tokens
sequencelengths 2
296
| ner_tags
sequencelengths 2
296
|
---|---|
[
"The",
"first",
"copying",
"of",
"the",
"exploit",
"code",
"we",
"spotted",
"was",
"from",
"the",
"Sundown",
"exploit",
"kit",
"EK,",
"followed",
"closely",
"by",
"Magnitude",
"and",
"a",
"resurgent",
"KaiXin",
"EK."
] | [
16,
16,
16,
16,
16,
1,
9,
16,
16,
16,
16,
16,
3,
11,
11,
11,
16,
16,
16,
3,
16,
16,
3,
11,
11
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.Graybird",
"Win.Trojan.HackersDoor-6351576-1",
"Backdoor:Win64/Hackdoor.A!dll",
"Backdoor/Win32.Hackdoor.R28108",
"Trj/CI.A",
"Win32/Backdoor.14f"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1
] |
[
"This",
"delay",
"means",
"that",
"a",
"typical",
"testing",
"procedure",
",",
"which",
"takes",
"less",
"than",
"10",
"minutes",
",",
"will",
"not",
"detect",
"any",
"unwanted",
"behavior",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Note",
"that",
"the",
"affected",
"sites",
"have",
"consistent",
"followers",
"given",
"the",
"nature",
"of",
"their",
"content."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Aside",
"from",
"the",
"inescapable",
"irony",
"of",
"disguising",
"a",
"security-reducing",
"Trojan",
"as",
"an",
"ostensibly",
"security-enhancing",
"app",
",",
"and",
"the",
"righteous",
"affront",
"to",
"the",
"whole",
"concept",
"of",
"a",
"VPN",
"’",
"s",
"purpose",
"a",
"Trojan",
"so",
"disguised",
"inspires",
",",
"this",
"represents",
"an",
"escalation",
"in",
"the",
"variety",
"of",
"app",
"types",
"targeted",
"by",
"this",
"campaign",
"of",
"bankbots",
"in",
"disguise",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.NTPacker",
"Trojan.NTPacker",
"Trojan.NTPacker",
"Win32.Trojan.WisdomEyes.16070401.9500.9936",
"Bloodhound.NTPacker",
"Win.Trojan.Hydraq-9",
"Packed.Win32.PolyCrypt.b",
"Trojan.NTPacker",
"Trojan.NTPacker",
"TrojWare.Win32.TrojanDropper.ErPack",
"Trojan.NTPacker",
"BackDoor.Ser.4",
"Trojan/PSW.QQPass.fk",
"TrojanDropper:Win32/MultiDropper.B",
"Packed.Win32.PolyCrypt.b",
"Trojan.NTPacker",
"Trojan/Win32.Delf.R33596",
"TScope.Malware-Cryptor.SB",
"Win32.Packed.Polycrypt.Lndy",
"W32/PolyCrypt.B!tr",
"Win32/Trojan.267"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"This",
"suggests",
"that",
"the",
"operators",
"of",
"the",
"Command",
"&",
"Control",
"are",
"not",
"enforcing",
"a",
"validation",
"of",
"the",
"targets",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"IOCs",
"for",
"today",
"Jaff",
"ransomware",
"run"
] | [
1,
16,
16,
3,
11,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Mjaka.A4",
"TROJ_MJAKA.C",
"Win32.Trojan.WisdomEyes.16070401.9500.9762",
"TROJ_MJAKA.C",
"Trojan.Win32.FC.euumqd",
"W32/Trojan.EEMC-0397",
"Trojan:MSIL/Mjaka.A",
"Spyware.InfoStealer",
"Trj/Mjaka.A",
"Win32/Trojan.9a1"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Reverse",
"shell",
"payload",
"The",
"payload",
"is",
"started",
"by",
"the",
"main",
"module",
"with",
"a",
"specified",
"host",
"and",
"port",
"as",
"a",
"parameter",
"that",
"is",
"hardcoded",
"to",
"‘",
"54.67.109.199",
"’",
"and",
"‘",
"30010",
"’",
"in",
"some",
"versions",
":",
"Alternatively",
",",
"they",
"could",
"be",
"hardcoded",
"directly",
"into",
"the",
"payload",
"code",
":",
"We",
"also",
"observed",
"variants",
"that",
"were",
"equipped",
"with",
"similar",
"reverse",
"shell",
"payloads",
"directly",
"in",
"the",
"main",
"APK",
"/lib/",
"path",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"There",
"have",
"also",
"been",
"cases",
"of",
"users",
"in",
"Ukraine",
",",
"Germany",
",",
"Turkey",
"and",
"several",
"other",
"countries",
"being",
"affected",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"(",
"Researchers",
"have",
"been",
"aware",
"of",
"this",
"suite",
"as",
"early",
"as",
"2014",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"These",
"malicious",
"modules",
"report",
"to",
"the",
"attackers",
"about",
"every",
"step",
"they",
"are",
"going",
"to",
"make",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"JS.Exploit.ShellCode.c",
"Backdoor.Chches",
"PowerShell/Kryptik.A",
"BKDR_ChChes.SMZJEA-A",
"BKDR_ChChes.SMZJEA-A",
"Trojan.UPLT-5",
"Trojan:Win32/Posploi.A",
"JS.S.Exploit.121732",
"Trojan.Win32.Chches",
"Win32/Trojan.76d"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan-Spy/W32.Banker.902656.L",
"Trojan.Win32.Malware.1",
"Win32/PSW.Delf.NUI",
"Banker.FEDD",
"Trojan-Banker.Win32.Banker.aqtj",
"Win32.HLLM.Sowsat.92",
"Win32/SillyDl.PVN",
"Backdoor.Win32.Rbot!IK",
"Trojan-Banker.Win32.Banker.aqtj",
"Backdoor.Win32.Rbot",
"PSW.Delf.EFZ",
"Trj/Banker.FWD"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"]",
"com",
"."
] | [
9,
9,
16
] |
[
"Logcat",
"logs",
"show",
"FakeSpy",
"uses",
"libmsy.so",
"to",
"execute",
"the",
"malicious",
"packed",
"mycode.jar",
"file",
"."
] | [
16,
16,
16,
3,
16,
1,
16,
16,
16,
16,
16,
1,
9,
16
] |
[
"Here",
"are",
"just",
"some",
"of",
"them",
":",
"ngglobal",
"–",
"FirebaseCloudMessaging",
"topic",
"name",
"Issuer",
":",
"CN",
"=",
"negg",
"–",
"from",
"several",
"certificates",
"negg.ddns",
"[",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9
] |
[
"The",
"attack",
"exploited",
"an",
"Adobe",
"Flash",
"vulnerability",
"that",
"stems",
"from",
"the",
"zero-day",
"vulnerabilities",
"exposed",
"from",
"this",
"month's",
"Hacking",
"Team",
"data",
"breach."
] | [
16,
16,
16,
16,
7,
15,
15,
16,
16,
16,
16,
7,
15,
16,
16,
16,
16,
4,
12,
1,
9
] |
[
"In",
"addition,",
"our",
"data",
"showed",
"that",
"there",
"had",
"been",
"a",
"high",
"volume",
"of",
"spam",
"runs",
"during",
"the",
"weekdays",
"and",
"then",
"a",
"decreased",
"volume",
"during",
"the",
"weekends."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9,
9,
16,
16,
16,
0,
16,
16,
16,
16,
16,
16,
16,
0
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W97M.Downloader.CZH",
"O97M.Downloader.DI",
"W97M.Downloader.CZH",
"W97M.Downloader.CZH",
"W97M.Downloader.CZH",
"W97M.Downloader.CZH",
"HEUR_VBA.CN",
"TrojanDownloader:W97M/Ursnif.A",
"W97M.Downloader.CZH",
"W97M.Downloader.CZH",
"virus.office.qexvmc.1100"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"This",
"list",
"is",
"expected",
"to",
"expand",
":",
"Package",
"name",
"Application",
"name",
"com.android.vending",
"Play",
"Market",
"com.boursorama.android.clients",
"Boursorama",
"Banque",
"com.caisseepargne.android.mobilebanking",
"Banque",
"com.chase.sig.android",
"Chase",
"Mobile",
"com.clairmail.fth",
"Fifth",
"Third",
"Mobile",
"Banking",
"com.connectivityapps.hotmail",
"Connect",
"for",
"Hotmail",
"com.google.android.gm",
"Gmail",
"com.imo.android.imoim",
"imo",
"free",
"video",
"calls",
"and",
"chat",
"com.infonow.bofa",
"Bank",
"of",
"America",
"Mobile",
"Banking",
"com.IngDirectAndroid",
"ING",
"com.instagram.android",
"Instagram",
"com.konylabs.capitalone",
"Capital",
"One®",
"Mobile",
"com.mail.mobile.android.mail",
"mail.com",
"mail",
"com.microsoft.office.outlook",
"Microsoft",
"Outlook",
"com.snapchat.android",
"Snapchat",
"com.tencent.mm",
"WeChat",
"com.twitter.android",
"Twitter",
"com.ubercab",
"Uber",
"com.usaa.mobile.android.usaa",
"USAA",
"Mobile",
"com.usbank.mobilebanking",
"U.S.",
"Bank",
"-",
"Inspired",
"by",
"customers",
"com.viber.voip",
"Viber",
"com.wf.wellsfargomobile",
"Wells",
"Fargo",
"Mobile",
"com.whatsapp",
"WhatsApp",
"com.yahoo.mobile.client.android.mail",
"Yahoo",
"Mail",
"–",
"Organized",
"Email",
"fr.banquepopulaire.cyberplus",
"Banque",
"Populaire",
"fr.creditagricole.androidapp",
"Ma",
"Banque",
"jp.co.rakuten_bank.rakutenbank",
"楽天銀行",
"-個人のお客様向けアプリ",
"mobi.societegenerale.mobile.lappli",
"L",
"’",
"Appli",
"Société",
"Générale",
"net.bnpparibas.mescomptes",
"Mes",
"Comptes",
"BNP",
"Paribas",
"org.telegram.messenger",
"Telegram",
"Triout",
"-",
"Spyware",
"Framework",
"for",
"Android",
"with",
"Extensive",
"Surveillance",
"Capabilities",
"August",
"20",
",",
"2018",
"No",
"operating",
"system",
"is",
"safe",
"from",
"malware",
",",
"as",
"cyber",
"criminals",
"will",
"always",
"want",
"to",
"steal",
",",
"spy",
"or",
"tamper",
"with",
"your",
"data",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
5,
13,
1,
9,
5,
1,
5,
1,
5,
13,
1,
5,
13,
13,
13,
1,
5,
13,
13,
1,
5,
1,
5,
16,
16,
16,
16,
16,
1,
5,
13,
13,
13,
13,
1,
16,
1,
9,
1,
5,
13,
13,
1,
9,
5,
1,
5,
13,
1,
5,
1,
5,
1,
5,
1,
4,
1,
5,
13,
1,
9,
16,
16,
16,
16,
16,
1,
5,
1,
5,
13,
13,
1,
5,
1,
5,
13,
16,
16,
16,
1,
5,
16,
1,
5,
13,
1,
16,
16,
1,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
1,
9,
3,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Developed",
"by",
"ksoft,",
"Uploader!",
"allows",
"its",
"user",
"to",
"upload",
"files",
"to",
"the",
"internet",
"via",
"FTP."
] | [
16,
16,
4,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1
] |
[
"In",
"some",
"cases",
",",
"sophisticated",
"web",
"injects",
"were",
"used",
"to",
"trick",
"victims",
"into",
"entering",
"their",
"2FA",
"codes",
"directly",
"into",
"the",
"web",
"forms",
"controlled",
"by",
"the",
"malware",
"to",
"eliminate",
"the",
"need",
"for",
"the",
"mobile",
"malware",
"component",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"]",
"ponethus",
"[",
"."
] | [
9,
9,
9,
9
] |
[
"The",
"modus",
"operandi",
"for",
"all",
"three",
"investigations",
"were",
"very",
"similar",
"and",
"appear",
"to",
"be",
"a",
"new",
"Carbanak",
"gang",
"attack",
"methodology,",
"focused",
"on",
"the",
"hospitality",
"industry."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
6,
14,
1,
16,
16,
16,
16,
4,
12
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"TrojWare.Win32.TrojanDownloader.Tibs.1",
"Riskware.PSWTool.Win32.IEPassView.m!IK",
"not-a-virus:PSWTool.Win32.IEPassView.m"
] | [
16,
3,
16,
16,
16,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Injector.Win32.400028",
"Trojan.Johnnie.D3FAD",
"Trojan.Win32.Kovter.rky",
"Trojan.Win32.Kovter.efkdwr",
"Troj.Dropper.W32.Nail.ldEa",
"Trojan.Kovter.297",
"PUA.Win32.Dlhelper",
"Trojan.Kovter.axf",
"Trojan:Win32/Kometage.A",
"Trojan.Win32.Kovter.rky",
"Trojan/Win32.Kovter.R186277",
"Trojan.Kovter",
"Trojan.Kovter!DsLwWELZUiM",
"W32/Injector.DDXC!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Project",
"Spy",
"routine",
"At",
"the",
"end",
"of",
"March",
"2020",
",",
"we",
"came",
"across",
"an",
"app",
"masquerading",
"as",
"a",
"coronavirus",
"update",
"app",
",",
"which",
"we",
"named",
"Project",
"Spy",
"based",
"on",
"the",
"login",
"page",
"of",
"its",
"backend",
"server",
"."
] | [
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"So",
"far,",
"no",
"AV",
"has",
"given",
"any",
"meaningful",
"identification",
"to",
"this",
"malware—it",
"is",
"detected",
"under",
"generic",
"names."
] | [
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16
] |
[
"In",
"early",
"February",
"2015,",
"Dell",
"SecureWorks",
"Counter",
"Threat",
"UnitTM",
"CTU",
"researchers",
"investigated",
"a",
"new",
"file-encrypting",
"ransomware",
"family",
"named",
"TeslaCrypt,",
"which",
"was",
"distributed",
"by",
"the",
"popular",
"Angler",
"browser",
"exploit",
"kit."
] | [
16,
16,
0,
8,
4,
12,
12,
12,
12,
12,
12,
16,
16,
16,
3,
11,
11,
16,
3,
16,
16,
16,
16,
16,
16,
3,
11,
11,
11
] |
[
"]",
"ru/7",
"*",
"*",
"*",
"*",
"*",
"3",
"”",
"or",
"“",
"%",
"USERNAME",
"%",
",",
"accept",
"25,000",
"on",
"Youla",
"youla-protect",
"[",
"."
] | [
9,
9,
9,
9,
9,
9,
9,
9,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9
] |
[
"A",
"complete",
"list",
"of",
"sample",
"hashes",
"is",
"available",
"here",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"We",
"believe",
"that",
"the",
"main",
"goal",
"of",
"attackers",
"using",
"these",
"tools",
"is",
"cybersabotage."
] | [
16,
16,
16,
16,
16,
16,
16,
6,
16,
16,
3,
16,
6
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9955",
"Win.Trojan.Alina-5",
"Trojan.Win32.Alinaos.ewvxne",
"BehavesLike.Win32.Dropper.qc",
"Trojan.Win32.Alinaos",
"W32/Trojan.ZTVS-0655",
"TrojanSpy:Win32/Alinaos.G",
"Trojan.Win32.Z.Alinaos.57344",
"Win32.Worm.Alinaos.C",
"Trj/GdSda.A",
"Win32/Trojan.3de"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"We",
"have",
"been",
"presented",
"with",
"a",
"rare",
"opportunity",
"to",
"see",
"some",
"development",
"activities",
"from",
"the",
"actors",
"associated",
"with",
"the",
"OilRig",
"attack",
"campaign,",
"a",
"campaign",
"Unit",
"42",
"has",
"been",
"following",
"since",
"May",
"2016."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
6,
14,
14,
14,
16,
6,
4,
12,
16,
16,
16,
16,
0,
8
] |
[
"Here",
"are",
"some",
"of",
"the",
"most",
"notable",
":",
"‘",
"geofence",
"’",
"–",
"this",
"command",
"adds",
"a",
"specified",
"location",
"to",
"the",
"implant",
"’",
"s",
"internal",
"database",
"and",
"when",
"it",
"matches",
"a",
"device",
"’",
"s",
"current",
"location",
"the",
"malware",
"triggers",
"and",
"begins",
"to",
"record",
"surrounding",
"audio",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"TrojanAPT.DarkHotel.A5",
"Trojan/Inexsmar.b",
"Win32.Trojan.WisdomEyes.16070401.9500.9940",
"W32/Trojan.WHDF-1534",
"Trojan.Munidub",
"TROJ_ASRUEX.B",
"Trojan.Win32.Zapchast.ahgo",
"Trojan.Win32.Zapchast.eavzfr",
"Troj.W32.Zapchast!c",
"TrojWare.Win32.UMal.chn",
"Trojan.Inexsmar.Win32.1",
"TROJ_ASRUEX.B",
"BehavesLike.Win32.Downloader.th",
"Trojan.Zapchast.x",
"Trojan/Win32.Zapchast",
"Trojan.Zusy.D2AD58",
"Trojan.Win32.Zapchast.ahgo",
"Trojan/Win32.Asruex.R175438",
"Trojan.Zapchast.pk",
"Trojan.Zapchast",
"Trj/GdSda.A",
"Win32/Inexsmar.B",
"Trojan.Zapchast!JP2wAgi6V+c",
"Trojan.Win32.Inexsmar",
"Win32/Trojan.2cb"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9923",
"Backdoor.MSIL",
"TR/Ticker.A",
"Trojan/Win32.Unknown",
"Trojan:MSIL/Ticker.A",
"Trojan.Ticker!i0gQR/g7sH4"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.Y3krat.25",
"Backdoor/W32.Y3krat.236032",
"Backdoor/Y3KRat.25",
"Backdoor.Y3krat.25",
"Trojan.Win32.Y3KRat.fqmw",
"W32/Backdoor.CMH",
"Backdoor.Trojan",
"Win32/Y3KRat.25",
"BKDR_GQ.B",
"Trojan.Y3K-3",
"Backdoor.Win32.Y3KRat.25",
"Backdoor.Y3KRat.AS!AU",
"Backdoor.Win32.Y3KRat.236032[h]",
"Win32.Backdoor.Y3krat.Ambw",
"Backdoor.Y3krat.25",
"Backdoor.Win32.Y3KRat.25",
"Backdoor.Y3krat.25",
"BackDoor.Y3krat.18",
"Backdoor.Y3KRat.Win32.115",
"BKDR_GQ.B",
"BehavesLike.Win32.Dropper.dc",
"W32/Backdoor.PBIC-7717",
"Backdoor/Y3KRat.25.a",
"BDS/Y3kRat.25.5",
"W32/Y3krat.25!tr.bdr",
"Trojan[Backdoor]/Win32.Y3KRat",
"Backdoor.Y3krat.25",
"Backdoor.W32.Y3KRat.25!c",
"Win-Trojan/Y3KRat.236032",
"Backdoor:Win32/Y3KRat.2_5",
"Backdoor.RAT.Y3Backdoor.RAT.V1.8.a",
"Backdoor.Y3KRat",
"Bck/Y3KRat.H",
"Backdoor.Win32.Y3KRat",
"Backdoor.Y3krat.25",
"Backdoor.Win32.Y3KRat.25"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan-PWS/W32.WebGame.161447",
"TrojanPSW.OnLineGames.adem",
"Trojan-PSW.Win32.OnLineGames.adem",
"Win32/PSW.OnLineGames.NNU",
"Trojan.Packed.NsAnti",
"Trojan.Spy-35117",
"Packer.Malware.NSAnti.1",
"TrojWare.Win32.PSW.OnLineGames.NNU",
"Trojan.PWS.Gamania.9247",
"Win32/PSW.OnLineGames.NNU",
"Packer.Malware.NSAnti.AL!IK",
"Worm:Win32/Taterf.B",
"Packer.Malware.NSAnti.1",
"Packer.Win32.Mian007.a",
"Packer.Malware.NSAnti.AL",
"W32/OnLineGames.fam!tr.pws"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Vundo",
"Win.Downloader.8632-1",
"MalwareScope.Trojan-PSW.Pinch.1",
"Trojan.Click.4067",
"BehavesLike.Win32.Dropper.lc",
"Trojan/Win32.QQPass.R1885"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/Exploit.DCom.naf",
"Exploit.Win32.DCom.khbzi",
"Win.Trojan.Dcom-2",
"Trojan.Peed!mca6fnIo2DU",
"Exploit.DCom.6",
"Exploit.DCom.Win32.185",
"EXP/DCom.Y.13",
"Win-Trojan/Berbew.51712",
"Exploit:Win32/Dcom.Y",
"Exploit.DCom",
"Trj/CI.A",
"Net-Worm.Win32.Kolab",
"Exploit.DCOM.RPC",
"Trojan.Win32.DCom.NAF",
"Win32/Trojan.Exploit.3e3"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Technical",
"Analysis",
"The",
"malware",
"consists",
"of",
"2",
"applications",
":",
"The",
"Dropper",
":",
"Brain",
"Test",
"(",
"Unpacked",
"–",
"com.mile.brain",
",",
"Packed",
"–",
"com.zmhitlte.brain",
")",
"This",
"is",
"installed",
"from",
"Google",
"Play",
"and",
"downloads",
"an",
"exploit",
"pack",
"from",
"the",
"server",
"to",
"obtain",
"root",
"access",
"on",
"a",
"device",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
1,
16,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.Win64",
"Win32.Trojan.WisdomEyes.16070401.9500.9643",
"W64/Trojan.JENW-7287",
"Trojan.Uboat",
"BKDR64_UBOAT.A",
"BKDR64_UBOAT.A",
"Backdoor:Win64/UBoatRAT.A",
"Trj/CI.A",
"Backdoor.Rat.UBoatRat"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"Gh0st",
"malware",
"is",
"a",
"widely",
"used",
"remote",
"administration",
"tool",
"RAT",
"that",
"originated",
"in",
"China",
"in",
"the",
"early",
"2000s."
] | [
3,
11,
11,
16,
16,
16,
16,
3,
11,
11,
11,
16,
16,
16,
2,
16,
16,
16,
0
] |
[
"A",
"popular",
"mobile",
"messaging",
"application,",
"LINE",
"was",
"used",
"as",
"a",
"bait",
"to",
"lure",
"targets",
"in",
"a",
"targeted",
"attack",
"which",
"hit",
"Taiwan",
"government."
] | [
16,
16,
16,
16,
16,
4,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
12
] |
[
"The",
"number",
"continues",
"to",
"rise",
"at",
"an",
"additional",
"13,000",
"breached",
"devices",
"each",
"day",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/W32.Karba.24576",
"TrojanAPT.Garveep.DL4",
"Win32.Trojan.WisdomEyes.16070401.9500.9996",
"Trojan.Win32.Karba.ai",
"Trojan.Win32.DownLoad3.cztnhk",
"Win32.Trojan.Karba.Pdvp",
"TrojWare.Win32.Dialer.AFXP",
"Trojan.DownLoad3.18105",
"Trojan.Karba.Win32.9",
"W32/Trojan.DWPP-4593",
"TR/Spy.mulkf",
"Trojan.DarkHotel.23",
"Trojan.Win32.Karba.ai",
"Win32/Trojan.7fa"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.TDss.ET",
"Trojan.TDSS",
"Trojan.TDss.ET",
"WORM_TDSS.SMY",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"WORM_TDSS.SMY",
"Trojan.TDss.ET",
"Packed.Win32.TDSS.f",
"Trojan.TDss.ET",
"Trojan.Win32.Tdss.btyvr",
"Trojan.Win32.Z.Tdss.23552.A",
"Packer.W32.Tdss.kYT0",
"Trojan.TDss.ET",
"Win32.PkdTdss",
"Trojan.Packed.365",
"Trojan.Kryptik.Win32.1293691",
"BehavesLike.Win32.FakeAlert.mh",
"Trojan.Win32.Alureon",
"Trojan[Packed]/Win32.TDSS",
"Win32.Troj.TdssT.jr.102400",
"Trojan.TDss.ET",
"Packed.Win32.TDSS.f",
"TrojanDownloader:Win32/Rugzip.A",
"Packed/Win32.Tdss.C53201",
"Trojan.TDSS.01414",
"Win32.Packed.Tdss.Pgdn",
"W32/PackTDssfilter.I!tr",
"Win32/Trojan.d9b"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Not",
"long",
"after",
"this",
"variant",
"was",
"public",
",",
"newer",
"variants",
"of",
"HenBox",
"were",
"seen",
",",
"and",
"some",
"had",
"significant",
"increases",
"in",
"the",
"number",
"of",
"targeted",
"apps",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"change",
"in",
"the",
"way",
"the",
"malware",
"works",
"today",
"may",
"be",
"to",
"help",
"finance",
"the",
"campaign",
"through",
"fraudulent",
"ad",
"activity",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"On",
"the",
"27th",
"of",
"June",
"2017,",
"a",
"new",
"cyberattack",
"hit",
"many",
"computer",
"systems",
"in",
"Ukraine,",
"as",
"well",
"as",
"in",
"other",
"countries."
] | [
16,
16,
0,
8,
8,
8,
1,
9,
9,
16,
16,
5,
13,
16,
2,
16,
16,
16,
16,
2,
10
] |
[
"The",
"stolen",
"data",
"fields",
"are",
":",
"Mobile",
"-",
"The",
"infected",
"device",
"phone",
"number",
"Machine",
"-",
"The",
"device",
"model",
"(",
"in",
"our",
"example",
":",
"Google",
"Pixel",
"2",
")",
"Sversion",
"-",
"The",
"OS",
"version",
"Bank",
"-",
"Checks",
"if",
"there",
"are",
"any",
"banking-related",
"or",
"cryptocurrency",
"trading",
"apps",
"Provider",
"-",
"The",
"telecommunication",
"provider",
"(",
"IMSI",
"value",
"in",
"device",
"settings",
")",
"npki",
"-",
"Checks",
"if",
"the",
"folder",
"named",
"NPKI",
"(",
"National",
"Public",
"Key",
"Infrastructure",
")",
"might",
"contain",
"authentication",
"certificates",
"related",
"to",
"financial",
"transactions",
"onStartCommand",
"function",
"for",
"stealing",
"device",
"information",
"and",
"additional",
"sensitive",
"data",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.RansomeDNZ.Trojan",
"Ransom/W32.crysis.94720",
"Ransom.Crysis.S162740",
"Trojan/Filecoder.Crysis.l",
"Win32.Trojan.WisdomEyes.16070401.9500.9991",
"W32/Wadhrama.B",
"Win32.Trojan-Ransom.VirusEncoder.A",
"Trojan-Ransom.Win32.Crusis.to",
"Trojan.Win32.Filecoder.emdnxn",
"Trojan.Win32.Ransom.94720.F",
"Troj.Ransom.W32.Crusis.tpcS",
"TrojWare.Win32.Crysis.D",
"Trojan.Encoder.3953",
"Trojan.Crusis.Win32.806",
"BehavesLike.Win32.Ransom.nc",
"Trojan-Ransom.Crysis",
"W32/Trojan.ILHO-9216",
"Trojan.Crypren.ic",
"Trojan.Ransom.Crysis.6",
"Ransom.Crysis/Variant",
"Trojan-Ransom.Win32.Crusis.to",
"Trojan.Ransom.Crysis",
"Hoax.Crusis",
"Trj/GdSda.A",
"Trojan-Ransom.Win32.Crysis.a",
"W32/Crysis.L!tr.ransom",
"Win32/Trojan.Ransom.f44"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"It",
"sets",
"particular",
"parameters",
"in",
"relation",
"to",
"call",
"details",
"and",
"a",
"further",
"service",
"named",
"calls",
"takes",
"the",
"control",
"as",
"seen",
"in",
"Figure",
"5",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"module",
"injects",
"code",
"into",
"running",
"Google",
"Play",
"or",
"GMS",
"(",
"Google",
"Mobile",
"Services",
")",
"to",
"mimic",
"user",
"behavior",
"so",
"Gooligan",
"can",
"avoid",
"detection",
",",
"a",
"technique",
"first",
"seen",
"with",
"the",
"mobile",
"malware",
"HummingBad",
"."
] | [
16,
16,
16,
16,
16,
16,
5,
13,
16,
5,
13,
13,
13,
13,
13,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Nagoot.FC.161",
"MSIL.Trojan.Injector.l",
"W32/Trojan.MIPO-0322",
"Downloader.Ponik",
"Trojan.Win32.Inject1.exqnlv",
"Trojan.Win32.Z.Nagoot.68608.A",
"Trojan.Inject1.54664",
"Trojan.MSIL.Nagoot",
"TR/Dropper.MSIL.rjbya",
"Trojan.MSIL.Bladabindi.1",
"Trojan:MSIL/Nagoot.A",
"Trojan.PasswordStealer",
"Trj/GdSda.A",
"MSIL/Injector.IFP!tr",
"Win32/Trojan.62b"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"This",
"malware-life-cycle",
"has",
"been",
"observed",
"to",
"reoccur",
"every",
"few",
"years",
",",
"bringing",
"new",
"malware",
"families",
"into",
"light",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"In",
"recent",
"years",
",",
"some",
"malicious",
"Android",
"applications",
"abused",
"these",
"accessibility",
"services",
"in",
"various",
"attack",
"scenarios",
"."
] | [
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Allows",
"an",
"application",
"to",
"read",
"from",
"external",
"storage",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.XhglJIK1DLL.Rootkit",
"Trojan/W32.Cariez.32768.AU",
"BackDoor-DTL.a",
"Trojan.Cariez.Win32.270",
"Trojan/Koutodoor.dx",
"TROJ_CARIEZ.SMA",
"Win32.Trojan.WisdomEyes.16070401.9500.9997",
"TROJ_CARIEZ.SMA",
"Win.Trojan.Cariez-189",
"Trojan.Win32.Cariez.a",
"Trojan.Win32.Cariez.byufu",
"TrojWare.Win32.Zybr.A",
"Trojan.RKDoor.59",
"BackDoor-DTL.a",
"Trojan.Win32.Cariez",
"Trojan/Win32.Cariez",
"Adware.Heur.E02D22",
"Trojan.Win32.Cariez.a",
"Trojan:Win32/Cariez.A",
"Backdoor/Win32.Koutodoor.R1208",
"TScope.Malware-Cryptor.SB",
"Trj/Cariez.A",
"Trojan.Win32.Cariez.bhg"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"While",
"Japan",
"is",
"still",
"the",
"most",
"heavily",
"targeted",
"geographic",
"region",
"by",
"this",
"particular",
"actor,",
"we",
"also",
"observed",
"instances",
"where",
"individuals",
"or",
"organizations",
"in",
"Taiwan,",
"Tibet,",
"and",
"Russia",
"also",
"may",
"have",
"been",
"targeted."
] | [
16,
2,
16,
16,
16,
16,
16,
16,
2,
10,
16,
16,
16,
6,
16,
16,
16,
16,
16,
4,
16,
4,
16,
2,
10,
16,
2,
16,
16,
16,
16,
16
] |
[
"This",
"report",
"describes",
"an",
"extensive",
"malware,",
"phishing,",
"and",
"disinformation",
"campaign",
"active",
"in",
"several",
"Latin",
"American",
"countries,",
"including",
"Ecuador,",
"Argentina,",
"Venezuela,",
"and",
"Brazil."
] | [
16,
16,
16,
16,
16,
3,
6,
16,
6,
14,
16,
16,
16,
2,
10,
10,
16,
2,
2,
2,
16,
2
] |
[
"This",
"blog",
"links",
"this",
"recent",
"activity",
"with",
"previous",
"isolated",
"public",
"reporting",
"on",
"similar",
"attacks",
"we",
"believe",
"are",
"related."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Collection",
"of",
"payloads",
"being",
"delivered",
"via",
"the",
"Apache",
"Struts",
"vulnerability",
"-",
"CVE-2017-5638"
] | [
16,
16,
3,
16,
16,
16,
7,
15,
15,
15,
16,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.Gargamel.A",
"Backdoor.Gargamel.A",
"Backdoor.Trojan",
"BKDR_GARGAM.A",
"Backdoor.Win32.Gargamel.a",
"Backdoor.Gargamel.A",
"Backdoor.Gargamel!8hABCfPKz0o",
"Backdoor.Win32.Gargamel.Downloader",
"Backdoor.Gargamel.A",
"BackDoor.Gargamel",
"BDS/Gargamel.A.10",
"BKDR_GARGAM.A",
"Win-Trojan/Gargamel.17717",
"Backdoor.Gargamel.A",
"Backdoor.Trojan",
"Win32/Gargamel.Downloader",
"Backdoor.Win32.Gargamel",
"W32/Uploade.B!tr.bdr",
"BackDoor.Gargamel.B"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"KillCMOS.K",
"Trojan.KillCMOS.O",
"Trojan.KillCMOS.O",
"Trojan.KillCMOS.O",
"Trojan.KillCMOS.O",
"TROJ_KILLCMOS.L",
"Win.Trojan.KillCMOS-14",
"Trojan.KillCMOS.O",
"Trojan.DOS.KillCMOS.k",
"Trojan.Dos.KillCMOS.blmit",
"Troj.DOS.KillCMOS.k!c",
"Trojan.KillCMOS.O",
"Trojan.KillCMOS.O",
"TROJ_KILLCMOS.L",
"KillCMOS.h",
"TR/KillCMOS.J",
"Trojan:DOS/KillCMOS.remnants",
"Trojan.DOS.KillCMOS.k",
"KillCMOS.h",
"Dos.Trojan.Killcmos.Ebgc",
"Trojan.KillCMOS",
"Trj/KillCMOS.K",
"Win32/Trojan.8f3"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W97M.Downloader.DF",
"HEUR.VBA.Trojan.e",
"W2KM_DLOADR.YYSQD",
"Trojan-Dropper:W97M/MaliciousMacro.B",
"W2KM_DLOADR.YYSQD",
"TrojanDropper:W97M/Miskip.B!dha",
"Trojan-Dropper.W97M.Miskip",
"heur.macro.infect.l"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.OnGameELIYTAAD.Trojan",
"Trojan-Ransom.Win32.Blocker!O",
"Backdoor.Bustem.A5",
"Trojan.BCMiner",
"Troj.Ransom.W32.Blocker!c",
"Trojan.Johnnie.D545",
"TSPY_DOWNLOADER_CA0827C3.TOMC",
"Trojan-Ransom.Win32.Blocker.jcku",
"Trojan.Win32.AVKill.dqatba",
"Trojan.Win32.A.Scar.118272.A",
"Trojan.AVKill.11731",
"TSPY_DOWNLOADER_CA0827C3.TOMC",
"BehavesLike.Win32.LoadMoney.ch",
"Backdoor.Win32.Bustem",
"Trojan/Win32.Unknown",
"Backdoor:Win32/Bustem.A",
"Trojan-Ransom.Win32.Blocker.jcku",
"Trojan/Win32.Downloader.R14675",
"Hoax.Blocker",
"Trojan-ransom.Win32.Blocker.cwfe",
"Win32/RootKit.Rootkit.7e5"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"growing",
"number",
"of",
"samples",
"demonstrate",
"that",
"criminals",
"are",
"actively",
"adopting",
"this",
"malware."
] | [
16,
16,
16,
16,
16,
16,
16,
6,
16,
16,
16,
16,
3
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Hoax.Win32.BadJoke!O",
"W32/Joke.O",
"Joke.Irritan",
"JOKE_IRRITAN.A",
"Hoax.Win32.BadJoke.Irritan",
"Riskware.Win32.Irritan.hrfs",
"Joke.Win32.Irritan.A",
"FDOS.Winskill",
"Backdoor.PePatch.Win32.34151",
"JOKE_IRRITAN.A",
"W32/Joke.ASXP-0124",
"not-virus:Joke.Win32.Irritan",
"JOKE/Irritan.A",
"HackTool[Hoax]/Win32.Irritan",
"Win32.Joke.Irritan.kcloud",
"Win-AppCare/Irritan.248877",
"Trojan.Win32.BadJoke.AD",
"Win32/Irritan.A",
"Hoax.Win32.BadJoke.Irritan",
"Win32/Joke.bee"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Threat",
"actors",
"are",
"taking",
"advantage",
"of",
"Microsoft",
"OneNote's",
"ability",
"to",
"embed",
"files",
"and",
"use",
"social",
"engineering",
"techniques,",
"such",
"as",
"phishing",
"emails",
"and",
"lures",
"inside",
"the",
"OneNote",
"document,",
"to",
"get",
"unsuspecting",
"users",
"to",
"download",
"and",
"open",
"malicious",
"files."
] | [
6,
14,
16,
16,
16,
16,
5,
13,
16,
16,
1,
9,
16,
16,
16,
16,
16,
16,
16,
1,
9,
16,
16,
16,
16,
1,
9,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11
] |
[
"The",
"pushTAN",
"method",
"has",
"a",
"clear",
"advantage",
":",
"It",
"improves",
"security",
"by",
"mitigating",
"the",
"risk",
"of",
"SIM",
"swapping",
"attacks",
"and",
"SMS",
"stealers",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"As",
"this",
"is",
"a",
"complex",
"process",
",",
"we",
"recommend",
"powering",
"off",
"your",
"device",
"and",
"approaching",
"a",
"certified",
"technician",
",",
"or",
"your",
"mobile",
"service",
"provider",
",",
"to",
"request",
"that",
"your",
"device",
"be",
"“",
"re-flashed.",
"”",
"Change",
"your",
"Google",
"account",
"passwords",
"immediately",
"after",
"this",
"process",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
16,
16,
16,
16,
16,
16
] |
[
"With",
"this",
"group",
"being",
"active",
"for",
"roughly",
"one",
"year,",
"we",
"decided",
"to",
"revisit",
"this",
"threat",
"to",
"determine",
"what,",
"if",
"any,",
"changes",
"had",
"been",
"made",
"to",
"their",
"toolset."
] | [
16,
16,
4,
16,
16,
16,
16,
0,
8,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan-Dropper/W32.Stabs.90045",
"TrojanDropper.Stabs.cvo",
"Trojan/Dropper.Stabs.dka",
"Win32/Bifrose.NDU",
"W32/Trojan2.HEAS",
"W32/Smalltroj.QFFP",
"BKDR_BIFROSE.SMC",
"BackDoor.IRC.Sdbot.3713",
"BKDR_BIFROSE.SMC",
"Trojan-Downloader.Win32.Buzus!IK",
"W32/Trojan2.HEAS",
"TrojanDownloader:Win32/Buzus.F",
"Trojan-Downloader.Win32.Buzus",
"W32/Injector.IA!tr",
"Trj/Buzus.AH"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"These",
"components",
"include",
"a",
"unique",
"loader,",
"downloader,",
"and",
"not",
"one",
"but",
"two",
"different",
"trojan",
"components."
] | [
16,
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
3,
16
] |
[
"ALLCONTACTS",
"–",
"send",
"all",
"contacts",
"from",
"phone",
"memory",
"to",
"C",
"&",
"C",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"URL",
"—",
"update",
"C",
"&",
"C",
"address",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"]",
"com",
"are",
"or",
"were",
"intended",
"for",
"malicious",
"use",
"."
] | [
9,
9,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"**Dump",
"Domain",
"Registration",
"Patterns:*From",
"about",
"2015",
"to",
"at",
"least",
"October",
"2018",
"possibly",
"longer,",
"IBM",
"X-Force",
"assesses",
"that",
"ITG08's",
"POS",
"malware",
"used",
"the",
"same",
"notable",
"domain",
"naming",
"convention:",
"all",
"known",
"dump",
"domains",
"used",
"by",
"FrameworkPOS",
"and",
"GratefulPOS",
"contained",
"the",
"same",
"base",
"name",
"-akamaitechnologies.com.",
"In",
"fact,",
"all",
"said",
"domains",
"are",
"nearly",
"identical",
"looking",
"to",
"a",
"legitimate",
"Akamai",
"content",
"delivery",
"network",
"CDN",
"domain,",
"differing",
"only",
"by",
"a",
"single",
"character",
"replacing",
"a",
".'",
"with",
"-",
"."
] | [
4,
12,
12,
12,
16,
0,
8,
8,
8,
8,
8,
16,
16,
4,
12,
16,
16,
3,
11,
11,
16,
16,
16,
16,
1,
9,
9,
16,
16,
16,
16,
16,
16,
3,
16,
3,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
1,
9,
5,
13,
13,
13,
1,
16,
16,
16,
1,
9,
9,
9,
9,
9,
9,
9,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Script.SWF.C603",
"Exp.SWF.Rig.EK.4476",
"Exploit.SWF.Downloader",
"SWF_EXKIT.THAAEH",
"Script.SWF.C603",
"Script.SWF.C603",
"SWF.S.Exploit.13894",
"Script.SWF.C603",
"Script.SWF.C603",
"Exploit.SWF.1232",
"SWF_EXKIT.THAAEH",
"SWF/Exploit-Rig.h",
"SWF/Trojan.VJFQ-3",
"Script.SWF.C603",
"SWF/Exploit-Rig.h",
"Trojan.SWF.Exploit",
"swf.cve-2015-8651.rig.a"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Adobe",
"independently",
"patched",
"the",
"vulnerability",
"CVE-2015-3043",
"in",
"APSB15-06."
] | [
4,
16,
16,
16,
7,
15,
16,
16
] |
[
"INTERNET",
"-",
"Allows",
"the",
"application",
"to",
"open",
"network",
"sockets",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"In",
"fact",
",",
"the",
"applications",
"are",
"designed",
"to",
"download",
"the",
"autorun.inf",
"file",
",",
"an",
"icon",
"file",
"and",
"the",
"win32-Trojan",
"file",
",",
"which",
"the",
"mobile",
"malicious",
"program",
"locates",
"in",
"the",
"root",
"directory",
"of",
"an",
"SD",
"card",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16
] |
[
"The",
"KOVTER",
"malware",
"embeds",
"a",
"JavaScript",
"into",
"the",
"registry",
"and",
"executes",
"a",
"PowerShell",
"script",
"which",
"eventually",
"loads",
"the",
"main",
"KOVTER",
"binaries."
] | [
3,
11,
11,
16,
16,
1,
16,
16,
16,
16,
16,
16,
1,
9,
16,
16,
1,
9,
9,
9,
9
] |
[
"It",
"indicates",
"perhaps",
"an",
"interesting",
"trend",
"which",
"is",
"exploiting",
"the",
"trust",
"relationships",
"between",
"the",
"two",
"communities",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"CSIS",
"has",
"been",
"informed",
"about",
"a",
"number",
"of",
"targeted",
"spear",
"phishing",
"attacks",
"against",
"Danish",
"chiropractors."
] | [
4,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9,
16,
4,
12
] |
[
"The",
"attackers",
"send",
"fake",
"text",
"messages",
"to",
"lure",
"the",
"victims",
"to",
"click",
"on",
"a",
"malicious",
"link",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"developer",
"of",
"the",
"code",
",",
"Shanghai",
"Adups",
"Technology",
"Co.",
",",
"has",
"apologized",
",",
"contending",
"that",
"the",
"code",
"was",
"intended",
"for",
"another",
"one",
"of",
"its",
"clients",
"who",
"requested",
"better",
"blocking",
"of",
"junk",
"text",
"messages",
"and",
"marketing",
"calls",
"."
] | [
16,
16,
16,
16,
16,
16,
4,
12,
12,
12,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"group",
"focuses",
"on",
"companies",
"that",
"have",
"intellectual",
"property",
"or",
"sensitive",
"information",
"like",
"those",
"in",
"the",
"Defense",
"and",
"High-Tech",
"industries."
] | [
6,
14,
16,
16,
4,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
12,
16,
4,
12
] |
[
"If",
"the",
"phone",
"is",
"attached",
"to",
"a",
"bank",
"card",
",",
"commands",
"are",
"sent",
"from",
"the",
"C",
"&",
"C",
"server",
"with",
"instructions",
"to",
"transfer",
"money",
"from",
"the",
"user",
"’",
"s",
"bank",
"account",
"to",
"his/her",
"mobile",
"account",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Users",
"of",
"iOS",
"can",
"remove",
"the",
"malicious",
"profile",
"using",
"the",
"Apple",
"Configurator",
"2",
",",
"Apple",
"’",
"s",
"official",
"iOS",
"helper",
"app",
"for",
"managing",
"Apple",
"devices",
"."
] | [
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
4,
16,
16,
16,
4,
16,
16,
16,
5,
16,
16,
16,
16,
4,
16,
16
] |
[
"However",
",",
"Talos",
"has",
"identified",
"that",
"was",
"used",
"at",
"least",
"since",
"November",
"2018",
"."
] | [
16,
16,
4,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"TjnDownldr.SmaCod.S162507",
"Downloader.Tiny.Win32.8086",
"Win32.Trojan.WisdomEyes.16070401.9500.9968",
"Trojan.Win32.Tiny.elyeva",
"TrojWare.Win32.TrojanDownloader.Tiny.NNO",
"Trojan-Downloader.Win32.Tiny",
"Trojan.Mikey.DECAC",
"Trojan/Win32.Downloader.R193768",
"OScope.Trojan.0216",
"W32/Tiny.NNO!tr",
"Win32/Trojan.823"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Uds.Dangerousobject.Multi!c",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"TR/Downloader.A.2357",
"Trojan.Kazy.D60565",
"TrojanDownloader:MSIL/Muxtart.A",
"Win32.Trojan.Downloader.Szlu"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1
] |
[
"Despite",
"having",
"a",
"reputation",
"of",
"evolution,",
"there",
"doesn't",
"seem",
"to",
"be",
"very",
"many",
"recent",
"updates",
"on",
"this",
"malware",
"family",
"though."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"latest",
"round",
"of",
"attacks",
"in",
"2015",
"uses",
"a",
"stolen",
"code",
"signing",
"certificate",
"belonging",
"to",
"Taiwanese",
"electronics",
"maker",
"Acer",
"and",
"an",
"unknown",
"Flash",
"Player",
"exploit."
] | [
16,
16,
16,
16,
16,
16,
0,
16,
16,
1,
9,
9,
9,
16,
16,
4,
12,
12,
12,
16,
16,
3,
11,
11,
11
] |
[
"However,",
"in",
"addition",
"to",
"new",
"variants",
"of",
"malicious",
".hta,",
"we",
"find",
"new",
"victims,",
".rar",
"attachments",
"with",
"RTLO",
"spearphishing,",
"and",
"the",
"deployment",
"of",
"a",
"0day",
"from",
"Hacking",
"Team."
] | [
16,
16,
16,
16,
16,
16,
16,
3,
1,
16,
16,
16,
16,
1,
9,
16,
1,
9,
16,
16,
16,
16,
16,
7,
16,
4,
12
] |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.