id
int64 105
14.4k
| text
stringlengths 39
889
| entities
list | relations
list | Comments
list |
---|---|---|---|---|
5,416 | Asus is likely only one of the vendors that is currently being targeted by Cyclops Blink. | [
{
"id": 51420,
"label": "identity",
"start_offset": 0,
"end_offset": 4
},
{
"id": 51421,
"label": "malware",
"start_offset": 75,
"end_offset": 88
}
] | [
{
"id": 1094,
"from_id": 51421,
"to_id": 51420,
"type": "targets"
}
] | [] |
5,438 | While the Cyclops Blink malware variant that we analyzed in this report is complicated in nature, one thing proves to be unmistakable when it comes to the Sandworm group that created it: Sandworm is a persistent and sophisticated group whose motives are clearly at odds with those that would be expected from groups that are primarily financially motivated. | [
{
"id": 51438,
"label": "threat-actor",
"start_offset": 155,
"end_offset": 163
},
{
"id": 51437,
"label": "malware",
"start_offset": 10,
"end_offset": 23
},
{
"id": 51439,
"label": "threat-actor",
"start_offset": 187,
"end_offset": 195
}
] | [
{
"id": 1095,
"from_id": 51437,
"to_id": 51438,
"type": "attributed-to"
}
] | [] |
5,462 | We stumbled upon the Confucius hacking group while delving into Patchwork’s cyberespionage operations, and found a number of similarities. | [
{
"id": 51448,
"label": "threat-actor",
"start_offset": 64,
"end_offset": 73
},
{
"id": 51449,
"label": "threat-actor",
"start_offset": 21,
"end_offset": 30
}
] | [
{
"id": 1096,
"from_id": 51449,
"to_id": 51448,
"type": "related-to"
}
] | [] |
5,469 | While Patchwork may be more straightforward with its predominantly malware-based attacks, Confucius’ can be inferred to be more nuanced, relying heavily on social engineering. | [
{
"id": 51455,
"label": "threat-actor",
"start_offset": 90,
"end_offset": 99
},
{
"id": 51456,
"label": "attack-pattern",
"start_offset": 156,
"end_offset": 174
},
{
"id": 51457,
"label": "attack-pattern",
"start_offset": 67,
"end_offset": 88
},
{
"id": 51454,
"label": "threat-actor",
"start_offset": 6,
"end_offset": 15
}
] | [
{
"id": 1097,
"from_id": 51454,
"to_id": 51457,
"type": "uses"
},
{
"id": 1098,
"from_id": 51455,
"to_id": 51456,
"type": "uses"
}
] | [] |
5,482 | hayat22, supposedly a female student, engaged in an online romance with a target whose handle was love, describing himself as living in South Asia working in garments manufacturing and wholesaling. | [
{
"id": 51475,
"label": "identity",
"start_offset": 0,
"end_offset": 7
},
{
"id": 51476,
"label": "location",
"start_offset": 136,
"end_offset": 146
},
{
"id": 51482,
"label": "identity",
"start_offset": 98,
"end_offset": 102
}
] | [
{
"id": 1099,
"from_id": 51475,
"to_id": 51476,
"type": "located-at"
}
] | [] |
5,499 | Compared to Patchwork, whose Trojanized documents exploit at least five security flaws, Confucius’ backdoors are delivered through Office files exploiting memory corruption vulnerabilities CVE-2015-1641 and CVE-2017-11882. | [
{
"id": 51507,
"label": "attack-pattern",
"start_offset": 144,
"end_offset": 172
},
{
"id": 51504,
"label": "threat-actor",
"start_offset": 88,
"end_offset": 97
},
{
"id": 51503,
"label": "threat-actor",
"start_offset": 12,
"end_offset": 21
},
{
"id": 51505,
"label": "vulnerability",
"start_offset": 189,
"end_offset": 202
},
{
"id": 51506,
"label": "vulnerability",
"start_offset": 207,
"end_offset": 221
}
] | [
{
"id": 1100,
"from_id": 51504,
"to_id": 51507,
"type": "uses"
}
] | [] |
13,006 | Recently observed Ghostwriter credential phishing domains and emails: Curious Gorge, a group TAG attributes to China's PLA SSF, has remained active against government, military, logistics and manufacturing organizations in Ukraine, Russia and Central Asia. | [
{
"id": 48807,
"label": "location",
"start_offset": 243,
"end_offset": 255
},
{
"id": 48810,
"label": "threat-actor",
"start_offset": 70,
"end_offset": 83
},
{
"id": 48811,
"label": "location",
"start_offset": 111,
"end_offset": 119
},
{
"id": 48809,
"label": "location",
"start_offset": 232,
"end_offset": 239
},
{
"id": 48808,
"label": "location",
"start_offset": 223,
"end_offset": 230
},
{
"id": 48813,
"label": "location",
"start_offset": 119,
"end_offset": 126
},
{
"id": 48812,
"label": "identity",
"start_offset": 119,
"end_offset": 126
},
{
"id": 40519,
"label": "threat-actor",
"start_offset": 18,
"end_offset": 29
},
{
"id": 40520,
"label": "attack-pattern",
"start_offset": 41,
"end_offset": 49
}
] | [
{
"id": 466,
"from_id": 48810,
"to_id": 48812,
"type": "attributed-to"
}
] | [] |
13,023 | Here is a deeper look at the campaign activity TAG has observed over the past two weeks: Curious Gorge, a group TAG attributes to China's PLA SSF, has conducted campaigns against government and military organizations in Ukraine, Russia, Kazakhstan, and Mongolia. | [
{
"id": 48841,
"label": "identity",
"start_offset": 130,
"end_offset": 145
},
{
"id": 48843,
"label": "location",
"start_offset": 220,
"end_offset": 227
},
{
"id": 48840,
"label": "threat-actor",
"start_offset": 89,
"end_offset": 102
},
{
"id": 48842,
"label": "identity",
"start_offset": 112,
"end_offset": 116
},
{
"id": 48845,
"label": "location",
"start_offset": 237,
"end_offset": 247
},
{
"id": 48839,
"label": "identity",
"start_offset": 47,
"end_offset": 51
},
{
"id": 48844,
"label": "location",
"start_offset": 229,
"end_offset": 235
},
{
"id": 48846,
"label": "location",
"start_offset": 253,
"end_offset": 261
}
] | [
{
"id": 467,
"from_id": 48840,
"to_id": 48841,
"type": "attributed-to"
},
{
"id": 468,
"from_id": 48840,
"to_id": 48843,
"type": "duplicate-of"
},
{
"id": 469,
"from_id": 48840,
"to_id": 48844,
"type": "duplicate-of"
},
{
"id": 470,
"from_id": 48840,
"to_id": 48845,
"type": "duplicate-of"
},
{
"id": 471,
"from_id": 48840,
"to_id": 48846,
"type": "duplicate-of"
}
] | [] |
13,025 | Recently observed IPs used in Curious Gorge campaigns: COLDRIVER, a Russian-based threat actor sometimes referred to as Calisto, has launched credential phishing campaigns, targeting several US based NGOs and think tanks, the military of a Balkans country, and a Ukraine based defense contractor. | [
{
"id": 48848,
"label": "threat-actor",
"start_offset": 30,
"end_offset": 43
},
{
"id": 48849,
"label": "campaign",
"start_offset": 55,
"end_offset": 64
},
{
"id": 48853,
"label": "location",
"start_offset": 240,
"end_offset": 255
},
{
"id": 48854,
"label": "location",
"start_offset": 263,
"end_offset": 271
},
{
"id": 48855,
"label": "identity",
"start_offset": 277,
"end_offset": 295
},
{
"id": 48856,
"label": "identity",
"start_offset": 200,
"end_offset": 205
},
{
"id": 48857,
"label": "identity",
"start_offset": 209,
"end_offset": 220
},
{
"id": 48858,
"label": "location",
"start_offset": 191,
"end_offset": 194
},
{
"id": 48850,
"label": "threat-actor",
"start_offset": 120,
"end_offset": 127
},
{
"id": 48851,
"label": "attack-pattern",
"start_offset": 142,
"end_offset": 161
},
{
"id": 48859,
"label": "identity",
"start_offset": 226,
"end_offset": 235
}
] | [
{
"id": 473,
"from_id": 48859,
"to_id": 48853,
"type": "located-at"
},
{
"id": 474,
"from_id": 48856,
"to_id": 48858,
"type": "located-at"
},
{
"id": 475,
"from_id": 48857,
"to_id": 48858,
"type": "located-at"
},
{
"id": 472,
"from_id": 48855,
"to_id": 48854,
"type": "located-at"
},
{
"id": 476,
"from_id": 48850,
"to_id": 48851,
"type": "uses"
},
{
"id": 477,
"from_id": 48850,
"to_id": 48856,
"type": "duplicate-of"
},
{
"id": 478,
"from_id": 48850,
"to_id": 48857,
"type": "duplicate-of"
},
{
"id": 479,
"from_id": 48850,
"to_id": 48859,
"type": "duplicate-of"
},
{
"id": 480,
"from_id": 48850,
"to_id": 48855,
"type": "duplicate-of"
},
{
"id": 481,
"from_id": 48850,
"to_id": 48849,
"type": "related-to"
}
] | [] |
13,026 | However, for the first time, TAG has observed COLDRIVER campaigns targeting the military of multiple Eastern European countries, as well as a NATO Centre of Excellence. | [
{
"id": 48860,
"label": "campaign",
"start_offset": 46,
"end_offset": 56
},
{
"id": 48861,
"label": "identity",
"start_offset": 80,
"end_offset": 89
},
{
"id": 48862,
"label": "identity",
"start_offset": 142,
"end_offset": 167
},
{
"id": 48863,
"label": "location",
"start_offset": 101,
"end_offset": 117
}
] | [
{
"id": 482,
"from_id": 48861,
"to_id": 48863,
"type": "located-at"
},
{
"id": 484,
"from_id": 48860,
"to_id": 48862,
"type": "targets"
},
{
"id": 483,
"from_id": 48860,
"to_id": 48861,
"type": "targets"
}
] | [] |
13,029 | Recently observed COLDRIVER credential phishing domains: Ghostwriter, a Belarusian threat actor, recently introduced a new capability into their credential phishing campaigns. | [
{
"id": 48866,
"label": "campaign",
"start_offset": 18,
"end_offset": 28
},
{
"id": 48867,
"label": "attack-pattern",
"start_offset": 28,
"end_offset": 48
},
{
"id": 48868,
"label": "threat-actor",
"start_offset": 57,
"end_offset": 68
},
{
"id": 48869,
"label": "location",
"start_offset": 72,
"end_offset": 83
},
{
"id": 48870,
"label": "attack-pattern",
"start_offset": 145,
"end_offset": 164
}
] | [
{
"id": 485,
"from_id": 48866,
"to_id": 48867,
"type": "uses"
}
] | [] |
13,146 | Tropic Trooper, a threat actor group that targets government, military, healthcare, transportation, and high-tech industries in Taiwan, the Philippines, and Hong Kong, has been active since 2011. | [
{
"id": 48920,
"label": "identity",
"start_offset": 104,
"end_offset": 124
},
{
"id": 48922,
"label": "location",
"start_offset": 140,
"end_offset": 151
},
{
"id": 48924,
"label": "TIME",
"start_offset": 184,
"end_offset": 194
},
{
"id": 48916,
"label": "identity",
"start_offset": 50,
"end_offset": 60
},
{
"id": 48921,
"label": "location",
"start_offset": 128,
"end_offset": 134
},
{
"id": 48915,
"label": "threat-actor",
"start_offset": 0,
"end_offset": 14
},
{
"id": 48917,
"label": "identity",
"start_offset": 62,
"end_offset": 70
},
{
"id": 48918,
"label": "identity",
"start_offset": 72,
"end_offset": 82
},
{
"id": 48919,
"label": "identity",
"start_offset": 84,
"end_offset": 98
},
{
"id": 48923,
"label": "location",
"start_offset": 157,
"end_offset": 166
}
] | [
{
"id": 491,
"from_id": 48920,
"to_id": 48921,
"type": "located-at"
},
{
"id": 492,
"from_id": 48916,
"to_id": 48921,
"type": "located-at"
},
{
"id": 487,
"from_id": 48915,
"to_id": 48917,
"type": "targets"
},
{
"id": 488,
"from_id": 48915,
"to_id": 48918,
"type": "targets"
},
{
"id": 489,
"from_id": 48915,
"to_id": 48919,
"type": "targets"
},
{
"id": 494,
"from_id": 48916,
"to_id": 48922,
"type": "located-at"
},
{
"id": 495,
"from_id": 48916,
"to_id": 48923,
"type": "located-at"
},
{
"id": 496,
"from_id": 48917,
"to_id": 48921,
"type": "located-at"
},
{
"id": 497,
"from_id": 48915,
"to_id": 48916,
"type": "targets"
},
{
"id": 498,
"from_id": 48915,
"to_id": 48924,
"type": "related-to"
},
{
"id": 493,
"from_id": 48918,
"to_id": 48922,
"type": "targets"
}
] | [] |
13,147 | The group was reportedly using spear-phishing emails with weaponized attachments to exploit known vulnerabilities. | [
{
"id": 48925,
"label": "attack-pattern",
"start_offset": 31,
"end_offset": 45
},
{
"id": 48926,
"label": "threat-actor",
"start_offset": 4,
"end_offset": 10
}
] | [
{
"id": 499,
"from_id": 48926,
"to_id": 48925,
"type": "uses"
}
] | [] |
13,149 | We found that Tropic Trooper’s latest activities center on targeting Taiwanese and the Philippine military’s physically isolated networks through a USBferry attack (the name derived from a sample found in a related research). | [
{
"id": 48927,
"label": "threat-actor",
"start_offset": 14,
"end_offset": 28
},
{
"id": 48928,
"label": "location",
"start_offset": 69,
"end_offset": 79
},
{
"id": 48929,
"label": "location",
"start_offset": 87,
"end_offset": 98
},
{
"id": 48931,
"label": "identity",
"start_offset": 98,
"end_offset": 109
},
{
"id": 48930,
"label": "malware",
"start_offset": 148,
"end_offset": 163
}
] | [
{
"id": 500,
"from_id": 48931,
"to_id": 48929,
"type": "located-at"
},
{
"id": 501,
"from_id": 48931,
"to_id": 48928,
"type": "located-at"
},
{
"id": 503,
"from_id": 48927,
"to_id": 48930,
"type": "uses"
},
{
"id": 502,
"from_id": 48927,
"to_id": 48931,
"type": "targets"
}
] | [] |
13,156 | A sample scenario of the USBferry attack Tropic Trooper is well aware that military or government organizations may have more robust security in their physically isolated environments (i.e., the use of biometrics or USB use in a quarantined machine before an air-gapped environment). | [
{
"id": 48940,
"label": "threat-actor",
"start_offset": 41,
"end_offset": 55
},
{
"id": 48939,
"label": "malware",
"start_offset": 25,
"end_offset": 34
}
] | [
{
"id": 504,
"from_id": 48939,
"to_id": 48940,
"type": "related-to"
}
] | [] |
13,472 | We continue to see attacks from groups like Charming Kitten on medical and healthcare professionals, including World Health Organization (WHO) employees. | [
{
"id": 51544,
"label": "threat-actor",
"start_offset": 44,
"end_offset": 59
},
{
"id": 51545,
"label": "identity",
"start_offset": 111,
"end_offset": 142
}
] | [
{
"id": 1101,
"from_id": 51544,
"to_id": 51545,
"type": "targets"
}
] | [] |
13,474 | As one example, we've seen new activity from “hack-for-hire” firms, many based in India, that have been creating Gmail accounts spoofing the WHO. | [
{
"id": 51546,
"label": "threat-actor",
"start_offset": 45,
"end_offset": 66
},
{
"id": 51547,
"label": "location",
"start_offset": 82,
"end_offset": 87
},
{
"id": 51548,
"label": "identity",
"start_offset": 141,
"end_offset": 144
}
] | [
{
"id": 1102,
"from_id": 51546,
"to_id": 51548,
"type": "targets"
},
{
"id": 1103,
"from_id": 51546,
"to_id": 51547,
"type": "located-at"
}
] | [] |
13,499 | While it offers standard mailbox copies that was likely stolen with the help of credential phishing, Void Balaur also offers copies of mailboxes that have not been interacted with — for a higher price. | [
{
"id": 51567,
"label": "threat-actor",
"start_offset": 101,
"end_offset": 112
},
{
"id": 51568,
"label": "attack-pattern",
"start_offset": 80,
"end_offset": 99
}
] | [
{
"id": 1104,
"from_id": 51567,
"to_id": 51568,
"type": "uses"
}
] | [] |
13,539 | The campaign initially compromised e-commerce online shops in Japan, Australia, and European countries via spam emails with malicious attachments. | [
{
"id": 51605,
"label": "attack-pattern",
"start_offset": 107,
"end_offset": 118
},
{
"id": 51606,
"label": "campaign",
"start_offset": 4,
"end_offset": 12
},
{
"id": 51607,
"label": "identity",
"start_offset": 35,
"end_offset": 58
},
{
"id": 51601,
"label": "location",
"start_offset": 62,
"end_offset": 67
},
{
"id": 51602,
"label": "location",
"start_offset": 69,
"end_offset": 78
},
{
"id": 51603,
"label": "location",
"start_offset": 84,
"end_offset": 92
}
] | [
{
"id": 1105,
"from_id": 51606,
"to_id": 51607,
"type": "targets"
},
{
"id": 1106,
"from_id": 51607,
"to_id": 51601,
"type": "located-at"
},
{
"id": 1107,
"from_id": 51607,
"to_id": 51602,
"type": "located-at"
},
{
"id": 1108,
"from_id": 51607,
"to_id": 51603,
"type": "located-at"
},
{
"id": 1110,
"from_id": 51606,
"to_id": 51605,
"type": "uses"
}
] | [] |
13,541 | Victims are now mainly located only in Japan. | [
{
"id": 51611,
"label": "location",
"start_offset": 39,
"end_offset": 44
},
{
"id": 51612,
"label": "identity",
"start_offset": 0,
"end_offset": 7
}
] | [
{
"id": 1111,
"from_id": 51612,
"to_id": 51611,
"type": "located-at"
}
] | [] |
13,543 | Instead, malicious scripts are being executed when the administrators look into customer orders in their online shop’s administration panel. | [
{
"id": 51614,
"label": "identity",
"start_offset": 55,
"end_offset": 69
},
{
"id": 51615,
"label": "SOFTWARE",
"start_offset": 105,
"end_offset": 139
},
{
"id": 51616,
"label": "malware",
"start_offset": 9,
"end_offset": 26
}
] | [
{
"id": 1112,
"from_id": 51616,
"to_id": 51615,
"type": "targets"
},
{
"id": 1113,
"from_id": 51614,
"to_id": 51615,
"type": "uses"
}
] | [] |
13,545 | The Water Pamola attack chain After further searching, we noticed that an online store administrator asked about a strange online order that contains JavaScript code inserted into the field where the customer’s address or company name would normally be located. | [
{
"id": 51617,
"label": "campaign",
"start_offset": 4,
"end_offset": 16
},
{
"id": 51618,
"label": "identity",
"start_offset": 79,
"end_offset": 105
},
{
"id": 51620,
"label": "attack-pattern",
"start_offset": 155,
"end_offset": 179
}
] | [
{
"id": 1114,
"from_id": 51617,
"to_id": 51620,
"type": "uses"
}
] | [] |
13,546 | This script is likely activated by exploiting a cross-site scripting (XSS) vulnerability in the said store’s administration portal. | [
{
"id": 51622,
"label": "SOFTWARE",
"start_offset": 101,
"end_offset": 130
},
{
"id": 51623,
"label": "malware",
"start_offset": 5,
"end_offset": 11
},
{
"id": 51621,
"label": "attack-pattern",
"start_offset": 48,
"end_offset": 74
}
] | [
{
"id": 1115,
"from_id": 51623,
"to_id": 51622,
"type": "targets"
},
{
"id": 1116,
"from_id": 51623,
"to_id": 51621,
"type": "uses"
}
] | [] |
13,551 | The script connects to the Water Pamola’s server and downloads additional payloads. | [
{
"id": 51627,
"label": "malware",
"start_offset": 4,
"end_offset": 10
},
{
"id": 51626,
"label": "Infrastucture",
"start_offset": 27,
"end_offset": 48
}
] | [
{
"id": 1117,
"from_id": 51627,
"to_id": 51626,
"type": "beacons-to"
}
] | [] |
13,552 | Taken together, this led us to believe that Water Pamola places orders with this embedded XSS script across many targeted online shops. | [
{
"id": 51628,
"label": "campaign",
"start_offset": 44,
"end_offset": 56
},
{
"id": 42261,
"label": "attack-pattern",
"start_offset": 90,
"end_offset": 93
}
] | [
{
"id": 1118,
"from_id": 51628,
"to_id": 42261,
"type": "uses"
}
] | [] |
13,561 | As previously mentioned, Water Pamola sent online shopping orders appended with a malicious XSS script to attack e-commerce administrators. | [
{
"id": 51638,
"label": "campaign",
"start_offset": 25,
"end_offset": 37
},
{
"id": 51639,
"label": "attack-pattern",
"start_offset": 92,
"end_offset": 95
},
{
"id": 51640,
"label": "identity",
"start_offset": 113,
"end_offset": 138
}
] | [
{
"id": 1119,
"from_id": 51638,
"to_id": 51640,
"type": "targets"
},
{
"id": 1120,
"from_id": 51638,
"to_id": 51639,
"type": "uses"
}
] | [] |
13,563 | If the store’s e-commerce system is vulnerable to XSS attacks, the malicious script will be loaded and executed on the merchant’s management panel once someone (like a system administrator or store employee) opens the said order. | [
{
"id": 51641,
"label": "attack-pattern",
"start_offset": 50,
"end_offset": 53
},
{
"id": 51642,
"label": "malware",
"start_offset": 67,
"end_offset": 83
},
{
"id": 51643,
"label": "SOFTWARE",
"start_offset": 130,
"end_offset": 147
}
] | [
{
"id": 1121,
"from_id": 51642,
"to_id": 51643,
"type": "targets"
},
{
"id": 1122,
"from_id": 51642,
"to_id": 51641,
"type": "uses"
}
] | [] |
13,565 | The source code of this framework is shared across many Chinese public forums. | [
{
"id": 51646,
"label": "location",
"start_offset": 56,
"end_offset": 63
},
{
"id": 51647,
"label": "tools",
"start_offset": 24,
"end_offset": 33
}
] | [
{
"id": 1123,
"from_id": 51647,
"to_id": 51646,
"type": "related-to"
}
] | [] |
13,576 | If the victim enters the credential in the fake form and clicks anywhere on the page, the script will take the credentials, encode them using base64, replace some characters with custom substrings, and then upload these to Water Pamola’s server. Figure 4. | [
{
"id": 51656,
"label": "Infrastucture",
"start_offset": 223,
"end_offset": 244
},
{
"id": 51657,
"label": "malware",
"start_offset": 90,
"end_offset": 96
}
] | [
{
"id": 1124,
"from_id": 51657,
"to_id": 51656,
"type": "communicates-with"
}
] | [] |
13,581 | Some of the delivered malicious scripts attempt to install backdoors to the websites built with the EC-CUBE framework, which is popular in Japan. | [
{
"id": 51662,
"label": "tools",
"start_offset": 100,
"end_offset": 117
},
{
"id": 51664,
"label": "malware",
"start_offset": 22,
"end_offset": 39
},
{
"id": 51663,
"label": "location",
"start_offset": 139,
"end_offset": 144
}
] | [
{
"id": 1125,
"from_id": 51662,
"to_id": 51663,
"type": "related-to"
},
{
"id": 1126,
"from_id": 51664,
"to_id": 51662,
"type": "targets"
}
] | [] |
13,585 | The name of the web shell file is hardcoded to be either “ec_ver.php,” “log3.php,” or “temp.php.” | [
{
"id": 51670,
"label": "FILEPATH",
"start_offset": 58,
"end_offset": 69
},
{
"id": 51671,
"label": "FILEPATH",
"start_offset": 72,
"end_offset": 80
},
{
"id": 51672,
"label": "FILEPATH",
"start_offset": 87,
"end_offset": 95
},
{
"id": 42348,
"label": "attack-pattern",
"start_offset": 16,
"end_offset": 25
}
] | [
{
"id": 1127,
"from_id": 42348,
"to_id": 51670,
"type": "related-to"
},
{
"id": 1128,
"from_id": 42348,
"to_id": 51671,
"type": "related-to"
},
{
"id": 1129,
"from_id": 42348,
"to_id": 51672,
"type": "related-to"
}
] | [] |
13,588 | The blog post describes a web shell with two components — a PHP script and an HTML uploading file — however, the second one is not needed as the proper POST request can be created with any custom or third-party tool (e.g., Fiddler). Figure 6. | [
{
"id": 51676,
"label": "tools",
"start_offset": 26,
"end_offset": 35
},
{
"id": 51677,
"label": "tools",
"start_offset": 60,
"end_offset": 71
},
{
"id": 51678,
"label": "tools",
"start_offset": 78,
"end_offset": 97
}
] | [
{
"id": 1130,
"from_id": 51676,
"to_id": 51677,
"type": "consists-of"
},
{
"id": 1131,
"from_id": 51676,
"to_id": 51678,
"type": "consists-of"
}
] | [] |
13,595 | The plugin has been designed to drop multiple PHP web shell files on the server. | [
{
"id": 51684,
"label": "Infrastucture",
"start_offset": 73,
"end_offset": 79
},
{
"id": 42379,
"label": "attack-pattern",
"start_offset": 50,
"end_offset": 59
}
] | [
{
"id": 1132,
"from_id": 42379,
"to_id": 51684,
"type": "targets"
}
] | [] |
13,600 | (Note that Flash has been declared end-of-life by Adobe since December 31, 2020.) If the victim downloads and executes the installer downloaded from this page, the victim will be infected with a variant of Gh0stRat malware, previously also named Gh0stCringe or CineregRAT. | [
{
"id": 51687,
"label": "TIME",
"start_offset": 62,
"end_offset": 79
},
{
"id": 51688,
"label": "malware",
"start_offset": 207,
"end_offset": 215
},
{
"id": 51689,
"label": "malware",
"start_offset": 247,
"end_offset": 258
},
{
"id": 51690,
"label": "malware",
"start_offset": 262,
"end_offset": 272
}
] | [
{
"id": 1133,
"from_id": 51688,
"to_id": 51689,
"type": "related-to"
},
{
"id": 1134,
"from_id": 51688,
"to_id": 51690,
"type": "related-to"
}
] | [] |
13,602 | The Gh0st RAT samples related to this campaign are obfuscated executable files, which decrypt the main payload in memory and execute its main export function named “Shellex.” Figure | [
{
"id": 51695,
"label": "FILEPATH",
"start_offset": 165,
"end_offset": 172
},
{
"id": 51694,
"label": "malware",
"start_offset": 4,
"end_offset": 13
}
] | [
{
"id": 1135,
"from_id": 51694,
"to_id": 51695,
"type": "related-to"
}
] | [] |
13,610 | In this example, AdobeAirFlashInstaller.exe (legitimate file) sideloads xerces-c_2_1_0.dll (patched legitimate file), which then sideloads ulibs.dll (malicious file). | [
{
"id": 51698,
"label": "FILEPATH",
"start_offset": 139,
"end_offset": 148
},
{
"id": 51696,
"label": "FILEPATH",
"start_offset": 17,
"end_offset": 43
},
{
"id": 51697,
"label": "FILEPATH",
"start_offset": 72,
"end_offset": 90
}
] | [
{
"id": 1136,
"from_id": 51696,
"to_id": 51697,
"type": "related-to"
},
{
"id": 1137,
"from_id": 51697,
"to_id": 51698,
"type": "related-to"
}
] | [] |
13,615 | Here, svchost.exe (renamed legitimate and signed Launcher.exe file from Tencent) sideloads Utility.dll (patched legitimate file). | [
{
"id": 51704,
"label": "FILEPATH",
"start_offset": 49,
"end_offset": 61
},
{
"id": 51705,
"label": "FILEPATH",
"start_offset": 91,
"end_offset": 102
},
{
"id": 51703,
"label": "FILEPATH",
"start_offset": 6,
"end_offset": 17
}
] | [
{
"id": 1138,
"from_id": 51703,
"to_id": 51705,
"type": "related-to"
},
{
"id": 1139,
"from_id": 51703,
"to_id": 51704,
"type": "related-to"
}
] | [] |
13,632 | The code used to obtain user QQ numbers Protecting e-commerce platforms from Water Pamola’s attacks Water Pamola attacked online merchants with an XSS script appended onto online shopping orders. | [
{
"id": 51716,
"label": "campaign",
"start_offset": 81,
"end_offset": 93
},
{
"id": 51717,
"label": "campaign",
"start_offset": 104,
"end_offset": 116
},
{
"id": 51718,
"label": "identity",
"start_offset": 126,
"end_offset": 142
},
{
"id": 51719,
"label": "attack-pattern",
"start_offset": 151,
"end_offset": 154
}
] | [
{
"id": 1141,
"from_id": 51717,
"to_id": 51719,
"type": "uses"
},
{
"id": 1140,
"from_id": 51717,
"to_id": 51718,
"type": "targets"
}
] | [] |
13,640 | A series of ongoing business email compromise (BEC) campaigns that uses spear-phishing schemes on Office 365 accounts has been seen targeting business executives of over 1,000 companies across the world since March 2020. | [
{
"id": 51722,
"label": "attack-pattern",
"start_offset": 72,
"end_offset": 86
},
{
"id": 51723,
"label": "SOFTWARE",
"start_offset": 98,
"end_offset": 117
},
{
"id": 51724,
"label": "TIME",
"start_offset": 203,
"end_offset": 219
},
{
"id": 51725,
"label": "identity",
"start_offset": 142,
"end_offset": 161
},
{
"id": 51726,
"label": "campaign",
"start_offset": 20,
"end_offset": 61
}
] | [
{
"id": 1142,
"from_id": 51726,
"to_id": 51722,
"type": "uses"
},
{
"id": 1143,
"from_id": 51726,
"to_id": 51725,
"type": "targets"
},
{
"id": 1144,
"from_id": 51726,
"to_id": 51724,
"type": "related-to"
}
] | [] |
13,641 | The recent campaigns target senior positions in the United States and Canada. | [
{
"id": 51729,
"label": "identity",
"start_offset": 28,
"end_offset": 44
},
{
"id": 51731,
"label": "location",
"start_offset": 70,
"end_offset": 76
},
{
"id": 51728,
"label": "campaign",
"start_offset": 4,
"end_offset": 20
},
{
"id": 51730,
"label": "location",
"start_offset": 52,
"end_offset": 65
}
] | [
{
"id": 1145,
"from_id": 51728,
"to_id": 51729,
"type": "targets"
},
{
"id": 1146,
"from_id": 51729,
"to_id": 51730,
"type": "located-at"
},
{
"id": 1147,
"from_id": 51729,
"to_id": 51731,
"type": "located-at"
}
] | [] |
13,642 | The fraudsters, whom we named “Water Nue,” primarily target accounts of financial executives to obtain credentials for further financial fraud. | [
{
"id": 51732,
"label": "threat-actor",
"start_offset": 31,
"end_offset": 40
},
{
"id": 51734,
"label": "identity",
"start_offset": 72,
"end_offset": 92
}
] | [
{
"id": 1148,
"from_id": 51732,
"to_id": 51734,
"type": "targets"
}
] | [] |
13,651 | We first noticed the campaign from a large group of email domains used in phishing attempts. | [
{
"id": 51739,
"label": "attack-pattern",
"start_offset": 74,
"end_offset": 82
},
{
"id": 51738,
"label": "campaign",
"start_offset": 21,
"end_offset": 29
}
] | [
{
"id": 1149,
"from_id": 51738,
"to_id": 51739,
"type": "uses"
}
] | [] |
13,653 | In one of the first cases we encountered, the senior financial officer of a bank located in Africa purportedly sent a PDF invoice to a colleague, specifying a bank account in Hong Kong. | [
{
"id": 51742,
"label": "identity",
"start_offset": 46,
"end_offset": 70
},
{
"id": 51740,
"label": "location",
"start_offset": 92,
"end_offset": 98
},
{
"id": 51741,
"label": "location",
"start_offset": 175,
"end_offset": 184
},
{
"id": 51743,
"label": "identity",
"start_offset": 135,
"end_offset": 144
}
] | [
{
"id": 1150,
"from_id": 51742,
"to_id": 51740,
"type": "located-at"
}
] | [] |
13,657 | The attackers use cloud-based email distribution services like SendGrid to deliver emails with a clickable link that redirects targets to a fake Office 365 page. | [
{
"id": 51745,
"label": "threat-actor",
"start_offset": 4,
"end_offset": 13
},
{
"id": 51746,
"label": "tools",
"start_offset": 63,
"end_offset": 71
}
] | [
{
"id": 1151,
"from_id": 51745,
"to_id": 51746,
"type": "uses"
}
] | [] |
13,663 | In a July email sent to a C-level executive, we learned that the base domain URL is U10450540[.]ct[.]sendgrid[.]net, with the final URL being *getting-panes[.]sfo2*. Figure 3. | [
{
"id": 51748,
"label": "URL",
"start_offset": 84,
"end_offset": 116
},
{
"id": 51749,
"label": "URL",
"start_offset": 142,
"end_offset": 164
},
{
"id": 51750,
"label": "identity",
"start_offset": 26,
"end_offset": 43
}
] | [
{
"id": 1152,
"from_id": 51750,
"to_id": 51748,
"type": "related-to"
},
{
"id": 1153,
"from_id": 51750,
"to_id": 51749,
"type": "related-to"
}
] | [] |
13,715 | It is associated with the cyberespionage group BlackTech, which mainly targets technology companies and government agencies in East Asia (specifically Taiwan, and in some instances, Japan and Hong Kong) and is responsible for some infamous campaigns such as PLEAD and Shrouded Crossbow. | [
{
"id": 51763,
"label": "threat-actor",
"start_offset": 47,
"end_offset": 56
},
{
"id": 51764,
"label": "location",
"start_offset": 127,
"end_offset": 137
},
{
"id": 51765,
"label": "location",
"start_offset": 151,
"end_offset": 157
},
{
"id": 51766,
"label": "location",
"start_offset": 182,
"end_offset": 187
},
{
"id": 51767,
"label": "location",
"start_offset": 192,
"end_offset": 201
},
{
"id": 51768,
"label": "campaign",
"start_offset": 258,
"end_offset": 263
},
{
"id": 51772,
"label": "identity",
"start_offset": 79,
"end_offset": 99
},
{
"id": 51770,
"label": "campaign",
"start_offset": 268,
"end_offset": 285
}
] | [
{
"id": 1154,
"from_id": 51763,
"to_id": 51772,
"type": "targets"
},
{
"id": 1155,
"from_id": 51772,
"to_id": 51764,
"type": "located-at"
},
{
"id": 1156,
"from_id": 51772,
"to_id": 51765,
"type": "located-at"
},
{
"id": 1157,
"from_id": 51772,
"to_id": 51766,
"type": "located-at"
},
{
"id": 1158,
"from_id": 51772,
"to_id": 51767,
"type": "located-at"
},
{
"id": 1159,
"from_id": 51763,
"to_id": 51768,
"type": "related-to"
},
{
"id": 1160,
"from_id": 51763,
"to_id": 51770,
"type": "related-to"
}
] | [] |
13,800 | Therefore, the first-stage shellcode takes the PID of the Windows Service — which the first-stage shellcode and the succeeding backdoor both inject into — hides the target process, and embeds that PID into the second-stage shellcode. | [
{
"id": 48789,
"label": "tools",
"start_offset": 27,
"end_offset": 37
},
{
"id": 48790,
"label": "SOFTWARE",
"start_offset": 58,
"end_offset": 73
},
{
"id": 48791,
"label": "attack-pattern",
"start_offset": 141,
"end_offset": 152
}
] | [
{
"id": 464,
"from_id": 48789,
"to_id": 48790,
"type": "duplicate-of"
},
{
"id": 465,
"from_id": 48789,
"to_id": 48791,
"type": "uses"
}
] | [] |
13,913 | It is interesting to note that DarkSide’s ransom note is similar to that of Babuk, which might indicate that these two families share a link. | [
{
"id": 48734,
"label": "malware",
"start_offset": 31,
"end_offset": 42
},
{
"id": 48735,
"label": "malware",
"start_offset": 76,
"end_offset": 81
}
] | [
{
"id": 450,
"from_id": 48734,
"to_id": 48735,
"type": "related-to"
}
] | [] |
13,919 | The actors behind Darkside have stated that they avoid targeting companies in certain industries, including healthcare, education, the public sector, and the nonprofit sector. | [
{
"id": 48741,
"label": "malware",
"start_offset": 18,
"end_offset": 27
},
{
"id": 48744,
"label": "identity",
"start_offset": 0,
"end_offset": 10
}
] | [
{
"id": 451,
"from_id": 48741,
"to_id": 48744,
"type": "attributed-to"
}
] | [] |
13,921 | Based on Trend Micro data, the US is by far DarkSide’s most targeted country, at more than 500 detections, followed by France, Belgium, and Canada. | [
{
"id": 48745,
"label": "malware",
"start_offset": 44,
"end_offset": 55
},
{
"id": 48748,
"label": "location",
"start_offset": 127,
"end_offset": 134
},
{
"id": 48747,
"label": "location",
"start_offset": 119,
"end_offset": 125
},
{
"id": 48746,
"label": "location",
"start_offset": 31,
"end_offset": 34
},
{
"id": 48749,
"label": "location",
"start_offset": 140,
"end_offset": 146
}
] | [
{
"id": 452,
"from_id": 48745,
"to_id": 48746,
"type": "targets"
},
{
"id": 455,
"from_id": 48745,
"to_id": 48749,
"type": "targets"
},
{
"id": 453,
"from_id": 48745,
"to_id": 48747,
"type": "targets"
},
{
"id": 454,
"from_id": 48745,
"to_id": 48748,
"type": "targets"
}
] | [] |
13,922 | As previously mentioned, DarkSide avoids victimizing companies in CIS countries. | [
{
"id": 48750,
"label": "malware",
"start_offset": 25,
"end_offset": 34
},
{
"id": 48751,
"label": "location",
"start_offset": 66,
"end_offset": 79
}
] | [
{
"id": 456,
"from_id": 48750,
"to_id": 48751,
"type": "related-to"
}
] | [] |
13,924 | That the group admittedly spares companies in CIS countries could be a clue to where DarkSide actors are residing. | [
{
"id": 48752,
"label": "malware",
"start_offset": 85,
"end_offset": 94
},
{
"id": 48753,
"label": "location",
"start_offset": 46,
"end_offset": 59
}
] | [
{
"id": 457,
"from_id": 48752,
"to_id": 48753,
"type": "related-to"
}
] | [] |
13,940 | Jon Clay, Director of Global Threat Communications at Trend Micro, outlines the phases of ransomware: | [
{
"id": 48758,
"label": "identity",
"start_offset": 0,
"end_offset": 9
},
{
"id": 48759,
"label": "identity",
"start_offset": 54,
"end_offset": 65
}
] | [
{
"id": 458,
"from_id": 48759,
"to_id": 48758,
"type": "related-to"
}
] | [] |
13,960 | In a US Senate hearing on cybersecurity threats, Senator Rob Portman of Ohio described the strike on Colonial Pipeline as “potentially the most substantial and damaging attack on US critical infrastructure ever.” | [
{
"id": 48769,
"label": "identity",
"start_offset": 49,
"end_offset": 68
},
{
"id": 48768,
"label": "identity",
"start_offset": 5,
"end_offset": 14
},
{
"id": 48770,
"label": "location",
"start_offset": 72,
"end_offset": 77
},
{
"id": 48771,
"label": "location",
"start_offset": 179,
"end_offset": 182
}
] | [
{
"id": 459,
"from_id": 48769,
"to_id": 48768,
"type": "related-to"
},
{
"id": 460,
"from_id": 48769,
"to_id": 48770,
"type": "related-to"
}
] | [] |
13,996 | While analyzing the technical details of this malware, which includes two new espionage backdoors, we noticed striking similarities to other malware attributed to the threat actor known as APT37, also known as Reaper or Group 123. | [
{
"id": 48781,
"label": "threat-actor",
"start_offset": 188,
"end_offset": 194
},
{
"id": 48782,
"label": "threat-actor",
"start_offset": 210,
"end_offset": 217
},
{
"id": 48783,
"label": "threat-actor",
"start_offset": 220,
"end_offset": 229
}
] | [
{
"id": 461,
"from_id": 48781,
"to_id": 48782,
"type": "duplicate-of"
},
{
"id": 462,
"from_id": 48781,
"to_id": 48783,
"type": "duplicate-of"
}
] | [] |
13,999 | It is important to note that previous analysis of suspected APT37 activities from different security vendors date from 2016, and the captured samples for the Operation Earth Kitsune have been developed recently. | [
{
"id": 48786,
"label": "threat-actor",
"start_offset": 60,
"end_offset": 66
},
{
"id": 48787,
"label": "TIME",
"start_offset": 119,
"end_offset": 123
},
{
"id": 48788,
"label": "campaign",
"start_offset": 158,
"end_offset": 182
}
] | [
{
"id": 463,
"from_id": 48786,
"to_id": 48787,
"type": "related-to"
}
] | [] |
14,071 | Figure 9 shows that SLUB used “Windows-RT-KB-2937636.dll,” while Freenki used “Windows-KB275122-x86.exe.” Figure 9 Naming convention for persistence. | [
{
"id": 47392,
"label": "FILEPATH",
"start_offset": 79,
"end_offset": 103
},
{
"id": 47389,
"label": "FILEPATH",
"start_offset": 31,
"end_offset": 56
},
{
"id": 47395,
"label": "malware",
"start_offset": 65,
"end_offset": 73
},
{
"id": 43549,
"label": "malware",
"start_offset": 20,
"end_offset": 24
}
] | [
{
"id": 316,
"from_id": 43549,
"to_id": 47389,
"type": "uses"
},
{
"id": 317,
"from_id": 47395,
"to_id": 47392,
"type": "uses"
}
] | [] |
14,072 | We can see how the Freenki malware, previous SLUB campaigns, and Operation Earth Kitsune share many common TTPs in their delivery and persistence mechanisms. | [
{
"id": 47402,
"label": "malware",
"start_offset": 23,
"end_offset": 31
},
{
"id": 47403,
"label": "malware",
"start_offset": 49,
"end_offset": 54
},
{
"id": 47425,
"label": "campaign",
"start_offset": 69,
"end_offset": 92
}
] | [
{
"id": 344,
"from_id": 47402,
"to_id": 47403,
"type": "related-to"
},
{
"id": 345,
"from_id": 47402,
"to_id": 47425,
"type": "related-to"
}
] | [] |
14,077 | In the blog describing Operation Earth Kitsune, we noted sites using the GNUBoard Content Management System (CMS) had been compromised and were used to host malware. | [
{
"id": 48008,
"label": "campaign",
"start_offset": 23,
"end_offset": 46
},
{
"id": 48009,
"label": "SOFTWARE",
"start_offset": 73,
"end_offset": 90
},
{
"id": 48010,
"label": "malware",
"start_offset": 157,
"end_offset": 164
}
] | [
{
"id": 370,
"from_id": 48010,
"to_id": 48009,
"type": "compromises"
},
{
"id": 376,
"from_id": 48009,
"to_id": 48010,
"type": "hosts"
}
] | [] |
14,081 | The SLUB campaign also exploited and used GNUBoard websites as part of the infrastructure. | [
{
"id": 48160,
"label": "campaign",
"start_offset": 4,
"end_offset": 17
},
{
"id": 48161,
"label": "SOFTWARE",
"start_offset": 42,
"end_offset": 51
}
] | [
{
"id": 389,
"from_id": 48160,
"to_id": 48161,
"type": "exploits"
}
] | [] |
14,123 | Mattermost was being used as a C2 channel for the malware. | [
{
"id": 48188,
"label": "SOFTWARE",
"start_offset": 0,
"end_offset": 11
},
{
"id": 48189,
"label": "malware",
"start_offset": 50,
"end_offset": 57
}
] | [
{
"id": 390,
"from_id": 48189,
"to_id": 48188,
"type": "uses"
}
] | [] |
14,126 | At the same time, we were able to locate the Mattermost server hosted in Greece, and that gave us the current time zone of the Mattermost server. | [
{
"id": 48192,
"label": "location",
"start_offset": 73,
"end_offset": 79
},
{
"id": 48191,
"label": "Infrastucture",
"start_offset": 127,
"end_offset": 144
},
{
"id": 48193,
"label": "Infrastucture",
"start_offset": 45,
"end_offset": 62
}
] | [
{
"id": 392,
"from_id": 48191,
"to_id": 48192,
"type": "located-at"
},
{
"id": 393,
"from_id": 48193,
"to_id": 48192,
"type": "located-at"
}
] | [] |
14,220 | The payload is a file named loadoerf.ini that contains decryption, run, and code injection functions. | [
{
"id": 48249,
"label": "FILEPATH",
"start_offset": 28,
"end_offset": 40
},
{
"id": 48250,
"label": "attack-pattern",
"start_offset": 76,
"end_offset": 90
}
] | [
{
"id": 394,
"from_id": 48249,
"to_id": 48250,
"type": "uses"
}
] | [] |
14,221 | When it is loaded by the system, DLLMain decrypts the payload via CryptUnprotectData. | [
{
"id": 48251,
"label": "tools",
"start_offset": 66,
"end_offset": 84
},
{
"id": 48252,
"label": "malware",
"start_offset": 33,
"end_offset": 41
}
] | [
{
"id": 395,
"from_id": 48252,
"to_id": 48251,
"type": "uses"
}
] | [] |
14,253 | Nearly all the C&C servers are hosted in the U.S., while two are located in Japan. | [
{
"id": 48448,
"label": "location",
"start_offset": 45,
"end_offset": 49
},
{
"id": 48449,
"label": "Infrastucture",
"start_offset": 15,
"end_offset": 26
}
] | [
{
"id": 410,
"from_id": 48449,
"to_id": 48448,
"type": "located-at"
}
] | [] |
14,259 | Related Hashes (SHA256) detected as BKDR64_WINNTI.ONM: 06b077e31a6f339c4f3b1f61ba9a6a6ba827afe52ed5bed6a6bf56bf18a279ba — cryptbase.dll 1e63a7186886deea6c4e5c2a329eab76a60be3a65bca1ba9ed6e71f9a46b7e9d – loadperf.dll 7c37ebb96c54d5d8ea232951ccf56cb1d029facdd6b730f80ca2ad566f6c5d9b – loadoerf.ini 9d04ef8708cf030b9688bf3e8287c1790023a76374e43bd332178e212420f9fb — wbemcomn.ini b1a0d0508ee932bbf91625330d2136f33344ed70cb25f7e64be0620d32c4b9e2 — cryptbase.ini e5273b72c853f12b77a11e9c08ae6432fabbb32238ac487af2fb959a6cc26089 — wbemcomn.dll Tags Malware | APT & Targeted Attacks | Endpoints | Research | [
{
"id": 48453,
"label": "FILEPATH",
"start_offset": 36,
"end_offset": 53
},
{
"id": 48457,
"label": "FILEPATH",
"start_offset": 283,
"end_offset": 295
},
{
"id": 48459,
"label": "FILEPATH",
"start_offset": 524,
"end_offset": 537
},
{
"id": 48460,
"label": "FILEPATH",
"start_offset": 443,
"end_offset": 456
},
{
"id": 48455,
"label": "FILEPATH",
"start_offset": 122,
"end_offset": 135
},
{
"id": 48456,
"label": "FILEPATH",
"start_offset": 203,
"end_offset": 215
},
{
"id": 48463,
"label": "FILEPATH",
"start_offset": 363,
"end_offset": 376
},
{
"id": 44129,
"label": "SHA1",
"start_offset": 55,
"end_offset": 119
},
{
"id": 44130,
"label": "SHA1",
"start_offset": 136,
"end_offset": 200
},
{
"id": 44131,
"label": "SHA1",
"start_offset": 216,
"end_offset": 280
},
{
"id": 44132,
"label": "SHA1",
"start_offset": 296,
"end_offset": 360
},
{
"id": 44133,
"label": "SHA1",
"start_offset": 376,
"end_offset": 440
},
{
"id": 44134,
"label": "SHA1",
"start_offset": 457,
"end_offset": 521
}
] | [
{
"id": 412,
"from_id": 48453,
"to_id": 48455,
"type": "related-to"
},
{
"id": 414,
"from_id": 48456,
"to_id": 48453,
"type": "related-to"
},
{
"id": 416,
"from_id": 48453,
"to_id": 48457,
"type": "related-to"
},
{
"id": 415,
"from_id": 48460,
"to_id": 48456,
"type": "related-to"
},
{
"id": 418,
"from_id": 48453,
"to_id": 48459,
"type": "related-to"
},
{
"id": 419,
"from_id": 44129,
"to_id": 48455,
"type": "related-to"
},
{
"id": 420,
"from_id": 44130,
"to_id": 48456,
"type": "related-to"
},
{
"id": 421,
"from_id": 44132,
"to_id": 48463,
"type": "related-to"
},
{
"id": 422,
"from_id": 44133,
"to_id": 48460,
"type": "related-to"
},
{
"id": 423,
"from_id": 44134,
"to_id": 48459,
"type": "related-to"
}
] | [
{
"id": 2,
"comment": "Schau mal bitte drüber"
}
] |
14,263 | Our analysis of the latest Maikspy variants revealed that users contracted the spyware from hxxp://miakhalifagame[.]com/, a website that distributes malicious apps (including the 2016 adult game) and connects to its C&C server to upload data from infected devices and machines. | [
{
"id": 48474,
"label": "malware",
"start_offset": 27,
"end_offset": 35
},
{
"id": 48475,
"label": "URL",
"start_offset": 92,
"end_offset": 120
},
{
"id": 48477,
"label": "Infrastucture",
"start_offset": 216,
"end_offset": 226
},
{
"id": 48476,
"label": "TIME",
"start_offset": 179,
"end_offset": 183
}
] | [
{
"id": 424,
"from_id": 48474,
"to_id": 48475,
"type": "related-to"
},
{
"id": 425,
"from_id": 48475,
"to_id": 48477,
"type": "related-to"
},
{
"id": 426,
"from_id": 48477,
"to_id": 48474,
"type": "related-to"
}
] | [] |
14,265 | Figure 1. Tweets that mention Virtual Girlfriend and the short link of hxxp://miakhalifagame[.]com/ Maikspy on the Android platform Figure 2. | [
{
"id": 48479,
"label": "URL",
"start_offset": 71,
"end_offset": 99
},
{
"id": 48480,
"label": "malware",
"start_offset": 100,
"end_offset": 108
},
{
"id": 48481,
"label": "SOFTWARE",
"start_offset": 115,
"end_offset": 123
}
] | [
{
"id": 427,
"from_id": 48479,
"to_id": 48480,
"type": "related-to"
},
{
"id": 428,
"from_id": 48480,
"to_id": 48481,
"type": "targets"
}
] | [] |
14,267 | Based on the analysis of samples that were last seen in the wild in March 2018, the Maikspy variant (detected by Trend Micro as AndroidOS_MaikSpy.HRX) that runs on Android poses as Virtual Girlfriend to lure users into visiting the attackers’ malicious domain. | [
{
"id": 48487,
"label": "malware",
"start_offset": 128,
"end_offset": 149
},
{
"id": 48488,
"label": "SOFTWARE",
"start_offset": 164,
"end_offset": 172
},
{
"id": 48486,
"label": "identity",
"start_offset": 113,
"end_offset": 124
},
{
"id": 48489,
"label": "SOFTWARE",
"start_offset": 181,
"end_offset": 200
},
{
"id": 48484,
"label": "TIME",
"start_offset": 68,
"end_offset": 78
},
{
"id": 48485,
"label": "malware",
"start_offset": 84,
"end_offset": 92
}
] | [
{
"id": 429,
"from_id": 48487,
"to_id": 48489,
"type": "related-to"
},
{
"id": 430,
"from_id": 48484,
"to_id": 48485,
"type": "related-to"
},
{
"id": 431,
"from_id": 48485,
"to_id": 48487,
"type": "related-to"
},
{
"id": 432,
"from_id": 48487,
"to_id": 48488,
"type": "targets"
}
] | [] |
14,296 | Maikspy on the Windows platform Figure 7. | [
{
"id": 48501,
"label": "malware",
"start_offset": 0,
"end_offset": 8
},
{
"id": 48502,
"label": "SOFTWARE",
"start_offset": 15,
"end_offset": 23
}
] | [
{
"id": 433,
"from_id": 48501,
"to_id": 48502,
"type": "targets"
}
] | [] |
14,297 | Infection chain of Maikspy Windows variant Figure 8. | [
{
"id": 48503,
"label": "malware",
"start_offset": 19,
"end_offset": 27
},
{
"id": 48504,
"label": "SOFTWARE",
"start_offset": 27,
"end_offset": 35
}
] | [
{
"id": 434,
"from_id": 48503,
"to_id": 48504,
"type": "targets"
}
] | [] |
14,299 | In the case of the Windows variant (WORM_INFOKEY.A) of Maikspy last seen in April 2017, the user will be tricked into downloading a MiaKhalifa.rar file, which contains the files seen in the screenshot below: | [
{
"id": 48510,
"label": "TIME",
"start_offset": 76,
"end_offset": 86
},
{
"id": 48507,
"label": "SOFTWARE",
"start_offset": 19,
"end_offset": 27
},
{
"id": 48508,
"label": "malware",
"start_offset": 36,
"end_offset": 50
},
{
"id": 48509,
"label": "malware",
"start_offset": 55,
"end_offset": 63
},
{
"id": 48511,
"label": "FILEPATH",
"start_offset": 132,
"end_offset": 152
}
] | [
{
"id": 435,
"from_id": 48508,
"to_id": 48509,
"type": "related-to"
},
{
"id": 436,
"from_id": 48508,
"to_id": 48507,
"type": "duplicate-of"
},
{
"id": 437,
"from_id": 48509,
"to_id": 48510,
"type": "related-to"
},
{
"id": 438,
"from_id": 48508,
"to_id": 48511,
"type": "related-to"
}
] | [] |
14,301 | Content of the MiaKhalifa.rar file README.txt provides instructions teaching the user how to turn off the anti-virus software and how to turn on the network, which the attacker needs to steal and upload data to its C&C server. | [
{
"id": 48512,
"label": "FILEPATH",
"start_offset": 15,
"end_offset": 29
},
{
"id": 48515,
"label": "SOFTWARE",
"start_offset": 106,
"end_offset": 125
},
{
"id": 48513,
"label": "FILEPATH",
"start_offset": 34,
"end_offset": 45
},
{
"id": 48514,
"label": "Infrastucture",
"start_offset": 215,
"end_offset": 225
}
] | [
{
"id": 439,
"from_id": 48512,
"to_id": 48513,
"type": "related-to"
},
{
"id": 440,
"from_id": 48513,
"to_id": 48515,
"type": "related-to"
}
] | [] |
14,303 | Content of README.txt register.bat is used to gain administrator privilege. | [
{
"id": 48516,
"label": "FILEPATH",
"start_offset": 11,
"end_offset": 21
},
{
"id": 48518,
"label": "FILEPATH",
"start_offset": 22,
"end_offset": 34
},
{
"id": 48519,
"label": "attack-pattern",
"start_offset": 51,
"end_offset": 74
}
] | [
{
"id": 441,
"from_id": 48518,
"to_id": 48519,
"type": "uses"
}
] | [] |
14,305 | Code snippet of register.bat Uninstall.exe is a copy of the open-source hacking tool Mimikatz (https://github[.]com/gentilkiwi/mimikatz). | [
{
"id": 48520,
"label": "FILEPATH",
"start_offset": 16,
"end_offset": 28
},
{
"id": 48521,
"label": "FILEPATH",
"start_offset": 29,
"end_offset": 42
},
{
"id": 48522,
"label": "malware",
"start_offset": 88,
"end_offset": 89
},
{
"id": 48524,
"label": "URL",
"start_offset": 95,
"end_offset": 135
},
{
"id": 48523,
"label": "malware",
"start_offset": 85,
"end_offset": 94
}
] | [
{
"id": 442,
"from_id": 48521,
"to_id": 48523,
"type": "related-to"
},
{
"id": 443,
"from_id": 48520,
"to_id": 48521,
"type": "related-to"
},
{
"id": 444,
"from_id": 48523,
"to_id": 48524,
"type": "related-to"
}
] | [] |
14,309 | Like the Android Maikspy, it first sends a notification to its C&C server to register the device. | [
{
"id": 48530,
"label": "SOFTWARE",
"start_offset": 9,
"end_offset": 17
},
{
"id": 48531,
"label": "malware",
"start_offset": 17,
"end_offset": 24
},
{
"id": 48532,
"label": "Infrastucture",
"start_offset": 63,
"end_offset": 73
}
] | [
{
"id": 445,
"from_id": 48531,
"to_id": 48532,
"type": "beacons-to"
}
] | [] |
14,337 | Based on these findings, it’s possible that the attackers behind Maikspy operate //www[.]roundyearfun[.]org/ and hxxp://miakhalifagame[.]com/. | [
{
"id": 48565,
"label": "malware",
"start_offset": 65,
"end_offset": 73
},
{
"id": 48568,
"label": "URL",
"start_offset": 113,
"end_offset": 141
},
{
"id": 48566,
"label": "URL",
"start_offset": 83,
"end_offset": 108
}
] | [
{
"id": 446,
"from_id": 48565,
"to_id": 48566,
"type": "beacons-to"
},
{
"id": 447,
"from_id": 48565,
"to_id": 48568,
"type": "beacons-to"
}
] | [] |
14,341 | The first variant of Maikspy appeared on the Windows platform in December 2016. | [
{
"id": 48576,
"label": "malware",
"start_offset": 21,
"end_offset": 29
},
{
"id": 48578,
"label": "TIME",
"start_offset": 65,
"end_offset": 78
},
{
"id": 48577,
"label": "SOFTWARE",
"start_offset": 45,
"end_offset": 53
}
] | [
{
"id": 448,
"from_id": 48576,
"to_id": 48577,
"type": "duplicate-of"
},
{
"id": 449,
"from_id": 48576,
"to_id": 48578,
"type": "related-to"
}
] | [] |
14,364 | Figure 21. Connection of Maikspy variants to 107[.]180[.]46[.]243 and hxxp://fakeomegle[.]com Figure 22. Connection of Maikspy variants to 198[.]12[.]149[.]13and hxxp://miakhalifagame[.]com/ | [
{
"id": 51779,
"label": "URL",
"start_offset": 163,
"end_offset": 191
},
{
"id": 51777,
"label": "URL",
"start_offset": 70,
"end_offset": 93
},
{
"id": 51781,
"label": "malware",
"start_offset": 120,
"end_offset": 127
},
{
"id": 51778,
"label": "IPV4",
"start_offset": 140,
"end_offset": 159
},
{
"id": 51780,
"label": "malware",
"start_offset": 25,
"end_offset": 32
},
{
"id": 44372,
"label": "IPV4",
"start_offset": 45,
"end_offset": 65
}
] | [
{
"id": 1161,
"from_id": 51780,
"to_id": 44372,
"type": "communicates-with"
},
{
"id": 1162,
"from_id": 51780,
"to_id": 51777,
"type": "communicates-with"
},
{
"id": 1163,
"from_id": 51781,
"to_id": 51778,
"type": "communicates-with"
},
{
"id": 1164,
"from_id": 51781,
"to_id": 51779,
"type": "communicates-with"
}
] | [] |
14,408 | Leverage WMI for fileless intrusion Execute Powershell script for fileless intrusion | [
{
"id": 47166,
"label": "attack-pattern",
"start_offset": 66,
"end_offset": 84
},
{
"id": 44534,
"label": "tools",
"start_offset": 44,
"end_offset": 54
}
] | [
{
"id": 309,
"from_id": 44534,
"to_id": 47166,
"type": "uses"
}
] | [] |