tokens
sequencelengths
2
296
ner_tags
sequencelengths
2
296
[ "The", "operation", "is", "very", "quick", "and", "quiet." ]
[ 16, 16, 16, 16, 16, 16, 16 ]
[ "EXECUTIVE", "SUMMARY", "Cisco", "Talos", "has", "discovered", "a", "new", "Android", "malware", "based", "on", "a", "leak", "of", "the", "DenDroid", "malware", "family", "." ]
[ 16, 16, 4, 12, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16 ]
[ "Bedep", "was", "known", "to", "be", "the", "notorious", "ad", "fraud", "malware", "and", "vawtrak", "is", "a", "banking", "trojan", "following", "the", "success", "of", "Zeus." ]
[ 3, 16, 16, 16, 16, 16, 16, 16, 3, 11, 16, 3, 16, 16, 3, 11, 16, 16, 16, 16, 3 ]
[ "So", "far,", "the", "malware", "primarily", "affects", "iOS", "users", "in", "mainland", "China", "and", "Taiwan." ]
[ 16, 16, 16, 3, 16, 16, 4, 12, 16, 2, 10, 16, 2 ]
[ "A", "Trojan", "for", "Linux", "that", "was", "named", "Linux.Mirai", "has", "several", "predecessors." ]
[ 16, 11, 16, 5, 16, 16, 16, 1, 16, 16, 16 ]
[ "This", "spambot,", "commonly", "downloaded", "by", "the", "Andromeda", "malware,", "has", "been", "observed", "delivering", "pharmaceutical", "industry", "spam", "as", "well", "as", "further", "propagating", "the", "main", "Andromeda", "bot." ]
[ 16, 3, 16, 16, 16, 16, 3, 11, 16, 16, 16, 16, 4, 12, 1, 16, 16, 16, 16, 16, 16, 16, 3, 11 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.Win32.Delf!O", "Backdoor.Delf.Win32.12791", "W32/Backdoor.ZRKL-8278", "Backdoor.Trojan", "Trojan.Win32.Delf.iuqg", "Win32.Backdoor.Delf.Sxnw", "Trojan.PWS.Banker.26677", "Trojan-Spy.Banker", "W32/Backdoor2.CTBF", "Backdoor/Delf.hfo", "Trojan[Backdoor]/Win32.Delf", "Trojan:Win32/Braba.D", "Trojan.UserStartup.EB690C", "Trojan/Win32.Delf.R104794", "TScope.Trojan.Delf" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Application.Downloader.ALJ", "Pua.Downloader", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Application.Downloader.ALJ", "Application.Downloader.ALJ", "Trojan.Win32.Z.Downloader.179560", "Application.Downloader.ALJ", "BehavesLike.Win32.Downloader.ch", "Application.Downloader.ALJ", "Application.Downloader.Alj!c", "Trj/CI.A", "Win32/Application.Downloader.dad" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan-Ransom.Win32.Foreign!O", "Trojan.Foreign", "Win32.Trojan.WisdomEyes.16070401.9500.9823", "Win32/Ransom.ANJ", "Ransom_Foreign.R039C0DKF17", "Trojan-Ransom.Win32.Foreign.wy", "Troj.Ransom.W32!c", "Win32.Trojan.Foreign.Wqdm", "Trojan.DownLoad2.55226", "Trojan.Foreign.Win32.208", "Ransom_Foreign.R039C0DKF17", "BehavesLike.Win32.Dropper.cc", "Trojan.Foreign.ays", "Trojan[Ransom]/Win32.Foreign", "Trojan.Graftor.D35EB", "Trojan.Win32.A.Foreign.142848[UPX]", "Trojan-Ransom.Win32.Foreign.wy", "Trojan:Win32/Ransirac.A", "Trojan/Win32.Foreign.R20679", "Hoax.Foreign", "Trojan.Foreign!cDyTfOA7GhM", "Win32/Trojan.7b3" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Win32.Trojan.Spy.Eawf", "BehavesLike.Win32.Trojan.qm", "W32/Trojan.NEXM-1236", "Trojan.MSILKrypt.4", "TrojanSpy:MSIL/Fitin.A", "Trojan.MSIL.Spy", "Trj/GdSda.A", "Win32/Trojan.948" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "Scarcruft", "Group", "aka", "APT37,", "a", "North", "Korean", "APT", "group,", "is", "believed", "to", "have", "been", "active", "since", "2016", "and", "continues", "to", "carry", "out", "attacks", "against", "institutions", "and", "political", "organizations", "around", "the", "world", "until", "2023." ]
[ 6, 14, 14, 16, 6, 16, 6, 14, 14, 14, 16, 16, 16, 16, 16, 16, 16, 0, 16, 16, 16, 16, 16, 1, 16, 4, 16, 4, 12, 16, 16, 16, 16, 0 ]
[ "Further", "details", "in", "it", "reflect", "characteristics", "of", "Exodus", "(", "such", "as", "the", "bypass", "of", "power", "managers", "we", "described", "from", "Exodus", "One", ",", "and", "more", ")", ":", "Indicators", "of", "Compromise", "Exodus", "One", "011b6bcebd543d4eb227e840f04e188fb01f2335b0b81684b60e6b45388d3820", "0f5f1409b1ebbee4aa837d20479732e11399d37f05b47b5359dc53a4001314e5", "2055584625d24687bd027a63bc0b8faa7d1a854a535de74afba24840a52b1d2f", "26fef238028ee4b5b8da631c77bfb44ada3d5db8129c45dea5df6a51c9ea5f55", "33a9da16d096426c82f150e39fc4f9172677885cfeaedcff10c86414e88be802", "34d000ee1e36efd10eb37e2b79d69249d5a85682a61390a89a1b9391c46bf2ba", "4f6146956b50ae3a6e80a1c1f771dba848ba677064eb0e166df5804ac2766898", "5db49122d866967295874ab2c1ce23a7cde50212ff044bbea1da9b49bb9bc149", "70e2eea5609c6954c61f2e5e0a3aea832d0643df93d18d7d78b6f9444dcceef0", "80810a8ec9624f317f832ac2e212dba033212258285344661e5da11b0d9f0b62", "8453ce501fee1ca8a321f16b09969c517f92a24b058ac5b54549eabd58bf1884", "a37f5d2418c5f2f64d06ba28fe62edee1293a56158ddfa9f04020e316054363f", "db59407f72666526fca23d31e3b4c5df86f25eff178e17221219216c6975c63f", "e0acbb0d7e55fb67e550a6bf5cf5c499a9960eaf5f037b785f9004585202593b", "Exodus", "One", "Package", "Names", "com.phonecarrier.linecheck", "rm.rf", "operatore.italia", "it.offertetelefonicheperte", "it.servizipremium", "assistenza.sim", "assistenza.linea.riattiva", "assistenza.linea", "it.promofferte", "Exodus", "Two", "64c11fdb317d6b7c9930e639f55863df592f23f3c7c861ddd97048891a90c64b", "a42a05bf9b412cd84ea92b166d790e8e72f1d01764f93b05ace62237fbabe40e", "Exodus", "Two", "ELF", "Utilities", "00c787c0c0bc26caf623e66373a5aaa1b913b9caee1f34580bdfdd21954b7cc4", "11499ff2418f4523344de81a447f6786fdba4982057d4114f64db929990b4b59", "13ec6cec511297ac3137cf7d6e4a7c4f5dd2b24478a06262a44f13a3d61070b6", "3c9f08b3280851f54414dfa5a57f40d3b7be7b73736fa0ba21b078e75ce54d33", "3ee3a973c62ba5bd9eab595a7c94b7a26827c5fa5b21964d511ab58903929ec5", "47449a612697ad99a6fbd6e02a84e957557371151f2b034a411ebb10496648c8", "48a7dd672931e408662d2b5e1abcd6ef00097b8ffe3814f0d2799dd6fd74bd88", "824ad333320cbb7873dc49e61c14f749b0e0d88723635524463f2e6f56ea133a", "b46f282f9a1bce3798faee3212e28924730a657eb93cda3824c449868b6ee2e7", "c228a534535b22a316a97908595a2d793d0fecabadc32846c6d1bfb08ca9a658", "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "e3f65f84dd6c2c3a5a653a3788d78920c0321526062a6b53daaf23fa57778a5f", "Command", "&", "Controls", "ad1.fbsba", "[", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 3, 11, 16, 16, 1, 9, 1, 9, 1, 1, 1, 1, 1, 3, 11, 1, 1, 3, 11, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 16, 16, 16, 1, 9, 9 ]
[ "FakeSpy", "is", "under", "active", "development", "and", "is", "evolving", "rapidly", ";", "new", "versions", "are", "released", "every", "week", "with", "additional", "evasion", "techniques", "and", "capabilities", "." ]
[ 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "LOWBALL", "abuses", "the", "Dropbox", "cloud", "storage", "service", "for", "command", "and", "control", "CnC." ]
[ 3, 16, 16, 7, 15, 15, 15, 16, 1, 9, 9, 9 ]
[ "Malware", "data", "leak", "When", "we", "analyzed", "the", "sample", ",", "we", "realized", "that", "the", "malware", "operators", "left", "the", "remote", "database", "with", "some", "of", "the", "victims", "’", "data", "freely", "accessible", ",", "without", "any", "authentication", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "initial", "infection", "vector", "in", "this", "attack", "is", "not", "clear,", "but", "it", "results", "in", "installing", "the", "Downeks", "downloader,", "which", "in", "turn", "infects", "the", "victim", "computer", "with", "the", "Quasar", "RAT." ]
[ 16, 16, 1, 9, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 11, 16, 16, 16, 16, 16, 16, 5, 16, 3, 11, 11 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Dropper.NSIS", "Trojan.Zbot.Win32.160494", "Win32.Trojan.WisdomEyes.16070401.9500.9957", "TROJ_SPNR.15AE15", "Trojan-Spy.Win32.Zbot.sbfu", "Trojan.Win32.Zbot.dtpiom", "TrojWare.Win32.CnzzBot.DAQ", "Trojan.Fakealert.47485", "TROJ_SPNR.15AE15", "Trojan[Spy]/Win32.Zbot.sbfu", "Trojan-Spy.Win32.Zbot.sbfu", "TrojanSpy.Zbot", "W32/CnzzBot.A!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.OnGameXEA.Trojan", "Trojan.Dropper.TJD", "Trojan.Dropper.TJD", "Trojan.Dropper.TJD", "Win32.Trojan.WisdomEyes.16070401.9500.9991", "W32/Dropper.AYXX", "Trojan.Dropper.TJD", "Worm.Win32.AutoRun.gpog", "Trojan.Dropper.TJD", "Trojan.Dropper.TJD", "Trojan.Win32.Wimpixo", "Trojan:Win32/Wimpixo.B", "Trojan:Win32/Wimpixo.B", "Worm.Win32.AutoRun.gpog", "BScope.Trojan-Spy.Zbot" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan-GameThief.Win32.OnLineGames!O", "Win32.Trojan.WisdomEyes.16070401.9500.9995", "Win.Trojan.Mono-15", "Trojan.Win32.OnLineGames.fcdid", "TrojWare.Win32.TrojanSpy.Pophot.d", "Trojan.PWS.Gamania.5803", "BehavesLike.Win32.Ransom.lc", "Trojan/PSW.OnLineGames.kdn", "Win32.Hack.UpackT.a.15981", "Trojan.Graftor.Elzob.D185D", "Troj.Heur.bmLerbcan7diu.moF3", "Trj/Pupack.A", "Trojan.Win32.PSW", "Win32/Trojan.d9e" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "CONNECTION", "TO", "CHINA", "Chinese", "server", "infrastructure", ":", "FakeSpy", "applications", "send", "stolen", "information", "to", "C2", "domains", "with", ".club", "TLDs", "and", "URLs", "ending", "with", "/servlet/", "[", "C2", "Command", "]", "(", "mentioned", "above", "in", "the", "β€œ", "Stealing", "Sensitive", "Information", "”", "section", ")", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 16, 16, 16, 16, 1, 9, 9, 9, 9, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Win32.Elzob!O", "Trojan.Crastic.B", "Trojan.Heur.BmGfrb243Kiib", "W32.Imaut", "Trojan.Win32.Popuper.bfzygk", "Trojan.Popuper.42424", "W32.Infostealer.Zeus", "HEUR/Fakon.mwf" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32/Trojan.NFEP-4133", "Trojan.DownLoader9.29630", "DDoS:MSIL/Webxahr.A", "DDoS.MSIL.Webxahr", "W32/DoSAttack.C!tr", "Win32/RootKit.Rootkit.7e5" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1 ]
[ "Clicking", "the", "SMS", "link", "brings", "the", "user", "to", "a", "fake", "website", "that", "prompts", "them", "to", "download", "and", "install", "the", "FakeSpy", "APK", ",", "which", "is", "masquerading", "as", "a", "local", "postal", "service", "app", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Dridex", "has", "evolved,", "and", "now", "Dridex", "V4", "uses", "Atom", "Bombing", "to", "perform", "process", "injection." ]
[ 3, 16, 16, 16, 16, 3, 11, 16, 1, 9, 9, 9, 9, 9 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Exploit.Vb.R", "Exploit.Vb", "Exploit.VB.Win32.18", "Trojan.Exploit.Vb.R", "Win32/Exploit.VB.R", "TROJ_VB.JUC", "Trojan.Exploit.Vb.R", "Exploit.Win32.VB.r", "Trojan.Exploit.Vb.R", "Exploit.W32.VB.r!c", "Trojan.Exploit.Vb.R", "Trojan.Exploit.Vb.R", "Trojan.Win32.Exploit", "Hacktool.SQL.54NB.a", "TR/Expl.VB.R", "Trojan[Exploit]/Win32.VB", "HackTool:Win32/Echoload.A", "Exploit.Win32.VB.r", "Trojan.Exploit.Vb.R", "Exploit.VB", "Win32.Exploit.Vb.Wsjr", "Exploit.VB!P1jmyBXhN28", "W32/VB.R!exploit", "Win32/Trojan.2ff" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "second", "parameter", "is", "a", "constant", "string", "β€œ", "POST", "”", ",", "and", "the", "third", "parameter", "is", "a", "series", "of", "key-value", "pairs", "to", "be", "sent", ",", "assembled", "at", "runtime", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "To", "get", "around", "this", "challenge", ",", "TrickMo", "’", "s", "developers", "added", "some", "new", "features", "to", "steal", "TANs", "using", "screen", "video", "recording", "and", "screen", "data", "scraping", "." ]
[ 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "Winter", "Vivern", "Advanced", "Persistent", "Threat", "APT", "is", "a", "pro-Russian", "cyber-espionage", "group", "that", "targets", "government", "and", "private", "businesses,", "including", "those", "involved", "in", "the", "ongoing", "war", "in", "Ukraine." ]
[ 6, 14, 14, 14, 14, 14, 14, 16, 6, 14, 14, 14, 15, 16, 4, 16, 4, 12, 16, 16, 16, 16, 16, 16, 4, 16, 2 ]
[ "One", "of", "the", "command", "and", "control", "C2", "servers", "that", "had", "been", "dormant", "for", "quite", "some", "time", "had", "suddenly", "woken", "up", "and", "started", "distributing", "what", "looks", "to", "be", "a", "new", "PoS", "malware", "family", "we're", "calling", "LockPoS." ]
[ 16, 16, 1, 9, 9, 9, 9, 9, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 11, 11, 16, 16, 3 ]
[ "These", "stores", "are", "an", "attractive", "alternative", "to", "Google", "Play", "because", "many", "of", "their", "apps", "are", "free", ",", "or", "offer", "free", "versions", "of", "paid", "apps", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 5, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Check", "if", "chat", "apps", "are", "running", "In", "the", "above", "example", ",", "the", "malware", "is", "searching", "for", "Line", ",", "Facebook", "Messenger", "and", "WhatsApp", "activities", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 16, 5, 16, 16 ]
[ "Geopolitical", "analysts", "have", "suggested", "that", "the", "United", "States", "may", "have", "its", "own", "interests", "that", "involve", "thwarting", "Chinese", "ambitions", "in", "the", "region." ]
[ 4, 12, 16, 16, 16, 16, 2, 10, 16, 16, 16, 16, 16, 15, 16, 16, 4, 12, 16, 16, 2 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/Kryptik.kqs", "Win32.Trojan.WisdomEyes.16070401.9500.9996", "Tool.PassView.1838", "Trojan.Kryptik.Win32.1246441", "Worm.MSIL.Autorun", "Trojan.MSIL.Bladabindi.1", "Trojan.MSIL.DOTHETUK", "Trj/CI.A", "Win32/Trojan.62b" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.DarkKomet.Win32.23088", "Trojan.Strictor.DF4F5", "Win32.Trojan.WisdomEyes.16070401.9500.9970", "Trojan.Win32.Zbot.deisvu", "Trojan.Hottrend.435", "TR/Dropper.xzclg", "Trojan[Backdoor]/Win32.DarkKomet", "Trojan:Win32/Rombertik.C", "Backdoor.DarkKomet", "Trj/CI.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Ocna", "Trojan.Win32.Ocna.k", "Trojan.OcnaCRTD.Win32.4895", "TR/RemoteAdmin.tkpmq", "TrojanDropper:Win32/Jowbaki.A", "Trojan.Win32.Ocna.k", "Trojan.Ocna", "Trj/CI.A", "Win32/RA-based.AB", "Win32.Trojan.Ocna.Pgmm", "Win32/Trojan.388" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "dates", "on", "the", "β€œ", "x", "”", "axis", "show", "the", "dates", "when", "we", "first", "saw", "these", "apps", "in", "the", "wild", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "I", "started", "by", "trying", "to", "find", "the", "sample", "that", "the", "blog", "post", "analyzed", "and", "I", "was", "able", "to", "find", "it", "submitted", "to", "the", "great", "sandboxing", "site", "of", "Hybrid", "Analysis", "Big", "Shutout", "to", "@PayloadSecurity", "for", "the", "great", "service." ]
[ 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 9, 9, 16, 4, 12, 16, 16, 16, 4, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.ScriptKD.4274", "Trojan.ScriptKD.4274", "Trojan/Remtasu.f", "Win32.Trojan.WisdomEyes.16070401.9500.9859", "W32/Trojan.QQOQ-8191", "Trojan.ScriptKD.4274", "Trojan.ScriptKD.4274", "BehavesLike.Win32.Trojan.wc", "W64/Coinminer.N", "Trojan/Win32.Swisyn", "Trojan.ScriptKD.D10B2", "Win32/CoinMiner.AFZ" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "malware", "encrypts", "files", "and", "the", "boot", "record", "of", "hard", "disks,", "leaving", "behind", "a", "ransomware", "note." ]
[ 16, 3, 1, 9, 16, 16, 1, 9, 9, 9, 9, 16, 16, 16, 3, 1 ]
[ "This", "is", "done", "by", "opening", "the", "Google", "account", "creation", "process", "and", "parsing", "the", "current", "view", "." ]
[ 16, 16, 16, 16, 16, 16, 4, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.EquationDrug", "Troj.W32.Equationdrug!c", "Win32.Trojan.WisdomEyes.16070401.9500.9689", "Trojan.Win32.EquationDrug.evztli", "Trojan.Win32.Z.Equationdrug.102912", "Trojan.EquationDrug.85", "W32/Trojan.DLSV-8631", "W32.Trojan.Equdrug", "TR/Dropper.bkecf", "Trojan/Win32.EquationDrug", "Trojan.EquationDrug.4", "Trj/GdSda.A", "Win32.Trojan.Equationdrug.Pgmi", "Trojan.EquationDrug!", "Trojan.Win32.Equdrug", "Win32/Trojan.6ba" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "In", "February,", "the", "source", "code", "was", "reportedly", "leaked", "online,", "which", "likely", "spurred", "some", "of", "the", "recent", "changes", "we've", "observed", "in", "the", "kit." ]
[ 16, 0, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9872", "Bloodhound.Malautoit", "TR/AD.DelfInject.twazy", "Trojan:Win32/Regub.A", "Zum.Locky.1", "Zum.Locky.1", "Zum.Locky.1" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/Cossta.icp", "Trojan.Mikey.D12734", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Win.Trojan.Banker-13888", "Virus.Win32.Lamer.kh", "Trojan.Win32.A.Cossta.65536.D", "Win32.Trojan.Cossta.bwce", "Trojan.DownLoader4.46980", "BehavesLike.Win32.Downloader.ch", "Trojan/Cossta.bii", "Trojan/Win32.Cossta", "Win32.RabbitTail.b.2098552", "Virus.Win32.Lamer.kh", "Trojan/Win32.Cossta.R23559", "Trojan.Cossta", "Trojan.Win32.Cossta", "Win32/Trojan.ed9" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "This", "allowed", "NoMoreRansom", "to", "gain", "access", "to", "many", "of", "the", "decryption", "keys", "for", "the", "ransomware", "s", "victims." ]
[ 16, 16, 4, 16, 16, 16, 16, 16, 16, 16, 1, 9, 16, 16, 3, 16, 4 ]
[ "To", "date,", "Sowbug", "appears", "to", "be", "focused", "mainly", "on", "government", "entities", "in", "South", "America", "and", "Southeast", "Asia", "and", "has", "infiltrated", "organizations", "in", "Argentina,", "Brazil,", "Ecuador,", "Peru,", "Brunei", "and", "Malaysia." ]
[ 16, 16, 3, 16, 16, 16, 16, 16, 16, 4, 16, 16, 2, 10, 16, 2, 10, 16, 16, 16, 4, 16, 2, 10, 10, 10, 10, 16, 2 ]
[ "Recently,", "Palo", "Alto", "Networks", "researchers", "discovered", "an", "advanced", "Android", "malware", "we've", "named", "SpyDealer", "which", "exfiltrates", "private", "data", "from", "more", "than", "40", "apps", "and", "steals", "sensitive", "messages", "from", "communication", "apps", "by", "abusing", "the", "Android", "accessibility", "service", "feature." ]
[ 16, 4, 12, 12, 12, 16, 16, 3, 11, 11, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 5, 16, 7, 15, 15, 15, 15, 15 ]
[ "A", "backdoor", "also", "known", "as:", "Hoax.Win32.ArchSMS!O", "Trojan.ArchSMS.Win32.178", "Win32/FakeInstall.BH", "Win.Trojan.Archsms-882", "HEUR:Hoax.Win32.ArchSMS.HEUR", "Riskware.Win32.ArchSMS.dqovc", "ApplicUnwnt.Win32.Hoax.ArchSMS.E", "Tool.SMSSend.117", "Trojan-Banker.Win32.Banbra", "TR/Zen.C", "HackTool[Hoax]/Win32.ArchSMS", "Win32.Troj.Hoax.kcloud", "Trojan:Win32/Moxtrarch.A", "HEUR:Hoax.Win32.ArchSMS.HEUR", "Adware.VPets.121105", "Hoax.ArchSMS!DSd5P3jaerI", "W32/ArchSMS.EF!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "Rilide", "stealer", "is", "a", "prime", "example", "of", "the", "increasing", "sophistication", "of", "malicious", "browser", "extensions", "and", "the", "dangers", "they", "pose." ]
[ 3, 11, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 11, 16, 16, 16, 16, 16 ]
[ "The", "oldest", "sample", "we've", "seen", "up", "to", "now", "is", "from", "November", "2013." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 0, 8 ]
[ "A", "backdoor", "also", "known", "as:", "Hacktool.Koobface", "Win32/Koobface.AKJ", "Trojan.Win32.Facebfr.cvvcfx", "Tool.Facebfr", "BehavesLike.Win32.Swisyn.kh", "SPR/HackFacebo.A", "Trojan.Kazy.DA8A0" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.Winupnemsys.Trojan", "Worm.Win32.Mefir!O", "Win32.Trojan.WisdomEyes.16070401.9500.9998", "W32.SillyFDC", "Win32/Mefir.A", "Win.Worm.Autorun-316", "Worm.Win32.Mefir.a", "Trojan.Win32.MLW.uvszt", "Worm.Win32.A.Mefir.143360", "Win32.Virus.Mefir.Ectu", "Worm.Win32.Mefir.B", "Win32.HLLW.Autoruner.216", "Worm.Mefir.Win32.3", "Worm/Mefir.f", "Worm:Win32/Mefir.A", "Worm:Win32/Mefir.A", "Worm.Win32.Mefir.a", "W32/Mefir.A.worm", "Worm.Mefir!BwUbuvfvViU", "Worm.Win32.Mefir.a", "Win32/Trojan.d06" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "In", "the", "recent", "weeks,", "various", "anti-virus", "vendors", "and", "security", "researchers", "published", "blog", "posts", "on", "this", "threat,", "presenting", "their", "analysis", "and", "findings." ]
[ 16, 16, 16, 0, 16, 4, 12, 16, 4, 12, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.Trojan", "BKDR_MANGZAMEL.B", "Trojan.Mangzamel.Win32.11", "BKDR_MANGZAMEL.B", "BDS/Vedratve.zgxnw", "Backdoor:Win32/Vedratve.A!dha", "Trj/CI.A", "Win32/Backdoor.f40" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Based", "on", "our", "culprit", "’", "s", "email", "address", ",", "we", "were", "able", "to", "find", "his", "GitHub", "repository", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Symmi.D13C10", "Win32.Trojan.WisdomEyes.16070401.9500.9915", "Trojan.Win32.Ekstak.ddqe", "Trojan.Win32.Ekstak.exahds", "Trojan.InstallCube.2631", "PUA.ICLoader", "Pua.Downloadmgr", "Trojan:Win32/Spiltderp.A", "Trojan.Win32.Ekstak.ddqe", "Trojan/Win32.Ekstak.R217792", "Trj/CI.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Upload", "data", "was", "queued", "and", "transmitted", "via", "HTTP", "PUT", "requests", "to", "an", "endpoint", "on", "the", "C2", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Figure", "19", ":", "C", "&", "C", "infrastructure", "diagram", "The", "Infection", "Landscape", "β€œ", "Agent", "Smith", "”", "droppers", "show", "a", "very", "greedy", "infection", "tactic", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Reusing", "our", "deobfuscation", "tool", "and", "some", "other", "tricks", ",", "we", "have", "been", "able", "to", "reverse", "and", "analyze", "these", "opcodes", "and", "map", "them", "to", "a", "finite", "list", "that", "can", "be", "used", "later", "to", "automate", "the", "analysis", "process", "with", "some", "scripting", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "]", "top/", "Oct", "23", ",", "2017", "hxxp", ":", "//online.bankaustria.at.id8817465", "[", "." ]
[ 9, 9, 16, 16, 16, 16, 1, 9, 9, 9, 9 ]
[ "A", "backdoor", "also", "known", "as:", "Exp.OLE.CVE-2009-3129.A", "Exploit.MSExcel.CVE-2009-3129.ccxskf", "Exploit.Excel.CVE-2009-3129", "Downloader.OLE.HiddenEXE", "MSExcel/CVE_2009_3129.A!exploit", "Win32/Trojan.Exploit.19f" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1 ]
[ "A", "second", "version", "2.1-LNK", "with", "the", "network", "tag", "StrangeLove", "was", "discovered", "shortly", "after." ]
[ 16, 16, 16, 3, 16, 16, 16, 16, 3, 16, 16, 16, 16 ]
[ "Appendix", "Samples", "Some", "of", "the", "latest", "Ginp", "samples", "found", "in", "the", "wild", ":", "App", "name", "Package", "name", "SHA-256", "hash", "Google", "Play", "Verificator", "sing.guide.false", "0ee075219a2dfde018f17561467272633821d19420c08cba14322cc3b93bb5d5", "Google", "Play", "Verificator", "park.rather.dance", "087a3beea46f3d45649b7506073ef51c784036629ca78601a4593759b253d1b7", "Adobe", "Flash", "Player", "ethics.unknown.during", "5ac6901b232c629bc246227b783867a0122f62f9e087ceb86d83d991e92dba2f", "Adobe", "Flash", "Player", "solution.rail.forward", "7eb239cc86e80e6e1866e2b3a132b5af94a13d0d24f92068a6d2e66cfe5c2cea", "Adobe", "Flash", "Player", "com.pubhny.hekzhgjty", "14a1b1dce69b742f7e258805594f07e0c5148b6963c12a8429d6e15ace3a503c", "Adobe", "Flash", "Player", "sentence.fancy.humble", "78557094dbabecdc17fb0edb4e3a94bae184e97b1b92801e4f8eb0f0626d6212", "Target", "list", "The", "current", "list", "of", "apps", "observed", "to", "be", "targeted", "by", "Ginp", "contains", "a", "total", "of", "24", "unique", "applications", "as", "seen", "below", "." ]
[ 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 13, 1, 1, 5, 13, 13, 5, 1, 5, 13, 13, 1, 1, 5, 13, 13, 1, 1, 5, 13, 13, 1, 1, 5, 13, 13, 1, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "We", "typically", "see", "techniques", "at", "this", "level", "by", "well-resourced,", "well-funded,", "motivated", "adversaries." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Additionally,", "in", "all", "cases,", "the", "theft", "took", "place", "using", "normal", "cash", "withdrawals", "from", "various", "ATM", "terminal", "locations", "outside", "the", "bank's", "originating", "country." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "It", "’", "s", "interesting", "that", "Triout", ",", "which", "is", "detected", "by", "Bitdefender", "’", "s", "machine", "learning", "algorithms", ",", "was", "first", "submitted", "from", "Russia", ",", "and", "most", "scans/reports", "came", "from", "Israel", "." ]
[ 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 4, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "These", "improvements", "render", "FakeSpy", "one", "of", "the", "most", "powerful", "information", "stealers", "on", "the", "market", "." ]
[ 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "In", "2013", ",", "Kaspersky", "Lab", "mobile", "products", "prevented", "2,500", "infections", "by", "banking", "Trojans", "." ]
[ 16, 16, 16, 4, 12, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Exploit-MSExcel.p", "Trojan.Mdropper.AA", "TROJ_MDROP.AH", "Exploit.MSExcel.CVE-2008-0081.ccxsez", "Exploit.Excel.1", "TROJ_MDROP.AH", "Exploit-MSExcel.p", "EXP/Excel.CVE-2008-0081", "MSExcel/UDDesc.A!exploit.M20080081", "Win32/Trojan.Exploit.903" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "dropper", "is", "a", "repacked", "legitimate", "application", "which", "contains", "an", "additional", "piece", "of", "code", "–", "β€œ", "loader", "”", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Heuristic.LooksLike.Trojan.Dropper.I", "TrojanDropper:Win32/Datunif.A" ]
[ 16, 3, 16, 16, 16, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Emotet", "TSPY_EMOTET.SMZD172", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "TSPY_EMOTET.SMZD172", "Trojan.Packed2.40646", "Trojan.Dovs.Win32.2068", "BehavesLike.Win32.Backdoor.ch", "W32.Trojan.Emotet", "Trojan:Win32/Emotet.R!bit", "Trojan.Razy.D36CE4", "Trojan/Win32.Emotet.R215266", "Trojan.Win32.Emotet" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Additional", "targets", "have", "included", "journalists,", "political", "advisors,", "and", "organizations", "associated", "with", "political", "activism", "in", "central", "Asia." ]
[ 16, 16, 16, 16, 4, 12, 12, 16, 4, 16, 16, 4, 12, 16, 2, 10 ]
[ "However,", "initial", "static", "analysis", "revealed", "that", "all", "of", "these", "samples", "appear", "to", "be", "identical", "on", "the", "surface,", "leading", "us", "to", "believe", "that", "we", "had", "discovered", "a", "new", "loader." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "It", "has", "been", "active", "for", "around", "one", "month", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Some", "of", "the", "apps", "we", "discovered", "resided", "on", "Google", "Play", "for", "several", "years", ",", "but", "all", "were", "recently", "updated", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Dvmap", ":", "the", "first", "Android", "malware", "with", "code", "injection", "08", "JUN", "2017", "In", "April", "2017", "we", "started", "observing", "new", "rooting", "malware", "being", "distributed", "through", "the", "Google", "Play", "Store", "." ]
[ 3, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 13, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Win32.Rimecud.1!O", "Trojan.Rimecud.U", "TROJ_RIMECUD.SMX", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "TROJ_RIMECUD.SMX", "Trojan.Win32.Fsysna.eqph", "TrojWare.Win32.Kryptik.AMMN", "BehavesLike.Win32.PWSZbot.ch", "Virus.Win32.Cryptor", "Ransom:Win32/Grymegat.A", "Trojan.Kazy.D16E7F", "Trojan.Win32.Fsysna.eqph", "Trojan/Win32.Jorik.R40701", "Trj/Rimecud.f", "W32/Rimecud.GRC!tr", "Win32/Trojan.801" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan-Exploit/W32.Nuker.203264", "Exploit.Nuker", "Tool.Vai.Win32.1", "Exploit.W32.Nuker!c", "W32/Trojan2.EKA", "Win.Tool.W32-65", "Exploit.Win32.Nuker.Vai.c", "Exploit.Win32.Nuker-Vai.htmm", "TrojWare.Win32.Nuker.Vai.C", "FDOS.VTG.201", "W32/Trojan.LISQ-8951", "Nuke/Win32.Vai.c", "Trojan:Win32/VAI.C", "SPR/DDoS.ICMP.Vait10", "Trojan[Exploit]/Win32.Nuker", "Trojan:Win32/VAI.C", "Exploit.Win32.Nuker.Vai.c", "Nuker.Vai", "Win32/Nuker.Vai.C", "Win32.Exploit.Nuker.Efbk", "W32/Nuker_Vai.C!tr", "Win32/Trojan.Exploit.237" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "60", "%", "of", "devices", "containing", "or", "accessing", "enterprise", "data", "are", "mobile", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "These", "malicious", "Office", "documents", "are", "being", "spread", "as", "an", "attachment", "using", "spear", "phishing", "emails", "as", "described", "here." ]
[ 16, 1, 9, 9, 16, 16, 16, 16, 16, 1, 16, 1, 9, 9, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.AutoIt.Pistolar.A", "Worm.AutoIt.Win32.16752", "Trojan.Heur.rmLfrvwRR2pib", "TROJ_SPNR.03BL13", "Win32.Trojan.AutoIt.a", "TROJ_SPNR.03BL13", "Trojan.KillFiles.61768", "BehavesLike.Win32.VirRansom.dc", "Troj.W32.Autoit.lWNh", "HEUR/Fakon.mwf", "Win32/Autoit.MB" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Infostealer.Limitail", "Trojan.Win32.Sourtoff.dshygu", "Trojan.Yakes.Win32.34007", "BehavesLike.Win32.Backdoor.fc", "Trojan/Injector.cbpj", "Trojan.Win32.Boaxxe", "TrojanDropper.Injector.awup", "TR/Crypt.Xpack.8996", "Trojan/Win32.Sourtoff", "Trojan.Zboter.5", "Trojan/Win32.Ransomcrypt.R151582", "Trojan.Yakes", "Trojan.Yakes!LiL7XolSsr0", "Win32/Trojan.34b" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "With", "the", "four", "β€œ", "sms_send", "”", "commands", ",", "the", "messages", "as", "specified", "in", "the", "key", "β€œ", "text", "”", "will", "be", "sent", "immediately", "to", "the", "specified", "short", "numbers", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Worm.AutoIt", "Worm.AutoIt.Win32.13406", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Worm.Win32.AutoIt.qaw", "Trojan.Win32.AutoIt.ewujea", "W32.W.WBNA.lJwt", "Trojan.MulDrop5.8834", "BehavesLike.Win32.Trojan.cz", "Worm.Win32.AutoRun", "W32/Trojan.WOLP-1815", "Worm/Win32.AutoIt", "Worm:Win32/Selfita.A", "Worm.Win32.AutoIt.qaw", "Worm.AutoIt", "Win32/AutoRun.VB.BEZ", "Win32.Worm.Autoit.Pgmr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.Clodd7a.Trojan.d028", "Trojan-Downloader/W32.Lemmy.65536.B", "Downloader.Lemmy.Win32.31", "Troj.Downloader.W32.Lemmy.u!c", "Trojan/Downloader.Lemmy.q", "W32/Lemmy.AO", "Adware.Roimoi", "Win32/TrojanDownloader.Lemmy.AA", "TROJ_LEMMY.L", "Win.Downloader.71376-1", "Trojan-Downloader.Win32.Lemmy.u", "Trojan.Win32.Lemmy.gugs", "Trojan.Win32.Downloader.65536.IK[h]", "TrojWare.Win32.TrojanDownloader.Lemmy.u0", "Adware.MediaMotor.130", "TROJ_LEMMY.L", "BehavesLike.Win32.Trojan.kt", "W32/Lemmy.RFEY-5815", "TrojanDownloader.Lemmy.f", "TR/Dldr.Lemmy.Q.2", "W32/Dloader.X!tr", "Trojan[Downloader]/Win32.Lemmy", "Win32.Troj.Lemmy.o.kcloud", "Trojan/Win32.HDC.C89215", "TrojanDownloader:Win32/Lemmy.U", "TScope.Trojan.VB", "Win32.Trojan-downloader.Lemmy.Egoh", "Trojan.DL.Lemmy!fetCOQguJic", "Trojan-Downloader.Win32.Lemmy.q" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "WS.Reputation.1", "PWS:Win32/Yaludle.D", "Trojan-PWS.Win32.Yaludle" ]
[ 16, 3, 16, 16, 16, 1, 1, 1 ]
[ "Manufacturers", "should", "be", "keeping", "close", "tabs", "on", "what", "software", "ends", "up", "on", "their", "devices", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "But", "I", "never", "received", "such", "files", "from", "their", "command", "and", "control", "server", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Today,", "we", "noticed", "CVE-2015-5119", "the", "identifier", "for", "this", "vulnerability", "being", "used", "in", "a", "rather", "unusual", "attack", "pattern." ]
[ 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 9 ]
[ "A", "backdoor", "also", "known", "as:", "Ransom_Necne.R002C0DAU18", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Ransom_Necne.R002C0DAU18", "Trojan.Win32.Filecoder.eximhz", "Trojan.Win32.Z.Kelios.56320", "Trojan.Encoder.24408", "Trojan.Filecoder.Win32.7015", "BehavesLike.Win32.Backdoor.qh", "Trojan-Ransom.FileCoder", "W32/Trojan.TPMK-1866", "TR/AD.Petya.muyif", "Ransom.Filecoder/Variant", "Trojan.Encoder", "Ransom.FileCryptor", "Trj/GdSda.A", "W32/Filecoder.FV!tr", "Win32/Trojan.4af" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Everyday", "users", "can", "do", "the", "same", "by", "checking", "the", "router", "’", "s", "DNS", "settings", "if", "they", "’", "ve", "been", "modified", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "In", "the", "attached", "paper", "we", "will", "focus", "on", "two", "exploits", "which", "at", "the", "time", "of", "discovery", "in", "the", "Hacking", "Team", "archives", "were", "unpatched." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 4, 12, 16, 16, 7 ]
[ "Apps", "of", "the", "Android/AdDisplay.Ashas", "family", "reported", "to", "Google", "by", "ESET", "Figure", "2", "." ]
[ 16, 16, 16, 3, 16, 16, 16, 16, 16, 4, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Mikey.DDFDA", "Ransom_PETYA.SM2", "Win32.Trojan.WisdomEyes.16070401.9500.9986", "Ransom_PETYA.SM2", "Trojan.Win32.AD.epiohw", "BehavesLike.Win32.Ransom.cc", "Ransom.Petya", "Win32/Diskcoder.Petya.E", "Trojan.Diskcoder!", "Trojan-Ransom.GoldenEye", "W32/Petya.E!tr.ransom" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9998", "Trojan-Downloader.MSIL.Small.vii", "Trojan.Win32.Clicker.dckckw", "Trojan[Downloader]/MSIL.Small", "Win32.TrojDownloader.MSIL.kcloud", "Trojan.Kazy.D17F7F", "Trojan-Downloader.MSIL.Small.vii", "Trojan:MSIL/Keywsec.B", "Trojan.Clicker", "Trojan.Keywsec!MUZFw6FSjt8", "Win32/Trojan.419" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "]", "205", "[", "." ]
[ 9, 9, 9, 9 ]
[ "During", "the", "last", "weeks", "there", "have", "been", "several", "cases", "of", "international", "brand", "names", "being", "used", "by", "malware", "authors", "to", "propagate", "malware", "through", "phishing", "emails." ]
[ 16, 16, 0, 8, 16, 16, 16, 16, 16, 16, 4, 12, 16, 16, 16, 16, 6, 14, 16, 16, 3, 16, 1, 9 ]
[ "A", "backdoor", "targetting", "Linux", "also", "known", "as:", "Exploit.Linux.Vmsplice.A", "Exploit.Lotoor.Linux.131", "HEUR:Exploit.Linux.Lotoor.bh", "Exploit.Unix.Lotoor.exdfpk", "Exploit.Linux.Lotoor!c", "Linux.Exploit.Local.147", "Exploit.Linux.auf", "LINUX/Lotoor.qcvrg", "Trojan[Exploit]/Linux.Lotoor.bh", "HEUR:Exploit.Linux.Lotoor.bh", "Linux.Exploit.Lotoor.Htmf", "Trojan.Linux.Exploit", "Linux/Vmsplice.K!tr" ]
[ 16, 3, 16, 11, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "attackers", "used", "different", "command", "and", "control", "servers", "C2s", "for", "each", "malware", "family,", "a", "tactic", "we", "believe", "was", "meant", "to", "thwart", "attempts", "to", "tie", "the", "attacks", "together", "using", "infrastructure", "alone." ]
[ 16, 6, 16, 16, 1, 9, 9, 9, 9, 16, 3, 11, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 5, 16 ]