tokens
sequencelengths 2
296
| ner_tags
sequencelengths 2
296
|
---|---|
[
"Seeing",
"that",
"the",
"developer",
"did",
"not",
"take",
"any",
"measures",
"to",
"protect",
"his",
"identity",
",",
"it",
"seems",
"likely",
"that",
"his",
"intentions",
"weren",
"β",
"t",
"dishonest",
"at",
"first",
"β",
"and",
"this",
"is",
"also",
"supported",
"by",
"the",
"fact",
"that",
"not",
"all",
"his",
"published",
"apps",
"contained",
"unwanted",
"ads",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"core",
"malware",
"β",
"s",
"icon",
"is",
"hidden",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Our",
"research",
"points",
"to",
"centralized",
"planning",
"and",
"development",
"by",
"one",
"or",
"more",
"advanced",
"persistent",
"threat",
"APT",
"actors."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
6,
14,
14,
14,
14
] |
[
"SpyNote",
"RAT",
"was",
"designed",
"to",
"function",
"only",
"over",
"Wi-Fi",
",",
"which",
"is",
"the",
"preferable",
"mode",
"for",
"Android",
"malware",
"to",
"send",
"files",
"to",
"C",
"&",
"C",
"."
] | [
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.Vetor.PE",
"Virus.Win32.Virut.1!O",
"W32.Virut.G",
"W32/Virut.AM",
"Win32/Virut.17408",
"PE_VIRUX.R",
"Win32.Virus.Virut.U",
"Virus.Win32.Virut.ce",
"Virus.Win32.Virut.hpeg",
"W32.Virut.lqR9",
"Win32.Virut.56",
"Virus.Virut.Win32.1938",
"PE_VIRUX.R",
"BehavesLike.Win32.VBObfus.dc",
"W32/Virut.AM",
"Win32/Virut.bt",
"Virus/Win32.Virut.ce",
"Win32.Virut.dd.368640",
"Virus.Win32.Virut.ce",
"Win32/Virut.F",
"Win32/Virut.NBP",
"W32/Virut.CE",
"Virus.Virut.14",
"W32/Sality.AO",
"Virus.Win32.VirutChangeEntry.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.LionumD.Trojan",
"Trojan.Injector.AF",
"Trojan-Spy.Win32.Zbot!O",
"Trojan.CoinMiner.Win32.82",
"Trojan.Injector.AF",
"Trojan.Win32.Delf.bkqgta",
"Trojan.Injector.AF",
"Trojan.DownLoader7.62911",
"Trojan/Win32.Miner",
"TrojanDownloader:Win32/Hoptto.B",
"Trojan.Injector.AF",
"Trojan.Injector.AF",
"Trojan.Injector.AF",
"Virus.Win32.DelfInject"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Research",
"reports",
"on",
"the",
"adversary",
"are",
"published",
"from",
"LAC",
"SecureWorks",
"and",
"Palo",
"Alto",
"Networks"
] | [
4,
16,
16,
6,
14,
16,
16,
16,
4,
4,
16,
4,
12,
12
] |
[
"The",
"malware",
"has",
"all",
"the",
"popular",
"capabilities",
"of",
"modern",
"spyware",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"HW32.Packed.50FA",
"Trojan.Win32.Pakes.miu",
"Trojan.Symmi.D62C5",
"Trojan.Win32.Bepiv",
"TR/Drop.RKit.CM",
"Backdoor:WinNT/Tofsee.A.dr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1
] |
[
"The",
"Root",
"of",
"All",
"(",
"Android",
")",
"Evil",
"So",
"how",
"does",
"TrickMo",
"get",
"around",
"these",
"security",
"features",
"?",
"It",
"abuses",
"accessibility",
"services",
"."
] | [
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"description",
"in",
"Portuguese",
"promises",
"more",
"protection",
"for",
"the",
"user",
"β",
"s",
"applications",
",",
"including",
"end-to-end",
"encryption",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"recent",
"research",
"by",
"Check",
"Point",
"Research",
"shows",
"how",
"voice",
"phishing",
"can",
"be",
"used",
"to",
"infiltrate",
"the",
"South",
"Korean",
"banking",
"sector",
"and",
"extract",
"private",
"data",
"from",
"the",
"victim's",
"mobile",
"device,",
"and",
"how",
"to",
"prevent",
"it."
] | [
16,
16,
16,
16,
4,
12,
12,
16,
16,
16,
12,
16,
16,
16,
16,
16,
4,
12,
12,
12,
12,
16,
16,
16,
16,
16,
5,
13,
13,
13,
16,
16,
16,
16,
16
] |
[
"Following",
"is",
"the",
"HTTP",
"response",
"from",
"the",
"C2",
"server",
",",
"containing",
"the",
"encrypted",
"configuration",
":",
"EventBot",
"Encrypted",
"HTTP",
"response",
"returned",
"from",
"the",
"C2",
"Encrypted",
"HTTP",
"response",
"returned",
"from",
"the",
"C2",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"In",
"addition",
",",
"the",
"malware",
"can",
"log",
"in",
"to",
"the",
"attacker",
"β",
"s",
"email",
"inbox",
",",
"parse",
"emails",
"in",
"a",
"special",
"folder",
"for",
"commands",
"and",
"save",
"any",
"payloads",
"to",
"a",
"device",
"from",
"email",
"attachments",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"malware",
"goes",
"to",
"great",
"lengths",
"to",
"identify",
"a",
"total",
"of",
"24",
"potential",
"security",
"products",
"that",
"may",
"be",
"running",
"on",
"a",
"system",
"and",
"customizes",
"its",
"installation",
"mechanism",
"to",
"specifically",
"evade",
"those",
"that",
"are",
"installed."
] | [
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
7,
15,
15,
15,
15,
0,
16,
16,
16,
16,
5,
16,
1,
9,
9,
9,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.PWS.ZIY",
"Trojan-PSW.Win32.Tepfer!O",
"Trojan.Fareit.S467850",
"Trojan.Tepfer.Win32.85789",
"Trojan/Fareit.a",
"Trojan.PWS.ZIY",
"Win32.Trojan-PSW.Fareit.a",
"Win32/PSW.Fareit.A",
"BKDR_PONY.SM",
"Win.Trojan.Fareit-403",
"Trojan.PWS.ZIY",
"Trojan.Win32.Tepfer.dnnwuu",
"Trojan.PWS.ZIY",
"TrojWare.Win32.PWS.Fareit.GS",
"Trojan.PWS.ZIY",
"Trojan.PWS.Stealer.1932",
"BKDR_PONY.SM",
"BehavesLike.Win32.ZBot.nh",
"W32.Tepfer",
"TR/PSW.Fareit.iloen",
"Trojan[PSW]/Win32.Tepfer",
"Trojan.Win32.PSW-Tepfer.92672",
"Trojan/Win32.Tepfer.R50650",
"Trojan.PWS.ZIY",
"BScope.Malware-Cryptor.Ponik",
"Spyware.Pony",
"Trj/Tepfer.D",
"Trojan.Fareit",
"Win32.Outbreak",
"Win32.Trojan-Stealer.Zbot.AB",
"Win32/Trojan.PSW.5cd"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"These",
"factors",
",",
"in",
"combination",
"with",
"the",
"fact",
"that",
"the",
"command",
"and",
"control",
"infrastructure",
"used",
"by",
"Frozen",
"Cell",
"and",
"Desert",
"Scorpion",
"resides",
"in",
"similar",
"IP",
"blocks",
",",
"supports",
"the",
"theory",
"that",
"the",
"same",
"actor",
"is",
"responsible",
"for",
"operating",
",",
"if",
"not",
"developing",
",",
"both",
"families",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Figure",
"7",
"."
] | [
16,
16,
16
] |
[
"β",
"Agent",
"Smith",
"β",
"is",
"possibly",
"the",
"first",
"campaign",
"seen",
"that",
"ingrates",
"and",
"weaponized",
"all",
"these",
"loopholes",
"and",
"are",
"described",
"in",
"detail",
"below",
"."
] | [
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"TSPY_DOWNLOADER_DD300501.UVPA",
"Win32.Trojan.WisdomEyes.16070401.9500.9967",
"Infostealer.Donx",
"TSPY_DOWNLOADER_DD300501.UVPA",
"Trojan.Win32.VB.ckqm",
"Trojan.VB.Win32.119679",
"BehavesLike.Win32.Sality.dm",
"Worm.Win32.VB",
"Trojan/VB.cvqf",
"Trojan/Win32.VB",
"Worm:Win32/Vberaspul.A",
"Trojan.Heur.RX.E04E5F",
"Trojan.Win32.VB.ckqm",
"Trojan/Win32.VB.R85915",
"Trojan.VB",
"Win32/AutoRun.VB.BDA",
"Trojan.VB!nw7hcYRbBc8"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"]",
"comlila-tournai",
"[",
"."
] | [
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"TROJ_CLICKER.API",
"W32/Trojan.HUCV-9091",
"TROJ_CLICKER.API",
"Win.Trojan.Clicker-2623",
"Trojan.Win32.Click.ddmsji",
"W32/Trojan2.GMLR",
"Adware/Clicker.hjb",
"TrojanDownloader:Win32/Valfroc.A",
"Win32.Trojan.Clicker.Tbip",
"W32/CLICKER.API!tr",
"Win32/Trojan.Multi.daf"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Additionally",
",",
"rootdaemon",
"attempts",
"to",
"remove",
"its",
"own",
"power",
"usage",
"statistics",
"from",
"Huawei",
"phones",
"'",
"SystemManager",
":",
"Similarly",
",",
"the",
"malicious",
"application",
"probably",
"attempts",
"to",
"minimize",
"traces",
"on",
"Samsung",
"phones",
"by",
"adding",
"to",
"the",
"file",
"/data/data/com.samsung.android.securitylogagent/shared_prefs/apm_sp_status_of_apps.xml",
"the",
"following",
"lines",
":",
"And",
"adding",
"to",
"the",
"file",
"/data/data/com.samsung.android.securitylogagent/shared_prefs/com.samsung.android.securitylogagent_preferences.xml",
"these",
"lines",
"instead",
":",
"Data",
"Collection",
"and",
"Exfiltration",
"As",
"mentioned",
",",
"mike.jar",
"equips",
"the",
"spyware",
"with",
"extensive",
"collection",
"capabilities",
",",
"including",
":",
"Retrieve",
"a",
"list",
"of",
"installed",
"applications",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"In",
"light",
"of",
"this",
",",
"we",
"believe",
"an",
"attack",
"against",
"unpatched",
"vulnerabilities",
"is",
"a",
"reasonable",
"conjecture",
"for",
"how",
"the",
"server",
"was",
"compromised",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
7,
15,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Seeing",
"this",
"type",
"of",
"activity",
"typically",
"indicates",
"that",
"a",
"particular",
"ransomware",
"will",
"see",
"much",
"wider",
"distribution",
"and",
"thus",
"a",
"larger",
"amount",
"of",
"victims."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
4,
12,
12,
12,
12
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan-Downloader.Win32.LibPatcher!O",
"W32/Trojan.KFBA-3961",
"Trojan.KillAV",
"Win32/KillAV.EA",
"RTKT_BUREY.C",
"TrojWare.Win32.AntiAV.~B",
"Trojan.MulDrop.30985",
"Downloader.LibPatcher.Win32.272",
"RTKT_BUREY.C",
"BehavesLike.Win32.Backdoor.mc",
"W32/Dldr.Age.41984.C",
"Trojan[Downloader]/Win32.LibPatcher",
"Trojan:Win32/Perkesh.A",
"Trojan/Win32.KillAV.R5311",
"Win32.Trojan-downloader.Libpatcher.Dumk",
"Trojan-Downloader.Win32.Perkesh",
"W32/Perkesh.A!tr",
"Win32/Virus.81b"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.CKTNum.Trojan",
"Virus.Win32.VB!O",
"Virus.VB.Win32.90",
"W32.W.Mabezat.kZb9",
"Trojan.Heur.E2A0A7",
"Win32.Trojan.WisdomEyes.16070401.9500.9998",
"W32/Worm.EJIG-5497",
"Trojan.Killfiles",
"Win32/Disackt.B",
"TROJ_VB.BHC",
"Trojan.Win32.VB.mrc",
"Virus.Win32.VB.bcfhqp",
"Win32.Trojan.Vb.Eddp",
"TrojWare.Win32.VB.AMN",
"TROJ_VB.BHC",
"BehavesLike.Win32.Downloader.mz",
"W32/Worm.AWSI",
"Virus.VB.bc",
"W32/Overwriter.A",
"Worm:Win32/Disackt.A",
"Trojan.Win32.VB.mrc",
"TScope.Trojan.VB",
"Win32/VB.AMN",
"Trojan.VB!eJU5EBjve4c",
"Virus.Win32.VB",
"W32/VB.AMN!tr",
"Trj/CI.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/W32.Small.49152.AYF",
"Trojan.Dofoil.A",
"Trojan/Kryptik.vgb",
"Win32.Trojan.WisdomEyes.16070401.9500.9963",
"W32/Trojan.QQGJ-6488",
"Trojan.Win32.ULPM.eszgb",
"Trojan.Yakes.Win32.1447",
"BehavesLike.Win32.Conficker.pc",
"Trojan-Dropper.Win32.Injector",
"W32/Kryptik.VIA!tr",
"Trojan.Kazy.DABAF",
"TrojanDropper:Win32/Finkmilt.C",
"Trojan/Win32.Yakes.C144665",
"BScope.Trojan.Jorik.1421",
"Trojan.Kryptik!Y5cjjPIzRWk",
"Bck/Qbot.AO",
"Win32/Trojan.aeb"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"At",
"the",
"end",
"of",
"December",
"2015,",
"the",
"network",
"system",
"of",
"Ukrainian",
"power",
"companies",
"was",
"attacked",
"by"
] | [
3,
16,
0,
8,
8,
8,
16,
4,
12,
12,
12,
12,
12,
16,
1,
16
] |
[
"Stage",
"6",
":",
"The",
"payload",
"is",
"a",
"modular",
"spyware",
"framework",
"for",
"further",
"analysis",
"Our",
"journey",
"to",
"deobfuscating",
"FinFisher",
"has",
"allowed",
"us",
"to",
"uncover",
"the",
"complex",
"anti-analysis",
"techniques",
"used",
"by",
"this",
"malware",
",",
"as",
"well",
"as",
"to",
"use",
"this",
"intel",
"to",
"protect",
"our",
"customers",
",",
"which",
"is",
"our",
"top",
"priority",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32/Socks.agz",
"Win32.Trojan.WisdomEyes.16070401.9500.9997",
"W32/Trojan2.BFTZ",
"HT_PHDET_FD042CB0.UVPM",
"Trojan.Win32.Socks.utqwi",
"Trojan.MulDrop7.51577",
"HT_PHDET_FD042CB0.UVPM",
"BehavesLike.Win32.Dropper.jc",
"W32/Trojan.NOBV-3130",
"TrojanDownloader.Small.sui",
"Worm/Win32.Socks",
"Trojan:Win32/Phdet.E",
"Worm.Win32.A.Socks.93017",
"SScope.Worm.Socks.afv",
"Worm.Socks!GMlFK48cpa8",
"W32/Kryptik.BD!tr",
"Win32/Trojan.e0b"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Recently,",
"WeipTech",
"was",
"analyzing",
"suspicious",
"Apple",
"iOS",
"tweaks",
"reported",
"by",
"users",
"and",
"found",
"over",
"225,000",
"valid",
"Apple",
"accounts",
"with",
"passwords",
"stored",
"on",
"a",
"server."
] | [
16,
4,
16,
16,
16,
5,
13,
16,
16,
16,
4,
16,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
16,
5
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.HfsAutoB.D676",
"Win32.Trojan.WisdomEyes.16070401.9500.9591",
"TR/Drop.Delfsnif.pmkbu",
"TrojanDropper:Win32/Delfsnif.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan-Dropper.Win32.AphexLace!O",
"TrojanDropper.AphexLace",
"Dropper.AphexLace.Win32.1",
"Troj.W32.Inject!c",
"Trojan/Dropper.AphexLace.b",
"Trojan.Heur.EA2D6B",
"TROJ_APHEXLACE.D",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"W32/Dropper.IHO",
"Trojan.Dropper",
"TROJ_APHEXLACE.D",
"Trojan.Win32.Inject.vgog",
"Trojan.Win32.AphexLace.glqv",
"Dropper.AphexLace.17920",
"TrojWare.Win32.TrojanDropper.AphexLace.B",
"Trojan.MulDrop.12656",
"Trojan-Dropper.Win32.Delf",
"W32/Risk.JBWO-6048",
"TrojanDropper.AphexLace.b",
"TR/Drop.AphexLace.B",
"Trojan[Dropper]/Win32.Poisoner",
"TrojanDropper:Win32/AphexLace.B",
"Trojan.Win32.Inject.vgog",
"Dropper/Win32.Xema.C57521",
"TrojanDropper.Poisoner",
"Win32/TrojanDropper.AphexLace.B",
"Win32.Trojan.Inject.Dypn",
"Trojan.DR.AphexLace!M08TVuH6+oM"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"best",
"bet",
"for",
"Readers",
"who",
"want",
"to",
"make",
"sure",
"their",
"phone",
"is",
"n't",
"infected",
"is",
"to",
"scan",
"their",
"phones",
"using",
"the",
"free",
"version",
"of",
"the",
"Lookout",
"Security",
"and",
"Antivirus",
"app",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
16,
16,
16,
16
] |
[
"Indicators",
"related",
"to",
"the",
"Sundown",
"Exploit",
"Kit"
] | [
1,
16,
16,
16,
3,
11,
11
] |
[
"CopyCat",
"is",
"a",
"fully",
"developed",
"malware",
"with",
"vast",
"capabilities,",
"including",
"elevating",
"privileges",
"to",
"root,",
"establishing",
"persistency,",
"and",
"to",
"top",
"it",
"all",
"-",
"injecting",
"code",
"into",
"Zygote."
] | [
3,
16,
16,
16,
16,
3,
16,
16,
16,
16,
1,
9,
9,
9,
9,
9,
16,
16,
16,
16,
16,
16,
1,
9,
16,
3
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"HW32.Packed.D9E5",
"TrojanSpy.Zbot",
"Spyware.LokiBot",
"Win.Packer.VbPack-0-6334882-0",
"Trojan-Spy.Win32.Zbot.yjsw",
"Trojan.Win32.Zbot.etexpw",
"Trojan.Win32.Z.Zbot.1081344",
"Trojan.PWS.Panda.12377",
"Trojan.Zbot.Win32.204854",
"BehavesLike.Win32.Fareit.tc",
"Trojan.Win32.Injector",
"TrojanSpy.Zbot.fkpq",
"TR/AD.Zbot.cxjcv",
"Trojan[Spy]/Win32.Zbot",
"Trojan.Symmi.D1360F",
"Trojan-Spy.Win32.Zbot.yjsw",
"Trojan:Win32/Dukrid.A!bit",
"Spyware/Win32.Zbot.R210148",
"TScope.Trojan.VB",
"Trj/GdSda.A",
"Win32.Trojan-spy.Zbot.Lqer",
"TrojanSpy.Zbot!AasFtIJIGGs",
"W32/Zbot.YJSW!tr",
"Win32/Trojan.BO.553"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"WordPress.org",
"team",
"has",
"intervened",
"and",
"removed",
"the",
"plugin",
"from",
"the",
"official",
"WordPress",
"Plugins",
"repository."
] | [
4,
12,
12,
16,
16,
16,
16,
16,
3,
16,
4,
12,
12,
12,
12
] |
[
"It",
"is",
"likely",
"these",
"spearphishes",
"are",
"generated",
"via",
"a",
"builder",
"-",
"so",
"attribution",
"to",
"an",
"exact",
"group",
"of",
"attackers",
"may",
"be",
"incorrect."
] | [
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
6,
14,
14,
16,
16,
16
] |
[
"SimBad",
":",
"A",
"Rogue",
"Adware",
"Campaign",
"On",
"Google",
"Play",
"March",
"13",
",",
"2019",
"Check",
"Point",
"researchers",
"from",
"the",
"Mobile",
"Threat",
"Team",
"have",
"discovered",
"a",
"new",
"adware",
"campaign",
"on",
"the",
"Google",
"Play",
"Store",
"."
] | [
3,
16,
16,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
4,
12,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
13,
16
] |
[
"This",
"campaign",
"was",
"found",
"to",
"be",
"connected",
"to",
"the",
"same",
"party",
"which",
"previously",
"targeted",
"Vietnam",
"Airlines",
"and",
"some",
"other",
"high",
"profile",
"targets",
"possibly",
"led",
"by",
"the",
"Chinese",
"1937CN",
"group."
] | [
16,
6,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
12,
16,
16,
16,
4,
12,
12,
16,
16,
16,
4,
12,
12,
12
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"I-Worm.Stator.A",
"Worm/W32.Stator.62976",
"Email-Worm.Win32.Stator!O",
"W32.Stator.A",
"Worm.Stator.Win32.3",
"W32/Stator.worm",
"I-Worm.Stator.A",
"W32/Stator.A",
"W32.Stator@mm",
"Win32/Stator.62464.A",
"WORM_STATOR.A",
"Win.Worm.Stator-1",
"I-Worm.Stator.A",
"Email-Worm.Win32.Stator.a",
"I-Worm.Stator.A",
"Trojan.Win32.Stator.jahi",
"I-Worm.Win32.Stator",
"I-Worm.Stator.A",
"EmailWorm.Win32.Stator.a0",
"I-Worm.Stator.A",
"Win32.HLLW.Plict",
"WORM_STATOR.A",
"BehavesLike.Win32.Downloader.kc",
"Email-Worm.Win32.Stator.a",
"W32/Stator.A",
"I-Worm/Stator.a",
"Worm[Email]/Win32.Stator",
"Worm:Win32/Stator.A@mm",
"Email-Worm.Win32.Stator.a",
"Trojan/Win32.HDC.C40377",
"I-Worm.Stator.A",
"Win32.HLLW.Stator.A",
"I-Worm.Stator.62464",
"Win32/Stator.62464",
"Win32.Stator.B",
"W32/Stator.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Talos",
"assess",
"with",
"high",
"confidence",
"that",
"this",
"campaign",
"is",
"targeting",
"Australian",
"financial",
"institutions",
"based",
"on",
"several",
"factors",
"."
] | [
4,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"encrypt",
"its",
"APK",
"and",
"shell",
"code,"
] | [
1,
16,
5,
16,
1,
9
] |
[
"It",
"looked",
"like",
"a",
"typical",
"backdoor",
"that",
"could",
"be",
"uploaded",
"anywhere",
"on",
"a",
"compromised",
"server,",
"not",
"just",
"in",
"this",
"particular",
"plugin."
] | [
16,
16,
16,
16,
16,
3,
16,
16,
16,
1,
9,
16,
16,
5,
13,
16,
16,
16,
16,
16,
5
] |
[
"Emissary",
"is",
"related",
"to",
"the",
"Elise",
"Trojan",
"and",
"the",
"Operation",
"Lotus",
"Blossom",
"attack",
"campaign,",
"which",
"prompted",
"us",
"to",
"start",
"collecting",
"additional",
"samples",
"of",
"Emissary."
] | [
3,
16,
16,
16,
3,
11,
11,
16,
6,
14,
14,
14,
14,
14,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3
] |
[
"The",
"authors",
"are",
"trying",
"to",
"latch",
"onto",
"the",
"popularity",
"of",
"the",
"Super",
"Mario",
"Run",
"game",
"to",
"target",
"eagerly",
"waiting",
"Android",
"users",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
13,
16,
16,
16,
16,
16,
5,
16,
16
] |
[
"This",
"trojan",
"'s",
"design",
"and",
"implementation",
"is",
"of",
"an",
"uncommonly",
"high",
"level",
",",
"making",
"it",
"a",
"dangerous",
"threat",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"To",
"quote",
"the",
"original",
"article:",
"It",
"could",
"be",
"through",
"attachments",
"in",
"spam",
"messages,",
"downloads",
"from",
"untrusted",
"websites",
"or",
"something",
"else."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"spyware",
"in",
"this",
"analysis",
"was",
"portraying",
"itself",
"as",
"the",
"Netflix",
"app",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16
] |
[
"Command",
"Action",
"Unistxcr",
"Restart",
"the",
"app",
"dowsizetr",
"Send",
"the",
"file",
"stored",
"in",
"the",
"/sdcard/DCIM/.dat/",
"directory",
"to",
"the",
"C",
"&",
"C",
"server",
"Caspylistx",
"Get",
"a",
"list",
"of",
"all",
"hidden",
"files",
"in",
"the",
"/DCIM/.dat/",
"directory",
"spxcheck",
"Check",
"whether",
"call",
"details",
"are",
"collected",
"by",
"the",
"spyware",
"S8p8y0",
"Delete",
"call",
"details",
"stored",
"by",
"the",
"spyware",
"screXmex",
"Take",
"screenshots",
"of",
"the",
"device",
"screen",
"Batrxiops",
"Check",
"battery",
"status",
"L4oclOCMAWS",
"Fetch",
"the",
"victim",
"'s",
"location",
"GUIFXB",
"Launch",
"the",
"fake",
"Facebook",
"login",
"page",
"IODBSSUEEZ",
"Send",
"a",
"file",
"containing",
"stolen",
"Facebook",
"credentials",
"to",
"the",
"C",
"&",
"C",
"server",
"FdelSRRT",
"Delete",
"files",
"containing",
"stolen",
"Facebook",
"credentials",
"chkstzeaw",
"Launch",
"Facebook",
"LUNAPXER",
"Launch",
"apps",
"according",
"to",
"the",
"package",
"name",
"sent",
"by",
"the",
"C",
"&",
"C",
"server",
"Gapxplister",
"Get",
"a",
"list",
"of",
"all",
"installed",
"applications",
"DOTRall8xxe",
"Zip",
"all",
"the",
"stolen",
"files",
"and",
"store",
"in",
"the",
"/DCIM/.dat/",
"directory",
"Acouxacour",
"Get",
"a",
"list",
"of",
"accounts",
"on",
"the",
"victim",
"'s",
"device",
"Fimxmiisx",
"Open",
"the",
"camera",
"Scxreexcv4",
"Capture",
"an",
"image",
"micmokmi8x",
"Capture",
"audio",
"Yufsssp",
"Get",
"latitude",
"and",
"longitude",
"GExCaalsss7",
"Get",
"call",
"logs",
"PHOCAs7",
"Call",
"phone",
"numbers",
"sent",
"by",
"the",
"C",
"&",
"C",
"server",
"Gxextsxms",
"Get",
"a",
"list",
"of",
"inbox",
"SMS",
"messages",
"Msppossag",
"Send",
"SMS",
"with",
"message",
"body",
"sent",
"by",
"the",
"C",
"&",
"C",
"server",
"Getconstactx",
"Get",
"a",
"list",
"of",
"all",
"contacts",
"Rinxgosa",
"Play",
"a",
"ringtone",
"bithsssp64",
"Execute",
"commands",
"sent",
"by",
"the",
"C",
"&",
"C",
"server",
"DOWdeletx",
"Deletes",
"the",
"file",
"specified",
"by",
"the",
"C",
"&",
"C",
"server",
"Deldatall8",
"Delete",
"all",
"files",
"stored",
"in",
"the",
"/sdcard/DCIM/.dat/",
"directory",
"We",
"do",
"n't",
"have",
"the",
"space",
"to",
"cover",
"all",
"of",
"the",
"commands",
",",
"but",
"let",
"'s",
"take",
"a",
"look",
"at",
"some",
"of",
"the",
"major",
"ones",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"If",
"any",
"of",
"these",
"conditions",
"is",
"true",
",",
"the",
"application",
"does",
"not",
"continue",
"to",
"execute",
"the",
"malicious",
"flow",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"It",
"has",
"been",
"the",
"subject",
"of",
"many",
"analysis",
"reports,",
"including",
"those",
"describing",
"targeted",
"espionage",
"campaigns",
"like",
"Operation",
"Night",
"Dragon",
"and",
"the",
"GhostNet",
"attacks",
"on",
"Tibet."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
6,
14,
14,
16,
6,
14,
14,
16,
16,
3,
1,
16,
2
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Miner",
"Troj.W32.Miner!c",
"Trojan.MulDrop7.60223",
"TR/Muldrop.jzijj",
"Trojan.Win32.Miner.tjvn"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1
] |
[
"The",
"threat",
"actor's",
"campaigns",
"attempt",
"to",
"convince",
"high-profile",
"North",
"American",
"and",
"European",
"government",
"officials",
"as",
"well",
"as",
"CEOs",
"of",
"prominent",
"companies",
"and",
"celebrities",
"into",
"participating",
"in",
"recorded",
"phone",
"calls",
"or",
"video",
"chats."
] | [
6,
14,
14,
14,
16,
16,
16,
4,
12,
12,
12,
12,
12,
12,
16,
16,
16,
4,
16,
16,
4,
16,
4,
16,
16,
16,
4,
16,
16,
16,
16,
16
] |
[
"The",
"earliest",
"evidence",
"obtained",
"shows",
"it",
"has",
"been",
"in",
"use",
"since",
"at",
"least",
"November",
"2016."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
0,
8,
8
] |
[
"The",
"hash",
"listed",
"in",
"the",
"Pastebin",
"led",
"us",
"to",
"a",
"malicious",
"Word",
"document",
"that",
"had",
"also",
"been",
"uploaded",
"to",
"a",
"public",
"sandbox."
] | [
1,
9,
9,
16,
4,
12,
16,
16,
16,
1,
9,
9,
9,
16,
16,
16,
16,
16,
16,
5,
13,
13
] |
[
"Similarly",
"to",
"another",
"Android",
"spyware",
"made",
"in",
"Italy",
",",
"originally",
"discovered",
"by",
"Lukas",
"Stefanko",
"and",
"later",
"named",
"Skygofree",
"and",
"analyzed",
"in",
"depth",
"by",
"Kaspersky",
"Labs",
",",
"Exodus",
"also",
"takes",
"advantage",
"of",
"\"",
"protectedapps",
"''",
",",
"a",
"feature",
"in",
"Huawei",
"phones",
"that",
"allows",
"to",
"configure",
"power-saving",
"options",
"for",
"running",
"applications",
"."
] | [
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
4,
12,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"At",
"the",
"time",
"of",
"writing",
"we",
"had",
"no",
"evidence",
"of",
"an",
"exploit",
"being",
"used",
"to",
"obtain",
"root",
"privileges",
",",
"though",
"it",
"is",
"possible",
"that",
"the",
"attackers",
"used",
"some",
"unseen",
"component",
"to",
"implement",
"this",
"feature",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"]",
"91",
"2020-03-04",
"http",
":",
"//ora.carlaarrabitoarchitetto",
"[",
"."
] | [
9,
9,
16,
1,
9,
9,
9,
9
] |
[
"]",
"com",
"β",
"as",
"an",
"ad-related",
"SDK",
"."
] | [
9,
9,
16,
16,
16,
16,
16,
16
] |
[
"Aside",
"from",
"the",
"credential",
"stealing",
",",
"this",
"malware",
"also",
"includes",
"features",
"like",
"the",
"theft",
"of",
"users",
"'",
"contact",
"list",
",",
"collecting",
"phone",
"numbers",
"associated",
"names",
",",
"and",
"files",
"and",
"photos",
"on",
"the",
"device",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Ransom/W32.Locky.48128",
"Exploit.Cve20151701",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Exploit.Win32.CVE-2015-1701.bd",
"Exploit.Win32.CVE20151701.euekja",
"Trojan.Win32.LockCrypt.48128.A",
"Trojan.Encoder.12135",
"BehavesLike.Win32.Mydoom.pm",
"W32/Trojan.JPLA-3344",
"Exploit.CVE-2015-1701.ar",
"TR/AD.RansomHeur.fbqvj",
"Exploit.W32.Cve!c",
"Exploit.Win32.CVE-2015-1701.bd",
"Ransom:Win32/LockCrypt.A!bit",
"Trojan/Win32.Scar.R211760",
"Exploit.CVE-2015-1701",
"Ransom.DXXD",
"Trj/GdSda.A",
"Trojan.Win32.Filecoder",
"Win32.Trojan-Ransom.LockCrypt.A",
"Win32/Trojan.Exploit.3d9"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"This",
"is",
"exactly",
"what",
"we",
"saw",
"in",
"late",
"October",
"and",
"early",
"November",
"2016,",
"when",
"the",
"espionage",
"group",
"Pawn",
"Storm",
"also",
"known",
"as",
"Fancy",
"Bear,",
"APT28,",
"Sofacy,",
"and",
"STRONTIUM",
"ramped",
"up",
"its",
"spear-phishing",
"campaigns",
"against",
"various",
"governments",
"and",
"embassies",
"around",
"the",
"world."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
0,
16,
16,
0,
8,
16,
16,
6,
14,
14,
14,
16,
16,
16,
6,
14,
14,
14,
16,
6,
16,
16,
16,
6,
14,
16,
16,
4,
16,
4,
16,
16,
2
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Virus.Win32!O",
"W32.Etap",
"W32/Etap.dr",
"Win32.Trojan.WisdomEyes.16070401.9500.9929",
"W32.Simile",
"Virus.Win32.Etap",
"Win32.Etap.E",
"Win32/Linux.Etap",
"W32/Etap.dr",
"Virus.Win32.Etap",
"Backdoor/Hupigon.ish",
"Virus/Win32.Etap",
"Trojan.Kazy.D65E9",
"Virus.Win32.Etap",
"Backdoor:Win32/Etap.dr",
"Win32/Etap.E",
"W32/Etap.D"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Furthermore,",
"each",
"of",
"the",
"stages",
"used",
"different",
"development",
"platform",
"and",
"was",
"obfuscated",
"in",
"a",
"different",
"way."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Rather",
"than",
"simply",
"copying",
"the",
"features",
"that",
"were",
"present",
"within",
"the",
"Zeus",
"trojan",
"as-is",
"Floki",
"Bot",
"claims",
"to",
"feature",
"several",
"new",
"capabilities",
"making",
"it",
"an",
"attractive",
"tool",
"for",
"criminals."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
6
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Worm/W32.Silva.447488",
"Worm.Keco",
"W32.W.Silva.d!c",
"W32/Silva.d",
"W32/Silva.D",
"W32.Silva@mm",
"Trojan.Win32.Silva.envq",
"Worm.Win32.Silva.D",
"Win32.HLLW.Silva",
"Worm.Win32.Silva",
"W32/Silva.QGXV-8360",
"I-Worm/Silva.d",
"Worm:Win32/Silva.D@mm",
"Worm:Win32/Silva.D@mm",
"Email-Worm.Keco",
"W32/Keco.G.worm",
"Win32/Silva.D",
"Win32.Worm-email.Keco.Peze",
"I-Worm.Silva!97fYr5ijFvQ",
"W32/Silva.D@mm"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Below",
"are",
"a",
"couple",
"of",
"images",
"of",
"the",
"panel",
"that",
"the",
"attacker",
"would",
"be",
"utilizing."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.BHO.Delf.T",
"Trojan.Win32.Delf!O",
"Trojan.Lnkhyd.A7",
"Trojan.Delf.Win32.15794",
"Troj.W32.Delf.lV2h",
"Win32/Delf.AXIT",
"TROJ_DELF.PVC",
"Win.Trojan.Delf-11211",
"Trojan.BHO.Delf.T",
"Trojan.Win32.Delf.ssh",
"Trojan.BHO.Delf.T",
"Trojan.Win32.Delf.cjzwb",
"Trojan.Win32.Delf.157696.J",
"Trojan.BHO.Delf.T",
"TROJ_DELF.PVC",
"Trojan.Lnkhyd",
"Trojan/Delf.mdz",
"Trojan:Win32/Lnkhyd.A",
"Trojan/Win32.Delf",
"Trojan.BHO.Delf.T",
"Trojan.Win32.Delf.ssh",
"Trojan:Win32/Lnkhyd.A",
"Trojan/Win32.Fides.R3508",
"Trojan.BHO.Delf.T",
"TScope.Trojan.Delf",
"Win32.Trojan.Delf.Ednr",
"Trojan.Win32.BHO.R"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Interaction",
"with",
"these",
"servers",
"is",
"performed",
"in",
"two",
"different",
"threads."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"samples",
"sharing",
"this",
"overlap",
"are",
"modified",
"versions",
"of",
"an",
"open",
"source",
"Jabber/XMPP",
"client",
"called",
"β",
"Conversations",
"β",
"with",
"some",
"code",
"additions",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"They",
"use",
"compromised",
"e-mail",
"accounts",
"to",
"distribute",
"their",
"malware",
"widely",
"and",
"their",
"targeting",
"appears",
"opportunistic",
"rather",
"than",
"specific."
] | [
16,
16,
1,
9,
9,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"PUP.Riskware.Tool",
"Trojan.Win32.Cindyc.wrlqe",
"TR/DyCode.A.110",
"Backdoor/Cindyc.bv",
"Win32.Troj.Undef.kcloud",
"Trojan:Win32/DyCode.A",
"Backdoor.Win32.A.Cindyc.141184",
"Backdoor/Win32.Cindyc",
"Backdoor.Cindyc.adk",
"Backdoor.Win32.Cindyc",
"Trj/CI.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"]",
"com",
"csip6",
"[",
"."
] | [
9,
9,
1,
9,
9
] |
[
"Credit",
"card",
"industry",
"giant",
"Visa",
"on",
"Friday",
"issued",
"a",
"security",
"alert",
"warning",
"companies",
"using",
"point-of-sale",
"devices",
"made",
"by",
"Oracle",
"s",
"MICROS",
"retail",
"unit",
"to",
"double-check",
"the",
"machines",
"for",
"malicious",
"software",
"or",
"unusual",
"network",
"activity,",
"and",
"to",
"change",
"passwords",
"on",
"the",
"devices."
] | [
4,
12,
12,
16,
4,
16,
0,
16,
16,
16,
16,
16,
4,
16,
5,
13,
16,
16,
4,
16,
5,
13,
13,
16,
16,
16,
5,
11,
3,
11,
16,
1,
9,
9,
16,
16,
16,
16,
16,
16,
5
] |
[
"The",
"dropper",
"family,",
"referred",
"to",
"internally",
"as",
"PNG_dropper,",
"was",
"observed",
"being",
"used",
"as",
"a",
"second",
"stage",
"tool",
"in",
"different",
"targeted",
"attacks."
] | [
3,
11,
11,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
3,
11,
11,
16,
16,
16,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.StartPageCRTD.Win32.8798",
"Win32.Trojan.WisdomEyes.16070401.9500.9990",
"Trojan.Win32.Clicker!BT",
"Trojan.MSIL.EzirizNetReactor",
"TR/Dropper.MSIL.76348",
"TrojanClicker:MSIL/Balamid.B",
"Trojan.Jatif.32",
"Trojan/Win32.FakeMS.R113384",
"Trojan.Win32.Clicker!BT",
"Win32/Trojan.Dropper.2f1"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9589",
"TROJ_DELF.IVW",
"Trojan-Downloader.Win32.Delf.acc",
"Troj.Downloader.W32.Delf!c",
"Win32.Trojan-downloader.Delf.Edoh",
"TrojWare.Win32.TrojanDownloader.Delf.~ABI",
"Trojan.DownLoader.46506",
"Trojan-Downloader.Win32.Delf.ACC",
"TrojanDownloader.Delf.fqq",
"Trojan[Downloader]/Win32.Delf",
"Win32.TrojDownloader.Delf.ac.kcloud",
"Trojan.Downloader.bGWcaOz2KakG",
"Trojan.Win32.A.Downloader.34816.FA",
"Trojan-Downloader.Win32.Delf.acc",
"Trj/Banbra.FSU",
"Win32/Trojan.Downloader.dac"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Malicious",
"app",
"com.qualcmm.timeservices",
"As",
"I",
"mentioned",
"before",
",",
"in",
"the",
"β",
"initial",
"phase",
"β",
",",
"the",
"Trojan",
"will",
"install",
"the",
"β",
"com.qualcmm.timeservices",
"β",
"app",
"."
] | [
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16
] |
[
"It",
"does",
"this",
"by",
"leveraging",
"the",
"Android",
"plugin",
"technology."
] | [
16,
16,
16,
16,
16,
5,
13,
13,
13
] |
[
"That",
"creates",
"a",
"fake",
"ID",
"that",
"allows",
"the",
"perpetrators",
"to",
"generate",
"referral",
"revenues",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"HenBox",
":",
"The",
"Chickens",
"Come",
"Home",
"to",
"Roost",
"March",
"13",
",",
"2018",
"at",
"5:00",
"AM",
"Unit",
"42",
"recently",
"discovered",
"a",
"new",
"Android",
"malware",
"family",
"we",
"named",
"β",
"HenBox",
"β",
"masquerading",
"as",
"a",
"variety",
"of",
"legitimate",
"Android",
"apps",
"."
] | [
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16
] |
[
"Trojan",
"Ransom",
"Xpan",
"was",
"created",
"by",
"an",
"organized",
"gang,",
"which",
"used",
"targeted",
"attacks",
"via",
"RDP",
"that",
"abused",
"weak",
"passwords",
"and",
"wrong",
"implementations."
] | [
3,
11,
11,
16,
16,
16,
16,
6,
14,
16,
16,
16,
1,
16,
7,
16,
16,
7,
15,
16,
7,
15
] |
[
"The",
"operators",
"have",
"used",
"use",
"a",
"range",
"of",
"techniques",
"to",
"target",
"Windows",
"computers",
"and",
"Android",
"phones",
"with",
"the",
"apparent",
"goal",
"of",
"penetrating",
"the",
"computers",
"of",
"well-connected",
"individuals",
"in",
"the",
"Syrian",
"opposition."
] | [
16,
6,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16,
5,
13,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
4,
16,
16,
4,
12
] |
[
"On",
"the",
"network",
"traffic",
"analysis",
"end,",
"post",
"compromise",
"activity",
"results",
"in",
"some",
"interesting",
"but",
"not",
"unexpected",
"activity."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Based",
"on",
"this",
"evidence",
"we",
"believe",
"this",
"new",
"malware",
"is",
"likely",
"targeting",
"South",
"Koreans."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
2,
10
] |
[
"A",
"series",
"of",
"malware",
"attacks",
"targeting",
"users",
"of",
"cryptocurrency",
"wallets",
"has",
"been",
"identified",
"by",
"security",
"firm",
"Kaspersky,",
"which",
"has",
"developed",
"an",
"anti-malware",
"solution",
"to",
"detect",
"and",
"prevent",
"such",
"attacks",
"in",
"the",
"future."
] | [
16,
16,
16,
3,
1,
16,
4,
16,
5,
13,
16,
16,
16,
16,
4,
12,
12,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
16,
1,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Virus/W32.Patched.P",
"W32.Patched.QC1",
"Trojan.Razy.D19982",
"PE_PATCHED.SMB",
"Win32.Trojan.ImPatch.a",
"W32/Floxif.A",
"PE_PATCHED.SMB",
"Trojan.Win32.Patched.qc",
"Troj.W32.Patched.lnCt",
"Trojan.Starter.3187",
"W32/Floxif.A",
"Trojan.Win32.Patched.qc",
"Trojan.Patched.al",
"W32/Patched.AL",
"Virus.Win32.Loader.abd",
"Trojan.Win32.Patched",
"W32/Patched.AL!tr",
"Virus.Win32.Patched.DG"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"name",
"of",
"the",
"folder",
"and",
"the",
"malware",
"configuration",
"are",
"read",
"from",
"a",
"customized",
"configuration",
"file",
"stored",
"in",
"the",
"resource",
"section",
"of",
"the",
"setup",
"program",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"There",
"the",
"user",
"is",
"prompted",
"to",
"download",
"and",
"install",
"a",
"Trojan",
"imitating",
"an",
"Adobe",
"Flash",
"Player",
"update",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
13,
16,
16
] |
[
"In",
"our",
"research",
",",
"we",
"focus",
"on",
"the",
"most",
"recent",
"sample",
",",
"an",
"application",
"dubbed",
"as",
"\"",
"Golden",
"Cup",
"''",
",",
"launched",
"just",
"before",
"the",
"start",
"of",
"World",
"Cup",
"2018",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.OnGamesGBTOFAB.Trojan",
"Trojan-Dropper.Win32.Dapato!O",
"Trojan/Vilsel.bftr",
"Trojan-Dropper.Win32.Dapato.bzqh",
"Trojan.Win32.Vilsel.dktcmg",
"Trojan.Vilsel.Win32.24133",
"Trojan-PWS.Win32.QQPass",
"TrojanDropper.Dapato.jop",
"Trojan/Win32.Vilsel",
"Win32.Troj.Vilsel.kcloud",
"Trojan-Dropper.Win32.Dapato.bzqh",
"Trojan.Vilsel"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"first",
"timer",
"will",
"be",
"fired",
"on",
"the",
"configured",
"interval",
"(",
"20",
"seconds",
"in",
"this",
"case",
")",
",",
"pinging",
"the",
"command",
"and",
"control",
"(",
"C2",
")",
"server",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Our",
"intelligence",
"shows",
"β",
"Agent",
"Smith",
"β",
"droppers",
"proliferate",
"through",
"third-party",
"app",
"store",
"β",
"9Apps",
"β",
",",
"a",
"UC",
"team",
"backed",
"store",
",",
"targeted",
"mostly",
"at",
"Indian",
"(",
"Hindi",
")",
",",
"Arabic",
",",
"and",
"Indonesian",
"users",
"."
] | [
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"For",
"now",
",",
"that",
"is",
"the",
"only",
"way",
"how",
"cybercriminals",
"can",
"profit",
"from",
"Triada",
",",
"but",
"don",
"β",
"t",
"forget",
"that",
"it",
"β",
"s",
"a",
"modular",
"Trojan",
",",
"so",
"it",
"can",
"be",
"turned",
"into",
"literally",
"everything",
"on",
"one",
"command",
"from",
"the",
"C",
"&",
"C",
"server",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Most",
"users",
"are",
"pushing",
"a",
"variety",
"of",
"information",
"stealers",
"with",
"the",
"service."
] | [
16,
16,
16,
16,
16,
16,
16,
6,
14,
16,
16,
5
] |
[
"Rooting",
"and",
"Ad",
"Network",
"Presentation",
"The",
"reflection",
"loaded",
"methods",
"check",
"if",
"the",
"device",
"is",
"rooted",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"command",
"is",
"used",
"to",
"connect",
"the",
"victim",
"to",
"a",
"Wi-Fi",
"network",
"controlled",
"by",
"the",
"cybercriminals",
"to",
"perform",
"traffic",
"sniffing",
"and",
"man-in-the-middle",
"(",
"MitM",
")",
"attacks",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |