id
int64
1
14.4k
text
stringlengths
3
5.01k
entities
list
relations
list
Comments
list
14,116
When you have many samples to analyze, you can refine that expectation over time.
[]
[]
[]
6,366
This data includes the encrypted configuration settings for Brute Ratel C4.
[]
[]
[]
8,513
In collaboration with YouTube, Gmail, Trust & Safety, CyberCrime Investigation Group and Safe Browsing teams, our protections have decreased the volume of related phishing emails on Gmail by 99.6% since May 2021.
[ { "id": 26286, "label": "location", "start_offset": 85, "end_offset": 88 }, { "id": 26288, "label": "attack-pattern", "start_offset": 163, "end_offset": 171 } ]
[]
[]
2,399
Two days later on March 31, 2022, Spring released version 5.3.18 and 5.2.20 of Spring Framework to patch another more severe vulnerability tracked in CVE-2022-22965.
[ { "id": 47472, "label": "TIME", "start_offset": 18, "end_offset": 32 }, { "id": 47473, "label": "SOFTWARE", "start_offset": 34, "end_offset": 40 }, { "id": 47474, "label": "SOFTWARE", "start_offset": 79, "end_offset": 95 }, { "id": 47475, "label": "vulnerability", "start_offset": 150, "end_offset": 164 } ]
[ { "id": 333, "from_id": 47474, "to_id": 47475, "type": "has" } ]
[]
8,909
Trend Micro Solutions Trend Micro’s comprehensive XDR solution applies the most effective expert analytics to the deep data sets collected from Trend Micro solutions across the enterprise — including email, endpoints, servers, cloud workloads, and networks — making faster connections to identify and stop attacks.
[ { "id": 27530, "label": "location", "start_offset": 75, "end_offset": 79 }, { "id": 27532, "label": "location", "start_offset": 177, "end_offset": 187 }, { "id": 27533, "label": "location", "start_offset": 227, "end_offset": 232 }, { "id": 27534, "label": "location", "start_offset": 244, "end_offset": 247 }, { "id": 27535, "label": "location", "start_offset": 297, "end_offset": 300 }, { "id": 27536, "label": "malware", "start_offset": 301, "end_offset": 305 } ]
[]
[]
967
MySd2e Service registers receiver for Rf2b
[]
[]
[]
13,605
As described earlier, the XSS attack script redirects the victim to a fake Flash download site.
[ { "id": 42403, "label": "attack-pattern", "start_offset": 26, "end_offset": 29 } ]
[]
[]
2,864
Please mark, I'm not a robot!
[]
[]
[]
14,408
Leverage WMI for fileless intrusion Execute Powershell script for fileless intrusion
[ { "id": 47166, "label": "attack-pattern", "start_offset": 66, "end_offset": 84 }, { "id": 44534, "label": "tools", "start_offset": 44, "end_offset": 54 } ]
[ { "id": 309, "from_id": 44534, "to_id": 47166, "type": "uses" } ]
[]
564
After infection, Virlock hides the file extension through modification of the registry (HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = 1, HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Hidden = 2).
[ { "id": 1874, "label": "REGISTRYKEY", "start_offset": 88, "end_offset": 164 }, { "id": 1876, "label": "REGISTRYKEY", "start_offset": 170, "end_offset": 241 }, { "id": 44778, "label": "malware", "start_offset": 17, "end_offset": 24 } ]
[ { "id": 165, "from_id": 1874, "to_id": 44778, "type": "indicates" }, { "id": 166, "from_id": 1876, "to_id": 44778, "type": "indicates" } ]
[]
4,054
After the backdoor is launched, it will decrypt the embedded C&C configuration via AES (CTR mode) algorithm for the following connection.
[]
[]
[]
6,448
RemoteUtilities Analysis
[ { "id": 20076, "label": "tools", "start_offset": 0, "end_offset": 15 } ]
[]
[]
4,561
It also downloads a list of targets from an external site, but unlike the Turla apps, it continually sends requests to the target websites until it is stopped by the user.
[ { "id": 50378, "label": "threat-actor", "start_offset": 74, "end_offset": 79 } ]
[]
[]
5,298
It also creates a pipe for inter-process communication (IPC) by calling the pipe() function for getting two file descriptors for reading and writing data.
[]
[]
[]
2,313
The exploit chain combined an RCE in WebKit exploiting CVE-2021-1789 which was patched on Jan 5, 2021 before discovery of this campaign and a 0-day local privilege escalation in XNU (CVE-2021-30869) patched on Sept 23, 2021.
[ { "id": 45456, "label": "vulnerability", "start_offset": 55, "end_offset": 68 }, { "id": 45462, "label": "SOFTWARE", "start_offset": 178, "end_offset": 181 }, { "id": 45460, "label": "TIME", "start_offset": 210, "end_offset": 223 }, { "id": 45461, "label": "attack-pattern", "start_offset": 148, "end_offset": 174 }, { "id": 45457, "label": "SOFTWARE", "start_offset": 37, "end_offset": 43 }, { "id": 45458, "label": "TIME", "start_offset": 90, "end_offset": 101 }, { "id": 45459, "label": "vulnerability", "start_offset": 183, "end_offset": 197 } ]
[ { "id": 98, "from_id": 45456, "to_id": 45457, "type": "has" }, { "id": 99, "from_id": 45459, "to_id": 45462, "type": "has" } ]
[]
4,341
. Figure 4. Code showing the main function of the file stealer
[]
[]
[]
3,813
The commands and output of Koadic will change according to the ANEL version used in the attack.
[ { "id": 49686, "label": "malware", "start_offset": 27, "end_offset": 33 }, { "id": 49685, "label": "malware", "start_offset": 63, "end_offset": 67 } ]
[]
[]
3,846
For example, the initial ANEL version, “5.0.0 beta1,” uses a different C&C server compared to the other versions.
[ { "id": 11660, "label": "malware", "start_offset": 25, "end_offset": 29 } ]
[]
[]
7,332
Chi Ngoc Canada Backdoor.SH.OCEANLOTUS.F 05e5ba08be06f2d0e2da294de4c559ca33c4c28534919e5f2f6fc51aed4956e3 2nd stage fat binary Backdoor.MacOS.OCEANLOTUS.F fd7e51e3f3240b550f0405a67e98a97d86747a8a07218e8150d2c2946141f737 3rd stage fat binary Backdoor.MacOS.OCEANLOTUS.F Domains mihannevis[.]com mykessef[.]com idtpl[.]org MITRE TTP Tactic ID Name
[ { "id": 22822, "label": "location", "start_offset": 0, "end_offset": 3 }, { "id": 22823, "label": "location", "start_offset": 9, "end_offset": 15 }, { "id": 22824, "label": "SHA1", "start_offset": 43, "end_offset": 107 }, { "id": 22825, "label": "SHA2", "start_offset": 160, "end_offset": 224 } ]
[]
[]
7,768
Figure 20.
[]
[]
[]
2,069
The videos had no sound, but the threat actor would type commentary on a terminal to address something the viewer was observing on screen.
[]
[]
[]
10,671
Table 1: The 15 vulnerabilities weaponized since 2017 CVE ID cvss3 score Description CVE-2021-42013 9.8 Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete fix of CVE-2021-41773) CVE-2021-41773 7.5
[ { "id": 32570, "label": "attack-pattern", "start_offset": 105, "end_offset": 119 }, { "id": 32571, "label": "location", "start_offset": 120, "end_offset": 123 }, { "id": 32572, "label": "location", "start_offset": 124, "end_offset": 130 }, { "id": 32573, "label": "location", "start_offset": 149, "end_offset": 155 }, { "id": 32574, "label": "location", "start_offset": 175, "end_offset": 178 }, { "id": 32575, "label": "location", "start_offset": 214, "end_offset": 219 }, { "id": 32576, "label": "location", "start_offset": 230, "end_offset": 235 } ]
[]
[]
5,101
The attackers made multiple attempts to use the exploit days after the vulnerability was patched on February 14, which stresses the importance of applying security updates as they become available.
[ { "id": 51206, "label": "TIME", "start_offset": 100, "end_offset": 111 } ]
[]
[]
2,169
Microsoft recommends that customers of Microsoft Defender for Endpoint enable the attack surface reduction rule BlockOfficeCreateProcessRule.
[ { "id": 45408, "label": "identity", "start_offset": 0, "end_offset": 9 }, { "id": 45409, "label": "SOFTWARE", "start_offset": 39, "end_offset": 70 } ]
[]
[]
2,886
Neither of these variables is actually used in this exploit.
[]
[]
[]
3,097
Because these vulnerabilities affect the processors at the physical layer, the only way for the vulnerabilities to be fully addressed is for the processors to be replaced or to have a firmware update.
[]
[]
[]
7,493
Figure 5.
[]
[]
[]
13,905
Execution and impact The execution of the actual ransomware occurs next.
[]
[]
[]
13,486
Our actions against coordinated influence operations from January, February and March can be found in the Q1 Bulletin.
[ { "id": 51557, "label": "TIME", "start_offset": 58, "end_offset": 65 }, { "id": 51558, "label": "TIME", "start_offset": 67, "end_offset": 75 }, { "id": 51559, "label": "TIME", "start_offset": 80, "end_offset": 85 } ]
[]
[]
11,733
-ms[.]net C&C cdn-sop[.]net C&C fqn-cloud[.]net C&C ms-trace[.]net C&C imail.aop.gov-af[.]org Phishing Domain mail-apfgavnp.hopto[.]org Phishing Domain mail-apfgovnp.ddns[.]net Phishing Domain mail-kmgcom.ddns[.]net Phishing Domain mail-mfagovcn.hopto[.]org Phishing Domain mail
[ { "id": 36141, "label": "attack-pattern", "start_offset": 115, "end_offset": 123 }, { "id": 36142, "label": "attack-pattern", "start_offset": 162, "end_offset": 170 }, { "id": 36143, "label": "attack-pattern", "start_offset": 208, "end_offset": 216 }, { "id": 36144, "label": "attack-pattern", "start_offset": 252, "end_offset": 260 }, { "id": 36145, "label": "attack-pattern", "start_offset": 299, "end_offset": 307 } ]
[]
[]
2,843
There have been several theories: Unit 42 believes the most likely delivery method is method #2.
[ { "id": 48048, "label": "identity", "start_offset": 35, "end_offset": 42 } ]
[]
[]
716
If the vulnerability is exploited, threat actors could bypass authentication and run arbitrary code on unpatched systems.
[ { "id": 46283, "label": "attack-pattern", "start_offset": 55, "end_offset": 76 }, { "id": 46284, "label": "attack-pattern", "start_offset": 81, "end_offset": 99 } ]
[]
[]
11,250
In the meantime, we encourage high risk users to enroll in our Advanced Protection Program (APP) and utilize Google Account Level Enhanced Safe Browsing to ensure they have the greatest level of protection in the face of ongoing threats.
[ { "id": 34390, "label": "location", "start_offset": 72, "end_offset": 82 }, { "id": 34391, "label": "location", "start_offset": 97, "end_offset": 100 }, { "id": 34392, "label": "threat-actor", "start_offset": 139, "end_offset": 143 }, { "id": 34393, "label": "location", "start_offset": 195, "end_offset": 205 } ]
[]
[]
13,634
Online shop administrators should be aware that potential attacks may come not only from spam but also from different — and unexpected — infection vectors.
[]
[]
[]
1,937
We did not find Urpage victims in our telemetry, likely because of the targeted nature of these attacks.
[ { "id": 5704, "label": "threat-actor", "start_offset": 16, "end_offset": 22 } ]
[]
[]
5,009
NOTE: On May 20th, we updated our attribution to more precisely describe our findings.
[ { "id": 51062, "label": "TIME", "start_offset": 9, "end_offset": 17 } ]
[]
[]
3,917
The attack features the following script:
[]
[]
[]
1,866
Once inside, the continuing trend of abusing legitimate tools and functions to mask malicious activities and actors’ presence
[]
[]
[]
8,141
When encrypting, it creates a block of data we named headData.
[]
[]
[]
12,446
We terminated 35 YouTube channels as part of our investigation into coordinated influence operations linked to Azerbaijan.
[]
[]
[]
13,977
It also misses the incredible importance of identifying tactics, techniques, and tools used by global threat actor groups today.
[]
[]
[]
14,283
Get and upload dedicated directory file list
[]
[]
[]
5,149
I'm going to drive back to the store.
[]
[]
[]
3,096
Because these affect processors, this means that the operating systems and applications that run on top of these processors are vulnerable.
[]
[]
[]
4,135
During our investigation, we found evidence of specific tools, which we listed in Table 1.
[]
[]
[]
1,595
Palo Alto Networks WildFire detected a new Android Trojan on May 7th, 2014 when a customer using our enterprise security platform downloaded the malicious application from the Google Play store.
[ { "id": 46841, "label": "TIME", "start_offset": 61, "end_offset": 74 }, { "id": 46840, "label": "SOFTWARE", "start_offset": 0, "end_offset": 27 }, { "id": 46842, "label": "SOFTWARE", "start_offset": 176, "end_offset": 193 } ]
[]
[]
6,450
Figure 4.
[]
[]
[]
12,297
We received leads from the FBI that supported us in this investigation.
[]
[]
[]
1,705
Antivirus programs running on the PC are trying eradicate the threat, the command and control domains and IPs are being added to denylist and blocked by networks around the world.
[]
[]
[]
14,065
This is a JavaScript file that executes with wscript.exe.
[]
[]
[]
588
By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.
[]
[]
[]
12,641
It generates the needed key and initialization vector (IV) using a salt and secret key; the former is embedded in the code while the latter is generated dynamically using the SHA-256 hash of a randomly generated 32-byte long string.
[ { "id": 39247, "label": "location", "start_offset": 28, "end_offset": 31 }, { "id": 39248, "label": "tools", "start_offset": 47, "end_offset": 53 }, { "id": 39249, "label": "location", "start_offset": 67, "end_offset": 71 }, { "id": 39250, "label": "location", "start_offset": 72, "end_offset": 75 }, { "id": 39252, "label": "location", "start_offset": 220, "end_offset": 224 } ]
[]
[]
12,327
We terminated 3 YouTube channels as part of our investigation into coordinated influence operations linked to France.
[]
[]
[]
10,750
While xxmm2_builder allows REDBALDKNIGHT to customize the settings of XXMM, xxmm2_ steganography is used to hide malicious code within an image file.
[ { "id": 32853, "label": "threat-actor", "start_offset": 27, "end_offset": 40 }, { "id": 32854, "label": "malware", "start_offset": 70, "end_offset": 74 } ]
[]
[]
9,171
Unfortunately, Lurk is just one of the many cybercriminal groups looking to profit from organizations and end users.
[ { "id": 28296, "label": "identity", "start_offset": 23, "end_offset": 27 }, { "id": 28297, "label": "location", "start_offset": 28, "end_offset": 31 }, { "id": 28298, "label": "location", "start_offset": 39, "end_offset": 43 }, { "id": 28299, "label": "location", "start_offset": 102, "end_offset": 105 } ]
[]
[]
3,800
Figure 2. Exploitation of CVE-2017-11882
[ { "id": 49672, "label": "vulnerability", "start_offset": 26, "end_offset": 40 } ]
[]
[]
12,576
It still worked.
[]
[]
[]
13,064
This article lists the known malware strains that have been used over the past two years to install ransomware, all of which should serve as a "code red" moment for any organization.
[]
[]
[]
961
Figure 1.
[]
[]
[]
2,041
One possibility is that it is used to monitor ransomed systems for blue team and incident response (IR) activity, though even in that case it is unusual to see offensive tools dropped at this point in the infection.
[]
[]
[]
5,442
The Brazilian Central Bank recently announced that 2017 was the first year in which people did more banking using mobile devices than on PCs.
[ { "id": 51441, "label": "identity", "start_offset": 4, "end_offset": 26 }, { "id": 51442, "label": "TIME", "start_offset": 51, "end_offset": 55 } ]
[]
[]
2,446
There are two variants of the webshell.
[]
[]
[]
896
The following registry keys are also used within the CLOCK sub-path by PClock2: PClock2 proceeds to use the API from blockchain.info to generate a unique Bitcoin (BTC) wallet identifier, which is configured to automatically forward payments to a hardcoded wallet identifier of ‘1MRfkK134ErfbcadUSoSUCBahngCqoBKju’.
[ { "id": 46423, "label": "malware", "start_offset": 72, "end_offset": 79 }, { "id": 46424, "label": "malware", "start_offset": 82, "end_offset": 89 }, { "id": 46425, "label": "DOMAIN", "start_offset": 119, "end_offset": 134 } ]
[]
[]
5,455
They’re put together by Palo Alto Networks Unit 42 threat research team and are meant for you to read and share with your family, friends, and coworkers so you can all be safer and get on with the business of your digital life. Got a topic you want us to write about for you, your friends, or your family?
[ { "id": 51445, "label": "identity", "start_offset": 25, "end_offset": 72 } ]
[]
[]
13,198
The traffic is encrypted to evade detection.
[]
[]
[]
1,599
A developer using the ID “fun app” published the Trojan, and the remote control application they uploaded on April 21 is their most successful app so far, with between 10,000 and 50,000 downloads on the play store.
[ { "id": 46846, "label": "TIME", "start_offset": 110, "end_offset": 118 } ]
[]
[]
3,370
.Python.BIOPASS.A e479823aa41d3f6416233dba8e765cf2abaa38ad18328859a20b88df7f1d88d5 sc2.txt BIOPASS RAT encoded Cobalt Strike shellcode Trojan.Win32.COBEACON.A e567fd0f08fdafc5a89c9084373f3308ef464918ff7e4ecd7fb3135d777e946d sc3.txt
[ { "id": 10186, "label": "malware", "start_offset": 94, "end_offset": 105 }, { "id": 10187, "label": "tools", "start_offset": 114, "end_offset": 127 }, { "id": 10188, "label": "SHA2", "start_offset": 164, "end_offset": 228 }, { "id": 10185, "label": "SHA2", "start_offset": 19, "end_offset": 83 }, { "id": 48989, "label": "malware", "start_offset": 139, "end_offset": 162 }, { "id": 48987, "label": "malware", "start_offset": 1, "end_offset": 17 }, { "id": 48988, "label": "FILEPATH", "start_offset": 85, "end_offset": 92 }, { "id": 48990, "label": "FILEPATH", "start_offset": 230, "end_offset": 237 } ]
[ { "id": 548, "from_id": 10185, "to_id": 10186, "type": "indicates" }, { "id": 549, "from_id": 48988, "to_id": 10186, "type": "indicates" }, { "id": 553, "from_id": 10187, "to_id": 48989, "type": "related-to" }, { "id": 550, "from_id": 48987, "to_id": 10186, "type": "duplicate-of" }, { "id": 551, "from_id": 10185, "to_id": 48988, "type": "duplicate-of" }, { "id": 552, "from_id": 10186, "to_id": 10187, "type": "uses" }, { "id": 554, "from_id": 10188, "to_id": 48989, "type": "indicates" }, { "id": 555, "from_id": 48990, "to_id": 48989, "type": "indicates" }, { "id": 556, "from_id": 48989, "to_id": 10186, "type": "duplicate-of" } ]
[]
4,216
The second fake website is again related to chat, with a background suggesting that it can help find users a partner.
[]
[]
[]
13,567
We observed that the scripts used during the attacks were customized.
[]
[]
[]
11,637
We learned that these pages were copied from their victims’ webmail login pages and subsequently modified for phishing.
[ { "id": 35709, "label": "location", "start_offset": 3, "end_offset": 10 }, { "id": 35710, "label": "location", "start_offset": 80, "end_offset": 83 }, { "id": 35711, "label": "attack-pattern", "start_offset": 110, "end_offset": 118 } ]
[]
[]
13,516
Consider using dedicated two-factor authentication apps or devices such as Yubikey instead of relying on SMS.
[]
[]
[]
10,078
This was carried out via a compromised version of a network monitoring application called SolarWinds Orion.
[]
[]
[]
152
In some cases, the ransomware is sophisticated enough to target specific application files.
[]
[]
[]
1,056
An “overlay attack” is an attack where an attacker’s app draws a window over (or “overlays”) other windows and apps running on the device.
[ { "id": 44926, "label": "attack-pattern", "start_offset": 4, "end_offset": 18 } ]
[]
[]
4,713
At the time, our Android team released research about a newly discovered family of spyware related to Pegasus that was used in a targeted attack on a small number of Android devices.
[ { "id": 50607, "label": "malware", "start_offset": 102, "end_offset": 109 }, { "id": 50608, "label": "SOFTWARE", "start_offset": 166, "end_offset": 173 }, { "id": 50606, "label": "SOFTWARE", "start_offset": 17, "end_offset": 24 } ]
[]
[]
2,935
While we can’t see how many people the other half of the samples affect, it’s a reasonable supposition that the other half of the total samples affect just as many people as the half we can see.
[]
[]
[]
4,459
In 2017, Android – which is owned by Google – was the first mobile platform to warn users about NSO Group’s Pegasus spyware.
[ { "id": 50241, "label": "malware", "start_offset": 108, "end_offset": 115 }, { "id": 50237, "label": "TIME", "start_offset": 3, "end_offset": 7 }, { "id": 50240, "label": "threat-actor", "start_offset": 96, "end_offset": 105 }, { "id": 50238, "label": "SOFTWARE", "start_offset": 9, "end_offset": 16 }, { "id": 50239, "label": "identity", "start_offset": 37, "end_offset": 43 } ]
[ { "id": 933, "from_id": 50241, "to_id": 50240, "type": "authored-by" } ]
[]
2,607
A hallmark of this group is the diversity of techniques used both for initial access and action-on-objective.
[]
[]
[]
2,789
The good news is that these attacks are more like denial of service attacks: they don’t do lasting harm to your system and they end when you leave the site. The bad news is that these are harder to defend against than typical drive-by download attacks.
[]
[]
[]
1,384
PowerShell process used to delete Windows Defender, e.g. C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe rmdir 'C:\ProgramData\Microsoft\Windows Defender' -Recurse 8. File InstallUtil.exe running from C:\Users\[USERNAME]\AppData\Local\Temp directory.
[ { "id": 4148, "label": "tools", "start_offset": 0, "end_offset": 10 }, { "id": 46727, "label": "FILEPATH", "start_offset": 122, "end_offset": 163 }, { "id": 46726, "label": "FILEPATH", "start_offset": 57, "end_offset": 114 }, { "id": 46728, "label": "FILEPATH", "start_offset": 183, "end_offset": 198 }, { "id": 46725, "label": "tools", "start_offset": 34, "end_offset": 50 }, { "id": 46729, "label": "FILEPATH", "start_offset": 212, "end_offset": 251 } ]
[]
[]
551
The victims can find the threat actor’s user name through specific group chat software or follow a chat group link in the ransom note. Ransom payment operations are complicated and highly automated processes.
[]
[]
[]
13,496
One of the most prolific cybermercenaries is Void Balaur, a Russian-speaking threat actor group that has launched attacks against different sectors and industries all over the world.
[ { "id": 51564, "label": "threat-actor", "start_offset": 45, "end_offset": 56 } ]
[]
[]
13,122
For others, digital transformation had been a priority for much longer, but the events of the past two years added a new sense of urgency.
[]
[]
[]
3,857
In this scenario, accevent.exe is the primary executable, which is usually legitimate.
[ { "id": 49716, "label": "FILEPATH", "start_offset": 18, "end_offset": 30 } ]
[]
[]
3,513
ShellManage - Creates a shell.
[]
[]
[]
2,584
Unit 42 has helped organizations respond to multiple Lapsus$ attacks.
[ { "id": 47769, "label": "identity", "start_offset": 1, "end_offset": 8 }, { "id": 7797, "label": "threat-actor", "start_offset": 54, "end_offset": 61 } ]
[]
[]
1,368
More information about these protections can be found within the Mitigation Actions section of the briefing.
[]
[]
[]
3,726
Continuous vigilance against threat groups is an important aspect of keeping up with — if not being one step ahead of — threats.
[]
[]
[]
2,302
In this blog we analyze the technical details of the exploit chain and share IOCs to help teams defend against similar style attacks.
[]
[]
[]
2,280
This past year, TAG has been collaborating with Google’s CyberCrime Investigation Group to disrupt Glupteba activity involving Google services.
[ { "id": 45441, "label": "identity", "start_offset": 16, "end_offset": 19 }, { "id": 45438, "label": "malware", "start_offset": 99, "end_offset": 107 }, { "id": 45439, "label": "identity", "start_offset": 48, "end_offset": 87 }, { "id": 45440, "label": "SOFTWARE", "start_offset": 127, "end_offset": 142 } ]
[]
[]
3,198
The legitimate known application is downloaded and executed.
[]
[]
[]
13,684
jQuery method is used to post the target’s credentials to hosting site The phishing pages record passwords inputted by site visitors.
[ { "id": 51752, "label": "attack-pattern", "start_offset": 79, "end_offset": 87 } ]
[]
[]
1,296
If the file does not exist, it will make the following GET request: The filename and name parameters are statically set in the above request.
[]
[]
[]
185
Beginning on Feb. 15, a series of distributed denial of service (DDoS) attacks commenced.
[ { "id": 45851, "label": "TIME", "start_offset": 13, "end_offset": 20 }, { "id": 45852, "label": "attack-pattern", "start_offset": 34, "end_offset": 70 } ]
[]
[]
2,900
s[_local28][(((_local41 - _local12) / 4) + 15)]
[]
[]
[]
9,678
Figure 16.
[]
[]
[]
7,586
The latter is a configuration file that handles files to install.
[]
[]
[]
4,232
At the end of last year, a C&C from the same threat actor was not only accessible from any IP address, but it was possible to browse the server directory tree without authentication.
[]
[]
[]
14,037
These paths leak information about the third-party libraries’ installed paths.
[]
[]
[]
4,077
Figure 5.
[]
[]
[]