tokens
sequencelengths 2
296
| ner_tags
sequencelengths 2
296
|
---|---|
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.Nioupale",
"Trojan/Daserf.b",
"Trojan.Heur.PT.E6A39B",
"BKDR_DASERF.ZCEG-A",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"BKDR_DASERF.ZCEG-A",
"Trojan.Win32.Scar.hnib",
"Trojan.Win32.Invader.ervtpc",
"Troj.Dropper.W32.Small.kZ2V",
"Trojan.Inject1.18880",
"BehavesLike.Win32.Backdoor.kh",
"W32/Trojan.MWNM-9354",
"Trojan/Win32.Scar",
"Backdoor:Win32/Nioupale.A",
"Trojan.Win32.Scar.hnib",
"Trojan/Win32.Scar.R68534",
"Trojan.Scar",
"Win32.Trojan.Scar.Llhd",
"W32/Scar.HNIB!tr",
"Win32/Trojan.97a"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"MemScan:Backdoor.Hupigon.APH",
"Win32.Backdoor.Hupigon.axbr.10",
"Backdoor.Graybird",
"BKDR_HUPIGON.ASJ",
"Backdoor.Win32.Hupigon.aha",
"MemScan:Backdoor.Hupigon.APH",
"MemScan:Backdoor.Hupigon.APH",
"BackDoor.Pigeon.194",
"BKDR_HUPIGON.ASJ",
"Backdoor.Win32.Hupigon!IK",
"MemScan:Backdoor.Hupigon.APH",
"Backdoor.Win32.Hupigon.cmpw",
"Backdoor.Win32.Gpigeon2008.acj",
"Backdoor.Win32.Hupigon",
"BackDoor.Hupigon5.ARLC"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"WS.Reputation.1",
"Trojan.Strictor.D148BF"
] | [
16,
3,
16,
16,
16,
1,
1
] |
[
"It",
"steals",
"SMS",
"messages",
"and",
"information",
"about",
"voice",
"calls",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"It",
"says",
"those",
"were",
"sent",
"in",
"the",
"report",
"to",
"the",
"FBI."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"experts",
"of",
"G",
"DATA's",
"SecurityLabs",
"analyzed",
"a",
"specially",
"crafted",
"Microsoft",
"Word",
"document",
"the",
"attackers",
"used",
"to",
"install",
"a",
"rather",
"famous",
"banking",
"Trojan",
"called",
"Dridex."
] | [
16,
16,
16,
4,
12,
12,
16,
16,
16,
16,
5,
13,
13,
16,
6,
16,
16,
16,
16,
16,
16,
3,
11,
16,
3
] |
[
"Decompiled",
"exploit",
"function",
"code",
"fragment",
"run_with_mmap",
"function",
"from",
"the",
"android-rooting-tools",
"project",
"As",
"can",
"be",
"seen",
"from",
"the",
"comparison",
",",
"there",
"are",
"similar",
"strings",
"and",
"also",
"a",
"unique",
"comment",
"in",
"Italian",
",",
"so",
"it",
"looks",
"like",
"the",
"attackers",
"created",
"this",
"exploit",
"payload",
"based",
"on",
"android-rooting-tools",
"project",
"source",
"code",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16
] |
[
"Attackers,",
"regardless",
"of",
"their",
"skills",
"and",
"motives,",
"often",
"attempt",
"to",
"wrap",
"malicious",
"code",
"in",
"a",
"way",
"that",
"will",
"seem",
"innocuous",
"to",
"practitioners",
"and",
"security",
"products."
] | [
6,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
5,
13
] |
[
"The",
"vulnerability",
"bypassed",
"most",
"mitigations",
"prior",
"to",
"patch",
"availability;",
"however,",
"FireEye",
"email",
"and",
"network",
"products",
"detected",
"the",
"malicious",
"documents."
] | [
16,
7,
15,
16,
16,
16,
16,
16,
16,
16,
4,
1,
16,
5,
13,
16,
1,
9,
9
] |
[
"This",
"incident",
"happened",
"on",
"an",
"Android",
"6.0.1",
"device,",
"owned",
"by",
"one",
"of",
"the",
"company's",
"Vice",
"Presidents."
] | [
16,
16,
16,
16,
16,
5,
13,
13,
16,
16,
16,
16,
4,
12,
12,
12
] |
[
"Morphisec",
"researchers",
"began",
"investigating",
"the",
"attacks",
"on",
"April",
"24",
"and",
"continue",
"to",
"uncover",
"more",
"details."
] | [
4,
12,
16,
16,
16,
3,
16,
0,
8,
16,
16,
16,
16,
16,
16
] |
[
"This",
"means",
"the",
"attacker",
"can",
"craft",
"a",
"phishing",
"website",
"without",
"the",
"user",
"knowing",
"it",
"is",
"visiting",
"a",
"phishing",
"site."
] | [
16,
16,
16,
6,
16,
16,
1,
9,
9,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"PSWTool.Win32.Ophcrack!O",
"Tool.Ophcrack.Win32.15",
"W32/MalwareF.MTNL",
"not-a-virus:PSWTool.Win32.Ophcrack.a",
"Application.PassView.BE",
"Tool.PassSteel.1076",
"BehavesLike.Win32.Dropper.rc",
"W32/Risk.YHKN-9333",
"RiskWare[PSWTool]/Win32.PWDump.at",
"Application.PassView.BE",
"not-a-virus:PSWTool.Win32.Ophcrack.a",
"Application.PassView.BE",
"Trojan.PSWTool!8KQf3yAIaxc",
"not-a-virus.PSWTool.ophCrack"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"]",
"204",
"[",
"."
] | [
9,
9,
9,
9
] |
[
"A",
"university",
"class",
"student",
"list",
"including",
"the",
"C",
"&",
"C",
"domain",
"registrant",
"Due",
"to",
"poor",
"privacy",
"practices",
"on",
"the",
"part",
"of",
"our",
"culprit",
"β",
"s",
"university",
",",
"we",
"now",
"know",
"his",
"date",
"of",
"birth",
"(",
"probably",
":",
"he",
"seemingly",
"used",
"his",
"birth",
"year",
"as",
"part",
"of",
"his",
"Gmail",
"address",
",",
"as",
"further",
"partial",
"confirmation",
")",
",",
"we",
"know",
"that",
"he",
"was",
"a",
"student",
"and",
"what",
"university",
"he",
"attended",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"ransom",
"note",
"contains",
"the",
"following",
"text:"
] | [
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Heur.Corrupt.PE",
"Worm:Win32/[email protected]#2",
"Worm.Win32.Fanta"
] | [
16,
3,
16,
16,
16,
1,
1,
1
] |
[
"Dridex",
"is",
"a",
"banking",
"trojan,",
"which",
"is",
"a",
"bot",
"that",
"communicates",
"with",
"a",
"C&C",
"server",
"through",
"HTTP."
] | [
3,
16,
16,
3,
11,
16,
16,
16,
3,
16,
16,
16,
16,
1,
9,
9,
9
] |
[
"When",
"popular",
"applications",
"come",
"under",
"fire",
"and",
"are",
"featured",
"prominently",
"in",
"the",
"news",
",",
"hackers",
"get",
"excited",
"as",
"these",
"newsworthy",
"apps",
"can",
"become",
"their",
"latest",
"target",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"URL",
"Status",
"IP",
"Domain",
"registration",
"date",
"http",
":",
"//ora.studiolegalebasili",
"[",
"."
] | [
16,
16,
16,
16,
16,
16,
1,
9,
9,
9,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.Virut.G",
"W32/Trojan2.MPL",
"W32.Virut.CF",
"W32/Virut.GE",
"Virus.Win32.Virut.ce",
"Win32.Virut.AM",
"Trojan.Opclose",
"TR/VB.EWS",
"Worm.Win32.SillyFDC!IK",
"Worm/Kolab.jfi",
"Virus:Win32/Virut.BN",
"Win32/Virut.F",
"W32/Trojan2.MPL",
"Virus.Virut.13",
"Win32.Virut.dz",
"Worm.Win32.SillyFDC",
"W32/Sality.AO"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"After",
"further",
"investigation,",
"we",
"realized",
"that",
"its",
"infrastructure",
"for",
"exfiltrating",
"credentials",
"was",
"still",
"operational",
"and",
"that",
"Ebury",
"was",
"still",
"being",
"actively",
"used",
"by",
"the",
"Windigo",
"gang."
] | [
16,
16,
16,
16,
16,
16,
16,
5,
16,
1,
9,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
6,
14,
14
] |
[
"The",
"attackers",
"compromised",
"two",
"legitimate",
"Thai",
"websites",
"to",
"host",
"the",
"malware,",
"which",
"is",
"a",
"tactic",
"this",
"group",
"has",
"used",
"in",
"the",
"past."
] | [
16,
6,
1,
16,
1,
9,
9,
16,
1,
16,
3,
16,
16,
16,
16,
16,
6,
16,
16,
16,
16,
0
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.SMSHoax",
"Dropper.Dapato.Win32.20900",
"Win32.Trojan.WisdomEyes.16070401.9500.9953",
"TROJ_GE.CFDA1E9F",
"Win.Trojan.Inject-14546",
"Trojan.Win32.InstallMonster.cxzobk",
"Win.Troj.mzIo",
"TrojWare.Win32.Injector.BCBA",
"Trojan.InstallMonster.120",
"TROJ_GE.CFDA1E9F",
"BehavesLike.Win32.Backdoor.rc",
"Hoax.Win32.ArchSMS",
"Trojan/Inject.awic",
"TR/Rogue.11221316.14",
"Win32.Troj.Undef.kcloud",
"Trojan.Injector!UXjGJT5Czj8",
"W32/Injector.BCBB!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"TrojanDownloader.Small.AIA4",
"Trojan.Buzy.518",
"TROJ_DLOADR.SMUS",
"Win32/Small.QR",
"TROJ_DLOADR.SMUS",
"Trojan.DownLoader6.35083",
"BehavesLike.Win32.RansomWannaCry.mz",
"Trojan.Win32.Malex",
"TrojanDownloader:Win32/Onitab.B",
"Trojan/Win32.Downloader.R33065",
"Trj/CI.A",
"Win32/TrojanDownloader.Small.PAL"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/W32.Scar.499712.C",
"Trojan-Ransom.Win32.Blocker!O",
"TrojanDropper.Dwonk.A",
"Trojan/Chydo.cdh",
"TROJ_RENOS.SM",
"Win32.Worm.AutoRun.bj",
"W32/Trojan2.JXKJ",
"Win32/SillyAutorun.CCQ",
"TROJ_RENOS.SM",
"Trojan-Ransom.Win32.Blocker.ckeq",
"Trojan.Win32.Drop.ihult",
"Trojan.Win32.Chydo.1032192",
"TrojWare.Win32.Scar.AB",
"Trojan.MulDrop.46689",
"Backdoor.Klon.Win32.955",
"BehavesLike.Win32.Backdoor.gc",
"Trojan.Win32.Chydo",
"W32/Trojan.GFJX-4360",
"Trojan/Scar.cym",
"Trojan/Win32.Scar",
"Trojan-Ransom.Win32.Blocker.ckeq",
"TrojanDropper:Win32/Dwonk.A",
"Trojan/Win32.Chydo.R3468",
"Trojan.Chudik.28205",
"Trojan-ransom.Win32.Blocker.ckeq",
"Trojan.Chydo!nNe8FVSDJ+I",
"Win32/Trojan.16c"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"We",
"also",
"uncovered",
"ViperRAT",
"in",
"a",
"billiards",
"game",
",",
"an",
"Israeli",
"Love",
"Songs",
"player",
",",
"and",
"a",
"Move",
"To",
"iOS",
"app",
"."
] | [
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16
] |
[
"The",
"second",
"phase",
"is",
"when",
"an",
"attachment",
"from",
"the",
"malspam",
"retrieves",
"ransomware",
"from",
"a",
"web",
"server."
] | [
16,
16,
16,
16,
16,
1,
9,
16,
16,
1,
16,
3,
16,
5,
13,
13
] |
[
"These",
"malicious",
"installers",
"were",
"then",
"uploaded",
"to",
"Baidu's",
"cloud",
"file",
"sharing",
"service",
"for",
"used",
"by",
"Chinese",
"iOS/OS",
"X",
"developers."
] | [
16,
3,
11,
16,
16,
16,
16,
5,
13,
13,
13,
13,
11,
16,
16,
4,
12,
12,
12
] |
[
"As",
"a",
"reminder",
",",
"it",
"is",
"always",
"a",
"good",
"practice",
"to",
"download",
"apps",
"only",
"from",
"trusted",
"app",
"stores",
"such",
"as",
"Google",
"Play",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16
] |
[
"(",
"It",
"is",
"specified",
"in",
"the",
"interception",
"template",
"whether",
"a",
"reply",
"must",
"be",
"sent",
",",
"and",
"which",
"text",
"should",
"be",
"sent",
"to",
"which",
"address",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"Trojan",
"waits",
"for",
"incoming",
"SMS",
"messages",
"(",
"the",
"β",
"alarmReceiver.class",
"β",
")",
"and",
"checks",
"whether",
"these",
"messages",
"contain",
"one",
"of",
"the",
"following",
"commands",
":",
"β",
"sms",
"β",
",",
"β",
"contact",
"β",
",",
"β",
"location",
"β",
",",
"β",
"other",
"β",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"addition",
"is",
"seen",
"in",
"Figure",
"5",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"technical",
"details",
"of",
"the",
"attack",
"have",
"yet",
"to",
"be",
"made",
"public,",
"however",
"we've",
"recently",
"identified",
"tools",
"uploaded",
"to",
"online",
"malware",
"repositories",
"that",
"we",
"believe",
"are",
"linked",
"to",
"the",
"heist."
] | [
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
3,
11,
11,
16,
16,
16,
16,
16,
16,
6,
14
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor/W32.Visel.41946",
"Backdoor.Visel.Win32.404",
"Backdoor.W32.Visel.asz!c",
"Backdoor/Visel.asd",
"Win32.Trojan.WisdomEyes.16070401.9500.9969",
"Backdoor.Trojan",
"Trojan-GameThief.Win32.Magania.tqse",
"Trojan.Win32.Visel.bqjxis",
"BackDoor.Darkshell.270",
"BehavesLike.Win32.Downloader.ph",
"Backdoor.Win32.Visel",
"Backdoor/Visel.sw",
"TR/Drop.Strigy.A.2",
"Trojan[Backdoor]/Win32.Visel",
"TrojanDropper:Win32/Strigy.A",
"Backdoor.Win32.A.Visel.39424",
"Trojan-GameThief.Win32.Magania.tqse",
"Backdoor/Win32.CSon.R885",
"Win32.Trojan-gamethief.Magania.Pfju",
"Trojan.DR.Strigy!SJEu21JfMbU",
"W32/Visel.ASZ!tr.bdr",
"Trj/ByShell.C",
"Win32/Trojan.b7f"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Given",
"the",
"lack",
"of",
"indicators",
"of",
"compromise",
",",
"we",
"decided",
"to",
"check",
"to",
"see",
"if",
"this",
"was",
"the",
"same",
"malware",
"we",
"had",
"been",
"researching",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"In",
"2016,",
"from",
"September",
"through",
"November,",
"an",
"APT",
"campaign",
"known",
"as",
"menuPass",
"targeted",
"Japanese",
"academics",
"working",
"in",
"several",
"areas",
"of",
"science,",
"along",
"with",
"Japanese",
"pharmaceutical",
"and",
"a",
"US-based",
"subsidiary",
"of",
"a",
"Japanese",
"manufacturing",
"organizations."
] | [
16,
0,
16,
0,
16,
0,
6,
14,
14,
16,
16,
6,
16,
4,
12,
16,
16,
16,
16,
16,
16,
16,
16,
4,
12,
16,
16,
4,
12,
12,
12,
12,
12,
12
] |
[
"Attacks",
"originating",
"from",
"this",
"threat",
"group",
"have",
"not",
"ceased",
"since",
"our",
"previous",
"report",
"from",
"April",
"of",
"2017",
"and",
"have",
"continued",
"through",
"July",
"of",
"2017."
] | [
1,
16,
16,
16,
4,
12,
16,
16,
16,
16,
16,
16,
16,
16,
0,
8,
8,
16,
16,
16,
16,
0,
8,
8
] |
[
"It",
"searches",
"the",
"Android",
"and",
"Google",
"Chrome",
"browsers",
"for",
"stored",
"sensitive",
"information."
] | [
16,
16,
16,
5,
16,
5,
13,
13,
16,
1,
9,
9
] |
[
"At",
"that",
"time",
",",
"Ginp",
"was",
"a",
"simple",
"SMS",
"stealer",
"whose",
"purpose",
"was",
"only",
"to",
"send",
"a",
"copy",
"of",
"incoming",
"and",
"outgoing",
"SMS",
"messages",
"to",
"the",
"C2",
"server",
"."
] | [
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"malicious",
"capabilities",
"observed",
"in",
"the",
"second",
"stage",
"include",
"the",
"following",
":",
"Upload",
"attacker-specified",
"files",
"to",
"C2",
"servers",
"Get",
"list",
"of",
"installed",
"applications",
"Get",
"device",
"metadata",
"Inspect",
"itself",
"to",
"get",
"a",
"list",
"of",
"launchable",
"activities",
"Retrieves",
"PDF",
",",
"txt",
",",
"doc",
",",
"xls",
",",
"xlsx",
",",
"ppt",
",",
"pptx",
"files",
"found",
"on",
"external",
"storage",
"Send",
"SMS",
"Retrieve",
"text",
"messages",
"Track",
"device",
"location",
"Handle",
"limited",
"attacker",
"commands",
"via",
"out",
"of",
"band",
"text",
"messages",
"Record",
"surrounding",
"audio",
"Record",
"calls",
"Record",
"video",
"Retrieve",
"account",
"information",
"such",
"as",
"email",
"addresses",
"Retrieve",
"contacts",
"Removes",
"copies",
"of",
"itself",
"if",
"any",
"additional",
"APKs",
"are",
"downloaded",
"to",
"external",
"storage",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"However",
",",
"it",
"has",
"begun",
"to",
"target",
"users",
"all",
"around",
"the",
"world",
",",
"especially",
"users",
"in",
"countries",
"like",
"China",
",",
"Taiwan",
",",
"France",
",",
"Switzerland",
",",
"Germany",
",",
"United",
"Kingdom",
",",
"United",
"States",
",",
"and",
"others",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"]",
"net",
"linkdatax",
"[",
"."
] | [
9,
9,
1,
9,
9
] |
[
"It",
"steals",
"logins",
"and",
"passwords",
"to",
"online",
"banking",
"accounts",
"by",
"substituting",
"he",
"window",
"displayed",
"by",
"the",
"bank",
"application",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"]",
"205",
"[",
"."
] | [
9,
9,
9,
9
] |
[
"]",
"coupload202",
"[",
"."
] | [
9,
9,
1,
9
] |
[
"This",
"brought",
"to",
"us",
"the",
"hypothesis",
"that",
"this",
"might",
"be",
"a",
"version",
"used",
"by",
"the",
"group",
"behind",
"ViceLeaker",
"for",
"internal",
"communication",
"or",
"for",
"other",
",",
"unclear",
"purposes",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Royal",
"Mail",
"-",
"British",
"postal",
"service",
"and",
"courier",
"company",
"."
] | [
4,
12,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"functionality",
"of",
"Pro",
"PoS",
"seems",
"fairly",
"extensive",
"according",
"to",
"recent",
"press",
"releases."
] | [
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"]",
"com/",
"hxxp",
":",
"//www",
"[",
"."
] | [
9,
9,
1,
9,
9,
9,
9
] |
[
"The",
"summer",
"months",
"dawn",
"on",
"us",
"and",
"the",
"financial",
"year",
"comes",
"to",
"a",
"close."
] | [
16,
0,
8,
16,
16,
16,
16,
16,
0,
8,
16,
16,
16,
16
] |
[
"Today,",
"we",
"are",
"releasing",
"the",
"full",
"whitepaper",
"on",
"the",
"Potao",
"malware",
"with",
"additional",
"findings,",
"the",
"cyberespionage",
"campaigns",
"where",
"it",
"was",
"employed,",
"and",
"its",
"connection",
"to",
"a",
"backdoor",
"in",
"the",
"form",
"of",
"a",
"modified",
"version",
"of",
"the",
"TrueCrypt",
"encryption",
"software."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
6,
14,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
11,
11
] |
[
"Dropped",
"by",
"the",
"Nuclear",
"exploit",
"kit,",
"further",
"investigation",
"showed",
"that",
"the",
"malware",
"was",
"a",
"new",
"Trojan",
"called",
"Thanatos",
"by",
"its",
"developers",
"and",
"that",
"we",
"refer",
"to",
"internally",
"as",
"Alphabot"
] | [
16,
16,
16,
3,
11,
11,
16,
16,
16,
16,
16,
3,
16,
16,
16,
3,
16,
3,
16,
16,
6,
16,
15,
16,
16,
16,
16,
16,
6
] |
[
"The",
"second",
"stealing",
"function",
"is",
"the",
"onStartCommand",
",",
"which",
"steals",
"infected",
"device",
"data",
"and",
"additional",
"information",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"newly",
"patched",
"zero-day",
"vulnerability",
"in",
"Internet",
"Explorer",
"has",
"already",
"been",
"exploited",
"in",
"attacks",
"involving",
"a",
"compromised",
"website",
"belonging",
"to",
"an",
"evangelical",
"church",
"in",
"Hong",
"Kong."
] | [
16,
16,
16,
7,
15,
16,
5,
13,
16,
16,
16,
1,
16,
1,
16,
16,
1,
9,
16,
16,
16,
4,
12,
16,
2,
10
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.Clod748.Trojan.b154",
"Trojan.DR.Cutwail!zuYZ2Zvwu1k",
"Trojan.Zlob",
"PE:Trojan.Win32.DNSChanger.drb!1075148351",
"TrojWare.Win32.Trojan.DNSChanger.~CRSD",
"Trojan.Packed.194",
"Win32.Troj.DNSChangerT.dx.14848",
"Trojan:Win32/Zlob.AS",
"Trojan/Win32.Monder",
"Virus.Win32.Heur.c",
"Trojan.Inject",
"Downloader.Tiny.D"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Webinjects",
":",
"According",
"to",
"the",
"bot",
"β",
"s",
"configuration",
",",
"if",
"a",
"webinject",
"is",
"set",
"for",
"a",
"given",
"application",
",",
"it",
"will",
"be",
"executed",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Indeed,",
"the",
"past",
"few",
"months",
"seem",
"to",
"be",
"quite",
"busy",
"for",
"the",
"Andromeda",
"botnet",
"and",
"its",
"recent",
"activity",
"indicates",
"intent",
"in",
"the",
"United",
"States."
] | [
16,
16,
0,
8,
8,
16,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
2,
10,
10
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Symmi.D13DDA",
"Win.Trojan.Delf-6394424-2",
"Trojan-Downloader.Win32.Delf.krvg",
"Trojan.Win32.Delf.evdbqw",
"BehavesLike.Win32.BadFile.th",
"Trojan-Downloader.Win32.Delf",
"TR/Downloader.sfpmb",
"Trojan-Downloader.Win32.Delf.krvg",
"Trojan/Win32.Tiggre.C2290717",
"Trj/GdSda.A",
"W32/Delf.CGH!tr.dldr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"These",
"artifacts",
"indicate",
"that",
"FakeSpy",
"'s",
"campaign",
"is",
"still",
"live",
"and",
"under",
"development",
"."
] | [
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.MSIL.BindEx.A3",
"Trojan.MSIL.BindEx.a",
"Win32.Risk.Malware.Szbo",
"Trojan.InstallCube.49",
"Trojan.Zusy.D3BCBB",
"Trojan.MSIL.BindEx.a",
"Trojan:MSIL/Torwofun.A",
"Trj/CI.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/Qhost.pml",
"Win32/Jeefo.A",
"Virus.Win32.Hidrag.a",
"Win32.Jeefo.B",
"Virus.Win32.Hidrag.clfcen",
"Win32.Jeefo.B",
"Win32.HLLP.Jeefo.36352",
"Trojan:Win32/Vb.At",
"W32/Hidrag.E",
"Virus/Win32.Hidrag.a",
"Win32.Jeefo.B",
"Virus.Win32.Hidrag.a",
"Win32.Jeefo.B"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"This",
"feature",
"is",
"designed",
"to",
"block",
"one",
"application",
"from",
"accessing",
"the",
"data",
"of",
"other",
"applications",
"without",
"rooting",
"the",
"device",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"identification",
"of",
"cyber",
"crime",
"actors,",
"particularly",
"Nigerian",
"419",
"scam",
"operators,",
"attempting",
"to",
"exploit",
"CVE-2014-4114",
"demonstrates",
"how",
"quickly",
"cyber",
"criminals",
"are",
"trying",
"to",
"exploit",
"a",
"vulnerability",
"previously",
"associated",
"with",
"espionage",
"actors,",
"using",
"similar",
"tactics,",
"techniques,",
"and",
"procedures",
"TTP",
"to",
"maximize",
"their",
"chances",
"of",
"success,",
"with",
"additional",
"innovation",
"as",
"seen",
"with",
"these",
"samples."
] | [
16,
16,
16,
6,
14,
14,
16,
6,
14,
14,
14,
16,
16,
7,
1,
16,
16,
16,
6,
14,
16,
16,
16,
7,
16,
7,
16,
16,
16,
6,
14,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"assessment",
"is",
"supported",
"by",
"both",
"previous",
"X-Force",
"research",
"and",
"open",
"source",
"reporting",
"on",
"ITG08,",
"although",
"X-Force",
"lacks",
"definitive",
"data",
"that",
"verifies",
"this",
"was",
"the",
"initial",
"access",
"vector."
] | [
16,
16,
16,
16,
16,
16,
16,
12,
4,
16,
4,
12,
12,
16,
6,
16,
4,
16,
16,
16,
16,
16,
16,
16,
16,
16,
6,
14
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.Winlogonxe.Trojan",
"Trojan-PSW.Win32.Papras!O",
"Trojan.Fsysna",
"Win32.Trojan.WisdomEyes.16070401.9500.9984",
"Trojan.Win32.Fsysna.dikb",
"Trojan.Win32.Papras.bsmtj",
"Trojan.Win32.A.PSW-Papras.39982",
"Troj.PSW32.W.QQPass.l2mO",
"Trojan.DownLoader.origin",
"Trojan.OnLineGames.Win32.77881",
"BehavesLike.Win32.SpywareLyndra.nh",
"Backdoor.Win32.DarkMoon",
"Trojan/PSW.Papras.ut",
"Trojan[PSW]/Win32.Papras",
"Win32.PSWTroj.Papras.kcloud",
"Trojan.Win32.Fsysna.dikb",
"Backdoor:Win32/Votwup.B",
"Trojan/Win32.Papras.R7955",
"Win32.Trojan.Fsysna.Edxa",
"Win32/Trojan.b7e"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Kazy.D26B7F",
"Win32.Trojan.WisdomEyes.16070401.9500.9941",
"W32/Trojan.ITVV-3454",
"Trojan.MulDrop4.59905",
"BehavesLike.Win32.Trojan.fh",
"Trojan:Win32/Yangxiay.A",
"Win32/Trojan.6f6"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1
] |
[
"GET_TASKS",
"-",
"Allows",
"the",
"application",
"to",
"get",
"information",
"about",
"current",
"or",
"recently",
"run",
"tasks",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Skeeyah.5634",
"Trojan.Zusy.D38734",
"TROJ_FASTREK.SM",
"Win32.Trojan.WisdomEyes.16070401.9500.9982",
"TROJ_FASTREK.SM",
"Trojan.Win32.Dwn.dqtjmk",
"Trojan.DownLoader12.58274",
"W32/Trojan.UUJD-8445",
"Worm:Win32/Pemtaka.A",
"Win32/Trojan.562"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Recall",
"that",
"the",
"malware",
"hooked",
"the",
"RansomActivity",
"intent",
"with",
"the",
"notification",
"that",
"was",
"created",
"as",
"a",
"β",
"call",
"β",
"type",
"notification",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"EventBot",
"Listening",
"to",
"TYPE_VIEW_TEXT_CHANGED",
"accessibility",
"event",
"Listening",
"to",
"TYPE_VIEW_TEXT_CHANGED",
"accessibility",
"event",
"."
] | [
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.Clod9fb.Trojan.3b9b",
"Joke.MoveDesktop",
"W32/MoveDesktop.A",
"TROJ_SPNR.04CJ11",
"Joke.Slidescreen.4",
"JOKE/MoveDesktop.A",
"TROJ_SPNR.04CJ11",
"Win32.Troj.Hoax.kcloud",
"Joke:Win32/Crazyscr.A",
"Joke.Win32.Metro",
"Trj/CI.A",
"Win32/Joke.SlideScreen",
"Joke.Win32.ShakeScreen.b",
"Virus.Win32.BHO",
"Joke.BR",
"Trojan.Win32.BadJoke.Ar"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"On",
"October",
"26,",
"2015,",
"Cyphort",
"Labs",
"discovered",
"that",
"psychcentral[.]com",
"has",
"been",
"compromised",
"and",
"is",
"currently",
"infecting",
"visitors",
"via",
"drive-by-download",
"malwares."
] | [
16,
0,
8,
8,
4,
12,
16,
16,
1,
16,
16,
1,
16,
16,
16,
16,
16,
16,
3,
11
] |
[
"READ_SMS",
"-",
"allow",
"the",
"application",
"to",
"read",
"text",
"messages",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"In",
"earlier",
"versions",
",",
"it",
"operated",
"with",
"shell",
"commands",
"like",
"this",
":",
"Stealing",
"WhatsApp",
"encryption",
"key",
"with",
"Busybox",
"Social",
"payload",
"Actually",
",",
"this",
"is",
"not",
"a",
"standalone",
"payload",
"file",
"β",
"in",
"all",
"the",
"observed",
"versions",
"its",
"code",
"was",
"compiled",
"with",
"exploit",
"payload",
"in",
"one",
"file",
"(",
"β",
"poc_perm",
"β",
",",
"β",
"arrs_put_user",
"β",
",",
"β",
"arrs_put_user.o",
"β",
")",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Although",
"the",
"applications",
"were",
"never",
"available",
"in",
"Google",
"Play",
",",
"we",
"immediately",
"identified",
"the",
"scope",
"of",
"the",
"problem",
"by",
"using",
"Verify",
"Apps",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16
] |
[
"A",
"previously",
"unknown",
"group",
"called",
"Strider",
"has",
"been",
"conducting",
"cyberespionage-style",
"attacks",
"against",
"selected",
"targets",
"in",
"Russia,",
"China,",
"Sweden,",
"and",
"Belgium."
] | [
16,
16,
6,
14,
16,
6,
16,
16,
16,
1,
9,
16,
16,
16,
16,
2,
10,
10,
16,
2
] |
[
"The",
"bootkit",
"Android.Oldboot",
"has",
"infected",
"more",
"than",
"350,000",
"android",
"users",
"in",
"China",
",",
"Spain",
",",
"Italy",
",",
"Germany",
",",
"Russia",
",",
"Brazil",
",",
"the",
"USA",
"and",
"some",
"Southeast",
"Asian",
"countries",
"."
] | [
16,
16,
3,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Terracotta's",
"network",
"of",
"1500+",
"VPN",
"nodes",
"throughout",
"the",
"world",
"are",
"primarily",
"obtained",
"by",
"hacking",
"into",
"inadequately",
"protected",
"Windows",
"servers",
"in",
"legitimate",
"organizations,",
"without",
"the",
"victim's",
"knowledge",
"or",
"permission."
] | [
6,
14,
16,
8,
5,
13,
16,
16,
16,
16,
16,
16,
16,
4,
16,
16,
16,
5,
13,
16,
16,
16,
12,
16,
16,
16,
16,
16
] |
[
"Unwary",
"users",
"who",
"click",
"the",
"seemingly",
"innocuous",
"link",
"will",
"have",
"their",
"device",
"infected",
"with",
"RuMMS",
"malware",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16
] |
[
"In",
"this",
"second",
"version",
",",
"the",
"developer",
"β",
"s",
"name",
"listed",
"was",
"β",
"concipit1248",
"β",
"in",
"Google",
"Play",
",",
"and",
"may",
"have",
"been",
"active",
"between",
"May",
"2019",
"to",
"February",
"2020",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"There",
",",
"they",
"are",
"prompted",
"to",
"download",
"a",
"new",
"version",
"of",
"the",
"mobile",
"app",
",",
"under",
"which",
"guise",
"the",
"Trojan",
"is",
"hidden",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Multiple",
"owners",
"of",
"Github",
"repositories",
"received",
"phishing",
"emails."
] | [
16,
4,
16,
5,
13,
16,
1,
9
] |
[
"Naming",
"additional",
"payload",
"applications",
"as",
"system",
"updates",
"is",
"a",
"clever",
"technique",
"used",
"by",
"malware",
"authors",
"to",
"trick",
"victims",
"into",
"believing",
"a",
"threat",
"isn",
"β",
"t",
"present",
"on",
"their",
"device",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Also",
"of",
"note",
"is",
"Bouncing",
"Golf",
"β",
"s",
"possible",
"connection",
"to",
"a",
"previously",
"reported",
"mobile",
"cyberespionage",
"campaign",
"that",
"researchers",
"named",
"Domestic",
"Kitten",
"."
] | [
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
16
] |
[
"A",
"quick",
"search",
"produced",
"results",
"about",
"a",
"personal",
"page",
"and",
",",
"what",
"is",
"more",
"interesting",
",",
"a",
"GitHub",
"account",
"that",
"contains",
"a",
"forked",
"Conversation",
"repository",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"W32/Kryptik.UMVM-2214",
"TrojWare.MSIL.Kryptik.ACD",
"Trojan.KillProc.49202",
"BehavesLike.Win32.Trojan.fh",
"W32/Kryptik.PD",
"Trojan.Zusy.D33DFF",
"Trojan/Win32.Dynamer.C2272217",
"Trojan.ScreenLocker",
"Trj/GdSda.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"]",
"26/html2/new-inj-135-3-white.html",
"hxxp",
":",
"//facebook-photos-au",
"[",
"."
] | [
9,
9,
1,
9,
9,
9,
9
] |
[
"A",
"few",
"days",
"ago",
"I",
"got",
"a",
"message",
"on",
"Facebook",
"from",
"a",
"person",
"I",
"very",
"rarely",
"speak",
"to,",
"and",
"I",
"knew",
"that",
"something",
"fishy",
"was",
"going",
"on."
] | [
16,
0,
8,
8,
16,
16,
16,
16,
16,
4,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"We",
"found",
"two",
"vulnerabilities",
"that",
"were",
"now",
"being",
"targeted",
"by",
"exploit",
"kits,",
"with",
"one",
"being",
"the",
"recent",
"Pawn",
"Storm",
"Flash",
"zero-day."
] | [
16,
16,
7,
15,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
6,
14,
7,
15
] |
[
"Even",
"without",
"capabilities",
"to",
"exploit",
"a",
"device",
",",
"the",
"packages",
"were",
"able",
"to",
"exfiltrate",
"the",
"following",
"types",
"of",
"data",
"using",
"documented",
"APIs",
":",
"Contacts",
"Audio",
"recordings",
"Photos",
"Videos",
"GPS",
"location",
"Device",
"information",
"In",
"addition",
",",
"the",
"packages",
"offered",
"a",
"feature",
"to",
"perform",
"remote",
"audio",
"recording",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"While",
"we",
"do",
"not",
"have",
"complete",
"targeting",
",",
"information",
"associated",
"with",
"these",
"Poison",
"Ivy",
"samples",
",",
"several",
"of",
"the",
"decoy",
"files",
"were",
"in",
"Chinese",
"and",
"appear",
"to",
"be",
"part",
"of",
"a",
"2016",
"campaign",
"targeting",
"organizations",
"in",
"Taiwan",
"with",
"political-themed",
"lures",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"malware",
"was",
"distributed",
"from",
"infected",
"devices",
"via",
"SMS",
"in",
"the",
"form",
"β",
"%",
"USERNAME",
"%",
",",
"I",
"β",
"ll",
"buy",
"under",
"a",
"secure",
"transaction",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Continuing",
"with",
"the",
"never",
"ending",
"series",
"of",
"malware",
"email",
"attachments",
"is",
"an",
"email",
"with",
"the",
"subject",
"of",
"payment",
"slip",
"coming",
"or",
"pretending",
"to",
"come",
"from",
"random",
"companies,",
"names",
"and",
"email",
"addresses",
"with",
"an",
"ACE",
"attachment",
"ACE",
"files",
"are",
"a",
"sort",
"of",
"zip",
"file",
"that",
"normally",
"needs",
"special",
"software",
"to",
"extract."
] | [
16,
16,
16,
16,
16,
16,
16,
3,
1,
9,
16,
16,
1,
16,
16,
1,
16,
1,
9,
9,
16,
16,
16,
16,
16,
1,
9,
9,
9,
9,
9,
16,
16,
1,
9,
1,
9,
16,
16,
16,
16,
1,
9,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W97m.Downloader.GBT",
"W97M.Downloader.BHA",
"W97M.Downloader",
"W2KM_POWLOAD.AUSJQU",
"W97m.Downloader.GBT",
"W97m.Downloader.GBT",
"Trojan.Ole2.Vbs-heuristic.druvzi",
"W97m.Downloader.GBT",
"W97m.Downloader.GBT",
"W2KM_POWLOAD.AUSJQU",
"HEUR.VBA.Trojan.e",
"virus.office.qexvmc.1095"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.HfsAutoB.E388",
"Trojan.Zusy.D3675",
"Backdoor.Trojan",
"Win32/Talwadig.A",
"Spammer:Win32/Talwadig.A",
"W32/Talwadig.SPM!tr",
"Win32/Trojan.49c"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/Spy.Burda.vq",
"W32/Trojan2.LHHI",
"Trojan-Spy.Win32.Burda.bun",
"TrojWare.Win32.Spy.Burda.A",
"Trojan.Packed.1027",
"TROJ_BURDA.SM",
"Win32/SinoMBR.A",
"W32/Trojan2.LHHI",
"Virus.Win32.SinoMBR!IK",
"Trojan:Win32/Riggin.B",
"Trojan-Spy.Win32.Burda.r",
"Virus.Win32.SinoMBR",
"Downloader.Small.61.BV"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"recent",
"vulnerability",
"of",
"MS15-093",
"revealed",
"that",
"attackers",
"were",
"using",
"it",
"distribute",
"the",
"Korplug/Plugx",
"RAT."
] | [
16,
16,
7,
16,
7,
16,
16,
1,
16,
16,
16,
16,
16,
1,
3
] |
[
"All",
"data",
"is",
"transmitted",
"in",
"JSON",
"format",
"(",
"after",
"decryption",
")",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"If",
"these",
"files",
"successfully",
"gain",
"root",
"rights",
",",
"the",
"Trojan",
"will",
"install",
"several",
"tools",
"into",
"the",
"system",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.