text
stringlengths 402
1.34k
|
---|
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Kaspersky believes both Shamoon and StoneDrill groups are aligned in their interests , but are two separate actors , which might also indicate two different groups working together .' [/INST] [Kaspersky:B-SecTeam, believes:O, both:O, Shamoon:B-HackOrg, and:O, StoneDrill:B-HackOrg, groups:O, are:O, aligned:O, in:O, their:O, interests:O, ,:O, but:O, are:O, two:O, separate:O, actors:O, ,:O, which:O, might:O, also:O, indicate:O, two:O, different:O, groups:O, working:O, together:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Indeed , Kaspersky started tracking the BlueNoroff actor a long time ago .' [/INST] [Indeed:O, ,:O, Kaspersky:B-SecTeam, started:O, tracking:O, the:O, BlueNoroff:B-HackOrg, actor:O, a:O, long:O, time:O, ago:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Eset has published a report on the state-sponsored Russian turla apt group .' [/INST] [Eset:B-SecTeam, has:O, published:O, a:O, report:O, on:O, the:O, state-sponsored:O, Russian:B-Area, turla:B-HackOrg, apt:O, group:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'It seems Eset has discovered and published on a new malware module created by Turla .' [/INST] [It:O, seems:O, Eset:B-SecTeam, has:O, discovered:O, and:O, published:O, on:O, a:O, new:O, malware:O, module:O, created:O, by:O, Turla:B-HackOrg, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The majority of NewsBeef targets that Kaspersky researchers have observed are located in SA .' [/INST] [The:O, majority:O, of:O, NewsBeef:B-HackOrg, targets:O, that:O, Kaspersky:B-SecTeam, researchers:O, have:O, observed:O, are:O, located:O, in:O, SA:B-Area, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'While not directly overlapping , this potential infrastructure link is interesting , as Vixen Panda has previously displayed TTPs similar to COMMENT PANDA , and has extensively targeted European entities .' [/INST] [While:O, not:O, directly:O, overlapping:O, ,:O, this:O, potential:O, infrastructure:O, link:O, is:O, interesting:O, ,:O, as:O, Vixen:B-HackOrg, Panda:I-HackOrg, has:O, previously:O, displayed:O, TTPs:O, similar:O, to:O, COMMENT:B-HackOrg, PANDA:I-HackOrg, ,:O, and:O, has:O, extensively:O, targeted:O, European:B-Area, entities:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Given the evidence outlined above , CrowdStrike attributes the PUTTER PANDA group to PLA Unit 61486 within Shanghai , China with high confidence .' [/INST] [Given:O, the:O, evidence:O, outlined:O, above:O, ,:O, CrowdStrike:B-SecTeam, attributes:O, the:O, PUTTER:B-HackOrg, PANDA:I-HackOrg, group:I-HackOrg, to:O, PLA:O, Unit:B-HackOrg, 61486:I-HackOrg, within:O, Shanghai:B-Area, ,:O, China:B-Area, with:O, high:O, confidence:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Several RATs are used by PUTTER PANDA .' [/INST] [Several:O, RATs:B-Tool, are:O, used:O, by:O, PUTTER:B-HackOrg, PANDA:I-HackOrg, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The most common of these , the 4H RAT and the 3PARA RAT , have been documented previously by CrowdStrike in previous CrowdStrike Intelligence reporting .' [/INST] [The:O, most:O, common:O, of:O, these:O, ,:O, the:O, 4H:B-Tool, RAT:I-Tool, and:O, the:O, 3PARA:B-Tool, RAT:I-Tool, ,:O, have:O, been:O, documented:O, previously:O, by:O, CrowdStrike:B-SecTeam, in:O, previous:O, CrowdStrike:B-SecTeam, Intelligence:I-SecTeam, reporting:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'This analysis will be revisited below , along with an examination of two other PUTTER PANDA tools : pngdowner and httpclient .' [/INST] [This:O, analysis:O, will:O, be:O, revisited:O, below:O, ,:O, along:O, with:O, an:O, examination:O, of:O, two:O, other:O, PUTTER:B-HackOrg, PANDA:I-HackOrg, tools:O, ::O, pngdowner:B-Tool, and:O, httpclient:B-Tool, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Other CrowdStrike reporting describes a dropper used by PUTTER PANDA to install the 4H RAT .' [/INST] [Other:O, CrowdStrike:B-SecTeam, reporting:O, describes:O, a:O, dropper:B-Tool, used:O, by:O, PUTTER:B-HackOrg, PANDA:I-HackOrg, to:O, install:O, the:O, 4H:B-Tool, RAT:I-Tool, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'This dropper uses RC4 to decrypt an embedded payload from data in an embedded resource before writing the payload to disk and executing it .' [/INST] [This:O, dropper:B-Tool, uses:O, RC4:B-Tool, to:O, decrypt:O, an:O, embedded:O, payload:O, from:O, data:O, in:O, an:O, embedded:O, resource:O, before:O, writing:O, the:O, payload:O, to:O, disk:O, and:O, executing:O, it:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'It contains a Word document in plaintext ( written to Bienvenue_a_Sahaja_Yoga_Toulouse.doc ) , along with an executable ( Update.exe ) and DLL ( McUpdate.dll ) .' [/INST] [It:O, contains:O, a:O, Word:B-SamFile, document:I-SamFile, in:O, plaintext:O, (:O, written:O, to:O, Bienvenue_a_Sahaja_Yoga_Toulouse.doc:B-SamFile, ):O, ,:O, along:O, with:O, an:O, executable:O, (:O, Update.exe:B-SamFile, ):O, and:O, DLL:O, (:O, McUpdate.dll:B-SamFile, ):O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'PUTTER PANDA are a determined adversary group who have been operating for several years , conducting intelligence-gathering operations with a significant focus on the space sector .' [/INST] [PUTTER:B-HackOrg, PANDA:I-HackOrg, are:O, a:O, determined:O, adversary:O, group:B-HackOrg, who:O, have:O, been:O, operating:O, for:O, several:O, years:O, ,:O, conducting:O, intelligence-gathering:B-Purp, operations:O, with:O, a:O, significant:O, focus:O, on:O, the:O, space:B-Org, sector:I-Org, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Research presented in this report shows that the PUTTER PANDA operators are likely members of the 12th Bureau , 3rd General Staff Department ( GSD ) of the People 's Liberation Army ( PLA ) , operating from the unit 's headquarters in Shanghai with MUCD 61486 .' [/INST] [Research:O, presented:O, in:O, this:O, report:O, shows:O, that:O, the:O, PUTTER:B-HackOrg, PANDA:I-HackOrg, operators:B-HackOrg, are:O, likely:O, members:O, of:O, the:O, 12th:O, Bureau:O, ,:O, 3rd:O, General:O, Staff:O, Department:O, (:O, GSD:O, ):O, of:O, the:O, People:B-Idus, 's:I-Idus, Liberation:I-Idus, Army:I-Idus, (:O, PLA:B-Idus, ):O, ,:O, operating:O, from:O, the:O, unit:O, 's:O, headquarters:O, in:O, Shanghai:B-Area, with:O, MUCD:B-HackOrg, 61486:I-HackOrg, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'PUTTER PANDA is likely to continue to aggressively target Western entities that hold valuable information or intellectual property relevant to these interests .' [/INST] [PUTTER:B-HackOrg, PANDA:I-HackOrg, is:O, likely:O, to:O, continue:O, to:O, aggressively:O, target:O, Western:B-Area, entities:O, that:O, hold:O, valuable:O, information:O, or:O, intellectual:B-Purp, property:I-Purp, relevant:O, to:O, these:O, interests:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Mandiant 's APT1 report was the first to change the game , and paved the way for private security companies to expose advanced threat actors en masse .' [/INST] [Mandiant:B-SecTeam, 's:O, APT1:B-HackOrg, report:O, was:O, the:O, first:O, to:O, change:O, the:O, game:O, ,:O, and:O, paved:O, the:O, way:O, for:O, private:B-Org, security:I-Org, companies:I-Org, to:O, expose:O, advanced:O, threat:B-HackOrg, actors:I-HackOrg, en:O, masse:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Mandianta 's APT1 report was the first to change the game , and paved the way for private security companies to expose advanced threat actors en masse .' [/INST] [Mandianta:B-SecTeam, 's:O, APT1:B-HackOrg, report:O, was:O, the:O, first:O, to:O, change:O, the:O, game:O, ,:O, and:O, paved:O, the:O, way:O, for:O, private:B-Org, security:I-Org, companies:I-Org, to:O, expose:O, advanced:O, threat:B-HackOrg, actors:I-HackOrg, en:O, masse:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In 2014 , our colleagues at Crowdstrike wrote an exposé about a long-standing Chinese APT threat group they self-named Putter Panda , which Mandiant / FireEye refers to as APT2 .' [/INST] [In:O, 2014:B-Time, ,:O, our:O, colleagues:O, at:O, Crowdstrike:B-SecTeam, wrote:O, an:O, exposé:O, about:O, a:O, long-standing:O, Chinese:B-Area, APT:B-HackOrg, threat:I-HackOrg, group:I-HackOrg, they:O, self-named:O, Putter:B-HackOrg, Panda:I-HackOrg, ,:O, which:O, Mandiant:B-SecTeam, /:O, FireEye:B-SecTeam, refers:O, to:O, as:O, APT2:B-HackOrg, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In 2014 , our colleagues at Crowdstrike wrote an expos about a long-standing Chinese APT threat group they self-named Putter Panda , which Mandiant / FireEye refers to as APT2 .' [/INST] [In:O, 2014:B-Time, ,:O, our:O, colleagues:O, at:O, Crowdstrike:B-SecTeam, wrote:O, an:O, expos:O, about:O, a:O, long-standing:O, Chinese:B-Area, APT:B-HackOrg, threat:I-HackOrg, group:I-HackOrg, they:O, self-named:O, Putter:B-HackOrg, Panda:I-HackOrg, ,:O, which:O, Mandiant:B-SecTeam, /:O, FireEye:B-SecTeam, refers:O, to:O, as:O, APT2:B-HackOrg, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'This threat group attacked defense contractors and aerospace companies .' [/INST] [This:O, threat:B-HackOrg, group:I-HackOrg, attacked:O, defense:B-Org, contractors:I-Org, and:O, aerospace:B-Org, companies:I-Org, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The document exploited CVE-2012-0158 and will decode and write an executable to disk upon infection .' [/INST] [The:O, document:O, exploited:O, CVE-2012-0158:B-Exp, and:O, will:O, decode:O, and:O, write:O, an:O, executable:O, to:O, disk:O, upon:O, infection:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Unit 42 believes this group is previously unidentified and therefore have we have dubbed it , RANCOR , .' [/INST] [Unit:B-SecTeam, 42:I-SecTeam, believes:O, this:O, group:B-HackOrg, is:O, previously:O, unidentified:O, and:O, therefore:O, have:O, we:O, have:O, dubbed:O, it:O, ,:O, RANCOR:B-HackOrg, ,:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The Rancor group 's attacks use two primary malware families which we describe in depth later in this blog and are naming DDKONG and PLAINTEE .' [/INST] [The:O, Rancor:B-HackOrg, group:I-HackOrg, 's:O, attacks:B-OffAct, use:O, two:O, primary:O, malware:O, families:O, which:O, we:O, describe:O, in:O, depth:O, later:O, in:O, this:O, blog:O, and:O, are:O, naming:O, DDKONG:B-Tool, and:O, PLAINTEE:B-Tool, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'We identified decoy files which indicate these attacks began with spear phishing messages but have not observed the actual messages .' [/INST] [We:O, identified:O, decoy:B-SamFile, files:I-SamFile, which:O, indicate:O, these:O, attacks:B-OffAct, began:O, with:O, spear:B-Way, phishing:I-Way, messages:I-Way, but:O, have:O, not:O, observed:O, the:O, actual:O, messages:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Based on this , we believe the Rancor attackers were targeting political entities .' [/INST] [Based:O, on:O, this:O, ,:O, we:O, believe:O, the:O, Rancor:B-HackOrg, attackers:B-HackOrg, were:O, targeting:O, political:B-Org, entities:I-Org, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Additionally , these decoy documents are hosted on legitimate websites including a government website belonging to the Cambodia Government and in at least once case , Facebook .' [/INST] [Additionally:O, ,:O, these:O, decoy:B-SamFile, documents:I-SamFile, are:O, hosted:O, on:O, legitimate:O, websites:O, including:O, a:O, government:O, website:O, belonging:O, to:O, the:O, Cambodia:B-Org, Government:I-Org, and:O, in:O, at:O, least:O, once:O, case:O, ,:O, Facebook:B-Org, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Our Investigation into both clusters further showed that they were both involved in attacks targeting organizations in South East Asia .' [/INST] [Our:O, Investigation:O, into:O, both:O, clusters:O, further:O, showed:O, that:O, they:O, were:O, both:O, involved:O, in:O, attacks:B-OffAct, targeting:O, organizations:O, in:O, South:B-Area, East:I-Area, Asia:I-Area, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'We observed DDKONG in use between February 2017 and the present , while PLAINTEE is a newer addition with the earliest known sample being observed in October 2017 .' [/INST] [We:O, observed:O, DDKONG:B-Tool, in:O, use:O, between:O, February:B-Time, 2017:I-Time, and:O, the:O, present:O, ,:O, while:O, PLAINTEE:B-Tool, is:O, a:O, newer:O, addition:O, with:O, the:O, earliest:O, known:O, sample:O, being:O, observed:O, in:O, October:B-Time, 2017:I-Time, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The RANCOR campaign represents a continued trend of targeted attacks against entities within the South East Asia region .' [/INST] [The:O, RANCOR:B-OffAct, campaign:I-OffAct, represents:O, a:O, continued:O, trend:O, of:O, targeted:B-OffAct, attacks:I-OffAct, against:O, entities:O, within:O, the:O, South:B-Area, East:I-Area, Asia:I-Area, region:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'They are interested in users of remote banking systems ( RBS ) , mainly in Russia and neighboring countries .' [/INST] [They:O, are:O, interested:O, in:O, users:O, of:O, remote:O, banking:O, systems:O, (:O, RBS:O, ):O, ,:O, mainly:O, in:O, Russia:B-Area, and:O, neighboring:O, countries:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'That this group is mostly targeting businesses is apparent from the processes they are looking for on a compromised system .' [/INST] [That:O, this:O, group:B-HackOrg, is:O, mostly:O, targeting:O, businesses:B-Idus, is:O, apparent:O, from:O, the:O, processes:O, they:O, are:O, looking:O, for:O, on:O, a:O, compromised:O, system:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'While both RTM and Buhtrap are looking for a quite similar process list , the infection vectors are quite different .' [/INST] [While:O, both:O, RTM:B-Tool, and:O, Buhtrap:B-Tool, are:O, looking:O, for:O, a:O, quite:O, similar:O, process:O, list:O, ,:O, the:O, infection:O, vectors:O, are:O, quite:O, different:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'This group has used a large array of infection vectors , mostly revolving around drive-by downloads and spam .' [/INST] [This:O, group:B-HackOrg, has:O, used:O, a:O, large:O, array:O, of:O, infection:O, vectors:O, ,:O, mostly:O, revolving:O, around:O, drive-by:B-Way, downloads:I-Way, and:O, spam:B-Way, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'They are both targeting businesses using accounting software , are fingerprinting systems of interest similarly , are looking for smart card readers , and finally , they deploy an array of malicious tools to spy on their victims .' [/INST] [They:O, are:O, both:O, targeting:O, businesses:B-Idus, using:O, accounting:O, software:O, ,:O, are:O, fingerprinting:O, systems:O, of:O, interest:O, similarly:O, ,:O, are:O, looking:O, for:O, smart:O, card:O, readers:O, ,:O, and:O, finally:O, ,:O, they:O, deploy:O, an:O, array:O, of:O, malicious:O, tools:O, to:O, spy:O, on:O, their:O, victims:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In particular , we will focus on the samples SHA-1 AA0FA4584768CE9E16D67D8C529233E99FF1BBF0 and 48BC113EC8BA20B8B80CD5D4DA92051A19D1032B .' [/INST] [In:O, particular:O, ,:O, we:O, will:O, focus:O, on:O, the:O, samples:O, SHA-1:O, AA0FA4584768CE9E16D67D8C529233E99FF1BBF0:O, and:O, 48BC113EC8BA20B8B80CD5D4DA92051A19D1032B:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Despite its known weaknesses , the RC4 algorithm is regularly used by malware authors .' [/INST] [Despite:O, its:O, known:O, weaknesses:O, ,:O, the:O, RC4:B-Tool, algorithm:O, is:O, regularly:O, used:O, by:O, malware:O, authors:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Based on the use of the relatively unique PLAINTEE malware , the malware 's use of the same file paths on in each cluster , and the similar targeting , we have grouped these attacks together under the RANCOR campaign moniker .' [/INST] [Based:O, on:O, the:O, use:O, of:O, the:O, relatively:O, unique:O, PLAINTEE:B-Tool, malware:I-Tool, ,:O, the:O, malware:O, 's:O, use:O, of:O, the:O, same:O, file:O, paths:O, on:O, in:O, each:O, cluster:O, ,:O, and:O, the:O, similar:O, targeting:O, ,:O, we:O, have:O, grouped:O, these:O, attacks:B-OffAct, together:O, under:O, the:O, RANCOR:B-OffAct, campaign:I-OffAct, moniker:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Bdo is the Russian translation for RBS ( Remote Banking System ) so it is clear that RBS is a target for this malware .' [/INST] [Bdo:O, is:O, the:O, Russian:B-Area, translation:O, for:O, RBS:O, (:O, Remote:O, Banking:O, System:O, ):O, so:O, it:O, is:O, clear:O, that:O, RBS:O, is:O, a:O, target:O, for:O, this:O, malware:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Other groups , such as Buhtrap , Corkow and Carbanak , were already known to target and successfully steal money from financial institutions and their customers in Russia .' [/INST] [Other:O, groups:B-HackOrg, ,:O, such:O, as:O, Buhtrap:B-HackOrg, ,:O, Corkow:B-HackOrg, and:O, Carbanak:B-HackOrg, ,:O, were:O, already:O, known:O, to:O, target:O, and:O, successfully:O, steal:B-Purp, money:I-Purp, from:O, financial:B-Org, institutions:I-Org, and:O, their:O, customers:B-Org, in:O, Russia:B-Area, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Our research on the RTM malware shows that the Russian banking system is still a target of choice for criminals .' [/INST] [Our:O, research:O, on:O, the:O, RTM:B-Tool, malware:I-Tool, shows:O, that:O, the:O, Russian:B-Area, banking:O, system:O, is:O, still:O, a:O, target:O, of:O, choice:O, for:O, criminals:B-HackOrg, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Since last week , iSIGHT Partners has worked to provide details on the power outage in Ukraine to our global customers .' [/INST] [Since:O, last:O, week:O, ,:O, iSIGHT:B-SecTeam, Partners:I-SecTeam, has:O, worked:O, to:O, provide:O, details:O, on:O, the:O, power:O, outage:O, in:O, Ukraine:B-Area, to:O, our:O, global:O, customers:B-Org, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Shortly after releasing information on their espionage operations , our friends at TrendMicro found evidence that the operators were not only conducting classic strategic espionage but targeting SCADA systems as well .' [/INST] [Shortly:O, after:O, releasing:O, information:O, on:O, their:O, espionage:B-OffAct, operations:I-OffAct, ,:O, our:O, friends:O, at:O, TrendMicro:B-SecTeam, found:O, evidence:O, that:O, the:O, operators:B-HackOrg, were:O, not:O, only:O, conducting:O, classic:O, strategic:O, espionage:B-HackOrg, but:O, targeting:O, SCADA:O, systems:O, as:O, well:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'iSiGHT has tracked Sandworm Team for some time - and we publicly reported on some of their activities in October 2014 , when we discovered their use of a zero-day exploit , CVE-2014-4114 .' [/INST] [iSiGHT:B-SecTeam, has:O, tracked:O, Sandworm:B-HackOrg, Team:I-HackOrg, for:O, some:O, time:O, -:O, and:O, we:O, publicly:O, reported:O, on:O, some:O, of:O, their:O, activities:B-OffAct, in:O, October:B-Time, 2014:I-Time, ,:O, when:O, we:O, discovered:O, their:O, use:O, of:O, a:O, zero-day:B-Exp, exploit:I-Exp, ,:O, CVE-2014-4114:B-Exp, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Sandworm Team went to ground shortly after being exposed in October of 2014 , and malware with Dune references ( the genesis for the ' Sandworm ' moniker ) which we had previously used to track them disappeared entirely .' [/INST] [Sandworm:B-HackOrg, Team:I-HackOrg, went:O, to:O, ground:O, shortly:O, after:O, being:O, exposed:O, in:O, October:B-Time, of:I-Time, 2014:I-Time, ,:O, and:O, malware:O, with:O, Dune:O, references:O, (:O, the:O, genesis:O, for:O, the:O, ':O, Sandworm:B-HackOrg, ':O, moniker:O, ):O, which:O, we:O, had:O, previously:O, used:O, to:O, track:O, them:O, disappeared:O, entirely:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'However , the unique malware variant , BlackEnergy 3 , reemerged in Ukraine early in 2015 , where we had first found Sandworm Team .' [/INST] [However:O, ,:O, the:O, unique:O, malware:O, variant:O, ,:O, BlackEnergy:B-SamFile, 3:I-SamFile, ,:O, reemerged:O, in:O, Ukraine:B-Area, early:O, in:O, 2015:B-Time, ,:O, where:O, we:O, had:O, first:O, found:O, Sandworm:B-HackOrg, Team:I-HackOrg, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'iSiGHT Partners has tracked Sandworm Team for some time - and we publicly reported on some of their activities in October 2014 , when we discovered their use of a zero-day exploit , CVE-2014-4114 .' [/INST] [iSiGHT:B-SecTeam, Partners:I-SecTeam, has:O, tracked:O, Sandworm:B-HackOrg, Team:I-HackOrg, for:O, some:O, time:O, -:O, and:O, we:O, publicly:O, reported:O, on:O, some:O, of:O, their:O, activities:B-OffAct, in:O, October:B-Time, 2014:I-Time, ,:O, when:O, we:O, discovered:O, their:O, use:O, of:O, a:O, zero-day:B-Exp, exploit:I-Exp, ,:O, CVE-2014-4114:B-Exp, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'SIGHT Partners is still collecting information on the mechanics of the power outage and what role the KillDisk malware played in the greater event .' [/INST] [SIGHT:B-SecTeam, Partners:I-SecTeam, is:O, still:O, collecting:O, information:O, on:O, the:O, mechanics:O, of:O, the:O, power:O, outage:O, and:O, what:O, role:O, the:O, KillDisk:B-Tool, malware:I-Tool, played:O, in:O, the:O, greater:O, event:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Last week iSIGHT 's sources provided us with the same KillDisk malware published by Rob Lee of SANS and Dragos Security .' [/INST] [Last:O, week:O, iSIGHT:B-SecTeam, 's:O, sources:O, provided:O, us:O, with:O, the:O, same:O, KillDisk:B-Tool, malware:I-Tool, published:O, by:O, Rob:O, Lee:O, of:O, SANS:B-SecTeam, and:O, Dragos:B-SecTeam, Security:I-SecTeam, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The aggressive nature of Sandworm Team 's previous activity in Europe and the United States exposed their interest in targeting critical systems and indicated preparation for cyber attack .' [/INST] [The:O, aggressive:O, nature:O, of:O, Sandworm:B-HackOrg, Team:I-HackOrg, 's:O, previous:O, activity:B-OffAct, in:O, Europe:B-Area, and:O, the:O, United:B-Area, States:I-Area, exposed:O, their:O, interest:O, in:O, targeting:O, critical:O, systems:O, and:O, indicated:O, preparation:O, for:O, cyber:B-OffAct, attack:I-OffAct, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'This year we are going to be releasing a monthly blog post introducing the , Threat Actor of the Month , , complete with detailed background information on that actor .' [/INST] [This:O, year:O, we:O, are:O, going:O, to:O, be:O, releasing:O, a:O, monthly:O, blog:O, post:O, introducing:O, the:O, ,:O, Threat:B-HackOrg, Actor:I-HackOrg, of:O, the:O, Month:O, ,:O, ,:O, complete:O, with:O, detailed:O, background:O, information:O, on:O, that:O, actor:B-HackOrg, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'VOODOO BEAR is a highly advanced adversary with a suspected nexus to the Russian Federation .' [/INST] [VOODOO:B-HackOrg, BEAR:I-HackOrg, is:O, a:O, highly:O, advanced:O, adversary:O, with:O, a:O, suspected:O, nexus:O, to:O, the:O, Russian:B-Area, Federation:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Destructive malware used by VOODOO BEAR includes a wiper called PassKillDisk .' [/INST] [Destructive:O, malware:O, used:O, by:O, VOODOO:B-HackOrg, BEAR:I-HackOrg, includes:O, a:O, wiper:O, called:O, PassKillDisk:B-Tool, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Some tools used by this actor — specifically BlackEnergy and GCat — have been adapted from commodity malware .' [/INST] [Some:O, tools:O, used:O, by:O, this:O, actor:B-HackOrg, —:O, specifically:O, BlackEnergy:B-HackOrg, and:O, GCat:B-HackOrg, —:O, have:O, been:O, adapted:O, from:O, commodity:O, malware:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'This adversary has been identified leveraging custom-developed plugins for versions 2 and 3 of the commodity malware Black Energy to target entities associated with energy , industrial control systems and SCADA , government , and media for espionage and destructive purposes , since at least 2011 .' [/INST] [This:O, adversary:O, has:O, been:O, identified:O, leveraging:O, custom-developed:O, plugins:O, for:O, versions:O, 2:O, and:O, 3:O, of:O, the:O, commodity:O, malware:O, Black:B-Tool, Energy:I-Tool, to:O, target:O, entities:O, associated:O, with:O, energy:B-Idus, ,:O, industrial:O, control:O, systems:O, and:O, SCADA:O, ,:O, government:B-Idus, ,:O, and:O, media:B-Idus, for:O, espionage:B-HackOrg, and:O, destructive:O, purposes:O, ,:O, since:O, at:O, least:O, 2011:B-Time, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'A commonly observed element of implants from VOODOO BEAR — at least until this information was made public in late 2014 — were references in the malware to the 1965 science fiction novel Dune , by Frank Herbert .' [/INST] [A:O, commonly:O, observed:O, element:O, of:O, implants:O, from:O, VOODOO:B-HackOrg, BEAR:I-HackOrg, —:O, at:O, least:O, until:O, this:O, information:O, was:O, made:O, public:O, in:O, late:B-Time, 2014:I-Time, —:O, were:O, references:O, in:O, the:O, malware:O, to:O, the:O, 1965:O, science:O, fiction:O, novel:O, Dune:O, ,:O, by:O, Frank:O, Herbert:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'This adversary has been identified leveraging custom-developed plugins for versions 2 and 3 of the commodity malware Black Energy to target entities associated with energy , government , and media for espionage and destructive purposes , since at least 2011 .' [/INST] [This:O, adversary:O, has:O, been:O, identified:O, leveraging:O, custom-developed:O, plugins:O, for:O, versions:O, 2:O, and:O, 3:O, of:O, the:O, commodity:O, malware:O, Black:B-Tool, Energy:I-Tool, to:O, target:O, entities:O, associated:O, with:O, energy:B-Idus, ,:O, government:B-Idus, ,:O, and:O, media:B-Idus, for:O, espionage:B-HackOrg, and:O, destructive:O, purposes:O, ,:O, since:O, at:O, least:O, 2011:B-Time, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'these characteristics all highlight the likelihood that VOODOO BEAR operates in alignment with Russian state interests .' [/INST] [these:O, characteristics:O, all:O, highlight:O, the:O, likelihood:O, that:O, VOODOO:B-HackOrg, BEAR:I-HackOrg, operates:O, in:O, alignment:O, with:O, Russian:B-Area, state:O, interests:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'This adversary displays a particular focus on targeting entities in the Ukraine and is believed to be behind the Ukrainian energy sector attacks that caused widespread power outages in late 2015 .' [/INST] [This:O, adversary:O, displays:O, a:O, particular:O, focus:O, on:O, targeting:O, entities:O, in:O, the:O, Ukraine:B-Area, and:O, is:O, believed:O, to:O, be:O, behind:O, the:O, Ukrainian:B-OffAct, energy:I-OffAct, sector:I-OffAct, attacks:I-OffAct, that:O, caused:O, widespread:O, power:O, outages:O, in:O, late:B-Time, 2015:I-Time, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'VOODOO BEAR appears to be integrated into an organization that also operates or tasks multiple pro-Russian hacktivist entities .' [/INST] [VOODOO:B-HackOrg, BEAR:I-HackOrg, appears:O, to:O, be:O, integrated:O, into:O, an:O, organization:O, that:O, also:O, operates:O, or:O, tasks:O, multiple:O, pro-Russian:B-Area, hacktivist:O, entities:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In the summer of 2014 , BlackEnergy caught our attention when we noticed that samples of it were now tailored to target Ukrainian government institutions .' [/INST] [In:O, the:O, summer:B-Time, of:I-Time, 2014:I-Time, ,:O, BlackEnergy:B-HackOrg, caught:O, our:O, attention:O, when:O, we:O, noticed:O, that:O, samples:O, of:O, it:O, were:O, now:O, tailored:O, to:O, target:O, Ukrainian:B-Area, government:B-Org, institutions:I-Org, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Related or not , one thing is certain : the actor ( s ) using these customized BlackEnergy malware are intent on stealing information from the targets .' [/INST] [Related:O, or:O, not:O, ,:O, one:O, thing:O, is:O, certain:O, ::O, the:O, actor:B-HackOrg, (:O, s:O, ):O, using:O, these:O, customized:O, BlackEnergy:B-Tool, malware:I-Tool, are:O, intent:O, on:O, stealing:B-Purp, information:I-Purp, from:O, the:O, targets:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In this paper we focus only on BlackEnergy samples known to be used specifically by the actors we identify as Quedagh , who seem to have a particular interest in political targets .' [/INST] [In:O, this:O, paper:O, we:O, focus:O, only:O, on:O, BlackEnergy:B-Tool, samples:I-Tool, known:O, to:O, be:O, used:O, specifically:O, by:O, the:O, actors:B-HackOrg, we:O, identify:O, as:O, Quedagh:B-HackOrg, ,:O, who:O, seem:O, to:O, have:O, a:O, particular:O, interest:O, in:O, political:B-Idus, targets:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Special focus will be on the samples that were used in targeted attacks against Ukrainian government organizations earlier this year .' [/INST] [Special:O, focus:O, will:O, be:O, on:O, the:O, samples:O, that:O, were:O, used:O, in:O, targeted:B-OffAct, attacks:I-OffAct, against:O, Ukrainian:B-Area, government:B-Org, organizations:I-Org, earlier:O, this:O, year:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Although they may have started much earlier , the earliest BlackEnergy sample we could attribute to the Quedagh gang is from December 14 , 2010 .' [/INST] [Although:O, they:O, may:O, have:O, started:O, much:O, earlier:O, ,:O, the:O, earliest:O, BlackEnergy:B-Tool, sample:I-Tool, we:O, could:O, attribute:O, to:O, the:O, Quedagh:B-HackOrg, gang:I-HackOrg, is:O, from:O, December:B-Time, 14:I-Time, ,:I-Time, 2010:I-Time, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'We warned our clients of new features suggesting an increased focus on European targets - though verification of targets was not possible at the time .' [/INST] [We:O, warned:O, our:O, clients:O, of:O, new:O, features:O, suggesting:O, an:O, increased:O, focus:O, on:O, European:B-Area, targets:O, -:O, though:O, verification:O, of:O, targets:O, was:O, not:O, possible:O, at:O, the:O, time:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Sandworm Team may have opted for a ' hide in plain sight ' approach to evade detections from rootkit scanners , such as GMER and RootkitRevealer , that checks for system anomalies .' [/INST] [Sandworm:B-HackOrg, Team:I-HackOrg, may:O, have:O, opted:O, for:O, a:O, ':O, hide:O, in:O, plain:O, sight:O, ':O, approach:O, to:O, evade:O, detections:O, from:O, rootkit:O, scanners:O, ,:O, such:O, as:O, GMER:O, and:O, RootkitRevealer:O, ,:O, that:O, checks:O, for:O, system:O, anomalies:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Table 3 ( above ) summarizes the commands supported by the variants used in the attack against Ukrainian government organizations .' [/INST] [Table:O, 3:O, (:O, above:O, ):O, summarizes:O, the:O, commands:O, supported:O, by:O, the:O, variants:O, used:O, in:O, the:O, attack:B-OffAct, against:O, Ukrainian:B-Area, government:B-Org, organizations:I-Org, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In the summer of 2014 , we noted that certain samples of BlackEnergy malware began targeting Ukranian government organizations for information harvesting .' [/INST] [In:O, the:O, summer:B-Time, of:I-Time, 2014:I-Time, ,:O, we:O, noted:O, that:O, certain:O, samples:O, of:O, BlackEnergy:B-Tool, malware:I-Tool, began:O, targeting:O, Ukranian:B-Area, government:B-Org, organizations:I-Org, for:O, information:O, harvesting:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'These samples were identified as being the work of one group , referred to in this document as , Quedagh , , which has a history of targeting political organizations .' [/INST] [These:O, samples:O, were:O, identified:O, as:O, being:O, the:O, work:O, of:O, one:O, group:B-HackOrg, ,:O, referred:O, to:O, in:O, this:O, document:O, as:O, ,:O, Quedagh:B-HackOrg, ,:O, ,:O, which:O, has:O, a:O, history:O, of:O, targeting:O, political:B-Org, organizations:I-Org, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The attacks we attribute to Scarlet Mimic have primarily targeted Uyghur and Tibetan activists as well as those who are interested in their causes .' [/INST] [The:O, attacks:B-OffAct, we:O, attribute:O, to:O, Scarlet:B-HackOrg, Mimic:I-HackOrg, have:O, primarily:O, targeted:O, Uyghur:B-Org, and:O, Tibetan:B-Org, activists:I-Org, as:O, well:O, as:O, those:O, who:O, are:O, interested:O, in:O, their:O, causes:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'To infect individuals with access to the data the actors desire , Scarlet Mimic deploys both spear-phishing and watering hole ( strategic web compromise ) attacks .' [/INST] [To:O, infect:O, individuals:O, with:O, access:O, to:O, the:O, data:O, the:O, actors:B-HackOrg, desire:O, ,:O, Scarlet:B-HackOrg, Mimic:I-HackOrg, deploys:O, both:O, spear-phishing:B-Way, and:O, watering:B-OffAct, hole:I-OffAct, (:O, strategic:O, web:O, compromise:O, ):O, attacks:B-OffAct, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'As with many other attackers who use spear-phishing to infect victims , Scarlet Mimic makes heavy use of , decoy , files .' [/INST] [As:O, with:O, many:O, other:O, attackers:B-HackOrg, who:O, use:O, spear-phishing:B-Way, to:O, infect:O, victims:O, ,:O, Scarlet:B-HackOrg, Mimic:I-HackOrg, makes:O, heavy:O, use:O, of:O, ,:O, decoy:O, ,:O, files:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The most recent Scarlet Mimic attacks we have identified were conducted in 2015 and suggest the group has a significant interest in both Muslim activists and those interested in critiques of the Russian government and Russian President Vladimir Putin .' [/INST] [The:O, most:O, recent:O, Scarlet:B-OffAct, Mimic:I-OffAct, attacks:I-OffAct, we:O, have:O, identified:O, were:O, conducted:O, in:O, 2015:B-Time, and:O, suggest:O, the:O, group:B-HackOrg, has:O, a:O, significant:O, interest:O, in:O, both:O, Muslim:B-Org, activists:I-Org, and:O, those:O, interested:O, in:O, critiques:O, of:O, the:O, Russian:B-Area, government:O, and:O, Russian:B-Area, President:O, Vladimir:O, Putin:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Using these tactics Scarlet Mimic can directly target previously identified individuals ( spear phishing ) as well as unidentified individuals who are interested in a specific subject ( watering hole ) .' [/INST] [Using:O, these:O, tactics:O, Scarlet:B-HackOrg, Mimic:I-HackOrg, can:O, directly:O, target:O, previously:O, identified:O, individuals:O, (:O, spear:B-Way, phishing:I-Way, ):O, as:O, well:O, as:O, unidentified:O, individuals:O, who:O, are:O, interested:O, in:O, a:O, specific:O, subject:O, (:O, watering:B-OffAct, hole:I-OffAct, ):O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'This group has been conducting attacks for at least four years using a backdoor Trojan that has been under active development .' [/INST] [This:O, group:B-HackOrg, has:O, been:O, conducting:O, attacks:B-OffAct, for:O, at:O, least:O, four:O, years:O, using:O, a:O, backdoor:B-Tool, Trojan:I-Tool, that:O, has:O, been:O, under:O, active:O, development:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Based on analysis of the data and malware samples we have collected , Unit 42 believes the attacks described herein are the work of a group or set of cooperating groups who have a single mission , collecting information on minority groups who reside in and around northwestern China .' [/INST] [Based:O, on:O, analysis:O, of:O, the:O, data:O, and:O, malware:O, samples:O, we:O, have:O, collected:O, ,:O, Unit:B-SecTeam, 42:I-SecTeam, believes:O, the:O, attacks:B-OffAct, described:O, herein:O, are:O, the:O, work:O, of:O, a:O, group:B-HackOrg, or:O, set:O, of:O, cooperating:O, groups:B-HackOrg, who:O, have:O, a:O, single:O, mission:O, ,:O, collecting:O, information:O, on:O, minority:B-Org, groups:I-Org, who:O, reside:O, in:O, and:O, around:O, northwestern:B-Area, China:I-Area, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Attacks launched by this group were publicly exposed on 2013 in a Trend Micro report about the FakeM Trojan .' [/INST] [Attacks:B-OffAct, launched:O, by:O, this:O, group:B-HackOrg, were:O, publicly:O, exposed:O, on:O, 2013:B-Time, in:O, a:O, Trend:B-SecTeam, Micro:I-SecTeam, report:O, about:O, the:O, FakeM:B-Tool, Trojan:I-Tool, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'We will also provide detailed analysis of the latest variants of the malware they deploy ( known as FakeM ) as well as other associated tools that allow Scarlet Mimic to target Android and OS X devices .' [/INST] [We:O, will:O, also:O, provide:O, detailed:O, analysis:O, of:O, the:O, latest:O, variants:O, of:O, the:O, malware:O, they:O, deploy:O, (:O, known:O, as:O, FakeM:B-Tool, ):O, as:O, well:O, as:O, other:O, associated:O, tools:O, that:O, allow:O, Scarlet:B-HackOrg, Mimic:I-HackOrg, to:O, target:O, Android:O, and:O, OS:O, X:O, devices:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In the past , Scarlet Mimic has primarily targeted individuals who belong to these minority groups as well as their supporters , but we've recently found evidence to indicate the group also targets individuals working inside government anti-terrorist organizations .' [/INST] [In:O, the:O, past:O, ,:O, Scarlet:B-HackOrg, Mimic:I-HackOrg, has:O, primarily:O, targeted:O, individuals:O, who:O, belong:O, to:O, these:O, minority:B-Org, groups:I-Org, as:O, well:O, as:O, their:O, supporters:B-Org, ,:O, but:O, we've:O, recently:O, found:O, evidence:O, to:O, indicate:O, the:O, group:B-HackOrg, also:O, targets:O, individuals:O, working:O, inside:O, government:O, anti-terrorist:B-Org, organizations:I-Org, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'We also know Scarlet Mimic uses a number of toolkits to create documents that contain exploit code to install the FakeM payload on a compromised system .' [/INST] [We:O, also:O, know:O, Scarlet:B-HackOrg, Mimic:I-HackOrg, uses:O, a:O, number:O, of:O, toolkits:O, to:O, create:O, documents:O, that:O, contain:O, exploit:O, code:O, to:O, install:O, the:O, FakeM:B-Tool, payload:O, on:O, a:O, compromised:O, system:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Unit 42 tracks the toolkits delivering FakeM under the names MNKit , WingD and Tran Duy Linh .' [/INST] [Unit:B-SecTeam, 42:I-SecTeam, tracks:O, the:O, toolkits:O, delivering:O, FakeM:B-Tool, under:O, the:O, names:O, MNKit:B-Tool, ,:O, WingD:B-Tool, and:O, Tran:B-Tool, Duy:I-Tool, Linh:I-Tool, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In July of 2015 , we identified a full e-mail uploaded to an antivirus scanning service that carried a Scarlet Mimic exploit document .' [/INST] [In:O, July:B-Time, of:I-Time, 2015:I-Time, ,:O, we:O, identified:O, a:O, full:O, e-mail:B-Way, uploaded:O, to:O, an:O, antivirus:O, scanning:O, service:O, that:O, carried:O, a:O, Scarlet:B-Exp, Mimic:I-Exp, exploit:I-Exp, document:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'We are aware of one case where Scarlet Mimic broke from the spear-phishing pattern described above .' [/INST] [We:O, are:O, aware:O, of:O, one:O, case:O, where:O, Scarlet:B-HackOrg, Mimic:I-HackOrg, broke:O, from:O, the:O, spear-phishing:B-Way, pattern:O, described:O, above:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In 2013 , the group deployed a watering hole attack , also known as a strategic web compromise to infect victims with their backdoor .' [/INST] [In:O, 2013:B-Time, ,:O, the:O, group:B-HackOrg, deployed:O, a:O, watering:B-OffAct, hole:I-OffAct, attack:I-OffAct, ,:O, also:O, known:O, as:O, a:O, strategic:O, web:O, compromise:O, to:O, infect:O, victims:O, with:O, their:O, backdoor:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'FakeM 's functional code is shellcode-based and requires another Trojan to load it into memory and execute it .' [/INST] [FakeM:B-Tool, 's:O, functional:O, code:O, is:O, shellcode-based:O, and:O, requires:O, another:O, Trojan:O, to:O, load:O, it:O, into:O, memory:O, and:O, execute:O, it:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'First discussed in January 2013 in a Trend Micro whitepaper , FakeM is a Trojan that uses separate modules to perform its functionality .' [/INST] [First:O, discussed:O, in:O, January:B-Time, 2013:I-Time, in:O, a:O, Trend:B-SecTeam, Micro:I-SecTeam, whitepaper:O, ,:O, FakeM:B-Tool, is:O, a:O, Trojan:B-Tool, that:O, uses:O, separate:O, modules:O, to:O, perform:O, its:O, functionality:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'We end this section with a discussion on tools related to FakeM and used by Scarlet Mimic .' [/INST] [We:O, end:O, this:O, section:O, with:O, a:O, discussion:O, on:O, tools:O, related:O, to:O, FakeM:B-Tool, and:O, used:O, by:O, Scarlet:B-HackOrg, Mimic:I-HackOrg, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Microsoft patched this vulnerability in September 2012 , suggesting that this watering hole attack used an older vulnerability , which aligns with the threat groups continued use of older vulnerabilities in their spear-phishing efforts .' [/INST] [Microsoft:B-Org, patched:O, this:O, vulnerability:O, in:O, September:B-Time, 2012:I-Time, ,:O, suggesting:O, that:O, this:O, watering:B-OffAct, hole:I-OffAct, attack:I-OffAct, used:O, an:O, older:O, vulnerability:O, ,:O, which:O, aligns:O, with:O, the:O, threat:B-HackOrg, groups:I-HackOrg, continued:O, use:O, of:O, older:O, vulnerabilities:O, in:O, their:O, spear-phishing:B-Way, efforts:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Microsoft patched this vulnerability in September 2012 , suggesting that this watering hole attack used an older vulnerability , which aligns with Scarlet Mimic continued use of older vulnerabilities in their spear-phishing efforts .' [/INST] [Microsoft:B-Org, patched:O, this:O, vulnerability:O, in:O, September:B-Time, 2012:I-Time, ,:O, suggesting:O, that:O, this:O, watering:B-OffAct, hole:I-OffAct, attack:I-OffAct, used:O, an:O, older:O, vulnerability:O, ,:O, which:O, aligns:O, with:O, Scarlet:B-HackOrg, Mimic:I-HackOrg, continued:O, use:O, of:O, older:O, vulnerabilities:O, in:O, their:O, spear-phishing:B-Way, efforts:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Based on the timeline , it appears that the actors were actively developing several of the loaders at the same time from 2009 until the early months of 2014 .' [/INST] [Based:O, on:O, the:O, timeline:O, ,:O, it:O, appears:O, that:O, the:O, actors:B-HackOrg, were:O, actively:O, developing:O, several:O, of:O, the:O, loaders:O, at:O, the:O, same:O, time:O, from:O, 2009:B-Time, until:O, the:O, early:O, months:O, of:O, 2014:B-Time, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Unit 42 tracks this mobile Trojan as MobileOrder , as the authors specifically refer to commands within the app as orders .' [/INST] [Unit:B-SecTeam, 42:I-SecTeam, tracks:O, this:O, mobile:B-Tool, Trojan:I-Tool, as:O, MobileOrder:B-Tool, ,:O, as:O, the:O, authors:O, specifically:O, refer:O, to:O, commands:O, within:O, the:O, app:O, as:O, orders:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'There are also infrastructure ties between some FakeM variants and older activity using Trojans such as Elirks , Poison Ivy , and BiFrost , which were used in attacks as old as 2009 .' [/INST] [There:O, are:O, also:O, infrastructure:O, ties:O, between:O, some:O, FakeM:B-Tool, variants:O, and:O, older:O, activity:B-OffAct, using:O, Trojans:O, such:O, as:O, Elirks:B-Tool, ,:O, Poison:B-Tool, Ivy:I-Tool, ,:O, and:O, BiFrost:O, ,:O, which:O, were:O, used:O, in:O, attacks:B-OffAct, as:O, old:O, as:O, 2009:B-Time, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'There is some infrastructure overlap in the C2 servers used by almost all of the FakeM variants , as well other Trojans such as MobileOrder , Psylo , and CallMe .' [/INST] [There:O, is:O, some:O, infrastructure:O, overlap:O, in:O, the:O, C2:O, servers:O, used:O, by:O, almost:O, all:O, of:O, the:O, FakeM:B-Tool, variants:O, ,:O, as:O, well:O, other:O, Trojans:O, such:O, as:O, MobileOrder:B-Tool, ,:O, Psylo:B-Tool, ,:O, and:O, CallMe:B-Tool, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Trend Micro published their analysis of the FakeM Trojan on January 17 , 2013 that discussed the original variant of FakeM .' [/INST] [Trend:B-SecTeam, Micro:I-SecTeam, published:O, their:O, analysis:O, of:O, the:O, FakeM:B-Tool, Trojan:I-Tool, on:O, January:B-Time, 17:I-Time, ,:O, 2013:B-Time, that:O, discussed:O, the:O, original:O, variant:O, of:O, FakeM:B-Tool, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The primary source of data used in this analysis is Palo Alto Networks WildFire , which analyzes malware used in attacks across the world .' [/INST] [The:O, primary:O, source:O, of:O, data:O, used:O, in:O, this:O, analysis:O, is:O, Palo:B-SecTeam, Alto:I-SecTeam, Networks:I-SecTeam, WildFire:I-SecTeam, ,:O, which:O, analyzes:O, malware:O, used:O, in:O, attacks:B-OffAct, across:O, the:O, world:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Scarlet Mimic also uses the infamous HTRAN tool on at least some of their C2 servers .' [/INST] [Scarlet:B-HackOrg, Mimic:I-HackOrg, also:O, uses:O, the:O, infamous:O, HTRAN:B-Tool, tool:I-Tool, on:O, at:O, least:O, some:O, of:O, their:O, C2:O, servers:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Scarlet Mimic primarily deploys spear-phishing e-mails to infect its targets , but was also responsible for a watering hole attack in 2013 .' [/INST] [Scarlet:B-HackOrg, Mimic:I-HackOrg, primarily:O, deploys:O, spear-phishing:B-Way, e-mails:I-Way, to:O, infect:O, its:O, targets:O, ,:O, but:O, was:O, also:O, responsible:O, for:O, a:O, watering:B-OffAct, hole:I-OffAct, attack:I-OffAct, in:O, 2013:B-Time, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Kaspersky Lab has produced excellent research on Scarlet Mimic group .' [/INST] [Kaspersky:B-SecTeam, Lab:I-SecTeam, has:O, produced:O, excellent:O, research:O, on:O, Scarlet:B-HackOrg, Mimic:I-HackOrg, group:I-HackOrg, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Actors will run HTRAN on a server and configure their malware to interact with that server ; however , the actor will configure HTRAN to forward traffic to another server where the actual C2 server exists .' [/INST] [Actors:B-HackOrg, will:O, run:O, HTRAN:B-Tool, on:O, a:O, server:O, and:O, configure:O, their:O, malware:O, to:O, interact:O, with:O, that:O, server:O, ;:O, however:O, ,:O, the:O, actor:B-HackOrg, will:O, configure:O, HTRAN:B-Tool, to:O, forward:O, traffic:O, to:O, another:O, server:O, where:O, the:O, actual:O, C2:O, server:O, exists:O, .:O] </s> |
End of preview. Expand
in Dataset Viewer.
README.md exists but content is empty.
Use the Edit dataset card button to edit it.
- Downloads last month
- 35