Dataset Viewer
Auto-converted to Parquet Duplicate
Type
stringclasses
5 values
Text
stringlengths
1
70
Fixed Text
stringlengths
2
70
Score
float64
0.23
1
Original Sentence ID
int64
0
6.64k
Original Sentence
stringlengths
6
383
Decoded Sentence
stringlengths
5
382
__index_level_0__
int64
0
13.8k
Malware
Poison I
Poison Ivy,
0.509997
0
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors .
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors.
0
Vulnerability
vy
Ivy,
0.472894
0
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors .
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors.
1
Malware
B-Hack
B-Hack
0.639093
4
In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television .
In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television.
2
Malware
B
B-Hack
0.639087
5
In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television .
In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television.
3
Indicator
I-
I-Hack
0.479866
5
In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television .
In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television.
6
Organization
ck
B-Hack
0.582262
6
In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- .
In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-.
10
Indicator
I
I-.
0.596476
6
In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- .
In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-.
11
Malware
LOWBALL
LOWBALL
0.977435
8
Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer .
Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer.
12
System
Dropbox
Dropbox
0.963676
8
Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer .
Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer.
13
Indicator
upload.bat
upload.bat
0.935677
8
Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer .
Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer.
14
Malware
B-Hack
B-Hack
0.829692
9
We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command .
We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command.
15
Malware
BUBBLEWRAP
BUBBLEWRAP
0.931767
9
We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command .
We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command.
16
Indicator
Backdoor.APT.FakeWinHTTPHelper
Backdoor.APT.FakeWinHTTPHelper)
0.757575
9
We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command .
We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command.
17
System
Dropbox
Dropbox
0.983996
9
We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command .
We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command.
18
System
B
B-Hack
0.908694
10
We have previously observed the B-Hack I-Hack use BUBBLEWRAP .
We have previously observed the B-Hack I-Hack use BUBBLEWRAP.
19
System
Ha
I-Hack
0.81714
10
We have previously observed the B-Hack I-Hack use BUBBLEWRAP .
We have previously observed the B-Hack I-Hack use BUBBLEWRAP.
21
System
BUBBLEWRAP
BUBBLEWRAP.
0.755166
10
We have previously observed the B-Hack I-Hack use BUBBLEWRAP .
We have previously observed the B-Hack I-Hack use BUBBLEWRAP.
22
Malware
LOWBALL
LOWBALL
0.991841
11
The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets .
The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets.
23
Malware
BUBBLEWRAP
BUBBLEWRAP
0.973986
11
The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets .
The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets.
24
Malware
Ha
B-Hack,
0.569378
16
The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- .
The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I-.
25
System
B-Hack I
B-Hack I-Hack,
0.527285
17
The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- .
The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I-.
26
System
Ha
I-Hack,
0.503507
17
The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- .
The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I-.
27
Organization
FireEye
FireEye
0.968587
18
In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations .
In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations.
28
Organization
B-Hack
B-Hack
0.882944
18
In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations .
In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations.
29
Malware
Poison Ivy RAT
Poison Ivy RAT
0.902927
18
In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations .
In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations.
30
Organization
B-Hack
B-Hack
0.708643
19
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- .
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-.
31
System
Malaysia Airlines Flight MH370
Malaysia Airlines Flight MH370
0.927813
19
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- .
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-.
32
Organization
B-Hack
B-Hack
0.708643
20
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- .
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-.
33
System
Malaysia Airlines Flight MH370
Malaysia Airlines Flight MH370
0.927813
20
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- .
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-.
34
Organization
FireEye
FireEye,
0.960378
21
According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL .
According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL.
35
Organization
B-Hack
B-Hack
0.774017
21
According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL .
According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL.
36
Vulnerability
Microsoft Office vulnerabilities
Microsoft Office vulnerabilities
0.887841
21
According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL .
According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL.
37
Malware
LOWBALL
LOWBALL.
0.973628
21
According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL .
According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL.
38
Organization
FireEye
FireEye,
0.960378
22
According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL .
According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL.
39
Organization
B-Hack
B-Hack
0.774017
22
According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL .
According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL.
40
Vulnerability
Microsoft Office vulnerabilities
Microsoft Office vulnerabilities
0.887841
22
According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL .
According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL.
41
Malware
LOWBALL
LOWBALL.
0.973628
22
According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL .
According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL.
42
Organization
B-Hack
B-Hack's
0.852179
23
The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP .
The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP.
43
System
Dropbox
Dropbox
0.981636
23
The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP .
The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP.
44
Malware
BUBBLEWRAP
BUBBLEWRAP.
0.949787
23
The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP .
The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP.
45
Malware
B
B-Hack
0.31581
24
Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement .
Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement.
46
Indicator
-Hack I-Ha
B-Hack I-Hack
0.715077
24
Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement .
Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement.
47
Indicator
- I
B- I-,
0.751592
24
Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement .
Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement.
48
Malware
B-Hack
B-Hack
0.774287
25
Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement .
Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement.
49
Organization
FireEye
FireEye
0.974297
26
This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose .
This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose.
50
Malware
MH370
MH370-themed
0.912999
26
This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose .
This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose.
55
Malware
Ha
B-Hack
0.823753
26
This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose .
This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose.
58
Malware
Ha
I-Hack
0.470358
26
This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose .
This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose.
59
Malware
Poison Ivy RAT
Poison Ivy RAT
0.969063
27
The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- .
The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-.
60
System
HTTP
WinHTTPHelper
0.87924
27
The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- .
The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-.
62
Malware
Poison Ivy RAT
Poison Ivy RAT
0.969063
28
The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- .
The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-.
64
System
HTTP
WinHTTPHelper
0.87924
28
The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- .
The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-.
66
Organization
FireEye
FireEye
0.991103
29
FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper.
68
Malware
B-Hack I
B-Hack I-Hack's
0.83878
29
FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper.
69
Malware
Hack
I-Hack's
0.882142
29
FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper.
70
Malware
Poison Ivy
Poison Ivy:
0.696365
29
FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper.
71
Organization
B-
B-Hack
0.562104
30
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March .
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March.
72
Malware
B-Hack
B-Hack
0.884683
31
Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack .
Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack.
75
Malware
Ha
I-Hack
0.603568
31
Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack .
Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack.
77
Malware
Ha
I-Hack.
0.496734
31
Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack .
Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack.
78
Organization
FireEye
FireEye
0.988711
32
FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- .
FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I-.
79
Malware
B-Hack
B-Hack's
0.782438
32
FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- .
FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I-.
80
Malware
B-Hack
B-Hack
0.751828
32
FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- .
FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I-.
81
Organization
B-Hack
B-Hack
0.790838
33
The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai .
The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai.
82
Organization
ck
B-Hack
0.749665
34
These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are .
These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are.
90
Organization
B-Hack
B-Hack
0.803005
35
B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently .
B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently.
91
Malware
BISCUIT
BISCUIT
0.825483
35
B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently .
B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently.
92
Malware
B-Hack
B-Hack
0.963537
36
While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT .
While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT.
93
Malware
Poison Ivy
Poison Ivy
0.755209
36
While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT .
While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT.
94
Malware
Gh0st RAT
Gh0st RAT.
0.804621
36
While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT .
While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT.
95
Malware
B-Hack I-Hack I-Hack
B-Hack I-Hack I-Hack,
0.935567
37
Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack .
Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack.
96
Malware
B-Hack I-Hack I-Hack
B-Hack I-Hack I-Hack
0.948526
37
Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack .
Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack.
97
System
B
B-Hack.
0.510743
37
Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack .
Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack.
98
Malware
B
B-Hack
0.935241
38
B-Hack were a highly prolific B-Hack I-Hack operating out of China .
B-Hack were a highly prolific B-Hack I-Hack operating out of China.
101
Malware
Ha
I-Hack
0.573745
38
B-Hack were a highly prolific B-Hack I-Hack operating out of China .
B-Hack were a highly prolific B-Hack I-Hack operating out of China.
103
Malware
B-Hack
B-Hack
0.861203
39
B-Hack is a China-based B-Hack I-Hack, active since mid-2006 .
B-Hack is a China-based B-Hack I-Hack, active since mid-2006.
104
System
Ha
I-Hack,
0.462108
39
B-Hack is a China-based B-Hack I-Hack, active since mid-2006 .
B-Hack is a China-based B-Hack I-Hack, active since mid-2006.
107
Malware
B-Hack
B-Hack's
0.829563
40
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals .
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals.
108
Organization
Arbor
Arbor
0.830469
41
Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE .
Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE.
109
Organization
FireEye
FireEye
0.98843
41
Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE .
Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE.
110
Malware
B-Hack
B-Hack
0.841121
41
Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE .
Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE.
111
Organization
B-Hack
B-Hack.
0.484352
42
However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack .
However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack.
112
Organization
FireEye
FireEye
0.98697
43
From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server .
From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server.
113
Malware
B-Hack
B-Hack
0.67049
43
From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server .
From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server.
114
Malware
RIPTIDE
RIPTIDE,
0.883725
43
From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server .
From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server.
115
Malware
B-Hack
B-Hack
0.894439
44
Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 .
Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158.
116
System
Microsoft Word (.doc
Microsoft Word (.doc)
0.813062
44
Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 .
Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158.
117
Vulnerability
CVE-2012-0158
CVE-2012-0158.
0.659746
44
Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 .
Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158.
118
Organization
FireEye
FireEye
0.985713
45
FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset .
FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset.
119
Malware
RIPTIDE
RIPTIDE
0.876574
45
FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset .
FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset.
120
Malware
HIGHTIDE
HIGHTIDE
0.846049
45
FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset .
FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset.
121
Organization
B-Hack
B-Hack
0.917771
45
FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset .
FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset.
122
Malware
Poison Ivy
Poison Ivy,
0.788956
46
They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors .
They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors.
123
Malware
B-Hack I-Hack I-Hack
B-Hack I-Hack I-Hack,
0.560256
47
A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- .
A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B-.
124
Organization
FireEye
FireEye
0.974788
47
A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- .
A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B-.
125
Malware
B-Hack
B-Hack
0.718617
47
A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- .
A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B-.
126
Indicator
(
(I-Hack)
0.370555
47
A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- .
A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B-.
127
Malware
I-Hack) I-Hack
(I-Hack) I-Hack
0.633782
47
A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- .
A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B-.
128
Malware
B-Hack
B-Hack,
0.72013
47
A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- .
A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B-.
129
Indicator
B- I- I- I-
B- I- I- I-
0.93668
49
About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families .
About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families.
130
End of preview. Expand in Data Studio
README.md exists but content is empty.
Downloads last month
28