tokens
sequencelengths
2
296
ner_tags
sequencelengths
2
296
[ "A", "full", "list", "of", "all", "possible", "commands", "with", "descriptions", "can", "be", "found", "in", "Appendix", "II", "below", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "As", "of", "late", "December", "2019,", "ITG03-derived", "macOS", "malware", "was", "discovered", "being", "hosted", "on", "a", "fake", "cryptocurrency-related", "website,", "also", "likely", "designed", "by", "ITG03." ]
[ 16, 16, 16, 0, 8, 6, 5, 3, 16, 16, 16, 16, 16, 1, 9, 9, 9, 16, 16, 16, 16, 6 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9982", "W32/Backdoor.TGTY-5139", "Backdoor.Trojan", "Win32/Smalldoor.RX", "BKDR_SHARK.WMP", "BackDoor.Werchan", "BKDR_SHARK.WMP", "W32/Backdoor2.HITJ", "Trojan.Graftor.Elzob.D3B3C", "TrojanProxy:Win32/Zolpiq.A", "Trojan/Win32.Dllbot.R811", "Backdoor.Swofi.121", "Win32/Trojan.256" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Tinba.WR4", "Trojan/Tinba.be", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "W32/Backdoor2.HYQY", "Trojan.Win32.Inject.dqhpeo", "TrojWare.Win32.Tinba.BD", "Trojan.PWS.Tinba.153", "Dropper.Injector.Win32.66634", "Trojan.Win32.Exploit", "W32/Backdoor.DVHN-3684", "TrojanDropper.Injector.avtd", "TR/Crypt.Xpack.182297", "Trojan[Dropper]/Win32.Injector", "Trojan/Win32.Small.R145411", "TrojanDropper.Injector", "Trojan.Symmi.DD5E0", "Win32/Tinba.BE", "Trojan.DR.Injector!OJez9sRxlMc", "W32/Deshacop.XO!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "BehavesLike.Win32.Dropper.dh", "Trojan.AD.Lnkget", "TR/AD.Lnkget.hrjck", "TrojanDownloader:BAT/Lnkget.B", "Trojan/Win32.PcClient.C204685" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1 ]
[ "The", "results", "are", "described", "in", "this", "report.The", "Trojan", "may", "then", "perform", "the", "following", "actions:Open", "and", "close", "the", "CD", "tray", "Steal", "Outlook", "password", "Steal", "login", "passwords", "to", "websites", "Intercept", "network", "traffic" ]
[ 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 1, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9 ]
[ "In", "addition,", "this", "template", "file", "could", "also", "potentially", "be", "used", "to", "download", "other", "malicious", "payloads", "to", "the", "victim", "s", "computer." ]
[ 16, 16, 16, 1, 9, 16, 16, 16, 16, 16, 16, 1, 16, 3, 11, 16, 16, 16, 16, 5 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/W32.Xorist.13824", "TrojanRansom.Xorist.bh", "Trojan/Xorist.bh", "Trojan.Xorist!Ff7hNbBp1Hc", "W32/NetworkWorm.ROB", "Trojan-Ransom.Win32.Xorist.bh", "Trojan.Encoder.91", "TR/Ransom.Xorist.BH.3", "Trojan/Xorist.q", "Trojan:Win32/Filecoder.D", "Trojan/Win32.Xorist", "Trojan-Ransom.Win32.Xorist" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "It", "also", "appears", "the", "apps", "may", "still", "be", "in", "development", "or", "incubation", ",", "maybe", "waiting", "for", "a", "β€œ", "right", "time", "”", "to", "inject", "the", "malicious", "codes", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "]", "com", "svc", "[", "." ]
[ 9, 9, 1, 9, 9 ]
[ "Coverage", "Additional", "ways", "our", "customers", "can", "detect", "and", "block", "this", "threat", "are", "listed", "below", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.KowinH.Worm", "Backdoor/W32.PopWin.17408", "Backdoor.Win32.Popwin!O", "Trojan.FakeMS.ED", "Win32.Trojan.WisdomEyes.16070401.9500.9938", "W32.Popwin", "Win32/Pipown.EI", "TROJ_NSPAK.A", "Backdoor.Win32.Popwin.anx", "Backdoor.Win32.Popwin.~IQ", "Trojan.Popwin", "TROJ_NSPAK.A", "Trojan[Backdoor]/Win32.Popwin", "Win32.Hack.NsPackT.a.kcloud", "Trojan:Win32/Pepatch.E", "Backdoor.Win32.Popwin.anx", "Worm/Win32.AutoRun.R7462", "Worm.Win32.AutoRun", "Win32/Backdoor.1ad" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "recent", "whois", "of", "β€œ", "goldncup.com", "”", "." ]
[ 16, 16, 16, 16, 16, 1, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.HfsAutoB.7B64", "Trojan/W32.DoS.188416.C", "DoS.Win32.Small!O", "Trojan.Small", "DoS.W32.Small.to1D", "W32/VirTool.TK", "Win.Trojan.Small-13866", "DoS.Win32.Small.ai", "Trojan.Win32.Small.bqdli", "Trojan.Win32.Small.188416", "Trojan.Inject.762", "Virus.Win32.Small", "W32/Tool.FQGY-6235", "DoS.Small.h", "HackTool[DoS]/Win32.Small", "DoS.Win32.Small.ai", "HackTool:Win32/Upsodos.A", "Trojan/Win32.Flooder.R118574", "DoS.Small", "Win32.Trojan.Small.Hpd", "Win32/Trojan.5b5" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Shamoon", "is", "designed", "to", "destroy", "computer", "hard", "drives", "by", "wiping", "the", "master", "boot", "record", "MBR", "and", "data", "irretrievably,", "unlike", "ransomware,", "which", "holds", "the", "data", "hostage", "for", "a", "fee." ]
[ 3, 16, 16, 16, 1, 9, 9, 9, 9, 9, 5, 13, 13, 13, 13, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.Turla", "Win32.Trojan.WisdomEyes.16070401.9500.9996", "Trojan.Turla", "Backdoor.Win32.Turla.u", "Trojan.Win32.FKM.evjxqd", "Backdoor.W32.Turla!c", "Win32.Backdoor.Turla.Agvc", "W32/Trojan.GDRU-3141", "Trojan.Win32.Z.Turla.37892", "Backdoor.Win32.Turla.u", "Trojan:Win32/Ouftap.B", "W32/Turla.TCW!tr.bdr", "Backdoor.Turla", "Trj/CI.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "To", "make", "the", "Twitoor", "botnet", "’", "s", "communication", "more", "resilient", ",", "botnet", "designers", "took", "various", "steps", "like", "encrypting", "their", "messages", ",", "using", "complex", "topologies", "of", "the", "C", "&", "C", "network", "–", "or", "using", "innovative", "means", "for", "communication", ",", "among", "them", "the", "use", "of", "social", "networks", "." ]
[ 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan-Downloader/W32.Cabby.379904", "Trojan.Mauvaise.SL1", "Ransom.Maktub", "Trojan/Filecoder.MaktubLocker.b", "W32/Trojan2.PUUQ", "Ransom_HPLOCKY.SME", "Trojan-Downloader.Win32.Cabby.zipxi", "Trojan.Win32.Cabby.ejsael", "Troj.Downloader.W32.Cabby.tnvB", "TrojWare.Win32.Cabby.SA", "Trojan.Encoder.7386", "Downloader.Cabby.Win32.1866", "Ransom_HPLOCKY.SME", "BehavesLike.Win32.ICLoader.fc", "W32/Trojan.RLTC-3878", "TrojanDownloader.Cabby.coy", "Trojan[Downloader]/Win32.Cabby", "Trojan-Downloader.Win32.Cabby.zipxi", "Trojan/Win32.Locky.R192278", "TrojanDownloader.Cabby", "Win32/Filecoder.MaktubLocker.B", "Trojan.DL.Cabby!", "Trojan.FileCryptor" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "attack", "On", "March", "24th", ",", "2013", ",", "the", "e-mail", "account", "of", "a", "high-profile", "Tibetan", "activist", "was", "hacked", "and", "used", "to", "send", "spear", "phishing", "e-mails", "to", "their", "contact", "list", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Based", "on", "the", "mutexes", "and", "domain", "names", "of", "some", "of", "their", "C", "C", "servers,", "BlackTech's", "campaigns", "are", "likely", "designed", "to", "steal", "their", "target's", "technology." ]
[ 16, 16, 16, 1, 16, 1, 9, 16, 16, 16, 16, 1, 9, 9, 6, 14, 16, 16, 16, 16, 1, 16, 16, 4 ]
[ "In", "2013", ",", "there", "was", "evidence", "of", "cooperation", "(", "most", "probably", "on", "a", "commercial", "basis", ")", "between", "different", "groups", "of", "virus", "writers", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.ChePro", "Win32.Trojan.WisdomEyes.16070401.9500.9810", "Trojan-Banker.Win32.ChePro.ink", "Trojan.Win32.ChePro.eihuuw", "Trojan.Win32.Z.Banker.266752", "Trojan.PWS.Banker1.15002", "BehavesLike.Win32.Worm.dc", "Trojan.Banker.ChePro.ctf", "TR/Spy.Banker.hgsvz", "Trojan.Renos.96", "Trojan-Banker.Win32.ChePro.ink", "Trojan:Win32/Tombrep.B", "Trojan/Win32.Banload.C579920", "TrojanBanker.ChePro", "Trj/GdSda.A", "Win32.Trojan.Spy.Ebgv", "W32/Banker.ABMA!tr.spy" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "This", "technique", "makes", "use", "of", "debuggers", "and", "software", "breakpoints", "useless", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Open", "Source", "Snort", "Subscriber", "Rule", "Set", "customers", "can", "stay", "up", "to", "date", "by", "downloading", "the", "latest", "rule", "pack", "available", "for", "purchase", "on", "Snort.org", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Figure", "1", "." ]
[ 16, 16, 16 ]
[ "Proofpoint", "recently", "observed", "a", "targeted", "email", "campaign", "attempting", "a", "spearphishing", "attack", "using", "a", "Game", "of", "Thrones", "lure." ]
[ 4, 16, 16, 6, 14, 14, 14, 16, 1, 9, 9, 16, 5, 13, 13, 13, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.FamVT.ExpiroPC.PE", "Win32.Trojan.WisdomEyes.16070401.9500.9727", "Heur.Corrupt.PE", "Trojan.Win32.Refpron", "Packed.Koblu.adu" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1 ]
[ "-", "SpyNote", "RAT", "was", "also", "collecting", "the", "device", "’", "s", "location", "to", "identify", "the", "exact", "location", "of", "the", "victim", "." ]
[ 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Without", "mobile", "threat", "detection", ",", "this", "attack", "would", "not", "be", "detected", ",", "leaving", "end", "users", "and", "organizations", "at", "risk", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Yet", "our", "statistics", "says", "that", "about", "60", "%", "of", "Android", "users", "are", "still", "sitting", "with", "Android", "4.4.2", "and", "below", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 5, 13, 13, 13, 16 ]
[ "Sending", "text", "β€œ", "call", "on", "”", "will", "activate", "the", "USSD", "payment", "confirmation", "service", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "blog", "describes", "an", "incident", "that", "took", "place", "in", "late", "September", "of", "2022." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 0, 8, 8, 8 ]
[ "[", "Note", ":", "The", "analysis", "of", "the", "functionality", "below", "describes", "a", "single", "app", ",", "but", "applies", "to", "all", "apps", "of", "the", "Android/AdDisplay.Ashas", "family", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 16 ]
[ "Using", "powerful", "filters,", "various", "methods", "of", "communication", "with", "its", "operators", "and", "an", "interesting", "persistence", "technique,", "it", "aims", "to", "exfiltrate", "selected", "files", "from", "governmental", "and", "public", "institutions,", "which", "are", "mostly", "focused", "on", "economic", "growth", "and", "cooperation", "in", "Central", "and", "Eastern", "Europe." ]
[ 16, 1, 9, 16, 16, 16, 1, 16, 16, 6, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 9, 16, 4, 16, 4, 12, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 2, 16, 2, 10 ]
[ "Our", "published", "investigations", "have", "now", "confirmed", "at", "least", "19", "individuals", "targeted", "with", "NSO", "in", "Mexico,", "including", "lawyers,", "politicians,", "journalists,", "anti-corruption", "activists,", "scientists,", "public", "health", "campaigners,", "government", "officials,", "and", "their", "family", "members." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16, 16, 4, 16, 2, 16, 4, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 16, 16, 4, 12 ]
[ "The", "Windows", "bot's", "spreading", "method", "for", "Mirai", "is", "very", "limited", "as", "well", "–", "it", "only", "delivers", "the", "Mirai", "bots", "to", "a", "Linux", "host", "from", "a", "Windows", "host", "if", "it", "successfully", "brute", "forces", "a", "remote", "telnet", "connection." ]
[ 16, 5, 3, 16, 16, 11, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 5, 13, 16, 16, 5, 13, 16, 16, 16, 1, 9, 9, 9, 9, 9 ]
[ "Regularly", "update", "and", "patch", "the", "router", "’", "s", "software", "and", "firmware", "to", "prevent", "exploits", ",", "and", "enable", "its", "built-in", "firewall", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "We", "expect", "to", "see", "more", "diversification", "in", "the", "social", "engineering", "lures", "this", "threat", "group", "employs", "as", "time", "goes", "on", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "malware", ",", "packaged", "within", "an", "Android", "game", "app", "called", "BrainTest", ",", "had", "been", "published", "to", "Google", "Play", "twice", "." ]
[ 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 3, 16, 16, 16, 16, 16, 5, 13, 16, 16 ]
[ "INTRODUCTION", "For", "the", "past", "few", "weeks", ",", "the", "Cybereason", "Nocturnus", "team", "has", "been", "investigating", "a", "new", "type", "of", "Android", "malware", "dubbed", "EventBot", ",", "which", "was", "first", "identified", "in", "March", "2020", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 4, 12, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "TrojanAPT.Garveep.MUE.DR4", "TROJ_TAPAOUX.B", "Win32.Trojan.WisdomEyes.16070401.9500.9680", "Backdoor.Trojan", "TROJ_TAPAOUX.B", "Trojan.Win32.Drop.bgdoxj", "Trojan.Win32.Tapaoux.357344", "Trojan.MulDrop1.12202", "Trojan.Win32.Pincav", "W32/Trojan.TEGY-1102", "Trojan:Win32/Tapaoux.A", "TR/Tapaoux.A.3", "Trojan[Backdoor]/Win32.Tusha", "Trojan:Win32/Tapaoux.A", "Dropper/Win32.Mudrop.C58765", "Trojan.Tapaoux.A", "Win32/Trojan.Dropper.663" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Figure", "5", "." ]
[ 16, 16, 16 ]
[ "Technical", "Analysis", "The", "repackaged", "applications", "are", "embedded", "with", "malicious", "code", ",", "which", "can", "be", "found", "in", "the", "com.golf", "package", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16 ]
[ "The", "sample", "we", "analyzed", "in", "October", ",", "for", "example", ",", "contains", "a", "plugin", "that", "is", "able", "to", "spy", "on", "internet", "connections", ",", "and", "can", "even", "divert", "some", "SSL", "connections", "and", "steal", "data", "from", "encrypted", "traffic", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "New", "scheme", ",", "same", "goal", "In", "the", "past", ",", "Android", "ransomware", "used", "a", "special", "permission", "called", "β€œ", "SYSTEM_ALERT_WINDOW", "”", "to", "display", "their", "ransom", "note", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "They", "are", "bolder", "and", "more", "reckless", "than", "their", "more", "experienced", "veteran", "counterparts." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Extract", "current", "GPS", "coordinates", "of", "the", "phone", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "criminals", "are", "also", "relying", "on", "a", "network", "of", "hacked", "servers", "to", "perform", "the", "multi-stage", "infection", "chain." ]
[ 16, 6, 16, 16, 16, 16, 16, 16, 16, 5, 13, 16, 16, 16, 1, 9, 9 ]
[ "Periodically", "Necurs", "goes", "offline", "and", "during", "these", "periods", "we", "typically", "see", "Locky", "activity", "decrease", "drastically." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "This", "particular", "ransomware", "appeared", "in", "2014", "when", "the", "operators", "of", "the", "Reveton", "Windows", "screen-locking", "ransomware", "decided", "to", "branch", "out", "and", "create", "an", "Android", "counterpart,", "which", "they", "began", "advertising", "on", "Russian-speaking", "hacking", "forums." ]
[ 16, 16, 3, 16, 16, 0, 16, 16, 6, 16, 3, 11, 11, 11, 11, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 6, 14, 14 ]
[ "The", "White", "House", "and", "Department", "of", "State", "are", "two", "of", "the", "most", "spectacular", "known", "victims." ]
[ 4, 12, 12, 12, 12, 12, 12, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.HfsAutoB.2E84", "Trojan.Facebook.VP", "Trojan.Chromex!ZGfUkXSe3KA", "Worm.Win32.Febipos.da", "Trojan:W32/Febipos.A", "Trojan.FBookCRTD.Win32.1277", "Worm/Febipos.h", "TR/Drop.Febipos.E.7", "Worm/Win32.Febipos.da", "Trojan/Win32.Febipos.N1033287704", "TrojanDropper:Win32/Febipos.E", "Win32.Trojan.Falsesign.Pcib", "Trojan.Chromex!ZGfUkXSe3KA", "Trojan.Win32.Spy", "Stolen.D87", "Trj/Thymus.J", "Win32/Trojan.357" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "This", "case", "study", "contains", "information", "from", "an", "engagement", "that", "the", "RSA", "Incident", "Response", "IR", "team", "worked", "during", "the", "September", "to", "October", "2013", "timeframe." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 12, 12, 12, 12, 16, 16, 16, 0, 16, 0, 8, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Packed.Win32.TDSS!O", "RiskWare.Tool.CK", "Trojan.Win32.AutoRun.omsr", "W32.SillyDC", "TROJ_LOSABEL.SMD", "Trojan.Killav-157", "Worm.Win32.AutoRun.rpm", "Worm.Win32.Autorun.74752.D[h]", "PE:Worm.Win32.DownLoad.jy!1075170189", "Worm.Win32.AutoRun.~KZI", "Worm.AutoRun.Win32.89087", "TROJ_LOSABEL.SMD", "BehavesLike.Win32.Downloader.cm", "Worm/Win32.AutoRun", "TrojanDownloader:Win32/Losabel.G", "Worm/Win32.AutoRun", "Downloader.Rozena" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.MSIL.DNGuard" ]
[ 16, 3, 16, 16, 16, 1 ]
[ "In", "the", "multiple", "incidents", "we", "have", "been", "involved", "in,", "the", "group", "has", "relied", "heavily", "on", "BeEF", "and", "Cobalt", "Strike." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 6, 14, 16, 16, 16, 16, 3, 16, 3, 11 ]
[ "The", "service", "name", "makes", "it", "clear", "that", "by", "applications", "the", "attackers", "mean", "MDM", "solutions", "that", "are", "business-specific", "tools", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Heur.RP.E74F56", "BKDR_INJECT.SMA", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Backdoor.Trojan", "BKDR_INJECT.SMA", "Win.Trojan.Downloader-50333", "TrojWare.Win32.Downloader.Inject.~E", "Trojan.DownLoad3.17548", "Backdoor.Win32.Nbdd", "W32/Trojan.LFAS-4542", "Trojan[Downloader]/Win32.Small", "TrojanDropper:Win32/Surin.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Apps", "that", "have", "this", "permission", "can", "draw", "a", "window", "that", "belongs", "to", "the", "system", "group", "and", "can", "’", "t", "be", "dismissed", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/W32.Mepaow.21127168", "Trojan.Win32.Mepaow!O", "Trojanpws.Qqpass.16554", "Trojan/Mepaow.mwv", "Win32.Trojan.WisdomEyes.16070401.9500.9707", "Win32/Oflwr.A!crypt", "HV_MEPAOW_CI053B4B.RDXN", "Win32.Trojan.FlyStudio.F", "Trojan.Win32.Mepaow.mwv", "Trojan.Win32.Mepaow.dbtqtp", "Trojan.Win32.A.Mepaow.647168.A", "Troj.W32.Mepaow.mwv!c", "Worm.Win32.Dropper.RA", "Trojan:W32/DelfInject.R", "Trojan.MulDrop3.13823", "Trojan.Mepaow.Win32.1575", "Packed.PePatch.hiy", "Trojan/Win32.Mepaow", "Trojan.Buzy.33", "Trojan.Win32.Mepaow.mwv", "Trojan:Win32/Rusparail.A", "Trojan.Mepaow", "Trj/CI.A", "Win32.Trojan.Spy.Pbpm", "Trojan.Mepaow!GQd1AlSBw3E", "W32/QQPass.ELG!tr.pws" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.TRSpy", "Trojan.DownLoader4.63572", "Trojan/Win32.ADH", "Trj/CI.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1 ]
[ "Many", "of", "these", "domains", "are", "compromised", "legitimate", "websites,", "and", "will", "automatically", "expire", "from", "this", "pulse", "within", "a", "month." ]
[ 16, 16, 16, 1, 16, 1, 9, 9, 16, 16, 16, 16, 16, 16, 16, 0, 8, 8 ]
[ "add", "a", "guard", "code", "to", "monitor", "its", "own", "processes," ]
[ 16, 16, 1, 9, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Onlinegames.P.mue", "Backdoor.Bot/Variant", "Trojan/Farfli.aag", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Trojan.Win32.Inject.brokcs", "TrojWare.Win32.Farfli.S", "Trojan.DownLoad3.17387", "BehavesLike.Win32.Virut.qh", "Win32.Troj.Injector.GD.kcloud", "Trojan.Graftor.DEF08", "W32.W.Otwycal.kYP3", "Trojan.Scar", "Win32/Farfli.AAG" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "First", ",", "it", "modifies", "the", "Zygote", "process", "." ]
[ 16, 16, 16, 16, 16, 5, 16, 16 ]
[ "There", "are", "various", "types", "of", "actors", "involved", "in", "the", "mobile", "malware", "industry", ":", "virus", "writers", ",", "testers", ",", "interface", "designers", "of", "both", "the", "malicious", "apps", "and", "the", "web", "pages", "they", "are", "distributed", "from", ",", "owners", "of", "the", "partner", "programs", "that", "spread", "the", "malware", ",", "and", "mobile", "botnet", "owners", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "early", "targets:", "a", "vast", "number", "of", "US", "military", "and", "government", "networks,", "including", "Wright", "Patterson", "and", "Kelly", "Air", "Force", "Bases,", "the", "Army", "Research", "Lab,", "the", "Naval", "Sea", "Systems", "Command", "in", "Indian", "Head,", "Maryland,", "NASA,", "and", "the", "Department", "of", "Energy", "labs." ]
[ 16, 16, 16, 16, 16, 16, 16, 4, 12, 16, 4, 12, 16, 4, 12, 16, 4, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 16, 4, 12, 12, 12, 12 ]
[ "Poseidon", "scans", "the", "memory", "for", "running", "processes", "and", "employs", "keystroke", "logging", "to", "gather", "payment", "card", "data", "and", "credentials." ]
[ 3, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 16, 1, 9, 9, 9, 16, 1 ]
[ "Its", "main", "task", "is", "to", "bypass", "the", "two-factor", "authentication", "of", "the", "client", "in", "the", "online", "banking", "system", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "This", "week", "Proofpoint", "researchers", "observed", "several", "noteworthy", "changes", "in", "the", "macros", "used", "by", "an", "actor", "we", "refer", "to", "as", "TA530,", "who", "we", "previously", "examined", "in", "relation", "to", "large-scale", "personalized", "malware", "campaigns" ]
[ 16, 16, 4, 12, 16, 16, 16, 16, 16, 16, 3, 16, 16, 6, 14, 16, 16, 16, 16, 6, 16, 16, 16, 16, 16, 16, 16, 6, 14, 14, 14 ]
[ "A", "backdoor", "also", "known", "as:", "W32.AutoITFldE1.Worm", "Trojan.AutoIT.AHP", "Worm.AUTOIT.Tupym.A", "W32/Tupym.worm", "W32.W.AutoRun.llU2", "WORM_SOHAND.SM", "Win32.Trojan.WisdomEyes.16070401.9500.9890", "W32/Autorun.SX", "W32.Svich", "WORM_SOHAND.SM", "Win.Worm.Autorun-313", "Virus.Win32.Virut.ce", "Trojan.AutoIT.AHP", "Trojan.AutoIT.AHP", "Virus.Win32.Virut.Ce", "Trojan.AutoIT.AHP", "Win32.Virut.56", "Worm.Autorun.Win32.63723", "Worm.Win32.AutoRun", "W32/Autorun.HBBB-2740", "Worm/AutoRun.agto", "WORM/Autorun.aaer", "Virus/Win32.Virut.ce", "Trojan.AutoIT.AHP", "Virus.Win32.Virut.ce", "Trojan:Win32/Peaac.A!gfc", "HEUR/Fakon.mwf", "Trojan.AutoIT.AHP", "I-Worm.Autoit.EB", "Worm.Win32.Autorun.fnc", "Trojan.Autoit.ZA", "W32/Autoit.AHP!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Rather,", "it", "uses", "a", "technique", "recently", "reported", "on", "by", "SensePost,", "which", "allows", "an", "attacker", "to", "craft", "a", "specifically", "created", "Microsoft", "Word", "document,", "which", "uses", "the", "Dynamic", "Data", "Exchange", "DDE", "protocol." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 6, 16, 16, 16, 16, 16, 1, 9, 9, 16, 16, 5, 13, 13, 13, 13, 13 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan-Downloader/W32.Greetyah.3584", "Trojandownloader.Greetyah", "Downloader-BW.d", "Trojan/Downloader.Greetyah.b", "Win32/Wmpatch.B", "TROJ_GREETYAH.B", "Trojan-Downloader.Win32.Greetyah.b", "Trojan.Win32.Greetyah.hjbl", "Trojan.Win32.Downloader.3584.DU", "Troj.Downloader.W32.Greetyah.b!c", "Trojan-Downloader.Win32.Greetyah.b", "Trojan.Sysman", "Downloader.Greetyah.Win32.1", "TROJ_GREETYAH.B", "Downloader-BW.d", "W32/Risk.VHLX-8577", "TrojanDownloader.Greetyah.b", "W32.Malware.Downloader", "Trojan[Downloader]/Win32.Greetyah", "Trojan.Barys.D7C0", "Trojan-Downloader.Win32.Greetyah.b", "TrojanDownloader:Win32/Greetyah.B", "Trojan/Win32.Downloader.R94251", "Win32/TrojanDownloader.Greetyah.B", "Win32.Trojan-downloader.Greetyah.Llho", "Trojan.DL.Greetyah!8XCxgqzFn7g", "Trojan-Downloader.Win32.Tiny", "W32/Greetyah.B!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9917", "Trojan.Win32.ExtenBro.dqxgxi", "TR/Downloader.A.15310", "TrojanDownloader:MSIL/Kilim.D", "Trj/CI.A", "Win32.Trojan.Downloader.Szvb", "Trojan.ExtenBro!", "MSIL/ExtenBro.BS!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Please", "install", "the", "app", "immediately", "to", "avoid", "blocking", "your", "account", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Initial", "request", "by", "EventBot", "Initial", "request", "by", "EventBot", "to", "run", "as", "a", "service", "." ]
[ 16, 16, 16, 3, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16 ]
[ "The", "exploit", "takes", "advantage", "of", "a", "buffer", "overflow", "vulnerability", "in", "the", "demo", "version", "of", "a", "program", "called", "Uploader!." ]
[ 16, 3, 16, 16, 16, 16, 7, 15, 15, 16, 16, 16, 16, 16, 16, 16, 16, 3 ]
[ "(", "Please", "note", "this", "is", "a", "different", "app", "and", "not", "the", "same", "as", "the", "one", "being", "spread", "by", "hxxp", ":", "//tiny", "[", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 9, 9, 9 ]
[ "The", "subject", "is", "a", "series", "of", "targeted", "attacks", "against", "private", "companies", "around", "the", "world." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.CoinMiner.q", "Win32/CoinMiner.TD", "Trojan.BAT.BitMin.f", "Trojan.BtcMine.941", "BehavesLike.Win32.Dropper.vc", "Trojan.Win32.CoinMiner", "TR/CoinMiner.nelvs", "Trojan.BAT.BitMin.f" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "HT_FASONG_GA250334.UVPM", "Win32.Trojan-PSW.OLGames.bm", "HT_FASONG_GA250334.UVPM", "Win.Worm.Fasong-5", "Win32.HLLW.Fasong.1", "Trojan.Scar.Win32.103683", "BehavesLike.Win32.BadFile.vh", "Worm.Win32.Fasong", "Worm:Win32/Fasong.I", "Trojan.Zusy.D3494E", "W32.W.Fasong.lZpB", "Win32/Fasong.J", "Trojan.Scar!YU9FfkV5QC0" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "FakeSpy", "has", "been", "in", "the", "wild", "since", "2017", ";", "this", "latest", "campaign", "indicates", "that", "it", "has", "become", "more", "powerful", "." ]
[ 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "eSurv", "'s", "logo", "is", "identical", "to", "the", "Command", "&", "Control", "server", "favicon", "." ]
[ 4, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "At", "the", "time", "of", "this", "writing", "the", "domain", "is", "still", "serving", "malware." ]
[ 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 3 ]
[ "Send", "your", "Bitcoin", "wallet", "ID", "and", "personal", "installation", "key", "to", "e-mail", "wowsmith123456@posteo.net." ]
[ 1, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9 ]
[ "Gooligan", ",", "a", "family", "of", "Android", "malware", "that", "came", "to", "light", "in", "November", "after", "it", "compromised", "more", "than", "1", "million", "Google", "accounts", ",", "contained", "similar", "abilities", "to", "tamper", "with", "Google", "Play", "ratings", "." ]
[ 3, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 16, 16 ]
[ "Obviously", ",", "this", "inevitably", "leaves", "the", "device", "open", "not", "only", "to", "further", "compromise", "but", "to", "data", "tampering", "as", "well", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "In", "this", "article,", "we", "will", "describe", "the", "details", "of", "our", "investigation." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Knownsec", "Security", "Team", "has", "followed", "up", "this", "incident", "ever", "since", "its", "happening." ]
[ 4, 12, 12, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.FamVT.ExpiroPC.PE", "Virus.Win32.Sality!O", "TrojanPWS.Vkont", "Win32.Trojan.WisdomEyes.16070401.9500.9998", "Trojan.Win32.Z.Packer.40610", "Troj.W32.AntiAV.lApy", "BehavesLike.Win32.HLLPPhilis.nc", "Trojan/PSW.VKont.c", "TR/PSW.VKont.wwdih", "PWS:Win32/Vkont.A", "Trj/StartPage.DGO", "Backdoor.Win32.Hupigon", "Win32/Trojan.2ff" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "As", "can", "be", "observed", ",", "the", "possibilities", "offered", "by", "the", "bot", "are", "pretty", "common", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Heuristic.BehavesLike.Win32.Packed.A", "TrojanDownloader:Win32/Whinetroe.A" ]
[ 16, 3, 16, 16, 16, 1, 1 ]
[ "The", "two", "reports", "describe", "the", "same", "cybercriminal", "gang", "which", "stole", "up", "to", "several", "hundreds", "of", "millions", "of", "dollars", "from", "various", "financial", "institutions." ]
[ 16, 16, 16, 16, 16, 16, 6, 14, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 12 ]
[ "A", "backdoor", "also", "known", "as:", "Worm/W32.Wozer.23552.B", "Worm.Wozer", "W32/Wozer.h", "Win32.Trojan.WisdomEyes.16070401.9500.9643", "W32/Wozer.F", "W32.Wozer.Worm", "Email-Worm.Win32.Wozer.h", "Trojan.Win32.Wozer.eokb", "W32.W.Wozer.h!c", "Win32.Worm-email.Wozer.Wozu", "Worm.Win32.Wozer.H", "Win32.HLLW.Wozer.4", "Worm.Wozer.Win32.11", "BehavesLike.Win32.Backdoor.mc", "Backdoor.Win32.Optix", "I-Worm.Wozer.c", "Worm:Win32/Wozer.G@mm", "Worm[Email]/Win32.Wozer", "Worm.Wozer.h.kcloud", "Email-Worm.Win32.Wozer.h", "Worm:Win32/Wozer.G@mm", "Trojan/Win32.Rirc.R100483", "Email-Worm.Wozer", "W32/Wozer.C.worm", "Win32/Wozer.H", "Worm.Wozer!/x/Vuw7rp3c", "W32/Wozer.H@mm", "Win32/Worm.Email-Worm.795" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "This", "post", "discusses", "our", "findings", "and", "potential", "security", "risks", "to", "iOS", "device", "users." ]
[ 16, 16, 16, 16, 16, 16, 7, 15, 15, 16, 5, 13, 4 ]
[ "A", "backdoor", "also", "known", "as:", "Rootkit.27428", "Trojan/W32.Rootkit.71040", "Rootkit.27428", "Backdoor.Rustock", "Rootkit.D6B24", "Win32.Trojan.WisdomEyes.16070401.9500.9984", "Hacktool.Rootkit", "Rootkit.27428", "Rootkit.27428", "Rootkit.27428", "BehavesLike.Win32.Virut.kc", "Win32.Troj.Undef.kcloud", "Backdoor.Rustock", "Trojan.Win32.Rootkit", "Win32/RootKit.Rootkit.3e8" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Our", "Umbrella", "telemetry", "shows", "that", "the", "majority", "of", "the", "request", "comes", "from", "Australia", "and", "the", "majority", "of", "the", "phone", "numbers", "infected", "have", "the", "international", "indicative", "for", "Australia", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Worm.Kalockan", "Trojan.Graftor.D46F63", "Win32.Trojan.WisdomEyes.16070401.9500.9926", "Trojan.Win32.Z.Graftor.143360.EV", "BackDoor.Tdss", "Worm.Win32.Kalockan", "Worm:Win32/Kalockan.A", "Trj/CI.A", "Win32/Trojan.621" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "]", "website", "107", "[", "." ]
[ 9, 9, 1, 9, 9 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Backdoor.Ciadoor.13.3", "W32/VB-Dropper-based.2!Maximus", "Backdoor.Ciadoor", "BKDR_CIAD1.TOMA", "Backdoor.Win32.Ciadoor.cvi", "Backdoor.Win32.Ciadoor!IK", "Backdoor.Win32.Ciadoor.G", "Trojan.DownLoader.62487", "BDS/Ciadoor.13.4", "BKDR_CIAD1.TOMA", "Backdoor/Ciadoor.130", "TrojanDropper:Win32/Ciadoor.C", "W32/VB-Dropper-based.2!Maximus", "Backdoor.Ciadoor.cvi", "Backdoor.CiaDoor.13", "Backdoor.Win32.Ciadoor", "W32/Ciadoor.V13!tr.bdr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]