id
int64 105
14.4k
| text
stringlengths 41
889
| entities
list | relations
list |
---|---|---|---|
249 | A cybersquatting domain save-russia[.]today is launching DoS attacks on Ukrainian news sites. | [
{
"end_offset": 16,
"id": 44656,
"label": "attack-pattern",
"start_offset": 2
},
{
"end_offset": 43,
"id": 44657,
"label": "url",
"start_offset": 24
},
{
"end_offset": 68,
"id": 44658,
"label": "attack-pattern",
"start_offset": 57
},
{
"end_offset": 92,
"id": 44659,
"label": "identity",
"start_offset": 72
}
] | [
{
"from_id": 44658,
"id": 9,
"to_id": 44659,
"type": "targets"
},
{
"from_id": 44656,
"id": 114,
"to_id": 44657,
"type": "uses"
},
{
"from_id": 44658,
"id": 115,
"to_id": 44657,
"type": "uses"
}
] |
14,309 | Like the Android Maikspy, it first sends a notification to its C&C server to register the device. | [
{
"end_offset": 17,
"id": 48530,
"label": "SOFTWARE",
"start_offset": 9
},
{
"end_offset": 24,
"id": 48531,
"label": "malware",
"start_offset": 17
},
{
"end_offset": 73,
"id": 48532,
"label": "Infrastucture",
"start_offset": 63
}
] | [
{
"from_id": 48531,
"id": 445,
"to_id": 48532,
"type": "beacons-to"
}
] |
13,996 | While analyzing the technical details of this malware, which includes two new espionage backdoors, we noticed striking similarities to other malware attributed to the threat actor known as APT37, also known as Reaper or Group 123. | [
{
"end_offset": 194,
"id": 48781,
"label": "threat-actor",
"start_offset": 188
},
{
"end_offset": 217,
"id": 48782,
"label": "threat-actor",
"start_offset": 210
},
{
"end_offset": 229,
"id": 48783,
"label": "threat-actor",
"start_offset": 220
}
] | [
{
"from_id": 48781,
"id": 461,
"to_id": 48782,
"type": "duplicate-of"
},
{
"from_id": 48781,
"id": 462,
"to_id": 48783,
"type": "duplicate-of"
}
] |
13,600 | (Note that Flash has been declared end-of-life by Adobe since December 31, 2020.) If the victim downloads and executes the installer downloaded from this page, the victim will be infected with a variant of Gh0stRat malware, previously also named Gh0stCringe or CineregRAT. | [
{
"end_offset": 79,
"id": 51687,
"label": "TIME",
"start_offset": 62
},
{
"end_offset": 215,
"id": 51688,
"label": "malware",
"start_offset": 207
},
{
"end_offset": 258,
"id": 51689,
"label": "malware",
"start_offset": 247
},
{
"end_offset": 272,
"id": 51690,
"label": "malware",
"start_offset": 262
}
] | [
{
"from_id": 51688,
"id": 1133,
"to_id": 51689,
"type": "related-to"
},
{
"from_id": 51688,
"id": 1134,
"to_id": 51690,
"type": "related-to"
}
] |
14,364 | Figure 21. Connection of Maikspy variants to 107[.]180[.]46[.]243 and hxxp://fakeomegle[.]com Figure 22. Connection of Maikspy variants to 198[.]12[.]149[.]13and hxxp://miakhalifagame[.]com/ | [
{
"end_offset": 191,
"id": 51779,
"label": "URL",
"start_offset": 163
},
{
"end_offset": 93,
"id": 51777,
"label": "URL",
"start_offset": 70
},
{
"end_offset": 127,
"id": 51781,
"label": "malware",
"start_offset": 120
},
{
"end_offset": 159,
"id": 51778,
"label": "IPV4",
"start_offset": 140
},
{
"end_offset": 32,
"id": 51780,
"label": "malware",
"start_offset": 25
},
{
"end_offset": 65,
"id": 44372,
"label": "IPV4",
"start_offset": 45
}
] | [
{
"from_id": 51780,
"id": 1161,
"to_id": 44372,
"type": "communicates-with"
},
{
"from_id": 51780,
"id": 1162,
"to_id": 51777,
"type": "communicates-with"
},
{
"from_id": 51781,
"id": 1163,
"to_id": 51778,
"type": "communicates-with"
},
{
"from_id": 51781,
"id": 1164,
"to_id": 51779,
"type": "communicates-with"
}
] |
13,565 | The source code of this framework is shared across many Chinese public forums. | [
{
"end_offset": 63,
"id": 51646,
"label": "location",
"start_offset": 56
},
{
"end_offset": 33,
"id": 51647,
"label": "tools",
"start_offset": 24
}
] | [
{
"from_id": 51647,
"id": 1123,
"to_id": 51646,
"type": "related-to"
}
] |
2,400 | The CVE-2022-22965 vulnerability allows an attacker unauthenticated remote code execution (RCE), which Unit 42 has observed being exploited in the wild. | [
{
"end_offset": 18,
"id": 45495,
"label": "vulnerability",
"start_offset": 4
},
{
"end_offset": 89,
"id": 45496,
"label": "attack-pattern",
"start_offset": 52
},
{
"end_offset": 110,
"id": 45497,
"label": "identity",
"start_offset": 103
}
] | [
{
"from_id": 45496,
"id": 105,
"to_id": 45495,
"type": "delivers"
}
] |
14,126 | At the same time, we were able to locate the Mattermost server hosted in Greece, and that gave us the current time zone of the Mattermost server. | [
{
"end_offset": 79,
"id": 48192,
"label": "location",
"start_offset": 73
},
{
"end_offset": 144,
"id": 48191,
"label": "Infrastucture",
"start_offset": 127
},
{
"end_offset": 62,
"id": 48193,
"label": "Infrastucture",
"start_offset": 45
}
] | [
{
"from_id": 48191,
"id": 392,
"to_id": 48192,
"type": "located-at"
},
{
"from_id": 48193,
"id": 393,
"to_id": 48192,
"type": "located-at"
}
] |
1,929 | But this link is further fortified by the Android applications we found whose code is like that of Bahamut, with the C&C matching the usual name registration pattern of Patchwork’s group, as well as an infrastructure close to an old Patchwork domain. | [
{
"end_offset": 49,
"id": 45181,
"label": "SOFTWARE",
"start_offset": 42
},
{
"end_offset": 178,
"id": 45183,
"label": "threat-actor",
"start_offset": 169
},
{
"end_offset": 242,
"id": 45184,
"label": "threat-actor",
"start_offset": 233
},
{
"end_offset": 106,
"id": 45182,
"label": "malware",
"start_offset": 99
}
] | [
{
"from_id": 45182,
"id": 80,
"to_id": 45183,
"type": "attributed-to"
}
] |
1,921 | A malicious RTF file that exploits the CVE-2017-8750 and drops a malicious VB backdoor with C&C appswonder[.]info A malicious InPage file that exploits CVE-2017-12824 and drops two files, one non-malicious, and one malicious VB backdoor with C&C referfile[.]com Talos recently reported both C&C domain names with one type of campaign that targets iOS and involves MDM, and another type using VB and Delphi backdoors. | [
{
"end_offset": 53,
"id": 47039,
"label": "vulnerability",
"start_offset": 40
},
{
"end_offset": 262,
"id": 47042,
"label": "url",
"start_offset": 247
},
{
"end_offset": 269,
"id": 47043,
"label": "identity",
"start_offset": 264
},
{
"end_offset": 352,
"id": 47044,
"label": "SOFTWARE",
"start_offset": 349
},
{
"end_offset": 16,
"id": 47045,
"label": "malware",
"start_offset": 3
},
{
"end_offset": 167,
"id": 47040,
"label": "vulnerability",
"start_offset": 153
},
{
"end_offset": 114,
"id": 47041,
"label": "url",
"start_offset": 97
}
] | [
{
"from_id": 47045,
"id": 291,
"to_id": 47039,
"type": "exploits"
},
{
"from_id": 47045,
"id": 292,
"to_id": 47041,
"type": "communicates-with"
}
] |
4,577 | Recently observed COLDRIVER indicators: In another campaign tracked by CERT-UA as UAC-0056 we observed compromised email addresses of a Regional Prosecutor’s office of Ukraine leveraged to send malicious Microsoft Excel documents with VBA macros delivering Cobalt Strike. | [
{
"end_offset": 270,
"id": 50428,
"label": "tools",
"start_offset": 257
},
{
"end_offset": 78,
"id": 50424,
"label": "identity",
"start_offset": 71
},
{
"end_offset": 90,
"id": 50425,
"label": "threat-actor",
"start_offset": 82
},
{
"end_offset": 219,
"id": 50427,
"label": "SOFTWARE",
"start_offset": 204
},
{
"end_offset": 27,
"id": 50423,
"label": "threat-actor",
"start_offset": 18
},
{
"end_offset": 175,
"id": 50426,
"label": "identity",
"start_offset": 136
}
] | [
{
"from_id": 50423,
"id": 969,
"to_id": 50425,
"type": "duplicate-of"
},
{
"from_id": 50423,
"id": 970,
"to_id": 50426,
"type": "impersonates"
}
] |
5,230 | We named these malicious apps AnubisSpy (ANDROIDOS_ANUBISSPY) as all the malware’s payload is a package called watchdog. | [
{
"end_offset": 119,
"id": 51263,
"label": "malware",
"start_offset": 111
},
{
"end_offset": 60,
"id": 51262,
"label": "malware",
"start_offset": 41
},
{
"end_offset": 39,
"id": 16073,
"label": "malware",
"start_offset": 30
}
] | [
{
"from_id": 51262,
"id": 1072,
"to_id": 16073,
"type": "duplicate-of"
}
] |
3,788 | At the time, we found ChessMaster targeting different sectors from the academe to media and government agencies in Japan. | [
{
"end_offset": 33,
"id": 49628,
"label": "campaign",
"start_offset": 22
},
{
"end_offset": 111,
"id": 49629,
"label": "identity",
"start_offset": 71
},
{
"end_offset": 120,
"id": 49630,
"label": "location",
"start_offset": 115
}
] | [
{
"from_id": 49628,
"id": 851,
"to_id": 49629,
"type": "targets"
},
{
"from_id": 49629,
"id": 852,
"to_id": 49630,
"type": "located-at"
}
] |
3,833 | Base64 encoded ANEL downloaded by Koadic ANEL will send the infected environment’s information to the C&C server. | [
{
"end_offset": 19,
"id": 49689,
"label": "malware",
"start_offset": 15
},
{
"end_offset": 40,
"id": 49690,
"label": "malware",
"start_offset": 34
},
{
"end_offset": 45,
"id": 49691,
"label": "malware",
"start_offset": 41
},
{
"end_offset": 112,
"id": 49692,
"label": "Infrastucture",
"start_offset": 102
}
] | [
{
"from_id": 49690,
"id": 860,
"to_id": 49689,
"type": "downloads"
},
{
"from_id": 49691,
"id": 861,
"to_id": 49692,
"type": "exfiltrates-to"
}
] |
4,830 | Recently observed COLDRIVER indicators: In another campaign tracked by CERT-UA as UAC-0056 we observed compromised email addresses of a Regional Prosecutor’s office of Ukraine leveraged to send malicious Microsoft Excel documents with VBA macros delivering Cobalt Strike. | [
{
"end_offset": 78,
"id": 50783,
"label": "identity",
"start_offset": 71
},
{
"end_offset": 219,
"id": 50785,
"label": "SOFTWARE",
"start_offset": 204
},
{
"end_offset": 270,
"id": 50786,
"label": "tools",
"start_offset": 257
},
{
"end_offset": 175,
"id": 50784,
"label": "identity",
"start_offset": 136
},
{
"end_offset": 27,
"id": 14710,
"label": "threat-actor",
"start_offset": 18
},
{
"end_offset": 90,
"id": 14713,
"label": "threat-actor",
"start_offset": 82
}
] | [
{
"from_id": 14713,
"id": 1015,
"to_id": 14710,
"type": "duplicate-of"
},
{
"from_id": 14710,
"id": 1016,
"to_id": 50784,
"type": "targets"
},
{
"from_id": 14710,
"id": 1017,
"to_id": 50785,
"type": "uses"
},
{
"from_id": 14710,
"id": 1018,
"to_id": 50786,
"type": "uses"
}
] |
4,626 | As part of TAG's mission to counter serious threats to Google and our users, we've analyzed a range of persistent threats including APT35 and Charming Kitten, an Iranian government-backed group that regularly targets high risk users. | [
{
"end_offset": 61,
"id": 50537,
"label": "identity",
"start_offset": 55
},
{
"end_offset": 137,
"id": 50538,
"label": "threat-actor",
"start_offset": 132
},
{
"end_offset": 157,
"id": 50539,
"label": "threat-actor",
"start_offset": 142
},
{
"end_offset": 169,
"id": 50540,
"label": "location",
"start_offset": 162
},
{
"end_offset": 14,
"id": 50536,
"label": "identity",
"start_offset": 11
}
] | [
{
"from_id": 50538,
"id": 980,
"to_id": 50540,
"type": "located-at"
},
{
"from_id": 50539,
"id": 981,
"to_id": 50540,
"type": "located-at"
}
] |
3,392 | BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 36e3fcd6a4c7c9db985be77ea6394b2ed019332fdae4739df2f96a541ea52617 Silverlight.exe | [
{
"end_offset": 11,
"id": 10242,
"label": "malware",
"start_offset": 0
},
{
"end_offset": 110,
"id": 10243,
"label": "hash",
"start_offset": 46
},
{
"end_offset": 44,
"id": 49045,
"label": "malware",
"start_offset": 20
},
{
"end_offset": 127,
"id": 49046,
"label": "FILEPATH",
"start_offset": 112
}
] | [
{
"from_id": 10242,
"id": 596,
"to_id": 49045,
"type": "duplicate-of"
},
{
"from_id": 49046,
"id": 597,
"to_id": 10243,
"type": "duplicate-of"
},
{
"from_id": 49046,
"id": 598,
"to_id": 49045,
"type": "indicates"
},
{
"from_id": 10243,
"id": 599,
"to_id": 49045,
"type": "indicates"
}
] |
4,497 | The actors behind this campaign, which we attributed to a government-backed entity based in North Korea, have employed a number of means to target researchers. | [
{
"end_offset": 31,
"id": 50299,
"label": "campaign",
"start_offset": 23
},
{
"end_offset": 103,
"id": 50300,
"label": "location",
"start_offset": 92
}
] | [
{
"from_id": 50299,
"id": 942,
"to_id": 50300,
"type": "attributed-to"
}
] |
3,748 | CVE-2022-22954, a remote code execution (RCE) vulnerability due to server-side template injection in VMware Workspace ONE Access and Identity Manager, is trivial to exploit with a single HTTP request to a vulnerable device. | [
{
"end_offset": 46,
"id": 49573,
"label": "attack-pattern",
"start_offset": 19
},
{
"end_offset": 98,
"id": 49574,
"label": "attack-pattern",
"start_offset": 68
},
{
"end_offset": 15,
"id": 49572,
"label": "vulnerability",
"start_offset": 1
},
{
"end_offset": 150,
"id": 49575,
"label": "SOFTWARE",
"start_offset": 102
}
] | [
{
"from_id": 49575,
"id": 830,
"to_id": 49572,
"type": "has"
},
{
"from_id": 49572,
"id": 831,
"to_id": 49573,
"type": "uses"
},
{
"from_id": 49572,
"id": 832,
"to_id": 49574,
"type": "uses"
}
] |
3,661 | MITRE also identifies different main targets for each group: While Carbanak focuses on banking institutions, FIN7 targets food, hospitality, and retail establishments. | [
{
"end_offset": 75,
"id": 49437,
"label": "threat-actor",
"start_offset": 67
},
{
"end_offset": 113,
"id": 49438,
"label": "threat-actor",
"start_offset": 109
},
{
"end_offset": 5,
"id": 49436,
"label": "identity",
"start_offset": 0
},
{
"end_offset": 107,
"id": 49439,
"label": "identity",
"start_offset": 87
},
{
"end_offset": 166,
"id": 49440,
"label": "identity",
"start_offset": 122
}
] | [
{
"from_id": 49437,
"id": 795,
"to_id": 49439,
"type": "targets"
},
{
"from_id": 49438,
"id": 796,
"to_id": 49440,
"type": "targets"
}
] |
3,173 | What makes BIOPASS RAT particularly interesting is that it can sniff its victim’s screen by abusing the framework of Open Broadcaster Software (OBS) Studio, a popular live streaming and video recording app, to establish live streaming to a cloud service via Real-Time Messaging Protocol (RTMP). | [
{
"end_offset": 22,
"id": 48296,
"label": "malware",
"start_offset": 11
},
{
"end_offset": 293,
"id": 48298,
"label": "SOFTWARE",
"start_offset": 258
},
{
"end_offset": 148,
"id": 48297,
"label": "SOFTWARE",
"start_offset": 117
}
] | [
{
"from_id": 48296,
"id": 400,
"to_id": 48297,
"type": "targets"
}
] |
1,569 | Bad Rabbit is a ransomware attack that, at the time of this writing, appears to primarily be affecting countries in Eastern Europe. | [
{
"end_offset": 11,
"id": 45059,
"label": "malware",
"start_offset": 1
},
{
"end_offset": 131,
"id": 45060,
"label": "location",
"start_offset": 117
}
] | [
{
"from_id": 45059,
"id": 75,
"to_id": 45060,
"type": "targets"
}
] |
3,384 | BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 3195c355aa564ea66b4b37baa9547cb53dde7cf4ae7010256db92fff0bde873d flash.exe | [
{
"end_offset": 11,
"id": 10232,
"label": "malware",
"start_offset": 0
},
{
"end_offset": 110,
"id": 10233,
"label": "hash",
"start_offset": 46
},
{
"end_offset": 44,
"id": 49035,
"label": "malware",
"start_offset": 20
},
{
"end_offset": 121,
"id": 49036,
"label": "FILEPATH",
"start_offset": 112
}
] | [
{
"from_id": 10232,
"id": 582,
"to_id": 49035,
"type": "duplicate-of"
},
{
"from_id": 49036,
"id": 583,
"to_id": 10233,
"type": "duplicate-of"
},
{
"from_id": 49036,
"id": 584,
"to_id": 49035,
"type": "indicates"
},
{
"from_id": 10233,
"id": 585,
"to_id": 49035,
"type": "indicates"
}
] |
2,027 | While the obfuscation and execution may differ between the two, both samples contain very similar core functionality, due to the author copying the leaked Babuk/Babyk source code in order to develop the HelloXD ransomware (Figure 7). | [
{
"end_offset": 210,
"id": 47122,
"label": "malware",
"start_offset": 203
},
{
"end_offset": 166,
"id": 47121,
"label": "malware",
"start_offset": 161
},
{
"end_offset": 160,
"id": 47120,
"label": "malware",
"start_offset": 155
}
] | [
{
"from_id": 47121,
"id": 303,
"to_id": 47122,
"type": "variant-of"
},
{
"from_id": 47120,
"id": 304,
"to_id": 47122,
"type": "variant-of"
}
] |
13,472 | We continue to see attacks from groups like Charming Kitten on medical and healthcare professionals, including World Health Organization (WHO) employees. | [
{
"end_offset": 59,
"id": 51544,
"label": "threat-actor",
"start_offset": 44
},
{
"end_offset": 142,
"id": 51545,
"label": "identity",
"start_offset": 111
}
] | [
{
"from_id": 51544,
"id": 1101,
"to_id": 51545,
"type": "targets"
}
] |
3,436 | This post is also available in: 日本語 (Japanese) On May 4, 2022, F5 released a security advisory for a remote code execution vulnerability in the iControlREST component of its BIG-IP product tracked in CVE-2022-1388. | [
{
"end_offset": 219,
"id": 49195,
"label": "vulnerability",
"start_offset": 206
},
{
"end_offset": 142,
"id": 49196,
"label": "vulnerability",
"start_offset": 107
},
{
"end_offset": 67,
"id": 49193,
"label": "TIME",
"start_offset": 53
},
{
"end_offset": 71,
"id": 49194,
"label": "identity",
"start_offset": 69
},
{
"end_offset": 162,
"id": 49197,
"label": "tools",
"start_offset": 150
}
] | [
{
"from_id": 49196,
"id": 750,
"to_id": 49195,
"type": "duplicate-of"
},
{
"from_id": 49197,
"id": 751,
"to_id": 49195,
"type": "has"
}
] |
2,597 | This initial focus has led to speculation that Lapsus$ Group may be Brazilian, although we understand the choice of targets to have been influenced by extended team members rather than the team leadership. | [
{
"end_offset": 54,
"id": 47788,
"label": "threat-actor",
"start_offset": 47
},
{
"end_offset": 77,
"id": 47789,
"label": "location",
"start_offset": 68
}
] | [
{
"from_id": 47788,
"id": 356,
"to_id": 47789,
"type": "located-at"
}
] |
4,585 | In March 2021, Microsoft kicked off the patch cycle early after releasing an advisory regarding the mass exploitation of four zero-days vulnerabilities by a Chinese Hacking group, HAFNIUM, on the on-premises versions of the Microsoft Exchange Server. | [
{
"end_offset": 13,
"id": 50436,
"label": "TIME",
"start_offset": 3
},
{
"end_offset": 24,
"id": 50437,
"label": "identity",
"start_offset": 15
},
{
"end_offset": 151,
"id": 50438,
"label": "vulnerability",
"start_offset": 126
},
{
"end_offset": 187,
"id": 50439,
"label": "threat-actor",
"start_offset": 180
},
{
"end_offset": 164,
"id": 50440,
"label": "location",
"start_offset": 157
},
{
"end_offset": 249,
"id": 50441,
"label": "SOFTWARE",
"start_offset": 196
}
] | [
{
"from_id": 50439,
"id": 971,
"to_id": 50440,
"type": "located-at"
},
{
"from_id": 50439,
"id": 972,
"to_id": 50438,
"type": "exploits"
},
{
"from_id": 50441,
"id": 973,
"to_id": 50438,
"type": "has"
}
] |
1,712 | In this case a legitimate service (Tor) was being abused by CryptoWall so it could avoid having its C2 servers shut down. | [
{
"end_offset": 70,
"id": 5086,
"label": "malware",
"start_offset": 60
},
{
"end_offset": 38,
"id": 5085,
"label": "tools",
"start_offset": 35
}
] | [
{
"from_id": 5086,
"id": 249,
"to_id": 5085,
"type": "uses"
}
] |
5,060 | Recently observed COLDRIVER credential phishing domains: Ghostwriter, a Belarusian threat actor, recently introduced a new capability into their credential phishing campaigns. | [
{
"end_offset": 82,
"id": 51165,
"label": "location",
"start_offset": 72
},
{
"end_offset": 174,
"id": 51166,
"label": "campaign",
"start_offset": 145
},
{
"end_offset": 27,
"id": 15621,
"label": "threat-actor",
"start_offset": 18
},
{
"end_offset": 68,
"id": 15623,
"label": "threat-actor",
"start_offset": 57
}
] | [
{
"from_id": 15623,
"id": 1064,
"to_id": 51165,
"type": "located-at"
},
{
"from_id": 15623,
"id": 1065,
"to_id": 51166,
"type": "uses"
}
] |
4,823 | Ghostwriter/UNC1151, a threat actor attributed to Belarus, has remained active targeting accounts of webmail and social media networks of Polish users. | [
{
"end_offset": 11,
"id": 50766,
"label": "threat-actor",
"start_offset": 0
},
{
"end_offset": 19,
"id": 50767,
"label": "threat-actor",
"start_offset": 12
},
{
"end_offset": 57,
"id": 50768,
"label": "location",
"start_offset": 50
}
] | [
{
"from_id": 50767,
"id": 1011,
"to_id": 50766,
"type": "duplicate-of"
},
{
"from_id": 50766,
"id": 1012,
"to_id": 50768,
"type": "attributed-to"
}
] |
1,819 | Additional tools and components were copied to the compromised machine using AnyDeskMSI to scan the local network and disable security products. | [
{
"end_offset": 87,
"id": 46934,
"label": "tools",
"start_offset": 77
},
{
"end_offset": 113,
"id": 46936,
"label": "attack-pattern",
"start_offset": 91
},
{
"end_offset": 143,
"id": 46937,
"label": "attack-pattern",
"start_offset": 118
}
] | [
{
"from_id": 46934,
"id": 265,
"to_id": 46936,
"type": "uses"
},
{
"from_id": 46934,
"id": 266,
"to_id": 46937,
"type": "uses"
}
] |
3,400 | BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 7f4e02a041ca7cfbdc79b96a890822fd7c37be67b1f6c9e07596e6aec57ccdc0 Silverlight.exe | [
{
"end_offset": 11,
"id": 10263,
"label": "malware",
"start_offset": 0
},
{
"end_offset": 110,
"id": 10264,
"label": "hash",
"start_offset": 46
},
{
"end_offset": 44,
"id": 49064,
"label": "malware",
"start_offset": 20
},
{
"end_offset": 127,
"id": 49065,
"label": "FILEPATH",
"start_offset": 112
}
] | [
{
"from_id": 10263,
"id": 636,
"to_id": 49064,
"type": "duplicate-of"
},
{
"from_id": 49065,
"id": 637,
"to_id": 10264,
"type": "duplicate-of"
},
{
"from_id": 10264,
"id": 638,
"to_id": 49064,
"type": "indicates"
},
{
"from_id": 49065,
"id": 639,
"to_id": 49064,
"type": "indicates"
}
] |
3,719 | In both Carbanak and FIN7 attacks, communication with users’ compromised systems is done through bypassing firewalls or network detection systems via commonly used ports, using connection proxies to avoid direct connections to the threat group’s infrastructure, employing the command-and-control channel to remotely copy files from an external system, blending in with existing network traffic by using standard application layer protocol, and taking advantage of standard cryptographic protocol to disguise command-and-control traffic. | [
{
"end_offset": 16,
"id": 49518,
"label": "threat-actor",
"start_offset": 8
},
{
"end_offset": 25,
"id": 49519,
"label": "threat-actor",
"start_offset": 21
},
{
"end_offset": 116,
"id": 49520,
"label": "attack-pattern",
"start_offset": 97
},
{
"end_offset": 195,
"id": 49521,
"label": "attack-pattern",
"start_offset": 171
},
{
"end_offset": 393,
"id": 49522,
"label": "attack-pattern",
"start_offset": 352
}
] | [
{
"from_id": 49518,
"id": 817,
"to_id": 49519,
"type": "related-to"
},
{
"from_id": 49519,
"id": 818,
"to_id": 49520,
"type": "uses"
},
{
"from_id": 49519,
"id": 819,
"to_id": 49521,
"type": "uses"
},
{
"from_id": 49519,
"id": 820,
"to_id": 49522,
"type": "uses"
}
] |
1,708 | Last year we highlighted two malware families on this blog: CryptoWall 2.0 and Dyreza/Dyre. | [
{
"end_offset": 75,
"id": 46883,
"label": "malware",
"start_offset": 61
},
{
"end_offset": 86,
"id": 46884,
"label": "malware",
"start_offset": 80
},
{
"end_offset": 91,
"id": 46885,
"label": "malware",
"start_offset": 87
}
] | [
{
"from_id": 46884,
"id": 247,
"to_id": 46885,
"type": "duplicate-of"
}
] |
4,587 | The vulnerability has been dubbed as ProxyLogon by the researchers at DEVCORE, who are credited with finding the bugs in the proxy architecture and the logon mechanism of Exchange. | [
{
"end_offset": 180,
"id": 50446,
"label": "SOFTWARE",
"start_offset": 172
},
{
"end_offset": 48,
"id": 50444,
"label": "vulnerability",
"start_offset": 38
},
{
"end_offset": 78,
"id": 50445,
"label": "identity",
"start_offset": 71
}
] | [
{
"from_id": 50446,
"id": 974,
"to_id": 50444,
"type": "has"
}
] |
106 | Similarly, DarkSide operators used Mega client for exfiltrating files to cloud storage, 7-Zip for archiving, and PuTTY application for network file transfers. | [
{
"end_offset": 29,
"id": 45834,
"label": "threat-actor",
"start_offset": 11
},
{
"end_offset": 46,
"id": 45835,
"label": "tools",
"start_offset": 35
},
{
"end_offset": 93,
"id": 45836,
"label": "tools",
"start_offset": 88
},
{
"end_offset": 118,
"id": 45837,
"label": "tools",
"start_offset": 113
}
] | [
{
"from_id": 45834,
"id": 120,
"to_id": 45835,
"type": "uses"
},
{
"from_id": 45834,
"id": 121,
"to_id": 45836,
"type": "uses"
},
{
"from_id": 45834,
"id": 122,
"to_id": 45837,
"type": "uses"
}
] |
3,410 | BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A ba44c22a3224c3a201202b69d86df2a78f0cd1d4ac1119eb29cae33f09027a9a Silverlight2.exe | [
{
"end_offset": 11,
"id": 10289,
"label": "malware",
"start_offset": 0
},
{
"end_offset": 110,
"id": 10290,
"label": "hash",
"start_offset": 46
},
{
"end_offset": 44,
"id": 49090,
"label": "malware",
"start_offset": 20
},
{
"end_offset": 128,
"id": 49091,
"label": "FILEPATH",
"start_offset": 112
}
] | [
{
"from_id": 10289,
"id": 681,
"to_id": 49090,
"type": "duplicate-of"
},
{
"from_id": 49091,
"id": 682,
"to_id": 10290,
"type": "duplicate-of"
},
{
"from_id": 49091,
"id": 683,
"to_id": 49090,
"type": "indicates"
},
{
"from_id": 10290,
"id": 684,
"to_id": 49090,
"type": "indicates"
}
] |
3,390 | test4.exe BIOPASS RAT Loader Backdoor.Win32.BIOPASS.A 3589e53c59d9807cca709387bbcaaffc7e24e15d9a78425b717fc55c779b928e | [
{
"end_offset": 22,
"id": 10240,
"label": "malware",
"start_offset": 11
},
{
"end_offset": 121,
"id": 10241,
"label": "hash",
"start_offset": 57
},
{
"end_offset": 9,
"id": 49042,
"label": "FILEPATH",
"start_offset": 0
},
{
"end_offset": 55,
"id": 49043,
"label": "malware",
"start_offset": 31
}
] | [
{
"from_id": 49042,
"id": 592,
"to_id": 49043,
"type": "indicates"
},
{
"from_id": 10241,
"id": 593,
"to_id": 49043,
"type": "indicates"
},
{
"from_id": 10240,
"id": 594,
"to_id": 49043,
"type": "duplicate-of"
},
{
"from_id": 49042,
"id": 595,
"to_id": 10241,
"type": "duplicate-of"
}
] |
4,265 | One file stealer (cca74bb322ad7833a21209b1418c9837e30983daec30d199a839f46075ee72f2, Detected as TSPY_DELF.SUW) published by security researchers in 2013 and linked to the domain myflatnet[.]com, was attributed by several parties to the Hangover group. | [
{
"end_offset": 250,
"id": 50067,
"label": "threat-actor",
"start_offset": 236
},
{
"end_offset": 82,
"id": 50063,
"label": "hash",
"start_offset": 18
},
{
"end_offset": 109,
"id": 50064,
"label": "malware",
"start_offset": 96
},
{
"end_offset": 152,
"id": 50065,
"label": "TIME",
"start_offset": 148
},
{
"end_offset": 193,
"id": 50066,
"label": "url",
"start_offset": 178
}
] | [
{
"from_id": 50063,
"id": 911,
"to_id": 50064,
"type": "indicates"
},
{
"from_id": 50064,
"id": 912,
"to_id": 50066,
"type": "communicates-with"
},
{
"from_id": 50064,
"id": 913,
"to_id": 50067,
"type": "attributed-to"
}
] |
2,399 | Two days later on March 31, 2022, Spring released version 5.3.18 and 5.2.20 of Spring Framework to patch another more severe vulnerability tracked in CVE-2022-22965. | [
{
"end_offset": 32,
"id": 47472,
"label": "TIME",
"start_offset": 18
},
{
"end_offset": 40,
"id": 47473,
"label": "SOFTWARE",
"start_offset": 34
},
{
"end_offset": 95,
"id": 47474,
"label": "SOFTWARE",
"start_offset": 79
},
{
"end_offset": 164,
"id": 47475,
"label": "vulnerability",
"start_offset": 150
}
] | [
{
"from_id": 47474,
"id": 333,
"to_id": 47475,
"type": "has"
}
] |
14,408 | Leverage WMI for fileless intrusion Execute Powershell script for fileless intrusion | [
{
"end_offset": 84,
"id": 47166,
"label": "attack-pattern",
"start_offset": 66
},
{
"end_offset": 54,
"id": 44534,
"label": "tools",
"start_offset": 44
}
] | [
{
"from_id": 44534,
"id": 309,
"to_id": 47166,
"type": "uses"
}
] |
564 | After infection, Virlock hides the file extension through modification of the registry (HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = 1, HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Hidden = 2). | [
{
"end_offset": 164,
"id": 1874,
"label": "REGISTRYKEY",
"start_offset": 88
},
{
"end_offset": 241,
"id": 1876,
"label": "REGISTRYKEY",
"start_offset": 170
},
{
"end_offset": 24,
"id": 44778,
"label": "malware",
"start_offset": 17
}
] | [
{
"from_id": 1874,
"id": 165,
"to_id": 44778,
"type": "indicates"
},
{
"from_id": 1876,
"id": 166,
"to_id": 44778,
"type": "indicates"
}
] |
2,313 | The exploit chain combined an RCE in WebKit exploiting CVE-2021-1789 which was patched on Jan 5, 2021 before discovery of this campaign and a 0-day local privilege escalation in XNU (CVE-2021-30869) patched on Sept 23, 2021. | [
{
"end_offset": 68,
"id": 45456,
"label": "vulnerability",
"start_offset": 55
},
{
"end_offset": 181,
"id": 45462,
"label": "SOFTWARE",
"start_offset": 178
},
{
"end_offset": 223,
"id": 45460,
"label": "TIME",
"start_offset": 210
},
{
"end_offset": 174,
"id": 45461,
"label": "attack-pattern",
"start_offset": 148
},
{
"end_offset": 43,
"id": 45457,
"label": "SOFTWARE",
"start_offset": 37
},
{
"end_offset": 101,
"id": 45458,
"label": "TIME",
"start_offset": 90
},
{
"end_offset": 197,
"id": 45459,
"label": "vulnerability",
"start_offset": 183
}
] | [
{
"from_id": 45456,
"id": 98,
"to_id": 45457,
"type": "has"
},
{
"from_id": 45459,
"id": 99,
"to_id": 45462,
"type": "has"
}
] |
3,370 | .Python.BIOPASS.A e479823aa41d3f6416233dba8e765cf2abaa38ad18328859a20b88df7f1d88d5 sc2.txt BIOPASS RAT encoded Cobalt Strike shellcode Trojan.Win32.COBEACON.A e567fd0f08fdafc5a89c9084373f3308ef464918ff7e4ecd7fb3135d777e946d sc3.txt | [
{
"end_offset": 105,
"id": 10186,
"label": "malware",
"start_offset": 94
},
{
"end_offset": 127,
"id": 10187,
"label": "tools",
"start_offset": 114
},
{
"end_offset": 228,
"id": 10188,
"label": "hash",
"start_offset": 164
},
{
"end_offset": 83,
"id": 10185,
"label": "hash",
"start_offset": 19
},
{
"end_offset": 162,
"id": 48989,
"label": "malware",
"start_offset": 139
},
{
"end_offset": 17,
"id": 48987,
"label": "malware",
"start_offset": 1
},
{
"end_offset": 92,
"id": 48988,
"label": "FILEPATH",
"start_offset": 85
},
{
"end_offset": 237,
"id": 48990,
"label": "FILEPATH",
"start_offset": 230
}
] | [
{
"from_id": 10185,
"id": 548,
"to_id": 10186,
"type": "indicates"
},
{
"from_id": 48988,
"id": 549,
"to_id": 10186,
"type": "indicates"
},
{
"from_id": 10187,
"id": 553,
"to_id": 48989,
"type": "related-to"
},
{
"from_id": 48987,
"id": 550,
"to_id": 10186,
"type": "duplicate-of"
},
{
"from_id": 10185,
"id": 551,
"to_id": 48988,
"type": "duplicate-of"
},
{
"from_id": 10186,
"id": 552,
"to_id": 10187,
"type": "uses"
},
{
"from_id": 10188,
"id": 554,
"to_id": 48989,
"type": "indicates"
},
{
"from_id": 48990,
"id": 555,
"to_id": 48989,
"type": "indicates"
},
{
"from_id": 48989,
"id": 556,
"to_id": 10186,
"type": "duplicate-of"
}
] |
4,459 | In 2017, Android – which is owned by Google – was the first mobile platform to warn users about NSO Group’s Pegasus spyware. | [
{
"end_offset": 115,
"id": 50241,
"label": "malware",
"start_offset": 108
},
{
"end_offset": 7,
"id": 50237,
"label": "TIME",
"start_offset": 3
},
{
"end_offset": 105,
"id": 50240,
"label": "threat-actor",
"start_offset": 96
},
{
"end_offset": 16,
"id": 50238,
"label": "SOFTWARE",
"start_offset": 9
},
{
"end_offset": 43,
"id": 50239,
"label": "identity",
"start_offset": 37
}
] | [
{
"from_id": 50241,
"id": 933,
"to_id": 50240,
"type": "authored-by"
}
] |
4,818 | Consistent with CERT-UA reporting, TAG observed multiple Russian GRU actors - APT28 and Sandworm - conduct campaigns exploiting the Follina vulnerability. | [
{
"end_offset": 38,
"id": 50750,
"label": "identity",
"start_offset": 35
},
{
"end_offset": 75,
"id": 50751,
"label": "identity",
"start_offset": 57
},
{
"end_offset": 83,
"id": 50752,
"label": "threat-actor",
"start_offset": 78
},
{
"end_offset": 96,
"id": 50753,
"label": "threat-actor",
"start_offset": 88
},
{
"end_offset": 23,
"id": 50749,
"label": "identity",
"start_offset": 16
},
{
"end_offset": 153,
"id": 50754,
"label": "vulnerability",
"start_offset": 132
}
] | [
{
"from_id": 50753,
"id": 1006,
"to_id": 50754,
"type": "exploits"
},
{
"from_id": 50752,
"id": 1007,
"to_id": 50754,
"type": "exploits"
}
] |
234 | We monitored a list of 50 legitimate Ukraine-related domains (e.g., popular news and donation websites) and keywords (e.g., Ukraine, refugee) as targets for cybersquatting. | [
{
"end_offset": 132,
"id": 45781,
"label": "location",
"start_offset": 125
},
{
"end_offset": 45,
"id": 45934,
"label": "location",
"start_offset": 38
},
{
"end_offset": 172,
"id": 44651,
"label": "attack-pattern",
"start_offset": 158
}
] | [
{
"from_id": 44651,
"id": 137,
"to_id": 45781,
"type": "targets"
}
] |
3,830 | If Koadic finds that the system is conducive to the attacker’s interests, it downloads a base64-encrypted version of the ANEL malware from the Command-and-Control (C&C) server and executes it. Encrypted ANEL is decrypted using the “certutil -docode” command. | [
{
"end_offset": 125,
"id": 11615,
"label": "malware",
"start_offset": 121
},
{
"end_offset": 208,
"id": 11618,
"label": "malware",
"start_offset": 204
},
{
"end_offset": 9,
"id": 49688,
"label": "malware",
"start_offset": 3
}
] | [
{
"from_id": 49688,
"id": 859,
"to_id": 11615,
"type": "downloads"
}
] |
2,365 | For those interested in following our in-the-wild work, we will soon publish details surrounding another, unrelated campaign we discovered using two Chrome 0-days (CVE-2021-37973 and CVE-2021-37976). | [
{
"end_offset": 197,
"id": 47418,
"label": "vulnerability",
"start_offset": 183
},
{
"end_offset": 155,
"id": 47419,
"label": "SOFTWARE",
"start_offset": 149
},
{
"end_offset": 178,
"id": 47417,
"label": "vulnerability",
"start_offset": 164
}
] | [
{
"from_id": 47419,
"id": 319,
"to_id": 47417,
"type": "has"
},
{
"from_id": 47419,
"id": 320,
"to_id": 47418,
"type": "has"
}
] |
14,071 | Figure 9 shows that SLUB used “Windows-RT-KB-2937636.dll,” while Freenki used “Windows-KB275122-x86.exe.” Figure 9 Naming convention for persistence. | [
{
"end_offset": 103,
"id": 47392,
"label": "FILEPATH",
"start_offset": 79
},
{
"end_offset": 56,
"id": 47389,
"label": "FILEPATH",
"start_offset": 31
},
{
"end_offset": 73,
"id": 47395,
"label": "malware",
"start_offset": 65
},
{
"end_offset": 24,
"id": 43549,
"label": "malware",
"start_offset": 20
}
] | [
{
"from_id": 43549,
"id": 316,
"to_id": 47389,
"type": "uses"
},
{
"from_id": 47395,
"id": 317,
"to_id": 47392,
"type": "uses"
}
] |
1,584 | Reports indicate that it harvests credentials using Mimikatz and Maarten van Dantzig reports it also uses common hardcoded credentials to spread. | [
{
"end_offset": 60,
"id": 45067,
"label": "tools",
"start_offset": 52
},
{
"end_offset": 84,
"id": 45068,
"label": "identity",
"start_offset": 65
},
{
"end_offset": 45,
"id": 45069,
"label": "attack-pattern",
"start_offset": 25
}
] | [
{
"from_id": 45069,
"id": 76,
"to_id": 45067,
"type": "uses"
}
] |
3,558 | Examining the Capesand samples The simplified diagram taken from the previous blog shows the combination of ConfuserEx and Cassandra via the second layer of obfuscation protection, which involves the DLL CyaX_Sharp Assembly (both CyaX_Sharp and CyaX are part of the Cassandra protector). | [
{
"end_offset": 22,
"id": 49341,
"label": "malware",
"start_offset": 14
},
{
"end_offset": 118,
"id": 49342,
"label": "tools",
"start_offset": 108
},
{
"end_offset": 132,
"id": 49343,
"label": "tools",
"start_offset": 123
},
{
"end_offset": 240,
"id": 49344,
"label": "tools",
"start_offset": 230
},
{
"end_offset": 249,
"id": 49345,
"label": "tools",
"start_offset": 245
},
{
"end_offset": 285,
"id": 49346,
"label": "tools",
"start_offset": 266
}
] | [
{
"from_id": 49341,
"id": 787,
"to_id": 49342,
"type": "uses"
},
{
"from_id": 49341,
"id": 788,
"to_id": 49343,
"type": "uses"
}
] |
5,057 | However, for the first time, TAG has observed COLDRIVER campaigns targeting the military of multiple Eastern European countries, as well as a NATO Centre of Excellence. | [
{
"end_offset": 167,
"id": 51162,
"label": "identity",
"start_offset": 142
},
{
"end_offset": 32,
"id": 51159,
"label": "identity",
"start_offset": 29
},
{
"end_offset": 55,
"id": 51160,
"label": "threat-actor",
"start_offset": 46
},
{
"end_offset": 127,
"id": 51161,
"label": "identity",
"start_offset": 101
}
] | [
{
"from_id": 51160,
"id": 1062,
"to_id": 51161,
"type": "targets"
},
{
"from_id": 51160,
"id": 1063,
"to_id": 51162,
"type": "targets"
}
] |
2,427 | Early in 2010, CVE-2010-1622 was assigned to a remote code execution vulnerability in the Spring Framework. | [
{
"end_offset": 28,
"id": 45513,
"label": "vulnerability",
"start_offset": 15
},
{
"end_offset": 106,
"id": 45514,
"label": "SOFTWARE",
"start_offset": 90
},
{
"end_offset": 68,
"id": 45515,
"label": "attack-pattern",
"start_offset": 47
},
{
"end_offset": 13,
"id": 45512,
"label": "TIME",
"start_offset": 0
}
] | [
{
"from_id": 45514,
"id": 106,
"to_id": 45513,
"type": "has"
},
{
"from_id": 45515,
"id": 107,
"to_id": 45513,
"type": "uses"
}
] |
13,146 | Tropic Trooper, a threat actor group that targets government, military, healthcare, transportation, and high-tech industries in Taiwan, the Philippines, and Hong Kong, has been active since 2011. | [
{
"end_offset": 124,
"id": 48920,
"label": "identity",
"start_offset": 104
},
{
"end_offset": 151,
"id": 48922,
"label": "location",
"start_offset": 140
},
{
"end_offset": 194,
"id": 48924,
"label": "TIME",
"start_offset": 184
},
{
"end_offset": 60,
"id": 48916,
"label": "identity",
"start_offset": 50
},
{
"end_offset": 134,
"id": 48921,
"label": "location",
"start_offset": 128
},
{
"end_offset": 14,
"id": 48915,
"label": "threat-actor",
"start_offset": 0
},
{
"end_offset": 70,
"id": 48917,
"label": "identity",
"start_offset": 62
},
{
"end_offset": 82,
"id": 48918,
"label": "identity",
"start_offset": 72
},
{
"end_offset": 98,
"id": 48919,
"label": "identity",
"start_offset": 84
},
{
"end_offset": 166,
"id": 48923,
"label": "location",
"start_offset": 157
}
] | [
{
"from_id": 48920,
"id": 491,
"to_id": 48921,
"type": "located-at"
},
{
"from_id": 48916,
"id": 492,
"to_id": 48921,
"type": "located-at"
},
{
"from_id": 48915,
"id": 487,
"to_id": 48917,
"type": "targets"
},
{
"from_id": 48915,
"id": 488,
"to_id": 48918,
"type": "targets"
},
{
"from_id": 48915,
"id": 489,
"to_id": 48919,
"type": "targets"
},
{
"from_id": 48916,
"id": 494,
"to_id": 48922,
"type": "located-at"
},
{
"from_id": 48916,
"id": 495,
"to_id": 48923,
"type": "located-at"
},
{
"from_id": 48917,
"id": 496,
"to_id": 48921,
"type": "located-at"
},
{
"from_id": 48915,
"id": 497,
"to_id": 48916,
"type": "targets"
},
{
"from_id": 48915,
"id": 498,
"to_id": 48924,
"type": "related-to"
},
{
"from_id": 48918,
"id": 493,
"to_id": 48922,
"type": "targets"
}
] |
3,502 | Based on the controller’s behavior, we can posit that both Marade and Protux were authored by the same threat actors. | [
{
"end_offset": 76,
"id": 49298,
"label": "malware",
"start_offset": 70
},
{
"end_offset": 65,
"id": 49297,
"label": "malware",
"start_offset": 59
}
] | [
{
"from_id": 49297,
"id": 780,
"to_id": 49298,
"type": "variant-of"
}
] |
1,359 | Using our PoC, we created the following demonstration video of how a malicious actor would exploit the CVE-2021-32648 vulnerability, log into the compromised OctoberCMS account and to deface a web page hosted by the server: | [
{
"end_offset": 117,
"id": 44975,
"label": "vulnerability",
"start_offset": 103
},
{
"end_offset": 168,
"id": 44976,
"label": "SOFTWARE",
"start_offset": 158
}
] | [
{
"from_id": 44976,
"id": 49,
"to_id": 44975,
"type": "has"
}
] |
14,221 | When it is loaded by the system, DLLMain decrypts the payload via CryptUnprotectData. | [
{
"end_offset": 84,
"id": 48251,
"label": "tools",
"start_offset": 66
},
{
"end_offset": 41,
"id": 48252,
"label": "malware",
"start_offset": 33
}
] | [
{
"from_id": 48252,
"id": 395,
"to_id": 48251,
"type": "uses"
}
] |
2,561 | We do believe there is evidence suggestive of a connection between Shamoon 2 and the Magic Hound campaign, which could indicate these two attack campaigns could have worked in conjunction with each other to execute the Shamoon 2 attacks. | [
{
"end_offset": 105,
"id": 47761,
"label": "campaign",
"start_offset": 85
},
{
"end_offset": 76,
"id": 47760,
"label": "campaign",
"start_offset": 67
},
{
"end_offset": 228,
"id": 47762,
"label": "campaign",
"start_offset": 219
}
] | [
{
"from_id": 47761,
"id": 350,
"to_id": 47760,
"type": "related-to"
}
] |
1,872 | Avast responded to our notification with this statement: "We can confirm the vulnerability in an old version of our driver aswArPot.sys, which we fixed in our Avast 21.5 released in June 2021. | [
{
"end_offset": 135,
"id": 45157,
"label": "FILEPATH",
"start_offset": 123
},
{
"end_offset": 169,
"id": 45158,
"label": "SOFTWARE",
"start_offset": 159
},
{
"end_offset": 191,
"id": 45159,
"label": "TIME",
"start_offset": 182
},
{
"end_offset": 5,
"id": 45160,
"label": "identity",
"start_offset": 0
}
] | [
{
"from_id": 45158,
"id": 286,
"to_id": 45157,
"type": "consists-of"
}
] |
4,573 | COLDRIVER, a Russian-based threat actor sometimes referred to as Callisto, continues to send credential phishing emails to targets including government and defense officials, politicians, NGOs and think tanks, and journalists. | [
{
"end_offset": 73,
"id": 50416,
"label": "threat-actor",
"start_offset": 65
},
{
"end_offset": 9,
"id": 50415,
"label": "threat-actor",
"start_offset": 0
},
{
"end_offset": 119,
"id": 50417,
"label": "attack-pattern",
"start_offset": 88
}
] | [
{
"from_id": 50416,
"id": 967,
"to_id": 50415,
"type": "duplicate-of"
},
{
"from_id": 50415,
"id": 968,
"to_id": 50417,
"type": "uses"
}
] |
4,930 | In this blog, we explore some of the most notable campaigns we’ve disrupted this year from a different government-backed attacker: APT35, an Iranian group, which regularly conducts phishing campaigns targeting high risk users. | [
{
"end_offset": 136,
"id": 50945,
"label": "threat-actor",
"start_offset": 131
},
{
"end_offset": 148,
"id": 50947,
"label": "location",
"start_offset": 141
}
] | [
{
"from_id": 50945,
"id": 1033,
"to_id": 50947,
"type": "located-at"
}
] |
1,986 | This post is also available in: 日本語 (Japanese) HelloXD is a ransomware family performing double extortion attacks that surfaced in November 2021. | [
{
"end_offset": 60,
"id": 45202,
"label": "malware",
"start_offset": 53
},
{
"end_offset": 150,
"id": 45203,
"label": "TIME",
"start_offset": 137
},
{
"end_offset": 111,
"id": 45205,
"label": "attack-pattern",
"start_offset": 95
}
] | [
{
"from_id": 45202,
"id": 81,
"to_id": 45205,
"type": "uses"
}
] |
3,798 | When we tracked ChessMaster back in November, we noted that it exploited the SOAP WSDL parser vulnerability CVE-2017-8759 (patched in September 2017) within the Microsoft .NET framework to download additional malware. | [
{
"end_offset": 27,
"id": 49661,
"label": "malware",
"start_offset": 16
},
{
"end_offset": 148,
"id": 49664,
"label": "TIME",
"start_offset": 134
},
{
"end_offset": 121,
"id": 49666,
"label": "vulnerability",
"start_offset": 77
},
{
"end_offset": 44,
"id": 49662,
"label": "TIME",
"start_offset": 36
},
{
"end_offset": 185,
"id": 49667,
"label": "SOFTWARE",
"start_offset": 161
}
] | [
{
"from_id": 49661,
"id": 854,
"to_id": 49666,
"type": "exploits"
},
{
"from_id": 49667,
"id": 855,
"to_id": 49666,
"type": "has"
}
] |
3,730 | On April 6, 2022, VMware published a security advisory mentioning eight vulnerabilities, including CVE-2022-22954 and CVE-2022-22960 impacting their products VMware Workspace ONE Access, Identity Manager and vRealize Automation. | [
{
"end_offset": 113,
"id": 49530,
"label": "vulnerability",
"start_offset": 99
},
{
"end_offset": 132,
"id": 49531,
"label": "vulnerability",
"start_offset": 118
},
{
"end_offset": 203,
"id": 49533,
"label": "SOFTWARE",
"start_offset": 187
},
{
"end_offset": 227,
"id": 49534,
"label": "SOFTWARE",
"start_offset": 208
},
{
"end_offset": 185,
"id": 49532,
"label": "SOFTWARE",
"start_offset": 158
},
{
"end_offset": 16,
"id": 49528,
"label": "TIME",
"start_offset": 3
},
{
"end_offset": 24,
"id": 49529,
"label": "identity",
"start_offset": 18
}
] | [
{
"from_id": 49532,
"id": 821,
"to_id": 49530,
"type": "has"
},
{
"from_id": 49532,
"id": 822,
"to_id": 49531,
"type": "has"
},
{
"from_id": 49533,
"id": 823,
"to_id": 49530,
"type": "has"
},
{
"from_id": 49533,
"id": 824,
"to_id": 49531,
"type": "has"
},
{
"from_id": 49534,
"id": 825,
"to_id": 49530,
"type": "has"
},
{
"from_id": 49534,
"id": 826,
"to_id": 49531,
"type": "has"
}
] |
3,971 | As observed on CVE-2020-0688, the use of static keys — as opposed to randomly generated keys — can allow an attacker to execute arbitrary code by tricking the server into deserializing ViewState data. | [
{
"end_offset": 29,
"id": 49830,
"label": "vulnerability",
"start_offset": 16
},
{
"end_offset": 143,
"id": 49831,
"label": "attack-pattern",
"start_offset": 121
}
] | [
{
"from_id": 49830,
"id": 868,
"to_id": 49831,
"type": "uses"
}
] |
3,528 | Protux’s latest version, 3.7, uses the open-source compiler OpenCSP to generate a session key with the RSA algorithm. | [
{
"end_offset": 6,
"id": 10665,
"label": "malware",
"start_offset": 0
},
{
"end_offset": 67,
"id": 49309,
"label": "tools",
"start_offset": 60
}
] | [
{
"from_id": 10665,
"id": 781,
"to_id": 49309,
"type": "uses"
}
] |
1,757 | And before long, Yuki Chen (@guhe120), a Chinese researcher, posted his answer. | [
{
"end_offset": 36,
"id": 46908,
"label": "identity",
"start_offset": 28
},
{
"end_offset": 26,
"id": 46907,
"label": "identity",
"start_offset": 17
},
{
"end_offset": 48,
"id": 46909,
"label": "location",
"start_offset": 41
}
] | [
{
"from_id": 46907,
"id": 254,
"to_id": 46908,
"type": "duplicate-of"
},
{
"from_id": 46907,
"id": 255,
"to_id": 46909,
"type": "located-at"
},
{
"from_id": 46908,
"id": 256,
"to_id": 46909,
"type": "located-at"
}
] |
5,411 | The vendors that were targeted by VPNFilter were Asus, D-Link, Huawei, Linksys, MikroTik, Netgear, QNAP, TP-Link, Ubiquiti, UPVEL, and ZDE. | [
{
"end_offset": 103,
"id": 51412,
"label": "identity",
"start_offset": 99
},
{
"end_offset": 138,
"id": 51415,
"label": "identity",
"start_offset": 135
},
{
"end_offset": 78,
"id": 51409,
"label": "identity",
"start_offset": 71
},
{
"end_offset": 88,
"id": 51410,
"label": "identity",
"start_offset": 80
},
{
"end_offset": 43,
"id": 51405,
"label": "malware",
"start_offset": 34
},
{
"end_offset": 53,
"id": 51406,
"label": "identity",
"start_offset": 49
},
{
"end_offset": 61,
"id": 51407,
"label": "identity",
"start_offset": 55
},
{
"end_offset": 69,
"id": 51408,
"label": "identity",
"start_offset": 63
},
{
"end_offset": 97,
"id": 51411,
"label": "identity",
"start_offset": 90
},
{
"end_offset": 112,
"id": 51413,
"label": "identity",
"start_offset": 105
},
{
"end_offset": 122,
"id": 51414,
"label": "identity",
"start_offset": 114
}
] | [
{
"from_id": 51405,
"id": 1084,
"to_id": 51406,
"type": "targets"
},
{
"from_id": 51405,
"id": 1085,
"to_id": 51407,
"type": "targets"
},
{
"from_id": 51405,
"id": 1086,
"to_id": 51408,
"type": "targets"
},
{
"from_id": 51405,
"id": 1087,
"to_id": 51409,
"type": "targets"
},
{
"from_id": 51405,
"id": 1089,
"to_id": 51411,
"type": "targets"
},
{
"from_id": 51405,
"id": 1090,
"to_id": 51412,
"type": "targets"
},
{
"from_id": 51405,
"id": 1091,
"to_id": 51413,
"type": "targets"
},
{
"from_id": 51405,
"id": 1088,
"to_id": 51410,
"type": "targets"
},
{
"from_id": 51405,
"id": 1092,
"to_id": 51414,
"type": "targets"
},
{
"from_id": 51405,
"id": 1093,
"to_id": 51415,
"type": "targets"
}
] |
3,417 | BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A d18d84d32a340d20ab07a36f9e4b959495ecd88d7b0e9799399fcc4e959f536b flash_installer.exe | [
{
"end_offset": 11,
"id": 10305,
"label": "malware",
"start_offset": 0
},
{
"end_offset": 110,
"id": 10306,
"label": "hash",
"start_offset": 46
},
{
"end_offset": 44,
"id": 49106,
"label": "malware",
"start_offset": 20
},
{
"end_offset": 131,
"id": 49107,
"label": "FILEPATH",
"start_offset": 112
}
] | [
{
"from_id": 10305,
"id": 709,
"to_id": 49106,
"type": "duplicate-of"
},
{
"from_id": 10306,
"id": 711,
"to_id": 49106,
"type": "indicates"
},
{
"from_id": 49107,
"id": 710,
"to_id": 10306,
"type": "duplicate-of"
},
{
"from_id": 49107,
"id": 712,
"to_id": 49106,
"type": "indicates"
}
] |
2,013 | For example, LockBit 2.0 leverages Tox Chat for threat actor communications. | [
{
"end_offset": 24,
"id": 45221,
"label": "malware",
"start_offset": 13
},
{
"end_offset": 43,
"id": 45222,
"label": "tools",
"start_offset": 35
}
] | [
{
"from_id": 45221,
"id": 89,
"to_id": 45222,
"type": "uses"
}
] |
354 | TrustedSec reports on how attackers were apparently able to glean user credentials from a certain device via the Heartbleed vulnerability and use them to log in via a VPN. | [
{
"end_offset": 10,
"id": 44711,
"label": "identity",
"start_offset": 0
},
{
"end_offset": 137,
"id": 44712,
"label": "vulnerability",
"start_offset": 113
},
{
"end_offset": 170,
"id": 44713,
"label": "tools",
"start_offset": 167
},
{
"end_offset": 82,
"id": 44714,
"label": "attack-pattern",
"start_offset": 60
}
] | [
{
"from_id": 44714,
"id": 18,
"to_id": 44712,
"type": "exploits"
}
] |
2,845 | The WanaCrypt0r ransomware spreads itself by heavily scanning over TCP port 445 (associated with SMB) and attempting to exploit the ETERNALBLUE vulnerability on systems. | [
{
"end_offset": 16,
"id": 48049,
"label": "malware",
"start_offset": 5
},
{
"end_offset": 144,
"id": 8683,
"label": "vulnerability",
"start_offset": 133
}
] | [
{
"from_id": 48049,
"id": 381,
"to_id": 8683,
"type": "exploits"
}
] |
4,562 | Based on our analysis, we believe that the StopWar app was developed by pro-Ukrainian developers and was the inspiration for what Turla actors based their fake CyberAzov DoS app off of. | [
{
"end_offset": 54,
"id": 50379,
"label": "malware",
"start_offset": 43
},
{
"end_offset": 142,
"id": 50380,
"label": "threat-actor",
"start_offset": 130
},
{
"end_offset": 177,
"id": 50381,
"label": "malware",
"start_offset": 160
}
] | [
{
"from_id": 50381,
"id": 951,
"to_id": 50380,
"type": "authored-by"
}
] |
4,873 | In 2014, Microsoft filed a civil suit against the developer, Mohammed Benabdellah, for the development and dissemination of H-Worm. | [
{
"end_offset": 7,
"id": 50875,
"label": "TIME",
"start_offset": 3
},
{
"end_offset": 81,
"id": 50877,
"label": "identity",
"start_offset": 61
},
{
"end_offset": 130,
"id": 50878,
"label": "malware",
"start_offset": 124
},
{
"end_offset": 18,
"id": 50876,
"label": "identity",
"start_offset": 9
}
] | [
{
"from_id": 50878,
"id": 1029,
"to_id": 50877,
"type": "authored-by"
}
] |
14,296 | Maikspy on the Windows platform Figure 7. | [
{
"end_offset": 8,
"id": 48501,
"label": "malware",
"start_offset": 0
},
{
"end_offset": 23,
"id": 48502,
"label": "SOFTWARE",
"start_offset": 15
}
] | [
{
"from_id": 48501,
"id": 433,
"to_id": 48502,
"type": "targets"
}
] |
3,624 | A good example of a generalized phishing campaign is the Blank Slate Campaign we wrote about in March 2017. | [
{
"end_offset": 78,
"id": 49409,
"label": "campaign",
"start_offset": 58
},
{
"end_offset": 107,
"id": 49410,
"label": "TIME",
"start_offset": 97
},
{
"end_offset": 50,
"id": 49408,
"label": "attack-pattern",
"start_offset": 33
}
] | [
{
"from_id": 49409,
"id": 793,
"to_id": 49408,
"type": "uses"
}
] |
876 | analysis sample PClock2 is written in Visual Basic. | [
{
"end_offset": 51,
"id": 46410,
"label": "SOFTWARE",
"start_offset": 39
},
{
"end_offset": 24,
"id": 44898,
"label": "malware",
"start_offset": 17
}
] | [
{
"from_id": 44898,
"id": 188,
"to_id": 46410,
"type": "uses"
}
] |
4,552 | This is the first known instance of Turla distributing Android-related malware. | [
{
"end_offset": 41,
"id": 50361,
"label": "threat-actor",
"start_offset": 36
},
{
"end_offset": 62,
"id": 50362,
"label": "SOFTWARE",
"start_offset": 55
}
] | [
{
"from_id": 50361,
"id": 949,
"to_id": 50362,
"type": "targets"
}
] |
1,942 | The decoy documents tell more about Urpage's possible targets, as it contains text from articles about the region of Kashmir. | [
{
"end_offset": 42,
"id": 47066,
"label": "threat-actor",
"start_offset": 36
},
{
"end_offset": 124,
"id": 47067,
"label": "location",
"start_offset": 117
}
] | [
{
"from_id": 47066,
"id": 300,
"to_id": 47067,
"type": "targets"
}
] |
231 | A phishing webpage targeting a Ukrainian state administration employee, detected by our in-house machine learning models on March 16.Our teams at Palo Alto Networks are actively monitoring the phishing landscape surrounding Ukraine-related URLs and are sharing this threat intelligence with relevant authorities in Ukraine and internationally. | [
{
"end_offset": 10,
"id": 765,
"label": "attack-pattern",
"start_offset": 2
},
{
"end_offset": 201,
"id": 771,
"label": "attack-pattern",
"start_offset": 193
},
{
"end_offset": 70,
"id": 44647,
"label": "identity",
"start_offset": 31
},
{
"end_offset": 132,
"id": 44648,
"label": "TIME",
"start_offset": 124
},
{
"end_offset": 164,
"id": 44649,
"label": "identity",
"start_offset": 146
},
{
"end_offset": 322,
"id": 44650,
"label": "location",
"start_offset": 315
}
] | [
{
"from_id": 765,
"id": 135,
"to_id": 44647,
"type": "targets"
},
{
"from_id": 771,
"id": 136,
"to_id": 44650,
"type": "targets"
}
] |
1,479 | In addition to our research, the Baidu Security team in China recently found 23 mobile banking apps sharing the same certificate hosted by a third party app developer and reported the discovery to the CNCERT in China. | [
{
"end_offset": 61,
"id": 45023,
"label": "location",
"start_offset": 56
},
{
"end_offset": 216,
"id": 45025,
"label": "location",
"start_offset": 211
},
{
"end_offset": 207,
"id": 45026,
"label": "identity",
"start_offset": 201
},
{
"end_offset": 52,
"id": 45024,
"label": "identity",
"start_offset": 33
}
] | [
{
"from_id": 45026,
"id": 58,
"to_id": 45025,
"type": "located-at"
},
{
"from_id": 45024,
"id": 219,
"to_id": 45023,
"type": "located-at"
}
] |
2,285 | Parallel to the analysis, tracking, and technical disruption of this botnet, Google has filed a lawsuit against two individuals believed to be located in Russia for operating the Glupteba Botnet and its various criminal schemes. | [
{
"end_offset": 83,
"id": 47357,
"label": "identity",
"start_offset": 77
},
{
"end_offset": 187,
"id": 47356,
"label": "malware",
"start_offset": 179
},
{
"end_offset": 160,
"id": 47358,
"label": "location",
"start_offset": 154
}
] | [
{
"from_id": 47356,
"id": 314,
"to_id": 47358,
"type": "located-at"
}
] |
3,179 | We also found several clues that show how the malware might be connected with the Winnti Group(also known as APT41). | [
{
"end_offset": 115,
"id": 48308,
"label": "threat-actor",
"start_offset": 110
},
{
"end_offset": 95,
"id": 48307,
"label": "threat-actor",
"start_offset": 83
}
] | [
{
"from_id": 48307,
"id": 403,
"to_id": 48308,
"type": "duplicate-of"
}
] |
4,082 | During our investigation into Earth Centaurs activities, we found that it also uses another backdoor called Lilith RAT. | [
{
"end_offset": 44,
"id": 49916,
"label": "threat-actor",
"start_offset": 30
},
{
"end_offset": 118,
"id": 49917,
"label": "malware",
"start_offset": 108
}
] | [
{
"from_id": 49916,
"id": 893,
"to_id": 49917,
"type": "uses"
}
] |
13,913 | It is interesting to note that DarkSide’s ransom note is similar to that of Babuk, which might indicate that these two families share a link. | [
{
"end_offset": 42,
"id": 48734,
"label": "malware",
"start_offset": 31
},
{
"end_offset": 81,
"id": 48735,
"label": "malware",
"start_offset": 76
}
] | [
{
"from_id": 48734,
"id": 450,
"to_id": 48735,
"type": "related-to"
}
] |
2,064 | This particular IP was linked to a Contabo server that x4k had also included within their VirusTotal graph discussed above. | [
{
"end_offset": 58,
"id": 45245,
"label": "threat-actor",
"start_offset": 55
},
{
"end_offset": 42,
"id": 45247,
"label": "identity",
"start_offset": 35
},
{
"end_offset": 101,
"id": 45246,
"label": "SOFTWARE",
"start_offset": 90
}
] | [
{
"from_id": 45245,
"id": 94,
"to_id": 45247,
"type": "uses"
}
] |
13,545 | The Water Pamola attack chain After further searching, we noticed that an online store administrator asked about a strange online order that contains JavaScript code inserted into the field where the customer’s address or company name would normally be located. | [
{
"end_offset": 16,
"id": 51617,
"label": "campaign",
"start_offset": 4
},
{
"end_offset": 105,
"id": 51618,
"label": "identity",
"start_offset": 79
},
{
"end_offset": 179,
"id": 51620,
"label": "attack-pattern",
"start_offset": 155
}
] | [
{
"from_id": 51617,
"id": 1114,
"to_id": 51620,
"type": "uses"
}
] |
3,469 | If the affected system can connect online and doesn’t have AV software, Marade will connect to a Blackgear-controlled public blog or social media post to retrieve an encrypted C&C configuration. | [
{
"end_offset": 193,
"id": 49269,
"label": "Infrastucture",
"start_offset": 118
},
{
"end_offset": 78,
"id": 49267,
"label": "malware",
"start_offset": 72
},
{
"end_offset": 106,
"id": 49268,
"label": "threat-actor",
"start_offset": 97
}
] | [
{
"from_id": 49268,
"id": 775,
"to_id": 49269,
"type": "controls"
},
{
"from_id": 49267,
"id": 776,
"to_id": 49269,
"type": "beacons-to"
}
] |
14,259 | Related Hashes (SHA256) detected as BKDR64_WINNTI.ONM: 06b077e31a6f339c4f3b1f61ba9a6a6ba827afe52ed5bed6a6bf56bf18a279ba — cryptbase.dll 1e63a7186886deea6c4e5c2a329eab76a60be3a65bca1ba9ed6e71f9a46b7e9d – loadperf.dll 7c37ebb96c54d5d8ea232951ccf56cb1d029facdd6b730f80ca2ad566f6c5d9b – loadoerf.ini 9d04ef8708cf030b9688bf3e8287c1790023a76374e43bd332178e212420f9fb — wbemcomn.ini b1a0d0508ee932bbf91625330d2136f33344ed70cb25f7e64be0620d32c4b9e2 — cryptbase.ini e5273b72c853f12b77a11e9c08ae6432fabbb32238ac487af2fb959a6cc26089 — wbemcomn.dll Tags Malware | APT & Targeted Attacks | Endpoints | Research | [
{
"end_offset": 53,
"id": 48453,
"label": "FILEPATH",
"start_offset": 36
},
{
"end_offset": 295,
"id": 48457,
"label": "FILEPATH",
"start_offset": 283
},
{
"end_offset": 537,
"id": 48459,
"label": "FILEPATH",
"start_offset": 524
},
{
"end_offset": 456,
"id": 48460,
"label": "FILEPATH",
"start_offset": 443
},
{
"end_offset": 135,
"id": 48455,
"label": "FILEPATH",
"start_offset": 122
},
{
"end_offset": 215,
"id": 48456,
"label": "FILEPATH",
"start_offset": 203
},
{
"end_offset": 376,
"id": 48463,
"label": "FILEPATH",
"start_offset": 363
},
{
"end_offset": 119,
"id": 44129,
"label": "hash",
"start_offset": 55
},
{
"end_offset": 200,
"id": 44130,
"label": "hash",
"start_offset": 136
},
{
"end_offset": 280,
"id": 44131,
"label": "hash",
"start_offset": 216
},
{
"end_offset": 360,
"id": 44132,
"label": "hash",
"start_offset": 296
},
{
"end_offset": 440,
"id": 44133,
"label": "hash",
"start_offset": 376
},
{
"end_offset": 521,
"id": 44134,
"label": "hash",
"start_offset": 457
}
] | [
{
"from_id": 48453,
"id": 412,
"to_id": 48455,
"type": "related-to"
},
{
"from_id": 48456,
"id": 414,
"to_id": 48453,
"type": "related-to"
},
{
"from_id": 48453,
"id": 416,
"to_id": 48457,
"type": "related-to"
},
{
"from_id": 48460,
"id": 415,
"to_id": 48456,
"type": "related-to"
},
{
"from_id": 48453,
"id": 418,
"to_id": 48459,
"type": "related-to"
},
{
"from_id": 44129,
"id": 419,
"to_id": 48455,
"type": "related-to"
},
{
"from_id": 44130,
"id": 420,
"to_id": 48456,
"type": "related-to"
},
{
"from_id": 44132,
"id": 421,
"to_id": 48463,
"type": "related-to"
},
{
"from_id": 44133,
"id": 422,
"to_id": 48460,
"type": "related-to"
},
{
"from_id": 44134,
"id": 423,
"to_id": 48459,
"type": "related-to"
}
] |
3,530 | Different versions of Protux used by Blackgear Figure 9. | [
{
"end_offset": 28,
"id": 49310,
"label": "malware",
"start_offset": 22
},
{
"end_offset": 46,
"id": 49311,
"label": "threat-actor",
"start_offset": 37
}
] | [
{
"from_id": 49311,
"id": 782,
"to_id": 49310,
"type": "uses"
}
] |
621 | This post is also available in: 日本語 (Japanese) This Unit 42 blog provides an update on the threat situation surrounding attacks using the Petya Ransomware which are impacting organizations in Ukraine, Russia and to a lesser extent around the world. | [
{
"end_offset": 65,
"id": 2073,
"label": "identity",
"start_offset": 58
},
{
"end_offset": 149,
"id": 2074,
"label": "malware",
"start_offset": 144
},
{
"end_offset": 160,
"id": 44803,
"label": "malware",
"start_offset": 144
},
{
"end_offset": 205,
"id": 44804,
"label": "location",
"start_offset": 198
},
{
"end_offset": 213,
"id": 44805,
"label": "location",
"start_offset": 207
}
] | [
{
"from_id": 44803,
"id": 27,
"to_id": 44805,
"type": "targets"
},
{
"from_id": 44803,
"id": 26,
"to_id": 44804,
"type": "targets"
}
] |
14,123 | Mattermost was being used as a C2 channel for the malware. | [
{
"end_offset": 11,
"id": 48188,
"label": "SOFTWARE",
"start_offset": 0
},
{
"end_offset": 57,
"id": 48189,
"label": "malware",
"start_offset": 50
}
] | [
{
"from_id": 48189,
"id": 390,
"to_id": 48188,
"type": "uses"
}
] |
14,341 | The first variant of Maikspy appeared on the Windows platform in December 2016. | [
{
"end_offset": 29,
"id": 48576,
"label": "malware",
"start_offset": 21
},
{
"end_offset": 78,
"id": 48578,
"label": "TIME",
"start_offset": 65
},
{
"end_offset": 53,
"id": 48577,
"label": "SOFTWARE",
"start_offset": 45
}
] | [
{
"from_id": 48576,
"id": 448,
"to_id": 48577,
"type": "duplicate-of"
},
{
"from_id": 48576,
"id": 449,
"to_id": 48578,
"type": "related-to"
}
] |
1,860 | While AvosLocker has been documented for its abuse of AnyDesk for lateral movement as its preferred application, we note that other remote access applications can also be abused to replace it. | [
{
"end_offset": 16,
"id": 45154,
"label": "malware",
"start_offset": 6
},
{
"end_offset": 61,
"id": 45155,
"label": "tools",
"start_offset": 54
},
{
"end_offset": 82,
"id": 45156,
"label": "attack-pattern",
"start_offset": 66
}
] | [
{
"from_id": 45154,
"id": 77,
"to_id": 45155,
"type": "uses"
},
{
"from_id": 45156,
"id": 284,
"to_id": 45155,
"type": "uses"
},
{
"from_id": 45154,
"id": 285,
"to_id": 45156,
"type": "uses"
}
] |
288 | Spear Phishing Attacks Target Organizations in Ukraine, Payloads Include the Document Stealer OutSteel and the Downloader SaintBot Threat Briefing: Protecting Against Russia-Ukraine Cyber Activity Palo Alto Networks Resource Page: Protect Against Russia-Ukraine Cyber Activity Cortex XDR Protections Against Malware Associated with Ukraine and Russia Cyber Activity | [
{
"end_offset": 14,
"id": 970,
"label": "attack-pattern",
"start_offset": 0
},
{
"end_offset": 102,
"id": 974,
"label": "malware",
"start_offset": 94
},
{
"end_offset": 130,
"id": 976,
"label": "malware",
"start_offset": 122
},
{
"end_offset": 173,
"id": 977,
"label": "location",
"start_offset": 167
},
{
"end_offset": 181,
"id": 978,
"label": "location",
"start_offset": 174
},
{
"end_offset": 215,
"id": 979,
"label": "identity",
"start_offset": 197
},
{
"end_offset": 253,
"id": 981,
"label": "location",
"start_offset": 247
},
{
"end_offset": 261,
"id": 982,
"label": "location",
"start_offset": 254
},
{
"end_offset": 287,
"id": 983,
"label": "tools",
"start_offset": 277
},
{
"end_offset": 54,
"id": 44679,
"label": "identity",
"start_offset": 30
},
{
"end_offset": 54,
"id": 44678,
"label": "location",
"start_offset": 47
},
{
"end_offset": 339,
"id": 44685,
"label": "location",
"start_offset": 332
},
{
"end_offset": 350,
"id": 44686,
"label": "location",
"start_offset": 344
}
] | [
{
"from_id": 970,
"id": 116,
"to_id": 44679,
"type": "targets"
},
{
"from_id": 974,
"id": 118,
"to_id": 970,
"type": "uses"
},
{
"from_id": 976,
"id": 119,
"to_id": 970,
"type": "uses"
},
{
"from_id": 974,
"id": 117,
"to_id": 44679,
"type": "targets"
}
] |
1,887 | What sets Urpage attacks apart is its targeting of InPage, a word processor for Urdu and Arabic languages. | [
{
"end_offset": 57,
"id": 45163,
"label": "SOFTWARE",
"start_offset": 51
},
{
"end_offset": 16,
"id": 45162,
"label": "threat-actor",
"start_offset": 10
}
] | [
{
"from_id": 45162,
"id": 78,
"to_id": 45163,
"type": "targets"
}
] |
14,253 | Nearly all the C&C servers are hosted in the U.S., while two are located in Japan. | [
{
"end_offset": 49,
"id": 48448,
"label": "location",
"start_offset": 45
},
{
"end_offset": 26,
"id": 48449,
"label": "Infrastucture",
"start_offset": 15
}
] | [
{
"from_id": 48449,
"id": 410,
"to_id": 48448,
"type": "located-at"
}
] |
804 | Credential theft today can happen in many ways, but the most notable are through credential phishing and the use of malware like keyloggers (both staples of the Sofacy group), as well as password reuse. | [
{
"end_offset": 17,
"id": 44859,
"label": "attack-pattern",
"start_offset": 1
},
{
"end_offset": 101,
"id": 44860,
"label": "attack-pattern",
"start_offset": 82
},
{
"end_offset": 140,
"id": 44861,
"label": "attack-pattern",
"start_offset": 130
},
{
"end_offset": 174,
"id": 44862,
"label": "threat-actor",
"start_offset": 162
},
{
"end_offset": 202,
"id": 44863,
"label": "attack-pattern",
"start_offset": 188
}
] | [
{
"from_id": 44862,
"id": 33,
"to_id": 44863,
"type": "uses"
},
{
"from_id": 44862,
"id": 34,
"to_id": 44861,
"type": "uses"
},
{
"from_id": 44862,
"id": 35,
"to_id": 44860,
"type": "uses"
},
{
"from_id": 44862,
"id": 36,
"to_id": 44859,
"type": "uses"
}
] |
End of preview. Expand
in Dataset Viewer.
Dataset Card for "cyber-threat-intelligence_v2"
updated version of mrmoor/cyber-threat-intelligence
RE and NER Dataset for Cyber Threat Intelegence (CTI)
T5 Model trained on NYT and this dataset: Olec/cyber_rebel
This dataset only contains sentences with realtions. Full dataset is available at mrmoor/cyber-threat-intelligence.
- Downloads last month
- 42