id
int64 1
14.4k
| text
stringlengths 3
5.01k
| entities
list | relations
sequence | Comments
sequence |
---|---|---|---|---|
11,709 | Malicious version of My First APP, which adds Metasploit SideWinder has used malicious apps as part of its operation before. | [
{
"id": 36090,
"label": "malware",
"start_offset": 46,
"end_offset": 56
},
{
"id": 36091,
"label": "threat-actor",
"start_offset": 61,
"end_offset": 71
}
] | [] | [] |
4,382 | HYPERSCRAPE demonstrates Charming Kitten’s commitment to developing and maintaining purpose-built capabilities. | [
{
"id": 13145,
"label": "threat-actor",
"start_offset": 25,
"end_offset": 40
},
{
"id": 50195,
"label": "malware",
"start_offset": 0,
"end_offset": 11
}
] | [] | [] |
12,581 | This looked similar to an earlier in-the-wild iOS vulnerability analyzed by Ian Beer of Google Project Zero. | [] | [] | [] |
11,292 | We need to request that a download link be generated for the collected files with the “trendmicro-visionone-download-information-for-collected-forensic-file”. | [] | [] | [] |
13,494 | Some malicious actors, such as ransomware operators, earn directly from their cyberattacks. | [] | [] | [] |
5,386 | We have evidence that the routers of at least one vendor other than Asus and WatchGuard are connecting to Cyclops Blink C&Cs as well, but so far we have been unable to collect malware samples for this router brand. | [
{
"id": 51380,
"label": "malware",
"start_offset": 106,
"end_offset": 119
}
] | [] | [] |
3,889 | They should also exercise an incident response plan and Implement regular data backup procedures on both IT and OT networks. | [] | [] | [] |
7,302 | It collects the following information from the infected system by invoking the following commands: Command Description system_profiler SPHardwareDataType 2>/dev/null | awk '/Processor / {split($0,line,\":\"); printf(\"%s\",line[2]);}' Get processor information 15f20 = system_profiler SPHardwareDataType 2>/dev/null | awk '/Memory/ {split($0,line, \":\"); printf(\"%s\", line[2]);}' | [] | [] | [] |
14,275 | ... | [] | [] | [] |
3,040 | Many apps these days have auto-update capabilities. | [] | [] | [] |
12,391 | We terminated 4 YouTube channels as part of our actions against a coordinated influence operation. | [] | [] | [] |
4 | The first known campaign was launched by Crimeware on November 2014. | [
{
"id": 45806,
"label": "TIME",
"start_offset": 55,
"end_offset": 68
},
{
"id": 48942,
"label": "malware",
"start_offset": 42,
"end_offset": 51
}
] | [] | [] |
4,052 | By using existing frameworks, examples of which are detailed in the following, it builds new backdoor variants more efficiently. | [] | [] | [] |
13,297 | The TSSL project has 64-bit version. | [
{
"id": 41403,
"label": "identity",
"start_offset": 24,
"end_offset": 27
}
] | [] | [] |
10,074 | Trend Micro's Zero-Day Initiative (ZDI) provided technical analysis of recently patched vulnerabilities in the SolarWinds Orion Platform. | [] | [] | [] |
11,791 | APT35 has relied on this technique since 2017 — targeting high-value accounts in government, academia, journalism, NGOs, foreign policy, and national security. | [
{
"id": 36358,
"label": "threat-actor",
"start_offset": 0,
"end_offset": 5
},
{
"id": 36360,
"label": "location",
"start_offset": 93,
"end_offset": 101
},
{
"id": 36362,
"label": "location",
"start_offset": 137,
"end_offset": 140
},
{
"id": 36363,
"label": "location",
"start_offset": 141,
"end_offset": 149
},
{
"id": 36364,
"label": "location",
"start_offset": 150,
"end_offset": 158
}
] | [] | [] |
4,717 | In 2019, we confronted the risks posed by NSO Group again, relying upon NSO Groups’s marketing information suggesting that they had a 0-day exploit for Android. | [
{
"id": 50611,
"label": "TIME",
"start_offset": 3,
"end_offset": 7
},
{
"id": 50612,
"label": "threat-actor",
"start_offset": 42,
"end_offset": 51
},
{
"id": 50614,
"label": "SOFTWARE",
"start_offset": 152,
"end_offset": 159
},
{
"id": 50613,
"label": "threat-actor",
"start_offset": 72,
"end_offset": 82
},
{
"id": 50615,
"label": "attack-pattern",
"start_offset": 134,
"end_offset": 147
}
] | [] | [] |
5,525 | They involve a hacker deploying malicious code known as Magecart to an organization’s website. | [
{
"id": 51529,
"label": "malware",
"start_offset": 56,
"end_offset": 64
}
] | [] | [] |
863 | They’ve certainly caused a wealth of damage to end users with some of the more prominent malware families, such as CryptoLocker, CryptoWall, TorrentLocker, and TeslaCrypt infecting millions of users overall. | [
{
"id": 46398,
"label": "malware",
"start_offset": 160,
"end_offset": 170
},
{
"id": 46399,
"label": "malware",
"start_offset": 141,
"end_offset": 154
},
{
"id": 46400,
"label": "malware",
"start_offset": 129,
"end_offset": 139
},
{
"id": 46401,
"label": "malware",
"start_offset": 115,
"end_offset": 128
}
] | [] | [] |
997 | These accounts, which include an education (EDU) top-level domain email address with valid password, represent 42 of the world’s top universities, across 10 countries: | [] | [] | [] |
8,571 | One of the most notable characteristics of APT35 is their impersonation of conference officials to conduct phishing attacks. | [
{
"id": 26488,
"label": "location",
"start_offset": 11,
"end_offset": 15
},
{
"id": 26490,
"label": "attack-pattern",
"start_offset": 107,
"end_offset": 115
}
] | [] | [] |
6,470 | The command is connected to 187.236.212[.]184 and downloads a file called SharpChisel.exe (SHA256: 61f83466b512eb12fc82441259a5205f076254546a7726a2e3e983011898e4e2) and saves the file to the C:\programdata directory. | [
{
"id": 20109,
"label": "IPV4",
"start_offset": 28,
"end_offset": 45
},
{
"id": 20110,
"label": "location",
"start_offset": 46,
"end_offset": 49
},
{
"id": 20111,
"label": "SHA1",
"start_offset": 99,
"end_offset": 163
},
{
"id": 20112,
"label": "location",
"start_offset": 165,
"end_offset": 168
}
] | [] | [] |
5,936 | We did not capture the subsequent stages, but assess the attackers did not have exploits for the current version of Chrome (91.0.4472) at that time, but instead used n-day exploits targeting Samsung Browser, which was running an older and vulnerable version of Chromium. | [
{
"id": 18253,
"label": "location",
"start_offset": 144,
"end_offset": 148
},
{
"id": 18255,
"label": "location",
"start_offset": 236,
"end_offset": 239
},
{
"id": 18256,
"label": "threat-actor",
"start_offset": 262,
"end_offset": 270
}
] | [] | [] |
2,714 | Palo Alto Networks enterprise security platform is focused on providing an integrated approach to detecting and preventing advanced threats across each step in the attack kill-chain. | [
{
"id": 47954,
"label": "identity",
"start_offset": 0,
"end_offset": 18
}
] | [] | [] |
8,265 | The new emails used more common phishing tactics, such as alleged requests for payment confirmation. | [
{
"id": 25515,
"label": "attack-pattern",
"start_offset": 32,
"end_offset": 40
}
] | [] | [] |
7,793 | Suspicious activity using ServHelper A campaign targeting China spoofed FedEx-themed emails with subjects pertaining to delivery problems, failures, or notifications. | [
{
"id": 24138,
"label": "malware",
"start_offset": 26,
"end_offset": 36
},
{
"id": 24139,
"label": "location",
"start_offset": 39,
"end_offset": 47
}
] | [] | [] |
9,513 | This malware and PuppetLoader’s decrypted Loader.dlls share similar strings such as “[-] UnExist pwszModuleFunName:”. | [
{
"id": 29189,
"label": "location",
"start_offset": 13,
"end_offset": 16
},
{
"id": 29190,
"label": "malware",
"start_offset": 17,
"end_offset": 29
}
] | [] | [] |
42 | It shows the price that a criminal enterprise called IFRAME DOLLARS was charging to infect computers in various countries at that time. | [
{
"id": 44577,
"label": "threat-actor",
"start_offset": 53,
"end_offset": 67
}
] | [] | [] |
1,982 | Figure 5: WinDBG view of call stack when lsass.exe process crashes due to exploitation Vulnerable code is found in the CSsl3TlsClientContext::DigestServerHelloVerifyRequest function: Palo Alto Networks is releasing signature 37094 and 37059 to defend against these vulnerabilities. | [
{
"id": 47094,
"label": "SOFTWARE",
"start_offset": 11,
"end_offset": 17
},
{
"id": 47095,
"label": "identity",
"start_offset": 186,
"end_offset": 204
}
] | [] | [] |
4,840 | To help users and defenders, we will provide examples of the hack-for-hire ecosystem from India, Russia, and the United Arab Emirates and context around their capabilities and persistence mechanisms. | [
{
"id": 50794,
"label": "attack-pattern",
"start_offset": 61,
"end_offset": 74
},
{
"id": 50795,
"label": "location",
"start_offset": 90,
"end_offset": 95
},
{
"id": 50797,
"label": "location",
"start_offset": 113,
"end_offset": 133
},
{
"id": 50796,
"label": "location",
"start_offset": 97,
"end_offset": 103
}
] | [] | [] |
5,349 | If a command targets the core component, it can be one of the following: Command ID Action 0 Terminates the program 1 Bypasses the data-sending interval and sends data to C&C servers immediately 2 Adds a new C&C server to the list in memory 3 Sets time to send the next packet to the C&C server 4 Sets time to send the next packet to the C&C server 5 Adds a new module (an ELF file should be received following the command) | [] | [] | [] |
11,636 | While tracking the activities of the SideWinder group, which has become infamous for targeting the South Asia region and its surrounding countries, we identified a server used to deliver a malicious LNK file and host multiple credential phishing pages. | [
{
"id": 35704,
"label": "location",
"start_offset": 110,
"end_offset": 116
},
{
"id": 35705,
"label": "location",
"start_offset": 117,
"end_offset": 120
},
{
"id": 35706,
"label": "location",
"start_offset": 208,
"end_offset": 211
},
{
"id": 35707,
"label": "location",
"start_offset": 212,
"end_offset": 216
},
{
"id": 35708,
"label": "attack-pattern",
"start_offset": 237,
"end_offset": 245
}
] | [] | [] |
3,597 | The different samples organized name, payload delivered and the fully-undetectable stages where the attribute “KurdishCoderProduction” is present | [] | [] | [] |
249 | A cybersquatting domain save-russia[.]today is launching DoS attacks on Ukrainian news sites. | [
{
"id": 44656,
"label": "attack-pattern",
"start_offset": 2,
"end_offset": 16
},
{
"id": 44657,
"label": "DOMAIN",
"start_offset": 24,
"end_offset": 43
},
{
"id": 44658,
"label": "attack-pattern",
"start_offset": 57,
"end_offset": 68
},
{
"id": 44659,
"label": "identity",
"start_offset": 72,
"end_offset": 92
}
] | [
{
"id": 9,
"from_id": 44658,
"to_id": 44659,
"type": "targets"
},
{
"id": 114,
"from_id": 44656,
"to_id": 44657,
"type": "uses"
},
{
"id": 115,
"from_id": 44658,
"to_id": 44657,
"type": "uses"
}
] | [] |
2,375 | We initially observed StealthVector, a shellcode loader written in C/C++, in October 2020. | [
{
"id": 47437,
"label": "malware",
"start_offset": 22,
"end_offset": 35
},
{
"id": 47438,
"label": "TIME",
"start_offset": 77,
"end_offset": 89
}
] | [] | [] |
13,546 | This script is likely activated by exploiting a cross-site scripting (XSS) vulnerability in the said store’s administration portal. | [
{
"id": 51622,
"label": "SOFTWARE",
"start_offset": 101,
"end_offset": 130
},
{
"id": 51623,
"label": "malware",
"start_offset": 5,
"end_offset": 11
},
{
"id": 51621,
"label": "attack-pattern",
"start_offset": 48,
"end_offset": 74
}
] | [
{
"id": 1115,
"from_id": 51623,
"to_id": 51622,
"type": "targets"
},
{
"id": 1116,
"from_id": 51623,
"to_id": 51621,
"type": "uses"
}
] | [] |
1,505 | The backdoor when run will create threads for each connection listed in its config file. The sample that was caught by our systems contains 3 IP addresses in its config file. | [] | [] | [] |
14,111 | Based on our analysis, we believe the malware author did not fake the compile times of the binaries. | [] | [] | [] |
3,975 | Powerful artificial intelligence (AI) and expert security analytics correlate data from customer environments and Trend Micro’s global threat intelligence to deliver fewer, higher-fidelity alerts, leading to better, early detection. | [
{
"id": 49836,
"label": "identity",
"start_offset": 114,
"end_offset": 125
}
] | [] | [] |
10,875 | Date of submission SHA256 Identified C&C servers Additional Details August 2, 2019 374d92f553c28e9dad1aa7f5d334a07dede1e5ad19c3766efde74290d0c49afb upeg-system-app[.]com Likely repacked from Kingoroot. | [
{
"id": 33101,
"label": "location",
"start_offset": 0,
"end_offset": 4
},
{
"id": 33103,
"label": "SHA1",
"start_offset": 88,
"end_offset": 152
},
{
"id": 33104,
"label": "location",
"start_offset": 177,
"end_offset": 183
}
] | [] | [] |
4,684 | Process process = new Process(); process.StartInfo.Arguments = string.Format("PIPE Google \"{0}\"", text); process.StartInfo.FileName = Process.GetCurrentProcess().MainModule.FileName; process.Start(); | [] | [] | [] |
2,114 | On August 22, 2018, the Apache Foundation released a critical security update for CVE-2018-1176, a remote code execution vulnerability affecting Apache Struts versions 2.3 to 2.3.34 and 2.5 to 2.5.16. | [
{
"id": 47248,
"label": "TIME",
"start_offset": 3,
"end_offset": 18
},
{
"id": 47249,
"label": "vulnerability",
"start_offset": 82,
"end_offset": 95
},
{
"id": 47252,
"label": "SOFTWARE",
"start_offset": 145,
"end_offset": 199
},
{
"id": 47250,
"label": "vulnerability",
"start_offset": 99,
"end_offset": 134
}
] | [
{
"id": 311,
"from_id": 47252,
"to_id": 47249,
"type": "has"
},
{
"id": 312,
"from_id": 47252,
"to_id": 47250,
"type": "has"
}
] | [] |
3,640 | Carrying out a successful conversation hijacking spear phishing attack requires knowing someone that the ultimate target is communicating with, compromising that person’s account, identifying an ongoing email conversation with the ultimate target, crafting an email to appear part of that ongoing email conversation and finally sending it. | [
{
"id": 49421,
"label": "attack-pattern",
"start_offset": 49,
"end_offset": 63
}
] | [] | [] |
2,898 | s[_local28][(((_local41 - _local12) / 4) + 14)] | [] | [] | [] |
5,443 | There were 24.5 billion mobile banking transactions while there were 20.6 billion PC-based transactions. | [] | [] | [] |
1,727 | Here we explain this type of attack and what you should do. | [] | [] | [] |
15 | We found 147 new unique pieces of malware today alone, two of them fully undetectable by the legacy security solutions in VirusTotal and most of them barely detected by one vendor (few have 4/57 detection rate). | [
{
"id": 44574,
"label": "SOFTWARE",
"start_offset": 122,
"end_offset": 132
}
] | [] | [] |
1,783 | Leave a comment below let us know what you think. | [] | [] | [] |
726 | This post is also available in: 日本語 (Japanese) On Sept. 14, 2021, Microsoft’s Security Response Center (MSRC) released security patches detailing the findings of four critical vulnerabilities affecting the Microsoft Azure package Open Management Infrastructure (OMI). | [
{
"id": 46298,
"label": "TIME",
"start_offset": 56,
"end_offset": 70
},
{
"id": 44843,
"label": "identity",
"start_offset": 72,
"end_offset": 115
},
{
"id": 44844,
"label": "SOFTWARE",
"start_offset": 212,
"end_offset": 272
}
] | [] | [] |
1,026 | Navigating to CNRI’s webmail page, we were then able to successfully access and send an email from that account. | [
{
"id": 46517,
"label": "identity",
"start_offset": 14,
"end_offset": 18
}
] | [] | [] |
1,762 | If an attacker could modify it, then any script can be run, such as downloading and executing a PE file, without any notification or alert. | [] | [] | [] |
10,555 | The vast majority of these messages were sent to spam without any user ever seeing them, and we were able to preemptively block the domains using Safe Browsing. | [
{
"id": 32182,
"label": "tools",
"start_offset": 4,
"end_offset": 8
},
{
"id": 32183,
"label": "location",
"start_offset": 71,
"end_offset": 75
},
{
"id": 32184,
"label": "location",
"start_offset": 83,
"end_offset": 87
},
{
"id": 32185,
"label": "location",
"start_offset": 89,
"end_offset": 92
}
] | [] | [] |
8,760 | We received leads from the FBI that supported us in this investigation. | [] | [] | [] |
2,777 | These new drive-by attacks focus on hijacking the computational resources of the victim’s computer to “mine” cryptocurrency on behalf of the attackers. | [
{
"id": 48006,
"label": "attack-pattern",
"start_offset": 36,
"end_offset": 73
}
] | [] | [] |
2,601 | For example, in the “proof” of the Okta breach posted on the Lapsus$ Group’s Telegram channel, the actor states: “… our focus was ONLY on okta customers” (Figure 3) | [
{
"id": 45614,
"label": "identity",
"start_offset": 138,
"end_offset": 142
},
{
"id": 45611,
"label": "identity",
"start_offset": 35,
"end_offset": 39
},
{
"id": 45612,
"label": "threat-actor",
"start_offset": 61,
"end_offset": 68
},
{
"id": 45613,
"label": "SOFTWARE",
"start_offset": 77,
"end_offset": 85
}
] | [
{
"id": 360,
"from_id": 45612,
"to_id": 45611,
"type": "targets"
}
] | [] |
5,616 | Once launched, it contacts a command and control server hosted in China using an HTTP GET request to the following website to register the infection with the attacker: http://14.17.95.205:21910/my/service.php. | [
{
"id": 17280,
"label": "location",
"start_offset": 37,
"end_offset": 40
},
{
"id": 17282,
"label": "location",
"start_offset": 126,
"end_offset": 134
},
{
"id": 17283,
"label": "URL",
"start_offset": 168,
"end_offset": 208
}
] | [] | [] |
3,181 | Infection chain | [] | [] | [] |
3,307 | Figure 23. | [] | [] | [] |
11,676 | We found several interesting dynamic DNS domains resolving to a server that was used to deliver SideWinder’s malicious documents. | [] | [] | [] |
5,199 | Vulnerabilities in the standard specification | [] | [] | [] |
10,248 | Yet this is not always enough to hide these activities. | [] | [] | [] |
5,531 | Magecart attacks get around that. | [
{
"id": 51530,
"label": "malware",
"start_offset": 0,
"end_offset": 8
}
] | [] | [] |
13,408 | We recovered the exploit used to escape the Chrome Sandbox, but not the initial RCE exploit. | [] | [] | [] |
13,240 | UserInstall.exe will abuse the BITSadmin command-line tool to create a job and launch sidebar.exe. | [
{
"id": 41285,
"label": "location",
"start_offset": 16,
"end_offset": 20
},
{
"id": 41286,
"label": "malware",
"start_offset": 31,
"end_offset": 40
},
{
"id": 41287,
"label": "location",
"start_offset": 54,
"end_offset": 58
},
{
"id": 41288,
"label": "location",
"start_offset": 71,
"end_offset": 74
},
{
"id": 41289,
"label": "location",
"start_offset": 75,
"end_offset": 78
}
] | [] | [] |
7,238 | Their blog contains write-ups and analysis of vulnerabilities that have been publicly disclosed, including “guest” posts from unwitting legitimate security researchers, likely in an attempt to build additional credibility with other security researchers. | [
{
"id": 22622,
"label": "threat-actor",
"start_offset": 26,
"end_offset": 29
},
{
"id": 22623,
"label": "location",
"start_offset": 30,
"end_offset": 33
},
{
"id": 22624,
"label": "location",
"start_offset": 147,
"end_offset": 155
},
{
"id": 22625,
"label": "location",
"start_offset": 169,
"end_offset": 175
},
{
"id": 22626,
"label": "location",
"start_offset": 233,
"end_offset": 241
}
] | [] | [] |
13,765 | The API address table. | [] | [] | [] |
5,378 | The following data is obtained from an infected device: The Linux version, which the module gets by calling the uname() function and /etc/issue file Information about the device’s memory consumption, which it gets by calling the sysinfo() function The SSD storage information, which it gets by calling the statvfs() function The content of the following files: /etc/passwd /etc/group /proc/mounts /proc/partitions Information about the network interfaces, which it gets by calling the if_nameindex() and iotctl() functions with the SIOCGIFHWADDR and SIOCGIFADDR commands. | [
{
"id": 51372,
"label": "FILEPATH",
"start_offset": 136,
"end_offset": 146
},
{
"id": 51374,
"label": "FILEPATH",
"start_offset": 382,
"end_offset": 392
},
{
"id": 51375,
"label": "FILEPATH",
"start_offset": 395,
"end_offset": 407
},
{
"id": 51376,
"label": "FILEPATH",
"start_offset": 409,
"end_offset": 425
},
{
"id": 51373,
"label": "FILEPATH",
"start_offset": 370,
"end_offset": 381
}
] | [] | [] |
2,031 | The HelloXD author(s) did modify the infamous file marker and mutex however, opting for dxunmgqehhehyrhtxywuhwrvzxqrcblo as the file marker and With best wishes And good intentions… as the mutex (Figure 9). | [
{
"id": 47130,
"label": "malware",
"start_offset": 5,
"end_offset": 12
}
] | [] | [] |
3,242 | Figure 15. | [] | [] | [] |
12,908 | A general detection indicates that something was deemed suspicious, but it was not assigned to a specific tactic or technique. | [] | [] | [] |
10,570 | Upon reviewing phishing attempts since the beginning of this year, we’ve seen a rising number of attackers, including those from Iran and North Korea, impersonating news outlets or journalists. | [
{
"id": 32243,
"label": "attack-pattern",
"start_offset": 15,
"end_offset": 23
},
{
"id": 32246,
"label": "location",
"start_offset": 134,
"end_offset": 137
}
] | [] | [] |
518 | Figure 3 shows ransomware arrives via different application protocols. | [] | [] | [] |
7,232 | We encourage anyone who discovers a Chrome vulnerability to report that activity through the Chrome Vulnerabilities Rewards Program submission process. | [] | [] | [] |
3,285 | The script used to download OBS Studio, prepare the configuration, and start the process ScreenShot | [
{
"id": 48379,
"label": "SOFTWARE",
"start_offset": 28,
"end_offset": 38
}
] | [] | [] |
14,342 | It disguised itself as the adult game named after an adult film actress. | [] | [] | [] |
5,499 | Compared to Patchwork, whose Trojanized documents exploit at least five security flaws, Confucius’ backdoors are delivered through Office files exploiting memory corruption vulnerabilities CVE-2015-1641 and CVE-2017-11882. | [
{
"id": 51507,
"label": "attack-pattern",
"start_offset": 144,
"end_offset": 172
},
{
"id": 51504,
"label": "threat-actor",
"start_offset": 88,
"end_offset": 97
},
{
"id": 51503,
"label": "threat-actor",
"start_offset": 12,
"end_offset": 21
},
{
"id": 51505,
"label": "vulnerability",
"start_offset": 189,
"end_offset": 202
},
{
"id": 51506,
"label": "vulnerability",
"start_offset": 207,
"end_offset": 221
}
] | [
{
"id": 1100,
"from_id": 51504,
"to_id": 51507,
"type": "uses"
}
] | [] |
10,179 | The actors behind this campaign, which we attribute to a group of hackers recruited in a Russian-speaking forum, lure their target with fake collaboration opportunities (typically a demo for anti-virus software, VPN, music players, photo editing or online games), hijack their channel, then either sell it to the highest bidder or use it to broadcast cryptocurrency scams. | [
{
"id": 31070,
"label": "location",
"start_offset": 23,
"end_offset": 31
},
{
"id": 31072,
"label": "location",
"start_offset": 113,
"end_offset": 117
},
{
"id": 31073,
"label": "location",
"start_offset": 124,
"end_offset": 130
},
{
"id": 31074,
"label": "malware",
"start_offset": 232,
"end_offset": 237
}
] | [] | [] |
6,989 | We have observed that the Remote Desktop Protocol (RDP) certificate associated in this deployment, “WIN-P9NRMH5G6M8,” is a common string found in previously identified Earth Karkaddan C&C servers. | [
{
"id": 21886,
"label": "attack-pattern",
"start_offset": 26,
"end_offset": 49
},
{
"id": 21887,
"label": "malware",
"start_offset": 51,
"end_offset": 54
}
] | [] | [] |
1,272 | Figure 5. Error message generated by Adobe.exe | [
{
"id": 44960,
"label": "FILEPATH",
"start_offset": 38,
"end_offset": 47
}
] | [] | [] |
2,854 | Register for Ignite ’17 Security Conference Vancouver, BC June 12–15, 2017 | [
{
"id": 48060,
"label": "location",
"start_offset": 45,
"end_offset": 58
},
{
"id": 48061,
"label": "TIME",
"start_offset": 59,
"end_offset": 75
}
] | [] | [] |
3,886 | It also identifies how dependencies between an enterprise's IT and OT systems can give attackers a path. | [] | [] | [] |
9,997 | Scans the system’s Windows version and computer name m.exe Custom Mimikatz (including 32bit / 64bit file) | [
{
"id": 30517,
"label": "location",
"start_offset": 35,
"end_offset": 38
},
{
"id": 30518,
"label": "malware",
"start_offset": 66,
"end_offset": 74
}
] | [] | [] |
8,130 | All of this happens behind the overlay screen, unbeknownst to the user. | [] | [] | [] |
4,931 | This is the one of the groups we disrupted during the 2020 US election cycle for its targeting of campaign staffers. | [
{
"id": 50948,
"label": "TIME",
"start_offset": 54,
"end_offset": 58
}
] | [] | [] |
11,391 | We observed fewer than three dozen installs of this spyware. | [] | [] | [] |
4,945 | When they did, attackers sent them phishing links in follow-on correspondence. | [
{
"id": 50970,
"label": "attack-pattern",
"start_offset": 35,
"end_offset": 49
}
] | [] | [] |
14,291 | Figure 6. | [] | [] | [] |
196 | DDoS Attacks Impacting Ukrainian Government and Banking Institutions HermeticWiper Malware Website Defacement Rise in Phishing and Scam Attacks Increase in Cybersquatting Trends Fake Donation Websites DoS Attacks on Ukrainian News Sites Distribution of Apps How Palo Alto Networks Is Working to Keep You Safe How You Should Prepare for an Increase in Cyberthreats Such as Wipers, DDoS, Website Defacement and Other Related Attacks How Unit 42 Threat Intelligence and Security Consulting Can Help Additional Cybersecurity Resources Indicators of Compromise | [
{
"id": 45877,
"label": "attack-pattern",
"start_offset": 1,
"end_offset": 13
},
{
"id": 45879,
"label": "attack-pattern",
"start_offset": 84,
"end_offset": 109
},
{
"id": 45885,
"label": "attack-pattern",
"start_offset": 238,
"end_offset": 258
},
{
"id": 45889,
"label": "attack-pattern",
"start_offset": 387,
"end_offset": 405
},
{
"id": 45891,
"label": "identity",
"start_offset": 436,
"end_offset": 443
},
{
"id": 45876,
"label": "malware",
"start_offset": 70,
"end_offset": 83
},
{
"id": 45878,
"label": "identity",
"start_offset": 24,
"end_offset": 69
},
{
"id": 45880,
"label": "attack-pattern",
"start_offset": 119,
"end_offset": 144
},
{
"id": 45881,
"label": "attack-pattern",
"start_offset": 157,
"end_offset": 171
},
{
"id": 45882,
"label": "attack-pattern",
"start_offset": 179,
"end_offset": 201
},
{
"id": 45883,
"label": "attack-pattern",
"start_offset": 202,
"end_offset": 213
},
{
"id": 45884,
"label": "identity",
"start_offset": 217,
"end_offset": 237
},
{
"id": 45886,
"label": "identity",
"start_offset": 263,
"end_offset": 281
},
{
"id": 45887,
"label": "attack-pattern",
"start_offset": 373,
"end_offset": 379
},
{
"id": 45888,
"label": "attack-pattern",
"start_offset": 381,
"end_offset": 385
}
] | [
{
"id": 130,
"from_id": 45877,
"to_id": 45878,
"type": "targets"
}
] | [] |
965 | If the device has just booted, it will start the service MySd2e, which then registers a receiver for Rf2b as shown in Figure 3. | [] | [] | [] |
4,611 | Fig - Potential Chopper Webshell Detection | [
{
"id": 50511,
"label": "malware",
"start_offset": 21,
"end_offset": 37
}
] | [] | [] |
7,355 | The attackers could hide their activities if they noted the business hours of the intended targets and performed the actions coinciding with said times. | [
{
"id": 22875,
"label": "TIME",
"start_offset": 56,
"end_offset": 74
},
{
"id": 22876,
"label": "location",
"start_offset": 99,
"end_offset": 102
}
] | [] | [] |
7,587 | Figure 8. | [] | [] | [] |
3,942 | http://{ip address\]:7001/wls-wsat/CoordinatorPortType Oracle Console curl.dat -vv http://{ip address}:7001/console/j_security_check -d j_username={username}&j_password={password}&submit=Login" | [
{
"id": 49789,
"label": "FILEPATH",
"start_offset": 72,
"end_offset": 81
},
{
"id": 49787,
"label": "URL",
"start_offset": 0,
"end_offset": 54
},
{
"id": 49788,
"label": "URL",
"start_offset": 85,
"end_offset": 134
}
] | [] | [] |
1,293 | It then sends the 'exit' command to this executable, which will kill this particular process. | [] | [] | [] |
7,088 | Parse HTTP packets HTTP Parser https://github.com/nodejs/http-parser | [
{
"id": 22204,
"label": "URL",
"start_offset": 33,
"end_offset": 70
}
] | [] | [] |
6,238 | The impact of spear-phishing attacks can be minimized by following security best practices, which include refraining from opening emails sent by suspicious sources. | [
{
"id": 19245,
"label": "location",
"start_offset": 4,
"end_offset": 10
},
{
"id": 19246,
"label": "location",
"start_offset": 14,
"end_offset": 19
},
{
"id": 19247,
"label": "attack-pattern",
"start_offset": 20,
"end_offset": 28
},
{
"id": 19248,
"label": "location",
"start_offset": 37,
"end_offset": 40
},
{
"id": 19249,
"label": "location",
"start_offset": 67,
"end_offset": 75
},
{
"id": 19250,
"label": "location",
"start_offset": 76,
"end_offset": 80
}
] | [] | [] |
13,466 | Our team of analysts and security experts is focused on identifying and stopping issues like phishing campaigns, zero-day vulnerabilities and hacking against Google, our products and our users. | [
{
"id": 41953,
"label": "location",
"start_offset": 21,
"end_offset": 24
},
{
"id": 41954,
"label": "location",
"start_offset": 25,
"end_offset": 33
},
{
"id": 41955,
"label": "location",
"start_offset": 68,
"end_offset": 71
},
{
"id": 41956,
"label": "attack-pattern",
"start_offset": 93,
"end_offset": 101
},
{
"id": 41958,
"label": "location",
"start_offset": 138,
"end_offset": 141
},
{
"id": 41960,
"label": "location",
"start_offset": 179,
"end_offset": 182
}
] | [] | [] |
13,133 | That means customers have to ask prospective providers like Trend Micro a mountain of questions. | [
{
"id": 48906,
"label": "identity",
"start_offset": 60,
"end_offset": 71
}
] | [] | [] |
6,954 | Upon enabling the macro, it will then download the ObliqueRat malware that is hidden inside an image file. | [
{
"id": 21770,
"label": "location",
"start_offset": 28,
"end_offset": 32
},
{
"id": 21771,
"label": "tools",
"start_offset": 51,
"end_offset": 61
}
] | [] | [] |
6,217 | We found that the returned script is a backdoor that gets its instructions from the WebSocket server. | [] | [] | [] |
End of preview. Expand
in Dataset Viewer.
No dataset card yet
New: Create and edit this dataset card directly on the website!
Contribute a Dataset Card- Downloads last month
- 15