tokens
sequencelengths
2
296
ner_tags
sequencelengths
2
296
[ "The", "set", "of", "permissions", "required", "by", "Marcher", "according", "to", "the", "manifest", "is", "as", "follows", ":", "βˆ—", "android.permission.CHANGE_NETWORK_STATE", "(", "change", "network", "connectivity", "state", ")", "βˆ—", "android.permission.SEND_SMS", "(", "send", "SMS", "messages", ")", "βˆ—", "android.permission.USES_POLICY_FORCE_LOCK", "(", "lock", "the", "device", ")", "βˆ—", "android.permission.RECEIVE_BOOT_COMPLETED", "(", "start", "malware", "when", "device", "boots", ")", "βˆ—", "android.permission.INTERNET", "(", "communicate", "with", "the", "internet", ")", "βˆ—", "android.permission.VIBRATE", "(", "control", "the", "vibrator", ")", "βˆ—", "android.permission.ACCESS_WIFI_STATE", "(", "view", "information", "about", "the", "status", "of", "Wi-Fi", ")", "βˆ—", "android.permission.WRITE_SMS", "(", "edit/delete", "SMS", ")", "βˆ—", "android.permission.ACCESS_NETWORK_STATE", "(", "view", "the", "status", "of", "all", "networks", ")", "βˆ—", "android.permission.WAKE_LOCK", "(", "prevent", "the", "phone", "from", "going", "to", "sleep", ")", "βˆ—", "android.permission.GET_TASKS", "(", "retrieve", "running", "applications", ")", "βˆ—", "android.permission.CALL_PHONE", "(", "call", "phone", "numbers", ")", "βˆ—", "android.permission.WRITE_SETTINGS", "(", "read/write", "global", "system", "settings", ")", "βˆ—", "android.permission.RECEIVE_SMS", "(", "intercept", "SMS", "messages", ")", "βˆ—", "android.permission.READ_PHONE_STATE", "(", "read", "phone", "details", "of", "the", "device", "such", "as", "phone", "number", "and", "serial", "number", ")", "βˆ—", "android.permission.CHANGE_WIFI_STATE", "(", "connect", "to", "and", "disconnect", "from", "Wi-Fi", "networks", "and", "make", "changes", "to", "configured", "networks", ")", "βˆ—", "android.permission.READ_CONTACTS", "(", "read", "all", "contact", "data", ")", "*", "android.permission.READ_SMS", "(", "read", "SMS", "messages", ")", "Obviously", "a", "fairly", "significant", "list", "of", "permissions", "of", "which", "many", "are", "suspicious", ",", "especially", "when", "combined", "." ]
[ 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "In", "December", "2015,", "Chinese", "users", "reported", "they", "were", "infected", "by", "this", "malware." ]
[ 16, 0, 8, 4, 12, 16, 16, 16, 16, 16, 16, 3 ]
[ "We", "took", "a", "look", "at", "the", "malware", "specifically", "in", "the", "INOCNATION", "campaign", "to", "analyze", "what", "was", "new", "and", "different", "about", "the", "techniques", "used", "by", "the", "threat", "actor." ]
[ 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 6, 14, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 6, 14 ]
[ "New", "nodes", "are", "continually", "added", "as", "new", "victims", "are", "enlisted,", "and", "they", "are", "unpublished", "outside", "of", "the", "Terracotta", "user-base." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 5 ]
[ "With", "the", "prevalence", "of", "Google", "Android", "smartphones", "and", "the", "popularity", "of", "feature-rich", "apps,", "more", "and", "more", "people", "rely", "on", "smartphones", "to", "store", "and", "handle", "kinds", "of", "personal", "and", "business", "information", "which", "attracts", "adversaries", "who", "want", "to", "steal", "that", "information." ]
[ 16, 16, 16, 16, 4, 5, 13, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 1, 9, 9, 9, 16, 16, 6, 16, 16, 16, 1, 9, 9 ]
[ "July", "28", "A", "recent", "campaign", "compromised", "Taiwan", "and", "Hong", "Kong", "sites", "to", "deliver", "Flash", "exploits", "related", "to", "Hacking", "Team", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 4, 12, 16 ]
[ "Zen", "apps", "gain", "access", "to", "root", "permissions", "from", "a", "rooting", "trojan", "in", "its", "infection", "chain", "." ]
[ 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "TrojanPWS.Zbot.VA3", "Trojan.Tofsee", "Trojan/Injector.ccfi", "TROJ_HPVB.SM6", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Ransom.Kovter", "TROJ_HPVB.SM6", "Trojan.Win32.Inject.wlzt", "Trojan.Win32.Inject.dwzyvq", "Troj.W32.Inject.tnFQ", "Trojan.Kovter.69", "Trojan.Inject.Win32.168460", "Trojan.Win32.Injector", "Trojan/Inject.baac", "Trojan/Win32.Inject", "Trojan.Symmi.DCC5C", "Trojan.Win32.Inject.wlzt", "Trojan/Win32.Kovter.R153629", "Trojan.Inject", "Trojan.Inject!3ypDMCpDv7Y", "W32/Injector.CEEO!tr", "Win32/Trojan.Dropper.43b" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Worm.Mytob", "Win32.Trojan.WisdomEyes.16070401.9500.9860", "W32/Trojan.DMPW-1529", "Net-Worm.Win32.Mytob.lsk", "Trojan.Win32.Win32.dchvpv", "Trojan.Win32.Z.Mytob.27648", "Net.Worm.W32.Mytob!c", "Trojan.Win32.Clicker!BT", "Worm/Mytob.als", "TR/Clicker.ofeiu", "Worm[Net]/Win32.Mytob", "Net-Worm.Win32.Mytob.lsk", "TrojanClicker:MSIL/Doviali.A", "Worm/Win32.Mytob.C84872", "Trojan.Win32.Clicker!BT", "Net-Worm.Mytob", "Trojan.MSIL.TrojanClicker", "W32/MyTob.A!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "After", "the", "profile", "is", "downloaded", ",", "the", "iOS", "system", "will", "first", "ask", "users", "to", "review", "the", "profile", "in", "their", "settings", "if", "they", "want", "to", "install", "it", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Top", "20", "countries", "targeted", "by", "Hummingbad/Shedun", "." ]
[ 16, 16, 16, 16, 16, 3, 16 ]
[ "We", "encourage", "Android", "users", "to", "validate", "whether", "their", "accounts", "have", "been", "breached", "." ]
[ 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Trend", "Micro", "detects", "this", "as", "ANDROIDOS_SOCKSBOT.A", "and", "has", "found", "at", "least", "3,000", "Trojanized", "apps." ]
[ 4, 12, 16, 16, 16, 1, 16, 16, 16, 16, 16, 3, 11, 11 ]
[ "Communication", "between", "both", "Trojans", "and", "their", "C", "&", "C", "servers", "is", "based", "on", "the", "same", "principle", ",", "the", "relative", "addresses", "to", "which", "Trojans", "send", "network", "requests", "are", "generated", "in", "a", "similar", "manner", ",", "and", "the", "set", "of", "possible", "commands", "that", "the", "two", "Trojans", "can", "perform", "also", "overlaps", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "This", "post", "analyzes", "targeted", "malware", "attacks", "against", "groups", "in", "the", "Tibetan", "diaspora", "and", "pro-democracy", "groups", "in", "Hong", "Kong." ]
[ 16, 16, 16, 16, 3, 11, 16, 16, 16, 16, 2, 10, 16, 2, 10, 10, 10, 10 ]
[ "We", "believe", "that", ",", "when", "it", "is", "officially", "released", ",", "it", "will", "most", "likely", "be", "uploaded", "to", "rogue", "APK", "stores", "and", "other", "shady", "websites", ",", "while", "masquerading", "as", "real", "applications", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "This", "particular", "strain", "of", "Adware", "was", "found", "in", "206", "applications", ",", "and", "the", "combined", "download", "count", "has", "reached", "almost", "150", "million", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "]", "com", "overlaps", "with", "PlugX", ",", "Zupdax", ",", "and", "Poison", "Ivy", "malware", "families", "discussed", "in", "more", "detail", "later", "." ]
[ 9, 9, 16, 16, 3, 16, 3, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "In", "October", "2015", "the", "Callisto", "Group", "targeted", "a", "handful", "of", "individuals", "with", "phishing", "emails", "that", "attempted", "to", "obtain", "the", "target's", "webmail", "credentials." ]
[ 16, 0, 8, 6, 14, 14, 16, 16, 16, 16, 4, 16, 1, 9, 16, 16, 16, 16, 16, 1, 9, 9 ]
[ "On", "January", "27,", "2016", "Cyphort", "Labs", "discovered", "a", "site", "infected", "with", "Angler", "EK", "leading", "to", "a", "fileless", "Gootkit", "a.k.a.", "XswKit", "malware." ]
[ 16, 0, 8, 8, 4, 12, 16, 16, 1, 16, 16, 3, 11, 16, 16, 16, 1, 3, 16, 3, 11 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Foosace", "Trojan.Sofacy.C", "TSPY_SEDNIT.A", "Trojan.Win32.Z.Graftor.81408.L", "TSPY_SEDNIT.A", "W32/Trojan.GBLK-5942", "Trojan:Win32/Foosace.K!dha", "Trojan/Win32.Sednit.R155481", "Win32/Sednit.C", "Win32/Trojan.e6d" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Two", "prominent", "lawyers", "representing", "the", "families", "of", "three", "slain", "Mexican", "women", "were", "sent", "infection", "attempts", "with", "NSO", "Group's", "Pegasus", "spyware" ]
[ 16, 16, 4, 16, 16, 4, 16, 4, 12, 12, 12, 16, 16, 1, 9, 16, 6, 14, 3, 11 ]
[ "htpRAT,", "uncovered", "by", "RiskIQ", "cyber", "investigators,", "is", "the", "newest", "weapon", "in", "Chinese", "cyberattackers'", "campaign", "against", "Association", "of", "Southeast", "Asian", "Nations", "ASEAN." ]
[ 3, 16, 16, 4, 12, 12, 16, 16, 16, 3, 16, 6, 14, 14, 16, 4, 12, 12, 12, 12, 12 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9998", "PWS:MSIL/Logbro.A", "Trojan/Win32.Skeeyah.R207512", "MSIL.Backdoor.SRat.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Heur.DP.ED408E", "Ransom_Delcryset.R055C0DAF18", "Trojan-Ransom.Win32.Matrix.qt", "Trojan.Win32.Matrix.ewhoom", "Trojan.DownLoader26.4261", "Ransom_Delcryset.R055C0DAF18", "BehavesLike.Win32.BadFile.dh", "W32/Trojan.YJSB-6810", "TR/AD.RansomHeur.ulxhr", "Ransom:Win32/Delcryset.A", "Trojan-Ransom.Win32.Matrix.qt", "Trj/GdSda.A", "W32/Filecoder_LockedFile.D!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Allows", "an", "application", "to", "read", "the", "user", "'s", "contacts", "data", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Trend", "Micro", "detects", "these", "as", "ANDROIDOS_XLOADER.HRX", "." ]
[ 4, 12, 16, 16, 16, 1, 16 ]
[ "As", "we", "'ve", "seen", "with", "actors", "like", "Dark", "Caracal", ",", "this", "low", "cost", ",", "low", "sophistication", "approach", "that", "relies", "heavily", "upon", "social", "engineering", "has", "still", "been", "shown", "to", "be", "highly", "successful", "for", "those", "operating", "such", "campaigns", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "These", "tools", "include:", "HKTL_MIMIKATZ,", "HKTL_FGDUMP,", "and", "HKTL_VNCPASSVIEW." ]
[ 16, 3, 16, 1, 9, 16, 1 ]
[ "FIN7", "is", "a", "financially-motivated", "threat", "actor", "targeting", "large", "organizations", "that", "process", "payment", "card", "data", "or", "have", "a", "significant", "point", "of", "sale", "environment." ]
[ 6, 16, 16, 16, 6, 14, 16, 16, 4, 16, 1, 9, 9, 9, 16, 16, 16, 16, 5, 13, 13, 13 ]
[ "This", "dissimilarity", "only", "grew", "with", "the", "further", "enumeration", "of", "other", "targets,", "describing", "a", "broad", "targeting", "across", "the", "Middle", "East", "without", "wholly", "implicating", "any", "particular", "interest,", "despite", "clear", "political", "intent." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Early", "versions", "of", "the", "Android", "application", "used", "infrastructure", "which", "belonged", "to", "a", "company", "named", "Connexxa", "S.R.L", "." ]
[ 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 12, 12 ]
[ "A", "backdoor", "also", "known", "as:", "HW32.Packed.B82E", "Trojan.Nsis.Dwn.ewrrol", "BehavesLike.Win32.Vopak.cc", "Trojan.Inject.acan", "TrojanDownloader:Win32/Tanske.A!bit" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1 ]
[ "The", "malware", "is", "responsible", "for", "encrypting", "files", "on", "a", "victim's", "machine", "and", "demanding", "a", "ransom", "via", "the", "Bitcoin", "cryptocurrency." ]
[ 16, 3, 16, 16, 11, 1, 9, 16, 16, 5, 13, 16, 16, 16, 1, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Ekidoa.FC.2847", "Trojan.MSILPerseus.D1EE89", "Win32.Trojan.WisdomEyes.16070401.9500.9998", "TrojWare.MSIL.Ekidoa.A", "BackDoor.Bladabindi.13678", "Trojan.MSIL.Crypt", "TR/Dropper.MSIL.hoclc", "MSIL/Kryptik.FDF!tr", "Trojan:MSIL/Ekidoa.A!bit", "Trojan/Win32.Skeeyah.R194563", "Backdoor.MSIL.SpyGate", "Backdoor.Bladabindi", "Backdoor.SpyGate!" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/FlyStudio.atk", "Win.Trojan.7691310-1", "Trojan-Dropper.Win32.Dinwod.vqz", "Trojan.Win32.FlyStudio.zlxrd", "Trojan.PWS.Wsgame.36294", "BehavesLike.Win32.Ipamor.fc", "Trojan/FlyStudio.dpn", "Trojan/Win32.FlyStudio", "Trojan:Win32/Derunsex.A", "Troj.W32.FlyStudio.atk!c", "Trojan-Dropper.Win32.Dinwod.vqz", "Trj/CI.A", "Win32.Trojan.Flystudio.dbsu", "Trojan.Crypt", "W32/FlyStudio.ATK!tr", "Win32/Trojan.0e3" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "On", "March", "29,", "2023,", "reports", "circulating", "about", "a", "potential", "supply", "chain", "compromise", "for", "3CXDesktopApp", "β€”", "a", "softphone", "application", "from", "3CX." ]
[ 16, 0, 8, 8, 16, 16, 16, 16, 16, 16, 16, 7, 16, 5, 16, 16, 5, 13, 16, 4 ]
[ "Distribution", "via", "trojanized", "updates", "to", "MeDoc", "users" ]
[ 1, 16, 3, 11, 16, 4, 12 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Ransom.Crypren.11", "Ransom_Denisca.R011C0DLD17", "Ransom_Denisca.R011C0DLD17", "Trojan.Win32.Crypren.emfrxs", "Trojan.MulDrop7.20062", "BehavesLike.Win32.PWSZbot.dc", "Trojan.Win32.Crypt", "W32/Trojan.HSTQ-8964", "TR/AD.Ergop.ipwuu", "Trj/CI.A", "Trojan.Crypren!pGn+9M0dsUI", "W32/Kryptik.FPNC!tr", "Win32/Trojan.Ransom.a8a" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Enable", "a", "secure", "lock", "screen", ":", "Pick", "a", "PIN", ",", "pattern", ",", "or", "password", "that", "is", "easy", "for", "you", "to", "remember", "and", "hard", "for", "others", "to", "guess", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "This", "included", "altering", "the", "icon", "of", "the", "executable", "to", "appear", "as", "other", "file", "types", "as", "well", "as", "decoy", "documents", "to", "trick", "users", "into", "thinking", "they", "had", "opened", "a", "legitimate", "file." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "What", "do", "I", "need", "to", "do", "?", "It", "is", "extremely", "unlikely", "you", "or", "someone", "you", "know", "was", "affected", "by", "Chrysaor", "malware", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16 ]
[ "It", "shows", "that", "the", "malware", "can", "detect", "whether", "it", "’", "s", "running", "in", "an", "emulated", "environment", "or", "a", "real", "mobile", "device", ",", "and", "can", "change", "its", "code", "pattern", "accordingly", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "What", "it", "does", "FrozenCell", "masquerades", "as", "fake", "updates", "to", "chat", "applications", "like", "Facebook", ",", "WhatsApp", ",", "Messenger", ",", "LINE", ",", "and", "LoveChat", "." ]
[ 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 5, 16, 5, 16, 5, 16, 16, 5, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Risk.Deceptor.Lmla", "Program.Unwanted.2594", "Trojan:Win32/Spideepri.A", "PUP/Win32.SpeedItUpFree.R211310", "Trojan.Spideepri" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Mimikatz.Win32.268", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Hacktool.Mimikatz", "Trojan.Win32.Mimikatz.ergkpd", "Application.Win32.HackTool.Mimikatz.DC", "Tool.PassView.1872", "HackTool.Inject.ew", "Trojan[PSW]/Win32.Mimikatz", "Trojan/Win32.Mimikatz.R202679", "TrojanPSW.Mimikatz", "HackTool.Mimikatz", "Trj/CI.A", "Trojan.Application.Hacktool.Mimikatz.1", "Win32.Trojan-qqpass.Qqrob.Tclv", "HackTool.Mimikatz", "hacktool.mimikatz", "Win32/Trojan.PSW.c71" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Worm.Olufus.A3", "WORM_VB_FB25010D.UVPM", "Win32.Worm.VB.rb", "WORM_VB_FB25010D.UVPM", "Trojan.Win32.Cosmu.dipp", "Trojan.Win32.Crypt.dsqpuq", "Trojan.MulDrop5.34309", "Net-Worm.Win32.Cynic", "Worm:Win32/Olufus.A", "Trojan.Heur.E2E727", "W32.Virut.low6", "Trojan.Win32.Cosmu.dipp", "Trojan/Win32.Bredolab.R151314", "TScope.Trojan.VB", "Win32/VB.OKI" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.KlassTT.Trojan", "Backdoor.Sdbot.6331", "Troj.Dropper.W32.Sysn!c", "Win32.Trojan.WisdomEyes.16070401.9500.9991", "Backdoor.Trojan", "Trojan-Dropper.Win32.Sysn.brns", "Backdoor.Win32.IRCBot.60928.J", "BackDoor.IRC.Huxor.59", "BehavesLike.Win32.Backdoor.qh", "Backdoor.Win32.SdBot", "Trojan[Backdoor]/Win32.IRCBot", "Trojan.Kazy.D14BCA", "Trojan-Dropper.Win32.Sysn.brns", "Backdoor:Win32/Arwobot.B", "Worm/Win32.IRCBot.R4516", "Win32.Trojan-dropper.Sysn.Lmuh", "Win32/Trojan.8b1" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "These", "embedded", "OLE", "Word", "documents", "then", "contain", "embedded", "Adobe", "Flash", ".SWF", "files", "that", "are", "designed", "to", "exploit", "Abode", "Flash", "vulnerabilities." ]
[ 16, 1, 9, 9, 9, 16, 16, 1, 9, 9, 9, 9, 15, 16, 16, 16, 7, 15, 15, 15 ]
[ "Iranian", "threat", "agent", "OilRig", "has", "been", "targeting", "multiple", "organisations", "in", "Israel", "and", "other", "countries", "in", "the", "Middle", "East", "since", "the", "end", "of", "2015." ]
[ 6, 14, 14, 14, 16, 16, 16, 4, 12, 16, 2, 16, 16, 2, 16, 2, 10, 10, 16, 16, 0, 8, 8 ]
[ "In", "the", "course", "of", "this", "tactical", "hunt", "for", "unidentified", "code,", "RSA", "discovered", "a", "sophisticated", "attack", "on", "a", "software", "supply-chain", "involving", "a", "Trojan", "inserted", "in", "otherwise", "legitimate", "software;", "software", "that", "is", "typically", "used", "by", "enterprise", "system", "administrators." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 9, 16, 16, 1, 9, 16, 16, 4, 12, 16, 16, 3, 16, 16, 16, 5, 13, 13, 16, 16, 16, 16, 16, 5, 13, 13 ]
[ "Neuron", "and", "Nautilus", "are", "malicious", "tools", "designed", "to", "operate", "on", "Microsoft", "Windows", "platforms,", "primarily", "targeting", "mail", "servers", "and", "web", "servers." ]
[ 3, 16, 3, 16, 3, 11, 16, 16, 16, 16, 5, 13, 13, 16, 16, 4, 12, 16, 4, 12 ]
[ "A", "backdoor", "also", "known", "as:", "W32.FamVT.MambaAHQc.Trojan", "Trojan.Python.Win32.34", "Trojan/Mamba.g", "Win32.Trojan.WisdomEyes.16070401.9500.9555", "BehavesLike.Win32.Trojan.vh", "Python/Blakamba.A!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1 ]
[ "In", "our", "tests", ",", "the", "malware", "sample", "was", "able", "to", "easily", "detect", "both", "VMWare", "and", "Hyper-V", "environments", "through", "the", "detection", "of", "the", "virtualized", "peripherals", "(", "for", "example", ",", "Vmware", "has", "VEN_15AD", "as", "vendor", "ID", ",", "HyperV", "has", "VMBus", "as", "bus", "name", ")", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "attack", "compromised", "their", "devices", "and", "exfiltrated", "data", "to", "the", "attackers'", "command", "and", "control", "server." ]
[ 16, 1, 9, 16, 5, 16, 1, 9, 16, 16, 6, 1, 9, 9, 9 ]
[ "Infrastructure", "At", "the", "time", "of", "writing", "the", "following", "domains", "have", "either", "been", "used", "by", "this", "family", "or", "are", "currently", "active", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Overview", "The", "malware", "was", "first", "detected", "on", "a", "Nexus", "5", "smartphone", ",", "and", "although", "the", "user", "attempted", "to", "remove", "the", "infected", "app", ",", "the", "malware", "reappeared", "on", "the", "same", "device", "shortly", "thereafter", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "earliest", "we", "observed", "this", "spreader", "variant", "pushing", "Mirai", "downloaders", "was", "January", "2017." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 16, 0, 8 ]
[ "In", "late", "2013­­­–early", "2014,", "a", "compromised", "FTP", "client", "dubbed", "StealZilla,", "based", "off", "the", "open", "source", "FileZilla", "FTP", "client", "was", "discovered." ]
[ 16, 16, 0, 8, 16, 1, 9, 16, 16, 3, 16, 16, 16, 16, 16, 16, 5, 13, 16, 16 ]
[ "This", "particular", "APT", "is", "targeting", "organizations", "that", "include", "weapons", "manufacturers,", "human", "rights", "activists,", "and", "pro-democracy", "groups,", "among", "others." ]
[ 16, 16, 6, 16, 16, 4, 15, 16, 4, 12, 12, 12, 12, 16, 4, 12, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Danmec.E.iw5", "Trojan.Asprox", "W32/Danmec.R", "TROJ_DANMEC.SM", "Trojan.Win32.Danmec!IK", "TrojWare.Win32.Kryptik.CG", "Trojan.DownLoad2.37322", "TR/Spy.Web.H", "TROJ_DANMEC.SM", "Worm/Aspxor.ey", "Trojan/Win32.Danmec", "Trojan.Danmec", "Trojan.Asprox!rem", "Trojan.Win32.Danmec", "W32/Danmec.C!tr", "Trj/Damnec.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "As", "a", "result", ",", "it", "may", "be", "that", "are", "looking", "into", "a", "compromised", ",", "parked", "domain", "that", "was", "initially", "used", "legitimately", ",", "but", "is", "now", "participating", "in", "malicious", "activities", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "ART", "team", "at", "Fortinet", "has", "discovered", "a", "new", "malware", "named", "Proteus,", "a", "multifunctional", "botnet", "written", "in", ".NET", "that", "appears", "to", "be", "a", "proxy,", "coin", "miner,", "e-commerce", "merchant", "account", "checker,", "and", "keylogger." ]
[ 4, 12, 12, 16, 4, 16, 16, 16, 16, 3, 16, 3, 16, 16, 3, 16, 16, 5, 16, 16, 16, 16, 16, 3, 11, 11, 11, 11, 11, 11, 16, 3 ]
[ "CHANGE_GCM_ID", "–", "change", "GCM", "ID", "." ]
[ 16, 16, 16, 16, 16, 16 ]
[ "]", "net", ",", "is", "now", "a", "legitimate", "version", "of", "the", "DroidVPN", "app", ",", "and", "looks", "as", "shown", "in", "Figure", "1", "below", "." ]
[ 9, 9, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "From", "the", "Nymaim", "malware,", "it", "leverages", "the", "dropper's", "stealth", "and", "persistence;", "the", "Gozi", "ISFB", "parts", "add", "the", "banking", "Trojan's", "capabilities", "to", "facilitate", "fraud", "via", "infected", "Internet", "browsers." ]
[ 16, 16, 3, 11, 16, 16, 16, 1, 9, 16, 1, 16, 3, 11, 16, 16, 16, 3, 11, 1, 16, 16, 16, 16, 5, 13, 13 ]
[ "The", "email", "address", "and", "country", "information", "drove", "us", "to", "a", "list", "of", "students", "attending", "a", "class", "at", "a", "Vietnamese", "university", "–", "corroborating", "the", "existence", "of", "the", "person", "under", "whose", "name", "the", "domain", "was", "registered", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Backdoor", "that", "installs", "itself", "at", "%Application", "Data%\\remcos" ]
[ 3, 16, 16, 16, 16, 1, 9 ]
[ "]", "122:28833", "61", "[", "." ]
[ 9, 9, 1, 9, 9 ]
[ "Based", "on", "strings", "found", "in", "the", "samples", "we", "analyzed,", "we", "have", "named", "this", "backdoor", "Gazer" ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 3 ]
[ "It", "spreads", "via", "unusual", "means,", "including", "the", "hijacking", "of", "traffic", "from", "nationwide", "ISPs,", "an", "SNS", "worm", "on", "Windows,", "and", "an", "offline", "app", "installation", "and", "community", "promotion." ]
[ 16, 16, 16, 16, 16, 16, 16, 1, 9, 9, 9, 9, 9, 16, 3, 11, 16, 5, 16, 16, 5, 13, 16, 16, 16, 16 ]
[ "The", "Zen", "trojan", "After", "achieving", "persistence", ",", "the", "trojan", "downloads", "additional", "payloads", ",", "including", "another", "trojan", "called", "Zen", "." ]
[ 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Dynamer", "Win32.Trojan.WisdomEyes.16070401.9500.9986", "Trojan.Win32.Dwn.efyiis", "Trojan.DownLoader22.7328", "BehavesLike.Win32.PUPXAA.kc", "Trojan:MSIL/Watam.A", "Trojan.MSIL.Spy" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1 ]
[ "Our", "analysis", "shows", "that", "the", "threat", "actor", "behind", "the", "FakeSpy", "malware", "is", "a", "Chinese-speaking", "group", ",", "commonly", "referred", "to", "as", "\"", "Roaming", "Mantis", "''", ",", "a", "group", "that", "is", "known", "to", "have", "launched", "similar", "campaigns", "in", "the", "past", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 12, 16, 16, 12, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "payload", "we", "got", "also", "specifically", "targets", "Korean", "banks", "by", "modifying", "the", "infected", "systems", "hosts", "file", "to", "redirect", "traffic", "from", "Korean", "banks", "to", "its", "controlled", "server." ]
[ 16, 3, 16, 16, 16, 16, 16, 4, 12, 16, 16, 16, 5, 13, 1, 9, 9, 9, 9, 16, 4, 12, 16, 16, 1, 9 ]
[ "This", "particular", "peice", "of", "malware", "uses", "a", "open", "source", "VB6", "peice", "of", "malware", "called", "vnLoader'." ]
[ 16, 16, 16, 16, 3, 16, 16, 1, 9, 9, 16, 16, 3, 16, 3 ]
[ "This", "group", "has", "been", "active", "since", "2010.", "We", "dub", "this", "operation", "Shrouded", "Crossbow,", "after", "a", "mutex", "in", "a", "backdoor", "the", "group", "developed." ]
[ 16, 6, 16, 16, 16, 16, 0, 16, 16, 16, 6, 14, 14, 16, 16, 3, 16, 16, 3, 16, 6, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Android.Trojan.Boxer.as", "HEUR:Trojan-SMS.AndroidOS.FakeInst.a", "HEUR:Trojan-SMS.AndroidOS.FakeInst.a" ]
[ 16, 3, 16, 16, 16, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Dynamer.FC.314", "Win32.Trojan.WisdomEyes.16070401.9500.9959", "Trojan.Win32.Inject.aexnv", "Trojan.DownLoader24.51009", "TR/AD.NETCryptor.dneew", "Trojan/Win32.Inject", "Backdoor:MSIL/Omaneat.B", "Trojan.MSILPerseus.D17E4F", "Trojan/Win32.Fsysna.C1935209", "Trojan.Win32.Inject.aexnv", "Trj/GdSda.A", "Win32.Trojan.Inject.Fsc" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "FireEye", "Labs", "recently", "discovered", "a", "previously", "unknown", "variant", "of", "the", "APT", "backdoor", "XSLCmd", "–", "OSX.XSLCmd", "–", "which", "is", "designed", "to", "compromise", "Apple", "OS", "X", "systems." ]
[ 4, 12, 16, 16, 16, 16, 3, 11, 16, 16, 14, 3, 11, 11, 11, 11, 16, 16, 16, 16, 16, 5, 13, 13, 13 ]
[ "It", "is", "safe", "to", "say", "that", "today", "’", "s", "cybercriminal", "is", "no", "longer", "a", "lone", "hacker", "but", "part", "of", "a", "serious", "business", "operation", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.PWS.Kukel.A", "Trojan-PWS/W32.Kukel.14116", "Trojan.PWS.Kukel.A", "Trojan/PSW.Kukel", "Trojan.PWS.Kukel.A", "Win32.Trojan.WisdomEyes.16070401.9500.9985", "TROJ_KUKEL.A", "Trojan.PWS.Kukel.A", "Trojan-PSW.Win32.Kukel", "Trojan.PWS.Kukel.A", "Trojan.Win32.Kukel.hjwe", "Trojan.Win32.PSWKukel.14116", "Troj.PSW32.W.Kukel!c", "Trojan.PWS.Kukel.A", "TrojWare.Win32.PSW.Kukel", "Trojan.PWS.Kukel.A", "Trojan.PWS.Kukel", "Trojan.Kukel.Win32.4", "TROJ_KUKEL.A", "W32/Risk.QXSE-2226", "Trojan/PSW.Kukel", "TR/PSW.Kukel.1", "Trojan-PSW.Win32.Kukel", "TrojanPSW.Kukel", "Win32/PSW.Kukel", "Win32.Trojan-qqpass.Qqrob.Wsko", "Trojan.PWS.Kukel!uom8kUpytHQ", "W32/Kukel.A!tr.pws" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "This", "entry", "is", "to", "explain", "features", "of", "Datper,", "malware", "used", "for", "targeted", "attacks", "against", "Japanese", "organisations", "and", "how", "to", "detect", "it", "from", "the", "logs." ]
[ 16, 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 16, 1, 16, 4, 12, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Tvt", "Trojan.Korplug.Win32.309", "Trojan.Zusy.D41CD9", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Trojan.Win32.Tvt.ll", "Trojan.KeyLogger.27522", "Backdoor:Win32/Sogu.A!dha", "Trojan.Win32.Tvt.ll", "Backdoor/Win32.Etso.R17333", "Trojan.Win32.Korplug" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Detected", "as", "ANDROIDOS_SLOCKER.OPSCB,", "this", "new", "SLocker", "mobile", "ransomware", "variant", "features", "new", "routines", "that", "utilize", "features", "of", "the", "Chinese", "social", "network", "QQ,", "along", "with", "persistent", "screen-locking", "capabilities." ]
[ 16, 16, 1, 16, 16, 3, 11, 11, 11, 16, 16, 16, 16, 16, 16, 16, 4, 12, 12, 12, 12, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9984", "Trojan-Banker.Win32.Metel.cai", "Trojan.Win32.Metel.edlvqj", "Troj.Banker.W32.Metel!c", "Trojan.Bayanker.42", "BehavesLike.Win32.FakeAlertSecurityTool.dc", "Trojan.Banker.Metel.ys", "TR/Kryptik.rfzx", "Trojan:Win32/Exgectow.A", "Trojan-Banker.Win32.Metel.cai", "Trojan/Win32.Dorv.R166106", "Trj/CI.A", "Win32/Corkow.AI", "Win32.Outbreak", "Win32/Trojan.9df" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Recent", "new", "reporting", "was", "released", "on", "the", "DragonOK", "group", "which", "unveiled", "the", "many", "versions", "of", "the", "Sysget", "backdoor", "as", "well", "as", "the", "IsSpace", "backdoor." ]
[ 16, 16, 16, 16, 16, 16, 6, 14, 14, 16, 16, 16, 16, 3, 16, 16, 3, 11, 16, 16, 16, 3, 11, 11 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Vehidis", "Trojan.Win32.Vehidis.wpm", "Trojan.Win32.Crypted.dodbbd", "Trojan.Win32.Z.Vehidis.24576.K", "Troj.W32.Vehidis!c", "Trojan.Vehidis.Win32.1902", "Trojan.Vehidis.hd", "BDS/Sakkair.ebcng", "Backdoor:Win32/Sakkair.A", "Trojan.Win32.Vehidis.wpm", "Trojan/Win32.Farfli.R115053", "Trojan.Vehidis", "Trj/CI.A", "Win32.Trojan.Vehidis.Hquw" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.MSIL", "Win32.Trojan.WisdomEyes.16070401.9500.9655", "Infostealer.Limitail", "Trojan.Win32.Z.Limitail.303616", "Trojan.DownLoader19.57204", "BehavesLike.Win32.PUPXAG.dc", "TR/Dropper.MSIL.lrzyl", "Trojan.MSILPerseus.D234A0", "TrojanSpy:MSIL/Plimrost.B", "Trojan/Win32.Kryptik.C2400864", "Trj/GdSda.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Standing", "out", "because", "of", "its", "prevalence", "and", "its", "sophistication,", "Stantinko", "turned", "out", "to", "be", "quite", "a", "puzzle", "to", "solve." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "This", "utility", "does", "several", "interesting", "things", "to", "evade", "antivirus", "detection." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Android.Adware.Airpush.55AE", "Android.Adware.Plankton.A", "Android.Adware.Plankton.A", "Android.Trojan.Plankton.k", "AndroidOS/Plankton.B", "A.H.Pri.Afoynq.F", "Trojan.Android.Airpush.djpqsd", "Adware.MultiAds!1.9D9E", "Android.Adware.Plankton.A", "Android.Adware.Plankton", "Adware.Airpush.3.origin", "AndroidOS/Plankton.B", "Android.Adware.Plankton.A", "Android.Adware.Plankton!c", "Android-PUP/Airpush.2ac1", "Android.Adware.Plankton.A", "Adware.AndroidOS.AirPush.a", "AdWare.AndroidOS.Apperhand" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Successful", "exploitation", "seems", "to", "be", "possible", "on", "all", "currently", "supported", "versions", "of", "MS", "Office", "up", "and", "including", "the", "MS15-022", "patch." ]
[ 16, 7, 16, 16, 16, 16, 16, 16, 16, 16, 15, 16, 5, 13, 16, 16, 16, 16, 1, 9 ]
[ "Proofpoint", "researchers", "have", "observed", "a", "well-known", "Russian-speaking", "APT", "actor", "usually", "referred", "to", "as", "Turla", "using", "a", "new", ".NET/MSIL", "dropper", "for", "an", "existing", "backdoor", "called", "JS/KopiLuwak." ]
[ 4, 12, 16, 16, 16, 16, 6, 14, 14, 16, 16, 16, 16, 3, 16, 16, 16, 1, 9, 16, 16, 16, 3, 16, 1 ]
[ "]", "com", "ws.my-local-weather", "[", "." ]
[ 9, 9, 1, 9, 9 ]
[ "Both", "apps", "shared", "the", "same", "C", "&", "C", "server", ",", "but", "we", "couldn", "’", "t", "investigate", "the", "latter", "as", "it", "had", "already", "been", "removed", "from", "the", "Google", "Play", "store", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 13, 16 ]
[ "Once", "installed", ",", "HenBox", "steals", "information", "from", "the", "devices", "from", "a", "myriad", "of", "sources", ",", "including", "many", "mainstream", "chat", ",", "communication", ",", "and", "social", "media", "apps", "." ]
[ 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "malware", "itself", "is", "a", "fully", "featured", "RAT,", "which", "uses", "a", "compressed,", "optionally", "encrypted,", "raw", "TCP", "socket", "and", "binary", "message", "protocol", "for", "command", "and", "control", "communications." ]
[ 16, 3, 16, 16, 16, 16, 16, 3, 16, 16, 16, 1, 16, 1, 9, 9, 9, 16, 1, 9, 9, 11, 1, 9, 9, 9 ]
[ "This", "time,", "however,", "attackers", "opportunistically", "used", "spear-phishing", "emails", "with", "a", "Microsoft", "Word", "attachment", "exploiting", "the", "recently", "patched", "CVE-2017-0199", "to", "deploy", "the", "ZeroT", "Trojan,", "which", "in", "turn", "downloaded", "the", "PlugX", "Remote", "Access", "Trojan", "RAT." ]
[ 16, 16, 16, 6, 16, 16, 1, 9, 16, 16, 1, 9, 9, 7, 16, 16, 16, 1, 16, 16, 16, 3, 11, 16, 16, 16, 3, 16, 3, 11, 11, 11, 11 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Banker.Win32.89325", "Trojan/Spy.Banker.yss", "Trojan.Win32.Z.Banker.5002130", "Trojan.DownLoader13.22038", "Trojan/Win32.Scar", "Win32.Troj.Undef.kcloud", "PWS:Win32/Mujormel.A", "TScope.Trojan.Delf" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]