tokens
sequencelengths
2
296
ner_tags
sequencelengths
2
296
[ "A", "month", "after", "observing", "sample", "2", ",", "we", "obtained", "another", "which", "used", "the", "same", "package", "name", "as", "sample", "2", "(", "cn.android.setting", ")", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16 ]
[ "The", "commands", "received", "via", "GCM", "can", "not", "be", "blocked", "immediately", "on", "an", "infected", "device", "." ]
[ 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Morphick", "is", "tracking", "this", "malware", "under", "the", "name", "ScanPOS", "due", "to", "the", "build", "string", "present", "in", "the", "malware." ]
[ 4, 16, 16, 16, 3, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 3 ]
[ "They", "also", "state", "that", "the", "code", "is", "written", "from", "scratch", "and", "is", "not", "using", "parts", "of", "other", "existing", "banking", "Trojans", "unlike", "many", "other", "Trojans", "that", "are", "either", "based", "completely", "on", "the", "source", "of", "another", "Trojan", "(", "such", "as", "the", "leaked", "Anubis", "source", "code", "that", "is", "now", "being", "resold", ")", "or", "at", "least", "borrow", "parts", "of", "other", "Trojans", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9673", "Trojan.PWS.Zhui", "BehavesLike.Win32.VTFlooder.mh", "Win32.Troj.Wow.q.kcloud", "Trj/QQFile.D", "Win32.Trojan-qqpass.Qqrob.Akon", "Trojan.SystemHijack!vG9DZPEgkqo" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1 ]
[ "Always", "apply", "critical", "thinking", "and", "consider", "whether", "you", "should", "give", "a", "certain", "app", "the", "permissions", "it", "requests", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojandownloader.Halnine", "Trojan.Zusy.D2FDB", "Win32.Trojan.WisdomEyes.16070401.9500.9997", "Trojan.Win32.DlrSysWrtbased!M.bdazop", "Trojan.Win32.Z.Zusy.15872.DI", "TrojanDownloader:Win32/Halnine.A", "Win32.Trojan.Spy.Swve" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "BehavesLike.Win64.Fake.jh", "Trojan.Win32.Crypt", "Trojan.PSW.Mimikatz.un", "TR/AD.Trier.sqhjh", "Joke:VBS/Trier.A", "Trj/CI.A", "VBS/BadJoke.AL", "Win32/Trojan.7be" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "C2", "can", "also", "use", "WebSocket", "as", "a", "backup", "communication", "channel", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "]", "com", ",", "lending", "further", "credence", "the", "remaining", "two", "domains", ",", "gooledriveservice", "[", "." ]
[ 9, 9, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 9 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.FakeAV.NRC", "Trojan.Bampeass.B5", "Trojan.FakeAV.NRC", "TROJ64_BAMPEASS.SM", "Win.Trojan.Fakeav-103064", "Trojan.FakeAV.NRC", "Trojan.Win32.Wakme.c", "Trojan.FakeAV.NRC", "Variant.Kazy.mAdQ", "Trojan.FakeAV.NRC", "Trojan.FakeAV.Win32.316028", "TROJ64_BAMPEASS.SM", "W64/Trojan.CZHS-5421", "Trojan.Fakeav.bg", "TR/Bampeass.abd", "Trojan.FakeAV.NRC", "PUP.BrowseFox/Variant", "Trojan.Win32.Wakme.c", "Trojan:Win64/Bampeass.C", "Trojan.FakeAV.NRC", "Trj/CI.A", "Win32.Trojan.Wakme.Akew", "Win32/Trojan.d9f" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Forcepoint", "Security", "Labsβ„’", "recently", "investigated", "a", "trojanized", "RTF", "document", "which", "we", "tied", "to", "the", "Carbank", "criminal", "gang." ]
[ 4, 12, 12, 16, 16, 16, 3, 1, 9, 16, 16, 16, 16, 6, 14, 14, 14 ]
[ "A", "backdoor", "also", "known", "as:", "TrojanDownloader:PowerShell/Hipolel.A", "Trojan.Win32.Swrort", "Win32/Trojan.Downloader.c1c" ]
[ 16, 3, 16, 16, 16, 1, 1, 1 ]
[ "Doc", "with", "Macro", "that", "downloads", "Dridex" ]
[ 1, 16, 1, 16, 1, 3 ]
[ "Under", "a", "model", "known", "as", "sandboxing", ",", "most", "Android", "apps", "are", "n't", "permitted", "to", "access", "passwords", "or", "other", "data", "available", "to", "most", "other", "apps", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan-Downloader/W32.Small.8704.HT", "TrojanDownloader.Tooki", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Backdoor.Trojan", "Win32/Tydpec.A", "TROJ_DLOADER.OXH", "Win.Downloader.16819-1", "Trojan-Spy.Win32.KeyLogger.aszl", "Trojan.DownLoader8.62321", "TROJ_DLOADER.OXH", "TrojanDownloader:Win32/Tooki.A", "Trojan-Spy.Win32.KeyLogger.aszl", "Win32.Trojan-spy.Keylogger.Lpbj" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "throughout", "the", "Android", "package", "." ]
[ 16, 16, 5, 16, 16 ]
[ "Constantly", "update", "your", "Android", "devices", "to", "the", "latest", "version", "to", "help", "prevent", "exploits", ",", "especially", "in", "the", "case", "of", "RCSAndroid", "which", "can", "affect", "only", "up", "to", "version", "4.4.4", "KitKat", "." ]
[ 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 5, 13, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/W32.Small.16896.DU", "Trojan-Spy.Win32.Zbot!O", "Backdoor.Small.D10", "Trojan.Spy.Zbot", "W32.Spacefam", "Win32/Zbot.EUI", "TSPY_FIFESOCK_BK082A3D.TOMC", "Win.Trojan.Zbot-13661", "Trojan.Win32.Zbot.curnd", "Trojan.Win32.A.Zbot.16896", "Trojan.Proxy.18997", "TSPY_FIFESOCK_BK082A3D.TOMC", "TrojanSpy.Zbot.awmw", "TR/Spy.ZBot.axcq.3", "Trojan[Spy]/Win32.Zbot", "Trojan.Razy.D7DC8", "Backdoor.W32.IRCBot.liBA", "Spyware/Win32.Zbot.R2503", "SScope.Trojan.Zbot.01428" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Sample", "1", "may", "use", "AES-encrypted", "strings", "with", "reflection", ",", "while", "Sample", "2", "(", "submitted", "on", "the", "same", "day", ")", "will", "use", "the", "same", "code", "but", "with", "plaintext", "strings", "." ]
[ 16, 16, 16, 16, 4, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Using", "DGA", "Domain", "Generation", "Algorithm", "to", "find", "the", "C", "C", "Command", "and", "Control", "server" ]
[ 16, 5, 13, 13, 13, 16, 16, 1, 9, 9, 9, 9, 9, 9 ]
[ "We", "discovered", "a", "new", "variant", "of", "a", "Brazilian-made", "ransomware,", "Trojan-Ransom.Win32.Xpan,", "that", "is", "being", "used", "to", "infect", "local", "companies", "and", "hospitals,", "directly", "affecting", "innocent", "people,", "encrypting", "their", "files", "using", "the", "extension", ".___xratteamLucked", "and", "asking", "to", "pay", "the", "ransom." ]
[ 16, 16, 16, 16, 16, 16, 16, 3, 11, 1, 16, 16, 16, 16, 16, 16, 4, 12, 16, 4, 16, 16, 16, 16, 1, 9, 9, 9, 9, 9, 9, 16, 16, 16, 16, 16, 16 ]
[ "These", "investigations", "took", "place", "during", "mid-to-late", "2017,", "and", "each", "bank", "compromise", "resulted", "in", "a", "significant", "amount", "of", "stolen", "funds." ]
[ 16, 16, 16, 16, 16, 0, 8, 16, 16, 4, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Molock", "Win32.Trojan.WisdomEyes.16070401.9500.9974", "TR/Molock.nylne", "Trojan.Mikey.DD047", "PUA.BlackMoon", "Win32/Trojan.2ce" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1 ]
[ "In", "March", "2016,", "Symantec", "published", "a", "blog", "on", "Suckfly,", "an", "advanced", "cyberespionage", "group", "that", "conducted", "attacks", "against", "a", "number", "of", "South", "Korean", "organizations", "to", "steal", "digital", "certificates." ]
[ 16, 0, 8, 4, 16, 16, 16, 16, 6, 16, 6, 14, 14, 16, 16, 1, 16, 16, 16, 16, 2, 10, 4, 16, 1, 9, 9 ]
[ "A", "backdoor", "also", "known", "as:", "W32.RansomCryakl.Trojan", "Trojan.Cryakl", "Trojan.Ransom.Cryakl", "Ransom_CRYPICH.SMA", "Win32.Trojan.WisdomEyes.16070401.9500.9790", "W32/Trojan.GTXF-0130", "Ransom_CRYPICH.SMA", "Trojan-Ransom.Win32.Cryakl.sw", "Trojan.Win32.Cryakl.drogeo", "Trojan.Win32.Z.Filecoder.626656", "Win32.Trojan.Cryakl.Ahys", "Trojan.Encoder.1041", "Trojan.Cryakl.Win32.53", "Trojan-PWS.Win32.Delf", "Trojan/Cryakl.ap", "W32.Cryakl", "TR/FileCoder.bikix", "Trojan[Ransom]/Win32.Cryakl", "Trojan-Ransom.Win32.Cryakl.sw", "Trojan/Win32.Xema.C2455", "Trojan-Ransom.Cryakl", "Ransom.TeslaCrypt.OL", "Trojan.Cryakl!", "W32/Filecoder.EQ!tr", "Win32/Trojan.c28" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "When", "before", "it", "had", "used", "several", "different", "social", "media", "platforms", ",", "it", "now", "uses", "the", "Twitter", "platform", ",", "something", "FakeSpy", "has", "done", "in", "its", "past", "attacks", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Dropped:Backdoor.Rootodor.H", "Backdoor.W32.SdBot.aop!c", "Backdoor/SdBot.aop", "Backdoor.Rootodor.H", "Backdoor.Sdbot", "Win.Trojan.SdBot-8443", "Dropped:Backdoor.Rootodor.H", "Backdoor.Win32.SdBot.aop", "Dropped:Backdoor.Rootodor.H", "Trojan.Win32.SdBot.fptq", "Dropped:Backdoor.Rootodor.H", "Dropped:Backdoor.Rootodor.H", "BackDoor.Rtkit.12", "Backdoor.SDBot", "BehavesLike.Win32.Downloader.dc", "Backdoor/SdBot.cr", "WORM/SdBot.298496.1", "Win32.Hack.SdBot.kcloud", "TrojanDropper:Win32/Srvdrop.A", "Backdoor.Win32.SdBot.aop", "Dropped:Backdoor.Rootodor.H", "Backdoor.SDBot", "Backdoor.SdBot", "Win32.Backdoor.Sdbot.Wrgb", "Worm.SdBot!0ktHNidYgyk", "Backdoor.Win32.SdBot", "W32/SDBot.AOP!tr.bdr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Pua.Cpush", "W32/Trojan.VJJX-8459", "not-a-virus:AdWare.Win32.Cpush.a", "Adware.Cpush.Win32.21", "BehavesLike.Win32.Downloader.fc", "Trojan.Zusy.D2AB1B", "not-a-virus:AdWare.Win32.Cpush.a", "AdWare.Cpush", "Trj/CI.A", "Win32/VB.NYC", "Win32.Adware.Cpush.Dwjc", "Adware.Cpush!ybdhrKQu3UY", "Trojan-Dropper.Win32.VB", "W32/VB.NYC!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.NSIS.Androm.7", "Ransom.Onion.A", "Win32.Trojan.WisdomEyes.16070401.9500.9984", "Packed.NSISPacker!g6", "Ransom_.97182692", "Trojan.NSIS.Androm.7", "Trojan.Win32.Graftor.evkohe", "Trojan:W32/Gamarue.E", "Trojan.Inject2.64079", "Ransom_.97182692", "BehavesLike.Win32.Ransom.cc", "Trojan.Win32.Injector", "W32/Trojan.HJUO-7930", "Trojan.Graftor.D6B214", "Ransom.Cerber/Variant", "Ransom:Win32/Malasypt.A", "Trojan/Win32.Miuref.R183155", "Trj/CI.A", "Trojan.Injector!s1rN7kKLdpI", "W32/Injector.DDGJ!tr", "Win32/Trojan.5c1" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Version", "#", "4", ":", "April", "2020", "β€”", "Domain", ":", "nampriknum.net", "Following", "the", "same", "pattern", ",", "this", "version", "has", "some", "added", "features", "and", "others", ",", "which", "were", "not", "in", "use", ",", "removed", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Analysis", "Marcher", "is", "frequently", "distributed", "via", "SMS", ",", "but", "in", "this", "case", ",", "victims", "are", "presented", "with", "a", "link", "in", "an", "email", "." ]
[ 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "For", "example", ",", "version", "9.0.7", "(", "2017", ")", "featured", "the", "following", "set", "of", "commands", ":", "2", ",", "4", ",", "8", ",", "11", ",", "12", ",", "15", ",", "16", ",", "17", ",", "18", ",", "19", ",", "20", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Vectra", "Threat", "Labs", "researchers", "have", "uncovered", "the", "activities", "of", "a", "group", "of", "individuals", "currently", "engaged", "in", "targeted", "attacks", "against", "entities", "in", "the", "Middle", "East." ]
[ 4, 12, 12, 12, 16, 16, 16, 16, 16, 16, 6, 14, 14, 16, 16, 16, 16, 1, 16, 16, 16, 2, 10, 10 ]
[ "These", "websites,", "and", "the", "hosted", "programs,", "were", "designed", "to", "entice", "visitors", "to", "download", "and", "install", "the", "programs." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Moreover", ",", "the", "Trojan", "intercepts", "SMS", "from", "the", "bank", "that", "contain", "one-time", "passwords", "and", "information", "about", "the", "balance", "of", "the", "linked", "bank", "card", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Trojan.DownLoader23.44275", "Trojan.Graftor.D69D4B", "Trojan:Win32/Seepeed.A", "Trj/CI.A", "Win32.Trojan.Atraps.Pgmx", "W32/Kryptik.DNGA!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan-PSW.Win32.QQPass!O", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Win.Spyware.59892-2", "Trojan-PSW.Win32.QQPass.sso", "Trojan.Win32.QQPass.bcshgi", "Trojan.Win32.Downloader.75264.M", "TrojWare.Win32.PSW.QQPass.~Sso", "Backdoor.PePatch.Win32.16970", "Trojan[PSW]/Win32.QQPass", "Troj.PSW32.W.QQPass.toI3", "Trojan-PSW.Win32.QQPass.sso", "PWS:Win32/Stealer.M" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Figure", "9", ":", "Prompt", "for", "application", "permissions", "upon", "installation", "Figures", "10", "and", "11", "show", "the", "other", "permission", "screens", "for", "the", "app", ":", "Figure", "10", "Figure", "10", ":", "Part", "1", "of", "the", "permission", "screen", "for", "the", "app", "Figure", "11", ":", "Part", "2", "of", "the", "permission", "screen", "for", "the", "app", "Once", "installed", "the", "app", "will", "place", "a", "legitimate", "looking", "icon", "on", "the", "phone", "’", "s", "home", "screen", ",", "again", "using", "branding", "stolen", "from", "the", "bank", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Step", "1", ":", "Download", "Bank", "Austria", "Security", "App", "Download", "the", "Bank", "Austria", "security", "app", "to", "your", "Android", "device", "." ]
[ 16, 16, 16, 16, 5, 13, 13, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "smishing", ")", "." ]
[ 16, 16, 16 ]
[ "The", "example", "below", "steals", "Facebook", "data", ":", "All", "the", "other", "hardcoded", "applications", "targeted", "by", "the", "payload", ":", "Package", "name", "Name", "jp.naver.line.android", "LINE", ":", "Free", "Calls", "&", "Messages", "com.facebook.orca", "Facebook", "messenger", "com.facebook.katana", "Facebook", "com.whatsapp", "WhatsApp", "com.viber.voip", "Viber", "Parser", "payload", "Upon", "receiving", "a", "specific", "command", ",", "the", "implant", "can", "download", "a", "special", "payload", "to", "grab", "sensitive", "information", "from", "external", "applications", "." ]
[ 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 5, 13, 13, 13, 13, 13, 1, 5, 13, 1, 5, 1, 5, 1, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "ESET", "detects", "the", "games", "that", "install", "the", "Trojan", "as", "Android/TrojanDropper.Mapin", "and", "the", "Trojan", "itself", "as", "Android/Mapin." ]
[ 4, 16, 16, 5, 16, 16, 16, 3, 16, 1, 16, 16, 3, 16, 16, 1 ]
[ "Malware", "Seen", "In", "The", "Middle", "East", "Region", "Domains", "used", "by", "APT28." ]
[ 3, 16, 16, 2, 10, 10, 10, 7, 16, 16, 6 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Win.Trojan.Downloader-39183", "Trojan.Win32.Dwn.whgnl", "Trojan.Win32.A.Downloader.28672.AMZ", "Trojan.DownLoader6.15686", "BehavesLike.Win32.BadFile.mm", "Trojan[Downloader]/Win32.Tobor", "Trojan.Graftor.D45EB", "TrojanDownloader:Win32/Tobor.A", "TrojanDownloader.Tobor", "Win32/Trojan.e6d" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "]", "today", "svc", "[", "." ]
[ 9, 9, 1, 9, 9 ]
[ "The", "software", "manages", "the", "delivery", "of", "firmware", "updates", "over-the-air", ",", "the", "term", "used", "for", "transmission", "via", "a", "mobile", "network", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "We", "have", "detected", "several", "malicious", "programs", "using", "GCM", "for", "command", "and", "control", "–", "the", "widespread", "Trojan-SMS.AndroidOS.FakeInst.a", ",", "Trojan-SMS.AndroidOS.Agent.ao", ",", "and", "Trojan-SMS.AndroidOS.OpFake.a", "among", "others", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 3, 16, 3, 16, 16, 3, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Graftor.Elzob.D2B30", "BehavesLike.Win32.BadFile.qm", "HackTool:Win32/WMIShell.A", "Trj/CI.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Sefnit.Win32.13226", "Trojan.Win32.Sefnit.ekkxqe", "Trojan.DownLoader23.50639", "Trojan.Sefnit.pj", "Trojan/Win32.Sefnit", "TrojanDownloader:Win32/Trulop.A", "Trj/GdSda.A", "Win32/RA-based.NFG", "Trojan.Sefnit!apDWbcANJlc" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "BankBot", "is", "a", "family", "of", "Trojan", "malware", "targeting", "Android", "devices", "that", "surfaced", "in", "the", "second", "half", "of", "2016." ]
[ 3, 16, 16, 3, 11, 11, 11, 16, 5, 13, 16, 16, 16, 0, 8, 8, 8, 8 ]
[ "Let", "’", "s", "compare", "examples", "of", "traffic", "from", "Smaps", "and", "Asacub", "β€”", "an", "initializing", "request", "to", "the", "C", "&", "C", "server", "with", "information", "about", "the", "infected", "device", "and", "a", "response", "from", "the", "server", "with", "a", "command", "for", "execution", ":", "Smaps", "request", "Asacub", "request", "Decrypted", "data", "from", "Asacub", "traffic", ":", "{", "β€œ", "id", "”", ":", "”", "532bf15a-b784-47e5-92fa-72198a2929f5β€³", ",", "”", "type", "”", ":", "”", "get", "”", ",", "”", "info", "”", ":", "”", "imei:365548770159066", ",", "country", ":", "PL", ",", "cell", ":", "Tele2", ",", "android:4.2.2", ",", "model", ":", "GT-N5100", ",", "phonenumber", ":", "+486679225120", ",", "sim:6337076348906359089f", ",", "app", ":", "null", ",", "ver:5.0.2β€³", "}", "Data", "sent", "to", "the", "server", "[", "{", "β€œ", "command", "”", ":", "”", "sent", "&", "&", "&", "”", ",", "”", "params", "”", ":", "{", "β€œ", "to", "”", ":", "”", "+79262000900β€³", ",", "”", "body", "”", ":", "”", "\\u0410\\u0412\\u0422\\u041e\\u041f\\u041b\\u0410\\u0422\\u0415\\u0416", "1000", "50β€³", ",", "”", "timestamp", "”", ":", "”", "1452272572β€³", "}", "}", ",", "{", "β€œ", "command", "”", ":", "”", "sent", "&", "&", "&", "”", ",", "”", "params", "”", ":", "{", "β€œ", "to", "”", ":", "”", "+79262000900β€³", ",", "”", "body", "”", ":", "”", "BALANCE", "”", ",", "”", "timestamp", "”", ":", "”", "1452272573β€³", "}", "}", "]", "Instructions", "received", "from", "the", "server", "A", "comparison", "can", "also", "be", "made", "of", "the", "format", "in", "which", "Asacub", "and", "Smaps", "forward", "incoming", "SMS", "(", "encoded", "with", "the", "base64", "algorithm", ")", "from", "the", "device", "to", "the", "C", "&", "C", "server", ":", "Smaps", "format", "Asacub", "format", "Decrypted", "data", "from", "Asacub", "traffic", ":", "{", "β€œ", "data", "”", ":", "”", "2015:10:14_02:41:15β€³", ",", "”", "id", "”", ":", "”", "532bf15a-b784-47e5-92fa-72198a2929f5β€³", ",", "”", "text", "”", ":", "”", "SSB0aG91Z2h0IHdlIGdvdCBwYXN0IHRoaXMhISBJJ20gbm90IGh1bmdyeSBhbmQgbmU=", "”", ",", "”", "number", "”", ":", "”", "1790β€³", ",", "”", "type", "”", ":", "”", "load", "”", "}", "Propagation", "The", "banking", "Trojan", "is", "propagated", "via", "phishing", "SMS", "containing", "a", "link", "and", "an", "offer", "to", "view", "a", "photo", "or", "MMS", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 3, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "In", "this", "way", ",", "when", "the", "service", "runs", "during", "boot", ",", "the", "original", "Windows", "executable", "is", "executed", "from", "a", "different", "location", "and", "it", "will", "automatically", "load", "and", "map", "the", "malicious", "DLL", "inside", "its", "address", "space", ",", "instead", "of", "using", "the", "genuine", "system", "library", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "β€œ", ".clic", "”", "and", "β€œ", "k", "(", ")", ";", "”", ")", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9972", "Infostealer.Tarno.B", "TrojWare.Win32.GhostDEL.~A", "Trojan.MulDrop4.8101", "BehavesLike.Win32.Virut.qc", "Backdoor/Huigezi.2007.aqzf", "TrojanDownloader:Win32/Ksare.A", "Trj/CI.A", "Win32/Trojan.66a" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Recent", "weeks", "have", "seen", "the", "outing", "of", "two", "new", "additions", "to", "the", "Duke", "group's", "toolset,", "SeaDuke", "and", "CloudDuke." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 6, 14, 16, 3, 16, 3 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Graftor.D20DA2", "TrojWare.Win32.TrojanDownloader.Delf.SAD", "BehavesLike.Win32.Dropper.dc", "TR/Dldr.Vifuls.pwiho", "TrojanDownloader:Win32/Vifuls.A", "TScope.Trojan.Delf", "Win32.Trojan.Badur.Eddg", "Win32/Trojan.fd8" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Several", "bots", "relied", "heavily,", "if", "not", "exclusively,", "on", "systems", "with", "weak", "and/or", "default", "passwords", "to", "spread." ]
[ 16, 3, 16, 16, 16, 16, 16, 16, 5, 16, 1, 9, 9, 9, 16, 16 ]
[ "It", "even", "has", "its", "own", "virtual", "keyboard", "that", "supposedly", "protects", "the", "victim", "from", "keyloggers", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "In", "other", "words,", "the", "attack", "targeted", "organizations", "that", "design,", "build", "and", "support", "industrial", "solutions", "for", "critical", "infrastructure." ]
[ 16, 16, 16, 16, 16, 16, 4, 16, 16, 16, 16, 16, 4, 12, 16, 5, 13 ]
[ "While", "revisiting", "a", "Flokibot", "campaign", "that", "was", "targeting", "point", "of", "sale", "PoS", "systems", "in", "Brazil", "earlier", "this", "year,", "we", "discovered", "something", "interesting." ]
[ 16, 16, 16, 3, 6, 16, 16, 16, 12, 16, 16, 5, 13, 16, 2, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor/W32.Finfish.11008", "Backdoor.Win32.Finfish!O", "Backdoor.Finfish.r6", "Backdoor.Finfish.Win32.1", "Backdoor.W32.Finfish.b!c", "Backdoor/Finfish.b", "Backdoor.Finfish!WTL5ZVLbFgg", "Backdoor.Finfish", "Win32/Belesak.D", "TROJ_FINSPY.A", "Backdoor.Win32.Finfish.b", "Trojan.Win32.Finfish.wbhuj", "Trojan.Win32.Z.Finfish.11008[h]", "Backdoor.Win32.Finfish.B", "Trojan:W32/FinSpy.B", "Trojan.NtRootKit.14434", "TROJ_FINSPY.A", "W32/Backdoor.CLPB-2084", "Backdoor/Finfish.a", "W32/Belesak.D", "Trojan:WinNT/Spinfy.A", "Backdoor.Finfish", "Backdoor.Win32.Finfish.b", "Win32.Backdoor.Finfish.Iso", "Backdoor.Win32.Finfish" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "But", "an", "investigation", "now", "suggests", "the", "attack", "was", "in", "fact", "carried", "out", "by", "a", "group", "of", "Russian", "hackers." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16, 6, 14 ]
[ "The", "Trojan", "also", "employs", "various", "obfuscation", "methods", ":", "from", "the", "simplest", ",", "such", "as", "string", "concatenation", "and", "renaming", "of", "classes", "and", "methods", ",", "to", "implementing", "functions", "in", "native", "code", "and", "embedding", "SO", "libraries", "in", "C/C++", "in", "the", "APK", "file", ",", "which", "requires", "the", "use", "of", "additional", "tools", "or", "dynamic", "analysis", "for", "deobfuscation", ",", "since", "most", "tools", "for", "static", "analysis", "of", "Android", "apps", "support", "only", "Dalvik", "bytecode", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Worm.Win32.Luder!O", "Worm.Polkayam.A3", "Worm.Luder", "Trojan/Spy.VB.nub", "TROJ_SPNR.15GB13", "Backdoor.Trojan", "Win32/Tnega.VHcOIY", "TROJ_SPNR.15GB13", "Win.Trojan.Luder-83", "Trojan.Win32.Luder.crcdfm", "W32.W.WBNA.lJLh", "Worm.Luder.Win32.197", "Worm/Luder.chm", "TR/Dynamer.dtc.9853", "Worm/Win32.Luder", "Worm:Win32/Polkayam.A", "Worm/Win32.Luder.C169426", "Worm.Luder", "Worm.Luder!PF0ilQ/gy98", "Worm.Win32.Luder", "W32/Luder.BQPT!tr", "Win32/Trojan.cfc" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Third", ",", "based", "on", "the", "server", "response", ",", "the", "app", "can", "also", "hide", "its", "icon", "and", "create", "a", "shortcut", "instead", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "SMS", "grabbing", ":", "EventBot", "has", "the", "ability", "to", "parse", "SMS", "messages", "by", "using", "the", "targeted", "device", "’", "s", "SDK", "version", "to", "parse", "them", "correctly", "." ]
[ 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "In", "this", "post", "we", "will", "show", "links", "to", "a", "recently", "publicized", "PoS", "malware", "campaign,", "and", "describe", "possible", "threat", "motivations", "behind", "this", "or", "other", "POS", "vendor", "exploitation", "campaign." ]
[ 16, 16, 13, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 6, 16, 16, 16, 16, 16, 16, 16, 16, 16, 7, 15, 15, 6 ]
[ "These", "hooks", "are", "created", "using", "the", "root", "access", "and", "a", "custom", "native", "code", "called", "Lmt_INJECT", ",", "although", "the", "algorithm", "for", "this", "is", "well", "known", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Worm.TUD", "Trojan/W32.Hesv.372736.B", "Worm.Folxrun", "Win32.Worm.TUD", "Win32.Worm.TUD", "Win32.Trojan.VB.ja", "W32.Rasith", "Win32/Rasith.A", "TROJ_FSYSNA_FB120272.UVPM", "Win32.Worm.TUD", "Trojan.Win32.Hesv.bjrj", "Win32.Worm.TUD", "Trojan.Win32.Autoruner2.ewcqfg", "Troj.W32.Hesv!c", "Win32.Worm.TUD", "Win32.Worm.TUD", "Win32.HLLW.Autoruner2.29691", "Trojan.Fsysna.Win32.4334", "BehavesLike.Win32.Vesenlosow.fm", "Worm.Win32.Rasith", "W32/Trojan.SHGP-6241", "Trojan/Fsysna.atg", "Trojan/Win32.Fsysna", "Worm:Win32/Folxrun.A", "Trojan/Win32.Injector.R167793", "Trojan.Win32.Hesv.bjrj", "Trojan.Fsysna", "Trj/CI.A", "Win32.Trojan.Hesv.Lkdf", "Trojan.Fsysna!", "Win32/Worm.4c0" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Novetta", "has", "collected", "and", "shares", "within", "this", "report", "evidence", "that", "suggests", "multiple", "actors," ]
[ 4, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "This", "botnet", "is", "responsible", "for", "the", "majority", "of", "Locky", "and", "Dridex", "activity." ]
[ 16, 3, 16, 16, 16, 16, 16, 16, 3, 16, 3, 16 ]
[ "As", "mentioned", "previously", ",", "the", "beaconing", "is", "done", "every", "60", "seconds", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ ")", "Calculate", "the", "difference", "between", "this", "pointer", "and", "the", "User32", "base", "address", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "tool", "has", "been", "used", "in", "global", "phishing", "attacks", "and", "its", "use", "has", "been", "implicated", "in", "a", "number", "of", "notable", "attacks." ]
[ 16, 3, 16, 16, 16, 16, 1, 9, 9, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9 ]
[ "In", "this", "case", "I", "spent", "more", "time", "analyzing", "the", "campaign", "than", "I", "initially", "planned." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.HfsAutoB.9E06", "Win32.Trojan.WisdomEyes.16070401.9500.9767", "Spyware.Perfect", "Win32/Gamepass.QHH", "Trojan-Dropper.Win32.Dorgam.xfl", "Win32.TenThief.QQPsw_def.fvg", "Trojan.PWS.Wsgame.36114", "BehavesLike.Win32.Ransomware.dc", "Trojan.Win32.QQpass", "TrojanSpy.FlyStudio.cx", "TR/QQpass.E.4", "Trojan-Dropper.Win32.Dorgam.xfl", "Win32/PSW.QQPass.OHY", "Win32/Trojan.884" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "malware", "waits", "for", "victims", "to", "open", "the", "Google", "Play", "store", "and", "then", "displays", "a", "fake", "html", "overlay", "page", "asking", "for", "credit", "card", "information." ]
[ 16, 3, 1, 11, 16, 16, 1, 16, 5, 13, 13, 16, 16, 1, 9, 9, 9, 9, 11, 16, 16, 1, 9, 9 ]
[ "On", "July", "14,", "FireEye", "researchers", "discovered", "attacks", "exploiting", "the", "Adobe", "Flash", "vulnerability", "CVE-2015-5122,", "just", "four", "days", "after", "Adobe", "released", "a", "patch." ]
[ 16, 0, 8, 4, 12, 16, 16, 7, 16, 5, 13, 7, 1, 16, 0, 8, 16, 4, 16, 16, 16 ]
[ "Attacks", "involving", "Marcher", "have", "become", "increasingly", "sophisticated", ",", "with", "documented", "cases", "involving", "multiple", "attack", "vectors", "and", "a", "variety", "of", "targeted", "financial", "services", "and", "communication", "platforms", "[", "1", "]", "[", "2", "]", "." ]
[ 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Dynamer.S239831", "Trojan.RA.Win32.52", "Trojan.Win32.Reconyc.ejtcsm", "BehavesLike.Win32.Dropper.vc", "TR/RemoteAdmin.romkw", "Trojan/Win32.Scar", "Trojan.Zusy.D258ED", "Trojan.Banload", "Trojan.Win32.ChePro" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "source", "code", "appears", "to", "have", "been", "picked", "by", "one", "or", "more", "threat", "actors", "and", "was", "used", "to", "conduct", "DDoS", "attacks", "against", "Georgia", "in", "2008." ]
[ 16, 1, 9, 16, 16, 16, 16, 16, 16, 16, 16, 16, 6, 14, 16, 16, 16, 16, 16, 1, 9, 16, 2, 16, 0 ]
[ "A", "backdoor", "also", "known", "as:", "TrojanAPT.Moudoor.A8", "TROJ_BANLOAD.GDV", "Backdoor.Moudoor", "TROJ_BANLOAD.GDV", "Win.Trojan.Downloader-27596", "Trojan.DownLoader6.13038", "Trojan-Downloader.Win32.Banload", "W32/Trojan.MQRX-7833", "W32.Malware.Heur", "Trojan[Downloader]/Win32.Unknown", "Win32.Troj.Undef.kcloud", "Trojan.Downloader.cmGfaSmx9Rpb", "TrojanDownloader:Win32/Moudoor.A", "Win-Trojan/Downloader.46592.GU", "Trojan.Downloader.46592", "Win32/TrojanDownloader.Moudoor.A", "W32/Downloader_a.BWT!tr", "Win32/RootKit.Rootkit.7e5" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.PWS.OnlineGames.KDPO", "TrojanPWS.Dozmot.D4", "Infostealer.Gampass", "W32/Magania.GZ", "TROJ_GAMEHTI.SMI", "Trojan.Spy-73883", "Trojan-GameThief.Win32.OnLineGames.bnkb", "Trojan.PWS.OnlineGames.KDPO", "Trojan.PWS.Magania!Tq/DAk7oVGo", "Virus.Win32.Part.a", "TrojWare.Win32.PSW.OnlineGames.~BNKB", "Trojan-PSW:W32/OnlineGames.UBO", "Trojan.PWS.Gamania.30052", "TROJ_GAMEHTI.SMI", "Trojan-GameThief.Win32.WOW!IK", "Trojan/PSW.OnLineGames.bton", "Win32.PSWTroj.OnLineGames.kcloud", "PWS:Win32/Dozmot.D", "Trojan.Win32.PSWIGames.27176.E", "Trojan.PWS.OnlineGames.KDPO", "Trojan/Win32.OnlineGameHack", "BScope.Trojan.OnlineGames.0825", "Trojan-PSW.Gampass", "Win32/PSW.WOW.NQS", "Trojan.Win32.FakeKsUsr.a", "Trojan-GameThief.Win32.WOW", "W32/Onlinegames.OST!tr.pws", "Trj/Lineage.LNC" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "average", "user", "might", "not", "have", "the", "necessary", "skills", "to", "distinguish", "legitimate", "sites", "from", "malicious", "ones", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Upon", "decryption", ",", "we", "can", "see", "that", "the", "response", "from", "the", "server", "is", "a", "JSON", "object", "of", "EventBot", "’", "s", "configuration", ",", "which", "contains", "C2", "URLs", "and", "a", "targeted", "applications", "list", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.Bedep", "Trojan.Zusy.D3CF93", "Backdoor.Win32.Bedep.lls", "Win32.Backdoor.Bedep.Lnob", "BDS/Bedep.ghjmg", "Trojan[Backdoor]/Win32.Bedep", "Backdoor.Win32.Bedep.lls", "Win-Trojan/Bmdoor.100864", "Backdoor.Win32.Bedep" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Tofsee", "is", "a", "multi-purpose", "malware", "with", "wide", "array", "of", "capabilities", "–", "it", "can", "mine", "bitcoins,", "send", "emails,", "steal", "credentials,", "perform", "DDoS", "attacks,", "and", "more." ]
[ 3, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 9, 9, 9, 9, 9, 9, 9, 16, 16 ]
[ "These", "are", "detected", "within", "Alienvault", "USM", "by", "looking", "for", "Excel", "launching", "Cmd.exe." ]
[ 16, 16, 16, 16, 4, 12, 16, 16, 16, 1, 9, 9 ]
[ "In", "this", "blog", ",", "we", "showed", "that", "the", "threat", "actor", "behind", "the", "recent", "FakeSpy", "campaign", "is", "a", "Chinese-speaking", "group", "called", "β€œ", "Roaming", "Mantis", "”", "known", "to", "operate", "mainly", "in", "Asia", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 4, 12, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "It", "impersonates", "a", "porn", "player", "app", "or", "MMS", "application", "but", "without", "having", "their", "functionality", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "In", "that", "research", "we", "discussed", "two", "new", "malware", "families", "we", "named", "KASPERAGENT", "and", "MICROPSIA." ]
[ 16, 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 3, 16, 3 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.FakeAV", "Trojan.FakeSysDef.Win32.707", "Trojan/Kryptik.ahre", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "TrojWare.Win32.Spy.Zbot.HEUB", "Trojan.DownLoader5.64514", "BehavesLike.Win32.Downloader.dc", "Trojan/SmartFixer.gv", "W32.Trojan.Fakesysdef", "TR/FakeSysdef.aqwrb", "Trojan.Zbot.76", "Trojan/Win32.FakeAV.R28472", "FakeAlert-SysDef.ae", "TrojanFakeAV.FakeSysDef", "Trojan.Zbot" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Taiwan", "has", "been", "a", "regular", "target", "of", "cyber", "espionage", "threat", "actors", "for", "a", "number", "of", "years." ]
[ 2, 16, 16, 16, 16, 16, 16, 6, 14, 14, 14, 11, 16, 0, 8, 8 ]
[ "It", "is", "evident", "that", "the", "ultimate", "goal", "of", "this", "program", "is", "to", "steal", "information", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "If", "the", "user", "long-presses", "the", "icon", ",", "the", "name", "of", "the", "app", "responsible", "for", "the", "activity", "is", "revealed", "(", "right", ")", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.Nekozillot", "Win32.Trojan.WisdomEyes.16070401.9500.9656", "Trojan.DownLoader25.61646", "W32/Trojan.RZHM-5084", "BDS/RedCap.gyswy", "Trojan.MSILPerseus.D21311", "Backdoor:MSIL/Nekozillot.A!bit", "Trj/GdSda.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "On", "later", "versions", ",", "specifically", "iOS", "12.1.1", "and", "iOS", "12.2", ",", "the", "process", "is", "different", "." ]
[ 16, 16, 16, 16, 16, 5, 13, 16, 5, 13, 16, 16, 16, 16, 16, 16 ]
[ "Also", ",", "the", "longer", "the", "delay", ",", "the", "lower", "the", "risk", "of", "the", "user", "associating", "the", "unwanted", "ads", "with", "a", "particular", "app", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "It", "seems", "to", "be", "that", "the", "actors", "behind", "these", "campaigns", "are", "back", "now", "and", "launching", "again", "massive", "spam", "attacks." ]
[ 16, 16, 16, 16, 15, 16, 6, 16, 16, 6, 16, 16, 16, 16, 16, 16, 1, 9, 9 ]