tokens
listlengths
2
296
ner_tags
listlengths
2
296
[ "This", "ransomware", "family", "’", "s", "long", "history", "tells", "us", "that", "its", "evolution", "is", "far", "from", "over", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Dropper.GreenStuff.1.7", "Win32.Trojan.WisdomEyes.16070401.9500.9688", "Trojan.Dropper", "Win32/Pasorot.D", "Win.Trojan.Greenstuff-3", "Trojan.Dropper.GreenStuff.1.7", "Trojan-Dropper.Win32.GreenStuff.17", "Trojan.Dropper.GreenStuff.1.7", "T...
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "MemScan:Trojan.Downloader.Modgof.A", "MemScan:Trojan.Downloader.Modgof.A", "Trojan.Scar.daok", "Trojan.Win32.Scar.tlmwj", "TROJ_AZAH.A", "Trojan.Win32.Scar.daok", "MemScan:Trojan.Downloader.Modgof.A", "Trojan.Scar!ZI1ghG8RGXc", "MemScan:Trojan.Down...
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "first", "function", "is", "used", "for", "contact", "information", "stealing", ":", "the", "function", "upCon", "steals", "all", "contacts", "in", "the", "contact", "list", "and", "their", "information", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.FakeGina.X", "Trojan.Fakegina", "Trojan.FakeGina.X", "Trojan/FakeGina.b", "TROJ_FAKEGINA.AA", "Win32.Trojan.FakeGina.b", "W32/Risk.LOJP-2889", "Trojan.Fakegina", "TROJ_FAKEGINA.AA", "Trojan.FakeGina.X", "Trojan.FakeGina.X", "Trojan.Fak...
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "While", "doing", "so", ",", "it", "will", "reach", "a", "service", "exported", "by", "“", "Agent", "Smith", "”", ",", "and", "sends", "out", "an", "authentication", "request", "that", "would", "lead", "to", "a", "call", "to", "the", "‘", "addAccount", ...
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "campaign", "targeted", "Japanese", "organizations", "by", "using", "at", "least", "two", "legitimate", "Japanese", "websites", "to", "host", "a", "strategic", "web", "compromise", "SWC,", "where", "victims", "ultimately", "downloaded", "a", "variant", "of"...
[ 16, 3, 16, 4, 12, 16, 16, 16, 16, 16, 16, 1, 9, 16, 16, 16, 1, 9, 9, 9, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11 ]
[ "It", "connects", "to", "a", "certain", "URL,", "likely", "controlled", "by", "the", "attacker,", "using", "a", "specific", "Go", "user-agent:" ]
[ 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 1, 16, 16, 16, 5, 13 ]
[ "The", "first", "phase", "is", "receiving", "malspam", "from", "a", "botnet." ]
[ 16, 16, 16, 16, 16, 1, 16, 16, 3 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Graftor.D49E51", "W32/Trojan.ULWD-7621", "Trojan.Win32.Drop.elkhrw", "BehavesLike.Win32.Sivis.kh", "Trojan-Dropper.Win32.Rubat", "W32/Win.G", "Trojan.SchoolGirl.er", "TR/Drop.Rubat.qlzld", "TrojanDropper:Win32/Rubat.A!bit", "Trojan.SchoolG...
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Unfortunately", ",", "for", "now", "we", "can", "’", "t", "say", "in", "what", "environment", "these", "landing", "pages", "were", "used", "in", "the", "wild", ",", "but", "according", "to", "all", "the", "information", "at", "our", "dsiposal", ",", "we...
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "If", "the", "threat", "reappears", "on", "the", "device", "after", "the", "first", "installation", ",", "it", "means", "that", "the", "malware", "managed", "to", "install", "the", "persistency", "module", "in", "the", "System", "directory", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.CominateU.Adware", "Trojan-GameThief.Win32.OnLineGames!O", "TrojanGameThief.OnLineGames", "Trojan.OnLineGames.Win32.78851", "Trojan/OnLineGames.boaj", "Trojan.Zusy.Elzob.D484", "W32/Risk.ADYI-1535", "TSPY_ONLIN.SMUM", "Win.Spyware.82985-2", "...
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/W32.Timer.55808.B", "Trojan-Ransom.Win32.Timer!O", "Trojan/Kryptik.sot", "Trojan.Boigy.4", "TROJ_RANSOM.SMMJ", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Win32/Ransom.GED", "TROJ_RANSOM.SMMJ", "Trojan-Ransom.Win32.Timer.icg", "Trojan.W...
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Given", "previous", "operational", "security", "errors", "from", "this", "actor", "in", "the", "past", "which", "resulted", "in", "exfiltrated", "content", "being", "publicly", "accessible", "Lookout", "Threat", "Intelligence", "is", "continuing", "to", "map", "o...
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 12, 12, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "This", "makes", "the", "taking", "down", "and", "recovery", "of", "the", "network", "much", "harder", "and", "poses", "a", "considerable", "challenge", "for", "defenders", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "]", "nampriknum", "[", "." ]
[ 9, 9, 9, 9 ]
[ "Aside", "from", "the", "natural", "value", "of", "phone", "numbers", "associated", "with", "the", "names", "of", "their", "owners", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Ransom/W32.Foreign.409600.C", "Trojan.Foreign", "Ransom_Foreign.R002C0DB418", "Trojan-Ransom.Win32.Foreign.nxzy", "Trojan.Win32.Spambot.exqsne", "Trojan.Win32.Z.Trubsil.409600", "Troj.Ransom.W32.Foreign!c", "Trojan.Spambot.15075", "Ransom_Foreign.R...
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Due", "to", "the", "specific", "nature", "of", "its", "activity", ",", "Perkele", "is", "distributed", "in", "a", "rather", "unusual", "way", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "link", "points", "to", "a", "web", "page", "with", "a", "similar", "sentence", "and", "a", "button", "for", "downloading", "the", "APK", "file", "of", "the", "Trojan", "to", "the", "device", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.DakusarDRAX.Trojan", "Trojan.Floxif", "Win32.Trojan.WisdomEyes.16070401.9500.9948", "Win32/Flofix.D", "TROJ_FLOXIF_EK040354.UVPM", "Trojan.Win32.Floxif.cqjmcu", "Win32.FloodFix", "Trojan.Floxif.Win32.2", "TROJ_FLOXIF_EK040354.UVPM", "TR/Spy.6...
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "]", "com", "Malicious", "Twitter", "accounts", ":", "https", ":", "//twitter.com/lucky88755", "https", ":", "//twitter.com/lucky98745", "https", ":", "//twitter.com/lucky876543", "https", ":", "//twitter.com/luckyone1232", "https", ":", "//twitter.com/sadwqewqeqw", "https"...
[ 9, 9, 16, 4, 16, 16, 1, 9, 9, 1, 9, 9, 1, 9, 9, 1, 9, 9, 1, 9, 9, 1, 9, 9, 1, 9, 9, 1, 9, 9, 1, 9, 9, 1, 9, 9, 16, 4, 16, 16, 1, 9, 9, 16, 4, 16, 16, 1, 9, 9, 1, 9, 9, 1, 9, 9, 16, 16, 16, 16, 16,...
[ "Unit", "42", "discovered", "new", "activity", "that", "appears", "related", "to", "an", "adversary", "group", "previously", "called", "C0d0so0", "or", "Codoso" ]
[ 4, 12, 16, 16, 16, 16, 16, 16, 16, 16, 6, 14, 16, 16, 6, 16, 6 ]
[ "As", "a", "result", ",", "no", "new", "instances", "of", "this", "app", "can", "be", "installed", "on", "iOS", "devices", "and", "existing", "installations", "can", "no", "longer", "be", "run", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "We", "have", "observed", "download", "attempts", "from", "the", "following", "domains:" ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "In", "2022,", "they", "updated", "SysUpdate,", "one", "of", "their", "custom", "malware", "families,", "to", "include", "new", "features", "and", "add", "malware", "infection", "support", "for", "the", "Linux", "platform." ]
[ 16, 0, 16, 16, 3, 16, 16, 16, 3, 11, 11, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 5, 13 ]
[ "A", "backdoor", "also", "known", "as:", "HW32.Packed.3797", "JS.Nemucod.LK", "VBS/DropExe.A!Camelot", "Trojan.Script.MLW.eafugn", "VBS.Dropper.102", "TrojanDropper.VBS.aq", "TrojanDropper:VBS/Twexag.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1 ]
[ "East", "Asian", "government", "agencies", "came", "under", "siege", "when", "attackers", "targeted", "several", "servers", "within", "their", "networks." ]
[ 4, 12, 12, 12, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5 ]
[ "Similar", "to", "other", "malware", "seen", "in", "the", "past", ",", "Charger", "checks", "the", "local", "settings", "of", "the", "device", "and", "does", "not", "run", "its", "malicious", "logic", "if", "the", "device", "is", "located", "in", "Ukraine"...
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32/AutoRun.autv", "W32/Sohanad.G", "WORM_SOHANAD.DX", "Virus.Worm.AutoRun!IK", "Win32.HLLW.Autoruner.8327", "WORM_SOHANAD.DX", "W32/Sohanad.G", "Worm/AutoRun.mky", "Malware.Imaut", "Virus.Worm.AutoRun", "SHeur.CIAA", "Trj/CI.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.RansomKD.6014218", "Ransom.Chicrypt", "Ransom.Chimera", "Trojan/Kryptik.edes", "Trojan.RansomKD.D5BC50A", "Ransom_Chicrypt.R002C0DIL17", "W32/Ransom.IF", "Trojan-Ransom.Win32.Chimera.q", "Trojan.RansomKD.6014218", "Trojan.Win32.Encoder.esu...
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.ClickerAybn.Trojan", "Trojan-Spy.Win32.VB!O", "Trojan.Puzlice.A3", "Win32.Trojan-Clicker.VB.c", "Win32/TrojanClicker.VB.NUE", "Win.Trojan.7640471-1", "Worm.Win32.Autorun.gxay", "Trojan.Win32.VB2.cnioik", "Trojan.Win32.A.VB.55040", "W32.Virut....
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Some", "of", "them", "like", "takephoto", ",", "takevideo", ",", "recordaudio", ",", "getsentsms", "and", "uploadpictures", "are", "focused", "on", "espionage", "activities", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "pro-democracy", "reform", "took", "place", "in", "2011", "which", "has", "helped", "the", "government", "create", "an", "atmopshere", "conducive", "to", "investor", "interest." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.Turla.B5", "BKDR64_TURLA.NUS", "Trojan.Turla", "BKDR64_TURLA.NUS", "Win64.Rootkit.Uroburos.A", "Backdoor.Win64.Turla.c", "Trojan.Win64.Turla.dflvhj", "BackDoor.Turla.17", "Trojan.Turla.Win64.1", "BDS/Turla.fech", "Backdoor.Win64.Turla....
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "So", "far", "we", "have", "identified", "the", "following", "behaviors", ":", "Sending", "device", "information", "to", "a", "remote", "command", "and", "control", "(", "C2", ")", "server", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Figure", "6", "." ]
[ 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Japik.6", "TROJ_IKYTOK.SMI", "Win32.Trojan.WisdomEyes.16070401.9500.9979", "Trojan.Ransomlock", "TROJ_IKYTOK.SMI", "Trojan.Packed.2232", "Trojan.Kryptik.Win32.166130", "BehavesLike.Win32.VTFlooder.fc", "Trojan-Downloader.Win32.Karagany", "...
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Dynamer.S23079", "Win32.Trojan.Kryptik.bil", "Win.Malware.Zusy-5689799-0", "Trojan.Inject2.38898", "Trojan.Kryptik.Win32.992532", "BehavesLike.Win32.PWSZbot.cm", "Trojan.Win32.Extenbro", "Backdoor.Androm.mnb", "TR/Crypt.ZPACK.pwvcr", "Troj...
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "PDF/Phish.ECM", "Win32.Exploit.Pidief.Aexw", "PDF/Phish.ECM", "EXP/Pidief.EB.494", "Exp.Pidief.Eb!c", "Trojan.PDF.Phishing", "Win32/Trojan.Exploit.ec6" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1 ]
[ "We", "'ve", "seen", "that", "this", "has", "been", "the", "case", "for", "many", "years", "with", "spear-phishing", "campaigns", "on", "desktop", "and", "mobile", "platforms", ",", "so", ",", "unfortunately", ",", "it", "does", "n't", "seem", "that", "thi...
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "HenBox", "checks", "whether", "this", "execution", "is", "its", "first", "by", "using", "Android", "’", "s", "shared", "preferences", "feature", "to", "persist", "XML", "key-value", "pair", "data", "." ]
[ 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "MESSAGE", "–", "send", "SMS", "containing", "specified", "text", "to", "a", "specified", "number", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "HackTool.TSGrinder", "Trojan/Hacktool.TSGrinder.a", "W32/Tool.JPZP-4469", "Crackin.0AC64262", "HackTool.Win32.TSGrinder.a", "Trojan.Win32.TSGrinder.scgl", "HackTool.TSGrinder.192570", "Hacktool.W32.Tsgrinder!c", "ApplicUnsaf.Win32.HackTool.TSGrinde...
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Every", "once", "in", "a", "while", ",", "authors", "leave", "behind", "a", "trace", "that", "allows", "us", "to", "attribute", "not", "only", "similar", "apps", ",", "but", "also", "multiple", "different", "PHA", "families", "to", "the", "same", "group",...
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "TrojanDownloader.Lorozoad.A3", "Trojan.Razy.D2614", "Win32.Trojan.WisdomEyes.16070401.9500.9997", "Win.Trojan.Lorozoad-1", "Trojan.MSIL.Disfa.mcnf", "Trojan.Win32.Tiny.etgbky", "Trojan.Win32.Z.Razy.4608.CD", "Troj.Msil.Disfa!c", "TrojWare.MSIL.Troj...
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.DownloadPdzLnrA.Trojan", "Worm.Win32.WBNA!O", "W32/WBNA.asj", "Win32.Trojan.WisdomEyes.16070401.9500.9988", "Win.Trojan.Wbna-299", "Worm.WBNA.Win32.2209", "BehavesLike.Win32.VBObfus.qt", "W32/VB.PID!tr.dldr", "Worm/Win32.WBNA", "Worm.WBNA", ...
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32/Trojan.LNJS-3256", "Trojan.Win32.Mazel.dsuwke", "BehavesLike.Win32.Sytro.lc", "TR/AD.Lentrigy.ejnsf", "RiskWare[Downloader]/NSIS.Mazel", "Trojan.Jaiko.851", "TrojanDownloader:Win32/Rolkator.A", "Trj/CI.A", "Trojan.Win32.IRCBot", "Win32/Trojan...
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "We", "have", "not", "identified", "any", "other", "public", "names", "for", "this", "malware,", "so", "rather", "than", "introduce", "a", "new", "name", "to", "the", "industry", "we'll", "refer", "to", "this", "family", "as", "Sarvdap." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16, 16, 16, 16, 3, 16, 3 ]
[ "Notification", "handling", "method", "The", "class", "is", "only", "implemented", "in", "debug", "mode", ",", "pushing", "all", "captured", "information", "into", "the", "log", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "This", "information", "may", "be", "useful", "to", "any", "incident", "responder", "or", "blue", "team", "looking", "to", "defend", "an", "organisation." ]
[ 16, 16, 16, 16, 16, 16, 16, 4, 12, 16, 4, 12, 16, 16, 16, 16, 16 ]
[ "In", "addition", ",", "at", "this", "stage", "the", "app", "can", "process", "one", "of", "these", "commands", ":", "•", "Collect", "device", "info", "•", "Install", "app", "•", "Is", "online", "?", "•", "Change", "server", "domain", "Out", "of", "the...
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, ...
[ "String", "Resources", "Used", "to", "Store", "App", "Data", "Red", "Alert", "2.0", "stores", "its", "data", "in", "an", "atypical", "location", "(", "inside", "the", "Strings.xml", "file", "embedded", "in", "the", "app", ")", "to", "fetch", "its", "critic...
[ 16, 16, 16, 16, 16, 16, 16, 3, 11, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Infostealer.Banprox.B", "is", "a", "Trojan", "horse", "that", "may", "steal", "information", "from", "the", "compromised", "computer." ]
[ 1, 16, 16, 3, 11, 16, 16, 1, 9, 16, 16, 5, 13 ]
[ "The", "incident", "used", "a", "Microsoft", "Excel", "file", "containing", "malicious", "macros", "which", "wrote", "a", "malicious", "executable", "and", "associated", "files", "to", "the", "victim", "machine." ]
[ 16, 16, 16, 1, 9, 9, 9, 16, 3, 11, 16, 16, 16, 3, 11, 16, 1, 9, 16, 5, 13, 13 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Ransom.Locky.20", "Win32.Trojan.WisdomEyes.16070401.9500.9879", "Ransom_Falock.R002C0DAI18", "Trojan.Win32.Z.Ransom.1819072", "Ransom_Falock.R002C0DAI18", "BehavesLike.Win32.Trojan.th", "W32/Trojan.CXBD-0386", "Ransom:MSIL/Falock.A", "Trj/Gd...
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "In", "addition,", "unlike", "many", "cyber", "attacks,", "an", "actual", "physical", "person", "was", "present", "money", "mule", "to", "pick", "up", "the", "money", "from", "affected", "ATM", "machines." ]
[ 16, 16, 16, 16, 1, 9, 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 5, 13 ]
[ "EventBot", "C2", "URLs", "C2", "URLs", "and", "other", "settings", "in", "a", "nested", "class", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Trojan", "details", "Upon", "boot", ",", "the", "trojan", "will", "start", "by", "populating", "a", "shared", "preferences", "file", "with", "the", "configuration", "it", "has", "on", "its", "internal", "structures", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Spammer.Mail.Norin.A", "Trojan/W32.Spammer.606720", "Email-Flooder.W32.Norin.30!c", "TROJ_NORIN.30", "Hacktool.Spammer", "TROJ_NORIN.30", "Trojan.Spammer.Mail.Norin.A", "Email-Flooder.Win32.Norin.30", "Trojan.Spammer.Mail.Norin.A", "Trojan...
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "This", "attack", "might", "also", "originate", "from", "China." ]
[ 16, 1, 16, 16, 16, 16, 2 ]
[ "A", "backdoor", "also", "known", "as:", "W32.HfsAutoB.186B", "Worm.Dorkbot.A", "Backdoor.W32.Padodor.kZnr", "Trojan/Spy.qukart", "Win32.Trojan-Spy.Quart.a", "Backdoor.Berbew!g1", "Win32/Webber.W", "Win32.Qukart", "BKDR_BERBEW.SMA", "Win.Trojan.Crypted-36", "Trojan-Proxy.Win32.Qukart.v...
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "]", "download", "." ]
[ 9, 9, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.FamVT.ExpiroPC.PE", "Heur.Corrupt.PE", "Tool.BtcMine.30", "Backdoor.Win32.Cycbot" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1 ]
[ "Equipped", "reverse", "shell", "payload", "with", "specific", "string", "After", "an", "in-depth", "look", ",", "we", "found", "that", "some", "versions", "of", "the", "reverse", "shell", "payload", "code", "share", "similarities", "with", "PRISM", "–", "a", ...
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16 ]
[ "The", "server", "’", "s", "response", "is", "a", "json", ",", "containing", "a", "link", "to", "a", ".jar", "file", ",", "class", "name", "and", "method", "name", "to", "be", "executed", "with", "reflection", "API", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Using", "this", "SSH", "brute-forcing", "network,", "it", "took", "the", "attackers", "only", "a", "few", "days", "to", "gain", "root", "access", "and", "full", "control", "of", "the", "targeted", "server." ]
[ 16, 16, 1, 9, 9, 16, 16, 16, 6, 16, 16, 16, 16, 16, 1, 9, 9, 9, 9, 9, 16, 16, 5, 13 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/Cosmu.ajmd", "Trojan.Win32.Cosmu.cptjv", "Trojan.Win32.Cosmu.ajmd", "Win32.HLLW.Zebra.2", "TR/PSW.Facepass.oina", "Trojan/Cosmu.fqh", "PWS:Win32/Facepass.B", "Trojan.Win32.A.Cosmu.436714", "Trojan.Cosmu", "W32/Cosmu.AJMD!tr", "Trj/CI.A" ...
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "When", "we", "first", "discovered", "the", "OilRig", "attack", "campaign", "in", "May", "2016,", "we", "believed", "at", "the", "time", "it", "was", "a", "unique", "attack", "campaign", "likely", "operated", "by", "a", "known,", "existing", "threat", "group...
[ 16, 16, 16, 16, 6, 14, 14, 14, 16, 0, 8, 16, 16, 16, 16, 16, 16, 16, 16, 6, 14, 14, 16, 16, 16, 16, 16, 16, 6, 14 ]
[ "An", "attacker", "is", "paid", "by", "the", "network", "when", "one", "of", "these", "apps", "is", "installed", "successfully", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "To", "date", ",", "Unit", "42", "has", "seen", "four", "of", "the", "seven", "(", "the", "first", "three", "in", "the", "list", "below", ",", "along", "with", "cdncool", "[", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 9 ]
[ "Sundown", "is", "something", "of", "an", "outlier", "from", "typical", "exploit", "kits." ]
[ 3, 16, 16, 16, 16, 16, 16, 16, 3, 11 ]
[ "The", "failure", "of", "Silicon", "Valley", "Bank", "SVB", "is", "a", "good", "opportunity", "for", "scammers", "to", "make", "a", "buck", "out", "of", "the", "crisis,", "warns", "the", "SANS™", "Internet", "Storm", "Center", "ISS", "in", "Washington", "D...
[ 16, 16, 16, 4, 12, 12, 12, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 12, 12, 12, 12, 12, 16, 2, 10 ]
[ "We", "have", "examined", "all", "the", "detected", "versions", ",", "including", "the", "latest", "one", "that", "is", "signed", "by", "a", "certificate", "valid", "from", "September", "14", ",", "2017", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "For", "example,", "one", "version", "of", "the", "Shade", "cryptor", "checks", "victim", "computers", "for", "signs", "of", "accounting", "activity;", "if", "it", "finds", "any,", "it", "doesn't", "encrypt", "the", "files,", "but", "instead", "installs", "rem...
[ 16, 16, 3, 11, 16, 16, 3, 11, 16, 5, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 11, 16, 16, 5, 13 ]
[ "This", "post", "intends", "to", "share", "the", "results", "of", "our", "research." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan-Spy/W32.KeyLogger.464896.C", "TrojanSpy.KeyLogger!s9RPvqhksKk", "Infostealer.Gampass", "Win32.BDSBackdoor", "Trojan-Spy.Win32.KeyLogger.gds", "BackDoor.Cyber", "Virus.Win32.Delf.DTW!IK", "TrojanSpy.KeyLogger.cquv", "Win-Trojan/Keylogger.4648...
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "All", "that", "is", "needed", "is", "to", "get", "the", "original", "size", "of", "the", "DEX", "file", "and", "read", "everything", "that", "comes", "after", "this", "offset", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "appearance", "of", "such", "forms", "is", "generated", "on", "cybercriminals'", "command." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 6, 16 ]
[ "Recommendations", "Popular", "mobile", "platforms", "like", "Android", "are", "common", "targets", "for", "organized", "or", "commercialized", "monitoring", "operations", "." ]
[ 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "CVE-2017-11882", "Exploit", "8b212ee2d65c4da033c39aebaf59cc51ade45f32f4d91d1daa0bd367889f934d", "is", "a", "Microsoft", "Word", "RTF", "document", "that", "exploits", "`CVE-2017-11882`", "stack", "buffer", "overflow", "vulnerability", "in", "the", "Microsoft", "Equation", "E...
[ 1, 7, 1, 16, 16, 1, 9, 9, 9, 16, 7, 1, 7, 15, 15, 15, 16, 5, 13, 13, 13 ]
[ "This", "IOC", "contains", "indicators", "for", "the", "BLACKCOFFEE", "malware", "family", "that", "is", "attributed", "to", "APT17." ]
[ 16, 16, 16, 16, 16, 16, 3, 11, 16, 15, 16, 16, 16, 6 ]
[ "More", "apps", "could", "be", "added", "to", "the", "grabber", "target", "list", "in", "the", "future", ",", "such", "as", "the", "ones", "that", "were", "targeted", "in", "older", "versions", ":", "Facebook", "WhatsApp", "Skype", "Twitter", "Chrome", "In...
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 5, 5, 5, 5, 5, 5, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1...
[ "]", "102", "2020-03-29", "http", ":", "//ora.blindsidefantasy", "[", "." ]
[ 9, 9, 16, 1, 9, 9, 9, 9 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Neloweg", "TR/Drop.Elms.A", "PWS:Win32/Reder.B", "Trojan.Neloweg", "Trj/CI.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Win32.Inject.cvmjon", "Trojan.Taidoor", "TROJ_DROPPE.FS", "Trojan-Dropper.Win32.Injector.jmli", "Virus.Win32.Part.a", "TROJ_DROPPE.FS", "BehavesLike.Win32.Downloader.qm", "TrojanDropper.Injector.bmtq", "Trojan[Dropper]/Win32.Injector", "Wi...
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "So", "we", "don't", "have", "a", "sensational", "hop", "from", "Linux", "Mirai", "to", "Windows", "Mirai", "just", "yet,", "that's", "just", "a", "silly", "statement." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 5, 3, 16, 5, 3, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "Trojan", "for", "Linux", "written", "in", "Go", "programming", "language." ]
[ 16, 3, 11, 5, 16, 16, 5, 13, 13 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "W32/Dropper.ALCD", "Win32/Rimecud.CU", "TROJ_DROPPR.SMF", "Win32.Worm.Peerfrag.Aojj", "Win32.HLLW.Lime.18", "Worm.Palevo.Win32.18245", "TROJ_DROPPR.SMF", "BehavesLike.Win32.Madangel.cc", "W32/Risk.KNK...
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Figure", "10", "." ]
[ 16, 16, 16 ]
[ "(", "We", "named", "the", "spyware", "\"", "Exodus", "''", "after", "this", "Command", "&", "Control", "domain", "name", "." ]
[ 16, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "This", "variant,", "which", "we", "call", "MULTIGRAIN", "consists", "largely", "of", "a", "subset", "of", "slightly", "modified", "code", "from", "NewPosThings." ]
[ 16, 3, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3 ]
[ "Whether", "this", "is", "a", "permanent", "return", "to", "locky", "or", "a", "one", "off,", "I", "don't", "know", "at", "this", "stage,", "but", "Locky", "have", "vanished", "for", "while", "before", "returned." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "It", "may", "even", "allow", "them", "to", "sell", "ad", "space", "directly", "to", "application", "developers", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Win32.SamDump.emgukv", "Uds.Dangerousobject.Multi!c", "Tool.SamDump.Win32.1", "W32/Trojan.PXMQ-2326", "TR/Rogue.9140774", "PUP/Win32.SamDump.C241237", "Riskware.HackTool!GhRtS0e2yEc", "Win32/Trojan.f29" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Win32.Dwn.ewbodt", "Trojan.Win32.Z.Starter.4103380", "Trojan.DownLoader26.1573", "BehavesLike.Win32.Dropper.wc", "Trojan.Win32.Chifrax", "W32/Trojan.BMGR-3693", "Exploit:Win32/CplLnk.B", "Win32/Trojan.9b2" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Because", "of", "the", "recent", "outbreak", "of", "the", "Locky", "ransomware,", "Dridex", "has", "become", "synonymous", "with", "the", "distribution", "of", "ransomware", "more", "generally." ]
[ 16, 16, 16, 16, 16, 16, 16, 3, 11, 6, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16 ]
[ "]", "databit", "[", "." ]
[ 9, 9, 9, 9 ]
[ "PhotoMiner", "features", "a", "unique", "infection", "mechanism,", "reaching", "endpoints", "by", "infecting", "websites", "hosted", "on", "FTP", "servers", "while", "making", "money", "by", "mining", "Monero." ]
[ 3, 16, 16, 1, 9, 9, 9, 9, 9, 9, 9, 9, 16, 5, 13, 16, 16, 16, 16, 1, 9 ]