tokens
sequencelengths
2
296
ner_tags
sequencelengths
2
296
[ "It", "includes", "recent", "incidents", "as", "well", "as", "older", "ones", "that", "have", "not", "been", "publicly", "reported;", "new", "malware;", "exploitation,", "delivery", "and", "command", "and", "control", "infrastructure;", "and", "the", "group", "s", "modus", "operandi." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 5, 13, 13, 13, 16, 6, 14, 16, 16, 16 ]
[ "That", "domain,", "electronicfrontierfoundation.org,", "is", "designed", "to", "trick", "users", "into", "a", "false", "sense", "of", "trust", "and", "it", "appears", "to", "have", "been", "used", "in", "a", "spear", "phishing", "attack,", "though", "it", "is", "unclear", "who", "the", "intended", "targets", "were." ]
[ 16, 1, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 9, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Last", "week,", "Unit", "42", "came", "across", "new", "Disttrack", "samples", "that", "appear", "to", "have", "been", "used", "in", "an", "updated", "attack", "campaign." ]
[ 16, 16, 4, 12, 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 6, 14 ]
[ "The", "proliferation", "of", "Android", "devices", "–", "from", "smartphones", "to", "tablets", "and", "smart", "TVs", "–", "has", "opened", "up", "new", "possibilities", "for", "malware", "developers", ",", "as", "all", "these", "devices", "pack", "microphones", ",", "cameras", "and", "location-tracking", "hardware", "they", "can", "turn", "into", "the", "perfect", "spy", "tools", "." ]
[ 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "For", "instance,", "its", "JHUHUGIT", "implant", "was", "delivered", "through", "a", "Flash", "zero-day", "and", "used", "a", "Windows", "EoP", "exploit", "to", "break", "out", "of", "the", "sandbox." ]
[ 16, 16, 16, 3, 11, 16, 16, 16, 16, 7, 15, 16, 16, 16, 3, 11, 11, 16, 16, 16, 16, 16, 16 ]
[ "However", ",", "our", "data", "suggests", "that", "there", "have", "been", "at", "least", "2,729", "infections", "between", "January", "2016", "and", "early", "April", "2016", ",", "with", "a", "peak", "in", "March", "of", "more", "than", "1,100", "infections", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "group", "is", "well", "resourced,", "capable", "of", "infiltrating", "multiple", "targets", "simultaneously", "and", "will", "often", "operate", "outside", "the", "working", "hours", "of", "targeted", "organizations", "in", "order", "to", "maintain", "a", "low", "profile." ]
[ 6, 14, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16, 16, 16, 16, 16, 16, 16 ]
[ "All", "of", "the", "files", "that", "are", "being", "uploaded", "or", "downloaded", "are", "zip", "files", "encrypted", "by", "AES", "with", "ECB", "mode", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "TROJ_BREDLAB.SMD", "Trojan-Spy.Win32.Spenir.as", "Application.Win32.BlkIC.IMG", "TROJ_BREDLAB.SMD", "Backdoor/SdBot.prb", "HeurEngine.ZeroDayThreat", "Trojan.Win32.ProcessHijack" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1 ]
[ "]", "infodavos-seaworth", "[", "." ]
[ 16, 16, 16, 16 ]
[ "It", "continues", "to", "spread", "across", "small", "and", "medium-sized", "businesses", "across", "the", "globe,", "using", "the", "modular", "Gorynych/Diamond", "Fox", "botnet", "to", "exfiltrate", "stolen", "data." ]
[ 16, 16, 16, 16, 16, 4, 16, 4, 12, 16, 16, 2, 16, 16, 16, 3, 11, 11, 16, 1, 9, 9 ]
[ "Find", "out", "more", "about", "the", "7", "Android", "Security", "Hacks", "You", "Need", "to", "Do", "Right", "Now", "to", "keep", "your", "mobile", "data", "safe", "." ]
[ 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Hoax.Win32.ArchSMS!O", "Trojan.Mobsularch", "Trojan.ArchSMS.Win32.7426", "Trojan/ArchSMS.nkit", "Win32.Trojan.WisdomEyes.16070401.9500.9644", "TROJ_MALICIOUS_BK083028.TOMC", "Win.Trojan.Archsms-4649", "Riskware.Win32.ArchSMS.cqmlwf", "TrojWare.Win32.Zusy.AJ", "Trojan.Fraudster.336", "Trojan-Banker.Win32.Banbra", "Hoax.ArchSMS.jho", "HackTool[Hoax]/Win32.ArchSMS", "Win32.Troj.Hoax.kcloud", "Trojan:Win32/Mobsularch.A", "Trojan.Strictor.548", "Win32.Trojan.ArchSMS.D", "Hoax.ArchSMS.nk", "Trojan.ArchSMS!pTXIElAMXBk", "W32/ArchSMS.VU!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "This", "is", "done", "using", "a", "series", "of", "syscalls", "as", "outlined", "below", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Palo", "Alto", "Networks", "has", "collected", "over", "20", "samples", "of", "this", "particular", "malware", "family,", "and", "we", "have", "identified", "over", "$70,000", "USD", "in", "Bitcoin", "payments", "to", "the", "attacker", "Cisco", "Talos", "yesterday", "reported", "this", "figure", "to", "be", "closer", "to", "$115,000", "USD." ]
[ 4, 12, 12, 16, 16, 16, 16, 3, 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 1, 9, 9, 9, 9, 16, 16, 6, 4, 12, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "]", "infokalisi", "[", "." ]
[ 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Pitit.A3", "HV_ABTITU_CG093139.RDXN", "TR/Barys.2445.24", "Win32.Troj.Undef.kcloud", "Trojan.Kazy", "Trojan.Win32.Loader.L" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1 ]
[ "A", "collection", "of", "domains", "registered", "by", "Pawn", "Storm/Sofacy/APT28/Fancy", "Bear", "to", "target", "organisations" ]
[ 16, 16, 16, 1, 16, 16, 6, 14, 14, 16, 16, 4 ]
[ "A", "backdoor", "also", "known", "as:", "W32.CoinMiner.A4", "PUP.Optional.ChinAd", "W32.XiaobaMiner", "Win32/Oflwr.A!crypt", "Win.Trojan.Qhost-160", "Trojan.Win32.BtcMine.exddfs", "Tool.BtcMine.1051", "BehavesLike.Win32.Ransomware.th", "W32.Trojan.Qhost", "RiskWare/Win32.BitMiner.h", "Trojan.Forcud" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "While", "it", "has", "become", "common", "to", "see", "new", "ransomware", "variants", "being", "distributed", "daily,", "it", "is", "not", "as", "common", "to", "find", "new", "ransomware", "infections", "being", "distributed", "via", "exploit", "kits." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 1, 16, 16, 16, 3, 11 ]
[ "A", "backdoor", "also", "known", "as:", "HW32.Packed.1FBC", "Win32.Trojan.WisdomEyes.16070401.9500.9950", "Win.Exploit.Countdown-1", "BackDoor.Meterpreter.37", "Troj.W32.Jorik.Skor.lrUS", "Trojan:Win64/Meterpreter.A", "Trojan/Win32.Swrort.C695042" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1 ]
[ "We", "previously", "highlighted", "the", "dangers", "of", "installing", "apps", "that", "enable", "IAPs", "using", "SMS", "messages,", "as", "these", "apps", "typically", "have", "access", "to", "all", "SMS", "messages", "sent", "to", "the", "phone." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 7, 15, 15, 15, 15, 15, 16, 16, 16, 16, 16, 7, 15, 15, 15, 15, 16, 16, 16, 16 ]
[ "U.S.", "Allies", "and", "Rivals", "Digest", "Trump's", "Victory", "-", "Carnegie", "Endowment", "for", "International", "Peace.docm" ]
[ 4, 12, 16, 4, 12, 12, 12, 16, 16, 16, 16, 16, 1 ]
[ "Intrigued", ",", "we", "continued", "our", "search", "and", "found", "more", "interesting", "clues", "that", "could", "reveal", "some", "detailed", "information", "about", "the", "owners", "of", "the", "infected", "devices", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "In", "the", "example", "server", "response", "below", ",", "the", "green", "fields", "show", "text", "to", "be", "shown", "to", "the", "user", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "During", "the", "course", "of", "our", "research,", "it", "became", "evident", "that", "this", "actor", "had", "not", "built", "uWarrior", "from", "scratch,", "but", "rather", "opted", "to", "borrow", "components", "from", "several", "off-the-shelf", "tools." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11 ]
[ "Hackers", "made", "a", "modified", "Linux", "Mint", "ISO,", "with", "a", "backdoor", "in", "it,", "and", "managed", "to", "hack", "the", "Linux", "Mint", "website", "to", "point", "to", "it." ]
[ 6, 16, 16, 16, 5, 13, 13, 16, 16, 3, 16, 16, 16, 16, 16, 1, 9, 9, 9, 9, 16, 16, 16, 16 ]
[ "Replicating", "framework.jar", "allows", "the", "app", "to", "intercept", "and", "modify", "the", "behavior", "of", "the", "Android", "standard", "API", "." ]
[ 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan-Dropper.Win32.BindFile!O", "Trojan/Dropper.BindFile.a", "W32/Dropper.LIP", "Trojan.Spy-681", "Trojan-Dropper.Win32.BindFile.e", "Trojan.Win32.BindFile.dcyo", "Trojan.Win32.BindFile.188416", "PE:Dropper.BindFile.h!1173781522", "TrojWare.Win32.TrojanDropper.BindFile.A", "Trojan.Progress.10", "TrojanDropper.ExeBind.Mfc2", "Dropper/Bindfile.496648", "W32/Risk.SLHR-7237", "Win32/TrojanDropper.BindFile.A", "Trojan-Dropper.Win32.BindFile", "W32/BindFile.A!tr", "Trojan.Win32.BindFile.bA" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "attacks", "described", "here", "begin", "with", "a", "banking", "credential", "phishing", "scheme", ",", "followed", "by", "an", "attempt", "to", "trick", "the", "victim", "into", "installing", "Marcher", ",", "and", "finally", "with", "attempts", "to", "steal", "credit", "card", "information", "by", "the", "banking", "Trojan", "itself", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/Kryptik.aspo", "JAVA_EXPLOIT.TCC", "JAVA_EXPLOIT.TCC", "Win.Trojan.Hydraq-219", "Exploit.Java.CVE20131493.cqvzpg", "Java.S.EX-CVE-2013-1493.206981", "Exploit.Java.509", "EXP/Java.HLP.JM", "W32/Kryptik.ASPO", "Trojan.Graftor.D13511", "Exploit.Java.CVE-2013-1493", "Java/Exploit.CVE-2013-1493.AL", "Unk.Win32.Script.400440", "Trojan.Plugax!dr/f2r5A7aY", "Exploit.Java.HLP", "virus.java.cve-2013-1493.c" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "We", "have", "seen", "Angler", "to", "be", "using", "bedep", "as", "its", "payload", "but", "adding", "vawtrak", "in", "its", "arsenal", "is", "something", "we", "haven't", "seen", "in", "the", "past", "until", "recently." ]
[ 16, 16, 16, 3, 16, 16, 16, 3, 16, 16, 3, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Attackers", "have", "been", "able", "to", "successfully", "implant", "JavaScript", "code", "on", "the", "login", "pages", "that", "enables", "them", "to", "surreptitiously", "steal", "employee", "credentials", "as", "they", "login", "to", "access", "internal", "corporate", "resources." ]
[ 6, 16, 16, 16, 16, 16, 1, 9, 16, 16, 16, 1, 9, 16, 16, 16, 16, 16, 1, 9, 9, 16, 16, 1, 9, 9, 9, 9, 9 ]
[ "Since", "then", ",", "the", "implant", "’", "s", "functionality", "has", "been", "improving", "and", "remarkable", "new", "features", "implemented", ",", "such", "as", "the", "ability", "to", "record", "audio", "surroundings", "via", "the", "microphone", "when", "an", "infected", "device", "is", "in", "a", "specified", "location", ";", "the", "stealing", "of", "WhatsApp", "messages", "via", "Accessibility", "Services", ";", "and", "the", "ability", "to", "connect", "an", "infected", "device", "to", "Wi-Fi", "networks", "controlled", "by", "cybercriminals", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Figure", "8", "." ]
[ 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Dropper", "BKDR_QBOT.SM", "Win32.Trojan-Dropper.Small.s", "Win32/Qakbot.KR", "BKDR_QBOT.SM", "Trojan.Win32.Gamania.tghgw", "Trojan.Win32.A.Mbro.191488", "Trojan.PWS.Gamania.36525", "W32/Trojan.XMWQ-0223", "Trojan[Backdoor]/Win32.QBot", "TrojanDropper:Win32/Qakbot.A", "Dropper/Win32.Injector.R30051", "Win32/TrojanDropper.Small.NMS", "Trojan.Kryptik!nABTr99RVjs", "Backdoor.Win32.Qakbot", "W32/Dropper.NMS!tr", "Win32/Trojan.a58" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "You", "can", "check", "the", "status", "of", "Google", "Play", "Protect", "on", "your", "device", ":", "Open", "your", "Android", "device", "'s", "Google", "Play", "Store", "app", "." ]
[ 16, 16, 16, 16, 16, 16, 5, 13, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 13, 16, 16 ]
[ "All", "of", "these", "Google", "Play", "Store", "pages", "have", "been", "taken", "down", "by", "Google", "." ]
[ 16, 16, 16, 5, 13, 13, 16, 16, 16, 16, 16, 16, 4, 16 ]
[ "As", "of", "September", "17th", "Dyreza", "now", "counts", "an", "additional", "twenty", "organizations", "directly", "involved", "in", "Fulfillment", "and", "Warehousing;", "four", "software", "companies", "that", "support", "Fulfillment", "and", "Warehousing;", "five", "Wholesale", "Computer", "Distributors;", "and", "its", "credential", "theft", "triggers", "include", "Apple,", "Iron", "Mountain,", "OtterBox", "and", "Badge", "Graphics", "Systems", "and", "many", "other", "well-known", "consumer-", "and", "business-facing", "technology", "and", "service", "brands." ]
[ 16, 16, 0, 8, 3, 16, 16, 16, 16, 16, 4, 16, 16, 16, 4, 16, 4, 16, 4, 12, 16, 16, 4, 16, 4, 16, 4, 12, 12, 16, 16, 16, 16, 16, 16, 4, 12, 12, 12, 16, 4, 12, 12, 16, 16, 16, 16, 4, 16, 4, 12, 16, 4, 12 ]
[ "This", "malware", "possesses", "the", "ability", "to", "Collect", "information", "about", "an", "infected", "computer", "and", "transfer", "it", "to", "the", "command", "and", "control", "server." ]
[ 16, 3, 16, 16, 16, 16, 16, 12, 16, 16, 5, 13, 16, 16, 16, 16, 16, 1, 9, 9, 9 ]
[ "Malware", "isn't", "usually", "thought", "to", "be", "old,", "but", "a", "recent", "phishing", "campaign", "using", "the", "MyDoom", "worm", "has", "shown", "that", "old", "tools", "can", "still", "be", "used", "to", "lure", "users", "into", "malware." ]
[ 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 6, 14, 16, 3, 11, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3 ]
[ "2015–2016", "Starting", "from", "mid-2015", ",", "the", "Trojan", "began", "using", "the", "AES", "algorithm", "to", "encrypt", "data", "communicated", "between", "the", "infected", "device", "and", "the", "C", "&", "C", ":", "Also", "starting", "with", "the", "same", "version", ",", "data", "is", "sent", "in", "a", "POST", "request", "to", "the", "relative", "address", "with", "the", "format", "β€œ", "/", "[", "number", "]", "”", "(", "a", "pseudo-randomly", "generated", "number", "in", "the", "range", "0–9999", ")", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "SSL", "is", "typically", "used", "to", "encrypt", "data", "between", "the", "client", "and", "the", "server,", "thus", "making", "the", "content", "unreadable", "by", "any", "systems", "sitting", "between", "the", "two", "end", "points,", "and", "significantly", "raising", "the", "cost", "of", "defence." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/W32.Zapchast.113152", "Backdoor.KeyBoy", "Trojan.Zapchast.Win32.29227", "Trojan.Heur.LP.EDDB38", "Win32.Trojan.WisdomEyes.151026.9950.9999", "Backdoor.Kboy", "Trojan.Win32.Zapchast.afhn", "Trojan.Win32.Zapchast.cjltha", "Win32.Trojan.Zapchast.Htcu", "BehavesLike.Win32.GameVance.ch", "Trojan/Zapchast.iik", "TR/Spy.113152.29", "Trojan/Win32.Zapchast", "Backdoor.Win32.KeyBoy.113152[h]", "Win-Trojan/Keyboy.113152", "Trojan.Win32.Zapchast.afhn", "Trojan.Zapchast!0ThicNhZU3g", "Trojan.Win32.Zapchast", "W32/Zapchast.AFHN!tr", "Win32/Trojan.020" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Bot", "communicates", "with", "the", "botmaster", "using", "non-standard", "protocol", "built", "on", "top", "of", "TCP." ]
[ 3, 16, 16, 16, 3, 16, 1, 9, 9, 9, 9, 9, 9 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/W32.QQKiller.183808", "Trojan.Qqkiller.A", "Trojan.QQKiller.Win32.2", "Trojan.Qqkiller.A", "Trojan/QQKiller.a", "Trojan.QQKiller!Y2SikmBtqEk", "Win32/QQKiller.A", "TROJ_QQKILLER.A", "Trojan.Win32.QQKiller.a", "Trojan.Win32.QQKiller.erxn", "Trojan.Win32.A.QQKiller.183808[h]", "Trojan.Qqkiller.A", "TrojWare.Win32.QQKiller.A", "Trojan.Qqkiller.A", "Trojan.Nudeq", "TROJ_QQKILLER.A", "BehavesLike.Win32.HLLPPhilis.cc", "W32/Trojan.ELFE-7308", "Trojan/Win32.QQKiller", "TR/QQKiller.2", "W32/GWGhost.A!tr", "Trojan/Win32.QQKiller", "Trojan.Qqkiller.A", "Troj.W32.QQKiller.a!c", "Win-Trojan/QQKiller.183808", "Trojan.QQKiller", "Win32.Trojan.Qqkiller.Szkz", "Trojan.Win32.QQKiller", "Trojan.Qqkiller.A", "Trojan.Win32.QQKiller.a" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/W32.Duqu.24960.B", "Trojan.Win32.Duqu!O", "Trojan/Duqu.a", "Trojan.Duqu.1", "Win32.Trojan.WisdomEyes.16070401.9500.9896", "W32/Duqu.C", "W32.Duqu", "Win32/Duqu.A", "RTKT_DUQU.SME", "Win.Trojan.Duqu-7", "Trojan.Win32.Duqu.a", "Trojan.Win32.Duqu.eorzg", "Trojan.Win32.Duqu.24960", "TrojWare.Win32.Duqu.A", "Trojan.Duqu.2", "Trojan.Duqu.Win32.2", "RTKT_DUQU.SME", "W32/Duqu.BOQU-9196", "Trojan/Duqu.b", "TR/Duqu.A.1", "Trojan/Win32.Duqu", "Trojan:WinNT/Duqu.B", "Troj.W32.Duqu.a!c", "Trojan.Win32.Duqu.a", "Trojan/Win32.Duqu.R13984", "Trojan.Duqu.2102", "Win32/Duqu.A", "Win32.Trojan.Duqu.Pjnh", "Trojan.Duqu!o6SU6/Pq/F4", "Trojan.Win32.Duqu", "W32/Duqu.A!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "We", "identified", "42", "apps", "on", "Google", "Play", "as", "belonging", "to", "the", "campaign", ",", "which", "had", "been", "running", "since", "July", "2018", "." ]
[ 16, 16, 16, 16, 16, 5, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "malware", "takes", "these", "steps", ":", "Check", "if", "the", "system", "master", "boot", "record", "(", "MBR", ")", "contains", "an", "infection", "marker", "(", "0xD289C989C089", "8-bytes", "value", "at", "offset", "0x2C", ")", ",", "and", ",", "if", "so", ",", "terminate", "itself", "Check", "again", "if", "the", "process", "is", "attached", "to", "a", "debugger", "(", "using", "the", "techniques", "described", "previously", ")", "Read", ",", "decrypt", ",", "and", "map", "the", "stage", "5", "malware", "(", "written", "in", "the", "previous", "stage", "in", "msvcr90.dll", ")", "Open", "winlogon.exe", "process", "Load", "user32.dll", "system", "library", "and", "read", "the", "KernelCallbackTable", "pointer", "from", "its", "own", "process", "environment", "block", "(", "PEB", ")", "(", "Note", ":", "The", "KernelCallbackTable", "points", "to", "an", "array", "of", "graphic", "functions", "used", "by", "Win32", "kernel", "subsystem", "module", "win32k.sys", "as", "call-back", "into", "user-mode", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 1, 16, 16, 1, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16 ]
[ "Versions", "overview", "The", "DenDroid", "code", "base", "was", "kept", "to", "such", "an", "extent", "that", "even", "the", "original", "base64-encoded", "password", "was", "kept", "." ]
[ 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "small", "or", "limited", "number", "is", "understandable", "given", "the", "nature", "of", "this", "campaign", ",", "but", "we", "also", "expect", "it", "to", "increase", "or", "even", "diversify", "in", "terms", "of", "distribution", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan-Downloader.Win32.Gamarue.2!O", "Trojan.Shamoon.1", "trojan.win32.skeeyah.a!bit", "Win32.Trojan.WisdomEyes.16070401.9500.9991", "W32.Disttrack.B", "WORM_DISTTRACK.SMC", "Win.Dropper.DistTrack-5744784-0", "Backdoor.Win32.RemoteConnection.d", "Trojan.Win32.RemoteConnection.ekxrsg", "WORM_DISTTRACK.SMC", "Backdoor.RemoteConnection.a", "Trojan[Backdoor]/Win32.RemoteConnection", "Trojan:Win32/Depriz.E!dha", "Backdoor/Win32.RemoteConnection.C1761738", "Backdoor.RemoteConnection!lEVCTonUnuw", "Trojan.Win32.Depriz", "Trj/GdSda.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Perhaps", "more", "information", "on", "XLoader", "will", "be", "known", "in", "the", "future", "." ]
[ 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "backdoor", "code", "is", "believed", "to", "have", "been", "left", "by", "mistake", "by", "the", "authors", "after", "completing", "the", "debugging", "process", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Winsy", "Trojan.Win32.Winsy", "Trojan.Winsy", "Trojan.Winsy", "W32/Trojan.MBSD-8108", "Trojan.Winsy", "Trojan.Win32.Winsy", "Trojan.Winsy", "Trj/CI.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "DGA", "hosted", "site", "further", "serves", "up", "a", "list", "of", "domains", "that", "are", "cycled", "through", "for", "C2." ]
[ 16, 1, 9, 9, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 1 ]
[ "Some", "are", "first", "uploaded", "with", "all", "the", "necessary", "code", "except", "the", "one", "line", "that", "actually", "initializes", "the", "billing", "process", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "But", "it", "would", "appear", "that", "BLU", "only", "took", "action", "after", "Kryptowire", "notified", "it", "along", "with", "Google", ",", "Adups", "and", "Amazon", "." ]
[ 16, 16, 16, 16, 16, 4, 16, 16, 16, 16, 4, 16, 16, 16, 16, 4, 16, 4, 16, 4, 16 ]
[ "Analysis", "of", "the", "additional", "spyware", "modules", "is", "future", "work", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Today's", "blog", "reviews", "recent", "activity", "from", "these", "EITest", "HoeflerText", "popups", "on", "August", "30,", "2017", "to", "discover", "more", "about", "this", "recent", "change." ]
[ 16, 16, 16, 16, 16, 16, 16, 1, 9, 9, 16, 0, 8, 8, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Exploit.DebPloit.A", "Trojan-Exploit/W32.DebPloit.45056", "Exploit.DebPloit.Win32.4", "Trojan/Exploit.DebPloit", "Trojan.Exploit.DebPloit.A", "Trojan.Exploit.DebPloit.A", "Exploit.DebPloit!VRtQm5q2mnY", "TROJ_DEPLOIT.A", "Exploit.Win32.DebPloit", "Exploit.Win32.DebPloit.yfoid", "Exploit.DebPloit.45056[h]", "Trojan.Exploit.DebPloit.A", "TrojWare.Win32.Exploit.DebPloit", "Trojan.Exploit.DebPloit.A", "BackDoor.Bifrost.634", "TROJ_DEPLOIT.A", "W32/Risk.CTWU-4612", "Exploit.WinNT.DebPloit", "Trojan[Exploit]/Win32.DebPloit", "WinNT.Hack.DebPloit.kcloud", "Win-Trojan/Debploit.45056.B", "Trojan.Exploit.DebPloit.A", "Trojan.Exploit.DebPloit.A", "Win32/Exploit.DebPloit", "Win32.Exploit.Debploit.Wptu", "W32/Debploit.B!tr", "Exploit.OY", "Trojan.Win32.DebPloit.aa", "Win32/Trojan.Exploit.672" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Around", "New", "Year,", "the", "Emsisoft", "Lab", "team", "was", "alerted", "to", "the", "presence", "of", "a", "new", "Globe", "variant,", "Globe3,", "which", "was", "infecting", "users", "using", "a", "new", "mode", "of", "operation." ]
[ 16, 0, 8, 16, 4, 12, 12, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 3, 16, 16, 16, 4, 16, 16, 16, 16, 16, 16 ]
[ "We", "reverse", "engineered", "XLoader", "and", "found", "that", "it", "appears", "to", "target", "South", "Korea-based", "banks", "and", "game", "development", "companies", "." ]
[ 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "DNS", "protocol", "is", "unlikely", "to", "be", "blocked", "allowing", "free", "communications", "out", "of", "the", "network", "and", "its", "use", "is", "unlikely", "to", "raise", "suspicion", "among", "network", "defenders." ]
[ 16, 5, 7, 15, 15, 15, 15, 15, 16, 7, 15, 15, 15, 15, 15, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "UNIQUE", "FEATURES", "BY", "VERSION", "EventBot", "Version", "0.0.0.1", "RC4", "and", "Base64", "Packet", "Encryption", "EventBot", "RC4", "and", "Base64", "data", "decryption", "from", "the", "C2", "RC4", "and", "Base64", "data", "decryption", "from", "the", "C2", "." ]
[ 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "henbox_2", "Figure", "1", "Uyghurapps", "[", "." ]
[ 16, 16, 16, 1, 9, 9 ]
[ "Phishing", "targeting", "Google", "Docs" ]
[ 1, 16, 5, 13 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor/W32.Shiz.102400.S", "Backdoor.Win32.Shiz!O", "Backdoor/Shiz.fhrr", "Win32.Trojan.WisdomEyes.16070401.9500.9971", "Win.Trojan.Shiz-787", "Trojan.Win32.Shiz.whgln", "Trojan.KeyLogger.14845", "Backdoor.Shiz.Win32.3116", "BehavesLike.Win32.BadFile.cm", "Backdoor.Win32.Shiz", "Backdoor/Shiz.edz", "TR/Rogue.kdz.957021", "Trojan[Backdoor]/Win32.Shiz", "Trojan.Zusy.D419A", "Trojan:Win32/Nahip.A", "Backdoor/Win32.Shiz.R34442", "Win32/Spy.KeyLogger.NWE", "W32/KeyLogger.AFN!tr", "Backdoor.Shiz", "Win32/Trojan.460" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "]", "addroider.com", "’", "." ]
[ 9, 9, 16, 16 ]
[ "When", "the", "current", "app", "on", "the", "foreground", "matches", "with", "an", "app", "targeted", "by", "the", "malware", ",", "the", "Trojan", "will", "show", "the", "corresponding", "phishing", "overlay", ",", "making", "the", "user", "think", "it", "is", "the", "app", "that", "was", "just", "started", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "In", "one", "case,", "the", "casino", "website", "was", "a", "direct", "gateway", "to", "Angler", "EK." ]
[ 16, 16, 16, 16, 1, 9, 16, 16, 16, 16, 16, 3, 11 ]
[ "Our", "analysis", "of", "the", "malware", "shows", "it", "uses", "multiple", ",", "advanced", "techniques", "to", "avoid", "Google", "Play", "malware", "detection", "and", "to", "maintain", "persistency", "on", "target", "devices", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Version", "6.0", "also", "adds", "a", "command", "called", "β€œ", "getPhoneState", "”", ",", "which", "collects", "unique", "identifiers", "of", "mobile", "devices", "such", "as", "IMSI", ",", "ICCID", ",", "Android", "ID", ",", "and", "device", "serial", "number", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16 ]
[ "We", "’", "ve", "documented", "several", "interesting", "attacks", "(", "A", "Gift", "for", "Dalai", "Lamas", "Birthday", "and", "Cyber", "Attacks", "Against", "Uyghur", "Mac", "OS", "X", "Users", "Intensify", ")", "which", "used", "ZIP", "files", "as", "well", "as", "DOC", ",", "XLS", "and", "PDF", "documents", "rigged", "with", "exploits", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.JS.Redirector.xb", "Js.Trojan.Redirector.Amwl", "JS/BlacoleRef.CZ.26", "Trojan/JS.Redirector.xb", "Trojan.JS.Redirector.xb", "Exploit.JS.Blacole", "JS/Iframe.WOR!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.Aphexdoor.Litesock.A", "Backdoor/W32.Aphexdoor.23040", "Trojan.Suckspro", "Backdoor.Aphexdoor.Win32.24", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "W32/Backdoor.YGRL-7760", "Backdoor.Trojan", "Win32/Porsux.A", "Win.Trojan.Aphexdoor-8", "Backdoor.Aphexdoor.Litesock.A", "Backdoor.Win32.Aphexdoor.LiteSock", "Backdoor.Aphexdoor.Litesock.A", "Trojan.Win32.Aphexdoor.ebrvay", "Backdoor.W32.Aphexdoor.LiteSock!c", "Backdoor.Aphexdoor.Litesock.A", "Backdoor.Aphexdoor.Litesock.A", "BackDoor.LiteSock", "BehavesLike.Win32.Downloader.mm", "Backdoor.Win32.Aphexdoor.LiteSock", "W32/Backdoor2.EYIV", "Backdoor/Aphexdoor.LiteSock", "Trojan[Backdoor]/Win32.Aphexdoor", "Backdoor.Aphexdoor.Litesock.A", "Backdoor.Win32.Aphexdoor.LiteSock", "Worm/Win32.Fesber.C58465", "Backdoor.Aphexdoor.Litesock.A", "BScope.Trojan.RSP", "Bck/Corsbot.B", "Win32.Backdoor.Aphexdoor.Airh", "Trojan.Suckspro!fID1dcqse2s", "W32/Aphexdoor.LITESOCK!tr.bdr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Interestingly", ",", "the", "command", "and", "control", "server", "includes", "a", "publicly", "accessible", "interface", "to", "work", "with", "the", "victims", ":", "Some", "of", "the", "commands", "with", "rough", "translations", ":", "The", "command-and-control", "server", "is", "running", "Windows", "Server", "2003", "and", "has", "been", "configured", "for", "Chinese", "language", ":", "This", ",", "together", "with", "the", "logs", ",", "is", "a", "strong", "indicator", "that", "the", "attackers", "are", "Chinese-speaking", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Worm.Win32.Chiviper!O", "Worm.AutoRun.14759", "W32/AutoRun.sdc", "Win32.Trojan.WisdomEyes.16070401.9500.9975", "WORM_OTORUN.SMIF", "Win.Trojan.Qhost-160", "Worm.Win32.Chiviper.gk", "Trojan.Win32.AutoRun.onby", "Trojan.AVKill.11726", "Worm.AutoRun.Win32.23223", "WORM_OTORUN.SMIF", "BehavesLike.Win32.Ipamor.qt", "Worm.Win32.AutoRun", "WORM/Autorun.rmr", "win32.troj.onlinegamest.bc.kcloud", "Worm.Win32.Chiviper.gk", "Trojan/Win32.CSon.R2002", "Worm.Chiviper", "Worm.AutoRun!t3rz8tcZQ1A", "W32/Chiviper.GK!worm" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Zbot.7", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Win.Trojan.Kazy-50", "Trojan.Win32.Pamela.hnatv", "Trojan.Win32.A.Inject.75189", "DDoS.Pamela", "Trojan.Inject.Win32.17142", "BehavesLike.Win32.Dropper.pc", "Trojan.Win32.Inject", "Trojan/Inject.mra", "Trojan/Win32.Inject", "Trojan:Win32/Pucodex.A", "Trojan-Injector.191245" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Worm/W32.Sober.135968", "Packed.Win32.TDSS!O", "Worm.Sober.Win32.7", "WORM_SOBER.AM", "Win32.Trojan.WisdomEyes.16070401.9500.9997", "W32/Sober.DVXC-4063", "W32.Sober.W@mm", "Win32/Sober.T", "WORM_SOBER.AM", "Win.Worm.Sober-43", "Email-Worm.Win32.Sober.x", "Trojan.Win32.Sober.fxvm", "I-Worm.Win32.Sober.T", "Packer.W32.Tibs.l4Hz", "Worm.Win32.Sober.V", "Win32.HLLM.Sober", "BehavesLike.Win32.Autorun.cc", "Trojan.Win32.Pasta", "W32/Sober.V@mm", "I-Worm/Sober.p", "DR/Sober.T", "Worm[Email]/Win32.Sober", "Worm.Sober.t.kcloud", "Worm:Win32/Sober.Y@mm.dr", "Email-Worm.Win32.Sober.x", "Dropper/Win32.Sober.R86508", "W32/Sober.s.dr", "TScope.Trojan.VB", "W32/Sober.AE.worm", "Win32/Sober.V", "Win32.Worm-email.Sober.Akew", "I-Worm.Sober.AF1", "W32/Sober.T@mm" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "To", "their", "credit", ",", "both", "Google", "and", "Amazon", "appear", "to", "have", "put", "pressure", "on", "device", "manufacturers", "to", "fix", "their", "devices", "when", "flaws", "are", "found", ",", "Strazzere", "says", "." ]
[ 16, 16, 16, 16, 16, 4, 16, 4, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Proofpoint", "is", "tracking", "this", "attacker,", "believed", "to", "operate", "out", "of", "China,", "as", "TA459" ]
[ 4, 16, 16, 16, 6, 16, 16, 16, 16, 16, 2, 16, 6 ]
[ "Data", "Encryption", "The", "Curve25519", "encryption", "algorithm", "was", "implemented", "as", "of", "EventBot", "Version", "0.0.0.2", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16 ]
[ "The", "first", "anti-sandbox", "technique", "is", "the", "loader", "checking", "the", "code", "segment", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "360", "Network", "Security", "Research", "Lab", "recently", "discovered", "a", "new", "botnet", "that", "is", "scanning", "the", "entire", "Internet", "on", "a", "large", "scale." ]
[ 4, 12, 12, 12, 12, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "In", "addition", ",", "we", "did", "not", "see", "traces", "of", "the", "Smali", "injection", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Recently", "there", "was", "a", "huge", "wave", "of", "SMS", "messages", ",", "as", "well", "as", "Whatsapp", "messages", ",", "making", "the", "rounds", "asking", "users", "to", "download", "the", "latest", "version", "of", "TikTok", "at", "hxxp", ":", "//tiny", "[", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 1, 9, 9, 9, 9 ]
[ "The", "malware", "has", "existed", "since", "at", "least", "2012,", "with", "threat", "actors", "using", "it", "for", "mass-spreading", "malware", "campaigns", "and", "for", "ongoing", "targeted", "attacks." ]
[ 16, 3, 16, 16, 16, 16, 16, 0, 16, 6, 14, 16, 16, 16, 6, 14, 14, 16, 16, 16, 16, 1 ]
[ "Triada", ":", "organized", "crime", "on", "Android", "Second", ",", "it", "substitutes", "the", "system", "functions", "and", "conceals", "its", "modules", "from", "the", "list", "of", "the", "running", "processes", "and", "installed", "apps", "." ]
[ 3, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Fragment", "of", "the", "database", "with", "targeted", "devices", "and", "specific", "memory", "addresses", "If", "the", "infected", "device", "is", "not", "listed", "in", "this", "database", ",", "the", "exploit", "tries", "to", "discover", "these", "addresses", "programmatically", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.CareFree.a", "Win32/Tnega.TaRMRTC", "Trojan.Win32.Graftor.dogten", "Trojan.KillFiles.21059", "BehavesLike.Win32.Downloader.mc", "TR/Graftor.cpoyxe", "Trojan.Ursu.D2DC2", "Trojan/Win32.StartPage.R131400", "Win32/Trojan.e36" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "This", "group", "has", "been", "active", "since", "at", "least", "2014", "and", "uses", "spear-phishing", "campaigns", "to", "target", "enterprises." ]
[ 16, 6, 16, 16, 16, 16, 3, 16, 0, 16, 16, 6, 14, 16, 4, 12 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9992", "Trojan-Spy.MSIL.KeyLogger.ctnb", "Trojan.Win32.Z.Keylogger.91136.M", "Msil.Trojan-spy.Keylogger.Wqde", "Trojan.DownLoader9.24657", "TrojanSpy.MSIL.vlt", "TR/Downloader.gldnp", "Trojan[Spy]/MSIL.KeyLogger", "Trojan.MSILPerseus.D9E17", "Trojan-Spy.MSIL.KeyLogger.ctnb", "Backdoor:MSIL/Cooatut.A", "TrojanSpy.MSIL.KeyLogger", "Trj/CI.A", "MSIL/Troob.AA", "Trojan.MSIL.Troob", "MSIL/Troob.AA!tr", "Win32/Trojan.Spy.144" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Instead,", "MacDownloader", "is", "a", "simple", "exfiltration", "agent,", "with", "broader", "ambitions." ]
[ 16, 3, 16, 16, 1, 9, 9, 16, 16, 16 ]
[ "Throughout", "2016,", "Proofpoint", "researchers", "tracked", "a", "cyber-espionage", "campaign", "targeting", "victims", "in", "Russia", "and", "neighboring", "countries." ]
[ 16, 0, 4, 12, 16, 16, 6, 14, 16, 16, 16, 2, 16, 2, 10 ]
[ "This", "threat", "actor", "has", "been", "very", "active", "in", "February", "and", "March", "2023", "targeting", "individuals", "in", "various", "South", "Korean", "organizations." ]
[ 16, 6, 14, 16, 16, 16, 16, 16, 0, 16, 0, 8, 16, 4, 16, 16, 4, 12, 12 ]
[ "The", "Trojan", "is", "delivered", "in", "emails", "that", "mostly", "target", "corporate", "users." ]
[ 3, 11, 16, 16, 16, 1, 16, 16, 16, 4, 12 ]
[ "We", "can", "trace", "activities", "of", "Pawn", "Storm", "back", "to", "20041", "and", "before", "our", "initial", "report", "in", "2014", "there", "wasn't", "much", "published", "about", "this", "actor", "group." ]
[ 16, 16, 16, 16, 16, 6, 14, 16, 16, 0, 16, 16, 16, 16, 16, 16, 0, 16, 16, 16, 16, 16, 16, 6, 14 ]
[ "Backdoor.Win32.Denis", "uses", "DNS", "tunneling", "for", "communication" ]
[ 1, 16, 1, 9, 9, 9 ]
[ "A", "few", "days", "before", "the", "Kuala", "Lumpur", "summit,", "a", "subdomain", "under", "asean.org", "for", "the", "ASEAN", "Secretariat", "Resource", "Centre", "ARC", "was", "compromised." ]
[ 16, 0, 8, 8, 16, 4, 12, 12, 16, 1, 9, 9, 16, 4, 12, 12, 12, 12, 12, 16, 16 ]