tokens
sequencelengths
2
296
ner_tags
sequencelengths
2
296
[ "A", "backdoor", "also", "known", "as:", "Trojan.Dembr", "Trojan.MBR.Killer", "Trojan/KillDisk.nas", "TROJ_KILLMBR.SM", "Win32.Trojan.WisdomEyes.16070401.9500.9964", "W32/Jokra.DWCJ-4354", "Trojan.Jokra", "Win32/Tnega.ASFM", "TROJ_KILLMBR.SM", "Trojan.Win32.EraseMBR.b", "Trojan.Win32.EraseMBR.cqzdgw", "Trojan.Win32.S.KillMBR.24576", "Troj.W32.EraseMBR.b!c", "Trojan.KillFiles.10563", "Trojan.EraseMBR.Win32.4", "W32/Jokra.A", "Trojan/EraseMBR.h", "TR/KillMBR.Y.2", "Trojan/Win32.EraseMBR", "Trojan.Win32.EraseMBR.b", "Trojan:Win32/Dembr.A", "Trojan.KillDisk.MBR", "OScope.Trojan.KillMBR.2113", "Trojan.KillDisk.NAS", "Win32/KillDisk.NAS", "Trojan.Win32.DataWiper.b", "Trojan.EraseMBR!+80n0qBNT48", "Trojan.Win32.EraseMBR", "W32/Kast.A!tr", "Win32/Trojan.c81" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "What", "makes", "the", "Turla", "group", "special", "is", "not", "just", "the", "complexity", "of", "its", "tools,", "which", "include", "the", "Uroboros", "rootkit,", "aka", "Snake", "as", "well", "as", "mechanisms", "designed", "to", "bypass", "air", "gaps", "through", "multi-stage", "proxy", "networks", "inside", "LANs,", "but", "the", "exquisite", "satellite-based", "C", "C", "mechanism", "used", "in", "the", "latter", "stages", "of", "the", "attack." ]
[ 16, 16, 16, 16, 6, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 3, 11, 16, 3, 16, 16, 16, 16, 16, 16, 1, 9, 9, 9, 9, 9, 9, 16, 5, 16, 16, 16, 1, 9, 9, 9, 16, 16, 16, 16, 16, 16, 16, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.FamVT.ExpiroPC.PE", "Win32.Trojan.WisdomEyes.16070401.9500.9647", "Heur.Corrupt.PE", "Trojan.MulDrop3.4445", "TrojanDownloader:Win32/Cordmix.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1 ]
[ "All", "the", "malicious", "Dvmap", "apps", "had", "the", "same", "functionality", "." ]
[ 16, 16, 16, 3, 16, 16, 16, 16, 16, 16 ]
[ "CSIS", "provided", "a", "(", "sanitised", ")", "version", "of", "a", "typical", "message", "to", "warn", "users", "what", "to", "look", "out", "for", ":", "“", "You", "have", "received", "a", "multimedia", "message", "from", "+", "[", "country", "code", "]", "[", "sender", "number", "]", "Follow", "the", "link", "http", ":", "//www.mmsforyou", "[", "." ]
[ 4, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 9, 9, 9 ]
[ "To", "achieve", "persistence,", "the", "malware", "creates", "a", "Run", "key", "Registry", "entry", "on", "the", "system." ]
[ 16, 16, 16, 16, 3, 16, 16, 1, 9, 9, 9, 16, 16, 5 ]
[ "Skygofree", ":", "Following", "in", "the", "footsteps", "of", "HackingTeam", "16", "JAN", "2018", "At", "the", "beginning", "of", "October", "2017", ",", "we", "discovered", "new", "Android", "spyware", "with", "several", "features", "previously", "unseen", "in", "the", "wild", "." ]
[ 3, 16, 16, 16, 16, 16, 16, 4, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "This", "industry", "initiative", "was", "created", "to", "share", "information", "and", "potentially", "disrupt", "the", "infrastructure", "and", "tools", "from", "an", "actor", "named", "the", "Lazarus", "Group." ]
[ 16, 4, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 3, 16, 16, 6, 16, 16, 6, 14 ]
[ "Initiating", "the", "MQTT", "client", "." ]
[ 16, 16, 16, 16, 16 ]
[ "Primarily", "targets", "South", "Korea." ]
[ 16, 4, 2, 10 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/W32.Inject.79360.B", "Trojan.Jinto", "Trojan/Inject.nzs", "Trojan.Heur.TP.EDF4BE", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "W32/Trojan2.IJVQ", "TROJ_INJECT.AQT", "Trojan.Win32.Inject.79360", "Troj.W32.Inject.nzs!c", "TrojWare.Win32.Inject.nzs", "Win32.HLLW.Recycler.8", "Trojan.Inject.Win32.2004", "TROJ_INJECT.AQT", "BehavesLike.Win32.PWSZbot.lh", "W32/Trojan.PLGK-4123", "Trojan/Inject.dyx", "Win32.Troj.Inject.kcloud", "Trojan:WinNT/Jinto.A", "BScope.P2P-Worm.Palevo", "Trojan.Win32.Tdss", "Win32/Trojan.c68" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "]", "net", "svc", "[", "." ]
[ 9, 9, 1, 9, 9 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan-Downloader.NSIS.FraudLoad.hd", "BackDoor.RMS.111", "BehavesLike.Win32.Dropper.vc", "W32/Trojan.KGYI-2902", "TR/RedCap.ntnqc", "Backdoor:Win32/Kitpolap.A", "Trojan-Downloader.NSIS.FraudLoad.hd", "Trojan/Win32.Downloader.C2123311", "Trj/CI.A", "NSIS/Radmin.B", "Win32.Trojan.Ratenjay.Umsg", "Riskware.RemoteAdmin!" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "This", "domain", "is", "similar", "to", "the", "one", "the", "malware", "author", "used", "for", "his", "adware", "C", "&", "C", "communication", ",", "minigameshouse", "[", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 9 ]
[ "]", "netupload404", "[", "." ]
[ 9, 9, 1, 9 ]
[ "For", "now", ",", "users", "can", "make", "the", "best", "of", "the", "knowledge", "they", "have", "now", "to", "significantly", "reduce", "the", "effectivity", "of", "such", "malware", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Two", "chunks", "are", "filled", "with", "an", "asynchronous", "procedure", "call", "(", "APC", ")", "routine", "code", "and", "a", "stub", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.eHeur.Malware00", "Backdoor.Sharat", "TROJ_TROXEN.CHU", "Win32.Trojan.WisdomEyes.16070401.9500.9995", "TROJ_TROXEN.CHU", "Win.Trojan.Downbot-3", "Trojan.DownLoader5.18587", "Trojan.Heur.RP.EA89AF", "Downloader/Win32.Small.R1708", "Win32/Sharat.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "C2", "servers", "are", "shared", "by", "multiple", "samples", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Talos", "has", "found", "a", "new", "SPAM", "campaign", "that", "is", "using", "multiple", "layers", "of", "obfuscation", "to", "attempt", "to", "evade", "detection." ]
[ 4, 16, 16, 16, 16, 6, 14, 16, 16, 16, 1, 9, 9, 9, 16, 16, 16, 16, 16 ]
[ "Package", "Name", "App", "Name", "com.whatsapp", "WhatsApp", "Messenger", "com.pugna.magiccall", "n/a", "org.telegram.messenger", "Telegram", "com.facebook.katana", "Facebook", "com.twitter.android", "Twitter", "jp.naver.line.android", "LINE", ":", "Free", "Calls", "&", "Messages", "com.instanza.cocovoice", "Coco", "com.beetalk", "BeeTalk", "com.gtomato.talkbox", "TalkBox", "Voice", "Messenger", "-", "PTT", "com.viber.voip", "Viber", "Messenger", "com.immomo.momo", "MOMO陌陌", "com.facebook.orca", "Messenger", "–", "Text", "and", "Video", "Chat", "for", "Free", "com.skype.rover", "Skype", ";", "3rd", "party", "stores", "only", "Most", "of", "these", "apps", "are", "well", "established", "and", "available", "on", "Google", "Play", ",", "however", ",", "com.skype.rover", "appears", "to", "be", "available", "only", "on", "third-party", "app", "stores", "." ]
[ 16, 16, 16, 16, 1, 5, 5, 1, 16, 1, 5, 1, 5, 1, 5, 1, 5, 16, 16, 16, 16, 16, 1, 16, 1, 5, 1, 5, 16, 5, 16, 16, 1, 5, 5, 1, 5, 1, 5, 16, 16, 16, 16, 16, 16, 16, 1, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "spear-phishing", "campaigns", "we", "detected", "use", "links", "to", "RAR-compressed", "executables", "and", "Microsoft", "Word", "attachments", "that", "exploit", "the", "CVE-2012-0158", "vulnerability." ]
[ 16, 6, 14, 16, 16, 16, 1, 16, 1, 9, 16, 1, 9, 9, 16, 3, 16, 1, 7 ]
[ "Our", "research", "team", "has", "found", "infected", "apps", "on", "third-party", "app", "stores", ",", "but", "they", "could", "also", "be", "downloaded", "by", "Android", "users", "directly", "by", "tapping", "malicious", "links", "in", "phishing", "attack", "messages", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "FireEye", "Labs", "recently", "identified", "a", "previously", "unobserved", "version", "of", "Ploutus,", "dubbed", "Ploutus-D,", "that", "interacts", "with", "KAL's", "Kalignite", "multivendor", "ATM", "platform." ]
[ 4, 12, 16, 16, 16, 16, 16, 16, 16, 3, 16, 3, 15, 16, 16, 4, 5, 13, 13, 13 ]
[ "This", "feature", "was", "enabled", "only", "in", "newer", "versions", "of", "TrickMo", "that", "were", "tailored", "specifically", "for", "German", "banks", "and", "use", "a", "special", "application", "for", "implementing", "TAN-based", "2FA", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.HfsAdware.6E79", "Application.Bundler.InstallBrain.A", "Application.Bundler.InstallBrain.A", "Win32.Adware.InstallBrain.d", "Win.Adware.Installbrain-35", "Win32.Application.InstallBrain.B", "not-a-virus:AdWare.Win32.BrainInst.u", "Application.Bundler.InstallBrain.A", "Trojan.Win32.Adw.crasga", "Application.Bundler.InstallBrain.A", "Application.Win32.InstallBrain.BL", "Trojan:W32/InstallBrain.A", "Adware.Downware.1295", "Adware.BrainInst.Win32.32", "AdWare.Win32.InstallBrain", "AdWare/BrainInst.dz", "W32.Adware.Installbrain", "GrayWare[AdWare:not-a-virus]/Win32.BrainInst.u", "TrojanDownloader:Win32/Brantall.B", "PUP.InstallBrain/Variant", "not-a-virus:AdWare.Win32.BrainInst.u", "AdWare.BrainInst", "PUP.Optional.InstallBrain", "Win32.Adware.Braininst.Wvas", "Adware.BrainInst!" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "In", "an", "e-mail", ",", "a", "Lookout", "representative", "stood", "by", "its", "analysis", "and", "said", "company", "researchers", "planned", "to", "publish", "an", "in-depth", "response", "in", "the", "coming", "days", "." ]
[ 16, 16, 16, 16, 16, 4, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Beyond", "the", "Android", "app", "itself", ",", "other", "components", "such", "as", "the", "aforementioned", "ELF", "libraries", "have", "additional", "data-stealing", "capabilities", "." ]
[ 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "This", "makes", "Dvmap", "the", "first", "Android", "malware", "that", "injects", "malicious", "code", "into", "the", "system", "libraries", "in", "runtime", ",", "and", "it", "has", "been", "downloaded", "from", "the", "Google", "Play", "Store", "more", "than", "50,000", "times", "." ]
[ 16, 16, 3, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 13, 16, 16, 16, 16, 16 ]
[ "The", "C", "&", "C", "address", "and", "the", "encryption", "key", "(", "one", "for", "different", "modifications", "in", "versions", "4.x", "and", "5.x", ",", "and", "distinct", "for", "different", "C", "&", "Cs", "in", "later", "versions", ")", "are", "stitched", "into", "the", "body", "of", "the", "Trojan", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Interestingly,", "as", "part", "of", "the", "delivery", "mechanism,", "the", "malware", "is", "disguised", "as", "a", "base64", "digital", "certificate", "and", "decoded", "via", "certutil.exe." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 1, 9, 9, 9, 16, 1, 16, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Backdoor.Zegost.B.5", "Trojan/Redosdru.aw", "Backdoor.Bapkri", "TrojWare.Win32.GameThief.Magania.~NWABI", "Dialer.Bjlog", "Backdoor.Win32.Zegost!IK", "Backdoor/Win32.Bapkri", "Backdoor.Win32.Drwolf.fep", "Backdoor.Win32.Zegost", "W32/Bjlog.SMC!tr", "PSW.OnlineGames3.WQF" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan-Downloader.Win32.Banload.bppx", "Trojan.Win32.A.Downloader.279193", "Trojan.Qhost.3874", "Downloader.Banload.Win32.43263", "Trojan[Downloader]/Win32.Banload", "Trojan-Downloader.Win32.Banload.bppx", "TrojanDownloader:Win32/Servi.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1 ]
[ "''", "We", "determined", "that", "the", "\"", "eCommon", "''", "file", "contains", "support", "code", "and", "structures", "that", "are", "platform", "independent", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.Kryptik.qb", "Trojan:Win32/Sopinar.D", "SScope.Malware-Cryptor.Drixed" ]
[ 16, 3, 16, 16, 16, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/W32.FakeGom.13314", "Backdoor.Miancha.r5", "Backdoor.Miancha!", "W32/Backdoor2.HTKG", "Backdoor.Miancha", "TROJ_DROPPR.YZ", "Backdoor.Win32.Miancha.b", "Trojan.Win32.Miancha.dxrsks", "Backdoor.W32.Miancha.b!c", "Win32.Backdoor.Miancha.Jcq", "Backdoor:W32/Miancha.A", "BackDoor.Miancha.1", "Backdoor.Miancha.Win32.4", "TROJ_DROPPR.YZ", "W32/Backdoor.IZWZ-3837", "Backdoor/Miancha.a", "TR/Miancha.A.1", "Trojan:Win32/Miancha.A", "Backdoor.Miancha", "Backdoor.Win32.Miancha", "Backdoor.Win32.Miancha.b", "Win32/Backdoor.3e8" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "To", "evade", "detection,", "this", "app", "was", "concealed", "as", "a", "legitimate", "app." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "In", "recent", "months,", "Unit", "42", "has", "observed", "a", "number", "of", "attacks", "that", "we", "attribute", "to", "this", "group." ]
[ 16, 0, 8, 6, 14, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 4 ]
[ "A", "backdoor", "also", "known", "as:", "W32.System3YM.Worm", "Worm.Win32.AutoRun!O", "Worm.Tupym.A5", "W32/Tupym.worm", "Worm.AutoRun.FLD", "Worm.Autorun.Win32.63738", "Trojan.Heur.AutoIT.2", "Win32.Trojan.WisdomEyes.16070401.9500.9892", "W32.Svich", "Win32/Yahlover.PT", "WORM_SOHAND.SM", "Win.Worm.Autorun-313", "Worm.Win32.AutoRun.fnc", "Trojan.Script.Autorun.ddaffd", "W32.W.AutoRun.llU2", "TrojWare.Win32.Injector.XEM", "Trojan.StartPage.31354", "WORM_SOHAND.SM", "BehavesLike.Win32.Tupym.tz", "Worm.Win32.AutoRun", "Worm:Win32/Tupym.A", "Worm:Win32/Tupym.A", "Worm.Win32.AutoRun.fnc", "HEUR/Fakon.mwf", "Worm.Win32.Autorun.fnc", "Trojan.Autorun!VgV/xk+eV94", "W32/AutoVt.AAAD!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Like", "previously", "added", "functionality", ",", "the", "code", "is", "borrowed", "from", "the", "leaked", "Anubis", "Trojan", "source", "code", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.G.Door.2.0", "Backdoor/W32.Hupigon.495616.Q", "Backdoor.G.Door.2.0", "Backdoor/G_Door.20", "Backdoor.G.Door.2.0", "Trojan.Win32.GDoor.dhmh", "W32/GDoor.HMGD-8120", "Backdoor.Trojan", "Win32/G_Door.A", "BKDR_GLACIER.A", "Trojan.G_Door.E", "Backdoor.Win32.G_Door.83", "Backdoor.G_Door!J6XAtZWeqBw", "Backdoor.Win32.G-Door_20.Svr[h]", "Backdoor.W32.G_Door.20!c", "Backdoor.G.Door.2.0", "Backdoor.Win32.G_Door.A", "Backdoor.G.Door.2.0", "BackDoor.GDoor.20", "Backdoor.GDoor.Win32.23", "BKDR_GLACIER.A", "BackDoor-FR.svr", "W32/GDoor.D", "TR/GDoor.Srv", "W32/Gdoor.F!tr.bdr", "Trojan[Backdoor]/Win32.G_Door", "Backdoor.G.Door.2.0", "BackDoor-FR.svr", "Backdoor.G_Door", "Bck/G_Door.I", "Win32.Backdoor.G_door.Szbj", "Backdoor.Win32.G_Door", "Backdoor.G.Door.2.0", "Backdoor.Win32.G_Door.83", "Win32/Trojan.a6d" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Before", "we", "start", "dishing", "the", "details,", "there", "is", "going", "to", "be", "one", "main", "takeaway", "from", "this", "blog", "post:", "If", "you", "haven't", "already,", "update/patch", "your", "Adobe", "Flash", "now." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 16 ]
[ "Charger", ",", "however", ",", "uses", "a", "heavy", "packing", "approach", "which", "it", "harder", "for", "the", "malware", "to", "stay", "hidden", ",", "so", "it", "must", "compensate", "with", "other", "means", "." ]
[ 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Exploit/W97.CVE-2012-0158", "Exp.OLE.CVE-2012-0158.E", "Win32.Exploit.CVE-2012-0158.l", "Doc.Exploit.CVE_2012_0158-17", "Exploit.MSWord.CVE-2012-0158.de", "Exploit.ComObj.CVE-2012-0158.hzuf", "Exploit.WORD.CVE-2012-0158.A", "EXPL_MSCOMCTL.A", "Trojan.EKOP-3", "EXP/CVE-2012-0158.hgyuv", "Trojan[Exploit]/MSWord.CVE-2012-0158.de", "Exploit.MSWord.CVE-2012-0158.de", "Exploit.CVE-2012-0158", "MSWord/Toolbar.A!exploit", "virus.exp.20120158" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.Banito.AQ", "Backdoor.Banito.ae.n3", "Backdoor/Banito.aq", "Backdoor.Banito!msfCf/FWzGs", "W32/Banito.AI", "BKDR_BANITO.BE", "Backdoor.Win32.Banito.bt", "Backdoor.Banito.AQ", "Backdoor.Win32.Banito", "Backdoor.Banito.AQ", "BackDoor.Faggoty", "BKDR_BANITO.BE", "Backdoor.Win32.Banito!IK", "Backdoor/Banito.ao", "Backdoor:Win32/Banito.D", "Backdoor.Win32.Banito.54784.F[UPX]", "Backdoor.Banito.AQ", "Win-Trojan/Banito.54784.D", "OScope.Backdoor.Banito.1", "Backdoor.Win32.Banito", "W32/Banito.AJ!tr.bdr", "Bck/Banito.AT" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "W32/NionSpy", "is", "a", "family", "of", "malware", "that", "steals", "information", "from", "infected", "machines", "and", "replicates", "to", "new", "machines", "over", "networks", "and", "removable", "thumb", "drives." ]
[ 1, 16, 16, 16, 16, 3, 16, 1, 9, 16, 16, 5, 16, 16, 16, 16, 5, 16, 16, 16, 5, 13, 13 ]
[ "Domain", "names", "registered", "by", "the", "Fancy", "Bear", "actor" ]
[ 1, 16, 16, 16, 6, 14, 14, 14 ]
[ "Early", "in", "March,", "while", "studying", "the", "ChinaZ", "threat,", "it", "became", "readily", "apparent", "that", "default", "passwords", "were", "being", "used", "for", "more", "than", "just", "a", "supplementary", "attack", "vector." ]
[ 0, 8, 8, 16, 16, 16, 6, 14, 16, 16, 16, 16, 15, 1, 9, 9, 9, 9, 16, 16, 16, 16, 16, 1, 9, 9 ]
[ "The", "vulnerability", "does", "not", "enable", "the", "execution", "of", "arbitrary", "code", "but", "the", "exploit", "was", "able", "to", "inject", "a", "JavaScript", "payload", "into", "the", "local", "file", "context." ]
[ 16, 7, 16, 16, 16, 16, 16, 16, 7, 15, 16, 16, 3, 16, 16, 16, 16, 16, 7, 3, 16, 16, 1, 9, 9 ]
[ "A", "backdoor", "also", "known", "as:", "Virus.Multi.Moridin!O", "W32.Moridin.B", "PE_MORIDIN.A", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "W32.Morodi.A", "PE_MORIDIN.A", "Win.Trojan.Morid-5", "Virus.Multi.Moridin.b", "Win32.Moridin.A", "Virus.Multi.Moridin!c", "Heur.Packed.Unknown", "Win32.Moridin", "Virus.Moridin.Win32.2", "BehavesLike.Win32.Ipamor.cm", "W32/Trojan.BIOB-8512", "TR/Moridin.B.2", "Win32.Multi.b.106496", "Trojan.Heur.FU.EB24AD", "Virus.Multi.Moridin.b", "Virus.Multi.Moridin", "W32/Moridin.72192", "Win32.Virus.Moridin.Dzkb", "IRC.Moridin.B", "Trojan-Dropper.Win32.Loring", "W32/Moridin.B" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Multiple", "versions", "of", "Regin", "were", "found", "in", "the", "wild,", "targeting", "several", "corporations,", "institutions,", "academics,", "and", "individuals." ]
[ 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 4, 12, 12, 16, 4 ]
[ "System", "application", "installed", "by", "mcpef.apk", "." ]
[ 16, 16, 16, 16, 1, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.Clod90c.Trojan.0a13", "Trojan.BHO.ODS", "Trojan-Clicker/W32.BHO.20480.L", "TrojanDropper.Nonaco", "Trojan.BHO", "Riskware.Win32.E404.fyxw", "W32/Downldr2.HQQK", "Win32/Puper.RK", "Trojan.BHO.ODS", "Adware.BHO!Ut7EPOdXbSM", "Adware.E404.20480.B", "Trojan.BHO.ODS", "Trojan.BHO.ODS", "Trojan.Popuper.43732", "Spyware[AdWare:not-a-virus]/Win32.BHO", "TrojanDropper:Win32/Nonaco.C", "Trojan.BHO.ODS", "W32/Downloader.GJMR-1771", "Trojan.Win32.Dbg", "AdWare.Win32.BHO.aNN", "Win32/BHO.NHP", "not-a-virus:AdWare.Win32.E404" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.FamVT.RazyNHmA.Trojan", "Win32.Trojan.Kryptik.ayq", "TSPY_HPZBOT.SM1", "TrojWare.Win32.DorkBot.LB", "TSPY_HPZBOT.SM1", "BehavesLike.Win32.RansomTescrypt.ch", "Trojan.Win32.Crypt", "TR/Crypt.Xpack.itdny", "Trojan.Symmi.D1129F", "Trj/GdSda.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Based", "on", "our", "research", "that", "we", "will", "further", "outline", "below,", "attackers", "behind", "the", "outages", "in", "two", "power", "facilities", "in", "Ukraine", "in", "December", "likely", "attempted", "similar", "attacks", "against", "a", "mining", "company", "and", "a", "large", "railway", "operator", "in", "Ukraine." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 6, 16, 16, 16, 16, 16, 4, 12, 16, 2, 16, 0, 16, 16, 16, 1, 16, 16, 4, 12, 16, 16, 16, 4, 12, 16, 2 ]
[ "The", "group", "behind", "these", "attacks", "is", "known", "as", "Dragonfly." ]
[ 6, 14, 16, 16, 1, 16, 16, 16, 6 ]
[ "A", "backdoor", "also", "known", "as:", "Application.iStartSurf.1", "Application.iStartSurf.1", "Win32.Trojan.WisdomEyes.16070401.9500.9915", "NSIS/TrojanDownloader.Adload.AQ", "not-a-virus:HEUR:AdWare.Win32.AdLoad.heur", "Application.iStartSurf.1", "Riskware.Nsis.Adload.dtchzc", "Adware.W32.Adload!c", "Trojan.Vittalia.1482", "BehavesLike.Win32.AdwareAdload.tc", "TR/Dldr.Adload.1839597.7", "TrojanDownloader:Win32/Quireap.A", "not-a-virus:HEUR:AdWare.Win32.AdLoad.heur", "PUP/Win32.Adload.R155445", "Trj/CI.A", "NSIS.Adware.Adload.V" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "We", "have", "seen", "multiple", "Elirks", "variants", "using", "Japanese", "blog", "services", "for", "the", "last", "couple", "of", "years." ]
[ 16, 16, 16, 16, 3, 11, 16, 1, 9, 9, 11, 16, 0, 8, 8, 8 ]
[ "Its", "data-stealing", "capabilities", "include", "collecting", "SMSs", "after", "receiving", "an", "SMS-related", "broadcast", "event", "and", "covertly", "recording", "phone", "calls", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "C", "&", "C", "communications", "The", "default", "C", "&", "C", "address", "is", "hardwired", "in", "the", "Rotexy", "code", ":", "The", "relative", "address", "to", "which", "the", "Trojan", "will", "send", "information", "from", "the", "device", "is", "generated", "in", "a", "pseudo-random", "manner", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Symantec", "telemetry", "revealed", "an", "exploit", "hosted", "on", "the", "compromised", "site,", "which", "was", "used", "to", "infect", "visitors", "with", "the", "Korplug", "back", "door", "detected", "by", "Symantec", "as", "Backdoor.Korplug." ]
[ 4, 5, 16, 16, 3, 16, 16, 16, 7, 1, 16, 16, 16, 16, 16, 16, 16, 3, 11, 11, 11, 16, 16, 4, 16, 1 ]
[ "This", "campaign", "uses", "obfuscated", "variants", "of", "the", "HTTPBrowser", "tool", "that", "use", "DNS", "as", "a", "control", "channel." ]
[ 16, 6, 16, 16, 16, 16, 16, 3, 11, 16, 16, 1, 16, 16, 1, 9 ]
[ "Apart", "from", "injecting", "code", "to", "read", "the", "CAPTCHA", ",", "the", "app", "also", "injects", "its", "own", "code", "into", "the", "system_server", "process", ",", "which", "requires", "root", "privileges", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "STRONTIUM", "has", "been", "active", "since", "at", "least", "2007." ]
[ 6, 16, 16, 16, 16, 16, 16, 0 ]
[ "Figure", "12", ":", "Fake", "Bank", "Austria", "Security", "application", "icon", "In", "addition", "to", "operating", "as", "a", "banking", "Trojan", ",", "overlaying", "a", "legitimate", "banking", "app", "with", "an", "indistinguishable", "credential", "theft", "page", ",", "the", "malware", "also", "asks", "for", "credit", "card", "information", "from", "the", "user", "when", "they", "open", "applications", "such", "as", "the", "Google", "Play", "store", "." ]
[ 16, 16, 16, 5, 13, 13, 13, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 16, 16 ]
[ "Check", "Point", "informed", "the", "Google", "Security", "team", "about", "the", "apps,", "which", "were", "then", "removed", "from", "Google", "Play." ]
[ 4, 12, 16, 16, 4, 12, 12, 16, 16, 5, 16, 16, 16, 16, 16, 4, 12 ]
[ "Finally,", "this", "variant", "also", "contains", "an", "interesting", "piece", "of", "comment", "by", "the", "malware", "author", "written", "in", "the", "macro", "code,", "which", "made", "us", "feel", "obliged", "to", "take", "a", "closer", "look", "in", "the", "first", "place." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "JavaScript", "code", "locates", "the", "targeted", "ads", "by", "searching", "for", "iframes", "which", "contain", "ads", "from", "Google", "ads", "infrastructure", ",", "as", "shown", "in", "the", "image", "below", ":", "The", "fraudulent", "clicks", "generate", "a", "large", "revenue", "for", "the", "perpetrators", ",", "especially", "since", "the", "malware", "reached", "a", "presumably", "wide", "spread", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "APT", "groups", "from", "multiple", "countries", "-", "including", "China", "-", "have", "been", "known", "to", "target", "organizations", "of", "strategic", "interest", "with", "aggressive", "malware-based", "espionage", "campaigns." ]
[ 6, 14, 16, 16, 2, 16, 16, 2, 16, 16, 16, 16, 16, 16, 4, 16, 16, 16, 16, 16, 6, 14, 14 ]
[ "Back", "then,", "MELANI", "already", "took", "appropriate", "action", "together", "with", "the", "affected", "financial", "institutions", "and", "ISPs", "in", "Switzerland", "to", "mitigate", "the", "threat." ]
[ 16, 16, 4, 16, 16, 16, 16, 16, 16, 16, 16, 4, 12, 16, 4, 16, 2, 16, 16, 16, 16 ]
[ "The", "credentials", "were", "immediately", "available", "in", "the", "leaky", "database", "–", "see", "Figure", "6", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Arsenal", "is", "currently", "developing", "a", "detailed", "case", "study", "related", "to", "our", "analysis", "of", "computers", "essential", "to", "the", "Odatv", "case", "in", "Turkey." ]
[ 4, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 2 ]
[ "Another", "day,", "another", "ransomware", "gang." ]
[ 0, 8, 16, 6, 14 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9780", "BehavesLike.Win32.StartPage.th", "Trojan-Dropper.Win32.Autoit", "Trojan.AutoIT.7", "TrojanDropper.Autit", "Autoit.Trojan.Heur.Sxyf" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1 ]
[ "This", "is", "the", "exact", "scenario", "we", "witnessed", "this", "week", "during", "an", "incident", "response", "procedure", "and", "that", "is", "detailed", "in", "this", "diary." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "How", "it", "works", "When", "the", "malware", "is", "first", "started", "on", "the", "device", "it", "will", "begin", "by", "removing", "its", "icon", "from", "the", "app", "drawer", ",", "hiding", "from", "the", "end", "user", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Buckeye", "also", "known", "as", "APT3,", "Gothic", "Panda,", "UPS", "Team,", "and", "TG-0110", "is", "a", "cyberespionage", "group", "that", "is", "believed", "to", "have", "been", "operating", "for", "well", "over", "half", "a", "decade." ]
[ 6, 16, 16, 16, 6, 14, 14, 14, 14, 16, 6, 16, 16, 6, 14, 15, 16, 16, 16, 16, 16, 16, 16, 16, 16, 0, 8, 8 ]
[ "Looking", "at", "the", "characteristics", "of", "the", "tool,", "we", "suspect", "that", "it", "has", "been", "prepared", "for", "the", "purpose", "of", "corporate", "espionage." ]
[ 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 6, 14 ]
[ "A", "backdoor", "also", "known", "as:", "W32.HfsAutoA.29F2", "Backdoor.Win32.Poison!O", "TrojanDropper.VB", "BKDR_POISON.IRE", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Backdoor.Trojan", "Win32/IRCBot.ACS", "BKDR_POISON.IRE", "Trojan-Dropper.Win32.VB.cwek", "Trojan.Win32.Poison.cqxwv", "Backdoor.Win32.Poison.146621", "Backdoor.W32.Poison.bfjd!c", "Backdoor.Win32.Poison.fh", "Trojan.VbCrypt.68", "Backdoor.Poison.Win32.31435", "BehavesLike.Win32.Autorun.ch", "Backdoor/Poison.goa", "Trojan[Backdoor]/Win32.Poison", "Trojan-Dropper.Win32.VB.cwek", "Worm:Win32/Neubreku.C", "SIM.Trojan.VBO.02298", "Bck/Poison.AK", "Win32.Trojan-dropper.Vb.Aenv", "Backdoor.Win32.Bifrose", "W32/VBInjector.W!tr", "Win32/Trojan.Dropper.b73" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "RATs,", "such", "as", "H-W0rm,", "njRAT,", "KilerRAT,", "DarkComet,", "Netwire,", "XtremeRAT,", "JSocket/AlienSpy/Adwind", "and", "others,", "hold", "special", "interest", "for", "the", "Threat", "Research", "Team", "at", "Fidelis", "Cybersecurity." ]
[ 3, 16, 16, 3, 11, 11, 11, 11, 11, 11, 16, 16, 16, 16, 16, 16, 4, 12, 12, 12, 16, 4, 12 ]
[ "A", "backdoor", "also", "known", "as:", "Android.Trojan.RootSmart.A", "Android.GGSmart.A", "Android.Malware.Trojan", "A.H.Rog.RootSmart.B", "Android.Trojan.GGSmart.d", "AndroidOS/GGSmart.A", "AndroidOS_RootSmart.D", "Android.Trojan.RootSmart.A", "HEUR:Backdoor.AndroidOS.RootSmart.a", "Android.Trojan.RootSmart.A", "Trojan.Android.RootSmart.bdbwsm", "Riskware.Android.FakeInstall.jab", "Trojan-Downloader:Android/RootSmart.A", "Android.Smart.4.origin", "AndroidOS_RootSmart.D", "AndroidOS/GGSmart.A", "Backdoor/AndroidOS.erl", "ANDROID/GGSmart.D.4", "Trojan[Backdoor]/Android.RootSmart", "Android.Troj.GacBlocker.a.kcloud", "Android.Trojan.RootSmart.A", "HEUR:Backdoor.AndroidOS.RootSmart.a", "Android-Backdoor/RootSmart.1bb6", "Android/GGSmart.D", "Trojan.AndroidOS.GGSmart", "Android/GGSmart.D!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Exp.XML.CVE-2017-8570", "W97M.Downloader", "Win32/Exploit.CVE-2017-8570.A", "TROJ_CVE20170199.JEJOPP", "Exploit.Xml.CVE-2017-0199.equmby", "PPT.S.Exploit.1356909", "TROJ_CVE20170199.JEJOPP", "ZIP/Trojan.CGYR-2", "XML/Dloader.S2", "Exploit.CVE-2017-8570", "MSOffice/Dloader!exploit.CVE20170199" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "No", "instances", "of", "these", "apps", "were", "found", "in", "Google", "Play", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.PasswordStealer", "Trojan.Win32.Ric.exqwlt", "Trojan.Win32.Z.Evrial.35328.F", "Trojan.MulDrop7.60168", "Trojan.MSIL.PSW", "TrojanSpy:MSIL/Evrial.A!bit", "TScope.Trojan.MSIL", "Trj/GdSda.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Some", "emulators", "build", "their", "phone", "number", "out", "of", "the", "default", "number", "created", "in", "the", "emulator", "software", "and", "the", "port", "number", ":", "5554.", "getMachine", "function", "using", "anti-emulator", "technique", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 9, 9, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Abuse-Worry/W32.NetPass.466944", "Trojanspy.Vlogger.A3", "Trojan/Spy.VB.nwb", "Trojan.Heur.RX.EB6D33", "Win32.Trojan.WisdomEyes.16070401.9500.9997", "Win32/VBInject.Stub", "Trojan.Win32.Diss.susqi", "Tool.NetPass.Win32.2684", "Trojan[PSWTool]/Win32.NetPass", "PWS:Win32/Sifre.A", "Trojan.Win32.Diss.susqi", "Trojan/Win32.Sifre.R148157", "Win32.Trojan.Diss.Lplb", "Riskware.PSWTool!", "Trojan.Win32.VB" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Exploit-CVE2012-0158.u", "Trojan.Mdropper", "TROJ_CVE20120158.MESD", "Exploit.Win32.CVE-2012-0158.aw", "Exploit.ComObj.CVE-2012-0158.hzuf", "Exploit.W32.Cve!c", "Exploit.Mht.1", "TROJ_CVE20120158.MESD", "Trojan:Win32/Knonyme.CS!dha", "Exploit.WORD.CVE-2012-0158", "Exploit.MSWord.CVE-2012-0158", "Win32/Trojan.Exploit.a11" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "As", "2016", "comes", "to", "a", "close,", "we", "observe", "the", "same", "thing", "happening", "to", "another", "of", "Nintendo's", "game", "properties:", "Super", "Mario." ]
[ 16, 0, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 5, 13, 13, 13 ]
[ "According", "to", "SimilarWeb,", "these", "sites", "have", "a", "combined", "total", "of", "at", "least", "50", "million", "visitors", "per", "month." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "These", "emails", "contain", "misleading", "links", "that", "download", "malicious", "Zip", "files,", "which,", "in", "turn,", "contain", "a", "JavaScript", "file", "that", "downloads", "the", "TorrentLocker", "ransomware." ]
[ 16, 1, 16, 16, 1, 16, 1, 9, 9, 9, 16, 16, 16, 16, 16, 1, 9, 16, 16, 16, 3, 11 ]
[ "At", "this", "time", ",", "the", "Trojan", "also", "began", "actively", "using", "different", "methods", "of", "obfuscation", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Unit", "42", "has", "discovered", "a", "new", "cluster", "of", "malware", "samples,", "which", "targets", "Samsung", "devices", "and", "Korean", "language", "speakers,", "with", "relationships", "to", "the", "malware", "used", "in", "Operation", "Blockbuster." ]
[ 4, 12, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 5, 13, 16, 4, 12, 12, 16, 16, 16, 3, 11, 16, 16, 6, 14 ]
[ "A", "backdoor", "also", "known", "as:", "Win.Trojan.Secrar-3", "W32.W.Otwycal.l4av", "PUA.RiskWare.PEMalform", "Trojan:Win32/Secrar.A", "Win32/RiskWare.PEMalform.E" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Scache.A", "Trojan.Scache.A", "Trojan.Scache.A", "Trojan.Scache.A", "Trojan.Dos.Scache.fnss", "TROJ_SCACHE.A", "Trojan.DOS.Scache", "Troj.DOS.Scache!c", "Trojan.Scache.A", "TrojWare.DOS.Scache", "Trojan.Scache.A", "Trojan.Cashe", "Trojan.Scache.DOS.2", "TROJ_SCACHE.A", "TR/Scache.A", "W32/Scache.A!tr", "Trojan/DOS.Scache", "Trojan.Scache.A", "Dos.Trojan.Scache.Aguy", "Trojan.Scache.A", "Trojan.DOS.Scache.aa" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "One", "of", "the", "unique", "features", "of", "the", "malware", "is", "that", "it", "retrieves", "its", "C2", "address", "by", "accessing", "a", "pre-determined", "microblog", "service", "or", "SNS." ]
[ 16, 16, 16, 16, 16, 16, 16, 3, 16, 15, 16, 16, 16, 1, 9, 16, 16, 16, 16, 1, 9, 16, 5 ]
[ "This", "makes", "it", "a", "powerful", "tool", "for", "attackers." ]
[ 16, 16, 16, 16, 16, 16, 16, 6 ]
[ "Call", "an", "attacker-specified", "number", "Uninstall", "apps", "Check", "if", "a", "device", "is", "rooted", "Hide", "its", "icon", "Retrieve", "list", "of", "files", "on", "external", "storage", "If", "running", "on", "a", "Huawei", "device", "it", "will", "attempt", "to", "add", "itself", "to", "the", "protected", "list", "of", "apps", "able", "to", "run", "with", "the", "screen", "off", "Encrypts", "some", "exfiltrated", "data", "Desert", "Scorpion", "'s", "second", "stage", "masquerades", "as", "a", "generic", "\"", "settings", "''", "application", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "calls", "are", "almost", "certainly", "a", "pro-Russia", "propaganda", "effort", "designed", "to", "create", "negative", "political", "content", "about", "those", "who", "have", "spoken", "out", "against", "Russian", "President", "Vladimir", "Putin", "and,", "in", "the", "last", "year,", "opposed", "Russia's", "invasion", "of", "Ukraine." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 12, 12, 12, 16, 16, 0, 8, 8, 16, 16, 16, 16, 2 ]
[ "While", "these", "attacks", "were", "covered", "extensively", "in", "the", "media,", "how", "the", "attackers", "stole", "these", "credentials", "and", "introduced", "W32.Disttrack", "on", "targeted", "organizations'", "networks", "remains", "a", "mystery." ]
[ 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 6, 1, 16, 1, 16, 16, 1, 16, 16, 4, 12, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9990", "W32.Sand.12300", "Virus.Win32.HLLP.Alcaul.c", "Virus.Win32.HLLP.Alcaul.D", "Win32.HLLP.Alcopaul.12296", "Win32.NGVCK.TTD", "Win32/HLLP.Alcaul.c", "W32/Alcaul.D", "Virus.Win32.HLLP.Alcaul.c", "Worm:Win32/Lopy.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]