id
int64
1
14.4k
text
stringlengths
3
5.01k
entities
list
relations
list
Comments
list
4,965
Android App: https://www.virustotal.com/gui/file/5d3ff202f20af915863eee45916412a271bae1ea3a0e20988309c16723ce4da5/detection Android App C2: communication-shield[.]site cdsa[.]xyz
[ { "id": 51009, "label": "DOMAIN", "start_offset": 141, "end_offset": 168 }, { "id": 51010, "label": "DOMAIN", "start_offset": 169, "end_offset": 179 }, { "id": 15245, "label": "URL", "start_offset": 13, "end_offset": 123 } ]
[]
[]
419
In a worst case, the slow-down can be so severe that it can make a website basically unusable.
[]
[]
[]
1,029
In fact, anyone can do the same by visiting the California Colleges Create an Account page.
[ { "id": 44918, "label": "identity", "start_offset": 48, "end_offset": 67 } ]
[]
[]
4,468
Short of not using a device, there is no way to prevent exploitation by a zero-click exploit; it's a weapon against which there is no defense.
[ { "id": 50258, "label": "attack-pattern", "start_offset": 74, "end_offset": 92 } ]
[]
[]
3,406
932B45AB117960390324678B0696EF0E07D7F8DE1FA0B94C529F243610F1DCC9
[ { "id": 10272, "label": "SHA2", "start_offset": 1, "end_offset": 65 } ]
[]
[]
11,096
In June, we announced that we saw phishing attempts against the personal email accounts of staffers on the Biden and Trump campaigns by Chinese and Iranian APTs (Advanced Persistent Threats) respectively.
[ { "id": 33879, "label": "attack-pattern", "start_offset": 34, "end_offset": 42 }, { "id": 33881, "label": "location", "start_offset": 113, "end_offset": 116 }, { "id": 33884, "label": "location", "start_offset": 144, "end_offset": 147 } ]
[]
[]
3,688
Privilege Escalation
[ { "id": 11194, "label": "attack-pattern", "start_offset": 0, "end_offset": 20 } ]
[]
[]
10,505
Generally, 2020 has been dominated by COVID-19.
[]
[]
[]
4,442
C2s 136.243.108.14 173.209.51.54 HYPERSCRAPE binaries
[ { "id": 50214, "label": "malware", "start_offset": 33, "end_offset": 44 }, { "id": 13275, "label": "IPV4", "start_offset": 4, "end_offset": 18 }, { "id": 13276, "label": "IPV4", "start_offset": 19, "end_offset": 32 } ]
[]
[]
5,330
The child process will connect to the C&C server and write four bytes to the SSL socket.
[]
[]
[]
4,989
We recovered the exploit used to escape the Chrome Sandbox, but not the initial RCE exploit.
[ { "id": 51049, "label": "SOFTWARE", "start_offset": 44, "end_offset": 58 }, { "id": 51050, "label": "attack-pattern", "start_offset": 80, "end_offset": 91 } ]
[]
[]
2,366
That campaign is not connected to the one described in today’s post.
[]
[]
[]
5,114
You see a bunch of text go across the screen and they penetrate through the first firewall, through the second firewall in into the data.
[]
[]
[]
12,731
An AWS instance, by default, does not have any identity access management (IAM) permissions attached; rather, these permissions must be defined by the AWS administrator.
[]
[]
[]
8,290
His motives remain unclear since the documents themselves did not contain any particularly unusual information.
[]
[]
[]
13,641
The recent campaigns target senior positions in the United States and Canada.
[ { "id": 51729, "label": "identity", "start_offset": 28, "end_offset": 44 }, { "id": 51731, "label": "location", "start_offset": 70, "end_offset": 76 }, { "id": 51728, "label": "campaign", "start_offset": 4, "end_offset": 20 }, { "id": 51730, "label": "location", "start_offset": 52, "end_offset": 65 } ]
[ { "id": 1145, "from_id": 51728, "to_id": 51729, "type": "targets" }, { "id": 1146, "from_id": 51729, "to_id": 51730, "type": "located-at" }, { "id": 1147, "from_id": 51729, "to_id": 51731, "type": "located-at" } ]
[]
9,745
The blurred document contains logos of different Turkish government entities Figure 2.
[]
[]
[]
615
What is most interesting about Hancitor is the way these decisions so clearly reflect an awareness of business realities (by targeting peak working times) and dividing up the “work” of their attacks in a way that so clearly mirrors mainstream business decisions around globalizing operations.
[ { "id": 45796, "label": "malware", "start_offset": 31, "end_offset": 39 } ]
[]
[]
296
Beyond Alert AA22-011A, CISA’s overarching guidance for attack surface reduction includes hardening of forward-facing network services, with prioritized patching of KEVs, as documented in Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities (KEV).
[ { "id": 45994, "label": "identity", "start_offset": 24, "end_offset": 28 } ]
[]
[]
11,680
These pages were copied from the webmail servers of various targets and then modified for spear-phishing attacks designed to steal login credentials.
[ { "id": 35819, "label": "location", "start_offset": 68, "end_offset": 71 }, { "id": 35820, "label": "location", "start_offset": 90, "end_offset": 95 }, { "id": 35821, "label": "attack-pattern", "start_offset": 96, "end_offset": 104 } ]
[]
[]
13,632
The code used to obtain user QQ numbers Protecting e-commerce platforms from Water Pamola’s attacks Water Pamola attacked online merchants with an XSS script appended onto online shopping orders.
[ { "id": 51716, "label": "campaign", "start_offset": 81, "end_offset": 93 }, { "id": 51717, "label": "campaign", "start_offset": 104, "end_offset": 116 }, { "id": 51718, "label": "identity", "start_offset": 126, "end_offset": 142 }, { "id": 51719, "label": "attack-pattern", "start_offset": 151, "end_offset": 154 } ]
[ { "id": 1141, "from_id": 51717, "to_id": 51719, "type": "uses" }, { "id": 1140, "from_id": 51717, "to_id": 51718, "type": "targets" } ]
[]
7,750
Figure 16.
[]
[]
[]
4,574
In addition to including phishing links directly in the email, the attackers also link to PDFs and/or DOCs, hosted on Google Drive and Microsoft One Drive, that contain a link to an attacker-controlled phishing domain.
[ { "id": 50420, "label": "SOFTWARE", "start_offset": 118, "end_offset": 130 }, { "id": 50419, "label": "attack-pattern", "start_offset": 25, "end_offset": 39 }, { "id": 50421, "label": "SOFTWARE", "start_offset": 135, "end_offset": 154 } ]
[]
[]
13,957
Unfortunately, some organizations may be putting cybersecurity on the back burner.
[]
[]
[]
6,704
To help protect users against these kinds of tracks, our Advanced Protection Program (APP) utilizes hardware security keys and provides the strongest protections available against phishing and account hijackings.
[ { "id": 20847, "label": "location", "start_offset": 66, "end_offset": 76 }, { "id": 20848, "label": "location", "start_offset": 109, "end_offset": 117 }, { "id": 20849, "label": "location", "start_offset": 123, "end_offset": 126 }, { "id": 20850, "label": "attack-pattern", "start_offset": 180, "end_offset": 188 }, { "id": 20851, "label": "location", "start_offset": 189, "end_offset": 192 } ]
[]
[]
4,081
Customized Lilith RAT
[ { "id": 12317, "label": "malware", "start_offset": 12, "end_offset": 22 } ]
[]
[]
3,974
Trend Micro Solutions Trend Micro’s comprehensive XDR solution applies the most effective expert analytics to the deep data sets collected from Trend Micro solutions across the enterprise — including email, endpoints, servers, cloud workloads, and networks — making faster connections to identify and stop attacks.
[ { "id": 49834, "label": "identity", "start_offset": 25, "end_offset": 36 }, { "id": 49835, "label": "identity", "start_offset": 147, "end_offset": 158 }, { "id": 49833, "label": "SOFTWARE", "start_offset": 3, "end_offset": 24 } ]
[]
[]
9,350
Scheduled jobs Source Command alive_latest_files_watcher Starts latest_files_watcher job and keeps it alive enviorment_schedulers
[ { "id": 28840, "label": "attack-pattern", "start_offset": 16, "end_offset": 22 }, { "id": 28841, "label": "location", "start_offset": 86, "end_offset": 89 }, { "id": 28842, "label": "location", "start_offset": 90, "end_offset": 93 } ]
[]
[]
7,357
Anomalous properties of a command detected from traffic
[]
[]
[]
12,001
We terminated 3 YouTube channels as part of our ongoing investigation into coordinated influence operations linked to Iran.
[]
[]
[]
10,076
These vulnerabilities, when combined, could allow an unauthenticated attacker to execute arbitrary code as Administrator on an affected system.
[]
[]
[]
14,271
When the downloaded APK file is installed and launched, it will send the infected device’s Unix timestamp to 0046769438867, a phone number containing Sweden’s code.
[]
[]
[]
4,911
Most of the observed malware was capable of stealing both user passwords and cookies.
[]
[]
[]
11,836
Bytes: 30 0D 06 09 2A 86 48 86 F7 0D 01 01 0B 00 00
[]
[]
[]
8,886
However, the attacker was able to delete it before we were able to get our hands on the tools used for investigation purposes.
[]
[]
[]
12,270
The DLL is custom malware that would immediately begin communicating with actor-controlled C2 domains.
[]
[]
[]
3,020
Smart speakers can be thought of as a subset of home assistants in that they are voice-activated devices in your home.
[]
[]
[]
11,045
We terminated 2 YouTube channels as part of our investigation into coordinated influence operations linked to Myanmar.
[]
[]
[]
25
This post is also available in: 日本語 (Japanese) Over the past six months, we’ve seen a major increase in the number of attack campaigns with the ultimate goal of mining cryptocurrency.
[]
[]
[]
2,379
This loader, written in C#, has been used by malicious actors since July 2020.
[ { "id": 45482, "label": "TIME", "start_offset": 68, "end_offset": 77 } ]
[]
[]
9,720
The getCommand method
[]
[]
[]
3,957
For packaging stolen credentials and other logs, it uses the makecab command instead of a third-party application such as rar.exe.
[ { "id": 49814, "label": "FILEPATH", "start_offset": 122, "end_offset": 129 }, { "id": 49813, "label": "attack-pattern", "start_offset": 14, "end_offset": 32 } ]
[]
[]
1,399
Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address! Please mark, I'm not a robot! By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.
[]
[]
[]
11,055
We terminated 2 YouTube channels as part of our ongoing investigation into a coordinated influence operation linked to Iran.
[]
[]
[]
4,678
; bool flag = list.Count == 0; return !flag; }
[]
[]
[]
4,394
In later versions it was obfuscated with Base64.
[]
[]
[]
3,898
In 2019, Trend Micro conducted research analyzing cyberattacks by building and using a factory honeypot, mimicking a factory environment.
[ { "id": 49752, "label": "TIME", "start_offset": 3, "end_offset": 7 }, { "id": 49753, "label": "identity", "start_offset": 9, "end_offset": 20 } ]
[]
[]
13,196
The backdoor version name, registered service name, and malware components’ filenames Welcome To IDShell 1.0 20150310’s backdoor (detected as BKDR_IDSHELL.ZTFC-A) - The purpose of this backdoor, which has two types, including a steganography jpg version, is to recon the target machine.
[ { "id": 41163, "label": "location", "start_offset": 52, "end_offset": 55 }, { "id": 41164, "label": "location", "start_offset": 87, "end_offset": 94 }, { "id": 41166, "label": "malware", "start_offset": 262, "end_offset": 267 }, { "id": 41167, "label": "location", "start_offset": 272, "end_offset": 278 } ]
[]
[]
5,384
We have been able to determine that the botnet of Cyclops Blink infected routers from both compromised WatchGuard devices and Asus routers.
[ { "id": 51379, "label": "malware", "start_offset": 50, "end_offset": 63 } ]
[]
[]
7,646
Another factor is its different codepage.
[]
[]
[]
172
But when your organization’s overall accounting and audit report is inaccessible right before the big deadline, that’s catastrophic.
[]
[]
[]
14,390
An attack using many hops could see movement between managed endpoints, IoT, email, network components, containers and cloud-based servers over the course of many months.
[]
[]
[]
4,266
The other file stealer (1f0dabd61947b6df8a392b77a0eae33777be3caad13698aecc223b54ab4b859a, Detected as TROJ_DELF.XXWZ) is related to a domain reported in September 2016.
[ { "id": 50069, "label": "malware", "start_offset": 102, "end_offset": 116 }, { "id": 50070, "label": "TIME", "start_offset": 153, "end_offset": 167 }, { "id": 50068, "label": "SHA2", "start_offset": 24, "end_offset": 88 } ]
[ { "id": 914, "from_id": 50068, "to_id": 50069, "type": "indicates" } ]
[]
4,087
In this technique, the RAT will be disguised as the normal wlbsctrl.dll.
[ { "id": 49922, "label": "FILEPATH", "start_offset": 59, "end_offset": 71 } ]
[]
[]
2,531
This client got only a small fraction of the file restorations that were promised before the Conti ransomware representatives disappeared back into the dark web.
[ { "id": 47725, "label": "threat-actor", "start_offset": 93, "end_offset": 98 } ]
[]
[]
7,147
The closer look into Iron Tiger was prompted because of an incident response investigation involving a Philippine-based gambling company that the group targeted.
[]
[]
[]
12,813
Table 1: C&C servers shared by PLEAD, Shrouded Crossbow, and Waterbear
[ { "id": 39897, "label": "malware", "start_offset": 31, "end_offset": 36 }, { "id": 39898, "label": "threat-actor", "start_offset": 38, "end_offset": 55 }, { "id": 39899, "label": "location", "start_offset": 57, "end_offset": 60 }, { "id": 39900, "label": "malware", "start_offset": 61, "end_offset": 70 } ]
[]
[]
643
We have not yet confirmed the initial infection vector for this new Petya variant.
[ { "id": 2132, "label": "malware", "start_offset": 69, "end_offset": 74 } ]
[]
[]
11,495
Consistent with CERT-UA reporting, TAG observed multiple Russian GRU actors - APT28 and Sandworm - conduct campaigns exploiting the Follina vulnerability.
[ { "id": 35159, "label": "location", "start_offset": 84, "end_offset": 87 }, { "id": 35160, "label": "threat-actor", "start_offset": 88, "end_offset": 96 } ]
[]
[]
2,305
The iOS exploit chain used a framework based on Ironsquirrel to encrypt exploits delivered to the victim's browser.
[ { "id": 6866, "label": "malware", "start_offset": 48, "end_offset": 60 }, { "id": 47370, "label": "SOFTWARE", "start_offset": 4, "end_offset": 7 } ]
[]
[]
14,324
We looked into one of the Twitter accounts (seen in Figure 1) that promoted Virtual Girlfriend.
[ { "id": 48548, "label": "SOFTWARE", "start_offset": 26, "end_offset": 34 }, { "id": 48549, "label": "malware", "start_offset": 76, "end_offset": 94 } ]
[]
[]
13,744
“mtxoci.dll” first tries to query the registry key "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MSDTC\MTxOCI" to see if the value "OracleOciLib" exists.
[ { "id": 42726, "label": "REGISTRYKEY", "start_offset": 52, "end_offset": 102 } ]
[]
[]
9,234
Am I impacted?
[]
[]
[]
2,710
Additionally, Windows XP systems running IE 6, 7 and 8 are also vulnerable, but will not receive a patch, as Microsoft no longer supports them.
[ { "id": 47953, "label": "identity", "start_offset": 109, "end_offset": 118 }, { "id": 47951, "label": "SOFTWARE", "start_offset": 14, "end_offset": 24 }, { "id": 47952, "label": "SOFTWARE", "start_offset": 41, "end_offset": 54 } ]
[]
[]
13,287
Decrypted backdoor configuration
[]
[]
[]
13,075
Not long after the breach occurred, the compromised data was spotted on ads posted on Instagram stories, Telegram channels and various hacking forums.
[ { "id": 48896, "label": "SOFTWARE", "start_offset": 86, "end_offset": 96 }, { "id": 48897, "label": "SOFTWARE", "start_offset": 105, "end_offset": 114 } ]
[]
[]
4,073
If no config file is imported, it will connect to the predefined C&C address.
[]
[]
[]
4,466
In December 2021, we released research about novel techniques used by NSO Group to compromise iMessage users.
[ { "id": 50254, "label": "TIME", "start_offset": 3, "end_offset": 16 }, { "id": 50255, "label": "threat-actor", "start_offset": 70, "end_offset": 79 }, { "id": 50256, "label": "SOFTWARE", "start_offset": 94, "end_offset": 102 } ]
[]
[]
5,580
StealthWorker
[]
[]
[]
13,960
In a US Senate hearing on cybersecurity threats, Senator Rob Portman of Ohio described the strike on Colonial Pipeline as “potentially the most substantial and damaging attack on US critical infrastructure ever.”
[ { "id": 48769, "label": "identity", "start_offset": 49, "end_offset": 68 }, { "id": 48768, "label": "identity", "start_offset": 5, "end_offset": 14 }, { "id": 48770, "label": "location", "start_offset": 72, "end_offset": 77 }, { "id": 48771, "label": "location", "start_offset": 179, "end_offset": 182 } ]
[ { "id": 459, "from_id": 48769, "to_id": 48768, "type": "related-to" }, { "id": 460, "from_id": 48769, "to_id": 48770, "type": "related-to" } ]
[]
10,252
To illustrate the simplicity of the malware in Pawn Storm’s recent spear-phishing attacks, we describe one example below:
[ { "id": 31338, "label": "location", "start_offset": 67, "end_offset": 72 }, { "id": 31339, "label": "attack-pattern", "start_offset": 73, "end_offset": 81 }, { "id": 31340, "label": "location", "start_offset": 103, "end_offset": 106 } ]
[]
[]
8,075
Since mid-August, OpenSUpdater samples have carried an invalid signature, and further investigation showed this was a deliberate attempt to evade detection.
[ { "id": 25056, "label": "malware", "start_offset": 18, "end_offset": 30 }, { "id": 25057, "label": "location", "start_offset": 74, "end_offset": 77 } ]
[]
[]
6,693
Today, we’re sharing recent findings on government-backed phishing, threats and disinformation, as well as a new bulletin to share information about actions we take against accounts that we attribute to coordinated influence campaigns.
[ { "id": 20803, "label": "attack-pattern", "start_offset": 58, "end_offset": 66 }, { "id": 20804, "label": "location", "start_offset": 76, "end_offset": 79 } ]
[]
[]
3,572
However, if ConfuserEx is built outside Git, the version update tool will just generate the value “version-custom” as shown below.
[ { "id": 49355, "label": "tools", "start_offset": 12, "end_offset": 22 }, { "id": 49356, "label": "tools", "start_offset": 40, "end_offset": 43 } ]
[]
[]
11,889
Word documents with the following classid: {EAB22AC3-30C1-11CF-A7EB-0000C05BAE0B} Related infrastructure: workaj[.]com wordzmncount[.]com Not all attacks require chaining multiple 0-day exploits to be successful.
[]
[]
[]
4,887
With increased detection efforts, we’ve observed attackers shifting away from Gmail to other email providers (mostly email.cz, seznam.cz, post.cz and aol.com).
[ { "id": 50905, "label": "identity", "start_offset": 150, "end_offset": 157 }, { "id": 50901, "label": "SOFTWARE", "start_offset": 78, "end_offset": 83 }, { "id": 50903, "label": "identity", "start_offset": 127, "end_offset": 136 }, { "id": 50902, "label": "identity", "start_offset": 117, "end_offset": 125 }, { "id": 50904, "label": "identity", "start_offset": 138, "end_offset": 145 } ]
[]
[]
13,028
We have not observed any Gmail accounts successfully compromised during these campaigns.
[ { "id": 48865, "label": "SOFTWARE", "start_offset": 25, "end_offset": 31 } ]
[]
[]
8,578
One of APT35’s novel techniques involves using Telegram for operator notifications.
[]
[]
[]
3,697
Carbanak also performs techniques for disabling security tools, deleting files that are left in malicious activity, and modifying registry to hide configuration information.
[ { "id": 49494, "label": "attack-pattern", "start_offset": 120, "end_offset": 138 }, { "id": 49493, "label": "attack-pattern", "start_offset": 64, "end_offset": 78 }, { "id": 49491, "label": "attack-pattern", "start_offset": 38, "end_offset": 62 }, { "id": 49492, "label": "threat-actor", "start_offset": 0, "end_offset": 8 } ]
[ { "id": 806, "from_id": 49492, "to_id": 49491, "type": "uses" }, { "id": 807, "from_id": 49492, "to_id": 49493, "type": "uses" }, { "id": 808, "from_id": 49492, "to_id": 49494, "type": "uses" } ]
[]
4,286
The group still uses the Badnews malware, a backdoor with information-stealing and file-executing capabilities, albeit updated with a slight modification in the encryption routine at the end of 2017, when they added Blowfish encryption on top of their custom encryption described in our former Patchwork blogpost.
[ { "id": 50084, "label": "malware", "start_offset": 25, "end_offset": 40 }, { "id": 50085, "label": "attack-pattern", "start_offset": 58, "end_offset": 78 }, { "id": 50086, "label": "attack-pattern", "start_offset": 83, "end_offset": 97 }, { "id": 50087, "label": "TIME", "start_offset": 187, "end_offset": 198 }, { "id": 50088, "label": "threat-actor", "start_offset": 294, "end_offset": 303 } ]
[ { "id": 917, "from_id": 50084, "to_id": 50085, "type": "uses" }, { "id": 918, "from_id": 50084, "to_id": 50086, "type": "uses" } ]
[]
5,089
Attacker-Owned Websites: Compromised Websites (Feb 7 - Feb 9): Exploitation URLs:
[]
[]
[]
3,421
flash.exe BIOPASS RAT Loader
[ { "id": 10309, "label": "malware", "start_offset": 12, "end_offset": 23 }, { "id": 49109, "label": "FILEPATH", "start_offset": 1, "end_offset": 10 } ]
[]
[]
7,984
Moreover, to protect our users, we have referred the below activity to the FBI for further investigation.
[]
[]
[]
12,609
The payload arrives as a .NET executable (as a .DLL file), which has been packed/protected using the ConfuserEx packer.
[]
[]
[]
4,447
We appreciate the Committee’s efforts to raise awareness about the commercial spyware industry that is thriving and growing, creating risks to Americans and Internet users across the globe.
[]
[]
[]
4,738
Our findings underscore the extent to which commercial surveillance vendors have proliferated capabilities historically only used by governments.
[]
[]
[]
7,904
As shown below, the volume of coinmining increase nearly 2,800% in a year.
[]
[]
[]
5,108
  [Lightly edited transcript of the video above] Hi there, Mark Nunnikhoven from Trend Micro Research, I want to talk to you about the concept of lateral movement.
[ { "id": 51211, "label": "attack-pattern", "start_offset": 155, "end_offset": 171 }, { "id": 51209, "label": "identity", "start_offset": 68, "end_offset": 84 }, { "id": 51210, "label": "identity", "start_offset": 90, "end_offset": 110 } ]
[ { "id": 1071, "from_id": 51209, "to_id": 51210, "type": "related-to" } ]
[]
2,793
Most of all, this latest development shows how a changing economic landscape in turn changes the cybercrime landscape.
[]
[]
[]
792
But this is not the end.
[]
[]
[]
9,966
Here’s how Operation Red Signature works: The code-signing certificate from the remote support solutions provider is stolen.
[ { "id": 30435, "label": "threat-actor", "start_offset": 11, "end_offset": 34 }, { "id": 30436, "label": "location", "start_offset": 81, "end_offset": 87 } ]
[]
[]
73
For defenders, it’s important to note that the techniques used to infect systems with coin mining malware are the same as they were for ransomware.
[]
[]
[]
6,618
Once gaining access to an end point, actors would use credential dumping tools, such as Mimikatz to gather credentials to legitimate accounts to then move laterally to other systems on the network.
[ { "id": 20514, "label": "location", "start_offset": 31, "end_offset": 36 }, { "id": 20515, "label": "attack-pattern", "start_offset": 55, "end_offset": 73 }, { "id": 20516, "label": "malware", "start_offset": 89, "end_offset": 97 } ]
[]
[]
5,510
"A few weeks ago, British Airways was hit by the largest ever regulatory fine of its kind, after global customers visiting its website had their card data stolen.
[ { "id": 51521, "label": "identity", "start_offset": 18, "end_offset": 33 } ]
[]
[]
3,958
· makecab a.txt > 111 · makecab aaa2.txt >1
[ { "id": 49816, "label": "FILEPATH", "start_offset": 46, "end_offset": 54 }, { "id": 49815, "label": "FILEPATH", "start_offset": 17, "end_offset": 22 } ]
[]
[]
8,277
OPSEC 101 – Or How Not To Do OPSECGathering the above information was enough to protect our customers.
[]
[]
[]
3,055
According to AppBrain, the app was also listed in top 30 of Top Grossing Apps in Tools category in United States, Japan, France and South Korea.
[ { "id": 48132, "label": "location", "start_offset": 99, "end_offset": 112 }, { "id": 48131, "label": "identity", "start_offset": 13, "end_offset": 21 }, { "id": 48133, "label": "location", "start_offset": 114, "end_offset": 119 }, { "id": 48134, "label": "location", "start_offset": 121, "end_offset": 127 }, { "id": 48135, "label": "location", "start_offset": 132, "end_offset": 143 } ]
[]
[]
814
Hear from innovators and experts, gain real-world skills through hands-on sessions and interactive workshops, and find out how breach prevention is changing the security industry.
[]
[]
[]
11,577
The certificate satisfies all of the iOS code signing requirements on any iOS devices because the company was enrolled in the Apple Developer Enterprise Program.
[ { "id": 35505, "label": "attack-pattern", "start_offset": 41, "end_offset": 53 }, { "id": 35506, "label": "identity", "start_offset": 126, "end_offset": 131 }, { "id": 35507, "label": "location", "start_offset": 142, "end_offset": 152 } ]
[]
[]
3,435
systemsetting.exe BIOPASS RAT binary (PyInstaller) Trojan.Win32.BIOPASS.A b3bd28951789ef7cfaf659e07e198b45b04a2f3cde268e6ede4d4f877959341e systemsetting.exe BIOPASS RAT binary (PyInstaller) Trojan.Win32.BIOPASS.A e0caebfbd2804fcde30e75f2c6d06e84b3bf89ed85db34d6f628b25dca7a9a0f YIZHI_SIGNED.exe BIOPASS RAT binary (PyInstaller) Trojan.Win32.BIOPASS.A 2503549352527cb0ffa1811a44481f6980961d98f9d5a96d5926d5676c31b9ee socketio.exe BIOPASS RAT binary (Nuitka) Trojan.Win32.BIOPASS.A 8ba72a391fb653b2cc1e5caa6f927efdf46568638bb4fc25e6f01dc36a96533b flashplayerpp_install_cn.exe BIOPASS RAT binary (Nuitka) Trojan.Win32.BIOPASS.A e5fdb754c1a7c36c288c46765c9258bb2c7f38fa2a99188a623182f877da3783 beep.sys Derusbi Trojan.Win64.DERUSBI.C a7e9e2bec3ad283a9a0b130034e822c8b6dfd26dda855f883a3a4ff785514f97 Browser_plugin (8).exe Cobalt Strike Loader Trojan.Win64.COBEACON.SUX IP/Domain/URL Note webplus-cn-hongkong-s-5faf81e0d937f14c9ddbe5a0[.]oss-cn-hongkong[.]aliyuncs[.]com Cloud storage bucket used to host BIOPASS RAT loaders softres[.]oss-accelerate[.]aliyuncs[.]com Cloud storage bucket used to host BIOPASS RAT loaders flashdownloadserver[.]oss-cn-hongkong[.]aliyuncs[.]com Cloud storage bucket used to host BIOPASS RAT modules and stolen data lualibs[.]oss-cn-hongkong[.]aliyuncs[.]com Cloud storage bucket used to host Cobalt Strike loader scripts bps-rhk[.]oss-cn-hongkong[.]aliyuncs[.]com Cloud storage bucket used for RTMP live streaming wxdget[.]oss-cn-hongkong[.]aliyuncs[.]com Cloud storage bucket used for storing stolen WeChat data chinanode[.]microsoft-update-service[.]com:38080 BIOPASS RAT C&C server 0x3s[.]com XSS attack domain update[.]flash-installer[.]com Associated fake installer domain update[.]flash-installers[.]com Associated fake installer domain flash[.]com[.]cm Associated fake installer domain flash[.]com[.]se Associated fake installer domain flashi[.]com[.]cn Associated fake installer domain flash[.]co[.]cm Associated fake installer domain 47[.]57[.]142[.]30 Cobalt Strike C&C server 47[.]57[.]186[.]151 Cobalt Strike C&C server 103[.]158[.]190[.]58 Cobalt Strike C&C server 207[.]148[.]100[.]49 Cobalt Strike C&C server microsoft[.]update[.]flash[.]com.se Cobalt Strike C&C server hxxps://webplus-cn-hongkong-s-5faf81e0d937f14c9ddbe5a0[.]oss-cn-hongkong.aliyuncs[.]com/Silverlight_ins.exe BIOPASS RAT loader download URL hxxps://webplus-cn-hongkong-s-5faf81e0d937f14c9ddbe5a0.oss-cn-hongkong.aliyuncs[.]com/flash_ins[.]exe BIOPASS RAT loader download URL hxxp://softres.oss-accelerate[.]aliyuncs[.]com/Silverlight[.]exe BIOPASS RAT loader download URL hxxp://flashdownloadserver[.]oss-cn-hongkong.aliyuncs[.]com/res/big.txt BIOPASS RAT script download URL hxxp://flashdownloadserver[.]oss-cn-hongkong.aliyuncs[.]com/res/Online.txt BIOPASS RAT script download URL hxxp://flashdownloadserver[.]oss-cn-hongkong.aliyuncs[.]com/res/files.zip Python runtime package download URL hxxp://flashdownloadserver[.]oss-cn-hongkong.aliyuncs[.]com/res/ServiceHub.zip Python runtime package download URL hxxp://flashdownloadserver[.]oss-cn-hongkong.aliyuncs[.]com/res/c1222.txt c1222 module script download URL hxxp://flashdownloadserver[.]oss-cn-hongkong.aliyuncs[.]com/res/cdaemon.txt cdaemon module download URL hxxp://flashdownloadserver[.]oss-cn-hongkong.aliyuncs[.]com/res/x.txt Cobalt Strike Python loader download URL hxxp://lualibs.oss-cn-hongkong[.]aliyuncs.com/x86/1-CS-443.lua Cobalt Strike Lua loader download URL hxxp://flashdownloadserver[.]oss-cn-hongkong.aliyuncs[.]com/res/s.txt Cobalt Strike shellcode download URL hxxp://flashdownloadserver[.]oss-cn-hongkong.aliyuncs[.]com/res/sc2.txt Cobalt Strike shellcode download URL hxxp://flashdownloadserver[.]oss-cn-hongkong.aliyuncs[.]com/res/sc3.txt Cobalt Strike shellcode download URL hxxp://flashdownloadserver[.]oss-cn-hongkong.aliyuncs[.]com/res/csplugins/getwechatdb.txt getwechatdb plug-in download URL hxxp://flashdownloadserver[.]oss-cn-hongkong.aliyuncs[.]com/res/csplugins/wechat.txt getwechatdb plug-in download URL hxxp://flashdownloadserver[.]oss-cn-hongkong.aliyuncs[.]com/res/csplugins/xss_spoof.zip xss_spoof plug-in download URL hxxp://flashdownloadserver[.]oss-cn-hongkong.aliyuncs[.]com/res/csplugins/xss.txt XSS payload download URL hxxp://flashdownloadserver[.]oss-cn-hongkong.aliyuncs[.]com/res/csplugins/script.txt XSS payload download URL hxxp://0x3s[.]com/x[.]js XSS injection URL Tags Malware | Endpoints | APT & Targeted Attacks | Research | Articles, News, Reports
[ { "id": 10335, "label": "malware", "start_offset": 19, "end_offset": 30 }, { "id": 10337, "label": "malware", "start_offset": 162, "end_offset": 173 }, { "id": 10338, "label": "SHA2", "start_offset": 220, "end_offset": 284 }, { "id": 10339, "label": "malware", "start_offset": 315, "end_offset": 326 }, { "id": 10341, "label": "malware", "start_offset": 453, "end_offset": 464 }, { "id": 10343, "label": "malware", "start_offset": 602, "end_offset": 613 }, { "id": 10344, "label": "MD5", "start_offset": 655, "end_offset": 719 }, { "id": 10346, "label": "SHA2", "start_offset": 764, "end_offset": 828 }, { "id": 10350, "label": "malware", "start_offset": 1047, "end_offset": 1058 }, { "id": 10353, "label": "malware", "start_offset": 1145, "end_offset": 1156 }, { "id": 10356, "label": "malware", "start_offset": 1256, "end_offset": 1267 }, { "id": 10336, "label": "SHA2", "start_offset": 77, "end_offset": 141 }, { "id": 10345, "label": "malware", "start_offset": 731, "end_offset": 738 }, { "id": 10340, "label": "SHA2", "start_offset": 373, "end_offset": 437 }, { "id": 10342, "label": "SHA2", "start_offset": 506, "end_offset": 570 }, { "id": 10360, "label": "tools", "start_offset": 1371, "end_offset": 1384 }, { "id": 10347, "label": "tools", "start_offset": 854, "end_offset": 867 }, { "id": 10363, "label": "malware", "start_offset": 1648, "end_offset": 1659 }, { "id": 10365, "label": "IPV4", "start_offset": 2044, "end_offset": 2062 }, { "id": 10367, "label": "IPV4", "start_offset": 2090, "end_offset": 2109 }, { "id": 10369, "label": "IPV4", "start_offset": 2137, "end_offset": 2157 }, { "id": 10371, "label": "IPV4", "start_offset": 2185, "end_offset": 2205 }, { "id": 10374, "label": "tools", "start_offset": 2270, "end_offset": 2283 }, { "id": 10375, "label": "malware", "start_offset": 2405, "end_offset": 2416 }, { "id": 10376, "label": "malware", "start_offset": 2541, "end_offset": 2552 }, { "id": 10377, "label": "malware", "start_offset": 2640, "end_offset": 2651 }, { "id": 10378, "label": "malware", "start_offset": 2746, "end_offset": 2757 }, { "id": 10379, "label": "malware", "start_offset": 2855, "end_offset": 2866 }, { "id": 10380, "label": "tools", "start_offset": 3403, "end_offset": 3416 }, { "id": 10386, "label": "attack-pattern", "start_offset": 4328, "end_offset": 4331 }, { "id": 10387, "label": "attack-pattern", "start_offset": 4440, "end_offset": 4443 }, { "id": 10388, "label": "attack-pattern", "start_offset": 4492, "end_offset": 4495 }, { "id": 10382, "label": "tools", "start_offset": 3509, "end_offset": 3522 }, { "id": 10383, "label": "tools", "start_offset": 3619, "end_offset": 3632 }, { "id": 10384, "label": "tools", "start_offset": 3730, "end_offset": 3743 }, { "id": 10385, "label": "tools", "start_offset": 3841, "end_offset": 3854 }, { "id": 10370, "label": "tools", "start_offset": 2159, "end_offset": 2172 }, { "id": 10368, "label": "tools", "start_offset": 2111, "end_offset": 2124 }, { "id": 10372, "label": "tools", "start_offset": 2207, "end_offset": 2220 }, { "id": 10366, "label": "tools", "start_offset": 2064, "end_offset": 2077 }, { "id": 49152, "label": "malware", "start_offset": 482, "end_offset": 504 }, { "id": 49159, "label": "DOMAIN", "start_offset": 1293, "end_offset": 1335 }, { "id": 49166, "label": "DOMAIN", "start_offset": 1703, "end_offset": 1733 }, { "id": 49172, "label": "DOMAIN", "start_offset": 2233, "end_offset": 2268 }, { "id": 49141, "label": "FILEPATH", "start_offset": 0, "end_offset": 17 }, { "id": 49147, "label": "FILEPATH", "start_offset": 721, "end_offset": 729 }, { "id": 49148, "label": "FILEPATH", "start_offset": 830, "end_offset": 852 }, { "id": 49149, "label": "attack-pattern", "start_offset": 1684, "end_offset": 1694 }, { "id": 49150, "label": "malware", "start_offset": 196, "end_offset": 218 }, { "id": 49153, "label": "malware", "start_offset": 631, "end_offset": 653 }, { "id": 49154, "label": "malware", "start_offset": 740, "end_offset": 762 }, { "id": 49156, "label": "DOMAIN", "start_offset": 930, "end_offset": 1011 }, { "id": 49142, "label": "malware", "start_offset": 53, "end_offset": 75 }, { "id": 49151, "label": "malware", "start_offset": 349, "end_offset": 371 }, { "id": 49155, "label": "malware", "start_offset": 876, "end_offset": 901 }, { "id": 49162, "label": "DOMAIN", "start_offset": 1497, "end_offset": 1538 }, { "id": 49169, "label": "DOMAIN", "start_offset": 1888, "end_offset": 1904 }, { "id": 49170, "label": "DOMAIN", "start_offset": 1940, "end_offset": 1957 }, { "id": 49171, "label": "DOMAIN", "start_offset": 1993, "end_offset": 2008 }, { "id": 49143, "label": "FILEPATH", "start_offset": 143, "end_offset": 160 }, { "id": 49144, "label": "FILEPATH", "start_offset": 297, "end_offset": 313 }, { "id": 49145, "label": "FILEPATH", "start_offset": 439, "end_offset": 451 }, { "id": 49146, "label": "FILEPATH", "start_offset": 572, "end_offset": 600 }, { "id": 49157, "label": "DOMAIN", "start_offset": 1059, "end_offset": 1109 }, { "id": 49158, "label": "DOMAIN", "start_offset": 1166, "end_offset": 1220 }, { "id": 49160, "label": "DOMAIN", "start_offset": 1401, "end_offset": 1443 }, { "id": 49161, "label": "DOMAIN", "start_offset": 1497, "end_offset": 1538 }, { "id": 49189, "label": "DOMAIN", "start_offset": 4124, "end_offset": 4211 }, { "id": 49191, "label": "DOMAIN", "start_offset": 4354, "end_offset": 4438 }, { "id": 49163, "label": "DOMAIN", "start_offset": 1598, "end_offset": 1646 }, { "id": 49164, "label": "DOMAIN", "start_offset": 1672, "end_offset": 1682 }, { "id": 49165, "label": "DOMAIN", "start_offset": 1497, "end_offset": 1538 }, { "id": 49167, "label": "DOMAIN", "start_offset": 1836, "end_offset": 1852 }, { "id": 49168, "label": "DOMAIN", "start_offset": 1769, "end_offset": 1800 }, { "id": 49174, "label": "DOMAIN", "start_offset": 2438, "end_offset": 2539 }, { "id": 49175, "label": "DOMAIN", "start_offset": 2574, "end_offset": 2638 }, { "id": 49176, "label": "DOMAIN", "start_offset": 2673, "end_offset": 2744 }, { "id": 49178, "label": "DOMAIN", "start_offset": 2888, "end_offset": 2961 }, { "id": 49179, "label": "DOMAIN", "start_offset": 3000, "end_offset": 3078 }, { "id": 49181, "label": "DOMAIN", "start_offset": 3226, "end_offset": 3301 }, { "id": 49184, "label": "DOMAIN", "start_offset": 3548, "end_offset": 3617 }, { "id": 49188, "label": "DOMAIN", "start_offset": 4004, "end_offset": 4088 }, { "id": 49192, "label": "DOMAIN", "start_offset": 4466, "end_offset": 4490 }, { "id": 49173, "label": "DOMAIN", "start_offset": 2296, "end_offset": 2403 }, { "id": 49177, "label": "DOMAIN", "start_offset": 2779, "end_offset": 2853 }, { "id": 49180, "label": "DOMAIN", "start_offset": 3117, "end_offset": 3190 }, { "id": 49182, "label": "DOMAIN", "start_offset": 3332, "end_offset": 3401 }, { "id": 49183, "label": "DOMAIN", "start_offset": 3445, "end_offset": 3507 }, { "id": 49185, "label": "DOMAIN", "start_offset": 3657, "end_offset": 3728 }, { "id": 49186, "label": "DOMAIN", "start_offset": 3768, "end_offset": 3839 }, { "id": 49190, "label": "DOMAIN", "start_offset": 4245, "end_offset": 4326 }, { "id": 49187, "label": "DOMAIN", "start_offset": 3879, "end_offset": 3968 } ]
[]
[]