id
int64 1
14.4k
| text
stringlengths 3
5.01k
| entities
list | relations
list | Comments
list |
---|---|---|---|---|
4,675 | StartsWith("Help us protect you: Security advice from Google") | [] | [] | [] |
415 | And for shoppers, the impact of a successful attack is minimal: there are no lasting effects or impact, making it an annoyance at worst. But because of the potential impact on holiday shopping and the ease of attacks, unauthorized coin mining is an attack that retailers need to be aware of and take active steps for prevention this holiday season. | [
{
"id": 46113,
"label": "attack-pattern",
"start_offset": 219,
"end_offset": 243
}
] | [] | [] |
12,046 | We have a long-standing policy to send you a warning if we detect that your account is a target of government-backed phishing or malware attempts. | [
{
"id": 37269,
"label": "location",
"start_offset": 10,
"end_offset": 14
},
{
"id": 37270,
"label": "location",
"start_offset": 89,
"end_offset": 95
},
{
"id": 37271,
"label": "attack-pattern",
"start_offset": 117,
"end_offset": 125
}
] | [] | [] |
13,600 | (Note that Flash has been declared end-of-life by Adobe since December 31, 2020.) If the victim downloads and executes the installer downloaded from this page, the victim will be infected with a variant of Gh0stRat malware, previously also named Gh0stCringe or CineregRAT. | [
{
"id": 51687,
"label": "TIME",
"start_offset": 62,
"end_offset": 79
},
{
"id": 51688,
"label": "malware",
"start_offset": 207,
"end_offset": 215
},
{
"id": 51689,
"label": "malware",
"start_offset": 247,
"end_offset": 258
},
{
"id": 51690,
"label": "malware",
"start_offset": 262,
"end_offset": 272
}
] | [
{
"id": 1133,
"from_id": 51688,
"to_id": 51689,
"type": "related-to"
},
{
"id": 1134,
"from_id": 51688,
"to_id": 51690,
"type": "related-to"
}
] | [] |
7,951 | This method has several stages: | [] | [] | [] |
14,234 | In fact, we found references to PlugX in the C&C strings we analyzed, indicating that the group may also be using the same backdoor in this particular campaign. | [
{
"id": 44021,
"label": "malware",
"start_offset": 32,
"end_offset": 37
}
] | [] | [] |
2,516 | The FBI has connected Conti to more than 400 cyberattacks against organizations worldwide, three-quarters of which are based in the U.S., with demands as high as $25 million. | [
{
"id": 47712,
"label": "threat-actor",
"start_offset": 23,
"end_offset": 28
},
{
"id": 47713,
"label": "location",
"start_offset": 133,
"end_offset": 137
},
{
"id": 47711,
"label": "identity",
"start_offset": 5,
"end_offset": 8
}
] | [
{
"id": 343,
"from_id": 47712,
"to_id": 47713,
"type": "targets"
}
] | [] |
12,849 | A security professional can leverage MITRE ATT&CK to audit for coverage gaps to discover where they may be vulnerable to threats. | [
{
"id": 40046,
"label": "location",
"start_offset": 2,
"end_offset": 10
},
{
"id": 40047,
"label": "location",
"start_offset": 24,
"end_offset": 27
},
{
"id": 40048,
"label": "malware",
"start_offset": 28,
"end_offset": 36
},
{
"id": 40050,
"label": "location",
"start_offset": 100,
"end_offset": 103
}
] | [] | [] |
14,370 | End users and enterprises can also benefit from multilayered mobile security solutions such as Trend Micro™ Mobile Security for Android™ which is also available on Google Play. | [] | [] | [] |
1,547 | The figure below shows an example. | [] | [] | [] |
13,346 | How a scheduled task delivers the malware to a victim's environment | [
{
"id": 41531,
"label": "attack-pattern",
"start_offset": 6,
"end_offset": 20
}
] | [] | [] |
619 | Please mark, I'm not a robot! | [] | [] | [] |
5,437 | In such cases, an average user would not have the ability to fix a Cyclops Blink infection. | [
{
"id": 51436,
"label": "malware",
"start_offset": 67,
"end_offset": 80
}
] | [] | [] |
8,276 | Some of these domains were also tied to banking malware, confirming our attacker was not limited to embassies. | [] | [] | [] |
1,978 | It should be noted that if you want modify the “CookieSize“ value, you should modify the other length fields to keep the packet structure valid, as shown below in Figure 4. | [] | [] | [] |
11,762 | Some commodity malware used included RedLine, Vidar, Predator The Thief, Nexus stealer, Azorult, Raccoon, Grand Stealer, Vikro Stealer, Masad (Google’s naming), and Kantal (Google’s naming) which shares code similarity with Vidar. | [
{
"id": 36265,
"label": "malware",
"start_offset": 79,
"end_offset": 86
},
{
"id": 36272,
"label": "location",
"start_offset": 161,
"end_offset": 164
}
] | [] | [] |
13,704 | As a result, traditional security solutions won’t be able to protect accounts and systems from such attacks. | [] | [] | [] |
568 | The attacker asked for $250 and required payment as 0.004 BTC (suggesting that at the time the ransom note was written, 1 BTC equaled approximately $62,500). | [] | [] | [] |
5,029 | These phishing domains have been blocked through Google Safe Browsing – a service that identifies unsafe websites across the web and notifies users and website owners of potential harm. | [
{
"id": 51097,
"label": "SOFTWARE",
"start_offset": 49,
"end_offset": 69
}
] | [] | [] |
2,346 | The exploit worked and ran our bash script as root. | [] | [] | [] |
9,321 | Figure 5. Magecart Group 11 injection pattern Figure 6. | [
{
"id": 28763,
"label": "threat-actor",
"start_offset": 11,
"end_offset": 19
}
] | [] | [] |
988 | Acknowledgement We greatly appreciate the help from Rongbo Shao from Palo Alto Networks in working on the Threat Prevention signature. | [
{
"id": 46482,
"label": "identity",
"start_offset": 71,
"end_offset": 89
},
{
"id": 46483,
"label": "identity",
"start_offset": 54,
"end_offset": 65
}
] | [] | [] |
942 | Background WildFire captures many samples of mobile malware that intercept and upload SMS messages. | [
{
"id": 44908,
"label": "identity",
"start_offset": 12,
"end_offset": 20
}
] | [] | [] |
5,241 | AnubisSpy has several modules, each of which has a separate role. | [
{
"id": 51275,
"label": "malware",
"start_offset": 0,
"end_offset": 9
}
] | [] | [] |
4,752 | While vulnerability research is an important contributor to online safety when that research is used to improve the security of products, vendors stockpiling zero-day vulnerabilities in secret can pose a severe risk to the Internet when the vendor itself gets compromised. | [] | [] | [] |
14,218 | Although gzwrite64 is imported by loadperf.dll, the payload’s main function is actually located in the DLLMain of “loadoerf.ini”. | [
{
"id": 48244,
"label": "FILEPATH",
"start_offset": 115,
"end_offset": 127
},
{
"id": 48246,
"label": "FILEPATH",
"start_offset": 34,
"end_offset": 46
},
{
"id": 48247,
"label": "SOFTWARE",
"start_offset": 9,
"end_offset": 19
}
] | [] | [] |
14,361 | The following figures show how Maikspy variants from 2016 to 2018 are connected to C&C servers (found in this appendix, along with the Android and Windows hashes) used by the attackers: Figure 20. | [
{
"id": 51783,
"label": "malware",
"start_offset": 31,
"end_offset": 38
},
{
"id": 51784,
"label": "SOFTWARE",
"start_offset": 135,
"end_offset": 142
},
{
"id": 51785,
"label": "SOFTWARE",
"start_offset": 147,
"end_offset": 154
}
] | [] | [] |
4,207 | This time, the threat actor seems to have a new modus operandi, setting up two new websites and new payloads with which to compromise its targets. | [] | [] | [] |
5,478 | The chat logs shed light on the social engineering used by the operators to persuade victims to install the cyberespionage malware on their Android devices. | [
{
"id": 51470,
"label": "SOFTWARE",
"start_offset": 140,
"end_offset": 147
},
{
"id": 51469,
"label": "attack-pattern",
"start_offset": 32,
"end_offset": 50
}
] | [] | [] |
3,249 | This file contains the victim ID assigned by the command-and-control (C&C) server. | [] | [] | [] |
10,468 | If the link was not active, the user was redirected directly to a legitimate website. | [] | [] | [] |
3,514 | Protux: | [
{
"id": 10643,
"label": "malware",
"start_offset": 0,
"end_offset": 6
}
] | [] | [] |
1,290 | It attempts to obtain a handle to this window using the FindWindowW API call and then proceeds to send the following command to this executable. | [] | [] | [] |
3,359 | Indicators of Compromise (IoCs) SHA256 Filename Note Analysis 84fbf74896d2a1b62d73b9a5d0be2f627d522fc811fe08044e5485492d2d4249 big.txt BIOPASS RAT Python Script (Version 3) TrojanSpy.Python.BIOPASS.A f3c96145c9d6972df265e12accfcd1588cee8af1b67093011e31b44d0200871f c1222.txt BIOPASS RAT Python Script (C1222 module) Trojan.Python.BIOPASS.A 0f8a87ca5f94949904804442c1a0651f99ba17ecf989f46a3b2fde8de455c4a4 c1222.txt BIOPASS RAT Python Script (C1222 module) Trojan.Python.BIOPASS.A d8b1c4ad8f31c735c51cb24e9f767649f78ef5c571769fbaac9891c899c33444 c1222.txt BIOPASS RAT Python Script (C1222 module) | [
{
"id": 10167,
"label": "SHA1",
"start_offset": 71,
"end_offset": 135
},
{
"id": 10168,
"label": "malware",
"start_offset": 146,
"end_offset": 157
},
{
"id": 10169,
"label": "SHA1",
"start_offset": 213,
"end_offset": 277
},
{
"id": 10170,
"label": "malware",
"start_offset": 290,
"end_offset": 301
},
{
"id": 10171,
"label": "SHA2",
"start_offset": 357,
"end_offset": 421
},
{
"id": 10172,
"label": "malware",
"start_offset": 434,
"end_offset": 445
},
{
"id": 10173,
"label": "SHA2",
"start_offset": 501,
"end_offset": 565
},
{
"id": 10174,
"label": "malware",
"start_offset": 578,
"end_offset": 589
},
{
"id": 48970,
"label": "FILEPATH",
"start_offset": 137,
"end_offset": 144
},
{
"id": 48972,
"label": "FILEPATH",
"start_offset": 279,
"end_offset": 288
},
{
"id": 48975,
"label": "malware",
"start_offset": 476,
"end_offset": 499
},
{
"id": 48976,
"label": "FILEPATH",
"start_offset": 567,
"end_offset": 576
},
{
"id": 48974,
"label": "FILEPATH",
"start_offset": 423,
"end_offset": 432
},
{
"id": 48971,
"label": "malware",
"start_offset": 185,
"end_offset": 211
},
{
"id": 48973,
"label": "malware",
"start_offset": 332,
"end_offset": 355
}
] | [
{
"id": 516,
"from_id": 10167,
"to_id": 10168,
"type": "indicates"
},
{
"id": 517,
"from_id": 48970,
"to_id": 10168,
"type": "indicates"
},
{
"id": 519,
"from_id": 48970,
"to_id": 10167,
"type": "duplicate-of"
},
{
"id": 520,
"from_id": 10168,
"to_id": 48971,
"type": "duplicate-of"
},
{
"id": 521,
"from_id": 10169,
"to_id": 10170,
"type": "indicates"
},
{
"id": 522,
"from_id": 48972,
"to_id": 10170,
"type": "indicates"
},
{
"id": 523,
"from_id": 48972,
"to_id": 10169,
"type": "duplicate-of"
},
{
"id": 524,
"from_id": 48973,
"to_id": 10170,
"type": "duplicate-of"
},
{
"id": 525,
"from_id": 10171,
"to_id": 10172,
"type": "indicates"
},
{
"id": 526,
"from_id": 48974,
"to_id": 10172,
"type": "indicates"
},
{
"id": 527,
"from_id": 48975,
"to_id": 10172,
"type": "duplicate-of"
},
{
"id": 528,
"from_id": 48974,
"to_id": 10171,
"type": "duplicate-of"
},
{
"id": 529,
"from_id": 10173,
"to_id": 10174,
"type": "indicates"
},
{
"id": 530,
"from_id": 48976,
"to_id": 10174,
"type": "indicates"
},
{
"id": 531,
"from_id": 48976,
"to_id": 10173,
"type": "duplicate-of"
}
] | [] |
5,203 | Scope | [] | [] | [] |
2,650 | The ransomware note was also used to recruit insiders from victim organizations. | [] | [] | [] |
8,825 | For example in 2017, our Security Reliability Engineering team measured a record-breaking UDP amplification attack sourced out of several Chinese ISPs (ASNs 4134, 4837, 58453, and 9394), which remains the largest bandwidth attack of which we are aware. | [
{
"id": 27338,
"label": "attack-pattern",
"start_offset": 94,
"end_offset": 107
},
{
"id": 27341,
"label": "location",
"start_offset": 163,
"end_offset": 167
},
{
"id": 27343,
"label": "location",
"start_offset": 176,
"end_offset": 179
},
{
"id": 27344,
"label": "location",
"start_offset": 242,
"end_offset": 245
}
] | [] | [] |
4,079 | Hence, the command will be this format: <command code>`<custom-base64encoded-data>[`<more-custom-base64encoded-data>] HTShell currently supports three different backdoor functions, shown here: Command code Function 0 Open a command shell for command execution 1 | [
{
"id": 49915,
"label": "malware",
"start_offset": 119,
"end_offset": 126
}
] | [] | [] |
9,023 | Lazarus’ backend logs also record victim IP addresses. | [] | [] | [] |
7,703 | The encrypted sample — via XOR encoding/URL encoding — also received a response from the C&C encrypted with XOR. | [
{
"id": 23942,
"label": "location",
"start_offset": 14,
"end_offset": 20
},
{
"id": 23943,
"label": "attack-pattern",
"start_offset": 40,
"end_offset": 52
}
] | [] | [] |
665 | In this threat brief we show you five different ways that Office documents can be subverted and abused to attack and compromise a Windows endpoint, some we’ve already posted about before, and some are new. | [
{
"id": 46244,
"label": "SOFTWARE",
"start_offset": 130,
"end_offset": 137
}
] | [] | [] |
7,178 | To help prevent any damage, we decided to publish our findings before the group deploys the attack. | [] | [] | [] |
11,219 | Once the attacker has logged in to the victim’s account, HYPERSCRAPE checks to see if the language is set to English, changing it if not. | [] | [] | [] |
4,771 | For example, users are provided visibility into the permissions requested by each app, and they are able to control those permissions. | [] | [] | [] |
1,518 | If the file does receive data from the server in excess of 20 bytes it will be in the following format: <2 byte data length><0xABCDEF88><zlib-encrypted data> The decrypted data will contain the following fields: The attack type field is used to determine if a SYN DDoS or DNS DDoS is used in an attack. | [] | [] | [] |
13,060 | Analysis of Kinsing Malware's Use of Rootkit | [
{
"id": 48892,
"label": "malware",
"start_offset": 12,
"end_offset": 29
},
{
"id": 40769,
"label": "attack-pattern",
"start_offset": 37,
"end_offset": 44
}
] | [] | [] |
1,676 | This password is set to “Password” by default, but can be retrieved from NetWire binaries if the attacker used something more secure. | [
{
"id": 4975,
"label": "malware",
"start_offset": 73,
"end_offset": 80
}
] | [] | [] |
8,931 | In this case, we can see that it took an hour and a half for the attackers to modify the legitimate installer and add malicious code to it. | [
{
"id": 27616,
"label": "location",
"start_offset": 8,
"end_offset": 12
},
{
"id": 27617,
"label": "location",
"start_offset": 17,
"end_offset": 20
},
{
"id": 27618,
"label": "TIME",
"start_offset": 38,
"end_offset": 56
},
{
"id": 27619,
"label": "location",
"start_offset": 110,
"end_offset": 113
}
] | [] | [] |
7,515 | A simple RSA algorithm with very small keys encrypts the message seen above. | [
{
"id": 23365,
"label": "identity",
"start_offset": 9,
"end_offset": 12
},
{
"id": 23366,
"label": "location",
"start_offset": 33,
"end_offset": 38
}
] | [] | [] |
13,058 | Botnets Have Been Silently Mass-Scanning the Internet for Unsecured ENV Files Security firm Greynoise found that multiple threat actors, while drawing little attention to themselves, have spent the past two to three years mass-scanning the internet for ENV (environment) files that were accidentally uploaded and left exposed on web servers. | [] | [] | [] |
4,720 | iPhone users could be compromised by receiving a malicious iMessage text, without ever needing to click a malicious link. | [
{
"id": 50620,
"label": "SOFTWARE",
"start_offset": 59,
"end_offset": 67
}
] | [] | [] |
1,895 | The threat actor sets up these fake websites describing the application and linking to the Google Play Store to download it, like in the case of the malicious website, pikrpro[.]eu, seen below Another sample website involved the use of a closely copied version of an existing website, with slight changes in the logo and options above the page. | [
{
"id": 47027,
"label": "SOFTWARE",
"start_offset": 91,
"end_offset": 108
},
{
"id": 47028,
"label": "DOMAIN",
"start_offset": 168,
"end_offset": 180
}
] | [] | [] |
10,846 | MSG_CONNECTIVITY | [] | [] | [] |
2,258 | While the malware lacked a large set of capabilities, it had a wealth of interesting and advanced features, such as the custom encryption/encoding witnessed in the network traffic, the use of process hollowing against a randomly selected Microsoft Windows binary, and the downloading component that attempted to bypass network security measures by modifying the executable header. | [
{
"id": 47331,
"label": "SOFTWARE",
"start_offset": 238,
"end_offset": 255
},
{
"id": 47330,
"label": "attack-pattern",
"start_offset": 192,
"end_offset": 209
}
] | [] | [] |
13,212 | Threat actors like Tropic Trooper can also use an invisible web shell to hide its C&C server location and make incident response tricky. | [
{
"id": 41203,
"label": "location",
"start_offset": 34,
"end_offset": 37
},
{
"id": 41204,
"label": "attack-pattern",
"start_offset": 60,
"end_offset": 69
},
{
"id": 41205,
"label": "location",
"start_offset": 102,
"end_offset": 105
}
] | [] | [] |
4,880 | We hope that improved understanding of the tactics and techniques will enhance threat hunting capability and lead to stronger user protections across the industry. | [] | [] | [] |
1,169 | From edge case to systematic misclassifications, mutex usage is even more generally the canary in a coal mine than was previously realized. While tedious and time consuming, combing through mutex names did come with more than a few good laughs. | [] | [] | [] |
2,213 | While the link above shows a file extension of an image, the transferred file is in fact a modified executable file. The downloaded file has the first two bytes of the PE file format replaced with the characters ‘DW’, instead of the usual ‘MZ’. | [] | [] | [] |
14,369 | It can protect users against malware, zero-day and known exploits, privacy leaks, and application vulnerability. | [] | [] | [] |
3,587 | After inspection we noticed that this version of CyaX was similarly notable due to two characteristics. | [
{
"id": 49371,
"label": "tools",
"start_offset": 49,
"end_offset": 53
}
] | [] | [] |
1,237 | A user can set a system-wide default SMS app as the only app with permission to send and receive SMS. | [] | [] | [] |
10,963 | APP was designed specifically for high-risk accounts. | [] | [] | [] |
5,275 | It can protect users against malware, zero-day and known exploits, privacy leaks, and application vulnerability. | [] | [] | [] |
13,317 | Spear-phishing emails, for instance, rely on baiting targets with socially engineered documents. | [
{
"id": 41445,
"label": "location",
"start_offset": 0,
"end_offset": 5
},
{
"id": 41446,
"label": "attack-pattern",
"start_offset": 6,
"end_offset": 14
}
] | [] | [] |
1,046 | This post is also available in: 日本語 (Japanese) Today, Palo Alto Networks Unit 42 researchers are announcing details on a new high- severity vulnerability affecting the Google Android platform. | [
{
"id": 46537,
"label": "identity",
"start_offset": 60,
"end_offset": 98
},
{
"id": 46538,
"label": "SOFTWARE",
"start_offset": 174,
"end_offset": 197
}
] | [] | [] |
1,234 | However, two months ago, WildFire discovered a new Android malware, Cardbuyer, that circumvents this verification technique. | [
{
"id": 46615,
"label": "SOFTWARE",
"start_offset": 25,
"end_offset": 33
},
{
"id": 46616,
"label": "SOFTWARE",
"start_offset": 51,
"end_offset": 58
},
{
"id": 46617,
"label": "malware",
"start_offset": 68,
"end_offset": 77
}
] | [] | [] |
6,169 | After the attackers gain a foothold into the system — either through XSS injection or Service Worker — the next (and final part) of the attack chain, the exfiltration of the mailbox, is initiated. | [
{
"id": 19076,
"label": "attack-pattern",
"start_offset": 69,
"end_offset": 72
},
{
"id": 19077,
"label": "location",
"start_offset": 113,
"end_offset": 116
}
] | [] | [] |
2,834 | This is likely due to increased uptake of the patch MS17-010 in light of the WanaCrypt0r attacks, as well as efforts made within the security community. | [
{
"id": 48043,
"label": "malware",
"start_offset": 77,
"end_offset": 88
}
] | [] | [] |
8,031 | Users were instructed to activate an invitation to a (fake) webinar by logging in. | [] | [] | [] |
13,077 | Cybercriminals have recently been focusing their efforts on the retail industry, launching ransomware-based attacks that could prove disastrous for businesses if it disrupts their operations during important shopping seasons. | [] | [] | [] |
13,857 | Outages have already started affecting motorists. | [] | [] | [] |
13,011 | We encourage any potential targets to enable Google Account Level Enhanced Safe Browsing and ensure that all devices are updated. | [] | [] | [] |
3,129 | An easy thing you can do is restart your router once a week (typically by unplugging it). | [] | [] | [] |
8,046 | One of APT35’s novel techniques involves using Telegram for operator notifications. | [] | [] | [] |
10,897 | Possible connections to StrongPity | [
{
"id": 33177,
"label": "threat-actor",
"start_offset": 24,
"end_offset": 34
}
] | [] | [] |
4,718 | Google was able to identify the vulnerability in use and fix the exploit quickly. | [
{
"id": 50616,
"label": "identity",
"start_offset": 0,
"end_offset": 6
}
] | [] | [] |
13,118 | That’s why we’re delighted to be a launch partner for new AWS Marketplace feature. | [
{
"id": 48902,
"label": "SOFTWARE",
"start_offset": 58,
"end_offset": 62
}
] | [] | [] |
7,371 | Another variant executes a set of commands once a system is successfully compromised. | [] | [] | [] |
3,120 | Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address! Please mark, I'm not a robot! | [] | [] | [] |
3,462 | This can be an indication that these malware tools were developed by the same group. | [] | [] | [] |
4,508 | Spoofers may send forged messages using an organization’s real name or domain to subvert authentication measures. | [] | [] | [] |
1,232 | Previous attack cases, such as Zitmo and Cardbuyer, showed the risk of using SMS for payment authentication. | [
{
"id": 46613,
"label": "malware",
"start_offset": 31,
"end_offset": 36
},
{
"id": 46614,
"label": "malware",
"start_offset": 41,
"end_offset": 50
}
] | [] | [] |
4,326 | The file is then loaded in memory via PowerShell. | [
{
"id": 50128,
"label": "tools",
"start_offset": 38,
"end_offset": 48
}
] | [] | [] |
10,001 | Internal PlugX date dword value inside the printdat.dll file Mitigating supply chain attacks | [
{
"id": 30529,
"label": "malware",
"start_offset": 9,
"end_offset": 14
},
{
"id": 30530,
"label": "location",
"start_offset": 15,
"end_offset": 19
},
{
"id": 30531,
"label": "location",
"start_offset": 72,
"end_offset": 78
}
] | [] | [] |
1,672 | Upon receipt of a command from the server, a single function is called to decrypt the payload data and execute the received instruction. | [] | [] | [] |
14,364 | Figure 21. Connection of Maikspy variants to 107[.]180[.]46[.]243 and hxxp://fakeomegle[.]com Figure 22. Connection of Maikspy variants to 198[.]12[.]149[.]13and hxxp://miakhalifagame[.]com/ | [
{
"id": 51779,
"label": "URL",
"start_offset": 163,
"end_offset": 191
},
{
"id": 51777,
"label": "URL",
"start_offset": 70,
"end_offset": 93
},
{
"id": 51781,
"label": "malware",
"start_offset": 120,
"end_offset": 127
},
{
"id": 51778,
"label": "IPV4",
"start_offset": 140,
"end_offset": 159
},
{
"id": 51780,
"label": "malware",
"start_offset": 25,
"end_offset": 32
},
{
"id": 44372,
"label": "IPV4",
"start_offset": 45,
"end_offset": 65
}
] | [
{
"id": 1161,
"from_id": 51780,
"to_id": 44372,
"type": "communicates-with"
},
{
"id": 1162,
"from_id": 51780,
"to_id": 51777,
"type": "communicates-with"
},
{
"id": 1163,
"from_id": 51781,
"to_id": 51778,
"type": "communicates-with"
},
{
"id": 1164,
"from_id": 51781,
"to_id": 51779,
"type": "communicates-with"
}
] | [] |
14,030 | We assume there are multiple developers within APT37, and not all of them follow the same practices. | [
{
"id": 47196,
"label": "threat-actor",
"start_offset": 47,
"end_offset": 52
}
] | [] | [] |
14,195 | First comes continuous risk-based patching, multi-factor authentication, network monitoring, least privilege access, data encryption, phishing awareness training, and other cyber-hygiene steps. | [] | [] | [] |
1,006 | Some accounts advertised candidacy towards registration for student discount at retailers such as Amazon, BestBuy, Apple, and Dell. | [
{
"id": 46508,
"label": "identity",
"start_offset": 126,
"end_offset": 130
},
{
"id": 46507,
"label": "identity",
"start_offset": 115,
"end_offset": 120
},
{
"id": 46505,
"label": "identity",
"start_offset": 98,
"end_offset": 104
},
{
"id": 46506,
"label": "identity",
"start_offset": 106,
"end_offset": 113
}
] | [] | [] |
4,635 | HYPERSCRAPE demonstrates Charming Kitten’s commitment to developing and maintaining purpose-built capabilities. | [
{
"id": 50555,
"label": "malware",
"start_offset": 0,
"end_offset": 11
},
{
"id": 14080,
"label": "threat-actor",
"start_offset": 25,
"end_offset": 40
}
] | [] | [] |
12,962 | We haven’t retrieved a copy of the exploit. | [] | [] | [] |
20 | The other list is of last week’s campaign by the same attackers (exhaustive or close to it). Palo Alto Networks Enterprise Security Platform would have stopped this ransomware attack campaign thanks to the platform’s unique integration between the network, endpoint and the cloud to maximize security. | [
{
"id": 45809,
"label": "identity",
"start_offset": 94,
"end_offset": 112
}
] | [] | [] |
586 | Highlights from the 2021 Unit 42 Ransomware Threat Report Ransomware Threat Assessments: A Companion to the 2021 Unit 42 Ransomware Threat Report Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address! | [
{
"id": 1956,
"label": "identity",
"start_offset": 26,
"end_offset": 33
},
{
"id": 1958,
"label": "identity",
"start_offset": 115,
"end_offset": 122
}
] | [] | [] |
90 | Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address! | [] | [] | [] |
4,276 | Lately, they have been sending multiple RTF files exploiting CVE-2017-8570. | [
{
"id": 50077,
"label": "vulnerability",
"start_offset": 61,
"end_offset": 74
}
] | [] | [] |
8,552 | We have a long-standing policy to send you a warning if we detect that your account is a target of government-backed phishing or malware attempts. | [
{
"id": 26417,
"label": "location",
"start_offset": 10,
"end_offset": 14
},
{
"id": 26418,
"label": "location",
"start_offset": 89,
"end_offset": 95
},
{
"id": 26419,
"label": "attack-pattern",
"start_offset": 117,
"end_offset": 125
}
] | [] | [] |
2,640 | Palo Alto Networks customers receive protections against LockBit 2.0 attacks from Cortex XDR, as well as from the WildFire cloud-delivered security subscription for the Next-Generation Firewall. | [
{
"id": 47824,
"label": "malware",
"start_offset": 58,
"end_offset": 69
},
{
"id": 45640,
"label": "identity",
"start_offset": 1,
"end_offset": 19
},
{
"id": 45642,
"label": "SOFTWARE",
"start_offset": 83,
"end_offset": 93
},
{
"id": 45643,
"label": "SOFTWARE",
"start_offset": 115,
"end_offset": 123
}
] | [] | [] |
5,670 | This past year, TAG has been collaborating with Google’s CyberCrime Investigation Group to disrupt Glupteba activity involving Google services. | [
{
"id": 17466,
"label": "malware",
"start_offset": 99,
"end_offset": 107
}
] | [] | [] |
4,633 | We have taken actions to re-secure these accounts and have notified the victims through our Government Backed Attacker Warnings. | [] | [] | [] |
843 | Privilege escalation attacks against the kernel have been around for some time and are well-known and can be well protected against. Kernel APC attacks however are a different class of attack. | [
{
"id": 2760,
"label": "attack-pattern",
"start_offset": 1,
"end_offset": 21
},
{
"id": 44889,
"label": "attack-pattern",
"start_offset": 135,
"end_offset": 153
}
] | [] | [] |