braidupdate.C",
"Trojan.Downloader.Braidupdate.C",
"TrojanDownloader.Braidupdate",
"not-a-virus:AdWare.Win32.Cash",
"Trojan.Downloader.Braidupdate.C",
"Downloader.Braidupdate.C",
"Win32/Trojan.Downloader.2d9"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"Angler",
"Exploti",
"Kit",
"has",
"integrated",
"CVE-2015-5119",
"leaked",
"from",
"HackingTeam."
] | [
16,
3,
11,
11,
16,
16,
1,
16,
16,
4
] |
[
"Although",
"something",
"had",
"already",
"been",
"published",
",",
"we",
"decided",
"to",
"do",
"something",
"different",
"with",
"the",
"data",
"we",
"acquired",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"From",
"a",
"technical",
"point",
"of",
"view",
",",
"the",
"sample",
"is",
"a",
"unique",
"spy",
"implant",
"with",
"stand-out",
"features",
"such",
"as",
"device",
"sensors",
"listeners",
",",
"including",
"motion",
"detectors",
"that",
"have",
"been",
"implemented",
"with",
"a",
"degree",
"of",
"originality",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"cyber",
"industry",
"of",
"mobile",
"malware",
"is",
"becoming",
"more",
"focused",
"on",
"making",
"profits",
"more",
"effectively",
",",
"i.e.",
",",
"mobile",
"phishing",
",",
"theft",
"of",
"credit",
"card",
"information",
",",
"money",
"transfers",
"from",
"bank",
"cards",
"to",
"mobile",
"phones",
"and",
"from",
"phones",
"to",
"the",
"criminalas",
"β",
"e-wallets",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Google",
"Cloud",
"Messaging",
"is",
"designed",
"to",
"send",
"short",
"message",
"(",
"up",
"to",
"4",
"KB",
")",
"to",
"mobile",
"devices",
"via",
"Google",
"services",
"."
] | [
5,
13,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
16
] |
[
"Gafgyt",
"botnet",
"attacking",
"Netcore",
"routers"
] | [
3,
11,
16,
5,
13
] |
[
"During",
"our",
"continued",
"research",
"on",
"Sofacy's",
"Komplex",
"Trojan,",
"we",
"have",
"found",
"a",
"sample",
"of",
"a",
"backdoor",
"Trojan",
"that",
"we",
"believe",
"the",
"Sofacy",
"group",
"uses",
"when",
"targeting",
"individuals",
"running",
"macOS",
"systems."
] | [
16,
16,
16,
16,
16,
6,
3,
3,
11,
16,
16,
16,
3,
16,
16,
3,
11,
16,
16,
16,
6,
14,
14,
16,
16,
16,
4,
16,
5,
13
] |
[
"There",
"are",
"two",
"variations",
"of",
"the",
"emails:",
"one",
"is",
"an",
"order",
"confirmation",
"from",
"a",
"Japanese",
"equipment",
"supplier",
"and",
"the",
"other",
"pretends",
"to",
"come",
"from",
"a",
"local",
"printing",
"company."
] | [
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
1,
9,
9,
9,
9,
9,
9,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9,
9
] |
[
"It",
"is",
"issued",
"by",
"Google",
"once",
"a",
"user",
"successfully",
"logged",
"into",
"this",
"account",
"."
] | [
16,
16,
16,
16,
4,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"To",
"surface",
"its",
"ransom",
"note",
",",
"it",
"uses",
"a",
"series",
"of",
"techniques",
"that",
"take",
"advantage",
"of",
"the",
"following",
"components",
"on",
"Android",
":",
"The",
"β",
"call",
"β",
"notification",
",",
"among",
"several",
"categories",
"of",
"notifications",
"that",
"Android",
"supports",
",",
"which",
"requires",
"immediate",
"user",
"attention",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"post",
"will",
"start",
"to",
"explore",
"some",
"of",
"these",
"obfuscations",
"to",
"get",
"a",
"better",
"understanding",
"of",
"how",
"FormBook",
"works."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"[Zscaler]",
"has",
"covered",
"Dridex",
"Banking",
"Trojan",
"being",
"delivered",
"via",
"various",
"campaigns",
"involving",
"Office",
"documents",
"with",
"malicious",
"VBA",
"macros",
"in",
"the",
"past."
] | [
4,
16,
16,
3,
11,
11,
16,
16,
16,
16,
6,
16,
1,
9,
16,
7,
15,
15,
16,
16,
0
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan-GameThief.Win32.OnLineGames!O",
"Win32.Trojan.WisdomEyes.16070401.9500.9987",
"Trojan.Drondog",
"Win.Downloader.29758-2",
"Worm.Win32.Downloader.bldi",
"Trojan.Win32.MLW.xzlu",
"W32.W.Downloader.hq!c",
"Trojan.MulDrop.15154",
"Trojan.Win32.KillAV",
"Worm/Downloader.fd",
"TR/Sorri.O",
"Worm/Win32.Downloader",
"Win32.Troj.DownLoaderT.hu.147456",
"Trojan:Win32/Wiessy.A",
"Worm/Win32.Downloader.R2522"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"\"",
"Tracking",
"tool",
"''",
"or",
"an",
"\"",
"Admin",
"tool",
"''",
"are",
"often",
"cited",
"for",
"these",
"kinds",
"of",
"tools",
"for",
"\"",
"commercial",
"''",
"or",
"\"",
"enterprise",
"''",
"usage",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"malware",
"is",
"able",
"to",
"control",
"banking",
"transactions",
"conducted",
"using",
"Internet",
"Explorer,",
"and",
"harvest",
"email",
"credentials,",
"which",
"are",
"in",
"turn",
"used",
"to",
"spread",
"the",
"malware",
"further."
] | [
16,
3,
16,
16,
16,
1,
9,
9,
16,
16,
5,
13,
16,
1,
9,
9,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.DownLoader4.13271"
] | [
16,
3,
16,
16,
16,
1
] |
[
"Tap",
"Menu",
">",
"Play",
"Protect",
"."
] | [
16,
16,
16,
16,
16,
16
] |
[
"Other",
"variants",
"use",
"other",
"names",
"and",
"logos",
",",
"as",
"described",
"later",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"However",
",",
"Proofpoint",
"researchers",
"have",
"recently",
"observed",
"phishing",
"attacks",
"that",
"incorporate",
"all",
"of",
"these",
"elements",
"in",
"a",
"single",
",",
"multistep",
"scheme",
"involving",
"the",
"Marcher",
"Android",
"banking",
"Trojan",
"targeting",
"customers",
"of",
"large",
"Austrian",
"banks",
"."
] | [
16,
16,
4,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.DelfiDelfi.Win32.301",
"Trojan.Win32.DelfiDelfi.cho",
"Trojan.Win32.DelfiDelfi.etgljb",
"W32/Trojan.AITA-6805",
"Trojan.Win32.DelfiDelfi.cho",
"TrojanDownloader:Win32/Banavkill.A",
"Trj/GdSda.A",
"Trojan.DelfiDelfi!",
"W32/Banker.AEAY!tr.spy",
"Win32/Trojan.af4"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan-PWS/W32.WebGame.37860.B",
"Trojan-PSW.Win32.Yahu.YPager!O",
"Trojan/PSW.Yahu.YPager.r",
"Trojan.Kazy.D15AC9",
"Win32.Trojan.WisdomEyes.16070401.9500.9973",
"W32/Pws.BHSA",
"Win32/YPager.D",
"Trojan.Win32.Scar.kjpu",
"Troj.W32.Scar!c",
"TrojWare.Win32.PSW.YahooPager.R0",
"Trojan.DownLoader6.48717",
"Trojan.Yahoo.Win32.38",
"BehavesLike.Win32.Virus.nt",
"Trojan-PWS.Win32.Yahoo",
"W32/PWS.TYKP-7651",
"Trojan/PSW.Yahu.y",
"Trojan[PSW]/Win32.Yahu",
"Trojan.Win32.Scar.kjpu",
"Trojan/Win32.Jorik.C1078",
"Win32/PSW.Yahoo.YPager.R",
"Win32.Trojan.Scar.Pfsz",
"W32/Yahoo_YPager.R!tr.pws"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"samples",
"we",
"identified",
"target",
"the",
"ATM",
"vendor",
"Diebold."
] | [
16,
16,
16,
16,
16,
16,
5,
13,
13
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan-Dropper.Win32.Taob.ag",
"Trojan.DR.Taob!NlMVsECgQGE",
"Trojan.MulDrop4.3634",
"TR/PSW.OnlineGames.wtog",
"TrojanDropper.Taob.o",
"Win32.Troj.Taob.ag.kcloud",
"Trojan:Win32/Cortheaper.A",
"Trojan-GameThief.Win32.OnLineGames"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.