id
int64 1
14.4k
| text
stringlengths 3
5.01k
| entities
list | relations
list | Comments
list |
---|---|---|---|---|
913 | By comparison, the latest version of the CryptoWall malware family takes roughly 1-3 minutes to complete its encryption routine. | [
{
"id": 2888,
"label": "malware",
"start_offset": 41,
"end_offset": 51
},
{
"id": 2889,
"label": "TIME",
"start_offset": 73,
"end_offset": 92
}
] | [] | [] |
914 | It’s also interesting to note that each time PClock2 scans a directory or encrypts a file, it makes an HTTP POST request to the C2 server. | [
{
"id": 46436,
"label": "Infrastucture",
"start_offset": 129,
"end_offset": 138
},
{
"id": 46435,
"label": "malware",
"start_offset": 46,
"end_offset": 53
}
] | [
{
"id": 189,
"from_id": 46435,
"to_id": 46436,
"type": "beacons-to"
}
] | [] |
915 | Figure 7. HTTP POST request indicating a folder is being scanned This resulted in over 1,000 requests being made on a sandbox machine, which contained little data of interest. | [] | [] | [] |
916 | After it finished the encryption routine, PClock2 generates a VBScript file in the following directory: | [
{
"id": 46437,
"label": "malware",
"start_offset": 43,
"end_offset": 50
},
{
"id": 46438,
"label": "SOFTWARE",
"start_offset": 63,
"end_offset": 71
}
] | [] | [] |
917 | This script file contains the following commands, which will delete shadow copies on the Windows operating system. | [
{
"id": 46439,
"label": "SOFTWARE",
"start_offset": 90,
"end_offset": 114
}
] | [] | [] |
918 | Set UAC = CreateObject("Shell.Application") UAC.ShellExecute "vssadmin", "Delete Shadows /All /Quiet", "", "runas", 1 On Windows XP, the following dialog box appears to the victim when this script runs, making it fairly apparent that something suspicious is occurring: Figure 8. | [
{
"id": 46440,
"label": "SOFTWARE",
"start_offset": 123,
"end_offset": 133
}
] | [] | [] |
919 | Dialog box that appears to victim when VBS attempts to run | [] | [] | [] |
920 | After running the clean up script the malware overwrites the ‘\CData\C’ registry key with a value of zero, which removes the unique SHA256 key. | [
{
"id": 46441,
"label": "REGISTRYKEY",
"start_offset": 62,
"end_offset": 70
}
] | [] | [] |
921 | Finally, the malware changes the victim’s wallpaper and generates a GUI instructing the victim how they can provide payment and retrieve their files. | [] | [] | [] |
922 | This dialogue mimics the more-capable “CryptoLocker” malware family and provides instructions in both English and Spanish. | [
{
"id": 2904,
"label": "malware",
"start_offset": 39,
"end_offset": 51
}
] | [] | [] |
923 | Figure 9. | [] | [] | [] |
924 | Ransom demand | [] | [] | [] |
925 | I originally wished to determine if the new version of PClock, PClock 2, included enough improvements to compete with some of the larger ransomware malware families, such as CryptoWall, TeslaCrypt, or TorrentLocker. | [
{
"id": 2911,
"label": "malware",
"start_offset": 174,
"end_offset": 184
},
{
"id": 2913,
"label": "malware",
"start_offset": 201,
"end_offset": 214
},
{
"id": 46442,
"label": "malware",
"start_offset": 186,
"end_offset": 196
},
{
"id": 46446,
"label": "malware",
"start_offset": 63,
"end_offset": 71
},
{
"id": 46447,
"label": "malware",
"start_offset": 55,
"end_offset": 61
}
] | [] | [] |
926 | In truth, this version has made a number of improvements, such as adding more file types to target, ignoring certain directories, and using a better encryption routine. | [] | [] | [] |
927 | However, a number of strong issues still plague this malware family, such as the following: While this version is an improvement, it still lacks many of the features and stealth that are currently present in the larger ransomware families. | [] | [] | [] |
928 | While ransomware is a large problem for users, it’s important to realize that not all malware families are created equal. | [] | [] | [] |
929 | Like most things in life, malware comes in many shapes and forms, from the more elegant and robust solutions, to those that come up lacking. | [] | [] | [] |
930 | All PClock malware family samples are properly classified as malicious by WildFire. | [
{
"id": 44902,
"label": "malware",
"start_offset": 5,
"end_offset": 11
},
{
"id": 44903,
"label": "identity",
"start_offset": 75,
"end_offset": 83
}
] | [] | [] |
931 | AutoFocus users can find more information on samples and indicators related to this attack by viewing the PClock tag. | [
{
"id": 46448,
"label": "malware",
"start_offset": 106,
"end_offset": 112
}
] | [] | [] |
932 | Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address! | [] | [] | [] |
933 | Please mark, I'm not a robot! | [] | [] | [] |
934 | By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. | [] | [] | [] |
935 | Mobile app creators are often looking for ways to monetize their software. | [] | [] | [] |
936 | One of the most common ways to do this is by displaying advertisements to users or by offering in-app purchases (IAPs). | [] | [] | [] |
937 | Mobile monetization platforms create software libraries that authors can embed into their apps to start earning money quickly. | [] | [] | [] |
938 | We previously highlighted the dangers of installing apps that enable IAPs using SMS messages, as these apps typically have access to all SMS messages sent to the phone. | [] | [] | [] |
939 | While not all SMS-based IAP applications steal user data, we recently identified that the Chinese Taomike SDK has begun capturing copies of all messages received by the phone and sending them to a Taomike controlled server. | [
{
"id": 46449,
"label": "location",
"start_offset": 91,
"end_offset": 98
},
{
"id": 44904,
"label": "attack-pattern",
"start_offset": 42,
"end_offset": 57
},
{
"id": 44905,
"label": "malware",
"start_offset": 99,
"end_offset": 110
},
{
"id": 44907,
"label": "Infrastucture",
"start_offset": 198,
"end_offset": 223
}
] | [
{
"id": 37,
"from_id": 44905,
"to_id": 44907,
"type": "exfiltrates-to"
},
{
"id": 38,
"from_id": 44905,
"to_id": 44907,
"type": "communicates-with"
},
{
"id": 190,
"from_id": 44905,
"to_id": 46449,
"type": "located-at"
},
{
"id": 191,
"from_id": 44905,
"to_id": 44904,
"type": "uses"
}
] | [] |
940 | Since August 1, Palo Alto Networks WildFire has captured over 18,000 Android apps that contain this library. | [
{
"id": 46451,
"label": "TIME",
"start_offset": 6,
"end_offset": 14
},
{
"id": 46450,
"label": "identity",
"start_offset": 16,
"end_offset": 43
},
{
"id": 46452,
"label": "SOFTWARE",
"start_offset": 69,
"end_offset": 76
}
] | [] | [] |
941 | These apps are not hosted inside the Google Play store, but are distributed via third party distribution mechanisms in China. | [
{
"id": 46453,
"label": "SOFTWARE",
"start_offset": 37,
"end_offset": 54
},
{
"id": 46454,
"label": "location",
"start_offset": 119,
"end_offset": 124
}
] | [] | [] |
942 | Background WildFire captures many samples of mobile malware that intercept and upload SMS messages. | [
{
"id": 44908,
"label": "identity",
"start_offset": 12,
"end_offset": 20
}
] | [] | [] |
943 | Most of these are created by malware authors who set up command and control (C2) servers with third party hosting providers and frequently update their locations to avoid detection. | [] | [] | [] |
944 | Among these malware we have found many that are created by “mobile monetization” companies who distribute apps that provide little value but have a high cost to the user. | [] | [] | [] |
945 | These apps are often installed by tricking users into clicking a pop-up, only to find later that a charge has appeared on their phone bill. | [
{
"id": 44909,
"label": "attack-pattern",
"start_offset": 34,
"end_offset": 48
}
] | [] | [] |
946 | Antivirus programs typically identify these apps as malware, the topic of this blog is something different and harder to detect. | [] | [] | [] |
947 | Taomike is a Chinese company that aims to become the biggest mobile advertisement solution platform in China. | [
{
"id": 46455,
"label": "identity",
"start_offset": 1,
"end_offset": 8
},
{
"id": 46456,
"label": "location",
"start_offset": 14,
"end_offset": 21
},
{
"id": 46457,
"label": "location",
"start_offset": 104,
"end_offset": 109
}
] | [
{
"id": 192,
"from_id": 46455,
"to_id": 46456,
"type": "located-at"
}
] | [] |
948 | They provide an SDK and services to help developers display rich advertisements with a high pay rate. | [] | [] | [] |
949 | Taomike has not previously been associated with malicious activity, but a recent update to their software added SMS theft functionality. | [
{
"id": 46458,
"label": "identity",
"start_offset": 0,
"end_offset": 7
}
] | [] | [] |
950 | The apps this library is embedded in may be legitimate and have significant functionality, but their developer’s choice to use this library has put them at risk. Technical Details: | [] | [] | [] |
951 | SMS Theft | [
{
"id": 44910,
"label": "attack-pattern",
"start_offset": 0,
"end_offset": 9
}
] | [] | [] |
952 | Not all apps that use the Taomike library steal SMS messages. | [
{
"id": 46459,
"label": "identity",
"start_offset": 26,
"end_offset": 33
},
{
"id": 46460,
"label": "attack-pattern",
"start_offset": 42,
"end_offset": 60
}
] | [
{
"id": 193,
"from_id": 46459,
"to_id": 46460,
"type": "uses"
}
] | [] |
953 | Our analysis indicates that only samples that contain the embedded URL, hxxp://112.126.69.51/2c.php have this functionality. | [
{
"id": 46461,
"label": "URL",
"start_offset": 72,
"end_offset": 99
}
] | [] | [] |
954 | This is the URL to which the software uploads SMS messages, and the IP address belongs to the Taomike API server used by other Taomike services. | [
{
"id": 46462,
"label": "identity",
"start_offset": 127,
"end_offset": 134
},
{
"id": 44911,
"label": "Infrastucture",
"start_offset": 94,
"end_offset": 112
}
] | [] | [] |
955 | We have captured around 63,000 Android apps in WildFire that include the Taomike library but only around 18,000 include the SMS theft functionality. | [
{
"id": 2996,
"label": "SOFTWARE",
"start_offset": 47,
"end_offset": 55
},
{
"id": 46463,
"label": "identity",
"start_offset": 73,
"end_offset": 80
},
{
"id": 46464,
"label": "attack-pattern",
"start_offset": 124,
"end_offset": 133
}
] | [] | [] |
956 | We believe there are different versions of the Taomike SDK and only some of them include SMS uploading behavior. | [
{
"id": 46465,
"label": "identity",
"start_offset": 50,
"end_offset": 57
}
] | [] | [] |
957 | Based on our data, the version that contains the SMS stealing functions is newer and was released around August 2015. | [
{
"id": 44912,
"label": "TIME",
"start_offset": 105,
"end_offset": 116
},
{
"id": 44913,
"label": "attack-pattern",
"start_offset": 49,
"end_offset": 61
}
] | [] | [] |
958 | Apps that use earlier versions of the library appear to be safe. | [] | [] | [] |
959 | The Taomike library is called “zdtpay” and is a component of Taomike’s IAP system. Because Android apps are required to list the permissions they need in their manifest file, we can see that this library requires both SMS and network related permissions. | [
{
"id": 46467,
"label": "SOFTWARE",
"start_offset": 62,
"end_offset": 82
},
{
"id": 46468,
"label": "SOFTWARE",
"start_offset": 93,
"end_offset": 100
},
{
"id": 46466,
"label": "identity",
"start_offset": 5,
"end_offset": 12
}
] | [] | [] |
960 | The library also registers a receiver named com.zdtpay.Rf2b for both the SMS_RECEIVED and BOOT_COMPLETED actions with highest priority of 2147483647. | [] | [] | [] |
961 | Figure 1. | [] | [] | [] |
962 | Registered receiver for SMS_RECEIVED The registered receiver Rf2b reads SMS messages whenever they arrive. | [] | [] | [] |
963 | The message body and sender phone number are collected as shown in Figure 2. Figure 2. | [] | [] | [] |
964 | SMS body and sender number read | [] | [] | [] |
965 | If the device has just booted, it will start the service MySd2e, which then registers a receiver for Rf2b as shown in Figure 3. | [] | [] | [] |
966 | Figure 3. | [] | [] | [] |
967 | MySd2e Service registers receiver for Rf2b | [] | [] | [] |
968 | SMS information collected by the receiver is saved in a hashmap with “other” as the key and sent to a method that uploads the message to 112.126.69.51 as shown in Figure 4. | [
{
"id": 3036,
"label": "IPV4",
"start_offset": 137,
"end_offset": 150
}
] | [] | [] |
969 | Figure 4. Information uploaded to IP Address used by api.taomike.com | [
{
"id": 44914,
"label": "DOMAIN",
"start_offset": 54,
"end_offset": 69
}
] | [] | [] |
970 | All SMS messages sent to the phone are uploaded, not just those that are relevant to Taomike’s platform. | [
{
"id": 46470,
"label": "identity",
"start_offset": 85,
"end_offset": 92
}
] | [] | [] |
971 | Figure 5 shows a packet capture of a test message upload. | [] | [] | [] |
972 | The message content is “hey test msg” as circled with dashed red box. | [] | [] | [] |
973 | Figure 5. | [] | [] | [] |
974 | SMS uploaded via HTTP in pcap The Taomike library makes contact with the following URLs, but only the “2c.php” path is used to capture SMS messages. | [
{
"id": 3051,
"label": "attack-pattern",
"start_offset": 128,
"end_offset": 148
},
{
"id": 46472,
"label": "FILEPATH",
"start_offset": 104,
"end_offset": 110
},
{
"id": 46471,
"label": "identity",
"start_offset": 35,
"end_offset": 42
}
] | [] | [] |
975 | The rest appear to be used for other parts of the IAP functionality in the library. | [] | [] | [] |
976 | Risks and Mitigation | [] | [] | [] |
977 | We have captured over 18,000 samples that contain the SMS stealing library since August 2015, meaning the number of affected users is considerable. | [
{
"id": 46473,
"label": "TIME",
"start_offset": 81,
"end_offset": 92
},
{
"id": 46474,
"label": "attack-pattern",
"start_offset": 54,
"end_offset": 66
}
] | [] | [] |
978 | We expect the number of affected apps and users to increase as more developers incorporate the newer version of Taomike library. | [
{
"id": 46475,
"label": "identity",
"start_offset": 112,
"end_offset": 119
}
] | [] | [] |
979 | The infected apps are not limited to a single developer or third party store as many developers appear use the Taomike library. | [
{
"id": 46476,
"label": "identity",
"start_offset": 112,
"end_offset": 119
}
] | [] | [] |
980 | Some of the infected apps purport to contain or display adult content. | [] | [] | [] |
981 | We do not know how Taomike is using the stolen SMS messages, but no library should capture all messages and send them to a system outside the phone. | [
{
"id": 46477,
"label": "identity",
"start_offset": 20,
"end_offset": 27
}
] | [] | [] |
982 | In version 4.4 of Android (KitKat) Google began preventing apps from capturing SMS messages unless they were defined as the “default” SMS app. | [
{
"id": 46479,
"label": "identity",
"start_offset": 35,
"end_offset": 41
},
{
"id": 46478,
"label": "SOFTWARE",
"start_offset": 18,
"end_offset": 34
}
] | [] | [] |
983 | Users outside of China and those that only download apps from the official Google Play store are not at risk from this threat. | [
{
"id": 46480,
"label": "SOFTWARE",
"start_offset": 76,
"end_offset": 87
},
{
"id": 46481,
"label": "location",
"start_offset": 18,
"end_offset": 23
}
] | [] | [] |
984 | To protect Palo Alto Networks customers from the Taomike SMS stealer, we’ve made the following protections available: | [
{
"id": 44915,
"label": "identity",
"start_offset": 11,
"end_offset": 29
},
{
"id": 44916,
"label": "malware",
"start_offset": 49,
"end_offset": 68
}
] | [] | [] |
985 | Conclusion Even popular third party monetization platforms are not always trustworthy. | [] | [] | [] |
986 | When developers incorporate the libraries into their apps they need to carefully test them and monitor for any abnormal activities. | [] | [] | [] |
987 | Identifying monetization and advertising platforms that behave poorly and abuse their users is something that our industry must to do ensure the safety of all mobile devices and their users. | [] | [] | [] |
988 | Acknowledgement We greatly appreciate the help from Rongbo Shao from Palo Alto Networks in working on the Threat Prevention signature. | [
{
"id": 46482,
"label": "identity",
"start_offset": 71,
"end_offset": 89
},
{
"id": 46483,
"label": "identity",
"start_offset": 54,
"end_offset": 65
}
] | [] | [] |
989 | We would also like to thank Ryan Olson, Benjamin Small, Richar Wartell, and Chris Clark from Palo Alto networks in publishing the discovery. | [
{
"id": 46484,
"label": "identity",
"start_offset": 28,
"end_offset": 38
},
{
"id": 46485,
"label": "identity",
"start_offset": 40,
"end_offset": 54
},
{
"id": 46486,
"label": "identity",
"start_offset": 56,
"end_offset": 70
},
{
"id": 46487,
"label": "identity",
"start_offset": 76,
"end_offset": 87
},
{
"id": 46488,
"label": "identity",
"start_offset": 93,
"end_offset": 111
}
] | [] | [] |
990 | Related Sample Hash Values Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address! Please mark, I'm not a robot! | [] | [] | [] |
991 | By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. | [] | [] | [] |
992 | Recently, we found email accounts from top universities across the world being sold on Taobao, the largest consumer-to-consumer (C2C) e-commerce platform in China. | [
{
"id": 46489,
"label": "SOFTWARE",
"start_offset": 87,
"end_offset": 93
},
{
"id": 46490,
"label": "location",
"start_offset": 157,
"end_offset": 162
}
] | [
{
"id": 194,
"from_id": 46489,
"to_id": 46490,
"type": "located-at"
}
] | [] |
993 | Advertised uses for these accounts included registering for special accounts under software developer programs, receiving student discounts or coupons from retailers, and obtaining access to academic databases. | [] | [] | [] |
994 | This post describes the scope, associated risks, and implications of this activity. | [] | [] | [] |
995 | Our investigation began with a Chinese language search for "edu mailbox" in Taobao, which returned 99 results related to stolen university email accounts. | [
{
"id": 46491,
"label": "SOFTWARE",
"start_offset": 77,
"end_offset": 83
}
] | [] | [] |
996 | The most expensive account was listed at ¥2400 RMB ($390.80 USD), while the cheapest was only ¥0.98 RMB ($0.16 USD). Figure 1: Results for Chinese language "edu mailbox" search on Taobao. | [
{
"id": 46492,
"label": "SOFTWARE",
"start_offset": 181,
"end_offset": 187
}
] | [] | [] |
997 | These accounts, which include an education (EDU) top-level domain email address with valid password, represent 42 of the world’s top universities, across 10 countries: | [] | [] | [] |
999 | The descriptions for these items proposed three main uses for buyers: | [] | [] | [] |
1,000 | 1. Registering for special accounts under software developer programs: | [] | [] | [] |
1,001 | For example, the most popular account type, which has been bought at least 569 times, was advertised as a Microsoft’s student Windows Phone 7 and 8 developer account. | [
{
"id": 46504,
"label": "identity",
"start_offset": 106,
"end_offset": 116
}
] | [] | [] |
1,002 | By using this kind of account, a user can perform a developer unlock on their Windows Phone devices without incurring a fee. | [] | [] | [] |
1,003 | Most reviews of this package were favorable, with comments like "very good to use" or "with seller’s help I can unlock my phone now." | [] | [] | [] |
1,004 | Figure 2: The most popular account type has sold at least 569 times. | [] | [] | [] |
1,005 | 2. Receiving student discounts or coupons from retailers: | [] | [] | [] |
1,006 | Some accounts advertised candidacy towards registration for student discount at retailers such as Amazon, BestBuy, Apple, and Dell. | [
{
"id": 46508,
"label": "identity",
"start_offset": 126,
"end_offset": 130
},
{
"id": 46507,
"label": "identity",
"start_offset": 115,
"end_offset": 120
},
{
"id": 46505,
"label": "identity",
"start_offset": 98,
"end_offset": 104
},
{
"id": 46506,
"label": "identity",
"start_offset": 106,
"end_offset": 113
}
] | [] | [] |
1,007 | For example, the standard annual fee for Amazon Prime is $99 USD; however, with the student discount, a buyer could enjoy it for free the first six months and then renew at half price for subsequent years. | [
{
"id": 46509,
"label": "identity",
"start_offset": 41,
"end_offset": 53
}
] | [] | [] |
1,008 | Figure 3: The seller showed how to register for student discount accounts. | [] | [] | [] |
1,009 | 3. Obtaining access to academic databases: | [] | [] | [] |
1,010 | Accounts for big universities (e.g., MIT, Stanford, etc.) are mainly used to access respective library services and resources, "including research help, study spaces, print and electronic books/journals and more." | [
{
"id": 46511,
"label": "identity",
"start_offset": 42,
"end_offset": 50
},
{
"id": 46510,
"label": "identity",
"start_offset": 37,
"end_offset": 40
}
] | [] | [] |
1,011 | Figure 4: | [] | [] | [] |
1,012 | A seller advertises how an MIT account can be used to access online library resources. | [
{
"id": 46512,
"label": "identity",
"start_offset": 27,
"end_offset": 30
}
] | [] | [] |
1,013 | We talked with some sellers through AliWangWang, an instant message (IM) system developed by Taobao for online trading. | [
{
"id": 46513,
"label": "SOFTWARE",
"start_offset": 37,
"end_offset": 48
},
{
"id": 46514,
"label": "identity",
"start_offset": 94,
"end_offset": 100
}
] | [] | [] |