id
int64
105
14.4k
text
stringlengths
39
889
entities
list
relations
list
Comments
sequence
105
For example, we found that Conti operators use the cloud storage synchronization tool Rclone to upload files to the Mega cloud storage service.
[ { "id": 377, "label": "malware", "start_offset": 116, "end_offset": 120 }, { "id": 44599, "label": "threat-actor", "start_offset": 27, "end_offset": 42 }, { "id": 44600, "label": "tools", "start_offset": 86, "end_offset": 92 }, { "id": 44601, "label": "SOFTWARE", "start_offset": 116, "end_offset": 142 } ]
[ { "id": 1, "from_id": 44599, "to_id": 44600, "type": "uses" }, { "id": 2, "from_id": 44600, "to_id": 44601, "type": "exfiltrates-to" }, { "id": 3, "from_id": 44599, "to_id": 44601, "type": "exfiltrates-to" } ]
[]
106
Similarly, DarkSide operators used Mega client for exfiltrating files to cloud storage, 7-Zip for archiving, and PuTTY application for network file transfers.
[ { "id": 45834, "label": "threat-actor", "start_offset": 11, "end_offset": 29 }, { "id": 45835, "label": "tools", "start_offset": 35, "end_offset": 46 }, { "id": 45836, "label": "tools", "start_offset": 88, "end_offset": 93 }, { "id": 45837, "label": "tools", "start_offset": 113, "end_offset": 118 } ]
[ { "id": 120, "from_id": 45834, "to_id": 45835, "type": "uses" }, { "id": 121, "from_id": 45834, "to_id": 45836, "type": "uses" }, { "id": 122, "from_id": 45834, "to_id": 45837, "type": "uses" } ]
[]
187
On Feb. 23, a new variant of wiper malware named HermeticWiper was discovered in Ukraine.
[ { "id": 591, "label": "malware", "start_offset": 29, "end_offset": 34 }, { "id": 45853, "label": "TIME", "start_offset": 3, "end_offset": 10 }, { "id": 45855, "label": "malware", "start_offset": 49, "end_offset": 62 }, { "id": 45854, "label": "location", "start_offset": 81, "end_offset": 88 } ]
[ { "id": 123, "from_id": 45855, "to_id": 591, "type": "variant-of" }, { "id": 124, "from_id": 45855, "to_id": 45854, "type": "targets" } ]
[]
194
This post was substantially updated March 31 to add information on phishing and scam attacks, cybersquatting trends, fake donation websites, DoS attacks on Ukrainian news sites and distribution of malicious binaries.
[ { "id": 45871, "label": "attack-pattern", "start_offset": 94, "end_offset": 108 }, { "id": 45872, "label": "attack-pattern", "start_offset": 117, "end_offset": 139 }, { "id": 45873, "label": "attack-pattern", "start_offset": 141, "end_offset": 152 }, { "id": 45869, "label": "TIME", "start_offset": 36, "end_offset": 44 }, { "id": 45874, "label": "identity", "start_offset": 156, "end_offset": 176 }, { "id": 45875, "label": "attack-pattern", "start_offset": 181, "end_offset": 215 }, { "id": 45870, "label": "attack-pattern", "start_offset": 67, "end_offset": 92 } ]
[ { "id": 127, "from_id": 45872, "to_id": 45874, "type": "duplicate-of" }, { "id": 129, "from_id": 45875, "to_id": 45874, "type": "targets" }, { "id": 128, "from_id": 45873, "to_id": 45874, "type": "targets" }, { "id": 126, "from_id": 45871, "to_id": 45874, "type": "targets" }, { "id": 125, "from_id": 45870, "to_id": 45874, "type": "targets" } ]
[]
196
DDoS Attacks Impacting Ukrainian Government and Banking Institutions HermeticWiper Malware Website Defacement Rise in Phishing and Scam Attacks Increase in Cybersquatting Trends Fake Donation Websites DoS Attacks on Ukrainian News Sites Distribution of Apps How Palo Alto Networks Is Working to Keep You Safe How You Should Prepare for an Increase in Cyberthreats Such as Wipers, DDoS, Website Defacement and Other Related Attacks How Unit 42 Threat Intelligence and Security Consulting Can Help Additional Cybersecurity Resources Indicators of Compromise
[ { "id": 45877, "label": "attack-pattern", "start_offset": 1, "end_offset": 13 }, { "id": 45879, "label": "attack-pattern", "start_offset": 84, "end_offset": 109 }, { "id": 45885, "label": "attack-pattern", "start_offset": 238, "end_offset": 258 }, { "id": 45889, "label": "attack-pattern", "start_offset": 387, "end_offset": 405 }, { "id": 45891, "label": "identity", "start_offset": 436, "end_offset": 443 }, { "id": 45876, "label": "malware", "start_offset": 70, "end_offset": 83 }, { "id": 45878, "label": "identity", "start_offset": 24, "end_offset": 69 }, { "id": 45880, "label": "attack-pattern", "start_offset": 119, "end_offset": 144 }, { "id": 45881, "label": "attack-pattern", "start_offset": 157, "end_offset": 171 }, { "id": 45882, "label": "attack-pattern", "start_offset": 179, "end_offset": 201 }, { "id": 45883, "label": "attack-pattern", "start_offset": 202, "end_offset": 213 }, { "id": 45884, "label": "identity", "start_offset": 217, "end_offset": 237 }, { "id": 45886, "label": "identity", "start_offset": 263, "end_offset": 281 }, { "id": 45887, "label": "attack-pattern", "start_offset": 373, "end_offset": 379 }, { "id": 45888, "label": "attack-pattern", "start_offset": 381, "end_offset": 385 } ]
[ { "id": 130, "from_id": 45877, "to_id": 45878, "type": "targets" } ]
[]
204
On Feb. 18, both the United States and the United Kingdom attributed these DDoS attacks to Russia’s Main Intelligence Directorate (GRU). Over the past week, Ukraine has continued to observe a relatively constant flow of DDoS attacks targeting its government and financial institutions.
[ { "id": 44621, "label": "identity", "start_offset": 22, "end_offset": 35 }, { "id": 44622, "label": "TIME", "start_offset": 4, "end_offset": 11 }, { "id": 44623, "label": "identity", "start_offset": 44, "end_offset": 58 }, { "id": 44624, "label": "attack-pattern", "start_offset": 76, "end_offset": 80 }, { "id": 44625, "label": "threat-actor", "start_offset": 92, "end_offset": 136 }, { "id": 44626, "label": "identity", "start_offset": 159, "end_offset": 166 }, { "id": 44627, "label": "attack-pattern", "start_offset": 222, "end_offset": 234 }, { "id": 44628, "label": "identity", "start_offset": 249, "end_offset": 286 } ]
[ { "id": 4, "from_id": 44624, "to_id": 44625, "type": "attributed-to" }, { "id": 131, "from_id": 44627, "to_id": 44628, "type": "targets" } ]
[]
207
On Feb. 23, a malicious file named conhosts._exe (SHA256: 1bc44eef75779e3ca1eefb8ff5a64807dbc942b1e4a2672d77b9f6928d292591) was uploaded to a public malware repository from an organization in Kyiv, Ukraine.
[ { "id": 678, "label": "SHA2", "start_offset": 58, "end_offset": 122 }, { "id": 44630, "label": "location", "start_offset": 192, "end_offset": 205 }, { "id": 44631, "label": "FILEPATH", "start_offset": 35, "end_offset": 48 }, { "id": 44632, "label": "TIME", "start_offset": 3, "end_offset": 10 } ]
[ { "id": 133, "from_id": 678, "to_id": 44631, "type": "indicates" } ]
[]
213
In tracking this threat, early reports show that the malware has been deployed against a financial institution in Ukraine as well as two contractors in Latvia and Lithuania that provide services to the Ukrainian Government.
[ { "id": 44633, "label": "location", "start_offset": 114, "end_offset": 121 }, { "id": 44634, "label": "identity", "start_offset": 202, "end_offset": 222 }, { "id": 44635, "label": "identity", "start_offset": 90, "end_offset": 110 }, { "id": 44636, "label": "location", "start_offset": 152, "end_offset": 158 }, { "id": 44637, "label": "location", "start_offset": 163, "end_offset": 172 }, { "id": 44638, "label": "malware", "start_offset": 53, "end_offset": 60 }, { "id": 44639, "label": "identity", "start_offset": 133, "end_offset": 172 } ]
[ { "id": 6, "from_id": 44638, "to_id": 44635, "type": "targets" }, { "id": 7, "from_id": 44638, "to_id": 44639, "type": "targets" } ]
[]
226
On March 16 while ingesting a third-party data feed, our in-house machine learning models detected a phishing webpage targeting a Ukrainian state administration employee.
[ { "id": 756, "label": "attack-pattern", "start_offset": 101, "end_offset": 109 }, { "id": 45928, "label": "TIME", "start_offset": 3, "end_offset": 11 }, { "id": 45929, "label": "identity", "start_offset": 130, "end_offset": 169 } ]
[ { "id": 134, "from_id": 756, "to_id": 45929, "type": "targets" } ]
[]
231
A phishing webpage targeting a Ukrainian state administration employee, detected by our in-house machine learning models on March 16.Our teams at Palo Alto Networks are actively monitoring the phishing landscape surrounding Ukraine-related URLs and are sharing this threat intelligence with relevant authorities in Ukraine and internationally.
[ { "id": 765, "label": "attack-pattern", "start_offset": 2, "end_offset": 10 }, { "id": 771, "label": "attack-pattern", "start_offset": 193, "end_offset": 201 }, { "id": 44647, "label": "identity", "start_offset": 31, "end_offset": 70 }, { "id": 44648, "label": "TIME", "start_offset": 124, "end_offset": 132 }, { "id": 44649, "label": "identity", "start_offset": 146, "end_offset": 164 }, { "id": 44650, "label": "location", "start_offset": 315, "end_offset": 322 } ]
[ { "id": 135, "from_id": 765, "to_id": 44647, "type": "targets" }, { "id": 136, "from_id": 771, "to_id": 44650, "type": "targets" } ]
[]
234
We monitored a list of 50 legitimate Ukraine-related domains (e.g., popular news and donation websites) and keywords (e.g., Ukraine, refugee) as targets for cybersquatting.
[ { "id": 45781, "label": "location", "start_offset": 125, "end_offset": 132 }, { "id": 45934, "label": "location", "start_offset": 38, "end_offset": 45 }, { "id": 44651, "label": "attack-pattern", "start_offset": 158, "end_offset": 172 } ]
[ { "id": 137, "from_id": 44651, "to_id": 45781, "type": "targets" } ]
[]
244
For instance, donatetoukraine[.]com is pretending to be associated with the popular Come Back Alive campaign.
[ { "id": 45942, "label": "DOMAIN", "start_offset": 14, "end_offset": 35 }, { "id": 45943, "label": "campaign", "start_offset": 84, "end_offset": 108 } ]
[ { "id": 138, "from_id": 45942, "to_id": 45943, "type": "related-to" } ]
[]
246
We found a cybersquatting domain – save-russia[.]today – that is launching DoS attacks on Ukrainian news sites.
[ { "id": 44652, "label": "attack-pattern", "start_offset": 13, "end_offset": 27 }, { "id": 44653, "label": "DOMAIN", "start_offset": 37, "end_offset": 56 }, { "id": 44654, "label": "attack-pattern", "start_offset": 77, "end_offset": 88 }, { "id": 44655, "label": "identity", "start_offset": 92, "end_offset": 112 } ]
[ { "id": 8, "from_id": 44653, "to_id": 44655, "type": "targets" }, { "id": 112, "from_id": 44652, "to_id": 44653, "type": "uses" }, { "id": 113, "from_id": 44654, "to_id": 44653, "type": "uses" } ]
[]
249
A cybersquatting domain save-russia[.]today is launching DoS attacks on Ukrainian news sites.
[ { "id": 44656, "label": "attack-pattern", "start_offset": 2, "end_offset": 16 }, { "id": 44657, "label": "DOMAIN", "start_offset": 24, "end_offset": 43 }, { "id": 44658, "label": "attack-pattern", "start_offset": 57, "end_offset": 68 }, { "id": 44659, "label": "identity", "start_offset": 72, "end_offset": 92 } ]
[ { "id": 9, "from_id": 44658, "to_id": 44659, "type": "targets" }, { "id": 114, "from_id": 44656, "to_id": 44657, "type": "uses" }, { "id": 115, "from_id": 44658, "to_id": 44657, "type": "uses" } ]
[]
273
Our Threat Prevention and Web Application and API Security products added coverage for the OctoberCMS vulnerability exploited in the WhisperGate attacks, and we released an XSOAR Playbook to help organizations hunt for this threat.
[ { "id": 906, "label": "malware", "start_offset": 133, "end_offset": 144 }, { "id": 44671, "label": "campaign", "start_offset": 133, "end_offset": 152 }, { "id": 44672, "label": "SOFTWARE", "start_offset": 173, "end_offset": 178 }, { "id": 44670, "label": "vulnerability", "start_offset": 91, "end_offset": 115 } ]
[ { "id": 10, "from_id": 44671, "to_id": 44670, "type": "delivers" } ]
[]
287
Threat Brief: Ongoing Russia and Ukraine Cyber Conflict (Jan. 20) Russia’s Gamaredon aka Primitive Bear APT Group Actively Targeting Ukraine (Updated Feb. 16)
[ { "id": 965, "label": "threat-actor", "start_offset": 76, "end_offset": 85 }, { "id": 966, "label": "threat-actor", "start_offset": 90, "end_offset": 104 }, { "id": 51805, "label": "TIME", "start_offset": 58, "end_offset": 65 }, { "id": 51806, "label": "TIME", "start_offset": 151, "end_offset": 158 }, { "id": 45982, "label": "location", "start_offset": 23, "end_offset": 29 }, { "id": 45983, "label": "location", "start_offset": 34, "end_offset": 41 }, { "id": 45981, "label": "location", "start_offset": 67, "end_offset": 74 } ]
[ { "id": 139, "from_id": 965, "to_id": 966, "type": "duplicate-of" }, { "id": 141, "from_id": 966, "to_id": 45981, "type": "originates-from" }, { "id": 140, "from_id": 965, "to_id": 45981, "type": "originates-from" } ]
[]
288
Spear Phishing Attacks Target Organizations in Ukraine, Payloads Include the Document Stealer OutSteel and the Downloader SaintBot Threat Briefing: Protecting Against Russia-Ukraine Cyber Activity Palo Alto Networks Resource Page: Protect Against Russia-Ukraine Cyber Activity Cortex XDR Protections Against Malware Associated with Ukraine and Russia Cyber Activity
[ { "id": 970, "label": "attack-pattern", "start_offset": 0, "end_offset": 14 }, { "id": 974, "label": "malware", "start_offset": 94, "end_offset": 102 }, { "id": 976, "label": "malware", "start_offset": 122, "end_offset": 130 }, { "id": 977, "label": "location", "start_offset": 167, "end_offset": 173 }, { "id": 978, "label": "location", "start_offset": 174, "end_offset": 181 }, { "id": 979, "label": "identity", "start_offset": 197, "end_offset": 215 }, { "id": 981, "label": "location", "start_offset": 247, "end_offset": 253 }, { "id": 982, "label": "location", "start_offset": 254, "end_offset": 261 }, { "id": 983, "label": "tools", "start_offset": 277, "end_offset": 287 }, { "id": 44679, "label": "identity", "start_offset": 30, "end_offset": 54 }, { "id": 44678, "label": "location", "start_offset": 47, "end_offset": 54 }, { "id": 44685, "label": "location", "start_offset": 332, "end_offset": 339 }, { "id": 44686, "label": "location", "start_offset": 344, "end_offset": 350 } ]
[ { "id": 116, "from_id": 970, "to_id": 44679, "type": "targets" }, { "id": 118, "from_id": 974, "to_id": 970, "type": "uses" }, { "id": 119, "from_id": 976, "to_id": 970, "type": "uses" }, { "id": 117, "from_id": 974, "to_id": 44679, "type": "targets" } ]
[]
304
Last Tuesday, Trusteer reported that a new variant of Citadel, which has long relied on VNC to give attackers remote control over systems, began adding new credentials to systems it infects and enabling the standard Windows remote desktop application (RDP).
[ { "id": 1035, "label": "malware", "start_offset": 54, "end_offset": 61 }, { "id": 46000, "label": "tools", "start_offset": 88, "end_offset": 91 }, { "id": 46001, "label": "tools", "start_offset": 216, "end_offset": 256 }, { "id": 46002, "label": "identity", "start_offset": 14, "end_offset": 22 }, { "id": 46003, "label": "TIME", "start_offset": 0, "end_offset": 12 } ]
[ { "id": 142, "from_id": 1035, "to_id": 46000, "type": "uses" }, { "id": 143, "from_id": 1035, "to_id": 46001, "type": "uses" } ]
[]
324
The latest development in the ransomware world is CryptoWall 2.0, a new version of this malware family that uses the Tor network for command and control.
[ { "id": 44699, "label": "malware", "start_offset": 50, "end_offset": 64 }, { "id": 44700, "label": "tools", "start_offset": 117, "end_offset": 120 } ]
[ { "id": 14, "from_id": 44699, "to_id": 44700, "type": "uses" } ]
[]
329
The attacker holds the key necessary to decrypt the files unless the victim agrees to pay a $500 ransom. Unlike previous versions of CryptoWall, 2.0 communicates with its command and control (C2) server through the Tor anonymization network.
[ { "id": 46021, "label": "malware", "start_offset": 134, "end_offset": 149 }, { "id": 46022, "label": "tools", "start_offset": 216, "end_offset": 219 }, { "id": 46023, "label": "Infrastucture", "start_offset": 172, "end_offset": 203 } ]
[ { "id": 145, "from_id": 46021, "to_id": 46022, "type": "uses" }, { "id": 144, "from_id": 46021, "to_id": 46023, "type": "beacons-to" } ]
[]
331
CryptoWall isn’t the only threat that communicates over Tor and if your network doesn’t have an explicit reason to allow anonymization networks, you should consider blocking the application altogether with your firewall.
[ { "id": 1138, "label": "malware", "start_offset": 0, "end_offset": 10 }, { "id": 1140, "label": "tools", "start_offset": 56, "end_offset": 59 } ]
[ { "id": 147, "from_id": 1138, "to_id": 1140, "type": "uses" } ]
[]
336
All of the domains currently resolve to 151.248.115.146, a Russian IP address and have WhoIs records associated with the e-mail address “ladomfichisi1987@mail.ru”.
[ { "id": 1156, "label": "IPV4", "start_offset": 41, "end_offset": 56 }, { "id": 46025, "label": "location", "start_offset": 60, "end_offset": 67 }, { "id": 44703, "label": "EMAIL", "start_offset": 138, "end_offset": 162 } ]
[ { "id": 148, "from_id": 1156, "to_id": 44703, "type": "related-to" } ]
[]
338
If these domains are confiscated or otherwise shut down, CryptoWall instructs the user to download the Tor Browser and access a website (paytordmbdekmizq.onion) that is only accessible over the Tor network. Unlikely some of it’s more flexible competition, CryptoWall only accepts ransom in the form of BitCoin.
[ { "id": 46026, "label": "malware", "start_offset": 57, "end_offset": 67 }, { "id": 46027, "label": "tools", "start_offset": 103, "end_offset": 114 }, { "id": 46028, "label": "DOMAIN", "start_offset": 137, "end_offset": 159 }, { "id": 46029, "label": "SOFTWARE", "start_offset": 194, "end_offset": 205 }, { "id": 46031, "label": "SOFTWARE", "start_offset": 303, "end_offset": 310 }, { "id": 46030, "label": "malware", "start_offset": 257, "end_offset": 267 } ]
[ { "id": 149, "from_id": 46026, "to_id": 46027, "type": "related-to" }, { "id": 150, "from_id": 46026, "to_id": 46028, "type": "related-to" } ]
[]
345
On October 19, the Kafeine posted a blog discussing the inclusion of CVE-2014-0556 in the Nuclear Pack exploit kit, which was installing CryptoWall 2.0.
[ { "id": 44706, "label": "TIME", "start_offset": 3, "end_offset": 13 }, { "id": 44707, "label": "malware", "start_offset": 137, "end_offset": 151 }, { "id": 44708, "label": "vulnerability", "start_offset": 69, "end_offset": 82 }, { "id": 44709, "label": "malware", "start_offset": 90, "end_offset": 114 }, { "id": 44710, "label": "threat-actor", "start_offset": 19, "end_offset": 26 } ]
[ { "id": 15, "from_id": 44707, "to_id": 44708, "type": "exploits" }, { "id": 16, "from_id": 44709, "to_id": 44707, "type": "delivers" }, { "id": 17, "from_id": 44710, "to_id": 44709, "type": "authored-by" } ]
[]
347
The PDF exploits CVE-2013-2729 to download a binary which also installed CryptoWall 2.0.
[ { "id": 46035, "label": "malware", "start_offset": 74, "end_offset": 88 }, { "id": 46036, "label": "vulnerability", "start_offset": 18, "end_offset": 31 } ]
[ { "id": 151, "from_id": 46035, "to_id": 46036, "type": "exploits" } ]
[]
350
To protect against CryptoWall 2.0 we recommend taking the following actions: Adobe Reader Embedded BMP Parsing Integer Overflow Vulnerability CVE-2014-0556 Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!
[ { "id": 46038, "label": "SOFTWARE", "start_offset": 79, "end_offset": 91 }, { "id": 46039, "label": "vulnerability", "start_offset": 145, "end_offset": 158 }, { "id": 46037, "label": "malware", "start_offset": 20, "end_offset": 34 }, { "id": 46041, "label": "vulnerability", "start_offset": 92, "end_offset": 143 } ]
[ { "id": 152, "from_id": 46037, "to_id": 46039, "type": "exploits" } ]
[]
354
TrustedSec reports on how attackers were apparently able to glean user credentials from a certain device via the Heartbleed vulnerability and use them to log in via a VPN.
[ { "id": 44711, "label": "identity", "start_offset": 0, "end_offset": 10 }, { "id": 44712, "label": "vulnerability", "start_offset": 113, "end_offset": 137 }, { "id": 44713, "label": "tools", "start_offset": 167, "end_offset": 170 }, { "id": 44714, "label": "attack-pattern", "start_offset": 60, "end_offset": 82 } ]
[ { "id": 18, "from_id": 44714, "to_id": 44712, "type": "exploits" } ]
[]
357
As Heartbleed allows the attacker to scrape memory from the vulnerable device, they can retrieve significant amounts of secret information.
[ { "id": 44716, "label": "attack-pattern", "start_offset": 38, "end_offset": 51 }, { "id": 44715, "label": "vulnerability", "start_offset": 4, "end_offset": 14 } ]
[ { "id": 153, "from_id": 44715, "to_id": 44716, "type": "targets" } ]
[]
370
After analysis of the compromise, Volexity determined the initial foothold was the result of a remote code execution vulnerability in Confluence Server and Data Center.
[ { "id": 46061, "label": "vulnerability", "start_offset": 95, "end_offset": 130 }, { "id": 46063, "label": "SOFTWARE", "start_offset": 134, "end_offset": 167 }, { "id": 46062, "label": "identity", "start_offset": 34, "end_offset": 42 } ]
[ { "id": 154, "from_id": 46063, "to_id": 46061, "type": "has" } ]
[]
486
The vulnerability leaves Android users at risk of falling victim to an Android Toast Overlay attack.
[ { "id": 44751, "label": "SOFTWARE", "start_offset": 25, "end_offset": 32 }, { "id": 44753, "label": "attack-pattern", "start_offset": 71, "end_offset": 99 } ]
[ { "id": 155, "from_id": 44753, "to_id": 44751, "type": "targets" } ]
[]
513
Virlock has the largest number of variants due to its file-infector-like behavior.
[ { "id": 46145, "label": "attack-pattern", "start_offset": 54, "end_offset": 81 }, { "id": 44760, "label": "malware", "start_offset": 0, "end_offset": 7 } ]
[ { "id": 159, "from_id": 44760, "to_id": 46145, "type": "uses" } ]
[]
532
One example here is Makop, contained in a 7z archive along with an infostealer malware (SHA256: DE6DFA018773E07C218EF1DF62CE0D99A708841BF1DDFB4C6AD7E323D5D666A4).
[ { "id": 1760, "label": "malware", "start_offset": 67, "end_offset": 78 }, { "id": 1761, "label": "SHA2", "start_offset": 96, "end_offset": 160 }, { "id": 46154, "label": "tools", "start_offset": 42, "end_offset": 44 } ]
[ { "id": 156, "from_id": 1761, "to_id": 1760, "type": "related-to" } ]
[]
534
For example, GandCrab uses JScript as a downloader, leveraging Windows Background Intelligent Transfer Service (BITS) to download the payload in the background (Figure 5).
[ { "id": 44765, "label": "malware", "start_offset": 13, "end_offset": 21 }, { "id": 44766, "label": "tools", "start_offset": 63, "end_offset": 117 } ]
[ { "id": 20, "from_id": 44765, "to_id": 44766, "type": "uses" } ]
[]
535
We also observed that Mailto (AKA NetWalker) tends to deliver ransomware in a highly obfuscated PowerShell script.
[ { "id": 1765, "label": "malware", "start_offset": 22, "end_offset": 28 }, { "id": 1766, "label": "malware", "start_offset": 34, "end_offset": 43 }, { "id": 46155, "label": "attack-pattern", "start_offset": 78, "end_offset": 113 } ]
[ { "id": 162, "from_id": 1766, "to_id": 1765, "type": "duplicate-of" }, { "id": 160, "from_id": 46155, "to_id": 1766, "type": "delivers" }, { "id": 161, "from_id": 46155, "to_id": 1765, "type": "delivers" } ]
[]
537
One example is an exploit RTF that led to downloading and installing Makop ransomware remotely.
[ { "id": 44767, "label": "attack-pattern", "start_offset": 18, "end_offset": 29 }, { "id": 44768, "label": "malware", "start_offset": 69, "end_offset": 85 } ]
[ { "id": 21, "from_id": 44767, "to_id": 44768, "type": "delivers" } ]
[]
554
For example, the Xorist ransomware (SHA256: 4979A10B81C41ECC0FC3A0F376ADE766CE616D2301639F74E0277047CC40E3D6) demanded £1,000 for a ransom; the bitcoin wallet address was 1BFqrLCDwwrxueY7FFDn8DqeoasPJignxt.
[ { "id": 1837, "label": "SHA2", "start_offset": 44, "end_offset": 108 }, { "id": 46168, "label": "malware", "start_offset": 17, "end_offset": 34 }, { "id": 46169, "label": "SOFTWARE", "start_offset": 144, "end_offset": 151 } ]
[ { "id": 157, "from_id": 1837, "to_id": 46168, "type": "indicates" } ]
[]
558
During the operation, 25.1 BTC from 538 wallets was sent to 1NDyJtNTjmwk5xPNhjgAMu4HDHigtobu1s (SHA256: CE11703DEF517306326C48A67A7C859A3DE0F18E2451DF226CE171389A5B7953), which is a wallet owned by Binance cryptocurrency exchange.
[ { "id": 1845, "label": "SHA2", "start_offset": 104, "end_offset": 168 }, { "id": 44776, "label": "identity", "start_offset": 198, "end_offset": 229 } ]
[ { "id": 164, "from_id": 44776, "to_id": 1845, "type": "owns" } ]
[]
564
After infection, Virlock hides the file extension through modification of the registry (HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = 1, HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Hidden = 2).
[ { "id": 1874, "label": "REGISTRYKEY", "start_offset": 88, "end_offset": 164 }, { "id": 1876, "label": "REGISTRYKEY", "start_offset": 170, "end_offset": 241 }, { "id": 44778, "label": "malware", "start_offset": 17, "end_offset": 24 } ]
[ { "id": 165, "from_id": 1874, "to_id": 44778, "type": "indicates" }, { "id": 166, "from_id": 1876, "to_id": 44778, "type": "indicates" } ]
[]
573
Ryuk will change the infected file extension to .RYK, and leave a ransom note called RyukReadMe.html.
[ { "id": 44783, "label": "malware", "start_offset": 1, "end_offset": 5 }, { "id": 44784, "label": "FILEPATH", "start_offset": 86, "end_offset": 101 } ]
[ { "id": 22, "from_id": 44784, "to_id": 44783, "type": "indicates" } ]
[]
600
The attackers behind Hancitor aren’t the first to time their spam attacks like this, but it is an effective tactic to try and increase their chances of success, especially when combined with the other innovation that we’ve seen.
[ { "id": 44791, "label": "malware", "start_offset": 22, "end_offset": 30 }, { "id": 44792, "label": "attack-pattern", "start_offset": 62, "end_offset": 74 } ]
[ { "id": 23, "from_id": 44791, "to_id": 44792, "type": "uses" } ]
[]
602
In the past, Hancitor was sent as a malicious attachment in a spam email which would then download and install the attackers’ final malware like a banking Trojan.
[ { "id": 46195, "label": "malware", "start_offset": 13, "end_offset": 21 }, { "id": 46196, "label": "attack-pattern", "start_offset": 36, "end_offset": 72 } ]
[ { "id": 167, "from_id": 46195, "to_id": 46196, "type": "uses" } ]
[]
606
The spam the attackers use no long has a malicious attachment but instead a malicious link that downloads the malicious Hancitor attachment.
[ { "id": 44794, "label": "malware", "start_offset": 120, "end_offset": 128 }, { "id": 44795, "label": "attack-pattern", "start_offset": 76, "end_offset": 91 }, { "id": 44796, "label": "attack-pattern", "start_offset": 41, "end_offset": 61 } ]
[ { "id": 24, "from_id": 44796, "to_id": 44794, "type": "delivers" }, { "id": 25, "from_id": 44795, "to_id": 44794, "type": "delivers" } ]
[]
613
The hot spots in the United States represents distribution servers which are created using fraud based accounts at various hosting providers that are hosting the Hancitor documents while the hotspots in Asia represent legitimate sites for small and medium businesses that have been compromised by the actors behind Hancitor campaign to host the malicious Hancitor documents.
[ { "id": 46207, "label": "malware", "start_offset": 162, "end_offset": 170 }, { "id": 46208, "label": "location", "start_offset": 203, "end_offset": 207 }, { "id": 46206, "label": "location", "start_offset": 21, "end_offset": 34 }, { "id": 46210, "label": "campaign", "start_offset": 315, "end_offset": 332 }, { "id": 46211, "label": "malware", "start_offset": 355, "end_offset": 363 } ]
[ { "id": 168, "from_id": 46207, "to_id": 46206, "type": "targets" }, { "id": 169, "from_id": 46207, "to_id": 46208, "type": "targets" } ]
[]
621
This post is also available in: 日本語 (Japanese) This Unit 42 blog provides an update on the threat situation surrounding attacks using the Petya Ransomware which are impacting organizations in Ukraine, Russia and to a lesser extent around the world.
[ { "id": 2073, "label": "identity", "start_offset": 58, "end_offset": 65 }, { "id": 2074, "label": "malware", "start_offset": 144, "end_offset": 149 }, { "id": 44803, "label": "malware", "start_offset": 144, "end_offset": 160 }, { "id": 44804, "label": "location", "start_offset": 198, "end_offset": 205 }, { "id": 44805, "label": "location", "start_offset": 207, "end_offset": 213 } ]
[ { "id": 27, "from_id": 44803, "to_id": 44805, "type": "targets" }, { "id": 26, "from_id": 44803, "to_id": 44804, "type": "targets" } ]
[]
634
The latest version of the Petya ransomware is spreading over Windows SMB and is reportedly using the ETERNALBLUE exploit tool, which exploits CVE-2017-0144 and was originally released by the Shadow Brokers group in April 2017.
[ { "id": 2111, "label": "malware", "start_offset": 27, "end_offset": 32 }, { "id": 2113, "label": "malware", "start_offset": 102, "end_offset": 113 }, { "id": 2116, "label": "threat-actor", "start_offset": 188, "end_offset": 206 }, { "id": 46221, "label": "SOFTWARE", "start_offset": 62, "end_offset": 73 }, { "id": 46222, "label": "vulnerability", "start_offset": 143, "end_offset": 156 }, { "id": 46223, "label": "TIME", "start_offset": 216, "end_offset": 226 } ]
[ { "id": 171, "from_id": 2111, "to_id": 46222, "type": "exploits" }, { "id": 170, "from_id": 2111, "to_id": 46221, "type": "targets" }, { "id": 172, "from_id": 2116, "to_id": 2113, "type": "authored-by" }, { "id": 173, "from_id": 46222, "to_id": 46221, "type": "targets" } ]
[]
645
While we have not been able to directly confirm the source, we have seen evidence that a Ukrainian software application called MEDoc was used by attackers to deliver the Petya DLL.
[ { "id": 46229, "label": "location", "start_offset": 90, "end_offset": 99 }, { "id": 44817, "label": "SOFTWARE", "start_offset": 128, "end_offset": 133 }, { "id": 44818, "label": "malware", "start_offset": 171, "end_offset": 176 } ]
[ { "id": 174, "from_id": 44818, "to_id": 44817, "type": "uses" } ]
[]
672
Despite these measures, users still choose to open these files and enable their content, thus allowing macros to continue be a common attack vector – both in wide and simple attacks to deliver ransomware such as Emotet, as well as for sophisticated attacks like this Sofacy campaign.
[ { "id": 2220, "label": "malware", "start_offset": 212, "end_offset": 218 }, { "id": 44819, "label": "campaign", "start_offset": 267, "end_offset": 282 }, { "id": 44821, "label": "threat-actor", "start_offset": 267, "end_offset": 273 } ]
[ { "id": 175, "from_id": 44819, "to_id": 44821, "type": "related-to" } ]
[]
679
An example for such attack vector being leveraged by attackers is CVE-2018-4878, an Adobe Flash Player Zero-Day exploited by embedding malicious SWF files in Excel documents.
[ { "id": 46251, "label": "vulnerability", "start_offset": 66, "end_offset": 79 }, { "id": 46252, "label": "SOFTWARE", "start_offset": 84, "end_offset": 102 }, { "id": 46253, "label": "attack-pattern", "start_offset": 125, "end_offset": 173 } ]
[ { "id": 176, "from_id": 46252, "to_id": 46251, "type": "has" }, { "id": 177, "from_id": 46251, "to_id": 46253, "type": "uses" } ]
[]
684
While still not seen in the wild, similar exploits in Microsoft Equation Editor, such as such as CVE-2018-0807 and CVE-2018-0798, were identified by Unit 42 researchers.
[ { "id": 2275, "label": "identity", "start_offset": 149, "end_offset": 156 }, { "id": 44827, "label": "SOFTWARE", "start_offset": 54, "end_offset": 79 }, { "id": 44824, "label": "vulnerability", "start_offset": 97, "end_offset": 110 }, { "id": 44825, "label": "vulnerability", "start_offset": 115, "end_offset": 128 } ]
[ { "id": 29, "from_id": 44827, "to_id": 44825, "type": "has" }, { "id": 28, "from_id": 44827, "to_id": 44824, "type": "has" } ]
[]
687
They can be used to compromise an endpoint in the following way: This functionality was leveraged in exploitation of CVE-2017-0199 - a Microsoft Office/WordPad remote code execution (RCE) vulnerability patched by Microsoft in September 2017, and was used in multiple campaigns, like this OilRig campaign.
[ { "id": 2292, "label": "identity", "start_offset": 136, "end_offset": 145 }, { "id": 2293, "label": "tools", "start_offset": 146, "end_offset": 152 }, { "id": 2298, "label": "malware", "start_offset": 289, "end_offset": 295 }, { "id": 44828, "label": "vulnerability", "start_offset": 118, "end_offset": 131 }, { "id": 44830, "label": "campaign", "start_offset": 289, "end_offset": 303 }, { "id": 44829, "label": "TIME", "start_offset": 227, "end_offset": 241 }, { "id": 44831, "label": "tools", "start_offset": 136, "end_offset": 152 }, { "id": 44832, "label": "tools", "start_offset": 153, "end_offset": 160 } ]
[ { "id": 30, "from_id": 44831, "to_id": 44828, "type": "has" }, { "id": 31, "from_id": 44832, "to_id": 44828, "type": "has" }, { "id": 32, "from_id": 44830, "to_id": 44828, "type": "exploits" } ]
[]
715
This post is also available in: 日本語 (Japanese) On Aug. 25, 2021, Atlassian released a security advisory for an injection vulnerability in Confluence Server and Data Center, CVE-2021-26084.
[ { "id": 46281, "label": "vulnerability", "start_offset": 179, "end_offset": 193 }, { "id": 46282, "label": "SOFTWARE", "start_offset": 144, "end_offset": 177 }, { "id": 46279, "label": "identity", "start_offset": 71, "end_offset": 80 }, { "id": 46280, "label": "TIME", "start_offset": 56, "end_offset": 69 } ]
[ { "id": 178, "from_id": 46282, "to_id": 46281, "type": "has" } ]
[]
719
The Atlassian products vulnerable to CVE-2021-26084 are those using the following versions of Confluence Server and Data Center: Confluence Cloud customers are not affected by this vulnerability.
[ { "id": 46287, "label": "identity", "start_offset": 5, "end_offset": 14 }, { "id": 46288, "label": "vulnerability", "start_offset": 38, "end_offset": 52 }, { "id": 46290, "label": "SOFTWARE", "start_offset": 131, "end_offset": 147 }, { "id": 46289, "label": "SOFTWARE", "start_offset": 95, "end_offset": 128 } ]
[ { "id": 180, "from_id": 46289, "to_id": 46288, "type": "has" } ]
[]
736
Dubbed OMIGOD, the four vulnerabilities were found to directly affect Azure Cloud Instances.
[ { "id": 46327, "label": "vulnerability", "start_offset": 7, "end_offset": 13 }, { "id": 46328, "label": "SOFTWARE", "start_offset": 70, "end_offset": 81 } ]
[ { "id": 181, "from_id": 46328, "to_id": 46327, "type": "has" } ]
[]
803
Stolen credentials underpin some of the most critical and damaging attacks out there; both Shamoon 2 and the Sofacy threat actor group, for example, have made detailed use of credential theft.
[ { "id": 46358, "label": "attack-pattern", "start_offset": 175, "end_offset": 191 }, { "id": 46356, "label": "threat-actor", "start_offset": 109, "end_offset": 134 }, { "id": 46357, "label": "threat-actor", "start_offset": 91, "end_offset": 100 } ]
[ { "id": 182, "from_id": 46357, "to_id": 46358, "type": "uses" }, { "id": 183, "from_id": 46356, "to_id": 46358, "type": "uses" } ]
[]
804
Credential theft today can happen in many ways, but the most notable are through credential phishing and the use of malware like keyloggers (both staples of the Sofacy group), as well as password reuse.
[ { "id": 44859, "label": "attack-pattern", "start_offset": 1, "end_offset": 17 }, { "id": 44860, "label": "attack-pattern", "start_offset": 82, "end_offset": 101 }, { "id": 44861, "label": "attack-pattern", "start_offset": 130, "end_offset": 140 }, { "id": 44862, "label": "threat-actor", "start_offset": 162, "end_offset": 174 }, { "id": 44863, "label": "attack-pattern", "start_offset": 188, "end_offset": 202 } ]
[ { "id": 33, "from_id": 44862, "to_id": 44863, "type": "uses" }, { "id": 34, "from_id": 44862, "to_id": 44861, "type": "uses" }, { "id": 35, "from_id": 44862, "to_id": 44860, "type": "uses" }, { "id": 36, "from_id": 44862, "to_id": 44859, "type": "uses" } ]
[]
837
While kernel APC attacks aren’t well known and can be hard to understand, their proven success in WanaCrypt0r/WannaCry and the Petya/NotPetya make them an important threat to understand because proven attack techniques are quickly adopted widely.
[ { "id": 2746, "label": "malware", "start_offset": 128, "end_offset": 133 }, { "id": 44880, "label": "attack-pattern", "start_offset": 7, "end_offset": 25 }, { "id": 44881, "label": "malware", "start_offset": 99, "end_offset": 110 }, { "id": 44882, "label": "malware", "start_offset": 111, "end_offset": 119 }, { "id": 44884, "label": "malware", "start_offset": 134, "end_offset": 142 } ]
[ { "id": 185, "from_id": 44882, "to_id": 44880, "type": "uses" }, { "id": 186, "from_id": 2746, "to_id": 44880, "type": "uses" }, { "id": 184, "from_id": 44881, "to_id": 44880, "type": "uses" }, { "id": 187, "from_id": 44884, "to_id": 44880, "type": "uses" } ]
[]
876
analysis sample PClock2 is written in Visual Basic.
[ { "id": 46410, "label": "SOFTWARE", "start_offset": 39, "end_offset": 51 }, { "id": 44898, "label": "malware", "start_offset": 17, "end_offset": 24 } ]
[ { "id": 188, "from_id": 44898, "to_id": 46410, "type": "uses" } ]
[]
914
It’s also interesting to note that each time PClock2 scans a directory or encrypts a file, it makes an HTTP POST request to the C2 server.
[ { "id": 46436, "label": "Infrastucture", "start_offset": 129, "end_offset": 138 }, { "id": 46435, "label": "malware", "start_offset": 46, "end_offset": 53 } ]
[ { "id": 189, "from_id": 46435, "to_id": 46436, "type": "beacons-to" } ]
[]
939
While not all SMS-based IAP applications steal user data, we recently identified that the Chinese Taomike SDK has begun capturing copies of all messages received by the phone and sending them to a Taomike controlled server.
[ { "id": 46449, "label": "location", "start_offset": 91, "end_offset": 98 }, { "id": 44904, "label": "attack-pattern", "start_offset": 42, "end_offset": 57 }, { "id": 44905, "label": "malware", "start_offset": 99, "end_offset": 110 }, { "id": 44907, "label": "Infrastucture", "start_offset": 198, "end_offset": 223 } ]
[ { "id": 37, "from_id": 44905, "to_id": 44907, "type": "exfiltrates-to" }, { "id": 38, "from_id": 44905, "to_id": 44907, "type": "communicates-with" }, { "id": 190, "from_id": 44905, "to_id": 46449, "type": "located-at" }, { "id": 191, "from_id": 44905, "to_id": 44904, "type": "uses" } ]
[]
947
Taomike is a Chinese company that aims to become the biggest mobile advertisement solution platform in China.
[ { "id": 46455, "label": "identity", "start_offset": 1, "end_offset": 8 }, { "id": 46456, "label": "location", "start_offset": 14, "end_offset": 21 }, { "id": 46457, "label": "location", "start_offset": 104, "end_offset": 109 } ]
[ { "id": 192, "from_id": 46455, "to_id": 46456, "type": "located-at" } ]
[]
952
Not all apps that use the Taomike library steal SMS messages.
[ { "id": 46459, "label": "identity", "start_offset": 26, "end_offset": 33 }, { "id": 46460, "label": "attack-pattern", "start_offset": 42, "end_offset": 60 } ]
[ { "id": 193, "from_id": 46459, "to_id": 46460, "type": "uses" } ]
[]
992
Recently, we found email accounts from top universities across the world being sold on Taobao, the largest consumer-to-consumer (C2C) e-commerce platform in China.
[ { "id": 46489, "label": "SOFTWARE", "start_offset": 87, "end_offset": 93 }, { "id": 46490, "label": "location", "start_offset": 157, "end_offset": 162 } ]
[ { "id": 194, "from_id": 46489, "to_id": 46490, "type": "located-at" } ]
[]
1,035
Based on our investigation, we believe that stolen accounts for these universities are actively selling on Taobao.
[ { "id": 44920, "label": "SOFTWARE", "start_offset": 108, "end_offset": 114 }, { "id": 44921, "label": "attack-pattern", "start_offset": 45, "end_offset": 60 } ]
[ { "id": 195, "from_id": 44921, "to_id": 44920, "type": "related-to" } ]
[]
1,252
Using AutoFocus to quickly search and correlate artifacts across the collective set of WildFire and other Palo Alto Networks threat intelligence, we were able to associate the attacks with the group publicly known as “DragonOK.”
[ { "id": 3823, "label": "malware", "start_offset": 87, "end_offset": 95 }, { "id": 3826, "label": "threat-actor", "start_offset": 218, "end_offset": 226 }, { "id": 46628, "label": "SOFTWARE", "start_offset": 6, "end_offset": 15 }, { "id": 46629, "label": "identity", "start_offset": 106, "end_offset": 124 } ]
[ { "id": 196, "from_id": 3826, "to_id": 3823, "type": "authored-by" } ]
[]
1,254
DragonOK has previously targeted Japanese high-tech and manufacturing firms, but we’ve identified a new backdoor malware, named “FormerFirstRAT,” deployed by these attackers.
[ { "id": 3828, "label": "threat-actor", "start_offset": 1, "end_offset": 9 }, { "id": 3832, "label": "malware", "start_offset": 130, "end_offset": 144 }, { "id": 44952, "label": "identity", "start_offset": 34, "end_offset": 76 } ]
[ { "id": 198, "from_id": 3832, "to_id": 3828, "type": "authored-by" }, { "id": 197, "from_id": 3828, "to_id": 44952, "type": "targets" } ]
[]
1,256
This campaign involved five separate phishing attacks, each carrying a different variant of Sysget malware, also known as HelloBridge.
[ { "id": 46631, "label": "attack-pattern", "start_offset": 38, "end_offset": 54 }, { "id": 46632, "label": "malware", "start_offset": 93, "end_offset": 99 }, { "id": 46633, "label": "malware", "start_offset": 123, "end_offset": 134 } ]
[ { "id": 199, "from_id": 46633, "to_id": 46632, "type": "variant-of" } ]
[]
1,260
All of the Sysget files used in this campaign communicate with a single command and control (C2) server, hosted at biosnews[.]info.
[ { "id": 44955, "label": "DOMAIN", "start_offset": 116, "end_offset": 131 }, { "id": 44956, "label": "Infrastucture", "start_offset": 73, "end_offset": 105 }, { "id": 44957, "label": "malware", "start_offset": 12, "end_offset": 24 } ]
[ { "id": 42, "from_id": 44957, "to_id": 44956, "type": "communicates-with" }, { "id": 201, "from_id": 44956, "to_id": 44955, "type": "hosts" } ]
[]
1,262
All five phishing campaigns targeted a Japanese manufacturing firm over the course of two months, but the final campaign also targeted a separate Japanese high-tech organization.
[ { "id": 46637, "label": "attack-pattern", "start_offset": 9, "end_offset": 27 }, { "id": 46639, "label": "identity", "start_offset": 146, "end_offset": 177 }, { "id": 46638, "label": "identity", "start_offset": 39, "end_offset": 61 } ]
[ { "id": 203, "from_id": 46637, "to_id": 46639, "type": "targets" }, { "id": 202, "from_id": 46637, "to_id": 46638, "type": "targets" } ]
[]
1,266
Four of the five Sysget variants included a form of decoy document to trick users into believing they had opened a legitimate file rather than malware.
[ { "id": 46642, "label": "malware", "start_offset": 18, "end_offset": 24 }, { "id": 44958, "label": "attack-pattern", "start_offset": 53, "end_offset": 67 } ]
[ { "id": 204, "from_id": 46642, "to_id": 44958, "type": "uses" } ]
[]
1,277
During analysis of this threat, we identified five additional backdoor tools hosted on biosnews[.]info which may be downloaded by the Sysget variants once the attackers have established a foothold.
[ { "id": 46651, "label": "DOMAIN", "start_offset": 87, "end_offset": 102 }, { "id": 46652, "label": "malware", "start_offset": 134, "end_offset": 140 } ]
[ { "id": 206, "from_id": 46651, "to_id": 46652, "type": "hosts" } ]
[]
1,278
Three of the backdoors, NFlog, PoisonIvy, and NewCT have previously been publicly associated with DragonOK.
[ { "id": 44962, "label": "malware", "start_offset": 25, "end_offset": 30 }, { "id": 44963, "label": "malware", "start_offset": 32, "end_offset": 41 }, { "id": 44964, "label": "malware", "start_offset": 47, "end_offset": 52 }, { "id": 44965, "label": "threat-actor", "start_offset": 99, "end_offset": 107 } ]
[ { "id": 48, "from_id": 44962, "to_id": 44965, "type": "authored-by" }, { "id": 47, "from_id": 44963, "to_id": 44965, "type": "authored-by" }, { "id": 46, "from_id": 44964, "to_id": 44965, "type": "authored-by" } ]
[]
1,283
Figure 7. Relationship between five additional backdoors used by DragonOK and their C2 servers in this campaign.
[ { "id": 46655, "label": "threat-actor", "start_offset": 66, "end_offset": 74 }, { "id": 46656, "label": "Infrastucture", "start_offset": 85, "end_offset": 95 } ]
[ { "id": 208, "from_id": 46655, "to_id": 46656, "type": "uses" } ]
[]
1,320
FormerFirstRAT communicates using unencrypted HTTP over port 443; the use of mismatching ports and communication protocols is not uncommon in targeted attack campaigns.
[ { "id": 3993, "label": "malware", "start_offset": 0, "end_offset": 14 }, { "id": 46669, "label": "campaign", "start_offset": 142, "end_offset": 167 } ]
[ { "id": 210, "from_id": 46669, "to_id": 3993, "type": "uses" } ]
[]
1,355
The CVE-2021-32648 vulnerability lies within the OctoberCMS platform prior to version 1.0.472 and results in an attacker gaining access to any account via a specially crafted account password reset request.
[ { "id": 46687, "label": "vulnerability", "start_offset": 5, "end_offset": 19 }, { "id": 46688, "label": "SOFTWARE", "start_offset": 50, "end_offset": 60 } ]
[ { "id": 211, "from_id": 46688, "to_id": 46687, "type": "has" } ]
[]
1,359
Using our PoC, we created the following demonstration video of how a malicious actor would exploit the CVE-2021-32648 vulnerability, log into the compromised OctoberCMS account and to deface a web page hosted by the server:
[ { "id": 44975, "label": "vulnerability", "start_offset": 103, "end_offset": 117 }, { "id": 44976, "label": "SOFTWARE", "start_offset": 158, "end_offset": 168 } ]
[ { "id": 49, "from_id": 44976, "to_id": 44975, "type": "has" } ]
[]
1,360
To determine how this vulnerability was exploited, we analyzed the patch that developers added to OctoberCMS version 1.0.472 to mitigate the CVE-2021-32648 vulnerability.
[ { "id": 46690, "label": "vulnerability", "start_offset": 141, "end_offset": 155 }, { "id": 46692, "label": "SOFTWARE", "start_offset": 98, "end_offset": 108 } ]
[ { "id": 212, "from_id": 46692, "to_id": 46690, "type": "has" } ]
[]
1,373
Stage1.exe purports to be ransomware, as it overwrites the target’s master boot record with 512 bytes and upon reboot displays the following ransom note: Stage2.exe is a beaconing implant that performs an HTTPS connection to download a JPG file hosted on Discord’s content delivery network (CDN).
[ { "id": 46706, "label": "FILEPATH", "start_offset": 155, "end_offset": 165 }, { "id": 46707, "label": "Infrastucture", "start_offset": 256, "end_offset": 296 }, { "id": 46705, "label": "FILEPATH", "start_offset": 0, "end_offset": 10 } ]
[ { "id": 213, "from_id": 46706, "to_id": 46707, "type": "beacons-to" } ]
[]
1,392
Palo Alto Networks customers receive protections against the OctoberCMS vulnerability in the following ways: Palo Alto Networks customers receive protections against WhisperGate malware in the following ways: The Cortex XSOAR "WhisperGate & CVE-2021-32648'' pack can help automatically detect and mitigate the two threats.
[ { "id": 44991, "label": "identity", "start_offset": 1, "end_offset": 19 }, { "id": 44996, "label": "SOFTWARE", "start_offset": 216, "end_offset": 228 }, { "id": 44998, "label": "vulnerability", "start_offset": 244, "end_offset": 258 }, { "id": 44993, "label": "identity", "start_offset": 111, "end_offset": 129 }, { "id": 44994, "label": "vulnerability", "start_offset": 62, "end_offset": 86 }, { "id": 44995, "label": "malware", "start_offset": 168, "end_offset": 179 }, { "id": 4172, "label": "malware", "start_offset": 230, "end_offset": 241 } ]
[ { "id": 51, "from_id": 44995, "to_id": 44998, "type": "exploits" }, { "id": 214, "from_id": 4172, "to_id": 44998, "type": "exploits" } ]
[]
1,402
Kuluoz is a descendant of the Asprox malware and spreads by sending copies of itself as an e-mail attachment.
[ { "id": 46751, "label": "malware", "start_offset": 31, "end_offset": 37 }, { "id": 46750, "label": "malware", "start_offset": 1, "end_offset": 7 }, { "id": 46752, "label": "attack-pattern", "start_offset": 61, "end_offset": 109 } ]
[ { "id": 216, "from_id": 46750, "to_id": 46751, "type": "variant-of" }, { "id": 217, "from_id": 46751, "to_id": 46752, "type": "uses" }, { "id": 218, "from_id": 46750, "to_id": 46752, "type": "uses" } ]
[]
1,404
Kuluoz makes money for its owner by installing other malware, such as crimeware or fake antivirus programs.
[ { "id": 45008, "label": "malware", "start_offset": 0, "end_offset": 6 }, { "id": 45009, "label": "attack-pattern", "start_offset": 70, "end_offset": 79 }, { "id": 45010, "label": "attack-pattern", "start_offset": 83, "end_offset": 106 } ]
[ { "id": 53, "from_id": 45008, "to_id": 45009, "type": "uses" }, { "id": 54, "from_id": 45008, "to_id": 45010, "type": "uses" } ]
[]
1,416
Geographic Distribution of Koluoz Spam Nodes in North America Thus far we’ve detected the following command and control servers in use.
[ { "id": 45013, "label": "Infrastucture", "start_offset": 35, "end_offset": 45 }, { "id": 45016, "label": "Infrastucture", "start_offset": 103, "end_offset": 121 }, { "id": 45012, "label": "malware", "start_offset": 28, "end_offset": 34 }, { "id": 45014, "label": "location", "start_offset": 49, "end_offset": 62 } ]
[ { "id": 55, "from_id": 45012, "to_id": 45013, "type": "communicates-with" }, { "id": 56, "from_id": 45013, "to_id": 45014, "type": "located-at" } ]
[]
1,479
In addition to our research, the Baidu Security team in China recently found 23 mobile banking apps sharing the same certificate hosted by a third party app developer and reported the discovery to the CNCERT in China.
[ { "id": 45023, "label": "location", "start_offset": 56, "end_offset": 61 }, { "id": 45025, "label": "location", "start_offset": 211, "end_offset": 216 }, { "id": 45026, "label": "identity", "start_offset": 201, "end_offset": 207 }, { "id": 45024, "label": "identity", "start_offset": 33, "end_offset": 52 } ]
[ { "id": 58, "from_id": 45026, "to_id": 45025, "type": "located-at" }, { "id": 219, "from_id": 45024, "to_id": 45023, "type": "located-at" } ]
[]
1,503
Recently Palo Alto Networks discovered a backdoor program ( md5: b826fb1253a52a3b53afa3b7543d7694, sha256: 6bedd1b0716fe7632188932451f75295346836545e6d2bfee1b56121e02ca110 ) that is used to control a linux operating system.
[ { "id": 45032, "label": "SHA2", "start_offset": 108, "end_offset": 172 }, { "id": 45033, "label": "identity", "start_offset": 10, "end_offset": 28 }, { "id": 45031, "label": "MD5", "start_offset": 66, "end_offset": 98 }, { "id": 45034, "label": "SOFTWARE", "start_offset": 201, "end_offset": 223 } ]
[ { "id": 220, "from_id": 45031, "to_id": 45032, "type": "related-to" } ]
[]
1,529
This post is also available in: 日本語 (Japanese) In July 2020, Microsoft released a security update, CVE-2020-1350 | Windows DNS Server Remote Code Execution Vulnerability, for a new remote code execution (RCE) vulnerability.
[ { "id": 46789, "label": "TIME", "start_offset": 56, "end_offset": 65 }, { "id": 46790, "label": "identity", "start_offset": 67, "end_offset": 76 }, { "id": 46791, "label": "vulnerability", "start_offset": 105, "end_offset": 118 }, { "id": 46792, "label": "vulnerability", "start_offset": 121, "end_offset": 176 }, { "id": 46793, "label": "attack-pattern", "start_offset": 187, "end_offset": 214 } ]
[ { "id": 221, "from_id": 46791, "to_id": 46792, "type": "related-to" }, { "id": 223, "from_id": 46793, "to_id": 46791, "type": "targets" }, { "id": 222, "from_id": 46793, "to_id": 46792, "type": "targets" } ]
[]
1,540
Overview Palo Alto Networks Unit 42 threat research team has just uncovered a new set of attacks by the Sofacy group using malicious emails targeting foreign affairs agencies and ministries in North America and Europe, including a European embassy in Moscow.
[ { "id": 46799, "label": "identity", "start_offset": 9, "end_offset": 56 }, { "id": 46801, "label": "location", "start_offset": 193, "end_offset": 206 }, { "id": 46802, "label": "location", "start_offset": 211, "end_offset": 217 }, { "id": 46806, "label": "attack-pattern", "start_offset": 123, "end_offset": 139 }, { "id": 46808, "label": "location", "start_offset": 251, "end_offset": 257 }, { "id": 46807, "label": "identity", "start_offset": 231, "end_offset": 247 }, { "id": 46805, "label": "threat-actor", "start_offset": 104, "end_offset": 116 } ]
[ { "id": 226, "from_id": 46805, "to_id": 46806, "type": "uses" }, { "id": 227, "from_id": 46807, "to_id": 46808, "type": "located-at" }, { "id": 228, "from_id": 46805, "to_id": 46807, "type": "targets" }, { "id": 229, "from_id": 46805, "to_id": 46801, "type": "targets" }, { "id": 230, "from_id": 46805, "to_id": 46802, "type": "targets" } ]
[]
1,542
The Sofacy Group (AKA APT28, Grizzly Steppe, Fancy Bear, STRONTIUM, Sednit, Tsar Team, Pawn Storm) is a well-known hacking organization widely reported to be associated with Russia by the US Intelligence Community, numerous media reports and other cybersecurity companies.
[ { "id": 45045, "label": "threat-actor", "start_offset": 4, "end_offset": 16 }, { "id": 45046, "label": "threat-actor", "start_offset": 22, "end_offset": 27 }, { "id": 45051, "label": "threat-actor", "start_offset": 76, "end_offset": 85 }, { "id": 45052, "label": "threat-actor", "start_offset": 87, "end_offset": 97 }, { "id": 45053, "label": "location", "start_offset": 174, "end_offset": 180 }, { "id": 45054, "label": "identity", "start_offset": 188, "end_offset": 213 }, { "id": 45047, "label": "threat-actor", "start_offset": 29, "end_offset": 43 }, { "id": 45048, "label": "threat-actor", "start_offset": 45, "end_offset": 55 }, { "id": 45049, "label": "threat-actor", "start_offset": 57, "end_offset": 66 }, { "id": 45050, "label": "threat-actor", "start_offset": 68, "end_offset": 74 } ]
[ { "id": 59, "from_id": 45045, "to_id": 45053, "type": "located-at" }, { "id": 60, "from_id": 45046, "to_id": 45053, "type": "located-at" }, { "id": 62, "from_id": 45048, "to_id": 45053, "type": "located-at" }, { "id": 63, "from_id": 45049, "to_id": 45053, "type": "located-at" }, { "id": 64, "from_id": 45050, "to_id": 45053, "type": "located-at" }, { "id": 68, "from_id": 45046, "to_id": 45045, "type": "duplicate-of" }, { "id": 69, "from_id": 45047, "to_id": 45045, "type": "duplicate-of" }, { "id": 65, "from_id": 45051, "to_id": 45053, "type": "located-at" }, { "id": 66, "from_id": 45052, "to_id": 45053, "type": "located-at" }, { "id": 70, "from_id": 45048, "to_id": 45045, "type": "duplicate-of" }, { "id": 71, "from_id": 45049, "to_id": 45045, "type": "duplicate-of" }, { "id": 72, "from_id": 45050, "to_id": 45045, "type": "duplicate-of" }, { "id": 61, "from_id": 45047, "to_id": 45053, "type": "located-at" }, { "id": 73, "from_id": 45051, "to_id": 45045, "type": "duplicate-of" }, { "id": 74, "from_id": 45052, "to_id": 45045, "type": "duplicate-of" } ]
[]
1,543
Sofacy Group has been associated with many attacks against targets around the world, including the International Olympic Committee (IOC) in 2018, the World Anti-Doping Agency in 2016, the Dutch Safety Board in 2015, and German, French, Ukrainian, and Dutch political and military targets throughout 2014 through 2018.
[ { "id": 46818, "label": "location", "start_offset": 221, "end_offset": 227 }, { "id": 46819, "label": "location", "start_offset": 229, "end_offset": 235 }, { "id": 46820, "label": "location", "start_offset": 237, "end_offset": 246 }, { "id": 46822, "label": "identity", "start_offset": 151, "end_offset": 175 }, { "id": 46812, "label": "identity", "start_offset": 100, "end_offset": 137 }, { "id": 46813, "label": "TIME", "start_offset": 141, "end_offset": 145 }, { "id": 46814, "label": "TIME", "start_offset": 300, "end_offset": 304 }, { "id": 46816, "label": "TIME", "start_offset": 179, "end_offset": 183 }, { "id": 46821, "label": "location", "start_offset": 252, "end_offset": 257 }, { "id": 46823, "label": "identity", "start_offset": 189, "end_offset": 207 }, { "id": 46824, "label": "identity", "start_offset": 258, "end_offset": 288 }, { "id": 46811, "label": "threat-actor", "start_offset": 1, "end_offset": 13 }, { "id": 46815, "label": "TIME", "start_offset": 313, "end_offset": 317 }, { "id": 46817, "label": "TIME", "start_offset": 211, "end_offset": 215 } ]
[ { "id": 231, "from_id": 46811, "to_id": 46812, "type": "targets" }, { "id": 232, "from_id": 46811, "to_id": 46822, "type": "targets" }, { "id": 233, "from_id": 46811, "to_id": 46823, "type": "targets" }, { "id": 234, "from_id": 46811, "to_id": 46824, "type": "targets" }, { "id": 236, "from_id": 46824, "to_id": 46818, "type": "located-at" }, { "id": 237, "from_id": 46824, "to_id": 46819, "type": "located-at" }, { "id": 238, "from_id": 46824, "to_id": 46820, "type": "located-at" }, { "id": 239, "from_id": 46824, "to_id": 46821, "type": "located-at" } ]
[]
1,569
Bad Rabbit is a ransomware attack that, at the time of this writing, appears to primarily be affecting countries in Eastern Europe.
[ { "id": 45059, "label": "malware", "start_offset": 1, "end_offset": 11 }, { "id": 45060, "label": "location", "start_offset": 117, "end_offset": 131 } ]
[ { "id": 75, "from_id": 45059, "to_id": 45060, "type": "targets" } ]
[]
1,572
As detailed below, Bad Rabbit gains initial entry by posing as an Adobe Flash update.
[ { "id": 45062, "label": "malware", "start_offset": 20, "end_offset": 30 }, { "id": 45063, "label": "SOFTWARE", "start_offset": 67, "end_offset": 78 } ]
[ { "id": 240, "from_id": 45062, "to_id": 45063, "type": "related-to" } ]
[]
1,580
According to ESET, the initial infection vector for Bad Rabbit is through a fake Adobe Flash update that is offered up from compromised websites.
[ { "id": 4716, "label": "malware", "start_offset": 53, "end_offset": 63 }, { "id": 46834, "label": "identity", "start_offset": 14, "end_offset": 18 }, { "id": 46835, "label": "SOFTWARE", "start_offset": 82, "end_offset": 93 } ]
[ { "id": 241, "from_id": 4716, "to_id": 46835, "type": "related-to" } ]
[]
1,584
Reports indicate that it harvests credentials using Mimikatz and Maarten van Dantzig reports it also uses common hardcoded credentials to spread.
[ { "id": 45067, "label": "tools", "start_offset": 52, "end_offset": 60 }, { "id": 45068, "label": "identity", "start_offset": 65, "end_offset": 84 }, { "id": 45069, "label": "attack-pattern", "start_offset": 25, "end_offset": 45 } ]
[ { "id": 76, "from_id": 45069, "to_id": 45067, "type": "uses" } ]
[]
1,640
In total we’ve found 18 different applications in the Google Play store that contain the Funtasy Trojan.
[ { "id": 46863, "label": "malware", "start_offset": 90, "end_offset": 97 }, { "id": 46864, "label": "SOFTWARE", "start_offset": 55, "end_offset": 66 } ]
[ { "id": 242, "from_id": 46864, "to_id": 46863, "type": "hosts" } ]
[]
1,654
Of particular note is how these actors use a Remote Administration Tool (RAT) named NetWire (part of the NetWiredRC malware family).
[ { "id": 46866, "label": "malware", "start_offset": 85, "end_offset": 92 }, { "id": 46867, "label": "malware", "start_offset": 106, "end_offset": 116 } ]
[ { "id": 243, "from_id": 46866, "to_id": 46867, "type": "variant-of" } ]
[]
1,687
While the SunOrcal malware family has been confirmed to have been active since 2013, possibly even earlier, this new variant has been observed targeting regions outside of the typical target radius for this threat group, now expanding to include Vietnam and Myanmar.
[ { "id": 5005, "label": "malware", "start_offset": 10, "end_offset": 18 }, { "id": 46877, "label": "TIME", "start_offset": 79, "end_offset": 83 }, { "id": 46878, "label": "location", "start_offset": 246, "end_offset": 253 }, { "id": 46879, "label": "location", "start_offset": 258, "end_offset": 265 } ]
[ { "id": 244, "from_id": 5005, "to_id": 46878, "type": "targets" }, { "id": 246, "from_id": 5005, "to_id": 46879, "type": "targets" } ]
[]
1,708
Last year we highlighted two malware families on this blog: CryptoWall 2.0 and Dyreza/Dyre.
[ { "id": 46883, "label": "malware", "start_offset": 61, "end_offset": 75 }, { "id": 46884, "label": "malware", "start_offset": 80, "end_offset": 86 }, { "id": 46885, "label": "malware", "start_offset": 87, "end_offset": 91 } ]
[ { "id": 247, "from_id": 46884, "to_id": 46885, "type": "duplicate-of" } ]
[]
1,711
In October, CryptoWall 2.0 began using the Tor anonymity network to serve web pages to infected users who wanted their encrypted files back.
[ { "id": 5083, "label": "tools", "start_offset": 44, "end_offset": 47 }, { "id": 46886, "label": "TIME", "start_offset": 4, "end_offset": 11 }, { "id": 46887, "label": "malware", "start_offset": 13, "end_offset": 27 } ]
[ { "id": 248, "from_id": 46887, "to_id": 5083, "type": "uses" } ]
[]
1,712
In this case a legitimate service (Tor) was being abused by CryptoWall so it could avoid having its C2 servers shut down.
[ { "id": 5086, "label": "malware", "start_offset": 60, "end_offset": 70 }, { "id": 5085, "label": "tools", "start_offset": 35, "end_offset": 38 } ]
[ { "id": 249, "from_id": 5086, "to_id": 5085, "type": "uses" } ]
[]
1,716
I2P users can access specific I2P services that are only accessible on I2P, or access Internet resources without exposing their IP address. In the case of CryptoWall 3.0, the malware is attempting to access multiple .i2p resources only accessible through I2P, also known as “eepSites.” The CryptoWall 3.0 uses I2P in the same way CryptoWall 2.0 used Tor, to give victims access to a decrypting service to get their files back.
[ { "id": 45105, "label": "SOFTWARE", "start_offset": 71, "end_offset": 74 }, { "id": 45104, "label": "SOFTWARE", "start_offset": 30, "end_offset": 33 }, { "id": 45106, "label": "malware", "start_offset": 156, "end_offset": 170 }, { "id": 45107, "label": "SOFTWARE", "start_offset": 256, "end_offset": 260 }, { "id": 45108, "label": "malware", "start_offset": 292, "end_offset": 306 }, { "id": 45110, "label": "SOFTWARE", "start_offset": 312, "end_offset": 315 }, { "id": 45111, "label": "malware", "start_offset": 332, "end_offset": 346 }, { "id": 45103, "label": "SOFTWARE", "start_offset": 0, "end_offset": 3 }, { "id": 5104, "label": "tools", "start_offset": 352, "end_offset": 355 } ]
[ { "id": 250, "from_id": 45111, "to_id": 5104, "type": "uses" }, { "id": 252, "from_id": 45108, "to_id": 45111, "type": "related-to" }, { "id": 253, "from_id": 45106, "to_id": 45107, "type": "uses" }, { "id": 251, "from_id": 45108, "to_id": 45110, "type": "uses" } ]
[]
1,757
And before long, Yuki Chen (@guhe120), a Chinese researcher, posted his answer.
[ { "id": 46908, "label": "identity", "start_offset": 28, "end_offset": 36 }, { "id": 46907, "label": "identity", "start_offset": 17, "end_offset": 26 }, { "id": 46909, "label": "location", "start_offset": 41, "end_offset": 48 } ]
[ { "id": 254, "from_id": 46907, "to_id": 46908, "type": "duplicate-of" }, { "id": 255, "from_id": 46907, "to_id": 46909, "type": "located-at" }, { "id": 256, "from_id": 46908, "to_id": 46909, "type": "located-at" } ]
[]
1,787
While previous AvosLocker infections employ similar routines, this is the first sample we observed from the US with the capability to disable a defense solution using a legitimate Avast Anti-Rootkit Driver file (asWarPot.sys).
[ { "id": 5285, "label": "malware", "start_offset": 15, "end_offset": 25 }, { "id": 46915, "label": "FILEPATH", "start_offset": 212, "end_offset": 224 }, { "id": 46916, "label": "SOFTWARE", "start_offset": 180, "end_offset": 205 }, { "id": 46917, "label": "location", "start_offset": 108, "end_offset": 110 } ]
[ { "id": 257, "from_id": 5285, "to_id": 46916, "type": "targets" }, { "id": 258, "from_id": 5285, "to_id": 46917, "type": "targets" } ]
[]

No dataset card yet

New: Create and edit this dataset card directly on the website!

Contribute a Dataset Card
Downloads last month
0
Add dataset card