id
int64
1
14.4k
text
stringlengths
3
5.01k
entities
list
relations
list
Comments
list
1,657
Today we have released a tool that decrypts NetWire traffic and outputs any commands issued by the attacker.
[ { "id": 4924, "label": "malware", "start_offset": 44, "end_offset": 51 } ]
[]
[]
14,068
What got our attention is that the samples were renamed to be similar to the naming convention of Windows update files (i.e., “Windows-KB275122-x86.exe”).
[ { "id": 47264, "label": "FILEPATH", "start_offset": 131, "end_offset": 155 } ]
[]
[]
8,158
ELF AndroidOS_MtkSu.A 441d98dff3919ed24af7699be658d06ae8dfd6a12e4129a385754e6218bc24fa ELF AndroidOS_BinderExp.A ac82f7e4831907972465477eebafc5a488c6bb4d460575cd3889226c390ef8d5 ELF AndroidOS_BinderExp.A ee679afb897213a3fd09be43806a7e5263563e86ad255fd500562918205226b8 ELF AndroidOS_BinderExp.A 135cb239966835fefbb346165b140f584848c00c4b6a724ce122de7d999a3251 ELF
[ { "id": 25244, "label": "MD5", "start_offset": 22, "end_offset": 86 }, { "id": 25245, "label": "SHA1", "start_offset": 113, "end_offset": 177 }, { "id": 25246, "label": "SHA1", "start_offset": 204, "end_offset": 268 }, { "id": 25247, "label": "SHA1", "start_offset": 295, "end_offset": 359 } ]
[]
[]
5,512
However, this incident has repercussions way beyond the UK airline and its customers.
[]
[]
[]
1,251
used the AutoFocus threat intelligence service to identify a series of phishing attacks against Japanese organizations.
[ { "id": 46627, "label": "SOFTWARE", "start_offset": 9, "end_offset": 18 }, { "id": 44949, "label": "identity", "start_offset": 96, "end_offset": 118 }, { "id": 44950, "label": "attack-pattern", "start_offset": 71, "end_offset": 87 } ]
[]
[]
9,822
DATPER’s new mutex with separate parameters down_new
[ { "id": 29952, "label": "malware", "start_offset": 0, "end_offset": 6 }, { "id": 29953, "label": "malware", "start_offset": 44, "end_offset": 52 } ]
[]
[]
153
Most importantly, because the ransomware is executing with the compromised user’s privileges, any file the legitimate, now-compromised user has access to, including network shares and backups, is fair game for the ransomware.
[ { "id": 44607, "label": "attack-pattern", "start_offset": 63, "end_offset": 92 } ]
[]
[]
7,461
These are known rogue applications of Pawn Storm that have been used in credential phishing attacks against high profile users (variants of these names are likely to have been used by Pawn Storm as well): Google Defender Google Email Protection Google Scanner Delivery Service (Yahoo) McAfee Email protection (Yahoo) For more information about Pawn Storm, check out From Espionage to Cyber Propaganda: Pawn Storm's Activities over the Past Two Years.
[ { "id": 23190, "label": "location", "start_offset": 6, "end_offset": 9 }, { "id": 23191, "label": "malware", "start_offset": 16, "end_offset": 21 }, { "id": 23192, "label": "threat-actor", "start_offset": 38, "end_offset": 48 }, { "id": 23193, "label": "attack-pattern", "start_offset": 83, "end_offset": 91 }, { "id": 23194, "label": "location", "start_offset": 152, "end_offset": 155 }, { "id": 23195, "label": "location", "start_offset": 156, "end_offset": 162 }, { "id": 23196, "label": "threat-actor", "start_offset": 184, "end_offset": 194 }, { "id": 23197, "label": "location", "start_offset": 235, "end_offset": 245 }, { "id": 23198, "label": "identity", "start_offset": 286, "end_offset": 292 }, { "id": 23199, "label": "location", "start_offset": 299, "end_offset": 309 }, { "id": 23201, "label": "threat-actor", "start_offset": 348, "end_offset": 358 }, { "id": 23202, "label": "location", "start_offset": 360, "end_offset": 365 }, { "id": 23204, "label": "threat-actor", "start_offset": 406, "end_offset": 416 } ]
[]
[]
5,441
Tags APT & Targeted Attacks | IoT | Research | Articles, News, Reports
[]
[]
[]
3,627
Instead of using generalized themes or lures, spear phishing uses themes or lures that are in some way relevant or appropriate for the target recipient.
[ { "id": 49411, "label": "attack-pattern", "start_offset": 46, "end_offset": 60 } ]
[]
[]
5,666
The following image shows a webpage mimicking a software crack download which delivers a variant of Glupteba to users instead of the promised software.
[ { "id": 17455, "label": "malware", "start_offset": 100, "end_offset": 108 } ]
[]
[]
4,263
On the left, Confucius code, on the right, Patchwork’s code
[ { "id": 50058, "label": "threat-actor", "start_offset": 13, "end_offset": 22 }, { "id": 50059, "label": "threat-actor", "start_offset": 43, "end_offset": 52 } ]
[]
[]
11,370
We’ll also continue to apply those findings internally to improve the safety and security of our products so we can effectively combat threats and protect users who rely on our services.
[ { "id": 34696, "label": "tools", "start_offset": 70, "end_offset": 76 }, { "id": 34697, "label": "location", "start_offset": 77, "end_offset": 80 }, { "id": 34698, "label": "location", "start_offset": 81, "end_offset": 89 }, { "id": 34699, "label": "location", "start_offset": 112, "end_offset": 115 }, { "id": 34700, "label": "location", "start_offset": 143, "end_offset": 146 } ]
[]
[]
4,401
Again, the response is expected to be "OK".
[]
[]
[]
3,019
10. Use Smart Speakers Smartly:
[]
[]
[]
10,366
The first step is to be able to identify phishing attacks and distinguish legitimate emails from malicious ones.
[ { "id": 31562, "label": "attack-pattern", "start_offset": 41, "end_offset": 49 }, { "id": 31563, "label": "location", "start_offset": 58, "end_offset": 61 } ]
[]
[]
835
Kernel APC attacks occur in a way that increases the “stealth” factor and makes standard detection and prevention very difficult.
[ { "id": 46386, "label": "attack-pattern", "start_offset": 1, "end_offset": 19 } ]
[]
[]
10,622
In December 2017, TAG discovered a series of campaigns from Sandworm attempting to deploy Android malware.
[]
[]
[]
3,287
It takes a screenshot of the victim’s screen with the tool and saves it as a PNG file with a random number as the file name.
[]
[]
[]
3,950
It allows an attacker to see all Windows sessions and can execute arbitrary commands on the session via session id.
[]
[]
[]
5,846
Think about something like that happening.
[]
[]
[]
1,258
This included altering the icon of the executable to appear as other file types (Figure 1) as well as decoy documents to trick users into thinking they had opened a legitimate file.
[]
[]
[]
8,289
This threat actor first published stolen documents in April 2016.
[]
[]
[]
4,764
By default, Gmail displays warnings and moves untrustworthy emails to the user’s spam folder.
[ { "id": 50670, "label": "SOFTWARE", "start_offset": 12, "end_offset": 17 } ]
[]
[]
79
1. A marked increase in the price of Monero or other cryptocurrencies will draw even more attackers into this business.
[ { "id": 45829, "label": "SOFTWARE", "start_offset": 37, "end_offset": 43 } ]
[]
[]
3,562
Figure 2.
[]
[]
[]
4,413
It does the following for each email found: The emails are saved with ".eml" extensions under the Downloads directory with the filename corresponding to the subject.
[]
[]
[]
5,902
Ed:
[]
[]
[]
3,757
It has the ability to further make HTTP requests based on commands received.
[]
[]
[]
2,634
While Conti was recognized as being the most prolific ransomware deployed in 2021 per our 2022 Unit 42 Ransomware Threat Report, LockBit 2.0 is the most impactful and widely deployed ransomware variant we have observed in all ransomware breaches during the first quarter of 2022, considering both leak site data and data from cases handled by Unit 42 incident responders.
[ { "id": 45633, "label": "TIME", "start_offset": 77, "end_offset": 81 }, { "id": 45632, "label": "identity", "start_offset": 95, "end_offset": 102 }, { "id": 45635, "label": "TIME", "start_offset": 90, "end_offset": 94 }, { "id": 45636, "label": "malware", "start_offset": 129, "end_offset": 140 }, { "id": 45637, "label": "TIME", "start_offset": 257, "end_offset": 278 }, { "id": 45631, "label": "threat-actor", "start_offset": 6, "end_offset": 11 }, { "id": 45638, "label": "identity", "start_offset": 343, "end_offset": 350 } ]
[]
[]
11,660
Figure 3.
[]
[]
[]
9,256
Critical evaluation categories include: Analytic Coverage: Enriched detections to deliver greater context to investigation by adding ATT&CK TTP mapping, improving triage for analysts.
[]
[]
[]
11,543
Amnesty International has also reported on their campaigns.
[]
[]
[]
672
Despite these measures, users still choose to open these files and enable their content, thus allowing macros to continue be a common attack vector – both in wide and simple attacks to deliver ransomware such as Emotet, as well as for sophisticated attacks like this Sofacy campaign.
[ { "id": 2220, "label": "malware", "start_offset": 212, "end_offset": 218 }, { "id": 44819, "label": "campaign", "start_offset": 267, "end_offset": 282 }, { "id": 44821, "label": "threat-actor", "start_offset": 267, "end_offset": 273 } ]
[ { "id": 175, "from_id": 44819, "to_id": 44821, "type": "related-to" } ]
[]
6,947
Figure 8.
[]
[]
[]
5,544
So how do you know that the site you’re entering card data into is safe?
[]
[]
[]
6,139
Eight AV vendors correctly identified it.
[]
[]
[]
3,109
In terms of the severity of the vulnerabilities themselves: they are important, but not critical.
[]
[]
[]
4,434
jsonInfo.Data = this.OperationObject.GetUsername(); pipeCommunication.Write(jsonInfo); break; } }
[]
[]
[]
4,677
GeckoHtmlElement > (
[]
[]
[]
2,635
According to data analysis of ransomware groups’ dark web leak sites, LockBit 2.0 was the most impactful RaaS for five consecutive months.
[ { "id": 47816, "label": "malware", "start_offset": 71, "end_offset": 82 } ]
[]
[]
8,610
Bytes: 30 0D 06 09 2A 86 48 86 F7 0D 01 01 0B 00 00
[]
[]
[]
11,211
GET http://{C2}/Index.php?vubc={identity} HTTP/1.1
[ { "id": 34303, "label": "URL", "start_offset": 4, "end_offset": 40 } ]
[]
[]
3,403
8b5d4840bbdce0798950cd5584e3d4564581a7698bc6cfb2892c97b826129cec Silverlight_ins.exe
[ { "id": 10270, "label": "SHA2", "start_offset": 1, "end_offset": 65 }, { "id": 49071, "label": "FILEPATH", "start_offset": 67, "end_offset": 86 } ]
[ { "id": 649, "from_id": 10270, "to_id": 49071, "type": "duplicate-of" } ]
[]
1,134
Though the fact that the malware writer obviously named the mutex by rolling their face on the keyboard made it obvious before we'd done any further analysis that we’d found a unique identifier within the binaries.
[]
[]
[]
3,487
Reverse analysis of Protux’s latest version also allowed us to determine how to decrypt the C&C information, which is done in the Python code shown below.
[ { "id": 10590, "label": "malware", "start_offset": 20, "end_offset": 26 } ]
[]
[]
2,310
The parameter rid is a global counter which records the number of exploitation attempts.
[]
[]
[]
5,078
It is possible that other North Korean government-backed attackers have access to the same exploit kit.
[ { "id": 51187, "label": "threat-actor", "start_offset": 26, "end_offset": 66 } ]
[]
[]
13,067
While cyberattacks that threaten smart factories cannot be ignored, it can be a struggle to decipher which security method is sufficient within your organization’s specific system, as well as where to start.
[]
[]
[]
599
Figure 1: Timeline of Hancitor campaign activity since January 2017.
[ { "id": 46193, "label": "malware", "start_offset": 23, "end_offset": 31 }, { "id": 46194, "label": "TIME", "start_offset": 56, "end_offset": 68 } ]
[]
[]
3,849
The fourth version of ANEL (5.2.0 rev1) changes both the export function in the expanded main ANEL DLL and uses a different C&C server.
[ { "id": 49698, "label": "malware", "start_offset": 22, "end_offset": 39 } ]
[]
[]
2,608
Credentials are harvested from dumps, purchased or spear-phished.
[]
[]
[]
6,101
The attacks against Palo Alto Networks customers, which took place between early June to early July, also targeted users in East Asia; in this case an international law firm’s regional office and a major university.
[ { "id": 18866, "label": "location", "start_offset": 143, "end_offset": 147 }, { "id": 18867, "label": "location", "start_offset": 151, "end_offset": 164 }, { "id": 18868, "label": "location", "start_offset": 165, "end_offset": 168 }, { "id": 18869, "label": "tools", "start_offset": 185, "end_offset": 191 }, { "id": 18870, "label": "location", "start_offset": 192, "end_offset": 195 }, { "id": 18871, "label": "location", "start_offset": 198, "end_offset": 203 }, { "id": 18872, "label": "location", "start_offset": 204, "end_offset": 214 } ]
[]
[]
49
This new way to generate profit had two major advantages over account takeovers:
[]
[]
[]
8,522
The phishing typically started with a customized email introducing the company and its products.
[ { "id": 26318, "label": "attack-pattern", "start_offset": 4, "end_offset": 12 }, { "id": 26319, "label": "location", "start_offset": 79, "end_offset": 82 } ]
[]
[]
5,536
And they’re developing new tools and tactics all the time to improve their monetization.
[]
[]
[]
326
Our WildFire analysis platform has picked up 84 CryptoWall 2.0 variants since September 30, delivered primarily through e-mail attachments but also through malicious PDFs and web exploit kits.
[ { "id": 1120, "label": "tools", "start_offset": 4, "end_offset": 12 }, { "id": 46018, "label": "malware", "start_offset": 48, "end_offset": 62 }, { "id": 46019, "label": "TIME", "start_offset": 78, "end_offset": 90 } ]
[]
[]
5,233
What can AnubisSpy do?
[ { "id": 16085, "label": "malware", "start_offset": 10, "end_offset": 19 } ]
[]
[]
4,292
Threat actors are notorious for creating stealthy malware that can bypass superficial network monitoring.
[]
[]
[]
3,545
Blackgear’s campaigns also use email as an entry point, which is why it’s important to secure the email gateway.
[ { "id": 49322, "label": "threat-actor", "start_offset": 0, "end_offset": 9 }, { "id": 49323, "label": "attack-pattern", "start_offset": 27, "end_offset": 54 } ]
[ { "id": 783, "from_id": 49322, "to_id": 49323, "type": "uses" } ]
[]
13,624
Figure 15. XOR routine and svchost injection
[]
[]
[]
10,336
Figure 2.
[]
[]
[]
13,588
The blog post describes a web shell with two components — a PHP script and an HTML uploading file — however, the second one is not needed as the proper POST request can be created with any custom or third-party tool (e.g., Fiddler). Figure 6.
[ { "id": 51676, "label": "tools", "start_offset": 26, "end_offset": 35 }, { "id": 51677, "label": "tools", "start_offset": 60, "end_offset": 71 }, { "id": 51678, "label": "tools", "start_offset": 78, "end_offset": 97 } ]
[ { "id": 1130, "from_id": 51676, "to_id": 51677, "type": "consists-of" }, { "id": 1131, "from_id": 51676, "to_id": 51678, "type": "consists-of" } ]
[]
6,510
The PowerShell backdoor has the following capabilities.
[ { "id": 20166, "label": "attack-pattern", "start_offset": 4, "end_offset": 14 } ]
[]
[]
9,766
When we analyzed further, we saw that the communication methods use files named <md5(hard disk serial number)> with various extensions depending on the purpose of the file.
[]
[]
[]
1,447
It also allows multiple apps with the same certificate, if using signature-based permission checks, to expose functionality and exchange code and data amongst themselves.
[]
[]
[]
2,599
It is likely that some victims are not the intended end-target, but are rather breached in order to gain access to their customers, or for example, to help bypass multi-factor authentication (MFA).
[]
[]
[]
9,635
theme0.xml is a Mach-O 32-bit executable with a 0xFEEDFACE signature that is also the dropper of the backdoor, which is the final payload.
[ { "id": 29505, "label": "location", "start_offset": 16, "end_offset": 20 }, { "id": 29506, "label": "identity", "start_offset": 26, "end_offset": 29 } ]
[]
[]
9,623
The attackers behind OSX_OCEANLOTUS.D target MacOS computers which have the Perl programming language installed.
[ { "id": 29488, "label": "malware", "start_offset": 21, "end_offset": 37 }, { "id": 29489, "label": "location", "start_offset": 38, "end_offset": 44 }, { "id": 29490, "label": "location", "start_offset": 76, "end_offset": 80 } ]
[]
[]
13,806
First, it builds the hooked function and writes the function at the end of “ntdll.dll”.
[]
[]
[]
1,041
Fortunately, a number of the institutions impacted by this activity have already implemented two-factor authentication for high-value resources, reducing the risk of the latter.
[]
[]
[]
7,360
They attempted to evade traffic inspection by encoding the code for the scanner with base-64.
[]
[]
[]
11,840
As shown in the following screenshot, the signature is considered to be valid by the Windows operating system.
[]
[]
[]
4,689
pipeCommunication.Close(); }
[]
[]
[]
4,602
Security as code allows DevOps teams to bake security into their build pipeline to release continuously and frequently, so developers like yourself, can keep working without disruption from security.
[]
[]
[]
8,970
The HyperBro malware family has been around since 2017 and has been extensively analyzed.
[ { "id": 27711, "label": "malware", "start_offset": 4, "end_offset": 12 }, { "id": 27713, "label": "location", "start_offset": 55, "end_offset": 58 } ]
[]
[]
6,154
The attack flow of Earth Wendigo’s operation Figure 2.
[ { "id": 19040, "label": "threat-actor", "start_offset": 19, "end_offset": 32 } ]
[]
[]
5,702
In addition to spear phishing emails, Earth Lusca also made use of watering hole websites — they either compromised websites of their targets or set up fake web pages copied from legitimate websites and then injected malicious JavaScript code inside them.
[ { "id": 17588, "label": "attack-pattern", "start_offset": 15, "end_offset": 29 }, { "id": 17590, "label": "location", "start_offset": 55, "end_offset": 59 }, { "id": 17591, "label": "location", "start_offset": 76, "end_offset": 80 }, { "id": 17592, "label": "location", "start_offset": 199, "end_offset": 202 }, { "id": 17593, "label": "location", "start_offset": 250, "end_offset": 254 } ]
[]
[]
1,900
It is important to note however, that not all C&C websites for Urpage advertise malicious applications.
[ { "id": 5595, "label": "threat-actor", "start_offset": 63, "end_offset": 69 } ]
[]
[]
10,591
The vulnerabilities underlying these exploits included: Internet Explorer - CVE-2018-8653 Internet Explorer - CVE-2019-0676 Chrome - CVE-2019-5786 Windows Kernel - CVE-2019-0808 Internet Explorer - CVE-2019-1367 Internet Explorer - CVE-2019-1429
[]
[]
[]
13,026
However, for the first time, TAG has observed COLDRIVER campaigns targeting the military of multiple Eastern European countries, as well as a NATO Centre of Excellence.
[ { "id": 48860, "label": "campaign", "start_offset": 46, "end_offset": 56 }, { "id": 48861, "label": "identity", "start_offset": 80, "end_offset": 89 }, { "id": 48862, "label": "identity", "start_offset": 142, "end_offset": 167 }, { "id": 48863, "label": "location", "start_offset": 101, "end_offset": 117 } ]
[ { "id": 482, "from_id": 48861, "to_id": 48863, "type": "located-at" }, { "id": 484, "from_id": 48860, "to_id": 48862, "type": "targets" }, { "id": 483, "from_id": 48860, "to_id": 48861, "type": "targets" } ]
[]
13,561
As previously mentioned, Water Pamola sent online shopping orders appended with a malicious XSS script to attack e-commerce administrators.
[ { "id": 51638, "label": "campaign", "start_offset": 25, "end_offset": 37 }, { "id": 51639, "label": "attack-pattern", "start_offset": 92, "end_offset": 95 }, { "id": 51640, "label": "identity", "start_offset": 113, "end_offset": 138 } ]
[ { "id": 1119, "from_id": 51638, "to_id": 51640, "type": "targets" }, { "id": 1120, "from_id": 51638, "to_id": 51639, "type": "uses" } ]
[]
269
These efforts have enabled us to make near-daily updates to our platform to ensure our customers have the best protection possible.
[]
[]
[]
10,675
CVE-2017-7659 7.5 mod_http2
[]
[]
[]
5,973
TAG would like to thank the Yahoo! Paranoids Advanced Cyber Threats Team for their collaboration in this investigation.
[]
[]
[]
9,664
Meanwhile, runHandle is responsible for the backdoor capabilities.
[]
[]
[]
14,165
Trend Micro has been innovating for 30 years and our breadth of security products allows us to successfully build an XDR solution.
[]
[]
[]
14,042
Here is a translation of the relevant section: “Well, in the end, I modified the project configuration file as below, but it doesn't seem like best practice.
[]
[]
[]
3,089
Comprehensive details on both of these are available at https://meltdownattack.com.
[ { "id": 9439, "label": "URL", "start_offset": 57, "end_offset": 83 } ]
[]
[]
4,493
These vendors are enabling the proliferation of dangerous hacking tools, arming nation state actors that would not otherwise be able to develop these capabilities in-house.
[]
[]
[]
6,364
When finished, the code performs the following.
[]
[]
[]
4,644
HYPERSCRAPE won't run unless in a directory with other file dependencies.
[ { "id": 50566, "label": "malware", "start_offset": 0, "end_offset": 11 } ]
[]
[]
8,302
The attacker runs HYPERSCRAPE on their own machine to download victims’ inboxes using previously acquired credentials.
[]
[]
[]
3,267
The victim ID will be stored in the “bps.key” file.
[ { "id": 48371, "label": "FILEPATH", "start_offset": 37, "end_offset": 44 } ]
[]
[]
3,980
Software supply chains are an integral part of a large information and communications technology (ICT) supply chain framework.
[]
[]
[]
10,039
File tree of the extracted TAR file Folder a
[]
[]
[]
1,891
This time, we look into Urpage to gain a deeper insight into the way several threat actors' actions intersect.
[ { "id": 47024, "label": "threat-actor", "start_offset": 24, "end_offset": 30 } ]
[]
[]
7,785
The other three parameters do not appear to be used at all, as reported in the install log (by adding /L*V "C:\example.log" parameter).
[]
[]
[]
3,422
Backdoor.Win64.BIOPASS.A e52ea54cfe3afd93a53e368245c5630425e326291bf1b2599b75dbf8e75b7aeb flashplayer_install_cn.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A f1ad25b594a855a3c9af75c5da74b44d900f6fbb655033f9a98a956292011c8e Silverlight.exe
[ { "id": 10311, "label": "malware", "start_offset": 121, "end_offset": 132 }, { "id": 10310, "label": "SHA2", "start_offset": 27, "end_offset": 91 }, { "id": 10312, "label": "SHA2", "start_offset": 167, "end_offset": 231 }, { "id": 49110, "label": "malware", "start_offset": 1, "end_offset": 25 }, { "id": 49111, "label": "malware", "start_offset": 141, "end_offset": 165 }, { "id": 49112, "label": "FILEPATH", "start_offset": 93, "end_offset": 119 }, { "id": 49113, "label": "FILEPATH", "start_offset": 233, "end_offset": 248 } ]
[ { "id": 716, "from_id": 49113, "to_id": 49111, "type": "indicates" }, { "id": 717, "from_id": 10311, "to_id": 49111, "type": "duplicate-of" }, { "id": 713, "from_id": 49112, "to_id": 10310, "type": "duplicate-of" }, { "id": 714, "from_id": 49113, "to_id": 10312, "type": "duplicate-of" }, { "id": 715, "from_id": 10312, "to_id": 49111, "type": "indicates" }, { "id": 718, "from_id": 49112, "to_id": 49110, "type": "indicates" }, { "id": 719, "from_id": 10310, "to_id": 49110, "type": "indicates" } ]
[]
6,885
We’ve also seen attackers try to trick people into downloading malware by impersonating health organizations: Generally, we’re not seeing an overall rise in phishing attacks by government-backed groups; this is just a change in tactics.
[ { "id": 21529, "label": "location", "start_offset": 141, "end_offset": 148 }, { "id": 21530, "label": "attack-pattern", "start_offset": 157, "end_offset": 165 }, { "id": 21531, "label": "identity", "start_offset": 211, "end_offset": 215 } ]
[]
[]