id
int64 1
14.4k
| text
stringlengths 3
5.01k
| entities
list | relations
list | Comments
list |
|---|---|---|---|---|
3,185
|
If it receives any response with an expected string from these ports, the script will stop.
|
[] |
[] |
[] |
3,892
|
They must also confer with teams to develop and document what has occurred.
|
[] |
[] |
[] |
5,514
|
Although tens of thousands of websites have been caught out in this way, there are things you can do to stay safe—most notably by running Trend Micro Security.
|
[
{
"id": 51523,
"label": "identity",
"start_offset": 138,
"end_offset": 158
}
] |
[] |
[] |
12,626
|
If it is running Windows 10, it carries out several Windows 10-specific routines.
|
[] |
[] |
[] |
1,737
|
What causes it?
|
[] |
[] |
[] |
3,280
|
Open_Obs_Live
|
[] |
[] |
[] |
4,063
|
Download File 0x10003
|
[] |
[] |
[] |
1,993
|
Unit 42 has observed x4k in various hacking and non-hacking forums, which has linked the threat actor to additional malicious activity such as: Palo Alto Networks detects and prevents HelloXD and adjacent x4k activity with the following products and services: Cortex XDR and Next-Generation Firewalls (including cloud-delivered security subscriptions such as WildFire).
|
[
{
"id": 5898,
"label": "SOFTWARE",
"start_offset": 262,
"end_offset": 272
},
{
"id": 5891,
"label": "identity",
"start_offset": 1,
"end_offset": 8
},
{
"id": 5895,
"label": "malware",
"start_offset": 186,
"end_offset": 193
},
{
"id": 5902,
"label": "malware",
"start_offset": 361,
"end_offset": 369
},
{
"id": 47100,
"label": "threat-actor",
"start_offset": 22,
"end_offset": 25
},
{
"id": 47101,
"label": "identity",
"start_offset": 146,
"end_offset": 164
},
{
"id": 47102,
"label": "threat-actor",
"start_offset": 207,
"end_offset": 210
}
] |
[] |
[] |
13,107
|
In fact, Trend Micro is only the second cybersecurity specialist to join.
|
[] |
[] |
[] |
3,549
|
Tags Articles, News, Reports | APT & Targeted Attacks | Research
|
[] |
[] |
[] |
2,705
|
The vulnerability exists in the way that Internet Explorer accesses an object in memory that has been deleted or has not been properly allocated.
|
[
{
"id": 47946,
"label": "SOFTWARE",
"start_offset": 41,
"end_offset": 58
}
] |
[] |
[] |
2,293
|
Recent domains used for command and control:
|
[] |
[] |
[] |
4,444
|
This bulletin includes coordinated influence operation campaigns terminated on our platforms in Q2 2022.
|
[
{
"id": 50218,
"label": "TIME",
"start_offset": 96,
"end_offset": 103
}
] |
[] |
[] |
8,656
|
We did not recover additional payloads in our environment.
|
[] |
[] |
[] |
1,863
|
This variant is also capable of modifying other details of the installed security solutions, such as disabling the legal notice.
|
[] |
[] |
[] |
13,962
|
Trend Micro has a multilayered cybersecurity platform that can help improve your organization’s detection and response against the latest ransomware attacks and improve your organization’s visibility.
|
[] |
[] |
[] |
1,861
|
We think the same can be said for the software deployment tool, wherein the malicious actors can subsequently decide to replace and abuse it with other commercially available ones.
|
[] |
[] |
[] |
2,261
|
Stage 1 Stage 2 Stage 3 Stage 4 Stage 5
|
[] |
[] |
[] |
14,110
|
In our case, we collected many samples across 2020, and we found that the compile dates and times follow a logical timeline according to the malicious activity.
|
[] |
[] |
[] |
2,546
|
†These capabilities are part of the NGFW security subscriptions service.
|
[] |
[] |
[] |
9,749
|
The macro then runs the following command: "C:\Windows\System32\cmd.exe" /k %windir%\System32\reg.exe IMPORT %temp%\B.reg
|
[] |
[] |
[] |
3,161
|
Customers will welcome AWS native threat detection as a complement to their Trend Micro Cloud One capabilities, delivering a comprehensive range of features to secure the hybrid cloud.
|
[
{
"id": 48280,
"label": "identity",
"start_offset": 23,
"end_offset": 26
},
{
"id": 48281,
"label": "SOFTWARE",
"start_offset": 76,
"end_offset": 97
}
] |
[] |
[] |
6,513
|
Affected countries We observed Earth Vetala target the following sectors: Government Agencies Academia Tourism Trend Micro Solutions Earth Vetala represents an interesting threat.
|
[
{
"id": 20181,
"label": "threat-actor",
"start_offset": 35,
"end_offset": 47
},
{
"id": 20182,
"label": "location",
"start_offset": 48,
"end_offset": 54
},
{
"id": 20183,
"label": "location",
"start_offset": 99,
"end_offset": 107
},
{
"id": 20184,
"label": "location",
"start_offset": 123,
"end_offset": 128
},
{
"id": 20185,
"label": "threat-actor",
"start_offset": 139,
"end_offset": 151
}
] |
[] |
[] |
12,778
|
We’ve also seen PLEAD use exploits for these vulnerabilities: CVE-2015-5119, patched by Adobe last July, 2015 CVE-2012-0158, patched by Microsoft last April, 2012 CVE-2014-6352, patched by Microsoft last October, 2014 CVE-2017-0199, patched by Microsoft last April, 2017 PLEAD also dabbled with a short-lived, fileless version of their malware when it obtained an exploit for a Flash vulnerability (CVE-2015-5119) that was leaked during the Hacking Team breach.
|
[
{
"id": 39759,
"label": "malware",
"start_offset": 16,
"end_offset": 21
},
{
"id": 39771,
"label": "malware",
"start_offset": 274,
"end_offset": 279
},
{
"id": 39772,
"label": "location",
"start_offset": 300,
"end_offset": 305
},
{
"id": 39773,
"label": "threat-actor",
"start_offset": 444,
"end_offset": 456
}
] |
[] |
[] |
3,398
|
BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 75e03f40a088903579a436c0d8e8bc3d0d71cf2942ad793cc948f36866a2e1ad silverlight_ins.exe
|
[
{
"id": 10259,
"label": "malware",
"start_offset": 0,
"end_offset": 11
},
{
"id": 49060,
"label": "malware",
"start_offset": 20,
"end_offset": 44
},
{
"id": 10260,
"label": "SHA2",
"start_offset": 46,
"end_offset": 110
},
{
"id": 49061,
"label": "FILEPATH",
"start_offset": 112,
"end_offset": 131
}
] |
[
{
"id": 628,
"from_id": 49061,
"to_id": 10260,
"type": "duplicate-of"
},
{
"id": 629,
"from_id": 10259,
"to_id": 49060,
"type": "duplicate-of"
},
{
"id": 630,
"from_id": 10260,
"to_id": 49060,
"type": "indicates"
},
{
"id": 631,
"from_id": 49061,
"to_id": 49060,
"type": "indicates"
}
] |
[] |
8,386
|
We observed fewer than three dozen installs of this spyware.
|
[] |
[] |
[] |
7,954
|
Method B: Self modifying the APK This exploit can take advantage of the same vulnerability to mask what permissions the app really requires. This vulnerability affects Android device users as well as Android app developers. For Android device users, the users may end up with installing apps that are not the ones they agree to install. Android app developers are also affected, because app-store apps and mobile ads libraries that do not rely on Google Play store would be likely to save the promoted apps in unprotected storage, e.g. /sdcard.
|
[
{
"id": 24641,
"label": "location",
"start_offset": 48,
"end_offset": 51
},
{
"id": 24642,
"label": "location",
"start_offset": 74,
"end_offset": 78
},
{
"id": 24643,
"label": "threat-actor",
"start_offset": 96,
"end_offset": 100
},
{
"id": 24644,
"label": "location",
"start_offset": 264,
"end_offset": 267
},
{
"id": 24645,
"label": "location",
"start_offset": 301,
"end_offset": 304
},
{
"id": 24646,
"label": "location",
"start_offset": 365,
"end_offset": 368
},
{
"id": 24647,
"label": "location",
"start_offset": 407,
"end_offset": 410
},
{
"id": 24648,
"label": "location",
"start_offset": 411,
"end_offset": 417
},
{
"id": 24649,
"label": "location",
"start_offset": 479,
"end_offset": 485
},
{
"id": 24650,
"label": "location",
"start_offset": 489,
"end_offset": 493
}
] |
[] |
[] |
1,633
|
Unfortunately for them, this gave us additional insight into their operation.
|
[] |
[] |
[] |
5,002
|
Related IOCs
|
[] |
[] |
[] |
1,988
|
Unlike other ransomware groups, this ransomware family doesn’t have an active leak site; instead it prefers to direct the impacted victim to negotiations through TOX chat and onion-based messenger instances.
|
[
{
"id": 47098,
"label": "SOFTWARE",
"start_offset": 162,
"end_offset": 165
}
] |
[] |
[] |
5,001
|
Attackers are actively looking for and profiting from such slowly-fixed vulnerabilities.
|
[] |
[] |
[] |
4,299
|
Since these teams also handle the day-to-day IT requirements of the organization, taking on a more involved and proactive stance may not be easy.
|
[] |
[] |
[] |
4,866
|
Amnesty International has also reported on their campaigns.
|
[] |
[] |
[] |
8,378
|
We use our research to continuously improve the safety and security of our products and share this intelligence with our industry peers.
|
[
{
"id": 25792,
"label": "tools",
"start_offset": 48,
"end_offset": 54
},
{
"id": 25793,
"label": "location",
"start_offset": 55,
"end_offset": 58
},
{
"id": 25794,
"label": "location",
"start_offset": 59,
"end_offset": 67
},
{
"id": 25795,
"label": "location",
"start_offset": 84,
"end_offset": 87
},
{
"id": 25796,
"label": "location",
"start_offset": 121,
"end_offset": 129
}
] |
[] |
[] |
11,591
|
The Android app disguises itself as a legitimate Samsung application via its icon: When the user launches the application, a webview is opened that displays a legitimate website related to the icon.
|
[] |
[] |
[] |
5,202
|
Confidentiality and authenticity for this data is not protected even with DDS Security, making it possible for an attacker to spoof the information. CVE ID
|
[] |
[] |
[] |
5,484
|
hayat22 declined, saying she felt safer using Tweety Chat.
|
[
{
"id": 51478,
"label": "identity",
"start_offset": 0,
"end_offset": 7
},
{
"id": 51479,
"label": "SOFTWARE",
"start_offset": 46,
"end_offset": 52
}
] |
[] |
[] |
7,261
|
We recently discovered a new backdoor we believe to be related to the OceanLotus group.
|
[] |
[] |
[] |
4,086
|
Reused codes from open-source Lilith RAT In order to launch this RAT, the threat actors use a technique called "Phantom DLL hijacking."
|
[
{
"id": 49920,
"label": "malware",
"start_offset": 30,
"end_offset": 40
},
{
"id": 49921,
"label": "attack-pattern",
"start_offset": 116,
"end_offset": 137
}
] |
[] |
[] |
3,225
|
The HTTP service with marker BPSV3 We also observed other markers — such as, “cs_online”, “online”, and “dm_online”.
|
[] |
[] |
[] |
1,542
|
The Sofacy Group (AKA APT28, Grizzly Steppe, Fancy Bear, STRONTIUM, Sednit, Tsar Team, Pawn Storm) is a well-known hacking organization widely reported to be associated with Russia by the US Intelligence Community, numerous media reports and other cybersecurity companies.
|
[
{
"id": 45045,
"label": "threat-actor",
"start_offset": 4,
"end_offset": 16
},
{
"id": 45046,
"label": "threat-actor",
"start_offset": 22,
"end_offset": 27
},
{
"id": 45051,
"label": "threat-actor",
"start_offset": 76,
"end_offset": 85
},
{
"id": 45052,
"label": "threat-actor",
"start_offset": 87,
"end_offset": 97
},
{
"id": 45053,
"label": "location",
"start_offset": 174,
"end_offset": 180
},
{
"id": 45054,
"label": "identity",
"start_offset": 188,
"end_offset": 213
},
{
"id": 45047,
"label": "threat-actor",
"start_offset": 29,
"end_offset": 43
},
{
"id": 45048,
"label": "threat-actor",
"start_offset": 45,
"end_offset": 55
},
{
"id": 45049,
"label": "threat-actor",
"start_offset": 57,
"end_offset": 66
},
{
"id": 45050,
"label": "threat-actor",
"start_offset": 68,
"end_offset": 74
}
] |
[
{
"id": 59,
"from_id": 45045,
"to_id": 45053,
"type": "located-at"
},
{
"id": 60,
"from_id": 45046,
"to_id": 45053,
"type": "located-at"
},
{
"id": 62,
"from_id": 45048,
"to_id": 45053,
"type": "located-at"
},
{
"id": 63,
"from_id": 45049,
"to_id": 45053,
"type": "located-at"
},
{
"id": 64,
"from_id": 45050,
"to_id": 45053,
"type": "located-at"
},
{
"id": 68,
"from_id": 45046,
"to_id": 45045,
"type": "duplicate-of"
},
{
"id": 69,
"from_id": 45047,
"to_id": 45045,
"type": "duplicate-of"
},
{
"id": 65,
"from_id": 45051,
"to_id": 45053,
"type": "located-at"
},
{
"id": 66,
"from_id": 45052,
"to_id": 45053,
"type": "located-at"
},
{
"id": 70,
"from_id": 45048,
"to_id": 45045,
"type": "duplicate-of"
},
{
"id": 71,
"from_id": 45049,
"to_id": 45045,
"type": "duplicate-of"
},
{
"id": 72,
"from_id": 45050,
"to_id": 45045,
"type": "duplicate-of"
},
{
"id": 61,
"from_id": 45047,
"to_id": 45053,
"type": "located-at"
},
{
"id": 73,
"from_id": 45051,
"to_id": 45045,
"type": "duplicate-of"
},
{
"id": 74,
"from_id": 45052,
"to_id": 45045,
"type": "duplicate-of"
}
] |
[] |
9,494
|
The decrypted oRAT configuration The configuration is decrypted using the AES-GCM (AES with Galois/Counter Mode) algorithm.
|
[
{
"id": 29142,
"label": "malware",
"start_offset": 14,
"end_offset": 18
},
{
"id": 29143,
"label": "location",
"start_offset": 111,
"end_offset": 115
}
] |
[] |
[] |
4,426
|
Data from Google Takeout is also available upon request, but the option was only found in early builds.
|
[
{
"id": 50210,
"label": "SOFTWARE",
"start_offset": 10,
"end_offset": 24
}
] |
[] |
[] |
5,393
|
The timeline of several SSL certificates that were issued for Cyclops Blink C&Cs Our investigation shows that there are more than 200 Cyclops Blink victims around the world.
|
[
{
"id": 51386,
"label": "malware",
"start_offset": 139,
"end_offset": 152
}
] |
[] |
[] |
2,093
|
Ransomware is a lucrative operation if done correctly.
|
[] |
[] |
[] |
7,335
|
The backdoor changes the permission of the file it wants to execute to +x T1027 Obfuscated Files or Information Readable strings were encrypted T1036.005 Masquerading: Match Legitimate Name or Location The app bundle is disguised as a doc file to trick users into executing it T1070.006 Indicator Removal
|
[
{
"id": 22830,
"label": "attack-pattern",
"start_offset": 82,
"end_offset": 113
},
{
"id": 22831,
"label": "attack-pattern",
"start_offset": 159,
"end_offset": 171
}
] |
[] |
[] |
1,367
|
To demonstrate the difference, the following two commands run PHP code to show that a comparison of the string code with boolean true using == results in a boolean true, while the same comparison using === results in a boolean false: As a result of the analysis of the CVE-2021-32648 vulnerability, various product protections were created or enhanced.
|
[
{
"id": 46696,
"label": "vulnerability",
"start_offset": 270,
"end_offset": 284
}
] |
[] |
[] |
138
|
This post is also available in: 日本語 (Japanese)
|
[] |
[] |
[] |
3,043
|
And it’s always good to know about other features and capabilities, for example child safety controls.
|
[] |
[] |
[] |
1,549
|
The attackers are relying on the recipient to follow the instruction in the email and click “Enable Content”.
|
[] |
[] |
[] |
3,099
|
For all intents and purposes, it “patches” the vulnerabilities.
|
[] |
[] |
[] |
13,613
|
Figure 13.
|
[] |
[] |
[] |
2,891
|
s[_local28][(((_local41 - _local12) / 4) + 11)]
|
[] |
[] |
[] |
207
|
On Feb. 23, a malicious file named conhosts._exe (SHA256: 1bc44eef75779e3ca1eefb8ff5a64807dbc942b1e4a2672d77b9f6928d292591) was uploaded to a public malware repository from an organization in Kyiv, Ukraine.
|
[
{
"id": 678,
"label": "SHA2",
"start_offset": 58,
"end_offset": 122
},
{
"id": 44630,
"label": "location",
"start_offset": 192,
"end_offset": 205
},
{
"id": 44631,
"label": "FILEPATH",
"start_offset": 35,
"end_offset": 48
},
{
"id": 44632,
"label": "TIME",
"start_offset": 3,
"end_offset": 10
}
] |
[
{
"id": 133,
"from_id": 678,
"to_id": 44631,
"type": "indicates"
}
] |
[] |
12,676
|
It was last updated on May 12, 2022.
|
[] |
[] |
[] |
11,581
|
The app is broken up into multiple parts.
|
[] |
[] |
[] |
4,157
|
Based on previous experience, Rclone has frequently been used in ransomware attacks to exfiltrate stolen data.
|
[
{
"id": 12490,
"label": "tools",
"start_offset": 31,
"end_offset": 37
}
] |
[] |
[] |
177
|
In some ways, ransomware is a threat unlike any other.
|
[] |
[] |
[] |
11,342
|
HYPERSCRAPE then begins iterating through all available tabs in the inbox looking for emails to download.
|
[] |
[] |
[] |
7,356
|
Figure 1.
|
[] |
[] |
[] |
4,205
|
During the months that followed in which we tracked Confucius’ activities, we found that they were still aiming for Pakistani targets.
|
[
{
"id": 50019,
"label": "location",
"start_offset": 116,
"end_offset": 125
},
{
"id": 50018,
"label": "threat-actor",
"start_offset": 52,
"end_offset": 61
}
] |
[
{
"id": 902,
"from_id": 50018,
"to_id": 50019,
"type": "targets"
}
] |
[] |
3,391
|
flash.exe
|
[
{
"id": 49044,
"label": "malware",
"start_offset": 0,
"end_offset": 10
}
] |
[] |
[] |
155
|
From an operating system point of view, the ransomware IS the user.
|
[] |
[] |
[] |
14,164
|
Having multiple vendors for different areas of security results in silos and segmentation due to a lack of integration across the security industry, but XDR could bring a shift in this practice as they include more support for 3rd party intelligence feeds.
|
[] |
[] |
[] |
4,964
|
Indicators from APT28 phishing campaign: service-reset-password-moderate-digital.rf[.]gd reset-service-identity-mail.42web[.]io digital-email-software.great-site[.]net Indicators from APT35 campaigns: Abused Google Properties: https://sites.google[.]com/view/ty85yt8tg8-download-rtih4ithr/ https://sites.google[.]com/view/user-id-568245/ https://sites.google[.]com/view/hhbejfdwdhwuhscbsb-xscvhdvbc/ Abused Dropbox Properties: https://www.dropbox[.]com/s/68y4vpfu8pc3imf/Iraq&Jewish.pdf Phishing Domains: nco2[.]live summit-files[.]com filetransfer[.]club continuetogo[.]me accessverification[.]online customers-verification-identifier[.]site service-activity-session[.]online identifier-service-review[.]site recovery-activity-identification[.]site review-session-confirmation[.]site recovery-service-activity[.]site verify-service-activity[.]site service-manager-notifications[.]info
|
[
{
"id": 50995,
"label": "URL",
"start_offset": 430,
"end_offset": 489
},
{
"id": 50987,
"label": "threat-actor",
"start_offset": 16,
"end_offset": 21
},
{
"id": 50988,
"label": "DOMAIN",
"start_offset": 42,
"end_offset": 88
},
{
"id": 50989,
"label": "DOMAIN",
"start_offset": 89,
"end_offset": 127
},
{
"id": 50990,
"label": "DOMAIN",
"start_offset": 128,
"end_offset": 167
},
{
"id": 50993,
"label": "URL",
"start_offset": 292,
"end_offset": 339
},
{
"id": 50994,
"label": "URL",
"start_offset": 340,
"end_offset": 401
},
{
"id": 50996,
"label": "DOMAIN",
"start_offset": 509,
"end_offset": 520
},
{
"id": 50997,
"label": "DOMAIN",
"start_offset": 521,
"end_offset": 539
},
{
"id": 51001,
"label": "DOMAIN",
"start_offset": 606,
"end_offset": 646
},
{
"id": 51002,
"label": "DOMAIN",
"start_offset": 647,
"end_offset": 680
},
{
"id": 51003,
"label": "DOMAIN",
"start_offset": 681,
"end_offset": 713
},
{
"id": 51004,
"label": "DOMAIN",
"start_offset": 714,
"end_offset": 753
},
{
"id": 51005,
"label": "DOMAIN",
"start_offset": 754,
"end_offset": 788
},
{
"id": 51006,
"label": "DOMAIN",
"start_offset": 789,
"end_offset": 821
},
{
"id": 51007,
"label": "DOMAIN",
"start_offset": 822,
"end_offset": 852
},
{
"id": 51008,
"label": "DOMAIN",
"start_offset": 853,
"end_offset": 889
},
{
"id": 50991,
"label": "threat-actor",
"start_offset": 185,
"end_offset": 190
},
{
"id": 50992,
"label": "URL",
"start_offset": 229,
"end_offset": 290
},
{
"id": 50998,
"label": "DOMAIN",
"start_offset": 540,
"end_offset": 559
},
{
"id": 50999,
"label": "DOMAIN",
"start_offset": 560,
"end_offset": 577
},
{
"id": 51000,
"label": "DOMAIN",
"start_offset": 578,
"end_offset": 605
}
] |
[] |
[] |
4,189
|
Create or Modify System Process: Windows Service T1574.002
|
[
{
"id": 49991,
"label": "attack-pattern",
"start_offset": 0,
"end_offset": 58
}
] |
[] |
[] |
206
|
The Ukrainian CERT did identify a post on RaidForums from a user named “Carzita” that suggested that additional actors may also be launching DDoS and defacement attacks for undisclosed reasons.
|
[
{
"id": 45901,
"label": "identity",
"start_offset": 4,
"end_offset": 18
},
{
"id": 45903,
"label": "identity",
"start_offset": 72,
"end_offset": 79
},
{
"id": 45902,
"label": "identity",
"start_offset": 42,
"end_offset": 52
},
{
"id": 45904,
"label": "attack-pattern",
"start_offset": 141,
"end_offset": 145
},
{
"id": 45905,
"label": "attack-pattern",
"start_offset": 150,
"end_offset": 168
}
] |
[] |
[] |
1,840
|
Figure 18.
|
[] |
[] |
[] |
14,224
|
After decryption, partial code is run on the machine, which is then injected to svchost.exe (a key Windows component); payload is then loaded into memory.
|
[
{
"id": 48253,
"label": "SOFTWARE",
"start_offset": 80,
"end_offset": 91
}
] |
[] |
[] |
12,560
|
After downloading the payload, it removes the quarantine attribute of the file to bypass Gatekeeper.
|
[
{
"id": 39076,
"label": "tools",
"start_offset": 89,
"end_offset": 99
}
] |
[] |
[] |
10,500
|
NOTE: On May 20th, we updated our attribution to more precisely describe our findings.
|
[] |
[] |
[] |
13,003
|
Both pages from this campaign are shown below.
|
[] |
[] |
[] |
2,333
|
It then elevated privileges to install the payload.
|
[] |
[] |
[] |
5,139
|
Most of us in a home have a grocery list and maybe once a week—maybe twice–we head to the grocery store and we try to get everything we want off the list and then we come back.
|
[] |
[] |
[] |
10,425
|
Carries the malicious script and AutoHotkeyU32.ahk 43FBDA74A65668333727C6512562DB4F9E712CF1D5AD9DCA8F06AE51BB937BA2 hscreen.ahk TSPY_HTV.ZJGD-A Takes screen captures ACB3181D0408C908B2A434FC004BF24FB766D4CF68BF2978BC5653022F9F20BE AutoHotkeyU32.ahk BKDR_HTV.ZKGD-A Loads the malicious script BE6C6B0942AD441953B0ED0C4327B9DED8A94E836EACA070ACA3988BADB31858 hinfo.ahk TSPY_HTV.ZLGD-A Gets the computer name F64792324839F660B9BDFDA95501A568C076641CF08CE63C1DDBE29B45623AC0 htv.ahk
|
[
{
"id": 31688,
"label": "location",
"start_offset": 29,
"end_offset": 32
},
{
"id": 31689,
"label": "SHA2",
"start_offset": 51,
"end_offset": 115
},
{
"id": 31690,
"label": "SHA2",
"start_offset": 166,
"end_offset": 230
},
{
"id": 31691,
"label": "SHA2",
"start_offset": 292,
"end_offset": 356
},
{
"id": 31692,
"label": "SHA2",
"start_offset": 406,
"end_offset": 470
}
] |
[] |
[] |
8,242
|
Always verify requests.
|
[] |
[] |
[] |
6,153
|
Figure 1.
|
[] |
[] |
[] |
684
|
While still not seen in the wild, similar exploits in Microsoft Equation Editor, such as such as CVE-2018-0807 and CVE-2018-0798, were identified by Unit 42 researchers.
|
[
{
"id": 2275,
"label": "identity",
"start_offset": 149,
"end_offset": 156
},
{
"id": 44827,
"label": "SOFTWARE",
"start_offset": 54,
"end_offset": 79
},
{
"id": 44824,
"label": "vulnerability",
"start_offset": 97,
"end_offset": 110
},
{
"id": 44825,
"label": "vulnerability",
"start_offset": 115,
"end_offset": 128
}
] |
[
{
"id": 29,
"from_id": 44827,
"to_id": 44825,
"type": "has"
},
{
"id": 28,
"from_id": 44827,
"to_id": 44824,
"type": "has"
}
] |
[] |
3,005
|
Because of this, make sure you’re using good, strong unique passwords for the apps you use on these devices.
|
[] |
[] |
[] |
4,794
|
Google is investing heavily as a company and as an industry to counter serious threats to our users.
|
[
{
"id": 50695,
"label": "identity",
"start_offset": 0,
"end_offset": 6
}
] |
[] |
[] |
2,023
|
This particular packer seems to be more common on x64 binaries and involves decrypting embedded blobs using a seemingly custom algorithm containing unconventional instructions such as XLAT (Figure 6). Aside from storing the encrypted second layer, there is little to no obfuscation within the packer; API calls such as VirtualAlloc and VirtualProtect are clearly visible, and there is no control flow obfuscation.
|
[] |
[] |
[] |
6,895
|
In 2019, we sent almost 40,000 warnings, a nearly 25 percent drop from 2018.
|
[] |
[] |
[] |
14,007
|
Consequently, some of the attribution indicators will span and include the previous SLUB malware campaigns.
|
[
{
"id": 43413,
"label": "malware",
"start_offset": 84,
"end_offset": 88
}
] |
[] |
[] |
1,873
|
We also worked closely with Microsoft, so they released a block in the Windows operating system (10 and 11), so the old version of the Avast driver can't be loaded to memory.
|
[
{
"id": 46995,
"label": "SOFTWARE",
"start_offset": 71,
"end_offset": 107
},
{
"id": 46994,
"label": "identity",
"start_offset": 28,
"end_offset": 37
},
{
"id": 46996,
"label": "SOFTWARE",
"start_offset": 135,
"end_offset": 147
}
] |
[] |
[] |
9,329
|
The following Trend Micro solutions, powered by XGen™ security, protect users and businesses by blocking the scripts and preventing access to the malicious domains: Trend Micro™ Security Smart Protection Suites and Worry-Free™ Business Security Trend Micro Network Defense Hybrid Cloud Security Indicators of Compromise (IoCs) Indicator Attribution 30c8be0d9deb59d98f7e047579763559f2c2dd9a7b4477636afcbebaaebc7dc5 Mirrorthief skimming script hash (detected as Trojan.JS.MIRRORTHEIF.AA) cloudmetric-analytics[.]com Mirrorthief malicious domain hxxps://cloudmetric-analytics[.]com/ga[.]js
|
[
{
"id": 28787,
"label": "location",
"start_offset": 54,
"end_offset": 62
},
{
"id": 28788,
"label": "location",
"start_offset": 78,
"end_offset": 81
},
{
"id": 28789,
"label": "location",
"start_offset": 117,
"end_offset": 120
},
{
"id": 28790,
"label": "location",
"start_offset": 172,
"end_offset": 177
},
{
"id": 28791,
"label": "location",
"start_offset": 179,
"end_offset": 187
},
{
"id": 28792,
"label": "location",
"start_offset": 194,
"end_offset": 204
},
{
"id": 28793,
"label": "location",
"start_offset": 212,
"end_offset": 215
},
{
"id": 28794,
"label": "location",
"start_offset": 237,
"end_offset": 245
},
{
"id": 28795,
"label": "location",
"start_offset": 252,
"end_offset": 257
},
{
"id": 28796,
"label": "location",
"start_offset": 281,
"end_offset": 286
},
{
"id": 28797,
"label": "location",
"start_offset": 287,
"end_offset": 295
},
{
"id": 28798,
"label": "SHA1",
"start_offset": 352,
"end_offset": 416
}
] |
[] |
[] |
12,426
|
In addition to targeting users via social engineering, we have also observed several cases where researchers have been compromised after visiting the actors’ blog.
|
[] |
[] |
[] |
11,083
|
We terminated 3 YouTube channels as part of our investigation into coordinated influence operations linked to France.
|
[] |
[] |
[] |
13,120
|
A tech tipping point We all know why global organizations are turning in their droves to cloud computing services and infrastructure.
|
[] |
[] |
[] |
9,212
|
Executives and decision-makers must understand that cybersecurity is not just an IT issue but a major element that affects the entire organization and its operations.
|
[
{
"id": 28446,
"label": "location",
"start_offset": 11,
"end_offset": 14
},
{
"id": 28447,
"label": "identity",
"start_offset": 73,
"end_offset": 77
},
{
"id": 28448,
"label": "location",
"start_offset": 84,
"end_offset": 89
},
{
"id": 28449,
"label": "location",
"start_offset": 96,
"end_offset": 101
},
{
"id": 28450,
"label": "location",
"start_offset": 147,
"end_offset": 150
}
] |
[] |
[] |
302
|
By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.
|
[] |
[] |
[] |
3,908
|
In as little as 15 bytes, web shells can enable remote administration of an infected machine or system.
|
[
{
"id": 49757,
"label": "attack-pattern",
"start_offset": 26,
"end_offset": 36
}
] |
[] |
[] |
10,840
|
MSG_COLLECT
|
[] |
[] |
[] |
4,690
|
TAG is committed to sharing research to raise awareness on bad actors like Charming Kitten within the security community, and for companies and individuals that may be targeted.
|
[
{
"id": 50576,
"label": "identity",
"start_offset": 0,
"end_offset": 3
},
{
"id": 50577,
"label": "threat-actor",
"start_offset": 75,
"end_offset": 90
}
] |
[] |
[] |
13,988
|
Do you think the evolution of EDR to XDR will meet many of challenges we are seeing today?
|
[
{
"id": 48778,
"label": "SOFTWARE",
"start_offset": 30,
"end_offset": 34
},
{
"id": 48779,
"label": "SOFTWARE",
"start_offset": 37,
"end_offset": 41
}
] |
[] |
[] |
6,503
|
newsblog.js
|
[] |
[] |
[] |
3,344
|
The server-side variant has also been noted to be used as a malware loader by the Winnti Group.
|
[
{
"id": 48956,
"label": "threat-actor",
"start_offset": 82,
"end_offset": 94
}
] |
[] |
[] |
7,716
|
Both versions tried to download and execute files km1 or km2, an .MSI installer that executes the FlawedAmmyy downloader.
|
[
{
"id": 23972,
"label": "location",
"start_offset": 32,
"end_offset": 35
},
{
"id": 23973,
"label": "malware",
"start_offset": 98,
"end_offset": 109
}
] |
[] |
[] |
3,907
|
Web shells can be embedded on web servers and can be used by malicious actors to launch arbitrary code.
|
[
{
"id": 49755,
"label": "attack-pattern",
"start_offset": 81,
"end_offset": 102
},
{
"id": 49756,
"label": "attack-pattern",
"start_offset": 0,
"end_offset": 10
}
] |
[] |
[] |
2,386
|
It has many of the same capabilities as another backdoor, Crosswalk, which has also been used by Earth Baku.
|
[
{
"id": 47451,
"label": "threat-actor",
"start_offset": 97,
"end_offset": 107
},
{
"id": 47450,
"label": "malware",
"start_offset": 58,
"end_offset": 67
}
] |
[
{
"id": 330,
"from_id": 47451,
"to_id": 47450,
"type": "uses"
}
] |
[] |
9,035
|
In addition to the backdoor’s modus operandi, the attackers will use a Microsoft WMI command-line tool to list the compromised system’s running processes, which are sent to the C&C server: “C:\Windows\system32\cmd.exe” /c “wmic process get processid,commandline,sessionid | findstr SysWOW” “C:\Windows\system32\cmd.exe” /c “wmic process get processid,commandline,sessionid | findstr x86” Technical Analysis
|
[
{
"id": 27915,
"label": "location",
"start_offset": 63,
"end_offset": 67
},
{
"id": 27916,
"label": "identity",
"start_offset": 74,
"end_offset": 83
},
{
"id": 27917,
"label": "location",
"start_offset": 101,
"end_offset": 105
},
{
"id": 27918,
"label": "location",
"start_offset": 109,
"end_offset": 113
},
{
"id": 27919,
"label": "location",
"start_offset": 164,
"end_offset": 167
}
] |
[] |
[] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.