Type stringclasses 5 values | Text stringlengths 1 70 | Fixed Text stringlengths 2 70 | Score float64 0.23 1 | Original Sentence ID int64 0 6.64k | Original Sentence stringlengths 6 383 | Decoded Sentence stringlengths 5 382 | __index_level_0__ int64 0 13.8k |
|---|---|---|---|---|---|---|---|
Malware | Poison I | Poison Ivy, | 0.509997 | 0 | The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . | The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors. | 0 |
Vulnerability | vy | Ivy, | 0.472894 | 0 | The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . | The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors. | 1 |
Malware | B-Hack | B-Hack | 0.639093 | 4 | In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . | In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television. | 2 |
Malware | B | B-Hack | 0.639087 | 5 | In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . | In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television. | 3 |
Indicator | I- | I-Hack | 0.479866 | 5 | In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . | In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television. | 6 |
Organization | ck | B-Hack | 0.582262 | 6 | In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- . | In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-. | 10 |
Indicator | I | I-. | 0.596476 | 6 | In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- . | In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-. | 11 |
Malware | LOWBALL | LOWBALL | 0.977435 | 8 | Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer . | Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer. | 12 |
System | Dropbox | Dropbox | 0.963676 | 8 | Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer . | Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer. | 13 |
Indicator | upload.bat | upload.bat | 0.935677 | 8 | Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer . | Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer. | 14 |
Malware | B-Hack | B-Hack | 0.829692 | 9 | We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command . | We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command. | 15 |
Malware | BUBBLEWRAP | BUBBLEWRAP | 0.931767 | 9 | We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command . | We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command. | 16 |
Indicator | Backdoor.APT.FakeWinHTTPHelper | Backdoor.APT.FakeWinHTTPHelper) | 0.757575 | 9 | We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command . | We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command. | 17 |
System | Dropbox | Dropbox | 0.983996 | 9 | We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command . | We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command. | 18 |
System | B | B-Hack | 0.908694 | 10 | We have previously observed the B-Hack I-Hack use BUBBLEWRAP . | We have previously observed the B-Hack I-Hack use BUBBLEWRAP. | 19 |
System | Ha | I-Hack | 0.81714 | 10 | We have previously observed the B-Hack I-Hack use BUBBLEWRAP . | We have previously observed the B-Hack I-Hack use BUBBLEWRAP. | 21 |
System | BUBBLEWRAP | BUBBLEWRAP. | 0.755166 | 10 | We have previously observed the B-Hack I-Hack use BUBBLEWRAP . | We have previously observed the B-Hack I-Hack use BUBBLEWRAP. | 22 |
Malware | LOWBALL | LOWBALL | 0.991841 | 11 | The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets . | The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets. | 23 |
Malware | BUBBLEWRAP | BUBBLEWRAP | 0.973986 | 11 | The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets . | The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets. | 24 |
Malware | Ha | B-Hack, | 0.569378 | 16 | The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . | The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I-. | 25 |
System | B-Hack I | B-Hack I-Hack, | 0.527285 | 17 | The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . | The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I-. | 26 |
System | Ha | I-Hack, | 0.503507 | 17 | The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . | The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I-. | 27 |
Organization | FireEye | FireEye | 0.968587 | 18 | In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations . | In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations. | 28 |
Organization | B-Hack | B-Hack | 0.882944 | 18 | In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations . | In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations. | 29 |
Malware | Poison Ivy RAT | Poison Ivy RAT | 0.902927 | 18 | In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations . | In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations. | 30 |
Organization | B-Hack | B-Hack | 0.708643 | 19 | In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . | In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-. | 31 |
System | Malaysia Airlines Flight MH370 | Malaysia Airlines Flight MH370 | 0.927813 | 19 | In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . | In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-. | 32 |
Organization | B-Hack | B-Hack | 0.708643 | 20 | In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . | In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-. | 33 |
System | Malaysia Airlines Flight MH370 | Malaysia Airlines Flight MH370 | 0.927813 | 20 | In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . | In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-. | 34 |
Organization | FireEye | FireEye, | 0.960378 | 21 | According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . | According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. | 35 |
Organization | B-Hack | B-Hack | 0.774017 | 21 | According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . | According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. | 36 |
Vulnerability | Microsoft Office vulnerabilities | Microsoft Office vulnerabilities | 0.887841 | 21 | According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . | According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. | 37 |
Malware | LOWBALL | LOWBALL. | 0.973628 | 21 | According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . | According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. | 38 |
Organization | FireEye | FireEye, | 0.960378 | 22 | According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . | According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. | 39 |
Organization | B-Hack | B-Hack | 0.774017 | 22 | According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . | According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. | 40 |
Vulnerability | Microsoft Office vulnerabilities | Microsoft Office vulnerabilities | 0.887841 | 22 | According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . | According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. | 41 |
Malware | LOWBALL | LOWBALL. | 0.973628 | 22 | According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . | According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. | 42 |
Organization | B-Hack | B-Hack's | 0.852179 | 23 | The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . | The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP. | 43 |
System | Dropbox | Dropbox | 0.981636 | 23 | The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . | The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP. | 44 |
Malware | BUBBLEWRAP | BUBBLEWRAP. | 0.949787 | 23 | The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . | The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP. | 45 |
Malware | B | B-Hack | 0.31581 | 24 | Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . | Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. | 46 |
Indicator | -Hack I-Ha | B-Hack I-Hack | 0.715077 | 24 | Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . | Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. | 47 |
Indicator | - I | B- I-, | 0.751592 | 24 | Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . | Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. | 48 |
Malware | B-Hack | B-Hack | 0.774287 | 25 | Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . | Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. | 49 |
Organization | FireEye | FireEye | 0.974297 | 26 | This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . | This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose. | 50 |
Malware | MH370 | MH370-themed | 0.912999 | 26 | This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . | This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose. | 55 |
Malware | Ha | B-Hack | 0.823753 | 26 | This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . | This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose. | 58 |
Malware | Ha | I-Hack | 0.470358 | 26 | This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . | This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose. | 59 |
Malware | Poison Ivy RAT | Poison Ivy RAT | 0.969063 | 27 | The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . | The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. | 60 |
System | HTTP | WinHTTPHelper | 0.87924 | 27 | The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . | The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. | 62 |
Malware | Poison Ivy RAT | Poison Ivy RAT | 0.969063 | 28 | The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . | The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. | 64 |
System | HTTP | WinHTTPHelper | 0.87924 | 28 | The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . | The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. | 66 |
Organization | FireEye | FireEye | 0.991103 | 29 | FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper . | FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper. | 68 |
Malware | B-Hack I | B-Hack I-Hack's | 0.83878 | 29 | FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper . | FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper. | 69 |
Malware | Hack | I-Hack's | 0.882142 | 29 | FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper . | FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper. | 70 |
Malware | Poison Ivy | Poison Ivy: | 0.696365 | 29 | FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper . | FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper. | 71 |
Organization | B- | B-Hack | 0.562104 | 30 | The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . | The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March. | 72 |
Malware | B-Hack | B-Hack | 0.884683 | 31 | Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . | Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack. | 75 |
Malware | Ha | I-Hack | 0.603568 | 31 | Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . | Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack. | 77 |
Malware | Ha | I-Hack. | 0.496734 | 31 | Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . | Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack. | 78 |
Organization | FireEye | FireEye | 0.988711 | 32 | FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . | FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I-. | 79 |
Malware | B-Hack | B-Hack's | 0.782438 | 32 | FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . | FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I-. | 80 |
Malware | B-Hack | B-Hack | 0.751828 | 32 | FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . | FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I-. | 81 |
Organization | B-Hack | B-Hack | 0.790838 | 33 | The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai . | The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai. | 82 |
Organization | ck | B-Hack | 0.749665 | 34 | These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . | These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are. | 90 |
Organization | B-Hack | B-Hack | 0.803005 | 35 | B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . | B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently. | 91 |
Malware | BISCUIT | BISCUIT | 0.825483 | 35 | B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . | B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently. | 92 |
Malware | B-Hack | B-Hack | 0.963537 | 36 | While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . | While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT. | 93 |
Malware | Poison Ivy | Poison Ivy | 0.755209 | 36 | While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . | While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT. | 94 |
Malware | Gh0st RAT | Gh0st RAT. | 0.804621 | 36 | While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . | While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT. | 95 |
Malware | B-Hack I-Hack I-Hack | B-Hack I-Hack I-Hack, | 0.935567 | 37 | Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . | Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack. | 96 |
Malware | B-Hack I-Hack I-Hack | B-Hack I-Hack I-Hack | 0.948526 | 37 | Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . | Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack. | 97 |
System | B | B-Hack. | 0.510743 | 37 | Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . | Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack. | 98 |
Malware | B | B-Hack | 0.935241 | 38 | B-Hack were a highly prolific B-Hack I-Hack operating out of China . | B-Hack were a highly prolific B-Hack I-Hack operating out of China. | 101 |
Malware | Ha | I-Hack | 0.573745 | 38 | B-Hack were a highly prolific B-Hack I-Hack operating out of China . | B-Hack were a highly prolific B-Hack I-Hack operating out of China. | 103 |
Malware | B-Hack | B-Hack | 0.861203 | 39 | B-Hack is a China-based B-Hack I-Hack, active since mid-2006 . | B-Hack is a China-based B-Hack I-Hack, active since mid-2006. | 104 |
System | Ha | I-Hack, | 0.462108 | 39 | B-Hack is a China-based B-Hack I-Hack, active since mid-2006 . | B-Hack is a China-based B-Hack I-Hack, active since mid-2006. | 107 |
Malware | B-Hack | B-Hack's | 0.829563 | 40 | B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . | B-Hack's targets are consistent with larger People's Republic of China (PRC) goals. | 108 |
Organization | Arbor | Arbor | 0.830469 | 41 | Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . | Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE. | 109 |
Organization | FireEye | FireEye | 0.98843 | 41 | Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . | Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE. | 110 |
Malware | B-Hack | B-Hack | 0.841121 | 41 | Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . | Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE. | 111 |
Organization | B-Hack | B-Hack. | 0.484352 | 42 | However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack . | However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack. | 112 |
Organization | FireEye | FireEye | 0.98697 | 43 | From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . | From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server. | 113 |
Malware | B-Hack | B-Hack | 0.67049 | 43 | From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . | From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server. | 114 |
Malware | RIPTIDE | RIPTIDE, | 0.883725 | 43 | From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . | From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server. | 115 |
Malware | B-Hack | B-Hack | 0.894439 | 44 | Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . | Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158. | 116 |
System | Microsoft Word (.doc | Microsoft Word (.doc) | 0.813062 | 44 | Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . | Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158. | 117 |
Vulnerability | CVE-2012-0158 | CVE-2012-0158. | 0.659746 | 44 | Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . | Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158. | 118 |
Organization | FireEye | FireEye | 0.985713 | 45 | FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . | FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset. | 119 |
Malware | RIPTIDE | RIPTIDE | 0.876574 | 45 | FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . | FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset. | 120 |
Malware | HIGHTIDE | HIGHTIDE | 0.846049 | 45 | FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . | FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset. | 121 |
Organization | B-Hack | B-Hack | 0.917771 | 45 | FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . | FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset. | 122 |
Malware | Poison Ivy | Poison Ivy, | 0.788956 | 46 | They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . | They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors. | 123 |
Malware | B-Hack I-Hack I-Hack | B-Hack I-Hack I-Hack, | 0.560256 | 47 | A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . | A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B-. | 124 |
Organization | FireEye | FireEye | 0.974788 | 47 | A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . | A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B-. | 125 |
Malware | B-Hack | B-Hack | 0.718617 | 47 | A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . | A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B-. | 126 |
Indicator | ( | (I-Hack) | 0.370555 | 47 | A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . | A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B-. | 127 |
Malware | I-Hack) I-Hack | (I-Hack) I-Hack | 0.633782 | 47 | A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . | A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B-. | 128 |
Malware | B-Hack | B-Hack, | 0.72013 | 47 | A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . | A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B-. | 129 |
Indicator | B- I- I- I- | B- I- I- I- | 0.93668 | 49 | About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families . | About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families. | 130 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.