id
int64
1
14.4k
text
stringlengths
3
5.01k
entities
list
relations
sequence
Comments
sequence
11,709
Malicious version of My First APP, which adds Metasploit SideWinder has used malicious apps as part of its operation before.
[ { "id": 36090, "label": "malware", "start_offset": 46, "end_offset": 56 }, { "id": 36091, "label": "threat-actor", "start_offset": 61, "end_offset": 71 } ]
[]
[]
4,382
HYPERSCRAPE demonstrates Charming Kitten’s commitment to developing and maintaining purpose-built capabilities.
[ { "id": 13145, "label": "threat-actor", "start_offset": 25, "end_offset": 40 }, { "id": 50195, "label": "malware", "start_offset": 0, "end_offset": 11 } ]
[]
[]
12,581
This looked similar to an earlier in-the-wild iOS vulnerability analyzed by Ian Beer of Google Project Zero.
[]
[]
[]
11,292
We need to request that a download link be generated for the collected files with the “trendmicro-visionone-download-information-for-collected-forensic-file”.
[]
[]
[]
13,494
Some malicious actors, such as ransomware operators, earn directly from their cyberattacks.
[]
[]
[]
5,386
We have evidence that the routers of at least one vendor other than Asus and WatchGuard are connecting to Cyclops Blink C&Cs as well, but so far we have been unable to collect malware samples for this router brand.
[ { "id": 51380, "label": "malware", "start_offset": 106, "end_offset": 119 } ]
[]
[]
3,889
They should also exercise an incident response plan and Implement regular data backup procedures on both IT and OT networks.
[]
[]
[]
7,302
It collects the following information from the infected system by invoking the following commands: Command Description system_profiler SPHardwareDataType 2>/dev/null | awk '/Processor / {split($0,line,\":\"); printf(\"%s\",line[2]);}' Get processor information 15f20 = system_profiler SPHardwareDataType 2>/dev/null | awk '/Memory/ {split($0,line, \":\"); printf(\"%s\", line[2]);}'
[]
[]
[]
14,275
...
[]
[]
[]
3,040
Many apps these days have auto-update capabilities.
[]
[]
[]
12,391
We terminated 4 YouTube channels as part of our actions against a coordinated influence operation.
[]
[]
[]
4
The first known campaign was launched by Crimeware on November 2014.
[ { "id": 45806, "label": "TIME", "start_offset": 55, "end_offset": 68 }, { "id": 48942, "label": "malware", "start_offset": 42, "end_offset": 51 } ]
[]
[]
4,052
By using existing frameworks, examples of which are detailed in the following, it builds new backdoor variants more efficiently.
[]
[]
[]
13,297
The TSSL project has 64-bit version.
[ { "id": 41403, "label": "identity", "start_offset": 24, "end_offset": 27 } ]
[]
[]
10,074
Trend Micro's Zero-Day Initiative (ZDI) provided technical analysis of recently patched vulnerabilities in the SolarWinds Orion Platform.
[]
[]
[]
11,791
APT35 has relied on this technique since 2017 — targeting high-value accounts in government, academia, journalism, NGOs, foreign policy, and national security.
[ { "id": 36358, "label": "threat-actor", "start_offset": 0, "end_offset": 5 }, { "id": 36360, "label": "location", "start_offset": 93, "end_offset": 101 }, { "id": 36362, "label": "location", "start_offset": 137, "end_offset": 140 }, { "id": 36363, "label": "location", "start_offset": 141, "end_offset": 149 }, { "id": 36364, "label": "location", "start_offset": 150, "end_offset": 158 } ]
[]
[]
4,717
In 2019, we confronted the risks posed by NSO Group again, relying upon NSO Groups’s marketing information suggesting that they had a 0-day exploit for Android.
[ { "id": 50611, "label": "TIME", "start_offset": 3, "end_offset": 7 }, { "id": 50612, "label": "threat-actor", "start_offset": 42, "end_offset": 51 }, { "id": 50614, "label": "SOFTWARE", "start_offset": 152, "end_offset": 159 }, { "id": 50613, "label": "threat-actor", "start_offset": 72, "end_offset": 82 }, { "id": 50615, "label": "attack-pattern", "start_offset": 134, "end_offset": 147 } ]
[]
[]
5,525
They involve a hacker deploying malicious code known as Magecart to an organization’s website.
[ { "id": 51529, "label": "malware", "start_offset": 56, "end_offset": 64 } ]
[]
[]
863
They’ve certainly caused a wealth of damage to end users with some of the more prominent malware families, such as CryptoLocker, CryptoWall, TorrentLocker, and TeslaCrypt infecting millions of users overall.
[ { "id": 46398, "label": "malware", "start_offset": 160, "end_offset": 170 }, { "id": 46399, "label": "malware", "start_offset": 141, "end_offset": 154 }, { "id": 46400, "label": "malware", "start_offset": 129, "end_offset": 139 }, { "id": 46401, "label": "malware", "start_offset": 115, "end_offset": 128 } ]
[]
[]
997
These accounts, which include an education (EDU) top-level domain email address with valid password, represent 42 of the world’s top universities, across 10 countries:
[]
[]
[]
8,571
One of the most notable characteristics of APT35 is their impersonation of conference officials to conduct phishing attacks.
[ { "id": 26488, "label": "location", "start_offset": 11, "end_offset": 15 }, { "id": 26490, "label": "attack-pattern", "start_offset": 107, "end_offset": 115 } ]
[]
[]
6,470
The command is connected to 187.236.212[.]184 and downloads a file called SharpChisel.exe (SHA256: 61f83466b512eb12fc82441259a5205f076254546a7726a2e3e983011898e4e2) and saves the file to the C:\programdata directory.
[ { "id": 20109, "label": "IPV4", "start_offset": 28, "end_offset": 45 }, { "id": 20110, "label": "location", "start_offset": 46, "end_offset": 49 }, { "id": 20111, "label": "SHA1", "start_offset": 99, "end_offset": 163 }, { "id": 20112, "label": "location", "start_offset": 165, "end_offset": 168 } ]
[]
[]
5,936
We did not capture the subsequent stages, but assess the attackers did not have exploits for the current version of Chrome (91.0.4472) at that time, but instead used n-day exploits targeting Samsung Browser, which was running an older and vulnerable version of Chromium.
[ { "id": 18253, "label": "location", "start_offset": 144, "end_offset": 148 }, { "id": 18255, "label": "location", "start_offset": 236, "end_offset": 239 }, { "id": 18256, "label": "threat-actor", "start_offset": 262, "end_offset": 270 } ]
[]
[]
2,714
Palo Alto Networks enterprise security platform is focused on providing an integrated approach to detecting and preventing advanced threats across each step in the attack kill-chain.
[ { "id": 47954, "label": "identity", "start_offset": 0, "end_offset": 18 } ]
[]
[]
8,265
The new emails used more common phishing tactics, such as alleged requests for payment confirmation.
[ { "id": 25515, "label": "attack-pattern", "start_offset": 32, "end_offset": 40 } ]
[]
[]
7,793
Suspicious activity using ServHelper A campaign targeting China spoofed FedEx-themed emails with subjects pertaining to delivery problems, failures, or notifications.
[ { "id": 24138, "label": "malware", "start_offset": 26, "end_offset": 36 }, { "id": 24139, "label": "location", "start_offset": 39, "end_offset": 47 } ]
[]
[]
9,513
This malware and PuppetLoader’s decrypted Loader.dlls share similar strings such as “[-] UnExist pwszModuleFunName:”.
[ { "id": 29189, "label": "location", "start_offset": 13, "end_offset": 16 }, { "id": 29190, "label": "malware", "start_offset": 17, "end_offset": 29 } ]
[]
[]
42
It shows the price that a criminal enterprise called IFRAME DOLLARS was charging to infect computers in various countries at that time.
[ { "id": 44577, "label": "threat-actor", "start_offset": 53, "end_offset": 67 } ]
[]
[]
1,982
Figure 5: WinDBG view of call stack when lsass.exe process crashes due to exploitation Vulnerable code is found in the CSsl3TlsClientContext::DigestServerHelloVerifyRequest function: Palo Alto Networks is releasing signature 37094 and 37059 to defend against these vulnerabilities.
[ { "id": 47094, "label": "SOFTWARE", "start_offset": 11, "end_offset": 17 }, { "id": 47095, "label": "identity", "start_offset": 186, "end_offset": 204 } ]
[]
[]
4,840
To help users and defenders, we will provide examples of the hack-for-hire ecosystem from India, Russia, and the United Arab Emirates and context around their capabilities and persistence mechanisms.
[ { "id": 50794, "label": "attack-pattern", "start_offset": 61, "end_offset": 74 }, { "id": 50795, "label": "location", "start_offset": 90, "end_offset": 95 }, { "id": 50797, "label": "location", "start_offset": 113, "end_offset": 133 }, { "id": 50796, "label": "location", "start_offset": 97, "end_offset": 103 } ]
[]
[]
5,349
If a command targets the core component, it can be one of the following: Command ID Action 0 Terminates the program 1 Bypasses the data-sending interval and sends data to C&C servers immediately 2 Adds a new C&C server to the list in memory 3 Sets time to send the next packet to the C&C server 4 Sets time to send the next packet to the C&C server 5 Adds a new module (an ELF file should be received following the command)
[]
[]
[]
11,636
While tracking the activities of the SideWinder group, which has become infamous for targeting the South Asia region and its surrounding countries, we identified a server used to deliver a malicious LNK file and host multiple credential phishing pages.
[ { "id": 35704, "label": "location", "start_offset": 110, "end_offset": 116 }, { "id": 35705, "label": "location", "start_offset": 117, "end_offset": 120 }, { "id": 35706, "label": "location", "start_offset": 208, "end_offset": 211 }, { "id": 35707, "label": "location", "start_offset": 212, "end_offset": 216 }, { "id": 35708, "label": "attack-pattern", "start_offset": 237, "end_offset": 245 } ]
[]
[]
3,597
The different samples organized name, payload delivered and the fully-undetectable stages where the attribute “KurdishCoderProduction” is present
[]
[]
[]
249
A cybersquatting domain save-russia[.]today is launching DoS attacks on Ukrainian news sites.
[ { "id": 44656, "label": "attack-pattern", "start_offset": 2, "end_offset": 16 }, { "id": 44657, "label": "DOMAIN", "start_offset": 24, "end_offset": 43 }, { "id": 44658, "label": "attack-pattern", "start_offset": 57, "end_offset": 68 }, { "id": 44659, "label": "identity", "start_offset": 72, "end_offset": 92 } ]
[ { "id": 9, "from_id": 44658, "to_id": 44659, "type": "targets" }, { "id": 114, "from_id": 44656, "to_id": 44657, "type": "uses" }, { "id": 115, "from_id": 44658, "to_id": 44657, "type": "uses" } ]
[]
2,375
We initially observed StealthVector, a shellcode loader written in C/C++, in October 2020.
[ { "id": 47437, "label": "malware", "start_offset": 22, "end_offset": 35 }, { "id": 47438, "label": "TIME", "start_offset": 77, "end_offset": 89 } ]
[]
[]
13,546
This script is likely activated by exploiting a cross-site scripting (XSS) vulnerability in the said store’s administration portal.
[ { "id": 51622, "label": "SOFTWARE", "start_offset": 101, "end_offset": 130 }, { "id": 51623, "label": "malware", "start_offset": 5, "end_offset": 11 }, { "id": 51621, "label": "attack-pattern", "start_offset": 48, "end_offset": 74 } ]
[ { "id": 1115, "from_id": 51623, "to_id": 51622, "type": "targets" }, { "id": 1116, "from_id": 51623, "to_id": 51621, "type": "uses" } ]
[]
1,505
The backdoor when run will create threads for each connection listed in its config file. The sample that was caught by our systems contains 3 IP addresses in its config file.
[]
[]
[]
14,111
Based on our analysis, we believe the malware author did not fake the compile times of the binaries.
[]
[]
[]
3,975
Powerful artificial intelligence (AI) and expert security analytics correlate data from customer environments and Trend Micro’s global threat intelligence to deliver fewer, higher-fidelity alerts, leading to better, early detection.
[ { "id": 49836, "label": "identity", "start_offset": 114, "end_offset": 125 } ]
[]
[]
10,875
Date of submission SHA256 Identified C&C servers Additional Details August 2, 2019 374d92f553c28e9dad1aa7f5d334a07dede1e5ad19c3766efde74290d0c49afb upeg-system-app[.]com Likely repacked from Kingoroot.
[ { "id": 33101, "label": "location", "start_offset": 0, "end_offset": 4 }, { "id": 33103, "label": "SHA1", "start_offset": 88, "end_offset": 152 }, { "id": 33104, "label": "location", "start_offset": 177, "end_offset": 183 } ]
[]
[]
4,684
Process process = new Process(); process.StartInfo.Arguments = string.Format("PIPE Google \"{0}\"", text); process.StartInfo.FileName = Process.GetCurrentProcess().MainModule.FileName; process.Start();
[]
[]
[]
2,114
On August 22, 2018, the Apache Foundation released a critical security update for CVE-2018-1176, a remote code execution vulnerability affecting Apache Struts versions 2.3 to 2.3.34 and 2.5 to 2.5.16.
[ { "id": 47248, "label": "TIME", "start_offset": 3, "end_offset": 18 }, { "id": 47249, "label": "vulnerability", "start_offset": 82, "end_offset": 95 }, { "id": 47252, "label": "SOFTWARE", "start_offset": 145, "end_offset": 199 }, { "id": 47250, "label": "vulnerability", "start_offset": 99, "end_offset": 134 } ]
[ { "id": 311, "from_id": 47252, "to_id": 47249, "type": "has" }, { "id": 312, "from_id": 47252, "to_id": 47250, "type": "has" } ]
[]
3,640
Carrying out a successful conversation hijacking spear phishing attack requires knowing someone that the ultimate target is communicating with, compromising that person’s account, identifying an ongoing email conversation with the ultimate target, crafting an email to appear part of that ongoing email conversation and finally sending it.
[ { "id": 49421, "label": "attack-pattern", "start_offset": 49, "end_offset": 63 } ]
[]
[]
2,898
s[_local28][(((_local41 - _local12) / 4) + 14)]
[]
[]
[]
5,443
There were 24.5 billion mobile banking transactions while there were 20.6 billion PC-based transactions.
[]
[]
[]
1,727
Here we explain this type of attack and what you should do.
[]
[]
[]
15
We found 147 new unique pieces of malware today alone, two of them fully undetectable by the legacy security solutions in VirusTotal and most of them barely detected by one vendor (few have 4/57 detection rate).
[ { "id": 44574, "label": "SOFTWARE", "start_offset": 122, "end_offset": 132 } ]
[]
[]
1,783
Leave a comment below let us know what you think.
[]
[]
[]
726
This post is also available in: 日本語 (Japanese) On Sept. 14, 2021, Microsoft’s Security Response Center (MSRC) released security patches detailing the findings of four critical vulnerabilities affecting the Microsoft Azure package Open Management Infrastructure (OMI).
[ { "id": 46298, "label": "TIME", "start_offset": 56, "end_offset": 70 }, { "id": 44843, "label": "identity", "start_offset": 72, "end_offset": 115 }, { "id": 44844, "label": "SOFTWARE", "start_offset": 212, "end_offset": 272 } ]
[]
[]
1,026
Navigating to CNRI’s webmail page, we were then able to successfully access and send an email from that account.
[ { "id": 46517, "label": "identity", "start_offset": 14, "end_offset": 18 } ]
[]
[]
1,762
If an attacker could modify it, then any script can be run, such as downloading and executing a PE file, without any notification or alert.
[]
[]
[]
10,555
The vast majority of these messages were sent to spam without any user ever seeing them, and we were able to preemptively block the domains using Safe Browsing.
[ { "id": 32182, "label": "tools", "start_offset": 4, "end_offset": 8 }, { "id": 32183, "label": "location", "start_offset": 71, "end_offset": 75 }, { "id": 32184, "label": "location", "start_offset": 83, "end_offset": 87 }, { "id": 32185, "label": "location", "start_offset": 89, "end_offset": 92 } ]
[]
[]
8,760
We received leads from the FBI that supported us in this investigation.
[]
[]
[]
2,777
These new drive-by attacks focus on hijacking the computational resources of the victim’s computer to “mine” cryptocurrency on behalf of the attackers.
[ { "id": 48006, "label": "attack-pattern", "start_offset": 36, "end_offset": 73 } ]
[]
[]
2,601
For example, in the “proof” of the Okta breach posted on the Lapsus$ Group’s Telegram channel, the actor states: “… our focus was ONLY on okta customers” (Figure 3)
[ { "id": 45614, "label": "identity", "start_offset": 138, "end_offset": 142 }, { "id": 45611, "label": "identity", "start_offset": 35, "end_offset": 39 }, { "id": 45612, "label": "threat-actor", "start_offset": 61, "end_offset": 68 }, { "id": 45613, "label": "SOFTWARE", "start_offset": 77, "end_offset": 85 } ]
[ { "id": 360, "from_id": 45612, "to_id": 45611, "type": "targets" } ]
[]
5,616
Once launched, it contacts a command and control server hosted in China using an HTTP GET request to the following website to register the infection with the attacker: http://14.17.95.205:21910/my/service.php.
[ { "id": 17280, "label": "location", "start_offset": 37, "end_offset": 40 }, { "id": 17282, "label": "location", "start_offset": 126, "end_offset": 134 }, { "id": 17283, "label": "URL", "start_offset": 168, "end_offset": 208 } ]
[]
[]
3,181
Infection chain
[]
[]
[]
3,307
Figure 23.
[]
[]
[]
11,676
We found several interesting dynamic DNS domains resolving to a server that was used to deliver SideWinder’s malicious documents.
[]
[]
[]
5,199
Vulnerabilities in the standard specification
[]
[]
[]
10,248
Yet this is not always enough to hide these activities.
[]
[]
[]
5,531
Magecart attacks get around that.
[ { "id": 51530, "label": "malware", "start_offset": 0, "end_offset": 8 } ]
[]
[]
13,408
We recovered the exploit used to escape the Chrome Sandbox, but not the initial RCE exploit.
[]
[]
[]
13,240
UserInstall.exe will abuse the BITSadmin command-line tool to create a job and launch sidebar.exe.
[ { "id": 41285, "label": "location", "start_offset": 16, "end_offset": 20 }, { "id": 41286, "label": "malware", "start_offset": 31, "end_offset": 40 }, { "id": 41287, "label": "location", "start_offset": 54, "end_offset": 58 }, { "id": 41288, "label": "location", "start_offset": 71, "end_offset": 74 }, { "id": 41289, "label": "location", "start_offset": 75, "end_offset": 78 } ]
[]
[]
7,238
Their blog contains write-ups and analysis of vulnerabilities that have been publicly disclosed, including “guest” posts from unwitting legitimate security researchers, likely in an attempt to build additional credibility with other security researchers.
[ { "id": 22622, "label": "threat-actor", "start_offset": 26, "end_offset": 29 }, { "id": 22623, "label": "location", "start_offset": 30, "end_offset": 33 }, { "id": 22624, "label": "location", "start_offset": 147, "end_offset": 155 }, { "id": 22625, "label": "location", "start_offset": 169, "end_offset": 175 }, { "id": 22626, "label": "location", "start_offset": 233, "end_offset": 241 } ]
[]
[]
13,765
The API address table.
[]
[]
[]
5,378
The following data is obtained from an infected device: The Linux version, which the module gets by calling the uname() function and /etc/issue file Information about the device’s memory consumption, which it gets by calling the sysinfo() function The SSD storage information, which it gets by calling the statvfs() function The content of the following files: /etc/passwd /etc/group /proc/mounts /proc/partitions Information about the network interfaces, which it gets by calling the if_nameindex() and iotctl() functions with the SIOCGIFHWADDR and SIOCGIFADDR commands.
[ { "id": 51372, "label": "FILEPATH", "start_offset": 136, "end_offset": 146 }, { "id": 51374, "label": "FILEPATH", "start_offset": 382, "end_offset": 392 }, { "id": 51375, "label": "FILEPATH", "start_offset": 395, "end_offset": 407 }, { "id": 51376, "label": "FILEPATH", "start_offset": 409, "end_offset": 425 }, { "id": 51373, "label": "FILEPATH", "start_offset": 370, "end_offset": 381 } ]
[]
[]
2,031
The HelloXD author(s) did modify the infamous file marker and mutex however, opting for dxunmgqehhehyrhtxywuhwrvzxqrcblo as the file marker and With best wishes And good intentions… as the mutex (Figure 9).
[ { "id": 47130, "label": "malware", "start_offset": 5, "end_offset": 12 } ]
[]
[]
3,242
Figure 15.
[]
[]
[]
12,908
A general detection indicates that something was deemed suspicious, but it was not assigned to a specific tactic or technique.
[]
[]
[]
10,570
Upon reviewing phishing attempts since the beginning of this year, we’ve seen a rising number of attackers, including those from Iran and North Korea, impersonating news outlets or journalists.
[ { "id": 32243, "label": "attack-pattern", "start_offset": 15, "end_offset": 23 }, { "id": 32246, "label": "location", "start_offset": 134, "end_offset": 137 } ]
[]
[]
518
Figure 3 shows ransomware arrives via different application protocols.
[]
[]
[]
7,232
We encourage anyone who discovers a Chrome vulnerability to report that activity through the Chrome Vulnerabilities Rewards Program submission process.
[]
[]
[]
3,285
The script used to download OBS Studio, prepare the configuration, and start the process ScreenShot
[ { "id": 48379, "label": "SOFTWARE", "start_offset": 28, "end_offset": 38 } ]
[]
[]
14,342
It disguised itself as the adult game named after an adult film actress.
[]
[]
[]
5,499
Compared to Patchwork, whose Trojanized documents exploit at least five security flaws, Confucius’ backdoors are delivered through Office files exploiting memory corruption vulnerabilities CVE-2015-1641 and CVE-2017-11882.
[ { "id": 51507, "label": "attack-pattern", "start_offset": 144, "end_offset": 172 }, { "id": 51504, "label": "threat-actor", "start_offset": 88, "end_offset": 97 }, { "id": 51503, "label": "threat-actor", "start_offset": 12, "end_offset": 21 }, { "id": 51505, "label": "vulnerability", "start_offset": 189, "end_offset": 202 }, { "id": 51506, "label": "vulnerability", "start_offset": 207, "end_offset": 221 } ]
[ { "id": 1100, "from_id": 51504, "to_id": 51507, "type": "uses" } ]
[]
10,179
The actors behind this campaign, which we attribute to a group of hackers recruited in a Russian-speaking forum, lure their target with fake collaboration opportunities (typically a demo for anti-virus software, VPN, music players, photo editing or online games), hijack their channel, then either sell it to the highest bidder or use it to broadcast cryptocurrency scams.
[ { "id": 31070, "label": "location", "start_offset": 23, "end_offset": 31 }, { "id": 31072, "label": "location", "start_offset": 113, "end_offset": 117 }, { "id": 31073, "label": "location", "start_offset": 124, "end_offset": 130 }, { "id": 31074, "label": "malware", "start_offset": 232, "end_offset": 237 } ]
[]
[]
6,989
We have observed that the Remote Desktop Protocol (RDP) certificate associated in this deployment, “WIN-P9NRMH5G6M8,” is a common string found in previously identified Earth Karkaddan C&C servers.
[ { "id": 21886, "label": "attack-pattern", "start_offset": 26, "end_offset": 49 }, { "id": 21887, "label": "malware", "start_offset": 51, "end_offset": 54 } ]
[]
[]
1,272
Figure 5. Error message generated by Adobe.exe
[ { "id": 44960, "label": "FILEPATH", "start_offset": 38, "end_offset": 47 } ]
[]
[]
2,854
Register for Ignite ’17 Security Conference Vancouver, BC June 12–15, 2017
[ { "id": 48060, "label": "location", "start_offset": 45, "end_offset": 58 }, { "id": 48061, "label": "TIME", "start_offset": 59, "end_offset": 75 } ]
[]
[]
3,886
It also identifies how dependencies between an enterprise's IT and OT systems can give attackers a path.
[]
[]
[]
9,997
Scans the system’s Windows version and computer name m.exe Custom Mimikatz (including 32bit / 64bit file)
[ { "id": 30517, "label": "location", "start_offset": 35, "end_offset": 38 }, { "id": 30518, "label": "malware", "start_offset": 66, "end_offset": 74 } ]
[]
[]
8,130
All of this happens behind the overlay screen, unbeknownst to the user.
[]
[]
[]
4,931
This is the one of the groups we disrupted during the 2020 US election cycle for its targeting of campaign staffers.
[ { "id": 50948, "label": "TIME", "start_offset": 54, "end_offset": 58 } ]
[]
[]
11,391
We observed fewer than three dozen installs of this spyware.
[]
[]
[]
4,945
When they did, attackers sent them phishing links in follow-on correspondence.
[ { "id": 50970, "label": "attack-pattern", "start_offset": 35, "end_offset": 49 } ]
[]
[]
14,291
Figure 6.
[]
[]
[]
196
DDoS Attacks Impacting Ukrainian Government and Banking Institutions HermeticWiper Malware Website Defacement Rise in Phishing and Scam Attacks Increase in Cybersquatting Trends Fake Donation Websites DoS Attacks on Ukrainian News Sites Distribution of Apps How Palo Alto Networks Is Working to Keep You Safe How You Should Prepare for an Increase in Cyberthreats Such as Wipers, DDoS, Website Defacement and Other Related Attacks How Unit 42 Threat Intelligence and Security Consulting Can Help Additional Cybersecurity Resources Indicators of Compromise
[ { "id": 45877, "label": "attack-pattern", "start_offset": 1, "end_offset": 13 }, { "id": 45879, "label": "attack-pattern", "start_offset": 84, "end_offset": 109 }, { "id": 45885, "label": "attack-pattern", "start_offset": 238, "end_offset": 258 }, { "id": 45889, "label": "attack-pattern", "start_offset": 387, "end_offset": 405 }, { "id": 45891, "label": "identity", "start_offset": 436, "end_offset": 443 }, { "id": 45876, "label": "malware", "start_offset": 70, "end_offset": 83 }, { "id": 45878, "label": "identity", "start_offset": 24, "end_offset": 69 }, { "id": 45880, "label": "attack-pattern", "start_offset": 119, "end_offset": 144 }, { "id": 45881, "label": "attack-pattern", "start_offset": 157, "end_offset": 171 }, { "id": 45882, "label": "attack-pattern", "start_offset": 179, "end_offset": 201 }, { "id": 45883, "label": "attack-pattern", "start_offset": 202, "end_offset": 213 }, { "id": 45884, "label": "identity", "start_offset": 217, "end_offset": 237 }, { "id": 45886, "label": "identity", "start_offset": 263, "end_offset": 281 }, { "id": 45887, "label": "attack-pattern", "start_offset": 373, "end_offset": 379 }, { "id": 45888, "label": "attack-pattern", "start_offset": 381, "end_offset": 385 } ]
[ { "id": 130, "from_id": 45877, "to_id": 45878, "type": "targets" } ]
[]
965
If the device has just booted, it will start the service MySd2e, which then registers a receiver for Rf2b as shown in Figure 3.
[]
[]
[]
4,611
Fig - Potential Chopper Webshell Detection
[ { "id": 50511, "label": "malware", "start_offset": 21, "end_offset": 37 } ]
[]
[]
7,355
The attackers could hide their activities if they noted the business hours of the intended targets and performed the actions coinciding with said times.
[ { "id": 22875, "label": "TIME", "start_offset": 56, "end_offset": 74 }, { "id": 22876, "label": "location", "start_offset": 99, "end_offset": 102 } ]
[]
[]
7,587
Figure 8.
[]
[]
[]
3,942
http://{ip address\]:7001/wls-wsat/CoordinatorPortType Oracle Console curl.dat -vv http://{ip address}:7001/console/j_security_check -d j_username={username}&j_password={password}&submit=Login"
[ { "id": 49789, "label": "FILEPATH", "start_offset": 72, "end_offset": 81 }, { "id": 49787, "label": "URL", "start_offset": 0, "end_offset": 54 }, { "id": 49788, "label": "URL", "start_offset": 85, "end_offset": 134 } ]
[]
[]
1,293
It then sends the 'exit' command to this executable, which will kill this particular process.
[]
[]
[]
7,088
Parse HTTP packets HTTP Parser https://github.com/nodejs/http-parser
[ { "id": 22204, "label": "URL", "start_offset": 33, "end_offset": 70 } ]
[]
[]
6,238
The impact of spear-phishing attacks can be minimized by following security best practices, which include refraining from opening emails sent by suspicious sources.
[ { "id": 19245, "label": "location", "start_offset": 4, "end_offset": 10 }, { "id": 19246, "label": "location", "start_offset": 14, "end_offset": 19 }, { "id": 19247, "label": "attack-pattern", "start_offset": 20, "end_offset": 28 }, { "id": 19248, "label": "location", "start_offset": 37, "end_offset": 40 }, { "id": 19249, "label": "location", "start_offset": 67, "end_offset": 75 }, { "id": 19250, "label": "location", "start_offset": 76, "end_offset": 80 } ]
[]
[]
13,466
Our team of analysts and security experts is focused on identifying and stopping issues like phishing campaigns, zero-day vulnerabilities and hacking against Google, our products and our users.
[ { "id": 41953, "label": "location", "start_offset": 21, "end_offset": 24 }, { "id": 41954, "label": "location", "start_offset": 25, "end_offset": 33 }, { "id": 41955, "label": "location", "start_offset": 68, "end_offset": 71 }, { "id": 41956, "label": "attack-pattern", "start_offset": 93, "end_offset": 101 }, { "id": 41958, "label": "location", "start_offset": 138, "end_offset": 141 }, { "id": 41960, "label": "location", "start_offset": 179, "end_offset": 182 } ]
[]
[]
13,133
That means customers have to ask prospective providers like Trend Micro a mountain of questions.
[ { "id": 48906, "label": "identity", "start_offset": 60, "end_offset": 71 } ]
[]
[]
6,954
Upon enabling the macro, it will then download the ObliqueRat malware that is hidden inside an image file.
[ { "id": 21770, "label": "location", "start_offset": 28, "end_offset": 32 }, { "id": 21771, "label": "tools", "start_offset": 51, "end_offset": 61 } ]
[]
[]
6,217
We found that the returned script is a backdoor that gets its instructions from the WebSocket server.
[]
[]
[]

No dataset card yet

New: Create and edit this dataset card directly on the website!

Contribute a Dataset Card
Downloads last month
15
Add dataset card