id
int64
1
14.4k
text
stringlengths
3
5.01k
entities
list
relations
list
Comments
list
8,858
This variant of PlugX (detected by Trend Micro as Backdoor.Win32.PLUGX.DYSGUT), including the code in the BLOB, launches an svchost.exe process and injects to it.
[ { "id": 27413, "label": "malware", "start_offset": 16, "end_offset": 21 }, { "id": 27415, "label": "location", "start_offset": 144, "end_offset": 147 } ]
[]
[]
1,521
If the first value in the packet is 0xCC then the file will set "g_mainsrvinfo.srandipb" and "g_mainsrvinfo.srandipe". If the first value in the packet is 0x33 the file will use tcp to download a file and execute it.
[]
[]
[]
2,286
Google is alleging violations under the Racketeer Influenced and Corrupt Organizations Act (RICO), the Computer Fraud and Abuse Act, the Electronic Communications Privacy Act, the Lanham Act, and tortious interference of business relationships, and unjust enrichment.
[ { "id": 45444, "label": "identity", "start_offset": 0, "end_offset": 6 } ]
[]
[]
8,084
Since first discovering this activity, OpenSUpdater's authors have tried other variations on invalid encodings to further evade detection.
[ { "id": 25069, "label": "malware", "start_offset": 39, "end_offset": 51 } ]
[]
[]
7,455
Overview of Pawn Storm’s Yahoo credential phishing campaigns.
[ { "id": 23176, "label": "attack-pattern", "start_offset": 42, "end_offset": 50 } ]
[]
[]
5,765
How MITRE ATT&CK Assists in Threat Investigation
[]
[]
[]
7,278
According to UTF-8 mapping, the related Unicode code is "U+FE00".
[]
[]
[]
1,624
Funtasy intercepts this message, parses out the PIN and sends it back to the registration server, completing the enrollment process.
[]
[]
[]
4,526
Finally, we also offer the leading tools to protect important civil society actors such as journalists, human rights workers, opposition party politicians, and campaign organizations – in other words, the users who are frequently targeted by surveillance tools.
[]
[]
[]
6,707
Our products are designed with robust built-in security features, like Gmail protections against phishing and Safe Browsing in Chrome, but we still dedicate significant resources to developing new tools and technology to help identify, track and stop this kind of activity.
[ { "id": 20855, "label": "location", "start_offset": 13, "end_offset": 16 }, { "id": 20856, "label": "location", "start_offset": 47, "end_offset": 55 }, { "id": 20858, "label": "attack-pattern", "start_offset": 97, "end_offset": 105 }, { "id": 20859, "label": "location", "start_offset": 106, "end_offset": 109 }, { "id": 20860, "label": "threat-actor", "start_offset": 110, "end_offset": 114 }, { "id": 20861, "label": "location", "start_offset": 203, "end_offset": 206 }, { "id": 20862, "label": "location", "start_offset": 242, "end_offset": 245 }, { "id": 20863, "label": "malware", "start_offset": 246, "end_offset": 250 } ]
[]
[]
1,051
What our researchers have found is a vulnerability that can be used to more easily enable an “overlay attack,” a type of attack that is already known on the Android platform.
[ { "id": 46543, "label": "SOFTWARE", "start_offset": 158, "end_offset": 165 } ]
[]
[]
2,906
The exploit uses the code above to restore the corrupted object and save the stack frame on the heap so that the process would not crash after the exploit is successful.
[]
[]
[]
5,231
We construe AnubisSpy to be linked to the cyberespionage campaign Sphinx (APT-C-15) based on shared file structures and command-and-control (C&C) server as well as targets.
[ { "id": 51265, "label": "campaign", "start_offset": 65, "end_offset": 83 }, { "id": 51264, "label": "malware", "start_offset": 12, "end_offset": 21 } ]
[]
[]
3,119
If you have any questions, please visit the Threat & Vulnerability Discussions on our Live Community.
[]
[]
[]
5,980
Within these files is a link to an attacker controlled phishing domain.
[ { "id": 18401, "label": "attack-pattern", "start_offset": 55, "end_offset": 63 } ]
[]
[]
4,008
They also showed real-world implications that these vulnerabilities have.
[]
[]
[]
574
One of the reasons Ryuk causes so much damage is because it will scan the local network and try to infect other machines through Server Message Block (SMB) protocols.
[ { "id": 1919, "label": "malware", "start_offset": 19, "end_offset": 23 }, { "id": 46177, "label": "SOFTWARE", "start_offset": 129, "end_offset": 155 } ]
[]
[]
4,414
A log file is written containing a count of the emails that were downloaded.
[]
[]
[]
13,506
While the threat actor has been known to offer its services to a more general audience — as seen in its online advertisements in the underground — research from groups such as eQualit.ie and Amnesty International show that Void Balaur is likely also involved in attacks against higher profile victims, ranging from human rights activists and journalists to politicians and even presidential candidates.
[ { "id": 51574, "label": "identity", "start_offset": 176, "end_offset": 186 }, { "id": 51575, "label": "identity", "start_offset": 191, "end_offset": 213 }, { "id": 51576, "label": "threat-actor", "start_offset": 223, "end_offset": 234 } ]
[]
[]
4,735
In June, we provided examples of the hack-for-hire ecosystem from India, Russia, and the United Arab Emirates.
[ { "id": 50647, "label": "location", "start_offset": 89, "end_offset": 109 }, { "id": 50643, "label": "TIME", "start_offset": 3, "end_offset": 7 }, { "id": 50644, "label": "attack-pattern", "start_offset": 37, "end_offset": 50 }, { "id": 50645, "label": "location", "start_offset": 66, "end_offset": 71 }, { "id": 50646, "label": "location", "start_offset": 73, "end_offset": 79 } ]
[]
[]
12,503
For a period of time, we observed thousands of instances of malicious Glupteba downloads per day.
[ { "id": 38911, "label": "location", "start_offset": 16, "end_offset": 20 }, { "id": 38913, "label": "malware", "start_offset": 70, "end_offset": 78 }, { "id": 38914, "label": "location", "start_offset": 93, "end_offset": 96 } ]
[]
[]
2,117
Palo Alto Networks customers who have deployed the latest vulnerability signatures released on August 24, 2018, are protected.
[ { "id": 47255, "label": "identity", "start_offset": 0, "end_offset": 18 }, { "id": 47256, "label": "TIME", "start_offset": 95, "end_offset": 110 } ]
[]
[]
12,364
As the course of the COVID-19 pandemic evolves, we’ve seen threat actors evolve their tactics as well.
[]
[]
[]
13,539
The campaign initially compromised e-commerce online shops in Japan, Australia, and European countries via spam emails with malicious attachments.
[ { "id": 51605, "label": "attack-pattern", "start_offset": 107, "end_offset": 118 }, { "id": 51606, "label": "campaign", "start_offset": 4, "end_offset": 12 }, { "id": 51607, "label": "identity", "start_offset": 35, "end_offset": 58 }, { "id": 51601, "label": "location", "start_offset": 62, "end_offset": 67 }, { "id": 51602, "label": "location", "start_offset": 69, "end_offset": 78 }, { "id": 51603, "label": "location", "start_offset": 84, "end_offset": 92 } ]
[ { "id": 1105, "from_id": 51606, "to_id": 51607, "type": "targets" }, { "id": 1106, "from_id": 51607, "to_id": 51601, "type": "located-at" }, { "id": 1107, "from_id": 51607, "to_id": 51602, "type": "located-at" }, { "id": 1108, "from_id": 51607, "to_id": 51603, "type": "located-at" }, { "id": 1110, "from_id": 51606, "to_id": 51605, "type": "uses" } ]
[]
4,694
In the meantime, we encourage high risk users to enroll in our Advanced Protection Program (APP) and utilize Google Account Level Enhanced Safe Browsing to ensure they have the greatest level of protection in the face of ongoing threats.
[]
[]
[]
10,597
Exploiting CVE-2019-0676 enabled attackers to reveal presence or non-presence of files on the victim’s computer; this information was later used to decide whether or not a second stage exploit should be delivered.
[]
[]
[]
308
This reconnaissance was then leveraged in brute force attacks against credentials, toward unauthorized access, implant installation, and subsequent exfiltration of consumer payment data.
[ { "id": 1059, "label": "attack-pattern", "start_offset": 42, "end_offset": 53 }, { "id": 46007, "label": "attack-pattern", "start_offset": 111, "end_offset": 131 }, { "id": 46009, "label": "attack-pattern", "start_offset": 148, "end_offset": 185 }, { "id": 46008, "label": "attack-pattern", "start_offset": 90, "end_offset": 109 } ]
[]
[]
13,945
Maze was one of the first documented cases of this.
[ { "id": 48760, "label": "malware", "start_offset": 0, "end_offset": 5 } ]
[]
[]
3,988
It also establishes a few recommendations for software customers and vendors to prevent and mitigate attacks as well as improve resilience against software supply chain attacks.
[]
[]
[]
4,888
Moreover, to protect our users, we have referred the below activity to the FBI for further investigation.
[ { "id": 50906, "label": "identity", "start_offset": 75, "end_offset": 78 } ]
[]
[]
860
Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!
[]
[]
[]
323
By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.
[]
[]
[]
2,039
What is peculiar about this file is it is a variant of the open-source MicroBackdoor, a backdoor allowing an attacker to browse the file system, upload and download files, execute commands and remove itself from the system (Figure 13).
[ { "id": 47132, "label": "malware", "start_offset": 71, "end_offset": 84 } ]
[]
[]
2,943
The tactics and techniques are not new or sophisticated.
[]
[]
[]
14,009
Malware author’s developer environment
[]
[]
[]
3,477
Contents of malicious SFX file used by Blackgear, posing as a Flash Player installer Figure 4. Malicious document used by Blackgear (top) and how VBScript is used to execute Marade (bottom)
[ { "id": 49277, "label": "threat-actor", "start_offset": 38, "end_offset": 48 }, { "id": 49278, "label": "SOFTWARE", "start_offset": 62, "end_offset": 74 }, { "id": 49279, "label": "threat-actor", "start_offset": 123, "end_offset": 132 }, { "id": 49280, "label": "malware", "start_offset": 175, "end_offset": 181 } ]
[]
[]
5,439
Sandworm’s previous high-profile victims and their attacks’ substantial impact on these organizations are particularly worrying — even more so for a group that quickly learns from past errors, comes back stronger time and time again, and for whom international repercussions seem minimal at best.
[ { "id": 51440, "label": "threat-actor", "start_offset": 0, "end_offset": 8 } ]
[]
[]
10,567
In 2019, we sent almost 40,000 warnings, a nearly 25 percent drop from 2018.
[]
[]
[]
5,414
The samples that we have analyzed are compiled for ARM and are dynamically linked against uClibc.
[]
[]
[]
2,342
They are the equivalent of LoadLibrary and GetProcAddress in Windows.
[ { "id": 47399, "label": "SOFTWARE", "start_offset": 61, "end_offset": 68 } ]
[]
[]
2,638
Additionally, LockBit 2.0 has affected many companies globally, with top victims based in the U.S., Italy and Germany.
[ { "id": 47820, "label": "malware", "start_offset": 15, "end_offset": 26 }, { "id": 47821, "label": "location", "start_offset": 95, "end_offset": 99 }, { "id": 47822, "label": "location", "start_offset": 101, "end_offset": 106 }, { "id": 47823, "label": "location", "start_offset": 111, "end_offset": 118 } ]
[]
[]
13,316
Nurture a culture of cybersecurity.
[]
[]
[]
9,606
public void ManageTakeOut() { string text = "PipeName";
[ { "id": 29425, "label": "location", "start_offset": 0, "end_offset": 6 }, { "id": 29426, "label": "malware", "start_offset": 7, "end_offset": 11 } ]
[]
[]
12,588
For example, the payload we obtained contained a kernel module for capturing keystrokes.
[]
[]
[]
7
The attacker used a polymorphic malware builder to generate malware with a unique hash for each victim, preventing signature-based solutions from detecting the new attacks before it was too late for the victim.
[]
[]
[]
5,268
Enforcing the principle of least privilege and implementing an app reputation system are just some of the best practices that can help mitigate threats.
[]
[]
[]
13,901
This is the riskiest step so far in the ransomware execution process, as data exfiltration is more likely to be noticed by the victim organization’s security team.
[]
[]
[]
2,902
s[_local28][(((_local41 - _local12) / 4) + 16)]
[]
[]
[]
3,490
bin
[]
[]
[]
9,406
Collection Capture Audio T1429 Used to record audio information Collection Capture SMS Messages T1412 Used to collect SMS messages
[ { "id": 28955, "label": "attack-pattern", "start_offset": 75, "end_offset": 95 } ]
[]
[]
5,423
But what is evident is that Cyclops Blink is an advanced piece of malware that focuses on persistence and the ability to survive domain sinkhole attempts and the takedown of its infrastructure.
[ { "id": 51430, "label": "malware", "start_offset": 28, "end_offset": 41 } ]
[]
[]
7,051
Structure of decrypted data.res file Lastly, the launcher starts a suspended process with the command line “C:\Windows\system32\svchost.exe -k LocalServices,”and injects the appropriate shellcode into it (either 32- or 64-bit).
[ { "id": 22104, "label": "location", "start_offset": 0, "end_offset": 9 }, { "id": 22105, "label": "identity", "start_offset": 223, "end_offset": 226 } ]
[]
[]
10,417
Users should also take full advantage of their network defense solutions by enhancing settings, especially for macro malware attached emails.
[]
[]
[]
14,380
A lot of the advanced security we’ve been delivering on the last few years has been focused on this problem.
[]
[]
[]
5,409
The NCSC report covered malware targeting a specific vendor, namely WatchGuard.
[ { "id": 51402, "label": "identity", "start_offset": 6, "end_offset": 10 }, { "id": 51403, "label": "identity", "start_offset": 70, "end_offset": 80 } ]
[]
[]
14,384
But most of EDR’s capabilities are for endpoints they are on: ones they manage.
[]
[]
[]
9,425
It seems that this hard-coded key and flawed RC4 implementation were also used in a malware family named TigerPlug, probably because it spreads the PlugX malware.
[ { "id": 29007, "label": "location", "start_offset": 19, "end_offset": 23 }, { "id": 29008, "label": "location", "start_offset": 34, "end_offset": 37 }, { "id": 29010, "label": "malware", "start_offset": 148, "end_offset": 153 } ]
[]
[]
7,151
Figure 3.
[]
[]
[]
1,653
On July 22, Palo Alto Networks threat intelligence team, Unit 42, released our first report on the evolution of “Silver Spaniel” 419 scammers.
[ { "id": 45085, "label": "identity", "start_offset": 12, "end_offset": 55 }, { "id": 45086, "label": "identity", "start_offset": 57, "end_offset": 64 }, { "id": 45089, "label": "TIME", "start_offset": 3, "end_offset": 10 }, { "id": 45087, "label": "malware", "start_offset": 113, "end_offset": 127 } ]
[]
[]
9,133
Lurk’s infrastructure also exhibited new capabilities.
[]
[]
[]
4,212
The displayed Urdu text could be translated as “Real women, girls, and housewives || Download the app now More than thousands of women app.”
[]
[]
[]
3,600
The Premium Plan requires payment and works automatically, while the Private Stub requires the user to contact the support from the service for further personalization.
[]
[]
[]
13,173
Figure 4.
[]
[]
[]
2,711
It is always important to view this type of critical vulnerability in the larger context of the threat landscape.
[]
[]
[]
798
By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.
[]
[]
[]
3,539
Organizations can also consider managed detection and response, which provides in-depth threat analysis and correlation — from networks to servers and endpoints — to obtain a complete picture of and further understand a targeted attack.
[]
[]
[]
2,646
Like other ransomware families such as BlackByte, LockBit 2.0 avoids systems that use Eastern European languages, including many written with Cyrillic alphabets.
[ { "id": 45646, "label": "malware", "start_offset": 51, "end_offset": 62 }, { "id": 45645, "label": "malware", "start_offset": 40, "end_offset": 49 } ]
[]
[]
6,197
The first involves injecting malicious code into the webpage via an XSS vulnerability on the webmail system.
[ { "id": 19149, "label": "attack-pattern", "start_offset": 68, "end_offset": 71 } ]
[]
[]
1,663
The shortest possible packet is the “HeartBeat” command, which NetWire generates every 10 seconds.
[ { "id": 46872, "label": "malware", "start_offset": 64, "end_offset": 71 } ]
[]
[]
2,524
These approaches are not particularly clever or sophisticated, but often they are effective.
[]
[]
[]
4,606
The solution allows you to see more and respond faster by collecting and correlating data across email, endpoints, servers, cloud workloads, and networks.
[]
[]
[]
1,238
However, other installed apps are still allowed to receive SMS and upload the content via Internet.
[]
[]
[]
12,311
We terminated 9 YouTube channels as part of our investigation into a coordinated influence operation linked to Egypt.
[]
[]
[]
13,565
The source code of this framework is shared across many Chinese public forums.
[ { "id": 51646, "label": "location", "start_offset": 56, "end_offset": 63 }, { "id": 51647, "label": "tools", "start_offset": 24, "end_offset": 33 } ]
[ { "id": 1123, "from_id": 51647, "to_id": 51646, "type": "related-to" } ]
[]
2,384
ScrambleCross receives instructions from its command-and-control (C&C) server that allow it to receive and manipulate plug-ins.
[ { "id": 47449, "label": "malware", "start_offset": 0, "end_offset": 13 } ]
[]
[]
12,505
While analyzing Glupteba binaries, our team identified a few containing a git repository URL: “git.voltronwork.com”.
[ { "id": 38916, "label": "malware", "start_offset": 16, "end_offset": 24 } ]
[]
[]
805
The impact of a successful credential theft is, ultimately, access and authorization.
[ { "id": 46359, "label": "attack-pattern", "start_offset": 27, "end_offset": 43 } ]
[]
[]
1,677
The usage for the tool is show below.
[]
[]
[]
13,781
Meanwhile, the second payload is a typical Waterbear first-stage backdoor.
[]
[]
[]
8,210
A little over two weeks before the registration of the fake domain, the attackers sent the following email to the company: Figure 6.
[]
[]
[]
3,378
2243c10b1bd64dfb55eda08bc8b85610d7fa5ba759527b4b4dd16dfac584ef25
[ { "id": 10223, "label": "SHA2", "start_offset": 1, "end_offset": 65 } ]
[]
[]
4,649
Host: {C2}
[]
[]
[]
7,336
on Host
[]
[]
[]
9,340
Trend Micro detects both of the threats as AndroidOS_CallerSpy.HRX.
[]
[]
[]
682
In a similar way to embedding Adobe Flash files into an Office document, you can also embed equations in documents that will be parsed by Microsoft Equation Editor - a program that lets you easily write mathematical equations: Figure 2. Microsoft Equation Editor As in our previous example, vulnerabilities in the equation editor can be exploited by leveraging malicious Office documents.
[ { "id": 46257, "label": "SOFTWARE", "start_offset": 30, "end_offset": 41 }, { "id": 46258, "label": "SOFTWARE", "start_offset": 138, "end_offset": 163 }, { "id": 46256, "label": "SOFTWARE", "start_offset": 238, "end_offset": 263 } ]
[]
[]
3,006
This will also protect these apps on your tablets, smartphones, PCs and Macs.
[]
[]
[]
12,815
Joint Operations.
[]
[]
[]
3,302
GetBrowsersCookies This command is designed to steal cookie information from browsers.
[]
[]
[]
3,427
Backdoor.
[]
[]
[]
12,977
We look forward to continuing our work in this space and advancing the safety and security of our users around the world.
[ { "id": 40404, "label": "location", "start_offset": 53, "end_offset": 56 }, { "id": 40405, "label": "tools", "start_offset": 71, "end_offset": 77 }, { "id": 40406, "label": "location", "start_offset": 78, "end_offset": 81 }, { "id": 40407, "label": "location", "start_offset": 82, "end_offset": 90 }, { "id": 40408, "label": "location", "start_offset": 115, "end_offset": 120 } ]
[]
[]
5,839
Ed: Exactly.
[]
[]
[]
623
One technique includes the ETERNALBLUE exploit tool.
[ { "id": 2083, "label": "malware", "start_offset": 28, "end_offset": 39 } ]
[]
[]
847
Kernel APC attacks do this using their control over the kernel to redirect APCs: “Asynchronous Procedure Calls”.
[ { "id": 46395, "label": "attack-pattern", "start_offset": 1, "end_offset": 19 } ]
[]
[]
2,622
If you think you may be subject to an active attack or have an urgent matter, get in touch with the Unit 42 Incident Response team or call North America Toll-Free: 866.486.4842 (866.4.UNIT42), EMEA: +31.20.299.3130, APAC: +65.6983.8730, or Japan: +81.50.1790.0200.
[ { "id": 45625, "label": "location", "start_offset": 241, "end_offset": 246 }, { "id": 45627, "label": "location", "start_offset": 217, "end_offset": 221 }, { "id": 45624, "label": "location", "start_offset": 140, "end_offset": 153 }, { "id": 45626, "label": "location", "start_offset": 194, "end_offset": 198 }, { "id": 45623, "label": "identity", "start_offset": 101, "end_offset": 131 } ]
[]
[]
1,519
The Src IP Begin and End are the start and ending IP ranges used as a fake src addresses in the DNS DDoS. The IP range can also be controlled by global variables within the binary itself as well.
[]
[]
[]
3,299
Figures 21 and 22 show the result of running “SnsInfo” command to enumerate messengers.
[]
[]
[]
9,493
Figure 6.
[]
[]
[]
9,404
Used to suppress its icon from being displayed to the user in the application launcher to hide the fact that it is installed Discovery File and Directory Discovery T1420
[ { "id": 28948, "label": "attack-pattern", "start_offset": 135, "end_offset": 163 } ]
[]
[]
2,506
shell13.jsp
[ { "id": 47674, "label": "FILEPATH", "start_offset": 0, "end_offset": 11 } ]
[]
[]
3,474
Protux, a known backdoor, is executed by abusing the rundll32 dynamic-link library (DLL).
[ { "id": 49273, "label": "malware", "start_offset": 0, "end_offset": 6 }, { "id": 49274, "label": "attack-pattern", "start_offset": 41, "end_offset": 88 } ]
[ { "id": 777, "from_id": 49273, "to_id": 49274, "type": "uses" } ]
[]