id
int64
1
14.4k
text
stringlengths
3
5.01k
entities
list
relations
list
Comments
list
1,965
The DTLS protocol is used by Microsoft Windows Remote Desktop Gateway (RDG) to establish a secure channel between the RDG client and RDG server (described in detail in [MS_TSGU].pdf). The RDG client initiates the DTLS connection by sending a ClientHello to the RDG Server. The RDG server then responds with a DTLS Hello Verify Request that contains a cookie; this is used as a denial of service countermeasure.
[ { "id": 47089, "label": "SOFTWARE", "start_offset": 29, "end_offset": 75 }, { "id": 47090, "label": "FILEPATH", "start_offset": 168, "end_offset": 181 } ]
[]
[]
4,432
PipeCommunication pipeCommunication = new PipeCommunication(true, text); bool flag = false; while (!flag)
[]
[]
[]
4,071
HTShell supports importing additional config files.
[ { "id": 49909, "label": "malware", "start_offset": 0, "end_offset": 7 } ]
[]
[]
8,147
Customized encoding routine done Relation to SideWinder
[]
[]
[]
7,298
Third-stage payload
[]
[]
[]
160
Although that feature was never enabled to protect user data files like ransomware targets, there is a clear lesson from the experience: too many security checks on user activity fails in the end.
[]
[]
[]
5,061
In mid-March, a security researcher released a blog post detailing a 'Browser in the Browser' phishing technique.
[ { "id": 51167, "label": "TIME", "start_offset": 3, "end_offset": 12 } ]
[]
[]
2,422
Exposing the class object to web users is very dangerous and can lead to RCE in many ways.
[]
[]
[]
9,616
We’ll also continue to apply those findings internally to improve the safety and security of our products so we can effectively combat threats and protect users who rely on our services.
[ { "id": 29454, "label": "tools", "start_offset": 70, "end_offset": 76 }, { "id": 29455, "label": "location", "start_offset": 77, "end_offset": 80 }, { "id": 29456, "label": "location", "start_offset": 81, "end_offset": 89 }, { "id": 29457, "label": "location", "start_offset": 112, "end_offset": 115 }, { "id": 29458, "label": "location", "start_offset": 143, "end_offset": 146 } ]
[]
[]
9,711
Other bytes are just randomly generated noise.
[ { "id": 29625, "label": "location", "start_offset": 12, "end_offset": 15 }, { "id": 29626, "label": "identity", "start_offset": 16, "end_offset": 20 } ]
[]
[]
5,591
Avoid connecting a NAS device directly to the internet.
[]
[]
[]
3,910
Initial access
[]
[]
[]
2,493
Unit 42 is actively monitoring malicious traffic through our devices and cloud solutions.
[ { "id": 45540, "label": "identity", "start_offset": 1, "end_offset": 8 } ]
[]
[]
3,470
Otherwise, Marade will use the C&C information embedded in its code.
[ { "id": 49270, "label": "malware", "start_offset": 11, "end_offset": 17 } ]
[]
[]
5,545
What can you do to stay safe?
[]
[]
[]
10,962
To help protect users against these kinds of tracks, our Advanced Protection Program (APP) utilizes hardware security keys and provides the strongest protections available against phishing and account hijackings.
[ { "id": 33353, "label": "location", "start_offset": 66, "end_offset": 76 }, { "id": 33354, "label": "location", "start_offset": 109, "end_offset": 117 }, { "id": 33355, "label": "location", "start_offset": 123, "end_offset": 126 }, { "id": 33356, "label": "attack-pattern", "start_offset": 180, "end_offset": 188 }, { "id": 33357, "label": "location", "start_offset": 189, "end_offset": 192 } ]
[]
[]
3,079
Please mark, I'm not a robot!
[]
[]
[]
6,117
It is correctly identified by eleven AV vendors as PlugX malware.
[ { "id": 18919, "label": "malware", "start_offset": 51, "end_offset": 56 } ]
[]
[]
989
We would also like to thank Ryan Olson, Benjamin Small, Richar Wartell, and Chris Clark from Palo Alto networks in publishing the discovery.
[ { "id": 46484, "label": "identity", "start_offset": 28, "end_offset": 38 }, { "id": 46485, "label": "identity", "start_offset": 40, "end_offset": 54 }, { "id": 46486, "label": "identity", "start_offset": 56, "end_offset": 70 }, { "id": 46487, "label": "identity", "start_offset": 76, "end_offset": 87 }, { "id": 46488, "label": "identity", "start_offset": 93, "end_offset": 111 } ]
[]
[]
10,364
Given the use of lure documents designed with social engineering in mind, it is likely that the attackers use phishing or spam to target users who are unaware of these documents' malicious nature.
[ { "id": 31553, "label": "location", "start_offset": 0, "end_offset": 5 }, { "id": 31554, "label": "location", "start_offset": 17, "end_offset": 21 }, { "id": 31555, "label": "location", "start_offset": 80, "end_offset": 86 }, { "id": 31556, "label": "attack-pattern", "start_offset": 110, "end_offset": 118 }, { "id": 31557, "label": "location", "start_offset": 130, "end_offset": 136 }, { "id": 31558, "label": "location", "start_offset": 147, "end_offset": 150 } ]
[]
[]
2,130
There is also proof of concept (PoC) code available already.
[]
[]
[]
4,367
Trend Micro™ Deep Discovery™ Email Inspector – Defends users through a combination of real-time scanning and advanced analysis techniques for known and unknown attacks. Indicators of Compromise Hashes of the malicious encrypted documents: SHA256 Detection name dacf7868a71440a7d7d8797caca1aa29b7780801e6f3b3bc33123f16989354b2 Trojan.W97M.CONFUCIUS.A 0f6bcbdf4d192f8273887f9858819dd4690397a92fb28a60bb731c873c438e07 Trojan.W97M.CONFUCIUS.B
[ { "id": 50153, "label": "malware", "start_offset": 428, "end_offset": 451 }, { "id": 50149, "label": "SOFTWARE", "start_offset": 0, "end_offset": 28 }, { "id": 50150, "label": "SHA2", "start_offset": 271, "end_offset": 335 }, { "id": 50151, "label": "malware", "start_offset": 337, "end_offset": 360 }, { "id": 50152, "label": "SHA2", "start_offset": 362, "end_offset": 426 } ]
[ { "id": 920, "from_id": 50150, "to_id": 50151, "type": "indicates" }, { "id": 921, "from_id": 50152, "to_id": 50153, "type": "indicates" } ]
[]
1,314
The following icon is present in this sample: Figure 8.
[]
[]
[]
6,680
CISA has also issued a bulletin asking organizations using the software to follow Kaseya guidance.
[]
[]
[]
14,180
But these efforts have been mainly targeted at Ukrainian organizations.
[]
[]
[]
1,209
They implement code that will send SMS to pre-defined premium numbers (Figure 1).
[]
[]
[]
5,273
For organizations, Trend Micro™ Mobile Security for Enterprise provides device, compliance and application management, data protection, and configuration provisioning, as well as protects devices from attacks that leverage vulnerabilities, preventing unauthorized access to apps, as well as detecting and blocking malware and fraudulent websites.
[ { "id": 51315, "label": "SOFTWARE", "start_offset": 19, "end_offset": 62 } ]
[]
[]
4,521
Although our security precautions are robust, security issues can still occur, which is why we created a comprehensive security response process to respond to incidents.
[]
[]
[]
14,416
In these attacks, attackers utilized the Eternal Blue exploit and harvested credentials as they moved across the environment, and then used existing system tools to kill security services within machines to hide their presence.
[ { "id": 47172, "label": "vulnerability", "start_offset": 41, "end_offset": 61 } ]
[]
[]
1,152
These unique consistencies make it extremely improbable that two different people named these mutexes.
[]
[]
[]
3,033
We close this list with patching because it is the most important thing you can do.
[]
[]
[]
14,297
Infection chain of Maikspy Windows variant Figure 8.
[ { "id": 48503, "label": "malware", "start_offset": 19, "end_offset": 27 }, { "id": 48504, "label": "SOFTWARE", "start_offset": 27, "end_offset": 35 } ]
[ { "id": 434, "from_id": 48503, "to_id": 48504, "type": "targets" } ]
[]
213
In tracking this threat, early reports show that the malware has been deployed against a financial institution in Ukraine as well as two contractors in Latvia and Lithuania that provide services to the Ukrainian Government.
[ { "id": 44633, "label": "location", "start_offset": 114, "end_offset": 121 }, { "id": 44634, "label": "identity", "start_offset": 202, "end_offset": 222 }, { "id": 44635, "label": "identity", "start_offset": 90, "end_offset": 110 }, { "id": 44636, "label": "location", "start_offset": 152, "end_offset": 158 }, { "id": 44637, "label": "location", "start_offset": 163, "end_offset": 172 }, { "id": 44638, "label": "malware", "start_offset": 53, "end_offset": 60 }, { "id": 44639, "label": "identity", "start_offset": 133, "end_offset": 172 } ]
[ { "id": 6, "from_id": 44638, "to_id": 44635, "type": "targets" }, { "id": 7, "from_id": 44638, "to_id": 44639, "type": "targets" } ]
[]
1,725
By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.
[]
[]
[]
13,383
Email:
[]
[]
[]
6,926
The attack vector for CVE-2019-1367 was rather atypical as the exploit was delivered from an Office document abusing the online video embedding feature to load an external URL conducting the exploitation.
[ { "id": 21664, "label": "tools", "start_offset": 11, "end_offset": 17 }, { "id": 21666, "label": "location", "start_offset": 155, "end_offset": 159 } ]
[]
[]
6,676
They used access to the VSA software to deploy ransomware associated with the REvil/Sodinokibi ransomware-as-a-service group, according to reports.
[ { "id": 20733, "label": "malware", "start_offset": 78, "end_offset": 83 }, { "id": 20734, "label": "threat-actor", "start_offset": 84, "end_offset": 94 } ]
[]
[]
1,257
The malware was included as an attachment intended to trick the user into opening the malware.
[ { "id": 44954, "label": "attack-pattern", "start_offset": 31, "end_offset": 81 } ]
[]
[]
1,453
Because of this, app developers should be extremely careful about re-using certificates when signing their apps.
[]
[]
[]
829
As always, we recommend keeping your Microsoft products up to date with the latest patches to mitigate this vulnerability.
[ { "id": 46379, "label": "identity", "start_offset": 37, "end_offset": 46 } ]
[]
[]
1,266
Four of the five Sysget variants included a form of decoy document to trick users into believing they had opened a legitimate file rather than malware.
[ { "id": 46642, "label": "malware", "start_offset": 18, "end_offset": 24 }, { "id": 44958, "label": "attack-pattern", "start_offset": 53, "end_offset": 67 } ]
[ { "id": 204, "from_id": 46642, "to_id": 44958, "type": "uses" } ]
[]
1,921
A malicious RTF file that exploits the CVE-2017-8750 and drops a malicious VB backdoor with C&C appswonder[.]info A malicious InPage file that exploits CVE-2017-12824 and drops two files, one non-malicious, and one malicious VB backdoor with C&C referfile[.]com Talos recently reported both C&C domain names with one type of campaign that targets iOS and involves MDM, and another type using VB and Delphi backdoors.
[ { "id": 47039, "label": "vulnerability", "start_offset": 40, "end_offset": 53 }, { "id": 47042, "label": "DOMAIN", "start_offset": 247, "end_offset": 262 }, { "id": 47043, "label": "identity", "start_offset": 264, "end_offset": 269 }, { "id": 47044, "label": "SOFTWARE", "start_offset": 349, "end_offset": 352 }, { "id": 47045, "label": "malware", "start_offset": 3, "end_offset": 16 }, { "id": 47040, "label": "vulnerability", "start_offset": 153, "end_offset": 167 }, { "id": 47041, "label": "DOMAIN", "start_offset": 97, "end_offset": 114 } ]
[ { "id": 291, "from_id": 47045, "to_id": 47039, "type": "exploits" }, { "id": 292, "from_id": 47045, "to_id": 47041, "type": "communicates-with" } ]
[]
9,830
down_new
[ { "id": 29966, "label": "tools", "start_offset": 0, "end_offset": 8 } ]
[]
[]
11,642
Furthermore, it seems that these lures are distributed via phishing links.
[ { "id": 35731, "label": "location", "start_offset": 39, "end_offset": 42 }, { "id": 35732, "label": "attack-pattern", "start_offset": 59, "end_offset": 67 } ]
[]
[]
3,744
Publication of VMware advisory VMSA-2022-0014 regarding CVE-2022-22972, CVE-2022-22973.
[ { "id": 49568, "label": "vulnerability", "start_offset": 72, "end_offset": 86 }, { "id": 49566, "label": "identity", "start_offset": 15, "end_offset": 21 }, { "id": 49567, "label": "vulnerability", "start_offset": 56, "end_offset": 70 } ]
[]
[]
5,391
We have observed that some of the WatchGuard and Asus bots were never cleaned up because these routers still try to connect periodically to old C&Cs that were secured or taken offline.
[]
[]
[]
1,991
We believe this was likely done to monitor the progress of the ransomware and maintain an additional foothold in compromised systems.
[]
[]
[]
7,696
Figure 5.
[]
[]
[]
13,428
NOTE: On May 20th, we updated our attribution to more precisely describe our findings.
[]
[]
[]
4,515
We ensure appropriate controls are built into the architecture of the system.
[]
[]
[]
9,167
Coincidence?
[]
[]
[]
4,796
While we continue to fight these threats on a technical level, the providers of these capabilities operate openly in democratic countries.
[]
[]
[]
348
The best way to protect yourself against ransomware is to keep up-to-date backups of your important files.
[]
[]
[]
7,877
Another 156 implement a BackupAgent that restricts which data is subject to the backup.
[]
[]
[]
1,005
2. Receiving student discounts or coupons from retailers:
[]
[]
[]
4,577
Recently observed COLDRIVER indicators: In another campaign tracked by CERT-UA as UAC-0056 we observed compromised email addresses of a Regional Prosecutor’s office of Ukraine leveraged to send malicious Microsoft Excel documents with VBA macros delivering Cobalt Strike.
[ { "id": 50428, "label": "tools", "start_offset": 257, "end_offset": 270 }, { "id": 50424, "label": "identity", "start_offset": 71, "end_offset": 78 }, { "id": 50425, "label": "threat-actor", "start_offset": 82, "end_offset": 90 }, { "id": 50427, "label": "SOFTWARE", "start_offset": 204, "end_offset": 219 }, { "id": 50423, "label": "threat-actor", "start_offset": 18, "end_offset": 27 }, { "id": 50426, "label": "identity", "start_offset": 136, "end_offset": 175 } ]
[ { "id": 969, "from_id": 50423, "to_id": 50425, "type": "duplicate-of" }, { "id": 970, "from_id": 50423, "to_id": 50426, "type": "impersonates" } ]
[]
6,391
As noted above, the sample was configured to call home to 159.65.186[.]50 on port 443.
[ { "id": 19815, "label": "location", "start_offset": 20, "end_offset": 26 }, { "id": 19816, "label": "location", "start_offset": 45, "end_offset": 49 }, { "id": 19817, "label": "location", "start_offset": 50, "end_offset": 54 }, { "id": 19818, "label": "IPV4", "start_offset": 58, "end_offset": 73 } ]
[]
[]
5,230
We named these malicious apps AnubisSpy (ANDROIDOS_ANUBISSPY) as all the malware’s payload is a package called watchdog.
[ { "id": 51263, "label": "malware", "start_offset": 111, "end_offset": 119 }, { "id": 51262, "label": "malware", "start_offset": 41, "end_offset": 60 }, { "id": 16073, "label": "malware", "start_offset": 30, "end_offset": 39 } ]
[ { "id": 1072, "from_id": 51262, "to_id": 16073, "type": "duplicate-of" } ]
[]
4,721
Short of not using a device, there is no way to prevent exploitation by a zero-click exploit; it's a weapon against which there is no defense.
[]
[]
[]
3,788
At the time, we found ChessMaster targeting different sectors from the academe to media and government agencies in Japan.
[ { "id": 49628, "label": "campaign", "start_offset": 22, "end_offset": 33 }, { "id": 49629, "label": "identity", "start_offset": 71, "end_offset": 111 }, { "id": 49630, "label": "location", "start_offset": 115, "end_offset": 120 } ]
[ { "id": 851, "from_id": 49628, "to_id": 49629, "type": "targets" }, { "id": 852, "from_id": 49629, "to_id": 49630, "type": "located-at" } ]
[]
5,286
Cyclops Blink has been around since at least June 2019, and a considerable number of its C&C servers and bots are active for up to about three years.
[ { "id": 51336, "label": "malware", "start_offset": 0, "end_offset": 13 }, { "id": 51337, "label": "TIME", "start_offset": 45, "end_offset": 54 } ]
[]
[]
13,182
After the encrypted payload is loaded, the loader injects a malicious DLL into rundll32.exe.
[]
[]
[]
2,165
This allows the attack to succeed even if the user simply views the file in the preview pane – with no clicks on the document necessary – making the attack much more dangerous.
[]
[]
[]
1,627
This moves it to the back of the inbox there the victim is unlikely to ever see it.
[]
[]
[]
4,472
We assessed that a surveillance vendor packaged and sold these technologies.
[]
[]
[]
11,682
Analysis of the phishing pages revealed that most of them would redirect to the original webmail servers, which they copied after the victims sent out their login credentials.
[ { "id": 35826, "label": "attack-pattern", "start_offset": 16, "end_offset": 24 }, { "id": 35827, "label": "location", "start_offset": 45, "end_offset": 49 }, { "id": 35828, "label": "location", "start_offset": 53, "end_offset": 57 } ]
[]
[]
1,318
More information on its history is available at the following links.
[]
[]
[]
6,417
This impersonation does not imply a vulnerability in Microsoft’s products or services. Brute Ratel C4 ISO Samples: 1FC7B0E1054D54CE8F1DE0CC95976081C7A85C7926C03172A3DDAA672690042C X64 Brute Ratel C4 Windows Kernel Module: 31ACF37D180AB9AFBCF6A4EC5D29C3E19C947641A2D9CE3CE56D71C1F576C069 APT29 ISO Samples: F58AE9193802E9BAF17E6B59E3FDBE3E9319C5D27726D60802E3E82D30D14D46
[ { "id": 19912, "label": "SHA2", "start_offset": 117, "end_offset": 181 }, { "id": 19914, "label": "SHA2", "start_offset": 226, "end_offset": 290 }, { "id": 19915, "label": "threat-actor", "start_offset": 292, "end_offset": 297 }, { "id": 19916, "label": "SHA2", "start_offset": 312, "end_offset": 376 } ]
[]
[]
1,002
By using this kind of account, a user can perform a developer unlock on their Windows Phone devices without incurring a fee.
[]
[]
[]
2,024
We have observed two different samples of the HelloXD ransomware publicly available, indicating it is still under development by the author(s).
[ { "id": 6000, "label": "malware", "start_offset": 47, "end_offset": 54 } ]
[]
[]
949
Taomike has not previously been associated with malicious activity, but a recent update to their software added SMS theft functionality.
[ { "id": 46458, "label": "identity", "start_offset": 0, "end_offset": 7 } ]
[]
[]
3,074
In March of 2014, a Fake AV app named “Virus Shield” was listed for sale at $3.99 and quickly rose to the top position of Google Play’s New Paid Apps list.
[ { "id": 48141, "label": "malware", "start_offset": 39, "end_offset": 51 }, { "id": 48142, "label": "SOFTWARE", "start_offset": 122, "end_offset": 134 }, { "id": 48143, "label": "TIME", "start_offset": 3, "end_offset": 16 } ]
[]
[]
14,233
Among them is an algorithm utilized by PlugX.
[ { "id": 48419, "label": "malware", "start_offset": 39, "end_offset": 44 } ]
[]
[]
4,837
Both, however, enable attacks by those who would otherwise lack the capabilities to do so.
[]
[]
[]
11,965
We received leads from Graphika that supported us in this investigation.
[]
[]
[]
13,747
During our investigation, we noticed that the value "OracleOciLib" was deleted from the victim's machine, as shown in Figure 2.
[]
[]
[]
1,565
Please mark, I'm not a robot!
[]
[]
[]
164
It goes after the files users are most likely to care about.
[]
[]
[]
4,481
They target a wide range of users and opportunistically take advantage of known security flaws when undertaking their campaigns.
[]
[]
[]
2,853
You can find more information on this tool here.
[]
[]
[]
4,709
And we don’t just plug security holes – we work to eliminate entire classes of threats for consumers and businesses whose work depends on the Internet.
[]
[]
[]
4,464
In 2019, we confronted the risks posed by NSO Group again, relying upon NSO Groups’s marketing information suggesting that they had a 0-day exploit for Android.
[ { "id": 50250, "label": "threat-actor", "start_offset": 72, "end_offset": 82 }, { "id": 50251, "label": "SOFTWARE", "start_offset": 152, "end_offset": 159 }, { "id": 50248, "label": "TIME", "start_offset": 3, "end_offset": 7 }, { "id": 50249, "label": "threat-actor", "start_offset": 42, "end_offset": 51 }, { "id": 50252, "label": "attack-pattern", "start_offset": 134, "end_offset": 147 } ]
[]
[]
2,514
Conti also stands out as unreliable.
[ { "id": 45557, "label": "threat-actor", "start_offset": 1, "end_offset": 6 } ]
[]
[]
3,882
A more detailed analysis of the Command-and-Control communication flow of ANEL can be found in this technical brief.
[ { "id": 49738, "label": "malware", "start_offset": 74, "end_offset": 78 } ]
[]
[]
11,144
We terminated 8 YouTube channels as part of our actions against a coordinated influence operation linked to Yemen.
[]
[]
[]
8,111
The malware retrieves a specific exploit from the C&C server depending on the DEX downloaded by the dropper.
[]
[]
[]
4,080
Upload file 2 Download file
[]
[]
[]
14,387
Mark Nunnikhoven does a great job in this post talking about lateral movement.
[ { "id": 51801, "label": "identity", "start_offset": 0, "end_offset": 16 }, { "id": 51802, "label": "attack-pattern", "start_offset": 61, "end_offset": 77 } ]
[]
[]
1,434
, soon attackers and malware authors will turn their attention to exploiting vulnerabilities surrounding Android app certificates.
[ { "id": 46766, "label": "SOFTWARE", "start_offset": 105, "end_offset": 116 } ]
[]
[]
1,137
But because the mutex name is set at compile time, the mutex itself offers a common thread between all of the samples we collected and analyzed.
[]
[]
[]
4,966
To protect our users, Google’s Threat Analysis Group (TAG) routinely hunts for 0-day vulnerabilities exploited in-the-wild.
[ { "id": 51011, "label": "identity", "start_offset": 22, "end_offset": 58 } ]
[]
[]
3,839
At that time, ChessMaster was using ANEL as a backdoor into the target system then injects code into svchost.exe, which then decrypts and activates the embedded backdoor.
[ { "id": 49694, "label": "malware", "start_offset": 14, "end_offset": 25 }, { "id": 49695, "label": "malware", "start_offset": 36, "end_offset": 40 }, { "id": 49696, "label": "FILEPATH", "start_offset": 101, "end_offset": 112 } ]
[]
[]
4,849
Since 2012, TAG has been tracking an interwoven set of Indian hack-for-hire actors, with many having previously worked for Indian offensive security providers Appin and Belltrox.
[ { "id": 50814, "label": "TIME", "start_offset": 6, "end_offset": 10 }, { "id": 50815, "label": "location", "start_offset": 55, "end_offset": 61 }, { "id": 50816, "label": "attack-pattern", "start_offset": 62, "end_offset": 75 }, { "id": 50817, "label": "location", "start_offset": 123, "end_offset": 129 }, { "id": 50818, "label": "identity", "start_offset": 159, "end_offset": 164 }, { "id": 50819, "label": "identity", "start_offset": 169, "end_offset": 177 } ]
[]
[]
12,150
We did not recover additional payloads in our environment.
[]
[]
[]
868
In early 2015, Emnisoft identified a new family of malware named PClock.
[ { "id": 46402, "label": "identity", "start_offset": 15, "end_offset": 23 }, { "id": 46405, "label": "TIME", "start_offset": 3, "end_offset": 13 }, { "id": 46403, "label": "malware", "start_offset": 65, "end_offset": 71 } ]
[]
[]
3,152
According to recent Trend Micro research, many global organizations are already struggling to securely manage their cloud assets.
[ { "id": 48270, "label": "identity", "start_offset": 20, "end_offset": 31 } ]
[]
[]
3,833
Base64 encoded ANEL downloaded by Koadic ANEL will send the infected environment’s information to the C&C server.
[ { "id": 49689, "label": "malware", "start_offset": 15, "end_offset": 19 }, { "id": 49690, "label": "malware", "start_offset": 34, "end_offset": 40 }, { "id": 49691, "label": "malware", "start_offset": 41, "end_offset": 45 }, { "id": 49692, "label": "Infrastucture", "start_offset": 102, "end_offset": 112 } ]
[ { "id": 860, "from_id": 49690, "to_id": 49689, "type": "downloads" }, { "id": 861, "from_id": 49691, "to_id": 49692, "type": "exfiltrates-to" } ]
[]
1,640
In total we’ve found 18 different applications in the Google Play store that contain the Funtasy Trojan.
[ { "id": 46863, "label": "malware", "start_offset": 90, "end_offset": 97 }, { "id": 46864, "label": "SOFTWARE", "start_offset": 55, "end_offset": 66 } ]
[ { "id": 242, "from_id": 46864, "to_id": 46863, "type": "hosts" } ]
[]
6,992
Figure 18. CapraRAT APK file drops an mp4 file The RAT also has a persistence mechanism that always keeps the app active.
[ { "id": 21897, "label": "malware", "start_offset": 16, "end_offset": 24 } ]
[]
[]
4,762
We use email authentication to protect against email spoofing, which is when email content is changed to make the message appear from someone or somewhere other than the actual source.
[]
[]
[]