tokens
sequencelengths
2
296
ner_tags
sequencelengths
2
296
[ "T1444", "Masquerade", "as", "Legitimate", "Application", "Impersonates", "legitimate", "GAS", "Tecnologia", "application", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 5, 13, 16, 16 ]
[ "]", "208", "attiva.exodus.esurv", "[", "." ]
[ 9, 9, 1, 9, 9 ]
[ "Most", "recently,", "we", "have", "observed", "the", "same", "group", "targeting", "military", "and", "aerospace", "interests", "in", "Russia", "and", "Belarus." ]
[ 16, 16, 16, 16, 16, 6, 14, 14, 16, 4, 16, 4, 16, 16, 2, 16, 2 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.Meciv", "Win32/Pucedoor.A", "Trojan.Enfal-11", "Application.Win32.BlkIC.IMG", "Trojan.MulDrop1.40578", "TR/Spy.174210", "Trojan.Heur.E0B301", "Backdoor:Win32/Meciv.A", "Trj/CI.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "This", "current", "variant", "includes", "a", "link", "to", "the", "following", "payment", "onion", "website:", "http://zvnvp2rhe3ljwf2m[.]onion." ]
[ 16, 16, 16, 16, 16, 1, 16, 16, 16, 1, 9, 9, 9 ]
[ "TV5Monde", "was", "taken", "off", "air", "in", "April", "2015." ]
[ 4, 16, 16, 16, 16, 16, 0, 8 ]
[ "Kaspersky", "Some", "time", "ago", "while", "tracking", "Winnti", "group", "activity", "we", "came", "across", "a", "suspicious", "64-bit", "sample." ]
[ 4, 16, 16, 16, 16, 16, 6, 14, 16, 16, 16, 16, 16, 16, 1, 9 ]
[ "I", "hope", "that", "by", "uncovering", "this", "malware", "at", "such", "an", "early", "stage", ",", "we", "will", "be", "able", "to", "prevent", "a", "massive", "and", "dangerous", "attack", "when", "the", "attackers", "are", "ready", "to", "actively", "use", "their", "methods", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "group", "discussed", "in", "this", "white", "paper", "is", "part", "of", "this", "new", "trend." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "HW32.Packed.3E85", "Backdoor.Win32.Nepoe!O", "Dropper.Paradrop.Win32.108", "W32/Korgo.worm", "PE_AGOBOT.AQM", "Win32.Trojan.WisdomEyes.16070401.9500.9889", "W32/Bobax.AO", "W32.Bleshare", "PE_AGOBOT.AQM", "Win.Trojan.Poebot-45", "Trojan-Dropper.Win32.Paradrop.a", "Trojan.Win32.Paradrop.xhlx", "Dropper.Paradrop.180736", "Troj.Dropper.W32.Paradrop.kYTK", "TrojWare.Win32.TrojanDropper.Paradrop.a0", "Trojan.MulDrop.2267", "BehavesLike.Win32.Conficker.cc", "Backdoor.Win32.PoeBot.C", "W32/Bobax.LVYX-1108", "TrojanDropper.Paradrop", "TR/Drop.Paradro.a.3", "Trojan[Backdoor]/Win32.Agobot", "TrojanDropper:Win32/Paradrop.J", "Trojan-Dropper.Win32.Paradrop.a", "W32/Polybot.dr", "Backdoor.PoeBot", "Trj/Droppofonic.A", "Win32/TrojanDropper.Paradrop.A", "Worm.PoeBot.S", "W32/Paradrop.B!tr.dr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "]", "databit", "[", "." ]
[ 9, 9, 9, 9 ]
[ "]", "204", "[", "." ]
[ 9, 9, 9, 9 ]
[ "This", "blog", "will", "provide", "an", "analysis", "of", "the", "Bookworm", "Trojan", "and", "known", "indicators", "of", "compromise." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 1, 9, 9 ]
[ "The", "beaconing", "is", "sent", "to", "the", "URL", "http", ":", "//", "/api/v2/get.php", "with", "an", "interval", "of", "60", "seconds", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 1, 9, 9, 9, 16, 16, 16, 16, 16, 16, 16 ]
[ "Copy", "the", "stage", "5", "DLL", "into", "winlogon.exe", "Allocate", "a", "chunk", "of", "memory", "in", "winlogon.exe", "process", "and", "copy", "the", "same", "APC", "routine", "seen", "previously", "Read", "and", "save", "the", "original", "pointer", "of", "the", "__fnDWORD", "internal", "User32", "routine", "(", "located", "at", "offset", "+0x10", "of", "the", "KernelCallbackTable", ")", "and", "replace", "this", "pointer", "with", "the", "address", "of", "the", "APC", "stub", "routine", "After", "this", "function", "pointer", "hijacking", ",", "when", "winlogon.exe", "makes", "any", "graphical", "call", "(", "GDI", ")", ",", "the", "malicious", "code", "can", "execute", "without", "using", "CreateRemoteThread", "or", "similar", "triggers", "that", "are", "easily", "detectable", "." ]
[ 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "SentinelLabs", "analyzed", "several", "iterations", "of", "AlienFox,", "a", "comprehensive", "toolset", "for", "harvesting", "credentials", "for", "multiple", "cloud", "service", "providers." ]
[ 4, 16, 16, 16, 16, 4, 16, 16, 3, 16, 1, 9, 16, 16, 5, 13, 13 ]
[ "Many", "of", "these", "samples", "appear", "to", "be", "designed", "specifically", "to", "attempt", "to", "slip", "into", "the", "Play", "Store", "undetected", "and", "are", "not", "seen", "elsewhere", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 16, 16, 16, 16, 16, 16, 16 ]
[ "While", "not", "too", "seriously", ",", "these", "elements", "made", "us", "restrict", "our", "research", "into", "surveillance", "companies", "from", "the", "region", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "app", "ties", "together", "two", "malware", "families", "-", "Desert", "Scorpion", "and", "another", "targeted", "surveillanceware", "family", "named", "FrozenCell", "-", "that", "we", "believe", "are", "being", "developed", "by", "a", "single", ",", "evolving", "surveillanceware", "actor", "called", "APT-C-23", "targeting", "individuals", "in", "the", "Middle", "East", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.OnGamesLTPGOWF.Trojan", "Trojan/W32.Small.35840.NP", "Backdoor.Win32.Floder!O", "Backdoor/Floder.rlw", "Win32/Tnega.ANRP", "Backdoor.Win32.A.Floder.37376[UPX]", "Trojan.MulDrop1.37252", "Backdoor/Floder.age", "Trojan[Backdoor]/Win32.Floder", "Backdoor:Win32/RDPopen.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "remaining", "99", "C", "C", "servers", "were", "duplicated", "configurations", "from", "different", "APKs.", "This", "is", "likely", "due", "to", "configuration", "files", "being", "hardcoded", "within", "the", "APK,", "and", "old", "spam", "campaigns", "infecting", "different", "users,", "thus,", "old", "configurations", "still", "being", "detected", "in", "the", "wild." ]
[ 16, 16, 1, 9, 9, 9, 16, 16, 1, 16, 16, 5, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 5, 16, 6, 14, 14, 16, 16, 4, 16, 16, 1, 16, 16, 16, 16, 16, 16 ]
[ "The", "Android", "banking", "Trojan", "rental", "business", "Rental", "of", "banking", "Trojans", "is", "not", "new", "." ]
[ 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Ransom_Ciluf.R002C0DL517", "Win32.Trojan.WisdomEyes.16070401.9500.9967", "Ransom_Ciluf.R002C0DL517", "BehavesLike.Win32.Backdoor.ct", "W32/Trojan.QHYA-4995", "Ransom:Win32/Ciluf.A", "Ransom.Lucifer", "Trj/GdSda.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor/W32.Tiny.3072", "Backdoor.Win32.Tiny!O", "Backdoor.Tiny", "BackDoor-IQ.b", "Troj.Dropper.W32.Small.l6P3", "Backdoor/Tiny.c", "Win32.Trojan.WisdomEyes.16070401.9500.9646", "Backdoor.Trojan", "BKDR_IQ.B", "Backdoor.Win32.Tiny.c", "Backdoor.Win32.Tiny.6144", "BackDoor.Tiny.40", "BKDR_IQ.B", "BackDoor-IQ.b", "Backdoor/Tiny.aw", "TR/Tiny.nmclh", "Trojan[Backdoor]/Win32.Tiny.c", "Trojan.Zusy.Elzob.804", "Backdoor.Win32.Tiny.c", "Backdoor:Win32/Tiny.FBC", "Win-Trojan/IQ.B", "Backdoor.Win32.Small.Epi", "Bck/Tiny.B", "Win32.Backdoor.Tiny.Pcsz", "Backdoor.Win32.Tiny", "BDoor.IQ!tr.bdr", "Win32/Trojan.d37" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Worm.Nofear.C", "W32.W.Fearso.kYUv", "W32/Fearso.c", "Win32.Worm.Farex.a", "W32/Worm.AEST", "W32.Nofer.A@mm", "win32/Nofear.A", "Win.Worm.Fearso-2", "Email-Worm.Win32.Fearso.c", "Trojan.Win32.Fearso.cssoyh", "I-Worm.Win32.A.Fearso.86541", "Worm.Win32.Fearso.~BAAA", "Trojan.AVKill.9837", "Worm.Fearso.Win32.9", "BehavesLike.Win32.Nofear.mh", "Backdoor.Win32.Gobot", "W32/Worm.ENOQ-1581", "I-Worm/Fearso.c", "Worm:Win32/Nofear.C@mm", "Worm[Email]/Win32.Fearso", "Worm:Win32/Nofear.C@mm", "Worm.Fearo", "Email-Worm.Win32.Fearso.c", "Worm.Fearso", "W32/Fearso.V.worm", "I-Worm.Farex.Y", "Win32/Farex.Y", "Trojan.Win32.Fearso.c", "I-Worm.Fearso!qiaAnheOcEc", "Worm.Win32.Nofear.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9925", "Trojan.Win32.Yakes.vpge", "TR/Crypt.ZPACK.jrfyx", "Trojan:Win64/Carberp.A!bit", "Trojan.Win32.Yakes.vpge" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1 ]
[ "A", "worm", "that", "spreads", "by", "copying", "itself", "to", "file", "shares", "and", "removable", "drives." ]
[ 16, 3, 16, 16, 16, 16, 16, 16, 1, 9, 16, 5, 13 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.MSIL", "Win32.Trojan.WisdomEyes.16070401.9500.9554", "Trojan.Win32.Mlw.eugajo", "Trojan.Win32.Z.Firsot.3520512", "W32/Trojan.KPJB-2397", "Backdoor:MSIL/Firsot.A", "Trj/CI.A", "Backdoor.MSIL.Firsot", "Win32/Trojan.289" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "EVENTBOT", "VERSION", "0.0.0.2", "Dynamic", "Library", "Loading", "As", "of", "Version", "0.0.0.2", ",", "EventBot", "attempts", "to", "hide", "its", "main", "functionality", "from", "static", "analysis", "." ]
[ 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Kazy.D1D724", "W32/Trojan.PVRS-3848", "Trojan.Win32.PcClient.eptxte", "Trojan.Win32.Z.Pcclient.356864", "BackDoor.PcClient.6543", "Trojan.Reconyc.Win32.20285", "BehavesLike.Win32.Dropper.fc", "Trojan.Win32.Krypt", "Trojan.Reconyc.gyp", "TR/Crypt.ZPACK.igurt", "Trojan[DDoS]/Win32.Macri", "TrojanDownloader:Win32/Redosdru.F!bit", "Trojan/Win32.Infostealer.R206663", "TrojanDDoS.Macri", "Trj/CI.A", "W32/Kryptik.FQKI!tr", "Win32/Trojan.443" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "One", "interesting", "new", "fact", "about", "Gaza", "cybergang", "activities", "is", "that", "they", "are", "actively", "sending", "malware", "files", "to", "IT", "Information", "Technology", "and", "IR", "Incident", "Response", "staff;", "this", "is", "also", "obvious", "from", "the", "file", "names", "they", "are", "sending", "to", "victims,", "which", "reflect", "the", "IT", "functions", "or", "IR", "tools", "used", "in", "cyber", "attack", "investigations." ]
[ 16, 16, 16, 16, 16, 6, 14, 16, 16, 15, 16, 16, 16, 16, 1, 9, 16, 4, 12, 12, 16, 4, 12, 12, 12, 16, 16, 16, 16, 16, 16, 1, 9, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 16, 1, 9, 16, 16, 1, 9, 16 ]
[ "Once", "delivered,", "Escelar", "has", "multiple", "installation", "stages", "where", "malware", "is", "downloaded", "using", "direct", "connections", "to", "multiple", "Microsoft", "SQL", "servers." ]
[ 16, 16, 3, 16, 16, 16, 16, 16, 3, 16, 16, 16, 1, 9, 16, 5, 13, 13, 13 ]
[ "However,", "unlike", "Dyre", "which", "was", "designed", "to", "target", "banking", "information,", "Rombertik", "collects", "information", "from", "all", "websites", "in", "an", "indiscriminate", "manner." ]
[ 16, 16, 3, 16, 16, 16, 16, 16, 4, 12, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Heur.DP.E18DA6", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "W32.W.Dorifel.moev", "TrojWare.Win32.Delf.OSP1", "Trojan.DownLoad1.16614", "Trojan-Downloader.Win32.Rochap", "TR/Dldr.Rochap.J", "Trojan/Win32.Unknown", "TrojanDropper:Win32/Rochap.H", "Win32/Delf.OSP", "W32/Dropper.VFR!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Downloader.Harnig.al", "Trojan-Downloader.Win32.Harnig!O", "Downloader.Small.28090", "Trojan/Downloader.Harnig.al", "Win32.Trojan.WisdomEyes.16070401.9500.9939", "Downloader.Trojan", "Win.Downloader.Small-579", "Trojan.Downloader.Harnig.al", "Trojan-Downloader.Win32.Harnig.al", "Trojan.Downloader.Harnig.al", "Trojan.Win32.Harnig.voqq", "Trojan.Win32.A.Downloader.10240.FS", "Troj.Downloader.W32.Harnig.al!c", "Trojan.Downloader.Harnig.al", "TrojWare.Win32.TrojanDownloader.Harnig.AL", "Trojan.Downloader.Harnig.al", "Trojan.DownLoader.919", "Downloader.Harnig.Win32.353", "BehavesLike.Win32.Cutwail.lt", "Trojan-Downloader.Win32.Harnig", "Trojan/Startpage.nv", "W32.Trojan.Downloader.Harnig", "Trojan[Downloader]/Win32.Harnig", "Trojan.Downloader.Harnig.al", "Trojan-Downloader.Win32.Harnig.al", "Trojan/Win32.Downloader.R39433", "Trojan.Downloader.Harnig.al", "OScope.Downloader.GCLA", "Trj/Harnig.AD", "Win32/TrojanDownloader.Harnig.AL", "Win32.Trojan-downloader.Harnig.Sxyp", "Trojan.QHost.L", "W32/Harnig.AI!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "This", "campaign", "involved", "five", "separate", "phishing", "attacks,", "each", "carrying", "a", "different", "variant", "of", "Sysget", "malware,", "also", "known", "as", "HelloBridge." ]
[ 16, 6, 16, 16, 16, 1, 9, 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 16, 3 ]
[ "A", "backdoor", "also", "known", "as:", "W32.SkipnetA.Trojan", "Trojan.VB", "W32/Bybz.ehk", "Trojan.IPZ.3", "Win32.Trojan.WisdomEyes.16070401.9500.9995", "TROJ_VB_GA2509B6.UVPM", "Win.Trojan.Injector-397", "Trojan.Win32.AutoRun.thcnx", "Worm.Win32.AutoRun.dck", "Trojan.MulDrop2.2467", "Worm.Bybz.Win32.935", "TROJ_VB_GA2509B6.UVPM", "BehavesLike.Win32.VBobfus.dc", "Trojan/Cosmu.gzo", "W32/Llac.PMC!tr", "Worm/Win32.Bybz", "Worm.Win32.A.AutoRun.206367", "Worm/Win32.AutoRun.C11891", "PWS-Spyeye.ai", "OScope.Worm.Bybz.31321", "Worm.Bybz!gMC6zzOscGs", "Backdoor.Win32.Poison" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "These", "tools", "included", "utilities", "from", "Microsoft", "Sysinternals", "and", "parts", "of", "open-source", "projects." ]
[ 16, 3, 16, 16, 16, 5, 13, 16, 16, 16, 5, 13 ]
[ "Once", "opened", ",", "HenBox", "runs", "the", "following", "query", "to", "gather", "message", "information", "." ]
[ 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "To", "distribute", "the", "malicious", "excel", "file,", "the", "attackers", "registered", "a", "domain", "which", "impersonated", "the", "identity", "of", "most", "influential", "Indian", "think", "tank", "IDSA", "Institute", "for", "Defence", "Studies", "and", "Analyses", "and", "used", "the", "email", "id", "from", "the", "impersonating", "domain", "to", "send", "out", "the", "spear-phishing", "emails", "to", "the", "victims." ]
[ 16, 16, 16, 1, 9, 9, 16, 6, 16, 16, 1, 16, 16, 16, 1, 9, 9, 9, 9, 4, 12, 12, 12, 12, 12, 12, 12, 12, 16, 16, 16, 1, 11, 16, 16, 1, 9, 16, 16, 16, 16, 1, 9, 16, 16, 4 ]
[ "For", "example", ",", "the", "Ztorg", "Trojan", "has", "been", "uploaded", "to", "Google", "Play", "almost", "100", "times", "since", "September", "2016", "." ]
[ 16, 16, 16, 16, 3, 11, 16, 16, 16, 16, 5, 13, 16, 16, 16, 16, 16, 16, 16 ]
[ "YouTube", "channel", "of", "the", "malicious", "developer", "His", "YouTube", "channel", "provided", "us", "with", "another", "valuable", "piece", "of", "information", ":", "he", "himself", "features", "in", "a", "video", "tutorial", "for", "one", "of", "his", "other", "projects", "." ]
[ 5, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "malware", "appears", "to", "have", "been", "named", "Hinata", "by", "the", "malware", "author", "after", "a", "character", "from", "the", "popular", "anime", "series,", "Naruto." ]
[ 16, 3, 16, 16, 16, 16, 16, 6, 16, 6, 14, 14, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Screen", "capture", "and", "audio", "recording", "SpyNote", "RAT", "was", "able", "to", "take", "screen", "captures", "and", ",", "using", "the", "device", "’", "s", "microphone", ",", "listen", "to", "audio", "conversations", "." ]
[ 16, 16, 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9964", "Infostealer.Gampass", "Trojan-GameThief.Win32.OnLineGames.jez", "Trojan.Win32.OnLineGames.csyqf", "Trojan.PWS.Gamania.6047", "BehavesLike.Win32.BadFile.lc", "Trojan-PWS.OnlineGames", "Trojan/PSW.OnLineGames.cqju", "Win32.PSWTroj.OnLineGames.kcloud", "Trojan-GameThief.Win32.OnLineGames.jez", "Trojan/Win32.OnlineGameHack.R6228", "TScope.Malware-Cryptor.SB", "Win32/PSW.OnLineGames.HCV" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Bck/DSNX.05", "Bloodhound.Morphine", "Trojan.Packed-86", "Backdoor.Win32.DSNX.05.a", "Backdoor.Dsnx.05.A", "Backdoor.Win32.DSNX.05.a", "Backdoor:Win32/DSNX.E", "Backdoor.DSNX.05.a", "BackDoor.Dsnx", "Backdoor.DSNX.05", "Bck/DSNX.05", "Trojan.Dsnx", "Trojan-Spy.Win32.Flux.a", "Win32/DSNX.05", "Bck/DSNX.05" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "For", "exploiting", "this", "issue", ",", "any", "process", "running", "with", "any", "UID", "can", "be", "converted", "into", "root", "easily", "by", "simply", "using", "the", "following", "command", ":", "echo", "\"", "rootmydevice", "''", ">", "/proc/sunxi_debug/sunxi_debug", "The", "Linux", "3.4-sunxi", "kernel", "was", "originally", "designed", "to", "support", "the", "Android", "operating", "system", "on", "Allwinner", "ARM", "for", "tablets", ",", "but", "later", "it", "was", "used", "to", "port", "Linux", "to", "many", "Allwinner", "processors", "on", "boards", "like", "Banana", "Pi", "micro-PCs", ",", "Orange", "Pi", ",", "and", "other", "devices", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 9, 9, 16, 1, 9, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 4, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 4, 16, 16, 16, 16, 5, 13, 13, 16, 5, 13, 16, 16, 16, 16, 16 ]
[ "In", "July", "2014,", "Trend", "Micro", "published", "a", "report", "about", "a", "threat", "called", "Retefe,", "an", "ebanking", "Trojan", "that", "is", "targeting", "financial", "institutions", "in", "Switzerland,", "Austria,", "Sweden", "and", "Japan." ]
[ 16, 0, 8, 4, 12, 16, 16, 16, 16, 16, 16, 16, 3, 16, 3, 11, 16, 16, 16, 4, 12, 16, 2, 10, 10, 16, 2 ]
[ "Based", "on", "other", "public", "reports,", "SANs", "saw", "the", "expected", "Qakbot", "activity." ]
[ 16, 16, 16, 16, 16, 4, 16, 16, 16, 3, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.Regin.A", "Trojan.Regin", "Backdoor.Regin.A", "Trojan/Downloader.Tiny.br", "Backdoor.Regin.A", "W32/Backdoor.NAZD-1177", "Backdoor.Regin", "Backdoor.Regin.A", "Backdoor.Regin.A", "Backdoor.Regin.A", "Heur.Packed.Unknown", "Backdoor.Regin.A", "Virus.Win32.Dion.b", "TR/Regin.qzqib", "Trojan:WinNT/Regin.A!dha", "Trj/CI.A", "Win32/Trojan.2d3" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Hacktool.Paycrack", "Trojan/Hacktool.PayCrack.a", "W32/Trojan.TVD", "Win32/HackTool.PayCrack.A", "HackTool.Win32.PayCrack.a", "Riskware.Win32.PayCrack.hsmb", "Win32.Hacktool.Paycrack.Amwe", "Application.Win32.HackTool.PayCrack.A", "Tool.PayCrack.Win32.1", "W32/Trojan.IFEJ-8553", "HackTool.PayCrack.a", "Malware_fam.gw", "HackTool/Win32.PayCrack", "Win32.HackTool.PayCrack.a.kcloud", "Trojan.Kazy.D2127B", "HackTool.W32.PayCrack.a!c", "HackTool.Win32.PayCrack.a", "HackTool:Win32/Paycrack.A", "Trojan.VBRA.03914", "HackTool.PayCrack!/HSSYr26Jv4" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/W32.Rootkit.13224.C", "Win32.Trojan.KillAV.aa", "Trojan.Win32.NtRootKit.crkykj", "Trojan.NtRootKit.12298", "Trojan.Zusy.75", "Trojan:WinNT/Kernelpatch.A", "Trojan.Win32.KillAV" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "TrojanDownloader.Mariofev", "Dropper.Drooptroop.Win32.3960", "Trojan/Dropper.Drooptroop.jqh", "Trojan.TDss.50", "Win32.Trojan.WisdomEyes.16070401.9500.9998", "W32/MalwareF.QVRD", "TROJ_DROPPER.OFB", "Trojan.Win32.Drooptroop.cphrc", "Backdoor.Win32.Shiz.A", "Trojan.DownLoader1.42134", "TROJ_DROPPER.OFB", "BehavesLike.Win32.Ramnit.mc", "W32/Risk.VWDX-4897", "TrojanDropper.Drooptroop.cvo", "W32.Malware.Downloader", "TrojanDownloader:Win32/Mariofev.B", "Win-Trojan/Drooptroop.29184", "Trojan.SB.01742", "Trj/Sinowal.WXO", "Win32.Trojan-dropper.Drooptroop.Suxo", "Trojan.DR.Drooptroop!YuxRFC8vqfA", "Win32/Trojan.Downloader.5d7" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.HfsAutoB.6E94", "Dropped:Backdoor.Hupigon.AACP", "Backdoor.Delf.13917", "Backdoor.Delf.Win32.18733", "Trojan/Ceckno.nag", "Backdoor.Hupigon.AACP", "Win32.Trojan.Hupigon.b", "Win.Trojan.Crypted-5", "Backdoor.Win32.Delf.cxe", "Dropped:Backdoor.Hupigon.AACP", "Trojan.Win32.Delf.ivaq", "Backdoor.W32.Delf.lqj!c", "Win32.Backdoor.Delf.Lkxm", "Dropped:Backdoor.Hupigon.AACP", "Packed.Win32.Klone.~KE", "Dropped:Backdoor.Hupigon.AACP", "BackDoor.Beizhu.origin", "Trojan.Win32.Cosmu", "VirTool.MaskPE.f", "Trojan[Backdoor]/Win32.Delf", "PWS:Win32/Populf.E!dll", "Dropped:Backdoor.Hupigon.AACP", "Backdoor/Win32.Delf.C195770", "Dropped:Backdoor.Hupigon.AACP", "TScope.Trojan.Delf", "Backdoor.Delf!JSU0HMDt5JA", "W32/PEMask.A!tr", "Win32/Backdoor.Hupigon.88a" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.Tosct", "BKDR_WEBRV.A", "Win32.Trojan.WisdomEyes.16070401.9500.9995", "BKDR_WEBRV.A", "W32/Trojan.FUQN-2612", "W32.Trojan.Downloader", "Trojan.Heur.RP.EBE28B", "Backdoor:Win32/Tosct.A", "W32/Dloader.GQ!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "spam", "messages", "we", "observed", "used", "several", "different", "tactics", "to", "deliver", "malicious", "payloads", "to", "users,", "including", "macros,", "packager", "shell", "objects", "aka", "OLE", "objects,", "and", "links." ]
[ 1, 9, 9, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 16, 3, 11, 11, 11, 16, 1, 9, 16, 1 ]
[ "In", "this", "blog", "we", "begin", "with", "data", "from", "a", "real", "attack", "in", "the", "wild,", "and", "use", "the", "evidence", "from", "that", "attack", "to", "make", "a", "connection", "back", "to", "underground", "forums", "and", "the", "actors", "who", "are", "using", "them." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 6, 14, 16, 16, 6, 16, 16, 16, 16 ]
[ "Verification", "that", "the", "request", "is", "coming", "from", "the", "user", "’", "s", "device", "is", "completed", "using", "two", "possible", "methods", ":", "The", "user", "connects", "to", "the", "site", "over", "mobile", "data", ",", "not", "WiFi", "(", "so", "the", "service", "provider", "directly", "handles", "the", "connection", "and", "can", "validate", "the", "phone", "number", ")", ";", "or", "The", "user", "must", "retrieve", "a", "code", "sent", "to", "them", "via", "SMS", "and", "enter", "it", "into", "the", "web", "page", "(", "thereby", "proving", "access", "to", "the", "provided", "phone", "number", ")", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Gatt.A", "Backdoor.Small.oo", "Backdoor/Small.oo", "W32/Trojan.AVEH", "Infostealer.Onlinegame", "BKDR_SMALL.ALN", "Trojan.Downloader-17400", "Backdoor.Win32.Small.oo", "Trojan.Gatt.A", "Trojan.Win32.Veslorn!IK", "Trojan.Gatt.A", "DDoS.Bonke", "BKDR_SMALL.ALN", "W32/Trojan.AVEH", "Trojan.Gatt.A", "Win-Trojan/Xema.variant", "Backdoor.Win32.Small.oo", "Trojan-PSW.Onlinegame", "Backdoor.Pina.k", "Trojan.Win32.Veslorn" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Long", "before", "Kryptowire", "'s", "announcement", ",", "Tim", "Strazzere", ",", "a", "mobile", "security", "researcher", "with", "RedNaga", "Security", ",", "contacted", "BLU", "Products", "in", "March", "2015", "after", "he", "found", "two", "vulnerabilities", "that", "could", "be", "traced", "to", "Adup", "'s", "code", "." ]
[ 16, 16, 4, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 12, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.KillProc.33379", "Trojan.Foreign.Win32.54666", "Trojan[Ransom]/Win32.Foreign", "TrojanDropper:Win32/Rovnix.N", "W32/Kryptik.DDLY!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1 ]
[ "He", "told", "Amnesty", "International:", "one", "of", "my", "colleagues", "called", "me…and", "said", "I", "received", "an", "email", "from", "you", "and", "you're", "mentioning", "something", "about", "political", "prisoners", "and", "there", "is", "an", "attachment", "there." ]
[ 16, 16, 4, 12, 16, 16, 16, 4, 16, 1, 9, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "As", "mentioned", "before", ",", "our", "test", "device", "was", "automatically", "from", "stage", "one", "to", "stage", "two", ",", "which", "started", "collecting", "data", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "In", "the", "summer", "of", "2015,", "Fidelis", "Cybersecurity", "had", "the", "opportunity", "to", "analyze", "a", "Derusbi", "malware", "sample", "used", "as", "part" ]
[ 16, 16, 0, 16, 0, 4, 12, 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 16, 16 ]
[ "The", "carrier", "can", "determine", "that", "the", "request", "originates", "from", "the", "user", "’", "s", "device", ",", "but", "does", "not", "require", "any", "interaction", "from", "the", "user", "that", "can", "not", "be", "automated", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Recent", "samples", "are", "shown", "to", "infect", "Windows", "hosts", "with", "the", "NetSupport", "Manager", "remote", "access", "tool", "RAT." ]
[ 16, 16, 16, 16, 16, 16, 5, 13, 16, 3, 11, 11, 11, 11, 11, 11 ]
[ "In", "this", "case", ",", "a", "threat", "actor", "has", "been", "targeting", "customers", "of", "Bank", "Austria", ",", "Raiffeisen", "Meine", "Bank", ",", "and", "Sparkasse", "since", "at", "least", "January", "2017", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "List", "of", "packages", "received", "from", "the", "C2", "adminNumber", ":", "Setup", "of", "the", "admin", "phone", "number", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Tracking", "Subaat:", "Targeted", "Phishing", "Attacks", "Point", "Leader", "to", "Threat", "Actor's", "Repository" ]
[ 16, 3, 16, 1, 9, 16, 16, 16, 6, 14, 1 ]
[ "Following", "their", "activities", "and", "evolving", "tactics", "and", "techniques", "helped", "us", "uncover", "the", "proverbial", "red", "string", "of", "fate", "that", "connected", "three", "seemingly", "disparate", "campaigns:", "PLEAD,", "Shrouded", "Crossbow,", "and", "of", "late,", "Waterbear." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 6, 14, 14, 14, 16, 16, 16, 6 ]
[ "Following", "the", "seemingly", "quiet", "state", "of", "point-of-sale", "PoS", "malware", "these", "past", "few", "months,", "we", "are", "now", "faced", "with", "two", "new", "PoS", "malware", "named", "Katrina", "and", "CenterPoS", "now", "available", "to", "cybercriminals." ]
[ 16, 16, 16, 16, 16, 16, 3, 11, 11, 16, 0, 8, 8, 16, 16, 16, 16, 16, 16, 16, 3, 11, 16, 3, 16, 3, 16, 16, 16, 6 ]
[ "We", "recently", "wrote", "about", "the", "KONNI", "Remote", "Access", "Trojan", "RAT", "which", "has", "been", "distributed", "by", "a", "small", "number", "of", "campaigns", "over", "the", "past", "3", "years." ]
[ 16, 16, 16, 16, 16, 3, 11, 11, 11, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 6, 16, 0, 8, 8, 8 ]
[ "A", "backdoor", "also", "known", "as:", "W32.Virut.G", "W32/Virut.CF_2", "Win32/Virut.17408", "PE_VIRUX.F-1", "Virus.Win32.Virut.ce", "Win32.Virut.AL", "Virus.Win32.Virut.Ce", "Win32.Virut.56", "PE_VIRUX.F-1", "Win32/Virut.bn", "Trojan:Win32/Ertfor.A", "Virus.Virut.06", "HeurEngine.MaliciousPacker", "Win32/Virut.NBP", "W32/PackTDss.W!tr", "W32/Sality.AO" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "During", "our", "research", "into", "a", "widespread", "spam", "campaign,", "we", "discovered", "yet", "another", "POS", "malware", "that", "we've", "named", "NitlovePOS." ]
[ 16, 16, 16, 16, 16, 16, 6, 14, 16, 16, 16, 16, 3, 11, 16, 16, 16, 3 ]
[ "A", "backdoor", "also", "known", "as:", "Worm.Win32.VB!O", "W32/Autorun.worm.aba", "Win32.Trojan.WisdomEyes.16070401.9500.9993", "W32.SillyFDC", "Trojan-Dropper.Win32.Dapato.ddfx", "Trojan.Win32.Dapato.efldrk", "Win32.HLLW.Autoruner.10315", "Worm.VB.Win32.2517", "W32/Autorun.worm.aba", "Worm.Win32.VB", "Worm/VB.pfc", "W32.Worm.Sphr", "Worm/Win32.VB", "Worm.VB.kcloud", "Worm:Win32/Dashvolex.A", "Trojan.Strictor.DCDB", "Trojan-Dropper.Win32.Dapato.ddfx", "Worm/Win32.VB.C95007", "Trojan.VBO.014708", "Worm.VB!8247fVrcIiA", "W32/VB.OAN!tr", "Win32/Trojan.Dropper.d0e" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "Carbanak", "group", "is", "infamous", "for", "infiltrating", "various", "financial", "institutions,", "and", "stealing", "millions", "of", "dollars", "by", "learning", "and", "abusing", "the", "internals", "of", "victim", "payment", "processing", "networks,", "ATM", "networks", "and", "transaction", "systems." ]
[ 6, 14, 14, 16, 16, 11, 1, 16, 4, 12, 16, 1, 9, 9, 9, 16, 16, 16, 1, 9, 9, 16, 1, 9, 9, 9, 5, 13, 16, 5, 13 ]
[ "This", "blog", "discusses", "targeted", "attacks", "against", "the", "Middle", "East", "taking", "place", "between", "February", "and", "October", "2017", "by", "a", "group", "Unit", "42", "is", "naming", "MuddyWater" ]
[ 16, 16, 16, 16, 1, 16, 2, 10, 10, 16, 16, 16, 0, 16, 0, 8, 16, 16, 6, 4, 12, 16, 16, 3 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.Dtr.1.4.4", "Backdoor.DTR", "BackDoor-WF.svr.rmv", "Email-Worm.Win32.GOPworm.196", "Backdoor.Dtr.1.4.4", "W32/Risk.RVZV-3966", "Backdoor.Trojan", "Win32/DTR.14.rmvr", "BKDR_WF.SVR", "Backdoor.Dtr.1.4.4", "Backdoor.Dtr.1.4.4", "Trojan.Win32.Dtr.zmvuu", "Backdoor.Dtr.1.4.4", "Backdoor.Win32.DTR.14.rmvr", "BackDoor.Dtr.143", "Backdoor.Win32.C01A9ACD", "BackDoor-WF.svr.rmv", "W32.DTR.B", "BDS/Dtr.1.4.4", "Backdoor:Win32/DTR.B", "Backdoor.Dtr.1.4.4", "Email-Worm.Win32.GOPworm.196", "Win32.Trojan.Wf.Pefg", "Backdoor.WF!ynwdN87+ujc", "Trojan.Win32.DTR", "W32/Bdoor.WH!tr.bdr", "Win32/Backdoor.9a4" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "In", "this", "attack,", "AutoIT", "was", "utilized", "to", "install", "a", "Remote", "Access", "Trojan", "RAT", "and", "maintain", "persistence", "on", "the", "host", "in", "a", "manner", "that's", "similar", "to", "normal", "administration", "activity." ]
[ 16, 16, 1, 3, 16, 16, 16, 16, 3, 11, 11, 11, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "This", "report", "contained", "a", "sentence", "of", "particular", "interest", "to", "Cyber4Sight:", "FIN7", "is", "referred", "to", "by", "many", "vendors", "as", "Carbanak", "Group,'", "although", "we", "do", "not", "equate", "all", "usage", "of", "the", "Carbanak", "backdoor", "with", "FIN7.", "In", "their", "previous", "report", "on", "this", "threat", "actor", "group,", "FireEye", "stopped", "short", "of", "making", "this", "direct", "connection,", "stating", "instead", "that", "The", "use", "of", "the", "CARBANAK", "malware", "in", "FIN7", "operations", "also", "provides", "limited", "evidence", "that", "these", "campaigns", "are", "linked", "to", "previously", "observed", "CARBANAK", "operations", "leading", "to", "fraudulent", "banking", "transactions,", "ATM", "compromise,", "and", "other", "monetization", "schemes." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 6, 14, 16, 16, 16, 16, 16, 16, 16, 6, 14, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 11, 16, 6, 16, 16, 16, 16, 16, 16, 6, 14, 14, 4, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 16, 6, 14, 16, 16, 16, 16, 16, 16, 6, 16, 16, 16, 16, 16, 6, 14, 16, 16, 1, 9, 9, 9, 9, 9, 9, 9, 9 ]
[ "UNIX-based", "operating", "systems", "are", "widely", "used", "in", "servers,", "workstations,", "and", "even", "mobile", "devices." ]
[ 5, 13, 13, 16, 16, 16, 16, 5, 13, 16, 16, 5, 13 ]
[ "I.e.,", "malicious", "email", "messages", "are", "sent", "to", "selected", "targets", "rather", "than", "random", "mass", "distribution,", "but", "are", "not", "tailored", "specifically", "to", "each", "and", "every", "target." ]
[ 16, 1, 9, 9, 9, 9, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Worm.Win32.AutoDoor!O", "Worm.AutoDoor", "Trojan.Win32.Buzus", "Win32.Trojan.WisdomEyes.16070401.9500.9827", "W32/Trojan2.CWJR", "W32.IRCBot", "Win32/DfInject.CI", "TROJ_BUZUS.JW", "Win.Trojan.Buzus-2971", "Worm.Win32.AutoDoor.fd", "Trojan.Win32.Buzus.qvdn", "Trojan.Win32.Buzus.48128", "TrojWare.Win32.Buzus.~BAAM", "Trojan.MulDrop.27694", "Trojan.Buzus.Win32.5559", "TROJ_BUZUS.JW", "BehavesLike.Win32.Worm.cz", "Trojan/Buzus.esq", "Trojan/Win32.Buzus", "Trojan:Win32/Buzus.A", "Worm.Win32.AutoDoor.fd", "Trojan/Win32.Buzus.C140550", "Trojan.Win32.Buzus.ck", "Trojan.Win32.Buzus", "Trj/Buzus.ER", "Virus.Win32.Virut.ue", "Worm.Win32.AutoDoor", "W32/Injector.fam!tr", "Win32/Worm.07d" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Click", "fraud", "PHAs", "simulate", "user", "clicks", "on", "ads", "instead", "of", "simply", "displaying", "ads", "and", "waiting", "for", "users", "to", "click", "them", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "new_url", ":", "to", "change", "the", "URL", "of", "the", "C2", "server", "in", "the", "app", "preference", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Extract", "messages", "and", "the", "encryption", "key", "from", "the", "Telegram", "app", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16 ]
[ "In", "particular", ",", "EventBot", "can", "intercept", "SMS", "messages", "and", "bypass", "two-factor", "authentication", "mechanisms", "." ]
[ 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "TrojanPWS.Mintluks.FC.1419", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Trojan.Win32.Inject.dhybnf", "Trojan.DownLoader11.61306", "PWS:MSIL/Mintluks.A", "Trojan.Razy.D2D0CD", "MSIL.Trojan.Injector.HD", "Backdoor.Bot", "Trojan.MSIL.Injector", "Trj/CI.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "Patchwork", "attack", "group", "has", "been", "targeting", "more", "than", "just", "government-associated", "organizations." ]
[ 1, 9, 9, 9, 16, 16, 16, 16, 16, 16, 4, 12 ]
[ "It", "is", "usually", "used", "as", "a", "downloader", "for", "the", "actual", "binary", "payload." ]
[ 16, 16, 16, 16, 16, 16, 3, 16, 3, 11, 11, 11 ]
[ "However,", "over", "a", "period", "of", "just", "over", "two", "weeks", "June", "10", "to", "June", "28,", "we", "saw", "a", "recurrence", "of", "this", "threat." ]
[ 16, 16, 16, 16, 16, 16, 16, 0, 0, 0, 8, 16, 0, 8, 16, 16, 16, 16, 16, 16, 3 ]
[ "Hundreds", "of", "malware", "samples", "have", "been", "used,", "most", "are", "Remote", "Access", "Trojans", "and", "keyloggers." ]
[ 16, 16, 3, 16, 16, 16, 16, 16, 16, 3, 11, 11, 16, 3 ]
[ "The", "attackers", "initially", "injected", "a", "malicious", "user-defined", "function", "Downloader.Chikdos", "into", "servers", "in", "order", "to", "compromise", "them", "with", "the", "Trojan.Chikdos.A", "DDoS", "malware", "According", "to", "Symantec", "telemetry,", "the", "majority", "of", "the", "compromised", "servers", "are", "in", "India,", "followed", "by", "China,", "Brazil", "and", "the", "Netherlands." ]
[ 16, 6, 16, 16, 16, 16, 16, 16, 1, 16, 5, 16, 16, 16, 16, 16, 16, 16, 1, 3, 11, 16, 16, 4, 12, 16, 16, 16, 16, 5, 13, 16, 16, 2, 16, 16, 2, 10, 16, 2, 10 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Retefe", "W32/Trojan.IYLJ-0833", "Ransom.Cry", "Trojan.Win32.Banker1.euqajf", "TrojWare.Win32.Amtar.TAW", "Trojan.PWS.Banker1.23740", "Trojan.Adware.a", "Trojan/Win32.Injector.C2217431", "Trj/CI.A", "Win32.Trojan.Fakeversign.Vgov", "Win32/Trojan.Adware.37e" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "TrojanProxy.Roficor", "W32/Trojan.GIFJ-9110", "Win32/Tnega.TOWATOC", "TrojanProxy:Win32/Roficor.A", "Win32.Trojan.Falsesign.Duco" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1 ]
[ "Adwind", "is", "a", "Java-based", "remote", "access", "tool", "RAT", "used", "by", "malware", "authors", "to", "infect", "computers", "with", "backdoor", "access." ]
[ 3, 16, 16, 3, 11, 11, 11, 11, 16, 16, 6, 14, 16, 16, 5, 16, 3, 11 ]
[ "All", "modules", "set", "hidden", "attributes", "to", "their", "files", ":", "Module", "Paths", "Exfiltrated", "data", "format", "msconf.exe", "%", "APPDATA", "%", "/myupd/gen/", "%", "Y", "%", "m", "%", "d-", "%", "H", "%", "M", "%", "S_filesystem.zip", "(", "file", "structure", "dump", ")", "system.exe", "%", "APPDATA", "%", "/myupd/aud/", "%", "d", "%", "m", "%", "Y", "%", "H", "%", "M", "%", "S.wav", "(", "surrounding", "sounds", ")", "update.exe", "%", "APPDATA", "%", "/myupd_tmp/txt/", "%", "APPDATA", "%", "/myupd/txt/", "%", "Y", "%", "m", "%", "d-", "%", "H", "%", "M", "%", "S.txt", "(", "keylogging", ")", "wow.exe", "%", "APPDATA", "%", "/myupd/scr/", "%", "Y", "%", "m", "%", "d-", "%", "H", "%", "M", "%", "S.jpg", "(", "screenshots", ")", "skype_sync2.exe", "%", "APPDATA", "%", "/myupd_tmp/skype/", "%", "APPDATA", "%", "/myupd/skype/", "yyyyMMddHHmmss_in.mp3", "yyyyMMddHHmmss_out.mp3", "(", "skype", "calls", "records", ")", "Moreover", ",", "we", "found", "one", "module", "written", "in", ".Net", "–", "skype_sync2.exe", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 1, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 1, 16 ]
[ "Removing", "the", "junk", "instructions", "revealed", "a", "readable", "block", "of", "code", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/W32.Scar.995328.O", "Trojan/Scar.dzrv", "Win32.Trojan.WisdomEyes.16070401.9500.9996", "Trojan.Bayrob", "Trojan.Win32.Scar.cpddg", "Troj.W32.Scar.dzrv!c", "Trojan.Scar.Win32.50507", "BehavesLike.Win32.GameVance.dt", "Trojan/Scar.bagk", "TR/Woripecs.A.48", "Trojan.Heur.JP.EFC713", "Backdoor:Win32/Nivdort.A!dll", "Trojan/Win32.Bayrob.C236811", "Trojan.Scar!yb6+goUnDvM", "Trojan.Win32.Woripecs", "W32/Scar.AT!tr", "Win32/Trojan.Spy.84a" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Stealing", "SMS", "Figure", "10", ":", "Stealing", "SMS", "messages", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16 ]