id
int64 1
14.4k
| text
stringlengths 3
5.01k
| entities
list | relations
list | Comments
list |
---|---|---|---|---|
14,116 | When you have many samples to analyze, you can refine that expectation over time. | [] | [] | [] |
6,366 | This data includes the encrypted configuration settings for Brute Ratel C4. | [] | [] | [] |
8,513 | In collaboration with YouTube, Gmail, Trust & Safety, CyberCrime Investigation Group and Safe Browsing teams, our protections have decreased the volume of related phishing emails on Gmail by 99.6% since May 2021. | [
{
"id": 26286,
"label": "location",
"start_offset": 85,
"end_offset": 88
},
{
"id": 26288,
"label": "attack-pattern",
"start_offset": 163,
"end_offset": 171
}
] | [] | [] |
2,399 | Two days later on March 31, 2022, Spring released version 5.3.18 and 5.2.20 of Spring Framework to patch another more severe vulnerability tracked in CVE-2022-22965. | [
{
"id": 47472,
"label": "TIME",
"start_offset": 18,
"end_offset": 32
},
{
"id": 47473,
"label": "SOFTWARE",
"start_offset": 34,
"end_offset": 40
},
{
"id": 47474,
"label": "SOFTWARE",
"start_offset": 79,
"end_offset": 95
},
{
"id": 47475,
"label": "vulnerability",
"start_offset": 150,
"end_offset": 164
}
] | [
{
"id": 333,
"from_id": 47474,
"to_id": 47475,
"type": "has"
}
] | [] |
8,909 | Trend Micro Solutions Trend Micro’s comprehensive XDR solution applies the most effective expert analytics to the deep data sets collected from Trend Micro solutions across the enterprise — including email, endpoints, servers, cloud workloads, and networks — making faster connections to identify and stop attacks. | [
{
"id": 27530,
"label": "location",
"start_offset": 75,
"end_offset": 79
},
{
"id": 27532,
"label": "location",
"start_offset": 177,
"end_offset": 187
},
{
"id": 27533,
"label": "location",
"start_offset": 227,
"end_offset": 232
},
{
"id": 27534,
"label": "location",
"start_offset": 244,
"end_offset": 247
},
{
"id": 27535,
"label": "location",
"start_offset": 297,
"end_offset": 300
},
{
"id": 27536,
"label": "malware",
"start_offset": 301,
"end_offset": 305
}
] | [] | [] |
967 | MySd2e Service registers receiver for Rf2b | [] | [] | [] |
13,605 | As described earlier, the XSS attack script redirects the victim to a fake Flash download site. | [
{
"id": 42403,
"label": "attack-pattern",
"start_offset": 26,
"end_offset": 29
}
] | [] | [] |
2,864 | Please mark, I'm not a robot! | [] | [] | [] |
14,408 | Leverage WMI for fileless intrusion Execute Powershell script for fileless intrusion | [
{
"id": 47166,
"label": "attack-pattern",
"start_offset": 66,
"end_offset": 84
},
{
"id": 44534,
"label": "tools",
"start_offset": 44,
"end_offset": 54
}
] | [
{
"id": 309,
"from_id": 44534,
"to_id": 47166,
"type": "uses"
}
] | [] |
564 | After infection, Virlock hides the file extension through modification of the registry (HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = 1, HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Hidden = 2). | [
{
"id": 1874,
"label": "REGISTRYKEY",
"start_offset": 88,
"end_offset": 164
},
{
"id": 1876,
"label": "REGISTRYKEY",
"start_offset": 170,
"end_offset": 241
},
{
"id": 44778,
"label": "malware",
"start_offset": 17,
"end_offset": 24
}
] | [
{
"id": 165,
"from_id": 1874,
"to_id": 44778,
"type": "indicates"
},
{
"id": 166,
"from_id": 1876,
"to_id": 44778,
"type": "indicates"
}
] | [] |
4,054 | After the backdoor is launched, it will decrypt the embedded C&C configuration via AES (CTR mode) algorithm for the following connection. | [] | [] | [] |
6,448 | RemoteUtilities Analysis | [
{
"id": 20076,
"label": "tools",
"start_offset": 0,
"end_offset": 15
}
] | [] | [] |
4,561 | It also downloads a list of targets from an external site, but unlike the Turla apps, it continually sends requests to the target websites until it is stopped by the user. | [
{
"id": 50378,
"label": "threat-actor",
"start_offset": 74,
"end_offset": 79
}
] | [] | [] |
5,298 | It also creates a pipe for inter-process communication (IPC) by calling the pipe() function for getting two file descriptors for reading and writing data. | [] | [] | [] |
2,313 | The exploit chain combined an RCE in WebKit exploiting CVE-2021-1789 which was patched on Jan 5, 2021 before discovery of this campaign and a 0-day local privilege escalation in XNU (CVE-2021-30869) patched on Sept 23, 2021. | [
{
"id": 45456,
"label": "vulnerability",
"start_offset": 55,
"end_offset": 68
},
{
"id": 45462,
"label": "SOFTWARE",
"start_offset": 178,
"end_offset": 181
},
{
"id": 45460,
"label": "TIME",
"start_offset": 210,
"end_offset": 223
},
{
"id": 45461,
"label": "attack-pattern",
"start_offset": 148,
"end_offset": 174
},
{
"id": 45457,
"label": "SOFTWARE",
"start_offset": 37,
"end_offset": 43
},
{
"id": 45458,
"label": "TIME",
"start_offset": 90,
"end_offset": 101
},
{
"id": 45459,
"label": "vulnerability",
"start_offset": 183,
"end_offset": 197
}
] | [
{
"id": 98,
"from_id": 45456,
"to_id": 45457,
"type": "has"
},
{
"id": 99,
"from_id": 45459,
"to_id": 45462,
"type": "has"
}
] | [] |
4,341 | . Figure 4. Code showing the main function of the file stealer | [] | [] | [] |
3,813 | The commands and output of Koadic will change according to the ANEL version used in the attack. | [
{
"id": 49686,
"label": "malware",
"start_offset": 27,
"end_offset": 33
},
{
"id": 49685,
"label": "malware",
"start_offset": 63,
"end_offset": 67
}
] | [] | [] |
3,846 | For example, the initial ANEL version, “5.0.0 beta1,” uses a different C&C server compared to the other versions. | [
{
"id": 11660,
"label": "malware",
"start_offset": 25,
"end_offset": 29
}
] | [] | [] |
7,332 | Chi Ngoc Canada Backdoor.SH.OCEANLOTUS.F 05e5ba08be06f2d0e2da294de4c559ca33c4c28534919e5f2f6fc51aed4956e3 2nd stage fat binary Backdoor.MacOS.OCEANLOTUS.F fd7e51e3f3240b550f0405a67e98a97d86747a8a07218e8150d2c2946141f737 3rd stage fat binary Backdoor.MacOS.OCEANLOTUS.F Domains mihannevis[.]com mykessef[.]com idtpl[.]org MITRE TTP Tactic ID Name | [
{
"id": 22822,
"label": "location",
"start_offset": 0,
"end_offset": 3
},
{
"id": 22823,
"label": "location",
"start_offset": 9,
"end_offset": 15
},
{
"id": 22824,
"label": "SHA1",
"start_offset": 43,
"end_offset": 107
},
{
"id": 22825,
"label": "SHA2",
"start_offset": 160,
"end_offset": 224
}
] | [] | [] |
7,768 | Figure 20. | [] | [] | [] |
2,069 | The videos had no sound, but the threat actor would type commentary on a terminal to address something the viewer was observing on screen. | [] | [] | [] |
10,671 | Table 1: The 15 vulnerabilities weaponized since 2017 CVE ID cvss3 score Description CVE-2021-42013 9.8 Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete fix of CVE-2021-41773) CVE-2021-41773 7.5 | [
{
"id": 32570,
"label": "attack-pattern",
"start_offset": 105,
"end_offset": 119
},
{
"id": 32571,
"label": "location",
"start_offset": 120,
"end_offset": 123
},
{
"id": 32572,
"label": "location",
"start_offset": 124,
"end_offset": 130
},
{
"id": 32573,
"label": "location",
"start_offset": 149,
"end_offset": 155
},
{
"id": 32574,
"label": "location",
"start_offset": 175,
"end_offset": 178
},
{
"id": 32575,
"label": "location",
"start_offset": 214,
"end_offset": 219
},
{
"id": 32576,
"label": "location",
"start_offset": 230,
"end_offset": 235
}
] | [] | [] |
5,101 | The attackers made multiple attempts to use the exploit days after the vulnerability was patched on February 14, which stresses the importance of applying security updates as they become available. | [
{
"id": 51206,
"label": "TIME",
"start_offset": 100,
"end_offset": 111
}
] | [] | [] |
2,169 | Microsoft recommends that customers of Microsoft Defender for Endpoint enable the attack surface reduction rule BlockOfficeCreateProcessRule. | [
{
"id": 45408,
"label": "identity",
"start_offset": 0,
"end_offset": 9
},
{
"id": 45409,
"label": "SOFTWARE",
"start_offset": 39,
"end_offset": 70
}
] | [] | [] |
2,886 | Neither of these variables is actually used in this exploit. | [] | [] | [] |
3,097 | Because these vulnerabilities affect the processors at the physical layer, the only way for the vulnerabilities to be fully addressed is for the processors to be replaced or to have a firmware update. | [] | [] | [] |
7,493 | Figure 5. | [] | [] | [] |
13,905 | Execution and impact The execution of the actual ransomware occurs next. | [] | [] | [] |
13,486 | Our actions against coordinated influence operations from January, February and March can be found in the Q1 Bulletin. | [
{
"id": 51557,
"label": "TIME",
"start_offset": 58,
"end_offset": 65
},
{
"id": 51558,
"label": "TIME",
"start_offset": 67,
"end_offset": 75
},
{
"id": 51559,
"label": "TIME",
"start_offset": 80,
"end_offset": 85
}
] | [] | [] |
11,733 | -ms[.]net C&C cdn-sop[.]net C&C fqn-cloud[.]net C&C ms-trace[.]net C&C imail.aop.gov-af[.]org Phishing Domain mail-apfgavnp.hopto[.]org Phishing Domain mail-apfgovnp.ddns[.]net Phishing Domain mail-kmgcom.ddns[.]net Phishing Domain mail-mfagovcn.hopto[.]org Phishing Domain mail | [
{
"id": 36141,
"label": "attack-pattern",
"start_offset": 115,
"end_offset": 123
},
{
"id": 36142,
"label": "attack-pattern",
"start_offset": 162,
"end_offset": 170
},
{
"id": 36143,
"label": "attack-pattern",
"start_offset": 208,
"end_offset": 216
},
{
"id": 36144,
"label": "attack-pattern",
"start_offset": 252,
"end_offset": 260
},
{
"id": 36145,
"label": "attack-pattern",
"start_offset": 299,
"end_offset": 307
}
] | [] | [] |
2,843 | There have been several theories: Unit 42 believes the most likely delivery method is method #2. | [
{
"id": 48048,
"label": "identity",
"start_offset": 35,
"end_offset": 42
}
] | [] | [] |
716 | If the vulnerability is exploited, threat actors could bypass authentication and run arbitrary code on unpatched systems. | [
{
"id": 46283,
"label": "attack-pattern",
"start_offset": 55,
"end_offset": 76
},
{
"id": 46284,
"label": "attack-pattern",
"start_offset": 81,
"end_offset": 99
}
] | [] | [] |
11,250 | In the meantime, we encourage high risk users to enroll in our Advanced Protection Program (APP) and utilize Google Account Level Enhanced Safe Browsing to ensure they have the greatest level of protection in the face of ongoing threats. | [
{
"id": 34390,
"label": "location",
"start_offset": 72,
"end_offset": 82
},
{
"id": 34391,
"label": "location",
"start_offset": 97,
"end_offset": 100
},
{
"id": 34392,
"label": "threat-actor",
"start_offset": 139,
"end_offset": 143
},
{
"id": 34393,
"label": "location",
"start_offset": 195,
"end_offset": 205
}
] | [] | [] |
13,634 | Online shop administrators should be aware that potential attacks may come not only from spam but also from different — and unexpected — infection vectors. | [] | [] | [] |
1,937 | We did not find Urpage victims in our telemetry, likely because of the targeted nature of these attacks. | [
{
"id": 5704,
"label": "threat-actor",
"start_offset": 16,
"end_offset": 22
}
] | [] | [] |
5,009 | NOTE: On May 20th, we updated our attribution to more precisely describe our findings. | [
{
"id": 51062,
"label": "TIME",
"start_offset": 9,
"end_offset": 17
}
] | [] | [] |
3,917 | The attack features the following script: | [] | [] | [] |
1,866 | Once inside, the continuing trend of abusing legitimate tools and functions to mask malicious activities and actors’ presence | [] | [] | [] |
8,141 | When encrypting, it creates a block of data we named headData. | [] | [] | [] |
12,446 | We terminated 35 YouTube channels as part of our investigation into coordinated influence operations linked to Azerbaijan. | [] | [] | [] |
13,977 | It also misses the incredible importance of identifying tactics, techniques, and tools used by global threat actor groups today. | [] | [] | [] |
14,283 | Get and upload dedicated directory file list | [] | [] | [] |
5,149 | I'm going to drive back to the store. | [] | [] | [] |
3,096 | Because these affect processors, this means that the operating systems and applications that run on top of these processors are vulnerable. | [] | [] | [] |
4,135 | During our investigation, we found evidence of specific tools, which we listed in Table 1. | [] | [] | [] |
1,595 | Palo Alto Networks WildFire detected a new Android Trojan on May 7th, 2014 when a customer using our enterprise security platform downloaded the malicious application from the Google Play store. | [
{
"id": 46841,
"label": "TIME",
"start_offset": 61,
"end_offset": 74
},
{
"id": 46840,
"label": "SOFTWARE",
"start_offset": 0,
"end_offset": 27
},
{
"id": 46842,
"label": "SOFTWARE",
"start_offset": 176,
"end_offset": 193
}
] | [] | [] |
6,450 | Figure 4. | [] | [] | [] |
12,297 | We received leads from the FBI that supported us in this investigation. | [] | [] | [] |
1,705 | Antivirus programs running on the PC are trying eradicate the threat, the command and control domains and IPs are being added to denylist and blocked by networks around the world. | [] | [] | [] |
14,065 | This is a JavaScript file that executes with wscript.exe. | [] | [] | [] |
588 | By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. | [] | [] | [] |
12,641 | It generates the needed key and initialization vector (IV) using a salt and secret key; the former is embedded in the code while the latter is generated dynamically using the SHA-256 hash of a randomly generated 32-byte long string. | [
{
"id": 39247,
"label": "location",
"start_offset": 28,
"end_offset": 31
},
{
"id": 39248,
"label": "tools",
"start_offset": 47,
"end_offset": 53
},
{
"id": 39249,
"label": "location",
"start_offset": 67,
"end_offset": 71
},
{
"id": 39250,
"label": "location",
"start_offset": 72,
"end_offset": 75
},
{
"id": 39252,
"label": "location",
"start_offset": 220,
"end_offset": 224
}
] | [] | [] |
12,327 | We terminated 3 YouTube channels as part of our investigation into coordinated influence operations linked to France. | [] | [] | [] |
10,750 | While xxmm2_builder allows REDBALDKNIGHT to customize the settings of XXMM, xxmm2_ steganography is used to hide malicious code within an image file. | [
{
"id": 32853,
"label": "threat-actor",
"start_offset": 27,
"end_offset": 40
},
{
"id": 32854,
"label": "malware",
"start_offset": 70,
"end_offset": 74
}
] | [] | [] |
9,171 | Unfortunately, Lurk is just one of the many cybercriminal groups looking to profit from organizations and end users. | [
{
"id": 28296,
"label": "identity",
"start_offset": 23,
"end_offset": 27
},
{
"id": 28297,
"label": "location",
"start_offset": 28,
"end_offset": 31
},
{
"id": 28298,
"label": "location",
"start_offset": 39,
"end_offset": 43
},
{
"id": 28299,
"label": "location",
"start_offset": 102,
"end_offset": 105
}
] | [] | [] |
3,800 | Figure 2. Exploitation of CVE-2017-11882 | [
{
"id": 49672,
"label": "vulnerability",
"start_offset": 26,
"end_offset": 40
}
] | [] | [] |
12,576 | It still worked. | [] | [] | [] |
13,064 | This article lists the known malware strains that have been used over the past two years to install ransomware, all of which should serve as a "code red" moment for any organization. | [] | [] | [] |
961 | Figure 1. | [] | [] | [] |
2,041 | One possibility is that it is used to monitor ransomed systems for blue team and incident response (IR) activity, though even in that case it is unusual to see offensive tools dropped at this point in the infection. | [] | [] | [] |
5,442 | The Brazilian Central Bank recently announced that 2017 was the first year in which people did more banking using mobile devices than on PCs. | [
{
"id": 51441,
"label": "identity",
"start_offset": 4,
"end_offset": 26
},
{
"id": 51442,
"label": "TIME",
"start_offset": 51,
"end_offset": 55
}
] | [] | [] |
2,446 | There are two variants of the webshell. | [] | [] | [] |
896 | The following registry keys are also used within the CLOCK sub-path by PClock2: PClock2 proceeds to use the API from blockchain.info to generate a unique Bitcoin (BTC) wallet identifier, which is configured to automatically forward payments to a hardcoded wallet identifier of ‘1MRfkK134ErfbcadUSoSUCBahngCqoBKju’. | [
{
"id": 46423,
"label": "malware",
"start_offset": 72,
"end_offset": 79
},
{
"id": 46424,
"label": "malware",
"start_offset": 82,
"end_offset": 89
},
{
"id": 46425,
"label": "DOMAIN",
"start_offset": 119,
"end_offset": 134
}
] | [] | [] |
5,455 | They’re put together by Palo Alto Networks Unit 42 threat research team and are meant for you to read and share with your family, friends, and coworkers so you can all be safer and get on with the business of your digital life. Got a topic you want us to write about for you, your friends, or your family? | [
{
"id": 51445,
"label": "identity",
"start_offset": 25,
"end_offset": 72
}
] | [] | [] |
13,198 | The traffic is encrypted to evade detection. | [] | [] | [] |
1,599 | A developer using the ID “fun app” published the Trojan, and the remote control application they uploaded on April 21 is their most successful app so far, with between 10,000 and 50,000 downloads on the play store. | [
{
"id": 46846,
"label": "TIME",
"start_offset": 110,
"end_offset": 118
}
] | [] | [] |
3,370 | .Python.BIOPASS.A e479823aa41d3f6416233dba8e765cf2abaa38ad18328859a20b88df7f1d88d5 sc2.txt BIOPASS RAT encoded Cobalt Strike shellcode Trojan.Win32.COBEACON.A e567fd0f08fdafc5a89c9084373f3308ef464918ff7e4ecd7fb3135d777e946d sc3.txt | [
{
"id": 10186,
"label": "malware",
"start_offset": 94,
"end_offset": 105
},
{
"id": 10187,
"label": "tools",
"start_offset": 114,
"end_offset": 127
},
{
"id": 10188,
"label": "SHA2",
"start_offset": 164,
"end_offset": 228
},
{
"id": 10185,
"label": "SHA2",
"start_offset": 19,
"end_offset": 83
},
{
"id": 48989,
"label": "malware",
"start_offset": 139,
"end_offset": 162
},
{
"id": 48987,
"label": "malware",
"start_offset": 1,
"end_offset": 17
},
{
"id": 48988,
"label": "FILEPATH",
"start_offset": 85,
"end_offset": 92
},
{
"id": 48990,
"label": "FILEPATH",
"start_offset": 230,
"end_offset": 237
}
] | [
{
"id": 548,
"from_id": 10185,
"to_id": 10186,
"type": "indicates"
},
{
"id": 549,
"from_id": 48988,
"to_id": 10186,
"type": "indicates"
},
{
"id": 553,
"from_id": 10187,
"to_id": 48989,
"type": "related-to"
},
{
"id": 550,
"from_id": 48987,
"to_id": 10186,
"type": "duplicate-of"
},
{
"id": 551,
"from_id": 10185,
"to_id": 48988,
"type": "duplicate-of"
},
{
"id": 552,
"from_id": 10186,
"to_id": 10187,
"type": "uses"
},
{
"id": 554,
"from_id": 10188,
"to_id": 48989,
"type": "indicates"
},
{
"id": 555,
"from_id": 48990,
"to_id": 48989,
"type": "indicates"
},
{
"id": 556,
"from_id": 48989,
"to_id": 10186,
"type": "duplicate-of"
}
] | [] |
4,216 | The second fake website is again related to chat, with a background suggesting that it can help find users a partner. | [] | [] | [] |
13,567 | We observed that the scripts used during the attacks were customized. | [] | [] | [] |
11,637 | We learned that these pages were copied from their victims’ webmail login pages and subsequently modified for phishing. | [
{
"id": 35709,
"label": "location",
"start_offset": 3,
"end_offset": 10
},
{
"id": 35710,
"label": "location",
"start_offset": 80,
"end_offset": 83
},
{
"id": 35711,
"label": "attack-pattern",
"start_offset": 110,
"end_offset": 118
}
] | [] | [] |
13,516 | Consider using dedicated two-factor authentication apps or devices such as Yubikey instead of relying on SMS. | [] | [] | [] |
10,078 | This was carried out via a compromised version of a network monitoring application called SolarWinds Orion. | [] | [] | [] |
152 | In some cases, the ransomware is sophisticated enough to target specific application files. | [] | [] | [] |
1,056 | An “overlay attack” is an attack where an attacker’s app draws a window over (or “overlays”) other windows and apps running on the device. | [
{
"id": 44926,
"label": "attack-pattern",
"start_offset": 4,
"end_offset": 18
}
] | [] | [] |
4,713 | At the time, our Android team released research about a newly discovered family of spyware related to Pegasus that was used in a targeted attack on a small number of Android devices. | [
{
"id": 50607,
"label": "malware",
"start_offset": 102,
"end_offset": 109
},
{
"id": 50608,
"label": "SOFTWARE",
"start_offset": 166,
"end_offset": 173
},
{
"id": 50606,
"label": "SOFTWARE",
"start_offset": 17,
"end_offset": 24
}
] | [] | [] |
2,935 | While we can’t see how many people the other half of the samples affect, it’s a reasonable supposition that the other half of the total samples affect just as many people as the half we can see. | [] | [] | [] |
4,459 | In 2017, Android – which is owned by Google – was the first mobile platform to warn users about NSO Group’s Pegasus spyware. | [
{
"id": 50241,
"label": "malware",
"start_offset": 108,
"end_offset": 115
},
{
"id": 50237,
"label": "TIME",
"start_offset": 3,
"end_offset": 7
},
{
"id": 50240,
"label": "threat-actor",
"start_offset": 96,
"end_offset": 105
},
{
"id": 50238,
"label": "SOFTWARE",
"start_offset": 9,
"end_offset": 16
},
{
"id": 50239,
"label": "identity",
"start_offset": 37,
"end_offset": 43
}
] | [
{
"id": 933,
"from_id": 50241,
"to_id": 50240,
"type": "authored-by"
}
] | [] |
2,607 | A hallmark of this group is the diversity of techniques used both for initial access and action-on-objective. | [] | [] | [] |
2,789 | The good news is that these attacks are more like denial of service attacks: they don’t do lasting harm to your system and they end when you leave the site. The bad news is that these are harder to defend against than typical drive-by download attacks. | [] | [] | [] |
1,384 | PowerShell process used to delete Windows Defender, e.g. C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe rmdir 'C:\ProgramData\Microsoft\Windows Defender' -Recurse 8. File InstallUtil.exe running from C:\Users\[USERNAME]\AppData\Local\Temp directory. | [
{
"id": 4148,
"label": "tools",
"start_offset": 0,
"end_offset": 10
},
{
"id": 46727,
"label": "FILEPATH",
"start_offset": 122,
"end_offset": 163
},
{
"id": 46726,
"label": "FILEPATH",
"start_offset": 57,
"end_offset": 114
},
{
"id": 46728,
"label": "FILEPATH",
"start_offset": 183,
"end_offset": 198
},
{
"id": 46725,
"label": "tools",
"start_offset": 34,
"end_offset": 50
},
{
"id": 46729,
"label": "FILEPATH",
"start_offset": 212,
"end_offset": 251
}
] | [] | [] |
551 | The victims can find the threat actor’s user name through specific group chat software or follow a chat group link in the ransom note. Ransom payment operations are complicated and highly automated processes. | [] | [] | [] |
13,496 | One of the most prolific cybermercenaries is Void Balaur, a Russian-speaking threat actor group that has launched attacks against different sectors and industries all over the world. | [
{
"id": 51564,
"label": "threat-actor",
"start_offset": 45,
"end_offset": 56
}
] | [] | [] |
13,122 | For others, digital transformation had been a priority for much longer, but the events of the past two years added a new sense of urgency. | [] | [] | [] |
3,857 | In this scenario, accevent.exe is the primary executable, which is usually legitimate. | [
{
"id": 49716,
"label": "FILEPATH",
"start_offset": 18,
"end_offset": 30
}
] | [] | [] |
3,513 | ShellManage - Creates a shell. | [] | [] | [] |
2,584 | Unit 42 has helped organizations respond to multiple Lapsus$ attacks. | [
{
"id": 47769,
"label": "identity",
"start_offset": 1,
"end_offset": 8
},
{
"id": 7797,
"label": "threat-actor",
"start_offset": 54,
"end_offset": 61
}
] | [] | [] |
1,368 | More information about these protections can be found within the Mitigation Actions section of the briefing. | [] | [] | [] |
3,726 | Continuous vigilance against threat groups is an important aspect of keeping up with — if not being one step ahead of — threats. | [] | [] | [] |
2,302 | In this blog we analyze the technical details of the exploit chain and share IOCs to help teams defend against similar style attacks. | [] | [] | [] |
2,280 | This past year, TAG has been collaborating with Google’s CyberCrime Investigation Group to disrupt Glupteba activity involving Google services. | [
{
"id": 45441,
"label": "identity",
"start_offset": 16,
"end_offset": 19
},
{
"id": 45438,
"label": "malware",
"start_offset": 99,
"end_offset": 107
},
{
"id": 45439,
"label": "identity",
"start_offset": 48,
"end_offset": 87
},
{
"id": 45440,
"label": "SOFTWARE",
"start_offset": 127,
"end_offset": 142
}
] | [] | [] |
3,198 | The legitimate known application is downloaded and executed. | [] | [] | [] |
13,684 | jQuery method is used to post the target’s credentials to hosting site The phishing pages record passwords inputted by site visitors. | [
{
"id": 51752,
"label": "attack-pattern",
"start_offset": 79,
"end_offset": 87
}
] | [] | [] |
1,296 | If the file does not exist, it will make the following GET request: The filename and name parameters are statically set in the above request. | [] | [] | [] |
185 | Beginning on Feb. 15, a series of distributed denial of service (DDoS) attacks commenced. | [
{
"id": 45851,
"label": "TIME",
"start_offset": 13,
"end_offset": 20
},
{
"id": 45852,
"label": "attack-pattern",
"start_offset": 34,
"end_offset": 70
}
] | [] | [] |
2,900 | s[_local28][(((_local41 - _local12) / 4) + 15)] | [] | [] | [] |
9,678 | Figure 16. | [] | [] | [] |
7,586 | The latter is a configuration file that handles files to install. | [] | [] | [] |
4,232 | At the end of last year, a C&C from the same threat actor was not only accessible from any IP address, but it was possible to browse the server directory tree without authentication. | [] | [] | [] |
14,037 | These paths leak information about the third-party libraries’ installed paths. | [] | [] | [] |
4,077 | Figure 5. | [] | [] | [] |