tokens
sequencelengths
2
296
ner_tags
sequencelengths
2
296
[ "FakeSpy", "uses", "an", "anti-debugging", "technique", "by", "creating", "another", "child", "process", "of", "itself", "." ]
[ 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "core", "malware", "is", "usually", "disguised", "as", "Google", "Updater", ",", "Google", "Update", "for", "U", "or", "β€œ", "com.google.vending", "”", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 4, 16, 16, 4, 16, 16, 16, 16, 16, 1, 16, 16 ]
[ "The", "service", "connects", "back", "to", "the", "attacker", "machine", "and", "waits", "for", "commands", "which", "will", "be", "given", "by", "the", "attacker." ]
[ 16, 1, 16, 16, 16, 16, 6, 5, 16, 16, 16, 1, 16, 16, 16, 16, 16, 6, 14 ]
[ "Crooks", "behind", "MajikPOS", "have", "various", "tricks", "up", "their", "sleeves." ]
[ 6, 16, 3, 16, 16, 16, 16, 16, 16 ]
[ "TA473", "has", "continuously", "leveraged", "an", "unpatched", "Zimbra", "vulnerability", "in", "publicly", "facing", "webmail", "portals", "that", "allows", "them", "to", "gain", "access", "to", "the", "email", "mailboxes", "of", "government", "entities", "in", "Europe." ]
[ 6, 16, 16, 16, 16, 7, 15, 15, 16, 5, 13, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 16, 4, 12, 16, 2 ]
[ "Unlike", "previously", "seen", "non-GP", "(", "Google", "Play", ")", "centric", "malware", "campaigns", ",", "β€œ", "Agent", "Smith", "”", "has", "a", "significant", "impact", "upon", "not", "only", "developing", "countries", "but", "also", "some", "developed", "countries", "where", "GP", "is", "readily", "available", "." ]
[ 16, 16, 16, 16, 16, 5, 13, 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Presumably", "from", "the", "same", "author", "of", "Petya,", "which", "was", "first", "seen", "in", "December", "2016,", "and", "the", "Petya-Mischa", "combo,", "which", "hit", "users", "back", "in", "July", "2016,", "Janus", "Cybercrime", "Solution's", "latest", "creation", "is", "another", "step", "in", "the", "evolution", "of", "their", "ransomware-as-a-service", "expansion." ]
[ 16, 16, 16, 6, 14, 16, 3, 16, 16, 16, 16, 16, 0, 8, 16, 16, 3, 16, 16, 16, 4, 16, 16, 0, 8, 4, 12, 12, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16 ]
[ "Our", "research", "indicates", "that", "the", "group", "has", "sufficient", "financial", "resources", "to", "purchase", "the", "source", "code", "of", "a", "widely", "available", "malware", "tool,", "and", "the", "human", "resources", "to", "design", "improved", "versions", "of", "its", "own", "backdoors", "based", "on", "this." ]
[ 4, 12, 16, 15, 16, 12, 16, 16, 16, 16, 16, 16, 16, 1, 9, 16, 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 15, 16, 16, 16, 3, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Downloader.JRQH", "Trojan.Downloader.JRQH", "Win32.Trojan.WisdomEyes.16070401.9500.9945", "Win32.Trojan-Downloader.Banload.J", "Trojan-Downloader.MSIL.Banload.bgr", "Trojan.Downloader.JRQH", "Trojan.Win32.Banload.dzssxt", "Trojan.Downloader.JRQH", "Trojan.Downloader.JRQH", "Trojan-Downloader.MSIL.Banload.bgr", "TrojanDownloader:MSIL/Banload.T", "Trojan/Win32.Banload.C829219", "Trojan.Banker.ABR", "Trj/GdSda.A", "Msil.Trojan-downloader.Banload.Efkz", "Trojan-Downloader.MSIL.Banload" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Trigona", "ransomware", "is", "a", "relatively", "new", "strain", "that", "security", "researchers", "first", "discovered", "in", "late", "October", "2022." ]
[ 3, 11, 16, 16, 16, 16, 16, 16, 4, 12, 16, 16, 16, 0, 8, 8 ]
[ "update.exe", "module", "and", "Xenotix", "Python", "Keylogger", "code", "comparison", "β€˜", "addStartup", "’", "method", "from", "msconf.exe", "module", "β€˜", "addStartup", "’", "method", "from", "Xenotix", "Python", "Keylogger", "Distribution", "We", "found", "several", "landing", "pages", "that", "spread", "the", "Android", "implants", "." ]
[ 1, 16, 16, 5, 13, 13, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 5, 13, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16 ]
[ "THE", "CAMPAIGN", "The", "malware", "'s", "primary", "infection", "vector", "is", "SMS", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "HW32.Packed.A537", "Packed.Win32.TDSS!O", "RiskWare.Tool.CK", "BehavesLike.Win32.Downloader.dc", "TR/Bumat.A.2896", "Win32.Troj.Undef.kcloud", "Win-Trojan/Xema.variant", "PE:Malware.XPACK-HIE/Heur!1.9C48", "Trojan.Crypt", "W32/Malware_fam.NB", "Win32/Trojan.648" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "We", "observed", "legitimate", "exfiltrated", "files", "of", "the", "following", "types", "of", "data", ":", "Contact", "information", "Compressed", "recorded", "audio", "in", "the", "Adaptive", "Multi-Rate", "(", "amr", ")", "file", "format", "Images", "captured", "from", "the", "device", "camera", "Images", "stored", "on", "both", "internal", "device", "and", "SDCard", "storage", "that", "are", "listed", "in", "the", "MediaStore", "Device", "geolocation", "information", "SMS", "content", "Chrome", "browser", "search", "history", "and", "bookmarks", "Call", "log", "information", "Cell", "tower", "information", "Device", "network", "metadata", ";", "such", "as", "phone", "number", ",", "device", "software", "version", ",", "network", "country", ",", "network", "operator", ",", "SIM", "country", ",", "SIM", "operator", ",", "SIM", "serial", ",", "IMSI", ",", "voice", "mail", "number", ",", "phone", "type", ",", "network", "type", ",", "data", "state", ",", "data", "activity", ",", "call", "state", ",", "SIM", "state", ",", "whether", "device", "is", "roaming", ",", "and", "if", "SMS", "is", "supported", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "This", "post", "describes", "the", "new", "campaign." ]
[ 16, 16, 16, 6, 14, 14 ]
[ "A", "backdoor", "also", "known", "as:", "HW32.Packed.2431", "Trojan.MSIL.FKV", "WS.Reputation.1", "Stimilik.S", "Trojan.Win32.Confuser.dkqarl", "BehavesLike.Win32.Kudj.gc", "Trojan/Win32.Stealer", "PUA.MSIL.Confuser" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Attackers", "also", "used", "the", "name", "of", "the", "top", "NIC", "official", "in", "the", "signature", "of", "the", "email,", "this", "is", "to", "make", "it", "look", "like", "the", "email", "was", "sent", "by", "a", "high", "ranking", "Government", "official", "working", "at", "NIC", "National", "Informatics", "Centre." ]
[ 6, 16, 16, 16, 16, 16, 16, 16, 4, 12, 16, 1, 9, 9, 9, 9, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16, 16, 16, 4, 12, 12, 12 ]
[ "PaloAlto", "observed", "a", "targeted", "attack", "in", "November", "directed", "at", "an", "individual", "working", "for", "the", "French", "Ministry", "of", "Foreign", "Affairs." ]
[ 4, 16, 16, 1, 9, 16, 0, 16, 3, 16, 4, 16, 11, 16, 4, 12, 12, 12, 12 ]
[ "Red", "Alert", "Plays", "Dress-Up", "In", "the", "wild", ",", "we", "found", "Web", "pages", "designed", "to", "(", "vaguely", ")", "resemble", "legitimate", "app", "market", "pages", ",", "hosting", "files", "for", "download", "that", "have", "been", "disguised", "as", "a", "legitimate", "mobile", "application", "of", "moderately", "broad", "appeal", ",", "such", "as", "a", "media", "player", "or", "social", "media", "app", "." ]
[ 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "HMRC", "taxes", "application", "with", "reference", "L4TI", "2A0A", "UWSV", "WASP", "received" ]
[ 4, 1, 9, 16, 16, 1, 9, 9, 9, 16 ]
[ "The", "infection", "attempts", "occurred", "in", "September", "and", "October", "of", "2015", "as", "public", "frustration", "grew", "at", "the", "Mexican", "government's", "seemingly", "contradictory", "statements", "about", "the", "Narvarte", "case" ]
[ 16, 3, 16, 16, 16, 0, 16, 0, 8, 8, 16, 16, 16, 16, 3, 4, 12, 12, 16, 16, 16, 16, 4, 12, 12 ]
[ "A", "backdoor", "also", "known", "as:", "Worm/W32.Mydoom.28864", "W32.Mydoom.M", "W32/Mydoom.o@MM", "W32/Mydoom.m", "I-Worm.Mydoom!qBn5HU3v+Lw", "W32/Mydoom.O@mm", "W32.Mydoom.M@mm", "MyDoom.L@mm", "Win32/Mydoom.O", "Win32.Mydoom.m", "Worm.Mydoom-27", "Email-Worm.Win32.Mydoom.m", "I-Worm.Win32.Mydoom.28864.A", "Email-Worm.Win32.Mydoom!IK", "Worm.Win32.Mydoom.R", "Win32.HLLM.MyDoom.54464", "Worm/Mydoom.O.1", "W32/Mydoom.o@MM", "Worm/Sramota.bef", "Worm/Win32.Mydoom", "Worm:Win32/Mydoom.O@mm", "W32/Mydoom.O@mm", "Win32/Mydoom.worm.49344.B", "Email-Worm.Win32.Mydoom.m", "Win32/Mydoom.R", "Worm.Mail.Mydoom.dh", "Email-Worm.Win32.Mydoom", "W32/Mydoom.M!dam", "I-Worm/Mydoom.O", "W32/Mydoom.N.worm" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "news", "organization", "provides", "reporting", "on", "its", "website", "in", "English,", "Georgian,", "and", "Russian." ]
[ 16, 4, 12, 16, 16, 16, 16, 1, 16, 2, 10, 16, 2 ]
[ "Lookout", "researchers", "have", "identified", "a", "new", ",", "highly", "targeted", "surveillanceware", "family", "known", "as", "Desert", "Scorpion", "in", "the", "Google", "Play", "Store", "." ]
[ 4, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 5, 13, 13, 16 ]
[ "Mandiant", "suspects", "UNC2970", "specifically", "targeted", "security", "researchers", "in", "this", "operation." ]
[ 4, 16, 6, 16, 16, 4, 12, 16, 16, 16 ]
[ "It", "is", "also", "much", "harder", "for", "network", "defenders", "or", "researchers", "to", "track", "a", "campaign", "where", "the", "infrastructure", "is", "a", "moving", "target", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "jhfrte.jar", ":", "This", "is", "a", "java", "archive", "file", "downloaded", "from", "server", "." ]
[ 9, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.FamVT.LoringK.Trojan", "Backdoor.Bot.158614", "Trojan-Dropper.Win32!O", "TrojanDropper.Loring.A11", "Backdoor.Bot.158614", "Backdoor.IRCBot", "Trojan/IRCBot.ov", "WORM_KWBOT.AR", "W32/Risk.VXNU-4867", "W32.Kwbot.Worm", "Win32/Loring.A", "WORM_KWBOT.AR", "Win.Trojan.Obfuscated-1662", "Backdoor.Bot.158614", "Trojan.Win32.Reconyc.gunk", "Backdoor.Bot.158614", "Trojan.Win32.IRCBot.dmigck", "Dropper.Loring.291411", "Backdoor.Bot.158614", "Backdoor.Bot.158614", "Trojan.MulDrop5.7150", "Trojan.Reconyc.Win32.6040", "WORM/IrcBot.86875", "Trojan[Backdoor]/Win32.IRCBot", "Win32.Troj.Loring.EA.kcloud", "Backdoor.Bot.D26B96", "Troj.Dropper.W32.Loring.l8Ew", "Worm/Win32.IRCBot.R3593", "TScope.Trojan.Delf", "Trojan.IRCBot.OV", "Win32/IRCBot.OV", "Trojan.DR.Loring!O3IAMVgzzx8", "Trojan-Dropper.Win32.Loring" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/Injector.iuc", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Win32/Pushbot.AJZ", "WORM_PALEVO.SMA", "Win.Trojan.Ircbrute-54", "Trojan.Win32.Ircbrute.eqsrw", "Trojan.Spambot.9818", "Trojan.Injector.Win32.53831", "WORM_PALEVO.SMA", "BehavesLike.Win32.PWSZbot.lh", "Backdoor.Win32.IRCBot", "Trojan/Win32.Unknown", "Trojan:Win32/Ircbrute.B", "Trojan.Graftor.DCFC", "Worm/Win32.Ckbface.R16129", "Trojan.Injector!aNdlYeuOVuU" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "While", "the", "malware", "was", "not", "detectable", "by", "endpoint", "antivirus", "products,", "RSA", "Security", "Analytics", "was", "able", "to", "identify", "and", "alert", "on", "its", "network", "traffic,", "and", "RSA", "ECAT", "subsequently", "identified", "the", "malware." ]
[ 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 4, 12, 12, 16, 16, 16, 16, 16, 11, 16, 16, 1, 9, 16, 4, 12, 16, 16, 16, 3 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Script.400873", "Exploit/PDF-URI2.AS", "Exploit-PDF.f", "Exploit.W32.Pidief!c", "PDF.Exploit.Pidief.an", "Bloodhound.PDF.9", "Trojan.Script.400873", "Exploit.Win32.Pidief.asz", "Trojan.Script.400873", "Exploit.Script.Pidief.ibwe", "PDF.S.Exploit.10714", "Win32.Exploit.Pidief.Anfp", "Trojan.Script.400873", "Exploit.JS.Pdfka.MJ", "Trojan.Script.400873", "Exploit.PDF.303", "HEUR_PDFEXP.B", "BehavesLike.PDF.Trojan.lr", "Exploit:Win32/Pdffir.A", "Trojan.Script.D61DE9", "Exploit.Win32.Pidief.asz", "PDF/Pidief.EI", "Trojan.Script.400873", "Exploit.Win32.Pidief.asz", "JS.Crypt.BSP", "Exploit.JS.Pdfka", "JS/Pdfka.BSP!exploit", "virus.pdf.20090837.1" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.DropperZbotS.Trojan", "Trojan-Spy.Win32.Zbot!O", "Trojan.AutoIt.Pik.A", "Backdoor/Poison.evja", "Trojan.Zbot", "Trojan.Win32.Autoit.pik", "Trojan.Win32.Autoit.exoora", "Trojan.Win32.Z.Autoit.955563", "Troj.W32.Autoit!c", "BehavesLike.Win32.Dropper.dc", "Trojan.Win32.Injector", "Trojan.Autoit.kzp", "TR/AD.Zbot.cgaww", "Trojan.Win32.Autoit.pik", "Trojan:Win32/Krilog.A", "Trojan.Autoit.F", "Win32/Injector.Autoit.AOI", "Win32.Trojan.Autoit.Edne", "W32/Autoit.NWS!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Several", "hardcoded", "applications", "targeted", "by", "the", "MDM-grabbing", "command", "β€˜", "wifi", "’", "–", "this", "command", "creates", "a", "new", "Wi-Fi", "connection", "with", "specified", "configurations", "from", "the", "command", "and", "enable", "Wi-Fi", "if", "it", "is", "disabled", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.DakusarDRW.Trojan", "Trojan.Blocker.Win32.34866", "Trojan.DownLoader24.32105", "BehavesLike.Win32.Shodi.tc", "Worm:Win32/Icorimg.A", "Trojan.Strictor.D1C7BA", "HEUR/Fakon.mwf", "Trojan.Worm!33g50yRKTx8", "Trojan.FLCM!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "First", ",", "an", "activity", "named", "MainActivity", "fires", "up", ",", "taking", "care", "of", "hiding", "the", "icon", "and", "showing", "the", "fake", "notification", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Upon", "further", "inspection,", "the", "RAT", "appeared", "to", "share", "many", "similarities", "with", "an", "old", "Chinese", "backdoor", "known", "as", "Hacker's", "Door", "first", "released", "publicly", "in", "2004", "and", "updated", "in", "2005." ]
[ 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 3, 11, 11, 11, 16, 16, 3, 11, 16, 16, 16, 16, 0, 16, 0, 8, 8 ]
[ "Due", "to", "the", "current", "absence", "of", "maintained", "and", "supported", "Android", "banking", "Malware-as-a-Service", "in", "the", "underground", "community", ",", "there", "is", "a", "certainly", "demand", "for", "a", "new", "service", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "BackDoor-CMQ.dldr", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "TROJ_HORST.SMPE", "Monitor.W32.WebWatcher.lt5Y", "TROJ_HORST.SMPE", "BackDoor-CMQ.dldr", "Trojan.Graftor.D476C", "BScope.Malware-Cryptor.Win32.313", "Trojan.Win32.Cosmu", "W32/Dloader.BOW!tr.dldr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "campaign", "was", "active", "between", "November", "2016", "and", "January", "2017,", "targeting", "a", "limited", "number", "of", "people." ]
[ 16, 6, 16, 16, 16, 0, 8, 16, 0, 8, 16, 16, 4, 12, 12, 12 ]
[ "In", "this", "particular", "case", ",", "the", "bot", "abuses", "the", "accessibility", "service", "privilege", "to", "obtain", "the", "package", "name", "of", "the", "foreground", "application", "and", "determine", "whether", "or", "not", "to", "show", "a", "phishing", "overlay", "window", ",", "as", "shown", "in", "the", "following", "code", "snippet", ":", "Targets", "Some", "examples", "of", "phishing", "overlays", "are", "shown", "below", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Quasar", "is", "a", ".NET", "Framework-based", "open-source", "RAT." ]
[ 3, 16, 16, 5, 16, 16, 3 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Win32.Z.Delf.2373896", "Troj.Spy.W32.Zbot.lw7D", "Win32.Trojan-downloader.Rakhni.Html", "Trojan-Downloader.Win32.Delf", "W32/Application.AJYX-3726", "TrojanDownloader.Rakhni.ec", "TR/Dldr.Delf.tbxxd", "W32/Dloader.CDW!tr", "Trojan[Downloader]/Win32.Rakhni", "Trojan.Application.Bundler.InstallMonster.392", "Trojan-Downloader.Win32.Rakhni.jqc", "Trj/CI.A", "Win32/Trojan.036" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ ")", "If", "the", "application", "hasn", "’", "t", "received", "instructions", "about", "the", "rules", "for", "processing", "incoming", "SMSs", ",", "it", "simply", "saves", "all", "SMSs", "to", "a", "local", "database", "and", "uploads", "them", "to", "the", "C", "&", "C", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "While", "it", "is", "not", "clear", "whether", "the", "primary", "goal", "of", "the", "attack", "was", "delivering", "the", "malicious", "payload", "or", "capturing", "the", "targets", "OWA", "credentials,", "this", "attack", "uses", "an", "OWA", "phish", "to", "additionally", "pushes", "a", "malicious", "document", "with", "a", "Veil-Framework", "payload", "capable", "of", "downloading", "further", "malware." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 3, 11, 16, 16, 16, 16, 4, 16, 16, 3, 16, 16, 7, 1, 16, 16, 16, 16, 1, 9, 16, 16, 3, 11, 16, 16, 16, 16, 3 ]
[ "The", "second", "Project", "Spy", "version", "has", "similar", "capabilities", "to", "the", "first", "version", ",", "with", "the", "addition", "of", "the", "following", ":", "Stealing", "notification", "messages", "sent", "from", "WhatsApp", ",", "Facebook", ",", "and", "Telegram", "Abandoning", "the", "FTP", "mode", "of", "uploading", "the", "recorded", "images", "Aside", "from", "changing", "the", "app", "’", "s", "supposed", "function", "and", "look", ",", "the", "second", "and", "third", "versions", "’", "codes", "had", "little", "differences", "." ]
[ 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 5, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Installed", "with", "backdoored", "software,", "for", "example:-", "Telegram.exe", "-", "mech_korolya_artura_2017.HDRip.exe" ]
[ 16, 16, 3, 11, 11, 16, 1, 16, 1 ]
[ "Founded", "in", "2013,", "the", "Android", "Marcher", "mobile", "malware", "has", "widely", "been", "targeting", "Google", "Play", "--", "harvesting", "user", "credentials", "and", "credit", "card", "data." ]
[ 16, 16, 0, 16, 3, 11, 11, 11, 16, 16, 16, 16, 5, 13, 16, 16, 16, 1, 9, 9, 9, 9 ]
[ "Ransomware", "persists", "as", "one", "of", "the", "top", "crimeware", "threats", "thus", "far", "into", "2016." ]
[ 3, 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 16, 0 ]
[ "A", "backdoor", "also", "known", "as:", "W32.FamVT.AxVDb.Trojan", "Trojan.Rincux.AW", "Trojan.Injector.26488", "Trojan.Rincux.AW", "Trojan.Injector", "Tool.StormAttack.Win32.10", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Backdoor.Trojan", "Win.Trojan.Rincux-6417593-0", "Trojan-DDoS.Win32.StormAttack.c", "Trojan.Rincux.AW", "Trojan.Win32.Tdss.bziyas", "Trojan.Rincux.AW", "TrojWare.Win32.Magania.~AAC", "DDoS.Storm.156", "BehavesLike.Win32.Backdoor.km", "TrojanDDoS.StormAttack.a", "Trojan[Rootkit]/Win32.TDSS", "DDoS:Win32/Stormser.A", "Trojan.Rincux.AW", "Trojan-DDoS.Win32.StormAttack.c", "BScope.Trojan.Win32.Inject.2", "Trojan-Downloader.Win32.Pangu", "W32/ServStart.AS!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "That", "version", "flags", "messages", "\"", "containing", "certain", "language", "associated", "with", "junk", "texts", "and", "flags", "numbers", "associated", "with", "junk", "calls", "and", "not", "in", "a", "user", "'s", "contacts", ",", "''", "the", "company", "says", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "]", "com", "Given", "that", "there", "is", "some", "overlap", "in", "the", "previous", "two", "versions", ",", "it", "came", "as", "no", "surprise", "to", "us", "that", "we", "finally", "identified", "a", "sample", "which", "is", "an", "evolution", "based", "on", "both", "previous", "versions", "." ]
[ 9, 9, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Daserf's", "main", "purpose", "is", "information", "stealing", "and", "the", "Trojan", "is", "capable", "of", "gathering", "information", "from", "infected", "computers", "and", "relaying", "it", "back", "to", "attacker-controlled", "servers." ]
[ 3, 16, 16, 16, 1, 9, 16, 16, 3, 16, 16, 16, 1, 9, 16, 5, 13, 16, 16, 16, 16, 16, 5, 13 ]
[ "Due", "to", "new", "EU", "money", "laundering", "guidelines", ",", "the", "new", "Bank", "Austria", "security", "app", "is", "mandatory", "for", "all", "customers", "who", "have", "a", "mobile", "phone", "number", "in", "our", "system", "." ]
[ 16, 16, 16, 4, 16, 16, 16, 16, 16, 16, 5, 13, 13, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan-Dropper.Win32.Flystud!O", "Trojan.Hookmoot.S217748", "Trojan.Symmi.D7D5", "Win32.Worm.FlyStudio.mc", "Trojan.Dropper", "Win32/SillyAutorun.ALB", "Win.Trojan.Rootkit-7763", "Win32.Trojan.FlyStudio.A", "Trojan-GameThief.Win32.OnLineGames.boif", "Trojan.Win32.QQPass.esaped", "Troj.Dropper.W32.Flystud.lBWL", "Trojan.MulDrop5.5320", "Dropper.Flystud.Win32.139", "BehavesLike.Win32.Autorun.vc", "Trojan/PSW.OnLineGames.cvvq", "RKIT/Tiny.BK.2", "Trojan:Win32/Englov.A", "Trojan-GameThief.Win32.OnLineGames.boif", "HEUR/Fakon.mwf", "Rootkit.Tiny", "Trojan.AutoRun", "Win32/FlyStudio.A", "Trojan.TenThief.QQPsw.tss", "Worm.Autorun!1DOkY6YfgQ8", "Rootkit.Win32.Tiny", "W32/BDoor.DRV!tr", "Win32/Trojan.dd5" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "This", "attack", ",", "however", ",", "seems", "exclusive", "to", "Android", "users", ",", "as", "it", "does", "not", "have", "the", "code", "to", "attack", "iOS", "devices", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16 ]
[ "The", "code", "implementation", "again", "seems", "that", "it", "has", "been", "added", "for", "testing", "purposes", "only", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "But", "we", "recently", "identified", "an", "app", "that", "demonstrated", "new", "ways", "of", "successfully", "evading", "Apple's", "code", "review." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16, 16 ]
[ "The", "stolen", "credentials", "may", "be", "used", "for", "remote", "access", "into", "the", "victim", "network", "if", "applicable." ]
[ 16, 1, 16, 16, 16, 16, 16, 1, 9, 16, 5, 13, 13, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Darkshell", "BehavesLike.Win32.Ipamor.nm", "Trojan[Downloader]/Win32.Delf", "Trojan:WinNT/Darkshell.C", "Trojan/Win32.CSon.R1800", "Trojan.Win32.Scar.mg" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.HfsAutoB.B01D", "Troj.Crypt.Tpm!c", "BehavesLike.Win32.PWSQQPass.vc", "Trojan:Win32/Valan.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1 ]
[ "It", "can", "also", "imitate", "a", "legitimate", "website", "to", "lure", "you", "into", "revealing", "your", "sensitive", "information." ]
[ 16, 16, 16, 16, 16, 1, 9, 16, 16, 16, 16, 16, 16, 1, 9 ]
[ "Dyreza", "originally", "focused", "on", "intercepting", "end-user", "bank", "logins,", "and", "later", "expanded", "to", "job", "hunting,", "file", "hosting,", "domain", "registration,", "website", "hosting,", "file", "hosting,", "tax", "services,", "and", "online", "retail", "categories" ]
[ 3, 16, 16, 16, 1, 9, 9, 9, 16, 16, 16, 16, 4, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12 ]
[ "Brain", "Test", "has", "been", "removed", "from", "Google", "Play", "since", "September", "24." ]
[ 3, 11, 16, 16, 16, 16, 5, 13, 16, 0, 8 ]
[ "A", "backdoor", "also", "known", "as:", "W32.FamVT.DinwoodAATTC.Worm", "Trojan.Zenshirsh.SL7", "TSPY_EYDROP.SMA", "Win32/Oflwr.A!crypt", "TSPY_EYDROP.SMA", "Win.Worm.Allaple-5", "Trojan-Dropper.Win32.Dinwod.acqn", "Trojan.Win32.Dinwod.ejafor", "Troj.Dropper.W32.Dinwod.toVw", "TrojWare.Win32.TrojanDropper.Dinwod.A", "Trojan.Inject1.58305", "BehavesLike.Win32.Dropper.wh", "TrojanDropper.Dinwod.ale", "Worm[NET]/Win32.Nimda.gic", "Trojan-Dropper.Win32.Dinwod.acqn", "Trojan/Win32.OnlineGameHack.C33730", "TrojanDropper.Dinwod", "Trojan.Dropper", "Trojan.DR.Dinwod!dCCk6/8cSJk" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Finally", ",", "the", "specific", "overlays", "are", "designed", "for", "Australian", "financial", "institutions", ",", "and", "Australia", "is", "one", "of", "the", "geographic", "regions", "that", "is", "accepted", "by", "the", "C2", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Win32.Symmi!O", "WS.Reputation.1", "OnLineGames.IRMW", "Win32/Oflwr.A!crypt", "Riskware.Win32.FakeLPK.cwuava", "BackDoor.BlackHole.21297", "TR/Obfuscated.XZ.937", "HackTool.Sniffer.WpePro", "PSW.OnlineGames4.BEIZ" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Connapts", "Trojan/Small.ndx", "Trojan.Heur.LP.EDC094", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Trojan.Win32.MLW.dylhy", "W32/Trojan.CISW-8628", "Backdoor.Bot/Variant", "Trojan/Win32.Xema.C93063", "W32/Small.NDX!tr", "Win32/Backdoor.796" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "This", "spring,", "the", "author", "of", "the", "NukeBot", "banking", "Trojan", "published", "the", "source", "code", "of", "his", "creation." ]
[ 16, 0, 6, 14, 16, 16, 3, 11, 11, 16, 1, 9, 9, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Adware.ELEXCRTD.Win32.5604", "Trojan.Johnnie.D709", "not-a-virus:AdWare.Win32.Elex.sgn", "Adware.Mutabaha.1819", "RiskTool.Uncheckit.l", "TR/Chuckenit.dglxl", "Trojan:Win32/Chuckenit.A", "not-a-virus:AdWare.Win32.Elex.sgn" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "This", "blog", "post", "highlights", "the", "technical", "innovations", "that", "we", "found", "in", "the", "latest", "versions", "of", "Carbon", "we", "have", "discovered." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.Slingup", "BKDR_SLINGUP.M", "W32/Zbot.AAJD", "Backdoor.Trojan", "BKDR_SLINGUP.M", "Trojan.Win32.Yakes.pqep", "Trojan.Win32.Inject.ecmohu", "Trojan.Win32.Z.Yakes.672768", "Troj.W32.Yakes.tn6w", "BackDoor.Tordev.8", "Trojan.Win32.Injector", "W32/Zbot.EUMY-8878", "TR/Injector.juol", "Trojan/Win32.Yakes", "Trojan:Win32/Casidel.A", "Trojan.Win32.Yakes.pqep", "Trojan.Yakes", "Trojan.Yakes", "Trj/CI.A", "Win32/Injector.CXUT", "Win32.Trojan.Yakes.Ehid", "Trojan.Yakes!YuLYvE8ikp0", "W32/Injector.CGQK!tr", "Win32/Trojan.621" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "We", "do", "not", "know", "exactly", "how", "many", "people", "have", "been", "infected", "with", "RuMMS", "malware", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.Vetor.PE", "Virus.Win32.Virut.1!O", "W32.Virut.G", "Virus.Virut.Win32.27", "W32/Virut.AI", "W32.Virut.CF", "Win32/Virut.17408", "PE_VIRUX.A-1", "Virus.Win32.Virut.ce", "Virus.Win32.Virut.hpeg", "Virus.Win32.Virut.tt", "Virus.Win32.Virut.CE", "Trojan.MulDrop1.57199", "PE_VIRUX.A-1", "BehavesLike.Win32.Virut.dc", "W32/Virut.AI", "Win32/Virut.bn", "Trojan[Dropper]/Win32.Injector", "Win32.Virut.nc.53248", "Virus.Win32.Virut.ce", "Win32/Virut.F", "Virus.Virut.06", "Win32.Virut.E", "Win32/Virut.NBP", "IM-Worm.Win32.Zeroll", "W32/Sality.AO", "Virus.Win32.VirutChangeEntry.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Spreads", "via", "password", "guessing", "over", "networks" ]
[ 16, 16, 16, 16, 16, 12 ]
[ "The", "malware", "samples", "were", "mainly", "distributed", "through", "a", "series", "of", "malicious", "subdomains", "registered", "under", "a", "legitimate", "domain", "belonging", "to", "a", "well-known", "shared", "hosting", "service", "provider", "in", "Russia", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Kitoles", "Trojan.Ransom.Scarab", "Win32.Trojan.WisdomEyes.16070401.9500.9547", "W32/Trojan.LUOM-4097", "Ransom.CryptXXX", "Win.Ransomware.Scarab-6336012-1", "Win32.Trojan-Ransom.Amnesia.J52DUW", "Trojan.Win32.Encoder.ewdzie", "Trojan.Win32.Z.Securityshield.193058", "Trojan.Encoder.23898", "Trojan-Ransom.FileCoder", "Trojan.Purga.w", "Trojan.Ransom.Scarab.3", "Ransom:Win32/Kitoles.A", "Trojan/Win32.Scarab.R213792", "Trojan-Ransom.Purga", "Win32.Trojan.Filecoder.Phqc", "Win32/Trojan.Ransom.089" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "This", "specific", "downloader,", "Cmstar,", "is", "associated", "with", "the", "Lurid", "downloader", "also", "known", "as", "Enfal'." ]
[ 16, 16, 3, 11, 16, 16, 16, 16, 3, 11, 16, 16, 16, 3 ]
[ "We", "assume", "it", "was", "rushed", "because", ",", "unlike", "GlanceLove", ",", "it", "lacked", "any", "real", "obfuscation", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16 ]
[ "Recently", "Malwarebytes", "got", "access", "to", "several", "elements", "of", "the", "espionage", "toolkit", "that", "has", "been", "captured", "attacking", "Vietnamese", "institutions." ]
[ 16, 4, 16, 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 16, 16, 1, 4, 12 ]
[ "I", "am", "not", "entirely", "sure", "what", "it", "is", "but", "it", "has", "some", "indications", "of", "fareit", "Trojan." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 3, 11 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Dos.Bonk.C", "DoS.Win32.Bonk!O", "Dos.Bonk", "Win32.Trojan.Bonk.Tcwa", "W32/Tool.FPXO-2436", "DoS.Win32.Bonk.c", "Trojan.Dos.Bonk.C", "Trojan.Win32.Bonk.ddda", "TrojWare.Win32.DoS.Bonk.C", "Trojan.Dos.Bonk.C", "Trojan.Inject.654", "BehavesLike.Win32.ExploitMydoom.mm", "Backdoor.Win32.HacDef", "W32/VirTool.RO", "TR/RedCap.kudtu", "DoS:Win32/Bonk.C", "Trojan.Dos.Bonk.C", "DoS.Win32.Bonk.c", "Trojan.Dos.Bonk.C", "Trojan.Asthma.23305", "Trojan.Dos.Bonk.C", "Trojan.Dos.Bonk.C", "Win32/DoS.Bonk.C", "DoS.Bonk!CFlP7tiJI8A", "DoS/Bonk.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Duqu", "Trojan.Duqu.Win32.13", "TROJ_DUQU.DEC", "Win32.Trojan.WisdomEyes.16070401.9500.9587", "Win32/Duqu.A", "TROJ_DUQU.DEC", "Win.Trojan.Duqu-14", "Trojan.Win32.Duqu.evvbpp", "Trojan.Duqu.2", "W32/Trojan.CVVB-9378", "TR/Offend.6750706", "W32/Duqu.A!tr", "Trojan:Win32/Duqu.C", "Worm/Win32.Stuxnet.R608", "Trojan.Duqu!ZB0mf9vKpU8", "Trojan.Win32.Urelas", "Win32/Trojan.d72" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "r1-r4", ":", "This", "is", "a", "local", "privilege", "escalation", "(", "root", ")", "exploit", ",", "which", "includes", ":", "CVE-2013-6282", ",", "camerageroot", "(", "http", ":", "//www.77169.org/exploits/2013/20130414031700", ")", ",", "a", "rooting", "tool", "for", "mtk6592", "and", "addtional", "exploit", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 7, 16, 16, 16, 1, 9, 9, 9, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.HfsAutoB.10E5", "Trojan-Dropper.Win32.Decay!O", "Troj.Dropper.W32.Decay.fvr!c", "Trojan/Dropper.Decay.dst", "Trojan.Razy.DD584", "W32/Dropper.ANEZ", "TROJ_DECAY.SM", "Trojan-Dropper.Win32.Decay.fvr", "Trojan.Win32.Decay.biarma", "TrojWare.Win32.TrojanDropper.Decay.ghu", "Trojan.MulDrop6.60922", "TROJ_DECAY.SM", "BehavesLike.Win32.Virut.lc", "W32/Risk.RTXX-1196", "TrojanDropper.Decay.bo", "TR/Drop.Decay.ayb", "Trojan[Dropper]/Win32.Decay", "TrojanDropper:Win32/Decay.A", "Dropper.Decay.47104.B", "Trojan-Dropper.Win32.Decay.fvr", "Win32.Trojan.Yoybot.A", "Dropper/Win32.Decay.R2060", "TrojanDropper.Decay", "Backdoor.Win32.Poison", "W32/Decay.FVR!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "An", "example", "SMS", "message", "is", "shown", "in", "Figure", "1", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "It", "was", "an", "existing", "business", "model", "when", "computer-based", "banking", "malware", "was", "the", "only", "form", "of", "banking", "malware", "and", "has", "shifted", "to", "the", "Android", "equivalent", "a", "few", "years", "later", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16 ]
[ "Uptycs", "research", "team", "has", "discovered", "a", "malware", "family", "that", "controls", "its", "operations", "over", "the", "messaging", "service", "Telegram." ]
[ 4, 12, 12, 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 5 ]
[ "Dolkun", "lsa", "Chairman", "of", "the", "Executive", "Committee", "Word", "Uyghur", "Congress", "”", "While", "the", "victim", "reads", "this", "fake", "message", ",", "the", "malware", "secretly", "reports", "the", "infection", "to", "a", "command-and-control", "server", "." ]
[ 16, 16, 16, 16, 16, 4, 12, 12, 12, 12, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "At", "runtime", ",", "the", "apps", "can", "check", "which", "carrier", "the", "device", "is", "connected", "to", "and", "fetch", "a", "configuration", "object", "from", "the", "command", "and", "control", "server", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Ransom_Blulock.R002C0CKC17", "Trojan.Ransomlock.AI", "Ransom_Blulock.R002C0CKC17", "Win32.Worm.FlyStudio.C", "not-a-virus:RiskTool.Win32.FlyStudio.awnz", "Trojan.Win32.Z.Strictor.901632.H", "TrojWare.Win32.FlyStudio.~UJ", "Trojan.Winlock.11779", "TR/Strictor.901632.1", "Trojan.Strictor.DC183", "not-a-virus:RiskTool.Win32.FlyStudio.awnz", "Ransom:Win32/Blulock.A", "Trojan/Win32.Ransomlock.R135596", "Trojan.FlyStudio", "Trj/CI.A", "Trojan.Win32.Winlock.f", "Ransom.FUL!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "SpyNote", "RAT", "builder", "The", "SpyNote", "Remote", "Access", "Trojan", "(", "RAT", ")", "builder", "is", "gaining", "popularity", "in", "the", "hacking", "community", ",", "so", "we", "decided", "to", "study", "its", "pervasiveness", "." ]
[ 3, 11, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Pucedoor.Win32.63", "Troj.W32.Pucedoor!c", "W32/Trojan.MNET-5041", "Trojan.Pucedoor", "Trojan.Win32.Pucedoor.aa", "Trojan.Win32.AD.eoqlfa", "Trojan.Win32.Z.Pucedoor.15360", "Trojan.Pucedoor.d", "TR/Pucedoor.hopld", "Trojan/Win32.Pucedoor", "Trojan:Win32/Mirsonk.A", "Trojan.Mikey.D109B5", "Trojan.Win32.Pucedoor.aa", "Trojan/Win32.Pucedoor.R216811", "Trj/CI.A", "Win32.Trojan.Pucedoor.Sxxz", "Win32/Trojan.Proxy.62e" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "extraction", "method", "is", "the", "same", ",", "but", "the", "encryption", "algorithm", "(", "also", "XOR", ")", "is", "much", "simpler", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/MSILPack.a", "Trojan.MSIL.VB!/kGPqcrNINQ", "TROJ_FAM_0000b54.TOMA", "Packed.MSIL.MSILPack.a", "Worm.Win32.Rebhip!IK", "Packed:W32/DonutCrypt.A", "Trojan.MulDrop1.40622", "TROJ_FAM_0000b54.TOMA", "Packed.MSIL.is", "TrojanDropper:MSIL/VB.K", "Packed/Win32.MSILPack", "Worm.Win32.Rebhip", "MSIL/AntiAV.NET!tr", "Trj/Dropper.AJX" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.Senna", "KIT/SennaSpy.30", "HackTool[Constructor]/Win32.SennaSpy", "VTool.SennaSpy.30.kcloud", "Constructor:Win32/Sennaspy.3_0", "Constructor.Win32.SennaSpy", "Win32/Constructor.Spy.58d" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1 ]
[ "We", "also", "discovered,", "based", "on", "the", "samples", "we", "gathered,", "that", "the", "malware,", "which", "we", "call", "CloudTap,", "has", "been", "in", "use", "for", "over", "a", "year." ]
[ 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 3, 16, 16, 16, 3, 16, 16, 16, 16, 0, 8, 8, 8 ]
[ "Last", "week", "Forcepoint", "tracked", "an", "interesting", "e-mail", "campaign", "that", "was", "distributing", "double", "zipped", "files", "with", "Windows", "Script", "Files", "WSFs", "inside." ]
[ 16, 16, 4, 16, 16, 16, 6, 14, 15, 16, 16, 1, 9, 9, 9, 9, 9, 9, 9, 16 ]
[ "Symantec", "has", "blocked", "attempts", "to", "infect", "customers", "in", "Poland,", "Mexico", "and", "Uruguay", "by", "the", "same", "exploit", "kit", "that", "infected", "the", "Polish", "banks." ]
[ 4, 16, 16, 16, 16, 16, 4, 16, 2, 10, 16, 2, 16, 16, 16, 3, 11, 16, 16, 4, 12, 12 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor/Small.acc", "Backdoor.Trojan", "Backdoor.Win32.Small.acc", "Trojan.Win32.Small.gcwll", "Backdoor.W32.Small.acc!c", "Win32.Backdoor.Small.Egnw", "Backdoor.Small.Win32.7271", "Backdoor/Small.dwv", "BDS/Dalbot.147456", "Trojan[Backdoor]/Win32.Small", "Backdoor.Win32.A.Small.147456", "Backdoor.Win32.Small.acc", "Trojan/Win32.Dalbot.C330242", "Backdoor.Small", "W32/Small.ACC!tr.dldr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "They", "are", "known", "to", "run", "watering", "hole", "and", "spearphishing", "campaigns", "to", "better", "pinpoint", "their", "targets." ]
[ 16, 16, 16, 16, 16, 1, 9, 16, 6, 14, 16, 16, 16, 16, 16 ]