id
int64
1
14.4k
text
stringlengths
3
5.01k
entities
list
relations
list
Comments
list
3,827
Set QWORD Value {Variable}.registry.write Write/Add Registry {Variable}.registry.provider Create Registry Handle {Variable}.registry.destroy Deletes Registry Key {Variable}.registry.read Get/Read Registry Entries {Variable}.WMI WMI-related functions {
[]
[]
[]
224
Figure 8 shows that the number of Ukraine-related phishing/scam sites is currently continuing to rise about a month after the “Ukraine aid” search term started trending in Google search.
[ { "id": 747, "label": "attack-pattern", "start_offset": 50, "end_offset": 58 }, { "id": 45924, "label": "attack-pattern", "start_offset": 59, "end_offset": 69 }, { "id": 45926, "label": "location", "start_offset": 34, "end_offset": 41 }, { "id": 45927, "label": "SOFTWARE", "start_offset": 172, "end_offset": 178 } ]
[]
[]
5,032
If the user clicked continue, they would be redirected to an attacker controlled site that collected the users credentials.
[]
[]
[]
322
Please mark, I'm not a robot!
[]
[]
[]
5,546
Unfortunately, there’s nothing obvious that differentiates a website infected with Magecart from any other site.
[ { "id": 51539, "label": "malware", "start_offset": 83, "end_offset": 91 } ]
[]
[]
743
This year Microsoft has already patched 126 IE vulnerabilities to date.
[ { "id": 46335, "label": "identity", "start_offset": 10, "end_offset": 19 } ]
[]
[]
201
These attacks impacted Ukrainian government organizations including the Ministry of Defense, Ministry of Foreign Affairs, Armed Forces of Ukraine and the publicly funded broadcaster Ukrainian Radio.
[ { "id": 44616, "label": "identity", "start_offset": 23, "end_offset": 43 }, { "id": 44617, "label": "identity", "start_offset": 72, "end_offset": 91 }, { "id": 44618, "label": "identity", "start_offset": 93, "end_offset": 120 }, { "id": 44619, "label": "identity", "start_offset": 122, "end_offset": 145 }, { "id": 44620, "label": "identity", "start_offset": 182, "end_offset": 197 } ]
[]
[]
2,597
This initial focus has led to speculation that Lapsus$ Group may be Brazilian, although we understand the choice of targets to have been influenced by extended team members rather than the team leadership.
[ { "id": 47788, "label": "threat-actor", "start_offset": 47, "end_offset": 54 }, { "id": 47789, "label": "location", "start_offset": 68, "end_offset": 77 } ]
[ { "id": 356, "from_id": 47788, "to_id": 47789, "type": "located-at" } ]
[]
14,226
How is GitHub abused?
[ { "id": 48412, "label": "SOFTWARE", "start_offset": 7, "end_offset": 14 } ]
[]
[]
813
Ignite '17 Security Conference: Vancouver, BC June 12–15, 2017 Ignite '17 Security Conference is a live, four-day conference designed for today’s security professionals.
[ { "id": 46365, "label": "TIME", "start_offset": 47, "end_offset": 63 }, { "id": 46366, "label": "location", "start_offset": 33, "end_offset": 46 } ]
[]
[]
13,995
Recently, we uncovered the Operation Earth Kitsune campaign and published a detailed analysis of its tactics, techniques, and procedures (TTPs).
[ { "id": 48780, "label": "campaign", "start_offset": 27, "end_offset": 50 } ]
[]
[]
13,852
Updated May 17, 2021, 3:25 a.m. Eastern Time:
[ { "id": 42957, "label": "TIME", "start_offset": 22, "end_offset": 44 } ]
[]
[]
7,247
The DLL is custom malware that would immediately begin communicating with actor-controlled C2 domains.
[]
[]
[]
6,164
Appending their malicious script to the victim’s email signature to propagate the infection to their contacts.
[]
[]
[]
7,375
head -n 1 | awk '{print $4,$5,$6,$7,$8,$9;}'
[]
[]
[]
12,637
.pptx .pst .rar .sh .sql .txt .xls .xlsx .xml .zip
[]
[]
[]
5,587
Figure 5. Infected Linux device connected to a C&C server
[]
[]
[]
477
New anti-DGA technologies that leverage machine learning and big data are capable of countering DGA’s automation with automated prediction of their own that can anticipate, block, assist with malicious site takedowns or even, in some cases, prevent those malicious sites from being used in the first place.
[]
[]
[]
13,267
TClient is injected into dllhost.exe Malware Analysis wab32res.dll (FakeRun loader) loads TClient.
[ { "id": 41339, "label": "malware", "start_offset": 0, "end_offset": 7 }, { "id": 41340, "label": "malware", "start_offset": 91, "end_offset": 98 } ]
[]
[]
149
The most common way ransomware operators levy attacks is through email or by web browsing to malicious or compromised sites.
[ { "id": 45848, "label": "attack-pattern", "start_offset": 65, "end_offset": 123 } ]
[]
[]
6,807
Network destination for template injection: 176[.]119[.]147[.]225 Network destination for VBS: 176[.]57[.]215[.]115 These IP addresses are from Russian hosting companies.
[ { "id": 21172, "label": "IPV4", "start_offset": 45, "end_offset": 66 }, { "id": 21173, "label": "IPV4", "start_offset": 96, "end_offset": 116 }, { "id": 21174, "label": "location", "start_offset": 137, "end_offset": 140 } ]
[]
[]
11,099
As part of our wider tracking of APT31 activity, we've also seen them deploy targeted malware campaigns.
[ { "id": 33895, "label": "location", "start_offset": 65, "end_offset": 69 }, { "id": 33896, "label": "attack-pattern", "start_offset": 77, "end_offset": 93 } ]
[]
[]
523
Web hosting ransomware can also be downloaded and successfully installed through a multi-layered infection chain among different file types.
[ { "id": 46150, "label": "attack-pattern", "start_offset": 0, "end_offset": 22 } ]
[]
[]
3,658
Among these cybercriminals are financially motivated threat groups Carbanak and FIN7.
[ { "id": 49428, "label": "threat-actor", "start_offset": 80, "end_offset": 84 }, { "id": 49427, "label": "threat-actor", "start_offset": 67, "end_offset": 75 } ]
[]
[]
13,292
Figure 13.
[]
[]
[]
1,119
This results in a few hundred thousand individual mutexes available for further analysis.
[]
[]
[]
4,756
Across all Google products, we incorporate industry-leading security features and protections to keep our users safe.
[ { "id": 50661, "label": "identity", "start_offset": 11, "end_offset": 17 } ]
[]
[]
8,348
x.TextContent.StartsWith("Access for less secure apps has been turned on") select x).ToList
[]
[]
[]
3,637
Once Charlie has access to Alice’s email account, he then finds email conversations between Alice and Bob, his ultimate target.
[]
[]
[]
4,571
They continue to use the 'Browser in the Browser' phishing technique that TAG first observed and described in March.
[ { "id": 50413, "label": "TIME", "start_offset": 110, "end_offset": 115 }, { "id": 50411, "label": "attack-pattern", "start_offset": 26, "end_offset": 68 }, { "id": 50412, "label": "identity", "start_offset": 74, "end_offset": 77 } ]
[]
[]
1,967
Before starting analysis, we needed to set up a test environment.
[]
[]
[]
5,342
Core component code that receives and decrypts data from the C&C server If something is received, it is decrypted and written to the main pipe.
[]
[]
[]
3,262
1. The “notice” handler is used for checking the connection with the C&C server.
[]
[]
[]
8,691
No longer do groups need to have the technical expertise, now they just need resources.
[ { "id": 26836, "label": "identity", "start_offset": 67, "end_offset": 71 } ]
[]
[]
9,674
For the initial information packet, the backdoor also collects the following: Figure 15.
[]
[]
[]
5,109
And the reason why I want to tackle this today is because I've had some conversations in the last few days that have really kind of hit that idea bulb that people don't truly understand how cybercriminals get away with their crimes in the organization.
[]
[]
[]
10,404
A partial code snippet of AutoHotkeyu32.ahk Figure 5.
[]
[]
[]
2,282
Furthermore, 3.5M users were warned before downloading a malicious file through Google Safe Browsing warnings.
[ { "id": 47354, "label": "SOFTWARE", "start_offset": 80, "end_offset": 100 } ]
[]
[]
985
Conclusion Even popular third party monetization platforms are not always trustworthy.
[]
[]
[]
8,193
Figure 5.
[]
[]
[]
13,959
A successful attack on a company providing critical services will have rippling effects that will harm multiple sectors of society, which is why protecting these services should be a top priority.
[]
[]
[]
14,257
Abusing popular platforms like GitHub enables threat actors like Winnti to maintain network persistence between compromised computers and their servers, while staying under the radar.
[ { "id": 48451, "label": "threat-actor", "start_offset": 65, "end_offset": 72 } ]
[]
[]
1,943
The header for a sample document can be seen below.
[]
[]
[]
4,585
In March 2021, Microsoft kicked off the patch cycle early after releasing an advisory regarding the mass exploitation of four zero-days vulnerabilities by a Chinese Hacking group, HAFNIUM, on the on-premises versions of the Microsoft Exchange Server.
[ { "id": 50436, "label": "TIME", "start_offset": 3, "end_offset": 13 }, { "id": 50437, "label": "identity", "start_offset": 15, "end_offset": 24 }, { "id": 50438, "label": "vulnerability", "start_offset": 126, "end_offset": 151 }, { "id": 50439, "label": "threat-actor", "start_offset": 180, "end_offset": 187 }, { "id": 50440, "label": "location", "start_offset": 157, "end_offset": 164 }, { "id": 50441, "label": "SOFTWARE", "start_offset": 196, "end_offset": 249 } ]
[ { "id": 971, "from_id": 50439, "to_id": 50440, "type": "located-at" }, { "id": 972, "from_id": 50439, "to_id": 50438, "type": "exploits" }, { "id": 973, "from_id": 50441, "to_id": 50438, "type": "has" } ]
[]
3,425
fb770a3815c9ebcf1ba46b75b8f3686acc1af903de30c43bab8b86e5b46de851
[ { "id": 10318, "label": "SHA2", "start_offset": 1, "end_offset": 65 } ]
[]
[]
1,712
In this case a legitimate service (Tor) was being abused by CryptoWall so it could avoid having its C2 servers shut down.
[ { "id": 5086, "label": "malware", "start_offset": 60, "end_offset": 70 }, { "id": 5085, "label": "tools", "start_offset": 35, "end_offset": 38 } ]
[ { "id": 249, "from_id": 5086, "to_id": 5085, "type": "uses" } ]
[]
522
For example, the URL links can be posted on forums or chat group software, sent by IM applications, offered via fake freeware for download or attached in emails.
[ { "id": 45793, "label": "attack-pattern", "start_offset": 112, "end_offset": 125 }, { "id": 46149, "label": "attack-pattern", "start_offset": 142, "end_offset": 160 } ]
[]
[]
4,799
Google’s Threat Analysis Group (TAG) continues to closely monitor the cybersecurity environment in Eastern Europe with regard to the war in Ukraine.
[ { "id": 50699, "label": "location", "start_offset": 140, "end_offset": 147 }, { "id": 50697, "label": "identity", "start_offset": 0, "end_offset": 36 }, { "id": 50698, "label": "identity", "start_offset": 99, "end_offset": 113 } ]
[]
[]
11,942
We terminated 9 YouTube channels as part of our investigation into coordinated influence operations linked to China.
[]
[]
[]
4,010
To mitigate such risk, organizations must think globally and exert efforts to follow codes of local culture.
[]
[]
[]
9,630
This is shown in the figure below.
[]
[]
[]
5,277
Mobile
[]
[]
[]
3,310
The command that we received showed that the targeted browsers include Google Chrome, Microsoft Edge Beta, 360 Chrome, QQ Browser, 2345 Explorer, Sogou Explorer, and 360 Safe Browser.
[ { "id": 48390, "label": "SOFTWARE", "start_offset": 71, "end_offset": 84 }, { "id": 48394, "label": "SOFTWARE", "start_offset": 131, "end_offset": 144 }, { "id": 48395, "label": "SOFTWARE", "start_offset": 146, "end_offset": 160 }, { "id": 48396, "label": "SOFTWARE", "start_offset": 166, "end_offset": 182 }, { "id": 48391, "label": "SOFTWARE", "start_offset": 86, "end_offset": 105 }, { "id": 48392, "label": "SOFTWARE", "start_offset": 107, "end_offset": 117 }, { "id": 48393, "label": "SOFTWARE", "start_offset": 119, "end_offset": 129 } ]
[]
[]
6,099
Recently, FireEye published a blog titled “Operation Poisoned Hurricane” which detailed the use of PlugX malware variants signed with legitimate certificates that used Google Code project pages for command and control (C2).
[ { "id": 18858, "label": "location", "start_offset": 62, "end_offset": 71 }, { "id": 18859, "label": "malware", "start_offset": 99, "end_offset": 104 }, { "id": 18860, "label": "location", "start_offset": 206, "end_offset": 209 } ]
[]
[]
4,331
Stage 4 is the final payload (analyzed in the next section).
[]
[]
[]
12,646
Secret key generation
[]
[]
[]
411
As that trend shows no sign of slowing down anytime soon, we can expect this to remain a very lucrative avenue for attackers.
[]
[]
[]
5,474
Its latest version can mute the device (i.e., take out the ringtone and vibration features) and sync call logs and SMSs.
[]
[]
[]
11,187
We have seen it deployed against fewer than two dozen accounts located in Iran.
[]
[]
[]
10,118
Backdoor.
[]
[]
[]
65
A normal PC used to mine Monero can earn around US$0.25 per day at the current prices.
[ { "id": 45824, "label": "SOFTWARE", "start_offset": 25, "end_offset": 31 } ]
[]
[]
10,153
We were able to collect evidence that credential phishing emails were sent to chmail.ir users on May 18, 2017, just one day before the presidential elections in Iran.
[ { "id": 30973, "label": "attack-pattern", "start_offset": 49, "end_offset": 57 } ]
[]
[]
7,724
The .NET downloads jm1 — an .MSI installer — that installs another NSIS installer, leading to a ServHelper infection in the system.
[ { "id": 23993, "label": "malware", "start_offset": 67, "end_offset": 71 }, { "id": 23994, "label": "malware", "start_offset": 96, "end_offset": 106 } ]
[]
[]
1,128
With the appropriate tools it’s possible to enable a single researcher to continually review and categorize new mutexes.
[]
[]
[]
10,235
Recap of recent Pawn Storm activities Compromising accounts of users from the Middle East Trend Micro has been closely and consistently monitoring the activities of Pawn Storm, and in March 2020, we released our latest research on the group.
[ { "id": 31264, "label": "location", "start_offset": 120, "end_offset": 123 }, { "id": 31265, "label": "threat-actor", "start_offset": 166, "end_offset": 176 }, { "id": 31266, "label": "location", "start_offset": 178, "end_offset": 181 } ]
[]
[]
7,857
As of July 7, this includes 85.8% of active Android devices.
[]
[]
[]
8,199
Table 1. Domains registered using the email address
[]
[]
[]
913
By comparison, the latest version of the CryptoWall malware family takes roughly 1-3 minutes to complete its encryption routine.
[ { "id": 2888, "label": "malware", "start_offset": 41, "end_offset": 51 }, { "id": 2889, "label": "TIME", "start_offset": 73, "end_offset": 92 } ]
[]
[]
583
Cortex XDR endpoint protection stops malware, exploits and ransomware before they can compromise endpoints.
[ { "id": 46179, "label": "SOFTWARE", "start_offset": 0, "end_offset": 10 } ]
[]
[]
2,972
Preferably, find a password manager that requires two-factor authentication. 2. Protect Your Home Routers and Wi-Fi:
[]
[]
[]
1,161
If this functionality were available in some more open source setting, and was of even moderate quality, we would expect to see it used in other malware families as well.
[]
[]
[]
6,008
Recently observed IPs used in Curious Gorge campaigns: COLDRIVER, a Russian-based threat actor sometimes referred to as Calisto, has launched credential phishing campaigns, targeting several US based NGOs and think tanks, the military of a Balkans country, and a Ukraine based defense contractor.
[ { "id": 18535, "label": "attack-pattern", "start_offset": 153, "end_offset": 161 }, { "id": 18537, "label": "location", "start_offset": 205, "end_offset": 208 }, { "id": 18539, "label": "location", "start_offset": 257, "end_offset": 260 } ]
[]
[]
230
Figure 9. hxxps://startrackzm[.]com/wap-admin/ONE-DRIVE/one%20d%20%20no%[email protected].
[ { "id": 45930, "label": "URL", "start_offset": 11, "end_offset": 114 } ]
[]
[]
4,462
We remediated the compromises for these users and implemented controls to protect all Android users.
[ { "id": 50246, "label": "SOFTWARE", "start_offset": 86, "end_offset": 93 } ]
[]
[]
9,650
Figure 6.
[]
[]
[]
1,874
The below example shows that the blocking works (output from the "sc start" command):
[]
[]
[]
2,140
With this addition protection available, our customers can and should include that as part of their decisions around security and deployment of the security updates and their risk assessment of the vulnerability and threat environment.
[]
[]
[]
12,680
As announced today, Google has taken action to disrupt the operations of Glupteba, a multi-component botnet targeting Windows computers.
[ { "id": 39345, "label": "location", "start_offset": 37, "end_offset": 43 }, { "id": 39346, "label": "malware", "start_offset": 73, "end_offset": 81 } ]
[]
[]
1,899
Upon writing this entry, we’ve coordinated with Google to ensure that the malicious applications these C&C sites advertise are no longer available for download on the Google Play Store.
[ { "id": 45172, "label": "identity", "start_offset": 48, "end_offset": 54 }, { "id": 45173, "label": "SOFTWARE", "start_offset": 167, "end_offset": 184 } ]
[]
[]
2,347
We updated our operating system with the latest patch at the time (2021-004) and tried the exploit again.
[ { "id": 47401, "label": "TIME", "start_offset": 67, "end_offset": 75 } ]
[]
[]
13,080
What are your thoughts on the ransomware attacks on retailers as we approach the busiest times of the year for retailers, including Black Friday, Cyber Monday and the holiday season?
[]
[]
[]
6,483
LIGOLO execution example
[]
[]
[]
2,421
This means that web users can get a class object remotely by simply submitting a URL as shown in Figure 4.
[]
[]
[]
4,044
Fortunately, we were still able to collect the decryption key in some cases and we decrypted the payload successfully.
[]
[]
[]
6,765
In 2018, CERT-UA published an advisory against the malware Pterodo, which the group allegedly used.
[]
[]
[]
9,911
The APT33 actors then issue commands to the bots and collect data from the bots using these VPN connections.
[ { "id": 30245, "label": "threat-actor", "start_offset": 4, "end_offset": 9 }, { "id": 30246, "label": "location", "start_offset": 22, "end_offset": 27 }, { "id": 30247, "label": "location", "start_offset": 49, "end_offset": 52 } ]
[]
[]
10,621
Although much of Sandworm’s activity targeting Ukraine and their attacks against the 2018 Winter Olympics have been covered publicly, some campaigns have not been reported.
[ { "id": 32401, "label": "location", "start_offset": 9, "end_offset": 13 }, { "id": 32402, "label": "threat-actor", "start_offset": 17, "end_offset": 25 }, { "id": 32404, "label": "location", "start_offset": 55, "end_offset": 58 } ]
[]
[]
5,060
Recently observed COLDRIVER credential phishing domains: Ghostwriter, a Belarusian threat actor, recently introduced a new capability into their credential phishing campaigns.
[ { "id": 51165, "label": "location", "start_offset": 72, "end_offset": 82 }, { "id": 51166, "label": "campaign", "start_offset": 145, "end_offset": 174 }, { "id": 15621, "label": "threat-actor", "start_offset": 18, "end_offset": 27 }, { "id": 15623, "label": "threat-actor", "start_offset": 57, "end_offset": 68 } ]
[ { "id": 1064, "from_id": 15623, "to_id": 51165, "type": "located-at" }, { "id": 1065, "from_id": 15623, "to_id": 51166, "type": "uses" } ]
[]
11,485
The app is distributed under the guise of performing Denial of Service (DoS) attacks against a set of Russian websites.
[]
[]
[]
9,990
View active directory objects dsquery.exe DsQuery
[ { "id": 30504, "label": "location", "start_offset": 0, "end_offset": 4 }, { "id": 30505, "label": "malware", "start_offset": 30, "end_offset": 41 }, { "id": 30506, "label": "malware", "start_offset": 42, "end_offset": 49 } ]
[]
[]
4,730
Among other targets, this spyware was used to compromise journalists and opposition politicians.
[]
[]
[]
2,125
The following two conditions must both be met for a system to be vulnerable to attack: If your Struts application does not meet both of these conditions, your application may still be vulnerable but not (currently) exploitable via CVE-2018-11776.
[ { "id": 47262, "label": "vulnerability", "start_offset": 232, "end_offset": 246 }, { "id": 47263, "label": "SOFTWARE", "start_offset": 96, "end_offset": 102 } ]
[]
[]
8,258
The obfuscation used was not particularly sophisticated.
[]
[]
[]
183
This post is also available in: 日本語 (Japanese)
[]
[]
[]
1,857
Figure 24. Running more system network configuration discovery scans
[ { "id": 5442, "label": "attack-pattern", "start_offset": 29, "end_offset": 67 } ]
[]
[]
13,617
This oplib.dll library is then sideloaded.
[ { "id": 51707, "label": "FILEPATH", "start_offset": 5, "end_offset": 14 } ]
[]
[]
6,519
MITRE ATT&CK Techniques Mapping Tactic Technique Resource Development Acquire Infrastructure: Web Services – T1583.006 Initial Access Phishing: Spearphishing Attachment – T1566.001 Phishing: Spearphishing Link – T1566.002 Execution Command and Scripting Interpreter: PowerShell – T1059.001
[ { "id": 20197, "label": "attack-pattern", "start_offset": 142, "end_offset": 150 }, { "id": 20198, "label": "attack-pattern", "start_offset": 152, "end_offset": 176 }, { "id": 20199, "label": "attack-pattern", "start_offset": 189, "end_offset": 197 }, { "id": 20200, "label": "attack-pattern", "start_offset": 199, "end_offset": 217 }, { "id": 20201, "label": "location", "start_offset": 250, "end_offset": 253 }, { "id": 20202, "label": "attack-pattern", "start_offset": 254, "end_offset": 263 }, { "id": 20203, "label": "attack-pattern", "start_offset": 277, "end_offset": 287 } ]
[]
[]
2,317
It was interesting to see the use of Capstone.js, a port of the Capstone disassembly framework, in an exploit chain as Capstone is typically used for binary analysis.
[ { "id": 47388, "label": "SOFTWARE", "start_offset": 37, "end_offset": 48 }, { "id": 47391, "label": "SOFTWARE", "start_offset": 119, "end_offset": 127 }, { "id": 47390, "label": "SOFTWARE", "start_offset": 64, "end_offset": 94 } ]
[]
[]
3,494
b64_data = str[len("magnet:?xt=urn:bhih:"): tail] b64_decode = base64.b64decode(b64_data) key = ord(b64_decode[2]) data = b64_decode[4:] output_file = open("C2_info", "wb") for single_byte in data: output_file.write(chr(ord(single_byte) ^ key)) output_file.close()
[]
[]
[]
4,652
A new form is displayed if the information is not provided via command prompt.
[]
[]
[]