tokens
sequencelengths 2
296
| ner_tags
sequencelengths 2
296
|
---|---|
[
"It",
"includes",
"recent",
"incidents",
"as",
"well",
"as",
"older",
"ones",
"that",
"have",
"not",
"been",
"publicly",
"reported;",
"new",
"malware;",
"exploitation,",
"delivery",
"and",
"command",
"and",
"control",
"infrastructure;",
"and",
"the",
"group",
"s",
"modus",
"operandi."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
5,
13,
13,
13,
16,
6,
14,
16,
16,
16
] |
[
"That",
"domain,",
"electronicfrontierfoundation.org,",
"is",
"designed",
"to",
"trick",
"users",
"into",
"a",
"false",
"sense",
"of",
"trust",
"and",
"it",
"appears",
"to",
"have",
"been",
"used",
"in",
"a",
"spear",
"phishing",
"attack,",
"though",
"it",
"is",
"unclear",
"who",
"the",
"intended",
"targets",
"were."
] | [
16,
1,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Last",
"week,",
"Unit",
"42",
"came",
"across",
"new",
"Disttrack",
"samples",
"that",
"appear",
"to",
"have",
"been",
"used",
"in",
"an",
"updated",
"attack",
"campaign."
] | [
16,
16,
4,
12,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
6,
14
] |
[
"The",
"proliferation",
"of",
"Android",
"devices",
"β",
"from",
"smartphones",
"to",
"tablets",
"and",
"smart",
"TVs",
"β",
"has",
"opened",
"up",
"new",
"possibilities",
"for",
"malware",
"developers",
",",
"as",
"all",
"these",
"devices",
"pack",
"microphones",
",",
"cameras",
"and",
"location-tracking",
"hardware",
"they",
"can",
"turn",
"into",
"the",
"perfect",
"spy",
"tools",
"."
] | [
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"For",
"instance,",
"its",
"JHUHUGIT",
"implant",
"was",
"delivered",
"through",
"a",
"Flash",
"zero-day",
"and",
"used",
"a",
"Windows",
"EoP",
"exploit",
"to",
"break",
"out",
"of",
"the",
"sandbox."
] | [
16,
16,
16,
3,
11,
16,
16,
16,
16,
7,
15,
16,
16,
16,
3,
11,
11,
16,
16,
16,
16,
16,
16
] |
[
"However",
",",
"our",
"data",
"suggests",
"that",
"there",
"have",
"been",
"at",
"least",
"2,729",
"infections",
"between",
"January",
"2016",
"and",
"early",
"April",
"2016",
",",
"with",
"a",
"peak",
"in",
"March",
"of",
"more",
"than",
"1,100",
"infections",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"group",
"is",
"well",
"resourced,",
"capable",
"of",
"infiltrating",
"multiple",
"targets",
"simultaneously",
"and",
"will",
"often",
"operate",
"outside",
"the",
"working",
"hours",
"of",
"targeted",
"organizations",
"in",
"order",
"to",
"maintain",
"a",
"low",
"profile."
] | [
6,
14,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
16,
16,
16,
16,
16,
16
] |
[
"All",
"of",
"the",
"files",
"that",
"are",
"being",
"uploaded",
"or",
"downloaded",
"are",
"zip",
"files",
"encrypted",
"by",
"AES",
"with",
"ECB",
"mode",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"TROJ_BREDLAB.SMD",
"Trojan-Spy.Win32.Spenir.as",
"Application.Win32.BlkIC.IMG",
"TROJ_BREDLAB.SMD",
"Backdoor/SdBot.prb",
"HeurEngine.ZeroDayThreat",
"Trojan.Win32.ProcessHijack"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1
] |
[
"]",
"infodavos-seaworth",
"[",
"."
] | [
16,
16,
16,
16
] |
[
"It",
"continues",
"to",
"spread",
"across",
"small",
"and",
"medium-sized",
"businesses",
"across",
"the",
"globe,",
"using",
"the",
"modular",
"Gorynych/Diamond",
"Fox",
"botnet",
"to",
"exfiltrate",
"stolen",
"data."
] | [
16,
16,
16,
16,
16,
4,
16,
4,
12,
16,
16,
2,
16,
16,
16,
3,
11,
11,
16,
1,
9,
9
] |
[
"Find",
"out",
"more",
"about",
"the",
"7",
"Android",
"Security",
"Hacks",
"You",
"Need",
"to",
"Do",
"Right",
"Now",
"to",
"keep",
"your",
"mobile",
"data",
"safe",
"."
] | [
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Hoax.Win32.ArchSMS!O",
"Trojan.Mobsularch",
"Trojan.ArchSMS.Win32.7426",
"Trojan/ArchSMS.nkit",
"Win32.Trojan.WisdomEyes.16070401.9500.9644",
"TROJ_MALICIOUS_BK083028.TOMC",
"Win.Trojan.Archsms-4649",
"Riskware.Win32.ArchSMS.cqmlwf",
"TrojWare.Win32.Zusy.AJ",
"Trojan.Fraudster.336",
"Trojan-Banker.Win32.Banbra",
"Hoax.ArchSMS.jho",
"HackTool[Hoax]/Win32.ArchSMS",
"Win32.Troj.Hoax.kcloud",
"Trojan:Win32/Mobsularch.A",
"Trojan.Strictor.548",
"Win32.Trojan.ArchSMS.D",
"Hoax.ArchSMS.nk",
"Trojan.ArchSMS!pTXIElAMXBk",
"W32/ArchSMS.VU!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"This",
"is",
"done",
"using",
"a",
"series",
"of",
"syscalls",
"as",
"outlined",
"below",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Palo",
"Alto",
"Networks",
"has",
"collected",
"over",
"20",
"samples",
"of",
"this",
"particular",
"malware",
"family,",
"and",
"we",
"have",
"identified",
"over",
"$70,000",
"USD",
"in",
"Bitcoin",
"payments",
"to",
"the",
"attacker",
"Cisco",
"Talos",
"yesterday",
"reported",
"this",
"figure",
"to",
"be",
"closer",
"to",
"$115,000",
"USD."
] | [
4,
12,
12,
16,
16,
16,
16,
3,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
1,
9,
9,
9,
9,
16,
16,
6,
4,
12,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"]",
"infokalisi",
"[",
"."
] | [
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Pitit.A3",
"HV_ABTITU_CG093139.RDXN",
"TR/Barys.2445.24",
"Win32.Troj.Undef.kcloud",
"Trojan.Kazy",
"Trojan.Win32.Loader.L"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1
] |
[
"A",
"collection",
"of",
"domains",
"registered",
"by",
"Pawn",
"Storm/Sofacy/APT28/Fancy",
"Bear",
"to",
"target",
"organisations"
] | [
16,
16,
16,
1,
16,
16,
6,
14,
14,
16,
16,
4
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.CoinMiner.A4",
"PUP.Optional.ChinAd",
"W32.XiaobaMiner",
"Win32/Oflwr.A!crypt",
"Win.Trojan.Qhost-160",
"Trojan.Win32.BtcMine.exddfs",
"Tool.BtcMine.1051",
"BehavesLike.Win32.Ransomware.th",
"W32.Trojan.Qhost",
"RiskWare/Win32.BitMiner.h",
"Trojan.Forcud"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"While",
"it",
"has",
"become",
"common",
"to",
"see",
"new",
"ransomware",
"variants",
"being",
"distributed",
"daily,",
"it",
"is",
"not",
"as",
"common",
"to",
"find",
"new",
"ransomware",
"infections",
"being",
"distributed",
"via",
"exploit",
"kits."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
1,
16,
16,
16,
3,
11
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"HW32.Packed.1FBC",
"Win32.Trojan.WisdomEyes.16070401.9500.9950",
"Win.Exploit.Countdown-1",
"BackDoor.Meterpreter.37",
"Troj.W32.Jorik.Skor.lrUS",
"Trojan:Win64/Meterpreter.A",
"Trojan/Win32.Swrort.C695042"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1
] |
[
"We",
"previously",
"highlighted",
"the",
"dangers",
"of",
"installing",
"apps",
"that",
"enable",
"IAPs",
"using",
"SMS",
"messages,",
"as",
"these",
"apps",
"typically",
"have",
"access",
"to",
"all",
"SMS",
"messages",
"sent",
"to",
"the",
"phone."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
7,
15,
15,
15,
15,
15,
16,
16,
16,
16,
16,
7,
15,
15,
15,
15,
16,
16,
16,
16
] |
[
"U.S.",
"Allies",
"and",
"Rivals",
"Digest",
"Trump's",
"Victory",
"-",
"Carnegie",
"Endowment",
"for",
"International",
"Peace.docm"
] | [
4,
12,
16,
4,
12,
12,
12,
16,
16,
16,
16,
16,
1
] |
[
"Intrigued",
",",
"we",
"continued",
"our",
"search",
"and",
"found",
"more",
"interesting",
"clues",
"that",
"could",
"reveal",
"some",
"detailed",
"information",
"about",
"the",
"owners",
"of",
"the",
"infected",
"devices",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"In",
"the",
"example",
"server",
"response",
"below",
",",
"the",
"green",
"fields",
"show",
"text",
"to",
"be",
"shown",
"to",
"the",
"user",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"During",
"the",
"course",
"of",
"our",
"research,",
"it",
"became",
"evident",
"that",
"this",
"actor",
"had",
"not",
"built",
"uWarrior",
"from",
"scratch,",
"but",
"rather",
"opted",
"to",
"borrow",
"components",
"from",
"several",
"off-the-shelf",
"tools."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11
] |
[
"Hackers",
"made",
"a",
"modified",
"Linux",
"Mint",
"ISO,",
"with",
"a",
"backdoor",
"in",
"it,",
"and",
"managed",
"to",
"hack",
"the",
"Linux",
"Mint",
"website",
"to",
"point",
"to",
"it."
] | [
6,
16,
16,
16,
5,
13,
13,
16,
16,
3,
16,
16,
16,
16,
16,
1,
9,
9,
9,
9,
16,
16,
16,
16
] |
[
"Replicating",
"framework.jar",
"allows",
"the",
"app",
"to",
"intercept",
"and",
"modify",
"the",
"behavior",
"of",
"the",
"Android",
"standard",
"API",
"."
] | [
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan-Dropper.Win32.BindFile!O",
"Trojan/Dropper.BindFile.a",
"W32/Dropper.LIP",
"Trojan.Spy-681",
"Trojan-Dropper.Win32.BindFile.e",
"Trojan.Win32.BindFile.dcyo",
"Trojan.Win32.BindFile.188416",
"PE:Dropper.BindFile.h!1173781522",
"TrojWare.Win32.TrojanDropper.BindFile.A",
"Trojan.Progress.10",
"TrojanDropper.ExeBind.Mfc2",
"Dropper/Bindfile.496648",
"W32/Risk.SLHR-7237",
"Win32/TrojanDropper.BindFile.A",
"Trojan-Dropper.Win32.BindFile",
"W32/BindFile.A!tr",
"Trojan.Win32.BindFile.bA"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"attacks",
"described",
"here",
"begin",
"with",
"a",
"banking",
"credential",
"phishing",
"scheme",
",",
"followed",
"by",
"an",
"attempt",
"to",
"trick",
"the",
"victim",
"into",
"installing",
"Marcher",
",",
"and",
"finally",
"with",
"attempts",
"to",
"steal",
"credit",
"card",
"information",
"by",
"the",
"banking",
"Trojan",
"itself",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/Kryptik.aspo",
"JAVA_EXPLOIT.TCC",
"JAVA_EXPLOIT.TCC",
"Win.Trojan.Hydraq-219",
"Exploit.Java.CVE20131493.cqvzpg",
"Java.S.EX-CVE-2013-1493.206981",
"Exploit.Java.509",
"EXP/Java.HLP.JM",
"W32/Kryptik.ASPO",
"Trojan.Graftor.D13511",
"Exploit.Java.CVE-2013-1493",
"Java/Exploit.CVE-2013-1493.AL",
"Unk.Win32.Script.400440",
"Trojan.Plugax!dr/f2r5A7aY",
"Exploit.Java.HLP",
"virus.java.cve-2013-1493.c"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"We",
"have",
"seen",
"Angler",
"to",
"be",
"using",
"bedep",
"as",
"its",
"payload",
"but",
"adding",
"vawtrak",
"in",
"its",
"arsenal",
"is",
"something",
"we",
"haven't",
"seen",
"in",
"the",
"past",
"until",
"recently."
] | [
16,
16,
16,
3,
16,
16,
16,
3,
16,
16,
3,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Attackers",
"have",
"been",
"able",
"to",
"successfully",
"implant",
"JavaScript",
"code",
"on",
"the",
"login",
"pages",
"that",
"enables",
"them",
"to",
"surreptitiously",
"steal",
"employee",
"credentials",
"as",
"they",
"login",
"to",
"access",
"internal",
"corporate",
"resources."
] | [
6,
16,
16,
16,
16,
16,
1,
9,
16,
16,
16,
1,
9,
16,
16,
16,
16,
16,
1,
9,
9,
16,
16,
1,
9,
9,
9,
9,
9
] |
[
"Since",
"then",
",",
"the",
"implant",
"β",
"s",
"functionality",
"has",
"been",
"improving",
"and",
"remarkable",
"new",
"features",
"implemented",
",",
"such",
"as",
"the",
"ability",
"to",
"record",
"audio",
"surroundings",
"via",
"the",
"microphone",
"when",
"an",
"infected",
"device",
"is",
"in",
"a",
"specified",
"location",
";",
"the",
"stealing",
"of",
"WhatsApp",
"messages",
"via",
"Accessibility",
"Services",
";",
"and",
"the",
"ability",
"to",
"connect",
"an",
"infected",
"device",
"to",
"Wi-Fi",
"networks",
"controlled",
"by",
"cybercriminals",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Figure",
"8",
"."
] | [
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Dropper",
"BKDR_QBOT.SM",
"Win32.Trojan-Dropper.Small.s",
"Win32/Qakbot.KR",
"BKDR_QBOT.SM",
"Trojan.Win32.Gamania.tghgw",
"Trojan.Win32.A.Mbro.191488",
"Trojan.PWS.Gamania.36525",
"W32/Trojan.XMWQ-0223",
"Trojan[Backdoor]/Win32.QBot",
"TrojanDropper:Win32/Qakbot.A",
"Dropper/Win32.Injector.R30051",
"Win32/TrojanDropper.Small.NMS",
"Trojan.Kryptik!nABTr99RVjs",
"Backdoor.Win32.Qakbot",
"W32/Dropper.NMS!tr",
"Win32/Trojan.a58"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"You",
"can",
"check",
"the",
"status",
"of",
"Google",
"Play",
"Protect",
"on",
"your",
"device",
":",
"Open",
"your",
"Android",
"device",
"'s",
"Google",
"Play",
"Store",
"app",
"."
] | [
16,
16,
16,
16,
16,
16,
5,
13,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
13,
16,
16
] |
[
"All",
"of",
"these",
"Google",
"Play",
"Store",
"pages",
"have",
"been",
"taken",
"down",
"by",
"Google",
"."
] | [
16,
16,
16,
5,
13,
13,
16,
16,
16,
16,
16,
16,
4,
16
] |
[
"As",
"of",
"September",
"17th",
"Dyreza",
"now",
"counts",
"an",
"additional",
"twenty",
"organizations",
"directly",
"involved",
"in",
"Fulfillment",
"and",
"Warehousing;",
"four",
"software",
"companies",
"that",
"support",
"Fulfillment",
"and",
"Warehousing;",
"five",
"Wholesale",
"Computer",
"Distributors;",
"and",
"its",
"credential",
"theft",
"triggers",
"include",
"Apple,",
"Iron",
"Mountain,",
"OtterBox",
"and",
"Badge",
"Graphics",
"Systems",
"and",
"many",
"other",
"well-known",
"consumer-",
"and",
"business-facing",
"technology",
"and",
"service",
"brands."
] | [
16,
16,
0,
8,
3,
16,
16,
16,
16,
16,
4,
16,
16,
16,
4,
16,
4,
16,
4,
12,
16,
16,
4,
16,
4,
16,
4,
12,
12,
16,
16,
16,
16,
16,
16,
4,
12,
12,
12,
16,
4,
12,
12,
16,
16,
16,
16,
4,
16,
4,
12,
16,
4,
12
] |
[
"This",
"malware",
"possesses",
"the",
"ability",
"to",
"Collect",
"information",
"about",
"an",
"infected",
"computer",
"and",
"transfer",
"it",
"to",
"the",
"command",
"and",
"control",
"server."
] | [
16,
3,
16,
16,
16,
16,
16,
12,
16,
16,
5,
13,
16,
16,
16,
16,
16,
1,
9,
9,
9
] |
[
"Malware",
"isn't",
"usually",
"thought",
"to",
"be",
"old,",
"but",
"a",
"recent",
"phishing",
"campaign",
"using",
"the",
"MyDoom",
"worm",
"has",
"shown",
"that",
"old",
"tools",
"can",
"still",
"be",
"used",
"to",
"lure",
"users",
"into",
"malware."
] | [
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
6,
14,
16,
3,
11,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3
] |
[
"2015β2016",
"Starting",
"from",
"mid-2015",
",",
"the",
"Trojan",
"began",
"using",
"the",
"AES",
"algorithm",
"to",
"encrypt",
"data",
"communicated",
"between",
"the",
"infected",
"device",
"and",
"the",
"C",
"&",
"C",
":",
"Also",
"starting",
"with",
"the",
"same",
"version",
",",
"data",
"is",
"sent",
"in",
"a",
"POST",
"request",
"to",
"the",
"relative",
"address",
"with",
"the",
"format",
"β",
"/",
"[",
"number",
"]",
"β",
"(",
"a",
"pseudo-randomly",
"generated",
"number",
"in",
"the",
"range",
"0β9999",
")",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"SSL",
"is",
"typically",
"used",
"to",
"encrypt",
"data",
"between",
"the",
"client",
"and",
"the",
"server,",
"thus",
"making",
"the",
"content",
"unreadable",
"by",
"any",
"systems",
"sitting",
"between",
"the",
"two",
"end",
"points,",
"and",
"significantly",
"raising",
"the",
"cost",
"of",
"defence."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/W32.Zapchast.113152",
"Backdoor.KeyBoy",
"Trojan.Zapchast.Win32.29227",
"Trojan.Heur.LP.EDDB38",
"Win32.Trojan.WisdomEyes.151026.9950.9999",
"Backdoor.Kboy",
"Trojan.Win32.Zapchast.afhn",
"Trojan.Win32.Zapchast.cjltha",
"Win32.Trojan.Zapchast.Htcu",
"BehavesLike.Win32.GameVance.ch",
"Trojan/Zapchast.iik",
"TR/Spy.113152.29",
"Trojan/Win32.Zapchast",
"Backdoor.Win32.KeyBoy.113152[h]",
"Win-Trojan/Keyboy.113152",
"Trojan.Win32.Zapchast.afhn",
"Trojan.Zapchast!0ThicNhZU3g",
"Trojan.Win32.Zapchast",
"W32/Zapchast.AFHN!tr",
"Win32/Trojan.020"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Bot",
"communicates",
"with",
"the",
"botmaster",
"using",
"non-standard",
"protocol",
"built",
"on",
"top",
"of",
"TCP."
] | [
3,
16,
16,
16,
3,
16,
1,
9,
9,
9,
9,
9,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/W32.QQKiller.183808",
"Trojan.Qqkiller.A",
"Trojan.QQKiller.Win32.2",
"Trojan.Qqkiller.A",
"Trojan/QQKiller.a",
"Trojan.QQKiller!Y2SikmBtqEk",
"Win32/QQKiller.A",
"TROJ_QQKILLER.A",
"Trojan.Win32.QQKiller.a",
"Trojan.Win32.QQKiller.erxn",
"Trojan.Win32.A.QQKiller.183808[h]",
"Trojan.Qqkiller.A",
"TrojWare.Win32.QQKiller.A",
"Trojan.Qqkiller.A",
"Trojan.Nudeq",
"TROJ_QQKILLER.A",
"BehavesLike.Win32.HLLPPhilis.cc",
"W32/Trojan.ELFE-7308",
"Trojan/Win32.QQKiller",
"TR/QQKiller.2",
"W32/GWGhost.A!tr",
"Trojan/Win32.QQKiller",
"Trojan.Qqkiller.A",
"Troj.W32.QQKiller.a!c",
"Win-Trojan/QQKiller.183808",
"Trojan.QQKiller",
"Win32.Trojan.Qqkiller.Szkz",
"Trojan.Win32.QQKiller",
"Trojan.Qqkiller.A",
"Trojan.Win32.QQKiller.a"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/W32.Duqu.24960.B",
"Trojan.Win32.Duqu!O",
"Trojan/Duqu.a",
"Trojan.Duqu.1",
"Win32.Trojan.WisdomEyes.16070401.9500.9896",
"W32/Duqu.C",
"W32.Duqu",
"Win32/Duqu.A",
"RTKT_DUQU.SME",
"Win.Trojan.Duqu-7",
"Trojan.Win32.Duqu.a",
"Trojan.Win32.Duqu.eorzg",
"Trojan.Win32.Duqu.24960",
"TrojWare.Win32.Duqu.A",
"Trojan.Duqu.2",
"Trojan.Duqu.Win32.2",
"RTKT_DUQU.SME",
"W32/Duqu.BOQU-9196",
"Trojan/Duqu.b",
"TR/Duqu.A.1",
"Trojan/Win32.Duqu",
"Trojan:WinNT/Duqu.B",
"Troj.W32.Duqu.a!c",
"Trojan.Win32.Duqu.a",
"Trojan/Win32.Duqu.R13984",
"Trojan.Duqu.2102",
"Win32/Duqu.A",
"Win32.Trojan.Duqu.Pjnh",
"Trojan.Duqu!o6SU6/Pq/F4",
"Trojan.Win32.Duqu",
"W32/Duqu.A!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"We",
"identified",
"42",
"apps",
"on",
"Google",
"Play",
"as",
"belonging",
"to",
"the",
"campaign",
",",
"which",
"had",
"been",
"running",
"since",
"July",
"2018",
"."
] | [
16,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"malware",
"takes",
"these",
"steps",
":",
"Check",
"if",
"the",
"system",
"master",
"boot",
"record",
"(",
"MBR",
")",
"contains",
"an",
"infection",
"marker",
"(",
"0xD289C989C089",
"8-bytes",
"value",
"at",
"offset",
"0x2C",
")",
",",
"and",
",",
"if",
"so",
",",
"terminate",
"itself",
"Check",
"again",
"if",
"the",
"process",
"is",
"attached",
"to",
"a",
"debugger",
"(",
"using",
"the",
"techniques",
"described",
"previously",
")",
"Read",
",",
"decrypt",
",",
"and",
"map",
"the",
"stage",
"5",
"malware",
"(",
"written",
"in",
"the",
"previous",
"stage",
"in",
"msvcr90.dll",
")",
"Open",
"winlogon.exe",
"process",
"Load",
"user32.dll",
"system",
"library",
"and",
"read",
"the",
"KernelCallbackTable",
"pointer",
"from",
"its",
"own",
"process",
"environment",
"block",
"(",
"PEB",
")",
"(",
"Note",
":",
"The",
"KernelCallbackTable",
"points",
"to",
"an",
"array",
"of",
"graphic",
"functions",
"used",
"by",
"Win32",
"kernel",
"subsystem",
"module",
"win32k.sys",
"as",
"call-back",
"into",
"user-mode",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
1,
16,
16,
1,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16
] |
[
"Versions",
"overview",
"The",
"DenDroid",
"code",
"base",
"was",
"kept",
"to",
"such",
"an",
"extent",
"that",
"even",
"the",
"original",
"base64-encoded",
"password",
"was",
"kept",
"."
] | [
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"small",
"or",
"limited",
"number",
"is",
"understandable",
"given",
"the",
"nature",
"of",
"this",
"campaign",
",",
"but",
"we",
"also",
"expect",
"it",
"to",
"increase",
"or",
"even",
"diversify",
"in",
"terms",
"of",
"distribution",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan-Downloader.Win32.Gamarue.2!O",
"Trojan.Shamoon.1",
"trojan.win32.skeeyah.a!bit",
"Win32.Trojan.WisdomEyes.16070401.9500.9991",
"W32.Disttrack.B",
"WORM_DISTTRACK.SMC",
"Win.Dropper.DistTrack-5744784-0",
"Backdoor.Win32.RemoteConnection.d",
"Trojan.Win32.RemoteConnection.ekxrsg",
"WORM_DISTTRACK.SMC",
"Backdoor.RemoteConnection.a",
"Trojan[Backdoor]/Win32.RemoteConnection",
"Trojan:Win32/Depriz.E!dha",
"Backdoor/Win32.RemoteConnection.C1761738",
"Backdoor.RemoteConnection!lEVCTonUnuw",
"Trojan.Win32.Depriz",
"Trj/GdSda.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Perhaps",
"more",
"information",
"on",
"XLoader",
"will",
"be",
"known",
"in",
"the",
"future",
"."
] | [
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"backdoor",
"code",
"is",
"believed",
"to",
"have",
"been",
"left",
"by",
"mistake",
"by",
"the",
"authors",
"after",
"completing",
"the",
"debugging",
"process",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Winsy",
"Trojan.Win32.Winsy",
"Trojan.Winsy",
"Trojan.Winsy",
"W32/Trojan.MBSD-8108",
"Trojan.Winsy",
"Trojan.Win32.Winsy",
"Trojan.Winsy",
"Trj/CI.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"DGA",
"hosted",
"site",
"further",
"serves",
"up",
"a",
"list",
"of",
"domains",
"that",
"are",
"cycled",
"through",
"for",
"C2."
] | [
16,
1,
9,
9,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
1
] |
[
"Some",
"are",
"first",
"uploaded",
"with",
"all",
"the",
"necessary",
"code",
"except",
"the",
"one",
"line",
"that",
"actually",
"initializes",
"the",
"billing",
"process",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"But",
"it",
"would",
"appear",
"that",
"BLU",
"only",
"took",
"action",
"after",
"Kryptowire",
"notified",
"it",
"along",
"with",
"Google",
",",
"Adups",
"and",
"Amazon",
"."
] | [
16,
16,
16,
16,
16,
4,
16,
16,
16,
16,
4,
16,
16,
16,
16,
4,
16,
4,
16,
4,
16
] |
[
"Analysis",
"of",
"the",
"additional",
"spyware",
"modules",
"is",
"future",
"work",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Today's",
"blog",
"reviews",
"recent",
"activity",
"from",
"these",
"EITest",
"HoeflerText",
"popups",
"on",
"August",
"30,",
"2017",
"to",
"discover",
"more",
"about",
"this",
"recent",
"change."
] | [
16,
16,
16,
16,
16,
16,
16,
1,
9,
9,
16,
0,
8,
8,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Exploit.DebPloit.A",
"Trojan-Exploit/W32.DebPloit.45056",
"Exploit.DebPloit.Win32.4",
"Trojan/Exploit.DebPloit",
"Trojan.Exploit.DebPloit.A",
"Trojan.Exploit.DebPloit.A",
"Exploit.DebPloit!VRtQm5q2mnY",
"TROJ_DEPLOIT.A",
"Exploit.Win32.DebPloit",
"Exploit.Win32.DebPloit.yfoid",
"Exploit.DebPloit.45056[h]",
"Trojan.Exploit.DebPloit.A",
"TrojWare.Win32.Exploit.DebPloit",
"Trojan.Exploit.DebPloit.A",
"BackDoor.Bifrost.634",
"TROJ_DEPLOIT.A",
"W32/Risk.CTWU-4612",
"Exploit.WinNT.DebPloit",
"Trojan[Exploit]/Win32.DebPloit",
"WinNT.Hack.DebPloit.kcloud",
"Win-Trojan/Debploit.45056.B",
"Trojan.Exploit.DebPloit.A",
"Trojan.Exploit.DebPloit.A",
"Win32/Exploit.DebPloit",
"Win32.Exploit.Debploit.Wptu",
"W32/Debploit.B!tr",
"Exploit.OY",
"Trojan.Win32.DebPloit.aa",
"Win32/Trojan.Exploit.672"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Around",
"New",
"Year,",
"the",
"Emsisoft",
"Lab",
"team",
"was",
"alerted",
"to",
"the",
"presence",
"of",
"a",
"new",
"Globe",
"variant,",
"Globe3,",
"which",
"was",
"infecting",
"users",
"using",
"a",
"new",
"mode",
"of",
"operation."
] | [
16,
0,
8,
16,
4,
12,
12,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
3,
16,
16,
16,
4,
16,
16,
16,
16,
16,
16
] |
[
"We",
"reverse",
"engineered",
"XLoader",
"and",
"found",
"that",
"it",
"appears",
"to",
"target",
"South",
"Korea-based",
"banks",
"and",
"game",
"development",
"companies",
"."
] | [
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"DNS",
"protocol",
"is",
"unlikely",
"to",
"be",
"blocked",
"allowing",
"free",
"communications",
"out",
"of",
"the",
"network",
"and",
"its",
"use",
"is",
"unlikely",
"to",
"raise",
"suspicion",
"among",
"network",
"defenders."
] | [
16,
5,
7,
15,
15,
15,
15,
15,
16,
7,
15,
15,
15,
15,
15,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"UNIQUE",
"FEATURES",
"BY",
"VERSION",
"EventBot",
"Version",
"0.0.0.1",
"RC4",
"and",
"Base64",
"Packet",
"Encryption",
"EventBot",
"RC4",
"and",
"Base64",
"data",
"decryption",
"from",
"the",
"C2",
"RC4",
"and",
"Base64",
"data",
"decryption",
"from",
"the",
"C2",
"."
] | [
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"henbox_2",
"Figure",
"1",
"Uyghurapps",
"[",
"."
] | [
16,
16,
16,
1,
9,
9
] |
[
"Phishing",
"targeting",
"Google",
"Docs"
] | [
1,
16,
5,
13
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor/W32.Shiz.102400.S",
"Backdoor.Win32.Shiz!O",
"Backdoor/Shiz.fhrr",
"Win32.Trojan.WisdomEyes.16070401.9500.9971",
"Win.Trojan.Shiz-787",
"Trojan.Win32.Shiz.whgln",
"Trojan.KeyLogger.14845",
"Backdoor.Shiz.Win32.3116",
"BehavesLike.Win32.BadFile.cm",
"Backdoor.Win32.Shiz",
"Backdoor/Shiz.edz",
"TR/Rogue.kdz.957021",
"Trojan[Backdoor]/Win32.Shiz",
"Trojan.Zusy.D419A",
"Trojan:Win32/Nahip.A",
"Backdoor/Win32.Shiz.R34442",
"Win32/Spy.KeyLogger.NWE",
"W32/KeyLogger.AFN!tr",
"Backdoor.Shiz",
"Win32/Trojan.460"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"]",
"addroider.com",
"β",
"."
] | [
9,
9,
16,
16
] |
[
"When",
"the",
"current",
"app",
"on",
"the",
"foreground",
"matches",
"with",
"an",
"app",
"targeted",
"by",
"the",
"malware",
",",
"the",
"Trojan",
"will",
"show",
"the",
"corresponding",
"phishing",
"overlay",
",",
"making",
"the",
"user",
"think",
"it",
"is",
"the",
"app",
"that",
"was",
"just",
"started",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"In",
"one",
"case,",
"the",
"casino",
"website",
"was",
"a",
"direct",
"gateway",
"to",
"Angler",
"EK."
] | [
16,
16,
16,
16,
1,
9,
16,
16,
16,
16,
16,
3,
11
] |
[
"Our",
"analysis",
"of",
"the",
"malware",
"shows",
"it",
"uses",
"multiple",
",",
"advanced",
"techniques",
"to",
"avoid",
"Google",
"Play",
"malware",
"detection",
"and",
"to",
"maintain",
"persistency",
"on",
"target",
"devices",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Version",
"6.0",
"also",
"adds",
"a",
"command",
"called",
"β",
"getPhoneState",
"β",
",",
"which",
"collects",
"unique",
"identifiers",
"of",
"mobile",
"devices",
"such",
"as",
"IMSI",
",",
"ICCID",
",",
"Android",
"ID",
",",
"and",
"device",
"serial",
"number",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16
] |
[
"We",
"β",
"ve",
"documented",
"several",
"interesting",
"attacks",
"(",
"A",
"Gift",
"for",
"Dalai",
"Lamas",
"Birthday",
"and",
"Cyber",
"Attacks",
"Against",
"Uyghur",
"Mac",
"OS",
"X",
"Users",
"Intensify",
")",
"which",
"used",
"ZIP",
"files",
"as",
"well",
"as",
"DOC",
",",
"XLS",
"and",
"PDF",
"documents",
"rigged",
"with",
"exploits",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.JS.Redirector.xb",
"Js.Trojan.Redirector.Amwl",
"JS/BlacoleRef.CZ.26",
"Trojan/JS.Redirector.xb",
"Trojan.JS.Redirector.xb",
"Exploit.JS.Blacole",
"JS/Iframe.WOR!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.Aphexdoor.Litesock.A",
"Backdoor/W32.Aphexdoor.23040",
"Trojan.Suckspro",
"Backdoor.Aphexdoor.Win32.24",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"W32/Backdoor.YGRL-7760",
"Backdoor.Trojan",
"Win32/Porsux.A",
"Win.Trojan.Aphexdoor-8",
"Backdoor.Aphexdoor.Litesock.A",
"Backdoor.Win32.Aphexdoor.LiteSock",
"Backdoor.Aphexdoor.Litesock.A",
"Trojan.Win32.Aphexdoor.ebrvay",
"Backdoor.W32.Aphexdoor.LiteSock!c",
"Backdoor.Aphexdoor.Litesock.A",
"Backdoor.Aphexdoor.Litesock.A",
"BackDoor.LiteSock",
"BehavesLike.Win32.Downloader.mm",
"Backdoor.Win32.Aphexdoor.LiteSock",
"W32/Backdoor2.EYIV",
"Backdoor/Aphexdoor.LiteSock",
"Trojan[Backdoor]/Win32.Aphexdoor",
"Backdoor.Aphexdoor.Litesock.A",
"Backdoor.Win32.Aphexdoor.LiteSock",
"Worm/Win32.Fesber.C58465",
"Backdoor.Aphexdoor.Litesock.A",
"BScope.Trojan.RSP",
"Bck/Corsbot.B",
"Win32.Backdoor.Aphexdoor.Airh",
"Trojan.Suckspro!fID1dcqse2s",
"W32/Aphexdoor.LITESOCK!tr.bdr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Interestingly",
",",
"the",
"command",
"and",
"control",
"server",
"includes",
"a",
"publicly",
"accessible",
"interface",
"to",
"work",
"with",
"the",
"victims",
":",
"Some",
"of",
"the",
"commands",
"with",
"rough",
"translations",
":",
"The",
"command-and-control",
"server",
"is",
"running",
"Windows",
"Server",
"2003",
"and",
"has",
"been",
"configured",
"for",
"Chinese",
"language",
":",
"This",
",",
"together",
"with",
"the",
"logs",
",",
"is",
"a",
"strong",
"indicator",
"that",
"the",
"attackers",
"are",
"Chinese-speaking",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Worm.Win32.Chiviper!O",
"Worm.AutoRun.14759",
"W32/AutoRun.sdc",
"Win32.Trojan.WisdomEyes.16070401.9500.9975",
"WORM_OTORUN.SMIF",
"Win.Trojan.Qhost-160",
"Worm.Win32.Chiviper.gk",
"Trojan.Win32.AutoRun.onby",
"Trojan.AVKill.11726",
"Worm.AutoRun.Win32.23223",
"WORM_OTORUN.SMIF",
"BehavesLike.Win32.Ipamor.qt",
"Worm.Win32.AutoRun",
"WORM/Autorun.rmr",
"win32.troj.onlinegamest.bc.kcloud",
"Worm.Win32.Chiviper.gk",
"Trojan/Win32.CSon.R2002",
"Worm.Chiviper",
"Worm.AutoRun!t3rz8tcZQ1A",
"W32/Chiviper.GK!worm"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Zbot.7",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Win.Trojan.Kazy-50",
"Trojan.Win32.Pamela.hnatv",
"Trojan.Win32.A.Inject.75189",
"DDoS.Pamela",
"Trojan.Inject.Win32.17142",
"BehavesLike.Win32.Dropper.pc",
"Trojan.Win32.Inject",
"Trojan/Inject.mra",
"Trojan/Win32.Inject",
"Trojan:Win32/Pucodex.A",
"Trojan-Injector.191245"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Worm/W32.Sober.135968",
"Packed.Win32.TDSS!O",
"Worm.Sober.Win32.7",
"WORM_SOBER.AM",
"Win32.Trojan.WisdomEyes.16070401.9500.9997",
"W32/Sober.DVXC-4063",
"W32.Sober.W@mm",
"Win32/Sober.T",
"WORM_SOBER.AM",
"Win.Worm.Sober-43",
"Email-Worm.Win32.Sober.x",
"Trojan.Win32.Sober.fxvm",
"I-Worm.Win32.Sober.T",
"Packer.W32.Tibs.l4Hz",
"Worm.Win32.Sober.V",
"Win32.HLLM.Sober",
"BehavesLike.Win32.Autorun.cc",
"Trojan.Win32.Pasta",
"W32/Sober.V@mm",
"I-Worm/Sober.p",
"DR/Sober.T",
"Worm[Email]/Win32.Sober",
"Worm.Sober.t.kcloud",
"Worm:Win32/Sober.Y@mm.dr",
"Email-Worm.Win32.Sober.x",
"Dropper/Win32.Sober.R86508",
"W32/Sober.s.dr",
"TScope.Trojan.VB",
"W32/Sober.AE.worm",
"Win32/Sober.V",
"Win32.Worm-email.Sober.Akew",
"I-Worm.Sober.AF1",
"W32/Sober.T@mm"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"To",
"their",
"credit",
",",
"both",
"Google",
"and",
"Amazon",
"appear",
"to",
"have",
"put",
"pressure",
"on",
"device",
"manufacturers",
"to",
"fix",
"their",
"devices",
"when",
"flaws",
"are",
"found",
",",
"Strazzere",
"says",
"."
] | [
16,
16,
16,
16,
16,
4,
16,
4,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Proofpoint",
"is",
"tracking",
"this",
"attacker,",
"believed",
"to",
"operate",
"out",
"of",
"China,",
"as",
"TA459"
] | [
4,
16,
16,
16,
6,
16,
16,
16,
16,
16,
2,
16,
6
] |
[
"Data",
"Encryption",
"The",
"Curve25519",
"encryption",
"algorithm",
"was",
"implemented",
"as",
"of",
"EventBot",
"Version",
"0.0.0.2",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16
] |
[
"The",
"first",
"anti-sandbox",
"technique",
"is",
"the",
"loader",
"checking",
"the",
"code",
"segment",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"360",
"Network",
"Security",
"Research",
"Lab",
"recently",
"discovered",
"a",
"new",
"botnet",
"that",
"is",
"scanning",
"the",
"entire",
"Internet",
"on",
"a",
"large",
"scale."
] | [
4,
12,
12,
12,
12,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"In",
"addition",
",",
"we",
"did",
"not",
"see",
"traces",
"of",
"the",
"Smali",
"injection",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Recently",
"there",
"was",
"a",
"huge",
"wave",
"of",
"SMS",
"messages",
",",
"as",
"well",
"as",
"Whatsapp",
"messages",
",",
"making",
"the",
"rounds",
"asking",
"users",
"to",
"download",
"the",
"latest",
"version",
"of",
"TikTok",
"at",
"hxxp",
":",
"//tiny",
"[",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
1,
9,
9,
9,
9
] |
[
"The",
"malware",
"has",
"existed",
"since",
"at",
"least",
"2012,",
"with",
"threat",
"actors",
"using",
"it",
"for",
"mass-spreading",
"malware",
"campaigns",
"and",
"for",
"ongoing",
"targeted",
"attacks."
] | [
16,
3,
16,
16,
16,
16,
16,
0,
16,
6,
14,
16,
16,
16,
6,
14,
14,
16,
16,
16,
16,
1
] |
[
"Triada",
":",
"organized",
"crime",
"on",
"Android",
"Second",
",",
"it",
"substitutes",
"the",
"system",
"functions",
"and",
"conceals",
"its",
"modules",
"from",
"the",
"list",
"of",
"the",
"running",
"processes",
"and",
"installed",
"apps",
"."
] | [
3,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Fragment",
"of",
"the",
"database",
"with",
"targeted",
"devices",
"and",
"specific",
"memory",
"addresses",
"If",
"the",
"infected",
"device",
"is",
"not",
"listed",
"in",
"this",
"database",
",",
"the",
"exploit",
"tries",
"to",
"discover",
"these",
"addresses",
"programmatically",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.CareFree.a",
"Win32/Tnega.TaRMRTC",
"Trojan.Win32.Graftor.dogten",
"Trojan.KillFiles.21059",
"BehavesLike.Win32.Downloader.mc",
"TR/Graftor.cpoyxe",
"Trojan.Ursu.D2DC2",
"Trojan/Win32.StartPage.R131400",
"Win32/Trojan.e36"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"This",
"group",
"has",
"been",
"active",
"since",
"at",
"least",
"2014",
"and",
"uses",
"spear-phishing",
"campaigns",
"to",
"target",
"enterprises."
] | [
16,
6,
16,
16,
16,
16,
3,
16,
0,
16,
16,
6,
14,
16,
4,
12
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9992",
"Trojan-Spy.MSIL.KeyLogger.ctnb",
"Trojan.Win32.Z.Keylogger.91136.M",
"Msil.Trojan-spy.Keylogger.Wqde",
"Trojan.DownLoader9.24657",
"TrojanSpy.MSIL.vlt",
"TR/Downloader.gldnp",
"Trojan[Spy]/MSIL.KeyLogger",
"Trojan.MSILPerseus.D9E17",
"Trojan-Spy.MSIL.KeyLogger.ctnb",
"Backdoor:MSIL/Cooatut.A",
"TrojanSpy.MSIL.KeyLogger",
"Trj/CI.A",
"MSIL/Troob.AA",
"Trojan.MSIL.Troob",
"MSIL/Troob.AA!tr",
"Win32/Trojan.Spy.144"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Instead,",
"MacDownloader",
"is",
"a",
"simple",
"exfiltration",
"agent,",
"with",
"broader",
"ambitions."
] | [
16,
3,
16,
16,
1,
9,
9,
16,
16,
16
] |
[
"Throughout",
"2016,",
"Proofpoint",
"researchers",
"tracked",
"a",
"cyber-espionage",
"campaign",
"targeting",
"victims",
"in",
"Russia",
"and",
"neighboring",
"countries."
] | [
16,
0,
4,
12,
16,
16,
6,
14,
16,
16,
16,
2,
16,
2,
10
] |
[
"This",
"threat",
"actor",
"has",
"been",
"very",
"active",
"in",
"February",
"and",
"March",
"2023",
"targeting",
"individuals",
"in",
"various",
"South",
"Korean",
"organizations."
] | [
16,
6,
14,
16,
16,
16,
16,
16,
0,
16,
0,
8,
16,
4,
16,
16,
4,
12,
12
] |
[
"The",
"Trojan",
"is",
"delivered",
"in",
"emails",
"that",
"mostly",
"target",
"corporate",
"users."
] | [
3,
11,
16,
16,
16,
1,
16,
16,
16,
4,
12
] |
[
"We",
"can",
"trace",
"activities",
"of",
"Pawn",
"Storm",
"back",
"to",
"20041",
"and",
"before",
"our",
"initial",
"report",
"in",
"2014",
"there",
"wasn't",
"much",
"published",
"about",
"this",
"actor",
"group."
] | [
16,
16,
16,
16,
16,
6,
14,
16,
16,
0,
16,
16,
16,
16,
16,
16,
0,
16,
16,
16,
16,
16,
16,
6,
14
] |
[
"Backdoor.Win32.Denis",
"uses",
"DNS",
"tunneling",
"for",
"communication"
] | [
1,
16,
1,
9,
9,
9
] |
[
"A",
"few",
"days",
"before",
"the",
"Kuala",
"Lumpur",
"summit,",
"a",
"subdomain",
"under",
"asean.org",
"for",
"the",
"ASEAN",
"Secretariat",
"Resource",
"Centre",
"ARC",
"was",
"compromised."
] | [
16,
0,
8,
8,
16,
4,
12,
12,
16,
1,
9,
9,
16,
4,
12,
12,
12,
12,
12,
16,
16
] |