id
int64
1
14.4k
text
stringlengths
3
5.01k
entities
list
relations
list
Comments
list
3,298
The command will list the installation directory of several popular instant messaging applications including WeChat, QQ, and Aliwangwang and return this information to the C&C server.
[ { "id": 48384, "label": "SOFTWARE", "start_offset": 109, "end_offset": 115 }, { "id": 48386, "label": "SOFTWARE", "start_offset": 125, "end_offset": 136 }, { "id": 48385, "label": "SOFTWARE", "start_offset": 117, "end_offset": 119 } ]
[]
[]
364
If you’ve already deployed signatures and your logs are showing attempted exploits, consider blocking or monitoring the IP addresses sending the requests.
[]
[]
[]
426
There are many kinds of coin mining software.
[]
[]
[]
1,649
Common sense is the best defense against these types of abusive programs.
[]
[]
[]
7,714
Other samples also included an Excel file attachment with malicious macros that install FlawedAmmyy, or a URL included in the email that supposedly downloads the file needed to download the malware.
[ { "id": 23970, "label": "malware", "start_offset": 88, "end_offset": 99 } ]
[]
[]
4,386
Once logged in, the tool changes the account’s language settings to English and iterates through the contents of the mailbox, individually downloading messages as .eml files and marking them unread.
[]
[]
[]
6,620
https://unit42.paloaltonetworks.com/behind-the-scenes-with-oilrig/
[]
[]
[]
5,135
"It's mine, I defend everything inside" …and realizing that this is actually how cybercriminals work.
[]
[]
[]
2,784
And while the computer is impacted like this, the attacker is earning money.
[]
[]
[]
4,892
Many YouTube creators provide an email address on their channel for business opportunities.
[]
[]
[]
7,154
New sample of Type 1 malware variant and a rootkit called Pandora found April 2020: One rootkit sample for hiding files processes, files, and services found October 2020:
[ { "id": 22365, "label": "location", "start_offset": 4, "end_offset": 10 }, { "id": 22366, "label": "location", "start_offset": 14, "end_offset": 18 }, { "id": 22367, "label": "location", "start_offset": 37, "end_offset": 40 }, { "id": 22368, "label": "attack-pattern", "start_offset": 43, "end_offset": 50 }, { "id": 22372, "label": "attack-pattern", "start_offset": 88, "end_offset": 95 }, { "id": 22373, "label": "location", "start_offset": 96, "end_offset": 102 }, { "id": 22374, "label": "location", "start_offset": 138, "end_offset": 141 } ]
[]
[]
4,234
This one is called “sysctrls” and it looks for files with the following extensions:
[]
[]
[]
6,883
The vast majority of these messages were sent to spam without any user ever seeing them, and we were able to preemptively block the domains using Safe Browsing.
[ { "id": 21523, "label": "tools", "start_offset": 4, "end_offset": 8 }, { "id": 21524, "label": "location", "start_offset": 71, "end_offset": 75 }, { "id": 21525, "label": "location", "start_offset": 83, "end_offset": 87 }, { "id": 21526, "label": "location", "start_offset": 89, "end_offset": 92 } ]
[]
[]
2,614
Lapsus$ Group has made headlines recently for high-profile attacks, with an apparent goal of gaining notoriety.
[ { "id": 47794, "label": "threat-actor", "start_offset": 1, "end_offset": 8 } ]
[]
[]
336
All of the domains currently resolve to 151.248.115.146, a Russian IP address and have WhoIs records associated with the e-mail address “ladomfichisi1987@mail.ru”.
[ { "id": 1156, "label": "IPV4", "start_offset": 41, "end_offset": 56 }, { "id": 46025, "label": "location", "start_offset": 60, "end_offset": 67 }, { "id": 44703, "label": "EMAIL", "start_offset": 138, "end_offset": 162 } ]
[ { "id": 148, "from_id": 1156, "to_id": 44703, "type": "related-to" } ]
[]
10,309
Trojan.MSIL.OCEANMAP.A
[]
[]
[]
437
And, as noted before, this happens without the user’s knowledge or consent.
[]
[]
[]
900
The malware proceeds to generate a unique key that will be used in subsequent file encryption using the following data: This data is concatenated to form a string similar to the following: Figure 5.
[]
[]
[]
8,060
Indicators from APT28 phishing campaign: service-reset-password-moderate-digital.rf[.]gd reset-service-identity-mail.42web[.]io digital-email-software.great-site[.]net Indicators from APT35 campaigns: Abused Google Properties: https://sites.google[.]com/view/ty85yt8tg8-download-rtih4ithr/ https://sites.google[.]com/view/user-id-568245/ https://sites.google[.]com/view/hhbejfdwdhwuhscbsb-xscvhdvbc/ Abused Dropbox Properties: https://www.dropbox[.]com/s/68y4vpfu8pc3imf/Iraq&Jewish.pdf
[ { "id": 25012, "label": "threat-actor", "start_offset": 16, "end_offset": 21 }, { "id": 25013, "label": "attack-pattern", "start_offset": 22, "end_offset": 30 }, { "id": 25014, "label": "location", "start_offset": 31, "end_offset": 39 }, { "id": 25015, "label": "threat-actor", "start_offset": 185, "end_offset": 190 }, { "id": 25016, "label": "URL", "start_offset": 229, "end_offset": 255 }, { "id": 25017, "label": "location", "start_offset": 256, "end_offset": 260 }, { "id": 25018, "label": "URL", "start_offset": 292, "end_offset": 318 }, { "id": 25019, "label": "location", "start_offset": 319, "end_offset": 323 }, { "id": 25020, "label": "URL", "start_offset": 340, "end_offset": 366 }, { "id": 25021, "label": "location", "start_offset": 367, "end_offset": 371 }, { "id": 25022, "label": "malware", "start_offset": 410, "end_offset": 417 }, { "id": 25023, "label": "URL", "start_offset": 430, "end_offset": 455 } ]
[]
[]
3,327
This plug-in can inject malicious scripts into the response of the victim’s web server by leveraging the WinDivert package, which is used to sniff and manipulate the network traffic on Windows.
[ { "id": 48408, "label": "SOFTWARE", "start_offset": 105, "end_offset": 114 }, { "id": 48409, "label": "SOFTWARE", "start_offset": 185, "end_offset": 192 } ]
[]
[]
7,835
Today, Palo Alto Networks researcher Claud Xiao is delivering a presentation titled “Insecure Internal Storage in Android” at the Hacks in Taiwan Conference (HITCON). Claud is discussing techniques for accessing private data in Android’s internal storage system using the Android Debug Bridge (ADB) backup/restore functionality.
[]
[]
[]
2,592
Additional Resources
[]
[]
[]
13,170
Figure 3.
[]
[]
[]
5,909
So, take care, have a great day.
[]
[]
[]
2,441
Unit 42 first observed scanning traffic early on March 30, 2022 with HTTP requests to servers that included the test strings within the URL.
[ { "id": 47510, "label": "identity", "start_offset": 0, "end_offset": 7 }, { "id": 47511, "label": "TIME", "start_offset": 49, "end_offset": 63 } ]
[]
[]
5,115
That's not how it works at all.
[]
[]
[]
12,219
We terminated 33 YouTube channels as part of our investigation into coordinated influence operations linked to Azerbaijan.
[]
[]
[]
9,074
Trend Micro™ Deep Security™ provides virtual patching that protects endpoints from threats such as malicious redirections to malware-hosting URLs as well as those that exploit unpatched vulnerabilities.
[]
[]
[]
11,696
The lure document redirected from the phishing page that discusses Indian and Pakistani political map issues Figure 10
[ { "id": 36041, "label": "location", "start_offset": 4, "end_offset": 8 }, { "id": 36042, "label": "attack-pattern", "start_offset": 38, "end_offset": 46 }, { "id": 36043, "label": "location", "start_offset": 47, "end_offset": 51 }, { "id": 36045, "label": "location", "start_offset": 74, "end_offset": 77 } ]
[]
[]
3,674
Both groups use spear-phishing campaigns with attachments that are embedded with exploits as an entry point to the target system.
[ { "id": 49467, "label": "attack-pattern", "start_offset": 16, "end_offset": 40 } ]
[]
[]
604
But as organizations have gotten more effective at blocking malicious attachments like Hancitor, we’ve seen the attackers behind Hancitor adapt to evade detection and prevention.
[ { "id": 46198, "label": "malware", "start_offset": 130, "end_offset": 138 }, { "id": 46200, "label": "malware", "start_offset": 88, "end_offset": 96 } ]
[]
[]
6,978
In previous years, some CrimsonRAT samples were also found to be hosted on the viral91[.]xyz domain.
[]
[]
[]
78
Here are three things to watch for:
[]
[]
[]
13,083
Articles, News, Reports
[]
[]
[]
11,544
The group commonly uses Google or OWA password reset lures to steal credentials from targets, often using the MailJet or SendGrid API to send phishing emails.
[ { "id": 35375, "label": "attack-pattern", "start_offset": 142, "end_offset": 150 } ]
[]
[]
5,121
Not even misinformation, just storytelling that tries to make it far more dramatic than it is.
[]
[]
[]
9,004
Indicators of Compromise (IOCs)
[]
[]
[]
7,890
What a difference a year makes in the threat environment.
[]
[]
[]
3,290
The malware uses a number of methods to execute the shell command or script.
[]
[]
[]
7,139
Infection Vector
[ { "id": 22318, "label": "tools", "start_offset": 10, "end_offset": 16 } ]
[]
[]
4,704
TAG actively monitors threat actors and the evolution of their tactics and techniques.
[ { "id": 50592, "label": "identity", "start_offset": 0, "end_offset": 3 } ]
[]
[]
251
In particular, fake donation websites mimicking popular websites can be misleading, as described earlier.
[ { "id": 45948, "label": "attack-pattern", "start_offset": 38, "end_offset": 64 }, { "id": 45947, "label": "attack-pattern", "start_offset": 15, "end_offset": 37 } ]
[]
[]
10,838
It then creates a zip file with the name <uniqueId>.zip (note that the unique ID is not a real device ID, the malware just calculates a custom unique ID based on the device ID value), and writes the files into the compressed file.
[ { "id": 33061, "label": "location", "start_offset": 90, "end_offset": 94 }, { "id": 33062, "label": "identity", "start_offset": 118, "end_offset": 122 }, { "id": 33063, "label": "location", "start_offset": 185, "end_offset": 188 } ]
[]
[]
311
The first step is identifying them in your network.
[]
[]
[]
4,074
Figure 4.
[]
[]
[]
8,108
After downloading the extra DEX file from the C&C server, the second-layer droppers invoke extra code to download, install, and launch the callCam app on the device.
[ { "id": 25120, "label": "location", "start_offset": 124, "end_offset": 127 }, { "id": 25121, "label": "malware", "start_offset": 139, "end_offset": 146 } ]
[]
[]
4,486
These vendors operate with deep technical expertise to develop and operationalize exploits.
[]
[]
[]
8,283
This information was exceptionally useful, as it allowed us to find multiple Facebook accounts controlled by the threat actor.
[]
[]
[]
11,706
These two samples appear to be debug versions as they have no activities or any other component except Metasploit.
[ { "id": 36082, "label": "malware", "start_offset": 103, "end_offset": 113 } ]
[]
[]
5,181
We studied six widely used DDS implementations, chosen based on executions’ number of users and customers in the critical sectors globally.
[]
[]
[]
11,226
POST http://{C2}/?Key={GUID}&Crc={Identifier} { "appName": "Gmail Downloader", "targetname": "{Email}", "HostName": "REDACTED", "srcUserIP": "REDACTED", "actionType": "First", "timeOccurrence": "05/01/2022 05:50:31 PM", "OS": "REDACTED", "OSVersion": "REDACTED", "SystemModel": "REDACTED", "SystemType": "REDACTED", "srcName": "REDACTED", "srcOrgName": "REDACTED" }
[ { "id": 34327, "label": "location", "start_offset": 0, "end_offset": 4 }, { "id": 34328, "label": "URL", "start_offset": 5, "end_offset": 44 }, { "id": 34330, "label": "TIME", "start_offset": 206, "end_offset": 217 } ]
[]
[]
12,648
Txt
[]
[]
[]
3,643
But those out there who are in positions that might make them a high value target do need to be concerned about this.
[]
[]
[]
14,228
Figure 5: GitHub account hosting an HTML page used for C&C communication
[ { "id": 48414, "label": "SOFTWARE", "start_offset": 10, "end_offset": 17 } ]
[]
[]
2,948
Meanwhile, see our full research blog for full details on how attackers are distributing and using XMRig to generate Monero. Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!
[ { "id": 48104, "label": "tools", "start_offset": 100, "end_offset": 105 } ]
[]
[]
3,891
Organizations must also identify which systems were affected and immediately isolate them and triage the impacted systems for restorations and recovery.
[]
[]
[]
1,212
After an SMS is received, these receivers and observers will check the originating number and/or message body, and block the SMS by some policies (Figure 3 and Figure 4).
[]
[]
[]
5,123
We know this time and time again—yes a bunch of nation-state stuff does happen but the vast majority of you are unaffected by it same with there's a massive amount of script-kiddie just sort of scanning random people with random tools that are just seeing what they can get away with that and if you have solid, automated defenses that doesn't really impact you.
[]
[]
[]
6,204
Figure 8.
[]
[]
[]
11,940
We terminated 123 YouTube channels as part of our investigation into coordinated influence operations linked to Russia.
[]
[]
[]
7,588
NSIS Installer sections
[ { "id": 23651, "label": "malware", "start_offset": 0, "end_offset": 4 } ]
[]
[]
600
The attackers behind Hancitor aren’t the first to time their spam attacks like this, but it is an effective tactic to try and increase their chances of success, especially when combined with the other innovation that we’ve seen.
[ { "id": 44791, "label": "malware", "start_offset": 22, "end_offset": 30 }, { "id": 44792, "label": "attack-pattern", "start_offset": 62, "end_offset": 74 } ]
[ { "id": 23, "from_id": 44791, "to_id": 44792, "type": "uses" } ]
[]
7,165
We updated it again at 4:30 PM to add a link to IssueMakersLab's website and to add new IoC information.
[ { "id": 22409, "label": "TIME", "start_offset": 23, "end_offset": 30 }, { "id": 22411, "label": "location", "start_offset": 73, "end_offset": 76 } ]
[]
[]
6,399
Coincidentally, recent attempts to browse the textile manufacturer’s website result in a 500 internal server error message.
[]
[]
[]
14,174
The Director of National Intelligence Avril Haines said “Nevertheless, our analysts assess that Putin is unlikely to be deterred by such setbacks and instead may escalate, essentially doubling down.”
[ { "id": 48219, "label": "identity", "start_offset": 4, "end_offset": 50 }, { "id": 48220, "label": "identity", "start_offset": 96, "end_offset": 102 } ]
[]
[]
3,840
This initial version of ANEL had a hardcoded version labeled “5.0.0 beta1” that contained incomplete code.
[ { "id": 11641, "label": "malware", "start_offset": 24, "end_offset": 28 } ]
[]
[]
1,467
Table 1 If one app is signed using the publicly known private keys, it is easy for other apps on the same device to replace this vulnerable app with another APK file, silently with no user knowledge or interaction.
[]
[]
[]
14,143
This is somewhat surprising, considering Operation Earth Kitsune’s espionage tools were entirely fresh-developed.
[ { "id": 48206, "label": "campaign", "start_offset": 41, "end_offset": 66 } ]
[]
[]
14,135
Mattermost server activity.
[ { "id": 48197, "label": "Infrastucture", "start_offset": 0, "end_offset": 17 } ]
[]
[]
1,039
Through the types of accounts advertised on Taobao, an attacker can steal a student or staff account, assume their identity, and gain unauthorized access to standard university resources.
[ { "id": 46531, "label": "SOFTWARE", "start_offset": 43, "end_offset": 50 } ]
[]
[]
5,307
The OpenSSL library is then initialized, and the core component proceeds to initialize the hard-coded modules.
[ { "id": 51360, "label": "SOFTWARE", "start_offset": 4, "end_offset": 11 } ]
[]
[]
1,557
Additionally, this attack technique is not exclusive to the Sofacy Group.
[ { "id": 45056, "label": "threat-actor", "start_offset": 61, "end_offset": 73 } ]
[]
[]
14,109
While malware authors can fake this, useful information can still be gleaned with enough samples.
[]
[]
[]
6,508
Decoding this script reveals that it contains a backdoor:
[]
[]
[]
1,316
Upon execution, the malware will install itself as a service with the following parameters: It may also set the following registry key for persistence:
[]
[]
[]
14,294
This happens when the data is uploaded with the hidden iframe found in the bottom right part of the page (underlined in red).
[]
[]
[]
8,301
In December 2021, TAG discovered a novel Charming Kitten tool, named HYPERSCRAPE, used to steal user data from Gmail, Yahoo!, and Microsoft Outlook accounts.
[ { "id": 25593, "label": "threat-actor", "start_offset": 41, "end_offset": 56 }, { "id": 25594, "label": "location", "start_offset": 57, "end_offset": 61 }, { "id": 25598, "label": "location", "start_offset": 126, "end_offset": 129 } ]
[]
[]
13,157
The group then targets potentially unsecured related organizations that could serve as jumping-off points for attacks.
[]
[]
[]
9,400
Indicators of Compromise (IoCs) SHA-256 Package name Label 0c4b08bec1251b1ebc715a7ef1a712cdcb4d37ce0093d88f7fa73b0e05bf7b0e com.sas.gplayservices.accesibility GSERVICES 38acf26161a2c6429ee40d9b70d8419a9bd00eaa8740d221f943cea3229372dd com.sas.gservices.accesibility GSERVICES 3bf85d0aff5ddc0c57e43b879631ee692d98d01f5c964336471f1cdfe0d291f8 com.example.rat rat 7cb0eb93de496e2141b6e0541465ca71a84063867381085692885c75aa59cb1b com.pdf.searcher.dd Pdf Searcher 8ad18bd8f5d2f1fd9e00211170e8a540ddf7f51618588fab31b4ddd2b34b75e1 com.pdfd.researcher.resaq_ver1 Caller c8e1a702a27309c22728792c64aad4abc14ec2bfad1b30a4f27b8ebc6bcc68ff com.sas.gservices.accesibility GSERVICES C&C servers 3.95.71.123:3000 18.206.105.66:3000 40.114.109.69:3000 52.21.5.241:2000 Phishing domain http://gooogle[.]press/ MITRE ATT&CK Techniques Tactic Technique ID Description Initial Access Masquerade as Legitimate Application T1444 Used to masquerade as a legitimate chat app Persistence Abuse Device Administrator Access to Prevent Removal T1401
[ { "id": 28935, "label": "SHA1", "start_offset": 60, "end_offset": 124 }, { "id": 28936, "label": "SHA1", "start_offset": 170, "end_offset": 234 }, { "id": 28937, "label": "SHA2", "start_offset": 276, "end_offset": 340 }, { "id": 28938, "label": "SHA2", "start_offset": 361, "end_offset": 425 }, { "id": 28940, "label": "SHA1", "start_offset": 459, "end_offset": 523 }, { "id": 28941, "label": "MD5", "start_offset": 562, "end_offset": 626 }, { "id": 28942, "label": "attack-pattern", "start_offset": 759, "end_offset": 767 }, { "id": 28943, "label": "URL", "start_offset": 776, "end_offset": 799 }, { "id": 28944, "label": "location", "start_offset": 953, "end_offset": 957 }, { "id": 28945, "label": "attack-pattern", "start_offset": 974, "end_offset": 1026 } ]
[]
[]
4,457
We are joined in this effort by many other security teams at Google, including Project Zero, our team of security researchers at Google who study zero-day vulnerabilities in the hardware and software systems that are depended upon by users around the world.
[ { "id": 50233, "label": "identity", "start_offset": 61, "end_offset": 67 }, { "id": 50234, "label": "identity", "start_offset": 79, "end_offset": 91 }, { "id": 50235, "label": "identity", "start_offset": 129, "end_offset": 135 } ]
[]
[]
9,872
For the full technical analyses of all the malware, techniques, tools, MITRE ATT&CK techniques and indicators of compromise (IoCs) we found in this campaign, download the research brief, “Operation ENDTRADE: TICK’s Multi-Stage Backdoors for Attacking Industries and Stealing Classified Data”. Tags Malware | APT & Targeted Attacks | Endpoints | Research |
[ { "id": 30096, "label": "location", "start_offset": 95, "end_offset": 98 }, { "id": 30097, "label": "location", "start_offset": 148, "end_offset": 156 }, { "id": 30098, "label": "threat-actor", "start_offset": 208, "end_offset": 212 }, { "id": 30099, "label": "location", "start_offset": 262, "end_offset": 265 }, { "id": 30100, "label": "location", "start_offset": 319, "end_offset": 322 } ]
[]
[]
5,120
So there is an overwhelming amount of sort of information or misinformation.
[]
[]
[]
1,224
More specifically, the code was separated into two parts.
[]
[]
[]
1,935
We’ve summarized all the mentioned findings in the table below.
[]
[]
[]
9,060
While we do not have any knowledge of who the actual Lazarus attackers are, the data collected from the backend systems gives us some insights into the internet usage patterns of systems likely owned by Lazarus group members.
[ { "id": 27976, "label": "malware", "start_offset": 53, "end_offset": 60 }, { "id": 27977, "label": "location", "start_offset": 71, "end_offset": 74 }, { "id": 27978, "label": "location", "start_offset": 187, "end_offset": 193 } ]
[]
[]
539
Since ransomware threat actors have had years to evolve their techniques, there are now several different ways for attackers to receive payments and provide the "service" they claim to offer.
[]
[]
[]
14,389
Endpoint security needs to step outside the endpoint silo to keep step with advanced attackers.
[]
[]
[]
4,655
GET http://{C2}/Index.php?vubc={identity} HTTP/1.1
[ { "id": 14119, "label": "URL", "start_offset": 4, "end_offset": 40 } ]
[]
[]
121
The cloud is only one aspect of our full 1H 2021 report.
[ { "id": 45839, "label": "TIME", "start_offset": 41, "end_offset": 48 } ]
[]
[]
5,588
How to protect NAS devices
[]
[]
[]
1,142
The author simply rolled around a bit more.
[]
[]
[]
9,743
Figure 1.
[]
[]
[]
10,426
TROJ_HTV.ZJGD-A Downloads and executes TeamViewer C&C 185[.]70[.]186[.]145
[ { "id": 31693, "label": "location", "start_offset": 26, "end_offset": 29 }, { "id": 31694, "label": "malware", "start_offset": 39, "end_offset": 49 }, { "id": 31695, "label": "IPV4", "start_offset": 56, "end_offset": 76 } ]
[]
[]
11,945
We terminated 2 YouTube channels as part of our investigation into coordinated influence operations linked to Moldova.
[]
[]
[]
13,099
As an associate member of the consortium, Trend Micro will now be able to participate in technical and strategic projects and help to shape the ROS-I roadmap.
[]
[]
[]
13,619
Oplib.dll side-loading
[ { "id": 51708, "label": "FILEPATH", "start_offset": 0, "end_offset": 9 } ]
[]
[]
2,113
Situation Overview
[]
[]
[]
14,381
EDR is an example of how stealthy or evasive attackers can be better uncovered than with traditional endpoint protection.
[]
[]
[]
10,258
installing decrypt.exe – 661d4a0d877bac9b813769a85c01bce274a77b29ccbd4b71e5b92df3c425b93b gdrive.exe – cbd9cb7b69f864ce8bae983ececb7cf8627f9c17fdaba74bd39baa5cdf605f79 3fd45b9b33ff5b6363ba0013178572723b0a912deb8235a951aa3f0aa3142509 installing decrypt.exe – 661d4a0d877bac9b813769a85c01bce274a77b29ccbd4b71e5b92df3c425b93b gdrive.exe – 2060f1e108f5feb5790320c38931e3dc6c7224edf925bf6f1840351578bbf9cc Decoy File
[ { "id": 31353, "label": "SHA1", "start_offset": 26, "end_offset": 90 }, { "id": 31354, "label": "SHA2", "start_offset": 104, "end_offset": 168 }, { "id": 31355, "label": "SHA2", "start_offset": 170, "end_offset": 234 }, { "id": 31356, "label": "SHA2", "start_offset": 261, "end_offset": 325 }, { "id": 31357, "label": "SHA1", "start_offset": 339, "end_offset": 403 }, { "id": 31358, "label": "location", "start_offset": 405, "end_offset": 410 } ]
[]
[]
2,473
The lack of webshell functionality suggests that this is likely uploaded by scanners attempting to discover servers vulnerable to SpringShell.
[ { "id": 47545, "label": "attack-pattern", "start_offset": 12, "end_offset": 20 }, { "id": 47546, "label": "vulnerability", "start_offset": 130, "end_offset": 141 } ]
[]
[]