tokens
sequencelengths
2
296
ner_tags
sequencelengths
2
296
[ "A", "backdoor", "also", "known", "as:", "Trojan.Inject", "Win32.Trojan.Delf.am", "W32/Trojan.SHRZ-8205", "Win32.Worm.Delf.Dxcp", "Trojan.PWS.Banks.799", "W32.W.AutoRun.lmnK", "Backdoor:Win32/Aybo.B", "Trojan.Delf", "Trojan.Win32.VMProtect", "Win32/Trojan.079" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "On", "several", "occasions,", "we", "verified", "that", "these", "details", "are", "correct", "for", "the", "intended", "victim." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "\"", "Emboldened", "by", "financial", "and", "technological", "independence", ",", "their", "skillsets", "will", "advance–putting", "end", "users", ",", "enterprises", ",", "and", "government", "agencies", "at", "risk", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Packed-76", "Trojan-Downloader.Win32.Qvod.col", "Trojan.Win32.Swisyn!IK", "Trojan.Win32.Swisyn", "W32/Qvod.EF!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1 ]
[ "The", "increasing", "sophistication", "of", "surveillanceware", "The", "structure", "of", "the", "surveillanceware", "indicates", "it", "is", "very", "sophisticated", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "Wekby", "actors", "have", "recently", "been", "observed", "compromising", "organizations", "in", "the", "Manufacturing,", "Technology", "and", "Utilities", "verticals,", "but", "have", "had", "a", "long", "standing", "interest", "in", "the", "HealthCare", "industry." ]
[ 16, 6, 14, 16, 16, 16, 16, 16, 4, 16, 16, 4, 12, 16, 4, 12, 16, 16, 16, 16, 16, 16, 16, 16, 4, 12, 12 ]
[ "''", "Debug", "information", "on", "logcat", "Another", "indicator", "is", "the", "amount", "of", "debugging", "information", "the", "trojan", "is", "still", "generating", "—", "a", "production-level", "trojan", "would", "keep", "its", "logging", "to", "a", "minimum", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Redrac.A@mm", "Win32.Redrac.A@mm", "Win32.Redrac.A@mm", "Trojan.Win32.Redrac.enor", "W32.Redrac@mm", "Win32/Redrac.A", "Email-Worm.Win32.Redrac", "Win32.Redrac.A@mm", "Worm.Redrac!vQPr8wluFnM", "W32.W.Redrac!c", "Win32.Redrac.A@mm", "Worm.Win32.Redrac.A", "Win32.Redrac.A@mm", "Win32.HLLM.Redrac", "Worm.Redrac.Win32.1", "BehavesLike.Win32.AdwareRBlast.cc", "W32/Redrac.AFIQ-7566", "Worm/Sramota.axa", "WORM/Redrac.A", "Worm[Email]/Win32.Redrac", "Win32.Redrac.E90817", "Trojan/Win32.Xema", "Worm:Win32/Redrac.A@mm", "Virus.Win32.Heur.l", "W32/Gnome.C.worm", "Win32.Redrac.A@mm", "I-Worm/Redrac.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "This", "enables", "it", "to", "launch", "malicious", "apps", "without", "the", "user", "’", "s", "awareness", "and", "explicit", "consent", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "It", "provides", "a", "robust", "set", "of", "capabilities,", "including:", "file", "transfer,", "screen", "capture,", "keystroke", "logging,", "process", "injection,", "process", "manipulation,", "and", "task", "scheduling." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "CONCLUSIONS", "FakeSpy", "was", "first", "seen", "in", "October", "2017", "and", "until", "recently", "mainly", "targeted", "East", "Asian", "countries", "." ]
[ 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "common", "misconfiguration", "attempts", "to", "download", "the", "non-existant", "file", "at", "http://www.server.com/sqlite3.dll" ]
[ 16, 16, 1, 16, 16, 16, 16, 16, 1, 16, 1 ]
[ "Check", "Point", "researchers", "discovered", "another", "widespread", "malware", "campaign", "on", "Google", "Play", ",", "Google", "’", "s", "official", "app", "store", "." ]
[ 4, 12, 16, 16, 16, 16, 16, 16, 16, 5, 13, 16, 4, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Ladex.A@mm", "W32/Ladex.worm", "W32.W.Ladex.a!c", "W32/Ladex.worm", "Win32.Ladex.E90817", "W32.Dalbug.Worm", "Win32/Ladex.A", "Win.Worm.Ladex-1", "Worm.Win32.Ladex.a", "Win32.Ladex.A@mm", "Trojan.Win32.Ladex.bxker", "Win32.Ladex.A@mm", "Worm.Win32.Ladex.A", "Win32.Ladex.A@mm", "Win32.HLLW.Ladex", "Worm.Ladex.Win32.2", "W32/Ladex.worm", "W32/Risk.UDJC-2718", "WORM/Ladex.A", "W32/Ladex.A!worm", "Worm/Win32.Ladex", "Worm.Win32.Ladex.a", "Win32.Ladex.A@mm", "Worm.Ladex", "W32/Ladex.D.worm", "Worm.Win32.Ladex.a.2", "Trojan-IM.Win16.PS", "Win32.Ladex.A@mm", "Win32/Worm.f02" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "It", "is", "quite", "unusual", "to", "find", "an", "actual", "organization", "behind", "mobile", "malware", ",", "as", "most", "of", "them", "are", "developed", "by", "purely", "malicious", "actors", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.ZbalCS.S302126", "Backdoor.Konus.Win32.1", "Trojan/Kryptik.flew", "Trojan.Midie.D88E4", "TROJ_KRYPTIK_GC140164.UVPM", "Win32.Trojan.WisdomEyes.16070401.9500.9700", "TROJ_KRYPTIK_GC140164.UVPM", "Win.Trojan.Ag-4254306-1", "Trojan.Win32.Kryptik.emceui", "Trojan.DownLoader23.52205", "BehavesLike.Win32.PWSZbot.fc", "Backdoor.Konus.b", "TR/Crypt.EPACK.rguwm", "Backdoor.Konus!", "W32/Kryptik.FLEW!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Enterprises", "are", "currently", "being", "targeted", "by", "the", "macro", "malware", "BARTALEX", "in", "a", "recent", "outbreak", "of", "thousands", "of", "spammed", "emails." ]
[ 16, 16, 16, 16, 16, 16, 16, 3, 11, 11, 16, 16, 16, 16, 16, 16, 16, 1, 9 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.Ares.A", "Backdoor/W32.Aresdor.15872", "Backdoor/Aresdor.13", "Backdoor.Ares.A", "W32/Risk.WUTO-4007", "Backdoor.Trojan", "Win32/Aresdor.13.C", "BKDR_ARESDOR.A", "Backdoor.Win32.Aresdor.13", "Trojan.Win32.Aresdor.dblp", "Backdoor.Win32.Z.Aresdor.15872[h]", "Backdoor.W32.Aresdor.13!c", "Backdoor.Ares.A", "Backdoor.Win32.Aresdor.13.C", "Backdoor.Ares.A", "BackDoor.Ares.13", "Backdoor.Aresdor.Win32.3", "BKDR_ARESDOR.A", "Backdoor/Aresdor.a", "BDC/Aresdor.13.1.A", "W32/Ares.C!tr.bdr", "Trojan[Backdoor]/Win32.Aresdor", "Backdoor.Ares.A", "Win-Trojan/Aresdor.15872", "Backdoor:Win32/Ares.A", "Backdoor.Ares.A", "Backdoor.Aresdor", "Win32.Backdoor.Aresdor.Wpte", "Backdoor.Aresdor!SN6VLScBnkQ", "Trojan.Win32.Aresdor", "Backdoor.Ares.A", "BackDoor.Aresdor.C", "Backdoor.Win32.Aresdor.13", "Win32/Backdoor.a98" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W97M.Dropper.E", "W97M/DownldExe.A", "W97M.Downloader", "W97M/DownldExe.A", "W2000M/Dldr.Jetoypt.A", "W97M/Dloader.NCN!tr", "HEUR.VBA.Trojan", "Heur.MSWord.Downloader.b", "Trojan-Downloader.W97M.Small", "Macro.Trojan-Downloader.Broxoff.B", "heur.macro.download.e" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "It", "highlights", "the", "analysis", "flow", "using", "two", "of", "our", "flagship", "products,", "Security", "Analytics", "SA", "and", "the", "Enterprise", "Compromise", "Assessment", "Tool", "ECAT,", "for", "an", "Advance", "Persistent", "Threat", "APT", "intrusion", "investigation." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 13, 13, 13, 16, 5, 13, 13, 13, 13, 13, 16, 16, 6, 14, 14, 14, 16, 16 ]
[ "This", "app", "appears", "to", "have", "become", "unavailable", "on", "Google", "Play", "in", "March", "2020", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Perkesh.B", "TrojanDropper.Perkesh.C2", "Trojan.Perkesh.B", "Trojan/Downloader.Fiegi.ar", "TROJ_PERKESH.SMF", "TROJ_PERKESH.SMF", "Trojan.Perkesh.B", "Trojan.Perkesh.B", "Trojan.Win32.Downloader.44032.DO", "TrojWare.Win32.Downloader.Small.ai43", "Trojan.MulDrop.34331", "TrojanDropper:Win32/Perkesh.C", "Trojan.Perkesh.B", "BScope.Trojan.SvcHorse.01643", "Trojan.Perkesh.B", "Trj/Murlo.P", "Win32/TrojanDownloader.Perkesh.F", "Trojan-Downloader.Win32.Perkesh" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "MalwareBytes", "recently", "came", "across", "a", "campaign", "targeting", "a", "Saudi", "Arabia", "Government", "entity", "via", "a", "malicious", "Word", "document", "which", "at", "first", "reminded", "us", "of", "an", "attack", "we", "had", "previously", "described", "on", "this", "blog." ]
[ 3, 16, 16, 16, 6, 14, 16, 4, 12, 12, 12, 16, 16, 16, 1, 9, 9, 16, 16, 16, 16, 16, 16, 1, 9, 16, 16, 16, 16, 16, 16, 16 ]
[ "We", "have", "been", "monitoring", "a", "new", "campaign", "specifically", "targeting", "WordPress", "sites,", "using", "hundreds", "of", "them", "for", "SEO", "spam", "distribution." ]
[ 16, 16, 16, 16, 16, 16, 6, 16, 16, 1, 9, 16, 16, 16, 16, 16, 1, 9, 9 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor/VB.auv", "BKDR_VB.GXX", "Win32.Trojan.WisdomEyes.16070401.9500.9813", "W32/Backdoor2.EBKN", "Backdoor.Trojan", "BKDR_VB.GXX", "Backdoor.Win32.VB.apw", "Trojan.Win32.VB.ehzv", "Backdoor.Win32.S.VB.1007657.A", "Backdoor.W32.VB.apw!c", "Backdoor.Win32.VB.~UU", "Backdoor.VB.Win32.2378", "BehavesLike.Win32.Trojan.dm", "W32/Backdoor.LCBL-3812", "BDS/VB.A.109", "Trojan[Backdoor]/Win32.VB", "Backdoor.Win32.VB.apw", "Trojan/Win32.Xema.C44642", "BScope.Trojan-Dropper.Injector", "Trj/SpyMaster.C", "Win32/VB.AUV", "Win32.Backdoor.Vb.srv", "Backdoor.VB!xTNIvgAXzis", "Backdoor.Win32.VB", "W32/VB.0F07!tr", "Win32/Backdoor.8f4" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "last", "time", "I", "wrote", "about", "poker-related", "malware,", "it", "was", "about", "PokerAgent,", "a", "trojan", "propagating", "through", "Facebook", "that", "was", "used", "to", "steal", "Facebook", "users'", "logon", "credentials,", "credit", "card", "information", "and", "the", "level", "of", "Zynga", "poker", "credit." ]
[ 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 16, 3, 16, 3, 16, 16, 4, 16, 16, 16, 16, 16, 4, 1, 16, 9, 9, 9, 9, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Joke/W32.BadJoke.230912", "Hoax.Fakedel", "JokeTool.RJLSoftware", "Aplicacion/FakeDel.c", "W32/Joke.BE", "Joke.FakeDel", "JOKE_FAKEDEL.C", "Win.Joke.FakeDelete-1", "Hoax.Win32.BadJoke.FakeDel.c", "Riskware.Win32.FakeDel.hsrd", "Hoax.W32.BadJoke.FakeDel.c!c", "Joke.Fakedel", "Tool.BadJoke.Win32.441", "JOKE_FAKEDEL.C", "not-a-virus:BadJoke.Win32.FakeDel.b", "W32/Joke.HLOW-7548", "Hoax.BadJoke.FakeDel.a", "Joke:Win32/Fakedel.C", "JOKE/FakeDel.C", "HackTool[Hoax]/Win32.FakeDel", "Joke:Win32/Fakedel.C", "Hoax.Win32.BadJoke.FakeDel.c", "BadJoke.Win32.FakeDel.c", "Joke/Fakedel.D", "Win32.Trojan-psw.Badjoke.Svrk", "Trojan.BadJoke!Ig2iP/M1kgM", "Win32/Joke.309" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "HW32.Packed.921B", "Trojan.Win32.VBKrypt!O", "Trojan.VBKrypt", "Trojan.Heur.E6E8D0", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Trojan.Win32.VBKrypt.hrqc", "Trojan.Win32.Drop.bccyya", "Trojan.Win32.Z.Vbkrypt.602112.J", "Trojan.MulDrop2.63923", "BehavesLike.Win32.Trojan.hc", "Trojan.Win32.VB", "Trojan/VBKrypt.gkpp", "Trojan/Win32.VBKrypt", "Trojan:Win32/Msposer.A", "Trojan.Win32.VBKrypt.hrqc", "Trojan.VBKrypt", "Win32.Trojan.Vbkrypt.Phrb", "W32/Refroso.AGEA!tr", "Win32/Trojan.169" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Troj.W32.Autoit!c", "TROJ_FILPOR.AI", "Backdoor.Enfourks", "TROJ_FILPOR.AI", "Trojan.Win32.Autoit.ezc", "Trojan.Win32.Autoit.ecevvi", "Trojan.DownLoader21.32598", "Trojan.Autoit.Win32.30656", "BehavesLike.Win32.Autorun.hc", "TR/Autoit.qhpu", "Trojan.Win32.Autoit.ezc", "Trojan:Win32/Filpor.A", "Win32.Trojan.Autoit.Pepf", "Trojan.Win32.Autoit", "W32/Autoit.EZC!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.DropperHQc.Trojan", "Trojan.Dropper.UUW", "Trojan.Dynamer.A4", "W32/Trojan.YSAI-0703", "Win32/Tnega.ARWO", "Trojan-Spy.MSIL.KeyLogger.cssc", "Trojan.Dropper.UUW", "Trojan.Win32.Drop.ewucrk", "Uds.Dangerousobject.Multi!c", "Trojan.Dropper.UUW", "Trojan.DownLoader1.49310", "BehavesLike.Win32.Shodi.cc", "Trojan.Dropper.UUW", "Trojan.Win32.Z.Dropper.833273", "Trojan-Spy.MSIL.KeyLogger.cssc", "TrojanDropper:Win32/FakeFlexnet.A", "Trojan.Dropper.UUW", "Trojan.Dropper.UUW", "Hoax.Win32.BadJoke", "Trj/CI.A", "Win32/Trojan.BO.19d" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "And", "that", "’", "s", "exactly", "what", "has", "happened", "recently", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Ransom/W32.Blocker.3262976", "Trojan.MSIL.FC.4195", "Win32.Trojan.WisdomEyes.16070401.9500.9943", "W32/Trojan.RPCY-7702", "Ransom_Blocker.R038C0DAH18", "Trojan-Ransom.Win32.Blocker.juiv", "Trojan.Win32.Blocker.etmtcp", "Trojan.Win32.Z.Blocker.3262976.X", "Troj.Ransom.W32.Blocker!c", "Trojan.MulDrop7.48467", "Ransom_Blocker.R038C0DAH18", "Trojan[Ransom]/Win32.Blocker", "Trojan.MSILPerseus.D107B2", "Trojan-Ransom.Win32.Blocker.juiv", "TrojanSpy:MSIL/Reven.A!bit", "Trojan/Win32.Blocker.R203232", "Ransom.FileCryptor", "Trj/CI.A", "Win32.Trojan.Blocker.Aiip", "Trojan.MSIL.Spy", "Win32/Trojan.Ransom.df0" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "few", "weeks", "ago", "Cisco", "Talos", "became", "interested", "in", "just", "such", "a", "campaign", "with", "a", "smaller", "number", "of", "circulating", "email", "messages." ]
[ 0, 8, 8, 16, 4, 12, 16, 16, 16, 16, 16, 16, 6, 16, 16, 16, 16, 16, 16, 1, 9 ]
[ "As", "FileCoder", "was", "incomplete", "at", "the", "time", "of", "its", "discovery,", "we", "believe", "KeRanger", "is", "the", "first", "fully", "functional", "ransomware", "seen", "on", "the", "OS", "X", "platform." ]
[ 16, 3, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 3, 11, 11, 16, 16, 16, 5, 13, 13 ]
[ "A", "backdoor", "also", "known", "as:", "BehavesLike:Win32.Malware", "DLOADER.Trojan", "SHeur.CDXP", "Heuristic.Malware" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1 ]
[ "Banking", "trojans", "are", "among", "some", "of", "the", "biggest", "threats", "to", "everyday", "users", "as", "they", "directly", "impact", "the", "user", "in", "terms", "of", "financial", "loss." ]
[ 3, 11, 16, 16, 16, 16, 16, 16, 3, 0, 8, 8, 16, 16, 16, 16, 16, 4, 16, 16, 16, 16, 16 ]
[ "XLoader", "also", "prevents", "victims", "from", "accessing", "the", "device", "’", "s", "settings", "or", "using", "a", "known", "antivirus", "(", "AV", ")", "app", "in", "the", "country", "." ]
[ 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Remsec", "is", "a", "stealthy", "tool", "that", "appears", "to", "be", "primarily", "designed", "for", "spying", "purposes." ]
[ 3, 16, 16, 3, 11, 15, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "It", "does", "so", "for", "each", "and", "every", "app", "on", "the", "device", "as", "long", "as", "the", "package", "names", "are", "on", "its", "prey", "list", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Flooder.Napsterokoz!ZeoO3ZzZXAQ", "PUA.Win32.Packer.NetExecutable-1", "Flooder.Win32.Napsterokoz.a", "Trojan.DownLoader5.2173", "Trojan-PWS.Win32.Fignotok!IK", "Flooder.Napsterokoz.a", "Flooder.Napsterokoz.a", "Trojan-PWS.Win32.Fignotok", "Flooder.IJJ" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Mdropper", "TROJ_MDROPPR.CA", "Win32.Mdropper", "TROJ_MDROPPR.CA", "Trojan.Mdropper" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1 ]
[ "Attackers", "know", "that", "rooting", "devices", "via", "malware", "exploits", "is", "an", "effective", "means", "to", "control", "devices", "and", "gather", "information", "from", "them", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.HackerAu3.Worm", "Win32.Worm.Autoit.Q", "Backdoor.Win32.Shark.axz!O", "Worm.Autoit.i", "Win32.Worm.Autoit.Q", "Worm.AutoIt.Win32.2", "W32/AutoRun.fjx", "WORM_UTOTI.RC", "Win32.Worm.Sohanad.br", "W32/Downloader.AEEC-3989", "W32.SillyDC", "Win32/Vishawon.A", "WORM_UTOTI.RC", "Worm.Win32.AutoIt.i", "Win32.Worm.Autoit.Q", "Trojan.Script.AutoIt.delira", "Worm.Win32.Autorun.215552.B", "Win32.Virus.Alman.Svhc", "Win32.Worm.Autoit.Q", "Worm.Win32.AutoIt.~MT", "Win32.HLLW.Autoruner.1483", "W32/Downldr2.AICJ", "Worm/AutoRun.jsl", "W32/Almanahe.C", "Win32.Worm.Autoit.Q", "W32.W.AutoRun.lbrr", "Worm.Win32.AutoIt.i", "Win32.Worm.Autoit.Q", "Trojan/Win32.AutoRun.C97057", "Worm.AutoRun.FLD", "I-Worm.Autoit.AC", "Win32/Autoit.BA", "Worm.AutoIT.V", "Worm.Win32.AutoIt", "W32/AutoIt.I!worm", "Win32/Worm.c3b" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "98.05", "%", "of", "all", "malware", "detected", "in", "2013", "targeted", "this", "platform", ",", "confirming", "both", "the", "popularity", "of", "this", "mobile", "OS", "and", "the", "vulnerability", "of", "its", "architecture", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.FakeuserinitQC.Trojan", "TrojanDownloader.Paglst.B4", "Trojan.Ursu.D206A", "Backdoor.Graybird", "Win32/Adload.NOU", "Win.Trojan.Adload-2949", "Trojan-Downloader.Win32.Adload.cfms", "Trojan.Win32.Adload.rhwua", "Trojan.Win32.A.Downloader.6381568", "Adware.Win32.AdLoader.a", "TrojWare.Win32.Downloader.AdLoad.CFMS", "Trojan.DownLoad2.64118", "Downloader.Adload.Win32.13800", "TrojanDownloader.Adload.oqx", "TR/Adload.V", "Trojan[Downloader]/Win32.Adload.cfms", "TrojanDownloader:Win32/Paglst.B", "Troj.Downloader.W32.Adload.toiw", "Trojan-Downloader.Win32.Adload.cfms", "Downloader/Win32.Adload.R32544", "TScope.Malware-Cryptor.SB", "Win32/TrojanDownloader.Adload.NJM", "Trojan-Downloader.Win32.Adload", "W32/Adload.CFMS!tr.dldr", "Trojan.PSW.Win32.QQPass.DT" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.Clod6d6.Trojan.587c", "Trojan.Downloader.JMWD", "Trojan.Downloader.JMWD", "Trojan.Boupke.A6", "Trojan.Downloader.JMWD", "Trojan.Win32.S.Downloader.196096.A", "Trojan.Downloader.JMWD", "Trojan.Downloader.JMWD", "DDoS.5686", "Trojan:Win32/Doschald.A", "Trojan.Downloader.JMWD", "Trj/Downloader.MDW", "Trojan.Win32.Downloader.au", "Win32/Trojan.Downloader.001" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Mobile", "malware", "is", "a", "significant", "risk", "for", "organizations", "and", "consumers", "alike", ",", "and", "must", "be", "considered", "when", "protecting", "personal", "and", "business", "data", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "mediaserver", "will", "first", "builds", "a", "new", "unique", "track", ",", "start", "to", "play", "the", "track", ",", "loop", "play", "all", "audio", "buffer", ",", "then", "finally", "stop", "the", "playback", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.Letbetom.Trojan", "Trojan-Spy.MSIL.Redator!O", "Trojan/Redator.a", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "W32/MalwareF.LRAK", "Win.Trojan.Keylogger-796", "Trojan-Spy.MSIL.Redator.a", "Trojan.Win32.Redator.cwfoqm", "Trojan.Win32.Z.Redator.186456", "Backdoor.PePatch.Win32.36732", "W32/Risk.TYVS-3062", "TrojanSpy.MSIL.dwl", "System.Monitor.Stealthddos", "Trojan[Spy]/MSIL.Redator", "Trojan.MSIL.Krypt.2", "Troj.Spy.MSIL.KeyLogger.ljvI", "Trojan-Spy.MSIL.Redator.a", "Trojan/Win32.Keylogger.R4155", "TrojanSpy.MSIL.Redator", "Trj/CI.A", "MSIL/Spy.Keylogger.AK", "Msil.Trojan-spy.Redator.Pgcw", "W32/Mdrop.CRV!tr", "Win32/Trojan.Spy.17f" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Trojan", "native", "capabilities", "This", "is", "a", "full-fledged", "trojan", "with", "capabilities", "ranging", "from", "those", "of", "a", "banking", "trojan", "to", "a", "full", "spying", "trojan", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "It", "is", "this", "second", "webshell", "that", "enabled", "the", "threat", "actor", "to", "run", "a", "variety", "of", "commands", "on", "the", "compromised", "server." ]
[ 16, 16, 16, 16, 3, 16, 16, 6, 14, 14, 16, 16, 16, 16, 16, 1, 16, 5, 13, 13 ]
[ "As", "an", "example", ",", "in", "the", "two", "images", "below", ",", "we", "can", "see", "the", "encrypted", "and", "decrypted", "shared", "preferences", "file", ",", "which", "is", "encrypted", "using", "the", "java", "“", "PBEWithMD5AndDES", "”", "algorithm", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Figure", "1", "–", "Phishing", "Email", "When", "the", "email", "link", "is", "opened", "from", "an", "Android", "device", ",", "an", "APK", "file", "(", "Fattura002873.apk", ")", ",", "is", "downloaded", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16 ]
[ "Not", "long", "ago,", "news", "appeared", "online", "of", "a", "younger", "sibling", "for", "the", "sensational", "vulnerability", "EternalBlue." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 7, 15, 3 ]
[ "At", "the", "time", "of", "writing", "this", "article,", "the", "Joao", "downloader", "was", "being", "distributed", "via", "the", "anime-themed", "MMORPG", "Grand", "Fantasia", "offered", "on", "gf.ignitgames[.]to." ]
[ 3, 16, 16, 16, 16, 16, 16, 3, 11, 11, 16, 16, 16, 16, 1, 9, 9, 9, 9, 16, 16, 1 ]
[ "DDoS", "tools", "developed", "by", "this", "organization", "use", "SSH", "weak", "passwords", "and", "server", "vulnerabilities", "to", "control", "many", "Linux", "chickens." ]
[ 3, 11, 16, 16, 16, 6, 16, 1, 9, 9, 16, 1, 15, 16, 16, 16, 5, 16 ]
[ "If", "the", "device", "is", "located", "outside", "Russia", "or", "is", "an", "emulator", ",", "the", "application", "displays", "a", "stub", "page", ":", "In", "this", "case", ",", "the", "Trojan", "’", "s", "logs", "contain", "records", "in", "Russian", "with", "grammatical", "errors", "and", "spelling", "mistakes", ":", "If", "the", "check", "is", "successful", ",", "Rotexy", "registers", "with", "GCM", "and", "launches", "SuperService", "which", "tracks", "if", "the", "Trojan", "has", "device", "administrator", "privileges", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9848", "BehavesLike.Win64.BadFile.lm", "Backdoor:Win64/Syscon.A", "Trj/CI.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Flooder.ICQ.Raptof.01", "Trojan/W32.Flooder.223744", "Flooder.Raptof.ra", "Trojan.Flooder.ICQ.Raptof.01", "IM-Flooder.W32.Raptof.01!c", "Trojan.Flooder.ICQ.Raptof.01", "Flooder.Raptof!8im4oqjQSco", "Hacktool.Flooder", "Win32/Flooder.ICQ.Raptof.01", "Win.Trojan.Raptof", "IM-Flooder.Win32.Raptof.01", "Trojan.Win32.Raptof.dlvc", "Spyware.IM-Flooder.Raptof.223744[h]", "Trojan.Flooder.ICQ.Raptof.01", "TrojWare.Win32.Flooder.ICQ.01", "Trojan.Flooder.ICQ.Raptof.01", "FDOS.Raptof", "Tool.Raptof.Win32.1", "BehavesLike.Win32.Malware.dc", "W32/Risk.YFGX-8652", "Flooder.ICQ.Raptof.01", "HackTool[Flooder]/Win32.Raptof", "Win-Trojan/Raptof.223744", "Trojan.Flooder.ICQ.Raptof.01", "IMFlooder.Raptof", "Win32.Trojan.Raptof.Eflc", "Malware_fam.gw", "Flooder.BBR", "Trojan.Win32.ICQ.Raptof", "Win32/Trojan.Flood.be5" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "This", "suggests", "that", "multiple", "actors", "may", "be", "using", "similar", "source", "code,", "or", "the", "malware", "is", "being", "customized", "as", "a", "service", "for", "targeted", "campaigns." ]
[ 16, 16, 16, 6, 14, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 3, 11 ]
[ "A", "backdoor", "also", "known", "as:", "W32.QuastihusLTG.Trojan", "Worm.Jenxcus.A4", "Trojan/Autoit.jh", "Trojan.Heur.AutoIT.10", "W32/Trojan2.OIEK", "Win.Trojan.Autoit-581", "W32.Sality.mCD7", "Worm.AutoIT.Win32", "BehavesLike.Win32.Dropper.jh", "W32/Trojan.WAFR-6845", "TrojanDropper.Sysn.fg", "Trojan:AutoIt/Nateqj.B", "Trojan/Win32.Zapchast.R114120", "Worm.AutoIt", "Trj/CI.A", "I-Worm.Autoit.JH", "Win32/Autoit.JH", "Win32.Worm.Autoit.Wofs", "Win32/Trojan.5a2" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan-Dropper/W32.Keylogger.2292572", "RiskWare.WinActivator", "MSIL.Riskware.Hacktool.B", "Tool.Wpakill.13", "Trojan.Keylogger.Win32.50652", "HackTool.Win32.Wpakill", "W32.Hack.Tool", "Trojan[Spy]/MSIL.Keylogger", "HackTool/Win32.Wpakill.C2293432", "TrojanSpy.MSIL.Keylogger", "TrojanSpy.Keylogger!axHWqO6gDEY" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "attackers", "invested", "significant", "effort", "in", "attempting", "to", "hide", "the", "tool", "by", "changing", "the", "source", "code", "of", "the", "RAT", "and", "the", "RAT", "server,", "and", "by", "using", "an", "obfuscator", "and", "packer." ]
[ 16, 6, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 3, 5, 16, 16, 16, 5, 13, 16, 5 ]
[ "In", "addition", ",", "this", "type", "of", "Android", "banking", "malware", "does", "not", "require", "the", "device", "to", "be", "rooted", "or", "the", "app", "to", "have", "any", "specific", "Android", "permission", "(", "besides", "android.permission.INTERNET", "to", "retrieve", "the", "overlay", "contents", "and", "send", "its", "captured", "data", ")", "." ]
[ 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.Cloddf4.Trojan.f747", "Win32.Worm.P2p.Reur.P", "I-Worm.Reur.l.n2", "W32/Reur.worm!p2p", "Worm.Reur.Win32.19", "W32/Reur.p", "Worm.P2P.Reur!QrOO3e6Ele8", "W32/Reur.YOAP-3596", "W32.HLLW.Reur", "Win32/Reur.J", "P2P-Worm.Win32.Reur.p", "Win32.Worm.P2p.Reur.P", "Trojan.Win32.Reur.inko", "Win32.Worm.P2p.Reur.P", "Worm.Win32.Reur.S", "Win32.Worm.P2p.Reur.P", "BehavesLike.Win32.Dropper.gc", "W32/Reur.K", "Worm/Sramota.afo", "Worm[P2P]/Win32.Reur", "Worm.Reur.p.kcloud", "Worm:Win32/Reur.S", "Win32.Worm.P2p.Reur.P", "Trojan/Win32.HDC", "Worm.Reur", "Win32/Reur.S", "W32/Reur.K!worm.p2p", "Worm/Reur.V", "Worm.Win32.Reur.alHx", "Win32/Worm.226" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "phishing", "site", "uses", "the", "gathered", "information", "as", "its", "GET", "parameter", ",", "allowing", "the", "attacker", "to", "access", "the", "stolen", "information", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "]", "it", "Catania", "server2cz.exodus.connexxa", "[", "." ]
[ 9, 9, 16, 1, 9, 9 ]
[ "Its", "main", "job", "is", "to", "send", "spam,", "but", "it", "is", "able", "to", "do", "other", "tasks", "as", "well." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "actors", "attempted", "to", "exploit", "CVE-2014-6332", "using", "a", "slightly", "modified", "version", "of", "the", "proof-of-concept", "POC", "code", "to", "install", "a", "Trojan", "called", "Emissary,", "which", "is", "related", "to", "the", "Operation", "Lotus", "Blossom", "campaign." ]
[ 16, 6, 16, 16, 7, 1, 16, 16, 16, 16, 16, 16, 16, 3, 11, 11, 16, 16, 16, 3, 16, 3, 16, 16, 16, 16, 16, 6, 14, 14, 1 ]
[ "Limiting", "app", "installations", "on", "corporate", "devices", ",", "as", "well", "as", "ensuring", "that", "applications", "are", "created", "by", "trusted", "developers", "on", "official", "marketplaces", ",", "can", "help", "in", "reducing", "the", "risk", "of", "infection", "as", "well", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "''", "in", "a", "variety", "of", "ways", ",", "such", "as", "static", "analysis", ",", "dynamic", "analysis", ",", "and", "machine", "learning", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Although", "most", "apps", "have", "positive", "ratings", ",", "some", "of", "the", "users", "have", "noticed", "and", "reported", "Judy", "’", "s", "suspicious", "activities", ",", "as", "seen", "in", "the", "images", "below", ":", "As", "seen", "in", "previous", "malware", ",", "such", "as", "DressCode", ",", "a", "high", "reputation", "does", "not", "necessarily", "indicate", "that", "the", "app", "is", "safe", "for", "use", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "combination", "of", "factors", "made", "this", "pattern", "effective", "and", "successful,", "explaining", "why", "ITG08", "has", "remained", "operational", "for", "so", "long." ]
[ 16, 16, 16, 1, 16, 16, 1, 16, 16, 16, 16, 16, 6, 16, 16, 16, 16, 16, 16 ]
[ "''", "The", "latest", "samples", "attributed", "to", "this", "campaign", "were", "discovered", "by", "security", "researchers", "from", "ClearSky", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16 ]
[ "It", "then", "decrypts", "a", "hardcoded", "encrypted", "value", "and", "sets", "the", "“", "action", "”", "parameter", "of", "the", "Intent", "using", "the", "setAction", "API", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Ploutus", "is", "one", "of", "the", "most", "advanced", "ATM", "malware", "families", "we've", "seen", "in", "the", "last", "few", "years." ]
[ 3, 16, 16, 16, 16, 16, 3, 11, 11, 11, 16, 16, 16, 0, 8, 8, 8 ]
[ "A", "backdoor", "also", "known", "as:", "Win.HLLP.Sector.C", "Win.HLLP.Sector.C", "Win.HLLP.Sector.C", "Win.HLLP.Sector", "Win/HLLP.Sector.C", "NE_HLLP_SECTOR.C", "Win.HLLP.Sector.C", "Win.HLLP.Sector.C", "Trojan.Win16.HLLP.exkzou", "Win.Hllp.Sector!c", "Win.HLLP.Sector.C", "Win.HLLP.Sector.C", "Win.HLLP.Sector.18864", "NE_HLLP_SECTOR.C", "W16/TNT.a", "W16/HLLP.Sector.C", "Backdoor:Win16/Sector.C", "W16/TNT.a", "Win32.Virus.Hllp.Akes", "Virus.Win.Hllp" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Per", "its", "advertisements", "it", "is", "an", "infostealer", "that", "steals", "form", "data", "from", "various", "web", "browsers", "and", "other", "applications." ]
[ 16, 16, 16, 16, 16, 16, 3, 16, 1, 9, 9, 9, 9, 9, 9, 16, 1, 9 ]
[ "However", ",", "in", "order", "to", "block", "Janus", "abuse", ",", "app", "developers", "need", "to", "sign", "their", "apps", "with", "the", "new", "scheme", "so", "that", "Android", "framework", "security", "component", "could", "conduct", "integrity", "checks", "with", "enhanced", "features", "." ]
[ 16, 16, 16, 16, 16, 16, 7, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "WS.Reputation.1", "WORM_DUPTWU.SMIA", "Worm.Autorun-6650", "Backdoor.Win32.LolBot.dyk", "Trojan.Downloader.JNUS", "Backdoor.Win32.LolBot!IK", "Trojan.Downloader.JNUS", "WORM_DUPTWU.SMIA", "Worm:Win32/Duptwux.A", "Trojan.Downloader.JNUS", "Backdoor/Win32.LolBot", "Backdoor.LolBot.ju", "Worm.Win32.FakeFolder.t", "Backdoor.Win32.LolBot", "W32/LolBot.DYK!tr.bdr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Win.Trojan.Scarpnex-1", "Trojan.MulDrop4.61017", "Trojan[Spy]/MSIL.KeyLogger", "Trojan:MSIL/Scarpnex.A", "Trojan.Zusy.D9B94", "TrojanSpy.KeyLogger!icGvcsfSy6M", "Trj/CI.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.Msxrat", "Trojan.Win32.Z.Msxrat.522564", "TR/Crypt.Xpack.wccie", "Trj/CI.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1 ]
[ "The", "LOCKBIT", "ransomware", "group", "is", "one", "of", "the", "most", "notorious", "cyber-thieves", "in", "the", "world,", "targeting", "companies", "across", "Europe,", "the", "United", "States,", "India,", "and", "the", "Middle", "East", "in", "a", "series", "of", "attacks", "that", "began", "in", "December", "2022." ]
[ 6, 14, 14, 14, 16, 16, 16, 16, 16, 16, 6, 16, 16, 16, 16, 4, 16, 2, 10, 10, 10, 10, 16, 2, 10, 10, 16, 16, 16, 16, 1, 16, 16, 16, 0, 8 ]
[ "It", "is", "unknown", "what", "is", "the", "intent", "behind", "the", "campaign", "as", "of", "this", "writing,", "however,", "the", "profile", "of", "the", "targets", "resembles", "those", "that", "are", "common", "targets", "of", "Advanced", "Persistent", "Threat", "APT", "actors." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 6, 14, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 6, 14, 14, 14, 14 ]
[ "We", "investigated", "further", "and", "found", "that", "this", "campaign", "is", "specifically", "targeted", "to", "Korean", "sites", "and", "Korean", "banks." ]
[ 16, 16, 16, 16, 16, 15, 16, 6, 16, 16, 16, 16, 1, 9, 16, 4, 12 ]
[ "The", "activities", "continue", ":", "the", "most", "recently", "observed", "domain", "was", "registered", "on", "October", "31", ",", "2017", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "latest", "Petya-like", "outbreak", "has", "gathered", "a", "lot", "of", "attention", "from", "the", "media." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "After", "installation", ",", "the", "malware", "connects", "to", "the", "designated", "Command", "and", "Control", "(", "C", "&", "C", ")", "server", ",", "and", "receives", "a", "command", "to", "perform", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "This", "division", "of", "labor", "among", "the", "cybercriminals", "can", "also", "be", "seen", "in", "the", "behavior", "of", "their", "Trojans", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan-Ransom.Win32.Gimemo!O", "Trojan.PornoAsset.Win32.9310", "Trojan/Gimemo.aunq", "Trojan.Symmi.D1B0C", "Trojan.Winlock.7482", "BehavesLike.Win32.BadFile.ch", "Trojan/PornoAsset.ooo", "Trojan[Ransom]/Win32.Gimemo", "Trojan:Win32/Fsblock.A", "TScope.Trojan.VB", "Trojan-Dropper.Win32.Injector", "W32/Injector.CLTY!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9520", "Win32.Trojan.Razy.Hsjc", "BehavesLike.Win32.BadFile.mz", "TR/Razy.anyu", "Trojan:Win32/Rekilc.C", "Trojan.Razy.D822B" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.Degrub", "Trojan-Spy.Win32.Delf.avce", "Trojan.Win32.Symmi.daxrzp", "Trojan.Win32.Z.Delf.731648", "Troj.Spy.W32.Delf!c", "Trojan.Delf.Win32.64416", "BehavesLike.Win32.Dropper.bh", "Trojan-Spy.Win32.Delf", "TrojanSpy.Delf.iwz", "TR/Spy.Delf.agiu", "Backdoor:Win32/Degrub.A", "Trojan-Spy.Win32.Delf.avce", "TScope.Trojan.Delf", "Trj/Chgt.A", "Win32.Trojan-spy.Delf.Akpg", "TrojanSpy.Delf!bLkOUU0IMLc", "W32/Delf.AFB!tr", "Win32/Trojan.Keylog.e29" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9995", "Trojan.Win32.Mlw.ewygwi", "Backdoor.W32.Androm.mfVY", "Trojan.Injector.Win32.586108", "TR/Dropper.MSIL.xejse", "Trojan.MSIL.Inject", "Trj/GdSda.A", "Win32/Trojan.e6d" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "VB:Trojan.Valyria.401", "Vb.Troj.Valyria!c", "Trojan.GQXF-6", "VB:Trojan.Valyria.401", "Trojan.Ole2.Vbs-heuristic.druvzi", "VB:Trojan.Valyria.401", "VB:Trojan.Valyria.401", "HEUR_VBA.E", "HEUR.VBA.Trojan.d", "TrojanDropper:O97M/SilverMob.A!dha", "VB:Trojan.Valyria.401", "Macro.Trojan.Dropperd.Auto", "Trojan.VB.Valyria", "VB:Trojan.Valyria.401", "virus.office.obfuscated.1" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Troj.GameThief.W32.Magania.lhJV", "Win32.Trojan-PSW.OLGames.ck", "TSPY_ONLINEG.VBY", "Win.Spyware.18411-2", "Trojan-GameThief.Win32.OnLineGames.hmv", "Trojan.Win32.OnLineGames.bjsgmk", "TrojWare.Win32.Magania.~I", "Trojan.PWS.Wsgame.4325", "TSPY_ONLINEG.VBY", "Trojan-GameThief.Win32.OnLineGames", "TR/CrashSystem.C", "Trojan[GameThief]/Win32.OnLineGames", "Win32.Troj.OnLimeGamesT.gs.73779", "Trojan-GameThief.Win32.OnLineGames.hmv", "Trojan/Win32.OnlineGameHack.R96963", "Trojan.Graftor.Elzob.D370C", "Trojan.PWS.OnLineGames!SkDSyFiZd8U" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "This", "has", "the", "same", "functionality", "as", "mcpef.apk", "." ]
[ 16, 16, 16, 16, 16, 16, 1, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.ProxyChanger", "Trojan.Banload", "Trojan/ProxyChanger.ik", "TROJ_BANLOAD.HVU", "W32/Trojan2.NXCH", "Win32/Tnega.ASRL", "Trojan.ProxyChanger.IK", "TROJ_BANLOAD.HVU", "Win.Trojan.Dealply-6391261-0", "Trojan.DownLoad3.29408", "BehavesLike.Win32.Dropper.gh", "W32/Trojan.YDHZ-1016", "TR/ProxyChanger.H.1", "Trojan/Win32.Unknown", "Trojan:Win32/ProxyChanger.H", "Trojan/Win32.ChePro.R102488", "TScope.Trojan.Delf", "Win32/ProxyChanger.IK", "Trojan.ProxyChanger!NBBwWIBks/E", "Trojan.Crypt", "W32/Banloa.NX!tr", "Win32/Trojan.e6d" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "In", "other", "words", ",", "it", "goes", "through", "every", "object", "on", "the", "screen", "and", "saves", "its", "text", "data", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Win32.Gaobot.iawc", "W32/Joke.OA", "Joke.Rosenu", "TROJ_SPNR.03D111", "Backdoor.Pasur!NYY0BVh8dz8", "TrojWare.Win32.Trojan.Chifrax.~A", "TROJ_SPNR.03D111", "W32/Joke.ERJK-0662", "Joke.Rosenu", "Win32/Joke.ScreenRoses", "Trojan.Win32.Inject", "Trj/CI.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "family", "of", "ransomware", "Trojans", "that", "encrypts", "files", "and", "adds", "the", "extensions", ".xtbl", "and", ".ytbl", "emerged", "in", "late", "2014/early", "2015,", "and", "quickly", "established", "itself", "among", "the", "top", "three", "most", "widespread", "encryptors", "in", "Russia", "along", "with", "Trojan-Ransom.Win32.Cryakl", "and", "Trojan-Ransom.BAT.Scatter." ]
[ 16, 16, 16, 3, 11, 15, 1, 9, 16, 1, 9, 9, 9, 16, 4, 16, 16, 0, 8, 8, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 2, 16, 16, 1, 16, 1 ]