tokens
sequencelengths
2
296
ner_tags
sequencelengths
2
296
[ "We", "were", "able", "to", "identify", "that", "8,929", "files", "had", "been", "exfiltrated", "from", "compromised", "devices", "and", "that", "the", "overwhelming", "majority", "of", "these", ",", "97", "percent", ",", "were", "highly", "likely", "encrypted", "images", "taken", "using", "the", "device", "camera", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "and", "launch", "the", "new", "activity", "as", "the", "payload." ]
[ 16, 16, 16, 16, 16, 16, 16, 3 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Win32.Quby.b" ]
[ 16, 3, 16, 16, 16, 1 ]
[ "The", "latest", "version", "is", "analyzed", "here", ";", "we", "weren", "’", "t", "able", "to", "determine", "if", "the", "earlier", "versions", "were", "also", "malicious", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "So", "far,", "these", "campaigns", "have", "targeted", "countries", "including", "Germany,", "Austria,", "and", "the", "United", "Kingdom." ]
[ 16, 16, 16, 6, 16, 16, 16, 16, 2, 10, 16, 2, 10, 10 ]
[ "This", "includes,among", "others,", "Poland,", "Australia,", "United", "Kingdom", "and", "Spain." ]
[ 16, 16, 16, 2, 10, 10, 10, 16, 2 ]
[ "A", "backdoor", "also", "known", "as:", "W32.Roron.F", "Worm.Roron.Win32.28", "WORM_OROR.Q", "Win32.Trojan.WisdomEyes.16070401.9500.9941", "W32/Roro.AA@mm", "W32.HLLW.Oror.C@mm", "Win32/Oror.U", "WORM_OROR.Q", "Win.Trojan.Oror-3", "Trojan.Win32.IRCBot.dvpnyt", "W32.W.Envid.l6rk", "Win32.Backdoor.Ircbot.Lned", "Worm.Win32.Roron.51", "Win32.HLLM.RoRo", "BehavesLike.Win32.Backdoor.cc", "W32/Roro.AA@mm", "Backdoor/IRCBot.rdt", "WORM/Roron.51", "Worm[Email]/Win32.Roron", "Win32.Hack.IRCBot.g.kcloud", "I-Worm.Win32.Roron.82954", "Worm:Win32/Roron.Z@mm", "Win32/Roron.worm.81925", "Worm.Roron", "Win32/Roron.51", "IRC.Roron.G", "Email-Worm.Win32.Roron", "W32/Roron.B!worm" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "Kaspersky", "Anti-Ransom", "team", "decrypted", "the", "Xpan", "Trojan,", "allowing", "them", "to", "rescue", "the", "files", "of", "a", "Hospital", "in", "Brazil", "that", "had", "fallen", "victim", "to", "this", "Ransomware", "family." ]
[ 4, 12, 12, 12, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16, 2, 16, 16, 16, 16, 16, 16, 3, 11 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.DL.BHO.UDE", "W32/DLoader.AIYY", "Trojan.Downloader-70412", "TrojWare.Win32.Bho.yme", "Trojan.Win32.Bho.yme", "Trojan.MulDrop.origin", "Heuristic.BehavesLike.Win32.Dropper.K", "TrojanDropper.Softfy.cn", "Trojan:Win32/Gedanjo.A", "Trojan-Downloader.Win32.BHO.lff", "Trojan.Clicker.Win32.Undef.mi" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "JHUHUGIT", "implant", "became", "a", "relatively", "popular", "first", "stage", "for", "the", "Sofacy", "attacks", "and", "was", "used", "again", "with", "a", "Java", "zero-day", "CVE-2015-2590", "in", "July", "2015." ]
[ 16, 3, 11, 16, 16, 16, 16, 16, 16, 11, 16, 1, 9, 16, 16, 16, 16, 16, 16, 7, 15, 1, 16, 0, 8 ]
[ "These", "spam", "campaigns", "feature", "a", "multi-stage", "infection", "chain", "including", "a", "PDF", "file,", "a", "malicious", "Microsoft", "Office", "document,", "and", "finally,", "the", "Jaff", "ransomware", "loader." ]
[ 16, 6, 14, 16, 16, 1, 9, 16, 16, 16, 1, 9, 9, 9, 9, 9, 9, 16, 16, 3, 11, 11, 11 ]
[ "Indicators", "of", "the", "malware", "used", "in", "two", "bank", "heist", "against", "Tienphong", "Commercial", "Bank", "in", "Vietnam", "and", "the", "Bangladesh", "central", "bank." ]
[ 1, 16, 16, 3, 16, 16, 16, 1, 9, 16, 4, 12, 12, 16, 2, 16, 4, 12, 12, 12 ]
[ "In", "the", "next", "sections", ",", "for", "simplicity", ",", "we", "will", "continue", "the", "analysis", "only", "on", "the", "64-bit", "payload", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "malware", "will", "start", "the", "main", "service", "if", "all", "the", "requested", "permissions", "and", "the", "device", "admin", "privileges", "are", "granted", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "RiskWare.Tool.CK", "Win32.Trojan.WisdomEyes.16070401.9500.9947", "Trojan.Win32.Clicker.8989", "TrojWare.Win32.Patched.KSU", "Trojan.DownLoader.5848", "BehavesLike.Win32.Ramnit.xc", "TR/Dldr.Hup.UH.15.B", "Win32.Troj.download.kcloud", "Trojan.Dropper/Packed" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "delivery", "document", "also", "saved", "the", "post-exploitation", "credential", "harvesting", "tool", "known", "as", "Mimikatz,", "which", "we", "believe", "the", "threat", "actors", "will", "use", "to", "gather", "account", "credentials", "from", "the", "compromised", "system." ]
[ 16, 16, 16, 16, 16, 3, 11, 11, 11, 11, 16, 16, 3, 16, 16, 16, 6, 14, 14, 16, 16, 16, 16, 16, 16, 16, 5, 13, 13 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Standardtest.17104", "Win32.Trojan.WisdomEyes.16070401.9500.9983", "Win32/Tnega.FJZCPHC", "Win.Trojan.Standardtest-1", "Trojan.Win32.StandardTest.cthmar", "Win32.Trojan.Standardtest.Dvpy", "TrojWare.Win32.StandardTest.A", "Trojan.Win32.StandardTest", "TR/StandardTest.0", "Trojan.Razy.D1D493", "Trojan:Win32/StandardTest.0", "Trojan/Win32.Kazy.C224799", "Trojan.Kazy!M40EV8PiuTc", "Win32/Trojan.b42" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.MalPack", "Ransom_Blocker.R011C0RB618", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Trojan.FakeAV", "Win.Trojan.Emotet-6441079-0", "Trojan-Ransom.Win32.Blocker.krar", "Trojan.Win32.Encoder.exomzo", "Trojan.Win32.Z.Zusy.183296.BS", "TrojWare.Win32.Ransom.GandCrypt.A", "Trojan.Encoder.24475", "BehavesLike.Win32.PWSZbot.cc", "Trojan.Win32.Crypt", "Trojan.Blocker.ier", "TR/Crypt.ZPACK.hwjhn", "Trojan.Zusy.D42FEC", "Trojan-Ransom.Win32.Blocker.krar", "TrojanProxy:Win32/Bunitu.Q!bit", "Trojan/Win32.Magniber.R219494", "W32/Injector.DVHR!tr", "Win32/Trojan.ff4" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "FireEye", "as", "a", "Service", "team", "detected", "independent", "phishing", "campaigns", "conducted", "by", "two", "Chinese", "advanced", "persistent", "threat", "APT", "groups", "that", "we", "track,", "APT3", "and", "APT18." ]
[ 16, 4, 16, 16, 4, 12, 16, 16, 6, 14, 16, 16, 16, 6, 14, 14, 14, 14, 14, 16, 16, 16, 6, 16, 6 ]
[ "The", "code", "and", "functionality", "have", "changed", "numerous", "times", ";", "from", "simple", "unobfuscated", "malware", "at", "the", "beginning", "to", "sophisticated", "multi-stage", "spyware", "that", "gives", "attackers", "full", "remote", "control", "of", "the", "infected", "device", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "ability", "to", "carry", "out", "these", "types", "of", "intelligence-gathering", "activities", "on", "phones", "represents", "a", "huge", "score", "for", "the", "operator", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.FamVT.HllpHQc.Trojan", "Win32.HLLP.DeTroie.A", "HLLP.DeTroie", "Win32.HLLP.DeTroie.A", "Virus.DeTroie.Win32.8", "W32/HLLP.DeTroie.a", "Win32.HLLP.DeTroie.A", "Win32.Worm.DeTroie.b", "W32/HLLP.Detroie.A", "W32.HLLP.DeTroie", "Win32/DeTroie.D", "WORM_DETROIE.A", "Win.Trojan.DeTroie-1", "Virus.Win32.HLLP.DeTroie", "Win32.HLLP.DeTroie.A", "Virus.Win32.DeTroie.bbxbrd", "W32.HLLP.DeTroie.tnqA", "Virus.Win32.Hllp.aad", "Win32.HLLP.DeTroie.A", "Virus.Win32.HLLP.DeTroie.E", "Win32.HLLP.Cheval", "WORM_DETROIE.A", "BehavesLike.Win32.Cheval.tz", "W32/HLLP.Detroie.A", "Win32/HLLP.DeTroie", "W32.Hllp.Detroie", "Virus/Win32.HLLP.DeTroie", "Worm:Win32/Cheval.D", "Win32.Detroie.A", "Virus.Win32.HLLP.DeTroie", "Win32.HLLP.DeTroie.A", "Win32/HLLP.Detroie.D", "W32/Cheval.dr", "Virus.Win32.HLLP.DeTroie", "Win32/HLLP.DeTroie", "Win32.HLLP.DeTroie.C", "Virus.Win32.HLLP.DeTroie", "W95/HLLP.Detroie.E" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "malware", "contains", "a", "list", "of", "209", "packages", "hardcoded", "in", "its", "source", "code", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "HW32.Packed.E0AE", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Trojan.Win32.Yakes.vphb", "Trojan.Win32.Yakes.exslpy", "Trojan.Encoder.3976", "BehavesLike.Win32.Downloader.kc", "Trojan.Win32.Crypt", "Trojan.Yakes.yvz", "TR/Crypt.ZPACK.rwser", "Trojan.Win32.Yakes.vphb", "Trojan:Win32/Godzilia.B!bit", "Trj/GdSda.A", "W32/Kryptik.EYKI!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "How", "these", "recorded", "calls", "are", "sent", "to", "the", "command", "and", "control", "server", "(", "CnC", ")", "is", "taken", "care", "of", "by", "MainService", ",", "which", "is", "discussed", "next", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.Spybot.Worm", "Win32.Stration", "Win32.HLLW.SpyBot", "Worm/Spyboter.44064", "P2P-Worm.Win32.SpyBot.gl!IK", "P2P-Worm.Win32.SpyBot.eu" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1 ]
[ "Figure", "22", ":", "world", "infection", "heat", "map", "Considering", "that", "India", "is", "by", "far", "the", "most", "infected", "county", "by", "“", "Agent", "Smith", "”", ",", "overall", "compromised", "device", "brand", "distribution", "is", "heavily", "influenced", "by", "brand", "popularity", "among", "Indian", "Android", "users", ":", "Figure", "23", ":", "infected", "brand", "distribution", "While", "most", "infections", "occurred", "on", "devices", "running", "Android", "5", "and", "6", ",", "we", "also", "see", "a", "considerable", "number", "of", "successful", "attacks", "against", "newer", "Android", "versions", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 13, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16 ]
[ "Visiting", "the", "main", "page", "hosted", "at", "www.president-office.gov[.]mm", "triggered", "the", "malicious", "content,", "as", "the", "threat", "actors", "injected", "an", "inline", "frame", "IFRAME", "into", "a", "JavaScript", "file", "used", "by", "Drupal", "for", "the", "site's", "theme." ]
[ 16, 16, 16, 16, 16, 16, 1, 16, 16, 3, 16, 16, 16, 6, 14, 16, 16, 1, 9, 9, 16, 16, 1, 9, 16, 16, 4, 16, 16, 16, 16 ]
[ "This", "campaign", "started", "in", "April", "2017,", "using", "a", "spear", "phishing", "campaign", "to", "deliver", "the", "MICROPSIA", "payload", "in", "order", "to", "remotely", "control", "infected", "systems." ]
[ 16, 6, 16, 16, 0, 8, 16, 16, 6, 14, 14, 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 5, 13 ]
[ "A", "backdoor", "also", "known", "as:", "W32.OngameJFT.Trojan", "Application.Hacktool.CX", "Worm/W32.AutoRun.11656", "RiskTool.Win32.Tcpz!O", "Risktool.Tcpz", "W32/AutoRun.ezt", "W32/Spybot.QYN", "Hacktool.Rootkit", "Win32/Tcpz.A", "Win.Trojan.B-285", "Application.Hacktool.CX", "not-a-virus:RiskTool.Win32.Tcpz.a", "Application.Hacktool.CX", "Trojan.Win32.SdBot.hjuf", "Application.Hacktool.CX", "TrojWare.Win32.Trojan.TCPZ.~A", "Rootkit:W32/Tcpz.A", "Tool.TcpZ", "Backdoor.IRCBot.Win32.17564", "Backdoor.Win32.IRCBot", "W32/Spybot.XPIF-6513", "W32.Hack.Tool", "Application.Hacktool.CX", "Worm.AutoRun/Variant", "not-a-virus:RiskTool.Win32.Tcpz.a", "HackTool:WinNT/Tcpz.A", "Trojan/Win32.Rootkit.C53179", "Rootkit.Win32.Drucker", "Hacktool/Tcpz.A", "HackTool.Tcpz!rBSvpdUKEZI", "W32/Tcpz.A!tr", "Win32/Worm.AutoRun.750" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "This", "report", "records", "the", "analysis", "and", "tracing", "process", "of", "the", "entire", "incident." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.FakeW7Folder.Fam.Trojan", "Trojan.Win32.Scar!O", "Trojan.Scar", "Troj.W32.Scar.toQM", "Win32.Trojan.VB.ac", "WORM_OTORUN.SM0", "Trojan.Win32.Scar.lpco", "Trojan.Win32.Scar.crgjex", "TrojWare.Win32.WBNA.THR", "Trojan.MulDrop3.10901", "WORM_OTORUN.SM0", "BehavesLike.Win32.VBObfus.lt", "Worm.Win32.VB", "Worm/WBNA.hgwu", "Trojan/Win32.Scar", "Win32.Troj.Scar.fw.kcloud", "Trojan.Symmi.DFA6A", "Trojan.Win32.Scar.lpco", "Trojan:Win32/Tookibe.B!bit", "HEUR/Fakon.mwf", "TScope.Trojan.VB", "Trj/GdSda.A", "Win32/VB.OGG", "Win32.Trojan.Scar.Wqms", "W32/VB.QHS!tr", "Win32/Trojan.e82" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "EventBot", "uses", "this", "function", "to", "update", "its", "C2s", ",", "the", "configuration", "of", "webinjects", ",", "etc", "." ]
[ 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Casinos", "and", "resort", "hotels", "are", "the", "most", "recent", "victims", "of", "an", "attack", "that", "used", "RawPOS,", "an", "old", "POS", "malware,", "to", "steal", "customer", "data." ]
[ 4, 16, 4, 12, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 3, 11, 16, 1, 9, 9 ]
[ "If", "the", "user", "unlocks", "their", "device", ",", "they", "will", "see", "a", "black", "screen", "while", "the", "app", "drops", "the", "call", ",", "resets", "call", "settings", "and", "prepares", "for", "the", "user", "to", "interact", "with", "the", "device", "normally", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "However", ",", "the", "apps", "are", "still", "available", "in", "third-party", "app", "stores", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Since", "mid-July", "2015,", "I've", "noticed", "an", "increase", "in", "malicious", "spam", "malspam", "caught", "by", "my", "employer's", "spam", "filters", "with", "java", "archive", ".jar", "file", "attachments." ]
[ 16, 0, 8, 16, 16, 16, 16, 16, 1, 9, 9, 16, 16, 16, 16, 16, 16, 16, 1, 9, 9, 9, 9 ]
[ "These", "activities", "depend", "on", "the", "device", "configuration", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Staget.bz", "W32/Trojan2.NIBK", "Trojan.Startpage", "W32/Staqet.B", "Win32.TRCrypt.Fkm", "Win.Trojan.Staget-7", "Trojan.Win32.Staget.bz", "Trojan.Staget!Y7ZdgRV9k0Q", "TrojanBanker.Banker.tx", "TrojanDownloader:Win32/Kotibu.A", "Trojan/Win32.VB", "W32/Trojan2.NIBK", "Trojan.Staget.bz", "Trojan.Startpage!rem", "Win32/VB.PBM", "Trojan.Kotibu!447E", "Trojan.Win32.Staget", "W32/VB.ABBL!tr.dldr", "Trj/StartPage.DAW" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Moreover", ",", "as", "we", "dived", "deeper", "into", "the", "investigation", ",", "we", "discovered", "several", "spyware", "tools", "for", "Windows", "that", "form", "an", "implant", "for", "exfiltrating", "sensitive", "data", "on", "a", "targeted", "machine", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "In", "total,", "it", "appears", "this", "threat", "may", "have", "impacted", "users", "from", "18", "countries", "including", "China,", "France,", "Russia,", "Japan,", "United", "Kingdom,", "United", "States,", "Canada,", "Germany,", "Australia,", "Israel,", "Italy,", "Spain,", "Singapore,", "and", "South", "Korea." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 2, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 16, 2, 10 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Win32.DownLoad1.dddutq", "TrojWare.Win32.Downloader.Delf.frgf", "Trojan.DownLoad1.22694", "Downloader.Delf.Win32.47996", "BehavesLike.Win32.Dropper.bm", "Trojan-Dropper.Delf", "TrojanDownloader:Win32/Parkchicers.C", "Trojan.Graftor.D35402" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "They", "are", "interested", "in", "users", "of", "remote", "banking", "systems", "RBS,", "mainly", "in", "Russia", "and", "neighbouring", "countries." ]
[ 16, 16, 16, 16, 16, 16, 3, 11, 11, 11, 16, 16, 2, 16, 2, 10 ]
[ "This", "blog", "post", "describes", "an", "attack", "campaign", "where", "NIC", "National", "Informatics", "Centre", "Cyber", "Security", "themed", "spear", "phishing", "email", "was", "used", "to", "possibly", "target", "Indian", "government", "organizations." ]
[ 16, 16, 16, 16, 16, 6, 14, 16, 4, 12, 12, 12, 12, 12, 16, 1, 9, 9, 16, 16, 16, 16, 16, 4, 12, 12 ]
[ "This", "is", "most", "probably", "how", "the", "application", "spreads", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Instead", "of", "the", "normal", "modus", "operandi", "phishing", "attacks", "or", "drive-by", "downloads", "that", "lead", "to", "automatic", "execution", "of", "ransomware,", "the", "attackers", "gained", "persistent", "access", "to", "the", "victim's", "network", "through", "vulnerability", "exploitation", "and", "spread", "their", "access", "to", "any", "connected", "systems", "that", "they", "could." ]
[ 16, 16, 16, 1, 9, 9, 9, 9, 16, 1, 9, 16, 16, 16, 16, 16, 16, 3, 16, 6, 16, 1, 9, 9, 9, 9, 9, 16, 7, 15, 16, 16, 16, 16, 16, 16, 7, 15, 16, 16, 16 ]
[ "The", "new", "one", "with", "the", "title", "\"", "Coralco", "Archimedes", ",", "''", "and", "an", "older", "version", "with", "the", "title", "\"", "Wolf", "Intelligence", ":", "''", "New", "panel", "Old", "panel", "The", "new", "panel", "name", "contains", "\"", "Coralco", "''", "in", "its", "name", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "null", "is", "not", "the", "only", "payload", "opening", "a", "shell", "on", "the", "phone", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Duuzer", "is", "a", "well-designed", "threat", "that", "gives", "attackers", "remote", "access", "to", "the", "compromised", "computer,", "downloads", "additional", "files,", "and", "steals", "data." ]
[ 3, 16, 16, 16, 3, 16, 16, 6, 3, 11, 16, 16, 5, 13, 1, 16, 9, 9, 9, 9 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.PePatch.Win32.12525", "Win32.Trojan.WisdomEyes.16070401.9500.9959", "TROJ_PINCAV.SME", "Trojan.Win32.Pincav.bbbvr", "Trojan.Packed.149", "TROJ_PINCAV.SME", "BehavesLike.Win32.VirRansom.cc", "Worm/Kapucen.ce", "TrojanDropper:Win32/Bablo.B", "Worm/Win32.Drefir.R30526", "Trojan.DR.Bablo!ESXrt1Se74g", "Trojan-Dropper.Win32.Bablo", "W32/Packcav.PLK!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "It", "is", "notable", "that", "NetWire", "was", "also", "used", "as", "a", "payload", "in", "that", "campaign." ]
[ 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 3, 16, 16, 6 ]
[ "If", "the", "user", "has", "provided", "the", "details", "of", "another", "card", ",", "then", "the", "following", "window", "is", "displayed", ":", "The", "application", "leaves", "the", "user", "with", "almost", "no", "option", "but", "to", "enter", "the", "correct", "card", "number", ",", "as", "it", "checks", "the", "entered", "number", "against", "the", "bank", "card", "details", "the", "cybercriminals", "received", "earlier", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "CVE-2017-0199", "Used", "as", "Zero", "Day", "to", "Distribute", "FINSPY", "Espionage", "Malware", "and", "LATENTBOT", "Cyber", "Crime", "Malware" ]
[ 1, 16, 16, 7, 15, 16, 16, 3, 11, 11, 16, 3, 11, 11, 11 ]
[ "A", "backdoor", "also", "known", "as:", "W32.FamVT.WinSecND.Trojan", "Trojan.Win32.Winsecsrv.h", "Trojan.Win32.Winsecsrv.ebicpl", "TrojWare.Win32.Winsecsrv.B", "Trojan.Win32.Winsecsrv", "Trojan.Winsecsrv.ll", "TR/Taranis.2428", "Trojan/Win32.Winsecsrv.h", "Trojan:Win32/Winexert.C!bit", "Trojan.Winsecsrv.1", "Trojan.Win32.Winsecsrv.h", "Trojan/Win32.Dynamer.R176993", "Win32.Trojan.Winsecsrv.Wwoi" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Graftor.D48EFA", "Trojan.DownLoader25.1955", "W32/Trojan.HNMY-5442", "TrojanSpy:MSIL/Hoetou.AC", "Trj/GdSda.A", "Win32/Trojan.efe" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "TrojWare.Win32.Hadoc.AS", "BehavesLike.Win32.Dropper.dh", "Trojan.Win32.Rimecud", "TrojanSpy.AutoHK.a", "Trojan:Win32/Hadoc.A", "Trojan/Win32.Asprox.R130565", "TrojanSpy.AutoHK", "Win32/Spy.AHK.E", "Win32/Trojan.bc3" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.FamVT.VBCloneAATTc.Worm", "Trojan.VBClone.S500460", "Trojan/VBClone.b", "Win32.Adware.Kryptik.h", "Trojan.Dropper", "Trojan.Win32.VB.cuvt", "Trojan.Win32.VB.dwthyt", "TrojWare.Win32.VBClone.CUV", "Trojan.VbCrypt.250", "BehavesLike.Win32.VBObfus.qz", "Trojan.Crypt", "Trojan/VB.czdk", "Trojan/Win32.VB.cuvt", "Troj.W32.VB.tnqI", "Trojan.Win32.VB.cuvt", "TScope.Trojan.VB", "Win32/VBClone.B" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Small.15973", "Win32.Trojan.WisdomEyes.16070401.9500.9775", "Trojan.Dropper", "TROJ_MICROJOIN.W", "Trojan.Win32.Small.dpzper", "TrojWare.Win32.TrojanProxy.Puma.jsjk", "Trojan.Celln", "TROJ_MICROJOIN.W", "Trojan-Proxy.Win32.Puma", "Trojan:Win32/Ditul.B", "Trojan.Heur.RP.ciWfayCj9ogb", "Trojan/Win32.Xema.C32762" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "This", "family", "showcases", "the", "amount", "of", "resources", "that", "malware", "authors", "now", "have", "to", "expend", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "When", "users", "try", "to", "close", "the", "ads", ",", "the", "new", "functionality", "causes", "already", "downloaded", "apps", "to", "run", "in", "a", "virtual", "machine", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "TrojanDownloader.Iterign.B3", "Trojan.Win32.FAUL.exlexh", "Packed:MSIL/SmartIL.A", "BehavesLike.Win32.Trojan.dc", "TR/Dropper.MSIL.hxupg", "Trojan.Razy.D1E910", "TrojanDownloader:MSIL/Iterign.B", "Trojan/Win32.ZBot.R139607", "Trj/GdSda.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Win32.Disabler!O", "WORM_DISABLER.SM", "Win32.Trojan.WisdomEyes.16070401.9500.9981", "W32.Glupzy.A", "WORM_DISABLER.SM", "Win.Trojan.Disabler-3", "Trojan.Win32.Disabler.i", "Trojan.Win32.Disabler.beace", "TrojWare.Win32.Disabler.~A", "Trojan.Flashy", "BehavesLike.Win32.Downloader.qz", "Trojan/Win32.Disabler", "Troj.W32.Disabler.tnvR", "Trojan.Win32.Disabler.i", "Worm/Win32.IRCBot.R53504", "Trojan.Disabler", "Win32/Disabler.I", "Trj/Flashy.B" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "In", "order", "to", "support", "network", "defenders,Fidelis", "Cybersecurity", "is", "offering", "a", "new,", "free", "data", "feed", "of", "verified", "indicators", "to", "support", "thedetection", "and", "mitigation", "of", "Pushdo." ]
[ 16, 16, 16, 16, 16, 4, 12, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3 ]
[ "The", "sample", "discussed", "was", "found", "during", "an", "incident", "response", "engagement", "in", "March", "2017." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 0, 8 ]
[ "At", "some", "point", "in", "his", "Google", "Play", "“", "career", "”", ",", "he", "apparently", "decided", "to", "increase", "his", "ad", "revenue", "by", "implementing", "adware", "functionality", "in", "his", "apps", "’", "code", "." ]
[ 16, 16, 16, 16, 16, 5, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Lowzones.A6", "Trojan.Zzinfor.1", "Trojan.Win32.Dwn.dndeiz", "TrojWare.Win32.Zzinfor.KQ", "Trojan.DownLoader12.14740", "Trojan.Win32.Spy", "Adware.Zzinfor/Variant", "Dropper/Win32.Injector.C189960" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.PWS.ZER", "Troj.Pws.Zer!c", "Trojan.PWS.ZER", "Win32.Trojan.WisdomEyes.16070401.9500.9954", "Trojan.Bitterbug", "Trojan.PWS.ZER", "Trojan.PWS.ZER", "Trojan.PWS.ZER", "BehavesLike.Win32.Dropper.ch", "TR/PSW.ZER", "Backdoor:Win32/Saluchtra.B!dha", "Spyware.Infostealer.FakeMS", "Win32.Trojan.Psw.Liqs", "Trojan.Bitterbug!", "Trojan.Win32.Bitterbug", "Trojan.PWS.ZER" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "One", "would", "think", "that", "this", "would", "result", "in", "widespread", "use,", "but", "instead", "it", "has", "only", "been", "found", "in", "limited", "areas." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "We", "observed", "many", "web", "landing", "pages", "that", "mimic", "the", "sites", "of", "mobile", "operators", "and", "which", "are", "used", "to", "spread", "the", "Android", "implants", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16 ]
[ "This", "malvertising", "attack", "preyed", "on", "visitors", "to", "sketchy", "websites", "offering", "anything", "from", "torrents", "of", "copyrighted", "movies,", "live", "streams", "of", "the", "latest", "flicks,", "or", "pirated", "software." ]
[ 16, 1, 9, 16, 16, 16, 16, 1, 9, 16, 16, 16, 1, 16, 1, 9, 9, 9, 16, 16, 1, 9, 16, 1, 9 ]
[ "Very", "active,", "we", "can", "now", "see", "~", "50k", "live", "scanner", "IPs", "daily." ]
[ 16, 16, 16, 16, 16, 16, 16, 1, 9, 9, 9, 9 ]
[ "Android", "ransomware", "that", "claims", "it", "has", "detected", "forbidden", "pornographic", "pictures", "on", "your", "device,", "says", "it", "has", "reported", "it", "to", "the", "FBI", "and", "asks", "you", "to", "pay", "a", "fine", "of", "$500." ]
[ 3, 11, 16, 16, 16, 16, 16, 1, 9, 9, 9, 9, 9, 16, 16, 16, 16, 16, 16, 16, 4, 16, 16, 16, 16, 1, 9, 9, 9, 9 ]
[ "So", "if", "you", "have", "Android", "4.4.4", "or", "some", "more", "recent", "version", "of", "this", "OS", "on", "your", "device", ",", "your", "chances", "of", "getting", "infected", "with", "Triada", "are", "significantly", "lower", "." ]
[ 16, 16, 16, 16, 5, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16 ]
[ "A", "Russian", "security", "firm", "'Doctor", "Web", "'", "identified", "the", "first", "mass", "distributed", "Android", "bootkit", "malware", "called", "'Android.Oldboot", "'", ",", "a", "piece", "of", "malware", "that", "'s", "designed", "to", "re-infect", "devices", "after", "reboot", ",", "even", "if", "you", "delete", "all", "working", "components", "of", "it", "." ]
[ 16, 16, 16, 16, 16, 4, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "TrojanDropper.Gepys.A", "Trojan.Kryptik.Win32.524542", "Trojan/Kryptik.banx", "Win32.Trojan.Kryptik.eg", "Trojan.Win32.Redirect.ctxvfh", "TrojWare.Win32.Kryptik.BANN", "Trojan.Redirect.147", "Trojan/ShipUp.km", "Trojan/Win32.Unknown", "Trojan:Win32/Gepys.A", "Trojan.Zusy.D404B9", "Trojan/Win32.Shipup.R65212", "Trojan-Downloader.Win32.Dofoil" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "These", "threat", "actors", "appear", "to", "be", "choosing", "the", "right", "apps", "–", "those", "that", "could", "be", "popular", "with", "locals", "in", "the", "region", ",", "at", "the", "right", "time", "–", "while", "tensions", "grow", "in", "this", "region", "of", "China", ",", "to", "ensure", "a", "good", "victim", "install-base", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "However", ",", "the", "trojan", "replaces", "the", "'=", "'", "by", "'AAAZZZXXX", "'", ",", "the", "'+", "'", "by", "'|", "'", "and", "the", "'/", "'", "by", "'", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "HW32.Packed.BCC5", "W32.Virut.G", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Win.Trojan.Foreign-502", "Trojan.DownLoader11.60294", "BehavesLike.Win32.Sality.cc", "Win32.Virut.eb.368640", "Trojan/Win32.Foreign.R131573", "Trojan-Ransom.Win32.Foreign" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "package", "name", "(", "vyn.hhsdzgvoexobmkygffzwuewrbikzud", ")", "and", "its", "many", "activities", "and", "services", "have", "randomized", "names", ",", "probably", "to", "make", "it", "a", "bit", "more", "difficult", "to", "detect", "the", "package", "using", "blacklisting", "." ]
[ 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "From", "the", "server", ",", "the", "Trojan", "receives", "commands", "(", "for", "example", ",", "to", "send", "SMS", ")", "and", "changes", "in", "the", "configuration", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Moreover", ",", "we", "retrieved", "his", "University", "ID", ";", "a", "quick", "googling", "showed", "some", "of", "his", "exam", "grades", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Strictor.D2148", "Win32.Trojan.WisdomEyes.16070401.9500.9567", "Trojan-Downloader.Win32.Perkesh", "HackTool[VirTool]/Win32.Unknown" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1 ]
[ "Check", "Point", "Research", "reported", "these", "dangerous", "apps", "to", "Google", "upon", "discovery", "." ]
[ 4, 12, 16, 16, 16, 16, 16, 16, 4, 16, 16, 16 ]
[ "CYBEREASON", "MOBILE", "Cybereason", "Mobile", "detects", "EventBot", "and", "immediately", "takes", "remediation", "actions", "to", "protect", "the", "end", "user", "." ]
[ 5, 13, 5, 13, 13, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "banking", "app", "test", ":", "the", "credentials", "as", "entered", "(", "left", ")", "and", "as", "available", "in", "the", "database", "(", "right", ")", "Second", ",", "we", "wrote", "a", "test", "message", "in", "an", "email", "client", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "exploit", "was", "delivered", "through", "a", "Microsoft", "Office", "document", "and", "the", "final", "payload", "was", "the", "latest", "version", "of", "FinSpy", "malware." ]
[ 3, 11, 16, 16, 16, 1, 9, 9, 9, 16, 16, 16, 3, 16, 16, 16, 16, 16, 3, 11 ]
[ "A", "backdoor", "also", "known", "as:", "W32.DomytnxASAAAC.Trojan", "Trojan.Locky.Win32.658", "Win32.Trojan.WisdomEyes.16070401.9500.9998", "W32/Trojan.KGRA-2902", "Ransom_HPLOCKY.SM4", "Trojan-Ransom.Win32.Locky.aoc", "Trojan.Win32.Encoder.eemdlz", "Trojan.Win32.Locky.288947", "Troj.Ransom.W32.Locky!c", "Trojan.Encoder.3976", "Ransom_HPLOCKY.SM4", "BehavesLike.Win32.MultiPlug.cc", "Trojan.Locky.aqx", "Trojan[Ransom]/Win32.Locky", "Trojan.Mikey.DC99C", "Trojan-Ransom.Win32.Locky.aoc", "TrojanDownloader:Win32/Terdot.A", "Trojan/Win32.Locky.C1503881", "Trojan-Ransom.Locky", "Trj/CI.A", "W32/Bebloh.K!tr", "Win32/Trojan.Ransom.2d2" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "MalwareBytes", "have", "been", "monitoring", "a", "malvertising", "campaign", "very", "closely", "as", "it", "really", "soared", "during", "the", "past", "week." ]
[ 4, 16, 16, 16, 16, 6, 14, 16, 16, 16, 16, 16, 16, 16, 16, 0, 8 ]
[ "With", "this", "information,", "an", "attacker", "can", "access", "a", "user's", "Google", "account", "data", "like", "Google", "Play,", "Google", "Photos,", "Gmail,", "Google", "Drive,", "and", "G", "Suite." ]
[ 16, 16, 16, 16, 6, 1, 9, 16, 16, 5, 13, 13, 16, 5, 13, 13, 13, 13, 13, 13, 16, 5, 13 ]
[ "A", "backdoor", "also", "known", "as:", "VBA/PowerShell.A", "Win.Trojan.PowerShell-8", "Trojan.Ole2.Vbs-heuristic.druvzi", "TrojanDownloader:O97M/Poseket.A", "HEUR.VBA.Trojan.e", "heur.macro.powershell.a" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "TR/Spammer.Z", "Trojan.Win32.Spammer.BZ", "Trojan.SpamTool", "SpamTool.KEM", "Trj/CI.A", "Win32/Trojan.Spammer.4de" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1 ]
[ "]", "230", "[", "." ]
[ 9, 9, 9, 9 ]
[ "The", "Executive", "Yuan", "Council", "evaluates", "statutory", "and", "budgetary", "bills", "and", "bills", "concerning", "martial", "law,", "amnesty,", "declaration", "of", "war,", "conclusion", "of", "peace", "and", "treaties,", "and", "other", "important", "affairs." ]
[ 4, 12, 12, 12, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Network", "activity", "BrainTest", "communicates", "with", "five", "servers", ":", "APK", "files", "provider", "(", "http", ":", "//psserviceonline", "[", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 9, 9, 9 ]
[ "Recently,", "we've", "seen", "information", "indicating", "that", "the", "scope", "of", "targets", "can", "be", "wider", "and", "is", "no", "longer", "limited", "to", "the", "entertainment", "business." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "This", "blog", "will", "discuss", "and", "uncover", "additional", "details", "regarding", "a", "recent", "campaign", "targeting", "entities", "in", "the", "Middle", "East." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 6, 16, 16, 16, 2, 10, 10 ]
[ "The", "Trojan", "also", "registered", "in", "Google", "Cloud", "Messaging", "(", "GCM", ")", ",", "meaning", "it", "could", "then", "receive", "commands", "via", "that", "service", "." ]
[ 16, 16, 16, 16, 16, 5, 13, 13, 13, 13, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "After", "the", "VM", "code", "has", "checked", "again", "the", "user", "environment", ",", "it", "proceeds", "to", "extract", "and", "execute", "the", "final", "un-obfuscated", "payload", "sample", "directly", "into", "winlogon.exe", "(", "alternatively", ",", "into", "explorer.exe", ")", "process", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 1, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "HackTool.Inject!QFG7kQRUHDk", "Trojan.VBInject!4947", "Malware_fam.NB", "Skodna.GameHack.CXD", "Trj/CI.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.FOverND.PE", "Virus.Win32.Sality!O", "W32.Sivis.A3", "Backdoor.Poison.Win32.87654", "Trojan/Kryptik.gace", "W32.Suviapen", "Packed.Win32.Krap.jc", "Trojan.Win32.Kespo.evacni", "Win32.HLLP.Kespo.4", "BehavesLike.Win32.Trojan.vh", "Packed.Krap.fzmh", "Trojan[Packed]/Win32.Krap", "Packed.Win32.Krap.jc", "Trojan-Ransom.Rokku", "RAT.Sakula" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]