Type
stringclasses
5 values
Text
stringlengths
1
70
Fixed Text
stringlengths
2
70
Score
float64
0.23
1
Original Sentence ID
int64
0
6.64k
Original Sentence
stringlengths
6
383
Decoded Sentence
stringlengths
5
382
__index_level_0__
int64
0
13.8k
Organization
Department of Homeland Security (DHS
Department of Homeland Security (DHS)
0.901258
108
Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) is linked to the Russian government, returned to low-key intelligence-gathering operations during 2017 and into 2018, targeting a range of B- and B- targets in Europe and South America .
Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) is linked to the Russian government, returned to low-key intelligence-gathering operations during 2017 and into 2018, targeting a range of B- and B- targets in Europe and South America.
262
Organization
Federal Bureau of Investigation (FBI
Federal Bureau of Investigation (FBI)
0.920828
108
Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) is linked to the Russian government, returned to low-key intelligence-gathering operations during 2017 and into 2018, targeting a range of B- and B- targets in Europe and South America .
Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) is linked to the Russian government, returned to low-key intelligence-gathering operations during 2017 and into 2018, targeting a range of B- and B- targets in Europe and South America.
263
Malware
Ha
I-Hack,
0.407386
110
Another B-Hack I-Hack, B-Hack (aka B-Hack), has been active since at least May 2016 and is involved in what appears to be intelligence gathering operations against military targets in Europe, Central Asia, and Eastern Asia .
Another B-Hack I-Hack, B-Hack (aka B-Hack), has been active since at least May 2016 and is involved in what appears to be intelligence gathering operations against military targets in Europe, Central Asia, and Eastern Asia.
265
Malware
B-Hack
B-Hack
0.785057
110
Another B-Hack I-Hack, B-Hack (aka B-Hack), has been active since at least May 2016 and is involved in what appears to be intelligence gathering operations against military targets in Europe, Central Asia, and Eastern Asia .
Another B-Hack I-Hack, B-Hack (aka B-Hack), has been active since at least May 2016 and is involved in what appears to be intelligence gathering operations against military targets in Europe, Central Asia, and Eastern Asia.
266
Malware
B-Hack
B-Hack),
0.791813
110
Another B-Hack I-Hack, B-Hack (aka B-Hack), has been active since at least May 2016 and is involved in what appears to be intelligence gathering operations against military targets in Europe, Central Asia, and Eastern Asia .
Another B-Hack I-Hack, B-Hack (aka B-Hack), has been active since at least May 2016 and is involved in what appears to be intelligence gathering operations against military targets in Europe, Central Asia, and Eastern Asia.
267
Malware
B-Hack
B-Hack
0.907707
111
Several sources consider B-Hack a B-Hack of CyberMercs based in Russia .
Several sources consider B-Hack a B-Hack of CyberMercs based in Russia.
268
Malware
B-Hack
B-Hack
0.848466
112
The primary targets of B-Hack are potential victims in several countries such as Ukraine, Spain, Russia, Romania, the United States and Canada .
The primary targets of B-Hack are potential victims in several countries such as Ukraine, Spain, Russia, Romania, the United States and Canada.
269
System
B
B-Hack
0.566208
113
We have reasons to believe that the B-Hack of the B-Hack network are either Russian B- or B- of a neighboring country that speak Russian .
We have reasons to believe that the B-Hack of the B-Hack network are either Russian B- or B- of a neighboring country that speak Russian.
270
Organization
FireEye
FireEye
0.980806
114
Previous work published by security vendor FireEye in October 2014 suggests the B-Hack might be of Russian origin .
Previous work published by security vendor FireEye in October 2014 suggests the B-Hack might be of Russian origin.
272
Malware
B-Hack
B-Hack
0.868413
114
Previous work published by security vendor FireEye in October 2014 suggests the B-Hack might be of Russian origin .
Previous work published by security vendor FireEye in October 2014 suggests the B-Hack might be of Russian origin.
273
Organization
B-Hack
B-Hack's
0.857415
115
Finally, the use of recent domestic events and a prominent US B- exercise focused on deterring Russian aggression highlight B-Hack's ability and interest in exploiting B- events for their operations .
Finally, the use of recent domestic events and a prominent US B- exercise focused on deterring Russian aggression highlight B-Hack's ability and interest in exploiting B- events for their operations.
274
Malware
B-Hack I-Hack
B-Hack I-Hack
0.692501
116
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM, JHUHUGIT, AZZY and a few others .
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM, JHUHUGIT, AZZY and a few others.
275
Malware
CORESHELL
CORESHELL,
0.855888
116
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM, JHUHUGIT, AZZY and a few others .
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM, JHUHUGIT, AZZY and a few others.
276
Malware
SPLM
SPLM,
0.791623
116
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM, JHUHUGIT, AZZY and a few others .
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM, JHUHUGIT, AZZY and a few others.
277
Malware
JHUHUGIT
JHUHUGIT,
0.843762
116
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM, JHUHUGIT, AZZY and a few others .
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM, JHUHUGIT, AZZY and a few others.
278
Malware
AZZY
AZZY
0.807102
116
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM, JHUHUGIT, AZZY and a few others .
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM, JHUHUGIT, AZZY and a few others.
279
Organization
B-
B-Hack
0.444859
117
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM (aka Xagent, aka CHOPSTICK), JHUHUGIT (which is built with code from the Carberp sources), AZZY (aka ADVSTORESHELL, NETUI, EVILTOSS, and spans across 4-5 generations) and a few others .
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM (aka Xagent, aka CHOPSTICK), JHUHUGIT (which is built with code from the Carberp sources), AZZY (aka ADVSTORESHELL, NETUI, EVILTOSS, and spans across 4-5 generations) and a few others.
280
Organization
ck I-
B-Hack I-Hack
0.387465
117
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM (aka Xagent, aka CHOPSTICK), JHUHUGIT (which is built with code from the Carberp sources), AZZY (aka ADVSTORESHELL, NETUI, EVILTOSS, and spans across 4-5 generations) and a few others .
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM (aka Xagent, aka CHOPSTICK), JHUHUGIT (which is built with code from the Carberp sources), AZZY (aka ADVSTORESHELL, NETUI, EVILTOSS, and spans across 4-5 generations) and a few others.
282
Organization
ck
I-Hack
0.715013
117
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM (aka Xagent, aka CHOPSTICK), JHUHUGIT (which is built with code from the Carberp sources), AZZY (aka ADVSTORESHELL, NETUI, EVILTOSS, and spans across 4-5 generations) and a few others .
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM (aka Xagent, aka CHOPSTICK), JHUHUGIT (which is built with code from the Carberp sources), AZZY (aka ADVSTORESHELL, NETUI, EVILTOSS, and spans across 4-5 generations) and a few others.
284
Malware
CORESHELL
CORESHELL,
0.85198
117
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM (aka Xagent, aka CHOPSTICK), JHUHUGIT (which is built with code from the Carberp sources), AZZY (aka ADVSTORESHELL, NETUI, EVILTOSS, and spans across 4-5 generations) and a few others .
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM (aka Xagent, aka CHOPSTICK), JHUHUGIT (which is built with code from the Carberp sources), AZZY (aka ADVSTORESHELL, NETUI, EVILTOSS, and spans across 4-5 generations) and a few others.
285
Malware
SPLM
SPLM
0.828894
117
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM (aka Xagent, aka CHOPSTICK), JHUHUGIT (which is built with code from the Carberp sources), AZZY (aka ADVSTORESHELL, NETUI, EVILTOSS, and spans across 4-5 generations) and a few others .
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM (aka Xagent, aka CHOPSTICK), JHUHUGIT (which is built with code from the Carberp sources), AZZY (aka ADVSTORESHELL, NETUI, EVILTOSS, and spans across 4-5 generations) and a few others.
286
Malware
Xagent
Xagent,
0.759889
117
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM (aka Xagent, aka CHOPSTICK), JHUHUGIT (which is built with code from the Carberp sources), AZZY (aka ADVSTORESHELL, NETUI, EVILTOSS, and spans across 4-5 generations) and a few others .
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM (aka Xagent, aka CHOPSTICK), JHUHUGIT (which is built with code from the Carberp sources), AZZY (aka ADVSTORESHELL, NETUI, EVILTOSS, and spans across 4-5 generations) and a few others.
287
Malware
CHOPSTICK
CHOPSTICK),
0.903296
117
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM (aka Xagent, aka CHOPSTICK), JHUHUGIT (which is built with code from the Carberp sources), AZZY (aka ADVSTORESHELL, NETUI, EVILTOSS, and spans across 4-5 generations) and a few others .
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM (aka Xagent, aka CHOPSTICK), JHUHUGIT (which is built with code from the Carberp sources), AZZY (aka ADVSTORESHELL, NETUI, EVILTOSS, and spans across 4-5 generations) and a few others.
288
Malware
JHUHUGIT
JHUHUGIT
0.801394
117
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM (aka Xagent, aka CHOPSTICK), JHUHUGIT (which is built with code from the Carberp sources), AZZY (aka ADVSTORESHELL, NETUI, EVILTOSS, and spans across 4-5 generations) and a few others .
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM (aka Xagent, aka CHOPSTICK), JHUHUGIT (which is built with code from the Carberp sources), AZZY (aka ADVSTORESHELL, NETUI, EVILTOSS, and spans across 4-5 generations) and a few others.
289
Malware
Carberp
Carberp
0.807725
117
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM (aka Xagent, aka CHOPSTICK), JHUHUGIT (which is built with code from the Carberp sources), AZZY (aka ADVSTORESHELL, NETUI, EVILTOSS, and spans across 4-5 generations) and a few others .
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM (aka Xagent, aka CHOPSTICK), JHUHUGIT (which is built with code from the Carberp sources), AZZY (aka ADVSTORESHELL, NETUI, EVILTOSS, and spans across 4-5 generations) and a few others.
290
Malware
AZZY
AZZY
0.740452
117
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM (aka Xagent, aka CHOPSTICK), JHUHUGIT (which is built with code from the Carberp sources), AZZY (aka ADVSTORESHELL, NETUI, EVILTOSS, and spans across 4-5 generations) and a few others .
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM (aka Xagent, aka CHOPSTICK), JHUHUGIT (which is built with code from the Carberp sources), AZZY (aka ADVSTORESHELL, NETUI, EVILTOSS, and spans across 4-5 generations) and a few others.
291
Malware
ADVSTORESHELL
ADVSTORESHELL,
0.76345
117
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM (aka Xagent, aka CHOPSTICK), JHUHUGIT (which is built with code from the Carberp sources), AZZY (aka ADVSTORESHELL, NETUI, EVILTOSS, and spans across 4-5 generations) and a few others .
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM (aka Xagent, aka CHOPSTICK), JHUHUGIT (which is built with code from the Carberp sources), AZZY (aka ADVSTORESHELL, NETUI, EVILTOSS, and spans across 4-5 generations) and a few others.
292
Malware
NET
NETUI,
0.624744
117
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM (aka Xagent, aka CHOPSTICK), JHUHUGIT (which is built with code from the Carberp sources), AZZY (aka ADVSTORESHELL, NETUI, EVILTOSS, and spans across 4-5 generations) and a few others .
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM (aka Xagent, aka CHOPSTICK), JHUHUGIT (which is built with code from the Carberp sources), AZZY (aka ADVSTORESHELL, NETUI, EVILTOSS, and spans across 4-5 generations) and a few others.
293
Malware
EVILTOSS
EVILTOSS,
0.682959
117
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM (aka Xagent, aka CHOPSTICK), JHUHUGIT (which is built with code from the Carberp sources), AZZY (aka ADVSTORESHELL, NETUI, EVILTOSS, and spans across 4-5 generations) and a few others .
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM (aka Xagent, aka CHOPSTICK), JHUHUGIT (which is built with code from the Carberp sources), AZZY (aka ADVSTORESHELL, NETUI, EVILTOSS, and spans across 4-5 generations) and a few others.
295
Malware
B-Hack I-Hack
B-Hack I-Hack
0.925289
118
The B-Hack I-Hack spearphished targets in several waves with Flash exploits leading to their Carberp based JHUHUGIT downloaders and further stages of malware .
The B-Hack I-Hack spearphished targets in several waves with Flash exploits leading to their Carberp based JHUHUGIT downloaders and further stages of malware.
296
System
Flash
Flash
0.99278
118
The B-Hack I-Hack spearphished targets in several waves with Flash exploits leading to their Carberp based JHUHUGIT downloaders and further stages of malware .
The B-Hack I-Hack spearphished targets in several waves with Flash exploits leading to their Carberp based JHUHUGIT downloaders and further stages of malware.
297
Malware
Carberp
Carberp
0.82111
118
The B-Hack I-Hack spearphished targets in several waves with Flash exploits leading to their Carberp based JHUHUGIT downloaders and further stages of malware .
The B-Hack I-Hack spearphished targets in several waves with Flash exploits leading to their Carberp based JHUHUGIT downloaders and further stages of malware.
298
Malware
JHUHUGIT
JHUHUGIT
0.82933
118
The B-Hack I-Hack spearphished targets in several waves with Flash exploits leading to their Carberp based JHUHUGIT downloaders and further stages of malware .
The B-Hack I-Hack spearphished targets in several waves with Flash exploits leading to their Carberp based JHUHUGIT downloaders and further stages of malware.
299
Malware
B-Hack
B-Hack
0.795232
119
B-Hack spearphished targets in several waves with Flash exploits leading to their Carberp based JHUHUGIT downloaders and further stages of malware .
B-Hack spearphished targets in several waves with Flash exploits leading to their Carberp based JHUHUGIT downloaders and further stages of malware.
300
System
Flash
Flash
0.992705
119
B-Hack spearphished targets in several waves with Flash exploits leading to their Carberp based JHUHUGIT downloaders and further stages of malware .
B-Hack spearphished targets in several waves with Flash exploits leading to their Carberp based JHUHUGIT downloaders and further stages of malware.
301
Malware
Carberp
Carberp
0.857004
119
B-Hack spearphished targets in several waves with Flash exploits leading to their Carberp based JHUHUGIT downloaders and further stages of malware .
B-Hack spearphished targets in several waves with Flash exploits leading to their Carberp based JHUHUGIT downloaders and further stages of malware.
302
Malware
JHUHUGIT
JHUHUGIT
0.803059
119
B-Hack spearphished targets in several waves with Flash exploits leading to their Carberp based JHUHUGIT downloaders and further stages of malware .
B-Hack spearphished targets in several waves with Flash exploits leading to their Carberp based JHUHUGIT downloaders and further stages of malware.
303
Malware
B-Hack
B-Hack
0.761053
120
The B-Hack spearphished targets in several waves with Flash exploits leading to their Carberp based JHUHUGIT downloaders and further stages of malware .
The B-Hack spearphished targets in several waves with Flash exploits leading to their Carberp based JHUHUGIT downloaders and further stages of malware.
304
System
Flash
Flash
0.992564
120
The B-Hack spearphished targets in several waves with Flash exploits leading to their Carberp based JHUHUGIT downloaders and further stages of malware .
The B-Hack spearphished targets in several waves with Flash exploits leading to their Carberp based JHUHUGIT downloaders and further stages of malware.
305
Malware
Carberp
Carberp
0.870448
120
The B-Hack spearphished targets in several waves with Flash exploits leading to their Carberp based JHUHUGIT downloaders and further stages of malware .
The B-Hack spearphished targets in several waves with Flash exploits leading to their Carberp based JHUHUGIT downloaders and further stages of malware.
306
Malware
JHUHUGIT
JHUHUGIT
0.807208
120
The B-Hack spearphished targets in several waves with Flash exploits leading to their Carberp based JHUHUGIT downloaders and further stages of malware .
The B-Hack spearphished targets in several waves with Flash exploits leading to their Carberp based JHUHUGIT downloaders and further stages of malware.
307
System
SPLM
SPLM,
0.816244
121
Their evolving and modified SPLM, CHOPSTICK, XAgent code is a long-standing part of B- I-, however much of it is changing .
Their evolving and modified SPLM, CHOPSTICK, XAgent code is a long-standing part of B- I-, however much of it is changing.
308
System
CHOPSTICK
CHOPSTICK,
0.77833
121
Their evolving and modified SPLM, CHOPSTICK, XAgent code is a long-standing part of B- I-, however much of it is changing .
Their evolving and modified SPLM, CHOPSTICK, XAgent code is a long-standing part of B- I-, however much of it is changing.
309
System
XAgent
XAgent
0.899053
121
Their evolving and modified SPLM, CHOPSTICK, XAgent code is a long-standing part of B- I-, however much of it is changing .
Their evolving and modified SPLM, CHOPSTICK, XAgent code is a long-standing part of B- I-, however much of it is changing.
310
Organization
FireEye
FireEye
0.988317
122
FireEye has moderate confidence that a B- targeting the B- I- is attributed to Russian B-Hack I-Hack .
FireEye has moderate confidence that a B- targeting the B- I- is attributed to Russian B-Hack I-Hack.
311
Malware
B
B-Hack
0.391767
122
FireEye has moderate confidence that a B- targeting the B- I- is attributed to Russian B-Hack I-Hack .
FireEye has moderate confidence that a B- targeting the B- I- is attributed to Russian B-Hack I-Hack.
312
Indicator
I
I-Hack.
0.734073
122
FireEye has moderate confidence that a B- targeting the B- I- is attributed to Russian B-Hack I-Hack .
FireEye has moderate confidence that a B- targeting the B- I- is attributed to Russian B-Hack I-Hack.
314
Organization
B-Hack
B-Hack
0.864701
123
B-Hack is using novel techniques involving the EternalBlue exploit and the open source tool Responder to spread laterally through networks and likely target travelers .
B-Hack is using novel techniques involving the EternalBlue exploit and the open source tool Responder to spread laterally through networks and likely target travelers.
316
Malware
EternalBlue
EternalBlue
0.952832
123
B-Hack is using novel techniques involving the EternalBlue exploit and the open source tool Responder to spread laterally through networks and likely target travelers .
B-Hack is using novel techniques involving the EternalBlue exploit and the open source tool Responder to spread laterally through networks and likely target travelers.
317
Malware
Responder
Responder
0.711577
123
B-Hack is using novel techniques involving the EternalBlue exploit and the open source tool Responder to spread laterally through networks and likely target travelers .
B-Hack is using novel techniques involving the EternalBlue exploit and the open source tool Responder to spread laterally through networks and likely target travelers.
318
Malware
B-Hack
B-Hack
0.758421
124
Upon gaining access to the machines connected to corporate and guest Wi-Fi networks, B-Hack deployed Responder .
Upon gaining access to the machines connected to corporate and guest Wi-Fi networks, B-Hack deployed Responder.
319
Malware
Responder
Responder.
0.846468
124
Upon gaining access to the machines connected to corporate and guest Wi-Fi networks, B-Hack deployed Responder .
Upon gaining access to the machines connected to corporate and guest Wi-Fi networks, B-Hack deployed Responder.
320
Malware
Zebrocy
Zebrocy
0.811038
125
Compared to other backdoor tools associated with the B-Hack I-Hack, the use of Zebrocy in B- I- is far more widespread .
Compared to other backdoor tools associated with the B-Hack I-Hack, the use of Zebrocy in B- I- is far more widespread.
321
Malware
B-Hack I-Hack
B-Hack I-Hack
0.837843
126
As alluded to in our previous blog regarding the Cannon tool, the B-Hack I-Hack (AKA B-Hack I-Hack, B-Hack, B-Hack, B-Hack I-Hack, B-Hack) has persistently attacked various B- and private organizations around the world from mid-October 2018 through mid-November 2018 .
As alluded to in our previous blog regarding the Cannon tool, the B-Hack I-Hack (AKA B-Hack I-Hack, B-Hack, B-Hack, B-Hack I-Hack, B-Hack) has persistently attacked various B- and private organizations around the world from mid-October 2018 through mid-November 2018.
322
Malware
B-Hack I-Hack
B-Hack I-Hack,
0.736015
126
As alluded to in our previous blog regarding the Cannon tool, the B-Hack I-Hack (AKA B-Hack I-Hack, B-Hack, B-Hack, B-Hack I-Hack, B-Hack) has persistently attacked various B- and private organizations around the world from mid-October 2018 through mid-November 2018 .
As alluded to in our previous blog regarding the Cannon tool, the B-Hack I-Hack (AKA B-Hack I-Hack, B-Hack, B-Hack, B-Hack I-Hack, B-Hack) has persistently attacked various B- and private organizations around the world from mid-October 2018 through mid-November 2018.
323
Malware
B-Hack, B-Hack
B-Hack, B-Hack,
0.658168
126
As alluded to in our previous blog regarding the Cannon tool, the B-Hack I-Hack (AKA B-Hack I-Hack, B-Hack, B-Hack, B-Hack I-Hack, B-Hack) has persistently attacked various B- and private organizations around the world from mid-October 2018 through mid-November 2018 .
As alluded to in our previous blog regarding the Cannon tool, the B-Hack I-Hack (AKA B-Hack I-Hack, B-Hack, B-Hack, B-Hack I-Hack, B-Hack) has persistently attacked various B- and private organizations around the world from mid-October 2018 through mid-November 2018.
324
Malware
B-Hack
B-Hack)
0.675513
126
As alluded to in our previous blog regarding the Cannon tool, the B-Hack I-Hack (AKA B-Hack I-Hack, B-Hack, B-Hack, B-Hack I-Hack, B-Hack) has persistently attacked various B- and private organizations around the world from mid-October 2018 through mid-November 2018 .
As alluded to in our previous blog regarding the Cannon tool, the B-Hack I-Hack (AKA B-Hack I-Hack, B-Hack, B-Hack, B-Hack I-Hack, B-Hack) has persistently attacked various B- and private organizations around the world from mid-October 2018 through mid-November 2018.
326
System
B
B-Hack
0.960594
127
Russian B-, B- I-, B-, B- I- I-, and B- are also targeted by B-Hack I-Hack .
Russian B-, B- I-, B-, B- I- I-, and B- are also targeted by B-Hack I-Hack.
327
System
Hack I
B-Hack I-Hack.
0.497385
127
Russian B-, B- I-, B-, B- I- I-, and B- are also targeted by B-Hack I-Hack .
Russian B-, B- I-, B-, B- I- I-, and B- are also targeted by B-Hack I-Hack.
328
System
Hack
I-Hack.
0.499832
127
Russian B-, B- I-, B-, B- I- I-, and B- are also targeted by B-Hack I-Hack .
Russian B-, B- I-, B-, B- I- I-, and B- are also targeted by B-Hack I-Hack.
329
Malware
JHUHUGIT
JHUHUGIT
0.80383
128
The JHUHUGIT implant became a relatively popular first stage for the B- I- and was used again with a Java zero-day (CVE-2015-2590) in July 2015 .
The JHUHUGIT implant became a relatively popular first stage for the B- I- and was used again with a Java zero-day (CVE-2015-2590) in July 2015.
330
Vulnerability
CVE
(CVE-2015-2590)
0.816032
128
The JHUHUGIT implant became a relatively popular first stage for the B- I- and was used again with a Java zero-day (CVE-2015-2590) in July 2015 .
The JHUHUGIT implant became a relatively popular first stage for the B- I- and was used again with a Java zero-day (CVE-2015-2590) in July 2015.
331
Malware
JHUHUGIT
JHUHUGIT
0.829248
129
While the JHUHUGIT (and more recently, " JKEYSKW ") implant used in most of the B- I-, high profile victims are being targeted with another first level implant, representing the latest evolution of their AZZY Trojan .
While the JHUHUGIT (and more recently, " JKEYSKW ") implant used in most of the B- I-, high profile victims are being targeted with another first level implant, representing the latest evolution of their AZZY Trojan.
332
Malware
JKEYSKW
JKEYSKW
0.914762
129
While the JHUHUGIT (and more recently, " JKEYSKW ") implant used in most of the B- I-, high profile victims are being targeted with another first level implant, representing the latest evolution of their AZZY Trojan .
While the JHUHUGIT (and more recently, " JKEYSKW ") implant used in most of the B- I-, high profile victims are being targeted with another first level implant, representing the latest evolution of their AZZY Trojan.
333
Malware
AZZY
AZZY
0.931227
129
While the JHUHUGIT (and more recently, " JKEYSKW ") implant used in most of the B- I-, high profile victims are being targeted with another first level implant, representing the latest evolution of their AZZY Trojan .
While the JHUHUGIT (and more recently, " JKEYSKW ") implant used in most of the B- I-, high profile victims are being targeted with another first level implant, representing the latest evolution of their AZZY Trojan.
334
Malware
B-Hack
B-Hack
0.855004
130
Once a foothold is established, B-Hack trys to upload more backdoors, USB stealers as well as other hacking tools such as " Mimikatz " for lateral movement .
Once a foothold is established, B-Hack trys to upload more backdoors, USB stealers as well as other hacking tools such as " Mimikatz " for lateral movement.
335
System
USB
USB
0.842204
130
Once a foothold is established, B-Hack trys to upload more backdoors, USB stealers as well as other hacking tools such as " Mimikatz " for lateral movement .
Once a foothold is established, B-Hack trys to upload more backdoors, USB stealers as well as other hacking tools such as " Mimikatz " for lateral movement.
336
System
USB
USB
0.758723
131
Once a foothold is established, they try to upload more backdoors, USB stealers as well as other hacking tools such as " Mimikatz " for lateral movement .
Once a foothold is established, they try to upload more backdoors, USB stealers as well as other hacking tools such as " Mimikatz " for lateral movement.
337
Malware
Zebrocy
Zebrocy
0.833189
132
The B-Hack I-Hack I-Hack continues to target B- I- in the EU, US, and former Soviet states to deliver the Zebrocy tool as a payload .
The B-Hack I-Hack I-Hack continues to target B- I- in the EU, US, and former Soviet states to deliver the Zebrocy tool as a payload.
338
Malware
Cannon
Cannon.
0.80971
133
Of note, we also discovered the B-Hack I-Hack using a very similar delivery document to deliver a new Trojan called Cannon .
Of note, we also discovered the B-Hack I-Hack using a very similar delivery document to deliver a new Trojan called Cannon.
339
Malware
Komplex
Komplex
0.889899
134
Komplex shares a significant amount of functionality and traits with another tool used by B-Hack – the Carberp variant that B-Hack had used in previous B- I- on systems running Windows .
Komplex shares a significant amount of functionality and traits with another tool used by B-Hack – the Carberp variant that B-Hack had used in previous B- I- on systems running Windows.
340
Malware
Carberp
Carberp
0.796879
134
Komplex shares a significant amount of functionality and traits with another tool used by B-Hack – the Carberp variant that B-Hack had used in previous B- I- on systems running Windows .
Komplex shares a significant amount of functionality and traits with another tool used by B-Hack – the Carberp variant that B-Hack had used in previous B- I- on systems running Windows.
342
Organization
B-Hack
B-Hack
0.919362
134
Komplex shares a significant amount of functionality and traits with another tool used by B-Hack – the Carberp variant that B-Hack had used in previous B- I- on systems running Windows .
Komplex shares a significant amount of functionality and traits with another tool used by B-Hack – the Carberp variant that B-Hack had used in previous B- I- on systems running Windows.
343
System
Windows
Windows.
0.997936
134
Komplex shares a significant amount of functionality and traits with another tool used by B-Hack – the Carberp variant that B-Hack had used in previous B- I- on systems running Windows .
Komplex shares a significant amount of functionality and traits with another tool used by B-Hack – the Carberp variant that B-Hack had used in previous B- I- on systems running Windows.
344
System
OS X
OS X
0.96334
135
The B-Hack I-Hack created the Komplex Trojan to use in B- I- targeting the OS X operating system – a move that showcases their continued evolution toward multi-platform B- .
The B-Hack I-Hack created the Komplex Trojan to use in B- I- targeting the OS X operating system – a move that showcases their continued evolution toward multi-platform B-.
345
Malware
B-Hack
B-Hack's
0.8942
136
The Komplex Trojan revealed a design similar to B-Hack's Carberp variant Trojan, which we believe may have been done in order to handle compromised Windows and OS X systems using the same C2 server application with relative ease .
The Komplex Trojan revealed a design similar to B-Hack's Carberp variant Trojan, which we believe may have been done in order to handle compromised Windows and OS X systems using the same C2 server application with relative ease.
346
Malware
Carberp
Carberp
0.875628
136
The Komplex Trojan revealed a design similar to B-Hack's Carberp variant Trojan, which we believe may have been done in order to handle compromised Windows and OS X systems using the same C2 server application with relative ease .
The Komplex Trojan revealed a design similar to B-Hack's Carberp variant Trojan, which we believe may have been done in order to handle compromised Windows and OS X systems using the same C2 server application with relative ease.
347
System
Windows
Windows
0.997658
136
The Komplex Trojan revealed a design similar to B-Hack's Carberp variant Trojan, which we believe may have been done in order to handle compromised Windows and OS X systems using the same C2 server application with relative ease .
The Komplex Trojan revealed a design similar to B-Hack's Carberp variant Trojan, which we believe may have been done in order to handle compromised Windows and OS X systems using the same C2 server application with relative ease.
348
System
OS X
OS X
0.993219
136
The Komplex Trojan revealed a design similar to B-Hack's Carberp variant Trojan, which we believe may have been done in order to handle compromised Windows and OS X systems using the same C2 server application with relative ease .
The Komplex Trojan revealed a design similar to B-Hack's Carberp variant Trojan, which we believe may have been done in order to handle compromised Windows and OS X systems using the same C2 server application with relative ease.
349
Malware
MiniDuke
MiniDuke,
0.873966
137
This whitepaper explores the tools - such as MiniDuke, CosmicDuke, OnionDuke, CozyDuke, etc- of the B-Hack, a well-resourced, highly dedicated and organized B-Hack I-Hack that we believe has been working for the Russian Federation since at least 2008 to collect intelligence in support of foreign and security policy decision-making .
This whitepaper explores the tools - such as MiniDuke, CosmicDuke, OnionDuke, CozyDuke, etc- of the B-Hack, a well-resourced, highly dedicated and organized B-Hack I-Hack that we believe has been working for the Russian Federation since at least 2008 to collect intelligence in support of foreign and security policy decision-making.
350
Malware
CosmicDuke
CosmicDuke,
0.940369
137
This whitepaper explores the tools - such as MiniDuke, CosmicDuke, OnionDuke, CozyDuke, etc- of the B-Hack, a well-resourced, highly dedicated and organized B-Hack I-Hack that we believe has been working for the Russian Federation since at least 2008 to collect intelligence in support of foreign and security policy decision-making .
This whitepaper explores the tools - such as MiniDuke, CosmicDuke, OnionDuke, CozyDuke, etc- of the B-Hack, a well-resourced, highly dedicated and organized B-Hack I-Hack that we believe has been working for the Russian Federation since at least 2008 to collect intelligence in support of foreign and security policy decision-making.
351
Malware
OnionDuke
OnionDuke,
0.944418
137
This whitepaper explores the tools - such as MiniDuke, CosmicDuke, OnionDuke, CozyDuke, etc- of the B-Hack, a well-resourced, highly dedicated and organized B-Hack I-Hack that we believe has been working for the Russian Federation since at least 2008 to collect intelligence in support of foreign and security policy decision-making .
This whitepaper explores the tools - such as MiniDuke, CosmicDuke, OnionDuke, CozyDuke, etc- of the B-Hack, a well-resourced, highly dedicated and organized B-Hack I-Hack that we believe has been working for the Russian Federation since at least 2008 to collect intelligence in support of foreign and security policy decision-making.
352
Malware
CozyDuke
CozyDuke,
0.934483
137
This whitepaper explores the tools - such as MiniDuke, CosmicDuke, OnionDuke, CozyDuke, etc- of the B-Hack, a well-resourced, highly dedicated and organized B-Hack I-Hack that we believe has been working for the Russian Federation since at least 2008 to collect intelligence in support of foreign and security policy decision-making .
This whitepaper explores the tools - such as MiniDuke, CosmicDuke, OnionDuke, CozyDuke, etc- of the B-Hack, a well-resourced, highly dedicated and organized B-Hack I-Hack that we believe has been working for the Russian Federation since at least 2008 to collect intelligence in support of foreign and security policy decision-making.
353
Malware
B-Hack
B-Hack,
0.764212
137
This whitepaper explores the tools - such as MiniDuke, CosmicDuke, OnionDuke, CozyDuke, etc- of the B-Hack, a well-resourced, highly dedicated and organized B-Hack I-Hack that we believe has been working for the Russian Federation since at least 2008 to collect intelligence in support of foreign and security policy decision-making .
This whitepaper explores the tools - such as MiniDuke, CosmicDuke, OnionDuke, CozyDuke, etc- of the B-Hack, a well-resourced, highly dedicated and organized B-Hack I-Hack that we believe has been working for the Russian Federation since at least 2008 to collect intelligence in support of foreign and security policy decision-making.
354
Malware
B
B-Hack
0.655604
137
This whitepaper explores the tools - such as MiniDuke, CosmicDuke, OnionDuke, CozyDuke, etc- of the B-Hack, a well-resourced, highly dedicated and organized B-Hack I-Hack that we believe has been working for the Russian Federation since at least 2008 to collect intelligence in support of foreign and security policy decision-making .
This whitepaper explores the tools - such as MiniDuke, CosmicDuke, OnionDuke, CozyDuke, etc- of the B-Hack, a well-resourced, highly dedicated and organized B-Hack I-Hack that we believe has been working for the Russian Federation since at least 2008 to collect intelligence in support of foreign and security policy decision-making.
355
Malware
B
B-Hack
0.626127
138
The B-Hack are a well-resourced, highly dedicated and organized B-Hack I-Hack that we believe has been working for the Russian Federation since at least 2008 to collect intelligence in support of foreign and security policy decision-making .
The B-Hack are a well-resourced, highly dedicated and organized B-Hack I-Hack that we believe has been working for the Russian Federation since at least 2008 to collect intelligence in support of foreign and security policy decision-making.
357
Malware
B
B-Hack
0.739708
139
The B-Hack are known to employ a vast arsenal of malware toolsets, which we identify as MiniDuke, CosmicDuke, OnionDuke, CozyDuke, CloudDuke, SeaDuke, HammerDuke, PinchDuke, and GeminiDuke .
The B-Hack are known to employ a vast arsenal of malware toolsets, which we identify as MiniDuke, CosmicDuke, OnionDuke, CozyDuke, CloudDuke, SeaDuke, HammerDuke, PinchDuke, and GeminiDuke.
358
Malware
MiniDuke
MiniDuke,
0.94423
139
The B-Hack are known to employ a vast arsenal of malware toolsets, which we identify as MiniDuke, CosmicDuke, OnionDuke, CozyDuke, CloudDuke, SeaDuke, HammerDuke, PinchDuke, and GeminiDuke .
The B-Hack are known to employ a vast arsenal of malware toolsets, which we identify as MiniDuke, CosmicDuke, OnionDuke, CozyDuke, CloudDuke, SeaDuke, HammerDuke, PinchDuke, and GeminiDuke.
360
Malware
CosmicDuke
CosmicDuke,
0.968546
139
The B-Hack are known to employ a vast arsenal of malware toolsets, which we identify as MiniDuke, CosmicDuke, OnionDuke, CozyDuke, CloudDuke, SeaDuke, HammerDuke, PinchDuke, and GeminiDuke .
The B-Hack are known to employ a vast arsenal of malware toolsets, which we identify as MiniDuke, CosmicDuke, OnionDuke, CozyDuke, CloudDuke, SeaDuke, HammerDuke, PinchDuke, and GeminiDuke.
361
Malware
OnionDuke
OnionDuke,
0.970647
139
The B-Hack are known to employ a vast arsenal of malware toolsets, which we identify as MiniDuke, CosmicDuke, OnionDuke, CozyDuke, CloudDuke, SeaDuke, HammerDuke, PinchDuke, and GeminiDuke .
The B-Hack are known to employ a vast arsenal of malware toolsets, which we identify as MiniDuke, CosmicDuke, OnionDuke, CozyDuke, CloudDuke, SeaDuke, HammerDuke, PinchDuke, and GeminiDuke.
362
Malware
CozyDuke
CozyDuke,
0.957653
139
The B-Hack are known to employ a vast arsenal of malware toolsets, which we identify as MiniDuke, CosmicDuke, OnionDuke, CozyDuke, CloudDuke, SeaDuke, HammerDuke, PinchDuke, and GeminiDuke .
The B-Hack are known to employ a vast arsenal of malware toolsets, which we identify as MiniDuke, CosmicDuke, OnionDuke, CozyDuke, CloudDuke, SeaDuke, HammerDuke, PinchDuke, and GeminiDuke.
363
Malware
CloudDuke
CloudDuke,
0.957579
139
The B-Hack are known to employ a vast arsenal of malware toolsets, which we identify as MiniDuke, CosmicDuke, OnionDuke, CozyDuke, CloudDuke, SeaDuke, HammerDuke, PinchDuke, and GeminiDuke .
The B-Hack are known to employ a vast arsenal of malware toolsets, which we identify as MiniDuke, CosmicDuke, OnionDuke, CozyDuke, CloudDuke, SeaDuke, HammerDuke, PinchDuke, and GeminiDuke.
364
Malware
SeaDuke
SeaDuke,
0.95899
139
The B-Hack are known to employ a vast arsenal of malware toolsets, which we identify as MiniDuke, CosmicDuke, OnionDuke, CozyDuke, CloudDuke, SeaDuke, HammerDuke, PinchDuke, and GeminiDuke .
The B-Hack are known to employ a vast arsenal of malware toolsets, which we identify as MiniDuke, CosmicDuke, OnionDuke, CozyDuke, CloudDuke, SeaDuke, HammerDuke, PinchDuke, and GeminiDuke.
365
Malware
HammerDuke
HammerDuke,
0.966132
139
The B-Hack are known to employ a vast arsenal of malware toolsets, which we identify as MiniDuke, CosmicDuke, OnionDuke, CozyDuke, CloudDuke, SeaDuke, HammerDuke, PinchDuke, and GeminiDuke .
The B-Hack are known to employ a vast arsenal of malware toolsets, which we identify as MiniDuke, CosmicDuke, OnionDuke, CozyDuke, CloudDuke, SeaDuke, HammerDuke, PinchDuke, and GeminiDuke.
366
Malware
PinchDuke
PinchDuke,
0.972437
139
The B-Hack are known to employ a vast arsenal of malware toolsets, which we identify as MiniDuke, CosmicDuke, OnionDuke, CozyDuke, CloudDuke, SeaDuke, HammerDuke, PinchDuke, and GeminiDuke .
The B-Hack are known to employ a vast arsenal of malware toolsets, which we identify as MiniDuke, CosmicDuke, OnionDuke, CozyDuke, CloudDuke, SeaDuke, HammerDuke, PinchDuke, and GeminiDuke.
367
Malware
GeminiDuke
GeminiDuke.
0.968235
139
The B-Hack are known to employ a vast arsenal of malware toolsets, which we identify as MiniDuke, CosmicDuke, OnionDuke, CozyDuke, CloudDuke, SeaDuke, HammerDuke, PinchDuke, and GeminiDuke .
The B-Hack are known to employ a vast arsenal of malware toolsets, which we identify as MiniDuke, CosmicDuke, OnionDuke, CozyDuke, CloudDuke, SeaDuke, HammerDuke, PinchDuke, and GeminiDuke.
368
Malware
Duke
Duke
0.983384
140
The origins of the Duke toolset names can be traced back to when researchers at Kaspersky Labs coined the term " MiniDuke " to identify the first Duke-related malware they found .
The origins of the Duke toolset names can be traced back to when researchers at Kaspersky Labs coined the term " MiniDuke " to identify the first Duke-related malware they found.
369
Organization
Kaspersky Lab
Kaspersky Labs
0.98401
140
The origins of the Duke toolset names can be traced back to when researchers at Kaspersky Labs coined the term " MiniDuke " to identify the first Duke-related malware they found .
The origins of the Duke toolset names can be traced back to when researchers at Kaspersky Labs coined the term " MiniDuke " to identify the first Duke-related malware they found.
370
Malware
MiniDuke
MiniDuke
0.921052
140
The origins of the Duke toolset names can be traced back to when researchers at Kaspersky Labs coined the term " MiniDuke " to identify the first Duke-related malware they found .
The origins of the Duke toolset names can be traced back to when researchers at Kaspersky Labs coined the term " MiniDuke " to identify the first Duke-related malware they found.
371
Malware
Duke
Duke-related
0.978453
140
The origins of the Duke toolset names can be traced back to when researchers at Kaspersky Labs coined the term " MiniDuke " to identify the first Duke-related malware they found .
The origins of the Duke toolset names can be traced back to when researchers at Kaspersky Labs coined the term " MiniDuke " to identify the first Duke-related malware they found.
372