id
int64 1
14.4k
| text
stringlengths 3
5.01k
| entities
list | relations
list | Comments
list |
---|---|---|---|---|
1,150 | “jh” itself is more common than would be expected given that, with fingers on the home row, it requires the right index finger to move and press another key before any other key is struck. | [] | [] | [] |
474 | What can I do about it? | [] | [] | [] |
1,319 | FormerFirstRAT This remote administration tool (RAT) is referred to as “FormerFirstRAT” by its authors. | [
{
"id": 3989,
"label": "malware",
"start_offset": 1,
"end_offset": 15
},
{
"id": 3992,
"label": "malware",
"start_offset": 74,
"end_offset": 88
}
] | [] | [] |
2,414 | It contains the core, beans, context and Spring Expression Language (SpEL) modules. | [
{
"id": 47492,
"label": "SOFTWARE",
"start_offset": 41,
"end_offset": 74
}
] | [] | [] |
558 | During the operation, 25.1 BTC from 538 wallets was sent to 1NDyJtNTjmwk5xPNhjgAMu4HDHigtobu1s (SHA256: CE11703DEF517306326C48A67A7C859A3DE0F18E2451DF226CE171389A5B7953), which is a wallet owned by Binance cryptocurrency exchange. | [
{
"id": 1845,
"label": "SHA2",
"start_offset": 104,
"end_offset": 168
},
{
"id": 44776,
"label": "identity",
"start_offset": 198,
"end_offset": 229
}
] | [
{
"id": 164,
"from_id": 44776,
"to_id": 1845,
"type": "owns"
}
] | [] |
5,247 | Sphinx was active between June 2014 and November 2015, but timestamps of the malware indicate the attacks started as early as 2011. | [
{
"id": 51283,
"label": "TIME",
"start_offset": 26,
"end_offset": 35
},
{
"id": 51285,
"label": "TIME",
"start_offset": 126,
"end_offset": 130
},
{
"id": 51282,
"label": "campaign",
"start_offset": 0,
"end_offset": 6
},
{
"id": 51284,
"label": "TIME",
"start_offset": 40,
"end_offset": 53
}
] | [] | [] |
14,186 | Oil and gas, banking and defense sectors are most likely to top of the list of targets. | [] | [] | [] |
9,102 | During this time we developed URL-based signatures and used them to detect Lurk-related network traffic. | [
{
"id": 28099,
"label": "location",
"start_offset": 12,
"end_offset": 16
},
{
"id": 28100,
"label": "location",
"start_offset": 51,
"end_offset": 54
},
{
"id": 28101,
"label": "location",
"start_offset": 60,
"end_offset": 64
},
{
"id": 28102,
"label": "malware",
"start_offset": 75,
"end_offset": 79
}
] | [] | [] |
5,023 | Similar to recently observed activity, these campaigns were sent via email and contained a unique link per target that led to a DOCX file hosted on attacker controlled infrastructure. | [] | [] | [] |
14,196 | But on top of that, organizations must have the detection and response tooling, ideally XDR, to correlate, prioritize and act on high fidelity alerts with speed and precision. | [] | [] | [] |
5,334 | The server must reply with an exact four-byte answer, which is the victim's IPv4 address. | [] | [] | [] |
3,045 | Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address! | [] | [] | [] |
5,211 | Table 3 shows that the BAF is greater than one, implying there are asymmetric network flows although the values are at the order of magnitude lower than modern amplification attacks (note that Memcached can reach 10,000 to 51,000 BAF). | [] | [] | [] |
11,549 | This group also has links to the original developers of H-Worm, also known as njRAT. | [
{
"id": 35390,
"label": "malware",
"start_offset": 78,
"end_offset": 83
}
] | [] | [] |
5,165 | How are you looking for visibility across all of your systems? | [] | [] | [] |
2,308 | The macOS exploits did not use the same framework as iOS ones. | [
{
"id": 47374,
"label": "SOFTWARE",
"start_offset": 4,
"end_offset": 9
},
{
"id": 47375,
"label": "SOFTWARE",
"start_offset": 53,
"end_offset": 56
}
] | [] | [] |
11,173 | We terminated 1,312 YouTube channels as part of our ongoing investigation into coordinated influence operations linked to China. | [] | [] | [] |
13,729 | The typical Waterbear infection chain Figure 1. | [
{
"id": 42690,
"label": "tools",
"start_offset": 12,
"end_offset": 21
}
] | [] | [] |
13,343 | The screenshot in Figure 2 shows how the threat actor uses SMB and internal IIS Web Service to copy "lc.tmp" (the main ransomware loader in this incident) to other victims' host machines. | [
{
"id": 41526,
"label": "location",
"start_offset": 63,
"end_offset": 66
},
{
"id": 41527,
"label": "attack-pattern",
"start_offset": 80,
"end_offset": 91
},
{
"id": 41528,
"label": "location",
"start_offset": 173,
"end_offset": 177
}
] | [] | [] |
12,356 | Shortly after the U.S. Treasury sanctioned Ukrainian Parliament member Andrii Derkach for attempting to influence the U.S. electoral process, we removed 14 Google accounts that were linked to him. | [] | [] | [] |
11,193 | HYPERSCRAPE requires the victim’s account credentials to run using a valid, authenticated user session the attacker has hijacked, or credentials the attacker has already acquired. | [] | [] | [] |
8,123 | Figure 10. Steps FileCrypt Manager prompts user to do | [] | [] | [] |
12,824 | Similar Objectives. | [] | [] | [] |
10,605 | In the past, we’ve posted on issues like phishing campaigns, vulnerabilities and disinformation. | [
{
"id": 32350,
"label": "attack-pattern",
"start_offset": 41,
"end_offset": 49
},
{
"id": 32351,
"label": "location",
"start_offset": 77,
"end_offset": 80
}
] | [] | [] |
4,170 | Code Similarity | [] | [] | [] |
1,884 | In the process of monitoring changes in the threat landscape, we get a clearer insight into the way threat actors work behind the schemes. | [] | [] | [] |
5,554 | They use a one-time generated series of numbers for each transaction, so that if attackers get their hands on it, they won’t be able to use it in the future. | [] | [] | [] |
3,893 | According to the agency, critical infrastructure owners and operators should also adopt an "heightened state of awareness". | [] | [] | [] |
4,823 | Ghostwriter/UNC1151, a threat actor attributed to Belarus, has remained active targeting accounts of webmail and social media networks of Polish users. | [
{
"id": 50766,
"label": "threat-actor",
"start_offset": 0,
"end_offset": 11
},
{
"id": 50767,
"label": "threat-actor",
"start_offset": 12,
"end_offset": 19
},
{
"id": 50768,
"label": "location",
"start_offset": 50,
"end_offset": 57
}
] | [
{
"id": 1011,
"from_id": 50767,
"to_id": 50766,
"type": "duplicate-of"
},
{
"id": 1012,
"from_id": 50766,
"to_id": 50768,
"type": "attributed-to"
}
] | [] |
7,071 | On two occasions (in March and October 2020), we found a kernel rootkit that had been deployed. | [
{
"id": 22150,
"label": "location",
"start_offset": 27,
"end_offset": 30
},
{
"id": 22152,
"label": "attack-pattern",
"start_offset": 64,
"end_offset": 71
}
] | [] | [] |
5,219 | Proper supply chain management processes allow contextualization, tracking, and monitoring of new vulnerabilities within different downstream software using a specific library such as DDS. | [] | [] | [] |
9,348 | It also receives commands from the C&C server to take screenshots, which it later sends to the server. | [] | [] | [] |
13,695 | Here are some tips on how to stay protected from email scams: | [] | [] | [] |
1,819 | Additional tools and components were copied to the compromised machine using AnyDeskMSI to scan the local network and disable security products. | [
{
"id": 46934,
"label": "tools",
"start_offset": 77,
"end_offset": 87
},
{
"id": 46936,
"label": "attack-pattern",
"start_offset": 91,
"end_offset": 113
},
{
"id": 46937,
"label": "attack-pattern",
"start_offset": 118,
"end_offset": 143
}
] | [
{
"id": 265,
"from_id": 46934,
"to_id": 46936,
"type": "uses"
},
{
"id": 266,
"from_id": 46934,
"to_id": 46937,
"type": "uses"
}
] | [] |
7,269 | Arrival | [] | [] | [] |
2,699 | In August 2021, a Russian blogger published a 22-minute interview with an alleged representative of the group behind LockBit 2.0 called “LockBitSupp” on a YouTube channel called “Russian-language open source intelligence (OSINT).” | [
{
"id": 47935,
"label": "location",
"start_offset": 18,
"end_offset": 26
},
{
"id": 47934,
"label": "TIME",
"start_offset": 4,
"end_offset": 15
},
{
"id": 47936,
"label": "threat-actor",
"start_offset": 118,
"end_offset": 129
},
{
"id": 47937,
"label": "SOFTWARE",
"start_offset": 156,
"end_offset": 163
}
] | [] | [] |
450 | Please mark, I'm not a robot! By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. | [] | [] | [] |
2,142 | This post is also available in: 日本語 (Japanese) | [] | [] | [] |
3,733 | The CISA Alert also calls out CVE-2022-22972 and CVE-2022-22973 – published on the same day and affecting the same products – as being highly likely to be exploited. | [
{
"id": 49540,
"label": "identity",
"start_offset": 4,
"end_offset": 8
},
{
"id": 49542,
"label": "vulnerability",
"start_offset": 49,
"end_offset": 63
},
{
"id": 49541,
"label": "vulnerability",
"start_offset": 30,
"end_offset": 44
}
] | [] | [] |
3,400 | BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 7f4e02a041ca7cfbdc79b96a890822fd7c37be67b1f6c9e07596e6aec57ccdc0 Silverlight.exe | [
{
"id": 10263,
"label": "malware",
"start_offset": 0,
"end_offset": 11
},
{
"id": 10264,
"label": "SHA2",
"start_offset": 46,
"end_offset": 110
},
{
"id": 49064,
"label": "malware",
"start_offset": 20,
"end_offset": 44
},
{
"id": 49065,
"label": "FILEPATH",
"start_offset": 112,
"end_offset": 127
}
] | [
{
"id": 636,
"from_id": 10263,
"to_id": 49064,
"type": "duplicate-of"
},
{
"id": 637,
"from_id": 49065,
"to_id": 10264,
"type": "duplicate-of"
},
{
"id": 638,
"from_id": 10264,
"to_id": 49064,
"type": "indicates"
},
{
"id": 639,
"from_id": 49065,
"to_id": 49064,
"type": "indicates"
}
] | [] |
8,432 | On Gmail, we recommend certain Gmail security precautions to prevent spoofing, phishing, and spam. | [
{
"id": 25986,
"label": "location",
"start_offset": 37,
"end_offset": 45
},
{
"id": 25987,
"label": "attack-pattern",
"start_offset": 79,
"end_offset": 87
},
{
"id": 25988,
"label": "location",
"start_offset": 89,
"end_offset": 92
}
] | [] | [] |
941 | These apps are not hosted inside the Google Play store, but are distributed via third party distribution mechanisms in China. | [
{
"id": 46453,
"label": "SOFTWARE",
"start_offset": 37,
"end_offset": 54
},
{
"id": 46454,
"label": "location",
"start_offset": 119,
"end_offset": 124
}
] | [] | [] |
4,397 | Accept-Encoding: gzip Connection: Keep-Alive | [] | [] | [] |
10,265 | The different versions of gdrive.exe are almost identical, with a minor addition to the file 2060f1e108f5feb5790320c38931e3dc6c7224edf925bf6f1840351578bbf9cc of base64 encoding on the victim’s id. | [
{
"id": 31369,
"label": "location",
"start_offset": 37,
"end_offset": 40
},
{
"id": 31370,
"label": "location",
"start_offset": 66,
"end_offset": 71
},
{
"id": 31371,
"label": "SHA2",
"start_offset": 93,
"end_offset": 157
}
] | [] | [] |
8,967 | Unverified developer warning with the “Open” button enabled | [] | [] | [] |
3,885 | The guidance provides steps to prepare for, mitigate against, and respond to attacks. | [] | [] | [] |
1,282 | Figure 7 shows the relationship between these backdoors and their respective command and control servers. | [] | [] | [] |
464 | To get that list of domains that the malware will use, defenders have to decode the algorithm which can be difficult. | [] | [] | [] |
4,148 | Figure 12. | [] | [] | [] |
6,332 | It was uploaded to VirusTotal on May 19, 2022, from Sri Lanka. | [] | [] | [] |
440 | That site’s owner is the attacker. | [] | [] | [] |
8,514 | We blocked 1.6M messages to targets, displayed ~62K Safe Browsing phishing page warnings, blocked 2.4K files, and successfully restored ~4K accounts. | [
{
"id": 26294,
"label": "location",
"start_offset": 52,
"end_offset": 56
},
{
"id": 26295,
"label": "attack-pattern",
"start_offset": 66,
"end_offset": 74
},
{
"id": 26296,
"label": "location",
"start_offset": 75,
"end_offset": 79
},
{
"id": 26299,
"label": "location",
"start_offset": 110,
"end_offset": 113
}
] | [] | [] |
1,153 | The second mutex appears to be a concerted effort to make the mutex seem “more random” than the first. | [] | [] | [] |
3,349 | The domains and the PDB string have been mentioned in a recent report and have been attributed to the Winnti Group. | [
{
"id": 48962,
"label": "threat-actor",
"start_offset": 102,
"end_offset": 114
}
] | [] | [] |
10,263 | The message box that decrypt.exe displays | [] | [] | [] |
11,267 | Gather information on an endpoint Gathers information from the endpoint such as the current logged on user, operating system details, IP address, hostname, mac address | [] | [] | [] |
3,719 | In both Carbanak and FIN7 attacks, communication with users’ compromised systems is done through bypassing firewalls or network detection systems via commonly used ports, using connection proxies to avoid direct connections to the threat group’s infrastructure, employing the command-and-control channel to remotely copy files from an external system, blending in with existing network traffic by using standard application layer protocol, and taking advantage of standard cryptographic protocol to disguise command-and-control traffic. | [
{
"id": 49518,
"label": "threat-actor",
"start_offset": 8,
"end_offset": 16
},
{
"id": 49519,
"label": "threat-actor",
"start_offset": 21,
"end_offset": 25
},
{
"id": 49520,
"label": "attack-pattern",
"start_offset": 97,
"end_offset": 116
},
{
"id": 49521,
"label": "attack-pattern",
"start_offset": 171,
"end_offset": 195
},
{
"id": 49522,
"label": "attack-pattern",
"start_offset": 352,
"end_offset": 393
}
] | [
{
"id": 817,
"from_id": 49518,
"to_id": 49519,
"type": "related-to"
},
{
"id": 818,
"from_id": 49519,
"to_id": 49520,
"type": "uses"
},
{
"id": 819,
"from_id": 49519,
"to_id": 49521,
"type": "uses"
},
{
"id": 820,
"from_id": 49519,
"to_id": 49522,
"type": "uses"
}
] | [] |
2,492 | Unit 42 researchers are proactively monitoring info related to other recently disclosed Spring vulnerabilities and will proceed to provide coverage as soon as more info has become available. | [
{
"id": 7440,
"label": "identity",
"start_offset": 0,
"end_offset": 7
},
{
"id": 47576,
"label": "SOFTWARE",
"start_offset": 88,
"end_offset": 94
}
] | [] | [] |
1,708 | Last year we highlighted two malware families on this blog: CryptoWall 2.0 and Dyreza/Dyre. | [
{
"id": 46883,
"label": "malware",
"start_offset": 61,
"end_offset": 75
},
{
"id": 46884,
"label": "malware",
"start_offset": 80,
"end_offset": 86
},
{
"id": 46885,
"label": "malware",
"start_offset": 87,
"end_offset": 91
}
] | [
{
"id": 247,
"from_id": 46884,
"to_id": 46885,
"type": "duplicate-of"
}
] | [] |
5,668 | This finding sparked an investigation that led us to identify, with high confidence, multiple online services offered by the individuals operating the Glupteba botnet. | [
{
"id": 17458,
"label": "location",
"start_offset": 73,
"end_offset": 83
},
{
"id": 17459,
"label": "malware",
"start_offset": 151,
"end_offset": 159
}
] | [] | [] |
1,650 | While many users breeze past the list of permissions required when installing new apps, readers of this blog should ask themselves, “Does my electronic bible need to read my SMS messages?” Sign up to receive the latest news, cyber threat intelligence and research from us | [] | [] | [] |
2,893 | local7 | [] | [] | [] |
10,000 | It is a variant of PlugX malware, and connects to the same C&C server (66[.]42[.]37[.]101). Figure 8. | [
{
"id": 30524,
"label": "malware",
"start_offset": 19,
"end_offset": 24
},
{
"id": 30525,
"label": "location",
"start_offset": 34,
"end_offset": 37
},
{
"id": 30526,
"label": "location",
"start_offset": 54,
"end_offset": 58
},
{
"id": 30527,
"label": "IPV4",
"start_offset": 71,
"end_offset": 89
}
] | [] | [] |
11,266 | Delete email message Permanently deletes the specified email message from the user’s mailbox | [] | [] | [] |
425 | Because of this, people can earn digital currency credit in exchange for the use of their computing resources to power that digital currency’s infrastructure. | [] | [] | [] |
528 | 32-bit EXE is the most common ransomware file type we observed. | [] | [] | [] |
980 | Some of the infected apps purport to contain or display adult content. | [] | [] | [] |
2,253 | The results of these commands are uploaded to the C2 server. | [] | [] | [] |
9,894 | Job Opportunity SIPCHEM 7/30/18 jobs@sipchem.ga | [
{
"id": 30202,
"label": "location",
"start_offset": 0,
"end_offset": 3
},
{
"id": 30203,
"label": "location",
"start_offset": 4,
"end_offset": 15
},
{
"id": 30204,
"label": "EMAIL",
"start_offset": 32,
"end_offset": 47
}
] | [] | [] |
6,968 | Figure 13. | [] | [] | [] |
7,362 | Decoding the scanner revealed the following codes: #!/bin/bash cd /tmp rm -rf .ssh rm -rf .mountfs rm -rf .X13-unix rm -rf .X17-unix rm -rf .X19-unix mkdir .X19-unix cd .X19-unix mv /var/tmp/dota3.tar.gz dota3.tar.gz tar xf dota3.tar.gz sleep 3s && cd /tmp/.X19-unix/.rsync/c nohup /tmp/.X19-unix/.rsync/c/tsm -t 150 -S 6 -s 6 -p 22 -P 0 -f 0 -k 1 -l 1 -i 0 /tmp/up.txt 192.168 >> /dev/null 2>1& sleep 8m && nohup /tmp/.X19-unix/.rsync/c/tsm -t 150 -S 6 -s 6 -p 22 -P 0 -f 0 -k 1 -l 1 -i 0 | [] | [] | [] |
11,147 | We terminated 4 YouTube channels as part of our actions against a coordinated influence operation. | [] | [] | [] |
8,331 | A new folder named "Download" is created adjacent to the main binary. | [] | [] | [] |
2,803 | On Friday May 12, 2017, Microsoft took the extraordinary step of releasing patches for out-of-support versions of Windows to help protect against these attacks. | [
{
"id": 48019,
"label": "TIME",
"start_offset": 10,
"end_offset": 22
},
{
"id": 48020,
"label": "identity",
"start_offset": 24,
"end_offset": 33
},
{
"id": 48021,
"label": "SOFTWARE",
"start_offset": 114,
"end_offset": 121
}
] | [] | [] |
7,570 | The payload can vary in each campaign, but it typically uses the FlawedAmmyy downloader, ServHelper, or RMS RAT launcher. | [
{
"id": 23611,
"label": "location",
"start_offset": 12,
"end_offset": 15
},
{
"id": 23612,
"label": "location",
"start_offset": 29,
"end_offset": 37
},
{
"id": 23613,
"label": "malware",
"start_offset": 65,
"end_offset": 76
}
] | [] | [] |
3,508 | The following is a list of Protux’s notable components and their functions: FileManage - Lists all of the system’s drives and folders. | [
{
"id": 49301,
"label": "malware",
"start_offset": 27,
"end_offset": 33
}
] | [] | [] |
10,275 | showing | [] | [] | [] |
13,621 | This utility has a feature called “Import Adder,” while “.newimp” is the default name of a newly added section containing newly added imports. | [] | [] | [] |
12,388 | We terminated 8 YouTube channels as part of our actions against a coordinated influence operation linked to Yemen. | [] | [] | [] |
4,421 | x.TextContent.StartsWith("Review blocked sign-in attempt") || x.TextContent. | [] | [] | [] |
5,076 | The earliest evidence we have of this exploit kit being actively deployed is January 4, 2022. | [
{
"id": 51186,
"label": "TIME",
"start_offset": 77,
"end_offset": 92
}
] | [] | [] |
9,881 | The group puts up multiple layers of obfuscation to run these C&C servers in extremely targeted malware campaigns against organizations in the Middle East, the U.S., and Asia. | [
{
"id": 30117,
"label": "attack-pattern",
"start_offset": 87,
"end_offset": 103
},
{
"id": 30120,
"label": "location",
"start_offset": 166,
"end_offset": 169
}
] | [] | [] |
4,587 | The vulnerability has been dubbed as ProxyLogon by the researchers at DEVCORE, who are credited with finding the bugs in the proxy architecture and the logon mechanism of Exchange. | [
{
"id": 50446,
"label": "SOFTWARE",
"start_offset": 172,
"end_offset": 180
},
{
"id": 50444,
"label": "vulnerability",
"start_offset": 38,
"end_offset": 48
},
{
"id": 50445,
"label": "identity",
"start_offset": 71,
"end_offset": 78
}
] | [
{
"id": 974,
"from_id": 50446,
"to_id": 50444,
"type": "has"
}
] | [] |
5,010 | Google’s Threat Analysis Group (TAG) has been closely monitoring the cybersecurity activity in Eastern Europe with regard to the war in Ukraine. | [
{
"id": 51063,
"label": "identity",
"start_offset": 0,
"end_offset": 36
},
{
"id": 51064,
"label": "location",
"start_offset": 95,
"end_offset": 109
},
{
"id": 51065,
"label": "location",
"start_offset": 136,
"end_offset": 143
}
] | [] | [] |
9,480 | Table 2. | [] | [] | [] |
4,186 | Exploit public-facing application Execution T1059.001 | [
{
"id": 49987,
"label": "attack-pattern",
"start_offset": 0,
"end_offset": 53
}
] | [] | [] |
6,667 | VDI solutions can provide protection against a destructive malware like Disttrack through the ability to load snapshots of wiped systems to recover from a wiper attack. | [
{
"id": 20693,
"label": "location",
"start_offset": 14,
"end_offset": 17
},
{
"id": 20694,
"label": "location",
"start_offset": 26,
"end_offset": 36
},
{
"id": 20696,
"label": "location",
"start_offset": 105,
"end_offset": 109
},
{
"id": 20697,
"label": "malware",
"start_offset": 155,
"end_offset": 160
}
] | [] | [] |
3,987 | The guideline thoroughly explains the three most common methods threat groups use to infiltrate the supply chain. | [] | [] | [] |
9,422 | In this stage, a blob of payload data is decrypted using a hard-coded key (2726c6aea9970bb95211304705b5f595) and what appears to be an RC4 (Rivest Cipher 4) algorithm. | [
{
"id": 29001,
"label": "location",
"start_offset": 59,
"end_offset": 63
},
{
"id": 29002,
"label": "MD5",
"start_offset": 75,
"end_offset": 107
},
{
"id": 29003,
"label": "location",
"start_offset": 109,
"end_offset": 112
}
] | [] | [] |
9,571 | GET http://{C2}/Index.php?Ck=OK HTTP/1.1 | [
{
"id": 29366,
"label": "URL",
"start_offset": 4,
"end_offset": 28
}
] | [] | [] |
8,809 | Shortly after the U.S. Treasury sanctioned Ukrainian Parliament member Andrii Derkach for attempting to influence the U.S. electoral process, we removed 14 Google accounts that were linked to him. | [] | [] | [] |
7,049 | The launcher decrypts the data.res file with a different hardcoded DES key. | [] | [] | [] |
353 | CHS’s 8-K filing on Monday did not reveal how the attackers got into their network, only that the records of approximately 4.5 million patients were stolen in attacks in between April and June of 2014. | [
{
"id": 46048,
"label": "identity",
"start_offset": 0,
"end_offset": 3
},
{
"id": 46049,
"label": "TIME",
"start_offset": 20,
"end_offset": 26
},
{
"id": 46050,
"label": "TIME",
"start_offset": 178,
"end_offset": 184
},
{
"id": 46051,
"label": "TIME",
"start_offset": 188,
"end_offset": 200
}
] | [] | [] |
9,115 | Lurk’s transition from simple web-browser-exploiting crooks to organized cybercriminals also stood out. | [
{
"id": 28147,
"label": "malware",
"start_offset": 0,
"end_offset": 4
},
{
"id": 28148,
"label": "location",
"start_offset": 53,
"end_offset": 59
}
] | [] | [] |
14,008 | The following sections describe the different correlations and are divided into two main categories: Correlation related to the malware author developing environment Correlation associated with TTPs Note that some leads are stronger than others; however, when combined, they suggest that the same threat actor behind malware previously attributed to APT37 is likely responsible for Operation Earth Kitsune. | [
{
"id": 47183,
"label": "campaign",
"start_offset": 384,
"end_offset": 407
},
{
"id": 43419,
"label": "threat-actor",
"start_offset": 352,
"end_offset": 357
}
] | [] | [] |
106 | Similarly, DarkSide operators used Mega client for exfiltrating files to cloud storage, 7-Zip for archiving, and PuTTY application for network file transfers. | [
{
"id": 45834,
"label": "threat-actor",
"start_offset": 11,
"end_offset": 29
},
{
"id": 45835,
"label": "tools",
"start_offset": 35,
"end_offset": 46
},
{
"id": 45836,
"label": "tools",
"start_offset": 88,
"end_offset": 93
},
{
"id": 45837,
"label": "tools",
"start_offset": 113,
"end_offset": 118
}
] | [
{
"id": 120,
"from_id": 45834,
"to_id": 45835,
"type": "uses"
},
{
"id": 121,
"from_id": 45834,
"to_id": 45836,
"type": "uses"
},
{
"id": 122,
"from_id": 45834,
"to_id": 45837,
"type": "uses"
}
] | [] |
13,582 | The attack we found only works on Series 2 of EC-CUBE; the current version is Series 4, with Series 2 now under extended support. | [
{
"id": 51667,
"label": "tools",
"start_offset": 34,
"end_offset": 53
},
{
"id": 51668,
"label": "tools",
"start_offset": 78,
"end_offset": 86
}
] | [] | [] |
1,393 | Read more on the XSOAR marketplace. | [] | [] | [] |
4,719 | In December 2021, we released research about novel techniques used by NSO Group to compromise iMessage users. | [
{
"id": 50617,
"label": "TIME",
"start_offset": 3,
"end_offset": 16
},
{
"id": 50618,
"label": "threat-actor",
"start_offset": 70,
"end_offset": 79
},
{
"id": 50619,
"label": "SOFTWARE",
"start_offset": 94,
"end_offset": 102
}
] | [] | [] |
2,768 | They can be used to: These are all likely outcomes from mass scanning of the Internet for vulnerable hosts, which are already underway. | [] | [] | [] |