tokens
sequencelengths
2
296
ner_tags
sequencelengths
2
296
[ "We", "believe", "the", "TelePort", "Crew", "Threat", "Actor", "is", "operating", "out", "of", "Russia", "or", "Eastern", "Europe", "with", "the", "groups", "major", "motivations", "appearing", "to", "be", "financial", "in", "nature", "through", "cybercrime", "and/or", "corporate", "espionage." ]
[ 16, 16, 16, 6, 14, 14, 14, 16, 16, 16, 16, 2, 16, 2, 10, 16, 16, 6, 16, 16, 16, 16, 16, 4, 16, 16, 16, 6, 16, 6, 14 ]
[ "The", "group", "behind", "the", "OilRig", "campaign", "continues", "to", "leverage", "spear-phishing", "emails", "with", "malicious", "Microsoft", "Excel", "documents", "to", "compromise", "victims." ]
[ 16, 6, 16, 6, 14, 14, 16, 16, 16, 1, 9, 16, 3, 11, 11, 11, 16, 16, 4 ]
[ "Its", "major", "functionality", "is", "also", "implemented", "through", "the", "call", "of", "the", "asynchronous", "task", "(", "“", "org.starsizew.i", "”", ")", ",", "including", "uploading", "the", "incoming", "SMS", "messages", "to", "the", "remote", "C2", "server", "and", "executing", "any", "commands", "as", "instructed", "by", "the", "remote", "attacker", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.WebToos.A6", "Trojan.Gadoopt.Win64.4", "Trojan/Gadoopt.aa", "Win64.Backdoor.Gadoopt.b", "TROJ_WEBTOOS_EL150244.UVPM", "Win.Trojan.Win64-93", "BackDoor.Gates.19", "TROJ_WEBTOOS_EL150244.UVPM", "TR/Gadoopt.maz", "Trojan:Win32/WebToos.A", "Win64/Gadoopt.AA", "Trojan.Win32.WebToos" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "short", ",", "constant", "string", "of", "characters", "is", "inserted", "at", "strategic", "points", "to", "break", "up", "keywords", ":", "At", "runtime", ",", "the", "delimiter", "is", "removed", "before", "using", "the", "string", ":", "API", "OBFUSCATION", "SMS", "and", "toll", "fraud", "generally", "requires", "a", "few", "basic", "behaviors", "(", "for", "example", ",", "disabling", "WiFi", "or", "accessing", "SMS", ")", ",", "which", "are", "accessible", "by", "a", "handful", "of", "APIs", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.Clodc4c.Trojan.f31e", "Win32.Packed.VMProtect.a", "Trojan.Win32.Zapchast.ajbs", "Trojan.Win32.Black.elkboj", "Trojan.Win32.Z.Vmprotbad.242576[h]", "W32/Trojan.TYMW-2040", "Trojan/Win32.PcClient.R191990", "Trojan.VMProtect!", "Trojan.Win32.VMProtect", "Trj/CI.A", "Win32/Trojan.f26" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Below", "is", "a", "collection", "of", "API", "methods", "and", "a", "brief", "description", "around", "their", "purpose", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9952", "PWS:MSIL/Bahmajip.A" ]
[ 16, 3, 16, 16, 16, 1, 1 ]
[ "HTTP", "Communication", "In", "addition", "to", "the", "MQTT", "communication", ",", "the", "app", "also", "uses", "plain", "text", "HTTP", "communication", "in", "order", "to", "download", "the", ".dex", "file", "and", "upload", "collected", "data", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Worm.Win32.Radminer!O", "TrojanDropper.Small.PQ4", "Worm.Radminer.Win32.8", "Trojan/Radmin.b", "TROJ_SPNR.03EF12", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "W32/Trojan.XJGC-7764", "Remacc.Radmin", "TROJ_SPNR.03EF12", "Dos.Trojan.RAdmin-17", "Trojan-Dropper.RadmIns", "Worm.Win32.Radminer.d", "Trojan.Win32.Radminer.dxpafi", "Worm.Win32.A.Radminer.307200", "Trojan.DownLoader9.15517", "BehavesLike.Win32.Skintrim.fh", "W32/Trojan2.OCDS", "Trojan[RemoteAdmin]/Win32.RAdmin", "Backdoor:Win32/Radmin.B", "Worm.Win32.Radminer.d", "Trojan/Win32.RAdmin.R103271", "Trj/CI.A", "Trojan.Radmin.B", "Win32/Radmin.B" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Antavmu.Win32.50", "Trojan/Antavmu.ejw", "Trojan.Heur2.RP.E5C8CC", "Win32.Trojan.WisdomEyes.16070401.9500.9564", "W32/Trojan2.IKTO", "Downloader.Trojan", "Win.Trojan.Antavmu-74", "Trojan-Downloader.Win32.Murlo.vqg", "Trojan.Win32.Antavmu.wseg", "Spyware.Antavmu.455005", "TrojWare.Win32.Antavmu.~bar", "Trojan.1", "Trojan.Win32.Antavmu", "W32/Trojan.ASFC-3590", "Trojan.Antavmu.y", "Troj.W32.Antavmu.jf!c", "Trojan-Downloader.Win32.Murlo.vqg", "Trojan/Win32.Antavmu.R18411", "Trojan.1", "Trojan.Antavmu!m7hjC7OtKPY" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "]", "today", "svcws", "[", "." ]
[ 9, 9, 1, 9, 9 ]
[ "Figure", "4", ":", "Loader", "calls", "initialization", "method", "Technical", "Analysis", "–", "Core", "Module", "With", "the", "main", "purpose", "of", "spreading", "the", "infection", ",", "“", "Agent", "Smith", "”", "implements", "in", "the", "“", "core", "”", "module", ":", "A", "series", "of", "‘", "Bundle", "’", "vulnerabilities", ",", "which", "is", "used", "to", "install", "applications", "without", "the", "victim", "’", "s", "awareness", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 7, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Control", "of", "malware", "from", "a", "single", "center", "provides", "maximum", "flexibility", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "new", "online", "banking", "malware", "with", "the", "same", "technique", "used", "in", "Operation", "Emmental", "has", "been", "hitting", "users", "in", "Japan." ]
[ 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 6, 14, 16, 16, 16, 16, 16, 2 ]
[ "Once", "granted", "permission", ",", "it", "hides", "its", "icon", "from", "the", "launcher", "application", "list", "then", "starts", "a", "service", "that", "it", "keeps", "running", "in", "the", "background", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "most", "advanced", "mobile", "malicious", "programs", "today", "are", "Trojans", "targeting", "users", "’", "bank", "accounts", "–", "the", "most", "attractive", "source", "of", "criminal", "earnings", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "name", "of", "this", "injector", "is", "based", "on", "its", "version", "information", "which", "is", "the", "same", "for", "both", "dotRunpeX", "versions,", "consistent", "across", "all", "samples", "we", "analyzed", "and", "containing", "ProductName", "–", "RunpeX.Stub.Framework." ]
[ 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 1 ]
[ "The", "researchers", "wrote", ":", "While", "profit", "is", "powerful", "motivation", "for", "any", "attacker", ",", "Yingmob", "’", "s", "apparent", "self-sufficiency", "and", "organizational", "structure", "make", "it", "well-positioned", "to", "expand", "into", "new", "business", "ventures", ",", "including", "productizing", "the", "access", "to", "the", "85", "million", "Android", "devices", "it", "controls", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16 ]
[ "If", "you", "want", "to", "know", "more", "about", "them", "—", "our", "researchers", "have", "an", "article", "about", "them", "on", "Securelist", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16 ]
[ "A", "backdoor", "also", "known", "as:", "TROJ_DROPPER.FK", "Win32.Trojan.WisdomEyes.16070401.9500.9995", "Infostealer.Gampass", "TROJ_DROPPER.FK", "Trojan.Win32.XDR.euxmtw", "Trojan.MulDrop.18385", "BehavesLike.Win32.Virut.cc", "Win32.Infect.a.124448", "Win32/Trojan.5f3" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Server-side", "Carrier", "Checks", "In", "the", "JavaScript", "bridge", "API", "obfuscation", "example", "covered", "above", ",", "the", "server", "supplied", "the", "app", "with", "the", "necessary", "strings", "to", "complete", "the", "billing", "process", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.Delfsnif", "W32/Backdoor2.GYBX", "Backdoor.Trojan", "Trojan.Win32.Delphi.bjxrjc", "BehavesLike.Win32.Rontokbro.dm", "W32/Backdoor.XFVH-7108", "Backdoor.Delfsnif", "Trj/CI.A", "Win32.Trojan.Crypt.Alih", "Hoax.Win32.BadJoke.FakeKAV", "Win32/Trojan.160" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "However,", "we", "have", "also", "observed", "attacks", "against", "surrounding", "nations", "and", "beyond,", "including", "targets", "in", "India", "and", "the", "USA." ]
[ 16, 16, 16, 16, 16, 1, 16, 16, 4, 16, 16, 16, 16, 16, 2, 16, 2, 10 ]
[ "Others", "may", "have", "the", "necessary", "permissions", ",", "but", "are", "missing", "the", "classes", "containing", "the", "fraud", "code", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "documents", "were", "found", "to", "drop", "the", "following", "malware", "families:", "The", "previously", "discussed", "CONFUCIUS_B", "malware", "family", "A", "backdoor", "previously", "not", "discussed", "in", "the", "public", "domain,", "commonly", "detected", "by", "some", "antivirus", "solutions", "as", "BioData", "A", "previously", "unknown", "backdoor", "that", "we", "have", "named", "MY24" ]
[ 16, 1, 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 16, 3, 11, 11, 16, 3, 16, 16, 16, 16, 1, 9, 9, 16, 16, 16, 16, 5, 13, 16, 1, 16, 16, 3, 11, 16, 16, 16, 16, 3 ]
[ "Google", "later", "implemented", "platform-level", "changes", "that", "practically", "eliminated", "this", "attack", "surface", "." ]
[ 4, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "spammed", "attachments", "are", "using", "a", "RTF", "trick", "or", "a", "feature", "of", "Windows", "OS", "that", "allows", "dropping", "an", "executable", "–", "but", "not", "running", "it", "–", "simply", "by", "opening", "the", "RTF", "document" ]
[ 1, 9, 9, 16, 16, 16, 1, 9, 16, 16, 1, 9, 9, 9, 15, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9 ]
[ "]", "ponethus", "[", "." ]
[ 9, 9, 9, 9 ]
[ "Every", "sample", "we", "found", "was", "different", "in", "size", "and", "activity", "from", "the", "others", "but", "the", "internal", "name", "and", "other", "identifiers", "were", "disturbingly", "similar." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "malware", "disguises", "itself", "as", "a", "file", "helper", "app", "and", "then", "uses", "very", "advanced", "anti-debug", "and", "anti-hook", "techniques", "to", "prevent", "it", "from", "being", "reverse", "engineered." ]
[ 16, 3, 1, 16, 16, 16, 1, 9, 9, 16, 16, 16, 1, 9, 9, 9, 9, 9, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/W32.KillAV.60689", "Packed.Win32.TDSS!O", "Trojan.KillAV.Win32.3036", "Trojan/KillAV.caq", "W32/Trojan2.GLAK", "Infostealer.Onlinegame", "Trojan.Win32.KillAV.60689", "TrojWare.Win32.Patched.KSU", "Trojan.Click.28899", "Trojan.1", "W32/Trojan.ANJW-2244", "Trojan/KillAV.qx", "Worm:Win32/QQnof.A", "Trojan.Zusy.D1B0EC", "Troj.W32.KillAV.caq!c", "Trojan/Win32.KillAV.C155326", "Trojan.1", "Trojan.Win32.Jhee", "W32/KillAV.CAQ!tr", "Trj/KillAV.FJ" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9979", "Backdoor.Trojan", "Win32/Cyreho.A", "Trojan.DownLoad2.18592", "W32.Trojan.Trojan-Backdoor-Cele", "TR/Dldr.Ftp.E", "Trojan/Win32.Unknown", "Trojan.Heur.VP.E82FB1", "Trojan:Win32/Cyreho.A", "Trojan.VBRA.02524", "Win32.Trojan.Dldr.Oyeu", "Trojan.Win32.Darkddoser", "W32/VB.NZ!tr", "Win32/Trojan.9b7" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Additionally,", "we", "have", "observed", "instances", "of", "the", "IsSpace", "and", "TidePool", "malware", "families", "being", "delivered", "via", "the", "same", "techniques." ]
[ 16, 16, 16, 16, 16, 16, 16, 3, 16, 3, 11, 11, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.Pccontrol.2.1", "Backdoor.Pccontrol.2.1", "Backdoor.PcControl!Vqgcs0rOUEs", "PcControl.C", "Backdoor.Win32.PcControl.21", "Backdoor.Pccontrol.2.1", "Trojan.Win32.PcControl.cbiyio", "Backdoor.Pccontrol.2.1", "Backdoor.Win32.PcControl.21", "Backdoor.Pccontrol.2.1", "BackDoor.Control.21", "BKDR_PCCONTROL.A", "W32/Risk.SRBI-7988", "BDS/PcControl.21.1", "Trojan[Backdoor]/Win32.PcControl", "Backdoor:Win32/PCControl.2_1", "Backdoor.Pccontrol.2.1", "Backdoor.Pccontrol.2.1", "Backdoor.PcControl", "Backdoor.Win32.PcControl.aa", "Win32/PcControl.21", "W32/PcCont.21!tr.bdr", "BackDoor.Pccontrol.C", "Bck/PcControl.21" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Bacterio61.A", "Trojan.Bacterio61.A", "Trojan.Bacterio61.r3", "Trojan.Bacterio61.A", "Trojan.Bacterio61.A", "Trojan.Bacterio61!xosA0+L/cz0", "Trojan.Dropper", "TROJ_BACTERIO.61", "Trojan.Win32.Bacterio61", "Trojan.Win32.Bacterio61.fdse", "Trojan.Win32.RenAll[h]", "PE:Trojan.Bacterio61!1073791980", "Trojan.Bacterio61.A", "TrojWare.Win32.RenAll", "Trojan.Bacterio61.A", "Trojan.Bacterio61.Win32.1", "TROJ_BACTERIO.61", "W32/Virus.NFQE-4477", "Trojan/Win32.Bacterio61", "Win32.Troj.Bacterio61.kcloud", "Win-Trojan/RenAll.94208", "Trojan.Bacterio61.A", "Win32.Trojan.Bacterio61.ddnb", "W32/Bacterio61.A!tr", "Trojan.Win32.Bacterio61.aW" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "HW32.CDB.3cb9", "Virus.Win32.Patched" ]
[ 16, 3, 16, 16, 16, 1, 1 ]
[ "Finally", ",", "the", "Ashas", "adware", "family", "has", "its", "code", "hidden", "under", "the", "com.google.xxx", "package", "name", "." ]
[ 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Figure", "1", ":", "Landing", "page", "for", "phishing", "scheme", "asking", "for", "the", "victim", "’", "s", "signatory", "number", "and", "PIN", "using", "stolen", "branding", "from", "Bank", "Austria", "Because", "the", "actor", "delivered", "phishing", "links", "using", "the", "bit.ly", "URL", "shortener", ",", "we", "can", "access", "delivery", "statistics", "for", "this", "particular", "campaign", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "HW32.Packed.4CE7", "Backdoor/W32.Tropoly.C", "Backdoor.CPEX.Win32.21496", "Trojan/Inject.aisx", "Trojan.Heur.E7B492", "Trojan.Win32.A.Inject.48640.F", "TrojWare.Win32.Pincav.N", "Trojan.PWS.Reggin.91", "BehavesLike.Win32.Ramnit.pc", "Trojan.Win32.Inject", "Trojan/Inject.hnq", "Troj.W32.Inject.aisx!c", "Trojan/Win32.OnlineGameHack.R2669", "PWS-OnlineGames.ge", "BScope.TrojanPSW.Magania.1314", "Trojan.Inject!H2RbMIi2jvQ", "Trj/Inject.IR", "Win32/Trojan.65a" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.Tregwihc.Trojan", "Trojan.Inject.GK", "Worm/W32.AutoRun.114688", "W32/Autorun.worm.dw", "W32/AutoRun.lrf", "TROJ_FAM_0000e93.TOMA", "Win32.Trojan.WisdomEyes.16070401.9500.9992", "W32/Worm.FWLR-5025", "Trojan.Minit", "Win32/Milsni.D", "TROJ_FAM_0000e93.TOMA", "Win.Worm.Autorun-376", "Win32.Rootkit.Uroburos.C", "Trojan.Inject.GK", "Trojan.Win32.AutoRun.ftwn", "Worm.Win32.Autorun.114688.I", "W32.W.AutoRun.lrf!c", "Trojan.Inject.GK", "Worm.Win32.AutoRun.COB", "Trojan.Inject.GK", "Win32.HLLW.Autoruner.5122", "Worm.AutoRun.Win32.35", "W32/Autorun.worm.dw", "W32/Worm.AKXJ", "Worm/AutoRun.fma", "Worm:Win32/Yacspeel.A.dll", "WORM/Autorun.Byt.34", "Worm/Win32.AutoRun", "Worm:Win32/Yacspeel.A.dll", "Worm/Win32.AutoRun.R1836", "Trojan.Inject.GK", "Worm.Win32.AutoRun.byt", "Trj/Autorun.RN", "Win32/AutoRun.COB", "Win32.Worm.Autorun.Lohz", "Virus.Win32.AutoRun.sd", "W32/AutoRun.BDJ!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "LNK.Trojan.3171", "LNK/Trojan.TPJW-5", "LNK_ARGULONG.SMLNK", "HEUR:Trojan.WinLNK.Powecod.a", "LNK_ARGULONG.SMLNK", "LNK/Trojan.TPJW-5", "HEUR:Trojan.WinLNK.Powecod.a", "Trojan.LNK", "virus.lnk.powershell.a" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "]", "commediauploader", "[", "." ]
[ 9, 9, 1, 9 ]
[ "A", "backdoor", "also", "known", "as:", "W32.SasfisB.Worm", "Win32.Worm.Wukill.D", "Email-Worm.Win32.Rays!O", "Worm.WuKill", "Worm.Rays.Win32.1", "Worm.Wukill", "Win32.Worm-Email.Rays.a", "W32.Wullik@mm", "Win.Worm.Rays-1", "Email-Worm.Win32.Rays.d", "Win32.Worm.Wukill.D", "Trojan.Win32.Rays.cvmxdt", "W32.W.Basun.lwAE", "Trojan.Win32.FakeFolder.wid", "Win32.Worm.Wukill.D", "Win32.Worm.Wukill.D", "Win32.HLLM.Xgray", "Email-Worm.Win32.Rays", "Worm.Rays.d.49152", "Win32.Worm.Wukill.D", "I-Worm.Win32.Rays.49152", "Email-Worm.Win32.Rays.d", "Win32.Trojan.Wukill.B", "Win32/Rays.worm.15024", "Win32.Worm.Wukill.D", "SScope.Trojan.VBRA.4977", "I-Worm.Wukill.B", "W32/Fawkes.A!worm" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "document", "contains", "an", "encoded", "Visual", "Basic", "Script", "VBScript", "typical", "of", "previous", "Carbanak", "malware." ]
[ 16, 1, 16, 16, 16, 1, 9, 9, 9, 16, 16, 16, 3, 11 ]
[ "A", "backdoor", "also", "known", "as:", "W32/Fynloski.H", "Win32.Trojan", "Trojan.MSIL.Crypt.cxp", "Trojan.Inject.54745", "TR/PSW.Fignotok.LW", "Trojan-Dropper.Small!IK", "Trojan/Jorik.ovo", "TrojanDownloader:Win32/Batosecu.A", "Trojan/Win32.Jorik", "Trojan.Jorik.Fynloski.ft", "Trojan-Dropper.Small", "Trj/CI.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Joke.Jepruss", "Hoax.Win32.BadJoke!O", "Joke.Russianjep", "Joke.Jepruss", "Joke.Jepruss", "W32/Joke.NX", "Joke.JepRuss", "JOKE_ONLYGAME.A", "Win.Joke.Jep-1", "Joke.Jepruss", "Hoax.Win32.BadJoke.JepRuss", "Joke.Jepruss", "Riskware.Win32.JepRuss.hybz", "Joke.Win32.FakeScreen", "Hoax.W32.BadJoke.JepRuss!c", "Joke.Jepruss", "Joke.Win32.Jep.Russ", "Joke.Jepruss", "Joke.Justgame", "Tool.BadJoke.Win32.23", "JOKE_ONLYGAME.A", "W32/Joke.TMKA-5158", "not-virus:Joke.Win32.JepRuss", "HackTool[Hoax]/Win32.JepRuss", "Win32.Joke.JepRuss.kcloud", "Hoax.Win32.BadJoke.JepRuss", "Win-Joke/Delete_Game.916512", "Win32/Jep.Russ", "Win32.Trojan-psw.Badjoke.Lmkt", "Trojan.Jep!7Qg0TmyJLB0", "Joke.Win32.RussianJep" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Seimon.G", "Trojan.Seimon.G", "Trojan.Seimon.G", "Trojan.Seimon!4f7JwSpV94c", "Trojan.Seimon.G", "TrojWare.Win32.Trojan.Seimon.G0", "Trojan.Seimon.G", "Trojan.DownLoad.3195", "BehavesLike.Win32.PWSGamania.lh", "W32/PhishExe.B!tr.dldr", "Trojan[:HEUR]/Win32.Unknown", "Trojan.Seimon.G", "Trojan/Win32.Casino", "BScope.Trojan-Downloader.ILoveLanch.pj", "Virus.Win32.Cloaker", "Trojan.Seimon.G" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9563", "W32/Application.THZK-5586", "BehavesLike.Win32.BadFile.rc", "Trojan.Win32.PSW", "Trojan.Application.Zusy.D3D00C", "Trj/GdSda.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1 ]
[ "WolfRAT", "application", "screen", "The", "Google", "GMS", "and", "Firebase", "service", "has", "been", "added", ",", "however", ",", "no", "configuration", "has", "been", "found", ",", "even", "though", "services", "seem", "to", "be", "referenced", "in", "the", "of", "a", "new", "class", "." ]
[ 3, 16, 16, 16, 5, 13, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "page", "was", "designed", "to", "steal", "users", "’", "bank", "card", "details", ":", "2017–2018", "From", "early", "2017", ",", "the", "HTML", "phishing", "pages", "bank.html", ",", "update.html", "and", "extortionist.html", "started", "appearing", "in", "the", "assets", "folder", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 1, 16, 1, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Win32.KillFiles!O", "Trojan.Birele", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "W32/Risk.GBTW-1754", "Ransom_Birele.R038C0DLB17", "Trojan-Ransom.Win32.Birele.gss", "Trojan.Win32.Dropper.rpje", "Trojan.Win32.Scar.56320.B", "Troj.Ransom.W32.Birele!c", "Worm.Win32.Autorun.GVIT", "Trojan.MulDrop1.6138", "Trojan.Birele.Win32.7887", "BehavesLike.Win32.Ransom.fc", "Virus.Win32.VBInject", "W32/MalwareS.BBSH", "Trojan/Scar.pgv", "Trojan/Win32.KillFiles", "PWS:Win32/Kiction.A", "Trojan.Zusy.DAEF", "Trojan/Win32.Scar.R18936", "Trojan-Ransom.Win32.Birele.gss", "Worm.Spreader", "Worm.AutoRun", "Win32.Trojan.Birele.Pgda", "W32/KillFiles.GMU!tr", "Win32/Trojan.Ransom.f31" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Here", "is", "a", "command", "and", "control", "protocol", "fragment", ":", "Commands", "from", "C2", "server", "parsing", "In", "total", ",", "the", "malicious", "APK", "handles", "16", "different", "commands", ":", "Command", "Endpoint", "Description", "1", "reqsmscal.php", "Send", "specified", "SMS", "message", "2", "reqsmscal.php", "Call", "specified", "number", "3", "reqsmscal.php", "Exfiltrate", "device", "info", ",", "such", "as", "phone", "model", "and", "OS", "version", "4", "reqsmscal.php", "Exfiltrate", "a", "list", "of", "all", "installed", "applications", "5", "reqsmscal.php", "Exfiltrate", "default", "browser", "history", "(", "limited", "to", "a", "given", "date", ")", "6", "reqsmscal.php", "Exfiltrate", "Chrome", "browser", "history", "(", "limited", "to", "a", "given", "date", ")", "7", "reqsmscal.php", "Exfiltrate", "memory", "card", "file", "structure", "8", "reqsmscal.php", "Record", "surrounding", "sound", "for", "80", "seconds", "1", "reqcalllog.php", "Exfiltrate", "all", "call", "logs", "2", "reqcalllog.php", "Exfiltrate", "all", "SMS", "messages", "3", "reqcalllog.php", "Upload", "specified", "file", "from", "the", "device", "to", "the", "C2", "4", "reqcalllog.php", "Download", "file", "from", "specified", "URL", "and", "save", "on", "device", "5", "reqcalllog.php", "Delete", "specified", "file", "6,7,8", "reqcalllog.php", "Commands", "not", "yet", "implemented", "9", "reqcalllog.php", "Take", "photo", "(", "muted", "audio", ")", "with", "rear", "camera", ",", "send", "to", "C2", "10", "reqcalllog.php", "Take", "photo", "(", "muted", "audio", ")", "with", "front", "camera", ",", "send", "to", "C2", "All", "observed", "samples", "with", "Smali", "injections", "were", "signed", "by", "the", "same", "debug", "certificate", "(", "0x936eacbe07f201df", ")", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "It", "will", "also", "report", "the", "version", "of", "Android", "that", "the", "phone", "is", "running", "and", "any", "additional", "capabilities", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "In", "the", "beginning", ",", "this", "threat", "group", "mainly", "targeted", "Asian", "countries", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "If", "Google", "Play", "Protect", "detects", "one", "of", "these", "apps", ",", "Google", "Play", "Protect", "will", "show", "a", "warning", "to", "users", "." ]
[ 16, 5, 13, 13, 16, 16, 16, 16, 16, 16, 5, 13, 13, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Jacard", "Win32.Trojan.WisdomEyes.16070401.9500.9987", "W32/Trojan.YDYO-6019", "Trojan-Banker.BestaFera", "Trojan-Banker.Win32.BestaFera.amyc", "Trojan.Win32.Banker.euxhdn", "Trojan.Win32.Z.Jacard.2528768", "BehavesLike.Win32.BadFile.vh", "TR/Spy.Banker.vvhlz", "Trojan[Banker]/Win32.BestaFera", "TrojanDownloader:Win32/Qulkonwi.A", "Trojan.Jacard.D8CA", "Trojan-Banker.Win32.BestaFera.amyc", "Trj/GdSda.A", "Win32.Trojan-banker.Bestafera.Wmsm", "W32/Banker.ADUT!tr.spy", "Win32/Trojan.252" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Recently", "the", "Mobile", "Malware", "Research", "Team", "of", "Intel", "Security", "found", "on", "Google", "Play", "a", "new", "campaign", "of", "Android/Clicker.G", "in", "dozens", "of", "published", "malicious", "apps." ]
[ 16, 16, 4, 12, 12, 12, 12, 12, 12, 16, 16, 5, 13, 16, 16, 6, 16, 1, 16, 16, 16, 16, 5, 13 ]
[ "According", "to", "Google", ",", "whom", "we", "have", "contacted", "to", "alert", "about", "our", "discoveries", ",", "nearly", "25", "variants", "of", "this", "spyware", "were", "uploaded", "on", "Google", "Play", "Store", "." ]
[ 16, 16, 4, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 13, 16 ]
[ "AlienVault", "Labs", "has", "extracted", "related", "samples", "and", "located", "the", "infrastructure", "used", "by", "attackers" ]
[ 4, 12, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 6 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Brackash.C", "Trojan.Brackash.C", "Win32.Trojan.WisdomEyes.16070401.9500.9774", "Trojan.Win32.Sadenav.b", "Trojan.Brackash.C", "Trojan.Brackash.C", "Brackash.dll", "Virus.Trojan.Win32.Sadenav", "Trojan/Sadenav.aic", "W32.Trojan.Brackash.C", "TR/Brackash.C100.2", "Trojan/Win32.Sadenav", "Trojan.Brackash.C", "Trojan.Win32.Sadenav.b", "Trojan/Win32.Sadenav.R1894", "Brackash.dll", "Trojan.Brackash.C" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "One", "of", "the", "most", "common", "ways", "to", "do", "this", "is", "by", "displaying", "advertisements", "to", "users", "or", "by", "offering", "in-app", "purchases", "IAPs." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "In", "doing", "so", ",", "users", "can", "become", "victims", "to", "malicious", "apps", "portraying", "themselves", "as", "the", "original", "app", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "In", "reality", ",", "this", "downloaded", "app", "is", "a", "fake", "app", "that", "asks", "for", "credentials", "and", "Android", "permissions", "(", "including", "camera", "and", "phone", "permissions", ")", ",", "resulting", "in", "the", "user", "being", "bombarded", "with", "advertisements", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "This", "blog", "post", "outlines", "the", "details", "about", "the", "campaign", "that", "we", "discovered." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 6, 16, 16, 16 ]
[ "The", "local", "privileges", "escalation", "backdoor", "code", "for", "debugging", "ARM-powered", "Android", "devices", "managed", "to", "make", "its", "way", "in", "shipped", "firmware", "after", "firmware", "makers", "wrote", "their", "own", "kernel", "code", "underneath", "a", "custom", "Android", "build", "for", "their", "devices", ",", "though", "the", "mainstream", "kernel", "source", "is", "unaffected", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 5, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "server", "can", "use", "this", "information", "to", "determine", "if", "the", "user", "’", "s", "carrier", "is", "one", "of", "Bread", "’", "s", "targets", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16 ]
[ "A", "new", "CC", "infrastructure", "consisting", "of", "a", "climbing", "club", "website." ]
[ 16, 16, 5, 13, 16, 16, 1, 9, 9, 9 ]
[ "A", "backdoor", "also", "known", "as:", "O97M.Dropper.BR", "W97M.Downloader", "W2000M/Dldr.Rogue.aipbta", "HEUR.VBA.Trojan.e", "virus.office.qexvmc.1095" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.BackdoorSlingup.Trojan", "Trojan/W32.Fsysna.77824.F", "Heur.Win32.VBKrypt.3!O", "Backdoor.Slingup.MF.150", "Win32.Worm.VB.rt", "W32/Trojan.XMLD-4299", "W32.Difobot", "BKDR_GORYNYCH.SM", "Trojan.Win32.Fsysna.ccit", "Trojan.Win32.Fsysna.dwujaf", "Troj.W32.Fsysna.tnPd", "Trojan.DownLoader14.15241", "Trojan.Fsysna.Win32.7242", "BKDR_GORYNYCH.SM", "BehavesLike.Win32.Backdoor.lt", "Worm.Win32.VB", "W32/Trojan3.TRB", "Trojan/Fsysna.dgo", "Trojan/Win32.Fsysna", "Trojan.Win32.Fsysna.ccit", "Trojan/Win32.VBInject.R158763", "Trojan.Fsysna", "Trojan.Reconyc", "Win32/VB.OOB", "Win32.Trojan.Fsysna.Phgj" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor:MSIL/Hulpob.A" ]
[ 16, 3, 16, 16, 16, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Fsysna", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "W32/Trojan.HAEY-9385", "Trojan.Bisonal", "Trojan.Win32.Fsysna.ccap", "Troj.W32.Fsysna!c", "Trojan.DownLoad3.19183", "BehavesLike.Win32.Dropper.vz", "Trojan.Win32.Fsysna.ccap", "Trojan:Win32/Korlia.C", "Win-Trojan/Biscon.3140", "Trj/CI.A", "Win32.Trojan.Fsysna.Tayn", "W32/Fsysna.CCAP!tr", "Win32/Trojan.732" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "In", "addition,", "the", "compromised", "devices", "were", "pushed", "Trojan", "updates,", "which", "allowed", "the", "attackers", "to", "extend", "their", "capabilities." ]
[ 16, 16, 16, 5, 13, 16, 16, 3, 11, 16, 16, 16, 6, 16, 16, 16, 16 ]
[ "In", "February", "2016", "one", "of", "the", "largest", "cyber", "heists", "was", "committed", "and", "subsequently", "disclosed." ]
[ 16, 0, 8, 16, 16, 16, 6, 14, 14, 16, 16, 16, 16, 16 ]
[ "Cyber", "espionage", "actors,", "now", "designated", "by", "FireEye", "as", "APT32", "OceanLotus", "Group,", "are", "carrying", "out", "intrusions", "into", "private", "sector", "companies", "across", "multiple", "industries", "and", "have", "also", "targeted", "foreign", "governments,", "dissidents,", "and", "journalists." ]
[ 6, 14, 14, 16, 16, 16, 4, 16, 6, 14, 14, 16, 16, 16, 1, 16, 4, 12, 12, 16, 16, 4, 16, 16, 16, 16, 4, 12, 12, 16, 4 ]
[ "The", "infected", "apps", "in", "this", "campaign", "were", "downloaded", "several", "million", "times", "by", "unsuspecting", "users." ]
[ 16, 5, 13, 16, 16, 6, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Charger", "was", "found", "embedded", "in", "an", "app", "called", "EnergyRescue", "." ]
[ 3, 16, 16, 16, 16, 16, 16, 16, 3, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.Bot.MSIL", "Trojan.Win32.StartPage.czmqzt", "Trojan.DownLoader12.20620", "BehavesLike.Win32.Backdoor.ch", "TR/Dropper.MSIL.47116", "MSIL/StartPage.AI!tr", "Trj/CI.A", "Msil.Trojan.Dropper.Hqll", "Trojan.MSIL.StartPage", "MSIL3.BCNZ", "Trojan.MSIL.StartPage.AI" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Primarily", "targets", "users", "in", "Brazil", "with", "fake", "attatchments,", "for", "example:", "Auto_De_Infracao_e_Sua_Notificacao_493275324.exe" ]
[ 16, 16, 16, 16, 2, 16, 1, 9, 16, 16, 1 ]
[ "The", "connection", "between", "the", "two", "campaigns", "remains", "unclear", ",", "and", "it", "is", "possible", "that", "one", "borrowed", "code", "from", "the", "other", ",", "knowingly", "or", "unknowingly", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "This", "is", "named", "Red", "Leaves", "after", "strings", "found", "in", "the", "malware." ]
[ 16, 16, 16, 6, 14, 16, 16, 16, 16, 16, 3 ]
[ "Reflection", "Most", "methods", "for", "hiding", "API", "usage", "tend", "to", "use", "Java", "reflection", "in", "some", "way", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "malware", "first", "discovery", "was", "after", "a", "highly", "Libyan", "influential", "Telegram", "account", "compromised", "via", "web" ]
[ 16, 3, 16, 16, 16, 16, 16, 4, 12, 12, 1, 9, 9, 16, 7 ]
[ "Recently,", "we", "saw", "an", "app", "that", "leads", "to", "a", "third-party", "app", "store", "being", "offered", "on", "the", "official", "iOS", "App", "Store." ]
[ 16, 16, 16, 16, 3, 16, 16, 16, 16, 5, 13, 13, 16, 16, 16, 16, 5, 13, 13, 13 ]
[ "This", "paper", "presents", "ESET's", "findings", "about", "Operation", "Groundbait", "based", "on", "our", "research", "into", "the", "Prikormka", "malware", "family." ]
[ 16, 16, 16, 4, 16, 16, 6, 14, 16, 16, 16, 16, 16, 16, 3, 11, 11 ]
[ "A", "backdoor", "also", "known", "as:", "Worm.Win32.AutoRun!O", "Worm.AutoRun.13924", "W32.W.Fearso.kYUv", "HT_STARTPAGE_FB090419.UVPM", "Win32.Trojan.Delf.it", "HT_STARTPAGE_FB090419.UVPM", "Win.Trojan.Delf-1006", "Trojan.Win32.Fsysna.digg", "TrojWare.Win32.Magania.~AD", "Worm.Delf.Win32.1099", "Trojan[GameThief]/Win32.Nilage", "Trojan.Jacard.D150AA", "Trojan.Win32.Fsysna.digg", "HackTool.Win32.InjectDll.a", "Trojan.Crypt" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "In", "the", "course", "of", "our", "research", "we", "uncovered", "the", "activity", "of", "a", "hacking", "group", "which", "has", "Chinese", "origins." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 6, 14, 16, 16, 2, 10 ]
[ "This", "means", "that", "all", "apps", "that", "were", "using", "this", "file", "will", "lose", "some", "functionality", "or", "even", "start", "crashing", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Win32/Darby.N", "Win32.Worm.P2p.Darby.N", "Worm/W32.Darby.140470", "W32.W.Darby.n!c", "Win32.Worm.P2p.Darby.N", "Worm.P2P.Darby!NxHEqfnePM8", "W32/Darby.M", "W32.HLLW.Darby", "Win32/Darby.N", "P2P-Worm.Win32.Darby.n", "Trojan.Win32.Darby.epif", "Worm.Win32.Darby.140470.B[h]", "Win32.Worm.P2p.Darby.N", "Worm.Win32.Darby.N", "Win32.Worm.P2p.Darby.N", "BehavesLike.Win32.MultiDropper.cc", "W32/Darby.KOEV-0225", "Worm/Darby.f", "WORM/Darby.N", "W32/Darby.N!tr", "Worm[P2P]/Win32.Darby", "Win32.Worm.P2p.Darby.N", "Win32/Darby.worm.140470", "Worm:Win32/Darby.N", "Virus.Win32.Heur.p", "Win32.Worm-p2p.Darby.Pdwh", "P2P-Worm.Win32.Darby", "Win32.Worm.P2p.Darby.N", "Worm/Darby.P" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Yesterday,", "Microsoft", "patched", "CVE-2015-2424,", "a", "vulnerability", "in", "Microsoft", "Office", "discovered", "by", "iSIGHT", "Partners", "while", "monitoring", "the", "Russian", "cyber", "espionage", "team", "we", "call", "Tsar", "Team." ]
[ 16, 4, 16, 1, 16, 7, 16, 5, 13, 16, 16, 4, 12, 16, 16, 16, 6, 14, 14, 14, 16, 16, 6, 14 ]
[ "All", "the", "IP", "addresses", "belong", "to", "the", "same", "company", "Hetzner", ",", "an", "IP-hosting", "firm", "in", "Germany", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.HfsIemusi.2209", "W32/Trojan.GCQE-8180", "DDOS_HPNITOL.SM", "Trojan.Boht", "Trojan.Win32.DownLoad.bfqxfq", "Troj.W32.Vilsel.lmbl", "Trojan.DownLoad3.40817", "BehavesLike.Win32.HLLPPhilis.lc", "Backdoor:Win32/Bezigate.B", "Trj/CI.A", "Win32/Delf.AJG", "Backdoor.Win32.PcClient", "W32/Inject.VXTT!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Distribution", "via", "botnets", "." ]
[ 16, 16, 16, 16 ]
[ "The", "embedded", "app", "appears", "to", "be", "a", "media", "player", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "real", "C", "&", "C", "address", "is", "encoded", "in", "the", "Twitter", "names", ",", "and", "can", "only", "be", "revealed", "once", "decoded", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Oftentimes", ",", "the", "emailed", "link", "is", "a", "bit.ly", "shortened", "link", ",", "used", "to", "potentially", "evade", "detection", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "]", "com", "hxxp", ":", "//mailsa-wqw", "[", "." ]
[ 9, 9, 1, 9, 9, 9, 9 ]
[ "It", "eventually", "kills", "all", "threads", "that", "belong", "to", "these", "undesired", "modules", "(", "using", "ZwQueryInformationThread", "native", "API", "with", "ThreadQuerySetWin32StartAddress", "information", "class", ")", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "During", "an", "incident", "response", "engagement", "in", "September", "2016,", "SecureWorks®", "incident", "response", "analysts", "observed", "payment", "card", "data", "being", "collected", "by", "a", "generic", "remote", "access", "trojan", "RAT", "rather", "than", "typical", "memory-scraping", "malware." ]
[ 16, 16, 16, 16, 16, 16, 0, 8, 4, 12, 12, 12, 16, 1, 9, 9, 9, 9, 16, 16, 3, 11, 11, 11, 11, 16, 16, 3, 11, 11 ]
[ "The", "said", "attackers,", "who", "showed", "familiarity", "and", "in-depth", "knowledge", "of", "their", "agencies'", "network", "topology,", "tools,", "and", "software,", "were", "able", "to", "gain", "access", "to", "their", "targeted", "servers", "and", "install", "malware." ]
[ 16, 16, 6, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 13, 13, 13, 13, 16, 16, 16, 1, 9, 16, 16, 5, 13, 16, 16, 3 ]

CyNER 2.0 Augmented Dataset

CyNER 2.0 Augmented Dataset is a comprehensive dataset designed for Named Entity Recognition (NER) tasks, specifically tailored for cybersecurity-related text. This dataset combines an original cybersecurity NER dataset (bnsapa/cybersecurity-ner) with additional augmented data (taken from OPENCTI using AlienValut Connect), resulting in a robust resource for training and evaluating models on cybersecurity entity recognition.

Dataset Overview

The dataset is divided into three splits:

  • Train: 7,751 examples
  • Validation: 1,661 examples
  • Test: 1,662 examples

Each example in the dataset consists of a sequence of tokens and their corresponding NER tags. The dataset has been carefully preprocessed to ensure high quality and consistency. The dataset mostly contains threat and intelligence report descriptions from the Alien Vault

Features

  • tokens: A sequence of strings representing the tokens in the text.

  • ner_tags: A sequence of strings representing each token's Named Entity Recognition tags.

NER Tags

The NER tags follow the BIO (Begin, Inside, Outside) tagging format and cover various cybersecurity-related entities, including but not limited to:

  • B-Indicator: Indicators of Compromise (IOCs) such as IP addresses, file hashes, and domain names.
  • I-Indicator: Continuation of an Indicator entity.
  • B-Malware: Names of malware, trojans, or viruses.
  • I-Malware: Continuation of a Malware entity.
  • B-Organization: Names of organisations, companies, or groups.
  • I-Organization: Continuation of an Organization entity.
  • B-System: Operating systems, software, and platforms.
  • I-System: Continuation of a System entity.
  • B-Vulnerability: Known vulnerabilities or CVEs (Common Vulnerabilities and Exposures).
  • I-Vulnerability: Continuation of a Vulnerability entity.
  • B-ThreatActor: Threat actor names or groups (e.g., Threat_group).
  • I-ThreatActor: Continuation of a ThreatActor entity.
  • B-Date: Specific dates related to incidents or reports.
  • I-Date: Continuation of a Date entity.
  • O: Outside of any named entity.

Usage

This dataset is suitable for training, fine-tuning, and evaluating NER models, particularly those designed for cybersecurity applications. It has been structured to work seamlessly with popular NLP frameworks such as Hugging Face's transformers and dataset libraries.

License

This dataset is released under the MIT License, which allows for open and flexible usage with minimal restrictions. Users are free to use, modify, and distribute the dataset, provided that proper attribution is given to the original creators.

Citation

If you use this dataset in your research, please cite it as follows:

@dataset{pranava_kailash_2024_cyner,
  title={CyNER 2.0 Augmented Dataset},
  author={Pranava Kailash},
  year={2024},
  howpublished={Hugging Face, https://huggingface.co/datasets/PranavaKailash/CyNER2.0_augmented_dataset},
  license={MIT}
}

Contact

For questions or issues regarding the dataset, please get in touch with pranavakailashsp@gmail.com.

Downloads last month
33
Edit dataset card

Models trained or fine-tuned on PranavaKailash/CyNER2.0_augmented_dataset