id
int64 1
14.4k
| text
stringlengths 3
5.01k
| entities
list | relations
list | Comments
list |
---|---|---|---|---|
12,525 | To protect our users, TAG routinely hunts for 0-day vulnerabilities exploited in-the-wild. | [] | [] | [] |
12,677 | We have also taken extraordinary measures beyond our actions against coordinated influence operations to protect users and stop the spread of misinformation and disinformation about the war in Ukraine online. | [
{
"id": 39330,
"label": "location",
"start_offset": 119,
"end_offset": 122
},
{
"id": 39331,
"label": "malware",
"start_offset": 123,
"end_offset": 127
},
{
"id": 39332,
"label": "location",
"start_offset": 157,
"end_offset": 160
},
{
"id": 39333,
"label": "location",
"start_offset": 186,
"end_offset": 189
}
] | [] | [] |
867 | While ransomware is often thought to be bullet-proof, it is certainly not always the case. | [] | [] | [] |
7,518 | Variable ${prIVATE} = 959, 713 from section 1 of the PowerShell script has two values; the first number is the key and the second number is the modulus. | [
{
"id": 23368,
"label": "location",
"start_offset": 36,
"end_offset": 43
},
{
"id": 23370,
"label": "attack-pattern",
"start_offset": 53,
"end_offset": 63
},
{
"id": 23372,
"label": "location",
"start_offset": 115,
"end_offset": 118
}
] | [] | [] |
5,068 | We’ll continue to take action, identify bad actors and share relevant information with others across industry and governments, with the goal of bringing awareness to these issues, protecting users and preventing future attacks. | [] | [] | [] |
13,702 | Be wary of irregular emails with suspicious content such as dubious sender email, domain name, writing style, and urgent requests. | [] | [] | [] |
11,583 | It also contains a minimalist agent capable of exfiltrating interesting files from the device, such as the Whatsapp database. | [] | [] | [] |
11,719 | Indicator of Compromise Android Part IoCs Indicator Package name Label C2 server Detection 0c182b51ff1dffaa384651e478155632c6e65820322774e416be20e6d49bb8f9 com.example.firstandoidapp | [
{
"id": 36115,
"label": "SHA2",
"start_offset": 97,
"end_offset": 161
}
] | [] | [] |
3,568 | While ConfuserEx is able to apply multiple transformations to the target binary, we are interested in two particular functions that we can use for correlation: Source code building. | [
{
"id": 49352,
"label": "tools",
"start_offset": 6,
"end_offset": 16
}
] | [] | [] |
7,303 | Get memory information ioreg -rd1 -c IOPlatformExpertDevice | awk '/IOPlatformSerialNumber/ { split($0, line, \"\\\"\"); printf(\"%s\", line[4]); } | [] | [] | [] |
3,760 | This last command downloads a shell script that ultimately downloads and executes an XMRig coinminer. | [
{
"id": 49590,
"label": "malware",
"start_offset": 86,
"end_offset": 101
}
] | [] | [] |
5,169 | Despite being unknown even to industry practitioners, the Data Distribution Service (DDS) protocol has been in use for more than a decade. | [] | [] | [] |
14,152 | But as we’ve seen with even ransomware actors, the endpoint is being targeted less. | [] | [] | [] |
8,991 | Second, one of the Linux rshell samples used the IP address 45[.]142[.]214[.]193 as its C&C. | [
{
"id": 27783,
"label": "IPV4",
"start_offset": 60,
"end_offset": 80
}
] | [] | [] |
2,585 | The Lapsus$ Group doesn’t employ malware in breached victim environments, doesn’t encrypt data and in most cases, doesn’t actually employ extortion. | [
{
"id": 47771,
"label": "attack-pattern",
"start_offset": 26,
"end_offset": 40
},
{
"id": 47770,
"label": "threat-actor",
"start_offset": 4,
"end_offset": 11
}
] | [] | [] |
12,616 | It will only run at or later than 12:10 PM on any given day; if it is earlier, it will sleep for 15 seconds until it is past the said time. | [
{
"id": 39205,
"label": "location",
"start_offset": 3,
"end_offset": 7
},
{
"id": 39206,
"label": "location",
"start_offset": 8,
"end_offset": 12
},
{
"id": 39207,
"label": "TIME",
"start_offset": 34,
"end_offset": 42
},
{
"id": 39209,
"label": "location",
"start_offset": 82,
"end_offset": 86
},
{
"id": 39210,
"label": "TIME",
"start_offset": 97,
"end_offset": 107
},
{
"id": 39211,
"label": "location",
"start_offset": 134,
"end_offset": 138
}
] | [] | [] |
3,847 | Once ANEL evolved to “5.1.1 rc,” it changed its file type to an executable, while also changing the C&C server. | [
{
"id": 11661,
"label": "malware",
"start_offset": 5,
"end_offset": 9
}
] | [] | [] |
11,507 | Recently observed COLDRIVER indicators: In another campaign tracked by CERT-UA as UAC-0056 we observed compromised email addresses of a Regional Prosecutor’s office of Ukraine leveraged to send malicious Microsoft Excel documents with VBA macros delivering Cobalt Strike. | [
{
"id": 35205,
"label": "threat-actor",
"start_offset": 18,
"end_offset": 27
},
{
"id": 35206,
"label": "location",
"start_offset": 51,
"end_offset": 59
},
{
"id": 35208,
"label": "threat-actor",
"start_offset": 82,
"end_offset": 90
},
{
"id": 35209,
"label": "tools",
"start_offset": 158,
"end_offset": 164
}
] | [] | [] |
10,345 | The code inside the BLUE box constructs the main Powershell commands and scripts. | [
{
"id": 31516,
"label": "location",
"start_offset": 20,
"end_offset": 24
},
{
"id": 31517,
"label": "attack-pattern",
"start_offset": 49,
"end_offset": 59
},
{
"id": 31518,
"label": "location",
"start_offset": 69,
"end_offset": 72
}
] | [] | [] |
4,214 | In addition, the application now retrieves the last known location and uses the development platform Google Firebase to upload the stolen content. | [
{
"id": 50029,
"label": "SOFTWARE",
"start_offset": 101,
"end_offset": 116
}
] | [] | [] |
12,322 | We terminated 1 blog as part of our investigation into coordinated influence operations linked to Argentina. | [] | [] | [] |
2,984 | This also is an important lesson for kids to understand that privacy on computers isn’t absolute: the admin can always look at what they’re doing. | [] | [] | [] |
1,831 | Detecting and deleting Mimikatz We observed the PowerShell script disabling the security products by leveraging aswarpot.sys (a legitimate Avast Anti-Rootkit Driver). | [
{
"id": 5382,
"label": "tools",
"start_offset": 23,
"end_offset": 31
},
{
"id": 5383,
"label": "tools",
"start_offset": 53,
"end_offset": 63
},
{
"id": 46962,
"label": "SOFTWARE",
"start_offset": 144,
"end_offset": 169
},
{
"id": 46963,
"label": "FILEPATH",
"start_offset": 117,
"end_offset": 129
},
{
"id": 46964,
"label": "attack-pattern",
"start_offset": 71,
"end_offset": 102
}
] | [
{
"id": 278,
"from_id": 46962,
"to_id": 46963,
"type": "consists-of"
}
] | [] |
3,730 | On April 6, 2022, VMware published a security advisory mentioning eight vulnerabilities, including CVE-2022-22954 and CVE-2022-22960 impacting their products VMware Workspace ONE Access, Identity Manager and vRealize Automation. | [
{
"id": 49530,
"label": "vulnerability",
"start_offset": 99,
"end_offset": 113
},
{
"id": 49531,
"label": "vulnerability",
"start_offset": 118,
"end_offset": 132
},
{
"id": 49533,
"label": "SOFTWARE",
"start_offset": 187,
"end_offset": 203
},
{
"id": 49534,
"label": "SOFTWARE",
"start_offset": 208,
"end_offset": 227
},
{
"id": 49532,
"label": "SOFTWARE",
"start_offset": 158,
"end_offset": 185
},
{
"id": 49528,
"label": "TIME",
"start_offset": 3,
"end_offset": 16
},
{
"id": 49529,
"label": "identity",
"start_offset": 18,
"end_offset": 24
}
] | [
{
"id": 821,
"from_id": 49532,
"to_id": 49530,
"type": "has"
},
{
"id": 822,
"from_id": 49532,
"to_id": 49531,
"type": "has"
},
{
"id": 823,
"from_id": 49533,
"to_id": 49530,
"type": "has"
},
{
"id": 824,
"from_id": 49533,
"to_id": 49531,
"type": "has"
},
{
"id": 825,
"from_id": 49534,
"to_id": 49530,
"type": "has"
},
{
"id": 826,
"from_id": 49534,
"to_id": 49531,
"type": "has"
}
] | [] |
4,048 | After further analysis, we found that the threat group developed multiple backdoors capable of communication via common network protocols. | [] | [] | [] |
12,487 | We terminated 3,317 YouTube channels as part of our ongoing investigation into coordinated influence operations linked to China. | [] | [] | [] |
2,264 | This bulletin includes coordinated influence operation campaigns terminated on our platforms in Q1 2022. | [
{
"id": 47333,
"label": "TIME",
"start_offset": 96,
"end_offset": 103
}
] | [] | [] |
1,312 | An example upload of these results can be seen below: PlugX PlugX is a backdoor that is often used by actors in targeted attacks. | [
{
"id": 3977,
"label": "malware",
"start_offset": 55,
"end_offset": 60
},
{
"id": 3978,
"label": "malware",
"start_offset": 62,
"end_offset": 67
}
] | [] | [] |
2,917 | In October 2017, Palo Alto Networks Unit 42 published research showing how attackers were adapting attack techniques to generate cryptocurrency for themselves. | [
{
"id": 48089,
"label": "TIME",
"start_offset": 3,
"end_offset": 15
},
{
"id": 48090,
"label": "identity",
"start_offset": 17,
"end_offset": 43
}
] | [] | [] |
8,675 | Related IOCs supportcdn.web[.]app vegmobile[.]com 111.90.146[.]198 | [
{
"id": 26782,
"label": "IPV4",
"start_offset": 50,
"end_offset": 66
}
] | [] | [] |
10,195 | During the pandemic, we also uncovered attackers posing as news providers with a “Covid19 news software.” | [] | [] | [] |
3,253 | Figure 17. | [] | [] | [] |
4,757 | On Search, Google’s Safe Browsing is an industry-leading service to identify unsafe websites across the web and notify users and website owners of potential harm. | [
{
"id": 50662,
"label": "SOFTWARE",
"start_offset": 11,
"end_offset": 33
}
] | [] | [] |
12,869 | Figure 2 - A Technique detection named "Clipboard Data or Screenshot Collection via PowerShell" was generated when powershell.exe executed CopyFromScreen(). The adversary uses privilege escalation, which commonly involves taking advantage of pre-existing system weaknesses, misconfigurations, and vulnerabilities to gain higher permissions. | [
{
"id": 40092,
"label": "attack-pattern",
"start_offset": 46,
"end_offset": 60
},
{
"id": 40093,
"label": "attack-pattern",
"start_offset": 90,
"end_offset": 100
},
{
"id": 40094,
"label": "attack-pattern",
"start_offset": 186,
"end_offset": 206
},
{
"id": 40095,
"label": "location",
"start_offset": 303,
"end_offset": 306
}
] | [] | [] |
5,155 | They're going to buy everything that they need and everything that they see as an opportunity, right? | [] | [] | [] |
6,624 | https://attack.mitre.org/groups/G0064/ | [] | [] | [] |
5,793 | Maybe explain to the audience what hybrid warfare or cyber warfare is. | [] | [] | [] |
26 | It’s a subject Unit 42 has been tracking in the past year: | [
{
"id": 45810,
"label": "identity",
"start_offset": 15,
"end_offset": 22
}
] | [] | [] |
3,065 | Since the detection result is fake, the subsequent cleaning is not real either – the elimination operation is just marking a flag of "initial_virus_cleared" to “1” in the app’s internal database. | [] | [] | [] |
3,971 | As observed on CVE-2020-0688, the use of static keys — as opposed to randomly generated keys — can allow an attacker to execute arbitrary code by tricking the server into deserializing ViewState data. | [
{
"id": 49830,
"label": "vulnerability",
"start_offset": 16,
"end_offset": 29
},
{
"id": 49831,
"label": "attack-pattern",
"start_offset": 121,
"end_offset": 143
}
] | [
{
"id": 868,
"from_id": 49830,
"to_id": 49831,
"type": "uses"
}
] | [] |
1,927 | One of the RTF files was found in a server related to Confucius (f1a54dca2fdfe59ec3f537148460364fb5d046c9b4e7db5fc819a9732ae0e063, detected as TROJ_CVE201711882.AG), while the other one (434d34c0502910c562f5c6840694737a2c82a8c44004fa58c7c457b08aac17bd,detected as Mal_CVE20170199-2) downloaded a VB Backdoor that pings back to twitck[.]com, a domain name belonging to Urpage. | [
{
"id": 5662,
"label": "SHA2",
"start_offset": 187,
"end_offset": 251
},
{
"id": 5659,
"label": "threat-actor",
"start_offset": 54,
"end_offset": 63
},
{
"id": 5660,
"label": "SHA2",
"start_offset": 65,
"end_offset": 129
},
{
"id": 47051,
"label": "malware",
"start_offset": 143,
"end_offset": 163
},
{
"id": 47052,
"label": "malware",
"start_offset": 264,
"end_offset": 281
},
{
"id": 47053,
"label": "DOMAIN",
"start_offset": 327,
"end_offset": 339
},
{
"id": 47054,
"label": "threat-actor",
"start_offset": 368,
"end_offset": 374
}
] | [
{
"id": 293,
"from_id": 5660,
"to_id": 5659,
"type": "authored-by"
},
{
"id": 294,
"from_id": 47051,
"to_id": 5660,
"type": "related-to"
},
{
"id": 295,
"from_id": 47051,
"to_id": 5659,
"type": "authored-by"
},
{
"id": 296,
"from_id": 5662,
"to_id": 5659,
"type": "authored-by"
},
{
"id": 297,
"from_id": 47052,
"to_id": 5659,
"type": "authored-by"
},
{
"id": 298,
"from_id": 47052,
"to_id": 47053,
"type": "beacons-to"
},
{
"id": 299,
"from_id": 47054,
"to_id": 47053,
"type": "controls"
}
] | [] |
963 | The message body and sender phone number are collected as shown in Figure 2. Figure 2. | [] | [] | [] |
744 | Of those vulnerabilities, 4 were actively being exploited in the wild. | [] | [] | [] |
915 | Figure 7. HTTP POST request indicating a folder is being scanned This resulted in over 1,000 requests being made on a sandbox machine, which contained little data of interest. | [] | [] | [] |
5,253 | We analyzed seven apps that were actually AnubisSpy. | [
{
"id": 51294,
"label": "malware",
"start_offset": 42,
"end_offset": 51
}
] | [] | [] |
3,528 | Protux’s latest version, 3.7, uses the open-source compiler OpenCSP to generate a session key with the RSA algorithm. | [
{
"id": 10665,
"label": "malware",
"start_offset": 0,
"end_offset": 6
},
{
"id": 49309,
"label": "tools",
"start_offset": 60,
"end_offset": 67
}
] | [
{
"id": 781,
"from_id": 10665,
"to_id": 49309,
"type": "uses"
}
] | [] |
5,064 | The new technique, displayed below, draws a login page that appears to be on the passport.i.ua domain, overtop of the page hosted on the compromised site. | [
{
"id": 51171,
"label": "DOMAIN",
"start_offset": 81,
"end_offset": 94
}
] | [] | [] |
9,223 | What happened? | [] | [] | [] |
7,937 | Both methods use a system application called PackageInstaller to complete the installation. | [] | [] | [] |
86 | 3. Criminals will find ways to target these attacks. | [] | [] | [] |
11,192 | Like much of their tooling, HYPERSCRAPE is not notable for its technical sophistication, but rather its effectiveness in accomplishing Charming Kitten’s objectives. | [
{
"id": 34266,
"label": "location",
"start_offset": 5,
"end_offset": 9
},
{
"id": 34268,
"label": "threat-actor",
"start_offset": 135,
"end_offset": 150
}
] | [] | [] |
3,013 | Voice assistants are some of the newest devices out there, which means they’re the least known and understood. | [] | [] | [] |
11,686 | “India reaction after new pak map.pdf” – a document talking about India’s response to the new political map revealed by Pakistan in August. | [] | [] | [] |
7,600 | Figure 12. | [] | [] | [] |
13,911 | Figure 1. | [] | [] | [] |
1,037 | Their response was that they were addressing this issue and have already removed a number of these items, with the remainder requiring further investigation. | [] | [] | [] |
4,103 | Figure 9. | [] | [] | [] |
1,738 | Attackers know that people will click on links in email. | [] | [] | [] |
5,783 | It’s great to be here. | [] | [] | [] |
2,202 | The filename is derived by randomly choosing an executable name from the system32 directory. | [
{
"id": 47317,
"label": "FILEPATH",
"start_offset": 73,
"end_offset": 81
}
] | [] | [] |
662 | Nearly all of us have a use for Microsoft Office documents. | [
{
"id": 46243,
"label": "SOFTWARE",
"start_offset": 32,
"end_offset": 48
}
] | [] | [] |
5,036 | The targets, primarily located in Lithuania, were sent links to attacker controlled domains from a domain spoofing the Facebook security team. | [
{
"id": 51110,
"label": "identity",
"start_offset": 119,
"end_offset": 141
},
{
"id": 51109,
"label": "location",
"start_offset": 34,
"end_offset": 43
}
] | [] | [] |
1,669 | At this point, the key exchange is complete and both client and server hold the same two keys, which they can use to encrypt and decrypt traffic. | [] | [] | [] |
2,137 | Organizations can and should prioritize scheduling and deployment of the security updates based on their security policy and risk assessment, and on currently available information. | [] | [] | [] |
1,898 | Original (top) and modified (bottom) website | [] | [] | [] |
5,684 | Since mid-2021, we have been investigating a rather elusive threat actor called Earth Lusca that targets organizations globally via a campaign that uses traditional social engineering techniques such as spear phishing and watering holes. | [
{
"id": 17527,
"label": "location",
"start_offset": 134,
"end_offset": 142
},
{
"id": 17528,
"label": "attack-pattern",
"start_offset": 203,
"end_offset": 217
},
{
"id": 17529,
"label": "location",
"start_offset": 218,
"end_offset": 221
}
] | [] | [] |
2,606 | Owing to the diversity of techniques used, and the lack of use of malware, there is no single defense against or detection of Lapsus$ attacks specifically. | [
{
"id": 7883,
"label": "threat-actor",
"start_offset": 127,
"end_offset": 134
}
] | [] | [] |
1,980 | We can see the first packet is a normal ClientHello sent by the client, and the second packet is a crafted packet sent by the server. In order to examine exploitation of this vulnerability, we used WinDBG to attach to the lsass.exe process. | [
{
"id": 47093,
"label": "FILEPATH",
"start_offset": 223,
"end_offset": 232
},
{
"id": 47092,
"label": "SOFTWARE",
"start_offset": 199,
"end_offset": 205
}
] | [] | [] |
1,302 | The 'gh204503254' data that was previously downloaded is used as the key. | [] | [] | [] |
7,246 | Within the Visual Studio Project would be source code for exploiting the vulnerability, as well as an additional DLL that would be executed through Visual Studio Build Events. | [
{
"id": 22647,
"label": "attack-pattern",
"start_offset": 42,
"end_offset": 48
}
] | [] | [] |
3,090 | Security updates to address these vulnerabilities began to be released prior to disclosure on January 3, 2018. | [
{
"id": 45767,
"label": "TIME",
"start_offset": 95,
"end_offset": 110
}
] | [] | [] |
5,725 | Attackers will cast a wide net, with no regard to who the victims are, hoping that a decent percentage of attacks are successful. | [
{
"id": 17691,
"label": "location",
"start_offset": 10,
"end_offset": 14
},
{
"id": 17692,
"label": "identity",
"start_offset": 15,
"end_offset": 19
},
{
"id": 17693,
"label": "tools",
"start_offset": 27,
"end_offset": 30
},
{
"id": 17694,
"label": "location",
"start_offset": 66,
"end_offset": 69
},
{
"id": 17695,
"label": "location",
"start_offset": 114,
"end_offset": 117
}
] | [] | [] |
1,757 | And before long, Yuki Chen (@guhe120), a Chinese researcher, posted his answer. | [
{
"id": 46908,
"label": "identity",
"start_offset": 28,
"end_offset": 36
},
{
"id": 46907,
"label": "identity",
"start_offset": 17,
"end_offset": 26
},
{
"id": 46909,
"label": "location",
"start_offset": 41,
"end_offset": 48
}
] | [
{
"id": 254,
"from_id": 46907,
"to_id": 46908,
"type": "duplicate-of"
},
{
"id": 255,
"from_id": 46907,
"to_id": 46909,
"type": "located-at"
},
{
"id": 256,
"from_id": 46908,
"to_id": 46909,
"type": "located-at"
}
] | [] |
14,108 | Analyzing the compile time of binaries between different samples can also provide a level of correlation between samples. | [] | [] | [] |
2,512 | The group has spent more than a year attacking organizations where IT outages can have life-threatening consequences: hospitals, 911 dispatch carriers, emergency medical services and law enforcement agencies. | [] | [] | [] |
1,304 | The following example response will instruct the malware to download a remote executable file: 'filename.exe' is the path where the downloaded file will be stored, and '01234567890123456789012345678901' is the value supplied in the subsequent HTTP request. | [
{
"id": 46665,
"label": "FILEPATH",
"start_offset": 97,
"end_offset": 109
}
] | [] | [] |
10,060 | Figure 10. .satan file Conclusion | [] | [] | [] |
9,166 | By then, Angler’s activities already ceased. | [] | [] | [] |
1,090 | In the above example, the resource being protected isn’t the right to speak, as many might think, but rather the ability to listen. | [] | [] | [] |
691 | This means that RTF documents expose the same attack surface as Internet Explorer! | [
{
"id": 46269,
"label": "SOFTWARE",
"start_offset": 64,
"end_offset": 81
}
] | [] | [] |
299 | Updated April 1, 2022, at 11 a.m. PT. | [
{
"id": 45999,
"label": "TIME",
"start_offset": 8,
"end_offset": 37
}
] | [] | [] |
10,589 | The majority of targets we observed were from North Korea or individuals who worked on North Korea-related issues. | [] | [] | [] |
548 | Ransom notes from Makop, Dharma, Ryuk, DearCry and others, sometimes ask victims to reach out to them via email. | [
{
"id": 46164,
"label": "malware",
"start_offset": 19,
"end_offset": 24
},
{
"id": 46166,
"label": "malware",
"start_offset": 34,
"end_offset": 38
},
{
"id": 46167,
"label": "malware",
"start_offset": 40,
"end_offset": 47
},
{
"id": 46165,
"label": "malware",
"start_offset": 26,
"end_offset": 32
}
] | [] | [] |
11,430 | This has happened to multiple spyware vendors over the past ten years, raising the specter that their stockpiles can be released publicly without warning. | [
{
"id": 34912,
"label": "malware",
"start_offset": 83,
"end_offset": 90
},
{
"id": 34913,
"label": "location",
"start_offset": 113,
"end_offset": 116
}
] | [] | [] |
1,190 | Some of these third-party SDKs provide IAP services based on existing online payment platforms. | [] | [] | [] |
3,452 | Please mark, I'm not a robot! | [] | [] | [] |
5,411 | The vendors that were targeted by VPNFilter were Asus, D-Link, Huawei, Linksys, MikroTik, Netgear, QNAP, TP-Link, Ubiquiti, UPVEL, and ZDE. | [
{
"id": 51412,
"label": "identity",
"start_offset": 99,
"end_offset": 103
},
{
"id": 51415,
"label": "identity",
"start_offset": 135,
"end_offset": 138
},
{
"id": 51409,
"label": "identity",
"start_offset": 71,
"end_offset": 78
},
{
"id": 51410,
"label": "identity",
"start_offset": 80,
"end_offset": 88
},
{
"id": 51405,
"label": "malware",
"start_offset": 34,
"end_offset": 43
},
{
"id": 51406,
"label": "identity",
"start_offset": 49,
"end_offset": 53
},
{
"id": 51407,
"label": "identity",
"start_offset": 55,
"end_offset": 61
},
{
"id": 51408,
"label": "identity",
"start_offset": 63,
"end_offset": 69
},
{
"id": 51411,
"label": "identity",
"start_offset": 90,
"end_offset": 97
},
{
"id": 51413,
"label": "identity",
"start_offset": 105,
"end_offset": 112
},
{
"id": 51414,
"label": "identity",
"start_offset": 114,
"end_offset": 122
}
] | [
{
"id": 1084,
"from_id": 51405,
"to_id": 51406,
"type": "targets"
},
{
"id": 1085,
"from_id": 51405,
"to_id": 51407,
"type": "targets"
},
{
"id": 1086,
"from_id": 51405,
"to_id": 51408,
"type": "targets"
},
{
"id": 1087,
"from_id": 51405,
"to_id": 51409,
"type": "targets"
},
{
"id": 1089,
"from_id": 51405,
"to_id": 51411,
"type": "targets"
},
{
"id": 1090,
"from_id": 51405,
"to_id": 51412,
"type": "targets"
},
{
"id": 1091,
"from_id": 51405,
"to_id": 51413,
"type": "targets"
},
{
"id": 1088,
"from_id": 51405,
"to_id": 51410,
"type": "targets"
},
{
"id": 1092,
"from_id": 51405,
"to_id": 51414,
"type": "targets"
},
{
"id": 1093,
"from_id": 51405,
"to_id": 51415,
"type": "targets"
}
] | [] |
2,380 | Many of the StealthMutant samples we have analyzed use AES-256-ECB for decryption; alternatively, an earlier variant of the loader uses XOR. | [
{
"id": 47443,
"label": "malware",
"start_offset": 12,
"end_offset": 25
}
] | [] | [] |
9,554 | We have seen it deployed against fewer than two dozen accounts located in Iran. | [] | [] | [] |
8,181 | Figure 3. Letter confirming the changes in the company’s bank reference. | [] | [] | [] |
4,514 | The Android security process begins early in the development lifecycle, and each major feature of the platform is reviewed by engineering and security resources. | [
{
"id": 50314,
"label": "SOFTWARE",
"start_offset": 4,
"end_offset": 11
}
] | [] | [] |
9,829 | Figure 6. Code showing down_new’s command function Table 1. | [
{
"id": 29964,
"label": "tools",
"start_offset": 25,
"end_offset": 33
}
] | [] | [] |
4,351 | The lures used in an older campaign from April 2021 impersonated the Federal Board of Revenue. | [
{
"id": 50135,
"label": "TIME",
"start_offset": 45,
"end_offset": 55
},
{
"id": 50136,
"label": "identity",
"start_offset": 73,
"end_offset": 97
}
] | [] | [] |
8,381 | And we don’t just plug security holes – we work to eliminate entire classes of threats for consumers and businesses whose work depends on the Internet. | [
{
"id": 25803,
"label": "location",
"start_offset": 0,
"end_offset": 3
},
{
"id": 25804,
"label": "identity",
"start_offset": 13,
"end_offset": 17
},
{
"id": 25805,
"label": "location",
"start_offset": 23,
"end_offset": 31
},
{
"id": 25806,
"label": "location",
"start_offset": 101,
"end_offset": 104
}
] | [] | [] |
725 | Please mark, I'm not a robot! By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. | [] | [] | [] |
13,271 | The loader checking the sidebar process Figure 8. | [] | [] | [] |
13,165 | The malware tries to check if the target machine has a USB plug-in and copies the USBferry installer into the USB storage. | [
{
"id": 41084,
"label": "location",
"start_offset": 21,
"end_offset": 26
},
{
"id": 41085,
"label": "location",
"start_offset": 34,
"end_offset": 40
},
{
"id": 41086,
"label": "location",
"start_offset": 67,
"end_offset": 70
},
{
"id": 41087,
"label": "malware",
"start_offset": 82,
"end_offset": 90
}
] | [] | [] |
4,252 | Figure 8: Calling the decryption function This encouraged us to analyze the string encryption routines thoroughly. | [] | [] | [] |
13,635 | We also recommend that administrators keep the versions of any e-commerce platforms in use by their websites up to date to prevent any potential vulnerabilities, including XSS attacks. | [
{
"id": 51721,
"label": "attack-pattern",
"start_offset": 172,
"end_offset": 183
}
] | [] | [] |
5,254 | These were signed with the same fake Google certificates. | [] | [] | [] |