id
int64
1
14.4k
text
stringlengths
3
5.01k
entities
list
relations
list
Comments
list
4,675
StartsWith("Help us protect you: Security advice from Google")
[]
[]
[]
415
And for shoppers, the impact of a successful attack is minimal: there are no lasting effects or impact, making it an annoyance at worst. But because of the potential impact on holiday shopping and the ease of attacks, unauthorized coin mining is an attack that retailers need to be aware of and take active steps for prevention this holiday season.
[ { "id": 46113, "label": "attack-pattern", "start_offset": 219, "end_offset": 243 } ]
[]
[]
12,046
We have a long-standing policy to send you a warning if we detect that your account is a target of government-backed phishing or malware attempts.
[ { "id": 37269, "label": "location", "start_offset": 10, "end_offset": 14 }, { "id": 37270, "label": "location", "start_offset": 89, "end_offset": 95 }, { "id": 37271, "label": "attack-pattern", "start_offset": 117, "end_offset": 125 } ]
[]
[]
13,600
(Note that Flash has been declared end-of-life by Adobe since December 31, 2020.) If the victim downloads and executes the installer downloaded from this page, the victim will be infected with a variant of Gh0stRat malware, previously also named Gh0stCringe or CineregRAT.
[ { "id": 51687, "label": "TIME", "start_offset": 62, "end_offset": 79 }, { "id": 51688, "label": "malware", "start_offset": 207, "end_offset": 215 }, { "id": 51689, "label": "malware", "start_offset": 247, "end_offset": 258 }, { "id": 51690, "label": "malware", "start_offset": 262, "end_offset": 272 } ]
[ { "id": 1133, "from_id": 51688, "to_id": 51689, "type": "related-to" }, { "id": 1134, "from_id": 51688, "to_id": 51690, "type": "related-to" } ]
[]
7,951
This method has several stages:
[]
[]
[]
14,234
In fact, we found references to PlugX in the C&C strings we analyzed, indicating that the group may also be using the same backdoor in this particular campaign.
[ { "id": 44021, "label": "malware", "start_offset": 32, "end_offset": 37 } ]
[]
[]
2,516
The FBI has connected Conti to more than 400 cyberattacks against organizations worldwide, three-quarters of which are based in the U.S., with demands as high as $25 million.
[ { "id": 47712, "label": "threat-actor", "start_offset": 23, "end_offset": 28 }, { "id": 47713, "label": "location", "start_offset": 133, "end_offset": 137 }, { "id": 47711, "label": "identity", "start_offset": 5, "end_offset": 8 } ]
[ { "id": 343, "from_id": 47712, "to_id": 47713, "type": "targets" } ]
[]
12,849
A security professional can leverage MITRE ATT&CK to audit for coverage gaps to discover where they may be vulnerable to threats.
[ { "id": 40046, "label": "location", "start_offset": 2, "end_offset": 10 }, { "id": 40047, "label": "location", "start_offset": 24, "end_offset": 27 }, { "id": 40048, "label": "malware", "start_offset": 28, "end_offset": 36 }, { "id": 40050, "label": "location", "start_offset": 100, "end_offset": 103 } ]
[]
[]
14,370
End users and enterprises can also benefit from multilayered mobile security solutions such as Trend Micro™ Mobile Security for Android™ which is also available on Google Play.
[]
[]
[]
1,547
The figure below shows an example.
[]
[]
[]
13,346
How a scheduled task delivers the malware to a victim's environment
[ { "id": 41531, "label": "attack-pattern", "start_offset": 6, "end_offset": 20 } ]
[]
[]
619
Please mark, I'm not a robot!
[]
[]
[]
5,437
In such cases, an average user would not have the ability to fix a Cyclops Blink infection.
[ { "id": 51436, "label": "malware", "start_offset": 67, "end_offset": 80 } ]
[]
[]
8,276
Some of these domains were also tied to banking malware, confirming our attacker was not limited to embassies.
[]
[]
[]
1,978
It should be noted that if you want modify the “CookieSize“ value, you should modify the other length fields to keep the packet structure valid, as shown below in Figure 4.
[]
[]
[]
11,762
Some commodity malware used included RedLine, Vidar, Predator The Thief, Nexus stealer, Azorult, Raccoon, Grand Stealer, Vikro Stealer, Masad (Google’s naming), and Kantal (Google’s naming) which shares code similarity with Vidar.
[ { "id": 36265, "label": "malware", "start_offset": 79, "end_offset": 86 }, { "id": 36272, "label": "location", "start_offset": 161, "end_offset": 164 } ]
[]
[]
13,704
As a result, traditional security solutions won’t be able to protect accounts and systems from such attacks.
[]
[]
[]
568
The attacker asked for $250 and required payment as 0.004 BTC (suggesting that at the time the ransom note was written, 1 BTC equaled approximately $62,500).
[]
[]
[]
5,029
These phishing domains have been blocked through Google Safe Browsing – a service that identifies unsafe websites across the web and notifies users and website owners of potential harm.
[ { "id": 51097, "label": "SOFTWARE", "start_offset": 49, "end_offset": 69 } ]
[]
[]
2,346
The exploit worked and ran our bash script as root.
[]
[]
[]
9,321
Figure 5. Magecart Group 11 injection pattern Figure 6.
[ { "id": 28763, "label": "threat-actor", "start_offset": 11, "end_offset": 19 } ]
[]
[]
988
Acknowledgement We greatly appreciate the help from Rongbo Shao from Palo Alto Networks in working on the Threat Prevention signature.
[ { "id": 46482, "label": "identity", "start_offset": 71, "end_offset": 89 }, { "id": 46483, "label": "identity", "start_offset": 54, "end_offset": 65 } ]
[]
[]
942
Background WildFire captures many samples of mobile malware that intercept and upload SMS messages.
[ { "id": 44908, "label": "identity", "start_offset": 12, "end_offset": 20 } ]
[]
[]
5,241
AnubisSpy has several modules, each of which has a separate role.
[ { "id": 51275, "label": "malware", "start_offset": 0, "end_offset": 9 } ]
[]
[]
4,752
While vulnerability research is an important contributor to online safety when that research is used to improve the security of products, vendors stockpiling zero-day vulnerabilities in secret can pose a severe risk to the Internet when the vendor itself gets compromised.
[]
[]
[]
14,218
Although gzwrite64 is imported by loadperf.dll, the payload’s main function is actually located in the DLLMain of “loadoerf.ini”.
[ { "id": 48244, "label": "FILEPATH", "start_offset": 115, "end_offset": 127 }, { "id": 48246, "label": "FILEPATH", "start_offset": 34, "end_offset": 46 }, { "id": 48247, "label": "SOFTWARE", "start_offset": 9, "end_offset": 19 } ]
[]
[]
14,361
The following figures show how Maikspy variants from 2016 to 2018 are connected to C&C servers (found in this appendix, along with the Android and Windows hashes) used by the attackers: Figure 20.
[ { "id": 51783, "label": "malware", "start_offset": 31, "end_offset": 38 }, { "id": 51784, "label": "SOFTWARE", "start_offset": 135, "end_offset": 142 }, { "id": 51785, "label": "SOFTWARE", "start_offset": 147, "end_offset": 154 } ]
[]
[]
4,207
This time, the threat actor seems to have a new modus operandi, setting up two new websites and new payloads with which to compromise its targets.
[]
[]
[]
5,478
The chat logs shed light on the social engineering used by the operators to persuade victims to install the cyberespionage malware on their Android devices.
[ { "id": 51470, "label": "SOFTWARE", "start_offset": 140, "end_offset": 147 }, { "id": 51469, "label": "attack-pattern", "start_offset": 32, "end_offset": 50 } ]
[]
[]
3,249
This file contains the victim ID assigned by the command-and-control (C&C) server.
[]
[]
[]
10,468
If the link was not active, the user was redirected directly to a legitimate website.
[]
[]
[]
3,514
Protux:
[ { "id": 10643, "label": "malware", "start_offset": 0, "end_offset": 6 } ]
[]
[]
1,290
It attempts to obtain a handle to this window using the FindWindowW API call and then proceeds to send the following command to this executable.
[]
[]
[]
3,359
Indicators of Compromise (IoCs) SHA256 Filename Note Analysis 84fbf74896d2a1b62d73b9a5d0be2f627d522fc811fe08044e5485492d2d4249 big.txt BIOPASS RAT Python Script (Version 3) TrojanSpy.Python.BIOPASS.A f3c96145c9d6972df265e12accfcd1588cee8af1b67093011e31b44d0200871f c1222.txt BIOPASS RAT Python Script (C1222 module) Trojan.Python.BIOPASS.A 0f8a87ca5f94949904804442c1a0651f99ba17ecf989f46a3b2fde8de455c4a4 c1222.txt BIOPASS RAT Python Script (C1222 module) Trojan.Python.BIOPASS.A d8b1c4ad8f31c735c51cb24e9f767649f78ef5c571769fbaac9891c899c33444 c1222.txt BIOPASS RAT Python Script (C1222 module)
[ { "id": 10167, "label": "SHA1", "start_offset": 71, "end_offset": 135 }, { "id": 10168, "label": "malware", "start_offset": 146, "end_offset": 157 }, { "id": 10169, "label": "SHA1", "start_offset": 213, "end_offset": 277 }, { "id": 10170, "label": "malware", "start_offset": 290, "end_offset": 301 }, { "id": 10171, "label": "SHA2", "start_offset": 357, "end_offset": 421 }, { "id": 10172, "label": "malware", "start_offset": 434, "end_offset": 445 }, { "id": 10173, "label": "SHA2", "start_offset": 501, "end_offset": 565 }, { "id": 10174, "label": "malware", "start_offset": 578, "end_offset": 589 }, { "id": 48970, "label": "FILEPATH", "start_offset": 137, "end_offset": 144 }, { "id": 48972, "label": "FILEPATH", "start_offset": 279, "end_offset": 288 }, { "id": 48975, "label": "malware", "start_offset": 476, "end_offset": 499 }, { "id": 48976, "label": "FILEPATH", "start_offset": 567, "end_offset": 576 }, { "id": 48974, "label": "FILEPATH", "start_offset": 423, "end_offset": 432 }, { "id": 48971, "label": "malware", "start_offset": 185, "end_offset": 211 }, { "id": 48973, "label": "malware", "start_offset": 332, "end_offset": 355 } ]
[ { "id": 516, "from_id": 10167, "to_id": 10168, "type": "indicates" }, { "id": 517, "from_id": 48970, "to_id": 10168, "type": "indicates" }, { "id": 519, "from_id": 48970, "to_id": 10167, "type": "duplicate-of" }, { "id": 520, "from_id": 10168, "to_id": 48971, "type": "duplicate-of" }, { "id": 521, "from_id": 10169, "to_id": 10170, "type": "indicates" }, { "id": 522, "from_id": 48972, "to_id": 10170, "type": "indicates" }, { "id": 523, "from_id": 48972, "to_id": 10169, "type": "duplicate-of" }, { "id": 524, "from_id": 48973, "to_id": 10170, "type": "duplicate-of" }, { "id": 525, "from_id": 10171, "to_id": 10172, "type": "indicates" }, { "id": 526, "from_id": 48974, "to_id": 10172, "type": "indicates" }, { "id": 527, "from_id": 48975, "to_id": 10172, "type": "duplicate-of" }, { "id": 528, "from_id": 48974, "to_id": 10171, "type": "duplicate-of" }, { "id": 529, "from_id": 10173, "to_id": 10174, "type": "indicates" }, { "id": 530, "from_id": 48976, "to_id": 10174, "type": "indicates" }, { "id": 531, "from_id": 48976, "to_id": 10173, "type": "duplicate-of" } ]
[]
5,203
Scope
[]
[]
[]
2,650
The ransomware note was also used to recruit insiders from victim organizations.
[]
[]
[]
8,825
For example in 2017, our Security Reliability Engineering team measured a record-breaking UDP amplification attack sourced out of several Chinese ISPs (ASNs 4134, 4837, 58453, and 9394), which remains the largest bandwidth attack of which we are aware.
[ { "id": 27338, "label": "attack-pattern", "start_offset": 94, "end_offset": 107 }, { "id": 27341, "label": "location", "start_offset": 163, "end_offset": 167 }, { "id": 27343, "label": "location", "start_offset": 176, "end_offset": 179 }, { "id": 27344, "label": "location", "start_offset": 242, "end_offset": 245 } ]
[]
[]
4,079
Hence, the command will be this format: <command code>`<custom-base64encoded-data>[`<more-custom-base64encoded-data>] HTShell currently supports three different backdoor functions, shown here: Command code Function 0 Open a command shell for command execution 1
[ { "id": 49915, "label": "malware", "start_offset": 119, "end_offset": 126 } ]
[]
[]
9,023
Lazarus’ backend logs also record victim IP addresses.
[]
[]
[]
7,703
The encrypted sample — via XOR encoding/URL encoding — also received a response from the C&C encrypted with XOR.
[ { "id": 23942, "label": "location", "start_offset": 14, "end_offset": 20 }, { "id": 23943, "label": "attack-pattern", "start_offset": 40, "end_offset": 52 } ]
[]
[]
665
In this threat brief we show you five different ways that Office documents can be subverted and abused to attack and compromise a Windows endpoint, some we’ve already posted about before, and some are new.
[ { "id": 46244, "label": "SOFTWARE", "start_offset": 130, "end_offset": 137 } ]
[]
[]
7,178
To help prevent any damage, we decided to publish our findings before the group deploys the attack.
[]
[]
[]
11,219
Once the attacker has logged in to the victim’s account, HYPERSCRAPE checks to see if the language is set to English, changing it if not.
[]
[]
[]
4,771
For example, users are provided visibility into the permissions requested by each app, and they are able to control those permissions.
[]
[]
[]
1,518
If the file does receive data from the server in excess of 20 bytes it will be in the following format: <2 byte data length><0xABCDEF88><zlib-encrypted data> The decrypted data will contain the following fields: The attack type field is used to determine if a SYN DDoS or DNS DDoS is used in an attack.
[]
[]
[]
13,060
Analysis of Kinsing Malware's Use of Rootkit
[ { "id": 48892, "label": "malware", "start_offset": 12, "end_offset": 29 }, { "id": 40769, "label": "attack-pattern", "start_offset": 37, "end_offset": 44 } ]
[]
[]
1,676
This password is set to “Password” by default, but can be retrieved from NetWire binaries if the attacker used something more secure.
[ { "id": 4975, "label": "malware", "start_offset": 73, "end_offset": 80 } ]
[]
[]
8,931
In this case, we can see that it took an hour and a half for the attackers to modify the legitimate installer and add malicious code to it.
[ { "id": 27616, "label": "location", "start_offset": 8, "end_offset": 12 }, { "id": 27617, "label": "location", "start_offset": 17, "end_offset": 20 }, { "id": 27618, "label": "TIME", "start_offset": 38, "end_offset": 56 }, { "id": 27619, "label": "location", "start_offset": 110, "end_offset": 113 } ]
[]
[]
7,515
A simple RSA algorithm with very small keys encrypts the message seen above.
[ { "id": 23365, "label": "identity", "start_offset": 9, "end_offset": 12 }, { "id": 23366, "label": "location", "start_offset": 33, "end_offset": 38 } ]
[]
[]
13,058
Botnets Have Been Silently Mass-Scanning the Internet for Unsecured ENV Files Security firm Greynoise found that multiple threat actors, while drawing little attention to themselves, have spent the past two to three years mass-scanning the internet for ENV (environment) files that were accidentally uploaded and left exposed on web servers.
[]
[]
[]
4,720
iPhone users could be compromised by receiving a malicious iMessage text, without ever needing to click a malicious link.
[ { "id": 50620, "label": "SOFTWARE", "start_offset": 59, "end_offset": 67 } ]
[]
[]
1,895
The threat actor sets up these fake websites describing the application and linking to the Google Play Store to download it, like in the case of the malicious website, pikrpro[.]eu, seen below Another sample website involved the use of a closely copied version of an existing website, with slight changes in the logo and options above the page.
[ { "id": 47027, "label": "SOFTWARE", "start_offset": 91, "end_offset": 108 }, { "id": 47028, "label": "DOMAIN", "start_offset": 168, "end_offset": 180 } ]
[]
[]
10,846
MSG_CONNECTIVITY
[]
[]
[]
2,258
While the malware lacked a large set of capabilities, it had a wealth of interesting and advanced features, such as the custom encryption/encoding witnessed in the network traffic, the use of process hollowing against a randomly selected Microsoft Windows binary, and the downloading component that attempted to bypass network security measures by modifying the executable header.
[ { "id": 47331, "label": "SOFTWARE", "start_offset": 238, "end_offset": 255 }, { "id": 47330, "label": "attack-pattern", "start_offset": 192, "end_offset": 209 } ]
[]
[]
13,212
Threat actors like Tropic Trooper can also use an invisible web shell to hide its C&C server location and make incident response tricky.
[ { "id": 41203, "label": "location", "start_offset": 34, "end_offset": 37 }, { "id": 41204, "label": "attack-pattern", "start_offset": 60, "end_offset": 69 }, { "id": 41205, "label": "location", "start_offset": 102, "end_offset": 105 } ]
[]
[]
4,880
We hope that improved understanding of the tactics and techniques will enhance threat hunting capability and lead to stronger user protections across the industry.
[]
[]
[]
1,169
From edge case to systematic misclassifications, mutex usage is even more generally the canary in a coal mine than was previously realized. While tedious and time consuming, combing through mutex names did come with more than a few good laughs.
[]
[]
[]
2,213
While the link above shows a file extension of an image, the transferred file is in fact a modified executable file. The downloaded file has the first two bytes of the PE file format replaced with the characters ‘DW’, instead of the usual ‘MZ’.
[]
[]
[]
14,369
It can protect users against malware, zero-day and known exploits, privacy leaks, and application vulnerability.
[]
[]
[]
3,587
After inspection we noticed that this version of CyaX was similarly notable due to two characteristics.
[ { "id": 49371, "label": "tools", "start_offset": 49, "end_offset": 53 } ]
[]
[]
1,237
A user can set a system-wide default SMS app as the only app with permission to send and receive SMS.
[]
[]
[]
10,963
APP was designed specifically for high-risk accounts.
[]
[]
[]
5,275
It can protect users against malware, zero-day and known exploits, privacy leaks, and application vulnerability.
[]
[]
[]
13,317
Spear-phishing emails, for instance, rely on baiting targets with socially engineered documents.
[ { "id": 41445, "label": "location", "start_offset": 0, "end_offset": 5 }, { "id": 41446, "label": "attack-pattern", "start_offset": 6, "end_offset": 14 } ]
[]
[]
1,046
This post is also available in: 日本語 (Japanese) Today, Palo Alto Networks Unit 42 researchers are announcing details on a new high- severity vulnerability affecting the Google Android platform.
[ { "id": 46537, "label": "identity", "start_offset": 60, "end_offset": 98 }, { "id": 46538, "label": "SOFTWARE", "start_offset": 174, "end_offset": 197 } ]
[]
[]
1,234
However, two months ago, WildFire discovered a new Android malware, Cardbuyer, that circumvents this verification technique.
[ { "id": 46615, "label": "SOFTWARE", "start_offset": 25, "end_offset": 33 }, { "id": 46616, "label": "SOFTWARE", "start_offset": 51, "end_offset": 58 }, { "id": 46617, "label": "malware", "start_offset": 68, "end_offset": 77 } ]
[]
[]
6,169
After the attackers gain a foothold into the system — either through XSS injection or Service Worker — the next (and final part) of the attack chain, the exfiltration of the mailbox, is initiated.
[ { "id": 19076, "label": "attack-pattern", "start_offset": 69, "end_offset": 72 }, { "id": 19077, "label": "location", "start_offset": 113, "end_offset": 116 } ]
[]
[]
2,834
This is likely due to increased uptake of the patch MS17-010 in light of the WanaCrypt0r attacks, as well as efforts made within the security community.
[ { "id": 48043, "label": "malware", "start_offset": 77, "end_offset": 88 } ]
[]
[]
8,031
Users were instructed to activate an invitation to a (fake) webinar by logging in.
[]
[]
[]
13,077
Cybercriminals have recently been focusing their efforts on the retail industry, launching ransomware-based attacks that could prove disastrous for businesses if it disrupts their operations during important shopping seasons.
[]
[]
[]
13,857
Outages have already started affecting motorists.
[]
[]
[]
13,011
We encourage any potential targets to enable Google Account Level Enhanced Safe Browsing and ensure that all devices are updated.
[]
[]
[]
3,129
An easy thing you can do is restart your router once a week (typically by unplugging it).
[]
[]
[]
8,046
One of APT35’s novel techniques involves using Telegram for operator notifications.
[]
[]
[]
10,897
Possible connections to StrongPity
[ { "id": 33177, "label": "threat-actor", "start_offset": 24, "end_offset": 34 } ]
[]
[]
4,718
Google was able to identify the vulnerability in use and fix the exploit quickly.
[ { "id": 50616, "label": "identity", "start_offset": 0, "end_offset": 6 } ]
[]
[]
13,118
That’s why we’re delighted to be a launch partner for new AWS Marketplace feature.
[ { "id": 48902, "label": "SOFTWARE", "start_offset": 58, "end_offset": 62 } ]
[]
[]
7,371
Another variant executes a set of commands once a system is successfully compromised.
[]
[]
[]
3,120
Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address! Please mark, I'm not a robot!
[]
[]
[]
3,462
This can be an indication that these malware tools were developed by the same group.
[]
[]
[]
4,508
Spoofers may send forged messages using an organization’s real name or domain to subvert authentication measures.
[]
[]
[]
1,232
Previous attack cases, such as Zitmo and Cardbuyer, showed the risk of using SMS for payment authentication.
[ { "id": 46613, "label": "malware", "start_offset": 31, "end_offset": 36 }, { "id": 46614, "label": "malware", "start_offset": 41, "end_offset": 50 } ]
[]
[]
4,326
The file is then loaded in memory via PowerShell.
[ { "id": 50128, "label": "tools", "start_offset": 38, "end_offset": 48 } ]
[]
[]
10,001
Internal PlugX date dword value inside the printdat.dll file Mitigating supply chain attacks
[ { "id": 30529, "label": "malware", "start_offset": 9, "end_offset": 14 }, { "id": 30530, "label": "location", "start_offset": 15, "end_offset": 19 }, { "id": 30531, "label": "location", "start_offset": 72, "end_offset": 78 } ]
[]
[]
1,672
Upon receipt of a command from the server, a single function is called to decrypt the payload data and execute the received instruction.
[]
[]
[]
14,364
Figure 21. Connection of Maikspy variants to 107[.]180[.]46[.]243 and hxxp://fakeomegle[.]com Figure 22. Connection of Maikspy variants to 198[.]12[.]149[.]13and hxxp://miakhalifagame[.]com/
[ { "id": 51779, "label": "URL", "start_offset": 163, "end_offset": 191 }, { "id": 51777, "label": "URL", "start_offset": 70, "end_offset": 93 }, { "id": 51781, "label": "malware", "start_offset": 120, "end_offset": 127 }, { "id": 51778, "label": "IPV4", "start_offset": 140, "end_offset": 159 }, { "id": 51780, "label": "malware", "start_offset": 25, "end_offset": 32 }, { "id": 44372, "label": "IPV4", "start_offset": 45, "end_offset": 65 } ]
[ { "id": 1161, "from_id": 51780, "to_id": 44372, "type": "communicates-with" }, { "id": 1162, "from_id": 51780, "to_id": 51777, "type": "communicates-with" }, { "id": 1163, "from_id": 51781, "to_id": 51778, "type": "communicates-with" }, { "id": 1164, "from_id": 51781, "to_id": 51779, "type": "communicates-with" } ]
[]
14,030
We assume there are multiple developers within APT37, and not all of them follow the same practices.
[ { "id": 47196, "label": "threat-actor", "start_offset": 47, "end_offset": 52 } ]
[]
[]
14,195
First comes continuous risk-based patching, multi-factor authentication, network monitoring, least privilege access, data encryption, phishing awareness training, and other cyber-hygiene steps.
[]
[]
[]
1,006
Some accounts advertised candidacy towards registration for student discount at retailers such as Amazon, BestBuy, Apple, and Dell.
[ { "id": 46508, "label": "identity", "start_offset": 126, "end_offset": 130 }, { "id": 46507, "label": "identity", "start_offset": 115, "end_offset": 120 }, { "id": 46505, "label": "identity", "start_offset": 98, "end_offset": 104 }, { "id": 46506, "label": "identity", "start_offset": 106, "end_offset": 113 } ]
[]
[]
4,635
HYPERSCRAPE demonstrates Charming Kitten’s commitment to developing and maintaining purpose-built capabilities.
[ { "id": 50555, "label": "malware", "start_offset": 0, "end_offset": 11 }, { "id": 14080, "label": "threat-actor", "start_offset": 25, "end_offset": 40 } ]
[]
[]
12,962
We haven’t retrieved a copy of the exploit.
[]
[]
[]
20
The other list is of last week’s campaign by the same attackers (exhaustive or close to it). Palo Alto Networks Enterprise Security Platform would have stopped this ransomware attack campaign thanks to the platform’s unique integration between the network, endpoint and the cloud to maximize security.
[ { "id": 45809, "label": "identity", "start_offset": 94, "end_offset": 112 } ]
[]
[]
586
Highlights from the 2021 Unit 42 Ransomware Threat Report Ransomware Threat Assessments: A Companion to the 2021 Unit 42 Ransomware Threat Report Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!
[ { "id": 1956, "label": "identity", "start_offset": 26, "end_offset": 33 }, { "id": 1958, "label": "identity", "start_offset": 115, "end_offset": 122 } ]
[]
[]
90
Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!
[]
[]
[]
4,276
Lately, they have been sending multiple RTF files exploiting CVE-2017-8570.
[ { "id": 50077, "label": "vulnerability", "start_offset": 61, "end_offset": 74 } ]
[]
[]
8,552
We have a long-standing policy to send you a warning if we detect that your account is a target of government-backed phishing or malware attempts.
[ { "id": 26417, "label": "location", "start_offset": 10, "end_offset": 14 }, { "id": 26418, "label": "location", "start_offset": 89, "end_offset": 95 }, { "id": 26419, "label": "attack-pattern", "start_offset": 117, "end_offset": 125 } ]
[]
[]
2,640
Palo Alto Networks customers receive protections against LockBit 2.0 attacks from Cortex XDR, as well as from the WildFire cloud-delivered security subscription for the Next-Generation Firewall.
[ { "id": 47824, "label": "malware", "start_offset": 58, "end_offset": 69 }, { "id": 45640, "label": "identity", "start_offset": 1, "end_offset": 19 }, { "id": 45642, "label": "SOFTWARE", "start_offset": 83, "end_offset": 93 }, { "id": 45643, "label": "SOFTWARE", "start_offset": 115, "end_offset": 123 } ]
[]
[]
5,670
This past year, TAG has been collaborating with Google’s CyberCrime Investigation Group to disrupt Glupteba activity involving Google services.
[ { "id": 17466, "label": "malware", "start_offset": 99, "end_offset": 107 } ]
[]
[]
4,633
We have taken actions to re-secure these accounts and have notified the victims through our Government Backed Attacker Warnings.
[]
[]
[]
843
Privilege escalation attacks against the kernel have been around for some time and are well-known and can be well protected against. Kernel APC attacks however are a different class of attack.
[ { "id": 2760, "label": "attack-pattern", "start_offset": 1, "end_offset": 21 }, { "id": 44889, "label": "attack-pattern", "start_offset": 135, "end_offset": 153 } ]
[]
[]