id
int64 1
14.4k
| text
stringlengths 3
5.01k
| entities
list | relations
list | Comments
list |
---|---|---|---|---|
8,858 | This variant of PlugX (detected by Trend Micro as Backdoor.Win32.PLUGX.DYSGUT), including the code in the BLOB, launches an svchost.exe process and injects to it. | [
{
"id": 27413,
"label": "malware",
"start_offset": 16,
"end_offset": 21
},
{
"id": 27415,
"label": "location",
"start_offset": 144,
"end_offset": 147
}
] | [] | [] |
1,521 | If the first value in the packet is 0xCC then the file will set "g_mainsrvinfo.srandipb" and "g_mainsrvinfo.srandipe". If the first value in the packet is 0x33 the file will use tcp to download a file and execute it. | [] | [] | [] |
2,286 | Google is alleging violations under the Racketeer Influenced and Corrupt Organizations Act (RICO), the Computer Fraud and Abuse Act, the Electronic Communications Privacy Act, the Lanham Act, and tortious interference of business relationships, and unjust enrichment. | [
{
"id": 45444,
"label": "identity",
"start_offset": 0,
"end_offset": 6
}
] | [] | [] |
8,084 | Since first discovering this activity, OpenSUpdater's authors have tried other variations on invalid encodings to further evade detection. | [
{
"id": 25069,
"label": "malware",
"start_offset": 39,
"end_offset": 51
}
] | [] | [] |
7,455 | Overview of Pawn Storm’s Yahoo credential phishing campaigns. | [
{
"id": 23176,
"label": "attack-pattern",
"start_offset": 42,
"end_offset": 50
}
] | [] | [] |
5,765 | How MITRE ATT&CK Assists in Threat Investigation | [] | [] | [] |
7,278 | According to UTF-8 mapping, the related Unicode code is "U+FE00". | [] | [] | [] |
1,624 | Funtasy intercepts this message, parses out the PIN and sends it back to the registration server, completing the enrollment process. | [] | [] | [] |
4,526 | Finally, we also offer the leading tools to protect important civil society actors such as journalists, human rights workers, opposition party politicians, and campaign organizations – in other words, the users who are frequently targeted by surveillance tools. | [] | [] | [] |
6,707 | Our products are designed with robust built-in security features, like Gmail protections against phishing and Safe Browsing in Chrome, but we still dedicate significant resources to developing new tools and technology to help identify, track and stop this kind of activity. | [
{
"id": 20855,
"label": "location",
"start_offset": 13,
"end_offset": 16
},
{
"id": 20856,
"label": "location",
"start_offset": 47,
"end_offset": 55
},
{
"id": 20858,
"label": "attack-pattern",
"start_offset": 97,
"end_offset": 105
},
{
"id": 20859,
"label": "location",
"start_offset": 106,
"end_offset": 109
},
{
"id": 20860,
"label": "threat-actor",
"start_offset": 110,
"end_offset": 114
},
{
"id": 20861,
"label": "location",
"start_offset": 203,
"end_offset": 206
},
{
"id": 20862,
"label": "location",
"start_offset": 242,
"end_offset": 245
},
{
"id": 20863,
"label": "malware",
"start_offset": 246,
"end_offset": 250
}
] | [] | [] |
1,051 | What our researchers have found is a vulnerability that can be used to more easily enable an “overlay attack,” a type of attack that is already known on the Android platform. | [
{
"id": 46543,
"label": "SOFTWARE",
"start_offset": 158,
"end_offset": 165
}
] | [] | [] |
2,906 | The exploit uses the code above to restore the corrupted object and save the stack frame on the heap so that the process would not crash after the exploit is successful. | [] | [] | [] |
5,231 | We construe AnubisSpy to be linked to the cyberespionage campaign Sphinx (APT-C-15) based on shared file structures and command-and-control (C&C) server as well as targets. | [
{
"id": 51265,
"label": "campaign",
"start_offset": 65,
"end_offset": 83
},
{
"id": 51264,
"label": "malware",
"start_offset": 12,
"end_offset": 21
}
] | [] | [] |
3,119 | If you have any questions, please visit the Threat & Vulnerability Discussions on our Live Community. | [] | [] | [] |
5,980 | Within these files is a link to an attacker controlled phishing domain. | [
{
"id": 18401,
"label": "attack-pattern",
"start_offset": 55,
"end_offset": 63
}
] | [] | [] |
4,008 | They also showed real-world implications that these vulnerabilities have. | [] | [] | [] |
574 | One of the reasons Ryuk causes so much damage is because it will scan the local network and try to infect other machines through Server Message Block (SMB) protocols. | [
{
"id": 1919,
"label": "malware",
"start_offset": 19,
"end_offset": 23
},
{
"id": 46177,
"label": "SOFTWARE",
"start_offset": 129,
"end_offset": 155
}
] | [] | [] |
4,414 | A log file is written containing a count of the emails that were downloaded. | [] | [] | [] |
13,506 | While the threat actor has been known to offer its services to a more general audience — as seen in its online advertisements in the underground — research from groups such as eQualit.ie and Amnesty International show that Void Balaur is likely also involved in attacks against higher profile victims, ranging from human rights activists and journalists to politicians and even presidential candidates. | [
{
"id": 51574,
"label": "identity",
"start_offset": 176,
"end_offset": 186
},
{
"id": 51575,
"label": "identity",
"start_offset": 191,
"end_offset": 213
},
{
"id": 51576,
"label": "threat-actor",
"start_offset": 223,
"end_offset": 234
}
] | [] | [] |
4,735 | In June, we provided examples of the hack-for-hire ecosystem from India, Russia, and the United Arab Emirates. | [
{
"id": 50647,
"label": "location",
"start_offset": 89,
"end_offset": 109
},
{
"id": 50643,
"label": "TIME",
"start_offset": 3,
"end_offset": 7
},
{
"id": 50644,
"label": "attack-pattern",
"start_offset": 37,
"end_offset": 50
},
{
"id": 50645,
"label": "location",
"start_offset": 66,
"end_offset": 71
},
{
"id": 50646,
"label": "location",
"start_offset": 73,
"end_offset": 79
}
] | [] | [] |
12,503 | For a period of time, we observed thousands of instances of malicious Glupteba downloads per day. | [
{
"id": 38911,
"label": "location",
"start_offset": 16,
"end_offset": 20
},
{
"id": 38913,
"label": "malware",
"start_offset": 70,
"end_offset": 78
},
{
"id": 38914,
"label": "location",
"start_offset": 93,
"end_offset": 96
}
] | [] | [] |
2,117 | Palo Alto Networks customers who have deployed the latest vulnerability signatures released on August 24, 2018, are protected. | [
{
"id": 47255,
"label": "identity",
"start_offset": 0,
"end_offset": 18
},
{
"id": 47256,
"label": "TIME",
"start_offset": 95,
"end_offset": 110
}
] | [] | [] |
12,364 | As the course of the COVID-19 pandemic evolves, we’ve seen threat actors evolve their tactics as well. | [] | [] | [] |
13,539 | The campaign initially compromised e-commerce online shops in Japan, Australia, and European countries via spam emails with malicious attachments. | [
{
"id": 51605,
"label": "attack-pattern",
"start_offset": 107,
"end_offset": 118
},
{
"id": 51606,
"label": "campaign",
"start_offset": 4,
"end_offset": 12
},
{
"id": 51607,
"label": "identity",
"start_offset": 35,
"end_offset": 58
},
{
"id": 51601,
"label": "location",
"start_offset": 62,
"end_offset": 67
},
{
"id": 51602,
"label": "location",
"start_offset": 69,
"end_offset": 78
},
{
"id": 51603,
"label": "location",
"start_offset": 84,
"end_offset": 92
}
] | [
{
"id": 1105,
"from_id": 51606,
"to_id": 51607,
"type": "targets"
},
{
"id": 1106,
"from_id": 51607,
"to_id": 51601,
"type": "located-at"
},
{
"id": 1107,
"from_id": 51607,
"to_id": 51602,
"type": "located-at"
},
{
"id": 1108,
"from_id": 51607,
"to_id": 51603,
"type": "located-at"
},
{
"id": 1110,
"from_id": 51606,
"to_id": 51605,
"type": "uses"
}
] | [] |
4,694 | In the meantime, we encourage high risk users to enroll in our Advanced Protection Program (APP) and utilize Google Account Level Enhanced Safe Browsing to ensure they have the greatest level of protection in the face of ongoing threats. | [] | [] | [] |
10,597 | Exploiting CVE-2019-0676 enabled attackers to reveal presence or non-presence of files on the victim’s computer; this information was later used to decide whether or not a second stage exploit should be delivered. | [] | [] | [] |
308 | This reconnaissance was then leveraged in brute force attacks against credentials, toward unauthorized access, implant installation, and subsequent exfiltration of consumer payment data. | [
{
"id": 1059,
"label": "attack-pattern",
"start_offset": 42,
"end_offset": 53
},
{
"id": 46007,
"label": "attack-pattern",
"start_offset": 111,
"end_offset": 131
},
{
"id": 46009,
"label": "attack-pattern",
"start_offset": 148,
"end_offset": 185
},
{
"id": 46008,
"label": "attack-pattern",
"start_offset": 90,
"end_offset": 109
}
] | [] | [] |
13,945 | Maze was one of the first documented cases of this. | [
{
"id": 48760,
"label": "malware",
"start_offset": 0,
"end_offset": 5
}
] | [] | [] |
3,988 | It also establishes a few recommendations for software customers and vendors to prevent and mitigate attacks as well as improve resilience against software supply chain attacks. | [] | [] | [] |
4,888 | Moreover, to protect our users, we have referred the below activity to the FBI for further investigation. | [
{
"id": 50906,
"label": "identity",
"start_offset": 75,
"end_offset": 78
}
] | [] | [] |
860 | Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address! | [] | [] | [] |
323 | By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. | [] | [] | [] |
2,039 | What is peculiar about this file is it is a variant of the open-source MicroBackdoor, a backdoor allowing an attacker to browse the file system, upload and download files, execute commands and remove itself from the system (Figure 13). | [
{
"id": 47132,
"label": "malware",
"start_offset": 71,
"end_offset": 84
}
] | [] | [] |
2,943 | The tactics and techniques are not new or sophisticated. | [] | [] | [] |
14,009 | Malware author’s developer environment | [] | [] | [] |
3,477 | Contents of malicious SFX file used by Blackgear, posing as a Flash Player installer Figure 4. Malicious document used by Blackgear (top) and how VBScript is used to execute Marade (bottom) | [
{
"id": 49277,
"label": "threat-actor",
"start_offset": 38,
"end_offset": 48
},
{
"id": 49278,
"label": "SOFTWARE",
"start_offset": 62,
"end_offset": 74
},
{
"id": 49279,
"label": "threat-actor",
"start_offset": 123,
"end_offset": 132
},
{
"id": 49280,
"label": "malware",
"start_offset": 175,
"end_offset": 181
}
] | [] | [] |
5,439 | Sandworm’s previous high-profile victims and their attacks’ substantial impact on these organizations are particularly worrying — even more so for a group that quickly learns from past errors, comes back stronger time and time again, and for whom international repercussions seem minimal at best. | [
{
"id": 51440,
"label": "threat-actor",
"start_offset": 0,
"end_offset": 8
}
] | [] | [] |
10,567 | In 2019, we sent almost 40,000 warnings, a nearly 25 percent drop from 2018. | [] | [] | [] |
5,414 | The samples that we have analyzed are compiled for ARM and are dynamically linked against uClibc. | [] | [] | [] |
2,342 | They are the equivalent of LoadLibrary and GetProcAddress in Windows. | [
{
"id": 47399,
"label": "SOFTWARE",
"start_offset": 61,
"end_offset": 68
}
] | [] | [] |
2,638 | Additionally, LockBit 2.0 has affected many companies globally, with top victims based in the U.S., Italy and Germany. | [
{
"id": 47820,
"label": "malware",
"start_offset": 15,
"end_offset": 26
},
{
"id": 47821,
"label": "location",
"start_offset": 95,
"end_offset": 99
},
{
"id": 47822,
"label": "location",
"start_offset": 101,
"end_offset": 106
},
{
"id": 47823,
"label": "location",
"start_offset": 111,
"end_offset": 118
}
] | [] | [] |
13,316 | Nurture a culture of cybersecurity. | [] | [] | [] |
9,606 | public void ManageTakeOut() { string text = "PipeName"; | [
{
"id": 29425,
"label": "location",
"start_offset": 0,
"end_offset": 6
},
{
"id": 29426,
"label": "malware",
"start_offset": 7,
"end_offset": 11
}
] | [] | [] |
12,588 | For example, the payload we obtained contained a kernel module for capturing keystrokes. | [] | [] | [] |
7 | The attacker used a polymorphic malware builder to generate malware with a unique hash for each victim, preventing signature-based solutions from detecting the new attacks before it was too late for the victim. | [] | [] | [] |
5,268 | Enforcing the principle of least privilege and implementing an app reputation system are just some of the best practices that can help mitigate threats. | [] | [] | [] |
13,901 | This is the riskiest step so far in the ransomware execution process, as data exfiltration is more likely to be noticed by the victim organization’s security team. | [] | [] | [] |
2,902 | s[_local28][(((_local41 - _local12) / 4) + 16)] | [] | [] | [] |
3,490 | bin | [] | [] | [] |
9,406 | Collection Capture Audio T1429 Used to record audio information Collection Capture SMS Messages T1412 Used to collect SMS messages | [
{
"id": 28955,
"label": "attack-pattern",
"start_offset": 75,
"end_offset": 95
}
] | [] | [] |
5,423 | But what is evident is that Cyclops Blink is an advanced piece of malware that focuses on persistence and the ability to survive domain sinkhole attempts and the takedown of its infrastructure. | [
{
"id": 51430,
"label": "malware",
"start_offset": 28,
"end_offset": 41
}
] | [] | [] |
7,051 | Structure of decrypted data.res file Lastly, the launcher starts a suspended process with the command line “C:\Windows\system32\svchost.exe -k LocalServices,”and injects the appropriate shellcode into it (either 32- or 64-bit). | [
{
"id": 22104,
"label": "location",
"start_offset": 0,
"end_offset": 9
},
{
"id": 22105,
"label": "identity",
"start_offset": 223,
"end_offset": 226
}
] | [] | [] |
10,417 | Users should also take full advantage of their network defense solutions by enhancing settings, especially for macro malware attached emails. | [] | [] | [] |
14,380 | A lot of the advanced security we’ve been delivering on the last few years has been focused on this problem. | [] | [] | [] |
5,409 | The NCSC report covered malware targeting a specific vendor, namely WatchGuard. | [
{
"id": 51402,
"label": "identity",
"start_offset": 6,
"end_offset": 10
},
{
"id": 51403,
"label": "identity",
"start_offset": 70,
"end_offset": 80
}
] | [] | [] |
14,384 | But most of EDR’s capabilities are for endpoints they are on: ones they manage. | [] | [] | [] |
9,425 | It seems that this hard-coded key and flawed RC4 implementation were also used in a malware family named TigerPlug, probably because it spreads the PlugX malware. | [
{
"id": 29007,
"label": "location",
"start_offset": 19,
"end_offset": 23
},
{
"id": 29008,
"label": "location",
"start_offset": 34,
"end_offset": 37
},
{
"id": 29010,
"label": "malware",
"start_offset": 148,
"end_offset": 153
}
] | [] | [] |
7,151 | Figure 3. | [] | [] | [] |
1,653 | On July 22, Palo Alto Networks threat intelligence team, Unit 42, released our first report on the evolution of “Silver Spaniel” 419 scammers. | [
{
"id": 45085,
"label": "identity",
"start_offset": 12,
"end_offset": 55
},
{
"id": 45086,
"label": "identity",
"start_offset": 57,
"end_offset": 64
},
{
"id": 45089,
"label": "TIME",
"start_offset": 3,
"end_offset": 10
},
{
"id": 45087,
"label": "malware",
"start_offset": 113,
"end_offset": 127
}
] | [] | [] |
9,133 | Lurk’s infrastructure also exhibited new capabilities. | [] | [] | [] |
4,212 | The displayed Urdu text could be translated as “Real women, girls, and housewives || Download the app now More than thousands of women app.” | [] | [] | [] |
3,600 | The Premium Plan requires payment and works automatically, while the Private Stub requires the user to contact the support from the service for further personalization. | [] | [] | [] |
13,173 | Figure 4. | [] | [] | [] |
2,711 | It is always important to view this type of critical vulnerability in the larger context of the threat landscape. | [] | [] | [] |
798 | By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. | [] | [] | [] |
3,539 | Organizations can also consider managed detection and response, which provides in-depth threat analysis and correlation — from networks to servers and endpoints — to obtain a complete picture of and further understand a targeted attack. | [] | [] | [] |
2,646 | Like other ransomware families such as BlackByte, LockBit 2.0 avoids systems that use Eastern European languages, including many written with Cyrillic alphabets. | [
{
"id": 45646,
"label": "malware",
"start_offset": 51,
"end_offset": 62
},
{
"id": 45645,
"label": "malware",
"start_offset": 40,
"end_offset": 49
}
] | [] | [] |
6,197 | The first involves injecting malicious code into the webpage via an XSS vulnerability on the webmail system. | [
{
"id": 19149,
"label": "attack-pattern",
"start_offset": 68,
"end_offset": 71
}
] | [] | [] |
1,663 | The shortest possible packet is the “HeartBeat” command, which NetWire generates every 10 seconds. | [
{
"id": 46872,
"label": "malware",
"start_offset": 64,
"end_offset": 71
}
] | [] | [] |
2,524 | These approaches are not particularly clever or sophisticated, but often they are effective. | [] | [] | [] |
4,606 | The solution allows you to see more and respond faster by collecting and correlating data across email, endpoints, servers, cloud workloads, and networks. | [] | [] | [] |
1,238 | However, other installed apps are still allowed to receive SMS and upload the content via Internet. | [] | [] | [] |
12,311 | We terminated 9 YouTube channels as part of our investigation into a coordinated influence operation linked to Egypt. | [] | [] | [] |
13,565 | The source code of this framework is shared across many Chinese public forums. | [
{
"id": 51646,
"label": "location",
"start_offset": 56,
"end_offset": 63
},
{
"id": 51647,
"label": "tools",
"start_offset": 24,
"end_offset": 33
}
] | [
{
"id": 1123,
"from_id": 51647,
"to_id": 51646,
"type": "related-to"
}
] | [] |
2,384 | ScrambleCross receives instructions from its command-and-control (C&C) server that allow it to receive and manipulate plug-ins. | [
{
"id": 47449,
"label": "malware",
"start_offset": 0,
"end_offset": 13
}
] | [] | [] |
12,505 | While analyzing Glupteba binaries, our team identified a few containing a git repository URL: “git.voltronwork.com”. | [
{
"id": 38916,
"label": "malware",
"start_offset": 16,
"end_offset": 24
}
] | [] | [] |
805 | The impact of a successful credential theft is, ultimately, access and authorization. | [
{
"id": 46359,
"label": "attack-pattern",
"start_offset": 27,
"end_offset": 43
}
] | [] | [] |
1,677 | The usage for the tool is show below. | [] | [] | [] |
13,781 | Meanwhile, the second payload is a typical Waterbear first-stage backdoor. | [] | [] | [] |
8,210 | A little over two weeks before the registration of the fake domain, the attackers sent the following email to the company: Figure 6. | [] | [] | [] |
3,378 | 2243c10b1bd64dfb55eda08bc8b85610d7fa5ba759527b4b4dd16dfac584ef25 | [
{
"id": 10223,
"label": "SHA2",
"start_offset": 1,
"end_offset": 65
}
] | [] | [] |
4,649 | Host: {C2} | [] | [] | [] |
7,336 | on Host | [] | [] | [] |
9,340 | Trend Micro detects both of the threats as AndroidOS_CallerSpy.HRX. | [] | [] | [] |
682 | In a similar way to embedding Adobe Flash files into an Office document, you can also embed equations in documents that will be parsed by Microsoft Equation Editor - a program that lets you easily write mathematical equations: Figure 2. Microsoft Equation Editor As in our previous example, vulnerabilities in the equation editor can be exploited by leveraging malicious Office documents. | [
{
"id": 46257,
"label": "SOFTWARE",
"start_offset": 30,
"end_offset": 41
},
{
"id": 46258,
"label": "SOFTWARE",
"start_offset": 138,
"end_offset": 163
},
{
"id": 46256,
"label": "SOFTWARE",
"start_offset": 238,
"end_offset": 263
}
] | [] | [] |
3,006 | This will also protect these apps on your tablets, smartphones, PCs and Macs. | [] | [] | [] |
12,815 | Joint Operations. | [] | [] | [] |
3,302 | GetBrowsersCookies This command is designed to steal cookie information from browsers. | [] | [] | [] |
3,427 | Backdoor. | [] | [] | [] |
12,977 | We look forward to continuing our work in this space and advancing the safety and security of our users around the world. | [
{
"id": 40404,
"label": "location",
"start_offset": 53,
"end_offset": 56
},
{
"id": 40405,
"label": "tools",
"start_offset": 71,
"end_offset": 77
},
{
"id": 40406,
"label": "location",
"start_offset": 78,
"end_offset": 81
},
{
"id": 40407,
"label": "location",
"start_offset": 82,
"end_offset": 90
},
{
"id": 40408,
"label": "location",
"start_offset": 115,
"end_offset": 120
}
] | [] | [] |
5,839 | Ed: Exactly. | [] | [] | [] |
623 | One technique includes the ETERNALBLUE exploit tool. | [
{
"id": 2083,
"label": "malware",
"start_offset": 28,
"end_offset": 39
}
] | [] | [] |
847 | Kernel APC attacks do this using their control over the kernel to redirect APCs: “Asynchronous Procedure Calls”. | [
{
"id": 46395,
"label": "attack-pattern",
"start_offset": 1,
"end_offset": 19
}
] | [] | [] |
2,622 | If you think you may be subject to an active attack or have an urgent matter, get in touch with the Unit 42 Incident Response team or call North America Toll-Free: 866.486.4842 (866.4.UNIT42), EMEA: +31.20.299.3130, APAC: +65.6983.8730, or Japan: +81.50.1790.0200. | [
{
"id": 45625,
"label": "location",
"start_offset": 241,
"end_offset": 246
},
{
"id": 45627,
"label": "location",
"start_offset": 217,
"end_offset": 221
},
{
"id": 45624,
"label": "location",
"start_offset": 140,
"end_offset": 153
},
{
"id": 45626,
"label": "location",
"start_offset": 194,
"end_offset": 198
},
{
"id": 45623,
"label": "identity",
"start_offset": 101,
"end_offset": 131
}
] | [] | [] |
1,519 | The Src IP Begin and End are the start and ending IP ranges used as a fake src addresses in the DNS DDoS. The IP range can also be controlled by global variables within the binary itself as well. | [] | [] | [] |
3,299 | Figures 21 and 22 show the result of running “SnsInfo” command to enumerate messengers. | [] | [] | [] |
9,493 | Figure 6. | [] | [] | [] |
9,404 | Used to suppress its icon from being displayed to the user in the application launcher to hide the fact that it is installed Discovery File and Directory Discovery T1420 | [
{
"id": 28948,
"label": "attack-pattern",
"start_offset": 135,
"end_offset": 163
}
] | [] | [] |
2,506 | shell13.jsp | [
{
"id": 47674,
"label": "FILEPATH",
"start_offset": 0,
"end_offset": 11
}
] | [] | [] |
3,474 | Protux, a known backdoor, is executed by abusing the rundll32 dynamic-link library (DLL). | [
{
"id": 49273,
"label": "malware",
"start_offset": 0,
"end_offset": 6
},
{
"id": 49274,
"label": "attack-pattern",
"start_offset": 41,
"end_offset": 88
}
] | [
{
"id": 777,
"from_id": 49273,
"to_id": 49274,
"type": "uses"
}
] | [] |