id
int64 1
14.4k
| text
stringlengths 3
5.01k
| entities
list | relations
list | Comments
list |
---|---|---|---|---|
1,657 | Today we have released a tool that decrypts NetWire traffic and outputs any commands issued by the attacker. | [
{
"id": 4924,
"label": "malware",
"start_offset": 44,
"end_offset": 51
}
] | [] | [] |
14,068 | What got our attention is that the samples were renamed to be similar to the naming convention of Windows update files (i.e., “Windows-KB275122-x86.exe”). | [
{
"id": 47264,
"label": "FILEPATH",
"start_offset": 131,
"end_offset": 155
}
] | [] | [] |
8,158 | ELF AndroidOS_MtkSu.A 441d98dff3919ed24af7699be658d06ae8dfd6a12e4129a385754e6218bc24fa ELF AndroidOS_BinderExp.A ac82f7e4831907972465477eebafc5a488c6bb4d460575cd3889226c390ef8d5 ELF AndroidOS_BinderExp.A ee679afb897213a3fd09be43806a7e5263563e86ad255fd500562918205226b8 ELF AndroidOS_BinderExp.A 135cb239966835fefbb346165b140f584848c00c4b6a724ce122de7d999a3251 ELF | [
{
"id": 25244,
"label": "MD5",
"start_offset": 22,
"end_offset": 86
},
{
"id": 25245,
"label": "SHA1",
"start_offset": 113,
"end_offset": 177
},
{
"id": 25246,
"label": "SHA1",
"start_offset": 204,
"end_offset": 268
},
{
"id": 25247,
"label": "SHA1",
"start_offset": 295,
"end_offset": 359
}
] | [] | [] |
5,512 | However, this incident has repercussions way beyond the UK airline and its customers. | [] | [] | [] |
1,251 | used the AutoFocus threat intelligence service to identify a series of phishing attacks against Japanese organizations. | [
{
"id": 46627,
"label": "SOFTWARE",
"start_offset": 9,
"end_offset": 18
},
{
"id": 44949,
"label": "identity",
"start_offset": 96,
"end_offset": 118
},
{
"id": 44950,
"label": "attack-pattern",
"start_offset": 71,
"end_offset": 87
}
] | [] | [] |
9,822 | DATPER’s new mutex with separate parameters down_new | [
{
"id": 29952,
"label": "malware",
"start_offset": 0,
"end_offset": 6
},
{
"id": 29953,
"label": "malware",
"start_offset": 44,
"end_offset": 52
}
] | [] | [] |
153 | Most importantly, because the ransomware is executing with the compromised user’s privileges, any file the legitimate, now-compromised user has access to, including network shares and backups, is fair game for the ransomware. | [
{
"id": 44607,
"label": "attack-pattern",
"start_offset": 63,
"end_offset": 92
}
] | [] | [] |
7,461 | These are known rogue applications of Pawn Storm that have been used in credential phishing attacks against high profile users (variants of these names are likely to have been used by Pawn Storm as well): Google Defender Google Email Protection Google Scanner Delivery Service (Yahoo) McAfee Email protection (Yahoo) For more information about Pawn Storm, check out From Espionage to Cyber Propaganda: Pawn Storm's Activities over the Past Two Years. | [
{
"id": 23190,
"label": "location",
"start_offset": 6,
"end_offset": 9
},
{
"id": 23191,
"label": "malware",
"start_offset": 16,
"end_offset": 21
},
{
"id": 23192,
"label": "threat-actor",
"start_offset": 38,
"end_offset": 48
},
{
"id": 23193,
"label": "attack-pattern",
"start_offset": 83,
"end_offset": 91
},
{
"id": 23194,
"label": "location",
"start_offset": 152,
"end_offset": 155
},
{
"id": 23195,
"label": "location",
"start_offset": 156,
"end_offset": 162
},
{
"id": 23196,
"label": "threat-actor",
"start_offset": 184,
"end_offset": 194
},
{
"id": 23197,
"label": "location",
"start_offset": 235,
"end_offset": 245
},
{
"id": 23198,
"label": "identity",
"start_offset": 286,
"end_offset": 292
},
{
"id": 23199,
"label": "location",
"start_offset": 299,
"end_offset": 309
},
{
"id": 23201,
"label": "threat-actor",
"start_offset": 348,
"end_offset": 358
},
{
"id": 23202,
"label": "location",
"start_offset": 360,
"end_offset": 365
},
{
"id": 23204,
"label": "threat-actor",
"start_offset": 406,
"end_offset": 416
}
] | [] | [] |
5,441 | Tags APT & Targeted Attacks | IoT | Research | Articles, News, Reports | [] | [] | [] |
3,627 | Instead of using generalized themes or lures, spear phishing uses themes or lures that are in some way relevant or appropriate for the target recipient. | [
{
"id": 49411,
"label": "attack-pattern",
"start_offset": 46,
"end_offset": 60
}
] | [] | [] |
5,666 | The following image shows a webpage mimicking a software crack download which delivers a variant of Glupteba to users instead of the promised software. | [
{
"id": 17455,
"label": "malware",
"start_offset": 100,
"end_offset": 108
}
] | [] | [] |
4,263 | On the left, Confucius code, on the right, Patchwork’s code | [
{
"id": 50058,
"label": "threat-actor",
"start_offset": 13,
"end_offset": 22
},
{
"id": 50059,
"label": "threat-actor",
"start_offset": 43,
"end_offset": 52
}
] | [] | [] |
11,370 | We’ll also continue to apply those findings internally to improve the safety and security of our products so we can effectively combat threats and protect users who rely on our services. | [
{
"id": 34696,
"label": "tools",
"start_offset": 70,
"end_offset": 76
},
{
"id": 34697,
"label": "location",
"start_offset": 77,
"end_offset": 80
},
{
"id": 34698,
"label": "location",
"start_offset": 81,
"end_offset": 89
},
{
"id": 34699,
"label": "location",
"start_offset": 112,
"end_offset": 115
},
{
"id": 34700,
"label": "location",
"start_offset": 143,
"end_offset": 146
}
] | [] | [] |
4,401 | Again, the response is expected to be "OK". | [] | [] | [] |
3,019 | 10. Use Smart Speakers Smartly: | [] | [] | [] |
10,366 | The first step is to be able to identify phishing attacks and distinguish legitimate emails from malicious ones. | [
{
"id": 31562,
"label": "attack-pattern",
"start_offset": 41,
"end_offset": 49
},
{
"id": 31563,
"label": "location",
"start_offset": 58,
"end_offset": 61
}
] | [] | [] |
835 | Kernel APC attacks occur in a way that increases the “stealth” factor and makes standard detection and prevention very difficult. | [
{
"id": 46386,
"label": "attack-pattern",
"start_offset": 1,
"end_offset": 19
}
] | [] | [] |
10,622 | In December 2017, TAG discovered a series of campaigns from Sandworm attempting to deploy Android malware. | [] | [] | [] |
3,287 | It takes a screenshot of the victim’s screen with the tool and saves it as a PNG file with a random number as the file name. | [] | [] | [] |
3,950 | It allows an attacker to see all Windows sessions and can execute arbitrary commands on the session via session id. | [] | [] | [] |
5,846 | Think about something like that happening. | [] | [] | [] |
1,258 | This included altering the icon of the executable to appear as other file types (Figure 1) as well as decoy documents to trick users into thinking they had opened a legitimate file. | [] | [] | [] |
8,289 | This threat actor first published stolen documents in April 2016. | [] | [] | [] |
4,764 | By default, Gmail displays warnings and moves untrustworthy emails to the user’s spam folder. | [
{
"id": 50670,
"label": "SOFTWARE",
"start_offset": 12,
"end_offset": 17
}
] | [] | [] |
79 | 1. A marked increase in the price of Monero or other cryptocurrencies will draw even more attackers into this business. | [
{
"id": 45829,
"label": "SOFTWARE",
"start_offset": 37,
"end_offset": 43
}
] | [] | [] |
3,562 | Figure 2. | [] | [] | [] |
4,413 | It does the following for each email found: The emails are saved with ".eml" extensions under the Downloads directory with the filename corresponding to the subject. | [] | [] | [] |
5,902 | Ed: | [] | [] | [] |
3,757 | It has the ability to further make HTTP requests based on commands received. | [] | [] | [] |
2,634 | While Conti was recognized as being the most prolific ransomware deployed in 2021 per our 2022 Unit 42 Ransomware Threat Report, LockBit 2.0 is the most impactful and widely deployed ransomware variant we have observed in all ransomware breaches during the first quarter of 2022, considering both leak site data and data from cases handled by Unit 42 incident responders. | [
{
"id": 45633,
"label": "TIME",
"start_offset": 77,
"end_offset": 81
},
{
"id": 45632,
"label": "identity",
"start_offset": 95,
"end_offset": 102
},
{
"id": 45635,
"label": "TIME",
"start_offset": 90,
"end_offset": 94
},
{
"id": 45636,
"label": "malware",
"start_offset": 129,
"end_offset": 140
},
{
"id": 45637,
"label": "TIME",
"start_offset": 257,
"end_offset": 278
},
{
"id": 45631,
"label": "threat-actor",
"start_offset": 6,
"end_offset": 11
},
{
"id": 45638,
"label": "identity",
"start_offset": 343,
"end_offset": 350
}
] | [] | [] |
11,660 | Figure 3. | [] | [] | [] |
9,256 | Critical evaluation categories include: Analytic Coverage: Enriched detections to deliver greater context to investigation by adding ATT&CK TTP mapping, improving triage for analysts. | [] | [] | [] |
11,543 | Amnesty International has also reported on their campaigns. | [] | [] | [] |
672 | Despite these measures, users still choose to open these files and enable their content, thus allowing macros to continue be a common attack vector – both in wide and simple attacks to deliver ransomware such as Emotet, as well as for sophisticated attacks like this Sofacy campaign. | [
{
"id": 2220,
"label": "malware",
"start_offset": 212,
"end_offset": 218
},
{
"id": 44819,
"label": "campaign",
"start_offset": 267,
"end_offset": 282
},
{
"id": 44821,
"label": "threat-actor",
"start_offset": 267,
"end_offset": 273
}
] | [
{
"id": 175,
"from_id": 44819,
"to_id": 44821,
"type": "related-to"
}
] | [] |
6,947 | Figure 8. | [] | [] | [] |
5,544 | So how do you know that the site you’re entering card data into is safe? | [] | [] | [] |
6,139 | Eight AV vendors correctly identified it. | [] | [] | [] |
3,109 | In terms of the severity of the vulnerabilities themselves: they are important, but not critical. | [] | [] | [] |
4,434 | jsonInfo.Data = this.OperationObject.GetUsername(); pipeCommunication.Write(jsonInfo); break; } } | [] | [] | [] |
4,677 | GeckoHtmlElement > ( | [] | [] | [] |
2,635 | According to data analysis of ransomware groups’ dark web leak sites, LockBit 2.0 was the most impactful RaaS for five consecutive months. | [
{
"id": 47816,
"label": "malware",
"start_offset": 71,
"end_offset": 82
}
] | [] | [] |
8,610 | Bytes: 30 0D 06 09 2A 86 48 86 F7 0D 01 01 0B 00 00 | [] | [] | [] |
11,211 | GET http://{C2}/Index.php?vubc={identity} HTTP/1.1 | [
{
"id": 34303,
"label": "URL",
"start_offset": 4,
"end_offset": 40
}
] | [] | [] |
3,403 | 8b5d4840bbdce0798950cd5584e3d4564581a7698bc6cfb2892c97b826129cec Silverlight_ins.exe | [
{
"id": 10270,
"label": "SHA2",
"start_offset": 1,
"end_offset": 65
},
{
"id": 49071,
"label": "FILEPATH",
"start_offset": 67,
"end_offset": 86
}
] | [
{
"id": 649,
"from_id": 10270,
"to_id": 49071,
"type": "duplicate-of"
}
] | [] |
1,134 | Though the fact that the malware writer obviously named the mutex by rolling their face on the keyboard made it obvious before we'd done any further analysis that we’d found a unique identifier within the binaries. | [] | [] | [] |
3,487 | Reverse analysis of Protux’s latest version also allowed us to determine how to decrypt the C&C information, which is done in the Python code shown below. | [
{
"id": 10590,
"label": "malware",
"start_offset": 20,
"end_offset": 26
}
] | [] | [] |
2,310 | The parameter rid is a global counter which records the number of exploitation attempts. | [] | [] | [] |
5,078 | It is possible that other North Korean government-backed attackers have access to the same exploit kit. | [
{
"id": 51187,
"label": "threat-actor",
"start_offset": 26,
"end_offset": 66
}
] | [] | [] |
13,067 | While cyberattacks that threaten smart factories cannot be ignored, it can be a struggle to decipher which security method is sufficient within your organization’s specific system, as well as where to start. | [] | [] | [] |
599 | Figure 1: Timeline of Hancitor campaign activity since January 2017. | [
{
"id": 46193,
"label": "malware",
"start_offset": 23,
"end_offset": 31
},
{
"id": 46194,
"label": "TIME",
"start_offset": 56,
"end_offset": 68
}
] | [] | [] |
3,849 | The fourth version of ANEL (5.2.0 rev1) changes both the export function in the expanded main ANEL DLL and uses a different C&C server. | [
{
"id": 49698,
"label": "malware",
"start_offset": 22,
"end_offset": 39
}
] | [] | [] |
2,608 | Credentials are harvested from dumps, purchased or spear-phished. | [] | [] | [] |
6,101 | The attacks against Palo Alto Networks customers, which took place between early June to early July, also targeted users in East Asia; in this case an international law firm’s regional office and a major university. | [
{
"id": 18866,
"label": "location",
"start_offset": 143,
"end_offset": 147
},
{
"id": 18867,
"label": "location",
"start_offset": 151,
"end_offset": 164
},
{
"id": 18868,
"label": "location",
"start_offset": 165,
"end_offset": 168
},
{
"id": 18869,
"label": "tools",
"start_offset": 185,
"end_offset": 191
},
{
"id": 18870,
"label": "location",
"start_offset": 192,
"end_offset": 195
},
{
"id": 18871,
"label": "location",
"start_offset": 198,
"end_offset": 203
},
{
"id": 18872,
"label": "location",
"start_offset": 204,
"end_offset": 214
}
] | [] | [] |
49 | This new way to generate profit had two major advantages over account takeovers: | [] | [] | [] |
8,522 | The phishing typically started with a customized email introducing the company and its products. | [
{
"id": 26318,
"label": "attack-pattern",
"start_offset": 4,
"end_offset": 12
},
{
"id": 26319,
"label": "location",
"start_offset": 79,
"end_offset": 82
}
] | [] | [] |
5,536 | And they’re developing new tools and tactics all the time to improve their monetization. | [] | [] | [] |
326 | Our WildFire analysis platform has picked up 84 CryptoWall 2.0 variants since September 30, delivered primarily through e-mail attachments but also through malicious PDFs and web exploit kits. | [
{
"id": 1120,
"label": "tools",
"start_offset": 4,
"end_offset": 12
},
{
"id": 46018,
"label": "malware",
"start_offset": 48,
"end_offset": 62
},
{
"id": 46019,
"label": "TIME",
"start_offset": 78,
"end_offset": 90
}
] | [] | [] |
5,233 | What can AnubisSpy do? | [
{
"id": 16085,
"label": "malware",
"start_offset": 10,
"end_offset": 19
}
] | [] | [] |
4,292 | Threat actors are notorious for creating stealthy malware that can bypass superficial network monitoring. | [] | [] | [] |
3,545 | Blackgear’s campaigns also use email as an entry point, which is why it’s important to secure the email gateway. | [
{
"id": 49322,
"label": "threat-actor",
"start_offset": 0,
"end_offset": 9
},
{
"id": 49323,
"label": "attack-pattern",
"start_offset": 27,
"end_offset": 54
}
] | [
{
"id": 783,
"from_id": 49322,
"to_id": 49323,
"type": "uses"
}
] | [] |
13,624 | Figure 15. XOR routine and svchost injection | [] | [] | [] |
10,336 | Figure 2. | [] | [] | [] |
13,588 | The blog post describes a web shell with two components — a PHP script and an HTML uploading file — however, the second one is not needed as the proper POST request can be created with any custom or third-party tool (e.g., Fiddler). Figure 6. | [
{
"id": 51676,
"label": "tools",
"start_offset": 26,
"end_offset": 35
},
{
"id": 51677,
"label": "tools",
"start_offset": 60,
"end_offset": 71
},
{
"id": 51678,
"label": "tools",
"start_offset": 78,
"end_offset": 97
}
] | [
{
"id": 1130,
"from_id": 51676,
"to_id": 51677,
"type": "consists-of"
},
{
"id": 1131,
"from_id": 51676,
"to_id": 51678,
"type": "consists-of"
}
] | [] |
6,510 | The PowerShell backdoor has the following capabilities. | [
{
"id": 20166,
"label": "attack-pattern",
"start_offset": 4,
"end_offset": 14
}
] | [] | [] |
9,766 | When we analyzed further, we saw that the communication methods use files named <md5(hard disk serial number)> with various extensions depending on the purpose of the file. | [] | [] | [] |
1,447 | It also allows multiple apps with the same certificate, if using signature-based permission checks, to expose functionality and exchange code and data amongst themselves. | [] | [] | [] |
2,599 | It is likely that some victims are not the intended end-target, but are rather breached in order to gain access to their customers, or for example, to help bypass multi-factor authentication (MFA). | [] | [] | [] |
9,635 | theme0.xml is a Mach-O 32-bit executable with a 0xFEEDFACE signature that is also the dropper of the backdoor, which is the final payload. | [
{
"id": 29505,
"label": "location",
"start_offset": 16,
"end_offset": 20
},
{
"id": 29506,
"label": "identity",
"start_offset": 26,
"end_offset": 29
}
] | [] | [] |
9,623 | The attackers behind OSX_OCEANLOTUS.D target MacOS computers which have the Perl programming language installed. | [
{
"id": 29488,
"label": "malware",
"start_offset": 21,
"end_offset": 37
},
{
"id": 29489,
"label": "location",
"start_offset": 38,
"end_offset": 44
},
{
"id": 29490,
"label": "location",
"start_offset": 76,
"end_offset": 80
}
] | [] | [] |
13,806 | First, it builds the hooked function and writes the function at the end of “ntdll.dll”. | [] | [] | [] |
1,041 | Fortunately, a number of the institutions impacted by this activity have already implemented two-factor authentication for high-value resources, reducing the risk of the latter. | [] | [] | [] |
7,360 | They attempted to evade traffic inspection by encoding the code for the scanner with base-64. | [] | [] | [] |
11,840 | As shown in the following screenshot, the signature is considered to be valid by the Windows operating system. | [] | [] | [] |
4,689 | pipeCommunication.Close(); } | [] | [] | [] |
4,602 | Security as code allows DevOps teams to bake security into their build pipeline to release continuously and frequently, so developers like yourself, can keep working without disruption from security. | [] | [] | [] |
8,970 | The HyperBro malware family has been around since 2017 and has been extensively analyzed. | [
{
"id": 27711,
"label": "malware",
"start_offset": 4,
"end_offset": 12
},
{
"id": 27713,
"label": "location",
"start_offset": 55,
"end_offset": 58
}
] | [] | [] |
6,154 | The attack flow of Earth Wendigo’s operation Figure 2. | [
{
"id": 19040,
"label": "threat-actor",
"start_offset": 19,
"end_offset": 32
}
] | [] | [] |
5,702 | In addition to spear phishing emails, Earth Lusca also made use of watering hole websites — they either compromised websites of their targets or set up fake web pages copied from legitimate websites and then injected malicious JavaScript code inside them. | [
{
"id": 17588,
"label": "attack-pattern",
"start_offset": 15,
"end_offset": 29
},
{
"id": 17590,
"label": "location",
"start_offset": 55,
"end_offset": 59
},
{
"id": 17591,
"label": "location",
"start_offset": 76,
"end_offset": 80
},
{
"id": 17592,
"label": "location",
"start_offset": 199,
"end_offset": 202
},
{
"id": 17593,
"label": "location",
"start_offset": 250,
"end_offset": 254
}
] | [] | [] |
1,900 | It is important to note however, that not all C&C websites for Urpage advertise malicious applications. | [
{
"id": 5595,
"label": "threat-actor",
"start_offset": 63,
"end_offset": 69
}
] | [] | [] |
10,591 | The vulnerabilities underlying these exploits included: Internet Explorer - CVE-2018-8653 Internet Explorer - CVE-2019-0676 Chrome - CVE-2019-5786 Windows Kernel - CVE-2019-0808 Internet Explorer - CVE-2019-1367 Internet Explorer - CVE-2019-1429 | [] | [] | [] |
13,026 | However, for the first time, TAG has observed COLDRIVER campaigns targeting the military of multiple Eastern European countries, as well as a NATO Centre of Excellence. | [
{
"id": 48860,
"label": "campaign",
"start_offset": 46,
"end_offset": 56
},
{
"id": 48861,
"label": "identity",
"start_offset": 80,
"end_offset": 89
},
{
"id": 48862,
"label": "identity",
"start_offset": 142,
"end_offset": 167
},
{
"id": 48863,
"label": "location",
"start_offset": 101,
"end_offset": 117
}
] | [
{
"id": 482,
"from_id": 48861,
"to_id": 48863,
"type": "located-at"
},
{
"id": 484,
"from_id": 48860,
"to_id": 48862,
"type": "targets"
},
{
"id": 483,
"from_id": 48860,
"to_id": 48861,
"type": "targets"
}
] | [] |
13,561 | As previously mentioned, Water Pamola sent online shopping orders appended with a malicious XSS script to attack e-commerce administrators. | [
{
"id": 51638,
"label": "campaign",
"start_offset": 25,
"end_offset": 37
},
{
"id": 51639,
"label": "attack-pattern",
"start_offset": 92,
"end_offset": 95
},
{
"id": 51640,
"label": "identity",
"start_offset": 113,
"end_offset": 138
}
] | [
{
"id": 1119,
"from_id": 51638,
"to_id": 51640,
"type": "targets"
},
{
"id": 1120,
"from_id": 51638,
"to_id": 51639,
"type": "uses"
}
] | [] |
269 | These efforts have enabled us to make near-daily updates to our platform to ensure our customers have the best protection possible. | [] | [] | [] |
10,675 | CVE-2017-7659 7.5 mod_http2 | [] | [] | [] |
5,973 | TAG would like to thank the Yahoo! Paranoids Advanced Cyber Threats Team for their collaboration in this investigation. | [] | [] | [] |
9,664 | Meanwhile, runHandle is responsible for the backdoor capabilities. | [] | [] | [] |
14,165 | Trend Micro has been innovating for 30 years and our breadth of security products allows us to successfully build an XDR solution. | [] | [] | [] |
14,042 | Here is a translation of the relevant section: “Well, in the end, I modified the project configuration file as below, but it doesn't seem like best practice. | [] | [] | [] |
3,089 | Comprehensive details on both of these are available at https://meltdownattack.com. | [
{
"id": 9439,
"label": "URL",
"start_offset": 57,
"end_offset": 83
}
] | [] | [] |
4,493 | These vendors are enabling the proliferation of dangerous hacking tools, arming nation state actors that would not otherwise be able to develop these capabilities in-house. | [] | [] | [] |
6,364 | When finished, the code performs the following. | [] | [] | [] |
4,644 | HYPERSCRAPE won't run unless in a directory with other file dependencies. | [
{
"id": 50566,
"label": "malware",
"start_offset": 0,
"end_offset": 11
}
] | [] | [] |
8,302 | The attacker runs HYPERSCRAPE on their own machine to download victims’ inboxes using previously acquired credentials. | [] | [] | [] |
3,267 | The victim ID will be stored in the “bps.key” file. | [
{
"id": 48371,
"label": "FILEPATH",
"start_offset": 37,
"end_offset": 44
}
] | [] | [] |
3,980 | Software supply chains are an integral part of a large information and communications technology (ICT) supply chain framework. | [] | [] | [] |
10,039 | File tree of the extracted TAR file Folder a | [] | [] | [] |
1,891 | This time, we look into Urpage to gain a deeper insight into the way several threat actors' actions intersect. | [
{
"id": 47024,
"label": "threat-actor",
"start_offset": 24,
"end_offset": 30
}
] | [] | [] |
7,785 | The other three parameters do not appear to be used at all, as reported in the install log (by adding /L*V "C:\example.log" parameter). | [] | [] | [] |
3,422 | Backdoor.Win64.BIOPASS.A e52ea54cfe3afd93a53e368245c5630425e326291bf1b2599b75dbf8e75b7aeb flashplayer_install_cn.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A f1ad25b594a855a3c9af75c5da74b44d900f6fbb655033f9a98a956292011c8e Silverlight.exe | [
{
"id": 10311,
"label": "malware",
"start_offset": 121,
"end_offset": 132
},
{
"id": 10310,
"label": "SHA2",
"start_offset": 27,
"end_offset": 91
},
{
"id": 10312,
"label": "SHA2",
"start_offset": 167,
"end_offset": 231
},
{
"id": 49110,
"label": "malware",
"start_offset": 1,
"end_offset": 25
},
{
"id": 49111,
"label": "malware",
"start_offset": 141,
"end_offset": 165
},
{
"id": 49112,
"label": "FILEPATH",
"start_offset": 93,
"end_offset": 119
},
{
"id": 49113,
"label": "FILEPATH",
"start_offset": 233,
"end_offset": 248
}
] | [
{
"id": 716,
"from_id": 49113,
"to_id": 49111,
"type": "indicates"
},
{
"id": 717,
"from_id": 10311,
"to_id": 49111,
"type": "duplicate-of"
},
{
"id": 713,
"from_id": 49112,
"to_id": 10310,
"type": "duplicate-of"
},
{
"id": 714,
"from_id": 49113,
"to_id": 10312,
"type": "duplicate-of"
},
{
"id": 715,
"from_id": 10312,
"to_id": 49111,
"type": "indicates"
},
{
"id": 718,
"from_id": 49112,
"to_id": 49110,
"type": "indicates"
},
{
"id": 719,
"from_id": 10310,
"to_id": 49110,
"type": "indicates"
}
] | [] |
6,885 | We’ve also seen attackers try to trick people into downloading malware by impersonating health organizations: Generally, we’re not seeing an overall rise in phishing attacks by government-backed groups; this is just a change in tactics. | [
{
"id": 21529,
"label": "location",
"start_offset": 141,
"end_offset": 148
},
{
"id": 21530,
"label": "attack-pattern",
"start_offset": 157,
"end_offset": 165
},
{
"id": 21531,
"label": "identity",
"start_offset": 211,
"end_offset": 215
}
] | [] | [] |