id
int64
1
14.4k
text
stringlengths
3
5.01k
entities
list
relations
list
Comments
list
1,030
Accounts made through this site "can be used to apply [for] related memberships of Amazon Prime, Microsoft Developer, Adobe and Apple by some secret ways," one seller said.
[ { "id": 46519, "label": "identity", "start_offset": 83, "end_offset": 95 }, { "id": 46522, "label": "identity", "start_offset": 128, "end_offset": 133 }, { "id": 46520, "label": "identity", "start_offset": 97, "end_offset": 106 }, { "id": 46521, "label": "identity", "start_offset": 118, "end_offset": 123 } ]
[]
[]
1,481
The app developer industry is booming.
[]
[]
[]
1,416
Geographic Distribution of Koluoz Spam Nodes in North America Thus far we’ve detected the following command and control servers in use.
[ { "id": 45013, "label": "Infrastucture", "start_offset": 35, "end_offset": 45 }, { "id": 45016, "label": "Infrastucture", "start_offset": 103, "end_offset": 121 }, { "id": 45012, "label": "malware", "start_offset": 28, "end_offset": 34 }, { "id": 45014, "label": "location", "start_offset": 49, "end_offset": 62 } ]
[ { "id": 55, "from_id": 45012, "to_id": 45013, "type": "communicates-with" }, { "id": 56, "from_id": 45013, "to_id": 45014, "type": "located-at" } ]
[]
950
The apps this library is embedded in may be legitimate and have significant functionality, but their developer’s choice to use this library has put them at risk. Technical Details:
[]
[]
[]
14,254
C&C Server's IP Address Port Number 160[.]16[.]243[.]129 443 (HTTPS) 160[.]16[.]243[.]129 53 (DNS) 160[.]16[.]243[.]129 80 (HTTP) 174[.]139[.]203[.]18 443 (HTTPS) 174[.]139[.]203[.]18 53 (DNS) 174[.]139[.]203[.]20 53 (DNS) 174[.]139[.]203[.]22 443 (HTTPS) 174[.]139[.]203[.]22 53 (DNS) 174[.]139[.]203[.]27 53 (DNS) 174[.]139[.]203[.]34 53 (DNS) 174[.]139[.]62[.]58 80 (HTTP) 174[.]139[.]62[.]60 443 (HTTPS) 174[.]139[.]62[.]60 53 (DNS) 174[.]139[.]62[.]60 80 (HTTP) 174[.]139[.]62[.]61 443 (HTTPS) 61[.]195[.]98[.]245 443 (HTTPS) 61[.]195[.]98[.]245 53 (DNS) 61[.]195[.]98[.]245 80 (HTTP) 67[.]198[.]161[.]250 443 (HTTPS) 67[.]198[.]161[.]250 53 (DNS) 67[.]198[.]161[.]251 443 (HTTPS) 67[.]198[.]161[.]252 443 (HTTPS) Figure 6: IP addresses used for C&C communication, and the port numbers they use
[ { "id": 44095, "label": "IPV4", "start_offset": 37, "end_offset": 57 }, { "id": 44096, "label": "IPV4", "start_offset": 70, "end_offset": 90 }, { "id": 44097, "label": "IPV4", "start_offset": 100, "end_offset": 120 }, { "id": 44098, "label": "IPV4", "start_offset": 131, "end_offset": 151 }, { "id": 44099, "label": "IPV4", "start_offset": 164, "end_offset": 184 }, { "id": 44100, "label": "IPV4", "start_offset": 194, "end_offset": 214 }, { "id": 44101, "label": "IPV4", "start_offset": 224, "end_offset": 244 }, { "id": 44102, "label": "IPV4", "start_offset": 257, "end_offset": 277 }, { "id": 44103, "label": "IPV4", "start_offset": 287, "end_offset": 307 }, { "id": 44104, "label": "IPV4", "start_offset": 317, "end_offset": 337 }, { "id": 44105, "label": "IPV4", "start_offset": 347, "end_offset": 366 }, { "id": 44106, "label": "IPV4", "start_offset": 377, "end_offset": 396 }, { "id": 44107, "label": "IPV4", "start_offset": 409, "end_offset": 428 }, { "id": 44108, "label": "IPV4", "start_offset": 438, "end_offset": 457 }, { "id": 44109, "label": "IPV4", "start_offset": 468, "end_offset": 487 }, { "id": 44110, "label": "IPV4", "start_offset": 500, "end_offset": 519 }, { "id": 44111, "label": "IPV4", "start_offset": 532, "end_offset": 551 }, { "id": 44112, "label": "IPV4", "start_offset": 561, "end_offset": 580 }, { "id": 44113, "label": "IPV4", "start_offset": 591, "end_offset": 611 }, { "id": 44114, "label": "IPV4", "start_offset": 624, "end_offset": 644 }, { "id": 44115, "label": "IPV4", "start_offset": 654, "end_offset": 674 }, { "id": 44116, "label": "IPV4", "start_offset": 687, "end_offset": 707 } ]
[]
[]
10,156
By looking at the digital fingerprints of these phishing sites and comparing them with a large data set that spans almost five years, we can uniquely relate them to a couple of Pawn Storm incidents in 2016 and 2017.
[ { "id": 30989, "label": "attack-pattern", "start_offset": 48, "end_offset": 56 }, { "id": 30990, "label": "location", "start_offset": 57, "end_offset": 62 }, { "id": 30991, "label": "location", "start_offset": 63, "end_offset": 66 }, { "id": 30992, "label": "location", "start_offset": 77, "end_offset": 81 }, { "id": 30993, "label": "location", "start_offset": 89, "end_offset": 94 }, { "id": 30995, "label": "location", "start_offset": 137, "end_offset": 140 }, { "id": 30996, "label": "location", "start_offset": 157, "end_offset": 161 }, { "id": 30999, "label": "location", "start_offset": 206, "end_offset": 209 } ]
[]
[]
4,811
During our investigation into the Turla CyberAzov apps, we identified another Android app first seen in the wild in March 2022 that also claimed to conduct DoS attacks against Russian websites.
[ { "id": 50729, "label": "SOFTWARE", "start_offset": 78, "end_offset": 89 }, { "id": 50730, "label": "TIME", "start_offset": 116, "end_offset": 126 }, { "id": 50731, "label": "attack-pattern", "start_offset": 156, "end_offset": 159 }, { "id": 50727, "label": "threat-actor", "start_offset": 34, "end_offset": 39 }, { "id": 50728, "label": "malware", "start_offset": 40, "end_offset": 49 } ]
[ { "id": 998, "from_id": 50727, "to_id": 50728, "type": "uses" } ]
[]
3,940
xml;charset
[]
[]
[]
9,825
Gets MAC address and volume information to send back to the C&C. Executes only during working hours (8:00AM-6:00PM, using kernel32.GetLocalTime API)
[ { "id": 29957, "label": "location", "start_offset": 17, "end_offset": 20 }, { "id": 29958, "label": "location", "start_offset": 74, "end_offset": 78 }, { "id": 29959, "label": "TIME", "start_offset": 101, "end_offset": 121 } ]
[]
[]
7,796
However, while initial analysis of the macro it used made us believe that this was from TA505, the macros’ obfuscation and style turned out to be more similar to the ones described in this post, based on the code page, senders, and fast flux.
[ { "id": 24146, "label": "location", "start_offset": 53, "end_offset": 57 }, { "id": 24148, "label": "location", "start_offset": 119, "end_offset": 122 }, { "id": 24149, "label": "location", "start_offset": 189, "end_offset": 193 }, { "id": 24150, "label": "malware", "start_offset": 213, "end_offset": 217 }, { "id": 24151, "label": "location", "start_offset": 228, "end_offset": 231 } ]
[]
[]
1,420
WildFire users can rest assured that they’ll be protected from whatever Kuluoz has in-store next.
[ { "id": 46758, "label": "SOFTWARE", "start_offset": 0, "end_offset": 8 }, { "id": 46759, "label": "malware", "start_offset": 72, "end_offset": 78 } ]
[]
[]
6,471
The name SharpChisel may be related to the purpose of this file, which is a C# wrapper for a tunneling tool called chisel.
[ { "id": 20113, "label": "location", "start_offset": 21, "end_offset": 24 }, { "id": 20114, "label": "location", "start_offset": 103, "end_offset": 107 }, { "id": 20115, "label": "malware", "start_offset": 115, "end_offset": 121 } ]
[]
[]
5,041
We also send all targeted Gmail and Workspace users government-backed attacker alerts notifying them of the activity.
[ { "id": 51125, "label": "SOFTWARE", "start_offset": 36, "end_offset": 45 }, { "id": 51124, "label": "SOFTWARE", "start_offset": 26, "end_offset": 31 } ]
[]
[]
9,309
Billing address (city) bill_to_zip nn
[]
[]
[]
832
By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.
[]
[]
[]
2,811
Unit 42 is following this situation very closely and will update this blog with any new information as it becomes available.
[ { "id": 45705, "label": "identity", "start_offset": 1, "end_offset": 8 } ]
[]
[]
581
Palo Alto Networks customers are further protected from ransomware.
[ { "id": 46178, "label": "identity", "start_offset": 0, "end_offset": 18 } ]
[]
[]
2,475
This particular webshell will load a base64 encoded class that will contain the functionality desired by the actor.
[]
[]
[]
1,966
The RDG client responds once again with a Client Hello packet containing the received cookie, which will initiate the DTLS handshake (RFC6347 Section 4.2). Figure 1: Initiation of the DTLS handshake between RDG client and server Figure 2: RDG client and server handshake phase (Source: [MS-TSGU] Section 1.3.3.1.1)
[]
[]
[]
2,819
The attack uses this vulnerability to spread the WanaCrypt0r ransomware on the network.
[ { "id": 8612, "label": "malware", "start_offset": 50, "end_offset": 61 } ]
[]
[]
1,165
Idiosyncrasies of the malware author become apparent, the evolution can be traced, the availability or quality of code deduced, and reuse of functionality made clear with a simple mutex.
[]
[]
[]
6,979
Figure 14. CrimsonRAT malware hosted in viral91[.]xyz We were also able to source a phishing document, “csd_car_price_list_2017,” that is related to this domain and has been seen in the wild in 2017.
[ { "id": 21868, "label": "attack-pattern", "start_offset": 84, "end_offset": 90 }, { "id": 21869, "label": "attack-pattern", "start_offset": 93, "end_offset": 101 }, { "id": 21870, "label": "location", "start_offset": 170, "end_offset": 173 } ]
[]
[]
11,807
The attackers use this function to relay device-based data to the channel, so they can see details such as the IP, useragent, and locales of visitors to their phishing sites in real-time.
[ { "id": 36416, "label": "location", "start_offset": 83, "end_offset": 86 }, { "id": 36417, "label": "location", "start_offset": 126, "end_offset": 129 }, { "id": 36418, "label": "attack-pattern", "start_offset": 159, "end_offset": 167 }, { "id": 36419, "label": "location", "start_offset": 168, "end_offset": 173 }, { "id": 36420, "label": "location", "start_offset": 177, "end_offset": 181 }, { "id": 36421, "label": "location", "start_offset": 182, "end_offset": 186 } ]
[]
[]
517
From this lens, the top three families observed are Ryuk (31.7%), Sodinokibi (20%) and Maze (15%). Emails are still the most efficient method to deliver and propagate ransomware.
[ { "id": 46146, "label": "malware", "start_offset": 52, "end_offset": 56 }, { "id": 46147, "label": "malware", "start_offset": 66, "end_offset": 76 }, { "id": 46148, "label": "malware", "start_offset": 87, "end_offset": 91 } ]
[]
[]
3,659
Although both names have at times been used to refer to the same group, organizations such as MITRE identifies them as two separate entities that wield the Carbanak backdoor in their attacks.
[ { "id": 49429, "label": "identity", "start_offset": 94, "end_offset": 99 }, { "id": 49432, "label": "malware", "start_offset": 156, "end_offset": 173 } ]
[]
[]
2,598
Apart from Argentinian eCommerce provider Mercado Libre / Mercado Pago, subsequent victimology has departed South America and pivoted to focus on the high-tech sector. Recent public victims have included: It should be understood that in addition there are likely any number of other victims, targeted by attacks not known in the public sphere.
[ { "id": 45606, "label": "location", "start_offset": 12, "end_offset": 23 }, { "id": 45608, "label": "identity", "start_offset": 43, "end_offset": 56 }, { "id": 45609, "label": "identity", "start_offset": 59, "end_offset": 71 }, { "id": 45610, "label": "location", "start_offset": 109, "end_offset": 122 } ]
[ { "id": 357, "from_id": 45608, "to_id": 45606, "type": "located-at" }, { "id": 358, "from_id": 45609, "to_id": 45606, "type": "located-at" }, { "id": 359, "from_id": 45609, "to_id": 45608, "type": "related-to" } ]
[]
823
The patch provided by Microsoft included the typical release of operating system patches, but this time a new Application Programming Interface (API) function was added.
[ { "id": 46371, "label": "SOFTWARE", "start_offset": 23, "end_offset": 32 } ]
[]
[]
3,969
Use multi-factor authentication whenever possible and regularly update it.
[]
[]
[]
10,872
Similar malicious samples
[]
[]
[]
12,804
All Roads Lead to BlackTech
[ { "id": 39873, "label": "threat-actor", "start_offset": 10, "end_offset": 14 }, { "id": 39874, "label": "threat-actor", "start_offset": 18, "end_offset": 27 } ]
[]
[]
520
Web browsing is the second most common entry vector for ransomware infections.
[]
[]
[]
357
As Heartbleed allows the attacker to scrape memory from the vulnerable device, they can retrieve significant amounts of secret information.
[ { "id": 44716, "label": "attack-pattern", "start_offset": 38, "end_offset": 51 }, { "id": 44715, "label": "vulnerability", "start_offset": 4, "end_offset": 14 } ]
[ { "id": 153, "from_id": 44715, "to_id": 44716, "type": "targets" } ]
[]
211
Additionally the kernel module responsible for the actual wiping activity is from a legitimate application called EaseUS Partition Master.
[ { "id": 45907, "label": "tools", "start_offset": 115, "end_offset": 138 } ]
[]
[]
2,400
The CVE-2022-22965 vulnerability allows an attacker unauthenticated remote code execution (RCE), which Unit 42 has observed being exploited in the wild.
[ { "id": 45495, "label": "vulnerability", "start_offset": 4, "end_offset": 18 }, { "id": 45496, "label": "attack-pattern", "start_offset": 52, "end_offset": 89 }, { "id": 45497, "label": "identity", "start_offset": 103, "end_offset": 110 } ]
[ { "id": 105, "from_id": 45496, "to_id": 45495, "type": "delivers" } ]
[]
658
The WannaCry attacks in May, 2017 demonstrated that many Windows systems had not been patched for this vulnerability.
[ { "id": 2160, "label": "malware", "start_offset": 4, "end_offset": 12 }, { "id": 46236, "label": "TIME", "start_offset": 24, "end_offset": 33 }, { "id": 46237, "label": "SOFTWARE", "start_offset": 57, "end_offset": 64 } ]
[]
[]
7,325
Figure 21.
[]
[]
[]
3,702
To steal these, both groups employed credential dumping and input capture.
[ { "id": 11230, "label": "attack-pattern", "start_offset": 37, "end_offset": 55 }, { "id": 11232, "label": "attack-pattern", "start_offset": 60, "end_offset": 73 } ]
[]
[]
10,298
Troj.Win32.TRX.XXPE50FFF039 b61e0f68772f3557024325f3a05e4edb940dbbe380af00f3bdaaaeabda308e72 igmtSX.exe
[ { "id": 31450, "label": "SHA1", "start_offset": 29, "end_offset": 93 } ]
[]
[]
12,997
Within these files is a link to an attacker controlled phishing domain.
[ { "id": 40484, "label": "attack-pattern", "start_offset": 55, "end_offset": 63 } ]
[]
[]
9,648
For regular user path: ~/Library/Spelling/ processname: spellagentd
[]
[]
[]
2,341
These two functions are used in conjunction to dynamically load a shared object into memory and retrieve the address of a symbol from it.
[]
[]
[]
9,750
Running this registry file adds the following command to the Run registry key: rundll32 %Temp%\png.dll,RunPow Figure 3.
[ { "id": 29734, "label": "attack-pattern", "start_offset": 79, "end_offset": 87 } ]
[]
[]
13,128
The expansive use of open source code by DevOps teams adds another element of risk which requires urgent attention.
[]
[]
[]
10,178
Since late 2019, our team has disrupted financially motivated phishing campaigns targeting YouTubers with Cookie Theft malware.
[ { "id": 31068, "label": "attack-pattern", "start_offset": 62, "end_offset": 70 } ]
[]
[]
4,027
It is our aim, through this article, to encourage enterprises to review their own security setting and protect themselves from damage and compromise.
[]
[]
[]
1,668
The client combines this with the password and generates the same key.
[]
[]
[]
3,774
Cortex Xpanse was able to identify ~800 instances of VMware Workspace ONE Access connected to the public internet, and can be leveraged to enumerate potentially vulnerable instances within customer networks.
[ { "id": 49607, "label": "SOFTWARE", "start_offset": 1, "end_offset": 14 }, { "id": 49608, "label": "SOFTWARE", "start_offset": 54, "end_offset": 81 } ]
[]
[]
10,132
The method, which we first discussed in 2014, involves changing a browser tab to point to a phishing site after distracting the target.
[ { "id": 30896, "label": "location", "start_offset": 74, "end_offset": 77 }, { "id": 30897, "label": "location", "start_offset": 81, "end_offset": 86 }, { "id": 30898, "label": "attack-pattern", "start_offset": 92, "end_offset": 100 }, { "id": 30899, "label": "location", "start_offset": 128, "end_offset": 134 } ]
[]
[]
1,754
In his slides, he mentioned that a "god mode" of Internet Explorer could be turned on by a one byte overwrite.
[ { "id": 46906, "label": "SOFTWARE", "start_offset": 49, "end_offset": 66 } ]
[]
[]
1,592
Version Summary October 24, 2017 2:30 p.m. PT Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!
[ { "id": 46837, "label": "TIME", "start_offset": 18, "end_offset": 47 } ]
[]
[]
1,773
Here, xyz indicates a user-controlled address that contains the length of a vector object or length of an Int32Array.
[]
[]
[]
2,334
day or 0-day?
[]
[]
[]
204
On Feb. 18, both the United States and the United Kingdom attributed these DDoS attacks to Russia’s Main Intelligence Directorate (GRU). Over the past week, Ukraine has continued to observe a relatively constant flow of DDoS attacks targeting its government and financial institutions.
[ { "id": 44621, "label": "identity", "start_offset": 22, "end_offset": 35 }, { "id": 44622, "label": "TIME", "start_offset": 4, "end_offset": 11 }, { "id": 44623, "label": "identity", "start_offset": 44, "end_offset": 58 }, { "id": 44624, "label": "attack-pattern", "start_offset": 76, "end_offset": 80 }, { "id": 44625, "label": "threat-actor", "start_offset": 92, "end_offset": 136 }, { "id": 44626, "label": "identity", "start_offset": 159, "end_offset": 166 }, { "id": 44627, "label": "attack-pattern", "start_offset": 222, "end_offset": 234 }, { "id": 44628, "label": "identity", "start_offset": 249, "end_offset": 286 } ]
[ { "id": 4, "from_id": 44624, "to_id": 44625, "type": "attributed-to" }, { "id": 131, "from_id": 44627, "to_id": 44628, "type": "targets" } ]
[]
14,021
Instead, it is determined by the operating system language at the time of the version resource inclusion.
[]
[]
[]
907
Once files are identified, PClock will begin encrypting them, one-by-one.
[ { "id": 46430, "label": "malware", "start_offset": 28, "end_offset": 34 } ]
[]
[]
7,618
Figure 15.
[]
[]
[]
479
About: Threat Briefs are meant to help busy people understand real-world threats and how they can prevent them in their lives.
[]
[]
[]
7,265
Figures 1-2.
[]
[]
[]
4,929
This means that there is typically more than one threat actor behind the warnings.
[]
[]
[]
5,427
Having a distributed infrastructure also makes it more difficult for cybersecurity teams to take down the whole attack.
[]
[]
[]
7,138
This shows that the threat actors intended to confuse forensics investigators with incorrect timestamps, which is why it’s critical to analyze timestamps with caution during investigations.
[]
[]
[]
8,501
This is the second directive the TSA issued to the pipeline sector this 2021, building on the initial Security Directive released on May 2021 following the ransomware attack on Colonial Pipeline by DarkSide.
[]
[]
[]
14,126
At the same time, we were able to locate the Mattermost server hosted in Greece, and that gave us the current time zone of the Mattermost server.
[ { "id": 48192, "label": "location", "start_offset": 73, "end_offset": 79 }, { "id": 48191, "label": "Infrastucture", "start_offset": 127, "end_offset": 144 }, { "id": 48193, "label": "Infrastucture", "start_offset": 45, "end_offset": 62 } ]
[ { "id": 392, "from_id": 48191, "to_id": 48192, "type": "located-at" }, { "id": 393, "from_id": 48193, "to_id": 48192, "type": "located-at" } ]
[]
3,542
Trend Micro solutions
[ { "id": 49318, "label": "identity", "start_offset": 0, "end_offset": 11 } ]
[]
[]
2,602
Several of the Lapsus$ Group’s attacks involved the theft and publication of source code.
[ { "id": 47790, "label": "threat-actor", "start_offset": 15, "end_offset": 22 } ]
[]
[]
3,742
This is also the earliest date at which Unit 42 observed exploitation attempts and scanning activity. 2022-04-13: VMware advisory updated with knowledge of active exploitation of CVE-2022-22954 in the wild.
[ { "id": 49562, "label": "TIME", "start_offset": 103, "end_offset": 113 }, { "id": 49563, "label": "identity", "start_offset": 115, "end_offset": 121 }, { "id": 49561, "label": "identity", "start_offset": 40, "end_offset": 47 }, { "id": 49564, "label": "vulnerability", "start_offset": 180, "end_offset": 194 } ]
[]
[]
2,491
While CVE-2022-22963 is a different vulnerability in Spring Cloud Function (not technically part of SpringShell), a Threat Prevention signature is also available to ensure coverage at the perimeter.
[ { "id": 47575, "label": "vulnerability", "start_offset": 101, "end_offset": 112 }, { "id": 47573, "label": "vulnerability", "start_offset": 7, "end_offset": 21 }, { "id": 47574, "label": "SOFTWARE", "start_offset": 54, "end_offset": 66 } ]
[ { "id": 341, "from_id": 47574, "to_id": 47573, "type": "has" } ]
[]
13,826
The rest of the routine is all placed in “GetRTTAndHopCount.”
[]
[]
[]
6,925
Exploiting CVE-2019-0676 enabled attackers to reveal presence or non-presence of files on the victim’s computer; this information was later used to decide whether or not a second stage exploit should be delivered.
[]
[]
[]
8,032
The phishing kit will also ask for second-factor authentication codes sent to devices.
[ { "id": 24913, "label": "attack-pattern", "start_offset": 4, "end_offset": 12 }, { "id": 24914, "label": "location", "start_offset": 17, "end_offset": 21 } ]
[]
[]
3,282
It writes the basic config and RTMP config of OBS and then starts the OBS process to monitor the victim’s desktop using RTMP live streaming to the cloud.
[]
[]
[]
3,918
<%@ Page Language="Jscript" Debug=true%>
[]
[]
[]
4,834
Today, we're sharing intelligence on a segment of attackers we call hack-for-hire, whose niche focuses on compromising accounts and exfiltrating data as a service.
[ { "id": 50791, "label": "attack-pattern", "start_offset": 68, "end_offset": 81 } ]
[]
[]
855
And while this technique alone isn’t solely responsible for the damaging power of WanaCrypt0r/WannaCry and Petya/NotPetya it is certainly an important contributing factor.
[ { "id": 2781, "label": "malware", "start_offset": 82, "end_offset": 93 }, { "id": 2784, "label": "malware", "start_offset": 107, "end_offset": 112 }, { "id": 44893, "label": "malware", "start_offset": 94, "end_offset": 102 }, { "id": 44895, "label": "malware", "start_offset": 113, "end_offset": 121 } ]
[]
[]
9,416
This malware lineup includes tried-and-tested malware families that have been upgraded, such as PlugX and Gh0st RAT, and a brand-new multistage malware family that we have dubbed PuppetLoader.
[ { "id": 28978, "label": "location", "start_offset": 35, "end_offset": 38 }, { "id": 28979, "label": "malware", "start_offset": 96, "end_offset": 101 }, { "id": 28980, "label": "location", "start_offset": 102, "end_offset": 105 }, { "id": 28981, "label": "malware", "start_offset": 106, "end_offset": 115 }, { "id": 28982, "label": "location", "start_offset": 117, "end_offset": 120 }, { "id": 28983, "label": "location", "start_offset": 123, "end_offset": 128 }, { "id": 28984, "label": "malware", "start_offset": 179, "end_offset": 191 } ]
[]
[]
13,066
Published New White Paper: Practical Risk Assessments for Smart Factories
[]
[]
[]
3,374
Silverlight_ins.exe BIOPASS RAT Loader
[ { "id": 10218, "label": "malware", "start_offset": 21, "end_offset": 32 }, { "id": 49020, "label": "FILEPATH", "start_offset": 0, "end_offset": 19 } ]
[ { "id": 557, "from_id": 49020, "to_id": 10218, "type": "indicates" } ]
[]
7,747
The attached document asks the user to enable the macros, which creates an Internet Explorer object instance.
[]
[]
[]
11,684
These documents and news are probably interesting in some way to their targets and are used to make them click and log in to the phishing pages.
[ { "id": 35831, "label": "location", "start_offset": 16, "end_offset": 19 }, { "id": 35832, "label": "location", "start_offset": 25, "end_offset": 28 }, { "id": 35833, "label": "location", "start_offset": 58, "end_offset": 61 }, { "id": 35834, "label": "location", "start_offset": 79, "end_offset": 82 }, { "id": 35835, "label": "location", "start_offset": 83, "end_offset": 86 }, { "id": 35836, "label": "location", "start_offset": 100, "end_offset": 104 }, { "id": 35837, "label": "location", "start_offset": 111, "end_offset": 114 }, { "id": 35838, "label": "attack-pattern", "start_offset": 129, "end_offset": 137 } ]
[]
[]
2,232
In the event the supplied argument was C:\malware.exe, the registry key would be named ‘malware’, and the path for this key would be ‘C:\malware.exe’. The persistence thread runs in a loop where the registry keys are set every 60 seconds, ensuring persistence even in the event an administrator manually deletes the registry keys.
[ { "id": 45426, "label": "FILEPATH", "start_offset": 39, "end_offset": 53 }, { "id": 45427, "label": "FILEPATH", "start_offset": 134, "end_offset": 148 }, { "id": 6655, "label": "TIME", "start_offset": 222, "end_offset": 238 } ]
[]
[]
5,063
Ghostwriter actors have quickly adopted this new technique, combining it with a previously observed technique, hosting credential phishing landing pages on compromised sites.
[ { "id": 51170, "label": "attack-pattern", "start_offset": 111, "end_offset": 173 }, { "id": 51169, "label": "threat-actor", "start_offset": 0, "end_offset": 11 } ]
[ { "id": 1066, "from_id": 51169, "to_id": 51170, "type": "uses" } ]
[]
4,576
These phishing domains have been blocked through Google Safe Browsing – a service that identifies unsafe websites across the web and notifies users and website owners of potential harm.
[]
[]
[]
3,935
It proceeded with copying the Chopper web shell into accessible shared folders in other hosts to gain access.
[ { "id": 49777, "label": "malware", "start_offset": 30, "end_offset": 47 } ]
[]
[]
2,304
iOS Exploits
[ { "id": 45455, "label": "SOFTWARE", "start_offset": 0, "end_offset": 3 } ]
[]
[]
14,357
The attackers were found using the HTTP protocol to transfer data.
[]
[]
[]
2,032
With HelloXD version 2, the author(s) opted to alter the encryption routine, swapping out the modified HC-128 algorithm with the Rabbit symmetric cipher.
[ { "id": 6049, "label": "malware", "start_offset": 6, "end_offset": 13 } ]
[]
[]
890
PClock2 also enables persistence by setting the following registry key.
[ { "id": 46421, "label": "malware", "start_offset": 1, "end_offset": 8 } ]
[]
[]
6,681
The full extent of the attack is currently unknown.
[]
[]
[]
3,239
The second HTTP server behaves the same as the first but returns a string, “dm_online”, instead.
[]
[]
[]
6,949
Aside from the Crimson RAT malware, the Earth Karkaddan APT group is also known to use the ObliqueRat malware in its campaigns.
[ { "id": 21753, "label": "location", "start_offset": 40, "end_offset": 45 }, { "id": 21754, "label": "location", "start_offset": 56, "end_offset": 59 }, { "id": 21755, "label": "malware", "start_offset": 91, "end_offset": 101 } ]
[]
[]
1,141
While programmatic analysis would have a hard time associating the two, it's obvious to a human that the same face rolling technique was used to name this mutex.
[]
[]
[]
5,171
DDS is integral in embedded systems that require real-time machine-to-machine communication, facilitating a reliable communication layer between sensors, controllers, and actuators.
[]
[]
[]
2,118
Vulnerability Information
[]
[]
[]
8
This tactic is a nightmare for legacy security products that are based on legacy techniques such as bytes signatures, since they can only detect attacks after the damage is done instead of preventing it as a true solution should.
[]
[]
[]
1,929
But this link is further fortified by the Android applications we found whose code is like that of Bahamut, with the C&C matching the usual name registration pattern of Patchwork’s group, as well as an infrastructure close to an old Patchwork domain.
[ { "id": 45181, "label": "SOFTWARE", "start_offset": 42, "end_offset": 49 }, { "id": 45183, "label": "threat-actor", "start_offset": 169, "end_offset": 178 }, { "id": 45184, "label": "threat-actor", "start_offset": 233, "end_offset": 242 }, { "id": 45182, "label": "malware", "start_offset": 99, "end_offset": 106 } ]
[ { "id": 80, "from_id": 45182, "to_id": 45183, "type": "attributed-to" } ]
[]
8,880
Having the scheduled task run only once removes the notion of persistence.
[ { "id": 27467, "label": "attack-pattern", "start_offset": 11, "end_offset": 25 }, { "id": 27468, "label": "location", "start_offset": 30, "end_offset": 34 } ]
[]
[]
4,427
The functionality was not automated and it's unclear why it was removed in later versions.
[]
[]
[]
2,246
The following alphabet is used: 3bcd1fghijklmABCDEFGH-J+LMnopq4stuvwxyzNOPQ7STUVWXYZ0e2ar56R89K/
[]
[]
[]
9,100
Stealth was already a fixture in their operations.
[]
[]
[]
8,125
In reality, that is just an overlay screen that is displayed on top of all activity windows on the device.
[ { "id": 25165, "label": "identity", "start_offset": 20, "end_offset": 24 } ]
[]
[]