id
int64
105
14.4k
text
stringlengths
41
889
entities
list
relations
list
249
A cybersquatting domain save-russia[.]today is launching DoS attacks on Ukrainian news sites.
[ { "end_offset": 16, "id": 44656, "label": "attack-pattern", "start_offset": 2 }, { "end_offset": 43, "id": 44657, "label": "url", "start_offset": 24 }, { "end_offset": 68, "id": 44658, "label": "attack-pattern", "start_offset": 57 }, { "end_offset": 92, "id": 44659, "label": "identity", "start_offset": 72 } ]
[ { "from_id": 44658, "id": 9, "to_id": 44659, "type": "targets" }, { "from_id": 44656, "id": 114, "to_id": 44657, "type": "uses" }, { "from_id": 44658, "id": 115, "to_id": 44657, "type": "uses" } ]
14,309
Like the Android Maikspy, it first sends a notification to its C&C server to register the device.
[ { "end_offset": 17, "id": 48530, "label": "SOFTWARE", "start_offset": 9 }, { "end_offset": 24, "id": 48531, "label": "malware", "start_offset": 17 }, { "end_offset": 73, "id": 48532, "label": "Infrastucture", "start_offset": 63 } ]
[ { "from_id": 48531, "id": 445, "to_id": 48532, "type": "beacons-to" } ]
13,996
While analyzing the technical details of this malware, which includes two new espionage backdoors, we noticed striking similarities to other malware attributed to the threat actor known as APT37, also known as Reaper or Group 123.
[ { "end_offset": 194, "id": 48781, "label": "threat-actor", "start_offset": 188 }, { "end_offset": 217, "id": 48782, "label": "threat-actor", "start_offset": 210 }, { "end_offset": 229, "id": 48783, "label": "threat-actor", "start_offset": 220 } ]
[ { "from_id": 48781, "id": 461, "to_id": 48782, "type": "duplicate-of" }, { "from_id": 48781, "id": 462, "to_id": 48783, "type": "duplicate-of" } ]
13,600
(Note that Flash has been declared end-of-life by Adobe since December 31, 2020.) If the victim downloads and executes the installer downloaded from this page, the victim will be infected with a variant of Gh0stRat malware, previously also named Gh0stCringe or CineregRAT.
[ { "end_offset": 79, "id": 51687, "label": "TIME", "start_offset": 62 }, { "end_offset": 215, "id": 51688, "label": "malware", "start_offset": 207 }, { "end_offset": 258, "id": 51689, "label": "malware", "start_offset": 247 }, { "end_offset": 272, "id": 51690, "label": "malware", "start_offset": 262 } ]
[ { "from_id": 51688, "id": 1133, "to_id": 51689, "type": "related-to" }, { "from_id": 51688, "id": 1134, "to_id": 51690, "type": "related-to" } ]
14,364
Figure 21. Connection of Maikspy variants to 107[.]180[.]46[.]243 and hxxp://fakeomegle[.]com Figure 22. Connection of Maikspy variants to 198[.]12[.]149[.]13and hxxp://miakhalifagame[.]com/
[ { "end_offset": 191, "id": 51779, "label": "URL", "start_offset": 163 }, { "end_offset": 93, "id": 51777, "label": "URL", "start_offset": 70 }, { "end_offset": 127, "id": 51781, "label": "malware", "start_offset": 120 }, { "end_offset": 159, "id": 51778, "label": "IPV4", "start_offset": 140 }, { "end_offset": 32, "id": 51780, "label": "malware", "start_offset": 25 }, { "end_offset": 65, "id": 44372, "label": "IPV4", "start_offset": 45 } ]
[ { "from_id": 51780, "id": 1161, "to_id": 44372, "type": "communicates-with" }, { "from_id": 51780, "id": 1162, "to_id": 51777, "type": "communicates-with" }, { "from_id": 51781, "id": 1163, "to_id": 51778, "type": "communicates-with" }, { "from_id": 51781, "id": 1164, "to_id": 51779, "type": "communicates-with" } ]
13,565
The source code of this framework is shared across many Chinese public forums.
[ { "end_offset": 63, "id": 51646, "label": "location", "start_offset": 56 }, { "end_offset": 33, "id": 51647, "label": "tools", "start_offset": 24 } ]
[ { "from_id": 51647, "id": 1123, "to_id": 51646, "type": "related-to" } ]
2,400
The CVE-2022-22965 vulnerability allows an attacker unauthenticated remote code execution (RCE), which Unit 42 has observed being exploited in the wild.
[ { "end_offset": 18, "id": 45495, "label": "vulnerability", "start_offset": 4 }, { "end_offset": 89, "id": 45496, "label": "attack-pattern", "start_offset": 52 }, { "end_offset": 110, "id": 45497, "label": "identity", "start_offset": 103 } ]
[ { "from_id": 45496, "id": 105, "to_id": 45495, "type": "delivers" } ]
14,126
At the same time, we were able to locate the Mattermost server hosted in Greece, and that gave us the current time zone of the Mattermost server.
[ { "end_offset": 79, "id": 48192, "label": "location", "start_offset": 73 }, { "end_offset": 144, "id": 48191, "label": "Infrastucture", "start_offset": 127 }, { "end_offset": 62, "id": 48193, "label": "Infrastucture", "start_offset": 45 } ]
[ { "from_id": 48191, "id": 392, "to_id": 48192, "type": "located-at" }, { "from_id": 48193, "id": 393, "to_id": 48192, "type": "located-at" } ]
1,929
But this link is further fortified by the Android applications we found whose code is like that of Bahamut, with the C&C matching the usual name registration pattern of Patchwork’s group, as well as an infrastructure close to an old Patchwork domain.
[ { "end_offset": 49, "id": 45181, "label": "SOFTWARE", "start_offset": 42 }, { "end_offset": 178, "id": 45183, "label": "threat-actor", "start_offset": 169 }, { "end_offset": 242, "id": 45184, "label": "threat-actor", "start_offset": 233 }, { "end_offset": 106, "id": 45182, "label": "malware", "start_offset": 99 } ]
[ { "from_id": 45182, "id": 80, "to_id": 45183, "type": "attributed-to" } ]
1,921
A malicious RTF file that exploits the CVE-2017-8750 and drops a malicious VB backdoor with C&C appswonder[.]info A malicious InPage file that exploits CVE-2017-12824 and drops two files, one non-malicious, and one malicious VB backdoor with C&C referfile[.]com Talos recently reported both C&C domain names with one type of campaign that targets iOS and involves MDM, and another type using VB and Delphi backdoors.
[ { "end_offset": 53, "id": 47039, "label": "vulnerability", "start_offset": 40 }, { "end_offset": 262, "id": 47042, "label": "url", "start_offset": 247 }, { "end_offset": 269, "id": 47043, "label": "identity", "start_offset": 264 }, { "end_offset": 352, "id": 47044, "label": "SOFTWARE", "start_offset": 349 }, { "end_offset": 16, "id": 47045, "label": "malware", "start_offset": 3 }, { "end_offset": 167, "id": 47040, "label": "vulnerability", "start_offset": 153 }, { "end_offset": 114, "id": 47041, "label": "url", "start_offset": 97 } ]
[ { "from_id": 47045, "id": 291, "to_id": 47039, "type": "exploits" }, { "from_id": 47045, "id": 292, "to_id": 47041, "type": "communicates-with" } ]
4,577
Recently observed COLDRIVER indicators: In another campaign tracked by CERT-UA as UAC-0056 we observed compromised email addresses of a Regional Prosecutor’s office of Ukraine leveraged to send malicious Microsoft Excel documents with VBA macros delivering Cobalt Strike.
[ { "end_offset": 270, "id": 50428, "label": "tools", "start_offset": 257 }, { "end_offset": 78, "id": 50424, "label": "identity", "start_offset": 71 }, { "end_offset": 90, "id": 50425, "label": "threat-actor", "start_offset": 82 }, { "end_offset": 219, "id": 50427, "label": "SOFTWARE", "start_offset": 204 }, { "end_offset": 27, "id": 50423, "label": "threat-actor", "start_offset": 18 }, { "end_offset": 175, "id": 50426, "label": "identity", "start_offset": 136 } ]
[ { "from_id": 50423, "id": 969, "to_id": 50425, "type": "duplicate-of" }, { "from_id": 50423, "id": 970, "to_id": 50426, "type": "impersonates" } ]
5,230
We named these malicious apps AnubisSpy (ANDROIDOS_ANUBISSPY) as all the malware’s payload is a package called watchdog.
[ { "end_offset": 119, "id": 51263, "label": "malware", "start_offset": 111 }, { "end_offset": 60, "id": 51262, "label": "malware", "start_offset": 41 }, { "end_offset": 39, "id": 16073, "label": "malware", "start_offset": 30 } ]
[ { "from_id": 51262, "id": 1072, "to_id": 16073, "type": "duplicate-of" } ]
3,788
At the time, we found ChessMaster targeting different sectors from the academe to media and government agencies in Japan.
[ { "end_offset": 33, "id": 49628, "label": "campaign", "start_offset": 22 }, { "end_offset": 111, "id": 49629, "label": "identity", "start_offset": 71 }, { "end_offset": 120, "id": 49630, "label": "location", "start_offset": 115 } ]
[ { "from_id": 49628, "id": 851, "to_id": 49629, "type": "targets" }, { "from_id": 49629, "id": 852, "to_id": 49630, "type": "located-at" } ]
3,833
Base64 encoded ANEL downloaded by Koadic ANEL will send the infected environment’s information to the C&C server.
[ { "end_offset": 19, "id": 49689, "label": "malware", "start_offset": 15 }, { "end_offset": 40, "id": 49690, "label": "malware", "start_offset": 34 }, { "end_offset": 45, "id": 49691, "label": "malware", "start_offset": 41 }, { "end_offset": 112, "id": 49692, "label": "Infrastucture", "start_offset": 102 } ]
[ { "from_id": 49690, "id": 860, "to_id": 49689, "type": "downloads" }, { "from_id": 49691, "id": 861, "to_id": 49692, "type": "exfiltrates-to" } ]
4,830
Recently observed COLDRIVER indicators: In another campaign tracked by CERT-UA as UAC-0056 we observed compromised email addresses of a Regional Prosecutor’s office of Ukraine leveraged to send malicious Microsoft Excel documents with VBA macros delivering Cobalt Strike.
[ { "end_offset": 78, "id": 50783, "label": "identity", "start_offset": 71 }, { "end_offset": 219, "id": 50785, "label": "SOFTWARE", "start_offset": 204 }, { "end_offset": 270, "id": 50786, "label": "tools", "start_offset": 257 }, { "end_offset": 175, "id": 50784, "label": "identity", "start_offset": 136 }, { "end_offset": 27, "id": 14710, "label": "threat-actor", "start_offset": 18 }, { "end_offset": 90, "id": 14713, "label": "threat-actor", "start_offset": 82 } ]
[ { "from_id": 14713, "id": 1015, "to_id": 14710, "type": "duplicate-of" }, { "from_id": 14710, "id": 1016, "to_id": 50784, "type": "targets" }, { "from_id": 14710, "id": 1017, "to_id": 50785, "type": "uses" }, { "from_id": 14710, "id": 1018, "to_id": 50786, "type": "uses" } ]
4,626
As part of TAG's mission to counter serious threats to Google and our users, we've analyzed a range of persistent threats including APT35 and Charming Kitten, an Iranian government-backed group that regularly targets high risk users.
[ { "end_offset": 61, "id": 50537, "label": "identity", "start_offset": 55 }, { "end_offset": 137, "id": 50538, "label": "threat-actor", "start_offset": 132 }, { "end_offset": 157, "id": 50539, "label": "threat-actor", "start_offset": 142 }, { "end_offset": 169, "id": 50540, "label": "location", "start_offset": 162 }, { "end_offset": 14, "id": 50536, "label": "identity", "start_offset": 11 } ]
[ { "from_id": 50538, "id": 980, "to_id": 50540, "type": "located-at" }, { "from_id": 50539, "id": 981, "to_id": 50540, "type": "located-at" } ]
3,392
BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 36e3fcd6a4c7c9db985be77ea6394b2ed019332fdae4739df2f96a541ea52617 Silverlight.exe
[ { "end_offset": 11, "id": 10242, "label": "malware", "start_offset": 0 }, { "end_offset": 110, "id": 10243, "label": "hash", "start_offset": 46 }, { "end_offset": 44, "id": 49045, "label": "malware", "start_offset": 20 }, { "end_offset": 127, "id": 49046, "label": "FILEPATH", "start_offset": 112 } ]
[ { "from_id": 10242, "id": 596, "to_id": 49045, "type": "duplicate-of" }, { "from_id": 49046, "id": 597, "to_id": 10243, "type": "duplicate-of" }, { "from_id": 49046, "id": 598, "to_id": 49045, "type": "indicates" }, { "from_id": 10243, "id": 599, "to_id": 49045, "type": "indicates" } ]
4,497
The actors behind this campaign, which we attributed to a government-backed entity based in North Korea, have employed a number of means to target researchers.
[ { "end_offset": 31, "id": 50299, "label": "campaign", "start_offset": 23 }, { "end_offset": 103, "id": 50300, "label": "location", "start_offset": 92 } ]
[ { "from_id": 50299, "id": 942, "to_id": 50300, "type": "attributed-to" } ]
3,748
CVE-2022-22954, a remote code execution (RCE) vulnerability due to server-side template injection in VMware Workspace ONE Access and Identity Manager, is trivial to exploit with a single HTTP request to a vulnerable device.
[ { "end_offset": 46, "id": 49573, "label": "attack-pattern", "start_offset": 19 }, { "end_offset": 98, "id": 49574, "label": "attack-pattern", "start_offset": 68 }, { "end_offset": 15, "id": 49572, "label": "vulnerability", "start_offset": 1 }, { "end_offset": 150, "id": 49575, "label": "SOFTWARE", "start_offset": 102 } ]
[ { "from_id": 49575, "id": 830, "to_id": 49572, "type": "has" }, { "from_id": 49572, "id": 831, "to_id": 49573, "type": "uses" }, { "from_id": 49572, "id": 832, "to_id": 49574, "type": "uses" } ]
3,661
MITRE also identifies different main targets for each group: While Carbanak focuses on banking institutions, FIN7 targets food, hospitality, and retail establishments.
[ { "end_offset": 75, "id": 49437, "label": "threat-actor", "start_offset": 67 }, { "end_offset": 113, "id": 49438, "label": "threat-actor", "start_offset": 109 }, { "end_offset": 5, "id": 49436, "label": "identity", "start_offset": 0 }, { "end_offset": 107, "id": 49439, "label": "identity", "start_offset": 87 }, { "end_offset": 166, "id": 49440, "label": "identity", "start_offset": 122 } ]
[ { "from_id": 49437, "id": 795, "to_id": 49439, "type": "targets" }, { "from_id": 49438, "id": 796, "to_id": 49440, "type": "targets" } ]
3,173
What makes BIOPASS RAT particularly interesting is that it can sniff its victim’s screen by abusing the framework of Open Broadcaster Software (OBS) Studio, a popular live streaming and video recording app, to establish live streaming to a cloud service via Real-Time Messaging Protocol (RTMP).
[ { "end_offset": 22, "id": 48296, "label": "malware", "start_offset": 11 }, { "end_offset": 293, "id": 48298, "label": "SOFTWARE", "start_offset": 258 }, { "end_offset": 148, "id": 48297, "label": "SOFTWARE", "start_offset": 117 } ]
[ { "from_id": 48296, "id": 400, "to_id": 48297, "type": "targets" } ]
1,569
Bad Rabbit is a ransomware attack that, at the time of this writing, appears to primarily be affecting countries in Eastern Europe.
[ { "end_offset": 11, "id": 45059, "label": "malware", "start_offset": 1 }, { "end_offset": 131, "id": 45060, "label": "location", "start_offset": 117 } ]
[ { "from_id": 45059, "id": 75, "to_id": 45060, "type": "targets" } ]
3,384
BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 3195c355aa564ea66b4b37baa9547cb53dde7cf4ae7010256db92fff0bde873d flash.exe
[ { "end_offset": 11, "id": 10232, "label": "malware", "start_offset": 0 }, { "end_offset": 110, "id": 10233, "label": "hash", "start_offset": 46 }, { "end_offset": 44, "id": 49035, "label": "malware", "start_offset": 20 }, { "end_offset": 121, "id": 49036, "label": "FILEPATH", "start_offset": 112 } ]
[ { "from_id": 10232, "id": 582, "to_id": 49035, "type": "duplicate-of" }, { "from_id": 49036, "id": 583, "to_id": 10233, "type": "duplicate-of" }, { "from_id": 49036, "id": 584, "to_id": 49035, "type": "indicates" }, { "from_id": 10233, "id": 585, "to_id": 49035, "type": "indicates" } ]
2,027
While the obfuscation and execution may differ between the two, both samples contain very similar core functionality, due to the author copying the leaked Babuk/Babyk source code in order to develop the HelloXD ransomware (Figure 7).
[ { "end_offset": 210, "id": 47122, "label": "malware", "start_offset": 203 }, { "end_offset": 166, "id": 47121, "label": "malware", "start_offset": 161 }, { "end_offset": 160, "id": 47120, "label": "malware", "start_offset": 155 } ]
[ { "from_id": 47121, "id": 303, "to_id": 47122, "type": "variant-of" }, { "from_id": 47120, "id": 304, "to_id": 47122, "type": "variant-of" } ]
13,472
We continue to see attacks from groups like Charming Kitten on medical and healthcare professionals, including World Health Organization (WHO) employees.
[ { "end_offset": 59, "id": 51544, "label": "threat-actor", "start_offset": 44 }, { "end_offset": 142, "id": 51545, "label": "identity", "start_offset": 111 } ]
[ { "from_id": 51544, "id": 1101, "to_id": 51545, "type": "targets" } ]
3,436
This post is also available in: 日本語 (Japanese) On May 4, 2022, F5 released a security advisory for a remote code execution vulnerability in the iControlREST component of its BIG-IP product tracked in CVE-2022-1388.
[ { "end_offset": 219, "id": 49195, "label": "vulnerability", "start_offset": 206 }, { "end_offset": 142, "id": 49196, "label": "vulnerability", "start_offset": 107 }, { "end_offset": 67, "id": 49193, "label": "TIME", "start_offset": 53 }, { "end_offset": 71, "id": 49194, "label": "identity", "start_offset": 69 }, { "end_offset": 162, "id": 49197, "label": "tools", "start_offset": 150 } ]
[ { "from_id": 49196, "id": 750, "to_id": 49195, "type": "duplicate-of" }, { "from_id": 49197, "id": 751, "to_id": 49195, "type": "has" } ]
2,597
This initial focus has led to speculation that Lapsus$ Group may be Brazilian, although we understand the choice of targets to have been influenced by extended team members rather than the team leadership.
[ { "end_offset": 54, "id": 47788, "label": "threat-actor", "start_offset": 47 }, { "end_offset": 77, "id": 47789, "label": "location", "start_offset": 68 } ]
[ { "from_id": 47788, "id": 356, "to_id": 47789, "type": "located-at" } ]
4,585
In March 2021, Microsoft kicked off the patch cycle early after releasing an advisory regarding the mass exploitation of four zero-days vulnerabilities by a Chinese Hacking group, HAFNIUM, on the on-premises versions of the Microsoft Exchange Server.
[ { "end_offset": 13, "id": 50436, "label": "TIME", "start_offset": 3 }, { "end_offset": 24, "id": 50437, "label": "identity", "start_offset": 15 }, { "end_offset": 151, "id": 50438, "label": "vulnerability", "start_offset": 126 }, { "end_offset": 187, "id": 50439, "label": "threat-actor", "start_offset": 180 }, { "end_offset": 164, "id": 50440, "label": "location", "start_offset": 157 }, { "end_offset": 249, "id": 50441, "label": "SOFTWARE", "start_offset": 196 } ]
[ { "from_id": 50439, "id": 971, "to_id": 50440, "type": "located-at" }, { "from_id": 50439, "id": 972, "to_id": 50438, "type": "exploits" }, { "from_id": 50441, "id": 973, "to_id": 50438, "type": "has" } ]
1,712
In this case a legitimate service (Tor) was being abused by CryptoWall so it could avoid having its C2 servers shut down.
[ { "end_offset": 70, "id": 5086, "label": "malware", "start_offset": 60 }, { "end_offset": 38, "id": 5085, "label": "tools", "start_offset": 35 } ]
[ { "from_id": 5086, "id": 249, "to_id": 5085, "type": "uses" } ]
5,060
Recently observed COLDRIVER credential phishing domains: Ghostwriter, a Belarusian threat actor, recently introduced a new capability into their credential phishing campaigns.
[ { "end_offset": 82, "id": 51165, "label": "location", "start_offset": 72 }, { "end_offset": 174, "id": 51166, "label": "campaign", "start_offset": 145 }, { "end_offset": 27, "id": 15621, "label": "threat-actor", "start_offset": 18 }, { "end_offset": 68, "id": 15623, "label": "threat-actor", "start_offset": 57 } ]
[ { "from_id": 15623, "id": 1064, "to_id": 51165, "type": "located-at" }, { "from_id": 15623, "id": 1065, "to_id": 51166, "type": "uses" } ]
4,823
Ghostwriter/UNC1151, a threat actor attributed to Belarus, has remained active targeting accounts of webmail and social media networks of Polish users.
[ { "end_offset": 11, "id": 50766, "label": "threat-actor", "start_offset": 0 }, { "end_offset": 19, "id": 50767, "label": "threat-actor", "start_offset": 12 }, { "end_offset": 57, "id": 50768, "label": "location", "start_offset": 50 } ]
[ { "from_id": 50767, "id": 1011, "to_id": 50766, "type": "duplicate-of" }, { "from_id": 50766, "id": 1012, "to_id": 50768, "type": "attributed-to" } ]
1,819
Additional tools and components were copied to the compromised machine using AnyDeskMSI to scan the local network and disable security products.
[ { "end_offset": 87, "id": 46934, "label": "tools", "start_offset": 77 }, { "end_offset": 113, "id": 46936, "label": "attack-pattern", "start_offset": 91 }, { "end_offset": 143, "id": 46937, "label": "attack-pattern", "start_offset": 118 } ]
[ { "from_id": 46934, "id": 265, "to_id": 46936, "type": "uses" }, { "from_id": 46934, "id": 266, "to_id": 46937, "type": "uses" } ]
3,400
BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 7f4e02a041ca7cfbdc79b96a890822fd7c37be67b1f6c9e07596e6aec57ccdc0 Silverlight.exe
[ { "end_offset": 11, "id": 10263, "label": "malware", "start_offset": 0 }, { "end_offset": 110, "id": 10264, "label": "hash", "start_offset": 46 }, { "end_offset": 44, "id": 49064, "label": "malware", "start_offset": 20 }, { "end_offset": 127, "id": 49065, "label": "FILEPATH", "start_offset": 112 } ]
[ { "from_id": 10263, "id": 636, "to_id": 49064, "type": "duplicate-of" }, { "from_id": 49065, "id": 637, "to_id": 10264, "type": "duplicate-of" }, { "from_id": 10264, "id": 638, "to_id": 49064, "type": "indicates" }, { "from_id": 49065, "id": 639, "to_id": 49064, "type": "indicates" } ]
3,719
In both Carbanak and FIN7 attacks, communication with users’ compromised systems is done through bypassing firewalls or network detection systems via commonly used ports, using connection proxies to avoid direct connections to the threat group’s infrastructure, employing the command-and-control channel to remotely copy files from an external system, blending in with existing network traffic by using standard application layer protocol, and taking advantage of standard cryptographic protocol to disguise command-and-control traffic.
[ { "end_offset": 16, "id": 49518, "label": "threat-actor", "start_offset": 8 }, { "end_offset": 25, "id": 49519, "label": "threat-actor", "start_offset": 21 }, { "end_offset": 116, "id": 49520, "label": "attack-pattern", "start_offset": 97 }, { "end_offset": 195, "id": 49521, "label": "attack-pattern", "start_offset": 171 }, { "end_offset": 393, "id": 49522, "label": "attack-pattern", "start_offset": 352 } ]
[ { "from_id": 49518, "id": 817, "to_id": 49519, "type": "related-to" }, { "from_id": 49519, "id": 818, "to_id": 49520, "type": "uses" }, { "from_id": 49519, "id": 819, "to_id": 49521, "type": "uses" }, { "from_id": 49519, "id": 820, "to_id": 49522, "type": "uses" } ]
1,708
Last year we highlighted two malware families on this blog: CryptoWall 2.0 and Dyreza/Dyre.
[ { "end_offset": 75, "id": 46883, "label": "malware", "start_offset": 61 }, { "end_offset": 86, "id": 46884, "label": "malware", "start_offset": 80 }, { "end_offset": 91, "id": 46885, "label": "malware", "start_offset": 87 } ]
[ { "from_id": 46884, "id": 247, "to_id": 46885, "type": "duplicate-of" } ]
4,587
The vulnerability has been dubbed as ProxyLogon by the researchers at DEVCORE, who are credited with finding the bugs in the proxy architecture and the logon mechanism of Exchange.
[ { "end_offset": 180, "id": 50446, "label": "SOFTWARE", "start_offset": 172 }, { "end_offset": 48, "id": 50444, "label": "vulnerability", "start_offset": 38 }, { "end_offset": 78, "id": 50445, "label": "identity", "start_offset": 71 } ]
[ { "from_id": 50446, "id": 974, "to_id": 50444, "type": "has" } ]
106
Similarly, DarkSide operators used Mega client for exfiltrating files to cloud storage, 7-Zip for archiving, and PuTTY application for network file transfers.
[ { "end_offset": 29, "id": 45834, "label": "threat-actor", "start_offset": 11 }, { "end_offset": 46, "id": 45835, "label": "tools", "start_offset": 35 }, { "end_offset": 93, "id": 45836, "label": "tools", "start_offset": 88 }, { "end_offset": 118, "id": 45837, "label": "tools", "start_offset": 113 } ]
[ { "from_id": 45834, "id": 120, "to_id": 45835, "type": "uses" }, { "from_id": 45834, "id": 121, "to_id": 45836, "type": "uses" }, { "from_id": 45834, "id": 122, "to_id": 45837, "type": "uses" } ]
3,410
BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A ba44c22a3224c3a201202b69d86df2a78f0cd1d4ac1119eb29cae33f09027a9a Silverlight2.exe
[ { "end_offset": 11, "id": 10289, "label": "malware", "start_offset": 0 }, { "end_offset": 110, "id": 10290, "label": "hash", "start_offset": 46 }, { "end_offset": 44, "id": 49090, "label": "malware", "start_offset": 20 }, { "end_offset": 128, "id": 49091, "label": "FILEPATH", "start_offset": 112 } ]
[ { "from_id": 10289, "id": 681, "to_id": 49090, "type": "duplicate-of" }, { "from_id": 49091, "id": 682, "to_id": 10290, "type": "duplicate-of" }, { "from_id": 49091, "id": 683, "to_id": 49090, "type": "indicates" }, { "from_id": 10290, "id": 684, "to_id": 49090, "type": "indicates" } ]
3,390
test4.exe BIOPASS RAT Loader Backdoor.Win32.BIOPASS.A 3589e53c59d9807cca709387bbcaaffc7e24e15d9a78425b717fc55c779b928e
[ { "end_offset": 22, "id": 10240, "label": "malware", "start_offset": 11 }, { "end_offset": 121, "id": 10241, "label": "hash", "start_offset": 57 }, { "end_offset": 9, "id": 49042, "label": "FILEPATH", "start_offset": 0 }, { "end_offset": 55, "id": 49043, "label": "malware", "start_offset": 31 } ]
[ { "from_id": 49042, "id": 592, "to_id": 49043, "type": "indicates" }, { "from_id": 10241, "id": 593, "to_id": 49043, "type": "indicates" }, { "from_id": 10240, "id": 594, "to_id": 49043, "type": "duplicate-of" }, { "from_id": 49042, "id": 595, "to_id": 10241, "type": "duplicate-of" } ]
4,265
One file stealer (cca74bb322ad7833a21209b1418c9837e30983daec30d199a839f46075ee72f2, Detected as TSPY_DELF.SUW) published by security researchers in 2013 and linked to the domain myflatnet[.]com, was attributed by several parties to the Hangover group.
[ { "end_offset": 250, "id": 50067, "label": "threat-actor", "start_offset": 236 }, { "end_offset": 82, "id": 50063, "label": "hash", "start_offset": 18 }, { "end_offset": 109, "id": 50064, "label": "malware", "start_offset": 96 }, { "end_offset": 152, "id": 50065, "label": "TIME", "start_offset": 148 }, { "end_offset": 193, "id": 50066, "label": "url", "start_offset": 178 } ]
[ { "from_id": 50063, "id": 911, "to_id": 50064, "type": "indicates" }, { "from_id": 50064, "id": 912, "to_id": 50066, "type": "communicates-with" }, { "from_id": 50064, "id": 913, "to_id": 50067, "type": "attributed-to" } ]
2,399
Two days later on March 31, 2022, Spring released version 5.3.18 and 5.2.20 of Spring Framework to patch another more severe vulnerability tracked in CVE-2022-22965.
[ { "end_offset": 32, "id": 47472, "label": "TIME", "start_offset": 18 }, { "end_offset": 40, "id": 47473, "label": "SOFTWARE", "start_offset": 34 }, { "end_offset": 95, "id": 47474, "label": "SOFTWARE", "start_offset": 79 }, { "end_offset": 164, "id": 47475, "label": "vulnerability", "start_offset": 150 } ]
[ { "from_id": 47474, "id": 333, "to_id": 47475, "type": "has" } ]
14,408
Leverage WMI for fileless intrusion Execute Powershell script for fileless intrusion
[ { "end_offset": 84, "id": 47166, "label": "attack-pattern", "start_offset": 66 }, { "end_offset": 54, "id": 44534, "label": "tools", "start_offset": 44 } ]
[ { "from_id": 44534, "id": 309, "to_id": 47166, "type": "uses" } ]
564
After infection, Virlock hides the file extension through modification of the registry (HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = 1, HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Hidden = 2).
[ { "end_offset": 164, "id": 1874, "label": "REGISTRYKEY", "start_offset": 88 }, { "end_offset": 241, "id": 1876, "label": "REGISTRYKEY", "start_offset": 170 }, { "end_offset": 24, "id": 44778, "label": "malware", "start_offset": 17 } ]
[ { "from_id": 1874, "id": 165, "to_id": 44778, "type": "indicates" }, { "from_id": 1876, "id": 166, "to_id": 44778, "type": "indicates" } ]
2,313
The exploit chain combined an RCE in WebKit exploiting CVE-2021-1789 which was patched on Jan 5, 2021 before discovery of this campaign and a 0-day local privilege escalation in XNU (CVE-2021-30869) patched on Sept 23, 2021.
[ { "end_offset": 68, "id": 45456, "label": "vulnerability", "start_offset": 55 }, { "end_offset": 181, "id": 45462, "label": "SOFTWARE", "start_offset": 178 }, { "end_offset": 223, "id": 45460, "label": "TIME", "start_offset": 210 }, { "end_offset": 174, "id": 45461, "label": "attack-pattern", "start_offset": 148 }, { "end_offset": 43, "id": 45457, "label": "SOFTWARE", "start_offset": 37 }, { "end_offset": 101, "id": 45458, "label": "TIME", "start_offset": 90 }, { "end_offset": 197, "id": 45459, "label": "vulnerability", "start_offset": 183 } ]
[ { "from_id": 45456, "id": 98, "to_id": 45457, "type": "has" }, { "from_id": 45459, "id": 99, "to_id": 45462, "type": "has" } ]
3,370
.Python.BIOPASS.A e479823aa41d3f6416233dba8e765cf2abaa38ad18328859a20b88df7f1d88d5 sc2.txt BIOPASS RAT encoded Cobalt Strike shellcode Trojan.Win32.COBEACON.A e567fd0f08fdafc5a89c9084373f3308ef464918ff7e4ecd7fb3135d777e946d sc3.txt
[ { "end_offset": 105, "id": 10186, "label": "malware", "start_offset": 94 }, { "end_offset": 127, "id": 10187, "label": "tools", "start_offset": 114 }, { "end_offset": 228, "id": 10188, "label": "hash", "start_offset": 164 }, { "end_offset": 83, "id": 10185, "label": "hash", "start_offset": 19 }, { "end_offset": 162, "id": 48989, "label": "malware", "start_offset": 139 }, { "end_offset": 17, "id": 48987, "label": "malware", "start_offset": 1 }, { "end_offset": 92, "id": 48988, "label": "FILEPATH", "start_offset": 85 }, { "end_offset": 237, "id": 48990, "label": "FILEPATH", "start_offset": 230 } ]
[ { "from_id": 10185, "id": 548, "to_id": 10186, "type": "indicates" }, { "from_id": 48988, "id": 549, "to_id": 10186, "type": "indicates" }, { "from_id": 10187, "id": 553, "to_id": 48989, "type": "related-to" }, { "from_id": 48987, "id": 550, "to_id": 10186, "type": "duplicate-of" }, { "from_id": 10185, "id": 551, "to_id": 48988, "type": "duplicate-of" }, { "from_id": 10186, "id": 552, "to_id": 10187, "type": "uses" }, { "from_id": 10188, "id": 554, "to_id": 48989, "type": "indicates" }, { "from_id": 48990, "id": 555, "to_id": 48989, "type": "indicates" }, { "from_id": 48989, "id": 556, "to_id": 10186, "type": "duplicate-of" } ]
4,459
In 2017, Android – which is owned by Google – was the first mobile platform to warn users about NSO Group’s Pegasus spyware.
[ { "end_offset": 115, "id": 50241, "label": "malware", "start_offset": 108 }, { "end_offset": 7, "id": 50237, "label": "TIME", "start_offset": 3 }, { "end_offset": 105, "id": 50240, "label": "threat-actor", "start_offset": 96 }, { "end_offset": 16, "id": 50238, "label": "SOFTWARE", "start_offset": 9 }, { "end_offset": 43, "id": 50239, "label": "identity", "start_offset": 37 } ]
[ { "from_id": 50241, "id": 933, "to_id": 50240, "type": "authored-by" } ]
4,818
Consistent with CERT-UA reporting, TAG observed multiple Russian GRU actors - APT28 and Sandworm - conduct campaigns exploiting the Follina vulnerability.
[ { "end_offset": 38, "id": 50750, "label": "identity", "start_offset": 35 }, { "end_offset": 75, "id": 50751, "label": "identity", "start_offset": 57 }, { "end_offset": 83, "id": 50752, "label": "threat-actor", "start_offset": 78 }, { "end_offset": 96, "id": 50753, "label": "threat-actor", "start_offset": 88 }, { "end_offset": 23, "id": 50749, "label": "identity", "start_offset": 16 }, { "end_offset": 153, "id": 50754, "label": "vulnerability", "start_offset": 132 } ]
[ { "from_id": 50753, "id": 1006, "to_id": 50754, "type": "exploits" }, { "from_id": 50752, "id": 1007, "to_id": 50754, "type": "exploits" } ]
234
We monitored a list of 50 legitimate Ukraine-related domains (e.g., popular news and donation websites) and keywords (e.g., Ukraine, refugee) as targets for cybersquatting.
[ { "end_offset": 132, "id": 45781, "label": "location", "start_offset": 125 }, { "end_offset": 45, "id": 45934, "label": "location", "start_offset": 38 }, { "end_offset": 172, "id": 44651, "label": "attack-pattern", "start_offset": 158 } ]
[ { "from_id": 44651, "id": 137, "to_id": 45781, "type": "targets" } ]
3,830
If Koadic finds that the system is conducive to the attacker’s interests, it downloads a base64-encrypted version of the ANEL malware from the Command-and-Control (C&C) server and executes it. Encrypted ANEL is decrypted using the “certutil -docode” command.
[ { "end_offset": 125, "id": 11615, "label": "malware", "start_offset": 121 }, { "end_offset": 208, "id": 11618, "label": "malware", "start_offset": 204 }, { "end_offset": 9, "id": 49688, "label": "malware", "start_offset": 3 } ]
[ { "from_id": 49688, "id": 859, "to_id": 11615, "type": "downloads" } ]
2,365
For those interested in following our in-the-wild work, we will soon publish details surrounding another, unrelated campaign we discovered using two Chrome 0-days (CVE-2021-37973 and CVE-2021-37976).
[ { "end_offset": 197, "id": 47418, "label": "vulnerability", "start_offset": 183 }, { "end_offset": 155, "id": 47419, "label": "SOFTWARE", "start_offset": 149 }, { "end_offset": 178, "id": 47417, "label": "vulnerability", "start_offset": 164 } ]
[ { "from_id": 47419, "id": 319, "to_id": 47417, "type": "has" }, { "from_id": 47419, "id": 320, "to_id": 47418, "type": "has" } ]
14,071
Figure 9 shows that SLUB used “Windows-RT-KB-2937636.dll,” while Freenki used “Windows-KB275122-x86.exe.” Figure 9 Naming convention for persistence.
[ { "end_offset": 103, "id": 47392, "label": "FILEPATH", "start_offset": 79 }, { "end_offset": 56, "id": 47389, "label": "FILEPATH", "start_offset": 31 }, { "end_offset": 73, "id": 47395, "label": "malware", "start_offset": 65 }, { "end_offset": 24, "id": 43549, "label": "malware", "start_offset": 20 } ]
[ { "from_id": 43549, "id": 316, "to_id": 47389, "type": "uses" }, { "from_id": 47395, "id": 317, "to_id": 47392, "type": "uses" } ]
1,584
Reports indicate that it harvests credentials using Mimikatz and Maarten van Dantzig reports it also uses common hardcoded credentials to spread.
[ { "end_offset": 60, "id": 45067, "label": "tools", "start_offset": 52 }, { "end_offset": 84, "id": 45068, "label": "identity", "start_offset": 65 }, { "end_offset": 45, "id": 45069, "label": "attack-pattern", "start_offset": 25 } ]
[ { "from_id": 45069, "id": 76, "to_id": 45067, "type": "uses" } ]
3,558
Examining the Capesand samples The simplified diagram taken from the previous blog shows the combination of ConfuserEx and Cassandra via the second layer of obfuscation protection, which involves the DLL CyaX_Sharp Assembly (both CyaX_Sharp and CyaX are part of the Cassandra protector).
[ { "end_offset": 22, "id": 49341, "label": "malware", "start_offset": 14 }, { "end_offset": 118, "id": 49342, "label": "tools", "start_offset": 108 }, { "end_offset": 132, "id": 49343, "label": "tools", "start_offset": 123 }, { "end_offset": 240, "id": 49344, "label": "tools", "start_offset": 230 }, { "end_offset": 249, "id": 49345, "label": "tools", "start_offset": 245 }, { "end_offset": 285, "id": 49346, "label": "tools", "start_offset": 266 } ]
[ { "from_id": 49341, "id": 787, "to_id": 49342, "type": "uses" }, { "from_id": 49341, "id": 788, "to_id": 49343, "type": "uses" } ]
5,057
However, for the first time, TAG has observed COLDRIVER campaigns targeting the military of multiple Eastern European countries, as well as a NATO Centre of Excellence.
[ { "end_offset": 167, "id": 51162, "label": "identity", "start_offset": 142 }, { "end_offset": 32, "id": 51159, "label": "identity", "start_offset": 29 }, { "end_offset": 55, "id": 51160, "label": "threat-actor", "start_offset": 46 }, { "end_offset": 127, "id": 51161, "label": "identity", "start_offset": 101 } ]
[ { "from_id": 51160, "id": 1062, "to_id": 51161, "type": "targets" }, { "from_id": 51160, "id": 1063, "to_id": 51162, "type": "targets" } ]
2,427
Early in 2010, CVE-2010-1622 was assigned to a remote code execution vulnerability in the Spring Framework.
[ { "end_offset": 28, "id": 45513, "label": "vulnerability", "start_offset": 15 }, { "end_offset": 106, "id": 45514, "label": "SOFTWARE", "start_offset": 90 }, { "end_offset": 68, "id": 45515, "label": "attack-pattern", "start_offset": 47 }, { "end_offset": 13, "id": 45512, "label": "TIME", "start_offset": 0 } ]
[ { "from_id": 45514, "id": 106, "to_id": 45513, "type": "has" }, { "from_id": 45515, "id": 107, "to_id": 45513, "type": "uses" } ]
13,146
Tropic Trooper, a threat actor group that targets government, military, healthcare, transportation, and high-tech industries in Taiwan, the Philippines, and Hong Kong, has been active since 2011.
[ { "end_offset": 124, "id": 48920, "label": "identity", "start_offset": 104 }, { "end_offset": 151, "id": 48922, "label": "location", "start_offset": 140 }, { "end_offset": 194, "id": 48924, "label": "TIME", "start_offset": 184 }, { "end_offset": 60, "id": 48916, "label": "identity", "start_offset": 50 }, { "end_offset": 134, "id": 48921, "label": "location", "start_offset": 128 }, { "end_offset": 14, "id": 48915, "label": "threat-actor", "start_offset": 0 }, { "end_offset": 70, "id": 48917, "label": "identity", "start_offset": 62 }, { "end_offset": 82, "id": 48918, "label": "identity", "start_offset": 72 }, { "end_offset": 98, "id": 48919, "label": "identity", "start_offset": 84 }, { "end_offset": 166, "id": 48923, "label": "location", "start_offset": 157 } ]
[ { "from_id": 48920, "id": 491, "to_id": 48921, "type": "located-at" }, { "from_id": 48916, "id": 492, "to_id": 48921, "type": "located-at" }, { "from_id": 48915, "id": 487, "to_id": 48917, "type": "targets" }, { "from_id": 48915, "id": 488, "to_id": 48918, "type": "targets" }, { "from_id": 48915, "id": 489, "to_id": 48919, "type": "targets" }, { "from_id": 48916, "id": 494, "to_id": 48922, "type": "located-at" }, { "from_id": 48916, "id": 495, "to_id": 48923, "type": "located-at" }, { "from_id": 48917, "id": 496, "to_id": 48921, "type": "located-at" }, { "from_id": 48915, "id": 497, "to_id": 48916, "type": "targets" }, { "from_id": 48915, "id": 498, "to_id": 48924, "type": "related-to" }, { "from_id": 48918, "id": 493, "to_id": 48922, "type": "targets" } ]
3,502
Based on the controller’s behavior, we can posit that both Marade and Protux were authored by the same threat actors.
[ { "end_offset": 76, "id": 49298, "label": "malware", "start_offset": 70 }, { "end_offset": 65, "id": 49297, "label": "malware", "start_offset": 59 } ]
[ { "from_id": 49297, "id": 780, "to_id": 49298, "type": "variant-of" } ]
1,359
Using our PoC, we created the following demonstration video of how a malicious actor would exploit the CVE-2021-32648 vulnerability, log into the compromised OctoberCMS account and to deface a web page hosted by the server:
[ { "end_offset": 117, "id": 44975, "label": "vulnerability", "start_offset": 103 }, { "end_offset": 168, "id": 44976, "label": "SOFTWARE", "start_offset": 158 } ]
[ { "from_id": 44976, "id": 49, "to_id": 44975, "type": "has" } ]
14,221
When it is loaded by the system, DLLMain decrypts the payload via CryptUnprotectData.
[ { "end_offset": 84, "id": 48251, "label": "tools", "start_offset": 66 }, { "end_offset": 41, "id": 48252, "label": "malware", "start_offset": 33 } ]
[ { "from_id": 48252, "id": 395, "to_id": 48251, "type": "uses" } ]
2,561
We do believe there is evidence suggestive of a connection between Shamoon 2 and the Magic Hound campaign, which could indicate these two attack campaigns could have worked in conjunction with each other to execute the Shamoon 2 attacks.
[ { "end_offset": 105, "id": 47761, "label": "campaign", "start_offset": 85 }, { "end_offset": 76, "id": 47760, "label": "campaign", "start_offset": 67 }, { "end_offset": 228, "id": 47762, "label": "campaign", "start_offset": 219 } ]
[ { "from_id": 47761, "id": 350, "to_id": 47760, "type": "related-to" } ]
1,872
Avast responded to our notification with this statement: "We can confirm the vulnerability in an old version of our driver aswArPot.sys, which we fixed in our Avast 21.5 released in June 2021.
[ { "end_offset": 135, "id": 45157, "label": "FILEPATH", "start_offset": 123 }, { "end_offset": 169, "id": 45158, "label": "SOFTWARE", "start_offset": 159 }, { "end_offset": 191, "id": 45159, "label": "TIME", "start_offset": 182 }, { "end_offset": 5, "id": 45160, "label": "identity", "start_offset": 0 } ]
[ { "from_id": 45158, "id": 286, "to_id": 45157, "type": "consists-of" } ]
4,573
COLDRIVER, a Russian-based threat actor sometimes referred to as Callisto, continues to send credential phishing emails to targets including government and defense officials, politicians, NGOs and think tanks, and journalists.
[ { "end_offset": 73, "id": 50416, "label": "threat-actor", "start_offset": 65 }, { "end_offset": 9, "id": 50415, "label": "threat-actor", "start_offset": 0 }, { "end_offset": 119, "id": 50417, "label": "attack-pattern", "start_offset": 88 } ]
[ { "from_id": 50416, "id": 967, "to_id": 50415, "type": "duplicate-of" }, { "from_id": 50415, "id": 968, "to_id": 50417, "type": "uses" } ]
4,930
In this blog, we explore some of the most notable campaigns we’ve disrupted this year from a different government-backed attacker: APT35, an Iranian group, which regularly conducts phishing campaigns targeting high risk users.
[ { "end_offset": 136, "id": 50945, "label": "threat-actor", "start_offset": 131 }, { "end_offset": 148, "id": 50947, "label": "location", "start_offset": 141 } ]
[ { "from_id": 50945, "id": 1033, "to_id": 50947, "type": "located-at" } ]
1,986
This post is also available in: 日本語 (Japanese) HelloXD is a ransomware family performing double extortion attacks that surfaced in November 2021.
[ { "end_offset": 60, "id": 45202, "label": "malware", "start_offset": 53 }, { "end_offset": 150, "id": 45203, "label": "TIME", "start_offset": 137 }, { "end_offset": 111, "id": 45205, "label": "attack-pattern", "start_offset": 95 } ]
[ { "from_id": 45202, "id": 81, "to_id": 45205, "type": "uses" } ]
3,798
When we tracked ChessMaster back in November, we noted that it exploited the SOAP WSDL parser vulnerability CVE-2017-8759 (patched in September 2017) within the Microsoft .NET framework to download additional malware.
[ { "end_offset": 27, "id": 49661, "label": "malware", "start_offset": 16 }, { "end_offset": 148, "id": 49664, "label": "TIME", "start_offset": 134 }, { "end_offset": 121, "id": 49666, "label": "vulnerability", "start_offset": 77 }, { "end_offset": 44, "id": 49662, "label": "TIME", "start_offset": 36 }, { "end_offset": 185, "id": 49667, "label": "SOFTWARE", "start_offset": 161 } ]
[ { "from_id": 49661, "id": 854, "to_id": 49666, "type": "exploits" }, { "from_id": 49667, "id": 855, "to_id": 49666, "type": "has" } ]
3,730
On April 6, 2022, VMware published a security advisory mentioning eight vulnerabilities, including CVE-2022-22954 and CVE-2022-22960 impacting their products VMware Workspace ONE Access, Identity Manager and vRealize Automation.
[ { "end_offset": 113, "id": 49530, "label": "vulnerability", "start_offset": 99 }, { "end_offset": 132, "id": 49531, "label": "vulnerability", "start_offset": 118 }, { "end_offset": 203, "id": 49533, "label": "SOFTWARE", "start_offset": 187 }, { "end_offset": 227, "id": 49534, "label": "SOFTWARE", "start_offset": 208 }, { "end_offset": 185, "id": 49532, "label": "SOFTWARE", "start_offset": 158 }, { "end_offset": 16, "id": 49528, "label": "TIME", "start_offset": 3 }, { "end_offset": 24, "id": 49529, "label": "identity", "start_offset": 18 } ]
[ { "from_id": 49532, "id": 821, "to_id": 49530, "type": "has" }, { "from_id": 49532, "id": 822, "to_id": 49531, "type": "has" }, { "from_id": 49533, "id": 823, "to_id": 49530, "type": "has" }, { "from_id": 49533, "id": 824, "to_id": 49531, "type": "has" }, { "from_id": 49534, "id": 825, "to_id": 49530, "type": "has" }, { "from_id": 49534, "id": 826, "to_id": 49531, "type": "has" } ]
3,971
As observed on CVE-2020-0688, the use of static keys — as opposed to randomly generated keys — can allow an attacker to execute arbitrary code by tricking the server into deserializing ViewState data.
[ { "end_offset": 29, "id": 49830, "label": "vulnerability", "start_offset": 16 }, { "end_offset": 143, "id": 49831, "label": "attack-pattern", "start_offset": 121 } ]
[ { "from_id": 49830, "id": 868, "to_id": 49831, "type": "uses" } ]
3,528
Protux’s latest version, 3.7, uses the open-source compiler OpenCSP to generate a session key with the RSA algorithm.
[ { "end_offset": 6, "id": 10665, "label": "malware", "start_offset": 0 }, { "end_offset": 67, "id": 49309, "label": "tools", "start_offset": 60 } ]
[ { "from_id": 10665, "id": 781, "to_id": 49309, "type": "uses" } ]
1,757
And before long, Yuki Chen (@guhe120), a Chinese researcher, posted his answer.
[ { "end_offset": 36, "id": 46908, "label": "identity", "start_offset": 28 }, { "end_offset": 26, "id": 46907, "label": "identity", "start_offset": 17 }, { "end_offset": 48, "id": 46909, "label": "location", "start_offset": 41 } ]
[ { "from_id": 46907, "id": 254, "to_id": 46908, "type": "duplicate-of" }, { "from_id": 46907, "id": 255, "to_id": 46909, "type": "located-at" }, { "from_id": 46908, "id": 256, "to_id": 46909, "type": "located-at" } ]
5,411
The vendors that were targeted by VPNFilter were Asus, D-Link, Huawei, Linksys, MikroTik, Netgear, QNAP, TP-Link, Ubiquiti, UPVEL, and ZDE.
[ { "end_offset": 103, "id": 51412, "label": "identity", "start_offset": 99 }, { "end_offset": 138, "id": 51415, "label": "identity", "start_offset": 135 }, { "end_offset": 78, "id": 51409, "label": "identity", "start_offset": 71 }, { "end_offset": 88, "id": 51410, "label": "identity", "start_offset": 80 }, { "end_offset": 43, "id": 51405, "label": "malware", "start_offset": 34 }, { "end_offset": 53, "id": 51406, "label": "identity", "start_offset": 49 }, { "end_offset": 61, "id": 51407, "label": "identity", "start_offset": 55 }, { "end_offset": 69, "id": 51408, "label": "identity", "start_offset": 63 }, { "end_offset": 97, "id": 51411, "label": "identity", "start_offset": 90 }, { "end_offset": 112, "id": 51413, "label": "identity", "start_offset": 105 }, { "end_offset": 122, "id": 51414, "label": "identity", "start_offset": 114 } ]
[ { "from_id": 51405, "id": 1084, "to_id": 51406, "type": "targets" }, { "from_id": 51405, "id": 1085, "to_id": 51407, "type": "targets" }, { "from_id": 51405, "id": 1086, "to_id": 51408, "type": "targets" }, { "from_id": 51405, "id": 1087, "to_id": 51409, "type": "targets" }, { "from_id": 51405, "id": 1089, "to_id": 51411, "type": "targets" }, { "from_id": 51405, "id": 1090, "to_id": 51412, "type": "targets" }, { "from_id": 51405, "id": 1091, "to_id": 51413, "type": "targets" }, { "from_id": 51405, "id": 1088, "to_id": 51410, "type": "targets" }, { "from_id": 51405, "id": 1092, "to_id": 51414, "type": "targets" }, { "from_id": 51405, "id": 1093, "to_id": 51415, "type": "targets" } ]
3,417
BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A d18d84d32a340d20ab07a36f9e4b959495ecd88d7b0e9799399fcc4e959f536b flash_installer.exe
[ { "end_offset": 11, "id": 10305, "label": "malware", "start_offset": 0 }, { "end_offset": 110, "id": 10306, "label": "hash", "start_offset": 46 }, { "end_offset": 44, "id": 49106, "label": "malware", "start_offset": 20 }, { "end_offset": 131, "id": 49107, "label": "FILEPATH", "start_offset": 112 } ]
[ { "from_id": 10305, "id": 709, "to_id": 49106, "type": "duplicate-of" }, { "from_id": 10306, "id": 711, "to_id": 49106, "type": "indicates" }, { "from_id": 49107, "id": 710, "to_id": 10306, "type": "duplicate-of" }, { "from_id": 49107, "id": 712, "to_id": 49106, "type": "indicates" } ]
2,013
For example, LockBit 2.0 leverages Tox Chat for threat actor communications.
[ { "end_offset": 24, "id": 45221, "label": "malware", "start_offset": 13 }, { "end_offset": 43, "id": 45222, "label": "tools", "start_offset": 35 } ]
[ { "from_id": 45221, "id": 89, "to_id": 45222, "type": "uses" } ]
354
TrustedSec reports on how attackers were apparently able to glean user credentials from a certain device via the Heartbleed vulnerability and use them to log in via a VPN.
[ { "end_offset": 10, "id": 44711, "label": "identity", "start_offset": 0 }, { "end_offset": 137, "id": 44712, "label": "vulnerability", "start_offset": 113 }, { "end_offset": 170, "id": 44713, "label": "tools", "start_offset": 167 }, { "end_offset": 82, "id": 44714, "label": "attack-pattern", "start_offset": 60 } ]
[ { "from_id": 44714, "id": 18, "to_id": 44712, "type": "exploits" } ]
2,845
The WanaCrypt0r ransomware spreads itself by heavily scanning over TCP port 445 (associated with SMB) and attempting to exploit the ETERNALBLUE vulnerability on systems.
[ { "end_offset": 16, "id": 48049, "label": "malware", "start_offset": 5 }, { "end_offset": 144, "id": 8683, "label": "vulnerability", "start_offset": 133 } ]
[ { "from_id": 48049, "id": 381, "to_id": 8683, "type": "exploits" } ]
4,562
Based on our analysis, we believe that the StopWar app was developed by pro-Ukrainian developers and was the inspiration for what Turla actors based their fake CyberAzov DoS app off of.
[ { "end_offset": 54, "id": 50379, "label": "malware", "start_offset": 43 }, { "end_offset": 142, "id": 50380, "label": "threat-actor", "start_offset": 130 }, { "end_offset": 177, "id": 50381, "label": "malware", "start_offset": 160 } ]
[ { "from_id": 50381, "id": 951, "to_id": 50380, "type": "authored-by" } ]
4,873
In 2014, Microsoft filed a civil suit against the developer, Mohammed Benabdellah, for the development and dissemination of H-Worm.
[ { "end_offset": 7, "id": 50875, "label": "TIME", "start_offset": 3 }, { "end_offset": 81, "id": 50877, "label": "identity", "start_offset": 61 }, { "end_offset": 130, "id": 50878, "label": "malware", "start_offset": 124 }, { "end_offset": 18, "id": 50876, "label": "identity", "start_offset": 9 } ]
[ { "from_id": 50878, "id": 1029, "to_id": 50877, "type": "authored-by" } ]
14,296
Maikspy on the Windows platform Figure 7.
[ { "end_offset": 8, "id": 48501, "label": "malware", "start_offset": 0 }, { "end_offset": 23, "id": 48502, "label": "SOFTWARE", "start_offset": 15 } ]
[ { "from_id": 48501, "id": 433, "to_id": 48502, "type": "targets" } ]
3,624
A good example of a generalized phishing campaign is the Blank Slate Campaign we wrote about in March 2017.
[ { "end_offset": 78, "id": 49409, "label": "campaign", "start_offset": 58 }, { "end_offset": 107, "id": 49410, "label": "TIME", "start_offset": 97 }, { "end_offset": 50, "id": 49408, "label": "attack-pattern", "start_offset": 33 } ]
[ { "from_id": 49409, "id": 793, "to_id": 49408, "type": "uses" } ]
876
analysis sample PClock2 is written in Visual Basic.
[ { "end_offset": 51, "id": 46410, "label": "SOFTWARE", "start_offset": 39 }, { "end_offset": 24, "id": 44898, "label": "malware", "start_offset": 17 } ]
[ { "from_id": 44898, "id": 188, "to_id": 46410, "type": "uses" } ]
4,552
This is the first known instance of Turla distributing Android-related malware.
[ { "end_offset": 41, "id": 50361, "label": "threat-actor", "start_offset": 36 }, { "end_offset": 62, "id": 50362, "label": "SOFTWARE", "start_offset": 55 } ]
[ { "from_id": 50361, "id": 949, "to_id": 50362, "type": "targets" } ]
1,942
The decoy documents tell more about Urpage's possible targets, as it contains text from articles about the region of Kashmir.
[ { "end_offset": 42, "id": 47066, "label": "threat-actor", "start_offset": 36 }, { "end_offset": 124, "id": 47067, "label": "location", "start_offset": 117 } ]
[ { "from_id": 47066, "id": 300, "to_id": 47067, "type": "targets" } ]
231
A phishing webpage targeting a Ukrainian state administration employee, detected by our in-house machine learning models on March 16.Our teams at Palo Alto Networks are actively monitoring the phishing landscape surrounding Ukraine-related URLs and are sharing this threat intelligence with relevant authorities in Ukraine and internationally.
[ { "end_offset": 10, "id": 765, "label": "attack-pattern", "start_offset": 2 }, { "end_offset": 201, "id": 771, "label": "attack-pattern", "start_offset": 193 }, { "end_offset": 70, "id": 44647, "label": "identity", "start_offset": 31 }, { "end_offset": 132, "id": 44648, "label": "TIME", "start_offset": 124 }, { "end_offset": 164, "id": 44649, "label": "identity", "start_offset": 146 }, { "end_offset": 322, "id": 44650, "label": "location", "start_offset": 315 } ]
[ { "from_id": 765, "id": 135, "to_id": 44647, "type": "targets" }, { "from_id": 771, "id": 136, "to_id": 44650, "type": "targets" } ]
1,479
In addition to our research, the Baidu Security team in China recently found 23 mobile banking apps sharing the same certificate hosted by a third party app developer and reported the discovery to the CNCERT in China.
[ { "end_offset": 61, "id": 45023, "label": "location", "start_offset": 56 }, { "end_offset": 216, "id": 45025, "label": "location", "start_offset": 211 }, { "end_offset": 207, "id": 45026, "label": "identity", "start_offset": 201 }, { "end_offset": 52, "id": 45024, "label": "identity", "start_offset": 33 } ]
[ { "from_id": 45026, "id": 58, "to_id": 45025, "type": "located-at" }, { "from_id": 45024, "id": 219, "to_id": 45023, "type": "located-at" } ]
2,285
Parallel to the analysis, tracking, and technical disruption of this botnet, Google has filed a lawsuit against two individuals believed to be located in Russia for operating the Glupteba Botnet and its various criminal schemes.
[ { "end_offset": 83, "id": 47357, "label": "identity", "start_offset": 77 }, { "end_offset": 187, "id": 47356, "label": "malware", "start_offset": 179 }, { "end_offset": 160, "id": 47358, "label": "location", "start_offset": 154 } ]
[ { "from_id": 47356, "id": 314, "to_id": 47358, "type": "located-at" } ]
3,179
We also found several clues that show how the malware might be connected with the Winnti Group(also known as APT41).
[ { "end_offset": 115, "id": 48308, "label": "threat-actor", "start_offset": 110 }, { "end_offset": 95, "id": 48307, "label": "threat-actor", "start_offset": 83 } ]
[ { "from_id": 48307, "id": 403, "to_id": 48308, "type": "duplicate-of" } ]
4,082
During our investigation into Earth Centaurs activities, we found that it also uses another backdoor called Lilith RAT.
[ { "end_offset": 44, "id": 49916, "label": "threat-actor", "start_offset": 30 }, { "end_offset": 118, "id": 49917, "label": "malware", "start_offset": 108 } ]
[ { "from_id": 49916, "id": 893, "to_id": 49917, "type": "uses" } ]
13,913
It is interesting to note that DarkSide’s ransom note is similar to that of Babuk, which might indicate that these two families share a link.
[ { "end_offset": 42, "id": 48734, "label": "malware", "start_offset": 31 }, { "end_offset": 81, "id": 48735, "label": "malware", "start_offset": 76 } ]
[ { "from_id": 48734, "id": 450, "to_id": 48735, "type": "related-to" } ]
2,064
This particular IP was linked to a Contabo server that x4k had also included within their VirusTotal graph discussed above.
[ { "end_offset": 58, "id": 45245, "label": "threat-actor", "start_offset": 55 }, { "end_offset": 42, "id": 45247, "label": "identity", "start_offset": 35 }, { "end_offset": 101, "id": 45246, "label": "SOFTWARE", "start_offset": 90 } ]
[ { "from_id": 45245, "id": 94, "to_id": 45247, "type": "uses" } ]
13,545
The Water Pamola attack chain After further searching, we noticed that an online store administrator asked about a strange online order that contains JavaScript code inserted into the field where the customer’s address or company name would normally be located.
[ { "end_offset": 16, "id": 51617, "label": "campaign", "start_offset": 4 }, { "end_offset": 105, "id": 51618, "label": "identity", "start_offset": 79 }, { "end_offset": 179, "id": 51620, "label": "attack-pattern", "start_offset": 155 } ]
[ { "from_id": 51617, "id": 1114, "to_id": 51620, "type": "uses" } ]
3,469
If the affected system can connect online and doesn’t have AV software, Marade will connect to a Blackgear-controlled public blog or social media post to retrieve an encrypted C&C configuration.
[ { "end_offset": 193, "id": 49269, "label": "Infrastucture", "start_offset": 118 }, { "end_offset": 78, "id": 49267, "label": "malware", "start_offset": 72 }, { "end_offset": 106, "id": 49268, "label": "threat-actor", "start_offset": 97 } ]
[ { "from_id": 49268, "id": 775, "to_id": 49269, "type": "controls" }, { "from_id": 49267, "id": 776, "to_id": 49269, "type": "beacons-to" } ]
14,259
Related Hashes (SHA256) detected as BKDR64_WINNTI.ONM: 06b077e31a6f339c4f3b1f61ba9a6a6ba827afe52ed5bed6a6bf56bf18a279ba — cryptbase.dll 1e63a7186886deea6c4e5c2a329eab76a60be3a65bca1ba9ed6e71f9a46b7e9d – loadperf.dll 7c37ebb96c54d5d8ea232951ccf56cb1d029facdd6b730f80ca2ad566f6c5d9b – loadoerf.ini 9d04ef8708cf030b9688bf3e8287c1790023a76374e43bd332178e212420f9fb — wbemcomn.ini b1a0d0508ee932bbf91625330d2136f33344ed70cb25f7e64be0620d32c4b9e2 — cryptbase.ini e5273b72c853f12b77a11e9c08ae6432fabbb32238ac487af2fb959a6cc26089 — wbemcomn.dll Tags Malware | APT & Targeted Attacks | Endpoints | Research
[ { "end_offset": 53, "id": 48453, "label": "FILEPATH", "start_offset": 36 }, { "end_offset": 295, "id": 48457, "label": "FILEPATH", "start_offset": 283 }, { "end_offset": 537, "id": 48459, "label": "FILEPATH", "start_offset": 524 }, { "end_offset": 456, "id": 48460, "label": "FILEPATH", "start_offset": 443 }, { "end_offset": 135, "id": 48455, "label": "FILEPATH", "start_offset": 122 }, { "end_offset": 215, "id": 48456, "label": "FILEPATH", "start_offset": 203 }, { "end_offset": 376, "id": 48463, "label": "FILEPATH", "start_offset": 363 }, { "end_offset": 119, "id": 44129, "label": "hash", "start_offset": 55 }, { "end_offset": 200, "id": 44130, "label": "hash", "start_offset": 136 }, { "end_offset": 280, "id": 44131, "label": "hash", "start_offset": 216 }, { "end_offset": 360, "id": 44132, "label": "hash", "start_offset": 296 }, { "end_offset": 440, "id": 44133, "label": "hash", "start_offset": 376 }, { "end_offset": 521, "id": 44134, "label": "hash", "start_offset": 457 } ]
[ { "from_id": 48453, "id": 412, "to_id": 48455, "type": "related-to" }, { "from_id": 48456, "id": 414, "to_id": 48453, "type": "related-to" }, { "from_id": 48453, "id": 416, "to_id": 48457, "type": "related-to" }, { "from_id": 48460, "id": 415, "to_id": 48456, "type": "related-to" }, { "from_id": 48453, "id": 418, "to_id": 48459, "type": "related-to" }, { "from_id": 44129, "id": 419, "to_id": 48455, "type": "related-to" }, { "from_id": 44130, "id": 420, "to_id": 48456, "type": "related-to" }, { "from_id": 44132, "id": 421, "to_id": 48463, "type": "related-to" }, { "from_id": 44133, "id": 422, "to_id": 48460, "type": "related-to" }, { "from_id": 44134, "id": 423, "to_id": 48459, "type": "related-to" } ]
3,530
Different versions of Protux used by Blackgear Figure 9.
[ { "end_offset": 28, "id": 49310, "label": "malware", "start_offset": 22 }, { "end_offset": 46, "id": 49311, "label": "threat-actor", "start_offset": 37 } ]
[ { "from_id": 49311, "id": 782, "to_id": 49310, "type": "uses" } ]
621
This post is also available in: 日本語 (Japanese) This Unit 42 blog provides an update on the threat situation surrounding attacks using the Petya Ransomware which are impacting organizations in Ukraine, Russia and to a lesser extent around the world.
[ { "end_offset": 65, "id": 2073, "label": "identity", "start_offset": 58 }, { "end_offset": 149, "id": 2074, "label": "malware", "start_offset": 144 }, { "end_offset": 160, "id": 44803, "label": "malware", "start_offset": 144 }, { "end_offset": 205, "id": 44804, "label": "location", "start_offset": 198 }, { "end_offset": 213, "id": 44805, "label": "location", "start_offset": 207 } ]
[ { "from_id": 44803, "id": 27, "to_id": 44805, "type": "targets" }, { "from_id": 44803, "id": 26, "to_id": 44804, "type": "targets" } ]
14,123
Mattermost was being used as a C2 channel for the malware.
[ { "end_offset": 11, "id": 48188, "label": "SOFTWARE", "start_offset": 0 }, { "end_offset": 57, "id": 48189, "label": "malware", "start_offset": 50 } ]
[ { "from_id": 48189, "id": 390, "to_id": 48188, "type": "uses" } ]
14,341
The first variant of Maikspy appeared on the Windows platform in December 2016.
[ { "end_offset": 29, "id": 48576, "label": "malware", "start_offset": 21 }, { "end_offset": 78, "id": 48578, "label": "TIME", "start_offset": 65 }, { "end_offset": 53, "id": 48577, "label": "SOFTWARE", "start_offset": 45 } ]
[ { "from_id": 48576, "id": 448, "to_id": 48577, "type": "duplicate-of" }, { "from_id": 48576, "id": 449, "to_id": 48578, "type": "related-to" } ]
1,860
While AvosLocker has been documented for its abuse of AnyDesk for lateral movement as its preferred application, we note that other remote access applications can also be abused to replace it.
[ { "end_offset": 16, "id": 45154, "label": "malware", "start_offset": 6 }, { "end_offset": 61, "id": 45155, "label": "tools", "start_offset": 54 }, { "end_offset": 82, "id": 45156, "label": "attack-pattern", "start_offset": 66 } ]
[ { "from_id": 45154, "id": 77, "to_id": 45155, "type": "uses" }, { "from_id": 45156, "id": 284, "to_id": 45155, "type": "uses" }, { "from_id": 45154, "id": 285, "to_id": 45156, "type": "uses" } ]
288
Spear Phishing Attacks Target Organizations in Ukraine, Payloads Include the Document Stealer OutSteel and the Downloader SaintBot Threat Briefing: Protecting Against Russia-Ukraine Cyber Activity Palo Alto Networks Resource Page: Protect Against Russia-Ukraine Cyber Activity Cortex XDR Protections Against Malware Associated with Ukraine and Russia Cyber Activity
[ { "end_offset": 14, "id": 970, "label": "attack-pattern", "start_offset": 0 }, { "end_offset": 102, "id": 974, "label": "malware", "start_offset": 94 }, { "end_offset": 130, "id": 976, "label": "malware", "start_offset": 122 }, { "end_offset": 173, "id": 977, "label": "location", "start_offset": 167 }, { "end_offset": 181, "id": 978, "label": "location", "start_offset": 174 }, { "end_offset": 215, "id": 979, "label": "identity", "start_offset": 197 }, { "end_offset": 253, "id": 981, "label": "location", "start_offset": 247 }, { "end_offset": 261, "id": 982, "label": "location", "start_offset": 254 }, { "end_offset": 287, "id": 983, "label": "tools", "start_offset": 277 }, { "end_offset": 54, "id": 44679, "label": "identity", "start_offset": 30 }, { "end_offset": 54, "id": 44678, "label": "location", "start_offset": 47 }, { "end_offset": 339, "id": 44685, "label": "location", "start_offset": 332 }, { "end_offset": 350, "id": 44686, "label": "location", "start_offset": 344 } ]
[ { "from_id": 970, "id": 116, "to_id": 44679, "type": "targets" }, { "from_id": 974, "id": 118, "to_id": 970, "type": "uses" }, { "from_id": 976, "id": 119, "to_id": 970, "type": "uses" }, { "from_id": 974, "id": 117, "to_id": 44679, "type": "targets" } ]
1,887
What sets Urpage attacks apart is its targeting of InPage, a word processor for Urdu and Arabic languages.
[ { "end_offset": 57, "id": 45163, "label": "SOFTWARE", "start_offset": 51 }, { "end_offset": 16, "id": 45162, "label": "threat-actor", "start_offset": 10 } ]
[ { "from_id": 45162, "id": 78, "to_id": 45163, "type": "targets" } ]
14,253
Nearly all the C&C servers are hosted in the U.S., while two are located in Japan.
[ { "end_offset": 49, "id": 48448, "label": "location", "start_offset": 45 }, { "end_offset": 26, "id": 48449, "label": "Infrastucture", "start_offset": 15 } ]
[ { "from_id": 48449, "id": 410, "to_id": 48448, "type": "located-at" } ]
804
Credential theft today can happen in many ways, but the most notable are through credential phishing and the use of malware like keyloggers (both staples of the Sofacy group), as well as password reuse.
[ { "end_offset": 17, "id": 44859, "label": "attack-pattern", "start_offset": 1 }, { "end_offset": 101, "id": 44860, "label": "attack-pattern", "start_offset": 82 }, { "end_offset": 140, "id": 44861, "label": "attack-pattern", "start_offset": 130 }, { "end_offset": 174, "id": 44862, "label": "threat-actor", "start_offset": 162 }, { "end_offset": 202, "id": 44863, "label": "attack-pattern", "start_offset": 188 } ]
[ { "from_id": 44862, "id": 33, "to_id": 44863, "type": "uses" }, { "from_id": 44862, "id": 34, "to_id": 44861, "type": "uses" }, { "from_id": 44862, "id": 35, "to_id": 44860, "type": "uses" }, { "from_id": 44862, "id": 36, "to_id": 44859, "type": "uses" } ]

Dataset Card for "cyber-threat-intelligence_v2"

updated version of mrmoor/cyber-threat-intelligence

RE and NER Dataset for Cyber Threat Intelegence (CTI)

T5 Model trained on NYT and this dataset: Olec/cyber_rebel

This dataset only contains sentences with realtions. Full dataset is available at mrmoor/cyber-threat-intelligence.

Downloads last month
2
Edit dataset card