tokens
sequencelengths 2
296
| ner_tags
sequencelengths 2
296
|
---|---|
[
"Figure",
"1",
"shows",
"embedded",
"URL",
"in",
"an",
"Elirks",
"sample",
"found",
"in",
"early",
"2016."
] | [
16,
16,
16,
1,
9,
16,
16,
3,
16,
16,
16,
0,
8
] |
[
"This",
"malware",
"is",
"well-known",
"for",
"its",
"ability",
"to",
"steal",
"credentials",
"and",
"quickly",
"spread",
"through",
"an",
"enterprise",
"over",
"network",
"shares."
] | [
16,
3,
16,
16,
16,
16,
16,
16,
1,
9,
16,
16,
16,
16,
16,
4,
16,
5,
13
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.eHeur.Virus02",
"Adware.Heur.E101B3",
"Win32.Trojan.BHO.r",
"Trojan.Win32.BHO.bropxr",
"Adware.Softomate.603",
"Trojan:Win32/Jifcapi.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Kromebit",
"TROJ_KROMEBIT.SM",
"Win32.Trojan.WisdomEyes.16070401.9500.9982",
"TROJ_KROMEBIT.SM",
"Trojan.Win32.Dwn.eurwpx",
"Trojan.Win32.Z.Kromebit.1068032",
"Trojan.DownLoader25.50889",
"BehavesLike.Win32.Dropper.tt",
"W32/Trojan.EJDN-0785",
"Trojan:Win32/Kromebit.B",
"Trj/CI.A",
"Trojan.Win32.Kromebit",
"W32/KROMEBIT.SM!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Today",
"this",
"malware",
"shows",
"unwanted",
"ads",
",",
"tomorrow",
"it",
"could",
"steal",
"sensitive",
"information",
";",
"from",
"private",
"messages",
"to",
"banking",
"credentials",
"and",
"much",
"more",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"report",
"closes",
"with",
"some",
"security",
"suggestions,",
"highlighting",
"the",
"importance",
"of",
"two-factor",
"authentication."
] | [
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
5,
13
] |
[
"The",
"record",
"contains",
"a",
"personal",
"email",
"address",
":",
"WHOIS",
"records",
"of",
"C2",
"server",
"exposing",
"the",
"attacker",
"β",
"s",
"email",
"address",
"We",
"were",
"aware",
"of",
"the",
"possibility",
"that",
"the",
"attackers",
"might",
"be",
"using",
"a",
"compromised",
"email",
"account",
",",
"so",
"we",
"dug",
"deeper",
"to",
"find",
"more",
"information",
"related",
"to",
"this",
"email",
"address",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"week",
"the",
"spam",
"party",
"did",
"not",
"just",
"include",
"CERBER,",
"but",
"also",
"decided",
"to",
"invite",
"an",
"old",
"friend",
"β",
"the",
"KOVTER",
"family."
] | [
16,
16,
1,
9,
9,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
11
] |
[
"Tofsee,",
"also",
"known",
"as",
"Gheg,",
"is",
"another",
"botnet",
"analyzed",
"by",
"CERT",
"Polska."
] | [
3,
16,
16,
16,
3,
16,
16,
3,
16,
16,
4,
12
] |
[
"We",
"assess",
"with",
"high",
"confidence",
"that",
"this",
"modified",
"version",
"is",
"operated",
"by",
"the",
"infamous",
"Wolf",
"Research",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
12,
16
] |
[
"It",
"β",
"s",
"possible",
",",
"as",
"with",
"other",
"Android",
"malware",
",",
"that",
"some",
"apps",
"may",
"also",
"be",
"available",
"on",
"forums",
",",
"file-sharing",
"sites",
"or",
"even",
"sent",
"to",
"victims",
"as",
"email",
"attachments",
",",
"and",
"we",
"were",
"only",
"able",
"to",
"determine",
"the",
"delivery",
"mechanism",
"for",
"a",
"handful",
"of",
"the",
"apps",
"we",
"have",
"been",
"able",
"to",
"find",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/W32.Small.15616.H",
"Trojan.Bibei.A6",
"Bibei.a",
"Win.Trojan.Rootkit-3954",
"Trojan.Win32.NtRootKit.rigfr",
"TrojWare.Win32.Olmarik.AWI",
"Trojan.NtRootKit.12543",
"Bibei.a",
"TR/Offend.69286423",
"Trojan.Zusy.D27F7",
"Trojan:WinNT/Bibei.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"During",
"the",
"investigation",
",",
"this",
"app",
"was",
"able",
"to",
"successfully",
"connect",
"to",
"the",
"command",
"and",
"control",
"server",
",",
"but",
"it",
"received",
"no",
"commands",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Another",
"trick",
"in",
"β",
"Agent",
"Smith",
"β",
"s",
"arsenal",
"is",
"to",
"change",
"the",
"settings",
"of",
"the",
"update",
"timeout",
",",
"making",
"the",
"original",
"application",
"wait",
"endlessly",
"for",
"the",
"update",
"check",
"."
] | [
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"service",
"continues",
"by",
"loading",
"an",
"ELF",
",",
"created",
"by",
"Baidu",
",",
"which",
"is",
"capable",
"of",
"tracking",
"the",
"device",
"location",
"before",
"setting",
"up",
"a",
"monitor",
"to",
"harvest",
"phone",
"numbers",
"associated",
"with",
"outgoing",
"calls",
"for",
"those",
"numbers",
"with",
"a",
"country",
"code",
"β",
"+86",
"β",
"prefix",
",",
"which",
"relates",
"to",
"the",
"People",
"β",
"s",
"Republic",
"of",
"China",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/W32.Propas.110663",
"Trojan.Heur.RP.EDD84E",
"Win32.Trojan.WisdomEyes.16070401.9500.9997",
"W32/Trojan.AQD",
"TROJ_PASSPRO.C",
"Win.Trojan.Enfal-62",
"Trojan.PWS.Winlog",
"TROJ_PASSPRO.C",
"BehavesLike.Win32.Dropper.ch",
"W32/Trojan.IWQS-9238",
"Trojan:Win32/Propas.A",
"Trojan:Win32/Propas.A",
"Trojan.Propas!M9i4NRQV2R8",
"W32/Propas.A!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"One",
"of",
"the",
"samples",
"(",
"e19823a1ba4a0e40cf459f4a0489fc257720cc0d71ecfb7ad94b3ca86fbd85d1",
")",
"uses",
"the",
"C2",
"server",
"svcws",
"[",
"."
] | [
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
1,
9,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.Syph.B",
"Backdoor/W32.Syph.361984",
"Backdoor.Syph",
"Backdoor.W32.Syph.b!c",
"Trojan/Syph.b",
"Backdoor.Syph.B",
"Backdoor.Trojan",
"BKDR_SYPH.B",
"Win.Trojan.Syph-2",
"Backdoor.Syph.B",
"Backdoor.Win32.Syph.b",
"Backdoor.Syph.B",
"Trojan.Win32.Syph.bfjuy",
"Backdoor.Win32.Syph.361984",
"Win32.Backdoor.Syph.cyqv",
"Backdoor.Syph.B",
"Backdoor.Win32.Syph.B",
"BackDoor.Syph",
"BKDR_SYPH.B",
"W32/Risk.GBZV-6047",
"Backdoor/Syph.b",
"BDS/Syph.b.Srv",
"Trojan[Backdoor]/Win32.Syph",
"Backdoor:Win32/Syph.B",
"Backdoor.Win32.Syph.b",
"Backdoor.Syphillis",
"Backdoor.Syph.b",
"Bck/Syphillis.1.18",
"Win32/Syph.B",
"Backdoor.Syph!hEmUZuSaZVQ",
"Win32/Backdoor.e16"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"From",
"April",
"19-24,",
"2017,",
"a",
"politically-motivated,",
"targeted",
"campaign",
"was",
"carried",
"out",
"against",
"numerous",
"Israeli",
"organizations."
] | [
16,
0,
8,
8,
16,
6,
14,
14,
16,
16,
16,
16,
16,
4,
12
] |
[
"Although",
"this",
"technique",
"has",
"been",
"used",
"before",
"by",
"other",
"malware",
"campaigns,",
"it",
"is",
"still",
"not",
"a",
"common",
"strategy."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"It",
"also",
"targets",
"devices",
"made",
"by",
"Chinese",
"manufacturer",
"Xiaomi",
"and",
"those",
"running",
"MIUI",
",",
"an",
"operating",
"system",
"based",
"on",
"Google",
"Android",
"made",
"by",
"Xiaomi",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
5,
13,
16,
16,
4,
16
] |
[
"We",
"gathered",
"information",
"from",
"affected",
"devices",
",",
"and",
"concurrently",
",",
"attempted",
"to",
"acquire",
"Chrysaor",
"apps",
"to",
"better",
"understand",
"its",
"impact",
"on",
"users",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9692",
"TR/Brysay.A",
"PWS:Win32/Enesbot.A",
"Trojan-Downloader.MSIL.Banload"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1
] |
[
"Some",
"of",
"the",
"icons",
"used",
"can",
"be",
"seen",
"below",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Yet",
"I",
"recently",
"uncovered",
"evidence",
"that",
"suggests",
"it",
"was",
"the",
"work",
"of",
"a",
"well-known",
"Chinese",
"threat",
"group."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
6,
14,
14
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9982",
"Trojan.Win32.Farfli",
"Backdoor:Win32/Dorbop.B!bit",
"Trj/GdSda.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Win32.AD.eqoszf",
"TR/AD.PSLoader.kykon",
"Trojan.Razy.D1F16C",
"Win32/Powerless.F",
"Trojan.Powerless!",
"W32/Powerless.F!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1
] |
[
"We",
"have",
"labelled",
"this",
"threat",
"group",
"the",
"Gamaredon",
"Group",
"and",
"our",
"research",
"shows",
"that",
"the",
"Gamaredon",
"Group",
"has",
"been",
"active",
"since",
"at",
"least",
"2013."
] | [
16,
16,
16,
16,
6,
14,
14,
14,
14,
16,
16,
16,
16,
16,
6,
14,
14,
16,
16,
16,
0,
8,
8,
8
] |
[
"]",
"orgacount-manager",
"[",
"."
] | [
16,
16,
16,
16
] |
[
"In",
"our",
"previous",
"research,",
"we",
"detailed",
"how",
"an",
"information",
"stealer",
"Trojan",
"was",
"deployed",
"via",
"a",
"Word",
"macro,",
"in",
"order",
"to",
"spy",
"on",
"its",
"victims",
"various",
"parts",
"of",
"the",
"Saudi",
"Government."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
11,
16,
16,
16,
16,
3,
11,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
4,
12,
12
] |
[
"]",
"175",
"[",
"."
] | [
9,
9,
9,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.FakeMsHelpCenter.Trojan",
"Trojan.Graftor.D67ED",
"Win32.Trojan.WisdomEyes.16070401.9500.9997",
"TROJ_ALTHUMS_EI030112.UVPM",
"Trojan.Win32.DownLoad2.rlsdn",
"Trojan.Win32.A.Downloader.84626",
"Trojan.DownLoad2.63614",
"Trojan.Allthumbs.Win32.1",
"TROJ_ALTHUMS_EI030112.UVPM",
"BehavesLike.Win32.Worm.tz",
"Trojan:Win32/Althums.A",
"Trojan/Win32.Goz.R10705",
"Trj/CI.A",
"Trojan.Graftor!H+8m5ivUpKY",
"Win32/Trojan.0be"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Such",
"data",
"includes",
"contact",
"and",
"location",
"information",
",",
"phone",
"and",
"message",
"activity",
",",
"the",
"ability",
"to",
"record",
"from",
"the",
"microphone",
",",
"camera",
",",
"and",
"other",
"sensors",
"as",
"well",
"as",
"the",
"capability",
"to",
"access",
"data",
"from",
"many",
"popular",
"messaging",
"and",
"social",
"media",
"apps",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"BKDR_MATSNU.SM0",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"BKDR_MATSNU.SM0",
"BehavesLike.Win32.Ransom.ch",
"TR/Crypt.ZPACK.8577",
"Trojan/Win32.Trapwot.R152769",
"Trojan.FakeAV.01657"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"full",
"list",
"of",
"targeted",
"applications",
"is",
"included",
"in",
"the",
"IOC",
"section",
"at",
"the",
"end",
"of",
"this",
"post",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"finding",
"was",
"listed",
"in",
"our",
"Anthem",
"blog,",
"and",
"we",
"have",
"continued",
"to",
"monitor",
"it",
"in",
"ThreatConnect",
"since",
"mid",
"February."
] | [
16,
16,
16,
16,
16,
16,
4,
16,
16,
16,
16,
16,
16,
11,
16,
16,
5,
16,
0,
8
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.JapiletAA.Trojan",
"Trojan.Dropper.Delf.BB",
"Worm.Win32.Fesber!O",
"Worm.Fesber",
"Worm.Fesber.Win32.3",
"Trojan/Fesber.a",
"W32/Fesber.A",
"Win32/Fesber.A",
"WORM_YERO.A",
"Win.Worm.Yero-1",
"Worm.Win32.Fesber.g",
"Trojan.Dropper.Delf.BB",
"Virus.Win32.Fesber.iiof",
"Worm.Win32.A.Fesber.13116[UPX]",
"Virus.Win32.Fesber.k",
"Trojan.Dropper.Delf.BB",
"Win32.HLLW.FSB",
"WORM_YERO.A",
"BehavesLike.Win32.Fesber.vh",
"W32/Fesber.QPGQ-0002",
"Worm/Fesber.g",
"Worm/Win32.Fesber.g",
"Worm.Fesber.kcloud",
"Worm:Win32/Fesber.A",
"Trojan.Dropper.Delf.BB",
"Troj.PSW32.W.QQPass.lgj2",
"Worm.Win32.Fesber.g",
"Trojan.Dropper.Delf.BB",
"Worm/Win32.Fesber.R4309",
"Trojan.Dropper.Delf.BB",
"Virus.Fsb.1",
"I-Worm.Fesber.A",
"Win32/Fesber.A",
"Worm.Fesber!I2XPvd5yXYs",
"Worm.Win32.Fesber",
"W32/Cosmu.H.worm",
"Worm.Win32.Fesber.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"What",
"is",
"special",
"about",
"it",
"is",
"that",
"it",
"comes",
"as",
"a",
"Windows",
"link",
"file,",
".LNK,",
"that",
"downloads",
"and",
"runs",
"a",
"malicious",
"HTML",
"application,",
".HTA,",
"that",
"drops",
"and",
"executes",
"a",
"malicious",
"binary."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9,
9,
16,
16,
16,
1,
9,
9,
9,
9,
9,
16,
16,
16,
16,
16,
16,
16
] |
[
"]",
"147",
"Red",
"Alert",
"2.0",
":",
"Android",
"Trojan",
"targets",
"security-seekers",
"A",
"malicious",
",",
"counterfeit",
"version",
"of",
"a",
"VPN",
"client",
"for",
"mobile",
"devices",
"targets",
"security-minded",
"victims",
"with",
"a",
"RAT",
"."
] | [
9,
9,
3,
11,
11,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"We",
"report",
"them",
"to",
"Google",
"and",
"take",
"other",
"steps",
"to",
"disrupt",
"malicious",
"campaigns",
"we",
"discover",
"."
] | [
16,
16,
16,
16,
4,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Our",
"analysis",
"of",
"the",
"Adobe",
"Flash",
"zero-day",
"vulnerability",
"used",
"in",
"the",
"latest",
"Pawn",
"Storm",
"campaign",
"reveals",
"that",
"the",
"previous",
"mitigation",
"techniques",
"introduced",
"by",
"Adobe",
"were",
"not",
"enough",
"to",
"secure",
"the",
"platform."
] | [
16,
16,
16,
16,
5,
13,
7,
15,
16,
16,
16,
16,
6,
14,
14,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"actors",
"behind",
"Dridex",
"220",
"and",
"Locky",
"Affid=3",
"have",
"introduced",
"a",
"new",
"ransomware",
"called",
"Bart"
] | [
16,
16,
16,
3,
11,
16,
3,
11,
16,
16,
16,
16,
3,
16,
3
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Application.Joke.Flipped.E",
"Joke.Flipped",
"Riskware.Win16.Flipped.yzsd",
"Joke.Flipped",
"JOKE_FLIPPED.A",
"Joke.Flipped",
"Application.Joke.Flipped.E",
"Joke.Flipped",
"Application.Joke.Flipped",
"Joke.Flipped",
"JOKE_FLIPPED.A",
"Joke.Flipped",
"Backdoor/IRC.IRC",
"Joke:Win32/Flipped.A",
"Trojan.Win32.A.Zbot.4128",
"Application.Joke.Flipped.E",
"Joke.Flipped",
"Joke.Flipped"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Komplex",
"shares",
"a",
"significant",
"amount",
"of",
"functionality",
"and",
"traits",
"with",
"another",
"tool",
"used",
"by",
"Sofacy",
"β",
"the",
"Carberp",
"variant",
"that",
"Sofacy",
"had",
"used",
"in",
"previous",
"attack",
"campaigns",
"on",
"systems",
"running",
"Windows."
] | [
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
6,
16,
16,
3,
11,
16,
6,
16,
16,
16,
16,
6,
14,
16,
5,
13,
13
] |
[
"Figure",
"6",
":",
"Targeted",
"ad",
"network",
"Figure",
"7",
":",
"Injection",
"example",
"After",
"all",
"of",
"the",
"required",
"changes",
",",
"β",
"Agent",
"Smith",
"β",
"compiles",
"the",
"application",
"and",
"builds",
"a",
"DEX",
"file",
"containing",
"both",
"the",
"original",
"code",
"of",
"the",
"original",
"application",
"and",
"the",
"malicious",
"payload",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"In",
"2014,",
"our",
"colleagues",
"at",
"Crowdstrike",
"wrote",
"an",
"exposΓ©",
"about",
"a",
"long-standing",
"Chinese",
"APT",
"threat",
"group",
"they",
"self-named",
"Putter",
"Panda,",
"which",
"Mandiant/FireEye",
"refers",
"to",
"as",
"APT2."
] | [
16,
0,
16,
4,
16,
4,
16,
16,
16,
16,
16,
16,
6,
14,
14,
14,
16,
16,
6,
14,
16,
4,
16,
16,
16,
6
] |
[
"Apache",
"Tomcat",
"is",
"a",
"java",
"based",
"web",
"service",
"that",
"is",
"used",
"for",
"different",
"applications."
] | [
5,
13,
16,
16,
5,
16,
5,
13,
16,
16,
16,
16,
5,
13
] |
[
"Among",
"the",
"153",
"configuration",
"files,",
"54",
"distinct",
"command",
"and",
"control",
"C",
"C",
"servers",
"were",
"detected."
] | [
16,
16,
1,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Win32.RedCap.ewfcku",
"BehavesLike.Win32.VBobfus.gc",
"Trojan.CopyKittens",
"TR/RedCap.eevfy",
"Trojan.Razy.D33AF6",
"TrojanDropper:Win32/Noratops.B!dha",
"Trj/GdSda.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1
] |
[
"According",
"to",
"a",
"blog",
"article",
"by",
"Microsoft,",
"the",
"malware",
"is",
"associated",
"with",
"an",
"attacker",
"group",
"identified",
"as",
"DarkHotel",
"Microsoft",
"calls",
"it",
"as",
"Dubnium",
"."
] | [
16,
16,
16,
16,
16,
16,
4,
16,
3,
16,
16,
16,
16,
6,
14,
16,
16,
6,
4,
16,
16,
16,
6,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.Lamer.KL8",
"PE_LAMER_EL150191.UVPM",
"Win32.Trojan.WisdomEyes.16070401.9500.9987",
"PE_LAMER_EL150191.UVPM",
"Virus.Win32.Lamer.kl",
"Virus.W32.Lamer!c",
"ApplicUnsaf.Win32.ScreenMate.AA",
"Backdoor.PePatch.Win32.75884",
"Virus.Win32.Lamer",
"TR/Taranis.2787",
"Trojan[Ransom]/Win32.CryFile",
"Virus.Win32.Lamer.kl",
"Hoax.CryFile",
"Virus.Win32.Lamer.j",
"Win32/Virus.HideDoc.L"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"But",
"that",
"does",
"n't",
"mean",
"companies",
"and",
"organizations",
"are",
"out",
"of",
"the",
"woods",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Google's",
"security",
"team",
"recently",
"identified",
"a",
"new",
"domain",
"masquerading",
"as",
"an",
"official",
"EFF",
"site",
"as",
"part",
"of",
"a",
"targeted",
"malware",
"campaign."
] | [
4,
12,
12,
16,
16,
16,
1,
9,
9,
16,
16,
1,
9,
9,
16,
16,
16,
16,
16,
6,
14
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.OnGameELAIUZAC.Trojan",
"Trojan.Zusy.D3B59",
"Win32.Trojan.WisdomEyes.16070401.9500.9997",
"Trojan.Win32.Clicker.cwyjjr",
"Trojan.Click2.34240",
"Win32.Troj.Undef.kcloud",
"Trojan:MSIL/Ainscomp.A",
"Trj/CI.A",
"Trojan.Ainscomp!KTuN3cZslCo",
"Trojan.Msil",
"Win32/Trojan.bfc"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"FinFisher",
"is",
"not",
"afraid",
"of",
"using",
"all",
"kinds",
"of",
"tricks",
",",
"ranging",
"from",
"junk",
"instructions",
"and",
"β",
"spaghetti",
"code",
"β",
"to",
"multiple",
"layers",
"of",
"virtual",
"machines",
"and",
"several",
"known",
"and",
"lesser-known",
"anti-debug",
"and",
"defensive",
"measures",
"."
] | [
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"EventBot",
"parsing",
"of",
"grabbed",
"SMS",
"messages",
"Parsing",
"of",
"grabbed",
"SMS",
"messages",
"."
] | [
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"second",
"attack",
"vector",
",",
"the",
"overlay",
"attack",
",",
"shows",
"a",
"customized",
"phishing",
"window",
"whenever",
"a",
"targeted",
"application",
"is",
"started",
"on",
"the",
"device",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"three",
"InPage",
"exploit",
"files",
"are",
"linked",
"through",
"their",
"use",
"of",
"very",
"similar",
"shellcode,",
"which",
"suggests",
"that",
"either",
"the",
"same",
"actor",
"is",
"behind",
"these",
"attacks,",
"or",
"the",
"attackers",
"have",
"access",
"to",
"a",
"shared",
"builder."
] | [
16,
16,
3,
11,
1,
16,
16,
16,
16,
1,
9,
9,
9,
9,
16,
16,
16,
16,
6,
14,
14,
16,
16,
16,
1,
16,
6,
14,
16,
16,
16,
16,
16,
16
] |
[
"A",
"new",
"type",
"of",
"macOS-based",
"stealer",
"is",
"being",
"sold",
"on",
"the",
"dark",
"web",
"for",
"$100",
"Β£70."
] | [
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
1,
9,
9,
16,
16,
16
] |
[
"BLOCKER_EXTORTIONIST_START",
"β",
"display",
"HTML",
"page",
"of",
"the",
"ransomware",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"If",
"the",
"user",
"ignores",
"or",
"rejects",
"the",
"request",
",",
"the",
"window",
"reopens",
"every",
"few",
"seconds",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"emails",
"sent",
"by",
"this",
"campaign",
"may",
"look",
"spartan",
"to",
"the",
"professional",
"eye",
"but,",
"as",
"ever,",
"the",
"human",
"point",
"of",
"interaction",
"with",
"systems",
"is",
"the",
"most",
"vulnerable:",
"by",
"potentially",
"reaching",
"so",
"many",
"individuals,",
"campaigns",
"such",
"as",
"this",
"can",
"-",
"and",
"do",
"-",
"succeed",
"in",
"infecting",
"people."
] | [
16,
16,
16,
16,
16,
6,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
7,
16,
16,
16,
16,
16,
4,
6,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"MD5",
"43680D1914F28E14C90436E1D42984E2",
"20D4B9EB9377C499917C4D69BF4CCEBE",
"First",
"widely",
"distributed",
"Android",
"bootkit",
"Malware",
"infects",
"more",
"than",
"350,000",
"Devices",
"January",
"29",
",",
"2014",
"In",
"the",
"last",
"quarter",
"of",
"2013",
",",
"sale",
"of",
"a",
"Smartphone",
"with",
"ANDROID",
"operating",
"system",
"has",
"increased",
"and",
"every",
"second",
"person",
"you",
"see",
"is",
"a",
"DROID",
"user",
"."
] | [
16,
1,
1,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16
] |
[
"Most",
"custom",
"backdoors",
"used",
"by",
"advanced",
"attackers",
"have",
"limited",
"functionality."
] | [
16,
3,
11,
16,
16,
6,
14,
16,
16,
16
] |
[
"EVENTBOT",
"INFRASTRUCTURE",
"By",
"mapping",
"the",
"C2",
"servers",
",",
"a",
"clear",
",",
"repeated",
"pattern",
"emerges",
"based",
"on",
"the",
"specific",
"URL",
"gate_cb8a5aea1ab302f0_c",
"."
] | [
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"We",
"anticipate",
"this",
"malware",
"to",
"continue",
"to",
"evolve",
"with",
"additional",
"new",
"features",
";",
"the",
"only",
"question",
"now",
"is",
"when",
"we",
"will",
"see",
"the",
"next",
"wave",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"leads",
"us",
"to",
"believe",
"this",
"is",
"another",
"actor",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/Bifrose.nel",
"Win.Trojan.AutoIT-6333854-0",
"Trojan-Dropper.Win32.Autoit.bvg",
"Trojan.Win32.AutoIt.expdpu",
"BehavesLike.Win32.Backdoor.tc",
"Trojan.Win32.Z.Autoit.1633763",
"Dropper/Win32.Androm.C2387785",
"Win32/Injector.Autoit.DFJ",
"Backdoor.MSIL",
"W32/Injector.CYH!tr",
"Win32/Trojan.38f"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Several",
"analysis",
"reports",
"were",
"published",
"on",
"this",
"malware",
"in",
"2014",
"and",
",",
"finally",
",",
"the",
"source",
"code",
"was",
"leaked",
"in",
"2015",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"These",
"devices",
"were",
"located",
"in",
"the",
"following",
"countries",
":",
"How",
"we",
"protect",
"you",
"To",
"protect",
"Android",
"devices",
"and",
"users",
",",
"Google",
"Play",
"provides",
"a",
"complete",
"set",
"of",
"security",
"services",
"that",
"update",
"outside",
"of",
"platform",
"releases",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"MALWARE",
"UNDER",
"ACTIVE",
"DEVELOPMENT",
"EventBot",
"β",
"cfg",
"β",
"class",
"EventBot",
"β",
"cfg",
"β",
"class",
"."
] | [
16,
16,
16,
16,
3,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16
] |
[
"Over",
"the",
"past",
"couple",
"of",
"months",
"McAfee",
"Labs",
"has",
"seen",
"an",
"increase",
"in",
"the",
"usage",
"of",
"macros",
"to",
"deliver",
"malware."
] | [
16,
16,
16,
16,
16,
16,
4,
12,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
3
] |
[
"We",
"mostly",
"observe",
"attacks",
"using",
"Elirks",
"occurring",
"in",
"East",
"Asia."
] | [
16,
16,
16,
1,
16,
3,
16,
16,
2,
10
] |
[
"We",
"observed",
"an",
"anomaly",
"when",
"approximately",
"60",
"domains",
"all",
"[.]top",
"TLDs",
"registered",
"on",
"April",
"7,",
"2016",
"started",
"serving",
"a",
"coin",
"mining",
"malware",
"β",
"to",
"mine",
"BitMonero,",
"a",
"form",
"of",
"digital",
"currency",
"β",
"on",
"their",
"main",
"page",
"under",
"the",
"mime-type",
"of",
"html/text."
] | [
16,
16,
16,
16,
16,
16,
1,
9,
9,
9,
9,
9,
9,
0,
8,
8,
16,
16,
16,
3,
11,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.HfsAutoB.E147",
"Trojan.Banker.Win32.5895",
"Trojan/Banker.ju",
"W32/Banker.AJC",
"Win.Trojan.Bancos-852",
"Trojan-Banker.Win32.Banker.ju",
"Trojan.Win32.Banker.bmncx",
"Trojan.PWS.Banker.based",
"Trojan-Spy.Win32.Banker",
"W32/Banker.WTGS-4277",
"Trojan/Banker.Banker.ufm",
"Trojan[Banker]/Win32.Banker",
"Trojan-Banker.Win32.Banker.ju",
"TrojanBanker.Banker",
"Trojan.Banker!qguLAzH8AII",
"W32/Banker.DUU!tr",
"Trj/Banker.FWD",
"Win32/Trojan.a46"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"At",
"least",
"two",
"different",
"stealers,",
"Rhadamanthys",
"and",
"RedLine,",
"were",
"abusing",
"the",
"search",
"engine",
"promotion",
"plan",
"in",
"order",
"to",
"deliver",
"malicious",
"payloads",
"to",
"victims'",
"machines."
] | [
3,
16,
16,
16,
3,
11,
16,
3,
16,
16,
5,
13,
13,
16,
16,
16,
16,
16,
16,
3,
11,
16,
5,
13
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9925",
"Trojan.Win32.Graftor.bovqdb",
"TrojWare.Win32.GameThief.Nilage.~CRSH",
"TR/Graftor.Elzob.6117.1",
"Backdoor:Win32/Parcim.A",
"Trj/CI.A",
"Trojan.Graftor.Elzob.D17E5"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1
] |
[
"It",
"has",
"been",
"in",
"the",
"news",
"the",
"past",
"few",
"weeks",
"as",
"it",
"is",
"the",
"bot",
"that",
"was",
"used",
"in",
"the",
"DDoS",
"attack",
"on",
"Brian",
"Kreb's",
"security",
"blog."
] | [
16,
16,
16,
16,
16,
16,
16,
0,
8,
8,
16,
16,
16,
16,
3,
15,
16,
16,
16,
16,
1,
9,
16,
4,
12,
12,
12
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Jevafus.A",
"Trojan.Jevafus.A",
"Trojan.Jevafus.A",
"Trojan.Win32.Drop.euelge",
"Trojan.Jevafus.A",
"Trojan.Jevafus.A",
"BehavesLike.Win32.BadFile.vh",
"TrojanDropper:Win32/Jevafus.A",
"Trojan.Jevafus.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"So",
"far,",
"all",
"theories",
"regarding",
"the",
"spread",
"of",
"ExPetr/Petya",
"point",
"into",
"two",
"directions:"
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"What",
"β",
"s",
"more",
",",
"the",
"user",
"can",
"not",
"check",
"the",
"balance",
"via",
"mobile",
"banking",
"or",
"change",
"any",
"settings",
"there",
",",
"because",
"after",
"receiving",
"the",
"command",
"with",
"code",
"40",
",",
"the",
"Trojan",
"prevents",
"the",
"banking",
"app",
"from",
"running",
"on",
"the",
"phone",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"CatB",
"ransomware",
"family,",
"sometimes",
"referred",
"to",
"as",
"CatB99",
"or",
"Baxtoy,",
"was",
"first",
"observed",
"in",
"late",
"2022,",
"with",
"campaigns",
"being",
"observed",
"steadily",
"since",
"November."
] | [
3,
11,
11,
11,
16,
16,
16,
16,
3,
16,
3,
16,
16,
16,
16,
0,
8,
16,
6,
16,
16,
16,
16,
0
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Svectas.Win64.1",
"Packer.Win32.Katusha",
"TR/Svectas.smnlb",
"W64/Svectas.B!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1
] |
[
"PaloAltorecently",
"discovered",
"a",
"new",
"Android",
"Trojan",
"called",
"SpyNote",
"which",
"facilitates",
"remote",
"spying."
] | [
6,
16,
16,
16,
3,
11,
16,
3,
16,
16,
1,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.HfsAutoB.F81D",
"Trojan.Mikhail.Win32.4",
"Trojan.Ransom.Mischa.2",
"Ransom_MISCHA.SM",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Ransom_MISCHA.SM",
"Win32.Trojan-Ransom.Petya.D",
"Trojan-Ransom.Win32.Mikhail.a",
"Trojan.Win32.Petya.96256",
"Trojan.Encoder.4544",
"Trojan.Petr.a",
"TR/AD.Petya.Y.rxxx",
"Trojan[Ransom]/Win32.Mikhail",
"Ransom:Win32/Mischa.A",
"Trojan-Ransom.Win32.Mikhail.a",
"Trojan/Win32.Mischa.C1478164",
"Hoax.Mikhail",
"Trojan.Mikhail!"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Doc.Exploit.DDEautoexec-6346603-0",
"Exploit.Xml.DDEAuto.euqmxe",
"Trojan[Exploit]/MSOffice.DDE.c",
"Win32.Outbreak"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1
] |
[
"In",
"a",
"much-improved",
"Android",
"security",
"environment",
",",
"the",
"actors",
"behind",
"Agent",
"Smith",
"seem",
"to",
"have",
"moved",
"into",
"the",
"more",
"complex",
"world",
"of",
"constantly",
"searching",
"for",
"new",
"loopholes",
",",
"such",
"as",
"Janus",
",",
"Bundle",
"and",
"Man-in-the-Disk",
",",
"to",
"achieve",
"a",
"3-stage",
"infection",
"chain",
",",
"in",
"order",
"to",
"build",
"a",
"botnet",
"of",
"controlled",
"devices",
"to",
"earn",
"profit",
"for",
"the",
"perpetrator",
"."
] | [
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
7,
16,
7,
16,
7,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"end",
"result",
"is",
"a",
"new",
"banking",
"Trojan",
"in",
"the",
"wild."
] | [
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9899",
"HV_ROGUE_CG152C85.RDXN",
"Heur.Packed.Unknown",
"TR/Spy.Banker.45879",
"TrojanProxy:BAT/Banker.G",
"Win32/RiskWare.PEMalform.E"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan-Proxy/W32.Steredir.504832",
"Trojan/Proxy.Steredir.c",
"Trojan-Proxy.Win32.Steredir.c",
"Trojan.Win32.Steredir.fqli",
"Troj.Proxy.W32.Steredir.c!c",
"TrojWare.Win32.TrojanProxy.Steredir.C",
"Trojan.Stedir.11",
"Trojan.Steredir.Win32.7",
"Trojan-Dropper.Delf",
"W32/Risk.RESM-4501",
"TrojanProxy.Steredir.c",
"TR/Proxy.Steredir.C",
"Trojan[Proxy]/Win32.Steredir",
"Win32.Troj.Steredir.c.kcloud",
"Trojan.Heur.EFD23B1",
"Trojan.Win32.Proxy.504832",
"Trojan-Proxy.Win32.Steredir.c",
"TrojanProxy:Win32/Steredir.C",
"Win32/TrojanProxy.Steredir.C",
"Trojan.PR.Steredir!cYzY1isGQt0",
"W32/Steredir.C!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Do",
"not",
"download",
"mobile",
"apps",
"from",
"unofficial",
"or",
"unauthorized",
"sources",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Attitude",
"Change",
"The",
"disinterest",
"in",
"the",
"issues",
"appears",
"to",
"have",
"changed",
"with",
"The",
"New",
"York",
"Times",
"report",
",",
"which",
"lit",
"a",
"fire",
"underneath",
"Adups",
"and",
"BLU",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
12,
12,
16,
16,
16,
16,
16,
16,
16,
4,
16,
4,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"BehavesLike.Win32.Trojan.gc",
"Trojan.MSIL.Bladabindi.1",
"HackTool:MSIL/Injector.A",
"Trojan.LVBP.ED",
"Backdoor.Win32.DarkKomet"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.Win32.Hupigon!O",
"TrojanDropper.Dowque.A8",
"Backdoor.Hupigon.Win32.182",
"Backdoor/Hupigon.dkwt",
"TROJ_DOWQUE.NY",
"Win32.Trojan.Delf.b",
"W32/Backdoor2.CWRX",
"Backdoor.Graybird",
"TROJ_DOWQUE.NY",
"Win.Worm.Autorun-12451",
"Backdoor.Win32.Hupigon.56864",
"Backdoor.W32.Hupigon.l9fO",
"BackDoor.Graybird.75",
"BehavesLike.Win32.SpywareLyndra.tc",
"W32/Backdoor.DAWT-3367",
"Backdoor/Huigezi.2008.qny",
"BDS/Farfli.kj.2",
"Win32.TrojDownloader.dl.kcloud",
"TrojanDropper:Win32/Dowque.A",
"Trojan/Win32.Hupigon.C29670",
"Backdoor.Bot",
"Win32/Delf.NSN",
"Backdoor.Win32.Hupigon.dkw",
"Backdoor.Hupigon!hgCryiT987Y",
"Backdoor.Win32.HacDef",
"W32/Injector.fam!tr",
"Trojan.Win32.Downloader.M"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"file",
"is",
"named",
"in",
"such",
"a",
"way",
"as",
"to",
"confuse",
"WordPress",
"administrators",
"who",
"are",
"familiar",
"with",
"XML-RPC."
] | [
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
1
] |
[
"Conclusion",
"The",
"days",
"when",
"one",
"needed",
"in-depth",
"coding",
"knowledge",
"to",
"develop",
"malware",
"are",
"long",
"gone",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"HackTool.Win64.PSWDump.f",
"BehavesLike.Win64.SoftPulse.lh",
"HackTool.Mimikatz",
"HackTool.Win64.PSWDump.f"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1
] |
[
"The",
"story",
"was",
"about",
"a",
"new",
"vulnerability",
"for",
"*nix-based",
"systems",
"β",
"EternalRed",
"aka",
"SambaCry."
] | [
16,
16,
16,
16,
16,
7,
15,
16,
5,
13,
16,
3,
16,
3
] |
[
"sms_grab",
":",
"to",
"upload",
"periodically",
"the",
"SMS",
"messages",
"in",
"the",
"inbox",
"to",
"C2",
"server",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"There",
"have",
"been",
"an",
"emegerence",
"of",
"new",
"domains",
"for",
"FighterPOS",
"recently",
"and",
"I",
"discovered",
"a",
"whole",
"load",
"of",
"other",
"possible",
"domains",
"that",
"could",
"be",
"used",
"for",
"the",
"command",
"and",
"control."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
11,
16,
1,
9,
9
] |