id
int64 105
14.4k
| text
stringlengths 41
889
| entities
list | relations
list |
---|---|---|---|
4,565 | Consistent with CERT-UA reporting, TAG observed multiple Russian GRU actors - APT28 and Sandworm - conduct campaigns exploiting the Follina vulnerability. | [
{
"end_offset": 38,
"id": 50390,
"label": "identity",
"start_offset": 35
},
{
"end_offset": 23,
"id": 50389,
"label": "identity",
"start_offset": 16
},
{
"end_offset": 68,
"id": 50391,
"label": "identity",
"start_offset": 57
},
{
"end_offset": 83,
"id": 50392,
"label": "threat-actor",
"start_offset": 78
},
{
"end_offset": 153,
"id": 50394,
"label": "vulnerability",
"start_offset": 132
},
{
"end_offset": 96,
"id": 50393,
"label": "threat-actor",
"start_offset": 88
}
] | [
{
"from_id": 50393,
"id": 956,
"to_id": 50391,
"type": "attributed-to"
},
{
"from_id": 50393,
"id": 953,
"to_id": 50394,
"type": "exploits"
},
{
"from_id": 50392,
"id": 954,
"to_id": 50394,
"type": "exploits"
},
{
"from_id": 50392,
"id": 955,
"to_id": 50391,
"type": "attributed-to"
}
] |
992 | Recently, we found email accounts from top universities across the world being sold on Taobao, the largest consumer-to-consumer (C2C) e-commerce platform in China. | [
{
"end_offset": 93,
"id": 46489,
"label": "SOFTWARE",
"start_offset": 87
},
{
"end_offset": 162,
"id": 46490,
"label": "location",
"start_offset": 157
}
] | [
{
"from_id": 46489,
"id": 194,
"to_id": 46490,
"type": "located-at"
}
] |
3,705 | On the other hand, FIN7 performs hooking. | [
{
"end_offset": 40,
"id": 11240,
"label": "attack-pattern",
"start_offset": 33
},
{
"end_offset": 23,
"id": 49500,
"label": "threat-actor",
"start_offset": 19
}
] | [
{
"from_id": 49500,
"id": 811,
"to_id": 11240,
"type": "uses"
}
] |
4,872 | This group also has links to the original developers of H-Worm, also known as njRAT. | [
{
"end_offset": 62,
"id": 50874,
"label": "malware",
"start_offset": 56
},
{
"end_offset": 83,
"id": 14895,
"label": "malware",
"start_offset": 78
}
] | [
{
"from_id": 14895,
"id": 1028,
"to_id": 50874,
"type": "duplicate-of"
}
] |
4,030 | We found that the threat actors used vulnerable Internet Information Services (IIS) server and Exchange server vulnerabilities as entry points, and then installed web shells. | [
{
"end_offset": 127,
"id": 49871,
"label": "vulnerability",
"start_offset": 96
},
{
"end_offset": 91,
"id": 49872,
"label": "vulnerability",
"start_offset": 38
},
{
"end_offset": 174,
"id": 49873,
"label": "attack-pattern",
"start_offset": 164
}
] | [
{
"from_id": 49872,
"id": 884,
"to_id": 49873,
"type": "uses"
},
{
"from_id": 49871,
"id": 885,
"to_id": 49873,
"type": "uses"
}
] |
1,252 | Using AutoFocus to quickly search and correlate artifacts across the collective set of WildFire and other Palo Alto Networks threat intelligence, we were able to associate the attacks with the group publicly known as “DragonOK.” | [
{
"end_offset": 95,
"id": 3823,
"label": "malware",
"start_offset": 87
},
{
"end_offset": 226,
"id": 3826,
"label": "threat-actor",
"start_offset": 218
},
{
"end_offset": 15,
"id": 46628,
"label": "SOFTWARE",
"start_offset": 6
},
{
"end_offset": 124,
"id": 46629,
"label": "identity",
"start_offset": 106
}
] | [
{
"from_id": 3826,
"id": 196,
"to_id": 3823,
"type": "authored-by"
}
] |
5,056 | Recently observed IPs used in Curious Gorge campaigns: COLDRIVER, a Russian-based threat actor sometimes referred to as Calisto, has launched credential phishing campaigns, targeting several US based NGOs and think tanks, the military of a Balkans country, and a Ukraine based defense contractor. | [
{
"end_offset": 43,
"id": 51151,
"label": "threat-actor",
"start_offset": 30
},
{
"end_offset": 64,
"id": 51152,
"label": "threat-actor",
"start_offset": 55
},
{
"end_offset": 75,
"id": 51153,
"label": "location",
"start_offset": 68
},
{
"end_offset": 127,
"id": 51154,
"label": "threat-actor",
"start_offset": 120
},
{
"end_offset": 171,
"id": 51155,
"label": "attack-pattern",
"start_offset": 142
},
{
"end_offset": 255,
"id": 51157,
"label": "identity",
"start_offset": 226
},
{
"end_offset": 295,
"id": 51158,
"label": "identity",
"start_offset": 263
},
{
"end_offset": 220,
"id": 51156,
"label": "identity",
"start_offset": 191
}
] | [
{
"from_id": 51152,
"id": 1056,
"to_id": 51153,
"type": "located-at"
},
{
"from_id": 51154,
"id": 1057,
"to_id": 51152,
"type": "duplicate-of"
},
{
"from_id": 51152,
"id": 1058,
"to_id": 51155,
"type": "uses"
},
{
"from_id": 51152,
"id": 1059,
"to_id": 51156,
"type": "targets"
},
{
"from_id": 51152,
"id": 1060,
"to_id": 51157,
"type": "targets"
},
{
"from_id": 51152,
"id": 1061,
"to_id": 51158,
"type": "targets"
}
] |
5,249 | We correlated the AnubisSpy variants to Sphinx’s desktop/PC-targeting malware through the following: Shared C&C server, 86[.]105[.]18[.]107 Shared technique of decrypting JSON files, and similarity between the file structures of AnubisSpy and Sphinx’s malware Similar targets (highly concentrated in Middle Eastern countries) Figure 2: Comparison of file structure in Sphinx’s desktop/PC-targeting malware (left) and AnubisSpy (right) | [
{
"end_offset": 27,
"id": 51288,
"label": "malware",
"start_offset": 18
},
{
"end_offset": 315,
"id": 51287,
"label": "location",
"start_offset": 301
},
{
"end_offset": 140,
"id": 16131,
"label": "IPV4",
"start_offset": 121
},
{
"end_offset": 239,
"id": 16134,
"label": "malware",
"start_offset": 230
},
{
"end_offset": 46,
"id": 16130,
"label": "campaign",
"start_offset": 40
},
{
"end_offset": 431,
"id": 16142,
"label": "malware",
"start_offset": 422
},
{
"end_offset": 379,
"id": 16140,
"label": "campaign",
"start_offset": 373
},
{
"end_offset": 250,
"id": 16136,
"label": "campaign",
"start_offset": 244
}
] | [
{
"from_id": 16130,
"id": 1074,
"to_id": 51288,
"type": "uses"
},
{
"from_id": 16131,
"id": 1075,
"to_id": 16130,
"type": "indicates"
},
{
"from_id": 16136,
"id": 1076,
"to_id": 51287,
"type": "targets"
},
{
"from_id": 16134,
"id": 1077,
"to_id": 51287,
"type": "targets"
}
] |
4,031 | Afterward, the .NET loader (detected as Nerapack) and the first stage backdoor (Quasar remote administration tool aka Quasar RAT) were deployed on the compromised machine. | [
{
"end_offset": 113,
"id": 49875,
"label": "malware",
"start_offset": 80
},
{
"end_offset": 48,
"id": 49874,
"label": "malware",
"start_offset": 40
},
{
"end_offset": 128,
"id": 49876,
"label": "malware",
"start_offset": 118
}
] | [
{
"from_id": 49875,
"id": 887,
"to_id": 49876,
"type": "duplicate-of"
},
{
"from_id": 49874,
"id": 888,
"to_id": 49876,
"type": "delivers"
}
] |
602 | In the past, Hancitor was sent as a malicious attachment in a spam email which would then download and install the attackers’ final malware like a banking Trojan. | [
{
"end_offset": 21,
"id": 46195,
"label": "malware",
"start_offset": 13
},
{
"end_offset": 72,
"id": 46196,
"label": "attack-pattern",
"start_offset": 36
}
] | [
{
"from_id": 46195,
"id": 167,
"to_id": 46196,
"type": "uses"
}
] |
3,088 | They grouped these vulnerabilities under the names “Spectre” (CVE-2017-5753 and CVE-2017-5715) and “Meltdown” (CVE-2017-5754). | [
{
"end_offset": 76,
"id": 48151,
"label": "vulnerability",
"start_offset": 63
},
{
"end_offset": 94,
"id": 48152,
"label": "vulnerability",
"start_offset": 81
},
{
"end_offset": 125,
"id": 48153,
"label": "vulnerability",
"start_offset": 112
},
{
"end_offset": 60,
"id": 48154,
"label": "vulnerability",
"start_offset": 53
},
{
"end_offset": 109,
"id": 48155,
"label": "vulnerability",
"start_offset": 101
}
] | [
{
"from_id": 48154,
"id": 388,
"to_id": 48151,
"type": "related-to"
}
] |
194 | This post was substantially updated March 31 to add information on phishing and scam attacks, cybersquatting trends, fake donation websites, DoS attacks on Ukrainian news sites and distribution of malicious binaries. | [
{
"end_offset": 108,
"id": 45871,
"label": "attack-pattern",
"start_offset": 94
},
{
"end_offset": 139,
"id": 45872,
"label": "attack-pattern",
"start_offset": 117
},
{
"end_offset": 152,
"id": 45873,
"label": "attack-pattern",
"start_offset": 141
},
{
"end_offset": 44,
"id": 45869,
"label": "TIME",
"start_offset": 36
},
{
"end_offset": 176,
"id": 45874,
"label": "identity",
"start_offset": 156
},
{
"end_offset": 215,
"id": 45875,
"label": "attack-pattern",
"start_offset": 181
},
{
"end_offset": 92,
"id": 45870,
"label": "attack-pattern",
"start_offset": 67
}
] | [
{
"from_id": 45872,
"id": 127,
"to_id": 45874,
"type": "duplicate-of"
},
{
"from_id": 45875,
"id": 129,
"to_id": 45874,
"type": "targets"
},
{
"from_id": 45873,
"id": 128,
"to_id": 45874,
"type": "targets"
},
{
"from_id": 45871,
"id": 126,
"to_id": 45874,
"type": "targets"
},
{
"from_id": 45870,
"id": 125,
"to_id": 45874,
"type": "targets"
}
] |
105 | For example, we found that Conti operators use the cloud storage synchronization tool Rclone to upload files to the Mega cloud storage service. | [
{
"end_offset": 120,
"id": 377,
"label": "malware",
"start_offset": 116
},
{
"end_offset": 42,
"id": 44599,
"label": "threat-actor",
"start_offset": 27
},
{
"end_offset": 92,
"id": 44600,
"label": "tools",
"start_offset": 86
},
{
"end_offset": 142,
"id": 44601,
"label": "SOFTWARE",
"start_offset": 116
}
] | [
{
"from_id": 44599,
"id": 1,
"to_id": 44600,
"type": "uses"
},
{
"from_id": 44600,
"id": 2,
"to_id": 44601,
"type": "exfiltrates-to"
},
{
"from_id": 44599,
"id": 3,
"to_id": 44601,
"type": "exfiltrates-to"
}
] |
3,768 | Our research so far has shown one publicly known sample demonstrating exploitation of CVE-2022-22960 by overwriting the /usr/local/horizon/scripts/publishCaCert.hzn file. | [
{
"end_offset": 101,
"id": 49600,
"label": "vulnerability",
"start_offset": 87
},
{
"end_offset": 165,
"id": 49601,
"label": "FILEPATH",
"start_offset": 121
}
] | [
{
"from_id": 49601,
"id": 841,
"to_id": 49600,
"type": "related-to"
}
] |
2,398 | On March 29, 2022, the Spring Cloud Expression Resource Access Vulnerability tracked in CVE-2022-22963 was patched with the release of Spring Cloud Function 3.1.7 and 3.2.3. | [
{
"end_offset": 17,
"id": 47468,
"label": "TIME",
"start_offset": 3
},
{
"end_offset": 102,
"id": 47470,
"label": "vulnerability",
"start_offset": 88
},
{
"end_offset": 76,
"id": 47469,
"label": "vulnerability",
"start_offset": 23
},
{
"end_offset": 172,
"id": 47471,
"label": "SOFTWARE",
"start_offset": 135
}
] | [
{
"from_id": 47471,
"id": 332,
"to_id": 47470,
"type": "has"
}
] |
3,897 | The fact sheet comes after numerous ransomware attacks on key critical infrastructures in the US and abroad, including the attack on Colonial Pipeline by DarkSide. | [
{
"end_offset": 96,
"id": 49749,
"label": "location",
"start_offset": 94
},
{
"end_offset": 162,
"id": 49751,
"label": "threat-actor",
"start_offset": 154
},
{
"end_offset": 150,
"id": 49750,
"label": "identity",
"start_offset": 133
}
] | [
{
"from_id": 49751,
"id": 864,
"to_id": 49750,
"type": "targets"
}
] |
2,704 | On Saturday, Microsoft disclosed a critical vulnerability in Internet Explorer, CVE-2014-1776, affecting Internet Explorer versions 6 through 11. | [
{
"end_offset": 11,
"id": 47941,
"label": "TIME",
"start_offset": 3
},
{
"end_offset": 22,
"id": 47942,
"label": "identity",
"start_offset": 13
},
{
"end_offset": 93,
"id": 47944,
"label": "vulnerability",
"start_offset": 80
},
{
"end_offset": 133,
"id": 47945,
"label": "SOFTWARE",
"start_offset": 105
},
{
"end_offset": 78,
"id": 47943,
"label": "SOFTWARE",
"start_offset": 61
}
] | [
{
"from_id": 47944,
"id": 368,
"to_id": 47945,
"type": "has"
}
] |
5,245 | Sphinx reportedly uses the watering hole technique via social media sites to deliver its payloads — mainly a customized version of njRAT. | [
{
"end_offset": 7,
"id": 51279,
"label": "campaign",
"start_offset": 1
},
{
"end_offset": 137,
"id": 51280,
"label": "malware",
"start_offset": 132
}
] | [
{
"from_id": 51279,
"id": 1073,
"to_id": 51280,
"type": "uses"
}
] |
14,220 | The payload is a file named loadoerf.ini that contains decryption, run, and code injection functions. | [
{
"end_offset": 40,
"id": 48249,
"label": "FILEPATH",
"start_offset": 28
},
{
"end_offset": 90,
"id": 48250,
"label": "attack-pattern",
"start_offset": 76
}
] | [
{
"from_id": 48249,
"id": 394,
"to_id": 48250,
"type": "uses"
}
] |
4,373 | As part of TAG's mission to counter serious threats to Google and our users, we've analyzed a range of persistent threats including APT35 and Charming Kitten, an Iranian government-backed group that regularly targets high risk users. | [
{
"end_offset": 14,
"id": 50174,
"label": "identity",
"start_offset": 11
},
{
"end_offset": 180,
"id": 50178,
"label": "identity",
"start_offset": 162
},
{
"end_offset": 61,
"id": 50175,
"label": "identity",
"start_offset": 55
},
{
"end_offset": 137,
"id": 50176,
"label": "threat-actor",
"start_offset": 132
},
{
"end_offset": 157,
"id": 50177,
"label": "threat-actor",
"start_offset": 142
}
] | [
{
"from_id": 50177,
"id": 924,
"to_id": 50178,
"type": "attributed-to"
},
{
"from_id": 50176,
"id": 925,
"to_id": 50177,
"type": "duplicate-of"
}
] |
645 | While we have not been able to directly confirm the source, we have seen evidence that a Ukrainian software application called MEDoc was used by attackers to deliver the Petya DLL. | [
{
"end_offset": 99,
"id": 46229,
"label": "location",
"start_offset": 90
},
{
"end_offset": 133,
"id": 44817,
"label": "SOFTWARE",
"start_offset": 128
},
{
"end_offset": 176,
"id": 44818,
"label": "malware",
"start_offset": 171
}
] | [
{
"from_id": 44818,
"id": 174,
"to_id": 44817,
"type": "uses"
}
] |
3,668 | After this, the Carbanak backdoor can then be used to log keystrokes and capture screenshots, steal and delete cookies, inject malicious code on sites, and monitor various traffic. | [
{
"end_offset": 33,
"id": 49452,
"label": "malware",
"start_offset": 16
},
{
"end_offset": 68,
"id": 49453,
"label": "attack-pattern",
"start_offset": 54
},
{
"end_offset": 150,
"id": 49456,
"label": "attack-pattern",
"start_offset": 120
},
{
"end_offset": 179,
"id": 49457,
"label": "attack-pattern",
"start_offset": 156
},
{
"end_offset": 118,
"id": 49455,
"label": "attack-pattern",
"start_offset": 94
},
{
"end_offset": 92,
"id": 49454,
"label": "attack-pattern",
"start_offset": 73
}
] | [
{
"from_id": 49452,
"id": 797,
"to_id": 49453,
"type": "uses"
},
{
"from_id": 49452,
"id": 798,
"to_id": 49454,
"type": "uses"
},
{
"from_id": 49452,
"id": 799,
"to_id": 49455,
"type": "uses"
},
{
"from_id": 49452,
"id": 800,
"to_id": 49456,
"type": "uses"
},
{
"from_id": 49452,
"id": 801,
"to_id": 49457,
"type": "uses"
}
] |
5,469 | While Patchwork may be more straightforward with its predominantly malware-based attacks, Confucius’ can be inferred to be more nuanced, relying heavily on social engineering. | [
{
"end_offset": 99,
"id": 51455,
"label": "threat-actor",
"start_offset": 90
},
{
"end_offset": 174,
"id": 51456,
"label": "attack-pattern",
"start_offset": 156
},
{
"end_offset": 88,
"id": 51457,
"label": "attack-pattern",
"start_offset": 67
},
{
"end_offset": 15,
"id": 51454,
"label": "threat-actor",
"start_offset": 6
}
] | [
{
"from_id": 51454,
"id": 1097,
"to_id": 51457,
"type": "uses"
},
{
"from_id": 51455,
"id": 1098,
"to_id": 51456,
"type": "uses"
}
] |
4,979 | We assess that these campaigns delivered ALIEN, a simple Android malware in charge of loading PREDATOR, an Android implant described by CitizenLab in December 2021. | [
{
"end_offset": 163,
"id": 51036,
"label": "TIME",
"start_offset": 150
},
{
"end_offset": 102,
"id": 51034,
"label": "malware",
"start_offset": 94
},
{
"end_offset": 146,
"id": 51035,
"label": "identity",
"start_offset": 136
},
{
"end_offset": 46,
"id": 15307,
"label": "malware",
"start_offset": 41
}
] | [
{
"from_id": 15307,
"id": 1034,
"to_id": 51034,
"type": "drops"
}
] |
5,287 | The Sandworm APT group has been attributed as creating both Cyclops Blink and the VPNFilter internet of things (IoT) botnet. | [
{
"end_offset": 14,
"id": 51338,
"label": "threat-actor",
"start_offset": 6
},
{
"end_offset": 75,
"id": 51339,
"label": "malware",
"start_offset": 62
},
{
"end_offset": 93,
"id": 51340,
"label": "malware",
"start_offset": 84
}
] | [
{
"from_id": 51340,
"id": 1083,
"to_id": 51338,
"type": "attributed-to"
},
{
"from_id": 51339,
"id": 1082,
"to_id": 51338,
"type": "attributed-to"
}
] |
1,260 | All of the Sysget files used in this campaign communicate with a single command and control (C2) server, hosted at biosnews[.]info. | [
{
"end_offset": 131,
"id": 44955,
"label": "url",
"start_offset": 116
},
{
"end_offset": 105,
"id": 44956,
"label": "Infrastucture",
"start_offset": 73
},
{
"end_offset": 24,
"id": 44957,
"label": "malware",
"start_offset": 12
}
] | [
{
"from_id": 44957,
"id": 42,
"to_id": 44956,
"type": "communicates-with"
},
{
"from_id": 44956,
"id": 201,
"to_id": 44955,
"type": "hosts"
}
] |
3,585 | Next, let’s look for the attribute indicator, starting with the CyaX assembly used in the NotepadEx attack. | [
{
"end_offset": 99,
"id": 49368,
"label": "campaign",
"start_offset": 90
},
{
"end_offset": 68,
"id": 49367,
"label": "tools",
"start_offset": 64
}
] | [
{
"from_id": 49368,
"id": 789,
"to_id": 49367,
"type": "uses"
}
] |
3,458 | A notable characteristic of Blackgear is the degree to which its attacks are taken to evade detection, abusing blogging, microblogging, and social media services to hide its command-and-control (C&C) configuration. | [
{
"end_offset": 101,
"id": 49244,
"label": "attack-pattern",
"start_offset": 86
},
{
"end_offset": 213,
"id": 49247,
"label": "attack-pattern",
"start_offset": 165
},
{
"end_offset": 161,
"id": 49248,
"label": "attack-pattern",
"start_offset": 103
},
{
"end_offset": 37,
"id": 49243,
"label": "threat-actor",
"start_offset": 28
}
] | [
{
"from_id": 49243,
"id": 763,
"to_id": 49244,
"type": "uses"
},
{
"from_id": 49243,
"id": 765,
"to_id": 49247,
"type": "uses"
},
{
"from_id": 49243,
"id": 766,
"to_id": 49248,
"type": "uses"
}
] |
2,866 | Late last month reports surfaced that a new Internet Explorer vulnerability (CVE-2014-1776) was being exploited in targeted attacks. | [
{
"end_offset": 62,
"id": 48064,
"label": "SOFTWARE",
"start_offset": 44
},
{
"end_offset": 90,
"id": 48065,
"label": "vulnerability",
"start_offset": 77
}
] | [
{
"from_id": 48064,
"id": 384,
"to_id": 48065,
"type": "has"
}
] |
1,529 | This post is also available in: 日本語 (Japanese) In July 2020, Microsoft released a security update, CVE-2020-1350 | Windows DNS Server Remote Code Execution Vulnerability, for a new remote code execution (RCE) vulnerability. | [
{
"end_offset": 65,
"id": 46789,
"label": "TIME",
"start_offset": 56
},
{
"end_offset": 76,
"id": 46790,
"label": "identity",
"start_offset": 67
},
{
"end_offset": 118,
"id": 46791,
"label": "vulnerability",
"start_offset": 105
},
{
"end_offset": 176,
"id": 46792,
"label": "vulnerability",
"start_offset": 121
},
{
"end_offset": 214,
"id": 46793,
"label": "attack-pattern",
"start_offset": 187
}
] | [
{
"from_id": 46791,
"id": 221,
"to_id": 46792,
"type": "related-to"
},
{
"from_id": 46793,
"id": 223,
"to_id": 46791,
"type": "targets"
},
{
"from_id": 46793,
"id": 222,
"to_id": 46792,
"type": "targets"
}
] |
1,787 | While previous AvosLocker infections employ similar routines, this is the first sample we observed from the US with the capability to disable a defense solution using a legitimate Avast Anti-Rootkit Driver file (asWarPot.sys). | [
{
"end_offset": 25,
"id": 5285,
"label": "malware",
"start_offset": 15
},
{
"end_offset": 224,
"id": 46915,
"label": "FILEPATH",
"start_offset": 212
},
{
"end_offset": 205,
"id": 46916,
"label": "SOFTWARE",
"start_offset": 180
},
{
"end_offset": 110,
"id": 46917,
"label": "location",
"start_offset": 108
}
] | [
{
"from_id": 5285,
"id": 257,
"to_id": 46916,
"type": "targets"
},
{
"from_id": 5285,
"id": 258,
"to_id": 46917,
"type": "targets"
}
] |
3,361 | Python.BIOPASS.A ee4150f18ed826c032e7407468beea3b1f738ba80b75a6be21bb8d59ee345466 | [
{
"end_offset": 82,
"id": 10175,
"label": "hash",
"start_offset": 18
},
{
"end_offset": 16,
"id": 48977,
"label": "malware",
"start_offset": 0
}
] | [
{
"from_id": 10175,
"id": 532,
"to_id": 48977,
"type": "indicates"
}
] |
13,581 | Some of the delivered malicious scripts attempt to install backdoors to the websites built with the EC-CUBE framework, which is popular in Japan. | [
{
"end_offset": 117,
"id": 51662,
"label": "tools",
"start_offset": 100
},
{
"end_offset": 39,
"id": 51664,
"label": "malware",
"start_offset": 22
},
{
"end_offset": 144,
"id": 51663,
"label": "location",
"start_offset": 139
}
] | [
{
"from_id": 51662,
"id": 1125,
"to_id": 51663,
"type": "related-to"
},
{
"from_id": 51664,
"id": 1126,
"to_id": 51662,
"type": "targets"
}
] |
2,002 | The file description included the entry VlahmAV, a play on words on ClamAV, and the developer named the ransomware HelloXD and used another potential alias, uKnow, as the developer of HelloXD in the copyright section. | [
{
"end_offset": 75,
"id": 47109,
"label": "SOFTWARE",
"start_offset": 69
},
{
"end_offset": 123,
"id": 47111,
"label": "malware",
"start_offset": 116
},
{
"end_offset": 163,
"id": 47112,
"label": "malware",
"start_offset": 158
},
{
"end_offset": 192,
"id": 47110,
"label": "malware",
"start_offset": 185
}
] | [
{
"from_id": 47110,
"id": 302,
"to_id": 47112,
"type": "duplicate-of"
},
{
"from_id": 47111,
"id": 301,
"to_id": 47112,
"type": "duplicate-of"
}
] |
2,879 | Last year, exploitation of CVE-2013-3163 targeted Internet Explorer 8 and earlier this year, we found exploitation of CVE-2014-0322 in Internet Explorer 10. | [
{
"end_offset": 40,
"id": 48076,
"label": "vulnerability",
"start_offset": 27
},
{
"end_offset": 69,
"id": 48077,
"label": "SOFTWARE",
"start_offset": 50
},
{
"end_offset": 155,
"id": 48079,
"label": "SOFTWARE",
"start_offset": 135
},
{
"end_offset": 131,
"id": 48078,
"label": "vulnerability",
"start_offset": 118
}
] | [
{
"from_id": 48077,
"id": 385,
"to_id": 48076,
"type": "has"
},
{
"from_id": 48079,
"id": 386,
"to_id": 48078,
"type": "has"
}
] |
14,081 | The SLUB campaign also exploited and used GNUBoard websites as part of the infrastructure. | [
{
"end_offset": 17,
"id": 48160,
"label": "campaign",
"start_offset": 4
},
{
"end_offset": 51,
"id": 48161,
"label": "SOFTWARE",
"start_offset": 42
}
] | [
{
"from_id": 48160,
"id": 389,
"to_id": 48161,
"type": "exploits"
}
] |
4,450 | Our Threat Analysis Group, or TAG, is dedicated to protecting users from threats posed by state-sponsored malware attacks and other advanced persistent threats. | [
{
"end_offset": 25,
"id": 50226,
"label": "identity",
"start_offset": 4
},
{
"end_offset": 33,
"id": 50227,
"label": "identity",
"start_offset": 30
}
] | [
{
"from_id": 50227,
"id": 932,
"to_id": 50226,
"type": "duplicate-of"
}
] |
4,369 | Trojan.W97M.CONFUCIUS.B 654c7021a4482da21e149ded58643b279ffbce66badf1a0a7fc3551acd607312 Trojan.W97M.CONFUCIUS.C 712172b5b1895bbfcced961a83baa448e26e93e301be407e6b9dc8cb6526277f Trojan.Win32.DLOADR.TIOIBELQ | [
{
"end_offset": 90,
"id": 13099,
"label": "hash",
"start_offset": 26
},
{
"end_offset": 181,
"id": 13100,
"label": "hash",
"start_offset": 117
},
{
"end_offset": 24,
"id": 50154,
"label": "malware",
"start_offset": 1
},
{
"end_offset": 115,
"id": 50155,
"label": "malware",
"start_offset": 92
},
{
"end_offset": 211,
"id": 50156,
"label": "malware",
"start_offset": 183
}
] | [
{
"from_id": 13099,
"id": 922,
"to_id": 50154,
"type": "indicates"
},
{
"from_id": 13100,
"id": 923,
"to_id": 50155,
"type": "indicates"
}
] |
1,572 | As detailed below, Bad Rabbit gains initial entry by posing as an Adobe Flash update. | [
{
"end_offset": 30,
"id": 45062,
"label": "malware",
"start_offset": 20
},
{
"end_offset": 78,
"id": 45063,
"label": "SOFTWARE",
"start_offset": 67
}
] | [
{
"from_id": 45062,
"id": 240,
"to_id": 45063,
"type": "related-to"
}
] |
13,602 | The Gh0st RAT samples related to this campaign are obfuscated executable files, which decrypt the main payload in memory and execute its main export function named “Shellex.” Figure | [
{
"end_offset": 172,
"id": 51695,
"label": "FILEPATH",
"start_offset": 165
},
{
"end_offset": 13,
"id": 51694,
"label": "malware",
"start_offset": 4
}
] | [
{
"from_id": 51694,
"id": 1135,
"to_id": 51695,
"type": "related-to"
}
] |
1,893 | The link between Bahamut and Urpage can be best discussed by way of the multiple malicious Android samples that matched Bahamut's code and had C&C belonging to the Urpage infrastructure. | [
{
"end_offset": 146,
"id": 45170,
"label": "Infrastucture",
"start_offset": 143
},
{
"end_offset": 128,
"id": 45167,
"label": "threat-actor",
"start_offset": 120
},
{
"end_offset": 24,
"id": 5570,
"label": "threat-actor",
"start_offset": 17
},
{
"end_offset": 35,
"id": 5572,
"label": "threat-actor",
"start_offset": 29
},
{
"end_offset": 170,
"id": 5578,
"label": "threat-actor",
"start_offset": 164
},
{
"end_offset": 106,
"id": 47025,
"label": "SOFTWARE",
"start_offset": 91
}
] | [
{
"from_id": 5570,
"id": 289,
"to_id": 5572,
"type": "related-to"
}
] |
3,753 | The exception to this is Enemybot, a currently prevalent botnet built with bits of code from both Gafgyt and Mirai source code. | [
{
"end_offset": 115,
"id": 49584,
"label": "malware",
"start_offset": 110
},
{
"end_offset": 34,
"id": 49582,
"label": "malware",
"start_offset": 26
},
{
"end_offset": 105,
"id": 49583,
"label": "malware",
"start_offset": 99
}
] | [
{
"from_id": 49582,
"id": 835,
"to_id": 49583,
"type": "variant-of"
},
{
"from_id": 49582,
"id": 836,
"to_id": 49584,
"type": "variant-of"
}
] |
329 | The attacker holds the key necessary to decrypt the files unless the victim agrees to pay a $500 ransom. Unlike previous versions of CryptoWall, 2.0 communicates with its command and control (C2) server through the Tor anonymization network. | [
{
"end_offset": 149,
"id": 46021,
"label": "malware",
"start_offset": 134
},
{
"end_offset": 219,
"id": 46022,
"label": "tools",
"start_offset": 216
},
{
"end_offset": 203,
"id": 46023,
"label": "Infrastucture",
"start_offset": 172
}
] | [
{
"from_id": 46021,
"id": 145,
"to_id": 46022,
"type": "uses"
},
{
"from_id": 46021,
"id": 144,
"to_id": 46023,
"type": "beacons-to"
}
] |
338 | If these domains are confiscated or otherwise shut down, CryptoWall instructs the user to download the Tor Browser and access a website (paytordmbdekmizq.onion) that is only accessible over the Tor network. Unlikely some of it’s more flexible competition, CryptoWall only accepts ransom in the form of BitCoin. | [
{
"end_offset": 67,
"id": 46026,
"label": "malware",
"start_offset": 57
},
{
"end_offset": 114,
"id": 46027,
"label": "tools",
"start_offset": 103
},
{
"end_offset": 159,
"id": 46028,
"label": "url",
"start_offset": 137
},
{
"end_offset": 205,
"id": 46029,
"label": "SOFTWARE",
"start_offset": 194
},
{
"end_offset": 310,
"id": 46031,
"label": "SOFTWARE",
"start_offset": 303
},
{
"end_offset": 267,
"id": 46030,
"label": "malware",
"start_offset": 257
}
] | [
{
"from_id": 46026,
"id": 149,
"to_id": 46027,
"type": "related-to"
},
{
"from_id": 46026,
"id": 150,
"to_id": 46028,
"type": "related-to"
}
] |
2,059 | That being said, when looking at the HTML source code of the site, we discovered a couple of references to the user observed before – x4kme – and other aliases such as uKn0wn, which was observed in the HelloXD ransomware samples. | [
{
"end_offset": 174,
"id": 47152,
"label": "identity",
"start_offset": 168
},
{
"end_offset": 139,
"id": 47150,
"label": "identity",
"start_offset": 134
},
{
"end_offset": 209,
"id": 47151,
"label": "malware",
"start_offset": 202
}
] | [
{
"from_id": 47150,
"id": 308,
"to_id": 47152,
"type": "duplicate-of"
}
] |
350 | To protect against CryptoWall 2.0 we recommend taking the following actions: Adobe Reader Embedded BMP Parsing Integer Overflow Vulnerability CVE-2014-0556 Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address! | [
{
"end_offset": 91,
"id": 46038,
"label": "SOFTWARE",
"start_offset": 79
},
{
"end_offset": 158,
"id": 46039,
"label": "vulnerability",
"start_offset": 145
},
{
"end_offset": 34,
"id": 46037,
"label": "malware",
"start_offset": 20
},
{
"end_offset": 143,
"id": 46041,
"label": "vulnerability",
"start_offset": 92
}
] | [
{
"from_id": 46037,
"id": 152,
"to_id": 46039,
"type": "exploits"
}
] |
3,454 | Blackgear (also known as Topgear and Comnie) is a cyberespionage campaign dating back to 2008, at least based on the Protux backdoor used by its operators. | [
{
"end_offset": 9,
"id": 49232,
"label": "campaign",
"start_offset": 0
},
{
"end_offset": 32,
"id": 49233,
"label": "campaign",
"start_offset": 25
},
{
"end_offset": 43,
"id": 49234,
"label": "campaign",
"start_offset": 37
},
{
"end_offset": 93,
"id": 49235,
"label": "TIME",
"start_offset": 89
},
{
"end_offset": 132,
"id": 49236,
"label": "malware",
"start_offset": 117
}
] | [
{
"from_id": 49233,
"id": 761,
"to_id": 49232,
"type": "duplicate-of"
},
{
"from_id": 49234,
"id": 762,
"to_id": 49232,
"type": "duplicate-of"
}
] |
1,790 | The ADSS exploit abusing CVE-2021-40539 Due to the lack of network traffic details, we could not identify the exact CVE ID of the security gap the attacker used. | [
{
"end_offset": 39,
"id": 46921,
"label": "vulnerability",
"start_offset": 25
},
{
"end_offset": 8,
"id": 46922,
"label": "malware",
"start_offset": 4
}
] | [
{
"from_id": 46922,
"id": 261,
"to_id": 46921,
"type": "exploits"
}
] |
3,174 | In addition, the attack misuses the object storage service (OSS) of Alibaba Cloud (Aliyun) to host the BIOPASS RAT Python scripts as well as to store the exfiltrated data from victims. | [
{
"end_offset": 114,
"id": 48300,
"label": "malware",
"start_offset": 103
},
{
"end_offset": 90,
"id": 48299,
"label": "Infrastucture",
"start_offset": 68
}
] | [
{
"from_id": 48299,
"id": 401,
"to_id": 48300,
"type": "hosts"
}
] |
13,919 | The actors behind Darkside have stated that they avoid targeting companies in certain industries, including healthcare, education, the public sector, and the nonprofit sector. | [
{
"end_offset": 27,
"id": 48741,
"label": "malware",
"start_offset": 18
},
{
"end_offset": 10,
"id": 48744,
"label": "identity",
"start_offset": 0
}
] | [
{
"from_id": 48741,
"id": 451,
"to_id": 48744,
"type": "attributed-to"
}
] |
187 | On Feb. 23, a new variant of wiper malware named HermeticWiper was discovered in Ukraine. | [
{
"end_offset": 34,
"id": 591,
"label": "malware",
"start_offset": 29
},
{
"end_offset": 10,
"id": 45853,
"label": "TIME",
"start_offset": 3
},
{
"end_offset": 62,
"id": 45855,
"label": "malware",
"start_offset": 49
},
{
"end_offset": 88,
"id": 45854,
"label": "location",
"start_offset": 81
}
] | [
{
"from_id": 45855,
"id": 123,
"to_id": 591,
"type": "variant-of"
},
{
"from_id": 45855,
"id": 124,
"to_id": 45854,
"type": "targets"
}
] |
3,345 | 3. We found an interesting Cobalt Strike loader (a7e9e2bec3ad283a9a0b130034e822c8b6dfd26dda855f883a3a4ff785514f97) that embeds a URL that leads to the BIOPASS RAT loader. | [
{
"end_offset": 118,
"id": 10125,
"label": "hash",
"start_offset": 54
},
{
"end_offset": 167,
"id": 10126,
"label": "malware",
"start_offset": 156
},
{
"end_offset": 45,
"id": 48957,
"label": "tools",
"start_offset": 32
}
] | [
{
"from_id": 10125,
"id": 509,
"to_id": 48957,
"type": "indicates"
},
{
"from_id": 10125,
"id": 510,
"to_id": 10126,
"type": "drops"
}
] |
3,396 | BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 6a0976e5f9d07ff3d80fa2958976183758ba5fcdd4645e391614a347b4b8e64b f0b96efe2f714e7bddf76cc90a8b8c88_se.exe | [
{
"end_offset": 11,
"id": 10254,
"label": "malware",
"start_offset": 0
},
{
"end_offset": 110,
"id": 10255,
"label": "hash",
"start_offset": 46
},
{
"end_offset": 151,
"id": 10256,
"label": "FILEPATH",
"start_offset": 112
},
{
"end_offset": 44,
"id": 49057,
"label": "malware",
"start_offset": 20
}
] | [
{
"from_id": 10254,
"id": 620,
"to_id": 49057,
"type": "duplicate-of"
},
{
"from_id": 10256,
"id": 621,
"to_id": 10255,
"type": "duplicate-of"
},
{
"from_id": 10256,
"id": 622,
"to_id": 49057,
"type": "indicates"
},
{
"from_id": 10255,
"id": 623,
"to_id": 49057,
"type": "indicates"
}
] |
4,569 | We assess this actor is a former initial ransomware access broker who previously worked with the Conti ransomware group distributing the IcedID banking trojan based on overlaps in infrastructure, tools used in previous campaigns, and a unique cryptor. | [
{
"end_offset": 102,
"id": 50405,
"label": "threat-actor",
"start_offset": 97
},
{
"end_offset": 158,
"id": 50406,
"label": "malware",
"start_offset": 137
}
] | [
{
"from_id": 50405,
"id": 961,
"to_id": 50406,
"type": "uses"
}
] |
2,488 | The signature triggered on the creation of the webshell files, of which we observed the following file written: /usr/local/tomcat/work/Catalina/localhost/ROOT/org/apache/jsp/shell_jsp.java /usr/local/tomcat/webapps/ROOT/shell_.jsp SpringShell is officially assigned CVE-2022-22965, and the patch was released on March 31, 2022. | [
{
"end_offset": 231,
"id": 47567,
"label": "FILEPATH",
"start_offset": 190
},
{
"end_offset": 282,
"id": 47568,
"label": "vulnerability",
"start_offset": 268
},
{
"end_offset": 244,
"id": 47570,
"label": "vulnerability",
"start_offset": 233
},
{
"end_offset": 189,
"id": 47566,
"label": "FILEPATH",
"start_offset": 113
},
{
"end_offset": 328,
"id": 47569,
"label": "TIME",
"start_offset": 314
},
{
"end_offset": 55,
"id": 47571,
"label": "attack-pattern",
"start_offset": 47
}
] | [
{
"from_id": 47570,
"id": 337,
"to_id": 47568,
"type": "related-to"
},
{
"from_id": 47570,
"id": 339,
"to_id": 47567,
"type": "consists-of"
},
{
"from_id": 47570,
"id": 340,
"to_id": 47566,
"type": "consists-of"
}
] |
13,615 | Here, svchost.exe (renamed legitimate and signed Launcher.exe file from Tencent) sideloads Utility.dll (patched legitimate file). | [
{
"end_offset": 61,
"id": 51704,
"label": "FILEPATH",
"start_offset": 49
},
{
"end_offset": 102,
"id": 51705,
"label": "FILEPATH",
"start_offset": 91
},
{
"end_offset": 17,
"id": 51703,
"label": "FILEPATH",
"start_offset": 6
}
] | [
{
"from_id": 51703,
"id": 1138,
"to_id": 51705,
"type": "related-to"
},
{
"from_id": 51703,
"id": 1139,
"to_id": 51704,
"type": "related-to"
}
] |
2,681 | The LockBit group claimed that LockBit 2.0 is “the fastest encryption software all over the world” and provided a comparative table showing the encryption speed of various ransomware samples. LockBit 2.0 also contains a self-spreading feature, clears logs and can print the ransom note on network printers until the paper runs out. A management panel that affiliates can use to manage victims and affiliate accounts, generate new ransomware builds and generate the decryptor if the demanded ransom is paid also exists. | [
{
"end_offset": 12,
"id": 47888,
"label": "threat-actor",
"start_offset": 5
},
{
"end_offset": 43,
"id": 47889,
"label": "malware",
"start_offset": 32
},
{
"end_offset": 205,
"id": 47890,
"label": "threat-actor",
"start_offset": 194
}
] | [
{
"from_id": 47889,
"id": 367,
"to_id": 47888,
"type": "authored-by"
}
] |
13,640 | A series of ongoing business email compromise (BEC) campaigns that uses spear-phishing schemes on Office 365 accounts has been seen targeting business executives of over 1,000 companies across the world since March 2020. | [
{
"end_offset": 86,
"id": 51722,
"label": "attack-pattern",
"start_offset": 72
},
{
"end_offset": 117,
"id": 51723,
"label": "SOFTWARE",
"start_offset": 98
},
{
"end_offset": 219,
"id": 51724,
"label": "TIME",
"start_offset": 203
},
{
"end_offset": 161,
"id": 51725,
"label": "identity",
"start_offset": 142
},
{
"end_offset": 61,
"id": 51726,
"label": "campaign",
"start_offset": 20
}
] | [
{
"from_id": 51726,
"id": 1142,
"to_id": 51722,
"type": "uses"
},
{
"from_id": 51726,
"id": 1143,
"to_id": 51725,
"type": "targets"
},
{
"from_id": 51726,
"id": 1144,
"to_id": 51724,
"type": "related-to"
}
] |
4,596 | CVE-2021-26855: Microsoft Exchange Server Remote Code Execution Vulnerability (pre-authenticated Server-Side Request Forgery [SSRF]) CVE-2021-27065: Microsoft Exchange Server Remote Code Execution Vulnerability (post-authenticated Arbitrary File Write) Fig - MS Exchange Client Access Protocol Architecture The Client Access services (Outlook Web App portal) proxies the incoming connections to the Backend services. | [
{
"end_offset": 17,
"id": 50475,
"label": "vulnerability",
"start_offset": 3
},
{
"end_offset": 213,
"id": 50478,
"label": "vulnerability",
"start_offset": 152
},
{
"end_offset": 80,
"id": 50476,
"label": "vulnerability",
"start_offset": 19
},
{
"end_offset": 150,
"id": 50477,
"label": "vulnerability",
"start_offset": 136
}
] | [
{
"from_id": 50476,
"id": 977,
"to_id": 50475,
"type": "duplicate-of"
},
{
"from_id": 50478,
"id": 978,
"to_id": 50477,
"type": "duplicate-of"
}
] |
13,576 | If the victim enters the credential in the fake form and clicks anywhere on the page, the script will take the credentials, encode them using base64, replace some characters with custom substrings, and then upload these to Water Pamola’s server. Figure 4. | [
{
"end_offset": 244,
"id": 51656,
"label": "Infrastucture",
"start_offset": 223
},
{
"end_offset": 96,
"id": 51657,
"label": "malware",
"start_offset": 90
}
] | [
{
"from_id": 51657,
"id": 1124,
"to_id": 51656,
"type": "communicates-with"
}
] |
3,169 | We discovered a new malware that targets online gambling companies in China via a watering hole attack, in which visitors are tricked into downloading a malware loader disguised as a legitimate installer for well-known apps such as Adobe Flash Player or Microsoft Silverlight. | [
{
"end_offset": 102,
"id": 48286,
"label": "attack-pattern",
"start_offset": 82
},
{
"end_offset": 150,
"id": 48287,
"label": "attack-pattern",
"start_offset": 126
},
{
"end_offset": 27,
"id": 48291,
"label": "malware",
"start_offset": 16
},
{
"end_offset": 75,
"id": 48285,
"label": "location",
"start_offset": 70
},
{
"end_offset": 275,
"id": 48289,
"label": "SOFTWARE",
"start_offset": 254
},
{
"end_offset": 66,
"id": 48290,
"label": "identity",
"start_offset": 41
},
{
"end_offset": 250,
"id": 48288,
"label": "SOFTWARE",
"start_offset": 232
}
] | [
{
"from_id": 48291,
"id": 396,
"to_id": 48290,
"type": "targets"
},
{
"from_id": 48290,
"id": 397,
"to_id": 48285,
"type": "located-at"
},
{
"from_id": 48291,
"id": 398,
"to_id": 48286,
"type": "uses"
},
{
"from_id": 48291,
"id": 399,
"to_id": 48287,
"type": "uses"
}
] |
3,395 | BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 69d930050b2445937ec6a4f9887296928bf663f7a71132676be3f112e80fe275 test.exe | [
{
"end_offset": 11,
"id": 10252,
"label": "malware",
"start_offset": 0
},
{
"end_offset": 110,
"id": 10253,
"label": "hash",
"start_offset": 46
},
{
"end_offset": 120,
"id": 49056,
"label": "FILEPATH",
"start_offset": 112
},
{
"end_offset": 44,
"id": 49055,
"label": "malware",
"start_offset": 20
}
] | [
{
"from_id": 49056,
"id": 616,
"to_id": 10253,
"type": "duplicate-of"
},
{
"from_id": 10252,
"id": 617,
"to_id": 49055,
"type": "duplicate-of"
},
{
"from_id": 10253,
"id": 619,
"to_id": 49055,
"type": "indicates"
},
{
"from_id": 49056,
"id": 618,
"to_id": 49055,
"type": "indicates"
}
] |
4,591 | According to Shodan, on March 4, there were more than 266,000 Exchange Servers vulnerable to the ProxyLogon vulnerability, a day after the patch was released. | [
{
"end_offset": 31,
"id": 50465,
"label": "TIME",
"start_offset": 24
},
{
"end_offset": 19,
"id": 50464,
"label": "identity",
"start_offset": 13
},
{
"end_offset": 78,
"id": 50466,
"label": "SOFTWARE",
"start_offset": 62
},
{
"end_offset": 121,
"id": 50467,
"label": "vulnerability",
"start_offset": 97
}
] | [
{
"from_id": 50466,
"id": 976,
"to_id": 50467,
"type": "has"
}
] |
13,029 | Recently observed COLDRIVER credential phishing domains: Ghostwriter, a Belarusian threat actor, recently introduced a new capability into their credential phishing campaigns. | [
{
"end_offset": 28,
"id": 48866,
"label": "campaign",
"start_offset": 18
},
{
"end_offset": 48,
"id": 48867,
"label": "attack-pattern",
"start_offset": 28
},
{
"end_offset": 68,
"id": 48868,
"label": "threat-actor",
"start_offset": 57
},
{
"end_offset": 83,
"id": 48869,
"label": "location",
"start_offset": 72
},
{
"end_offset": 164,
"id": 48870,
"label": "attack-pattern",
"start_offset": 145
}
] | [
{
"from_id": 48866,
"id": 485,
"to_id": 48867,
"type": "uses"
}
] |
3,423 | BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A fa1d70b6b5b1a5e478c7d9d840aae0cc23d80476d9eea884a73d1b7e3926a209 64.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A fa7fbca583b22d92ae6d832d90ee637cc6ac840203cd059c6582298beb955aee test.exe BIOPASS RAT Loader Backdoor. | [
{
"end_offset": 11,
"id": 10313,
"label": "malware",
"start_offset": 0
},
{
"end_offset": 131,
"id": 10315,
"label": "malware",
"start_offset": 120
},
{
"end_offset": 253,
"id": 10317,
"label": "malware",
"start_offset": 242
},
{
"end_offset": 110,
"id": 10314,
"label": "hash",
"start_offset": 46
},
{
"end_offset": 230,
"id": 10316,
"label": "hash",
"start_offset": 166
},
{
"end_offset": 118,
"id": 49115,
"label": "FILEPATH",
"start_offset": 112
},
{
"end_offset": 164,
"id": 49116,
"label": "malware",
"start_offset": 140
},
{
"end_offset": 240,
"id": 49117,
"label": "FILEPATH",
"start_offset": 232
},
{
"end_offset": 44,
"id": 49114,
"label": "malware",
"start_offset": 20
}
] | [
{
"from_id": 10313,
"id": 720,
"to_id": 49114,
"type": "duplicate-of"
},
{
"from_id": 10317,
"id": 723,
"to_id": 49116,
"type": "duplicate-of"
},
{
"from_id": 10316,
"id": 728,
"to_id": 49116,
"type": "indicates"
},
{
"from_id": 49115,
"id": 721,
"to_id": 10314,
"type": "duplicate-of"
},
{
"from_id": 49117,
"id": 722,
"to_id": 10316,
"type": "duplicate-of"
},
{
"from_id": 10315,
"id": 724,
"to_id": 49116,
"type": "duplicate-of"
},
{
"from_id": 10314,
"id": 725,
"to_id": 49114,
"type": "indicates"
},
{
"from_id": 49115,
"id": 726,
"to_id": 49114,
"type": "indicates"
},
{
"from_id": 49117,
"id": 727,
"to_id": 49116,
"type": "indicates"
}
] |
273 | Our Threat Prevention and Web Application and API Security products added coverage for the OctoberCMS vulnerability exploited in the WhisperGate attacks, and we released an XSOAR Playbook to help organizations hunt for this threat. | [
{
"end_offset": 144,
"id": 906,
"label": "malware",
"start_offset": 133
},
{
"end_offset": 152,
"id": 44671,
"label": "campaign",
"start_offset": 133
},
{
"end_offset": 178,
"id": 44672,
"label": "SOFTWARE",
"start_offset": 173
},
{
"end_offset": 115,
"id": 44670,
"label": "vulnerability",
"start_offset": 91
}
] | [
{
"from_id": 44671,
"id": 10,
"to_id": 44670,
"type": "delivers"
}
] |
4,264 | Interestingly, one of those keys, “xldbszcd”, was found in a file stealer used by Confucius (472ea4929c5e0fb4e29597311ed90a14c57bc67fbf26f81a3aac042aa3dccb55, Detected as TSPY_CONFSTEAL.A) as well as in two other file stealers. | [
{
"end_offset": 157,
"id": 50061,
"label": "hash",
"start_offset": 93
},
{
"end_offset": 187,
"id": 50062,
"label": "malware",
"start_offset": 171
},
{
"end_offset": 91,
"id": 50060,
"label": "threat-actor",
"start_offset": 82
}
] | [
{
"from_id": 50061,
"id": 909,
"to_id": 50062,
"type": "indicates"
},
{
"from_id": 50060,
"id": 910,
"to_id": 50062,
"type": "uses"
}
] |
3,342 | Information from the stolen certificates 2. While checking the stolen certificates, we found a server-side variant of the Derusbi malware sample (e5fdb754c1a7c36c288c46765c9258bb2c7f38fa2a99188a623182f877da3783) that was signed with the same stolen certificate. | [
{
"end_offset": 217,
"id": 10119,
"label": "hash",
"start_offset": 153
},
{
"end_offset": 144,
"id": 48955,
"label": "malware",
"start_offset": 129
}
] | [
{
"from_id": 10119,
"id": 508,
"to_id": 48955,
"type": "indicates"
}
] |
736 | Dubbed OMIGOD, the four vulnerabilities were found to directly affect Azure Cloud Instances. | [
{
"end_offset": 13,
"id": 46327,
"label": "vulnerability",
"start_offset": 7
},
{
"end_offset": 81,
"id": 46328,
"label": "SOFTWARE",
"start_offset": 70
}
] | [
{
"from_id": 46328,
"id": 181,
"to_id": 46327,
"type": "has"
}
] |
13,474 | As one example, we've seen new activity from “hack-for-hire” firms, many based in India, that have been creating Gmail accounts spoofing the WHO. | [
{
"end_offset": 66,
"id": 51546,
"label": "threat-actor",
"start_offset": 45
},
{
"end_offset": 87,
"id": 51547,
"label": "location",
"start_offset": 82
},
{
"end_offset": 144,
"id": 51548,
"label": "identity",
"start_offset": 141
}
] | [
{
"from_id": 51546,
"id": 1102,
"to_id": 51548,
"type": "targets"
},
{
"from_id": 51546,
"id": 1103,
"to_id": 51547,
"type": "located-at"
}
] |
13,663 | In a July email sent to a C-level executive, we learned that the base domain URL is U10450540[.]ct[.]sendgrid[.]net, with the final URL being *getting-panes[.]sfo2*. Figure 3. | [
{
"end_offset": 116,
"id": 51748,
"label": "URL",
"start_offset": 84
},
{
"end_offset": 164,
"id": 51749,
"label": "URL",
"start_offset": 142
},
{
"end_offset": 43,
"id": 51750,
"label": "identity",
"start_offset": 26
}
] | [
{
"from_id": 51750,
"id": 1152,
"to_id": 51748,
"type": "related-to"
},
{
"from_id": 51750,
"id": 1153,
"to_id": 51749,
"type": "related-to"
}
] |
4,815 | Based on our analysis, we believe that the StopWar app was developed by pro-Ukrainian developers and was the inspiration for what Turla actors based their fake CyberAzov DoS app off of. | [
{
"end_offset": 54,
"id": 50738,
"label": "SOFTWARE",
"start_offset": 43
},
{
"end_offset": 177,
"id": 50740,
"label": "malware",
"start_offset": 155
},
{
"end_offset": 135,
"id": 50739,
"label": "threat-actor",
"start_offset": 130
}
] | [
{
"from_id": 50740,
"id": 1001,
"to_id": 50738,
"type": "impersonates"
},
{
"from_id": 50740,
"id": 1003,
"to_id": 50739,
"type": "authored-by"
}
] |
3,442 | Vulnerable Systems Mitigation Actions Observed in the Wild Conclusion Additional Resources Indicators of Compromise The F5 product vulnerable to CVE-2022-1388 is BIG-IP with the following versions: The vulnerability exists within the iControl REST framework used by BIG-IP. | [
{
"end_offset": 218,
"id": 49208,
"label": "vulnerability",
"start_offset": 201
},
{
"end_offset": 132,
"id": 49209,
"label": "tools",
"start_offset": 118
},
{
"end_offset": 160,
"id": 49207,
"label": "vulnerability",
"start_offset": 146
},
{
"end_offset": 260,
"id": 49210,
"label": "tools",
"start_offset": 237
}
] | [
{
"from_id": 49208,
"id": 755,
"to_id": 49207,
"type": "duplicate-of"
},
{
"from_id": 49209,
"id": 756,
"to_id": 49207,
"type": "has"
},
{
"from_id": 49210,
"id": 757,
"to_id": 49208,
"type": "has"
}
] |
4,629 | In December 2021, TAG discovered a novel Charming Kitten tool, named HYPERSCRAPE, used to steal user data from Gmail, Yahoo!, and Microsoft Outlook accounts. | [
{
"end_offset": 21,
"id": 50543,
"label": "identity",
"start_offset": 18
},
{
"end_offset": 56,
"id": 50544,
"label": "threat-actor",
"start_offset": 41
},
{
"end_offset": 80,
"id": 50545,
"label": "malware",
"start_offset": 69
},
{
"end_offset": 116,
"id": 50546,
"label": "SOFTWARE",
"start_offset": 111
},
{
"end_offset": 16,
"id": 50542,
"label": "TIME",
"start_offset": 3
},
{
"end_offset": 124,
"id": 50547,
"label": "SOFTWARE",
"start_offset": 118
},
{
"end_offset": 147,
"id": 50548,
"label": "SOFTWARE",
"start_offset": 130
}
] | [
{
"from_id": 50545,
"id": 982,
"to_id": 50544,
"type": "authored-by"
}
] |
1,360 | To determine how this vulnerability was exploited, we analyzed the patch that developers added to OctoberCMS version 1.0.472 to mitigate the CVE-2021-32648 vulnerability. | [
{
"end_offset": 155,
"id": 46690,
"label": "vulnerability",
"start_offset": 141
},
{
"end_offset": 108,
"id": 46692,
"label": "SOFTWARE",
"start_offset": 98
}
] | [
{
"from_id": 46692,
"id": 212,
"to_id": 46690,
"type": "has"
}
] |
2,749 | Vulnerability Details CVE-2014-6271 exists in all versions of Bash and is related to how environment variables are processed when the shell starts up. | [
{
"end_offset": 37,
"id": 47993,
"label": "vulnerability",
"start_offset": 24
},
{
"end_offset": 68,
"id": 47994,
"label": "tools",
"start_offset": 64
}
] | [
{
"from_id": 47994,
"id": 369,
"to_id": 47993,
"type": "has"
}
] |
914 | It’s also interesting to note that each time PClock2 scans a directory or encrypts a file, it makes an HTTP POST request to the C2 server. | [
{
"end_offset": 138,
"id": 46436,
"label": "Infrastucture",
"start_offset": 129
},
{
"end_offset": 53,
"id": 46435,
"label": "malware",
"start_offset": 46
}
] | [
{
"from_id": 46435,
"id": 189,
"to_id": 46436,
"type": "beacons-to"
}
] |
5,017 | Here is a deeper look at the campaign activity TAG has observed and the actions the team has taken to protect our users over the past few weeks: APT28 or Fancy Bear, a threat actor attributed to Russia GRU, was observed targeting users in Ukraine with a new variant of malware. | [
{
"end_offset": 246,
"id": 51078,
"label": "location",
"start_offset": 239
},
{
"end_offset": 50,
"id": 51074,
"label": "identity",
"start_offset": 47
},
{
"end_offset": 150,
"id": 51075,
"label": "threat-actor",
"start_offset": 145
},
{
"end_offset": 164,
"id": 51076,
"label": "threat-actor",
"start_offset": 154
},
{
"end_offset": 205,
"id": 51077,
"label": "identity",
"start_offset": 195
}
] | [
{
"from_id": 51076,
"id": 1035,
"to_id": 51075,
"type": "duplicate-of"
},
{
"from_id": 51075,
"id": 1036,
"to_id": 51077,
"type": "attributed-to"
},
{
"from_id": 51075,
"id": 1037,
"to_id": 51078,
"type": "targets"
}
] |
3,754 | The exploits involving Enemybot eventually download Enemybot samples that themselves embed CVE-2022-22954 exploits for further exploitation and propagation. | [
{
"end_offset": 31,
"id": 11380,
"label": "malware",
"start_offset": 23
},
{
"end_offset": 105,
"id": 49586,
"label": "vulnerability",
"start_offset": 91
},
{
"end_offset": 60,
"id": 49585,
"label": "malware",
"start_offset": 52
}
] | [
{
"from_id": 49585,
"id": 837,
"to_id": 49586,
"type": "exploits"
},
{
"from_id": 11380,
"id": 838,
"to_id": 49585,
"type": "downloads"
}
] |
5,284 | Our data also shows that although Cyclops Blink is a state-sponsored botnet, its C&C servers and bots affect WatchGuard Firebox and Asus devices that do not belong to critical organizations, or those that have an evident value on economic, political, or military espionage. | [
{
"end_offset": 47,
"id": 51332,
"label": "malware",
"start_offset": 34
},
{
"end_offset": 127,
"id": 51334,
"label": "SOFTWARE",
"start_offset": 109
},
{
"end_offset": 144,
"id": 51335,
"label": "SOFTWARE",
"start_offset": 132
}
] | [
{
"from_id": 51332,
"id": 1080,
"to_id": 51334,
"type": "targets"
},
{
"from_id": 51332,
"id": 1081,
"to_id": 51335,
"type": "targets"
}
] |
2,849 | It has been reported that the DOUBLEPULSAR backdoor (also from the Equation Group leak by Shadow Brokers) is installed and used to execute the malware after successful exploitation of a host via ETERNALBLUE, but this warrants further analysis. | [
{
"end_offset": 81,
"id": 48054,
"label": "threat-actor",
"start_offset": 67
},
{
"end_offset": 104,
"id": 8706,
"label": "threat-actor",
"start_offset": 90
},
{
"end_offset": 206,
"id": 8709,
"label": "vulnerability",
"start_offset": 195
},
{
"end_offset": 42,
"id": 8704,
"label": "vulnerability",
"start_offset": 30
}
] | [
{
"from_id": 48054,
"id": 383,
"to_id": 8709,
"type": "exploits"
},
{
"from_id": 48054,
"id": 382,
"to_id": 8704,
"type": "exploits"
}
] |
1,256 | This campaign involved five separate phishing attacks, each carrying a different variant of Sysget malware, also known as HelloBridge. | [
{
"end_offset": 54,
"id": 46631,
"label": "attack-pattern",
"start_offset": 38
},
{
"end_offset": 99,
"id": 46632,
"label": "malware",
"start_offset": 93
},
{
"end_offset": 134,
"id": 46633,
"label": "malware",
"start_offset": 123
}
] | [
{
"from_id": 46633,
"id": 199,
"to_id": 46632,
"type": "variant-of"
}
] |
1,687 | While the SunOrcal malware family has been confirmed to have been active since 2013, possibly even earlier, this new variant has been observed targeting regions outside of the typical target radius for this threat group, now expanding to include Vietnam and Myanmar. | [
{
"end_offset": 18,
"id": 5005,
"label": "malware",
"start_offset": 10
},
{
"end_offset": 83,
"id": 46877,
"label": "TIME",
"start_offset": 79
},
{
"end_offset": 253,
"id": 46878,
"label": "location",
"start_offset": 246
},
{
"end_offset": 265,
"id": 46879,
"label": "location",
"start_offset": 258
}
] | [
{
"from_id": 5005,
"id": 244,
"to_id": 46878,
"type": "targets"
},
{
"from_id": 5005,
"id": 246,
"to_id": 46879,
"type": "targets"
}
] |
837 | While kernel APC attacks aren’t well known and can be hard to understand, their proven success in WanaCrypt0r/WannaCry and the Petya/NotPetya make them an important threat to understand because proven attack techniques are quickly adopted widely. | [
{
"end_offset": 133,
"id": 2746,
"label": "malware",
"start_offset": 128
},
{
"end_offset": 25,
"id": 44880,
"label": "attack-pattern",
"start_offset": 7
},
{
"end_offset": 110,
"id": 44881,
"label": "malware",
"start_offset": 99
},
{
"end_offset": 119,
"id": 44882,
"label": "malware",
"start_offset": 111
},
{
"end_offset": 142,
"id": 44884,
"label": "malware",
"start_offset": 134
}
] | [
{
"from_id": 44882,
"id": 185,
"to_id": 44880,
"type": "uses"
},
{
"from_id": 2746,
"id": 186,
"to_id": 44880,
"type": "uses"
},
{
"from_id": 44881,
"id": 184,
"to_id": 44880,
"type": "uses"
},
{
"from_id": 44884,
"id": 187,
"to_id": 44880,
"type": "uses"
}
] |
4,473 | Reporting by CitizenLab linked this activity to Candiru, an Israeli spyware vendor. | [
{
"end_offset": 23,
"id": 50267,
"label": "identity",
"start_offset": 13
},
{
"end_offset": 55,
"id": 50268,
"label": "threat-actor",
"start_offset": 48
},
{
"end_offset": 67,
"id": 50269,
"label": "location",
"start_offset": 60
}
] | [
{
"from_id": 50268,
"id": 939,
"to_id": 50269,
"type": "located-at"
}
] |
3,340 | It is well known that the Winnti Group has previously used stolen certificates from game studios to sign its malware. | [
{
"end_offset": 78,
"id": 48950,
"label": "attack-pattern",
"start_offset": 59
},
{
"end_offset": 38,
"id": 48949,
"label": "threat-actor",
"start_offset": 26
}
] | [
{
"from_id": 48949,
"id": 507,
"to_id": 48950,
"type": "uses"
}
] |
5,037 | Recently observed Ghostwriter credential phishing domains and emails: Curious Gorge, a group TAG attributes to China's PLA SSF, has remained active against government, military, logistics and manufacturing organizations in Ukraine, Russia and Central Asia. | [
{
"end_offset": 238,
"id": 51116,
"label": "location",
"start_offset": 232
},
{
"end_offset": 255,
"id": 51117,
"label": "location",
"start_offset": 243
},
{
"end_offset": 96,
"id": 51113,
"label": "identity",
"start_offset": 93
},
{
"end_offset": 230,
"id": 51115,
"label": "location",
"start_offset": 223
},
{
"end_offset": 83,
"id": 51112,
"label": "threat-actor",
"start_offset": 70
},
{
"end_offset": 29,
"id": 51111,
"label": "threat-actor",
"start_offset": 18
},
{
"end_offset": 126,
"id": 51114,
"label": "identity",
"start_offset": 111
}
] | [
{
"from_id": 51112,
"id": 1046,
"to_id": 51114,
"type": "attributed-to"
},
{
"from_id": 51112,
"id": 1047,
"to_id": 51115,
"type": "targets"
},
{
"from_id": 51112,
"id": 1048,
"to_id": 51116,
"type": "targets"
},
{
"from_id": 51112,
"id": 1049,
"to_id": 51117,
"type": "targets"
}
] |
5,030 | Recently observed COLDRIVER credential phishing domains: Ghostwriter, a Belarusian threat actor, has remained active during the course of the war and recently resumed targeting of Gmail accounts via credential phishing. | [
{
"end_offset": 27,
"id": 51098,
"label": "threat-actor",
"start_offset": 18
},
{
"end_offset": 82,
"id": 51100,
"label": "location",
"start_offset": 72
},
{
"end_offset": 185,
"id": 51101,
"label": "SOFTWARE",
"start_offset": 180
},
{
"end_offset": 218,
"id": 51102,
"label": "attack-pattern",
"start_offset": 199
},
{
"end_offset": 68,
"id": 51099,
"label": "threat-actor",
"start_offset": 57
}
] | [
{
"from_id": 51099,
"id": 1043,
"to_id": 51100,
"type": "located-at"
},
{
"from_id": 51099,
"id": 1044,
"to_id": 51101,
"type": "uses"
},
{
"from_id": 51099,
"id": 1045,
"to_id": 51102,
"type": "uses"
}
] |
14,303 | Content of README.txt register.bat is used to gain administrator privilege. | [
{
"end_offset": 21,
"id": 48516,
"label": "FILEPATH",
"start_offset": 11
},
{
"end_offset": 34,
"id": 48518,
"label": "FILEPATH",
"start_offset": 22
},
{
"end_offset": 74,
"id": 48519,
"label": "attack-pattern",
"start_offset": 51
}
] | [
{
"from_id": 48518,
"id": 441,
"to_id": 48519,
"type": "uses"
}
] |
1,789 | Infection chain Figure 1. AvosLocker infection chain According to our analysis, the suspected entry point is via the Zoho ManageEngine ADSelfService Plus (ADSS) exploit: Figure 2. | [
{
"end_offset": 41,
"id": 5293,
"label": "malware",
"start_offset": 31
},
{
"end_offset": 178,
"id": 46920,
"label": "vulnerability",
"start_offset": 127
}
] | [
{
"from_id": 5293,
"id": 260,
"to_id": 46920,
"type": "exploits"
}
] |
3,617 | In our new research blog “FreeMilk: A Highly Targeted Spear Phishing Campaign”, our Unit 42 research team has discovered an attack campaign that takes spear phishing targeting to the next level by hijacking in-progress email conversations. | [
{
"end_offset": 105,
"id": 49399,
"label": "identity",
"start_offset": 84
},
{
"end_offset": 165,
"id": 49400,
"label": "attack-pattern",
"start_offset": 151
},
{
"end_offset": 238,
"id": 49401,
"label": "attack-pattern",
"start_offset": 197
},
{
"end_offset": 139,
"id": 49402,
"label": "campaign",
"start_offset": 131
}
] | [
{
"from_id": 49402,
"id": 791,
"to_id": 49400,
"type": "uses"
},
{
"from_id": 49402,
"id": 792,
"to_id": 49401,
"type": "uses"
}
] |
13,641 | The recent campaigns target senior positions in the United States and Canada. | [
{
"end_offset": 44,
"id": 51729,
"label": "identity",
"start_offset": 28
},
{
"end_offset": 76,
"id": 51731,
"label": "location",
"start_offset": 70
},
{
"end_offset": 20,
"id": 51728,
"label": "campaign",
"start_offset": 4
},
{
"end_offset": 65,
"id": 51730,
"label": "location",
"start_offset": 52
}
] | [
{
"from_id": 51728,
"id": 1145,
"to_id": 51729,
"type": "targets"
},
{
"from_id": 51729,
"id": 1146,
"to_id": 51730,
"type": "located-at"
},
{
"from_id": 51729,
"id": 1147,
"to_id": 51731,
"type": "located-at"
}
] |
13,632 | The code used to obtain user QQ numbers Protecting e-commerce platforms from Water Pamola’s attacks Water Pamola attacked online merchants with an XSS script appended onto online shopping orders. | [
{
"end_offset": 93,
"id": 51716,
"label": "campaign",
"start_offset": 81
},
{
"end_offset": 116,
"id": 51717,
"label": "campaign",
"start_offset": 104
},
{
"end_offset": 142,
"id": 51718,
"label": "identity",
"start_offset": 126
},
{
"end_offset": 154,
"id": 51719,
"label": "attack-pattern",
"start_offset": 151
}
] | [
{
"from_id": 51717,
"id": 1141,
"to_id": 51719,
"type": "uses"
},
{
"from_id": 51717,
"id": 1140,
"to_id": 51718,
"type": "targets"
}
] |
4,266 | The other file stealer (1f0dabd61947b6df8a392b77a0eae33777be3caad13698aecc223b54ab4b859a, Detected as TROJ_DELF.XXWZ) is related to a domain reported in September 2016. | [
{
"end_offset": 116,
"id": 50069,
"label": "malware",
"start_offset": 102
},
{
"end_offset": 167,
"id": 50070,
"label": "TIME",
"start_offset": 153
},
{
"end_offset": 88,
"id": 50068,
"label": "hash",
"start_offset": 24
}
] | [
{
"from_id": 50068,
"id": 914,
"to_id": 50069,
"type": "indicates"
}
] |
13,960 | In a US Senate hearing on cybersecurity threats, Senator Rob Portman of Ohio described the strike on Colonial Pipeline as “potentially the most substantial and damaging attack on US critical infrastructure ever.” | [
{
"end_offset": 68,
"id": 48769,
"label": "identity",
"start_offset": 49
},
{
"end_offset": 14,
"id": 48768,
"label": "identity",
"start_offset": 5
},
{
"end_offset": 77,
"id": 48770,
"label": "location",
"start_offset": 72
},
{
"end_offset": 182,
"id": 48771,
"label": "location",
"start_offset": 179
}
] | [
{
"from_id": 48769,
"id": 459,
"to_id": 48768,
"type": "related-to"
},
{
"from_id": 48769,
"id": 460,
"to_id": 48770,
"type": "related-to"
}
] |
3,697 | Carbanak also performs techniques for disabling security tools, deleting files that are left in malicious activity, and modifying registry to hide configuration information. | [
{
"end_offset": 138,
"id": 49494,
"label": "attack-pattern",
"start_offset": 120
},
{
"end_offset": 78,
"id": 49493,
"label": "attack-pattern",
"start_offset": 64
},
{
"end_offset": 62,
"id": 49491,
"label": "attack-pattern",
"start_offset": 38
},
{
"end_offset": 8,
"id": 49492,
"label": "threat-actor",
"start_offset": 0
}
] | [
{
"from_id": 49492,
"id": 806,
"to_id": 49491,
"type": "uses"
},
{
"from_id": 49492,
"id": 807,
"to_id": 49493,
"type": "uses"
},
{
"from_id": 49492,
"id": 808,
"to_id": 49494,
"type": "uses"
}
] |
4,286 | The group still uses the Badnews malware, a backdoor with information-stealing and file-executing capabilities, albeit updated with a slight modification in the encryption routine at the end of 2017, when they added Blowfish encryption on top of their custom encryption described in our former Patchwork blogpost. | [
{
"end_offset": 40,
"id": 50084,
"label": "malware",
"start_offset": 25
},
{
"end_offset": 78,
"id": 50085,
"label": "attack-pattern",
"start_offset": 58
},
{
"end_offset": 97,
"id": 50086,
"label": "attack-pattern",
"start_offset": 83
},
{
"end_offset": 198,
"id": 50087,
"label": "TIME",
"start_offset": 187
},
{
"end_offset": 303,
"id": 50088,
"label": "threat-actor",
"start_offset": 294
}
] | [
{
"from_id": 50084,
"id": 917,
"to_id": 50085,
"type": "uses"
},
{
"from_id": 50084,
"id": 918,
"to_id": 50086,
"type": "uses"
}
] |
5,108 |   [Lightly edited transcript of the video above] Hi there, Mark Nunnikhoven from Trend Micro Research, I want to talk to you about the concept of lateral movement. | [
{
"end_offset": 171,
"id": 51211,
"label": "attack-pattern",
"start_offset": 155
},
{
"end_offset": 84,
"id": 51209,
"label": "identity",
"start_offset": 68
},
{
"end_offset": 110,
"id": 51210,
"label": "identity",
"start_offset": 90
}
] | [
{
"from_id": 51209,
"id": 1071,
"to_id": 51210,
"type": "related-to"
}
] |
4,204 | Back in February, we noted the similarities between the Patchwork and Confucius groups and found that, in addition to the similarities in their malware code, both groups primarily went after targets in South Asia. | [
{
"end_offset": 79,
"id": 50016,
"label": "threat-actor",
"start_offset": 70
},
{
"end_offset": 16,
"id": 50014,
"label": "TIME",
"start_offset": 8
},
{
"end_offset": 65,
"id": 50015,
"label": "threat-actor",
"start_offset": 56
},
{
"end_offset": 212,
"id": 50017,
"label": "location",
"start_offset": 202
}
] | [
{
"from_id": 50015,
"id": 898,
"to_id": 50016,
"type": "related-to"
},
{
"from_id": 50015,
"id": 899,
"to_id": 50017,
"type": "targets"
},
{
"from_id": 50016,
"id": 900,
"to_id": 50017,
"type": "targets"
},
{
"from_id": 50016,
"id": 901,
"to_id": 50015,
"type": "related-to"
}
] |
3,398 | BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 75e03f40a088903579a436c0d8e8bc3d0d71cf2942ad793cc948f36866a2e1ad silverlight_ins.exe | [
{
"end_offset": 11,
"id": 10259,
"label": "malware",
"start_offset": 0
},
{
"end_offset": 44,
"id": 49060,
"label": "malware",
"start_offset": 20
},
{
"end_offset": 110,
"id": 10260,
"label": "hash",
"start_offset": 46
},
{
"end_offset": 131,
"id": 49061,
"label": "FILEPATH",
"start_offset": 112
}
] | [
{
"from_id": 49061,
"id": 628,
"to_id": 10260,
"type": "duplicate-of"
},
{
"from_id": 10259,
"id": 629,
"to_id": 49060,
"type": "duplicate-of"
},
{
"from_id": 10260,
"id": 630,
"to_id": 49060,
"type": "indicates"
},
{
"from_id": 49061,
"id": 631,
"to_id": 49060,
"type": "indicates"
}
] |