tokens
sequencelengths 2
296
| ner_tags
sequencelengths 2
296
|
---|---|
[
"In",
"addition",
",",
"its",
"original",
"target",
"list",
"is",
"extremely",
"narrow",
"and",
"seems",
"to",
"be",
"focused",
"on",
"Spanish",
"banks",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"An",
"investigation",
"by",
"Wiz",
"Threat",
"Research",
"has",
"revealed",
"that",
"tens",
"of",
"thousands",
"of",
"websites",
"in",
"East",
"Asia",
"have",
"been",
"hijacked,",
"redirecting",
"users",
"to",
"adult-themed",
"content",
"over",
"the",
"last",
"few",
"months."
] | [
16,
16,
16,
4,
12,
12,
16,
16,
16,
1,
9,
9,
9,
9,
16,
2,
10,
16,
16,
1,
16,
16,
16,
1,
9,
16,
0,
8,
8,
8
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.FamVT.ExpiroPC.PE",
"Trojan.Symmi.D5257",
"Troj.Downloader.W32!c",
"Trojan.Click2.53876",
"BehavesLike.Win32.Comame.pc",
"TrojanProxy:Win32/Potukorp.A",
"Trj/CI.A",
"W32/Farfli.WF!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Dynamer.S467543",
"Trojan.Injector.Win32.474808",
"Trojan/Injector.dkps",
"Trojan.Zbot.191",
"Win32.Trojan.WisdomEyes.16070401.9500.9969",
"Ransom_NATAS.SM1",
"Win.Ransomware.Satan-5713061-0",
"Trojan.Win32.DKPS.elolak",
"Trojan.Win32.Z.Satan.189345",
"TrojWare.Win32.Lepoh.A",
"Trojan.Packed2.39908",
"Ransom_NATAS.SM1",
"BehavesLike.Win32.Trojan.cc",
"Ransom:Win32/Nasan.B!bit",
"Ransom.Satan/Variant",
"Trojan.Packed",
"Ransom.Satan",
"Win32/Filecoder.Natas.A",
"Win32.Trojan.Filecoder.Hqlr",
"Trojan-Ransom.Satan",
"Win32/Trojan.BO.91d"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Selfdel.B7",
"PUP.Optional.InstallMonster",
"Win32.Trojan.Kryptik.zv",
"Trojan.Win32.InstallCube.echedc",
"Application.Win32.ICLoader.VAL",
"Trojan.InstallCube.1058",
"Trojan.Win32.Crypt",
"Trojan.ExtenBro.od",
"Pua.Downloadmanager",
"GrayWare[AdWare]/Win32.SmartInstaller",
"Trojan.Barys.DD4DA",
"Trojan:Win32/Selfdel.B",
"PUP/Win32.ICLoader.R181040",
"TScope.Malware-Cryptor.SB",
"Trj/CI.A",
"Trojan.ExtenBro!",
"Win32/Trojan.d13"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Ransom.SintaCry",
"BehavesLike.Win32.Trojan.tc",
"Ransom:Win32/SintaCry.A",
"Win32.Trojan-Ransom.CryPy.C",
"Trojan/Win32.CryptXXX.C1966139",
"Python/Filecoder.AB",
"Trojan.Win32.CryPy.a"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"HW32.Packed.7656",
"Spyware.OnlineGames",
"Trojan.Barys.156",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Win32.Application.PUPStudio.A",
"BehavesLike.Win32.Backdoor.tc",
"TrojanDownloader:Win32/Neglemir.A",
"PUA.RiskWare.DYAMAR"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W97M/Downloader.clk",
"W97M.Downloader",
"W2KM_POWLOAD.UHAOEBF",
"Macro.Trojan.Dropperd.Auto",
"W2KM_POWLOAD.UHAOEBF",
"W97M/Downloader.ciz",
"Malicious_Behavior.SB",
"virus.office.qexvmc.1070"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"TrojanDownloader.Rovnix.AB4",
"Trojan.Rovnix",
"Trojan/Rovnix.af",
"Trojan.Cidox.E",
"TROJ_ROVNIX.SMA0",
"Win.Trojan.Rovnix-7",
"Trojan.Win32.Rovnix.dxtqfl",
"Trojan.Win32.Z.Rovnix.78336.D[h]",
"Trojan.Rovnix.Win32.624",
"TROJ_ROVNIX.SMA0",
"Trojan.Rovnix.cl",
"W32/Rovnix.AG!tr",
"Trojan/Win32.Rovnix",
"Trojan.Razy.D3C8A",
"Troj.W32.Rovnix!c",
"Trojan/Win32.Rovnix",
"TrojanDownloader:Win32/Rovnix.A",
"Trojan.Win32.Rovnix.jg",
"Trojan.Rovnix!Bc+f/jzbrBg",
"Trojan.Win32.Rovnix",
"Atros2.AGYW",
"Trj/Rovnix.B",
"Win32/Trojan.bb6"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"While",
"we",
"do",
"not",
"know",
"for",
"sure",
"the",
"source",
"of",
"these",
"details,",
"they",
"frequently",
"appear",
"on",
"public",
"websites,",
"such",
"as",
"LinkedIn",
"or",
"the",
"company's",
"own",
"website."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
16,
16,
4,
16,
1,
9,
9,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"TrojanDownloader.Delf",
"Downloader.Delf.Win32.55939",
"Win.Trojan.Delf-6394424-2",
"Trojan-Downloader.Win32.Delf.kqql",
"Trojan.Win32.Delf.evdbxm",
"Trojan.Win32.Z.Delf.912896",
"Troj.Downloader.W32.Delf!c",
"Trojan.DownLoad3.47593",
"Trojan-Downloader.Win32.Delf",
"W32/Trojan.NTEF-5615",
"TR/Downloader.lpmfp",
"Trojan-Downloader.Win32.Delf.kqql",
"Downloader/Win32.Delf.C2285081",
"Trj/GdSda.A",
"Win32.Trojan-downloader.Delf.Ammc",
"W32/Delf.CGH!tr.dldr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"In",
"this",
"case",
",",
"the",
"device",
"should",
"be",
"re-flashed",
"with",
"an",
"official",
"ROM",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"Trojan",
"stores",
"information",
"about",
"C",
"&",
"C",
"servers",
"and",
"the",
"data",
"harvested",
"from",
"the",
"infected",
"device",
"in",
"a",
"local",
"SQLite",
"database",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"We",
"first",
"started",
"tracking",
"Bread",
"(",
"also",
"known",
"as",
"Joker",
")",
"in",
"early",
"2017",
",",
"identifying",
"apps",
"designed",
"solely",
"for",
"SMS",
"fraud",
"."
] | [
16,
16,
16,
16,
3,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"strongly",
"suggested",
"that",
"the",
"banking",
"Trojans",
",",
"despite",
"differing",
"in",
"terms",
"of",
"capability",
",",
"belong",
"to",
"the",
"same",
"family",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Exp.SWF.CVE-2017-11292.1",
"Trojan.Maljava",
"SWF/Exploit.CVE-2017-11292.A",
"DOC.Z.CVE-2017-1129.10752",
"Exploit.CVE-2017-11292.1",
"SWF_EXPLOIT.YYRZ",
"Trojan.DWCI-31",
"EXP/CVE-2017-11292.B",
"Trojan[Exploit]/SWF.CVE-2017-11292.a",
"Trojan:O97M/Gamafeshi.A",
"Trojan.SWF.Exploit"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"We",
"were",
"also",
"able",
"to",
"link",
"the",
"FrozenCell",
"'s",
"Android",
"infrastructure",
"to",
"numerous",
"desktop",
"samples",
"that",
"are",
"part",
"of",
"the",
"larger",
"multi-platform",
"attack",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
3,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"hacker",
"proceeded",
"to",
"leak",
"archives",
"of",
"internal",
"Hacking",
"Team",
"tools",
"and",
"communications."
] | [
6,
14,
16,
16,
16,
16,
16,
16,
4,
12,
16,
16,
16
] |
[
"This",
"means",
"that",
"the",
"malware",
"can",
"do",
"anything",
"from",
"harvest",
"the",
"user",
"'s",
"banking",
"credentials",
",",
"to",
"monitoring",
"the",
"device",
"'s",
"location",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"addWifiConfig",
"method",
"code",
"fragments",
"β",
"camera",
"β",
"β",
"this",
"command",
"records",
"a",
"video/capture",
"a",
"photo",
"using",
"the",
"front-facing",
"camera",
"when",
"someone",
"next",
"unlocks",
"the",
"device",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Second",
"Phase",
"The",
"second",
"phase",
"dex",
"file",
"contains",
"3",
"main",
"services",
"that",
"are",
"being",
"used",
":",
"β’",
"ConnManager",
"-",
"handles",
"connections",
"to",
"the",
"C",
"&",
"C",
"β’",
"ReceiverManager",
"-",
"waits",
"for",
"incoming",
"calls",
"/",
"app",
"installations",
"β’",
"TaskManager",
"-",
"manages",
"the",
"data",
"collection",
"tasks",
"The",
"C",
"&",
"C",
"server",
"address",
"is",
"different",
"than",
"the",
"one",
"that",
"is",
"used",
"by",
"the",
"first",
"phase",
",",
"so",
"the",
"app",
"reconnects",
"to",
"the",
"new",
"server",
"as",
"well",
"as",
"starts",
"the",
"periodic",
"data",
"collector",
"tasks",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor/W32.Small.8192.U",
"Backdoor.Win32.Small!O",
"Backdoor.Small",
"Backdoor/Small.aad",
"BKDR_SMALL.LIY",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"W32/MalwareS.BJDC",
"BKDR_SMALL.LIY",
"Win.Trojan.Small-15022",
"Backdoor.Win32.Small.aad",
"Trojan.Win32.Small.cgfnz",
"Backdoor.Win32.A.Small.8192.J",
"Backdoor.Win32.Small.~C",
"W32/Risk.EHGV-6738",
"Backdoor/Small.cqd",
"W32.Malware.Downloader",
"BDS/Small.L",
"Trojan[Backdoor]/Win32.Small",
"Backdoor.W32.Small.aad!c",
"Backdoor.Win32.Small.aad",
"Backdoor:Win32/Neporoot.A",
"Trojan/Win32.Downloader.C113283",
"Backdoor.Small",
"Trj/CI.A",
"Win32.Backdoor.Small.Eckj",
"Trojan.DL.Troxen!zKvgG9AM1Ro",
"Backdoor.Win32.Small",
"W32/CMDer.AA!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Worm.Skypii",
"Trojan/Injector.aech",
"Trojan.Johnnie.D5D69",
"W32.Phopifas",
"Win.Trojan.Zbot-63011",
"Trojan-Dropper.Win32.Injector.tsab",
"Trojan.Win32.Zbot.crqlec",
"Trojan.Win32.Z.Johnnie.44972",
"Trojan.MulDrop2.64582",
"Trojan.Win32.Injector",
"W32/Trojan.GAQU-5890",
"TR/Buzus.A.287",
"Worm:Win32/Skypii.A",
"Trojan-Dropper.Win32.Injector.tsab",
"Trojan/Win32.Inject.R57535",
"BScope.Adware.Softpulse",
"Win32.Trojan-dropper.Injector.Hyah",
"W32/Inject.AEC!tr",
"Win32/Trojan.Downloader.31f"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Note",
"that",
"in",
"almost",
"all",
"cases",
",",
"this",
"payload",
"file",
",",
"contained",
"in",
"zip",
"archives",
",",
"is",
"named",
"β",
"setting",
"β",
"or",
"β",
"setting.o",
"β",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
1,
16,
16
] |
[
"Another",
"novelty",
"is",
"a",
"VPN-related",
"package",
",",
"which",
"is",
"based",
"on",
"OrbotVPN",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Brancud",
"Dropper.Wlord.Win32.197",
"Trojan/Dropper.Wlord.vg",
"Trojan.Barys.D14BD",
"W32/Backdoor2.FFAV",
"Win.Trojan.Delf-10381",
"Trojan.Win32.Pigeon.edgwvf",
"NetWorm.Win32.Kolab.~F",
"BackDoor.Pigeon.14364",
"BehavesLike.Win32.HLLP.vc",
"Trojan.Win32.ProcessHijack",
"W32/Backdoor.UDBV-8754",
"Win32.Troj.Wlord.vg.kcloud",
"Spyware.Wlord.Dr.2888704",
"TrojanDropper.Wlord",
"Win32/TrojanDropper.Delf.NQG",
"Win32.Trojan-dropper.Wlord.Wncj",
"Trojan.DR.Wlord!ooBDWiiijA4",
"Win32/Trojan.f50"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"]",
"top/",
"Oct",
"17",
",",
"2017",
"hxxp",
":",
"//online.bankaustria.at.id58729",
"[",
"."
] | [
9,
9,
16,
16,
16,
16,
1,
9,
9,
9,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9947",
"Trojan.Razy.D1B384",
"Backdoor:MSIL/Gataspi.A",
"Backdoor.NanoCore",
"Trj/GdSda.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.Win32.Proxyier!O",
"DNSChanger.cw",
"Trojan.Zusy.Elzob.D136F",
"TROJ_DNSCHANGER_0000063.TOMA",
"Win32.Trojan.WisdomEyes.16070401.9500.9713",
"TROJ_DNSCHANGER_0000063.TOMA",
"Win.Trojan.B-445",
"Backdoor.Win32.Simda.ph",
"Trojan.Win32.Simda.bxootp",
"Backdoor.Proxyier.Win32.9",
"BehavesLike.Win32.Backdoor.fc",
"Backdoor/Proxyier.o",
"Trojan/Win32.Proxyier",
"Trojan:Win64/Simda.A",
"Backdoor.Win32.Simda.ph",
"Trojan/Win32.Jorik.R13830",
"SScope.Trojan-Proxy.1821",
"Trojan.FakeAlert",
"Trojan.Win32.FakeAV",
"W32/Binder.RZ!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"malware",
"infected",
"a",
"wide",
"spread",
"of",
"Android",
"users",
"in",
"China,",
"stealing",
"their",
"bank",
"credentials",
"and",
"other",
"sensitive",
"personal",
"information."
] | [
16,
3,
16,
16,
16,
16,
16,
5,
13,
16,
2,
16,
16,
1,
9,
16,
1,
9,
9,
9
] |
[
"Like",
"many",
"other",
"bankers",
",",
"they",
"were",
"disguised",
"as",
"apps",
"for",
"popular",
"free",
"ad",
"services",
"in",
"Russia",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"UrlZone",
"is",
"a",
"banking",
"trojan",
"that",
"appeared",
"in",
"2009."
] | [
3,
16,
16,
3,
11,
15,
16,
16,
0
] |
[
"Port",
"6212",
":",
"Chrome",
"extraction",
"service",
"."
] | [
1,
9,
16,
5,
16,
16,
16
] |
[
"There",
"has",
"been",
"considerable",
"discussion",
"about",
"domain",
"fronting",
"following",
"the",
"release",
"of",
"a",
"paper",
"detailing",
"these",
"techniques."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"attack",
"was",
"dubbed",
"Dark",
"Seoul';",
"it",
"involved",
"wreaking",
"havoc",
"on",
"affected",
"systems",
"by",
"wiping",
"their",
"hard",
"drives,",
"in",
"addition",
"to",
"seeking",
"military",
"intelligence."
] | [
16,
1,
16,
16,
6,
14,
16,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Last",
"week,",
"Patrick",
"Wardle",
"published",
"a",
"very",
"nice",
"analysis",
"of",
"a",
"new",
"Backdoor",
"and",
"Dropper",
"used",
"by",
"HackingTeam,",
"which",
"is",
"apparently",
"alive",
"and",
"well."
] | [
0,
8,
16,
4,
12,
16,
16,
16,
16,
16,
16,
16,
3,
16,
3,
16,
16,
4,
16,
16,
16,
16,
16,
16
] |
[
"We",
"have",
"worked",
"with",
"Google",
"and",
"they",
"ensure",
"that",
"Google",
"Play",
"Protect",
"proactively",
"catches",
"apps",
"of",
"this",
"nature",
"."
] | [
16,
16,
16,
16,
4,
16,
16,
16,
16,
5,
13,
13,
16,
16,
16,
16,
16,
16,
16
] |
[
"Indicators",
"imply",
"an",
"exploitation",
"attempt,",
"that",
"may",
"not",
"have",
"been",
"successful."
] | [
1,
16,
16,
7,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Pdf.Fareit.A",
"PDF/PowerShell.C",
"Exploit.PDF.16243",
"HEUR_PDF.PS",
"TrojanDownloader:Win32/Perferd.A",
"PDF/Exploit.S3",
"PDF/PowerShell.ECC!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1
] |
[
"Figure",
"9",
"."
] | [
16,
16,
16
] |
[
"In",
"certain",
"situations",
",",
"variants",
"intercept",
"compromised",
"apps",
"β",
"original",
"legitimate",
"ads",
"display",
"events",
"and",
"report",
"back",
"to",
"the",
"intended",
"ad-exchange",
"with",
"the",
"β",
"Agent",
"Smith",
"β",
"campaign",
"hacker",
"β",
"s",
"ad",
"IDs",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Python.Simplified.b",
"Trojan.Py2Exe.HackSpy.ekhfvk",
"Trojan.DownLoader25.20169",
"Trojan.Python.Simplified.b",
"Trojan:Win32/Pitroj.A",
"Trj/CI.A",
"Win32.Trojan.Simplified.Dxmm",
"W32/Python_Simplified.B!tr",
"Win32/Trojan.IM.2b4"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Over",
"the",
"past",
"month,",
"Palo",
"Alto",
"Networks",
"has",
"observed",
"two",
"spam",
"campaigns",
"targeting",
"users",
"residing",
"in",
"Italy."
] | [
16,
16,
0,
8,
4,
12,
12,
16,
16,
16,
6,
14,
16,
16,
16,
16,
2
] |
[
"possibly",
"working",
"independently",
"while",
"sharing",
"information",
"between",
"themselves,",
"are",
"exploiting",
"the",
"Elasticsearch",
"vulnerability",
"primarily",
"to",
"establish",
"widespread",
"DDoS",
"botnet",
"infrastructures."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
7,
15,
15,
15,
16,
16,
16,
16,
3,
11,
5
] |
[
"It",
"detects",
"this",
"ransomware",
"(",
"AndroidOS/MalLocker.B",
")",
",",
"as",
"well",
"as",
"other",
"malicious",
"apps",
"and",
"files",
"using",
"cloud-based",
"protection",
"powered",
"by",
"deep",
"learning",
"and",
"heuristics",
",",
"in",
"addition",
"to",
"content-based",
"detection",
"."
] | [
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"cross-platform",
"win32-based",
"Mirai",
"spreader",
"and",
"botnet",
"is",
"in",
"the",
"wild",
"and",
"previously",
"discussed",
"publicly."
] | [
16,
5,
13,
3,
11,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"When",
"DualToy",
"began",
"to",
"spread",
"in",
"January",
"2015,",
"it",
"was",
"only",
"capable",
"of",
"infecting",
"Android",
"devices."
] | [
16,
3,
16,
16,
16,
16,
0,
8,
16,
16,
16,
16,
16,
16,
5,
13
] |
[
"This",
"group",
"is",
"well",
"known",
"for",
"a",
"widely",
"publicized",
"attack",
"involving",
"the",
"compromise",
"of",
"Forbes.com,",
"in",
"which",
"the",
"site",
"was",
"used",
"to",
"compromise",
"selected",
"targets",
"via",
"a",
"watering",
"hole",
"to",
"a",
"zero-day",
"Adobe",
"Flash",
"exploit."
] | [
16,
6,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
1,
9,
9,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
1,
9,
16,
16,
7,
3,
11,
11
] |
[
"For",
"example,",
"intended",
"victims",
"frequently",
"have",
"titles",
"of",
"Chief",
"Financial",
"Officer,",
"Head",
"of",
"Finance,",
"Senior",
"Vice",
"President,",
"Director",
"and",
"other",
"high",
"level",
"roles."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
4,
12,
12,
12,
12,
12,
12,
12,
12,
12,
16,
16,
4,
12,
12
] |
[
"One",
"of",
"the",
"most",
"impressive",
"features",
"of",
"this",
"malware",
"is",
"its",
"resilience",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Links",
"returned",
"by",
"a",
"Google",
"search,",
"however,",
"are",
"not",
"guaranteed",
"to",
"be",
"safe."
] | [
1,
16,
16,
5,
13,
13,
16,
16,
16,
16,
16,
16,
16
] |