id
int64 1
14.4k
| text
stringlengths 3
5.01k
| entities
list | relations
list | Comments
list |
---|---|---|---|---|
1,965 | The DTLS protocol is used by Microsoft Windows Remote Desktop Gateway (RDG) to establish a secure channel between the RDG client and RDG server (described in detail in [MS_TSGU].pdf). The RDG client initiates the DTLS connection by sending a ClientHello to the RDG Server. The RDG server then responds with a DTLS Hello Verify Request that contains a cookie; this is used as a denial of service countermeasure. | [
{
"id": 47089,
"label": "SOFTWARE",
"start_offset": 29,
"end_offset": 75
},
{
"id": 47090,
"label": "FILEPATH",
"start_offset": 168,
"end_offset": 181
}
] | [] | [] |
4,432 | PipeCommunication pipeCommunication = new PipeCommunication(true, text); bool flag = false; while (!flag) | [] | [] | [] |
4,071 | HTShell supports importing additional config files. | [
{
"id": 49909,
"label": "malware",
"start_offset": 0,
"end_offset": 7
}
] | [] | [] |
8,147 | Customized encoding routine done Relation to SideWinder | [] | [] | [] |
7,298 | Third-stage payload | [] | [] | [] |
160 | Although that feature was never enabled to protect user data files like ransomware targets, there is a clear lesson from the experience: too many security checks on user activity fails in the end. | [] | [] | [] |
5,061 | In mid-March, a security researcher released a blog post detailing a 'Browser in the Browser' phishing technique. | [
{
"id": 51167,
"label": "TIME",
"start_offset": 3,
"end_offset": 12
}
] | [] | [] |
2,422 | Exposing the class object to web users is very dangerous and can lead to RCE in many ways. | [] | [] | [] |
9,616 | We’ll also continue to apply those findings internally to improve the safety and security of our products so we can effectively combat threats and protect users who rely on our services. | [
{
"id": 29454,
"label": "tools",
"start_offset": 70,
"end_offset": 76
},
{
"id": 29455,
"label": "location",
"start_offset": 77,
"end_offset": 80
},
{
"id": 29456,
"label": "location",
"start_offset": 81,
"end_offset": 89
},
{
"id": 29457,
"label": "location",
"start_offset": 112,
"end_offset": 115
},
{
"id": 29458,
"label": "location",
"start_offset": 143,
"end_offset": 146
}
] | [] | [] |
9,711 | Other bytes are just randomly generated noise. | [
{
"id": 29625,
"label": "location",
"start_offset": 12,
"end_offset": 15
},
{
"id": 29626,
"label": "identity",
"start_offset": 16,
"end_offset": 20
}
] | [] | [] |
5,591 | Avoid connecting a NAS device directly to the internet. | [] | [] | [] |
3,910 | Initial access | [] | [] | [] |
2,493 | Unit 42 is actively monitoring malicious traffic through our devices and cloud solutions. | [
{
"id": 45540,
"label": "identity",
"start_offset": 1,
"end_offset": 8
}
] | [] | [] |
3,470 | Otherwise, Marade will use the C&C information embedded in its code. | [
{
"id": 49270,
"label": "malware",
"start_offset": 11,
"end_offset": 17
}
] | [] | [] |
5,545 | What can you do to stay safe? | [] | [] | [] |
10,962 | To help protect users against these kinds of tracks, our Advanced Protection Program (APP) utilizes hardware security keys and provides the strongest protections available against phishing and account hijackings. | [
{
"id": 33353,
"label": "location",
"start_offset": 66,
"end_offset": 76
},
{
"id": 33354,
"label": "location",
"start_offset": 109,
"end_offset": 117
},
{
"id": 33355,
"label": "location",
"start_offset": 123,
"end_offset": 126
},
{
"id": 33356,
"label": "attack-pattern",
"start_offset": 180,
"end_offset": 188
},
{
"id": 33357,
"label": "location",
"start_offset": 189,
"end_offset": 192
}
] | [] | [] |
3,079 | Please mark, I'm not a robot! | [] | [] | [] |
6,117 | It is correctly identified by eleven AV vendors as PlugX malware. | [
{
"id": 18919,
"label": "malware",
"start_offset": 51,
"end_offset": 56
}
] | [] | [] |
989 | We would also like to thank Ryan Olson, Benjamin Small, Richar Wartell, and Chris Clark from Palo Alto networks in publishing the discovery. | [
{
"id": 46484,
"label": "identity",
"start_offset": 28,
"end_offset": 38
},
{
"id": 46485,
"label": "identity",
"start_offset": 40,
"end_offset": 54
},
{
"id": 46486,
"label": "identity",
"start_offset": 56,
"end_offset": 70
},
{
"id": 46487,
"label": "identity",
"start_offset": 76,
"end_offset": 87
},
{
"id": 46488,
"label": "identity",
"start_offset": 93,
"end_offset": 111
}
] | [] | [] |
10,364 | Given the use of lure documents designed with social engineering in mind, it is likely that the attackers use phishing or spam to target users who are unaware of these documents' malicious nature. | [
{
"id": 31553,
"label": "location",
"start_offset": 0,
"end_offset": 5
},
{
"id": 31554,
"label": "location",
"start_offset": 17,
"end_offset": 21
},
{
"id": 31555,
"label": "location",
"start_offset": 80,
"end_offset": 86
},
{
"id": 31556,
"label": "attack-pattern",
"start_offset": 110,
"end_offset": 118
},
{
"id": 31557,
"label": "location",
"start_offset": 130,
"end_offset": 136
},
{
"id": 31558,
"label": "location",
"start_offset": 147,
"end_offset": 150
}
] | [] | [] |
2,130 | There is also proof of concept (PoC) code available already. | [] | [] | [] |
4,367 | Trend Micro™ Deep Discovery™ Email Inspector – Defends users through a combination of real-time scanning and advanced analysis techniques for known and unknown attacks. Indicators of Compromise Hashes of the malicious encrypted documents: SHA256 Detection name dacf7868a71440a7d7d8797caca1aa29b7780801e6f3b3bc33123f16989354b2 Trojan.W97M.CONFUCIUS.A 0f6bcbdf4d192f8273887f9858819dd4690397a92fb28a60bb731c873c438e07 Trojan.W97M.CONFUCIUS.B | [
{
"id": 50153,
"label": "malware",
"start_offset": 428,
"end_offset": 451
},
{
"id": 50149,
"label": "SOFTWARE",
"start_offset": 0,
"end_offset": 28
},
{
"id": 50150,
"label": "SHA2",
"start_offset": 271,
"end_offset": 335
},
{
"id": 50151,
"label": "malware",
"start_offset": 337,
"end_offset": 360
},
{
"id": 50152,
"label": "SHA2",
"start_offset": 362,
"end_offset": 426
}
] | [
{
"id": 920,
"from_id": 50150,
"to_id": 50151,
"type": "indicates"
},
{
"id": 921,
"from_id": 50152,
"to_id": 50153,
"type": "indicates"
}
] | [] |
1,314 | The following icon is present in this sample: Figure 8. | [] | [] | [] |
6,680 | CISA has also issued a bulletin asking organizations using the software to follow Kaseya guidance. | [] | [] | [] |
14,180 | But these efforts have been mainly targeted at Ukrainian organizations. | [] | [] | [] |
1,209 | They implement code that will send SMS to pre-defined premium numbers (Figure 1). | [] | [] | [] |
5,273 | For organizations, Trend Micro™ Mobile Security for Enterprise provides device, compliance and application management, data protection, and configuration provisioning, as well as protects devices from attacks that leverage vulnerabilities, preventing unauthorized access to apps, as well as detecting and blocking malware and fraudulent websites. | [
{
"id": 51315,
"label": "SOFTWARE",
"start_offset": 19,
"end_offset": 62
}
] | [] | [] |
4,521 | Although our security precautions are robust, security issues can still occur, which is why we created a comprehensive security response process to respond to incidents. | [] | [] | [] |
14,416 | In these attacks, attackers utilized the Eternal Blue exploit and harvested credentials as they moved across the environment, and then used existing system tools to kill security services within machines to hide their presence. | [
{
"id": 47172,
"label": "vulnerability",
"start_offset": 41,
"end_offset": 61
}
] | [] | [] |
1,152 | These unique consistencies make it extremely improbable that two different people named these mutexes. | [] | [] | [] |
3,033 | We close this list with patching because it is the most important thing you can do. | [] | [] | [] |
14,297 | Infection chain of Maikspy Windows variant Figure 8. | [
{
"id": 48503,
"label": "malware",
"start_offset": 19,
"end_offset": 27
},
{
"id": 48504,
"label": "SOFTWARE",
"start_offset": 27,
"end_offset": 35
}
] | [
{
"id": 434,
"from_id": 48503,
"to_id": 48504,
"type": "targets"
}
] | [] |
213 | In tracking this threat, early reports show that the malware has been deployed against a financial institution in Ukraine as well as two contractors in Latvia and Lithuania that provide services to the Ukrainian Government. | [
{
"id": 44633,
"label": "location",
"start_offset": 114,
"end_offset": 121
},
{
"id": 44634,
"label": "identity",
"start_offset": 202,
"end_offset": 222
},
{
"id": 44635,
"label": "identity",
"start_offset": 90,
"end_offset": 110
},
{
"id": 44636,
"label": "location",
"start_offset": 152,
"end_offset": 158
},
{
"id": 44637,
"label": "location",
"start_offset": 163,
"end_offset": 172
},
{
"id": 44638,
"label": "malware",
"start_offset": 53,
"end_offset": 60
},
{
"id": 44639,
"label": "identity",
"start_offset": 133,
"end_offset": 172
}
] | [
{
"id": 6,
"from_id": 44638,
"to_id": 44635,
"type": "targets"
},
{
"id": 7,
"from_id": 44638,
"to_id": 44639,
"type": "targets"
}
] | [] |
1,725 | By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. | [] | [] | [] |
13,383 | Email: | [] | [] | [] |
6,926 | The attack vector for CVE-2019-1367 was rather atypical as the exploit was delivered from an Office document abusing the online video embedding feature to load an external URL conducting the exploitation. | [
{
"id": 21664,
"label": "tools",
"start_offset": 11,
"end_offset": 17
},
{
"id": 21666,
"label": "location",
"start_offset": 155,
"end_offset": 159
}
] | [] | [] |
6,676 | They used access to the VSA software to deploy ransomware associated with the REvil/Sodinokibi ransomware-as-a-service group, according to reports. | [
{
"id": 20733,
"label": "malware",
"start_offset": 78,
"end_offset": 83
},
{
"id": 20734,
"label": "threat-actor",
"start_offset": 84,
"end_offset": 94
}
] | [] | [] |
1,257 | The malware was included as an attachment intended to trick the user into opening the malware. | [
{
"id": 44954,
"label": "attack-pattern",
"start_offset": 31,
"end_offset": 81
}
] | [] | [] |
1,453 | Because of this, app developers should be extremely careful about re-using certificates when signing their apps. | [] | [] | [] |
829 | As always, we recommend keeping your Microsoft products up to date with the latest patches to mitigate this vulnerability. | [
{
"id": 46379,
"label": "identity",
"start_offset": 37,
"end_offset": 46
}
] | [] | [] |
1,266 | Four of the five Sysget variants included a form of decoy document to trick users into believing they had opened a legitimate file rather than malware. | [
{
"id": 46642,
"label": "malware",
"start_offset": 18,
"end_offset": 24
},
{
"id": 44958,
"label": "attack-pattern",
"start_offset": 53,
"end_offset": 67
}
] | [
{
"id": 204,
"from_id": 46642,
"to_id": 44958,
"type": "uses"
}
] | [] |
1,921 | A malicious RTF file that exploits the CVE-2017-8750 and drops a malicious VB backdoor with C&C appswonder[.]info A malicious InPage file that exploits CVE-2017-12824 and drops two files, one non-malicious, and one malicious VB backdoor with C&C referfile[.]com Talos recently reported both C&C domain names with one type of campaign that targets iOS and involves MDM, and another type using VB and Delphi backdoors. | [
{
"id": 47039,
"label": "vulnerability",
"start_offset": 40,
"end_offset": 53
},
{
"id": 47042,
"label": "DOMAIN",
"start_offset": 247,
"end_offset": 262
},
{
"id": 47043,
"label": "identity",
"start_offset": 264,
"end_offset": 269
},
{
"id": 47044,
"label": "SOFTWARE",
"start_offset": 349,
"end_offset": 352
},
{
"id": 47045,
"label": "malware",
"start_offset": 3,
"end_offset": 16
},
{
"id": 47040,
"label": "vulnerability",
"start_offset": 153,
"end_offset": 167
},
{
"id": 47041,
"label": "DOMAIN",
"start_offset": 97,
"end_offset": 114
}
] | [
{
"id": 291,
"from_id": 47045,
"to_id": 47039,
"type": "exploits"
},
{
"id": 292,
"from_id": 47045,
"to_id": 47041,
"type": "communicates-with"
}
] | [] |
9,830 | down_new | [
{
"id": 29966,
"label": "tools",
"start_offset": 0,
"end_offset": 8
}
] | [] | [] |
11,642 | Furthermore, it seems that these lures are distributed via phishing links. | [
{
"id": 35731,
"label": "location",
"start_offset": 39,
"end_offset": 42
},
{
"id": 35732,
"label": "attack-pattern",
"start_offset": 59,
"end_offset": 67
}
] | [] | [] |
3,744 | Publication of VMware advisory VMSA-2022-0014 regarding CVE-2022-22972, CVE-2022-22973. | [
{
"id": 49568,
"label": "vulnerability",
"start_offset": 72,
"end_offset": 86
},
{
"id": 49566,
"label": "identity",
"start_offset": 15,
"end_offset": 21
},
{
"id": 49567,
"label": "vulnerability",
"start_offset": 56,
"end_offset": 70
}
] | [] | [] |
5,391 | We have observed that some of the WatchGuard and Asus bots were never cleaned up because these routers still try to connect periodically to old C&Cs that were secured or taken offline. | [] | [] | [] |
1,991 | We believe this was likely done to monitor the progress of the ransomware and maintain an additional foothold in compromised systems. | [] | [] | [] |
7,696 | Figure 5. | [] | [] | [] |
13,428 | NOTE: On May 20th, we updated our attribution to more precisely describe our findings. | [] | [] | [] |
4,515 | We ensure appropriate controls are built into the architecture of the system. | [] | [] | [] |
9,167 | Coincidence? | [] | [] | [] |
4,796 | While we continue to fight these threats on a technical level, the providers of these capabilities operate openly in democratic countries. | [] | [] | [] |
348 | The best way to protect yourself against ransomware is to keep up-to-date backups of your important files. | [] | [] | [] |
7,877 | Another 156 implement a BackupAgent that restricts which data is subject to the backup. | [] | [] | [] |
1,005 | 2. Receiving student discounts or coupons from retailers: | [] | [] | [] |
4,577 | Recently observed COLDRIVER indicators: In another campaign tracked by CERT-UA as UAC-0056 we observed compromised email addresses of a Regional Prosecutor’s office of Ukraine leveraged to send malicious Microsoft Excel documents with VBA macros delivering Cobalt Strike. | [
{
"id": 50428,
"label": "tools",
"start_offset": 257,
"end_offset": 270
},
{
"id": 50424,
"label": "identity",
"start_offset": 71,
"end_offset": 78
},
{
"id": 50425,
"label": "threat-actor",
"start_offset": 82,
"end_offset": 90
},
{
"id": 50427,
"label": "SOFTWARE",
"start_offset": 204,
"end_offset": 219
},
{
"id": 50423,
"label": "threat-actor",
"start_offset": 18,
"end_offset": 27
},
{
"id": 50426,
"label": "identity",
"start_offset": 136,
"end_offset": 175
}
] | [
{
"id": 969,
"from_id": 50423,
"to_id": 50425,
"type": "duplicate-of"
},
{
"id": 970,
"from_id": 50423,
"to_id": 50426,
"type": "impersonates"
}
] | [] |
6,391 | As noted above, the sample was configured to call home to 159.65.186[.]50 on port 443. | [
{
"id": 19815,
"label": "location",
"start_offset": 20,
"end_offset": 26
},
{
"id": 19816,
"label": "location",
"start_offset": 45,
"end_offset": 49
},
{
"id": 19817,
"label": "location",
"start_offset": 50,
"end_offset": 54
},
{
"id": 19818,
"label": "IPV4",
"start_offset": 58,
"end_offset": 73
}
] | [] | [] |
5,230 | We named these malicious apps AnubisSpy (ANDROIDOS_ANUBISSPY) as all the malware’s payload is a package called watchdog. | [
{
"id": 51263,
"label": "malware",
"start_offset": 111,
"end_offset": 119
},
{
"id": 51262,
"label": "malware",
"start_offset": 41,
"end_offset": 60
},
{
"id": 16073,
"label": "malware",
"start_offset": 30,
"end_offset": 39
}
] | [
{
"id": 1072,
"from_id": 51262,
"to_id": 16073,
"type": "duplicate-of"
}
] | [] |
4,721 | Short of not using a device, there is no way to prevent exploitation by a zero-click exploit; it's a weapon against which there is no defense. | [] | [] | [] |
3,788 | At the time, we found ChessMaster targeting different sectors from the academe to media and government agencies in Japan. | [
{
"id": 49628,
"label": "campaign",
"start_offset": 22,
"end_offset": 33
},
{
"id": 49629,
"label": "identity",
"start_offset": 71,
"end_offset": 111
},
{
"id": 49630,
"label": "location",
"start_offset": 115,
"end_offset": 120
}
] | [
{
"id": 851,
"from_id": 49628,
"to_id": 49629,
"type": "targets"
},
{
"id": 852,
"from_id": 49629,
"to_id": 49630,
"type": "located-at"
}
] | [] |
5,286 | Cyclops Blink has been around since at least June 2019, and a considerable number of its C&C servers and bots are active for up to about three years. | [
{
"id": 51336,
"label": "malware",
"start_offset": 0,
"end_offset": 13
},
{
"id": 51337,
"label": "TIME",
"start_offset": 45,
"end_offset": 54
}
] | [] | [] |
13,182 | After the encrypted payload is loaded, the loader injects a malicious DLL into rundll32.exe. | [] | [] | [] |
2,165 | This allows the attack to succeed even if the user simply views the file in the preview pane – with no clicks on the document necessary – making the attack much more dangerous. | [] | [] | [] |
1,627 | This moves it to the back of the inbox there the victim is unlikely to ever see it. | [] | [] | [] |
4,472 | We assessed that a surveillance vendor packaged and sold these technologies. | [] | [] | [] |
11,682 | Analysis of the phishing pages revealed that most of them would redirect to the original webmail servers, which they copied after the victims sent out their login credentials. | [
{
"id": 35826,
"label": "attack-pattern",
"start_offset": 16,
"end_offset": 24
},
{
"id": 35827,
"label": "location",
"start_offset": 45,
"end_offset": 49
},
{
"id": 35828,
"label": "location",
"start_offset": 53,
"end_offset": 57
}
] | [] | [] |
1,318 | More information on its history is available at the following links. | [] | [] | [] |
6,417 | This impersonation does not imply a vulnerability in Microsoft’s products or services. Brute Ratel C4 ISO Samples: 1FC7B0E1054D54CE8F1DE0CC95976081C7A85C7926C03172A3DDAA672690042C X64 Brute Ratel C4 Windows Kernel Module: 31ACF37D180AB9AFBCF6A4EC5D29C3E19C947641A2D9CE3CE56D71C1F576C069 APT29 ISO Samples: F58AE9193802E9BAF17E6B59E3FDBE3E9319C5D27726D60802E3E82D30D14D46 | [
{
"id": 19912,
"label": "SHA2",
"start_offset": 117,
"end_offset": 181
},
{
"id": 19914,
"label": "SHA2",
"start_offset": 226,
"end_offset": 290
},
{
"id": 19915,
"label": "threat-actor",
"start_offset": 292,
"end_offset": 297
},
{
"id": 19916,
"label": "SHA2",
"start_offset": 312,
"end_offset": 376
}
] | [] | [] |
1,002 | By using this kind of account, a user can perform a developer unlock on their Windows Phone devices without incurring a fee. | [] | [] | [] |
2,024 | We have observed two different samples of the HelloXD ransomware publicly available, indicating it is still under development by the author(s). | [
{
"id": 6000,
"label": "malware",
"start_offset": 47,
"end_offset": 54
}
] | [] | [] |
949 | Taomike has not previously been associated with malicious activity, but a recent update to their software added SMS theft functionality. | [
{
"id": 46458,
"label": "identity",
"start_offset": 0,
"end_offset": 7
}
] | [] | [] |
3,074 | In March of 2014, a Fake AV app named “Virus Shield” was listed for sale at $3.99 and quickly rose to the top position of Google Play’s New Paid Apps list. | [
{
"id": 48141,
"label": "malware",
"start_offset": 39,
"end_offset": 51
},
{
"id": 48142,
"label": "SOFTWARE",
"start_offset": 122,
"end_offset": 134
},
{
"id": 48143,
"label": "TIME",
"start_offset": 3,
"end_offset": 16
}
] | [] | [] |
14,233 | Among them is an algorithm utilized by PlugX. | [
{
"id": 48419,
"label": "malware",
"start_offset": 39,
"end_offset": 44
}
] | [] | [] |
4,837 | Both, however, enable attacks by those who would otherwise lack the capabilities to do so. | [] | [] | [] |
11,965 | We received leads from Graphika that supported us in this investigation. | [] | [] | [] |
13,747 | During our investigation, we noticed that the value "OracleOciLib" was deleted from the victim's machine, as shown in Figure 2. | [] | [] | [] |
1,565 | Please mark, I'm not a robot! | [] | [] | [] |
164 | It goes after the files users are most likely to care about. | [] | [] | [] |
4,481 | They target a wide range of users and opportunistically take advantage of known security flaws when undertaking their campaigns. | [] | [] | [] |
2,853 | You can find more information on this tool here. | [] | [] | [] |
4,709 | And we don’t just plug security holes – we work to eliminate entire classes of threats for consumers and businesses whose work depends on the Internet. | [] | [] | [] |
4,464 | In 2019, we confronted the risks posed by NSO Group again, relying upon NSO Groups’s marketing information suggesting that they had a 0-day exploit for Android. | [
{
"id": 50250,
"label": "threat-actor",
"start_offset": 72,
"end_offset": 82
},
{
"id": 50251,
"label": "SOFTWARE",
"start_offset": 152,
"end_offset": 159
},
{
"id": 50248,
"label": "TIME",
"start_offset": 3,
"end_offset": 7
},
{
"id": 50249,
"label": "threat-actor",
"start_offset": 42,
"end_offset": 51
},
{
"id": 50252,
"label": "attack-pattern",
"start_offset": 134,
"end_offset": 147
}
] | [] | [] |
2,514 | Conti also stands out as unreliable. | [
{
"id": 45557,
"label": "threat-actor",
"start_offset": 1,
"end_offset": 6
}
] | [] | [] |
3,882 | A more detailed analysis of the Command-and-Control communication flow of ANEL can be found in this technical brief. | [
{
"id": 49738,
"label": "malware",
"start_offset": 74,
"end_offset": 78
}
] | [] | [] |
11,144 | We terminated 8 YouTube channels as part of our actions against a coordinated influence operation linked to Yemen. | [] | [] | [] |
8,111 | The malware retrieves a specific exploit from the C&C server depending on the DEX downloaded by the dropper. | [] | [] | [] |
4,080 | Upload file 2 Download file | [] | [] | [] |
14,387 | Mark Nunnikhoven does a great job in this post talking about lateral movement. | [
{
"id": 51801,
"label": "identity",
"start_offset": 0,
"end_offset": 16
},
{
"id": 51802,
"label": "attack-pattern",
"start_offset": 61,
"end_offset": 77
}
] | [] | [] |
1,434 | , soon attackers and malware authors will turn their attention to exploiting vulnerabilities surrounding Android app certificates. | [
{
"id": 46766,
"label": "SOFTWARE",
"start_offset": 105,
"end_offset": 116
}
] | [] | [] |
1,137 | But because the mutex name is set at compile time, the mutex itself offers a common thread between all of the samples we collected and analyzed. | [] | [] | [] |
4,966 | To protect our users, Google’s Threat Analysis Group (TAG) routinely hunts for 0-day vulnerabilities exploited in-the-wild. | [
{
"id": 51011,
"label": "identity",
"start_offset": 22,
"end_offset": 58
}
] | [] | [] |
3,839 | At that time, ChessMaster was using ANEL as a backdoor into the target system then injects code into svchost.exe, which then decrypts and activates the embedded backdoor. | [
{
"id": 49694,
"label": "malware",
"start_offset": 14,
"end_offset": 25
},
{
"id": 49695,
"label": "malware",
"start_offset": 36,
"end_offset": 40
},
{
"id": 49696,
"label": "FILEPATH",
"start_offset": 101,
"end_offset": 112
}
] | [] | [] |
4,849 | Since 2012, TAG has been tracking an interwoven set of Indian hack-for-hire actors, with many having previously worked for Indian offensive security providers Appin and Belltrox. | [
{
"id": 50814,
"label": "TIME",
"start_offset": 6,
"end_offset": 10
},
{
"id": 50815,
"label": "location",
"start_offset": 55,
"end_offset": 61
},
{
"id": 50816,
"label": "attack-pattern",
"start_offset": 62,
"end_offset": 75
},
{
"id": 50817,
"label": "location",
"start_offset": 123,
"end_offset": 129
},
{
"id": 50818,
"label": "identity",
"start_offset": 159,
"end_offset": 164
},
{
"id": 50819,
"label": "identity",
"start_offset": 169,
"end_offset": 177
}
] | [] | [] |
12,150 | We did not recover additional payloads in our environment. | [] | [] | [] |
868 | In early 2015, Emnisoft identified a new family of malware named PClock. | [
{
"id": 46402,
"label": "identity",
"start_offset": 15,
"end_offset": 23
},
{
"id": 46405,
"label": "TIME",
"start_offset": 3,
"end_offset": 13
},
{
"id": 46403,
"label": "malware",
"start_offset": 65,
"end_offset": 71
}
] | [] | [] |
3,152 | According to recent Trend Micro research, many global organizations are already struggling to securely manage their cloud assets. | [
{
"id": 48270,
"label": "identity",
"start_offset": 20,
"end_offset": 31
}
] | [] | [] |
3,833 | Base64 encoded ANEL downloaded by Koadic ANEL will send the infected environment’s information to the C&C server. | [
{
"id": 49689,
"label": "malware",
"start_offset": 15,
"end_offset": 19
},
{
"id": 49690,
"label": "malware",
"start_offset": 34,
"end_offset": 40
},
{
"id": 49691,
"label": "malware",
"start_offset": 41,
"end_offset": 45
},
{
"id": 49692,
"label": "Infrastucture",
"start_offset": 102,
"end_offset": 112
}
] | [
{
"id": 860,
"from_id": 49690,
"to_id": 49689,
"type": "downloads"
},
{
"id": 861,
"from_id": 49691,
"to_id": 49692,
"type": "exfiltrates-to"
}
] | [] |
1,640 | In total we’ve found 18 different applications in the Google Play store that contain the Funtasy Trojan. | [
{
"id": 46863,
"label": "malware",
"start_offset": 90,
"end_offset": 97
},
{
"id": 46864,
"label": "SOFTWARE",
"start_offset": 55,
"end_offset": 66
}
] | [
{
"id": 242,
"from_id": 46864,
"to_id": 46863,
"type": "hosts"
}
] | [] |
6,992 | Figure 18. CapraRAT APK file drops an mp4 file The RAT also has a persistence mechanism that always keeps the app active. | [
{
"id": 21897,
"label": "malware",
"start_offset": 16,
"end_offset": 24
}
] | [] | [] |
4,762 | We use email authentication to protect against email spoofing, which is when email content is changed to make the message appear from someone or somewhere other than the actual source. | [] | [] | [] |