tokens
sequencelengths 2
296
| ner_tags
sequencelengths 2
296
|
---|---|
[
"A",
"full",
"list",
"of",
"all",
"possible",
"commands",
"with",
"descriptions",
"can",
"be",
"found",
"in",
"Appendix",
"II",
"below",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"As",
"of",
"late",
"December",
"2019,",
"ITG03-derived",
"macOS",
"malware",
"was",
"discovered",
"being",
"hosted",
"on",
"a",
"fake",
"cryptocurrency-related",
"website,",
"also",
"likely",
"designed",
"by",
"ITG03."
] | [
16,
16,
16,
0,
8,
6,
5,
3,
16,
16,
16,
16,
16,
1,
9,
9,
9,
16,
16,
16,
16,
6
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9982",
"W32/Backdoor.TGTY-5139",
"Backdoor.Trojan",
"Win32/Smalldoor.RX",
"BKDR_SHARK.WMP",
"BackDoor.Werchan",
"BKDR_SHARK.WMP",
"W32/Backdoor2.HITJ",
"Trojan.Graftor.Elzob.D3B3C",
"TrojanProxy:Win32/Zolpiq.A",
"Trojan/Win32.Dllbot.R811",
"Backdoor.Swofi.121",
"Win32/Trojan.256"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Tinba.WR4",
"Trojan/Tinba.be",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"W32/Backdoor2.HYQY",
"Trojan.Win32.Inject.dqhpeo",
"TrojWare.Win32.Tinba.BD",
"Trojan.PWS.Tinba.153",
"Dropper.Injector.Win32.66634",
"Trojan.Win32.Exploit",
"W32/Backdoor.DVHN-3684",
"TrojanDropper.Injector.avtd",
"TR/Crypt.Xpack.182297",
"Trojan[Dropper]/Win32.Injector",
"Trojan/Win32.Small.R145411",
"TrojanDropper.Injector",
"Trojan.Symmi.DD5E0",
"Win32/Tinba.BE",
"Trojan.DR.Injector!OJez9sRxlMc",
"W32/Deshacop.XO!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"BehavesLike.Win32.Dropper.dh",
"Trojan.AD.Lnkget",
"TR/AD.Lnkget.hrjck",
"TrojanDownloader:BAT/Lnkget.B",
"Trojan/Win32.PcClient.C204685"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1
] |
[
"The",
"results",
"are",
"described",
"in",
"this",
"report.The",
"Trojan",
"may",
"then",
"perform",
"the",
"following",
"actions:Open",
"and",
"close",
"the",
"CD",
"tray",
"Steal",
"Outlook",
"password",
"Steal",
"login",
"passwords",
"to",
"websites",
"Intercept",
"network",
"traffic"
] | [
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
1,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9
] |
[
"In",
"addition,",
"this",
"template",
"file",
"could",
"also",
"potentially",
"be",
"used",
"to",
"download",
"other",
"malicious",
"payloads",
"to",
"the",
"victim",
"s",
"computer."
] | [
16,
16,
16,
1,
9,
16,
16,
16,
16,
16,
16,
1,
16,
3,
11,
16,
16,
16,
16,
5
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/W32.Xorist.13824",
"TrojanRansom.Xorist.bh",
"Trojan/Xorist.bh",
"Trojan.Xorist!Ff7hNbBp1Hc",
"W32/NetworkWorm.ROB",
"Trojan-Ransom.Win32.Xorist.bh",
"Trojan.Encoder.91",
"TR/Ransom.Xorist.BH.3",
"Trojan/Xorist.q",
"Trojan:Win32/Filecoder.D",
"Trojan/Win32.Xorist",
"Trojan-Ransom.Win32.Xorist"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"It",
"also",
"appears",
"the",
"apps",
"may",
"still",
"be",
"in",
"development",
"or",
"incubation",
",",
"maybe",
"waiting",
"for",
"a",
"β",
"right",
"time",
"β",
"to",
"inject",
"the",
"malicious",
"codes",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"]",
"com",
"svc",
"[",
"."
] | [
9,
9,
1,
9,
9
] |
[
"Coverage",
"Additional",
"ways",
"our",
"customers",
"can",
"detect",
"and",
"block",
"this",
"threat",
"are",
"listed",
"below",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.KowinH.Worm",
"Backdoor/W32.PopWin.17408",
"Backdoor.Win32.Popwin!O",
"Trojan.FakeMS.ED",
"Win32.Trojan.WisdomEyes.16070401.9500.9938",
"W32.Popwin",
"Win32/Pipown.EI",
"TROJ_NSPAK.A",
"Backdoor.Win32.Popwin.anx",
"Backdoor.Win32.Popwin.~IQ",
"Trojan.Popwin",
"TROJ_NSPAK.A",
"Trojan[Backdoor]/Win32.Popwin",
"Win32.Hack.NsPackT.a.kcloud",
"Trojan:Win32/Pepatch.E",
"Backdoor.Win32.Popwin.anx",
"Worm/Win32.AutoRun.R7462",
"Worm.Win32.AutoRun",
"Win32/Backdoor.1ad"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"recent",
"whois",
"of",
"β",
"goldncup.com",
"β",
"."
] | [
16,
16,
16,
16,
16,
1,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.HfsAutoB.7B64",
"Trojan/W32.DoS.188416.C",
"DoS.Win32.Small!O",
"Trojan.Small",
"DoS.W32.Small.to1D",
"W32/VirTool.TK",
"Win.Trojan.Small-13866",
"DoS.Win32.Small.ai",
"Trojan.Win32.Small.bqdli",
"Trojan.Win32.Small.188416",
"Trojan.Inject.762",
"Virus.Win32.Small",
"W32/Tool.FQGY-6235",
"DoS.Small.h",
"HackTool[DoS]/Win32.Small",
"DoS.Win32.Small.ai",
"HackTool:Win32/Upsodos.A",
"Trojan/Win32.Flooder.R118574",
"DoS.Small",
"Win32.Trojan.Small.Hpd",
"Win32/Trojan.5b5"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Shamoon",
"is",
"designed",
"to",
"destroy",
"computer",
"hard",
"drives",
"by",
"wiping",
"the",
"master",
"boot",
"record",
"MBR",
"and",
"data",
"irretrievably,",
"unlike",
"ransomware,",
"which",
"holds",
"the",
"data",
"hostage",
"for",
"a",
"fee."
] | [
3,
16,
16,
16,
1,
9,
9,
9,
9,
9,
5,
13,
13,
13,
13,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.Turla",
"Win32.Trojan.WisdomEyes.16070401.9500.9996",
"Trojan.Turla",
"Backdoor.Win32.Turla.u",
"Trojan.Win32.FKM.evjxqd",
"Backdoor.W32.Turla!c",
"Win32.Backdoor.Turla.Agvc",
"W32/Trojan.GDRU-3141",
"Trojan.Win32.Z.Turla.37892",
"Backdoor.Win32.Turla.u",
"Trojan:Win32/Ouftap.B",
"W32/Turla.TCW!tr.bdr",
"Backdoor.Turla",
"Trj/CI.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"To",
"make",
"the",
"Twitoor",
"botnet",
"β",
"s",
"communication",
"more",
"resilient",
",",
"botnet",
"designers",
"took",
"various",
"steps",
"like",
"encrypting",
"their",
"messages",
",",
"using",
"complex",
"topologies",
"of",
"the",
"C",
"&",
"C",
"network",
"β",
"or",
"using",
"innovative",
"means",
"for",
"communication",
",",
"among",
"them",
"the",
"use",
"of",
"social",
"networks",
"."
] | [
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan-Downloader/W32.Cabby.379904",
"Trojan.Mauvaise.SL1",
"Ransom.Maktub",
"Trojan/Filecoder.MaktubLocker.b",
"W32/Trojan2.PUUQ",
"Ransom_HPLOCKY.SME",
"Trojan-Downloader.Win32.Cabby.zipxi",
"Trojan.Win32.Cabby.ejsael",
"Troj.Downloader.W32.Cabby.tnvB",
"TrojWare.Win32.Cabby.SA",
"Trojan.Encoder.7386",
"Downloader.Cabby.Win32.1866",
"Ransom_HPLOCKY.SME",
"BehavesLike.Win32.ICLoader.fc",
"W32/Trojan.RLTC-3878",
"TrojanDownloader.Cabby.coy",
"Trojan[Downloader]/Win32.Cabby",
"Trojan-Downloader.Win32.Cabby.zipxi",
"Trojan/Win32.Locky.R192278",
"TrojanDownloader.Cabby",
"Win32/Filecoder.MaktubLocker.B",
"Trojan.DL.Cabby!",
"Trojan.FileCryptor"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"attack",
"On",
"March",
"24th",
",",
"2013",
",",
"the",
"e-mail",
"account",
"of",
"a",
"high-profile",
"Tibetan",
"activist",
"was",
"hacked",
"and",
"used",
"to",
"send",
"spear",
"phishing",
"e-mails",
"to",
"their",
"contact",
"list",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Based",
"on",
"the",
"mutexes",
"and",
"domain",
"names",
"of",
"some",
"of",
"their",
"C",
"C",
"servers,",
"BlackTech's",
"campaigns",
"are",
"likely",
"designed",
"to",
"steal",
"their",
"target's",
"technology."
] | [
16,
16,
16,
1,
16,
1,
9,
16,
16,
16,
16,
1,
9,
9,
6,
14,
16,
16,
16,
16,
1,
16,
16,
4
] |
[
"In",
"2013",
",",
"there",
"was",
"evidence",
"of",
"cooperation",
"(",
"most",
"probably",
"on",
"a",
"commercial",
"basis",
")",
"between",
"different",
"groups",
"of",
"virus",
"writers",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.ChePro",
"Win32.Trojan.WisdomEyes.16070401.9500.9810",
"Trojan-Banker.Win32.ChePro.ink",
"Trojan.Win32.ChePro.eihuuw",
"Trojan.Win32.Z.Banker.266752",
"Trojan.PWS.Banker1.15002",
"BehavesLike.Win32.Worm.dc",
"Trojan.Banker.ChePro.ctf",
"TR/Spy.Banker.hgsvz",
"Trojan.Renos.96",
"Trojan-Banker.Win32.ChePro.ink",
"Trojan:Win32/Tombrep.B",
"Trojan/Win32.Banload.C579920",
"TrojanBanker.ChePro",
"Trj/GdSda.A",
"Win32.Trojan.Spy.Ebgv",
"W32/Banker.ABMA!tr.spy"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"This",
"technique",
"makes",
"use",
"of",
"debuggers",
"and",
"software",
"breakpoints",
"useless",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Open",
"Source",
"Snort",
"Subscriber",
"Rule",
"Set",
"customers",
"can",
"stay",
"up",
"to",
"date",
"by",
"downloading",
"the",
"latest",
"rule",
"pack",
"available",
"for",
"purchase",
"on",
"Snort.org",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Figure",
"1",
"."
] | [
16,
16,
16
] |
[
"Proofpoint",
"recently",
"observed",
"a",
"targeted",
"email",
"campaign",
"attempting",
"a",
"spearphishing",
"attack",
"using",
"a",
"Game",
"of",
"Thrones",
"lure."
] | [
4,
16,
16,
6,
14,
14,
14,
16,
1,
9,
9,
16,
5,
13,
13,
13,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.FamVT.ExpiroPC.PE",
"Win32.Trojan.WisdomEyes.16070401.9500.9727",
"Heur.Corrupt.PE",
"Trojan.Win32.Refpron",
"Packed.Koblu.adu"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1
] |
[
"-",
"SpyNote",
"RAT",
"was",
"also",
"collecting",
"the",
"device",
"β",
"s",
"location",
"to",
"identify",
"the",
"exact",
"location",
"of",
"the",
"victim",
"."
] | [
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Without",
"mobile",
"threat",
"detection",
",",
"this",
"attack",
"would",
"not",
"be",
"detected",
",",
"leaving",
"end",
"users",
"and",
"organizations",
"at",
"risk",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Yet",
"our",
"statistics",
"says",
"that",
"about",
"60",
"%",
"of",
"Android",
"users",
"are",
"still",
"sitting",
"with",
"Android",
"4.4.2",
"and",
"below",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
5,
13,
13,
13,
16
] |
[
"Sending",
"text",
"β",
"call",
"on",
"β",
"will",
"activate",
"the",
"USSD",
"payment",
"confirmation",
"service",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"blog",
"describes",
"an",
"incident",
"that",
"took",
"place",
"in",
"late",
"September",
"of",
"2022."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
0,
8,
8,
8
] |
[
"[",
"Note",
":",
"The",
"analysis",
"of",
"the",
"functionality",
"below",
"describes",
"a",
"single",
"app",
",",
"but",
"applies",
"to",
"all",
"apps",
"of",
"the",
"Android/AdDisplay.Ashas",
"family",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
16
] |
[
"Using",
"powerful",
"filters,",
"various",
"methods",
"of",
"communication",
"with",
"its",
"operators",
"and",
"an",
"interesting",
"persistence",
"technique,",
"it",
"aims",
"to",
"exfiltrate",
"selected",
"files",
"from",
"governmental",
"and",
"public",
"institutions,",
"which",
"are",
"mostly",
"focused",
"on",
"economic",
"growth",
"and",
"cooperation",
"in",
"Central",
"and",
"Eastern",
"Europe."
] | [
16,
1,
9,
16,
16,
16,
1,
16,
16,
6,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9,
16,
4,
16,
4,
12,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
2,
16,
2,
10
] |
[
"Our",
"published",
"investigations",
"have",
"now",
"confirmed",
"at",
"least",
"19",
"individuals",
"targeted",
"with",
"NSO",
"in",
"Mexico,",
"including",
"lawyers,",
"politicians,",
"journalists,",
"anti-corruption",
"activists,",
"scientists,",
"public",
"health",
"campaigners,",
"government",
"officials,",
"and",
"their",
"family",
"members."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
16,
4,
16,
2,
16,
4,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12,
16,
16,
4,
12
] |
[
"The",
"Windows",
"bot's",
"spreading",
"method",
"for",
"Mirai",
"is",
"very",
"limited",
"as",
"well",
"β",
"it",
"only",
"delivers",
"the",
"Mirai",
"bots",
"to",
"a",
"Linux",
"host",
"from",
"a",
"Windows",
"host",
"if",
"it",
"successfully",
"brute",
"forces",
"a",
"remote",
"telnet",
"connection."
] | [
16,
5,
3,
16,
16,
11,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
5,
13,
16,
16,
5,
13,
16,
16,
16,
1,
9,
9,
9,
9,
9
] |
[
"Regularly",
"update",
"and",
"patch",
"the",
"router",
"β",
"s",
"software",
"and",
"firmware",
"to",
"prevent",
"exploits",
",",
"and",
"enable",
"its",
"built-in",
"firewall",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"We",
"expect",
"to",
"see",
"more",
"diversification",
"in",
"the",
"social",
"engineering",
"lures",
"this",
"threat",
"group",
"employs",
"as",
"time",
"goes",
"on",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"malware",
",",
"packaged",
"within",
"an",
"Android",
"game",
"app",
"called",
"BrainTest",
",",
"had",
"been",
"published",
"to",
"Google",
"Play",
"twice",
"."
] | [
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
3,
16,
16,
16,
16,
16,
5,
13,
16,
16
] |
[
"INTRODUCTION",
"For",
"the",
"past",
"few",
"weeks",
",",
"the",
"Cybereason",
"Nocturnus",
"team",
"has",
"been",
"investigating",
"a",
"new",
"type",
"of",
"Android",
"malware",
"dubbed",
"EventBot",
",",
"which",
"was",
"first",
"identified",
"in",
"March",
"2020",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
4,
12,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"TrojanAPT.Garveep.MUE.DR4",
"TROJ_TAPAOUX.B",
"Win32.Trojan.WisdomEyes.16070401.9500.9680",
"Backdoor.Trojan",
"TROJ_TAPAOUX.B",
"Trojan.Win32.Drop.bgdoxj",
"Trojan.Win32.Tapaoux.357344",
"Trojan.MulDrop1.12202",
"Trojan.Win32.Pincav",
"W32/Trojan.TEGY-1102",
"Trojan:Win32/Tapaoux.A",
"TR/Tapaoux.A.3",
"Trojan[Backdoor]/Win32.Tusha",
"Trojan:Win32/Tapaoux.A",
"Dropper/Win32.Mudrop.C58765",
"Trojan.Tapaoux.A",
"Win32/Trojan.Dropper.663"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Figure",
"5",
"."
] | [
16,
16,
16
] |
[
"Technical",
"Analysis",
"The",
"repackaged",
"applications",
"are",
"embedded",
"with",
"malicious",
"code",
",",
"which",
"can",
"be",
"found",
"in",
"the",
"com.golf",
"package",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16
] |
[
"The",
"sample",
"we",
"analyzed",
"in",
"October",
",",
"for",
"example",
",",
"contains",
"a",
"plugin",
"that",
"is",
"able",
"to",
"spy",
"on",
"internet",
"connections",
",",
"and",
"can",
"even",
"divert",
"some",
"SSL",
"connections",
"and",
"steal",
"data",
"from",
"encrypted",
"traffic",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"New",
"scheme",
",",
"same",
"goal",
"In",
"the",
"past",
",",
"Android",
"ransomware",
"used",
"a",
"special",
"permission",
"called",
"β",
"SYSTEM_ALERT_WINDOW",
"β",
"to",
"display",
"their",
"ransom",
"note",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"They",
"are",
"bolder",
"and",
"more",
"reckless",
"than",
"their",
"more",
"experienced",
"veteran",
"counterparts."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Extract",
"current",
"GPS",
"coordinates",
"of",
"the",
"phone",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"criminals",
"are",
"also",
"relying",
"on",
"a",
"network",
"of",
"hacked",
"servers",
"to",
"perform",
"the",
"multi-stage",
"infection",
"chain."
] | [
16,
6,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16,
16,
16,
1,
9,
9
] |
[
"Periodically",
"Necurs",
"goes",
"offline",
"and",
"during",
"these",
"periods",
"we",
"typically",
"see",
"Locky",
"activity",
"decrease",
"drastically."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"particular",
"ransomware",
"appeared",
"in",
"2014",
"when",
"the",
"operators",
"of",
"the",
"Reveton",
"Windows",
"screen-locking",
"ransomware",
"decided",
"to",
"branch",
"out",
"and",
"create",
"an",
"Android",
"counterpart,",
"which",
"they",
"began",
"advertising",
"on",
"Russian-speaking",
"hacking",
"forums."
] | [
16,
16,
3,
16,
16,
0,
16,
16,
6,
16,
3,
11,
11,
11,
11,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
6,
14,
14
] |
[
"The",
"White",
"House",
"and",
"Department",
"of",
"State",
"are",
"two",
"of",
"the",
"most",
"spectacular",
"known",
"victims."
] | [
4,
12,
12,
12,
12,
12,
12,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.HfsAutoB.2E84",
"Trojan.Facebook.VP",
"Trojan.Chromex!ZGfUkXSe3KA",
"Worm.Win32.Febipos.da",
"Trojan:W32/Febipos.A",
"Trojan.FBookCRTD.Win32.1277",
"Worm/Febipos.h",
"TR/Drop.Febipos.E.7",
"Worm/Win32.Febipos.da",
"Trojan/Win32.Febipos.N1033287704",
"TrojanDropper:Win32/Febipos.E",
"Win32.Trojan.Falsesign.Pcib",
"Trojan.Chromex!ZGfUkXSe3KA",
"Trojan.Win32.Spy",
"Stolen.D87",
"Trj/Thymus.J",
"Win32/Trojan.357"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"This",
"case",
"study",
"contains",
"information",
"from",
"an",
"engagement",
"that",
"the",
"RSA",
"Incident",
"Response",
"IR",
"team",
"worked",
"during",
"the",
"September",
"to",
"October",
"2013",
"timeframe."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
12,
12,
12,
12,
16,
16,
16,
0,
16,
0,
8,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Packed.Win32.TDSS!O",
"RiskWare.Tool.CK",
"Trojan.Win32.AutoRun.omsr",
"W32.SillyDC",
"TROJ_LOSABEL.SMD",
"Trojan.Killav-157",
"Worm.Win32.AutoRun.rpm",
"Worm.Win32.Autorun.74752.D[h]",
"PE:Worm.Win32.DownLoad.jy!1075170189",
"Worm.Win32.AutoRun.~KZI",
"Worm.AutoRun.Win32.89087",
"TROJ_LOSABEL.SMD",
"BehavesLike.Win32.Downloader.cm",
"Worm/Win32.AutoRun",
"TrojanDownloader:Win32/Losabel.G",
"Worm/Win32.AutoRun",
"Downloader.Rozena"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.MSIL.DNGuard"
] | [
16,
3,
16,
16,
16,
1
] |
[
"In",
"the",
"multiple",
"incidents",
"we",
"have",
"been",
"involved",
"in,",
"the",
"group",
"has",
"relied",
"heavily",
"on",
"BeEF",
"and",
"Cobalt",
"Strike."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
6,
14,
16,
16,
16,
16,
3,
16,
3,
11
] |
[
"The",
"service",
"name",
"makes",
"it",
"clear",
"that",
"by",
"applications",
"the",
"attackers",
"mean",
"MDM",
"solutions",
"that",
"are",
"business-specific",
"tools",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Heur.RP.E74F56",
"BKDR_INJECT.SMA",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Backdoor.Trojan",
"BKDR_INJECT.SMA",
"Win.Trojan.Downloader-50333",
"TrojWare.Win32.Downloader.Inject.~E",
"Trojan.DownLoad3.17548",
"Backdoor.Win32.Nbdd",
"W32/Trojan.LFAS-4542",
"Trojan[Downloader]/Win32.Small",
"TrojanDropper:Win32/Surin.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Apps",
"that",
"have",
"this",
"permission",
"can",
"draw",
"a",
"window",
"that",
"belongs",
"to",
"the",
"system",
"group",
"and",
"can",
"β",
"t",
"be",
"dismissed",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/W32.Mepaow.21127168",
"Trojan.Win32.Mepaow!O",
"Trojanpws.Qqpass.16554",
"Trojan/Mepaow.mwv",
"Win32.Trojan.WisdomEyes.16070401.9500.9707",
"Win32/Oflwr.A!crypt",
"HV_MEPAOW_CI053B4B.RDXN",
"Win32.Trojan.FlyStudio.F",
"Trojan.Win32.Mepaow.mwv",
"Trojan.Win32.Mepaow.dbtqtp",
"Trojan.Win32.A.Mepaow.647168.A",
"Troj.W32.Mepaow.mwv!c",
"Worm.Win32.Dropper.RA",
"Trojan:W32/DelfInject.R",
"Trojan.MulDrop3.13823",
"Trojan.Mepaow.Win32.1575",
"Packed.PePatch.hiy",
"Trojan/Win32.Mepaow",
"Trojan.Buzy.33",
"Trojan.Win32.Mepaow.mwv",
"Trojan:Win32/Rusparail.A",
"Trojan.Mepaow",
"Trj/CI.A",
"Win32.Trojan.Spy.Pbpm",
"Trojan.Mepaow!GQd1AlSBw3E",
"W32/QQPass.ELG!tr.pws"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.TRSpy",
"Trojan.DownLoader4.63572",
"Trojan/Win32.ADH",
"Trj/CI.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1
] |
[
"Many",
"of",
"these",
"domains",
"are",
"compromised",
"legitimate",
"websites,",
"and",
"will",
"automatically",
"expire",
"from",
"this",
"pulse",
"within",
"a",
"month."
] | [
16,
16,
16,
1,
16,
1,
9,
9,
16,
16,
16,
16,
16,
16,
16,
0,
8,
8
] |
[
"add",
"a",
"guard",
"code",
"to",
"monitor",
"its",
"own",
"processes,"
] | [
16,
16,
1,
9,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Onlinegames.P.mue",
"Backdoor.Bot/Variant",
"Trojan/Farfli.aag",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Trojan.Win32.Inject.brokcs",
"TrojWare.Win32.Farfli.S",
"Trojan.DownLoad3.17387",
"BehavesLike.Win32.Virut.qh",
"Win32.Troj.Injector.GD.kcloud",
"Trojan.Graftor.DEF08",
"W32.W.Otwycal.kYP3",
"Trojan.Scar",
"Win32/Farfli.AAG"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"First",
",",
"it",
"modifies",
"the",
"Zygote",
"process",
"."
] | [
16,
16,
16,
16,
16,
5,
16,
16
] |
[
"There",
"are",
"various",
"types",
"of",
"actors",
"involved",
"in",
"the",
"mobile",
"malware",
"industry",
":",
"virus",
"writers",
",",
"testers",
",",
"interface",
"designers",
"of",
"both",
"the",
"malicious",
"apps",
"and",
"the",
"web",
"pages",
"they",
"are",
"distributed",
"from",
",",
"owners",
"of",
"the",
"partner",
"programs",
"that",
"spread",
"the",
"malware",
",",
"and",
"mobile",
"botnet",
"owners",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"early",
"targets:",
"a",
"vast",
"number",
"of",
"US",
"military",
"and",
"government",
"networks,",
"including",
"Wright",
"Patterson",
"and",
"Kelly",
"Air",
"Force",
"Bases,",
"the",
"Army",
"Research",
"Lab,",
"the",
"Naval",
"Sea",
"Systems",
"Command",
"in",
"Indian",
"Head,",
"Maryland,",
"NASA,",
"and",
"the",
"Department",
"of",
"Energy",
"labs."
] | [
16,
16,
16,
16,
16,
16,
16,
4,
12,
16,
4,
12,
16,
4,
12,
16,
4,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12,
16,
4,
12,
12,
12,
12
] |
[
"Poseidon",
"scans",
"the",
"memory",
"for",
"running",
"processes",
"and",
"employs",
"keystroke",
"logging",
"to",
"gather",
"payment",
"card",
"data",
"and",
"credentials."
] | [
3,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
16,
1,
9,
9,
9,
16,
1
] |
[
"Its",
"main",
"task",
"is",
"to",
"bypass",
"the",
"two-factor",
"authentication",
"of",
"the",
"client",
"in",
"the",
"online",
"banking",
"system",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"week",
"Proofpoint",
"researchers",
"observed",
"several",
"noteworthy",
"changes",
"in",
"the",
"macros",
"used",
"by",
"an",
"actor",
"we",
"refer",
"to",
"as",
"TA530,",
"who",
"we",
"previously",
"examined",
"in",
"relation",
"to",
"large-scale",
"personalized",
"malware",
"campaigns"
] | [
16,
16,
4,
12,
16,
16,
16,
16,
16,
16,
3,
16,
16,
6,
14,
16,
16,
16,
16,
6,
16,
16,
16,
16,
16,
16,
16,
6,
14,
14,
14
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.AutoITFldE1.Worm",
"Trojan.AutoIT.AHP",
"Worm.AUTOIT.Tupym.A",
"W32/Tupym.worm",
"W32.W.AutoRun.llU2",
"WORM_SOHAND.SM",
"Win32.Trojan.WisdomEyes.16070401.9500.9890",
"W32/Autorun.SX",
"W32.Svich",
"WORM_SOHAND.SM",
"Win.Worm.Autorun-313",
"Virus.Win32.Virut.ce",
"Trojan.AutoIT.AHP",
"Trojan.AutoIT.AHP",
"Virus.Win32.Virut.Ce",
"Trojan.AutoIT.AHP",
"Win32.Virut.56",
"Worm.Autorun.Win32.63723",
"Worm.Win32.AutoRun",
"W32/Autorun.HBBB-2740",
"Worm/AutoRun.agto",
"WORM/Autorun.aaer",
"Virus/Win32.Virut.ce",
"Trojan.AutoIT.AHP",
"Virus.Win32.Virut.ce",
"Trojan:Win32/Peaac.A!gfc",
"HEUR/Fakon.mwf",
"Trojan.AutoIT.AHP",
"I-Worm.Autoit.EB",
"Worm.Win32.Autorun.fnc",
"Trojan.Autoit.ZA",
"W32/Autoit.AHP!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Rather,",
"it",
"uses",
"a",
"technique",
"recently",
"reported",
"on",
"by",
"SensePost,",
"which",
"allows",
"an",
"attacker",
"to",
"craft",
"a",
"specifically",
"created",
"Microsoft",
"Word",
"document,",
"which",
"uses",
"the",
"Dynamic",
"Data",
"Exchange",
"DDE",
"protocol."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
6,
16,
16,
16,
16,
16,
1,
9,
9,
16,
16,
5,
13,
13,
13,
13,
13
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan-Downloader/W32.Greetyah.3584",
"Trojandownloader.Greetyah",
"Downloader-BW.d",
"Trojan/Downloader.Greetyah.b",
"Win32/Wmpatch.B",
"TROJ_GREETYAH.B",
"Trojan-Downloader.Win32.Greetyah.b",
"Trojan.Win32.Greetyah.hjbl",
"Trojan.Win32.Downloader.3584.DU",
"Troj.Downloader.W32.Greetyah.b!c",
"Trojan-Downloader.Win32.Greetyah.b",
"Trojan.Sysman",
"Downloader.Greetyah.Win32.1",
"TROJ_GREETYAH.B",
"Downloader-BW.d",
"W32/Risk.VHLX-8577",
"TrojanDownloader.Greetyah.b",
"W32.Malware.Downloader",
"Trojan[Downloader]/Win32.Greetyah",
"Trojan.Barys.D7C0",
"Trojan-Downloader.Win32.Greetyah.b",
"TrojanDownloader:Win32/Greetyah.B",
"Trojan/Win32.Downloader.R94251",
"Win32/TrojanDownloader.Greetyah.B",
"Win32.Trojan-downloader.Greetyah.Llho",
"Trojan.DL.Greetyah!8XCxgqzFn7g",
"Trojan-Downloader.Win32.Tiny",
"W32/Greetyah.B!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9917",
"Trojan.Win32.ExtenBro.dqxgxi",
"TR/Downloader.A.15310",
"TrojanDownloader:MSIL/Kilim.D",
"Trj/CI.A",
"Win32.Trojan.Downloader.Szvb",
"Trojan.ExtenBro!",
"MSIL/ExtenBro.BS!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Please",
"install",
"the",
"app",
"immediately",
"to",
"avoid",
"blocking",
"your",
"account",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Initial",
"request",
"by",
"EventBot",
"Initial",
"request",
"by",
"EventBot",
"to",
"run",
"as",
"a",
"service",
"."
] | [
16,
16,
16,
3,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16
] |
[
"The",
"exploit",
"takes",
"advantage",
"of",
"a",
"buffer",
"overflow",
"vulnerability",
"in",
"the",
"demo",
"version",
"of",
"a",
"program",
"called",
"Uploader!."
] | [
16,
3,
16,
16,
16,
16,
7,
15,
15,
16,
16,
16,
16,
16,
16,
16,
16,
3
] |
[
"(",
"Please",
"note",
"this",
"is",
"a",
"different",
"app",
"and",
"not",
"the",
"same",
"as",
"the",
"one",
"being",
"spread",
"by",
"hxxp",
":",
"//tiny",
"[",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9,
9,
9
] |
[
"The",
"subject",
"is",
"a",
"series",
"of",
"targeted",
"attacks",
"against",
"private",
"companies",
"around",
"the",
"world."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.CoinMiner.q",
"Win32/CoinMiner.TD",
"Trojan.BAT.BitMin.f",
"Trojan.BtcMine.941",
"BehavesLike.Win32.Dropper.vc",
"Trojan.Win32.CoinMiner",
"TR/CoinMiner.nelvs",
"Trojan.BAT.BitMin.f"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"HT_FASONG_GA250334.UVPM",
"Win32.Trojan-PSW.OLGames.bm",
"HT_FASONG_GA250334.UVPM",
"Win.Worm.Fasong-5",
"Win32.HLLW.Fasong.1",
"Trojan.Scar.Win32.103683",
"BehavesLike.Win32.BadFile.vh",
"Worm.Win32.Fasong",
"Worm:Win32/Fasong.I",
"Trojan.Zusy.D3494E",
"W32.W.Fasong.lZpB",
"Win32/Fasong.J",
"Trojan.Scar!YU9FfkV5QC0"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"FakeSpy",
"has",
"been",
"in",
"the",
"wild",
"since",
"2017",
";",
"this",
"latest",
"campaign",
"indicates",
"that",
"it",
"has",
"become",
"more",
"powerful",
"."
] | [
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"eSurv",
"'s",
"logo",
"is",
"identical",
"to",
"the",
"Command",
"&",
"Control",
"server",
"favicon",
"."
] | [
4,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"At",
"the",
"time",
"of",
"this",
"writing",
"the",
"domain",
"is",
"still",
"serving",
"malware."
] | [
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
3
] |
[
"Send",
"your",
"Bitcoin",
"wallet",
"ID",
"and",
"personal",
"installation",
"key",
"to",
"e-mail",
"wowsmith123456@posteo.net."
] | [
1,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9
] |
[
"Gooligan",
",",
"a",
"family",
"of",
"Android",
"malware",
"that",
"came",
"to",
"light",
"in",
"November",
"after",
"it",
"compromised",
"more",
"than",
"1",
"million",
"Google",
"accounts",
",",
"contained",
"similar",
"abilities",
"to",
"tamper",
"with",
"Google",
"Play",
"ratings",
"."
] | [
3,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16,
16
] |
[
"Obviously",
",",
"this",
"inevitably",
"leaves",
"the",
"device",
"open",
"not",
"only",
"to",
"further",
"compromise",
"but",
"to",
"data",
"tampering",
"as",
"well",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"In",
"this",
"article,",
"we",
"will",
"describe",
"the",
"details",
"of",
"our",
"investigation."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Knownsec",
"Security",
"Team",
"has",
"followed",
"up",
"this",
"incident",
"ever",
"since",
"its",
"happening."
] | [
4,
12,
12,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.FamVT.ExpiroPC.PE",
"Virus.Win32.Sality!O",
"TrojanPWS.Vkont",
"Win32.Trojan.WisdomEyes.16070401.9500.9998",
"Trojan.Win32.Z.Packer.40610",
"Troj.W32.AntiAV.lApy",
"BehavesLike.Win32.HLLPPhilis.nc",
"Trojan/PSW.VKont.c",
"TR/PSW.VKont.wwdih",
"PWS:Win32/Vkont.A",
"Trj/StartPage.DGO",
"Backdoor.Win32.Hupigon",
"Win32/Trojan.2ff"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"As",
"can",
"be",
"observed",
",",
"the",
"possibilities",
"offered",
"by",
"the",
"bot",
"are",
"pretty",
"common",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Heuristic.BehavesLike.Win32.Packed.A",
"TrojanDownloader:Win32/Whinetroe.A"
] | [
16,
3,
16,
16,
16,
1,
1
] |
[
"The",
"two",
"reports",
"describe",
"the",
"same",
"cybercriminal",
"gang",
"which",
"stole",
"up",
"to",
"several",
"hundreds",
"of",
"millions",
"of",
"dollars",
"from",
"various",
"financial",
"institutions."
] | [
16,
16,
16,
16,
16,
16,
6,
14,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
12
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Worm/W32.Wozer.23552.B",
"Worm.Wozer",
"W32/Wozer.h",
"Win32.Trojan.WisdomEyes.16070401.9500.9643",
"W32/Wozer.F",
"W32.Wozer.Worm",
"Email-Worm.Win32.Wozer.h",
"Trojan.Win32.Wozer.eokb",
"W32.W.Wozer.h!c",
"Win32.Worm-email.Wozer.Wozu",
"Worm.Win32.Wozer.H",
"Win32.HLLW.Wozer.4",
"Worm.Wozer.Win32.11",
"BehavesLike.Win32.Backdoor.mc",
"Backdoor.Win32.Optix",
"I-Worm.Wozer.c",
"Worm:Win32/Wozer.G@mm",
"Worm[Email]/Win32.Wozer",
"Worm.Wozer.h.kcloud",
"Email-Worm.Win32.Wozer.h",
"Worm:Win32/Wozer.G@mm",
"Trojan/Win32.Rirc.R100483",
"Email-Worm.Wozer",
"W32/Wozer.C.worm",
"Win32/Wozer.H",
"Worm.Wozer!/x/Vuw7rp3c",
"W32/Wozer.H@mm",
"Win32/Worm.Email-Worm.795"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"This",
"post",
"discusses",
"our",
"findings",
"and",
"potential",
"security",
"risks",
"to",
"iOS",
"device",
"users."
] | [
16,
16,
16,
16,
16,
16,
7,
15,
15,
16,
5,
13,
4
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Rootkit.27428",
"Trojan/W32.Rootkit.71040",
"Rootkit.27428",
"Backdoor.Rustock",
"Rootkit.D6B24",
"Win32.Trojan.WisdomEyes.16070401.9500.9984",
"Hacktool.Rootkit",
"Rootkit.27428",
"Rootkit.27428",
"Rootkit.27428",
"BehavesLike.Win32.Virut.kc",
"Win32.Troj.Undef.kcloud",
"Backdoor.Rustock",
"Trojan.Win32.Rootkit",
"Win32/RootKit.Rootkit.3e8"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Our",
"Umbrella",
"telemetry",
"shows",
"that",
"the",
"majority",
"of",
"the",
"request",
"comes",
"from",
"Australia",
"and",
"the",
"majority",
"of",
"the",
"phone",
"numbers",
"infected",
"have",
"the",
"international",
"indicative",
"for",
"Australia",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Worm.Kalockan",
"Trojan.Graftor.D46F63",
"Win32.Trojan.WisdomEyes.16070401.9500.9926",
"Trojan.Win32.Z.Graftor.143360.EV",
"BackDoor.Tdss",
"Worm.Win32.Kalockan",
"Worm:Win32/Kalockan.A",
"Trj/CI.A",
"Win32/Trojan.621"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"]",
"website",
"107",
"[",
"."
] | [
9,
9,
1,
9,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Backdoor.Ciadoor.13.3",
"W32/VB-Dropper-based.2!Maximus",
"Backdoor.Ciadoor",
"BKDR_CIAD1.TOMA",
"Backdoor.Win32.Ciadoor.cvi",
"Backdoor.Win32.Ciadoor!IK",
"Backdoor.Win32.Ciadoor.G",
"Trojan.DownLoader.62487",
"BDS/Ciadoor.13.4",
"BKDR_CIAD1.TOMA",
"Backdoor/Ciadoor.130",
"TrojanDropper:Win32/Ciadoor.C",
"W32/VB-Dropper-based.2!Maximus",
"Backdoor.Ciadoor.cvi",
"Backdoor.CiaDoor.13",
"Backdoor.Win32.Ciadoor",
"W32/Ciadoor.V13!tr.bdr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
Subsets and Splits