id
int64
1
14.4k
text
stringlengths
3
5.01k
entities
list
relations
list
Comments
list
2,776
Before, drive-by attacks focused on abusing a browser’s legitimate download capabilities to download malware onto the victim’s system without their consent or knowledge.
[ { "id": 48005, "label": "attack-pattern", "start_offset": 92, "end_offset": 108 } ]
[]
[]
2,071
We learned how this threat actor leverages Cobalt Strike for his operations, including how to set up Beacons as well as how to send files to compromised systems.
[ { "id": 47158, "label": "tools", "start_offset": 43, "end_offset": 56 } ]
[]
[]
903
This key is also sent via a HTTP POST request.
[]
[]
[]
11,800
Targets typically had to navigate through at least one redirect before landing on a phishing domain.
[ { "id": 36392, "label": "location", "start_offset": 71, "end_offset": 78 }, { "id": 36393, "label": "attack-pattern", "start_offset": 84, "end_offset": 92 } ]
[]
[]
8,558
In this blog, we explore some of the most notable campaigns we’ve disrupted this year from a different government-backed attacker: APT35, an Iranian group, which regularly conducts phishing campaigns targeting high risk users.
[ { "id": 26438, "label": "location", "start_offset": 37, "end_offset": 41 }, { "id": 26442, "label": "attack-pattern", "start_offset": 181, "end_offset": 189 } ]
[]
[]
700
Prevention Palo Alto Networks Traps advanced endpoint protection offers multiple methods of malware and exploit prevention to protect against these threats:
[ { "id": 2316, "label": "identity", "start_offset": 12, "end_offset": 30 } ]
[]
[]
4,438
It’s why we do things like work with our CyberCrime Investigation Group to share critical information relevant to law enforcement.
[ { "id": 50213, "label": "identity", "start_offset": 41, "end_offset": 71 } ]
[]
[]
1,038
However, this malicious seller activity may also reveal a larger scale problem within university systems.
[]
[]
[]
14,320
After that, the malware will collect the username and password inputs from web pages and sends it to hxxps://miakhalifagame[.]com/testinn[.]php.
[ { "id": 48545, "label": "URL", "start_offset": 101, "end_offset": 144 } ]
[]
[]
10,899
The sample 74582c3d920332117541a9bbc6b8995fbe7e1aff communicates with the URL https://www.upn-sec3-msd[.]com/ProxyServer/service/.
[ { "id": 33180, "label": "location", "start_offset": 4, "end_offset": 10 }, { "id": 33181, "label": "MD5", "start_offset": 11, "end_offset": 51 }, { "id": 33182, "label": "URL", "start_offset": 79, "end_offset": 94 } ]
[]
[]
4,763
And we offer other advanced phishing and malware protection to administrators to better protect their users.
[]
[]
[]
8,736
Host IOCs Registry Keys HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\KernelConfig HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\DriverConfig HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SSL Update File Paths C:\Windows\System32\Nwsapagent.sys C:\Windows\System32\helpsvc.sys C:\ProgramData\USOShared\uso.bin C:\ProgramData\VMware\vmnat-update.bin C:\ProgramData\VirtualBox\update.bin
[ { "id": 26989, "label": "location", "start_offset": 0, "end_offset": 4 }, { "id": 26990, "label": "REGISTRYKEY", "start_offset": 24, "end_offset": 83 }, { "id": 26991, "label": "REGISTRYKEY", "start_offset": 84, "end_offset": 143 }, { "id": 26992, "label": "REGISTRYKEY", "start_offset": 144, "end_offset": 198 } ]
[]
[]
1,233
For instance: To improve the security of IAP, some payment platforms try to add a verification step in order to confirm an SMS was really sent by the user, for example, it will ask the user to reply with certain text that was sent to a phone number specified by the user.
[]
[]
[]
10,529
It was last updated on May 27, 2020.
[]
[]
[]
13,040
This week, learn about Trend Micro’s latest cloud security offering, Cloud One – Application Security.
[ { "id": 48878, "label": "identity", "start_offset": 23, "end_offset": 35 }, { "id": 48879, "label": "SOFTWARE", "start_offset": 69, "end_offset": 101 } ]
[]
[]
878
When initially executed, PClock2 performs a very simple anti-analysis check where it will sleep for a random amount of time and compare the time spent sleeping against a set value.
[ { "id": 46412, "label": "malware", "start_offset": 26, "end_offset": 33 } ]
[]
[]
1,976
A crafted packet could set the “CookieSize” field to 0x20 and have the actual cookie buffer contain less than 0x20 bytes of data. When a DTLS client receives a HelloVerifyRequest packet with a CookieSize larger than 32 bytes the client does not properly validate the CookieSize value against the amount of cookie data in the packet.
[]
[]
[]
13,809
If yes, it replaces the PID to be opened with another Windows Service PID that has been written by the Waterbear loader in the beginning.
[]
[]
[]
8,127
Overlay screen
[]
[]
[]
11,041
It was last updated on January 26, 2021.
[]
[]
[]
9,661
Backdoor analysis
[]
[]
[]
2,255
Finally, the malware will parse the third line, which instructs the malware to modify the wait interval to a value of ‘60’.
[]
[]
[]
3,178
Furthermore, BIOPASS RAT also creates scheduled tasks to load the Cobalt Strike shellcode during the initialization, indicating that the malicious actor behind the attack still heavily relies on Cobalt Strike.
[ { "id": 48304, "label": "malware", "start_offset": 13, "end_offset": 24 }, { "id": 48305, "label": "tools", "start_offset": 66, "end_offset": 79 }, { "id": 48306, "label": "tools", "start_offset": 195, "end_offset": 208 } ]
[ { "id": 402, "from_id": 48304, "to_id": 48305, "type": "uses" } ]
[]
5,132
Most defenses, traditional defenses worry about that north/south traffic.
[]
[]
[]
1,110
There are many common mutexes shared across both benign software and malware.
[]
[]
[]
14,104
They also have some changes that make sense, such as removing the error “failed to take…,” since this is not required for the malware functionality.
[]
[]
[]
7,881
Google could reverse this situation by making setting the android:allowBackup property to false by default, requiring developers to opt-in to the backup system, rather than opt-out.
[]
[]
[]
4,870
After compromising an account, the actor maintains persistence by granting themselves an OAuth token to a legitimate email app like Thunderbird, or by linking the victim Gmail account to an attacker-owned account on a third-party mail provider.
[ { "id": 50872, "label": "SOFTWARE", "start_offset": 132, "end_offset": 143 }, { "id": 50873, "label": "SOFTWARE", "start_offset": 170, "end_offset": 175 } ]
[]
[]
8,177
Thank you for your understanding.
[]
[]
[]
13,976
However, it doesn’t adequately address the reality of the non-linear nature of attacks.
[]
[]
[]
9,619
Microsoft Live DLL 1a831a79a932edd0398f46336712eff90ebb5164a189ef38c4dacc64ba84fe23 PDB E:\Working\Projects\EmailDownloader\EmailDownloaderCookieMode\EmailDownloader\obj\Debug\EmailDownloader.pdb
[ { "id": 29473, "label": "identity", "start_offset": 0, "end_offset": 9 }, { "id": 29474, "label": "SHA1", "start_offset": 19, "end_offset": 83 } ]
[]
[]
1,673
The value in the command byte determines which of the commands is run through a 76 way switch statement.
[]
[]
[]
866
In order to decrypt these files, the victim must provide a ransom, or payment, to the attacker, often in the form of a digital currency.
[]
[]
[]
11,793
In May 2020, we discovered that APT35 attempted to upload spyware to the Google Play Store.
[]
[]
[]
4,310
The NSO Group’s spyware spurred a collaborative investigation that found that it was being used to target high-ranking individuals in 11 different countries.
[ { "id": 50108, "label": "threat-actor", "start_offset": 4, "end_offset": 13 } ]
[]
[]
9,405
Used to enumerate external storage file system Discovery Location Tracking T1430 Used to track device’s location Collection Access Call Log T1433 Used to gather call log data Collection Access Contact List T1432 Used to gather contact list data
[ { "id": 28949, "label": "attack-pattern", "start_offset": 57, "end_offset": 74 }, { "id": 28950, "label": "attack-pattern", "start_offset": 124, "end_offset": 139 }, { "id": 28951, "label": "location", "start_offset": 161, "end_offset": 165 }, { "id": 28952, "label": "attack-pattern", "start_offset": 186, "end_offset": 205 }, { "id": 28953, "label": "location", "start_offset": 227, "end_offset": 234 }, { "id": 28954, "label": "location", "start_offset": 235, "end_offset": 239 } ]
[]
[]
3,192
It is important to note that both Adobe Flash and Microsoft Silverlight have already been deprecated by their respective vendors.
[ { "id": 48318, "label": "SOFTWARE", "start_offset": 34, "end_offset": 45 }, { "id": 48319, "label": "SOFTWARE", "start_offset": 50, "end_offset": 71 } ]
[]
[]
14,225
Figure 4: Execution/infection flow of loadoerf.ini
[ { "id": 48411, "label": "FILEPATH", "start_offset": 38, "end_offset": 50 } ]
[]
[]
3,294
2. “python”: executes a Python script delivered with the command.
[ { "id": 48382, "label": "SOFTWARE", "start_offset": 29, "end_offset": 35 } ]
[]
[]
11,383
We use our research to continuously improve the safety and security of our products and share this intelligence with our industry peers.
[ { "id": 34751, "label": "tools", "start_offset": 48, "end_offset": 54 }, { "id": 34752, "label": "location", "start_offset": 55, "end_offset": 58 }, { "id": 34753, "label": "location", "start_offset": 59, "end_offset": 67 }, { "id": 34754, "label": "location", "start_offset": 84, "end_offset": 87 }, { "id": 34755, "label": "location", "start_offset": 121, "end_offset": 129 } ]
[]
[]
1,885
In this case we dig deeper into the possible connection between cyberattacks by focusing on the similarities an unnamed threat actor shares with Confucius, Patchwork, and another threat actor called Bahamut.
[ { "id": 47014, "label": "threat-actor", "start_offset": 156, "end_offset": 165 }, { "id": 47013, "label": "threat-actor", "start_offset": 145, "end_offset": 154 }, { "id": 47015, "label": "threat-actor", "start_offset": 199, "end_offset": 206 } ]
[]
[]
10,254
Starting from August 2020, Pawn Storm has sent several spear phishing emails with a malicious RAR attachment.
[ { "id": 31347, "label": "threat-actor", "start_offset": 27, "end_offset": 37 }, { "id": 31348, "label": "attack-pattern", "start_offset": 55, "end_offset": 69 } ]
[]
[]
2,982
If you have kids, avoid the temptation to let them all use one account or accounts without passwords: this is a chance for them to start to learn the right way to handle passwords by giving them their own and teaching them to never share that password.
[]
[]
[]
8,653
After a fingerprinting phase, similar to the one used with the Chrome exploit above, users were served an Internet Explorer 0-day.
[ { "id": 26723, "label": "attack-pattern", "start_offset": 8, "end_offset": 22 }, { "id": 26724, "label": "location", "start_offset": 45, "end_offset": 48 } ]
[]
[]
4,705
For example, TAG has been closely tracking and disrupting campaigns targeting individuals and organizations in Ukraine, and frequently publishes reports on Russian threat actors.
[ { "id": 50593, "label": "identity", "start_offset": 13, "end_offset": 16 }, { "id": 50594, "label": "location", "start_offset": 111, "end_offset": 118 }, { "id": 50595, "label": "location", "start_offset": 156, "end_offset": 163 } ]
[]
[]
8,902
Both events never or rarely happened in the victim’s environment.
[]
[]
[]
7,934
Android supports the ability to install apps from the Google Play store as well as from the local file system.
[]
[]
[]
565
The encrypted file icon will look the same as usual, but after opening the infected file, the ransom note will pop up.
[]
[]
[]
1,444
If a developer wants to use a different certificate, they must publish the update separately as a new app.
[]
[]
[]
3,165
Customers, cloud providers and security vendors have a shared responsibility to work together as the threat landscape continues to evolve.
[]
[]
[]
545
Some ransomware families, including Babuk, Sodinokibi, Cerber, Mailto, Ryuk and others, seldom show the ransom amount or cryptocurrency wallet address.
[ { "id": 46160, "label": "malware", "start_offset": 44, "end_offset": 54 }, { "id": 46159, "label": "malware", "start_offset": 37, "end_offset": 42 }, { "id": 46161, "label": "malware", "start_offset": 56, "end_offset": 62 }, { "id": 46163, "label": "malware", "start_offset": 72, "end_offset": 76 }, { "id": 46162, "label": "malware", "start_offset": 64, "end_offset": 70 } ]
[]
[]
7,363
/tmp
[]
[]
[]
6,356
The implanted code begins when the DLL is loaded via DLL_PROCESS_ATTACH and performs the following at the DLLMain subroutine: The technique outlined above uses process injection via undocumented Windows NTAPI calls.
[ { "id": 19727, "label": "location", "start_offset": 72, "end_offset": 75 }, { "id": 19728, "label": "attack-pattern", "start_offset": 161, "end_offset": 178 } ]
[]
[]
13,492
Cybercriminals have different motivations: for example, some malicious actors have disruptive political attacks as their objective, while others might be more inclined towards cyberespionage and gathering information on their victims.
[]
[]
[]
1,459
For example, the number of certificates used by only one app is 1,323.
[]
[]
[]
1,425
As described in Google’s official document, the app developer is required to create a keystore with a set of private keys, and then use the private key to generate a signed version of apps.
[ { "id": 46763, "label": "identity", "start_offset": 16, "end_offset": 22 } ]
[]
[]
4,825
An example of this technique, used to target Facebook users, can be seen in the screenshot below.
[ { "id": 50772, "label": "SOFTWARE", "start_offset": 45, "end_offset": 53 } ]
[]
[]
5,987
In mid-April, TAG detected a Ghostwriter credential phishing campaign targeting Facebook users.
[ { "id": 18430, "label": "attack-pattern", "start_offset": 52, "end_offset": 60 }, { "id": 18431, "label": "location", "start_offset": 61, "end_offset": 69 } ]
[]
[]
88
Attackers will soon begin targeting devices with higher specifications to get more bang for their buck.
[]
[]
[]
1,084
In fact, over 15% of all collected worms share a single mutex [2gvwnqjz].
[]
[]
[]
3,180
In this blog entry, we will dive deeper into BIOPASS RAT with a detailed technical analysis of the infection chain, the different components of the malware, and any possible associations with Winnti.
[ { "id": 48309, "label": "threat-actor", "start_offset": 192, "end_offset": 198 }, { "id": 48310, "label": "malware", "start_offset": 45, "end_offset": 56 } ]
[ { "id": 404, "from_id": 48310, "to_id": 48309, "type": "related-to" } ]
[]
13,606
Clicking on the “Install now” button downloads a .ZIP archive, which contains several legitimate files as well as a few malicious ones, which are usually in form of DLL libraries.
[]
[]
[]
2,476
This particular webshell is based on AntSword’s shell.jsp, which was modified to use a parameter of k3rwin instead of ant to load the class.
[ { "id": 7400, "label": "tools", "start_offset": 37, "end_offset": 45 }, { "id": 47549, "label": "identity", "start_offset": 100, "end_offset": 106 }, { "id": 47548, "label": "FILEPATH", "start_offset": 48, "end_offset": 57 } ]
[ { "id": 336, "from_id": 7400, "to_id": 47548, "type": "consists-of" } ]
[]
8,038
Although Play Store users were protected, we are highlighting the app here as TAG has seen APT35 attempt to distribute this spyware on other platforms as recently as July 2021.
[ { "id": 24935, "label": "location", "start_offset": 45, "end_offset": 48 }, { "id": 24936, "label": "threat-actor", "start_offset": 91, "end_offset": 96 } ]
[]
[]
1,144
More interestingly, it was another, non-overlapping, subset of the Allaple family.
[ { "id": 3513, "label": "malware", "start_offset": 67, "end_offset": 74 } ]
[]
[]
2,186
For more information on the new campaign discovered by Unit 42, please refer to our recent blog post.
[ { "id": 47315, "label": "identity", "start_offset": 55, "end_offset": 62 } ]
[]
[]
1,348
Microsoft has publicly attributed the use of this custom malware to a threat actor they refer to as DEV-0586.
[ { "id": 4045, "label": "threat-actor", "start_offset": 100, "end_offset": 108 }, { "id": 46677, "label": "identity", "start_offset": 0, "end_offset": 9 } ]
[]
[]
4,938
Credential phishing through a compromised website demonstrates these attackers will go to great lengths to appear legitimate – as they know it's difficult for users to detect this kind of attack.
[ { "id": 50957, "label": "attack-pattern", "start_offset": 0, "end_offset": 19 } ]
[]
[]
1,590
For information on how Palo Alto Networks products prevent Bad Rabbit, please see our Palo Alto Networks Protections Against Bad Rabbit Ransomware Attacks blog post.
[ { "id": 45073, "label": "malware", "start_offset": 60, "end_offset": 70 }, { "id": 45074, "label": "identity", "start_offset": 87, "end_offset": 105 }, { "id": 45072, "label": "identity", "start_offset": 24, "end_offset": 42 }, { "id": 45075, "label": "malware", "start_offset": 130, "end_offset": 136 } ]
[]
[]
1,591
As always if you have any questions, please come to the Threat & Vulnerability Discussions on our Live Community.
[]
[]
[]
2,426
This is the exploit method used in the public PoC for the SpringShell vulnerability.
[ { "id": 47498, "label": "vulnerability", "start_offset": 58, "end_offset": 83 } ]
[]
[]
6,473
The following command then configures SharpChisel: C:\programdata\SharpChisel.exe client 87.236.212[.]184:8080 r:8888:127.0.0.1:9999
[]
[]
[]
13,368
To help defend users against APT41 specifically, we have developed an assessment tool that can scan endpoints for file-based indicators collected from global intelligence sources.
[ { "id": 41578, "label": "threat-actor", "start_offset": 29, "end_offset": 34 }, { "id": 41579, "label": "location", "start_offset": 81, "end_offset": 85 }, { "id": 41580, "label": "location", "start_offset": 91, "end_offset": 94 } ]
[]
[]
12,451
We received leads from the FBI that supported us in this investigation.
[]
[]
[]
2,314
Loading a page with the WebKit RCE on the latest version of Safari (14.1), we learned the RCE was an n-day since it did not successfully trigger the exploit.
[ { "id": 47386, "label": "vulnerability", "start_offset": 32, "end_offset": 35 }, { "id": 47387, "label": "vulnerability", "start_offset": 91, "end_offset": 94 }, { "id": 47383, "label": "SOFTWARE", "start_offset": 25, "end_offset": 31 }, { "id": 47385, "label": "SOFTWARE", "start_offset": 61, "end_offset": 74 } ]
[]
[]
12,210
We terminated 9 YouTube channels as part of our investigation into coordinated influence operations linked to China.
[]
[]
[]
11,818
Indicators from APT28 phishing campaign: service-reset-password-moderate-digital.rf[.]gd reset-service-identity-mail.42web[.]io digital-email-software.great-site[.]net Indicators from APT35 campaigns: Abused Google Properties: https://sites.google[.]com/view/ty85yt8tg8-download-rtih4ithr/ https://sites.google[.]com/view/user-id-568245/ https://sites.google[.]com/view/hhbejfdwdhwuhscbsb-xscvhdvbc/ Abused Dropbox Properties: https://www.dropbox[.]com/s/68y4vpfu8pc3imf/Iraq&Jewish.pdf
[ { "id": 36454, "label": "threat-actor", "start_offset": 16, "end_offset": 21 }, { "id": 36455, "label": "attack-pattern", "start_offset": 22, "end_offset": 30 }, { "id": 36456, "label": "location", "start_offset": 31, "end_offset": 39 }, { "id": 36457, "label": "threat-actor", "start_offset": 185, "end_offset": 190 }, { "id": 36458, "label": "URL", "start_offset": 229, "end_offset": 255 }, { "id": 36459, "label": "location", "start_offset": 256, "end_offset": 260 }, { "id": 36460, "label": "URL", "start_offset": 292, "end_offset": 318 }, { "id": 36461, "label": "location", "start_offset": 319, "end_offset": 323 }, { "id": 36462, "label": "URL", "start_offset": 340, "end_offset": 366 }, { "id": 36463, "label": "location", "start_offset": 367, "end_offset": 371 }, { "id": 36464, "label": "malware", "start_offset": 410, "end_offset": 417 }, { "id": 36465, "label": "URL", "start_offset": 430, "end_offset": 455 } ]
[]
[]
5,450
Why should I care, what can it do to me? Attackers are predictable: they follow people and money.
[]
[]
[]
2,353
This looked similar to an earlier in-the-wild iOS vulnerability analyzed by Ian Beer of Google Project Zero.
[ { "id": 47408, "label": "SOFTWARE", "start_offset": 46, "end_offset": 49 }, { "id": 47409, "label": "identity", "start_offset": 88, "end_offset": 107 }, { "id": 47410, "label": "identity", "start_offset": 76, "end_offset": 84 } ]
[]
[]
14,173
Leaders of the U.S. intelligence community expressed this same concern in their annual appearance on capitol hill on Tuesday.
[]
[]
[]
3,944
Commands used to scan for web server-related vulnerabilities and passwords on certain applications and ports
[]
[]
[]
8,567
In May 2020, we discovered that APT35 attempted to upload spyware to the Google Play Store.
[]
[]
[]
2,542
Accordingly, it continues to be a growth industry that will attract multitudes of new practitioners, and it is likely that high-profile targets will continue to fall.
[]
[]
[]
1,121
And, unfortunately, the ones, which are reasonably easy for a human to identify, are so for significantly different reasons.
[]
[]
[]
817
Please mark, I'm not a robot!
[]
[]
[]
6,015
Ghostwriter actors have quickly adopted this new technique, combining it with a previously observed technique, hosting credential phishing landing pages on compromised sites.
[ { "id": 18563, "label": "threat-actor", "start_offset": 0, "end_offset": 11 }, { "id": 18564, "label": "attack-pattern", "start_offset": 130, "end_offset": 138 }, { "id": 18565, "label": "location", "start_offset": 139, "end_offset": 146 }, { "id": 18566, "label": "location", "start_offset": 168, "end_offset": 173 } ]
[]
[]
6,198
The vulnerability, which exists inside the webmail system’s shortcut feature, allows users to create links on the webmail front page.
[ { "id": 19150, "label": "tools", "start_offset": 128, "end_offset": 132 } ]
[]
[]
895
Other messages that might be present in this key include the following.
[]
[]
[]
4,973
TAG is actively tracking more than 30 vendors with varying levels of sophistication and public exposure selling exploits or surveillance capabilities to government-backed actors.
[ { "id": 51033, "label": "TIME", "start_offset": 0, "end_offset": 3 } ]
[]
[]
1,405
Kuluoz e-mails often trick the reader into thinking they are delivery notifications (such as UPS or Fedex), or notices from airlines or payment processors.
[ { "id": 46753, "label": "malware", "start_offset": 1, "end_offset": 7 } ]
[]
[]
2,120
The method of attack would be through a specially crafted URL sent to the vulnerable system.
[]
[]
[]
3,500
Figure 7.
[]
[]
[]
3,797
The email title and attached file name were written in Japanese and contain general business, political, and economy-themed phrases such as 世界経済(World economy) 経済政策(economic policy) 予算概算要求(budget estimation request) 日米対話(Japan-US dialogue) 安倍再任(re-appointment of Prime Minister Abe) 連絡網(contact network) 職員採用案(staff recruitment plan) 会議(meeting) However, there is a change in the exploit document.
[]
[]
[]
481
Email us at [email protected].
[ { "id": 1630, "label": "EMAIL", "start_offset": 12, "end_offset": 41 } ]
[]
[]
8,566
Credential phishing through a compromised website demonstrates these attackers will go to great lengths to appear legitimate – as they know it's difficult for users to detect this kind of attack.
[ { "id": 26472, "label": "attack-pattern", "start_offset": 11, "end_offset": 19 }, { "id": 26473, "label": "location", "start_offset": 79, "end_offset": 83 } ]
[]
[]
5,795
Well, yeah, absolutely.
[]
[]
[]
9,896
Latest Vacancy 8/28/18 [email protected] Latest Vacancy 9/25/18 [email protected]
[]
[]
[]
10,454
Just click the URL below for your region, sign up today for your free trial and allow us to help you protect your business.
[ { "id": 31763, "label": "identity", "start_offset": 0, "end_offset": 4 }, { "id": 31764, "label": "location", "start_offset": 34, "end_offset": 40 }, { "id": 31766, "label": "location", "start_offset": 76, "end_offset": 79 } ]
[]
[]
10,117
MSIL.SUNBURST.A 32519b85c0b422e4656de6e6c41878e95fd95026267daab4215ee59c107d6c77 76640508b1e7759e548771a5359eaed353bf1eec
[ { "id": 30841, "label": "SHA1", "start_offset": 16, "end_offset": 80 }, { "id": 30842, "label": "SHA1", "start_offset": 81, "end_offset": 121 } ]
[]
[]
4,516
During the development stage, Android-created and open source components are subject to vigorous security reviews
[ { "id": 50315, "label": "SOFTWARE", "start_offset": 30, "end_offset": 37 } ]
[]
[]