Type
stringclasses
5 values
Text
stringlengths
1
70
Fixed Text
stringlengths
2
70
Score
float64
0.23
1
Original Sentence ID
int64
0
6.64k
Original Sentence
stringlengths
6
383
Decoded Sentence
stringlengths
5
382
__index_level_0__
int64
0
13.8k
Malware
B
B-Hack
0.738766
49
About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families .
About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families.
131
Indicator
Backdoor.APT.Aumlib
Backdoor.APT.Aumlib
0.940962
49
About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families .
About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families.
134
Indicator
Backdoor.APT.Ixeshe
Backdoor.APT.Ixeshe
0.945449
49
About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families .
About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families.
135
Malware
B-Hack I-Hack
B-Hack I-Hack
0.868182
50
With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc .
With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc.
137
Malware
Hack
B-Hack,
0.635523
50
With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc .
With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc.
140
System
B-
B-Hack
0.557596
50
With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc .
With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc.
141
System
ck I-
B-Hack I-Hack,
0.462968
50
With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc .
With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc.
143
Malware
Hack
I-Hack,
0.564015
50
With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc .
With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc.
144
Malware
B-Hack I-Hack
B-Hack I-Hack
0.885449
51
B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc .
B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc.
147
Malware
Hack
B-Hack,
0.702592
51
B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc .
B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc.
150
Malware
Ha
B-Hack
0.584832
51
B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc .
B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc.
154
System
ck I-
B-Hack I-Hack,
0.589406
51
B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc .
B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc.
155
Malware
Hack
I-Hack,
0.547335
51
B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc .
B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc.
156
Malware
B-Hack
B-Hack
0.865865
52
The new B- mark the first significant stirrings from the B-Hack since it went silent in January in the wake of a detailed expose of the B-Hack and its exploits — and a retooling of what security researchers believe is a massive spying operation based in China .
The new B- mark the first significant stirrings from the B-Hack since it went silent in January in the wake of a detailed expose of the B-Hack and its exploits — and a retooling of what security researchers believe is a massive spying operation based in China.
160
Organization
B-Hack
B-Hack
0.725603
53
Between November 26, 2015, and December 1, 2015, known and suspected China-based B-Hack launched several B- I- I- targeting Japan and Taiwan in the B-, B- I-, B- and B- I- I- .
Between November 26, 2015, and December 1, 2015, known and suspected China-based B-Hack launched several B- I- I- targeting Japan and Taiwan in the B-, B- I-, B- and B- I- I-.
161
Organization
B-Hack I-Hack
B-Hack I-Hack
0.867914
54
Between November 26, 2015, and December 1, 2015, known and suspected China-based B-Hack I-Hack launched several B- I- I- targeting Japanese and Taiwanese organizations in the B-, B- I-, B- and B- I- I- .
Between November 26, 2015, and December 1, 2015, known and suspected China-based B-Hack I-Hack launched several B- I- I- targeting Japanese and Taiwanese organizations in the B-, B- I-, B- and B- I- I-.
162
Organization
B
B-Hack
0.704315
55
On November 26, 2015, a suspected China-based B-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I- .
On November 26, 2015, a suspected China-based B-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I-.
163
Organization
B
B-Hack
0.456269
56
On November 26, 2015, a suspected China-based B-Hack I-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I- .
On November 26, 2015, a suspected China-based B-Hack I-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I-.
165
Malware
Hack I
B-Hack I-Hack
0.437154
56
On November 26, 2015, a suspected China-based B-Hack I-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I- .
On November 26, 2015, a suspected China-based B-Hack I-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I-.
167
Organization
ck
I-Hack
0.609931
56
On November 26, 2015, a suspected China-based B-Hack I-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I- .
On November 26, 2015, a suspected China-based B-Hack I-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I-.
170
System
B
B-Hack
0.475607
57
While attribution of the first two B- I- I- is still uncertain, we attribute the second December B- I- to the China-based B-Hack I-Hack that we refer to as B-Hack .
While attribution of the first two B- I- I- is still uncertain, we attribute the second December B- I- to the China-based B-Hack I-Hack that we refer to as B-Hack.
171
Malware
B-Hack
B-Hack.
0.40655
57
While attribution of the first two B- I- I- is still uncertain, we attribute the second December B- I- to the China-based B-Hack I-Hack that we refer to as B-Hack .
While attribution of the first two B- I- I- is still uncertain, we attribute the second December B- I- to the China-based B-Hack I-Hack that we refer to as B-Hack.
173
Malware
B-Hack
B-Hack
0.871437
59
On the same date that B-Hack targeted Taiwanese B-, suspected Chinese B-Hack I-Hack also targeted a Taiwanese B- I-, sending a lure document that contained instructions for registration and subsequent listing of goods on a local Taiwanese auction website .
On the same date that B-Hack targeted Taiwanese B-, suspected Chinese B-Hack I-Hack also targeted a Taiwanese B- I-, sending a lure document that contained instructions for registration and subsequent listing of goods on a local Taiwanese auction website.
174
Malware
B-Hack I-Hack
B-Hack I-Hack
0.858308
59
On the same date that B-Hack targeted Taiwanese B-, suspected Chinese B-Hack I-Hack also targeted a Taiwanese B- I-, sending a lure document that contained instructions for registration and subsequent listing of goods on a local Taiwanese auction website .
On the same date that B-Hack targeted Taiwanese B-, suspected Chinese B-Hack I-Hack also targeted a Taiwanese B- I-, sending a lure document that contained instructions for registration and subsequent listing of goods on a local Taiwanese auction website.
175
Indicator
- I
B- I-,
0.702974
59
On the same date that B-Hack targeted Taiwanese B-, suspected Chinese B-Hack I-Hack also targeted a Taiwanese B- I-, sending a lure document that contained instructions for registration and subsequent listing of goods on a local Taiwanese auction website .
On the same date that B-Hack targeted Taiwanese B-, suspected Chinese B-Hack I-Hack also targeted a Taiwanese B- I-, sending a lure document that contained instructions for registration and subsequent listing of goods on a local Taiwanese auction website.
176
Organization
B-Hack
B-Hack
0.842659
60
It is possible, although not confirmed, that B-Hack was also responsible for targeting this B- I-, given both the timeframe and the use of the same n-day to eventually deploy the ELMER backdoor .
It is possible, although not confirmed, that B-Hack was also responsible for targeting this B- I-, given both the timeframe and the use of the same n-day to eventually deploy the ELMER backdoor.
177
Malware
ELMER
ELMER
0.868569
60
It is possible, although not confirmed, that B-Hack was also responsible for targeting this B- I-, given both the timeframe and the use of the same n-day to eventually deploy the ELMER backdoor .
It is possible, although not confirmed, that B-Hack was also responsible for targeting this B- I-, given both the timeframe and the use of the same n-day to eventually deploy the ELMER backdoor.
178
Indicator
I
I-
0.5906
61
Despite the differing sponsorship, penetration of Hong Kong and Taiwan-based B- I- continues to be a priority for China-based B-Hack .
Despite the differing sponsorship, penetration of Hong Kong and Taiwan-based B- I- continues to be a priority for China-based B-Hack.
179
Organization
B-Hack
B-Hack.
0.722606
61
Despite the differing sponsorship, penetration of Hong Kong and Taiwan-based B- I- continues to be a priority for China-based B-Hack .
Despite the differing sponsorship, penetration of Hong Kong and Taiwan-based B- I- continues to be a priority for China-based B-Hack.
180
Organization
B-Hack
B-Hack
0.869961
63
B-Hack was embedding the encoded CnC IP address for the BLACKCOFFEE malware in legitimate Microsoft TechNet profiles pages and forum threads, a method some in the information security community call a " dead drop resolver " .
B-Hack was embedding the encoded CnC IP address for the BLACKCOFFEE malware in legitimate Microsoft TechNet profiles pages and forum threads, a method some in the information security community call a " dead drop resolver ".
181
Malware
BLACKCOFFEE
BLACKCOFFEE
0.97311
63
B-Hack was embedding the encoded CnC IP address for the BLACKCOFFEE malware in legitimate Microsoft TechNet profiles pages and forum threads, a method some in the information security community call a " dead drop resolver " .
B-Hack was embedding the encoded CnC IP address for the BLACKCOFFEE malware in legitimate Microsoft TechNet profiles pages and forum threads, a method some in the information security community call a " dead drop resolver ".
182
Organization
Microsoft TechNet
Microsoft TechNet
0.979214
63
B-Hack was embedding the encoded CnC IP address for the BLACKCOFFEE malware in legitimate Microsoft TechNet profiles pages and forum threads, a method some in the information security community call a " dead drop resolver " .
B-Hack was embedding the encoded CnC IP address for the BLACKCOFFEE malware in legitimate Microsoft TechNet profiles pages and forum threads, a method some in the information security community call a " dead drop resolver ".
183
Malware
B-Hack
B-Hack,
0.904483
64
B-Hack, also known as B-Hack, is a China-based B-Hack I-Hack that FireEye Intelligence has observed conducting network intrusions against U.S.
B-Hack, also known as B-Hack, is a China-based B-Hack I-Hack that FireEye Intelligence has observed conducting network intrusions against U.S.
184
Malware
B-Hack I-Ha
B-Hack I-Hack
0.781358
64
B-Hack, also known as B-Hack, is a China-based B-Hack I-Hack that FireEye Intelligence has observed conducting network intrusions against U.S.
B-Hack, also known as B-Hack, is a China-based B-Hack I-Hack that FireEye Intelligence has observed conducting network intrusions against U.S.
186
Organization
FireEye Intelligence
FireEye Intelligence
0.990066
64
B-Hack, also known as B-Hack, is a China-based B-Hack I-Hack that FireEye Intelligence has observed conducting network intrusions against U.S.
B-Hack, also known as B-Hack, is a China-based B-Hack I-Hack that FireEye Intelligence has observed conducting network intrusions against U.S.
187
Organization
FireEye
FireEye
0.986303
66
FireEye has monitored B-Hack's use of BLACKCOFFEE variants since 2013 to masquerade malicious communication as normal web traffic by disguising the CnC communication as queries to web search engines .
FireEye has monitored B-Hack's use of BLACKCOFFEE variants since 2013 to masquerade malicious communication as normal web traffic by disguising the CnC communication as queries to web search engines.
188
Organization
B-Hack
B-Hack's
0.945064
66
FireEye has monitored B-Hack's use of BLACKCOFFEE variants since 2013 to masquerade malicious communication as normal web traffic by disguising the CnC communication as queries to web search engines .
FireEye has monitored B-Hack's use of BLACKCOFFEE variants since 2013 to masquerade malicious communication as normal web traffic by disguising the CnC communication as queries to web search engines.
189
Malware
BLACKCOFFEE
BLACKCOFFEE
0.863672
66
FireEye has monitored B-Hack's use of BLACKCOFFEE variants since 2013 to masquerade malicious communication as normal web traffic by disguising the CnC communication as queries to web search engines .
FireEye has monitored B-Hack's use of BLACKCOFFEE variants since 2013 to masquerade malicious communication as normal web traffic by disguising the CnC communication as queries to web search engines.
190
Malware
BLACKCOFFEE
BLACKCOFFEE
0.85537
67
The use of BLACKCOFFEE demonstrates B-Hack's evolving use of public websites to hide in plain sight .
The use of BLACKCOFFEE demonstrates B-Hack's evolving use of public websites to hide in plain sight.
191
Organization
B-Hack
B-Hack's
0.886053
67
The use of BLACKCOFFEE demonstrates B-Hack's evolving use of public websites to hide in plain sight .
The use of BLACKCOFFEE demonstrates B-Hack's evolving use of public websites to hide in plain sight.
192
Malware
B-Hack
B-Hack
0.899165
68
B-Hack is a stealthy and extremely successful B-Hack I-Hack I-Hack (B-Hack) I-Hack known to target a broad range of verticals since at least 2009, including B-, B-, B-, B- I- I-, B-, B-, and B- I- .
B-Hack is a stealthy and extremely successful B-Hack I-Hack I-Hack (B-Hack) I-Hack known to target a broad range of verticals since at least 2009, including B-, B-, B-, B- I- I-, B-, B-, and B- I-.
193
Malware
B-Hack I-Hack I-Hack
B-Hack I-Hack I-Hack
0.854234
68
B-Hack is a stealthy and extremely successful B-Hack I-Hack I-Hack (B-Hack) I-Hack known to target a broad range of verticals since at least 2009, including B-, B-, B-, B- I- I-, B-, B-, and B- I- .
B-Hack is a stealthy and extremely successful B-Hack I-Hack I-Hack (B-Hack) I-Hack known to target a broad range of verticals since at least 2009, including B-, B-, B-, B- I- I-, B-, B-, and B- I-.
194
Malware
B-Hack)
(B-Hack)
0.893988
68
B-Hack is a stealthy and extremely successful B-Hack I-Hack I-Hack (B-Hack) I-Hack known to target a broad range of verticals since at least 2009, including B-, B-, B-, B- I- I-, B-, B-, and B- I- .
B-Hack is a stealthy and extremely successful B-Hack I-Hack I-Hack (B-Hack) I-Hack known to target a broad range of verticals since at least 2009, including B-, B-, B-, B- I- I-, B-, B-, and B- I-.
195
Malware
Ha
I-Hack
0.885499
68
B-Hack is a stealthy and extremely successful B-Hack I-Hack I-Hack (B-Hack) I-Hack known to target a broad range of verticals since at least 2009, including B-, B-, B-, B- I- I-, B-, B-, and B- I- .
B-Hack is a stealthy and extremely successful B-Hack I-Hack I-Hack (B-Hack) I-Hack known to target a broad range of verticals since at least 2009, including B-, B-, B-, B- I- I-, B-, B-, and B- I-.
196
Indicator
cdLoader
hcdLoader
0.741663
69
The B-Hack then installed the hcdLoader RAT, which installs as a Windows service and provides command line access to the compromised system .
The B-Hack then installed the hcdLoader RAT, which installs as a Windows service and provides command line access to the compromised system.
197
System
Windows
Windows
0.995523
69
The B-Hack then installed the hcdLoader RAT, which installs as a Windows service and provides command line access to the compromised system .
The B-Hack then installed the hcdLoader RAT, which installs as a Windows service and provides command line access to the compromised system.
198
Malware
B-Hack I-Hack
B-Hack I-Hack
0.857273
70
The malware used by the B-Hack I-Hack has ties to the HTTPBrowser malware family, and uses DNS requests as a command and control mechanism .
The malware used by the B-Hack I-Hack has ties to the HTTPBrowser malware family, and uses DNS requests as a command and control mechanism.
199
Malware
HTTP
HTTPBrowser
0.765342
70
The malware used by the B-Hack I-Hack has ties to the HTTPBrowser malware family, and uses DNS requests as a command and control mechanism .
The malware used by the B-Hack I-Hack has ties to the HTTPBrowser malware family, and uses DNS requests as a command and control mechanism.
200
Malware
HTTPBrowser
HTTPBrowser,
0.376543
71
These URIs result in the download of an installer, which creates a PE of the malware typically known as HTTPBrowser, but called Token Control by the B-Hack I-Hack themselves (based upon the PDB strings found within many of the samples).
These URIs result in the download of an installer, which creates a PE of the malware typically known as HTTPBrowser, but called Token Control by the B-Hack I-Hack themselves (based upon the PDB strings found within many of the samples).
203
Malware
B-Hack
B-Hack
0.808561
72
B-Hack seemed to be going after B- I- I-, Chinese dissident groups and B-, B-, B- and B- I- that could benefit the Chinese economy .
B-Hack seemed to be going after B- I- I-, Chinese dissident groups and B-, B-, B- and B- I- that could benefit the Chinese economy.
204
Malware
B-Hack
B-Hack
0.818209
73
B-Hack seemed to be going after B- I- I-, Chinese dissident groups and other B- target, as well as certain B- targets and other B- targets in B- and B- I- that could benefit the Chinese economy .
B-Hack seemed to be going after B- I- I-, Chinese dissident groups and other B- target, as well as certain B- targets and other B- targets in B- and B- I- that could benefit the Chinese economy.
205
Malware
B-Hack I-Hack
B-Hack I-Hack
0.901771
74
B-Hack I-Hack (also known as B-Hack or B-Hack I-Hack) is a separate Russian-based B-Hack I-Hack, which has been active since mid 2000s, and has been responsible for targeted B- I- against the B-, B-, B-, B- and B- I- .
B-Hack I-Hack (also known as B-Hack or B-Hack I-Hack) is a separate Russian-based B-Hack I-Hack, which has been active since mid 2000s, and has been responsible for targeted B- I- against the B-, B-, B-, B- and B- I-.
206
Malware
B-Hack
B-Hack
0.859877
74
B-Hack I-Hack (also known as B-Hack or B-Hack I-Hack) is a separate Russian-based B-Hack I-Hack, which has been active since mid 2000s, and has been responsible for targeted B- I- against the B-, B-, B-, B- and B- I- .
B-Hack I-Hack (also known as B-Hack or B-Hack I-Hack) is a separate Russian-based B-Hack I-Hack, which has been active since mid 2000s, and has been responsible for targeted B- I- against the B-, B-, B-, B- and B- I-.
207
Malware
B-Hack I-Hack
B-Hack I-Hack)
0.819772
74
B-Hack I-Hack (also known as B-Hack or B-Hack I-Hack) is a separate Russian-based B-Hack I-Hack, which has been active since mid 2000s, and has been responsible for targeted B- I- against the B-, B-, B-, B- and B- I- .
B-Hack I-Hack (also known as B-Hack or B-Hack I-Hack) is a separate Russian-based B-Hack I-Hack, which has been active since mid 2000s, and has been responsible for targeted B- I- against the B-, B-, B-, B- and B- I-.
208
Malware
Ha
I-Hack,
0.738855
74
B-Hack I-Hack (also known as B-Hack or B-Hack I-Hack) is a separate Russian-based B-Hack I-Hack, which has been active since mid 2000s, and has been responsible for targeted B- I- against the B-, B-, B-, B- and B- I- .
B-Hack I-Hack (also known as B-Hack or B-Hack I-Hack) is a separate Russian-based B-Hack I-Hack, which has been active since mid 2000s, and has been responsible for targeted B- I- against the B-, B-, B-, B- and B- I-.
210
Malware
APT28
APT28
0.933793
75
APT28 malware, in particular the family of modular backdoors that we call CHOPSTICK, indicates a formal code development environment .
APT28 malware, in particular the family of modular backdoors that we call CHOPSTICK, indicates a formal code development environment.
211
Malware
CHOPSTICK
CHOPSTICK,
0.931774
75
APT28 malware, in particular the family of modular backdoors that we call CHOPSTICK, indicates a formal code development environment .
APT28 malware, in particular the family of modular backdoors that we call CHOPSTICK, indicates a formal code development environment.
212
Malware
B-Hack
B-Hack's
0.646303
76
However, three themes in B-Hack's targeting clearly reflects areas of specific interest to an Eastern European B-, most likely the Russian government .
However, three themes in B-Hack's targeting clearly reflects areas of specific interest to an Eastern European B-, most likely the Russian government.
213
Malware
B-Hack
B-Hack's
0.85095
77
We identified three themes in B-Hack's lures and registered domains, which together are particularly relevant to the Russian government .
We identified three themes in B-Hack's lures and registered domains, which together are particularly relevant to the Russian government.
214
Organization
NATO
NATO,
0.738313
79
cooperation and NATO, provide a strong incentive for Russian state-sponsored B-Hack I-Hack to steal information that sheds light on these topics .
cooperation and NATO, provide a strong incentive for Russian state-sponsored B-Hack I-Hack to steal information that sheds light on these topics.
215
Organization
B
B-Hack
0.963482
79
cooperation and NATO, provide a strong incentive for Russian state-sponsored B-Hack I-Hack to steal information that sheds light on these topics .
cooperation and NATO, provide a strong incentive for Russian state-sponsored B-Hack I-Hack to steal information that sheds light on these topics.
216
Organization
ck
I-Hack
0.651402
79
cooperation and NATO, provide a strong incentive for Russian state-sponsored B-Hack I-Hack to steal information that sheds light on these topics .
cooperation and NATO, provide a strong incentive for Russian state-sponsored B-Hack I-Hack to steal information that sheds light on these topics.
220
Malware
B-Hack I-Hack
B-Hack I-Hack
0.738282
80
Instead, we observed the two Russian B-Hack I-Hack compromise the same systems and engage separately in the theft of identical credentials .
Instead, we observed the two Russian B-Hack I-Hack compromise the same systems and engage separately in the theft of identical credentials.
221
Organization
B-Hack
B-Hack's
0.780971
81
B-Hack's malware settings suggest that the developers have done the majority of their work in a Russian language build environment during Russian business hours, which suggests that the Russian government is B-Hack's sponsor .
B-Hack's malware settings suggest that the developers have done the majority of their work in a Russian language build environment during Russian business hours, which suggests that the Russian government is B-Hack's sponsor.
223
Organization
B-Hack
B-Hack's
0.80172
82
We believe that B-Hack's targeting of the MOD aligns with Russian threat perceptions .
We believe that B-Hack's targeting of the MOD aligns with Russian threat perceptions.
224
Malware
B-Hack
B-Hack
0.833219
83
We assess that B-Hack is most likely sponsored by the Russian government .
We assess that B-Hack is most likely sponsored by the Russian government.
225
Malware
B-Hack
B-Hack's
0.70961
84
Given the available data, we assess that B-Hack's work is sponsored by the Russian government .
Given the available data, we assess that B-Hack's work is sponsored by the Russian government.
226
Malware
B-Hack
B-Hack's
0.653712
88
Some of B-Hack's more commonly used tools are the SOURFACE downloader, its second stage backdoor EVILTOSS, and a modular family of implants that we call CHOPSTICK .
Some of B-Hack's more commonly used tools are the SOURFACE downloader, its second stage backdoor EVILTOSS, and a modular family of implants that we call CHOPSTICK.
227
Malware
SOURFACE
SOURFACE
0.905016
88
Some of B-Hack's more commonly used tools are the SOURFACE downloader, its second stage backdoor EVILTOSS, and a modular family of implants that we call CHOPSTICK .
Some of B-Hack's more commonly used tools are the SOURFACE downloader, its second stage backdoor EVILTOSS, and a modular family of implants that we call CHOPSTICK.
228
Malware
EVILTOS
EVILTOSS,
0.833851
88
Some of B-Hack's more commonly used tools are the SOURFACE downloader, its second stage backdoor EVILTOSS, and a modular family of implants that we call CHOPSTICK .
Some of B-Hack's more commonly used tools are the SOURFACE downloader, its second stage backdoor EVILTOSS, and a modular family of implants that we call CHOPSTICK.
229
Malware
CHOPSTICK
CHOPSTICK.
0.889016
88
Some of B-Hack's more commonly used tools are the SOURFACE downloader, its second stage backdoor EVILTOSS, and a modular family of implants that we call CHOPSTICK .
Some of B-Hack's more commonly used tools are the SOURFACE downloader, its second stage backdoor EVILTOSS, and a modular family of implants that we call CHOPSTICK.
230
Malware
B-Hack
B-Hack
0.731321
89
While B-Hack continues to primarily threaten organizations and individuals operating in Russia and former Soviet states, this B- illustrates its willingness to expand its scope to other targets that have intelligence of interest to the Russian government .
While B-Hack continues to primarily threaten organizations and individuals operating in Russia and former Soviet states, this B- illustrates its willingness to expand its scope to other targets that have intelligence of interest to the Russian government.
231
Organization
CTU
CTU
0.902411
90
CTU researchers assess with moderate confidence that the B-Hack is operating from the Russian Federation and is gathering intelligence on behalf of the Russian government .
CTU researchers assess with moderate confidence that the B-Hack is operating from the Russian Federation and is gathering intelligence on behalf of the Russian government.
232
Malware
B-Hack
B-Hack
0.810702
90
CTU researchers assess with moderate confidence that the B-Hack is operating from the Russian Federation and is gathering intelligence on behalf of the Russian government .
CTU researchers assess with moderate confidence that the B-Hack is operating from the Russian Federation and is gathering intelligence on behalf of the Russian government.
233
Malware
B-Hack
B-Hack
0.893184
92
Our visibility into the operations of B-Hack - a B-Hack we believe the Russian Government sponsors - has given us insight into some of the B-'s targets, as well as its objectives and the B- designed to further them .
Our visibility into the operations of B-Hack - a B-Hack we believe the Russian Government sponsors - has given us insight into some of the B-'s targets, as well as its objectives and the B- designed to further them.
234
Organization
B-Hack
B-Hack
0.862674
93
Since at least 2007, B-Hack has engaged in extensive operations in support of Russian strategic interests .
Since at least 2007, B-Hack has engaged in extensive operations in support of Russian strategic interests.
235
Indicator
I
I-
0.508638
94
B- I- I- has primarily targeted entities in the U.S., Europe, and the countries of the former Soviet Union, including B-, B-, B- I-, B- I-, and B- and B- opposed to the current Russian Government .
B- I- I- has primarily targeted entities in the U.S., Europe, and the countries of the former Soviet Union, including B-, B-, B- I-, B- I-, and B- and B- opposed to the current Russian Government.
236
Indicator
I
I-
0.557935
95
B- I- I- has primarily targeted entities in the U.S., Europe, and the countries of the former Soviet Union, including B- and B-, B- I-, B- I-, and B- and B- opposed to the current Russian Government .
B- I- I- has primarily targeted entities in the U.S., Europe, and the countries of the former Soviet Union, including B- and B-, B- I-, B- I-, and B- and B- opposed to the current Russian Government.
237
Malware
B-Ha
B-Hack
0.558343
96
Over the past two years, Russia appears to have increasingly leveraged B-Hack to conduct information operations commensurate with broader strategic military doctrine .
Over the past two years, Russia appears to have increasingly leveraged B-Hack to conduct information operations commensurate with broader strategic military doctrine.
238
Malware
B-Hack
B-Hack
0.582398
97
After compromising a victim organization, B-Hack will steal internal data that is then leaked to further political narratives aligned with Russian interests .
After compromising a victim organization, B-Hack will steal internal data that is then leaked to further political narratives aligned with Russian interests.
240
Malware
B
B-Hack
0.94751
98
After compromising a B- I-, B-Hack will steal internal data .
After compromising a B- I-, B-Hack will steal internal data.
241
Organization
Department of Homeland Security
Department of Homeland Security
0.926802
99
On December 29, 2016, the Department of Homeland Security (DHS) and Federal Bureau of Investigation (FBI) released a Joint Analysis Report confirming FireEye's long held public assessment that the Russian Government sponsors B-Hack .
On December 29, 2016, the Department of Homeland Security (DHS) and Federal Bureau of Investigation (FBI) released a Joint Analysis Report confirming FireEye's long held public assessment that the Russian Government sponsors B-Hack.
243
Organization
DHS
(DHS)
0.733731
99
On December 29, 2016, the Department of Homeland Security (DHS) and Federal Bureau of Investigation (FBI) released a Joint Analysis Report confirming FireEye's long held public assessment that the Russian Government sponsors B-Hack .
On December 29, 2016, the Department of Homeland Security (DHS) and Federal Bureau of Investigation (FBI) released a Joint Analysis Report confirming FireEye's long held public assessment that the Russian Government sponsors B-Hack.
244
Organization
Federal Bureau of Investigation
Federal Bureau of Investigation
0.970731
99
On December 29, 2016, the Department of Homeland Security (DHS) and Federal Bureau of Investigation (FBI) released a Joint Analysis Report confirming FireEye's long held public assessment that the Russian Government sponsors B-Hack .
On December 29, 2016, the Department of Homeland Security (DHS) and Federal Bureau of Investigation (FBI) released a Joint Analysis Report confirming FireEye's long held public assessment that the Russian Government sponsors B-Hack.
245
Organization
FBI
(FBI)
0.95777
99
On December 29, 2016, the Department of Homeland Security (DHS) and Federal Bureau of Investigation (FBI) released a Joint Analysis Report confirming FireEye's long held public assessment that the Russian Government sponsors B-Hack .
On December 29, 2016, the Department of Homeland Security (DHS) and Federal Bureau of Investigation (FBI) released a Joint Analysis Report confirming FireEye's long held public assessment that the Russian Government sponsors B-Hack.
246
Organization
FireEye
FireEye's
0.967372
99
On December 29, 2016, the Department of Homeland Security (DHS) and Federal Bureau of Investigation (FBI) released a Joint Analysis Report confirming FireEye's long held public assessment that the Russian Government sponsors B-Hack .
On December 29, 2016, the Department of Homeland Security (DHS) and Federal Bureau of Investigation (FBI) released a Joint Analysis Report confirming FireEye's long held public assessment that the Russian Government sponsors B-Hack.
247
Malware
B-Hack
B-Hack.
0.838668
99
On December 29, 2016, the Department of Homeland Security (DHS) and Federal Bureau of Investigation (FBI) released a Joint Analysis Report confirming FireEye's long held public assessment that the Russian Government sponsors B-Hack .
On December 29, 2016, the Department of Homeland Security (DHS) and Federal Bureau of Investigation (FBI) released a Joint Analysis Report confirming FireEye's long held public assessment that the Russian Government sponsors B-Hack.
248
Organization
FireEye
FireEye
0.984466
100
In October 2014, FireEye released B-Hack: A Window into Russia's B- I- I-, and characterized B-Hack's B- as aligning with the Russian Government's strategic intelligence requirements .
In October 2014, FireEye released B-Hack: A Window into Russia's B- I- I-, and characterized B-Hack's B- as aligning with the Russian Government's strategic intelligence requirements.
249
Malware
B-Hack
B-Hack:
0.958432
100
In October 2014, FireEye released B-Hack: A Window into Russia's B- I- I-, and characterized B-Hack's B- as aligning with the Russian Government's strategic intelligence requirements .
In October 2014, FireEye released B-Hack: A Window into Russia's B- I- I-, and characterized B-Hack's B- as aligning with the Russian Government's strategic intelligence requirements.
250
Malware
B-Hack
B-Hack's
0.957377
100
In October 2014, FireEye released B-Hack: A Window into Russia's B- I- I-, and characterized B-Hack's B- as aligning with the Russian Government's strategic intelligence requirements .
In October 2014, FireEye released B-Hack: A Window into Russia's B- I- I-, and characterized B-Hack's B- as aligning with the Russian Government's strategic intelligence requirements.
251
Organization
FireEye
FireEye
0.98397
101
In October 2014, FireEye released B-Hack: A Window into Russia's Cyber Espionage Operations', and characterized B-Hack's B- as aligning with the Russian Government's strategic intelligence requirements .
In October 2014, FireEye released B-Hack: A Window into Russia's Cyber Espionage Operations', and characterized B-Hack's B- as aligning with the Russian Government's strategic intelligence requirements.
252
Malware
B-Hack
B-Hack:
0.945739
101
In October 2014, FireEye released B-Hack: A Window into Russia's Cyber Espionage Operations', and characterized B-Hack's B- as aligning with the Russian Government's strategic intelligence requirements .
In October 2014, FireEye released B-Hack: A Window into Russia's Cyber Espionage Operations', and characterized B-Hack's B- as aligning with the Russian Government's strategic intelligence requirements.
253
Malware
B-Hack
B-Hack's
0.933255
101
In October 2014, FireEye released B-Hack: A Window into Russia's Cyber Espionage Operations', and characterized B-Hack's B- as aligning with the Russian Government's strategic intelligence requirements .
In October 2014, FireEye released B-Hack: A Window into Russia's Cyber Espionage Operations', and characterized B-Hack's B- as aligning with the Russian Government's strategic intelligence requirements.
254
Malware
B-Hack
B-Hack
0.906695
102
B-Hack targets Russian B- and B- Pussy Riot via spear-phishing emails .
B-Hack targets Russian B- and B- Pussy Riot via spear-phishing emails.
255
Malware
Pussy Rio
Pussy Riot
0.87156
102
B-Hack targets Russian B- and B- Pussy Riot via spear-phishing emails .
B-Hack targets Russian B- and B- Pussy Riot via spear-phishing emails.
256
Organization
B-Hack
B-Hack's
0.897298
103
Our investigation of B-Hack's compromise of WADA's network, and our observations of the surrounding events reveal how Russia sought to counteract a damaging narrative and delegitimize the institutions leveling criticism .
Our investigation of B-Hack's compromise of WADA's network, and our observations of the surrounding events reveal how Russia sought to counteract a damaging narrative and delegitimize the institutions leveling criticism.
257
Organization
WADA
WADA's
0.767432
103
Our investigation of B-Hack's compromise of WADA's network, and our observations of the surrounding events reveal how Russia sought to counteract a damaging narrative and delegitimize the institutions leveling criticism .
Our investigation of B-Hack's compromise of WADA's network, and our observations of the surrounding events reveal how Russia sought to counteract a damaging narrative and delegitimize the institutions leveling criticism.
258
Malware
B-Hack
B-Hack
0.87444
104
Since releasing our 2014 report, we continue to assess that B-Hack is sponsored by the Russian Government .
Since releasing our 2014 report, we continue to assess that B-Hack is sponsored by the Russian Government.
259
Malware
B-Hack
B-Hack
0.863079
105
In our 2014 report, we identified B-Hack as a suspected Russian government-sponsored B-Hack I-Hack .
In our 2014 report, we identified B-Hack as a suspected Russian government-sponsored B-Hack I-Hack.
260
Malware
B-Hack I-Hack
B-Hack I-Hack.
0.814558
105
In our 2014 report, we identified B-Hack as a suspected Russian government-sponsored B-Hack I-Hack .
In our 2014 report, we identified B-Hack as a suspected Russian government-sponsored B-Hack I-Hack.
261