id
int64 1
14.4k
| text
stringlengths 3
5.01k
| entities
list | relations
list | Comments
list |
---|---|---|---|---|
2,489 | Since exploitation is straightforward and all the relevant technical details have already gone viral on the internet, it’s possible that SpringShell will become fully weaponized and abused on a larger scale. | [
{
"id": 47572,
"label": "vulnerability",
"start_offset": 137,
"end_offset": 148
}
] | [] | [] |
10,091 | Supernova, one of the malicious components associated with the attack, is a .NET web shell backdoor that presents itself as a legitimate SolarWinds web service handler. | [
{
"id": 30777,
"label": "tools",
"start_offset": 0,
"end_offset": 9
},
{
"id": 30778,
"label": "location",
"start_offset": 11,
"end_offset": 14
},
{
"id": 30779,
"label": "attack-pattern",
"start_offset": 81,
"end_offset": 90
},
{
"id": 30780,
"label": "identity",
"start_offset": 137,
"end_offset": 147
},
{
"id": 30781,
"label": "attack-pattern",
"start_offset": 148,
"end_offset": 159
}
] | [] | [] |
2,198 | This check exists in a number of the subsequent processes/executables used by the TDrop2 malware variant. | [
{
"id": 6600,
"label": "malware",
"start_offset": 82,
"end_offset": 88
}
] | [] | [] |
258 | For example, we detected a website that was distributing a malicious binary by masquerading as a popular global communication app targeting users in Ukraine. | [
{
"id": 847,
"label": "attack-pattern",
"start_offset": 79,
"end_offset": 91
},
{
"id": 44662,
"label": "location",
"start_offset": 149,
"end_offset": 156
},
{
"id": 44663,
"label": "attack-pattern",
"start_offset": 44,
"end_offset": 75
}
] | [] | [] |
5,118 | [00:59] It makes for interesting cinema, just like the red code/green code in CSI Cyber, but it's not a reflection of reality and that's a real challenge. | [] | [] | [] |
4,122 | Checks environment information 0x500E Unknown | [] | [] | [] |
8,149 | In addition, a URL linking to one of the apps’ Google Play pages is also found on one of the C&C servers. | [] | [] | [] |
12,619 | Before it encrypts any file, the ransomware also performs certain preparatory routines. | [] | [] | [] |
3,321 | These database files are used for saving the chat history. | [] | [] | [] |
2,200 | Once extracted, the file writes it to a new file on disk prior to executing it. | [] | [] | [] |
3,973 | A consolidated view of all security sensors provides a single-pane-of-glass view that will promote quick and thorough investigation and response. | [] | [] | [] |
12,086 | Indicators from APT28 phishing campaign: service-reset-password-moderate-digital.rf[.]gd reset-service-identity-mail.42web[.]io digital-email-software.great-site[.]net Indicators from APT35 campaigns: Abused Google Properties: https://sites.google[.]com/view/ty85yt8tg8-download-rtih4ithr/ https://sites.google[.]com/view/user-id-568245/ https://sites.google[.]com/view/hhbejfdwdhwuhscbsb-xscvhdvbc/ Abused Dropbox Properties: https://www.dropbox[.]com/s/68y4vpfu8pc3imf/Iraq&Jewish.pdf | [
{
"id": 37413,
"label": "threat-actor",
"start_offset": 16,
"end_offset": 21
},
{
"id": 37414,
"label": "attack-pattern",
"start_offset": 22,
"end_offset": 30
},
{
"id": 37415,
"label": "location",
"start_offset": 31,
"end_offset": 39
},
{
"id": 37416,
"label": "threat-actor",
"start_offset": 185,
"end_offset": 190
},
{
"id": 37417,
"label": "URL",
"start_offset": 229,
"end_offset": 255
},
{
"id": 37418,
"label": "location",
"start_offset": 256,
"end_offset": 260
},
{
"id": 37419,
"label": "URL",
"start_offset": 292,
"end_offset": 318
},
{
"id": 37420,
"label": "location",
"start_offset": 319,
"end_offset": 323
},
{
"id": 37421,
"label": "URL",
"start_offset": 340,
"end_offset": 366
},
{
"id": 37422,
"label": "location",
"start_offset": 367,
"end_offset": 371
},
{
"id": 37423,
"label": "malware",
"start_offset": 410,
"end_offset": 417
},
{
"id": 37424,
"label": "URL",
"start_offset": 430,
"end_offset": 455
}
] | [] | [] |
468 | In this environment blocking and taking down DGA-related domains quickly becomes a game of “whack a mole” that is sometimes futile. | [] | [] | [] |
1,889 | In our previous entry, we already covered the Delphi component in the context of the Confucius and Patchwork connection. | [
{
"id": 47022,
"label": "threat-actor",
"start_offset": 85,
"end_offset": 94
},
{
"id": 47023,
"label": "threat-actor",
"start_offset": 99,
"end_offset": 108
}
] | [] | [] |
7,369 | The script then waits 20 minutes before it runs the wrapper script initall: 2e2c9d08c7c955f6ce5e27e70b0ec78a888c276d71a72daa0ef9e3e40f019a1a initall Figure 2. | [
{
"id": 22893,
"label": "location",
"start_offset": 16,
"end_offset": 21
},
{
"id": 22894,
"label": "TIME",
"start_offset": 22,
"end_offset": 32
},
{
"id": 22895,
"label": "SHA2",
"start_offset": 76,
"end_offset": 140
}
] | [] | [] |
8,563 | Users were instructed to activate an invitation to a (fake) webinar by logging in. | [] | [] | [] |
1,875 | (SC) StartService FAILED 1275: This driver has been blocked from loading | [] | [] | [] |
1,972 | In fact, a 32 byte length is always read, which could lead to a buffer out-of-bounds condition. | [] | [] | [] |
4,699 | The following testimony was delivered to the U.S. House Intelligence Committee by Shane Huntley, Senior Director of Google’s Threat Analysis Group (TAG) on July 27, 2022. Chairman Schiff, Ranking Member Turner, and esteemed Members of the Committee: Thank you for the opportunity to appear before the Committee to discuss Google’s efforts to protect users from commercial spyware. | [
{
"id": 50584,
"label": "identity",
"start_offset": 83,
"end_offset": 96
},
{
"id": 50585,
"label": "TIME",
"start_offset": 157,
"end_offset": 170
},
{
"id": 50587,
"label": "identity",
"start_offset": 324,
"end_offset": 330
},
{
"id": 50583,
"label": "identity",
"start_offset": 46,
"end_offset": 79
},
{
"id": 50586,
"label": "identity",
"start_offset": 173,
"end_offset": 188
},
{
"id": 50588,
"label": "identity",
"start_offset": 98,
"end_offset": 153
}
] | [] | [] |
3,595 | Note that this does not cover all the samples – it is possible that other payloads are being deployed as well. | [] | [] | [] |
3,187 | We found that the BIOPASS RAT has the ability to open an HTTP service running on localhost on a port chosen from a hard-coded list. | [
{
"id": 48314,
"label": "malware",
"start_offset": 18,
"end_offset": 29
}
] | [] | [] |
1,478 | The developer is aware of this concern and plans to encourage more of its customers to sign their own applications in the coming year. | [] | [] | [] |
1,421 | Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address! Please mark, I'm not a robot! | [] | [] | [] |
115 | A challenge many organizations face is that the cloud isn’t simple, and many of the technologies that make up the cloud are new, with new features being deployed all the time. | [] | [] | [] |
3,399 | BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 7d0d7d416db5bd7201420982987e213a129eef2314193e4558a24f3c9a91a38e flash_installer.exe | [
{
"id": 10261,
"label": "malware",
"start_offset": 0,
"end_offset": 11
},
{
"id": 10262,
"label": "SHA2",
"start_offset": 46,
"end_offset": 110
},
{
"id": 49062,
"label": "malware",
"start_offset": 20,
"end_offset": 44
},
{
"id": 49063,
"label": "FILEPATH",
"start_offset": 112,
"end_offset": 131
}
] | [
{
"id": 632,
"from_id": 49063,
"to_id": 49062,
"type": "indicates"
},
{
"id": 633,
"from_id": 10262,
"to_id": 49062,
"type": "indicates"
},
{
"id": 634,
"from_id": 10261,
"to_id": 49062,
"type": "duplicate-of"
},
{
"id": 635,
"from_id": 10262,
"to_id": 49063,
"type": "duplicate-of"
}
] | [] |
12,193 | JuneWe terminated 33 YouTube channels as part of our investigation into coordinated influence operations linked to Azerbaijan. | [] | [] | [] |
491 | Users will interact with the window, thinking they are performing their intended function, but they are actually engaging with the attackers overlay window and executing the attacker’s desired function. | [] | [] | [] |
1,524 | Currently these IP addresses are alive and active. | [] | [] | [] |
2,690 | Note: This is not an all-inclusive list of the protections provided by Palo Alto Networks. | [
{
"id": 8237,
"label": "identity",
"start_offset": 71,
"end_offset": 89
}
] | [] | [] |
2,570 | This underscores why credential theft is something that organizations should prioritize as a top threat and take steps to understand it and prevent it. | [
{
"id": 47767,
"label": "attack-pattern",
"start_offset": 22,
"end_offset": 38
}
] | [] | [] |
1,196 | The reason is because most SMS-based IAP SDKs include comprehensive functionalities to monitor, manage, and even intercept a user’s SMS communication silently in the background, without any user interaction or knowledge. | [] | [] | [] |
4,061 | The capability of ChiserClient is shown in the following table: Command code Function 0x10001 | [
{
"id": 12290,
"label": "malware",
"start_offset": 18,
"end_offset": 30
}
] | [] | [] |
1,202 | According to JoloPlay’s website, these 17 games have been downloaded and installed more than 1.7 million times. | [
{
"id": 46593,
"label": "SOFTWARE",
"start_offset": 13,
"end_offset": 22
}
] | [] | [] |
10,722 | The specificity of their targets stems from the social engineering tactics used. | [] | [] | [] |
876 | analysis sample PClock2 is written in Visual Basic. | [
{
"id": 46410,
"label": "SOFTWARE",
"start_offset": 39,
"end_offset": 51
},
{
"id": 44898,
"label": "malware",
"start_offset": 17,
"end_offset": 24
}
] | [
{
"id": 188,
"from_id": 44898,
"to_id": 46410,
"type": "uses"
}
] | [] |
5,399 | Figure 13. | [] | [] | [] |
7,789 | log | [] | [] | [] |
3,189 | It conducts this identification by testing whether the port is open or not and then by checking the response. Figure 3. | [] | [] | [] |
634 | The latest version of the Petya ransomware is spreading over Windows SMB and is reportedly using the ETERNALBLUE exploit tool, which exploits CVE-2017-0144 and was originally released by the Shadow Brokers group in April 2017. | [
{
"id": 2111,
"label": "malware",
"start_offset": 27,
"end_offset": 32
},
{
"id": 2113,
"label": "malware",
"start_offset": 102,
"end_offset": 113
},
{
"id": 2116,
"label": "threat-actor",
"start_offset": 188,
"end_offset": 206
},
{
"id": 46221,
"label": "SOFTWARE",
"start_offset": 62,
"end_offset": 73
},
{
"id": 46222,
"label": "vulnerability",
"start_offset": 143,
"end_offset": 156
},
{
"id": 46223,
"label": "TIME",
"start_offset": 216,
"end_offset": 226
}
] | [
{
"id": 171,
"from_id": 2111,
"to_id": 46222,
"type": "exploits"
},
{
"id": 170,
"from_id": 2111,
"to_id": 46221,
"type": "targets"
},
{
"id": 172,
"from_id": 2116,
"to_id": 2113,
"type": "authored-by"
},
{
"id": 173,
"from_id": 46222,
"to_id": 46221,
"type": "targets"
}
] | [] |
168 | From an engineering point of view, this sole, specific targeting of files that matter significantly increases the chances of ransomware’s success. | [] | [] | [] |
2,723 | This vulnerability exists within the Microsoft Server Message Block 3.0 (SMBv3), specifically regarding malformed compression headers. | [
{
"id": 47964,
"label": "SOFTWARE",
"start_offset": 39,
"end_offset": 81
}
] | [] | [] |
793 | For the foreseeable future, Microsoft may introduce more defensive mechanisms against use-after-free bugs or even heap fengshui to reduce the risk of being exploited. | [
{
"id": 46354,
"label": "identity",
"start_offset": 29,
"end_offset": 38
}
] | [] | [] |
13,522 | The US Department of Energy (DOE) recently launched the Operational Technology (OT) Defender Fellowship. | [
{
"id": 51581,
"label": "identity",
"start_offset": 4,
"end_offset": 33
}
] | [] | [] |
5,412 | In the case of Cyclops Blink, we received samples targeting Asus routers that were not previously reported on. | [
{
"id": 51416,
"label": "malware",
"start_offset": 15,
"end_offset": 28
}
] | [] | [] |
8,965 | Afterward, one more warning about the unverified developer is displayed. | [] | [] | [] |
3,946 | Execution of arbitrary commands via session id | [] | [] | [] |
7,305 | OceanLotus commands and descriptions | [
{
"id": 22767,
"label": "malware",
"start_offset": 0,
"end_offset": 10
},
{
"id": 22768,
"label": "location",
"start_offset": 20,
"end_offset": 23
}
] | [] | [] |
5,446 | What is it? | [] | [] | [] |
4,985 | We assess with high confidence this vulnerability was sold by an exploit broker and probably abused by more than one surveillance vendor. | [] | [] | [] |
1,794 | The ADSS JAVA component (C:\ManageEngine\ADSelfService Plus\jre\bin\java.exe) executed mshta.exe to remotely run a remotely-hosted HTML application (HTA) file from the attackers’ command and control (C&C) server. | [
{
"id": 45134,
"label": "FILEPATH",
"start_offset": 25,
"end_offset": 76
},
{
"id": 45135,
"label": "FILEPATH",
"start_offset": 87,
"end_offset": 96
}
] | [] | [] |
8,642 | In our environment, we did not receive any payloads past this stage. | [] | [] | [] |
14,356 | Two months later, the C&C server was changed to hxxp://miakhalifagame[.]com. | [
{
"id": 51789,
"label": "URL",
"start_offset": 48,
"end_offset": 75
}
] | [] | [] |
5,705 | This script was designed to show a social engineering message — typically a Flash update popup or a DNS error (note that Adobe discontinued Flash Player at the end of December 2020) that then instructed the visitor to download a malicious file that turned out to be a Cobalt Strike loader. | [] | [] | [] |
731 | Additionally, Prisma Cloud users can also build a custom vulnerability detection rule to identify if any system is running an OMI package with a version previous to 1.6.8.1. | [
{
"id": 46314,
"label": "SOFTWARE",
"start_offset": 14,
"end_offset": 26
},
{
"id": 46315,
"label": "SOFTWARE",
"start_offset": 126,
"end_offset": 129
}
] | [] | [] |
4,552 | This is the first known instance of Turla distributing Android-related malware. | [
{
"id": 50361,
"label": "threat-actor",
"start_offset": 36,
"end_offset": 41
},
{
"id": 50362,
"label": "SOFTWARE",
"start_offset": 55,
"end_offset": 62
}
] | [
{
"id": 949,
"from_id": 50361,
"to_id": 50362,
"type": "targets"
}
] | [] |
7,732 | Enabling the macros of the Excel file downloads a file created using NSIS installer with ServHelper from 79[.]141[.]168[.]105 or 195[.]123[.]213[.]126. | [
{
"id": 24012,
"label": "malware",
"start_offset": 69,
"end_offset": 73
},
{
"id": 24013,
"label": "tools",
"start_offset": 89,
"end_offset": 99
},
{
"id": 24014,
"label": "IPV4",
"start_offset": 105,
"end_offset": 125
},
{
"id": 24015,
"label": "IPV4",
"start_offset": 129,
"end_offset": 150
}
] | [] | [] |
2,171 | Palo Alto Networks and Unit 42 will continue to monitor for evidence of exploitation and further novel use cases. | [
{
"id": 47305,
"label": "identity",
"start_offset": 0,
"end_offset": 18
},
{
"id": 47306,
"label": "identity",
"start_offset": 23,
"end_offset": 30
}
] | [] | [] |
9,787 | Apart from knowledge and awareness of phishing and social engineering, it is also important to be prepared with effective and layered security solutions. | [
{
"id": 29806,
"label": "location",
"start_offset": 21,
"end_offset": 24
},
{
"id": 29807,
"label": "attack-pattern",
"start_offset": 38,
"end_offset": 46
},
{
"id": 29808,
"label": "location",
"start_offset": 47,
"end_offset": 50
},
{
"id": 29809,
"label": "location",
"start_offset": 122,
"end_offset": 125
},
{
"id": 29810,
"label": "location",
"start_offset": 134,
"end_offset": 142
}
] | [] | [] |
14,332 | The adult game first used by the attackers was also found in the list of games advertised by hxxp://www[.]roundyearfun[.]org Our analysis revealed that hxxp://www[.]roundyearfun[.]org was also used as a C&C address to save victims’ data. | [
{
"id": 48560,
"label": "Infrastucture",
"start_offset": 202,
"end_offset": 207
},
{
"id": 48558,
"label": "URL",
"start_offset": 93,
"end_offset": 124
},
{
"id": 48559,
"label": "URL",
"start_offset": 152,
"end_offset": 183
}
] | [] | [] |
977 | We have captured over 18,000 samples that contain the SMS stealing library since August 2015, meaning the number of affected users is considerable. | [
{
"id": 46473,
"label": "TIME",
"start_offset": 81,
"end_offset": 92
},
{
"id": 46474,
"label": "attack-pattern",
"start_offset": 54,
"end_offset": 66
}
] | [] | [] |
13,862 | Apart from locking Colonial Pipeline’s computer systems, DarkSide also stole over 100 GB of corporate data. | [
{
"id": 42986,
"label": "threat-actor",
"start_offset": 57,
"end_offset": 65
}
] | [] | [] |
14,102 | Figure 12 shows a comparison between the two samples. | [] | [] | [] |
2,731 | For client mitigation, recommend creating an outbound firewall rule to block SMB outbound on public and private interfaces. | [
{
"id": 47973,
"label": "SOFTWARE",
"start_offset": 77,
"end_offset": 80
}
] | [] | [] |
9,737 | Our analysis revealed that they drop a new backdoor, which is written in PowerShell as MuddyWater’s known POWERSTATS backdoor. | [
{
"id": 29706,
"label": "attack-pattern",
"start_offset": 73,
"end_offset": 83
},
{
"id": 29708,
"label": "malware",
"start_offset": 106,
"end_offset": 116
}
] | [] | [] |
1,323 | The following information is collected: | [] | [] | [] |
7,799 | Conclusion | [] | [] | [] |
10,549 | Google’s Threat Analysis Group (TAG) is a specialized team of security experts that works to identify, report, and stop government-backed phishing and hacking against Google and the people who use our products. | [
{
"id": 32158,
"label": "location",
"start_offset": 62,
"end_offset": 70
},
{
"id": 32159,
"label": "location",
"start_offset": 111,
"end_offset": 114
},
{
"id": 32160,
"label": "location",
"start_offset": 115,
"end_offset": 119
},
{
"id": 32161,
"label": "attack-pattern",
"start_offset": 138,
"end_offset": 146
},
{
"id": 32162,
"label": "location",
"start_offset": 147,
"end_offset": 150
},
{
"id": 32164,
"label": "location",
"start_offset": 174,
"end_offset": 177
}
] | [] | [] |
1,939 | For one, there is the domain pikrpro[.]eu and its subdomains—the islamicfinderfeedback[.]pikrpro[.]eu and the memrifilesforinfo[.]pikpro[.]eu. | [
{
"id": 47063,
"label": "DOMAIN",
"start_offset": 110,
"end_offset": 141
},
{
"id": 47061,
"label": "DOMAIN",
"start_offset": 29,
"end_offset": 41
},
{
"id": 47062,
"label": "DOMAIN",
"start_offset": 65,
"end_offset": 101
}
] | [] | [] |
8,570 | Although Play Store users were protected, we are highlighting the app here as TAG has seen APT35 attempt to distribute this spyware on other platforms as recently as July 2021. | [
{
"id": 26484,
"label": "location",
"start_offset": 45,
"end_offset": 48
},
{
"id": 26485,
"label": "threat-actor",
"start_offset": 91,
"end_offset": 96
}
] | [] | [] |
13,687 | We found a BEC mail sample that was sent from the same IP. | [] | [] | [] |
718 | Unit 42 recommends customers upgrade to the latest release of Confluence Server and Data Center. | [
{
"id": 46285,
"label": "identity",
"start_offset": 0,
"end_offset": 7
},
{
"id": 46286,
"label": "SOFTWARE",
"start_offset": 62,
"end_offset": 95
}
] | [] | [] |
916 | After it finished the encryption routine, PClock2 generates a VBScript file in the following directory: | [
{
"id": 46437,
"label": "malware",
"start_offset": 43,
"end_offset": 50
},
{
"id": 46438,
"label": "SOFTWARE",
"start_offset": 63,
"end_offset": 71
}
] | [] | [] |
10,043 | One of the files, rsync, is an initially obfuscated Perl-based Shellbot capable of multiple backdoor commands such as file downloading, shell cmd execution, and DDoS. Figure 4. Obfuscated Perl script Figure 5. | [
{
"id": 30647,
"label": "location",
"start_offset": 0,
"end_offset": 3
},
{
"id": 30648,
"label": "location",
"start_offset": 52,
"end_offset": 56
},
{
"id": 30649,
"label": "location",
"start_offset": 136,
"end_offset": 141
},
{
"id": 30650,
"label": "malware",
"start_offset": 142,
"end_offset": 145
},
{
"id": 30651,
"label": "location",
"start_offset": 157,
"end_offset": 160
},
{
"id": 30653,
"label": "location",
"start_offset": 189,
"end_offset": 193
}
] | [] | [] |
1,881 | BAT.KILLAV.YACAA | [] | [] | [] |
13,626 | Communication with C&C uses sockets and is encrypted with simple SUB 0x46, XOR 0x19 encryption. | [] | [] | [] |
2,215 | The downloaded file is dropped to the system32 folder. | [
{
"id": 47321,
"label": "FILEPATH",
"start_offset": 39,
"end_offset": 47
}
] | [] | [] |
3,653 | It also takes spear phishing attacks to a level that makes it nearly impossible to distinguish an attack email from a legitimate email. | [
{
"id": 11070,
"label": "attack-pattern",
"start_offset": 14,
"end_offset": 28
}
] | [] | [] |
7,810 | As they continue to target businesses in different sectors, we can expect TA505 to keep using phishing and social engineering techniques to compromise systems. | [
{
"id": 24197,
"label": "location",
"start_offset": 20,
"end_offset": 26
},
{
"id": 24198,
"label": "location",
"start_offset": 63,
"end_offset": 66
},
{
"id": 24200,
"label": "attack-pattern",
"start_offset": 94,
"end_offset": 102
},
{
"id": 24201,
"label": "location",
"start_offset": 103,
"end_offset": 106
}
] | [] | [] |
1,379 | Two instances of PowerShell are spawned with an encoded command to sleep for 10 seconds, e.g. C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBzACAAMQAwAA== 3. | [
{
"id": 46711,
"label": "FILEPATH",
"start_offset": 94,
"end_offset": 151
},
{
"id": 46712,
"label": "tools",
"start_offset": 17,
"end_offset": 27
}
] | [] | [] |
1,435 | When an app is published to the Google Play Store, the certificate information is included within the APK file. | [
{
"id": 46767,
"label": "SOFTWARE",
"start_offset": 32,
"end_offset": 49
}
] | [] | [] |
3,233 | If the file (that is, the marker) is not found, the backdoor creates a new one and writes the current timestamp onto it. | [] | [] | [] |
1,942 | The decoy documents tell more about Urpage's possible targets, as it contains text from articles about the region of Kashmir. | [
{
"id": 47066,
"label": "threat-actor",
"start_offset": 36,
"end_offset": 42
},
{
"id": 47067,
"label": "location",
"start_offset": 117,
"end_offset": 124
}
] | [
{
"id": 300,
"from_id": 47066,
"to_id": 47067,
"type": "targets"
}
] | [] |
931 | AutoFocus users can find more information on samples and indicators related to this attack by viewing the PClock tag. | [
{
"id": 46448,
"label": "malware",
"start_offset": 106,
"end_offset": 112
}
] | [] | [] |
1,475 | We’ve contacted the developer to confirm they have retained sole custody of the keys. | [] | [] | [] |
1,485 | Again, using the same private key is probably due to the convenience in app management. | [] | [] | [] |
7,736 | Similar to the routine variant in Figure 6, the Excel VBA macros retrieve the FlawedAmmyy downloader from hxxp://195[.]123[.]245[.]185/r1 or hxxp://185[.]225[.]17[.]5/r1, in then decrypts and executes FlawedAmmyy RAT from hxxp://185[.]225[.]17[.]5/2.dat or hxxp://195[.]123[.]245[.]185/1.dat. | [
{
"id": 24027,
"label": "location",
"start_offset": 48,
"end_offset": 53
},
{
"id": 24028,
"label": "malware",
"start_offset": 78,
"end_offset": 89
},
{
"id": 24029,
"label": "location",
"start_offset": 188,
"end_offset": 191
},
{
"id": 24030,
"label": "malware",
"start_offset": 201,
"end_offset": 212
}
] | [] | [] |
10,859 | tfsdne: | [] | [] | [] |
1,023 | The price for this custom account was only ¥27 RMB ($4.40 USD); for an extra ¥13 RMB ($2.12 USD), the buyer can request a custom username at any subdomain for the given institution. | [] | [] | [] |
893 | Figure 4. HTTP POST request containing file paths of malware After installation, PClock2 will also set the following registry key with a value of ‘INSTALL_OK’. | [
{
"id": 46422,
"label": "malware",
"start_offset": 83,
"end_offset": 90
}
] | [] | [] |
3,954 | Credential access | [] | [] | [] |
14,211 | The malware we analyzed is separated in two files: a loader, and the payload. | [] | [] | [] |
13,548 | The question asked on a forum showing the payload related to Water Pamola. | [
{
"id": 51624,
"label": "campaign",
"start_offset": 61,
"end_offset": 73
}
] | [] | [] |
4,455 | TAG tracks and proactively counters serious state-sponsored and financially motivated information cyber criminal activities, such as hacking and the use of spyware. | [
{
"id": 50232,
"label": "identity",
"start_offset": 0,
"end_offset": 3
}
] | [] | [] |
231 | A phishing webpage targeting a Ukrainian state administration employee, detected by our in-house machine learning models on March 16.Our teams at Palo Alto Networks are actively monitoring the phishing landscape surrounding Ukraine-related URLs and are sharing this threat intelligence with relevant authorities in Ukraine and internationally. | [
{
"id": 765,
"label": "attack-pattern",
"start_offset": 2,
"end_offset": 10
},
{
"id": 771,
"label": "attack-pattern",
"start_offset": 193,
"end_offset": 201
},
{
"id": 44647,
"label": "identity",
"start_offset": 31,
"end_offset": 70
},
{
"id": 44648,
"label": "TIME",
"start_offset": 124,
"end_offset": 132
},
{
"id": 44649,
"label": "identity",
"start_offset": 146,
"end_offset": 164
},
{
"id": 44650,
"label": "location",
"start_offset": 315,
"end_offset": 322
}
] | [
{
"id": 135,
"from_id": 765,
"to_id": 44647,
"type": "targets"
},
{
"id": 136,
"from_id": 771,
"to_id": 44650,
"type": "targets"
}
] | [] |
4,223 | The application is a simple downloader that sends some basic information (username, antivirus, IP address, and operating system version) encrypted using triple Data Encryption Standard (DES). Figure 4. | [] | [] | [] |
2,809 | Unit 42 is not aware of any reports where paying the ransom to the WanaCrypt0r attackers has resulted in the recovery of data. | [
{
"id": 48028,
"label": "identity",
"start_offset": 0,
"end_offset": 7
},
{
"id": 8587,
"label": "malware",
"start_offset": 67,
"end_offset": 78
}
] | [] | [] |
14,377 | On one end of the spectrum are places like universities that maybe manage 10% of the endpoints on their network. | [] | [] | [] |
4,543 | While we continue to fight these threats on a technical level, the providers of these capabilities operate openly in democratic countries. | [] | [] | [] |
2,580 | This post is also available in: 日本語 (Japanese) The Lapsus$ Group threat actor has grown in just a few months from launching a handful of destructive attacks to stealing and publishing source code of multiple top-tier technology companies. | [
{
"id": 45601,
"label": "threat-actor",
"start_offset": 57,
"end_offset": 64
}
] | [] | [] |
13,593 | The script for modifying the shop page header to inject a web shell | [
{
"id": 51682,
"label": "malware",
"start_offset": 4,
"end_offset": 10
}
] | [] | [] |