tokens
sequencelengths
2
296
ner_tags
sequencelengths
2
296
[ "A", "backdoor", "also", "known", "as:", "Trojan.Pakes", "Trojan/Pakes.cxg", "Trojan.Heur.EAB04F", "Win32.Trojan.WisdomEyes.16070401.9500.9965", "W32/Trojan2.BBCZ", "Win.Trojan.Pakes-1891", "Trojan.Win32.Pakes.cxg", "Trojan.Win32.Pakes.buyldp", "Troj.W32.Pakes.cxg!c", "Trojan.DownLoader.61691", "Trojan.Pakes.Win32.5440", "BehavesLike.Win32.Dropper.lc", "Trojan.Win32.Crypt", "W32/Trojan.VJUA-2101", "Trojan/Pakes.bvs", "Trojan/Win32.Pakes", "Win32.Troj.Unknown.kcloud", "Trojan.Win32.Pakes.cxg", "BScope.Trojan.MTA.01233", "Trj/Pakes.EB", "Win32.Trojan.Pakes.Dygy", "Trojan.Pakes!elDwpuVaGqk" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "One", "of", "the", "most", "interesting", "and", "active", "specimens", "to", "date", "was", "a", "mobile", "Trojan", "from", "the", "Rotexy", "family", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16 ]
[ "W32.Futurax", "is", "a", "worm", "that", "spreads", "via", "removable", "drives", "and", "network", "shares." ]
[ 1, 16, 16, 3, 16, 16, 16, 5, 13, 16, 5, 13 ]
[ "A", "backdoor", "also", "known", "as:", "Win.Trojan.Dapato-413", "Trojan.Win32.Dapato.bewyzt", "BackDoor.Cool.362", "TR/Spy.289792.56", "Win32.Troj.Undef.kcloud", "Dropper/Win32.Dapato", "Trojan-Downloader.win32.Delf.xoq", "Trojan-Dropper.Dapato.bauk", "Win32/Delf.OJW", "Trojan-Dropper.Win32.Dapato", "Delf.AJUR" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "Trojan", "works", "by", "creating", "an", "overlay", "whenever", "the", "user", "launches", "the", "banking", "application", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.eHeur.Virus02", "Virus.Win32.Sality!O", "BehavesLike.Win32.BadFile.fc", "Trojan-Spy.Win32.AutoHK", "TR/Dldr.AutoHK.rguvg", "TrojanDownloader:MSIL/AutoHK.B!bit", "TrojanSpy.AutoHK", "Win32/TrojanDownloader.AutoHK.BC" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "For", "the", "Trojan", "to", "install", ",", "the", "user", "must", "allow", "installation", "of", "apps", "from", "unknown", "sources", "in", "the", "device", "settings", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "(", "Have", "a", "look", "here", "and", "here", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Pony", "will", "infect", "the", "victim", "computer", "and", "download", "an", "additional", "malware." ]
[ 3, 16, 16, 16, 16, 5, 16, 16, 16, 3, 11 ]
[ "This", "and", "following", "versions", "were", "masquerading", "as", "fake", "β€œ", "Adobe", "Flash", "Player", "”", "apps", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 13, 16, 16, 16 ]
[ "Indeed", ",", "the", "Trojan", "explicitly", "targets", "Russian-speaking", "users", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "We", "discuss", "these", "changes", "and", "its", "effect", "on", "Android", "and", "Apple", "devices", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 5, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Chekafe.A", "TROJ_DLOADR.SMOK", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Win32/Donloz.AQU", "TROJ_DLOADR.SMOK", "Trojan.Win32.Downloader.14836", "Trojan.DownLoad2.12418", "BehavesLike.Win32.Backdoor.lm", "Trojan-Downloader.Win32.Chekafe", "Win32.TrojDownloader.tb.kcloud", "TrojanDownloader:Win32/Chekafe.C", "BScope.Trojan.SvcHorse.01643" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "HW32.Packed.4102", "TrojWare.Win32.CoinMiner.IEGT", "W32/Trojan.QGMZ-7351", "Trojan.Heur.FU.EE0BC8" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Virus.Win32.Sality!O", "W32/Trojan.HAUX-5531", "Trojan.Win32.Fsysna.erxi", "Variant.Symmi.mCm9", "BehavesLike.Win32.Downloader.tc", "Trojan/Blocker.idi", "TR/IRCBot.hjsna", "Trojan.Barys.DE0A3", "Trojan.Win32.Z.Ircbot.1304576", "Trojan.Win32.Fsysna.erxi", "Trojan:Win32/Fenibot.A", "Trojan/Win32.Inject.C860331", "Win32/IRCBot.NIM", "Trojan.Kazy", "W32/IRCBot.NIM!tr", "Trj/CI.A", "Win32/Trojan.2d1" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Giving", "an", "attacker", "access", "to", "a", "mobile", "device", "can", "have", "severe", "business", "consequences", ",", "especially", "if", "the", "end", "user", "is", "using", "their", "mobile", "device", "to", "discuss", "sensitive", "business", "topics", "or", "access", "enterprise", "financial", "information", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "CONTACTS", "–", "send", "text", "received", "from", "C", "&", "C", "to", "all", "user", "contacts", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "TrojanPWS.Fareit.FC.2719", "Trojan.Zusy.D33BC8", "Win32.Trojan.WisdomEyes.16070401.9500.9992", "BehavesLike.Win32.Trojan.vc", "Trojan/Win32.Inject.C1663733", "Trj/GdSda.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1 ]
[ "The", "malicious", "apps", "reached", "an", "astonishing", "spread", "between", "4.5", "million", "and", "18.5", "million", "downloads", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "By", "pivoting", "off", "of", "the", "infrastructure", "we", "learned", "that", "it", "is", "related", "to", "Winnti,", "a", "Chinese", "threat", "actor", "that", "is", "mostly", "targeting", "the", "gaming", "industry." ]
[ 16, 16, 16, 16, 16, 5, 16, 16, 15, 16, 16, 16, 16, 6, 6, 14, 14, 14, 16, 16, 16, 16, 4, 12, 12 ]
[ "A", "backdoor", "also", "known", "as:", "W32.MyDoomI.Kr", "Win32/Mydoom.BT", "W32.Dozer", "Win32/Lyzapo.A", "WORM_MYDOOM.EA", "Win.Trojan.Dozer-1", "Trojan.Dozer.1", "WORM_MYDOOM.EA", "BehavesLike.Win32.Mydoom.fc", "W32/Backdoor.VQLJ-7986", "Win32.Troj.Undef.kcloud", "TrojanDropper:Win32/Lyzapo.A", "Dropper/Win32.DDoS.N19798743", "W32/Mydoom.cf", "Trojan.DR.Lyzapo!rpJ9Iphh7tw", "W32/Dozzer.A!tr", "W32/MyDoom.HN.worm" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "]", "Once", "launched", ",", "the", "app", "starts", "to", "communicate", "with", "its", "C", "&", "C", "server", "(", "whose", "IP", "address", "is", "base64-encoded", "in", "the", "app", ")", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Split", "of", "exfiltrated", "data", "Some", "noteworthy", "files", "identified", "in", "content", "taken", "from", "compromised", "devices", "include", "passport", "photos", ",", "audio", "recordings", "of", "calls", ",", "other", "images", ",", "and", "a", "PDF", "document", "with", "data", "on", "484", "individuals", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Downloader", "Trojan.DownLoader6.50414", "BehavesLike.Win32.Trojan.tm", "TR/Dldr.Megone.cwqt", "Trj/CI.A", "Win32/Trojan.9b4" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan-PWS/W32.WebGame.123904.BJ", "Trojan-GameThief.Win32.Magania!O", "Backdoor.Zegost.29476", "Trojan/Magania.gxtv", "Trojan.Zusy.Elzob.DD23", "Win32.Trojan.Farfli.ai", "HV_MAGANIA_CA22396F.TOMC", "Win.Trojan.Magania-15913", "Trojan.Win32.Magania.thvzy", "Troj.GameThief.W32.Magania.l8gE", "Trojan.KeyLogger.13111", "Trojan.Magania.Win32.50884", "BehavesLike.Win32.Dropper.ch", "P2P-Worm.Win32.Palevo", "Trojan[GameThief]/Win32.Magania", "Win32.Troj.Transport.b.kcloud", "Trojan:DOS/Killmbr.dr", "Trojan.Win32.A.PSW-Magania.285696.A", "Trojan/Win32.Magania.R41109", "BScope.P2P-Worm.Palevo", "Trojan.Farfli!+e4pBtKCbqs" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Their", "targets", "have", "spanned", "all", "across", "the", "world,", "with", "a", "focus", "on", "government,", "defense", "organizations", "and", "various", "Eastern", "European", "governments." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 12, 12, 16, 16, 4, 12, 12 ]
[ "FrozenCell", "is", "part", "of", "a", "very", "successful", ",", "multi-platform", "surveillance", "campaign", "." ]
[ 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "JS/Nemucod", "is", "a", "JavaScript", "downloader", "trojan", "that", "targets", "users", "through", "malware", "spam", "campaigns." ]
[ 1, 16, 16, 3, 11, 11, 16, 16, 16, 16, 1, 9, 9 ]
[ "This", "same", "attacker", "is", "also", "reported", "to", "have", "targeted", "various", "military", "installations", "in", "Central", "Asia", "in", "the", "past" ]
[ 16, 16, 6, 16, 16, 16, 16, 16, 16, 16, 4, 12, 16, 2, 10, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "HW32.Packed.F222", "Backdoor.Bedep.10384", "BKDR_BEDEP.SMX", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "BKDR_BEDEP.SMX", "Trojan.Win32.Yakes.dsmtzi", "Trojan.Bedep.62", "BehavesLike.Win32.Spyware.cc", "Trojan.Win32.Crypt", "Backdoor/Bedep.v", "TR/Crypt.ZPACK.147808", "Trojan[Backdoor]/Win32.Bedep", "Trojan.Kazy.D9859B", "Backdoor/Win32.Bedep.R154894", "Backdoor.Bedep!", "W32/Bedep.D!tr", "Win32/Trojan.a60" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "Lazarus", "group", "is", "tied", "to", "the", "2014", "attack", "on", "Sony", "Pictures", "Entertainment", "and", "the", "2013", "DarkSeoul", "attacks." ]
[ 6, 14, 14, 16, 16, 16, 16, 0, 1, 16, 4, 12, 12, 16, 16, 0, 1, 9 ]
[ "It", "is", "unclear", "how", "long", "the", "malicious", "code", "existed", "inside", "the", "apps", ",", "hence", "the", "actual", "spread", "of", "the", "malware", "remains", "unknown", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "No", "Chrysaor", "apps", "were", "on", "Google", "Play", "." ]
[ 16, 3, 16, 16, 16, 5, 13, 16 ]
[ "The", "Callisto", "Group", "is", "an", "advanced", "threat", "actor", "whose", "known", "targets", "include", "military", "personnel,", "government", "officials,", "think", "tanks,", "and", "journalists", "in", "Europe", "and", "the", "South", "Caucasus." ]
[ 4, 12, 12, 16, 16, 6, 14, 14, 16, 16, 16, 16, 4, 12, 12, 12, 12, 12, 16, 4, 16, 2, 16, 2, 10, 10 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9901", "TROJ_GRAFTOR_GG3102DA.UVPM", "TrojWare.Win32.TrojanDownloader.Stantinko.CB", "Trojan.Kbdmai.83", "TROJ_GRAFTOR_GG3102DA.UVPM", "TR/Downloader.amdkv", "TrojanDownloader:Win32/Stantinko.A!bit", "Trj/GdSda.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "In", "this", "figure", "we", "have", "11", "RuMMS", "samples", ",", "all", "of", "which", "were", "hosted", "on", "the", "website", "as", "shown", "in", "the", "β€œ", "y", "”", "axis", "." ]
[ 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "However", ",", "it", "does", "n't", "request", "permissions", "like", "BIND_ADMIN", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.Virut.low6", "Trojan.Graftor.D295ED", "Win32.Trojan.WisdomEyes.16070401.9500.9753", "Win.Adware.Downware-564", "Trojan/Win32.Unknown", "Trojan:Win32/Vercuser.A", "Worm/Win32.VB.R47661", "Backdoor.Bot", "Trj/CI.A", "I-Worm.Vercuser.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Over", "the", "course", "of", "2016", "β€”", "and", "particularly", "intensifying", "towards", "the", "end", "of", "the", "year", "β€”", "several", "individuals", "known", "to", "Amnesty", "International", "were", "approached", "via", "email", "and", "through", "social", "media", "by", "Safeena", "Malik", "seemingly", "an", "enthusiastic", "activist", "with", "a", "strong", "interest", "in", "human", "rights." ]
[ 16, 16, 16, 16, 0, 16, 16, 16, 16, 16, 0, 8, 8, 8, 8, 16, 16, 16, 16, 16, 4, 12, 16, 16, 16, 1, 16, 16, 4, 12, 16, 4, 12, 16, 16, 4, 12, 16, 16, 16, 16, 16, 4, 12 ]
[ "The", "New", "York", "Times", "reported", "on", "Nov.", "15", "that", "Kryptowire", ",", "a", "mobile", "enterprise", "security", "company", ",", "discovered", "the", "code", "on", "a", "lower-end", "smartphone", "made", "by", "BLU", "Products", "of", "Doral", ",", "Fla", "." ]
[ 16, 4, 12, 12, 16, 16, 16, 16, 16, 4, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16, 16, 16, 16, 16, 16 ]
[ "New", "FakeSpy", "campaign", "applications", "leveraging", "fake", "postal", "services", "apps", "." ]
[ 16, 3, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "These", "intents", "are", "typically", "defined", "statically", "in", "the", "app", "’", "s", "AndroidManifest.xml", "config", "file", ";", "some", "HenBox", "variants", "register", "further", "intents", "from", "their", "code", "at", "run-time", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "As", "Talos", "is", "constantly", "monitoring", "changes", "across", "the", "threat", "landscape", "to", "ensure", "that", "our", "customers", "remain", "protected", "as", "threats", "continue", "to", "evolve,", "we", "took", "a", "deep", "dive", "into", "this", "malware", "variant", "to", "determine", "the", "technical", "capabilities", "and", "characteristics", "of", "Floki", "Bot." ]
[ 16, 4, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 6, 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Win32.Malware.1", "Win32.HEURCrypted", "Trojan.DownLoad.31887", "TR/Spy.197632.C", "Heuristic.BehavesLike.Win32.Packed.C", "W32/Tibs.WA!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1 ]
[ "According", "to", "the", "public", "information,", "cfm.com.ua", "domain", "belongs", "to", "the", "Β«Crystal", "Finance", "MillenniumΒ»", "software", "developer." ]
[ 16, 16, 1, 9, 9, 9, 9, 16, 16, 4, 12, 12, 12, 12, 12 ]
[ "Although", "early", "versions", "had", "some", "basic", "code", "and", "string", "obfuscation", ",", "protection", "of", "the", "third", "version", "of", "the", "malware", "was", "enhanced", "with", "the", "use", "of", "payload", "obfuscation", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Quick", "Sunday", "morning", "blog", "post,", "analysis", "of", "an", "unknown", "rtf", "file." ]
[ 16, 0, 8, 16, 16, 16, 16, 16, 1, 9, 9 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Heur.JP.E5BA68", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Backdoor.Trojan", "Trojan.Win32.9728.ikjtj", "Trojan.DownLoader3.22821", "Trojan.Win32.Swisyn", "TR/Dldr.Quillo.A", "Trojan/Win32.Unknown", "TrojanDownloader:Win32/Quillo.A", "Trojan/Win32.HDC.C3028", "Trojan.DL.Quillo!tw5+WNEhU5A", "W32/Downloader_x.FYF!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Blouiroet", "Trojan.Win32.Blouiroet.dx", "Trojan.Win32.Strictor.ewsjhc", "Troj.W32.Blouiroet!c", "Trojan.Blouiroet.Win32.43", "BehavesLike.Win32.DlHelper.tc", "Trojan.Blouiroet.an", "TR/Blouiroet.shppj", "Trojan/Win32.Blouiroet", "Trojan.Zusy.D3860E", "Trojan.Win32.Z.Zusy.1282560", "Trojan.Win32.Blouiroet.dx", "Trojan.Win32.Delf", "Trj/CI.A", "Win32/Trojan.c62" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Worm/W32.Lebreat.18944", "Worm.Lebreat.Win32.18", "W32/Lebreat.l", "Trojan.Win32.Lebreat.emyp", "W32/Breatle.L@mm", "W32.Spybot.Worm", "Win32/Lebreat.R", "Worm.Lebreat.D", "Net-Worm.Win32.Lebreat.l", "W32.W.Lebreat.l!c", "Worm.Win32.Lebreat.R", "Win32.HLLW.Breat", "BehavesLike.Win32.Backdoor.lc", "W32/Breatle.VJCM-5821", "I-Worm/Lebreat.a", "DcomRpc.G!exploit", "Worm[Net]/Win32.Lebreat", "Win32/Lebreat.worm.18944.B", "Worm:Win32/Reatle.L@mm", "Worm.Lebreat", "Win32.Worm-net.Lebreat.Hugg", "Worm.Win32.Lebreat.l" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "They", "range", "from", "the", "recreational", "apps", "like", "games,", "skins,", "and", "themes", "to", "phone", "optimization", "boosters." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "We", "have", "found", "another", "instance", "of", "malware", "posing", "as", "the", "Super", "Mario", "Run", "Android", "app", ",", "and", "this", "time", "it", "has", "taken", "the", "form", "of", "DroidJack", "RAT", "(", "remote", "access", "trojan", ")", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 13, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16 ]
[ "The", "AlienVault", "team", "has", "researched", "and", "added", "more", "IOC", "s", "found", "in", "the", "OTX", "portal." ]
[ 4, 12, 12, 16, 16, 16, 16, 16, 1, 16, 16, 16, 5, 13, 13 ]
[ "The", "Conversations", "modified", "samples", "differ", "from", "the", "original", "one", "in", "the", "getKnownHosts", "method", "that", "was", "modified", "to", "replace", "the", "main", "XMPP", "host", "with", "the", "attackers", "’", "C2", "server", ":", "It", "appears", "that", "the", "attackers", "were", "using", "a", "specific", "C2", "for", "the", "use", "of", "that", "app", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "EventBot", "appears", "to", "be", "a", "completely", "new", "malware", "in", "the", "early", "stages", "of", "development", ",", "giving", "us", "an", "interesting", "view", "into", "how", "attackers", "create", "and", "test", "their", "malware", "." ]
[ 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "During", "this", "period", ",", "malware", "samples", "display", "some", "typical", "adware", "characteristics", "such", "as", "unnecessary", "permission", "requirements", "and", "pop-up", "windows", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan-Spy/W32.Teamspy.34816.C", "TrojanSpy.Skeeyah", "Win32.Trojan.WisdomEyes.16070401.9500.9565", "Backdoor.Noknef", "TSPY_KONNI.A", "Trojan-Spy.Win32.Teamspy.jb", "Trojan.Win32.Teamspy.eojkym", "Troj.Spy.W32!c", "Trojan.DownLoader25.6499", "TSPY_KONNI.A", "W32/Trojan.TMQM-1890", "TrojanSpy.Teamspy.al", "TR/Taranis.4651", "Trojan[Spy]/Win32.TeamSpy", "Trojan-Spy.Win32.Teamspy.jb", "Backdoor:Win32/Konny.A", "Spyware.Infostealer.86016", "TrojanSpy.Teamspy", "Trojan.PasswordStealer", "Win32.Trojan-spy.Teamspy.Phgj", "TrojanSpy.Teamspy!7hsJ3qOc7gU", "Trojan.Taranis", "Trj/GdSda.A", "Win32/Trojan.6af" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "In", "mid-2022,", "Mandiant,", "in", "collaboration", "with", "Fortinet,", "investigated", "the", "exploitation", "and", "deployment", "of", "malware", "across", "multiple", "Fortinet", "solutions", "including", "FortiGate", "firewall,", "FortiManager", "centralized", "management", "solution,", "and", "FortiAnalyzer", "log", "management,", "analytics,", "and", "reporting", "platform." ]
[ 16, 13, 4, 16, 16, 16, 4, 16, 16, 3, 16, 16, 16, 3, 16, 16, 4, 16, 16, 5, 13, 13, 13, 13, 13, 16, 5, 13, 13, 13, 13, 13, 13 ]
[ "This", "malware", "can", "intercept", "the", "user's", "personal", "data,", "such", "as", "SMS", "messages,", "MMS", "messages,", "and", "USSD", "requests." ]
[ 16, 3, 16, 16, 16, 4, 12, 12, 16, 16, 1, 16, 1, 16, 16, 1, 9 ]
[ "HummingWhale", ",", "by", "contrast", ",", "managed", "to", "sneak", "its", "way", "into", "about", "20", "Google", "Play", "apps", "that", "were", "downloaded", "from", "2", "million", "to", "12", "million", "times", ",", "according", "to", "researchers", "from", "Check", "Point", ",", "the", "security", "company", "that", "has", "been", "closely", "following", "the", "malware", "family", "for", "almost", "a", "year", "." ]
[ 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 12, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.Supermm.1.0.B", "Backdoor/W32.SuperMM.251764", "Backdoor.Win32.SuperMM.10!O", "BackDoor-ACL.dll", "Backdoor/SuperMM.10.b", "W32/Backdoor.MRCA-2263", "Backdoor.Trojan", "Backdoor.Supermm.1.0.B", "Backdoor.Win32.SuperMM.10.b", "Backdoor.Supermm.1.0.B", "Trojan.Win32.SuperMM-10.gtre", "Backdoor.Win32.Z.Supermm.251764", "Backdoor.W32.Supermm!c", "Backdoor.Supermm.1.0.B", "Backdoor.Win32.SuperMM.10.B", "Backdoor.Supermm.1.0.B", "BackDoor.SuperMM.10", "Backdoor.SuperMM.Win32.7", "BackDoor-ACL.dll", "Trojan/PSW.Oicqmm98.Dll", "Trojan[Backdoor]/Win32.SuperMM", "Backdoor.Supermm.1.0.B", "Backdoor.Win32.SuperMM.10.b", "Backdoor:Win32/SuperMM.B", "Backdoor.Supermm.1.0.B", "Backdoor.SuperMM", "Win32/SuperMM.10.B", "Win32.Backdoor.Supermm.Tayo", "Trojan.Win32.Supermm", "BDoor.ACL!tr.bdr", "Win32/Backdoor.831" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.Truvasys", "TSPY_LIMITAIL.XXUDN", "Trojan.Win32.StrongPity.ekmtaw", "Troj.W32.Strongpity!c", "TSPY_LIMITAIL.XXUDN", "Trojan.StrongPity.j", "TR/StrongPity.vtcv", "Trojan/Win32.StrongPity", "Backdoor:Win32/Truvasys.A!dha", "PUP/Win32.DealPly.C2030575", "Trojan.StrongPity!", "Trojan.StrongPity", "Trj/GdSda.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "adware", "Trojan", "in", "fact", "potentially", "allows", "full", "remote", "access", "to", "the", "infected", "device." ]
[ 3, 11, 11, 16, 16, 16, 16, 1, 9, 9, 16, 5, 13, 13 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Win32.Bublik!O", "Trojan.Bublik.Win32.6109", "W32.W.AutoRun.l0qv", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Trojan.Win32.VB.xswue", "BehavesLike.Win32.Emotet.dh", "Trojan/Bublik.ccj", "Trojan/Win32.Bublik", "Trojan.Barys.D7D1", "Trojan:Win32/Klovbot.B", "Trojan/Win32.VBNA.R146461", "Trj/CI.A", "Trojan.Bublik!ZPZ98Vxhajk", "W32/VBKrypt.CFFF!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9995", "Backdoor.Win32.Androm.oyzg", "Trojan.Win32.Androm.exrcqp", "Trojan.DownLoader26.14208", "BehavesLike.Win32.Trojan.cc", "Trojan.MSIL.Crypt", "TR/Dropper.MSIL.ruzhp", "Backdoor.Win32.Androm.oyzg", "Trj/GdSda.A", "Win32.Backdoor.Androm.Ajls", "MSIL/Kryptik.BLU!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "But", "the", "apps", ",", "with", "their", "many", "millions", "of", "users", ",", "have", "captured", "the", "attention", "of", "the", "bad", "actors", ",", "too", ",", "who", "are", "exploiting", "the", "popularity", "of", "Netflix", "to", "spread", "malware", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojanspy.Enkalogs", "TSPY_KEYLOG.AUSJOZ", "Win32.Trojan.WisdomEyes.16070401.9500.9994", "TSPY_KEYLOG.AUSJOZ", "Trojan.Win32.Keylogger.evqveo", "Trojan.Win32.Z.Kazy.30722", "W32/Application.BPVK-3177", "Trojan.Kazy.D8E58F", "TrojanSpy:MSIL/Enkalogs.A", "Trj/GdSda.A", "MSIL/Keylogger.II!tr.spy", "Win32/Trojan.40d" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "CyberX", "has", "discovered", "a", "new,", "large-scale", "cyber-reconnaissance", "operation", "targeting", "a", "broad", "range", "of", "targets", "in", "the", "Ukraine." ]
[ 4, 16, 16, 16, 16, 6, 14, 14, 16, 16, 16, 16, 16, 4, 16, 16, 2 ]
[ "At", "this", "stage", ",", "the", "analysis", "can", "only", "continue", "by", "manually", "investigating", "the", "individual", "code", "blocks", "and", "opcode", "handlers", ",", "which", "are", "highly", "obfuscated", "(", "also", "using", "spaghetti", "code", ")", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Infection", "The", "user", "receives", "an", "SMS", "with", "a", "malicious", "link", "pointing", "to", "a", "fake", "website", "simulating", "a", "popular", "free", "ad", "service", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Figure", "8", "–", "Android", "requirements", "Android", "malware", "has", "been", "around", "for", "many", "years", "and", "will", "be", "with", "us", "for", "the", "foreseeable", "future", "." ]
[ 16, 16, 16, 5, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Since", "the", "plugin", "development", "pattern", "is", "generic", "and", "the", "plugin", "SDK", "can", "be", "easily", "embedded,", "the", "plugin", "architecture", "could", "be", "a", "trend", "among", "Android", "malware", "in", "the", "future." ]
[ 16, 16, 1, 9, 9, 16, 16, 16, 16, 5, 13, 16, 16, 16, 16, 16, 5, 13, 16, 16, 16, 16, 16, 3, 11, 16, 16, 16 ]
[ "A", "commercially", "available", "RAT." ]
[ 16, 16, 16, 3 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Downloader.JPIS", "Trojan.Downloader.JPIS", "Trojan.Downloader.JPIS", "TROJ_DALBOT.SMRR", "Win32.Trojan.WisdomEyes.16070401.9500.9750", "TROJ_DALBOT.SMRR", "Win.Trojan.Leepload-1", "Trojan.Downloader.JPIS", "Trojan.Downloader.JPIS", "Trojan.Win32.DloadrDOI.sxvve", "Trojan.Win32.A.Downloader.73728.ABY", "Trojan.Downloader.JPIS", "Trojan.DownLoader6.34186", "W32/Trojan.USUV-7153", "Trojan/Win32.Unknown", "TrojanDownloader:Win32/Dalbot.A", "Win-Trojan/Dalbot.73728", "Win32/Trojan.b77" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "We", "have", "reported", "the", "bug", "to", "Adobe", "who", "assigned", "it", "CVE-2017-11292", "and", "released", "a", "patch", "earlier", "today" ]
[ 16, 16, 16, 16, 16, 16, 4, 16, 16, 16, 1, 16, 16, 16, 16, 0, 8 ]
[ "Figure", "3", ":", "Step", "two", "of", "the", "credential", "phish", "asking", "for", "the", "victim", "’", "s", "email", "address", "and", "phone", "number", "Having", "stolen", "the", "victim", "’", "s", "account", "and", "personal", "information", ",", "the", "scammer", "introduces", "a", "social", "engineering", "scheme", ",", "informing", "users", "that", "they", "currently", "do", "not", "have", "the", "β€œ", "Bank", "Austria", "Security", "App", "”", "installed", "on", "their", "smartphone", "and", "must", "download", "it", "to", "proceed", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 13, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "This", "particular", "application", "is", "signed", "with", "a", "fake", "certificate", ":", "Owner", ":", "CN=Unknown", ",", "OU=Unknown", ",", "O=Unknown", ",", "L=Unknown", ",", "ST=Unknown", ",", "C=Unknown", "Issuer", "CN=Unknown", ",", "OU=Unknown", ",", "O=Unknown", ",", "L=Unknown", ",", "ST=Unknown", ",", "C=Unknown", "Serial", ":", "1c9157d7", "Validity", ":", "11/02/2017", "00:16:46", "03/20/2045", "00:16:46", "MD5", "Hash", ":", "A8:55:46:32:15", ":", "A9", ":", "D5:95", ":", "A9:91", ":", "C2:91:77:5D:30", ":", "F6", "SHA1", "Hash", ":", "32:17", ":", "E9:7E:06", ":", "FE:5D:84", ":", "BE:7C:14:0C", ":", "C6:2B:12:85", ":", "E7:03:9A:5F", "The", "app", "requests", "extensive", "permissions", "during", "installation", "that", "enable", "a", "range", "of", "activities", "supported", "by", "the", "malware", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 16, 16, 16, 1, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Worm.Autorun.VX", "Trojan/W32.Cosmu.214528.B", "Trojan.Win32.Cosmu!O", "Worm.Nenebra.AP8", "Win32.Worm.Delf.ca", "W32/Cosmu.C", "W32.SillyFDC", "Win32/Cosmu.AO", "Win.Trojan.Cosmu-268", "Win32.Worm.Autorun.VX", "Trojan-Ransom.Win32.Blocker.iwkz", "Win32.Worm.Autorun.VX", "Trojan.Win32.Cosmu.vifkp", "Trojan.Win32.A.Cosmu.212480[UPX]", "Win32.Trojan.Blocker.Wnme", "Win32.Worm.Autorun.VX", "Win32.Worm.Autorun.VX", "Win32.HLLW.Autoruner.57682", "Trojan.Cosmu.Win32.9114", "W32/Cosmu.KVSE-8775", "Trojan/Cosmu.gje", "WORM/Nenebra.A", "Trojan/Win32.Cosmu", "Win32.Worm.Autorun.VX", "Troj.Ransom.W32.Blocker!c", "Worm:Win32/Nenebra.A", "Win32.Worm.Autorun.VX", "TScope.Trojan.Delf", "Worm.AutoRun", "Trojan.Cosmu", "Win32/AutoRun.Delf.HF", "Trojan.Cosmu!gKBhUwtv5Oc", "Trojan-Downloader.Win32.Banload", "W32/Cosmu.XXS!tr", "W32/Autorun.JYX", "Win32/Worm.00b" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Razy.D2ECF0", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Trojan.DownLoader26.14415", "BehavesLike.Win32.Trojan.cc", "W32/Trojan.UDBU-2080", "TR/Crypt.Xpack.dmslo", "Backdoor/Win32.Androm.C2026756", "Trj/GdSda.A", "Trojan.Win32.Injector", "Win32/Trojan.bd4" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Runner.T", "Trojan/W32.Runner.2560.C", "Trojan.Win32.Runner!O", "Trojan.Runner.T", "W32/Runner.A", "Trojan.Runner.T", "Trojan.Win32.Runner.s", "Trojan.Runner.T", "Trojan.Runner.T", "Trojan.Win32.Runner", "W32/Runner.A", "Trojan/PSW.Almat.xs", "Trojan:Win32/Runner.D", "Troj.Dropper.W32.Small.kZ2V", "Trojan.Win32.Runner.s", "Trojan/Win32.Runner.C82211", "Trojan.Runner.T", "HEUR/QVM39.1.CC7B.Trojan.Win32.Runner" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.MSIL.FC.6901", "Trojan.Zusy.D1C473", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Trojan.Win64.Miner.re", "Trojan.Win32.Diztakun.dbjduc", "Trojan.Win32.Z.Zusy.37376.CM", "BehavesLike.Win32.PWSZbot.nm", "Trojan.Win32.Diztakun", "Trojan/Win64.Miner", "TrojanSpy:MSIL/Logstel.A", "Trojan.Win64.Miner.re", "Trj/GdSda.A", "Win64.Trojan.Miner.Dxwy", "Win32/Trojan.Spy.8ab" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.Hamaetot.A3", "Trojan.Razy.D176F", "BKDR_HAMAETOT.SM", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "BKDR_HAMAETOT.SM", "Win.Trojan.Stainz-1", "Trojan.DownLoader9.62446", "BehavesLike.Win32.Trojan.mm", "Backdoor/MSIL.vh", "Trojan/Win32.MSILBot", "Backdoor:MSIL/Hamaetot.A", "Win32.Outbreak" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Win32.Small.eftzxb", "TrojWare.MSIL.Tiny.HA", "Trojan.PWS.Stealer.18264", "Trojan.MSIL.Small", "PWS:MSIL/OnLineGames.NW!bit" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1 ]
[ "]", "31", "162.243.172", "[", "." ]
[ 9, 9, 1, 9, 9 ]
[ "]", "today", "shop", "[", "." ]
[ 9, 9, 1, 9, 9 ]
[ "A", "backdoor", "also", "known", "as:", "HW32.Packed.90AF", "Win32.Trojan.WisdomEyes.16070401.9500.9998", "Packed.Win32.Katusha.o", "Trojan.Win32.Waledac", "Trojan.Heur.TDss.EF7F42", "Packed.Win32.Katusha.o", "BScope.Trojan.MTA.0795" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Win32.VBKrypt!O", "VBObfus.m", "Trojan/VBKrypt.cyuv", "Trojan.VBKrypt.55", "Win32.Worm.Autorun.l", "W32.Changeup", "WORM_VOBFUS.SMHF", "Win.Trojan.Changeup-6169544-0", "Worm.Win32.WBNA.ipa", "Trojan.Win32.WBNA.dxinid", "Troj.PSW32.W.VB.lPYN", "Win32.HLLW.Autoruner.49334", "WORM_VOBFUS.SMHF", "BehavesLike.Win32.VBObfus.dm", "TR/VBKrypt.cyuv.30", "Worm:Win32/Vbnoet.A", "Trojan.Win32.A.VBKrypt.258048", "Worm.Win32.WBNA.ipa", "Trojan/Win32.VBKrypt.R5059", "Trojan-Dropper.Krumkach.11521" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "TrojanDownloader.MSIL", "Trojan.Win32.Z.Razy.20992.AYN", "Troj.Downloader.Msil!c", "Trojan.DownLoader25.50379", "W32/Trojan.SKRD-4085", "TrojanDownloader.MSIL.pxb", "Trojan.Razy.D361CA", "Backdoor:MSIL/Quasarat.A!bit", "Trj/GdSda.A", "Trojan.FOIG!tr", "Win32/Trojan.116" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.MSIL", "Ransom.FileCryptor", "Troj.Ransom.Msil!c", "Win32.Trojan.WisdomEyes.16070401.9500.9811", "W32/Ransom.TAAZ-2840", "Trojan.Win32.Ransom.ewmfpk", "Trojan.Encoder.5035", "BehavesLike.Win32.Trojan.pc", "Trojan-Ransom.FileCoder", "Trojan.MSIL.hyys", "TR/Ransom.cgaxa", "Trj/GdSda.A", "Win32.Trojan.Raas.Auto", "MSIL/Filecoder.AC!tr", "Win32/Trojan.Ransom.568" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Moroever,", "the", "vawtrak", "sample", "we", "got", "downloads", "a", "new", "memory", "scraping", "malware", "that", "scans", "for", "credit", "card", "data", "in", "memory." ]
[ 16, 16, 3, 16, 16, 16, 16, 16, 16, 3, 11, 11, 16, 16, 1, 9, 9, 9, 9, 9 ]
[ "A", "backdoor", "also", "known", "as:", "Trojanpws.Cosratu", "TrojWare.MSIL.Cosratu.QOA", "Trojan.PWS.Stealer.20141", "TR/Downloader.aymho", "PWS:MSIL/Cosratu.A!bit", "Trj/GdSda.A", "Trojan.Razy.D36F19", "Trojan.MSIL.PSW", "Win32/Trojan.480" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojannotifier.Phinot", "Trojan/Phinot.120", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "W32/Backdoor.HHE", "Backdoor.Trojan", "Win32/Small.BX", "TROJ_PHINOT.A", "Trojan-Notifier.Win32.Phinot.120", "Trojan.Win32.Phinot.hkgh", "Trojan.Popon", "Trojan.Phinot.Win32.1", "Trojan.Win32.DNSChanger", "W32/Backdoor.HEXL-8738", "Trojan/Delf.Phinot.a", "Trojan[Notifier]/Win32.Phinot", "Win32.Troj.Phinot.12.kcloud", "Trojan.Heur.GZ.E38D33", "Troj.Notifier.W32.Phinot.120!c", "Trojan-Notifier.Win32.Phinot.120", "Win32.Trojan.Phinot.Wstw", "Trojan.Phinot!Cq2wyKHab1w", "W32/Phinot.120!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Evidence", "suggests", "that", "the", "tool", "is", "being", "used", "as", "part", "of", "a", "very", "targeted", "campaign,", "focused", "on", "Chinese", "nationals", "in", "commercial", "organizations." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 16, 16, 4, 12, 16, 4, 12 ]
[ "Reports", "emerged", "just", "over", "a", "week", "ago", "of", "a", "new", "cyber-enabled", "bank", "heist", "in", "Asia." ]
[ 16, 16, 16, 16, 0, 8, 8, 16, 16, 1, 9, 9, 9, 16, 2 ]
[ "These", "attacks", "are", "highly", "targeted,", "appear", "to", "re-purpose", "legitimate", "content", "in", "decoy", "documents,", "and", "had", "very", "low", "antivirus", "AV", "detection", "rates", "at", "the", "time", "they", "were", "deployed." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "As", "for", "the", "Ashas", "family", ",", "one", "of", "the", "associated", "promotional", "videos", ",", "β€œ", "Head", "Soccer", "World", "Champion", "2018", "–", "Android", ",", "ios", "”", "was", "viewed", "almost", "three", "million", "times", "and", "two", "others", "reached", "hundreds", "of", "thousands", "of", "views", ",", "as", "seen", "in", "Figure", "11", "." ]
[ 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor/W32.Hupigon.516096.L", "Downloader.Small.11945", "Win32.Trojan.WisdomEyes.16070401.9500.9812", "Win32/Citeary.B", "HV_DOWN.98AC8B50", "Win.Trojan.Small-20870", "Trojan-Dropper.Win32.Small.hms", "Trojan.Win32.Small.dlprwb", "Trojan.DownLoader3.7934", "TrojanDropper.Small.fam", "Trojan[Downloader]/Win32.Small", "Trojan-Dropper.Win32.Small.hms", "Win32/TrojanDownloader.Small.PJP", "Win32.Trojan-dropper.Small.Taow", "Trojan.DR.Small!DUb+rE11TVI", "W32/Small.HMS!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "We", "have", "named", "this", "Ransomware", "KeRanger.", "The", "only", "previous", "ransomware", "for", "OS", "X", "we", "are", "aware", "of", "is", "FileCoder,", "discovered", "by", "Kaspersky", "Lab", "in", "2014." ]
[ 16, 16, 16, 16, 3, 11, 16, 16, 16, 3, 16, 5, 13, 16, 16, 16, 16, 16, 3, 16, 16, 4, 12, 16, 0 ]
[ "Each", "instance", "had", "between", "100,000", "and", "500,000", "downloads", "according", "to", "Google", "Play", "statistics", ",", "reaching", "an", "aggregated", "infection", "rate", "of", "between", "200,000", "and", "1", "million", "users", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.BhoSearcher.B", "Trojan.BhoSearcher.B", "Trojan.BhoSearcher.B", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "TROJ_DURSG.A", "Trojan.BhoSearcher.B", "Trojan.BhoSearcher.B", "Trojan.BhoSearcher.B", "Trojan.BhoSearcher.10", "TROJ_DURSG.A", "BehavesLike.Win32.Injector.nt", "Trojan-Downloader.Win32.ConHook", "Trojan:Win32/Dursg.A", "Trojan/Win32.ConHook.C286311", "Trojan.Dursg!2KwSbji4syo" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]