tokens
sequencelengths
2
296
ner_tags
sequencelengths
2
296
[ "Philadelphia", "has", "many", "features,", "including", "the", "ability", "to", "generate", "PDF", "reports", "and", "charts", "of", "victims", "to", "track", "the", "campaigns,", "as", "well", "as", "the", "ability", "to", "plot", "victims", "around", "the", "world", "using", "Google", "Maps." ]
[ 3, 16, 16, 16, 16, 16, 16, 1, 9, 9, 9, 9, 9, 9, 16, 16, 16, 16, 6, 16, 16, 16, 16, 16, 16, 16, 4, 16, 16, 16, 16, 5, 13 ]
[ "Is", "UrlZone", "still", "a", "threat", "and", "if", "so,", "how", "has", "it", "changed?" ]
[ 16, 3, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16 ]
[ "In", "this", "version", "of", "Rotexy", ",", "dynamic", "generation", "of", "lowest-level", "domains", "was", "not", "used", "." ]
[ 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "JPCERT/CC", "has", "been", "observing", "attacks", "using", "Datper", "since", "around", "June", "2016." ]
[ 3, 16, 16, 16, 1, 16, 3, 16, 16, 0, 8 ]
[ "A", "backdoor", "also", "known", "as:", "TrojanDropper.Dapato.S8172", "TROJ_INDIGOROSE_FC140186.UVPM", "TROJ_INDIGOROSE_FC140186.UVPM", "Trojan.Win32.IndigoRose.eujbip", "Trojan.Win32.Z.Indigorose.2334813", "Trojan.DownLoader21.23836", "BehavesLike.Win32.BadFile.vh", "TR/Dldr.IndigoRose.xrkh", "TrojanDownloader:Win32/Inros.A", "Downloader.AdLoad", "Trj/CI.A", "Win32/TrojanDownloader.IndigoRose.AI", "Trojan-Downloader.Win32.Indigorose", "Win32/Trojan.b3d" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "VB:Trojan.Valyria.1019", "O97M.Dropper.BS", "VB:Trojan.Valyria.1019", "VB:Trojan.Valyria.1019", "Trojan.Ole2.Vbs-heuristic.druvzi", "VB:Trojan.Valyria.1019", "VB:Trojan.Valyria.1019", "HEUR_VBA.D", "TrojanDownloader:O97M/Crosspim.A", "VB:Trojan.Valyria.D3FB", "VB:Trojan.Valyria.1019", "VBA/TrojanDownloader.DZN!tr", "virus.office.qexvmc.1075" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "System", "applications", "with", "root", ",", "by", "contrast", ",", "have", "super-user", "permissions", "that", "allow", "them", "to", "break", "out", "of", "such", "sandboxes", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Unit", "42", "has", "recently", "discovered", "a", "new", "keylogger,", "named", "NexusLogger,", "being", "used", "in", "attempted", "unsuccessful", "attacks", "against", "Palo", "Alto", "Networks", "customers." ]
[ 4, 12, 16, 16, 16, 16, 16, 3, 16, 3, 16, 16, 16, 16, 16, 16, 16, 4, 12, 12, 12 ]
[ "They", "seem", "to", "use", "the", "same", "technique", "of", "mimicking", "a", "website", "associated", "with", "well-known", "software", "like", "Notepad++", "and", "Blender", "3D." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 5, 16, 5, 16, 5, 13 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Razy.D39F0E", "Win32.Trojan.WisdomEyes.16070401.9500.9998", "Trojan.DownLoader25.65030", "BehavesLike.Win32.Trojan.bh", "TrojanDropper:MSIL/Muldalun.A!bit" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1 ]
[ "In", "May", "2017,", "Palo", "Alto", "Networks", "Unit", "42", "identified", "a", "limited", "spear", "phishing", "campaign", "targeting", "various", "individuals", "across", "the", "world." ]
[ 16, 0, 8, 4, 12, 12, 12, 12, 16, 16, 16, 6, 14, 14, 16, 16, 16, 16, 2, 10 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Win32.Androm.drayhs", "Trojan.DownLoader18.10874", "Downloader.Banload.Win32.64034", "Trojan/Inject.axyw", "TrojanDownloader:Win32/BrobanLaw.A", "Trojan.Strictor.D15B7B", "Trojan/Win32.MDA.R160449", "Trojan.Banker.IGF" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.LibarokI.Trojan", "Trojan/Scar.ejki", "Win32.Trojan.WisdomEyes.16070401.9500.9609", "Trojan.Badlib", "Win.Downloader.Delf-12262", "Trojan.Win32.Scar.256000.B", "Trojan.DownLoader4.22959", "Trojan.Scar.Win32.50666", "Backdoor.Win32.Bafruz", "Backdoor:Win32/Bafruz.C", "Trojan.Delf.01357", "Bck/Koobface.AA" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Bagsu.S31234", "Trojan/IRCBot.nhr", "BKDR_IRCBOT.SMB", "Backdoor.IRC.Bot", "BKDR_IRCBOT.SMB", "BehavesLike.Win32.Dropper.cm", "Backdoor.Win32.Ursap", "Backdoor.Athena", "Win32/IRCBot.NHR" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "It", "is", "mainly", "an", "information", "stealer", "and", "malware", "downloader", "network", "which", "installs", "other", "malware", "on", "infected", "machines." ]
[ 16, 16, 16, 16, 1, 9, 16, 3, 11, 11, 16, 16, 16, 3, 16, 5, 13 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.PSW.FakeAIM.C", "Trojan.PSW.FakeAIM.C", "Trojan.PSW.FakeAIM.C", "W32/PWS.BXQR-8711", "Infostealer.Snatch", "Trojan.PSW.FakeAIM.C", "Trojan-PSW.Win32.FakeAIM.d", "Trojan.PSW.FakeAIM.C", "Trojan.Win32.FakeAIM.dgtt", "Trojan.Win32.PSWFakeAIM.78848", "Troj.PSW32.W.FakeAIM.c!c", "Trojan.PSW.FakeAIM.C", "TrojWare.Win32.PSW.FakeAIM.D", "Trojan.PSW.FakeAIM.C", "Trojan.PWS.Fakeaim", "Trojan.FakeAIM.Win32.6", "BehavesLike.Win32.Trojan.lc", "W32/Pws.TXC", "Trojan/PSW.FakeAIM.c", "TR/PSW.FakeAIM.C.1", "Trojan[PSW]/Win32.FakeAIM", "PWS:Win32/FakeAIM.C", "Trojan-PSW.Win32.FakeAIM.d", "Trojan/Win32.Xema.R89227", "TScope.Trojan.VB", "Win32/PSW.FakeAIM.D", "W32/AIMFake.C!tr.pws", "Win32/Trojan.PSW.ee5" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "On", "March", "9", "2016,", "Cyphort", "Labs", "discovered", "an", "infection", "on", "a", "porn", "site", "keng94dotcom", "redirecting", "visitors", "to", "an", "exploit", "kit", "and", "installing", "a", "Ransom", "Locker." ]
[ 16, 0, 8, 8, 4, 12, 16, 16, 1, 16, 16, 1, 9, 9, 16, 16, 16, 16, 3, 11, 16, 16, 16, 3, 11 ]
[ "One", "good", "thing", "about", "having", "a", "lot", "of", "Facebook", "friends", "is", "that", "you", "simply", "act", "as", "a", "honey", "pot", "when", "your", "friends", "click", "on", "malicious", "things." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 4, 12, 16, 16, 16, 16, 16, 16, 1, 9, 9, 16, 16, 16, 16, 16, 3, 16 ]
[ "The", "command", "&", "control", "server", "(", "C", "&", "C", "server", ")", "returns", "the", "URL", "to", "click", "along", "with", "a", "very", "long", "list", "of", "additional", "parameters", "in", "JSON", "format", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Screenshots", ":", "captures", "an", "image", "of", "the", "current", "screen", "via", "the", "raw", "frame", "buffer", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Going", "one", "step", "further", ",", "we", "rebuilt", "the", "malware", "to", "execute", "the", "apparent", "functionality", "of", "generating", "a", "payload", ",", "but", "discovered", "that", "the", "APK", "stored", "in", "the", "/res/raw/", "directory", "is", "empty", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "malicious", "script", "fingerprints", "the", "victim's", "machine", "and", "can", "receive", "any", "command", "that", "will", "run", "via", "PowerShell." ]
[ 1, 9, 9, 16, 5, 13, 13, 16, 16, 16, 16, 1, 9, 9, 9, 9, 9 ]
[ "Instead,", "an", "accurate", "assessment", "is", "that", "a", "previously", "active", "Windows", "botnet", "is", "spreading", "a", "Mirai", "bot", "variant." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 16, 3, 11, 11 ]
[ "ESET", "researchers", "analyzed", "a", "preference", "file", "that", "was", "used", "to", "compromise", "the", "system", "when", "Uploader!", "is", "launched." ]
[ 4, 12, 16, 16, 16, 16, 15, 16, 16, 16, 1, 16, 5, 16, 5, 16, 16 ]
[ "These", "campaigns", "not", "only", "represent", "an", "uptick", "in", "our", "observed", "instances", "of", "Kronos", "banker", "but", "also", "a", "new", "application", "of", "the", "malware", "that", "was", "first", "introduced", "in", "June", "2014", "and", "that", "we", "most", "recently", "described", "in", "relation", "to", "campaigns", "targeting", "Canada." ]
[ 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 0, 8, 16, 16, 16, 16, 16, 16, 16, 16, 16, 6, 16, 2 ]
[ "The", "Anthem", "attack", "is", "only", "one", "of", "multiple", "campaigns", "that", "Symantec", "has", "attributed", "to", "this", "group." ]
[ 16, 4, 1, 16, 16, 16, 16, 6, 14, 16, 6, 16, 16, 16, 16, 6 ]
[ "This", "blog", "post", "describes", "details", "that", "we", "discovered", "during", "our", "analysis", "of", "malware", "that", "focuses", "on", "a", "specific", "country", "—", "Libya." ]
[ 16, 4, 12, 16, 16, 15, 16, 16, 16, 16, 16, 16, 3, 15, 16, 16, 16, 16, 16, 16, 2 ]
[ "This", "Zscaler", "ThreatLabz", "research", "article", "investigates", "the", "latest", "malware", "campaign", "of", "DBatLoader,", "which", "is", "being", "used", "by", "threat", "actors", "to", "target", "various", "businesses", "in", "European", "countries", "with", "Remcos", "RAT", "and", "Formbook." ]
[ 16, 4, 12, 12, 16, 16, 16, 16, 6, 14, 16, 3, 16, 16, 16, 16, 16, 6, 14, 16, 16, 16, 4, 16, 2, 10, 16, 3, 11, 16, 3 ]
[ "The", "Lookout", "Threat", "Intelligence", "team", "is", "increasingly", "seeing", "the", "same", "tradecraft", ",", "tactics", ",", "and", "procedures", "that", "APT-C-23", "favors", "being", "used", "by", "other", "actors", "." ]
[ 16, 4, 12, 12, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "VBA.Trojan.Obfuscated.af", "W2KM_DLOADR.YYSQK", "Trojan.Ole2.Vbs-heuristic.druvzi", "W2KM_DLOADR.YYSQK", "Trojan:X97M/ShellHide.C", "virus.office.obfuscated.1" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1 ]
[ "We", "detect", "the", "malware", "used", "in", "this", "attack", "as", "“", "Backdoor.AndroidOS.Chuli.a", "”", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.HfsAutoB.F21F", "W32/Trojan2.MVJQ", "Trojan.Win32.Ace.cxham", "Win32.Backdoor.Ace.ciih", "Trojan.DownLoader1.8121", "Backdoor.Ace.Win32.86", "BehavesLike.Win32.Dropper.hh", "W32/Trojan.QDLI-0337", "Trojan[Backdoor]/ASP.Ace", "TrojanDownloader:Win32/Pluzoks.A", "Backdoor/Win32.Ace.C78643", "Backdoor.ASP.Ace", "Adware.Ezipop", "Win32/Adware.AdTrigger", "W32/ASP_Ace.MF!tr.bdr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "We", "were", "a", "bit", "disappointed", "that", "we", "did", "not", "see", "traces", "of", "a", "true", "privilege", "escalation", "exploit", "after", "all", "this", "deobfuscation", "work", ",", "but", "it", "seems", "these", "FinFisher", "samples", "were", "designed", "to", "work", "just", "using", "UAC", "bypasses", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 7, 15, 15, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Worm/W32.Rahima.28672", "Win32.Trojan.WisdomEyes.16070401.9500.9607", "W32/Rahima.QDHZ-4096", "W32.Fourseman.B@mm", "P2P-Worm.Win32.Rahima", "Trojan.Win32.Rahima.enoe", "Worm.Win32.P2P-Rahima.28672", "W32.W.Rahima!c", "Worm.Rahima", "W32/Rahima.A", "I-Worm/Himera.i", "WORM/Rahima.A", "Worm[P2P]/Win32.Rahima", "P2P-Worm.Win32.Rahima", "Worm.Rahima", "Win32.Worm-p2p.Rahima.Pefs", "Worm.P2P.Rahima", "W32/Himera.J!worm.p2p", "Win32/Worm.IM.a16" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "use", "of", "Lua", "modules,", "which", "we'll", "discuss", "later,", "is", "a", "technique", "that", "has", "previously", "been", "used", "by", "Flamer." ]
[ 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 6 ]
[ "In", "August", "2012,", "an", "attack", "campaign", "known", "as", "Shamoon", "targeted", "a", "Saudi", "Arabian", "energy", "company", "to", "deliver", "a", "malware", "called", "Disttrack." ]
[ 16, 0, 8, 16, 6, 14, 16, 16, 6, 16, 16, 2, 10, 4, 12, 16, 16, 16, 3, 16, 3 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan-Downloader.Win32.Geral!O", "TrojanDownloader.Begseabug.A5", "Trojan/Downloader.Geral.aazb", "Trojan.Graftor.D540C", "W32.SillyDC", "Win.Trojan.Downloader-22789", "Trojan-Downloader.Win32.Geral.aazb", "Trojan.Win32.Geral.dkhaf", "Trojan.Win32.A.Downloader.50176.GE", "Troj.Downloader.W32.Geral.aazb!c", "Trojan.Swizzor.18871", "Downloader.Geral.Win32.7037", "BehavesLike.Win32.Backdoor.ph", "Trojan-Downloader.Win32.Geral", "TrojanDownloader.Geral.cjc", "TrojanDownloader:Win32/Begseabug.A", "Trojan-Downloader.Win32.Geral.aazb", "Trojan/Win32.Scar.R4495", "TrojanDownloader.Geral", "Trojan.KillAV", "Win32.Trojan-downloader.Geral.Sqtn", "Trojan.DL.Geral!qBECnW5XLLM", "W32/Pincav.SNS!tr", "Win32/Trojan.836" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Other", "configuration", "data", "is", "located", "elsewhere", ",", "and", "some", "of", "it", "can", "been", "seen", "here", ":", "The", "encrypted", "library", "path", "The", "output", "folder", "on", "the", "device", "for", "the", "dropped", "library", "The", "name", "of", "the", "library", "after", "it", "is", "loaded", "eventBot", "name", "string", "Version", "number", "A", "string", "used", "as", "an", "RC4", "key", ",", "both", "for", "decrypting", "the", "library", "and", "as", "a", "part", "of", "the", "network", "data", "encryption", "(", "hasn", "’", "t", "changed", "from", "the", "previous", "version", ")", "The", "C2", "URLs", "A", "randomized", "class", "name", "using", "the", "device", "’", "s", "accessibility", "services", "EventBot", "extracted", "configuration", "Part", "of", "the", "extracted", "configuration", "of", "the", "new", "version", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "This", "indicates", "that", "the", "app", "tries", "to", "hide", "itself", "from", "any", "anti-PHA", "systems", "that", "look", "for", "a", "specific", "app", "process", "name", "or", "does", "not", "have", "the", "ability", "to", "scan", "the", "memory", "of", "the", "system_server", "process", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.HfsAdware.1F0C", "Adware.SearchSafer.A", "Adware.OutBrowse/Variant", "Win32.Trojan.WisdomEyes.16070401.9500.9922", "Downloader.Sesafer", "TROJ_GE.24FE3DBE", "not-a-virus:Downloader.Win32.SearchSafe.a", "Adware.SearchSafer.A", "Trojan.Nsis.SearchSafe.dyoiec", "Adware.SearchSafer.A", "Adware.Downware.3008", "Downloader.SearchSafe.Win32.2", "TROJ_GE.24FE3DBE", "TR/AD.Uascape.myjsl", "Trojan:Win32/Uascape.A", "Adware.SearchSafer.A", "not-a-virus:Downloader.Win32.SearchSafe.a", "Adware.SearchSafer.A", "Downloader.SearchSafe", "PUP.Optional.SearchSafer", "PUA.Downloader!" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.ScaraNV.Trojan", "Trojan/W32.Scar.1611453", "Trojan.Win32.Scar!O", "TrojanDropper.Scudy.S12799", "Trojan.Scar.Win32.11534", "Trojan.Zusy.D382CD", "WORM_SCUDY.SMA", "WORM_SCUDY.SMA", "Trojan.Win32.A.Scar.876573", "Trojan:W32/Scar.O", "Trojan.Click1.19227", "Trojan/Scar.flx", "TrojanDropper:Win32/Scudy.A", "Trojan/Win32.Scar.R45219", "Trojan.Scar", "Trojan.Dropper", "Trojan.Scar!3JbHUSbGsGc", "Trojan.Win32.Scar" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "On", "April", "19,", "Cyphort", "hardware", "sandbox", "trolled", "over", "a", "site", "www.49lou.com", "that", "served", "up", "83", "pieces", "of", "Windows", "executable", "files", "EXE", "and", "DLL", "binaries", "with", "zero", "user", "interaction." ]
[ 16, 0, 8, 3, 11, 11, 16, 16, 16, 16, 1, 16, 16, 16, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Vake", "BehavesLike.Win32.BadFile.mt", "Trojan.Win32.Vake", "TR/Vake.onkgl", "Trojan.Heur.RX.EDF54F", "Trojan:Win32/Vake.D", "Trj/GdSda.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1 ]
[ "Another", "interesting", "artifact", "part", "of", "the", "EK", "flow", "is", "the", "use", "of", "an", "XML", "configuration", "file", "which", "contains", "JScript", "code." ]
[ 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 1, 9, 9, 16, 16, 1, 9 ]
[ "For", "Android", "4.4.4", "and", "older", ",", "the", "Trojan", "will", "patch", "method", "_Z30dvmHeapSourceStartupBeforeForkv", "from", "libdvm.so", ",", "and", "for", "Android", "5", "and", "newer", "it", "will", "patch", "method", "nativeForkAndSpecialize", "from", "libandroid_runtime.so", "." ]
[ 16, 5, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16 ]
[ "A", "backdoor", "also", "known", "as:", "TrojanDownloader.Votos", "Trojan.Zusy.D151C6", "Win32.Trojan.WisdomEyes.16070401.9500.9956", "Trojan.Win32.Clicker.cqsnmq", "Trojan.Win32.Z.Zusy.314880.BK", "Trojan.Click2.61352", "Trojan-Downloader.Win32.Votos", "W32/Trojan.OORK-3033", "TR/Taranis.2482", "Trojan[Dropper]/Win32.Dinwod", "TrojanDownloader:Win32/Votos.A", "Trojan/Win32.Votos.R105546", "TrojanDropper.Dinwod", "Trj/CI.A", "Win32/Trojan.ac2" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "We", "do", "not", "know", "why", ",", "but", "we", "suspect", "that", "it", "was", "an", "attempt", "to", "hide", "the", "origin", "of", "the", "application", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32/Trojan.OXFE-7365", "Backdoor.Chilurat", "Trojan.Win32.Trochil.a", "BehavesLike.Win32.Downloader.mz", "Trojan.Trochil.a", "Trojan.Win32.Trochil.a", "Trojan:Win32/Trochil.A", "Win32.Trojan.Trochil.Wrqj", "Win32/Trojan.369" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "application", "downloads", "the", "file", "and", "dynamically", "loads", "it", "using", "dalvik.system.DexClassLoader", "and", "invokes", "class", "and", "method", "specified", "in", "json", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9 ]
[ "]", "it", "Catania", "server3.exodus.connexxa", "[", "." ]
[ 9, 9, 16, 1, 9, 9 ]
[ "Threat", "Source", "newsletter", "March", "2,", "2023", "—", "Little", "victories", "in", "the", "fight", "against", "ransomware" ]
[ 4, 12, 12, 0, 8, 8, 16, 16, 16, 16, 16, 16, 16, 3 ]
[ "This", "round", "of", "FIN7", "phishing", "lures", "implements", "hidden", "shortcut", "files", "LNK", "files", "to", "initiate", "the", "infection", "and", "VBScript", "functionality", "launched", "by", "mshta.exe", "to", "infect", "the", "victim." ]
[ 16, 16, 16, 6, 14, 16, 16, 1, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 16, 3, 16, 16, 16, 4 ]
[ "In", "2014,", "TrendMicro", "began", "seeing", "attacks", "that", "abused", "the", "Windows", "PowerShell." ]
[ 16, 0, 4, 16, 16, 1, 16, 16, 5, 13, 13 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9944", "TSPY_EMOTET.SMD3", "Trojan.Win32.Inject.exldsx", "Trojan.Encoder.24431", "TSPY_EMOTET.SMD3", "BehavesLike.Win32.Backdoor.dc", "Trojan.Jorik.afpv", "TR/Crypt.ZPACK.uxhop", "Trojan[Dropper]/Win32.Scrop", "Ransom:Win32/Pulobe.A", "Trojan.Midie.DA9F2", "Trojan.SmokeLoader", "Win32/Trojan.9b7" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9961", "Trojan-Dropper.Win32.Dapato", "TrojanDropper:Win32/Ambler.F", "Trojan.Zusy.953" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1 ]
[ "[clearskysec]", "Attacks", "against", "all", "targets", "in", "the", "Middle", "East", "stopped", "at", "once,", "after", "we", "published", "our", "first", "report." ]
[ 4, 1, 16, 16, 4, 16, 16, 2, 10, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Thanatos", "is", "being", "marketed", "as", "a", "service", "with", "both", "short", "and", "long-term", "subscriptions", "and", "support", "and", "the", "authors", "claim", "it", "is", "under", "ongoing", "development", "with", "new", "plugins", "and", "functionality", "being", "actively", "added" ]
[ 3, 16, 16, 16, 16, 16, 1, 9, 9, 9, 9, 9, 9, 9, 9, 16, 16, 6, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16 ]
[ "Details", "about", "the", "sample,", "including", "a", "hash", "are", "available", "at", "the", "end", "of", "this", "writeup." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Android", "users", "warned", "of", "malware", "attack", "spreading", "via", "SMS", "FEB", "16", ",", "2016", "Security", "researchers", "are", "warning", "owners", "of", "Android", "smartphones", "about", "a", "new", "malware", "attack", ",", "spreading", "via", "SMS", "text", "messages", "." ]
[ 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan-Spy.MSIL.KeyLogger!O", "TrojanSpy.Moorest", "Trojan/KeyLogger.iec", "Win32.Trojan.WisdomEyes.16070401.9500.9996", "W32/Trojan2.NZWO", "TSPY_MOOREST.SMJJ", "Trojan-Spy.MSIL.KeyLogger.iec", "Trojan.Win32.Clicker.dkktnp", "IM-Flooder.W32.Delf.l2lu", "Msil.Trojan-spy.Keylogger.Pito", "Trojan.Click2.7338", "TSPY_MOOREST.SMJJ", "W32/Trojan.CJSE-3516", "Trojan-Spy.MSIL.KeyLogger.iec", "TrojanSpy:MSIL/Moorest.A", "TrojanSpy.MSIL.KeyLogger", "MSIL/Spy.Keylogger.GT", "Win32/Trojan.Spy.9b9" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "]", "230", "[", "." ]
[ 9, 9, 9, 9 ]
[ "Check", "Point", "Research", "has", "submitted", "data", "to", "Google", "and", "law", "enforcement", "units", "to", "facilitate", "further", "investigation", "." ]
[ 4, 12, 16, 16, 16, 16, 16, 4, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Pwstool.Cain", "Application.Pwcrack.Cain.GL", "not-a-virus:PSWTool.Win32.Cain.s", "Application.Pwcrack.Cain.GL", "Riskware.Win32.Cain.ewvhjq", "Application.Pwcrack.Cain", "Tool.Cain", "PUA.CainAbel", "PSWTool.Cain.c", "DR/PSW.Cain.284.47", "not-a-virus:PSWTool.Win32.Cain.s", "Trj/CI.A", "Win32/Trojan.Dropper.0c3" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Worm.Ainslot.A3", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "BKDR_BLADABI.SMC", "Trojan.Win32.Drop.dcmduv", "Trojan.Win32.Z.Fraudrop.205824", "Backdoor.MSIL.Parama.RANG", "BKDR_BLADABI.SMC", "BehavesLike.Win32.Trojan.dh", "Trojan-Dropper.Win32.Dorifel", "Trojan[Dropper]/Win32.FrauDrop", "Win32.Troj.FrauDrop.kcloud", "PWS:MSIL/Mintluks.A", "Trojan/Win32.FrauDrop.R127506", "TrojanDropper.FrauDrop", "MSIL/Blocker.PAN!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Application.Webcrack.A", "Trojan/WebCracker.a", "W32/Trojan.NDIN-1455", "Application.Webcrack.A", "Application.Webcrack.A", "Riskware.Win32.WebCrack.bbira", "Application.Webcrack.A", "TrojWare.Win32.WebCracker.A", "Application.Webcrack.A", "Tool.WebCrack", "Trojan.WebCracker.Win32.2", "W32/Trojan2.MHTV", "HackTool.WebCrack.40", "Win32.Troj.WebCracker.A.kcloud", "Application.Webcrack.A", "Trojan/Win32.Webcracker.R66570", "Trojan.Webcracker", "Win32/WebCracker.A", "Trojan.Win32.WebCracker.tfe", "Trojan.Win32.Webcracker", "Trojan.Win32.WebCraker.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/W32.Cossta.152000", "Trojan.Cossta", "W32/Trojan.OSNY-0798", "Backdoor.Cruprox", "Win32/NukeSped.AK", "Trojan/NukeSped.ak", "Trojan.Win32.Cossta.akea", "Trojan.Win32.Cossta.erwfkk", "Troj.W32.Cossta!c", "Trojan.DownLoader25.21345", "Trojan.Cossta.Win32.10320", "BehavesLike.Win32.MysticCompressor.cm", "Trojan.Win32.Cossta", "Worm/AutoIt.nml", "Trojan/Win32.Cossta", "Trojan.Win32.Cossta.akea", "Trojan/Win32.Cossta.C2091223", "Win32.Trojan.Cossta.Syrj", "Trojan.Cossta!Kqe4w1x4ygI", "W32/Cossta.AKEA!tr", "Trojan.Cossta", "Trj/CI.A", "Win32/Trojan.b36" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Figure", "5", "." ]
[ 16, 16, 16 ]
[ "This", "simulation", "shows", "that", "FakeSpy", "behaves", "differently", "on", "a", "physical", "device", "versus", "an", "emulator", "." ]
[ 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Preferences", "such", "as", "the", "FTP", "hostname", "and", "username", "are", "stored", "in", "a", "file", "named", "uploadpref.dat." ]
[ 16, 16, 16, 16, 1, 9, 16, 1, 16, 16, 16, 16, 1, 16, 1 ]
[ "There", "has", "been", "no", "evidence", "found", "yet", "that", "funds", "have", "been", "stolen", "from", "any", "infected", "banks." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.Clode7b.Trojan.1410", "Virtool.6143", "Virtool.6143", "Flooder.Piaoyes!YL6KHAf2k3Q", "Flooder.AG", "Flooder.Win32.Piaoyes.40", "Virtool.6143", "Virtool.6143", "TrojWare.Win32.Flooder.Piaoyes.40", "Virtool.6143", "TR/Flood.Piaoyes.40.2", "HackTool.Piaoyes", "Win32.Hack.Piaoyes.40.kcloud", "Win-Trojan/Piaoyes.171008", "Virtool.6143", "W32/Risk.PMPJ-1484", "Win32/Flooder.Piaoyes.40", "Flooder.Win32.Piaoyes.40", "W32/Piaoyes.40!tr", "Flooder.DTA", "Trojan.Win32.Flooder.aS", "Win32/Trojan.Flood.199" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Worm.Ivruat.A11", "Worm.AutoRun.Win32.120028", "Win32.Trojan.WisdomEyes.16070401.9500.9986", "W32/Trojan.TNXK-0638", "Trojan.Win32.Autoruner2.cvshvv", "Win32.HLLW.Autoruner2.20037", "BehavesLike.Win32.BadFile.fh", "Trojan.Win32.Spy", "W32/Trojan2.OYTC", "W32.Worm.Pqk", "Worm:Win32/Ivruat.A", "Worm/Win32.AutoRun.R140023", "Win32.Worm.Autorun.Dxwf", "Trojan.Scar" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Push", "notifications", "were", "also", "used", "to", "control", "audio", "recording", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor/W32.Optix.340187", "Backdoor.Win32.Optix!O", "Trojan.Madtol.C", "Backdoor.Optix", "Packer.W32.NSAnti.kZ85", "Backdoor/Optix.f", "W32/OptixPro.I", "Backdoor.OptixPro.13", "Win32/OptixPro.F", "BKDR_OPTIXPRO.H", "Win.Trojan.Optix-5", "Backdoor.Win32.Optix.b", "Trojan.Win32.Optix.bslhnb", "Backdoor.Win32.Optix_Pro.340203", "Trojan.DownLoader.60627", "BKDR_OPTIXPRO.H", "BehavesLike.Win32.Dropper.fc", "W32/OptixPro.WZQS-7361", "Backdoor/Optix.Pro.bd", "BDS/Optix.Pro.13.7", "Trojan[Backdoor]/Win32.Optix", "Backdoor:Win32/Optixpro.T", "Backdoor.Win32.Optix.b", "Trojan/Win32.Xema.C66170", "Backdoor.Optix", "Bck/OptixPro.C", "Win32/Optix.Pro.13", "Backdoor.Optix.Pro.BD", "Backdoor.Win32.Optix" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Win32.Hider!O", "W32/Backdoor.BVFG", "TROJ_HIDER.I", "Win.Trojan.Hider-4", "Trojan.Win32.Hider.234496", "Troj.W32.Hider.toFP", "Trojan.Hidn", "Trojan.Hider.Win32.266", "TROJ_HIDER.I", "Trojan-Dropper.Delf", "Trojan/Win32.Hider.gh", "Win32.Troj.Hider.i.234496", "Trojan.Win32.Hider.gh", "Trojan.Hider", "Win32/Trojan.0bc" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Being", "aware", "of", "this", "fact", "can", "help", "create", "defensive", "strategies", ",", "as", "well", "as", "prepare", "for", "upcoming", "attacks", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Over", "the", "past", "few", "months,", "new", "strains", "of", "this", "infamous", "Android", "malware", "family", "have", "surfaced", "in", "third-party", "APK", "markets,", "as", "well", "as", "in", "the", "official", "Google", "Play", "store." ]
[ 16, 0, 8, 8, 8, 16, 3, 16, 16, 16, 3, 11, 11, 16, 16, 16, 16, 5, 13, 16, 16, 16, 16, 5, 13, 13, 13, 13 ]
[ "These", "repackaged", "apps", "pose", "as", "communication", ",", "news", ",", "lifestyle", ",", "book", ",", "and", "reference", "apps", "popularly", "used", "in", "the", "Middle", "East", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/W32.VBKrypt.315392.AK", "Trojan.Win32.VBKrypt!O", "Trojan/Injector.wms", "Win32.Trojan.Inject.bh", "HV_VBKRYPT_CG092B3E.RDXN", "Trojan.Win32.VBKrypt.nrzc", "Trojan.Win32.VBKrypt.dzjqpk", "Trojan.MulDrop4.8756", "Trojan.VBKrypt.Win32.180705", "BehavesLike.Win32.BadFile.fh", "Trojan-PWS.Win32.Zbot", "Trojan.VBKrypt.amiu", "Trojan/Win32.VBKrypt", "Trojan.Symmi.D4542", "Trojan.Win32.A.VBKrypt.315392.CI", "Trojan.Win32.VBKrypt.nrzc", "Worm:Win32/Secrar.A", "Trojan/Win32.Jorik.R37626", "BScope.Worm.Gamarue.1191", "W32/VBKrypt.MBW!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan-Proxy/W32.Mitglieder.8304", "Trojan/Proxy.Mitglieder.af", "TrojanProxy.Mitglied!TVlYB86T2l0", "Trojan.Mitglieder.G", "Win32/Mitglieder.Z", "TSPY_TARNO.D", "Trojan.Win32.Mitglieder.dkdz", "TrojWare.Win32.TrojanProxy.Mitglieder.AF", "Trojan.Mitglieder.Win32.173", "TSPY_TARNO.D", "BehavesLike.Win32.Downloader.xc", "W32/Mitglieder.M", "TrojanProxy.Mitglieder.h", "Win32.Troj.Mitglieder.af.kcloud", "TrojanProxy:Win32/Mitglieder.DK", "Win-Trojan/Mitglieder.8304", "Trojan-Proxy.Win32.Mitglieder.e", "Trojan.Win32.Mitglieder.aTNT", "Win32/TrojanProxy.Mitglieder.AF", "Win32.Trojan-proxy.Mitglieder.Ectn", "Trojan-Proxy.Win32.Mitglieder.CL", "W32/Tarno.D!tr", "Proxy.4.AZ", "Win32/Trojan.63b" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "SilentPush", "investigates", "a", "recent", "Facebook", "phishing", "campaign", "targeting", "social", "media", "users", "on", "Facebook", "Messenger,", "but", "what", "do", "we", "know", "about", "the", "attack's", "tactics", "and", "what", "can", "we", "do", "about", "it?" ]
[ 4, 16, 16, 16, 6, 14, 14, 16, 5, 13, 16, 16, 5, 13, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "data", "that", "Domestic", "Kitten", "steals", "follows", "a", "similar", "format", "with", "Bouncing", "Golf", "’", "s", ",", "with", "each", "type", "of", "data", "having", "a", "unique", "identifying", "character", "." ]
[ 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Win32.VB!O", "Trojan.VB", "Trojan.Symmi.DFDA4", "Win32.Trojan.WisdomEyes.16070401.9500.9858", "Trojan.Win32.VB.ckrm", "Trojan.Win32.VB.edplzz", "Troj.W32.Vb!c", "Trojan:W32/Kilim.P", "Trojan.VB.Win32.164816", "TR/Kecix.ztie", "Trojan/Win32.VB", "Trojan:Win32/Kecix.A", "Trojan.Win32.VB.ckrm", "Trojan.VB", "Trj/CI.A", "Win32.Trojan.Vb.Pdlo", "Trojan.VB!Qw/pqsBL6E0", "Win32.Outbreak", "Win32/Trojan.b08" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Security", "Without", "Borders", "has", "recently", "published", "an", "analysis", "of", "this", "family", ",", "independently", ",", "through", "their", "blog", "." ]
[ 4, 12, 12, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Tool.PassView.Win32.702", "Win.Trojan.Lmir-87", "not-a-virus:PSWTool.Win32.PassView.vly", "Win32.Trojan.Psw.Szlj", "Application.Win32.PassView.1_51", "BehavesLike.Win32.Dropper.mh", "not-a-virus:PSWTool.Win32.PassView", "W32/Application.YMHQ-2387", "Backdoor/Prorat.fxr", "TR/PSW.Dumaru", "Trojan[PSWTool]/Win32.PassView", "Worm:Win32/Dumaru.H@mm", "Application.Heur.E5E9B8", "not-a-virus:PSWTool.Win32.PassView.vly", "PassDump.b", "PUP.Optional.PassView", "Riskware.PSWTool!" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "While", "some", "criminals", "blow", "up", "ATMs", "to", "steal", "cash,", "others", "use", "less", "destructive", "methods,", "such", "as", "infecting", "the", "ATM", "with", "malware", "and", "then", "stealing", "the", "money." ]
[ 16, 16, 6, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 3, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.Pinfi.B", "Win32.Parite.B", "Virus/W32.Parite.C", "Virus.Win32.Parite.b!O", "W32.Perite.A", "W32/Pate.b", "W32/Pate.B", "Win32.Virus.Parite.d", "W32/Parite.B@mm", "W32.Pinfi.B", "Win32/Pinfi.A", "PE_PARITE.A", "Heuristics.W32.Parite.B", "Virus.Win32.Parite.b", "Win32.Parite.B", "Virus.Win32.Parite.bgvo", "W32.Parite.b!c", "Win32.Parite.B", "Win32.Parite.B", "Win32.Parite.2", "Virus.Parite.Win32.9", "PE_PARITE.A", "BehavesLike.Win32.Pate.gc", "Trojan.Win32.FakeAV", "W32/Parite.LAQX-0866", "Win32/Parite.b", "Virus/Win32.Parite.c", "Win32.Parite.b.5756", "TrojanDownloader:Win32/Grogsas.A", "Win32.Parite.B", "Win32.Parite.A", "Virus.Win32.Parite.b", "Win32.Parite.B", "Win32.Parite.B", "Virus.Win32.Parite.b", "Win32.Parite.B", "Win32/Parite.B", "Win32.Parite.B", "W32/Parite.B", "W32/Parite.B", "Virus.Win32.Parite.H" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Use", "mobile", "threat", "detection", "solutions", "for", "enhanced", "security", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.Suslix.C", "Backdoor/W32.PlxT.20480", "Backdoor.Suslix.C", "Win32.Trojan.WisdomEyes.16070401.9500.9991", "W32/Backdoor.NXX", "Backdoor.Trojan", "Win32/Paltry.C", "Win.Trojan.Delf-473", "Backdoor.Suslix.C", "Backdoor.Win32.PlxT.a", "Backdoor.Suslix.C", "Backdoor.Win32.Z.Suslix.20480", "Backdoor.Suslix.C", "W32/Backdoor.PGXD-0378", "Backdoor/PlxT.b", "Trojan[Backdoor]/Win32.Suslix", "Backdoor.Suslix.C", "Backdoor.Win32.PlxT.a", "Backdoor:Win32/Suslix.A", "Backdoor.Suslix.C", "Trj/CI.A", "Win32/Suslix.NAA", "Win32.Backdoor.Plxt.Ejez", "Trojan.Win32.Spy", "W32/Suslix.NAA!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Cyber4Sight", "has", "analyzed", "the", "malware", "distributed", "via", "the", "compromised", "Polish", "Financial", "Supervision", "Authority", "webpage", "and", "used", "in", "targeted", "attacks", "against", "a", "number", "of", "large", "banks", "and", "telecommunication", "companies." ]
[ 4, 16, 16, 16, 3, 16, 16, 16, 1, 9, 9, 9, 9, 9, 16, 16, 16, 1, 9, 16, 16, 16, 16, 4, 12, 16, 4, 12 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/W32.Small.38400.AY", "Trojan-Spy.Win32.Brospa!O", "Trojan.Witkinat", "Trojan/Spy.Brospa.cm", "TROJ_BROSPA.SMC", "Win32.Trojan.WisdomEyes.16070401.9500.9979", "Backdoor.Trojan", "Win32/Witkinat.AY", "TROJ_BROSPA.SMC", "Win.Spyware.78717-2", "Trojan.Win32.Brospa.bpglj", "Trojan.Win32.A.Brospa.38400.N", "Trojan.PWS.iThink.16", "Trojan.Brospa.Win32.159", "Trojan.Win32.Scar", "TrojanSpy.Brospa.o", "W32.Trojan.Witkinat.A", "Trojan[Spy]/Win32.Brospa", "Trojan:Win32/Witkinat.A", "Trojan/Win32.Brospa.R4351", "TrojanSpy.Brospa", "Win32.Trojan-spy.Brospa.Wrqa", "W32/Witkinat.Q!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Potentially", "malicious", "iOS", "connection", "Using", "the", "codes", "and", "“", "Concipit1248", "”", "to", "check", "for", "more", "versions", ",", "we", "found", "two", "other", "apps", "in", "the", "App", "Store", "." ]
[ 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 16 ]
[ "Targeting", "Postal", "and", "Transportation", "Services", "Companies", "One", "of", "the", "most", "significant", "findings", "is", "that", "new", "versions", "of", "FakeSpy", "target", "not", "only", "Korean", "and", "Japanese", "speakers", ",", "but", "also", "almost", "any", "postal", "service", "company", "around", "the", "world", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "We", "saw", "the", "following", "hardcoded", "C", "&", "C", "server", "location", "in", "the", "RAT", "package", ":", "Conclusion", ":", "The", "DroidJack", "RAT", "is", "another", "example", "of", "a", "growing", "trend", "in", "which", "malware", "authors", "seek", "to", "exploit", "public", "interest", "as", "a", "way", "to", "spread", "malware", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "It", "appears", "to", "have", "evolved", "from", "the", "NewPOSthings", "family", "of", "malware", "first", "discovered", "by", "Dennis", "Schwarz", "and", "Dave", "Loftus", "at", "Arbor", "Networks." ]
[ 16, 16, 16, 16, 16, 16, 16, 3, 11, 11, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 12 ]
[ "It", "'s", "also", "raising", "eyebrows", "because", "of", "the", "connection", "with", "China", ",", "which", "has", "frequently", "sparred", "with", "the", "U.S.", "over", "cyber", "espionage", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "This", "new", "variant,", "dubbed", "HummingWhale,'", "includes", "new,", "cutting", "edge", "techniques", "that", "allow", "it", "to", "perform", "ad", "fraud", "better", "than", "ever", "before." ]
[ 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 16, 16, 16, 16 ]
[ "Checking", "this", "Minigameshouse", "page", "further", "indicates", "that", "this", "person", "is", "indeed", "the", "owner", "of", "the", "minigameshouse", "[", "." ]
[ 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 9 ]
[ "SANS", "mail", "server", "quarantined", "this", "file", "FautraPago392023.gz", "and", "extracted", "the", "file", "to", "find", "there", "was", "no", ".exe", "extension", "associated", "with", "the", "file." ]
[ 5, 13, 13, 16, 16, 1, 9, 16, 16, 16, 1, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 1 ]
[ "When", "installed,", "GreenDispenser", "may", "display", "an", "out", "of", "service'", "message", "on", "the", "ATM", "--", "but", "attackers", "who", "enter", "the", "correct", "pin", "codes", "can", "then", "drain", "the", "ATM's", "cash", "vault", "and", "erase", "GreenDispenser", "using", "a", "deep", "delete", "process,", "leaving", "little", "if", "any", "trace", "of", "how", "the", "ATM", "was", "robbed." ]
[ 16, 16, 3, 0, 1, 9, 9, 9, 9, 9, 16, 16, 4, 16, 16, 6, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 13, 16, 1, 9, 9, 9, 9, 9, 9, 16, 1, 9, 9, 9, 16, 16, 16, 5, 16, 16 ]