text
stringlengths 402
1.34k
|
---|
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'This module monitors a wide range of device activities including application installation / remove / update , phone restart and battery charge .' [/INST] [This:O, module:B-SamFile, monitors:O, a:O, wide:O, range:O, of:O, device:O, activities:O, including:O, application:B-Features, installation:I-Features, /:O, remove:B-Features, /:O, update:B-Features, ,:O, phone:B-Features, restart:I-Features, and:O, battery:B-Features, charge:I-Features, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'It turns out that contacts data isn’t the only unusual data SWAnalytics is interested in .' [/INST] [It:O, turns:O, out:O, that:O, contacts:B-Features, data:I-Features, isn’t:O, the:O, only:O, unusual:O, data:O, SWAnalytics:B-SamFile, is:O, interested:O, in:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'With default settings , SWAnalytics will scan through an Android device’s external storage , looking for directory tencent/MobileQQ/WebViewCheck” .' [/INST] [With:O, default:O, settings:O, ,:O, SWAnalytics:B-SamFile, will:O, scan:B-Features, through:O, an:O, Android:O, device’s:O, external:O, storage:O, ,:O, looking:O, for:O, directory:O, tencent/MobileQQ/WebViewCheck”:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'By listing sub-folders , SWAnalytics is able to infer QQ accounts which have never been used on the device .' [/INST] [By:O, listing:B-Features, sub-folders:I-Features, ,:O, SWAnalytics:B-SamFile, is:O, able:O, to:O, infer:B-Features, QQ:I-Features, accounts:I-Features, which:O, have:O, never:O, been:O, used:O, on:O, the:O, device:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'To make this data harvesting operation flexible , SWAnalytics equips the ability to receive and process configuration files from a remote Command-and-Control .' [/INST] [To:O, make:O, this:O, data:O, harvesting:O, operation:O, flexible:O, ,:O, SWAnalytics:B-SamFile, equips:O, the:O, ability:O, to:O, receive:B-Features, and:O, process:B-Features, configuration:I-Features, files:I-Features, from:O, a:O, remote:B-Features, Command-and-Control:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Just to highlight its capabilities , TajMahal is able to steal data from a CD burnt by a victim as well as from the printer queue .' [/INST] [Just:O, to:O, highlight:O, its:O, capabilities:O, ,:O, TajMahal:B-SamFile, is:O, able:O, to:O, steal:B-Features, data:I-Features, from:O, a:O, CD:O, burnt:O, by:O, a:O, victim:O, as:O, well:O, as:O, from:O, the:O, printer:O, queue:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The newer variant of KopiLuwak is now capable of exfiltrating files to the C&C as well as downloading files and saving them to the infected machine .' [/INST] [The:O, newer:O, variant:O, of:O, KopiLuwak:B-SamFile, is:O, now:O, capable:O, of:O, exfiltrating:B-Features, files:I-Features, to:O, the:O, C&C:O, as:O, well:O, as:O, downloading:B-Features, files:I-Features, and:O, saving:O, them:O, to:O, the:O, infected:O, machine:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The tool does all that a typical Trojan needs to accomplish: upload , download and execute files , fingerprint target systems .' [/INST] [The:O, tool:O, does:O, all:O, that:O, a:O, typical:O, Trojan:B-SamFile, needs:O, to:O, accomplish::O, upload:B-Features, ,:O, download:B-Features, and:O, execute:B-Features, files:I-Features, ,:O, fingerprint:B-Features, target:I-Features, systems:I-Features, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The PowerShell version of the Trojan also has the ability to get screenshots .' [/INST] [The:O, PowerShell:B-SamFile, version:O, of:O, the:O, Trojan:O, also:O, has:O, the:O, ability:O, to:O, get:B-Features, screenshots:B-Features, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Initial reports about HIGHNOON and its variants reported publicly as Winnti dating back to at least 2013 indicated the tool was exclusive to a single group , contributing to significant conflation across multiple distinct espionage operations .' [/INST] [Initial:O, reports:O, about:O, HIGHNOON:B-SamFile, and:O, its:O, variants:O, reported:O, publicly:O, as:O, Winnti:B-HackOrg, dating:O, back:O, to:O, at:O, least:O, 2013:B-Time, indicated:O, the:O, tool:O, was:O, exclusive:O, to:O, a:O, single:O, group:O, ,:O, contributing:O, to:O, significant:B-Features, conflation:I-Features, across:O, multiple:O, distinct:O, espionage:O, operations:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'BalkanRAT enables the attacker to remotely control the compromised computer via a graphical interface , i.e , manually; BalkanDoor enables them to remotely control the compromised computer via a command line , i.e , possibly en masse .' [/INST] [BalkanRAT:B-SamFile, enables:O, the:O, attacker:O, to:O, remotely:O, control:B-Features, the:O, compromised:O, computer:O, via:O, a:O, graphical:O, interface:O, ,:O, i.e:O, ,:O, manually;:O, BalkanDoor:B-SamFile, enables:O, them:O, to:O, remotely:O, control:O, the:O, compromised:O, computer:O, via:O, a:O, command:O, line:O, ,:O, i.e:O, ,:O, possibly:O, en:O, masse:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The backdoor can connect to any of the C&Cs from a hardcoded list – a measure to increase resilience .' [/INST] [The:O, backdoor:B-SamFile, can:O, connect:B-Features, to:O, any:O, of:O, the:O, C&Cs:O, from:O, a:O, hardcoded:O, list:O, –:O, a:O, measure:O, to:O, increase:O, resilience:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'China Chopper is a tool that allows attackers to remotely control the target system that needs to be running a web server application before it can be targeted by the tool .' [/INST] [China:B-SamFile, Chopper:I-SamFile, is:O, a:O, tool:O, that:O, allows:O, attackers:B-HackOrg, to:O, remotely:O, control:B-Features, the:O, target:O, system:O, that:O, needs:O, to:O, be:O, running:O, a:O, web:O, server:O, application:O, before:O, it:O, can:O, be:O, targeted:O, by:O, the:O, tool:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'China Chopper contains a remote shell (Virtual Terminal) function that has a first suggested command of netstat an|find ESTABLISHED .' [/INST] [China:B-SamFile, Chopper:I-SamFile, contains:O, a:O, remote:O, shell:O, (Virtual:O, Terminal):O, function:O, that:O, has:O, a:O, first:O, suggested:O, command:B-Features, of:O, netstat:O, an|find:O, ESTABLISHED:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The tool investigates the Local Security Authority Subsystem memory space in order to find , decrypt and display retrieved passwords .' [/INST] [The:O, tool:B-SamFile, investigates:B-Features, the:O, Local:O, Security:O, Authority:O, Subsystem:O, memory:O, space:O, in:O, order:O, to:O, find:O, ,:O, decrypt:O, and:O, display:O, retrieved:O, passwords:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Additional capabilities of the More_eggs malware include the download and execution of files and scripts and running commands using cmd.exe .' [/INST] [Additional:O, capabilities:O, of:O, the:O, More_eggs:B-SamFile, malware:I-SamFile, include:O, the:O, download:B-Features, and:O, execution:B-Features, of:I-Features, files:I-Features, and:O, scripts:O, and:O, running:O, commands:O, using:O, cmd.exe:B-SamFile, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In their latest leak , they have released the UNITEDRAKE NSA exploit , which is a remote access and control tool that can remotely target Windows-based systems to capture desired information and transfer it to a server .' [/INST] [In:O, their:O, latest:O, leak:O, ,:O, they:O, have:O, released:O, the:O, UNITEDRAKE:B-Exp, NSA:I-Exp, exploit:I-Exp, ,:O, which:O, is:O, a:O, remote:O, access:O, and:O, control:O, tool:O, that:O, can:O, remotely:O, target:O, Windows-based:O, systems:O, to:O, capture:B-Features, desired:I-Features, information:I-Features, and:O, transfer:B-Features, it:O, to:O, a:O, server:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The files exploit the well-known Microsoft Office vulnerability , CVE-2012-0158 , to execute malicious code in order to take control of the targeted systems .' [/INST] [The:O, files:B-SamFile, exploit:O, the:O, well-known:O, Microsoft:B-Exp, Office:I-Exp, vulnerability:I-Exp, ,:O, CVE-2012-0158:B-Exp, ,:O, to:O, execute:O, malicious:O, code:O, in:O, order:O, to:O, take:B-Features, control:I-Features, of:O, the:O, targeted:O, systems:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Mimikatz is a post-exploitation tool that allows attackers to extract credentials from volatile memory .' [/INST] [Mimikatz:B-SamFile, is:O, a:O, post-exploitation:O, tool:O, that:O, allows:O, attackers:O, to:O, extract:B-Features, credentials:I-Features, from:O, volatile:O, memory:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The exploit installs Silence’s loader , designed to download backdoors and other malicious programs .' [/INST] [The:O, exploit:B-Exp, installs:O, Silence’s:B-HackOrg, loader:O, ,:O, designed:O, to:O, download:B-Features, backdoors:I-Features, and:O, other:O, malicious:O, programs:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'We have also observed them using virtual private network services that use IPs based in numerous countries to ensure anonymity and obfuscate criminal operations .' [/INST] [We:O, have:O, also:O, observed:O, them:B-SamFile, using:B-Features, virtual:I-Features, private:I-Features, network:I-Features, services:I-Features, that:O, use:O, IPs:O, based:O, in:O, numerous:O, countries:O, to:O, ensure:B-Purp, anonymity:I-Purp, and:O, obfuscate:B-Purp, criminal:I-Purp, operations:I-Purp, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Once downloaded and executed , it drops an intermediate payload that further downloads a Pony DLL and Vawtrak executable , which perform data theft and connect to a command and control (C2) server .' [/INST] [Once:O, downloaded:O, and:O, executed:O, ,:O, it:O, drops:O, an:O, intermediate:O, payload:O, that:O, further:O, downloads:O, a:O, Pony:B-SamFile, DLL:I-SamFile, and:O, Vawtrak:B-SamFile, executable:O, ,:O, which:O, perform:O, data:B-Features, theft:I-Features, and:O, connect:B-Features, to:O, a:O, command:B-Purp, and:O, control:B-Purp, (C2):I-Purp, server:I-Purp, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'After the executable is executed , it downloads Pony and Vawtrak malware variants to steal data .' [/INST] [After:O, the:O, executable:O, is:O, executed:O, ,:O, it:O, downloads:O, Pony:B-SamFile, and:O, Vawtrak:B-SamFile, malware:O, variants:O, to:O, steal:B-Purp, data:I-Purp, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Once a valid card with a malicious EMV chip is detected , RIPPER will instantiate a timer to allow a thief to control the machine .' [/INST] [Once:O, a:O, valid:O, card:O, with:O, a:O, malicious:O, EMV:O, chip:O, is:O, detected:O, ,:O, RIPPER:B-SamFile, will:O, instantiate:B-Features, a:I-Features, timer:I-Features, to:O, allow:O, a:O, thief:O, to:O, control:B-Purp, the:I-Purp, machine:I-Purp, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The toolset includes reams of documentation explaining how the cyber weapons work , as well as details about their use in highly classified intelligence operations abroad .' [/INST] [The:O, toolset:O, includes:O, reams:O, of:O, documentation:O, explaining:B-Features, how:I-Features, the:I-Features, cyber:I-Features, weapons:I-Features, work:O, ,:O, as:O, well:O, as:O, details:O, about:O, their:O, use:O, in:O, highly:B-Purp, classified:I-Purp, intelligence:I-Purp, operations:O, abroad:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The threat actors behind the Sea Turtle campaign were successful in compromising entities by manipulating and falsifying DNS records at various levels in the domain name space .' [/INST] [The:O, threat:B-HackOrg, actors:I-HackOrg, behind:O, the:O, Sea:B-OffAct, Turtle:I-OffAct, campaign:O, were:O, successful:O, in:O, compromising:B-Purp, entities:I-Purp, by:O, manipulating:O, and:O, falsifying:B-Features, DNS:I-Features, records:O, at:O, various:O, levels:O, in:O, the:O, domain:O, name:O, space:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In their latest leak , they have released the UNITEDRAKE NSA exploit , which is a remote access and control tool that can remotely target Windows-based systems to capture desired information and transfer it to a server .' [/INST] [In:O, their:O, latest:O, leak:O, ,:O, they:O, have:O, released:O, the:O, UNITEDRAKE:B-Exp, NSA:I-Exp, exploit:I-Exp, ,:O, which:O, is:O, a:O, remote:O, access:O, and:O, control:O, tool:O, that:O, can:O, remotely:O, target:O, Windows-based:O, systems:O, to:O, capture:B-Features, desired:I-Features, information:I-Features, and:O, transfer:B-Features, it:O, to:O, a:O, server:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Some of the documents exploited CVE-2017-0199 to deliver the payload .' [/INST] [Some:O, of:O, the:O, documents:B-SamFile, exploited:O, CVE-2017-0199:B-Exp, to:O, deliver:B-Features, the:I-Features, payload:I-Features, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The files exploit the well-known Microsoft Office vulnerability , CVE-2012-0158 , to execute malicious code in order to take control of the targeted systems .' [/INST] [The:O, files:B-SamFile, exploit:O, the:O, well-known:O, Microsoft:B-Exp, Office:I-Exp, vulnerability:I-Exp, ,:O, CVE-2012-0158:B-Exp, ,:O, to:O, execute:O, malicious:O, code:O, in:O, order:O, to:O, take:B-Features, control:I-Features, of:O, the:O, targeted:O, systems:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Mimikatz is a post-exploitation tool that allows attackers to extract credentials from volatile memory .' [/INST] [Mimikatz:B-SamFile, is:O, a:O, post-exploitation:O, tool:O, that:O, allows:O, attackers:O, to:O, extract:B-Features, credentials:I-Features, from:O, volatile:O, memory:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The exploit installs Silence’s loader , designed to download backdoors and other malicious programs .' [/INST] [The:O, exploit:B-Exp, installs:O, Silence’s:B-HackOrg, loader:O, ,:O, designed:O, to:O, download:B-Features, backdoors:I-Features, and:O, other:O, malicious:O, programs:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'It appears that the group values hardcoded into the malware is associated with the targeted organization , as several are Saudi Arabian organizations within the telecommunications and defense industries .' [/INST] [It:O, appears:O, that:O, the:O, group:B-HackOrg, values:O, hardcoded:O, into:O, the:O, malware:O, is:O, associated:O, with:O, the:O, targeted:O, organization:O, ,:O, as:O, several:O, are:O, Saudi:B-Area, Arabian:I-Area, organizations:O, within:O, the:O, telecommunications:B-Idus, and:O, defense:B-Idus, industries:I-Idus, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'This threat group has conducted broad targeting across a variety of industries , including financial , government , energy , chemical , and telecommunications , and has largely focused its operations within the Middle East .' [/INST] [This:O, threat:B-HackOrg, group:I-HackOrg, has:O, conducted:O, broad:O, targeting:O, across:O, a:O, variety:O, of:O, industries:O, ,:O, including:O, financial:B-Idus, ,:O, government:B-Idus, ,:O, energy:B-Idus, ,:O, chemical:B-Idus, ,:O, and:O, telecommunications:B-Idus, ,:O, and:O, has:O, largely:O, focused:O, its:O, operations:O, within:O, the:O, Middle:B-Area, East:I-Area, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'This threat group has conducted broad targeting across a variety of industries , including financial , government , energy , chemical , and telecommunications .' [/INST] [This:O, threat:B-HackOrg, group:I-HackOrg, has:O, conducted:O, broad:O, targeting:O, across:O, a:O, variety:O, of:O, industries:O, ,:O, including:O, financial:B-Idus, ,:O, government:B-Idus, ,:O, energy:B-Idus, ,:O, chemical:B-Idus, ,:O, and:O, telecommunications:B-Idus, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Join us in a live webinar as we discuss this threat group whom we assess to be working on behalf of the Iranian Government , with a mission that would benefit nation-state geopolitical and economic needs .' [/INST] [Join:O, us:O, in:O, a:O, live:O, webinar:O, as:O, we:O, discuss:O, this:O, threat:B-HackOrg, group:I-HackOrg, whom:O, we:O, assess:O, to:O, be:O, working:O, on:O, behalf:O, of:O, the:O, Iranian:B-Org, Government:I-Org, ,:O, with:O, a:O, mission:O, that:O, would:O, benefit:O, nation-state:B-Idus, geopolitical:I-Idus, and:O, economic:B-Idus, needs:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The group conducts operations primarily in the Middle East , targeting financial , government , energy , chemical , telecommunications and other industries .' [/INST] [The:O, group:B-HackOrg, conducts:O, operations:O, primarily:O, in:O, the:O, Middle:B-Area, East:I-Area, ,:O, targeting:O, financial:B-Idus, ,:O, government:B-Idus, ,:O, energy:B-Idus, ,:O, chemical:B-Idus, ,:O, telecommunications:B-Idus, and:O, other:O, industries:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'HELIX KITTEN is likely an Iranian-based adversary group , active since at least late 2015 , targeting organizations in the aerospace , energy , financial , government , hospitality and telecommunications business verticals .' [/INST] [HELIX:B-HackOrg, KITTEN:I-HackOrg, is:O, likely:O, an:O, Iranian-based:B-Area, adversary:O, group:B-HackOrg, ,:O, active:O, since:O, at:O, least:O, late:B-Time, 2015:I-Time, ,:O, targeting:O, organizations:O, in:O, the:O, aerospace:B-Idus, ,:O, energy:B-Idus, ,:O, financial:B-Idus, ,:O, government:B-Idus, ,:O, hospitality:B-Idus, and:O, telecommunications:B-Idus, business:I-Idus, verticals:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The certificates Blackfly stole were also from South Korean companies , primarily in the video game and software development industry .' [/INST] [The:O, certificates:O, Blackfly:O, stole:O, were:O, also:O, from:O, South:B-Area, Korean:I-Area, companies:B-Org, ,:O, primarily:O, in:O, the:O, video:B-Idus, game:I-Idus, and:I-Idus, software:I-Idus, development:I-Idus, industry:I-Idus, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Suckfly 's attacks on government organizations that provide information technology services to other government branches is not limited to India .' [/INST] [Suckfly:B-OffAct, 's:O, attacks:B-OffAct, on:O, government:B-Org, organizations:I-Org, that:O, provide:O, information:B-Idus, technology:I-Idus, services:I-Idus, to:O, other:O, government:B-Idus, branches:O, is:O, not:O, limited:O, to:O, India:B-Area, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In this report we continue our research of the actor 's operations with a specific focus on a selection of custom information technology ( IT ) tools and tactics the threat actor leveraged during the early stages of the targeted attack lifecycle .' [/INST] [In:O, this:O, report:O, we:O, continue:O, our:O, research:O, of:O, the:O, actor:O, 's:O, operations:O, with:O, a:O, specific:O, focus:O, on:O, a:O, selection:O, of:O, custom:O, information:B-Idus, technology:I-Idus, (:O, IT:B-Idus, ):O, tools:O, and:O, tactics:O, the:O, threat:O, actor:O, leveraged:O, during:O, the:O, early:O, stages:O, of:O, the:O, targeted:B-OffAct, attack:I-OffAct, lifecycle:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'CTU researchers have evidence that the TG-3390 compromised U.S and UK organizations in the following verticals : manufacturing ( specifically aerospace ( including defense contractors ) , automotive , technology , energy , and pharmaceuticals ) , education , and legal , as well as organizations focused on international relations .' [/INST] [CTU:B-SecTeam, researchers:O, have:O, evidence:O, that:O, the:O, TG-3390:B-HackOrg, compromised:O, U.S:O, and:O, UK:O, organizations:O, in:O, the:O, following:O, verticals:O, ::O, manufacturing:B-Idus, (:O, specifically:O, aerospace:B-Idus, (:O, including:O, defense:B-Org, contractors:I-Org, ):O, ,:O, automotive:B-Idus, ,:O, technology:B-Idus, ,:O, energy:B-Idus, ,:O, and:O, pharmaceuticals:B-Idus, ):O, ,:O, education:B-Idus, ,:O, and:O, legal:B-Idus, ,:O, as:O, well:O, as:O, organizations:O, focused:O, on:O, international:O, relations:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Based on analysis of the group 's SWCs , TG-3390 operations likely affect organizations in other countries and verticals .' [/INST] [Based:O, on:O, analysis:O, of:O, the:O, group:O, 's:O, SWCs:B-Tool, ,:O, TG-3390:B-HackOrg, operations:O, likely:O, affect:O, organizations:O, in:O, other:O, countries:O, and:O, verticals:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'TG-3390 operates a broad and long-running campaign of SWCs and has compromised approximately 100 websites as of this publication .' [/INST] [TG-3390:B-HackOrg, operates:O, a:O, broad:O, and:O, long-running:O, campaign:B-OffAct, of:O, SWCs:B-OffAct, and:O, has:O, compromised:O, approximately:O, 100:O, websites:O, as:O, of:O, this:O, publication:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'CTU researchers have evidence that the threat group compromised U.S and UK organizations in the following verticals : manufacturing ( specifically aerospace ( including defense contractors ) , automotive , technology , energy , and pharmaceuticals ) , education , and legal , as well as organizations focused on international relations .' [/INST] [CTU:B-SecTeam, researchers:O, have:O, evidence:O, that:O, the:O, threat:O, group:O, compromised:O, U.S:O, and:O, UK:O, organizations:O, in:O, the:O, following:O, verticals:O, ::O, manufacturing:B-Idus, (:O, specifically:O, aerospace:B-Idus, (:O, including:O, defense:B-Org, contractors:I-Org, ):O, ,:O, automotive:B-Idus, ,:O, technology:B-Idus, ,:O, energy:B-Idus, ,:O, and:O, pharmaceuticals:B-Idus, ):O, ,:O, education:B-Idus, ,:O, and:O, legal:B-Idus, ,:O, as:O, well:O, as:O, organizations:O, focused:O, on:O, international:O, relations:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Based on this information , CTU researchers assess that TG-3390 aims to collect defense technology and capability intelligence , other industrial intelligence , and political intelligence from governments and NGOs .' [/INST] [Based:O, on:O, this:O, information:O, ,:O, CTU:B-SecTeam, researchers:O, assess:O, that:O, TG-3390:B-HackOrg, aims:O, to:O, collect:O, defense:B-Purp, technology:I-Purp, and:O, capability:B-Purp, intelligence:I-Purp, ,:O, other:O, industrial:O, intelligence:O, ,:O, and:O, political:B-Idus, intelligence:I-Idus, from:O, governments:B-Idus, and:O, NGOs:I-Idus, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In 2016 , the threat actors conducted a strategic web compromise ( SWC ) on the website of an international industry organization that affected aerospace , academic , media , technology , government , and utilities organizations around the world .' [/INST] [In:O, 2016:B-Time, ,:O, the:O, threat:O, actors:O, conducted:O, a:O, strategic:O, web:O, compromise:O, (:O, SWC:B-Tool, ):O, on:O, the:O, website:O, of:O, an:O, international:B-Org, industry:I-Org, organization:I-Org, that:O, affected:O, aerospace:B-Idus, ,:O, academic:B-Idus, ,:O, media:B-Idus, ,:O, technology:B-Idus, ,:O, government:B-Idus, ,:O, and:O, utilities:B-Org, organizations:I-Org, around:O, the:O, world:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In addition , BRONZE UNION activity on multiple U.S.-based defense manufacturer networks included the threat actors seeking information associated with aerospace technologies , combat processes , and naval defense systems .' [/INST] [In:O, addition:O, ,:O, BRONZE:B-OffAct, UNION:I-OffAct, activity:I-OffAct, on:O, multiple:O, U.S.-based:B-Idus, defense:I-Idus, manufacturer:O, networks:O, included:O, the:O, threat:O, actors:O, seeking:O, information:O, associated:O, with:O, aerospace:B-Idus, technologies:I-Idus, ,:O, combat:B-Idus, processes:I-Idus, ,:O, and:O, naval:B-Idus, defense:I-Idus, systems:I-Idus, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Leafminer attempts to infiltrate target networks through various means of intrusion : watering hole websites , vulnerability scans of network services on the internet , and brute-force login attempts .' [/INST] [Leafminer:B-HackOrg, attempts:O, to:O, infiltrate:O, target:O, networks:O, through:O, various:O, means:O, of:O, intrusion:O, ::O, watering:B-OffAct, hole:I-OffAct, websites:O, ,:O, vulnerability:O, scans:O, of:O, network:B-Way, services:I-Way, on:O, the:O, internet:O, ,:O, and:O, brute-force:B-Way, login:I-Way, attempts:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Leafminer also utilized Process Doppelganging , a detection evasion technique first discussed at the Black Hat EU conference last year .' [/INST] [Leafminer:B-HackOrg, also:O, utilized:O, Process:B-Way, Doppelganging:I-Way, ,:O, a:O, detection:O, evasion:O, technique:O, first:O, discussed:O, at:O, the:O, Black:O, Hat:O, EU:O, conference:O, last:O, year:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'On September 15 and 19 , 2017 , Proofpoint detected and blocked spearphishing emails from this group targeting a US shipbuilding company and a US university research center with military ties .' [/INST] [On:O, September:B-Time, 15:I-Time, and:O, 19:B-Time, ,:I-Time, 2017:I-Time, ,:O, Proofpoint:B-SecTeam, detected:O, and:O, blocked:O, spearphishing:B-Way, emails:I-Way, from:O, this:O, group:B-HackOrg, targeting:O, a:O, US:B-Area, shipbuilding:B-Org, company:I-Org, and:O, a:O, US:B-Area, university:O, research:O, center:O, with:O, military:B-Idus, ties:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Between August 2 and 4 , the actor sent targeted spearphishing emails containing malicious URLs linking to documents to multiple defense contractors .' [/INST] [Between:O, August:B-Time, 2:I-Time, and:O, 4:I-Time, ,:O, the:O, actor:B-HackOrg, sent:O, targeted:O, spearphishing:B-Way, emails:I-Way, containing:O, malicious:O, URLs:O, linking:O, to:O, documents:O, to:O, multiple:O, defense:B-Org, contractors:I-Org, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Between August 2 and 4 , the Leviathan sent targeted spearphishing emails containing malicious URLs linking to documents to multiple defense contractors .' [/INST] [Between:O, August:B-Time, 2:I-Time, and:O, 4:I-Time, ,:O, the:O, Leviathan:B-HackOrg, sent:O, targeted:O, spearphishing:B-Way, emails:I-Way, containing:O, malicious:O, URLs:O, linking:O, to:O, documents:O, to:O, multiple:O, defense:B-Org, contractors:I-Org, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The Leviathan generally emailed Microsoft Excel documents with malicious macros to US universities with military interests , most frequently related to the Navy .' [/INST] [The:O, Leviathan:B-HackOrg, generally:O, emailed:O, Microsoft:B-Way, Excel:I-Way, documents:I-Way, with:O, malicious:O, macros:O, to:O, US:B-Area, universities:B-Idus, with:O, military:B-Idus, interests:O, ,:O, most:O, frequently:O, related:O, to:O, the:O, Navy:B-Org, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Instead , the Spring Dragon group is known to have employed spearphish exploits , strategic web compromises , and watering holes attack .' [/INST] [Instead:O, ,:O, the:O, Spring:B-HackOrg, Dragon:I-HackOrg, group:I-HackOrg, is:O, known:O, to:O, have:O, employed:O, spearphish:B-Exp, exploits:I-Exp, ,:O, strategic:B-Way, web:I-Way, compromises:I-Way, ,:O, and:O, watering:B-OffAct, holes:I-OffAct, attack:I-OffAct, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'On November 10 , 2015 , threat actors sent a spear-phishing email to an individual at the French Ministry of Foreign Affairs .' [/INST] [On:O, November:B-Time, 10:I-Time, ,:I-Time, 2015:I-Time, ,:O, threat:B-HackOrg, actors:I-HackOrg, sent:O, a:O, spear-phishing:B-Way, email:I-Way, to:O, an:O, individual:B-Org, at:O, the:O, French:O, Ministry:O, of:O, Foreign:O, Affairs:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'On November 10 , 2015 , Lotus Blossom sent a spear-phishing email to an individual at the French Ministry of Foreign Affairs .' [/INST] [On:O, November:B-Time, 10:I-Time, ,:I-Time, 2015:I-Time, ,:O, Lotus:B-HackOrg, Blossom:I-HackOrg, sent:O, a:O, spear-phishing:B-Way, email:I-Way, to:O, an:O, individual:B-Org, at:O, the:O, French:O, Ministry:O, of:O, Foreign:O, Affairs:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The Magic Hound attacks did not rely on exploit code to compromise targeted systems , instead relying on Excel and Word documents containing malicious macros .' [/INST] [The:O, Magic:B-OffAct, Hound:I-OffAct, attacks:I-OffAct, did:O, not:O, rely:O, on:O, exploit:O, code:O, to:O, compromise:O, targeted:O, systems:O, ,:O, instead:O, relying:O, on:O, Excel:B-Way, and:O, Word:B-Way, documents:I-Way, containing:O, malicious:O, macros:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The Magic Hound campaign used Word and Excel documents containing malicious macros as a delivery method , specifically attempting to load MagicHound.Rollover .' [/INST] [The:O, Magic:B-OffAct, Hound:I-OffAct, campaign:I-OffAct, used:O, Word:B-Way, and:O, Excel:B-Way, documents:O, containing:O, malicious:O, macros:O, as:O, a:O, delivery:O, method:O, ,:O, specifically:O, attempting:O, to:O, load:O, MagicHound.Rollover:B-Tool, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'During a recent campaign , APT32 leveraged social engineering emails with Microsoft ActiveMime file attachments to deliver malicious macros .' [/INST] [During:O, a:O, recent:O, campaign:B-OffAct, ,:O, APT32:B-HackOrg, leveraged:O, social:B-Way, engineering:I-Way, emails:I-Way, with:O, Microsoft:B-SamFile, ActiveMime:I-SamFile, file:I-SamFile, attachments:O, to:O, deliver:B-Purp, malicious:I-Purp, macros:I-Purp, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'APT33 often conducts spear-phishing operations using a built-in phishing module .' [/INST] [APT33:B-HackOrg, often:O, conducts:O, spear-phishing:B-Way, operations:O, using:O, a:O, built-in:O, phishing:B-Way, module:I-Way, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In a recent attack , APT33 sent spear-phishing emails to workers in the aviation industry .' [/INST] [In:O, a:O, recent:O, attack:B-OffAct, ,:O, APT33:B-HackOrg, sent:O, spear-phishing:B-Way, emails:I-Way, to:O, workers:O, in:O, the:O, aviation:B-Idus, industry:I-Idus, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'These emails included recruitment-themed lures and links to malicious HTML application ( HTA ) files .' [/INST] [These:O, emails:B-Way, included:O, recruitment-themed:B-Way, lures:I-Way, and:O, links:O, to:O, malicious:O, HTML:B-Tool, application:I-Tool, (:O, HTA:B-SamFile, ):O, files:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'APT34 often uses compromised accounts to conduct spear-phishing operations .' [/INST] [APT34:B-HackOrg, often:O, uses:O, compromised:B-Tool, accounts:I-Tool, to:O, conduct:O, spear-phishing:B-Way, operations:O, .:O] </s> |