tokens
sequencelengths
2
296
ner_tags
sequencelengths
2
296
[ "This", "data", "shows", "a", "distinct", "concentration", "of", "infected", "devices", "beaconing", "from", "Gaza", ",", "Palestine", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "First,", "users", "cannot", "easily", "spot", "any", "malicious", "behavior", "since", "PowerShell", "runs", "in", "the", "background." ]
[ 16, 16, 7, 15, 15, 15, 15, 15, 16, 7, 15, 15, 15, 15 ]
[ "We", "found", "no", "similarities", "to", "commercial", "spyware", "products", "or", "to", "other", "known", "spyware", "variants", ",", "which", "suggests", "BusyGasper", "is", "self-developed", "and", "used", "by", "a", "single", "threat", "actor", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "root9B's", "analysis", "determined", "that", "the", "adversary", "is", "using", "advanced", "memory-resident", "techniques", "to", "maintain", "persistence", "and", "avoid", "detection." ]
[ 3, 16, 16, 16, 16, 6, 16, 16, 1, 9, 9, 16, 16, 16, 16, 16, 16 ]
[ "The", "malware", "has", "a", "remote", "controlling", "function,", "and", "attackers", "sending", "these", "emails", "seem", "to", "attempt", "intruding", "into", "the", "targets'", "network", "using", "the", "malware." ]
[ 16, 3, 16, 16, 1, 9, 9, 16, 6, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 3 ]
[ "Usually", "they", "would", "upload", "a", "clean", "version", "back", "on", "Google", "Play", "the", "very", "same", "day", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Virus.Win32.Sality!O", "Ransom.Exxroute.A3", "Trojan.Kryptik.Win32.1099877", "Troj.Downloader.W32.Banload.l42y", "Ransom_CERBER.SM3B", "Win32.Trojan.Kryptik.bjm", "W32/Trojan.FUEH-0857", "Backdoor.Trojan", "Ransom_CERBER.SM3B", "Trojan.Encoder.10103", "BehavesLike.Win32.Cutwail.ph", "Trojan.Spora.mw", "TR/AD.Spora.svton", "Trojan[Ransom]/Win32.Spora", "Trojan.Symmi.DB88E", "Ransom:Win32/Spora.A", "Hoax.Spora", "Virus.Win32.VBInject" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "BKDR_PIRPI.YE", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Backdoor.Trojan", "BKDR_PIRPI.YE", "Trojan.Heur.LP.E69C7F", "Trojan:Win32/Pirpi.O", "Win32.Backdoor.Backdoor.Hwmn", "Win32/Trojan.9b5" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "SMS", "message", "with", "a", "link", "to", "a", "banker", "looked", "as", "follows", ":", "β€œ", "%", "USERNAME", "%", ",", "i", "send", "you", "prepayment", "gumtree", "[", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 9 ]
[ "Called", "β€œ", "DEFENSOR", "ID", "”", ",", "the", "banking", "trojan", "was", "available", "on", "Google", "Play", "at", "the", "time", "of", "the", "analysis", "." ]
[ 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "TSPY_MAJIKPOS.SMA", "Trojan.Majikpos", "TSPY_MAJIKPOS.SMA", "Trojan.DownLoader23.50404", "W32/Trojan.QKOU-4044", "Trojan.MSIL.Krypt.2", "TrojanSpy:MSIL/Majikpos.A", "Spyware/Win32.Majikpos.C1861368", "Trj/GdSda.A", "PUA.BrowseSmart", "Win32/Trojan.d60" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "DragonOK", "group", "has", "been", "actively", "launching", "attacks", "for", "years." ]
[ 4, 12, 12, 16, 16, 16, 16, 1, 16, 0 ]
[ "non-Google", "Play", ")", "app", "stores", "which", "often", "have", "fewer", "security", "and", "vetting", "procedures", "for", "the", "apps", "they", "host", "." ]
[ 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "infrastructure", "has", "several", "layers", ",", "although", "not", "being", "very", "dynamic", ",", "still", "has", "several", "layers", "each", "one", "providing", "some", "level", "of", "protection", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.OnGameMITL.Trojan", "RDN/Downloader.a!vq", "Win32.Trojan.WisdomEyes.16070401.9500.9883", "Trojan.FakeAV", "Trojan.DownLoad.41552", "BehavesLike.Win32.Backdoor.ch", "Trojan.Win32.Redosdru", "Trojan/PSW.WOW.amc", "TrojanDownloader:Win32/Induiba.A", "Trojan.Heur.RP.EEBC2E", "Trj/CI.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "By", "analyzing", "the", "TaskManager", "class", "we", "can", "see", "the", "new", "commands", "that", "are", "supported", "at", "this", "stage", ":", "As", "can", "be", "seen", "in", "the", "code", "snippet", "above", ",", "there", "are", "quite", "a", "lot", "of", "data", "collection", "tasks", "that", "are", "now", "available", ":", "Collect", "device", "info", "Track", "location", "Upload", "contacts", "information", "Upload", "sent", "and", "received", "SMS", "messages", "Upload", "images", "Upload", "video", "files", "Send", "recursive", "dirlist", "of", "the", "external", "storage", "Upload", "specific", "files", "Record", "audio", "using", "the", "microphone", "Record", "calls", "Use", "the", "camera", "to", "capture", "bursts", "of", "snapshots", "Those", "tasks", "can", "either", "run", "periodically", ",", "on", "event", "(", "such", "as", "incoming", "call", ")", "or", "when", "getting", "a", "command", "from", "the", "C", "&", "C", "server", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Win32.Kargatroj!O", "Trojan.Kargatroj.Win32.5", "BKDR_DEPPEELS.A", "Win32.Trojan.WisdomEyes.16070401.9500.9993", "W32/Trojan.FYPB-4329", "Backdoor.Kargatroj", "BKDR_DEPPEELS.A", "Win.Trojan.Kargatroj-5", "Trojan.Win32.Kargatroj.a", "Trojan.Win32.Kargatroj.zribt", "Trojan.Win32.A.Kargatroj.288256", "Trojan.Click2.18984", "BehavesLike.Win32.Virus.dh", "Backdoor.Win32.IRCBot", "Trojan/Kargatroj.e", "WORM/Autorun.Agr.3", "Trojan/Win32.Kargatroj", "Backdoor:Win32/Deppeels.A", "Trojan.Win32.Kargatroj.a", "Trojan/Win32.Kargatroj.R50492", "Trojan.Kargatroj", "Trojan.Kargatroj!+VQ4l8zO8kI" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "We", "refer", "to", "this", "utility", "as", "BOOTRASH." ]
[ 16, 16, 16, 16, 16, 16, 3 ]
[ "Security", "analysts", "are", "typically", "equipped", "with", "the", "tools", "to", "defeat", "a", "good", "number", "of", "similar", "tricks", "during", "malware", "investigations", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.W.Fujack.lmEa", "Trojan.Dropper", "Win.Trojan.Packed-24", "Trojan.Win32.Baidu.iidnc", "Trojan.Win32.A.PSW-Magania.1913020.A", "Trojan/Win32.Zegost", "Trojan.Zusy.D88F", "TrojanDropper:Win32/Demekaf.A", "Trojan.MalPack.NSPack", "Win32/TrojanDropper.Demekaf.A", "Trojan.Win32.Jorik", "W32/Obfuscated.AAAD!tr", "Win32/Trojan.4b9" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "Check", "Point", "researchers", "have", "dubbed", "the", "malware", "family", "\"", "HummingBad", ",", "''", "but", "researchers", "from", "mobile", "security", "company", "Lookout", "say", "HummingBad", "is", "in", "fact", "Shedun", ",", "a", "family", "of", "auto-rooting", "malware", "that", "came", "to", "light", "last", "November", "and", "had", "already", "infected", "a", "large", "number", "of", "devices", "." ]
[ 16, 4, 12, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16, 3, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "We", "believe", "that", "it", "is", "the", "largest", "Google", "account", "breach", "to", "date", ",", "and", "we", "are", "working", "with", "Google", "to", "continue", "the", "investigation", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16, 16, 16, 16, 16 ]
[ "In", "most", "so-called", "Western", "versions", "of", "the", "Trojan", ",", "the", "package", "names", "in", "the", "default", "configuration", "file", "are", "erased", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan-Dropper/W32.Hirhir.2779437", "TrojanDropper.Hirhir.20", "Trojan/Dropper.Hirhir.20", "Trojan-Dropper.Win32.Hirhir.20", "Win32/TrojanDropper.Hirhir.20", "W32/Hirhir.A", "Trojan.Dropper", "W32/Smalldrp.BTL", "Win32.Dropper.Hirhir", "Trojan.Dropper-1156", "Trojan-Dropper.Win32.Hirhir.20", "Trojan.Dropper.Hirhir.2.0", "TrojWare.Win32.TrojanDropper.Hirhir.20", "Trojan.Dropper.Hirhir.2.0", "Trojan.MulDrop.1734", "TR/Drop.Hirhir.20.5", "TROJ_HIRHIR.20", "Trojan.Drop.Hirhir.20.5", "Win32/DigitalM.10", "W32/Hirhir.A", "TrojanDropper.Dmexeb.10", "Trojan-Dropper.Win32.Hirhir.20!IK", "TrojanDropper:Win32/Hirhir.2_0", "Trojan.Win32.Hirhir.2164429", "Trojan.Dropper.Hirhir.2.0", "Dropper/Hirhir.11776", "Win32.TrojanDropper.Hirhir.20", "Trojan.DR.Hirhir.H", "Trojan.Dmexeb.10", "Trojan-Dropper.Win32.Hirhir.20", "W32/Hirhir.A!tr.dr", "Dropper.Hirhir", "Trj/Hirhir.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "delivery", ":", "to", "deliver", "specified", "text", "to", "all", "victim", "’", "s", "contacts", "(", "SMS", "worming", ")", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Configuration", "file", "received", "from", "the", "C", "&", "C", "server", "As", "for", "stealth", "and", "resilience", ",", "the", "attacker", "uses", "a", "number", "of", "tricks", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Figure", "6", "." ]
[ 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.FamVT.ExpiroPC.PE", "TROJ_ZYX_BK083A77.TOMC", "Heur.Corrupt.PE", "TROJ_ZYX_BK083A77.TOMC", "Trojan-Downloader.Win32.Vorloma", "TrojanDownloader:Win32/Vorloma.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1 ]
[ "This", "very", "first", "step", "fails", "in", "Android", "7.0", "and", "higher", ",", "even", "with", "a", "root", "permission", "." ]
[ 16, 16, 16, 16, 16, 16, 5, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "PE:Trojan.Win32.Xcomp.a!1075128424", "Heur.Packed.MultiPacked", "DDoS.Rincux", "Backdoor.Httpbot.Win32.799", "BehavesLike.Win32.Trojan.cz", "Backdoor:Win32/Luder.H", "Trojan/Win32.Injector", "Virus.Win32.Heur.c", "Trj/CI.A", "Packed.Win32.PolyCrypt", "Trojan.Win32.Downloader.aC" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "specific", "points", "of", "connection", "between", "these", "new", "samples", "and", "Operation", "Blockbuster", "include:", "payloads", "delivered", "by", "the", "macros", "discussed", "in", "Operation", "Blockbuster", "Sequel" ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 6, 14, 16, 3, 16, 16, 16, 3, 16, 16, 6, 14, 14 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.ADH.2", "Win.Trojan.Mediyes-1761", "Trojan.Hosts.5806", "Trojan.VBCRTD.Win32.7945", "Trojan:Win32/Mediyes.C", "Trojan.Pirminay", "Trojan.Win32.Mediyes" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.Aimaster.A", "Backdoor/W32.Aimaster.49152", "Backdoor.Aimmaster", "Backdoor.RAT.Aimaster", "Backdoor.Trojan", "Win32/Aimaster.A", "BKDR_AIMASTER.A", "Win.Trojan.Aimaster-4", "Backdoor.Win32.Aimaster", "Backdoor.Aimaster.A", "Trojan.Win32.Aimaster-Bd.fdhc", "Win32.Backdoor.Aimaster.Ahyt", "Backdoor.Aimaster.A", "Backdoor.Win32.Aimaster.A", "Backdoor.Aimaster.A", "BackDoor.Master.10", "BackDoor-XT.svr", "W32/Risk.FHHV-3782", "BDS/Aimaster.B", "W32/Aimaste.A!tr.bdr", "Trojan[Backdoor]/Win32.Aimaster", "Backdoor.Aimaster.A", "Backdoor.W32.Aimaster!c", "Backdoor.Win32.Aimaster", "Trojan/Win32.Aimaster.C662411", "BackDoor-XT.svr", "Backdoor.Aimaster", "Backdoor.Aimaster!2o1TvHIl4Fg", "Backdoor.Aimaster.A", "Win32/Backdoor.IM.d95" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "data", "available", "in", "the", "leaked", "Hacking", "Team", "files", "provides", "circumstantial", "evidence", "pointing", "to", "an", "interest", "in", "compromising", "individuals", "with", "ties", "to", "South", "Korea", "i.e.,", "Korean", "language", "speakers", "who", "use", "software", "or", "apps", "popular", "in", "South", "Korea,", "or", "South", "Korean", "editions", "of", "Samsung", "phones." ]
[ 16, 16, 16, 16, 16, 16, 4, 12, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 16, 16, 16, 2, 10, 16, 16, 16, 16, 16, 16, 5, 16, 5, 16, 16, 2, 10, 16, 2, 10, 16, 16, 5, 13 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor/W32.Amitis.827392", "Backdoor.Amitis!GgBFlh0m/G4", "W32/Amitis.MXVV-8538", "Backdoor.Amitis", "Win32/Amitis.13", "BKDR_AMITIS.B", "Trojan.Amitis.13-B", "Backdoor.Win32.Amitis.13", "Trojan.Win32.Amitis.dbhy", "Backdoor.Win32.S.Amitis.827392.A[h]", "Backdoor.W32.Amitis.13!c", "Backdoor.Win32.Amitis.13", "BackDoor.Amitist.13", "Backdoor.Amitis.Win32.17", "BKDR_AMITIS.B", "BehavesLike.Win32.Downloader.ch", "W32/Amitis.N@bd", "Backdoor/Amitis.p", "W32/Amitis.C!tr", "Trojan[Backdoor]/Win32.Amitis", "Win-Trojan/Amitis.827392", "Backdoor:Win32/Amitis.1_3", "Win32/Amitis.13", "Backdoor.Amitis", "Win32.Backdoor.Amitis.Akfc", "Backdoor.Win32.Amitis", "BackDoor.Amitis.G", "Backdoor.Win32.Amitis.13" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "HackTool.Patcher", "Backdoor.RBot.Win32.54805", "Troj.GameThief.W32.Magania.lHhM", "Multi.Threats.InArchive", "W32.Pilleuz", "Win.Worm.Mytob-399", "Trojan.Win32.Rbot.bhwabq", "Heur.Packed.Unknown", "Win32.HLLW.MyBot.based", "Trojan[Backdoor]/Win32.Rbot", "Trojan/Win32.Malco.R7515", "Trj/CI.A", "Win32.Viking.BJ", "Backdoor.Win32.Rbot" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Win32.Mlw.ewdlbx", "TR/Dropper.lusig", "Trojan.Win32.Eightow", "Trj/CI.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1 ]
[ "Though", "Orcus", "has", "all", "the", "typical", "features", "of", "RAT", "malware,", "it", "allows", "users", "to", "build", "custom", "plugins", "and", "also", "has", "a", "modular", "architecture", "for", "better", "management", "and", "scalability." ]
[ 16, 3, 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Worm.SdDrop.C", "Worm.Sddrop", "W32/Sddrop.worm.c!p2p", "Win32.Worm.SdDrop.C", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "W32.Kwbot.Worm", "Unix.Tool.IRC-1", "Win32.Worm.SdDrop.C", "P2P-Worm.Win32.SdDrop.c", "Win32.Worm.SdDrop.C", "Trojan.Win32.SdDrop.entp", "W32.W.SdDrop.c!c", "Win32.Worm.SdDrop.C", "Win32.Worm.SdDrop.C", "Win32.SdDrop.3", "Worm.SdDrop.Win32.21", "W32/Sddrop.worm.c!p2p", "Backdoor.Win32.SdBot", "I-Worm/P2P.SdDrop.c", "BDS/Sdbot.AA", "Worm[P2P]/Win32.SdDrop", "Worm:Win32/Sddrop.C", "P2P-Worm.Win32.SdDrop.c", "Trojan/Win32.HDC.C38855", "Win32.Worm.SdDrop.C", "Backdoor.Sdbot", "Trj/CI.A", "Worm.SdDrop", "Win32/Sddrop.C", "Win32.Worm-p2p.Sddrop.Lknd", "Worm.P2P.SdDrop!LrfriCz8zKY", "W32/KWBot.E!worm" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Recently,", "the", "FortiGuard", "Labs", "research", "team", "observed", "that", "a", "new", "variant", "of", "Poison", "Ivy", "was", "being", "spread", "through", "a", "compromised", "PowerPoint", "file." ]
[ 16, 16, 4, 12, 12, 12, 16, 16, 16, 3, 11, 11, 11, 11, 16, 16, 16, 16, 16, 1, 9, 9 ]
[ "Many", "victims", "have", "discussed", "YiSpecter", "infections", "of", "their", "jailbroken", "and", "non-jailbroken", "iPhones", "in", "online", "forums", "and", "have", "reported", "the", "activity", "to", "Apple." ]
[ 16, 16, 16, 16, 3, 16, 16, 16, 5, 16, 5, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4 ]
[ "This", "particular", "case", "is", "not", "an", "exception", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "send", "funds", "via", "a", "wire", "transfer", ")", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "campaign", "operated", "out", "of", "handful", "of", "IPs,", "but", "we", "ended", "up", "finding", "in", "excess", "of", "80K", "malicious", "subdomains", "associated", "with", "more", "than", "500", "domains", "leveraging", "various", "registrant", "accounts." ]
[ 16, 6, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 16, 16, 16, 16, 1, 9, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Udsdangerousobject.Multi", "TROJ_DLOADR.YLP", "TROJ_DLOADR.YLP", "Trojan.Win32.Dwn.dcbaru", "Trojan.Win32.Z.Tapaoux.49152", "Trojan.DownLoader11.19325", "W32/Trojan.FALA-2329", "TR/Rogue.icdl", "Trojan.DownLoader!", "Trojan.Rogue" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.MSIL.Bladabindi.1", "Win32.Trojan.WisdomEyes.16070401.9500.9922", "Trojan.Win32.Bladabindi.etjjte", "Trojan.Win32.Z.Clicker.90624", "Trojan.Win32.Clicker!BT", "BehavesLike.Win32.PWSZbot.mm", "Trojan.Win32.Clicker!BT", "Trj/Chgt.O", "Win32.Outbreak" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "most", "popular", "member", "of", "the", "Android/AdDisplay.Ashas", "family", "on", "Google", "Play", "was", "β€œ", "Video", "downloader", "master", "”", "with", "over", "five", "million", "downloads", "Ashas", "functionality", "All", "the", "apps", "provide", "the", "functionality", "they", "promise", ",", "besides", "working", "as", "adware", "." ]
[ 16, 16, 16, 16, 16, 16, 3, 11, 16, 5, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "If", "any", "application", "from", "that", "list", "was", "found", ",", "it", "utilizes", "the", "Janus", "vulnerability", "to", "inject", "the", "β€œ", "boot", "”", "module", "into", "the", "repacked", "application", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 7, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "file", "size", "of", "the", "malware", "is", "mostly", "around", "~50Kb,", "as", "you", "can", "see", "from", "the", "list", "of", "sample", "hashes", "at", "the", "end", "of", "this", "report." ]
[ 16, 1, 9, 16, 16, 3, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 3, 1, 16, 16, 16, 16, 16, 16 ]
[ "C2", "Communication", "The", "C2", "communication", "includes", "two", "parts", ":", "sending", "information", "to", "the", "remote", "HTTP", "server", "and", "parsing", "the", "server", "’", "s", "response", "to", "execute", "any", "commands", "as", "instructed", "by", "the", "remote", "attackers", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "For", "this", "purpose", ",", "the", "app", "receives", "from", "the", "C", "&", "C", "server", "the", "isGoogleIp", "flag", ",", "which", "indicates", "whether", "the", "IP", "address", "of", "the", "affected", "device", "falls", "within", "the", "range", "of", "known", "IP", "addresses", "for", "Google", "servers", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.YahooPass.Spyware", "Backdoor.Win32.Bredavi!O", "Backdoor.Bredavi.Win32.215", "Backdoor.W32.Bredavi.kYWA", "Backdoor/Bredavi.le", "Win32.Trojan-PSW.Yahoo.a", "Backdoor.Trojan", "Win32/Bredolab.PS", "Win.Trojan.Bredolab-1635", "Trojan.Win32.Krap.ihir", "Backdoor.Win32.Bredavi.348960", "Application.Win32.Adware.Superjuan.~JAJ", "Trojan.BhoSpy.97", "Trojan.Win32.Glecia", "Backdoor/Bredavi.bf", "BDS/Glecia.A", "Trojan[Backdoor]/Win32.Bredavi", "Adware.Heur.E51E88", "Trojan/Win32.Bredavi.C83160", "Backdoor.Bredavi", "Trj/Sinowal.WNX", "Win32/PSW.YahooPass.NAD" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Email-Worm.Win32.Scano!O", "W32/Scano.bm", "WORM_SCANO.BT", "Win32.Worm.Scano.a", "W32.Areses.P@mm", "WORM_SCANO.BT", "Win.Worm.Scano-70", "Email-Worm.Win32.Scano.bm", "Trojan.Win32.LdPinch.fmye", "I-Worm.Win32.A.Scano.105231", "W32.W.Otwycal.l7h6", "Win32.HLLM.Perf", "Worm.Scano.Win32.69", "BehavesLike.Win32.Autorun.cm", "Email-Worm.Win32.Scano", "Worm/Scano.at", "W32.Worm.Areses", "Worm[Email]/Win32.Scano", "Email-Worm.Win32.Scano.bm", "Worm/Win32.Scano.R1851", "BScope.Trojan-Dropper.Injector", "Win32/Scano.BM", "I-Worm.Scano!zrLOU/XMrws", "W32/Scano.AA@mm" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Fsysna", "Win32.Trojan.WisdomEyes.16070401.9500.9969", "Trojan.Win32.Fsysna.eqvl", "Trojan.Win32.Z.Strictor.607232.C", "Trojan.MulDrop7.49159", "Trojan.Fsysna.Win32.15357", "Trojan.MSIL.Spy", "TrojanSpy:MSIL/Logadat.A", "Trojan.Win32.Fsysna.eqvl", "Trojan.Fsysna", "Trj/GdSda.A", "Win32.Trojan.Fsysna.Lqym" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "report", "includes", "extra", "detail", "to", "help", "potential", "targets", "recognize", "similar", "attacks." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "ThreatStream", "Labs", "recently", "became", "aware", "of", "a", "campaign", "beginning", "on", "30", "June", "2015", "by", "the", "omniprescent", "Wekby", "threat", "actors", "a/k/a", "TG-0416,", "APT-18,", "Dynamite", "Panda." ]
[ 4, 12, 16, 16, 16, 16, 16, 6, 16, 16, 0, 8, 8, 16, 16, 16, 6, 12, 14, 16, 6, 14, 14, 14 ]
[ "All", "of", "the", "other", "IP", "address", "we", "discovered", "sharing", "the", "same", "TLS", "certificate", "behave", "in", "the", "same", "way", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Adding", "this", "extra", "layer", "of", "filtering", "may", "help", "the", "group", "focus", "on", "targets", "of", "interest", "and", "evade", "detection", "due", "to", "use", "of", "known", "malware." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 6, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3 ]
[ "A", "backdoor", "also", "known", "as:", "W97M.Downloader", "TROJ_CVE201711882.E", "Exploit.Xml.CVE-2017-0199.equmby", "Xml.Exploit.Cve!c", "TROJ_CVE201711882.E", "Malicious_Behavior.SB", "DOC.S.Exploit.11442", "XML/Dloader.S1", "Exploit.CVE-2017-0199", "XML.Exploit.CVE-2017-0199.E" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Our", "malware", "analysts", "Nikita", "Buchka", "and", "Mikhail", "Kuzin", "can", "easily", "name", "11", "families", "of", "such", "Trojans", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "It", "was", "a", "standalone", "utility", "with", "the", "name", "HDD", "Rootkit", "for", "planting", "a", "bootkit", "on", "a", "computer." ]
[ 16, 16, 16, 5, 13, 16, 16, 1, 9, 9, 11, 16, 16, 3, 16, 16, 5 ]
[ "A", "backdoor", "also", "known", "as:", "Win32/Goft.B", "Trojan.Win32.cvrsqp.eaqdwq", "Trojan.MyRunner", "BehavesLike.Win32.PWSZbot.nc", "Virus.Win32.AA", "Trojan/PSW.QQPass.fx", "Trojan/Win32.QQTail.R5474" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1 ]
[ "It", "provides", "the", "same", "functionality", "you", "would", "expect", "from", "a", "remote", "access", "tool:", "keylogging,", "webcam", "access,", "microphone", "access,", "remote", "desktop,", "URL", "download,", "program", "execution,", "etc." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Attacks", "that", "use", "completely", "fileless", "malware", "are", "a", "rare", "occurrence,", "so", "we", "thought", "it", "important", "to", "discuss", "a", "new", "trojan", "known", "as", "JS_POWMET", "Detected", "by", "Trend", "Micro", "as", "JS_POWMET.DE,", "which", "arrives", "via", "an", "autostart", "registry", "procedure." ]
[ 16, 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 3, 16, 16, 4, 12, 16, 1, 16, 16, 16, 1, 9, 9, 9 ]
[ "As", "you", "can", "see", "in", "the", "sample", "list", "below,", "this", "means", "that", "many", "school", "employees", "will", "have", "received", "this", "spam,", "as", "K-12", "schools", "very", "commonly", "use", ".us", "domain", "names." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 15, 16, 4, 12, 16, 16, 16, 16, 3, 16, 1, 9, 16, 16, 1, 9, 9, 9 ]
[ "A", "backdoor", "also", "known", "as:", "W32.Vetor.PE", "Virus.Win32.Virut.1!O", "W32.Virut.G", "PE_VIRUX.R", "W32/Virut.AM", "Win32/Virut.17408", "Trojan.Scar", "PE_VIRUX.R", "Win.Trojan.Virtob-1456", "Win32.Virus.Virut.U", "Virus.Win32.Virut.ce", "Virus.Win32.Virut.hpeg", "Virus.Win32.Virut.CE", "Win32.Virut.56", "Virus.Virut.Win32.1938", "BehavesLike.Win32.Virut.qh", "W32/Virut.AM", "Virus/Win32.Virut.ce", "Win32.Virut.dd.368640", "W32.Virut.lqR9", "Virus.Win32.Virut.ce", "Trojan:Win32/QHosts.BR", "Win32/Virut.F", "Virus.Virut.14", "W32/Sality.AO", "Win32/Virut.NBP", "Trojan.Win32.Downloader.toh", "Trojan.Win32.Scar", "Virus.Win32.VirutChangeEntry.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Change", "server", "request", "The", "URL", "'s", "for", "the", "new", "server", "is", "obfuscated", ",", "preventing", "easy", "network", "identification", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "This", "organization", "was", "formerly", "known", "as", "the", "East", "Turkestan", "Islamic", "Party", "and", "is", "purported", "to", "be", "an", "Islamic", "extremist", "separatist", "organization", "founded", "by", "Uyghur", "jihadists", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 4, 12, 12, 12, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "All", "of", "these", "attacks", "leveraged", "CVE-2014-4114", "and", "were", "delivered", "via", "malicious", "Microsoft", "PowerPoint", "Slideshow", "files", "*.pps." ]
[ 16, 16, 16, 1, 16, 1, 16, 16, 16, 16, 16, 5, 13, 13, 13, 1 ]
[ "Brambul", "and", "Joanap", "appear", "to", "be", "used", "to", "download", "extra", "payloads", "and", "carry", "out", "reconnaissance", "on", "infected", "computers." ]
[ 3, 16, 3, 16, 16, 16, 16, 16, 1, 9, 9, 16, 16, 16, 16, 16, 5, 13 ]
[ "]", "com", "was", "a", "C2", "for", "Poison", "Ivy", "samples", "associated", "with", "attacks", "on", "Myanmar", "and", "other", "Asian", "countries", "discussed", "in", "a", "blog", "published", "by", "Arbor", "Networks", "in", "April", "2016", "." ]
[ 9, 9, 16, 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 12, 16, 16, 16, 16 ]
[ "Then", "the", "app", "finds", "a", "process", "id", "value", "for", "the", "process", "it", "wants", "to", "inject", "with", "code", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "]", "com", "hxxp", ":", "//mailsa-qaw", "[", "." ]
[ 9, 9, 1, 9, 9, 9, 9 ]
[ "A", "backdoor", "also", "known", "as:", "Packed.Win32.Tibs!O", "Worm.Zhelatin", "Trojan.Heur.RP.fqWcaaXp5um", "Win32.Trojan.WisdomEyes.16070401.9500.9882", "W32/Trojan.LQOD-4441", "Trojan.Dropper", "Email-Worm.Win32.Zhelatin.rn", "Trojan.Win32.Z.Zhelatin.88576", "MalCrypt.Indus!", "Trojan.Spambot.2559", "Email.Worm.W32!c", "Email-Worm.Win32.Zhelatin.rn", "Worm/Win32.Zhelatin.R38109", "BScope.Trojan.Zhelatin.12", "Trj/CI.A", "Win32/Nuwar.BH", "Win32.Worm-email.Zhelatin.Sxxs", "Worm.Win32.Nuwar", "Win32/Worm.Email-Worm.43d" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "]", "top/", "Oct", "17", ",", "2017", "hxxp", ":", "//online.bankaustria.at.id58717", "[", "." ]
[ 9, 9, 16, 16, 16, 16, 1, 9, 9, 9, 9 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.Rustock.NDU", "Backdoor.Win32.Rbot!O", "Backdoor.Rustock.NDU", "Backdoor.Rbot", "Win32.Trojan.WisdomEyes.16070401.9500.9989", "W32/Trojan.TDBQ-4167", "Backdoor.Rustock.B", "Win.Trojan.Crypt-278", "Backdoor.Rustock.NDU", "Backdoor.Win32.Rbot.szn", "Backdoor.Rustock.NDU", "Backdoor.Win32.A.Rbot.70656.J", "Backdoor.Rustock.NDU", "Backdoor.Rustock.NDU", "Trojan.Fakealert.33205", "BehavesLike.Win32.Downloader.kt", "Rootkit.KernelBot.m", "TR/Tiny.705", "Backdoor.Rustock.NDU", "Backdoor.Win32.Rbot.szn", "Trojan:Win32/Silentbanker.B", "Worm/Win32.IRCBot.C36854", "Backdoor.Rbot", "Trj/CI.A", "Win32.Backdoor.Rbot.Aiik", "Virus.Win32.Virut.n", "W32/RBot.SZN!tr.bdr", "Win32/Backdoor.0a5" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "During", "a", "recent", "United", "States", "Secret", "Service", "investigation,", "Trustwave", "encountered", "a", "new", "family", "of", "POS", "malware,", "that", "we", "named", "Punkey." ]
[ 16, 16, 16, 4, 12, 12, 12, 16, 4, 16, 16, 16, 16, 16, 3, 11, 16, 16, 16, 3 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/W32.FakeAV.29696.H", "Backdoor.Ziyazo", "Trojan.Graftor.D21706", "TROJ_FAKEAV.ORH", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Backdoor.Trojan.B", "TROJ_FAKEAV.ORH", "Win.Trojan.Ziyazo-1", "Trojan.Win32.FakeAv.cuscpt", "Troj.W32.FakeAv.rxda!c", "Trojan.Fakealert.45728", "Trojan.FakeAV.Win32.293288", "BehavesLike.Win32.Backdoor.mc", "W32/Trojan.TSSV-1630", "Trojan/Fakeav.blva", "Trojan/Win32.FakeAv", "Backdoor:Win32/Ziyazo.A", "Trojan/Win32.FakeAV.R94861", "Trj/Dynamer.A", "Trojan.FakeAv!73pMuD6/3rE", "Trojan.Win32.FakeAV", "W32/FakeAv.RXDA!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Subsequent", "to", "the", "publishing", "of", "this", "article,", "through", "cooperation", "with", "the", "parties", "responsible", "for", "the", "C2", "domains,", "Unit", "42", "researchers", "successfully", "gained", "control", "of", "multiple", "C2", "domains." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 11, 16, 1, 9, 4, 12, 12, 16, 16, 1, 9, 9, 9, 9 ]
[ "This", "library", "is", "used", "because", "it", "uses", "the", "only", "(", "publicly", "known", ")", "way", "to", "retrieve", "this", "information", "on", "Android", "6", "(", "using", "the", "process", "OOM", "score", "read", "from", "the", "/proc", "directory", ")", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Hacktool.Superscan", "Trojan.Win32.XFMP5368.dfvidz", "HackTool:Win32/SuperScan.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1 ]
[ "Lurk", "was", "believed", "to", "have", "siphoned", "over", "$45", "million", "from", "financial", "organizations,", "ultimately", "disrupting", "the", "victims'", "operations,", "reputation,", "and", "bottom", "line." ]
[ 6, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 12, 16, 16, 16, 16, 4, 16, 16, 16, 16 ]
[ "While", "Empire", "RIG-E", "disappeared", "at", "the", "end", "of", "December", "after", "4", "months", "of", "activity", "on", "2017-02-17", "an", "advert", "for", "a", "new", "exploit", "kit", "dubbed", "Nebula", "appeared", "underground." ]
[ 16, 3, 11, 16, 3, 16, 16, 16, 0, 16, 0, 8, 16, 16, 16, 0, 16, 16, 16, 3, 11, 11, 11, 16, 3, 16, 16 ]
[ "A", "powerful", "threat", "actor", "known", "as", "Wild", "Neutron", "also", "known", "as", "Jripbot", "and", "Morpho", "has", "been", "active", "since", "at", "least", "2011,", "infecting", "high", "profile", "companies", "for", "several", "years", "by", "using", "a", "combination", "of", "exploits,", "watering", "holes", "and", "multi-platform", "malware." ]
[ 16, 6, 14, 14, 16, 16, 6, 14, 16, 16, 16, 6, 16, 6, 16, 16, 16, 16, 16, 16, 0, 16, 4, 12, 12, 16, 0, 8, 16, 16, 16, 16, 16, 3, 11, 11, 16, 3, 11 ]
[ "Extract", "the", "calls", "log", "." ]
[ 16, 16, 16, 16, 16 ]
[ "Figure", "4", "." ]
[ 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Application.Hacktool.Pipecmd.B", "HackTool.Pipecmd", "Win32.HackTool.Pipecmd.a", "Application.Hacktool.Pipecmd.B", "Application.Hacktool.Pipecmd.B", "Application.Hacktool.Pipecmd.B", "Trojan.Starter.5008", "BehavesLike.Win32.PUP.lc", "Application.Hacktool.Pipecmd.B", "Trojan/Win32.Inject.C500093" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Once", "installed", ",", "the", "application", "requests", "permissions", "so", "that", "it", "may", "control", "SMS", "messages", "and", "steal", "sensitive", "data", "on", "the", "device", ",", "as", "well", "as", "proliferate", "to", "other", "devices", "in", "the", "target", "device", "’", "s", "contact", "list", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Following", "a", "three-month", "hiatus,", "Emotet", "spam", "activities", "resumed", "in", "March", "2023,", "when", "a", "botnet", "known", "as", "Epoch", "4", "began", "delivering", "malicious", "documents", "embedded", "in", "Zip", "files", "that", "were", "attached", "to", "the", "emails." ]
[ 16, 16, 0, 16, 3, 1, 9, 16, 16, 0, 8, 16, 16, 3, 16, 16, 3, 11, 16, 16, 1, 9, 9, 16, 1, 9, 16, 16, 16, 16, 1, 9 ]
[ "A", "backdoor", "also", "known", "as:", "Ransom.Sage.S1609000", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "W32/Trojan.TNMG-4793", "Ransom.Cry", "Trojan.Win32.Yakes.etrgag", "BehavesLike.Win32.Ramnit.fc", "TR/AD.MalwareCrypter.zdeue", "Trojan.Zusy.D3FCFB", "Trojan/Win32.Yakes.C2201035", "Trojan.Yakes", "Trojan.Yakes!KiOJwMzaTlA" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Bots", "can", "use", "various", "methods", "to", "establish", "a", "line", "of", "communication", "between", "themselves", "and", "their", "command-and-control", "C", "C", "server." ]
[ 3, 16, 16, 16, 16, 16, 16, 16, 1, 9, 9, 16, 16, 16, 16, 1, 9, 9, 9 ]
[ "Knowledge", "of", "the", "threat", "landscape", "and", "implementation", "of", "the", "right", "detection", "tools", "remains", "crucial", "to", "be", "able", "to", "protect", "yourself", "from", "fraud", ";", "Cerberus", "is", "yet", "a", "new", "Trojan", "active", "in", "the", "wild", "!", "Appendix", "Samples", "Some", "of", "the", "latest", "Cerberus", "samples", "found", "in", "the", "wild", ":", "App", "name", "Package", "name", "SHA", "256", "hash", "Flash", "Player", "com.uxlgtsvfdc.zipvwntdy", "728a6ea44aab94a2d0ebbccbf0c1b4a93fbd9efa8813c19a88d368d6a46b4f4f", "Flash", "Player", "com.ognbsfhszj.hqpquokjdp", "fe28aba6a942b6713d7142117afdf70f5e731c56eff8956ecdb40cdc28c7c329", "Flash", "Player", "com.mwmnfwt.arhkrgajn", "ffa5ac3460998e7b9856fc136ebcd112196c3abf24816ccab1fbae11eae4954c", "Flash", "Player", "com.wogdjywtwq.oiofvpzpxyo", "6ac7e7ed83b4b57cc4d28f14308d69d062d29a544bbde0856d5697b0fc50cde4", "Flash", "Player", "com.hvdnaiujzwo.fovzeukzywfr", "cfd77ddc5c1ebb8498c899a68ea75d2616c1c92a0e618113d7c9e5fcc650094b", "Flash", "Player", "com.gzhlubw.pmevdiexmn", "3f2ed928789c200e21fd0c2095619a346f75d84f76f1e54a8b3153385850ea63", "Target", "list", "The", "actual", "observed", "list", "of", "mobile", "apps", "targeted", "by", "Cerberus", "contains", "a", "total", "of", "30", "unique", "applications", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 1, 1, 5, 13, 1, 1, 5, 13, 1, 1, 5, 13, 1, 1, 5, 13, 1, 1, 5, 13, 1, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "CVE-2015-5122", "was", "the", "second", "Adobe", "Flash", "zero-day", "revealed", "in", "the", "leak", "of", "HackingTeam's", "internal", "data." ]
[ 1, 16, 16, 16, 5, 13, 7, 16, 16, 16, 16, 16, 4, 16, 16 ]
[ "At", "the", "peak", "of", "procrastinators", "filing", "their", "taxes", "at", "the", "last", "minute,", "those", "who", "send", "in", "their", "tax", "forms", "are", "exactly", "the", "technically", "less-sophisticated", "users", "these", "kinds", "of", "campaigns", "target." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "same", "happens", "with", "the", "package", "squareup.otto", ",", "which", "is", "an", "open-source", "bus", "implementation", "focused", "on", "Android", "implementation", "." ]
[ 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Worm/W32.Vesenlosow.1237156", "Worm.Vesenlosow", "Worm.VB.Win32.13725", "W32.W.Vesenlosow.luZW", "Trojan/VB.nzt", "WORM_VESENLO.SMA", "Win32.Worm.VB.m", "W32.Winiga", "WORM_VESENLO.SMA", "Trojan.Win32.Vesenlosow.bclidy", "Worm.Win32.A.Vesenlosow.909312", "Trojan.MulDrop3.6950", "BehavesLike.Win32.Rontokbro.tm", "Trojan.Win32.VB", "Worm/Vesenlosow.q", "WORM/VB.argu", "Trojan/Win32.VB", "Worm:Win32/Vesenlosow.A", "Trojan/Win32.VB.R46099", "Trojan.Keylogger.1021", "W32/Vobfus.GEP.worm", "Win32.Virut.NBP", "Win32/VB.NZT", "Win32.Worm.Vb.Akzk", "Worm.Win32.Msmm.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "VB:Trojan.Valyria.1034", "VBS/Downldr.IA", "W97M.Dropper", "TROJ_RUBREG.SM", "VB:Trojan.Valyria.1034", "Trojan.Script.ExpKit.evbkht", "Troj.Downloader.Script!c", "VB:Trojan.Valyria.1034", "VB:Trojan.Valyria.1034", "VBS.DownLoader.1040", "TROJ_RUBREG.SM", "VBS/Downloader.ea", "VBS/Downldr.IA", "TrojanDownloader:VBS/Vibrio.P", "VB:Trojan.Valyria.D40A", "VBS/Downloader.ea", "virus.vbs.houdini.b" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Win32.Mydse!O", "TrojanDropper.Goriadu", "Win32.Trojan.WisdomEyes.16070401.9500.9578", "TROJ_GORIADU.SMX", "Trojan.Win32.Mydse.az", "Trojan.Win32.Click.tdtvg", "TROJ_GORIADU.SMX", "BehavesLike.Win32.BadFile.fh", "Trojan-Clicker.ANTO", "TR/Clicker.9984610", "Win32.Troj.AntiCloudAV.d.kcloud", "TrojanDropper:Win32/Goriadu.A!bit", "Trojan.Zusy.D38CD", "Trojan.Win32.Mydse.az", "W32/GORIADU.SMX!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Who", "is", "affected", "?", "Gooligan", "potentially", "affects", "devices", "on", "Android", "4", "(", "Jelly", "Bean", ",", "KitKat", ")", "and", "5", "(", "Lollipop", ")", ",", "which", "is", "over", "74", "%", "of", "in-market", "devices", "today", "." ]
[ 16, 16, 16, 16, 3, 16, 16, 16, 16, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Around", "2011", ",", "the", "infamous", "Zeus", "Trojan", "started", "using", "web", "injects", "that", "tricked", "users", "into", "downloading", "a", "mobile", "component", "called", "β€œ", "ZitMo", "”", "(", "Zeus", "in", "the", "Mobile", ")", "." ]
[ 16, 16, 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 3, 16, 16, 16, 16, 16 ]