id
int64 1
14.4k
| text
stringlengths 3
5.01k
| entities
list | relations
list | Comments
list |
|---|---|---|---|---|
1,441
|
Figure 1 These digital certificates, self-signed or not, are the keys to updating apps in the Android ecosystem.
|
[
{
"id": 46770,
"label": "SOFTWARE",
"start_offset": 96,
"end_offset": 103
}
] |
[] |
[] |
8,592
|
Indicators from APT28 phishing campaign: service-reset-password-moderate-digital.rf[.]gd reset-service-identity-mail.42web[.]io digital-email-software.great-site[.]net Indicators from APT35 campaigns: Abused Google Properties: https://sites.google[.]com/view/ty85yt8tg8-download-rtih4ithr/ https://sites.google[.]com/view/user-id-568245/ https://sites.google[.]com/view/hhbejfdwdhwuhscbsb-xscvhdvbc/ Abused Dropbox Properties: https://www.dropbox[.]com/s/68y4vpfu8pc3imf/Iraq&Jewish.pdf
|
[
{
"id": 26561,
"label": "threat-actor",
"start_offset": 16,
"end_offset": 21
},
{
"id": 26562,
"label": "attack-pattern",
"start_offset": 22,
"end_offset": 30
},
{
"id": 26563,
"label": "location",
"start_offset": 31,
"end_offset": 39
},
{
"id": 26564,
"label": "threat-actor",
"start_offset": 185,
"end_offset": 190
},
{
"id": 26565,
"label": "URL",
"start_offset": 229,
"end_offset": 255
},
{
"id": 26566,
"label": "location",
"start_offset": 256,
"end_offset": 260
},
{
"id": 26567,
"label": "URL",
"start_offset": 292,
"end_offset": 318
},
{
"id": 26568,
"label": "location",
"start_offset": 319,
"end_offset": 323
},
{
"id": 26569,
"label": "URL",
"start_offset": 340,
"end_offset": 366
},
{
"id": 26570,
"label": "location",
"start_offset": 367,
"end_offset": 371
},
{
"id": 26571,
"label": "malware",
"start_offset": 410,
"end_offset": 417
},
{
"id": 26572,
"label": "URL",
"start_offset": 430,
"end_offset": 455
}
] |
[] |
[] |
14,235
|
Although we were unable to find a PlugX sample through that particular GitHub, we surmise some PlugX variants in the wild use this GitHub repository to get their C&C information.
|
[
{
"id": 48420,
"label": "SOFTWARE",
"start_offset": 71,
"end_offset": 77
},
{
"id": 44028,
"label": "malware",
"start_offset": 95,
"end_offset": 100
},
{
"id": 44025,
"label": "malware",
"start_offset": 34,
"end_offset": 39
}
] |
[] |
[] |
3,695
|
For defense evasion, both groups create or acquire tools for code signing the malware, or deobfuscate or decode files or information by using malware functions or utilities in the system.
|
[] |
[] |
[] |
4,612
|
The Potential Chopper Webshell Execution model triggers when the web shell is already present on the machine and is being used as a backdoor to run commands as SYSTEM on the Exchange Server using China Chopper. The metrics provided by this model should be investigated carefully, since the ProxyLogon zero-day vulnerability was exploited in-the-wild, before Microsoft addressed the issue publicly.
|
[
{
"id": 50512,
"label": "malware",
"start_offset": 18,
"end_offset": 34
},
{
"id": 50514,
"label": "malware",
"start_offset": 200,
"end_offset": 213
},
{
"id": 50515,
"label": "vulnerability",
"start_offset": 295,
"end_offset": 328
},
{
"id": 50513,
"label": "SOFTWARE",
"start_offset": 178,
"end_offset": 193
},
{
"id": 50516,
"label": "identity",
"start_offset": 363,
"end_offset": 372
}
] |
[] |
[] |
12,401
|
Like previous websites we’ve seen set up by this actor, this website has a link to their PGP public key at the bottom of the page.
|
[
{
"id": 38549,
"label": "location",
"start_offset": 93,
"end_offset": 99
},
{
"id": 38550,
"label": "malware",
"start_offset": 125,
"end_offset": 129
}
] |
[] |
[] |
575
|
Ryuk will even send out Wake-on-LAN packets to wake up systems that have been configured with this feature.
|
[
{
"id": 1923,
"label": "malware",
"start_offset": 0,
"end_offset": 4
}
] |
[] |
[] |
7,042
|
One argument.
|
[] |
[] |
[] |
13,169
|
This version also changes the malware location and its name to UF, an abbreviation for USBferry.
|
[
{
"id": 41102,
"label": "location",
"start_offset": 47,
"end_offset": 50
},
{
"id": 41103,
"label": "malware",
"start_offset": 87,
"end_offset": 95
}
] |
[] |
[] |
4,425
|
; bool flag = list.Count == 0; return !flag; }
|
[] |
[] |
[] |
10,243
|
Brute force attacks
|
[
{
"id": 31293,
"label": "attack-pattern",
"start_offset": 0,
"end_offset": 11
}
] |
[] |
[] |
3,863
|
Figure 13: Popup message when users open the document that abuses DDEAUTO Figure 14.
|
[] |
[] |
[] |
13,586
|
The web shell can execute any PHP code sent by an HTTP POST request to the web shell.
|
[
{
"id": 51673,
"label": "attack-pattern",
"start_offset": 4,
"end_offset": 14
}
] |
[] |
[] |
666
|
Macros Macros are the most straight-forward way for an attacker to weaponize Office documents.
|
[] |
[] |
[] |
6,236
|
Conclusion
|
[] |
[] |
[] |
321
|
Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!
|
[] |
[] |
[] |
10,114
|
Trend Micro Detection 019085a76ba7126fff22770d71bd901c325fc68ac55aa743327984e89f4b0134 2f1a5a7411d015d01aaee4535835400191645023 Backdoor.
|
[
{
"id": 30834,
"label": "location",
"start_offset": 6,
"end_offset": 11
},
{
"id": 30835,
"label": "SHA1",
"start_offset": 22,
"end_offset": 86
},
{
"id": 30836,
"label": "MD5",
"start_offset": 88,
"end_offset": 128
}
] |
[] |
[] |
5,305
|
For an unknown reason, the malware deletes the aforementioned rules and creates them again, this time using the iptables command via the system() function.
|
[] |
[] |
[] |
8,981
|
Interestingly, we found a sample from the Reptile rootkit framework in that same company, as well as network requests to a subdomain that belongs to Earth Berberoka’s infrastructure.
|
[
{
"id": 27753,
"label": "location",
"start_offset": 26,
"end_offset": 32
},
{
"id": 27754,
"label": "malware",
"start_offset": 42,
"end_offset": 49
},
{
"id": 27755,
"label": "attack-pattern",
"start_offset": 50,
"end_offset": 57
},
{
"id": 27756,
"label": "location",
"start_offset": 76,
"end_offset": 80
}
] |
[] |
[] |
9,142
|
Lurk’s intermediate targets by year 2014 to 2016:
|
[
{
"id": 28197,
"label": "malware",
"start_offset": 0,
"end_offset": 4
}
] |
[] |
[] |
9,535
|
A 2017 Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) report also discussed how Gh0st RAT variants wiped the MBR and replaced it with messages that varied across different samples.
|
[
{
"id": 29250,
"label": "location",
"start_offset": 7,
"end_offset": 17
},
{
"id": 29251,
"label": "malware",
"start_offset": 101,
"end_offset": 110
},
{
"id": 29252,
"label": "location",
"start_offset": 134,
"end_offset": 137
}
] |
[] |
[] |
10,054
|
Figure 7. Folder c
|
[] |
[] |
[] |
5,461
|
It’s quite odd (and probably underreported), however, to see it used as a vector for cyberespionage.
|
[] |
[] |
[] |
862
|
In recent years, ransomware families are often glamorized as being some of the most dangerous types of malware.
|
[] |
[] |
[] |
5,030
|
Recently observed COLDRIVER credential phishing domains: Ghostwriter, a Belarusian threat actor, has remained active during the course of the war and recently resumed targeting of Gmail accounts via credential phishing.
|
[
{
"id": 51098,
"label": "threat-actor",
"start_offset": 18,
"end_offset": 27
},
{
"id": 51100,
"label": "location",
"start_offset": 72,
"end_offset": 82
},
{
"id": 51101,
"label": "SOFTWARE",
"start_offset": 180,
"end_offset": 185
},
{
"id": 51102,
"label": "attack-pattern",
"start_offset": 199,
"end_offset": 218
},
{
"id": 51099,
"label": "threat-actor",
"start_offset": 57,
"end_offset": 68
}
] |
[
{
"id": 1043,
"from_id": 51099,
"to_id": 51100,
"type": "located-at"
},
{
"id": 1044,
"from_id": 51099,
"to_id": 51101,
"type": "uses"
},
{
"id": 1045,
"from_id": 51099,
"to_id": 51102,
"type": "uses"
}
] |
[] |
8,805
|
This targeting is consistent with what others have subsequently reported.
|
[] |
[] |
[] |
8,853
|
It should be noted that we have also observed an increase use of BLOB files since 2020.
|
[] |
[] |
[] |
2,786
|
This new kind of attack tells us that at least some cybercriminals are starting to view theft of victim’s computing power to translate into cryptocurrencies as a better business proposition than the traditional practice of loading malware on the victim’s system through drive-by downloads.
|
[] |
[] |
[] |
2,808
|
As with all ransomware attacks, Palo Alto Networks and Unit 42 recommends that anyone affected NOT pay the ransom.
|
[
{
"id": 45703,
"label": "identity",
"start_offset": 32,
"end_offset": 50
},
{
"id": 45704,
"label": "identity",
"start_offset": 55,
"end_offset": 62
}
] |
[] |
[] |
3,743
|
2022-05-18:
|
[
{
"id": 49565,
"label": "TIME",
"start_offset": 0,
"end_offset": 10
}
] |
[] |
[] |
14,303
|
Content of README.txt register.bat is used to gain administrator privilege.
|
[
{
"id": 48516,
"label": "FILEPATH",
"start_offset": 11,
"end_offset": 21
},
{
"id": 48518,
"label": "FILEPATH",
"start_offset": 22,
"end_offset": 34
},
{
"id": 48519,
"label": "attack-pattern",
"start_offset": 51,
"end_offset": 74
}
] |
[
{
"id": 441,
"from_id": 48518,
"to_id": 48519,
"type": "uses"
}
] |
[] |
8,495
|
Our research teams and threat hunters will work vigilantly to monitor and identify any new threat intelligence and will continue to share updates here: trendmicro.com/ukrainecrisis.
|
[
{
"id": 26196,
"label": "location",
"start_offset": 22,
"end_offset": 25
},
{
"id": 26197,
"label": "location",
"start_offset": 33,
"end_offset": 40
},
{
"id": 26198,
"label": "location",
"start_offset": 41,
"end_offset": 45
},
{
"id": 26199,
"label": "location",
"start_offset": 65,
"end_offset": 72
},
{
"id": 26200,
"label": "location",
"start_offset": 73,
"end_offset": 76
},
{
"id": 26201,
"label": "location",
"start_offset": 114,
"end_offset": 117
},
{
"id": 26202,
"label": "location",
"start_offset": 118,
"end_offset": 122
},
{
"id": 26203,
"label": "URL",
"start_offset": 155,
"end_offset": 183
}
] |
[] |
[] |
5,285
|
Hence, we believe that it is possible that the Cyclops Blink botnet’s main purpose is to build an infrastructure for further attacks on high-value targets.
|
[
{
"id": 51333,
"label": "malware",
"start_offset": 47,
"end_offset": 60
}
] |
[] |
[] |
9,108
|
Lurk also targeted programmatic advertising infrastructures to increase the scale of their operations.
|
[
{
"id": 28116,
"label": "threat-actor",
"start_offset": 0,
"end_offset": 4
}
] |
[] |
[] |
4,883
|
Since late 2019, our team has disrupted financially motivated phishing campaigns targeting YouTubers with Cookie Theft malware.
|
[
{
"id": 50892,
"label": "TIME",
"start_offset": 11,
"end_offset": 15
},
{
"id": 50893,
"label": "attack-pattern",
"start_offset": 62,
"end_offset": 70
}
] |
[] |
[] |
4,782
|
To protect high risk user accounts, we offer the Advanced Protection Program (APP), which is our highest form of account security.
|
[] |
[] |
[] |
706
|
Yes, I said family.
|
[] |
[] |
[] |
87
|
Compromising a user’s browser or a regular home PC will net the criminal an average system for mining coins, but higher-end systems will generate more income.
|
[
{
"id": 45830,
"label": "attack-pattern",
"start_offset": 0,
"end_offset": 29
}
] |
[] |
[] |
7,566
|
This said macro executes a command to download the first stage payload using msiexec.exe, a Microsoft Installer tool that can download and run a Windows Installer file.
|
[
{
"id": 23605,
"label": "identity",
"start_offset": 92,
"end_offset": 101
},
{
"id": 23606,
"label": "location",
"start_offset": 112,
"end_offset": 116
},
{
"id": 23607,
"label": "location",
"start_offset": 122,
"end_offset": 125
},
{
"id": 23608,
"label": "location",
"start_offset": 135,
"end_offset": 138
}
] |
[] |
[] |
8,596
|
Understanding the techniques used by attackers helps us counter these threats effectively.
|
[] |
[] |
[] |
14,272
|
This is presumably used for the device’s ID registration: Figure 4.
|
[] |
[] |
[] |
3,063
|
The developer even directly named these “infected packages” as “fake.virus” in the source code.
|
[
{
"id": 48138,
"label": "FILEPATH",
"start_offset": 64,
"end_offset": 74
}
] |
[] |
[] |
5,882
|
When you think as nation state, what should a nation state be looking at for the future?
|
[] |
[] |
[] |
1,722
|
Palo Alto Networks App-ID technology can identify I2P traffic as well 51 other tunneling applications.
|
[
{
"id": 45115,
"label": "SOFTWARE",
"start_offset": 50,
"end_offset": 53
},
{
"id": 5127,
"label": "identity",
"start_offset": 0,
"end_offset": 18
}
] |
[] |
[] |
8,319
|
In later versions it was obfuscated with Base64.
|
[] |
[] |
[] |
1,822
|
Figure 13. Copying tools and other malicious components to the compromised machine using AnyDesk
|
[
{
"id": 5369,
"label": "tools",
"start_offset": 95,
"end_offset": 102
}
] |
[] |
[] |
533
|
A script file is also used to download or install ransomware.
|
[] |
[] |
[] |
1,463
|
We further investigated the following cases:
|
[] |
[] |
[] |
12,602
|
There have been no indications that this attack has hit any other organization outside of those targeted; we do not believe that this family is currently in widespread use.
|
[
{
"id": 39180,
"label": "identity",
"start_offset": 52,
"end_offset": 55
}
] |
[] |
[] |
3,048
|
According to the Google Play store statistics, users have downloaded “AntiVirus for Android™” more than one million times and the app was listed in Top 100 free apps in Tools category.
|
[
{
"id": 45757,
"label": "SOFTWARE",
"start_offset": 17,
"end_offset": 29
},
{
"id": 45758,
"label": "malware",
"start_offset": 70,
"end_offset": 92
}
] |
[] |
[] |
14,313
|
File lists of the directories are also stolen.
|
[] |
[] |
[] |
13,054
|
Moyer is accused of offering 200 iPads to the Santa County Sheriff's office in exchange for concealed carry permits for four Apple employees.
|
[] |
[] |
[] |
13,668
|
Figure 4.
|
[] |
[] |
[] |
9,237
|
Whatever the source, former CISA boss Chris Krebs warns that SMBs, education sector organizations, and state and local governments may be disproportionately affected as these often have fewer resources to spend on security.
|
[
{
"id": 28528,
"label": "attack-pattern",
"start_offset": 13,
"end_offset": 19
},
{
"id": 28530,
"label": "location",
"start_offset": 33,
"end_offset": 37
},
{
"id": 28532,
"label": "location",
"start_offset": 99,
"end_offset": 102
},
{
"id": 28533,
"label": "location",
"start_offset": 109,
"end_offset": 112
},
{
"id": 28534,
"label": "location",
"start_offset": 131,
"end_offset": 134
},
{
"id": 28535,
"label": "location",
"start_offset": 214,
"end_offset": 222
}
] |
[] |
[] |
4,939
|
In May 2020, we discovered that APT35 attempted to upload spyware to the Google Play Store.
|
[
{
"id": 50958,
"label": "TIME",
"start_offset": 3,
"end_offset": 11
},
{
"id": 50959,
"label": "threat-actor",
"start_offset": 32,
"end_offset": 37
},
{
"id": 50960,
"label": "SOFTWARE",
"start_offset": 73,
"end_offset": 90
}
] |
[] |
[] |
5,575
|
Figure 2. Revix encrypting a QNAP NAS device Figure 3.
|
[] |
[] |
[] |
5,265
|
Will mobile become cyberespionage’s main frontier?
|
[] |
[] |
[] |
13,325
|
Justice officials say that the group's intrusions allowed the hackers to steal source code, customer account data, and personally identifiable information (PII).
|
[
{
"id": 41484,
"label": "attack-pattern",
"start_offset": 80,
"end_offset": 86
},
{
"id": 41485,
"label": "location",
"start_offset": 116,
"end_offset": 119
}
] |
[] |
[] |
4,829
|
These phishing domains have been blocked through Google Safe Browsing – a service that identifies unsafe websites across the web and notifies users and website owners of potential harm.
|
[
{
"id": 50782,
"label": "SOFTWARE",
"start_offset": 49,
"end_offset": 69
},
{
"id": 50781,
"label": "attack-pattern",
"start_offset": 6,
"end_offset": 14
}
] |
[] |
[] |
2,291
|
The first 12 bytes of the OP_RETURN contains the IV, the last 16 bytes the GCM tag, while the middle section is the AES-256 GCM encrypted domain
|
[] |
[] |
[] |
3,252
|
This includes the backdoor version (we observed V2 and V3), access keys, endpoint address, the bucket name for Alibaba Cloud OSS, and a URL for downloading the utility sc.exe that is used for taking screenshots.
|
[
{
"id": 48369,
"label": "FILEPATH",
"start_offset": 168,
"end_offset": 174
},
{
"id": 48368,
"label": "Infrastucture",
"start_offset": 111,
"end_offset": 128
}
] |
[] |
[] |
3,709
|
FIN7 gathers information on network shares.
|
[
{
"id": 49504,
"label": "threat-actor",
"start_offset": 0,
"end_offset": 4
}
] |
[] |
[] |
5,906
|
On episode four of #TrendTalksBizSec.
|
[] |
[] |
[] |
11,243
|
jsonInfo.Data = this.OperationObject.GetUsername(); pipeCommunication.Write(jsonInfo); break; } }
|
[] |
[] |
[] |
701
|
Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address! Please mark, I'm not a robot!
|
[] |
[] |
[] |
762
|
Instead, the block to be freed is marked and filled with 0x00 data and added to a pool.
|
[] |
[] |
[] |
6,271
|
When Faghani first published his analysis this component of the malware was forcing the user’s Facebook account to “like” specific posts on a community page titled Sabır.
|
[
{
"id": 19433,
"label": "location",
"start_offset": 143,
"end_offset": 152
},
{
"id": 19434,
"label": "malware",
"start_offset": 153,
"end_offset": 157
}
] |
[] |
[] |
7,632
|
But it also contains Kronos, a known banking trojan; and SmokeLoader, which is another payload downloader.
|
[
{
"id": 23751,
"label": "malware",
"start_offset": 21,
"end_offset": 27
},
{
"id": 23752,
"label": "location",
"start_offset": 53,
"end_offset": 56
},
{
"id": 23753,
"label": "malware",
"start_offset": 57,
"end_offset": 68
}
] |
[] |
[] |
12,685
|
The Glupteba malware family is primarily distributed through pay per install (PPI) networks and via traffic purchased from traffic distribution systems (TDS).
|
[
{
"id": 39366,
"label": "malware",
"start_offset": 4,
"end_offset": 12
},
{
"id": 39367,
"label": "location",
"start_offset": 92,
"end_offset": 95
}
] |
[] |
[] |
4,942
|
Although Play Store users were protected, we are highlighting the app here as TAG has seen APT35 attempt to distribute this spyware on other platforms as recently as July 2021.
|
[
{
"id": 50964,
"label": "identity",
"start_offset": 78,
"end_offset": 81
},
{
"id": 50965,
"label": "threat-actor",
"start_offset": 91,
"end_offset": 96
},
{
"id": 50966,
"label": "TIME",
"start_offset": 166,
"end_offset": 175
},
{
"id": 50963,
"label": "SOFTWARE",
"start_offset": 9,
"end_offset": 19
}
] |
[] |
[] |
2,547
|
* These analytic detectors will trigger automatically for Cortex XDR Pro customers.
|
[
{
"id": 45591,
"label": "SOFTWARE",
"start_offset": 59,
"end_offset": 73
}
] |
[] |
[] |
11,437
|
On Gmail, we recommend certain Gmail security precautions to prevent spoofing, phishing, and spam.
|
[
{
"id": 34945,
"label": "location",
"start_offset": 37,
"end_offset": 45
},
{
"id": 34946,
"label": "attack-pattern",
"start_offset": 79,
"end_offset": 87
},
{
"id": 34947,
"label": "location",
"start_offset": 89,
"end_offset": 92
}
] |
[] |
[] |
4,795
|
In the modern world, we must be able to trust the devices we use every day and ensure that foreign adversaries do not have access to sophisticated exploits.
|
[] |
[] |
[] |
5,278
|
With additional insights from Philippe Z Lin Note: This article has been updated on March 17, 2022, 2:00 a.m. ET to include Asus’ security bulletin.
|
[
{
"id": 51321,
"label": "identity",
"start_offset": 124,
"end_offset": 128
},
{
"id": 51320,
"label": "TIME",
"start_offset": 84,
"end_offset": 112
},
{
"id": 51319,
"label": "identity",
"start_offset": 30,
"end_offset": 44
}
] |
[] |
[] |
3,598
|
Cassandra Crypter
|
[
{
"id": 49378,
"label": "tools",
"start_offset": 0,
"end_offset": 17
}
] |
[] |
[] |
8,531
|
Because Google actively detects and disrupts phishing links sent via Gmail, the actors were observed driving targets to messaging apps like WhatsApp, Telegram or Discord.
|
[
{
"id": 26348,
"label": "location",
"start_offset": 32,
"end_offset": 35
},
{
"id": 26349,
"label": "attack-pattern",
"start_offset": 45,
"end_offset": 53
}
] |
[] |
[] |
1,748
|
Got a topic you want us to write about for you, your friends, or your family?
|
[] |
[] |
[] |
13,929
|
MITRE ATT&CK tactics and techniques
|
[] |
[] |
[] |
3,353
|
The malware abuses publicly available tools and cloud services for its malicious behavior.
|
[] |
[] |
[] |
398
|
Xpanse is even able to classify those servers which have not been upgraded to the most recent version.
|
[
{
"id": 46098,
"label": "SOFTWARE",
"start_offset": 0,
"end_offset": 6
}
] |
[] |
[] |
12,025
|
Because Google actively detects and disrupts phishing links sent via Gmail, the actors were observed driving targets to messaging apps like WhatsApp, Telegram or Discord.
|
[
{
"id": 37200,
"label": "location",
"start_offset": 32,
"end_offset": 35
},
{
"id": 37201,
"label": "attack-pattern",
"start_offset": 45,
"end_offset": 53
}
] |
[] |
[] |
1,570
|
While not spreading as widely as the Petya/NotPetya attacks, reports indicate that where Bad Rabbit has hit, it has caused severe disruption.
|
[
{
"id": 4690,
"label": "malware",
"start_offset": 37,
"end_offset": 42
},
{
"id": 4691,
"label": "malware",
"start_offset": 43,
"end_offset": 51
},
{
"id": 4692,
"label": "malware",
"start_offset": 89,
"end_offset": 99
}
] |
[] |
[] |
4,555
|
The app is distributed under the guise of performing Denial of Service (DoS) attacks against a set of Russian websites.
|
[
{
"id": 50365,
"label": "attack-pattern",
"start_offset": 53,
"end_offset": 76
}
] |
[] |
[] |
4,208
|
Fake Android porn app and Windows chat applications as lures
|
[] |
[] |
[] |
13,030
|
In mid-March, a security researcher released a blog post detailing a 'Browser in the Browser' phishing technique.
|
[
{
"id": 48871,
"label": "attack-pattern",
"start_offset": 69,
"end_offset": 102
},
{
"id": 48872,
"label": "TIME",
"start_offset": 3,
"end_offset": 12
}
] |
[] |
[] |
2,309
|
The landing page contained a simple HTML page loading two scripts—one for Capstone.js and another for the exploit chain.
|
[
{
"id": 47396,
"label": "SOFTWARE",
"start_offset": 74,
"end_offset": 85
}
] |
[] |
[] |
2,477
|
The only malicious activity we have seen in our telemetry related to SpringShell involves HTTP requests to URLs containing the tomcatwar.jsp filename associated with the SpringShell proof-of-concept script.
|
[
{
"id": 47550,
"label": "vulnerability",
"start_offset": 70,
"end_offset": 81
},
{
"id": 47551,
"label": "FILEPATH",
"start_offset": 128,
"end_offset": 141
},
{
"id": 47552,
"label": "vulnerability",
"start_offset": 171,
"end_offset": 182
}
] |
[] |
[] |
2,084
|
On the same taskbar, we also noticed the Telegram icon, which is a very popular messaging app for chatting – but is also used by threat actors such as LAPSUS$ to post news into specific channels.
|
[
{
"id": 6199,
"label": "threat-actor",
"start_offset": 151,
"end_offset": 158
},
{
"id": 47212,
"label": "SOFTWARE",
"start_offset": 41,
"end_offset": 49
}
] |
[] |
[] |
3,117
|
The actions to take in response to this event are clear and simple: As always, we will continue to watch this event closely and provide any updates that we can.
|
[] |
[] |
[] |
9,983
|
Figure 5. Compilation timestamp on 9002 RAT sample (top), timestamp of the malicious configuration (center), and snapshot of the program’s update log (bottom)
|
[
{
"id": 30484,
"label": "malware",
"start_offset": 38,
"end_offset": 46
},
{
"id": 30485,
"label": "location",
"start_offset": 47,
"end_offset": 53
},
{
"id": 30486,
"label": "location",
"start_offset": 103,
"end_offset": 109
},
{
"id": 30487,
"label": "location",
"start_offset": 112,
"end_offset": 115
}
] |
[] |
[] |
7,107
|
The “dlpumgr32.exe” and “servTest” lines are related to the new version of SysUpdate which we described earlier.
|
[
{
"id": 22256,
"label": "location",
"start_offset": 20,
"end_offset": 23
},
{
"id": 22257,
"label": "location",
"start_offset": 41,
"end_offset": 44
},
{
"id": 22258,
"label": "malware",
"start_offset": 75,
"end_offset": 84
}
] |
[] |
[] |
4,289
|
Some specific security measures organizations can implement: Recognize social engineering attempts.
|
[] |
[] |
[] |
5,167
|
Tags Cloud | APT & Targeted Attacks | Cyber Crime | Expert Perspective | Network | Articles, News, Reports
|
[] |
[] |
[] |
5,529
|
By using this method, the hackers get access to the full card details, which have a higher resale value on the cybercrime black market.
|
[] |
[] |
[] |
6,370
|
The IP 174.129.157[.]251 is hosted on Amazon AWS, and Palo Alto Networks Cortex Xpanse history shows the IP had TCP port 443 open from April 29, 2022, until May 23, 2022, with a self-signed SSL certificate impersonating Microsoft Security:
|
[
{
"id": 19752,
"label": "IPV4",
"start_offset": 7,
"end_offset": 24
},
{
"id": 19753,
"label": "location",
"start_offset": 50,
"end_offset": 53
},
{
"id": 19756,
"label": "location",
"start_offset": 190,
"end_offset": 193
},
{
"id": 19757,
"label": "identity",
"start_offset": 220,
"end_offset": 229
},
{
"id": 19758,
"label": "location",
"start_offset": 230,
"end_offset": 238
}
] |
[] |
[] |
13,252
|
PDB strings inside the MSI file
|
[] |
[] |
[] |
2,579
|
By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.
|
[] |
[] |
[] |
14,197
|
The security community, including government agencies, should quicken their pace in sharing actionable intelligence, in order to improve public and private organizations’ threat hunting and detection efforts.
|
[] |
[] |
[] |
7,321
|
Figure 20.
|
[] |
[] |
[] |
9,995
|
Dump password from SQL database printdat.dll RAT (PlugX variant)
|
[
{
"id": 30511,
"label": "malware",
"start_offset": 50,
"end_offset": 55
}
] |
[] |
[] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.