tokens
sequencelengths
2
296
ner_tags
sequencelengths
2
296
[ "A", "backdoor", "also", "known", "as:", "TjnClicker.Qaccel.S1448", "Trojan.Small.Win32.31852", "Trojan/Clicker.Small.ndn", "Trojan.Win32.Click3.erajhs", "TrojWare.Win32.TrojanClicker.Small.DS", "Trojan.Click3.21941", "TR/Dropper.tstkm", "GrayWare[AdWare]/Win32.TrojanClicker.Small.ndn", "Trojan/Win32.Dynamer.R187373", "Backdoor.Bot", "Trojan.Win32.TrojanClicker" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "First", ",", "there", "is", "a", "small", "dropper", ",", "then", "a", "large", "second", "stage", "payload", "that", "contains", "multiple", "binaries", "(", "where", "most", "of", "the", "surveillance", "functionality", "is", "implemented", ")", ",", "and", "finally", "a", "third", "stage", "which", "typically", "uses", "the", "DirtyCOW", "exploit", "(", "CVE-2016-5195", ")", "to", "obtain", "root", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 7, 15, 16, 7, 16, 16, 16, 16, 16 ]
[ "For", "example", ":", "Conclusions", "The", "Skygofree", "Android", "implant", "is", "one", "of", "the", "most", "powerful", "spyware", "tools", "that", "we", "have", "ever", "seen", "for", "this", "platform", "." ]
[ 16, 16, 16, 16, 16, 3, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Figure", "4", "shows", "the", "download", "prompt", "for", "this", "fake", "app", ";", "an", "English", "translation", "follows", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "So", "we", "recommend", "installing", "an", "anti-virus", "solution", "on", "your", "Android", "device", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "macOS", "malware", "agent,", "named", "MacDownloader,", "was", "observed", "in", "the", "wild", "as", "targeting", "the", "defense", "industrial", "base,", "and", "reported", "elsewhere", "to", "have", "been", "used", "against", "an", "human", "rights", "advocate." ]
[ 16, 5, 3, 11, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 4, 12, 12, 16, 16, 16, 16, 16, 16, 16, 16, 4, 12, 12, 12 ]
[ "However", ",", "successfully", "installing", "this", "malicious", "APK", "requires", "that", "the", "user", "has", "allowed", "the", "installation", "of", "such", "apps", "as", "controlled", "in", "the", "Unknown", "Sources", "settings", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.Clod740.Trojan.4797", "Backdoor.Bittaru!1goVteZqWDk", "TROJ_SPNR.15KL11", "MalCrypt.Indus!", "BDS/Bittaru.A.4", "TROJ_SPNR.15KL11", "Win32.Troj.Undef.kcloud", "Backdoor:Win32/Bittaru.A", "W32/Trojan.PAFV-2148", "W32/BackDoor.DPM!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.MSIL.Disfa" ]
[ 16, 3, 16, 16, 16, 1 ]
[ "A", "backdoor", "also", "known", "as:", "MemScan:Trojan.Glitch.A", "Trojan-Dropper.Win32.Juntador!O", "MemScan:Trojan.Glitch.A", "Trojan/Dropper.Juntador.c", "Trojan.Glitch.A", "W32/Dropper.ATCT", "Backdoor.IRC.Zcrew", "TROJ_JUNTADOR.C", "Win.Dropper.Juntador-12", "MemScan:Trojan.Glitch.A", "Trojan-Dropper.Win32.Delf.hq", "MemScan:Trojan.Glitch.A", "Trojan.Win32.Juntador.diov", "MemScan:Trojan.Glitch.A", "TrojWare.Win32.TrojanDropper.Juntador.c0", "MemScan:Trojan.Glitch.A", "BackDoor.DMoon", "Dropper.Juntador.Win32.230", "TROJ_JUNTADOR.C", "BehavesLike.Win32.Dropper.hc", "W32/Risk.HJDZ-9373", "TrojanDropper.Win32.Juntador.c", "TrojanDropper:Win32/Juntador.C", "Trojan-Dropper.Win32.Delf.hq", "Trojan/Win32.LdPinch.C10075", "Win32/TrojanDropper.Juntador.C", "Win32.Trojan-dropper.Delf.Eegz", "Trojan-Dropper.Win32.Juntador.C", "Win32/Trojan.bf1" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Many", "other", "banking", "malware", "families", "followed", "suit", "and", "released", "their", "own", "Android", "malware", "components", "designed", "to", "steal", "those", "OTPs", "and", "TANs", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Script.Application.CdEject.A", "Script.Application.Cdeject!c", "BehavesLike.Win32.PUPXBC.dc", "Joke:VBS/CDEject.D", "PUP.Linkury/Variant", "Trojan.Ejectcd.A", "VBS/CDEject.I", "Backdoor.MSIL.Bladabindi", "VBS/CDEject.I!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Symantec", "has", "identified", "a", "previously", "unknown", "group", "called", "Sowbug", "that", "has", "been", "conducting", "highly", "targeted", "cyber", "attacks", "against", "organizations", "in", "South", "America", "and", "Southeast", "Asia", "and", "appears", "to", "be", "heavily", "focused", "on", "foreign", "policy", "institutions", "and", "diplomatic", "targets." ]
[ 4, 16, 16, 16, 16, 6, 14, 16, 6, 16, 16, 16, 16, 16, 16, 1, 9, 16, 4, 16, 2, 10, 16, 2, 10, 16, 16, 16, 16, 16, 16, 16, 4, 12, 12, 16, 4, 12 ]
[ "This", "disabled", "the", "attacker's", "access", "to", "their", "victims", "in", "this", "campaign,", "provided", "further", "insight", "into", "the", "targets", "currently", "victimized", "in", "this", "operation,", "and", "enabled", "the", "notification", "of", "affected", "parties." ]
[ 16, 16, 16, 6, 16, 16, 16, 16, 16, 16, 6, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 6, 16, 16, 16, 16, 16, 16, 16 ]
[ "Figure", "2", ":", "β€œ", "Agent", "Smith", "’", "s", "jpg", "file", "structure", "After", "the", "extraction", ",", "the", "β€œ", "loader", "”", "module", "adds", "the", "code", "to", "the", "application", "while", "using", "the", "legitimate", "mechanism", "by", "Android", "to", "handle", "large", "DEX", "files", "." ]
[ 16, 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16 ]
[ "All", "the", "observed", "landing", "pages", "mimic", "the", "mobile", "operators", "’", "web", "pages", "through", "their", "domain", "name", "and", "web", "page", "content", "as", "well", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "app", "that", "resulted", "in", "the", "largest", "number", "of", "affected", "users", "was", "the", "click", "fraud", "version", ",", "which", "was", "installed", "over", "170,000", "times", "at", "its", "peak", "in", "February", "2018", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Finally,", "Doctor", "Web's", "security", "researchers", "investigated", "the", "Linux.Mirai", "Trojan", "found", "later", "that", "month." ]
[ 16, 4, 12, 12, 12, 16, 16, 1, 3, 16, 0, 8, 8 ]
[ "A", "backdoor", "also", "known", "as:", "Virus.Win32.Sality!O", "Backdoor.Poison.Win32.26527", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Trojan.Win32.VBKrypt.hjcg", "Trojan.Win32.VB.dodqqz", "Troj.W32.VBKrypt.hjcg!c", "Trojan.MulDrop2.20812", "Backdoor/Poison.eqy", "Trojan/Win32.VBKrypt", "TrojanDownloader:Win32/Tyqui.B", "Trojan.Win32.VBKrypt.hjcg", "Trj/CI.A", "Win32/TrojanDownloader.VB.ODM", "Trojan.VBKrypt!ngQI4PCHe4I", "Backdoor.Poison", "W32/Dx.TQG!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "As", "of", "this", "writing", ",", "all", "the", "domains", "were", "registered", "recently", "and", "some", "are", "already", "offline", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "PERL/Shellbot.B", "Backdoor.Perl.Shellbot.B", "Perl/Shellbot.PR", "Perl.Backdoor.Shellbot.f", "Unix/ShellBot.AH", "IRC.Backdoor.Trojan", "Perl/Shellbot.NAI", "PERL_SHELBOT.SMO", "Win.Trojan.Perlbot-1", "Backdoor.Perl.IRCBot.ij", "Backdoor.Perl.Shellbot.B", "Backdoor.Perl.Ircbot!c", "Perl.Backdoor.Ircbot.Akpo", "Backdoor.Perl.Shellbot.B", "Backdoor.Perl.Shellbot.B", "Perl.Ircbot.93", "PERL_SHELBOT.SMO", "Unix/ShellBot.AH", "PERL/Shellbot.aa", "Perl/IRCBot.I!tr", "Backdoor.Perl.Shellbot.B", "Backdoor.Perl.IRCBot.ij", "Backdoor:Perl/Shellbot.Z", "Backdoor.Perl.Shellbot.B", "Perl.Shellbot.I", "Trojan.Perl.Shellbot", "Backdoor.Perl.Shellbot.B", "Win32/Trojan.BO.811" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Then", ",", "the", "APK", "is", "installed", "as", "system", "application", "and", "registers", "listener", "on", "USER_PRESENT", "event", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.MSIL", "Win32.Trojan.WisdomEyes.16070401.9500.9928", "W32/Trojan.GELV-4208", "Backdoor.MSIL.Bladabindi.akrb", "Trojan.Win32.Bladabindi.extavb", "Backdoor.Msil.Bladabindi!c", "Msil.Backdoor.Bladabindi.Wmjd", "BackDoor.Bladabindi.13678", "Backdoor.Bladabindi.Win32.8723", "Trojan.MSIL.Injector", "Trojan:Win32/Vb.At", "TR/Crypt.fkm.udrkf", "Trojan[Backdoor]/MSIL.Bladabindi", "Trojan.MSIL.Bladabindi.1", "Trojan.Win32.Z.Bladabindi.192000.A", "Backdoor.MSIL.Bladabindi.akrb", "Trojan:MSIL/Inmalsal.A", "MSIL/Kryptik.GJY!tr", "Trj/GdSda.A", "Win32/Trojan.BO.610" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Constructor.Win32.Houndhack!O", "Backdoor.Venik.MUE.J2", "Trojan/Farfli.bwm", "BKDR_VENIK_EL150010.UVPM", "Constructor.Win32.Houndhack.a", "Riskware.Win32.Houndhack.erbccv", "Trojan.DownLoader17.62076", "BKDR_VENIK_EL150010.UVPM", "BehavesLike.Win32.Backdoor.dc", "HackTool[Constructor]/Win32.Houndhack", "Trojan.Zusy.D35C86", "Constructor.Win32.Houndhack.a", "Backdoor:Win32/Venik.J", "Backdoor/Win32.Venik.R169912", "Constructor.Houndhack", "Constructor.Houndhack!", "Trojan.Constructor" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Application.BitCoinMiner.ZM", "Trojan.BitMiner", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Trojan.Win32.BitCoinMiner.agl", "Riskware.Win64.BitMiner.ewyekq", "BehavesLike.Win32.AdwareLinkury.vc", "PUA/CoinMiner.B", "Trojan/Win32.BitCoinMiner", "Trojan.Win32.BitCoinMiner.agl", "Trojan.Win32.BitcoinMiner" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Win32.Small!O", "Trojan.Maptsc", "Trojan.Small.Win32.19366", "Trojan.Heur.RP.EAC7EB", "TROJ_SMALL.NHQ", "Trojan.Win32.Small.cpb", "Trojan.Win32.Small.ebpbhy", "Troj.W32.Small.cpb!c", "Trojan.Click2.55177", "TROJ_SMALL.NHQ", "Trojan.Win32.Small", "W32/Trojan.ZWIN-6050", "Trojan/Small.ovd", "TR/Spy.6656.172", "Trojan/Win32.Small", "Trojan:Win32/Maptsc.A", "Trojan.Win32.Small.cpb", "Trojan/Win32.Connapts.C256364", "Trojan.Small.cpb", "Trojan.Small", "Win32.Trojan.Small.Edod", "Trojan.Click!cGVrs+boA6s", "Win32/Trojan.4c4" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "We", "found", "280", "such", "apps", "in", "the", "past", "three", "months", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "evidence", "above", "suggests", "that", "EventBot", "is", "still", "in", "the", "development", "stage", ",", "and", "as", "such", ",", "is", "not", "likely", "to", "have", "been", "used", "for", "large", "attack", "campaigns", "thus", "far", "." ]
[ 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "At", "the", "time", "of", "writing", ",", "the", "content", "served", "at", "the", "given", "URL", "on", "uyghurapps", "[", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 9 ]
[ "READ_CONTACTS", "-", "Allows", "the", "application", "to", "read", "the", "user", "'s", "contacts", "data", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "More", "information", "from", "PWC", "about", "Sofacy", "Bedep", "malware", "using", "DGA", "CozyDuke", "aka", "CozyBear,", "CozyCar", "or", "Office", "Monkeys", "is", "a", "threat", "actor", "that", "became", "increasingly", "active", "in", "the", "2nd", "half", "of", "2014", "and", "hit", "a", "variety", "of", "targets." ]
[ 16, 16, 16, 4, 16, 3, 11, 11, 16, 16, 6, 14, 14, 14, 16, 6, 14, 16, 16, 6, 14, 16, 16, 16, 16, 16, 16, 16, 16, 16, 0, 16, 16, 16, 16, 16, 16 ]
[ "Though", "different", "versions", "of", "the", "app", "vary", "in", "structure", ",", "malicious", "code", "was", "initialized", "at", "application", "launch", "without", "the", "user", "’", "s", "knowledge", ",", "and", "a", "number", "of", "timers", "were", "setup", "to", "gather", "and", "upload", "data", "periodically", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Moreover", ",", "eSurv", "was", "a", "business", "unit", "of", "Connexxa", "and", "was", "leased", "to", "eSurv", "S.R.L", "in", "2014", "." ]
[ 16, 16, 4, 16, 16, 16, 16, 16, 4, 16, 16, 16, 16, 4, 12, 16, 16, 16 ]
[ "It", "’", "s", "not", "a", "definite", "correlation", ",", "but", "Bouncing", "Golf", "also", "seems", "to", "have", "a", "connection", "with", "Domestic", "Kitten", "due", "to", "similarities", "we", "found", "in", "their", "code", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "In", "the", "email", "screenshot", "with", "our", "added", "machine", "translation", "from", "Russian,", "notice", "the", "subject", "line", "and", "message", "body", "text", "reflecting", "a", "business", "customer", "upset", "about", "extra", "charges", "on", "his", "credit", "card", "social", "engineering", "theme." ]
[ 16, 16, 1, 16, 16, 16, 5, 13, 13, 16, 2, 16, 16, 1, 16, 16, 16, 16, 16, 16, 4, 12, 12, 16, 16, 16, 16, 16, 16, 1, 9, 9, 9, 9 ]
[ "A", "backdoor", "also", "known", "as:", "W32.GarusenV.Trojan", "Worm/W32.Vobfus.225280", "Worm.Win32.Vobfus!O", "W32/Vobfus.io", "Trojan.Barys.950", "WORM_VOBFUS.SM02", "Win32.Trojan.VBObfus.f", "WORM_VOBFUS.SM02", "Win.Trojan.Vobfus-28", "Worm.Win32.Vobfus.biec", "Trojan.Win32.WBNA.cihuhh", "Worm.Win32.A.Vobfus.225280", "TrojWare.Win32.Pronny.EE", "Trojan.VbCrypt.60", "BehavesLike.Win32.VBObfus.dm", "Worm.Win32.Vobfus", "Worm/WBNA.dfdh", "WORM/Vobfus.dbmnua", "Worm.Win32.Vobfus.biec", "Trojan/Win32.Vobfus.R36953", "BScope.Trojan.Diple", "Win32/Pronny.EJ", "W32/Vobfus.GEW.worm" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "However", ",", "in", "2013", ",", "autonomous", "mobile", "banking", "Trojans", "developed", "further", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "For", "instance", ",", "in", "the", "case", "of", "the", "β€œ", "Execute", "”", "opcode", "(", "0x17", ")", ",", "the", "32-bit", "code", "to", "run", "is", "stored", "entirely", "into", "the", "variable", "section", "with", "the", "value", "at", "offset", "5", "specifying", "the", "number", "of", "bytes", "to", "be", "copied", "and", "executed", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "These", "have", "been", "the", "attacks", "on", "Saudi", "Arabian", "companies", "where", "a", "destructive", "malware", "known", "as", "Disttrack", "was", "deployed." ]
[ 16, 16, 16, 16, 1, 16, 4, 12, 12, 16, 16, 3, 11, 16, 16, 3, 16, 16 ]
[ "In", "addition,", "we", "found", "that", "the", "infrastructure", "used", "in", "this", "case", "overlaps", "with", "FindPOS/PoSeidon", "as", "well", "as", "Chanitor", "and", "sits", "amidst", "a", "cluster", "of", "largely", "indiscriminate", "malicious", "activity." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/W32.Chifrax.150357", "Trojan.Chifrax.rw5", "Trojan/Chifrax.a", "BKDR_POISON.VA", "W32/Poison.AX", "Backdoor.Odivy", "Win32/Poison.AAE", "BKDR_POISON.VA", "Win.Trojan.Poison-11", "Trojan.Win32.Chifrax.a", "Trojan.Win32.Chifrax.fwpet", "Trojan.DownLoader9.38925", "Trojan.Chifrax.Win32.1349", "BehavesLike.Win32.Dropper.cc", "W32/Poison.HQGF-3018", "Trojan/Chifrax.epp", "TR/Drop.PoisonIvy.C.1", "W32/Chifrax.A!tr", "Trojan/Win32.Chifrax", "Troj.W32.Chifrax.a!c", "TrojanDropper:Win32/Poisonivy.C", "Win-Trojan/Poisonivy.150357", "Trojan.Chifrax", "Win32/Poison.NGS", "Win32.Trojan.Chifrax.Wskn", "Trojan.Chifrax!Xo07JnrMN1M", "Trojan.Win32.Chifrax", "Trj/Chifrax.C", "Win32/Trojan.954" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "AIT:Trojan.Autoit.CLU", "Win32.Trojan-Dropper.Autoit.l", "W32/Trojan.TWFF-1697", "AIT:Trojan.Autoit.CLU", "Trojan.Win32.Beast.exaenx", "AIT:Trojan.Autoit.CLU", "BackDoor.Beast", "BehavesLike.Win32.PUPXAI.dh", "AIT:Trojan.Autoit.CLU", "Trojan.Autoit.F", "AIT:Trojan.Autoit.CLU", "AIT:Trojan.Autoit.CLU", "Trj/CI.A", "Win32/Trojan.0fc" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Chikdos", "is", "a", "malware", "that", "targeted", "MySQL", "servers", "to", "make", "them", "conduct", "distributed", "denial-of-service", "DDoS", "attacks", "against", "other", "websites." ]
[ 3, 16, 16, 3, 16, 1, 5, 13, 16, 16, 16, 16, 1, 9, 9, 9, 16, 16, 16 ]
[ "Exfiltrated", "device", "information", "and", "additional", "sensitive", "data", "sent", "to", "the", "C2", "server", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "In", "addition", ",", "it", "monitors", "to", "verify", "if", "com.android.music.helper", "package", "is", "removed", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.Tartober", "BKDR_TARTOBER.A", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "BScope.Trojan-Spy.Zbot", "BKDR_TARTOBER.A", "Trojan.Win32.Wisp.zraky", "BackDoor.Wisp.11", "BehavesLike.Win32.Trojan.dc", "W32/Trojan.TTYH-5266", "Trojan.Zusy.Elzob.D39B5", "Backdoor:Win32/Tartober.A", "Trj/CI.A", "Win32/Trojan.e6d" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "This", "could", "indicate", "that", "actor", "already", "has", "plans", "in", "expanding", "the", "targets", "to", "applications", "from", "different", "countries", "and", "regions", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Ransom/W32.WannaCry.5267459.F", "Ransom.Zenshirsh.SL8", "Ransom.WannaCrypt", "Trojan/Exploit.CVE-2017-0147.a", "Win32.Worm.Rbot.a", "Ransom.Wannacry", "Ransom_WCRY.SMJ", "Win.Ransomware.WannaCry-6313787-0", "Win32.Exploit.CVE-2017-0147.A", "Trojan-Ransom.Win32.Wanna.m", "Trojan.Win32.Wanna.epxkni", "Trojan.Win32.WannaCry.5267459", "Troj.Ransom.W32.Wanna.toP0", "Trojan.Encoder.11432", "Trojan.Wanna.Win32.98", "Ransom_WCRY.SMJ", "BehavesLike.Win32.RansomWannaCry.tt", "Trojan.Wanna.k", "TR/WannaCrypt.ahdyg", "Trojan[Ransom]/Win32.Wanna", "Trojan:Win32/Eqtonex.F!dha", "Trojan-Ransom.Win32.Wanna.m", "Trojan/Win32.WannaCryptor.R200894", "Hoax.Wanna", "Trj/GdSda.A", "Win32/Exploit.CVE-2017-0147.A", "Exploit.CVE-2017-0147!", "Trojan.Win32.Exploit", "W32/Wanna.M!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.TrojanPigax", "Trojan-Downloader.Win32.Small.akrf", "Trojan-Downloader.Win32.Small.akrf", "TR/Dldr.Small.akrf", "Trojan.Dldr.Small.akrf", "Trojan-Downloader.Win32.Small.akrf", "Trojan-Downloader.Win32.Small", "W32/Small.AKRF!tr.dldr", "Trj/CI.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Locate", "your", "device", ":", "Practice", "finding", "your", "device", "with", "Android", "Device", "Manager", "because", "you", "are", "far", "more", "likely", "to", "lose", "your", "device", "than", "install", "a", "PHA", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "REDBALDKNIGHT,", "also", "known", "as", "BRONZE", "BUTLER", "and", "Tick,", "is", "a", "cyberespionage", "group", "known", "to", "target", "Japanese", "organizations", "such", "as", "government", "agencies", "including", "defense", "as", "well", "as", "those", "in", "biotechnology,", "electronics", "manufacturing,", "and", "industrial", "chemistry." ]
[ 6, 16, 16, 16, 6, 14, 16, 6, 16, 16, 6, 14, 16, 16, 16, 4, 12, 16, 16, 4, 12, 16, 16, 16, 16, 16, 16, 16, 4, 12, 12, 16, 4, 12 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.NaviPromo.3", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Win32/Lipler.B!packed", "TROJ_SKINTRI.SMC", "Trojan.Win32.Hrup.aah", "Troj.Downloader.W32.Lipler.lcwl", "TROJ_SKINTRI.SMC", "Trojan/Win32.Hrup", "Trojan:Win32/Skintrim.C", "Trojan.Win32.Hrup.aah", "Win32.Trojan.Hrup.Ajvd", "Trojan.Win32.Skintrim", "W32/Skintrim.CG!tr", "Win32/Trojan.IM.c6f" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Ursnif", "campaigns", "against", "EU", "and", "mainly", "Italy", "spreaded", "by", "a", "JScript" ]
[ 6, 14, 16, 2, 16, 16, 2, 16, 16, 16, 5 ]
[ "A", "backdoor", "also", "known", "as:", "W32/Autorun.Worm.aaeh", "Win32.Trojan.WisdomEyes.16070401.9500.9867", "TSPY_TEPFER.GB", "Trojan.Win32.VBTrojan.bvufrt", "TrojWare.Win32.VB.HR", "Trojan.DownLoader10.21377", "TSPY_TEPFER.GB", "BehavesLike.Win32.Swisyn.cc", "Trojan:Win32/Beelog.C", "Trojan.Win32.Jorik.28672.A", "Trojan/Win32.Jorik.R44838", "Trj/CI.A", "Win32/Trojan.Downloader.f2c" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "If", "a", "device", "isn", "’", "t", "rooted", ",", "it", "downloads", "from", "the", "server", "an", "exploit", "pack", "and", "executes", "it", "to", "obtain", "root", "on", "device", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "To", "bypass", "Google", "Play", "Store", "security", "checks", ",", "the", "malware", "creators", "used", "a", "very", "interesting", "method", ":", "they", "uploaded", "a", "clean", "app", "to", "the", "store", "at", "the", "end", "of", "March", ",", "2017", ",", "and", "would", "then", "update", "it", "with", "a", "malicious", "version", "for", "short", "period", "of", "time", "." ]
[ 16, 16, 5, 13, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.Yaha.S", "W32/Yaha.aa@MM", "Trojan.Heur.ED1374C", "Win32.Trojan.WisdomEyes.16070401.9500.9777", "W32.Yaha.AE@mm", "Win32/Yaha.Y", "Win.Worm.Yaha-8", "Email-Worm.Win32.Lentin.s", "Trojan.Win32.Lentin.emzf", "I-Worm.Win32.Yaha.60304", "Win32.Worm-email.Lentin.Wvki", "TrojWare.Win32.Patched.KSU", "Win32.HLLM.Yaha.7", "W32/Yaha.aa@MM", "WORM/Lentin.S", "Worm[Email]/Win32.Lentin", "Worm:Win32/Yaha.AA@mm", "Backdoor.W32.Bifrose.l4Wh", "Email-Worm.Win32.Lentin.s", "Trojan.Win32.Rbot" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Heur.Win32.Veebee.1!O", "Trojan.VB.rw3", "Trojan.Happili", "Trojan.Inject!SEi/RTfcvEo", "W32/Backdoor2.HUHI", "TROJ_SPNR.0BD714", "Trojan.Win32.Inject.kxez", "Trojan.Win32.Inject.cwbjpa", "Trojan.Boaxxe.2", "Trojan.Inject.Win32.72022", "TR/Dropper.VB.6820", "TROJ_SPNR.0BD714", "Trojan/Win32.Inject", "Win32.Troj.Inject.kx.kcloud", "W32/Backdoor.PZSO-6760", "TScope.Trojan.VB", "Trj/WLT.A", "Win32/Boaxxe.BL", "Win32.Trojan.Inject.Sxek", "Virus.Win32.VBInject", "W32/Zbot.RZIM!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan-PWS/W32.Hukle.157044", "Trojan.Hukle.Win32.18", "Trojan/PSW.Hukle.o", "Trojan.PWS.Hukle!uPlO8aKf2dU", "W32/Trojan2.GWXZ", "Infostealer.Hukle", "TROJ_HUKLE.O", "Win.Trojan.Hukle-16", "Trojan-PSW.Win32.Hukle.o", "Trojan.Win32.Hukle.dhvf", "Troj.PSW32.W.Hukle.o!c", "TrojWare.Win32.PSW.Hukle.~R", "Trojan.PWS.Hukle.145", "TROJ_HUKLE.O", "BehavesLike.Win32.PWSZbot.ch", "W32/Trojan.TBYH-4941", "Trojan/Hiddukel.t", "W32/Hukle.O!tr.pws", "Trojan[PSW]/Win32.Hukle", "Trojan.Zusy.Elzob.D3190", "Win-Trojan/Hukle.151040", "PWS:Win32/Hukle.O", "Trojan-PWS.Win32.Hukle", "Trojan.Win32.InfoStealer.o" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "vulnerability", "comes", "from", "the", "interaction", "of", "the", "mechanism", "that", "enforces", "JavaScript", "context", "separation", "the", "same", "origin", "policy", "and", "Firefox's", "PDF", "Viewer." ]
[ 16, 7, 16, 16, 16, 16, 16, 16, 16, 16, 16, 7, 16, 16, 16, 16, 16, 16, 16, 5, 13, 13 ]
[ "ACCESS_NETWORK_STATE", "-", "allow", "the", "app", "to", "access", "information", "about", "networks", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "]", "somtum", "[", "." ]
[ 9, 9, 9, 9 ]
[ "The", "email", "message", "and", "the", "lure", "document", "are", "written", "in", "Hebrew,", "Arabic", "or", "English", "–", "depending", "on", "the", "target", "audience." ]
[ 16, 1, 9, 16, 1, 9, 9, 9, 9, 9, 9, 9, 16, 4, 16, 16, 16, 16, 16, 16 ]
[ "The", "adversary's", "campaign", "has", "active", "and", "operational", "Command", "and", "Control", "C2", "servers." ]
[ 6, 14, 14, 16, 16, 16, 16, 1, 9, 9, 9, 9 ]
[ "As", "the", "research", "progressed", ",", "it", "started", "to", "reveal", "unique", "characteristics", "which", "made", "us", "believe", "we", "were", "looking", "at", "an", "all-new", "malware", "campaign", "found", "in", "the", "wild", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "]", "today", "www", "[", "." ]
[ 9, 9, 1, 9, 9 ]
[ "A", "one-man", "cybercriminal", "operation", "that", "uses", "point-of-salePoS", "malware", "has", "stolen", "more", "than", "22,000", "unique", "credit", "card", "numbers", "from", "terminals", "in", "Brazil,Canada,", "and", "the", "United", "States", "in", "a", "span", "of", "just", "one", "month." ]
[ 16, 16, 6, 14, 16, 16, 3, 11, 16, 1, 16, 16, 8, 16, 1, 9, 9, 16, 16, 16, 2, 16, 2, 10, 10, 16, 16, 16, 16, 16, 0, 8 ]
[ "A", "backdoor", "also", "known", "as:", "W32/OnlineGames.LWBP", "Worm.Autorun-4618", "Worm.Win32.Dropper.RA", "Trojan:W32/DelfInject.R", "Trojan.PWS.Wsgame.22668", "Win32/Oflwr.A!crypt", "Heur:Trojan/PSW.OnlineGames", "BScope.HackTool.Sniffer.WpePro", "Trj/CI.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.FakelsasLTD1.Trojan", "Trojan.Win32.Small!O", "Trojan.Upatre.S1164383", "Trojan/Downloader.Small.aab", "Win32.Trojan.Inject.bm", "W32/Trojan.TBSZ-0334", "Win32/Upatre.Q", "TROJ_BANLOAD.KAV", "Win.Trojan.Rubinurd-67", "Trojan.Win32.Small.cpl", "Trojan.Win32.Small.ciwsuw", "TrojWare.Win32.Injector.AH", "Trojan.DownLoad3.28161", "Trojan.Bublik.Win32.12106", "TROJ_BANLOAD.KAV", "BehavesLike.Win32.PWSZbot.dh", "Backdoor.Win32.Androm", "W32/Trojan3.GBH", "Trojan/Small.oxi", "Trojan/Win32.Bublik", "Trojan.Win32.Small.cpl", "Trojan:Win32/Dorv.D!rfn", "Worm/Win32.Palevo.C199836", "Trojan.Small", "Trojan.Email.FA", "Trojan.Small.AAB", "Win32/TrojanDownloader.Small.AAB", "Trojan.Bublik!BrbaRvXyIc8", "W32/Bublik.AAB!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Custom", "Encryption", "Other", "variants", "have", "used", "custom-implemented", "encryption", "algorithms", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Backdoor.80" ]
[ 16, 3, 16, 16, 16, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Ransom.Exxroute.A3", "Trojan.Ransom.Lukitos.1", "Ransom_CERBER.SM37", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "W32.Ramnit!dr", "Ransom_CERBER.SM37", "Trojan.PWS.Sphinx.2", "BehavesLike.Win32.Ransomware.cc", "Trojan:Win32/CeeInject.MJ!bit", "Trojan/Win32.Fareit.R189070", "Trj/GdSda.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Currently", ",", "the", "Twitoor", "trojan", "has", "been", "downloading", "several", "versions", "of", "mobile", "banking", "malware", "." ]
[ 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.WisdwslD.Trojan", "TrojanDownloader.Esaprof.A4", "Trojan.Strictor.D542D", "Trojan.Esaprof", "Win32/SillyDL.YTP", "TROJ_ESAPROF_EK2501B4.UVPM", "SWF.Plicker.1", "TROJ_ESAPROF_EK2501B4.UVPM", "BehavesLike.Win32.Dropper.wc", "TrojanDownloader:SWF/Esaprof.B", "Trojan.Win32.Downloader.3514368[UPX]", "Trojan.Downloader", "Trj/CI.A", "SWF/TrojanDownloader.Esaprof.A", "Trojan.Patched" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "Windows", "kernel", "vulnerability", "(", "CVE-2015-2387", ")", "existed", "in", "the", "open", "type", "font", "manager", "module", "(", "ATMFD.dll", ")", "and", "can", "be", "exploited", "to", "bypass", "the", "sandbox", "mitigation", "mechanism", "." ]
[ 16, 7, 15, 15, 16, 7, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "spear-phishing", "email", "was", "sent", "to", "a", "diplomat", "of", "the", "Embassy", "of", "Uzbekistan", "who", "is", "likely", "based", "in", "Beijing,", "China." ]
[ 16, 1, 9, 16, 16, 16, 16, 4, 12, 12, 12, 12, 12, 16, 16, 16, 16, 16, 2, 10 ]
[ "In", "aggregate", ",", "the", "type", "of", "information", "stolen", "could", "let", "an", "attacker", "know", "where", "a", "person", "is", ",", "with", "whom", "they", "are", "associated", "(", "including", "contacts", "’", "profile", "photos", ")", ",", "the", "messages", "they", "are", "sending", ",", "the", "websites", "they", "visit", "and", "search", "history", ",", "screenshots", "that", "reveal", "data", "from", "other", "apps", "on", "the", "device", ",", "the", "conversations", "they", "have", "in", "the", "presence", "of", "the", "device", ",", "and", "a", "myriad", "of", "images", "including", "anything", "at", "which", "device", "’", "s", "camera", "is", "pointed", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.SocksT.Trojan", "Worm.Win32.Socks!O", "Trojan.Zbot.EO4", "Worm.Socks.Win32.38", "W32.W.Socks.tnAV", "W32/Socks.ey", "TROJ_SPNR.14DL13", "Win32.Trojan.Kryptik.el", "Win32/Tnega.McRJca", "TROJ_SPNR.14DL13", "Win.Trojan.Ag-4254306-1", "Worm.Win32.Socks.ey", "Trojan.Win32.Socks.wtnjo", "Worm.Win32.Socks.791340", "BackDoor.FireOn.221", "BehavesLike.Win32.VirRansom.tc", "Trojan-Spy.Zbot.BE", "Trojan/PSW.Almat.dwk", "W32.Infostealer.Zeus", "Worm/Win32.Socks", "Worm.Socks.ey.kcloud", "Worm.Socks", "Worm.Win32.Socks.ey", "Worm/Win32.Socks.C35688", "Virus.Socks.ey", "Worm.Socks!MDTxLrvAMvg" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Turla,", "which", "has", "been", "targeting", "governments,", "government", "officials", "and", "diplomats", "for", "years", "–", "see,", "as", "an", "example,", "this", "recent", "paper", "–", "is", "still", "using", "watering", "hole", "techniques", "to", "redirect", "potentially", "interesting", "victims", "to", "their", "C", "C", "infrastructure." ]
[ 6, 16, 16, 16, 16, 4, 12, 12, 16, 4, 16, 0, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 9, 16, 16, 16, 16, 16, 16, 16, 5, 13, 13 ]
[ "A", "backdoor", "also", "known", "as:", "W32.DostoxaLTB.Trojan", "Trojan.Mogoogwi.A3", "WORM_MOGOOGWI.SMHA", "Win32.Trojan.WisdomEyes.16070401.9500.9996", "WORM_MOGOOGWI.SMHA", "Trojan-Dropper.MSIL", "Trojan:MSIL/Mogoogwi.A", "Trojan.Barys.DC996", "Trojan/Win32.Zusy.R154407", "Trj/CI.A", "Win32/Trojan.65a" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "READ_EXTERNAL_STORAGE", "-", "Allows", "the", "application", "to", "read", "from", "external", "storage", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "However", ",", "this", "wo", "n't", "close", "the", "application", ",", "it", "will", "send", "it", "to", "the", "background", ",", "instead", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Dynamer.A8", "Trojan.Ransom.Globe", "Win32.Trojan.WisdomEyes.16070401.9500.9595", "Ransom.Purge", "Ransom_PURGE.SM1", "Win32.Trojan-Ransom.Globe.A", "Trojan-Ransom.Win32.Purga.v", "Win32.Trojan.Purga.Hvjx", "Trojan.Encoder.6182", "BehavesLike.Win32.Sytro.kc", "W32/Trojan.DXHE-6024", "Trojan.CryFile.co", "Trojan[Ransom]/Win32.CryFile", "Troj.Ransom.W32!c", "Trojan-Ransom.Win32.Purga.v", "Ransom:Win32/Contentocrypt.A", "Trojan/Win32.CryFile.R186838", "TrojanDropper.Dapato", "Ransom.Globe", "Trojan.Filecoder!iQ4fX8DOQ4o", "Trj/GdSda.A", "Win32/Trojan.Ransom.524" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Taiwan", "has", "long", "been", "subjected", "to", "persistent", "targeting", "from", "espionage", "motivated", "threat", "actors." ]
[ 2, 16, 16, 16, 16, 16, 16, 16, 16, 6, 14, 14, 14 ]
[ "This", "attack", "chain", "exposed", "millions", "of", "potential", "victims", "in", "the", "US,", "Canada,", "the", "UK,", "and", "Australia,", "leveraging", "slight", "variations", "on", "a", "fake", "browser", "update", "scheme", "that", "worked", "on", "all", "three", "major", "Windows", "web", "browsers." ]
[ 16, 1, 16, 16, 16, 16, 16, 1, 16, 2, 10, 10, 10, 10, 16, 2, 16, 16, 16, 16, 1, 9, 9, 9, 9, 16, 16, 16, 16, 16, 16, 5, 13, 13 ]
[ "Our", "investigation", "into", "these", "attacks", "has", "unearthed", "more", "details", "into", "the", "method", "by", "which", "the", "threat", "actors", "delivered", "the", "Disttrack", "payload." ]
[ 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 6, 14, 14, 16, 16, 3, 11 ]
[ "We", "re", "constantly", "following,", "detecting", "and", "monitoring", "the", "lifecycle", "of", "these", "RATs", "as", "they", "appear,", "disappear", "and", "often", "reappear", "under", "a", "new", "moniker." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Shipping", "companies", "and", "medical", "laboratories", "in", "Asia", "are", "being", "targeted", "in", "a", "likely", "intelligence-gathering", "campaign", "that", "relies", "exclusively", "on", "publicly", "available", "and", "living-off-the-land", "tools." ]
[ 4, 12, 16, 4, 12, 16, 2, 16, 16, 16, 16, 16, 16, 6, 14, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan-Spy/W32.Small.8704.J", "Trojan-Spy.Win32.Small!O", "TrojanDownloader.Dielel", "Troj.Spy.W32.Small.jzk!c", "TROJ_GOGLOAD.A", "Win32.Trojan.WisdomEyes.16070401.9500.9995", "W32/Trojan.IOOK-0066", "TROJ_GOGLOAD.A", "Trojan-Spy.Win32.Small.jzk", "DLOADER.Trojan", "Trojan.Win32.Spy", "DangerousObject.Multi.bcf", "W32/Small.JZK!tr", "Trojan[Spy]/Win32.Small", "Win32.Troj.small.j.kcloud", "Trojan.Heur.LP.EEE6A9", "Trojan-Spy.Win32.Small.jzk", "TrojanDownloader:Win32/Dielel.A", "TrojanSpy.Small", "Win32.Trojan-spy.Small.Iit" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Over", "time", ",", "this", "campaign", "will", "also", "infect", "the", "same", "device", ",", "repeatedly", ",", "with", "the", "latest", "malicious", "patches", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "This", "technique", "reminds", "us", "of", "a", "combination", "between", "ages", "old", "war", "strategies", "β€œ", "Divide", "et", "impera", "”", "and", "β€œ", "By", "way", "of", "deception", "”", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "targetting", "Linux", "also", "known", "as:", "Trojan.Linux.MiraiDDoS.BI", "Downloader.Mirai.Linux.8", "Troj.Downloader.Linux!c", "ELF_MIRAI.A", "HEUR:Trojan-Downloader.Linux.Mirai.b", "Trojan.Linux.MiraiDDoS.BI", "Trojan.Mlw.ektbyu", "Trojan.Linux.MiraiDDoS.BI", "Trojan.Linux.MiraiDDoS.BI", "Linux.DownLoader.289", "ELF_MIRAI.A", "LINUX/Dldr.Mirai.qqlgv", "Trojan[Downloader]/Linux.Gafgyt.b", "Trojan.Linux.MiraiDDoS.BI", "Linux.S.Mirai.1204", "HEUR:Trojan-Downloader.Linux.Mirai.b", "TrojanDownloader:Linux/Mirai.A", "Backdoor.Linux.Mirai", "Linux.Trojan-downloader.Gafgyt.Amlt", "Trojan-Downloader.Linux.Mirai", "Trojan.Linux.MiraiDDoS.BI" ]
[ 16, 3, 16, 11, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "May", "2018", "to", "April", "2019", ":", "This", "is", "the", "actual", "mature", "stage", "of", "β€œ", "Agent", "Smith", "”", "campaign", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 16 ]
[ "This", "payload", "will", "then", "attempt", "to", "instantiate", "a", "remote", "reverse", "/system/bin/sh", "shell", "to", "the", "Command", "&", "Control", "ws.my-local-weather", "[", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 1, 9, 9 ]
[ "FrozenCell", "is", "the", "mobile", "component", "of", "a", "multi-platform", "attack", "we", "'ve", "seen", "a", "threat", "actor", "known", "as", "\"", "Two-tailed", "Scorpion/APT-C-23", ",", "''", "use", "to", "spy", "on", "victims", "through", "compromised", "mobile", "devices", "and", "desktops", "." ]
[ 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Kryptowire", "says", "the", "code", ",", "which", "it", "found", "on", "a", "BLU", "R1", "HD", "devices", ",", "transmitted", "fine-grained", "location", "information", "and", "allowed", "for", "the", "remote", "installation", "of", "other", "apps", "." ]
[ 4, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Cybereason", "'s", "investigation", "shows", "that", "the", "threat", "actor", "behind", "the", "FakeSpy", "campaign", "is", "a", "Chinese-speaking", "group", "dubbed", "\"", "Roaming", "Mantis", "''", ",", "a", "group", "that", "has", "led", "similar", "campaigns", "." ]
[ 4, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 4, 12, 16, 16, 12, 16, 16, 16, 16, 16, 16, 16 ]
[ "Version", "#", "2", ":", "June", "-", "Aug.", "2019", "β€”", "Domain", ":", "somtum", "[", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 9 ]
[ "Others", "like", "transferbot", ",", "promptupdate", "and", "promptuninstall", "are", "meant", "to", "help", "the", "operator", "manage", "the", "malware", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Worm.Verauto.A", "Win32.Worm.Verauto.A", "Trojan/VB.oda", "Win32.Worm.Verauto.A", "W32/VB.OO", "Virus.Win32.VB.b", "Win32.Worm.Verauto.A", "Virus.Win32.VB.gixe", "W32.VB.b!c", "Win32.Virus.Vb.Swum", "Win32.Worm.Verauto.A", "Virus.Win32.VB.b", "Win32.Worm.Verauto.A", "Win32.HLLW.Verauto", "Virus.VB.Win32.76", "worm.win32.vobfus.cf", "W32/VB.YYAQ-1388", "WORM/Verauto.A", "Virus/Win32.VB", "Worm:Win32/SillyVB.B", "Win32.Worm.Verauto.A", "Trojan.VB", "Win32/VB.ODA", ".Virus.EICAR_BOOV", "Worm.Win32.VB", "W32/VB.B!tr", "Win32/VB.BM" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]