tokens
sequencelengths
2
296
ner_tags
sequencelengths
2
296
[ "Seeing", "that", "the", "developer", "did", "not", "take", "any", "measures", "to", "protect", "his", "identity", ",", "it", "seems", "likely", "that", "his", "intentions", "weren", "’", "t", "dishonest", "at", "first", "–", "and", "this", "is", "also", "supported", "by", "the", "fact", "that", "not", "all", "his", "published", "apps", "contained", "unwanted", "ads", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "core", "malware", "’", "s", "icon", "is", "hidden", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Our", "research", "points", "to", "centralized", "planning", "and", "development", "by", "one", "or", "more", "advanced", "persistent", "threat", "APT", "actors." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 6, 14, 14, 14, 14 ]
[ "SpyNote", "RAT", "was", "designed", "to", "function", "only", "over", "Wi-Fi", ",", "which", "is", "the", "preferable", "mode", "for", "Android", "malware", "to", "send", "files", "to", "C", "&", "C", "." ]
[ 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.Vetor.PE", "Virus.Win32.Virut.1!O", "W32.Virut.G", "W32/Virut.AM", "Win32/Virut.17408", "PE_VIRUX.R", "Win32.Virus.Virut.U", "Virus.Win32.Virut.ce", "Virus.Win32.Virut.hpeg", "W32.Virut.lqR9", "Win32.Virut.56", "Virus.Virut.Win32.1938", "PE_VIRUX.R", "BehavesLike.Win32.VBObfus.dc", "W32/Virut.AM", "Win32/Virut.bt", "Virus/Win32.Virut.ce", "Win32.Virut.dd.368640", "Virus.Win32.Virut.ce", "Win32/Virut.F", "Win32/Virut.NBP", "W32/Virut.CE", "Virus.Virut.14", "W32/Sality.AO", "Virus.Win32.VirutChangeEntry.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.LionumD.Trojan", "Trojan.Injector.AF", "Trojan-Spy.Win32.Zbot!O", "Trojan.CoinMiner.Win32.82", "Trojan.Injector.AF", "Trojan.Win32.Delf.bkqgta", "Trojan.Injector.AF", "Trojan.DownLoader7.62911", "Trojan/Win32.Miner", "TrojanDownloader:Win32/Hoptto.B", "Trojan.Injector.AF", "Trojan.Injector.AF", "Trojan.Injector.AF", "Virus.Win32.DelfInject" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Research", "reports", "on", "the", "adversary", "are", "published", "from", "LAC", "SecureWorks", "and", "Palo", "Alto", "Networks" ]
[ 4, 16, 16, 6, 14, 16, 16, 16, 4, 4, 16, 4, 12, 12 ]
[ "The", "malware", "has", "all", "the", "popular", "capabilities", "of", "modern", "spyware", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "HW32.Packed.50FA", "Trojan.Win32.Pakes.miu", "Trojan.Symmi.D62C5", "Trojan.Win32.Bepiv", "TR/Drop.RKit.CM", "Backdoor:WinNT/Tofsee.A.dr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1 ]
[ "The", "Root", "of", "All", "(", "Android", ")", "Evil", "So", "how", "does", "TrickMo", "get", "around", "these", "security", "features", "?", "It", "abuses", "accessibility", "services", "." ]
[ 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "description", "in", "Portuguese", "promises", "more", "protection", "for", "the", "user", "’", "s", "applications", ",", "including", "end-to-end", "encryption", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "recent", "research", "by", "Check", "Point", "Research", "shows", "how", "voice", "phishing", "can", "be", "used", "to", "infiltrate", "the", "South", "Korean", "banking", "sector", "and", "extract", "private", "data", "from", "the", "victim's", "mobile", "device,", "and", "how", "to", "prevent", "it." ]
[ 16, 16, 16, 16, 4, 12, 12, 16, 16, 16, 12, 16, 16, 16, 16, 16, 4, 12, 12, 12, 12, 16, 16, 16, 16, 16, 5, 13, 13, 13, 16, 16, 16, 16, 16 ]
[ "Following", "is", "the", "HTTP", "response", "from", "the", "C2", "server", ",", "containing", "the", "encrypted", "configuration", ":", "EventBot", "Encrypted", "HTTP", "response", "returned", "from", "the", "C2", "Encrypted", "HTTP", "response", "returned", "from", "the", "C2", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "In", "addition", ",", "the", "malware", "can", "log", "in", "to", "the", "attacker", "’", "s", "email", "inbox", ",", "parse", "emails", "in", "a", "special", "folder", "for", "commands", "and", "save", "any", "payloads", "to", "a", "device", "from", "email", "attachments", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "malware", "goes", "to", "great", "lengths", "to", "identify", "a", "total", "of", "24", "potential", "security", "products", "that", "may", "be", "running", "on", "a", "system", "and", "customizes", "its", "installation", "mechanism", "to", "specifically", "evade", "those", "that", "are", "installed." ]
[ 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 7, 15, 15, 15, 15, 0, 16, 16, 16, 16, 5, 16, 1, 9, 9, 9, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.PWS.ZIY", "Trojan-PSW.Win32.Tepfer!O", "Trojan.Fareit.S467850", "Trojan.Tepfer.Win32.85789", "Trojan/Fareit.a", "Trojan.PWS.ZIY", "Win32.Trojan-PSW.Fareit.a", "Win32/PSW.Fareit.A", "BKDR_PONY.SM", "Win.Trojan.Fareit-403", "Trojan.PWS.ZIY", "Trojan.Win32.Tepfer.dnnwuu", "Trojan.PWS.ZIY", "TrojWare.Win32.PWS.Fareit.GS", "Trojan.PWS.ZIY", "Trojan.PWS.Stealer.1932", "BKDR_PONY.SM", "BehavesLike.Win32.ZBot.nh", "W32.Tepfer", "TR/PSW.Fareit.iloen", "Trojan[PSW]/Win32.Tepfer", "Trojan.Win32.PSW-Tepfer.92672", "Trojan/Win32.Tepfer.R50650", "Trojan.PWS.ZIY", "BScope.Malware-Cryptor.Ponik", "Spyware.Pony", "Trj/Tepfer.D", "Trojan.Fareit", "Win32.Outbreak", "Win32.Trojan-Stealer.Zbot.AB", "Win32/Trojan.PSW.5cd" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "These", "factors", ",", "in", "combination", "with", "the", "fact", "that", "the", "command", "and", "control", "infrastructure", "used", "by", "Frozen", "Cell", "and", "Desert", "Scorpion", "resides", "in", "similar", "IP", "blocks", ",", "supports", "the", "theory", "that", "the", "same", "actor", "is", "responsible", "for", "operating", ",", "if", "not", "developing", ",", "both", "families", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Figure", "7", "." ]
[ 16, 16, 16 ]
[ "β€œ", "Agent", "Smith", "”", "is", "possibly", "the", "first", "campaign", "seen", "that", "ingrates", "and", "weaponized", "all", "these", "loopholes", "and", "are", "described", "in", "detail", "below", "." ]
[ 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "TSPY_DOWNLOADER_DD300501.UVPA", "Win32.Trojan.WisdomEyes.16070401.9500.9967", "Infostealer.Donx", "TSPY_DOWNLOADER_DD300501.UVPA", "Trojan.Win32.VB.ckqm", "Trojan.VB.Win32.119679", "BehavesLike.Win32.Sality.dm", "Worm.Win32.VB", "Trojan/VB.cvqf", "Trojan/Win32.VB", "Worm:Win32/Vberaspul.A", "Trojan.Heur.RX.E04E5F", "Trojan.Win32.VB.ckqm", "Trojan/Win32.VB.R85915", "Trojan.VB", "Win32/AutoRun.VB.BDA", "Trojan.VB!nw7hcYRbBc8" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "]", "comlila-tournai", "[", "." ]
[ 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "TROJ_CLICKER.API", "W32/Trojan.HUCV-9091", "TROJ_CLICKER.API", "Win.Trojan.Clicker-2623", "Trojan.Win32.Click.ddmsji", "W32/Trojan2.GMLR", "Adware/Clicker.hjb", "TrojanDownloader:Win32/Valfroc.A", "Win32.Trojan.Clicker.Tbip", "W32/CLICKER.API!tr", "Win32/Trojan.Multi.daf" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Additionally", ",", "rootdaemon", "attempts", "to", "remove", "its", "own", "power", "usage", "statistics", "from", "Huawei", "phones", "'", "SystemManager", ":", "Similarly", ",", "the", "malicious", "application", "probably", "attempts", "to", "minimize", "traces", "on", "Samsung", "phones", "by", "adding", "to", "the", "file", "/data/data/com.samsung.android.securitylogagent/shared_prefs/apm_sp_status_of_apps.xml", "the", "following", "lines", ":", "And", "adding", "to", "the", "file", "/data/data/com.samsung.android.securitylogagent/shared_prefs/com.samsung.android.securitylogagent_preferences.xml", "these", "lines", "instead", ":", "Data", "Collection", "and", "Exfiltration", "As", "mentioned", ",", "mike.jar", "equips", "the", "spyware", "with", "extensive", "collection", "capabilities", ",", "including", ":", "Retrieve", "a", "list", "of", "installed", "applications", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "In", "light", "of", "this", ",", "we", "believe", "an", "attack", "against", "unpatched", "vulnerabilities", "is", "a", "reasonable", "conjecture", "for", "how", "the", "server", "was", "compromised", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 7, 15, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Seeing", "this", "type", "of", "activity", "typically", "indicates", "that", "a", "particular", "ransomware", "will", "see", "much", "wider", "distribution", "and", "thus", "a", "larger", "amount", "of", "victims." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 4, 12, 12, 12, 12 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan-Downloader.Win32.LibPatcher!O", "W32/Trojan.KFBA-3961", "Trojan.KillAV", "Win32/KillAV.EA", "RTKT_BUREY.C", "TrojWare.Win32.AntiAV.~B", "Trojan.MulDrop.30985", "Downloader.LibPatcher.Win32.272", "RTKT_BUREY.C", "BehavesLike.Win32.Backdoor.mc", "W32/Dldr.Age.41984.C", "Trojan[Downloader]/Win32.LibPatcher", "Trojan:Win32/Perkesh.A", "Trojan/Win32.KillAV.R5311", "Win32.Trojan-downloader.Libpatcher.Dumk", "Trojan-Downloader.Win32.Perkesh", "W32/Perkesh.A!tr", "Win32/Virus.81b" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.CKTNum.Trojan", "Virus.Win32.VB!O", "Virus.VB.Win32.90", "W32.W.Mabezat.kZb9", "Trojan.Heur.E2A0A7", "Win32.Trojan.WisdomEyes.16070401.9500.9998", "W32/Worm.EJIG-5497", "Trojan.Killfiles", "Win32/Disackt.B", "TROJ_VB.BHC", "Trojan.Win32.VB.mrc", "Virus.Win32.VB.bcfhqp", "Win32.Trojan.Vb.Eddp", "TrojWare.Win32.VB.AMN", "TROJ_VB.BHC", "BehavesLike.Win32.Downloader.mz", "W32/Worm.AWSI", "Virus.VB.bc", "W32/Overwriter.A", "Worm:Win32/Disackt.A", "Trojan.Win32.VB.mrc", "TScope.Trojan.VB", "Win32/VB.AMN", "Trojan.VB!eJU5EBjve4c", "Virus.Win32.VB", "W32/VB.AMN!tr", "Trj/CI.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/W32.Small.49152.AYF", "Trojan.Dofoil.A", "Trojan/Kryptik.vgb", "Win32.Trojan.WisdomEyes.16070401.9500.9963", "W32/Trojan.QQGJ-6488", "Trojan.Win32.ULPM.eszgb", "Trojan.Yakes.Win32.1447", "BehavesLike.Win32.Conficker.pc", "Trojan-Dropper.Win32.Injector", "W32/Kryptik.VIA!tr", "Trojan.Kazy.DABAF", "TrojanDropper:Win32/Finkmilt.C", "Trojan/Win32.Yakes.C144665", "BScope.Trojan.Jorik.1421", "Trojan.Kryptik!Y5cjjPIzRWk", "Bck/Qbot.AO", "Win32/Trojan.aeb" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "At", "the", "end", "of", "December", "2015,", "the", "network", "system", "of", "Ukrainian", "power", "companies", "was", "attacked", "by" ]
[ 3, 16, 0, 8, 8, 8, 16, 4, 12, 12, 12, 12, 12, 16, 1, 16 ]
[ "Stage", "6", ":", "The", "payload", "is", "a", "modular", "spyware", "framework", "for", "further", "analysis", "Our", "journey", "to", "deobfuscating", "FinFisher", "has", "allowed", "us", "to", "uncover", "the", "complex", "anti-analysis", "techniques", "used", "by", "this", "malware", ",", "as", "well", "as", "to", "use", "this", "intel", "to", "protect", "our", "customers", ",", "which", "is", "our", "top", "priority", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32/Socks.agz", "Win32.Trojan.WisdomEyes.16070401.9500.9997", "W32/Trojan2.BFTZ", "HT_PHDET_FD042CB0.UVPM", "Trojan.Win32.Socks.utqwi", "Trojan.MulDrop7.51577", "HT_PHDET_FD042CB0.UVPM", "BehavesLike.Win32.Dropper.jc", "W32/Trojan.NOBV-3130", "TrojanDownloader.Small.sui", "Worm/Win32.Socks", "Trojan:Win32/Phdet.E", "Worm.Win32.A.Socks.93017", "SScope.Worm.Socks.afv", "Worm.Socks!GMlFK48cpa8", "W32/Kryptik.BD!tr", "Win32/Trojan.e0b" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Recently,", "WeipTech", "was", "analyzing", "suspicious", "Apple", "iOS", "tweaks", "reported", "by", "users", "and", "found", "over", "225,000", "valid", "Apple", "accounts", "with", "passwords", "stored", "on", "a", "server." ]
[ 16, 4, 16, 16, 16, 5, 13, 16, 16, 16, 4, 16, 16, 16, 16, 16, 5, 13, 16, 16, 16, 16, 16, 5 ]
[ "A", "backdoor", "also", "known", "as:", "W32.HfsAutoB.D676", "Win32.Trojan.WisdomEyes.16070401.9500.9591", "TR/Drop.Delfsnif.pmkbu", "TrojanDropper:Win32/Delfsnif.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan-Dropper.Win32.AphexLace!O", "TrojanDropper.AphexLace", "Dropper.AphexLace.Win32.1", "Troj.W32.Inject!c", "Trojan/Dropper.AphexLace.b", "Trojan.Heur.EA2D6B", "TROJ_APHEXLACE.D", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "W32/Dropper.IHO", "Trojan.Dropper", "TROJ_APHEXLACE.D", "Trojan.Win32.Inject.vgog", "Trojan.Win32.AphexLace.glqv", "Dropper.AphexLace.17920", "TrojWare.Win32.TrojanDropper.AphexLace.B", "Trojan.MulDrop.12656", "Trojan-Dropper.Win32.Delf", "W32/Risk.JBWO-6048", "TrojanDropper.AphexLace.b", "TR/Drop.AphexLace.B", "Trojan[Dropper]/Win32.Poisoner", "TrojanDropper:Win32/AphexLace.B", "Trojan.Win32.Inject.vgog", "Dropper/Win32.Xema.C57521", "TrojanDropper.Poisoner", "Win32/TrojanDropper.AphexLace.B", "Win32.Trojan.Inject.Dypn", "Trojan.DR.AphexLace!M08TVuH6+oM" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "best", "bet", "for", "Readers", "who", "want", "to", "make", "sure", "their", "phone", "is", "n't", "infected", "is", "to", "scan", "their", "phones", "using", "the", "free", "version", "of", "the", "Lookout", "Security", "and", "Antivirus", "app", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16, 16, 16, 16, 16 ]
[ "Indicators", "related", "to", "the", "Sundown", "Exploit", "Kit" ]
[ 1, 16, 16, 16, 3, 11, 11 ]
[ "CopyCat", "is", "a", "fully", "developed", "malware", "with", "vast", "capabilities,", "including", "elevating", "privileges", "to", "root,", "establishing", "persistency,", "and", "to", "top", "it", "all", "-", "injecting", "code", "into", "Zygote." ]
[ 3, 16, 16, 16, 16, 3, 16, 16, 16, 16, 1, 9, 9, 9, 9, 9, 16, 16, 16, 16, 16, 16, 1, 9, 16, 3 ]
[ "A", "backdoor", "also", "known", "as:", "HW32.Packed.D9E5", "TrojanSpy.Zbot", "Spyware.LokiBot", "Win.Packer.VbPack-0-6334882-0", "Trojan-Spy.Win32.Zbot.yjsw", "Trojan.Win32.Zbot.etexpw", "Trojan.Win32.Z.Zbot.1081344", "Trojan.PWS.Panda.12377", "Trojan.Zbot.Win32.204854", "BehavesLike.Win32.Fareit.tc", "Trojan.Win32.Injector", "TrojanSpy.Zbot.fkpq", "TR/AD.Zbot.cxjcv", "Trojan[Spy]/Win32.Zbot", "Trojan.Symmi.D1360F", "Trojan-Spy.Win32.Zbot.yjsw", "Trojan:Win32/Dukrid.A!bit", "Spyware/Win32.Zbot.R210148", "TScope.Trojan.VB", "Trj/GdSda.A", "Win32.Trojan-spy.Zbot.Lqer", "TrojanSpy.Zbot!AasFtIJIGGs", "W32/Zbot.YJSW!tr", "Win32/Trojan.BO.553" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "WordPress.org", "team", "has", "intervened", "and", "removed", "the", "plugin", "from", "the", "official", "WordPress", "Plugins", "repository." ]
[ 4, 12, 12, 16, 16, 16, 16, 16, 3, 16, 4, 12, 12, 12, 12 ]
[ "It", "is", "likely", "these", "spearphishes", "are", "generated", "via", "a", "builder", "-", "so", "attribution", "to", "an", "exact", "group", "of", "attackers", "may", "be", "incorrect." ]
[ 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 6, 14, 14, 16, 16, 16 ]
[ "SimBad", ":", "A", "Rogue", "Adware", "Campaign", "On", "Google", "Play", "March", "13", ",", "2019", "Check", "Point", "researchers", "from", "the", "Mobile", "Threat", "Team", "have", "discovered", "a", "new", "adware", "campaign", "on", "the", "Google", "Play", "Store", "." ]
[ 3, 16, 16, 16, 16, 16, 16, 5, 13, 16, 16, 16, 16, 4, 12, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 13, 16 ]
[ "This", "campaign", "was", "found", "to", "be", "connected", "to", "the", "same", "party", "which", "previously", "targeted", "Vietnam", "Airlines", "and", "some", "other", "high", "profile", "targets", "possibly", "led", "by", "the", "Chinese", "1937CN", "group." ]
[ 16, 6, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 12, 16, 16, 16, 4, 12, 12, 16, 16, 16, 4, 12, 12, 12 ]
[ "A", "backdoor", "also", "known", "as:", "I-Worm.Stator.A", "Worm/W32.Stator.62976", "Email-Worm.Win32.Stator!O", "W32.Stator.A", "Worm.Stator.Win32.3", "W32/Stator.worm", "I-Worm.Stator.A", "W32/Stator.A", "W32.Stator@mm", "Win32/Stator.62464.A", "WORM_STATOR.A", "Win.Worm.Stator-1", "I-Worm.Stator.A", "Email-Worm.Win32.Stator.a", "I-Worm.Stator.A", "Trojan.Win32.Stator.jahi", "I-Worm.Win32.Stator", "I-Worm.Stator.A", "EmailWorm.Win32.Stator.a0", "I-Worm.Stator.A", "Win32.HLLW.Plict", "WORM_STATOR.A", "BehavesLike.Win32.Downloader.kc", "Email-Worm.Win32.Stator.a", "W32/Stator.A", "I-Worm/Stator.a", "Worm[Email]/Win32.Stator", "Worm:Win32/Stator.A@mm", "Email-Worm.Win32.Stator.a", "Trojan/Win32.HDC.C40377", "I-Worm.Stator.A", "Win32.HLLW.Stator.A", "I-Worm.Stator.62464", "Win32/Stator.62464", "Win32.Stator.B", "W32/Stator.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Talos", "assess", "with", "high", "confidence", "that", "this", "campaign", "is", "targeting", "Australian", "financial", "institutions", "based", "on", "several", "factors", "." ]
[ 4, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "encrypt", "its", "APK", "and", "shell", "code," ]
[ 1, 16, 5, 16, 1, 9 ]
[ "It", "looked", "like", "a", "typical", "backdoor", "that", "could", "be", "uploaded", "anywhere", "on", "a", "compromised", "server,", "not", "just", "in", "this", "particular", "plugin." ]
[ 16, 16, 16, 16, 16, 3, 16, 16, 16, 1, 9, 16, 16, 5, 13, 16, 16, 16, 16, 16, 5 ]
[ "Emissary", "is", "related", "to", "the", "Elise", "Trojan", "and", "the", "Operation", "Lotus", "Blossom", "attack", "campaign,", "which", "prompted", "us", "to", "start", "collecting", "additional", "samples", "of", "Emissary." ]
[ 3, 16, 16, 16, 3, 11, 11, 16, 6, 14, 14, 14, 14, 14, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3 ]
[ "The", "authors", "are", "trying", "to", "latch", "onto", "the", "popularity", "of", "the", "Super", "Mario", "Run", "game", "to", "target", "eagerly", "waiting", "Android", "users", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 13, 16, 16, 16, 16, 16, 5, 16, 16 ]
[ "This", "trojan", "'s", "design", "and", "implementation", "is", "of", "an", "uncommonly", "high", "level", ",", "making", "it", "a", "dangerous", "threat", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "To", "quote", "the", "original", "article:", "It", "could", "be", "through", "attachments", "in", "spam", "messages,", "downloads", "from", "untrusted", "websites", "or", "something", "else." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "spyware", "in", "this", "analysis", "was", "portraying", "itself", "as", "the", "Netflix", "app", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 16 ]
[ "Command", "Action", "Unistxcr", "Restart", "the", "app", "dowsizetr", "Send", "the", "file", "stored", "in", "the", "/sdcard/DCIM/.dat/", "directory", "to", "the", "C", "&", "C", "server", "Caspylistx", "Get", "a", "list", "of", "all", "hidden", "files", "in", "the", "/DCIM/.dat/", "directory", "spxcheck", "Check", "whether", "call", "details", "are", "collected", "by", "the", "spyware", "S8p8y0", "Delete", "call", "details", "stored", "by", "the", "spyware", "screXmex", "Take", "screenshots", "of", "the", "device", "screen", "Batrxiops", "Check", "battery", "status", "L4oclOCMAWS", "Fetch", "the", "victim", "'s", "location", "GUIFXB", "Launch", "the", "fake", "Facebook", "login", "page", "IODBSSUEEZ", "Send", "a", "file", "containing", "stolen", "Facebook", "credentials", "to", "the", "C", "&", "C", "server", "FdelSRRT", "Delete", "files", "containing", "stolen", "Facebook", "credentials", "chkstzeaw", "Launch", "Facebook", "LUNAPXER", "Launch", "apps", "according", "to", "the", "package", "name", "sent", "by", "the", "C", "&", "C", "server", "Gapxplister", "Get", "a", "list", "of", "all", "installed", "applications", "DOTRall8xxe", "Zip", "all", "the", "stolen", "files", "and", "store", "in", "the", "/DCIM/.dat/", "directory", "Acouxacour", "Get", "a", "list", "of", "accounts", "on", "the", "victim", "'s", "device", "Fimxmiisx", "Open", "the", "camera", "Scxreexcv4", "Capture", "an", "image", "micmokmi8x", "Capture", "audio", "Yufsssp", "Get", "latitude", "and", "longitude", "GExCaalsss7", "Get", "call", "logs", "PHOCAs7", "Call", "phone", "numbers", "sent", "by", "the", "C", "&", "C", "server", "Gxextsxms", "Get", "a", "list", "of", "inbox", "SMS", "messages", "Msppossag", "Send", "SMS", "with", "message", "body", "sent", "by", "the", "C", "&", "C", "server", "Getconstactx", "Get", "a", "list", "of", "all", "contacts", "Rinxgosa", "Play", "a", "ringtone", "bithsssp64", "Execute", "commands", "sent", "by", "the", "C", "&", "C", "server", "DOWdeletx", "Deletes", "the", "file", "specified", "by", "the", "C", "&", "C", "server", "Deldatall8", "Delete", "all", "files", "stored", "in", "the", "/sdcard/DCIM/.dat/", "directory", "We", "do", "n't", "have", "the", "space", "to", "cover", "all", "of", "the", "commands", ",", "but", "let", "'s", "take", "a", "look", "at", "some", "of", "the", "major", "ones", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "If", "any", "of", "these", "conditions", "is", "true", ",", "the", "application", "does", "not", "continue", "to", "execute", "the", "malicious", "flow", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "It", "has", "been", "the", "subject", "of", "many", "analysis", "reports,", "including", "those", "describing", "targeted", "espionage", "campaigns", "like", "Operation", "Night", "Dragon", "and", "the", "GhostNet", "attacks", "on", "Tibet." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 6, 14, 14, 16, 6, 14, 14, 16, 16, 3, 1, 16, 2 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Miner", "Troj.W32.Miner!c", "Trojan.MulDrop7.60223", "TR/Muldrop.jzijj", "Trojan.Win32.Miner.tjvn" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1 ]
[ "The", "threat", "actor's", "campaigns", "attempt", "to", "convince", "high-profile", "North", "American", "and", "European", "government", "officials", "as", "well", "as", "CEOs", "of", "prominent", "companies", "and", "celebrities", "into", "participating", "in", "recorded", "phone", "calls", "or", "video", "chats." ]
[ 6, 14, 14, 14, 16, 16, 16, 4, 12, 12, 12, 12, 12, 12, 16, 16, 16, 4, 16, 16, 4, 16, 4, 16, 16, 16, 4, 16, 16, 16, 16, 16 ]
[ "The", "earliest", "evidence", "obtained", "shows", "it", "has", "been", "in", "use", "since", "at", "least", "November", "2016." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 0, 8, 8 ]
[ "The", "hash", "listed", "in", "the", "Pastebin", "led", "us", "to", "a", "malicious", "Word", "document", "that", "had", "also", "been", "uploaded", "to", "a", "public", "sandbox." ]
[ 1, 9, 9, 16, 4, 12, 16, 16, 16, 1, 9, 9, 9, 16, 16, 16, 16, 16, 16, 5, 13, 13 ]
[ "Similarly", "to", "another", "Android", "spyware", "made", "in", "Italy", ",", "originally", "discovered", "by", "Lukas", "Stefanko", "and", "later", "named", "Skygofree", "and", "analyzed", "in", "depth", "by", "Kaspersky", "Labs", ",", "Exodus", "also", "takes", "advantage", "of", "\"", "protectedapps", "''", ",", "a", "feature", "in", "Huawei", "phones", "that", "allows", "to", "configure", "power-saving", "options", "for", "running", "applications", "." ]
[ 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 4, 12, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "At", "the", "time", "of", "writing", "we", "had", "no", "evidence", "of", "an", "exploit", "being", "used", "to", "obtain", "root", "privileges", ",", "though", "it", "is", "possible", "that", "the", "attackers", "used", "some", "unseen", "component", "to", "implement", "this", "feature", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "]", "91", "2020-03-04", "http", ":", "//ora.carlaarrabitoarchitetto", "[", "." ]
[ 9, 9, 16, 1, 9, 9, 9, 9 ]
[ "]", "com", "’", "as", "an", "ad-related", "SDK", "." ]
[ 9, 9, 16, 16, 16, 16, 16, 16 ]
[ "Aside", "from", "the", "credential", "stealing", ",", "this", "malware", "also", "includes", "features", "like", "the", "theft", "of", "users", "'", "contact", "list", ",", "collecting", "phone", "numbers", "associated", "names", ",", "and", "files", "and", "photos", "on", "the", "device", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Ransom/W32.Locky.48128", "Exploit.Cve20151701", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Exploit.Win32.CVE-2015-1701.bd", "Exploit.Win32.CVE20151701.euekja", "Trojan.Win32.LockCrypt.48128.A", "Trojan.Encoder.12135", "BehavesLike.Win32.Mydoom.pm", "W32/Trojan.JPLA-3344", "Exploit.CVE-2015-1701.ar", "TR/AD.RansomHeur.fbqvj", "Exploit.W32.Cve!c", "Exploit.Win32.CVE-2015-1701.bd", "Ransom:Win32/LockCrypt.A!bit", "Trojan/Win32.Scar.R211760", "Exploit.CVE-2015-1701", "Ransom.DXXD", "Trj/GdSda.A", "Trojan.Win32.Filecoder", "Win32.Trojan-Ransom.LockCrypt.A", "Win32/Trojan.Exploit.3d9" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "This", "is", "exactly", "what", "we", "saw", "in", "late", "October", "and", "early", "November", "2016,", "when", "the", "espionage", "group", "Pawn", "Storm", "also", "known", "as", "Fancy", "Bear,", "APT28,", "Sofacy,", "and", "STRONTIUM", "ramped", "up", "its", "spear-phishing", "campaigns", "against", "various", "governments", "and", "embassies", "around", "the", "world." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 0, 16, 16, 0, 8, 16, 16, 6, 14, 14, 14, 16, 16, 16, 6, 14, 14, 14, 16, 6, 16, 16, 16, 6, 14, 16, 16, 4, 16, 4, 16, 16, 2 ]
[ "A", "backdoor", "also", "known", "as:", "Virus.Win32!O", "W32.Etap", "W32/Etap.dr", "Win32.Trojan.WisdomEyes.16070401.9500.9929", "W32.Simile", "Virus.Win32.Etap", "Win32.Etap.E", "Win32/Linux.Etap", "W32/Etap.dr", "Virus.Win32.Etap", "Backdoor/Hupigon.ish", "Virus/Win32.Etap", "Trojan.Kazy.D65E9", "Virus.Win32.Etap", "Backdoor:Win32/Etap.dr", "Win32/Etap.E", "W32/Etap.D" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Furthermore,", "each", "of", "the", "stages", "used", "different", "development", "platform", "and", "was", "obfuscated", "in", "a", "different", "way." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Rather", "than", "simply", "copying", "the", "features", "that", "were", "present", "within", "the", "Zeus", "trojan", "as-is", "Floki", "Bot", "claims", "to", "feature", "several", "new", "capabilities", "making", "it", "an", "attractive", "tool", "for", "criminals." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 6 ]
[ "A", "backdoor", "also", "known", "as:", "Worm/W32.Silva.447488", "Worm.Keco", "W32.W.Silva.d!c", "W32/Silva.d", "W32/Silva.D", "W32.Silva@mm", "Trojan.Win32.Silva.envq", "Worm.Win32.Silva.D", "Win32.HLLW.Silva", "Worm.Win32.Silva", "W32/Silva.QGXV-8360", "I-Worm/Silva.d", "Worm:Win32/Silva.D@mm", "Worm:Win32/Silva.D@mm", "Email-Worm.Keco", "W32/Keco.G.worm", "Win32/Silva.D", "Win32.Worm-email.Keco.Peze", "I-Worm.Silva!97fYr5ijFvQ", "W32/Silva.D@mm" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Below", "are", "a", "couple", "of", "images", "of", "the", "panel", "that", "the", "attacker", "would", "be", "utilizing." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.BHO.Delf.T", "Trojan.Win32.Delf!O", "Trojan.Lnkhyd.A7", "Trojan.Delf.Win32.15794", "Troj.W32.Delf.lV2h", "Win32/Delf.AXIT", "TROJ_DELF.PVC", "Win.Trojan.Delf-11211", "Trojan.BHO.Delf.T", "Trojan.Win32.Delf.ssh", "Trojan.BHO.Delf.T", "Trojan.Win32.Delf.cjzwb", "Trojan.Win32.Delf.157696.J", "Trojan.BHO.Delf.T", "TROJ_DELF.PVC", "Trojan.Lnkhyd", "Trojan/Delf.mdz", "Trojan:Win32/Lnkhyd.A", "Trojan/Win32.Delf", "Trojan.BHO.Delf.T", "Trojan.Win32.Delf.ssh", "Trojan:Win32/Lnkhyd.A", "Trojan/Win32.Fides.R3508", "Trojan.BHO.Delf.T", "TScope.Trojan.Delf", "Win32.Trojan.Delf.Ednr", "Trojan.Win32.BHO.R" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Interaction", "with", "these", "servers", "is", "performed", "in", "two", "different", "threads." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "samples", "sharing", "this", "overlap", "are", "modified", "versions", "of", "an", "open", "source", "Jabber/XMPP", "client", "called", "β€œ", "Conversations", "”", "with", "some", "code", "additions", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "They", "use", "compromised", "e-mail", "accounts", "to", "distribute", "their", "malware", "widely", "and", "their", "targeting", "appears", "opportunistic", "rather", "than", "specific." ]
[ 16, 16, 1, 9, 9, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "PUP.Riskware.Tool", "Trojan.Win32.Cindyc.wrlqe", "TR/DyCode.A.110", "Backdoor/Cindyc.bv", "Win32.Troj.Undef.kcloud", "Trojan:Win32/DyCode.A", "Backdoor.Win32.A.Cindyc.141184", "Backdoor/Win32.Cindyc", "Backdoor.Cindyc.adk", "Backdoor.Win32.Cindyc", "Trj/CI.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "]", "com", "csip6", "[", "." ]
[ 9, 9, 1, 9, 9 ]
[ "Credit", "card", "industry", "giant", "Visa", "on", "Friday", "issued", "a", "security", "alert", "warning", "companies", "using", "point-of-sale", "devices", "made", "by", "Oracle", "s", "MICROS", "retail", "unit", "to", "double-check", "the", "machines", "for", "malicious", "software", "or", "unusual", "network", "activity,", "and", "to", "change", "passwords", "on", "the", "devices." ]
[ 4, 12, 12, 16, 4, 16, 0, 16, 16, 16, 16, 16, 4, 16, 5, 13, 16, 16, 4, 16, 5, 13, 13, 16, 16, 16, 5, 11, 3, 11, 16, 1, 9, 9, 16, 16, 16, 16, 16, 16, 5 ]
[ "The", "dropper", "family,", "referred", "to", "internally", "as", "PNG_dropper,", "was", "observed", "being", "used", "as", "a", "second", "stage", "tool", "in", "different", "targeted", "attacks." ]
[ 3, 11, 11, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 3, 11, 11, 16, 16, 16, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.StartPageCRTD.Win32.8798", "Win32.Trojan.WisdomEyes.16070401.9500.9990", "Trojan.Win32.Clicker!BT", "Trojan.MSIL.EzirizNetReactor", "TR/Dropper.MSIL.76348", "TrojanClicker:MSIL/Balamid.B", "Trojan.Jatif.32", "Trojan/Win32.FakeMS.R113384", "Trojan.Win32.Clicker!BT", "Win32/Trojan.Dropper.2f1" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9589", "TROJ_DELF.IVW", "Trojan-Downloader.Win32.Delf.acc", "Troj.Downloader.W32.Delf!c", "Win32.Trojan-downloader.Delf.Edoh", "TrojWare.Win32.TrojanDownloader.Delf.~ABI", "Trojan.DownLoader.46506", "Trojan-Downloader.Win32.Delf.ACC", "TrojanDownloader.Delf.fqq", "Trojan[Downloader]/Win32.Delf", "Win32.TrojDownloader.Delf.ac.kcloud", "Trojan.Downloader.bGWcaOz2KakG", "Trojan.Win32.A.Downloader.34816.FA", "Trojan-Downloader.Win32.Delf.acc", "Trj/Banbra.FSU", "Win32/Trojan.Downloader.dac" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Malicious", "app", "com.qualcmm.timeservices", "As", "I", "mentioned", "before", ",", "in", "the", "β€œ", "initial", "phase", "”", ",", "the", "Trojan", "will", "install", "the", "β€œ", "com.qualcmm.timeservices", "”", "app", "." ]
[ 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16 ]
[ "It", "does", "this", "by", "leveraging", "the", "Android", "plugin", "technology." ]
[ 16, 16, 16, 16, 16, 5, 13, 13, 13 ]
[ "That", "creates", "a", "fake", "ID", "that", "allows", "the", "perpetrators", "to", "generate", "referral", "revenues", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "HenBox", ":", "The", "Chickens", "Come", "Home", "to", "Roost", "March", "13", ",", "2018", "at", "5:00", "AM", "Unit", "42", "recently", "discovered", "a", "new", "Android", "malware", "family", "we", "named", "β€œ", "HenBox", "”", "masquerading", "as", "a", "variety", "of", "legitimate", "Android", "apps", "." ]
[ 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16 ]
[ "Trojan", "Ransom", "Xpan", "was", "created", "by", "an", "organized", "gang,", "which", "used", "targeted", "attacks", "via", "RDP", "that", "abused", "weak", "passwords", "and", "wrong", "implementations." ]
[ 3, 11, 11, 16, 16, 16, 16, 6, 14, 16, 16, 16, 1, 16, 7, 16, 16, 7, 15, 16, 7, 15 ]
[ "The", "operators", "have", "used", "use", "a", "range", "of", "techniques", "to", "target", "Windows", "computers", "and", "Android", "phones", "with", "the", "apparent", "goal", "of", "penetrating", "the", "computers", "of", "well-connected", "individuals", "in", "the", "Syrian", "opposition." ]
[ 16, 6, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 16, 5, 13, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 4, 16, 16, 4, 12 ]
[ "On", "the", "network", "traffic", "analysis", "end,", "post", "compromise", "activity", "results", "in", "some", "interesting", "but", "not", "unexpected", "activity." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Based", "on", "this", "evidence", "we", "believe", "this", "new", "malware", "is", "likely", "targeting", "South", "Koreans." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 2, 10 ]
[ "A", "series", "of", "malware", "attacks", "targeting", "users", "of", "cryptocurrency", "wallets", "has", "been", "identified", "by", "security", "firm", "Kaspersky,", "which", "has", "developed", "an", "anti-malware", "solution", "to", "detect", "and", "prevent", "such", "attacks", "in", "the", "future." ]
[ 16, 16, 16, 3, 1, 16, 4, 16, 5, 13, 16, 16, 16, 16, 4, 12, 12, 16, 16, 16, 16, 5, 13, 16, 16, 16, 16, 16, 1, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Virus/W32.Patched.P", "W32.Patched.QC1", "Trojan.Razy.D19982", "PE_PATCHED.SMB", "Win32.Trojan.ImPatch.a", "W32/Floxif.A", "PE_PATCHED.SMB", "Trojan.Win32.Patched.qc", "Troj.W32.Patched.lnCt", "Trojan.Starter.3187", "W32/Floxif.A", "Trojan.Win32.Patched.qc", "Trojan.Patched.al", "W32/Patched.AL", "Virus.Win32.Loader.abd", "Trojan.Win32.Patched", "W32/Patched.AL!tr", "Virus.Win32.Patched.DG" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "name", "of", "the", "folder", "and", "the", "malware", "configuration", "are", "read", "from", "a", "customized", "configuration", "file", "stored", "in", "the", "resource", "section", "of", "the", "setup", "program", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "There", "the", "user", "is", "prompted", "to", "download", "and", "install", "a", "Trojan", "imitating", "an", "Adobe", "Flash", "Player", "update", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 13, 16, 16 ]
[ "In", "our", "research", ",", "we", "focus", "on", "the", "most", "recent", "sample", ",", "an", "application", "dubbed", "as", "\"", "Golden", "Cup", "''", ",", "launched", "just", "before", "the", "start", "of", "World", "Cup", "2018", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.OnGamesGBTOFAB.Trojan", "Trojan-Dropper.Win32.Dapato!O", "Trojan/Vilsel.bftr", "Trojan-Dropper.Win32.Dapato.bzqh", "Trojan.Win32.Vilsel.dktcmg", "Trojan.Vilsel.Win32.24133", "Trojan-PWS.Win32.QQPass", "TrojanDropper.Dapato.jop", "Trojan/Win32.Vilsel", "Win32.Troj.Vilsel.kcloud", "Trojan-Dropper.Win32.Dapato.bzqh", "Trojan.Vilsel" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "first", "timer", "will", "be", "fired", "on", "the", "configured", "interval", "(", "20", "seconds", "in", "this", "case", ")", ",", "pinging", "the", "command", "and", "control", "(", "C2", ")", "server", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Our", "intelligence", "shows", "β€œ", "Agent", "Smith", "”", "droppers", "proliferate", "through", "third-party", "app", "store", "β€œ", "9Apps", "”", ",", "a", "UC", "team", "backed", "store", ",", "targeted", "mostly", "at", "Indian", "(", "Hindi", ")", ",", "Arabic", ",", "and", "Indonesian", "users", "." ]
[ 16, 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "For", "now", ",", "that", "is", "the", "only", "way", "how", "cybercriminals", "can", "profit", "from", "Triada", ",", "but", "don", "’", "t", "forget", "that", "it", "’", "s", "a", "modular", "Trojan", ",", "so", "it", "can", "be", "turned", "into", "literally", "everything", "on", "one", "command", "from", "the", "C", "&", "C", "server", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Most", "users", "are", "pushing", "a", "variety", "of", "information", "stealers", "with", "the", "service." ]
[ 16, 16, 16, 16, 16, 16, 16, 6, 14, 16, 16, 5 ]
[ "Rooting", "and", "Ad", "Network", "Presentation", "The", "reflection", "loaded", "methods", "check", "if", "the", "device", "is", "rooted", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "This", "command", "is", "used", "to", "connect", "the", "victim", "to", "a", "Wi-Fi", "network", "controlled", "by", "the", "cybercriminals", "to", "perform", "traffic", "sniffing", "and", "man-in-the-middle", "(", "MitM", ")", "attacks", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]