tokens
sequencelengths 2
296
| ner_tags
sequencelengths 2
296
|
---|---|
[
"A",
"backdoor",
"also",
"known",
"as:",
"TjnClicker.Qaccel.S1448",
"Trojan.Small.Win32.31852",
"Trojan/Clicker.Small.ndn",
"Trojan.Win32.Click3.erajhs",
"TrojWare.Win32.TrojanClicker.Small.DS",
"Trojan.Click3.21941",
"TR/Dropper.tstkm",
"GrayWare[AdWare]/Win32.TrojanClicker.Small.ndn",
"Trojan/Win32.Dynamer.R187373",
"Backdoor.Bot",
"Trojan.Win32.TrojanClicker"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"First",
",",
"there",
"is",
"a",
"small",
"dropper",
",",
"then",
"a",
"large",
"second",
"stage",
"payload",
"that",
"contains",
"multiple",
"binaries",
"(",
"where",
"most",
"of",
"the",
"surveillance",
"functionality",
"is",
"implemented",
")",
",",
"and",
"finally",
"a",
"third",
"stage",
"which",
"typically",
"uses",
"the",
"DirtyCOW",
"exploit",
"(",
"CVE-2016-5195",
")",
"to",
"obtain",
"root",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
7,
15,
16,
7,
16,
16,
16,
16,
16
] |
[
"For",
"example",
":",
"Conclusions",
"The",
"Skygofree",
"Android",
"implant",
"is",
"one",
"of",
"the",
"most",
"powerful",
"spyware",
"tools",
"that",
"we",
"have",
"ever",
"seen",
"for",
"this",
"platform",
"."
] | [
16,
16,
16,
16,
16,
3,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Figure",
"4",
"shows",
"the",
"download",
"prompt",
"for",
"this",
"fake",
"app",
";",
"an",
"English",
"translation",
"follows",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"So",
"we",
"recommend",
"installing",
"an",
"anti-virus",
"solution",
"on",
"your",
"Android",
"device",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"macOS",
"malware",
"agent,",
"named",
"MacDownloader,",
"was",
"observed",
"in",
"the",
"wild",
"as",
"targeting",
"the",
"defense",
"industrial",
"base,",
"and",
"reported",
"elsewhere",
"to",
"have",
"been",
"used",
"against",
"an",
"human",
"rights",
"advocate."
] | [
16,
5,
3,
11,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
4,
12,
12,
16,
16,
16,
16,
16,
16,
16,
16,
4,
12,
12,
12
] |
[
"However",
",",
"successfully",
"installing",
"this",
"malicious",
"APK",
"requires",
"that",
"the",
"user",
"has",
"allowed",
"the",
"installation",
"of",
"such",
"apps",
"as",
"controlled",
"in",
"the",
"Unknown",
"Sources",
"settings",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.Clod740.Trojan.4797",
"Backdoor.Bittaru!1goVteZqWDk",
"TROJ_SPNR.15KL11",
"MalCrypt.Indus!",
"BDS/Bittaru.A.4",
"TROJ_SPNR.15KL11",
"Win32.Troj.Undef.kcloud",
"Backdoor:Win32/Bittaru.A",
"W32/Trojan.PAFV-2148",
"W32/BackDoor.DPM!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.MSIL.Disfa"
] | [
16,
3,
16,
16,
16,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"MemScan:Trojan.Glitch.A",
"Trojan-Dropper.Win32.Juntador!O",
"MemScan:Trojan.Glitch.A",
"Trojan/Dropper.Juntador.c",
"Trojan.Glitch.A",
"W32/Dropper.ATCT",
"Backdoor.IRC.Zcrew",
"TROJ_JUNTADOR.C",
"Win.Dropper.Juntador-12",
"MemScan:Trojan.Glitch.A",
"Trojan-Dropper.Win32.Delf.hq",
"MemScan:Trojan.Glitch.A",
"Trojan.Win32.Juntador.diov",
"MemScan:Trojan.Glitch.A",
"TrojWare.Win32.TrojanDropper.Juntador.c0",
"MemScan:Trojan.Glitch.A",
"BackDoor.DMoon",
"Dropper.Juntador.Win32.230",
"TROJ_JUNTADOR.C",
"BehavesLike.Win32.Dropper.hc",
"W32/Risk.HJDZ-9373",
"TrojanDropper.Win32.Juntador.c",
"TrojanDropper:Win32/Juntador.C",
"Trojan-Dropper.Win32.Delf.hq",
"Trojan/Win32.LdPinch.C10075",
"Win32/TrojanDropper.Juntador.C",
"Win32.Trojan-dropper.Delf.Eegz",
"Trojan-Dropper.Win32.Juntador.C",
"Win32/Trojan.bf1"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Many",
"other",
"banking",
"malware",
"families",
"followed",
"suit",
"and",
"released",
"their",
"own",
"Android",
"malware",
"components",
"designed",
"to",
"steal",
"those",
"OTPs",
"and",
"TANs",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Script.Application.CdEject.A",
"Script.Application.Cdeject!c",
"BehavesLike.Win32.PUPXBC.dc",
"Joke:VBS/CDEject.D",
"PUP.Linkury/Variant",
"Trojan.Ejectcd.A",
"VBS/CDEject.I",
"Backdoor.MSIL.Bladabindi",
"VBS/CDEject.I!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Symantec",
"has",
"identified",
"a",
"previously",
"unknown",
"group",
"called",
"Sowbug",
"that",
"has",
"been",
"conducting",
"highly",
"targeted",
"cyber",
"attacks",
"against",
"organizations",
"in",
"South",
"America",
"and",
"Southeast",
"Asia",
"and",
"appears",
"to",
"be",
"heavily",
"focused",
"on",
"foreign",
"policy",
"institutions",
"and",
"diplomatic",
"targets."
] | [
4,
16,
16,
16,
16,
6,
14,
16,
6,
16,
16,
16,
16,
16,
16,
1,
9,
16,
4,
16,
2,
10,
16,
2,
10,
16,
16,
16,
16,
16,
16,
16,
4,
12,
12,
16,
4,
12
] |
[
"This",
"disabled",
"the",
"attacker's",
"access",
"to",
"their",
"victims",
"in",
"this",
"campaign,",
"provided",
"further",
"insight",
"into",
"the",
"targets",
"currently",
"victimized",
"in",
"this",
"operation,",
"and",
"enabled",
"the",
"notification",
"of",
"affected",
"parties."
] | [
16,
16,
16,
6,
16,
16,
16,
16,
16,
16,
6,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
6,
16,
16,
16,
16,
16,
16,
16
] |
[
"Figure",
"2",
":",
"β",
"Agent",
"Smith",
"β",
"s",
"jpg",
"file",
"structure",
"After",
"the",
"extraction",
",",
"the",
"β",
"loader",
"β",
"module",
"adds",
"the",
"code",
"to",
"the",
"application",
"while",
"using",
"the",
"legitimate",
"mechanism",
"by",
"Android",
"to",
"handle",
"large",
"DEX",
"files",
"."
] | [
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16
] |
[
"All",
"the",
"observed",
"landing",
"pages",
"mimic",
"the",
"mobile",
"operators",
"β",
"web",
"pages",
"through",
"their",
"domain",
"name",
"and",
"web",
"page",
"content",
"as",
"well",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"app",
"that",
"resulted",
"in",
"the",
"largest",
"number",
"of",
"affected",
"users",
"was",
"the",
"click",
"fraud",
"version",
",",
"which",
"was",
"installed",
"over",
"170,000",
"times",
"at",
"its",
"peak",
"in",
"February",
"2018",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Finally,",
"Doctor",
"Web's",
"security",
"researchers",
"investigated",
"the",
"Linux.Mirai",
"Trojan",
"found",
"later",
"that",
"month."
] | [
16,
4,
12,
12,
12,
16,
16,
1,
3,
16,
0,
8,
8
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Virus.Win32.Sality!O",
"Backdoor.Poison.Win32.26527",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Trojan.Win32.VBKrypt.hjcg",
"Trojan.Win32.VB.dodqqz",
"Troj.W32.VBKrypt.hjcg!c",
"Trojan.MulDrop2.20812",
"Backdoor/Poison.eqy",
"Trojan/Win32.VBKrypt",
"TrojanDownloader:Win32/Tyqui.B",
"Trojan.Win32.VBKrypt.hjcg",
"Trj/CI.A",
"Win32/TrojanDownloader.VB.ODM",
"Trojan.VBKrypt!ngQI4PCHe4I",
"Backdoor.Poison",
"W32/Dx.TQG!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"As",
"of",
"this",
"writing",
",",
"all",
"the",
"domains",
"were",
"registered",
"recently",
"and",
"some",
"are",
"already",
"offline",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"PERL/Shellbot.B",
"Backdoor.Perl.Shellbot.B",
"Perl/Shellbot.PR",
"Perl.Backdoor.Shellbot.f",
"Unix/ShellBot.AH",
"IRC.Backdoor.Trojan",
"Perl/Shellbot.NAI",
"PERL_SHELBOT.SMO",
"Win.Trojan.Perlbot-1",
"Backdoor.Perl.IRCBot.ij",
"Backdoor.Perl.Shellbot.B",
"Backdoor.Perl.Ircbot!c",
"Perl.Backdoor.Ircbot.Akpo",
"Backdoor.Perl.Shellbot.B",
"Backdoor.Perl.Shellbot.B",
"Perl.Ircbot.93",
"PERL_SHELBOT.SMO",
"Unix/ShellBot.AH",
"PERL/Shellbot.aa",
"Perl/IRCBot.I!tr",
"Backdoor.Perl.Shellbot.B",
"Backdoor.Perl.IRCBot.ij",
"Backdoor:Perl/Shellbot.Z",
"Backdoor.Perl.Shellbot.B",
"Perl.Shellbot.I",
"Trojan.Perl.Shellbot",
"Backdoor.Perl.Shellbot.B",
"Win32/Trojan.BO.811"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Then",
",",
"the",
"APK",
"is",
"installed",
"as",
"system",
"application",
"and",
"registers",
"listener",
"on",
"USER_PRESENT",
"event",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.MSIL",
"Win32.Trojan.WisdomEyes.16070401.9500.9928",
"W32/Trojan.GELV-4208",
"Backdoor.MSIL.Bladabindi.akrb",
"Trojan.Win32.Bladabindi.extavb",
"Backdoor.Msil.Bladabindi!c",
"Msil.Backdoor.Bladabindi.Wmjd",
"BackDoor.Bladabindi.13678",
"Backdoor.Bladabindi.Win32.8723",
"Trojan.MSIL.Injector",
"Trojan:Win32/Vb.At",
"TR/Crypt.fkm.udrkf",
"Trojan[Backdoor]/MSIL.Bladabindi",
"Trojan.MSIL.Bladabindi.1",
"Trojan.Win32.Z.Bladabindi.192000.A",
"Backdoor.MSIL.Bladabindi.akrb",
"Trojan:MSIL/Inmalsal.A",
"MSIL/Kryptik.GJY!tr",
"Trj/GdSda.A",
"Win32/Trojan.BO.610"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Constructor.Win32.Houndhack!O",
"Backdoor.Venik.MUE.J2",
"Trojan/Farfli.bwm",
"BKDR_VENIK_EL150010.UVPM",
"Constructor.Win32.Houndhack.a",
"Riskware.Win32.Houndhack.erbccv",
"Trojan.DownLoader17.62076",
"BKDR_VENIK_EL150010.UVPM",
"BehavesLike.Win32.Backdoor.dc",
"HackTool[Constructor]/Win32.Houndhack",
"Trojan.Zusy.D35C86",
"Constructor.Win32.Houndhack.a",
"Backdoor:Win32/Venik.J",
"Backdoor/Win32.Venik.R169912",
"Constructor.Houndhack",
"Constructor.Houndhack!",
"Trojan.Constructor"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Application.BitCoinMiner.ZM",
"Trojan.BitMiner",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Trojan.Win32.BitCoinMiner.agl",
"Riskware.Win64.BitMiner.ewyekq",
"BehavesLike.Win32.AdwareLinkury.vc",
"PUA/CoinMiner.B",
"Trojan/Win32.BitCoinMiner",
"Trojan.Win32.BitCoinMiner.agl",
"Trojan.Win32.BitcoinMiner"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Win32.Small!O",
"Trojan.Maptsc",
"Trojan.Small.Win32.19366",
"Trojan.Heur.RP.EAC7EB",
"TROJ_SMALL.NHQ",
"Trojan.Win32.Small.cpb",
"Trojan.Win32.Small.ebpbhy",
"Troj.W32.Small.cpb!c",
"Trojan.Click2.55177",
"TROJ_SMALL.NHQ",
"Trojan.Win32.Small",
"W32/Trojan.ZWIN-6050",
"Trojan/Small.ovd",
"TR/Spy.6656.172",
"Trojan/Win32.Small",
"Trojan:Win32/Maptsc.A",
"Trojan.Win32.Small.cpb",
"Trojan/Win32.Connapts.C256364",
"Trojan.Small.cpb",
"Trojan.Small",
"Win32.Trojan.Small.Edod",
"Trojan.Click!cGVrs+boA6s",
"Win32/Trojan.4c4"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"We",
"found",
"280",
"such",
"apps",
"in",
"the",
"past",
"three",
"months",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"evidence",
"above",
"suggests",
"that",
"EventBot",
"is",
"still",
"in",
"the",
"development",
"stage",
",",
"and",
"as",
"such",
",",
"is",
"not",
"likely",
"to",
"have",
"been",
"used",
"for",
"large",
"attack",
"campaigns",
"thus",
"far",
"."
] | [
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"At",
"the",
"time",
"of",
"writing",
",",
"the",
"content",
"served",
"at",
"the",
"given",
"URL",
"on",
"uyghurapps",
"[",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9
] |
[
"READ_CONTACTS",
"-",
"Allows",
"the",
"application",
"to",
"read",
"the",
"user",
"'s",
"contacts",
"data",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"More",
"information",
"from",
"PWC",
"about",
"Sofacy",
"Bedep",
"malware",
"using",
"DGA",
"CozyDuke",
"aka",
"CozyBear,",
"CozyCar",
"or",
"Office",
"Monkeys",
"is",
"a",
"threat",
"actor",
"that",
"became",
"increasingly",
"active",
"in",
"the",
"2nd",
"half",
"of",
"2014",
"and",
"hit",
"a",
"variety",
"of",
"targets."
] | [
16,
16,
16,
4,
16,
3,
11,
11,
16,
16,
6,
14,
14,
14,
16,
6,
14,
16,
16,
6,
14,
16,
16,
16,
16,
16,
16,
16,
16,
16,
0,
16,
16,
16,
16,
16,
16
] |
[
"Though",
"different",
"versions",
"of",
"the",
"app",
"vary",
"in",
"structure",
",",
"malicious",
"code",
"was",
"initialized",
"at",
"application",
"launch",
"without",
"the",
"user",
"β",
"s",
"knowledge",
",",
"and",
"a",
"number",
"of",
"timers",
"were",
"setup",
"to",
"gather",
"and",
"upload",
"data",
"periodically",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Moreover",
",",
"eSurv",
"was",
"a",
"business",
"unit",
"of",
"Connexxa",
"and",
"was",
"leased",
"to",
"eSurv",
"S.R.L",
"in",
"2014",
"."
] | [
16,
16,
4,
16,
16,
16,
16,
16,
4,
16,
16,
16,
16,
4,
12,
16,
16,
16
] |
[
"It",
"β",
"s",
"not",
"a",
"definite",
"correlation",
",",
"but",
"Bouncing",
"Golf",
"also",
"seems",
"to",
"have",
"a",
"connection",
"with",
"Domestic",
"Kitten",
"due",
"to",
"similarities",
"we",
"found",
"in",
"their",
"code",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"In",
"the",
"email",
"screenshot",
"with",
"our",
"added",
"machine",
"translation",
"from",
"Russian,",
"notice",
"the",
"subject",
"line",
"and",
"message",
"body",
"text",
"reflecting",
"a",
"business",
"customer",
"upset",
"about",
"extra",
"charges",
"on",
"his",
"credit",
"card",
"social",
"engineering",
"theme."
] | [
16,
16,
1,
16,
16,
16,
5,
13,
13,
16,
2,
16,
16,
1,
16,
16,
16,
16,
16,
16,
4,
12,
12,
16,
16,
16,
16,
16,
16,
1,
9,
9,
9,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.GarusenV.Trojan",
"Worm/W32.Vobfus.225280",
"Worm.Win32.Vobfus!O",
"W32/Vobfus.io",
"Trojan.Barys.950",
"WORM_VOBFUS.SM02",
"Win32.Trojan.VBObfus.f",
"WORM_VOBFUS.SM02",
"Win.Trojan.Vobfus-28",
"Worm.Win32.Vobfus.biec",
"Trojan.Win32.WBNA.cihuhh",
"Worm.Win32.A.Vobfus.225280",
"TrojWare.Win32.Pronny.EE",
"Trojan.VbCrypt.60",
"BehavesLike.Win32.VBObfus.dm",
"Worm.Win32.Vobfus",
"Worm/WBNA.dfdh",
"WORM/Vobfus.dbmnua",
"Worm.Win32.Vobfus.biec",
"Trojan/Win32.Vobfus.R36953",
"BScope.Trojan.Diple",
"Win32/Pronny.EJ",
"W32/Vobfus.GEW.worm"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"However",
",",
"in",
"2013",
",",
"autonomous",
"mobile",
"banking",
"Trojans",
"developed",
"further",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"For",
"instance",
",",
"in",
"the",
"case",
"of",
"the",
"β",
"Execute",
"β",
"opcode",
"(",
"0x17",
")",
",",
"the",
"32-bit",
"code",
"to",
"run",
"is",
"stored",
"entirely",
"into",
"the",
"variable",
"section",
"with",
"the",
"value",
"at",
"offset",
"5",
"specifying",
"the",
"number",
"of",
"bytes",
"to",
"be",
"copied",
"and",
"executed",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"These",
"have",
"been",
"the",
"attacks",
"on",
"Saudi",
"Arabian",
"companies",
"where",
"a",
"destructive",
"malware",
"known",
"as",
"Disttrack",
"was",
"deployed."
] | [
16,
16,
16,
16,
1,
16,
4,
12,
12,
16,
16,
3,
11,
16,
16,
3,
16,
16
] |
[
"In",
"addition,",
"we",
"found",
"that",
"the",
"infrastructure",
"used",
"in",
"this",
"case",
"overlaps",
"with",
"FindPOS/PoSeidon",
"as",
"well",
"as",
"Chanitor",
"and",
"sits",
"amidst",
"a",
"cluster",
"of",
"largely",
"indiscriminate",
"malicious",
"activity."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/W32.Chifrax.150357",
"Trojan.Chifrax.rw5",
"Trojan/Chifrax.a",
"BKDR_POISON.VA",
"W32/Poison.AX",
"Backdoor.Odivy",
"Win32/Poison.AAE",
"BKDR_POISON.VA",
"Win.Trojan.Poison-11",
"Trojan.Win32.Chifrax.a",
"Trojan.Win32.Chifrax.fwpet",
"Trojan.DownLoader9.38925",
"Trojan.Chifrax.Win32.1349",
"BehavesLike.Win32.Dropper.cc",
"W32/Poison.HQGF-3018",
"Trojan/Chifrax.epp",
"TR/Drop.PoisonIvy.C.1",
"W32/Chifrax.A!tr",
"Trojan/Win32.Chifrax",
"Troj.W32.Chifrax.a!c",
"TrojanDropper:Win32/Poisonivy.C",
"Win-Trojan/Poisonivy.150357",
"Trojan.Chifrax",
"Win32/Poison.NGS",
"Win32.Trojan.Chifrax.Wskn",
"Trojan.Chifrax!Xo07JnrMN1M",
"Trojan.Win32.Chifrax",
"Trj/Chifrax.C",
"Win32/Trojan.954"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"AIT:Trojan.Autoit.CLU",
"Win32.Trojan-Dropper.Autoit.l",
"W32/Trojan.TWFF-1697",
"AIT:Trojan.Autoit.CLU",
"Trojan.Win32.Beast.exaenx",
"AIT:Trojan.Autoit.CLU",
"BackDoor.Beast",
"BehavesLike.Win32.PUPXAI.dh",
"AIT:Trojan.Autoit.CLU",
"Trojan.Autoit.F",
"AIT:Trojan.Autoit.CLU",
"AIT:Trojan.Autoit.CLU",
"Trj/CI.A",
"Win32/Trojan.0fc"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Chikdos",
"is",
"a",
"malware",
"that",
"targeted",
"MySQL",
"servers",
"to",
"make",
"them",
"conduct",
"distributed",
"denial-of-service",
"DDoS",
"attacks",
"against",
"other",
"websites."
] | [
3,
16,
16,
3,
16,
1,
5,
13,
16,
16,
16,
16,
1,
9,
9,
9,
16,
16,
16
] |
[
"Exfiltrated",
"device",
"information",
"and",
"additional",
"sensitive",
"data",
"sent",
"to",
"the",
"C2",
"server",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"In",
"addition",
",",
"it",
"monitors",
"to",
"verify",
"if",
"com.android.music.helper",
"package",
"is",
"removed",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.Tartober",
"BKDR_TARTOBER.A",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"BScope.Trojan-Spy.Zbot",
"BKDR_TARTOBER.A",
"Trojan.Win32.Wisp.zraky",
"BackDoor.Wisp.11",
"BehavesLike.Win32.Trojan.dc",
"W32/Trojan.TTYH-5266",
"Trojan.Zusy.Elzob.D39B5",
"Backdoor:Win32/Tartober.A",
"Trj/CI.A",
"Win32/Trojan.e6d"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"This",
"could",
"indicate",
"that",
"actor",
"already",
"has",
"plans",
"in",
"expanding",
"the",
"targets",
"to",
"applications",
"from",
"different",
"countries",
"and",
"regions",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Ransom/W32.WannaCry.5267459.F",
"Ransom.Zenshirsh.SL8",
"Ransom.WannaCrypt",
"Trojan/Exploit.CVE-2017-0147.a",
"Win32.Worm.Rbot.a",
"Ransom.Wannacry",
"Ransom_WCRY.SMJ",
"Win.Ransomware.WannaCry-6313787-0",
"Win32.Exploit.CVE-2017-0147.A",
"Trojan-Ransom.Win32.Wanna.m",
"Trojan.Win32.Wanna.epxkni",
"Trojan.Win32.WannaCry.5267459",
"Troj.Ransom.W32.Wanna.toP0",
"Trojan.Encoder.11432",
"Trojan.Wanna.Win32.98",
"Ransom_WCRY.SMJ",
"BehavesLike.Win32.RansomWannaCry.tt",
"Trojan.Wanna.k",
"TR/WannaCrypt.ahdyg",
"Trojan[Ransom]/Win32.Wanna",
"Trojan:Win32/Eqtonex.F!dha",
"Trojan-Ransom.Win32.Wanna.m",
"Trojan/Win32.WannaCryptor.R200894",
"Hoax.Wanna",
"Trj/GdSda.A",
"Win32/Exploit.CVE-2017-0147.A",
"Exploit.CVE-2017-0147!",
"Trojan.Win32.Exploit",
"W32/Wanna.M!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.TrojanPigax",
"Trojan-Downloader.Win32.Small.akrf",
"Trojan-Downloader.Win32.Small.akrf",
"TR/Dldr.Small.akrf",
"Trojan.Dldr.Small.akrf",
"Trojan-Downloader.Win32.Small.akrf",
"Trojan-Downloader.Win32.Small",
"W32/Small.AKRF!tr.dldr",
"Trj/CI.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Locate",
"your",
"device",
":",
"Practice",
"finding",
"your",
"device",
"with",
"Android",
"Device",
"Manager",
"because",
"you",
"are",
"far",
"more",
"likely",
"to",
"lose",
"your",
"device",
"than",
"install",
"a",
"PHA",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"REDBALDKNIGHT,",
"also",
"known",
"as",
"BRONZE",
"BUTLER",
"and",
"Tick,",
"is",
"a",
"cyberespionage",
"group",
"known",
"to",
"target",
"Japanese",
"organizations",
"such",
"as",
"government",
"agencies",
"including",
"defense",
"as",
"well",
"as",
"those",
"in",
"biotechnology,",
"electronics",
"manufacturing,",
"and",
"industrial",
"chemistry."
] | [
6,
16,
16,
16,
6,
14,
16,
6,
16,
16,
6,
14,
16,
16,
16,
4,
12,
16,
16,
4,
12,
16,
16,
16,
16,
16,
16,
16,
4,
12,
12,
16,
4,
12
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.NaviPromo.3",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Win32/Lipler.B!packed",
"TROJ_SKINTRI.SMC",
"Trojan.Win32.Hrup.aah",
"Troj.Downloader.W32.Lipler.lcwl",
"TROJ_SKINTRI.SMC",
"Trojan/Win32.Hrup",
"Trojan:Win32/Skintrim.C",
"Trojan.Win32.Hrup.aah",
"Win32.Trojan.Hrup.Ajvd",
"Trojan.Win32.Skintrim",
"W32/Skintrim.CG!tr",
"Win32/Trojan.IM.c6f"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Ursnif",
"campaigns",
"against",
"EU",
"and",
"mainly",
"Italy",
"spreaded",
"by",
"a",
"JScript"
] | [
6,
14,
16,
2,
16,
16,
2,
16,
16,
16,
5
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32/Autorun.Worm.aaeh",
"Win32.Trojan.WisdomEyes.16070401.9500.9867",
"TSPY_TEPFER.GB",
"Trojan.Win32.VBTrojan.bvufrt",
"TrojWare.Win32.VB.HR",
"Trojan.DownLoader10.21377",
"TSPY_TEPFER.GB",
"BehavesLike.Win32.Swisyn.cc",
"Trojan:Win32/Beelog.C",
"Trojan.Win32.Jorik.28672.A",
"Trojan/Win32.Jorik.R44838",
"Trj/CI.A",
"Win32/Trojan.Downloader.f2c"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"If",
"a",
"device",
"isn",
"β",
"t",
"rooted",
",",
"it",
"downloads",
"from",
"the",
"server",
"an",
"exploit",
"pack",
"and",
"executes",
"it",
"to",
"obtain",
"root",
"on",
"device",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"To",
"bypass",
"Google",
"Play",
"Store",
"security",
"checks",
",",
"the",
"malware",
"creators",
"used",
"a",
"very",
"interesting",
"method",
":",
"they",
"uploaded",
"a",
"clean",
"app",
"to",
"the",
"store",
"at",
"the",
"end",
"of",
"March",
",",
"2017",
",",
"and",
"would",
"then",
"update",
"it",
"with",
"a",
"malicious",
"version",
"for",
"short",
"period",
"of",
"time",
"."
] | [
16,
16,
5,
13,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.Yaha.S",
"W32/Yaha.aa@MM",
"Trojan.Heur.ED1374C",
"Win32.Trojan.WisdomEyes.16070401.9500.9777",
"W32.Yaha.AE@mm",
"Win32/Yaha.Y",
"Win.Worm.Yaha-8",
"Email-Worm.Win32.Lentin.s",
"Trojan.Win32.Lentin.emzf",
"I-Worm.Win32.Yaha.60304",
"Win32.Worm-email.Lentin.Wvki",
"TrojWare.Win32.Patched.KSU",
"Win32.HLLM.Yaha.7",
"W32/Yaha.aa@MM",
"WORM/Lentin.S",
"Worm[Email]/Win32.Lentin",
"Worm:Win32/Yaha.AA@mm",
"Backdoor.W32.Bifrose.l4Wh",
"Email-Worm.Win32.Lentin.s",
"Trojan.Win32.Rbot"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Heur.Win32.Veebee.1!O",
"Trojan.VB.rw3",
"Trojan.Happili",
"Trojan.Inject!SEi/RTfcvEo",
"W32/Backdoor2.HUHI",
"TROJ_SPNR.0BD714",
"Trojan.Win32.Inject.kxez",
"Trojan.Win32.Inject.cwbjpa",
"Trojan.Boaxxe.2",
"Trojan.Inject.Win32.72022",
"TR/Dropper.VB.6820",
"TROJ_SPNR.0BD714",
"Trojan/Win32.Inject",
"Win32.Troj.Inject.kx.kcloud",
"W32/Backdoor.PZSO-6760",
"TScope.Trojan.VB",
"Trj/WLT.A",
"Win32/Boaxxe.BL",
"Win32.Trojan.Inject.Sxek",
"Virus.Win32.VBInject",
"W32/Zbot.RZIM!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan-PWS/W32.Hukle.157044",
"Trojan.Hukle.Win32.18",
"Trojan/PSW.Hukle.o",
"Trojan.PWS.Hukle!uPlO8aKf2dU",
"W32/Trojan2.GWXZ",
"Infostealer.Hukle",
"TROJ_HUKLE.O",
"Win.Trojan.Hukle-16",
"Trojan-PSW.Win32.Hukle.o",
"Trojan.Win32.Hukle.dhvf",
"Troj.PSW32.W.Hukle.o!c",
"TrojWare.Win32.PSW.Hukle.~R",
"Trojan.PWS.Hukle.145",
"TROJ_HUKLE.O",
"BehavesLike.Win32.PWSZbot.ch",
"W32/Trojan.TBYH-4941",
"Trojan/Hiddukel.t",
"W32/Hukle.O!tr.pws",
"Trojan[PSW]/Win32.Hukle",
"Trojan.Zusy.Elzob.D3190",
"Win-Trojan/Hukle.151040",
"PWS:Win32/Hukle.O",
"Trojan-PWS.Win32.Hukle",
"Trojan.Win32.InfoStealer.o"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"vulnerability",
"comes",
"from",
"the",
"interaction",
"of",
"the",
"mechanism",
"that",
"enforces",
"JavaScript",
"context",
"separation",
"the",
"same",
"origin",
"policy",
"and",
"Firefox's",
"PDF",
"Viewer."
] | [
16,
7,
16,
16,
16,
16,
16,
16,
16,
16,
16,
7,
16,
16,
16,
16,
16,
16,
16,
5,
13,
13
] |
[
"ACCESS_NETWORK_STATE",
"-",
"allow",
"the",
"app",
"to",
"access",
"information",
"about",
"networks",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"]",
"somtum",
"[",
"."
] | [
9,
9,
9,
9
] |
[
"The",
"email",
"message",
"and",
"the",
"lure",
"document",
"are",
"written",
"in",
"Hebrew,",
"Arabic",
"or",
"English",
"β",
"depending",
"on",
"the",
"target",
"audience."
] | [
16,
1,
9,
16,
1,
9,
9,
9,
9,
9,
9,
9,
16,
4,
16,
16,
16,
16,
16,
16
] |
[
"The",
"adversary's",
"campaign",
"has",
"active",
"and",
"operational",
"Command",
"and",
"Control",
"C2",
"servers."
] | [
6,
14,
14,
16,
16,
16,
16,
1,
9,
9,
9,
9
] |
[
"As",
"the",
"research",
"progressed",
",",
"it",
"started",
"to",
"reveal",
"unique",
"characteristics",
"which",
"made",
"us",
"believe",
"we",
"were",
"looking",
"at",
"an",
"all-new",
"malware",
"campaign",
"found",
"in",
"the",
"wild",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"]",
"today",
"www",
"[",
"."
] | [
9,
9,
1,
9,
9
] |
[
"A",
"one-man",
"cybercriminal",
"operation",
"that",
"uses",
"point-of-salePoS",
"malware",
"has",
"stolen",
"more",
"than",
"22,000",
"unique",
"credit",
"card",
"numbers",
"from",
"terminals",
"in",
"Brazil,Canada,",
"and",
"the",
"United",
"States",
"in",
"a",
"span",
"of",
"just",
"one",
"month."
] | [
16,
16,
6,
14,
16,
16,
3,
11,
16,
1,
16,
16,
8,
16,
1,
9,
9,
16,
16,
16,
2,
16,
2,
10,
10,
16,
16,
16,
16,
16,
0,
8
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32/OnlineGames.LWBP",
"Worm.Autorun-4618",
"Worm.Win32.Dropper.RA",
"Trojan:W32/DelfInject.R",
"Trojan.PWS.Wsgame.22668",
"Win32/Oflwr.A!crypt",
"Heur:Trojan/PSW.OnlineGames",
"BScope.HackTool.Sniffer.WpePro",
"Trj/CI.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.FakelsasLTD1.Trojan",
"Trojan.Win32.Small!O",
"Trojan.Upatre.S1164383",
"Trojan/Downloader.Small.aab",
"Win32.Trojan.Inject.bm",
"W32/Trojan.TBSZ-0334",
"Win32/Upatre.Q",
"TROJ_BANLOAD.KAV",
"Win.Trojan.Rubinurd-67",
"Trojan.Win32.Small.cpl",
"Trojan.Win32.Small.ciwsuw",
"TrojWare.Win32.Injector.AH",
"Trojan.DownLoad3.28161",
"Trojan.Bublik.Win32.12106",
"TROJ_BANLOAD.KAV",
"BehavesLike.Win32.PWSZbot.dh",
"Backdoor.Win32.Androm",
"W32/Trojan3.GBH",
"Trojan/Small.oxi",
"Trojan/Win32.Bublik",
"Trojan.Win32.Small.cpl",
"Trojan:Win32/Dorv.D!rfn",
"Worm/Win32.Palevo.C199836",
"Trojan.Small",
"Trojan.Email.FA",
"Trojan.Small.AAB",
"Win32/TrojanDownloader.Small.AAB",
"Trojan.Bublik!BrbaRvXyIc8",
"W32/Bublik.AAB!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Custom",
"Encryption",
"Other",
"variants",
"have",
"used",
"custom-implemented",
"encryption",
"algorithms",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Backdoor.80"
] | [
16,
3,
16,
16,
16,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Ransom.Exxroute.A3",
"Trojan.Ransom.Lukitos.1",
"Ransom_CERBER.SM37",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"W32.Ramnit!dr",
"Ransom_CERBER.SM37",
"Trojan.PWS.Sphinx.2",
"BehavesLike.Win32.Ransomware.cc",
"Trojan:Win32/CeeInject.MJ!bit",
"Trojan/Win32.Fareit.R189070",
"Trj/GdSda.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Currently",
",",
"the",
"Twitoor",
"trojan",
"has",
"been",
"downloading",
"several",
"versions",
"of",
"mobile",
"banking",
"malware",
"."
] | [
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.WisdwslD.Trojan",
"TrojanDownloader.Esaprof.A4",
"Trojan.Strictor.D542D",
"Trojan.Esaprof",
"Win32/SillyDL.YTP",
"TROJ_ESAPROF_EK2501B4.UVPM",
"SWF.Plicker.1",
"TROJ_ESAPROF_EK2501B4.UVPM",
"BehavesLike.Win32.Dropper.wc",
"TrojanDownloader:SWF/Esaprof.B",
"Trojan.Win32.Downloader.3514368[UPX]",
"Trojan.Downloader",
"Trj/CI.A",
"SWF/TrojanDownloader.Esaprof.A",
"Trojan.Patched"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"Windows",
"kernel",
"vulnerability",
"(",
"CVE-2015-2387",
")",
"existed",
"in",
"the",
"open",
"type",
"font",
"manager",
"module",
"(",
"ATMFD.dll",
")",
"and",
"can",
"be",
"exploited",
"to",
"bypass",
"the",
"sandbox",
"mitigation",
"mechanism",
"."
] | [
16,
7,
15,
15,
16,
7,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"spear-phishing",
"email",
"was",
"sent",
"to",
"a",
"diplomat",
"of",
"the",
"Embassy",
"of",
"Uzbekistan",
"who",
"is",
"likely",
"based",
"in",
"Beijing,",
"China."
] | [
16,
1,
9,
16,
16,
16,
16,
4,
12,
12,
12,
12,
12,
16,
16,
16,
16,
16,
2,
10
] |
[
"In",
"aggregate",
",",
"the",
"type",
"of",
"information",
"stolen",
"could",
"let",
"an",
"attacker",
"know",
"where",
"a",
"person",
"is",
",",
"with",
"whom",
"they",
"are",
"associated",
"(",
"including",
"contacts",
"β",
"profile",
"photos",
")",
",",
"the",
"messages",
"they",
"are",
"sending",
",",
"the",
"websites",
"they",
"visit",
"and",
"search",
"history",
",",
"screenshots",
"that",
"reveal",
"data",
"from",
"other",
"apps",
"on",
"the",
"device",
",",
"the",
"conversations",
"they",
"have",
"in",
"the",
"presence",
"of",
"the",
"device",
",",
"and",
"a",
"myriad",
"of",
"images",
"including",
"anything",
"at",
"which",
"device",
"β",
"s",
"camera",
"is",
"pointed",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.SocksT.Trojan",
"Worm.Win32.Socks!O",
"Trojan.Zbot.EO4",
"Worm.Socks.Win32.38",
"W32.W.Socks.tnAV",
"W32/Socks.ey",
"TROJ_SPNR.14DL13",
"Win32.Trojan.Kryptik.el",
"Win32/Tnega.McRJca",
"TROJ_SPNR.14DL13",
"Win.Trojan.Ag-4254306-1",
"Worm.Win32.Socks.ey",
"Trojan.Win32.Socks.wtnjo",
"Worm.Win32.Socks.791340",
"BackDoor.FireOn.221",
"BehavesLike.Win32.VirRansom.tc",
"Trojan-Spy.Zbot.BE",
"Trojan/PSW.Almat.dwk",
"W32.Infostealer.Zeus",
"Worm/Win32.Socks",
"Worm.Socks.ey.kcloud",
"Worm.Socks",
"Worm.Win32.Socks.ey",
"Worm/Win32.Socks.C35688",
"Virus.Socks.ey",
"Worm.Socks!MDTxLrvAMvg"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Turla,",
"which",
"has",
"been",
"targeting",
"governments,",
"government",
"officials",
"and",
"diplomats",
"for",
"years",
"β",
"see,",
"as",
"an",
"example,",
"this",
"recent",
"paper",
"β",
"is",
"still",
"using",
"watering",
"hole",
"techniques",
"to",
"redirect",
"potentially",
"interesting",
"victims",
"to",
"their",
"C",
"C",
"infrastructure."
] | [
6,
16,
16,
16,
16,
4,
12,
12,
16,
4,
16,
0,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9,
16,
16,
16,
16,
16,
16,
16,
5,
13,
13
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.DostoxaLTB.Trojan",
"Trojan.Mogoogwi.A3",
"WORM_MOGOOGWI.SMHA",
"Win32.Trojan.WisdomEyes.16070401.9500.9996",
"WORM_MOGOOGWI.SMHA",
"Trojan-Dropper.MSIL",
"Trojan:MSIL/Mogoogwi.A",
"Trojan.Barys.DC996",
"Trojan/Win32.Zusy.R154407",
"Trj/CI.A",
"Win32/Trojan.65a"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"READ_EXTERNAL_STORAGE",
"-",
"Allows",
"the",
"application",
"to",
"read",
"from",
"external",
"storage",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"However",
",",
"this",
"wo",
"n't",
"close",
"the",
"application",
",",
"it",
"will",
"send",
"it",
"to",
"the",
"background",
",",
"instead",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Dynamer.A8",
"Trojan.Ransom.Globe",
"Win32.Trojan.WisdomEyes.16070401.9500.9595",
"Ransom.Purge",
"Ransom_PURGE.SM1",
"Win32.Trojan-Ransom.Globe.A",
"Trojan-Ransom.Win32.Purga.v",
"Win32.Trojan.Purga.Hvjx",
"Trojan.Encoder.6182",
"BehavesLike.Win32.Sytro.kc",
"W32/Trojan.DXHE-6024",
"Trojan.CryFile.co",
"Trojan[Ransom]/Win32.CryFile",
"Troj.Ransom.W32!c",
"Trojan-Ransom.Win32.Purga.v",
"Ransom:Win32/Contentocrypt.A",
"Trojan/Win32.CryFile.R186838",
"TrojanDropper.Dapato",
"Ransom.Globe",
"Trojan.Filecoder!iQ4fX8DOQ4o",
"Trj/GdSda.A",
"Win32/Trojan.Ransom.524"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Taiwan",
"has",
"long",
"been",
"subjected",
"to",
"persistent",
"targeting",
"from",
"espionage",
"motivated",
"threat",
"actors."
] | [
2,
16,
16,
16,
16,
16,
16,
16,
16,
6,
14,
14,
14
] |
[
"This",
"attack",
"chain",
"exposed",
"millions",
"of",
"potential",
"victims",
"in",
"the",
"US,",
"Canada,",
"the",
"UK,",
"and",
"Australia,",
"leveraging",
"slight",
"variations",
"on",
"a",
"fake",
"browser",
"update",
"scheme",
"that",
"worked",
"on",
"all",
"three",
"major",
"Windows",
"web",
"browsers."
] | [
16,
1,
16,
16,
16,
16,
16,
1,
16,
2,
10,
10,
10,
10,
16,
2,
16,
16,
16,
16,
1,
9,
9,
9,
9,
16,
16,
16,
16,
16,
16,
5,
13,
13
] |
[
"Our",
"investigation",
"into",
"these",
"attacks",
"has",
"unearthed",
"more",
"details",
"into",
"the",
"method",
"by",
"which",
"the",
"threat",
"actors",
"delivered",
"the",
"Disttrack",
"payload."
] | [
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
6,
14,
14,
16,
16,
3,
11
] |
[
"We",
"re",
"constantly",
"following,",
"detecting",
"and",
"monitoring",
"the",
"lifecycle",
"of",
"these",
"RATs",
"as",
"they",
"appear,",
"disappear",
"and",
"often",
"reappear",
"under",
"a",
"new",
"moniker."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Shipping",
"companies",
"and",
"medical",
"laboratories",
"in",
"Asia",
"are",
"being",
"targeted",
"in",
"a",
"likely",
"intelligence-gathering",
"campaign",
"that",
"relies",
"exclusively",
"on",
"publicly",
"available",
"and",
"living-off-the-land",
"tools."
] | [
4,
12,
16,
4,
12,
16,
2,
16,
16,
16,
16,
16,
16,
6,
14,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan-Spy/W32.Small.8704.J",
"Trojan-Spy.Win32.Small!O",
"TrojanDownloader.Dielel",
"Troj.Spy.W32.Small.jzk!c",
"TROJ_GOGLOAD.A",
"Win32.Trojan.WisdomEyes.16070401.9500.9995",
"W32/Trojan.IOOK-0066",
"TROJ_GOGLOAD.A",
"Trojan-Spy.Win32.Small.jzk",
"DLOADER.Trojan",
"Trojan.Win32.Spy",
"DangerousObject.Multi.bcf",
"W32/Small.JZK!tr",
"Trojan[Spy]/Win32.Small",
"Win32.Troj.small.j.kcloud",
"Trojan.Heur.LP.EEE6A9",
"Trojan-Spy.Win32.Small.jzk",
"TrojanDownloader:Win32/Dielel.A",
"TrojanSpy.Small",
"Win32.Trojan-spy.Small.Iit"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Over",
"time",
",",
"this",
"campaign",
"will",
"also",
"infect",
"the",
"same",
"device",
",",
"repeatedly",
",",
"with",
"the",
"latest",
"malicious",
"patches",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"technique",
"reminds",
"us",
"of",
"a",
"combination",
"between",
"ages",
"old",
"war",
"strategies",
"β",
"Divide",
"et",
"impera",
"β",
"and",
"β",
"By",
"way",
"of",
"deception",
"β",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"targetting",
"Linux",
"also",
"known",
"as:",
"Trojan.Linux.MiraiDDoS.BI",
"Downloader.Mirai.Linux.8",
"Troj.Downloader.Linux!c",
"ELF_MIRAI.A",
"HEUR:Trojan-Downloader.Linux.Mirai.b",
"Trojan.Linux.MiraiDDoS.BI",
"Trojan.Mlw.ektbyu",
"Trojan.Linux.MiraiDDoS.BI",
"Trojan.Linux.MiraiDDoS.BI",
"Linux.DownLoader.289",
"ELF_MIRAI.A",
"LINUX/Dldr.Mirai.qqlgv",
"Trojan[Downloader]/Linux.Gafgyt.b",
"Trojan.Linux.MiraiDDoS.BI",
"Linux.S.Mirai.1204",
"HEUR:Trojan-Downloader.Linux.Mirai.b",
"TrojanDownloader:Linux/Mirai.A",
"Backdoor.Linux.Mirai",
"Linux.Trojan-downloader.Gafgyt.Amlt",
"Trojan-Downloader.Linux.Mirai",
"Trojan.Linux.MiraiDDoS.BI"
] | [
16,
3,
16,
11,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"May",
"2018",
"to",
"April",
"2019",
":",
"This",
"is",
"the",
"actual",
"mature",
"stage",
"of",
"β",
"Agent",
"Smith",
"β",
"campaign",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
16
] |
[
"This",
"payload",
"will",
"then",
"attempt",
"to",
"instantiate",
"a",
"remote",
"reverse",
"/system/bin/sh",
"shell",
"to",
"the",
"Command",
"&",
"Control",
"ws.my-local-weather",
"[",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
1,
9,
9
] |
[
"FrozenCell",
"is",
"the",
"mobile",
"component",
"of",
"a",
"multi-platform",
"attack",
"we",
"'ve",
"seen",
"a",
"threat",
"actor",
"known",
"as",
"\"",
"Two-tailed",
"Scorpion/APT-C-23",
",",
"''",
"use",
"to",
"spy",
"on",
"victims",
"through",
"compromised",
"mobile",
"devices",
"and",
"desktops",
"."
] | [
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Kryptowire",
"says",
"the",
"code",
",",
"which",
"it",
"found",
"on",
"a",
"BLU",
"R1",
"HD",
"devices",
",",
"transmitted",
"fine-grained",
"location",
"information",
"and",
"allowed",
"for",
"the",
"remote",
"installation",
"of",
"other",
"apps",
"."
] | [
4,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Cybereason",
"'s",
"investigation",
"shows",
"that",
"the",
"threat",
"actor",
"behind",
"the",
"FakeSpy",
"campaign",
"is",
"a",
"Chinese-speaking",
"group",
"dubbed",
"\"",
"Roaming",
"Mantis",
"''",
",",
"a",
"group",
"that",
"has",
"led",
"similar",
"campaigns",
"."
] | [
4,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
4,
12,
16,
16,
12,
16,
16,
16,
16,
16,
16,
16
] |
[
"Version",
"#",
"2",
":",
"June",
"-",
"Aug.",
"2019",
"β",
"Domain",
":",
"somtum",
"[",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9
] |
[
"Others",
"like",
"transferbot",
",",
"promptupdate",
"and",
"promptuninstall",
"are",
"meant",
"to",
"help",
"the",
"operator",
"manage",
"the",
"malware",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Worm.Verauto.A",
"Win32.Worm.Verauto.A",
"Trojan/VB.oda",
"Win32.Worm.Verauto.A",
"W32/VB.OO",
"Virus.Win32.VB.b",
"Win32.Worm.Verauto.A",
"Virus.Win32.VB.gixe",
"W32.VB.b!c",
"Win32.Virus.Vb.Swum",
"Win32.Worm.Verauto.A",
"Virus.Win32.VB.b",
"Win32.Worm.Verauto.A",
"Win32.HLLW.Verauto",
"Virus.VB.Win32.76",
"worm.win32.vobfus.cf",
"W32/VB.YYAQ-1388",
"WORM/Verauto.A",
"Virus/Win32.VB",
"Worm:Win32/SillyVB.B",
"Win32.Worm.Verauto.A",
"Trojan.VB",
"Win32/VB.ODA",
".Virus.EICAR_BOOV",
"Worm.Win32.VB",
"W32/VB.B!tr",
"Win32/VB.BM"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.