tokens
sequencelengths
2
296
ner_tags
sequencelengths
2
296
[ "A", "backdoor", "also", "known", "as:", "Android.Leech.I", "HEUR:Trojan-Dropper.AndroidOS.Leech.c", "Android.Packed.5", "ZIP/Trojan.PXTI-7", "SPR/ANDR.Jiagu.zhye", "Troj.Dropper.Androidos!c", "HEUR:Trojan-Dropper.AndroidOS.Leech.c", "PUA.AndroidOS.MoneyReward" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "When", "reversing", "malware", "samples,", "one", "of", "the", "things", "that", "we", "as", "analysts", "look", "for", "are", "places", "where", "the", "attackers", "slip", "up." ]
[ 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/Packed.EZip.a", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "TROJ_BIFROS.SMI", "Win.Trojan.Mybot-4352", "Trojan.Win32.139069.ebchy", "Backdoor.Win32.Rbot.~d5", "TROJ_BIFROS.SMI", "Trojan/Win32.Unknown", "Trojan.ManBat.1", "Troj.W32.Refroso.lnM8", "TrojanDropper:Win32/Bifrose.F", "Trojan.Win32.Rbot" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Qhosts", "Virus.W32.Specx.B!c", "Heur.Corrupt.PE", "Trojan[Backdoor]/Win32.IRCBot", "Worm:Win32/Specx.C.dam#2", "Trj/CI.A", "Worm.Win32.Specx", "Win32/Trojan.bba" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "After", "analysis,", "it", "was", "confirmed", "that", "the", "sample", "belonged", "to", "the", "discovered", "botnet", "family", "Kaiji." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 11 ]
[ "The", "many", "changes", "we", "see", "in", "the", "way", "the", "attacks", "are", "performed", "show", "that", "attackers", "are", "heavily", "experimenting", "to", "find", "the", "best", "way", "of", "infecting", "a", "mobile", "device", "and", "abusing", "existing", "functionality", "to", "perform", "successful", "phishing", "attacks", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "After", "receiving", "the", "rights", ",", "it", "sets", "itself", "as", "the", "default", "SMS", "app", "and", "disappears", "from", "the", "device", "screen", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Botnets", "can", "make", "considerably", "more", "money", "than", "autonomous", "Trojans", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "]", "orgmediauploader", "[", "." ]
[ 16, 16, 16, 16 ]
[ "The", "spam", "e-mails", "are", "enticing", "users", "by", "impersonating", "well", "known", "companies,", "using", "their", "logos", "and", "known", "subject", "lines", "to", "further", "sell", "the", "deception." ]
[ 16, 1, 9, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Admin", "panel", "The", "administration", "panel", "shows", "the", "application", "configuration", ",", "which", "matches", "the", "commands", "from", "the", "C2", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "Blogspot", "page", "contained", "a", "javascript", "window", "location", "that", "redirected", "the", "visitor", "to", "a", "second", "URL", "hosted", "on", "a", "dedicated", "server." ]
[ 16, 16, 16, 16, 16, 1, 9, 9, 16, 16, 16, 4, 16, 1, 9, 9, 9, 16, 5, 13, 13 ]
[ "In", "this", "campaign,", "it", "mainly", "tries", "to", "steal", "Firefox", "and", "other", "credentials." ]
[ 16, 16, 6, 16, 16, 16, 16, 1, 5, 16, 1, 9 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9900", "Win.Spyware.Banker-4198", "not-a-virus:HEUR:RiskTool.Win32.BitCoinMiner.heur", "Trojan.Winlock.5377", "BehavesLike.Win32.Kespo.cc", "Troj.W32.Delf.l4mb", "not-a-virus:HEUR:RiskTool.Win32.BitCoinMiner.heur", "Trojan:Win32/Comine.A", "Trojan-Downloader.Win32.Banload" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Kryptik.Win32.1331272", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Trojan.Win32.Kryptik.ewfvwr", "Trojan.DownLoader24.52368", "BehavesLike.Win32.Trojan.jz", "Trj/GdSda.A", "Trojan.MSIL.Crypt" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Razy.DAD41", "Win32.Trojan.WisdomEyes.16070401.9500.9993", "PUA.Downloader", "Trojan.Win32.AVKill.dciepf", "Trojan.AVKill.30546", "TR/Kryptik.clfug", "Trojan:MSIL/Krolol.A", "Win32/Trojan.b49" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.Cloda53.Trojan.5b54", "W32/Delf.g", "W32/SillyWorm.CE", "W32.Miliam@mm", "Win.Worm.Minima-1", "Email-Worm.Win32.Delf.g", "Trojan.Win32.Delf.gmcr", "W32.W.Delf.g!c", "Worm.Win32.Delf.g", "Worm.Delf.Win32.349", "BehavesLike.Win32.Downloader.lc", "W32/Worm.NVHR-2426", "I-Worm/Delf.ls", "WORM/Atak.L", "W32/Delf.G@mm", "Worm[Email]/Win32.Delf", "Worm/Win32.Xema.N403133190", "Worm:Win32/Miliam.A@mm", "Worm.Delf", "Win32.Worm-email.Delf.Ebqb", "Email-Worm.Win32.Delf", "I-Worm/Delf.X" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "MainService", "is", "the", "brain", "of", "this", "spyware", "and", "controls", "almost", "everything—from", "stealing", "the", "victim", "'s", "data", "to", "deleting", "it", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Softwarebundler.Wizrem.FC.2316", "Win32.Trojan.WisdomEyes.16070401.9500.9991", "Trojan.Win32.Z.Revirdit.463872", "Backdoor:MSIL/Revirdit.A", "Trojan.MSILPerseus.D1F0A1", "Trj/GdSda.A", "Win32/Trojan.ed9" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1 ]
[ "]", "infokalisi", "[", "." ]
[ 9, 9, 1, 9 ]
[ "There", "is", "a", "‘", "protected", "apps", "’", "list", "in", "this", "brand", "’", "s", "smartphones", ",", "related", "to", "a", "battery-saving", "concept", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "In", "total", ",", "there", "are", "32", "different", "routines", ",", "each", "of", "them", "implementing", "a", "different", "opcode", "and", "some", "basic", "functionality", "that", "the", "malware", "program", "may", "execute", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "During", "a", "recent", "compromise", "assessment,", "Cylance", "incident", "responders", "and", "threat", "researchers", "uncovered", "a", "surreptitious", "and", "sophisticated", "remote", "access", "trojan", "RAT", "that", "had", "been", "planted", "and", "operated", "by", "the", "suspected", "threat", "actor." ]
[ 16, 16, 16, 16, 16, 4, 12, 12, 16, 4, 12, 16, 16, 16, 16, 16, 3, 11, 11, 11, 16, 16, 16, 16, 16, 16, 16, 6, 14, 14, 14 ]
[ "A", "backdoor", "also", "known", "as:", "W32/Trojan.DPQH-6594", "Win32/Tnega.aTYcGTB", "Trojan.Win32.Small.cjn", "Troj.W32.Small!c", "TR/Jord.dvwus", "Trojan:Win32/Mvpaten.A", "Trojan.Win32.Small.cjn", "Win32.Trojan.Small.Llqr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Interestingly", ",", "we", "uncovered", "several", "expired", "job", "posting", "of", "Android", "reverse", "engineer", "from", "the", "actor", "’", "s", "front", "business", "published", "in", "2018", "and", "2019", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "mcpef.apk", "(", "SHA256", ":", "a8e7dfac00adf661d371ac52bddc03b543bd6b7aa41314b255e53d810931ceac", ")", ":", "The", "malicious", "system", "application", "downloaded", "from", "server", "(", "package", "name", "–", "com.android.music.helper", ")", "." ]
[ 1, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16 ]
[ "Targets", "included", "a", "wide", "array", "of", "high-profile", "entities,", "including", "intelligence", "services,", "military,", "utility", "providers", "telecommunications", "and", "power,", "embassies,", "and", "government", "institutions." ]
[ 16, 16, 16, 16, 16, 16, 4, 12, 16, 4, 12, 12, 12, 12, 12, 12, 12, 12, 16, 4, 12 ]
[ "Beside", "the", "obfuscation", "and", "the", "environment", "checks", ",", "the", "malware", "also", "has", "some", "interesting", "anti-sandbox", "mechanisms", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "first", "part", "is", "the", "target", "directory", ",", "the", "second", "is", "a", "regular", "expression", "used", "to", "match", "specific", "files", ",", "while", "the", "last", "part", "is", "an", "ID", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "After", "execution", "it", "takes", "care", "of", "restoring", "the", "original", "KernelCallbackTable", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Curiously,", "the", "Word", "document", "does", "not", "contain", "any", "macros,", "or", "even", "an", "exploit." ]
[ 16, 1, 9, 9, 16, 16, 16, 16, 1, 16, 16, 16, 3 ]
[ "Attacks", "on", "Windows", "XP", "allows", "mobile", "malware", "to", "infect", "a", "PC", "after", "connecting", "a", "smartphone", "or", "tablet", "." ]
[ 16, 16, 5, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Rotexy", "will", "perform", "further", "actions", "after", "it", "receives", "the", "corresponding", "commands", ":", "START", ",", "STOP", ",", "RESTART", "—", "start", ",", "stop", ",", "restart", "SuperService", "." ]
[ 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "[email protected]", "Damage.Small", "W32/Netsky.t@MM", "W32/Netsky.T@MM", "I-Worm.Netsky.FJ", "Netsky.T@mm", "WORM_NSKY.DAM", "Win32.NetSky.t", "Email-Worm.Win32.NetSky.t", "Email-Worm.Win32.NetSky!IK", "Heur.Corrupt.PE", "Win32.HLLM.Netsky.18432", "Worm/Netsky.#1", "WORM_NSKY.DAM", "W32/Netsky.t@MM", "I-Worm/NetSky.u", "Worm:Win32/[email protected]#4", "Email-Worm.Win32.NetSky.t", "Worm.Mail.Win32.NetSky.daq", "Email-Worm.Win32.NetSky", "W32/Netsky.T@mm", "W32/Netsky.T.worm" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "And", "finally", "it's", "important", "to", "highlight", "that", "the", "RAT", "itself", "is", "not", "new." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Autoit.CoinMiner.AT", "Trojan/CoinMiner.jr", "Win32.Trojan.WisdomEyes.16070401.9500.9906", "TROJ_GE.DAFBBB38", "Win32.Trojan.Coinminer.A", "Troj.W32.Autoit.lWc9", "Application.Win32.CoinMiner.B", "Tool.BtcMine.195", "Trojan.CoinMiner.Win32.1291", "TR/Comitsproc.gbs", "Trojan.Autoit.Wirus", "Win32/Fynloski.AN", "Worm.Win32.AutoIt" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "At", "that", "time", "of", "the", "analysis,", "it", "was", "unclear", "how", "victims", "were", "exposed", "to", "OSX/Keydnap." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Win32.BSKG.dlyohq", "Trojan.Packed.29890", "Trojan:Win32/Chanitor.A", "Trojan/Win32.Zbot.C916515", "Win32/Injector.BSKG" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1 ]
[ "But", "if", "your", "device", "is", "not", "from", "a", "Chinese", "manufacturer", ",", "then", "chances", "that", "you", "are", "a", "victim", "of", "it", ",", "are", "very", "less", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Marijku", "TROJ_DLOAD.XL", "W32/Downldr2.FJJI", "Win32/Tnega.AZ", "TROJ_DLOAD.XL", "Trojan.Win32.Downloader.208896.AR", "Trojan.DownLoad3.7906", "BehavesLike.Win32.Downloader.dc", "W32/Downloader.MIEG-4062", "Trojan.Heur.D.nm6fbaHVu8n", "Trojan:Win32/Marijku.A", "Trojan/Win32.Downloader.R6539", "Win32/BHO.NIZ", "Trojan.Win32.StartPage.BE" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "spear-phishing", "email", "targeting", "a", "voice", "actor", "YouTuber", "in", "South", "Korea", "was", "used", "to", "distribute", "Lumma", "Stealer", "malware,", "according", "to", "analysis", "by", "S2W", "TALON", "and", "the", "BBC." ]
[ 16, 1, 9, 16, 4, 12, 12, 12, 16, 2, 10, 16, 16, 16, 16, 3, 11, 11, 16, 16, 16, 16, 4, 12, 16, 4, 12 ]
[ "A", "backdoor", "also", "known", "as:", "Troj.Downloader.W32.Zlob.kYLL", "W32/Trojan.BZWN", "Trojan.Farfli", "RTKT_FARFLI.EOJ", "Win.Downloader.13148-1", "TrojWare.Win32.Magania.~E", "Trojan.DownLoad.47002", "Downloader.Win32.55183440", "RTKT_FARFLI.EOJ", "Virus.Win32.Hmir", "Win32.Troj.RootkitT.r.16800", "Backdoor:WinNT/Farfli.B!sys", "Trojan/Win32.Hmir.C55747", "Trojan.Graftor.D5437" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Figure", "10", "." ]
[ 16, 16, 16 ]
[ "Their", "targets", "have", "also", "included", "the", "governments", "of", "members", "of", "the", "Commonwealth", "of", "Independent", "States;", "Asian,", "African,", "and", "Middle", "Eastern", "governments;", "organizations", "associated", "with", "Chechen", "extremism;", "and", "Russian", "speakers", "engaged", "in", "the", "illicit", "trade", "of", "controlled", "substances", "and", "drugs." ]
[ 16, 16, 16, 16, 16, 16, 4, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 16, 4, 12, 12, 12, 16, 16, 4, 12, 16, 4, 12, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9545", "Trojan.Win32.Qhost" ]
[ 16, 3, 16, 16, 16, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Ransom_Anunau.R002C0DK417", "Trojan.Win32.RansomHeur.eutbif", "Ransom_Anunau.R002C0DK417", "BehavesLike.Win32.Evasion.dh", "Trojan.Win32.Injector", "TR/AD.RansomHeur.ibtfr", "Ransom:Win32/Anunau.A", "Trojan/Win32.Inject.R211968", "SScope.Trojan.FakeAV.01695", "Trj/CI.A", "Trojan.Symmi.D13583" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.eHeur.Virus02", "Worm.Seroteb.Win32.16", "Win32.Trojan.WisdomEyes.16070401.9500.9522", "W32/Trojan2.MQYM", "Worm.Win32.Seroteb.g", "BehavesLike.Win32.Trojan.nm", "W32/Trojan.QDYC-8978", "Worm:Win32/Serot.A@mm", "Trojan.CryptRedol!B3FmVPsxcak", "Worm.Win32.Serot", "Trj/CI.A", "Win32/Trojan.029" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "AT&T", "Alientlabs", "researchers", "has", "discovered", "new", "variant", "of", "BlackGuard", "stealer", "infections", "using", "spear", "phisng", "attack." ]
[ 4, 12, 12, 16, 16, 16, 3, 16, 3, 11, 16, 16, 1, 9, 9 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Goabeny.A8", "Trojan.Delf.Win32.88456", "HT_GRAFTOR_GI070668.UVPM", "HT_GRAFTOR_GI070668.UVPM", "Trojan.Win32.Sdbot.ercwiz", "TrojWare.Win32.Delf.QJW", "BackDoor.IRC.Sdbot.34285", "BehavesLike.Win32.Trojan.dc" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "One", "interesting", "thing", "is", "that", "it", "added", "some", "other", "functions", "you", "wouldn't", "expect", "to", "try", "and", "emphasize", "it", "wasn't", "a", "malicious", "tool", "by", "including", "a", "piano", "game", "and", "fun", "manager" ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 16, 1, 9 ]
[ "Additionally", "new", "endpoint", "was", "added", "that", "seems", "related", "to", "downloading", "a", "module", "for", "the", "malware", ",", "probably", "with", "new", "features", "or", "configuration", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Riskware.Win32.Winnti.erfdhv", "Win32.Winnti.1", "HackTool:Win32/Passdash.A!dha", "Trj/CI.A", "Win32.Risk.Adware.Ecbn", "Win32/Virus.Adware.708" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9994", "W32/Trojan.RBLM-5940", "Trojan[Dropper]/Win32.Dapato", "TrojanDownloader:Win32/Dapato.M", "Trojan.Symmi.DB644", "Trojan.DR.Dapato!vPidh5qsMRE", "W32/Onlinegames.QRT!tr", "Trj/CI.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.HfsAdware.CA66", "not-a-virus:Downloader.Win32.Elex.u", "Riskware.Win32.WinZipper.eoijjb", "Adware.Mutabaha.229", "Pua.337.Technologies", "RiskWare[Downloader]/Win32.Elex.u", "PUP.Adware.Elex", "Adware.Elex.612528.A", "not-a-virus:Downloader.Win32.Elex.u", "PUP.Optional.Elex", "PUA.Downloader!" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.HfsAutoB.542D", "Trojan.Zenshirsh.SL7", "TSPY_MSPOSER.SMZ", "TSPY_MSPOSER.SMZ", "Trojan-Dropper.Win32.Daws.dxwt", "BehavesLike.Win32.Sality.mc", "Trojan.Win32.Sisron", "Trojan:Win32/Blihan.A", "Trj/GdSda.A", "Trojan.Win32.Sisron.weqa", "Win32/Trojan.a66" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "a", "Federal", "contractor", "command", "and", "control", "domains,", "we", "couldn't", "help", "but", "notice", "a", "peculiar", "related", "OPM-themed", "domain,", "opm-learning[.]org." ]
[ 16, 16, 16, 3, 11, 11, 1, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 9 ]
[ "]", "205", "[", "." ]
[ 9, 9, 9, 9 ]
[ "This", "campaign", "was", "sent", "to", "millions", "of", "recipients", "across", "numerous", "organizations", "primarily", "in", "Australia." ]
[ 16, 6, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 2 ]
[ "Upon", "creation", ",", "this", "activity", "launches", "a", "thread", "that", "will", "loop", "on", "a", "50-second", "interval", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9966", "Trojan.Win32.Disfa.eoyfmo" ]
[ 16, 3, 16, 16, 16, 1, 1 ]
[ "Extract", "call", "logs", ",", "contacts", "and", "messages", "from", "the", "Skype", "app", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16 ]
[ "Both", "sources", "can", "be", "found", "here", "and", "here", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "New", "malware", "is", "often", "introduced", "to", "underground", "communities", "by", "being", "promoted", "and", "sold", "or", "offered", "as", "a", "giveaway", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Malware", "authors", "are", "evolving", "their", "techniques", "to", "evade", "network", "and", "host-based", "detection", "mechanisms." ]
[ 6, 14, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Of", "those", ",", "21", "were", "still", "available", "at", "the", "time", "of", "discovery", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.Win32.VBbot!O", "Trojan.Jorik.Win32.68017", "Win32.Trojan.WisdomEyes.16070401.9500.9994", "Trojan.ADH.2", "Win.Trojan.Dishigy-5", "Worm.Win32.WBNA.ipa", "Trojan.VbCrypt.68", "BehavesLike.Win32.Backdoor.dc", "Trojan.Win32.Spyeye", "Worm/Kolab.fyb", "Worm.Win32.WBNA.ipa", "Trojan/Win32.Bifrose.C110110", "Trojan.Injector!36BeufFOyC8", "Trj/CI.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Other:Android.Reputation.2", "HEUR:Trojan-Downloader.AndroidOS.Masplot.a", "Riskware.Android.RemoteCode.epsqsx", "Troj.Downloader.Androidos!c", "Android/Masplot.A!tr.dldr", "Trojan[Downloader]/Android.Masplot", "HEUR:Trojan-Downloader.AndroidOS.Masplot.a", "Android-PUP/Metasploit.5b3de", "a.gray.stdon" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "This", "vulnerability", "allows", "a", "malicious", "actor", "to", "inject", "arbitrary", "code", "during", "the", "parsing", "of", "SOAP", "WSDL", "definition", "contents." ]
[ 16, 7, 16, 16, 6, 14, 16, 1, 9, 9, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Because", "we", "hate", "scammers", "of", "all", "types", "but", "especially", "these", "guys", "--", "tricking", "people", "out", "of", "their", "money", "by", "lying", "to", "them", "is", "evil", "here", "are", "some", "more", "Tech", "Support", "Scam", "sites,", "along", "with", "some", "sample", "screenshots", "to", "give", "you", "a", "sense", "of", "the", "different", "ways", "they", "pitch", "their", "scams:" ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.Mofei.A", "Trojan.Win32.Mofeir.ruhef", "W32/Mofei.A", "W32.Femot.Worm", "WORM_MOFEI.A", "Win32.Femot", "Net-Worm.Win32.Mofeir.a", "Win32.Worm.Mopfei.B", "I-Worm.Mofai!mDpfss79YzI", "Worm.Win32.Mofei.A", "Win32.Worm.Mopfei.B", "BackDoor.Mofei", "BDS/Mofeir.101.B", "WORM_MOFEI.A", "Backdoor/Mofei.101", "Worm.Mofeir.kcloud", "Backdoor:Win32/Mofeir.1_01", "Worm.Win32.MoFei.11776", "Worm/Win32.Mytob", "Win32.Worm.Mopfei.B", "W32/Mofei.CGUW-2000", "Worm.Mofeir", "Net-Worm.Femot", "Win32/Mofei.A", "Net-Worm.Win32.Mofeir", "W32/MoFei.D!worm", "Worm/Mofeir.B" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "However", ",", "samples", "don", "’", "t", "have", "key", "capabilities", "to", "infect", "innocent", "apps", "on", "victim", "devices", "yet", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Last", "but", "not", "least", ",", "we", "publish", "our", "findings", "to", "help", "Android", "users", "protect", "themselves", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16 ]
[ "How", "do", "Android", "devices", "become", "infected", "?", "We", "found", "traces", "of", "the", "Gooligan", "malware", "code", "in", "dozens", "of", "legitimate-looking", "apps", "on", "third-party", "Android", "app", "stores", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Zenshirsh.SL7", "Win32.Trojan.FlyStudio.F", "Riskware.Win32.Adw.dneswh", "Trojan.MulDrop6.42243", "BehavesLike.Win32.PWSZbot.tm", "Trojan.Win32.Seodec", "TR/Seodec.abne", "RiskWare[Downloader]/Win32.AdLoad", "Trojan:Win32/Seodec.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "WhatsApp", "message", "capture", "The", "service", "com.serenegiant.service.ScreenRecorderService", ",", "is", "invoked", "by", "the", "ScreenRecorderActivity", "." ]
[ 5, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.RustogaLTF.Worm", "Backdoor/W32.Androm.37888", "Worm.Kasidet.20653", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Win.Trojan.Neutrino-6", "Backdoor.Win32.Androm.hkrm", "Trojan.Win32.Neutrino.cwggio", "BackDoor.Neutrino.1", "BehavesLike.Win32.VTFlooder.nh", "Backdoor/Androm.kfh", "Trojan[Backdoor]/Win32.Androm", "Worm:Win32/Kasidet.A", "Backdoor.Win32.Androm.hkrm", "Backdoor.Neutrino" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.VBKryptPS.Trojan", "Trojan/W32.VBKrypt.147456.CC", "Downldr.Umbald.S624840", "Trojan.VBKrypt.Win32.179340", "Troj.W32.VBKrypt.tpcC", "Trojan/VBKrypt.mhte", "Win32.Trojan.WisdomEyes.16070401.9500.9970", "W32/VBTrojan.Dropper.4!Maximus", "Trojan.VBKrypt", "Trojan.Win32.VBKrypt.xabo", "Trojan.Win32.Umbra.efkzrr", "Trojan.Win32.A.VBKrypt.147456.YW", "BackDoor.Umbra.10", "W32/VBTrojan.Dropper.4!Maximus", "Trojan/VBKrypt.hmyy", "Trojan/Win32.VBKrypt", "Win32.Troj.VBKrypt.kcloud", "TrojanDownloader:Win32/Umbald.A", "Trojan.Symmi.DD60", "Trojan.Win32.VBKrypt.xabo", "Trojan/Win32.Jorik.R27694", "Trojan.Crypt", "Win32/Delf.AVY", "W32/VBKrypt.MBSX!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Naturally", ",", "this", "resulted", "in", "the", "introduction", "of", "malware", "for", "mobile", "platforms", ",", "especially", "Android", "devices", ",", "including", "Cerberus", ",", "Xhelper", "and", "the", "Anubis", "Banking", "Trojan", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 3, 16, 3, 16, 16, 3, 16, 16, 16 ]
[ "The", "malware", "calls", "itself", "Grabit", "and", "is", "distinctive", "because", "of", "its", "versatile", "behavior." ]
[ 16, 3, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "People", "who", "want", "to", "know", "if", "their", "Android", "devices", "are", "infected", "can", "download", "the", "Check", "Point", "app", "here", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 4, 12, 16, 16, 16 ]
[ "By", "analyzing", "running", "processes", "on", "the", "infected", "device", ",", "it", "shows", "that", "the", "malware", "creates", "a", "child", "process", "of", "itself", "to", "perform", "the", "multi-process", "ptrace", "anti-debugging", "technique", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Worm.Botter", "Win32.Trojan.WisdomEyes.16070401.9500.9998", "Trojan.Wortrik", "Email-Worm.Win32.Botter.bv", "Trojan.Win32.Botter.eroupz", "Email.Worm.W32!c", "Win32.HLLW.Phorpiex.222", "Worm.AutoRun.Win32.131461", "Worm.Win32.Phorpiex", "Worm.Botter.j", "Email-Worm.Win32.Botter.bv", "Worm:Win32/Dipasik.C!bit", "Trojan/Win32.Phorpiex.C1326764", "BScope.Trojan.IRCbot", "Win32.Worm-email.Botter.Hyy", "W32/IRCBot.C!worm" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.VB.Win32.155357", "Trojan.Symmi.DEA81", "Win32.Trojan.VB.hs", "Trojan.Win32.VB.ebwbzr", "TrojWare.Win32.Downloader.FraudLoad.R", "BehavesLike.Win32.BadFile.vh", "W32/VB.GI!tr", "Trojan:Win32/Tacpud.A", "Trojan/Win32.VB.C2028217", "Trj/GdSda.A", "Win32.Trojan.Vb.Amcv", "Trojan.VB!9TqYT8CSaE0", "Trojan.Win32.VB" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.HfsAutoB.E9A8", "Trojan.Zusy.D3F56", "Win32.Trojan.WisdomEyes.16070401.9500.9972", "W32/Backdoor.RTBO-4851", "Backdoor.Trojan", "BKDR_EXPLOIT.AN", "Win.Trojan.Ploit-1", "BackDoor.Xconf.21", "BKDR_EXPLOIT.AN", "W32/Backdoor.KWF", "BDS/DarkView.A.3", "Backdoor:Win32/DarkView.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "TROJ_WEVARM.SM", "Win32.Trojan.WisdomEyes.16070401.9500.9998", "TROJ_WEVARM.SM", "Win.Trojan.Regrun-429", "Trojan.Win32.KillProc.boctad", "Trojan.Win32.Z.Regrun.1865432", "W32.W.AutoRun.l6Zu", "Trojan.KillProc.12652", "BehavesLike.Win32.VirRansom.tc", "TrojanDropper:Win32/Vixemb.A", "Trojan.KillProc", "Trj/CI.A", "Worm.Swimnag!wS08av/7yqU", "Worm.Win32.Swimnag", "W32/Swimnag.E!tr", "Win32/Trojan.1e8" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "OpcJacker", "is", "an", "interesting", "piece", "of", "malware,", "since", "its", "configuration", "file", "uses", "a", "custom", "file", "format", "to", "define", "the", "stealer's", "behavior." ]
[ 3, 16, 16, 16, 16, 16, 3, 16, 16, 1, 9, 9, 16, 1, 9, 9, 16, 16, 16, 6, 16 ]
[ "Android", "documentation", "describes", "that", "function", "as", "\"", "a", "global", "action", "." ]
[ 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Zbot.Win32.171106", "Win32.Trojan.Zbot.a", "Trojan.Zbot", "TSPY_ZBOT.SMQF", "Win.Spyware.Zbot-1275", "Trojan-Spy.Win32.Zbot.wqpm", "Trojan.Win32.Panda.cqqwdy", "Trojan-Spy:W32/Zbot.AVTH", "Trojan.PWS.Panda.11236", "TSPY_ZBOT.SMQF", "BehavesLike.Win32.PWSZbot.dh", "Trojan/Win32.Unknown", "Trojan.Kazy.D359E8", "Spyware/Win32.Zbot.R27121", "SScope.Trojan.FakeAV.01110", "Win32/Spy.Zbot.AAO", "Trojan.Win32.Zbot.aaw", "TrojanSpy.Zbot!A8UvbpHn23U", "Trojan-Spy.Banker.Citadel", "W32/Zbot.AT!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "This", "pulse", "contains", "indicators", "related", "to", "a", "phishing", "campaign", "launched", "against", "the", "US", "election", "system", "in", "2016." ]
[ 16, 16, 16, 1, 16, 16, 6, 14, 14, 16, 16, 4, 12, 12, 12, 16, 0 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan-Dropper.Win32.Dorgam!O", "Win32.Trojan-Dropper.Dorgam.cgdc", "Backdoor.Bifrose", "Trojan.Win32.Clicker.ddouvz", "Trojan.Win32.A.PSW-QQPass.802816", "Trojan.Click2.1642", "BehavesLike.Win32.BadFile.ch", "TR/Taranis.4038", "Backdoor:Win32/Babmote.A", "Troj.W32.Sasfis.lqzi", "Win32.Trojan.FlyStudio.F", "TrojanDropper.Dorgam", "Trojan.DR.Dorgam!Cb+DVu4OzCQ", "W32/QQPass.YZN!tr.pws" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Modphip.A3", "Trojan.Graftor.D45BA7", "Win32.Trojan.WisdomEyes.16070401.9500.9995", "Win32/Pilleuz.H", "Packed.Win32.Krap.hm", "Trojan.Win32.Krap.bsvym", "Trojan.Packed.20343", "Trojan.Win32.Yakes", "Trojan[Packed]/Win32.Krap", "Trojan:Win32/Modphip.A", "Packed.Win32.Krap.hm", "Trojan/Win32.Krap.R35222", "BScope.P2P-Worm.Palevo", "W32/Kryptik.DKU!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "stolen", "information", "was", "transmitted", "back", "to", "the", "threat", "actors'", "infrastructure", "in", "an", "encrypted", "format." ]
[ 16, 16, 16, 16, 16, 16, 16, 6, 14, 14, 5, 16, 16, 1, 9 ]
[ "Based", "on", "reports,", "as", "of", "2014,", "it", "has", "global", "users", "of", "more", "than", "490", "million", "registered", "users." ]
[ 16, 16, 16, 16, 16, 0, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "sample", "we", "analyzed", "uses", "an", "icon", "very", "similar", "to", "Google", "Apps", ",", "with", "the", "label", "\"", "Google", "Play", "Marketplace", "''", "to", "disguise", "itself", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 16, 16, 16, 16, 16, 5, 13, 13, 16, 16, 16, 16, 16 ]
[ "]", "204", "[", "." ]
[ 9, 9, 9, 9 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Trojan.Proxy.21493", "BehavesLike.Win32.VBObfus.nm", "Trojan.Trickster.a", "Trojan:Win32/Donvba.A", "Trojan.Jaik.D3551", "Trojan/Win32.Fareit.C1614161", "W32/Injector.DGQK!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "phones", "are", "sold", "at", "Best", "Buy", "and", "Amazon.com", ",", "among", "other", "retail", "outlets", "." ]
[ 16, 16, 16, 16, 16, 4, 12, 16, 4, 16, 16, 16, 16, 16, 16 ]
[ "It", "contained", "a", "part", "of", "recently", "leaked", "Zeus", "source", "code,", "which", "allowed", "Ramnit", "to", "become", "a", "banking", "trojan." ]
[ 16, 16, 16, 16, 16, 16, 16, 3, 11, 11, 16, 16, 3, 16, 16, 3, 11, 11 ]
[ "(", "deprecated", "in", "API", "level", "21", ")", "SYSTEM_ALERT_WINDOW", "-", "Allows", "the", "application", "to", "create", "windows", "shown", "on", "top", "of", "all", "other", "apps", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.Garex", "Trojan.Win64.Wurser.b", "Troj.Win64.Wurser!c", "Trojan.Win64.Wurser", "W64/Trojan.LBAM-3513", "Trojan.Win64.Wurser.b", "Backdoor:Win32/Garex.B!dha", "Trojan.Win64.Wurser", "Win64.Trojan.Wurser.Peqd", "Win32/Trojan.7be" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]