id
int64 1
14.4k
| text
stringlengths 3
5.01k
| entities
list | relations
list | Comments
list |
---|---|---|---|---|
1,030 | Accounts made through this site "can be used to apply [for] related memberships of Amazon Prime, Microsoft Developer, Adobe and Apple by some secret ways," one seller said. | [
{
"id": 46519,
"label": "identity",
"start_offset": 83,
"end_offset": 95
},
{
"id": 46522,
"label": "identity",
"start_offset": 128,
"end_offset": 133
},
{
"id": 46520,
"label": "identity",
"start_offset": 97,
"end_offset": 106
},
{
"id": 46521,
"label": "identity",
"start_offset": 118,
"end_offset": 123
}
] | [] | [] |
1,481 | The app developer industry is booming. | [] | [] | [] |
1,416 | Geographic Distribution of Koluoz Spam Nodes in North America Thus far we’ve detected the following command and control servers in use. | [
{
"id": 45013,
"label": "Infrastucture",
"start_offset": 35,
"end_offset": 45
},
{
"id": 45016,
"label": "Infrastucture",
"start_offset": 103,
"end_offset": 121
},
{
"id": 45012,
"label": "malware",
"start_offset": 28,
"end_offset": 34
},
{
"id": 45014,
"label": "location",
"start_offset": 49,
"end_offset": 62
}
] | [
{
"id": 55,
"from_id": 45012,
"to_id": 45013,
"type": "communicates-with"
},
{
"id": 56,
"from_id": 45013,
"to_id": 45014,
"type": "located-at"
}
] | [] |
950 | The apps this library is embedded in may be legitimate and have significant functionality, but their developer’s choice to use this library has put them at risk. Technical Details: | [] | [] | [] |
14,254 | C&C Server's IP Address Port Number 160[.]16[.]243[.]129 443 (HTTPS) 160[.]16[.]243[.]129 53 (DNS) 160[.]16[.]243[.]129 80 (HTTP) 174[.]139[.]203[.]18 443 (HTTPS) 174[.]139[.]203[.]18 53 (DNS) 174[.]139[.]203[.]20 53 (DNS) 174[.]139[.]203[.]22 443 (HTTPS) 174[.]139[.]203[.]22 53 (DNS) 174[.]139[.]203[.]27 53 (DNS) 174[.]139[.]203[.]34 53 (DNS) 174[.]139[.]62[.]58 80 (HTTP) 174[.]139[.]62[.]60 443 (HTTPS) 174[.]139[.]62[.]60 53 (DNS) 174[.]139[.]62[.]60 80 (HTTP) 174[.]139[.]62[.]61 443 (HTTPS) 61[.]195[.]98[.]245 443 (HTTPS) 61[.]195[.]98[.]245 53 (DNS) 61[.]195[.]98[.]245 80 (HTTP) 67[.]198[.]161[.]250 443 (HTTPS) 67[.]198[.]161[.]250 53 (DNS) 67[.]198[.]161[.]251 443 (HTTPS) 67[.]198[.]161[.]252 443 (HTTPS) Figure 6: IP addresses used for C&C communication, and the port numbers they use | [
{
"id": 44095,
"label": "IPV4",
"start_offset": 37,
"end_offset": 57
},
{
"id": 44096,
"label": "IPV4",
"start_offset": 70,
"end_offset": 90
},
{
"id": 44097,
"label": "IPV4",
"start_offset": 100,
"end_offset": 120
},
{
"id": 44098,
"label": "IPV4",
"start_offset": 131,
"end_offset": 151
},
{
"id": 44099,
"label": "IPV4",
"start_offset": 164,
"end_offset": 184
},
{
"id": 44100,
"label": "IPV4",
"start_offset": 194,
"end_offset": 214
},
{
"id": 44101,
"label": "IPV4",
"start_offset": 224,
"end_offset": 244
},
{
"id": 44102,
"label": "IPV4",
"start_offset": 257,
"end_offset": 277
},
{
"id": 44103,
"label": "IPV4",
"start_offset": 287,
"end_offset": 307
},
{
"id": 44104,
"label": "IPV4",
"start_offset": 317,
"end_offset": 337
},
{
"id": 44105,
"label": "IPV4",
"start_offset": 347,
"end_offset": 366
},
{
"id": 44106,
"label": "IPV4",
"start_offset": 377,
"end_offset": 396
},
{
"id": 44107,
"label": "IPV4",
"start_offset": 409,
"end_offset": 428
},
{
"id": 44108,
"label": "IPV4",
"start_offset": 438,
"end_offset": 457
},
{
"id": 44109,
"label": "IPV4",
"start_offset": 468,
"end_offset": 487
},
{
"id": 44110,
"label": "IPV4",
"start_offset": 500,
"end_offset": 519
},
{
"id": 44111,
"label": "IPV4",
"start_offset": 532,
"end_offset": 551
},
{
"id": 44112,
"label": "IPV4",
"start_offset": 561,
"end_offset": 580
},
{
"id": 44113,
"label": "IPV4",
"start_offset": 591,
"end_offset": 611
},
{
"id": 44114,
"label": "IPV4",
"start_offset": 624,
"end_offset": 644
},
{
"id": 44115,
"label": "IPV4",
"start_offset": 654,
"end_offset": 674
},
{
"id": 44116,
"label": "IPV4",
"start_offset": 687,
"end_offset": 707
}
] | [] | [] |
10,156 | By looking at the digital fingerprints of these phishing sites and comparing them with a large data set that spans almost five years, we can uniquely relate them to a couple of Pawn Storm incidents in 2016 and 2017. | [
{
"id": 30989,
"label": "attack-pattern",
"start_offset": 48,
"end_offset": 56
},
{
"id": 30990,
"label": "location",
"start_offset": 57,
"end_offset": 62
},
{
"id": 30991,
"label": "location",
"start_offset": 63,
"end_offset": 66
},
{
"id": 30992,
"label": "location",
"start_offset": 77,
"end_offset": 81
},
{
"id": 30993,
"label": "location",
"start_offset": 89,
"end_offset": 94
},
{
"id": 30995,
"label": "location",
"start_offset": 137,
"end_offset": 140
},
{
"id": 30996,
"label": "location",
"start_offset": 157,
"end_offset": 161
},
{
"id": 30999,
"label": "location",
"start_offset": 206,
"end_offset": 209
}
] | [] | [] |
4,811 | During our investigation into the Turla CyberAzov apps, we identified another Android app first seen in the wild in March 2022 that also claimed to conduct DoS attacks against Russian websites. | [
{
"id": 50729,
"label": "SOFTWARE",
"start_offset": 78,
"end_offset": 89
},
{
"id": 50730,
"label": "TIME",
"start_offset": 116,
"end_offset": 126
},
{
"id": 50731,
"label": "attack-pattern",
"start_offset": 156,
"end_offset": 159
},
{
"id": 50727,
"label": "threat-actor",
"start_offset": 34,
"end_offset": 39
},
{
"id": 50728,
"label": "malware",
"start_offset": 40,
"end_offset": 49
}
] | [
{
"id": 998,
"from_id": 50727,
"to_id": 50728,
"type": "uses"
}
] | [] |
3,940 | xml;charset | [] | [] | [] |
9,825 | Gets MAC address and volume information to send back to the C&C. Executes only during working hours (8:00AM-6:00PM, using kernel32.GetLocalTime API) | [
{
"id": 29957,
"label": "location",
"start_offset": 17,
"end_offset": 20
},
{
"id": 29958,
"label": "location",
"start_offset": 74,
"end_offset": 78
},
{
"id": 29959,
"label": "TIME",
"start_offset": 101,
"end_offset": 121
}
] | [] | [] |
7,796 | However, while initial analysis of the macro it used made us believe that this was from TA505, the macros’ obfuscation and style turned out to be more similar to the ones described in this post, based on the code page, senders, and fast flux. | [
{
"id": 24146,
"label": "location",
"start_offset": 53,
"end_offset": 57
},
{
"id": 24148,
"label": "location",
"start_offset": 119,
"end_offset": 122
},
{
"id": 24149,
"label": "location",
"start_offset": 189,
"end_offset": 193
},
{
"id": 24150,
"label": "malware",
"start_offset": 213,
"end_offset": 217
},
{
"id": 24151,
"label": "location",
"start_offset": 228,
"end_offset": 231
}
] | [] | [] |
1,420 | WildFire users can rest assured that they’ll be protected from whatever Kuluoz has in-store next. | [
{
"id": 46758,
"label": "SOFTWARE",
"start_offset": 0,
"end_offset": 8
},
{
"id": 46759,
"label": "malware",
"start_offset": 72,
"end_offset": 78
}
] | [] | [] |
6,471 | The name SharpChisel may be related to the purpose of this file, which is a C# wrapper for a tunneling tool called chisel. | [
{
"id": 20113,
"label": "location",
"start_offset": 21,
"end_offset": 24
},
{
"id": 20114,
"label": "location",
"start_offset": 103,
"end_offset": 107
},
{
"id": 20115,
"label": "malware",
"start_offset": 115,
"end_offset": 121
}
] | [] | [] |
5,041 | We also send all targeted Gmail and Workspace users government-backed attacker alerts notifying them of the activity. | [
{
"id": 51125,
"label": "SOFTWARE",
"start_offset": 36,
"end_offset": 45
},
{
"id": 51124,
"label": "SOFTWARE",
"start_offset": 26,
"end_offset": 31
}
] | [] | [] |
9,309 | Billing address (city) bill_to_zip nn | [] | [] | [] |
832 | By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. | [] | [] | [] |
2,811 | Unit 42 is following this situation very closely and will update this blog with any new information as it becomes available. | [
{
"id": 45705,
"label": "identity",
"start_offset": 1,
"end_offset": 8
}
] | [] | [] |
581 | Palo Alto Networks customers are further protected from ransomware. | [
{
"id": 46178,
"label": "identity",
"start_offset": 0,
"end_offset": 18
}
] | [] | [] |
2,475 | This particular webshell will load a base64 encoded class that will contain the functionality desired by the actor. | [] | [] | [] |
1,966 | The RDG client responds once again with a Client Hello packet containing the received cookie, which will initiate the DTLS handshake (RFC6347 Section 4.2). Figure 1: Initiation of the DTLS handshake between RDG client and server Figure 2: RDG client and server handshake phase (Source: [MS-TSGU] Section 1.3.3.1.1) | [] | [] | [] |
2,819 | The attack uses this vulnerability to spread the WanaCrypt0r ransomware on the network. | [
{
"id": 8612,
"label": "malware",
"start_offset": 50,
"end_offset": 61
}
] | [] | [] |
1,165 | Idiosyncrasies of the malware author become apparent, the evolution can be traced, the availability or quality of code deduced, and reuse of functionality made clear with a simple mutex. | [] | [] | [] |
6,979 | Figure 14. CrimsonRAT malware hosted in viral91[.]xyz We were also able to source a phishing document, “csd_car_price_list_2017,” that is related to this domain and has been seen in the wild in 2017. | [
{
"id": 21868,
"label": "attack-pattern",
"start_offset": 84,
"end_offset": 90
},
{
"id": 21869,
"label": "attack-pattern",
"start_offset": 93,
"end_offset": 101
},
{
"id": 21870,
"label": "location",
"start_offset": 170,
"end_offset": 173
}
] | [] | [] |
11,807 | The attackers use this function to relay device-based data to the channel, so they can see details such as the IP, useragent, and locales of visitors to their phishing sites in real-time. | [
{
"id": 36416,
"label": "location",
"start_offset": 83,
"end_offset": 86
},
{
"id": 36417,
"label": "location",
"start_offset": 126,
"end_offset": 129
},
{
"id": 36418,
"label": "attack-pattern",
"start_offset": 159,
"end_offset": 167
},
{
"id": 36419,
"label": "location",
"start_offset": 168,
"end_offset": 173
},
{
"id": 36420,
"label": "location",
"start_offset": 177,
"end_offset": 181
},
{
"id": 36421,
"label": "location",
"start_offset": 182,
"end_offset": 186
}
] | [] | [] |
517 | From this lens, the top three families observed are Ryuk (31.7%), Sodinokibi (20%) and Maze (15%). Emails are still the most efficient method to deliver and propagate ransomware. | [
{
"id": 46146,
"label": "malware",
"start_offset": 52,
"end_offset": 56
},
{
"id": 46147,
"label": "malware",
"start_offset": 66,
"end_offset": 76
},
{
"id": 46148,
"label": "malware",
"start_offset": 87,
"end_offset": 91
}
] | [] | [] |
3,659 | Although both names have at times been used to refer to the same group, organizations such as MITRE identifies them as two separate entities that wield the Carbanak backdoor in their attacks. | [
{
"id": 49429,
"label": "identity",
"start_offset": 94,
"end_offset": 99
},
{
"id": 49432,
"label": "malware",
"start_offset": 156,
"end_offset": 173
}
] | [] | [] |
2,598 | Apart from Argentinian eCommerce provider Mercado Libre / Mercado Pago, subsequent victimology has departed South America and pivoted to focus on the high-tech sector. Recent public victims have included: It should be understood that in addition there are likely any number of other victims, targeted by attacks not known in the public sphere. | [
{
"id": 45606,
"label": "location",
"start_offset": 12,
"end_offset": 23
},
{
"id": 45608,
"label": "identity",
"start_offset": 43,
"end_offset": 56
},
{
"id": 45609,
"label": "identity",
"start_offset": 59,
"end_offset": 71
},
{
"id": 45610,
"label": "location",
"start_offset": 109,
"end_offset": 122
}
] | [
{
"id": 357,
"from_id": 45608,
"to_id": 45606,
"type": "located-at"
},
{
"id": 358,
"from_id": 45609,
"to_id": 45606,
"type": "located-at"
},
{
"id": 359,
"from_id": 45609,
"to_id": 45608,
"type": "related-to"
}
] | [] |
823 | The patch provided by Microsoft included the typical release of operating system patches, but this time a new Application Programming Interface (API) function was added. | [
{
"id": 46371,
"label": "SOFTWARE",
"start_offset": 23,
"end_offset": 32
}
] | [] | [] |
3,969 | Use multi-factor authentication whenever possible and regularly update it. | [] | [] | [] |
10,872 | Similar malicious samples | [] | [] | [] |
12,804 | All Roads Lead to BlackTech | [
{
"id": 39873,
"label": "threat-actor",
"start_offset": 10,
"end_offset": 14
},
{
"id": 39874,
"label": "threat-actor",
"start_offset": 18,
"end_offset": 27
}
] | [] | [] |
520 | Web browsing is the second most common entry vector for ransomware infections. | [] | [] | [] |
357 | As Heartbleed allows the attacker to scrape memory from the vulnerable device, they can retrieve significant amounts of secret information. | [
{
"id": 44716,
"label": "attack-pattern",
"start_offset": 38,
"end_offset": 51
},
{
"id": 44715,
"label": "vulnerability",
"start_offset": 4,
"end_offset": 14
}
] | [
{
"id": 153,
"from_id": 44715,
"to_id": 44716,
"type": "targets"
}
] | [] |
211 | Additionally the kernel module responsible for the actual wiping activity is from a legitimate application called EaseUS Partition Master. | [
{
"id": 45907,
"label": "tools",
"start_offset": 115,
"end_offset": 138
}
] | [] | [] |
2,400 | The CVE-2022-22965 vulnerability allows an attacker unauthenticated remote code execution (RCE), which Unit 42 has observed being exploited in the wild. | [
{
"id": 45495,
"label": "vulnerability",
"start_offset": 4,
"end_offset": 18
},
{
"id": 45496,
"label": "attack-pattern",
"start_offset": 52,
"end_offset": 89
},
{
"id": 45497,
"label": "identity",
"start_offset": 103,
"end_offset": 110
}
] | [
{
"id": 105,
"from_id": 45496,
"to_id": 45495,
"type": "delivers"
}
] | [] |
658 | The WannaCry attacks in May, 2017 demonstrated that many Windows systems had not been patched for this vulnerability. | [
{
"id": 2160,
"label": "malware",
"start_offset": 4,
"end_offset": 12
},
{
"id": 46236,
"label": "TIME",
"start_offset": 24,
"end_offset": 33
},
{
"id": 46237,
"label": "SOFTWARE",
"start_offset": 57,
"end_offset": 64
}
] | [] | [] |
7,325 | Figure 21. | [] | [] | [] |
3,702 | To steal these, both groups employed credential dumping and input capture. | [
{
"id": 11230,
"label": "attack-pattern",
"start_offset": 37,
"end_offset": 55
},
{
"id": 11232,
"label": "attack-pattern",
"start_offset": 60,
"end_offset": 73
}
] | [] | [] |
10,298 | Troj.Win32.TRX.XXPE50FFF039 b61e0f68772f3557024325f3a05e4edb940dbbe380af00f3bdaaaeabda308e72 igmtSX.exe | [
{
"id": 31450,
"label": "SHA1",
"start_offset": 29,
"end_offset": 93
}
] | [] | [] |
12,997 | Within these files is a link to an attacker controlled phishing domain. | [
{
"id": 40484,
"label": "attack-pattern",
"start_offset": 55,
"end_offset": 63
}
] | [] | [] |
9,648 | For regular user path: ~/Library/Spelling/ processname: spellagentd | [] | [] | [] |
2,341 | These two functions are used in conjunction to dynamically load a shared object into memory and retrieve the address of a symbol from it. | [] | [] | [] |
9,750 | Running this registry file adds the following command to the Run registry key: rundll32 %Temp%\png.dll,RunPow Figure 3. | [
{
"id": 29734,
"label": "attack-pattern",
"start_offset": 79,
"end_offset": 87
}
] | [] | [] |
13,128 | The expansive use of open source code by DevOps teams adds another element of risk which requires urgent attention. | [] | [] | [] |
10,178 | Since late 2019, our team has disrupted financially motivated phishing campaigns targeting YouTubers with Cookie Theft malware. | [
{
"id": 31068,
"label": "attack-pattern",
"start_offset": 62,
"end_offset": 70
}
] | [] | [] |
4,027 | It is our aim, through this article, to encourage enterprises to review their own security setting and protect themselves from damage and compromise. | [] | [] | [] |
1,668 | The client combines this with the password and generates the same key. | [] | [] | [] |
3,774 | Cortex Xpanse was able to identify ~800 instances of VMware Workspace ONE Access connected to the public internet, and can be leveraged to enumerate potentially vulnerable instances within customer networks. | [
{
"id": 49607,
"label": "SOFTWARE",
"start_offset": 1,
"end_offset": 14
},
{
"id": 49608,
"label": "SOFTWARE",
"start_offset": 54,
"end_offset": 81
}
] | [] | [] |
10,132 | The method, which we first discussed in 2014, involves changing a browser tab to point to a phishing site after distracting the target. | [
{
"id": 30896,
"label": "location",
"start_offset": 74,
"end_offset": 77
},
{
"id": 30897,
"label": "location",
"start_offset": 81,
"end_offset": 86
},
{
"id": 30898,
"label": "attack-pattern",
"start_offset": 92,
"end_offset": 100
},
{
"id": 30899,
"label": "location",
"start_offset": 128,
"end_offset": 134
}
] | [] | [] |
1,754 | In his slides, he mentioned that a "god mode" of Internet Explorer could be turned on by a one byte overwrite. | [
{
"id": 46906,
"label": "SOFTWARE",
"start_offset": 49,
"end_offset": 66
}
] | [] | [] |
1,592 | Version Summary October 24, 2017 2:30 p.m. PT Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address! | [
{
"id": 46837,
"label": "TIME",
"start_offset": 18,
"end_offset": 47
}
] | [] | [] |
1,773 | Here, xyz indicates a user-controlled address that contains the length of a vector object or length of an Int32Array. | [] | [] | [] |
2,334 | day or 0-day? | [] | [] | [] |
204 | On Feb. 18, both the United States and the United Kingdom attributed these DDoS attacks to Russia’s Main Intelligence Directorate (GRU). Over the past week, Ukraine has continued to observe a relatively constant flow of DDoS attacks targeting its government and financial institutions. | [
{
"id": 44621,
"label": "identity",
"start_offset": 22,
"end_offset": 35
},
{
"id": 44622,
"label": "TIME",
"start_offset": 4,
"end_offset": 11
},
{
"id": 44623,
"label": "identity",
"start_offset": 44,
"end_offset": 58
},
{
"id": 44624,
"label": "attack-pattern",
"start_offset": 76,
"end_offset": 80
},
{
"id": 44625,
"label": "threat-actor",
"start_offset": 92,
"end_offset": 136
},
{
"id": 44626,
"label": "identity",
"start_offset": 159,
"end_offset": 166
},
{
"id": 44627,
"label": "attack-pattern",
"start_offset": 222,
"end_offset": 234
},
{
"id": 44628,
"label": "identity",
"start_offset": 249,
"end_offset": 286
}
] | [
{
"id": 4,
"from_id": 44624,
"to_id": 44625,
"type": "attributed-to"
},
{
"id": 131,
"from_id": 44627,
"to_id": 44628,
"type": "targets"
}
] | [] |
14,021 | Instead, it is determined by the operating system language at the time of the version resource inclusion. | [] | [] | [] |
907 | Once files are identified, PClock will begin encrypting them, one-by-one. | [
{
"id": 46430,
"label": "malware",
"start_offset": 28,
"end_offset": 34
}
] | [] | [] |
7,618 | Figure 15. | [] | [] | [] |
479 | About: Threat Briefs are meant to help busy people understand real-world threats and how they can prevent them in their lives. | [] | [] | [] |
7,265 | Figures 1-2. | [] | [] | [] |
4,929 | This means that there is typically more than one threat actor behind the warnings. | [] | [] | [] |
5,427 | Having a distributed infrastructure also makes it more difficult for cybersecurity teams to take down the whole attack. | [] | [] | [] |
7,138 | This shows that the threat actors intended to confuse forensics investigators with incorrect timestamps, which is why it’s critical to analyze timestamps with caution during investigations. | [] | [] | [] |
8,501 | This is the second directive the TSA issued to the pipeline sector this 2021, building on the initial Security Directive released on May 2021 following the ransomware attack on Colonial Pipeline by DarkSide. | [] | [] | [] |
14,126 | At the same time, we were able to locate the Mattermost server hosted in Greece, and that gave us the current time zone of the Mattermost server. | [
{
"id": 48192,
"label": "location",
"start_offset": 73,
"end_offset": 79
},
{
"id": 48191,
"label": "Infrastucture",
"start_offset": 127,
"end_offset": 144
},
{
"id": 48193,
"label": "Infrastucture",
"start_offset": 45,
"end_offset": 62
}
] | [
{
"id": 392,
"from_id": 48191,
"to_id": 48192,
"type": "located-at"
},
{
"id": 393,
"from_id": 48193,
"to_id": 48192,
"type": "located-at"
}
] | [] |
3,542 | Trend Micro solutions | [
{
"id": 49318,
"label": "identity",
"start_offset": 0,
"end_offset": 11
}
] | [] | [] |
2,602 | Several of the Lapsus$ Group’s attacks involved the theft and publication of source code. | [
{
"id": 47790,
"label": "threat-actor",
"start_offset": 15,
"end_offset": 22
}
] | [] | [] |
3,742 | This is also the earliest date at which Unit 42 observed exploitation attempts and scanning activity. 2022-04-13: VMware advisory updated with knowledge of active exploitation of CVE-2022-22954 in the wild. | [
{
"id": 49562,
"label": "TIME",
"start_offset": 103,
"end_offset": 113
},
{
"id": 49563,
"label": "identity",
"start_offset": 115,
"end_offset": 121
},
{
"id": 49561,
"label": "identity",
"start_offset": 40,
"end_offset": 47
},
{
"id": 49564,
"label": "vulnerability",
"start_offset": 180,
"end_offset": 194
}
] | [] | [] |
2,491 | While CVE-2022-22963 is a different vulnerability in Spring Cloud Function (not technically part of SpringShell), a Threat Prevention signature is also available to ensure coverage at the perimeter. | [
{
"id": 47575,
"label": "vulnerability",
"start_offset": 101,
"end_offset": 112
},
{
"id": 47573,
"label": "vulnerability",
"start_offset": 7,
"end_offset": 21
},
{
"id": 47574,
"label": "SOFTWARE",
"start_offset": 54,
"end_offset": 66
}
] | [
{
"id": 341,
"from_id": 47574,
"to_id": 47573,
"type": "has"
}
] | [] |
13,826 | The rest of the routine is all placed in “GetRTTAndHopCount.” | [] | [] | [] |
6,925 | Exploiting CVE-2019-0676 enabled attackers to reveal presence or non-presence of files on the victim’s computer; this information was later used to decide whether or not a second stage exploit should be delivered. | [] | [] | [] |
8,032 | The phishing kit will also ask for second-factor authentication codes sent to devices. | [
{
"id": 24913,
"label": "attack-pattern",
"start_offset": 4,
"end_offset": 12
},
{
"id": 24914,
"label": "location",
"start_offset": 17,
"end_offset": 21
}
] | [] | [] |
3,282 | It writes the basic config and RTMP config of OBS and then starts the OBS process to monitor the victim’s desktop using RTMP live streaming to the cloud. | [] | [] | [] |
3,918 | <%@ Page Language="Jscript" Debug=true%> | [] | [] | [] |
4,834 | Today, we're sharing intelligence on a segment of attackers we call hack-for-hire, whose niche focuses on compromising accounts and exfiltrating data as a service. | [
{
"id": 50791,
"label": "attack-pattern",
"start_offset": 68,
"end_offset": 81
}
] | [] | [] |
855 | And while this technique alone isn’t solely responsible for the damaging power of WanaCrypt0r/WannaCry and Petya/NotPetya it is certainly an important contributing factor. | [
{
"id": 2781,
"label": "malware",
"start_offset": 82,
"end_offset": 93
},
{
"id": 2784,
"label": "malware",
"start_offset": 107,
"end_offset": 112
},
{
"id": 44893,
"label": "malware",
"start_offset": 94,
"end_offset": 102
},
{
"id": 44895,
"label": "malware",
"start_offset": 113,
"end_offset": 121
}
] | [] | [] |
9,416 | This malware lineup includes tried-and-tested malware families that have been upgraded, such as PlugX and Gh0st RAT, and a brand-new multistage malware family that we have dubbed PuppetLoader. | [
{
"id": 28978,
"label": "location",
"start_offset": 35,
"end_offset": 38
},
{
"id": 28979,
"label": "malware",
"start_offset": 96,
"end_offset": 101
},
{
"id": 28980,
"label": "location",
"start_offset": 102,
"end_offset": 105
},
{
"id": 28981,
"label": "malware",
"start_offset": 106,
"end_offset": 115
},
{
"id": 28982,
"label": "location",
"start_offset": 117,
"end_offset": 120
},
{
"id": 28983,
"label": "location",
"start_offset": 123,
"end_offset": 128
},
{
"id": 28984,
"label": "malware",
"start_offset": 179,
"end_offset": 191
}
] | [] | [] |
13,066 | Published New White Paper: Practical Risk Assessments for Smart Factories | [] | [] | [] |
3,374 | Silverlight_ins.exe BIOPASS RAT Loader | [
{
"id": 10218,
"label": "malware",
"start_offset": 21,
"end_offset": 32
},
{
"id": 49020,
"label": "FILEPATH",
"start_offset": 0,
"end_offset": 19
}
] | [
{
"id": 557,
"from_id": 49020,
"to_id": 10218,
"type": "indicates"
}
] | [] |
7,747 | The attached document asks the user to enable the macros, which creates an Internet Explorer object instance. | [] | [] | [] |
11,684 | These documents and news are probably interesting in some way to their targets and are used to make them click and log in to the phishing pages. | [
{
"id": 35831,
"label": "location",
"start_offset": 16,
"end_offset": 19
},
{
"id": 35832,
"label": "location",
"start_offset": 25,
"end_offset": 28
},
{
"id": 35833,
"label": "location",
"start_offset": 58,
"end_offset": 61
},
{
"id": 35834,
"label": "location",
"start_offset": 79,
"end_offset": 82
},
{
"id": 35835,
"label": "location",
"start_offset": 83,
"end_offset": 86
},
{
"id": 35836,
"label": "location",
"start_offset": 100,
"end_offset": 104
},
{
"id": 35837,
"label": "location",
"start_offset": 111,
"end_offset": 114
},
{
"id": 35838,
"label": "attack-pattern",
"start_offset": 129,
"end_offset": 137
}
] | [] | [] |
2,232 | In the event the supplied argument was C:\malware.exe, the registry key would be named ‘malware’, and the path for this key would be ‘C:\malware.exe’. The persistence thread runs in a loop where the registry keys are set every 60 seconds, ensuring persistence even in the event an administrator manually deletes the registry keys. | [
{
"id": 45426,
"label": "FILEPATH",
"start_offset": 39,
"end_offset": 53
},
{
"id": 45427,
"label": "FILEPATH",
"start_offset": 134,
"end_offset": 148
},
{
"id": 6655,
"label": "TIME",
"start_offset": 222,
"end_offset": 238
}
] | [] | [] |
5,063 | Ghostwriter actors have quickly adopted this new technique, combining it with a previously observed technique, hosting credential phishing landing pages on compromised sites. | [
{
"id": 51170,
"label": "attack-pattern",
"start_offset": 111,
"end_offset": 173
},
{
"id": 51169,
"label": "threat-actor",
"start_offset": 0,
"end_offset": 11
}
] | [
{
"id": 1066,
"from_id": 51169,
"to_id": 51170,
"type": "uses"
}
] | [] |
4,576 | These phishing domains have been blocked through Google Safe Browsing – a service that identifies unsafe websites across the web and notifies users and website owners of potential harm. | [] | [] | [] |
3,935 | It proceeded with copying the Chopper web shell into accessible shared folders in other hosts to gain access. | [
{
"id": 49777,
"label": "malware",
"start_offset": 30,
"end_offset": 47
}
] | [] | [] |
2,304 | iOS Exploits | [
{
"id": 45455,
"label": "SOFTWARE",
"start_offset": 0,
"end_offset": 3
}
] | [] | [] |
14,357 | The attackers were found using the HTTP protocol to transfer data. | [] | [] | [] |
2,032 | With HelloXD version 2, the author(s) opted to alter the encryption routine, swapping out the modified HC-128 algorithm with the Rabbit symmetric cipher. | [
{
"id": 6049,
"label": "malware",
"start_offset": 6,
"end_offset": 13
}
] | [] | [] |
890 | PClock2 also enables persistence by setting the following registry key. | [
{
"id": 46421,
"label": "malware",
"start_offset": 1,
"end_offset": 8
}
] | [] | [] |
6,681 | The full extent of the attack is currently unknown. | [] | [] | [] |
3,239 | The second HTTP server behaves the same as the first but returns a string, “dm_online”, instead. | [] | [] | [] |
6,949 | Aside from the Crimson RAT malware, the Earth Karkaddan APT group is also known to use the ObliqueRat malware in its campaigns. | [
{
"id": 21753,
"label": "location",
"start_offset": 40,
"end_offset": 45
},
{
"id": 21754,
"label": "location",
"start_offset": 56,
"end_offset": 59
},
{
"id": 21755,
"label": "malware",
"start_offset": 91,
"end_offset": 101
}
] | [] | [] |
1,141 | While programmatic analysis would have a hard time associating the two, it's obvious to a human that the same face rolling technique was used to name this mutex. | [] | [] | [] |
5,171 | DDS is integral in embedded systems that require real-time machine-to-machine communication, facilitating a reliable communication layer between sensors, controllers, and actuators. | [] | [] | [] |
2,118 | Vulnerability Information | [] | [] | [] |
8 | This tactic is a nightmare for legacy security products that are based on legacy techniques such as bytes signatures, since they can only detect attacks after the damage is done instead of preventing it as a true solution should. | [] | [] | [] |
1,929 | But this link is further fortified by the Android applications we found whose code is like that of Bahamut, with the C&C matching the usual name registration pattern of Patchwork’s group, as well as an infrastructure close to an old Patchwork domain. | [
{
"id": 45181,
"label": "SOFTWARE",
"start_offset": 42,
"end_offset": 49
},
{
"id": 45183,
"label": "threat-actor",
"start_offset": 169,
"end_offset": 178
},
{
"id": 45184,
"label": "threat-actor",
"start_offset": 233,
"end_offset": 242
},
{
"id": 45182,
"label": "malware",
"start_offset": 99,
"end_offset": 106
}
] | [
{
"id": 80,
"from_id": 45182,
"to_id": 45183,
"type": "attributed-to"
}
] | [] |
8,880 | Having the scheduled task run only once removes the notion of persistence. | [
{
"id": 27467,
"label": "attack-pattern",
"start_offset": 11,
"end_offset": 25
},
{
"id": 27468,
"label": "location",
"start_offset": 30,
"end_offset": 34
}
] | [] | [] |
4,427 | The functionality was not automated and it's unclear why it was removed in later versions. | [] | [] | [] |
2,246 | The following alphabet is used: 3bcd1fghijklmABCDEFGH-J+LMnopq4stuvwxyzNOPQ7STUVWXYZ0e2ar56R89K/ | [] | [] | [] |
9,100 | Stealth was already a fixture in their operations. | [] | [] | [] |
8,125 | In reality, that is just an overlay screen that is displayed on top of all activity windows on the device. | [
{
"id": 25165,
"label": "identity",
"start_offset": 20,
"end_offset": 24
}
] | [] | [] |