tokens
sequencelengths
2
296
ner_tags
sequencelengths
2
296
[ "The", "iOS", "versions", "were", "available", "outside", "the", "app", "store", ",", "through", "phishing", "sites", ",", "and", "abused", "the", "Apple", "Developer", "Enterprise", "program", "." ]
[ 16, 5, 16, 16, 16, 16, 16, 5, 13, 16, 16, 16, 16, 16, 16, 16, 16, 4, 12, 12, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "TrojanSpy.MSIL", "Win32.Trojan.WisdomEyes.16070401.9500.9866", "Trojan.Win32.Downeks.exeslg", "Troj.Spy.Msil.Downeks!c", "Trojan.MSILPerseus.D21B6F", "TrojanSpy:MSIL/Tinclex.A", "Riskware.Confuser!", "Trj/GdSda.A", "Win32/Trojan.Spy.7a8" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "By", "comparing", "the", "sizes", "of", "the", "encrypted", "asset", "file", "tong.luo", "vs", "the", "decrypted", "JAR", "file", "mycode.jar", ",", "it", "is", "interesting", "to", "note", "that", "it", "is", "the", "same", "file", "(", "almost", "the", "same", "size", ")", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "malware,", "which", "has", "been", "identified", "by", "many", "vendors", "on", "VirusTotal,", "has", "been", "labeled", "by", "our", "researchers", "as", "Trojan.Chinad", "or", "just", "Chinad", "as", "an", "alternative", "short", "label." ]
[ 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 3, 16, 16, 16, 16, 16 ]
[ "The", "group", "behind", "the", "attacks", "is", "possibly", "associated", "with", "the", "Russian", "government", "and", "has", "been", "active", "since", "at", "least", "2007." ]
[ 16, 6, 16, 16, 9, 16, 16, 16, 16, 16, 4, 12, 16, 16, 16, 16, 16, 16, 16, 0 ]
[ "A", "backdoor", "also", "known", "as:", "W32.HfsAutoB.BCDE", "Backdoor.Baceed", "Backdoor.Hupigon.Win32.11548", "Backdoor.W32.Hupigon.torp", "W32/Backdoor2.EVBN", "Backdoor.Trojan", "Win.Trojan.Hupigon-27433", "Backdoor.Win32.Hupigon.gklq", "Trojan.Win32.Hupigon.wnxa", "Backdoor.Win32.Hupigon.163840.I", "Backdoor.Win32.Hupigon.gklqo", "BackDoor.Pigeon1.8593", "W32/Backdoor.ECNM-9194", "Backdoor/Hupigon.jmk", "W32.Backdoor.Hupigon", "BDS/Baceed.hrhsh", "Trojan[Backdoor]/Win32.Hupigon", "Backdoor:Win32/Baceed.A!bit", "Backdoor.Win32.Hupigon.gklq", "Trojan/Win32.Hupigon.R42586", "TScope.Malware-Cryptor.SB", "Win32.Backdoor.Hupigon.Pavs", "Backdoor.Win32.Hupigon", "Win32/Trojan.aab" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Ransom.Crypt12", "Ransom.Kristina", "Ransom_CRYPTWELVE.B", "Win32.Trojan.WisdomEyes.16070401.9500.9562", "Ransom.CryptXXX", "Ransom_CRYPTWELVE.B", "Win.Ransomware.Kristina-6367716-1", "MSIL.Trojan-Ransom.Crypt12.B", "Trojan.Win32.Encoder.evktgv", "Trojan.Win32.Z.Ransom.124928.G", "Trojan.Encoder.15080", "Trojan.Filecoder.Win32.6738", "Ransom.MSIL.Natiris", "W32/Trojan.ERVC-5011", "TR/RedCap.khogd", "Ransom:MSIL/Natiris.A", "Trojan/Win32.Ransom.C2247299", "Trj/GdSda.A", "Win32/Trojan.Ransom.15c" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Wolf", "Research", "claimed", "to", "shut", "down", "their", "operations", "but", "we", "clearly", "see", "that", "their", "previous", "work", "continues", "under", "another", "guise", "." ]
[ 11, 12, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "First", "we", "got", "the", "Linux", "variant,", "and", "with", "information", "extracted", "from", "its", "binary,", "we", "were", "able", "to", "find", "the", "variant", "for", "Windows", "desktops,", "too." ]
[ 16, 16, 16, 16, 5, 13, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 16 ]
[ "However", ",", "although", "the", "β€œ", "Concipit1248", "”", "app", "requested", "permissions", "to", "open", "the", "device", "camera", "and", "read", "photos", ",", "the", "code", "only", "can", "upload", "a", "self-contained", "PNG", "file", "to", "a", "remote", "sever", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "https", ":", "//github.com/El3ct71k/Keylogger/", "It", "appears", "the", "developers", "have", "copied", "the", "functional", "part", "of", "the", "keylogger", "module", "from", "this", "project", "." ]
[ 1, 9, 9, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Each", "value", "represents", "a", "different", "type", "of", "data", "to", "steal", "from", "the", "device", ":", "Value", "Data", "Type", "1", "Accounts", "2", "Installed", "APP", "list", "3", "Running", "processes", "list", "4", "Battery", "status", "5", "Browser", "bookmarks", "and", "histories", "6", "Call", "logs", "7", "Clipboard", "8", "Contacts", "9", "Mobile", "operator", "information", "a", "File", "list", "on", "SD", "card", "b", "Location", "c", "Image", "list", "d", "Audio", "list", "e", "Video", "list", "f", "Storage", "and", "memory", "information", "g", "Connection", "information", "h", "Sensors", "information", "i", "SMS", "messages", "j", "VCard", "format", "contacts", "Table", "1", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Esacel", "Win32.Trojan.WisdomEyes.16070401.9500.9998", "Trojan.Win32.Kryptik.exqpjd", "Trojan.Kryptik.Win32.1351348", "W32/Trojan.MCPS-3536", "TR/Crypt.ZPACK.ocodu", "Trojan.Esacel", "Trj/CI.A", "Trojan.Kryptik!MH3d/6dQFBI", "Trojan.Inject", "Malicious_Behavior.SB" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Any", "app", "can", "ask", "for", "accessibility", "permissions", "and", "implement", "features", "such", "as", "screen", "reading", ",", "changing", "sizes", "and", "colors", "of", "objects", ",", "hearing", "enhancements", ",", "replacing", "touch", "with", "other", "forms", "of", "control", "and", "more", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "At", "FireEye", "Labs,", "we", "recently", "detected", "the", "resurgence", "of", "a", "coin", "mining", "campaign", "with", "a", "novel", "and", "unconventional", "infection", "vector", "in", "the", "form", "of", "an", "iFRAME", "inline", "frame", "–", "an", "HTML", "document", "embedded", "inside", "another", "HTML", "document", "on", "a", "web", "page", "that", "allows", "users", "to", "get", "content", "from", "another", "separate", "source", "and", "display", "it", "within", "the", "main", "web", "page", "–", "embedded", "in", "a", "PE", "binary", "Portable", "Executable", "Binary,", "or", ".exe." ]
[ 3, 4, 12, 16, 16, 16, 16, 16, 16, 16, 6, 14, 14, 16, 16, 16, 16, 16, 7, 15, 16, 16, 16, 16, 16, 1, 9, 9, 16, 1, 9, 9, 9, 9, 9, 9, 9, 16, 16, 4, 11, 15, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 9, 9, 9, 16, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.QHost.ACI", "Trojan.Win32.Qhost!O", "Trojan.QHost.ACI", "TROJ_RENOS.TU", "Win32.Trojan.WisdomEyes.16070401.9500.9838", "W32/Trojan.YCCB-6079", "Trojan.Dropper", "TROJ_RENOS.TU", "Win.Trojan.Small-4579", "Trojan.Win32.Qhost.abh", "Trojan.QHost.ACI", "Trojan.Win32.Qhost.slro", "Trojan.QHost.ACI", "TrojWare.Win32.TrojanDownloader.FakeAlert.G", "Trojan.QHost.ACI", "Trojan.Fakealert.399", "BehavesLike.Win32.Dropper.nc", "W32/Trojan2.CMAE", "Trojan/Qhost.tf", "Trojan:Win32/Wantvi.C", "Trojan.Win32.Qhost.abh", "Trojan.QHost.ACI", "Trojan/Win32.Qhost.R34501", "Trojan.QHost.ACI", "OScope.Hoax.Win32.FakeAlert", "Trojan.Qhost", "Win32/TrojanDownloader.FakeAlert.G", "Trojan.Qhost.EP", "Trojan.Win32.Qhost.abh", "W32/Qhost.ABH!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan-Downloader.Mediket.CD", "Troj.Downloader.W32.Mediket.cd!c", "Trojan/Downloader.Mediket.cd", "Win32.Trojan.WisdomEyes.16070401.9500.9810", "W32/Downloader.JJGI-8097", "Win32/SillyDl.FL", "Trojan-Downloader.Win32.Mediket.cd", "Trojan.Win32.Mediket.dkal", "Trojan.Win32.Downloader.10240.ES", "Trojan.DownLoader.7470", "Downloader.Mediket.Win32.64", "Trojan-Downloader.Win32.Mediket.bl", "W32/DldrX.DHK", "TrojanDownloader.Mediket.fv", "TR/Dldr.Mediket.S.2", "Trojan[Downloader]/Win32.Mediket", "Trojan.Heur.amGfYI3rB7li", "Trojan-Downloader.Win32.Mediket.cd", "Trojan/Win32.Small.C140121", "Trojan-Downloader.Win32.Mediket.ca", "Trojan-Downloader.Mediket.CD", "Win32.Trojan-downloader.Mediket.Ajvz", "W32/Dloader.CD!tr.dldr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "particular", "focus", "appears", "to", "have", "been", "placed", "on", "the", "healthcare", "industry." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/W32.Small.6656.AAX", "Trojan.Win32.Small!O", "Trojan.Tosct", "Trojan.Heur.RP.EF49A0", "TROJ_DLOADER.FAV", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "W32/Trojan.MPRY-6149", "TROJ_DLOADER.FAV", "Trojan.Win32.Small.coy", "Trojan.Win32.Small.cwxndz", "Trojan.Click2.56220", "Trojan.Small.Win32.19363", "Trojan.Win32.Tosct", "Trojan/Small.ovb", "TR/Spy.6656.106", "Trojan/Win32.Small", "Win32.Troj.Undef.kcloud", "Trojan.Win32.Small.coy", "Trojan:Win32/Tosct.A", "Trojan/Win32.Connapts.C256364", "Trojan.Small.coy", "Trojan.Small", "Win32.Trojan.Small.Aiik", "Trojan.Small!nYMaRKVOefk", "W32/Dloader.FAV!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "In", "these", "websites", "they", "hosted", "malware", "that", "was", "digitally", "signed", "with", "a", "valid,", "likely", "stolen", "code", "signing", "certificate" ]
[ 16, 16, 1, 16, 16, 3, 15, 16, 16, 16, 16, 16, 16, 16, 3, 11, 1, 9 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Hybris.B@mm", "Email-Worm.Win32.Hybris!O", "Worm.Hybris", "W32/Hybris.dll@MM", "W95.Hybris.PI.msOW", "W32/Hybris.dll@MM", "WORM_HYBRIS.F", "Win32.Trojan.WisdomEyes.16070401.9500.9989", "W32/Hybris.worm.B", "W95.Hybris.worm", "WORM_HYBRIS.F", "Win.Trojan.Hybris-10", "Win32.Hybris.B@mm", "Email-Worm.Win32.Hybris.plugin", "Win32.Hybris.B@mm", "Trojan.Win32.Hybris.upukw", "Win32.Hybris", "Win32.Hybris.B@mm", "EmailWorm.Win32.Hybris.lki", "Win98.Vecna.23040", "Worm.Hybris.Win32.8", "BehavesLike.Win32.Virut.pm", "W32/Hybris.worm.B", "Worm/Hybris.c", "Worm[Email]/Win32.Hybris", "Worm:Win32/Hybris.C@mm", "Email-Worm.Win32.Hybris.plugin", "I-Worm/Hybris.Variant", "Win32.Hybris.B@mm", "W32/Hybris.Wsock", "Win32.Hybris.E2C45E", "Win32/Hybris.dll", "Win32.Worm-email.Hybris.Wuqu", "I-Worm.Hybris", "Email-Worm.Win32.Hybris.Based", "W32/Hybris.dll@mm", "Win32/Worm.Email-Worm.47d" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Who", "is", "behind", "Judy", "?", "The", "malicious", "apps", "are", "all", "developed", "by", "a", "Korean", "company", "named", "Kiniwini", ",", "registered", "on", "Google", "Play", "as", "ENISTUDIO", "corp", "." ]
[ 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16, 16, 16, 5, 13, 16, 4, 12, 16 ]
[ "A", "backdoor", "also", "known", "as:", "HW32.Packed.8BE3", "Win32.Neveg.C@mm", "Worm/W32.Neveg.52294.B", "W32/Neveg.c@MM", "W32/Neveg.c", "Win32.Neveg.C@mm", "Trojan.Win32.Neveg.iclu", "W32/Neveg.D@mm", "W32.Neveg.C@mm", "Win32/Neveg.C", "WORM_NEVEG.C", "Worm.Neveg.C.4", "Email-Worm.Win32.Neveg.c", "I-Worm.Neveg!ysm95GgJE50", "I-Worm.Win32.Neveg.52294.C[h]", "W32.W.Neveg.c!c", "Win32.Neveg.C@mm", "Worm.Win32.Neveg.C", "Win32.Neveg.C@mm", "Win32.HLLM.Peerage", "Worm.Neveg.Win32.1", "WORM_NEVEG.C", "BehavesLike.Win32.Ramnit.qc", "W32/Neveg.URKR-8484", "Worm[Email]/Win32.Neveg", "Win32.Neveg.EB4884", "Worm/Win32.MyDoom", "Worm:Win32/Neveng.C@mm", "Win32.Neveg.C@mm", "Worm.Neveg", "W32/Neveg.D.worm", "Win32.Worm-email.Neveg.Lpbl", "Email-Worm.Win32.Neveg.C", "Win32.Neveg.C@mm", "I-Worm/Neveg.C", "Worm.Win32.Neveg.C" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Below", "are", "descriptions", "of", "some", "of", "the", "most", "interesting", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Ahmed", "Mansoor", "is", "an", "internationally", "recognized", "human", "rights", "defender,", "based", "in", "the", "United", "Arab", "Emirates", "UAE,", "and", "recipient", "of", "the", "Martin", "Ennals", "Award", "sometimes", "referred", "to", "as", "a", "Nobel", "Prize", "for", "human", "rights", "." ]
[ 4, 12, 16, 16, 16, 16, 4, 12, 12, 16, 16, 2, 10, 10, 10, 10, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "All", "of", "the", "URLs", "reference", "the", "file", "β€œ", "mms.apk", "”", "and", "all", "use", "the", "domain", "β€œ", "XXXX.ru", "”", ",", "which", "belongs", "to", "a", "top", "five", "shared", "hosting", "platform", "in", "Russia", "(", "the", "domain", "itself", "has", "been", "obfuscated", "to", "anonymize", "the", "provider", ")", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Allows", "an", "application", "to", "send", "SMS", "messages", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32/Trojan.MOBS-7437", "Win.Trojan.B-474", "Virus.Win32.Virut.CE", "Trojan.Heur.LP.EE1B95", "Backdoor:Win32/Liudoor.B!dha", "Backdoor/Win32.Liudoor.R192527", "Trj/CI.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "TrojanDropper.Dorkbot.II4", "Backdoor.Bifrose.Win32.18816", "Backdoor.Bifrose", "Trojan/Midgare.advf", "TROJ_DROPPER.SMS", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Trojan.Dropper", "Win32/Bifrose.KJ", "TROJ_DROPPER.SMS", "Win.Trojan.Bifrose-9522", "Trojan.Win32.Midgare.bqxuse", "BackDoor.Bifrost.26217", "BehavesLike.Win32.Downloader.kc", "Backdoor/Bifrose.ovy", "TR/Midgare.adjf", "Trojan[Backdoor]/Win32.Bifrose", "Win32.Hack.MnlessT.lo.88519", "TrojanDropper:Win32/Dooxud.A", "Trojan.Graftor.D46F7", "Backdoor.Win32.Bifrose.77824.N", "Trojan/Win32.Bifrose.R3685", "Backdoor.Bifrose", "VirTool.Injector!nUBzjCDRby4", "Trojan.Win32.Midgare" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Proofpoint", "researchers", "originally", "discovered", "the", "Panda", "Banker", "malware", "in", "February,", "2016." ]
[ 4, 12, 16, 16, 3, 11, 11, 11, 16, 0, 8 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9961", "Trojan.Win32.Bladabindi.esnxij", "Trojan.Win32.Z.Bladabindi.116224.CW", "Worm.MSIL.Autorun", "Trojan.MSIL.Bladabindi.1", "TrojanDownloader:MSIL/Prardrukat.A", "Trj/GdSda.A", "Win32.Trojan.Atraps.Taew", "Win32/Trojan.62b" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Beginning", "on", "October", "30,", "2015,", "Palo", "Alto", "Networks", "began", "seeing", "instances", "of", "this", "new", "version", "of", "CryptoWall,", "which", "some", "researchers", "have", "begun", "calling", "version", "4." ]
[ 16, 16, 0, 8, 8, 4, 12, 12, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 4, 16, 16, 16, 3, 11 ]
[ "Table", "2", "below", "lists", "some", "of", "these", "apps", "with", "their", "respective", "metadata", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.FakeFolderDAS.Trojan", "Backdoor.Win32.BlackHole!O", "Worm.RussoTuristo", "Worm.RussoTuristo.Win32.83", "Trojan.Heur.E54A1B", "Win32/Russo.A", "Worm.Win32.RussoTuristo.f", "Trojan.Win32.Amorale.crsxml", "Worm.Win32.RussoTuristo.53326", "Trojan.Win32.FakeFolder.pb", "Win32.HLLW.Amorale", "BehavesLike.Win32.Adware.qh", "Backdoor/Blackhole.bmv", "Worm/Win32.RussoTuristo", "Worm.Win32.RussoTuristo.f", "Worm/Win32.RussoTuristo.R58000", "Worm.TycKa.K", "Worm.Win32.RussoTuristo", "Worm.Win32.FakeFolder.CI" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "In", "the", "past", "weeks", "on", "6", "August", "2016,", "Cyberkov", "Security", "Incident", "Response", "Team", "CSIRT", "received", "a", "numerous", "Android", "malwares", "operating", "in", "different", "areas", "in", "Libya", "especially", "in", "Tripoli", "and", "Benghazi." ]
[ 16, 16, 0, 8, 16, 0, 8, 8, 4, 12, 12, 12, 12, 12, 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 2, 16, 16, 2, 16, 2 ]
[ "Since", "January", "2016,", "discreet", "campaigns", "involving", "malware", "called", "Trojan.Odinaff", "have", "targeted", "a", "number", "of", "financial", "organizations", "worldwide." ]
[ 16, 0, 8, 16, 6, 16, 3, 11, 1, 16, 16, 16, 16, 16, 4, 12, 12 ]
[ "The", "campaign", "Talos", "analysed", "focused", "on", "Brazilian", "users", "and", "also", "attempted", "to", "remain", "stealthy", "by", "using", "multiple", "methods", "of", "re-direction", "in", "an", "attempt", "to", "infect", "the", "victim", "machine." ]
[ 6, 14, 4, 16, 16, 16, 4, 12, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 13 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Syamcrog", "Trojan.Ursu.D1107", "Win.Trojan.Bifrose-10939", "Trojan.Win32.Tiny.etjahi", "TR/Downloader.wgueo", "Trojan:Win32/Syamcrog.A", "Trojan.Refroso", "Trj/GdSda.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Unfortunately,", "the", "ransomware", "developers", "were", "not", "apprehended", "and", "it", "now", "appears", "they", "have", "been", "biding", "their", "time", "before", "releasing", "a", "new", "ransomware." ]
[ 16, 16, 6, 14, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3 ]
[ "This", "malware", "variant", "also", "appears", "to", "be", "technically", "superior", "to", "many", "other", "banking", "Trojans", "being", "able", "to", "use", "its", "overlay", "attack", "even", "on", "Android", "6", ",", "which", "has", "technical", "improvements", "compared", "to", "the", "previous", "Android", "versions", "to", "prevent", "such", "attacks", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16 ]
[ "Meanwhile,", "we", "have", "informed", "the", "Google", "Play", "security", "team", "about", "the", "RetroTetris", "app", "and", "are", "awaiting", "their", "response." ]
[ 16, 16, 16, 16, 16, 4, 12, 12, 12, 16, 16, 3, 11, 16, 16, 16, 16, 16 ]
[ "Adobe", "released", "a", "patch", "for", "the", "vulnerability", "on", "July", "8,", "2015." ]
[ 4, 16, 16, 16, 16, 16, 7, 16, 0, 8, 8 ]
[ "Evolution", "of", "Rotexy", "2014–2015", "Since", "the", "malicious", "program", "was", "detected", "in", "2014", ",", "its", "main", "functions", "and", "propagation", "method", "have", "not", "changed", ":", "Rotexy", "spreads", "via", "links", "sent", "in", "phishing", "SMSs", "that", "prompt", "the", "user", "to", "install", "an", "app", "." ]
[ 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "malware", "payloads", "observed", "to", "be", "associated", "with", "the", "Uyghur", "themed", "C2", "domains", "so", "far", "consist", "of", "PlugX,", "Gh0st", "RAT,", "and", "Saker/Xbox,", "although", "there", "may", "be", "others", "that", "are", "yet", "to", "be", "discovered." ]
[ 3, 11, 11, 16, 16, 16, 16, 16, 16, 4, 1, 9, 9, 16, 16, 16, 16, 3, 11, 11, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "approach", "of", "separating", "malicious", "functionality", "out", "into", "separate", "stages", "that", "are", "later", "downloaded", "during", "execution", "and", "not", "present", "in", "the", "initial", "app", "published", "to", "the", "Google", "Play", "Store", ",", "combined", "with", "social", "engineering", "delivered", "via", "social", "media", "platforms", "like", "Facebook", ",", "requires", "minimal", "investment", "in", "comparison", "to", "premium", "tooling", "like", "Pegasus", "or", "FinFisher", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 3, 16 ]
[ "However", ",", "this", "method", "may", "not", "work", "if", "the", "threat", "actors", "react", "quickly", "to", "an", "attempt", "to", "remove", "the", "Trojan", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "BackDoor.RevetRat.2", "BehavesLike.Win32.Trojan.cc" ]
[ 16, 3, 16, 16, 16, 1, 1 ]
[ "Not", "only", "that,", "but", "the", "Windows", "version", "was", "additionally", "equipped", "with", "a", "valid", "code", "signing", "signature." ]
[ 16, 16, 16, 16, 16, 5, 13, 16, 16, 16, 16, 16, 1, 9, 9, 9 ]
[ "This", "was", "followed", "by", "another", "great", "blog", "by", "McAfee", "on", "the", "same", "subject", "but", "my", "focus", "will", "be", "on", "a", "specific", "aspect", "mentioned", "in", "the", "RSA", "blog", "which", "is", "the", "exploit", "used.", "FireEye", "discovered", "a", "malicious", "docx", "exploiting", "a", "zero", "day", "vulnerability", "in", "Microsoft's", "Encapsulated", "Postscript", "EPS", "filter,", "in", "the", "summer", "of", "2015." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 4, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16, 16, 16, 16, 3, 16, 4, 16, 16, 1, 9, 7, 15, 15, 15, 15, 16, 1, 9, 9, 9, 9, 16, 0, 8, 8, 8 ]
[ "The", "malware", "can", "execute", "a", "variety", "of", "arbitrary", "commands", ",", "including", "(", "for", "example", ")", "intercepting", "or", "sending", "text", "messages", "without", "the", "user", "’", "s", "knowledge", ",", "obtaining", "a", "copy", "of", "the", "victim", "’", "s", "Address", "Book", ",", "or", "call", "or", "text", "message", "logs", ",", "or", "sending", "phone", "network", "feature", "codes", "(", "also", "known", "as", "USSD", "codes", ")", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Most", "of", "them", "are", "almost", "harmless", "β€”", "all", "they", "did", "until", "recently", "was", "injecting", "tons", "of", "ads", "and", "downloading", "others", "of", "their", "kind", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Care", "and", "concern", "both", "for", "using", "a", "mobile", "device", "and", "for", "securing", "a", "mobile", "device", "is", "critical", ",", "especially", "for", "those", "organizations", "that", "allow", "bring-your-own-devices", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "In", "some", "cases", ",", "TrickMo", "may", "use", "this", "feature", "to", "intercept", "SMS", "messages", "without", "the", "knowledge", "of", "the", "user", "by", "activating", "the", "lockdown", "screen", "and", "intercepting", "SMS", "messages", "in", "the", "background", "." ]
[ 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "first", "trace", "of", "this", "tool", "in", "our", "telemetry", "data", "dates", "back", "to", "late", "2015." ]
[ 16, 16, 16, 16, 16, 3, 16, 16, 5, 13, 16, 16, 16, 0, 8 ]
[ "This", "report", "is", "a", "comprehensive", "description", "of", "the", "JSocket", "Remote", "Access", "Tool", "RAT,", "and", "its", "significant", "capability", "to", "control", "PCs,", "Linux", "machines,", "Macs", "and", "Android", "devices." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 11, 11, 11, 16, 16, 16, 16, 16, 1, 9, 5, 13, 13, 16, 5, 13 ]
[ "Earlier", "this", "month,", "FortiGuard", "Labs", "researchers", "published", "findings", "about", "a", "malware", "campaign", "exploiting", "a", "PowerPoint", "vulnerability." ]
[ 16, 16, 0, 4, 12, 12, 16, 16, 16, 16, 6, 14, 7, 15, 15, 15 ]
[ "While", "the", "cyber-world", "was", "still", "shaking", "under", "the", "destructive", "ExPetr/Petya", "attack", "that", "hit", "on", "June", "27,", "another", "ransomware", "attack", "targeting", "Ukraine", "at", "the", "same", "time", "went", "almost", "unnoticed." ]
[ 16, 16, 6, 16, 16, 16, 16, 16, 16, 3, 1, 16, 16, 16, 0, 8, 16, 1, 9, 16, 2, 16, 16, 16, 16, 16, 16, 16 ]
[ "Cybereason", "Mobile", "detects", "EventBot", "and", "provides", "the", "user", "with", "immediate", "actions", "." ]
[ 5, 13, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Johnnie.DB3AF", "Trojan.Win32.Clicker!BT", "W32/Trojan.IUSC-1586", "TrojanClicker:MSIL/Youclick.A", "Trojan.Win32.Clicker!BT", "Trojan-Clicker.MSIL.Youclick" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1 ]
[ "These", "included", "the", "use", "of", "certificate", "pinning", "and", "public", "key", "encryption", "for", "C2", "communications", ",", "geo-restrictions", "imposed", "by", "the", "C2", "when", "delivering", "the", "second", "stage", ",", "and", "the", "comprehensive", "and", "well", "implemented", "suite", "of", "surveillance", "features", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Recently,", "while", "researching", "attacks", "on", "targets", "in", "Thailand,", "Unit", "42", "discovered", "a", "tool", "that", "initially", "appeared", "to", "be", "a", "variant", "of", "the", "well-known", "PlugX", "RAT", "based", "on", "similar", "observed", "behavior", "such", "as", "the", "usage", "of", "DLL", "side-loading", "and", "a", "shellcode", "file." ]
[ 16, 16, 16, 1, 16, 16, 16, 2, 4, 12, 16, 16, 3, 15, 16, 16, 16, 16, 16, 3, 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 9, 9, 16, 16, 1, 9 ]
[ "We", "sourced", "the", "over", "561MB", "of", "exfiltrated", "data", "from", "this", "domain", "alone", ",", "all", "of", "which", "we", "found", "to", "be", "7z", "compressed", "and", "password", "protected", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "YOUR", "PERSONAL", "ID:", "Personal", "ID", "of", "your", "computer,", "for", "example:", "4df7065b1d049d098526344faaabf3f8" ]
[ 1, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9 ]
[ "Threat", "data", "from", "endpoints", "are", "combined", "with", "signals", "from", "email", "and", "data", ",", "identities", ",", "and", "apps", "in", "Microsoft", "365", "Defender", "(", "previously", "Microsoft", "Threat", "Protection", ")", ",", "which", "orchestrates", "detection", ",", "prevention", ",", "investigation", ",", "and", "response", "across", "domains", ",", "providing", "coordinated", "defense", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 13, 16, 16, 5, 13, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.Sality.lak4", "Trojan.Heur.EFE584", "Win32.Trojan.WisdomEyes.16070401.9500.9961", "Backdoor.Trojan", "Trojan-PSW.Win32.LdPinch.zie", "Trojan.DownLoader.origin", "BehavesLike.Win32.Virut.nt", "Trojan-PSW.Win32.LdPinch.zie" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ ")", "Technical", "Analysis", "App", "Name", ":", "TikTok", "Pro", "Hash", ":", "9fed52ee7312e217bd10d6a156c8b988", "Package", "Name", ":", "com.example.dat.a8andoserverx", "Upon", "installation", ",", "the", "spyware", "portrays", "itself", "as", "TikTok", "using", "the", "name", "TikTok", "Pro", "." ]
[ 9, 16, 16, 16, 16, 16, 5, 13, 16, 16, 1, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 5, 13, 16 ]
[ "]", "us", "." ]
[ 9, 9, 16 ]
[ "The", "international", "investigation", "into", "the", "2014", "Iguala", "Mass", "Disappearance", "was", "targeted", "with", "infection", "attempts", "using", "spyware", "developed", "by", "the", "NSO", "group,", "an", "Israeli", "cyber", "warfare", "company" ]
[ 16, 16, 16, 16, 16, 0, 4, 12, 16, 16, 16, 16, 1, 9, 16, 3, 16, 16, 4, 12, 12, 16, 4, 12, 12, 14 ]
[ "In", "recent", "attacks", "they", "set", "up", "a", "fake", "VPN", "Web", "Portal", "and", "targeted", "at", "least", "five", "Israeli", "IT", "vendors,", "several", "financial", "institutes,", "and", "the", "Israeli", "Post", "Office." ]
[ 16, 16, 1, 16, 16, 16, 16, 1, 9, 9, 9, 16, 16, 16, 16, 16, 2, 4, 12, 16, 4, 12, 16, 16, 4, 12, 12 ]
[ "A", "backdoor", "also", "known", "as:", "VB:Trojan.VBA.Downloader.BU", "X97M.Petya.A", "VB:Trojan.VBA.Downloader.BU", "X2KM_GOLDENEYE.B", "Xls.Dropper.Goldeneye-3", "VB:Trojan.VBA.Downloader.BU", "Trojan.Script.DnlrObj.ejzqyq", "Troj.Downloader.Script!c", "VB:Trojan.VBA.Downloader.BU", "VB:Trojan.VBA.Downloader.BU", "X2KM_GOLDENEYE.B", "X97M/Downloader.au", "VB:Trojan.VBA.Downloader.BU", "Trojan:O97M/Goldeneye.A", "X97M/Downloader.au", "Trojan-Ransom.VBA.GoldenEye", "Macro.Trojan-Dropper.Petya.R", "O97M/Dropper.ALI", "virus.office.obfuscated.1" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "finding", ",", "in", "part", ",", "shows", "the", "risk", "that", "can", "come", "in", "opting", "for", "less", "expensive", "smartphones", ",", "whose", "manufacturers", "may", "not", "diligently", "fix", "security", "vulnerabilities", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 7, 15, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan-Dropper.Win32.Haed!O", "Trojan/Dropper.Haed.co", "TROJ_DROP.SMUS1", "W32/Dropper.BJGT", "Backdoor.Trojan", "TROJ_DROP.SMUS1", "Win.Trojan.Haed-1", "Trojan-Dropper.Win32.Haed.eno", "Trojan.Win32.Drop.mqlso", "Troj.Dropper.W32.Haed.eno!c", "TrojWare.Win32.Kryptik.BAN", "Trojan.Click1.57099", "Dropper.Haed.Win32.381", "virus.win32.ramnit.j", "W32/Risk.OLFU-0240", "TR/Drop.He4Hook.B", "W32/Haed.A!tr.dldr", "Trojan[Dropper]/Win32.Haed", "Trojan.Heur.JP.E9E07C", "Dropper/Win32.Haed.N349364692", "AdWare.AdPlus", "Win32.Trojan-Dropper.Haed.cfsr", "Trojan-Downloader.Win32.Frethog" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "In", "most", "cases", ",", "these", "click", "fraud", "apps", "were", "uninstalled", "by", "the", "users", ",", "probably", "due", "to", "the", "low", "quality", "of", "the", "apps", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Fortunately", ",", "FireEye", "Mobile", "Threat", "Prevention", "platform", "can", "recognize", "the", "malicious", "SMS", "and", "networking", "behaviors", "used", "by", "these", "RuMMS", "samples", ",", "and", "help", "us", "quickly", "identify", "the", "threat", "." ]
[ 16, 16, 5, 13, 13, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "During", "the", "account", "sign-up", "process", ",", "Google", "may", "flag", "the", "account", "creation", "attempt", "as", "suspicious", "and", "prompt", "the", "app", "to", "solve", "a", "CAPTCHA", "." ]
[ 16, 16, 16, 16, 16, 16, 4, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "APC", "routine", "creates", "a", "thread", "in", "the", "context", "of", "the", "svchost.exe", "process", "that", "will", "map", "and", "execute", "the", "stage", "5", "malware", "into", "the", "winlogon.exe", "process", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16 ]
[ "In", "recent", "months,", "the", "malware", "used", "in", "the", "EITest", "campaign", "has", "been", "ransomware", "such", "as", "Spora", "and", "Mole." ]
[ 16, 16, 16, 3, 11, 16, 16, 6, 14, 14, 16, 16, 3, 16, 16, 3, 16, 3 ]
[ "Example", "note:Please", "follow", "the", "instructions", "Send", "$300", "worth", "of", "Bitcoin", "to", "following", "address:", "1Mz7153HMuxXTuR2R1t78mGSdzaAtNbBWX" ]
[ 1, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9 ]
[ "This", "specific", "APK", "was", "modified", "to", "include", "the", "malicious", "remote", "access", "tool", "RAT", "called", "DroidJack", "also", "known", "as", "SandroRAT,", "which", "would", "virtually", "give", "an", "attacker", "full", "control", "over", "a", "victim's", "phone." ]
[ 16, 16, 5, 16, 16, 16, 16, 16, 3, 11, 11, 11, 11, 11, 11, 16, 16, 16, 3, 16, 16, 16, 16, 16, 6, 16, 11, 16, 16, 4, 12 ]
[ "While", "performing", "some", "research", "online,", "Unit", "42", "was", "able", "to", "identify", "the", "following", "sample,", "which", "is", "being", "labeled", "as", "Trojan.Win32.Seadask'", "by", "a", "number", "of", "anti-virus", "companies." ]
[ 16, 16, 16, 16, 16, 4, 12, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 4, 12 ]
[ "Truth", "be", "told,", "these", "are", "all", "likely", "just", "improvements", "by", "the", "author", "to", "fix", "bugs", "or", "simply", "a", "shift", "in", "approach", "to", "make", "signature", "matching", "more", "difficult", "rather", "then", "a", "completely", "new", "variant." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "TROJ_INJECT.YYTS", "Win32.Trojan.WisdomEyes.16070401.9500.9953", "Infostealer.Limitail", "TROJ_INJECT.YYTS", "Trojan.Win32.Inject.dkhjux", "Trojan/Scarsi.uz", "W32.Tepfer.Uqxl", "TR/MailPassStlr.A.87", "Trojan[Dropper]/Win32.FrauDrop", "Trojan:MSIL/Limitless.A", "Trojan/Win32.DarkKomet.C641651", "TrojanDropper.Injector", "Trj/CI.A", "Trojan.Injector!yje4mrhO7hs" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Exploit.SWF.CVE-2012-0754.B", "Exploit/W32.CVE-2012-0754", "Exp.SWF.CVE-2012-0754", "Exploit.CVE-2012-0754", "Exploit.SWF.CVE-2012-0754.a!c", "Trojan.Mdropper", "SWF/Exploit.CVE-2012-0754.A", "SWF_EXPLCVE.A", "Exploit.SWF.CVE-2012-0754.B", "Exploit.SWF.CVE-2012-0754.a", "Exploit.SWF.CVE-2012-0754.B", "Exploit.S.D-Encrypted.106604", "Exploit.SWF.CVE-2012-0754.B", "Exploit.SWF.CVE-2012-0754.B", "Exploit.CVE-2012-0754.1", "SWF_EXPLCVE.A", "Exploit-MSWord.o", "DOC/SWFDropper.A!Camelot", "TrojanDownloader.SWF.t", "Trojan[Exploit]/SWF.CVE-2012-0754.a", "Exploit:Win32/CVE-2012-0754.A", "Exploit.SWF.CVE-2012-0754.B", "Exploit.SWF.CVE-2012-0754.a", "Exploit-MSWord.o", "Exploit.SWF.CVE-2012-0754.a", "Win32.Exploit.Cve-2012-0754.Ajli", "Exploit.CVE-2012-0754.A", "Exploit.SWF.CVE-2012-0754", "W32/SWFExp.AS!tr", "Win32/Trojan.Exploit.6a5" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Win32.BHO!O", "TrojanDownloader.Gamup", "Trojan/BHO.obt", "Trojan.Zusy.D42D95", "TROJ_STARTP.SML2", "Win32.Trojan.BHO.n", "TROJ_STARTP.SML2", "Win.Trojan.OnlineGames-65", "Trojan-Downloader.Win32.Gamup.qjl", "Trojan.Win32.Gamup.ciurh", "Trojan.Win32.A.Downloader.409816[UPX]", "Troj.Downloader.W32.Gamup!c", "Trojan.DownLoad2.34122", "Downloader.Gamup.Win32.146", "BehavesLike.Win32.Backdoor.cc", "Trojan.Win32.StartPage", "TR/BHO.efkmnb", "Trojan[Downloader]/Win32.Gamup", "Trojan-Downloader.Win32.Gamup.qjl", "TrojanDownloader.Gamup", "Win32.Trojan-downloader.Gamup.Ebhc", "Win32/Trojan.f4f" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "During", "the", "past", "few", "weeks", "there", "has", "been", "an", "increase", "in", "malvertising", "attacks,", "for", "example", "via", "a", "series", "of", "compromises", "of", "open", "source", "Revive", "ad", "servers", "which", "is", "still", "continuing." ]
[ 16, 0, 8, 8, 8, 16, 16, 16, 16, 16, 16, 1, 9, 16, 16, 16, 16, 16, 16, 1, 16, 5, 13, 13, 13, 13, 16, 16, 16, 16 ]
[ "In", "the", "third", "version", "spotted", "in", "the", "wild", ",", "the", "author", "introduced", "parts", "of", "the", "source", "code", "of", "the", "infamous", "Anubis", "Trojan", "(", "which", "was", "leaked", "earlier", "in", "2019", ")", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Utilizing", "AutoIT", "within", "a", "payload", "is", "unique", "because", "it", "is", "a", "legitimate", "management", "tool." ]
[ 16, 3, 16, 16, 3, 16, 16, 16, 16, 16, 16, 5, 13, 13 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Batman.B", "Trojan/W32.Batman.24576", "Trojan.Batman.B", "Trojan/Batman.b", "Trojan.Batman.B", "W32.BatmanTroj", "Win32/Batman.B", "TROJ_BATMAN.B", "Dos.Trojan.an-1", "Trojan.Win32.Batman.b", "Trojan.Win32.Batman.dcuw", "Trojan.Win32.S.Batman.24576[h]", "Win32.Trojan.Batman.Efkt", "Trojan.Batman.B", "TrojWare.Win32.Batman.B0", "Trojan.Batman.B", "Trojan.Batman.24576", "Trojan.Batman.Win32.2", "TROJ_BATMAN.B", "W32/Trojan.DVOK-6663", "Trojan/Win32.Batman.b", "TR/Batman.B", "W32/Batman.B!tr", "Trojan/Win32.Batman", "Trojan.Batman.B", "Troj.W32.Batman.b!c", "Trojan:Win32/Batman.B", "Trojan/Win32.Batman.N15760", "Trojan.Batman", "Trojan.Batman!bY5LWYbvsHM", "Trojan.Win32.Batman", "Trojan.Batman.B", "Trj/Batman.B", "Win32/Trojan.022" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "TrojWare.MSIL.Injector.AOX", "BackDoor.Blackshades.2", "Trojan/Foreign.axc", "Trojan[Ransom]/Win32.Foreign", "Trojan:MSIL/Parpwuts.C", "Win32/Trojan.74b" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan-Dropper.Win32.Daws!O", "TrojanDropper.Daws", "Win32.Worm.VB.sk", "W32.SillyFDC", "Trojan-Dropper.Win32.Daws.bkbb", "Trojan.Win32.Daws.dwunho", "Trojan.MulDrop4.55506", "Dropper.Daws.Win32.11917", "BehavesLike.Win32.VBObfus.vz", "Win32/Virut.bv", "Trojan[Dropper]/Win32.Daws", "TrojanDropper:Win32/Vimdop.A!bit", "Trojan.Razy.D1F32", "Trojan-Dropper.Win32.Daws.bkbb", "Dropper/Win32.Daws.R88727", "TScope.Trojan.VB", "Win32.Trojan-dropper.Daws.Wsug", "Trojan.DR.Daws!i7I48rjdKf8", "Trojan.VB2" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan-PWS/W32.WebGame.66136.T", "Trojan-GameThief.Win32.OnLineGames!O", "PWS.Zhengtu.BB3", "Trojan/OnLineGames.ajcfn", "Trojan.Zusy.D2717", "Win32.Trojan-PSW.OLGames.cm", "Infostealer.Onlinegame", "Win.Trojan.Onlinegames-14906", "Trojan.Win32.OnLineGames.vtdwn", "Troj.GameThief.W32.OnLineGames.lulb", "TrojWare.Win32.GameThief.Magania.~NWABZ", "Trojan.PWS.Wsgame.34942", "Trojan.OnLineGames.Win32.120767", "BehavesLike.Win32.Vundo.kh", "Heur:Trojan/PSW.OnLineGames", "Trojan[GameThief]/Win32.OnLineGames", "PWS:Win32/Zhengtu.B!dll", "Trojan/Win32.OnlineGameHack.R23439", "PWS-OnlineGames.ld", "TrojanPSW.OnLineGames.ai", "Trojan.Win32.OnlineGames.zt", "Trojan.PWS.OnLineGames!atUPCfHrrdw", "Trojan-Spy.OnLineGames", "W32/Onlinegames.WXA!tr", "Trojan.PSW.Win32.GameOnline.EN" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Our", "Threat", "Intelligence", "and", "Interdiction", "team", "found", "the", "Gustuff", "malware", "being", "advertised", "in", "the", "Exploit.in", "forum", "as", "a", "botnet", "for", "rent", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Crypt.Delf.E", "Trojan.Crypt.Delf.E", "Trojan/Downloader.Dadobra.as", "Trojan.Crypt.Delf.E", "Trojan.DL.Dadobra!9AHkQxAvV1E", "W32/Bancos.APF", "Downloader.Trojan", "TSPY_BANKER.UV", "Trojan-Downloader.Win32.Dadobra.af", "Trojan.Crypt.Delf.E", "Trojan.Win32.Dadobra.cmicp", "Trojan.Win32.Downloader.375808.K[h]", "Trojan.Crypt.Delf.E", "Trojan.Crypt.Delf.E", "Trojan.DownLoader.2321", "Downloader.Dadobra.Win32.410", "TSPY_BANKER.UV", "TrojanDownloader.Dadobra.as", "Trojan[Downloader]/Win32.Dadobra", "TrojanDownloader:Win32/Dadobra.BM", "Troj.Downloader.W32.Dadobra.as!c", "Trojan/Win32.Dadobra", "Trojan.Crypt.Delf.E", "Trojan.Win32.Dadobra.af", "Trojan-Dropper.Delf", "W32/Delf.DOA!tr.dldr", "PSW.Banker.33.BG" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.VariantNetvat.Trojan", "Trojan.Netvat", "Backdoor.Trojan", "Trojan.Win32.Netvat.45056", "Worm.Win32.Tenavt.A", "Trojan.DownLoader11.42361", "BehavesLike.Win32.Downloader.pt", "W32/Trojan.SSPB-9075", "Trojan:Win32/Netvat.E!Dll", "Trojan.Graftor.D29A7D", "Trojan/Win32.Menti.R124411", "Win32.Trojan.Dropper.Heur", "Worm.Tenavt!JDujK3yXihg", "W32/Kryptik.DTAI!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "On", "the", "other", "side", ",", "ByteDance", "has", "filed", "a", "lawsuit", "suing", "the", "Trump", "administration", "." ]
[ 16, 16, 16, 16, 16, 4, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "However", "it's", "important", "to", "say", "that", "these", "attackers,", "and", "the", "toolset", "used,", "share", "a", "number", "of", "similarities", "with", "the", "BlackEnergy", "group,", "which", "conducted", "attacks", "against", "the", "energy", "industry", "in", "Ukraine", "in", "December", "2015", "and", "January", "2016." ]
[ 16, 16, 16, 16, 16, 16, 16, 6, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 6, 14, 16, 16, 1, 16, 16, 16, 16, 16, 2, 16, 0, 8, 16, 0, 8 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9906", "Trojan.Win32.PeaceDuke.gfb", "Trojan.Win32.Z.Peaceduke.3126830", "Win32.Trojan.Peaceduke.Taow", "BehavesLike.Win32.Worm.vc", "TR/PeaceDuke.wuwtd", "Backdoor:Win32/Cozer.A!dha", "Trojan.Win32.PeaceDuke.gfb", "Trj/CI.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "It", "opens", "the", "service", "thread", "of", "the", "service", "process", "and", "uses", "the", "ZwQueueApcThread", "native", "API", "to", "inject", "an", "APC", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Win32/RiskWare.PEMalform.E", "W32.W.Otwycal.l4av", "Tool.YahooCrack", "HackTool.YahoCrack.21", "HackTool:Win32/Yacra.2_1", "HackTool.Win32.Yacra" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1 ]
[ "Phishing", "page", "from", "the", "French", "version", "of", "the", "Trojan", "Communication", "with", "C", "&", "C", "Riltok", "actively", "communicates", "with", "its", "C", "&", "C", "server", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]