id
int64 1
14.4k
| text
stringlengths 3
5.01k
| entities
list | relations
list | Comments
list |
---|---|---|---|---|
9,752 | The PowerShell code has several layers of obfuscation. | [
{
"id": 29739,
"label": "attack-pattern",
"start_offset": 4,
"end_offset": 14
}
] | [] | [] |
9,320 | Group Encryption Algorithm JavaScript Library Magecart Group 11 AES Gibberish-AES ReactGet RSA JSEncrypt Mirrorthief AES Crypto-JS Table 2. Comparison of encryption algorithms used by the different groups | [
{
"id": 28757,
"label": "location",
"start_offset": 39,
"end_offset": 46
},
{
"id": 28758,
"label": "malware",
"start_offset": 47,
"end_offset": 55
},
{
"id": 28759,
"label": "malware",
"start_offset": 69,
"end_offset": 78
},
{
"id": 28760,
"label": "identity",
"start_offset": 92,
"end_offset": 95
}
] | [] | [] |
1,147 | However, and lucky for us, the malware author was arrested in 2010 so several of the hypothesis can be verified. | [
{
"id": 46573,
"label": "TIME",
"start_offset": 62,
"end_offset": 66
}
] | [] | [] |
3,133 | When devices (in this case, the routers) are under someone else’s control like this, the collection is referred to as a “botnet”, a network (-net) of remotely controlled systems or devices (bot-). | [] | [] | [] |
9,695 | The final 5-byte sequence looks like F3 00 00 00 92 0D. | [] | [] | [] |
4,127 | In our investigation, we also found a suspicious executable named telegram.exe. | [
{
"id": 49926,
"label": "FILEPATH",
"start_offset": 66,
"end_offset": 78
}
] | [] | [] |
986 | When developers incorporate the libraries into their apps they need to carefully test them and monitor for any abnormal activities. | [] | [] | [] |
14,292 | The spyware displays the online dating scam website upon the installation of the malicious Virtual Girlfriend app What will be shown is the registration page of an online dating site, which will lure users into giving out their credit card information. | [] | [] | [] |
9,849 | Figure 13. Avenger2 with internal URL Casper Casper is a modified version of the Cobalt Strike backdoor, showing the team server SHA1 hash if the controller connects to the C&C. | [] | [] | [] |
1,465 | The most famous set of key pairs would be the key pairs included within the AOSP source files (in Table 1, below). | [
{
"id": 46774,
"label": "SOFTWARE",
"start_offset": 76,
"end_offset": 80
}
] | [] | [] |
10,244 | We think that Pawn Storm compromises lots of email accounts through brute force attacks on internet-facing services like email, LDAP, Microsoft Autodiscover, SMB, and SQL. | [
{
"id": 31294,
"label": "threat-actor",
"start_offset": 14,
"end_offset": 24
},
{
"id": 31295,
"label": "attack-pattern",
"start_offset": 68,
"end_offset": 79
},
{
"id": 31297,
"label": "location",
"start_offset": 163,
"end_offset": 166
}
] | [] | [] |
3,737 | 2022-04-06: | [
{
"id": 49549,
"label": "TIME",
"start_offset": 1,
"end_offset": 11
}
] | [] | [] |
4,787 | The U.S. should also consider ways to foster greater transparency in the marketplace, including setting heightened transparency requirements for the domestic surveillance industry. | [
{
"id": 50687,
"label": "identity",
"start_offset": 4,
"end_offset": 8
}
] | [] | [] |
14,407 | These activities may be difficult to identify for defenders due to the use of these things like: PSEXEC to execute a program from remote system Schedule a remote task to execute back door or malicious code RDP or net use to connect to other hosts | [
{
"id": 47165,
"label": "SOFTWARE",
"start_offset": 210,
"end_offset": 214
},
{
"id": 44527,
"label": "malware",
"start_offset": 101,
"end_offset": 107
}
] | [] | [] |
2,101 | Please mark, I'm not a robot! | [] | [] | [] |
5,092 | The kit initially serves some heavily obfuscated javascript used to fingerprint the target system. | [] | [] | [] |
1,539 | By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. | [] | [] | [] |
3,718 | Command and Control | [] | [] | [] |
1,659 | The producer of the NetWire WorldWiredLabs, states that the tool uses 256-bit AES encryption, which we found to be accurate. | [
{
"id": 45091,
"label": "malware",
"start_offset": 20,
"end_offset": 42
}
] | [] | [] |
968 | SMS information collected by the receiver is saved in a hashmap with “other” as the key and sent to a method that uploads the message to 112.126.69.51 as shown in Figure 4. | [
{
"id": 3036,
"label": "IPV4",
"start_offset": 137,
"end_offset": 150
}
] | [] | [] |
1,034 | However, identity theft is a global concern and the Chinese citizen ID is no exception, allowing for potential sellers to simply purchase a usable identity online. | [
{
"id": 46528,
"label": "attack-pattern",
"start_offset": 8,
"end_offset": 23
}
] | [] | [] |
4,016 | In July 2020, we noticed interesting activity coming from the group, and we have been closely monitoring it since. | [
{
"id": 49867,
"label": "TIME",
"start_offset": 3,
"end_offset": 12
}
] | [] | [] |
13,648 | While their phishing tools are basic (i.e., no backdoors, trojans, and other malware), they made use of public cloud services to conduct their operations. | [
{
"id": 51735,
"label": "attack-pattern",
"start_offset": 12,
"end_offset": 20
},
{
"id": 51736,
"label": "Infrastucture",
"start_offset": 104,
"end_offset": 125
}
] | [] | [] |
14,378 | On the other end are places like some large banking and R&D companies that can manage about 98 or 99%. | [] | [] | [] |
5,130 | We talk about north/south traffic with the network, which is basically inside the network to outside of the network, so out to the the internet and back. | [] | [] | [] |
8,196 | We investigated the name shown on the account but did not find any useful information other than the fact that this name is used mostly in the Ivory Coast in Africa. | [] | [] | [] |
4,402 | GET http://{C2}/Index.php?vubc={identity} HTTP/1.1 | [
{
"id": 13184,
"label": "URL",
"start_offset": 4,
"end_offset": 40
}
] | [] | [] |
3,098 | Until then, the makers of operating systems can (and have) released patches that make the physical-layer vulnerabilities inaccessible. | [] | [] | [] |
7,672 | Trend Micro™ Hosted Email Security is a no-maintenance cloud solution that delivers continuously updated protection to stop spam, malware, spear phishing, ransomware, and advanced targeted attacks before they reach the network. | [
{
"id": 23857,
"label": "location",
"start_offset": 55,
"end_offset": 60
},
{
"id": 23858,
"label": "location",
"start_offset": 105,
"end_offset": 115
},
{
"id": 23859,
"label": "location",
"start_offset": 119,
"end_offset": 123
},
{
"id": 23860,
"label": "attack-pattern",
"start_offset": 139,
"end_offset": 153
},
{
"id": 23861,
"label": "location",
"start_offset": 167,
"end_offset": 170
}
] | [] | [] |
14,031 | As such, not all samples may have the embedded resource that leaks the same OS language. | [] | [] | [] |
3,300 | Figure 21. | [] | [] | [] |
5,373 | Blink | [
{
"id": 51369,
"label": "malware",
"start_offset": 0,
"end_offset": 5
}
] | [] | [] |
130 | The malicious activity itself doesn’t cause long-term damage to systems, and ends as soon as users leave the malicious or compromised site. | [] | [] | [] |
4,654 | Again, the response is expected to be "OK". | [] | [] | [] |
681 | Microsoft Equation Editor | [
{
"id": 45798,
"label": "SOFTWARE",
"start_offset": 1,
"end_offset": 26
}
] | [] | [] |
11,742 | Moreover, to protect our users, we have referred the below activity to the FBI for further investigation. | [] | [] | [] |
7,853 | If an attacker has control over a PC, which the Android device is attached to (for charging or for other purposes), they don’t need to get physical access to the phone. | [] | [] | [] |
3,778 | Palo Alto Networks has shared these findings, including file samples and indicators of compromise, with our fellow Cyber Threat Alliance members. | [
{
"id": 49616,
"label": "identity",
"start_offset": 116,
"end_offset": 145
},
{
"id": 49613,
"label": "identity",
"start_offset": 1,
"end_offset": 19
}
] | [] | [] |
4,830 | Recently observed COLDRIVER indicators: In another campaign tracked by CERT-UA as UAC-0056 we observed compromised email addresses of a Regional Prosecutor’s office of Ukraine leveraged to send malicious Microsoft Excel documents with VBA macros delivering Cobalt Strike. | [
{
"id": 50783,
"label": "identity",
"start_offset": 71,
"end_offset": 78
},
{
"id": 50785,
"label": "SOFTWARE",
"start_offset": 204,
"end_offset": 219
},
{
"id": 50786,
"label": "tools",
"start_offset": 257,
"end_offset": 270
},
{
"id": 50784,
"label": "identity",
"start_offset": 136,
"end_offset": 175
},
{
"id": 14710,
"label": "threat-actor",
"start_offset": 18,
"end_offset": 27
},
{
"id": 14713,
"label": "threat-actor",
"start_offset": 82,
"end_offset": 90
}
] | [
{
"id": 1015,
"from_id": 14713,
"to_id": 14710,
"type": "duplicate-of"
},
{
"id": 1016,
"from_id": 14710,
"to_id": 50784,
"type": "targets"
},
{
"id": 1017,
"from_id": 14710,
"to_id": 50785,
"type": "uses"
},
{
"id": 1018,
"from_id": 14710,
"to_id": 50786,
"type": "uses"
}
] | [] |
13,201 | Hey! | [] | [] | [] |
13,021 | As always, we continue to publish details surrounding the actions we take against coordinated influence operations in our quarterly TAG bulletin. | [] | [] | [] |
673 | Figure 1. | [] | [] | [] |
8,034 | Credential phishing through a compromised website demonstrates these attackers will go to great lengths to appear legitimate – as they know it's difficult for users to detect this kind of attack. | [
{
"id": 24923,
"label": "attack-pattern",
"start_offset": 11,
"end_offset": 19
},
{
"id": 24924,
"label": "location",
"start_offset": 79,
"end_offset": 83
}
] | [] | [] |
4,626 | As part of TAG's mission to counter serious threats to Google and our users, we've analyzed a range of persistent threats including APT35 and Charming Kitten, an Iranian government-backed group that regularly targets high risk users. | [
{
"id": 50537,
"label": "identity",
"start_offset": 55,
"end_offset": 61
},
{
"id": 50538,
"label": "threat-actor",
"start_offset": 132,
"end_offset": 137
},
{
"id": 50539,
"label": "threat-actor",
"start_offset": 142,
"end_offset": 157
},
{
"id": 50540,
"label": "location",
"start_offset": 162,
"end_offset": 169
},
{
"id": 50536,
"label": "identity",
"start_offset": 11,
"end_offset": 14
}
] | [
{
"id": 980,
"from_id": 50538,
"to_id": 50540,
"type": "located-at"
},
{
"id": 981,
"from_id": 50539,
"to_id": 50540,
"type": "located-at"
}
] | [] |
8,857 | A closer look at PlugX svchost injection | [
{
"id": 27412,
"label": "tools",
"start_offset": 17,
"end_offset": 22
}
] | [] | [] |
1,140 | The first thing our researchers noticed was the similarity between this mutex name and the previous one. | [] | [] | [] |
570 | Some Virlock variants ask for more ransom, such as 0.771 BTC, 1.008 BTC or more. | [
{
"id": 44782,
"label": "malware",
"start_offset": 5,
"end_offset": 12
}
] | [] | [] |
4,715 | We remediated the compromises for these users and implemented controls to protect all Android users. | [
{
"id": 50609,
"label": "SOFTWARE",
"start_offset": 86,
"end_offset": 93
}
] | [] | [] |
14,017 | However, there is a secondary effect when the version resource is added to a binary. | [] | [] | [] |
14,323 | Code snippet of the malicious extension plugin Connection between Round Year Fun and Maikspy | [
{
"id": 48547,
"label": "malware",
"start_offset": 85,
"end_offset": 92
}
] | [] | [] |
3,392 | BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 36e3fcd6a4c7c9db985be77ea6394b2ed019332fdae4739df2f96a541ea52617 Silverlight.exe | [
{
"id": 10242,
"label": "malware",
"start_offset": 0,
"end_offset": 11
},
{
"id": 10243,
"label": "SHA2",
"start_offset": 46,
"end_offset": 110
},
{
"id": 49045,
"label": "malware",
"start_offset": 20,
"end_offset": 44
},
{
"id": 49046,
"label": "FILEPATH",
"start_offset": 112,
"end_offset": 127
}
] | [
{
"id": 596,
"from_id": 10242,
"to_id": 49045,
"type": "duplicate-of"
},
{
"id": 597,
"from_id": 49046,
"to_id": 10243,
"type": "duplicate-of"
},
{
"id": 598,
"from_id": 49046,
"to_id": 49045,
"type": "indicates"
},
{
"id": 599,
"from_id": 10243,
"to_id": 49045,
"type": "indicates"
}
] | [] |
9,659 | Property list with persistence settings launchctl load /Library/LaunchDaemons/filename.plist > /dev/nul or launchctl load ~/Library/LaunchAgents/ filename.plist > /dev/nul will then command the operating system to start the dropped backdoor file at login. | [
{
"id": 29553,
"label": "location",
"start_offset": 9,
"end_offset": 13
},
{
"id": 29554,
"label": "attack-pattern",
"start_offset": 40,
"end_offset": 49
},
{
"id": 29555,
"label": "location",
"start_offset": 50,
"end_offset": 54
},
{
"id": 29556,
"label": "attack-pattern",
"start_offset": 107,
"end_offset": 116
},
{
"id": 29557,
"label": "location",
"start_offset": 117,
"end_offset": 121
},
{
"id": 29558,
"label": "location",
"start_offset": 172,
"end_offset": 176
},
{
"id": 29559,
"label": "location",
"start_offset": 214,
"end_offset": 219
}
] | [] | [] |
12,605 | Arrival Vector | [
{
"id": 39188,
"label": "tools",
"start_offset": 8,
"end_offset": 14
}
] | [] | [] |
1,187 | By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. | [] | [] | [] |
7,309 | TCP stream excerpt of the malware receiving commands from C&C server | [] | [] | [] |
7,690 | .LNK shortcut in .ISO file | [] | [] | [] |
8,026 | In this blog, we explore some of the most notable campaigns we’ve disrupted this year from a different government-backed attacker: APT35, an Iranian group, which regularly conducts phishing campaigns targeting high risk users. | [
{
"id": 24889,
"label": "location",
"start_offset": 37,
"end_offset": 41
},
{
"id": 24893,
"label": "attack-pattern",
"start_offset": 181,
"end_offset": 189
}
] | [] | [] |
6,898 | Upon reviewing phishing attempts since the beginning of this year, we’ve seen a rising number of attackers, including those from Iran and North Korea, impersonating news outlets or journalists. | [
{
"id": 21584,
"label": "attack-pattern",
"start_offset": 15,
"end_offset": 23
},
{
"id": 21587,
"label": "location",
"start_offset": 134,
"end_offset": 137
}
] | [] | [] |
1,513 | "dns.po888.com|122.228.242.51|119.145.148.56|162.221.13.82". | [
{
"id": 46781,
"label": "DOMAIN",
"start_offset": 2,
"end_offset": 15
},
{
"id": 46782,
"label": "IPV4",
"start_offset": 16,
"end_offset": 30
},
{
"id": 46783,
"label": "IPV4",
"start_offset": 31,
"end_offset": 45
},
{
"id": 46784,
"label": "IPV4",
"start_offset": 46,
"end_offset": 59
}
] | [] | [] |
3,216 | Figure 11. | [] | [] | [] |
3,828 | Variable}.WMI.createProcess Creates specified process {Variable}.shell File/Process Execution functions {Variable}.shell.run Run commands {Variable}.shell.exec Executes process {Variable}.file File-related functions {Variable}.file.getPath Get specified file path {Variable}.file.readText Reads specified text file {Variable}.file.get32BitFolder Get System Folder (32/64-bit) {Variable}.file.writol Writes on specified file {Variable}.file.deleteFile Deletes specified file {Variable}.file.readBinary Reads specified binary file. Figure 8. | [] | [] | [] |
3,111 | The greatest area of risk is in shared-hosting scenarios. | [] | [] | [] |
6,938 | Figure 3. An example of a coronavirus-related spear-phishing email attachment Once the victim downloads the malicious macro, it will decrypt an embedded executable dropper that is hidden inside a text box, which will then be saved to a hardcoded path prior to it executing in the machine. Figure 4. Malicious macro that decrypts an executable hidden inside a text box Figure 5. Examples of encrypted Crimson RAT executables hidden inside text boxes Once the executable file is executed, it will proceed to unzip a file named mdkhm.zip and then execute a Crimson RAT executable named dlrarhsiva.exe. | [
{
"id": 21716,
"label": "location",
"start_offset": 52,
"end_offset": 57
},
{
"id": 21717,
"label": "attack-pattern",
"start_offset": 58,
"end_offset": 66
},
{
"id": 21718,
"label": "location",
"start_offset": 138,
"end_offset": 142
},
{
"id": 21719,
"label": "location",
"start_offset": 222,
"end_offset": 226
},
{
"id": 21722,
"label": "malware",
"start_offset": 420,
"end_offset": 431
},
{
"id": 21723,
"label": "location",
"start_offset": 514,
"end_offset": 518
},
{
"id": 21724,
"label": "location",
"start_offset": 559,
"end_offset": 562
},
{
"id": 21725,
"label": "malware",
"start_offset": 578,
"end_offset": 589
}
] | [] | [] |
8,339 | A log file is written containing a count of the emails that were downloaded. | [] | [] | [] |
11,586 | In collaboration with TAG, Project Zero has published the technical analysis of CVE-2021-30983. | [] | [] | [] |
4,856 | This hack-for-hire actor has been publicly referred to as 'Void Balaur'. | [
{
"id": 50838,
"label": "attack-pattern",
"start_offset": 5,
"end_offset": 18
},
{
"id": 14831,
"label": "threat-actor",
"start_offset": 59,
"end_offset": 70
}
] | [] | [] |
2,247 | When the previously mentioned C2 response is both decoded and decrypted, we are presented with the following data: The command structure of the C2 response always begins with the string ‘tick’ | [] | [] | [] |
217 | The .onion site links to an entity calling themselves “Free Civilian” and offering to sell databases containing the personal data of Ukrainian citizens. | [] | [] | [] |
1,936 | Urpage Bahamut Confucius Patchwork "BioData" Delphi backdoor and file stealer X X X VB backdoor X Android "Bahamut-like" malware X X X Custom Android malware X AndroRAT Android malware X InPage malicious documents X X simply obfuscated HTA downloaders X X IOS malware X Confucius malware X remote-access-c3 backdoor X Sneepy/Byebye shell malware X Python cloud filestealers X AllaKore RAT X Badnews malware X QuasarRAT X NDiskMonitor malware X Targets | [
{
"id": 5685,
"label": "threat-actor",
"start_offset": 3,
"end_offset": 9
},
{
"id": 5686,
"label": "threat-actor",
"start_offset": 10,
"end_offset": 17
},
{
"id": 5687,
"label": "threat-actor",
"start_offset": 18,
"end_offset": 27
},
{
"id": 5688,
"label": "threat-actor",
"start_offset": 28,
"end_offset": 37
},
{
"id": 5689,
"label": "malware",
"start_offset": 39,
"end_offset": 46
},
{
"id": 5693,
"label": "malware",
"start_offset": 118,
"end_offset": 125
},
{
"id": 5694,
"label": "malware",
"start_offset": 179,
"end_offset": 187
},
{
"id": 5695,
"label": "threat-actor",
"start_offset": 309,
"end_offset": 318
},
{
"id": 5697,
"label": "malware",
"start_offset": 369,
"end_offset": 375
},
{
"id": 5700,
"label": "malware",
"start_offset": 439,
"end_offset": 451
},
{
"id": 5701,
"label": "malware",
"start_offset": 460,
"end_offset": 467
},
{
"id": 5702,
"label": "malware",
"start_offset": 484,
"end_offset": 493
},
{
"id": 5703,
"label": "malware",
"start_offset": 502,
"end_offset": 514
},
{
"id": 47059,
"label": "SOFTWARE",
"start_offset": 155,
"end_offset": 162
},
{
"id": 47060,
"label": "malware",
"start_offset": 376,
"end_offset": 382
}
] | [] | [] |
410 | This surge in unauthorized coin mining is driven, in large part, by the recent skyrocketing in the value of digital currencies like bitcoin. | [
{
"id": 46107,
"label": "SOFTWARE",
"start_offset": 133,
"end_offset": 140
},
{
"id": 46108,
"label": "attack-pattern",
"start_offset": 15,
"end_offset": 39
}
] | [] | [] |
3,804 | Auto Update | [] | [] | [] |
14,316 | Code snippets of the scanning, fetching, and uploading of .jpg, .jpeg, .png, .txt, .wav, .html, .doc, .docx and .rtf files (left). | [] | [] | [] |
2,960 | The faster the good guys track these down and get them patched, the harder we make the lives of the criminals looking to exploit them. | [] | [] | [] |
261 | We also found that these fake download campaigns rotate domains to distribute the same malicious binaries. | [
{
"id": 44664,
"label": "attack-pattern",
"start_offset": 25,
"end_offset": 38
},
{
"id": 44665,
"label": "attack-pattern",
"start_offset": 87,
"end_offset": 105
}
] | [] | [] |
14,107 | Screenshot functionality comparison between SLUB and APT37 Working Hours | [
{
"id": 43645,
"label": "malware",
"start_offset": 44,
"end_offset": 48
},
{
"id": 43647,
"label": "threat-actor",
"start_offset": 53,
"end_offset": 58
}
] | [] | [] |
2,780 | The tool is designed to “mine” cryptocurrencies, that is it earns credit in the cryptocurrency in exchange for computing power that is used to power the cryptocurrencies’ digital infrastructure. | [] | [] | [] |
139 | In our updated report on ransomware from Unit 42, “Ransomware: Unlocking the Lucrative Criminal Business Model,” Unit 42 researcher Bryan Lee notes: “In 2016, it was thought that there were less than one hundred active ransomware variants out in the wild. | [
{
"id": 45846,
"label": "identity",
"start_offset": 41,
"end_offset": 48
},
{
"id": 45847,
"label": "TIME",
"start_offset": 153,
"end_offset": 157
},
{
"id": 45844,
"label": "identity",
"start_offset": 113,
"end_offset": 120
},
{
"id": 45845,
"label": "identity",
"start_offset": 132,
"end_offset": 141
}
] | [] | [] |
4,056 | Figure 3. | [] | [] | [] |
4,041 | Figure 2. Timestomping used on the bin file The decryption key is used as an argument of Nerapack and various keys are used on different victims. | [
{
"id": 49893,
"label": "malware",
"start_offset": 98,
"end_offset": 106
}
] | [] | [] |
2,322 | After the WebKit RCE succeeds, an embedded Mach-O binary is loaded into memory, patched, and run. | [
{
"id": 47397,
"label": "SOFTWARE",
"start_offset": 10,
"end_offset": 16
}
] | [] | [] |
13,488 | These channels were mostly uploading spammy, non-political content, but a small subset posted primarily Chinese-language political content similar to the findings of a recent Graphika report. | [] | [] | [] |
3,634 | Rather than simply using a theme or lure that is relevant to the target, the attackers behind these attacks use an email conversation that’s in progress to carry out their attack. | [] | [] | [] |
13,270 | Figure 7. | [] | [] | [] |
6,084 | The loader can be recognized by its use of a unique user-agent “bumblebee” which both variants share. | [
{
"id": 18780,
"label": "location",
"start_offset": 11,
"end_offset": 14
},
{
"id": 18781,
"label": "malware",
"start_offset": 64,
"end_offset": 73
}
] | [] | [] |
1,816 | Testing the sample with Trend Micro Vision One, the attempt failed as its sensors were still able to send activity data to the platform. | [
{
"id": 46933,
"label": "SOFTWARE",
"start_offset": 24,
"end_offset": 46
}
] | [] | [] |
5,542 | Developing new skimming code which is usable across as many different payment pages as possible. | [
{
"id": 51538,
"label": "attack-pattern",
"start_offset": 15,
"end_offset": 28
}
] | [] | [] |
1,268 | Figure 3 shows a GIF file containing an obituary notice for a woman, while Figure 4 shows a Microsoft Word document containing the obituary of a man. | [
{
"id": 46643,
"label": "SOFTWARE",
"start_offset": 92,
"end_offset": 106
}
] | [] | [] |
2,481 | Inbound attempts to exploit the SpringShell vulnerability from 194.31.98[.]186 attempted to install the webshell from the original proof-of-concept seen in Figure 14. | [
{
"id": 45533,
"label": "IPV4",
"start_offset": 63,
"end_offset": 78
},
{
"id": 47557,
"label": "attack-pattern",
"start_offset": 104,
"end_offset": 112
},
{
"id": 47558,
"label": "vulnerability",
"start_offset": 32,
"end_offset": 43
}
] | [] | [] |
10,285 | Code snippets showing keylogs This secondary payload does not have any function to upload the collected keystrokes back to the attacker. | [] | [] | [] |
939 | While not all SMS-based IAP applications steal user data, we recently identified that the Chinese Taomike SDK has begun capturing copies of all messages received by the phone and sending them to a Taomike controlled server. | [
{
"id": 46449,
"label": "location",
"start_offset": 91,
"end_offset": 98
},
{
"id": 44904,
"label": "attack-pattern",
"start_offset": 42,
"end_offset": 57
},
{
"id": 44905,
"label": "malware",
"start_offset": 99,
"end_offset": 110
},
{
"id": 44907,
"label": "Infrastucture",
"start_offset": 198,
"end_offset": 223
}
] | [
{
"id": 37,
"from_id": 44905,
"to_id": 44907,
"type": "exfiltrates-to"
},
{
"id": 38,
"from_id": 44905,
"to_id": 44907,
"type": "communicates-with"
},
{
"id": 190,
"from_id": 44905,
"to_id": 46449,
"type": "located-at"
},
{
"id": 191,
"from_id": 44905,
"to_id": 44904,
"type": "uses"
}
] | [] |
10,251 | These brute force attacks started in 2019, and then we could firmly attribute them to Pawn Storm because we could cross-relate the extensive probing of Microsoft Autodiscover servers around the world with high-confidence indicators of the group’s more traditional attack methods (spear phishing and credential phishing). | [
{
"id": 31324,
"label": "attack-pattern",
"start_offset": 6,
"end_offset": 17
},
{
"id": 31326,
"label": "location",
"start_offset": 43,
"end_offset": 46
},
{
"id": 31327,
"label": "location",
"start_offset": 78,
"end_offset": 82
},
{
"id": 31328,
"label": "threat-actor",
"start_offset": 86,
"end_offset": 96
},
{
"id": 31329,
"label": "location",
"start_offset": 114,
"end_offset": 119
},
{
"id": 31332,
"label": "location",
"start_offset": 194,
"end_offset": 199
},
{
"id": 31333,
"label": "location",
"start_offset": 210,
"end_offset": 220
},
{
"id": 31334,
"label": "attack-pattern",
"start_offset": 280,
"end_offset": 294
},
{
"id": 31335,
"label": "location",
"start_offset": 295,
"end_offset": 298
},
{
"id": 31336,
"label": "attack-pattern",
"start_offset": 310,
"end_offset": 318
}
] | [] | [] |
10,485 | Related IOCs | [] | [] | [] |
6,742 | One notable campaign attempted to target personal accounts of U.S. government employees with phishing lures using American fast food franchises and COVID-19 messaging. | [
{
"id": 21033,
"label": "location",
"start_offset": 12,
"end_offset": 20
},
{
"id": 21034,
"label": "location",
"start_offset": 34,
"end_offset": 40
},
{
"id": 21036,
"label": "attack-pattern",
"start_offset": 93,
"end_offset": 101
},
{
"id": 21038,
"label": "location",
"start_offset": 144,
"end_offset": 147
}
] | [] | [] |
1,065 | But until now, based on the latest research in the IEEE Security & Privacy paper, everyone has believed that malicious apps attempting to carry out overlay attacks must overcome two significant hurdles to be successful: These are significant mitigating factors and so overlay attacks haven’t been reckoned a serious threat. | [
{
"id": 46549,
"label": "identity",
"start_offset": 51,
"end_offset": 55
},
{
"id": 44929,
"label": "attack-pattern",
"start_offset": 269,
"end_offset": 284
},
{
"id": 44930,
"label": "attack-pattern",
"start_offset": 148,
"end_offset": 163
}
] | [] | [] |
6,632 | The DarkHydrus threat group has targeted government entities and educational institutions with spear-phishing attacks and credential harvesting campaigns. | [
{
"id": 20576,
"label": "threat-actor",
"start_offset": 5,
"end_offset": 15
},
{
"id": 20577,
"label": "location",
"start_offset": 62,
"end_offset": 65
},
{
"id": 20578,
"label": "location",
"start_offset": 96,
"end_offset": 101
},
{
"id": 20579,
"label": "attack-pattern",
"start_offset": 102,
"end_offset": 110
},
{
"id": 20580,
"label": "location",
"start_offset": 119,
"end_offset": 122
}
] | [] | [] |
12,578 | The exception indicates that Apple added generic protections in Big Sur which rendered this exploit useless. | [] | [] | [] |
2,554 | The answer is simple: credential theft. | [
{
"id": 47748,
"label": "attack-pattern",
"start_offset": 22,
"end_offset": 38
}
] | [] | [] |
11,253 | This bulletin includes coordinated influence operation campaigns terminated on our platforms in Q2 2022. | [] | [] | [] |
75 | There is no single solution to stopping these attacks, but the same technologies and policies you use to prevent other malware infections will be effective. | [
{
"id": 44590,
"label": "attack-pattern",
"start_offset": 119,
"end_offset": 137
}
] | [] | [] |
1,163 | And indeed, as with the second hypothesis, standard virus detection logs prove that each of these mutexes do span multiple variants of the worm. | [] | [] | [] |