id
int64
105
14.4k
text
stringlengths
41
889
entities
list
relations
list
4,565
Consistent with CERT-UA reporting, TAG observed multiple Russian GRU actors - APT28 and Sandworm - conduct campaigns exploiting the Follina vulnerability.
[ { "end_offset": 38, "id": 50390, "label": "identity", "start_offset": 35 }, { "end_offset": 23, "id": 50389, "label": "identity", "start_offset": 16 }, { "end_offset": 68, "id": 50391, "label": "identity", "start_offset": 57 }, { "end_offset": 83, "id": 50392, "label": "threat-actor", "start_offset": 78 }, { "end_offset": 153, "id": 50394, "label": "vulnerability", "start_offset": 132 }, { "end_offset": 96, "id": 50393, "label": "threat-actor", "start_offset": 88 } ]
[ { "from_id": 50393, "id": 956, "to_id": 50391, "type": "attributed-to" }, { "from_id": 50393, "id": 953, "to_id": 50394, "type": "exploits" }, { "from_id": 50392, "id": 954, "to_id": 50394, "type": "exploits" }, { "from_id": 50392, "id": 955, "to_id": 50391, "type": "attributed-to" } ]
992
Recently, we found email accounts from top universities across the world being sold on Taobao, the largest consumer-to-consumer (C2C) e-commerce platform in China.
[ { "end_offset": 93, "id": 46489, "label": "SOFTWARE", "start_offset": 87 }, { "end_offset": 162, "id": 46490, "label": "location", "start_offset": 157 } ]
[ { "from_id": 46489, "id": 194, "to_id": 46490, "type": "located-at" } ]
3,705
On the other hand, FIN7 performs hooking.
[ { "end_offset": 40, "id": 11240, "label": "attack-pattern", "start_offset": 33 }, { "end_offset": 23, "id": 49500, "label": "threat-actor", "start_offset": 19 } ]
[ { "from_id": 49500, "id": 811, "to_id": 11240, "type": "uses" } ]
4,872
This group also has links to the original developers of H-Worm, also known as njRAT.
[ { "end_offset": 62, "id": 50874, "label": "malware", "start_offset": 56 }, { "end_offset": 83, "id": 14895, "label": "malware", "start_offset": 78 } ]
[ { "from_id": 14895, "id": 1028, "to_id": 50874, "type": "duplicate-of" } ]
4,030
We found that the threat actors used vulnerable Internet Information Services (IIS) server and Exchange server vulnerabilities as entry points, and then installed web shells.
[ { "end_offset": 127, "id": 49871, "label": "vulnerability", "start_offset": 96 }, { "end_offset": 91, "id": 49872, "label": "vulnerability", "start_offset": 38 }, { "end_offset": 174, "id": 49873, "label": "attack-pattern", "start_offset": 164 } ]
[ { "from_id": 49872, "id": 884, "to_id": 49873, "type": "uses" }, { "from_id": 49871, "id": 885, "to_id": 49873, "type": "uses" } ]
1,252
Using AutoFocus to quickly search and correlate artifacts across the collective set of WildFire and other Palo Alto Networks threat intelligence, we were able to associate the attacks with the group publicly known as “DragonOK.”
[ { "end_offset": 95, "id": 3823, "label": "malware", "start_offset": 87 }, { "end_offset": 226, "id": 3826, "label": "threat-actor", "start_offset": 218 }, { "end_offset": 15, "id": 46628, "label": "SOFTWARE", "start_offset": 6 }, { "end_offset": 124, "id": 46629, "label": "identity", "start_offset": 106 } ]
[ { "from_id": 3826, "id": 196, "to_id": 3823, "type": "authored-by" } ]
5,056
Recently observed IPs used in Curious Gorge campaigns: COLDRIVER, a Russian-based threat actor sometimes referred to as Calisto, has launched credential phishing campaigns, targeting several US based NGOs and think tanks, the military of a Balkans country, and a Ukraine based defense contractor.
[ { "end_offset": 43, "id": 51151, "label": "threat-actor", "start_offset": 30 }, { "end_offset": 64, "id": 51152, "label": "threat-actor", "start_offset": 55 }, { "end_offset": 75, "id": 51153, "label": "location", "start_offset": 68 }, { "end_offset": 127, "id": 51154, "label": "threat-actor", "start_offset": 120 }, { "end_offset": 171, "id": 51155, "label": "attack-pattern", "start_offset": 142 }, { "end_offset": 255, "id": 51157, "label": "identity", "start_offset": 226 }, { "end_offset": 295, "id": 51158, "label": "identity", "start_offset": 263 }, { "end_offset": 220, "id": 51156, "label": "identity", "start_offset": 191 } ]
[ { "from_id": 51152, "id": 1056, "to_id": 51153, "type": "located-at" }, { "from_id": 51154, "id": 1057, "to_id": 51152, "type": "duplicate-of" }, { "from_id": 51152, "id": 1058, "to_id": 51155, "type": "uses" }, { "from_id": 51152, "id": 1059, "to_id": 51156, "type": "targets" }, { "from_id": 51152, "id": 1060, "to_id": 51157, "type": "targets" }, { "from_id": 51152, "id": 1061, "to_id": 51158, "type": "targets" } ]
5,249
We correlated the AnubisSpy variants to Sphinx’s desktop/PC-targeting malware through the following: Shared C&C server, 86[.]105[.]18[.]107 Shared technique of decrypting JSON files, and similarity between the file structures of AnubisSpy and Sphinx’s malware Similar targets (highly concentrated in Middle Eastern countries) Figure 2: Comparison of file structure in Sphinx’s desktop/PC-targeting malware (left) and AnubisSpy (right)
[ { "end_offset": 27, "id": 51288, "label": "malware", "start_offset": 18 }, { "end_offset": 315, "id": 51287, "label": "location", "start_offset": 301 }, { "end_offset": 140, "id": 16131, "label": "IPV4", "start_offset": 121 }, { "end_offset": 239, "id": 16134, "label": "malware", "start_offset": 230 }, { "end_offset": 46, "id": 16130, "label": "campaign", "start_offset": 40 }, { "end_offset": 431, "id": 16142, "label": "malware", "start_offset": 422 }, { "end_offset": 379, "id": 16140, "label": "campaign", "start_offset": 373 }, { "end_offset": 250, "id": 16136, "label": "campaign", "start_offset": 244 } ]
[ { "from_id": 16130, "id": 1074, "to_id": 51288, "type": "uses" }, { "from_id": 16131, "id": 1075, "to_id": 16130, "type": "indicates" }, { "from_id": 16136, "id": 1076, "to_id": 51287, "type": "targets" }, { "from_id": 16134, "id": 1077, "to_id": 51287, "type": "targets" } ]
4,031
Afterward, the .NET loader (detected as Nerapack) and the first stage backdoor (Quasar remote administration tool aka Quasar RAT) were deployed on the compromised machine.
[ { "end_offset": 113, "id": 49875, "label": "malware", "start_offset": 80 }, { "end_offset": 48, "id": 49874, "label": "malware", "start_offset": 40 }, { "end_offset": 128, "id": 49876, "label": "malware", "start_offset": 118 } ]
[ { "from_id": 49875, "id": 887, "to_id": 49876, "type": "duplicate-of" }, { "from_id": 49874, "id": 888, "to_id": 49876, "type": "delivers" } ]
602
In the past, Hancitor was sent as a malicious attachment in a spam email which would then download and install the attackers’ final malware like a banking Trojan.
[ { "end_offset": 21, "id": 46195, "label": "malware", "start_offset": 13 }, { "end_offset": 72, "id": 46196, "label": "attack-pattern", "start_offset": 36 } ]
[ { "from_id": 46195, "id": 167, "to_id": 46196, "type": "uses" } ]
3,088
They grouped these vulnerabilities under the names “Spectre” (CVE-2017-5753 and CVE-2017-5715) and “Meltdown” (CVE-2017-5754).
[ { "end_offset": 76, "id": 48151, "label": "vulnerability", "start_offset": 63 }, { "end_offset": 94, "id": 48152, "label": "vulnerability", "start_offset": 81 }, { "end_offset": 125, "id": 48153, "label": "vulnerability", "start_offset": 112 }, { "end_offset": 60, "id": 48154, "label": "vulnerability", "start_offset": 53 }, { "end_offset": 109, "id": 48155, "label": "vulnerability", "start_offset": 101 } ]
[ { "from_id": 48154, "id": 388, "to_id": 48151, "type": "related-to" } ]
194
This post was substantially updated March 31 to add information on phishing and scam attacks, cybersquatting trends, fake donation websites, DoS attacks on Ukrainian news sites and distribution of malicious binaries.
[ { "end_offset": 108, "id": 45871, "label": "attack-pattern", "start_offset": 94 }, { "end_offset": 139, "id": 45872, "label": "attack-pattern", "start_offset": 117 }, { "end_offset": 152, "id": 45873, "label": "attack-pattern", "start_offset": 141 }, { "end_offset": 44, "id": 45869, "label": "TIME", "start_offset": 36 }, { "end_offset": 176, "id": 45874, "label": "identity", "start_offset": 156 }, { "end_offset": 215, "id": 45875, "label": "attack-pattern", "start_offset": 181 }, { "end_offset": 92, "id": 45870, "label": "attack-pattern", "start_offset": 67 } ]
[ { "from_id": 45872, "id": 127, "to_id": 45874, "type": "duplicate-of" }, { "from_id": 45875, "id": 129, "to_id": 45874, "type": "targets" }, { "from_id": 45873, "id": 128, "to_id": 45874, "type": "targets" }, { "from_id": 45871, "id": 126, "to_id": 45874, "type": "targets" }, { "from_id": 45870, "id": 125, "to_id": 45874, "type": "targets" } ]
105
For example, we found that Conti operators use the cloud storage synchronization tool Rclone to upload files to the Mega cloud storage service.
[ { "end_offset": 120, "id": 377, "label": "malware", "start_offset": 116 }, { "end_offset": 42, "id": 44599, "label": "threat-actor", "start_offset": 27 }, { "end_offset": 92, "id": 44600, "label": "tools", "start_offset": 86 }, { "end_offset": 142, "id": 44601, "label": "SOFTWARE", "start_offset": 116 } ]
[ { "from_id": 44599, "id": 1, "to_id": 44600, "type": "uses" }, { "from_id": 44600, "id": 2, "to_id": 44601, "type": "exfiltrates-to" }, { "from_id": 44599, "id": 3, "to_id": 44601, "type": "exfiltrates-to" } ]
3,768
Our research so far has shown one publicly known sample demonstrating exploitation of CVE-2022-22960 by overwriting the /usr/local/horizon/scripts/publishCaCert.hzn file.
[ { "end_offset": 101, "id": 49600, "label": "vulnerability", "start_offset": 87 }, { "end_offset": 165, "id": 49601, "label": "FILEPATH", "start_offset": 121 } ]
[ { "from_id": 49601, "id": 841, "to_id": 49600, "type": "related-to" } ]
2,398
On March 29, 2022, the Spring Cloud Expression Resource Access Vulnerability tracked in CVE-2022-22963 was patched with the release of Spring Cloud Function 3.1.7 and 3.2.3.
[ { "end_offset": 17, "id": 47468, "label": "TIME", "start_offset": 3 }, { "end_offset": 102, "id": 47470, "label": "vulnerability", "start_offset": 88 }, { "end_offset": 76, "id": 47469, "label": "vulnerability", "start_offset": 23 }, { "end_offset": 172, "id": 47471, "label": "SOFTWARE", "start_offset": 135 } ]
[ { "from_id": 47471, "id": 332, "to_id": 47470, "type": "has" } ]
3,897
The fact sheet comes after numerous ransomware attacks on key critical infrastructures in the US and abroad, including the attack on Colonial Pipeline by DarkSide.
[ { "end_offset": 96, "id": 49749, "label": "location", "start_offset": 94 }, { "end_offset": 162, "id": 49751, "label": "threat-actor", "start_offset": 154 }, { "end_offset": 150, "id": 49750, "label": "identity", "start_offset": 133 } ]
[ { "from_id": 49751, "id": 864, "to_id": 49750, "type": "targets" } ]
2,704
On Saturday, Microsoft disclosed a critical vulnerability in Internet Explorer, CVE-2014-1776, affecting Internet Explorer versions 6 through 11.
[ { "end_offset": 11, "id": 47941, "label": "TIME", "start_offset": 3 }, { "end_offset": 22, "id": 47942, "label": "identity", "start_offset": 13 }, { "end_offset": 93, "id": 47944, "label": "vulnerability", "start_offset": 80 }, { "end_offset": 133, "id": 47945, "label": "SOFTWARE", "start_offset": 105 }, { "end_offset": 78, "id": 47943, "label": "SOFTWARE", "start_offset": 61 } ]
[ { "from_id": 47944, "id": 368, "to_id": 47945, "type": "has" } ]
5,245
Sphinx reportedly uses the watering hole technique via social media sites to deliver its payloads — mainly a customized version of njRAT.
[ { "end_offset": 7, "id": 51279, "label": "campaign", "start_offset": 1 }, { "end_offset": 137, "id": 51280, "label": "malware", "start_offset": 132 } ]
[ { "from_id": 51279, "id": 1073, "to_id": 51280, "type": "uses" } ]
14,220
The payload is a file named loadoerf.ini that contains decryption, run, and code injection functions.
[ { "end_offset": 40, "id": 48249, "label": "FILEPATH", "start_offset": 28 }, { "end_offset": 90, "id": 48250, "label": "attack-pattern", "start_offset": 76 } ]
[ { "from_id": 48249, "id": 394, "to_id": 48250, "type": "uses" } ]
4,373
As part of TAG's mission to counter serious threats to Google and our users, we've analyzed a range of persistent threats including APT35 and Charming Kitten, an Iranian government-backed group that regularly targets high risk users.
[ { "end_offset": 14, "id": 50174, "label": "identity", "start_offset": 11 }, { "end_offset": 180, "id": 50178, "label": "identity", "start_offset": 162 }, { "end_offset": 61, "id": 50175, "label": "identity", "start_offset": 55 }, { "end_offset": 137, "id": 50176, "label": "threat-actor", "start_offset": 132 }, { "end_offset": 157, "id": 50177, "label": "threat-actor", "start_offset": 142 } ]
[ { "from_id": 50177, "id": 924, "to_id": 50178, "type": "attributed-to" }, { "from_id": 50176, "id": 925, "to_id": 50177, "type": "duplicate-of" } ]
645
While we have not been able to directly confirm the source, we have seen evidence that a Ukrainian software application called MEDoc was used by attackers to deliver the Petya DLL.
[ { "end_offset": 99, "id": 46229, "label": "location", "start_offset": 90 }, { "end_offset": 133, "id": 44817, "label": "SOFTWARE", "start_offset": 128 }, { "end_offset": 176, "id": 44818, "label": "malware", "start_offset": 171 } ]
[ { "from_id": 44818, "id": 174, "to_id": 44817, "type": "uses" } ]
3,668
After this, the Carbanak backdoor can then be used to log keystrokes and capture screenshots, steal and delete cookies, inject malicious code on sites, and monitor various traffic.
[ { "end_offset": 33, "id": 49452, "label": "malware", "start_offset": 16 }, { "end_offset": 68, "id": 49453, "label": "attack-pattern", "start_offset": 54 }, { "end_offset": 150, "id": 49456, "label": "attack-pattern", "start_offset": 120 }, { "end_offset": 179, "id": 49457, "label": "attack-pattern", "start_offset": 156 }, { "end_offset": 118, "id": 49455, "label": "attack-pattern", "start_offset": 94 }, { "end_offset": 92, "id": 49454, "label": "attack-pattern", "start_offset": 73 } ]
[ { "from_id": 49452, "id": 797, "to_id": 49453, "type": "uses" }, { "from_id": 49452, "id": 798, "to_id": 49454, "type": "uses" }, { "from_id": 49452, "id": 799, "to_id": 49455, "type": "uses" }, { "from_id": 49452, "id": 800, "to_id": 49456, "type": "uses" }, { "from_id": 49452, "id": 801, "to_id": 49457, "type": "uses" } ]
5,469
While Patchwork may be more straightforward with its predominantly malware-based attacks, Confucius’ can be inferred to be more nuanced, relying heavily on social engineering.
[ { "end_offset": 99, "id": 51455, "label": "threat-actor", "start_offset": 90 }, { "end_offset": 174, "id": 51456, "label": "attack-pattern", "start_offset": 156 }, { "end_offset": 88, "id": 51457, "label": "attack-pattern", "start_offset": 67 }, { "end_offset": 15, "id": 51454, "label": "threat-actor", "start_offset": 6 } ]
[ { "from_id": 51454, "id": 1097, "to_id": 51457, "type": "uses" }, { "from_id": 51455, "id": 1098, "to_id": 51456, "type": "uses" } ]
4,979
We assess that these campaigns delivered ALIEN, a simple Android malware in charge of loading PREDATOR, an Android implant described by CitizenLab in December 2021.
[ { "end_offset": 163, "id": 51036, "label": "TIME", "start_offset": 150 }, { "end_offset": 102, "id": 51034, "label": "malware", "start_offset": 94 }, { "end_offset": 146, "id": 51035, "label": "identity", "start_offset": 136 }, { "end_offset": 46, "id": 15307, "label": "malware", "start_offset": 41 } ]
[ { "from_id": 15307, "id": 1034, "to_id": 51034, "type": "drops" } ]
5,287
The Sandworm APT group has been attributed as creating both Cyclops Blink and the VPNFilter internet of things (IoT) botnet.
[ { "end_offset": 14, "id": 51338, "label": "threat-actor", "start_offset": 6 }, { "end_offset": 75, "id": 51339, "label": "malware", "start_offset": 62 }, { "end_offset": 93, "id": 51340, "label": "malware", "start_offset": 84 } ]
[ { "from_id": 51340, "id": 1083, "to_id": 51338, "type": "attributed-to" }, { "from_id": 51339, "id": 1082, "to_id": 51338, "type": "attributed-to" } ]
1,260
All of the Sysget files used in this campaign communicate with a single command and control (C2) server, hosted at biosnews[.]info.
[ { "end_offset": 131, "id": 44955, "label": "url", "start_offset": 116 }, { "end_offset": 105, "id": 44956, "label": "Infrastucture", "start_offset": 73 }, { "end_offset": 24, "id": 44957, "label": "malware", "start_offset": 12 } ]
[ { "from_id": 44957, "id": 42, "to_id": 44956, "type": "communicates-with" }, { "from_id": 44956, "id": 201, "to_id": 44955, "type": "hosts" } ]
3,585
Next, let’s look for the attribute indicator, starting with the CyaX assembly used in the NotepadEx attack.
[ { "end_offset": 99, "id": 49368, "label": "campaign", "start_offset": 90 }, { "end_offset": 68, "id": 49367, "label": "tools", "start_offset": 64 } ]
[ { "from_id": 49368, "id": 789, "to_id": 49367, "type": "uses" } ]
3,458
A notable characteristic of Blackgear is the degree to which its attacks are taken to evade detection, abusing blogging, microblogging, and social media services to hide its command-and-control (C&C) configuration.
[ { "end_offset": 101, "id": 49244, "label": "attack-pattern", "start_offset": 86 }, { "end_offset": 213, "id": 49247, "label": "attack-pattern", "start_offset": 165 }, { "end_offset": 161, "id": 49248, "label": "attack-pattern", "start_offset": 103 }, { "end_offset": 37, "id": 49243, "label": "threat-actor", "start_offset": 28 } ]
[ { "from_id": 49243, "id": 763, "to_id": 49244, "type": "uses" }, { "from_id": 49243, "id": 765, "to_id": 49247, "type": "uses" }, { "from_id": 49243, "id": 766, "to_id": 49248, "type": "uses" } ]
2,866
Late last month reports surfaced that a new Internet Explorer vulnerability (CVE-2014-1776) was being exploited in targeted attacks.
[ { "end_offset": 62, "id": 48064, "label": "SOFTWARE", "start_offset": 44 }, { "end_offset": 90, "id": 48065, "label": "vulnerability", "start_offset": 77 } ]
[ { "from_id": 48064, "id": 384, "to_id": 48065, "type": "has" } ]
1,529
This post is also available in: 日本語 (Japanese) In July 2020, Microsoft released a security update, CVE-2020-1350 | Windows DNS Server Remote Code Execution Vulnerability, for a new remote code execution (RCE) vulnerability.
[ { "end_offset": 65, "id": 46789, "label": "TIME", "start_offset": 56 }, { "end_offset": 76, "id": 46790, "label": "identity", "start_offset": 67 }, { "end_offset": 118, "id": 46791, "label": "vulnerability", "start_offset": 105 }, { "end_offset": 176, "id": 46792, "label": "vulnerability", "start_offset": 121 }, { "end_offset": 214, "id": 46793, "label": "attack-pattern", "start_offset": 187 } ]
[ { "from_id": 46791, "id": 221, "to_id": 46792, "type": "related-to" }, { "from_id": 46793, "id": 223, "to_id": 46791, "type": "targets" }, { "from_id": 46793, "id": 222, "to_id": 46792, "type": "targets" } ]
1,787
While previous AvosLocker infections employ similar routines, this is the first sample we observed from the US with the capability to disable a defense solution using a legitimate Avast Anti-Rootkit Driver file (asWarPot.sys).
[ { "end_offset": 25, "id": 5285, "label": "malware", "start_offset": 15 }, { "end_offset": 224, "id": 46915, "label": "FILEPATH", "start_offset": 212 }, { "end_offset": 205, "id": 46916, "label": "SOFTWARE", "start_offset": 180 }, { "end_offset": 110, "id": 46917, "label": "location", "start_offset": 108 } ]
[ { "from_id": 5285, "id": 257, "to_id": 46916, "type": "targets" }, { "from_id": 5285, "id": 258, "to_id": 46917, "type": "targets" } ]
3,361
Python.BIOPASS.A ee4150f18ed826c032e7407468beea3b1f738ba80b75a6be21bb8d59ee345466
[ { "end_offset": 82, "id": 10175, "label": "hash", "start_offset": 18 }, { "end_offset": 16, "id": 48977, "label": "malware", "start_offset": 0 } ]
[ { "from_id": 10175, "id": 532, "to_id": 48977, "type": "indicates" } ]
13,581
Some of the delivered malicious scripts attempt to install backdoors to the websites built with the EC-CUBE framework, which is popular in Japan.
[ { "end_offset": 117, "id": 51662, "label": "tools", "start_offset": 100 }, { "end_offset": 39, "id": 51664, "label": "malware", "start_offset": 22 }, { "end_offset": 144, "id": 51663, "label": "location", "start_offset": 139 } ]
[ { "from_id": 51662, "id": 1125, "to_id": 51663, "type": "related-to" }, { "from_id": 51664, "id": 1126, "to_id": 51662, "type": "targets" } ]
2,002
The file description included the entry VlahmAV, a play on words on ClamAV, and the developer named the ransomware HelloXD and used another potential alias, uKnow, as the developer of HelloXD in the copyright section.
[ { "end_offset": 75, "id": 47109, "label": "SOFTWARE", "start_offset": 69 }, { "end_offset": 123, "id": 47111, "label": "malware", "start_offset": 116 }, { "end_offset": 163, "id": 47112, "label": "malware", "start_offset": 158 }, { "end_offset": 192, "id": 47110, "label": "malware", "start_offset": 185 } ]
[ { "from_id": 47110, "id": 302, "to_id": 47112, "type": "duplicate-of" }, { "from_id": 47111, "id": 301, "to_id": 47112, "type": "duplicate-of" } ]
2,879
Last year, exploitation of CVE-2013-3163 targeted Internet Explorer 8 and earlier this year, we found exploitation of CVE-2014-0322 in Internet Explorer 10.
[ { "end_offset": 40, "id": 48076, "label": "vulnerability", "start_offset": 27 }, { "end_offset": 69, "id": 48077, "label": "SOFTWARE", "start_offset": 50 }, { "end_offset": 155, "id": 48079, "label": "SOFTWARE", "start_offset": 135 }, { "end_offset": 131, "id": 48078, "label": "vulnerability", "start_offset": 118 } ]
[ { "from_id": 48077, "id": 385, "to_id": 48076, "type": "has" }, { "from_id": 48079, "id": 386, "to_id": 48078, "type": "has" } ]
14,081
The SLUB campaign also exploited and used GNUBoard websites as part of the infrastructure.
[ { "end_offset": 17, "id": 48160, "label": "campaign", "start_offset": 4 }, { "end_offset": 51, "id": 48161, "label": "SOFTWARE", "start_offset": 42 } ]
[ { "from_id": 48160, "id": 389, "to_id": 48161, "type": "exploits" } ]
4,450
Our Threat Analysis Group, or TAG, is dedicated to protecting users from threats posed by state-sponsored malware attacks and other advanced persistent threats.
[ { "end_offset": 25, "id": 50226, "label": "identity", "start_offset": 4 }, { "end_offset": 33, "id": 50227, "label": "identity", "start_offset": 30 } ]
[ { "from_id": 50227, "id": 932, "to_id": 50226, "type": "duplicate-of" } ]
4,369
Trojan.W97M.CONFUCIUS.B 654c7021a4482da21e149ded58643b279ffbce66badf1a0a7fc3551acd607312 Trojan.W97M.CONFUCIUS.C 712172b5b1895bbfcced961a83baa448e26e93e301be407e6b9dc8cb6526277f Trojan.Win32.DLOADR.TIOIBELQ
[ { "end_offset": 90, "id": 13099, "label": "hash", "start_offset": 26 }, { "end_offset": 181, "id": 13100, "label": "hash", "start_offset": 117 }, { "end_offset": 24, "id": 50154, "label": "malware", "start_offset": 1 }, { "end_offset": 115, "id": 50155, "label": "malware", "start_offset": 92 }, { "end_offset": 211, "id": 50156, "label": "malware", "start_offset": 183 } ]
[ { "from_id": 13099, "id": 922, "to_id": 50154, "type": "indicates" }, { "from_id": 13100, "id": 923, "to_id": 50155, "type": "indicates" } ]
1,572
As detailed below, Bad Rabbit gains initial entry by posing as an Adobe Flash update.
[ { "end_offset": 30, "id": 45062, "label": "malware", "start_offset": 20 }, { "end_offset": 78, "id": 45063, "label": "SOFTWARE", "start_offset": 67 } ]
[ { "from_id": 45062, "id": 240, "to_id": 45063, "type": "related-to" } ]
13,602
The Gh0st RAT samples related to this campaign are obfuscated executable files, which decrypt the main payload in memory and execute its main export function named “Shellex.” Figure
[ { "end_offset": 172, "id": 51695, "label": "FILEPATH", "start_offset": 165 }, { "end_offset": 13, "id": 51694, "label": "malware", "start_offset": 4 } ]
[ { "from_id": 51694, "id": 1135, "to_id": 51695, "type": "related-to" } ]
1,893
The link between Bahamut and Urpage can be best discussed by way of the multiple malicious Android samples that matched Bahamut's code and had C&C belonging to the Urpage infrastructure.
[ { "end_offset": 146, "id": 45170, "label": "Infrastucture", "start_offset": 143 }, { "end_offset": 128, "id": 45167, "label": "threat-actor", "start_offset": 120 }, { "end_offset": 24, "id": 5570, "label": "threat-actor", "start_offset": 17 }, { "end_offset": 35, "id": 5572, "label": "threat-actor", "start_offset": 29 }, { "end_offset": 170, "id": 5578, "label": "threat-actor", "start_offset": 164 }, { "end_offset": 106, "id": 47025, "label": "SOFTWARE", "start_offset": 91 } ]
[ { "from_id": 5570, "id": 289, "to_id": 5572, "type": "related-to" } ]
3,753
The exception to this is Enemybot, a currently prevalent botnet built with bits of code from both Gafgyt and Mirai source code.
[ { "end_offset": 115, "id": 49584, "label": "malware", "start_offset": 110 }, { "end_offset": 34, "id": 49582, "label": "malware", "start_offset": 26 }, { "end_offset": 105, "id": 49583, "label": "malware", "start_offset": 99 } ]
[ { "from_id": 49582, "id": 835, "to_id": 49583, "type": "variant-of" }, { "from_id": 49582, "id": 836, "to_id": 49584, "type": "variant-of" } ]
329
The attacker holds the key necessary to decrypt the files unless the victim agrees to pay a $500 ransom. Unlike previous versions of CryptoWall, 2.0 communicates with its command and control (C2) server through the Tor anonymization network.
[ { "end_offset": 149, "id": 46021, "label": "malware", "start_offset": 134 }, { "end_offset": 219, "id": 46022, "label": "tools", "start_offset": 216 }, { "end_offset": 203, "id": 46023, "label": "Infrastucture", "start_offset": 172 } ]
[ { "from_id": 46021, "id": 145, "to_id": 46022, "type": "uses" }, { "from_id": 46021, "id": 144, "to_id": 46023, "type": "beacons-to" } ]
338
If these domains are confiscated or otherwise shut down, CryptoWall instructs the user to download the Tor Browser and access a website (paytordmbdekmizq.onion) that is only accessible over the Tor network. Unlikely some of it’s more flexible competition, CryptoWall only accepts ransom in the form of BitCoin.
[ { "end_offset": 67, "id": 46026, "label": "malware", "start_offset": 57 }, { "end_offset": 114, "id": 46027, "label": "tools", "start_offset": 103 }, { "end_offset": 159, "id": 46028, "label": "url", "start_offset": 137 }, { "end_offset": 205, "id": 46029, "label": "SOFTWARE", "start_offset": 194 }, { "end_offset": 310, "id": 46031, "label": "SOFTWARE", "start_offset": 303 }, { "end_offset": 267, "id": 46030, "label": "malware", "start_offset": 257 } ]
[ { "from_id": 46026, "id": 149, "to_id": 46027, "type": "related-to" }, { "from_id": 46026, "id": 150, "to_id": 46028, "type": "related-to" } ]
2,059
That being said, when looking at the HTML source code of the site, we discovered a couple of references to the user observed before – x4kme – and other aliases such as uKn0wn, which was observed in the HelloXD ransomware samples.
[ { "end_offset": 174, "id": 47152, "label": "identity", "start_offset": 168 }, { "end_offset": 139, "id": 47150, "label": "identity", "start_offset": 134 }, { "end_offset": 209, "id": 47151, "label": "malware", "start_offset": 202 } ]
[ { "from_id": 47150, "id": 308, "to_id": 47152, "type": "duplicate-of" } ]
350
To protect against CryptoWall 2.0 we recommend taking the following actions: Adobe Reader Embedded BMP Parsing Integer Overflow Vulnerability CVE-2014-0556 Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!
[ { "end_offset": 91, "id": 46038, "label": "SOFTWARE", "start_offset": 79 }, { "end_offset": 158, "id": 46039, "label": "vulnerability", "start_offset": 145 }, { "end_offset": 34, "id": 46037, "label": "malware", "start_offset": 20 }, { "end_offset": 143, "id": 46041, "label": "vulnerability", "start_offset": 92 } ]
[ { "from_id": 46037, "id": 152, "to_id": 46039, "type": "exploits" } ]
3,454
Blackgear (also known as Topgear and Comnie) is a cyberespionage campaign dating back to 2008, at least based on the Protux backdoor used by its operators.
[ { "end_offset": 9, "id": 49232, "label": "campaign", "start_offset": 0 }, { "end_offset": 32, "id": 49233, "label": "campaign", "start_offset": 25 }, { "end_offset": 43, "id": 49234, "label": "campaign", "start_offset": 37 }, { "end_offset": 93, "id": 49235, "label": "TIME", "start_offset": 89 }, { "end_offset": 132, "id": 49236, "label": "malware", "start_offset": 117 } ]
[ { "from_id": 49233, "id": 761, "to_id": 49232, "type": "duplicate-of" }, { "from_id": 49234, "id": 762, "to_id": 49232, "type": "duplicate-of" } ]
1,790
The ADSS exploit abusing CVE-2021-40539 Due to the lack of network traffic details, we could not identify the exact CVE ID of the security gap the attacker used.
[ { "end_offset": 39, "id": 46921, "label": "vulnerability", "start_offset": 25 }, { "end_offset": 8, "id": 46922, "label": "malware", "start_offset": 4 } ]
[ { "from_id": 46922, "id": 261, "to_id": 46921, "type": "exploits" } ]
3,174
In addition, the attack misuses the object storage service (OSS) of Alibaba Cloud (Aliyun) to host the BIOPASS RAT Python scripts as well as to store the exfiltrated data from victims.
[ { "end_offset": 114, "id": 48300, "label": "malware", "start_offset": 103 }, { "end_offset": 90, "id": 48299, "label": "Infrastucture", "start_offset": 68 } ]
[ { "from_id": 48299, "id": 401, "to_id": 48300, "type": "hosts" } ]
13,919
The actors behind Darkside have stated that they avoid targeting companies in certain industries, including healthcare, education, the public sector, and the nonprofit sector.
[ { "end_offset": 27, "id": 48741, "label": "malware", "start_offset": 18 }, { "end_offset": 10, "id": 48744, "label": "identity", "start_offset": 0 } ]
[ { "from_id": 48741, "id": 451, "to_id": 48744, "type": "attributed-to" } ]
187
On Feb. 23, a new variant of wiper malware named HermeticWiper was discovered in Ukraine.
[ { "end_offset": 34, "id": 591, "label": "malware", "start_offset": 29 }, { "end_offset": 10, "id": 45853, "label": "TIME", "start_offset": 3 }, { "end_offset": 62, "id": 45855, "label": "malware", "start_offset": 49 }, { "end_offset": 88, "id": 45854, "label": "location", "start_offset": 81 } ]
[ { "from_id": 45855, "id": 123, "to_id": 591, "type": "variant-of" }, { "from_id": 45855, "id": 124, "to_id": 45854, "type": "targets" } ]
3,345
3. We found an interesting Cobalt Strike loader (a7e9e2bec3ad283a9a0b130034e822c8b6dfd26dda855f883a3a4ff785514f97) that embeds a URL that leads to the BIOPASS RAT loader.
[ { "end_offset": 118, "id": 10125, "label": "hash", "start_offset": 54 }, { "end_offset": 167, "id": 10126, "label": "malware", "start_offset": 156 }, { "end_offset": 45, "id": 48957, "label": "tools", "start_offset": 32 } ]
[ { "from_id": 10125, "id": 509, "to_id": 48957, "type": "indicates" }, { "from_id": 10125, "id": 510, "to_id": 10126, "type": "drops" } ]
3,396
BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 6a0976e5f9d07ff3d80fa2958976183758ba5fcdd4645e391614a347b4b8e64b f0b96efe2f714e7bddf76cc90a8b8c88_se.exe
[ { "end_offset": 11, "id": 10254, "label": "malware", "start_offset": 0 }, { "end_offset": 110, "id": 10255, "label": "hash", "start_offset": 46 }, { "end_offset": 151, "id": 10256, "label": "FILEPATH", "start_offset": 112 }, { "end_offset": 44, "id": 49057, "label": "malware", "start_offset": 20 } ]
[ { "from_id": 10254, "id": 620, "to_id": 49057, "type": "duplicate-of" }, { "from_id": 10256, "id": 621, "to_id": 10255, "type": "duplicate-of" }, { "from_id": 10256, "id": 622, "to_id": 49057, "type": "indicates" }, { "from_id": 10255, "id": 623, "to_id": 49057, "type": "indicates" } ]
4,569
We assess this actor is a former initial ransomware access broker who previously worked with the Conti ransomware group distributing the IcedID banking trojan based on overlaps in infrastructure, tools used in previous campaigns, and a unique cryptor.
[ { "end_offset": 102, "id": 50405, "label": "threat-actor", "start_offset": 97 }, { "end_offset": 158, "id": 50406, "label": "malware", "start_offset": 137 } ]
[ { "from_id": 50405, "id": 961, "to_id": 50406, "type": "uses" } ]
2,488
The signature triggered on the creation of the webshell files, of which we observed the following file written: /usr/local/tomcat/work/Catalina/localhost/ROOT/org/apache/jsp/shell_jsp.java /usr/local/tomcat/webapps/ROOT/shell_.jsp SpringShell is officially assigned CVE-2022-22965, and the patch was released on March 31, 2022.
[ { "end_offset": 231, "id": 47567, "label": "FILEPATH", "start_offset": 190 }, { "end_offset": 282, "id": 47568, "label": "vulnerability", "start_offset": 268 }, { "end_offset": 244, "id": 47570, "label": "vulnerability", "start_offset": 233 }, { "end_offset": 189, "id": 47566, "label": "FILEPATH", "start_offset": 113 }, { "end_offset": 328, "id": 47569, "label": "TIME", "start_offset": 314 }, { "end_offset": 55, "id": 47571, "label": "attack-pattern", "start_offset": 47 } ]
[ { "from_id": 47570, "id": 337, "to_id": 47568, "type": "related-to" }, { "from_id": 47570, "id": 339, "to_id": 47567, "type": "consists-of" }, { "from_id": 47570, "id": 340, "to_id": 47566, "type": "consists-of" } ]
13,615
Here, svchost.exe (renamed legitimate and signed Launcher.exe file from Tencent) sideloads Utility.dll (patched legitimate file).
[ { "end_offset": 61, "id": 51704, "label": "FILEPATH", "start_offset": 49 }, { "end_offset": 102, "id": 51705, "label": "FILEPATH", "start_offset": 91 }, { "end_offset": 17, "id": 51703, "label": "FILEPATH", "start_offset": 6 } ]
[ { "from_id": 51703, "id": 1138, "to_id": 51705, "type": "related-to" }, { "from_id": 51703, "id": 1139, "to_id": 51704, "type": "related-to" } ]
2,681
The LockBit group claimed that LockBit 2.0 is “the fastest encryption software all over the world” and provided a comparative table showing the encryption speed of various ransomware samples. LockBit 2.0 also contains a self-spreading feature, clears logs and can print the ransom note on network printers until the paper runs out. A management panel that affiliates can use to manage victims and affiliate accounts, generate new ransomware builds and generate the decryptor if the demanded ransom is paid also exists.
[ { "end_offset": 12, "id": 47888, "label": "threat-actor", "start_offset": 5 }, { "end_offset": 43, "id": 47889, "label": "malware", "start_offset": 32 }, { "end_offset": 205, "id": 47890, "label": "threat-actor", "start_offset": 194 } ]
[ { "from_id": 47889, "id": 367, "to_id": 47888, "type": "authored-by" } ]
13,640
A series of ongoing business email compromise (BEC) campaigns that uses spear-phishing schemes on Office 365 accounts has been seen targeting business executives of over 1,000 companies across the world since March 2020.
[ { "end_offset": 86, "id": 51722, "label": "attack-pattern", "start_offset": 72 }, { "end_offset": 117, "id": 51723, "label": "SOFTWARE", "start_offset": 98 }, { "end_offset": 219, "id": 51724, "label": "TIME", "start_offset": 203 }, { "end_offset": 161, "id": 51725, "label": "identity", "start_offset": 142 }, { "end_offset": 61, "id": 51726, "label": "campaign", "start_offset": 20 } ]
[ { "from_id": 51726, "id": 1142, "to_id": 51722, "type": "uses" }, { "from_id": 51726, "id": 1143, "to_id": 51725, "type": "targets" }, { "from_id": 51726, "id": 1144, "to_id": 51724, "type": "related-to" } ]
4,596
CVE-2021-26855: Microsoft Exchange Server Remote Code Execution Vulnerability (pre-authenticated Server-Side Request Forgery [SSRF]) CVE-2021-27065: Microsoft Exchange Server Remote Code Execution Vulnerability (post-authenticated Arbitrary File Write) Fig - MS Exchange Client Access Protocol Architecture The Client Access services (Outlook Web App portal) proxies the incoming connections to the Backend services.
[ { "end_offset": 17, "id": 50475, "label": "vulnerability", "start_offset": 3 }, { "end_offset": 213, "id": 50478, "label": "vulnerability", "start_offset": 152 }, { "end_offset": 80, "id": 50476, "label": "vulnerability", "start_offset": 19 }, { "end_offset": 150, "id": 50477, "label": "vulnerability", "start_offset": 136 } ]
[ { "from_id": 50476, "id": 977, "to_id": 50475, "type": "duplicate-of" }, { "from_id": 50478, "id": 978, "to_id": 50477, "type": "duplicate-of" } ]
13,576
If the victim enters the credential in the fake form and clicks anywhere on the page, the script will take the credentials, encode them using base64, replace some characters with custom substrings, and then upload these to Water Pamola’s server. Figure 4.
[ { "end_offset": 244, "id": 51656, "label": "Infrastucture", "start_offset": 223 }, { "end_offset": 96, "id": 51657, "label": "malware", "start_offset": 90 } ]
[ { "from_id": 51657, "id": 1124, "to_id": 51656, "type": "communicates-with" } ]
3,169
We discovered a new malware that targets online gambling companies in China via a watering hole attack, in which visitors are tricked into downloading a malware loader disguised as a legitimate installer for well-known apps such as Adobe Flash Player or Microsoft Silverlight.
[ { "end_offset": 102, "id": 48286, "label": "attack-pattern", "start_offset": 82 }, { "end_offset": 150, "id": 48287, "label": "attack-pattern", "start_offset": 126 }, { "end_offset": 27, "id": 48291, "label": "malware", "start_offset": 16 }, { "end_offset": 75, "id": 48285, "label": "location", "start_offset": 70 }, { "end_offset": 275, "id": 48289, "label": "SOFTWARE", "start_offset": 254 }, { "end_offset": 66, "id": 48290, "label": "identity", "start_offset": 41 }, { "end_offset": 250, "id": 48288, "label": "SOFTWARE", "start_offset": 232 } ]
[ { "from_id": 48291, "id": 396, "to_id": 48290, "type": "targets" }, { "from_id": 48290, "id": 397, "to_id": 48285, "type": "located-at" }, { "from_id": 48291, "id": 398, "to_id": 48286, "type": "uses" }, { "from_id": 48291, "id": 399, "to_id": 48287, "type": "uses" } ]
3,395
BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 69d930050b2445937ec6a4f9887296928bf663f7a71132676be3f112e80fe275 test.exe
[ { "end_offset": 11, "id": 10252, "label": "malware", "start_offset": 0 }, { "end_offset": 110, "id": 10253, "label": "hash", "start_offset": 46 }, { "end_offset": 120, "id": 49056, "label": "FILEPATH", "start_offset": 112 }, { "end_offset": 44, "id": 49055, "label": "malware", "start_offset": 20 } ]
[ { "from_id": 49056, "id": 616, "to_id": 10253, "type": "duplicate-of" }, { "from_id": 10252, "id": 617, "to_id": 49055, "type": "duplicate-of" }, { "from_id": 10253, "id": 619, "to_id": 49055, "type": "indicates" }, { "from_id": 49056, "id": 618, "to_id": 49055, "type": "indicates" } ]
4,591
According to Shodan, on March 4, there were more than 266,000 Exchange Servers vulnerable to the ProxyLogon vulnerability, a day after the patch was released.
[ { "end_offset": 31, "id": 50465, "label": "TIME", "start_offset": 24 }, { "end_offset": 19, "id": 50464, "label": "identity", "start_offset": 13 }, { "end_offset": 78, "id": 50466, "label": "SOFTWARE", "start_offset": 62 }, { "end_offset": 121, "id": 50467, "label": "vulnerability", "start_offset": 97 } ]
[ { "from_id": 50466, "id": 976, "to_id": 50467, "type": "has" } ]
13,029
Recently observed COLDRIVER credential phishing domains: Ghostwriter, a Belarusian threat actor, recently introduced a new capability into their credential phishing campaigns.
[ { "end_offset": 28, "id": 48866, "label": "campaign", "start_offset": 18 }, { "end_offset": 48, "id": 48867, "label": "attack-pattern", "start_offset": 28 }, { "end_offset": 68, "id": 48868, "label": "threat-actor", "start_offset": 57 }, { "end_offset": 83, "id": 48869, "label": "location", "start_offset": 72 }, { "end_offset": 164, "id": 48870, "label": "attack-pattern", "start_offset": 145 } ]
[ { "from_id": 48866, "id": 485, "to_id": 48867, "type": "uses" } ]
3,423
BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A fa1d70b6b5b1a5e478c7d9d840aae0cc23d80476d9eea884a73d1b7e3926a209 64.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A fa7fbca583b22d92ae6d832d90ee637cc6ac840203cd059c6582298beb955aee test.exe BIOPASS RAT Loader Backdoor.
[ { "end_offset": 11, "id": 10313, "label": "malware", "start_offset": 0 }, { "end_offset": 131, "id": 10315, "label": "malware", "start_offset": 120 }, { "end_offset": 253, "id": 10317, "label": "malware", "start_offset": 242 }, { "end_offset": 110, "id": 10314, "label": "hash", "start_offset": 46 }, { "end_offset": 230, "id": 10316, "label": "hash", "start_offset": 166 }, { "end_offset": 118, "id": 49115, "label": "FILEPATH", "start_offset": 112 }, { "end_offset": 164, "id": 49116, "label": "malware", "start_offset": 140 }, { "end_offset": 240, "id": 49117, "label": "FILEPATH", "start_offset": 232 }, { "end_offset": 44, "id": 49114, "label": "malware", "start_offset": 20 } ]
[ { "from_id": 10313, "id": 720, "to_id": 49114, "type": "duplicate-of" }, { "from_id": 10317, "id": 723, "to_id": 49116, "type": "duplicate-of" }, { "from_id": 10316, "id": 728, "to_id": 49116, "type": "indicates" }, { "from_id": 49115, "id": 721, "to_id": 10314, "type": "duplicate-of" }, { "from_id": 49117, "id": 722, "to_id": 10316, "type": "duplicate-of" }, { "from_id": 10315, "id": 724, "to_id": 49116, "type": "duplicate-of" }, { "from_id": 10314, "id": 725, "to_id": 49114, "type": "indicates" }, { "from_id": 49115, "id": 726, "to_id": 49114, "type": "indicates" }, { "from_id": 49117, "id": 727, "to_id": 49116, "type": "indicates" } ]
273
Our Threat Prevention and Web Application and API Security products added coverage for the OctoberCMS vulnerability exploited in the WhisperGate attacks, and we released an XSOAR Playbook to help organizations hunt for this threat.
[ { "end_offset": 144, "id": 906, "label": "malware", "start_offset": 133 }, { "end_offset": 152, "id": 44671, "label": "campaign", "start_offset": 133 }, { "end_offset": 178, "id": 44672, "label": "SOFTWARE", "start_offset": 173 }, { "end_offset": 115, "id": 44670, "label": "vulnerability", "start_offset": 91 } ]
[ { "from_id": 44671, "id": 10, "to_id": 44670, "type": "delivers" } ]
4,264
Interestingly, one of those keys, “xldbszcd”, was found in a file stealer used by Confucius (472ea4929c5e0fb4e29597311ed90a14c57bc67fbf26f81a3aac042aa3dccb55, Detected as TSPY_CONFSTEAL.A) as well as in two other file stealers.
[ { "end_offset": 157, "id": 50061, "label": "hash", "start_offset": 93 }, { "end_offset": 187, "id": 50062, "label": "malware", "start_offset": 171 }, { "end_offset": 91, "id": 50060, "label": "threat-actor", "start_offset": 82 } ]
[ { "from_id": 50061, "id": 909, "to_id": 50062, "type": "indicates" }, { "from_id": 50060, "id": 910, "to_id": 50062, "type": "uses" } ]
3,342
Information from the stolen certificates 2. While checking the stolen certificates, we found a server-side variant of the Derusbi malware sample (e5fdb754c1a7c36c288c46765c9258bb2c7f38fa2a99188a623182f877da3783) that was signed with the same stolen certificate.
[ { "end_offset": 217, "id": 10119, "label": "hash", "start_offset": 153 }, { "end_offset": 144, "id": 48955, "label": "malware", "start_offset": 129 } ]
[ { "from_id": 10119, "id": 508, "to_id": 48955, "type": "indicates" } ]
736
Dubbed OMIGOD, the four vulnerabilities were found to directly affect Azure Cloud Instances.
[ { "end_offset": 13, "id": 46327, "label": "vulnerability", "start_offset": 7 }, { "end_offset": 81, "id": 46328, "label": "SOFTWARE", "start_offset": 70 } ]
[ { "from_id": 46328, "id": 181, "to_id": 46327, "type": "has" } ]
13,474
As one example, we've seen new activity from “hack-for-hire” firms, many based in India, that have been creating Gmail accounts spoofing the WHO.
[ { "end_offset": 66, "id": 51546, "label": "threat-actor", "start_offset": 45 }, { "end_offset": 87, "id": 51547, "label": "location", "start_offset": 82 }, { "end_offset": 144, "id": 51548, "label": "identity", "start_offset": 141 } ]
[ { "from_id": 51546, "id": 1102, "to_id": 51548, "type": "targets" }, { "from_id": 51546, "id": 1103, "to_id": 51547, "type": "located-at" } ]
13,663
In a July email sent to a C-level executive, we learned that the base domain URL is U10450540[.]ct[.]sendgrid[.]net, with the final URL being *getting-panes[.]sfo2*. Figure 3.
[ { "end_offset": 116, "id": 51748, "label": "URL", "start_offset": 84 }, { "end_offset": 164, "id": 51749, "label": "URL", "start_offset": 142 }, { "end_offset": 43, "id": 51750, "label": "identity", "start_offset": 26 } ]
[ { "from_id": 51750, "id": 1152, "to_id": 51748, "type": "related-to" }, { "from_id": 51750, "id": 1153, "to_id": 51749, "type": "related-to" } ]
4,815
Based on our analysis, we believe that the StopWar app was developed by pro-Ukrainian developers and was the inspiration for what Turla actors based their fake CyberAzov DoS app off of.
[ { "end_offset": 54, "id": 50738, "label": "SOFTWARE", "start_offset": 43 }, { "end_offset": 177, "id": 50740, "label": "malware", "start_offset": 155 }, { "end_offset": 135, "id": 50739, "label": "threat-actor", "start_offset": 130 } ]
[ { "from_id": 50740, "id": 1001, "to_id": 50738, "type": "impersonates" }, { "from_id": 50740, "id": 1003, "to_id": 50739, "type": "authored-by" } ]
3,442
Vulnerable Systems Mitigation Actions Observed in the Wild Conclusion Additional Resources Indicators of Compromise The F5 product vulnerable to CVE-2022-1388 is BIG-IP with the following versions: The vulnerability exists within the iControl REST framework used by BIG-IP.
[ { "end_offset": 218, "id": 49208, "label": "vulnerability", "start_offset": 201 }, { "end_offset": 132, "id": 49209, "label": "tools", "start_offset": 118 }, { "end_offset": 160, "id": 49207, "label": "vulnerability", "start_offset": 146 }, { "end_offset": 260, "id": 49210, "label": "tools", "start_offset": 237 } ]
[ { "from_id": 49208, "id": 755, "to_id": 49207, "type": "duplicate-of" }, { "from_id": 49209, "id": 756, "to_id": 49207, "type": "has" }, { "from_id": 49210, "id": 757, "to_id": 49208, "type": "has" } ]
4,629
In December 2021, TAG discovered a novel Charming Kitten tool, named HYPERSCRAPE, used to steal user data from Gmail, Yahoo!, and Microsoft Outlook accounts.
[ { "end_offset": 21, "id": 50543, "label": "identity", "start_offset": 18 }, { "end_offset": 56, "id": 50544, "label": "threat-actor", "start_offset": 41 }, { "end_offset": 80, "id": 50545, "label": "malware", "start_offset": 69 }, { "end_offset": 116, "id": 50546, "label": "SOFTWARE", "start_offset": 111 }, { "end_offset": 16, "id": 50542, "label": "TIME", "start_offset": 3 }, { "end_offset": 124, "id": 50547, "label": "SOFTWARE", "start_offset": 118 }, { "end_offset": 147, "id": 50548, "label": "SOFTWARE", "start_offset": 130 } ]
[ { "from_id": 50545, "id": 982, "to_id": 50544, "type": "authored-by" } ]
1,360
To determine how this vulnerability was exploited, we analyzed the patch that developers added to OctoberCMS version 1.0.472 to mitigate the CVE-2021-32648 vulnerability.
[ { "end_offset": 155, "id": 46690, "label": "vulnerability", "start_offset": 141 }, { "end_offset": 108, "id": 46692, "label": "SOFTWARE", "start_offset": 98 } ]
[ { "from_id": 46692, "id": 212, "to_id": 46690, "type": "has" } ]
2,749
Vulnerability Details CVE-2014-6271 exists in all versions of Bash and is related to how environment variables are processed when the shell starts up.
[ { "end_offset": 37, "id": 47993, "label": "vulnerability", "start_offset": 24 }, { "end_offset": 68, "id": 47994, "label": "tools", "start_offset": 64 } ]
[ { "from_id": 47994, "id": 369, "to_id": 47993, "type": "has" } ]
914
It’s also interesting to note that each time PClock2 scans a directory or encrypts a file, it makes an HTTP POST request to the C2 server.
[ { "end_offset": 138, "id": 46436, "label": "Infrastucture", "start_offset": 129 }, { "end_offset": 53, "id": 46435, "label": "malware", "start_offset": 46 } ]
[ { "from_id": 46435, "id": 189, "to_id": 46436, "type": "beacons-to" } ]
5,017
Here is a deeper look at the campaign activity TAG has observed and the actions the team has taken to protect our users over the past few weeks: APT28 or Fancy Bear, a threat actor attributed to Russia GRU, was observed targeting users in Ukraine with a new variant of malware.
[ { "end_offset": 246, "id": 51078, "label": "location", "start_offset": 239 }, { "end_offset": 50, "id": 51074, "label": "identity", "start_offset": 47 }, { "end_offset": 150, "id": 51075, "label": "threat-actor", "start_offset": 145 }, { "end_offset": 164, "id": 51076, "label": "threat-actor", "start_offset": 154 }, { "end_offset": 205, "id": 51077, "label": "identity", "start_offset": 195 } ]
[ { "from_id": 51076, "id": 1035, "to_id": 51075, "type": "duplicate-of" }, { "from_id": 51075, "id": 1036, "to_id": 51077, "type": "attributed-to" }, { "from_id": 51075, "id": 1037, "to_id": 51078, "type": "targets" } ]
3,754
The exploits involving Enemybot eventually download Enemybot samples that themselves embed CVE-2022-22954 exploits for further exploitation and propagation.
[ { "end_offset": 31, "id": 11380, "label": "malware", "start_offset": 23 }, { "end_offset": 105, "id": 49586, "label": "vulnerability", "start_offset": 91 }, { "end_offset": 60, "id": 49585, "label": "malware", "start_offset": 52 } ]
[ { "from_id": 49585, "id": 837, "to_id": 49586, "type": "exploits" }, { "from_id": 11380, "id": 838, "to_id": 49585, "type": "downloads" } ]
5,284
Our data also shows that although Cyclops Blink is a state-sponsored botnet, its C&C servers and bots affect WatchGuard Firebox and Asus devices that do not belong to critical organizations, or those that have an evident value on economic, political, or military espionage.
[ { "end_offset": 47, "id": 51332, "label": "malware", "start_offset": 34 }, { "end_offset": 127, "id": 51334, "label": "SOFTWARE", "start_offset": 109 }, { "end_offset": 144, "id": 51335, "label": "SOFTWARE", "start_offset": 132 } ]
[ { "from_id": 51332, "id": 1080, "to_id": 51334, "type": "targets" }, { "from_id": 51332, "id": 1081, "to_id": 51335, "type": "targets" } ]
2,849
It has been reported that the DOUBLEPULSAR backdoor (also from the Equation Group leak by Shadow Brokers) is installed and used to execute the malware after successful exploitation of a host via ETERNALBLUE, but this warrants further analysis.
[ { "end_offset": 81, "id": 48054, "label": "threat-actor", "start_offset": 67 }, { "end_offset": 104, "id": 8706, "label": "threat-actor", "start_offset": 90 }, { "end_offset": 206, "id": 8709, "label": "vulnerability", "start_offset": 195 }, { "end_offset": 42, "id": 8704, "label": "vulnerability", "start_offset": 30 } ]
[ { "from_id": 48054, "id": 383, "to_id": 8709, "type": "exploits" }, { "from_id": 48054, "id": 382, "to_id": 8704, "type": "exploits" } ]
1,256
This campaign involved five separate phishing attacks, each carrying a different variant of Sysget malware, also known as HelloBridge.
[ { "end_offset": 54, "id": 46631, "label": "attack-pattern", "start_offset": 38 }, { "end_offset": 99, "id": 46632, "label": "malware", "start_offset": 93 }, { "end_offset": 134, "id": 46633, "label": "malware", "start_offset": 123 } ]
[ { "from_id": 46633, "id": 199, "to_id": 46632, "type": "variant-of" } ]
1,687
While the SunOrcal malware family has been confirmed to have been active since 2013, possibly even earlier, this new variant has been observed targeting regions outside of the typical target radius for this threat group, now expanding to include Vietnam and Myanmar.
[ { "end_offset": 18, "id": 5005, "label": "malware", "start_offset": 10 }, { "end_offset": 83, "id": 46877, "label": "TIME", "start_offset": 79 }, { "end_offset": 253, "id": 46878, "label": "location", "start_offset": 246 }, { "end_offset": 265, "id": 46879, "label": "location", "start_offset": 258 } ]
[ { "from_id": 5005, "id": 244, "to_id": 46878, "type": "targets" }, { "from_id": 5005, "id": 246, "to_id": 46879, "type": "targets" } ]
837
While kernel APC attacks aren’t well known and can be hard to understand, their proven success in WanaCrypt0r/WannaCry and the Petya/NotPetya make them an important threat to understand because proven attack techniques are quickly adopted widely.
[ { "end_offset": 133, "id": 2746, "label": "malware", "start_offset": 128 }, { "end_offset": 25, "id": 44880, "label": "attack-pattern", "start_offset": 7 }, { "end_offset": 110, "id": 44881, "label": "malware", "start_offset": 99 }, { "end_offset": 119, "id": 44882, "label": "malware", "start_offset": 111 }, { "end_offset": 142, "id": 44884, "label": "malware", "start_offset": 134 } ]
[ { "from_id": 44882, "id": 185, "to_id": 44880, "type": "uses" }, { "from_id": 2746, "id": 186, "to_id": 44880, "type": "uses" }, { "from_id": 44881, "id": 184, "to_id": 44880, "type": "uses" }, { "from_id": 44884, "id": 187, "to_id": 44880, "type": "uses" } ]
4,473
Reporting by CitizenLab linked this activity to Candiru, an Israeli spyware vendor.
[ { "end_offset": 23, "id": 50267, "label": "identity", "start_offset": 13 }, { "end_offset": 55, "id": 50268, "label": "threat-actor", "start_offset": 48 }, { "end_offset": 67, "id": 50269, "label": "location", "start_offset": 60 } ]
[ { "from_id": 50268, "id": 939, "to_id": 50269, "type": "located-at" } ]
3,340
It is well known that the Winnti Group has previously used stolen certificates from game studios to sign its malware.
[ { "end_offset": 78, "id": 48950, "label": "attack-pattern", "start_offset": 59 }, { "end_offset": 38, "id": 48949, "label": "threat-actor", "start_offset": 26 } ]
[ { "from_id": 48949, "id": 507, "to_id": 48950, "type": "uses" } ]
5,037
Recently observed Ghostwriter credential phishing domains and emails: Curious Gorge, a group TAG attributes to China's PLA SSF, has remained active against government, military, logistics and manufacturing organizations in Ukraine, Russia and Central Asia.
[ { "end_offset": 238, "id": 51116, "label": "location", "start_offset": 232 }, { "end_offset": 255, "id": 51117, "label": "location", "start_offset": 243 }, { "end_offset": 96, "id": 51113, "label": "identity", "start_offset": 93 }, { "end_offset": 230, "id": 51115, "label": "location", "start_offset": 223 }, { "end_offset": 83, "id": 51112, "label": "threat-actor", "start_offset": 70 }, { "end_offset": 29, "id": 51111, "label": "threat-actor", "start_offset": 18 }, { "end_offset": 126, "id": 51114, "label": "identity", "start_offset": 111 } ]
[ { "from_id": 51112, "id": 1046, "to_id": 51114, "type": "attributed-to" }, { "from_id": 51112, "id": 1047, "to_id": 51115, "type": "targets" }, { "from_id": 51112, "id": 1048, "to_id": 51116, "type": "targets" }, { "from_id": 51112, "id": 1049, "to_id": 51117, "type": "targets" } ]
5,030
Recently observed COLDRIVER credential phishing domains: Ghostwriter, a Belarusian threat actor, has remained active during the course of the war and recently resumed targeting of Gmail accounts via credential phishing.
[ { "end_offset": 27, "id": 51098, "label": "threat-actor", "start_offset": 18 }, { "end_offset": 82, "id": 51100, "label": "location", "start_offset": 72 }, { "end_offset": 185, "id": 51101, "label": "SOFTWARE", "start_offset": 180 }, { "end_offset": 218, "id": 51102, "label": "attack-pattern", "start_offset": 199 }, { "end_offset": 68, "id": 51099, "label": "threat-actor", "start_offset": 57 } ]
[ { "from_id": 51099, "id": 1043, "to_id": 51100, "type": "located-at" }, { "from_id": 51099, "id": 1044, "to_id": 51101, "type": "uses" }, { "from_id": 51099, "id": 1045, "to_id": 51102, "type": "uses" } ]
14,303
Content of README.txt register.bat is used to gain administrator privilege.
[ { "end_offset": 21, "id": 48516, "label": "FILEPATH", "start_offset": 11 }, { "end_offset": 34, "id": 48518, "label": "FILEPATH", "start_offset": 22 }, { "end_offset": 74, "id": 48519, "label": "attack-pattern", "start_offset": 51 } ]
[ { "from_id": 48518, "id": 441, "to_id": 48519, "type": "uses" } ]
1,789
Infection chain Figure 1. AvosLocker infection chain According to our analysis, the suspected entry point is via the Zoho ManageEngine ADSelfService Plus (ADSS) exploit: Figure 2.
[ { "end_offset": 41, "id": 5293, "label": "malware", "start_offset": 31 }, { "end_offset": 178, "id": 46920, "label": "vulnerability", "start_offset": 127 } ]
[ { "from_id": 5293, "id": 260, "to_id": 46920, "type": "exploits" } ]
3,617
In our new research blog “FreeMilk: A Highly Targeted Spear Phishing Campaign”, our Unit 42 research team has discovered an attack campaign that takes spear phishing targeting to the next level by hijacking in-progress email conversations.
[ { "end_offset": 105, "id": 49399, "label": "identity", "start_offset": 84 }, { "end_offset": 165, "id": 49400, "label": "attack-pattern", "start_offset": 151 }, { "end_offset": 238, "id": 49401, "label": "attack-pattern", "start_offset": 197 }, { "end_offset": 139, "id": 49402, "label": "campaign", "start_offset": 131 } ]
[ { "from_id": 49402, "id": 791, "to_id": 49400, "type": "uses" }, { "from_id": 49402, "id": 792, "to_id": 49401, "type": "uses" } ]
13,641
The recent campaigns target senior positions in the United States and Canada.
[ { "end_offset": 44, "id": 51729, "label": "identity", "start_offset": 28 }, { "end_offset": 76, "id": 51731, "label": "location", "start_offset": 70 }, { "end_offset": 20, "id": 51728, "label": "campaign", "start_offset": 4 }, { "end_offset": 65, "id": 51730, "label": "location", "start_offset": 52 } ]
[ { "from_id": 51728, "id": 1145, "to_id": 51729, "type": "targets" }, { "from_id": 51729, "id": 1146, "to_id": 51730, "type": "located-at" }, { "from_id": 51729, "id": 1147, "to_id": 51731, "type": "located-at" } ]
13,632
The code used to obtain user QQ numbers Protecting e-commerce platforms from Water Pamola’s attacks Water Pamola attacked online merchants with an XSS script appended onto online shopping orders.
[ { "end_offset": 93, "id": 51716, "label": "campaign", "start_offset": 81 }, { "end_offset": 116, "id": 51717, "label": "campaign", "start_offset": 104 }, { "end_offset": 142, "id": 51718, "label": "identity", "start_offset": 126 }, { "end_offset": 154, "id": 51719, "label": "attack-pattern", "start_offset": 151 } ]
[ { "from_id": 51717, "id": 1141, "to_id": 51719, "type": "uses" }, { "from_id": 51717, "id": 1140, "to_id": 51718, "type": "targets" } ]
4,266
The other file stealer (1f0dabd61947b6df8a392b77a0eae33777be3caad13698aecc223b54ab4b859a, Detected as TROJ_DELF.XXWZ) is related to a domain reported in September 2016.
[ { "end_offset": 116, "id": 50069, "label": "malware", "start_offset": 102 }, { "end_offset": 167, "id": 50070, "label": "TIME", "start_offset": 153 }, { "end_offset": 88, "id": 50068, "label": "hash", "start_offset": 24 } ]
[ { "from_id": 50068, "id": 914, "to_id": 50069, "type": "indicates" } ]
13,960
In a US Senate hearing on cybersecurity threats, Senator Rob Portman of Ohio described the strike on Colonial Pipeline as “potentially the most substantial and damaging attack on US critical infrastructure ever.”
[ { "end_offset": 68, "id": 48769, "label": "identity", "start_offset": 49 }, { "end_offset": 14, "id": 48768, "label": "identity", "start_offset": 5 }, { "end_offset": 77, "id": 48770, "label": "location", "start_offset": 72 }, { "end_offset": 182, "id": 48771, "label": "location", "start_offset": 179 } ]
[ { "from_id": 48769, "id": 459, "to_id": 48768, "type": "related-to" }, { "from_id": 48769, "id": 460, "to_id": 48770, "type": "related-to" } ]
3,697
Carbanak also performs techniques for disabling security tools, deleting files that are left in malicious activity, and modifying registry to hide configuration information.
[ { "end_offset": 138, "id": 49494, "label": "attack-pattern", "start_offset": 120 }, { "end_offset": 78, "id": 49493, "label": "attack-pattern", "start_offset": 64 }, { "end_offset": 62, "id": 49491, "label": "attack-pattern", "start_offset": 38 }, { "end_offset": 8, "id": 49492, "label": "threat-actor", "start_offset": 0 } ]
[ { "from_id": 49492, "id": 806, "to_id": 49491, "type": "uses" }, { "from_id": 49492, "id": 807, "to_id": 49493, "type": "uses" }, { "from_id": 49492, "id": 808, "to_id": 49494, "type": "uses" } ]
4,286
The group still uses the Badnews malware, a backdoor with information-stealing and file-executing capabilities, albeit updated with a slight modification in the encryption routine at the end of 2017, when they added Blowfish encryption on top of their custom encryption described in our former Patchwork blogpost.
[ { "end_offset": 40, "id": 50084, "label": "malware", "start_offset": 25 }, { "end_offset": 78, "id": 50085, "label": "attack-pattern", "start_offset": 58 }, { "end_offset": 97, "id": 50086, "label": "attack-pattern", "start_offset": 83 }, { "end_offset": 198, "id": 50087, "label": "TIME", "start_offset": 187 }, { "end_offset": 303, "id": 50088, "label": "threat-actor", "start_offset": 294 } ]
[ { "from_id": 50084, "id": 917, "to_id": 50085, "type": "uses" }, { "from_id": 50084, "id": 918, "to_id": 50086, "type": "uses" } ]
5,108
  [Lightly edited transcript of the video above] Hi there, Mark Nunnikhoven from Trend Micro Research, I want to talk to you about the concept of lateral movement.
[ { "end_offset": 171, "id": 51211, "label": "attack-pattern", "start_offset": 155 }, { "end_offset": 84, "id": 51209, "label": "identity", "start_offset": 68 }, { "end_offset": 110, "id": 51210, "label": "identity", "start_offset": 90 } ]
[ { "from_id": 51209, "id": 1071, "to_id": 51210, "type": "related-to" } ]
4,204
Back in February, we noted the similarities between the Patchwork and Confucius groups and found that, in addition to the similarities in their malware code, both groups primarily went after targets in South Asia.
[ { "end_offset": 79, "id": 50016, "label": "threat-actor", "start_offset": 70 }, { "end_offset": 16, "id": 50014, "label": "TIME", "start_offset": 8 }, { "end_offset": 65, "id": 50015, "label": "threat-actor", "start_offset": 56 }, { "end_offset": 212, "id": 50017, "label": "location", "start_offset": 202 } ]
[ { "from_id": 50015, "id": 898, "to_id": 50016, "type": "related-to" }, { "from_id": 50015, "id": 899, "to_id": 50017, "type": "targets" }, { "from_id": 50016, "id": 900, "to_id": 50017, "type": "targets" }, { "from_id": 50016, "id": 901, "to_id": 50015, "type": "related-to" } ]
3,398
BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 75e03f40a088903579a436c0d8e8bc3d0d71cf2942ad793cc948f36866a2e1ad silverlight_ins.exe
[ { "end_offset": 11, "id": 10259, "label": "malware", "start_offset": 0 }, { "end_offset": 44, "id": 49060, "label": "malware", "start_offset": 20 }, { "end_offset": 110, "id": 10260, "label": "hash", "start_offset": 46 }, { "end_offset": 131, "id": 49061, "label": "FILEPATH", "start_offset": 112 } ]
[ { "from_id": 49061, "id": 628, "to_id": 10260, "type": "duplicate-of" }, { "from_id": 10259, "id": 629, "to_id": 49060, "type": "duplicate-of" }, { "from_id": 10260, "id": 630, "to_id": 49060, "type": "indicates" }, { "from_id": 49061, "id": 631, "to_id": 49060, "type": "indicates" } ]