tokens
sequencelengths
2
296
ner_tags
sequencelengths
2
296
[ "The", "Trojan", "encrypts", "files", "on", "the", "compromised", "computer", "and", "adds", "the", "following", "prefix", "before", "file", "names:", "ISHTAR-" ]
[ 16, 3, 1, 9, 16, 16, 5, 13, 16, 16, 16, 16, 1, 16, 1, 9, 9 ]
[ "APK", "files", "will", "not", "natively", "open", "in", "an", "environment", "other", "than", "an", "Android", "device", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.Nethief.XP", "Backdoor/W32.Nethief.78611", "Backdoor.Win32.Nethief!O", "Backdoor/Nethief.XP.a", "Win32.Trojan.WisdomEyes.16070401.9500.9612", "W32/Nethief.K@bd", "Backdoor.Trojan", "Win32/Nethief.XP.A.Server", "BKDR_NETHIEFXP.A", "Backdoor.Nethief.XP", "Backdoor.Win32.Nethief.ek", "Backdoor.Nethief.XP", "Trojan.Win32.Nethief.dknn", "Backdoor.Win32.A.Nethief.78611[UPX]", "Win32.Backdoor.Nethief.Aiim", "Backdoor.Nethief.XP", "Backdoor.Win32.Nethief.XP.Server", "Backdoor.Nethief.XP", "BackDoor.NethiefXP", "Backdoor.Nethief.Win32.139", "BKDR_NETHIEFXP.A", "BehavesLike.Win32.Virut.lc", "W32/Nethief.HBZO-6955", "Backdoor/Nethief.XP", "BDS/Nethief.XP.A", "Trojan[Backdoor]/Win32.Nethief", "Win32.Hack.Nethief.XP.kcloud", "Backdoor.Nethief.XP", "Backdoor.W32.Nethief!c", "Backdoor.Win32.Nethief.ek", "Backdoor:Win32/NetThief_XP.B", "Trojan/Win32.HDC.C762", "Backdoor.Nethief.XP", "Backdoor.Nethief", "Backdoor.Nethief!0mFzAwzISB0", "Backdoor.Win32.Ceckno", "W32/Nethief.EK!tr.bdr", "Win32/Backdoor.048" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "FakeSpy", "first", "targeted", "South", "Korean", "and", "Japanese", "speakers", "." ]
[ 3, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "distribution", "of", "rooting", "malware", "through", "Google", "Play", "is", "not", "a", "new", "thing", "." ]
[ 16, 16, 16, 16, 16, 16, 5, 13, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.MSIL", "Dropper/Win32.Injector" ]
[ 16, 3, 16, 16, 16, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.FamVT.ExpiroPC.PE", "Trojan.MSIL", "Win32.Trojan.WisdomEyes.16070401.9500.9593", "Trojan.Evrial!G1", "Trojan.Win32.Stealer.exjasr", "Trojan.PWS.Stealer.21117", "BehavesLike.Win32.Backdoor.ch", "TR/PSW.CoinStealer.nvgeg", "Trojan.Win32.Z.Razy.139264.GJ", "Trojan:MSIL/Evrial.B", "MSIL.Packed.Kryptik.JH", "Trj/GdSda.A", "Win32/Trojan.322" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Using", "an", "FTP", "server", "has", "some", "advantages." ]
[ 16, 16, 1, 9, 16, 16, 16 ]
[ "Versions", "5.X.X-8.X.X", "were", "active", "in", "2016", ",", "and", "versions", "9.X.X-1.X.X", "in", "2017", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "threat", "group", "continually", "updated", "the", "Nemesis", "malware", "during", "their", "ongoing", "access", "to", "the", "victim", "environment,", "deploying", "several", "different", "variants", "of", "the", "same", "tools", "and", "adding", "functionality", "between", "iterations." ]
[ 16, 6, 14, 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan-PWS/W32.RedZone.406528", "Trojan/PSW.RedZone.41", "Win32/PSW.RedZone.41", "TSPY_REDZONE.E", "Win.Spyware.62275-2", "Trojan-PSW.Win32.RedZone.41", "Trojan.Win32.RedZone.fqhw", "Trojan.Win32.A.PSW-RedZone.406528[h]", "Troj.PSW32.W.RedZone.41!c", "Win32.Trojan-qqpass.Qqrob.Dyzy", "TrojWare.Win32.PSW.RedZone.41", "Trojan.PWS.RedZone.41", "Trojan.RedZone.Win32.21", "W32/Risk.MXEM-1318", "Trojan/PSW.RedZone.41", "TR/PSW.RedZone.41", "Malware_fam.gw", "Trojan[PSW]/Win32.RedZone", "PWS:Win32/Redzone.4_1", "TrojanPSW.RedZone", "Trojan.PWS.RedZone!tcLid0irw8w", "Trojan.Win32.PSW", "Win32/Trojan.PSW.087" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.Sality.PE", "Trojan.Dropper.UYL", "Virus/W32.Sality.D", "W32.Sality.U", "Trojan.Dropper.UYL", "Virus.Sality.Win32.25", "Trojan.Dropper.UYL", "W32.SillyFDC", "Win32/Sality.AA", "WORM_SILLY.SMRP", "Trojan.Dropper.UYL", "Trojan.Win32.Crypted.cqxgku", "Trojan.Win32.Dropper.abl", "Trojan.Dropper.UYL", "Trojan.Dropper.UYL", "Win32.Sector.30", "WORM_SILLY.SMRP", "BehavesLike.Win32.Sality.th", "Win32/HLLP.Kuku.poly2", "W32/Sality.AT", "Worm:Win32/Enosch.A", "Win32.Virus.Sality.A", "HEUR/Fakon.mwf", "Virus.Win32.Sality.bakc", "Trojan.DataStealer.B", "Win32/Sality.NBA", "Win32.Sality.BL", "Trojan.Win32.Enosch", "W32/DataStealer.B!tr", "W32/Sality.AA", "Virus.Win32.Sality.I" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.BLA.FC.3019", "Variant.Kazy.msZ5", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Trojan.MulDrop4.60646", "Trojan-PWS.MSIL", "PWS:MSIL/Mintluks.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1 ]
[ "This", "attack", "is", "particularly", "effective", "since", "execution", "of", "WTP", "is", "not", "accompanied", "by", "a", "security", "warning", "and", "users", "have", "been", "conditioned", "to", "run", "the", "troubleshooter", "when", "it", "appears", "in", "Windows." ]
[ 16, 1, 16, 16, 16, 16, 16, 16, 7, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5 ]
[ "During", "ISSP", "Labs", "daily", "threat", "activity", "monitoring", "a", "new", "virus", "distribution", "campaign", "with", "a", "unique", "malware", "sample", "was", "discovered." ]
[ 16, 4, 12, 16, 16, 16, 16, 16, 6, 14, 14, 14, 16, 16, 16, 3, 16, 16, 16 ]
[ "The", "attacks", "likely", "were", "initially", "delivered", "via", "spear-phishing", "e-mails,", "or", "as", "demonstrated", "by", "C0d0so0", "in", "the", "past,", "legitimate", "websites", "that", "had", "been", "previously", "compromised", "then", "used", "as", "watering", "holes", "for", "the", "selected", "victims." ]
[ 16, 1, 16, 16, 16, 16, 16, 1, 9, 16, 16, 16, 16, 6, 16, 16, 0, 1, 9, 16, 16, 16, 1, 9, 16, 16, 16, 1, 9, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W97M.Bendis.AU", "X97M.Dropper.ID", "W97M.Bendis.AU", "W97M.Downloader", "X2KM_DROPPER.NEZ", "W97M.Bendis.AU", "Trojan.Ole2.Vbs-heuristic.druvzi", "W97M.Bendis.AU", "W97M.Bendis.AU", "X2KM_DROPPER.NEZ", "X97M/Dropper.c", "HEUR.VBA.Trojan.d", "TrojanDropper:O97M/Credoor.A", "X97M/Dropper.d", "W97M.Bendis", "W97M.Bendis.AU" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Indicators", "related", "to", "a", "group", "of", "attackers", "that", "have", "been", "targeting", "Japan", "for", "a", "few", "years", "and", "are", "responsible", "for", "recent", "breaches", "against", "Japanese", "targets" ]
[ 1, 16, 16, 16, 6, 14, 14, 16, 16, 16, 16, 2, 16, 16, 0, 8, 16, 16, 16, 11, 16, 16, 16, 4, 12 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Rovnix.Win64.17", "Troj.Win64.Rovnix!c", "Trojan.Win64.Rovnix.au", "Trojan.Win64.Mayachok.dsethy", "Trojan.Mayachok.19009", "Trojan/Rovnix.f", "W32.Rovnix", "TR/Rovnix.I", "Trojan/Win64.Rovnix", "Trojan.Win64.Rovnix.au", "Trojan/Win64.Rovnix.R175307", "Trojan.Rovnix", "Trj/Rovnix.B", "Win64.Trojan.Rovnix.Pdmr", "Trojan.Rovnix!6RUsEoDKtkI", "Trojan.Win64.Rovnix", "Win32/Trojan.52f" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "These", ".jar", "files", "are", "most", "often", "identified", "as", "Adwind." ]
[ 16, 1, 9, 16, 16, 16, 16, 16, 3 ]
[ "A", "new", "Android", "banking", "trojan", "called", "Nexus", "has", "been", "promoted", "via", "a", "Malware-as-Service", "subscription", "service,", "but", "is", "still", "in", "its", "early", "stages,", "suggests", "security", "researcher", "Cleafy's", "analysis." ]
[ 16, 16, 3, 11, 11, 16, 3, 16, 16, 16, 16, 3, 11, 11, 11, 16, 16, 16, 16, 16, 16, 16, 16, 4, 12, 12, 12 ]
[ "Next", ",", "if", "they", "indicate", "that", "they", "use", "an", "Android-based", "device", ",", "the", "Trojan", ",", "impersonating", "their", "bank", "with", "web", "injections", ",", "fools", "the", "victim", "into", "installing", "a", "fake", "security", "app", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:" ]
[ 16, 3, 16, 16, 16 ]
[ "The", "following", "code", "shows", "EventBot", "parsing", "instructions", "sent", "from", "the", "C2", "." ]
[ 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16 ]
[ "We", "used", "a", "sample", "app", "named", "β€œ", "org.starsizew", "”", "with", "an", "MD5", "of", "d8caad151e07025fdbf5f3c26e3ceaff", "to", "analyze", "RuMMS", "’", "s", "code", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 1, 16, 16, 3, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Ransom.AIG", "Trojan/W32.Xorist.13312.E", "Trojan-Ransom.Win32.Xorist!O", "Trojan.Ransom.FO4", "Trojan.Ransom.AIG", "Win32.Trojan.Filecoder.g", "Ransom.CryptoTorLocker", "Ransom_XORIST.SMA", "Win.Trojan.CryptoTorLocker2015-1", "Trojan.Ransom.AIG", "Trojan-Ransom.Win32.Xorist.lk", "Trojan.Ransom.AIG", "Trojan.Win32.Xorist.dxuuhl", "Trojan.Win32.A.Xorist.1268736", "Trojan.Ransom.AIG", "TrojWare.Win32.Kryptik.ER", "Trojan.Encoder.94", "Ransom_XORIST.SMA", "Trojan/Xorist.at", "TR/Ransom.Xorist.EJ", "Trojan[Ransom]/Win32.Xorist", "Trojan.Ransom.AIG", "Troj.Ransom.W32.Xorist.tnPf", "Trojan-Ransom.Win32.Xorist.lk", "Ransom:Win32/Sorikrypt.A", "Trojan/Win32.Xorist.R21676", "Hoax.Xorist", "Ransom.FileCryptor", "Trj/RansomXor.A", "Trojan.Win32.CryptoTorLocker2015.a", "Trojan-Ransom.CryptoTorLocker215", "Win32/Trojan.1ee" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "I", "am", "not", "sure", "what", "these", "are", "but", "am", "guessing", "at", "possibly", "Emotet", "banking", "Trojan" ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 11 ]
[ "While", "most", "of", "the", "interest", "still", "lies", "in", "the", "public", "sector,", "more", "recent", "attacks", "were", "found", "targeting", "the", "following", "industries:Aviation", "Broadcasting", "Energy", "Financial", "Non-governmental", "organizations", "NGO", "Pharmaceutical", "Public", "sector", "Publishing", "Software" ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 12, 16, 16, 1, 16, 16, 16, 16, 16, 4, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12 ]
[ "ESET", "contacted", "Eltima", "as", "soon", "as", "the", "situation", "was", "confirmed." ]
[ 4, 16, 4, 16, 16, 16, 16, 16, 16, 16 ]
[ "Connexxa", "was", "a", "company", "also", "from", "Catanzaro", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.MalPack", "Trojan.Graftor.D69EE1", "Win32.Trojan.Kryptik.pd", "Ransom_LOCKY.SMXA", "Trojan.Win32.Kryptik.evdsll", "Ransom_LOCKY.SMXA", "BehavesLike.Win32.Upatre.qh", "TrojanDownloader:Win32/Brucryp.G", "Trj/GdSda.A", "W32/Kryptik.EXPV!tr", "Win32/Trojan.160" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Script.473379", "Trojan/W32.Clicker.349278", "Trojan.Clicker.r5", "Trojan.Script.473379", "Trojan.Win32.MLW.lvntl", "W32/MalwareF.CARP", "Trojan.ADH", "Trojan.Win32.Clicker.hd", "Trojan.Win32.S.Clicker.349278[h]", "Trojan.Script.473379", "Trojan.Script.473379", "Trojan.DownLoader6.110", "BehavesLike.Win32.Dropper.fc", "W32/Risk.VMFK-0127", "Trojan/Clicker.je", "Trojan.Script.D73923", "Trojan:Win32/Gleishug.C", "Trojan.Script.473379", "Trj/CI.A", "Win32.Trojan.Clicker.Hoye", "AdWare.FTat", "Trojan.Script.473379" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "In", "late", "2014,", "ESET", "presented", "an", "attack", "campaign", "that", "had", "been", "observed", "over", "a", "period", "of", "time", "targeting", "Russia", "and", "other", "Russian", "speaking", "nations,", "dubbed", "Roaming", "Tiger" ]
[ 16, 16, 0, 4, 16, 16, 6, 14, 16, 16, 16, 16, 16, 16, 0, 8, 8, 16, 2, 16, 16, 4, 12, 12, 16, 6, 14 ]
[ "Its", "different", "modifications", "target", "mobile", "devices", "of", "Russian", "users", "from", "February", "2015." ]
[ 16, 16, 16, 16, 5, 13, 16, 4, 12, 16, 0, 8 ]
[ "A", "backdoor", "also", "known", "as:", "W32.MasendosA.Trojan", "Worm.Win32.AutoRun!O", "Trojan.Tofsee.1", "Win32.Trojan.WisdomEyes.16070401.9500.9997", "Win.Worm.Autorun-6961", "P2P-Worm.Win32.Palevo.idwe", "Trojan.Win32.Graz.vhpfw", "Worm.Win32.A.AutoRun.90112", "TrojWare.Win32.Kryptik.JIU", "Win32.HLLM.Graz", "Worm.AutoRun.Win32.31130", "BehavesLike.Win32.Downloader.kc", "Worm.Win32.Wergimog", "Worm/AutoRun.agqt", "TR/Offend.5523698", "Worm[P2P]/Win32.Palevo", "Worm:Win32/Wergimog.A", "P2P-Worm.Win32.Palevo.idwe", "Worm/Win32.Cynic.R5955", "Worm.AutoRun", "Win32/AutoRun.IRCBot.HL", "Win32.Worm-p2p.Palevo.Swub", "Worm.AutoRun!FV4PXQUzhXU", "Win32/Trojan.515" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Over", "the", "past", "few", "months", "there", "has", "been", "a", "lot", "of", "research", "and", "press", "coverage", "on", "the", "Shamoon", "campaigns." ]
[ 16, 16, 0, 8, 8, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 6, 14, 14 ]
[ "For", "versions", "11.0", "and", "11.4", ",", "the", "installation", "is", "straightforward", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Each", "of", "these", "behaviors", "is", "under", "the", "control", "of", "the", "remote", "C2", "server", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "sophisticated", "hacking", "group", "with", "suspected", "ties", "to", "cybercrime", "gangs", "operating", "in", "Eastern", "Europe", "is", "now", "actively", "targeting", "and", "breaching", "prominent,", "brand", "name", "restaurants", "in", "the", "U.S." ]
[ 16, 6, 14, 14, 16, 16, 16, 16, 6, 14, 14, 16, 2, 10, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16, 2, 10 ]
[ "A", "backdoor", "also", "known", "as:", "Exploit.Win64", "Exploit.Win64.Apolmy.ewzxbo", "Trojan.Win64.Dianti", "TR/Apolmy.paocz", "Trojan:Win64/Apolmy.A", "Trj/CI.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1 ]
[ "This", "EPS", "exploit", "was", "assigned", "CVE-2015-2545." ]
[ 16, 3, 11, 16, 16, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.Sality.mBZF", "Trojan.Win32.Clicker.bcgwsn", "Trojan.Click2.33988", "Trojan.Win32.Alyak", "W32/Trojan.WWZX-6000", "TR/Graftor.27537.200", "Trojan/Win32.Unknown", "Backdoor:Win32/Kanav.D", "BScope.Trojan.Win32.Inject.2", "Trj/CI.A", "Trojan.Symmi.DB644", "Win32/Trojan.070" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "official", "β€œ", "Golden", "Cup", "”", "Facebook", "page", "." ]
[ 16, 16, 16, 3, 11, 16, 5, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Clicker.Delf.JK", "Trojan-Clicker.Win32.Delf!O", "Trojan.Clicker.Delf.JK", "Win32.Trojan-Downloader.Delf.bq", "Win32/Bancos.QQM", "TROJ_CLICKER.ATG", "Win.Trojan.Delf-2308", "Trojan-Clicker.Win32.Delf.ih", "Trojan.Clicker.Delf.JK", "Trojan.Win32.Delf.dxqhln", "Win32.Trojan.Delf.Eamx", "Trojan.Clicker.Delf.JK", "Trojan.Clicker.Delf.JK", "Trojan.Badjoke", "TROJ_CLICKER.ATG", "TrojanClicker.Delf.fq", "TR/Clicker.Delf.IH", "Trojan[Clicker]/Win32.Delf", "Trojan.Win32.Clicker.475648", "Trojan-Clicker.Win32.Delf.ih", "Trojan.Clicker.Delf.JK", "Trojan/Win32.AdClicker.R5452", "Trojan.Clicker.Delf.JK", "TrojanClicker.Delf", "Win32/TrojanDownloader.Delf.OVE", "Trojan.CL.Delf.BJTO", "Trojan-Dropper.Delf", "W32/Delf.YS!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "steps", "implemented", "include", ":", "Load", "a", "URL", "in", "a", "WebView", "Run", "JavaScript", "in", "WebView", "Toggle", "WiFi", "state", "Toggle", "mobile", "data", "state", "Read/modify", "SMS", "inbox", "Solve", "captchas", "Captchas", "One", "of", "the", "more", "interesting", "states", "implements", "the", "ability", "to", "solve", "basic", "captchas", "(", "obscured", "letters", "and", "numbers", ")", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "value", "used", "to", "replace", "GET_IMG_OBJECT", "comes", "from", "the", "JSON", "configuration", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan-Dropper.Win32.MultiJoiner!O", "Troj.Dropper.W32.Pincher.lfij", "Trojan.Heur.GM.11400100A0", "Win32.Trojan.WisdomEyes.16070401.9500.9992", "Win32/MicroJoiner.A", "TROJ_MULTIJOIN.A", "Trojan-Dropper.Win32.Microjoin.ap", "TrojWare.Win32.Spy.Zbot.AAT", "Trojan.MulDrop.613", "BehavesLike.Win32.Trojan.vc", "Trojan-PWS.Win32.LdPinch", "TrojanDropper.MultiJoiner.13.b", "Win32.Troj.GaoPSGet.49893", "TrojanDropper:Win32/MultiJoiner.A", "Trojan-Dropper.Win32.Microjoin.ap", "Dropper/Win32.Microjoin.C70525", "Trj/Multijoiner.A", "Win32/TrojanDropper.MultiJoiner.13.B", "Trojan.DR.MultiJoiner.D" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan-Downloader.Win32.Small!O", "Downloader.Small.16212", "Win32.Trojan.WisdomEyes.16070401.9500.9891", "Win32/Kotan.20.A", "Trojan-Downloader.Win32.Small.fbn", "Trojan.Win32.Kotan.hadu", "Troj.Downloader.W32.Small.fbn!c", "Win32.Trojan-Downloader.Small.cmak", "TrojWare.Win32.TrojanDownloader.Kotan", "Trojan.Kaotan", "Downloader.Small.Win32.3682", "TrojanDownloader.Kotan.b", "W32.Malware.Downloader", "Win32.Troj.Kotan.kcloud", "TrojanDownloader:Win32/Kotan.A", "Trojan-Downloader.Win32.Small.fbn", "Trojan/Win32.HDC.C69071", "TrojanDownloader.Small", "Win32/TrojanDownloader.Kotan", "Trojan.DL.Small!ILxLTxTzCnE", "Trojan-Downloader.Win32.Kotan" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.OnGamesLT180912HKGHAAI.Trojan", "Trojan-GameThief.Win32.OnLineGames!O", "Trojan/Dropper.Killav.lt", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "W32.Fiala.A", "Win.Trojan.Geral-941", "Trojan-Dropper.Win32.Killav.lt", "Trojan.Win32.Killav.dqiwur", "Troj.Dropper.W32.Killav.lt!c", "Win32.Trojan-dropper.Killav.Sunr", "Backdoor.Win32.Popwin.~IT", "Trojan.KillProc.13934", "Dropper.Killav.Win32.187", "BehavesLike.Win32.PWSOnlineGames.mc", "Trojan-Downloader.Win32.Geral", "Trojan/PSW.Magania.amzf", "Trojan[Downloader]/Win32.Geral", "TrojanDownloader:Win32/Dogkild.S", "Trojan/Win32.OnlineGameHack.R38048", "BScope.Trojan.SvcHorse.01643", "Trj/Pupack.A", "Win32/AutoRun.KillAV.I", "Trojan.DR.Killav!1BWU2jDjRDE" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.FakeW7Folder.Fam.Trojan", "Trojan.Mauvaise.SL1", "Trojan.Badur.Win32.8423", "Trojan.Win32.Badur.dgkukl", "Win32.Trojan.Fakedoc.Auto", "TrojWare.Win32.Imwee.A", "BackDoor.Bulknet.1486", "TR/Dldr.Imwee", "Trojan/Win32.Badur", "Trojan.Zusy.D39D62", "Backdoor/Win32.Trojan.C753557", "Win32/Trojan.IM.66a" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "JS/Iframe.DGS", "Script.Trojan-Downloader.IFrame.AE", "Trojan-Downloader.JS.Iframe.deg", "Trojan.Script.Expack.bvtkmp", "PDF.DownLoader.3", "BehavesLike.PDF.BadFile.db", "JS/BlacoleRef.CZ.29", "Trojan[Downloader]/JS.Iframe.deg", "Trojan-Downloader.JS.Iframe.deg", "JS/Moat.241E54F!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Fileless", "threats", "and", "ransomware", "aren't", "new,", "but", "a", "malware", "that", "incorporates", "a", "combination", "of", "their", "characteristics", "can", "be", "dangerous." ]
[ 3, 11, 16, 3, 16, 16, 16, 16, 3, 16, 16, 16, 1, 16, 16, 1, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.Skillis.a", "W32/Trojan.PYDC-5827", "W32.SillyFDC", "Win32/Oflwr.A!crypt", "Win32.Application.PUPStudio.A", "Trojan.Win32.Skillis.cqimdi", "Trojan.DownLoader21.39298", "Trojan.Skillis.Win32.2785", "TR/Drop.KillAV.A.69", "Trojan/Win32.Unknown", "TrojanDropper:Win32/Killav.A", "Trojan/Win32.Backdoor.R142720", "Trojan.Skillis", "Trojan.Win32.Skillis.aaa", "Trojan.PWS.Banbra!0kkWPO51+fM", "Win32.Outbreak", "W32/QQPass.ELG!tr.pws", "Win32/Trojan.7d3" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Kazy.DAD1ED", "Win32.Trojan.WisdomEyes.16070401.9500.9998", "W32/Trojan.ESEG-0989", "Trojan.MSIL.Crypt.fpoa", "Trojan.Win32.Crypt.evvrmx", "BackDoor.Tordev.976", "BehavesLike.Win32.Trojan.fc", "TR/Dropper.MSIL.lfcge", "Trojan:Win32/Rebhip.AA!bit", "Trojan.MSIL.Crypt.fpoa", "Trj/GdSda.A", "Msil.Trojan.Crypt.Hfp", "Trojan.MSIL.Injector", "MSIL/Injector.LHM!tr", "Win32/Trojan.658" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Infostealer.Jackpos", "BKDR_JACKPOS.SM", "BKDR_JACKPOS.SM", "BehavesLike.Win32.Dropper.ch", "Trojan.Win32.Jinupd", "W32/Trojan.RTKE-0140", "Trojan:Win32/Jinupd.B", "Trojan/Win32.HDC.C743594", "Trj/JackPos.A", "Win32/Trojan.2d8" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "First", "observed", "in", "July", "2014,", "Dridex,", "a", "financial", "banking", "Trojan,", "is", "considered", "the", "successor", "to", "the", "GameOver", "ZeuS", "GoZ", "malware." ]
[ 16, 16, 16, 0, 8, 3, 16, 3, 11, 11, 16, 16, 16, 16, 16, 16, 3, 11, 11, 11 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.Sdbot", "Backdoor/SdBot.zj", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "W32/Sdbot.MAM", "W32.Spybot.Worm", "Win32/Dopbot.B", "WORM_SDBOT.CGE", "Win.Trojan.SdBot-3536", "Backdoor.Win32.SdBot.zj", "Trojan.Win32.SdBot.esce", "Backdoor.Win32.SdBot.28160.B", "Backdoor.W32.SdBot.zj!c", "BackDoor.IRC.Veritas", "Backdoor.SdBot.Win32.2281", "WORM_SDBOT.CGE", "BehavesLike.Win32.Backdoor.mc", "Packed.Morphine.a", "WORM/IrcBot.28160.1", "Trojan[Backdoor]/Win32.SdBot", "Backdoor.Win32.SdBot.zj", "BScope.Trojan-PSW.Gomex.8", "W32/Gaobot.FCZ.worm", "IRC/SdBot.DWM", "Win32.Backdoor.Sdbot.Pavs", "Worm.SdBot!xpvJkAbKgi0" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "HackTool.MultiUnwrapper", "Win32.Trojan.WisdomEyes.16070401.9500.9852", "Infostealer.Gampass", "Win.Trojan.736804-1", "HackTool.Win32.MultiUnwrapper", "Trojan[Dropper]/Win32.Dapato", "Trj/CI.A", "Riskware.HackTool!LCoXxVEhnjI", "Win32/Trojan.03f" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "APT-C-36,", "also", "known", "as", "Blind", "Eagle,", "has", "been", "actively", "targeting", "organizations", "in", "Colombia", "and", "Ecuador", "since", "at", "least", "2019." ]
[ 6, 16, 16, 16, 6, 14, 16, 16, 16, 16, 4, 16, 2, 16, 2, 16, 16, 0, 8 ]
[ "Unpacker", "thread", "decrypt", "java", "archive", "from", "assets", "directory", "β€œ", "start.ogg", "”", ",", "and", "dynamically", "loads", "it", "and", "calls", "the", "method", "β€œ", "a.a.a.b", "”", "from", "this", "archive", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Adware.Rugo", "Trojan.Win32.BHO.fie", "AdWare.Win32.BHO.cdg", "Trojan.MulDrop.15726", "TR/BHO.fie", "TrojanDropper:Win32/Jhee.V", "Trojan.Win32.BHO.fie", "Adware.WSearch.O", "Trojan.Win32.Jhee.V", "Trojan.BHO.fie" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "TrojanDownloader.Cabby", "Trojan/Filecoder.MaktubLocker.c", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "RANSOM_CRYPMAKTUBLOCKER_GC3101B5.UVPM", "Trojan.Win32.Banpak.bbb", "Trojan.Win32.Cabby.emrzuq", "W32.Virut.lyDR", "Trojan.DownLoader24.13143", "Downloader.Cabby.Win32.1871", "RANSOM_CRYPMAKTUBLOCKER_GC3101B5.UVPM", "TrojanDownloader.Cabby.cpa", "TR/Crypt.Xpack.wgudg", "Trojan[Downloader]/Win32.Cabby", "Trojan.Razy.D255EB", "Trojan.Win32.Ransom.59904.R", "Trojan.Win32.Banpak.bbb", "Trojan/Win32.Locky.R197360", "TrojanDownloader.Cabby", "Win32/Filecoder.MaktubLocker.C", "Trojan.Filecoder!sTyUXy4/Qig" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Delimiters", "Another", "technique", "to", "obfuscate", "unencrypted", "strings", "uses", "repeated", "delimiters", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Such", "app", "stores", "are", "so-called", "because", "they", "are", "not", "officially", "supported", "by", "Android", ",", "nor", "are", "they", "provided", "by", "Google", ",", "unlike", "the", "Play", "Store", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 4, 16, 16, 16, 5, 13, 16 ]
[ "Attackers", "create", "this", "scenario", "to", "persuade", "users", "to", "pay", "the", "ransom", "so", "they", "can", "gain", "back", "access", "to", "the", "device", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "Sofacy", "group,", "also", "known", "as", "APT28,", "Pawn", "Storm,", "Fancy", "Bear,", "and", "Sednit,", "continues", "to", "add", "to", "the", "variety", "of", "tools", "they", "use", "in", "attacks;", "in", "this", "case,", "targeting", "individuals", "in", "the", "aerospace", "industry", "running", "the", "OS", "X", "operating", "system." ]
[ 16, 6, 14, 16, 16, 16, 6, 14, 14, 14, 14, 16, 6, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 1, 16, 16, 16, 16, 4, 16, 16, 4, 12, 16, 16, 5, 13, 13, 13 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor/W32.Androm.266082.B", "Trojandownloader.Macdowpay", "Trojan.Win32.Godzilla.ephbuw", "Trojan.Encoder.11909", "Backdoor.Androm.Win32.43313", "BehavesLike.Win32.Backdoor.dc", "Trojan.Yakes.vjn", "Trojan.Backdoor.Quakbot", "TR/Fuery.shpvm", "TrojanDownloader:Win32/Macdowpay.A", "Trojan.Razy.D2B7A8", "Trojan/Win32.Locky.R201696", "Backdoor.Androm", "Backdoor.Andromeda", "Trj/CI.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Horst", "Win32.Trojan.WisdomEyes.16070401.9500.9997", "W32/Downloader.OMUB-6519", "Trojan-Proxy.Win32.Horst.av", "Trojan.Win32.Horst.dqlqvp", "Trojan.DownLoader.9121", "W32/Downloader.YSQ", "Trojan[Proxy]/Win32.Horst", "Trojan-Proxy.Win32.Horst.av", "TrojanProxy.Horst" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan-PSW.OLGames.bp", "W32.Rontokbro@mm", "Trojan.Win32.Krap.dazptt", "Trojan.Win32.Z.Onlinegames.25088.A", "Trojan.Click3.21708", "BehavesLike.Win32.PWSOnlineGames.mc", "W32/Trojan.UITW-4840", "Trojan/PSW.OnLineGames2.dg", "PWS:Win32/Zakahic.A", "Win32.Trojan.Dropper.Heur", "Trojan.Win32.OnlineGames.daq", "Trojan-GameThief.Win32.OnLineGames", "W32/Onlinegames.PYY!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "We", "found", "two", "functions", ":", "The", "first", "function", "is", "http", ":", "//s.psserviceonline", "[", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 9, 9, 9 ]
[ "First", ",", "the", "app", "creates", "a", "JavaScript", "function", "to", "call", "a", "Java", "method", ",", "getImageBase64", ",", "exposed", "to", "WebView", "using", "addJavascriptInterface", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "This", "new", "threat", "actor", "we", "are", "naming", "YoroTrooper", "has", "been", "targeting", "governments", "across", "Eastern", "Europe", "since", "at", "least", "June", "2022,", "and", "Cisco", "Talos", "has", "found", "three", "different", "activity", "clusters", "with", "overlapping", "infrastructure", "that", "are", "all", "linked", "to", "the", "same", "threat", "actor." ]
[ 16, 16, 6, 14, 16, 16, 16, 6, 16, 16, 16, 4, 16, 2, 10, 16, 3, 16, 0, 8, 16, 4, 12, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 6, 14, 14, 14 ]
[ "The", "code", "contains", "multiple", "comments", "in", "Italian", ",", "here", "is", "the", "most", "noteworthy", "example", ":", "β€œ", "Receive", "commands", "from", "the", "remote", "server", ",", "here", "you", "can", "set", "the", "key", "commands", "to", "command", "the", "virus", "”", "Here", "are", "the", "available", "commands", ":", "Name", "Description", "cd", "Change", "current", "directory", "to", "specified", "quit", "Close", "the", "socket", "nggexe", "Execute", "received", "command", "via", "Python", "’", "s", "subprocess.Popen", "(", ")", "without", "outputs", "ngguploads", "Upload", "specified", "file", "to", "the", "specified", "URL", "nggdownloads", "Download", "content", "from", "the", "specified", "URLs", "and", "save", "to", "specified", "file", "nggfilesystem", "Dump", "file", "structure", "of", "the", "C", ":", "path", ",", "save", "it", "to", "the", "file", "in", "json", "format", "and", "zip", "it", "nggstart_screen", "nggstop_screen", "Enable/disable", "screenshot", "module", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Win32/SillyPWS.CT", "Trojan-Spy.MSIL!IK", "Trojan.MulDrop1.16499", "TrojanSpy.MSIL.acx", "PWS:MSIL/VB.B", "Trojan-Spy.MSIL" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9994", "Trojan.Win32.Waldek.aqji", "Trojan.Win32.Dwn.dzdxxu", "BackDoor.PlugX.7", "Dropper.Dapato.Win32.27346", "BehavesLike.Win32.MultiPlug.fh", "TrojanDropper.Dapato.snz", "TR/AD.Plugx.M.6", "Trojan[Dropper]/Win32.Dapato", "Trojan.Win32.Waldek.aqji", "Backdoor:Win32/Plugx.L!dha", "Trj/GdSda.A", "Win32.Trojan.Waldek.Wrgj", "Trojan.Win32.Crypt", "W32/Kryptik.DGGW!tr", "TrojanDropper.Dapato", "Win32/Trojan.bdb" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Unfortunately,", "malware", "authors", "often", "utilize", "these", "same", "capabilities", "to", "compromise", "systems." ]
[ 16, 6, 14, 16, 16, 16, 16, 16, 16, 5, 13 ]
[ "Interestingly", ",", "there", "is", "a", "domain", "which", "used", "to", "point", "there", ",", "β€œ", "DlmDocumentsExchange.com", "”", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16 ]
[ "This", "notable", "characteristic", "made", "this", "attack", "worthy", "of", "further", "analysis." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Talos", "found", "189", "logos", "from", "banks", "to", "cryptocurrency", "exchanges", "inside", "the", "archive", ",", "all", "of", "which", "could", "be", "targeted", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "]", "it", "Napoli", "server1rc.exodus.connexxa", "[", "." ]
[ 9, 9, 16, 1, 9, 9 ]
[ "]", "biz", "adminloader", "[", "." ]
[ 9, 9, 1, 9, 9 ]
[ "First,", "this", "domain", "pattern", "looks", "just", "like", "the", "extremely", "prevalent,", "yet", "benign", "Akamai", "CDN", "domain." ]
[ 16, 16, 1, 9, 16, 16, 16, 16, 16, 16, 16, 16, 4, 5, 1 ]
[ "With", "the", "increased", "use", "of", "Android", "phones", "in", "business", "environments", ",", "it", "is", "important", "to", "defend", "against", "these", "threats", "by", "ensuring", "devices", "are", "kept", "current", "with", "the", "latest", "updates", "." ]
[ 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "WORM_DORKBOT.SMA", "Win32.Trojan.WisdomEyes.16070401.9500.9989", "Trojan.FakeAV", "WORM_DORKBOT.SMA", "Packed.Win32.Katusha.o", "Trojan.Win32.Katusha.exnjhu", "BehavesLike.Win32.PWSZbot.qc", "Packed.Katusha.agmk", "Trojan.Downloader.126", "Packed.Win32.Katusha.o", "Win32.Worm.Autorun.E", "Trojan/Win32.Cosmu.C71744", "W32/Crypt.AAAI!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Udsdangerousobject.Multi", "Trojan.Waldek.Win32.5328", "Uds.Dangerousobject.Multi!c", "BKDR_REMCOS.DRQW", "Trojan.Win32.Waldek.akql", "Trojan.Win32.Waldek.etvwxi", "Trojan.Win32.Z.Highconfidence.731416", "BKDR_REMCOS.DRQW", "Trojan.Win32.Waldek", "W32/Trojan.CSQN-6734", "W32.Waldek.Akql", "TR/Waldek.rludr", "Trojan/Win32.Waldek", "Trojan:Win32/Vonocksu.A", "Trojan.Win32.Waldek.akql", "Trojan/Win32.Waldek.C2216962", "Trj/GdSda.A", "Win32.Trojan.Waldek.Htvv", "W32/REMCOS.DRQW!tr.bdr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Unlike", "other", "ATM", "malware", "families,", "Alice", "cannot", "be", "controlled", "via", "the", "numeric", "pad", "of", "ATMs;", "neither", "does", "it", "have", "information", "stealing", "features." ]
[ 16, 16, 3, 11, 11, 11, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16 ]
[ "This", "behavior", "negatively", "impacts", "advertisement", "networks", "and", "their", "clients", "because", "advertising", "budget", "is", "spent", "without", "acquiring", "real", "customers", ",", "and", "impacts", "user", "experience", "by", "consuming", "their", "data", "plan", "resources", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Win32.Malware.1", "W32.Mailbancos@mm", "Win32.Mailbancos@mm", "W32.Mailbancos@mm", "SHeur2.XWF", "Trj/Banbra.GGU" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "HW32.Packed.A13D", "Backdoor.Sinowal.BC", "Backdoor/W32.Sinowal.335872.B", "Backdoor.Sinowal.Win32.471", "Backdoor.Sinowal.BC", "Win32.Trojan.WisdomEyes.16070401.9500.9996", "Trojan.Mebroot", "Win.Trojan.Sinowal-1209", "Backdoor.Sinowal.BC", "Backdoor.Win32.Sinowal.eee", "Backdoor.Sinowal.BC", "Trojan.Win32.Sinowal.bfkka", "Backdoor.Win32.Sinowal.335872", "Backdoor.W32.Sinowal!c", "Backdoor.Sinowal.BC", "Backdoor.Win32.Sinowal.~CRSB", "Trojan.Packed.2355", "BehavesLike.Win32.Sality.fc", "Backdoor.Win32.Sinowal", "W32/Backdoor2.EHUE", "Backdoor/Sinowal.gje", "RKIT/MBR.Sinowal.W", "Trojan[Backdoor]/Win32.Sinowal", "Win32.Hack.SinowalT.bg.339968", "Backdoor.Win32.Sinowal.eee", "Backdoor.Sinowal.BC", "Backdoor.Sinowal", "Win32.Backdoor.Sinowal.Liqd", "W32/SINOWAL.A!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "However", ",", "the", "existence", "of", "threats", "like", "ViperRAT", "and", "Pegasus", ",", "the", "most", "sophisticated", "piece", "of", "mobile", "surveillanceware", "we", "’", "ve", "seen", "to", "date", ",", "are", "evidence", "that", "attackers", "are", "targeting", "mobile", "devices", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 3, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "What", "makes", "this", "interesting", "is", "how", "the", "dated", "botnet", "and", "macro", "malware", "trick", "are", "used", "together." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 3, 11, 16, 16, 16, 16 ]
[ "This", "weekend", "saw", "multiple", "reports", "a", "new", "zero-day", "vulnerability", "that", "affected", "all", "versions", "of", "Microsoft", "Word." ]
[ 16, 16, 16, 16, 16, 16, 16, 7, 15, 16, 16, 16, 16, 16, 5, 13 ]
[ "A", "17-year-old", "vulnerability", "in", "Microsoft", "Office", "Equation", "Editor", "is", "now", "confirmed", "to", "be", "exploited", "by", "the", "Cobalt", "Group." ]
[ 7, 15, 15, 16, 5, 13, 13, 13, 16, 16, 16, 16, 16, 7, 16, 6, 14, 14 ]
[ "In", "recent", "months,", "Kaspersky", "observed", "an", "increase", "in", "the", "number", "of", "malicious", "campaigns", "that", "use", "Google", "Advertising", "as", "a", "means", "of", "distributing", "and", "delivering", "malware." ]
[ 16, 0, 8, 4, 16, 16, 16, 16, 16, 16, 16, 6, 14, 16, 16, 4, 12, 16, 16, 16, 16, 16, 16, 16, 3 ]
[ "A", "backdoor", "also", "known", "as:", "TROJ_BHO.SMK", "Win32.Trojan.WisdomEyes.16070401.9500.9922", "W32/MalwareS.AXKH", "TROJ_BHO.SMK", "Trojan.DownLoader7.50629", "BehavesLike.Win32.PWSZbot.dm", "Backdoor.WinNT.PcClient", "W32/Risk.AWDS-7973" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Initially,", "only", "the", "Windows", "version", "of", "ROKRAT", "was", "used,", "but", "the", "Android", "version", "of", "the", "malware", "was", "later", "identified." ]
[ 16, 16, 5, 13, 13, 16, 3, 16, 16, 16, 16, 5, 13, 16, 16, 3, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "HW32.Packed.F73E", "Backdoor/W32.Xhaker.593920", "Backdoor.Xhaker.b.n7", "Backdoor.Xhaker.Win32.49", "Backdoor/Xhaker.b", "Trojan.Win32.Xhaker.cbfde", "W32/BackdoorX.BNHA", "Backdoor.Trojan", "Smalldoor.BKPC", "Backdoor.Win32.Xhaker.b", "Backdoor.Xhaker!qYrnZt9Kncc", "PE:Backdoor.Win32.VB.bnx!1075029071", "BackDoor.Caverns.79", "BehavesLike.Win32.Ramnit.hc", "W32/Backdoor.IYKC-7331", "Backdoor/Xhaker.l", "Win32.Hack.Xhaker.b.kcloud", "Win32.Backdoor.Xhaker.doln", "W32/Xhaker.B!tr.bdr", "Backdoor.Win32.Xhaker.b", "Win32/Backdoor.bee" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "We", "recently", "uncovered", "a", "coordinated", "campaign", "targeting", "Internet", "infrastructure", "providers,", "a", "media", "organization,", "a", "financial", "services", "company,", "and", "an", "Asian", "government", "organization." ]
[ 16, 16, 16, 16, 16, 6, 16, 5, 13, 4, 16, 4, 12, 12, 12, 12, 12, 16, 16, 4, 12, 12 ]
[ "XLoader", "can", "also", "load", "multiple", "malicious", "modules", "to", "receive", "and", "execute", "commands", "from", "its", "remote", "command-and-control", "(", "C", "&", "C", ")", "server", ",", "as", "shown", "below", ":", "Here", "’", "s", "a", "list", "of", "the", "modules", "and", "their", "functions", ":", "sendSms", "β€”", "send", "SMS/MMS", "to", "a", "specified", "address", "setWifi", "β€”", "enable", "or", "disable", "Wi-Fi", "connection", "gcont", "β€”", "collect", "all", "the", "device", "’", "s", "contacts", "lock", "β€”", "currently", "just", "an", "input", "lock", "status", "in", "the", "settings", "(", "pref", ")", "file", ",", "but", "may", "be", "used", "as", "a", "screenlocking", "ransomware", "bc", "β€”", "collect", "all", "contacts", "from", "the", "Android", "device", "and", "SIM", "card", "setForward", "β€”", "currently", "not", "implemented", ",", "but", "can", "be", "used", "to", "hijack", "the", "infected", "device", "getForward", "β€”", "currently", "not", "implemented", ",", "but", "can", "be", "used", "to", "hijack", "the", "infected", "device", "hasPkg", "β€”", "check", "the", "device", "whether", "a", "specified", "app", "is", "installed", "or", "not", "setRingerMode", "β€”", "set", "the", "device", "’", "s", "ringer", "mode", "setRecEnable", "β€”", "set", "the", "device", "’", "s", "ringer", "mode", "as", "silent", "reqState", "β€”", "get", "a", "detailed", "phone", "connection", "status", ",", "which", "includes", "activated", "network", "and", "Wi-Fi", "(", "with", "or", "without", "password", ")", "showHome", "β€”", "force", "the", "device", "’", "s", "back", "to", "the", "home", "screen", "getnpki", ":", "get", "files/content", "from", "the", "folder", "named", "NPKI", "(", "contains", "certificates", "related", "to", "financial", "transactions", ")", "http", "β€”", "access", "a", "specified", "network", "using", "HttpURLConnection", "onRecordAction", "β€”", "simulate", "a", "number-dialed", "tone", "call", "β€”", "call", "a", "specified", "number", "get_apps", "β€”", "get", "all", "the", "apps", "installed", "on", "the", "device", "show_fs_float_window", "β€”", "show", "a", "full-screen", "window", "for", "phishing", "Of", "note", "is", "XLoader", "’", "s", "abuse", "of", "the", "WebSocket", "protocol", "(", "supported", "in", "many", "browsers", "and", "web", "applications", ")", "via", "ws", "(", "WebSockets", ")", "or", "wss", "(", "WebSockets", "over", "SSL/TLS", ")", "to", "communicate", "with", "its", "C", "&", "C", "servers", "." ]
[ 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.AutorunMI.Worm", "Trojan-Downloader.Win32.Flux!O", "Worm.AutoRun", "Trojan/Dropper.aiv", "Win32.Trojan.WisdomEyes.16070401.9500.9998", "Win.Trojan.Autorun-973", "Worm.Win32.AutoRun.lt", "Trojan.Win32.AutoRun.18461", "Constructor.W32.VB.lgxd", "Backdoor.Win32.Popwin.~IQ", "Trojan.Popwin", "Worm/Win32.AutoRun", "Worm.AutoRunsT.ot.18432", "Worm.Win32.AutoRun.lt", "Worm.Winko" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]