tokens
sequencelengths
2
296
ner_tags
sequencelengths
2
296
[ "Network", "Security", "appliances", "such", "as", "Next-Generation", "Firewall", "(", "NGFW", ")", ",", "Next-Generation", "Intrusion", "Prevention", "System", "(", "NGIPS", ")", ",", "and", "Meraki", "MX", "can", "detect", "malicious", "activity", "associated", "with", "this", "threat", "." ]
[ 16, 16, 16, 16, 16, 5, 13, 16, 16, 16, 16, 5, 13, 13, 13, 16, 16, 16, 16, 16, 5, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Arande.A3", "Win32.Worm.VB.nr", "Trojan.Win32.VB.dibs", "Win32.Trojan.Vb.Wnwj", "Trojan.VB.Win32.116507", "Trojan/VB.cujo", "W32.Heuristic.Dkvt", "TR/Taranis.2367", "Trojan.Heur.E914A2", "Trojan.Win32.VB.dibs", "Trojan/Win32.VBKrypt.C956342", "Trojan.VB!SXP1KraqrZw", "Trojan.VB2" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "]", "cc/TiktokPro", "." ]
[ 9, 9, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Trupto", "TROJ_INJECTR.BUSZ", "Trojan.Win32.Buzus.yhkt", "Trojan.Win32.Buzus.ewiofb", "TROJ_INJECTR.BUSZ", "Trojan.Win32.Crypt", "W32/Trojan.ALBD-0280", "Trojan.Buzus.cni", "Trojan:Win32/Trupto.A", "Trojan.Win32.Buzus.yhkt", "Trj/CI.A", "Win32.Trojan.Inject.Auto" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Mobile", "users", "are", "called", "on", "to", "be", "on", "top", "of", "this", "news", "and", "be", "on", "guard", "for", "signs", "of", "monitoring", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "One", "chunk", "contains", "the", "entire", "malware", "DLL", "code", "(", "without", "PE", "headers", ")", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "To", "distribute", "the", "Trojan,", "cybercriminals", "log", "in", "to", "the", "vulnerable", "devices", "via", "the", "SSH", "protocol." ]
[ 16, 16, 16, 3, 6, 16, 16, 16, 16, 5, 13, 16, 16, 1, 9 ]
[ "Proofpoint", "researchers", "originally", "spotted", "the", "MarsJoke", "ransomware", "in", "late", "August", "by", "trawling", "through", "our", "repository", "of", "unknown", "malware." ]
[ 4, 12, 16, 16, 16, 3, 11, 16, 16, 0, 16, 16, 16, 16, 16, 16, 3, 11 ]
[ "]", "cendata", "[", "." ]
[ 9, 9, 9, 9 ]
[ "A", "backdoor", "also", "known", "as:", "W32.ReplaceMiKsLT.Fam.RSF", "Trojan-PWS/W32.Frethoq.34461.C", "Trojan-GameThief.Win32.Frethoq!O", "TrojanPWS.Lolyda.BF5", "Troj.GameThief.W32.OnLineGames.lnFT", "Trojan/OnLineGames.qbf", "TROJ_RVERSE.SMI", "Win32.Trojan-PSW.OLGames.i", "TROJ_RVERSE.SMI", "Win32.Trojan-Spy.Lolyda.A", "Trojan-GameThief.Win32.OnLineGames.ajqgf", "Trojan.Win32.Gamania.thvvt", "Trojan.Win32.A.Zbot.34461", "Trojan.PWS.Gamania.36445", "BehavesLike.Win32.PWSOnlineGames.nh", "TR/PSW.Lolyda.bfmna", "Trojan[GameThief]/Win32.Frethoq", "PWS:Win32/Lolyda.BF", "Trojan-GameThief.Win32.OnLineGames.ajqgf", "Trojan/Win32.OnlineGameHack.R21894", "BScope.Trojan.OLGames.4521", "Trojan.Zusy.DBE3", "Win32/PSW.OnLineGames.QBF", "Trojan.PSW.Win32.GamePass.a", "Trojan.PWS.OnLineGames!V9usvrFPqu0", "Trojan-PWS.Win32.Lolyda", "W32/OnLineGames.REV!tr", "Trojan.PSW.Win32.GameOnline.CO" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "msvcr90.dll", "file", "is", "opened", ",", "read", ",", "and", "decrypted", ",", "and", "the", "code", "execution", "control", "is", "transferred", "to", "the", "RunDll", "exported", "routine", "." ]
[ 16, 1, 9, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "group", "is", "known", "to", "use", "custom", "malware", "called", "Daserf,", "but", "also", "employs", "multiple", "commodity", "and", "custom", "tools,", "exploit", "vulnerabilities,", "and", "use", "social", "engineering", "techniques." ]
[ 6, 14, 16, 16, 16, 16, 3, 11, 16, 3, 16, 16, 16, 16, 16, 16, 3, 11, 11, 7, 16, 16, 16, 16, 16 ]
[ "The", "code", "never", "informed", "phone", "users", "that", "it", "was", "collecting", "that", "data", ",", "a", "behavior", "uniformly", "viewed", "by", "many", "as", "a", "serious", "security", "concern", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "]", "com/", "hxxp", ":", "//files.spamo", "[", "." ]
[ 9, 9, 1, 9, 9, 9, 9 ]
[ "Its", "targets", "include", "the", "military", "organizations", "and", "governments", "of", "countries", "with", "national", "interests", "in", "the", "South", "China", "Sea,", "including", "some", "within", "the", "U.S.", "defense", "industrial", "base." ]
[ 16, 16, 16, 16, 4, 12, 16, 4, 12, 12, 16, 16, 16, 16, 2, 10, 10, 10, 16, 16, 16, 16, 2, 10, 10, 10 ]
[ "It", "may", "be", "that", "these", "submissions", "are", "made", "from", "the", "author", "’", "s", "machine", ",", "or", "that", "they", "submit", "it", "to", "a", "detection", "service", "that", "in", "turn", "submits", "to", "online", "malware", "databases", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Once", "a", "matching", "intent", "is", "triggered", ",", "the", "respective", "Receiver", "code", "will", "be", "executed", ",", "leading", "to", "other", "HenBox", "behaviors", "being", "launched", ",", "which", "are", "described", "later", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Another", "important", "modification", "is", "in", "the", "message", "transfer", "process", ":", "With", "this", "modification", ",", "an", "application", "sends", "device", "location", "coordinates", "with", "every", "message", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Noancooe", "MSIL.Backdoor.Bladabindi.AM", "TR/Nanocore.dfari", "Trojan:MSIL/Noancooe.D!bit", "Trj/CI.A", "Worm.Win32.Ainslot" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1 ]
[ "FakeSpy", "package", "permissions", "." ]
[ 3, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/W32.Sasfis.4023296", "Trojan/Sasfis.bnyn", "Trojan.Strictor.DEB1C", "Win32.Trojan.WisdomEyes.16070401.9500.9554", "Backdoor.Graybird", "Win.Trojan.Yobdam-4", "Trojan-Dropper.Win32.Dapato.bwsw", "Trojan.Win32.Sasfis.diovf", "Trojan.MulDrop2.58470", "Backdoor.Yobdam.Win32.845", "BehavesLike.Win32.BadFile.wc", "Trojan/Buzus.awfr", "Trojan/Win32.Sasfis", "Trojan-Dropper.Win32.Dapato.bwsw", "Trojan/Win32.Injector.C1773", "SScope.Trojan.MBRLock.2121", "Trojan.Sasfis!aSW+l8me7nU" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "YOUR", "FILES", "WERE", "ENCRYPTED." ]
[ 1, 9, 9, 9 ]
[ "A", "backdoor", "also", "known", "as:", "Infostealer.Lineage", "Win32.Trojan.WisdomEyes.16070401.9500.9998", "W32/Nilage.XS", "Infostealer.Lineage", "Trojan-GameThief.Win32.Nilage.bdm", "W32.W.Bagle.kZt7", "Trojan.PWS.Lineage.9841", "BehavesLike.Win32.Pate.pc", "Trojan-PWS.Win32.Delf", "W32/Nilage.KWZM-6493", "Trojan/PSW.Nilage.auz", "Trojan[GameThief]/Win32.Magania", "Trojan-GameThief.Win32.Nilage.bdm", "Trojan/Win32.OnlineGameHack.R24518", "PWS-Gamania.dll", "Infostealer.Lineage", "MalwareScope.Trojan-PSW.Game.13", "Trojan.PWS.Nilage!v/lUmVrQ3Ac" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "According", "to", "X-Force", "research,", "the", "new", "banking", "Trojan", "emerged", "in", "the", "wild", "in", "September", "2017,", "when", "its", "first", "test", "campaigns", "were", "launched." ]
[ 16, 16, 4, 12, 16, 16, 3, 11, 16, 16, 16, 16, 16, 0, 8, 16, 16, 6, 14, 14, 16, 16 ]
[ "The", "focus", "of", "this", "blog", "post", "is", "MiKey,", "a", "little-known", "and", "poorly", "detected", "keylogger." ]
[ 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 3 ]
[ "\"", "Due", "to", "the", "special", "RAM", "disk", "feature", "of", "Android", "devices", "'", "boot", "partition", ",", "all", "current", "mobile", "antivirus", "products", "in", "the", "world", "ca", "n't", "completely", "remove", "this", "Trojan", "or", "effectively", "repair", "the", "system", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "This", "post", "will", "use", "the", "PlugX", "malware", "as", "an", "example", "PlugX", "is", "well", "known", "and", "has", "had", "its", "various", "iterations", "analyzed", "many", "times,", "due", "in", "part", "to", "its", "ongoing", "activity", "and", "will", "focus", "on", "leveraging", "metadata", "from", "VirusTotal", "due", "to", "it", "being", "publicly", "accessible." ]
[ 16, 16, 16, 16, 16, 3, 11, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "HW32.Packed.5FA3", "Trojan.Glox", "Infostealer.Gampass", "Packed.Win32.MUPACK.~KW", "BehavesLike.Win32.Spybot.dc", "Trojan/Win32.ADH", "Trj/Pupack.A", "Win32.Trojan.Xed.Dzkj" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "If", "the", "package", "name", "of", "the", "foreground", "app", "is", "included", "in", "the", "target", "list", ",", "an", "overlay", "is", "shown", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Figure", "1", "." ]
[ 16, 16, 16 ]
[ "Maktub", "Locker", "is", "another", "ransomware", "that", "comes", "with", "a", "beautifully", "designed", "GUI", "and", "few", "interesting", "features." ]
[ 3, 11, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "It", "adds", "the", "file", "extension", ".AnubisCrypt", "to", "each", "encrypted", "file", "and", "sends", "it", "to", "the", "C2", "." ]
[ 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "checkApps", ":", "Asks", "the", "malware", "to", "see", "if", "the", "packages", "sent", "as", "parameters", "are", "installed", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Disguised", "Spyware", "Uploaded", "on", "Google", "Play", "Store", "We", "identified", "previously", "unknown", "spyware", "apps", "being", "successfully", "uploaded", "on", "Google", "Play", "Store", "multiple", "times", "over", "the", "course", "of", "over", "two", "years", "." ]
[ 16, 16, 16, 16, 5, 13, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "This", "is", "done", "by", "reading", "the", "/proc/", "[", "pid", "]", "/cmdline", "file", "." ]
[ 16, 16, 16, 16, 16, 16, 1, 9, 9, 9, 9, 16, 16 ]
[ "That", "is", "why", "Microsoft", "has", "been", "working", "to", "extend", "its", "industry-leading", "endpoint", "protection", "capabilities", "beyond", "Windows", "." ]
[ 16, 16, 16, 4, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16 ]
[ "For", "example", ",", "going", "back", ",", "going", "home", ",", "opening", "recents", ",", "etc", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Packed.Win32.CPEX-based!O", "Trojan.Delfinject.16926", "PWS-LDPinch.a!hv", "Trojan.Buzus.Win32.2199", "Trojan/Buzus.rrb", "TROJ_FAM_0001199.TOMA", "Win32.Trojan.WisdomEyes.16070401.9500.9967", "Win32/Lunibot.B", "TROJ_FAM_0001199.TOMA", "Win.Trojan.Buzus-2288", "Packed.Win32.CPEX-based.eq", "Trojan.Win32.CPEXbased.bejytp", "Trojan.Win32.Buzus.374868", "Win32.Trojan.Dovqplay.clht", "TrojWare.Win32.TrojanDropper.Binder.G", "BackDoor.Poison.61", "BehavesLike.Win32.SoftPulse.tc", "Virus.Win32.DelfInject", "W32/Trojan2.CYTZ", "Trojan/Buzus.puv", "Trojan[Packed]/Win32.CPEX-based", "Backdoor:Win32/Mielit.A", "Packed.Win32.CPEX-based.eq", "Trojan/Win32.Xema.R44960", "BScope.Binder.Buzus.er", "W32/Buzus.BZ.worm", "VirTool.DelfInject!GapcEdmyxw8", "W32/Injector.fam!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.XinarilD.Trojan", "Trojan.Zusy.D26766", "Trojan.Win32.Zusy.exkztw", "W32/Trojan.HJTJ-8943", "Trojan/Scar.bmgw", "TR/Zusy.2726400", "Trojan:Win64/SvcMiner.A", "Trojan.Win32.Z.Zusy.2726400.CY", "Backdoor.Bot", "Trj/CI.A", "Trojan.Scar!zCrXbtgxLOk", "Win32/Trojan.e88" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "In", "this", "post,", "we", "will", "focus", "on", "the", "mobile", "part", "of", "their", "operation", "and", "discuss", "in", "detail", "several", "Android", "and", "BlackBerry", "apps", "they", "are", "using." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 6, 16, 16, 16, 16, 16, 5, 16, 5, 13, 16, 16, 16 ]
[ "Unit", "42", "researchers", "identified", "a", "new", "OS", "X", "Trojan", "associated", "with", "the", "Sofacy", "group", "that", "we", "are", "now", "tracking", "with", "the", "Komplex'", "tag", "using", "the", "Palo", "Alto", "Networks", "AutoFocus", "threat", "intelligence", "platform." ]
[ 4, 12, 12, 16, 16, 16, 5, 13, 3, 16, 16, 16, 6, 14, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 4, 12, 12, 5, 13, 13, 13 ]
[ "We", "are", "accustomed", "to", "seeing", "this", "gate", "operate", "directly", "from", "typical'", "compromised", "websites,", "but", "not", "so", "much", "from", "ad", "serving", "ones." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9959", "Trojan.Win32.Yuzi.euhfho", "Backdoor.Yuzi", "W32/Trojan.UPLJ-0202", "BDS/Yuzi.lbwpa", "Trojan.Win32.Z.Ursu.91648", "Backdoor:MSIL/Yuzi.A", "Trj/GdSda.A", "Win32/Trojan.fd2" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "In", "addition", "to", "Russia,", "targeted", "regions", "include", "neighboring", "countries", "such", "as", "Mongolia,", "Belarus,", "and", "other", "European", "countries." ]
[ 16, 16, 16, 2, 16, 16, 16, 16, 2, 16, 16, 2, 10, 16, 16, 2, 10 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Klevate.S3", "Trojan.Webprefix.Win32.62419", "Trojan.Dropper.104", "Win32.Trojan.Webprefix.a", "W32/WebPrefix.A", "Trojan.Win32.Webprefix.crgiyt", "Backdoor.W32.Androm.mCpQ", "TrojWare.Win32.Sisron.C", "BackDoor.Bulknet.1328", "BehavesLike.Win32.Trojan.cc", "W32/Application.KRYM-8973", "TrojanDownloader.Klevate.a", "Win32.Trojan-Dropper.Dlpro.A", "Trojan/Win32.Zbot.R94414", "Win32/Webprefix.D", "W32/Webprefix.B!tr", "Trj/CI.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "For", "example", ",", "if", "an", "infected", "device", "is", "connected", "to", "a", "public", "Wi-Fi", "network", "any", "other", "host", "will", "be", "able", "to", "obtain", "a", "terminal", "on", "the", "device", "without", "any", "form", "of", "authentication", "or", "verification", "by", "simply", "connecting", "to", "the", "port", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "It", "is", "therefore", "impossible", "to", "decode", "the", "communication", "if", "one", "wasn't", "listening", "right", "from", "its", "beginning." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan-Banker.Win32.BHO!O", "Win32.Trojan.WisdomEyes.16070401.9500.9988", "Backdoor.Ratenjay", "Trojan-Downloader.Win32.VB.ifws", "Trojan.DownLoader5.54023", "Trojan.Kazy.DE581", "Trojan-Downloader.Win32.VB.ifws", "Downloader/Win32.Banload.C62226", "Trojan-Downloader.Win32.Bancos" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "new", "malware", "appears", "to", "be", "linked", "to", "the", "infamous", "Wolf", "Research", "organization", "and", "targets", "Android", "devices", "located", "in", "Thailand", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 12, 16, 16, 16, 5, 16, 16, 16, 16, 16 ]
[ "So", ",", "what", "can", "you", "do", "to", "protect", "yourself", "from", "this", "stealthy", "beast", "?", "1", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "EventBot", "uses", "multiple", "methods", "to", "exploit", "accessibility", "events", "for", "webinjects", "and", "other", "information", "stealing", "purposes", "." ]
[ 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "]", "today", ":", "Som", "Tum", "We", "also", "identified", "comments", "in", "Thai", "on", "the", "C2", "infrastructure", "mentioned", "in", "the", "previous", "chapter", ":", "MALWARE", "DenDroid", "The", "Android", "malware", "is", "based", "on", "the", "DenDroid", "Android", "malware", "." ]
[ 9, 9, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 5, 16, 16, 16, 16, 16, 3, 16, 16, 16 ]
[ "According", "to", "our", "research", ",", "TrickMo", "is", "still", "under", "active", "development", "as", "we", "expect", "to", "see", "frequent", "changes", "and", "updates", "." ]
[ 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "]", "it", "Firenze", "server4fi.exodus.connexxa", "[", "." ]
[ 9, 9, 16, 1, 9, 9 ]
[ "The", "Zen", "trojan", "does", "not", "implement", "any", "kind", "of", "obfuscation", "except", "for", "one", "string", "that", "is", "encoded", "using", "Base64", "encoding", "." ]
[ 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Based", "on", "our", "KSN", "statistics", ",", "there", "are", "several", "infected", "individuals", ",", "exclusively", "in", "Italy", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32/HLLW.Std.B", "Worm/STD.B", "W32/Std.18437", "Win32/HLLP.Std.B", "Worm.STD.A", "I-Worm.STD.B.nw5", "Email-Worm.Win32.STD.B", "I-Worm/STD.b", "Email-Worm.Win32.Std.B", "W32/HLLW.Std.B" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "It", "is", "unclear", "if", "the", "remote", "server", "is", "capable", "of", "solving", "the", "CAPTCHA", "image", "automatically", "or", "if", "this", "is", "done", "manually", "by", "a", "human", "in", "the", "background", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "end", "payload", "that", "was", "installed", "is", "the", "HttpBrowser", "RAT,", "known", "to", "be", "used", "by", "the", "Chinese", "group", "in", "previous", "targeted", "attacks", "against", "governments." ]
[ 16, 16, 3, 16, 16, 16, 16, 16, 1, 3, 16, 16, 16, 16, 16, 6, 14, 14, 16, 16, 16, 1, 16, 4 ]
[ "This", "Trojan", "is", "interesting", "due", "to", "its", "ability", "to", "steal", "logins,", "passwords,", "and", "other", "confidential", "data", "by", "displaying", "fraudulent", "authentication", "forms", "on", "top", "of", "any", "applications." ]
[ 16, 3, 16, 16, 16, 16, 16, 16, 16, 1, 9, 9, 16, 16, 1, 9, 16, 1, 9, 9, 16, 16, 16, 16, 16, 5 ]
[ "It", "appears", "the", "purpose", "of", "the", "new", "Disttrack", "samples", "were", "solely", "focused", "on", "destruction,", "as", "the", "samples", "were", "configured", "with", "a", "non-operational", "C2", "server", "to", "report", "to", "and", "were", "set", "to", "begin", "wiping", "data", "exactly", "on", "2016/11/17", "20:45." ]
[ 16, 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 16, 16, 1, 16, 16, 16, 16, 1, 9, 9, 9, 9, 9, 16, 16, 16, 16, 16, 16, 16, 4, 12, 12, 16, 16, 0, 8 ]
[ "Kazuar", "includes", "a", "highly", "functional", "command", "set,", "which", "includes", "the", "ability", "to", "remotely", "load", "additional", "plugins", "to", "increase", "the", "Trojan's", "capabilities." ]
[ 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 9, 9, 16, 16, 16, 3, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.FakeSvchostsysLnrA.Trojan", "Win32.Trojan.WisdomEyes.16070401.9500.9849", "Trojan.Win32.Downloader.40960.TR", "Trojan.Win32.Swisyn", "W32/Trojan.UTND-0495", "Downloader/Win32.OnlineGameHack.R3893", "Trj/CI.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1 ]
[ "However,", "many", "of", "these", "malware", "are", "fileless", "only", "while", "entering", "a", "user's", "system,", "as", "they", "eventually", "reveal", "themselves", "when", "they", "execute", "their", "payload." ]
[ 16, 16, 16, 16, 3, 16, 3, 16, 16, 16, 5, 13, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Skeeyah.9109", "Trojan.Injector", "BKDR_RMTSVC.V", "W32/Trojan.FQOB-6520", "BKDR_RMTSVC.V", "Trojan.Win32.Pincav.darg", "Trojan.Win32.Pincav.dmwojx", "Troj.W32.Pincav!c", "Trojan.Inject1.50635", "Trojan.Pincav.Win32.24903", "BehavesLike.Win32.Dropper.gc", "Trojan.Pincav.um", "Trojan.Win32.Pincav.darg", "Backdoor:Win32/Rmtsvc.C!bit", "Trojan.Pincav", "Win32.Trojan.Pincav.Akpm", "Trojan.Pincav!MRbJOfrjW/0", "Backdoor.Win32.RmtSvc", "W32/Pincav.B!tr", "Win32/Trojan.84c" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.Hupigon.Win32.133953", "Win32.Trojan.WisdomEyes.16070401.9500.9985", "W32/QQRob.LP", "Trojan.PWS.QQPass", "Win32/AdClicker.UB", "Backdoor.Win32.Hupigon.olbg", "Trojan.Win32.Hupigon.eajxbh", "Trojan.PWS.Qqrobber.155", "trojan.win32.dorv.a", "PWS-Gamania.dll", "W32/QQRob.TWJB-5358", "Trojan/PSW.QQRobber.iu", "DR/PSW.QQRob.V.2", "Trojan[Backdoor]/Win32.Hupigon", "Trojan.Heur.PT.E044E0", "Trojan/Win32.Pwstealer.C63180", "PWS-Gamania.dll", "Win32/PSW.QQRob.NAH", "Backdoor.Win32.Hupigon", "Win32/Cekar.G", "Trj/CI.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "This", "sample", "displayed", "ads", "from", "various", "sources", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Method", "onPostExecute", ":", "to", "handle", "instructions", "from", "remote", "C2", "Figure", "6", "shows", "an", "example", "response", "sent", "back", "from", "one", "C2", "server", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Content", "of", "bdata.xml", "file", ":", "It", "can", "be", "added", "to", "the", "/system/etc/sysconfig/", "path", "to", "allowlist", "specified", "implant", "components", "from", "the", "battery", "saving", "system", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "As", "spotted", "by", "FireEye", "on", "2015-04-17,", "Angler", "EK", "is", "now", "taking", "advantage", "of", "a", "vulnerability", "patched", "with", "the", "last", "version", "of", "Flash", "Player", "17.0.0.169" ]
[ 16, 16, 16, 4, 16, 0, 6, 14, 16, 16, 16, 16, 16, 16, 7, 16, 16, 16, 16, 16, 16, 5, 13, 16 ]
[ "In", "the", "first", "of", "our", "series", "on", "the", "dark", "web,", "Cyble", "uncovered", "a", "new", "strain", "of", "InfoStealer", "malware", "targeting", "Cryptocurrency", "users", "via", "phishing", "sites", "and", "YouTube", "channels,", "as", "well", "as", "the", "source", "code", "and", "GitHub", "repository." ]
[ 16, 16, 16, 16, 16, 16, 16, 6, 14, 14, 4, 16, 16, 3, 11, 16, 3, 11, 16, 4, 12, 16, 1, 9, 16, 4, 12, 16, 16, 16, 1, 9, 9, 16, 5, 13 ]
[ "This", "newest", "entry", "seems", "to", "indicate", "that", "these", "changes", "won", "’", "t", "be", "stopping", "soon", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "In", "April", "2017,", "the", "Cisco", "Talos", "team", "disclosed", "the", "Scarcruft", "group's", "proprietary", "tool,", "ROKRAT,", "a", "malware", "that", "has", "been", "continuously", "modified", "and", "used", "by", "the", "group", "to", "this", "day." ]
[ 16, 0, 8, 16, 4, 12, 12, 16, 6, 14, 14, 16, 16, 3, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 6, 14, 16, 16, 0 ]
[ "com.xiaomi.smarthome.receive_alarm", "Received", "notifications", "from", "Xiaomi", "’", "s", "smart", "home", "IoT", "devices", "." ]
[ 1, 16, 16, 16, 4, 16, 16, 16, 16, 16, 16, 16 ]
[ "Its", "malicious", "code", "is", "located", "in", "a", "Mach-O", "object", "file", "that", "was", "repackaged", "into", "some", "versions", "of", "Xcode", "installers." ]
[ 16, 3, 11, 16, 16, 16, 16, 1, 9, 9, 16, 16, 16, 16, 16, 16, 16, 5, 13 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.Win32.VB!O", "TROJ_GE.C2A90427", "Multi.Threats.InArchive", "W32/Rewdulon.A", "TROJ_GE.C2A90427", "Win.Trojan.Dentenspy-1", "Trojan.Win32.VB.pbucu", "Trojan.WinSpy.1721", "Trojan.VB.Win32.74988", "W32/Rewdulon.RWFU-0950", "TrojanSpy.VB.eqx", "TR/Proxy.VB.mm", "Trojan[Proxy]/Win32.VB", "Backdoor:Win32/Rewdulon.A", "Trojan.Heur.VP2.EA6021", "Trojan/Win32.Winspy.R17397", "TrojanProxy.VB", "Win32/Spy.VB.NPF", "Trojan.PR.VB!L9iJM/+WFQY", "Trojan-Proxy.Win32.VB", "Trj/CI.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Android.Trojan.FakeInst.L", "Android.FakeNotify.A", "Android.Trojan.FakeInst.L", "Android.Trojan.FakeInst.L", "HEUR:Trojan-SMS.AndroidOS.Opfake.bo", "A.H.Pay.Emugo.L", "Trojan.Android.Opfake.dtqjss", "Android.Malware.Trojan", "Trojan:Android/FakeNotify.A", "Trojan[SMS]/Android.Opfake", "Android.Trojan.FakeInst.L", "HEUR:Trojan-SMS.AndroidOS.Opfake.bo", "Android-Trojan/SmsSend.837f", "Trojan.AndroidOS.FakeInst.D", "Trojan.AndroidOS.MalCrypt" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "new", "spear", "phishing", "campaign", "is", "targeting", "Saudi", "Arabia", "governmental", "organizations." ]
[ 16, 16, 6, 14, 14, 16, 16, 2, 10, 4, 12 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Graftor.D25EAD", "Win32.Trojan.WisdomEyes.16070401.9500.9841", "Backdoor.Trojan", "BKDR_SMALL.W", "Win.Trojan.Coreshell-1", "Trojan.Win32.Metlar.hmosd", "Trojan.Click2.7627", "BKDR_SMALL.W", "BDS/Metlar.A", "Backdoor:Win32/Metlar.A", "W32/Small.W!tr.bdr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.Blackmail.Worm", "Win32.Worm.Killav.GR", "Worm/W32.Nyxem.65024.B", "Email-Worm.Win32.Nyxem!O", "Worm.Nyxem", "W32/MyWife.d@MM!M24", "W32/VB.bi", "WORM_NYXEM.E", "Win32.Worm.VB.sy", "W32/Kapser.A@mm", "W32.Blackmal.E@mm", "Win32/Blackmal.F!CME24", "WORM_NYXEM.E", "Win.Worm.Nyxem-7", "Email-Worm.Win32.Nyxem.e", "Win32.Worm.Killav.GR", "Trojan.Win32.Nyxem.wcrgf", "W32.W.Nyxem.lNe6", "Win32.Worm-email.Nyxem.Syhr", "Win32.Worm.Killav.GR", "Worm.Win32.VB.NEI", "Email-Worm:W32/Nyxem.E", "BehavesLike.Win32.Worm.kc", "W32/Kapser.KOCX-1196", "I-Worm/VB.g", "WORM/KillAV.GR", "Worm[Email]/Win32.Nyxem", "Worm:Win32/Mywife.E@mm!CME24", "Win32.Worm.Killav.GR", "I-Worm.Win32.Nyxem.E", "Win32.Worm.Killav.GR", "Worm/Win32.Nyxem.R67250", "Win32.Worm.Killav.GR", "Email-Worm.VB", "Win32/VB.NEI", "Worm.P2P.VB.CIL!CME-24", "Win32.Worm.Killav.GR", "W32/Nyxem.E@mm", "W32/Tearec.A.worm!CME-24", "Trojan.Win32.KillAV.AG" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "AIT:Trojan.Nymeria.219", "Trojan.Fsysna", "AIT:Trojan.Nymeria.219", "W32/Trojan.KHZX-2886", "Trojan.Win32.Fsysna.epqb", "AIT:Trojan.Nymeria.219", "Trojan.Win32.Fsysna.eusaby", "AIT:Trojan.Nymeria.219", "AIT:Trojan.Nymeria.219", "Trojan.Fsysna.Win32.15287", "Trojan.Win32.Autoit", "TR/Fsysna.vdzaj", "AIT:Trojan.Nymeria.219", "Trojan.Win32.Fsysna.epqb", "Trojan:Win32/Enotdap.A", "Trojan/Win32.Fsysna.C2239375", "Trj/CI.A", "Win32.Trojan.Fsysna.Iiu", "W32/Autoit.CK!tr.spy", "Win32/Trojan.623" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "In", "April,", "the", "new", "Infostealer", "family", "of", "Spanish", "origin", "was", "first", "noted", "targeting", "users", "in", "the", "U.S.", "and", "Mexico." ]
[ 16, 0, 16, 16, 3, 11, 16, 2, 10, 16, 16, 16, 4, 12, 16, 2, 10, 16, 2 ]
[ "The", "operation", "uses", "known", "and", "patched", "exploits", "to", "deliver", "a", "custom", "backdoor", "known", "as", "KeyBoy." ]
[ 6, 14, 16, 16, 16, 7, 15, 16, 16, 16, 16, 11, 16, 16, 3 ]
[ "It", "was", "late", "2018", "when", "Riltok", "climbed", "onto", "the", "international", "stage", "." ]
[ 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16 ]
[ "The", "variant", "is", "highly", "targeted,", "digitally", "signed,", "and", "exfiltrates", "stolen", "payment", "card", "data", "over", "DNS." ]
[ 16, 3, 16, 1, 9, 9, 9, 16, 1, 9, 9, 9, 9, 16, 5 ]
[ "]", "top/", "Oct", "17", ",", "2017", "hxxp", ":", "//online.bankaustria.at.id87721", "[", "." ]
[ 9, 9, 16, 16, 16, 16, 1, 9, 9, 9, 9 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Dropper.Snuff.A", "Win32.TrojanDropper.Snuff.A.2", "Trojan/Dropper.FC.a", "Trojan.DR.FC!ID4WOR5KQxg", "Win32/TrojanDropper.FC.A", "Backdoor.Trojan.dr", "W32/FC.Y", "Win32/TrojanRunner.I", "TROJ_DROPPER.ACU", "Win32.TRFC.A", "Trojan-Dropper.Win32.FC.a", "Trojan.Dropper.Snuff.A", "Virus.Win32.Trojano.421!IK", "TrojWare.Win32.TrojanDropper.FC.A", "Trojan.Dropper.Snuff.A", "BackDoor.Bifrost.14965", "TR/FC.A", "TROJ_DROPPER.ACU", "TrojanDropper.Win32.FC", "TrojanDropper:Win32/Snuff.A", "Trojan.Win32.FC.21040", "Trojan.Dropper.Snuff.A", "Dropper/FC.4096", "Trojan-Dropper.Win32.FC.a", "Backdoor.Trojan", "Harm.SysCrash", "Virus.Win32.Trojano.421", "W32/Fc.A!tr", "Dropper.Tiny.K", "Trj/MultiDrp.AF" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Mauvaise.SL1", "Trojan.Zusy.D3A031", "Trojan.Kwampirs", "TROJ_KWAMPIRS.SMJK", "Trojan.Win32.Bedep.az", "TROJ_KWAMPIRS.SMJK", "BehavesLike.Win32.BadFile.dm", "Trojan.Win32.Kwampirs", "Trojan.Bedep.u", "TR/Crypt.ZPACK.sfqtf", "Trojan.Win32.Bedep.az", "Trojan/Win32.Bedep.R199961", "Trojan.Bedep", "Trojan.Injector", "Trj/GdSda.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "When", "done", ",", "the", "bot", "is", "functional", "and", "ready", "to", "receive", "commands", "and", "perform", "overlay", "attacks", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "From", "these", "reports,", "we", "know", "that", "the", "group", "uses", "an", "abundance", "of", "tools", "and", "tactics,", "ranging", "across", "zero-day", "exploits", "targeting", "common", "applications", "such", "as", "Java", "or", "Microsoft", "Office,", "heavy", "use", "of", "spear-phishing", "attacks,", "compromising", "legitimate", "websites", "to", "stage", "watering-hole", "attacks,", "and", "targeting", "over", "a", "variety", "of", "operating", "systems", "–", "Windows,", "OSX,", "Linux,", "even", "mobile", "iOS." ]
[ 16, 16, 16, 16, 16, 16, 16, 6, 16, 16, 16, 16, 3, 16, 16, 16, 16, 7, 15, 16, 16, 5, 16, 16, 5, 16, 5, 13, 16, 16, 16, 1, 9, 9, 9, 9, 16, 16, 1, 9, 16, 16, 16, 16, 16, 16, 5, 13, 16, 5, 13, 13, 16, 5, 13 ]
[ "The", "algorithm", "for", "generating", "the", "lowest-level", "domain", "name", "was", "hardwired", "in", "the", "Trojan", "’", "s", "code", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.HfsAutoB.4D03", "Trojan.Zenshirsh.SL7", "Win32.Trojan.WisdomEyes.16070401.9500.9639", "Trojan.Win32.TPM.eslggg", "BehavesLike.Win32.PWSZbot.cc", "Trojan.Heur.RP.ZyWaayyb2wki", "Trojan.Win32.Z.Ircbot.839168.A", "Win32.Trojan.Crypt.Hqux", "Trojan.Themida!", "Trojan-PWS.OnlineGames", "Trj/CI.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "cecilia-gilbert", "[", "." ]
[ 1, 9, 9 ]
[ "C2", "and", "Targeted", "Banks", "As", "described", "earlier", ",", "the", "C2", "domain", "is", "kept", "in", "the", "app", "’", "s", "resources", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "If", "not", ",", "the", "response", "is", "scrubbed", "of", "the", "strings", "used", "to", "complete", "the", "billing", "fraud", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan-Downloader.Win32.Gamarue.2!O", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "BKDR_PROTUX.SMZKEB-G", "Trojan.Win32.RedCap.exxfqg", "Trojan.Win32.Z.Zusy.8916480", "Trojan.MulDrop7.62734", "Trojan.Banbra.Win32.27829", "BKDR_PROTUX.SMZKEB-G", "W32/Trojan.CPEN-4136", "TR/RedCap.xslwz", "Trojan.Symmi.D1461E", "Trojan/Win32.Comnie.R209069", "Trojan.Drnohell", "Trj/CI.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/W32.Bublik.274432.B", "Backdoor.Win32.Caphaw", "Trojan.Symmi.D1465", "Win32.Trojan.WisdomEyes.16070401.9500.9995", "W32/Trojan.ELRU-2307", "Trojan.Win32.Caphaw.exkhwo", "Trojan.Win32.A.Bublik.274432.D", "BackDoor.Caphaw.2", "BehavesLike.Win32.PWSZbot.dh", "Trojan.Win32.Bublik", "Trojan/Bublik.ank", "Backdoor:Win32/Caphaw.D", "Trojan/Win32.Bublik.R46085", "Backdoor.Win32.Caphaw", "SScope.Backdoor.Caphaw.A", "Win32/Trojan.144" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "]", "net", "." ]
[ 9, 9, 16 ]
[ "VICTIMOLOGY", "ON", "THE", "IDENTIFIED", "CAMPAIGNS", "The", "campaigns", "we", "analyzed", "targeted", "Android", "devices", "in", "Thailand", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16 ]
[ "HenBox", "Enters", "the", "Uyghur", "App", "Store", "In", "May", "2016", ",", "a", "HenBox", "app", "was", "downloaded", "from", "uyghurapps", "[", "." ]
[ 3, 16, 16, 5, 13, 13, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 1, 9, 9 ]