Type
stringclasses 5
values | Text
stringlengths 1
70
| Fixed Text
stringlengths 2
70
| Score
float64 0.23
1
| Original Sentence ID
int64 0
6.64k
| Original Sentence
stringlengths 6
383
| Decoded Sentence
stringlengths 5
382
| __index_level_0__
int64 0
13.8k
|
|---|---|---|---|---|---|---|---|
Malware
|
Poison I
|
Poison Ivy,
| 0.509997
| 0
|
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors .
|
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors.
| 0
|
Vulnerability
|
vy
|
Ivy,
| 0.472894
| 0
|
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors .
|
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors.
| 1
|
Malware
|
B-Hack
|
B-Hack
| 0.639093
| 4
|
In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television .
|
In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television.
| 2
|
Malware
|
B
|
B-Hack
| 0.639087
| 5
|
In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television .
|
In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television.
| 3
|
Indicator
|
I-
|
I-Hack
| 0.479866
| 5
|
In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television .
|
In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television.
| 6
|
Organization
|
ck
|
B-Hack
| 0.582262
| 6
|
In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- .
|
In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-.
| 10
|
Indicator
|
I
|
I-.
| 0.596476
| 6
|
In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- .
|
In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-.
| 11
|
Malware
|
LOWBALL
|
LOWBALL
| 0.977435
| 8
|
Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer .
|
Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer.
| 12
|
System
|
Dropbox
|
Dropbox
| 0.963676
| 8
|
Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer .
|
Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer.
| 13
|
Indicator
|
upload.bat
|
upload.bat
| 0.935677
| 8
|
Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer .
|
Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer.
| 14
|
Malware
|
B-Hack
|
B-Hack
| 0.829692
| 9
|
We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command .
|
We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command.
| 15
|
Malware
|
BUBBLEWRAP
|
BUBBLEWRAP
| 0.931767
| 9
|
We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command .
|
We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command.
| 16
|
Indicator
|
Backdoor.APT.FakeWinHTTPHelper
|
Backdoor.APT.FakeWinHTTPHelper)
| 0.757575
| 9
|
We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command .
|
We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command.
| 17
|
System
|
Dropbox
|
Dropbox
| 0.983996
| 9
|
We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command .
|
We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command.
| 18
|
System
|
B
|
B-Hack
| 0.908694
| 10
|
We have previously observed the B-Hack I-Hack use BUBBLEWRAP .
|
We have previously observed the B-Hack I-Hack use BUBBLEWRAP.
| 19
|
System
|
Ha
|
I-Hack
| 0.81714
| 10
|
We have previously observed the B-Hack I-Hack use BUBBLEWRAP .
|
We have previously observed the B-Hack I-Hack use BUBBLEWRAP.
| 21
|
System
|
BUBBLEWRAP
|
BUBBLEWRAP.
| 0.755166
| 10
|
We have previously observed the B-Hack I-Hack use BUBBLEWRAP .
|
We have previously observed the B-Hack I-Hack use BUBBLEWRAP.
| 22
|
Malware
|
LOWBALL
|
LOWBALL
| 0.991841
| 11
|
The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets .
|
The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets.
| 23
|
Malware
|
BUBBLEWRAP
|
BUBBLEWRAP
| 0.973986
| 11
|
The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets .
|
The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets.
| 24
|
Malware
|
Ha
|
B-Hack,
| 0.569378
| 16
|
The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- .
|
The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I-.
| 25
|
System
|
B-Hack I
|
B-Hack I-Hack,
| 0.527285
| 17
|
The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- .
|
The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I-.
| 26
|
System
|
Ha
|
I-Hack,
| 0.503507
| 17
|
The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- .
|
The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I-.
| 27
|
Organization
|
FireEye
|
FireEye
| 0.968587
| 18
|
In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations .
|
In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations.
| 28
|
Organization
|
B-Hack
|
B-Hack
| 0.882944
| 18
|
In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations .
|
In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations.
| 29
|
Malware
|
Poison Ivy RAT
|
Poison Ivy RAT
| 0.902927
| 18
|
In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations .
|
In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations.
| 30
|
Organization
|
B-Hack
|
B-Hack
| 0.708643
| 19
|
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- .
|
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-.
| 31
|
System
|
Malaysia Airlines Flight MH370
|
Malaysia Airlines Flight MH370
| 0.927813
| 19
|
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- .
|
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-.
| 32
|
Organization
|
B-Hack
|
B-Hack
| 0.708643
| 20
|
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- .
|
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-.
| 33
|
System
|
Malaysia Airlines Flight MH370
|
Malaysia Airlines Flight MH370
| 0.927813
| 20
|
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- .
|
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-.
| 34
|
Organization
|
FireEye
|
FireEye,
| 0.960378
| 21
|
According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL .
|
According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL.
| 35
|
Organization
|
B-Hack
|
B-Hack
| 0.774017
| 21
|
According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL .
|
According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL.
| 36
|
Vulnerability
|
Microsoft Office vulnerabilities
|
Microsoft Office vulnerabilities
| 0.887841
| 21
|
According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL .
|
According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL.
| 37
|
Malware
|
LOWBALL
|
LOWBALL.
| 0.973628
| 21
|
According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL .
|
According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL.
| 38
|
Organization
|
FireEye
|
FireEye,
| 0.960378
| 22
|
According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL .
|
According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL.
| 39
|
Organization
|
B-Hack
|
B-Hack
| 0.774017
| 22
|
According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL .
|
According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL.
| 40
|
Vulnerability
|
Microsoft Office vulnerabilities
|
Microsoft Office vulnerabilities
| 0.887841
| 22
|
According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL .
|
According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL.
| 41
|
Malware
|
LOWBALL
|
LOWBALL.
| 0.973628
| 22
|
According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL .
|
According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL.
| 42
|
Organization
|
B-Hack
|
B-Hack's
| 0.852179
| 23
|
The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP .
|
The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP.
| 43
|
System
|
Dropbox
|
Dropbox
| 0.981636
| 23
|
The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP .
|
The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP.
| 44
|
Malware
|
BUBBLEWRAP
|
BUBBLEWRAP.
| 0.949787
| 23
|
The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP .
|
The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP.
| 45
|
Malware
|
B
|
B-Hack
| 0.31581
| 24
|
Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement .
|
Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement.
| 46
|
Indicator
|
-Hack I-Ha
|
B-Hack I-Hack
| 0.715077
| 24
|
Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement .
|
Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement.
| 47
|
Indicator
|
- I
|
B- I-,
| 0.751592
| 24
|
Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement .
|
Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement.
| 48
|
Malware
|
B-Hack
|
B-Hack
| 0.774287
| 25
|
Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement .
|
Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement.
| 49
|
Organization
|
FireEye
|
FireEye
| 0.974297
| 26
|
This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose .
|
This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose.
| 50
|
Malware
|
MH370
|
MH370-themed
| 0.912999
| 26
|
This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose .
|
This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose.
| 55
|
Malware
|
Ha
|
B-Hack
| 0.823753
| 26
|
This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose .
|
This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose.
| 58
|
Malware
|
Ha
|
I-Hack
| 0.470358
| 26
|
This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose .
|
This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose.
| 59
|
Malware
|
Poison Ivy RAT
|
Poison Ivy RAT
| 0.969063
| 27
|
The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- .
|
The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-.
| 60
|
System
|
HTTP
|
WinHTTPHelper
| 0.87924
| 27
|
The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- .
|
The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-.
| 62
|
Malware
|
Poison Ivy RAT
|
Poison Ivy RAT
| 0.969063
| 28
|
The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- .
|
The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-.
| 64
|
System
|
HTTP
|
WinHTTPHelper
| 0.87924
| 28
|
The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- .
|
The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-.
| 66
|
Organization
|
FireEye
|
FireEye
| 0.991103
| 29
|
FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
|
FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper.
| 68
|
Malware
|
B-Hack I
|
B-Hack I-Hack's
| 0.83878
| 29
|
FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
|
FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper.
| 69
|
Malware
|
Hack
|
I-Hack's
| 0.882142
| 29
|
FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
|
FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper.
| 70
|
Malware
|
Poison Ivy
|
Poison Ivy:
| 0.696365
| 29
|
FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
|
FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper.
| 71
|
Organization
|
B-
|
B-Hack
| 0.562104
| 30
|
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March .
|
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March.
| 72
|
Malware
|
B-Hack
|
B-Hack
| 0.884683
| 31
|
Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack .
|
Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack.
| 75
|
Malware
|
Ha
|
I-Hack
| 0.603568
| 31
|
Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack .
|
Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack.
| 77
|
Malware
|
Ha
|
I-Hack.
| 0.496734
| 31
|
Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack .
|
Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack.
| 78
|
Organization
|
FireEye
|
FireEye
| 0.988711
| 32
|
FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- .
|
FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I-.
| 79
|
Malware
|
B-Hack
|
B-Hack's
| 0.782438
| 32
|
FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- .
|
FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I-.
| 80
|
Malware
|
B-Hack
|
B-Hack
| 0.751828
| 32
|
FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- .
|
FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I-.
| 81
|
Organization
|
B-Hack
|
B-Hack
| 0.790838
| 33
|
The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai .
|
The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai.
| 82
|
Organization
|
ck
|
B-Hack
| 0.749665
| 34
|
These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are .
|
These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are.
| 90
|
Organization
|
B-Hack
|
B-Hack
| 0.803005
| 35
|
B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently .
|
B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently.
| 91
|
Malware
|
BISCUIT
|
BISCUIT
| 0.825483
| 35
|
B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently .
|
B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently.
| 92
|
Malware
|
B-Hack
|
B-Hack
| 0.963537
| 36
|
While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT .
|
While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT.
| 93
|
Malware
|
Poison Ivy
|
Poison Ivy
| 0.755209
| 36
|
While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT .
|
While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT.
| 94
|
Malware
|
Gh0st RAT
|
Gh0st RAT.
| 0.804621
| 36
|
While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT .
|
While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT.
| 95
|
Malware
|
B-Hack I-Hack I-Hack
|
B-Hack I-Hack I-Hack,
| 0.935567
| 37
|
Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack .
|
Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack.
| 96
|
Malware
|
B-Hack I-Hack I-Hack
|
B-Hack I-Hack I-Hack
| 0.948526
| 37
|
Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack .
|
Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack.
| 97
|
System
|
B
|
B-Hack.
| 0.510743
| 37
|
Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack .
|
Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack.
| 98
|
Malware
|
B
|
B-Hack
| 0.935241
| 38
|
B-Hack were a highly prolific B-Hack I-Hack operating out of China .
|
B-Hack were a highly prolific B-Hack I-Hack operating out of China.
| 101
|
Malware
|
Ha
|
I-Hack
| 0.573745
| 38
|
B-Hack were a highly prolific B-Hack I-Hack operating out of China .
|
B-Hack were a highly prolific B-Hack I-Hack operating out of China.
| 103
|
Malware
|
B-Hack
|
B-Hack
| 0.861203
| 39
|
B-Hack is a China-based B-Hack I-Hack, active since mid-2006 .
|
B-Hack is a China-based B-Hack I-Hack, active since mid-2006.
| 104
|
System
|
Ha
|
I-Hack,
| 0.462108
| 39
|
B-Hack is a China-based B-Hack I-Hack, active since mid-2006 .
|
B-Hack is a China-based B-Hack I-Hack, active since mid-2006.
| 107
|
Malware
|
B-Hack
|
B-Hack's
| 0.829563
| 40
|
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals .
|
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals.
| 108
|
Organization
|
Arbor
|
Arbor
| 0.830469
| 41
|
Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE .
|
Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE.
| 109
|
Organization
|
FireEye
|
FireEye
| 0.98843
| 41
|
Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE .
|
Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE.
| 110
|
Malware
|
B-Hack
|
B-Hack
| 0.841121
| 41
|
Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE .
|
Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE.
| 111
|
Organization
|
B-Hack
|
B-Hack.
| 0.484352
| 42
|
However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack .
|
However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack.
| 112
|
Organization
|
FireEye
|
FireEye
| 0.98697
| 43
|
From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server .
|
From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server.
| 113
|
Malware
|
B-Hack
|
B-Hack
| 0.67049
| 43
|
From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server .
|
From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server.
| 114
|
Malware
|
RIPTIDE
|
RIPTIDE,
| 0.883725
| 43
|
From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server .
|
From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server.
| 115
|
Malware
|
B-Hack
|
B-Hack
| 0.894439
| 44
|
Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 .
|
Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158.
| 116
|
System
|
Microsoft Word (.doc
|
Microsoft Word (.doc)
| 0.813062
| 44
|
Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 .
|
Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158.
| 117
|
Vulnerability
|
CVE-2012-0158
|
CVE-2012-0158.
| 0.659746
| 44
|
Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 .
|
Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158.
| 118
|
Organization
|
FireEye
|
FireEye
| 0.985713
| 45
|
FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset .
|
FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset.
| 119
|
Malware
|
RIPTIDE
|
RIPTIDE
| 0.876574
| 45
|
FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset .
|
FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset.
| 120
|
Malware
|
HIGHTIDE
|
HIGHTIDE
| 0.846049
| 45
|
FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset .
|
FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset.
| 121
|
Organization
|
B-Hack
|
B-Hack
| 0.917771
| 45
|
FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset .
|
FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset.
| 122
|
Malware
|
Poison Ivy
|
Poison Ivy,
| 0.788956
| 46
|
They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors .
|
They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors.
| 123
|
Malware
|
B-Hack I-Hack I-Hack
|
B-Hack I-Hack I-Hack,
| 0.560256
| 47
|
A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- .
|
A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B-.
| 124
|
Organization
|
FireEye
|
FireEye
| 0.974788
| 47
|
A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- .
|
A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B-.
| 125
|
Malware
|
B-Hack
|
B-Hack
| 0.718617
| 47
|
A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- .
|
A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B-.
| 126
|
Indicator
|
(
|
(I-Hack)
| 0.370555
| 47
|
A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- .
|
A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B-.
| 127
|
Malware
|
I-Hack) I-Hack
|
(I-Hack) I-Hack
| 0.633782
| 47
|
A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- .
|
A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B-.
| 128
|
Malware
|
B-Hack
|
B-Hack,
| 0.72013
| 47
|
A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- .
|
A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B-.
| 129
|
Indicator
|
B- I- I- I-
|
B- I- I- I-
| 0.93668
| 49
|
About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families .
|
About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families.
| 130
|
End of preview. Expand
in Data Studio
README.md exists but content is empty.
- Downloads last month
- 28