id
int64 1
14.4k
| text
stringlengths 3
5.01k
| entities
list | relations
list | Comments
list |
---|---|---|---|---|
5,257 | Timestamps indicate that the earliest sample was signed on June 2015; the latest variant was signed on May 2017. | [
{
"id": 51296,
"label": "TIME",
"start_offset": 59,
"end_offset": 68
},
{
"id": 51297,
"label": "TIME",
"start_offset": 103,
"end_offset": 111
}
] | [] | [] |
1,731 | Attackers can gain access to your personal and financial information. | [] | [] | [] |
1,675 | The user needs to know the IP of the infected client, the port used by malware and the encryption password to properly decode the traffic. | [] | [] | [] |
9,960 | They carried this out by first stealing the company’s certificate then using it to sign the malware. | [] | [] | [] |
4,736 | The growth of commercial spyware vendors and hack-for-hire groups has necessitated growth in TAG to counter these threats. | [
{
"id": 50648,
"label": "identity",
"start_offset": 93,
"end_offset": 96
}
] | [] | [] |
4,445 | It was last updated on July 29, 2022. | [
{
"id": 50219,
"label": "TIME",
"start_offset": 23,
"end_offset": 36
}
] | [] | [] |
4,198 | OS Credential Dumping: Credentials in Registry Lateral Movement T1021.002 | [
{
"id": 50004,
"label": "attack-pattern",
"start_offset": 0,
"end_offset": 73
}
] | [] | [] |
10,656 | Vulnerabilities of Apache HTTP Server have increased since 2017 Open-source web servers, especially Apache HTTP Server, have been heavily exploited in the past five years. | [
{
"id": 32529,
"label": "attack-pattern",
"start_offset": 69,
"end_offset": 75
}
] | [] | [] |
6,952 | Figure 9. | [] | [] | [] |
6,115 | The PlugX sample in Table 3 also uses the legitimate PixelPlus Co., Ltd certificate and was also targeted against the university. | [
{
"id": 18910,
"label": "tools",
"start_offset": 4,
"end_offset": 9
},
{
"id": 18911,
"label": "location",
"start_offset": 10,
"end_offset": 16
},
{
"id": 18914,
"label": "location",
"start_offset": 84,
"end_offset": 87
},
{
"id": 18915,
"label": "location",
"start_offset": 118,
"end_offset": 128
}
] | [] | [] |
3,410 | BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A ba44c22a3224c3a201202b69d86df2a78f0cd1d4ac1119eb29cae33f09027a9a Silverlight2.exe | [
{
"id": 10289,
"label": "malware",
"start_offset": 0,
"end_offset": 11
},
{
"id": 10290,
"label": "SHA2",
"start_offset": 46,
"end_offset": 110
},
{
"id": 49090,
"label": "malware",
"start_offset": 20,
"end_offset": 44
},
{
"id": 49091,
"label": "FILEPATH",
"start_offset": 112,
"end_offset": 128
}
] | [
{
"id": 681,
"from_id": 10289,
"to_id": 49090,
"type": "duplicate-of"
},
{
"id": 682,
"from_id": 49091,
"to_id": 10290,
"type": "duplicate-of"
},
{
"id": 683,
"from_id": 49091,
"to_id": 49090,
"type": "indicates"
},
{
"id": 684,
"from_id": 10290,
"to_id": 49090,
"type": "indicates"
}
] | [] |
14,243 | We mapped Winnti’s activities for this campaign by analyzing the dates exposed in GitHub. | [
{
"id": 48437,
"label": "identity",
"start_offset": 10,
"end_offset": 16
},
{
"id": 48438,
"label": "SOFTWARE",
"start_offset": 82,
"end_offset": 88
}
] | [] | [] |
14,308 | Setup.exe is the core module used to steal data. | [
{
"id": 48529,
"label": "FILEPATH",
"start_offset": 0,
"end_offset": 9
}
] | [] | [] |
7,166 | This research is done in cooperation with IssueMakersLab of South Korea. | [] | [] | [] |
2,103 | This post is also available in: 日本語 (Japanese) A recent vulnerability in the Kerberos authentication protocol, CVE-2020-17049 (dubbed Bronze Bit), has been disclosed by Microsoft. | [
{
"id": 45392,
"label": "identity",
"start_offset": 175,
"end_offset": 184
},
{
"id": 45390,
"label": "vulnerability",
"start_offset": 117,
"end_offset": 131
},
{
"id": 45393,
"label": "SOFTWARE",
"start_offset": 83,
"end_offset": 91
},
{
"id": 45391,
"label": "vulnerability",
"start_offset": 140,
"end_offset": 150
}
] | [
{
"id": 95,
"from_id": 45391,
"to_id": 45390,
"type": "duplicate-of"
}
] | [] |
1,839 | Searching for processes We found that aswArPot.sys, registered as aswSP_ArPot2 as a service, is used as the handle for the following DeviceIoControl call. | [
{
"id": 45144,
"label": "FILEPATH",
"start_offset": 42,
"end_offset": 54
}
] | [] | [] |
13,384 | Attacker Owned Domains: | [] | [] | [] |
2,499 | Palo Alto Networks Cortex XSOAR customers can leverage the "Spring Core and Cloud Function SpEL RCEs" pack to automatically detect and mitigate the vulnerabilities. | [
{
"id": 47597,
"label": "vulnerability",
"start_offset": 61,
"end_offset": 101
},
{
"id": 47596,
"label": "SOFTWARE",
"start_offset": 1,
"end_offset": 32
}
] | [] | [] |
5,445 | But, mobile banking use is picking up around the globe. | [] | [] | [] |
7,026 | SysUpdate was first described by the NCC Group in 2018. | [
{
"id": 22036,
"label": "malware",
"start_offset": 0,
"end_offset": 9
}
] | [] | [] |
13,699 | Confirm requests using other channels. | [] | [] | [] |
6,345 | Figure 9 is a screenshot of the default Windows File Explorer; “show hidden files” is not checked. | [] | [] | [] |
9,384 | We also conclude that this is the initial phase of an attack based on the following reasons: CallerSpy, as it is now, could prove uneven for a targeted attack. | [] | [] | [] |
1,358 | Later that day, a public PoC surfaced, allowing organizations to better understand this vulnerability and how it is exploited. | [
{
"id": 4075,
"label": "TIME",
"start_offset": 0,
"end_offset": 14
}
] | [] | [] |
2,464 | However, in many cases the filename had an extension that would not support a webshell, such as .js and .txt, which we believe was used just to mark the presence of a successful file upload as part of vulnerable server discovery efforts. | [] | [] | [] |
4,559 | In this case, the Android app name was stopwar.apk (com.ddos.stopwar) and was distributed from the website stopwar.pro. | [
{
"id": 50373,
"label": "SOFTWARE",
"start_offset": 18,
"end_offset": 25
},
{
"id": 50375,
"label": "malware",
"start_offset": 52,
"end_offset": 68
},
{
"id": 50376,
"label": "DOMAIN",
"start_offset": 107,
"end_offset": 118
},
{
"id": 50374,
"label": "malware",
"start_offset": 39,
"end_offset": 50
}
] | [] | [] |
7,709 | The newer version shows that the developers behind ServHelper continued to upgrade it to evade detection and add more functions, possibly for even more iterations in the future. | [
{
"id": 23958,
"label": "malware",
"start_offset": 52,
"end_offset": 62
},
{
"id": 23959,
"label": "location",
"start_offset": 106,
"end_offset": 109
}
] | [] | [] |
6,636 | https://unit42.paloaltonetworks.com/unit42-new-threat-actor-group-darkhydrus-targets-middle-east-government/ https://unit42.paloaltonetworks.com/unit42-darkhydrus-uses-phishery-harvest-credentials-middle-east/ https://unit42.paloaltonetworks.com/darkhydrus-delivers-new-trojan-that-can-use-google-drive-for-c2-communications/ | [] | [] | [] |
13,280 | Snapshot of code we used to decrypt TClient’s configuration Figure 11. | [
{
"id": 41375,
"label": "malware",
"start_offset": 36,
"end_offset": 43
}
] | [] | [] |
11,796 | Although Play Store users were protected, we are highlighting the app here as TAG has seen APT35 attempt to distribute this spyware on other platforms as recently as July 2021. | [
{
"id": 36377,
"label": "location",
"start_offset": 45,
"end_offset": 48
},
{
"id": 36378,
"label": "threat-actor",
"start_offset": 91,
"end_offset": 96
}
] | [] | [] |
4,423 | x.TextContent.StartsWith("Access for less secure apps has been turned on") select x).ToList | [] | [] | [] |
3,390 | test4.exe BIOPASS RAT Loader Backdoor.Win32.BIOPASS.A 3589e53c59d9807cca709387bbcaaffc7e24e15d9a78425b717fc55c779b928e | [
{
"id": 10240,
"label": "malware",
"start_offset": 11,
"end_offset": 22
},
{
"id": 10241,
"label": "SHA2",
"start_offset": 57,
"end_offset": 121
},
{
"id": 49042,
"label": "FILEPATH",
"start_offset": 0,
"end_offset": 9
},
{
"id": 49043,
"label": "malware",
"start_offset": 31,
"end_offset": 55
}
] | [
{
"id": 592,
"from_id": 49042,
"to_id": 49043,
"type": "indicates"
},
{
"id": 593,
"from_id": 10241,
"to_id": 49043,
"type": "indicates"
},
{
"id": 594,
"from_id": 10240,
"to_id": 49043,
"type": "duplicate-of"
},
{
"id": 595,
"from_id": 49042,
"to_id": 10241,
"type": "duplicate-of"
}
] | [] |
1,151 | And “jh” is always followed by a key from the left side of the keyboard. | [] | [] | [] |
2,210 | This leads us to the next stage of our malware This particular stage of malware acts as a downloader. | [] | [] | [] |
10,937 | Conclusion | [] | [] | [] |
9,782 | It is important that employers and employees across all organizations and enterprises be able to identify phishing attacks and distinguish legitimate emails from malicious ones. | [
{
"id": 29795,
"label": "location",
"start_offset": 31,
"end_offset": 34
},
{
"id": 29796,
"label": "location",
"start_offset": 70,
"end_offset": 73
},
{
"id": 29797,
"label": "attack-pattern",
"start_offset": 106,
"end_offset": 114
},
{
"id": 29798,
"label": "location",
"start_offset": 123,
"end_offset": 126
}
] | [] | [] |
9,472 | This is the main client binary written in C++, which is the last stage of PuppetLoader’s infection chain. | [
{
"id": 29101,
"label": "malware",
"start_offset": 74,
"end_offset": 86
}
] | [] | [] |
1,020 | Other sellers were also able to offer customizable email accounts from a specific domain/institution. | [] | [] | [] |
6,955 | Figure 10. | [] | [] | [] |
2,755 | vulnerable this is a test | [] | [] | [] |
1,526 | Similar to any other malware family or threat, Palo Alto Networks customers should use the entire security framework for threat mitigation and threat prevention coverage. Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address! | [
{
"id": 46788,
"label": "identity",
"start_offset": 48,
"end_offset": 66
}
] | [] | [] |
13,556 | This campaign appears to be financially motivated. | [] | [] | [] |
4,094 | All data will then be encrypted and sent back. Figure 8. | [] | [] | [] |
13,990 | Tags Cloud | APT & Targeted Attacks | Expert Perspective | Articles, News, Reports | Cyber Threats | [] | [] | [] |
7,418 | Indicators of Compromise (IoCs) SHA256 Description Detection Name 1800de5f0fb7c5ef3c0d9787260ed61bc324d861bc92d9673d4737d1421972aa Cryptocurrency miner Trojan.SH.MALXMR.UWEJP b68bd3a54622792200b931ee5eebf860acf8b24f4b338b5080193573a81c747d Shellbot Backdoor.SH.SHELLBOT.AA 620635aa9685249c87ead1bb0ad25b096714a0073cfd38a615c5eb63c3761976 Tool Trojan.Linux.SSHBRUTE.B fc57bd66c27066104cd6f8962cd463a5dfc05fa59b76b6958cddd3542dfe6a9a Cryptocurrency miner Coinminer.Linux.MALXMR.SMDSL32 649280bd4c5168009c1cff30e5e1628bcf300122b49d339e3ea3f3b6ff8f9a79 Cryptocurrency miner Coinminer.Linux.MALXMR.SMDSL64 URLs 159[.]203[.]141[.]208 104[.]236[.]192[.]6 45[.]9[.]148[.]129:80 Miner pool 45[.]9[.]148[.]125:80 Miner pool http://www[.]minpop[.]com/sk12pack/idents.php Command and control http://www[.]minpop[.]com/sk12pack/names.php Command and control MITRE ATT&CK Matrix Tags Malware | APT & Targeted Attacks | Endpoints | IoT | Research | Network | [
{
"id": 23053,
"label": "SHA2",
"start_offset": 67,
"end_offset": 131
},
{
"id": 23054,
"label": "location",
"start_offset": 147,
"end_offset": 152
},
{
"id": 23055,
"label": "MD5",
"start_offset": 176,
"end_offset": 240
},
{
"id": 23056,
"label": "SHA1",
"start_offset": 274,
"end_offset": 338
},
{
"id": 23057,
"label": "location",
"start_offset": 339,
"end_offset": 343
},
{
"id": 23058,
"label": "SHA1",
"start_offset": 368,
"end_offset": 432
},
{
"id": 23059,
"label": "location",
"start_offset": 448,
"end_offset": 453
},
{
"id": 23060,
"label": "malware",
"start_offset": 454,
"end_offset": 463
},
{
"id": 23061,
"label": "SHA2",
"start_offset": 485,
"end_offset": 549
},
{
"id": 23062,
"label": "location",
"start_offset": 565,
"end_offset": 570
},
{
"id": 23063,
"label": "malware",
"start_offset": 571,
"end_offset": 580
},
{
"id": 23064,
"label": "IPV4",
"start_offset": 610,
"end_offset": 631
},
{
"id": 23065,
"label": "IPV4",
"start_offset": 633,
"end_offset": 652
},
{
"id": 23066,
"label": "location",
"start_offset": 681,
"end_offset": 686
},
{
"id": 23067,
"label": "location",
"start_offset": 687,
"end_offset": 691
},
{
"id": 23068,
"label": "location",
"start_offset": 721,
"end_offset": 726
},
{
"id": 23069,
"label": "location",
"start_offset": 727,
"end_offset": 731
},
{
"id": 23070,
"label": "URL",
"start_offset": 733,
"end_offset": 758
},
{
"id": 23071,
"label": "location",
"start_offset": 795,
"end_offset": 798
},
{
"id": 23072,
"label": "URL",
"start_offset": 808,
"end_offset": 833
},
{
"id": 23073,
"label": "location",
"start_offset": 870,
"end_offset": 873
},
{
"id": 23074,
"label": "location",
"start_offset": 930,
"end_offset": 933
}
] | [] | [] |
12,424 | The DLL is custom malware that would immediately begin communicating with actor-controlled C2 domains. | [] | [] | [] |
1,825 | We noted the unusual use of cmd.exe for execution of the file. | [
{
"id": 5374,
"label": "malware",
"start_offset": 28,
"end_offset": 35
}
] | [] | [] |
1,892 | The Bahamut Link Fake websites | [
{
"id": 5568,
"label": "threat-actor",
"start_offset": 4,
"end_offset": 11
}
] | [] | [] |
6,418 | X64 Brute Ratel C4 Samples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alicious DLLs: EA2876E9175410B6F6719F80EE44B9553960758C7D0F7BED73C0FE9A78D8E669 Malicious Encrypted Payloads: B5D1D3C1AEC2F2EF06E7D0B7996BC45DF4744934BD66266A6EBB02D70E35236E X.509 Cert SHA1s: 55684a30a47476fce5b42cbd59add4b0fbc776a3 66aab897e33b3e4d940c51eba8d07f5605d5b275 Infrastructure linked to X.509 Certs or Samples: 104.6.92[.]229 137.184.199[.]17 138.68.50[.]218 138.68.58[.]43 139.162.195[.]169 139.180.187[.]179 147.182.247[.]103 149.154.100[.]151 15.206.84[.]52 159.223.49[.]16 159.65.186[.]50 162.216.240[.]61 172.105.102[.]247 172.81.62[.]82 174.129.157[.]251 178.79.143[.]149 178.79.168[.]110 178.79.172[.]35 18.133.26[.]247 18.130.233[.]249 18.217.179[.]8 18.236.92[.]31 185.138.164[.]112 194.29.186[.]67 194.87.70[.]14 213.168.249[.]232 3.110.56[.]219 3.133.7[.]69 31.184.198[.]83 34.195.122[.]225 34.243.172[.]90 35.170.243[.]216 45.144.225[.]3 45.76.155[.]71 45.79.36[.]192 52.48.51[.]67 52.90.228[.]203 54.229.102[.]30 54.90.137[.]213 89.100.107[.]65 92.255.85[.]173 92.255.85[.]44 94.130.130[.]43 ds.windowsupdate.eu[.]org Hunting for APT29 Spear Phishing Using XDR - Palo Alto Networks Blog Cozy Smuggled Into The Box: APT29 Abusing Legitimate Software For Targeted Operations In Europe Trello From the Other Side: Tracking APT29 Phishing Campaigns New sophisticated email-based attack from NOBELIUM Updated July 6, 2022, at 9:30 a.m. PT. | [
{
"id": 19918,
"label": "SHA2",
"start_offset": 29,
"end_offset": 93
},
{
"id": 19919,
"label": "SHA2",
"start_offset": 94,
"end_offset": 158
},
{
"id": 19920,
"label": "SHA2",
"start_offset": 159,
"end_offset": 223
},
{
"id": 19921,
"label": "SHA2",
"start_offset": 224,
"end_offset": 288
},
{
"id": 19922,
"label": "SHA2",
"start_offset": 289,
"end_offset": 353
},
{
"id": 19923,
"label": "SHA2",
"start_offset": 354,
"end_offset": 418
},
{
"id": 19924,
"label": "SHA2",
"start_offset": 419,
"end_offset": 483
},
{
"id": 19925,
"label": "SHA2",
"start_offset": 484,
"end_offset": 548
},
{
"id": 19926,
"label": "SHA2",
"start_offset": 567,
"end_offset": 631
},
{
"id": 19927,
"label": "SHA2",
"start_offset": 664,
"end_offset": 728
},
{
"id": 19928,
"label": "MD5",
"start_offset": 749,
"end_offset": 789
},
{
"id": 19929,
"label": "SHA1",
"start_offset": 790,
"end_offset": 830
},
{
"id": 19930,
"label": "IPV4",
"start_offset": 882,
"end_offset": 896
},
{
"id": 19931,
"label": "IPV4",
"start_offset": 897,
"end_offset": 913
},
{
"id": 19932,
"label": "IPV4",
"start_offset": 914,
"end_offset": 929
},
{
"id": 19933,
"label": "IPV4",
"start_offset": 930,
"end_offset": 944
},
{
"id": 19934,
"label": "IPV4",
"start_offset": 945,
"end_offset": 962
},
{
"id": 19935,
"label": "IPV4",
"start_offset": 963,
"end_offset": 980
},
{
"id": 19936,
"label": "IPV4",
"start_offset": 981,
"end_offset": 998
},
{
"id": 19937,
"label": "IPV4",
"start_offset": 999,
"end_offset": 1016
},
{
"id": 19938,
"label": "IPV4",
"start_offset": 1017,
"end_offset": 1031
},
{
"id": 19939,
"label": "IPV4",
"start_offset": 1032,
"end_offset": 1047
},
{
"id": 19940,
"label": "IPV4",
"start_offset": 1048,
"end_offset": 1063
},
{
"id": 19941,
"label": "IPV4",
"start_offset": 1064,
"end_offset": 1080
},
{
"id": 19942,
"label": "IPV4",
"start_offset": 1081,
"end_offset": 1098
},
{
"id": 19943,
"label": "IPV4",
"start_offset": 1099,
"end_offset": 1113
},
{
"id": 19944,
"label": "IPV4",
"start_offset": 1114,
"end_offset": 1131
},
{
"id": 19945,
"label": "IPV4",
"start_offset": 1132,
"end_offset": 1148
},
{
"id": 19946,
"label": "IPV4",
"start_offset": 1149,
"end_offset": 1165
},
{
"id": 19947,
"label": "IPV4",
"start_offset": 1166,
"end_offset": 1181
},
{
"id": 19948,
"label": "IPV4",
"start_offset": 1182,
"end_offset": 1197
},
{
"id": 19949,
"label": "IPV4",
"start_offset": 1198,
"end_offset": 1214
},
{
"id": 19950,
"label": "IPV4",
"start_offset": 1215,
"end_offset": 1229
},
{
"id": 19951,
"label": "IPV4",
"start_offset": 1230,
"end_offset": 1244
},
{
"id": 19952,
"label": "IPV4",
"start_offset": 1245,
"end_offset": 1262
},
{
"id": 19953,
"label": "IPV4",
"start_offset": 1263,
"end_offset": 1278
},
{
"id": 19954,
"label": "IPV4",
"start_offset": 1279,
"end_offset": 1293
},
{
"id": 19955,
"label": "IPV4",
"start_offset": 1294,
"end_offset": 1311
},
{
"id": 19956,
"label": "IPV4",
"start_offset": 1312,
"end_offset": 1326
},
{
"id": 19957,
"label": "IPV4",
"start_offset": 1327,
"end_offset": 1339
},
{
"id": 19958,
"label": "IPV4",
"start_offset": 1340,
"end_offset": 1355
},
{
"id": 19959,
"label": "IPV4",
"start_offset": 1356,
"end_offset": 1372
},
{
"id": 19960,
"label": "IPV4",
"start_offset": 1373,
"end_offset": 1388
},
{
"id": 19961,
"label": "IPV4",
"start_offset": 1389,
"end_offset": 1405
},
{
"id": 19962,
"label": "IPV4",
"start_offset": 1406,
"end_offset": 1420
},
{
"id": 19963,
"label": "IPV4",
"start_offset": 1421,
"end_offset": 1435
},
{
"id": 19964,
"label": "IPV4",
"start_offset": 1436,
"end_offset": 1450
},
{
"id": 19965,
"label": "IPV4",
"start_offset": 1451,
"end_offset": 1464
},
{
"id": 19966,
"label": "IPV4",
"start_offset": 1465,
"end_offset": 1480
},
{
"id": 19967,
"label": "IPV4",
"start_offset": 1481,
"end_offset": 1496
},
{
"id": 19968,
"label": "IPV4",
"start_offset": 1497,
"end_offset": 1512
},
{
"id": 19969,
"label": "IPV4",
"start_offset": 1513,
"end_offset": 1528
},
{
"id": 19970,
"label": "IPV4",
"start_offset": 1529,
"end_offset": 1544
},
{
"id": 19971,
"label": "IPV4",
"start_offset": 1545,
"end_offset": 1559
},
{
"id": 19972,
"label": "IPV4",
"start_offset": 1560,
"end_offset": 1575
},
{
"id": 19974,
"label": "location",
"start_offset": 1603,
"end_offset": 1610
},
{
"id": 19975,
"label": "threat-actor",
"start_offset": 1615,
"end_offset": 1620
},
{
"id": 19976,
"label": "attack-pattern",
"start_offset": 1621,
"end_offset": 1635
},
{
"id": 19977,
"label": "identity",
"start_offset": 1648,
"end_offset": 1666
},
{
"id": 19978,
"label": "threat-actor",
"start_offset": 1700,
"end_offset": 1705
},
{
"id": 19979,
"label": "location",
"start_offset": 1761,
"end_offset": 1767
},
{
"id": 19980,
"label": "threat-actor",
"start_offset": 1805,
"end_offset": 1810
},
{
"id": 19981,
"label": "attack-pattern",
"start_offset": 1811,
"end_offset": 1819
},
{
"id": 19984,
"label": "TIME",
"start_offset": 1907,
"end_offset": 1919
}
] | [] | [] |
7,374 | head -n 1 cat /proc/cpuinfo | grep name | | [] | [] | [] |
2,407 | Affected Software and Versions Background on the Spring Framework Root Cause Analysis for CVE-2022-22965 | [
{
"id": 47486,
"label": "vulnerability",
"start_offset": 90,
"end_offset": 104
},
{
"id": 47485,
"label": "SOFTWARE",
"start_offset": 49,
"end_offset": 65
}
] | [
{
"id": 335,
"from_id": 47485,
"to_id": 47486,
"type": "has"
}
] | [] |
8,257 | Once the multiple layers of script obfuscation are removed, the final payload arrives—a version of the njRAT Trojan; this family has been a known threat since 2015. | [
{
"id": 25496,
"label": "location",
"start_offset": 47,
"end_offset": 50
},
{
"id": 25497,
"label": "malware",
"start_offset": 103,
"end_offset": 108
}
] | [] | [] |
13,902 | It is the last step before the ransomware is dropped, and the attack often speeds up at this point to complete the process before it is stopped. | [] | [] | [] |
3,208 | Figure 9. | [] | [] | [] |
6,051 | We did not recover any responses from those URLs. | [] | [] | [] |
1,679 | We hope this tool will be valuable to incident responders and others who are plagued by NetWire infections. | [
{
"id": 4985,
"label": "malware",
"start_offset": 88,
"end_offset": 95
}
] | [] | [] |
8,583 | We warn users when we suspect a government-backed threat like APT35 is targeting them. | [
{
"id": 26532,
"label": "threat-actor",
"start_offset": 62,
"end_offset": 67
},
{
"id": 26533,
"label": "location",
"start_offset": 81,
"end_offset": 85
}
] | [] | [] |
14,089 | Note the following similarities: The usage of paths C:\Users and D:\ are similar The searching patterns are very similar The extension list is very similar | [
{
"id": 48171,
"label": "FILEPATH",
"start_offset": 66,
"end_offset": 69
},
{
"id": 48170,
"label": "FILEPATH",
"start_offset": 53,
"end_offset": 61
}
] | [] | [] |
10,493 | Related IOCs | [] | [] | [] |
10,381 | The user would need to enable macro for it to open fully, which would use AutoHotkey in loading the malicious script file to avoid detection. | [] | [] | [] |
2,978 | You may consider configuring it to not broadcast the SSID as well: that can make adding devices a little harder, but that means it’s even harder for people to try and join your home network. 3. Set up More Secure Accounts on Your PCs and Macs: PCs and Macs (both desktop and laptop) are still around and as important as ever in the home. | [] | [] | [] |
2,417 | For example, there is a simple classical application scenario in which the developer creates a trade object to capture request parameters as shown in Figure 1. | [] | [] | [] |
8,234 | As such, here are some tips on how to stay safe from these online schemes: Carefully scrutinize all emails. | [
{
"id": 25443,
"label": "location",
"start_offset": 14,
"end_offset": 17
},
{
"id": 25444,
"label": "threat-actor",
"start_offset": 43,
"end_offset": 47
}
] | [] | [] |
13,179 | USBferry attack scenario, version UF1.0 20160226 | [
{
"id": 41125,
"label": "malware",
"start_offset": 0,
"end_offset": 8
}
] | [] | [] |
10,020 | (rcview40u.dll) | [] | [] | [] |
470 | DGA by itself can’t harm you. | [] | [] | [] |
9,573 | Accept-Encoding: gzip Connection: Keep-Alive | [] | [] | [] |
2,376 | StealthVector is designed with various configurable features that make it easy for malicious actors to modify and tailor it to their needs, including a feature that disables Event Tracing for Windows (ETW), allowing the malware to run in stealth mode. | [
{
"id": 45481,
"label": "malware",
"start_offset": 0,
"end_offset": 13
}
] | [] | [] |
5,476 | Figure 1: Tweety Chat’s interface (top), and code snippets showing the file types it steals (bottom) Romance in cyberespionage | [
{
"id": 51468,
"label": "SOFTWARE",
"start_offset": 10,
"end_offset": 16
}
] | [] | [] |
6,557 | hack520[.]co[.]kr shaiya[.]kr zhu[.]kr shenqi[.]kr zhuxian[.]kr Several of these domains are linked to variants of malware that were used by the Winnti threat actor. | [
{
"id": 20316,
"label": "location",
"start_offset": 91,
"end_offset": 94
},
{
"id": 20317,
"label": "malware",
"start_offset": 147,
"end_offset": 153
}
] | [] | [] |
3,884 | Last June 9, 2021, the Cybersecurity and Infrastructure Security Agency (CISA) released the Rising Ransomware Threat to OT Assets, which addresses the recent rise in ransomware attacks targeting operational assets (OT) and control systems. | [
{
"id": 49744,
"label": "TIME",
"start_offset": 5,
"end_offset": 17
},
{
"id": 49745,
"label": "identity",
"start_offset": 23,
"end_offset": 78
}
] | [] | [] |
14,419 | Including detection of this as part of an overall XDR platform will improve the prevention, detection, and remediation of sophisticated attacks on an organization. | [
{
"id": 47173,
"label": "SOFTWARE",
"start_offset": 50,
"end_offset": 54
}
] | [] | [] |
3,930 | To deploy its tools, it uses the expand command to extract package files dropped in the system. | [] | [] | [] |
770 | If we were able to make the size of the current heap block in this structure larger than the threshold of 0x186A0 bytes and trigger CMemoryProtector::ProtectedFree, it is still possible to force a true freeing action and occupy the freed object with other data as we show in the following piece of javascript code in figure 6. Figure 6. Javascript proof of concept to force freeing When creating the anchor element, the debug logs are shown in figure 7. | [
{
"id": 46347,
"label": "SOFTWARE",
"start_offset": 340,
"end_offset": 350
}
] | [] | [] |
5,810 | And you just have computers fighting it out. | [
{
"id": 17969,
"label": "location",
"start_offset": 0,
"end_offset": 3
},
{
"id": 17970,
"label": "identity",
"start_offset": 8,
"end_offset": 12
}
] | [] | [] |
6,052 | Example Exploit Kit: | [] | [] | [] |
2,231 | Persistence is achieved by setting the following registry key: HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run The name of the registry key in the above instances is derived from the basename of the supplied argument. | [
{
"id": 6650,
"label": "REGISTRYKEY",
"start_offset": 64,
"end_offset": 114
},
{
"id": 6651,
"label": "REGISTRYKEY",
"start_offset": 116,
"end_offset": 166
}
] | [] | [] |
771 | The address of the anchor element is 0x0c3b3f98. | [] | [] | [] |
11,767 | A few were observed displaying a fake error message requiring user click-through to continue execution. | [] | [] | [] |
14,293 | When users register, their credit cards will be charged. | [] | [] | [] |
1,168 | While the research may never result in a fully automated decision system, it has been proven that researchers employing a hybrid approach to analysis will be able to provide critical and timely information to support the continual improvement of the classification system as a whole. | [] | [] | [] |
1,545 | These attacks begin with an email sent to a carefully chosen target in the agency. | [] | [] | [] |
4,682 | When they are received, the browser navigates to the official Takeout link to request and eventually download the exported data. | [] | [] | [] |
4,813 | This app is quite different from the Turla apps described above and written by a different developer. | [
{
"id": 50736,
"label": "threat-actor",
"start_offset": 37,
"end_offset": 42
}
] | [] | [] |
7,979 | Since late 2019, our team has disrupted financially motivated phishing campaigns targeting YouTubers with Cookie Theft malware. | [
{
"id": 24726,
"label": "attack-pattern",
"start_offset": 62,
"end_offset": 70
}
] | [] | [] |
7,326 | idtpl[.]org registration information based on Whois Lookup But from the middle of July 2020, its IP address changed to 185[.]117[.]88[.]91. Figure 22. Domain History of idtpl[.]org as seen on VirusTotal | [
{
"id": 22803,
"label": "IPV4",
"start_offset": 123,
"end_offset": 142
}
] | [] | [] |
2,502 | gdGCT.jsp | [
{
"id": 45552,
"label": "FILEPATH",
"start_offset": 0,
"end_offset": 9
}
] | [] | [] |
516 | Figure 2 shows a completely different result from Figure 1 and stems from only counting ransomware samples from cases in which more than five hosts were infected with the same malware. | [] | [] | [] |
3,673 | Initial Access | [] | [] | [] |
4,519 | We have also built additional tools to prevent successful attacks on devices that run Android once those devices are in users’ hands. | [
{
"id": 50317,
"label": "SOFTWARE",
"start_offset": 86,
"end_offset": 93
}
] | [] | [] |
1,616 | If the user would like to unsubscribe they can text “BAJA” to 797977. | [] | [] | [] |
9,502 | The infection starts with an executable written in C++ that connects through a Winsock API to a domain or IP address in a specific port. | [] | [] | [] |
5,192 | Network amplification CVE-2021-38445 OpenDDS, ROS 2 7.0 CWE-130: Improper handling of length CVE-2021-38423 Gurum DDS, ROS 2 8.6 CWE-131: Incorrect calculation of buffer size CVE-2021-38435 Connext DDS, ROS 2 8.6 CVE-2021-38439 Gurum DDS, ROS 2 8.6 CWE-122: | [
{
"id": 51240,
"label": "vulnerability",
"start_offset": 22,
"end_offset": 36
},
{
"id": 51241,
"label": "vulnerability",
"start_offset": 93,
"end_offset": 107
},
{
"id": 51242,
"label": "vulnerability",
"start_offset": 175,
"end_offset": 189
},
{
"id": 51243,
"label": "vulnerability",
"start_offset": 213,
"end_offset": 227
}
] | [] | [] |
14,353 | It was in April 2017 when the last Windows variant of Maikspy appeared with the following changes: The C&C server was changed to 198[.]12[.]155[.]84, password theft is added, as well as the theft of .doc, .docx, and .rtf files. | [
{
"id": 51794,
"label": "TIME",
"start_offset": 10,
"end_offset": 20
},
{
"id": 51795,
"label": "malware",
"start_offset": 54,
"end_offset": 61
},
{
"id": 44340,
"label": "IPV4",
"start_offset": 129,
"end_offset": 148
}
] | [] | [] |
5,635 | Figure 6. | [] | [] | [] |
8,295 | Indicators of CompromiseFiles with the following hashes were used in the first series of attacks: cd8329f75b1393ead3e16c6c79ee1ab476e6487370481e5931feb63305f00983 – detected as VBS_KEYLOG.NYKW f46f0e8eed0361294200d64e87b3fb13f6a3797f99f5b588444534f27612a590 – archive file; | [
{
"id": 25565,
"label": "SHA1",
"start_offset": 99,
"end_offset": 163
},
{
"id": 25566,
"label": "MD5",
"start_offset": 194,
"end_offset": 258
}
] | [] | [] |
4,265 | One file stealer (cca74bb322ad7833a21209b1418c9837e30983daec30d199a839f46075ee72f2, Detected as TSPY_DELF.SUW) published by security researchers in 2013 and linked to the domain myflatnet[.]com, was attributed by several parties to the Hangover group. | [
{
"id": 50067,
"label": "threat-actor",
"start_offset": 236,
"end_offset": 250
},
{
"id": 50063,
"label": "SHA2",
"start_offset": 18,
"end_offset": 82
},
{
"id": 50064,
"label": "malware",
"start_offset": 96,
"end_offset": 109
},
{
"id": 50065,
"label": "TIME",
"start_offset": 148,
"end_offset": 152
},
{
"id": 50066,
"label": "DOMAIN",
"start_offset": 178,
"end_offset": 193
}
] | [
{
"id": 911,
"from_id": 50063,
"to_id": 50064,
"type": "indicates"
},
{
"id": 912,
"from_id": 50064,
"to_id": 50066,
"type": "communicates-with"
},
{
"id": 913,
"from_id": 50064,
"to_id": 50067,
"type": "attributed-to"
}
] | [] |
1,135 | This malware is well documented as a powerful polymorphic worm that encrypts itself differently every time it propagates. | [] | [] | [] |
8,431 | Safe Browsing also notifies webmasters when their websites are compromised by malicious actors and helps them diagnose and resolve the problem so that their visitors stay safer. | [
{
"id": 25979,
"label": "threat-actor",
"start_offset": 28,
"end_offset": 38
},
{
"id": 25980,
"label": "location",
"start_offset": 59,
"end_offset": 62
},
{
"id": 25981,
"label": "location",
"start_offset": 95,
"end_offset": 98
},
{
"id": 25982,
"label": "location",
"start_offset": 105,
"end_offset": 109
},
{
"id": 25983,
"label": "location",
"start_offset": 119,
"end_offset": 122
}
] | [] | [] |
11,888 | Unique URLs serving CVE-2021-33742 Internet Explorer exploit: http://lioiamcount[.]com/IsnoMLgankYg6/EjlYIy7cdFZFeyFqE4IURS1 http://db-control-uplink[.]com/eFe1J00hISDe9Zw/gzHvIOlHpIXB http://kidone[.]xyz/VvE0yYArmvhyTl/GzV | [
{
"id": 36639,
"label": "URL",
"start_offset": 64,
"end_offset": 88
},
{
"id": 36640,
"label": "URL",
"start_offset": 127,
"end_offset": 136
},
{
"id": 36641,
"label": "URL",
"start_offset": 187,
"end_offset": 206
}
] | [] | [] |