id
int64
1
14.4k
text
stringlengths
3
5.01k
entities
list
relations
list
Comments
list
1,150
“jh” itself is more common than would be expected given that, with fingers on the home row, it requires the right index finger to move and press another key before any other key is struck.
[]
[]
[]
474
What can I do about it?
[]
[]
[]
1,319
FormerFirstRAT This remote administration tool (RAT) is referred to as “FormerFirstRAT” by its authors.
[ { "id": 3989, "label": "malware", "start_offset": 1, "end_offset": 15 }, { "id": 3992, "label": "malware", "start_offset": 74, "end_offset": 88 } ]
[]
[]
2,414
It contains the core, beans, context and Spring Expression Language (SpEL) modules.
[ { "id": 47492, "label": "SOFTWARE", "start_offset": 41, "end_offset": 74 } ]
[]
[]
558
During the operation, 25.1 BTC from 538 wallets was sent to 1NDyJtNTjmwk5xPNhjgAMu4HDHigtobu1s (SHA256: CE11703DEF517306326C48A67A7C859A3DE0F18E2451DF226CE171389A5B7953), which is a wallet owned by Binance cryptocurrency exchange.
[ { "id": 1845, "label": "SHA2", "start_offset": 104, "end_offset": 168 }, { "id": 44776, "label": "identity", "start_offset": 198, "end_offset": 229 } ]
[ { "id": 164, "from_id": 44776, "to_id": 1845, "type": "owns" } ]
[]
5,247
Sphinx was active between June 2014 and November 2015, but timestamps of the malware indicate the attacks started as early as 2011.
[ { "id": 51283, "label": "TIME", "start_offset": 26, "end_offset": 35 }, { "id": 51285, "label": "TIME", "start_offset": 126, "end_offset": 130 }, { "id": 51282, "label": "campaign", "start_offset": 0, "end_offset": 6 }, { "id": 51284, "label": "TIME", "start_offset": 40, "end_offset": 53 } ]
[]
[]
14,186
Oil and gas, banking and defense sectors are most likely to top of the list of targets.
[]
[]
[]
9,102
During this time we developed URL-based signatures and used them to detect Lurk-related network traffic.
[ { "id": 28099, "label": "location", "start_offset": 12, "end_offset": 16 }, { "id": 28100, "label": "location", "start_offset": 51, "end_offset": 54 }, { "id": 28101, "label": "location", "start_offset": 60, "end_offset": 64 }, { "id": 28102, "label": "malware", "start_offset": 75, "end_offset": 79 } ]
[]
[]
5,023
Similar to recently observed activity, these campaigns were sent via email and contained a unique link per target that led to a DOCX file hosted on attacker controlled infrastructure.
[]
[]
[]
14,196
But on top of that, organizations must have the detection and response tooling, ideally XDR, to correlate, prioritize and act on high fidelity alerts with speed and precision.
[]
[]
[]
5,334
The server must reply with an exact four-byte answer, which is the victim's IPv4 address.
[]
[]
[]
3,045
Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!
[]
[]
[]
5,211
Table 3 shows that the BAF is greater than one, implying there are asymmetric network flows although the values are at the order of magnitude lower than modern amplification attacks (note that Memcached can reach 10,000 to 51,000 BAF).
[]
[]
[]
11,549
This group also has links to the original developers of H-Worm, also known as njRAT.
[ { "id": 35390, "label": "malware", "start_offset": 78, "end_offset": 83 } ]
[]
[]
5,165
How are you looking for visibility across all of your systems?
[]
[]
[]
2,308
The macOS exploits did not use the same framework as iOS ones.
[ { "id": 47374, "label": "SOFTWARE", "start_offset": 4, "end_offset": 9 }, { "id": 47375, "label": "SOFTWARE", "start_offset": 53, "end_offset": 56 } ]
[]
[]
11,173
We terminated 1,312 YouTube channels as part of our ongoing investigation into coordinated influence operations linked to China.
[]
[]
[]
13,729
The typical Waterbear infection chain Figure 1.
[ { "id": 42690, "label": "tools", "start_offset": 12, "end_offset": 21 } ]
[]
[]
13,343
The screenshot in Figure 2 shows how the threat actor uses SMB and internal IIS Web Service to copy "lc.tmp" (the main ransomware loader in this incident) to other victims' host machines.
[ { "id": 41526, "label": "location", "start_offset": 63, "end_offset": 66 }, { "id": 41527, "label": "attack-pattern", "start_offset": 80, "end_offset": 91 }, { "id": 41528, "label": "location", "start_offset": 173, "end_offset": 177 } ]
[]
[]
12,356
Shortly after the U.S. Treasury sanctioned Ukrainian Parliament member Andrii Derkach for attempting to influence the U.S. electoral process, we removed 14 Google accounts that were linked to him.
[]
[]
[]
11,193
HYPERSCRAPE requires the victim’s account credentials to run using a valid, authenticated user session the attacker has hijacked, or credentials the attacker has already acquired.
[]
[]
[]
8,123
Figure 10. Steps FileCrypt Manager prompts user to do
[]
[]
[]
12,824
Similar Objectives.
[]
[]
[]
10,605
In the past, we’ve posted on issues like phishing campaigns, vulnerabilities and disinformation.
[ { "id": 32350, "label": "attack-pattern", "start_offset": 41, "end_offset": 49 }, { "id": 32351, "label": "location", "start_offset": 77, "end_offset": 80 } ]
[]
[]
4,170
Code Similarity
[]
[]
[]
1,884
In the process of monitoring changes in the threat landscape, we get a clearer insight into the way threat actors work behind the schemes.
[]
[]
[]
5,554
They use a one-time generated series of numbers for each transaction, so that if attackers get their hands on it, they won’t be able to use it in the future.
[]
[]
[]
3,893
According to the agency, critical infrastructure owners and operators should also adopt an "heightened state of awareness".
[]
[]
[]
4,823
Ghostwriter/UNC1151, a threat actor attributed to Belarus, has remained active targeting accounts of webmail and social media networks of Polish users.
[ { "id": 50766, "label": "threat-actor", "start_offset": 0, "end_offset": 11 }, { "id": 50767, "label": "threat-actor", "start_offset": 12, "end_offset": 19 }, { "id": 50768, "label": "location", "start_offset": 50, "end_offset": 57 } ]
[ { "id": 1011, "from_id": 50767, "to_id": 50766, "type": "duplicate-of" }, { "id": 1012, "from_id": 50766, "to_id": 50768, "type": "attributed-to" } ]
[]
7,071
On two occasions (in March and October 2020), we found a kernel rootkit that had been deployed.
[ { "id": 22150, "label": "location", "start_offset": 27, "end_offset": 30 }, { "id": 22152, "label": "attack-pattern", "start_offset": 64, "end_offset": 71 } ]
[]
[]
5,219
Proper supply chain management processes allow contextualization, tracking, and monitoring of new vulnerabilities within different downstream software using a specific library such as DDS.
[]
[]
[]
9,348
It also receives commands from the C&C server to take screenshots, which it later sends to the server.
[]
[]
[]
13,695
Here are some tips on how to stay protected from email scams:
[]
[]
[]
1,819
Additional tools and components were copied to the compromised machine using AnyDeskMSI to scan the local network and disable security products.
[ { "id": 46934, "label": "tools", "start_offset": 77, "end_offset": 87 }, { "id": 46936, "label": "attack-pattern", "start_offset": 91, "end_offset": 113 }, { "id": 46937, "label": "attack-pattern", "start_offset": 118, "end_offset": 143 } ]
[ { "id": 265, "from_id": 46934, "to_id": 46936, "type": "uses" }, { "id": 266, "from_id": 46934, "to_id": 46937, "type": "uses" } ]
[]
7,269
Arrival
[]
[]
[]
2,699
In August 2021, a Russian blogger published a 22-minute interview with an alleged representative of the group behind LockBit 2.0 called “LockBitSupp” on a YouTube channel called “Russian-language open source intelligence (OSINT).”
[ { "id": 47935, "label": "location", "start_offset": 18, "end_offset": 26 }, { "id": 47934, "label": "TIME", "start_offset": 4, "end_offset": 15 }, { "id": 47936, "label": "threat-actor", "start_offset": 118, "end_offset": 129 }, { "id": 47937, "label": "SOFTWARE", "start_offset": 156, "end_offset": 163 } ]
[]
[]
450
Please mark, I'm not a robot! By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.
[]
[]
[]
2,142
This post is also available in: 日本語 (Japanese)
[]
[]
[]
3,733
The CISA Alert also calls out CVE-2022-22972 and CVE-2022-22973 – published on the same day and affecting the same products – as being highly likely to be exploited.
[ { "id": 49540, "label": "identity", "start_offset": 4, "end_offset": 8 }, { "id": 49542, "label": "vulnerability", "start_offset": 49, "end_offset": 63 }, { "id": 49541, "label": "vulnerability", "start_offset": 30, "end_offset": 44 } ]
[]
[]
3,400
BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 7f4e02a041ca7cfbdc79b96a890822fd7c37be67b1f6c9e07596e6aec57ccdc0 Silverlight.exe
[ { "id": 10263, "label": "malware", "start_offset": 0, "end_offset": 11 }, { "id": 10264, "label": "SHA2", "start_offset": 46, "end_offset": 110 }, { "id": 49064, "label": "malware", "start_offset": 20, "end_offset": 44 }, { "id": 49065, "label": "FILEPATH", "start_offset": 112, "end_offset": 127 } ]
[ { "id": 636, "from_id": 10263, "to_id": 49064, "type": "duplicate-of" }, { "id": 637, "from_id": 49065, "to_id": 10264, "type": "duplicate-of" }, { "id": 638, "from_id": 10264, "to_id": 49064, "type": "indicates" }, { "id": 639, "from_id": 49065, "to_id": 49064, "type": "indicates" } ]
[]
8,432
On Gmail, we recommend certain Gmail security precautions to prevent spoofing, phishing, and spam.
[ { "id": 25986, "label": "location", "start_offset": 37, "end_offset": 45 }, { "id": 25987, "label": "attack-pattern", "start_offset": 79, "end_offset": 87 }, { "id": 25988, "label": "location", "start_offset": 89, "end_offset": 92 } ]
[]
[]
941
These apps are not hosted inside the Google Play store, but are distributed via third party distribution mechanisms in China.
[ { "id": 46453, "label": "SOFTWARE", "start_offset": 37, "end_offset": 54 }, { "id": 46454, "label": "location", "start_offset": 119, "end_offset": 124 } ]
[]
[]
4,397
Accept-Encoding: gzip Connection: Keep-Alive
[]
[]
[]
10,265
The different versions of gdrive.exe are almost identical, with a minor addition to the file 2060f1e108f5feb5790320c38931e3dc6c7224edf925bf6f1840351578bbf9cc of base64 encoding on the victim’s id.
[ { "id": 31369, "label": "location", "start_offset": 37, "end_offset": 40 }, { "id": 31370, "label": "location", "start_offset": 66, "end_offset": 71 }, { "id": 31371, "label": "SHA2", "start_offset": 93, "end_offset": 157 } ]
[]
[]
8,967
Unverified developer warning with the “Open” button enabled
[]
[]
[]
3,885
The guidance provides steps to prepare for, mitigate against, and respond to attacks.
[]
[]
[]
1,282
Figure 7 shows the relationship between these backdoors and their respective command and control servers.
[]
[]
[]
464
To get that list of domains that the malware will use, defenders have to decode the algorithm which can be difficult.
[]
[]
[]
4,148
Figure 12.
[]
[]
[]
6,332
It was uploaded to VirusTotal on May 19, 2022, from Sri Lanka.
[]
[]
[]
440
That site’s owner is the attacker.
[]
[]
[]
8,514
We blocked 1.6M messages to targets, displayed ~62K Safe Browsing phishing page warnings, blocked 2.4K files, and successfully restored ~4K accounts.
[ { "id": 26294, "label": "location", "start_offset": 52, "end_offset": 56 }, { "id": 26295, "label": "attack-pattern", "start_offset": 66, "end_offset": 74 }, { "id": 26296, "label": "location", "start_offset": 75, "end_offset": 79 }, { "id": 26299, "label": "location", "start_offset": 110, "end_offset": 113 } ]
[]
[]
1,153
The second mutex appears to be a concerted effort to make the mutex seem “more random” than the first.
[]
[]
[]
3,349
The domains and the PDB string have been mentioned in a recent report and have been attributed to the Winnti Group.
[ { "id": 48962, "label": "threat-actor", "start_offset": 102, "end_offset": 114 } ]
[]
[]
10,263
The message box that decrypt.exe displays
[]
[]
[]
11,267
Gather information on an endpoint Gathers information from the endpoint such as the current logged on user, operating system details, IP address, hostname, mac address
[]
[]
[]
3,719
In both Carbanak and FIN7 attacks, communication with users’ compromised systems is done through bypassing firewalls or network detection systems via commonly used ports, using connection proxies to avoid direct connections to the threat group’s infrastructure, employing the command-and-control channel to remotely copy files from an external system, blending in with existing network traffic by using standard application layer protocol, and taking advantage of standard cryptographic protocol to disguise command-and-control traffic.
[ { "id": 49518, "label": "threat-actor", "start_offset": 8, "end_offset": 16 }, { "id": 49519, "label": "threat-actor", "start_offset": 21, "end_offset": 25 }, { "id": 49520, "label": "attack-pattern", "start_offset": 97, "end_offset": 116 }, { "id": 49521, "label": "attack-pattern", "start_offset": 171, "end_offset": 195 }, { "id": 49522, "label": "attack-pattern", "start_offset": 352, "end_offset": 393 } ]
[ { "id": 817, "from_id": 49518, "to_id": 49519, "type": "related-to" }, { "id": 818, "from_id": 49519, "to_id": 49520, "type": "uses" }, { "id": 819, "from_id": 49519, "to_id": 49521, "type": "uses" }, { "id": 820, "from_id": 49519, "to_id": 49522, "type": "uses" } ]
[]
2,492
Unit 42 researchers are proactively monitoring info related to other recently disclosed Spring vulnerabilities and will proceed to provide coverage as soon as more info has become available.
[ { "id": 7440, "label": "identity", "start_offset": 0, "end_offset": 7 }, { "id": 47576, "label": "SOFTWARE", "start_offset": 88, "end_offset": 94 } ]
[]
[]
1,708
Last year we highlighted two malware families on this blog: CryptoWall 2.0 and Dyreza/Dyre.
[ { "id": 46883, "label": "malware", "start_offset": 61, "end_offset": 75 }, { "id": 46884, "label": "malware", "start_offset": 80, "end_offset": 86 }, { "id": 46885, "label": "malware", "start_offset": 87, "end_offset": 91 } ]
[ { "id": 247, "from_id": 46884, "to_id": 46885, "type": "duplicate-of" } ]
[]
5,668
This finding sparked an investigation that led us to identify, with high confidence, multiple online services offered by the individuals operating the Glupteba botnet.
[ { "id": 17458, "label": "location", "start_offset": 73, "end_offset": 83 }, { "id": 17459, "label": "malware", "start_offset": 151, "end_offset": 159 } ]
[]
[]
1,650
While many users breeze past the list of permissions required when installing new apps, readers of this blog should ask themselves, “Does my electronic bible need to read my SMS messages?” Sign up to receive the latest news, cyber threat intelligence and research from us
[]
[]
[]
2,893
local7
[]
[]
[]
10,000
It is a variant of PlugX malware, and connects to the same C&C server (66[.]42[.]37[.]101). Figure 8.
[ { "id": 30524, "label": "malware", "start_offset": 19, "end_offset": 24 }, { "id": 30525, "label": "location", "start_offset": 34, "end_offset": 37 }, { "id": 30526, "label": "location", "start_offset": 54, "end_offset": 58 }, { "id": 30527, "label": "IPV4", "start_offset": 71, "end_offset": 89 } ]
[]
[]
11,266
Delete email message Permanently deletes the specified email message from the user’s mailbox
[]
[]
[]
425
Because of this, people can earn digital currency credit in exchange for the use of their computing resources to power that digital currency’s infrastructure.
[]
[]
[]
528
32-bit EXE is the most common ransomware file type we observed.
[]
[]
[]
980
Some of the infected apps purport to contain or display adult content.
[]
[]
[]
2,253
The results of these commands are uploaded to the C2 server.
[]
[]
[]
9,894
Job Opportunity SIPCHEM 7/30/18 jobs@sipchem.ga
[ { "id": 30202, "label": "location", "start_offset": 0, "end_offset": 3 }, { "id": 30203, "label": "location", "start_offset": 4, "end_offset": 15 }, { "id": 30204, "label": "EMAIL", "start_offset": 32, "end_offset": 47 } ]
[]
[]
6,968
Figure 13.
[]
[]
[]
7,362
Decoding the scanner revealed the following codes: #!/bin/bash cd /tmp rm -rf .ssh rm -rf .mountfs rm -rf .X13-unix rm -rf .X17-unix rm -rf .X19-unix mkdir .X19-unix cd .X19-unix mv /var/tmp/dota3.tar.gz dota3.tar.gz tar xf dota3.tar.gz sleep 3s && cd /tmp/.X19-unix/.rsync/c nohup /tmp/.X19-unix/.rsync/c/tsm -t 150 -S 6 -s 6 -p 22 -P 0 -f 0 -k 1 -l 1 -i 0 /tmp/up.txt 192.168 >> /dev/null 2>1& sleep 8m && nohup /tmp/.X19-unix/.rsync/c/tsm -t 150 -S 6 -s 6 -p 22 -P 0 -f 0 -k 1 -l 1 -i 0
[]
[]
[]
11,147
We terminated 4 YouTube channels as part of our actions against a coordinated influence operation.
[]
[]
[]
8,331
A new folder named "Download" is created adjacent to the main binary.
[]
[]
[]
2,803
On Friday May 12, 2017, Microsoft took the extraordinary step of releasing patches for out-of-support versions of Windows to help protect against these attacks.
[ { "id": 48019, "label": "TIME", "start_offset": 10, "end_offset": 22 }, { "id": 48020, "label": "identity", "start_offset": 24, "end_offset": 33 }, { "id": 48021, "label": "SOFTWARE", "start_offset": 114, "end_offset": 121 } ]
[]
[]
7,570
The payload can vary in each campaign, but it typically uses the FlawedAmmyy downloader, ServHelper, or RMS RAT launcher.
[ { "id": 23611, "label": "location", "start_offset": 12, "end_offset": 15 }, { "id": 23612, "label": "location", "start_offset": 29, "end_offset": 37 }, { "id": 23613, "label": "malware", "start_offset": 65, "end_offset": 76 } ]
[]
[]
3,508
The following is a list of Protux’s notable components and their functions: FileManage - Lists all of the system’s drives and folders.
[ { "id": 49301, "label": "malware", "start_offset": 27, "end_offset": 33 } ]
[]
[]
10,275
showing
[]
[]
[]
13,621
This utility has a feature called “Import Adder,” while “.newimp” is the default name of a newly added section containing newly added imports.
[]
[]
[]
12,388
We terminated 8 YouTube channels as part of our actions against a coordinated influence operation linked to Yemen.
[]
[]
[]
4,421
x.TextContent.StartsWith("Review blocked sign-in attempt") || x.TextContent.
[]
[]
[]
5,076
The earliest evidence we have of this exploit kit being actively deployed is January 4, 2022.
[ { "id": 51186, "label": "TIME", "start_offset": 77, "end_offset": 92 } ]
[]
[]
9,881
The group puts up multiple layers of obfuscation to run these C&C servers in extremely targeted malware campaigns against organizations in the Middle East, the U.S., and Asia.
[ { "id": 30117, "label": "attack-pattern", "start_offset": 87, "end_offset": 103 }, { "id": 30120, "label": "location", "start_offset": 166, "end_offset": 169 } ]
[]
[]
4,587
The vulnerability has been dubbed as ProxyLogon by the researchers at DEVCORE, who are credited with finding the bugs in the proxy architecture and the logon mechanism of Exchange.
[ { "id": 50446, "label": "SOFTWARE", "start_offset": 172, "end_offset": 180 }, { "id": 50444, "label": "vulnerability", "start_offset": 38, "end_offset": 48 }, { "id": 50445, "label": "identity", "start_offset": 71, "end_offset": 78 } ]
[ { "id": 974, "from_id": 50446, "to_id": 50444, "type": "has" } ]
[]
5,010
Google’s Threat Analysis Group (TAG) has been closely monitoring the cybersecurity activity in Eastern Europe with regard to the war in Ukraine.
[ { "id": 51063, "label": "identity", "start_offset": 0, "end_offset": 36 }, { "id": 51064, "label": "location", "start_offset": 95, "end_offset": 109 }, { "id": 51065, "label": "location", "start_offset": 136, "end_offset": 143 } ]
[]
[]
9,480
Table 2.
[]
[]
[]
4,186
Exploit public-facing application Execution T1059.001
[ { "id": 49987, "label": "attack-pattern", "start_offset": 0, "end_offset": 53 } ]
[]
[]
6,667
VDI solutions can provide protection against a destructive malware like Disttrack through the ability to load snapshots of wiped systems to recover from a wiper attack.
[ { "id": 20693, "label": "location", "start_offset": 14, "end_offset": 17 }, { "id": 20694, "label": "location", "start_offset": 26, "end_offset": 36 }, { "id": 20696, "label": "location", "start_offset": 105, "end_offset": 109 }, { "id": 20697, "label": "malware", "start_offset": 155, "end_offset": 160 } ]
[]
[]
3,987
The guideline thoroughly explains the three most common methods threat groups use to infiltrate the supply chain.
[]
[]
[]
9,422
In this stage, a blob of payload data is decrypted using a hard-coded key (2726c6aea9970bb95211304705b5f595) and what appears to be an RC4 (Rivest Cipher 4) algorithm.
[ { "id": 29001, "label": "location", "start_offset": 59, "end_offset": 63 }, { "id": 29002, "label": "MD5", "start_offset": 75, "end_offset": 107 }, { "id": 29003, "label": "location", "start_offset": 109, "end_offset": 112 } ]
[]
[]
9,571
GET http://{C2}/Index.php?Ck=OK HTTP/1.1
[ { "id": 29366, "label": "URL", "start_offset": 4, "end_offset": 28 } ]
[]
[]
8,809
Shortly after the U.S. Treasury sanctioned Ukrainian Parliament member Andrii Derkach for attempting to influence the U.S. electoral process, we removed 14 Google accounts that were linked to him.
[]
[]
[]
7,049
The launcher decrypts the data.res file with a different hardcoded DES key.
[]
[]
[]
353
CHS’s 8-K filing on Monday did not reveal how the attackers got into their network, only that the records of approximately 4.5 million patients were stolen in attacks in between April and June of 2014.
[ { "id": 46048, "label": "identity", "start_offset": 0, "end_offset": 3 }, { "id": 46049, "label": "TIME", "start_offset": 20, "end_offset": 26 }, { "id": 46050, "label": "TIME", "start_offset": 178, "end_offset": 184 }, { "id": 46051, "label": "TIME", "start_offset": 188, "end_offset": 200 } ]
[]
[]
9,115
Lurk’s transition from simple web-browser-exploiting crooks to organized cybercriminals also stood out.
[ { "id": 28147, "label": "malware", "start_offset": 0, "end_offset": 4 }, { "id": 28148, "label": "location", "start_offset": 53, "end_offset": 59 } ]
[]
[]
14,008
The following sections describe the different correlations and are divided into two main categories: Correlation related to the malware author developing environment Correlation associated with TTPs Note that some leads are stronger than others; however, when combined, they suggest that the same threat actor behind malware previously attributed to APT37 is likely responsible for Operation Earth Kitsune.
[ { "id": 47183, "label": "campaign", "start_offset": 384, "end_offset": 407 }, { "id": 43419, "label": "threat-actor", "start_offset": 352, "end_offset": 357 } ]
[]
[]
106
Similarly, DarkSide operators used Mega client for exfiltrating files to cloud storage, 7-Zip for archiving, and PuTTY application for network file transfers.
[ { "id": 45834, "label": "threat-actor", "start_offset": 11, "end_offset": 29 }, { "id": 45835, "label": "tools", "start_offset": 35, "end_offset": 46 }, { "id": 45836, "label": "tools", "start_offset": 88, "end_offset": 93 }, { "id": 45837, "label": "tools", "start_offset": 113, "end_offset": 118 } ]
[ { "id": 120, "from_id": 45834, "to_id": 45835, "type": "uses" }, { "id": 121, "from_id": 45834, "to_id": 45836, "type": "uses" }, { "id": 122, "from_id": 45834, "to_id": 45837, "type": "uses" } ]
[]
13,582
The attack we found only works on Series 2 of EC-CUBE; the current version is Series 4, with Series 2 now under extended support.
[ { "id": 51667, "label": "tools", "start_offset": 34, "end_offset": 53 }, { "id": 51668, "label": "tools", "start_offset": 78, "end_offset": 86 } ]
[]
[]
1,393
Read more on the XSOAR marketplace.
[]
[]
[]
4,719
In December 2021, we released research about novel techniques used by NSO Group to compromise iMessage users.
[ { "id": 50617, "label": "TIME", "start_offset": 3, "end_offset": 16 }, { "id": 50618, "label": "threat-actor", "start_offset": 70, "end_offset": 79 }, { "id": 50619, "label": "SOFTWARE", "start_offset": 94, "end_offset": 102 } ]
[]
[]
2,768
They can be used to: These are all likely outcomes from mass scanning of the Internet for vulnerable hosts, which are already underway.
[]
[]
[]