id
int64
1
14.4k
text
stringlengths
3
5.01k
entities
list
relations
list
Comments
list
363
No matter how well patched your systems are, there’s no reason not to deploy IPS signatures like these to detect and block attempted Heartbleed exploits.
[ { "id": 44718, "label": "vulnerability", "start_offset": 134, "end_offset": 144 } ]
[]
[]
6,829
On any given day, Google's Threat Analysis Group (TAG) is tracking more than 270 targeted or government-backed attacker groups from more than 50 countries.
[]
[]
[]
9,627
Figure 1. Graphic used by the malicious document
[]
[]
[]
9,146
Why not go global to turn in more profit?
[]
[]
[]
3,820
Get DCName from Registry {Variable}.user.Arch
[]
[]
[]
14,198
Security operations (SecOPs) leaders may also want to: Expand training and awareness for their users and partners; Collect telemetry from sources not traditionally aligned with cyber such as supply chain vendor management.
[]
[]
[]
2,147
Therefore, exploits for this vulnerability have potential to be of high impact.
[]
[]
[]
12,192
It was last updated on July 29, 2021.
[]
[]
[]
1,131
The backlog of already collected mutexes is too great for a small team of researchers to meaningfully tackle without some kind of ranking system.
[]
[]
[]
1,733
How can I prevent it?
[]
[]
[]
3,029
Ensure that any connected smart devices have good security, especially to protect against loss or theft.
[]
[]
[]
2,056
We also encountered additional graphs, mapping different things such as “Russian Hosts,” “DDoS Guard” and others, dating back to August 10, 2020 (Figure 15).
[ { "id": 47146, "label": "TIME", "start_offset": 129, "end_offset": 144 } ]
[]
[]
10,181
We blocked 1.6M messages to targets, displayed ~62K Safe Browsing phishing page warnings, blocked 2.4K files, and successfully restored ~4K accounts.
[ { "id": 31087, "label": "location", "start_offset": 52, "end_offset": 56 }, { "id": 31088, "label": "attack-pattern", "start_offset": 66, "end_offset": 74 }, { "id": 31089, "label": "malware", "start_offset": 75, "end_offset": 79 }, { "id": 31092, "label": "location", "start_offset": 110, "end_offset": 113 } ]
[]
[]
12,140
Related IOCs lragir[.]org armradio[.]org asbares[.]com armtimes[.]net armlur[.]org armenpress[.]org hraparak[.]org armtimes[.]org hetq[.]org
[]
[]
[]
5,372
Cyclops
[ { "id": 51368, "label": "malware", "start_offset": 0, "end_offset": 7 } ]
[]
[]
639
Additionally, ongoing research by the industry is showing that specific actions this malware takes makes it technically infeasible, if not impossible, for recovery to occur.
[]
[]
[]
11,681
Although it’s not clear to us how these phishing pages are delivered to the victims, finding the original webmail servers that they copied to make these phishing pages allows us to identify who they were targeting.
[ { "id": 35822, "label": "location", "start_offset": 18, "end_offset": 23 }, { "id": 35823, "label": "attack-pattern", "start_offset": 40, "end_offset": 48 }, { "id": 35824, "label": "location", "start_offset": 55, "end_offset": 58 }, { "id": 35825, "label": "attack-pattern", "start_offset": 153, "end_offset": 161 } ]
[]
[]
12,998
These phishing domains have been blocked through Google Safe Browsing – a service that identifies unsafe websites across the web and notifies users and website owners of potential harm.
[ { "id": 40485, "label": "attack-pattern", "start_offset": 6, "end_offset": 14 }, { "id": 40487, "label": "location", "start_offset": 129, "end_offset": 132 }, { "id": 40488, "label": "location", "start_offset": 148, "end_offset": 151 } ]
[]
[]
1,277
During analysis of this threat, we identified five additional backdoor tools hosted on biosnews[.]info which may be downloaded by the Sysget variants once the attackers have established a foothold.
[ { "id": 46651, "label": "DOMAIN", "start_offset": 87, "end_offset": 102 }, { "id": 46652, "label": "malware", "start_offset": 134, "end_offset": 140 } ]
[ { "id": 206, "from_id": 46651, "to_id": 46652, "type": "hosts" } ]
[]
8,616
Since first discovering this activity, OpenSUpdater's authors have tried other variations on invalid encodings to further evade detection.
[ { "id": 26618, "label": "malware", "start_offset": 39, "end_offset": 51 } ]
[]
[]
1,205
In Wildfire, we classify apps using these IAP SDKs as Potentially Unwanted Applications (PUA).
[ { "id": 46599, "label": "SOFTWARE", "start_offset": 4, "end_offset": 12 } ]
[]
[]
13,489
We’ll also share additional removal actions from April and May in the Q2 Bulletin.
[ { "id": 51562, "label": "TIME", "start_offset": 49, "end_offset": 54 }, { "id": 51563, "label": "TIME", "start_offset": 59, "end_offset": 62 } ]
[]
[]
448
While this threat can have a clear, negative impact on retailers and shoppers, the good news is that this threat is easily preventable and poses no lasting harm to consumers.
[]
[]
[]
9,620
E:\Working\Projects\EmailDownloader\EmailDownloaderCookieMode\Mahdi\LiveLib\obj\Release\LiveLib.pdb
[]
[]
[]
3,596
Sample Payload KurdishCoderMainSample KurdishCoder_CyaX_Sharp CyaX_method_rename CustomIncreaseX phoenix_keylogger Yes Yes Kirkuk NotePadEx Njrat No Yes Kirkuk QuickTranslation Agent Tesla Yes Yes Kurd SandiwchGenerator Agent Tesla Yes Yes Kirkuk SimpleGame Remcos Yes Yes Kirkuk AnimalGames Hawkeye Rebord Keylogger Yes Yes Kurd Table 1.
[ { "id": 49374, "label": "malware", "start_offset": 178, "end_offset": 189 }, { "id": 49376, "label": "malware", "start_offset": 259, "end_offset": 265 }, { "id": 49375, "label": "malware", "start_offset": 221, "end_offset": 232 }, { "id": 49377, "label": "malware", "start_offset": 293, "end_offset": 317 } ]
[]
[]
5,134
We are getting rid of this hard perimeter.
[]
[]
[]
5,110
Specifically how they launch their attacks
[]
[]
[]
4,925
So far in 2021, we’ve sent over 50,000 warnings, a nearly 33% increase from this time in 2020.
[ { "id": 50939, "label": "TIME", "start_offset": 10, "end_offset": 14 }, { "id": 50940, "label": "TIME", "start_offset": 89, "end_offset": 93 } ]
[]
[]
846
In this case by making legitimate programs execute malicious code rather than their own legitimate code.
[ { "id": 44890, "label": "attack-pattern", "start_offset": 43, "end_offset": 65 } ]
[]
[]
11,959
We terminated 15 YouTube channels as part of our investigation into coordinated influence operations linked to Ethiopia.
[]
[]
[]
13,421
Related IOCs
[]
[]
[]
1,798
Figure 4. HTA file connecting to the C&C
[]
[]
[]
4,440
We’ll also continue to apply those findings internally to improve the safety and security of our products so we can effectively combat threats and protect users who rely on our services.
[]
[]
[]
2,596
This was followed in short order by attacks on South American telecoms providers Claro and Embratel, Brazilian state-owned postal service “Correios,” and Portuguese media giant Impresa.
[ { "id": 47784, "label": "location", "start_offset": 101, "end_offset": 110 }, { "id": 47785, "label": "identity", "start_offset": 139, "end_offset": 147 }, { "id": 47786, "label": "location", "start_offset": 154, "end_offset": 164 }, { "id": 47781, "label": "location", "start_offset": 47, "end_offset": 61 }, { "id": 47783, "label": "identity", "start_offset": 91, "end_offset": 99 }, { "id": 47787, "label": "identity", "start_offset": 176, "end_offset": 184 }, { "id": 47782, "label": "identity", "start_offset": 81, "end_offset": 86 } ]
[ { "id": 352, "from_id": 47787, "to_id": 47786, "type": "located-at" }, { "id": 353, "from_id": 47785, "to_id": 47784, "type": "located-at" }, { "id": 354, "from_id": 47782, "to_id": 47781, "type": "located-at" }, { "id": 355, "from_id": 47783, "to_id": 47781, "type": "located-at" } ]
[]
5,999
Since our last update, TAG has observed a continuously growing number of threat actors using the war as a lure in phishing and malware campaigns.
[ { "id": 18489, "label": "location", "start_offset": 97, "end_offset": 100 }, { "id": 18490, "label": "location", "start_offset": 106, "end_offset": 110 }, { "id": 18491, "label": "attack-pattern", "start_offset": 114, "end_offset": 122 }, { "id": 18492, "label": "location", "start_offset": 123, "end_offset": 126 } ]
[]
[]
3,054
Before the removal it had also received 5,162 recommendations and 16,531 reviews that resulted in an average score of 4.0.
[]
[]
[]
1,928
The Patchwork Link Patchwork also uses the Delphi file stealer as a similarity with Urpage, which suggests the three groups are somehow related.
[ { "id": 5664, "label": "threat-actor", "start_offset": 4, "end_offset": 13 }, { "id": 5665, "label": "threat-actor", "start_offset": 19, "end_offset": 28 }, { "id": 47055, "label": "threat-actor", "start_offset": 84, "end_offset": 90 } ]
[]
[]
4,867
The group commonly uses Google or OWA password reset lures to steal credentials from targets, often using the MailJet or SendGrid API to send phishing emails.
[ { "id": 50863, "label": "SOFTWARE", "start_offset": 24, "end_offset": 30 }, { "id": 50864, "label": "SOFTWARE", "start_offset": 34, "end_offset": 37 }, { "id": 50865, "label": "attack-pattern", "start_offset": 38, "end_offset": 92 }, { "id": 50866, "label": "SOFTWARE", "start_offset": 110, "end_offset": 117 }, { "id": 50867, "label": "SOFTWARE", "start_offset": 121, "end_offset": 129 } ]
[]
[]
9,693
Let’s say we want to scramble string ‘Mac OSX 10.12.’
[]
[]
[]
12,775
Some of the cloud storage accounts used to deliver PLEAD are also used as drop off points for exfiltrated documents stolen by DRIGO.
[ { "id": 39750, "label": "location", "start_offset": 12, "end_offset": 17 }, { "id": 39751, "label": "malware", "start_offset": 51, "end_offset": 56 }, { "id": 39752, "label": "location", "start_offset": 57, "end_offset": 60 }, { "id": 39753, "label": "location", "start_offset": 83, "end_offset": 89 } ]
[]
[]
14,343
It has the ability to update itself from hxxp://fakeomegle[.]com/, and steal .jpg, .jpeg, .png, .txt, .wav, .html, .doc, .docx and .rtf files located in the Desktop, Picture, Documents, and Downloads folders, as well as information about the machine’s Internet Explorer, Chrome, Firefox or default browsers, OS, and network configuration.
[ { "id": 48583, "label": "SOFTWARE", "start_offset": 271, "end_offset": 277 }, { "id": 48584, "label": "SOFTWARE", "start_offset": 279, "end_offset": 287 }, { "id": 48579, "label": "URL", "start_offset": 41, "end_offset": 65 }, { "id": 48582, "label": "SOFTWARE", "start_offset": 252, "end_offset": 269 } ]
[]
[]
14,300
Figure 9.
[]
[]
[]
9,954
File name SHA256 Detection Name MsdUpdate.exe e954ff741baebb173ba45fbcfdea7499d00d8cfa2933b69f6cc0970b294f9ffd Trojan.Win32.NYMERIA.MLR MsdUpdate.exe b58a2ef01af65d32ca4ba555bd72931dc68728e6d96d8808afca029b4c75d31e Trojan.Win32.SCAR.AB MsdUpdate.exe a67461a0c14fc1528ad83b9bd874f53b7616cfed99656442fb4d9cdd7d09e449 Trojan.Win32.SCAR.AC MsdUpdate.exe c303454efb21c0bf0df6fb6c2a14e401efeb57c1c574f63cdae74ef74a3b01f2 Trojan.Win32.NYMERIA.MLW MsdUpdate.exe 75e6bafc4fa496b418df0208f12e688b16e7afdb94a7b30e3eca532717beb9ba Trojan.Win32.SCAR.AD MsdUpdate.exe 8fb6cbf6f6b6a897bf0ee1217dbf738bce7a3000507b89ea30049fd670018b46 Trojan.Win32.SCAR.AD DysonPart.exe ba9d76cca6b5c7308961cfe3739dc1328f3dad9a824417fad73b842b043daa1a Trojan.Win32.SCAR.AD Unknown 07e1baf1d0207a139bcf39c60354666496e4331381d36eef9359120b1d8497f1 Trojan.Win32.SCAR.AD
[ { "id": 30402, "label": "MD5", "start_offset": 47, "end_offset": 111 }, { "id": 30403, "label": "SHA1", "start_offset": 151, "end_offset": 215 }, { "id": 30404, "label": "SHA2", "start_offset": 251, "end_offset": 315 }, { "id": 30405, "label": "SHA2", "start_offset": 351, "end_offset": 415 }, { "id": 30406, "label": "SHA2", "start_offset": 455, "end_offset": 519 }, { "id": 30407, "label": "MD5", "start_offset": 555, "end_offset": 619 }, { "id": 30408, "label": "SHA1", "start_offset": 655, "end_offset": 719 }, { "id": 30409, "label": "SHA2", "start_offset": 749, "end_offset": 813 } ]
[]
[]
4,564
Follina is a remote code execution (RCE) vulnerability in the Microsoft Windows Support Diagnostic Tool (MSDT).
[ { "id": 50386, "label": "vulnerability", "start_offset": 13, "end_offset": 54 }, { "id": 50387, "label": "SOFTWARE", "start_offset": 62, "end_offset": 110 } ]
[ { "id": 952, "from_id": 50387, "to_id": 50386, "type": "has" } ]
[]
3,228
Based on the platform, it downloads a file with an encoded shellcode (sc3.txt, x64.txt), and then decodes it (the shellcode is base85 and hex-encoded). Figure 14. Decoding the Cobalt Strike shellcode The big module (BIOPASS RAT)
[ { "id": 48347, "label": "FILEPATH", "start_offset": 70, "end_offset": 77 }, { "id": 48349, "label": "tools", "start_offset": 181, "end_offset": 194 }, { "id": 48348, "label": "FILEPATH", "start_offset": 79, "end_offset": 86 }, { "id": 9839, "label": "malware", "start_offset": 225, "end_offset": 236 } ]
[]
[]
2,688
On March 25, VX underground posted a tweet with details of this new version, dubbed LockBit Black.
[ { "id": 45658, "label": "identity", "start_offset": 13, "end_offset": 27 }, { "id": 45659, "label": "TIME", "start_offset": 3, "end_offset": 11 }, { "id": 45661, "label": "malware", "start_offset": 84, "end_offset": 97 } ]
[]
[]
2,510
jquery123123123cssbackup7331.jsp tomjj.jsp test1.jsp hackerone0x.jsp inject.jsp poc4bugb.jsp curiositysec.jsp mynameis0bsecure.jsp tomcatwa.jsp ahmed.txt testqqsg.jsp wpz.jsp lelel.jsp shell.jsp 07935fdf05b66.jsp vulntest-12345.txt jquerycssv2.js poc.jsp tomcatspring.jsp ofc.jsp lalalalal.jsp safetytest.txt log.txt safetytest javatestfila.jsp checkexploit.jsp tomcatwar.jsp Updated April 19, 2022, at 7:30 a.m. PT. Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address! Please mark, I'm not a robot! By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.
[ { "id": 47693, "label": "FILEPATH", "start_offset": 185, "end_offset": 194 }, { "id": 47678, "label": "FILEPATH", "start_offset": 0, "end_offset": 32 }, { "id": 47683, "label": "FILEPATH", "start_offset": 80, "end_offset": 92 }, { "id": 47685, "label": "FILEPATH", "start_offset": 93, "end_offset": 109 }, { "id": 47700, "label": "FILEPATH", "start_offset": 280, "end_offset": 293 }, { "id": 47704, "label": "FILEPATH", "start_offset": 328, "end_offset": 344 }, { "id": 47705, "label": "FILEPATH", "start_offset": 345, "end_offset": 361 }, { "id": 47706, "label": "FILEPATH", "start_offset": 362, "end_offset": 375 }, { "id": 47708, "label": "TIME", "start_offset": 377, "end_offset": 416 }, { "id": 47679, "label": "FILEPATH", "start_offset": 33, "end_offset": 42 }, { "id": 47680, "label": "FILEPATH", "start_offset": 43, "end_offset": 52 }, { "id": 47681, "label": "FILEPATH", "start_offset": 53, "end_offset": 68 }, { "id": 47682, "label": "FILEPATH", "start_offset": 69, "end_offset": 79 }, { "id": 47686, "label": "FILEPATH", "start_offset": 110, "end_offset": 130 }, { "id": 47687, "label": "FILEPATH", "start_offset": 131, "end_offset": 143 }, { "id": 47688, "label": "FILEPATH", "start_offset": 144, "end_offset": 152 }, { "id": 47689, "label": "FILEPATH", "start_offset": 154, "end_offset": 166 }, { "id": 47690, "label": "FILEPATH", "start_offset": 167, "end_offset": 174 }, { "id": 47694, "label": "FILEPATH", "start_offset": 195, "end_offset": 212 }, { "id": 47695, "label": "FILEPATH", "start_offset": 213, "end_offset": 231 }, { "id": 47692, "label": "FILEPATH", "start_offset": 175, "end_offset": 184 }, { "id": 47697, "label": "FILEPATH", "start_offset": 247, "end_offset": 254 }, { "id": 47696, "label": "FILEPATH", "start_offset": 232, "end_offset": 246 }, { "id": 47698, "label": "FILEPATH", "start_offset": 255, "end_offset": 271 }, { "id": 47699, "label": "FILEPATH", "start_offset": 272, "end_offset": 279 }, { "id": 47702, "label": "FILEPATH", "start_offset": 294, "end_offset": 308 }, { "id": 47703, "label": "FILEPATH", "start_offset": 309, "end_offset": 316 } ]
[]
[]
2,494
The Palo Alto Networks Product Security Assurance team is evaluating CVE-2022-22963 and CVE-2022-22965 as relates to Palo Alto Networks products and currently assigns this a severity of none.
[ { "id": 47577, "label": "identity", "start_offset": 5, "end_offset": 55 }, { "id": 47578, "label": "vulnerability", "start_offset": 70, "end_offset": 84 }, { "id": 47580, "label": "identity", "start_offset": 118, "end_offset": 136 }, { "id": 47579, "label": "vulnerability", "start_offset": 89, "end_offset": 103 } ]
[]
[]
2,870
Researchers from Palo Alto Networks have investigated this exploit in depth and concluded that this is a Use-After-Free vulnerability that occurs when Internet Explorer tries to reuse a freed CMarkup object.
[ { "id": 48072, "label": "SOFTWARE", "start_offset": 152, "end_offset": 169 }, { "id": 48071, "label": "identity", "start_offset": 18, "end_offset": 36 } ]
[]
[]
14,301
Content of the MiaKhalifa.rar file README.txt provides instructions teaching the user how to turn off the anti-virus software and how to turn on the network, which the attacker needs to steal and upload data to its C&C server.
[ { "id": 48512, "label": "FILEPATH", "start_offset": 15, "end_offset": 29 }, { "id": 48515, "label": "SOFTWARE", "start_offset": 106, "end_offset": 125 }, { "id": 48513, "label": "FILEPATH", "start_offset": 34, "end_offset": 45 }, { "id": 48514, "label": "Infrastucture", "start_offset": 215, "end_offset": 225 } ]
[ { "id": 439, "from_id": 48512, "to_id": 48513, "type": "related-to" }, { "id": 440, "from_id": 48513, "to_id": 48515, "type": "related-to" } ]
[]
4,319
If the target clicks on either the link or on the “unsubscribe” link, it will download a Word document from the domain parinari[.]xyz.
[ { "id": 50123, "label": "DOMAIN", "start_offset": 124, "end_offset": 138 } ]
[]
[]
881
Once completed, the malware sends the result via an HTTP POST request to a remote server.
[]
[]
[]
796
Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!
[]
[]
[]
6,897
We’ve detected a few emerging trends in recent months.
[]
[]
[]
2,155
This code does a few things.
[]
[]
[]
9,450
We believe that it serves as a marker that stage 2 has been completed.
[]
[]
[]
1,331
An example HTTP POST request can be seen below. NFlog When loaded inside of a running process, NFlog begins by spawning a new thread.
[ { "id": 4011, "label": "malware", "start_offset": 50, "end_offset": 55 }, { "id": 4012, "label": "malware", "start_offset": 98, "end_offset": 103 } ]
[]
[]
3,095
The vulnerability status of AMD chips is unclear at the time of this writing.
[]
[]
[]
5,509
Mobile
[]
[]
[]
1,683
While we have identified it as being active since late 2016, Reaver has been used sparingly, with only a small number of unique samples identified.
[ { "id": 45094, "label": "malware", "start_offset": 61, "end_offset": 67 } ]
[]
[]
5,402
Over the past few years, IoT attacks have been escalating globally and internet routers have been one of the primary targets.
[]
[]
[]
6,392
Palo Alto Networks Cortex Xpanse history shows that this port was open from May 21-June 18, 2022, with the same “Microsoft Security” self-signed SSL certificate seen above.
[ { "id": 19823, "label": "location", "start_offset": 107, "end_offset": 111 }, { "id": 19824, "label": "identity", "start_offset": 113, "end_offset": 122 }, { "id": 19825, "label": "location", "start_offset": 123, "end_offset": 131 }, { "id": 19826, "label": "location", "start_offset": 145, "end_offset": 148 } ]
[]
[]
11,731
.JS.SIDEWINDER.A
[]
[]
[]
8,723
The DLL is custom malware that would immediately begin communicating with actor-controlled C2 domains.
[]
[]
[]
6,995
CapraRAT’s persistence mechanism Reducing risks:
[ { "id": 21902, "label": "malware", "start_offset": 0, "end_offset": 8 } ]
[]
[]
10,976
This bulletin includes coordinated influence operation campaigns terminated on our platforms in Q1 of 2020.
[]
[]
[]
705
Everybody I know has been scrambling to understand what it means to their organization, to their business and to their immediate family.
[]
[]
[]
1,501
Effectively, a backdoor implant affects loss of control over a computer asset.
[]
[]
[]
3,651
If an attacker tried to carry this attack out against a target that was patched for this vulnerability, it would fail.
[]
[]
[]
9,128
Acquiring additional modules of the group’s malware, for instance, was nearly impractical if the exploit URLs were loaded in a sandboxed environment.
[]
[]
[]
4,660
The browser then navigates to Gmail to begin the data collection.
[ { "id": 50568, "label": "SOFTWARE", "start_offset": 30, "end_offset": 35 } ]
[]
[]
5,127
And with that in mind we come back to the concept of lateral movement.
[ { "id": 51213, "label": "attack-pattern", "start_offset": 53, "end_offset": 69 } ]
[]
[]
1,846
Inside aswArPot.sys, we saw 0x9988C094 in a switch case with a function sub_14001DC80 case.
[ { "id": 46976, "label": "FILEPATH", "start_offset": 7, "end_offset": 19 } ]
[]
[]
9,478
Uploaded file content FileManage_FolderContent_Packet Folder content VecProcessPacket Vector object with running processes InstallModulePacket BMP with encrypted module to be installed
[ { "id": 29111, "label": "location", "start_offset": 14, "end_offset": 21 }, { "id": 29112, "label": "location", "start_offset": 61, "end_offset": 68 }, { "id": 29113, "label": "tools", "start_offset": 86, "end_offset": 92 } ]
[]
[]
497
The Android Toast Overlay attack specifically targets outdated devices using versions prior to 8.0.
[ { "id": 46133, "label": "attack-pattern", "start_offset": 4, "end_offset": 32 } ]
[]
[]
2,150
The document was abusing the Microsoft Word remote template feature to retrieve a malicious HTML file that subsequently used the ms-msdt Office URI scheme to execute PowerShell within the context of Word.
[ { "id": 47290, "label": "SOFTWARE", "start_offset": 199, "end_offset": 203 }, { "id": 47289, "label": "tools", "start_offset": 166, "end_offset": 176 }, { "id": 47291, "label": "SOFTWARE", "start_offset": 29, "end_offset": 43 } ]
[]
[]
9,785
In general, users should always practice caution when it comes to email.
[]
[]
[]
1,040
More sophisticated and nefarious uses include leveraging accounts in social engineering/phishing attacks or exploiting access to high-value university systems (e.g., personnel, financial, research) to steal information.
[ { "id": 46533, "label": "attack-pattern", "start_offset": 88, "end_offset": 104 }, { "id": 46534, "label": "attack-pattern", "start_offset": 69, "end_offset": 87 }, { "id": 46535, "label": "attack-pattern", "start_offset": 108, "end_offset": 125 }, { "id": 46536, "label": "attack-pattern", "start_offset": 201, "end_offset": 218 } ]
[]
[]
1,454
Ideally, an app developer should generate a unique private key for each unique app they post in the Google Play Store.
[ { "id": 46773, "label": "SOFTWARE", "start_offset": 101, "end_offset": 118 } ]
[]
[]
1,085
This blog was sourced from the data generated by the WildFire Analytics cloud, which processes thousands of samples a day and provides insights into various characteristics and behaviors of malware worldwide.
[ { "id": 46564, "label": "SOFTWARE", "start_offset": 54, "end_offset": 78 } ]
[]
[]
7,764
Send HTTP request using socket API
[]
[]
[]
6,087
At the time of the analysis, BUMBLEBEE was observed to fetch Cobalt Strike payloads.
[ { "id": 18787, "label": "location", "start_offset": 7, "end_offset": 11 }, { "id": 18788, "label": "malware", "start_offset": 29, "end_offset": 38 } ]
[]
[]
77
Using these as our guide, we can make sense of where we are today, how we got here, and be prepared for what has yet to develop in the future.
[]
[]
[]
241
These donation websites provide little to no information about the associated organization and distribution of funds.
[]
[]
[]
4,362
Despite the variety of lures used by the threat actor, best security practices still apply to these attacks.
[]
[]
[]
2,359
It also has several components, some of which appear to be configured as modules.
[]
[]
[]
13,597
The script for uploading and installing the malicious plugin, “MakePlugin.tar.gz” Figure 9.
[ { "id": 51685, "label": "FILEPATH", "start_offset": 63, "end_offset": 80 } ]
[]
[]
6,960
Below is a list of backdoor commands that this particular ObliqueRAT malware variant can perform: Command (v5.2) Info 0 System information
[ { "id": 21789, "label": "location", "start_offset": 11, "end_offset": 15 }, { "id": 21790, "label": "malware", "start_offset": 58, "end_offset": 68 }, { "id": 21791, "label": "location", "start_offset": 85, "end_offset": 88 } ]
[]
[]
6,381
Example of badger_x64.exe:
[]
[]
[]
2,907
All three exploits use the same method and similar addresses to achieve that goal, even including the same hard coded assembly and registers.
[]
[]
[]
3,382
BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 30a65a54acfbf8d412ade728cad86c5c769befa4e456f7c0e552e1ab0862a446 flash-64.exe
[ { "id": 10228, "label": "malware", "start_offset": 0, "end_offset": 11 }, { "id": 10229, "label": "SHA2", "start_offset": 46, "end_offset": 110 }, { "id": 49032, "label": "FILEPATH", "start_offset": 112, "end_offset": 124 }, { "id": 49031, "label": "malware", "start_offset": 20, "end_offset": 44 } ]
[ { "id": 574, "from_id": 49032, "to_id": 10229, "type": "duplicate-of" }, { "id": 575, "from_id": 10228, "to_id": 49031, "type": "duplicate-of" }, { "id": 576, "from_id": 49032, "to_id": 49031, "type": "indicates" }, { "id": 577, "from_id": 10229, "to_id": 49031, "type": "indicates" } ]
[]
205
However, at this time, attribution for the ongoing attacks has not been established.
[]
[]
[]
2,209
The malware proceeds to spawn a new process of the selected executable and performs a technique called process hollowing to hide itself inside a legitimate executable.
[]
[]
[]
7,786
The .MSI file is a downloader with the .DLL FlawedAmmyy downloader inside; it retrieves the final payload, then decrypts and executes FlawedAmmyy RAT.
[ { "id": 24114, "label": "malware", "start_offset": 44, "end_offset": 55 }, { "id": 24115, "label": "location", "start_offset": 121, "end_offset": 124 }, { "id": 24116, "label": "malware", "start_offset": 134, "end_offset": 145 } ]
[]
[]
4,800
Many Russian government cyber assets have remained focused on Ukraine and related issues since the invasion began, while Russian APT activity outside of Ukraine largely remains the same.
[ { "id": 50702, "label": "location", "start_offset": 62, "end_offset": 69 }, { "id": 50703, "label": "threat-actor", "start_offset": 121, "end_offset": 132 }, { "id": 50704, "label": "location", "start_offset": 153, "end_offset": 160 }, { "id": 50701, "label": "threat-actor", "start_offset": 5, "end_offset": 36 } ]
[ { "id": 986, "from_id": 50701, "to_id": 50702, "type": "targets" } ]
[]
10,950
Our team of analysts and security experts is focused on identifying and stopping issues like phishing campaigns, zero-day vulnerabilities and hacking against Google, our products and our users.
[ { "id": 33300, "label": "location", "start_offset": 21, "end_offset": 24 }, { "id": 33301, "label": "location", "start_offset": 25, "end_offset": 33 }, { "id": 33302, "label": "location", "start_offset": 68, "end_offset": 71 }, { "id": 33303, "label": "attack-pattern", "start_offset": 93, "end_offset": 101 }, { "id": 33305, "label": "location", "start_offset": 138, "end_offset": 141 }, { "id": 33307, "label": "location", "start_offset": 179, "end_offset": 182 } ]
[]
[]
1,780
This module validates the accessing behavior at runtime.
[]
[]
[]
10,379
We discovered a potential targeted attack that makes use of legitimate script engine AutoHotkey, in combination with malicious script files.
[]
[]
[]
8,194
The PDF file showing the banking account reference.
[]
[]
[]
200
Shortly after the text messages were observed, several DDoS attacks occurred.
[ { "id": 45895, "label": "attack-pattern", "start_offset": 56, "end_offset": 68 } ]
[]
[]