tokens
sequencelengths
2
296
ner_tags
sequencelengths
2
296
[ "A", "backdoor", "also", "known", "as:", "Trojan/W32.Llac.302593", "TrojanPWS.Bropaler", "Trojan/Delf.opy", "Win32.Trojan.WisdomEyes.16070401.9500.9990", "Trojan.Win32.Llac.kruq", "Trojan.Win32.Dwn.dzxxnb", "Troj.W32.Llac!c", "Trojan.DownLoader14.35508", "Trojan.Llac.Win32.55406", "BehavesLike.Win32.Worm.dc", "Trojan.Win32.PSW", "W32/Trojan.DQFT-9080", "Trojan.Llac.bxm", "Trojan/Win32.Llac", "Trojan.Inject.2", "Trojan.Win32.Llac.kruq", "PWS:Win32/Bropaler.A!bit", "Trojan.Llac", "Trj/GdSda.A", "Win32.Trojan.Llac.Sudw", "Trojan.Llac!VJVBvKAFEGg" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Proofpoint", "researchers", "recently", "detected", "a", "large-scale", "malvertising", "attack", "by", "the", "so-called", "KovCoreG", "group,", "best", "known", "for", "distributing", "Kovter", "ad", "fraud", "malware", "and", "sitting", "atop", "the", "affiliate", "model", "that", "distributes", "Kovter", "more", "widely." ]
[ 4, 12, 16, 16, 16, 1, 9, 9, 16, 16, 16, 6, 14, 16, 16, 16, 16, 3, 11, 11, 11, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16 ]
[ "Cisco", "Talos", "discovered", "a", "new", "malicious", "campaign", "from", "the", "well", "known", "actor", "Group", "74", "aka", "Tsar", "Team,", "Sofacy,", "APT28,", "Fancy", "Bear…." ]
[ 4, 12, 16, 16, 6, 14, 14, 16, 16, 16, 16, 16, 6, 14, 16, 14, 14, 14, 14, 14, 14 ]
[ "It", "maintained", "a", "heavy", "offensive", "focus", "on", "Myanmar,", "Vietnam,", "Singapore,", "the", "Philippines,", "Malaysia,", "and", "Laos." ]
[ 16, 16, 16, 16, 16, 16, 16, 2, 10, 10, 10, 10, 10, 16, 2 ]
[ "A", "Chinese", "advanced", "persistent", "threat", "APT", "compromised", "Forbes.com", "to", "set", "up", "a", "watering", "hole", "style", "web-based", "drive-by", "attack", "against", "US", "Defense", "and", "Financial", "Services", "firms", "in", "late", "November", "2014." ]
[ 16, 6, 14, 14, 14, 14, 16, 1, 16, 16, 16, 16, 7, 15, 15, 15, 15, 15, 16, 4, 12, 16, 4, 12, 12, 16, 0, 8, 8 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor:Win64/Warood.A", "BDoor.FCXN!tr.bdr" ]
[ 16, 3, 16, 16, 16, 1, 1 ]
[ "This", "precedent", "setting", "legal", "case", "would", "be", "followed", "by", "many", "Southeast", "Asian", "nations,", "as", "well", "as", "others", "around", "the", "globe." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 2, 10, 10, 16, 16, 16, 16, 16, 16, 2 ]
[ "A", "backdoor", "also", "known", "as:", "Uds.Dangerousobject.Multi!c", "Trojan.Graftor.D3CA6C", "Trojan.Meciv!", "Win32/Meciv.G", "W32/Trojan.PSSM-5626", "TR/Meciv.15872", "Trojan.Win32.Z.Meciv.15872[h]", "Win32.Trojan.Strat.Ebgt", "Trojan.Win32.Meciv", "W32/Meciv.G!tr", "Trojan.Win32.Meciv.G" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Other.Virus.[Trj]!c", "Trojan.O97M.Phish" ]
[ 16, 3, 16, 16, 16, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.HfsAutoB.F820", "Trojan.AVKiller.AW", "Trojan/W32.Packer.24576.CE", "Trojan.Pakes", "Trojan.AVKiller.AW", "Trojan.AVKiller.AW", "Win32.Trojan.WisdomEyes.16070401.9500.9998", "Trojan.AVKiller.AW", "Trojan.Win32.Pakes.blv", "Trojan.AVKiller.AW", "Trojan.AVKiller.AW", "TrojWare.Win32.TrojanSpy.SpyEyes.B", "Trojan.MulDrop.8347", "BehavesLike.Win32.RAHack.mc", "Backdoor.Win32.Kbot.aq", "Trojan.Pakes.bgg", "Trojan/Win32.Pakes", "Win32.Hack.RCryptor.a.10301", "Trojan.Win32.Pakes.blv", "SScope.Malware-Cryptor.Hlux", "Trj/CI.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "]", "today", "somtum", "[", "." ]
[ 9, 9, 1, 9, 9 ]
[ "Cyber", "criminals", "continue", "to", "use", "exploit", "kits", "to", "infect", "victims", "with", "ransomware", "but", "they", "also", "use", "MALSPAM", "emails", "to", "lure", "possible", "victims", "–", "a", "key", "vector", "into", "an", "enterprise", "environment", "that", "lacks", "the", "proper", "security", "controls,", "and", "one", "with", "insufficient", "information", "security", "training", "for", "end", "users." ]
[ 6, 14, 16, 16, 16, 3, 11, 16, 16, 16, 16, 3, 16, 16, 16, 16, 1, 9, 16, 16, 16, 16, 16, 16, 7, 15, 16, 16, 4, 12, 16, 1, 9, 9, 9, 9, 16, 16, 16, 1, 9, 9, 9, 16, 5, 13 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan-Downloader.Win32.Axload!O", "TrojanDownloader.Axload", "Trojan/Downloader.Axload.o", "TROJ_FRAUDLOA.TT", "Win32.Trojan.WisdomEyes.16070401.9500.9998", "W32/Downldr2.DOEJ", "TROJ_FRAUDLOA.TT", "Win.Downloader.66976-1", "Trojan-Downloader.Win32.Axload.az", "Trojan.Win32.Axload.vqczl", "Trojan.Win32.Downloader.134456", "TrojWare.Win32.Trojan.DNSChanger.~CRSE", "Trojan.DownLoader.59074", "BehavesLike.Win32.Injector.ch", "W32/Downloader.HFNI-1674", "TrojanDownloader.AxLoad.r", "SPR/Fake.C", "Trojan[Downloader]/Win32.Axload", "Troj.Downloader.W32.Axload.o!c", "Trojan-Downloader.Win32.Axload.az", "TrojanDownloader:Win32/Axload.A", "Trojan.BHORA.012841", "Win32.Trojan-downloader.Axload.Dun", "Trojan.DL.Renos!Exa/gyOk4i0", "Trojan-Downloader.Win32.Renos.AQ", "Win32/Trojan.Downloader.9f3" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "Cybereason", "Nocturnus", "team", "is", "monitoring", "multiple", "underground", "platforms", "in", "an", "attempt", "to", "identify", "chatter", "relating", "to", "EventBot", "." ]
[ 16, 4, 12, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Application.CoinMiner.S", "Trojan-Downloader.Win32.SetupFactory!O", "Trojan.Miner", "Application.CoinMiner.S", "Trojan.Win32.Z.Coinminer.938434", "Troj.W32.Miner!c", "Application.CoinMiner.S", "Application.CoinMiner.S", "Tool.BtcMine.1149", "W32/Trojan.FXQE-8469", "Trojan/Win32.Vehidis", "Trojan:Win64/Stratumine.B", "Trojan.Vehidis", "Trj/CI.A", "Win32.Trojan.Miner.Alsn", "Win32/Trojan.Ransom.7fc" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Malicious", "module", "β€œ", "ip", "”", "This", "file", "will", "be", "executed", "by", "the", "patched", "system", "library", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Ransom.Cerber.FA", "Ransom/W32.Cerber.561843.B", "Ransom.Cerber.S363870", "Trojan.Ransom.Cerber.FA", "Trojan.Ransom.Cerber.FA", "Win32.Trojan.Kryptik.bin", "Ransom_HPCERBER.SMALY5A", "Win.Ransomware.Cerber-5970079-0", "Trojan.Ransom.Cerber.FA", "Trojan.Ransom.Cerber.FA", "Trojan.Win32.Kryptik.eljryo", "Trojan.Ransom.Cerber.FA", "Trojan.Encoder.7453", "Trojan.Kryptik.Win32.998775", "Ransom_HPCERBER.SMALY5A", "BehavesLike.Win32.Ransomware.hh", "Trojan-Ransom.Cerber", "Trojan.Zerber.amh", "TR/Crypt.ZPACK.mblws", "Trojan[Ransom]/Win32.Zerber", "Trojan.Menti", "Ransom.Cerber", "Trojan.Zerber!", "Win32/Trojan.e14" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9771", "Win.Worm.VBMania-1", "Win32.Trojan.Visal.A", "Trojan.Win32.Swisyn.ajwe", "TrojWare.Win32.VB.YNB", "Trojan.MulDrop6.48042", "Trojan/Swisyn.kkp", "Worm:Win32/Visal.A", "Trojan.Win32.Swisyn.ajwe", "Virus.Win32.Vbinder" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Downloader.VB.Win32.85130", "TrojanDownloader.VB", "Trojan-Downloader.Win32.VB.bkxc", "Trojan.DownLoader9.27791", "TrojanDownloader.VB.dikm", "TrojanDownloader:Win32/Gurip.A", "Trojan.Heur.EE8DE0", "Trojan-Downloader.Win32.VB.bkxc", "Trojan.Downloader.VB", "Trojan.DL.VB!q71Z8AF5llY" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "message", "was", "sent", "from", "an", "account", "created", "under", "her", "name", "on", "lesser", "known", "email", "provider", "1", "1's", "Mail.com,", "a", "common", "tactic", "in", "recent", "months,", "with", "a", "link", "to", "a", "file", "hosted", "on", "Dropbox", "and", "an", "additional", "credential", "phishing", "attempt." ]
[ 16, 1, 16, 16, 16, 16, 1, 16, 16, 16, 1, 16, 16, 16, 5, 13, 1, 9, 9, 16, 16, 16, 16, 0, 8, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16, 16, 6, 14, 14, 16 ]
[ "Update", "Jul", "11", "2016", "8:32", ":", "On", "Monday", ",", "a", "Checkpoint", "representative", "disputed", "Lookout", "'s", "contention", "and", "pointed", "to", "this", "blog", "post", "from", "security", "firm", "Eleven", "Paths", "as", "support", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16, 16, 4, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 12, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.TaskmanMispD.Trojan", "Worm/W32.Vobfus.217088", "Worm.Win32.Vobfus!O", "Worm.Raideloz.A3", "W32/Autorun.worm.aaeh", "W32/Vobfus.ahox", "WORM_VOBFUS.SMJA", "Win32.Worm.Pronny.dn", "WORM_VOBFUS.SMJA", "Win.Worm.Vobfus-12049", "Worm.Win32.WBNA.ipa", "Trojan.Win32.Vobfus.cinarv", "Worm.Win32.A.Vobfus.155648.F", "WIN.Troj.Vobfus.lEaX", "Worm.Win32.Vobfus.AJR", "Win32.HLLW.Autoruner1.29632", "BehavesLike.Win32.VBObfus.dm", "Worm/Vobfus.mos", "Worm:Win32/Raideloz.A", "Trojan.Barys.DA54", "Worm.Win32.WBNA.ipa", "Worm/Win32.Vobfus.R43029", "Worm.Vobfus", "Worm.Win32.Raideloz", "W32/VBObfus.C!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Figure", "8", "." ]
[ 16, 16, 16 ]
[ "This", "report", "expands", "the", "Mexican", "investigation", "and", "shows", "how", "10", "Mexican", "journalists", "and", "human", "rights", "defenders,", "one", "minor", "child,", "and", "one", "United", "States", "citizen,", "were", "targeted", "with", "NSO's", "Exploit", "Framework." ]
[ 16, 16, 16, 4, 12, 12, 16, 16, 16, 16, 4, 12, 16, 4, 12, 12, 12, 12, 12, 16, 4, 12, 12, 12, 16, 16, 16, 3, 11, 11 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.KillAV", "Worm.Win32.Delf.ag", "Packed.Win32.Klone.~KE", "Trojan.DownLoader.origin", "Trojan-Downloader.Win32.Delf!IK", "Trojan-Downloader.Win32.Delf", "W32/PEMask.B!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Joke/W32.BadJoke.20500", "Hoax.Vb", "Hoax.Win32.BadJoke.VB.d", "Riskware.Win32.Anywork.hrys", "Joke.Miracle", "Tool.BadJoke.Win32.176", "BehavesLike.Win32.PUP.mz", "Hoax.Win32.BadJoke.VB", "Hoax.BadJoke.djv", "HackTool[Hoax]/Win32.VB", "Win32.Joke.WorkJoke.a.kcloud", "Hoax.Win32.BadJoke.VB.d", "Joke:Win32/Small.NAO", "Unwanted/Win32.Badjoke.R100207", "BadJoke.Win32.VB.d", "Trojan.VBRA.02296", "Win32.Trojan-psw.Badjoke.Plui" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Fake", "tax", "spam", "leads", "to", "malware:" ]
[ 1, 9, 9, 16, 16, 3 ]
[ "The", "short", "URL", "redirects", "to", "the", "application", "page", "at", "Google", "Play", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 16 ]
[ "Written", "by", "Jagadeesh", "Chandraiah", "JULY", "23", ",", "2018", "SophosLabs", "has", "uncovered", "a", "mobile", "malware", "distribution", "campaign", "that", "uses", "advertising", "placement", "to", "distribute", "the", "Red", "Alert", "Trojan", ",", "linking", "counterfeit", "branding", "of", "well-known", "apps", "to", "Web", "pages", "that", "deliver", "an", "updated", ",", "2.0", "version", "of", "this", "bank", "credential", "thief", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 4, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "On", "April", "7th", "2017", "Haifei", "Li", "published", "on", "the", "McAfee", "blog1", "about", "a", "Critical", "Office", "Zero-Day", "in", "the", "wild." ]
[ 16, 0, 8, 8, 4, 12, 16, 16, 16, 4, 16, 16, 16, 7, 15, 15, 16, 16, 16 ]
[ "Notice", "notice", "the", "use", "of", "the", "mistaken", "β€œ", "Word", "”", "instead", "of", "β€œ", "World", "”", ":", "β€œ", "On", "behalf", "of", "all", "at", "the", "Word", "Uyghur", "Congress", "(", "WUC", ")", ",", "the", "Unrepresented", "Nations", "and", "Peoples", "Organization", "(", "UNPO", ")", "and", "the", "Society", "for", "Threatened", "Peoples", "(", "STP", ")", ",", "Human", "Rights", "in", "China", ":", "Implications", "for", "East", "Turkestan", ",", "Tibet", "and", "Southern", "Mongolia", "In", "what", "was", "an", "unprecedented", "coming-together", "of", "leading", "Uyghur", ",", "Mongolian", ",", "Tibetan", "and", "Chinese", "activists", ",", "as", "well", "as", "other", "leading", "international", "experts", ",", "we", "were", "greatly", "humbled", "by", "the", "great", "enthusiasm", ",", "contribution", "and", "desire", "from", "all", "in", "attendance", "to", "make", "this", "occasion", "something", "meaningful", ",", "the", "outcome", "of", "which", "produced", "some", "concrete", ",", "action-orientated", "solutions", "to", "our", "shared", "grievances", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 12, 12, 12, 12, 12, 16, 16, 4, 12, 12, 12, 12, 12, 12, 12, 16, 16, 4, 12, 12, 12, 12, 12, 12, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "In", "February", "2017,", "we", "found", "a", "new", "Ebury", "sample,", "that", "introduces", "a", "significant", "number", "of", "new", "features." ]
[ 16, 0, 8, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "We", "first", "discussed", "them", "in", "April", "2015", "when", "we", "witnessed", "them", "targeting", "a", "number", "of", "organizations", "in", "Japan." ]
[ 16, 16, 16, 16, 16, 0, 8, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16, 2 ]
[ "It", "is", "important", "to", "note", "that", "Adobe", "has", "released", "the", "bulletin", "APSB15-27", "to", "address", "this", "vulnerability;", "the", "latest", "version", "of", "Flash", "19.0.0.226", "is", "no", "longer", "vulnerable." ]
[ 16, 16, 16, 16, 16, 16, 4, 16, 16, 16, 16, 1, 16, 16, 16, 7, 16, 16, 16, 16, 5, 13, 16, 16, 16, 16 ]
[ "The", "overlap", "between", "the", "HenBox", "and", "9002", "malware", "families", "Unit", "42", "has", "seen", "involves", "three", "shared", "C2s", "between", "several", "samples", ";", "the", "first", "IP", "below", "is", "used", "for", "more", "than", "half", "of", "the", "HenBox", "samples", "we", "have", "seen", "to", "date", ":", "47.90.81", "[", "." ]
[ 16, 16, 16, 16, 3, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 1, 9, 9 ]
[ "Kaspersky", "Lab", "reported", "the", "Trojan", "to", "Google", ",", "and", "it", "has", "now", "been", "removed", "from", "the", "store", "." ]
[ 4, 12, 16, 16, 16, 16, 4, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "September", "08", ",", "2020", "TikTok", "Spyware", "A", "detailed", "analysis", "of", "spyware", "masquerading", "as", "TikTok", "A", "recent", "threat", "to", "ban", "TikTok", "in", "the", "United", "States", "has", "taken", "the", "internet", "by", "storm", "and", "received", "mixed", "reactions", "from", "social", "media", "and", "internet", "users", "." ]
[ 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Interestingly", ",", "we", "found", "other", "DNS", "records", "mostly", "from", "2017", "that", "follow", "a", "similar", "pattern", "and", "appear", "to", "contain", "two-letters", "codes", "for", "districts", "in", "Italy", ":", "Server", "City", "server1bo.exodus.connexxa", "[", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 9 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/Turla.aj", "BKDR_TAVDIG.ZGEJ-A", "Win32.Trojan.WisdomEyes.16070401.9500.9998", "Trojan.Wipbot", "BKDR_TAVDIG.ZGEJ-A", "Troj.W32.Epiccosplay!c", "Win32.Backdoor.Wipbot.Ehhy", "BackDoor.Turla.52", "Trojan.Turla.Win32.35", "BehavesLike.Win32.Ramnit.cc", "Trojan.Win32.Turla", "BDS/WipBot.B.1", "Trojan.Kazy.D6CC04", "Backdoor:Win32/WipBot.B", "Trojan/Win32.Tavdig.C561133", "Trojan.Turla!36kTMhU81bU" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "However", ",", "given", "the", "way", "the", "trojan", "is", "built", ",", "it", "is", "highly", "customizable", ",", "meaning", "that", "adapting", "it", "to", "a", "different", "language", "would", "be", "extremely", "easy", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "This", "variation", "of", "the", "Trojan", "was", "also", "mentioned", "in", "the", "2013", "FireEye", "blogs", "about", "the", "Sunshop", "campaign", "3", "and", "operation", "ephemeral", "hydra", "4." ]
[ 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 0, 4, 16, 16, 16, 6, 14, 16, 16, 6, 14, 14, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Downloader.JSLP", "Trojan.Downloader.JSLP", "Adware.AdPeak", "Trojan/Downloader.Rottentu.a", "Trojan.Downloader.JSLP", "Win32.Trojan.WisdomEyes.151026.9950.9980", "Adware.Crossid", "Win32/Tnega.LUdScAC", "not-a-virus:AdWare.Win32.AdPeak.dn", "Adware.W32.Adpeak!c", "Trojan.Downloader.JSLP", "Trojan.Downloader.JSLP", "Trojan.DownLoader16.16196", "backdoor.win32.prorat.ah", "BehavesLike.Win32.Downloader.tc", "AdWare/AdPeak.ab", "GrayWare[AdWare:not-a-virus]/Win32.AdPeak", "Trojan.Downloader.JSLP", "TrojanDownloader:Win32/Tordow.A", "Adware/Win32.AdPeak.N1435735988", "AdWare.AdPeak", "Trojan.Downloader.JSLP" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "There", "are", "several", "different", "Locky", "campaigns", "going", "on", "at", "the", "same", "time,", "the", "largest", "being", "the", "one", "from", "affiliate", "ID", "3", "which", "comes", "with", "malicious", "ZIP", "containing", ".VBS", "or", ".JS", "attachments." ]
[ 16, 16, 16, 16, 6, 14, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 16, 1, 16, 1, 9 ]
[ "A", "backdoor", "also", "known", "as:", "Packed.Win32.TDSS!O", "RiskWare.Tool.CK", "Win32.Trojan.WisdomEyes.16070401.9500.9900", "W32/PWStealerX.EGK", "TSPY_RAVEN.A", "Trojan-PSW.Win32.Raven.b", "Trojan.Win32.Raven.ewlguc", "TrojWare.Win32.Patched.KSU", "BackDoor.Uragan", "TSPY_RAVEN.A", "BehavesLike.Win32.Ransomware.nc", "W32/PWS.PQHC-6858", "Trojan/PSW.Ravenpass.a", "PWS:Win32/Raven.C", "Trojan-PSW.Win32.Raven.b", "TrojanPSW.Raven", "Trojan.PWS.Raven!jl2h2OWvUG8", "Trojan-Spy.Win32.Hsow" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Cendelf.A8", "WS.Reputation.1", "Delf.PVUB", "Win32/Tnega.CTAcCXD", "PE:Malware.Delf!6.F", "BackDoor.Bulknet.1078", "TR/Spy.Browse.14364", "Trojan/Win32.Cendelf", "Trojan-Dropper.Delf", "W32/Delff.RJH!tr", "Delf.ALTK" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Streamlining", "development", "makes", "financial", "sense", "for", "attackers,", "so", "the", "findings", "may", "imply", "a", "bigger", "trend", "towards", "industrialization", "that", "achieves", "an", "economy", "of", "scale." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "It", "turned", "out", "that", "they", "are", "also", "atypical", "by", "many", "means." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "We've", "identified", "9,215", "samples", "tagged", "Banload", "in", "AutoFocus", "since", "December", "2013." ]
[ 16, 16, 16, 3, 16, 3, 16, 5, 16, 0, 8 ]
[ "Talos", "has", "observed", "a", "small", "email", "campaign", "leveraging", "the", "use", "of", "Microsoft", "Publisher", "files." ]
[ 12, 16, 16, 16, 6, 14, 14, 16, 16, 16, 16, 1, 9, 9 ]
[ "Chinese", "APK", "names", ":", "Some", "of", "FakeSpy", "’", "s", "APK", "package", "names", "contain", "anglicized", "Chinese", "(", "Mandarin", ")", "words", "that", "might", "be", "related", "to", "Chinese", "songs", "and", "lyrics", ",", "food", ",", "provinces", ",", "etc", "." ]
[ 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "While", "it", "can", "be", "used", "anywhere", "and", "target", "any", "bank", "or", "region", ",", "at", "this", "time", ",", "we", "are", "seeing", "it", "deployed", "specifically", "in", "Germany", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "In", "the", "latest", "implant", "versions", "there", "are", "48", "different", "commands", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "This", "IOC", "contains", "indicators", "detailed", "in", "the", "whitepaper", "Hiding", "in", "Plain", "Sight:", "FireEye", "and", "Microsoft", "Expose", "Chinese", "APT", "Group's", "Obfuscation", "Tactic" ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16, 4, 16, 6, 14, 14, 16, 16 ]
[ "Stumbled", "upon", "another", "one", "of", "the", "FakeAV's,", "its", "called", "Internet", "Security" ]
[ 16, 16, 16, 16, 16, 16, 3, 16, 16, 3, 11 ]
[ "A", "backdoor", "also", "known", "as:", "TrojanPWS.Mauthy.g3", "Win32.Trojan.WisdomEyes.151026.9950.9998", "Heur.AdvML.C", "Trojan.Win32.DownLoader1.dklsld", "Trojan.Win32.Z.Kazy.1108582[h]", "Trojan.DownLoader4.60407", "BehavesLike.Win32.SoftPulse.tc", "Trojan.Kazy.D103DE", "PWS:MSIL/Mauthy.A", "Trojan-PWS.MSIL", "PSW.ILUSpy", "Trj/CI.A", "Win32/Trojan.7d3" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "]", "com/", ")", ":", "This", "server", "provides", "APK", "files", "with", "advertising", "network", "." ]
[ 9, 9, 9, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "These", ".pub", "files", "are", "normally", "used", "for", "the", "publishing", "of", "documents", "such", "as", "newsletters,", "allowing", "users", "to", "create", "such", "documents", "using", "familiar", "office", "functions", "such", "as", "mail", "merging." ]
[ 16, 1, 9, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16, 16, 16, 16, 16, 4, 16, 16, 16, 16, 16, 16, 5, 13 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9869", "BackDoor.BlackEnergy.80", "Worm:Win32/Phdet.B" ]
[ 16, 3, 16, 16, 16, 1, 1, 1 ]
[ "By", "utilizing", "a", "completely", "fileless", "infection", "chain,", "the", "malware", "will", "be", "more", "difficult", "to", "analyze", "using", "a", "sandbox,", "making", "it", "more", "difficult", "for", "anti-malware", "engineers", "to", "examine." ]
[ 16, 16, 16, 16, 3, 11, 11, 11, 11, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 4, 12, 16, 16 ]
[ "In", "cooperation", "with", "WeipTech,", "we", "have", "identified", "92", "samples", "of", "a", "new", "iOS", "malware", "family", "in", "the", "wild." ]
[ 16, 16, 16, 4, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 11, 16, 16, 16 ]
[ "RetroTetris", "can", "be", "installed", "in", "Android", "versions", "starting", "from", "2.3", "Gingrebread", "while", "Brain", "Test", "can", "be", "installed", "in", "versions", "starting", "from", "2.2", "Froyo." ]
[ 3, 16, 16, 16, 16, 5, 13, 16, 16, 5, 13, 16, 3, 11, 16, 16, 16, 16, 15, 16, 16, 5, 13 ]
[ "A", "motivated", "attacker", "can", "use", "this", "trojan", "to", "harvest", "usernames", "and", "passwords", "and", "then", "reuse", "them", "to", "login", "into", "the", "organization", "'s", "system", "where", "the", "victim", "works", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "]", "net/mms.apk", "to", "view", "the", "message", "”", "Once", "the", "APK", "package", "is", "downloaded", ",", "potential", "victims", "are", "urged", "to", "grant", "the", "malicious", "app", "a", "wide", "range", "of", "permissions", "on", "their", "Android", "device", ":", "App", "permissions", "SEND_SMS", "RECEIVE_BOOT_COMPLETED", "INTERNET", "SYSTEM_ALERT_WINDOW", "WRITE_SMS", "ACCESS_NETWORK_STATE", "WAKE_LOCK", "GET_TASKS", "CALL_PHONE", "RECEIVE_SMS", "READ_PHONE_STATE", "READ_SMS", "ERASE_PHONE", "Once", "installed", ",", "MazarBOT", "downloads", "a", "copy", "of", "Tor", "onto", "users", "’", "Android", "smartphones", "and", "uses", "it", "to", "connect", "anonymously", "to", "the", "net", "before", "sending", "a", "text", "message", "containing", "the", "victim", "’", "s", "location", "to", "an", "Iranian", "mobile", "phone", "number", "." ]
[ 9, 9, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 5, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "malware", "mostly", "targets", "European", "users." ]
[ 16, 3, 16, 16, 4, 12 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9988", "Trojan.Win32.Geratid.dklqgw", "Trojan.Msil", "Backdoor:MSIL/Geratid.A!dll" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1 ]
[ "]", "top/", "Oct", "17", ",", "2017", "hxxp", ":", "//online.bankaustria.at.id87726", "[", "." ]
[ 9, 9, 16, 16, 16, 16, 1, 9, 9, 9, 9 ]
[ "CONCLUSION", "In", "this", "research", ",", "the", "Nocturnus", "team", "has", "dissected", "a", "rapidly", "evolving", "Android", "malware", "in", "the", "making", "." ]
[ 16, 16, 16, 16, 16, 16, 4, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16 ]
[ "Since", "Ginp", "is", "already", "using", "some", "code", "from", "the", "Anubis", "Trojan", ",", "it", "is", "quite", "likely", "that", "other", ",", "more", "advanced", "features", "from", "Anubis", "or", "other", "malware", ",", "such", "as", "a", "back-connect", "proxy", ",", "screen-streaming", "and", "RAT", "will", "also", "be", "added", "in", "the", "future", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "It", "was", "discovered", "in", "early", "2014", "and", "was", "named", "after", "a", "debug", "string,", "BlackMoon", "that", "was", "present", "in", "its", "code." ]
[ 16, 16, 16, 16, 0, 8, 16, 16, 16, 16, 16, 16, 16, 3, 15, 16, 16, 16, 16, 1 ]
[ "Volexity", "recently", "identified", "a", "breach", "to", "the", "website", "of", "a", "well", "regarded", "media", "outlet", "in", "the", "country", "of", "Georgia." ]
[ 4, 16, 16, 16, 16, 16, 1, 9, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 2 ]
[ "From", "the", "latter", "half", "of", "May", "until", "June", "10,", "there", "was", "a", "relative", "lull", "in", "TorrentLocker-related", "emails." ]
[ 16, 16, 16, 0, 8, 8, 16, 0, 8, 16, 16, 16, 16, 16, 16, 1, 10 ]
[ "This", "was", "an", "original", "spyware", "program", ",", "designed", "to", "exfiltrate", "almost", "all", "accessible", "information", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Lookout", "said", "in", "its", "own", "blog", "post", "published", "Wednesday", "that", "its", "threat", "detection", "network", "has", "recently", "observed", "a", "surge", "of", "Shedun", "attacks", ",", "indicating", "the", "scourge", "wo", "n't", "be", "going", "away", "any", "time", "soon", "." ]
[ 4, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "When", "enabled", ",", "it", "makes", "a", "screenshot", "every", "25", "seconds", "nggstart_key", "nggstop_key", "Enable/disable", "keylogging", "module", "nggstart_rec", "nggstop_rec", "Enable/disable", "surrounding", "sounds", "recording", "module", "ngg_status", "Send", "components", "status", "to", "the", "C", "&", "C", "socket", "*", "any", "other", "*", "Execute", "received", "command", "via", "Python", "’", "s", "subprocess.Popen", "(", ")", ",", "output", "result", "will", "be", "sent", "to", "the", "C", "&", "C", "socket", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "This", "technique", "is", "being", "used", "to", "allow", "the", "attackers", "to", "conceal", "their", "secondary", "payloads,", "bypassing", "different", "AV", "products." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 3, 16, 16, 5, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.Nuclear", "Win32.Trojan.WisdomEyes.16070401.9500.9871", "Trojan.Win32.Nuclear.baxsh", "Backdoor.Win32.Nuclear.182272", "Backdoor.Win32.Nuclear.CU", "BackDoor.Nuclearat.452", "Backdoor.Nuclear.Win32.1045", "Backdoor.Win32.Nuclear", "Backdoor/Nuclear.yt", "Trojan[Backdoor]/Win32.Nuclear", "Backdoor.Nuclear", "Trojan.Zusy.Elzob.493", "Win32/Nuclear.CU", "Backdoor.Nuclear!tPH0Q8Q37CQ" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Viking.GY", "TrojWare.Win32.Magania.~AD", "Trojan/Win32.Hupigon", "Trojan-PWS.Win32.Hangame.cl" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1 ]
[ "Most", "recently,", "we", "observed", "several", "relatively", "large", "email", "campaigns", "distributing", "the", "Kronos", "banking", "Trojan." ]
[ 16, 16, 16, 16, 16, 16, 16, 6, 14, 16, 16, 3, 11, 11 ]
[ "This", "domain", "has", "been", "previously", "reported", "as", "an", "lSMAgent", "C2." ]
[ 16, 1, 16, 16, 16, 16, 16, 1, 9, 9 ]
[ "''", "The", "report", "said", "HummingBad", "apps", "are", "developed", "by", "Yingmob", ",", "a", "Chinese", "mobile", "ad", "server", "company", "that", "other", "researchers", "claim", "is", "behind", "the", "Yinspector", "iOS", "malware", "." ]
[ 16, 16, 16, 16, 3, 16, 16, 16, 16, 4, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 5, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor/W32.CommInet.70741", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Backdoor.Exdis", "Trojan.Win32.Small.dqjffo", "MalCrypt.Indus!", "BackDoor.HangUp.44052", "BehavesLike.Win32.Backdoor.kh", "Trojan[Backdoor]/Win32.CommInet", "Win32.Hack.Small.ak.kcloud", "Backdoor:Win32/Easydor.D", "Bck/CommInet.V", "Win32.Backdoor.Comminet.dbwh", "Backdoor.Win32.CommInet", "Exdis.A!tr.bdr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "*", "*", "*", "End", "translation", "*", "*", "*", "The", "phishing", "template", "then", "presents", "additional", "instructions", "for", "installing", "the", "fake", "security", "application", "(", "Figure", "5", ")", ":", "Figure", "5", ":", "Additional", "instructions", "telling", "the", "victim", "to", "give", "the", "app", "the", "requested", "permissions", "(", "English", "translation", "below", ")", ",", "with", "stolen", "branding", "and", "fraudulent", "copy", "*", "*", "*", "Translation", "*", "*", "*", "Step", "2", ":", "Allow", "installation", "Open", "your", "device", "'s", "settings", ",", "select", "Security", "or", "Applications", "(", "depending", "on", "the", "device", ")", ",", "and", "check", "Unknown", "sources", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "If", "a", "user", "visits", "the", "profile", "host", "website", "and", "allows", "the", "installer", "to", "download", ",", "the", "iOS", "system", "will", "go", "directly", "to", "the", "β€œ", "Install", "Profile", "”", "page", "(", "which", "shows", "a", "verified", "safety", "certificate", ")", ",", "and", "then", "request", "the", "users", "’", "passcode", "for", "the", "last", "step", "of", "installation", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.RevengeRat.2", "TROJ_REVETRAT.SM", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Trojan.Revetrat", "TROJ_REVETRAT.SM", "Win.Trojan.RevengeRat-6344273-0", "BackDoor.RevetRat.2", "BehavesLike.Win32.Trojan.lm", "W32/Trojan.VQKC-8396", "Backdoor:MSIL/Revetrat.A!bit", "Backdoor.RevetRat", "Trj/GdSda.A", "Win32/Trojan.961" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "That", "security", "software", "is", "commonly", "installed", "on", "computers", "in", "Brazil", "as", "several", "banks", "require", "it", "to", "log", "into", "their", "online", "banking", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/W32.StartPage.87040.B", "Trojan.Searmapxp.FC.384", "Trojan.StartPage.MSIL", "Win32.Trojan.StartPage.ck", "Win.Trojan.Startpage-6834", "Trojan.Win32.Startpage.fsfn", "Trojan.Win32.StartPage.dztahb", "Trojan.Win32.Z.Startpage.87040.FS", "Troj.W32.Startpage!c", "Win32.Trojan.Startpage.Szvb", "TrojWare.Win32.Startpage.KAX", "Trojan.Click3.12428", "Trojan/StartPage.qbi", "Pua.Secure.Installer", "ADWARE/IERedirector.87040", "Trojan/Win32.Startpage", "Trojan:Win32/Searmapxp.A!bit", "Trojan.Win32.Startpage.fsfn", "Adware/Win32.StartPage.R160955", "Trojan.StartPage", "Trj/CI.A", "Trojan.Click!GCNxubkcTZg", "AdWare.IERedirector", "MSIL/StartPage.MI!tr", "Win32/Virus.Adware.007" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Therefore", ",", "β€œ", "Agent", "Smith", "”", "decompiles", "both", "the", "original", "application", "and", "the", "malicious", "payload", "and", "fuses", "them", "together", "." ]
[ 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.VBOverlayD.PE", "Trojan.Win32.Swisyn!O", "Trojan.Mofksys.A", "W32/Swisyn.ag", "Trojan/Swisyn.bner", "PE_MOFKSYS.A", "W32.Gosys", "Win32/VB.BOP", "PE_MOFKSYS.A", "Win.Virus.Sality:1-6335700-1", "Troj.W32.Swisyn.tnEM", "Trojan/Swisyn.rmj", "Trojan/Win32.Swisyn.bner", "Trojan.Win32.Swisyn.bner", "Trojan/Win32.Swisyn.R1452", "Trojan.Swisyn", "Trojan.Win32.VB" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "targets", "of", "these", "attacks", "appear", "to", "primarily", "be", "companies", "in", "the", "video", "games", "industry,", "although", "other", "targets", "may", "exist", "outside", "of", "our", "telemetry." ]
[ 16, 16, 16, 16, 1, 16, 16, 16, 16, 4, 16, 16, 4, 12, 12, 16, 16, 16, 16, 16, 16, 16, 16, 4 ]
[ "Many", "of", "the", "default", "strings", "in", "this", "application", "are", "in", "Arabic", ",", "including", "the", "name", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Unit", "42", "has", "observed", "a", "new", "version", "of", "Hworm", "or", "Houdini", "being", "used", "within", "multiple", "attacks." ]
[ 4, 12, 16, 16, 16, 16, 16, 16, 3, 16, 3, 16, 16, 16, 1, 9 ]
[ "A", "backdoor", "also", "known", "as:", "HEUR:Trojan.AndroidOS.Piom.dzu", "Trojan.Android.Piom.expmgs", "a.privacy.dingwe", "Android.Spy.422.origin", "ANDROID/Piom.otvgv", "Trojan/Android.Piom", "HEUR:Trojan.AndroidOS.Piom.dzu", "Trojan.AndroidOS.Spy.D", "Trojan.AndroidOS.Dingwe", "Android/Fyec.DZS!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Samples", "and", "command", "and", "control", "hosts", "associated", "with", "the", "Imminent", "Monitor", "RAT" ]
[ 16, 16, 1, 9, 9, 5, 16, 16, 16, 3, 11, 11 ]
[ "Finally", ",", "a", "new", "Windows", "service", "is", "created", "with", "the", "service", "path", "pointing", "to", "the", "candidate", ".exe", "located", "in", "this", "new", "directory", "together", "with", "the", "freshly", "created", ",", "benign-looking", "DLL", "." ]
[ 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "This", "strange", "behavior", "consisted", "of", "a", "large", "amount", "of", "peculiar", "files", "being", "written", "into", "sensitive", "system", "directories." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 9 ]
[ "It", "uses", "a", "variety", "of", "new", "techniques", ",", "but", "the", "most", "interesting", "thing", "is", "that", "it", "injects", "malicious", "code", "into", "the", "system", "libraries", "–", "libdmv.so", "or", "libandroid_runtime.so", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 1, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.CoinMinerSimY.Worm", "Trojan.Multi", "Backdoor.Graybird", "TROJ_COINMINE.THAOIO", "Trojan.Win32.Miner.tidx", "Trojan.Win32.Miner.exakqc", "Trojan.Win32.S.CoinMiner.1312256", "Uds.Dangerousobject.Multi!c", "Trojan.BtcMine.2100", "TROJ_COINMINE.THAOIO", "BehavesLike.Win32.MultiPlug.tc", "PUA.EnigmaProtector", "Trojan.Miner.axs", "W32.Miner.Smominru", "TR/Crypt.Xpack.vknzu", "Trojan.Win32.Miner.tidx", "Trojan:Win32/Smominru.A", "Unwanted/Win32.BitCoinMiner.C2352839", "Misc.Riskware.MoneroMiner", "Trojan.Miner", "RiskWare.BitCoinMiner", "Trj/CI.A", "Win32/CoinMiner.ALB", "Win32.Trojan.Miner.Dxct", "W32/CoinMiner.ALB!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "]", "26/html2/arc92/au483x.zip", "hxxp", ":", "//94.130.106", "[", "." ]
[ 9, 9, 1, 9, 9, 9, 9 ]
[ "Windows", "We", "have", "found", "multiple", "components", "that", "form", "an", "entire", "spyware", "system", "for", "the", "Windows", "platform", "." ]
[ 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "TrojanClicker.MSIL", "Trojan.Win32.Clicker!BT", "TrojWare.MSIL.TrojanClicker.Lasdoma.NRJ", "Trojan.Click3.24925", "Trojan.MSIL.TrojanClicker", "TrojanClicker.MSIL.mr", "TR/ATRAPS.hsvhb", "Trojan.Johnnie.DE2DE", "TrojanClicker:MSIL/Lasdoma.A!bit", "Win-Trojan/ADM01.Exp", "Trojan.Win32.Clicker!BT" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]