tokens
sequencelengths
2
296
ner_tags
sequencelengths
2
296
[ "The", "first", "copying", "of", "the", "exploit", "code", "we", "spotted", "was", "from", "the", "Sundown", "exploit", "kit", "EK,", "followed", "closely", "by", "Magnitude", "and", "a", "resurgent", "KaiXin", "EK." ]
[ 16, 16, 16, 16, 16, 1, 9, 16, 16, 16, 16, 16, 3, 11, 11, 11, 16, 16, 16, 3, 16, 16, 3, 11, 11 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.Graybird", "Win.Trojan.HackersDoor-6351576-1", "Backdoor:Win64/Hackdoor.A!dll", "Backdoor/Win32.Hackdoor.R28108", "Trj/CI.A", "Win32/Backdoor.14f" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1 ]
[ "This", "delay", "means", "that", "a", "typical", "testing", "procedure", ",", "which", "takes", "less", "than", "10", "minutes", ",", "will", "not", "detect", "any", "unwanted", "behavior", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Note", "that", "the", "affected", "sites", "have", "consistent", "followers", "given", "the", "nature", "of", "their", "content." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Aside", "from", "the", "inescapable", "irony", "of", "disguising", "a", "security-reducing", "Trojan", "as", "an", "ostensibly", "security-enhancing", "app", ",", "and", "the", "righteous", "affront", "to", "the", "whole", "concept", "of", "a", "VPN", "’", "s", "purpose", "a", "Trojan", "so", "disguised", "inspires", ",", "this", "represents", "an", "escalation", "in", "the", "variety", "of", "app", "types", "targeted", "by", "this", "campaign", "of", "bankbots", "in", "disguise", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.NTPacker", "Trojan.NTPacker", "Trojan.NTPacker", "Win32.Trojan.WisdomEyes.16070401.9500.9936", "Bloodhound.NTPacker", "Win.Trojan.Hydraq-9", "Packed.Win32.PolyCrypt.b", "Trojan.NTPacker", "Trojan.NTPacker", "TrojWare.Win32.TrojanDropper.ErPack", "Trojan.NTPacker", "BackDoor.Ser.4", "Trojan/PSW.QQPass.fk", "TrojanDropper:Win32/MultiDropper.B", "Packed.Win32.PolyCrypt.b", "Trojan.NTPacker", "Trojan/Win32.Delf.R33596", "TScope.Malware-Cryptor.SB", "Win32.Packed.Polycrypt.Lndy", "W32/PolyCrypt.B!tr", "Win32/Trojan.267" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "This", "suggests", "that", "the", "operators", "of", "the", "Command", "&", "Control", "are", "not", "enforcing", "a", "validation", "of", "the", "targets", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "IOCs", "for", "today", "Jaff", "ransomware", "run" ]
[ 1, 16, 16, 3, 11, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Mjaka.A4", "TROJ_MJAKA.C", "Win32.Trojan.WisdomEyes.16070401.9500.9762", "TROJ_MJAKA.C", "Trojan.Win32.FC.euumqd", "W32/Trojan.EEMC-0397", "Trojan:MSIL/Mjaka.A", "Spyware.InfoStealer", "Trj/Mjaka.A", "Win32/Trojan.9a1" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Reverse", "shell", "payload", "The", "payload", "is", "started", "by", "the", "main", "module", "with", "a", "specified", "host", "and", "port", "as", "a", "parameter", "that", "is", "hardcoded", "to", "‘", "54.67.109.199", "’", "and", "‘", "30010", "’", "in", "some", "versions", ":", "Alternatively", ",", "they", "could", "be", "hardcoded", "directly", "into", "the", "payload", "code", ":", "We", "also", "observed", "variants", "that", "were", "equipped", "with", "similar", "reverse", "shell", "payloads", "directly", "in", "the", "main", "APK", "/lib/", "path", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "There", "have", "also", "been", "cases", "of", "users", "in", "Ukraine", ",", "Germany", ",", "Turkey", "and", "several", "other", "countries", "being", "affected", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "(", "Researchers", "have", "been", "aware", "of", "this", "suite", "as", "early", "as", "2014", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "These", "malicious", "modules", "report", "to", "the", "attackers", "about", "every", "step", "they", "are", "going", "to", "make", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "JS.Exploit.ShellCode.c", "Backdoor.Chches", "PowerShell/Kryptik.A", "BKDR_ChChes.SMZJEA-A", "BKDR_ChChes.SMZJEA-A", "Trojan.UPLT-5", "Trojan:Win32/Posploi.A", "JS.S.Exploit.121732", "Trojan.Win32.Chches", "Win32/Trojan.76d" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan-Spy/W32.Banker.902656.L", "Trojan.Win32.Malware.1", "Win32/PSW.Delf.NUI", "Banker.FEDD", "Trojan-Banker.Win32.Banker.aqtj", "Win32.HLLM.Sowsat.92", "Win32/SillyDl.PVN", "Backdoor.Win32.Rbot!IK", "Trojan-Banker.Win32.Banker.aqtj", "Backdoor.Win32.Rbot", "PSW.Delf.EFZ", "Trj/Banker.FWD" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "]", "com", "." ]
[ 9, 9, 16 ]
[ "Logcat", "logs", "show", "FakeSpy", "uses", "libmsy.so", "to", "execute", "the", "malicious", "packed", "mycode.jar", "file", "." ]
[ 16, 16, 16, 3, 16, 1, 16, 16, 16, 16, 16, 1, 9, 16 ]
[ "Here", "are", "just", "some", "of", "them", ":", "ngglobal", "–", "FirebaseCloudMessaging", "topic", "name", "Issuer", ":", "CN", "=", "negg", "–", "from", "several", "certificates", "negg.ddns", "[", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 9 ]
[ "The", "attack", "exploited", "an", "Adobe", "Flash", "vulnerability", "that", "stems", "from", "the", "zero-day", "vulnerabilities", "exposed", "from", "this", "month's", "Hacking", "Team", "data", "breach." ]
[ 16, 16, 16, 16, 7, 15, 15, 16, 16, 16, 16, 7, 15, 16, 16, 16, 16, 4, 12, 1, 9 ]
[ "In", "addition,", "our", "data", "showed", "that", "there", "had", "been", "a", "high", "volume", "of", "spam", "runs", "during", "the", "weekdays", "and", "then", "a", "decreased", "volume", "during", "the", "weekends." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 9, 9, 16, 16, 16, 0, 16, 16, 16, 16, 16, 16, 16, 0 ]
[ "A", "backdoor", "also", "known", "as:", "W97M.Downloader.CZH", "O97M.Downloader.DI", "W97M.Downloader.CZH", "W97M.Downloader.CZH", "W97M.Downloader.CZH", "W97M.Downloader.CZH", "HEUR_VBA.CN", "TrojanDownloader:W97M/Ursnif.A", "W97M.Downloader.CZH", "W97M.Downloader.CZH", "virus.office.qexvmc.1100" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "This", "list", "is", "expected", "to", "expand", ":", "Package", "name", "Application", "name", "com.android.vending", "Play", "Market", "com.boursorama.android.clients", "Boursorama", "Banque", "com.caisseepargne.android.mobilebanking", "Banque", "com.chase.sig.android", "Chase", "Mobile", "com.clairmail.fth", "Fifth", "Third", "Mobile", "Banking", "com.connectivityapps.hotmail", "Connect", "for", "Hotmail", "com.google.android.gm", "Gmail", "com.imo.android.imoim", "imo", "free", "video", "calls", "and", "chat", "com.infonow.bofa", "Bank", "of", "America", "Mobile", "Banking", "com.IngDirectAndroid", "ING", "com.instagram.android", "Instagram", "com.konylabs.capitalone", "Capital", "One®", "Mobile", "com.mail.mobile.android.mail", "mail.com", "mail", "com.microsoft.office.outlook", "Microsoft", "Outlook", "com.snapchat.android", "Snapchat", "com.tencent.mm", "WeChat", "com.twitter.android", "Twitter", "com.ubercab", "Uber", "com.usaa.mobile.android.usaa", "USAA", "Mobile", "com.usbank.mobilebanking", "U.S.", "Bank", "-", "Inspired", "by", "customers", "com.viber.voip", "Viber", "com.wf.wellsfargomobile", "Wells", "Fargo", "Mobile", "com.whatsapp", "WhatsApp", "com.yahoo.mobile.client.android.mail", "Yahoo", "Mail", "–", "Organized", "Email", "fr.banquepopulaire.cyberplus", "Banque", "Populaire", "fr.creditagricole.androidapp", "Ma", "Banque", "jp.co.rakuten_bank.rakutenbank", "楽天銀行", "-個人のお客様向けアプリ", "mobi.societegenerale.mobile.lappli", "L", "’", "Appli", "Société", "Générale", "net.bnpparibas.mescomptes", "Mes", "Comptes", "BNP", "Paribas", "org.telegram.messenger", "Telegram", "Triout", "-", "Spyware", "Framework", "for", "Android", "with", "Extensive", "Surveillance", "Capabilities", "August", "20", ",", "2018", "No", "operating", "system", "is", "safe", "from", "malware", ",", "as", "cyber", "criminals", "will", "always", "want", "to", "steal", ",", "spy", "or", "tamper", "with", "your", "data", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 5, 13, 1, 9, 5, 1, 5, 1, 5, 13, 1, 5, 13, 13, 13, 1, 5, 13, 13, 1, 5, 1, 5, 16, 16, 16, 16, 16, 1, 5, 13, 13, 13, 13, 1, 16, 1, 9, 1, 5, 13, 13, 1, 9, 5, 1, 5, 13, 1, 5, 1, 5, 1, 5, 1, 4, 1, 5, 13, 1, 9, 16, 16, 16, 16, 16, 1, 5, 1, 5, 13, 13, 1, 5, 1, 5, 13, 16, 16, 16, 1, 5, 16, 1, 5, 13, 1, 16, 16, 1, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 1, 9, 3, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Developed", "by", "ksoft,", "Uploader!", "allows", "its", "user", "to", "upload", "files", "to", "the", "internet", "via", "FTP." ]
[ 16, 16, 4, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1 ]
[ "In", "some", "cases", ",", "sophisticated", "web", "injects", "were", "used", "to", "trick", "victims", "into", "entering", "their", "2FA", "codes", "directly", "into", "the", "web", "forms", "controlled", "by", "the", "malware", "to", "eliminate", "the", "need", "for", "the", "mobile", "malware", "component", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "]", "ponethus", "[", "." ]
[ 9, 9, 9, 9 ]
[ "The", "modus", "operandi", "for", "all", "three", "investigations", "were", "very", "similar", "and", "appear", "to", "be", "a", "new", "Carbanak", "gang", "attack", "methodology,", "focused", "on", "the", "hospitality", "industry." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 6, 14, 1, 16, 16, 16, 16, 4, 12 ]
[ "A", "backdoor", "also", "known", "as:", "TrojWare.Win32.TrojanDownloader.Tibs.1", "Riskware.PSWTool.Win32.IEPassView.m!IK", "not-a-virus:PSWTool.Win32.IEPassView.m" ]
[ 16, 3, 16, 16, 16, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Injector.Win32.400028", "Trojan.Johnnie.D3FAD", "Trojan.Win32.Kovter.rky", "Trojan.Win32.Kovter.efkdwr", "Troj.Dropper.W32.Nail.ldEa", "Trojan.Kovter.297", "PUA.Win32.Dlhelper", "Trojan.Kovter.axf", "Trojan:Win32/Kometage.A", "Trojan.Win32.Kovter.rky", "Trojan/Win32.Kovter.R186277", "Trojan.Kovter", "Trojan.Kovter!DsLwWELZUiM", "W32/Injector.DDXC!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Project", "Spy", "routine", "At", "the", "end", "of", "March", "2020", ",", "we", "came", "across", "an", "app", "masquerading", "as", "a", "coronavirus", "update", "app", ",", "which", "we", "named", "Project", "Spy", "based", "on", "the", "login", "page", "of", "its", "backend", "server", "." ]
[ 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "So", "far,", "no", "AV", "has", "given", "any", "meaningful", "identification", "to", "this", "malware—it", "is", "detected", "under", "generic", "names." ]
[ 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16 ]
[ "In", "early", "February", "2015,", "Dell", "SecureWorks", "Counter", "Threat", "UnitTM", "CTU", "researchers", "investigated", "a", "new", "file-encrypting", "ransomware", "family", "named", "TeslaCrypt,", "which", "was", "distributed", "by", "the", "popular", "Angler", "browser", "exploit", "kit." ]
[ 16, 16, 0, 8, 4, 12, 12, 12, 12, 12, 12, 16, 16, 16, 3, 11, 11, 16, 3, 16, 16, 16, 16, 16, 16, 3, 11, 11, 11 ]
[ "]", "ru/7", "*", "*", "*", "*", "*", "3", "”", "or", "“", "%", "USERNAME", "%", ",", "accept", "25,000", "on", "Youla", "youla-protect", "[", "." ]
[ 9, 9, 9, 9, 9, 9, 9, 9, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 9 ]
[ "A", "complete", "list", "of", "sample", "hashes", "is", "available", "here", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "We", "believe", "that", "the", "main", "goal", "of", "attackers", "using", "these", "tools", "is", "cybersabotage." ]
[ 16, 16, 16, 16, 16, 16, 16, 6, 16, 16, 3, 16, 6 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9955", "Win.Trojan.Alina-5", "Trojan.Win32.Alinaos.ewvxne", "BehavesLike.Win32.Dropper.qc", "Trojan.Win32.Alinaos", "W32/Trojan.ZTVS-0655", "TrojanSpy:Win32/Alinaos.G", "Trojan.Win32.Z.Alinaos.57344", "Win32.Worm.Alinaos.C", "Trj/GdSda.A", "Win32/Trojan.3de" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "We", "have", "been", "presented", "with", "a", "rare", "opportunity", "to", "see", "some", "development", "activities", "from", "the", "actors", "associated", "with", "the", "OilRig", "attack", "campaign,", "a", "campaign", "Unit", "42", "has", "been", "following", "since", "May", "2016." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 6, 14, 14, 14, 16, 6, 4, 12, 16, 16, 16, 16, 0, 8 ]
[ "Here", "are", "some", "of", "the", "most", "notable", ":", "‘", "geofence", "’", "–", "this", "command", "adds", "a", "specified", "location", "to", "the", "implant", "’", "s", "internal", "database", "and", "when", "it", "matches", "a", "device", "’", "s", "current", "location", "the", "malware", "triggers", "and", "begins", "to", "record", "surrounding", "audio", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "TrojanAPT.DarkHotel.A5", "Trojan/Inexsmar.b", "Win32.Trojan.WisdomEyes.16070401.9500.9940", "W32/Trojan.WHDF-1534", "Trojan.Munidub", "TROJ_ASRUEX.B", "Trojan.Win32.Zapchast.ahgo", "Trojan.Win32.Zapchast.eavzfr", "Troj.W32.Zapchast!c", "TrojWare.Win32.UMal.chn", "Trojan.Inexsmar.Win32.1", "TROJ_ASRUEX.B", "BehavesLike.Win32.Downloader.th", "Trojan.Zapchast.x", "Trojan/Win32.Zapchast", "Trojan.Zusy.D2AD58", "Trojan.Win32.Zapchast.ahgo", "Trojan/Win32.Asruex.R175438", "Trojan.Zapchast.pk", "Trojan.Zapchast", "Trj/GdSda.A", "Win32/Inexsmar.B", "Trojan.Zapchast!JP2wAgi6V+c", "Trojan.Win32.Inexsmar", "Win32/Trojan.2cb" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9923", "Backdoor.MSIL", "TR/Ticker.A", "Trojan/Win32.Unknown", "Trojan:MSIL/Ticker.A", "Trojan.Ticker!i0gQR/g7sH4" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.Y3krat.25", "Backdoor/W32.Y3krat.236032", "Backdoor/Y3KRat.25", "Backdoor.Y3krat.25", "Trojan.Win32.Y3KRat.fqmw", "W32/Backdoor.CMH", "Backdoor.Trojan", "Win32/Y3KRat.25", "BKDR_GQ.B", "Trojan.Y3K-3", "Backdoor.Win32.Y3KRat.25", "Backdoor.Y3KRat.AS!AU", "Backdoor.Win32.Y3KRat.236032[h]", "Win32.Backdoor.Y3krat.Ambw", "Backdoor.Y3krat.25", "Backdoor.Win32.Y3KRat.25", "Backdoor.Y3krat.25", "BackDoor.Y3krat.18", "Backdoor.Y3KRat.Win32.115", "BKDR_GQ.B", "BehavesLike.Win32.Dropper.dc", "W32/Backdoor.PBIC-7717", "Backdoor/Y3KRat.25.a", "BDS/Y3kRat.25.5", "W32/Y3krat.25!tr.bdr", "Trojan[Backdoor]/Win32.Y3KRat", "Backdoor.Y3krat.25", "Backdoor.W32.Y3KRat.25!c", "Win-Trojan/Y3KRat.236032", "Backdoor:Win32/Y3KRat.2_5", "Backdoor.RAT.Y3Backdoor.RAT.V1.8.a", "Backdoor.Y3KRat", "Bck/Y3KRat.H", "Backdoor.Win32.Y3KRat", "Backdoor.Y3krat.25", "Backdoor.Win32.Y3KRat.25" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan-PWS/W32.WebGame.161447", "TrojanPSW.OnLineGames.adem", "Trojan-PSW.Win32.OnLineGames.adem", "Win32/PSW.OnLineGames.NNU", "Trojan.Packed.NsAnti", "Trojan.Spy-35117", "Packer.Malware.NSAnti.1", "TrojWare.Win32.PSW.OnLineGames.NNU", "Trojan.PWS.Gamania.9247", "Win32/PSW.OnLineGames.NNU", "Packer.Malware.NSAnti.AL!IK", "Worm:Win32/Taterf.B", "Packer.Malware.NSAnti.1", "Packer.Win32.Mian007.a", "Packer.Malware.NSAnti.AL", "W32/OnLineGames.fam!tr.pws" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Vundo", "Win.Downloader.8632-1", "MalwareScope.Trojan-PSW.Pinch.1", "Trojan.Click.4067", "BehavesLike.Win32.Dropper.lc", "Trojan/Win32.QQPass.R1885" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/Exploit.DCom.naf", "Exploit.Win32.DCom.khbzi", "Win.Trojan.Dcom-2", "Trojan.Peed!mca6fnIo2DU", "Exploit.DCom.6", "Exploit.DCom.Win32.185", "EXP/DCom.Y.13", "Win-Trojan/Berbew.51712", "Exploit:Win32/Dcom.Y", "Exploit.DCom", "Trj/CI.A", "Net-Worm.Win32.Kolab", "Exploit.DCOM.RPC", "Trojan.Win32.DCom.NAF", "Win32/Trojan.Exploit.3e3" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Technical", "Analysis", "The", "malware", "consists", "of", "2", "applications", ":", "The", "Dropper", ":", "Brain", "Test", "(", "Unpacked", "–", "com.mile.brain", ",", "Packed", "–", "com.zmhitlte.brain", ")", "This", "is", "installed", "from", "Google", "Play", "and", "downloads", "an", "exploit", "pack", "from", "the", "server", "to", "obtain", "root", "access", "on", "a", "device", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 1, 16, 16, 16, 16, 16, 5, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.Win64", "Win32.Trojan.WisdomEyes.16070401.9500.9643", "W64/Trojan.JENW-7287", "Trojan.Uboat", "BKDR64_UBOAT.A", "BKDR64_UBOAT.A", "Backdoor:Win64/UBoatRAT.A", "Trj/CI.A", "Backdoor.Rat.UBoatRat" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "Gh0st", "malware", "is", "a", "widely", "used", "remote", "administration", "tool", "RAT", "that", "originated", "in", "China", "in", "the", "early", "2000s." ]
[ 3, 11, 11, 16, 16, 16, 16, 3, 11, 11, 11, 16, 16, 16, 2, 16, 16, 16, 0 ]
[ "A", "popular", "mobile", "messaging", "application,", "LINE", "was", "used", "as", "a", "bait", "to", "lure", "targets", "in", "a", "targeted", "attack", "which", "hit", "Taiwan", "government." ]
[ 16, 16, 16, 16, 16, 4, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 12 ]
[ "The", "number", "continues", "to", "rise", "at", "an", "additional", "13,000", "breached", "devices", "each", "day", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/W32.Karba.24576", "TrojanAPT.Garveep.DL4", "Win32.Trojan.WisdomEyes.16070401.9500.9996", "Trojan.Win32.Karba.ai", "Trojan.Win32.DownLoad3.cztnhk", "Win32.Trojan.Karba.Pdvp", "TrojWare.Win32.Dialer.AFXP", "Trojan.DownLoad3.18105", "Trojan.Karba.Win32.9", "W32/Trojan.DWPP-4593", "TR/Spy.mulkf", "Trojan.DarkHotel.23", "Trojan.Win32.Karba.ai", "Win32/Trojan.7fa" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.TDss.ET", "Trojan.TDSS", "Trojan.TDss.ET", "WORM_TDSS.SMY", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "WORM_TDSS.SMY", "Trojan.TDss.ET", "Packed.Win32.TDSS.f", "Trojan.TDss.ET", "Trojan.Win32.Tdss.btyvr", "Trojan.Win32.Z.Tdss.23552.A", "Packer.W32.Tdss.kYT0", "Trojan.TDss.ET", "Win32.PkdTdss", "Trojan.Packed.365", "Trojan.Kryptik.Win32.1293691", "BehavesLike.Win32.FakeAlert.mh", "Trojan.Win32.Alureon", "Trojan[Packed]/Win32.TDSS", "Win32.Troj.TdssT.jr.102400", "Trojan.TDss.ET", "Packed.Win32.TDSS.f", "TrojanDownloader:Win32/Rugzip.A", "Packed/Win32.Tdss.C53201", "Trojan.TDSS.01414", "Win32.Packed.Tdss.Pgdn", "W32/PackTDssfilter.I!tr", "Win32/Trojan.d9b" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Not", "long", "after", "this", "variant", "was", "public", ",", "newer", "variants", "of", "HenBox", "were", "seen", ",", "and", "some", "had", "significant", "increases", "in", "the", "number", "of", "targeted", "apps", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "change", "in", "the", "way", "the", "malware", "works", "today", "may", "be", "to", "help", "finance", "the", "campaign", "through", "fraudulent", "ad", "activity", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "On", "the", "27th", "of", "June", "2017,", "a", "new", "cyberattack", "hit", "many", "computer", "systems", "in", "Ukraine,", "as", "well", "as", "in", "other", "countries." ]
[ 16, 16, 0, 8, 8, 8, 1, 9, 9, 16, 16, 5, 13, 16, 2, 16, 16, 16, 16, 2, 10 ]
[ "The", "stolen", "data", "fields", "are", ":", "Mobile", "-", "The", "infected", "device", "phone", "number", "Machine", "-", "The", "device", "model", "(", "in", "our", "example", ":", "Google", "Pixel", "2", ")", "Sversion", "-", "The", "OS", "version", "Bank", "-", "Checks", "if", "there", "are", "any", "banking-related", "or", "cryptocurrency", "trading", "apps", "Provider", "-", "The", "telecommunication", "provider", "(", "IMSI", "value", "in", "device", "settings", ")", "npki", "-", "Checks", "if", "the", "folder", "named", "NPKI", "(", "National", "Public", "Key", "Infrastructure", ")", "might", "contain", "authentication", "certificates", "related", "to", "financial", "transactions", "onStartCommand", "function", "for", "stealing", "device", "information", "and", "additional", "sensitive", "data", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.RansomeDNZ.Trojan", "Ransom/W32.crysis.94720", "Ransom.Crysis.S162740", "Trojan/Filecoder.Crysis.l", "Win32.Trojan.WisdomEyes.16070401.9500.9991", "W32/Wadhrama.B", "Win32.Trojan-Ransom.VirusEncoder.A", "Trojan-Ransom.Win32.Crusis.to", "Trojan.Win32.Filecoder.emdnxn", "Trojan.Win32.Ransom.94720.F", "Troj.Ransom.W32.Crusis.tpcS", "TrojWare.Win32.Crysis.D", "Trojan.Encoder.3953", "Trojan.Crusis.Win32.806", "BehavesLike.Win32.Ransom.nc", "Trojan-Ransom.Crysis", "W32/Trojan.ILHO-9216", "Trojan.Crypren.ic", "Trojan.Ransom.Crysis.6", "Ransom.Crysis/Variant", "Trojan-Ransom.Win32.Crusis.to", "Trojan.Ransom.Crysis", "Hoax.Crusis", "Trj/GdSda.A", "Trojan-Ransom.Win32.Crysis.a", "W32/Crysis.L!tr.ransom", "Win32/Trojan.Ransom.f44" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "It", "sets", "particular", "parameters", "in", "relation", "to", "call", "details", "and", "a", "further", "service", "named", "calls", "takes", "the", "control", "as", "seen", "in", "Figure", "5", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "This", "module", "injects", "code", "into", "running", "Google", "Play", "or", "GMS", "(", "Google", "Mobile", "Services", ")", "to", "mimic", "user", "behavior", "so", "Gooligan", "can", "avoid", "detection", ",", "a", "technique", "first", "seen", "with", "the", "mobile", "malware", "HummingBad", "." ]
[ 16, 16, 16, 16, 16, 16, 5, 13, 16, 5, 13, 13, 13, 13, 13, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Nagoot.FC.161", "MSIL.Trojan.Injector.l", "W32/Trojan.MIPO-0322", "Downloader.Ponik", "Trojan.Win32.Inject1.exqnlv", "Trojan.Win32.Z.Nagoot.68608.A", "Trojan.Inject1.54664", "Trojan.MSIL.Nagoot", "TR/Dropper.MSIL.rjbya", "Trojan.MSIL.Bladabindi.1", "Trojan:MSIL/Nagoot.A", "Trojan.PasswordStealer", "Trj/GdSda.A", "MSIL/Injector.IFP!tr", "Win32/Trojan.62b" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "This", "malware-life-cycle", "has", "been", "observed", "to", "reoccur", "every", "few", "years", ",", "bringing", "new", "malware", "families", "into", "light", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "In", "recent", "years", ",", "some", "malicious", "Android", "applications", "abused", "these", "accessibility", "services", "in", "various", "attack", "scenarios", "." ]
[ 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Allows", "an", "application", "to", "read", "from", "external", "storage", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.XhglJIK1DLL.Rootkit", "Trojan/W32.Cariez.32768.AU", "BackDoor-DTL.a", "Trojan.Cariez.Win32.270", "Trojan/Koutodoor.dx", "TROJ_CARIEZ.SMA", "Win32.Trojan.WisdomEyes.16070401.9500.9997", "TROJ_CARIEZ.SMA", "Win.Trojan.Cariez-189", "Trojan.Win32.Cariez.a", "Trojan.Win32.Cariez.byufu", "TrojWare.Win32.Zybr.A", "Trojan.RKDoor.59", "BackDoor-DTL.a", "Trojan.Win32.Cariez", "Trojan/Win32.Cariez", "Adware.Heur.E02D22", "Trojan.Win32.Cariez.a", "Trojan:Win32/Cariez.A", "Backdoor/Win32.Koutodoor.R1208", "TScope.Malware-Cryptor.SB", "Trj/Cariez.A", "Trojan.Win32.Cariez.bhg" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "While", "Japan", "is", "still", "the", "most", "heavily", "targeted", "geographic", "region", "by", "this", "particular", "actor,", "we", "also", "observed", "instances", "where", "individuals", "or", "organizations", "in", "Taiwan,", "Tibet,", "and", "Russia", "also", "may", "have", "been", "targeted." ]
[ 16, 2, 16, 16, 16, 16, 16, 16, 2, 10, 16, 16, 16, 6, 16, 16, 16, 16, 16, 4, 16, 4, 16, 2, 10, 16, 2, 16, 16, 16, 16, 16 ]
[ "This", "report", "describes", "an", "extensive", "malware,", "phishing,", "and", "disinformation", "campaign", "active", "in", "several", "Latin", "American", "countries,", "including", "Ecuador,", "Argentina,", "Venezuela,", "and", "Brazil." ]
[ 16, 16, 16, 16, 16, 3, 6, 16, 6, 14, 16, 16, 16, 2, 10, 10, 16, 2, 2, 2, 16, 2 ]
[ "This", "blog", "links", "this", "recent", "activity", "with", "previous", "isolated", "public", "reporting", "on", "similar", "attacks", "we", "believe", "are", "related." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Collection", "of", "payloads", "being", "delivered", "via", "the", "Apache", "Struts", "vulnerability", "-", "CVE-2017-5638" ]
[ 16, 16, 3, 16, 16, 16, 7, 15, 15, 15, 16, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.Gargamel.A", "Backdoor.Gargamel.A", "Backdoor.Trojan", "BKDR_GARGAM.A", "Backdoor.Win32.Gargamel.a", "Backdoor.Gargamel.A", "Backdoor.Gargamel!8hABCfPKz0o", "Backdoor.Win32.Gargamel.Downloader", "Backdoor.Gargamel.A", "BackDoor.Gargamel", "BDS/Gargamel.A.10", "BKDR_GARGAM.A", "Win-Trojan/Gargamel.17717", "Backdoor.Gargamel.A", "Backdoor.Trojan", "Win32/Gargamel.Downloader", "Backdoor.Win32.Gargamel", "W32/Uploade.B!tr.bdr", "BackDoor.Gargamel.B" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "KillCMOS.K", "Trojan.KillCMOS.O", "Trojan.KillCMOS.O", "Trojan.KillCMOS.O", "Trojan.KillCMOS.O", "TROJ_KILLCMOS.L", "Win.Trojan.KillCMOS-14", "Trojan.KillCMOS.O", "Trojan.DOS.KillCMOS.k", "Trojan.Dos.KillCMOS.blmit", "Troj.DOS.KillCMOS.k!c", "Trojan.KillCMOS.O", "Trojan.KillCMOS.O", "TROJ_KILLCMOS.L", "KillCMOS.h", "TR/KillCMOS.J", "Trojan:DOS/KillCMOS.remnants", "Trojan.DOS.KillCMOS.k", "KillCMOS.h", "Dos.Trojan.Killcmos.Ebgc", "Trojan.KillCMOS", "Trj/KillCMOS.K", "Win32/Trojan.8f3" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W97M.Downloader.DF", "HEUR.VBA.Trojan.e", "W2KM_DLOADR.YYSQD", "Trojan-Dropper:W97M/MaliciousMacro.B", "W2KM_DLOADR.YYSQD", "TrojanDropper:W97M/Miskip.B!dha", "Trojan-Dropper.W97M.Miskip", "heur.macro.infect.l" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.OnGameELIYTAAD.Trojan", "Trojan-Ransom.Win32.Blocker!O", "Backdoor.Bustem.A5", "Trojan.BCMiner", "Troj.Ransom.W32.Blocker!c", "Trojan.Johnnie.D545", "TSPY_DOWNLOADER_CA0827C3.TOMC", "Trojan-Ransom.Win32.Blocker.jcku", "Trojan.Win32.AVKill.dqatba", "Trojan.Win32.A.Scar.118272.A", "Trojan.AVKill.11731", "TSPY_DOWNLOADER_CA0827C3.TOMC", "BehavesLike.Win32.LoadMoney.ch", "Backdoor.Win32.Bustem", "Trojan/Win32.Unknown", "Backdoor:Win32/Bustem.A", "Trojan-Ransom.Win32.Blocker.jcku", "Trojan/Win32.Downloader.R14675", "Hoax.Blocker", "Trojan-ransom.Win32.Blocker.cwfe", "Win32/RootKit.Rootkit.7e5" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "growing", "number", "of", "samples", "demonstrate", "that", "criminals", "are", "actively", "adopting", "this", "malware." ]
[ 16, 16, 16, 16, 16, 16, 16, 6, 16, 16, 16, 16, 3 ]
[ "A", "backdoor", "also", "known", "as:", "Hoax.Win32.BadJoke!O", "W32/Joke.O", "Joke.Irritan", "JOKE_IRRITAN.A", "Hoax.Win32.BadJoke.Irritan", "Riskware.Win32.Irritan.hrfs", "Joke.Win32.Irritan.A", "FDOS.Winskill", "Backdoor.PePatch.Win32.34151", "JOKE_IRRITAN.A", "W32/Joke.ASXP-0124", "not-virus:Joke.Win32.Irritan", "JOKE/Irritan.A", "HackTool[Hoax]/Win32.Irritan", "Win32.Joke.Irritan.kcloud", "Win-AppCare/Irritan.248877", "Trojan.Win32.BadJoke.AD", "Win32/Irritan.A", "Hoax.Win32.BadJoke.Irritan", "Win32/Joke.bee" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Threat", "actors", "are", "taking", "advantage", "of", "Microsoft", "OneNote's", "ability", "to", "embed", "files", "and", "use", "social", "engineering", "techniques,", "such", "as", "phishing", "emails", "and", "lures", "inside", "the", "OneNote", "document,", "to", "get", "unsuspecting", "users", "to", "download", "and", "open", "malicious", "files." ]
[ 6, 14, 16, 16, 16, 16, 5, 13, 16, 16, 1, 9, 16, 16, 16, 16, 16, 16, 16, 1, 9, 16, 16, 16, 16, 1, 9, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11 ]
[ "The", "pushTAN", "method", "has", "a", "clear", "advantage", ":", "It", "improves", "security", "by", "mitigating", "the", "risk", "of", "SIM", "swapping", "attacks", "and", "SMS", "stealers", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "As", "this", "is", "a", "complex", "process", ",", "we", "recommend", "powering", "off", "your", "device", "and", "approaching", "a", "certified", "technician", ",", "or", "your", "mobile", "service", "provider", ",", "to", "request", "that", "your", "device", "be", "“", "re-flashed.", "”", "Change", "your", "Google", "account", "passwords", "immediately", "after", "this", "process", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16, 16, 16, 16, 16, 16, 16 ]
[ "With", "this", "group", "being", "active", "for", "roughly", "one", "year,", "we", "decided", "to", "revisit", "this", "threat", "to", "determine", "what,", "if", "any,", "changes", "had", "been", "made", "to", "their", "toolset." ]
[ 16, 16, 4, 16, 16, 16, 16, 0, 8, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan-Dropper/W32.Stabs.90045", "TrojanDropper.Stabs.cvo", "Trojan/Dropper.Stabs.dka", "Win32/Bifrose.NDU", "W32/Trojan2.HEAS", "W32/Smalltroj.QFFP", "BKDR_BIFROSE.SMC", "BackDoor.IRC.Sdbot.3713", "BKDR_BIFROSE.SMC", "Trojan-Downloader.Win32.Buzus!IK", "W32/Trojan2.HEAS", "TrojanDownloader:Win32/Buzus.F", "Trojan-Downloader.Win32.Buzus", "W32/Injector.IA!tr", "Trj/Buzus.AH" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "These", "components", "include", "a", "unique", "loader,", "downloader,", "and", "not", "one", "but", "two", "different", "trojan", "components." ]
[ 16, 16, 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 3, 16 ]
[ "ALLCONTACTS", "–", "send", "all", "contacts", "from", "phone", "memory", "to", "C", "&", "C", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "URL", "—", "update", "C", "&", "C", "address", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "]", "com", "are", "or", "were", "intended", "for", "malicious", "use", "." ]
[ 9, 9, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "**Dump", "Domain", "Registration", "Patterns:*From", "about", "2015", "to", "at", "least", "October", "2018", "possibly", "longer,", "IBM", "X-Force", "assesses", "that", "ITG08's", "POS", "malware", "used", "the", "same", "notable", "domain", "naming", "convention:", "all", "known", "dump", "domains", "used", "by", "FrameworkPOS", "and", "GratefulPOS", "contained", "the", "same", "base", "name", "-akamaitechnologies.com.", "In", "fact,", "all", "said", "domains", "are", "nearly", "identical", "looking", "to", "a", "legitimate", "Akamai", "content", "delivery", "network", "CDN", "domain,", "differing", "only", "by", "a", "single", "character", "replacing", "a", ".'", "with", "-", "." ]
[ 4, 12, 12, 12, 16, 0, 8, 8, 8, 8, 8, 16, 16, 4, 12, 16, 16, 3, 11, 11, 16, 16, 16, 16, 1, 9, 9, 16, 16, 16, 16, 16, 16, 3, 16, 3, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 1, 9, 5, 13, 13, 13, 1, 16, 16, 16, 1, 9, 9, 9, 9, 9, 9, 9, 9 ]
[ "A", "backdoor", "also", "known", "as:", "Script.SWF.C603", "Exp.SWF.Rig.EK.4476", "Exploit.SWF.Downloader", "SWF_EXKIT.THAAEH", "Script.SWF.C603", "Script.SWF.C603", "SWF.S.Exploit.13894", "Script.SWF.C603", "Script.SWF.C603", "Exploit.SWF.1232", "SWF_EXKIT.THAAEH", "SWF/Exploit-Rig.h", "SWF/Trojan.VJFQ-3", "Script.SWF.C603", "SWF/Exploit-Rig.h", "Trojan.SWF.Exploit", "swf.cve-2015-8651.rig.a" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Adobe", "independently", "patched", "the", "vulnerability", "CVE-2015-3043", "in", "APSB15-06." ]
[ 4, 16, 16, 16, 7, 15, 16, 16 ]
[ "INTERNET", "-", "Allows", "the", "application", "to", "open", "network", "sockets", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "In", "fact", ",", "the", "applications", "are", "designed", "to", "download", "the", "autorun.inf", "file", ",", "an", "icon", "file", "and", "the", "win32-Trojan", "file", ",", "which", "the", "mobile", "malicious", "program", "locates", "in", "the", "root", "directory", "of", "an", "SD", "card", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 16 ]
[ "The", "KOVTER", "malware", "embeds", "a", "JavaScript", "into", "the", "registry", "and", "executes", "a", "PowerShell", "script", "which", "eventually", "loads", "the", "main", "KOVTER", "binaries." ]
[ 3, 11, 11, 16, 16, 1, 16, 16, 16, 16, 16, 16, 1, 9, 16, 16, 1, 9, 9, 9, 9 ]
[ "It", "indicates", "perhaps", "an", "interesting", "trend", "which", "is", "exploiting", "the", "trust", "relationships", "between", "the", "two", "communities", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "CSIS", "has", "been", "informed", "about", "a", "number", "of", "targeted", "spear", "phishing", "attacks", "against", "Danish", "chiropractors." ]
[ 4, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 9, 16, 4, 12 ]
[ "The", "attackers", "send", "fake", "text", "messages", "to", "lure", "the", "victims", "to", "click", "on", "a", "malicious", "link", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "developer", "of", "the", "code", ",", "Shanghai", "Adups", "Technology", "Co.", ",", "has", "apologized", ",", "contending", "that", "the", "code", "was", "intended", "for", "another", "one", "of", "its", "clients", "who", "requested", "better", "blocking", "of", "junk", "text", "messages", "and", "marketing", "calls", "." ]
[ 16, 16, 16, 16, 16, 16, 4, 12, 12, 12, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "group", "focuses", "on", "companies", "that", "have", "intellectual", "property", "or", "sensitive", "information", "like", "those", "in", "the", "Defense", "and", "High-Tech", "industries." ]
[ 6, 14, 16, 16, 4, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 12, 16, 4, 12 ]
[ "If", "the", "phone", "is", "attached", "to", "a", "bank", "card", ",", "commands", "are", "sent", "from", "the", "C", "&", "C", "server", "with", "instructions", "to", "transfer", "money", "from", "the", "user", "’", "s", "bank", "account", "to", "his/her", "mobile", "account", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Users", "of", "iOS", "can", "remove", "the", "malicious", "profile", "using", "the", "Apple", "Configurator", "2", ",", "Apple", "’", "s", "official", "iOS", "helper", "app", "for", "managing", "Apple", "devices", "." ]
[ 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 4, 16, 16, 16, 4, 16, 16, 16, 5, 16, 16, 16, 16, 4, 16, 16 ]
[ "However", ",", "Talos", "has", "identified", "that", "was", "used", "at", "least", "since", "November", "2018", "." ]
[ 16, 16, 4, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "TjnDownldr.SmaCod.S162507", "Downloader.Tiny.Win32.8086", "Win32.Trojan.WisdomEyes.16070401.9500.9968", "Trojan.Win32.Tiny.elyeva", "TrojWare.Win32.TrojanDownloader.Tiny.NNO", "Trojan-Downloader.Win32.Tiny", "Trojan.Mikey.DECAC", "Trojan/Win32.Downloader.R193768", "OScope.Trojan.0216", "W32/Tiny.NNO!tr", "Win32/Trojan.823" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Uds.Dangerousobject.Multi!c", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "TR/Downloader.A.2357", "Trojan.Kazy.D60565", "TrojanDownloader:MSIL/Muxtart.A", "Win32.Trojan.Downloader.Szlu" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1 ]
[ "Despite", "having", "a", "reputation", "of", "evolution,", "there", "doesn't", "seem", "to", "be", "very", "many", "recent", "updates", "on", "this", "malware", "family", "though." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "latest", "round", "of", "attacks", "in", "2015", "uses", "a", "stolen", "code", "signing", "certificate", "belonging", "to", "Taiwanese", "electronics", "maker", "Acer", "and", "an", "unknown", "Flash", "Player", "exploit." ]
[ 16, 16, 16, 16, 16, 16, 0, 16, 16, 1, 9, 9, 9, 16, 16, 4, 12, 12, 12, 16, 16, 3, 11, 11, 11 ]
[ "However,", "in", "addition", "to", "new", "variants", "of", "malicious", ".hta,", "we", "find", "new", "victims,", ".rar", "attachments", "with", "RTLO", "spearphishing,", "and", "the", "deployment", "of", "a", "0day", "from", "Hacking", "Team." ]
[ 16, 16, 16, 16, 16, 16, 16, 3, 1, 16, 16, 16, 16, 1, 9, 16, 1, 9, 16, 16, 16, 16, 16, 7, 16, 4, 12 ]