id
int64 1
14.4k
| text
stringlengths 3
5.01k
| entities
list | relations
list | Comments
list |
---|---|---|---|---|
1,014 | A well-stocked seller told us that every account he sold belonged to an active student at the respective university. | [] | [] | [] |
1,015 | He claimed that once the account was sold, only the one buyer and the legitimate user would have access. | [] | [] | [] |
1,016 | He recommended not changing the account password to avoid detection by the legitimate user. | [] | [] | [] |
1,017 | Another seller offered to provide real identity information for a stolen account so the buyer could change the corresponding password and security questions. | [] | [] | [] |
1,018 | This type of account access was the most expensive and least flexible in terms of customization (i.e., username, institution, etc.). | [] | [] | [] |
1,019 | Additionally, it should be noted that there is value beyond the EDU account itself for password and security question information, in the event they are shared across other online accounts for the legitimate user. | [] | [] | [] |
1,020 | Other sellers were also able to offer customizable email accounts from a specific domain/institution. | [] | [] | [] |
1,021 | Figure 5: A seller advertising a customizable “xxx.edu” email account. | [] | [] | [] |
1,022 | In the above advertisement, the seller describes the ability to choose an account under a subdomain (academia, student, me, email, or contact) of the requested domain. | [] | [] | [] |
1,023 | The price for this custom account was only ¥27 RMB ($4.40 USD); for an extra ¥13 RMB ($2.12 USD), the buyer can request a custom username at any subdomain for the given institution. | [] | [] | [] |
1,024 | To further assess this threat, we purchased a customized, new account from a seller on Taobao. | [
{
"id": 46515,
"label": "SOFTWARE",
"start_offset": 88,
"end_offset": 94
}
] | [] | [] |
1,025 | Four hours later, we received confirmation that the custom email address "[email protected]" was active. | [
{
"id": 3215,
"label": "TIME",
"start_offset": 0,
"end_offset": 16
},
{
"id": 46516,
"label": "EMAIL",
"start_offset": 74,
"end_offset": 96
}
] | [] | [] |
1,026 | Navigating to CNRI’s webmail page, we were then able to successfully access and send an email from that account. | [
{
"id": 46517,
"label": "identity",
"start_offset": 14,
"end_offset": 18
}
] | [] | [] |
1,027 | Figure 6: Sending an email through a newly bought customized EDU account. | [] | [] | [] |
1,028 | Another noteworthy trend we observed was that some sellers provided email addresses with customizable usernames at "californiacolleges.edu". | [
{
"id": 46518,
"label": "DOMAIN",
"start_offset": 117,
"end_offset": 139
}
] | [] | [] |
1,029 | In fact, anyone can do the same by visiting the California Colleges Create an Account page. | [
{
"id": 44918,
"label": "identity",
"start_offset": 48,
"end_offset": 67
}
] | [] | [] |
1,030 | Accounts made through this site "can be used to apply [for] related memberships of Amazon Prime, Microsoft Developer, Adobe and Apple by some secret ways," one seller said. | [
{
"id": 46519,
"label": "identity",
"start_offset": 83,
"end_offset": 95
},
{
"id": 46522,
"label": "identity",
"start_offset": 128,
"end_offset": 133
},
{
"id": 46520,
"label": "identity",
"start_offset": 97,
"end_offset": 106
},
{
"id": 46521,
"label": "identity",
"start_offset": 118,
"end_offset": 123
}
] | [] | [] |
1,031 | Figure 7: Using a newly created California Colleges account. | [
{
"id": 46523,
"label": "identity",
"start_offset": 33,
"end_offset": 52
}
] | [] | [] |
1,032 | As with most criminal enterprises, not all sellers on Taobao use their real identity, presenting a challenge in tracking down the individuals behind this activity. | [
{
"id": 46524,
"label": "SOFTWARE",
"start_offset": 54,
"end_offset": 60
}
] | [] | [] |
1,033 | In order to sell anything on Taobao, a seller must at least create a valid Alipay account (similar to PayPal) linked to a valid Chinese citizen ID number (similar to a U.S. Social Security number), and then associate it with a valid Chinese bank account under the same citizen ID. | [
{
"id": 46526,
"label": "SOFTWARE",
"start_offset": 75,
"end_offset": 81
},
{
"id": 46525,
"label": "SOFTWARE",
"start_offset": 29,
"end_offset": 35
},
{
"id": 46527,
"label": "SOFTWARE",
"start_offset": 102,
"end_offset": 108
}
] | [] | [] |
1,034 | However, identity theft is a global concern and the Chinese citizen ID is no exception, allowing for potential sellers to simply purchase a usable identity online. | [
{
"id": 46528,
"label": "attack-pattern",
"start_offset": 8,
"end_offset": 23
}
] | [] | [] |
1,035 | Based on our investigation, we believe that stolen accounts for these universities are actively selling on Taobao. | [
{
"id": 44920,
"label": "SOFTWARE",
"start_offset": 108,
"end_offset": 114
},
{
"id": 44921,
"label": "attack-pattern",
"start_offset": 45,
"end_offset": 60
}
] | [
{
"id": 195,
"from_id": 44921,
"to_id": 44920,
"type": "related-to"
}
] | [] |
1,036 | On August 27, we reported our findings to Taobao. | [
{
"id": 46529,
"label": "TIME",
"start_offset": 3,
"end_offset": 12
},
{
"id": 46530,
"label": "SOFTWARE",
"start_offset": 42,
"end_offset": 48
}
] | [] | [] |
1,037 | Their response was that they were addressing this issue and have already removed a number of these items, with the remainder requiring further investigation. | [] | [] | [] |
1,038 | However, this malicious seller activity may also reveal a larger scale problem within university systems. | [] | [] | [] |
1,039 | Through the types of accounts advertised on Taobao, an attacker can steal a student or staff account, assume their identity, and gain unauthorized access to standard university resources. | [
{
"id": 46531,
"label": "SOFTWARE",
"start_offset": 43,
"end_offset": 50
}
] | [] | [] |
1,040 | More sophisticated and nefarious uses include leveraging accounts in social engineering/phishing attacks or exploiting access to high-value university systems (e.g., personnel, financial, research) to steal information. | [
{
"id": 46533,
"label": "attack-pattern",
"start_offset": 88,
"end_offset": 104
},
{
"id": 46534,
"label": "attack-pattern",
"start_offset": 69,
"end_offset": 87
},
{
"id": 46535,
"label": "attack-pattern",
"start_offset": 108,
"end_offset": 125
},
{
"id": 46536,
"label": "attack-pattern",
"start_offset": 201,
"end_offset": 218
}
] | [] | [] |
1,041 | Fortunately, a number of the institutions impacted by this activity have already implemented two-factor authentication for high-value resources, reducing the risk of the latter. | [] | [] | [] |
1,042 | Yet, we believe the residual risk and exposure call for further action. | [] | [] | [] |
1,043 | The following are our suggestions for discovering and mitigating risks associated with this activity: Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address! | [] | [] | [] |
1,044 | Please mark, I'm not a robot! | [] | [] | [] |
1,045 | By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. | [] | [] | [] |
1,046 | This post is also available in: 日本語 (Japanese) Today, Palo Alto Networks Unit 42 researchers are announcing details on a new high- severity vulnerability affecting the Google Android platform. | [
{
"id": 46537,
"label": "identity",
"start_offset": 60,
"end_offset": 98
},
{
"id": 46538,
"label": "SOFTWARE",
"start_offset": 174,
"end_offset": 197
}
] | [] | [] |
1,047 | Patches for this vulnerability are available as part of the September 2017 Android Security Bulletin. | [
{
"id": 44922,
"label": "TIME",
"start_offset": 60,
"end_offset": 74
},
{
"id": 44923,
"label": "SOFTWARE",
"start_offset": 75,
"end_offset": 83
}
] | [] | [] |
1,048 | This new vulnerability does NOT affect Android 8.0 Oreo, the latest version; but it does affect all prior versions of Android. | [
{
"id": 46539,
"label": "SOFTWARE",
"start_offset": 39,
"end_offset": 55
},
{
"id": 46540,
"label": "SOFTWARE",
"start_offset": 118,
"end_offset": 124
}
] | [] | [] |
1,049 | There is some malware that exploits some vectors outlined in this article, but Palo Alto Networks Unit 42 is not aware of any active attacks against this particular vulnerability at this time. | [
{
"id": 46541,
"label": "identity",
"start_offset": 79,
"end_offset": 105
}
] | [] | [] |
1,050 | Since Android 8.0 is a relatively recent release, this means that nearly all Android users should take action today and apply updates that are available to address this vulnerability. | [
{
"id": 44924,
"label": "SOFTWARE",
"start_offset": 6,
"end_offset": 17
},
{
"id": 44925,
"label": "SOFTWARE",
"start_offset": 77,
"end_offset": 84
}
] | [] | [] |
1,051 | What our researchers have found is a vulnerability that can be used to more easily enable an “overlay attack,” a type of attack that is already known on the Android platform. | [
{
"id": 46543,
"label": "SOFTWARE",
"start_offset": 158,
"end_offset": 165
}
] | [] | [] |
1,052 | This type of attack is most likely to be used to get malicious software on the user’s Android device. | [
{
"id": 46544,
"label": "SOFTWARE",
"start_offset": 86,
"end_offset": 93
}
] | [] | [] |
1,053 | This type of attack can also be used to give malicious software total control over the device. | [] | [] | [] |
1,054 | In a worst-case attack scenario, this vulnerability could be used to render the phone unusable (i.e., a “brick”) or to install any kind of malware including (but not limited to) ransomware or information stealers. | [] | [] | [] |
1,055 | In simplest terms, this vulnerability could be used to take control of devices, lock devices and steal information after it is attacked. | [
{
"id": 46545,
"label": "attack-pattern",
"start_offset": 55,
"end_offset": 78
},
{
"id": 46547,
"label": "attack-pattern",
"start_offset": 80,
"end_offset": 92
},
{
"id": 46546,
"label": "attack-pattern",
"start_offset": 97,
"end_offset": 114
}
] | [] | [] |
1,056 | An “overlay attack” is an attack where an attacker’s app draws a window over (or “overlays”) other windows and apps running on the device. | [
{
"id": 44926,
"label": "attack-pattern",
"start_offset": 4,
"end_offset": 18
}
] | [] | [] |
1,057 | When done successfully, this can enable an attacker to convince the user he or she is clicking one window when, in fact, he or she is actually clicking another window. | [] | [] | [] |
1,058 | In Figure 1, you can see an example where an attacker is making it appear that the user is clicking to install a patch when in fact the user is clicking to grant the Porn Droid malware full administrator permissions on the device. | [
{
"id": 46548,
"label": "malware",
"start_offset": 166,
"end_offset": 176
}
] | [] | [] |
1,059 | Figure 1: Bogus patch installer overlying malware requesting administrative permissions | [] | [] | [] |
1,060 | You can see how this attack can be used convince users to unwittingly install malware on the device. | [] | [] | [] |
1,061 | This can also be used to grant the malware full administrative privileges on the device. | [] | [] | [] |
1,062 | An overlay attack can also be used to create a denial-of-service condition on the device by raising windows on the device that don’t go away. | [
{
"id": 44927,
"label": "attack-pattern",
"start_offset": 48,
"end_offset": 65
}
] | [] | [] |
1,063 | This is precisely the type of approach attackers use with ransomware attacks on mobile devices. | [] | [] | [] |
1,064 | Of course, an overlay attack can be used to accomplish all three of these in a single attack: Overlay attacks aren’t new; they’ve been discussed before. | [] | [] | [] |
1,065 | But until now, based on the latest research in the IEEE Security & Privacy paper, everyone has believed that malicious apps attempting to carry out overlay attacks must overcome two significant hurdles to be successful: These are significant mitigating factors and so overlay attacks haven’t been reckoned a serious threat. | [
{
"id": 46549,
"label": "identity",
"start_offset": 51,
"end_offset": 55
},
{
"id": 44929,
"label": "attack-pattern",
"start_offset": 269,
"end_offset": 284
},
{
"id": 44930,
"label": "attack-pattern",
"start_offset": 148,
"end_offset": 163
}
] | [] | [] |
1,066 | However, our new Unit 42 research shows that there is a way to carry out overlay attacks where these mitigating factors don’t apply. | [
{
"id": 46550,
"label": "identity",
"start_offset": 18,
"end_offset": 25
}
] | [] | [] |
1,067 | If a malicious app were to utilize this new vulnerability, our researchers have found it could carry out an overlay attack simply by being installed on the device. | [
{
"id": 46551,
"label": "attack-pattern",
"start_offset": 108,
"end_offset": 122
}
] | [] | [] |
1,068 | In particular, this means that malicious apps from websites and app stores other than Google Play can carry out overlay attacks. | [
{
"id": 46552,
"label": "SOFTWARE",
"start_offset": 86,
"end_offset": 98
}
] | [] | [] |
1,069 | It’s important to note that apps from websites and app stores other than Google Play form a significant source of Android malware worldwide. | [
{
"id": 46553,
"label": "SOFTWARE",
"start_offset": 114,
"end_offset": 121
},
{
"id": 46554,
"label": "SOFTWARE",
"start_offset": 73,
"end_offset": 84
}
] | [] | [] |
1,070 | The particular vulnerability in question affects an Android feature known as “Toast.” “Toast” is a type of notification window that “pops” (like toast) on the screen. | [
{
"id": 46555,
"label": "SOFTWARE",
"start_offset": 53,
"end_offset": 60
}
] | [] | [] |
1,071 | “Toast” is typically used to display messages and notifications over other apps. | [] | [] | [] |
1,072 | Unlike other window types in Android, Toast doesn’t require the same permissions, and so the mitigating factors that applied to previous overlay attacks don’t apply here. | [
{
"id": 46556,
"label": "SOFTWARE",
"start_offset": 30,
"end_offset": 37
}
] | [] | [] |
1,073 | Additionally, our researchers have outlined how it’s possible to create a Toast window that overlays the entire screen, so it’s possible to use Toast to create the functional equivalent of regular app windows. | [] | [] | [] |
1,074 | In light of this latest research, the risk of overlay attacks takes on a greater significance. | [] | [] | [] |
1,075 | Fortunately, the latest version of Android is immune from these attacks “out of the box.” | [
{
"id": 46557,
"label": "SOFTWARE",
"start_offset": 35,
"end_offset": 42
}
] | [] | [] |
1,076 | However, most people who run Android run versions that are vulnerable. | [
{
"id": 46559,
"label": "SOFTWARE",
"start_offset": 29,
"end_offset": 36
}
] | [] | [] |
1,077 | This means that it’s critical for all Android users on versions before 8.0 to get updates for their devices. | [
{
"id": 46560,
"label": "SOFTWARE",
"start_offset": 38,
"end_offset": 45
}
] | [] | [] |
1,078 | You can get information on patch and update availability from your mobile carrier or handset maker. | [] | [] | [] |
1,079 | Of course, one of the best protections against malicious apps is to get your Android apps only from Google Play, as the Android Security Team aggressively screens against malicious apps and keeps them out of the store in the first place. | [
{
"id": 46562,
"label": "SOFTWARE",
"start_offset": 101,
"end_offset": 112
},
{
"id": 46561,
"label": "SOFTWARE",
"start_offset": 78,
"end_offset": 85
},
{
"id": 46563,
"label": "identity",
"start_offset": 121,
"end_offset": 142
}
] | [] | [] |
1,080 | Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address! Please mark, I'm not a robot! | [] | [] | [] |
1,081 | By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. | [] | [] | [] |
1,082 | Mutex analysis is an often overlooked and useful tool for malware author fingerprinting, family classification, and even discovery. | [] | [] | [] |
1,083 | Far from the hypothesized "huge amount of variability" in mutex names, likely hypothesized due to the seemingly random appearance of them, practical mutex usage is embarrassingly consistent. | [] | [] | [] |
1,084 | In fact, over 15% of all collected worms share a single mutex [2gvwnqjz]. | [] | [] | [] |
1,085 | This blog was sourced from the data generated by the WildFire Analytics cloud, which processes thousands of samples a day and provides insights into various characteristics and behaviors of malware worldwide. | [
{
"id": 46564,
"label": "SOFTWARE",
"start_offset": 54,
"end_offset": 78
}
] | [] | [] |
1,086 | But before we get into the details, here is a quick overview of mutexes and why they exist in the first place. | [] | [] | [] |
1,087 | The mutex is the fundamental tool for managing shared resources between multiple threads (or processes). | [] | [] | [] |
1,088 | If you think of the threads as a whole bunch of people in a meeting, all trying to talk at once, a mutex is the baton that gets passed from one person to the next so that there’s only one person talking at a time. | [] | [] | [] |
1,089 | The important thing to understand is what the mutex is really protecting. | [] | [] | [] |
1,090 | In the above example, the resource being protected isn’t the right to speak, as many might think, but rather the ability to listen. | [] | [] | [] |
1,091 | Here’s a more technical example. | [] | [] | [] |
1,092 | Lets say you want to update an Internet Explorer (IE) cookie file, adding a unique identifier for use later. | [
{
"id": 44932,
"label": "SOFTWARE",
"start_offset": 31,
"end_offset": 53
}
] | [] | [] |
1,093 | Naively, what you need to do is read the cookie file in, add your data to what you’ve read, and write the file back to disk. | [] | [] | [] |
1,094 | But what if IE is running and also updating that file? | [
{
"id": 46565,
"label": "SOFTWARE",
"start_offset": 12,
"end_offset": 14
}
] | [] | [] |
1,095 | The worst case, for you, is that both you and IE read the file at the same time but you write your edits first. | [
{
"id": 46566,
"label": "SOFTWARE",
"start_offset": 46,
"end_offset": 48
}
] | [] | [] |
1,096 | This is because IE will completely destroy your edits when it writes its new version of the file over yours. | [
{
"id": 46567,
"label": "SOFTWARE",
"start_offset": 16,
"end_offset": 18
}
] | [] | [] |
1,097 | The solution to this problem is to use a mutex to protect the integrity of the cookie file. | [] | [] | [] |
1,098 | A process that has the mutex knows that while it holds that mutex no other process will be accessing the cookie file. | [] | [] | [] |
1,099 | It can then read, tweak, and write the file without fear of any clobbering by other processes. | [] | [] | [] |
1,100 | Since each shared resource can only have a single mutex effectively protecting it, leveraging that mutex is indication that a program will be using said resource. | [] | [] | [] |
1,101 | In the cookie file example above, just referencing the mutex protecting that file indicates, with extremely high probability, that functionality to change the file exists somewhere in the program. | [] | [] | [] |
1,102 | Any given mutex, and protected functionality, can then be thought of as an independent library of sorts. | [] | [] | [] |
1,103 | Note that while the technical implementation may not expose said functionality as a normal library, such exposure is not necessary for the types of analysis performed here. | [] | [] | [] |
1,104 | That library’s usage can be analyzed in terms of who uses it. | [] | [] | [] |
1,105 | Simply put: malware writers leverage malware specific libraries and groups of like actors will reuse these core libraries when able. The needle in a haystack problem forever plagues malware research: it’s extremely difficult to find reliable information with malware writers constantly working to undermine or eliminate that information. | [] | [] | [] |
1,106 | But, in the case of mutex analysis, the useful information pretty well slapped us in the face. | [] | [] | [] |
1,107 | As can be clearly seen, mutex 2gvwnqjz1 is strongly associated with malware. | [] | [] | [] |
1,108 | In fact, we have only seen it in malware. | [] | [] | [] |
1,109 | As is equally obvious, not all mutexes offer such dramatic insight. | [] | [] | [] |
1,110 | There are many common mutexes shared across both benign software and malware. | [] | [] | [] |
1,111 | What’s more, they don’t all share millions of uses across both sides of the fence. | [] | [] | [] |
1,112 | In cases such as these the common approach is to use sets of the data, in this case sets of mutexes, to create fingerprints of each sample and then leverage those fingerprints to extract higher confidence classification decisions. | [] | [] | [] |
1,113 | While this avenue of research is being pursued, it suffers from all the traditional challenges of big data research. | [] | [] | [] |