tokens
sequencelengths
2
296
ner_tags
sequencelengths
2
296
[ "In", "addition", ",", "its", "original", "target", "list", "is", "extremely", "narrow", "and", "seems", "to", "be", "focused", "on", "Spanish", "banks", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "An", "investigation", "by", "Wiz", "Threat", "Research", "has", "revealed", "that", "tens", "of", "thousands", "of", "websites", "in", "East", "Asia", "have", "been", "hijacked,", "redirecting", "users", "to", "adult-themed", "content", "over", "the", "last", "few", "months." ]
[ 16, 16, 16, 4, 12, 12, 16, 16, 16, 1, 9, 9, 9, 9, 16, 2, 10, 16, 16, 1, 16, 16, 16, 1, 9, 16, 0, 8, 8, 8 ]
[ "A", "backdoor", "also", "known", "as:", "W32.FamVT.ExpiroPC.PE", "Trojan.Symmi.D5257", "Troj.Downloader.W32!c", "Trojan.Click2.53876", "BehavesLike.Win32.Comame.pc", "TrojanProxy:Win32/Potukorp.A", "Trj/CI.A", "W32/Farfli.WF!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Dynamer.S467543", "Trojan.Injector.Win32.474808", "Trojan/Injector.dkps", "Trojan.Zbot.191", "Win32.Trojan.WisdomEyes.16070401.9500.9969", "Ransom_NATAS.SM1", "Win.Ransomware.Satan-5713061-0", "Trojan.Win32.DKPS.elolak", "Trojan.Win32.Z.Satan.189345", "TrojWare.Win32.Lepoh.A", "Trojan.Packed2.39908", "Ransom_NATAS.SM1", "BehavesLike.Win32.Trojan.cc", "Ransom:Win32/Nasan.B!bit", "Ransom.Satan/Variant", "Trojan.Packed", "Ransom.Satan", "Win32/Filecoder.Natas.A", "Win32.Trojan.Filecoder.Hqlr", "Trojan-Ransom.Satan", "Win32/Trojan.BO.91d" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Selfdel.B7", "PUP.Optional.InstallMonster", "Win32.Trojan.Kryptik.zv", "Trojan.Win32.InstallCube.echedc", "Application.Win32.ICLoader.VAL", "Trojan.InstallCube.1058", "Trojan.Win32.Crypt", "Trojan.ExtenBro.od", "Pua.Downloadmanager", "GrayWare[AdWare]/Win32.SmartInstaller", "Trojan.Barys.DD4DA", "Trojan:Win32/Selfdel.B", "PUP/Win32.ICLoader.R181040", "TScope.Malware-Cryptor.SB", "Trj/CI.A", "Trojan.ExtenBro!", "Win32/Trojan.d13" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Ransom.SintaCry", "BehavesLike.Win32.Trojan.tc", "Ransom:Win32/SintaCry.A", "Win32.Trojan-Ransom.CryPy.C", "Trojan/Win32.CryptXXX.C1966139", "Python/Filecoder.AB", "Trojan.Win32.CryPy.a" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "HW32.Packed.7656", "Spyware.OnlineGames", "Trojan.Barys.156", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Win32.Application.PUPStudio.A", "BehavesLike.Win32.Backdoor.tc", "TrojanDownloader:Win32/Neglemir.A", "PUA.RiskWare.DYAMAR" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W97M/Downloader.clk", "W97M.Downloader", "W2KM_POWLOAD.UHAOEBF", "Macro.Trojan.Dropperd.Auto", "W2KM_POWLOAD.UHAOEBF", "W97M/Downloader.ciz", "Malicious_Behavior.SB", "virus.office.qexvmc.1070" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "TrojanDownloader.Rovnix.AB4", "Trojan.Rovnix", "Trojan/Rovnix.af", "Trojan.Cidox.E", "TROJ_ROVNIX.SMA0", "Win.Trojan.Rovnix-7", "Trojan.Win32.Rovnix.dxtqfl", "Trojan.Win32.Z.Rovnix.78336.D[h]", "Trojan.Rovnix.Win32.624", "TROJ_ROVNIX.SMA0", "Trojan.Rovnix.cl", "W32/Rovnix.AG!tr", "Trojan/Win32.Rovnix", "Trojan.Razy.D3C8A", "Troj.W32.Rovnix!c", "Trojan/Win32.Rovnix", "TrojanDownloader:Win32/Rovnix.A", "Trojan.Win32.Rovnix.jg", "Trojan.Rovnix!Bc+f/jzbrBg", "Trojan.Win32.Rovnix", "Atros2.AGYW", "Trj/Rovnix.B", "Win32/Trojan.bb6" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "While", "we", "do", "not", "know", "for", "sure", "the", "source", "of", "these", "details,", "they", "frequently", "appear", "on", "public", "websites,", "such", "as", "LinkedIn", "or", "the", "company's", "own", "website." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 16, 16, 4, 16, 1, 9, 9, 9 ]
[ "A", "backdoor", "also", "known", "as:", "TrojanDownloader.Delf", "Downloader.Delf.Win32.55939", "Win.Trojan.Delf-6394424-2", "Trojan-Downloader.Win32.Delf.kqql", "Trojan.Win32.Delf.evdbxm", "Trojan.Win32.Z.Delf.912896", "Troj.Downloader.W32.Delf!c", "Trojan.DownLoad3.47593", "Trojan-Downloader.Win32.Delf", "W32/Trojan.NTEF-5615", "TR/Downloader.lpmfp", "Trojan-Downloader.Win32.Delf.kqql", "Downloader/Win32.Delf.C2285081", "Trj/GdSda.A", "Win32.Trojan-downloader.Delf.Ammc", "W32/Delf.CGH!tr.dldr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "In", "this", "case", ",", "the", "device", "should", "be", "re-flashed", "with", "an", "official", "ROM", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "Trojan", "stores", "information", "about", "C", "&", "C", "servers", "and", "the", "data", "harvested", "from", "the", "infected", "device", "in", "a", "local", "SQLite", "database", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "We", "first", "started", "tracking", "Bread", "(", "also", "known", "as", "Joker", ")", "in", "early", "2017", ",", "identifying", "apps", "designed", "solely", "for", "SMS", "fraud", "." ]
[ 16, 16, 16, 16, 3, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "This", "strongly", "suggested", "that", "the", "banking", "Trojans", ",", "despite", "differing", "in", "terms", "of", "capability", ",", "belong", "to", "the", "same", "family", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Exp.SWF.CVE-2017-11292.1", "Trojan.Maljava", "SWF/Exploit.CVE-2017-11292.A", "DOC.Z.CVE-2017-1129.10752", "Exploit.CVE-2017-11292.1", "SWF_EXPLOIT.YYRZ", "Trojan.DWCI-31", "EXP/CVE-2017-11292.B", "Trojan[Exploit]/SWF.CVE-2017-11292.a", "Trojan:O97M/Gamafeshi.A", "Trojan.SWF.Exploit" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "We", "were", "also", "able", "to", "link", "the", "FrozenCell", "'s", "Android", "infrastructure", "to", "numerous", "desktop", "samples", "that", "are", "part", "of", "the", "larger", "multi-platform", "attack", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 3, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "hacker", "proceeded", "to", "leak", "archives", "of", "internal", "Hacking", "Team", "tools", "and", "communications." ]
[ 6, 14, 16, 16, 16, 16, 16, 16, 4, 12, 16, 16, 16 ]
[ "This", "means", "that", "the", "malware", "can", "do", "anything", "from", "harvest", "the", "user", "'s", "banking", "credentials", ",", "to", "monitoring", "the", "device", "'s", "location", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "addWifiConfig", "method", "code", "fragments", "β€˜", "camera", "’", "–", "this", "command", "records", "a", "video/capture", "a", "photo", "using", "the", "front-facing", "camera", "when", "someone", "next", "unlocks", "the", "device", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Second", "Phase", "The", "second", "phase", "dex", "file", "contains", "3", "main", "services", "that", "are", "being", "used", ":", "β€’", "ConnManager", "-", "handles", "connections", "to", "the", "C", "&", "C", "β€’", "ReceiverManager", "-", "waits", "for", "incoming", "calls", "/", "app", "installations", "β€’", "TaskManager", "-", "manages", "the", "data", "collection", "tasks", "The", "C", "&", "C", "server", "address", "is", "different", "than", "the", "one", "that", "is", "used", "by", "the", "first", "phase", ",", "so", "the", "app", "reconnects", "to", "the", "new", "server", "as", "well", "as", "starts", "the", "periodic", "data", "collector", "tasks", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor/W32.Small.8192.U", "Backdoor.Win32.Small!O", "Backdoor.Small", "Backdoor/Small.aad", "BKDR_SMALL.LIY", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "W32/MalwareS.BJDC", "BKDR_SMALL.LIY", "Win.Trojan.Small-15022", "Backdoor.Win32.Small.aad", "Trojan.Win32.Small.cgfnz", "Backdoor.Win32.A.Small.8192.J", "Backdoor.Win32.Small.~C", "W32/Risk.EHGV-6738", "Backdoor/Small.cqd", "W32.Malware.Downloader", "BDS/Small.L", "Trojan[Backdoor]/Win32.Small", "Backdoor.W32.Small.aad!c", "Backdoor.Win32.Small.aad", "Backdoor:Win32/Neporoot.A", "Trojan/Win32.Downloader.C113283", "Backdoor.Small", "Trj/CI.A", "Win32.Backdoor.Small.Eckj", "Trojan.DL.Troxen!zKvgG9AM1Ro", "Backdoor.Win32.Small", "W32/CMDer.AA!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Worm.Skypii", "Trojan/Injector.aech", "Trojan.Johnnie.D5D69", "W32.Phopifas", "Win.Trojan.Zbot-63011", "Trojan-Dropper.Win32.Injector.tsab", "Trojan.Win32.Zbot.crqlec", "Trojan.Win32.Z.Johnnie.44972", "Trojan.MulDrop2.64582", "Trojan.Win32.Injector", "W32/Trojan.GAQU-5890", "TR/Buzus.A.287", "Worm:Win32/Skypii.A", "Trojan-Dropper.Win32.Injector.tsab", "Trojan/Win32.Inject.R57535", "BScope.Adware.Softpulse", "Win32.Trojan-dropper.Injector.Hyah", "W32/Inject.AEC!tr", "Win32/Trojan.Downloader.31f" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Note", "that", "in", "almost", "all", "cases", ",", "this", "payload", "file", ",", "contained", "in", "zip", "archives", ",", "is", "named", "β€˜", "setting", "’", "or", "β€˜", "setting.o", "’", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 1, 16, 16 ]
[ "Another", "novelty", "is", "a", "VPN-related", "package", ",", "which", "is", "based", "on", "OrbotVPN", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Brancud", "Dropper.Wlord.Win32.197", "Trojan/Dropper.Wlord.vg", "Trojan.Barys.D14BD", "W32/Backdoor2.FFAV", "Win.Trojan.Delf-10381", "Trojan.Win32.Pigeon.edgwvf", "NetWorm.Win32.Kolab.~F", "BackDoor.Pigeon.14364", "BehavesLike.Win32.HLLP.vc", "Trojan.Win32.ProcessHijack", "W32/Backdoor.UDBV-8754", "Win32.Troj.Wlord.vg.kcloud", "Spyware.Wlord.Dr.2888704", "TrojanDropper.Wlord", "Win32/TrojanDropper.Delf.NQG", "Win32.Trojan-dropper.Wlord.Wncj", "Trojan.DR.Wlord!ooBDWiiijA4", "Win32/Trojan.f50" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "]", "top/", "Oct", "17", ",", "2017", "hxxp", ":", "//online.bankaustria.at.id58729", "[", "." ]
[ 9, 9, 16, 16, 16, 16, 1, 9, 9, 9, 9 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9947", "Trojan.Razy.D1B384", "Backdoor:MSIL/Gataspi.A", "Backdoor.NanoCore", "Trj/GdSda.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.Win32.Proxyier!O", "DNSChanger.cw", "Trojan.Zusy.Elzob.D136F", "TROJ_DNSCHANGER_0000063.TOMA", "Win32.Trojan.WisdomEyes.16070401.9500.9713", "TROJ_DNSCHANGER_0000063.TOMA", "Win.Trojan.B-445", "Backdoor.Win32.Simda.ph", "Trojan.Win32.Simda.bxootp", "Backdoor.Proxyier.Win32.9", "BehavesLike.Win32.Backdoor.fc", "Backdoor/Proxyier.o", "Trojan/Win32.Proxyier", "Trojan:Win64/Simda.A", "Backdoor.Win32.Simda.ph", "Trojan/Win32.Jorik.R13830", "SScope.Trojan-Proxy.1821", "Trojan.FakeAlert", "Trojan.Win32.FakeAV", "W32/Binder.RZ!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "malware", "infected", "a", "wide", "spread", "of", "Android", "users", "in", "China,", "stealing", "their", "bank", "credentials", "and", "other", "sensitive", "personal", "information." ]
[ 16, 3, 16, 16, 16, 16, 16, 5, 13, 16, 2, 16, 16, 1, 9, 16, 1, 9, 9, 9 ]
[ "Like", "many", "other", "bankers", ",", "they", "were", "disguised", "as", "apps", "for", "popular", "free", "ad", "services", "in", "Russia", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "UrlZone", "is", "a", "banking", "trojan", "that", "appeared", "in", "2009." ]
[ 3, 16, 16, 3, 11, 15, 16, 16, 0 ]
[ "Port", "6212", ":", "Chrome", "extraction", "service", "." ]
[ 1, 9, 16, 5, 16, 16, 16 ]
[ "There", "has", "been", "considerable", "discussion", "about", "domain", "fronting", "following", "the", "release", "of", "a", "paper", "detailing", "these", "techniques." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "This", "attack", "was", "dubbed", "Dark", "Seoul';", "it", "involved", "wreaking", "havoc", "on", "affected", "systems", "by", "wiping", "their", "hard", "drives,", "in", "addition", "to", "seeking", "military", "intelligence." ]
[ 16, 1, 16, 16, 6, 14, 16, 16, 16, 16, 16, 5, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Last", "week,", "Patrick", "Wardle", "published", "a", "very", "nice", "analysis", "of", "a", "new", "Backdoor", "and", "Dropper", "used", "by", "HackingTeam,", "which", "is", "apparently", "alive", "and", "well." ]
[ 0, 8, 16, 4, 12, 16, 16, 16, 16, 16, 16, 16, 3, 16, 3, 16, 16, 4, 16, 16, 16, 16, 16, 16 ]
[ "We", "have", "worked", "with", "Google", "and", "they", "ensure", "that", "Google", "Play", "Protect", "proactively", "catches", "apps", "of", "this", "nature", "." ]
[ 16, 16, 16, 16, 4, 16, 16, 16, 16, 5, 13, 13, 16, 16, 16, 16, 16, 16, 16 ]
[ "Indicators", "imply", "an", "exploitation", "attempt,", "that", "may", "not", "have", "been", "successful." ]
[ 1, 16, 16, 7, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Pdf.Fareit.A", "PDF/PowerShell.C", "Exploit.PDF.16243", "HEUR_PDF.PS", "TrojanDownloader:Win32/Perferd.A", "PDF/Exploit.S3", "PDF/PowerShell.ECC!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1 ]
[ "Figure", "9", "." ]
[ 16, 16, 16 ]
[ "In", "certain", "situations", ",", "variants", "intercept", "compromised", "apps", "’", "original", "legitimate", "ads", "display", "events", "and", "report", "back", "to", "the", "intended", "ad-exchange", "with", "the", "β€œ", "Agent", "Smith", "”", "campaign", "hacker", "’", "s", "ad", "IDs", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Python.Simplified.b", "Trojan.Py2Exe.HackSpy.ekhfvk", "Trojan.DownLoader25.20169", "Trojan.Python.Simplified.b", "Trojan:Win32/Pitroj.A", "Trj/CI.A", "Win32.Trojan.Simplified.Dxmm", "W32/Python_Simplified.B!tr", "Win32/Trojan.IM.2b4" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Over", "the", "past", "month,", "Palo", "Alto", "Networks", "has", "observed", "two", "spam", "campaigns", "targeting", "users", "residing", "in", "Italy." ]
[ 16, 16, 0, 8, 4, 12, 12, 16, 16, 16, 6, 14, 16, 16, 16, 16, 2 ]
[ "possibly", "working", "independently", "while", "sharing", "information", "between", "themselves,", "are", "exploiting", "the", "Elasticsearch", "vulnerability", "primarily", "to", "establish", "widespread", "DDoS", "botnet", "infrastructures." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 7, 15, 15, 15, 16, 16, 16, 16, 3, 11, 5 ]
[ "It", "detects", "this", "ransomware", "(", "AndroidOS/MalLocker.B", ")", ",", "as", "well", "as", "other", "malicious", "apps", "and", "files", "using", "cloud-based", "protection", "powered", "by", "deep", "learning", "and", "heuristics", ",", "in", "addition", "to", "content-based", "detection", "." ]
[ 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "cross-platform", "win32-based", "Mirai", "spreader", "and", "botnet", "is", "in", "the", "wild", "and", "previously", "discussed", "publicly." ]
[ 16, 5, 13, 3, 11, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "When", "DualToy", "began", "to", "spread", "in", "January", "2015,", "it", "was", "only", "capable", "of", "infecting", "Android", "devices." ]
[ 16, 3, 16, 16, 16, 16, 0, 8, 16, 16, 16, 16, 16, 16, 5, 13 ]
[ "This", "group", "is", "well", "known", "for", "a", "widely", "publicized", "attack", "involving", "the", "compromise", "of", "Forbes.com,", "in", "which", "the", "site", "was", "used", "to", "compromise", "selected", "targets", "via", "a", "watering", "hole", "to", "a", "zero-day", "Adobe", "Flash", "exploit." ]
[ 16, 6, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 1, 9, 9, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 1, 9, 16, 16, 7, 3, 11, 11 ]
[ "For", "example,", "intended", "victims", "frequently", "have", "titles", "of", "Chief", "Financial", "Officer,", "Head", "of", "Finance,", "Senior", "Vice", "President,", "Director", "and", "other", "high", "level", "roles." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 4, 12, 12, 12, 12, 12, 12, 12, 12, 12, 16, 16, 4, 12, 12 ]
[ "One", "of", "the", "most", "impressive", "features", "of", "this", "malware", "is", "its", "resilience", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Links", "returned", "by", "a", "Google", "search,", "however,", "are", "not", "guaranteed", "to", "be", "safe." ]
[ 1, 16, 16, 5, 13, 13, 16, 16, 16, 16, 16, 16, 16 ]