Type
stringclasses 5
values | Text
stringlengths 1
70
| Fixed Text
stringlengths 2
70
| Score
float64 0.23
1
| Original Sentence ID
int64 0
6.64k
| Original Sentence
stringlengths 6
383
| Decoded Sentence
stringlengths 5
382
| __index_level_0__
int64 0
13.8k
|
|---|---|---|---|---|---|---|---|
Malware
|
B
|
B-Hack
| 0.738766
| 49
|
About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families .
|
About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families.
| 131
|
Indicator
|
Backdoor.APT.Aumlib
|
Backdoor.APT.Aumlib
| 0.940962
| 49
|
About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families .
|
About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families.
| 134
|
Indicator
|
Backdoor.APT.Ixeshe
|
Backdoor.APT.Ixeshe
| 0.945449
| 49
|
About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families .
|
About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families.
| 135
|
Malware
|
B-Hack I-Hack
|
B-Hack I-Hack
| 0.868182
| 50
|
With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc .
|
With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc.
| 137
|
Malware
|
Hack
|
B-Hack,
| 0.635523
| 50
|
With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc .
|
With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc.
| 140
|
System
|
B-
|
B-Hack
| 0.557596
| 50
|
With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc .
|
With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc.
| 141
|
System
|
ck I-
|
B-Hack I-Hack,
| 0.462968
| 50
|
With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc .
|
With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc.
| 143
|
Malware
|
Hack
|
I-Hack,
| 0.564015
| 50
|
With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc .
|
With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc.
| 144
|
Malware
|
B-Hack I-Hack
|
B-Hack I-Hack
| 0.885449
| 51
|
B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc .
|
B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc.
| 147
|
Malware
|
Hack
|
B-Hack,
| 0.702592
| 51
|
B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc .
|
B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc.
| 150
|
Malware
|
Ha
|
B-Hack
| 0.584832
| 51
|
B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc .
|
B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc.
| 154
|
System
|
ck I-
|
B-Hack I-Hack,
| 0.589406
| 51
|
B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc .
|
B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc.
| 155
|
Malware
|
Hack
|
I-Hack,
| 0.547335
| 51
|
B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc .
|
B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc.
| 156
|
Malware
|
B-Hack
|
B-Hack
| 0.865865
| 52
|
The new B- mark the first significant stirrings from the B-Hack since it went silent in January in the wake of a detailed expose of the B-Hack and its exploits — and a retooling of what security researchers believe is a massive spying operation based in China .
|
The new B- mark the first significant stirrings from the B-Hack since it went silent in January in the wake of a detailed expose of the B-Hack and its exploits — and a retooling of what security researchers believe is a massive spying operation based in China.
| 160
|
Organization
|
B-Hack
|
B-Hack
| 0.725603
| 53
|
Between November 26, 2015, and December 1, 2015, known and suspected China-based B-Hack launched several B- I- I- targeting Japan and Taiwan in the B-, B- I-, B- and B- I- I- .
|
Between November 26, 2015, and December 1, 2015, known and suspected China-based B-Hack launched several B- I- I- targeting Japan and Taiwan in the B-, B- I-, B- and B- I- I-.
| 161
|
Organization
|
B-Hack I-Hack
|
B-Hack I-Hack
| 0.867914
| 54
|
Between November 26, 2015, and December 1, 2015, known and suspected China-based B-Hack I-Hack launched several B- I- I- targeting Japanese and Taiwanese organizations in the B-, B- I-, B- and B- I- I- .
|
Between November 26, 2015, and December 1, 2015, known and suspected China-based B-Hack I-Hack launched several B- I- I- targeting Japanese and Taiwanese organizations in the B-, B- I-, B- and B- I- I-.
| 162
|
Organization
|
B
|
B-Hack
| 0.704315
| 55
|
On November 26, 2015, a suspected China-based B-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I- .
|
On November 26, 2015, a suspected China-based B-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I-.
| 163
|
Organization
|
B
|
B-Hack
| 0.456269
| 56
|
On November 26, 2015, a suspected China-based B-Hack I-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I- .
|
On November 26, 2015, a suspected China-based B-Hack I-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I-.
| 165
|
Malware
|
Hack I
|
B-Hack I-Hack
| 0.437154
| 56
|
On November 26, 2015, a suspected China-based B-Hack I-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I- .
|
On November 26, 2015, a suspected China-based B-Hack I-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I-.
| 167
|
Organization
|
ck
|
I-Hack
| 0.609931
| 56
|
On November 26, 2015, a suspected China-based B-Hack I-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I- .
|
On November 26, 2015, a suspected China-based B-Hack I-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I-.
| 170
|
System
|
B
|
B-Hack
| 0.475607
| 57
|
While attribution of the first two B- I- I- is still uncertain, we attribute the second December B- I- to the China-based B-Hack I-Hack that we refer to as B-Hack .
|
While attribution of the first two B- I- I- is still uncertain, we attribute the second December B- I- to the China-based B-Hack I-Hack that we refer to as B-Hack.
| 171
|
Malware
|
B-Hack
|
B-Hack.
| 0.40655
| 57
|
While attribution of the first two B- I- I- is still uncertain, we attribute the second December B- I- to the China-based B-Hack I-Hack that we refer to as B-Hack .
|
While attribution of the first two B- I- I- is still uncertain, we attribute the second December B- I- to the China-based B-Hack I-Hack that we refer to as B-Hack.
| 173
|
Malware
|
B-Hack
|
B-Hack
| 0.871437
| 59
|
On the same date that B-Hack targeted Taiwanese B-, suspected Chinese B-Hack I-Hack also targeted a Taiwanese B- I-, sending a lure document that contained instructions for registration and subsequent listing of goods on a local Taiwanese auction website .
|
On the same date that B-Hack targeted Taiwanese B-, suspected Chinese B-Hack I-Hack also targeted a Taiwanese B- I-, sending a lure document that contained instructions for registration and subsequent listing of goods on a local Taiwanese auction website.
| 174
|
Malware
|
B-Hack I-Hack
|
B-Hack I-Hack
| 0.858308
| 59
|
On the same date that B-Hack targeted Taiwanese B-, suspected Chinese B-Hack I-Hack also targeted a Taiwanese B- I-, sending a lure document that contained instructions for registration and subsequent listing of goods on a local Taiwanese auction website .
|
On the same date that B-Hack targeted Taiwanese B-, suspected Chinese B-Hack I-Hack also targeted a Taiwanese B- I-, sending a lure document that contained instructions for registration and subsequent listing of goods on a local Taiwanese auction website.
| 175
|
Indicator
|
- I
|
B- I-,
| 0.702974
| 59
|
On the same date that B-Hack targeted Taiwanese B-, suspected Chinese B-Hack I-Hack also targeted a Taiwanese B- I-, sending a lure document that contained instructions for registration and subsequent listing of goods on a local Taiwanese auction website .
|
On the same date that B-Hack targeted Taiwanese B-, suspected Chinese B-Hack I-Hack also targeted a Taiwanese B- I-, sending a lure document that contained instructions for registration and subsequent listing of goods on a local Taiwanese auction website.
| 176
|
Organization
|
B-Hack
|
B-Hack
| 0.842659
| 60
|
It is possible, although not confirmed, that B-Hack was also responsible for targeting this B- I-, given both the timeframe and the use of the same n-day to eventually deploy the ELMER backdoor .
|
It is possible, although not confirmed, that B-Hack was also responsible for targeting this B- I-, given both the timeframe and the use of the same n-day to eventually deploy the ELMER backdoor.
| 177
|
Malware
|
ELMER
|
ELMER
| 0.868569
| 60
|
It is possible, although not confirmed, that B-Hack was also responsible for targeting this B- I-, given both the timeframe and the use of the same n-day to eventually deploy the ELMER backdoor .
|
It is possible, although not confirmed, that B-Hack was also responsible for targeting this B- I-, given both the timeframe and the use of the same n-day to eventually deploy the ELMER backdoor.
| 178
|
Indicator
|
I
|
I-
| 0.5906
| 61
|
Despite the differing sponsorship, penetration of Hong Kong and Taiwan-based B- I- continues to be a priority for China-based B-Hack .
|
Despite the differing sponsorship, penetration of Hong Kong and Taiwan-based B- I- continues to be a priority for China-based B-Hack.
| 179
|
Organization
|
B-Hack
|
B-Hack.
| 0.722606
| 61
|
Despite the differing sponsorship, penetration of Hong Kong and Taiwan-based B- I- continues to be a priority for China-based B-Hack .
|
Despite the differing sponsorship, penetration of Hong Kong and Taiwan-based B- I- continues to be a priority for China-based B-Hack.
| 180
|
Organization
|
B-Hack
|
B-Hack
| 0.869961
| 63
|
B-Hack was embedding the encoded CnC IP address for the BLACKCOFFEE malware in legitimate Microsoft TechNet profiles pages and forum threads, a method some in the information security community call a " dead drop resolver " .
|
B-Hack was embedding the encoded CnC IP address for the BLACKCOFFEE malware in legitimate Microsoft TechNet profiles pages and forum threads, a method some in the information security community call a " dead drop resolver ".
| 181
|
Malware
|
BLACKCOFFEE
|
BLACKCOFFEE
| 0.97311
| 63
|
B-Hack was embedding the encoded CnC IP address for the BLACKCOFFEE malware in legitimate Microsoft TechNet profiles pages and forum threads, a method some in the information security community call a " dead drop resolver " .
|
B-Hack was embedding the encoded CnC IP address for the BLACKCOFFEE malware in legitimate Microsoft TechNet profiles pages and forum threads, a method some in the information security community call a " dead drop resolver ".
| 182
|
Organization
|
Microsoft TechNet
|
Microsoft TechNet
| 0.979214
| 63
|
B-Hack was embedding the encoded CnC IP address for the BLACKCOFFEE malware in legitimate Microsoft TechNet profiles pages and forum threads, a method some in the information security community call a " dead drop resolver " .
|
B-Hack was embedding the encoded CnC IP address for the BLACKCOFFEE malware in legitimate Microsoft TechNet profiles pages and forum threads, a method some in the information security community call a " dead drop resolver ".
| 183
|
Malware
|
B-Hack
|
B-Hack,
| 0.904483
| 64
|
B-Hack, also known as B-Hack, is a China-based B-Hack I-Hack that FireEye Intelligence has observed conducting network intrusions against U.S.
|
B-Hack, also known as B-Hack, is a China-based B-Hack I-Hack that FireEye Intelligence has observed conducting network intrusions against U.S.
| 184
|
Malware
|
B-Hack I-Ha
|
B-Hack I-Hack
| 0.781358
| 64
|
B-Hack, also known as B-Hack, is a China-based B-Hack I-Hack that FireEye Intelligence has observed conducting network intrusions against U.S.
|
B-Hack, also known as B-Hack, is a China-based B-Hack I-Hack that FireEye Intelligence has observed conducting network intrusions against U.S.
| 186
|
Organization
|
FireEye Intelligence
|
FireEye Intelligence
| 0.990066
| 64
|
B-Hack, also known as B-Hack, is a China-based B-Hack I-Hack that FireEye Intelligence has observed conducting network intrusions against U.S.
|
B-Hack, also known as B-Hack, is a China-based B-Hack I-Hack that FireEye Intelligence has observed conducting network intrusions against U.S.
| 187
|
Organization
|
FireEye
|
FireEye
| 0.986303
| 66
|
FireEye has monitored B-Hack's use of BLACKCOFFEE variants since 2013 to masquerade malicious communication as normal web traffic by disguising the CnC communication as queries to web search engines .
|
FireEye has monitored B-Hack's use of BLACKCOFFEE variants since 2013 to masquerade malicious communication as normal web traffic by disguising the CnC communication as queries to web search engines.
| 188
|
Organization
|
B-Hack
|
B-Hack's
| 0.945064
| 66
|
FireEye has monitored B-Hack's use of BLACKCOFFEE variants since 2013 to masquerade malicious communication as normal web traffic by disguising the CnC communication as queries to web search engines .
|
FireEye has monitored B-Hack's use of BLACKCOFFEE variants since 2013 to masquerade malicious communication as normal web traffic by disguising the CnC communication as queries to web search engines.
| 189
|
Malware
|
BLACKCOFFEE
|
BLACKCOFFEE
| 0.863672
| 66
|
FireEye has monitored B-Hack's use of BLACKCOFFEE variants since 2013 to masquerade malicious communication as normal web traffic by disguising the CnC communication as queries to web search engines .
|
FireEye has monitored B-Hack's use of BLACKCOFFEE variants since 2013 to masquerade malicious communication as normal web traffic by disguising the CnC communication as queries to web search engines.
| 190
|
Malware
|
BLACKCOFFEE
|
BLACKCOFFEE
| 0.85537
| 67
|
The use of BLACKCOFFEE demonstrates B-Hack's evolving use of public websites to hide in plain sight .
|
The use of BLACKCOFFEE demonstrates B-Hack's evolving use of public websites to hide in plain sight.
| 191
|
Organization
|
B-Hack
|
B-Hack's
| 0.886053
| 67
|
The use of BLACKCOFFEE demonstrates B-Hack's evolving use of public websites to hide in plain sight .
|
The use of BLACKCOFFEE demonstrates B-Hack's evolving use of public websites to hide in plain sight.
| 192
|
Malware
|
B-Hack
|
B-Hack
| 0.899165
| 68
|
B-Hack is a stealthy and extremely successful B-Hack I-Hack I-Hack (B-Hack) I-Hack known to target a broad range of verticals since at least 2009, including B-, B-, B-, B- I- I-, B-, B-, and B- I- .
|
B-Hack is a stealthy and extremely successful B-Hack I-Hack I-Hack (B-Hack) I-Hack known to target a broad range of verticals since at least 2009, including B-, B-, B-, B- I- I-, B-, B-, and B- I-.
| 193
|
Malware
|
B-Hack I-Hack I-Hack
|
B-Hack I-Hack I-Hack
| 0.854234
| 68
|
B-Hack is a stealthy and extremely successful B-Hack I-Hack I-Hack (B-Hack) I-Hack known to target a broad range of verticals since at least 2009, including B-, B-, B-, B- I- I-, B-, B-, and B- I- .
|
B-Hack is a stealthy and extremely successful B-Hack I-Hack I-Hack (B-Hack) I-Hack known to target a broad range of verticals since at least 2009, including B-, B-, B-, B- I- I-, B-, B-, and B- I-.
| 194
|
Malware
|
B-Hack)
|
(B-Hack)
| 0.893988
| 68
|
B-Hack is a stealthy and extremely successful B-Hack I-Hack I-Hack (B-Hack) I-Hack known to target a broad range of verticals since at least 2009, including B-, B-, B-, B- I- I-, B-, B-, and B- I- .
|
B-Hack is a stealthy and extremely successful B-Hack I-Hack I-Hack (B-Hack) I-Hack known to target a broad range of verticals since at least 2009, including B-, B-, B-, B- I- I-, B-, B-, and B- I-.
| 195
|
Malware
|
Ha
|
I-Hack
| 0.885499
| 68
|
B-Hack is a stealthy and extremely successful B-Hack I-Hack I-Hack (B-Hack) I-Hack known to target a broad range of verticals since at least 2009, including B-, B-, B-, B- I- I-, B-, B-, and B- I- .
|
B-Hack is a stealthy and extremely successful B-Hack I-Hack I-Hack (B-Hack) I-Hack known to target a broad range of verticals since at least 2009, including B-, B-, B-, B- I- I-, B-, B-, and B- I-.
| 196
|
Indicator
|
cdLoader
|
hcdLoader
| 0.741663
| 69
|
The B-Hack then installed the hcdLoader RAT, which installs as a Windows service and provides command line access to the compromised system .
|
The B-Hack then installed the hcdLoader RAT, which installs as a Windows service and provides command line access to the compromised system.
| 197
|
System
|
Windows
|
Windows
| 0.995523
| 69
|
The B-Hack then installed the hcdLoader RAT, which installs as a Windows service and provides command line access to the compromised system .
|
The B-Hack then installed the hcdLoader RAT, which installs as a Windows service and provides command line access to the compromised system.
| 198
|
Malware
|
B-Hack I-Hack
|
B-Hack I-Hack
| 0.857273
| 70
|
The malware used by the B-Hack I-Hack has ties to the HTTPBrowser malware family, and uses DNS requests as a command and control mechanism .
|
The malware used by the B-Hack I-Hack has ties to the HTTPBrowser malware family, and uses DNS requests as a command and control mechanism.
| 199
|
Malware
|
HTTP
|
HTTPBrowser
| 0.765342
| 70
|
The malware used by the B-Hack I-Hack has ties to the HTTPBrowser malware family, and uses DNS requests as a command and control mechanism .
|
The malware used by the B-Hack I-Hack has ties to the HTTPBrowser malware family, and uses DNS requests as a command and control mechanism.
| 200
|
Malware
|
HTTPBrowser
|
HTTPBrowser,
| 0.376543
| 71
|
These URIs result in the download of an installer, which creates a PE of the malware typically known as HTTPBrowser, but called Token Control by the B-Hack I-Hack themselves (based upon the PDB strings found within many of the samples).
|
These URIs result in the download of an installer, which creates a PE of the malware typically known as HTTPBrowser, but called Token Control by the B-Hack I-Hack themselves (based upon the PDB strings found within many of the samples).
| 203
|
Malware
|
B-Hack
|
B-Hack
| 0.808561
| 72
|
B-Hack seemed to be going after B- I- I-, Chinese dissident groups and B-, B-, B- and B- I- that could benefit the Chinese economy .
|
B-Hack seemed to be going after B- I- I-, Chinese dissident groups and B-, B-, B- and B- I- that could benefit the Chinese economy.
| 204
|
Malware
|
B-Hack
|
B-Hack
| 0.818209
| 73
|
B-Hack seemed to be going after B- I- I-, Chinese dissident groups and other B- target, as well as certain B- targets and other B- targets in B- and B- I- that could benefit the Chinese economy .
|
B-Hack seemed to be going after B- I- I-, Chinese dissident groups and other B- target, as well as certain B- targets and other B- targets in B- and B- I- that could benefit the Chinese economy.
| 205
|
Malware
|
B-Hack I-Hack
|
B-Hack I-Hack
| 0.901771
| 74
|
B-Hack I-Hack (also known as B-Hack or B-Hack I-Hack) is a separate Russian-based B-Hack I-Hack, which has been active since mid 2000s, and has been responsible for targeted B- I- against the B-, B-, B-, B- and B- I- .
|
B-Hack I-Hack (also known as B-Hack or B-Hack I-Hack) is a separate Russian-based B-Hack I-Hack, which has been active since mid 2000s, and has been responsible for targeted B- I- against the B-, B-, B-, B- and B- I-.
| 206
|
Malware
|
B-Hack
|
B-Hack
| 0.859877
| 74
|
B-Hack I-Hack (also known as B-Hack or B-Hack I-Hack) is a separate Russian-based B-Hack I-Hack, which has been active since mid 2000s, and has been responsible for targeted B- I- against the B-, B-, B-, B- and B- I- .
|
B-Hack I-Hack (also known as B-Hack or B-Hack I-Hack) is a separate Russian-based B-Hack I-Hack, which has been active since mid 2000s, and has been responsible for targeted B- I- against the B-, B-, B-, B- and B- I-.
| 207
|
Malware
|
B-Hack I-Hack
|
B-Hack I-Hack)
| 0.819772
| 74
|
B-Hack I-Hack (also known as B-Hack or B-Hack I-Hack) is a separate Russian-based B-Hack I-Hack, which has been active since mid 2000s, and has been responsible for targeted B- I- against the B-, B-, B-, B- and B- I- .
|
B-Hack I-Hack (also known as B-Hack or B-Hack I-Hack) is a separate Russian-based B-Hack I-Hack, which has been active since mid 2000s, and has been responsible for targeted B- I- against the B-, B-, B-, B- and B- I-.
| 208
|
Malware
|
Ha
|
I-Hack,
| 0.738855
| 74
|
B-Hack I-Hack (also known as B-Hack or B-Hack I-Hack) is a separate Russian-based B-Hack I-Hack, which has been active since mid 2000s, and has been responsible for targeted B- I- against the B-, B-, B-, B- and B- I- .
|
B-Hack I-Hack (also known as B-Hack or B-Hack I-Hack) is a separate Russian-based B-Hack I-Hack, which has been active since mid 2000s, and has been responsible for targeted B- I- against the B-, B-, B-, B- and B- I-.
| 210
|
Malware
|
APT28
|
APT28
| 0.933793
| 75
|
APT28 malware, in particular the family of modular backdoors that we call CHOPSTICK, indicates a formal code development environment .
|
APT28 malware, in particular the family of modular backdoors that we call CHOPSTICK, indicates a formal code development environment.
| 211
|
Malware
|
CHOPSTICK
|
CHOPSTICK,
| 0.931774
| 75
|
APT28 malware, in particular the family of modular backdoors that we call CHOPSTICK, indicates a formal code development environment .
|
APT28 malware, in particular the family of modular backdoors that we call CHOPSTICK, indicates a formal code development environment.
| 212
|
Malware
|
B-Hack
|
B-Hack's
| 0.646303
| 76
|
However, three themes in B-Hack's targeting clearly reflects areas of specific interest to an Eastern European B-, most likely the Russian government .
|
However, three themes in B-Hack's targeting clearly reflects areas of specific interest to an Eastern European B-, most likely the Russian government.
| 213
|
Malware
|
B-Hack
|
B-Hack's
| 0.85095
| 77
|
We identified three themes in B-Hack's lures and registered domains, which together are particularly relevant to the Russian government .
|
We identified three themes in B-Hack's lures and registered domains, which together are particularly relevant to the Russian government.
| 214
|
Organization
|
NATO
|
NATO,
| 0.738313
| 79
|
cooperation and NATO, provide a strong incentive for Russian state-sponsored B-Hack I-Hack to steal information that sheds light on these topics .
|
cooperation and NATO, provide a strong incentive for Russian state-sponsored B-Hack I-Hack to steal information that sheds light on these topics.
| 215
|
Organization
|
B
|
B-Hack
| 0.963482
| 79
|
cooperation and NATO, provide a strong incentive for Russian state-sponsored B-Hack I-Hack to steal information that sheds light on these topics .
|
cooperation and NATO, provide a strong incentive for Russian state-sponsored B-Hack I-Hack to steal information that sheds light on these topics.
| 216
|
Organization
|
ck
|
I-Hack
| 0.651402
| 79
|
cooperation and NATO, provide a strong incentive for Russian state-sponsored B-Hack I-Hack to steal information that sheds light on these topics .
|
cooperation and NATO, provide a strong incentive for Russian state-sponsored B-Hack I-Hack to steal information that sheds light on these topics.
| 220
|
Malware
|
B-Hack I-Hack
|
B-Hack I-Hack
| 0.738282
| 80
|
Instead, we observed the two Russian B-Hack I-Hack compromise the same systems and engage separately in the theft of identical credentials .
|
Instead, we observed the two Russian B-Hack I-Hack compromise the same systems and engage separately in the theft of identical credentials.
| 221
|
Organization
|
B-Hack
|
B-Hack's
| 0.780971
| 81
|
B-Hack's malware settings suggest that the developers have done the majority of their work in a Russian language build environment during Russian business hours, which suggests that the Russian government is B-Hack's sponsor .
|
B-Hack's malware settings suggest that the developers have done the majority of their work in a Russian language build environment during Russian business hours, which suggests that the Russian government is B-Hack's sponsor.
| 223
|
Organization
|
B-Hack
|
B-Hack's
| 0.80172
| 82
|
We believe that B-Hack's targeting of the MOD aligns with Russian threat perceptions .
|
We believe that B-Hack's targeting of the MOD aligns with Russian threat perceptions.
| 224
|
Malware
|
B-Hack
|
B-Hack
| 0.833219
| 83
|
We assess that B-Hack is most likely sponsored by the Russian government .
|
We assess that B-Hack is most likely sponsored by the Russian government.
| 225
|
Malware
|
B-Hack
|
B-Hack's
| 0.70961
| 84
|
Given the available data, we assess that B-Hack's work is sponsored by the Russian government .
|
Given the available data, we assess that B-Hack's work is sponsored by the Russian government.
| 226
|
Malware
|
B-Hack
|
B-Hack's
| 0.653712
| 88
|
Some of B-Hack's more commonly used tools are the SOURFACE downloader, its second stage backdoor EVILTOSS, and a modular family of implants that we call CHOPSTICK .
|
Some of B-Hack's more commonly used tools are the SOURFACE downloader, its second stage backdoor EVILTOSS, and a modular family of implants that we call CHOPSTICK.
| 227
|
Malware
|
SOURFACE
|
SOURFACE
| 0.905016
| 88
|
Some of B-Hack's more commonly used tools are the SOURFACE downloader, its second stage backdoor EVILTOSS, and a modular family of implants that we call CHOPSTICK .
|
Some of B-Hack's more commonly used tools are the SOURFACE downloader, its second stage backdoor EVILTOSS, and a modular family of implants that we call CHOPSTICK.
| 228
|
Malware
|
EVILTOS
|
EVILTOSS,
| 0.833851
| 88
|
Some of B-Hack's more commonly used tools are the SOURFACE downloader, its second stage backdoor EVILTOSS, and a modular family of implants that we call CHOPSTICK .
|
Some of B-Hack's more commonly used tools are the SOURFACE downloader, its second stage backdoor EVILTOSS, and a modular family of implants that we call CHOPSTICK.
| 229
|
Malware
|
CHOPSTICK
|
CHOPSTICK.
| 0.889016
| 88
|
Some of B-Hack's more commonly used tools are the SOURFACE downloader, its second stage backdoor EVILTOSS, and a modular family of implants that we call CHOPSTICK .
|
Some of B-Hack's more commonly used tools are the SOURFACE downloader, its second stage backdoor EVILTOSS, and a modular family of implants that we call CHOPSTICK.
| 230
|
Malware
|
B-Hack
|
B-Hack
| 0.731321
| 89
|
While B-Hack continues to primarily threaten organizations and individuals operating in Russia and former Soviet states, this B- illustrates its willingness to expand its scope to other targets that have intelligence of interest to the Russian government .
|
While B-Hack continues to primarily threaten organizations and individuals operating in Russia and former Soviet states, this B- illustrates its willingness to expand its scope to other targets that have intelligence of interest to the Russian government.
| 231
|
Organization
|
CTU
|
CTU
| 0.902411
| 90
|
CTU researchers assess with moderate confidence that the B-Hack is operating from the Russian Federation and is gathering intelligence on behalf of the Russian government .
|
CTU researchers assess with moderate confidence that the B-Hack is operating from the Russian Federation and is gathering intelligence on behalf of the Russian government.
| 232
|
Malware
|
B-Hack
|
B-Hack
| 0.810702
| 90
|
CTU researchers assess with moderate confidence that the B-Hack is operating from the Russian Federation and is gathering intelligence on behalf of the Russian government .
|
CTU researchers assess with moderate confidence that the B-Hack is operating from the Russian Federation and is gathering intelligence on behalf of the Russian government.
| 233
|
Malware
|
B-Hack
|
B-Hack
| 0.893184
| 92
|
Our visibility into the operations of B-Hack - a B-Hack we believe the Russian Government sponsors - has given us insight into some of the B-'s targets, as well as its objectives and the B- designed to further them .
|
Our visibility into the operations of B-Hack - a B-Hack we believe the Russian Government sponsors - has given us insight into some of the B-'s targets, as well as its objectives and the B- designed to further them.
| 234
|
Organization
|
B-Hack
|
B-Hack
| 0.862674
| 93
|
Since at least 2007, B-Hack has engaged in extensive operations in support of Russian strategic interests .
|
Since at least 2007, B-Hack has engaged in extensive operations in support of Russian strategic interests.
| 235
|
Indicator
|
I
|
I-
| 0.508638
| 94
|
B- I- I- has primarily targeted entities in the U.S., Europe, and the countries of the former Soviet Union, including B-, B-, B- I-, B- I-, and B- and B- opposed to the current Russian Government .
|
B- I- I- has primarily targeted entities in the U.S., Europe, and the countries of the former Soviet Union, including B-, B-, B- I-, B- I-, and B- and B- opposed to the current Russian Government.
| 236
|
Indicator
|
I
|
I-
| 0.557935
| 95
|
B- I- I- has primarily targeted entities in the U.S., Europe, and the countries of the former Soviet Union, including B- and B-, B- I-, B- I-, and B- and B- opposed to the current Russian Government .
|
B- I- I- has primarily targeted entities in the U.S., Europe, and the countries of the former Soviet Union, including B- and B-, B- I-, B- I-, and B- and B- opposed to the current Russian Government.
| 237
|
Malware
|
B-Ha
|
B-Hack
| 0.558343
| 96
|
Over the past two years, Russia appears to have increasingly leveraged B-Hack to conduct information operations commensurate with broader strategic military doctrine .
|
Over the past two years, Russia appears to have increasingly leveraged B-Hack to conduct information operations commensurate with broader strategic military doctrine.
| 238
|
Malware
|
B-Hack
|
B-Hack
| 0.582398
| 97
|
After compromising a victim organization, B-Hack will steal internal data that is then leaked to further political narratives aligned with Russian interests .
|
After compromising a victim organization, B-Hack will steal internal data that is then leaked to further political narratives aligned with Russian interests.
| 240
|
Malware
|
B
|
B-Hack
| 0.94751
| 98
|
After compromising a B- I-, B-Hack will steal internal data .
|
After compromising a B- I-, B-Hack will steal internal data.
| 241
|
Organization
|
Department of Homeland Security
|
Department of Homeland Security
| 0.926802
| 99
|
On December 29, 2016, the Department of Homeland Security (DHS) and Federal Bureau of Investigation (FBI) released a Joint Analysis Report confirming FireEye's long held public assessment that the Russian Government sponsors B-Hack .
|
On December 29, 2016, the Department of Homeland Security (DHS) and Federal Bureau of Investigation (FBI) released a Joint Analysis Report confirming FireEye's long held public assessment that the Russian Government sponsors B-Hack.
| 243
|
Organization
|
DHS
|
(DHS)
| 0.733731
| 99
|
On December 29, 2016, the Department of Homeland Security (DHS) and Federal Bureau of Investigation (FBI) released a Joint Analysis Report confirming FireEye's long held public assessment that the Russian Government sponsors B-Hack .
|
On December 29, 2016, the Department of Homeland Security (DHS) and Federal Bureau of Investigation (FBI) released a Joint Analysis Report confirming FireEye's long held public assessment that the Russian Government sponsors B-Hack.
| 244
|
Organization
|
Federal Bureau of Investigation
|
Federal Bureau of Investigation
| 0.970731
| 99
|
On December 29, 2016, the Department of Homeland Security (DHS) and Federal Bureau of Investigation (FBI) released a Joint Analysis Report confirming FireEye's long held public assessment that the Russian Government sponsors B-Hack .
|
On December 29, 2016, the Department of Homeland Security (DHS) and Federal Bureau of Investigation (FBI) released a Joint Analysis Report confirming FireEye's long held public assessment that the Russian Government sponsors B-Hack.
| 245
|
Organization
|
FBI
|
(FBI)
| 0.95777
| 99
|
On December 29, 2016, the Department of Homeland Security (DHS) and Federal Bureau of Investigation (FBI) released a Joint Analysis Report confirming FireEye's long held public assessment that the Russian Government sponsors B-Hack .
|
On December 29, 2016, the Department of Homeland Security (DHS) and Federal Bureau of Investigation (FBI) released a Joint Analysis Report confirming FireEye's long held public assessment that the Russian Government sponsors B-Hack.
| 246
|
Organization
|
FireEye
|
FireEye's
| 0.967372
| 99
|
On December 29, 2016, the Department of Homeland Security (DHS) and Federal Bureau of Investigation (FBI) released a Joint Analysis Report confirming FireEye's long held public assessment that the Russian Government sponsors B-Hack .
|
On December 29, 2016, the Department of Homeland Security (DHS) and Federal Bureau of Investigation (FBI) released a Joint Analysis Report confirming FireEye's long held public assessment that the Russian Government sponsors B-Hack.
| 247
|
Malware
|
B-Hack
|
B-Hack.
| 0.838668
| 99
|
On December 29, 2016, the Department of Homeland Security (DHS) and Federal Bureau of Investigation (FBI) released a Joint Analysis Report confirming FireEye's long held public assessment that the Russian Government sponsors B-Hack .
|
On December 29, 2016, the Department of Homeland Security (DHS) and Federal Bureau of Investigation (FBI) released a Joint Analysis Report confirming FireEye's long held public assessment that the Russian Government sponsors B-Hack.
| 248
|
Organization
|
FireEye
|
FireEye
| 0.984466
| 100
|
In October 2014, FireEye released B-Hack: A Window into Russia's B- I- I-, and characterized B-Hack's B- as aligning with the Russian Government's strategic intelligence requirements .
|
In October 2014, FireEye released B-Hack: A Window into Russia's B- I- I-, and characterized B-Hack's B- as aligning with the Russian Government's strategic intelligence requirements.
| 249
|
Malware
|
B-Hack
|
B-Hack:
| 0.958432
| 100
|
In October 2014, FireEye released B-Hack: A Window into Russia's B- I- I-, and characterized B-Hack's B- as aligning with the Russian Government's strategic intelligence requirements .
|
In October 2014, FireEye released B-Hack: A Window into Russia's B- I- I-, and characterized B-Hack's B- as aligning with the Russian Government's strategic intelligence requirements.
| 250
|
Malware
|
B-Hack
|
B-Hack's
| 0.957377
| 100
|
In October 2014, FireEye released B-Hack: A Window into Russia's B- I- I-, and characterized B-Hack's B- as aligning with the Russian Government's strategic intelligence requirements .
|
In October 2014, FireEye released B-Hack: A Window into Russia's B- I- I-, and characterized B-Hack's B- as aligning with the Russian Government's strategic intelligence requirements.
| 251
|
Organization
|
FireEye
|
FireEye
| 0.98397
| 101
|
In October 2014, FireEye released B-Hack: A Window into Russia's Cyber Espionage Operations', and characterized B-Hack's B- as aligning with the Russian Government's strategic intelligence requirements .
|
In October 2014, FireEye released B-Hack: A Window into Russia's Cyber Espionage Operations', and characterized B-Hack's B- as aligning with the Russian Government's strategic intelligence requirements.
| 252
|
Malware
|
B-Hack
|
B-Hack:
| 0.945739
| 101
|
In October 2014, FireEye released B-Hack: A Window into Russia's Cyber Espionage Operations', and characterized B-Hack's B- as aligning with the Russian Government's strategic intelligence requirements .
|
In October 2014, FireEye released B-Hack: A Window into Russia's Cyber Espionage Operations', and characterized B-Hack's B- as aligning with the Russian Government's strategic intelligence requirements.
| 253
|
Malware
|
B-Hack
|
B-Hack's
| 0.933255
| 101
|
In October 2014, FireEye released B-Hack: A Window into Russia's Cyber Espionage Operations', and characterized B-Hack's B- as aligning with the Russian Government's strategic intelligence requirements .
|
In October 2014, FireEye released B-Hack: A Window into Russia's Cyber Espionage Operations', and characterized B-Hack's B- as aligning with the Russian Government's strategic intelligence requirements.
| 254
|
Malware
|
B-Hack
|
B-Hack
| 0.906695
| 102
|
B-Hack targets Russian B- and B- Pussy Riot via spear-phishing emails .
|
B-Hack targets Russian B- and B- Pussy Riot via spear-phishing emails.
| 255
|
Malware
|
Pussy Rio
|
Pussy Riot
| 0.87156
| 102
|
B-Hack targets Russian B- and B- Pussy Riot via spear-phishing emails .
|
B-Hack targets Russian B- and B- Pussy Riot via spear-phishing emails.
| 256
|
Organization
|
B-Hack
|
B-Hack's
| 0.897298
| 103
|
Our investigation of B-Hack's compromise of WADA's network, and our observations of the surrounding events reveal how Russia sought to counteract a damaging narrative and delegitimize the institutions leveling criticism .
|
Our investigation of B-Hack's compromise of WADA's network, and our observations of the surrounding events reveal how Russia sought to counteract a damaging narrative and delegitimize the institutions leveling criticism.
| 257
|
Organization
|
WADA
|
WADA's
| 0.767432
| 103
|
Our investigation of B-Hack's compromise of WADA's network, and our observations of the surrounding events reveal how Russia sought to counteract a damaging narrative and delegitimize the institutions leveling criticism .
|
Our investigation of B-Hack's compromise of WADA's network, and our observations of the surrounding events reveal how Russia sought to counteract a damaging narrative and delegitimize the institutions leveling criticism.
| 258
|
Malware
|
B-Hack
|
B-Hack
| 0.87444
| 104
|
Since releasing our 2014 report, we continue to assess that B-Hack is sponsored by the Russian Government .
|
Since releasing our 2014 report, we continue to assess that B-Hack is sponsored by the Russian Government.
| 259
|
Malware
|
B-Hack
|
B-Hack
| 0.863079
| 105
|
In our 2014 report, we identified B-Hack as a suspected Russian government-sponsored B-Hack I-Hack .
|
In our 2014 report, we identified B-Hack as a suspected Russian government-sponsored B-Hack I-Hack.
| 260
|
Malware
|
B-Hack I-Hack
|
B-Hack I-Hack.
| 0.814558
| 105
|
In our 2014 report, we identified B-Hack as a suspected Russian government-sponsored B-Hack I-Hack .
|
In our 2014 report, we identified B-Hack as a suspected Russian government-sponsored B-Hack I-Hack.
| 261
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.