tokens
sequencelengths
2
296
ner_tags
sequencelengths
2
296
[ "A", "backdoor", "also", "known", "as:", "RemoteAdmin.Win32.eSurveiller!O", "Trojan.VB.Win32.68501", "Trojan/VB.nqz", "TSPY_ESURVEILLER_DC07000D.UVPA", "Spyware.ESurveiller", "TSPY_ESURVEILLER_DC07000D.UVPA", "Win.Trojan.Infostealer-5", "Backdoor.Win32.VB.ppb", "Trojan.Win32.Dwn.ssuio", "Trojan.Win32.VB.1452000", "Troj.Infostealer.lDrj", "Trojan.DownLoader1.64229", "not-a-virus:RemoteAdmin.Win32.eSurveiller", "Trojan.Strictor.D2473", "Backdoor.Win32.VB.ppb", "Unwanted/Win32.Radmin.R25253", "Backdoor.VB", "Trj/CI.A", "Trojan.Infostealer", "Win32.Backdoor.Vb.Lnns", "Trojan.DownLoader!" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Infrastructure", "FTP", "server", "The", "attackers", "used", "ftp", ":", "//213.174.157", "[", "." ]
[ 16, 16, 16, 16, 16, 16, 1, 9, 9, 9, 9 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Delf.Inject.Z", "Trojan-Dropper.Win32.Mudrop!O", "Hacktool.Passview", "Trojan.Delf.Inject.Z", "Trojan/Dropper.Mudrop.ew", "TROJ_DROPPER.HVW", "Win32.Worm.AutoRun.ij", "W32/Risk.BDUN-6545", "TROJ_DROPPER.HVW", "Win.Trojan.Delf-3744", "Trojan.Delf.Inject.Z", "Trojan-Dropper.Win32.Mudrop.ew", "Trojan.Delf.Inject.Z", "Trojan.Win32.Mudrop.crqisw", "Trojan.Win32.MulDrop.1431634", "Trojan.Delf.Inject.Z", "TrojWare.Win32.TrojanDropper.Mudrop.~RA", "Trojan.Delf.Inject.Z", "Trojan.MulDrop.12722", "Dropper.Mudrop.Win32.77", "BehavesLike.Win32.PUP.tc", "W32/Dropper.GWJ", "TrojanDropper.Mudrop.fy", "TR/Spy.Ftput.C", "Trojan[PSW]/Win32.LdPinch", "Trojan.Delf.Inject.Z", "Trojan-Dropper.Win32.Mudrop.ew", "PWS:Win32/Sounli.A", "Dropper/Win32.Mudrop.C138252", "TrojanPSW.Pinch", "Trojan.PWS.LdPinch!Csxdj/6mZgk", "Trojan-Dropper.Win32.Mudrop" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "RedLine", "Stealer's", "evasive", "spear-phishing", "campaign", "targets", "the", "hospitality", "industry." ]
[ 6, 14, 16, 6, 14, 16, 4, 12, 12 ]
[ "Web", "application", "vulnerabilities", "are", "like", "doorways:", "you", "never", "know", "who", "or", "what", "will", "walk", "through." ]
[ 7, 15, 15, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Threat", "actors", "with", "strategic", "interest", "in", "the", "affairs", "of", "other", "governments", "and", "civil", "society", "organizations", "have", "been", "launching", "targeted", "exploitation", "campaigns", "for", "years." ]
[ 6, 14, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16, 4, 12, 12, 16, 16, 16, 16, 6, 14, 16, 0 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9984", "TR/AD.Corinrat.sejyy", "Trojan.Application.MSILPerseus.D535", "Ransom:MSIL/PentagonRat.A", "Trj/GdSda.A", "Win32/Application.478" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1 ]
[ "Runtastic", "sample", "permission", "prompt", "Runtastic", "sample", "permission", "prompt", "Checking", "foreground", "app", "Marcher", "is", "one", "of", "the", "few", "Android", "banking", "Trojans", "to", "use", "the", "AndroidProcesses", "library", ",", "which", "enables", "the", "application", "to", "obtain", "the", "name", "of", "the", "Android", "package", "that", "is", "currently", "running", "in", "the", "foreground", "." ]
[ 5, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Heur.Win32.VBKrypt.3!O", "Trojan.Vbot.S15507", "Downloader.VB.Win32.107566", "Trojan/AntiAV.out", "Win32.Trojan.WisdomEyes.16070401.9500.9933", "Trojan.Win32.AntiAV.cqff", "Trojan.Win32.AntiAV.bbnaxd", "Trojan.MulDrop3.35749", "Trojan.AntiAV.abe", "TR/Offend.7084277.1", "Trojan:Win32/Vbot.T", "Trojan.Win32.AntiAV.cqff", "Downloader/Win32.VB.C136965", "Trojan.AntiAV", "Win32.Trojan.Antiav.Wmiq", "Trojan.AntiAV!kRLKkhVQepY" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.FamVT.RazyNHmA.Trojan", "Trojan.Waldek", "Trojan.Symmi.D100C4", "WORM_HPKASIDET.SM0", "Win32.Trojan.Kryptik.aio", "WORM_HPKASIDET.SM0", "Win.Trojan.Betabot-5", "Trojan.Win32.NgrBot.evigbp", "BackDoor.IRC.NgrBot.566", "BehavesLike.Win32.MultiPlug.cm", "W32/Trojan.HZWF-1490", "TR/Crypt.Xpack.tsufk", "Trojan:Win32/Radonskra.B", "Trojan/Win32.Upbot.C1483736", "Trj/GdSda.A", "Trojan-Ransom.Raa", "W32/Kryptik.FACF!tr", "Win32/Trojan.a93" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Attackers", "are", "continually", "trying", "to", "find", "new", "ways", "to", "target", "users", "with", "malware", "sent", "via", "email." ]
[ 6, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16, 3, 1, 9, 9 ]
[ "Security", "experts", "have", "long", "warned", "of", "the", "ability", "of", "advanced", "adversaries", "to", "subvert", "hardware", "and", "software", "supply", "chains", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Multi", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Zum.Rastarby.4", "Trojan.Win32.Miner.tfkd", "Zum.Rastarby.4", "Riskware.Win64.BtcMine.dugwfh", "Uds.Dangerousobject.Multi!c", "Win32.Trojan.Miner.Dux", "BehavesLike.Win32.AdwareLinkury.tc", "Zum.Rastarby.4", "Trojan.Win32.Miner.tfkd", "Trojan:Win64/HelaMiner.A", "Trojan.Miner", "BAT/CoinMiner.YJ", "Trj/CI.A", "Win32/Trojan.769" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "Janus", "vulnerability", ",", "which", "allows", "the", "actor", "to", "replace", "any", "application", "with", "an", "infected", "version", "." ]
[ 16, 7, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.ZXShell", "BKDR_ZXSHELL.D", "Backdoor.Win32.ZXShell.v", "Backdoor.W32.Zxshell!c", "BKDR_ZXSHELL.D", "BDS/ZXShell.999712", "W32/ZxShell.D!tr", "Trojan.Kazy.DB0C8D", "Backdoor:Win32/Zxshell.A!dha", "Backdoor/Win32.ZXShell.N1663696022", "Win32.Backdoor.Zxshell.Pfjm", "Trojan.Win32.Zxshell", "Win32/Backdoor.6e4" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "the", "worm", "was", "back,", "and", "it", "was", "both", "more", "and", "less", "effective." ]
[ 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.BitCoinMiner", "Riskware.Win32.BtcMine.exrhsn", "Trojan.Win32.Z.Strictor.1934848", "Win32.Trojan.Strictor.Akpc", "Tool.BtcMine.982", "BehavesLike.Win32.BadFile.tc", "Trojan.Win32.CoinMiner", "TR/CoinMiner.vctqx", "Trojan.Strictor.D2613C", "Trojan.Win64.BitCoinMiner", "W32/CoinMiner.AZU!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "use", "of", "DDE", "with", "PowerShell", "allows", "an", "attacker", "to", "execute", "arbitrary", "code", "on", "a", "victim's", "system", "regardless", "whether", "macros", "are", "enabled." ]
[ 16, 16, 16, 5, 16, 5, 16, 16, 6, 16, 1, 9, 9, 16, 5, 13, 13, 16, 16, 3, 16, 16 ]
[ "]", "org", "Ties", "to", "previous", "activity", "The", "registrant", "of", "cdncool", "[", "." ]
[ 9, 9, 16, 16, 16, 16, 16, 16, 16, 1, 9, 9 ]
[ "In", "addition", "to", "Chipotle,", "the", "hackers", "appears", "to", "be", "targeting", "national", "restaurant", "franchises", "Baja", "Fresh", "and", "Ruby", "Tuesday,", "according", "to", "malware", "samples", "and", "other", "evidence", "CyberScoop", "obtained." ]
[ 16, 16, 16, 4, 16, 6, 16, 16, 16, 16, 4, 12, 12, 12, 12, 12, 12, 12, 16, 16, 3, 16, 16, 16, 16, 4, 16 ]
[ "ThreatLabz", "has", "determined", "that", "Nevada", "shares", "significant", "code", "with", "the", "Rust-based", "variant", "of", "Nokoyawa." ]
[ 4, 16, 16, 16, 3, 16, 16, 16, 16, 3, 11, 11, 11, 11 ]
[ "This", "past", "week,", "our", "team", "has", "identified", "a", "group", "of", "malware", "samples", "that", "matched", "behavioral", "heuristics", "for", "multiple", "known", "malware", "families." ]
[ 16, 0, 8, 16, 4, 16, 16, 16, 3, 11, 11, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11 ]
[ "A", "backdoor", "also", "known", "as:", "W32.ShellKillUnixOSPtv.Worm", "Trojan.Script.BXM", "Trojan.VBS.Kofornix.A", "Trojan.KillDisk.MBR", "Troj.W32.EraseMBR.d!c", "Trojan.Jokra", "Win32/DarkSeoul.AA", "UNIX_KILLMBR.A", "Trojan.Win32.EraseMBR.d", "Trojan.Script.BXM", "Trojan.Script.EraseMBR.bxxrlr", "Trojan.Script.BXM", "Trojan.Script.BXM", "Trojan.KillMBR.168", "BASH/Kast.A!tr", "Trojan.Script.BXM", "Trojan.Win32.EraseMBR.d", "Trojan:SH/Kofornix.A", "Trojan.SH.KilMBR", "Win32.Trojan.Erasembr.Wtnk", "Trojan.Win32.EraseMBR", "Trojan.Script.BXM", "Win32/Trojan.6f6" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "]", "27", "[", "." ]
[ 9, 9, 9, 9 ]
[ "It", "encodes", "strings", "into", "binary", "arrays", ",", "making", "it", "hard", "to", "inspect", "them", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Like", "many", "original", "equipment", "manufacturers", ",", "it", "uses", "software", "components", "from", "other", "developers", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "I-Worm.Plesa.r3", "Trojan/Plesa.a", "IRC-Worm.Plesa!VraGnsrR3Es", "W32/Plesa.A@p2p", "W32.SillyP2P", "IRC/Plesa.A", "WORM_PLESA.B", "Worm.IRC.Plesa.A", "IRC-Worm.Win32.Plesa.a", "Trojan.Win32.Plesa.fuyf", "Worm.Win32.A.IRC-Plesa.34304[h]", "Worm.IRC.Plesa.A", "Win32.HLLW.Plesa", "Worm.Plesa.Win32.1", "WORM_PLESA.B", "BehavesLike.Win32.Sality.nc", "W32/Plesa.BXPQ-5568", "I-Worm/Plesa.a", "WORM/Irc.Plesa.A.2", "W32/Plesa.A!worm.irc", "Worm[IRC]/Win32.Plesa", "W32.W.Plesa.a!c", "Win32/Plesa.worm.34304", "Worm:Win32/Plesa.A", "Win32.Worm-irc.Plesa.Svqx", "IRC-Worm/Plesa.A", "Worm.Win32.Plesa.a" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.Spybot.Worm", "W32/Packed_Packman.A", "Virus.Win32.Heur.c", "Backdoor.Rbot!IK", "Win32.HLLW.MyBot.based", "Backdoor.Rbot", "BackDoor.RBot.IA" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1 ]
[ "Allows", "an", "application", "to", "read", "or", "write", "the", "system", "settings", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "In", "mid-July,", "Palo", "Alto", "Networks", "Unit", "42", "identified", "a", "small", "targeted", "phishing", "campaign", "aimed", "at", "a", "government", "organization." ]
[ 16, 0, 4, 12, 12, 12, 12, 16, 16, 3, 16, 6, 14, 16, 16, 4, 12, 12 ]
[ "Many", "top", "providers", "in", "Russia", "offer", "cheap", "prices", "for", "their", "shared", "hosting", "services", ",", "and", "some", "even", "provide", "free", "30-day", "trial", "periods", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "]", "205", "[", "." ]
[ 9, 9, 9, 9 ]
[ "]", "it", "Firenze", "server1gioiat.exodus.connexxa", "[", "." ]
[ 9, 9, 16, 1, 9, 9 ]
[ "What", "lied", "beneath", "this", "facade", "was", "a", "well-engineered", "campaign", "of", "phishing", "attacks", "designed", "to", "steal", "credentials", "and", "spy", "on", "the", "activity", "of", "dozens", "of", "journalists,", "human", "rights", "defenders,", "trade", "unions", "and", "labour", "rights", "activists,", "many", "of", "whom", "are", "seemingly", "involved", "in", "the", "issue", "of", "migrants'", "rights", "in", "Qatar", "and", "Nepal." ]
[ 16, 16, 16, 16, 16, 16, 16, 6, 14, 16, 1, 9, 16, 16, 1, 9, 16, 16, 16, 16, 16, 16, 16, 16, 4, 12, 12, 12, 12, 12, 16, 4, 12, 12, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 2, 16, 2 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.PWS.Coced.2.4.6", "Trojan.PWS.Coced.2.4.6", "Trojan.PWS.Coced.2.4.6", "Trojan.Win32.Coced.bhwfkh", "Hacktool.PWSteal", "Naebi.246", "Trojan-PSW.Win32.Coced.246", "Trojan.PWS.Coced!FBVVvUBVA1M", "Trojan.PWS.Coced.2.4.6", "TrojWare.Win32.PSW.Coced.246", "Trojan.PWS.Coced.2.4.6", "Trojan.PWS.Coced.246", "Trojan.Coced.Win32.158", "W32/Risk.HJYL-5906", "Trojan/PSW.Coced.246", "TR/PSW.Coced.246", "Trojan[PSW]/Win32.Coced", "Win32.PSWTroj.Coced.kcloud", "PWS:Win32/Coced.2_46", "Win-Trojan/Coced.19456", "Trojan.PWS.Coced.2.4.6", "Trojan.PWS.Coced.2.4.6", "TrojanPSW.Coced", "Win32/PSW.Coced.246", "Win32.Init.QQRob.dkwv", "W32/Coced.246!tr.pws", "PSW.Coced", "Trojan.Win32.InfoStealer.AYJO" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "It", "’", "s", "worth", "noting", "however", ",", "about", "one-third", "of", "the", "HenBox", "apps", "contained", "embedded", "APK", "objects", "that", "did", "not", "refer", "to", "legitimate", "apps", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Some", "of", "the", "new", "2014-2015", "Duqu", "infections", "are", "linked", "to", "the", "P5+1", "events", "and", "venues", "related", "to", "the", "negotiations", "with", "Iran", "about", "a", "nuclear", "deal." ]
[ 16, 16, 16, 16, 0, 3, 11, 16, 16, 16, 16, 1, 9, 16, 16, 16, 16, 16, 16, 16, 2, 16, 16, 16, 16 ]
[ "This", "local", "port", "is", "used", "by", "Exodus", "Two", "to", "execute", "various", "commands", "on", "the", "Android", "device", ",", "such", "as", "enabling", "or", "disabling", "certain", "services", ",", "or", "parsing", "app", "databases", "." ]
[ 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "This", "latest", "attack", "potentially", "materially", "impacts", "one", "of", "the", "primary", "countermeasures", "employed", "against", "wiper", "attacks:", "Virtual", "Desktop", "Interface", "snapshots." ]
[ 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 1, 5, 13, 13, 13 ]
[ "One", "is", "CVE-2012-1856,", "reinvigorated", "with", "a", "novel", "ROP", "chain", "to", "bypass", "ASLR", "and", "deliver", "the", "uWarrior", "payload." ]
[ 16, 16, 1, 16, 16, 16, 16, 1, 9, 16, 16, 16, 16, 16, 16, 3, 11 ]
[ "A", "backdoor", "also", "known", "as:", "Packer.YodaBased.B", "Packer.YodaBased.B", "Packer.YodaBased.B", "Win32.Trojan.WisdomEyes.16070401.9500.9994", "Packer.YodaBased.B", "Trojan.Win32.AutoRun.omxo", "Packer.YodaBased.B", "Packed.Win32.Klone.~KE", "Packer.YodaBased.B", "BackDoor.Attacker", "BehavesLike.Win32.Downloader.pc", "Backdoor.Win32.Hupigon", "Trojan/PSW.GamePass.msl", "TrojanDownloader:Win32/Murka.A", "Worm.Win32.Autorun.45568.I", "Packer.YodaBased.B", "TScope.Malware-Cryptor.SB", "Trj/CI.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Downloader-72360", "Adware.BDSearch.1", "Trojan.DownLoad.40686", "Win32/Jhee.H", "Adware.Rugo", "Trojan:Win32/Jhee.G", "Adware.BDSearch.1", "Adware.WSearch.O", "Trj/CI.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "As", "we", "know", "from", "the", "FTP", "dump", "analysis", ",", "there", "was", "a", "firmware", "component", "from", "ASUS", "firmware", ",", "indicating", "the", "attacker", "’", "s", "interest", "in", "ASUS", "devices", ",", "which", "explains", "the", "victim", "file", "name", "that", "mentions", "“", "ASUS", "”", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.Clodfa8.Trojan.1d71", "Trojan.Keylogger.NAD", "Trojan.Tuma.r4", "Trojan.Keylogger.NAD", "Trojan/Spy.oop", "Trojan.Keylogger.NAD", "backdoor.win32.hupigon.fn", "W32/Trojan3.KYS", "Trojan.Win32.Tuma.deaiow", "Trojan.Win32.Z.Keylogger.20480.K[h]", "Troj.Keylogger.Nad!c", "Trojan.Keylogger.NAD", "Trojan.Keylogger.NAD", "Trojan.Keylogger.Win32.35586", "W32/Trojan.GLTF-2077", "TR/Tuma.A", "W32/Keylog.A!tr.spy", "Trojan.Keylogger.NAD", "Trojan:Win32/Tuma.A", "TrojanSpy.KeyLogger!6zo304KOTCM", "Trojan.Win32.Spy", "Trojan.Keylogger.NAD", "PSW.KeyLogger.CUC", "Win32/Trojan.Keylog.761" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "In", "the", "last", "month", "Trustwave", "was", "engaged", "by", "two", "separate", "hospitality", "clients,", "and", "one", "restaurant", "chain", "for", "investigations", "by", "an", "unknown", "attacker", "or", "attackers." ]
[ 16, 16, 0, 8, 4, 16, 16, 16, 16, 16, 4, 12, 16, 16, 4, 12, 11, 16, 16, 6, 14, 14, 16, 6 ]
[ "Malware", "writers", "have", "always", "sought", "to", "develop", "feature-rich,", "easy", "to", "use", "tools", "that", "are", "also", "somewhat", "hard", "to", "detect", "via", "both", "host-", "and", "network-based", "detection", "systems." ]
[ 6, 14, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 15, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 5, 13, 13 ]
[ "Unit", "42", "researchers", "recently", "observed", "an", "unusually", "clever", "spambot's", "attempts", "to", "increase", "delivery", "efficacy", "by", "abusing", "reputation", "blacklist", "service", "APIs.", "Rather", "than", "sending", "spam", "as", "soon", "as", "the", "host", "is", "infected,", "the", "bot", "checks", "common", "blacklists", "to", "confirm", "its", "e-mails", "will", "actually", "be", "delivered,", "and", "if", "not,", "shuts", "itself", "down." ]
[ 4, 12, 12, 16, 16, 16, 16, 16, 1, 9, 16, 16, 16, 16, 16, 7, 15, 15, 15, 15, 16, 16, 16, 1, 16, 16, 16, 16, 5, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Beginning", "in", "November", "2016,", "Kaspersky", "Lab", "observed", "a", "new", "wave", "of", "wiper", "attacks", "directed", "at", "multiple", "targets", "in", "the", "Middle", "East." ]
[ 16, 16, 0, 8, 4, 12, 16, 16, 16, 16, 16, 1, 9, 16, 16, 16, 16, 16, 2, 10, 10 ]
[ "Lookout", "has", "shared", "information", "about", "this", "family", "with", "Apple", ",", "and", "they", "have", "revoked", "the", "affected", "certificates", "." ]
[ 4, 16, 16, 16, 16, 16, 16, 16, 4, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "No", "traces", "were", "left", "on", "affected", "systems", "apart", "from", "files", "from", "the", "exploit", "process", "if", "the", "target", "machine", "wasn't", "interesting", "to", "the", "Lurk", "operators." ]
[ 1, 9, 16, 16, 16, 5, 13, 16, 16, 1, 16, 7, 15, 15, 16, 16, 16, 5, 16, 16, 16, 6, 14, 14 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.MSIL.Disfa.hfpj.FC.4367", "Win32.Trojan.WisdomEyes.16070401.9500.9998", "Exploit.Win32.Strictor.etpuwg", "Win32.Trojan.Fakedoc.Auto", "Trojan.Injector.Win32.565843", "W32/Trojan.BKGU-8860", "Trojan.Strictor.D1A871", "Ransom.HiddenTear", "Trojan.Injector!WLrriQRdMeM", "Trj/GdSda.A", "Win32/Trojan.97a" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.JS.Downloader.IDO", "Trojan.Downloader.JS.3612", "Trojan.JS.Downloader.IDO", "Trojan.Malscript!html", "JS_BADRABBIT.A", "Trojan.JS.Downloader.IDO", "Js.Trojan.Js.Wrgf", "Trojan.JS.Downloader.IDO", "JS_BADRABBIT.A", "Trojan.FLCY-1", "TrojanDownloader:JS/Tibbar.A", "Trojan.JS.Downloader.IDO", "Trojan.JS.Downloader.IDO" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "FireEye", "has", "moderate", "confidence", "that", "a", "campaign", "targeting", "the", "hospitality", "sector", "is", "attributed", "to", "Russian", "actor", "APT28." ]
[ 4, 16, 16, 16, 16, 16, 6, 16, 16, 4, 12, 16, 16, 16, 6, 14, 14 ]
[ "A", "backdoor", "also", "known", "as:", "Win32/Adware.Virtumonde", "Win32/Adware.Virtumonde", "Trojan:Win32/Iceroe.C" ]
[ 16, 3, 16, 16, 16, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "TROJ_JORIK_0000023.TOMA", "Trojan.Win32.Snojan.gi", "Trojan.Win32.Autoruner1.wcikr", "MULDROP.Trojan", "BehavesLike.Win32.Downloader.mz", "Trojan/Win32.FirstInj", "TrojanDownloader:Win32/Bleyr.A", "Trojan.Zusy.D8B2B", "Win-Trojan/Patched.25600.B", "BScope.Trojan.SvcHorse.01643", "Win32/AntiAV.NIA", "Trojan.FirstInj!zbN/akDwH70", "Trojan.Win32.Jorik", "W32/FirstInj.KAP!tr.bdr", "Trj/CI.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "MSIL.Trojan.Kryptik.k", "W32/Trojan.IINR-0738", "BehavesLike.Win32.Trojan.vc", "Trojan:Win32/Gielclas.A!gfc", "Trj/CI.A", "Trojan.Injector!QI3sWN009L0", "Trojan.MSIL.Injector" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Multi", "Trojan.Win32.BQHK0411.dfyyqz", "Uds.Dangerousobject.Multi!c", "Win32.Trojan.Strictor.Wvar", "Trojan.Strictor.DCD3E", "SpamTool.Skype!", "MSIL/SpamTool_Skype.L!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Email-Worm.Win32!O", "Happy99.Worm", "W32/Ska.exe.worm", "Win32.Trojan.WisdomEyes.16070401.9500.9919", "Happy99.Worm", "Win32/Happy99.10000!Dropper", "Win.Trojan.Happy99-2", "Email-Worm.Win32.Happy", "Win95.Spanska.10000", "TR/Happy.69", "Trojan.Heur.E705EC", "Email-Worm.Win32.Happy", "Worm:Win32/Ska.A@m", "Win32.Worm-email.Happy.Wrqu", "Win32.Ska.A", "Email-Worm.Win32.Happy" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "However", ",", "the", "keylogger", "needs", "to", "be", "specifically", "enabled", "by", "a", "command", "sent", "from", "the", "C2", "server", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "An", "interesting", "feature", "of", "this", "family", "of", "banking", "Trojans", "is", "the", "simultaneous", "use", "of", "three", "command", "sources", ":", "Google", "Cloud", "Messaging", "(", "GCM", ")", "service", "–", "used", "to", "send", "small", "messages", "in", "JSON", "format", "to", "a", "mobile", "device", "via", "Google", "servers", ";", "malicious", "C", "&", "C", "server", ";", "incoming", "SMS", "messages", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "app", "then", "clicks", "the", "appropriate", "buttons", ",", "scrollbars", ",", "and", "other", "UI", "elements", "to", "go", "through", "account", "sign-up", "without", "user", "intervention", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "]", "website", "updatemobapp", "[", "." ]
[ 9, 9, 1, 9, 9 ]
[ "A", "backdoor", "also", "known", "as:", "Worm.Nabony.AP3", "Worm.AutoRun", "Trojan.Heur.PT.EEF50D", "Win32.Trojan.WisdomEyes.16070401.9500.9996", "W32.SillyFDC", "Win32/Xema.H", "TSPY_AUTORUN_BJ022DBF.TOMC", "Win.Worm.Autorun-8605", "Trojan.Win32.MLW.rupxe", "Win32.Worm.Autorun.Akyt", "Worm.Win32.Nabony.A", "TSPY_AUTORUN_BJ022DBF.TOMC", "BehavesLike.Win32.Dropper.cz", "WORM/Autorun.YD", "Worm:Win32/Nabony.A", "Trojan.Win32.A.Scar.1183299", "Trojan/Win32.HDC.C12022", "Hoax.Blocker", "W32/AutoRun.YD!tr", "Win32/Worm.0fe" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.MSIL", "Win32.Trojan.WisdomEyes.16070401.9500.9988", "MSIL/Filecoder.FF", "Ransom_Vortex.R004C0DKT17", "Trojan.Win32.Filecoder.evqvnb", "Ransom_Vortex.R004C0DKT17", "BehavesLike.Win32.Trojan.nc", "W32/Trojan.METU-7441", "TrojanSpy.MSIL.nar", "TR/Dropper.MSIL.bpldq", "MSIL/Filecoder.FF!tr", "Ransom:MSIL/Vortex.A", "Trojan/Win32.Ransomlock.C2275506", "Trojan.Ransom.Vortex", "Ransom.Vortex", "Trojan-Ransom.FileCoder", "Trj/GdSda.A", "Win32/Trojan.Dropper.62b" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "In", "the", "era", "of", "APT's,", "it", "feels", "like", "something", "is", "amiss", "when", "there", "is", "a", "forum", "of", "governments", "and", "no", "malware", "arises." ]
[ 16, 16, 16, 16, 6, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16, 16, 3, 16 ]
[ "At", "the", "time", "of", "writing", ",", "the", "dropper", "supports", "aepic.dll", ",", "sspisrv.dll", ",", "ftllib.dll", ",", "and", "userenv.dll", "to", "host", "the", "malicious", "FinFisher", "payload", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 1, 16, 1, 16, 16, 1, 16, 16, 16, 16, 3, 16, 16 ]
[ "Ursnif", "is", "a", "data", "stealer", "and", "a", "downloader", "with", "a", "lot", "of", "abilities", "to", "steal", "data", "from", "installed", "browsers", "and", "other", "applications", "such", "as", "Microsoft", "Outlook." ]
[ 3, 16, 16, 3, 11, 16, 16, 3, 16, 16, 16, 16, 16, 16, 1, 9, 16, 7, 15, 16, 16, 16, 16, 16, 5, 13 ]
[ "A", "backdoor", "also", "known", "as:", "Trojanpws.Trah", "Trojan[PSW]/Win32.Trah", "PWS:Win32/Trah.B", "PUA.DealPly.Da" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Chepdu.R", "Troj.W32.BHO.liE5", "Win32.Trojan.WisdomEyes.16070401.9500.9828", "TrojWare.Win32.BHO.SC", "Win32.HLLW.Lime.2312", "BehavesLike.Win32.BadFile.dm", "Trojan-Downloader.Win32.Banload", "TR/Chepdu.IA", "Trojan.Graftor.D1A2F", "Trojan:Win32/Comquab.B" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "It", "was", "only", "a", "matter", "of", "time,", "however,", "for", "other", "cybercriminals", "to", "follow", "suit." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 6, 16, 16, 16 ]
[ "The", "malware", "also", "sends", "regular", "telemetry", "back", "to", "its", "C2", "server", "about", "the", "infected", "device", "in", "the", "form", "of", "an", "HTTP", "POST", "to", "its", "C2", "server", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16 ]
[ "It", "seems", ",", "however", ",", "if", "the", "same", "victim", "has", "more", "than", "one", "device", "the", "malware", "can", "be", "reused", "since", "the", "IMEI", "is", "sent", "along", "with", "each", "data", "exfiltration", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "In", "this", "blog", "post,", "we", "will", "describe", "the", "way", "this", "threat", "enters", "the", "system", "and", "maintains", "its", "presence", "while", "constantly", "communicating", "with", "its", "command", "and", "control", "server." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 5, 16, 16, 16, 16, 16, 1, 9, 16, 16, 1, 9, 9, 9 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/W32.DoS.119296", "DoS.Win32.Nenet", "Trojan.Win32.Nenet.dinmxr", "Backdoor.W32.Singu.lhbk", "FDOS.Nenet.32768", "Tool.Win32.69ACF863", "Backdoor.Win32.Rbot", "DDOS/Nenet.A", "DoS.Win32.Nenet", "DoS.Nenet", "DoS/Nenet.B", "Win32/Virus.DDoS.672" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "That", "'s", "because", "the", "malware", "roots", "most", "of", "the", "phones", "it", "infects", ",", "a", "process", "that", "subverts", "key", "security", "mechanisms", "built", "into", "Android", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Icbot.FC.848", "Troj.Spy.Msil.Keylogger!c", "Win32.Trojan.WisdomEyes.16070401.9500.9998", "Trojan-Spy.MSIL.Keylogger.cfle", "Trojan.Win32.IRCBot.efyfpt", "TrojWare.MSIL.IRCBOT.B", "Trojan.MSIL.IRCBot", "TrojanSpy.MSIL.usk", "MSIL/IRCBot.BK!tr", "Trojan[Spy]/MSIL.IrcGhost", "Trojan.Razy.DFC68", "Trojan.Win32.Z.Ircbot.77312.A", "Trojan-Spy.MSIL.Keylogger.cfle", "Trojan:MSIL/Icbot.A!bit", "Msil.Trojan-spy.Keylogger.Hssn", "TrojanSpy.Keylogger!yn+qYVv4uIw", "Trj/GdSda.A", "Win32/Trojan.Spy.00e" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Despite", "global", "efforts", "to", "detect", "and", "disrupt", "the", "distribution", "of", "CryptoWall,", "adversaries", "have", "continued", "to", "innovate", "and", "evolve", "their", "craft,", "leading", "to", "the", "release", "of", "CryptoWall", "4." ]
[ 16, 2, 16, 16, 16, 16, 16, 16, 16, 16, 6, 14, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11 ]
[ "In", "its", "most", "recent", "campaign,", "Tick", "employed", "spear-phishing", "emails", "and", "compromised", "a", "number", "of", "Japanese", "websites", "in", "order", "to", "infect", "a", "new", "wave", "of", "victims." ]
[ 16, 16, 16, 16, 6, 6, 16, 6, 14, 16, 1, 16, 16, 16, 1, 9, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "overlay", "window", "is", "often", "indistinguishable", "from", "the", "expected", "screen", "(", "such", "as", "a", "login", "screen", "for", "a", "banking", "app", ")", "and", "is", "used", "to", "steal", "the", "victim", "’", "s", "banking", "credentials", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "]", "com", "hxxp", ":", "//www", "[", "." ]
[ 9, 9, 1, 9, 9, 9, 9 ]
[ "We", "named", "the", "attack", "BITTER", "based", "on", "the", "network", "communication", "header", "used", "by", "the", "latest", "variant", "of", "remote", "access", "tool", "RAT", "used." ]
[ 16, 16, 16, 1, 9, 16, 16, 16, 1, 9, 16, 16, 16, 16, 16, 3, 16, 3, 11, 11, 11, 16 ]
[ "''", "This", "is", "a", "trojan", "with", "many", "built-in", "capabilities", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Analysis", "of", "compromised", "systems", "seen", "communicating", "with", "Bookworm", "C2", "servers", "also", "confirms", "our", "speculation", "on", "targeting", "with", "a", "majority", "of", "systems", "existing", "within", "Thailand." ]
[ 16, 16, 5, 13, 16, 16, 16, 3, 1, 9, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 2 ]
[ "The", "life", "span", "of", "Android", "banking", "malware", "is", "limited", "to", "either", "the", "will", "of", "its", "author", "(", "s", ")", "to", "support", "it", "or", "the", "arrest", "of", "those", "actors", "." ]
[ 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojanpws.Mimikatz", "Win32.Trojan.WisdomEyes.16070401.9500.9886", "Trojan.Win32.Mimikatz.eoptjl", "Troj.Psw.W32.Mimikatz!c", "BehavesLike.Win32.PUPXAB.jh", "W32/Application.SMPV-5402", "Trojan.PSW.Mimikatz.sw", "Trojan[PSW]/Win32.Mimikatz", "Application.Mimikatz.2", "HackTool:Win32/WDigest.A", "Trj/GdSda.A", "Win32.Trojan-qqpass.Qqrob.Eaxn", "hacktool.mimikatz", "Win32/Application.IM.f6f" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "newer", "version", "of", "FakeSpy", "uses", "new", "URL", "addresses", "for", "malicious", "communication", "with", "FakeSpy", "." ]
[ 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16 ]
[ "Dynamic", "code", "loading", "makes", "it", "impossible", "to", "state", "what", "kind", "of", "PHA", "it", "was", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan-Banker.Win32.BestaFera.annq", "Trojan.Win32.Demp.bozwca", "BehavesLike.Win32.Injector.th", "TR/Avgesi.B.1", "Trojan:Win32/Avgesi.B", "Trojan-Banker.Win32.BestaFera.annq", "Win32.Trojan-dropper.Demp.Lnxz", "Trojan-Downloader.Win32.Pher", "W32/Demp.PJN!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "While", "the", "malware", "attack", "has", "not", "been", "exclusively", "targeting", "the", "region,", "it", "has", "been", "focusing", "on", "the", "South", "Korean", "manufacturing", "industry." ]
[ 16, 16, 1, 9, 16, 16, 16, 16, 16, 16, 2, 16, 16, 16, 16, 16, 16, 2, 10, 4, 12 ]
[ "A", "backdoor", "also", "known", "as:", "HW32.Packed.C0FB", "Trojan.Dovs", "TSPY_EMOTET.AUSYYON", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Trojan.Emotet", "TSPY_EMOTET.AUSYYON", "Win.Trojan.Emotet-6410462-0", "Win32.Trojan-Spy.Emotet.IT", "Trojan.Win32.Dovs.esh", "Trojan.Win32.Dovs.ewnrtt", "Troj.W32.Dovs!c", "BehavesLike.Win32.PWSZbot.cc", "W32.Trojan.Emotet", "TR/Crypt.ZPACK.sbdbq", "Trojan/Win32.Dovs", "Trojan.Win32.Dovs.esh", "Trojan/Win32.Emotet.R216875", "Trojan.Emotet", "Trj/RnkBend.A", "Win32.Trojan.Dovs.Szuw", "Trojan.Win32.Crypt" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "]", "87:28855", "61", "[", "." ]
[ 9, 9, 1, 9, 9 ]
[ "Today,", "we", "are", "looking", "at", "an", "exploit", "kit", "that", "we", "have", "not", "seen", "before." ]
[ 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16 ]
[ "This", "vulnerability", "is", "mostly", "known", "as", "SambaCry", "after", "the", "famous", "WannaCry", "attack", "targeting", "Windows", "systems", "vulnerable", "to", "EternalBlue", "SMB", "exploit." ]
[ 16, 7, 16, 16, 16, 16, 3, 16, 16, 16, 3, 16, 16, 5, 13, 7, 16, 3, 11, 11 ]
[ "Families", "like", "Poweliks,", "which", "abuse", "Microsoft's", "PowerShell,", "have", "emerged", "in", "recent", "years", "and", "have", "garnered", "extensive", "attention", "due", "to", "their", "ability", "to", "compromise", "a", "system", "while", "leaving", "little", "or", "no", "trace", "of", "their", "presence", "to", "traditional", "forensic", "techniques." ]
[ 3, 16, 3, 16, 7, 15, 15, 16, 16, 16, 0, 8, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 7, 16, 5, 16, 16, 1, 9, 9, 9, 9, 9, 9, 16, 1, 9, 9 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.VBS.Shutdown", "TrojanDownloader:Win32/Tembatch.A", "Trojan.Jacard.D636D" ]
[ 16, 3, 16, 16, 16, 1, 1, 1 ]
[ "The", "malicious", "activity", "includes", "beaconing", "to", "actor-controlled", "infrastructure,", "deployment", "of", "second-stage", "payloads,", "and,", "in", "a", "small", "number", "of", "cases,", "hands-on-keyboard", "activity." ]
[ 16, 16, 16, 16, 16, 16, 5, 13, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "]", "top/", "Oct", "17", ",", "2017", "hxxp", ":", "//online.bankaustria.at.id58729", "[", "." ]
[ 9, 9, 16, 16, 16, 16, 1, 9, 9, 9, 9 ]
[ "The", "\"", "porn", "kr", "sex", "''", "APK", "connects", "to", "a", "malicious", "website", "that", "runs", "XLoader", "in", "the", "background", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.FamVT.ExpiroPC.PE", "Trojan.Proxy.Small.E", "Trojan-Proxy/W32.Small.4096.C", "TrojanProxy.Small", "Trojan/Proxy.Small.e", "Win32.Trojan.WisdomEyes.16070401.9500.9933", "Win32/Slarp.B", "BKDR_SALAR.A", "Win.Trojan.Proxy-3663", "Trojan.Proxy.Small.E", "Trojan-Proxy.Win32.Small.e", "Trojan.Proxy.Small.E", "Trojan.Win32.Small.dosc", "Troj.Proxy.W32.Small.e!c", "Win32.Trojan-proxy.Small.Ozsg", "Trojan.Proxy.Small.E", "Trojan.Proxy.Small.E", "Trojan.Proxy.1698", "Trojan.Small.Win32.2849", "BKDR_SALAR.A", "W32/Risk.RVLO-8598", "TrojanProxy.Small.aeu", "Win32.Troj.Small.e.kcloud", "Trojan.Proxy.Small.E", "Trojan-Proxy.Win32.Small.e", "TrojanProxy:Win32/Small.E", "Trojan.Proxy.Small.E", "BScope.Trojan.Jackz.a", "Win32/TrojanProxy.Small.NEQ", "Trojan.PR.Small!jIc3Mh2dhO0", "W32/Bdoor.A!tr.bdr", "Bck/Salar.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "longer", "a", "Trojan", "“", "lives", "”", "on", "a", "smartphone", ",", "the", "more", "money", "it", "will", "make", "for", "the", "owner", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]