id
int64
1
14.4k
text
stringlengths
3
5.01k
entities
list
relations
list
Comments
list
5,257
Timestamps indicate that the earliest sample was signed on June 2015; the latest variant was signed on May 2017.
[ { "id": 51296, "label": "TIME", "start_offset": 59, "end_offset": 68 }, { "id": 51297, "label": "TIME", "start_offset": 103, "end_offset": 111 } ]
[]
[]
1,731
Attackers can gain access to your personal and financial information.
[]
[]
[]
1,675
The user needs to know the IP of the infected client, the port used by malware and the encryption password to properly decode the traffic.
[]
[]
[]
9,960
They carried this out by first stealing the company’s certificate then using it to sign the malware.
[]
[]
[]
4,736
The growth of commercial spyware vendors and hack-for-hire groups has necessitated growth in TAG to counter these threats.
[ { "id": 50648, "label": "identity", "start_offset": 93, "end_offset": 96 } ]
[]
[]
4,445
It was last updated on July 29, 2022.
[ { "id": 50219, "label": "TIME", "start_offset": 23, "end_offset": 36 } ]
[]
[]
4,198
OS Credential Dumping: Credentials in Registry Lateral Movement T1021.002
[ { "id": 50004, "label": "attack-pattern", "start_offset": 0, "end_offset": 73 } ]
[]
[]
10,656
Vulnerabilities of Apache HTTP Server have increased since 2017 Open-source web servers, especially Apache HTTP Server, have been heavily exploited in the past five years.
[ { "id": 32529, "label": "attack-pattern", "start_offset": 69, "end_offset": 75 } ]
[]
[]
6,952
Figure 9.
[]
[]
[]
6,115
The PlugX sample in Table 3 also uses the legitimate PixelPlus Co., Ltd certificate and was also targeted against the university.
[ { "id": 18910, "label": "tools", "start_offset": 4, "end_offset": 9 }, { "id": 18911, "label": "location", "start_offset": 10, "end_offset": 16 }, { "id": 18914, "label": "location", "start_offset": 84, "end_offset": 87 }, { "id": 18915, "label": "location", "start_offset": 118, "end_offset": 128 } ]
[]
[]
3,410
BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A ba44c22a3224c3a201202b69d86df2a78f0cd1d4ac1119eb29cae33f09027a9a Silverlight2.exe
[ { "id": 10289, "label": "malware", "start_offset": 0, "end_offset": 11 }, { "id": 10290, "label": "SHA2", "start_offset": 46, "end_offset": 110 }, { "id": 49090, "label": "malware", "start_offset": 20, "end_offset": 44 }, { "id": 49091, "label": "FILEPATH", "start_offset": 112, "end_offset": 128 } ]
[ { "id": 681, "from_id": 10289, "to_id": 49090, "type": "duplicate-of" }, { "id": 682, "from_id": 49091, "to_id": 10290, "type": "duplicate-of" }, { "id": 683, "from_id": 49091, "to_id": 49090, "type": "indicates" }, { "id": 684, "from_id": 10290, "to_id": 49090, "type": "indicates" } ]
[]
14,243
We mapped Winnti’s activities for this campaign by analyzing the dates exposed in GitHub.
[ { "id": 48437, "label": "identity", "start_offset": 10, "end_offset": 16 }, { "id": 48438, "label": "SOFTWARE", "start_offset": 82, "end_offset": 88 } ]
[]
[]
14,308
Setup.exe is the core module used to steal data.
[ { "id": 48529, "label": "FILEPATH", "start_offset": 0, "end_offset": 9 } ]
[]
[]
7,166
This research is done in cooperation with IssueMakersLab of South Korea.
[]
[]
[]
2,103
This post is also available in: 日本語 (Japanese) A recent vulnerability in the Kerberos authentication protocol, CVE-2020-17049 (dubbed Bronze Bit), has been disclosed by Microsoft.
[ { "id": 45392, "label": "identity", "start_offset": 175, "end_offset": 184 }, { "id": 45390, "label": "vulnerability", "start_offset": 117, "end_offset": 131 }, { "id": 45393, "label": "SOFTWARE", "start_offset": 83, "end_offset": 91 }, { "id": 45391, "label": "vulnerability", "start_offset": 140, "end_offset": 150 } ]
[ { "id": 95, "from_id": 45391, "to_id": 45390, "type": "duplicate-of" } ]
[]
1,839
Searching for processes We found that aswArPot.sys, registered as aswSP_ArPot2 as a service, is used as the handle for the following DeviceIoControl call.
[ { "id": 45144, "label": "FILEPATH", "start_offset": 42, "end_offset": 54 } ]
[]
[]
13,384
Attacker Owned Domains:
[]
[]
[]
2,499
Palo Alto Networks Cortex XSOAR customers can leverage the "Spring Core and Cloud Function SpEL RCEs" pack to automatically detect and mitigate the vulnerabilities.
[ { "id": 47597, "label": "vulnerability", "start_offset": 61, "end_offset": 101 }, { "id": 47596, "label": "SOFTWARE", "start_offset": 1, "end_offset": 32 } ]
[]
[]
5,445
But, mobile banking use is picking up around the globe.
[]
[]
[]
7,026
SysUpdate was first described by the NCC Group in 2018.
[ { "id": 22036, "label": "malware", "start_offset": 0, "end_offset": 9 } ]
[]
[]
13,699
Confirm requests using other channels.
[]
[]
[]
6,345
Figure 9 is a screenshot of the default Windows File Explorer; “show hidden files” is not checked.
[]
[]
[]
9,384
We also conclude that this is the initial phase of an attack based on the following reasons: CallerSpy, as it is now, could prove uneven for a targeted attack.
[]
[]
[]
1,358
Later that day, a public PoC surfaced, allowing organizations to better understand this vulnerability and how it is exploited.
[ { "id": 4075, "label": "TIME", "start_offset": 0, "end_offset": 14 } ]
[]
[]
2,464
However, in many cases the filename had an extension that would not support a webshell, such as .js and .txt, which we believe was used just to mark the presence of a successful file upload as part of vulnerable server discovery efforts.
[]
[]
[]
4,559
In this case, the Android app name was stopwar.apk (com.ddos.stopwar) and was distributed from the website stopwar.pro.
[ { "id": 50373, "label": "SOFTWARE", "start_offset": 18, "end_offset": 25 }, { "id": 50375, "label": "malware", "start_offset": 52, "end_offset": 68 }, { "id": 50376, "label": "DOMAIN", "start_offset": 107, "end_offset": 118 }, { "id": 50374, "label": "malware", "start_offset": 39, "end_offset": 50 } ]
[]
[]
7,709
The newer version shows that the developers behind ServHelper continued to upgrade it to evade detection and add more functions, possibly for even more iterations in the future.
[ { "id": 23958, "label": "malware", "start_offset": 52, "end_offset": 62 }, { "id": 23959, "label": "location", "start_offset": 106, "end_offset": 109 } ]
[]
[]
6,636
https://unit42.paloaltonetworks.com/unit42-new-threat-actor-group-darkhydrus-targets-middle-east-government/ https://unit42.paloaltonetworks.com/unit42-darkhydrus-uses-phishery-harvest-credentials-middle-east/ https://unit42.paloaltonetworks.com/darkhydrus-delivers-new-trojan-that-can-use-google-drive-for-c2-communications/
[]
[]
[]
13,280
Snapshot of code we used to decrypt TClient’s configuration Figure 11.
[ { "id": 41375, "label": "malware", "start_offset": 36, "end_offset": 43 } ]
[]
[]
11,796
Although Play Store users were protected, we are highlighting the app here as TAG has seen APT35 attempt to distribute this spyware on other platforms as recently as July 2021.
[ { "id": 36377, "label": "location", "start_offset": 45, "end_offset": 48 }, { "id": 36378, "label": "threat-actor", "start_offset": 91, "end_offset": 96 } ]
[]
[]
4,423
x.TextContent.StartsWith("Access for less secure apps has been turned on") select x).ToList
[]
[]
[]
3,390
test4.exe BIOPASS RAT Loader Backdoor.Win32.BIOPASS.A 3589e53c59d9807cca709387bbcaaffc7e24e15d9a78425b717fc55c779b928e
[ { "id": 10240, "label": "malware", "start_offset": 11, "end_offset": 22 }, { "id": 10241, "label": "SHA2", "start_offset": 57, "end_offset": 121 }, { "id": 49042, "label": "FILEPATH", "start_offset": 0, "end_offset": 9 }, { "id": 49043, "label": "malware", "start_offset": 31, "end_offset": 55 } ]
[ { "id": 592, "from_id": 49042, "to_id": 49043, "type": "indicates" }, { "id": 593, "from_id": 10241, "to_id": 49043, "type": "indicates" }, { "id": 594, "from_id": 10240, "to_id": 49043, "type": "duplicate-of" }, { "id": 595, "from_id": 49042, "to_id": 10241, "type": "duplicate-of" } ]
[]
1,151
And “jh” is always followed by a key from the left side of the keyboard.
[]
[]
[]
2,210
This leads us to the next stage of our malware This particular stage of malware acts as a downloader.
[]
[]
[]
10,937
Conclusion
[]
[]
[]
9,782
It is important that employers and employees across all organizations and enterprises be able to identify phishing attacks and distinguish legitimate emails from malicious ones.
[ { "id": 29795, "label": "location", "start_offset": 31, "end_offset": 34 }, { "id": 29796, "label": "location", "start_offset": 70, "end_offset": 73 }, { "id": 29797, "label": "attack-pattern", "start_offset": 106, "end_offset": 114 }, { "id": 29798, "label": "location", "start_offset": 123, "end_offset": 126 } ]
[]
[]
9,472
This is the main client binary written in C++, which is the last stage of PuppetLoader’s infection chain.
[ { "id": 29101, "label": "malware", "start_offset": 74, "end_offset": 86 } ]
[]
[]
1,020
Other sellers were also able to offer customizable email accounts from a specific domain/institution.
[]
[]
[]
6,955
Figure 10.
[]
[]
[]
2,755
vulnerable this is a test
[]
[]
[]
1,526
Similar to any other malware family or threat, Palo Alto Networks customers should use the entire security framework for threat mitigation and threat prevention coverage. Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!
[ { "id": 46788, "label": "identity", "start_offset": 48, "end_offset": 66 } ]
[]
[]
13,556
This campaign appears to be financially motivated.
[]
[]
[]
4,094
All data will then be encrypted and sent back. Figure 8.
[]
[]
[]
13,990
Tags Cloud | APT & Targeted Attacks | Expert Perspective | Articles, News, Reports | Cyber Threats
[]
[]
[]
7,418
Indicators of Compromise (IoCs) SHA256 Description Detection Name 1800de5f0fb7c5ef3c0d9787260ed61bc324d861bc92d9673d4737d1421972aa Cryptocurrency miner Trojan.SH.MALXMR.UWEJP b68bd3a54622792200b931ee5eebf860acf8b24f4b338b5080193573a81c747d Shellbot Backdoor.SH.SHELLBOT.AA 620635aa9685249c87ead1bb0ad25b096714a0073cfd38a615c5eb63c3761976 Tool Trojan.Linux.SSHBRUTE.B fc57bd66c27066104cd6f8962cd463a5dfc05fa59b76b6958cddd3542dfe6a9a Cryptocurrency miner Coinminer.Linux.MALXMR.SMDSL32 649280bd4c5168009c1cff30e5e1628bcf300122b49d339e3ea3f3b6ff8f9a79 Cryptocurrency miner Coinminer.Linux.MALXMR.SMDSL64 URLs 159[.]203[.]141[.]208 104[.]236[.]192[.]6 45[.]9[.]148[.]129:80 Miner pool 45[.]9[.]148[.]125:80 Miner pool http://www[.]minpop[.]com/sk12pack/idents.php Command and control http://www[.]minpop[.]com/sk12pack/names.php Command and control MITRE ATT&CK Matrix Tags Malware | APT & Targeted Attacks | Endpoints | IoT | Research | Network
[ { "id": 23053, "label": "SHA2", "start_offset": 67, "end_offset": 131 }, { "id": 23054, "label": "location", "start_offset": 147, "end_offset": 152 }, { "id": 23055, "label": "MD5", "start_offset": 176, "end_offset": 240 }, { "id": 23056, "label": "SHA1", "start_offset": 274, "end_offset": 338 }, { "id": 23057, "label": "location", "start_offset": 339, "end_offset": 343 }, { "id": 23058, "label": "SHA1", "start_offset": 368, "end_offset": 432 }, { "id": 23059, "label": "location", "start_offset": 448, "end_offset": 453 }, { "id": 23060, "label": "malware", "start_offset": 454, "end_offset": 463 }, { "id": 23061, "label": "SHA2", "start_offset": 485, "end_offset": 549 }, { "id": 23062, "label": "location", "start_offset": 565, "end_offset": 570 }, { "id": 23063, "label": "malware", "start_offset": 571, "end_offset": 580 }, { "id": 23064, "label": "IPV4", "start_offset": 610, "end_offset": 631 }, { "id": 23065, "label": "IPV4", "start_offset": 633, "end_offset": 652 }, { "id": 23066, "label": "location", "start_offset": 681, "end_offset": 686 }, { "id": 23067, "label": "location", "start_offset": 687, "end_offset": 691 }, { "id": 23068, "label": "location", "start_offset": 721, "end_offset": 726 }, { "id": 23069, "label": "location", "start_offset": 727, "end_offset": 731 }, { "id": 23070, "label": "URL", "start_offset": 733, "end_offset": 758 }, { "id": 23071, "label": "location", "start_offset": 795, "end_offset": 798 }, { "id": 23072, "label": "URL", "start_offset": 808, "end_offset": 833 }, { "id": 23073, "label": "location", "start_offset": 870, "end_offset": 873 }, { "id": 23074, "label": "location", "start_offset": 930, "end_offset": 933 } ]
[]
[]
12,424
The DLL is custom malware that would immediately begin communicating with actor-controlled C2 domains.
[]
[]
[]
1,825
We noted the unusual use of cmd.exe for execution of the file.
[ { "id": 5374, "label": "malware", "start_offset": 28, "end_offset": 35 } ]
[]
[]
1,892
The Bahamut Link Fake websites
[ { "id": 5568, "label": "threat-actor", "start_offset": 4, "end_offset": 11 } ]
[]
[]
6,418
X64 Brute Ratel C4 Samples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alicious DLLs: EA2876E9175410B6F6719F80EE44B9553960758C7D0F7BED73C0FE9A78D8E669 Malicious Encrypted Payloads: B5D1D3C1AEC2F2EF06E7D0B7996BC45DF4744934BD66266A6EBB02D70E35236E X.509 Cert SHA1s: 55684a30a47476fce5b42cbd59add4b0fbc776a3 66aab897e33b3e4d940c51eba8d07f5605d5b275 Infrastructure linked to X.509 Certs or Samples: 104.6.92[.]229 137.184.199[.]17 138.68.50[.]218 138.68.58[.]43 139.162.195[.]169 139.180.187[.]179 147.182.247[.]103 149.154.100[.]151 15.206.84[.]52 159.223.49[.]16 159.65.186[.]50 162.216.240[.]61 172.105.102[.]247 172.81.62[.]82 174.129.157[.]251 178.79.143[.]149 178.79.168[.]110 178.79.172[.]35 18.133.26[.]247 18.130.233[.]249 18.217.179[.]8 18.236.92[.]31 185.138.164[.]112 194.29.186[.]67 194.87.70[.]14 213.168.249[.]232 3.110.56[.]219 3.133.7[.]69 31.184.198[.]83 34.195.122[.]225 34.243.172[.]90 35.170.243[.]216 45.144.225[.]3 45.76.155[.]71 45.79.36[.]192 52.48.51[.]67 52.90.228[.]203 54.229.102[.]30 54.90.137[.]213 89.100.107[.]65 92.255.85[.]173 92.255.85[.]44 94.130.130[.]43 ds.windowsupdate.eu[.]org Hunting for APT29 Spear Phishing Using XDR - Palo Alto Networks Blog Cozy Smuggled Into The Box: APT29 Abusing Legitimate Software For Targeted Operations In Europe Trello From the Other Side: Tracking APT29 Phishing Campaigns New sophisticated email-based attack from NOBELIUM Updated July 6, 2022, at 9:30 a.m. PT.
[ { "id": 19918, "label": "SHA2", "start_offset": 29, "end_offset": 93 }, { "id": 19919, "label": "SHA2", "start_offset": 94, "end_offset": 158 }, { "id": 19920, "label": "SHA2", "start_offset": 159, "end_offset": 223 }, { "id": 19921, "label": "SHA2", "start_offset": 224, "end_offset": 288 }, { "id": 19922, "label": "SHA2", "start_offset": 289, "end_offset": 353 }, { "id": 19923, "label": "SHA2", "start_offset": 354, "end_offset": 418 }, { "id": 19924, "label": "SHA2", "start_offset": 419, "end_offset": 483 }, { "id": 19925, "label": "SHA2", "start_offset": 484, "end_offset": 548 }, { "id": 19926, "label": "SHA2", "start_offset": 567, "end_offset": 631 }, { "id": 19927, "label": "SHA2", "start_offset": 664, "end_offset": 728 }, { "id": 19928, "label": "MD5", "start_offset": 749, "end_offset": 789 }, { "id": 19929, "label": "SHA1", "start_offset": 790, "end_offset": 830 }, { "id": 19930, "label": "IPV4", "start_offset": 882, "end_offset": 896 }, { "id": 19931, "label": "IPV4", "start_offset": 897, "end_offset": 913 }, { "id": 19932, "label": "IPV4", "start_offset": 914, "end_offset": 929 }, { "id": 19933, "label": "IPV4", "start_offset": 930, "end_offset": 944 }, { "id": 19934, "label": "IPV4", "start_offset": 945, "end_offset": 962 }, { "id": 19935, "label": "IPV4", "start_offset": 963, "end_offset": 980 }, { "id": 19936, "label": "IPV4", "start_offset": 981, "end_offset": 998 }, { "id": 19937, "label": "IPV4", "start_offset": 999, "end_offset": 1016 }, { "id": 19938, "label": "IPV4", "start_offset": 1017, "end_offset": 1031 }, { "id": 19939, "label": "IPV4", "start_offset": 1032, "end_offset": 1047 }, { "id": 19940, "label": "IPV4", "start_offset": 1048, "end_offset": 1063 }, { "id": 19941, "label": "IPV4", "start_offset": 1064, "end_offset": 1080 }, { "id": 19942, "label": "IPV4", "start_offset": 1081, "end_offset": 1098 }, { "id": 19943, "label": "IPV4", "start_offset": 1099, "end_offset": 1113 }, { "id": 19944, "label": "IPV4", "start_offset": 1114, "end_offset": 1131 }, { "id": 19945, "label": "IPV4", "start_offset": 1132, "end_offset": 1148 }, { "id": 19946, "label": "IPV4", "start_offset": 1149, "end_offset": 1165 }, { "id": 19947, "label": "IPV4", "start_offset": 1166, "end_offset": 1181 }, { "id": 19948, "label": "IPV4", "start_offset": 1182, "end_offset": 1197 }, { "id": 19949, "label": "IPV4", "start_offset": 1198, "end_offset": 1214 }, { "id": 19950, "label": "IPV4", "start_offset": 1215, "end_offset": 1229 }, { "id": 19951, "label": "IPV4", "start_offset": 1230, "end_offset": 1244 }, { "id": 19952, "label": "IPV4", "start_offset": 1245, "end_offset": 1262 }, { "id": 19953, "label": "IPV4", "start_offset": 1263, "end_offset": 1278 }, { "id": 19954, "label": "IPV4", "start_offset": 1279, "end_offset": 1293 }, { "id": 19955, "label": "IPV4", "start_offset": 1294, "end_offset": 1311 }, { "id": 19956, "label": "IPV4", "start_offset": 1312, "end_offset": 1326 }, { "id": 19957, "label": "IPV4", "start_offset": 1327, "end_offset": 1339 }, { "id": 19958, "label": "IPV4", "start_offset": 1340, "end_offset": 1355 }, { "id": 19959, "label": "IPV4", "start_offset": 1356, "end_offset": 1372 }, { "id": 19960, "label": "IPV4", "start_offset": 1373, "end_offset": 1388 }, { "id": 19961, "label": "IPV4", "start_offset": 1389, "end_offset": 1405 }, { "id": 19962, "label": "IPV4", "start_offset": 1406, "end_offset": 1420 }, { "id": 19963, "label": "IPV4", "start_offset": 1421, "end_offset": 1435 }, { "id": 19964, "label": "IPV4", "start_offset": 1436, "end_offset": 1450 }, { "id": 19965, "label": "IPV4", "start_offset": 1451, "end_offset": 1464 }, { "id": 19966, "label": "IPV4", "start_offset": 1465, "end_offset": 1480 }, { "id": 19967, "label": "IPV4", "start_offset": 1481, "end_offset": 1496 }, { "id": 19968, "label": "IPV4", "start_offset": 1497, "end_offset": 1512 }, { "id": 19969, "label": "IPV4", "start_offset": 1513, "end_offset": 1528 }, { "id": 19970, "label": "IPV4", "start_offset": 1529, "end_offset": 1544 }, { "id": 19971, "label": "IPV4", "start_offset": 1545, "end_offset": 1559 }, { "id": 19972, "label": "IPV4", "start_offset": 1560, "end_offset": 1575 }, { "id": 19974, "label": "location", "start_offset": 1603, "end_offset": 1610 }, { "id": 19975, "label": "threat-actor", "start_offset": 1615, "end_offset": 1620 }, { "id": 19976, "label": "attack-pattern", "start_offset": 1621, "end_offset": 1635 }, { "id": 19977, "label": "identity", "start_offset": 1648, "end_offset": 1666 }, { "id": 19978, "label": "threat-actor", "start_offset": 1700, "end_offset": 1705 }, { "id": 19979, "label": "location", "start_offset": 1761, "end_offset": 1767 }, { "id": 19980, "label": "threat-actor", "start_offset": 1805, "end_offset": 1810 }, { "id": 19981, "label": "attack-pattern", "start_offset": 1811, "end_offset": 1819 }, { "id": 19984, "label": "TIME", "start_offset": 1907, "end_offset": 1919 } ]
[]
[]
7,374
head -n 1 cat /proc/cpuinfo | grep name |
[]
[]
[]
2,407
Affected Software and Versions Background on the Spring Framework Root Cause Analysis for CVE-2022-22965
[ { "id": 47486, "label": "vulnerability", "start_offset": 90, "end_offset": 104 }, { "id": 47485, "label": "SOFTWARE", "start_offset": 49, "end_offset": 65 } ]
[ { "id": 335, "from_id": 47485, "to_id": 47486, "type": "has" } ]
[]
8,257
Once the multiple layers of script obfuscation are removed, the final payload arrives—a version of the njRAT Trojan; this family has been a known threat since 2015.
[ { "id": 25496, "label": "location", "start_offset": 47, "end_offset": 50 }, { "id": 25497, "label": "malware", "start_offset": 103, "end_offset": 108 } ]
[]
[]
13,902
It is the last step before the ransomware is dropped, and the attack often speeds up at this point to complete the process before it is stopped.
[]
[]
[]
3,208
Figure 9.
[]
[]
[]
6,051
We did not recover any responses from those URLs.
[]
[]
[]
1,679
We hope this tool will be valuable to incident responders and others who are plagued by NetWire infections.
[ { "id": 4985, "label": "malware", "start_offset": 88, "end_offset": 95 } ]
[]
[]
8,583
We warn users when we suspect a government-backed threat like APT35 is targeting them.
[ { "id": 26532, "label": "threat-actor", "start_offset": 62, "end_offset": 67 }, { "id": 26533, "label": "location", "start_offset": 81, "end_offset": 85 } ]
[]
[]
14,089
Note the following similarities: The usage of paths C:\Users and D:\ are similar The searching patterns are very similar The extension list is very similar
[ { "id": 48171, "label": "FILEPATH", "start_offset": 66, "end_offset": 69 }, { "id": 48170, "label": "FILEPATH", "start_offset": 53, "end_offset": 61 } ]
[]
[]
10,493
Related IOCs
[]
[]
[]
10,381
The user would need to enable macro for it to open fully, which would use AutoHotkey in loading the malicious script file to avoid detection.
[]
[]
[]
2,978
You may consider configuring it to not broadcast the SSID as well: that can make adding devices a little harder, but that means it’s even harder for people to try and join your home network. 3. Set up More Secure Accounts on Your PCs and Macs: PCs and Macs (both desktop and laptop) are still around and as important as ever in the home.
[]
[]
[]
2,417
For example, there is a simple classical application scenario in which the developer creates a trade object to capture request parameters as shown in Figure 1.
[]
[]
[]
8,234
As such, here are some tips on how to stay safe from these online schemes: Carefully scrutinize all emails.
[ { "id": 25443, "label": "location", "start_offset": 14, "end_offset": 17 }, { "id": 25444, "label": "threat-actor", "start_offset": 43, "end_offset": 47 } ]
[]
[]
13,179
USBferry attack scenario, version UF1.0 20160226
[ { "id": 41125, "label": "malware", "start_offset": 0, "end_offset": 8 } ]
[]
[]
10,020
(rcview40u.dll)
[]
[]
[]
470
DGA by itself can’t harm you.
[]
[]
[]
9,573
Accept-Encoding: gzip Connection: Keep-Alive
[]
[]
[]
2,376
StealthVector is designed with various configurable features that make it easy for malicious actors to modify and tailor it to their needs, including a feature that disables Event Tracing for Windows (ETW), allowing the malware to run in stealth mode.
[ { "id": 45481, "label": "malware", "start_offset": 0, "end_offset": 13 } ]
[]
[]
5,476
Figure 1: Tweety Chat’s interface (top), and code snippets showing the file types it steals (bottom) Romance in cyberespionage
[ { "id": 51468, "label": "SOFTWARE", "start_offset": 10, "end_offset": 16 } ]
[]
[]
6,557
hack520[.]co[.]kr shaiya[.]kr zhu[.]kr shenqi[.]kr zhuxian[.]kr Several of these domains are linked to variants of malware that were used by the Winnti threat actor.
[ { "id": 20316, "label": "location", "start_offset": 91, "end_offset": 94 }, { "id": 20317, "label": "malware", "start_offset": 147, "end_offset": 153 } ]
[]
[]
3,884
Last June 9, 2021, the Cybersecurity and Infrastructure Security Agency (CISA) released the Rising Ransomware Threat to OT Assets, which addresses the recent rise in ransomware attacks targeting operational assets (OT) and control systems.
[ { "id": 49744, "label": "TIME", "start_offset": 5, "end_offset": 17 }, { "id": 49745, "label": "identity", "start_offset": 23, "end_offset": 78 } ]
[]
[]
14,419
Including detection of this as part of an overall XDR platform will improve the prevention, detection, and remediation of sophisticated attacks on an organization.
[ { "id": 47173, "label": "SOFTWARE", "start_offset": 50, "end_offset": 54 } ]
[]
[]
3,930
To deploy its tools, it uses the expand command to extract package files dropped in the system.
[]
[]
[]
770
If we were able to make the size of the current heap block in this structure larger than the threshold of 0x186A0 bytes and trigger CMemoryProtector::ProtectedFree, it is still possible to force a true freeing action and occupy the freed object with other data as we show in the following piece of javascript code in figure 6. Figure 6. Javascript proof of concept to force freeing When creating the anchor element, the debug logs are shown in figure 7.
[ { "id": 46347, "label": "SOFTWARE", "start_offset": 340, "end_offset": 350 } ]
[]
[]
5,810
And you just have computers fighting it out.
[ { "id": 17969, "label": "location", "start_offset": 0, "end_offset": 3 }, { "id": 17970, "label": "identity", "start_offset": 8, "end_offset": 12 } ]
[]
[]
6,052
Example Exploit Kit:
[]
[]
[]
2,231
Persistence is achieved by setting the following registry key: HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run The name of the registry key in the above instances is derived from the basename of the supplied argument.
[ { "id": 6650, "label": "REGISTRYKEY", "start_offset": 64, "end_offset": 114 }, { "id": 6651, "label": "REGISTRYKEY", "start_offset": 116, "end_offset": 166 } ]
[]
[]
771
The address of the anchor element is 0x0c3b3f98.
[]
[]
[]
11,767
A few were observed displaying a fake error message requiring user click-through to continue execution.
[]
[]
[]
14,293
When users register, their credit cards will be charged.
[]
[]
[]
1,168
While the research may never result in a fully automated decision system, it has been proven that researchers employing a hybrid approach to analysis will be able to provide critical and timely information to support the continual improvement of the classification system as a whole.
[]
[]
[]
1,545
These attacks begin with an email sent to a carefully chosen target in the agency.
[]
[]
[]
4,682
When they are received, the browser navigates to the official Takeout link to request and eventually download the exported data.
[]
[]
[]
4,813
This app is quite different from the Turla apps described above and written by a different developer.
[ { "id": 50736, "label": "threat-actor", "start_offset": 37, "end_offset": 42 } ]
[]
[]
7,979
Since late 2019, our team has disrupted financially motivated phishing campaigns targeting YouTubers with Cookie Theft malware.
[ { "id": 24726, "label": "attack-pattern", "start_offset": 62, "end_offset": 70 } ]
[]
[]
7,326
idtpl[.]org registration information based on Whois Lookup But from the middle of July 2020, its IP address changed to 185[.]117[.]88[.]91. Figure 22. Domain History of idtpl[.]org as seen on VirusTotal
[ { "id": 22803, "label": "IPV4", "start_offset": 123, "end_offset": 142 } ]
[]
[]
2,502
gdGCT.jsp
[ { "id": 45552, "label": "FILEPATH", "start_offset": 0, "end_offset": 9 } ]
[]
[]
516
Figure 2 shows a completely different result from Figure 1 and stems from only counting ransomware samples from cases in which more than five hosts were infected with the same malware.
[]
[]
[]
3,673
Initial Access
[]
[]
[]
4,519
We have also built additional tools to prevent successful attacks on devices that run Android once those devices are in users’ hands.
[ { "id": 50317, "label": "SOFTWARE", "start_offset": 86, "end_offset": 93 } ]
[]
[]
1,616
If the user would like to unsubscribe they can text “BAJA” to 797977.
[]
[]
[]
9,502
The infection starts with an executable written in C++ that connects through a Winsock API to a domain or IP address in a specific port.
[]
[]
[]
5,192
Network amplification CVE-2021-38445 OpenDDS, ROS 2 7.0 CWE-130: Improper handling of length CVE-2021-38423 Gurum DDS, ROS 2 8.6 CWE-131: Incorrect calculation of buffer size CVE-2021-38435 Connext DDS, ROS 2 8.6 CVE-2021-38439 Gurum DDS, ROS 2 8.6 CWE-122:
[ { "id": 51240, "label": "vulnerability", "start_offset": 22, "end_offset": 36 }, { "id": 51241, "label": "vulnerability", "start_offset": 93, "end_offset": 107 }, { "id": 51242, "label": "vulnerability", "start_offset": 175, "end_offset": 189 }, { "id": 51243, "label": "vulnerability", "start_offset": 213, "end_offset": 227 } ]
[]
[]
14,353
It was in April 2017 when the last Windows variant of Maikspy appeared with the following changes: The C&C server was changed to 198[.]12[.]155[.]84, password theft is added, as well as the theft of .doc, .docx, and .rtf files.
[ { "id": 51794, "label": "TIME", "start_offset": 10, "end_offset": 20 }, { "id": 51795, "label": "malware", "start_offset": 54, "end_offset": 61 }, { "id": 44340, "label": "IPV4", "start_offset": 129, "end_offset": 148 } ]
[]
[]
5,635
Figure 6.
[]
[]
[]
8,295
Indicators of CompromiseFiles with the following hashes were used in the first series of attacks: cd8329f75b1393ead3e16c6c79ee1ab476e6487370481e5931feb63305f00983 – detected as VBS_KEYLOG.NYKW f46f0e8eed0361294200d64e87b3fb13f6a3797f99f5b588444534f27612a590 – archive file;
[ { "id": 25565, "label": "SHA1", "start_offset": 99, "end_offset": 163 }, { "id": 25566, "label": "MD5", "start_offset": 194, "end_offset": 258 } ]
[]
[]
4,265
One file stealer (cca74bb322ad7833a21209b1418c9837e30983daec30d199a839f46075ee72f2, Detected as TSPY_DELF.SUW) published by security researchers in 2013 and linked to the domain myflatnet[.]com, was attributed by several parties to the Hangover group.
[ { "id": 50067, "label": "threat-actor", "start_offset": 236, "end_offset": 250 }, { "id": 50063, "label": "SHA2", "start_offset": 18, "end_offset": 82 }, { "id": 50064, "label": "malware", "start_offset": 96, "end_offset": 109 }, { "id": 50065, "label": "TIME", "start_offset": 148, "end_offset": 152 }, { "id": 50066, "label": "DOMAIN", "start_offset": 178, "end_offset": 193 } ]
[ { "id": 911, "from_id": 50063, "to_id": 50064, "type": "indicates" }, { "id": 912, "from_id": 50064, "to_id": 50066, "type": "communicates-with" }, { "id": 913, "from_id": 50064, "to_id": 50067, "type": "attributed-to" } ]
[]
1,135
This malware is well documented as a powerful polymorphic worm that encrypts itself differently every time it propagates.
[]
[]
[]
8,431
Safe Browsing also notifies webmasters when their websites are compromised by malicious actors and helps them diagnose and resolve the problem so that their visitors stay safer.
[ { "id": 25979, "label": "threat-actor", "start_offset": 28, "end_offset": 38 }, { "id": 25980, "label": "location", "start_offset": 59, "end_offset": 62 }, { "id": 25981, "label": "location", "start_offset": 95, "end_offset": 98 }, { "id": 25982, "label": "location", "start_offset": 105, "end_offset": 109 }, { "id": 25983, "label": "location", "start_offset": 119, "end_offset": 122 } ]
[]
[]
11,888
Unique URLs serving ​​CVE-2021-33742 Internet Explorer exploit: http://lioiamcount[.]com/IsnoMLgankYg6/EjlYIy7cdFZFeyFqE4IURS1 http://db-control-uplink[.]com/eFe1J00hISDe9Zw/gzHvIOlHpIXB http://kidone[.]xyz/VvE0yYArmvhyTl/GzV
[ { "id": 36639, "label": "URL", "start_offset": 64, "end_offset": 88 }, { "id": 36640, "label": "URL", "start_offset": 127, "end_offset": 136 }, { "id": 36641, "label": "URL", "start_offset": 187, "end_offset": 206 } ]
[]
[]