text
stringlengths 4
429
|
---|
targeted
|
attacks.
|
This
|
report
|
provided
|
some
|
insight
|
into
|
threat
|
draws
|
information
|
available
|
open-
|
source.
|
particular,
|
beaconing
|
patterns
|
indicators
|
were
|
identified
|
facilitate
|
detection
|
threat.
|
Additionally,
|
related
|
malware
|
samples
|
(see
|
Appendix
|
malware
|
family
|
names,
|
such
|
Ovoxual
|
have
|
been
|
listed
|
further
|
identification
|
related
|
samples.
|
Based
|
information
|
available,
|
threat
|
arrives
|
phishing
|
emails
|
with
|
attachment,
|
possibly
|
related
|
conferences
|
particular
|
targeted
|
industry.
|
exploits
|
vulnerabilities
|
within
|
Adobe
|
(for
|
example,
|
exploit
|
used
|
against
|
CVE-
|
2010-
|
2883)
|
drops
|
series
|
files
|
begin
|
communicating
|
with
|
command
|
control
|
(C&C).
|
binary
|
dropped
|
launched
|
from
|
exploit
|
virtual
|
machine
|
(VM)
|
aware
|
order
|
prevent
|
analysis
|
within
|
sandbox.
|
detected,
|
will
|
drop
|
executable
|
(often
|
named
|
msupate.exe
|
which
|
also
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.