id
int64
1
14.4k
text
stringlengths
3
5.01k
entities
list
relations
list
Comments
list
2,489
Since exploitation is straightforward and all the relevant technical details have already gone viral on the internet, it’s possible that SpringShell will become fully weaponized and abused on a larger scale.
[ { "id": 47572, "label": "vulnerability", "start_offset": 137, "end_offset": 148 } ]
[]
[]
10,091
Supernova, one of the malicious components associated with the attack, is a .NET web shell backdoor that presents itself as a legitimate SolarWinds web service handler.
[ { "id": 30777, "label": "tools", "start_offset": 0, "end_offset": 9 }, { "id": 30778, "label": "location", "start_offset": 11, "end_offset": 14 }, { "id": 30779, "label": "attack-pattern", "start_offset": 81, "end_offset": 90 }, { "id": 30780, "label": "identity", "start_offset": 137, "end_offset": 147 }, { "id": 30781, "label": "attack-pattern", "start_offset": 148, "end_offset": 159 } ]
[]
[]
2,198
This check exists in a number of the subsequent processes/executables used by the TDrop2 malware variant.
[ { "id": 6600, "label": "malware", "start_offset": 82, "end_offset": 88 } ]
[]
[]
258
For example, we detected a website that was distributing a malicious binary by masquerading as a popular global communication app targeting users in Ukraine.
[ { "id": 847, "label": "attack-pattern", "start_offset": 79, "end_offset": 91 }, { "id": 44662, "label": "location", "start_offset": 149, "end_offset": 156 }, { "id": 44663, "label": "attack-pattern", "start_offset": 44, "end_offset": 75 } ]
[]
[]
5,118
[00:59] It makes for interesting cinema, just like the red code/green code in CSI Cyber, but it's not a reflection of reality and that's a real challenge.
[]
[]
[]
4,122
Checks environment information 0x500E Unknown
[]
[]
[]
8,149
In addition, a URL linking to one of the apps’ Google Play pages is also found on one of the C&C servers.
[]
[]
[]
12,619
Before it encrypts any file, the ransomware also performs certain preparatory routines.
[]
[]
[]
3,321
These database files are used for saving the chat history.
[]
[]
[]
2,200
Once extracted, the file writes it to a new file on disk prior to executing it.
[]
[]
[]
3,973
A consolidated view of all security sensors provides a single-pane-of-glass view that will promote quick and thorough investigation and response.
[]
[]
[]
12,086
Indicators from APT28 phishing campaign: service-reset-password-moderate-digital.rf[.]gd reset-service-identity-mail.42web[.]io digital-email-software.great-site[.]net Indicators from APT35 campaigns: Abused Google Properties: https://sites.google[.]com/view/ty85yt8tg8-download-rtih4ithr/ https://sites.google[.]com/view/user-id-568245/ https://sites.google[.]com/view/hhbejfdwdhwuhscbsb-xscvhdvbc/ Abused Dropbox Properties: https://www.dropbox[.]com/s/68y4vpfu8pc3imf/Iraq&Jewish.pdf
[ { "id": 37413, "label": "threat-actor", "start_offset": 16, "end_offset": 21 }, { "id": 37414, "label": "attack-pattern", "start_offset": 22, "end_offset": 30 }, { "id": 37415, "label": "location", "start_offset": 31, "end_offset": 39 }, { "id": 37416, "label": "threat-actor", "start_offset": 185, "end_offset": 190 }, { "id": 37417, "label": "URL", "start_offset": 229, "end_offset": 255 }, { "id": 37418, "label": "location", "start_offset": 256, "end_offset": 260 }, { "id": 37419, "label": "URL", "start_offset": 292, "end_offset": 318 }, { "id": 37420, "label": "location", "start_offset": 319, "end_offset": 323 }, { "id": 37421, "label": "URL", "start_offset": 340, "end_offset": 366 }, { "id": 37422, "label": "location", "start_offset": 367, "end_offset": 371 }, { "id": 37423, "label": "malware", "start_offset": 410, "end_offset": 417 }, { "id": 37424, "label": "URL", "start_offset": 430, "end_offset": 455 } ]
[]
[]
468
In this environment blocking and taking down DGA-related domains quickly becomes a game of “whack a mole” that is sometimes futile.
[]
[]
[]
1,889
In our previous entry, we already covered the Delphi component in the context of the Confucius and Patchwork connection.
[ { "id": 47022, "label": "threat-actor", "start_offset": 85, "end_offset": 94 }, { "id": 47023, "label": "threat-actor", "start_offset": 99, "end_offset": 108 } ]
[]
[]
7,369
The script then waits 20 minutes before it runs the wrapper script initall: 2e2c9d08c7c955f6ce5e27e70b0ec78a888c276d71a72daa0ef9e3e40f019a1a initall Figure 2.
[ { "id": 22893, "label": "location", "start_offset": 16, "end_offset": 21 }, { "id": 22894, "label": "TIME", "start_offset": 22, "end_offset": 32 }, { "id": 22895, "label": "SHA2", "start_offset": 76, "end_offset": 140 } ]
[]
[]
8,563
Users were instructed to activate an invitation to a (fake) webinar by logging in.
[]
[]
[]
1,875
(SC) StartService FAILED 1275: This driver has been blocked from loading
[]
[]
[]
1,972
In fact, a 32 byte length is always read, which could lead to a buffer out-of-bounds condition.
[]
[]
[]
4,699
The following testimony was delivered to the U.S. House Intelligence Committee by Shane Huntley, Senior Director of Google’s Threat Analysis Group (TAG) on July 27, 2022. Chairman Schiff, Ranking Member Turner, and esteemed Members of the Committee: Thank you for the opportunity to appear before the Committee to discuss Google’s efforts to protect users from commercial spyware.
[ { "id": 50584, "label": "identity", "start_offset": 83, "end_offset": 96 }, { "id": 50585, "label": "TIME", "start_offset": 157, "end_offset": 170 }, { "id": 50587, "label": "identity", "start_offset": 324, "end_offset": 330 }, { "id": 50583, "label": "identity", "start_offset": 46, "end_offset": 79 }, { "id": 50586, "label": "identity", "start_offset": 173, "end_offset": 188 }, { "id": 50588, "label": "identity", "start_offset": 98, "end_offset": 153 } ]
[]
[]
3,595
Note that this does not cover all the samples – it is possible that other payloads are being deployed as well.
[]
[]
[]
3,187
We found that the BIOPASS RAT has the ability to open an HTTP service running on localhost on a port chosen from a hard-coded list.
[ { "id": 48314, "label": "malware", "start_offset": 18, "end_offset": 29 } ]
[]
[]
1,478
The developer is aware of this concern and plans to encourage more of its customers to sign their own applications in the coming year.
[]
[]
[]
1,421
Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address! Please mark, I'm not a robot!
[]
[]
[]
115
A challenge many organizations face is that the cloud isn’t simple, and many of the technologies that make up the cloud are new, with new features being deployed all the time.
[]
[]
[]
3,399
BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 7d0d7d416db5bd7201420982987e213a129eef2314193e4558a24f3c9a91a38e flash_installer.exe
[ { "id": 10261, "label": "malware", "start_offset": 0, "end_offset": 11 }, { "id": 10262, "label": "SHA2", "start_offset": 46, "end_offset": 110 }, { "id": 49062, "label": "malware", "start_offset": 20, "end_offset": 44 }, { "id": 49063, "label": "FILEPATH", "start_offset": 112, "end_offset": 131 } ]
[ { "id": 632, "from_id": 49063, "to_id": 49062, "type": "indicates" }, { "id": 633, "from_id": 10262, "to_id": 49062, "type": "indicates" }, { "id": 634, "from_id": 10261, "to_id": 49062, "type": "duplicate-of" }, { "id": 635, "from_id": 10262, "to_id": 49063, "type": "duplicate-of" } ]
[]
12,193
JuneWe terminated 33 YouTube channels as part of our investigation into coordinated influence operations linked to Azerbaijan.
[]
[]
[]
491
Users will interact with the window, thinking they are performing their intended function, but they are actually engaging with the attackers overlay window and executing the attacker’s desired function.
[]
[]
[]
1,524
Currently these IP addresses are alive and active.
[]
[]
[]
2,690
Note: This is not an all-inclusive list of the protections provided by Palo Alto Networks.
[ { "id": 8237, "label": "identity", "start_offset": 71, "end_offset": 89 } ]
[]
[]
2,570
This underscores why credential theft is something that organizations should prioritize as a top threat and take steps to understand it and prevent it.
[ { "id": 47767, "label": "attack-pattern", "start_offset": 22, "end_offset": 38 } ]
[]
[]
1,196
The reason is because most SMS-based IAP SDKs include comprehensive functionalities to monitor, manage, and even intercept a user’s SMS communication silently in the background, without any user interaction or knowledge.
[]
[]
[]
4,061
The capability of ChiserClient is shown in the following table: Command code Function 0x10001
[ { "id": 12290, "label": "malware", "start_offset": 18, "end_offset": 30 } ]
[]
[]
1,202
According to JoloPlay’s website, these 17 games have been downloaded and installed more than 1.7 million times.
[ { "id": 46593, "label": "SOFTWARE", "start_offset": 13, "end_offset": 22 } ]
[]
[]
10,722
The specificity of their targets stems from the social engineering tactics used.
[]
[]
[]
876
analysis sample PClock2 is written in Visual Basic.
[ { "id": 46410, "label": "SOFTWARE", "start_offset": 39, "end_offset": 51 }, { "id": 44898, "label": "malware", "start_offset": 17, "end_offset": 24 } ]
[ { "id": 188, "from_id": 44898, "to_id": 46410, "type": "uses" } ]
[]
5,399
Figure 13.
[]
[]
[]
7,789
log
[]
[]
[]
3,189
It conducts this identification by testing whether the port is open or not and then by checking the response. Figure 3.
[]
[]
[]
634
The latest version of the Petya ransomware is spreading over Windows SMB and is reportedly using the ETERNALBLUE exploit tool, which exploits CVE-2017-0144 and was originally released by the Shadow Brokers group in April 2017.
[ { "id": 2111, "label": "malware", "start_offset": 27, "end_offset": 32 }, { "id": 2113, "label": "malware", "start_offset": 102, "end_offset": 113 }, { "id": 2116, "label": "threat-actor", "start_offset": 188, "end_offset": 206 }, { "id": 46221, "label": "SOFTWARE", "start_offset": 62, "end_offset": 73 }, { "id": 46222, "label": "vulnerability", "start_offset": 143, "end_offset": 156 }, { "id": 46223, "label": "TIME", "start_offset": 216, "end_offset": 226 } ]
[ { "id": 171, "from_id": 2111, "to_id": 46222, "type": "exploits" }, { "id": 170, "from_id": 2111, "to_id": 46221, "type": "targets" }, { "id": 172, "from_id": 2116, "to_id": 2113, "type": "authored-by" }, { "id": 173, "from_id": 46222, "to_id": 46221, "type": "targets" } ]
[]
168
From an engineering point of view, this sole, specific targeting of files that matter significantly increases the chances of ransomware’s success.
[]
[]
[]
2,723
This vulnerability exists within the Microsoft Server Message Block 3.0 (SMBv3), specifically regarding malformed compression headers.
[ { "id": 47964, "label": "SOFTWARE", "start_offset": 39, "end_offset": 81 } ]
[]
[]
793
For the foreseeable future, Microsoft may introduce more defensive mechanisms against use-after-free bugs or even heap fengshui to reduce the risk of being exploited.
[ { "id": 46354, "label": "identity", "start_offset": 29, "end_offset": 38 } ]
[]
[]
13,522
The US Department of Energy (DOE) recently launched the Operational Technology (OT) Defender Fellowship.
[ { "id": 51581, "label": "identity", "start_offset": 4, "end_offset": 33 } ]
[]
[]
5,412
In the case of Cyclops Blink, we received samples targeting Asus routers that were not previously reported on.
[ { "id": 51416, "label": "malware", "start_offset": 15, "end_offset": 28 } ]
[]
[]
8,965
Afterward, one more warning about the unverified developer is displayed.
[]
[]
[]
3,946
Execution of arbitrary commands via session id
[]
[]
[]
7,305
OceanLotus commands and descriptions
[ { "id": 22767, "label": "malware", "start_offset": 0, "end_offset": 10 }, { "id": 22768, "label": "location", "start_offset": 20, "end_offset": 23 } ]
[]
[]
5,446
What is it?
[]
[]
[]
4,985
We assess with high confidence this vulnerability was sold by an exploit broker and probably abused by more than one surveillance vendor.
[]
[]
[]
1,794
The ADSS JAVA component (C:\ManageEngine\ADSelfService Plus\jre\bin\java.exe) executed mshta.exe to remotely run a remotely-hosted HTML application (HTA) file from the attackers’ command and control (C&C) server.
[ { "id": 45134, "label": "FILEPATH", "start_offset": 25, "end_offset": 76 }, { "id": 45135, "label": "FILEPATH", "start_offset": 87, "end_offset": 96 } ]
[]
[]
8,642
In our environment, we did not receive any payloads past this stage.
[]
[]
[]
14,356
Two months later, the C&C server was changed to hxxp://miakhalifagame[.]com.
[ { "id": 51789, "label": "URL", "start_offset": 48, "end_offset": 75 } ]
[]
[]
5,705
This script was designed to show a social engineering message — typically a Flash update popup or a DNS error (note that Adobe discontinued Flash Player at the end of December 2020) that then instructed the visitor to download a malicious file that turned out to be a Cobalt Strike loader.
[]
[]
[]
731
Additionally, Prisma Cloud users can also build a custom vulnerability detection rule to identify if any system is running an OMI package with a version previous to 1.6.8.1.
[ { "id": 46314, "label": "SOFTWARE", "start_offset": 14, "end_offset": 26 }, { "id": 46315, "label": "SOFTWARE", "start_offset": 126, "end_offset": 129 } ]
[]
[]
4,552
This is the first known instance of Turla distributing Android-related malware.
[ { "id": 50361, "label": "threat-actor", "start_offset": 36, "end_offset": 41 }, { "id": 50362, "label": "SOFTWARE", "start_offset": 55, "end_offset": 62 } ]
[ { "id": 949, "from_id": 50361, "to_id": 50362, "type": "targets" } ]
[]
7,732
Enabling the macros of the Excel file downloads a file created using NSIS installer with ServHelper from 79[.]141[.]168[.]105 or 195[.]123[.]213[.]126.
[ { "id": 24012, "label": "malware", "start_offset": 69, "end_offset": 73 }, { "id": 24013, "label": "tools", "start_offset": 89, "end_offset": 99 }, { "id": 24014, "label": "IPV4", "start_offset": 105, "end_offset": 125 }, { "id": 24015, "label": "IPV4", "start_offset": 129, "end_offset": 150 } ]
[]
[]
2,171
Palo Alto Networks and Unit 42 will continue to monitor for evidence of exploitation and further novel use cases.
[ { "id": 47305, "label": "identity", "start_offset": 0, "end_offset": 18 }, { "id": 47306, "label": "identity", "start_offset": 23, "end_offset": 30 } ]
[]
[]
9,787
Apart from knowledge and awareness of phishing and social engineering, it is also important to be prepared with effective and layered security solutions.
[ { "id": 29806, "label": "location", "start_offset": 21, "end_offset": 24 }, { "id": 29807, "label": "attack-pattern", "start_offset": 38, "end_offset": 46 }, { "id": 29808, "label": "location", "start_offset": 47, "end_offset": 50 }, { "id": 29809, "label": "location", "start_offset": 122, "end_offset": 125 }, { "id": 29810, "label": "location", "start_offset": 134, "end_offset": 142 } ]
[]
[]
14,332
The adult game first used by the attackers was also found in the list of games advertised by hxxp://www[.]roundyearfun[.]org Our analysis revealed that hxxp://www[.]roundyearfun[.]org was also used as a C&C address to save victims’ data.
[ { "id": 48560, "label": "Infrastucture", "start_offset": 202, "end_offset": 207 }, { "id": 48558, "label": "URL", "start_offset": 93, "end_offset": 124 }, { "id": 48559, "label": "URL", "start_offset": 152, "end_offset": 183 } ]
[]
[]
977
We have captured over 18,000 samples that contain the SMS stealing library since August 2015, meaning the number of affected users is considerable.
[ { "id": 46473, "label": "TIME", "start_offset": 81, "end_offset": 92 }, { "id": 46474, "label": "attack-pattern", "start_offset": 54, "end_offset": 66 } ]
[]
[]
13,862
Apart from locking Colonial Pipeline’s computer systems, DarkSide also stole over 100 GB of corporate data.
[ { "id": 42986, "label": "threat-actor", "start_offset": 57, "end_offset": 65 } ]
[]
[]
14,102
Figure 12 shows a comparison between the two samples.
[]
[]
[]
2,731
For client mitigation, recommend creating an outbound firewall rule to block SMB outbound on public and private interfaces.
[ { "id": 47973, "label": "SOFTWARE", "start_offset": 77, "end_offset": 80 } ]
[]
[]
9,737
Our analysis revealed that they drop a new backdoor, which is written in PowerShell as MuddyWater’s known POWERSTATS backdoor.
[ { "id": 29706, "label": "attack-pattern", "start_offset": 73, "end_offset": 83 }, { "id": 29708, "label": "malware", "start_offset": 106, "end_offset": 116 } ]
[]
[]
1,323
The following information is collected:
[]
[]
[]
7,799
Conclusion
[]
[]
[]
10,549
Google’s Threat Analysis Group (TAG) is a specialized team of security experts that works to identify, report, and stop government-backed phishing and hacking against Google and the people who use our products.
[ { "id": 32158, "label": "location", "start_offset": 62, "end_offset": 70 }, { "id": 32159, "label": "location", "start_offset": 111, "end_offset": 114 }, { "id": 32160, "label": "location", "start_offset": 115, "end_offset": 119 }, { "id": 32161, "label": "attack-pattern", "start_offset": 138, "end_offset": 146 }, { "id": 32162, "label": "location", "start_offset": 147, "end_offset": 150 }, { "id": 32164, "label": "location", "start_offset": 174, "end_offset": 177 } ]
[]
[]
1,939
For one, there is the domain pikrpro[.]eu and its subdomains—the islamicfinderfeedback[.]pikrpro[.]eu and the memrifilesforinfo[.]pikpro[.]eu.
[ { "id": 47063, "label": "DOMAIN", "start_offset": 110, "end_offset": 141 }, { "id": 47061, "label": "DOMAIN", "start_offset": 29, "end_offset": 41 }, { "id": 47062, "label": "DOMAIN", "start_offset": 65, "end_offset": 101 } ]
[]
[]
8,570
Although Play Store users were protected, we are highlighting the app here as TAG has seen APT35 attempt to distribute this spyware on other platforms as recently as July 2021.
[ { "id": 26484, "label": "location", "start_offset": 45, "end_offset": 48 }, { "id": 26485, "label": "threat-actor", "start_offset": 91, "end_offset": 96 } ]
[]
[]
13,687
We found a BEC mail sample that was sent from the same IP.
[]
[]
[]
718
Unit 42 recommends customers upgrade to the latest release of Confluence Server and Data Center.
[ { "id": 46285, "label": "identity", "start_offset": 0, "end_offset": 7 }, { "id": 46286, "label": "SOFTWARE", "start_offset": 62, "end_offset": 95 } ]
[]
[]
916
After it finished the encryption routine, PClock2 generates a VBScript file in the following directory:
[ { "id": 46437, "label": "malware", "start_offset": 43, "end_offset": 50 }, { "id": 46438, "label": "SOFTWARE", "start_offset": 63, "end_offset": 71 } ]
[]
[]
10,043
One of the files, rsync, is an initially obfuscated Perl-based Shellbot capable of multiple backdoor commands such as file downloading, shell cmd execution, and DDoS. Figure 4. Obfuscated Perl script Figure 5.
[ { "id": 30647, "label": "location", "start_offset": 0, "end_offset": 3 }, { "id": 30648, "label": "location", "start_offset": 52, "end_offset": 56 }, { "id": 30649, "label": "location", "start_offset": 136, "end_offset": 141 }, { "id": 30650, "label": "malware", "start_offset": 142, "end_offset": 145 }, { "id": 30651, "label": "location", "start_offset": 157, "end_offset": 160 }, { "id": 30653, "label": "location", "start_offset": 189, "end_offset": 193 } ]
[]
[]
1,881
BAT.KILLAV.YACAA
[]
[]
[]
13,626
Communication with C&C uses sockets and is encrypted with simple SUB 0x46, XOR 0x19 encryption.
[]
[]
[]
2,215
The downloaded file is dropped to the system32 folder.
[ { "id": 47321, "label": "FILEPATH", "start_offset": 39, "end_offset": 47 } ]
[]
[]
3,653
It also takes spear phishing attacks to a level that makes it nearly impossible to distinguish an attack email from a legitimate email.
[ { "id": 11070, "label": "attack-pattern", "start_offset": 14, "end_offset": 28 } ]
[]
[]
7,810
As they continue to target businesses in different sectors, we can expect TA505 to keep using phishing and social engineering techniques to compromise systems.
[ { "id": 24197, "label": "location", "start_offset": 20, "end_offset": 26 }, { "id": 24198, "label": "location", "start_offset": 63, "end_offset": 66 }, { "id": 24200, "label": "attack-pattern", "start_offset": 94, "end_offset": 102 }, { "id": 24201, "label": "location", "start_offset": 103, "end_offset": 106 } ]
[]
[]
1,379
Two instances of PowerShell are spawned with an encoded command to sleep for 10 seconds, e.g. C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBzACAAMQAwAA== 3.
[ { "id": 46711, "label": "FILEPATH", "start_offset": 94, "end_offset": 151 }, { "id": 46712, "label": "tools", "start_offset": 17, "end_offset": 27 } ]
[]
[]
1,435
When an app is published to the Google Play Store, the certificate information is included within the APK file.
[ { "id": 46767, "label": "SOFTWARE", "start_offset": 32, "end_offset": 49 } ]
[]
[]
3,233
If the file (that is, the marker) is not found, the backdoor creates a new one and writes the current timestamp onto it.
[]
[]
[]
1,942
The decoy documents tell more about Urpage's possible targets, as it contains text from articles about the region of Kashmir.
[ { "id": 47066, "label": "threat-actor", "start_offset": 36, "end_offset": 42 }, { "id": 47067, "label": "location", "start_offset": 117, "end_offset": 124 } ]
[ { "id": 300, "from_id": 47066, "to_id": 47067, "type": "targets" } ]
[]
931
AutoFocus users can find more information on samples and indicators related to this attack by viewing the PClock tag.
[ { "id": 46448, "label": "malware", "start_offset": 106, "end_offset": 112 } ]
[]
[]
1,475
We’ve contacted the developer to confirm they have retained sole custody of the keys.
[]
[]
[]
1,485
Again, using the same private key is probably due to the convenience in app management.
[]
[]
[]
7,736
Similar to the routine variant in Figure 6, the Excel VBA macros retrieve the FlawedAmmyy downloader from hxxp://195[.]123[.]245[.]185/r1 or hxxp://185[.]225[.]17[.]5/r1, in then decrypts and executes FlawedAmmyy RAT from hxxp://185[.]225[.]17[.]5/2.dat or hxxp://195[.]123[.]245[.]185/1.dat.
[ { "id": 24027, "label": "location", "start_offset": 48, "end_offset": 53 }, { "id": 24028, "label": "malware", "start_offset": 78, "end_offset": 89 }, { "id": 24029, "label": "location", "start_offset": 188, "end_offset": 191 }, { "id": 24030, "label": "malware", "start_offset": 201, "end_offset": 212 } ]
[]
[]
10,859
tfsdne:
[]
[]
[]
1,023
The price for this custom account was only ¥27 RMB ($4.40 USD); for an extra ¥13 RMB ($2.12 USD), the buyer can request a custom username at any subdomain for the given institution.
[]
[]
[]
893
Figure 4. HTTP POST request containing file paths of malware After installation, PClock2 will also set the following registry key with a value of ‘INSTALL_OK’.
[ { "id": 46422, "label": "malware", "start_offset": 83, "end_offset": 90 } ]
[]
[]
3,954
Credential access
[]
[]
[]
14,211
The malware we analyzed is separated in two files: a loader, and the payload.
[]
[]
[]
13,548
The question asked on a forum showing the payload related to Water Pamola.
[ { "id": 51624, "label": "campaign", "start_offset": 61, "end_offset": 73 } ]
[]
[]
4,455
TAG tracks and proactively counters serious state-sponsored and financially motivated information cyber criminal activities, such as hacking and the use of spyware.
[ { "id": 50232, "label": "identity", "start_offset": 0, "end_offset": 3 } ]
[]
[]
231
A phishing webpage targeting a Ukrainian state administration employee, detected by our in-house machine learning models on March 16.Our teams at Palo Alto Networks are actively monitoring the phishing landscape surrounding Ukraine-related URLs and are sharing this threat intelligence with relevant authorities in Ukraine and internationally.
[ { "id": 765, "label": "attack-pattern", "start_offset": 2, "end_offset": 10 }, { "id": 771, "label": "attack-pattern", "start_offset": 193, "end_offset": 201 }, { "id": 44647, "label": "identity", "start_offset": 31, "end_offset": 70 }, { "id": 44648, "label": "TIME", "start_offset": 124, "end_offset": 132 }, { "id": 44649, "label": "identity", "start_offset": 146, "end_offset": 164 }, { "id": 44650, "label": "location", "start_offset": 315, "end_offset": 322 } ]
[ { "id": 135, "from_id": 765, "to_id": 44647, "type": "targets" }, { "id": 136, "from_id": 771, "to_id": 44650, "type": "targets" } ]
[]
4,223
The application is a simple downloader that sends some basic information (username, antivirus, IP address, and operating system version) encrypted using triple Data Encryption Standard (DES). Figure 4.
[]
[]
[]
2,809
Unit 42 is not aware of any reports where paying the ransom to the WanaCrypt0r attackers has resulted in the recovery of data.
[ { "id": 48028, "label": "identity", "start_offset": 0, "end_offset": 7 }, { "id": 8587, "label": "malware", "start_offset": 67, "end_offset": 78 } ]
[]
[]
14,377
On one end of the spectrum are places like universities that maybe manage 10% of the endpoints on their network.
[]
[]
[]
4,543
While we continue to fight these threats on a technical level, the providers of these capabilities operate openly in democratic countries.
[]
[]
[]
2,580
This post is also available in: 日本語 (Japanese) The Lapsus$ Group threat actor has grown in just a few months from launching a handful of destructive attacks to stealing and publishing source code of multiple top-tier technology companies.
[ { "id": 45601, "label": "threat-actor", "start_offset": 57, "end_offset": 64 } ]
[]
[]
13,593
The script for modifying the shop page header to inject a web shell
[ { "id": 51682, "label": "malware", "start_offset": 4, "end_offset": 10 } ]
[]
[]