tokens
sequencelengths
2
296
ner_tags
sequencelengths
2
296
[ "Figure", "4", "." ]
[ 16, 16, 16 ]
[ "Four", "of", "them", "had", "more", "than", "10,000", "installs", "and", "one", "of", "them", "had", "more", "than", "50,000", "installs." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "This", "‘", "versatility", "’", "was", "present", "in", "the", "first", "version", "of", "Rotexy", "and", "has", "been", "a", "feature", "of", "all", "the", "family", "’", "s", "subsequent", "representatives", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojanpws.Win64", "Win32.Trojan.WisdomEyes.16070401.9500.9986", "Win64.Trojan-qqpass.Qqrob.Lmug", "BehavesLike.Win32.Rootkit.dh", "HackTool.Mimikatz", "Trojan.PSW.Mimikatz.acm", "Trojan[PSW]/Win64.Mimikatz", "HackTool:Win32/Mimikatz.A!dha", "Troj.Psw.Win64.Mimikatz!c", "BScope.TrojanPSW.Mimikatz", "Win32/Trojan.PSW.a2b" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.Kinkisc.Worm", "Trojan.Dropper.SRY", "TrojanDownloader.Zlob.A4", "Trojan.Fanny.MB", "TROJ_ZLOB.SMFM", "W32.Fanni", "Win32/Zlob.PL", "TROJ_ZLOB.SMFM", "Win.Worm.Autorun-7948", "Trojan.Dropper.SRY", "Trojan.Win32.EquationDrug.n", "Trojan.Dropper.SRY", "Trojan.Win32.Downloader.184320.CW", "Trojan.Dropper.SRY", "Trojan.DownLoad2.36935", "BehavesLike.Win32.Backdoor.ch", "Worm.Win32.Funny", "Worm/Win32.AutoRun", "Worm:Win32/Fanys.A", "Trojan.Win32.EquationDrug.n", "Trojan.Dropper.SRY", "Worm.Fanny", "Trojan.Dropper.SRY", "Trojan.Win32.Downloader.tyo", "Worm.Win32.Fanny.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Archive", "files", "ZIP,", "RAR,", "ACE,", "and", "ISOs", "containing", "EXE", "payloads" ]
[ 1, 9, 9, 9, 9, 16, 1, 16, 3, 11 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Autoit", "Trojan.Symmi.D10095", "Trojan.Win32.Autoit.exnvng", "Trojan.Win32.Z.Autoit.1079042", "Troj.W32.Autoit!c", "Trojan.Inject1.38999", "Trojan.AutoIt.Win32.7", "BehavesLike.Win32.Trojan.th", "Trojan.Win32.Eupuds", "Trojan.Autoit.ixi", "Trojan:Win32/BrobanEup.A", "Trojan.Autoit.Banker", "Win32.Trojan.Autoit.Szbl", "W32/Autoit.AAV!tr", "Win32/Trojan.839" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Infecting", "legal", "web", "resources", "help", "spread", "mobile", "malware", "via", "popular", "websites", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "We", "'ve", "contacted", "the", "potentially", "affected", "users", ",", "disabled", "the", "applications", "on", "affected", "devices", ",", "and", "implemented", "changes", "in", "Verify", "Apps", "to", "protect", "all", "users", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 16, 16, 16, 16, 16 ]
[ "ViperRAT", "has", "been", "operational", "for", "quite", "some", "time", ",", "with", "what", "appears", "to", "be", "a", "test", "application", "that", "surfaced", "in", "late", "2015", "." ]
[ 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor/W32.Mirleg.24544", "Backdoor/Mirleg.a", "TROJ_LEMIR.KM", "Win.Trojan.Mirleg-1", "Backdoor.Win32.Mirleg.a", "Trojan.Win32.Mirleg.dkdm", "Backdoor.Win32.Mirleg.24544", "Backdoor.W32.Mirleg.a!c", "BackDoor.Mirshell", "Backdoor.Mirleg.Win32.3", "TROJ_LEMIR.KM", "BehavesLike.Win32.VTFlooder.mc", "Trojan[Backdoor]/Win32.Mirleg", "Backdoor.Win32.Mirleg.a", "Backdoor:Win32/Mirle.A", "Backdoor.Mirleg", "Bck/Lmir.D", "Win32.Backdoor.Mirleg.Tbik", "Trojan.PSW.LMir!RFMQExC82yY", "Backdoor.Win32.EggDrop", "W32/BDoor.BCV!tr.bdr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "We", "have", "named", "this", "tool", "BBSRAT." ]
[ 16, 16, 16, 16, 3, 11 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.VB.EV", "Heuristic.Crypted" ]
[ 16, 3, 16, 16, 16, 1, 1 ]
[ "Always", "keep", "the", "\"", "Unknown", "Sources", "''", "option", "disabled", "in", "the", "Android", "device", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.Farfli.20223", "Win32.Trojan.Farfli.t", "W32/Trojan.LJSX-0343", "Backdoor.Trojan", "BKDR_ZEGOST.SM44", "Trojan.Win32.Dwn.dxihqn", "TrojWare.Win32.AntiAV.~D", "Trojan.DownLoader16.26781", "Trojan.Farfli.Win32.30753", "BKDR_ZEGOST.SM44", "BehavesLike.Win32.Backdoor.kc", "BDS/Backdoor.davcs", "Trj/CI.A", "Trojan.Farfli!Hj4dzX9BZUM", "Trojan-PWS.Win32.Bjlog" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.Hanove", "W32/Trojan.BLPJ-3540", "Backdoor.Trojan", "Trojan-Dropper.Win32.Dapato.degm", "Trojan.Win32.Drop.ddlhu", "Trojan.MulDrop2.26538", "BehavesLike.Win32.Trojan.fh", "TrojanDropper.Dapato.owp", "Trojan-Dropper.Win32.Dapato.degm", "Backdoor:Win32/Hanove.A", "Trojan/Win32.Hanove.C240436", "Win32.Trojan-dropper.Dapato.Ebhb" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Its", "name", "originates", "from", "the", "Arabic", "word", "maktub", "which", "means", "this", "is", "written", "or", "this", "is", "fate" ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "For", "most", "of", "its", "history", "it", "operated", "as", "a", "government", "department", "or", "public", "corporation", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "In", "this", "version", "of", "Ursnif", "I", "have", "also", "encountered", "an", "internal", "peer-to-peer", "communication", "which", "could", "possibly", "add", "the", "ability", "for", "the", "sample", "to", "communicate", "with", "other", "Ursnif", "peers", "over", "the", "same", "network." ]
[ 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 1, 9, 9, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.DownloaderHC.Trojan", "Trojan-Ransom.Win32.FraudBlocker!O", "Trojan/VB.bn", "TROJ_RANSVB.SMA", "Win32.Trojan.WisdomEyes.16070401.9500.9983", "W32/MalwareS.U", "TROJ_RANSVB.SMA", "Trojan-Ransom.Win32.Chameleon.gfl", "Trojan.Win32.Chameleon.edluzm", "Trojan.Win32.A.FraudBlocker.9216.A[UPX]", "Win32.Trojan.Chameleon.Phqb", "Trojan.Winlock.364", "Trojan.FakeAV.Win32.150033", "W32/Risk.WDRB-6022", "Trojan.Chameleon.c", "TR/Ransom.VB.BN", "Trojan:Win32/SMSer.F", "Troj.Downloader.W32.Small.l5Bd", "Trojan-Ransom.Win32.Chameleon.gfl", "Trojan/Win32.Chameleon.C2304852", "SScope.Trojan.Validium.va", "Trojan.FraudBlocker!3BdV5QfTi3g", "Trojan-Ransom.Win32.Fullscreen", "W32/LockScreen.CH!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9993", "Win32/Tnega.THZ", "BehavesLike.Win32.Downloader.hh", "PWS:Win32/Tibia.BB", "Trojan.Zusy.Elzob.D6208", "Trojan/Win32.Scar.R8662" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan-Exploit/W32.CAN.28672", "Exploit.CAN", "Trojan/Exploit.CAN.2002-0649.a", "TROJ_SQLEXP.A", "TROJ_SQLEXP.A", "Win.Trojan.Exploit-173", "Exploit.Win32.CAN.2002-0649.a", "Exploit.Win32.CAN-2002-0649.gpav", "Trojan.Win32.Exploit.28672.A", "Exploit.W32.CAN.2002-0649.a!c", "Exploit.Sqlck", "Exploit.CAN.Win32.23", "W32/Risk.DCEZ-2564", "Exploit.CAN.g", "TR/Expl.CAN-2002-0649.A", "Trojan[Exploit]/Win32.CAN", "Exploit.Win32.CAN.2002-0649.a", "Exploit:Win32/CAN20020649.A", "Exploit.CAN", "Win32/Exploit.CAN-2002-0649.A", "Win32.Exploit.Can.Eeqq", "W32/ThcSQL.A!exploit", "Win32/Trojan.Exploit.96c" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9998", "Backdoor.Trojan", "Trojan.Win32.DownLoad3.evepic", "Win32.Trojan.Spy.Pgde", "Trojan.DownLoad3.47177", "BehavesLike.Win32.Downloader.lm", "W32/Trojan.XTOU-1556", "Trojan:Win32/Netfosor.A!dha", "Trojan/Win32.Netfosor.C1246582", "Trj/GdSda.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Deborm.AC@mm", "Worm.Win32.Deborm!O", "Worm.Deborm", "Win32.Deborm.AC@mm", "Win32.Trojan.WisdomEyes.16070401.9500.9895", "W32.HLLW.Deborms", "Win.Downloader.88-1", "Win32.Deborm.AC@mm", "Worm.Win32.Deborm.ac", "Win32.Deborm.AC@mm", "Trojan.Win32.Deborm.fvmw", "Worm.W32.Deborm!c", "Win32.Deborm.AC@mm", "Win32.HLLW.Deborm.27", "BehavesLike.Win32.Downloader.nz", "BehavesLike.Win32.ExplorerHijack", "WORM/Deborm.AC", "Worm:Win32/Deborm.AC", "Win32.Deborm.E5BBB3", "Worm.Win32.Deborm.ac", "Worm.Deborm", "Win32.Deborm.AC@mm", "Trj/CI.A", "Win32.Worm.Deborm.Pjxe" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "If", "the", "user", "installs", "the", "profile", ",", "the", "malicious", "website", "will", "open", ",", "revealing", "it", "to", "be", "an", "Apple", "phishing", "site", ",", "as", "seen", "in", "figure", "2", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Dynamer.10163", "Trojan.Barys.DE0C3", "Win32/Tnega.CfKWaYC", "Trojan.Click2.60391", "BehavesLike.Win32.Autorun.vc", "Trojan-Banker.Win32.Banker", "HackTool:Win32/Asoka.A", "Unwanted/Win32.HackTool.R76574" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Talos", "has", "identified", "an", "email-based", "attack", "targeting", "the", "energy", "sector,", "including", "nuclear", "power,", "that", "puts", "a", "new", "spin", "on", "the", "classic", "word", "document", "attachment", "phish." ]
[ 4, 16, 16, 16, 1, 9, 16, 4, 12, 12, 16, 4, 12, 16, 16, 16, 16, 16, 16, 16, 1, 9, 9, 9, 9 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9926", "Trojan-Downloader.Win32.Delf.koxi", "Trojan.Win32.Delf.eurqqv", "Trojan.Win32.Z.Delf.2321408", "Downloader.Delf.Win32.55823", "BehavesLike.Win32.Dropper.vh", "W32/Trojan.VVSX-7495", "TR/Dldr.Delf.xofbe", "Trojan-Downloader.Win32.Delf.koxi", "Trj/GdSda.A", "Trojan-Downloader.Win32.Delf", "W32/Delf.CFW!tr.dldr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9963", "W32.Mytob@mm", "Net-Worm.Win32.Mytob.bf", "W32.W.VBNA.tni6", "TrojWare.Win32.TrojanDownloader.Delf.accr", "Win32.HLLM.MyDoom.based", "BehavesLike.Win32.Trojan.pc", "Net-Worm.Win32.Mytob", "Worm/Mytob.atd", "WORM/Mytob.MD", "Trojan/Win32.Rukap.C17970", "Win32.Trojan.Hoster.Heur" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Since", "in", "Android", "8.0", "(", "SDK", "API", "26", ")", "the", "system", "is", "able", "to", "kill", "idle", "services", ",", "this", "code", "raises", "a", "fake", "update", "notification", "to", "prevent", "it", ":", "Cybercriminals", "have", "the", "ability", "to", "control", "the", "implant", "via", "HTTP", ",", "XMPP", ",", "binary", "SMS", "and", "FirebaseCloudMessaging", "(", "or", "GoogleCloudMessaging", "in", "older", "versions", ")", "protocols", "." ]
[ 16, 16, 5, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan-Dropper.Win32.Small!O", "Win32.Trojan.WisdomEyes.16070401.9500.9996", "Backdoor.Trojan", "BKDR_PUDORATE.A", "Win.Trojan.Pudorat-2", "Trojan-Dropper.Win32.Small.ix", "Trojan.Win32.Pudorat.uvlp", "BackDoor.PudoRat", "Dropper.Small.Win32.205", "BKDR_PUDORATE.A", "W32/Trojan.ATSN-3573", "Backdoor/Pudorat.e", "BDS/Pudorat.E.Srv", "Trojan[Backdoor]/Win32.Pudorat", "Trojan.Graftor.Elzob.D2736", "Trojan-Dropper.Win32.Small.ix", "Backdoor:Win32/Pudorat.E", "Trojan/Win32.Small.R102192", "Backdoor.Pudorat", "Trojan.DR.Small!n8WI7XFkeRA", "Backdoor.Win32.Pudorat.G", "W32/Pudorat.E!tr.bdr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Katusha.Win32.25040", "Win.Trojan.357100-1", "Trojan.Win32.Abacab.zfokj", "BackDoor.Abacab.102", "Trojan[Backdoor]/Win32.Revell", "Backdoor:Win32/Revell.1_02", "Win32.Virus.Temcac.A@dam", "W32/Revll.102!tr.bdr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.TrodowsLTK.Trojan", "Trojan/Cosmu.atqv", "BehavesLike.Win32.AdwareRBlast.dm", "Trojan.Zusy.Elzob.D560E", "Trojan.Win32.A.Cosmu.83456[h]", "Dropper/Malware.253952.FL", "TrojanDropper:Win32/Blmoon.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1 ]
[ "DOC", "and", "XLS", "files", "with", "malicious", "macros" ]
[ 1, 16, 1, 9, 16, 3, 11 ]
[ "A", "backdoor", "also", "known", "as:", "Dropped:Trojan.Downloader.VU", "TrojanDownloader.Podcast", "Trojan/Downloader.Adload.ci", "Win32.Trojan.WisdomEyes.16070401.9500.9963", "W32/Downloader.AIEZ", "TROJ_DLOADR.CH", "Win.Downloader.Adload-85", "Dropped:Trojan.Downloader.VU", "Trojan-Downloader.Win32.Adload.amn", "Dropped:Trojan.Downloader.VU", "Trojan.Win32.Delf.epwf", "Trojan.Win32.Downloader.140800.D", "Dropped:Trojan.Downloader.VU", "TrojWare.Win32.TrojanDownloader.Adload.CI", "Dropped:Trojan.Downloader.VU", "Trojan.DownLoader6.4157", "TROJ_DLOADR.CH", "BehavesLike.Win32.Fujacks.cc", "Downloader.Delphi", "W32/Downloader.RKBR-2696", "TrojanDownloader.Adload.hk", "Adware.DollarRevenue", "TR/Drop.Start.abk.4", "Trojan[Downloader]/Win32.Adload", "Trojan.Downloader.VU", "Troj.Downloader.W32.Adload.amn!c", "Trojan-Downloader.Win32.Adload.amn", "Trojan/Win32.Banload.R41470", "Dropped:Trojan.Downloader.VU", "Trojan-Downloader.Win32.10213", "Win32/TrojanDownloader.Adload.CI", "Win32.Trojan-downloader.Adload.Pkqr", "Trojan.DL.Adload!u3IAhoIxyiU" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.FamVT.FcodeNHc.Trojan", "Trojan.Dorv.S8319", "Ransom.FileLocker", "Trojan.Foreign.Win32.9536", "Ransom.FileLocker/Variant", "Trojan/Kryptik.aykk", "Win32.Trojan.Filecoder.u", "RANSOM_CRYPNAN_GA250444.UVPM", "Trojan.Win32.Encoder.egvznv", "Trojan-Ransom.Win32.FileCoder.nan", "Backdoor.Win32.Hlux.NAN", "Trojan.Encoder.217", "RANSOM_CRYPNAN_GA250444.UVPM", "BehavesLike.Win32.PWSZbot.dh", "Trojan/Foreign.ewc", "Trojan[Ransom]/Win32.Foreign", "Ransom:Win32/Haperlock.A", "Trojan.Symmi.D4C7E", "Trojan/Win32.Foreign.R61679", "BScope.Malware-Cryptor.Hlux", "Win32/Filecoder.NAN", "Trojan.Foreign!VfdOCZ5FB8A", "Trojan.Win32.Sisron", "Trj/Dtcontx.D" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "This", "report", "contains", "indicators", "of", "compromise", "IOCs", "and", "technical", "details", "on", "the", "tactics,", "techniques,", "and", "procedures", "TTPs", "used", "by", "APT", "actors", "on", "compromised", "victims'", "networks." ]
[ 16, 16, 16, 1, 9, 9, 9, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 6, 14, 16, 16, 5, 13 ]
[ "List", "of", "PlugX", "Command", "And", "Control", "servers", "used", "to", "attack", "targets", "in", "Asia." ]
[ 16, 16, 3, 1, 1, 1, 1, 16, 16, 1, 16, 16, 2 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.Win32.Chyopic!O", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "TROJ_OGRAN.A", "Win.Trojan.Downloader-30022", "Trojan.Win32.Chyopic.bksyf", "Trojan.Win32.S.Downloader.9984.A", "Backdoor.W32.Chyopic.bu!c", "Backdoor.Win32.Chyopic.A", "BackDoor.ClDdos.6", "TROJ_OGRAN.A", "BehavesLike.Win32.FDoSBEnergy.zh", "TrojanDownloader.Ogran.j", "Trojan:Win32/Chcod.A", "Trojan[Backdoor]/Win32.Chyopic", "Trojan:Win32/Chcod.A", "Trojan/Win32.HDC.C33704", "Trojan.Chcod!5jj9mkC/wqU", "Backdoor.Win32.Chyopic", "Win32/Backdoor.7b0" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "customization", "doesn", "t", "end", "with", "the", "lure;", "the", "malware", "used", "in", "the", "campaigns", "is", "also", "targeted", "by", "region", "and", "vertical." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 6, 16, 16, 16, 16, 2, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Risktool.Flystudio.17330", "DDOS_NITOL.SMD", "DDOS_NITOL.SMD", "Win.Trojan.7486152-1", "Backdoor.Win32.Sethift.a", "Trojan.Win32.Spambot.wpwqo", "Trojan.Spambot.10932", "BehavesLike.Win32.Downloader.qc", "Trojan.Win32.MicroFake", "Backdoor.Win32.Sethift.a", "Backdoor:Win32/Payduse.A!bit", "Trojan/Win32.PbBot.R11181", "Trojan.Cosmu", "Trj/CI.A", "W32/Nitol.C", "Win32/Trojan.b7f" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.Vetor.PE", "Virus.Win32.Virut.1!O", "W32.Virut.G", "W32.Virut.CF", "Win32/Virut.17408", "PE_VIRUX.Q", "Win.Trojan.Virut-377", "Virus.Win32.Virut.q", "Virus.Win32.Virut.hpeg", "Win32.Virut.5", "Virus.Virut.Win32.1938", "PE_VIRUX.Q", "BehavesLike.Win32.Ipamor.lh", "Win32/Virut.bn", "Virus/Win32.Virut.ce", "Win32.Virut.cr.61440", "Virus:Win32/Virut.BN", "W32.Virut.l5he", "Virus.Win32.Virut.q", "Win32/Virut.F", "Virus.Virut.13", "Win32/Virut.NBP", "Backdoor.Win32.DsBot", "W32/Sality.AO" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "targetting", "Linux", "also", "known", "as:", "Android.Trojan.FakeApp.FC", "Trojan:Fakebank.B", "Android.Trojan.FakeApp.FC", "HEUR:Trojan-Banker.AndroidOS.Asacub.ab", "A.H.Ste.Banker.B", "Android.BankBot.221.origin", "HEUR:Trojan-Banker.AndroidOS.Asacub.ab", "Android-Trojan/Banker.5d288", "a.privacy.spiderbank", "Trojan-Banker.AndroidOS.RuBank", "Android/SpyBanker.HH!tr" ]
[ 16, 3, 16, 11, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Some", "of", "the", "settings", "include", ":", "The", "URL", "of", "the", "C", "&", "C", "server", "Service", "wake-up", "intervals", "Important", "package", "names", "Accessibility", "permissions", "status", "Lockdown", "screen", "status", "Recording", "status", "SMS", "app", "status", "Kill", "switch", "status", "Stealth", "To", "keep", "its", "resources", "safer", "and", "make", "analysis", "more", "difficult", "for", "researchers", ",", "TrickMo", "uses", "an", "obfuscator", "to", "scramble", "the", "names", "of", "its", "functions", ",", "classes", "and", "variables", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "panels", "also", "contain", "Thai", "JavaScript", "comments", "and", "the", "domain", "names", "also", "contain", "references", "to", "Thai", "food", ",", "a", "tactic", "commonly", "employed", "to", "entice", "users", "to", "click/visit", "these", "C2", "panels", "without", "much", "disruption", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan-PWS.Win32.Banker.1!O", "Trojan/Kryptik.adfi", "Win32.Trojan.WisdomEyes.16070401.9500.9985", "Infostealer.Bancos", "TROJ_BANKPTCH.SMA", "Trojan.PWS.Banker1.4670", "TROJ_BANKPTCH.SMA", "Trojan-PWS.Win32.Banker", "Trojan/Menti.uci", "W32.Infostealer.Banker", "TR/Menti.A.2", "Trojan/Win32.Unknown", "PWS:Win32/Banjori.A", "Trojan.Kazy.DFB0D", "TScope.Malware-Cryptor.SB", "W32/Krypt.CLE!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "PDF/Dropper.C!Camelot", "Bloodhound.PDF.24", "PDF/Exploit.Pidief.PIT", "Heuristics.PDF.ObfuscatedNameObject", "Trojan.Script.ExpKit.esqnwi", "Exploit.PDF.Pidief.f", "Exploit.PDF.889", "HEUR_PDFEXP.D", "BehavesLike.PDF.BadFile.dx", "PDF/Dropper.C", "EXP/Pidief.akc", "Exploit:Win32/Pdfdrop.D", "JS/SARS.S139", "possible-Threat.PDF.Acmd", "VBS/BanLoader.BBAF!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9772", "Win32.Worm.Autorun.R", "Trojan.Win32.Inject.srauk", "Heur.Packed.Unknown", "Trojan/Jorik.bmit", "TrojanDownloader:Win32/Roker.A", "W32/Llac.SHV!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1 ]
[ "And", "in", "an", "unusual", "reversal", "of", "typical", "bank", "phishing", "social", "engineering", "tactics,", "the", "phishing", "emails", "purport", "to", "be", "from", "the", "bank's", "customers." ]
[ 16, 16, 16, 16, 16, 16, 16, 1, 9, 16, 16, 16, 1, 9, 9, 16, 16, 16, 16, 4, 12, 12 ]
[ "For", "example", ",", "we", "found", "a", "piece", "of", "a", "particularly", "sophisticated", "Android", "ransomware", "with", "novel", "techniques", "and", "behavior", ",", "exemplifying", "the", "rapid", "evolution", "of", "mobile", "threats", "that", "we", "have", "also", "observed", "on", "other", "platforms", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "HW32.Packed.B01F", "Ransom_Troldesh.R011C0DB318", "Win32.Trojan.WisdomEyes.16070401.9500.9997", "Ransom_Troldesh.R011C0DB318", "Trojan-Ransom.Win32.Shade.onr", "Troj.Ransom.W32.Shade!c", "Trojan.MulDrop7.59017", "BehavesLike.Win32.ObfusRansom.dc", "TR/Injector.cjsif", "Ransom:Win32/Troldesh.A", "Trojan-Ransom.Win32.Shade.onr", "Trojan/Win32.Shade.R219897", "TrojanRansom.Shade", "Ransom.Shade", "Trj/CI.A", "NSIS/Injector.YO", "Win32.Trojan.Shade.Szbw", "W32/Injector.YD!tr", "Win32/Trojan.Ransom.c29" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.ServicesIpripA.Trojan", "Trojan.Ripinip.C", "Backdoor/W32.Ripinip.20480.L", "Backdoor.Win32.Ripinip!O", "Backdoor.Ripinip.28625", "Trojan.Ripinip.C", "Backdoor/Ripinip.eea", "Trojan.Ripinip.C", "Win32.Backdoor.Ripinip.b", "Backdoor.Ripinip", "BKDR_RIPNIP.SMIA", "Win.Trojan.Ripnip-3", "Trojan.Ripinip.C", "Backdoor.Win32.Ripinip.eea", "Trojan.Ripinip.C", "Trojan.Win32.Ripinip.buwod", "Backdoor.Win32.A.Ripinip.20480", "Trojan.Ripinip.C", "Backdoor.Win32.Ripinip.~eea", "Trojan.Ripinip.C", "Win32.HLLW.Autoruner.28406", "BackDoor-EVC.a", "Backdoor.Win32.Ripinip", "BDS/Ripinip.BN", "Trojan[Backdoor]/Win32.Ripinip", "Backdoor:Win32/Ripinip.C", "Backdoor/Win32.Ripinip.R1964", "Backdoor.Win32.Ripinip.eea", "Win32/Ripinip.AP", "BackDoor-EVC.a", "TScope.Malware-Cryptor.SB", "Backdoor.Win32.Rip.tji", "Backdoor.Win32.Ripinip.B" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Recently", "a", "new", "Carbanak", "attack", "campaign", "dubbed", "Digital", "Plagiarist", "was", "exposed", "where", "the", "group", "used", "weaponized", "office", "documents", "hosted", "on", "mirrored", "domains,", "in", "order", "to", "distribute", "malware." ]
[ 16, 16, 16, 6, 14, 14, 16, 6, 14, 16, 16, 16, 16, 6, 16, 16, 16, 16, 16, 16, 1, 9, 16, 16, 16, 16, 3 ]
[ "For", "instance,", "Sphinx", "ZeuS", "has", "enhanced", "its", "capabilities", "because", "of", "the", "Olympics." ]
[ 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 4 ]
[ "Like", "BlackEnergy,", "the", "malware", "used", "by", "the", "so-called", "Sandworm", "APT", "group", "also", "known", "as", "Quedagh,", "Potao", "is", "an", "example", "of", "targeted", "espionage", "malware", "directed", "mostly", "at", "targets", "in", "Ukraine", "and", "a", "number", "of", "other", "post-Soviet", "countries,", "including", "Russia,", "Georgia", "and", "Belarus." ]
[ 16, 6, 16, 3, 16, 16, 16, 16, 6, 14, 14, 16, 16, 16, 6, 3, 16, 16, 16, 16, 3, 11, 11, 16, 16, 3, 16, 16, 2, 16, 16, 16, 16, 16, 2, 10, 16, 2, 2, 16, 2 ]
[ "The", "fact", "that", "the", "overlay", "screens", "are", "almost", "identical", "to", "the", "legitimate", "banking", "apps", "suggests", "that", "the", "actors", "might", "be", "very", "familiar", "with", "the", "Spanish", "banking", "applications", "and", "might", "even", "be", "accustomed", "to", "the", "language", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "]", "230", "[", "." ]
[ 9, 9, 9, 9 ]
[ "Allows", "applications", "to", "change", "network", "connectivity", "state", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "With", "their", "assistance,", "we", "have", "confirmed", "over", "76", "additional", "messages", "containing", "NSO", "exploit", "links." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 11 ]
[ "Capabilities", "and", "functionality", "In", "2013", ",", "we", "detected", "several", "technological", "innovations", "developed", "and", "used", "by", "criminals", "in", "their", "malicious", "software", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "RC4", "key", "is", "hardcoded", "in", "EventBot", "." ]
[ 16, 16, 16, 16, 16, 16, 3, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Troj.Downloader.W32.AutoIt", "Trojan.Win32.Pasta.ztb", "Trojan.DownLoader11.57616", "Trojan.Strictor.DE515", "Trojan/Win32.Inject", "Trojan.Pasta", "IM-Worm.Win32.Sohanad" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1 ]
[ "This", "ransomware", "is", "developed", "using", "the", "Go", "programming", "language." ]
[ 16, 3, 16, 16, 16, 5, 13, 13, 13 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Zusy.D3D963", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Trojan.PWS.Stealer.17779", "BehavesLike.Win32.PUPXAG.fc", "Trojan.MSIL.gotl", "Trojan:MSIL/Elmb.A!bit", "Trj/GdSda.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1 ]
[ "Electronicfrontierfoundation.org", "was", "not", "the", "only", "domain", "involved", "in", "this", "attack." ]
[ 1, 16, 16, 16, 16, 1, 16, 16, 16, 1 ]
[ "Other", "samples", "communicated", "with", "other", "servers", "listed", "at", "the", "bottom", "of", "this", "report", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "ITG03", "used", "several", "previously", "unreported", "malwares,", "including", "backdoor", "and", "PowerShell", "scripts", "suggesting", "continued", "ITG03", "interest", "in", "exploiting", "SWIFT", "three", "years", "after", "its", "initial", "campaign", "in", "2016." ]
[ 6, 16, 16, 16, 16, 3, 16, 3, 16, 5, 13, 16, 16, 6, 16, 16, 7, 15, 0, 8, 16, 16, 16, 6, 16, 0 ]
[ "Hence", ",", "we", "name", "this", "new", "spin-off", "campaign", "as", "Jaguar", "Kill", "Switch", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "TrojanPWS.Kelopol.A3", "W32/Application.USPT-4138", "Hacktool.Keylogger", "PWS:MSIL/Kelopol.B", "Trojan.Win32.KeyLogger.ctnnso", "Trojan.KeyLogger.14630", "TSPY_KELOPOL.SM", "TR/Habbo.skdh", "Trojan.MSIL.Krypt.5", "Trojan/Win32.Vapsup.R122716" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "In", "2015,", "many", "of", "these", "techniques", "and", "activities", "remain", "in", "use." ]
[ 16, 0, 16, 16, 16, 1, 16, 16, 16, 16, 16 ]
[ "In", "today's", "article,", "AnyRun", "look", "at", "LimeRAT,", "a", "modular", "piece", "of", "malware", "designed", "to", "give", "attackers", "control", "over", "a", "victim's", "computer", "and", "use", "it", "for", "crypto-mining", "or", "DDoS", "attacks." ]
[ 16, 16, 16, 4, 16, 16, 3, 16, 3, 11, 11, 11, 16, 16, 16, 6, 16, 16, 16, 5, 13, 16, 16, 16, 16, 1, 16, 1, 9 ]
[ "In", "the", "case", "of", "this", "ransomware", ",", "using", "the", "model", "would", "ensure", "that", "its", "ransom", "note—typically", "fake", "police", "notice", "or", "explicit", "images", "supposedly", "found", "on", "the", "device—would", "appear", "less", "contrived", "and", "more", "believable", ",", "increasing", "the", "chances", "of", "the", "user", "paying", "for", "the", "ransom", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "We", "have", "dubbed", "the", "groups", "latest", "campaign", "Digital", "Plagiarist", "for", "its", "signature", "practice", "of", "mirroring", "legitimate", "sites", "using", "Tenmaxs", "TelePort", "Pro", "and", "TelePort", "Ultra", "site", "mirroring", "software", "onto", "similarly", "named", "domains,", "on", "which", "the", "TelePort", "Crew", "would", "host", "and", "serve", "up", "malware", "laden", "Office", "documents." ]
[ 16, 16, 16, 16, 6, 16, 6, 14, 14, 16, 16, 16, 16, 16, 1, 9, 9, 16, 3, 11, 11, 16, 3, 11, 11, 11, 11, 16, 16, 16, 1, 16, 16, 6, 14, 14, 16, 16, 16, 16, 16, 3, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Win32.Kolweb!O", "Trojan.Lokrodem.25745", "Trojan.Kolweb.Win32.139", "Troj.W32.Kolweb.mBu8", "Trojan/Kolweb.a", "Win32.Trojan.WisdomEyes.16070401.9500.9687", "Adware.Margoc", "Win32/Startpage.SK", "Win.Trojan.Kolweb-96", "Trojan.Win32.Kolweb.a", "Trojan.Win32.Kolweb.cxqwlv", "Trojan.Win32.A.Kolweb.224389[ASPack]", "Trojan.PWS.Mirka", "BehavesLike.Win32.Sality.fc", "Trojan/Kolweb.cm", "TR/Delf.CF.13", "Trojan/Win32.Kolweb", "Trojan:Win32/Lokrodem.A.dll", "Trojan.Win32.Kolweb.a", "Trojan/Win32.Kolweb.C12167", "Trojan.Kolweb", "Trojan.Graftor.D33DE", "Win32.Trojan.Kolweb.Edns", "Trojan.PWS.Delf!+6OEG1VoGF8", "Win32/Trojan.f0c" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Using", "the", "SMS", "has", "an", "initial", "infection", "vector", "is", "another", "possibility", "for", "the", "exfiltration", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "In", "the", "case", "of", "Hancitor,", "it", "still", "seen", "as", "a", "favourite", "carrier", "of", "very", "much", "active", "malware", "families", "such", "as", "Pony", "and", "Vawtrak." ]
[ 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 3, 16, 3 ]
[ "We", "believe", "that", "the", "operators", "of", "the", "Bunitu", "botnet", "are", "selling", "access", "to", "infected", "proxy", "bots", "as", "a", "way", "to", "monetize", "their", "botnet." ]
[ 16, 16, 16, 16, 16, 16, 16, 3, 11, 16, 7, 15, 16, 1, 9, 9, 16, 16, 16, 16, 16, 16, 3 ]
[ "In", "May", "2018,", "ITG03", "actors", "stole", "$10", "million", "from", "the", "Banco", "de", "Chile." ]
[ 16, 0, 8, 6, 14, 16, 16, 16, 16, 4, 12, 12, 12 ]
[ "Our", "telemetry", "shows", "that", "H-W0rm", "is", "one", "of", "the", "most", "active", "RATs", "we", "ve", "seen,", "with", "infections", "observed", "across", "virtually", "all", "enterprise", "verticals", "and", "geographies", "in", "which", "Fidelis", "Cybersecurity", "products", "are", "deployed." ]
[ 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16, 16, 2, 16, 16, 4, 12, 5, 16, 16 ]
[ "Its", "price", "starts", "around", "$2500", "which", "is", "more", "than", "double", "the", "price", "of", "another", "recent", "entry", "to", "the", "market." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Other", "ransomware", "families", "use", "infinite", "loops", "of", "drawing", "non-system", "windows", ",", "but", "in", "between", "drawing", "and", "redrawing", ",", "it", "’", "s", "possible", "for", "users", "to", "go", "to", "settings", "and", "uninstall", "the", "offending", "app", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "In", "April", "2017", "we", "started", "observing", "new", "rooting", "malware", "being", "distributed", "through", "the", "Google", "Play", "Store." ]
[ 16, 0, 8, 16, 16, 16, 3, 11, 11, 16, 16, 16, 5, 13, 13, 13 ]
[ "Within", "days", ",", "the", "Check", "Point", "research", "team", "detected", "another", "instance", "with", "a", "different", "package", "name", "but", "which", "uses", "the", "same", "code", "." ]
[ 16, 16, 16, 16, 4, 12, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Trojan:MSIL/Ploprolo.A" ]
[ 16, 3, 16, 16, 16, 1, 1 ]
[ "In", "order", "to", "infect", "the", "victims,", "the", "attackers", "distributed", "spear-phishing", "emails", "containing", "malicious", "word", "document,", "the", "email", "purported", "to", "have", "been", "sent", "from", "legitimate", "email", "ids." ]
[ 16, 16, 16, 16, 16, 16, 16, 6, 16, 1, 9, 16, 3, 11, 11, 16, 1, 16, 16, 16, 16, 16, 16, 1, 9, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.MTSysAntiD.Worm", "Packed.Win32.Klone!O", "PWS-OnlineGames.es", "PE_MAGOVEL.A", "Win32.Virus.Induc.b", "W32/Induc.A", "Trojan.Packed.16", "PE_MAGOVEL.A", "Win.Trojan.Packed-77", "Virus.Win32.Induc.b", "Trojan.Win32.Downloader.85504.AX", "Backdoor.Win32.Delf.~DD", "Win32.HLLP.Lagic", "Backdoor.Hupigon.Win32.100099", "BehavesLike.Win32.MultiPlug.nc", "W32/Induc.A", "Win32.Troj.Klone.ab.389660", "W32.Induc.tnqE", "Virus.Win32.Induc.b", "PWS:Win32/Magovel.A", "Backdoor/Win32.Hupigon.C61571", "Virus.Win32.Induc.c", "RiskWare.NakedPack", "Win32.Induc.A", "Backdoor.Rbot", "Virus.Win32.Viking.AV" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "We", "have", "seen", "this", "threat", "access", "online", "content,", "including:JDUDUIFIB.exe" ]
[ 16, 16, 16, 16, 3, 16, 16, 16, 1 ]
[ "TUESDAY", ",", "MAY", "19", ",", "2020", "The", "wolf", "is", "back", "...", "NEWS", "SUMMARY", "Thai", "Android", "devices", "and", "users", "are", "being", "targeted", "by", "a", "modified", "version", "of", "DenDroid", "we", "are", "calling", "\"", "WolfRAT", ",", "''", "now", "targeting", "messaging", "apps", "like", "WhatsApp", ",", "Facebook", "Messenger", "and", "Line", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 5, 16, 5, 13, 16, 5, 16 ]
[ "Distribution", "/", "Infection", "When", "this", "campaign", "started", "at", "the", "start", "of", "2018", ",", "the", "malware", "(", "\"", "GlanceLove", "''", ",", "\"", "WinkChat", "''", ")", "was", "distributed", "by", "the", "perpetrators", "mainly", "via", "fake", "Facebook", "profiles", ",", "attempting", "to", "seduce", "IDF", "soldiers", "to", "socialize", "on", "a", "different", "platform", "(", "their", "malware", ")", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "June", "23", "FireEye", "blog", "post", "titled", "Operation", "Clandestine", "Wolf", "discussed", "a", "cyber", "espionage", "group,", "known", "as", "APT3,", "that", "had", "been", "exploiting", "a", "zero-day", "vulnerability", "in", "Adobe", "Flash." ]
[ 16, 0, 8, 4, 16, 16, 16, 6, 14, 14, 16, 16, 6, 14, 14, 16, 16, 6, 16, 16, 16, 16, 16, 7, 15, 16, 5, 13 ]
[ "This", "kind", "of", "“", "moving", "target", "”", "behavior", "made", "it", "harder", "to", "track", "their", "actions", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "We", "collected", "a", "list", "of", "hashes", "and", "the", "files", "corresponding", "to", "those", "hashes", "were", "then", "retrieved", "from", "VirusTotal", "for", "further", "analysis." ]
[ 16, 16, 16, 16, 16, 1, 16, 16, 1, 16, 16, 16, 1, 16, 16, 16, 16, 4, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.VBKrypt", "Spyware.Pony", "Downloader.Ponik", "TSPY_HPFAREIT.SMB", "Trojan.Win32.VBKrypt.ymio", "Trojan.Win32.VBKrypt.evkxoj", "Trojan.VBKrypt.Win32.291698", "BehavesLike.Win32.Fareit.ch", "Trojan.VBKrypt.cgbs", "TR/Dropper.VB.ocnhj", "Trojan.Win32.VBKrypt.ymio", "Trojan/Win32.VBKrypt.R213345", "Trojan.VBKrypt", "Trj/GdSda.A", "Win32.Trojan.Vbkrypt.Amwf", "Trojan.VBKrypt!wORN5qK9fN4", "Trojan.VB.Crypt", "W32/FareitVB.BEOK!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "After", "a", "series", "of", "technical", "analysis", "(", "which", "is", "covered", "in", "detail", "below", ")", "and", "heuristic", "threat", "hunting", ",", "we", "discovered", "that", "a", "complete", "“", "Agent", "Smith", "”", "infection", "has", "three", "main", "phases", ":", "A", "dropper", "app", "lures", "victim", "to", "install", "itself", "voluntarily", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "week", "later,", "an", "anonymous", "user,", "supposedly", "the", "author", "of", "AES-NI", "ransomware", "the", "XData", "is", "based", "on,", "released", "the", "master", "private", "key." ]
[ 16, 0, 8, 16, 4, 12, 16, 16, 6, 16, 3, 11, 16, 3, 16, 16, 16, 16, 16, 1, 9, 9 ]
[ "A", "backdoor", "also", "known", "as:", "W32.Clod8cd.Trojan.9e70", "Backdoor/W32.BlackAngel.780304", "W32/Backdoor.AAVE-7405", "Backdoor.Trojan", "BKDR_BLAKANGEL.A", "Backdoor.Win32.BlackAngel.05", "Trojan.Win32.BlackAngel.hiov", "Backdoor.Win32.BlackAngel.780304", "Backdoor.W32.BlackAngel.05!c", "Backdoor.Win32.BlackAngel.05", "BackDoor.BlackAngel.5", "Backdoor.BlackAngel.Win32.6", "BKDR_BLAKANGEL.A", "BehavesLike.Win32.PWSZbot.bc", "W32/Backdoor.DMA", "Backdoor/BlackAngel.05", "BDS/BlackAngel.05", "W32/BlackAn.05!tr.bdr", "Trojan[Backdoor]/Win32.BlackAngel", "Backdoor.Win32.BlackAngel.05", "Backdoor:Win32/BlackAngel.0_5", "Backdoor.BlackAngel", "Win32/BlackAngel.05", "Win32.Backdoor.Blackangel.Lndw", "Backdoor.Win32.BlackAngel" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Since", "late", "November", "2016,", "the", "Shamoon", "2", "attack", "campaign", "has", "brought", "three", "waves", "of", "destructive", "attacks", "to", "organizations", "within", "Saudi", "Arabia." ]
[ 16, 16, 0, 8, 1, 9, 9, 9, 6, 16, 16, 16, 16, 16, 16, 1, 16, 4, 16, 2, 10 ]
[ "The", "malware", "mainly", "targets", "banking", "and", "financial", "applications", ",", "but", "also", "looks", "for", "popular", "shopping", "apps", "such", "as", "eBay", "or", "Amazon", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16, 4, 16 ]
[ "Only", "this", "time,", "it's", "a", "Hangul", "Word", "Processor", "HWP", "document", "leveraging", "the", "already", "known", "CVE-2015-2545", "Encapsulated", "PostScript", "EPS", "vulnerability." ]
[ 16, 16, 16, 16, 1, 9, 9, 9, 9, 9, 16, 16, 16, 16, 1, 7, 15, 15, 15 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/Sacto.e", "Trojan.Graftor.D1DEE6", "BKDR_SACTO.SM0", "Win32.Trojan.WisdomEyes.16070401.9500.9983", "Backdoor.Trojan", "BKDR_SACTO.SM0", "TrojWare.Win32.Sacto.A", "Trojan.PWS.Multi.1194", "Backdoor:Win32/Sacto.A!dha", "W32/Sacto.E!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]