tokens
sequencelengths
2
296
ner_tags
sequencelengths
2
296
[ "Figure", "1", "shows", "embedded", "URL", "in", "an", "Elirks", "sample", "found", "in", "early", "2016." ]
[ 16, 16, 16, 1, 9, 16, 16, 3, 16, 16, 16, 0, 8 ]
[ "This", "malware", "is", "well-known", "for", "its", "ability", "to", "steal", "credentials", "and", "quickly", "spread", "through", "an", "enterprise", "over", "network", "shares." ]
[ 16, 3, 16, 16, 16, 16, 16, 16, 1, 9, 16, 16, 16, 16, 16, 4, 16, 5, 13 ]
[ "A", "backdoor", "also", "known", "as:", "W32.eHeur.Virus02", "Adware.Heur.E101B3", "Win32.Trojan.BHO.r", "Trojan.Win32.BHO.bropxr", "Adware.Softomate.603", "Trojan:Win32/Jifcapi.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Kromebit", "TROJ_KROMEBIT.SM", "Win32.Trojan.WisdomEyes.16070401.9500.9982", "TROJ_KROMEBIT.SM", "Trojan.Win32.Dwn.eurwpx", "Trojan.Win32.Z.Kromebit.1068032", "Trojan.DownLoader25.50889", "BehavesLike.Win32.Dropper.tt", "W32/Trojan.EJDN-0785", "Trojan:Win32/Kromebit.B", "Trj/CI.A", "Trojan.Win32.Kromebit", "W32/KROMEBIT.SM!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Today", "this", "malware", "shows", "unwanted", "ads", ",", "tomorrow", "it", "could", "steal", "sensitive", "information", ";", "from", "private", "messages", "to", "banking", "credentials", "and", "much", "more", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "report", "closes", "with", "some", "security", "suggestions,", "highlighting", "the", "importance", "of", "two-factor", "authentication." ]
[ 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 5, 13 ]
[ "The", "record", "contains", "a", "personal", "email", "address", ":", "WHOIS", "records", "of", "C2", "server", "exposing", "the", "attacker", "’", "s", "email", "address", "We", "were", "aware", "of", "the", "possibility", "that", "the", "attackers", "might", "be", "using", "a", "compromised", "email", "account", ",", "so", "we", "dug", "deeper", "to", "find", "more", "information", "related", "to", "this", "email", "address", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "This", "week", "the", "spam", "party", "did", "not", "just", "include", "CERBER,", "but", "also", "decided", "to", "invite", "an", "old", "friend", "–", "the", "KOVTER", "family." ]
[ 16, 16, 1, 9, 9, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 11 ]
[ "Tofsee,", "also", "known", "as", "Gheg,", "is", "another", "botnet", "analyzed", "by", "CERT", "Polska." ]
[ 3, 16, 16, 16, 3, 16, 16, 3, 16, 16, 4, 12 ]
[ "We", "assess", "with", "high", "confidence", "that", "this", "modified", "version", "is", "operated", "by", "the", "infamous", "Wolf", "Research", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 12, 16 ]
[ "It", "’", "s", "possible", ",", "as", "with", "other", "Android", "malware", ",", "that", "some", "apps", "may", "also", "be", "available", "on", "forums", ",", "file-sharing", "sites", "or", "even", "sent", "to", "victims", "as", "email", "attachments", ",", "and", "we", "were", "only", "able", "to", "determine", "the", "delivery", "mechanism", "for", "a", "handful", "of", "the", "apps", "we", "have", "been", "able", "to", "find", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/W32.Small.15616.H", "Trojan.Bibei.A6", "Bibei.a", "Win.Trojan.Rootkit-3954", "Trojan.Win32.NtRootKit.rigfr", "TrojWare.Win32.Olmarik.AWI", "Trojan.NtRootKit.12543", "Bibei.a", "TR/Offend.69286423", "Trojan.Zusy.D27F7", "Trojan:WinNT/Bibei.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "During", "the", "investigation", ",", "this", "app", "was", "able", "to", "successfully", "connect", "to", "the", "command", "and", "control", "server", ",", "but", "it", "received", "no", "commands", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Another", "trick", "in", "β€œ", "Agent", "Smith", "’", "s", "arsenal", "is", "to", "change", "the", "settings", "of", "the", "update", "timeout", ",", "making", "the", "original", "application", "wait", "endlessly", "for", "the", "update", "check", "." ]
[ 16, 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "service", "continues", "by", "loading", "an", "ELF", ",", "created", "by", "Baidu", ",", "which", "is", "capable", "of", "tracking", "the", "device", "location", "before", "setting", "up", "a", "monitor", "to", "harvest", "phone", "numbers", "associated", "with", "outgoing", "calls", "for", "those", "numbers", "with", "a", "country", "code", "β€œ", "+86", "”", "prefix", ",", "which", "relates", "to", "the", "People", "’", "s", "Republic", "of", "China", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/W32.Propas.110663", "Trojan.Heur.RP.EDD84E", "Win32.Trojan.WisdomEyes.16070401.9500.9997", "W32/Trojan.AQD", "TROJ_PASSPRO.C", "Win.Trojan.Enfal-62", "Trojan.PWS.Winlog", "TROJ_PASSPRO.C", "BehavesLike.Win32.Dropper.ch", "W32/Trojan.IWQS-9238", "Trojan:Win32/Propas.A", "Trojan:Win32/Propas.A", "Trojan.Propas!M9i4NRQV2R8", "W32/Propas.A!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "One", "of", "the", "samples", "(", "e19823a1ba4a0e40cf459f4a0489fc257720cc0d71ecfb7ad94b3ca86fbd85d1", ")", "uses", "the", "C2", "server", "svcws", "[", "." ]
[ 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 1, 9, 9 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.Syph.B", "Backdoor/W32.Syph.361984", "Backdoor.Syph", "Backdoor.W32.Syph.b!c", "Trojan/Syph.b", "Backdoor.Syph.B", "Backdoor.Trojan", "BKDR_SYPH.B", "Win.Trojan.Syph-2", "Backdoor.Syph.B", "Backdoor.Win32.Syph.b", "Backdoor.Syph.B", "Trojan.Win32.Syph.bfjuy", "Backdoor.Win32.Syph.361984", "Win32.Backdoor.Syph.cyqv", "Backdoor.Syph.B", "Backdoor.Win32.Syph.B", "BackDoor.Syph", "BKDR_SYPH.B", "W32/Risk.GBZV-6047", "Backdoor/Syph.b", "BDS/Syph.b.Srv", "Trojan[Backdoor]/Win32.Syph", "Backdoor:Win32/Syph.B", "Backdoor.Win32.Syph.b", "Backdoor.Syphillis", "Backdoor.Syph.b", "Bck/Syphillis.1.18", "Win32/Syph.B", "Backdoor.Syph!hEmUZuSaZVQ", "Win32/Backdoor.e16" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "From", "April", "19-24,", "2017,", "a", "politically-motivated,", "targeted", "campaign", "was", "carried", "out", "against", "numerous", "Israeli", "organizations." ]
[ 16, 0, 8, 8, 16, 6, 14, 14, 16, 16, 16, 16, 16, 4, 12 ]
[ "Although", "this", "technique", "has", "been", "used", "before", "by", "other", "malware", "campaigns,", "it", "is", "still", "not", "a", "common", "strategy." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "It", "also", "targets", "devices", "made", "by", "Chinese", "manufacturer", "Xiaomi", "and", "those", "running", "MIUI", ",", "an", "operating", "system", "based", "on", "Google", "Android", "made", "by", "Xiaomi", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 4, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 5, 13, 16, 16, 4, 16 ]
[ "We", "gathered", "information", "from", "affected", "devices", ",", "and", "concurrently", ",", "attempted", "to", "acquire", "Chrysaor", "apps", "to", "better", "understand", "its", "impact", "on", "users", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9692", "TR/Brysay.A", "PWS:Win32/Enesbot.A", "Trojan-Downloader.MSIL.Banload" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1 ]
[ "Some", "of", "the", "icons", "used", "can", "be", "seen", "below", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Yet", "I", "recently", "uncovered", "evidence", "that", "suggests", "it", "was", "the", "work", "of", "a", "well-known", "Chinese", "threat", "group." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 6, 14, 14 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9982", "Trojan.Win32.Farfli", "Backdoor:Win32/Dorbop.B!bit", "Trj/GdSda.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Win32.AD.eqoszf", "TR/AD.PSLoader.kykon", "Trojan.Razy.D1F16C", "Win32/Powerless.F", "Trojan.Powerless!", "W32/Powerless.F!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1 ]
[ "We", "have", "labelled", "this", "threat", "group", "the", "Gamaredon", "Group", "and", "our", "research", "shows", "that", "the", "Gamaredon", "Group", "has", "been", "active", "since", "at", "least", "2013." ]
[ 16, 16, 16, 16, 6, 14, 14, 14, 14, 16, 16, 16, 16, 16, 6, 14, 14, 16, 16, 16, 0, 8, 8, 8 ]
[ "]", "orgacount-manager", "[", "." ]
[ 16, 16, 16, 16 ]
[ "In", "our", "previous", "research,", "we", "detailed", "how", "an", "information", "stealer", "Trojan", "was", "deployed", "via", "a", "Word", "macro,", "in", "order", "to", "spy", "on", "its", "victims", "various", "parts", "of", "the", "Saudi", "Government." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 11, 16, 16, 16, 16, 3, 11, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 4, 12, 12 ]
[ "]", "175", "[", "." ]
[ 9, 9, 9, 9 ]
[ "A", "backdoor", "also", "known", "as:", "W32.FakeMsHelpCenter.Trojan", "Trojan.Graftor.D67ED", "Win32.Trojan.WisdomEyes.16070401.9500.9997", "TROJ_ALTHUMS_EI030112.UVPM", "Trojan.Win32.DownLoad2.rlsdn", "Trojan.Win32.A.Downloader.84626", "Trojan.DownLoad2.63614", "Trojan.Allthumbs.Win32.1", "TROJ_ALTHUMS_EI030112.UVPM", "BehavesLike.Win32.Worm.tz", "Trojan:Win32/Althums.A", "Trojan/Win32.Goz.R10705", "Trj/CI.A", "Trojan.Graftor!H+8m5ivUpKY", "Win32/Trojan.0be" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Such", "data", "includes", "contact", "and", "location", "information", ",", "phone", "and", "message", "activity", ",", "the", "ability", "to", "record", "from", "the", "microphone", ",", "camera", ",", "and", "other", "sensors", "as", "well", "as", "the", "capability", "to", "access", "data", "from", "many", "popular", "messaging", "and", "social", "media", "apps", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "BKDR_MATSNU.SM0", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "BKDR_MATSNU.SM0", "BehavesLike.Win32.Ransom.ch", "TR/Crypt.ZPACK.8577", "Trojan/Win32.Trapwot.R152769", "Trojan.FakeAV.01657" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "full", "list", "of", "targeted", "applications", "is", "included", "in", "the", "IOC", "section", "at", "the", "end", "of", "this", "post", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "This", "finding", "was", "listed", "in", "our", "Anthem", "blog,", "and", "we", "have", "continued", "to", "monitor", "it", "in", "ThreatConnect", "since", "mid", "February." ]
[ 16, 16, 16, 16, 16, 16, 4, 16, 16, 16, 16, 16, 16, 11, 16, 16, 5, 16, 0, 8 ]
[ "A", "backdoor", "also", "known", "as:", "W32.JapiletAA.Trojan", "Trojan.Dropper.Delf.BB", "Worm.Win32.Fesber!O", "Worm.Fesber", "Worm.Fesber.Win32.3", "Trojan/Fesber.a", "W32/Fesber.A", "Win32/Fesber.A", "WORM_YERO.A", "Win.Worm.Yero-1", "Worm.Win32.Fesber.g", "Trojan.Dropper.Delf.BB", "Virus.Win32.Fesber.iiof", "Worm.Win32.A.Fesber.13116[UPX]", "Virus.Win32.Fesber.k", "Trojan.Dropper.Delf.BB", "Win32.HLLW.FSB", "WORM_YERO.A", "BehavesLike.Win32.Fesber.vh", "W32/Fesber.QPGQ-0002", "Worm/Fesber.g", "Worm/Win32.Fesber.g", "Worm.Fesber.kcloud", "Worm:Win32/Fesber.A", "Trojan.Dropper.Delf.BB", "Troj.PSW32.W.QQPass.lgj2", "Worm.Win32.Fesber.g", "Trojan.Dropper.Delf.BB", "Worm/Win32.Fesber.R4309", "Trojan.Dropper.Delf.BB", "Virus.Fsb.1", "I-Worm.Fesber.A", "Win32/Fesber.A", "Worm.Fesber!I2XPvd5yXYs", "Worm.Win32.Fesber", "W32/Cosmu.H.worm", "Worm.Win32.Fesber.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "What", "is", "special", "about", "it", "is", "that", "it", "comes", "as", "a", "Windows", "link", "file,", ".LNK,", "that", "downloads", "and", "runs", "a", "malicious", "HTML", "application,", ".HTA,", "that", "drops", "and", "executes", "a", "malicious", "binary." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 9, 9, 16, 16, 16, 1, 9, 9, 9, 9, 9, 16, 16, 16, 16, 16, 16, 16 ]
[ "]", "147", "Red", "Alert", "2.0", ":", "Android", "Trojan", "targets", "security-seekers", "A", "malicious", ",", "counterfeit", "version", "of", "a", "VPN", "client", "for", "mobile", "devices", "targets", "security-minded", "victims", "with", "a", "RAT", "." ]
[ 9, 9, 3, 11, 11, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "We", "report", "them", "to", "Google", "and", "take", "other", "steps", "to", "disrupt", "malicious", "campaigns", "we", "discover", "." ]
[ 16, 16, 16, 16, 4, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Our", "analysis", "of", "the", "Adobe", "Flash", "zero-day", "vulnerability", "used", "in", "the", "latest", "Pawn", "Storm", "campaign", "reveals", "that", "the", "previous", "mitigation", "techniques", "introduced", "by", "Adobe", "were", "not", "enough", "to", "secure", "the", "platform." ]
[ 16, 16, 16, 16, 5, 13, 7, 15, 16, 16, 16, 16, 6, 14, 14, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "actors", "behind", "Dridex", "220", "and", "Locky", "Affid=3", "have", "introduced", "a", "new", "ransomware", "called", "Bart" ]
[ 16, 16, 16, 3, 11, 16, 3, 11, 16, 16, 16, 16, 3, 16, 3 ]
[ "A", "backdoor", "also", "known", "as:", "Application.Joke.Flipped.E", "Joke.Flipped", "Riskware.Win16.Flipped.yzsd", "Joke.Flipped", "JOKE_FLIPPED.A", "Joke.Flipped", "Application.Joke.Flipped.E", "Joke.Flipped", "Application.Joke.Flipped", "Joke.Flipped", "JOKE_FLIPPED.A", "Joke.Flipped", "Backdoor/IRC.IRC", "Joke:Win32/Flipped.A", "Trojan.Win32.A.Zbot.4128", "Application.Joke.Flipped.E", "Joke.Flipped", "Joke.Flipped" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Komplex", "shares", "a", "significant", "amount", "of", "functionality", "and", "traits", "with", "another", "tool", "used", "by", "Sofacy", "–", "the", "Carberp", "variant", "that", "Sofacy", "had", "used", "in", "previous", "attack", "campaigns", "on", "systems", "running", "Windows." ]
[ 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 6, 16, 16, 3, 11, 16, 6, 16, 16, 16, 16, 6, 14, 16, 5, 13, 13 ]
[ "Figure", "6", ":", "Targeted", "ad", "network", "Figure", "7", ":", "Injection", "example", "After", "all", "of", "the", "required", "changes", ",", "β€œ", "Agent", "Smith", "”", "compiles", "the", "application", "and", "builds", "a", "DEX", "file", "containing", "both", "the", "original", "code", "of", "the", "original", "application", "and", "the", "malicious", "payload", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "In", "2014,", "our", "colleagues", "at", "Crowdstrike", "wrote", "an", "exposΓ©", "about", "a", "long-standing", "Chinese", "APT", "threat", "group", "they", "self-named", "Putter", "Panda,", "which", "Mandiant/FireEye", "refers", "to", "as", "APT2." ]
[ 16, 0, 16, 4, 16, 4, 16, 16, 16, 16, 16, 16, 6, 14, 14, 14, 16, 16, 6, 14, 16, 4, 16, 16, 16, 6 ]
[ "Apache", "Tomcat", "is", "a", "java", "based", "web", "service", "that", "is", "used", "for", "different", "applications." ]
[ 5, 13, 16, 16, 5, 16, 5, 13, 16, 16, 16, 16, 5, 13 ]
[ "Among", "the", "153", "configuration", "files,", "54", "distinct", "command", "and", "control", "C", "C", "servers", "were", "detected." ]
[ 16, 16, 1, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Win32.RedCap.ewfcku", "BehavesLike.Win32.VBobfus.gc", "Trojan.CopyKittens", "TR/RedCap.eevfy", "Trojan.Razy.D33AF6", "TrojanDropper:Win32/Noratops.B!dha", "Trj/GdSda.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1 ]
[ "According", "to", "a", "blog", "article", "by", "Microsoft,", "the", "malware", "is", "associated", "with", "an", "attacker", "group", "identified", "as", "DarkHotel", "Microsoft", "calls", "it", "as", "Dubnium", "." ]
[ 16, 16, 16, 16, 16, 16, 4, 16, 3, 16, 16, 16, 16, 6, 14, 16, 16, 6, 4, 16, 16, 16, 6, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.Lamer.KL8", "PE_LAMER_EL150191.UVPM", "Win32.Trojan.WisdomEyes.16070401.9500.9987", "PE_LAMER_EL150191.UVPM", "Virus.Win32.Lamer.kl", "Virus.W32.Lamer!c", "ApplicUnsaf.Win32.ScreenMate.AA", "Backdoor.PePatch.Win32.75884", "Virus.Win32.Lamer", "TR/Taranis.2787", "Trojan[Ransom]/Win32.CryFile", "Virus.Win32.Lamer.kl", "Hoax.CryFile", "Virus.Win32.Lamer.j", "Win32/Virus.HideDoc.L" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "But", "that", "does", "n't", "mean", "companies", "and", "organizations", "are", "out", "of", "the", "woods", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Google's", "security", "team", "recently", "identified", "a", "new", "domain", "masquerading", "as", "an", "official", "EFF", "site", "as", "part", "of", "a", "targeted", "malware", "campaign." ]
[ 4, 12, 12, 16, 16, 16, 1, 9, 9, 16, 16, 1, 9, 9, 16, 16, 16, 16, 16, 6, 14 ]
[ "A", "backdoor", "also", "known", "as:", "W32.OnGameELAIUZAC.Trojan", "Trojan.Zusy.D3B59", "Win32.Trojan.WisdomEyes.16070401.9500.9997", "Trojan.Win32.Clicker.cwyjjr", "Trojan.Click2.34240", "Win32.Troj.Undef.kcloud", "Trojan:MSIL/Ainscomp.A", "Trj/CI.A", "Trojan.Ainscomp!KTuN3cZslCo", "Trojan.Msil", "Win32/Trojan.bfc" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "FinFisher", "is", "not", "afraid", "of", "using", "all", "kinds", "of", "tricks", ",", "ranging", "from", "junk", "instructions", "and", "β€œ", "spaghetti", "code", "”", "to", "multiple", "layers", "of", "virtual", "machines", "and", "several", "known", "and", "lesser-known", "anti-debug", "and", "defensive", "measures", "." ]
[ 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "EventBot", "parsing", "of", "grabbed", "SMS", "messages", "Parsing", "of", "grabbed", "SMS", "messages", "." ]
[ 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "second", "attack", "vector", ",", "the", "overlay", "attack", ",", "shows", "a", "customized", "phishing", "window", "whenever", "a", "targeted", "application", "is", "started", "on", "the", "device", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "three", "InPage", "exploit", "files", "are", "linked", "through", "their", "use", "of", "very", "similar", "shellcode,", "which", "suggests", "that", "either", "the", "same", "actor", "is", "behind", "these", "attacks,", "or", "the", "attackers", "have", "access", "to", "a", "shared", "builder." ]
[ 16, 16, 3, 11, 1, 16, 16, 16, 16, 1, 9, 9, 9, 9, 16, 16, 16, 16, 6, 14, 14, 16, 16, 16, 1, 16, 6, 14, 16, 16, 16, 16, 16, 16 ]
[ "A", "new", "type", "of", "macOS-based", "stealer", "is", "being", "sold", "on", "the", "dark", "web", "for", "$100", "Β£70." ]
[ 16, 16, 16, 16, 3, 11, 16, 16, 16, 16, 1, 9, 9, 16, 16, 16 ]
[ "BLOCKER_EXTORTIONIST_START", "–", "display", "HTML", "page", "of", "the", "ransomware", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "If", "the", "user", "ignores", "or", "rejects", "the", "request", ",", "the", "window", "reopens", "every", "few", "seconds", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "emails", "sent", "by", "this", "campaign", "may", "look", "spartan", "to", "the", "professional", "eye", "but,", "as", "ever,", "the", "human", "point", "of", "interaction", "with", "systems", "is", "the", "most", "vulnerable:", "by", "potentially", "reaching", "so", "many", "individuals,", "campaigns", "such", "as", "this", "can", "-", "and", "do", "-", "succeed", "in", "infecting", "people." ]
[ 16, 16, 16, 16, 16, 6, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 7, 16, 16, 16, 16, 16, 4, 6, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "MD5", "43680D1914F28E14C90436E1D42984E2", "20D4B9EB9377C499917C4D69BF4CCEBE", "First", "widely", "distributed", "Android", "bootkit", "Malware", "infects", "more", "than", "350,000", "Devices", "January", "29", ",", "2014", "In", "the", "last", "quarter", "of", "2013", ",", "sale", "of", "a", "Smartphone", "with", "ANDROID", "operating", "system", "has", "increased", "and", "every", "second", "person", "you", "see", "is", "a", "DROID", "user", "." ]
[ 16, 1, 1, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16 ]
[ "Most", "custom", "backdoors", "used", "by", "advanced", "attackers", "have", "limited", "functionality." ]
[ 16, 3, 11, 16, 16, 6, 14, 16, 16, 16 ]
[ "EVENTBOT", "INFRASTRUCTURE", "By", "mapping", "the", "C2", "servers", ",", "a", "clear", ",", "repeated", "pattern", "emerges", "based", "on", "the", "specific", "URL", "gate_cb8a5aea1ab302f0_c", "." ]
[ 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "We", "anticipate", "this", "malware", "to", "continue", "to", "evolve", "with", "additional", "new", "features", ";", "the", "only", "question", "now", "is", "when", "we", "will", "see", "the", "next", "wave", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "This", "leads", "us", "to", "believe", "this", "is", "another", "actor", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/Bifrose.nel", "Win.Trojan.AutoIT-6333854-0", "Trojan-Dropper.Win32.Autoit.bvg", "Trojan.Win32.AutoIt.expdpu", "BehavesLike.Win32.Backdoor.tc", "Trojan.Win32.Z.Autoit.1633763", "Dropper/Win32.Androm.C2387785", "Win32/Injector.Autoit.DFJ", "Backdoor.MSIL", "W32/Injector.CYH!tr", "Win32/Trojan.38f" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Several", "analysis", "reports", "were", "published", "on", "this", "malware", "in", "2014", "and", ",", "finally", ",", "the", "source", "code", "was", "leaked", "in", "2015", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "These", "devices", "were", "located", "in", "the", "following", "countries", ":", "How", "we", "protect", "you", "To", "protect", "Android", "devices", "and", "users", ",", "Google", "Play", "provides", "a", "complete", "set", "of", "security", "services", "that", "update", "outside", "of", "platform", "releases", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 5, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "MALWARE", "UNDER", "ACTIVE", "DEVELOPMENT", "EventBot", "β€œ", "cfg", "”", "class", "EventBot", "β€œ", "cfg", "”", "class", "." ]
[ 16, 16, 16, 16, 3, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16 ]
[ "Over", "the", "past", "couple", "of", "months", "McAfee", "Labs", "has", "seen", "an", "increase", "in", "the", "usage", "of", "macros", "to", "deliver", "malware." ]
[ 16, 16, 16, 16, 16, 16, 4, 12, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 3 ]
[ "We", "mostly", "observe", "attacks", "using", "Elirks", "occurring", "in", "East", "Asia." ]
[ 16, 16, 16, 1, 16, 3, 16, 16, 2, 10 ]
[ "We", "observed", "an", "anomaly", "when", "approximately", "60", "domains", "all", "[.]top", "TLDs", "registered", "on", "April", "7,", "2016", "started", "serving", "a", "coin", "mining", "malware", "–", "to", "mine", "BitMonero,", "a", "form", "of", "digital", "currency", "–", "on", "their", "main", "page", "under", "the", "mime-type", "of", "html/text." ]
[ 16, 16, 16, 16, 16, 16, 1, 9, 9, 9, 9, 9, 9, 0, 8, 8, 16, 16, 16, 3, 11, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 9 ]
[ "A", "backdoor", "also", "known", "as:", "W32.HfsAutoB.E147", "Trojan.Banker.Win32.5895", "Trojan/Banker.ju", "W32/Banker.AJC", "Win.Trojan.Bancos-852", "Trojan-Banker.Win32.Banker.ju", "Trojan.Win32.Banker.bmncx", "Trojan.PWS.Banker.based", "Trojan-Spy.Win32.Banker", "W32/Banker.WTGS-4277", "Trojan/Banker.Banker.ufm", "Trojan[Banker]/Win32.Banker", "Trojan-Banker.Win32.Banker.ju", "TrojanBanker.Banker", "Trojan.Banker!qguLAzH8AII", "W32/Banker.DUU!tr", "Trj/Banker.FWD", "Win32/Trojan.a46" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "At", "least", "two", "different", "stealers,", "Rhadamanthys", "and", "RedLine,", "were", "abusing", "the", "search", "engine", "promotion", "plan", "in", "order", "to", "deliver", "malicious", "payloads", "to", "victims'", "machines." ]
[ 3, 16, 16, 16, 3, 11, 16, 3, 16, 16, 5, 13, 13, 16, 16, 16, 16, 16, 16, 3, 11, 16, 5, 13 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9925", "Trojan.Win32.Graftor.bovqdb", "TrojWare.Win32.GameThief.Nilage.~CRSH", "TR/Graftor.Elzob.6117.1", "Backdoor:Win32/Parcim.A", "Trj/CI.A", "Trojan.Graftor.Elzob.D17E5" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1 ]
[ "It", "has", "been", "in", "the", "news", "the", "past", "few", "weeks", "as", "it", "is", "the", "bot", "that", "was", "used", "in", "the", "DDoS", "attack", "on", "Brian", "Kreb's", "security", "blog." ]
[ 16, 16, 16, 16, 16, 16, 16, 0, 8, 8, 16, 16, 16, 16, 3, 15, 16, 16, 16, 16, 1, 9, 16, 4, 12, 12, 12 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Jevafus.A", "Trojan.Jevafus.A", "Trojan.Jevafus.A", "Trojan.Win32.Drop.euelge", "Trojan.Jevafus.A", "Trojan.Jevafus.A", "BehavesLike.Win32.BadFile.vh", "TrojanDropper:Win32/Jevafus.A", "Trojan.Jevafus.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "So", "far,", "all", "theories", "regarding", "the", "spread", "of", "ExPetr/Petya", "point", "into", "two", "directions:" ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "What", "’", "s", "more", ",", "the", "user", "can", "not", "check", "the", "balance", "via", "mobile", "banking", "or", "change", "any", "settings", "there", ",", "because", "after", "receiving", "the", "command", "with", "code", "40", ",", "the", "Trojan", "prevents", "the", "banking", "app", "from", "running", "on", "the", "phone", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "CatB", "ransomware", "family,", "sometimes", "referred", "to", "as", "CatB99", "or", "Baxtoy,", "was", "first", "observed", "in", "late", "2022,", "with", "campaigns", "being", "observed", "steadily", "since", "November." ]
[ 3, 11, 11, 11, 16, 16, 16, 16, 3, 16, 3, 16, 16, 16, 16, 0, 8, 16, 6, 16, 16, 16, 16, 0 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Svectas.Win64.1", "Packer.Win32.Katusha", "TR/Svectas.smnlb", "W64/Svectas.B!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1 ]
[ "PaloAltorecently", "discovered", "a", "new", "Android", "Trojan", "called", "SpyNote", "which", "facilitates", "remote", "spying." ]
[ 6, 16, 16, 16, 3, 11, 16, 3, 16, 16, 1, 9 ]
[ "A", "backdoor", "also", "known", "as:", "W32.HfsAutoB.F81D", "Trojan.Mikhail.Win32.4", "Trojan.Ransom.Mischa.2", "Ransom_MISCHA.SM", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Ransom_MISCHA.SM", "Win32.Trojan-Ransom.Petya.D", "Trojan-Ransom.Win32.Mikhail.a", "Trojan.Win32.Petya.96256", "Trojan.Encoder.4544", "Trojan.Petr.a", "TR/AD.Petya.Y.rxxx", "Trojan[Ransom]/Win32.Mikhail", "Ransom:Win32/Mischa.A", "Trojan-Ransom.Win32.Mikhail.a", "Trojan/Win32.Mischa.C1478164", "Hoax.Mikhail", "Trojan.Mikhail!" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Doc.Exploit.DDEautoexec-6346603-0", "Exploit.Xml.DDEAuto.euqmxe", "Trojan[Exploit]/MSOffice.DDE.c", "Win32.Outbreak" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1 ]
[ "In", "a", "much-improved", "Android", "security", "environment", ",", "the", "actors", "behind", "Agent", "Smith", "seem", "to", "have", "moved", "into", "the", "more", "complex", "world", "of", "constantly", "searching", "for", "new", "loopholes", ",", "such", "as", "Janus", ",", "Bundle", "and", "Man-in-the-Disk", ",", "to", "achieve", "a", "3-stage", "infection", "chain", ",", "in", "order", "to", "build", "a", "botnet", "of", "controlled", "devices", "to", "earn", "profit", "for", "the", "perpetrator", "." ]
[ 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 7, 16, 7, 16, 7, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "end", "result", "is", "a", "new", "banking", "Trojan", "in", "the", "wild." ]
[ 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9899", "HV_ROGUE_CG152C85.RDXN", "Heur.Packed.Unknown", "TR/Spy.Banker.45879", "TrojanProxy:BAT/Banker.G", "Win32/RiskWare.PEMalform.E" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan-Proxy/W32.Steredir.504832", "Trojan/Proxy.Steredir.c", "Trojan-Proxy.Win32.Steredir.c", "Trojan.Win32.Steredir.fqli", "Troj.Proxy.W32.Steredir.c!c", "TrojWare.Win32.TrojanProxy.Steredir.C", "Trojan.Stedir.11", "Trojan.Steredir.Win32.7", "Trojan-Dropper.Delf", "W32/Risk.RESM-4501", "TrojanProxy.Steredir.c", "TR/Proxy.Steredir.C", "Trojan[Proxy]/Win32.Steredir", "Win32.Troj.Steredir.c.kcloud", "Trojan.Heur.EFD23B1", "Trojan.Win32.Proxy.504832", "Trojan-Proxy.Win32.Steredir.c", "TrojanProxy:Win32/Steredir.C", "Win32/TrojanProxy.Steredir.C", "Trojan.PR.Steredir!cYzY1isGQt0", "W32/Steredir.C!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Do", "not", "download", "mobile", "apps", "from", "unofficial", "or", "unauthorized", "sources", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Attitude", "Change", "The", "disinterest", "in", "the", "issues", "appears", "to", "have", "changed", "with", "The", "New", "York", "Times", "report", ",", "which", "lit", "a", "fire", "underneath", "Adups", "and", "BLU", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 12, 12, 16, 16, 16, 16, 16, 16, 16, 4, 16, 4, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "BehavesLike.Win32.Trojan.gc", "Trojan.MSIL.Bladabindi.1", "HackTool:MSIL/Injector.A", "Trojan.LVBP.ED", "Backdoor.Win32.DarkKomet" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.Win32.Hupigon!O", "TrojanDropper.Dowque.A8", "Backdoor.Hupigon.Win32.182", "Backdoor/Hupigon.dkwt", "TROJ_DOWQUE.NY", "Win32.Trojan.Delf.b", "W32/Backdoor2.CWRX", "Backdoor.Graybird", "TROJ_DOWQUE.NY", "Win.Worm.Autorun-12451", "Backdoor.Win32.Hupigon.56864", "Backdoor.W32.Hupigon.l9fO", "BackDoor.Graybird.75", "BehavesLike.Win32.SpywareLyndra.tc", "W32/Backdoor.DAWT-3367", "Backdoor/Huigezi.2008.qny", "BDS/Farfli.kj.2", "Win32.TrojDownloader.dl.kcloud", "TrojanDropper:Win32/Dowque.A", "Trojan/Win32.Hupigon.C29670", "Backdoor.Bot", "Win32/Delf.NSN", "Backdoor.Win32.Hupigon.dkw", "Backdoor.Hupigon!hgCryiT987Y", "Backdoor.Win32.HacDef", "W32/Injector.fam!tr", "Trojan.Win32.Downloader.M" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "file", "is", "named", "in", "such", "a", "way", "as", "to", "confuse", "WordPress", "administrators", "who", "are", "familiar", "with", "XML-RPC." ]
[ 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 16, 16, 16, 16, 1 ]
[ "Conclusion", "The", "days", "when", "one", "needed", "in-depth", "coding", "knowledge", "to", "develop", "malware", "are", "long", "gone", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "HackTool.Win64.PSWDump.f", "BehavesLike.Win64.SoftPulse.lh", "HackTool.Mimikatz", "HackTool.Win64.PSWDump.f" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1 ]
[ "The", "story", "was", "about", "a", "new", "vulnerability", "for", "*nix-based", "systems", "–", "EternalRed", "aka", "SambaCry." ]
[ 16, 16, 16, 16, 16, 7, 15, 16, 5, 13, 16, 3, 16, 3 ]
[ "sms_grab", ":", "to", "upload", "periodically", "the", "SMS", "messages", "in", "the", "inbox", "to", "C2", "server", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "There", "have", "been", "an", "emegerence", "of", "new", "domains", "for", "FighterPOS", "recently", "and", "I", "discovered", "a", "whole", "load", "of", "other", "possible", "domains", "that", "could", "be", "used", "for", "the", "command", "and", "control." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 11, 16, 1, 9, 9 ]