tokens
sequencelengths
2
296
ner_tags
sequencelengths
2
296
[ "A", "backdoor", "also", "known", "as:", "W97M/Downloader.cew", "Trojan.Phisherly", "TROJ_PHISHERLY.ZQEJ-A", "TROJ_PHISHERLY.ZQEJ-A", "W97M/Downloader.cew", "ZIP/Trojan.YBQC-0" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.DumtoxXAX.Trojan", "Worm.Win32.VB!O", "Trojan.Comisproc.AZ3", "Trojan.VB.Win32.56251", "Trojan/VB.peu", "Trojan.Heur.EE2DE0", "WORM_VOBFUS.NER", "Win32.Trojan.VB.je", "WORM_VOBFUS.NER", "Worm.Win32.VB.fer", "Trojan.Win32.VB.epyowu", "BehavesLike.Win32.VBObfus.cz", "Worm.Win32.VB", "Worm/VB.pcc", "Worm/Win32.VB.fer", "Worm.Win32.A.VB.176128.AR", "Worm.Win32.VB.fer", "Worm/Win32.AutoRun.R49416", "W32/Autorun.worm.aacy", "TScope.Trojan.VB", "Win32/VB.PEU" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Worm.Racvacs.AA2", "Trojan.Cosmu.Win32.3454", "Trojan/Scar.atyl", "Win32.Trojan.IRCBot.b", "Win32/IRCBot.JZK", "TROJ_PAM_000001074B.T3", "Trojan.Win32.MLW.stwkl", "Troj.W32.Cosmu.ldLk", "Worm.Win32.Autorun.lbe", "Win32.HLLW.Autoruner1.11201", "BehavesLike.Win32.Downloader.lm", "Trojan/Scar.bqi", "Worm:Win32/Ircbot.D", "Trojan/Win32.Unknown", "Win32.Troj.Undef.kcloud", "Worm:Win32/IRCbot.D", "Worm/Win32.AutoRun.R2912", "W32/Autorun.worm.bbx", "BScope.Trojan-Spy.Zbot", "Trojan.Win32.Cosmu" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "All", "of", "its", "capabilities", "are", "discussed", "later", "in", "this", "blog", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "If", "the", "targeted", "device", "is", "not", "vulnerable", "to", "these", "exploits", ",", "then", "the", "app", "attempts", "to", "use", "a", "superuser", "binary", "pre-positioned", "at", "/system/csk", "to", "elevate", "privileges", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16 ]
[ "One", "of", "the", "uses", "the", "malware", "gives", "to", "this", "package", "is", "the", "execution", "of", "the", "command", "\"", "dumpsys", "''", "to", "determine", "if", "certain", "activities", "are", "running", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Of", "course", ",", "not", "all", "the", "opcodes", "are", "can", "be", "easily", "read", "and", "understood", "due", "to", "additional", "steps", "that", "the", "authors", "have", "taken", "to", "make", "analysis", "extremely", "complicated", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "owners", "of", "Trojans", "such", "as", "Leech,", "Ztorg,", "Gorpo", "as", "well", "as", "the", "new", "malware", "family", "Trojan.AndroidOS.Iop", "are", "working", "together." ]
[ 6, 14, 16, 3, 16, 16, 3, 11, 11, 16, 16, 16, 16, 16, 3, 11, 11, 16, 16, 16 ]
[ "However,", "there", "is", "much", "information", "confused", "together,", "as", "if", "an", "entirely", "new", "IoT", "bot", "is", "spreading", "to", "and", "from", "Windows", "devices." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 5, 13 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Nadostarch", "Trojan:Win32/Nadostarch.A", "Trojan.Win32.Nadostarch" ]
[ 16, 3, 16, 16, 16, 1, 1, 1 ]
[ "EventBot", "mobile", "banking", "applications", "targetedApplications", "targeted", "by", "EventBot", "." ]
[ 3, 16, 16, 16, 16, 16, 16, 3, 16 ]
[ "The", "β€œ", "onUserLeaveHint", "(", ")", "”", "callback", "method", "of", "the", "Android", "Activity", "(", "i.e.", ",", "the", "typical", "GUI", "screen", "the", "user", "sees", ")", "is", "called", "as", "part", "of", "the", "activity", "lifecycle", "when", "the", "activity", "is", "about", "to", "go", "into", "the", "background", "as", "a", "result", "of", "user", "choice", ",", "for", "example", ",", "when", "the", "user", "presses", "the", "Home", "key", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.HLLW.Autoruner.6669", "Worm:Win32/Mofeir.P" ]
[ 16, 3, 16, 16, 16, 1, 1 ]
[ "It", "sends", "a", "smishing", "message", "to", "the", "entire", "contact", "list", "of", "the", "infected", "device", "along", "with", "the", "malicious", "link", "to", "the", "FakeSpy", "installation", "page", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16 ]
[ "To", "make", "the", "fake", "report", "appear", "even", "more", "scary,", "the", "malware", "displays", "your", "IP", "address", "and", "a", "picture", "of", "you." ]
[ 16, 16, 16, 1, 9, 9, 16, 16, 16, 16, 3, 16, 16, 1, 9, 16, 16, 1, 9, 9 ]
[ "You", "can", "also", "try", "to", "re-flash", "your", "device", "with", "its", "original", "ROM", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Email-Worm.Zhelatin.pk", "W32/Zhelatin.pk", "Trojan.Win32.Zhelatin.mqtc", "Trojan.Peacomm", "Tibs.BFZS", "Win32/Sintun.AV", "TROJ_NUWAR.UP", "Trojan.Zhelatin", "Email-Worm.Win32.Zhelatin.pk", "I-Worm.Win32.Zhelatin.142336", "EmailWorm.Win32.Zhelatin.pk0", "Trojan.Spambot.2386", "TROJ_NUWAR.UP", "Worm.Zhelatin.pk.kcloud", "Backdoor:Win32/Nuwar.A", "Worm/Win32.Zhelatin", "BScope.Zhelatin.con", "Trojan.Peacomm!rem", "Virus.Win32.Zhelatin", "W32/Tibs.G@mm", "I-Worm/Nuwar.N", "Trj/Spammer.AFG" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Allows", "applications", "to", "change", "Wi-Fi", "connectivity", "state", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "β€œ", "Agent", "Smith", "”", "needs", "to", "be", "updated/installed", "without", "the", "user", "’", "s", "consent", "." ]
[ 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Further", "assets", "are", "decrypted", "and", "deployed", ",", "including", "another", "Dalvik", "DEX", "code", "file", ",", "which", "has", "various", "capabilities", "including", "registering", "itself", "as", "the", "incoming", "SMS", "handler", "for", "the", "device", "to", "intercept", "SMS", "messages", ",", "loading", "another", "ELF", "library", "that", "includes", "a", "version", "of", "BusyBox", "-", "a", "package", "containing", "various", "stripped-down", "Unix", "tools", "useful", "for", "administering", "such", "systems", "–", "and", ",", "interestingly", ",", "is", "capable", "of", "turning", "off", "the", "sound", "played", "when", "the", "device", "’", "s", "cameras", "take", "pictures", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Given", "the", "DroidVPN", "look", "and", "feel", "being", "used", "by", "this", "variant", "of", "HenBox", ",", "it", "’", "s", "highly", "likely", "the", "uyghurapps", "[", "." ]
[ 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 1, 9, 9 ]
[ "Just", "don", "’", "t", "forget", "that", "the", "scan", "does", "not", "run", "automatically", "in", "the", "free", "version", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Cerber", "has", "previously", "been", "seen", "distributed", "via", "exploit", "kits", "and", "over", "e-mail", "using", "DOC", "files", "with", "macros." ]
[ 3, 16, 16, 16, 16, 16, 16, 3, 11, 16, 1, 9, 9, 9, 9, 9, 9 ]
[ "A", "backdoor", "also", "known", "as:", "HW32.Packed.4252", "Backdoor.Hupigon.148473", "Backdoor.Hupigon.148473", "Backdoor.Hupigon.D243F9", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Backdoor.Hupigon.148473", "Backdoor.Hupigon.148473", "Backdoor.Hupigon.148473", "BackDoor.Pigeon1.3852", "Win32.Hack.Huigezi.n.kcloud", "Backdoor:Win32/Tenpeq.C", "Backdoor.Hupigon.148473", "MalwareScope.Trojan-PSW.Game.16", "Trojan.Hupigon!iPBnzuR7b40", "Trj/CI.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Since", "then,", "several", "examples", "of", "malware", "created", "by", "Animal", "Farm", "have", "been", "found", "and", "publicly", "documented,", "in", "particular:" ]
[ 16, 16, 16, 16, 16, 3, 16, 16, 6, 14, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "]", "top/", "Oct", "17", ",", "2017", "hxxp", ":", "//online.bankaustria.at.id58712", "[", "." ]
[ 9, 9, 16, 16, 16, 16, 1, 9, 9, 9, 9 ]
[ "He", "most", "probably", "did", "so", "to", "restore", "his", "reputation", "on", "a", "number", "of", "hacker", "forums:", "earlier,", "he", "had", "been", "promoting", "his", "development", "so", "aggressively", "and", "behaving", "so", "erratically", "that", "he", "was", "eventually", "suspected", "of", "being", "a", "scammer." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 6, 14, 14, 14, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 6 ]
[ "Comparison", "of", "code", "of", "Asset", "file", "before", "and", "after", "decryption", "Figure", "11", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Loading", "the", "decrypted", ".dex", "file", "into", "memory", "and", "triggering", "the", "main", "payload", "Main", "payload", "When", "the", "main", "payload", "is", "loaded", "into", "memory", ",", "the", "initial", "detonator", "hands", "over", "the", "control", "to", "the", "main", "payload", "by", "invoking", "the", "method", "XoqF", "(", "which", "we", "renamed", "to", "triggerInfection", "during", "analysis", ")", "from", "the", "gvmthHtyN", "class", "(", "renamed", "to", "PayloadEntry", ")", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "If", "/sdcard/MemosForNotes", "was", "present", "on", "the", "device", ",", "the", "Chrysaor", "app", "removes", "itself", "from", "the", "device", "." ]
[ 16, 1, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Worm.Win32.Ngrbot!O", "Worm.Ngrbot", "Trojan.Zbot.Win32.51206", "Trojan/Spy.Zbot.dcar", "Win32.Trojan.WisdomEyes.16070401.9500.9985", "W32/Trojan.IPQV-8835", "Win.Trojan.Zbot-52317", "Worm.Win32.Ngrbot.kie", "Troj.W32.Qhost.lkwM", "BehavesLike.Win32.ZBot.dc", "Trojan-Dropper.Win32.VB", "Worm/Win32.Ngrbot", "Worm.Win32.Ngrbot.kie", "Worm/Win32.Ngrbot.R62747", "Worm.Ngrbot", "Trojan.Zbot", "TrojanSpy.Zbot!FbLT0Cb2klI", "W32/VBInjector.W!tr", "Win32/Trojan.BO.255" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "While", "the", "malware", "is", "capable", "of", "facilitating", "various", "cyber-criminal", "goals", ",", "our", "team", "confirmed", "it", "’", "s", "currently", "installing", "additional", "apps", "on", "infected", "devices", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "10", "million", "Android", "phones", "infected", "by", "all-powerful", "auto-rooting", "apps", "First", "detected", "in", "November", ",", "Shedun/HummingBad", "infections", "are", "surging", "." ]
[ 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16 ]
[ "]", "commydriveweb", "[", "." ]
[ 9, 9, 1, 9 ]
[ "During", "one", "session", ",", "the", "C2", "server", "commanded", "our", "emulated", "device", "to", "send", "four", "different", "SMS", "messages", "to", "four", "different", "phone", "numbers", ",", "all", "of", "which", "were", "associated", "with", "Russian", "financial", "institutions", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/Downloader.Adload.tml", "Trojan.Buzy.D8FA", "TSPY_DOWNLOADER_CD1002E2.RDXN", "Win32.Trojan.WisdomEyes.16070401.9500.9973", "TROJ_PAM_0000010534.T3", "Win.Trojan.Adload-3700", "Trojan.Win32.Snojan.ccxx", "Trojan.Win32.Adload.cpqwy", "TrojWare.Win32.TrojanDownloader.Adload.tmm", "Trojan.DownLoader1.22512", "BehavesLike.Win32.Backdoor.rc", "Trojan-Downloader.Win32.Adload", "TrojanDownloader.Adload.naf", "TrojanDownloader:Win32/Neup.A", "Trojan.Win32.Snojan.ccxx", "Downloader/Win32.Adload.R11798", "PUP.Optional.Funshion", "Win32.Trojan.Adclicker.Sxoq", "Trojan.DL.Adload.MGR", "Win32/Trojan.56c" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Coralco", "Tech", "'s", "services", "description", "." ]
[ 16, 16, 16, 16, 16, 16 ]
[ "Several", "months", "ago,", "we", "discovered", "and", "exposed", "RETADUP", "malware", "in", "Israeli", "hospitals." ]
[ 0, 8, 8, 16, 16, 16, 16, 3, 11, 16, 4, 12 ]
[ "EVENTBOT", "THREAT", "ACTORS", "As", "a", "part", "of", "this", "investigation", ",", "the", "Cybereason", "Nocturnus", "team", "has", "attempted", "to", "identify", "the", "threat", "actors", "behind", "the", "development", "of", "EventBot", "." ]
[ 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 12, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16 ]
[ "This", "malicious", "program", "attacks", "only", "Raspberry", "Pi", "minicomputers." ]
[ 16, 3, 16, 1, 16, 5, 13, 13 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan-Clicker.Win32.VB!O", "Win32/Adclicker.DSU", "Trojan-Clicker.Win32.VB.isz", "Trojan.Win32.VB.bcvse", "Trojan.Click1.25507", "BehavesLike.Win32.Dropper.qt", "Trojan.Crypt", "TrojanClicker.VB.kho", "Trojan.Heur.ZGY.5", "W32.W.Hawawi.lmFq", "Trojan-Clicker.Win32.VB.isz", "TrojanClicker:Win32/Refpron.A", "Trojan/Win32.Xema.R155513" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "This", "would", "be", "a", "very", "unusual", "coincidence", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "In", "some", "samples", "analyzed", "by", "CTU", "researchers,", "the", "attachment", "was", "an", "obfuscated", "VBScript", ".vbs", "file", "that", "downloads", "and", "installs", "AdWind,", "or", "the", "email", "message", "just", "included", "a", "link", "to", "download", "and", "install", "the", "malware." ]
[ 16, 16, 16, 16, 16, 4, 12, 16, 1, 16, 16, 1, 9, 9, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 1, 9, 9, 9, 9, 9, 9 ]
[ "It's", "these", "same", "teens", "that", "are", "causing", "a", "surge", "in", "mobile", "ransomware", "in", "the", "Chinese", "underground", "market." ]
[ 16, 16, 16, 6, 16, 16, 16, 16, 16, 16, 5, 3, 16, 16, 6, 14, 14 ]
[ "\"", "I", "tried", "reaching", "out", "to", "Adups", "and", "never", "heard", "back", ",", "''", "Strazzere", "tells", "Information", "Security", "Media", "Group", "." ]
[ 16, 16, 16, 16, 16, 16, 4, 16, 16, 16, 16, 16, 16, 16, 16, 4, 12, 12, 12, 16 ]
[ "The", "response", "contains", "some", "basic", "HTML", "and", "JavaScript", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "more", "complex", "the", "obfuscation", ",", "the", "longer", "it", "will", "take", "an", "antivirus", "solution", "to", "neutralize", "the", "malicious", "code", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "In", "2017", "and", "2018,", "ITG03", "actors", "stole", "over", "$534", "million", "from", "cryptocurrency", "exchange", "attacks,", "according", "to", "security", "firm", "Group", "IB." ]
[ 16, 0, 16, 0, 6, 14, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 4, 12, 12, 12 ]
[ "Users", "can", "not", "rely", "on", "the", "official", "app", "stores", "for", "their", "safety", ",", "and", "should", "implement", "advanced", "security", "protections", "capable", "of", "detecting", "and", "blocking", "zero-day", "mobile", "malware", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "This", "blunder", "made", "by", "the", "company", "has", "been", "frustrating", "to", "many", "developers", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Hacktool.Bendor.C", "Trojan/W32.HackTool.20480.O", "Hacktool.Bendor", "Trojan.Hacktool.Bendor.C", "Tool.Bendor.Win32.1", "Trojan/Hacktool.Bendor", "Trojan.Hacktool.Bendor.C", "BKDR_BANDOR.A", "Win32.Trojan.WisdomEyes.16070401.9500.9602", "W32/Trojan.VSQ", "BKDR_BANDOR.A", "Trojan.Hacktool.Bendor.C", "HackTool.Win32.Bendor", "Trojan.Hacktool.Bendor.C", "Riskware.Win32.Bendor.hrie", "HackTool.Bendor.20480", "HackTool.W32.Bendor!c", "Trojan.Hacktool.Bendor.C", "TrojWare.Win32.HackTool.Bendor.A", "Trojan.Hacktool.Bendor.C", "W32/Trojan.ULWX-3793", "HackTool/Bendor.a", "W32.Hack.Tool", "HackTool/Win32.Bendor", "HackTool.Win32.Bendor", "Trj/Legmir.AJQ", "Win32/HackTool.Bendor.A", "Win32.Hacktool.Bendor.Lkdj", "HackTool.Bendor!+3jB7Bxnt10", "Malware_fam.gw", "Win32/Trojan.Hacktool.5e9" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Win32.Graftor.eruomq", "Trojan.Proxy2.754", "Trojan.Proxy.1", "Trj/GdSda.A", "Win32/Trojan.2c0" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1 ]
[ "Split", "Strings", "Encrypted", "strings", "can", "be", "a", "signal", "that", "the", "code", "is", "trying", "to", "hide", "something", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9723", "Trojan.MSIL.Krypt.2", "Trojan:MSIL/Remdobe.C", "TrojanDropper.FrauDrop", "Trj/CI.A", "Trojan.Win32.Jorik", "Win32/Trojan.7c5" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.eHeur.Virus02", "Virus.Win32.Sality!O", "Win32.Trojan.WisdomEyes.16070401.9500.9876", "Trojan.DownLoader.22765", "BehavesLike.Win32.PWSZbot.mc", "Backdoor.Win32.Rbot", "TrojanDownloader:Win32/Wudoo.A", "Win32/Adware.Toolbar.Baidu" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "2013", "in", "figures", "A", "total", "of", "143,211", "new", "modifications", "of", "malicious", "programs", "targeting", "mobile", "devices", "were", "detected", "in", "all", "of", "2013", "(", "as", "of", "January", "1", ",", "2014", ")", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "and", "were", "signed", "using", "the", "name", "of", "an", "engineer", "who", "appears", "to", "hold", "equity", "in", "Connexxa", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16 ]
[ "The", "response", "can", "either", "be", "a", "simple", "\"", "OK", ",", "''", "or", "can", "be", "a", "request", "to", "perform", "some", "action", "on", "the", "device", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "This", "remote", "access", "toolkit", "has", "been", "publicly", "examined", "multiple", "times", "by", "the", "threat", "intelligence", "community." ]
[ 16, 3, 11, 11, 16, 16, 16, 16, 16, 12, 16, 16, 4, 12, 12 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.MulDrop5.13033", "HackTool.MSIL.ccp", "W32.Hack.Tool", "HackTool.Win32.AutoKMS", "Trj/GdSda.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1 ]
[ "Icons", "of", "the", "apps", "that", "Bouncing", "Golf", "’", "s", "operators", "repackaged", "(", "top", ")", "and", "a", "comparison", "of", "packages", "between", "the", "original", "legitimate", "app", "(", "bottom", "left", ")", "and", "GolfSpy", "(", "bottom", "right", ")", "Figure", "3", "." ]
[ 16, 16, 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.BaragoneE.Trojan", "Trojan.Win32.Cosmu!O", "Trojan.Cosmu.Win32.14181", "TROJ_COSMU.SMJ0", "Win32/Cosmu.OP", "TROJ_COSMU.SMJ0", "Win.Trojan.Mybot-8550", "Trojan.Win32.Bot.ercyne", "TrojWare.Win32.Phishbank.DA", "Trojan.Click1.57939", "BehavesLike.Win32.Downloader.ch", "Trojan/Win32.Cosmu.awlb", "Trojan:Win32/Phishbank.A", "W32.W.Mydoom.kZJ8", "TScope.Malware-Cryptor.SB", "Trojan.Win32.Sisron", "Trojan.Win32.Phishbank.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.eHeur.Malware03", "AdWare.W32.Gamevance.m6Qo", "Trojan/Downloader.Stantinko.n", "Win32.Trojan.Xpack.a", "Win32.Trojan-Downloader.Stantinko.A", "TrojWare.Win32.TrojanDownloader.Stantinko.D", "BehavesLike.Win32.Downloader.ch", "Trojan.Graftor", "Trojan:Win32/Fiya.E", "Win32/TrojanDownloader.Stantinko.N", "W32/Stantinko.S!tr.dldr", "Win32/Trojan.Stantinko.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "only", "difference", "is", "the", "malware", "payload", "being", "dropped,", "which", "is", "current", "and", "had", "very", "low", "detection", "on", "VirusTotal." ]
[ 16, 16, 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4 ]
[ "Once", "we", "looked", "into", "the", "file", ",", "we", "quickly", "found", "out", "that", "the", "inner-workings", "of", "the", "APK", "included", "a", "malicious", "payload", ",", "embedded", "in", "the", "original", "code", "of", "the", "application", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.VBMailSpam.B", "Trojan/W32.Flooder.577024.B", "Trojan/Delf.a", "TROJ_SPAMMER.A", "W32/Worm.FSFK-2238", "Hacktool.Spammer", "Win32/Spadelf.C", "TROJ_SPAMMER.A", "Trojan.VBMailSpam.B", "Email-Flooder.Win32.Delf.a", "Trojan.VBMailSpam.B", "Trojan.Win32.Delf.ifpg", "Spyware.Email-Flooder.Delf.577024", "Email-Flooder.W32.Delf.a!c", "Trojan.VBMailSpam.B", "TrojWare.Win32.Flooder.MailSpam.A", "Trojan.VBMailSpam.B", "Flooder.Mailbomb.6", "Tool.Delf.Win32.442", "W32/Worm.FVM", "Flooder.MailSpam.Delvs", "TR/VBMailSpam.B.1", "HackTool[Flooder]/Win32.Delf", "Win32.Hack.Delf.a.kcloud", "Trojan.VBMailSpam.B", "Email-Flooder.Win32.Delf.a", "Spammer:Win32/Delf.A", "Trojan.VBMailSpam.B", "EmailFlooder.Delf", "Win32/Flooder.MailSpam.Delf.A", "Flooder.Delf!YEHm2HeU39s", "Trojan.Win32.Flooder", "Malware_fam.gw", "Win32/Trojan.fd6" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "This", "includes", "detailed", "technical", "analysis", "of", "the", "Prikormka", "malware", "family", "and", "its", "spreading", "mechanisms,", "and", "a", "description", "of", "the", "most", "noteworthy", "attack", "campaigns." ]
[ 16, 16, 16, 16, 16, 16, 16, 3, 11, 11, 16, 16, 1, 9, 16, 16, 16, 16, 16, 16, 16, 6, 14 ]
[ "A", "backdoor", "also", "known", "as:", "HackTool.Win32!O", "Win32.Trojan.WisdomEyes.16070401.9500.9867", "Win.Tool.Hotfreezer-2", "Trojan.Win32.Refroso.csjta", "TrojWare.Win32.HackTool.Homac", "Tool.Homac", "BehavesLike.Win32.Mydoom.pz", "Trojan/Refroso.ulh", "Trojan[Backdoor]/Win32.Shark", "HackTool:Win32/Homac.A", "HackTool.Homac", "Win32/HackTool.Homac", "Hacktool.Homac.A", "HackTool.Win32.Homac" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Just", "like", "the", "previous", "modules", ",", "it", "contains", "multiple", "strings", "in", "Italian", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Hancitor", "is", "a", "popular", "dropper", "used", "in", "phishing", "campaigns." ]
[ 3, 16, 16, 16, 3, 16, 16, 6, 14 ]
[ "A", "reputable,", "high-profile", "ad", "network", "provides", "traffers", "with", "access", "to", "higher-quality", "traffic,", "and", "the", "more", "reputable", "an", "ad", "network", "appears,", "the", "easier", "it", "is", "for", "traffers", "to", "reach", "this", "target", "traffic." ]
[ 16, 16, 4, 12, 12, 16, 1, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 4, 12, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9 ]
[ "In", "other", "cases,", "spear", "phish", "directs", "users", "to", "websites", "that", "would", "otherwise", "be", "trusted", "but", "actually", "have", "been", "compromised", "by", "threat", "actors", "seeking", "greater", "access", "to", "fulfill", "their", "actions", "and", "objectives." ]
[ 16, 16, 16, 1, 9, 16, 16, 16, 1, 15, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 6, 14, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Cybercriminals", "are", "using", "local", "brand", "names", "such", "as", "local", "ISP", "providers", "and", "legitimate", "looking", "addresses", "to", "fool", "users", "into", "downloading", "malware", "that", "can", "steal", "information", "by", "monitoring", "browsers,", "file", "transfer", "protocol", "FTP", "clients,", "and", "mail", "clients." ]
[ 6, 16, 16, 7, 16, 16, 16, 16, 1, 9, 9, 16, 16, 16, 1, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 1, 9, 9, 9, 9, 9, 9, 16, 1, 9 ]
[ "Unit", "42", "has", "been", "tracking", "a", "new", "Remote", "Access", "Trojan", "RAT", "being", "sold", "for", "$40", "USD", "since", "April", "2016,", "known", "as", "Orcus" ]
[ 4, 12, 16, 16, 16, 16, 16, 3, 11, 11, 11, 16, 16, 16, 16, 16, 16, 0, 8, 16, 16, 3 ]
[ "During", "our", "tests", "the", "spyware", "was", "upgraded", "to", "the", "second", "stage", "on", "our", "test", "device", "immediately", "after", "the", "first", "check-ins", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "]", "230", "[", "." ]
[ 9, 9, 9, 9 ]
[ "As", "a", "result", "of", "the", "long-term", "development", "process", ",", "there", "are", "multiple", ",", "exceptional", "capabilities", ":", "usage", "of", "multiple", "exploits", "for", "gaining", "root", "privileges", ",", "a", "complex", "payload", "structure", ",", "never-before-seen", "surveillance", "features", "such", "as", "recording", "surrounding", "audio", "in", "specified", "locations", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/W32.Scar.15360.P", "Trojan.Win32.Scar!O", "Win32.Trojan.WisdomEyes.16070401.9500.9973", "W32/Trojan.WBMR-2019", "Win.Trojan.Merong-1", "Trojan.Win32.Scar.dcrm", "Trojan.Win32.Scar.chxtv", "Trojan.Win32.A.Scar.15360", "Troj.W32.Scar.dcrm!c", "Trojan.DownLoader5.8015", "Trojan.Scar.Win32.48783", "Trojan.Win32.Scar", "W32/Trojan3.YUH", "W32.Trojan.Scar", "Trojan/Win32.Scar", "Trojan.Win32.Scar.dcrm", "Trojan:Win32/Sluegot.A", "Trojan/Win32.Scar.R81257", "Trojan.Scar", "Win32.Trojan.Scar.bove", "Trojan.Scar!69cHD7mX3A8", "W32/Scar.DCM!tr.dldr", "Win32/Trojan.17a" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "]", "com", "www", "[", "." ]
[ 9, 9, 1, 9, 9 ]
[ "In", "the", "latest", "version", ",", "a", "layer", "of", "obfuscation", "was", "added", ",", "perhaps", "taking", "the", "malware", "one", "step", "closer", "to", "being", "fully", "operational", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Indicators", "related", "to", "the", "CryptFile2", "ransomware" ]
[ 1, 16, 16, 16, 3, 11 ]
[ "It", "will", "also", "take", "a", "photo", "using", "the", "device", "’", "s", "front", "camera", "when", "the", "user", "wakes", "the", "device", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "And", "our", "researchers", "estimate", "that", "in", "every", "10", "Android", "users", "1", "was", "attacked", "by", "either", "one", "or", "several", "of", "those", "Trojans", "during", "the", "second", "half", "of", "2015", ",", "so", "there", "are", "millions", "of", "devices", "with", "a", "huge", "possibility", "of", "being", "infected", "with", "Triada", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan-Proxy/W32.Thunker.14848.B", "Trojan/Proxy.Thunker.a", "TROJ_THUNKER.A", "Win32.Trojan.WisdomEyes.16070401.9500.9995", "W32/Espy.OUZC-2697", "Backdoor.Thunker", "Win32/Knooth.C", "TROJ_THUNKER.A", "Trojan-Proxy.Win32.Thunker.a", "Trojan.Win32.Thunker.gtlj", "Trojan.Win32.Proxy.14848.F", "Troj.Proxy.W32.Thunker.a!c", "TrojWare.Win32.TrojanProxy.Thunker.B", "Trojan.Thunker", "Trojan.Thunker.Win32.5", "Trojan-Proxy.Win32.Thunker", "W32/Espy.A", "TrojanProxy.Thunker.b", "TR/Thunker.DLL", "Trojan[Proxy]/Win32.Thunker", "Win32.Troj.Thunker.a.kcloud", "Trojan-Proxy.Win32.Thunker.a", "Win32/TrojanProxy.Thunker.B", "Win32.Trojan-proxy.Thunker.Ajlv", "Trojan.Thunker.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Qianxin", "dissects", "a", "new", "malicious", "campaign", "by", "the", "SideCopy", "APT", "group." ]
[ 4, 16, 16, 6, 14, 14, 16, 6, 14, 14, 14 ]
[ "The", "abuse", "of", "the", "WebSocket", "protocol", "provides", "XLoader", "with", "a", "persistent", "connection", "between", "clients", "and", "servers", "where", "data", "can", "be", "transported", "any", "time", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Suspect", "You", "’", "re", "Infected", "?", "The", "following", "SMS", "message", "can", "be", "used", "to", "kill", "the", "sample", "analyzed", "in", "this", "research", "and", "all", "other", "variants", "that", "use", "the", "same", "private", "key", ":", "HrLbpr3x/htAVnAgYepBuH2xmFDb68TYTt7FwGn0ddGlQJv/hqsctL57ocFU0Oz3L+uhLcOGG7GVBAfHKL1TBQ==", "Sending", "this", "SMS", "will", "trigger", "TrickMo", "’", "s", "kill", "switch", "by", "sending", "the", "string", "β€œ", "4", "”", "encrypted", "with", "the", "generated", "RSA", "public", "key", "and", "base64", "encoded", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Timebombs", ",", "Dynamic", "Code", "Loading", "and", "Reflection", "If", "Google", "Bouncer", "was", "not", "detected", ",", "the", "application", "starts", "a", "time", "bomb", "which", "initiates", "the", "malicious", "flow", "only", "after", "20", "seconds", "and", "will", "run", "every", "2", "hours", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Corporations", "can", "protect", "themselves", "from", "these", "side-channel", "attacks", "by", "deploying", "client-based", "two-factor", "authentication", ",", "such", "as", "Duo", "Security", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 16 ]
[ "Email", "is", "one", "of", "the", "favorite", "methods", "used", "by", "attackers", "to", "infect", "systems." ]
[ 1, 16, 16, 16, 16, 16, 1, 16, 16, 6, 16, 5, 13 ]
[ "Another", "tie", "between", "the", "activity", "is", "the", "C2", "jackhex.md5c", "[", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 9 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Strictor.D22A4D", "W32/Trojan.ZZSK-0144", "Win.Exploit.Fnstenv_mov-1", "BehavesLike.Win32.Multiplug.wc", "Backdoor/Win32.Wingbird.R209335", "W32/Injector.DNRG!tr", "Trj/GdSda.A", "Win32/Trojan.Spy.c28" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.ForShare.WmiBit", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Backdoor.Trojan", "Trojan.DownLoader24.53357", "Trojan/Win32.PcClient.R191990", "Win32/RootKit.Rootkit.7e5" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Worm.Win32.VB!O", "Worm.VB", "Worm.VB.Win32.2956", "W32/VB.bhj", "Win32.Trojan.WisdomEyes.16070401.9500.9998", "BKDR_PSVR_0000001.TOMA", "Win.Worm.VB-71919", "Worm.Win32.VB.bhj", "Trojan.Win32.VB.dxohtw", "BackDoor.Poison.686", "BKDR_PSVR_0000001.TOMA", "Trojan-Dropper.Vb", "Trojan.Razy.D3A7C4", "Worm.Win32.A.VB.168516", "Worm.Win32.VB.bhj", "Worm/Win32.VB.C142786", "W32/VBKrypt.C!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "domain", "was", "registered", "on", "August", "4,", "2015,", "under", "a", "presumably", "false", "name,", "and", "we", "suspect", "that", "the", "attack", "started", "on", "the", "same", "day." ]
[ 16, 1, 16, 16, 16, 0, 8, 8, 16, 16, 16, 16, 16, 16, 16, 16, 15, 16, 1, 16, 16, 16, 0, 8 ]
[ "A", "backdoor", "also", "known", "as:", "W32.TrosdanpomLTAA.Trojan", "Backdoor.Laserv.B", "Backdoor.Win32.Laserv!O", "Backdoor.Laserv.A4", "Backdoor/Laserv.b", "W32/Backdoor.NWE", "Backdoor.Lassrv.B", "Win32/Lassrv.B", "BKDR_LASSRV.B", "Win.Trojan.Laserv-1", "Backdoor.Laserv.B", "Backdoor.Win32.Laserv.b", "Backdoor.Laserv.B", "Trojan.Win32.Laserv.csyvps", "Trojan.Win32.Equation.132608", "Backdoor.Laserv.B", "Backdoor.Laserv.B", "Backdoor.Laserv.Win32.8", "BKDR_LASSRV.B", "BehavesLike.Win32.Downloader.ch", "W32/Backdoor.ZYMS-3992", "BDS/Laserv.B.2", "Trojan[Backdoor]/Win32.Laserv", "Backdoor.Laserv.B", "Backdoor.W32.Laserv!c", "Backdoor.Win32.Laserv.b", "Backdoor:Win32/Salsnit.A", "Win-Trojan/Equation.132623", "Backdoor.Laserv.B", "Trojan.EquationLaser", "Win32.Backdoor.Laserv.Dvzs", "Backdoor.Laserv!QkthHIoGFGU", "Backdoor.Win32.Laserv", "W32/Laserv.C!tr", "Win32/Backdoor.21d" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "This", "group", "has", "evolved", "a", "lot", "in", "sophistication", "and", "evasion", "techniques", "to", "defeat", "detection", "by", "security", "products." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "choice", "of", "a", "lesser", "known", "currency", "with", "a", "good", "exchange", "rate", "allows", "the", "attackers", "to", "rapidly", "gain", "money", "while", "the", "sophisticated", "use", "of", "safeguards", "makes", "it", "resilient", "to", "most", "disruption", "attempts,", "potentially", "leaving", "victims", "infected", "for", "years." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "For", "example", ",", "one", "commercial", "obfuscator", ",", "which", "cost", "€350", ",", "was", "used", "for", "Trojans", "and", "Opfak.bo", "Obad.a", "Android", "vulnerabilities", "are", "used", "by", "criminals", "for", "three", "reasons", ":", "to", "bypass", "the", "code", "integrity", "check", "when", "installing", "an", "application", "(", "vulnerability", "Master", "Key", ")", ";", "to", "enhance", "the", "rights", "of", "malicious", "applications", ",", "considerably", "extending", "their", "capabilities", ";", "and", "to", "make", "it", "more", "difficult", "to", "remove", "malware", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "From", "early", "April", ",", "hackers", "started", "to", "build", "a", "new", "major", "update", "to", "the", "β€œ", "Agent", "Smith", "”", "campaign", "under", "the", "name", "β€œ", "leechsdk", "”", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]