tokens
sequencelengths
2
296
ner_tags
sequencelengths
2
296
[ "A", "backdoor", "also", "known", "as:", "Java.Exploit.CVE-2015-2590.A", "Java.Exploit.CVE-2015-2590.A", "Java.Exploit.CVE-2015-2590.A", "Exploit.Java.CVE20120507.cqxpdq", "Java/Downloader.BM", "Exp.CVE-2015-2590", "JAVA_DLOADR.EFD", "Java.Exploit.CVE-2015-2590.A", "Java.Exploit.CVE-2015-2590.A", "Java.Downloader.1103", "JAVA_DLOADR.EFD", "BehavesLike.Java.Downloader.zj", "Java/Downloader.BM", "Java.Exploit.CVE-2015-2590.A", "TrojanDownloader:Java/Reamshunt.A", "Java.Exploit.CVE-2015-2590.A", "Java.Exploit.CVE-2015-2590.A", "Exploit.Java_c.QQT" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "For", "the", "past", "several", "weeks,", "Forcepoint", "Security", "Labs", "have", "been", "tracking", "a", "seemingly", "low-profile", "piece", "of", "malware", "which", "piqued", "our", "interest", "for", "a", "number", "of", "reasons:", "few", "samples", "appear", "to", "be", "available", "in", "the", "wild;", "there", "is", "no", "previous", "documentation", "referring", "to", "the", "C2", "domains", "and", "IP", "addresses", "it", "uses", "despite", "the", "domains", "appearing", "to", "be", "at", "least", "twelve", "months", "old;", "and,", "if", "its", "compilation", "timestamps", "are", "to", "be", "trusted,", "the", "campaign", "itself", "may", "have", "been", "active", "for", "at", "least", "six", "months", "before", "samples", "started", "to", "surface..." ]
[ 16, 0, 8, 8, 8, 4, 12, 12, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 9, 9, 9, 9, 16, 16, 16, 16, 16, 16, 16, 16, 0, 8, 8, 8, 8, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 6, 16, 16, 16, 16, 16, 16, 0, 8, 8, 8, 16, 16, 16, 16, 16 ]
[ "Figure", "9", ":", "Malware", "secretly", "adds", "malicious", "resources", "to", "the", "DEX", "file", "Now", ",", "after", "the", "alteration", "of", "the", "original", "application", ",", "Android", "’", "s", "package", "manager", "will", "think", "that", "this", "is", "an", "update", "for", "the", "application", "signed", "by", "the", "same", "certificate", ",", "but", "in", "reality", ",", "it", "will", "execute", "the", "malicious", "DEX", "file", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Zenshirsh.SL7", "Trojan.DDur.Win32.4", "Trojan/DDur.n", "Win32.Trojan.WisdomEyes.16070401.9500.9937", "Trojan.Zlob", "Win.Trojan.Dnschanger-1136", "Trojan.Win32.DDur.xjyd", "Trojan.Win32.Z.Ddur.16289", "Trojan.Packed.253", "BehavesLike.Win32.Vundo.lc", "Trojan.Win32.DNSChanger", "Win32.Troj.DNSChangerT.kg.14848", "Trojan:Win32/Remetrac.C", "Trojan/Win32.Monder.C72152", "BScope.Trojan.Sawbones.vf", "Win32/Trojan.e0c" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "malware", "’", "s", "creators", "had", "used", "obfuscation", "to", "upload", "the", "new", "piece", "of", "malware", "to", "Google", "Play", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 16 ]
[ "A", "group", "known", "as", "the", "Cutting", "Sword", "of", "Justice", "took", "credit", "for", "the", "Saudi", "Aramco", "attack", "by", "posting", "a", "Pastebin", "message", "on", "the", "day", "of", "the", "attack", "back", "in", "2012,", "and", "justified", "the", "attack", "as", "a", "measure", "against", "the", "Saudi", "monarchy." ]
[ 16, 6, 16, 16, 6, 14, 14, 14, 14, 16, 16, 16, 4, 12, 12, 1, 16, 16, 16, 4, 12, 16, 0, 8, 16, 16, 1, 16, 16, 0, 16, 16, 16, 16, 16, 16, 16, 16, 2, 10, 10 ]
[ "The", "fact", "the", "trojan", "can", "steal", "both", "the", "victim", "’", "s", "credentials", "and", "also", "can", "control", "their", "SMS", "messages", "and", "generated", "2FA", "codes", "means", "DEFENSOR", "ID", "’", "s", "operators", "can", "bypass", "two-factor", "authentication", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Downloader.Murlo.FK", "Downloader.Murlo.Win32.1632", "Trojan/Downloader.Murlo.fk", "Trojan.Downloader.Murlo.FK", "Trojan.DL.Murlo!u+ZN6N7ySiY", "W32/Downldr2.HWY", "Trojan.Downloader-8985", "Trojan-Downloader.Win32.Murlo.fk", "Trojan.Win32.Murlo.kadq", "Trojan.Win32.Downloader.2560.J[h]", "NORMAL:Trojan.DL.Win32.Murlo.c!1185532", "Trojan.Downloader.Murlo.FK", "TrojWare.Win32.TrojanDownloader.Murlo.FK", "Trojan.Downloader.Murlo.FK", "Trojan.DownLoader.26702", "BehavesLike.Win32.Mamianune.xh", "TrojanDownloader.Murlo.ar", "Trojan[Downloader]/Win32.Murlo", "Win32.TrojDownloader.Murlo.fk.kcloud", "Win-Trojan/Murlo.2560.J", "Trojan.Downloader.Murlo.FK", "Win32/TrojanDownloader.Murlo.FK", "Trojan-Downloader.Win32.Tiny.hn", "Win32/Ngvck.BP" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "implant", "can", "log", "in", "to", "the", "attackers", "email", "inbox", ",", "parse", "emails", "for", "commands", "in", "a", "special", "β€œ", "Cmd", "”", "folder", "and", "save", "any", "payloads", "to", "a", "device", "from", "email", "attachments", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9818", "Riskware.Win32.FileTour.ednjdc", "Trj/GdSda.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1 ]
[ "Trojan", "architecture", "and", "capabilities", "This", "malware", "is", "written", "in", ".NET", "using", "the", "Xamarin", "environment", "for", "mobile", "applications", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 5, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "HW32.Packed.EA17", "Trojan.Tibs.BJ", "Worm/W32.Nuwar.31364", "I-Worm.Zhelatin.eo.n1", "Worm.Zhelatin.Win32.1360", "W32/Zhelatin.eo", "Trojan.Tibs.BJ", "W32/EmailWorm.KUL", "Trojan.Packed.13", "Trojan.Small-2710", "Email-Worm.Win32.Zhelatin.eo", "Trojan.Win32.Zhelatin.chkpnw", "I-Worm.Win32.Zhelatin.31364[h]", "PE:Worm.Mail.Win32.Zhelatin.eu!1074243991", "Trojan.Tibs.BJ", "Email-Worm.Win32.Zhelatin.eo", "Trojan.Tibs.BJ", "Trojan.Packed.140", "Trojan.Vxgame.z", "TROJ_FORUCON.BMC", "W32/Worm.YFRS-1205", "I-Worm/Zhelatin.cna", "W32/Tibs.EO@mm", "Worm[Email]/Win32.Zhelatin", "Worm.Zhelatin.eo.kcloud", "Trojan.Tibs.BJ", "Spammer:Win32/Clodpuntor.A", "Virus.Win32.Heur.d", "Trojan.Tibs.BJ", "Trojan.Vxgame.z", "Trojan-Downloader.Revelation.Tibs.B", "Worm.Win32.Zhelatin.Az", "Win32.Worm-email.Zhelatin.Hwwo", "Packer.Win32.Tibs", "Trojan.Tibs.BJ", "Downloader.Tibs.5.BO", "Trj/Spammer.ABX", "Win32/Trojan.be3" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.OnGameELXIAUS.Trojan", "Trojan.Win32.Buzy!O", "Backdoor.Tenrite.A4", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "TROJ_TENRITE_0000000.TOMA", "Trojan.Win32.Tens.as", "Trojan.Win32.Buzy.ikstz", "Trojan.Win32.A.Tens.13312", "TrojWare.Win32.Tenrite.A", "Trojan.Click2.12702", "BehavesLike.Win32.BadFile.lz", "Trojan.Win32.Tenrite", "TR/Buzy.3083.1", "Trojan/Win32.Tens", "Trojan.Buzy.DC0B", "Trojan.Win32.Tens.as", "Backdoor:Win32/Tenrite.A", "Win32/Tenrite.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Adware.BrowseFox.Win32.220089", "Trojan.Razy.D2BA2D", "Win32.Trojan.WisdomEyes.16070401.9500.9546", "Win.Trojan.Server-24", "Riskware.Win32.Server.ctchyk", "Program.Server.260", "BehavesLike.Win32.HLLP.fz", "SPR/SmallHTTP.F", "GrayWare[Server-Web]/Win32.SmallHTTP", "Riskware.SmallHTTP!", "not-a-virus:Server-Web.Win32.SmallHTTP" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "In", "our", "research", "we", "identified", "tens", "of", "fake", "applications", "that", "were", "infected", "with", "this", "malware", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/OnLineGames.pmt", "Trojan.Win32.OnLineGames.djktr", "W32.Gammima.AG", "Win32/Pebox.Y", "Trojan-GameThief.Win32.OnLineGames.ajibj", "Trojan.PWS.OnLineGames!PDfLLBwapmw", "Trojan.PWS.Wsgame.37257", "TR/PSW.OnlineGames.xbkj", "Trojan/PSW.OnLineGames.bylz", "PWS:Win32/DNFOnline.A", "Malware.Gammima!rem", "Win32/PSW.OnLineGames.PMT", "Trojan-GameThief.Win32.OnLineGames", "W32/Onlinegames.AJIBJ!tr", "PSW.OnlineGames3.ATWL", "Trj/CI.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "Nyetya", "attack", "was", "a", "destructive", "ransomware", "variant", "that", "affected", "many", "organizations", "inside", "of", "Ukraine", "and", "multinational", "corporations", "with", "operations", "in", "Ukraine." ]
[ 1, 9, 9, 16, 16, 16, 3, 11, 16, 16, 16, 4, 16, 16, 2, 16, 4, 12, 16, 16, 16, 2 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Win32.Pincav!O", "Trojan/Pincav.awm", "Win.Trojan.Pincav-604", "Trojan.Win32.Pincav.awn", "Trojan.Win32.Pincav.drkdnm", "Trojan.Win32.A.Pincav.1185236", "Troj.Clicker.W32.Small.kZ0E", "Trojan.Pincav.Win32.12742", "Trojan/Pincav.chh", "Trojan/Win32.Pincav", "Trojan.Graftor.D836A", "Trojan.Win32.Pincav.awn", "Backdoor:Win32/Losfondup.A", "Trojan/Win32.Pincav.R42635", "TScope.Trojan.Delf", "Backdoor.Losfondup!Ng6K/s6DvsI", "Trojan-PWS.Win32.Delf" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "If", "not", ",", "the", "application", "downloads", "a", "pack", "of", "exploits", "from", "the", "server", "and", "runs", "them", "one-by-one", "up", "until", "root", "is", "achieved", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Although", "the", "use", "of", "free", "web-services", "as", "a", "C2", "channel", "is", "not", "new,", "the", "use", "of", "a", "Github", "issue", "for", "a", "command/response", "channel", "was", "interesting." ]
[ 16, 16, 16, 16, 1, 9, 9, 9, 9, 9, 16, 16, 16, 16, 16, 16, 16, 5, 13, 11, 16, 9, 4, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.WinwebA.Trojan", "TrojanDropper.Henbang.A6", "Win32.Worm.AutoRun.c", "W32/Adware.PXAH-3010", "W32.Virut.CF", "Win32/SillyBHO.OL", "Worm.Win32.AutoRun.ibh", "Trojan.Win32.AutoRun.cqpmwl", "Trojan.MulDrop.32523", "BehavesLike.Win32.AdwareBetterSurf.gh", "W32/Adware.ACXN", "Win32.Virut.cr.61440", "TrojanDropper:Win32/Henbang.A", "Worm.Win32.AutoRun.ibh", "Win32.Trojan.Webdat.A", "Worm/Win32.AutoRun.R56346", "Backdoor.WinNT.PcClient", "Win32/Worm.FakeFolder.FF" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Instead", ",", "in", "Version", "0.0.0.2", ",", "EventBot", "dynamically", "loads", "its", "main", "module", "." ]
[ 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.RansomwareTQB.Trojan", "Trojan.ServStart.A", "Troj.W32.StartServ.tnEy", "Trojan/ServStart.io", "Win32.Trojan.ServStart.aj", "Backdoor.Trojan", "TROJ_SERVSTART_GJ1000AC.UVPN", "Trojan.Win32.StartServ.xer", "Trojan.Win32.Heuristic131.dcnfpc", "Trojan.Win32.Z.Servstart.196709.QO", "TrojWare.Win32.ServStart.CA", "Trojan.Mrblack.3", "Trojan.StartServ.Win32.135", "TROJ_SERVSTART_GJ1000AC.UVPN", "Trojan.Win32.ServStart", "Trojan.Zusy.D23C29", "Trojan.Win32.StartServ.xer", "Backdoor/Win32.Zegost.R117606", "Trojan.StartServ", "Win32/ServStart.IO", "Win32.Trojan.Startserv.Huzb", "Win32/Trojan.a35" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "As", "the", "Play", "Store", "has", "introduced", "new", "policies", "and", "Google", "Play", "Protect", "has", "scaled", "defenses", ",", "Bread", "apps", "were", "forced", "to", "continually", "iterate", "to", "search", "for", "gaps", "." ]
[ 16, 16, 5, 13, 16, 16, 16, 16, 16, 5, 13, 13, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Society.A", "W32/Society.DR", "Win32.Trojan.WisdomEyes.16070401.9500.9997", "W95.Sosume.3363", "PE_ALCAUL.H", "Win.Trojan.Alcaul-8", "Virus.Win32.Alcaul.h", "Win32.Society.A", "Virus.Win32.Alcaul.ue", "W32.Alcaul.h!c", "Win32.Society.A", "Virus.Win32.Alcaul.h", "Win32.Society.A", "Win95.Necromancer.3363", "PE_ALCAUL.H", "BehavesLike.Win32.Mental.xz", "W32/Risk.GISN-1213", "Win32/Alcaul.h", "W32/Alcaul.H", "W32/Alcaul.H!tr.dr", "Virus/Win32.Alcaul", "Win32.Society.A", "Backdoor:Win32/Society.A", "Virus.Win9x.Repus", "Win32.Society.A", "W32/Alcal.F" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "''", "The", "trojan", "calls", "this", "function", "with", "the", "action", "GLOBAL_ACTION_BACK", ",", "which", "equals", "the", "pressing", "of", "the", "back", "button", "on", "the", "device", ",", "thus", "canceling", "the", "opening", "of", "the", "anti-virus", "application", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan-Downloader.Win32.Dapato!O", "TrojanClicker.Baffec.A10", "Trojan.Downloader", "Downloader.Dapato.Win32.1470", "Trojan/Downloader.Dapato.fxd", "Win32.Trojan.WisdomEyes.16070401.9500.9610", "TROJ_DAPATO_CA08278A.TOMC", "Trojan-Downloader.Win32.Dapato.fxd", "Trojan.Win32.Dapato.bxnvih", "Trojan.Downloader-Dapato", "Win32.Trojan-downloader.Dapato.Srdc", "TrojWare.Win32.Downloader.Dapato.FXD", "Trojan.DownLoad3.2529", "TROJ_DAPATO_CA08278A.TOMC", "Trojan-Downloader.Win32.Dapato", "TrojanDownloader.Dapato.atd", "Trojan[Downloader]/Win32.Dapato", "TrojanClicker:Win32/Baffec.A", "Trojan.Delf.28", "Trojan-Downloader.Win32.Dapato.fxd", "Downloader/Win32.Dapato.R22620", "TrojanDownloader.Dapato", "Trojan.DL.Dapato!K0jxx5EHs9Y" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Ongoing", "reporting", "by", "ClearSky" ]
[ 16, 16, 16, 16 ]
[ "The", "users", "of", "this", "app", "include", "many", "well", "known", "celebrities", "who", "eventually", "post", "the", "dubbed", "videos", "on", "popular", "social", "networking", "platforms", "like", "Facebook", "and", "Twitter." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16, 4 ]
[ "To", "ensure", "you", "are", "fully", "protected", "against", "PHAs", "and", "other", "threats", ",", "we", "recommend", "these", "5", "basic", "steps", ":", "Install", "apps", "only", "from", "reputable", "sources", ":", "Install", "apps", "from", "a", "reputable", "source", ",", "such", "as", "Google", "Play", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 16 ]
[ "This", "is", "done", "by", "sending", "β€œ", "3458", "”", "in", "an", "SMS", "to", "the", "blocked", "device", "–", "this", "will", "revoke", "the", "administrator", "privileges", "from", "the", "Trojan", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Social", "networking", "sites", "Facebook", "and", "Twitter", "are", "primarily", "being", "used", "to", "spread", "a", "shortened", "URL", "using", "bit.ly", "service", "that", "points", "to", "a", "Google", "Cloud", "Server", "hosting", "the", "malicious", "payload", "with", ".COM", "or", ".EXE", "file", "extensions." ]
[ 1, 9, 16, 4, 16, 4, 16, 16, 16, 16, 16, 16, 16, 1, 9, 16, 1, 9, 16, 16, 16, 16, 5, 13, 13, 13, 16, 1, 9, 9, 9, 16, 1, 9, 9 ]
[ "This", "report", "documents", "some", "of", "our", "recent", "findings", "regarding", "its", "cryptography,", "network", "behavior,and", "banking", "targets." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 6, 14, 14, 4, 12 ]
[ "Earlier", "this", "year,", "the", "SpiderLabs", "team", "at", "Trustwave", "investigated", "a", "series", "of", "bank", "breaches", "originating", "from", "postSovietstates." ]
[ 0, 8, 8, 4, 12, 12, 3, 4, 16, 16, 16, 16, 16, 16, 16, 16, 2 ]
[ "Allows", "applications", "to", "access", "information", "about", "networks", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "This", "banking", "malware", "can", "steal", "login", "credentials", "from", "94", "different", "mobile", "banking", "apps." ]
[ 3, 11, 11, 16, 1, 9, 9, 16, 16, 16, 5, 13, 13 ]
[ "In", "a", "newly-identified", "campaign,", "FIN7", "modified", "their", "phishing", "techniques", "to", "implement", "unique", "infection", "and", "persistence", "mechanisms." ]
[ 16, 16, 16, 6, 14, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "We", "also", "discovered", "two", "previously", "unknown", "payloads.These", "payloads", "contained", "backdoors", "that", "we", "have", "named", "BYEBY", "and", "PYLOT", "respectively." ]
[ 16, 16, 16, 16, 16, 3, 11, 11, 16, 3, 16, 16, 16, 16, 3, 16, 3, 16 ]
[ "The", "malware", "uses", "several", "advanced", "techniques", "to", "hide", "its", "real", "intentions", "and", "makes", "it", "harder", "to", "detect", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "EventBot", "infected", "device", "to", "be", "sent", "to", "the", "C", "Information", "gathered", "about", "the", "infected", "device", "to", "be", "sent", "to", "the", "C2", "." ]
[ 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "RoomTap", ":", "silently", "answers", "a", "telephone", "call", "and", "stays", "connected", "in", "the", "background", ",", "allowing", "the", "caller", "to", "hear", "conversations", "within", "the", "range", "of", "the", "phone", "'s", "microphone", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "HummingBad", "does", "this", "by", "silently", "installing", "promoted", "apps", "on", "infected", "phones", ",", "defrauding", "legitimate", "mobile", "advertisers", ",", "and", "creating", "fraudulent", "statistics", "inside", "the", "official", "Google", "Play", "Store", "." ]
[ 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 13, 16 ]
[ "Our", "research", "showed", "that", "the", "spear", "phishing", "emails", "came", "from", "multiple", "compromised", "email", "accounts", "tied", "to", "a", "legitimate", "domain", "in", "North", "East", "Asia." ]
[ 16, 16, 16, 16, 1, 9, 9, 9, 16, 16, 16, 1, 9, 16, 16, 16, 16, 1, 9, 16, 2, 10, 10 ]
[ "A", "backdoor", "also", "known", "as:", "TrjnDwnldrMSIL.Ranos.A4", "MSIL.Trojan.Injector.q", "BKDR_RANOS.SM", "TrojWare.MSIL.TrojanDownloader.Small.DS", "Trojan.Starter.2890", "BKDR_RANOS.SM", "Trojan.Jintor.1", "TrojanDownloader:MSIL/Ranos.A", "Trojan.Win32.Fsysna", "MSIL/Injector.CKC!tr", "Trj/GdSda.A", "Win32/Trojan.e2d" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "La", "Poste", "-", "La", "Poste", "is", "a", "public", "limited", "postal", "service", "company", "in", "France", "." ]
[ 4, 12, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Some", "of", "the", "tactics", "used", "in", "APT", "attacks", "die", "hard." ]
[ 16, 16, 16, 16, 16, 16, 6, 14, 16, 16 ]
[ "Therefore", ",", "our", "team", "managed", "to", "generate", "the", "public", "key", "and", "craft", "an", "SMS", "message", "that", "activated", "the", "kill", "switch", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "It", "has", "not", "been", "confirmed", "whether", "these", "are", "from", "test", "devices", "or", "the", "devices", "of", "victims", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "How", "does", "Gooligan", "work", "?", "The", "infection", "begins", "when", "a", "user", "downloads", "and", "installs", "a", "Gooligan-infected", "app", "on", "a", "vulnerable", "Android", "device", "." ]
[ 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16 ]
[ "β€œ", "We", "’", "re", "appreciative", "of", "both", "Check", "Point", "’", "s", "research", "and", "their", "partnership", "as", "we", "’", "ve", "worked", "together", "to", "understand", "these", "issues", ",", "”", "said", "Adrian", "Ludwig", ",", "Google", "’", "s", "director", "of", "Android", "security", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 4, 12, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16, 16, 16, 16, 5, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9931", "W32/Trojan.MNLT-0240", "TR/Crypt.Xpack.rxrlk", "Trojan.Symmi.D136A2", "Win32/Trojan.859" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1 ]
[ "This", "new", "process", "downloads", "and", "executes", "the", "final", "stage:", "a", "Remote", "Administration", "Tool", "RAT", "based", "on", "Gh0st", "RAT." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 11, 11, 11, 16, 16, 3, 11 ]
[ "In", "2018", ",", "we", "have", "already", "observed", "a", "small", "but", "consistent", "number", "of", "samples", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Until", "mid-2015", ",", "Rotexy", "used", "a", "plain-text", "JSON", "format", "to", "communicate", "with", "its", "C", "&", "C", "." ]
[ 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan-Spy.Win32.TravNet.vmq", "Trojan.PWS.Spy.17858", "Trojan.Win32.Webprefix", "Trojan.Zusy.D124FE", "Trojan-Spy.Win32.TravNet.vmq", "TrojanDownloader:Win32/Travnet.B", "Trojan/Win32.Travnet.R99919", "Trojan.Farfli!4lB/nc8HSss", "W32/Farfli.LI", "TrojanSpy.TravNet", "Win32/Trojan.Multi.daf" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "oldest", "sample", "we", "found", "was", "created", "in", "2009,", "indicating", "this", "tool", "has", "been", "in", "use", "for", "almost", "seven", "years." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 0, 16, 16, 3, 16, 16, 16, 16, 16, 0, 8, 8 ]
[ "Users", "should", "adopt", "best", "practices", ",", "while", "organizations", "should", "ensure", "that", "they", "balance", "the", "need", "for", "mobility", "and", "the", "importance", "of", "security", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Earlier", "this", "year,", "we", "talked", "about", "how", "cybercriminals", "took", "advantage", "of", "the", "popularity", "of", "Pokemon", "Go", "to", "launch", "their", "own", "malicious", "apps." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 16, 16, 16, 3, 11, 11 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Trojan.Win32.Krypt.drmwlo", "BehavesLike.Win32.Backdoor.gh", "TR/Krypt.503296", "Trojan.MSIL.Bladabindi.1", "Trj/CI.A", "Trojan.VB.Inject", "MSIL/Bbindi.W!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Mozilla", "products", "that", "don't", "contain", "the", "PDF", "Viewer,", "such", "as", "Firefox", "for", "Android,", "are", "not", "vulnerable." ]
[ 4, 16, 16, 16, 16, 16, 1, 9, 16, 16, 5, 13, 13, 16, 16, 7 ]
[ "we", "are", "currently", "working", "with", "Adobe", "to", "confirm", "the", "CVE", "number", "for", "this", "exploit" ]
[ 16, 16, 16, 16, 16, 4, 16, 16, 16, 7, 15, 16, 16, 3 ]
[ "The", "malware", "likely", "required", "a", "significant", "amount", "of", "time", "and", "knowledge", "to", "create." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Crack2000.Win32.1", "Trojan/.hack", "Win.Trojan.HackDream-1", "Trojan.IRC.Hack", "Trojan.Win32.Hack.fvvy", "TrojWare.IRC.Hack.A", "Trojan.IrcHack", "BehavesLike.Win32.Dropper.tc", "Trojan/IRC.Hack", "JS/IRC.bdmlu", "Trojan/IRC.Hack", "Trojan.Win32.IRCHack.546218", "Trojan.IRC.Hack", "Trojan.2000Cracks", "IRC/Hack.A", "IRC/Hack.A!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "addition", "of", "DNS-based", "exfiltration", "is", "new", "for", "this", "malware", "family;", "however,", "other", "POS", "malware", "families", "such", "as", "BernhardPOS", "and", "FrameworkPOS", "have", "used", "this", "technique", "in", "the", "past." ]
[ 16, 16, 16, 7, 15, 16, 16, 16, 16, 3, 11, 16, 16, 3, 11, 11, 16, 16, 3, 16, 3, 16, 16, 16, 16, 16, 0, 8 ]
[ "How", "does", "the", "malware", "work", "without", "code", "for", "these", "key", "components", "?", "As", "is", "characteristic", "for", "obfuscated", "threats", ",", "the", "malware", "has", "encrypted", "binary", "code", "stored", "in", "the", "Assets", "folder", ":", "When", "the", "malware", "runs", "for", "the", "first", "time", ",", "the", "static", "block", "of", "the", "main", "class", "is", "run", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "]", "top/", "Oct", "23", ",", "2017", "hxxp", ":", "//online.bankaustria.at.id8817469", "[", "." ]
[ 9, 9, 16, 16, 16, 16, 1, 9, 9, 9, 9 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan-GameThief.Win32.OnLineGames!O", "Trojan.OnLineGames.Win32.215966", "Trojan.Heur.RP.cmIfaG!Q79i", "TSPY_ONLINEG.TGV", "Win32.Trojan.WisdomEyes.16070401.9500.9941", "Win32/Zuten.DK", "TSPY_ONLINEG.TGV", "Trojan-GameThief.Win32.OnLineGames.afmb", "Trojan.Win32.OnLineGames.cvmqrs", "Troj.GameThief.W32.OnLineGames.afmb!c", "TrojWare.Win32.Magania.~D", "Trojan.PWS.Gamania.9849", "BehavesLike.Win32.Sytro.nc", "Virus.Win32.Onlinegames.BBH", "TrojanDownloader.Small.unq", "Trojan[GameThief]/Win32.OnLineGames", "Trojan:Win32/Hookja.A", "Trojan-GameThief.Win32.OnLineGames.afmb", "Trojan/Win32.OnlineGameHack.R70066", "Trojan.Win32.OnlineGames.10068", "Win32.Trojan-gamethief.Onlinegames.Wvkq", "W32/Onlinegames.KKW!tr.pws" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "DroidJack", "RAT", "starts", "capturing", "sensitive", "information", "like", "call", "data", ",", "SMS", "data", ",", "videos", ",", "photos", ",", "etc", "." ]
[ 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "One", "of", "the", "most", "profitable", "cyber", "crimes", "in", "recent", "years", "is", "ATM", "robbery,", "where", "the", "cyber", "criminals", "extract", "cash", "directly", "from", "automated", "teller", "machines", "that", "have", "already", "been", "infected", "with", "malware,", "causing", "millions", "of", "dollars", "in", "loss", "for", "the", "banks", "worldwide." ]
[ 16, 16, 16, 16, 16, 6, 14, 16, 5, 13, 16, 5, 16, 16, 16, 6, 14, 16, 16, 16, 16, 5, 13, 13, 15, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 4, 2 ]
[ "A", "backdoor", "also", "known", "as:", "Ransome.Crowti.OB4", "Tool.Patcher.Win32.14244", "Trojan/Filecoder.CryptoWall.d", "Win32.Trojan.Filecoder.h", "Ransom.Cryptodefense", "Ransom_HPCRYPTESLA.SM2", "Trojan.Win32.Encoder.dytusk", "Trojan.Encoder.514", "Win32.Malware!Drop", "Ransom_HPCRYPTESLA.SM2", "Variant.Symmi.bop", "TR/AD.Crowti.Y.580", "Packed.Win32.Tpyn", "Win32.Trojan-Ransom.TeslaCrypt.N", "Win-Trojan/Inject.249861", "Win32.Malware!Drop", "Win32/Filecoder.CryptoWall.D", "Trojan.Filecoder!cG6QHMIV+ig", "Trojan.Win32.Filecoder" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Adware.DLBoost.A4", "Win32.Trojan.WisdomEyes.16070401.9500.9658", "Exploit.Win32.Simadona.b", "Exploit.Win32.Simadona.eqnhht", "Trojan.RoboInstall.6", "BehavesLike.Win32.Backdoor.wc", "Trojan.Win32.HackTool", "HackTool:Win32/Skipun.A!bit", "Exploit.Win32.Simadona.b", "PUP/Win32.DLBoost.C1760189", "Win32/Trojan.Exploit.09b" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Over", "the", "course", "of", "the", "last", "year,", "ESET", "has", "detected", "and", "analyzed", "several", "instances", "of", "malware", "used", "for", "targeted", "espionage", "–", "dubbed", "SBDH", "toolkit." ]
[ 16, 16, 16, 16, 0, 8, 8, 4, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 6, 14, 16, 3, 11, 11 ]
[ "Mitigations", "XLoader", "will", "not", "download", "malicious", "apps", "if", "the", "Android", "device", "uses", "a", "mobile", "data", "connection", "." ]
[ 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "This", "article", "discusses", "a", "group", "of", "PlugX", "samples", "which", "we", "believe", "are", "all", "used", "by", "the", "same", "attackers,", "and", "the", "measures", "they", "have", "taken", "to", "attempt", "to", "bypass", "security", "mechanisms." ]
[ 16, 16, 16, 16, 12, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 6, 14, 14, 16, 16, 16, 16, 16, 16, 16, 1, 9, 9, 9, 9 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Win32.Obfuscated.en!O", "Trojan.Obfuscated.Win32.70479", "Troj.W32.Obfuscated.tpfc", "Trojan/Obfuscated.a1", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Adware.Lop", "Win.Trojan.Obfus-22", "Trojan.Win32.Obfuscated.en", "Virus.Win32.Sality.bgiylc", "Trojan.Win32.Obfuscated.3771904", "TrojWare.Win32.Obfuscated.en", "Trojan.Packed.149", "BehavesLike.Win32.Dropper.jh", "Trojan-Downloader.Win32.Swizzor", "Trojan/Win32.Obfuscated", "Win32.Troj.ObfuscatedT.cz.545792", "Trojan:Win32/C2Lop.C", "Adware.Lop-Variant", "Trojan.Win32.Obfuscated.en", "MalwareScope.Trojan-Downloader.Obfuscated.2", "Win32/Obfuscated.A1", "W32/Swizzor.B!tr", "Win32/Trojan.Obfus.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Bouncing", "Golf", "’", "s", "operators", "also", "try", "to", "cover", "their", "tracks", "." ]
[ 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "PACKING", "In", "addition", "to", "implementing", "custom", "obfuscation", "techniques", ",", "apps", "have", "used", "several", "commercially", "available", "packers", "including", ":", "Qihoo360", ",", "AliProtect", "and", "SecShell", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 5, 16, 5, 16 ]
[ "We", "are", "uncertain", "of", "its", "objectives", "but", "estimate", "it", "is", "criminally", "motivated." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "new", "text", "(", "in", "Chinese", ",", "about", "relations", "between", "China", ",", "Japan", "and", "the", "disputed", "β€œ", "Senkaku", "Islands", "/", "Diaoyudao", "Islands", "/", "Diaoyutai", "Islands", "”", ")", "is", "shown", "to", "the", "victims", "and", "reads", "as", "following", ":", "When", "opened", "in", "a", "browser", ",", "this", "is", "what", "the", "command-and-control", "index", "page", "looks", "like", ":", "The", "text", "on", "the", "top", "means", "β€œ", "Title", "Title", "Title", "”", "in", "Chinese", ",", "while", "the", "other", "strings", "appear", "to", "be", "random", "characters", "typed", "from", "the", "keyboard", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "These", "attacks", "are", "themed", "around", "Middle", "Eastern", "political", "issues", "and", "the", "motivation", "appears", "to", "relate", "to", "espionage,", "as", "opposed", "to", "opportunistic", "or", "criminal", "intentions." ]
[ 16, 1, 16, 16, 16, 2, 10, 1, 9, 16, 16, 16, 16, 16, 16, 16, 6, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "BackDoor-CUR.svr", "Win32.Backdoor.Detarmal.b", "Backdoor.Trojan", "Backdoor.Win32.Delf.NBJ", "BackDoor.Cae.7", "BehavesLike.Win32.Upatre.qh", "Backdoor:Win32/Detarmal.A", "Win32/Delf.NBJ", "W32/Detarmal.A!tr", "Bck/Furaxdoor.B", "Backdoor.Win32.Detarmal.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "TROJ_GE.71380BE1", "Trojan.Java.Crypt" ]
[ 16, 3, 16, 16, 16, 1, 1 ]
[ "However", "in", "this", "campaign,", "the", "binary", "payload,", "which", "was", "later", "found", "to", "be", "a", "NanoCore", "RAT", "client,", "is", "actually", "embedded", "in", "the", "obfuscated", "HTA." ]
[ 16, 16, 16, 6, 3, 11, 11, 16, 16, 16, 16, 16, 16, 3, 11, 11, 11, 16, 16, 16, 16, 16, 16, 16 ]
[ "This", "event", "triggers", "archive", "downloading", "thread", "." ]
[ 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "HW32.Packed.5B76", "Trojan.Win32.Yakes.vpjr", "Trojan.Fakealert.49835", "BehavesLike.Win32.PUPXAX.gc", "W32/Trojan.TMDY-2947", "TR/Crypt.ZPACK.mnboo", "Trojan.Razy.D13B86", "Trojan.Win32.Yakes.vpjr", "W32/Kryptik.EZWB!tr", "Trj/GdSda.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "LeakerLocker", "claims", "to", "have", "made", "an", "unauthorized", "backup", "of", "a", "phone's", "sensitive", "information", "that", "could", "be", "leaked", "to", "a", "user's", "contacts", "unless", "it", "receives", "a", "modest", "ransom." ]
[ 3, 16, 16, 16, 16, 16, 1, 9, 16, 16, 1, 9, 9, 16, 16, 16, 1, 9, 9, 9, 9, 9, 16, 16, 16, 16, 16 ]
[ "We", "have", "made", "the", "connection", "to", "Bitter", "APT", "through", "tactics,", "techniques,", "and", "procedures", "TTPs", "that", "have", "been", "observed", "in", "other", "publications,", "such", "as", "the", "use", "of", "Microsoft", "Office", "exploits", "through", "Excel", "files,", "and", "the", "use", "of", "CHM", "and", "Windows", "Installer", "MSI", "files." ]
[ 16, 16, 16, 16, 16, 16, 6, 14, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 11, 16, 1, 9, 16, 16, 16, 16, 5, 16, 5, 13, 13, 1 ]
[ "The", "setup", "code", "receives", "an", "installation", "command", "from", "the", "previous", "stage", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "It", "’", "s", "not", "enough", "for", "this", "malware", "family", "to", "swap", "just", "one", "innocent", "application", "with", "an", "infected", "double", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Pawn", "Storm", "is", "an", "active", "cyber", "espionage", "actor", "group", "that", "has", "been", "very", "aggressive", "and", "ambitious", "in", "recent", "years." ]
[ 6, 14, 16, 16, 16, 6, 14, 14, 14, 15, 16, 16, 16, 16, 16, 16, 16, 0, 8 ]
[ "Telegram", "using", "IP", "address", "from", "Spain." ]
[ 5, 16, 1, 9, 16, 2 ]
[ "However", ",", "this", "is", "not", "a", "genuine", "β€œ", "Google", "Play", "Protect", "”", "screen", ";", "instead", "it", "gives", "the", "app", "all", "the", "permissions", "it", "needs", "while", "simultaneously", "disabling", "the", "actual", "Google", "Play", "Protect", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 13, 16 ]
[ "Today", "RSA", "is", "reporting", "GlassRAT,", "a", "previously", "undetectable", "Remote", "Access", "Tool", "RAT", "which", "was", "discovered", "by", "the", "RSA", "Incident", "Response", "Team", "and", "investigated", "by", "RSA", "Research", "during", "an", "engagement", "with", "a", "multi-national", "enterprise." ]
[ 16, 4, 16, 16, 3, 16, 16, 16, 3, 11, 11, 11, 16, 16, 16, 16, 16, 4, 12, 12, 12, 16, 16, 16, 4, 12, 16, 16, 16, 16, 16, 4, 12 ]
[ "A", "backdoor", "also", "known", "as:", "Worm.Nanspy", "Worm.Nanspy.Win32.9", "Win32.Trojan.WisdomEyes.16070401.9500.9990", "W32/Nanspy.TXTE-7172", "W32.Kassbot.B", "Win.Worm.Nanspy-1", "Net-Worm.Win32.Nanspy.e", "Trojan.Win32.Nanspy.fwie", "W32.W.Bagle.kZt7", "Heur.Packed.MultiPacked", "BackDoor.Pyev", "BehavesLike.Win32.HLLPPhilis.nc", "Trojan-Dropper.Delf", "W32/Nanspy.O", "I-Worm/Nanspy.d", "WORM/Nanspy.E", "Backdoor:Win32/Nanspy.D", "Worm.Win32.Net-Nanspy.34368.B", "Trojan/Win32.Lydra.R96925", "Net-Worm.Win32.Nanspy.e", "Worm.Nanspy" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "infected", "application", "contains", "its", "payload", "inside", "the", "DEX", "file", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "For", "the", "past", "five", "months", ",", "Check", "Point", "researchers", "have", "quietly", "observed", "the", "China-based", "advertising", "company", "behind", "HummingBad", "in", "several", "ways", ",", "including", "by", "infiltrating", "the", "command", "and", "control", "servers", "it", "uses", "." ]
[ 16, 16, 16, 16, 16, 16, 4, 12, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "As", "such,", "this", "new", "attack", "represents", "a", "dangerous", "new", "hybrid", "combining", "the", "work", "of", "a", "notorious", "cyber", "criminal", "gang", "with", "Chinese", "cyber", "espionage", "group", "to", "attack", "a", "financial", "services", "firm." ]
[ 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 6, 14, 14, 16, 6, 14, 14, 14, 16, 1, 16, 4, 12, 12 ]
[ "FireEye", "recently", "discovered", "a", "new", "variant", "of", "a", "point", "of", "sale", "POS", "malware", "family", "known", "as", "NewPosThings." ]
[ 4, 16, 16, 16, 3, 11, 11, 11, 11, 11, 11, 11, 11, 11, 16, 16, 3 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/W32.Imiserv.245760", "Trojan.Imiserv.c", "Trojan/Imiserv.c", "Trojan.Win32.Malware.1", "Win32/Imiserv.C", "Adware.IEPlugin", "Trojan.Win32.Imiserv.c", "Trojan.Win32.Imiserv.B", "TrojWare.Win32.Imiserv.C", "Trojan.Win32.Imiserv.c", "TROJ_IMISERVER.A", "Trojan.Win32.Imiserv!IK", "Trojan.Win32.Imiserv.B", "Win-Trojan/Imiserv.245760", "Trojan.Win32.Imiserv.c", "Trojan.Imiserv.G", "Trojan.Win32.Imiserv", "W32/Imiserv.C!tr", "Trj/Imiserv.M" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan-Clicker.Win32.VB!O", "Trojan.VB.al3", "Trojan.VB.Win32.56708", "W32/Clicker.VB.fli", "TROJ_LNKIEB.SMI", "Win32/VB.BHE", "TROJ_LNKIEB.SMI", "Win.Trojan.Clicker-4258", "Trojan-Clicker.Win32.VB.fli", "Trojan.Win32.VB.cnwqrx", "Trojan.Win32.A.Clicker.36892", "Win32.Trojan.Vb.Angm", "TrojWare.Win32.Injector.AMXL", "TrojanClicker.VB.ffy", "TR/Lnkiebes.A.6", "Trojan[Clicker]/Win32.VB", "Trojan.Buzy.D6DC", "Trojan-Clicker.Win32.VB.fli", "Trojan:Win32/Lnkiebes.A", "Trojan/Win32.VB.R5515", "Trojan.VBRA.03765", "Win32/Spy.Chekafev.AD", "Trojan.CL.VB!fBU5Dy6sJXo", "Trojan-Clicker.Win32.VB", "W32/VB.F!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]