id
int64 1
14.4k
| text
stringlengths 3
5.01k
| entities
list | relations
list | Comments
list |
---|---|---|---|---|
13,005 | The targets, primarily located in Lithuania, were sent links to attacker controlled domains from a domain spoofing the Facebook security team. | [
{
"id": 48804,
"label": "location",
"start_offset": 34,
"end_offset": 43
},
{
"id": 48805,
"label": "SOFTWARE",
"start_offset": 119,
"end_offset": 128
}
] | [] | [] |
13,006 | Recently observed Ghostwriter credential phishing domains and emails: Curious Gorge, a group TAG attributes to China's PLA SSF, has remained active against government, military, logistics and manufacturing organizations in Ukraine, Russia and Central Asia. | [
{
"id": 48807,
"label": "location",
"start_offset": 243,
"end_offset": 255
},
{
"id": 48810,
"label": "threat-actor",
"start_offset": 70,
"end_offset": 83
},
{
"id": 48811,
"label": "location",
"start_offset": 111,
"end_offset": 119
},
{
"id": 48809,
"label": "location",
"start_offset": 232,
"end_offset": 239
},
{
"id": 48808,
"label": "location",
"start_offset": 223,
"end_offset": 230
},
{
"id": 48813,
"label": "location",
"start_offset": 119,
"end_offset": 126
},
{
"id": 48812,
"label": "identity",
"start_offset": 119,
"end_offset": 126
},
{
"id": 40519,
"label": "threat-actor",
"start_offset": 18,
"end_offset": 29
},
{
"id": 40520,
"label": "attack-pattern",
"start_offset": 41,
"end_offset": 49
}
] | [
{
"id": 466,
"from_id": 48810,
"to_id": 48812,
"type": "attributed-to"
}
] | [] |
13,007 | In Russia, long running campaigns against multiple government organizations have continued, including the Ministry of Foreign Affairs. | [
{
"id": 48814,
"label": "location",
"start_offset": 3,
"end_offset": 9
},
{
"id": 48815,
"label": "identity",
"start_offset": 106,
"end_offset": 133
}
] | [] | [] |
13,008 | Over the past week, TAG identified additional compromises impacting multiple Russian defense contractors and manufacturers and a Russian logistics company. | [
{
"id": 48819,
"label": "location",
"start_offset": 129,
"end_offset": 137
},
{
"id": 48817,
"label": "location",
"start_offset": 77,
"end_offset": 85
},
{
"id": 48820,
"label": "identity",
"start_offset": 20,
"end_offset": 24
}
] | [] | [] |
13,009 | Upon discovery, all identified websites and domains were added to Safe Browsing to protect users from further exploitation. | [] | [] | [] |
13,010 | We also send all targeted Gmail and Workspace users government-backed attacker alerts notifying them of the activity. | [
{
"id": 48821,
"label": "SOFTWARE",
"start_offset": 26,
"end_offset": 32
}
] | [] | [] |
13,011 | We encourage any potential targets to enable Google Account Level Enhanced Safe Browsing and ensure that all devices are updated. | [] | [] | [] |
13,012 | The team continues to work around the clock, focusing on the safety and security of our users and the platforms that help them access and share important information. | [] | [] | [] |
13,013 | We’ll continue to take action, identify bad actors and share relevant information with others across industry and governments, with the goal of bringing awareness to these issues, protecting users and preventing future attacks. | [] | [] | [] |
13,015 | In early March, Google’s Threat Analysis Group (TAG) published an update on the cyber activity it was tracking with regard to the war in Ukraine. | [
{
"id": 48825,
"label": "identity",
"start_offset": 25,
"end_offset": 52
},
{
"id": 48827,
"label": "TIME",
"start_offset": 3,
"end_offset": 14
},
{
"id": 48826,
"label": "location",
"start_offset": 137,
"end_offset": 144
}
] | [] | [] |
13,016 | Since our last update, TAG has observed a continuously growing number of threat actors using the war as a lure in phishing and malware campaigns. | [
{
"id": 48828,
"label": "identity",
"start_offset": 23,
"end_offset": 27
}
] | [] | [] |
13,018 | Financially motivated and criminal actors are also using current events as a means for targeting users. | [] | [] | [] |
13,020 | TAG has also continued to observe multiple ransomware brokers continuing to operate in a business as usual sense. | [
{
"id": 48838,
"label": "identity",
"start_offset": 0,
"end_offset": 4
}
] | [] | [] |
13,021 | As always, we continue to publish details surrounding the actions we take against coordinated influence operations in our quarterly TAG bulletin. | [] | [] | [] |
13,022 | We promptly identify and remove any such content, but have not observed any significant shifts from the normal levels of activity that occur in the region. | [] | [] | [] |
13,023 | Here is a deeper look at the campaign activity TAG has observed over the past two weeks: Curious Gorge, a group TAG attributes to China's PLA SSF, has conducted campaigns against government and military organizations in Ukraine, Russia, Kazakhstan, and Mongolia. | [
{
"id": 48841,
"label": "identity",
"start_offset": 130,
"end_offset": 145
},
{
"id": 48843,
"label": "location",
"start_offset": 220,
"end_offset": 227
},
{
"id": 48840,
"label": "threat-actor",
"start_offset": 89,
"end_offset": 102
},
{
"id": 48842,
"label": "identity",
"start_offset": 112,
"end_offset": 116
},
{
"id": 48845,
"label": "location",
"start_offset": 237,
"end_offset": 247
},
{
"id": 48839,
"label": "identity",
"start_offset": 47,
"end_offset": 51
},
{
"id": 48844,
"label": "location",
"start_offset": 229,
"end_offset": 235
},
{
"id": 48846,
"label": "location",
"start_offset": 253,
"end_offset": 261
}
] | [
{
"id": 467,
"from_id": 48840,
"to_id": 48841,
"type": "attributed-to"
},
{
"id": 468,
"from_id": 48840,
"to_id": 48843,
"type": "duplicate-of"
},
{
"id": 469,
"from_id": 48840,
"to_id": 48844,
"type": "duplicate-of"
},
{
"id": 470,
"from_id": 48840,
"to_id": 48845,
"type": "duplicate-of"
},
{
"id": 471,
"from_id": 48840,
"to_id": 48846,
"type": "duplicate-of"
}
] | [] |
13,024 | While this activity largely does not impact Google products, we remain engaged and are providing notifications to victim organizations. | [
{
"id": 48847,
"label": "SOFTWARE",
"start_offset": 44,
"end_offset": 51
}
] | [] | [] |
13,025 | Recently observed IPs used in Curious Gorge campaigns: COLDRIVER, a Russian-based threat actor sometimes referred to as Calisto, has launched credential phishing campaigns, targeting several US based NGOs and think tanks, the military of a Balkans country, and a Ukraine based defense contractor. | [
{
"id": 48848,
"label": "threat-actor",
"start_offset": 30,
"end_offset": 43
},
{
"id": 48849,
"label": "campaign",
"start_offset": 55,
"end_offset": 64
},
{
"id": 48853,
"label": "location",
"start_offset": 240,
"end_offset": 255
},
{
"id": 48854,
"label": "location",
"start_offset": 263,
"end_offset": 271
},
{
"id": 48855,
"label": "identity",
"start_offset": 277,
"end_offset": 295
},
{
"id": 48856,
"label": "identity",
"start_offset": 200,
"end_offset": 205
},
{
"id": 48857,
"label": "identity",
"start_offset": 209,
"end_offset": 220
},
{
"id": 48858,
"label": "location",
"start_offset": 191,
"end_offset": 194
},
{
"id": 48850,
"label": "threat-actor",
"start_offset": 120,
"end_offset": 127
},
{
"id": 48851,
"label": "attack-pattern",
"start_offset": 142,
"end_offset": 161
},
{
"id": 48859,
"label": "identity",
"start_offset": 226,
"end_offset": 235
}
] | [
{
"id": 473,
"from_id": 48859,
"to_id": 48853,
"type": "located-at"
},
{
"id": 474,
"from_id": 48856,
"to_id": 48858,
"type": "located-at"
},
{
"id": 475,
"from_id": 48857,
"to_id": 48858,
"type": "located-at"
},
{
"id": 472,
"from_id": 48855,
"to_id": 48854,
"type": "located-at"
},
{
"id": 476,
"from_id": 48850,
"to_id": 48851,
"type": "uses"
},
{
"id": 477,
"from_id": 48850,
"to_id": 48856,
"type": "duplicate-of"
},
{
"id": 478,
"from_id": 48850,
"to_id": 48857,
"type": "duplicate-of"
},
{
"id": 479,
"from_id": 48850,
"to_id": 48859,
"type": "duplicate-of"
},
{
"id": 480,
"from_id": 48850,
"to_id": 48855,
"type": "duplicate-of"
},
{
"id": 481,
"from_id": 48850,
"to_id": 48849,
"type": "related-to"
}
] | [] |
13,026 | However, for the first time, TAG has observed COLDRIVER campaigns targeting the military of multiple Eastern European countries, as well as a NATO Centre of Excellence. | [
{
"id": 48860,
"label": "campaign",
"start_offset": 46,
"end_offset": 56
},
{
"id": 48861,
"label": "identity",
"start_offset": 80,
"end_offset": 89
},
{
"id": 48862,
"label": "identity",
"start_offset": 142,
"end_offset": 167
},
{
"id": 48863,
"label": "location",
"start_offset": 101,
"end_offset": 117
}
] | [
{
"id": 482,
"from_id": 48861,
"to_id": 48863,
"type": "located-at"
},
{
"id": 484,
"from_id": 48860,
"to_id": 48862,
"type": "targets"
},
{
"id": 483,
"from_id": 48860,
"to_id": 48861,
"type": "targets"
}
] | [] |
13,027 | These campaigns were sent using newly created Gmail accounts to non-Google accounts, so the success rate of these campaigns is unknown. | [
{
"id": 48864,
"label": "SOFTWARE",
"start_offset": 46,
"end_offset": 52
}
] | [] | [] |
13,028 | We have not observed any Gmail accounts successfully compromised during these campaigns. | [
{
"id": 48865,
"label": "SOFTWARE",
"start_offset": 25,
"end_offset": 31
}
] | [] | [] |
13,029 | Recently observed COLDRIVER credential phishing domains: Ghostwriter, a Belarusian threat actor, recently introduced a new capability into their credential phishing campaigns. | [
{
"id": 48866,
"label": "campaign",
"start_offset": 18,
"end_offset": 28
},
{
"id": 48867,
"label": "attack-pattern",
"start_offset": 28,
"end_offset": 48
},
{
"id": 48868,
"label": "threat-actor",
"start_offset": 57,
"end_offset": 68
},
{
"id": 48869,
"label": "location",
"start_offset": 72,
"end_offset": 83
},
{
"id": 48870,
"label": "attack-pattern",
"start_offset": 145,
"end_offset": 164
}
] | [
{
"id": 485,
"from_id": 48866,
"to_id": 48867,
"type": "uses"
}
] | [] |
13,030 | In mid-March, a security researcher released a blog post detailing a 'Browser in the Browser' phishing technique. | [
{
"id": 48871,
"label": "attack-pattern",
"start_offset": 69,
"end_offset": 102
},
{
"id": 48872,
"label": "TIME",
"start_offset": 3,
"end_offset": 12
}
] | [] | [] |
13,031 | While TAG has previously observed this technique being used by multiple government-backed actors, the media picked up on this blog post, publishing several stories highlighting this phishing capability. | [
{
"id": 48873,
"label": "identity",
"start_offset": 6,
"end_offset": 10
},
{
"id": 48874,
"label": "attack-pattern",
"start_offset": 182,
"end_offset": 191
}
] | [] | [] |
13,032 | Ghostwriter actors have quickly adopted this new technique, combining it with a previously observed technique, hosting credential phishing landing pages on compromised sites. | [
{
"id": 40646,
"label": "threat-actor",
"start_offset": 0,
"end_offset": 11
},
{
"id": 40647,
"label": "attack-pattern",
"start_offset": 130,
"end_offset": 138
}
] | [] | [] |
13,033 | The new technique, displayed below, draws a login page that appears to be on the passport.i.ua domain, overtop of the page hosted on the compromised site. | [] | [] | [] |
13,034 | Once a user provides credentials in the dialog, they are posted to an attacker controlled domain. | [] | [] | [] |
13,035 | Recently observed Ghostwriter credential phishing domains: | [
{
"id": 48875,
"label": "threat-actor",
"start_offset": 18,
"end_offset": 30
},
{
"id": 40655,
"label": "attack-pattern",
"start_offset": 41,
"end_offset": 49
}
] | [] | [] |
13,036 | The team continues to work around the clock, focusing on the safety and security of our users and the platforms that help them access and share important information. | [] | [] | [] |
13,037 | We’ll continue to take action, identify bad actors and share relevant information with others across industry and governments, with the goal of bringing awareness to these issues, protecting users and preventing future attacks. | [] | [] | [] |
13,039 | Welcome to our weekly roundup, where we share what you need to know about cybersecurity news and events that happened over the past few days. | [] | [] | [] |
13,040 | This week, learn about Trend Micro’s latest cloud security offering, Cloud One – Application Security. | [
{
"id": 48878,
"label": "identity",
"start_offset": 23,
"end_offset": 35
},
{
"id": 48879,
"label": "SOFTWARE",
"start_offset": 69,
"end_offset": 101
}
] | [] | [] |
13,042 | Read on: | [] | [] | [] |
13,043 | Leading Protection for Cloud-Based Applications from Trend Micro Trend Micro announced the availability of its Trend Micro Cloud One – Application Security, a cloud native security solution for modern applications and APIs. | [] | [] | [] |
13,044 | Delivered as part of its industry-leading platform, Cloud One – Application Security provides code-level visibility and protection against the latest cyber threats. | [] | [] | [] |
13,046 | The Internet of Things (IoT) Cybersecurity Improvement Act, passed by the House of Representatives in September and unanimously approved by the Senate last week, is a step toward warding off advanced threats and providing greater security in IoT devices. | [
{
"id": 48882,
"label": "identity",
"start_offset": 74,
"end_offset": 98
},
{
"id": 48883,
"label": "TIME",
"start_offset": 102,
"end_offset": 112
}
] | [] | [] |
13,047 | The act aims to create “standards and guidelines” for the federal government to follow with the hopes that the requirements also make their way into private sector manufacturing. | [] | [] | [] |
13,048 | Navigating Gray Clouds: The Importance of Visibility in Cloud Security | [] | [] | [] |
13,049 | With 85% of businesses worldwide using the cloud, it has proven its imperative value, especially during the onslaught of the COVID-19 pandemic when remote work and reliance on the cloud for automation and scalability is the norm. | [] | [] | [] |
13,050 | After migrating to the cloud, enterprises need to be aware of the visibility-related challenges and security risks associated with it. | [] | [] | [] |
13,051 | In this blog, Trend Micro shares security recommendations for organizations to ensure stable security practices in a cloud-first world. | [] | [] | [] |
13,052 | Apple Security Chief Maintains Innocence After Bribery Charges | [
{
"id": 48884,
"label": "identity",
"start_offset": 0,
"end_offset": 20
}
] | [] | [] |
13,053 | A grand jury in California's Santa Clara County has indicted Thomas Moyer, Apple's head of global security, for bribery. | [
{
"id": 48887,
"label": "identity",
"start_offset": 61,
"end_offset": 73
},
{
"id": 48885,
"label": "identity",
"start_offset": 2,
"end_offset": 12
},
{
"id": 48886,
"label": "location",
"start_offset": 16,
"end_offset": 47
}
] | [] | [] |
13,054 | Moyer is accused of offering 200 iPads to the Santa County Sheriff's office in exchange for concealed carry permits for four Apple employees. | [] | [] | [] |
13,055 | Weaponizing Open Source Software for Targeted Attacks | [] | [] | [] |
13,056 | In this blog, Trend Micro researchers walk through a recent investigation that involved trojanized open-source software, which is tricky to spot because it takes on the façade of legitimate, non-malicious software, making it especially stealthy and useful for targeted attacks. | [] | [] | [] |
13,057 | However, a closer investigation can reveal suspicious behavior that exposes their malicious intent. | [] | [] | [] |
13,058 | Botnets Have Been Silently Mass-Scanning the Internet for Unsecured ENV Files Security firm Greynoise found that multiple threat actors, while drawing little attention to themselves, have spent the past two to three years mass-scanning the internet for ENV (environment) files that were accidentally uploaded and left exposed on web servers. | [] | [] | [] |
13,059 | Frameworks like Docker, Node.js, Symfony, and Django use ENV files to store environment variables such as API tokens, passwords and database logins. | [
{
"id": 48891,
"label": "SOFTWARE",
"start_offset": 46,
"end_offset": 53
},
{
"id": 48889,
"label": "SOFTWARE",
"start_offset": 24,
"end_offset": 31
},
{
"id": 48888,
"label": "SOFTWARE",
"start_offset": 16,
"end_offset": 22
},
{
"id": 48890,
"label": "SOFTWARE",
"start_offset": 33,
"end_offset": 40
}
] | [] | [] |
13,060 | Analysis of Kinsing Malware's Use of Rootkit | [
{
"id": 48892,
"label": "malware",
"start_offset": 12,
"end_offset": 29
},
{
"id": 40769,
"label": "attack-pattern",
"start_offset": 37,
"end_offset": 44
}
] | [] | [] |
13,061 | With the constant evolution of shell scripts and Linux-based malicious backdoors and agents, it’s not surprising that the creators of Kinsing have kept in step. | [
{
"id": 48893,
"label": "malware",
"start_offset": 134,
"end_offset": 142
}
] | [] | [] |
13,062 | In this blog post Trend Micro researchers discuss the malware variant’s current capabilities, including the addition of features intended to make it more difficult to detect in infected machines. | [] | [] | [] |
13,063 | The Malware that Usually Installs Ransomware and You Need to Remove Right Away | [] | [] | [] |
13,064 | This article lists the known malware strains that have been used over the past two years to install ransomware, all of which should serve as a "code red" moment for any organization. | [] | [] | [] |
13,065 | Once any of these malware strains are detected, system administrators should drop everything, take systems offline, and audit and remove the malware as a top priority. | [] | [] | [] |
13,066 | Published New White Paper: Practical Risk Assessments for Smart Factories | [] | [] | [] |
13,067 | While cyberattacks that threaten smart factories cannot be ignored, it can be a struggle to decipher which security method is sufficient within your organization’s specific system, as well as where to start. | [] | [] | [] |
13,068 | To design a secure system, risk assessment is required. | [] | [] | [] |
13,069 | This new white paper is intended to simulate risk assessment practices using an example of a fictitious smart factory. | [] | [] | [] |
13,070 | The risk assessment described in this document aims to assess and prioritize the risks of the entire smart factory environment, including IT. | [] | [] | [] |
13,071 | Post-Breach, Peatix Data Reportedly Found on Instagram, Telegram | [
{
"id": 48894,
"label": "SOFTWARE",
"start_offset": 45,
"end_offset": 54
},
{
"id": 48895,
"label": "SOFTWARE",
"start_offset": 56,
"end_offset": 64
}
] | [] | [] |
13,072 | In a data breach notice to affected users, events application Peatix said it learned that user account data had been improperly accessed. | [] | [] | [] |
13,073 | Upon further investigation, they found that usernames, email addresses, salted and hashed passwords, nicknames, preferred languages, countries and time zones had been compromised. | [] | [] | [] |
13,074 | It’s unclear how many of its 5 million user base were affected or how the breach happened. | [] | [] | [] |
13,075 | Not long after the breach occurred, the compromised data was spotted on ads posted on Instagram stories, Telegram channels and various hacking forums. | [
{
"id": 48896,
"label": "SOFTWARE",
"start_offset": 86,
"end_offset": 96
},
{
"id": 48897,
"label": "SOFTWARE",
"start_offset": 105,
"end_offset": 114
}
] | [] | [] |
13,076 | How a Ransomware Attack Could Affect Retailers | [] | [] | [] |
13,077 | Cybercriminals have recently been focusing their efforts on the retail industry, launching ransomware-based attacks that could prove disastrous for businesses if it disrupts their operations during important shopping seasons. | [] | [] | [] |
13,078 | A ransomware attack on a retailer could mean thousands of lost sales opportunities in the short-term, and serious damage to reputation in the long-term. | [] | [] | [] |
13,079 | Perception of an “unsafe” business could turn customers towards competitors who can offer a better and more secure shopping experience. | [] | [] | [] |
13,080 | What are your thoughts on the ransomware attacks on retailers as we approach the busiest times of the year for retailers, including Black Friday, Cyber Monday and the holiday season? | [] | [] | [] |
13,081 | Share them in the comments below or follow me on Twitter to continue the conversation: @JonLClay. | [
{
"id": 48898,
"label": "SOFTWARE",
"start_offset": 49,
"end_offset": 57
}
] | [] | [] |
13,082 | Tags Cloud | Malware | Expert Perspective | APT & Targeted Attacks | IoT | Ransomware | | [] | [] | [] |
13,083 | Articles, News, Reports | [] | [] | [] |
13,084 | One of the secrets of Trend Micro’s long-lasting success is being constantly on the lookout for where the next security threats might come from. | [
{
"id": 48899,
"label": "identity",
"start_offset": 22,
"end_offset": 33
}
] | [] | [] |
13,085 | That’s why we’re focusing a great deal of our research and development efforts right now on the intersection of IT and operational technology (OT). | [] | [] | [] |
13,086 | This burgeoning world of connected IoT devices is particularly advanced in the manufacturing space, where huge gains are already being made. | [] | [] | [] |
13,087 | But as great as these leaps forward are, so are the risks if technology systems aren’t properly secured. | [] | [] | [] |
13,088 | That’s why we’re thrilled to be joining the ROS-Industrial Consortium (ROS-I) to help accelerate the secure development of robotic Industry 4.0 applications. | [] | [] | [] |
13,089 | It’s yet another important step for our stated mission: to secure the connected world. | [] | [] | [] |
13,090 | Why IIoT matters Industrial IoT (IIoT) systems are already streamlining production processes, improving cost efficiencies, and helping to drive greater agility and innovation for manufacturers. | [] | [] | [] |
13,091 | It’s no coincidence that the global market for such solutions will grow at nearly 17% CAGR over the next six years to exceed $263 billion by 2027. | [] | [] | [] |
13,092 | But with new technology always comes new cyber risk. | [] | [] | [] |
13,093 | As connectivity is introduced to industrial computing devices, the challenge is managing the threat from remote attackers. | [] | [] | [] |
13,094 | System and software vulnerabilities could be probed to hijack devices, sabotage production processes and steal intellectual property. | [] | [] | [] |
13,095 | Robots are a particular risk—not only because so much of modern manufacturing relies on them, but also because many of these machines rely on legacy technology dating back decades. | [] | [] | [] |
13,096 | These custom, proprietary programming languages and unique ecosystems can make security complex, and lead to unpatched vulnerabilities which sophisticated attackers could exploit, with serious consequences. | [] | [] | [] |
13,097 | Shaping the roadmap ROS-I is an open-source project devoted to extending the capabilities of the Robot Operating Systems (ROS) into industrial hardware and applications. | [] | [] | [] |
13,098 | The job of the ROS-I Consortium is to prioritize these capabilities, offer code quality standards and provide technical support and training. | [] | [] | [] |
13,099 | As an associate member of the consortium, Trend Micro will now be able to participate in technical and strategic projects and help to shape the ROS-I roadmap. | [] | [] | [] |
13,100 | In fact, we’ve already demonstrated our value to the organization in research last year, which uncovered design flaws and vulnerabilities in legacy programming languages used by some of its products. | [] | [] | [] |
13,101 | That resulted in our collaboration to develop secure network guidelines for industrial robots using ROS. | [] | [] | [] |
13,102 | Securing the future Trend Micro also recently started looking at the security of the Data Distribution Service (DDS). | [] | [] | [] |
13,103 | This protocol is used heavily by ROS2 and will therefore be another area in which we hope to deliver tremendous value to ROS-I and end-customers going forward. | [] | [] | [] |
13,104 | Trend Micro is in many ways an unusual member of the consortium. | [] | [] | [] |
13,105 | Most either use ROS/ROS2 in their products, for example as robot manufacturers, or they want to help develop the software. | [] | [] | [] |
13,106 | We do neither, but we plan to work with the consortium to enhance security-by-design in ROS-I software. | [] | [] | [] |
13,107 | In fact, Trend Micro is only the second cybersecurity specialist to join. | [] | [] | [] |
13,108 | Securing IIoT systems is hard: it requires capabilities across the cloud, the network, and the devices themselves. | [] | [] | [] |
13,111 | For more info, check out our Smart Factory solutions: https://www.trendmicro.com/en_us/business/solutions/iot/smart-factory.html. | [
{
"id": 40909,
"label": "URL",
"start_offset": 54,
"end_offset": 128
}
] | [] | [] |
13,112 | Tags APT & Targeted Attacks | IoT | Expert Perspective | Articles, News, Reports | [] | [] | [] |