tokens
sequencelengths
2
296
ner_tags
sequencelengths
2
296
[ "A", "backdoor", "also", "known", "as:", "Backdoor.Nioupale", "Trojan/Daserf.b", "Trojan.Heur.PT.E6A39B", "BKDR_DASERF.ZCEG-A", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "BKDR_DASERF.ZCEG-A", "Trojan.Win32.Scar.hnib", "Trojan.Win32.Invader.ervtpc", "Troj.Dropper.W32.Small.kZ2V", "Trojan.Inject1.18880", "BehavesLike.Win32.Backdoor.kh", "W32/Trojan.MWNM-9354", "Trojan/Win32.Scar", "Backdoor:Win32/Nioupale.A", "Trojan.Win32.Scar.hnib", "Trojan/Win32.Scar.R68534", "Trojan.Scar", "Win32.Trojan.Scar.Llhd", "W32/Scar.HNIB!tr", "Win32/Trojan.97a" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "MemScan:Backdoor.Hupigon.APH", "Win32.Backdoor.Hupigon.axbr.10", "Backdoor.Graybird", "BKDR_HUPIGON.ASJ", "Backdoor.Win32.Hupigon.aha", "MemScan:Backdoor.Hupigon.APH", "MemScan:Backdoor.Hupigon.APH", "BackDoor.Pigeon.194", "BKDR_HUPIGON.ASJ", "Backdoor.Win32.Hupigon!IK", "MemScan:Backdoor.Hupigon.APH", "Backdoor.Win32.Hupigon.cmpw", "Backdoor.Win32.Gpigeon2008.acj", "Backdoor.Win32.Hupigon", "BackDoor.Hupigon5.ARLC" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "WS.Reputation.1", "Trojan.Strictor.D148BF" ]
[ 16, 3, 16, 16, 16, 1, 1 ]
[ "It", "steals", "SMS", "messages", "and", "information", "about", "voice", "calls", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "It", "says", "those", "were", "sent", "in", "the", "report", "to", "the", "FBI." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "experts", "of", "G", "DATA's", "SecurityLabs", "analyzed", "a", "specially", "crafted", "Microsoft", "Word", "document", "the", "attackers", "used", "to", "install", "a", "rather", "famous", "banking", "Trojan", "called", "Dridex." ]
[ 16, 16, 16, 4, 12, 12, 16, 16, 16, 16, 5, 13, 13, 16, 6, 16, 16, 16, 16, 16, 16, 3, 11, 16, 3 ]
[ "Decompiled", "exploit", "function", "code", "fragment", "run_with_mmap", "function", "from", "the", "android-rooting-tools", "project", "As", "can", "be", "seen", "from", "the", "comparison", ",", "there", "are", "similar", "strings", "and", "also", "a", "unique", "comment", "in", "Italian", ",", "so", "it", "looks", "like", "the", "attackers", "created", "this", "exploit", "payload", "based", "on", "android-rooting-tools", "project", "source", "code", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16 ]
[ "Attackers,", "regardless", "of", "their", "skills", "and", "motives,", "often", "attempt", "to", "wrap", "malicious", "code", "in", "a", "way", "that", "will", "seem", "innocuous", "to", "practitioners", "and", "security", "products." ]
[ 6, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16, 5, 13 ]
[ "The", "vulnerability", "bypassed", "most", "mitigations", "prior", "to", "patch", "availability;", "however,", "FireEye", "email", "and", "network", "products", "detected", "the", "malicious", "documents." ]
[ 16, 7, 15, 16, 16, 16, 16, 16, 16, 16, 4, 1, 16, 5, 13, 16, 1, 9, 9 ]
[ "This", "incident", "happened", "on", "an", "Android", "6.0.1", "device,", "owned", "by", "one", "of", "the", "company's", "Vice", "Presidents." ]
[ 16, 16, 16, 16, 16, 5, 13, 13, 16, 16, 16, 16, 4, 12, 12, 12 ]
[ "Morphisec", "researchers", "began", "investigating", "the", "attacks", "on", "April", "24", "and", "continue", "to", "uncover", "more", "details." ]
[ 4, 12, 16, 16, 16, 3, 16, 0, 8, 16, 16, 16, 16, 16, 16 ]
[ "This", "means", "the", "attacker", "can", "craft", "a", "phishing", "website", "without", "the", "user", "knowing", "it", "is", "visiting", "a", "phishing", "site." ]
[ 16, 16, 16, 6, 16, 16, 1, 9, 9, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9 ]
[ "A", "backdoor", "also", "known", "as:", "PSWTool.Win32.Ophcrack!O", "Tool.Ophcrack.Win32.15", "W32/MalwareF.MTNL", "not-a-virus:PSWTool.Win32.Ophcrack.a", "Application.PassView.BE", "Tool.PassSteel.1076", "BehavesLike.Win32.Dropper.rc", "W32/Risk.YHKN-9333", "RiskWare[PSWTool]/Win32.PWDump.at", "Application.PassView.BE", "not-a-virus:PSWTool.Win32.Ophcrack.a", "Application.PassView.BE", "Trojan.PSWTool!8KQf3yAIaxc", "not-a-virus.PSWTool.ophCrack" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "]", "204", "[", "." ]
[ 9, 9, 9, 9 ]
[ "A", "university", "class", "student", "list", "including", "the", "C", "&", "C", "domain", "registrant", "Due", "to", "poor", "privacy", "practices", "on", "the", "part", "of", "our", "culprit", "’", "s", "university", ",", "we", "now", "know", "his", "date", "of", "birth", "(", "probably", ":", "he", "seemingly", "used", "his", "birth", "year", "as", "part", "of", "his", "Gmail", "address", ",", "as", "further", "partial", "confirmation", ")", ",", "we", "know", "that", "he", "was", "a", "student", "and", "what", "university", "he", "attended", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "ransom", "note", "contains", "the", "following", "text:" ]
[ 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Heur.Corrupt.PE", "Worm:Win32/[email protected]#2", "Worm.Win32.Fanta" ]
[ 16, 3, 16, 16, 16, 1, 1, 1 ]
[ "Dridex", "is", "a", "banking", "trojan,", "which", "is", "a", "bot", "that", "communicates", "with", "a", "C&C", "server", "through", "HTTP." ]
[ 3, 16, 16, 3, 11, 16, 16, 16, 3, 16, 16, 16, 16, 1, 9, 9, 9 ]
[ "When", "popular", "applications", "come", "under", "fire", "and", "are", "featured", "prominently", "in", "the", "news", ",", "hackers", "get", "excited", "as", "these", "newsworthy", "apps", "can", "become", "their", "latest", "target", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "URL", "Status", "IP", "Domain", "registration", "date", "http", ":", "//ora.studiolegalebasili", "[", "." ]
[ 16, 16, 16, 16, 16, 16, 1, 9, 9, 9, 9 ]
[ "A", "backdoor", "also", "known", "as:", "W32.Virut.G", "W32/Trojan2.MPL", "W32.Virut.CF", "W32/Virut.GE", "Virus.Win32.Virut.ce", "Win32.Virut.AM", "Trojan.Opclose", "TR/VB.EWS", "Worm.Win32.SillyFDC!IK", "Worm/Kolab.jfi", "Virus:Win32/Virut.BN", "Win32/Virut.F", "W32/Trojan2.MPL", "Virus.Virut.13", "Win32.Virut.dz", "Worm.Win32.SillyFDC", "W32/Sality.AO" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "After", "further", "investigation,", "we", "realized", "that", "its", "infrastructure", "for", "exfiltrating", "credentials", "was", "still", "operational", "and", "that", "Ebury", "was", "still", "being", "actively", "used", "by", "the", "Windigo", "gang." ]
[ 16, 16, 16, 16, 16, 16, 16, 5, 16, 1, 9, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 6, 14, 14 ]
[ "The", "attackers", "compromised", "two", "legitimate", "Thai", "websites", "to", "host", "the", "malware,", "which", "is", "a", "tactic", "this", "group", "has", "used", "in", "the", "past." ]
[ 16, 6, 1, 16, 1, 9, 9, 16, 1, 16, 3, 16, 16, 16, 16, 16, 6, 16, 16, 16, 16, 0 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.SMSHoax", "Dropper.Dapato.Win32.20900", "Win32.Trojan.WisdomEyes.16070401.9500.9953", "TROJ_GE.CFDA1E9F", "Win.Trojan.Inject-14546", "Trojan.Win32.InstallMonster.cxzobk", "Win.Troj.mzIo", "TrojWare.Win32.Injector.BCBA", "Trojan.InstallMonster.120", "TROJ_GE.CFDA1E9F", "BehavesLike.Win32.Backdoor.rc", "Hoax.Win32.ArchSMS", "Trojan/Inject.awic", "TR/Rogue.11221316.14", "Win32.Troj.Undef.kcloud", "Trojan.Injector!UXjGJT5Czj8", "W32/Injector.BCBB!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "TrojanDownloader.Small.AIA4", "Trojan.Buzy.518", "TROJ_DLOADR.SMUS", "Win32/Small.QR", "TROJ_DLOADR.SMUS", "Trojan.DownLoader6.35083", "BehavesLike.Win32.RansomWannaCry.mz", "Trojan.Win32.Malex", "TrojanDownloader:Win32/Onitab.B", "Trojan/Win32.Downloader.R33065", "Trj/CI.A", "Win32/TrojanDownloader.Small.PAL" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/W32.Scar.499712.C", "Trojan-Ransom.Win32.Blocker!O", "TrojanDropper.Dwonk.A", "Trojan/Chydo.cdh", "TROJ_RENOS.SM", "Win32.Worm.AutoRun.bj", "W32/Trojan2.JXKJ", "Win32/SillyAutorun.CCQ", "TROJ_RENOS.SM", "Trojan-Ransom.Win32.Blocker.ckeq", "Trojan.Win32.Drop.ihult", "Trojan.Win32.Chydo.1032192", "TrojWare.Win32.Scar.AB", "Trojan.MulDrop.46689", "Backdoor.Klon.Win32.955", "BehavesLike.Win32.Backdoor.gc", "Trojan.Win32.Chydo", "W32/Trojan.GFJX-4360", "Trojan/Scar.cym", "Trojan/Win32.Scar", "Trojan-Ransom.Win32.Blocker.ckeq", "TrojanDropper:Win32/Dwonk.A", "Trojan/Win32.Chydo.R3468", "Trojan.Chudik.28205", "Trojan-ransom.Win32.Blocker.ckeq", "Trojan.Chydo!nNe8FVSDJ+I", "Win32/Trojan.16c" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "We", "also", "uncovered", "ViperRAT", "in", "a", "billiards", "game", ",", "an", "Israeli", "Love", "Songs", "player", ",", "and", "a", "Move", "To", "iOS", "app", "." ]
[ 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16 ]
[ "The", "second", "phase", "is", "when", "an", "attachment", "from", "the", "malspam", "retrieves", "ransomware", "from", "a", "web", "server." ]
[ 16, 16, 16, 16, 16, 1, 9, 16, 16, 1, 16, 3, 16, 5, 13, 13 ]
[ "These", "malicious", "installers", "were", "then", "uploaded", "to", "Baidu's", "cloud", "file", "sharing", "service", "for", "used", "by", "Chinese", "iOS/OS", "X", "developers." ]
[ 16, 3, 11, 16, 16, 16, 16, 5, 13, 13, 13, 13, 11, 16, 16, 4, 12, 12, 12 ]
[ "As", "a", "reminder", ",", "it", "is", "always", "a", "good", "practice", "to", "download", "apps", "only", "from", "trusted", "app", "stores", "such", "as", "Google", "Play", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 16 ]
[ "(", "It", "is", "specified", "in", "the", "interception", "template", "whether", "a", "reply", "must", "be", "sent", ",", "and", "which", "text", "should", "be", "sent", "to", "which", "address", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "Trojan", "waits", "for", "incoming", "SMS", "messages", "(", "the", "β€œ", "alarmReceiver.class", "”", ")", "and", "checks", "whether", "these", "messages", "contain", "one", "of", "the", "following", "commands", ":", "β€œ", "sms", "”", ",", "β€œ", "contact", "”", ",", "β€œ", "location", "”", ",", "β€œ", "other", "”", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "This", "addition", "is", "seen", "in", "Figure", "5", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "technical", "details", "of", "the", "attack", "have", "yet", "to", "be", "made", "public,", "however", "we've", "recently", "identified", "tools", "uploaded", "to", "online", "malware", "repositories", "that", "we", "believe", "are", "linked", "to", "the", "heist." ]
[ 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 3, 11, 11, 16, 16, 16, 16, 16, 16, 6, 14 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor/W32.Visel.41946", "Backdoor.Visel.Win32.404", "Backdoor.W32.Visel.asz!c", "Backdoor/Visel.asd", "Win32.Trojan.WisdomEyes.16070401.9500.9969", "Backdoor.Trojan", "Trojan-GameThief.Win32.Magania.tqse", "Trojan.Win32.Visel.bqjxis", "BackDoor.Darkshell.270", "BehavesLike.Win32.Downloader.ph", "Backdoor.Win32.Visel", "Backdoor/Visel.sw", "TR/Drop.Strigy.A.2", "Trojan[Backdoor]/Win32.Visel", "TrojanDropper:Win32/Strigy.A", "Backdoor.Win32.A.Visel.39424", "Trojan-GameThief.Win32.Magania.tqse", "Backdoor/Win32.CSon.R885", "Win32.Trojan-gamethief.Magania.Pfju", "Trojan.DR.Strigy!SJEu21JfMbU", "W32/Visel.ASZ!tr.bdr", "Trj/ByShell.C", "Win32/Trojan.b7f" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Given", "the", "lack", "of", "indicators", "of", "compromise", ",", "we", "decided", "to", "check", "to", "see", "if", "this", "was", "the", "same", "malware", "we", "had", "been", "researching", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "In", "2016,", "from", "September", "through", "November,", "an", "APT", "campaign", "known", "as", "menuPass", "targeted", "Japanese", "academics", "working", "in", "several", "areas", "of", "science,", "along", "with", "Japanese", "pharmaceutical", "and", "a", "US-based", "subsidiary", "of", "a", "Japanese", "manufacturing", "organizations." ]
[ 16, 0, 16, 0, 16, 0, 6, 14, 14, 16, 16, 6, 16, 4, 12, 16, 16, 16, 16, 16, 16, 16, 16, 4, 12, 16, 16, 4, 12, 12, 12, 12, 12, 12 ]
[ "Attacks", "originating", "from", "this", "threat", "group", "have", "not", "ceased", "since", "our", "previous", "report", "from", "April", "of", "2017", "and", "have", "continued", "through", "July", "of", "2017." ]
[ 1, 16, 16, 16, 4, 12, 16, 16, 16, 16, 16, 16, 16, 16, 0, 8, 8, 16, 16, 16, 16, 0, 8, 8 ]
[ "It", "searches", "the", "Android", "and", "Google", "Chrome", "browsers", "for", "stored", "sensitive", "information." ]
[ 16, 16, 16, 5, 16, 5, 13, 13, 16, 1, 9, 9 ]
[ "At", "that", "time", ",", "Ginp", "was", "a", "simple", "SMS", "stealer", "whose", "purpose", "was", "only", "to", "send", "a", "copy", "of", "incoming", "and", "outgoing", "SMS", "messages", "to", "the", "C2", "server", "." ]
[ 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "malicious", "capabilities", "observed", "in", "the", "second", "stage", "include", "the", "following", ":", "Upload", "attacker-specified", "files", "to", "C2", "servers", "Get", "list", "of", "installed", "applications", "Get", "device", "metadata", "Inspect", "itself", "to", "get", "a", "list", "of", "launchable", "activities", "Retrieves", "PDF", ",", "txt", ",", "doc", ",", "xls", ",", "xlsx", ",", "ppt", ",", "pptx", "files", "found", "on", "external", "storage", "Send", "SMS", "Retrieve", "text", "messages", "Track", "device", "location", "Handle", "limited", "attacker", "commands", "via", "out", "of", "band", "text", "messages", "Record", "surrounding", "audio", "Record", "calls", "Record", "video", "Retrieve", "account", "information", "such", "as", "email", "addresses", "Retrieve", "contacts", "Removes", "copies", "of", "itself", "if", "any", "additional", "APKs", "are", "downloaded", "to", "external", "storage", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "However", ",", "it", "has", "begun", "to", "target", "users", "all", "around", "the", "world", ",", "especially", "users", "in", "countries", "like", "China", ",", "Taiwan", ",", "France", ",", "Switzerland", ",", "Germany", ",", "United", "Kingdom", ",", "United", "States", ",", "and", "others", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "]", "net", "linkdatax", "[", "." ]
[ 9, 9, 1, 9, 9 ]
[ "It", "steals", "logins", "and", "passwords", "to", "online", "banking", "accounts", "by", "substituting", "he", "window", "displayed", "by", "the", "bank", "application", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "]", "205", "[", "." ]
[ 9, 9, 9, 9 ]
[ "]", "coupload202", "[", "." ]
[ 9, 9, 1, 9 ]
[ "This", "brought", "to", "us", "the", "hypothesis", "that", "this", "might", "be", "a", "version", "used", "by", "the", "group", "behind", "ViceLeaker", "for", "internal", "communication", "or", "for", "other", ",", "unclear", "purposes", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Royal", "Mail", "-", "British", "postal", "service", "and", "courier", "company", "." ]
[ 4, 12, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "functionality", "of", "Pro", "PoS", "seems", "fairly", "extensive", "according", "to", "recent", "press", "releases." ]
[ 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "]", "com/", "hxxp", ":", "//www", "[", "." ]
[ 9, 9, 1, 9, 9, 9, 9 ]
[ "The", "summer", "months", "dawn", "on", "us", "and", "the", "financial", "year", "comes", "to", "a", "close." ]
[ 16, 0, 8, 16, 16, 16, 16, 16, 0, 8, 16, 16, 16, 16 ]
[ "Today,", "we", "are", "releasing", "the", "full", "whitepaper", "on", "the", "Potao", "malware", "with", "additional", "findings,", "the", "cyberespionage", "campaigns", "where", "it", "was", "employed,", "and", "its", "connection", "to", "a", "backdoor", "in", "the", "form", "of", "a", "modified", "version", "of", "the", "TrueCrypt", "encryption", "software." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 16, 16, 6, 14, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 11, 11 ]
[ "Dropped", "by", "the", "Nuclear", "exploit", "kit,", "further", "investigation", "showed", "that", "the", "malware", "was", "a", "new", "Trojan", "called", "Thanatos", "by", "its", "developers", "and", "that", "we", "refer", "to", "internally", "as", "Alphabot" ]
[ 16, 16, 16, 3, 11, 11, 16, 16, 16, 16, 16, 3, 16, 16, 16, 3, 16, 3, 16, 16, 6, 16, 15, 16, 16, 16, 16, 16, 6 ]
[ "The", "second", "stealing", "function", "is", "the", "onStartCommand", ",", "which", "steals", "infected", "device", "data", "and", "additional", "information", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "newly", "patched", "zero-day", "vulnerability", "in", "Internet", "Explorer", "has", "already", "been", "exploited", "in", "attacks", "involving", "a", "compromised", "website", "belonging", "to", "an", "evangelical", "church", "in", "Hong", "Kong." ]
[ 16, 16, 16, 7, 15, 16, 5, 13, 16, 16, 16, 1, 16, 1, 16, 16, 1, 9, 16, 16, 16, 4, 12, 16, 2, 10 ]
[ "A", "backdoor", "also", "known", "as:", "W32.Clod748.Trojan.b154", "Trojan.DR.Cutwail!zuYZ2Zvwu1k", "Trojan.Zlob", "PE:Trojan.Win32.DNSChanger.drb!1075148351", "TrojWare.Win32.Trojan.DNSChanger.~CRSD", "Trojan.Packed.194", "Win32.Troj.DNSChangerT.dx.14848", "Trojan:Win32/Zlob.AS", "Trojan/Win32.Monder", "Virus.Win32.Heur.c", "Trojan.Inject", "Downloader.Tiny.D" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Webinjects", ":", "According", "to", "the", "bot", "’", "s", "configuration", ",", "if", "a", "webinject", "is", "set", "for", "a", "given", "application", ",", "it", "will", "be", "executed", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Indeed,", "the", "past", "few", "months", "seem", "to", "be", "quite", "busy", "for", "the", "Andromeda", "botnet", "and", "its", "recent", "activity", "indicates", "intent", "in", "the", "United", "States." ]
[ 16, 16, 0, 8, 8, 16, 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 2, 10, 10 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Symmi.D13DDA", "Win.Trojan.Delf-6394424-2", "Trojan-Downloader.Win32.Delf.krvg", "Trojan.Win32.Delf.evdbqw", "BehavesLike.Win32.BadFile.th", "Trojan-Downloader.Win32.Delf", "TR/Downloader.sfpmb", "Trojan-Downloader.Win32.Delf.krvg", "Trojan/Win32.Tiggre.C2290717", "Trj/GdSda.A", "W32/Delf.CGH!tr.dldr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "These", "artifacts", "indicate", "that", "FakeSpy", "'s", "campaign", "is", "still", "live", "and", "under", "development", "." ]
[ 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.MSIL.BindEx.A3", "Trojan.MSIL.BindEx.a", "Win32.Risk.Malware.Szbo", "Trojan.InstallCube.49", "Trojan.Zusy.D3BCBB", "Trojan.MSIL.BindEx.a", "Trojan:MSIL/Torwofun.A", "Trj/CI.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/Qhost.pml", "Win32/Jeefo.A", "Virus.Win32.Hidrag.a", "Win32.Jeefo.B", "Virus.Win32.Hidrag.clfcen", "Win32.Jeefo.B", "Win32.HLLP.Jeefo.36352", "Trojan:Win32/Vb.At", "W32/Hidrag.E", "Virus/Win32.Hidrag.a", "Win32.Jeefo.B", "Virus.Win32.Hidrag.a", "Win32.Jeefo.B" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "This", "feature", "is", "designed", "to", "block", "one", "application", "from", "accessing", "the", "data", "of", "other", "applications", "without", "rooting", "the", "device", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "identification", "of", "cyber", "crime", "actors,", "particularly", "Nigerian", "419", "scam", "operators,", "attempting", "to", "exploit", "CVE-2014-4114", "demonstrates", "how", "quickly", "cyber", "criminals", "are", "trying", "to", "exploit", "a", "vulnerability", "previously", "associated", "with", "espionage", "actors,", "using", "similar", "tactics,", "techniques,", "and", "procedures", "TTP", "to", "maximize", "their", "chances", "of", "success,", "with", "additional", "innovation", "as", "seen", "with", "these", "samples." ]
[ 16, 16, 16, 6, 14, 14, 16, 6, 14, 14, 14, 16, 16, 7, 1, 16, 16, 16, 6, 14, 16, 16, 16, 7, 16, 7, 16, 16, 16, 6, 14, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "This", "assessment", "is", "supported", "by", "both", "previous", "X-Force", "research", "and", "open", "source", "reporting", "on", "ITG08,", "although", "X-Force", "lacks", "definitive", "data", "that", "verifies", "this", "was", "the", "initial", "access", "vector." ]
[ 16, 16, 16, 16, 16, 16, 16, 12, 4, 16, 4, 12, 12, 16, 6, 16, 4, 16, 16, 16, 16, 16, 16, 16, 16, 16, 6, 14 ]
[ "A", "backdoor", "also", "known", "as:", "W32.Winlogonxe.Trojan", "Trojan-PSW.Win32.Papras!O", "Trojan.Fsysna", "Win32.Trojan.WisdomEyes.16070401.9500.9984", "Trojan.Win32.Fsysna.dikb", "Trojan.Win32.Papras.bsmtj", "Trojan.Win32.A.PSW-Papras.39982", "Troj.PSW32.W.QQPass.l2mO", "Trojan.DownLoader.origin", "Trojan.OnLineGames.Win32.77881", "BehavesLike.Win32.SpywareLyndra.nh", "Backdoor.Win32.DarkMoon", "Trojan/PSW.Papras.ut", "Trojan[PSW]/Win32.Papras", "Win32.PSWTroj.Papras.kcloud", "Trojan.Win32.Fsysna.dikb", "Backdoor:Win32/Votwup.B", "Trojan/Win32.Papras.R7955", "Win32.Trojan.Fsysna.Edxa", "Win32/Trojan.b7e" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Kazy.D26B7F", "Win32.Trojan.WisdomEyes.16070401.9500.9941", "W32/Trojan.ITVV-3454", "Trojan.MulDrop4.59905", "BehavesLike.Win32.Trojan.fh", "Trojan:Win32/Yangxiay.A", "Win32/Trojan.6f6" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1 ]
[ "GET_TASKS", "-", "Allows", "the", "application", "to", "get", "information", "about", "current", "or", "recently", "run", "tasks", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Skeeyah.5634", "Trojan.Zusy.D38734", "TROJ_FASTREK.SM", "Win32.Trojan.WisdomEyes.16070401.9500.9982", "TROJ_FASTREK.SM", "Trojan.Win32.Dwn.dqtjmk", "Trojan.DownLoader12.58274", "W32/Trojan.UUJD-8445", "Worm:Win32/Pemtaka.A", "Win32/Trojan.562" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Recall", "that", "the", "malware", "hooked", "the", "RansomActivity", "intent", "with", "the", "notification", "that", "was", "created", "as", "a", "β€œ", "call", "”", "type", "notification", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "EventBot", "Listening", "to", "TYPE_VIEW_TEXT_CHANGED", "accessibility", "event", "Listening", "to", "TYPE_VIEW_TEXT_CHANGED", "accessibility", "event", "." ]
[ 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.Clod9fb.Trojan.3b9b", "Joke.MoveDesktop", "W32/MoveDesktop.A", "TROJ_SPNR.04CJ11", "Joke.Slidescreen.4", "JOKE/MoveDesktop.A", "TROJ_SPNR.04CJ11", "Win32.Troj.Hoax.kcloud", "Joke:Win32/Crazyscr.A", "Joke.Win32.Metro", "Trj/CI.A", "Win32/Joke.SlideScreen", "Joke.Win32.ShakeScreen.b", "Virus.Win32.BHO", "Joke.BR", "Trojan.Win32.BadJoke.Ar" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "On", "October", "26,", "2015,", "Cyphort", "Labs", "discovered", "that", "psychcentral[.]com", "has", "been", "compromised", "and", "is", "currently", "infecting", "visitors", "via", "drive-by-download", "malwares." ]
[ 16, 0, 8, 8, 4, 12, 16, 16, 1, 16, 16, 1, 16, 16, 16, 16, 16, 16, 3, 11 ]
[ "READ_SMS", "-", "allow", "the", "application", "to", "read", "text", "messages", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "In", "earlier", "versions", ",", "it", "operated", "with", "shell", "commands", "like", "this", ":", "Stealing", "WhatsApp", "encryption", "key", "with", "Busybox", "Social", "payload", "Actually", ",", "this", "is", "not", "a", "standalone", "payload", "file", "–", "in", "all", "the", "observed", "versions", "its", "code", "was", "compiled", "with", "exploit", "payload", "in", "one", "file", "(", "β€˜", "poc_perm", "’", ",", "β€˜", "arrs_put_user", "’", ",", "β€˜", "arrs_put_user.o", "’", ")", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Although", "the", "applications", "were", "never", "available", "in", "Google", "Play", ",", "we", "immediately", "identified", "the", "scope", "of", "the", "problem", "by", "using", "Verify", "Apps", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 5, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 16 ]
[ "A", "previously", "unknown", "group", "called", "Strider", "has", "been", "conducting", "cyberespionage-style", "attacks", "against", "selected", "targets", "in", "Russia,", "China,", "Sweden,", "and", "Belgium." ]
[ 16, 16, 6, 14, 16, 6, 16, 16, 16, 1, 9, 16, 16, 16, 16, 2, 10, 10, 16, 2 ]
[ "The", "bootkit", "Android.Oldboot", "has", "infected", "more", "than", "350,000", "android", "users", "in", "China", ",", "Spain", ",", "Italy", ",", "Germany", ",", "Russia", ",", "Brazil", ",", "the", "USA", "and", "some", "Southeast", "Asian", "countries", "." ]
[ 16, 16, 3, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Terracotta's", "network", "of", "1500+", "VPN", "nodes", "throughout", "the", "world", "are", "primarily", "obtained", "by", "hacking", "into", "inadequately", "protected", "Windows", "servers", "in", "legitimate", "organizations,", "without", "the", "victim's", "knowledge", "or", "permission." ]
[ 6, 14, 16, 8, 5, 13, 16, 16, 16, 16, 16, 16, 16, 4, 16, 16, 16, 5, 13, 16, 16, 16, 12, 16, 16, 16, 16, 16 ]
[ "Unwary", "users", "who", "click", "the", "seemingly", "innocuous", "link", "will", "have", "their", "device", "infected", "with", "RuMMS", "malware", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16 ]
[ "In", "this", "second", "version", ",", "the", "developer", "’", "s", "name", "listed", "was", "β€œ", "concipit1248", "”", "in", "Google", "Play", ",", "and", "may", "have", "been", "active", "between", "May", "2019", "to", "February", "2020", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "There", ",", "they", "are", "prompted", "to", "download", "a", "new", "version", "of", "the", "mobile", "app", ",", "under", "which", "guise", "the", "Trojan", "is", "hidden", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Multiple", "owners", "of", "Github", "repositories", "received", "phishing", "emails." ]
[ 16, 4, 16, 5, 13, 16, 1, 9 ]
[ "Naming", "additional", "payload", "applications", "as", "system", "updates", "is", "a", "clever", "technique", "used", "by", "malware", "authors", "to", "trick", "victims", "into", "believing", "a", "threat", "isn", "’", "t", "present", "on", "their", "device", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Also", "of", "note", "is", "Bouncing", "Golf", "’", "s", "possible", "connection", "to", "a", "previously", "reported", "mobile", "cyberespionage", "campaign", "that", "researchers", "named", "Domestic", "Kitten", "." ]
[ 16, 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 16 ]
[ "A", "quick", "search", "produced", "results", "about", "a", "personal", "page", "and", ",", "what", "is", "more", "interesting", ",", "a", "GitHub", "account", "that", "contains", "a", "forked", "Conversation", "repository", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "W32/Kryptik.UMVM-2214", "TrojWare.MSIL.Kryptik.ACD", "Trojan.KillProc.49202", "BehavesLike.Win32.Trojan.fh", "W32/Kryptik.PD", "Trojan.Zusy.D33DFF", "Trojan/Win32.Dynamer.C2272217", "Trojan.ScreenLocker", "Trj/GdSda.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "]", "26/html2/new-inj-135-3-white.html", "hxxp", ":", "//facebook-photos-au", "[", "." ]
[ 9, 9, 1, 9, 9, 9, 9 ]
[ "A", "few", "days", "ago", "I", "got", "a", "message", "on", "Facebook", "from", "a", "person", "I", "very", "rarely", "speak", "to,", "and", "I", "knew", "that", "something", "fishy", "was", "going", "on." ]
[ 16, 0, 8, 8, 16, 16, 16, 16, 16, 4, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "We", "found", "two", "vulnerabilities", "that", "were", "now", "being", "targeted", "by", "exploit", "kits,", "with", "one", "being", "the", "recent", "Pawn", "Storm", "Flash", "zero-day." ]
[ 16, 16, 7, 15, 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 6, 14, 7, 15 ]
[ "Even", "without", "capabilities", "to", "exploit", "a", "device", ",", "the", "packages", "were", "able", "to", "exfiltrate", "the", "following", "types", "of", "data", "using", "documented", "APIs", ":", "Contacts", "Audio", "recordings", "Photos", "Videos", "GPS", "location", "Device", "information", "In", "addition", ",", "the", "packages", "offered", "a", "feature", "to", "perform", "remote", "audio", "recording", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "While", "we", "do", "not", "have", "complete", "targeting", ",", "information", "associated", "with", "these", "Poison", "Ivy", "samples", ",", "several", "of", "the", "decoy", "files", "were", "in", "Chinese", "and", "appear", "to", "be", "part", "of", "a", "2016", "campaign", "targeting", "organizations", "in", "Taiwan", "with", "political-themed", "lures", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "malware", "was", "distributed", "from", "infected", "devices", "via", "SMS", "in", "the", "form", "β€œ", "%", "USERNAME", "%", ",", "I", "’", "ll", "buy", "under", "a", "secure", "transaction", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Continuing", "with", "the", "never", "ending", "series", "of", "malware", "email", "attachments", "is", "an", "email", "with", "the", "subject", "of", "payment", "slip", "coming", "or", "pretending", "to", "come", "from", "random", "companies,", "names", "and", "email", "addresses", "with", "an", "ACE", "attachment", "ACE", "files", "are", "a", "sort", "of", "zip", "file", "that", "normally", "needs", "special", "software", "to", "extract." ]
[ 16, 16, 16, 16, 16, 16, 16, 3, 1, 9, 16, 16, 1, 16, 16, 1, 16, 1, 9, 9, 16, 16, 16, 16, 16, 1, 9, 9, 9, 9, 9, 16, 16, 1, 9, 1, 9, 16, 16, 16, 16, 1, 9, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W97m.Downloader.GBT", "W97M.Downloader.BHA", "W97M.Downloader", "W2KM_POWLOAD.AUSJQU", "W97m.Downloader.GBT", "W97m.Downloader.GBT", "Trojan.Ole2.Vbs-heuristic.druvzi", "W97m.Downloader.GBT", "W97m.Downloader.GBT", "W2KM_POWLOAD.AUSJQU", "HEUR.VBA.Trojan.e", "virus.office.qexvmc.1095" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.HfsAutoB.E388", "Trojan.Zusy.D3675", "Backdoor.Trojan", "Win32/Talwadig.A", "Spammer:Win32/Talwadig.A", "W32/Talwadig.SPM!tr", "Win32/Trojan.49c" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/Spy.Burda.vq", "W32/Trojan2.LHHI", "Trojan-Spy.Win32.Burda.bun", "TrojWare.Win32.Spy.Burda.A", "Trojan.Packed.1027", "TROJ_BURDA.SM", "Win32/SinoMBR.A", "W32/Trojan2.LHHI", "Virus.Win32.SinoMBR!IK", "Trojan:Win32/Riggin.B", "Trojan-Spy.Win32.Burda.r", "Virus.Win32.SinoMBR", "Downloader.Small.61.BV" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "recent", "vulnerability", "of", "MS15-093", "revealed", "that", "attackers", "were", "using", "it", "distribute", "the", "Korplug/Plugx", "RAT." ]
[ 16, 16, 7, 16, 7, 16, 16, 1, 16, 16, 16, 16, 16, 1, 3 ]
[ "All", "data", "is", "transmitted", "in", "JSON", "format", "(", "after", "decryption", ")", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "If", "these", "files", "successfully", "gain", "root", "rights", ",", "the", "Trojan", "will", "install", "several", "tools", "into", "the", "system", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]