tokens
sequencelengths 2
296
| ner_tags
sequencelengths 2
296
|
---|---|
[
"A",
"backdoor",
"also",
"known",
"as:",
"Java.Exploit.CVE-2015-2590.A",
"Java.Exploit.CVE-2015-2590.A",
"Java.Exploit.CVE-2015-2590.A",
"Exploit.Java.CVE20120507.cqxpdq",
"Java/Downloader.BM",
"Exp.CVE-2015-2590",
"JAVA_DLOADR.EFD",
"Java.Exploit.CVE-2015-2590.A",
"Java.Exploit.CVE-2015-2590.A",
"Java.Downloader.1103",
"JAVA_DLOADR.EFD",
"BehavesLike.Java.Downloader.zj",
"Java/Downloader.BM",
"Java.Exploit.CVE-2015-2590.A",
"TrojanDownloader:Java/Reamshunt.A",
"Java.Exploit.CVE-2015-2590.A",
"Java.Exploit.CVE-2015-2590.A",
"Exploit.Java_c.QQT"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"For",
"the",
"past",
"several",
"weeks,",
"Forcepoint",
"Security",
"Labs",
"have",
"been",
"tracking",
"a",
"seemingly",
"low-profile",
"piece",
"of",
"malware",
"which",
"piqued",
"our",
"interest",
"for",
"a",
"number",
"of",
"reasons:",
"few",
"samples",
"appear",
"to",
"be",
"available",
"in",
"the",
"wild;",
"there",
"is",
"no",
"previous",
"documentation",
"referring",
"to",
"the",
"C2",
"domains",
"and",
"IP",
"addresses",
"it",
"uses",
"despite",
"the",
"domains",
"appearing",
"to",
"be",
"at",
"least",
"twelve",
"months",
"old;",
"and,",
"if",
"its",
"compilation",
"timestamps",
"are",
"to",
"be",
"trusted,",
"the",
"campaign",
"itself",
"may",
"have",
"been",
"active",
"for",
"at",
"least",
"six",
"months",
"before",
"samples",
"started",
"to",
"surface..."
] | [
16,
0,
8,
8,
8,
4,
12,
12,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9,
9,
9,
9,
16,
16,
16,
16,
16,
16,
16,
16,
0,
8,
8,
8,
8,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
6,
16,
16,
16,
16,
16,
16,
0,
8,
8,
8,
16,
16,
16,
16,
16
] |
[
"Figure",
"9",
":",
"Malware",
"secretly",
"adds",
"malicious",
"resources",
"to",
"the",
"DEX",
"file",
"Now",
",",
"after",
"the",
"alteration",
"of",
"the",
"original",
"application",
",",
"Android",
"β",
"s",
"package",
"manager",
"will",
"think",
"that",
"this",
"is",
"an",
"update",
"for",
"the",
"application",
"signed",
"by",
"the",
"same",
"certificate",
",",
"but",
"in",
"reality",
",",
"it",
"will",
"execute",
"the",
"malicious",
"DEX",
"file",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Zenshirsh.SL7",
"Trojan.DDur.Win32.4",
"Trojan/DDur.n",
"Win32.Trojan.WisdomEyes.16070401.9500.9937",
"Trojan.Zlob",
"Win.Trojan.Dnschanger-1136",
"Trojan.Win32.DDur.xjyd",
"Trojan.Win32.Z.Ddur.16289",
"Trojan.Packed.253",
"BehavesLike.Win32.Vundo.lc",
"Trojan.Win32.DNSChanger",
"Win32.Troj.DNSChangerT.kg.14848",
"Trojan:Win32/Remetrac.C",
"Trojan/Win32.Monder.C72152",
"BScope.Trojan.Sawbones.vf",
"Win32/Trojan.e0c"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"malware",
"β",
"s",
"creators",
"had",
"used",
"obfuscation",
"to",
"upload",
"the",
"new",
"piece",
"of",
"malware",
"to",
"Google",
"Play",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16
] |
[
"A",
"group",
"known",
"as",
"the",
"Cutting",
"Sword",
"of",
"Justice",
"took",
"credit",
"for",
"the",
"Saudi",
"Aramco",
"attack",
"by",
"posting",
"a",
"Pastebin",
"message",
"on",
"the",
"day",
"of",
"the",
"attack",
"back",
"in",
"2012,",
"and",
"justified",
"the",
"attack",
"as",
"a",
"measure",
"against",
"the",
"Saudi",
"monarchy."
] | [
16,
6,
16,
16,
6,
14,
14,
14,
14,
16,
16,
16,
4,
12,
12,
1,
16,
16,
16,
4,
12,
16,
0,
8,
16,
16,
1,
16,
16,
0,
16,
16,
16,
16,
16,
16,
16,
16,
2,
10,
10
] |
[
"The",
"fact",
"the",
"trojan",
"can",
"steal",
"both",
"the",
"victim",
"β",
"s",
"credentials",
"and",
"also",
"can",
"control",
"their",
"SMS",
"messages",
"and",
"generated",
"2FA",
"codes",
"means",
"DEFENSOR",
"ID",
"β",
"s",
"operators",
"can",
"bypass",
"two-factor",
"authentication",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Downloader.Murlo.FK",
"Downloader.Murlo.Win32.1632",
"Trojan/Downloader.Murlo.fk",
"Trojan.Downloader.Murlo.FK",
"Trojan.DL.Murlo!u+ZN6N7ySiY",
"W32/Downldr2.HWY",
"Trojan.Downloader-8985",
"Trojan-Downloader.Win32.Murlo.fk",
"Trojan.Win32.Murlo.kadq",
"Trojan.Win32.Downloader.2560.J[h]",
"NORMAL:Trojan.DL.Win32.Murlo.c!1185532",
"Trojan.Downloader.Murlo.FK",
"TrojWare.Win32.TrojanDownloader.Murlo.FK",
"Trojan.Downloader.Murlo.FK",
"Trojan.DownLoader.26702",
"BehavesLike.Win32.Mamianune.xh",
"TrojanDownloader.Murlo.ar",
"Trojan[Downloader]/Win32.Murlo",
"Win32.TrojDownloader.Murlo.fk.kcloud",
"Win-Trojan/Murlo.2560.J",
"Trojan.Downloader.Murlo.FK",
"Win32/TrojanDownloader.Murlo.FK",
"Trojan-Downloader.Win32.Tiny.hn",
"Win32/Ngvck.BP"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"implant",
"can",
"log",
"in",
"to",
"the",
"attackers",
"email",
"inbox",
",",
"parse",
"emails",
"for",
"commands",
"in",
"a",
"special",
"β",
"Cmd",
"β",
"folder",
"and",
"save",
"any",
"payloads",
"to",
"a",
"device",
"from",
"email",
"attachments",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9818",
"Riskware.Win32.FileTour.ednjdc",
"Trj/GdSda.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1
] |
[
"Trojan",
"architecture",
"and",
"capabilities",
"This",
"malware",
"is",
"written",
"in",
".NET",
"using",
"the",
"Xamarin",
"environment",
"for",
"mobile",
"applications",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
5,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"HW32.Packed.EA17",
"Trojan.Tibs.BJ",
"Worm/W32.Nuwar.31364",
"I-Worm.Zhelatin.eo.n1",
"Worm.Zhelatin.Win32.1360",
"W32/Zhelatin.eo",
"Trojan.Tibs.BJ",
"W32/EmailWorm.KUL",
"Trojan.Packed.13",
"Trojan.Small-2710",
"Email-Worm.Win32.Zhelatin.eo",
"Trojan.Win32.Zhelatin.chkpnw",
"I-Worm.Win32.Zhelatin.31364[h]",
"PE:Worm.Mail.Win32.Zhelatin.eu!1074243991",
"Trojan.Tibs.BJ",
"Email-Worm.Win32.Zhelatin.eo",
"Trojan.Tibs.BJ",
"Trojan.Packed.140",
"Trojan.Vxgame.z",
"TROJ_FORUCON.BMC",
"W32/Worm.YFRS-1205",
"I-Worm/Zhelatin.cna",
"W32/Tibs.EO@mm",
"Worm[Email]/Win32.Zhelatin",
"Worm.Zhelatin.eo.kcloud",
"Trojan.Tibs.BJ",
"Spammer:Win32/Clodpuntor.A",
"Virus.Win32.Heur.d",
"Trojan.Tibs.BJ",
"Trojan.Vxgame.z",
"Trojan-Downloader.Revelation.Tibs.B",
"Worm.Win32.Zhelatin.Az",
"Win32.Worm-email.Zhelatin.Hwwo",
"Packer.Win32.Tibs",
"Trojan.Tibs.BJ",
"Downloader.Tibs.5.BO",
"Trj/Spammer.ABX",
"Win32/Trojan.be3"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.OnGameELXIAUS.Trojan",
"Trojan.Win32.Buzy!O",
"Backdoor.Tenrite.A4",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"TROJ_TENRITE_0000000.TOMA",
"Trojan.Win32.Tens.as",
"Trojan.Win32.Buzy.ikstz",
"Trojan.Win32.A.Tens.13312",
"TrojWare.Win32.Tenrite.A",
"Trojan.Click2.12702",
"BehavesLike.Win32.BadFile.lz",
"Trojan.Win32.Tenrite",
"TR/Buzy.3083.1",
"Trojan/Win32.Tens",
"Trojan.Buzy.DC0B",
"Trojan.Win32.Tens.as",
"Backdoor:Win32/Tenrite.A",
"Win32/Tenrite.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Adware.BrowseFox.Win32.220089",
"Trojan.Razy.D2BA2D",
"Win32.Trojan.WisdomEyes.16070401.9500.9546",
"Win.Trojan.Server-24",
"Riskware.Win32.Server.ctchyk",
"Program.Server.260",
"BehavesLike.Win32.HLLP.fz",
"SPR/SmallHTTP.F",
"GrayWare[Server-Web]/Win32.SmallHTTP",
"Riskware.SmallHTTP!",
"not-a-virus:Server-Web.Win32.SmallHTTP"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"In",
"our",
"research",
"we",
"identified",
"tens",
"of",
"fake",
"applications",
"that",
"were",
"infected",
"with",
"this",
"malware",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/OnLineGames.pmt",
"Trojan.Win32.OnLineGames.djktr",
"W32.Gammima.AG",
"Win32/Pebox.Y",
"Trojan-GameThief.Win32.OnLineGames.ajibj",
"Trojan.PWS.OnLineGames!PDfLLBwapmw",
"Trojan.PWS.Wsgame.37257",
"TR/PSW.OnlineGames.xbkj",
"Trojan/PSW.OnLineGames.bylz",
"PWS:Win32/DNFOnline.A",
"Malware.Gammima!rem",
"Win32/PSW.OnLineGames.PMT",
"Trojan-GameThief.Win32.OnLineGames",
"W32/Onlinegames.AJIBJ!tr",
"PSW.OnlineGames3.ATWL",
"Trj/CI.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"Nyetya",
"attack",
"was",
"a",
"destructive",
"ransomware",
"variant",
"that",
"affected",
"many",
"organizations",
"inside",
"of",
"Ukraine",
"and",
"multinational",
"corporations",
"with",
"operations",
"in",
"Ukraine."
] | [
1,
9,
9,
16,
16,
16,
3,
11,
16,
16,
16,
4,
16,
16,
2,
16,
4,
12,
16,
16,
16,
2
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Win32.Pincav!O",
"Trojan/Pincav.awm",
"Win.Trojan.Pincav-604",
"Trojan.Win32.Pincav.awn",
"Trojan.Win32.Pincav.drkdnm",
"Trojan.Win32.A.Pincav.1185236",
"Troj.Clicker.W32.Small.kZ0E",
"Trojan.Pincav.Win32.12742",
"Trojan/Pincav.chh",
"Trojan/Win32.Pincav",
"Trojan.Graftor.D836A",
"Trojan.Win32.Pincav.awn",
"Backdoor:Win32/Losfondup.A",
"Trojan/Win32.Pincav.R42635",
"TScope.Trojan.Delf",
"Backdoor.Losfondup!Ng6K/s6DvsI",
"Trojan-PWS.Win32.Delf"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"If",
"not",
",",
"the",
"application",
"downloads",
"a",
"pack",
"of",
"exploits",
"from",
"the",
"server",
"and",
"runs",
"them",
"one-by-one",
"up",
"until",
"root",
"is",
"achieved",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Although",
"the",
"use",
"of",
"free",
"web-services",
"as",
"a",
"C2",
"channel",
"is",
"not",
"new,",
"the",
"use",
"of",
"a",
"Github",
"issue",
"for",
"a",
"command/response",
"channel",
"was",
"interesting."
] | [
16,
16,
16,
16,
1,
9,
9,
9,
9,
9,
16,
16,
16,
16,
16,
16,
16,
5,
13,
11,
16,
9,
4,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.WinwebA.Trojan",
"TrojanDropper.Henbang.A6",
"Win32.Worm.AutoRun.c",
"W32/Adware.PXAH-3010",
"W32.Virut.CF",
"Win32/SillyBHO.OL",
"Worm.Win32.AutoRun.ibh",
"Trojan.Win32.AutoRun.cqpmwl",
"Trojan.MulDrop.32523",
"BehavesLike.Win32.AdwareBetterSurf.gh",
"W32/Adware.ACXN",
"Win32.Virut.cr.61440",
"TrojanDropper:Win32/Henbang.A",
"Worm.Win32.AutoRun.ibh",
"Win32.Trojan.Webdat.A",
"Worm/Win32.AutoRun.R56346",
"Backdoor.WinNT.PcClient",
"Win32/Worm.FakeFolder.FF"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Instead",
",",
"in",
"Version",
"0.0.0.2",
",",
"EventBot",
"dynamically",
"loads",
"its",
"main",
"module",
"."
] | [
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.RansomwareTQB.Trojan",
"Trojan.ServStart.A",
"Troj.W32.StartServ.tnEy",
"Trojan/ServStart.io",
"Win32.Trojan.ServStart.aj",
"Backdoor.Trojan",
"TROJ_SERVSTART_GJ1000AC.UVPN",
"Trojan.Win32.StartServ.xer",
"Trojan.Win32.Heuristic131.dcnfpc",
"Trojan.Win32.Z.Servstart.196709.QO",
"TrojWare.Win32.ServStart.CA",
"Trojan.Mrblack.3",
"Trojan.StartServ.Win32.135",
"TROJ_SERVSTART_GJ1000AC.UVPN",
"Trojan.Win32.ServStart",
"Trojan.Zusy.D23C29",
"Trojan.Win32.StartServ.xer",
"Backdoor/Win32.Zegost.R117606",
"Trojan.StartServ",
"Win32/ServStart.IO",
"Win32.Trojan.Startserv.Huzb",
"Win32/Trojan.a35"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"As",
"the",
"Play",
"Store",
"has",
"introduced",
"new",
"policies",
"and",
"Google",
"Play",
"Protect",
"has",
"scaled",
"defenses",
",",
"Bread",
"apps",
"were",
"forced",
"to",
"continually",
"iterate",
"to",
"search",
"for",
"gaps",
"."
] | [
16,
16,
5,
13,
16,
16,
16,
16,
16,
5,
13,
13,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Society.A",
"W32/Society.DR",
"Win32.Trojan.WisdomEyes.16070401.9500.9997",
"W95.Sosume.3363",
"PE_ALCAUL.H",
"Win.Trojan.Alcaul-8",
"Virus.Win32.Alcaul.h",
"Win32.Society.A",
"Virus.Win32.Alcaul.ue",
"W32.Alcaul.h!c",
"Win32.Society.A",
"Virus.Win32.Alcaul.h",
"Win32.Society.A",
"Win95.Necromancer.3363",
"PE_ALCAUL.H",
"BehavesLike.Win32.Mental.xz",
"W32/Risk.GISN-1213",
"Win32/Alcaul.h",
"W32/Alcaul.H",
"W32/Alcaul.H!tr.dr",
"Virus/Win32.Alcaul",
"Win32.Society.A",
"Backdoor:Win32/Society.A",
"Virus.Win9x.Repus",
"Win32.Society.A",
"W32/Alcal.F"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"''",
"The",
"trojan",
"calls",
"this",
"function",
"with",
"the",
"action",
"GLOBAL_ACTION_BACK",
",",
"which",
"equals",
"the",
"pressing",
"of",
"the",
"back",
"button",
"on",
"the",
"device",
",",
"thus",
"canceling",
"the",
"opening",
"of",
"the",
"anti-virus",
"application",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan-Downloader.Win32.Dapato!O",
"TrojanClicker.Baffec.A10",
"Trojan.Downloader",
"Downloader.Dapato.Win32.1470",
"Trojan/Downloader.Dapato.fxd",
"Win32.Trojan.WisdomEyes.16070401.9500.9610",
"TROJ_DAPATO_CA08278A.TOMC",
"Trojan-Downloader.Win32.Dapato.fxd",
"Trojan.Win32.Dapato.bxnvih",
"Trojan.Downloader-Dapato",
"Win32.Trojan-downloader.Dapato.Srdc",
"TrojWare.Win32.Downloader.Dapato.FXD",
"Trojan.DownLoad3.2529",
"TROJ_DAPATO_CA08278A.TOMC",
"Trojan-Downloader.Win32.Dapato",
"TrojanDownloader.Dapato.atd",
"Trojan[Downloader]/Win32.Dapato",
"TrojanClicker:Win32/Baffec.A",
"Trojan.Delf.28",
"Trojan-Downloader.Win32.Dapato.fxd",
"Downloader/Win32.Dapato.R22620",
"TrojanDownloader.Dapato",
"Trojan.DL.Dapato!K0jxx5EHs9Y"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Ongoing",
"reporting",
"by",
"ClearSky"
] | [
16,
16,
16,
16
] |
[
"The",
"users",
"of",
"this",
"app",
"include",
"many",
"well",
"known",
"celebrities",
"who",
"eventually",
"post",
"the",
"dubbed",
"videos",
"on",
"popular",
"social",
"networking",
"platforms",
"like",
"Facebook",
"and",
"Twitter."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
4
] |
[
"To",
"ensure",
"you",
"are",
"fully",
"protected",
"against",
"PHAs",
"and",
"other",
"threats",
",",
"we",
"recommend",
"these",
"5",
"basic",
"steps",
":",
"Install",
"apps",
"only",
"from",
"reputable",
"sources",
":",
"Install",
"apps",
"from",
"a",
"reputable",
"source",
",",
"such",
"as",
"Google",
"Play",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16
] |
[
"This",
"is",
"done",
"by",
"sending",
"β",
"3458",
"β",
"in",
"an",
"SMS",
"to",
"the",
"blocked",
"device",
"β",
"this",
"will",
"revoke",
"the",
"administrator",
"privileges",
"from",
"the",
"Trojan",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Social",
"networking",
"sites",
"Facebook",
"and",
"Twitter",
"are",
"primarily",
"being",
"used",
"to",
"spread",
"a",
"shortened",
"URL",
"using",
"bit.ly",
"service",
"that",
"points",
"to",
"a",
"Google",
"Cloud",
"Server",
"hosting",
"the",
"malicious",
"payload",
"with",
".COM",
"or",
".EXE",
"file",
"extensions."
] | [
1,
9,
16,
4,
16,
4,
16,
16,
16,
16,
16,
16,
16,
1,
9,
16,
1,
9,
16,
16,
16,
16,
5,
13,
13,
13,
16,
1,
9,
9,
9,
16,
1,
9,
9
] |
[
"This",
"report",
"documents",
"some",
"of",
"our",
"recent",
"findings",
"regarding",
"its",
"cryptography,",
"network",
"behavior,and",
"banking",
"targets."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
6,
14,
14,
4,
12
] |
[
"Earlier",
"this",
"year,",
"the",
"SpiderLabs",
"team",
"at",
"Trustwave",
"investigated",
"a",
"series",
"of",
"bank",
"breaches",
"originating",
"from",
"postSovietstates."
] | [
0,
8,
8,
4,
12,
12,
3,
4,
16,
16,
16,
16,
16,
16,
16,
16,
2
] |
[
"Allows",
"applications",
"to",
"access",
"information",
"about",
"networks",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"banking",
"malware",
"can",
"steal",
"login",
"credentials",
"from",
"94",
"different",
"mobile",
"banking",
"apps."
] | [
3,
11,
11,
16,
1,
9,
9,
16,
16,
16,
5,
13,
13
] |
[
"In",
"a",
"newly-identified",
"campaign,",
"FIN7",
"modified",
"their",
"phishing",
"techniques",
"to",
"implement",
"unique",
"infection",
"and",
"persistence",
"mechanisms."
] | [
16,
16,
16,
6,
14,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"We",
"also",
"discovered",
"two",
"previously",
"unknown",
"payloads.These",
"payloads",
"contained",
"backdoors",
"that",
"we",
"have",
"named",
"BYEBY",
"and",
"PYLOT",
"respectively."
] | [
16,
16,
16,
16,
16,
3,
11,
11,
16,
3,
16,
16,
16,
16,
3,
16,
3,
16
] |
[
"The",
"malware",
"uses",
"several",
"advanced",
"techniques",
"to",
"hide",
"its",
"real",
"intentions",
"and",
"makes",
"it",
"harder",
"to",
"detect",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"EventBot",
"infected",
"device",
"to",
"be",
"sent",
"to",
"the",
"C",
"Information",
"gathered",
"about",
"the",
"infected",
"device",
"to",
"be",
"sent",
"to",
"the",
"C2",
"."
] | [
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"RoomTap",
":",
"silently",
"answers",
"a",
"telephone",
"call",
"and",
"stays",
"connected",
"in",
"the",
"background",
",",
"allowing",
"the",
"caller",
"to",
"hear",
"conversations",
"within",
"the",
"range",
"of",
"the",
"phone",
"'s",
"microphone",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"HummingBad",
"does",
"this",
"by",
"silently",
"installing",
"promoted",
"apps",
"on",
"infected",
"phones",
",",
"defrauding",
"legitimate",
"mobile",
"advertisers",
",",
"and",
"creating",
"fraudulent",
"statistics",
"inside",
"the",
"official",
"Google",
"Play",
"Store",
"."
] | [
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
13,
16
] |
[
"Our",
"research",
"showed",
"that",
"the",
"spear",
"phishing",
"emails",
"came",
"from",
"multiple",
"compromised",
"email",
"accounts",
"tied",
"to",
"a",
"legitimate",
"domain",
"in",
"North",
"East",
"Asia."
] | [
16,
16,
16,
16,
1,
9,
9,
9,
16,
16,
16,
1,
9,
16,
16,
16,
16,
1,
9,
16,
2,
10,
10
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"TrjnDwnldrMSIL.Ranos.A4",
"MSIL.Trojan.Injector.q",
"BKDR_RANOS.SM",
"TrojWare.MSIL.TrojanDownloader.Small.DS",
"Trojan.Starter.2890",
"BKDR_RANOS.SM",
"Trojan.Jintor.1",
"TrojanDownloader:MSIL/Ranos.A",
"Trojan.Win32.Fsysna",
"MSIL/Injector.CKC!tr",
"Trj/GdSda.A",
"Win32/Trojan.e2d"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"La",
"Poste",
"-",
"La",
"Poste",
"is",
"a",
"public",
"limited",
"postal",
"service",
"company",
"in",
"France",
"."
] | [
4,
12,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Some",
"of",
"the",
"tactics",
"used",
"in",
"APT",
"attacks",
"die",
"hard."
] | [
16,
16,
16,
16,
16,
16,
6,
14,
16,
16
] |
[
"Therefore",
",",
"our",
"team",
"managed",
"to",
"generate",
"the",
"public",
"key",
"and",
"craft",
"an",
"SMS",
"message",
"that",
"activated",
"the",
"kill",
"switch",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"It",
"has",
"not",
"been",
"confirmed",
"whether",
"these",
"are",
"from",
"test",
"devices",
"or",
"the",
"devices",
"of",
"victims",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"How",
"does",
"Gooligan",
"work",
"?",
"The",
"infection",
"begins",
"when",
"a",
"user",
"downloads",
"and",
"installs",
"a",
"Gooligan-infected",
"app",
"on",
"a",
"vulnerable",
"Android",
"device",
"."
] | [
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16
] |
[
"β",
"We",
"β",
"re",
"appreciative",
"of",
"both",
"Check",
"Point",
"β",
"s",
"research",
"and",
"their",
"partnership",
"as",
"we",
"β",
"ve",
"worked",
"together",
"to",
"understand",
"these",
"issues",
",",
"β",
"said",
"Adrian",
"Ludwig",
",",
"Google",
"β",
"s",
"director",
"of",
"Android",
"security",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
4,
12,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
16,
16,
16,
5,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9931",
"W32/Trojan.MNLT-0240",
"TR/Crypt.Xpack.rxrlk",
"Trojan.Symmi.D136A2",
"Win32/Trojan.859"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1
] |
[
"This",
"new",
"process",
"downloads",
"and",
"executes",
"the",
"final",
"stage:",
"a",
"Remote",
"Administration",
"Tool",
"RAT",
"based",
"on",
"Gh0st",
"RAT."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
11,
11,
11,
16,
16,
3,
11
] |
[
"In",
"2018",
",",
"we",
"have",
"already",
"observed",
"a",
"small",
"but",
"consistent",
"number",
"of",
"samples",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Until",
"mid-2015",
",",
"Rotexy",
"used",
"a",
"plain-text",
"JSON",
"format",
"to",
"communicate",
"with",
"its",
"C",
"&",
"C",
"."
] | [
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan-Spy.Win32.TravNet.vmq",
"Trojan.PWS.Spy.17858",
"Trojan.Win32.Webprefix",
"Trojan.Zusy.D124FE",
"Trojan-Spy.Win32.TravNet.vmq",
"TrojanDownloader:Win32/Travnet.B",
"Trojan/Win32.Travnet.R99919",
"Trojan.Farfli!4lB/nc8HSss",
"W32/Farfli.LI",
"TrojanSpy.TravNet",
"Win32/Trojan.Multi.daf"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"oldest",
"sample",
"we",
"found",
"was",
"created",
"in",
"2009,",
"indicating",
"this",
"tool",
"has",
"been",
"in",
"use",
"for",
"almost",
"seven",
"years."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
0,
16,
16,
3,
16,
16,
16,
16,
16,
0,
8,
8
] |
[
"Users",
"should",
"adopt",
"best",
"practices",
",",
"while",
"organizations",
"should",
"ensure",
"that",
"they",
"balance",
"the",
"need",
"for",
"mobility",
"and",
"the",
"importance",
"of",
"security",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Earlier",
"this",
"year,",
"we",
"talked",
"about",
"how",
"cybercriminals",
"took",
"advantage",
"of",
"the",
"popularity",
"of",
"Pokemon",
"Go",
"to",
"launch",
"their",
"own",
"malicious",
"apps."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16,
16,
16,
3,
11,
11
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Trojan.Win32.Krypt.drmwlo",
"BehavesLike.Win32.Backdoor.gh",
"TR/Krypt.503296",
"Trojan.MSIL.Bladabindi.1",
"Trj/CI.A",
"Trojan.VB.Inject",
"MSIL/Bbindi.W!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Mozilla",
"products",
"that",
"don't",
"contain",
"the",
"PDF",
"Viewer,",
"such",
"as",
"Firefox",
"for",
"Android,",
"are",
"not",
"vulnerable."
] | [
4,
16,
16,
16,
16,
16,
1,
9,
16,
16,
5,
13,
13,
16,
16,
7
] |
[
"we",
"are",
"currently",
"working",
"with",
"Adobe",
"to",
"confirm",
"the",
"CVE",
"number",
"for",
"this",
"exploit"
] | [
16,
16,
16,
16,
16,
4,
16,
16,
16,
7,
15,
16,
16,
3
] |
[
"The",
"malware",
"likely",
"required",
"a",
"significant",
"amount",
"of",
"time",
"and",
"knowledge",
"to",
"create."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Crack2000.Win32.1",
"Trojan/.hack",
"Win.Trojan.HackDream-1",
"Trojan.IRC.Hack",
"Trojan.Win32.Hack.fvvy",
"TrojWare.IRC.Hack.A",
"Trojan.IrcHack",
"BehavesLike.Win32.Dropper.tc",
"Trojan/IRC.Hack",
"JS/IRC.bdmlu",
"Trojan/IRC.Hack",
"Trojan.Win32.IRCHack.546218",
"Trojan.IRC.Hack",
"Trojan.2000Cracks",
"IRC/Hack.A",
"IRC/Hack.A!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"addition",
"of",
"DNS-based",
"exfiltration",
"is",
"new",
"for",
"this",
"malware",
"family;",
"however,",
"other",
"POS",
"malware",
"families",
"such",
"as",
"BernhardPOS",
"and",
"FrameworkPOS",
"have",
"used",
"this",
"technique",
"in",
"the",
"past."
] | [
16,
16,
16,
7,
15,
16,
16,
16,
16,
3,
11,
16,
16,
3,
11,
11,
16,
16,
3,
16,
3,
16,
16,
16,
16,
16,
0,
8
] |
[
"How",
"does",
"the",
"malware",
"work",
"without",
"code",
"for",
"these",
"key",
"components",
"?",
"As",
"is",
"characteristic",
"for",
"obfuscated",
"threats",
",",
"the",
"malware",
"has",
"encrypted",
"binary",
"code",
"stored",
"in",
"the",
"Assets",
"folder",
":",
"When",
"the",
"malware",
"runs",
"for",
"the",
"first",
"time",
",",
"the",
"static",
"block",
"of",
"the",
"main",
"class",
"is",
"run",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"]",
"top/",
"Oct",
"23",
",",
"2017",
"hxxp",
":",
"//online.bankaustria.at.id8817469",
"[",
"."
] | [
9,
9,
16,
16,
16,
16,
1,
9,
9,
9,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan-GameThief.Win32.OnLineGames!O",
"Trojan.OnLineGames.Win32.215966",
"Trojan.Heur.RP.cmIfaG!Q79i",
"TSPY_ONLINEG.TGV",
"Win32.Trojan.WisdomEyes.16070401.9500.9941",
"Win32/Zuten.DK",
"TSPY_ONLINEG.TGV",
"Trojan-GameThief.Win32.OnLineGames.afmb",
"Trojan.Win32.OnLineGames.cvmqrs",
"Troj.GameThief.W32.OnLineGames.afmb!c",
"TrojWare.Win32.Magania.~D",
"Trojan.PWS.Gamania.9849",
"BehavesLike.Win32.Sytro.nc",
"Virus.Win32.Onlinegames.BBH",
"TrojanDownloader.Small.unq",
"Trojan[GameThief]/Win32.OnLineGames",
"Trojan:Win32/Hookja.A",
"Trojan-GameThief.Win32.OnLineGames.afmb",
"Trojan/Win32.OnlineGameHack.R70066",
"Trojan.Win32.OnlineGames.10068",
"Win32.Trojan-gamethief.Onlinegames.Wvkq",
"W32/Onlinegames.KKW!tr.pws"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"DroidJack",
"RAT",
"starts",
"capturing",
"sensitive",
"information",
"like",
"call",
"data",
",",
"SMS",
"data",
",",
"videos",
",",
"photos",
",",
"etc",
"."
] | [
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"One",
"of",
"the",
"most",
"profitable",
"cyber",
"crimes",
"in",
"recent",
"years",
"is",
"ATM",
"robbery,",
"where",
"the",
"cyber",
"criminals",
"extract",
"cash",
"directly",
"from",
"automated",
"teller",
"machines",
"that",
"have",
"already",
"been",
"infected",
"with",
"malware,",
"causing",
"millions",
"of",
"dollars",
"in",
"loss",
"for",
"the",
"banks",
"worldwide."
] | [
16,
16,
16,
16,
16,
6,
14,
16,
5,
13,
16,
5,
16,
16,
16,
6,
14,
16,
16,
16,
16,
5,
13,
13,
15,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
4,
2
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Ransome.Crowti.OB4",
"Tool.Patcher.Win32.14244",
"Trojan/Filecoder.CryptoWall.d",
"Win32.Trojan.Filecoder.h",
"Ransom.Cryptodefense",
"Ransom_HPCRYPTESLA.SM2",
"Trojan.Win32.Encoder.dytusk",
"Trojan.Encoder.514",
"Win32.Malware!Drop",
"Ransom_HPCRYPTESLA.SM2",
"Variant.Symmi.bop",
"TR/AD.Crowti.Y.580",
"Packed.Win32.Tpyn",
"Win32.Trojan-Ransom.TeslaCrypt.N",
"Win-Trojan/Inject.249861",
"Win32.Malware!Drop",
"Win32/Filecoder.CryptoWall.D",
"Trojan.Filecoder!cG6QHMIV+ig",
"Trojan.Win32.Filecoder"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Adware.DLBoost.A4",
"Win32.Trojan.WisdomEyes.16070401.9500.9658",
"Exploit.Win32.Simadona.b",
"Exploit.Win32.Simadona.eqnhht",
"Trojan.RoboInstall.6",
"BehavesLike.Win32.Backdoor.wc",
"Trojan.Win32.HackTool",
"HackTool:Win32/Skipun.A!bit",
"Exploit.Win32.Simadona.b",
"PUP/Win32.DLBoost.C1760189",
"Win32/Trojan.Exploit.09b"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Over",
"the",
"course",
"of",
"the",
"last",
"year,",
"ESET",
"has",
"detected",
"and",
"analyzed",
"several",
"instances",
"of",
"malware",
"used",
"for",
"targeted",
"espionage",
"β",
"dubbed",
"SBDH",
"toolkit."
] | [
16,
16,
16,
16,
0,
8,
8,
4,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
6,
14,
16,
3,
11,
11
] |
[
"Mitigations",
"XLoader",
"will",
"not",
"download",
"malicious",
"apps",
"if",
"the",
"Android",
"device",
"uses",
"a",
"mobile",
"data",
"connection",
"."
] | [
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"article",
"discusses",
"a",
"group",
"of",
"PlugX",
"samples",
"which",
"we",
"believe",
"are",
"all",
"used",
"by",
"the",
"same",
"attackers,",
"and",
"the",
"measures",
"they",
"have",
"taken",
"to",
"attempt",
"to",
"bypass",
"security",
"mechanisms."
] | [
16,
16,
16,
16,
12,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
6,
14,
14,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9,
9,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Win32.Obfuscated.en!O",
"Trojan.Obfuscated.Win32.70479",
"Troj.W32.Obfuscated.tpfc",
"Trojan/Obfuscated.a1",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Adware.Lop",
"Win.Trojan.Obfus-22",
"Trojan.Win32.Obfuscated.en",
"Virus.Win32.Sality.bgiylc",
"Trojan.Win32.Obfuscated.3771904",
"TrojWare.Win32.Obfuscated.en",
"Trojan.Packed.149",
"BehavesLike.Win32.Dropper.jh",
"Trojan-Downloader.Win32.Swizzor",
"Trojan/Win32.Obfuscated",
"Win32.Troj.ObfuscatedT.cz.545792",
"Trojan:Win32/C2Lop.C",
"Adware.Lop-Variant",
"Trojan.Win32.Obfuscated.en",
"MalwareScope.Trojan-Downloader.Obfuscated.2",
"Win32/Obfuscated.A1",
"W32/Swizzor.B!tr",
"Win32/Trojan.Obfus.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Bouncing",
"Golf",
"β",
"s",
"operators",
"also",
"try",
"to",
"cover",
"their",
"tracks",
"."
] | [
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"PACKING",
"In",
"addition",
"to",
"implementing",
"custom",
"obfuscation",
"techniques",
",",
"apps",
"have",
"used",
"several",
"commercially",
"available",
"packers",
"including",
":",
"Qihoo360",
",",
"AliProtect",
"and",
"SecShell",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
5,
16,
5,
16
] |
[
"We",
"are",
"uncertain",
"of",
"its",
"objectives",
"but",
"estimate",
"it",
"is",
"criminally",
"motivated."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"new",
"text",
"(",
"in",
"Chinese",
",",
"about",
"relations",
"between",
"China",
",",
"Japan",
"and",
"the",
"disputed",
"β",
"Senkaku",
"Islands",
"/",
"Diaoyudao",
"Islands",
"/",
"Diaoyutai",
"Islands",
"β",
")",
"is",
"shown",
"to",
"the",
"victims",
"and",
"reads",
"as",
"following",
":",
"When",
"opened",
"in",
"a",
"browser",
",",
"this",
"is",
"what",
"the",
"command-and-control",
"index",
"page",
"looks",
"like",
":",
"The",
"text",
"on",
"the",
"top",
"means",
"β",
"Title",
"Title",
"Title",
"β",
"in",
"Chinese",
",",
"while",
"the",
"other",
"strings",
"appear",
"to",
"be",
"random",
"characters",
"typed",
"from",
"the",
"keyboard",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"These",
"attacks",
"are",
"themed",
"around",
"Middle",
"Eastern",
"political",
"issues",
"and",
"the",
"motivation",
"appears",
"to",
"relate",
"to",
"espionage,",
"as",
"opposed",
"to",
"opportunistic",
"or",
"criminal",
"intentions."
] | [
16,
1,
16,
16,
16,
2,
10,
1,
9,
16,
16,
16,
16,
16,
16,
16,
6,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"BackDoor-CUR.svr",
"Win32.Backdoor.Detarmal.b",
"Backdoor.Trojan",
"Backdoor.Win32.Delf.NBJ",
"BackDoor.Cae.7",
"BehavesLike.Win32.Upatre.qh",
"Backdoor:Win32/Detarmal.A",
"Win32/Delf.NBJ",
"W32/Detarmal.A!tr",
"Bck/Furaxdoor.B",
"Backdoor.Win32.Detarmal.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"TROJ_GE.71380BE1",
"Trojan.Java.Crypt"
] | [
16,
3,
16,
16,
16,
1,
1
] |
[
"However",
"in",
"this",
"campaign,",
"the",
"binary",
"payload,",
"which",
"was",
"later",
"found",
"to",
"be",
"a",
"NanoCore",
"RAT",
"client,",
"is",
"actually",
"embedded",
"in",
"the",
"obfuscated",
"HTA."
] | [
16,
16,
16,
6,
3,
11,
11,
16,
16,
16,
16,
16,
16,
3,
11,
11,
11,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"event",
"triggers",
"archive",
"downloading",
"thread",
"."
] | [
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"HW32.Packed.5B76",
"Trojan.Win32.Yakes.vpjr",
"Trojan.Fakealert.49835",
"BehavesLike.Win32.PUPXAX.gc",
"W32/Trojan.TMDY-2947",
"TR/Crypt.ZPACK.mnboo",
"Trojan.Razy.D13B86",
"Trojan.Win32.Yakes.vpjr",
"W32/Kryptik.EZWB!tr",
"Trj/GdSda.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"LeakerLocker",
"claims",
"to",
"have",
"made",
"an",
"unauthorized",
"backup",
"of",
"a",
"phone's",
"sensitive",
"information",
"that",
"could",
"be",
"leaked",
"to",
"a",
"user's",
"contacts",
"unless",
"it",
"receives",
"a",
"modest",
"ransom."
] | [
3,
16,
16,
16,
16,
16,
1,
9,
16,
16,
1,
9,
9,
16,
16,
16,
1,
9,
9,
9,
9,
9,
16,
16,
16,
16,
16
] |
[
"We",
"have",
"made",
"the",
"connection",
"to",
"Bitter",
"APT",
"through",
"tactics,",
"techniques,",
"and",
"procedures",
"TTPs",
"that",
"have",
"been",
"observed",
"in",
"other",
"publications,",
"such",
"as",
"the",
"use",
"of",
"Microsoft",
"Office",
"exploits",
"through",
"Excel",
"files,",
"and",
"the",
"use",
"of",
"CHM",
"and",
"Windows",
"Installer",
"MSI",
"files."
] | [
16,
16,
16,
16,
16,
16,
6,
14,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
11,
16,
1,
9,
16,
16,
16,
16,
5,
16,
5,
13,
13,
1
] |
[
"The",
"setup",
"code",
"receives",
"an",
"installation",
"command",
"from",
"the",
"previous",
"stage",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"It",
"β",
"s",
"not",
"enough",
"for",
"this",
"malware",
"family",
"to",
"swap",
"just",
"one",
"innocent",
"application",
"with",
"an",
"infected",
"double",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Pawn",
"Storm",
"is",
"an",
"active",
"cyber",
"espionage",
"actor",
"group",
"that",
"has",
"been",
"very",
"aggressive",
"and",
"ambitious",
"in",
"recent",
"years."
] | [
6,
14,
16,
16,
16,
6,
14,
14,
14,
15,
16,
16,
16,
16,
16,
16,
16,
0,
8
] |
[
"Telegram",
"using",
"IP",
"address",
"from",
"Spain."
] | [
5,
16,
1,
9,
16,
2
] |
[
"However",
",",
"this",
"is",
"not",
"a",
"genuine",
"β",
"Google",
"Play",
"Protect",
"β",
"screen",
";",
"instead",
"it",
"gives",
"the",
"app",
"all",
"the",
"permissions",
"it",
"needs",
"while",
"simultaneously",
"disabling",
"the",
"actual",
"Google",
"Play",
"Protect",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
13,
16
] |
[
"Today",
"RSA",
"is",
"reporting",
"GlassRAT,",
"a",
"previously",
"undetectable",
"Remote",
"Access",
"Tool",
"RAT",
"which",
"was",
"discovered",
"by",
"the",
"RSA",
"Incident",
"Response",
"Team",
"and",
"investigated",
"by",
"RSA",
"Research",
"during",
"an",
"engagement",
"with",
"a",
"multi-national",
"enterprise."
] | [
16,
4,
16,
16,
3,
16,
16,
16,
3,
11,
11,
11,
16,
16,
16,
16,
16,
4,
12,
12,
12,
16,
16,
16,
4,
12,
16,
16,
16,
16,
16,
4,
12
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Worm.Nanspy",
"Worm.Nanspy.Win32.9",
"Win32.Trojan.WisdomEyes.16070401.9500.9990",
"W32/Nanspy.TXTE-7172",
"W32.Kassbot.B",
"Win.Worm.Nanspy-1",
"Net-Worm.Win32.Nanspy.e",
"Trojan.Win32.Nanspy.fwie",
"W32.W.Bagle.kZt7",
"Heur.Packed.MultiPacked",
"BackDoor.Pyev",
"BehavesLike.Win32.HLLPPhilis.nc",
"Trojan-Dropper.Delf",
"W32/Nanspy.O",
"I-Worm/Nanspy.d",
"WORM/Nanspy.E",
"Backdoor:Win32/Nanspy.D",
"Worm.Win32.Net-Nanspy.34368.B",
"Trojan/Win32.Lydra.R96925",
"Net-Worm.Win32.Nanspy.e",
"Worm.Nanspy"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"infected",
"application",
"contains",
"its",
"payload",
"inside",
"the",
"DEX",
"file",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"For",
"the",
"past",
"five",
"months",
",",
"Check",
"Point",
"researchers",
"have",
"quietly",
"observed",
"the",
"China-based",
"advertising",
"company",
"behind",
"HummingBad",
"in",
"several",
"ways",
",",
"including",
"by",
"infiltrating",
"the",
"command",
"and",
"control",
"servers",
"it",
"uses",
"."
] | [
16,
16,
16,
16,
16,
16,
4,
12,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"As",
"such,",
"this",
"new",
"attack",
"represents",
"a",
"dangerous",
"new",
"hybrid",
"combining",
"the",
"work",
"of",
"a",
"notorious",
"cyber",
"criminal",
"gang",
"with",
"Chinese",
"cyber",
"espionage",
"group",
"to",
"attack",
"a",
"financial",
"services",
"firm."
] | [
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
6,
14,
14,
16,
6,
14,
14,
14,
16,
1,
16,
4,
12,
12
] |
[
"FireEye",
"recently",
"discovered",
"a",
"new",
"variant",
"of",
"a",
"point",
"of",
"sale",
"POS",
"malware",
"family",
"known",
"as",
"NewPosThings."
] | [
4,
16,
16,
16,
3,
11,
11,
11,
11,
11,
11,
11,
11,
11,
16,
16,
3
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/W32.Imiserv.245760",
"Trojan.Imiserv.c",
"Trojan/Imiserv.c",
"Trojan.Win32.Malware.1",
"Win32/Imiserv.C",
"Adware.IEPlugin",
"Trojan.Win32.Imiserv.c",
"Trojan.Win32.Imiserv.B",
"TrojWare.Win32.Imiserv.C",
"Trojan.Win32.Imiserv.c",
"TROJ_IMISERVER.A",
"Trojan.Win32.Imiserv!IK",
"Trojan.Win32.Imiserv.B",
"Win-Trojan/Imiserv.245760",
"Trojan.Win32.Imiserv.c",
"Trojan.Imiserv.G",
"Trojan.Win32.Imiserv",
"W32/Imiserv.C!tr",
"Trj/Imiserv.M"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan-Clicker.Win32.VB!O",
"Trojan.VB.al3",
"Trojan.VB.Win32.56708",
"W32/Clicker.VB.fli",
"TROJ_LNKIEB.SMI",
"Win32/VB.BHE",
"TROJ_LNKIEB.SMI",
"Win.Trojan.Clicker-4258",
"Trojan-Clicker.Win32.VB.fli",
"Trojan.Win32.VB.cnwqrx",
"Trojan.Win32.A.Clicker.36892",
"Win32.Trojan.Vb.Angm",
"TrojWare.Win32.Injector.AMXL",
"TrojanClicker.VB.ffy",
"TR/Lnkiebes.A.6",
"Trojan[Clicker]/Win32.VB",
"Trojan.Buzy.D6DC",
"Trojan-Clicker.Win32.VB.fli",
"Trojan:Win32/Lnkiebes.A",
"Trojan/Win32.VB.R5515",
"Trojan.VBRA.03765",
"Win32/Spy.Chekafev.AD",
"Trojan.CL.VB!fBU5Dy6sJXo",
"Trojan-Clicker.Win32.VB",
"W32/VB.F!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.