tokens
sequencelengths 2
296
| ner_tags
sequencelengths 2
296
|
---|---|
[
"We",
"were",
"able",
"to",
"identify",
"that",
"8,929",
"files",
"had",
"been",
"exfiltrated",
"from",
"compromised",
"devices",
"and",
"that",
"the",
"overwhelming",
"majority",
"of",
"these",
",",
"97",
"percent",
",",
"were",
"highly",
"likely",
"encrypted",
"images",
"taken",
"using",
"the",
"device",
"camera",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"and",
"launch",
"the",
"new",
"activity",
"as",
"the",
"payload."
] | [
16,
16,
16,
16,
16,
16,
16,
3
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Win32.Quby.b"
] | [
16,
3,
16,
16,
16,
1
] |
[
"The",
"latest",
"version",
"is",
"analyzed",
"here",
";",
"we",
"weren",
"’",
"t",
"able",
"to",
"determine",
"if",
"the",
"earlier",
"versions",
"were",
"also",
"malicious",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"So",
"far,",
"these",
"campaigns",
"have",
"targeted",
"countries",
"including",
"Germany,",
"Austria,",
"and",
"the",
"United",
"Kingdom."
] | [
16,
16,
16,
6,
16,
16,
16,
16,
2,
10,
16,
2,
10,
10
] |
[
"This",
"includes,among",
"others,",
"Poland,",
"Australia,",
"United",
"Kingdom",
"and",
"Spain."
] | [
16,
16,
16,
2,
10,
10,
10,
16,
2
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.Roron.F",
"Worm.Roron.Win32.28",
"WORM_OROR.Q",
"Win32.Trojan.WisdomEyes.16070401.9500.9941",
"W32/Roro.AA@mm",
"W32.HLLW.Oror.C@mm",
"Win32/Oror.U",
"WORM_OROR.Q",
"Win.Trojan.Oror-3",
"Trojan.Win32.IRCBot.dvpnyt",
"W32.W.Envid.l6rk",
"Win32.Backdoor.Ircbot.Lned",
"Worm.Win32.Roron.51",
"Win32.HLLM.RoRo",
"BehavesLike.Win32.Backdoor.cc",
"W32/Roro.AA@mm",
"Backdoor/IRCBot.rdt",
"WORM/Roron.51",
"Worm[Email]/Win32.Roron",
"Win32.Hack.IRCBot.g.kcloud",
"I-Worm.Win32.Roron.82954",
"Worm:Win32/Roron.Z@mm",
"Win32/Roron.worm.81925",
"Worm.Roron",
"Win32/Roron.51",
"IRC.Roron.G",
"Email-Worm.Win32.Roron",
"W32/Roron.B!worm"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"Kaspersky",
"Anti-Ransom",
"team",
"decrypted",
"the",
"Xpan",
"Trojan,",
"allowing",
"them",
"to",
"rescue",
"the",
"files",
"of",
"a",
"Hospital",
"in",
"Brazil",
"that",
"had",
"fallen",
"victim",
"to",
"this",
"Ransomware",
"family."
] | [
4,
12,
12,
12,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
2,
16,
16,
16,
16,
16,
16,
3,
11
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.DL.BHO.UDE",
"W32/DLoader.AIYY",
"Trojan.Downloader-70412",
"TrojWare.Win32.Bho.yme",
"Trojan.Win32.Bho.yme",
"Trojan.MulDrop.origin",
"Heuristic.BehavesLike.Win32.Dropper.K",
"TrojanDropper.Softfy.cn",
"Trojan:Win32/Gedanjo.A",
"Trojan-Downloader.Win32.BHO.lff",
"Trojan.Clicker.Win32.Undef.mi"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"JHUHUGIT",
"implant",
"became",
"a",
"relatively",
"popular",
"first",
"stage",
"for",
"the",
"Sofacy",
"attacks",
"and",
"was",
"used",
"again",
"with",
"a",
"Java",
"zero-day",
"CVE-2015-2590",
"in",
"July",
"2015."
] | [
16,
3,
11,
16,
16,
16,
16,
16,
16,
11,
16,
1,
9,
16,
16,
16,
16,
16,
16,
7,
15,
1,
16,
0,
8
] |
[
"These",
"spam",
"campaigns",
"feature",
"a",
"multi-stage",
"infection",
"chain",
"including",
"a",
"PDF",
"file,",
"a",
"malicious",
"Microsoft",
"Office",
"document,",
"and",
"finally,",
"the",
"Jaff",
"ransomware",
"loader."
] | [
16,
6,
14,
16,
16,
1,
9,
16,
16,
16,
1,
9,
9,
9,
9,
9,
9,
16,
16,
3,
11,
11,
11
] |
[
"Indicators",
"of",
"the",
"malware",
"used",
"in",
"two",
"bank",
"heist",
"against",
"Tienphong",
"Commercial",
"Bank",
"in",
"Vietnam",
"and",
"the",
"Bangladesh",
"central",
"bank."
] | [
1,
16,
16,
3,
16,
16,
16,
1,
9,
16,
4,
12,
12,
16,
2,
16,
4,
12,
12,
12
] |
[
"In",
"the",
"next",
"sections",
",",
"for",
"simplicity",
",",
"we",
"will",
"continue",
"the",
"analysis",
"only",
"on",
"the",
"64-bit",
"payload",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"malware",
"will",
"start",
"the",
"main",
"service",
"if",
"all",
"the",
"requested",
"permissions",
"and",
"the",
"device",
"admin",
"privileges",
"are",
"granted",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"RiskWare.Tool.CK",
"Win32.Trojan.WisdomEyes.16070401.9500.9947",
"Trojan.Win32.Clicker.8989",
"TrojWare.Win32.Patched.KSU",
"Trojan.DownLoader.5848",
"BehavesLike.Win32.Ramnit.xc",
"TR/Dldr.Hup.UH.15.B",
"Win32.Troj.download.kcloud",
"Trojan.Dropper/Packed"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"delivery",
"document",
"also",
"saved",
"the",
"post-exploitation",
"credential",
"harvesting",
"tool",
"known",
"as",
"Mimikatz,",
"which",
"we",
"believe",
"the",
"threat",
"actors",
"will",
"use",
"to",
"gather",
"account",
"credentials",
"from",
"the",
"compromised",
"system."
] | [
16,
16,
16,
16,
16,
3,
11,
11,
11,
11,
16,
16,
3,
16,
16,
16,
6,
14,
14,
16,
16,
16,
16,
16,
16,
16,
5,
13,
13
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Standardtest.17104",
"Win32.Trojan.WisdomEyes.16070401.9500.9983",
"Win32/Tnega.FJZCPHC",
"Win.Trojan.Standardtest-1",
"Trojan.Win32.StandardTest.cthmar",
"Win32.Trojan.Standardtest.Dvpy",
"TrojWare.Win32.StandardTest.A",
"Trojan.Win32.StandardTest",
"TR/StandardTest.0",
"Trojan.Razy.D1D493",
"Trojan:Win32/StandardTest.0",
"Trojan/Win32.Kazy.C224799",
"Trojan.Kazy!M40EV8PiuTc",
"Win32/Trojan.b42"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.MalPack",
"Ransom_Blocker.R011C0RB618",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Trojan.FakeAV",
"Win.Trojan.Emotet-6441079-0",
"Trojan-Ransom.Win32.Blocker.krar",
"Trojan.Win32.Encoder.exomzo",
"Trojan.Win32.Z.Zusy.183296.BS",
"TrojWare.Win32.Ransom.GandCrypt.A",
"Trojan.Encoder.24475",
"BehavesLike.Win32.PWSZbot.cc",
"Trojan.Win32.Crypt",
"Trojan.Blocker.ier",
"TR/Crypt.ZPACK.hwjhn",
"Trojan.Zusy.D42FEC",
"Trojan-Ransom.Win32.Blocker.krar",
"TrojanProxy:Win32/Bunitu.Q!bit",
"Trojan/Win32.Magniber.R219494",
"W32/Injector.DVHR!tr",
"Win32/Trojan.ff4"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"FireEye",
"as",
"a",
"Service",
"team",
"detected",
"independent",
"phishing",
"campaigns",
"conducted",
"by",
"two",
"Chinese",
"advanced",
"persistent",
"threat",
"APT",
"groups",
"that",
"we",
"track,",
"APT3",
"and",
"APT18."
] | [
16,
4,
16,
16,
4,
12,
16,
16,
6,
14,
16,
16,
16,
6,
14,
14,
14,
14,
14,
16,
16,
16,
6,
16,
6
] |
[
"The",
"code",
"and",
"functionality",
"have",
"changed",
"numerous",
"times",
";",
"from",
"simple",
"unobfuscated",
"malware",
"at",
"the",
"beginning",
"to",
"sophisticated",
"multi-stage",
"spyware",
"that",
"gives",
"attackers",
"full",
"remote",
"control",
"of",
"the",
"infected",
"device",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"ability",
"to",
"carry",
"out",
"these",
"types",
"of",
"intelligence-gathering",
"activities",
"on",
"phones",
"represents",
"a",
"huge",
"score",
"for",
"the",
"operator",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.FamVT.HllpHQc.Trojan",
"Win32.HLLP.DeTroie.A",
"HLLP.DeTroie",
"Win32.HLLP.DeTroie.A",
"Virus.DeTroie.Win32.8",
"W32/HLLP.DeTroie.a",
"Win32.HLLP.DeTroie.A",
"Win32.Worm.DeTroie.b",
"W32/HLLP.Detroie.A",
"W32.HLLP.DeTroie",
"Win32/DeTroie.D",
"WORM_DETROIE.A",
"Win.Trojan.DeTroie-1",
"Virus.Win32.HLLP.DeTroie",
"Win32.HLLP.DeTroie.A",
"Virus.Win32.DeTroie.bbxbrd",
"W32.HLLP.DeTroie.tnqA",
"Virus.Win32.Hllp.aad",
"Win32.HLLP.DeTroie.A",
"Virus.Win32.HLLP.DeTroie.E",
"Win32.HLLP.Cheval",
"WORM_DETROIE.A",
"BehavesLike.Win32.Cheval.tz",
"W32/HLLP.Detroie.A",
"Win32/HLLP.DeTroie",
"W32.Hllp.Detroie",
"Virus/Win32.HLLP.DeTroie",
"Worm:Win32/Cheval.D",
"Win32.Detroie.A",
"Virus.Win32.HLLP.DeTroie",
"Win32.HLLP.DeTroie.A",
"Win32/HLLP.Detroie.D",
"W32/Cheval.dr",
"Virus.Win32.HLLP.DeTroie",
"Win32/HLLP.DeTroie",
"Win32.HLLP.DeTroie.C",
"Virus.Win32.HLLP.DeTroie",
"W95/HLLP.Detroie.E"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"malware",
"contains",
"a",
"list",
"of",
"209",
"packages",
"hardcoded",
"in",
"its",
"source",
"code",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"HW32.Packed.E0AE",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Trojan.Win32.Yakes.vphb",
"Trojan.Win32.Yakes.exslpy",
"Trojan.Encoder.3976",
"BehavesLike.Win32.Downloader.kc",
"Trojan.Win32.Crypt",
"Trojan.Yakes.yvz",
"TR/Crypt.ZPACK.rwser",
"Trojan.Win32.Yakes.vphb",
"Trojan:Win32/Godzilia.B!bit",
"Trj/GdSda.A",
"W32/Kryptik.EYKI!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"How",
"these",
"recorded",
"calls",
"are",
"sent",
"to",
"the",
"command",
"and",
"control",
"server",
"(",
"CnC",
")",
"is",
"taken",
"care",
"of",
"by",
"MainService",
",",
"which",
"is",
"discussed",
"next",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.Spybot.Worm",
"Win32.Stration",
"Win32.HLLW.SpyBot",
"Worm/Spyboter.44064",
"P2P-Worm.Win32.SpyBot.gl!IK",
"P2P-Worm.Win32.SpyBot.eu"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1
] |
[
"Figure",
"22",
":",
"world",
"infection",
"heat",
"map",
"Considering",
"that",
"India",
"is",
"by",
"far",
"the",
"most",
"infected",
"county",
"by",
"“",
"Agent",
"Smith",
"”",
",",
"overall",
"compromised",
"device",
"brand",
"distribution",
"is",
"heavily",
"influenced",
"by",
"brand",
"popularity",
"among",
"Indian",
"Android",
"users",
":",
"Figure",
"23",
":",
"infected",
"brand",
"distribution",
"While",
"most",
"infections",
"occurred",
"on",
"devices",
"running",
"Android",
"5",
"and",
"6",
",",
"we",
"also",
"see",
"a",
"considerable",
"number",
"of",
"successful",
"attacks",
"against",
"newer",
"Android",
"versions",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
13,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16
] |
[
"Visiting",
"the",
"main",
"page",
"hosted",
"at",
"www.president-office.gov[.]mm",
"triggered",
"the",
"malicious",
"content,",
"as",
"the",
"threat",
"actors",
"injected",
"an",
"inline",
"frame",
"IFRAME",
"into",
"a",
"JavaScript",
"file",
"used",
"by",
"Drupal",
"for",
"the",
"site's",
"theme."
] | [
16,
16,
16,
16,
16,
16,
1,
16,
16,
3,
16,
16,
16,
6,
14,
16,
16,
1,
9,
9,
16,
16,
1,
9,
16,
16,
4,
16,
16,
16,
16
] |
[
"This",
"campaign",
"started",
"in",
"April",
"2017,",
"using",
"a",
"spear",
"phishing",
"campaign",
"to",
"deliver",
"the",
"MICROPSIA",
"payload",
"in",
"order",
"to",
"remotely",
"control",
"infected",
"systems."
] | [
16,
6,
16,
16,
0,
8,
16,
16,
6,
14,
14,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
5,
13
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.OngameJFT.Trojan",
"Application.Hacktool.CX",
"Worm/W32.AutoRun.11656",
"RiskTool.Win32.Tcpz!O",
"Risktool.Tcpz",
"W32/AutoRun.ezt",
"W32/Spybot.QYN",
"Hacktool.Rootkit",
"Win32/Tcpz.A",
"Win.Trojan.B-285",
"Application.Hacktool.CX",
"not-a-virus:RiskTool.Win32.Tcpz.a",
"Application.Hacktool.CX",
"Trojan.Win32.SdBot.hjuf",
"Application.Hacktool.CX",
"TrojWare.Win32.Trojan.TCPZ.~A",
"Rootkit:W32/Tcpz.A",
"Tool.TcpZ",
"Backdoor.IRCBot.Win32.17564",
"Backdoor.Win32.IRCBot",
"W32/Spybot.XPIF-6513",
"W32.Hack.Tool",
"Application.Hacktool.CX",
"Worm.AutoRun/Variant",
"not-a-virus:RiskTool.Win32.Tcpz.a",
"HackTool:WinNT/Tcpz.A",
"Trojan/Win32.Rootkit.C53179",
"Rootkit.Win32.Drucker",
"Hacktool/Tcpz.A",
"HackTool.Tcpz!rBSvpdUKEZI",
"W32/Tcpz.A!tr",
"Win32/Worm.AutoRun.750"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"This",
"report",
"records",
"the",
"analysis",
"and",
"tracing",
"process",
"of",
"the",
"entire",
"incident."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.FakeW7Folder.Fam.Trojan",
"Trojan.Win32.Scar!O",
"Trojan.Scar",
"Troj.W32.Scar.toQM",
"Win32.Trojan.VB.ac",
"WORM_OTORUN.SM0",
"Trojan.Win32.Scar.lpco",
"Trojan.Win32.Scar.crgjex",
"TrojWare.Win32.WBNA.THR",
"Trojan.MulDrop3.10901",
"WORM_OTORUN.SM0",
"BehavesLike.Win32.VBObfus.lt",
"Worm.Win32.VB",
"Worm/WBNA.hgwu",
"Trojan/Win32.Scar",
"Win32.Troj.Scar.fw.kcloud",
"Trojan.Symmi.DFA6A",
"Trojan.Win32.Scar.lpco",
"Trojan:Win32/Tookibe.B!bit",
"HEUR/Fakon.mwf",
"TScope.Trojan.VB",
"Trj/GdSda.A",
"Win32/VB.OGG",
"Win32.Trojan.Scar.Wqms",
"W32/VB.QHS!tr",
"Win32/Trojan.e82"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"EventBot",
"uses",
"this",
"function",
"to",
"update",
"its",
"C2s",
",",
"the",
"configuration",
"of",
"webinjects",
",",
"etc",
"."
] | [
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Casinos",
"and",
"resort",
"hotels",
"are",
"the",
"most",
"recent",
"victims",
"of",
"an",
"attack",
"that",
"used",
"RawPOS,",
"an",
"old",
"POS",
"malware,",
"to",
"steal",
"customer",
"data."
] | [
4,
16,
4,
12,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
3,
11,
16,
1,
9,
9
] |
[
"If",
"the",
"user",
"unlocks",
"their",
"device",
",",
"they",
"will",
"see",
"a",
"black",
"screen",
"while",
"the",
"app",
"drops",
"the",
"call",
",",
"resets",
"call",
"settings",
"and",
"prepares",
"for",
"the",
"user",
"to",
"interact",
"with",
"the",
"device",
"normally",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"However",
",",
"the",
"apps",
"are",
"still",
"available",
"in",
"third-party",
"app",
"stores",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Since",
"mid-July",
"2015,",
"I've",
"noticed",
"an",
"increase",
"in",
"malicious",
"spam",
"malspam",
"caught",
"by",
"my",
"employer's",
"spam",
"filters",
"with",
"java",
"archive",
".jar",
"file",
"attachments."
] | [
16,
0,
8,
16,
16,
16,
16,
16,
1,
9,
9,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9,
9,
9
] |
[
"These",
"activities",
"depend",
"on",
"the",
"device",
"configuration",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Staget.bz",
"W32/Trojan2.NIBK",
"Trojan.Startpage",
"W32/Staqet.B",
"Win32.TRCrypt.Fkm",
"Win.Trojan.Staget-7",
"Trojan.Win32.Staget.bz",
"Trojan.Staget!Y7ZdgRV9k0Q",
"TrojanBanker.Banker.tx",
"TrojanDownloader:Win32/Kotibu.A",
"Trojan/Win32.VB",
"W32/Trojan2.NIBK",
"Trojan.Staget.bz",
"Trojan.Startpage!rem",
"Win32/VB.PBM",
"Trojan.Kotibu!447E",
"Trojan.Win32.Staget",
"W32/VB.ABBL!tr.dldr",
"Trj/StartPage.DAW"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Moreover",
",",
"as",
"we",
"dived",
"deeper",
"into",
"the",
"investigation",
",",
"we",
"discovered",
"several",
"spyware",
"tools",
"for",
"Windows",
"that",
"form",
"an",
"implant",
"for",
"exfiltrating",
"sensitive",
"data",
"on",
"a",
"targeted",
"machine",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"In",
"total,",
"it",
"appears",
"this",
"threat",
"may",
"have",
"impacted",
"users",
"from",
"18",
"countries",
"including",
"China,",
"France,",
"Russia,",
"Japan,",
"United",
"Kingdom,",
"United",
"States,",
"Canada,",
"Germany,",
"Australia,",
"Israel,",
"Italy,",
"Spain,",
"Singapore,",
"and",
"South",
"Korea."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
2,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
16,
2,
10
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Win32.DownLoad1.dddutq",
"TrojWare.Win32.Downloader.Delf.frgf",
"Trojan.DownLoad1.22694",
"Downloader.Delf.Win32.47996",
"BehavesLike.Win32.Dropper.bm",
"Trojan-Dropper.Delf",
"TrojanDownloader:Win32/Parkchicers.C",
"Trojan.Graftor.D35402"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"They",
"are",
"interested",
"in",
"users",
"of",
"remote",
"banking",
"systems",
"RBS,",
"mainly",
"in",
"Russia",
"and",
"neighbouring",
"countries."
] | [
16,
16,
16,
16,
16,
16,
3,
11,
11,
11,
16,
16,
2,
16,
2,
10
] |
[
"This",
"blog",
"post",
"describes",
"an",
"attack",
"campaign",
"where",
"NIC",
"National",
"Informatics",
"Centre",
"Cyber",
"Security",
"themed",
"spear",
"phishing",
"email",
"was",
"used",
"to",
"possibly",
"target",
"Indian",
"government",
"organizations."
] | [
16,
16,
16,
16,
16,
6,
14,
16,
4,
12,
12,
12,
12,
12,
16,
1,
9,
9,
16,
16,
16,
16,
16,
4,
12,
12
] |
[
"This",
"is",
"most",
"probably",
"how",
"the",
"application",
"spreads",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Instead",
"of",
"the",
"normal",
"modus",
"operandi",
"phishing",
"attacks",
"or",
"drive-by",
"downloads",
"that",
"lead",
"to",
"automatic",
"execution",
"of",
"ransomware,",
"the",
"attackers",
"gained",
"persistent",
"access",
"to",
"the",
"victim's",
"network",
"through",
"vulnerability",
"exploitation",
"and",
"spread",
"their",
"access",
"to",
"any",
"connected",
"systems",
"that",
"they",
"could."
] | [
16,
16,
16,
1,
9,
9,
9,
9,
16,
1,
9,
16,
16,
16,
16,
16,
16,
3,
16,
6,
16,
1,
9,
9,
9,
9,
9,
16,
7,
15,
16,
16,
16,
16,
16,
16,
7,
15,
16,
16,
16
] |
[
"The",
"new",
"one",
"with",
"the",
"title",
"\"",
"Coralco",
"Archimedes",
",",
"''",
"and",
"an",
"older",
"version",
"with",
"the",
"title",
"\"",
"Wolf",
"Intelligence",
":",
"''",
"New",
"panel",
"Old",
"panel",
"The",
"new",
"panel",
"name",
"contains",
"\"",
"Coralco",
"''",
"in",
"its",
"name",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"null",
"is",
"not",
"the",
"only",
"payload",
"opening",
"a",
"shell",
"on",
"the",
"phone",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Duuzer",
"is",
"a",
"well-designed",
"threat",
"that",
"gives",
"attackers",
"remote",
"access",
"to",
"the",
"compromised",
"computer,",
"downloads",
"additional",
"files,",
"and",
"steals",
"data."
] | [
3,
16,
16,
16,
3,
16,
16,
6,
3,
11,
16,
16,
5,
13,
1,
16,
9,
9,
9,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.PePatch.Win32.12525",
"Win32.Trojan.WisdomEyes.16070401.9500.9959",
"TROJ_PINCAV.SME",
"Trojan.Win32.Pincav.bbbvr",
"Trojan.Packed.149",
"TROJ_PINCAV.SME",
"BehavesLike.Win32.VirRansom.cc",
"Worm/Kapucen.ce",
"TrojanDropper:Win32/Bablo.B",
"Worm/Win32.Drefir.R30526",
"Trojan.DR.Bablo!ESXrt1Se74g",
"Trojan-Dropper.Win32.Bablo",
"W32/Packcav.PLK!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"It",
"is",
"notable",
"that",
"NetWire",
"was",
"also",
"used",
"as",
"a",
"payload",
"in",
"that",
"campaign."
] | [
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
3,
16,
16,
6
] |
[
"If",
"the",
"user",
"has",
"provided",
"the",
"details",
"of",
"another",
"card",
",",
"then",
"the",
"following",
"window",
"is",
"displayed",
":",
"The",
"application",
"leaves",
"the",
"user",
"with",
"almost",
"no",
"option",
"but",
"to",
"enter",
"the",
"correct",
"card",
"number",
",",
"as",
"it",
"checks",
"the",
"entered",
"number",
"against",
"the",
"bank",
"card",
"details",
"the",
"cybercriminals",
"received",
"earlier",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"CVE-2017-0199",
"Used",
"as",
"Zero",
"Day",
"to",
"Distribute",
"FINSPY",
"Espionage",
"Malware",
"and",
"LATENTBOT",
"Cyber",
"Crime",
"Malware"
] | [
1,
16,
16,
7,
15,
16,
16,
3,
11,
11,
16,
3,
11,
11,
11
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.FamVT.WinSecND.Trojan",
"Trojan.Win32.Winsecsrv.h",
"Trojan.Win32.Winsecsrv.ebicpl",
"TrojWare.Win32.Winsecsrv.B",
"Trojan.Win32.Winsecsrv",
"Trojan.Winsecsrv.ll",
"TR/Taranis.2428",
"Trojan/Win32.Winsecsrv.h",
"Trojan:Win32/Winexert.C!bit",
"Trojan.Winsecsrv.1",
"Trojan.Win32.Winsecsrv.h",
"Trojan/Win32.Dynamer.R176993",
"Win32.Trojan.Winsecsrv.Wwoi"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Graftor.D48EFA",
"Trojan.DownLoader25.1955",
"W32/Trojan.HNMY-5442",
"TrojanSpy:MSIL/Hoetou.AC",
"Trj/GdSda.A",
"Win32/Trojan.efe"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"TrojWare.Win32.Hadoc.AS",
"BehavesLike.Win32.Dropper.dh",
"Trojan.Win32.Rimecud",
"TrojanSpy.AutoHK.a",
"Trojan:Win32/Hadoc.A",
"Trojan/Win32.Asprox.R130565",
"TrojanSpy.AutoHK",
"Win32/Spy.AHK.E",
"Win32/Trojan.bc3"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.FamVT.VBCloneAATTc.Worm",
"Trojan.VBClone.S500460",
"Trojan/VBClone.b",
"Win32.Adware.Kryptik.h",
"Trojan.Dropper",
"Trojan.Win32.VB.cuvt",
"Trojan.Win32.VB.dwthyt",
"TrojWare.Win32.VBClone.CUV",
"Trojan.VbCrypt.250",
"BehavesLike.Win32.VBObfus.qz",
"Trojan.Crypt",
"Trojan/VB.czdk",
"Trojan/Win32.VB.cuvt",
"Troj.W32.VB.tnqI",
"Trojan.Win32.VB.cuvt",
"TScope.Trojan.VB",
"Win32/VBClone.B"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Small.15973",
"Win32.Trojan.WisdomEyes.16070401.9500.9775",
"Trojan.Dropper",
"TROJ_MICROJOIN.W",
"Trojan.Win32.Small.dpzper",
"TrojWare.Win32.TrojanProxy.Puma.jsjk",
"Trojan.Celln",
"TROJ_MICROJOIN.W",
"Trojan-Proxy.Win32.Puma",
"Trojan:Win32/Ditul.B",
"Trojan.Heur.RP.ciWfayCj9ogb",
"Trojan/Win32.Xema.C32762"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"This",
"family",
"showcases",
"the",
"amount",
"of",
"resources",
"that",
"malware",
"authors",
"now",
"have",
"to",
"expend",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"When",
"users",
"try",
"to",
"close",
"the",
"ads",
",",
"the",
"new",
"functionality",
"causes",
"already",
"downloaded",
"apps",
"to",
"run",
"in",
"a",
"virtual",
"machine",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"TrojanDownloader.Iterign.B3",
"Trojan.Win32.FAUL.exlexh",
"Packed:MSIL/SmartIL.A",
"BehavesLike.Win32.Trojan.dc",
"TR/Dropper.MSIL.hxupg",
"Trojan.Razy.D1E910",
"TrojanDownloader:MSIL/Iterign.B",
"Trojan/Win32.ZBot.R139607",
"Trj/GdSda.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Win32.Disabler!O",
"WORM_DISABLER.SM",
"Win32.Trojan.WisdomEyes.16070401.9500.9981",
"W32.Glupzy.A",
"WORM_DISABLER.SM",
"Win.Trojan.Disabler-3",
"Trojan.Win32.Disabler.i",
"Trojan.Win32.Disabler.beace",
"TrojWare.Win32.Disabler.~A",
"Trojan.Flashy",
"BehavesLike.Win32.Downloader.qz",
"Trojan/Win32.Disabler",
"Troj.W32.Disabler.tnvR",
"Trojan.Win32.Disabler.i",
"Worm/Win32.IRCBot.R53504",
"Trojan.Disabler",
"Win32/Disabler.I",
"Trj/Flashy.B"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"In",
"order",
"to",
"support",
"network",
"defenders,Fidelis",
"Cybersecurity",
"is",
"offering",
"a",
"new,",
"free",
"data",
"feed",
"of",
"verified",
"indicators",
"to",
"support",
"thedetection",
"and",
"mitigation",
"of",
"Pushdo."
] | [
16,
16,
16,
16,
16,
4,
12,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3
] |
[
"The",
"sample",
"discussed",
"was",
"found",
"during",
"an",
"incident",
"response",
"engagement",
"in",
"March",
"2017."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
0,
8
] |
[
"At",
"some",
"point",
"in",
"his",
"Google",
"Play",
"“",
"career",
"”",
",",
"he",
"apparently",
"decided",
"to",
"increase",
"his",
"ad",
"revenue",
"by",
"implementing",
"adware",
"functionality",
"in",
"his",
"apps",
"’",
"code",
"."
] | [
16,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Lowzones.A6",
"Trojan.Zzinfor.1",
"Trojan.Win32.Dwn.dndeiz",
"TrojWare.Win32.Zzinfor.KQ",
"Trojan.DownLoader12.14740",
"Trojan.Win32.Spy",
"Adware.Zzinfor/Variant",
"Dropper/Win32.Injector.C189960"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.PWS.ZER",
"Troj.Pws.Zer!c",
"Trojan.PWS.ZER",
"Win32.Trojan.WisdomEyes.16070401.9500.9954",
"Trojan.Bitterbug",
"Trojan.PWS.ZER",
"Trojan.PWS.ZER",
"Trojan.PWS.ZER",
"BehavesLike.Win32.Dropper.ch",
"TR/PSW.ZER",
"Backdoor:Win32/Saluchtra.B!dha",
"Spyware.Infostealer.FakeMS",
"Win32.Trojan.Psw.Liqs",
"Trojan.Bitterbug!",
"Trojan.Win32.Bitterbug",
"Trojan.PWS.ZER"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"One",
"would",
"think",
"that",
"this",
"would",
"result",
"in",
"widespread",
"use,",
"but",
"instead",
"it",
"has",
"only",
"been",
"found",
"in",
"limited",
"areas."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"We",
"observed",
"many",
"web",
"landing",
"pages",
"that",
"mimic",
"the",
"sites",
"of",
"mobile",
"operators",
"and",
"which",
"are",
"used",
"to",
"spread",
"the",
"Android",
"implants",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16
] |
[
"This",
"malvertising",
"attack",
"preyed",
"on",
"visitors",
"to",
"sketchy",
"websites",
"offering",
"anything",
"from",
"torrents",
"of",
"copyrighted",
"movies,",
"live",
"streams",
"of",
"the",
"latest",
"flicks,",
"or",
"pirated",
"software."
] | [
16,
1,
9,
16,
16,
16,
16,
1,
9,
16,
16,
16,
1,
16,
1,
9,
9,
9,
16,
16,
1,
9,
16,
1,
9
] |
[
"Very",
"active,",
"we",
"can",
"now",
"see",
"~",
"50k",
"live",
"scanner",
"IPs",
"daily."
] | [
16,
16,
16,
16,
16,
16,
16,
1,
9,
9,
9,
9
] |
[
"Android",
"ransomware",
"that",
"claims",
"it",
"has",
"detected",
"forbidden",
"pornographic",
"pictures",
"on",
"your",
"device,",
"says",
"it",
"has",
"reported",
"it",
"to",
"the",
"FBI",
"and",
"asks",
"you",
"to",
"pay",
"a",
"fine",
"of",
"$500."
] | [
3,
11,
16,
16,
16,
16,
16,
1,
9,
9,
9,
9,
9,
16,
16,
16,
16,
16,
16,
16,
4,
16,
16,
16,
16,
1,
9,
9,
9,
9
] |
[
"So",
"if",
"you",
"have",
"Android",
"4.4.4",
"or",
"some",
"more",
"recent",
"version",
"of",
"this",
"OS",
"on",
"your",
"device",
",",
"your",
"chances",
"of",
"getting",
"infected",
"with",
"Triada",
"are",
"significantly",
"lower",
"."
] | [
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16
] |
[
"A",
"Russian",
"security",
"firm",
"'Doctor",
"Web",
"'",
"identified",
"the",
"first",
"mass",
"distributed",
"Android",
"bootkit",
"malware",
"called",
"'Android.Oldboot",
"'",
",",
"a",
"piece",
"of",
"malware",
"that",
"'s",
"designed",
"to",
"re-infect",
"devices",
"after",
"reboot",
",",
"even",
"if",
"you",
"delete",
"all",
"working",
"components",
"of",
"it",
"."
] | [
16,
16,
16,
16,
16,
4,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"TrojanDropper.Gepys.A",
"Trojan.Kryptik.Win32.524542",
"Trojan/Kryptik.banx",
"Win32.Trojan.Kryptik.eg",
"Trojan.Win32.Redirect.ctxvfh",
"TrojWare.Win32.Kryptik.BANN",
"Trojan.Redirect.147",
"Trojan/ShipUp.km",
"Trojan/Win32.Unknown",
"Trojan:Win32/Gepys.A",
"Trojan.Zusy.D404B9",
"Trojan/Win32.Shipup.R65212",
"Trojan-Downloader.Win32.Dofoil"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"These",
"threat",
"actors",
"appear",
"to",
"be",
"choosing",
"the",
"right",
"apps",
"–",
"those",
"that",
"could",
"be",
"popular",
"with",
"locals",
"in",
"the",
"region",
",",
"at",
"the",
"right",
"time",
"–",
"while",
"tensions",
"grow",
"in",
"this",
"region",
"of",
"China",
",",
"to",
"ensure",
"a",
"good",
"victim",
"install-base",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"However",
",",
"the",
"trojan",
"replaces",
"the",
"'=",
"'",
"by",
"'AAAZZZXXX",
"'",
",",
"the",
"'+",
"'",
"by",
"'|",
"'",
"and",
"the",
"'/",
"'",
"by",
"'",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"HW32.Packed.BCC5",
"W32.Virut.G",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Win.Trojan.Foreign-502",
"Trojan.DownLoader11.60294",
"BehavesLike.Win32.Sality.cc",
"Win32.Virut.eb.368640",
"Trojan/Win32.Foreign.R131573",
"Trojan-Ransom.Win32.Foreign"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"package",
"name",
"(",
"vyn.hhsdzgvoexobmkygffzwuewrbikzud",
")",
"and",
"its",
"many",
"activities",
"and",
"services",
"have",
"randomized",
"names",
",",
"probably",
"to",
"make",
"it",
"a",
"bit",
"more",
"difficult",
"to",
"detect",
"the",
"package",
"using",
"blacklisting",
"."
] | [
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"From",
"the",
"server",
",",
"the",
"Trojan",
"receives",
"commands",
"(",
"for",
"example",
",",
"to",
"send",
"SMS",
")",
"and",
"changes",
"in",
"the",
"configuration",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Moreover",
",",
"we",
"retrieved",
"his",
"University",
"ID",
";",
"a",
"quick",
"googling",
"showed",
"some",
"of",
"his",
"exam",
"grades",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Strictor.D2148",
"Win32.Trojan.WisdomEyes.16070401.9500.9567",
"Trojan-Downloader.Win32.Perkesh",
"HackTool[VirTool]/Win32.Unknown"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1
] |
[
"Check",
"Point",
"Research",
"reported",
"these",
"dangerous",
"apps",
"to",
"Google",
"upon",
"discovery",
"."
] | [
4,
12,
16,
16,
16,
16,
16,
16,
4,
16,
16,
16
] |
[
"CYBEREASON",
"MOBILE",
"Cybereason",
"Mobile",
"detects",
"EventBot",
"and",
"immediately",
"takes",
"remediation",
"actions",
"to",
"protect",
"the",
"end",
"user",
"."
] | [
5,
13,
5,
13,
13,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"banking",
"app",
"test",
":",
"the",
"credentials",
"as",
"entered",
"(",
"left",
")",
"and",
"as",
"available",
"in",
"the",
"database",
"(",
"right",
")",
"Second",
",",
"we",
"wrote",
"a",
"test",
"message",
"in",
"an",
"email",
"client",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"exploit",
"was",
"delivered",
"through",
"a",
"Microsoft",
"Office",
"document",
"and",
"the",
"final",
"payload",
"was",
"the",
"latest",
"version",
"of",
"FinSpy",
"malware."
] | [
3,
11,
16,
16,
16,
1,
9,
9,
9,
16,
16,
16,
3,
16,
16,
16,
16,
16,
3,
11
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.DomytnxASAAAC.Trojan",
"Trojan.Locky.Win32.658",
"Win32.Trojan.WisdomEyes.16070401.9500.9998",
"W32/Trojan.KGRA-2902",
"Ransom_HPLOCKY.SM4",
"Trojan-Ransom.Win32.Locky.aoc",
"Trojan.Win32.Encoder.eemdlz",
"Trojan.Win32.Locky.288947",
"Troj.Ransom.W32.Locky!c",
"Trojan.Encoder.3976",
"Ransom_HPLOCKY.SM4",
"BehavesLike.Win32.MultiPlug.cc",
"Trojan.Locky.aqx",
"Trojan[Ransom]/Win32.Locky",
"Trojan.Mikey.DC99C",
"Trojan-Ransom.Win32.Locky.aoc",
"TrojanDownloader:Win32/Terdot.A",
"Trojan/Win32.Locky.C1503881",
"Trojan-Ransom.Locky",
"Trj/CI.A",
"W32/Bebloh.K!tr",
"Win32/Trojan.Ransom.2d2"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"MalwareBytes",
"have",
"been",
"monitoring",
"a",
"malvertising",
"campaign",
"very",
"closely",
"as",
"it",
"really",
"soared",
"during",
"the",
"past",
"week."
] | [
4,
16,
16,
16,
16,
6,
14,
16,
16,
16,
16,
16,
16,
16,
16,
0,
8
] |
[
"With",
"this",
"information,",
"an",
"attacker",
"can",
"access",
"a",
"user's",
"Google",
"account",
"data",
"like",
"Google",
"Play,",
"Google",
"Photos,",
"Gmail,",
"Google",
"Drive,",
"and",
"G",
"Suite."
] | [
16,
16,
16,
16,
6,
1,
9,
16,
16,
5,
13,
13,
16,
5,
13,
13,
13,
13,
13,
13,
16,
5,
13
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"VBA/PowerShell.A",
"Win.Trojan.PowerShell-8",
"Trojan.Ole2.Vbs-heuristic.druvzi",
"TrojanDownloader:O97M/Poseket.A",
"HEUR.VBA.Trojan.e",
"heur.macro.powershell.a"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"TR/Spammer.Z",
"Trojan.Win32.Spammer.BZ",
"Trojan.SpamTool",
"SpamTool.KEM",
"Trj/CI.A",
"Win32/Trojan.Spammer.4de"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1
] |
[
"]",
"230",
"[",
"."
] | [
9,
9,
9,
9
] |
[
"The",
"Executive",
"Yuan",
"Council",
"evaluates",
"statutory",
"and",
"budgetary",
"bills",
"and",
"bills",
"concerning",
"martial",
"law,",
"amnesty,",
"declaration",
"of",
"war,",
"conclusion",
"of",
"peace",
"and",
"treaties,",
"and",
"other",
"important",
"affairs."
] | [
4,
12,
12,
12,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Network",
"activity",
"BrainTest",
"communicates",
"with",
"five",
"servers",
":",
"APK",
"files",
"provider",
"(",
"http",
":",
"//psserviceonline",
"[",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9,
9,
9
] |
[
"Recently,",
"we've",
"seen",
"information",
"indicating",
"that",
"the",
"scope",
"of",
"targets",
"can",
"be",
"wider",
"and",
"is",
"no",
"longer",
"limited",
"to",
"the",
"entertainment",
"business."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"blog",
"will",
"discuss",
"and",
"uncover",
"additional",
"details",
"regarding",
"a",
"recent",
"campaign",
"targeting",
"entities",
"in",
"the",
"Middle",
"East."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
6,
16,
16,
16,
2,
10,
10
] |
[
"The",
"Trojan",
"also",
"registered",
"in",
"Google",
"Cloud",
"Messaging",
"(",
"GCM",
")",
",",
"meaning",
"it",
"could",
"then",
"receive",
"commands",
"via",
"that",
"service",
"."
] | [
16,
16,
16,
16,
16,
5,
13,
13,
13,
13,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"After",
"the",
"VM",
"code",
"has",
"checked",
"again",
"the",
"user",
"environment",
",",
"it",
"proceeds",
"to",
"extract",
"and",
"execute",
"the",
"final",
"un-obfuscated",
"payload",
"sample",
"directly",
"into",
"winlogon.exe",
"(",
"alternatively",
",",
"into",
"explorer.exe",
")",
"process",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
1,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"HackTool.Inject!QFG7kQRUHDk",
"Trojan.VBInject!4947",
"Malware_fam.NB",
"Skodna.GameHack.CXD",
"Trj/CI.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.FOverND.PE",
"Virus.Win32.Sality!O",
"W32.Sivis.A3",
"Backdoor.Poison.Win32.87654",
"Trojan/Kryptik.gace",
"W32.Suviapen",
"Packed.Win32.Krap.jc",
"Trojan.Win32.Kespo.evacni",
"Win32.HLLP.Kespo.4",
"BehavesLike.Win32.Trojan.vh",
"Packed.Krap.fzmh",
"Trojan[Packed]/Win32.Krap",
"Packed.Win32.Krap.jc",
"Trojan-Ransom.Rokku",
"RAT.Sakula"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
Subsets and Splits