tokens
sequencelengths
2
296
ner_tags
sequencelengths
2
296
[ "Interestingly", ",", "there", "is", "an", "allowlist", "of", "tapped", "activities", ":", "ui.ConversationActivity", "ui.ConversationListActivity", "SemcInCallScreen", "Quadrapop", "SocialPhonebookActivity", "The", "listener", "can", "operate", "with", "only", "coordinates", ",", "so", "it", "calculates", "pressed", "characters", "by", "matching", "given", "values", "with", "hardcoded", "ones", ":", "Additionally", ",", "if", "there", "is", "a", "predefined", "command", ",", "the", "keylogger", "can", "make", "a", "screenshot", "of", "the", "tapped", "display", "area", ":", "Manual", "access", "and", "operator", "menu", "There", "is", "a", "hidden", "menu", "(", "Activity", ")", "for", "controlling", "implant", "features", "that", "looks", "like", "it", "was", "created", "for", "manual", "operator", "control", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.DeltreeY", "Trojan:BAT/DeltreeY.CA", "Trojan.BAT.DeltreeY" ]
[ 16, 3, 16, 16, 16, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Application.Miner.CB", "Application.Miner.CB", "Linux/RubyMiner.A", "BAT_COINMINE.WIPX", "Application.Miner.CB", "Troj.Downloader.Shell!c", "Application.Miner.CB", "Linux.DownLoader.684", "BAT_COINMINE.WIPX", "Trojan.RubyMiner", "Win32/Trojan.Downloader.72e" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "malware", "is", "a", "reflection", "of", "how", "PoS", "threats,", "though", "no", "longer", "novel,", "are", "increasingly", "used", "against", "businesses", "and", "their", "customers." ]
[ 16, 3, 16, 16, 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16, 16, 4 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Skeeyah.19132", "Win32.Trojan.WisdomEyes.16070401.9500.9934", "not-a-virus:HEUR:Monitor.Win32.BeyondKeyLogger.heur", "System.Monitor.Relytec.All-in-o", "TR/Spy.arobe", "not-a-virus:HEUR:Monitor.Win32.BeyondKeyLogger.heur", "Trojan:Win32/Dhodareet.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1 ]
[ "Actors", "related", "to", "the", "Operation", "Lotus", "Blossom", "campaign", "continue", "their", "attack", "campaigns", "in", "the", "Asia", "Pacific", "region." ]
[ 6, 16, 16, 6, 14, 6, 14, 14, 16, 16, 6, 14, 16, 2, 10, 10, 10 ]
[ "]", "205", "7ed754a802f0b6a1740a99683173db73", "com.psiphon3", "dexlib", "2.x", "188.165.49", "[", "." ]
[ 9, 9, 1, 1, 16, 16, 1, 9, 9 ]
[ "Based", "on", "the", "data", "we", "have", "acquired", "since", "October", "2016,", "about", "500", "organizations", "from", "50", "countries", "were", "affected", "by", "the", "attack." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 0, 8, 16, 16, 4, 16, 2, 10, 16, 16, 16, 16, 1 ]
[ "The", "AES", "key", "is", "generated", "using", "a", "SHA256", "hash", "and", "due", "to", "the", "keys", "being", "stored", "on", "the", "infected", "machine,", "victims", "in", "many", "cases", "could", "likely", "decrypt", "files", "without", "paying", "the", "ransom." ]
[ 16, 1, 9, 16, 16, 16, 16, 1, 9, 16, 16, 16, 16, 1, 16, 16, 16, 16, 5, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.Clod2e7.Trojan.3dab", "Backdoor/W32.Bifrose.737280.H", "Backdoor/Bifrose.chym", "BKDR_BIFROSE.DMQ", "W32/Trojan2.NEIM", "Backdoor.Trojan", "Win32/Tnega.UYbaRd", "BKDR_BIFROSE.DMQ", "Trojan.Win32.Bifrose.crakl", "Backdoor.W32.Bifrose.chym!c", "BackDoor.Bifrost.16023", "Backdoor.Bifrose.Win32.49130", "Backdoor.Bifrose", "W32/Trojan.TWKO-3939", "BDS/Bifrose.chym", "W32/Bifrose.CHYM!tr.bdr", "Trojan[Backdoor]/Win32.Bifrose", "Backdoor/Win32.Bifrose.R127707", "Backdoor.Bifrose", "Backdoor.Bifrose!bEtmoN1K0yI" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "affected", "educational", "organizations,", "for", "instance,", "are", "used", "to", "deliver", "employment", "exams", "for", "government", "employees." ]
[ 16, 16, 4, 12, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 12 ]
[ "A", "backdoor", "also", "known", "as:", "W32.DusbyetorLTS.Trojan", "Trojan/W32.Kriskynote.442892.B", "Backdoor.Kriskynote.A4", "Trojan/Rootkitdrv.w", "Trojan.Graftor.D35150", "Win32.Trojan.WisdomEyes.16070401.9500.9510", "W32/Trojan.HHCY-2846", "Backdoor.Korplug.B", "Win32/Rootkitdrv.W", "BKDR_WINNT.SMD", "Trojan.Win32.Kriskynote.ay", "Trojan.Win32.Kriskynote.dkkllk", "Trojan.Win32.Z.Kriskynote.442892", "BackDoor.Korplug.18", "Trojan.Kriskynote.Win32.1", "BKDR_WINNT.SMD", "Trojan.Win32.Kriskynote", "Trojan/Kriskynote.a", "Trojan/Win32.Kriskynote", "Trojan.Win32.Kriskynote.ay", "Trojan:Win64/Kriskynote.A!dha", "Win32/Tnega.aacQTM", "Trojan.Kriskynote", "Win32.Trojan.Kriskynote.Lkmz", "W32/Kriskynote.AY!tr", "Win32/Trojan.6da" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "It", "contained", "approximately", "8GB", "of", "stolen", "data", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/Crypt.qk", "Win32.Trojan.WisdomEyes.16070401.9500.9532", "TROJ_KRYPTIK.VTG", "Trojan.MSIL.Crypt.qk", "Trojan.Win32.Crypt.djsue", "BackDoor.Cybergate.1727", "Trojan.Crypt.Win32.2613", "TROJ_KRYPTIK.VTG", "Trojan.MSIL.Crypt", "Trojan/MSIL.bms", "TR/MSIL.Crypt.qk", "Trojan.MSIL.Krypt.2", "Trojan.MSIL.Crypt.qk", "TrojanDownloader:Win32/Radet.A", "Msil.Trojan.Crypt.Swvd", "Trojan.Crypt!QtVXUF+C8/k", "Win32/Trojan.b12" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.Vetor.PE", "W32.Virut.G", "Win32/Virut.17408", "PE_VIRUX.J", "Win.Trojan.Clicker-3135", "Virus.Win32.Virut.ce", "Virus.Win32.Virut.hpeg", "Virus.Win32.Virut.Ce", "Win32.Virut.56", "PE_VIRUX.J", "BehavesLike.Win32.Virut.mm", "Win32/Virut.bn", "Virus/Win32.Virut.ce", "Win32.Virut.ce.53248", "TrojanClicker:Win32/Sadbick.A", "W32.Virut.l4o5", "Virus.Win32.Virut.ce", "Win32/Virut.F", "Virus.Virut.06", "Win32/Virut.NBP", "Worm.Win32.VBNA", "W32/Sality.AO" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "HW32.Packed.9ED0", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Win32.HLLM.Reset.493", "BehavesLike.Win32.Ransomware.cc", "Backdoor.Poison", "Trojan.Midie.DA81B", "Backdoor/Win32.Poison.R217323", "Trojan.Nymaim" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Mandiant,", "working", "in", "partnership", "with", "SonicWall", "Product", "Security", "and", "Incident", "Response", "Team", "PSIRT,", "has", "identified", "a", "suspected", "Chinese", "campaign", "that", "involves", "maintaining", "long", "term", "persistence", "by", "running", "malware", "on", "an", "unpatched", "SonicWall", "Secure", "Mobile", "Access", "SMA", "appliance." ]
[ 4, 16, 16, 16, 16, 4, 12, 12, 16, 4, 12, 12, 12, 16, 16, 6, 14, 14, 14, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 4, 5, 13, 13, 13, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Antivirus2008.DN", "MemScan:Trojan.Peed.JRX", "Trojan.Win32.Pakes.czg" ]
[ 16, 3, 16, 16, 16, 1, 1, 1 ]
[ "This", "ransomware", "encrypts", "files", "and", "uses", ".braincrypt", "as", "file", "name", "extension", "for", "encrypted", "files." ]
[ 16, 3, 1, 9, 16, 1, 9, 9, 9, 9, 9, 9, 9, 9 ]
[ "The", "first", "example,", "a", "campaign", "observed", "on", "May", "17,", "2016,", "uses", "a", "fake", "Microsoft", "security", "alert", "social", "engineering", "lure", "to", "trick", "the", "victim", "into", "opening", "a", "link", "that", "leads", "to", "an", "executable", "download." ]
[ 16, 16, 16, 16, 6, 16, 16, 0, 8, 8, 16, 16, 1, 9, 9, 9, 9, 9, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11 ]
[ "This", "blog", "details", "CNACOM,", "a", "web-based", "campaign", "that", "appears", "to", "be", "related", "to", "a", "well-known", "nation-state", "actor", "more", "commonly", "associated", "with", "spear-phishing", "attacks." ]
[ 16, 16, 16, 6, 16, 6, 14, 16, 16, 16, 16, 16, 16, 16, 16, 6, 14, 16, 16, 16, 16, 1, 9 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Dyloader", "Win32.Trojan.WisdomEyes.16070401.9500.9997", "Trojan.Win32.Injector", "TR/Dropper.gjdjj", "Trojan.Graftor.D4C89C", "W32/Injector.DHHK!tr", "Trj/GdSda.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Win32.Demp.cxoswz", "TrojanDropper.Demp.aao", "Trojan[Dropper]/Win32.Injector" ]
[ 16, 3, 16, 16, 16, 1, 9, 9 ]
[ "The", "effects", "were", "broad", "reaching,", "with", "Ukraine", "Cyber", "police", "confirming", "over", "2000", "affected", "companies", "in", "Ukraine", "alone." ]
[ 16, 16, 16, 16, 16, 16, 4, 12, 12, 16, 16, 16, 16, 4, 16, 2, 16 ]
[ "A", "backdoor", "also", "known", "as:", "RDN/Gaobot.worm!f", "Backdoor.Agobot.Win32.5073", "Backdoor.W32.Agobot.svu!c", "Trojan.Heur.RP.EDFC38", "Win32.Trojan.WisdomEyes.16070401.9500.9986", "TROJ_ADAMOL.A", "Trojan.Win32.Agobot.dikwjo", "Win32.Backdoor.Agobot.Wlfl", "TROJ_ADAMOL.A", "BehavesLike.Win32.Downloader.gh", "Trojan.ATRAPS", "Backdoor/Agobot.bnd", "W32/AgoBot.SVU!tr.bdr", "Trojan[Backdoor]/Win32.Agobot", "Trojan:Win32/Adamol.A", "Trojan/Win32.Hupigon.C48593", "Trj/Chgt.L" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "On", "the", "heels", "of", "recent", "disclosures", "of", "ATM", "malware", "such", "as", "Suceful", "Plotus", "and", "Padpin", "aka", "Tyupkin,", "Proofpoint", "research", "has", "discovered", "yet", "another", "variant", "of", "ATM", "malware,", "which", "we", "have", "dubbed", "GreenDispenser." ]
[ 16, 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 3, 3, 16, 3, 16, 3, 4, 12, 16, 16, 16, 16, 3, 11, 11, 11, 16, 16, 16, 16, 3 ]
[ "WE", "GIVE", "100", "%", "GUARANTEE", "THAT", "ALL", "FILES", "WILL", "RESTORE", "AFTER", "WE", "RECEIVE", "PAYMENT", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Initial", "reports", "of", "the", "attacks,", "published", "April", "26", "in", "Hebrew", "by", "the", "Israel", "National", "Cyber", "Event", "Readiness", "Team", "CERT-IL", "and", "The", "Marker,", "confirm", "that", "the", "attack", "was", "delivered", "through", "compromised", "email", "accounts", "at", "Ben-Gurion", "University", "and", "sent", "to", "multiple", "targets", "across", "Israel." ]
[ 16, 16, 16, 16, 3, 16, 0, 8, 16, 16, 16, 4, 12, 12, 12, 12, 12, 12, 12, 16, 4, 12, 16, 16, 16, 16, 16, 16, 16, 1, 9, 9, 16, 4, 12, 16, 16, 16, 16, 16, 16, 2 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Small", "Trojan.Win32.Small", "Trojan.Win32.Small.cva", "Trojan.Win32.Crypted.dxzuxb", "Troj.W32.Small!c", "Trojan.PWS.Banker1.19315", "Trojan/Win32.Small", "Trojan.Win32.Small.cva", "Trojan.Win32.Small", "Trojan.Small", "Trj/CI.A", "Trojan.Win32.Clipbanker", "W32/ClipBanker.F!tr", "Win32/Trojan.65e" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "This", "is", "the", "summary", "of", "an", "analysis", "by", "an", "IT", "security", "researcher,", "which", "we", "publish", "in", "full." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 12, 12, 16, 16, 16, 16, 16 ]
[ "The", "malicious", "library", "is", "loaded", "from", "Eventbot", "’", "s", "assets", "that", "contain", "a", "font", "file", "called", "default.ttf", "which", "is", "actually", "the", "hidden", "library", "and", "then", "decoded", "using", "RC4", "." ]
[ 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Carbanak", "also", "known", "as", "Anunak", "are", "a", "group", "of", "financially", "motivated", "criminals", "first", "exposed", "in", "2015." ]
[ 6, 16, 16, 16, 6, 16, 16, 6, 16, 16, 16, 6, 16, 16, 16, 0 ]
[ "Some", "common", "techniques", "include", ":", "basic", "XOR", "encryption", ",", "nested", "XOR", "and", "custom", "key-derivation", "methods", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Previous", "version", "The", "capture", "service", "class", "implements", "the", "chat", "applications", "interception", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "For", "the", "64-bit", "stage", "2", "malware", ",", "the", "code", "execution", "is", "transferred", "from", "the", "loader", "using", "a", "well-known", "technique", "called", "Heaven", "’", "s", "Gate", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "It", "spread", "via", "a", "recompiled", "version", "of", "the", "otherwise", "legitimate", "open", "source", "BitTorrent", "client", "application", "Transmission", "and", "distributed", "on", "their", "official", "website." ]
[ 16, 1, 16, 16, 1, 9, 16, 16, 16, 16, 5, 13, 13, 13, 13, 16, 16, 16, 16, 16, 1, 9 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan-PWS/W32.QQPass.757760.Q", "Trojan.Win32.Badur!O", "Risktool.Flystudio.16885", "Trojan/AddUser.q", "TROJ_ADDUSER_EJ19018D.UVPM", "Win32/Tnega.CEGPWM", "TROJ_ADDUSER_EJ19018D.UVPM", "Trojan-Ransom.Win32.Snocry.yj", "Trojan.Win32.QQPass.cqivxp", "Backdoor.W32.Hupigon.lHRl", "Worm.Win32.Dropper.RA", "Trojan:W32/DelfInject.R", "Trojan.DownLoader10.35182", "Trojan.QQPass.Win32.21864", "Exploit.Win32.MS", "Trojan/PSW.QQPass.qla", "TR/Strictor.38430", "Trojan[PSW]/Win32.QQPass", "Trojan.Zusy.D2B925", "Trojan-Ransom.Win32.Snocry.yj", "Trojan:Win32/Casus.A", "Trojan/Win32.QQPass.C217887", "Trojan.Badur", "Win32/AddUser.Q", "Trojan.Win32.QQPass.i", "Trojan.PWS.QQPass!VhZvRiUJbao", "W32/QQPass.ELG!tr.pws", "Trojan.Win32.Extortioner.Q" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "TrojanDownloader.Unruy.C3", "Downloader-BPA.d", "Trojan.Cosmu.Win32.1584", "Trojan/Cosmu.fzo", "Win32.Trojan-Clicker.Cycler.a", "W32.Unruy.A", "Win32/Unruy.NaMNFGC", "HT_UNRUY_GF0601E8.UVPM", "Win.Trojan.Unruy-5876", "Trojan.Win32.Drop.bcagho", "Troj.Spy.W32.BZub.l2bS", "TrojWare.Win32.TrojanSpy.BZub.~IP", "Trojan.MulDrop1.276", "HT_UNRUY_GF0601E8.UVPM", "BehavesLike.Win32.Downloader.rt", "Trojan-Downloader.Win32.Unruy", "Trojan/Cosmu.bhh", "TR/Dldr.Unruy.C", "Worm/Win32.Unknown", "TrojanDownloader:Win32/Unruy.C", "Trojan.Unruy.1", "Trojan/Win32.Cosmu.R39186", "TrojanClicker.Cycler", "Trojan.CL.Cycler!gZ0c9KQr9Uk", "W32/ZAccess.Y!tr", "W32/OverDoom.B.worm", "Win32/Trojan.688" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "malware", "authors", "seem", "to", "be", "putting", "a", "lot", "of", "effort", "into", "improving", "this", "malware", ",", "bundling", "it", "with", "numerous", "new", "upgrades", "that", "make", "it", "more", "sophisticated", ",", "evasive", ",", "and", "well-equipped", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Also", "seen", "in", "other", "Exploits", "Kits:", "-", "Neutrino", "-", "Nuclear", "-", "Magnitude", "-", "RIG", "-", "Hanjuan" ]
[ 16, 16, 16, 16, 3, 11, 16, 3, 16, 3, 16, 3, 16, 3, 16, 3 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.PSW.Qwak.A", "Trojan-PWS/W32.Qwak.24576", "PSWTool.Win32.Pqwak!O", "Trojan.Pqwak", "Trojan.Qwak.Win32.2", "Trojan.PSW.Qwak.A", "W32/HackTool.AZN", "TROJ_PQWAK.A", "Trojan.PSW.Qwak.A", "not-a-virus:PSWTool.Win32.Pqwak.10", "Trojan.PSW.Qwak.A", "Riskware.Win32.Pqwak.hqlb", "Trojan.Win32.Z.Qwak.24576", "Trojan.PSW.Qwak.A", "TrojWare.Win32.PSW.Qwak.A", "Trojan.PWS.Qwak.10", "TROJ_PQWAK.A", "Trojan.Win32.PSW", "W32/Tool.QTCZ-8948", "TR/Pqwak.A", "Trojan[PSWTool]/Win32.Pqwak", "not-a-virus:PSWTool.Win32.Pqwak.10", "Win-Trojan/Qwak.24576", "Trojan.PSW.Qwak.A", "TrojanPSW.Qwak", "Trj/CI.A", "Win32/PSW.Qwak.A", "Win32.Trojan.Pqwak.Eeha", "Trojan.PSW.Qwak!llR4IBPnUH0", "Win32/Trojan.006" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "For", "example", ",", "we", "found", "several", "suspicious", "strings", "written", "in", "the", "Chinese", "language", "in", "a", "function", "called", "isNetworkAvailable", ",", "previously", "discussed", "in", "this", "blog", ":", "An", "almost", "identical", "function", "is", "mentioned", "in", "an", "earlier", "research", ",", "that", "ties", "FakeSpy", "and", "other", "malware", "to", "the", "Roaming", "Mantis", "group", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 4, 12, 16, 16 ]
[ "mobile_treats_2013_05s", "Infections", "caused", "by", "mobile", "banking", "programs", "Today", ",", "the", "majority", "of", "banking", "Trojan", "attacks", "affect", "users", "in", "Russia", "and", "the", "CIS", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "According", "to", "our", "estimates", ",", "about", "60", "%", "of", "mobile", "malware", "are", "elements", "of", "both", "large", "and", "small", "mobile", "botnets", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Stretching", "back", "to", "April", "2016,", "she", "d", "befriended", "a", "lot", "of", "individuals,", "as", "many", "as", "500,", "with", "similar", "interests." ]
[ 16, 16, 16, 0, 8, 16, 16, 16, 16, 16, 16, 4, 16, 16, 16, 16, 16, 16, 16 ]
[ "Based", "on", "received", "commands,", "it", "can", "either", "download", "malicious", "apps", "or", "switch", "the", "C", "C", "Twitter", "account", "to", "another", "one." ]
[ 16, 16, 1, 9, 16, 16, 16, 16, 3, 11, 16, 16, 16, 1, 9, 9, 9, 9, 9, 9 ]
[ "The", "target", "list", "and", "bank", "specific", "fake", "login", "pages", "can", "be", "dynamically", "updated", "via", "their", "C2", "panel", "(", "dashboard", "back-end", ")", "which", "significantly", "increases", "the", "adaptability", "and", "scalability", "of", "this", "attack", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "TrojanDropper.Goominer", "Win32.Trojan.WisdomEyes.16070401.9500.9958", "Trojan.Win32.Kazy.dbtlfz", "Trojan.Win32.Z.Kazy.939008.A", "Trojan.Kazy.D607AA", "TrojanDropper:Win32/Goominer.A", "Trj/GdSda.A", "Win32.Trojan.Kazy.Pciu", "Trojan.Win32.Comitsproc", "Win32/Trojan.013" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "We", "dubbed", "this", "activity", "Operation", "Wilted", "Tulip" ]
[ 16, 16, 16, 16, 6, 14, 14 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Win32.Swisyn!O", "Trojan.Starpage.A.mue", "Trojan/Swisyn.bhyk", "Win32.Trojan.Delf.it", "Trojan.Win32.Fsysna.djck", "Trojan.Win32.A.Swisyn.97827[UPX]", "Worm.Win32.Pronny.BL", "Trojan.PWS.Qqpass.6162", "Trojan.Swisyn.Win32.21499", "Trojan.Crypt", "Trojan/Win32.Swisyn", "HEUR/Fakon.mwf", "Worm.AutoRun", "Trojan.Win32.FakeFolder.pb", "Trojan.Swisyn!4rRLtK78L7s" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Some", "samples", "talk", "to", "compromised", "South", "Korean", "server", "at", "203.250.148.63", "and", "communicate", "in", "port", "30000." ]
[ 16, 16, 16, 16, 7, 2, 10, 5, 3, 1, 16, 1, 16, 1, 9 ]
[ "Port", "6207", ":", "Viber", "extraction", "service", "." ]
[ 1, 9, 16, 5, 16, 16, 16 ]
[ "The", "new", "GozNym", "hybrid", "takes", "the", "best", "of", "both", "the", "Nymaim", "and", "Gozi", "ISFB", "malware", "to", "create", "a", "powerful", "Trojan." ]
[ 16, 16, 3, 11, 16, 16, 4, 16, 16, 16, 3, 16, 3, 11, 11, 16, 16, 16, 3, 11 ]
[ "The", "people", "behind", "the", "attacks", "are", "likely", "attempting", "to", "gain", "access", "to", "computers", "where", "banking", "transactions", "are", "performed,", "in", "order", "to", "steal", "banking", "credentials." ]
[ 16, 16, 16, 16, 1, 16, 16, 16, 16, 1, 9, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 9 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9982", "Trojan.Win64", "Trojan[Backdoor]/Win32.Simda", "Trojan:Win64/Claretore.B", "W64/Simda.BD!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1 ]
[ "One", "of", "them", "was", "of", "particular", "interest", "because", "we'd", "never", "seen", "the", "backdoor", "before", "and", "it", "leveraged", "a", "relatively", "unique", "German", "dynamic", "DNS", "provider", "for", "command", "and", "control." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 1, 9, 9, 9, 9, 9, 9, 9 ]
[ "Finally", ",", "the", "app", "can", "remove", "itself", "through", "three", "ways", ":", "Via", "a", "command", "from", "the", "server", "Autoremove", "if", "the", "device", "has", "not", "been", "able", "to", "check", "in", "to", "the", "server", "after", "60", "days", "Via", "an", "antidote", "file", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Application.Htool.WKE", "Application.Htool.WKE", "W32/Risk.IUUB-2604", "HKTL_DUMPSEC.TOMA", "Application.Htool.WKE", "Application.Htool.WKE", "Trojan.MulDrop3.34925", "HKTL_DUMPSEC.TOMA", "W32/MalwareS.ITI", "Packed.Multi.rq", "HackTool:Win32/Dumpsec.A", "Application.Htool.WKE" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Marcher", "inspects", "its", "infected", "devices", "carefully", "by", "using", "a", "dedicated,", "hard-coded", "configuration", "in", "each", "Android", "Package", "Kit", "APK,", "Google's", "file", "format", "for", "distributing", "and", "installing", "application", "software", "like", "mobile", "banking", "apps", "on", "the", "Android", "OS." ]
[ 3, 16, 16, 16, 13, 16, 16, 16, 16, 16, 1, 9, 16, 16, 5, 13, 13, 13, 13, 13, 13, 11, 16, 16, 16, 5, 13, 16, 5, 13, 13, 16, 5, 13, 13 ]
[ "A", "backdoor", "also", "known", "as:", "W32/Downldr2.IYLF", "Trojan.Starter.1949", "Riskware/Win32.Krap.ii", "Win32.Hack.Undef.kcloud", "TrojanDropper:Win32/Kidtok.A", "W32/Downloader.LQFG-1421", "Virus.Win32.Heur.g", "BScope.Trojan-Spy.Zbot", "PE:Malware.FakeDOC@CV!1.9C3B", "Trojan-Dropper.Win32.Kidtok" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Therefore", "we", "instead", "discuss", "a", "number", "of", "ways", "to", "detect", "and", "analyse", "these", "documents", "using", "freely", "available", "tools." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "PDFs", "with", "download", "links" ]
[ 1, 9, 9, 9 ]
[ "A", "backdoor", "also", "known", "as:", "PSWTool.Win32.NetPass!O", "HackTool.Dialupas", "Tool.NetPass.Win32.1002", "Win32.Trojan.WisdomEyes.16070401.9500.9825", "W32/Risk.DWIG-1726", "Trojan-Spy.IEPV", "not-a-virus:PSWTool.Win32.NetPass.atx", "Trojan.Win32.Ool.cjzhzi", "Tool.PassView.277", "BehavesLike.Win32.Downloader.gc", "W32/MalwareS.AKEN", "APPL/PSWTool.Pass.A", "Application.Heur.BmNfbCuqfGoO", "not-a-virus:PSWTool.Win32.NetPass.atx", "Trojan/Win32.Klone.C127582", "PUP.Optional.Dialupass", "Trojan.PSWTool!vbtNAUr+Slw" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "email,", "first", "of", "them", "submitted", "from", "Middle", "East,", "purports", "to", "be", "coming", "from", "a", "Turkish", "trading", "company,", "which", "might", "further", "indicate", "the", "geographic", "area", "where", "the", "attacks", "were", "active." ]
[ 16, 1, 16, 16, 16, 16, 16, 2, 10, 16, 16, 16, 16, 16, 4, 12, 12, 12, 16, 16, 16, 16, 2, 10, 10, 16, 16, 1, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.Cleanmg.Trojan", "Trojan-Spy.Win32.TianYan!O", "BackDoor-YA.dr", "Trojan/Spy.TianYan.b", "TSPY_TIANYAN.SMD", "Win32.Backdoor.Prisos.b", "W32.Killaut.A", "Win32/TianYan.A", "TSPY_TIANYAN.SMD", "Win.Spyware.35814-2", "Trojan.Win32.TianYan.xbqa", "Trojan.Win32.TianYan.40960", "Troj.Spy.W32.TianYan.m9ks", "TrojWare.Win32.TrojanSpy.TianYan.~A", "Win32.HLLP.Nemesis.28687", "BackDoor-YA.dr", "TrojanSpy.TianYan.a", "Trojan[Spy]/Win32.TianYan", "Win32.Troj.TianYan.b.kcloud", "Trojan.Symmi.D7121", "Backdoor:Win32/Prisos.A", "Worm/Win32.Mabezat.R26794", "TrojanSpy.TianYan", "Win32/Prisos.A", "Trojan-Spy.Win32.TianYan.b", "Win32/Trojan.Dropper.e23" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Our", "documentation", "points", "to", "a", "campaign", "that", "started", "somewhere", "in", "late", "February", "2015", "and", "ended", "in", "mid-March." ]
[ 16, 16, 16, 16, 16, 6, 16, 16, 16, 16, 16, 0, 8, 16, 16, 16, 0 ]
[ "Government", "agencies", "and", "enterprises", "should", "look", "at", "this", "threat", "as", "an", "example", "of", "the", "kind", "of", "spying", "that", "is", "now", "possible", "given", "how", "ubiquitous", "mobile", "devices", "are", "in", "the", "workplace", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.LRQwegierExe.Trojan", "Trojan/W32.Small.14848.CH", "Trojan.Daws.17020", "Trojan.Kazy.D192B", "Win32.Trojan.Dalixi.f", "Trojan-Dropper.Win32.Daws.dyru", "Troj.W32.KillAV.lCzy", "BehavesLike.Win32.VTFlooder.lh", "Trojan:Win32/Ghodow.A", "Trojan-Dropper.Win32.Daws.dyru", "Win32/Dalixi.A", "Trojan.Dalixi!sYT5S6B5t8c", "W32/Dloader.IQS!tr.dldr", "Win32/Trojan.b7f" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "As", "soon", "as", "the", "victim", "tries", "to", "log", "in", ",", "it", "stores", "the", "victim", "'s", "credentials", "in", "/storage/0/DCIM/.fdat", "Facebook", "Login", "Figure", "7", ":", "Fake", "Facebook", "login", "The", "second", "command", "is", "IODBSSUEEZ", ",", "which", "further", "sends", "stolen", "credentials", "to", "the", "C", "&", "C", "server", ",", "as", "seen", "in", "Figure", "8", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "new", "ransomware", "called", "CryptoLuck", "has", "been", "discovered", "by", "Proofpoint", "security", "researcher", "and", "exploit", "kit", "expert", "Kafeine", "that", "is", "being", "distributed", "via", "the", "RIG-E", "exploit", "kit." ]
[ 16, 16, 3, 16, 3, 16, 16, 16, 16, 4, 12, 12, 16, 3, 11, 3, 11, 15, 16, 16, 16, 16, 16, 3, 11, 11 ]
[ "Error", "Registration", "Ok", "Empty", "SendSMS", "RequestGoogleCC", "Wipe", "OpenBrowser", "SendUSSD", "RequestSMSList", "RequestAppList", "RequestLocation", "ShowNotification", "SetLockPassword", "LockNow", "MuteSound", "LoadScript", "LoadPlugin", "ServerChange", "StartApp", "CallPhone", "SetPingTimer", "SMSBroadcast", "RequestContacts", "AddInject", "RemoveInject", "Evaluate", "Another", "feature", "of", "this", "trojan", "is", "the", "ability", "to", "register", "injects", ",", "which", "are", "JavaScript", "snippets", "of", "code", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Ransomware", "in", "its", "various", "forms", "continues", "to", "make", "headlines", "as", "much", "for", "high-profile", "network", "disruptions", "as", "for", "the", "ubiquity", "of", "attacks", "among", "consumers." ]
[ 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 12, 16, 16, 16, 16, 16, 16, 1, 16, 4 ]
[ "Generic", "detections", ",", "advanced", "behavioral", "analytics", ",", "and", "machine", "learning", "technologies", "in", "Windows", "Defender", "Advanced", "Threat", "Protection", "detect", "FinFisher", "’", "s", "malicious", "behavior", "throughout", "the", "attack", "kill", "chain", "and", "alert", "SecOps", "personnel", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 13, 13, 13, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Win32.Staget!O", "Trojan.Vb.AB2", "Trojan.Injector", "Trojan/Staget.fk", "Trojan.Zusy.D381B", "TROJ_CHEKAF.SMIA", "Win32.Trojan.U-Staget.a", "TROJ_CHEKAF.SMIA", "Win.Trojan.Staget-28", "Trojan.Win32.SelfDel.cdyc", "Trojan.Win32.Staget.btpvn", "Trojan.Win32.A.Staget.98334", "Troj.W32.SelfDel.tnPD", "Trojan.MulDrop1.56405", "Trojan.Staget.Win32.367", "BehavesLike.Win32.Swisyn.nm", "Trojan/Staget.hg", "Trojan/Win32.Staget", "Win32.Troj.Staget.fk.kcloud", "Trojan.Win32.SelfDel.cdyc", "Trojan/Win32.Staget.R21060", "Trojan.VBRA.09701", "Trojan.Staget!A6l5b/HpLEg", "Trojan.Win32.Staget", "W32/Staget.EG!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/CoinMiner.td", "not-a-virus:RiskTool.Win32.BitCoinMiner.wzo", "Riskware.Win32.BitCoinMiner.dktqwy", "Tool.BtcMine.479", "Trojan.CoinMiner.Win32.1509", "Trojan.Win32.CoinMiner", "RiskWare[RiskTool]/Win32.BitCoinMiner", "Trojan:Win32/Dimnir.A", "Application.Heur2.EE0329", "not-a-virus:RiskTool.Win32.BitCoinMiner.wzo", "W32/CoinMiner.TD!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.Hotdog.A", "Backdoor.Hotdog.A", "Trojan.Win32.Hotdog.chmwe", "W32/Hotdog.B", "Spyware.Hotra", "TROJ_HOTDOG.A", "Backdoor.Win32.Hotdog", "Backdoor.Hotdog.A", "Backdoor.Hotdog!YGk3IGmjo+U", "Backdoor.Win32.Hotdog.B", "Backdoor.Hotdog.A", "Trojan.Hotdog.49152", "TROJ_HOTDOG.A", "Win32.Hack.Hotdog.8F.kcloud", "Backdoor:Win32/Hotdog.A", "Trojan.Win32.Hotra.49152", "Backdoor.Hotdog.A", "W32/Hotdog.OZIJ-0895", "Win-Trojan/Hotra.57344", "Spyware.Hotra", "Win32/Hotdog.B", "Backdoor.Win32.Hotdog", "W32/Hotdog.A!tr.bdr", "BackDoor.Hotdog.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "malware", "used", "by", "the", "HiddenCobra", "threat", "group" ]
[ 3, 16, 16, 6, 14, 14, 14 ]
[ "A", "backdoor", "also", "known", "as:", "TrojanPWS.Dexter.A4", "Trojan.Poxters.Win32.176", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "BKDR_DEXTR.SMM", "HEUR:Trojan.Win32.Invader", "Trojan.Win32.Invader.elqaga", "Trojan.FakeAV.19781", "BKDR_DEXTR.SMM", "BehavesLike.Win32.VTFlooder.nh", "Trojan.Invader.aqk", "Trojan/Win32.Invader", "HEUR:Trojan.Win32.Invader", "Trojan.Invader!", "Trojan.Win32.Poxters", "W32/Poxters.E!tr", "Trj/GdSda.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Dynamer.FC.316", "Win32.Trojan.WisdomEyes.16070401.9500.9957", "MSIL.Backdoor.Orcus.A", "Troj.Spy.Msil!c", "Trojan.DownLoader25.14345", "BehavesLike.Win32.Backdoor.dc", "TrojanSpy.MSIL.sam", "TR/Dropper.MSIL.yknpx", "PWS:MSIL/Orcus.A!bit", "Win-Trojan/OrcusRAT.Exp", "Trj/CI.A", "Win32/Trojan.Spy.c29" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "year", "later,", "a", "more", "dangerous", "version", "was", "released." ]
[ 0, 8, 8, 16, 16, 16, 16, 16, 16 ]
[ "“", "jackhex", "”", "is", "not", "a", "common", "word", "or", "phrase", "and", ",", "as", "noted", "above", ",", "was", "also", "seen", "in", "the", "beacon", "activity", "with", "the", "previously", "discussed", "9002", "sample", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16 ]
[ "This", "attack", "vector", "is", "increasingly", "popular", "with", "malicious", "actors", "as", "almost", "everyone", "on", "the", "planet", "carries", "at", "least", "one", "mobile", "device", "they", "interact", "with", "throughout", "any", "given", "day", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "malware", "spreads", "very", "fast", "using", "Telegram", "messenger", "application", "in", "smartphones,", "targeting", "high-profile", "Libyan", "influential", "and", "political", "figures." ]
[ 16, 3, 16, 16, 16, 16, 5, 13, 13, 16, 5, 16, 4, 12, 12, 16, 4, 12 ]
[ "Method", "doInBackground", ":", "to", "send", "information", "to", "remote", "C2", "server", "As", "seen", "from", "the", "major", "code", "body", "of", "method", "doInBackground", "shown", "in", "Figure", "3", "(", "some", "of", "the", "original", "classes", "and", "methods", "are", "renamed", "for", "easier", "understanding", ")", ",", "there", "are", "three", "calls", "to", "HttpPost", "with", "different", "contents", "as", "parameters", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Much", "of", "the", "contents", "of", "that", "report", "are", "reproduced", "here." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "This", "actor", "has", "shown", "a", "surprising", "level", "of", "amateur", "actions", ",", "including", "code", "overlaps", ",", "open-source", "project", "copy/paste", ",", "classes", "never", "being", "instanced", ",", "unstable", "packages", "and", "unsecured", "panels", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Thanks", "to", "a", "relative", "lack", "of", "security", "controls", "applied", "to", "mobile", "devices", ",", "these", "devices", "have", "become", "very", "attractive", "targets", "for", "a", "broad", "range", "of", "malicious", "actors", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Stration", "PUA.Packed.MEW-1", "IM-Worm.Win32.Sumom.C" ]
[ 16, 3, 16, 16, 16, 1, 1, 1 ]
[ "In", "a", "seven-hour", "window,", "Raytheon", "|", "Websense", "stopped", "over", "16,000", "malicious", "email", "messages", "from", "being", "delivered", "to", "customers,", "all", "of", "which", "appear", "to", "have", "been", "Japanese", "targets." ]
[ 16, 16, 16, 16, 4, 16, 12, 16, 16, 8, 1, 9, 9, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 2, 10 ]
[ "The", "exploit", "code", "attached", "used", "for", "dropping", "the", "malware", "is", "older", "–", "CVE-2012-0158", "–", "and", "from", "our", "vantage", "point,", "we", "have", "no", "indication", "of", "successful", "or", "failed", "exploitation." ]
[ 3, 11, 11, 16, 16, 16, 16, 16, 3, 16, 16, 16, 9, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 7 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/W32.OptixKill.31744", "Trojan/OptixKill.10", "TROJ_OPTIXKILL.F", "Win32.Trojan.WisdomEyes.16070401.9500.9985", "W32/Trojan.HEHF-6024", "TROJ_OPTIXKILL.F", "Win.Trojan.Killer-4", "Trojan.Win32.OptixKill.10", "Trojan.Win32.OptixKill.dkur", "Trojan.Win32.A.OptixKill.31744", "TrojWare.Win32.OptixKill.10", "Trojan.OptixKiller", "Trojan.OptixKill.Win32.20", "Trojan/Win32.OptixKill.10", "W32.Trojan.Backdoor-Ealim", "TR/OptixKill.10", "Trojan/Win32.OptixKill", "Trojan:Win32/Optixkiller.A", "Troj.W32.OptixKill.10!c", "Trojan.Win32.OptixKill.10", "Trojan/Win32.HDC.C1938", "Trojan.OptixKill", "Trj/OptixKill.10", "Win32/OptixKill.10", "Win32.Trojan.Optixkill.Wsat", "Trojan.OptixKill!RjZYoc6lQeg", "Trojan-PWS.Win32.Lmir.wj", "W32/OptixKill.10!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "While", "threat", "actors", "using", "the", "PlugX", "Trojan", "typically", "leverage", "legitimate", "executables", "to", "load", "their", "malicious", "DLLs", "through", "a", "technique", "called", "DLL", "side-loading,", "Unit", "42", "has", "observed", "a", "new", "executable", "in", "use", "for", "this", "purpose." ]
[ 16, 6, 14, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 4, 12, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "BehavesLike.Win32.Conficker.lh", "Trojan.Win32.Spy", "Win32.Troj.Undef.kcloud", "Trojan.Kazy.D2002F" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1 ]
[ "Although", "Banker", "has", "been", "in", "the", "wild", "for", "years,", "this", "time", "we", "see", "it", "using", "a", "Dynamic", "Loading", "Library", "DLL", "with", "malicious", "exported", "functions." ]
[ 16, 6, 16, 16, 16, 16, 16, 16, 0, 16, 16, 16, 16, 16, 16, 16, 1, 9, 9, 16, 16, 3, 11, 11 ]
[ "It", "was", "first", "reported", "in", "2013", "under", "the", "version", "number", "2.0-LNK", "where", "it", "used", "the", "tag", "BaneChant", "in", "its", "command-and-control", "C2", "network", "request." ]
[ 16, 16, 16, 16, 16, 0, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 3, 16, 16, 1, 9, 9, 9 ]
[ "Due", "to", "its", "ability", "to", "intercept", "SMS", "communications,", "the", "malware", "is", "also", "able", "to", "bypass", "SMS-based", "two-factor", "authentication." ]
[ 16, 16, 16, 1, 9, 9, 9, 9, 16, 3, 16, 16, 16, 16, 1, 9, 9, 9 ]
[ "In", "2019,", "X-Force", "IRIS", "incident", "responders", "observed", "ITG03", "conducting", "a", "campaign", "against", "a", "financial", "institution", "in", "Southeast", "Asia", "targeting", "the", "institution's", "SWIFT", "environment." ]
[ 16, 0, 4, 12, 16, 16, 16, 6, 16, 16, 6, 16, 4, 12, 12, 16, 2, 10, 16, 4, 12, 12, 12 ]
[ "The", "targets", "and", "capabilities", "of", "HenBox", ",", "in", "addition", "to", "the", "ties", "to", "previous", "activity", "using", "four", "different", "Windows", "malware", "families", "with", "political-themed", "lures", "against", "several", "different", "South", "East", "Asian", "countries", ",", "indicates", "this", "activity", "likely", "represents", "an", "at", "least", "three-year-old", "espionage", "campaign", "." ]
[ 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Zenshirsh.SL7", "W32/Small.WMNN-1529", "TSPY_ONLING.SMIF", "Trojan.Win32.OnLineGames.vmk", "Trojan.DownLoader4.46724", "TSPY_ONLING.SMIF", "W32/Small.IH", "TR/Fakealert.39719", "TrojanDownloader:Win32/Rarcon.B", "Trojan.Graftor.D46F5", "Trojan-Downloader.Win32.Small", "Win32/Trojan.add" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Android.SmForw.AE", "Android.Trojan.SMSSend.IA", "AndroidOS/Trojan.DPEF-9", "Android.Trojan.SMSSend.IA", "A.H.Int.SmsThief.DBA", "Trojan.Android.SmsForward.duiqpk", "Android.SmsSpy.672.origin", "Trojan[SMS]/Android.SmForw.aa", "Android.Trojan.SMSSend.IA", "Android-Trojan/SmsSend.915f", "Trojan.AndroidOS.Lockerpin" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]