id
int64 105
14.4k
| text
stringlengths 39
889
| entities
list | relations
list | Comments
list |
---|---|---|---|---|
105 | For example, we found that Conti operators use the cloud storage synchronization tool Rclone to upload files to the Mega cloud storage service. | [
{
"id": 377,
"label": "malware",
"start_offset": 116,
"end_offset": 120
},
{
"id": 44599,
"label": "threat-actor",
"start_offset": 27,
"end_offset": 42
},
{
"id": 44600,
"label": "tools",
"start_offset": 86,
"end_offset": 92
},
{
"id": 44601,
"label": "SOFTWARE",
"start_offset": 116,
"end_offset": 142
}
] | [
{
"id": 1,
"from_id": 44599,
"to_id": 44600,
"type": "uses"
},
{
"id": 2,
"from_id": 44600,
"to_id": 44601,
"type": "exfiltrates-to"
},
{
"id": 3,
"from_id": 44599,
"to_id": 44601,
"type": "exfiltrates-to"
}
] | [] |
106 | Similarly, DarkSide operators used Mega client for exfiltrating files to cloud storage, 7-Zip for archiving, and PuTTY application for network file transfers. | [
{
"id": 45834,
"label": "threat-actor",
"start_offset": 11,
"end_offset": 29
},
{
"id": 45835,
"label": "tools",
"start_offset": 35,
"end_offset": 46
},
{
"id": 45836,
"label": "tools",
"start_offset": 88,
"end_offset": 93
},
{
"id": 45837,
"label": "tools",
"start_offset": 113,
"end_offset": 118
}
] | [
{
"id": 120,
"from_id": 45834,
"to_id": 45835,
"type": "uses"
},
{
"id": 121,
"from_id": 45834,
"to_id": 45836,
"type": "uses"
},
{
"id": 122,
"from_id": 45834,
"to_id": 45837,
"type": "uses"
}
] | [] |
187 | On Feb. 23, a new variant of wiper malware named HermeticWiper was discovered in Ukraine. | [
{
"id": 591,
"label": "malware",
"start_offset": 29,
"end_offset": 34
},
{
"id": 45853,
"label": "TIME",
"start_offset": 3,
"end_offset": 10
},
{
"id": 45855,
"label": "malware",
"start_offset": 49,
"end_offset": 62
},
{
"id": 45854,
"label": "location",
"start_offset": 81,
"end_offset": 88
}
] | [
{
"id": 123,
"from_id": 45855,
"to_id": 591,
"type": "variant-of"
},
{
"id": 124,
"from_id": 45855,
"to_id": 45854,
"type": "targets"
}
] | [] |
194 | This post was substantially updated March 31 to add information on phishing and scam attacks, cybersquatting trends, fake donation websites, DoS attacks on Ukrainian news sites and distribution of malicious binaries. | [
{
"id": 45871,
"label": "attack-pattern",
"start_offset": 94,
"end_offset": 108
},
{
"id": 45872,
"label": "attack-pattern",
"start_offset": 117,
"end_offset": 139
},
{
"id": 45873,
"label": "attack-pattern",
"start_offset": 141,
"end_offset": 152
},
{
"id": 45869,
"label": "TIME",
"start_offset": 36,
"end_offset": 44
},
{
"id": 45874,
"label": "identity",
"start_offset": 156,
"end_offset": 176
},
{
"id": 45875,
"label": "attack-pattern",
"start_offset": 181,
"end_offset": 215
},
{
"id": 45870,
"label": "attack-pattern",
"start_offset": 67,
"end_offset": 92
}
] | [
{
"id": 127,
"from_id": 45872,
"to_id": 45874,
"type": "duplicate-of"
},
{
"id": 129,
"from_id": 45875,
"to_id": 45874,
"type": "targets"
},
{
"id": 128,
"from_id": 45873,
"to_id": 45874,
"type": "targets"
},
{
"id": 126,
"from_id": 45871,
"to_id": 45874,
"type": "targets"
},
{
"id": 125,
"from_id": 45870,
"to_id": 45874,
"type": "targets"
}
] | [] |
196 | DDoS Attacks Impacting Ukrainian Government and Banking Institutions HermeticWiper Malware Website Defacement Rise in Phishing and Scam Attacks Increase in Cybersquatting Trends Fake Donation Websites DoS Attacks on Ukrainian News Sites Distribution of Apps How Palo Alto Networks Is Working to Keep You Safe How You Should Prepare for an Increase in Cyberthreats Such as Wipers, DDoS, Website Defacement and Other Related Attacks How Unit 42 Threat Intelligence and Security Consulting Can Help Additional Cybersecurity Resources Indicators of Compromise | [
{
"id": 45877,
"label": "attack-pattern",
"start_offset": 1,
"end_offset": 13
},
{
"id": 45879,
"label": "attack-pattern",
"start_offset": 84,
"end_offset": 109
},
{
"id": 45885,
"label": "attack-pattern",
"start_offset": 238,
"end_offset": 258
},
{
"id": 45889,
"label": "attack-pattern",
"start_offset": 387,
"end_offset": 405
},
{
"id": 45891,
"label": "identity",
"start_offset": 436,
"end_offset": 443
},
{
"id": 45876,
"label": "malware",
"start_offset": 70,
"end_offset": 83
},
{
"id": 45878,
"label": "identity",
"start_offset": 24,
"end_offset": 69
},
{
"id": 45880,
"label": "attack-pattern",
"start_offset": 119,
"end_offset": 144
},
{
"id": 45881,
"label": "attack-pattern",
"start_offset": 157,
"end_offset": 171
},
{
"id": 45882,
"label": "attack-pattern",
"start_offset": 179,
"end_offset": 201
},
{
"id": 45883,
"label": "attack-pattern",
"start_offset": 202,
"end_offset": 213
},
{
"id": 45884,
"label": "identity",
"start_offset": 217,
"end_offset": 237
},
{
"id": 45886,
"label": "identity",
"start_offset": 263,
"end_offset": 281
},
{
"id": 45887,
"label": "attack-pattern",
"start_offset": 373,
"end_offset": 379
},
{
"id": 45888,
"label": "attack-pattern",
"start_offset": 381,
"end_offset": 385
}
] | [
{
"id": 130,
"from_id": 45877,
"to_id": 45878,
"type": "targets"
}
] | [] |
204 | On Feb. 18, both the United States and the United Kingdom attributed these DDoS attacks to Russia’s Main Intelligence Directorate (GRU). Over the past week, Ukraine has continued to observe a relatively constant flow of DDoS attacks targeting its government and financial institutions. | [
{
"id": 44621,
"label": "identity",
"start_offset": 22,
"end_offset": 35
},
{
"id": 44622,
"label": "TIME",
"start_offset": 4,
"end_offset": 11
},
{
"id": 44623,
"label": "identity",
"start_offset": 44,
"end_offset": 58
},
{
"id": 44624,
"label": "attack-pattern",
"start_offset": 76,
"end_offset": 80
},
{
"id": 44625,
"label": "threat-actor",
"start_offset": 92,
"end_offset": 136
},
{
"id": 44626,
"label": "identity",
"start_offset": 159,
"end_offset": 166
},
{
"id": 44627,
"label": "attack-pattern",
"start_offset": 222,
"end_offset": 234
},
{
"id": 44628,
"label": "identity",
"start_offset": 249,
"end_offset": 286
}
] | [
{
"id": 4,
"from_id": 44624,
"to_id": 44625,
"type": "attributed-to"
},
{
"id": 131,
"from_id": 44627,
"to_id": 44628,
"type": "targets"
}
] | [] |
207 | On Feb. 23, a malicious file named conhosts._exe (SHA256: 1bc44eef75779e3ca1eefb8ff5a64807dbc942b1e4a2672d77b9f6928d292591) was uploaded to a public malware repository from an organization in Kyiv, Ukraine. | [
{
"id": 678,
"label": "SHA2",
"start_offset": 58,
"end_offset": 122
},
{
"id": 44630,
"label": "location",
"start_offset": 192,
"end_offset": 205
},
{
"id": 44631,
"label": "FILEPATH",
"start_offset": 35,
"end_offset": 48
},
{
"id": 44632,
"label": "TIME",
"start_offset": 3,
"end_offset": 10
}
] | [
{
"id": 133,
"from_id": 678,
"to_id": 44631,
"type": "indicates"
}
] | [] |
213 | In tracking this threat, early reports show that the malware has been deployed against a financial institution in Ukraine as well as two contractors in Latvia and Lithuania that provide services to the Ukrainian Government. | [
{
"id": 44633,
"label": "location",
"start_offset": 114,
"end_offset": 121
},
{
"id": 44634,
"label": "identity",
"start_offset": 202,
"end_offset": 222
},
{
"id": 44635,
"label": "identity",
"start_offset": 90,
"end_offset": 110
},
{
"id": 44636,
"label": "location",
"start_offset": 152,
"end_offset": 158
},
{
"id": 44637,
"label": "location",
"start_offset": 163,
"end_offset": 172
},
{
"id": 44638,
"label": "malware",
"start_offset": 53,
"end_offset": 60
},
{
"id": 44639,
"label": "identity",
"start_offset": 133,
"end_offset": 172
}
] | [
{
"id": 6,
"from_id": 44638,
"to_id": 44635,
"type": "targets"
},
{
"id": 7,
"from_id": 44638,
"to_id": 44639,
"type": "targets"
}
] | [] |
226 | On March 16 while ingesting a third-party data feed, our in-house machine learning models detected a phishing webpage targeting a Ukrainian state administration employee. | [
{
"id": 756,
"label": "attack-pattern",
"start_offset": 101,
"end_offset": 109
},
{
"id": 45928,
"label": "TIME",
"start_offset": 3,
"end_offset": 11
},
{
"id": 45929,
"label": "identity",
"start_offset": 130,
"end_offset": 169
}
] | [
{
"id": 134,
"from_id": 756,
"to_id": 45929,
"type": "targets"
}
] | [] |
231 | A phishing webpage targeting a Ukrainian state administration employee, detected by our in-house machine learning models on March 16.Our teams at Palo Alto Networks are actively monitoring the phishing landscape surrounding Ukraine-related URLs and are sharing this threat intelligence with relevant authorities in Ukraine and internationally. | [
{
"id": 765,
"label": "attack-pattern",
"start_offset": 2,
"end_offset": 10
},
{
"id": 771,
"label": "attack-pattern",
"start_offset": 193,
"end_offset": 201
},
{
"id": 44647,
"label": "identity",
"start_offset": 31,
"end_offset": 70
},
{
"id": 44648,
"label": "TIME",
"start_offset": 124,
"end_offset": 132
},
{
"id": 44649,
"label": "identity",
"start_offset": 146,
"end_offset": 164
},
{
"id": 44650,
"label": "location",
"start_offset": 315,
"end_offset": 322
}
] | [
{
"id": 135,
"from_id": 765,
"to_id": 44647,
"type": "targets"
},
{
"id": 136,
"from_id": 771,
"to_id": 44650,
"type": "targets"
}
] | [] |
234 | We monitored a list of 50 legitimate Ukraine-related domains (e.g., popular news and donation websites) and keywords (e.g., Ukraine, refugee) as targets for cybersquatting. | [
{
"id": 45781,
"label": "location",
"start_offset": 125,
"end_offset": 132
},
{
"id": 45934,
"label": "location",
"start_offset": 38,
"end_offset": 45
},
{
"id": 44651,
"label": "attack-pattern",
"start_offset": 158,
"end_offset": 172
}
] | [
{
"id": 137,
"from_id": 44651,
"to_id": 45781,
"type": "targets"
}
] | [] |
244 | For instance, donatetoukraine[.]com is pretending to be associated with the popular Come Back Alive campaign. | [
{
"id": 45942,
"label": "DOMAIN",
"start_offset": 14,
"end_offset": 35
},
{
"id": 45943,
"label": "campaign",
"start_offset": 84,
"end_offset": 108
}
] | [
{
"id": 138,
"from_id": 45942,
"to_id": 45943,
"type": "related-to"
}
] | [] |
246 | We found a cybersquatting domain – save-russia[.]today – that is launching DoS attacks on Ukrainian news sites. | [
{
"id": 44652,
"label": "attack-pattern",
"start_offset": 13,
"end_offset": 27
},
{
"id": 44653,
"label": "DOMAIN",
"start_offset": 37,
"end_offset": 56
},
{
"id": 44654,
"label": "attack-pattern",
"start_offset": 77,
"end_offset": 88
},
{
"id": 44655,
"label": "identity",
"start_offset": 92,
"end_offset": 112
}
] | [
{
"id": 8,
"from_id": 44653,
"to_id": 44655,
"type": "targets"
},
{
"id": 112,
"from_id": 44652,
"to_id": 44653,
"type": "uses"
},
{
"id": 113,
"from_id": 44654,
"to_id": 44653,
"type": "uses"
}
] | [] |
249 | A cybersquatting domain save-russia[.]today is launching DoS attacks on Ukrainian news sites. | [
{
"id": 44656,
"label": "attack-pattern",
"start_offset": 2,
"end_offset": 16
},
{
"id": 44657,
"label": "DOMAIN",
"start_offset": 24,
"end_offset": 43
},
{
"id": 44658,
"label": "attack-pattern",
"start_offset": 57,
"end_offset": 68
},
{
"id": 44659,
"label": "identity",
"start_offset": 72,
"end_offset": 92
}
] | [
{
"id": 9,
"from_id": 44658,
"to_id": 44659,
"type": "targets"
},
{
"id": 114,
"from_id": 44656,
"to_id": 44657,
"type": "uses"
},
{
"id": 115,
"from_id": 44658,
"to_id": 44657,
"type": "uses"
}
] | [] |
273 | Our Threat Prevention and Web Application and API Security products added coverage for the OctoberCMS vulnerability exploited in the WhisperGate attacks, and we released an XSOAR Playbook to help organizations hunt for this threat. | [
{
"id": 906,
"label": "malware",
"start_offset": 133,
"end_offset": 144
},
{
"id": 44671,
"label": "campaign",
"start_offset": 133,
"end_offset": 152
},
{
"id": 44672,
"label": "SOFTWARE",
"start_offset": 173,
"end_offset": 178
},
{
"id": 44670,
"label": "vulnerability",
"start_offset": 91,
"end_offset": 115
}
] | [
{
"id": 10,
"from_id": 44671,
"to_id": 44670,
"type": "delivers"
}
] | [] |
287 | Threat Brief: Ongoing Russia and Ukraine Cyber Conflict (Jan. 20) Russia’s Gamaredon aka Primitive Bear APT Group Actively Targeting Ukraine (Updated Feb. 16) | [
{
"id": 965,
"label": "threat-actor",
"start_offset": 76,
"end_offset": 85
},
{
"id": 966,
"label": "threat-actor",
"start_offset": 90,
"end_offset": 104
},
{
"id": 51805,
"label": "TIME",
"start_offset": 58,
"end_offset": 65
},
{
"id": 51806,
"label": "TIME",
"start_offset": 151,
"end_offset": 158
},
{
"id": 45982,
"label": "location",
"start_offset": 23,
"end_offset": 29
},
{
"id": 45983,
"label": "location",
"start_offset": 34,
"end_offset": 41
},
{
"id": 45981,
"label": "location",
"start_offset": 67,
"end_offset": 74
}
] | [
{
"id": 139,
"from_id": 965,
"to_id": 966,
"type": "duplicate-of"
},
{
"id": 141,
"from_id": 966,
"to_id": 45981,
"type": "originates-from"
},
{
"id": 140,
"from_id": 965,
"to_id": 45981,
"type": "originates-from"
}
] | [] |
288 | Spear Phishing Attacks Target Organizations in Ukraine, Payloads Include the Document Stealer OutSteel and the Downloader SaintBot Threat Briefing: Protecting Against Russia-Ukraine Cyber Activity Palo Alto Networks Resource Page: Protect Against Russia-Ukraine Cyber Activity Cortex XDR Protections Against Malware Associated with Ukraine and Russia Cyber Activity | [
{
"id": 970,
"label": "attack-pattern",
"start_offset": 0,
"end_offset": 14
},
{
"id": 974,
"label": "malware",
"start_offset": 94,
"end_offset": 102
},
{
"id": 976,
"label": "malware",
"start_offset": 122,
"end_offset": 130
},
{
"id": 977,
"label": "location",
"start_offset": 167,
"end_offset": 173
},
{
"id": 978,
"label": "location",
"start_offset": 174,
"end_offset": 181
},
{
"id": 979,
"label": "identity",
"start_offset": 197,
"end_offset": 215
},
{
"id": 981,
"label": "location",
"start_offset": 247,
"end_offset": 253
},
{
"id": 982,
"label": "location",
"start_offset": 254,
"end_offset": 261
},
{
"id": 983,
"label": "tools",
"start_offset": 277,
"end_offset": 287
},
{
"id": 44679,
"label": "identity",
"start_offset": 30,
"end_offset": 54
},
{
"id": 44678,
"label": "location",
"start_offset": 47,
"end_offset": 54
},
{
"id": 44685,
"label": "location",
"start_offset": 332,
"end_offset": 339
},
{
"id": 44686,
"label": "location",
"start_offset": 344,
"end_offset": 350
}
] | [
{
"id": 116,
"from_id": 970,
"to_id": 44679,
"type": "targets"
},
{
"id": 118,
"from_id": 974,
"to_id": 970,
"type": "uses"
},
{
"id": 119,
"from_id": 976,
"to_id": 970,
"type": "uses"
},
{
"id": 117,
"from_id": 974,
"to_id": 44679,
"type": "targets"
}
] | [] |
304 | Last Tuesday, Trusteer reported that a new variant of Citadel, which has long relied on VNC to give attackers remote control over systems, began adding new credentials to systems it infects and enabling the standard Windows remote desktop application (RDP). | [
{
"id": 1035,
"label": "malware",
"start_offset": 54,
"end_offset": 61
},
{
"id": 46000,
"label": "tools",
"start_offset": 88,
"end_offset": 91
},
{
"id": 46001,
"label": "tools",
"start_offset": 216,
"end_offset": 256
},
{
"id": 46002,
"label": "identity",
"start_offset": 14,
"end_offset": 22
},
{
"id": 46003,
"label": "TIME",
"start_offset": 0,
"end_offset": 12
}
] | [
{
"id": 142,
"from_id": 1035,
"to_id": 46000,
"type": "uses"
},
{
"id": 143,
"from_id": 1035,
"to_id": 46001,
"type": "uses"
}
] | [] |
324 | The latest development in the ransomware world is CryptoWall 2.0, a new version of this malware family that uses the Tor network for command and control. | [
{
"id": 44699,
"label": "malware",
"start_offset": 50,
"end_offset": 64
},
{
"id": 44700,
"label": "tools",
"start_offset": 117,
"end_offset": 120
}
] | [
{
"id": 14,
"from_id": 44699,
"to_id": 44700,
"type": "uses"
}
] | [] |
329 | The attacker holds the key necessary to decrypt the files unless the victim agrees to pay a $500 ransom. Unlike previous versions of CryptoWall, 2.0 communicates with its command and control (C2) server through the Tor anonymization network. | [
{
"id": 46021,
"label": "malware",
"start_offset": 134,
"end_offset": 149
},
{
"id": 46022,
"label": "tools",
"start_offset": 216,
"end_offset": 219
},
{
"id": 46023,
"label": "Infrastucture",
"start_offset": 172,
"end_offset": 203
}
] | [
{
"id": 145,
"from_id": 46021,
"to_id": 46022,
"type": "uses"
},
{
"id": 144,
"from_id": 46021,
"to_id": 46023,
"type": "beacons-to"
}
] | [] |
331 | CryptoWall isn’t the only threat that communicates over Tor and if your network doesn’t have an explicit reason to allow anonymization networks, you should consider blocking the application altogether with your firewall. | [
{
"id": 1138,
"label": "malware",
"start_offset": 0,
"end_offset": 10
},
{
"id": 1140,
"label": "tools",
"start_offset": 56,
"end_offset": 59
}
] | [
{
"id": 147,
"from_id": 1138,
"to_id": 1140,
"type": "uses"
}
] | [] |
336 | All of the domains currently resolve to 151.248.115.146, a Russian IP address and have WhoIs records associated with the e-mail address “ladomfichisi1987@mail.ru”. | [
{
"id": 1156,
"label": "IPV4",
"start_offset": 41,
"end_offset": 56
},
{
"id": 46025,
"label": "location",
"start_offset": 60,
"end_offset": 67
},
{
"id": 44703,
"label": "EMAIL",
"start_offset": 138,
"end_offset": 162
}
] | [
{
"id": 148,
"from_id": 1156,
"to_id": 44703,
"type": "related-to"
}
] | [] |
338 | If these domains are confiscated or otherwise shut down, CryptoWall instructs the user to download the Tor Browser and access a website (paytordmbdekmizq.onion) that is only accessible over the Tor network. Unlikely some of it’s more flexible competition, CryptoWall only accepts ransom in the form of BitCoin. | [
{
"id": 46026,
"label": "malware",
"start_offset": 57,
"end_offset": 67
},
{
"id": 46027,
"label": "tools",
"start_offset": 103,
"end_offset": 114
},
{
"id": 46028,
"label": "DOMAIN",
"start_offset": 137,
"end_offset": 159
},
{
"id": 46029,
"label": "SOFTWARE",
"start_offset": 194,
"end_offset": 205
},
{
"id": 46031,
"label": "SOFTWARE",
"start_offset": 303,
"end_offset": 310
},
{
"id": 46030,
"label": "malware",
"start_offset": 257,
"end_offset": 267
}
] | [
{
"id": 149,
"from_id": 46026,
"to_id": 46027,
"type": "related-to"
},
{
"id": 150,
"from_id": 46026,
"to_id": 46028,
"type": "related-to"
}
] | [] |
345 | On October 19, the Kafeine posted a blog discussing the inclusion of CVE-2014-0556 in the Nuclear Pack exploit kit, which was installing CryptoWall 2.0. | [
{
"id": 44706,
"label": "TIME",
"start_offset": 3,
"end_offset": 13
},
{
"id": 44707,
"label": "malware",
"start_offset": 137,
"end_offset": 151
},
{
"id": 44708,
"label": "vulnerability",
"start_offset": 69,
"end_offset": 82
},
{
"id": 44709,
"label": "malware",
"start_offset": 90,
"end_offset": 114
},
{
"id": 44710,
"label": "threat-actor",
"start_offset": 19,
"end_offset": 26
}
] | [
{
"id": 15,
"from_id": 44707,
"to_id": 44708,
"type": "exploits"
},
{
"id": 16,
"from_id": 44709,
"to_id": 44707,
"type": "delivers"
},
{
"id": 17,
"from_id": 44710,
"to_id": 44709,
"type": "authored-by"
}
] | [] |
347 | The PDF exploits CVE-2013-2729 to download a binary which also installed CryptoWall 2.0. | [
{
"id": 46035,
"label": "malware",
"start_offset": 74,
"end_offset": 88
},
{
"id": 46036,
"label": "vulnerability",
"start_offset": 18,
"end_offset": 31
}
] | [
{
"id": 151,
"from_id": 46035,
"to_id": 46036,
"type": "exploits"
}
] | [] |
350 | To protect against CryptoWall 2.0 we recommend taking the following actions: Adobe Reader Embedded BMP Parsing Integer Overflow Vulnerability CVE-2014-0556 Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address! | [
{
"id": 46038,
"label": "SOFTWARE",
"start_offset": 79,
"end_offset": 91
},
{
"id": 46039,
"label": "vulnerability",
"start_offset": 145,
"end_offset": 158
},
{
"id": 46037,
"label": "malware",
"start_offset": 20,
"end_offset": 34
},
{
"id": 46041,
"label": "vulnerability",
"start_offset": 92,
"end_offset": 143
}
] | [
{
"id": 152,
"from_id": 46037,
"to_id": 46039,
"type": "exploits"
}
] | [] |
354 | TrustedSec reports on how attackers were apparently able to glean user credentials from a certain device via the Heartbleed vulnerability and use them to log in via a VPN. | [
{
"id": 44711,
"label": "identity",
"start_offset": 0,
"end_offset": 10
},
{
"id": 44712,
"label": "vulnerability",
"start_offset": 113,
"end_offset": 137
},
{
"id": 44713,
"label": "tools",
"start_offset": 167,
"end_offset": 170
},
{
"id": 44714,
"label": "attack-pattern",
"start_offset": 60,
"end_offset": 82
}
] | [
{
"id": 18,
"from_id": 44714,
"to_id": 44712,
"type": "exploits"
}
] | [] |
357 | As Heartbleed allows the attacker to scrape memory from the vulnerable device, they can retrieve significant amounts of secret information. | [
{
"id": 44716,
"label": "attack-pattern",
"start_offset": 38,
"end_offset": 51
},
{
"id": 44715,
"label": "vulnerability",
"start_offset": 4,
"end_offset": 14
}
] | [
{
"id": 153,
"from_id": 44715,
"to_id": 44716,
"type": "targets"
}
] | [] |
370 | After analysis of the compromise, Volexity determined the initial foothold was the result of a remote code execution vulnerability in Confluence Server and Data Center. | [
{
"id": 46061,
"label": "vulnerability",
"start_offset": 95,
"end_offset": 130
},
{
"id": 46063,
"label": "SOFTWARE",
"start_offset": 134,
"end_offset": 167
},
{
"id": 46062,
"label": "identity",
"start_offset": 34,
"end_offset": 42
}
] | [
{
"id": 154,
"from_id": 46063,
"to_id": 46061,
"type": "has"
}
] | [] |
486 | The vulnerability leaves Android users at risk of falling victim to an Android Toast Overlay attack. | [
{
"id": 44751,
"label": "SOFTWARE",
"start_offset": 25,
"end_offset": 32
},
{
"id": 44753,
"label": "attack-pattern",
"start_offset": 71,
"end_offset": 99
}
] | [
{
"id": 155,
"from_id": 44753,
"to_id": 44751,
"type": "targets"
}
] | [] |
513 | Virlock has the largest number of variants due to its file-infector-like behavior. | [
{
"id": 46145,
"label": "attack-pattern",
"start_offset": 54,
"end_offset": 81
},
{
"id": 44760,
"label": "malware",
"start_offset": 0,
"end_offset": 7
}
] | [
{
"id": 159,
"from_id": 44760,
"to_id": 46145,
"type": "uses"
}
] | [] |
532 | One example here is Makop, contained in a 7z archive along with an infostealer malware (SHA256: DE6DFA018773E07C218EF1DF62CE0D99A708841BF1DDFB4C6AD7E323D5D666A4). | [
{
"id": 1760,
"label": "malware",
"start_offset": 67,
"end_offset": 78
},
{
"id": 1761,
"label": "SHA2",
"start_offset": 96,
"end_offset": 160
},
{
"id": 46154,
"label": "tools",
"start_offset": 42,
"end_offset": 44
}
] | [
{
"id": 156,
"from_id": 1761,
"to_id": 1760,
"type": "related-to"
}
] | [] |
534 | For example, GandCrab uses JScript as a downloader, leveraging Windows Background Intelligent Transfer Service (BITS) to download the payload in the background (Figure 5). | [
{
"id": 44765,
"label": "malware",
"start_offset": 13,
"end_offset": 21
},
{
"id": 44766,
"label": "tools",
"start_offset": 63,
"end_offset": 117
}
] | [
{
"id": 20,
"from_id": 44765,
"to_id": 44766,
"type": "uses"
}
] | [] |
535 | We also observed that Mailto (AKA NetWalker) tends to deliver ransomware in a highly obfuscated PowerShell script. | [
{
"id": 1765,
"label": "malware",
"start_offset": 22,
"end_offset": 28
},
{
"id": 1766,
"label": "malware",
"start_offset": 34,
"end_offset": 43
},
{
"id": 46155,
"label": "attack-pattern",
"start_offset": 78,
"end_offset": 113
}
] | [
{
"id": 162,
"from_id": 1766,
"to_id": 1765,
"type": "duplicate-of"
},
{
"id": 160,
"from_id": 46155,
"to_id": 1766,
"type": "delivers"
},
{
"id": 161,
"from_id": 46155,
"to_id": 1765,
"type": "delivers"
}
] | [] |
537 | One example is an exploit RTF that led to downloading and installing Makop ransomware remotely. | [
{
"id": 44767,
"label": "attack-pattern",
"start_offset": 18,
"end_offset": 29
},
{
"id": 44768,
"label": "malware",
"start_offset": 69,
"end_offset": 85
}
] | [
{
"id": 21,
"from_id": 44767,
"to_id": 44768,
"type": "delivers"
}
] | [] |
554 | For example, the Xorist ransomware (SHA256: 4979A10B81C41ECC0FC3A0F376ADE766CE616D2301639F74E0277047CC40E3D6) demanded £1,000 for a ransom; the bitcoin wallet address was 1BFqrLCDwwrxueY7FFDn8DqeoasPJignxt. | [
{
"id": 1837,
"label": "SHA2",
"start_offset": 44,
"end_offset": 108
},
{
"id": 46168,
"label": "malware",
"start_offset": 17,
"end_offset": 34
},
{
"id": 46169,
"label": "SOFTWARE",
"start_offset": 144,
"end_offset": 151
}
] | [
{
"id": 157,
"from_id": 1837,
"to_id": 46168,
"type": "indicates"
}
] | [] |
558 | During the operation, 25.1 BTC from 538 wallets was sent to 1NDyJtNTjmwk5xPNhjgAMu4HDHigtobu1s (SHA256: CE11703DEF517306326C48A67A7C859A3DE0F18E2451DF226CE171389A5B7953), which is a wallet owned by Binance cryptocurrency exchange. | [
{
"id": 1845,
"label": "SHA2",
"start_offset": 104,
"end_offset": 168
},
{
"id": 44776,
"label": "identity",
"start_offset": 198,
"end_offset": 229
}
] | [
{
"id": 164,
"from_id": 44776,
"to_id": 1845,
"type": "owns"
}
] | [] |
564 | After infection, Virlock hides the file extension through modification of the registry (HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = 1, HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Hidden = 2). | [
{
"id": 1874,
"label": "REGISTRYKEY",
"start_offset": 88,
"end_offset": 164
},
{
"id": 1876,
"label": "REGISTRYKEY",
"start_offset": 170,
"end_offset": 241
},
{
"id": 44778,
"label": "malware",
"start_offset": 17,
"end_offset": 24
}
] | [
{
"id": 165,
"from_id": 1874,
"to_id": 44778,
"type": "indicates"
},
{
"id": 166,
"from_id": 1876,
"to_id": 44778,
"type": "indicates"
}
] | [] |
573 | Ryuk will change the infected file extension to .RYK, and leave a ransom note called RyukReadMe.html. | [
{
"id": 44783,
"label": "malware",
"start_offset": 1,
"end_offset": 5
},
{
"id": 44784,
"label": "FILEPATH",
"start_offset": 86,
"end_offset": 101
}
] | [
{
"id": 22,
"from_id": 44784,
"to_id": 44783,
"type": "indicates"
}
] | [] |
600 | The attackers behind Hancitor aren’t the first to time their spam attacks like this, but it is an effective tactic to try and increase their chances of success, especially when combined with the other innovation that we’ve seen. | [
{
"id": 44791,
"label": "malware",
"start_offset": 22,
"end_offset": 30
},
{
"id": 44792,
"label": "attack-pattern",
"start_offset": 62,
"end_offset": 74
}
] | [
{
"id": 23,
"from_id": 44791,
"to_id": 44792,
"type": "uses"
}
] | [] |
602 | In the past, Hancitor was sent as a malicious attachment in a spam email which would then download and install the attackers’ final malware like a banking Trojan. | [
{
"id": 46195,
"label": "malware",
"start_offset": 13,
"end_offset": 21
},
{
"id": 46196,
"label": "attack-pattern",
"start_offset": 36,
"end_offset": 72
}
] | [
{
"id": 167,
"from_id": 46195,
"to_id": 46196,
"type": "uses"
}
] | [] |
606 | The spam the attackers use no long has a malicious attachment but instead a malicious link that downloads the malicious Hancitor attachment. | [
{
"id": 44794,
"label": "malware",
"start_offset": 120,
"end_offset": 128
},
{
"id": 44795,
"label": "attack-pattern",
"start_offset": 76,
"end_offset": 91
},
{
"id": 44796,
"label": "attack-pattern",
"start_offset": 41,
"end_offset": 61
}
] | [
{
"id": 24,
"from_id": 44796,
"to_id": 44794,
"type": "delivers"
},
{
"id": 25,
"from_id": 44795,
"to_id": 44794,
"type": "delivers"
}
] | [] |
613 | The hot spots in the United States represents distribution servers which are created using fraud based accounts at various hosting providers that are hosting the Hancitor documents while the hotspots in Asia represent legitimate sites for small and medium businesses that have been compromised by the actors behind Hancitor campaign to host the malicious Hancitor documents. | [
{
"id": 46207,
"label": "malware",
"start_offset": 162,
"end_offset": 170
},
{
"id": 46208,
"label": "location",
"start_offset": 203,
"end_offset": 207
},
{
"id": 46206,
"label": "location",
"start_offset": 21,
"end_offset": 34
},
{
"id": 46210,
"label": "campaign",
"start_offset": 315,
"end_offset": 332
},
{
"id": 46211,
"label": "malware",
"start_offset": 355,
"end_offset": 363
}
] | [
{
"id": 168,
"from_id": 46207,
"to_id": 46206,
"type": "targets"
},
{
"id": 169,
"from_id": 46207,
"to_id": 46208,
"type": "targets"
}
] | [] |
621 | This post is also available in: 日本語 (Japanese) This Unit 42 blog provides an update on the threat situation surrounding attacks using the Petya Ransomware which are impacting organizations in Ukraine, Russia and to a lesser extent around the world. | [
{
"id": 2073,
"label": "identity",
"start_offset": 58,
"end_offset": 65
},
{
"id": 2074,
"label": "malware",
"start_offset": 144,
"end_offset": 149
},
{
"id": 44803,
"label": "malware",
"start_offset": 144,
"end_offset": 160
},
{
"id": 44804,
"label": "location",
"start_offset": 198,
"end_offset": 205
},
{
"id": 44805,
"label": "location",
"start_offset": 207,
"end_offset": 213
}
] | [
{
"id": 27,
"from_id": 44803,
"to_id": 44805,
"type": "targets"
},
{
"id": 26,
"from_id": 44803,
"to_id": 44804,
"type": "targets"
}
] | [] |
634 | The latest version of the Petya ransomware is spreading over Windows SMB and is reportedly using the ETERNALBLUE exploit tool, which exploits CVE-2017-0144 and was originally released by the Shadow Brokers group in April 2017. | [
{
"id": 2111,
"label": "malware",
"start_offset": 27,
"end_offset": 32
},
{
"id": 2113,
"label": "malware",
"start_offset": 102,
"end_offset": 113
},
{
"id": 2116,
"label": "threat-actor",
"start_offset": 188,
"end_offset": 206
},
{
"id": 46221,
"label": "SOFTWARE",
"start_offset": 62,
"end_offset": 73
},
{
"id": 46222,
"label": "vulnerability",
"start_offset": 143,
"end_offset": 156
},
{
"id": 46223,
"label": "TIME",
"start_offset": 216,
"end_offset": 226
}
] | [
{
"id": 171,
"from_id": 2111,
"to_id": 46222,
"type": "exploits"
},
{
"id": 170,
"from_id": 2111,
"to_id": 46221,
"type": "targets"
},
{
"id": 172,
"from_id": 2116,
"to_id": 2113,
"type": "authored-by"
},
{
"id": 173,
"from_id": 46222,
"to_id": 46221,
"type": "targets"
}
] | [] |
645 | While we have not been able to directly confirm the source, we have seen evidence that a Ukrainian software application called MEDoc was used by attackers to deliver the Petya DLL. | [
{
"id": 46229,
"label": "location",
"start_offset": 90,
"end_offset": 99
},
{
"id": 44817,
"label": "SOFTWARE",
"start_offset": 128,
"end_offset": 133
},
{
"id": 44818,
"label": "malware",
"start_offset": 171,
"end_offset": 176
}
] | [
{
"id": 174,
"from_id": 44818,
"to_id": 44817,
"type": "uses"
}
] | [] |
672 | Despite these measures, users still choose to open these files and enable their content, thus allowing macros to continue be a common attack vector – both in wide and simple attacks to deliver ransomware such as Emotet, as well as for sophisticated attacks like this Sofacy campaign. | [
{
"id": 2220,
"label": "malware",
"start_offset": 212,
"end_offset": 218
},
{
"id": 44819,
"label": "campaign",
"start_offset": 267,
"end_offset": 282
},
{
"id": 44821,
"label": "threat-actor",
"start_offset": 267,
"end_offset": 273
}
] | [
{
"id": 175,
"from_id": 44819,
"to_id": 44821,
"type": "related-to"
}
] | [] |
679 | An example for such attack vector being leveraged by attackers is CVE-2018-4878, an Adobe Flash Player Zero-Day exploited by embedding malicious SWF files in Excel documents. | [
{
"id": 46251,
"label": "vulnerability",
"start_offset": 66,
"end_offset": 79
},
{
"id": 46252,
"label": "SOFTWARE",
"start_offset": 84,
"end_offset": 102
},
{
"id": 46253,
"label": "attack-pattern",
"start_offset": 125,
"end_offset": 173
}
] | [
{
"id": 176,
"from_id": 46252,
"to_id": 46251,
"type": "has"
},
{
"id": 177,
"from_id": 46251,
"to_id": 46253,
"type": "uses"
}
] | [] |
684 | While still not seen in the wild, similar exploits in Microsoft Equation Editor, such as such as CVE-2018-0807 and CVE-2018-0798, were identified by Unit 42 researchers. | [
{
"id": 2275,
"label": "identity",
"start_offset": 149,
"end_offset": 156
},
{
"id": 44827,
"label": "SOFTWARE",
"start_offset": 54,
"end_offset": 79
},
{
"id": 44824,
"label": "vulnerability",
"start_offset": 97,
"end_offset": 110
},
{
"id": 44825,
"label": "vulnerability",
"start_offset": 115,
"end_offset": 128
}
] | [
{
"id": 29,
"from_id": 44827,
"to_id": 44825,
"type": "has"
},
{
"id": 28,
"from_id": 44827,
"to_id": 44824,
"type": "has"
}
] | [] |
687 | They can be used to compromise an endpoint in the following way: This functionality was leveraged in exploitation of CVE-2017-0199 - a Microsoft Office/WordPad remote code execution (RCE) vulnerability patched by Microsoft in September 2017, and was used in multiple campaigns, like this OilRig campaign. | [
{
"id": 2292,
"label": "identity",
"start_offset": 136,
"end_offset": 145
},
{
"id": 2293,
"label": "tools",
"start_offset": 146,
"end_offset": 152
},
{
"id": 2298,
"label": "malware",
"start_offset": 289,
"end_offset": 295
},
{
"id": 44828,
"label": "vulnerability",
"start_offset": 118,
"end_offset": 131
},
{
"id": 44830,
"label": "campaign",
"start_offset": 289,
"end_offset": 303
},
{
"id": 44829,
"label": "TIME",
"start_offset": 227,
"end_offset": 241
},
{
"id": 44831,
"label": "tools",
"start_offset": 136,
"end_offset": 152
},
{
"id": 44832,
"label": "tools",
"start_offset": 153,
"end_offset": 160
}
] | [
{
"id": 30,
"from_id": 44831,
"to_id": 44828,
"type": "has"
},
{
"id": 31,
"from_id": 44832,
"to_id": 44828,
"type": "has"
},
{
"id": 32,
"from_id": 44830,
"to_id": 44828,
"type": "exploits"
}
] | [] |
715 | This post is also available in: 日本語 (Japanese) On Aug. 25, 2021, Atlassian released a security advisory for an injection vulnerability in Confluence Server and Data Center, CVE-2021-26084. | [
{
"id": 46281,
"label": "vulnerability",
"start_offset": 179,
"end_offset": 193
},
{
"id": 46282,
"label": "SOFTWARE",
"start_offset": 144,
"end_offset": 177
},
{
"id": 46279,
"label": "identity",
"start_offset": 71,
"end_offset": 80
},
{
"id": 46280,
"label": "TIME",
"start_offset": 56,
"end_offset": 69
}
] | [
{
"id": 178,
"from_id": 46282,
"to_id": 46281,
"type": "has"
}
] | [] |
719 | The Atlassian products vulnerable to CVE-2021-26084 are those using the following versions of Confluence Server and Data Center: Confluence Cloud customers are not affected by this vulnerability. | [
{
"id": 46287,
"label": "identity",
"start_offset": 5,
"end_offset": 14
},
{
"id": 46288,
"label": "vulnerability",
"start_offset": 38,
"end_offset": 52
},
{
"id": 46290,
"label": "SOFTWARE",
"start_offset": 131,
"end_offset": 147
},
{
"id": 46289,
"label": "SOFTWARE",
"start_offset": 95,
"end_offset": 128
}
] | [
{
"id": 180,
"from_id": 46289,
"to_id": 46288,
"type": "has"
}
] | [] |
736 | Dubbed OMIGOD, the four vulnerabilities were found to directly affect Azure Cloud Instances. | [
{
"id": 46327,
"label": "vulnerability",
"start_offset": 7,
"end_offset": 13
},
{
"id": 46328,
"label": "SOFTWARE",
"start_offset": 70,
"end_offset": 81
}
] | [
{
"id": 181,
"from_id": 46328,
"to_id": 46327,
"type": "has"
}
] | [] |
803 | Stolen credentials underpin some of the most critical and damaging attacks out there; both Shamoon 2 and the Sofacy threat actor group, for example, have made detailed use of credential theft. | [
{
"id": 46358,
"label": "attack-pattern",
"start_offset": 175,
"end_offset": 191
},
{
"id": 46356,
"label": "threat-actor",
"start_offset": 109,
"end_offset": 134
},
{
"id": 46357,
"label": "threat-actor",
"start_offset": 91,
"end_offset": 100
}
] | [
{
"id": 182,
"from_id": 46357,
"to_id": 46358,
"type": "uses"
},
{
"id": 183,
"from_id": 46356,
"to_id": 46358,
"type": "uses"
}
] | [] |
804 | Credential theft today can happen in many ways, but the most notable are through credential phishing and the use of malware like keyloggers (both staples of the Sofacy group), as well as password reuse. | [
{
"id": 44859,
"label": "attack-pattern",
"start_offset": 1,
"end_offset": 17
},
{
"id": 44860,
"label": "attack-pattern",
"start_offset": 82,
"end_offset": 101
},
{
"id": 44861,
"label": "attack-pattern",
"start_offset": 130,
"end_offset": 140
},
{
"id": 44862,
"label": "threat-actor",
"start_offset": 162,
"end_offset": 174
},
{
"id": 44863,
"label": "attack-pattern",
"start_offset": 188,
"end_offset": 202
}
] | [
{
"id": 33,
"from_id": 44862,
"to_id": 44863,
"type": "uses"
},
{
"id": 34,
"from_id": 44862,
"to_id": 44861,
"type": "uses"
},
{
"id": 35,
"from_id": 44862,
"to_id": 44860,
"type": "uses"
},
{
"id": 36,
"from_id": 44862,
"to_id": 44859,
"type": "uses"
}
] | [] |
837 | While kernel APC attacks aren’t well known and can be hard to understand, their proven success in WanaCrypt0r/WannaCry and the Petya/NotPetya make them an important threat to understand because proven attack techniques are quickly adopted widely. | [
{
"id": 2746,
"label": "malware",
"start_offset": 128,
"end_offset": 133
},
{
"id": 44880,
"label": "attack-pattern",
"start_offset": 7,
"end_offset": 25
},
{
"id": 44881,
"label": "malware",
"start_offset": 99,
"end_offset": 110
},
{
"id": 44882,
"label": "malware",
"start_offset": 111,
"end_offset": 119
},
{
"id": 44884,
"label": "malware",
"start_offset": 134,
"end_offset": 142
}
] | [
{
"id": 185,
"from_id": 44882,
"to_id": 44880,
"type": "uses"
},
{
"id": 186,
"from_id": 2746,
"to_id": 44880,
"type": "uses"
},
{
"id": 184,
"from_id": 44881,
"to_id": 44880,
"type": "uses"
},
{
"id": 187,
"from_id": 44884,
"to_id": 44880,
"type": "uses"
}
] | [] |
876 | analysis sample PClock2 is written in Visual Basic. | [
{
"id": 46410,
"label": "SOFTWARE",
"start_offset": 39,
"end_offset": 51
},
{
"id": 44898,
"label": "malware",
"start_offset": 17,
"end_offset": 24
}
] | [
{
"id": 188,
"from_id": 44898,
"to_id": 46410,
"type": "uses"
}
] | [] |
914 | It’s also interesting to note that each time PClock2 scans a directory or encrypts a file, it makes an HTTP POST request to the C2 server. | [
{
"id": 46436,
"label": "Infrastucture",
"start_offset": 129,
"end_offset": 138
},
{
"id": 46435,
"label": "malware",
"start_offset": 46,
"end_offset": 53
}
] | [
{
"id": 189,
"from_id": 46435,
"to_id": 46436,
"type": "beacons-to"
}
] | [] |
939 | While not all SMS-based IAP applications steal user data, we recently identified that the Chinese Taomike SDK has begun capturing copies of all messages received by the phone and sending them to a Taomike controlled server. | [
{
"id": 46449,
"label": "location",
"start_offset": 91,
"end_offset": 98
},
{
"id": 44904,
"label": "attack-pattern",
"start_offset": 42,
"end_offset": 57
},
{
"id": 44905,
"label": "malware",
"start_offset": 99,
"end_offset": 110
},
{
"id": 44907,
"label": "Infrastucture",
"start_offset": 198,
"end_offset": 223
}
] | [
{
"id": 37,
"from_id": 44905,
"to_id": 44907,
"type": "exfiltrates-to"
},
{
"id": 38,
"from_id": 44905,
"to_id": 44907,
"type": "communicates-with"
},
{
"id": 190,
"from_id": 44905,
"to_id": 46449,
"type": "located-at"
},
{
"id": 191,
"from_id": 44905,
"to_id": 44904,
"type": "uses"
}
] | [] |
947 | Taomike is a Chinese company that aims to become the biggest mobile advertisement solution platform in China. | [
{
"id": 46455,
"label": "identity",
"start_offset": 1,
"end_offset": 8
},
{
"id": 46456,
"label": "location",
"start_offset": 14,
"end_offset": 21
},
{
"id": 46457,
"label": "location",
"start_offset": 104,
"end_offset": 109
}
] | [
{
"id": 192,
"from_id": 46455,
"to_id": 46456,
"type": "located-at"
}
] | [] |
952 | Not all apps that use the Taomike library steal SMS messages. | [
{
"id": 46459,
"label": "identity",
"start_offset": 26,
"end_offset": 33
},
{
"id": 46460,
"label": "attack-pattern",
"start_offset": 42,
"end_offset": 60
}
] | [
{
"id": 193,
"from_id": 46459,
"to_id": 46460,
"type": "uses"
}
] | [] |
992 | Recently, we found email accounts from top universities across the world being sold on Taobao, the largest consumer-to-consumer (C2C) e-commerce platform in China. | [
{
"id": 46489,
"label": "SOFTWARE",
"start_offset": 87,
"end_offset": 93
},
{
"id": 46490,
"label": "location",
"start_offset": 157,
"end_offset": 162
}
] | [
{
"id": 194,
"from_id": 46489,
"to_id": 46490,
"type": "located-at"
}
] | [] |
1,035 | Based on our investigation, we believe that stolen accounts for these universities are actively selling on Taobao. | [
{
"id": 44920,
"label": "SOFTWARE",
"start_offset": 108,
"end_offset": 114
},
{
"id": 44921,
"label": "attack-pattern",
"start_offset": 45,
"end_offset": 60
}
] | [
{
"id": 195,
"from_id": 44921,
"to_id": 44920,
"type": "related-to"
}
] | [] |
1,252 | Using AutoFocus to quickly search and correlate artifacts across the collective set of WildFire and other Palo Alto Networks threat intelligence, we were able to associate the attacks with the group publicly known as “DragonOK.” | [
{
"id": 3823,
"label": "malware",
"start_offset": 87,
"end_offset": 95
},
{
"id": 3826,
"label": "threat-actor",
"start_offset": 218,
"end_offset": 226
},
{
"id": 46628,
"label": "SOFTWARE",
"start_offset": 6,
"end_offset": 15
},
{
"id": 46629,
"label": "identity",
"start_offset": 106,
"end_offset": 124
}
] | [
{
"id": 196,
"from_id": 3826,
"to_id": 3823,
"type": "authored-by"
}
] | [] |
1,254 | DragonOK has previously targeted Japanese high-tech and manufacturing firms, but we’ve identified a new backdoor malware, named “FormerFirstRAT,” deployed by these attackers. | [
{
"id": 3828,
"label": "threat-actor",
"start_offset": 1,
"end_offset": 9
},
{
"id": 3832,
"label": "malware",
"start_offset": 130,
"end_offset": 144
},
{
"id": 44952,
"label": "identity",
"start_offset": 34,
"end_offset": 76
}
] | [
{
"id": 198,
"from_id": 3832,
"to_id": 3828,
"type": "authored-by"
},
{
"id": 197,
"from_id": 3828,
"to_id": 44952,
"type": "targets"
}
] | [] |
1,256 | This campaign involved five separate phishing attacks, each carrying a different variant of Sysget malware, also known as HelloBridge. | [
{
"id": 46631,
"label": "attack-pattern",
"start_offset": 38,
"end_offset": 54
},
{
"id": 46632,
"label": "malware",
"start_offset": 93,
"end_offset": 99
},
{
"id": 46633,
"label": "malware",
"start_offset": 123,
"end_offset": 134
}
] | [
{
"id": 199,
"from_id": 46633,
"to_id": 46632,
"type": "variant-of"
}
] | [] |
1,260 | All of the Sysget files used in this campaign communicate with a single command and control (C2) server, hosted at biosnews[.]info. | [
{
"id": 44955,
"label": "DOMAIN",
"start_offset": 116,
"end_offset": 131
},
{
"id": 44956,
"label": "Infrastucture",
"start_offset": 73,
"end_offset": 105
},
{
"id": 44957,
"label": "malware",
"start_offset": 12,
"end_offset": 24
}
] | [
{
"id": 42,
"from_id": 44957,
"to_id": 44956,
"type": "communicates-with"
},
{
"id": 201,
"from_id": 44956,
"to_id": 44955,
"type": "hosts"
}
] | [] |
1,262 | All five phishing campaigns targeted a Japanese manufacturing firm over the course of two months, but the final campaign also targeted a separate Japanese high-tech organization. | [
{
"id": 46637,
"label": "attack-pattern",
"start_offset": 9,
"end_offset": 27
},
{
"id": 46639,
"label": "identity",
"start_offset": 146,
"end_offset": 177
},
{
"id": 46638,
"label": "identity",
"start_offset": 39,
"end_offset": 61
}
] | [
{
"id": 203,
"from_id": 46637,
"to_id": 46639,
"type": "targets"
},
{
"id": 202,
"from_id": 46637,
"to_id": 46638,
"type": "targets"
}
] | [] |
1,266 | Four of the five Sysget variants included a form of decoy document to trick users into believing they had opened a legitimate file rather than malware. | [
{
"id": 46642,
"label": "malware",
"start_offset": 18,
"end_offset": 24
},
{
"id": 44958,
"label": "attack-pattern",
"start_offset": 53,
"end_offset": 67
}
] | [
{
"id": 204,
"from_id": 46642,
"to_id": 44958,
"type": "uses"
}
] | [] |
1,277 | During analysis of this threat, we identified five additional backdoor tools hosted on biosnews[.]info which may be downloaded by the Sysget variants once the attackers have established a foothold. | [
{
"id": 46651,
"label": "DOMAIN",
"start_offset": 87,
"end_offset": 102
},
{
"id": 46652,
"label": "malware",
"start_offset": 134,
"end_offset": 140
}
] | [
{
"id": 206,
"from_id": 46651,
"to_id": 46652,
"type": "hosts"
}
] | [] |
1,278 | Three of the backdoors, NFlog, PoisonIvy, and NewCT have previously been publicly associated with DragonOK. | [
{
"id": 44962,
"label": "malware",
"start_offset": 25,
"end_offset": 30
},
{
"id": 44963,
"label": "malware",
"start_offset": 32,
"end_offset": 41
},
{
"id": 44964,
"label": "malware",
"start_offset": 47,
"end_offset": 52
},
{
"id": 44965,
"label": "threat-actor",
"start_offset": 99,
"end_offset": 107
}
] | [
{
"id": 48,
"from_id": 44962,
"to_id": 44965,
"type": "authored-by"
},
{
"id": 47,
"from_id": 44963,
"to_id": 44965,
"type": "authored-by"
},
{
"id": 46,
"from_id": 44964,
"to_id": 44965,
"type": "authored-by"
}
] | [] |
1,283 | Figure 7. Relationship between five additional backdoors used by DragonOK and their C2 servers in this campaign. | [
{
"id": 46655,
"label": "threat-actor",
"start_offset": 66,
"end_offset": 74
},
{
"id": 46656,
"label": "Infrastucture",
"start_offset": 85,
"end_offset": 95
}
] | [
{
"id": 208,
"from_id": 46655,
"to_id": 46656,
"type": "uses"
}
] | [] |
1,320 | FormerFirstRAT communicates using unencrypted HTTP over port 443; the use of mismatching ports and communication protocols is not uncommon in targeted attack campaigns. | [
{
"id": 3993,
"label": "malware",
"start_offset": 0,
"end_offset": 14
},
{
"id": 46669,
"label": "campaign",
"start_offset": 142,
"end_offset": 167
}
] | [
{
"id": 210,
"from_id": 46669,
"to_id": 3993,
"type": "uses"
}
] | [] |
1,355 | The CVE-2021-32648 vulnerability lies within the OctoberCMS platform prior to version 1.0.472 and results in an attacker gaining access to any account via a specially crafted account password reset request. | [
{
"id": 46687,
"label": "vulnerability",
"start_offset": 5,
"end_offset": 19
},
{
"id": 46688,
"label": "SOFTWARE",
"start_offset": 50,
"end_offset": 60
}
] | [
{
"id": 211,
"from_id": 46688,
"to_id": 46687,
"type": "has"
}
] | [] |
1,359 | Using our PoC, we created the following demonstration video of how a malicious actor would exploit the CVE-2021-32648 vulnerability, log into the compromised OctoberCMS account and to deface a web page hosted by the server: | [
{
"id": 44975,
"label": "vulnerability",
"start_offset": 103,
"end_offset": 117
},
{
"id": 44976,
"label": "SOFTWARE",
"start_offset": 158,
"end_offset": 168
}
] | [
{
"id": 49,
"from_id": 44976,
"to_id": 44975,
"type": "has"
}
] | [] |
1,360 | To determine how this vulnerability was exploited, we analyzed the patch that developers added to OctoberCMS version 1.0.472 to mitigate the CVE-2021-32648 vulnerability. | [
{
"id": 46690,
"label": "vulnerability",
"start_offset": 141,
"end_offset": 155
},
{
"id": 46692,
"label": "SOFTWARE",
"start_offset": 98,
"end_offset": 108
}
] | [
{
"id": 212,
"from_id": 46692,
"to_id": 46690,
"type": "has"
}
] | [] |
1,373 | Stage1.exe purports to be ransomware, as it overwrites the target’s master boot record with 512 bytes and upon reboot displays the following ransom note: Stage2.exe is a beaconing implant that performs an HTTPS connection to download a JPG file hosted on Discord’s content delivery network (CDN). | [
{
"id": 46706,
"label": "FILEPATH",
"start_offset": 155,
"end_offset": 165
},
{
"id": 46707,
"label": "Infrastucture",
"start_offset": 256,
"end_offset": 296
},
{
"id": 46705,
"label": "FILEPATH",
"start_offset": 0,
"end_offset": 10
}
] | [
{
"id": 213,
"from_id": 46706,
"to_id": 46707,
"type": "beacons-to"
}
] | [] |
1,392 | Palo Alto Networks customers receive protections against the OctoberCMS vulnerability in the following ways: Palo Alto Networks customers receive protections against WhisperGate malware in the following ways: The Cortex XSOAR "WhisperGate & CVE-2021-32648'' pack can help automatically detect and mitigate the two threats. | [
{
"id": 44991,
"label": "identity",
"start_offset": 1,
"end_offset": 19
},
{
"id": 44996,
"label": "SOFTWARE",
"start_offset": 216,
"end_offset": 228
},
{
"id": 44998,
"label": "vulnerability",
"start_offset": 244,
"end_offset": 258
},
{
"id": 44993,
"label": "identity",
"start_offset": 111,
"end_offset": 129
},
{
"id": 44994,
"label": "vulnerability",
"start_offset": 62,
"end_offset": 86
},
{
"id": 44995,
"label": "malware",
"start_offset": 168,
"end_offset": 179
},
{
"id": 4172,
"label": "malware",
"start_offset": 230,
"end_offset": 241
}
] | [
{
"id": 51,
"from_id": 44995,
"to_id": 44998,
"type": "exploits"
},
{
"id": 214,
"from_id": 4172,
"to_id": 44998,
"type": "exploits"
}
] | [] |
1,402 | Kuluoz is a descendant of the Asprox malware and spreads by sending copies of itself as an e-mail attachment. | [
{
"id": 46751,
"label": "malware",
"start_offset": 31,
"end_offset": 37
},
{
"id": 46750,
"label": "malware",
"start_offset": 1,
"end_offset": 7
},
{
"id": 46752,
"label": "attack-pattern",
"start_offset": 61,
"end_offset": 109
}
] | [
{
"id": 216,
"from_id": 46750,
"to_id": 46751,
"type": "variant-of"
},
{
"id": 217,
"from_id": 46751,
"to_id": 46752,
"type": "uses"
},
{
"id": 218,
"from_id": 46750,
"to_id": 46752,
"type": "uses"
}
] | [] |
1,404 | Kuluoz makes money for its owner by installing other malware, such as crimeware or fake antivirus programs. | [
{
"id": 45008,
"label": "malware",
"start_offset": 0,
"end_offset": 6
},
{
"id": 45009,
"label": "attack-pattern",
"start_offset": 70,
"end_offset": 79
},
{
"id": 45010,
"label": "attack-pattern",
"start_offset": 83,
"end_offset": 106
}
] | [
{
"id": 53,
"from_id": 45008,
"to_id": 45009,
"type": "uses"
},
{
"id": 54,
"from_id": 45008,
"to_id": 45010,
"type": "uses"
}
] | [] |
1,416 | Geographic Distribution of Koluoz Spam Nodes in North America Thus far we’ve detected the following command and control servers in use. | [
{
"id": 45013,
"label": "Infrastucture",
"start_offset": 35,
"end_offset": 45
},
{
"id": 45016,
"label": "Infrastucture",
"start_offset": 103,
"end_offset": 121
},
{
"id": 45012,
"label": "malware",
"start_offset": 28,
"end_offset": 34
},
{
"id": 45014,
"label": "location",
"start_offset": 49,
"end_offset": 62
}
] | [
{
"id": 55,
"from_id": 45012,
"to_id": 45013,
"type": "communicates-with"
},
{
"id": 56,
"from_id": 45013,
"to_id": 45014,
"type": "located-at"
}
] | [] |
1,479 | In addition to our research, the Baidu Security team in China recently found 23 mobile banking apps sharing the same certificate hosted by a third party app developer and reported the discovery to the CNCERT in China. | [
{
"id": 45023,
"label": "location",
"start_offset": 56,
"end_offset": 61
},
{
"id": 45025,
"label": "location",
"start_offset": 211,
"end_offset": 216
},
{
"id": 45026,
"label": "identity",
"start_offset": 201,
"end_offset": 207
},
{
"id": 45024,
"label": "identity",
"start_offset": 33,
"end_offset": 52
}
] | [
{
"id": 58,
"from_id": 45026,
"to_id": 45025,
"type": "located-at"
},
{
"id": 219,
"from_id": 45024,
"to_id": 45023,
"type": "located-at"
}
] | [] |
1,503 | Recently Palo Alto Networks discovered a backdoor program ( md5: b826fb1253a52a3b53afa3b7543d7694, sha256: 6bedd1b0716fe7632188932451f75295346836545e6d2bfee1b56121e02ca110 ) that is used to control a linux operating system. | [
{
"id": 45032,
"label": "SHA2",
"start_offset": 108,
"end_offset": 172
},
{
"id": 45033,
"label": "identity",
"start_offset": 10,
"end_offset": 28
},
{
"id": 45031,
"label": "MD5",
"start_offset": 66,
"end_offset": 98
},
{
"id": 45034,
"label": "SOFTWARE",
"start_offset": 201,
"end_offset": 223
}
] | [
{
"id": 220,
"from_id": 45031,
"to_id": 45032,
"type": "related-to"
}
] | [] |
1,529 | This post is also available in: 日本語 (Japanese) In July 2020, Microsoft released a security update, CVE-2020-1350 | Windows DNS Server Remote Code Execution Vulnerability, for a new remote code execution (RCE) vulnerability. | [
{
"id": 46789,
"label": "TIME",
"start_offset": 56,
"end_offset": 65
},
{
"id": 46790,
"label": "identity",
"start_offset": 67,
"end_offset": 76
},
{
"id": 46791,
"label": "vulnerability",
"start_offset": 105,
"end_offset": 118
},
{
"id": 46792,
"label": "vulnerability",
"start_offset": 121,
"end_offset": 176
},
{
"id": 46793,
"label": "attack-pattern",
"start_offset": 187,
"end_offset": 214
}
] | [
{
"id": 221,
"from_id": 46791,
"to_id": 46792,
"type": "related-to"
},
{
"id": 223,
"from_id": 46793,
"to_id": 46791,
"type": "targets"
},
{
"id": 222,
"from_id": 46793,
"to_id": 46792,
"type": "targets"
}
] | [] |
1,540 | Overview Palo Alto Networks Unit 42 threat research team has just uncovered a new set of attacks by the Sofacy group using malicious emails targeting foreign affairs agencies and ministries in North America and Europe, including a European embassy in Moscow. | [
{
"id": 46799,
"label": "identity",
"start_offset": 9,
"end_offset": 56
},
{
"id": 46801,
"label": "location",
"start_offset": 193,
"end_offset": 206
},
{
"id": 46802,
"label": "location",
"start_offset": 211,
"end_offset": 217
},
{
"id": 46806,
"label": "attack-pattern",
"start_offset": 123,
"end_offset": 139
},
{
"id": 46808,
"label": "location",
"start_offset": 251,
"end_offset": 257
},
{
"id": 46807,
"label": "identity",
"start_offset": 231,
"end_offset": 247
},
{
"id": 46805,
"label": "threat-actor",
"start_offset": 104,
"end_offset": 116
}
] | [
{
"id": 226,
"from_id": 46805,
"to_id": 46806,
"type": "uses"
},
{
"id": 227,
"from_id": 46807,
"to_id": 46808,
"type": "located-at"
},
{
"id": 228,
"from_id": 46805,
"to_id": 46807,
"type": "targets"
},
{
"id": 229,
"from_id": 46805,
"to_id": 46801,
"type": "targets"
},
{
"id": 230,
"from_id": 46805,
"to_id": 46802,
"type": "targets"
}
] | [] |
1,542 | The Sofacy Group (AKA APT28, Grizzly Steppe, Fancy Bear, STRONTIUM, Sednit, Tsar Team, Pawn Storm) is a well-known hacking organization widely reported to be associated with Russia by the US Intelligence Community, numerous media reports and other cybersecurity companies. | [
{
"id": 45045,
"label": "threat-actor",
"start_offset": 4,
"end_offset": 16
},
{
"id": 45046,
"label": "threat-actor",
"start_offset": 22,
"end_offset": 27
},
{
"id": 45051,
"label": "threat-actor",
"start_offset": 76,
"end_offset": 85
},
{
"id": 45052,
"label": "threat-actor",
"start_offset": 87,
"end_offset": 97
},
{
"id": 45053,
"label": "location",
"start_offset": 174,
"end_offset": 180
},
{
"id": 45054,
"label": "identity",
"start_offset": 188,
"end_offset": 213
},
{
"id": 45047,
"label": "threat-actor",
"start_offset": 29,
"end_offset": 43
},
{
"id": 45048,
"label": "threat-actor",
"start_offset": 45,
"end_offset": 55
},
{
"id": 45049,
"label": "threat-actor",
"start_offset": 57,
"end_offset": 66
},
{
"id": 45050,
"label": "threat-actor",
"start_offset": 68,
"end_offset": 74
}
] | [
{
"id": 59,
"from_id": 45045,
"to_id": 45053,
"type": "located-at"
},
{
"id": 60,
"from_id": 45046,
"to_id": 45053,
"type": "located-at"
},
{
"id": 62,
"from_id": 45048,
"to_id": 45053,
"type": "located-at"
},
{
"id": 63,
"from_id": 45049,
"to_id": 45053,
"type": "located-at"
},
{
"id": 64,
"from_id": 45050,
"to_id": 45053,
"type": "located-at"
},
{
"id": 68,
"from_id": 45046,
"to_id": 45045,
"type": "duplicate-of"
},
{
"id": 69,
"from_id": 45047,
"to_id": 45045,
"type": "duplicate-of"
},
{
"id": 65,
"from_id": 45051,
"to_id": 45053,
"type": "located-at"
},
{
"id": 66,
"from_id": 45052,
"to_id": 45053,
"type": "located-at"
},
{
"id": 70,
"from_id": 45048,
"to_id": 45045,
"type": "duplicate-of"
},
{
"id": 71,
"from_id": 45049,
"to_id": 45045,
"type": "duplicate-of"
},
{
"id": 72,
"from_id": 45050,
"to_id": 45045,
"type": "duplicate-of"
},
{
"id": 61,
"from_id": 45047,
"to_id": 45053,
"type": "located-at"
},
{
"id": 73,
"from_id": 45051,
"to_id": 45045,
"type": "duplicate-of"
},
{
"id": 74,
"from_id": 45052,
"to_id": 45045,
"type": "duplicate-of"
}
] | [] |
1,543 | Sofacy Group has been associated with many attacks against targets around the world, including the International Olympic Committee (IOC) in 2018, the World Anti-Doping Agency in 2016, the Dutch Safety Board in 2015, and German, French, Ukrainian, and Dutch political and military targets throughout 2014 through 2018. | [
{
"id": 46818,
"label": "location",
"start_offset": 221,
"end_offset": 227
},
{
"id": 46819,
"label": "location",
"start_offset": 229,
"end_offset": 235
},
{
"id": 46820,
"label": "location",
"start_offset": 237,
"end_offset": 246
},
{
"id": 46822,
"label": "identity",
"start_offset": 151,
"end_offset": 175
},
{
"id": 46812,
"label": "identity",
"start_offset": 100,
"end_offset": 137
},
{
"id": 46813,
"label": "TIME",
"start_offset": 141,
"end_offset": 145
},
{
"id": 46814,
"label": "TIME",
"start_offset": 300,
"end_offset": 304
},
{
"id": 46816,
"label": "TIME",
"start_offset": 179,
"end_offset": 183
},
{
"id": 46821,
"label": "location",
"start_offset": 252,
"end_offset": 257
},
{
"id": 46823,
"label": "identity",
"start_offset": 189,
"end_offset": 207
},
{
"id": 46824,
"label": "identity",
"start_offset": 258,
"end_offset": 288
},
{
"id": 46811,
"label": "threat-actor",
"start_offset": 1,
"end_offset": 13
},
{
"id": 46815,
"label": "TIME",
"start_offset": 313,
"end_offset": 317
},
{
"id": 46817,
"label": "TIME",
"start_offset": 211,
"end_offset": 215
}
] | [
{
"id": 231,
"from_id": 46811,
"to_id": 46812,
"type": "targets"
},
{
"id": 232,
"from_id": 46811,
"to_id": 46822,
"type": "targets"
},
{
"id": 233,
"from_id": 46811,
"to_id": 46823,
"type": "targets"
},
{
"id": 234,
"from_id": 46811,
"to_id": 46824,
"type": "targets"
},
{
"id": 236,
"from_id": 46824,
"to_id": 46818,
"type": "located-at"
},
{
"id": 237,
"from_id": 46824,
"to_id": 46819,
"type": "located-at"
},
{
"id": 238,
"from_id": 46824,
"to_id": 46820,
"type": "located-at"
},
{
"id": 239,
"from_id": 46824,
"to_id": 46821,
"type": "located-at"
}
] | [] |
1,569 | Bad Rabbit is a ransomware attack that, at the time of this writing, appears to primarily be affecting countries in Eastern Europe. | [
{
"id": 45059,
"label": "malware",
"start_offset": 1,
"end_offset": 11
},
{
"id": 45060,
"label": "location",
"start_offset": 117,
"end_offset": 131
}
] | [
{
"id": 75,
"from_id": 45059,
"to_id": 45060,
"type": "targets"
}
] | [] |
1,572 | As detailed below, Bad Rabbit gains initial entry by posing as an Adobe Flash update. | [
{
"id": 45062,
"label": "malware",
"start_offset": 20,
"end_offset": 30
},
{
"id": 45063,
"label": "SOFTWARE",
"start_offset": 67,
"end_offset": 78
}
] | [
{
"id": 240,
"from_id": 45062,
"to_id": 45063,
"type": "related-to"
}
] | [] |
1,580 | According to ESET, the initial infection vector for Bad Rabbit is through a fake Adobe Flash update that is offered up from compromised websites. | [
{
"id": 4716,
"label": "malware",
"start_offset": 53,
"end_offset": 63
},
{
"id": 46834,
"label": "identity",
"start_offset": 14,
"end_offset": 18
},
{
"id": 46835,
"label": "SOFTWARE",
"start_offset": 82,
"end_offset": 93
}
] | [
{
"id": 241,
"from_id": 4716,
"to_id": 46835,
"type": "related-to"
}
] | [] |
1,584 | Reports indicate that it harvests credentials using Mimikatz and Maarten van Dantzig reports it also uses common hardcoded credentials to spread. | [
{
"id": 45067,
"label": "tools",
"start_offset": 52,
"end_offset": 60
},
{
"id": 45068,
"label": "identity",
"start_offset": 65,
"end_offset": 84
},
{
"id": 45069,
"label": "attack-pattern",
"start_offset": 25,
"end_offset": 45
}
] | [
{
"id": 76,
"from_id": 45069,
"to_id": 45067,
"type": "uses"
}
] | [] |
1,640 | In total we’ve found 18 different applications in the Google Play store that contain the Funtasy Trojan. | [
{
"id": 46863,
"label": "malware",
"start_offset": 90,
"end_offset": 97
},
{
"id": 46864,
"label": "SOFTWARE",
"start_offset": 55,
"end_offset": 66
}
] | [
{
"id": 242,
"from_id": 46864,
"to_id": 46863,
"type": "hosts"
}
] | [] |
1,654 | Of particular note is how these actors use a Remote Administration Tool (RAT) named NetWire (part of the NetWiredRC malware family). | [
{
"id": 46866,
"label": "malware",
"start_offset": 85,
"end_offset": 92
},
{
"id": 46867,
"label": "malware",
"start_offset": 106,
"end_offset": 116
}
] | [
{
"id": 243,
"from_id": 46866,
"to_id": 46867,
"type": "variant-of"
}
] | [] |
1,687 | While the SunOrcal malware family has been confirmed to have been active since 2013, possibly even earlier, this new variant has been observed targeting regions outside of the typical target radius for this threat group, now expanding to include Vietnam and Myanmar. | [
{
"id": 5005,
"label": "malware",
"start_offset": 10,
"end_offset": 18
},
{
"id": 46877,
"label": "TIME",
"start_offset": 79,
"end_offset": 83
},
{
"id": 46878,
"label": "location",
"start_offset": 246,
"end_offset": 253
},
{
"id": 46879,
"label": "location",
"start_offset": 258,
"end_offset": 265
}
] | [
{
"id": 244,
"from_id": 5005,
"to_id": 46878,
"type": "targets"
},
{
"id": 246,
"from_id": 5005,
"to_id": 46879,
"type": "targets"
}
] | [] |
1,708 | Last year we highlighted two malware families on this blog: CryptoWall 2.0 and Dyreza/Dyre. | [
{
"id": 46883,
"label": "malware",
"start_offset": 61,
"end_offset": 75
},
{
"id": 46884,
"label": "malware",
"start_offset": 80,
"end_offset": 86
},
{
"id": 46885,
"label": "malware",
"start_offset": 87,
"end_offset": 91
}
] | [
{
"id": 247,
"from_id": 46884,
"to_id": 46885,
"type": "duplicate-of"
}
] | [] |
1,711 | In October, CryptoWall 2.0 began using the Tor anonymity network to serve web pages to infected users who wanted their encrypted files back. | [
{
"id": 5083,
"label": "tools",
"start_offset": 44,
"end_offset": 47
},
{
"id": 46886,
"label": "TIME",
"start_offset": 4,
"end_offset": 11
},
{
"id": 46887,
"label": "malware",
"start_offset": 13,
"end_offset": 27
}
] | [
{
"id": 248,
"from_id": 46887,
"to_id": 5083,
"type": "uses"
}
] | [] |
1,712 | In this case a legitimate service (Tor) was being abused by CryptoWall so it could avoid having its C2 servers shut down. | [
{
"id": 5086,
"label": "malware",
"start_offset": 60,
"end_offset": 70
},
{
"id": 5085,
"label": "tools",
"start_offset": 35,
"end_offset": 38
}
] | [
{
"id": 249,
"from_id": 5086,
"to_id": 5085,
"type": "uses"
}
] | [] |
1,716 | I2P users can access specific I2P services that are only accessible on I2P, or access Internet resources without exposing their IP address. In the case of CryptoWall 3.0, the malware is attempting to access multiple .i2p resources only accessible through I2P, also known as “eepSites.” The CryptoWall 3.0 uses I2P in the same way CryptoWall 2.0 used Tor, to give victims access to a decrypting service to get their files back. | [
{
"id": 45105,
"label": "SOFTWARE",
"start_offset": 71,
"end_offset": 74
},
{
"id": 45104,
"label": "SOFTWARE",
"start_offset": 30,
"end_offset": 33
},
{
"id": 45106,
"label": "malware",
"start_offset": 156,
"end_offset": 170
},
{
"id": 45107,
"label": "SOFTWARE",
"start_offset": 256,
"end_offset": 260
},
{
"id": 45108,
"label": "malware",
"start_offset": 292,
"end_offset": 306
},
{
"id": 45110,
"label": "SOFTWARE",
"start_offset": 312,
"end_offset": 315
},
{
"id": 45111,
"label": "malware",
"start_offset": 332,
"end_offset": 346
},
{
"id": 45103,
"label": "SOFTWARE",
"start_offset": 0,
"end_offset": 3
},
{
"id": 5104,
"label": "tools",
"start_offset": 352,
"end_offset": 355
}
] | [
{
"id": 250,
"from_id": 45111,
"to_id": 5104,
"type": "uses"
},
{
"id": 252,
"from_id": 45108,
"to_id": 45111,
"type": "related-to"
},
{
"id": 253,
"from_id": 45106,
"to_id": 45107,
"type": "uses"
},
{
"id": 251,
"from_id": 45108,
"to_id": 45110,
"type": "uses"
}
] | [] |
1,757 | And before long, Yuki Chen (@guhe120), a Chinese researcher, posted his answer. | [
{
"id": 46908,
"label": "identity",
"start_offset": 28,
"end_offset": 36
},
{
"id": 46907,
"label": "identity",
"start_offset": 17,
"end_offset": 26
},
{
"id": 46909,
"label": "location",
"start_offset": 41,
"end_offset": 48
}
] | [
{
"id": 254,
"from_id": 46907,
"to_id": 46908,
"type": "duplicate-of"
},
{
"id": 255,
"from_id": 46907,
"to_id": 46909,
"type": "located-at"
},
{
"id": 256,
"from_id": 46908,
"to_id": 46909,
"type": "located-at"
}
] | [] |
1,787 | While previous AvosLocker infections employ similar routines, this is the first sample we observed from the US with the capability to disable a defense solution using a legitimate Avast Anti-Rootkit Driver file (asWarPot.sys). | [
{
"id": 5285,
"label": "malware",
"start_offset": 15,
"end_offset": 25
},
{
"id": 46915,
"label": "FILEPATH",
"start_offset": 212,
"end_offset": 224
},
{
"id": 46916,
"label": "SOFTWARE",
"start_offset": 180,
"end_offset": 205
},
{
"id": 46917,
"label": "location",
"start_offset": 108,
"end_offset": 110
}
] | [
{
"id": 257,
"from_id": 5285,
"to_id": 46916,
"type": "targets"
},
{
"id": 258,
"from_id": 5285,
"to_id": 46917,
"type": "targets"
}
] | [] |