id
int64 1
14.4k
| text
stringlengths 3
5.01k
| entities
list | relations
list | Comments
list |
|---|---|---|---|---|
363
|
No matter how well patched your systems are, there’s no reason not to deploy IPS signatures like these to detect and block attempted Heartbleed exploits.
|
[
{
"id": 44718,
"label": "vulnerability",
"start_offset": 134,
"end_offset": 144
}
] |
[] |
[] |
6,829
|
On any given day, Google's Threat Analysis Group (TAG) is tracking more than 270 targeted or government-backed attacker groups from more than 50 countries.
|
[] |
[] |
[] |
9,627
|
Figure 1. Graphic used by the malicious document
|
[] |
[] |
[] |
9,146
|
Why not go global to turn in more profit?
|
[] |
[] |
[] |
3,820
|
Get DCName from Registry {Variable}.user.Arch
|
[] |
[] |
[] |
14,198
|
Security operations (SecOPs) leaders may also want to: Expand training and awareness for their users and partners; Collect telemetry from sources not traditionally aligned with cyber such as supply chain vendor management.
|
[] |
[] |
[] |
2,147
|
Therefore, exploits for this vulnerability have potential to be of high impact.
|
[] |
[] |
[] |
12,192
|
It was last updated on July 29, 2021.
|
[] |
[] |
[] |
1,131
|
The backlog of already collected mutexes is too great for a small team of researchers to meaningfully tackle without some kind of ranking system.
|
[] |
[] |
[] |
1,733
|
How can I prevent it?
|
[] |
[] |
[] |
3,029
|
Ensure that any connected smart devices have good security, especially to protect against loss or theft.
|
[] |
[] |
[] |
2,056
|
We also encountered additional graphs, mapping different things such as “Russian Hosts,” “DDoS Guard” and others, dating back to August 10, 2020 (Figure 15).
|
[
{
"id": 47146,
"label": "TIME",
"start_offset": 129,
"end_offset": 144
}
] |
[] |
[] |
10,181
|
We blocked 1.6M messages to targets, displayed ~62K Safe Browsing phishing page warnings, blocked 2.4K files, and successfully restored ~4K accounts.
|
[
{
"id": 31087,
"label": "location",
"start_offset": 52,
"end_offset": 56
},
{
"id": 31088,
"label": "attack-pattern",
"start_offset": 66,
"end_offset": 74
},
{
"id": 31089,
"label": "malware",
"start_offset": 75,
"end_offset": 79
},
{
"id": 31092,
"label": "location",
"start_offset": 110,
"end_offset": 113
}
] |
[] |
[] |
12,140
|
Related IOCs lragir[.]org armradio[.]org asbares[.]com armtimes[.]net armlur[.]org armenpress[.]org hraparak[.]org armtimes[.]org hetq[.]org
|
[] |
[] |
[] |
5,372
|
Cyclops
|
[
{
"id": 51368,
"label": "malware",
"start_offset": 0,
"end_offset": 7
}
] |
[] |
[] |
639
|
Additionally, ongoing research by the industry is showing that specific actions this malware takes makes it technically infeasible, if not impossible, for recovery to occur.
|
[] |
[] |
[] |
11,681
|
Although it’s not clear to us how these phishing pages are delivered to the victims, finding the original webmail servers that they copied to make these phishing pages allows us to identify who they were targeting.
|
[
{
"id": 35822,
"label": "location",
"start_offset": 18,
"end_offset": 23
},
{
"id": 35823,
"label": "attack-pattern",
"start_offset": 40,
"end_offset": 48
},
{
"id": 35824,
"label": "location",
"start_offset": 55,
"end_offset": 58
},
{
"id": 35825,
"label": "attack-pattern",
"start_offset": 153,
"end_offset": 161
}
] |
[] |
[] |
12,998
|
These phishing domains have been blocked through Google Safe Browsing – a service that identifies unsafe websites across the web and notifies users and website owners of potential harm.
|
[
{
"id": 40485,
"label": "attack-pattern",
"start_offset": 6,
"end_offset": 14
},
{
"id": 40487,
"label": "location",
"start_offset": 129,
"end_offset": 132
},
{
"id": 40488,
"label": "location",
"start_offset": 148,
"end_offset": 151
}
] |
[] |
[] |
1,277
|
During analysis of this threat, we identified five additional backdoor tools hosted on biosnews[.]info which may be downloaded by the Sysget variants once the attackers have established a foothold.
|
[
{
"id": 46651,
"label": "DOMAIN",
"start_offset": 87,
"end_offset": 102
},
{
"id": 46652,
"label": "malware",
"start_offset": 134,
"end_offset": 140
}
] |
[
{
"id": 206,
"from_id": 46651,
"to_id": 46652,
"type": "hosts"
}
] |
[] |
8,616
|
Since first discovering this activity, OpenSUpdater's authors have tried other variations on invalid encodings to further evade detection.
|
[
{
"id": 26618,
"label": "malware",
"start_offset": 39,
"end_offset": 51
}
] |
[] |
[] |
1,205
|
In Wildfire, we classify apps using these IAP SDKs as Potentially Unwanted Applications (PUA).
|
[
{
"id": 46599,
"label": "SOFTWARE",
"start_offset": 4,
"end_offset": 12
}
] |
[] |
[] |
13,489
|
We’ll also share additional removal actions from April and May in the Q2 Bulletin.
|
[
{
"id": 51562,
"label": "TIME",
"start_offset": 49,
"end_offset": 54
},
{
"id": 51563,
"label": "TIME",
"start_offset": 59,
"end_offset": 62
}
] |
[] |
[] |
448
|
While this threat can have a clear, negative impact on retailers and shoppers, the good news is that this threat is easily preventable and poses no lasting harm to consumers.
|
[] |
[] |
[] |
9,620
|
E:\Working\Projects\EmailDownloader\EmailDownloaderCookieMode\Mahdi\LiveLib\obj\Release\LiveLib.pdb
|
[] |
[] |
[] |
3,596
|
Sample Payload KurdishCoderMainSample KurdishCoder_CyaX_Sharp CyaX_method_rename CustomIncreaseX phoenix_keylogger Yes Yes Kirkuk NotePadEx Njrat No Yes Kirkuk QuickTranslation Agent Tesla Yes Yes Kurd SandiwchGenerator Agent Tesla Yes Yes Kirkuk SimpleGame Remcos Yes Yes Kirkuk AnimalGames Hawkeye Rebord Keylogger Yes Yes Kurd Table 1.
|
[
{
"id": 49374,
"label": "malware",
"start_offset": 178,
"end_offset": 189
},
{
"id": 49376,
"label": "malware",
"start_offset": 259,
"end_offset": 265
},
{
"id": 49375,
"label": "malware",
"start_offset": 221,
"end_offset": 232
},
{
"id": 49377,
"label": "malware",
"start_offset": 293,
"end_offset": 317
}
] |
[] |
[] |
5,134
|
We are getting rid of this hard perimeter.
|
[] |
[] |
[] |
5,110
|
Specifically how they launch their attacks
|
[] |
[] |
[] |
4,925
|
So far in 2021, we’ve sent over 50,000 warnings, a nearly 33% increase from this time in 2020.
|
[
{
"id": 50939,
"label": "TIME",
"start_offset": 10,
"end_offset": 14
},
{
"id": 50940,
"label": "TIME",
"start_offset": 89,
"end_offset": 93
}
] |
[] |
[] |
846
|
In this case by making legitimate programs execute malicious code rather than their own legitimate code.
|
[
{
"id": 44890,
"label": "attack-pattern",
"start_offset": 43,
"end_offset": 65
}
] |
[] |
[] |
11,959
|
We terminated 15 YouTube channels as part of our investigation into coordinated influence operations linked to Ethiopia.
|
[] |
[] |
[] |
13,421
|
Related IOCs
|
[] |
[] |
[] |
1,798
|
Figure 4. HTA file connecting to the C&C
|
[] |
[] |
[] |
4,440
|
We’ll also continue to apply those findings internally to improve the safety and security of our products so we can effectively combat threats and protect users who rely on our services.
|
[] |
[] |
[] |
2,596
|
This was followed in short order by attacks on South American telecoms providers Claro and Embratel, Brazilian state-owned postal service “Correios,” and Portuguese media giant Impresa.
|
[
{
"id": 47784,
"label": "location",
"start_offset": 101,
"end_offset": 110
},
{
"id": 47785,
"label": "identity",
"start_offset": 139,
"end_offset": 147
},
{
"id": 47786,
"label": "location",
"start_offset": 154,
"end_offset": 164
},
{
"id": 47781,
"label": "location",
"start_offset": 47,
"end_offset": 61
},
{
"id": 47783,
"label": "identity",
"start_offset": 91,
"end_offset": 99
},
{
"id": 47787,
"label": "identity",
"start_offset": 176,
"end_offset": 184
},
{
"id": 47782,
"label": "identity",
"start_offset": 81,
"end_offset": 86
}
] |
[
{
"id": 352,
"from_id": 47787,
"to_id": 47786,
"type": "located-at"
},
{
"id": 353,
"from_id": 47785,
"to_id": 47784,
"type": "located-at"
},
{
"id": 354,
"from_id": 47782,
"to_id": 47781,
"type": "located-at"
},
{
"id": 355,
"from_id": 47783,
"to_id": 47781,
"type": "located-at"
}
] |
[] |
5,999
|
Since our last update, TAG has observed a continuously growing number of threat actors using the war as a lure in phishing and malware campaigns.
|
[
{
"id": 18489,
"label": "location",
"start_offset": 97,
"end_offset": 100
},
{
"id": 18490,
"label": "location",
"start_offset": 106,
"end_offset": 110
},
{
"id": 18491,
"label": "attack-pattern",
"start_offset": 114,
"end_offset": 122
},
{
"id": 18492,
"label": "location",
"start_offset": 123,
"end_offset": 126
}
] |
[] |
[] |
3,054
|
Before the removal it had also received 5,162 recommendations and 16,531 reviews that resulted in an average score of 4.0.
|
[] |
[] |
[] |
1,928
|
The Patchwork Link Patchwork also uses the Delphi file stealer as a similarity with Urpage, which suggests the three groups are somehow related.
|
[
{
"id": 5664,
"label": "threat-actor",
"start_offset": 4,
"end_offset": 13
},
{
"id": 5665,
"label": "threat-actor",
"start_offset": 19,
"end_offset": 28
},
{
"id": 47055,
"label": "threat-actor",
"start_offset": 84,
"end_offset": 90
}
] |
[] |
[] |
4,867
|
The group commonly uses Google or OWA password reset lures to steal credentials from targets, often using the MailJet or SendGrid API to send phishing emails.
|
[
{
"id": 50863,
"label": "SOFTWARE",
"start_offset": 24,
"end_offset": 30
},
{
"id": 50864,
"label": "SOFTWARE",
"start_offset": 34,
"end_offset": 37
},
{
"id": 50865,
"label": "attack-pattern",
"start_offset": 38,
"end_offset": 92
},
{
"id": 50866,
"label": "SOFTWARE",
"start_offset": 110,
"end_offset": 117
},
{
"id": 50867,
"label": "SOFTWARE",
"start_offset": 121,
"end_offset": 129
}
] |
[] |
[] |
9,693
|
Let’s say we want to scramble string ‘Mac OSX 10.12.’
|
[] |
[] |
[] |
12,775
|
Some of the cloud storage accounts used to deliver PLEAD are also used as drop off points for exfiltrated documents stolen by DRIGO.
|
[
{
"id": 39750,
"label": "location",
"start_offset": 12,
"end_offset": 17
},
{
"id": 39751,
"label": "malware",
"start_offset": 51,
"end_offset": 56
},
{
"id": 39752,
"label": "location",
"start_offset": 57,
"end_offset": 60
},
{
"id": 39753,
"label": "location",
"start_offset": 83,
"end_offset": 89
}
] |
[] |
[] |
14,343
|
It has the ability to update itself from hxxp://fakeomegle[.]com/, and steal .jpg, .jpeg, .png, .txt, .wav, .html, .doc, .docx and .rtf files located in the Desktop, Picture, Documents, and Downloads folders, as well as information about the machine’s Internet Explorer, Chrome, Firefox or default browsers, OS, and network configuration.
|
[
{
"id": 48583,
"label": "SOFTWARE",
"start_offset": 271,
"end_offset": 277
},
{
"id": 48584,
"label": "SOFTWARE",
"start_offset": 279,
"end_offset": 287
},
{
"id": 48579,
"label": "URL",
"start_offset": 41,
"end_offset": 65
},
{
"id": 48582,
"label": "SOFTWARE",
"start_offset": 252,
"end_offset": 269
}
] |
[] |
[] |
14,300
|
Figure 9.
|
[] |
[] |
[] |
9,954
|
File name SHA256 Detection Name MsdUpdate.exe e954ff741baebb173ba45fbcfdea7499d00d8cfa2933b69f6cc0970b294f9ffd Trojan.Win32.NYMERIA.MLR MsdUpdate.exe b58a2ef01af65d32ca4ba555bd72931dc68728e6d96d8808afca029b4c75d31e Trojan.Win32.SCAR.AB MsdUpdate.exe a67461a0c14fc1528ad83b9bd874f53b7616cfed99656442fb4d9cdd7d09e449 Trojan.Win32.SCAR.AC MsdUpdate.exe c303454efb21c0bf0df6fb6c2a14e401efeb57c1c574f63cdae74ef74a3b01f2 Trojan.Win32.NYMERIA.MLW MsdUpdate.exe 75e6bafc4fa496b418df0208f12e688b16e7afdb94a7b30e3eca532717beb9ba Trojan.Win32.SCAR.AD MsdUpdate.exe 8fb6cbf6f6b6a897bf0ee1217dbf738bce7a3000507b89ea30049fd670018b46 Trojan.Win32.SCAR.AD DysonPart.exe ba9d76cca6b5c7308961cfe3739dc1328f3dad9a824417fad73b842b043daa1a Trojan.Win32.SCAR.AD Unknown 07e1baf1d0207a139bcf39c60354666496e4331381d36eef9359120b1d8497f1 Trojan.Win32.SCAR.AD
|
[
{
"id": 30402,
"label": "MD5",
"start_offset": 47,
"end_offset": 111
},
{
"id": 30403,
"label": "SHA1",
"start_offset": 151,
"end_offset": 215
},
{
"id": 30404,
"label": "SHA2",
"start_offset": 251,
"end_offset": 315
},
{
"id": 30405,
"label": "SHA2",
"start_offset": 351,
"end_offset": 415
},
{
"id": 30406,
"label": "SHA2",
"start_offset": 455,
"end_offset": 519
},
{
"id": 30407,
"label": "MD5",
"start_offset": 555,
"end_offset": 619
},
{
"id": 30408,
"label": "SHA1",
"start_offset": 655,
"end_offset": 719
},
{
"id": 30409,
"label": "SHA2",
"start_offset": 749,
"end_offset": 813
}
] |
[] |
[] |
4,564
|
Follina is a remote code execution (RCE) vulnerability in the Microsoft Windows Support Diagnostic Tool (MSDT).
|
[
{
"id": 50386,
"label": "vulnerability",
"start_offset": 13,
"end_offset": 54
},
{
"id": 50387,
"label": "SOFTWARE",
"start_offset": 62,
"end_offset": 110
}
] |
[
{
"id": 952,
"from_id": 50387,
"to_id": 50386,
"type": "has"
}
] |
[] |
3,228
|
Based on the platform, it downloads a file with an encoded shellcode (sc3.txt, x64.txt), and then decodes it (the shellcode is base85 and hex-encoded). Figure 14. Decoding the Cobalt Strike shellcode The big module (BIOPASS RAT)
|
[
{
"id": 48347,
"label": "FILEPATH",
"start_offset": 70,
"end_offset": 77
},
{
"id": 48349,
"label": "tools",
"start_offset": 181,
"end_offset": 194
},
{
"id": 48348,
"label": "FILEPATH",
"start_offset": 79,
"end_offset": 86
},
{
"id": 9839,
"label": "malware",
"start_offset": 225,
"end_offset": 236
}
] |
[] |
[] |
2,688
|
On March 25, VX underground posted a tweet with details of this new version, dubbed LockBit Black.
|
[
{
"id": 45658,
"label": "identity",
"start_offset": 13,
"end_offset": 27
},
{
"id": 45659,
"label": "TIME",
"start_offset": 3,
"end_offset": 11
},
{
"id": 45661,
"label": "malware",
"start_offset": 84,
"end_offset": 97
}
] |
[] |
[] |
2,510
|
jquery123123123cssbackup7331.jsp tomjj.jsp test1.jsp hackerone0x.jsp inject.jsp poc4bugb.jsp curiositysec.jsp mynameis0bsecure.jsp tomcatwa.jsp ahmed.txt testqqsg.jsp wpz.jsp lelel.jsp shell.jsp 07935fdf05b66.jsp vulntest-12345.txt jquerycssv2.js poc.jsp tomcatspring.jsp ofc.jsp lalalalal.jsp safetytest.txt log.txt safetytest javatestfila.jsp checkexploit.jsp tomcatwar.jsp Updated April 19, 2022, at 7:30 a.m. PT. Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address! Please mark, I'm not a robot! By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.
|
[
{
"id": 47693,
"label": "FILEPATH",
"start_offset": 185,
"end_offset": 194
},
{
"id": 47678,
"label": "FILEPATH",
"start_offset": 0,
"end_offset": 32
},
{
"id": 47683,
"label": "FILEPATH",
"start_offset": 80,
"end_offset": 92
},
{
"id": 47685,
"label": "FILEPATH",
"start_offset": 93,
"end_offset": 109
},
{
"id": 47700,
"label": "FILEPATH",
"start_offset": 280,
"end_offset": 293
},
{
"id": 47704,
"label": "FILEPATH",
"start_offset": 328,
"end_offset": 344
},
{
"id": 47705,
"label": "FILEPATH",
"start_offset": 345,
"end_offset": 361
},
{
"id": 47706,
"label": "FILEPATH",
"start_offset": 362,
"end_offset": 375
},
{
"id": 47708,
"label": "TIME",
"start_offset": 377,
"end_offset": 416
},
{
"id": 47679,
"label": "FILEPATH",
"start_offset": 33,
"end_offset": 42
},
{
"id": 47680,
"label": "FILEPATH",
"start_offset": 43,
"end_offset": 52
},
{
"id": 47681,
"label": "FILEPATH",
"start_offset": 53,
"end_offset": 68
},
{
"id": 47682,
"label": "FILEPATH",
"start_offset": 69,
"end_offset": 79
},
{
"id": 47686,
"label": "FILEPATH",
"start_offset": 110,
"end_offset": 130
},
{
"id": 47687,
"label": "FILEPATH",
"start_offset": 131,
"end_offset": 143
},
{
"id": 47688,
"label": "FILEPATH",
"start_offset": 144,
"end_offset": 152
},
{
"id": 47689,
"label": "FILEPATH",
"start_offset": 154,
"end_offset": 166
},
{
"id": 47690,
"label": "FILEPATH",
"start_offset": 167,
"end_offset": 174
},
{
"id": 47694,
"label": "FILEPATH",
"start_offset": 195,
"end_offset": 212
},
{
"id": 47695,
"label": "FILEPATH",
"start_offset": 213,
"end_offset": 231
},
{
"id": 47692,
"label": "FILEPATH",
"start_offset": 175,
"end_offset": 184
},
{
"id": 47697,
"label": "FILEPATH",
"start_offset": 247,
"end_offset": 254
},
{
"id": 47696,
"label": "FILEPATH",
"start_offset": 232,
"end_offset": 246
},
{
"id": 47698,
"label": "FILEPATH",
"start_offset": 255,
"end_offset": 271
},
{
"id": 47699,
"label": "FILEPATH",
"start_offset": 272,
"end_offset": 279
},
{
"id": 47702,
"label": "FILEPATH",
"start_offset": 294,
"end_offset": 308
},
{
"id": 47703,
"label": "FILEPATH",
"start_offset": 309,
"end_offset": 316
}
] |
[] |
[] |
2,494
|
The Palo Alto Networks Product Security Assurance team is evaluating CVE-2022-22963 and CVE-2022-22965 as relates to Palo Alto Networks products and currently assigns this a severity of none.
|
[
{
"id": 47577,
"label": "identity",
"start_offset": 5,
"end_offset": 55
},
{
"id": 47578,
"label": "vulnerability",
"start_offset": 70,
"end_offset": 84
},
{
"id": 47580,
"label": "identity",
"start_offset": 118,
"end_offset": 136
},
{
"id": 47579,
"label": "vulnerability",
"start_offset": 89,
"end_offset": 103
}
] |
[] |
[] |
2,870
|
Researchers from Palo Alto Networks have investigated this exploit in depth and concluded that this is a Use-After-Free vulnerability that occurs when Internet Explorer tries to reuse a freed CMarkup object.
|
[
{
"id": 48072,
"label": "SOFTWARE",
"start_offset": 152,
"end_offset": 169
},
{
"id": 48071,
"label": "identity",
"start_offset": 18,
"end_offset": 36
}
] |
[] |
[] |
14,301
|
Content of the MiaKhalifa.rar file README.txt provides instructions teaching the user how to turn off the anti-virus software and how to turn on the network, which the attacker needs to steal and upload data to its C&C server.
|
[
{
"id": 48512,
"label": "FILEPATH",
"start_offset": 15,
"end_offset": 29
},
{
"id": 48515,
"label": "SOFTWARE",
"start_offset": 106,
"end_offset": 125
},
{
"id": 48513,
"label": "FILEPATH",
"start_offset": 34,
"end_offset": 45
},
{
"id": 48514,
"label": "Infrastucture",
"start_offset": 215,
"end_offset": 225
}
] |
[
{
"id": 439,
"from_id": 48512,
"to_id": 48513,
"type": "related-to"
},
{
"id": 440,
"from_id": 48513,
"to_id": 48515,
"type": "related-to"
}
] |
[] |
4,319
|
If the target clicks on either the link or on the “unsubscribe” link, it will download a Word document from the domain parinari[.]xyz.
|
[
{
"id": 50123,
"label": "DOMAIN",
"start_offset": 124,
"end_offset": 138
}
] |
[] |
[] |
881
|
Once completed, the malware sends the result via an HTTP POST request to a remote server.
|
[] |
[] |
[] |
796
|
Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!
|
[] |
[] |
[] |
6,897
|
We’ve detected a few emerging trends in recent months.
|
[] |
[] |
[] |
2,155
|
This code does a few things.
|
[] |
[] |
[] |
9,450
|
We believe that it serves as a marker that stage 2 has been completed.
|
[] |
[] |
[] |
1,331
|
An example HTTP POST request can be seen below. NFlog When loaded inside of a running process, NFlog begins by spawning a new thread.
|
[
{
"id": 4011,
"label": "malware",
"start_offset": 50,
"end_offset": 55
},
{
"id": 4012,
"label": "malware",
"start_offset": 98,
"end_offset": 103
}
] |
[] |
[] |
3,095
|
The vulnerability status of AMD chips is unclear at the time of this writing.
|
[] |
[] |
[] |
5,509
|
Mobile
|
[] |
[] |
[] |
1,683
|
While we have identified it as being active since late 2016, Reaver has been used sparingly, with only a small number of unique samples identified.
|
[
{
"id": 45094,
"label": "malware",
"start_offset": 61,
"end_offset": 67
}
] |
[] |
[] |
5,402
|
Over the past few years, IoT attacks have been escalating globally and internet routers have been one of the primary targets.
|
[] |
[] |
[] |
6,392
|
Palo Alto Networks Cortex Xpanse history shows that this port was open from May 21-June 18, 2022, with the same “Microsoft Security” self-signed SSL certificate seen above.
|
[
{
"id": 19823,
"label": "location",
"start_offset": 107,
"end_offset": 111
},
{
"id": 19824,
"label": "identity",
"start_offset": 113,
"end_offset": 122
},
{
"id": 19825,
"label": "location",
"start_offset": 123,
"end_offset": 131
},
{
"id": 19826,
"label": "location",
"start_offset": 145,
"end_offset": 148
}
] |
[] |
[] |
11,731
|
.JS.SIDEWINDER.A
|
[] |
[] |
[] |
8,723
|
The DLL is custom malware that would immediately begin communicating with actor-controlled C2 domains.
|
[] |
[] |
[] |
6,995
|
CapraRAT’s persistence mechanism Reducing risks:
|
[
{
"id": 21902,
"label": "malware",
"start_offset": 0,
"end_offset": 8
}
] |
[] |
[] |
10,976
|
This bulletin includes coordinated influence operation campaigns terminated on our platforms in Q1 of 2020.
|
[] |
[] |
[] |
705
|
Everybody I know has been scrambling to understand what it means to their organization, to their business and to their immediate family.
|
[] |
[] |
[] |
1,501
|
Effectively, a backdoor implant affects loss of control over a computer asset.
|
[] |
[] |
[] |
3,651
|
If an attacker tried to carry this attack out against a target that was patched for this vulnerability, it would fail.
|
[] |
[] |
[] |
9,128
|
Acquiring additional modules of the group’s malware, for instance, was nearly impractical if the exploit URLs were loaded in a sandboxed environment.
|
[] |
[] |
[] |
4,660
|
The browser then navigates to Gmail to begin the data collection.
|
[
{
"id": 50568,
"label": "SOFTWARE",
"start_offset": 30,
"end_offset": 35
}
] |
[] |
[] |
5,127
|
And with that in mind we come back to the concept of lateral movement.
|
[
{
"id": 51213,
"label": "attack-pattern",
"start_offset": 53,
"end_offset": 69
}
] |
[] |
[] |
1,846
|
Inside aswArPot.sys, we saw 0x9988C094 in a switch case with a function sub_14001DC80 case.
|
[
{
"id": 46976,
"label": "FILEPATH",
"start_offset": 7,
"end_offset": 19
}
] |
[] |
[] |
9,478
|
Uploaded file content FileManage_FolderContent_Packet Folder content VecProcessPacket Vector object with running processes InstallModulePacket BMP with encrypted module to be installed
|
[
{
"id": 29111,
"label": "location",
"start_offset": 14,
"end_offset": 21
},
{
"id": 29112,
"label": "location",
"start_offset": 61,
"end_offset": 68
},
{
"id": 29113,
"label": "tools",
"start_offset": 86,
"end_offset": 92
}
] |
[] |
[] |
497
|
The Android Toast Overlay attack specifically targets outdated devices using versions prior to 8.0.
|
[
{
"id": 46133,
"label": "attack-pattern",
"start_offset": 4,
"end_offset": 32
}
] |
[] |
[] |
2,150
|
The document was abusing the Microsoft Word remote template feature to retrieve a malicious HTML file that subsequently used the ms-msdt Office URI scheme to execute PowerShell within the context of Word.
|
[
{
"id": 47290,
"label": "SOFTWARE",
"start_offset": 199,
"end_offset": 203
},
{
"id": 47289,
"label": "tools",
"start_offset": 166,
"end_offset": 176
},
{
"id": 47291,
"label": "SOFTWARE",
"start_offset": 29,
"end_offset": 43
}
] |
[] |
[] |
9,785
|
In general, users should always practice caution when it comes to email.
|
[] |
[] |
[] |
1,040
|
More sophisticated and nefarious uses include leveraging accounts in social engineering/phishing attacks or exploiting access to high-value university systems (e.g., personnel, financial, research) to steal information.
|
[
{
"id": 46533,
"label": "attack-pattern",
"start_offset": 88,
"end_offset": 104
},
{
"id": 46534,
"label": "attack-pattern",
"start_offset": 69,
"end_offset": 87
},
{
"id": 46535,
"label": "attack-pattern",
"start_offset": 108,
"end_offset": 125
},
{
"id": 46536,
"label": "attack-pattern",
"start_offset": 201,
"end_offset": 218
}
] |
[] |
[] |
1,454
|
Ideally, an app developer should generate a unique private key for each unique app they post in the Google Play Store.
|
[
{
"id": 46773,
"label": "SOFTWARE",
"start_offset": 101,
"end_offset": 118
}
] |
[] |
[] |
1,085
|
This blog was sourced from the data generated by the WildFire Analytics cloud, which processes thousands of samples a day and provides insights into various characteristics and behaviors of malware worldwide.
|
[
{
"id": 46564,
"label": "SOFTWARE",
"start_offset": 54,
"end_offset": 78
}
] |
[] |
[] |
7,764
|
Send HTTP request using socket API
|
[] |
[] |
[] |
6,087
|
At the time of the analysis, BUMBLEBEE was observed to fetch Cobalt Strike payloads.
|
[
{
"id": 18787,
"label": "location",
"start_offset": 7,
"end_offset": 11
},
{
"id": 18788,
"label": "malware",
"start_offset": 29,
"end_offset": 38
}
] |
[] |
[] |
77
|
Using these as our guide, we can make sense of where we are today, how we got here, and be prepared for what has yet to develop in the future.
|
[] |
[] |
[] |
241
|
These donation websites provide little to no information about the associated organization and distribution of funds.
|
[] |
[] |
[] |
4,362
|
Despite the variety of lures used by the threat actor, best security practices still apply to these attacks.
|
[] |
[] |
[] |
2,359
|
It also has several components, some of which appear to be configured as modules.
|
[] |
[] |
[] |
13,597
|
The script for uploading and installing the malicious plugin, “MakePlugin.tar.gz” Figure 9.
|
[
{
"id": 51685,
"label": "FILEPATH",
"start_offset": 63,
"end_offset": 80
}
] |
[] |
[] |
6,960
|
Below is a list of backdoor commands that this particular ObliqueRAT malware variant can perform: Command (v5.2) Info 0 System information
|
[
{
"id": 21789,
"label": "location",
"start_offset": 11,
"end_offset": 15
},
{
"id": 21790,
"label": "malware",
"start_offset": 58,
"end_offset": 68
},
{
"id": 21791,
"label": "location",
"start_offset": 85,
"end_offset": 88
}
] |
[] |
[] |
6,381
|
Example of badger_x64.exe:
|
[] |
[] |
[] |
2,907
|
All three exploits use the same method and similar addresses to achieve that goal, even including the same hard coded assembly and registers.
|
[] |
[] |
[] |
3,382
|
BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 30a65a54acfbf8d412ade728cad86c5c769befa4e456f7c0e552e1ab0862a446 flash-64.exe
|
[
{
"id": 10228,
"label": "malware",
"start_offset": 0,
"end_offset": 11
},
{
"id": 10229,
"label": "SHA2",
"start_offset": 46,
"end_offset": 110
},
{
"id": 49032,
"label": "FILEPATH",
"start_offset": 112,
"end_offset": 124
},
{
"id": 49031,
"label": "malware",
"start_offset": 20,
"end_offset": 44
}
] |
[
{
"id": 574,
"from_id": 49032,
"to_id": 10229,
"type": "duplicate-of"
},
{
"id": 575,
"from_id": 10228,
"to_id": 49031,
"type": "duplicate-of"
},
{
"id": 576,
"from_id": 49032,
"to_id": 49031,
"type": "indicates"
},
{
"id": 577,
"from_id": 10229,
"to_id": 49031,
"type": "indicates"
}
] |
[] |
205
|
However, at this time, attribution for the ongoing attacks has not been established.
|
[] |
[] |
[] |
2,209
|
The malware proceeds to spawn a new process of the selected executable and performs a technique called process hollowing to hide itself inside a legitimate executable.
|
[] |
[] |
[] |
7,786
|
The .MSI file is a downloader with the .DLL FlawedAmmyy downloader inside; it retrieves the final payload, then decrypts and executes FlawedAmmyy RAT.
|
[
{
"id": 24114,
"label": "malware",
"start_offset": 44,
"end_offset": 55
},
{
"id": 24115,
"label": "location",
"start_offset": 121,
"end_offset": 124
},
{
"id": 24116,
"label": "malware",
"start_offset": 134,
"end_offset": 145
}
] |
[] |
[] |
4,800
|
Many Russian government cyber assets have remained focused on Ukraine and related issues since the invasion began, while Russian APT activity outside of Ukraine largely remains the same.
|
[
{
"id": 50702,
"label": "location",
"start_offset": 62,
"end_offset": 69
},
{
"id": 50703,
"label": "threat-actor",
"start_offset": 121,
"end_offset": 132
},
{
"id": 50704,
"label": "location",
"start_offset": 153,
"end_offset": 160
},
{
"id": 50701,
"label": "threat-actor",
"start_offset": 5,
"end_offset": 36
}
] |
[
{
"id": 986,
"from_id": 50701,
"to_id": 50702,
"type": "targets"
}
] |
[] |
10,950
|
Our team of analysts and security experts is focused on identifying and stopping issues like phishing campaigns, zero-day vulnerabilities and hacking against Google, our products and our users.
|
[
{
"id": 33300,
"label": "location",
"start_offset": 21,
"end_offset": 24
},
{
"id": 33301,
"label": "location",
"start_offset": 25,
"end_offset": 33
},
{
"id": 33302,
"label": "location",
"start_offset": 68,
"end_offset": 71
},
{
"id": 33303,
"label": "attack-pattern",
"start_offset": 93,
"end_offset": 101
},
{
"id": 33305,
"label": "location",
"start_offset": 138,
"end_offset": 141
},
{
"id": 33307,
"label": "location",
"start_offset": 179,
"end_offset": 182
}
] |
[] |
[] |
1,780
|
This module validates the accessing behavior at runtime.
|
[] |
[] |
[] |
10,379
|
We discovered a potential targeted attack that makes use of legitimate script engine AutoHotkey, in combination with malicious script files.
|
[] |
[] |
[] |
8,194
|
The PDF file showing the banking account reference.
|
[] |
[] |
[] |
200
|
Shortly after the text messages were observed, several DDoS attacks occurred.
|
[
{
"id": 45895,
"label": "attack-pattern",
"start_offset": 56,
"end_offset": 68
}
] |
[] |
[] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.