id
int64 1
14.4k
| text
stringlengths 3
5.01k
| entities
list | relations
list | Comments
list |
|---|---|---|---|---|
4,965
|
Android App: https://www.virustotal.com/gui/file/5d3ff202f20af915863eee45916412a271bae1ea3a0e20988309c16723ce4da5/detection Android App C2: communication-shield[.]site cdsa[.]xyz
|
[
{
"id": 51009,
"label": "DOMAIN",
"start_offset": 141,
"end_offset": 168
},
{
"id": 51010,
"label": "DOMAIN",
"start_offset": 169,
"end_offset": 179
},
{
"id": 15245,
"label": "URL",
"start_offset": 13,
"end_offset": 123
}
] |
[] |
[] |
419
|
In a worst case, the slow-down can be so severe that it can make a website basically unusable.
|
[] |
[] |
[] |
1,029
|
In fact, anyone can do the same by visiting the California Colleges Create an Account page.
|
[
{
"id": 44918,
"label": "identity",
"start_offset": 48,
"end_offset": 67
}
] |
[] |
[] |
4,468
|
Short of not using a device, there is no way to prevent exploitation by a zero-click exploit; it's a weapon against which there is no defense.
|
[
{
"id": 50258,
"label": "attack-pattern",
"start_offset": 74,
"end_offset": 92
}
] |
[] |
[] |
3,406
|
932B45AB117960390324678B0696EF0E07D7F8DE1FA0B94C529F243610F1DCC9
|
[
{
"id": 10272,
"label": "SHA2",
"start_offset": 1,
"end_offset": 65
}
] |
[] |
[] |
11,096
|
In June, we announced that we saw phishing attempts against the personal email accounts of staffers on the Biden and Trump campaigns by Chinese and Iranian APTs (Advanced Persistent Threats) respectively.
|
[
{
"id": 33879,
"label": "attack-pattern",
"start_offset": 34,
"end_offset": 42
},
{
"id": 33881,
"label": "location",
"start_offset": 113,
"end_offset": 116
},
{
"id": 33884,
"label": "location",
"start_offset": 144,
"end_offset": 147
}
] |
[] |
[] |
3,688
|
Privilege Escalation
|
[
{
"id": 11194,
"label": "attack-pattern",
"start_offset": 0,
"end_offset": 20
}
] |
[] |
[] |
10,505
|
Generally, 2020 has been dominated by COVID-19.
|
[] |
[] |
[] |
4,442
|
C2s 136.243.108.14 173.209.51.54 HYPERSCRAPE binaries
|
[
{
"id": 50214,
"label": "malware",
"start_offset": 33,
"end_offset": 44
},
{
"id": 13275,
"label": "IPV4",
"start_offset": 4,
"end_offset": 18
},
{
"id": 13276,
"label": "IPV4",
"start_offset": 19,
"end_offset": 32
}
] |
[] |
[] |
5,330
|
The child process will connect to the C&C server and write four bytes to the SSL socket.
|
[] |
[] |
[] |
4,989
|
We recovered the exploit used to escape the Chrome Sandbox, but not the initial RCE exploit.
|
[
{
"id": 51049,
"label": "SOFTWARE",
"start_offset": 44,
"end_offset": 58
},
{
"id": 51050,
"label": "attack-pattern",
"start_offset": 80,
"end_offset": 91
}
] |
[] |
[] |
2,366
|
That campaign is not connected to the one described in today’s post.
|
[] |
[] |
[] |
5,114
|
You see a bunch of text go across the screen and they penetrate through the first firewall, through the second firewall in into the data.
|
[] |
[] |
[] |
12,731
|
An AWS instance, by default, does not have any identity access management (IAM) permissions attached; rather, these permissions must be defined by the AWS administrator.
|
[] |
[] |
[] |
8,290
|
His motives remain unclear since the documents themselves did not contain any particularly unusual information.
|
[] |
[] |
[] |
13,641
|
The recent campaigns target senior positions in the United States and Canada.
|
[
{
"id": 51729,
"label": "identity",
"start_offset": 28,
"end_offset": 44
},
{
"id": 51731,
"label": "location",
"start_offset": 70,
"end_offset": 76
},
{
"id": 51728,
"label": "campaign",
"start_offset": 4,
"end_offset": 20
},
{
"id": 51730,
"label": "location",
"start_offset": 52,
"end_offset": 65
}
] |
[
{
"id": 1145,
"from_id": 51728,
"to_id": 51729,
"type": "targets"
},
{
"id": 1146,
"from_id": 51729,
"to_id": 51730,
"type": "located-at"
},
{
"id": 1147,
"from_id": 51729,
"to_id": 51731,
"type": "located-at"
}
] |
[] |
9,745
|
The blurred document contains logos of different Turkish government entities Figure 2.
|
[] |
[] |
[] |
615
|
What is most interesting about Hancitor is the way these decisions so clearly reflect an awareness of business realities (by targeting peak working times) and dividing up the “work” of their attacks in a way that so clearly mirrors mainstream business decisions around globalizing operations.
|
[
{
"id": 45796,
"label": "malware",
"start_offset": 31,
"end_offset": 39
}
] |
[] |
[] |
296
|
Beyond Alert AA22-011A, CISA’s overarching guidance for attack surface reduction includes hardening of forward-facing network services, with prioritized patching of KEVs, as documented in Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities (KEV).
|
[
{
"id": 45994,
"label": "identity",
"start_offset": 24,
"end_offset": 28
}
] |
[] |
[] |
11,680
|
These pages were copied from the webmail servers of various targets and then modified for spear-phishing attacks designed to steal login credentials.
|
[
{
"id": 35819,
"label": "location",
"start_offset": 68,
"end_offset": 71
},
{
"id": 35820,
"label": "location",
"start_offset": 90,
"end_offset": 95
},
{
"id": 35821,
"label": "attack-pattern",
"start_offset": 96,
"end_offset": 104
}
] |
[] |
[] |
13,632
|
The code used to obtain user QQ numbers Protecting e-commerce platforms from Water Pamola’s attacks Water Pamola attacked online merchants with an XSS script appended onto online shopping orders.
|
[
{
"id": 51716,
"label": "campaign",
"start_offset": 81,
"end_offset": 93
},
{
"id": 51717,
"label": "campaign",
"start_offset": 104,
"end_offset": 116
},
{
"id": 51718,
"label": "identity",
"start_offset": 126,
"end_offset": 142
},
{
"id": 51719,
"label": "attack-pattern",
"start_offset": 151,
"end_offset": 154
}
] |
[
{
"id": 1141,
"from_id": 51717,
"to_id": 51719,
"type": "uses"
},
{
"id": 1140,
"from_id": 51717,
"to_id": 51718,
"type": "targets"
}
] |
[] |
7,750
|
Figure 16.
|
[] |
[] |
[] |
4,574
|
In addition to including phishing links directly in the email, the attackers also link to PDFs and/or DOCs, hosted on Google Drive and Microsoft One Drive, that contain a link to an attacker-controlled phishing domain.
|
[
{
"id": 50420,
"label": "SOFTWARE",
"start_offset": 118,
"end_offset": 130
},
{
"id": 50419,
"label": "attack-pattern",
"start_offset": 25,
"end_offset": 39
},
{
"id": 50421,
"label": "SOFTWARE",
"start_offset": 135,
"end_offset": 154
}
] |
[] |
[] |
13,957
|
Unfortunately, some organizations may be putting cybersecurity on the back burner.
|
[] |
[] |
[] |
6,704
|
To help protect users against these kinds of tracks, our Advanced Protection Program (APP) utilizes hardware security keys and provides the strongest protections available against phishing and account hijackings.
|
[
{
"id": 20847,
"label": "location",
"start_offset": 66,
"end_offset": 76
},
{
"id": 20848,
"label": "location",
"start_offset": 109,
"end_offset": 117
},
{
"id": 20849,
"label": "location",
"start_offset": 123,
"end_offset": 126
},
{
"id": 20850,
"label": "attack-pattern",
"start_offset": 180,
"end_offset": 188
},
{
"id": 20851,
"label": "location",
"start_offset": 189,
"end_offset": 192
}
] |
[] |
[] |
4,081
|
Customized Lilith RAT
|
[
{
"id": 12317,
"label": "malware",
"start_offset": 12,
"end_offset": 22
}
] |
[] |
[] |
3,974
|
Trend Micro Solutions Trend Micro’s comprehensive XDR solution applies the most effective expert analytics to the deep data sets collected from Trend Micro solutions across the enterprise — including email, endpoints, servers, cloud workloads, and networks — making faster connections to identify and stop attacks.
|
[
{
"id": 49834,
"label": "identity",
"start_offset": 25,
"end_offset": 36
},
{
"id": 49835,
"label": "identity",
"start_offset": 147,
"end_offset": 158
},
{
"id": 49833,
"label": "SOFTWARE",
"start_offset": 3,
"end_offset": 24
}
] |
[] |
[] |
9,350
|
Scheduled jobs Source Command alive_latest_files_watcher Starts latest_files_watcher job and keeps it alive enviorment_schedulers
|
[
{
"id": 28840,
"label": "attack-pattern",
"start_offset": 16,
"end_offset": 22
},
{
"id": 28841,
"label": "location",
"start_offset": 86,
"end_offset": 89
},
{
"id": 28842,
"label": "location",
"start_offset": 90,
"end_offset": 93
}
] |
[] |
[] |
7,357
|
Anomalous properties of a command detected from traffic
|
[] |
[] |
[] |
12,001
|
We terminated 3 YouTube channels as part of our ongoing investigation into coordinated influence operations linked to Iran.
|
[] |
[] |
[] |
10,076
|
These vulnerabilities, when combined, could allow an unauthenticated attacker to execute arbitrary code as Administrator on an affected system.
|
[] |
[] |
[] |
14,271
|
When the downloaded APK file is installed and launched, it will send the infected device’s Unix timestamp to 0046769438867, a phone number containing Sweden’s code.
|
[] |
[] |
[] |
4,911
|
Most of the observed malware was capable of stealing both user passwords and cookies.
|
[] |
[] |
[] |
11,836
|
Bytes: 30 0D 06 09 2A 86 48 86 F7 0D 01 01 0B 00 00
|
[] |
[] |
[] |
8,886
|
However, the attacker was able to delete it before we were able to get our hands on the tools used for investigation purposes.
|
[] |
[] |
[] |
12,270
|
The DLL is custom malware that would immediately begin communicating with actor-controlled C2 domains.
|
[] |
[] |
[] |
3,020
|
Smart speakers can be thought of as a subset of home assistants in that they are voice-activated devices in your home.
|
[] |
[] |
[] |
11,045
|
We terminated 2 YouTube channels as part of our investigation into coordinated influence operations linked to Myanmar.
|
[] |
[] |
[] |
25
|
This post is also available in: 日本語 (Japanese) Over the past six months, we’ve seen a major increase in the number of attack campaigns with the ultimate goal of mining cryptocurrency.
|
[] |
[] |
[] |
2,379
|
This loader, written in C#, has been used by malicious actors since July 2020.
|
[
{
"id": 45482,
"label": "TIME",
"start_offset": 68,
"end_offset": 77
}
] |
[] |
[] |
9,720
|
The getCommand method
|
[] |
[] |
[] |
3,957
|
For packaging stolen credentials and other logs, it uses the makecab command instead of a third-party application such as rar.exe.
|
[
{
"id": 49814,
"label": "FILEPATH",
"start_offset": 122,
"end_offset": 129
},
{
"id": 49813,
"label": "attack-pattern",
"start_offset": 14,
"end_offset": 32
}
] |
[] |
[] |
1,399
|
Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address! Please mark, I'm not a robot! By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.
|
[] |
[] |
[] |
11,055
|
We terminated 2 YouTube channels as part of our ongoing investigation into a coordinated influence operation linked to Iran.
|
[] |
[] |
[] |
4,678
|
; bool flag = list.Count == 0; return !flag; }
|
[] |
[] |
[] |
4,394
|
In later versions it was obfuscated with Base64.
|
[] |
[] |
[] |
3,898
|
In 2019, Trend Micro conducted research analyzing cyberattacks by building and using a factory honeypot, mimicking a factory environment.
|
[
{
"id": 49752,
"label": "TIME",
"start_offset": 3,
"end_offset": 7
},
{
"id": 49753,
"label": "identity",
"start_offset": 9,
"end_offset": 20
}
] |
[] |
[] |
13,196
|
The backdoor version name, registered service name, and malware components’ filenames Welcome To IDShell 1.0 20150310’s backdoor (detected as BKDR_IDSHELL.ZTFC-A) - The purpose of this backdoor, which has two types, including a steganography jpg version, is to recon the target machine.
|
[
{
"id": 41163,
"label": "location",
"start_offset": 52,
"end_offset": 55
},
{
"id": 41164,
"label": "location",
"start_offset": 87,
"end_offset": 94
},
{
"id": 41166,
"label": "malware",
"start_offset": 262,
"end_offset": 267
},
{
"id": 41167,
"label": "location",
"start_offset": 272,
"end_offset": 278
}
] |
[] |
[] |
5,384
|
We have been able to determine that the botnet of Cyclops Blink infected routers from both compromised WatchGuard devices and Asus routers.
|
[
{
"id": 51379,
"label": "malware",
"start_offset": 50,
"end_offset": 63
}
] |
[] |
[] |
7,646
|
Another factor is its different codepage.
|
[] |
[] |
[] |
172
|
But when your organization’s overall accounting and audit report is inaccessible right before the big deadline, that’s catastrophic.
|
[] |
[] |
[] |
14,390
|
An attack using many hops could see movement between managed endpoints, IoT, email, network components, containers and cloud-based servers over the course of many months.
|
[] |
[] |
[] |
4,266
|
The other file stealer (1f0dabd61947b6df8a392b77a0eae33777be3caad13698aecc223b54ab4b859a, Detected as TROJ_DELF.XXWZ) is related to a domain reported in September 2016.
|
[
{
"id": 50069,
"label": "malware",
"start_offset": 102,
"end_offset": 116
},
{
"id": 50070,
"label": "TIME",
"start_offset": 153,
"end_offset": 167
},
{
"id": 50068,
"label": "SHA2",
"start_offset": 24,
"end_offset": 88
}
] |
[
{
"id": 914,
"from_id": 50068,
"to_id": 50069,
"type": "indicates"
}
] |
[] |
4,087
|
In this technique, the RAT will be disguised as the normal wlbsctrl.dll.
|
[
{
"id": 49922,
"label": "FILEPATH",
"start_offset": 59,
"end_offset": 71
}
] |
[] |
[] |
2,531
|
This client got only a small fraction of the file restorations that were promised before the Conti ransomware representatives disappeared back into the dark web.
|
[
{
"id": 47725,
"label": "threat-actor",
"start_offset": 93,
"end_offset": 98
}
] |
[] |
[] |
7,147
|
The closer look into Iron Tiger was prompted because of an incident response investigation involving a Philippine-based gambling company that the group targeted.
|
[] |
[] |
[] |
12,813
|
Table 1: C&C servers shared by PLEAD, Shrouded Crossbow, and Waterbear
|
[
{
"id": 39897,
"label": "malware",
"start_offset": 31,
"end_offset": 36
},
{
"id": 39898,
"label": "threat-actor",
"start_offset": 38,
"end_offset": 55
},
{
"id": 39899,
"label": "location",
"start_offset": 57,
"end_offset": 60
},
{
"id": 39900,
"label": "malware",
"start_offset": 61,
"end_offset": 70
}
] |
[] |
[] |
643
|
We have not yet confirmed the initial infection vector for this new Petya variant.
|
[
{
"id": 2132,
"label": "malware",
"start_offset": 69,
"end_offset": 74
}
] |
[] |
[] |
11,495
|
Consistent with CERT-UA reporting, TAG observed multiple Russian GRU actors - APT28 and Sandworm - conduct campaigns exploiting the Follina vulnerability.
|
[
{
"id": 35159,
"label": "location",
"start_offset": 84,
"end_offset": 87
},
{
"id": 35160,
"label": "threat-actor",
"start_offset": 88,
"end_offset": 96
}
] |
[] |
[] |
2,305
|
The iOS exploit chain used a framework based on Ironsquirrel to encrypt exploits delivered to the victim's browser.
|
[
{
"id": 6866,
"label": "malware",
"start_offset": 48,
"end_offset": 60
},
{
"id": 47370,
"label": "SOFTWARE",
"start_offset": 4,
"end_offset": 7
}
] |
[] |
[] |
14,324
|
We looked into one of the Twitter accounts (seen in Figure 1) that promoted Virtual Girlfriend.
|
[
{
"id": 48548,
"label": "SOFTWARE",
"start_offset": 26,
"end_offset": 34
},
{
"id": 48549,
"label": "malware",
"start_offset": 76,
"end_offset": 94
}
] |
[] |
[] |
13,744
|
“mtxoci.dll” first tries to query the registry key "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MSDTC\MTxOCI" to see if the value "OracleOciLib" exists.
|
[
{
"id": 42726,
"label": "REGISTRYKEY",
"start_offset": 52,
"end_offset": 102
}
] |
[] |
[] |
9,234
|
Am I impacted?
|
[] |
[] |
[] |
2,710
|
Additionally, Windows XP systems running IE 6, 7 and 8 are also vulnerable, but will not receive a patch, as Microsoft no longer supports them.
|
[
{
"id": 47953,
"label": "identity",
"start_offset": 109,
"end_offset": 118
},
{
"id": 47951,
"label": "SOFTWARE",
"start_offset": 14,
"end_offset": 24
},
{
"id": 47952,
"label": "SOFTWARE",
"start_offset": 41,
"end_offset": 54
}
] |
[] |
[] |
13,287
|
Decrypted backdoor configuration
|
[] |
[] |
[] |
13,075
|
Not long after the breach occurred, the compromised data was spotted on ads posted on Instagram stories, Telegram channels and various hacking forums.
|
[
{
"id": 48896,
"label": "SOFTWARE",
"start_offset": 86,
"end_offset": 96
},
{
"id": 48897,
"label": "SOFTWARE",
"start_offset": 105,
"end_offset": 114
}
] |
[] |
[] |
4,073
|
If no config file is imported, it will connect to the predefined C&C address.
|
[] |
[] |
[] |
4,466
|
In December 2021, we released research about novel techniques used by NSO Group to compromise iMessage users.
|
[
{
"id": 50254,
"label": "TIME",
"start_offset": 3,
"end_offset": 16
},
{
"id": 50255,
"label": "threat-actor",
"start_offset": 70,
"end_offset": 79
},
{
"id": 50256,
"label": "SOFTWARE",
"start_offset": 94,
"end_offset": 102
}
] |
[] |
[] |
5,580
|
StealthWorker
|
[] |
[] |
[] |
13,960
|
In a US Senate hearing on cybersecurity threats, Senator Rob Portman of Ohio described the strike on Colonial Pipeline as “potentially the most substantial and damaging attack on US critical infrastructure ever.”
|
[
{
"id": 48769,
"label": "identity",
"start_offset": 49,
"end_offset": 68
},
{
"id": 48768,
"label": "identity",
"start_offset": 5,
"end_offset": 14
},
{
"id": 48770,
"label": "location",
"start_offset": 72,
"end_offset": 77
},
{
"id": 48771,
"label": "location",
"start_offset": 179,
"end_offset": 182
}
] |
[
{
"id": 459,
"from_id": 48769,
"to_id": 48768,
"type": "related-to"
},
{
"id": 460,
"from_id": 48769,
"to_id": 48770,
"type": "related-to"
}
] |
[] |
10,252
|
To illustrate the simplicity of the malware in Pawn Storm’s recent spear-phishing attacks, we describe one example below:
|
[
{
"id": 31338,
"label": "location",
"start_offset": 67,
"end_offset": 72
},
{
"id": 31339,
"label": "attack-pattern",
"start_offset": 73,
"end_offset": 81
},
{
"id": 31340,
"label": "location",
"start_offset": 103,
"end_offset": 106
}
] |
[] |
[] |
8,075
|
Since mid-August, OpenSUpdater samples have carried an invalid signature, and further investigation showed this was a deliberate attempt to evade detection.
|
[
{
"id": 25056,
"label": "malware",
"start_offset": 18,
"end_offset": 30
},
{
"id": 25057,
"label": "location",
"start_offset": 74,
"end_offset": 77
}
] |
[] |
[] |
6,693
|
Today, we’re sharing recent findings on government-backed phishing, threats and disinformation, as well as a new bulletin to share information about actions we take against accounts that we attribute to coordinated influence campaigns.
|
[
{
"id": 20803,
"label": "attack-pattern",
"start_offset": 58,
"end_offset": 66
},
{
"id": 20804,
"label": "location",
"start_offset": 76,
"end_offset": 79
}
] |
[] |
[] |
3,572
|
However, if ConfuserEx is built outside Git, the version update tool will just generate the value “version-custom” as shown below.
|
[
{
"id": 49355,
"label": "tools",
"start_offset": 12,
"end_offset": 22
},
{
"id": 49356,
"label": "tools",
"start_offset": 40,
"end_offset": 43
}
] |
[] |
[] |
11,889
|
Word documents with the following classid: {EAB22AC3-30C1-11CF-A7EB-0000C05BAE0B} Related infrastructure: workaj[.]com wordzmncount[.]com Not all attacks require chaining multiple 0-day exploits to be successful.
|
[] |
[] |
[] |
4,887
|
With increased detection efforts, we’ve observed attackers shifting away from Gmail to other email providers (mostly email.cz, seznam.cz, post.cz and aol.com).
|
[
{
"id": 50905,
"label": "identity",
"start_offset": 150,
"end_offset": 157
},
{
"id": 50901,
"label": "SOFTWARE",
"start_offset": 78,
"end_offset": 83
},
{
"id": 50903,
"label": "identity",
"start_offset": 127,
"end_offset": 136
},
{
"id": 50902,
"label": "identity",
"start_offset": 117,
"end_offset": 125
},
{
"id": 50904,
"label": "identity",
"start_offset": 138,
"end_offset": 145
}
] |
[] |
[] |
13,028
|
We have not observed any Gmail accounts successfully compromised during these campaigns.
|
[
{
"id": 48865,
"label": "SOFTWARE",
"start_offset": 25,
"end_offset": 31
}
] |
[] |
[] |
8,578
|
One of APT35’s novel techniques involves using Telegram for operator notifications.
|
[] |
[] |
[] |
3,697
|
Carbanak also performs techniques for disabling security tools, deleting files that are left in malicious activity, and modifying registry to hide configuration information.
|
[
{
"id": 49494,
"label": "attack-pattern",
"start_offset": 120,
"end_offset": 138
},
{
"id": 49493,
"label": "attack-pattern",
"start_offset": 64,
"end_offset": 78
},
{
"id": 49491,
"label": "attack-pattern",
"start_offset": 38,
"end_offset": 62
},
{
"id": 49492,
"label": "threat-actor",
"start_offset": 0,
"end_offset": 8
}
] |
[
{
"id": 806,
"from_id": 49492,
"to_id": 49491,
"type": "uses"
},
{
"id": 807,
"from_id": 49492,
"to_id": 49493,
"type": "uses"
},
{
"id": 808,
"from_id": 49492,
"to_id": 49494,
"type": "uses"
}
] |
[] |
4,286
|
The group still uses the Badnews malware, a backdoor with information-stealing and file-executing capabilities, albeit updated with a slight modification in the encryption routine at the end of 2017, when they added Blowfish encryption on top of their custom encryption described in our former Patchwork blogpost.
|
[
{
"id": 50084,
"label": "malware",
"start_offset": 25,
"end_offset": 40
},
{
"id": 50085,
"label": "attack-pattern",
"start_offset": 58,
"end_offset": 78
},
{
"id": 50086,
"label": "attack-pattern",
"start_offset": 83,
"end_offset": 97
},
{
"id": 50087,
"label": "TIME",
"start_offset": 187,
"end_offset": 198
},
{
"id": 50088,
"label": "threat-actor",
"start_offset": 294,
"end_offset": 303
}
] |
[
{
"id": 917,
"from_id": 50084,
"to_id": 50085,
"type": "uses"
},
{
"id": 918,
"from_id": 50084,
"to_id": 50086,
"type": "uses"
}
] |
[] |
5,089
|
Attacker-Owned Websites: Compromised Websites (Feb 7 - Feb 9): Exploitation URLs:
|
[] |
[] |
[] |
3,421
|
flash.exe BIOPASS RAT Loader
|
[
{
"id": 10309,
"label": "malware",
"start_offset": 12,
"end_offset": 23
},
{
"id": 49109,
"label": "FILEPATH",
"start_offset": 1,
"end_offset": 10
}
] |
[] |
[] |
7,984
|
Moreover, to protect our users, we have referred the below activity to the FBI for further investigation.
|
[] |
[] |
[] |
12,609
|
The payload arrives as a .NET executable (as a .DLL file), which has been packed/protected using the ConfuserEx packer.
|
[] |
[] |
[] |
4,447
|
We appreciate the Committee’s efforts to raise awareness about the commercial spyware industry that is thriving and growing, creating risks to Americans and Internet users across the globe.
|
[] |
[] |
[] |
4,738
|
Our findings underscore the extent to which commercial surveillance vendors have proliferated capabilities historically only used by governments.
|
[] |
[] |
[] |
7,904
|
As shown below, the volume of coinmining increase nearly 2,800% in a year.
|
[] |
[] |
[] |
5,108
|
  [Lightly edited transcript of the video above] Hi there, Mark Nunnikhoven from Trend Micro Research, I want to talk to you about the concept of lateral movement.
|
[
{
"id": 51211,
"label": "attack-pattern",
"start_offset": 155,
"end_offset": 171
},
{
"id": 51209,
"label": "identity",
"start_offset": 68,
"end_offset": 84
},
{
"id": 51210,
"label": "identity",
"start_offset": 90,
"end_offset": 110
}
] |
[
{
"id": 1071,
"from_id": 51209,
"to_id": 51210,
"type": "related-to"
}
] |
[] |
2,793
|
Most of all, this latest development shows how a changing economic landscape in turn changes the cybercrime landscape.
|
[] |
[] |
[] |
792
|
But this is not the end.
|
[] |
[] |
[] |
9,966
|
Here’s how Operation Red Signature works: The code-signing certificate from the remote support solutions provider is stolen.
|
[
{
"id": 30435,
"label": "threat-actor",
"start_offset": 11,
"end_offset": 34
},
{
"id": 30436,
"label": "location",
"start_offset": 81,
"end_offset": 87
}
] |
[] |
[] |
73
|
For defenders, it’s important to note that the techniques used to infect systems with coin mining malware are the same as they were for ransomware.
|
[] |
[] |
[] |
6,618
|
Once gaining access to an end point, actors would use credential dumping tools, such as Mimikatz to gather credentials to legitimate accounts to then move laterally to other systems on the network.
|
[
{
"id": 20514,
"label": "location",
"start_offset": 31,
"end_offset": 36
},
{
"id": 20515,
"label": "attack-pattern",
"start_offset": 55,
"end_offset": 73
},
{
"id": 20516,
"label": "malware",
"start_offset": 89,
"end_offset": 97
}
] |
[] |
[] |
5,510
|
"A few weeks ago, British Airways was hit by the largest ever regulatory fine of its kind, after global customers visiting its website had their card data stolen.
|
[
{
"id": 51521,
"label": "identity",
"start_offset": 18,
"end_offset": 33
}
] |
[] |
[] |
3,958
|
· makecab a.txt > 111 · makecab aaa2.txt >1
|
[
{
"id": 49816,
"label": "FILEPATH",
"start_offset": 46,
"end_offset": 54
},
{
"id": 49815,
"label": "FILEPATH",
"start_offset": 17,
"end_offset": 22
}
] |
[] |
[] |
8,277
|
OPSEC 101 – Or How Not To Do OPSECGathering the above information was enough to protect our customers.
|
[] |
[] |
[] |
3,055
|
According to AppBrain, the app was also listed in top 30 of Top Grossing Apps in Tools category in United States, Japan, France and South Korea.
|
[
{
"id": 48132,
"label": "location",
"start_offset": 99,
"end_offset": 112
},
{
"id": 48131,
"label": "identity",
"start_offset": 13,
"end_offset": 21
},
{
"id": 48133,
"label": "location",
"start_offset": 114,
"end_offset": 119
},
{
"id": 48134,
"label": "location",
"start_offset": 121,
"end_offset": 127
},
{
"id": 48135,
"label": "location",
"start_offset": 132,
"end_offset": 143
}
] |
[] |
[] |
814
|
Hear from innovators and experts, gain real-world skills through hands-on sessions and interactive workshops, and find out how breach prevention is changing the security industry.
|
[] |
[] |
[] |
11,577
|
The certificate satisfies all of the iOS code signing requirements on any iOS devices because the company was enrolled in the Apple Developer Enterprise Program.
|
[
{
"id": 35505,
"label": "attack-pattern",
"start_offset": 41,
"end_offset": 53
},
{
"id": 35506,
"label": "identity",
"start_offset": 126,
"end_offset": 131
},
{
"id": 35507,
"label": "location",
"start_offset": 142,
"end_offset": 152
}
] |
[] |
[] |
3,435
|
systemsetting.exe BIOPASS RAT binary (PyInstaller) Trojan.Win32.BIOPASS.A b3bd28951789ef7cfaf659e07e198b45b04a2f3cde268e6ede4d4f877959341e systemsetting.exe BIOPASS RAT binary (PyInstaller) Trojan.Win32.BIOPASS.A e0caebfbd2804fcde30e75f2c6d06e84b3bf89ed85db34d6f628b25dca7a9a0f YIZHI_SIGNED.exe BIOPASS RAT binary (PyInstaller) Trojan.Win32.BIOPASS.A 2503549352527cb0ffa1811a44481f6980961d98f9d5a96d5926d5676c31b9ee socketio.exe BIOPASS RAT binary (Nuitka) Trojan.Win32.BIOPASS.A 8ba72a391fb653b2cc1e5caa6f927efdf46568638bb4fc25e6f01dc36a96533b flashplayerpp_install_cn.exe BIOPASS RAT binary (Nuitka) Trojan.Win32.BIOPASS.A e5fdb754c1a7c36c288c46765c9258bb2c7f38fa2a99188a623182f877da3783 beep.sys Derusbi Trojan.Win64.DERUSBI.C a7e9e2bec3ad283a9a0b130034e822c8b6dfd26dda855f883a3a4ff785514f97 Browser_plugin (8).exe Cobalt Strike Loader Trojan.Win64.COBEACON.SUX IP/Domain/URL Note webplus-cn-hongkong-s-5faf81e0d937f14c9ddbe5a0[.]oss-cn-hongkong[.]aliyuncs[.]com Cloud storage bucket used to host BIOPASS RAT loaders softres[.]oss-accelerate[.]aliyuncs[.]com Cloud storage bucket used to host BIOPASS RAT loaders flashdownloadserver[.]oss-cn-hongkong[.]aliyuncs[.]com Cloud storage bucket used to host BIOPASS RAT modules and stolen data lualibs[.]oss-cn-hongkong[.]aliyuncs[.]com Cloud storage bucket used to host Cobalt Strike loader scripts bps-rhk[.]oss-cn-hongkong[.]aliyuncs[.]com Cloud storage bucket used for RTMP live streaming wxdget[.]oss-cn-hongkong[.]aliyuncs[.]com Cloud storage bucket used for storing stolen WeChat data chinanode[.]microsoft-update-service[.]com:38080 BIOPASS RAT C&C server 0x3s[.]com XSS attack domain update[.]flash-installer[.]com Associated fake installer domain update[.]flash-installers[.]com Associated fake installer domain flash[.]com[.]cm Associated fake installer domain flash[.]com[.]se Associated fake installer domain flashi[.]com[.]cn Associated fake installer domain flash[.]co[.]cm Associated fake installer domain 47[.]57[.]142[.]30 Cobalt Strike C&C server 47[.]57[.]186[.]151 Cobalt Strike C&C server 103[.]158[.]190[.]58 Cobalt Strike C&C server 207[.]148[.]100[.]49 Cobalt Strike C&C server microsoft[.]update[.]flash[.]com.se Cobalt Strike C&C server hxxps://webplus-cn-hongkong-s-5faf81e0d937f14c9ddbe5a0[.]oss-cn-hongkong.aliyuncs[.]com/Silverlight_ins.exe BIOPASS RAT loader download URL hxxps://webplus-cn-hongkong-s-5faf81e0d937f14c9ddbe5a0.oss-cn-hongkong.aliyuncs[.]com/flash_ins[.]exe BIOPASS RAT loader download URL hxxp://softres.oss-accelerate[.]aliyuncs[.]com/Silverlight[.]exe BIOPASS RAT loader download URL hxxp://flashdownloadserver[.]oss-cn-hongkong.aliyuncs[.]com/res/big.txt BIOPASS RAT script download URL hxxp://flashdownloadserver[.]oss-cn-hongkong.aliyuncs[.]com/res/Online.txt BIOPASS RAT script download URL hxxp://flashdownloadserver[.]oss-cn-hongkong.aliyuncs[.]com/res/files.zip Python runtime package download URL hxxp://flashdownloadserver[.]oss-cn-hongkong.aliyuncs[.]com/res/ServiceHub.zip Python runtime package download URL hxxp://flashdownloadserver[.]oss-cn-hongkong.aliyuncs[.]com/res/c1222.txt c1222 module script download URL hxxp://flashdownloadserver[.]oss-cn-hongkong.aliyuncs[.]com/res/cdaemon.txt cdaemon module download URL hxxp://flashdownloadserver[.]oss-cn-hongkong.aliyuncs[.]com/res/x.txt Cobalt Strike Python loader download URL hxxp://lualibs.oss-cn-hongkong[.]aliyuncs.com/x86/1-CS-443.lua Cobalt Strike Lua loader download URL hxxp://flashdownloadserver[.]oss-cn-hongkong.aliyuncs[.]com/res/s.txt Cobalt Strike shellcode download URL hxxp://flashdownloadserver[.]oss-cn-hongkong.aliyuncs[.]com/res/sc2.txt Cobalt Strike shellcode download URL hxxp://flashdownloadserver[.]oss-cn-hongkong.aliyuncs[.]com/res/sc3.txt Cobalt Strike shellcode download URL hxxp://flashdownloadserver[.]oss-cn-hongkong.aliyuncs[.]com/res/csplugins/getwechatdb.txt getwechatdb plug-in download URL hxxp://flashdownloadserver[.]oss-cn-hongkong.aliyuncs[.]com/res/csplugins/wechat.txt getwechatdb plug-in download URL hxxp://flashdownloadserver[.]oss-cn-hongkong.aliyuncs[.]com/res/csplugins/xss_spoof.zip xss_spoof plug-in download URL hxxp://flashdownloadserver[.]oss-cn-hongkong.aliyuncs[.]com/res/csplugins/xss.txt XSS payload download URL hxxp://flashdownloadserver[.]oss-cn-hongkong.aliyuncs[.]com/res/csplugins/script.txt XSS payload download URL hxxp://0x3s[.]com/x[.]js XSS injection URL Tags Malware | Endpoints | APT & Targeted Attacks | Research | Articles, News, Reports
|
[
{
"id": 10335,
"label": "malware",
"start_offset": 19,
"end_offset": 30
},
{
"id": 10337,
"label": "malware",
"start_offset": 162,
"end_offset": 173
},
{
"id": 10338,
"label": "SHA2",
"start_offset": 220,
"end_offset": 284
},
{
"id": 10339,
"label": "malware",
"start_offset": 315,
"end_offset": 326
},
{
"id": 10341,
"label": "malware",
"start_offset": 453,
"end_offset": 464
},
{
"id": 10343,
"label": "malware",
"start_offset": 602,
"end_offset": 613
},
{
"id": 10344,
"label": "MD5",
"start_offset": 655,
"end_offset": 719
},
{
"id": 10346,
"label": "SHA2",
"start_offset": 764,
"end_offset": 828
},
{
"id": 10350,
"label": "malware",
"start_offset": 1047,
"end_offset": 1058
},
{
"id": 10353,
"label": "malware",
"start_offset": 1145,
"end_offset": 1156
},
{
"id": 10356,
"label": "malware",
"start_offset": 1256,
"end_offset": 1267
},
{
"id": 10336,
"label": "SHA2",
"start_offset": 77,
"end_offset": 141
},
{
"id": 10345,
"label": "malware",
"start_offset": 731,
"end_offset": 738
},
{
"id": 10340,
"label": "SHA2",
"start_offset": 373,
"end_offset": 437
},
{
"id": 10342,
"label": "SHA2",
"start_offset": 506,
"end_offset": 570
},
{
"id": 10360,
"label": "tools",
"start_offset": 1371,
"end_offset": 1384
},
{
"id": 10347,
"label": "tools",
"start_offset": 854,
"end_offset": 867
},
{
"id": 10363,
"label": "malware",
"start_offset": 1648,
"end_offset": 1659
},
{
"id": 10365,
"label": "IPV4",
"start_offset": 2044,
"end_offset": 2062
},
{
"id": 10367,
"label": "IPV4",
"start_offset": 2090,
"end_offset": 2109
},
{
"id": 10369,
"label": "IPV4",
"start_offset": 2137,
"end_offset": 2157
},
{
"id": 10371,
"label": "IPV4",
"start_offset": 2185,
"end_offset": 2205
},
{
"id": 10374,
"label": "tools",
"start_offset": 2270,
"end_offset": 2283
},
{
"id": 10375,
"label": "malware",
"start_offset": 2405,
"end_offset": 2416
},
{
"id": 10376,
"label": "malware",
"start_offset": 2541,
"end_offset": 2552
},
{
"id": 10377,
"label": "malware",
"start_offset": 2640,
"end_offset": 2651
},
{
"id": 10378,
"label": "malware",
"start_offset": 2746,
"end_offset": 2757
},
{
"id": 10379,
"label": "malware",
"start_offset": 2855,
"end_offset": 2866
},
{
"id": 10380,
"label": "tools",
"start_offset": 3403,
"end_offset": 3416
},
{
"id": 10386,
"label": "attack-pattern",
"start_offset": 4328,
"end_offset": 4331
},
{
"id": 10387,
"label": "attack-pattern",
"start_offset": 4440,
"end_offset": 4443
},
{
"id": 10388,
"label": "attack-pattern",
"start_offset": 4492,
"end_offset": 4495
},
{
"id": 10382,
"label": "tools",
"start_offset": 3509,
"end_offset": 3522
},
{
"id": 10383,
"label": "tools",
"start_offset": 3619,
"end_offset": 3632
},
{
"id": 10384,
"label": "tools",
"start_offset": 3730,
"end_offset": 3743
},
{
"id": 10385,
"label": "tools",
"start_offset": 3841,
"end_offset": 3854
},
{
"id": 10370,
"label": "tools",
"start_offset": 2159,
"end_offset": 2172
},
{
"id": 10368,
"label": "tools",
"start_offset": 2111,
"end_offset": 2124
},
{
"id": 10372,
"label": "tools",
"start_offset": 2207,
"end_offset": 2220
},
{
"id": 10366,
"label": "tools",
"start_offset": 2064,
"end_offset": 2077
},
{
"id": 49152,
"label": "malware",
"start_offset": 482,
"end_offset": 504
},
{
"id": 49159,
"label": "DOMAIN",
"start_offset": 1293,
"end_offset": 1335
},
{
"id": 49166,
"label": "DOMAIN",
"start_offset": 1703,
"end_offset": 1733
},
{
"id": 49172,
"label": "DOMAIN",
"start_offset": 2233,
"end_offset": 2268
},
{
"id": 49141,
"label": "FILEPATH",
"start_offset": 0,
"end_offset": 17
},
{
"id": 49147,
"label": "FILEPATH",
"start_offset": 721,
"end_offset": 729
},
{
"id": 49148,
"label": "FILEPATH",
"start_offset": 830,
"end_offset": 852
},
{
"id": 49149,
"label": "attack-pattern",
"start_offset": 1684,
"end_offset": 1694
},
{
"id": 49150,
"label": "malware",
"start_offset": 196,
"end_offset": 218
},
{
"id": 49153,
"label": "malware",
"start_offset": 631,
"end_offset": 653
},
{
"id": 49154,
"label": "malware",
"start_offset": 740,
"end_offset": 762
},
{
"id": 49156,
"label": "DOMAIN",
"start_offset": 930,
"end_offset": 1011
},
{
"id": 49142,
"label": "malware",
"start_offset": 53,
"end_offset": 75
},
{
"id": 49151,
"label": "malware",
"start_offset": 349,
"end_offset": 371
},
{
"id": 49155,
"label": "malware",
"start_offset": 876,
"end_offset": 901
},
{
"id": 49162,
"label": "DOMAIN",
"start_offset": 1497,
"end_offset": 1538
},
{
"id": 49169,
"label": "DOMAIN",
"start_offset": 1888,
"end_offset": 1904
},
{
"id": 49170,
"label": "DOMAIN",
"start_offset": 1940,
"end_offset": 1957
},
{
"id": 49171,
"label": "DOMAIN",
"start_offset": 1993,
"end_offset": 2008
},
{
"id": 49143,
"label": "FILEPATH",
"start_offset": 143,
"end_offset": 160
},
{
"id": 49144,
"label": "FILEPATH",
"start_offset": 297,
"end_offset": 313
},
{
"id": 49145,
"label": "FILEPATH",
"start_offset": 439,
"end_offset": 451
},
{
"id": 49146,
"label": "FILEPATH",
"start_offset": 572,
"end_offset": 600
},
{
"id": 49157,
"label": "DOMAIN",
"start_offset": 1059,
"end_offset": 1109
},
{
"id": 49158,
"label": "DOMAIN",
"start_offset": 1166,
"end_offset": 1220
},
{
"id": 49160,
"label": "DOMAIN",
"start_offset": 1401,
"end_offset": 1443
},
{
"id": 49161,
"label": "DOMAIN",
"start_offset": 1497,
"end_offset": 1538
},
{
"id": 49189,
"label": "DOMAIN",
"start_offset": 4124,
"end_offset": 4211
},
{
"id": 49191,
"label": "DOMAIN",
"start_offset": 4354,
"end_offset": 4438
},
{
"id": 49163,
"label": "DOMAIN",
"start_offset": 1598,
"end_offset": 1646
},
{
"id": 49164,
"label": "DOMAIN",
"start_offset": 1672,
"end_offset": 1682
},
{
"id": 49165,
"label": "DOMAIN",
"start_offset": 1497,
"end_offset": 1538
},
{
"id": 49167,
"label": "DOMAIN",
"start_offset": 1836,
"end_offset": 1852
},
{
"id": 49168,
"label": "DOMAIN",
"start_offset": 1769,
"end_offset": 1800
},
{
"id": 49174,
"label": "DOMAIN",
"start_offset": 2438,
"end_offset": 2539
},
{
"id": 49175,
"label": "DOMAIN",
"start_offset": 2574,
"end_offset": 2638
},
{
"id": 49176,
"label": "DOMAIN",
"start_offset": 2673,
"end_offset": 2744
},
{
"id": 49178,
"label": "DOMAIN",
"start_offset": 2888,
"end_offset": 2961
},
{
"id": 49179,
"label": "DOMAIN",
"start_offset": 3000,
"end_offset": 3078
},
{
"id": 49181,
"label": "DOMAIN",
"start_offset": 3226,
"end_offset": 3301
},
{
"id": 49184,
"label": "DOMAIN",
"start_offset": 3548,
"end_offset": 3617
},
{
"id": 49188,
"label": "DOMAIN",
"start_offset": 4004,
"end_offset": 4088
},
{
"id": 49192,
"label": "DOMAIN",
"start_offset": 4466,
"end_offset": 4490
},
{
"id": 49173,
"label": "DOMAIN",
"start_offset": 2296,
"end_offset": 2403
},
{
"id": 49177,
"label": "DOMAIN",
"start_offset": 2779,
"end_offset": 2853
},
{
"id": 49180,
"label": "DOMAIN",
"start_offset": 3117,
"end_offset": 3190
},
{
"id": 49182,
"label": "DOMAIN",
"start_offset": 3332,
"end_offset": 3401
},
{
"id": 49183,
"label": "DOMAIN",
"start_offset": 3445,
"end_offset": 3507
},
{
"id": 49185,
"label": "DOMAIN",
"start_offset": 3657,
"end_offset": 3728
},
{
"id": 49186,
"label": "DOMAIN",
"start_offset": 3768,
"end_offset": 3839
},
{
"id": 49190,
"label": "DOMAIN",
"start_offset": 4245,
"end_offset": 4326
},
{
"id": 49187,
"label": "DOMAIN",
"start_offset": 3879,
"end_offset": 3968
}
] |
[] |
[] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.