Type
stringclasses 5
values | Text
stringlengths 1
70
| Fixed Text
stringlengths 2
70
| Score
float64 0.23
1
| Original Sentence ID
int64 0
6.64k
| Original Sentence
stringlengths 6
383
| Decoded Sentence
stringlengths 5
382
| __index_level_0__
int64 0
13.8k
|
|---|---|---|---|---|---|---|---|
Organization
|
Department of Homeland Security (DHS
|
Department of Homeland Security (DHS)
| 0.901258
| 108
|
Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) is linked to the Russian government, returned to low-key intelligence-gathering operations during 2017 and into 2018, targeting a range of B- and B- targets in Europe and South America .
|
Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) is linked to the Russian government, returned to low-key intelligence-gathering operations during 2017 and into 2018, targeting a range of B- and B- targets in Europe and South America.
| 262
|
Organization
|
Federal Bureau of Investigation (FBI
|
Federal Bureau of Investigation (FBI)
| 0.920828
| 108
|
Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) is linked to the Russian government, returned to low-key intelligence-gathering operations during 2017 and into 2018, targeting a range of B- and B- targets in Europe and South America .
|
Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) is linked to the Russian government, returned to low-key intelligence-gathering operations during 2017 and into 2018, targeting a range of B- and B- targets in Europe and South America.
| 263
|
Malware
|
Ha
|
I-Hack,
| 0.407386
| 110
|
Another B-Hack I-Hack, B-Hack (aka B-Hack), has been active since at least May 2016 and is involved in what appears to be intelligence gathering operations against military targets in Europe, Central Asia, and Eastern Asia .
|
Another B-Hack I-Hack, B-Hack (aka B-Hack), has been active since at least May 2016 and is involved in what appears to be intelligence gathering operations against military targets in Europe, Central Asia, and Eastern Asia.
| 265
|
Malware
|
B-Hack
|
B-Hack
| 0.785057
| 110
|
Another B-Hack I-Hack, B-Hack (aka B-Hack), has been active since at least May 2016 and is involved in what appears to be intelligence gathering operations against military targets in Europe, Central Asia, and Eastern Asia .
|
Another B-Hack I-Hack, B-Hack (aka B-Hack), has been active since at least May 2016 and is involved in what appears to be intelligence gathering operations against military targets in Europe, Central Asia, and Eastern Asia.
| 266
|
Malware
|
B-Hack
|
B-Hack),
| 0.791813
| 110
|
Another B-Hack I-Hack, B-Hack (aka B-Hack), has been active since at least May 2016 and is involved in what appears to be intelligence gathering operations against military targets in Europe, Central Asia, and Eastern Asia .
|
Another B-Hack I-Hack, B-Hack (aka B-Hack), has been active since at least May 2016 and is involved in what appears to be intelligence gathering operations against military targets in Europe, Central Asia, and Eastern Asia.
| 267
|
Malware
|
B-Hack
|
B-Hack
| 0.907707
| 111
|
Several sources consider B-Hack a B-Hack of CyberMercs based in Russia .
|
Several sources consider B-Hack a B-Hack of CyberMercs based in Russia.
| 268
|
Malware
|
B-Hack
|
B-Hack
| 0.848466
| 112
|
The primary targets of B-Hack are potential victims in several countries such as Ukraine, Spain, Russia, Romania, the United States and Canada .
|
The primary targets of B-Hack are potential victims in several countries such as Ukraine, Spain, Russia, Romania, the United States and Canada.
| 269
|
System
|
B
|
B-Hack
| 0.566208
| 113
|
We have reasons to believe that the B-Hack of the B-Hack network are either Russian B- or B- of a neighboring country that speak Russian .
|
We have reasons to believe that the B-Hack of the B-Hack network are either Russian B- or B- of a neighboring country that speak Russian.
| 270
|
Organization
|
FireEye
|
FireEye
| 0.980806
| 114
|
Previous work published by security vendor FireEye in October 2014 suggests the B-Hack might be of Russian origin .
|
Previous work published by security vendor FireEye in October 2014 suggests the B-Hack might be of Russian origin.
| 272
|
Malware
|
B-Hack
|
B-Hack
| 0.868413
| 114
|
Previous work published by security vendor FireEye in October 2014 suggests the B-Hack might be of Russian origin .
|
Previous work published by security vendor FireEye in October 2014 suggests the B-Hack might be of Russian origin.
| 273
|
Organization
|
B-Hack
|
B-Hack's
| 0.857415
| 115
|
Finally, the use of recent domestic events and a prominent US B- exercise focused on deterring Russian aggression highlight B-Hack's ability and interest in exploiting B- events for their operations .
|
Finally, the use of recent domestic events and a prominent US B- exercise focused on deterring Russian aggression highlight B-Hack's ability and interest in exploiting B- events for their operations.
| 274
|
Malware
|
B-Hack I-Hack
|
B-Hack I-Hack
| 0.692501
| 116
|
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM, JHUHUGIT, AZZY and a few others .
|
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM, JHUHUGIT, AZZY and a few others.
| 275
|
Malware
|
CORESHELL
|
CORESHELL,
| 0.855888
| 116
|
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM, JHUHUGIT, AZZY and a few others .
|
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM, JHUHUGIT, AZZY and a few others.
| 276
|
Malware
|
SPLM
|
SPLM,
| 0.791623
| 116
|
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM, JHUHUGIT, AZZY and a few others .
|
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM, JHUHUGIT, AZZY and a few others.
| 277
|
Malware
|
JHUHUGIT
|
JHUHUGIT,
| 0.843762
| 116
|
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM, JHUHUGIT, AZZY and a few others .
|
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM, JHUHUGIT, AZZY and a few others.
| 278
|
Malware
|
AZZY
|
AZZY
| 0.807102
| 116
|
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM, JHUHUGIT, AZZY and a few others .
|
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM, JHUHUGIT, AZZY and a few others.
| 279
|
Organization
|
B-
|
B-Hack
| 0.444859
| 117
|
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM (aka Xagent, aka CHOPSTICK), JHUHUGIT (which is built with code from the Carberp sources), AZZY (aka ADVSTORESHELL, NETUI, EVILTOSS, and spans across 4-5 generations) and a few others .
|
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM (aka Xagent, aka CHOPSTICK), JHUHUGIT (which is built with code from the Carberp sources), AZZY (aka ADVSTORESHELL, NETUI, EVILTOSS, and spans across 4-5 generations) and a few others.
| 280
|
Organization
|
ck I-
|
B-Hack I-Hack
| 0.387465
| 117
|
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM (aka Xagent, aka CHOPSTICK), JHUHUGIT (which is built with code from the Carberp sources), AZZY (aka ADVSTORESHELL, NETUI, EVILTOSS, and spans across 4-5 generations) and a few others .
|
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM (aka Xagent, aka CHOPSTICK), JHUHUGIT (which is built with code from the Carberp sources), AZZY (aka ADVSTORESHELL, NETUI, EVILTOSS, and spans across 4-5 generations) and a few others.
| 282
|
Organization
|
ck
|
I-Hack
| 0.715013
| 117
|
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM (aka Xagent, aka CHOPSTICK), JHUHUGIT (which is built with code from the Carberp sources), AZZY (aka ADVSTORESHELL, NETUI, EVILTOSS, and spans across 4-5 generations) and a few others .
|
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM (aka Xagent, aka CHOPSTICK), JHUHUGIT (which is built with code from the Carberp sources), AZZY (aka ADVSTORESHELL, NETUI, EVILTOSS, and spans across 4-5 generations) and a few others.
| 284
|
Malware
|
CORESHELL
|
CORESHELL,
| 0.85198
| 117
|
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM (aka Xagent, aka CHOPSTICK), JHUHUGIT (which is built with code from the Carberp sources), AZZY (aka ADVSTORESHELL, NETUI, EVILTOSS, and spans across 4-5 generations) and a few others .
|
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM (aka Xagent, aka CHOPSTICK), JHUHUGIT (which is built with code from the Carberp sources), AZZY (aka ADVSTORESHELL, NETUI, EVILTOSS, and spans across 4-5 generations) and a few others.
| 285
|
Malware
|
SPLM
|
SPLM
| 0.828894
| 117
|
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM (aka Xagent, aka CHOPSTICK), JHUHUGIT (which is built with code from the Carberp sources), AZZY (aka ADVSTORESHELL, NETUI, EVILTOSS, and spans across 4-5 generations) and a few others .
|
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM (aka Xagent, aka CHOPSTICK), JHUHUGIT (which is built with code from the Carberp sources), AZZY (aka ADVSTORESHELL, NETUI, EVILTOSS, and spans across 4-5 generations) and a few others.
| 286
|
Malware
|
Xagent
|
Xagent,
| 0.759889
| 117
|
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM (aka Xagent, aka CHOPSTICK), JHUHUGIT (which is built with code from the Carberp sources), AZZY (aka ADVSTORESHELL, NETUI, EVILTOSS, and spans across 4-5 generations) and a few others .
|
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM (aka Xagent, aka CHOPSTICK), JHUHUGIT (which is built with code from the Carberp sources), AZZY (aka ADVSTORESHELL, NETUI, EVILTOSS, and spans across 4-5 generations) and a few others.
| 287
|
Malware
|
CHOPSTICK
|
CHOPSTICK),
| 0.903296
| 117
|
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM (aka Xagent, aka CHOPSTICK), JHUHUGIT (which is built with code from the Carberp sources), AZZY (aka ADVSTORESHELL, NETUI, EVILTOSS, and spans across 4-5 generations) and a few others .
|
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM (aka Xagent, aka CHOPSTICK), JHUHUGIT (which is built with code from the Carberp sources), AZZY (aka ADVSTORESHELL, NETUI, EVILTOSS, and spans across 4-5 generations) and a few others.
| 288
|
Malware
|
JHUHUGIT
|
JHUHUGIT
| 0.801394
| 117
|
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM (aka Xagent, aka CHOPSTICK), JHUHUGIT (which is built with code from the Carberp sources), AZZY (aka ADVSTORESHELL, NETUI, EVILTOSS, and spans across 4-5 generations) and a few others .
|
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM (aka Xagent, aka CHOPSTICK), JHUHUGIT (which is built with code from the Carberp sources), AZZY (aka ADVSTORESHELL, NETUI, EVILTOSS, and spans across 4-5 generations) and a few others.
| 289
|
Malware
|
Carberp
|
Carberp
| 0.807725
| 117
|
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM (aka Xagent, aka CHOPSTICK), JHUHUGIT (which is built with code from the Carberp sources), AZZY (aka ADVSTORESHELL, NETUI, EVILTOSS, and spans across 4-5 generations) and a few others .
|
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM (aka Xagent, aka CHOPSTICK), JHUHUGIT (which is built with code from the Carberp sources), AZZY (aka ADVSTORESHELL, NETUI, EVILTOSS, and spans across 4-5 generations) and a few others.
| 290
|
Malware
|
AZZY
|
AZZY
| 0.740452
| 117
|
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM (aka Xagent, aka CHOPSTICK), JHUHUGIT (which is built with code from the Carberp sources), AZZY (aka ADVSTORESHELL, NETUI, EVILTOSS, and spans across 4-5 generations) and a few others .
|
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM (aka Xagent, aka CHOPSTICK), JHUHUGIT (which is built with code from the Carberp sources), AZZY (aka ADVSTORESHELL, NETUI, EVILTOSS, and spans across 4-5 generations) and a few others.
| 291
|
Malware
|
ADVSTORESHELL
|
ADVSTORESHELL,
| 0.76345
| 117
|
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM (aka Xagent, aka CHOPSTICK), JHUHUGIT (which is built with code from the Carberp sources), AZZY (aka ADVSTORESHELL, NETUI, EVILTOSS, and spans across 4-5 generations) and a few others .
|
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM (aka Xagent, aka CHOPSTICK), JHUHUGIT (which is built with code from the Carberp sources), AZZY (aka ADVSTORESHELL, NETUI, EVILTOSS, and spans across 4-5 generations) and a few others.
| 292
|
Malware
|
NET
|
NETUI,
| 0.624744
| 117
|
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM (aka Xagent, aka CHOPSTICK), JHUHUGIT (which is built with code from the Carberp sources), AZZY (aka ADVSTORESHELL, NETUI, EVILTOSS, and spans across 4-5 generations) and a few others .
|
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM (aka Xagent, aka CHOPSTICK), JHUHUGIT (which is built with code from the Carberp sources), AZZY (aka ADVSTORESHELL, NETUI, EVILTOSS, and spans across 4-5 generations) and a few others.
| 293
|
Malware
|
EVILTOSS
|
EVILTOSS,
| 0.682959
| 117
|
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM (aka Xagent, aka CHOPSTICK), JHUHUGIT (which is built with code from the Carberp sources), AZZY (aka ADVSTORESHELL, NETUI, EVILTOSS, and spans across 4-5 generations) and a few others .
|
In 2013, the B-Hack I-Hack expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM (aka Xagent, aka CHOPSTICK), JHUHUGIT (which is built with code from the Carberp sources), AZZY (aka ADVSTORESHELL, NETUI, EVILTOSS, and spans across 4-5 generations) and a few others.
| 295
|
Malware
|
B-Hack I-Hack
|
B-Hack I-Hack
| 0.925289
| 118
|
The B-Hack I-Hack spearphished targets in several waves with Flash exploits leading to their Carberp based JHUHUGIT downloaders and further stages of malware .
|
The B-Hack I-Hack spearphished targets in several waves with Flash exploits leading to their Carberp based JHUHUGIT downloaders and further stages of malware.
| 296
|
System
|
Flash
|
Flash
| 0.99278
| 118
|
The B-Hack I-Hack spearphished targets in several waves with Flash exploits leading to their Carberp based JHUHUGIT downloaders and further stages of malware .
|
The B-Hack I-Hack spearphished targets in several waves with Flash exploits leading to their Carberp based JHUHUGIT downloaders and further stages of malware.
| 297
|
Malware
|
Carberp
|
Carberp
| 0.82111
| 118
|
The B-Hack I-Hack spearphished targets in several waves with Flash exploits leading to their Carberp based JHUHUGIT downloaders and further stages of malware .
|
The B-Hack I-Hack spearphished targets in several waves with Flash exploits leading to their Carberp based JHUHUGIT downloaders and further stages of malware.
| 298
|
Malware
|
JHUHUGIT
|
JHUHUGIT
| 0.82933
| 118
|
The B-Hack I-Hack spearphished targets in several waves with Flash exploits leading to their Carberp based JHUHUGIT downloaders and further stages of malware .
|
The B-Hack I-Hack spearphished targets in several waves with Flash exploits leading to their Carberp based JHUHUGIT downloaders and further stages of malware.
| 299
|
Malware
|
B-Hack
|
B-Hack
| 0.795232
| 119
|
B-Hack spearphished targets in several waves with Flash exploits leading to their Carberp based JHUHUGIT downloaders and further stages of malware .
|
B-Hack spearphished targets in several waves with Flash exploits leading to their Carberp based JHUHUGIT downloaders and further stages of malware.
| 300
|
System
|
Flash
|
Flash
| 0.992705
| 119
|
B-Hack spearphished targets in several waves with Flash exploits leading to their Carberp based JHUHUGIT downloaders and further stages of malware .
|
B-Hack spearphished targets in several waves with Flash exploits leading to their Carberp based JHUHUGIT downloaders and further stages of malware.
| 301
|
Malware
|
Carberp
|
Carberp
| 0.857004
| 119
|
B-Hack spearphished targets in several waves with Flash exploits leading to their Carberp based JHUHUGIT downloaders and further stages of malware .
|
B-Hack spearphished targets in several waves with Flash exploits leading to their Carberp based JHUHUGIT downloaders and further stages of malware.
| 302
|
Malware
|
JHUHUGIT
|
JHUHUGIT
| 0.803059
| 119
|
B-Hack spearphished targets in several waves with Flash exploits leading to their Carberp based JHUHUGIT downloaders and further stages of malware .
|
B-Hack spearphished targets in several waves with Flash exploits leading to their Carberp based JHUHUGIT downloaders and further stages of malware.
| 303
|
Malware
|
B-Hack
|
B-Hack
| 0.761053
| 120
|
The B-Hack spearphished targets in several waves with Flash exploits leading to their Carberp based JHUHUGIT downloaders and further stages of malware .
|
The B-Hack spearphished targets in several waves with Flash exploits leading to their Carberp based JHUHUGIT downloaders and further stages of malware.
| 304
|
System
|
Flash
|
Flash
| 0.992564
| 120
|
The B-Hack spearphished targets in several waves with Flash exploits leading to their Carberp based JHUHUGIT downloaders and further stages of malware .
|
The B-Hack spearphished targets in several waves with Flash exploits leading to their Carberp based JHUHUGIT downloaders and further stages of malware.
| 305
|
Malware
|
Carberp
|
Carberp
| 0.870448
| 120
|
The B-Hack spearphished targets in several waves with Flash exploits leading to their Carberp based JHUHUGIT downloaders and further stages of malware .
|
The B-Hack spearphished targets in several waves with Flash exploits leading to their Carberp based JHUHUGIT downloaders and further stages of malware.
| 306
|
Malware
|
JHUHUGIT
|
JHUHUGIT
| 0.807208
| 120
|
The B-Hack spearphished targets in several waves with Flash exploits leading to their Carberp based JHUHUGIT downloaders and further stages of malware .
|
The B-Hack spearphished targets in several waves with Flash exploits leading to their Carberp based JHUHUGIT downloaders and further stages of malware.
| 307
|
System
|
SPLM
|
SPLM,
| 0.816244
| 121
|
Their evolving and modified SPLM, CHOPSTICK, XAgent code is a long-standing part of B- I-, however much of it is changing .
|
Their evolving and modified SPLM, CHOPSTICK, XAgent code is a long-standing part of B- I-, however much of it is changing.
| 308
|
System
|
CHOPSTICK
|
CHOPSTICK,
| 0.77833
| 121
|
Their evolving and modified SPLM, CHOPSTICK, XAgent code is a long-standing part of B- I-, however much of it is changing .
|
Their evolving and modified SPLM, CHOPSTICK, XAgent code is a long-standing part of B- I-, however much of it is changing.
| 309
|
System
|
XAgent
|
XAgent
| 0.899053
| 121
|
Their evolving and modified SPLM, CHOPSTICK, XAgent code is a long-standing part of B- I-, however much of it is changing .
|
Their evolving and modified SPLM, CHOPSTICK, XAgent code is a long-standing part of B- I-, however much of it is changing.
| 310
|
Organization
|
FireEye
|
FireEye
| 0.988317
| 122
|
FireEye has moderate confidence that a B- targeting the B- I- is attributed to Russian B-Hack I-Hack .
|
FireEye has moderate confidence that a B- targeting the B- I- is attributed to Russian B-Hack I-Hack.
| 311
|
Malware
|
B
|
B-Hack
| 0.391767
| 122
|
FireEye has moderate confidence that a B- targeting the B- I- is attributed to Russian B-Hack I-Hack .
|
FireEye has moderate confidence that a B- targeting the B- I- is attributed to Russian B-Hack I-Hack.
| 312
|
Indicator
|
I
|
I-Hack.
| 0.734073
| 122
|
FireEye has moderate confidence that a B- targeting the B- I- is attributed to Russian B-Hack I-Hack .
|
FireEye has moderate confidence that a B- targeting the B- I- is attributed to Russian B-Hack I-Hack.
| 314
|
Organization
|
B-Hack
|
B-Hack
| 0.864701
| 123
|
B-Hack is using novel techniques involving the EternalBlue exploit and the open source tool Responder to spread laterally through networks and likely target travelers .
|
B-Hack is using novel techniques involving the EternalBlue exploit and the open source tool Responder to spread laterally through networks and likely target travelers.
| 316
|
Malware
|
EternalBlue
|
EternalBlue
| 0.952832
| 123
|
B-Hack is using novel techniques involving the EternalBlue exploit and the open source tool Responder to spread laterally through networks and likely target travelers .
|
B-Hack is using novel techniques involving the EternalBlue exploit and the open source tool Responder to spread laterally through networks and likely target travelers.
| 317
|
Malware
|
Responder
|
Responder
| 0.711577
| 123
|
B-Hack is using novel techniques involving the EternalBlue exploit and the open source tool Responder to spread laterally through networks and likely target travelers .
|
B-Hack is using novel techniques involving the EternalBlue exploit and the open source tool Responder to spread laterally through networks and likely target travelers.
| 318
|
Malware
|
B-Hack
|
B-Hack
| 0.758421
| 124
|
Upon gaining access to the machines connected to corporate and guest Wi-Fi networks, B-Hack deployed Responder .
|
Upon gaining access to the machines connected to corporate and guest Wi-Fi networks, B-Hack deployed Responder.
| 319
|
Malware
|
Responder
|
Responder.
| 0.846468
| 124
|
Upon gaining access to the machines connected to corporate and guest Wi-Fi networks, B-Hack deployed Responder .
|
Upon gaining access to the machines connected to corporate and guest Wi-Fi networks, B-Hack deployed Responder.
| 320
|
Malware
|
Zebrocy
|
Zebrocy
| 0.811038
| 125
|
Compared to other backdoor tools associated with the B-Hack I-Hack, the use of Zebrocy in B- I- is far more widespread .
|
Compared to other backdoor tools associated with the B-Hack I-Hack, the use of Zebrocy in B- I- is far more widespread.
| 321
|
Malware
|
B-Hack I-Hack
|
B-Hack I-Hack
| 0.837843
| 126
|
As alluded to in our previous blog regarding the Cannon tool, the B-Hack I-Hack (AKA B-Hack I-Hack, B-Hack, B-Hack, B-Hack I-Hack, B-Hack) has persistently attacked various B- and private organizations around the world from mid-October 2018 through mid-November 2018 .
|
As alluded to in our previous blog regarding the Cannon tool, the B-Hack I-Hack (AKA B-Hack I-Hack, B-Hack, B-Hack, B-Hack I-Hack, B-Hack) has persistently attacked various B- and private organizations around the world from mid-October 2018 through mid-November 2018.
| 322
|
Malware
|
B-Hack I-Hack
|
B-Hack I-Hack,
| 0.736015
| 126
|
As alluded to in our previous blog regarding the Cannon tool, the B-Hack I-Hack (AKA B-Hack I-Hack, B-Hack, B-Hack, B-Hack I-Hack, B-Hack) has persistently attacked various B- and private organizations around the world from mid-October 2018 through mid-November 2018 .
|
As alluded to in our previous blog regarding the Cannon tool, the B-Hack I-Hack (AKA B-Hack I-Hack, B-Hack, B-Hack, B-Hack I-Hack, B-Hack) has persistently attacked various B- and private organizations around the world from mid-October 2018 through mid-November 2018.
| 323
|
Malware
|
B-Hack, B-Hack
|
B-Hack, B-Hack,
| 0.658168
| 126
|
As alluded to in our previous blog regarding the Cannon tool, the B-Hack I-Hack (AKA B-Hack I-Hack, B-Hack, B-Hack, B-Hack I-Hack, B-Hack) has persistently attacked various B- and private organizations around the world from mid-October 2018 through mid-November 2018 .
|
As alluded to in our previous blog regarding the Cannon tool, the B-Hack I-Hack (AKA B-Hack I-Hack, B-Hack, B-Hack, B-Hack I-Hack, B-Hack) has persistently attacked various B- and private organizations around the world from mid-October 2018 through mid-November 2018.
| 324
|
Malware
|
B-Hack
|
B-Hack)
| 0.675513
| 126
|
As alluded to in our previous blog regarding the Cannon tool, the B-Hack I-Hack (AKA B-Hack I-Hack, B-Hack, B-Hack, B-Hack I-Hack, B-Hack) has persistently attacked various B- and private organizations around the world from mid-October 2018 through mid-November 2018 .
|
As alluded to in our previous blog regarding the Cannon tool, the B-Hack I-Hack (AKA B-Hack I-Hack, B-Hack, B-Hack, B-Hack I-Hack, B-Hack) has persistently attacked various B- and private organizations around the world from mid-October 2018 through mid-November 2018.
| 326
|
System
|
B
|
B-Hack
| 0.960594
| 127
|
Russian B-, B- I-, B-, B- I- I-, and B- are also targeted by B-Hack I-Hack .
|
Russian B-, B- I-, B-, B- I- I-, and B- are also targeted by B-Hack I-Hack.
| 327
|
System
|
Hack I
|
B-Hack I-Hack.
| 0.497385
| 127
|
Russian B-, B- I-, B-, B- I- I-, and B- are also targeted by B-Hack I-Hack .
|
Russian B-, B- I-, B-, B- I- I-, and B- are also targeted by B-Hack I-Hack.
| 328
|
System
|
Hack
|
I-Hack.
| 0.499832
| 127
|
Russian B-, B- I-, B-, B- I- I-, and B- are also targeted by B-Hack I-Hack .
|
Russian B-, B- I-, B-, B- I- I-, and B- are also targeted by B-Hack I-Hack.
| 329
|
Malware
|
JHUHUGIT
|
JHUHUGIT
| 0.80383
| 128
|
The JHUHUGIT implant became a relatively popular first stage for the B- I- and was used again with a Java zero-day (CVE-2015-2590) in July 2015 .
|
The JHUHUGIT implant became a relatively popular first stage for the B- I- and was used again with a Java zero-day (CVE-2015-2590) in July 2015.
| 330
|
Vulnerability
|
CVE
|
(CVE-2015-2590)
| 0.816032
| 128
|
The JHUHUGIT implant became a relatively popular first stage for the B- I- and was used again with a Java zero-day (CVE-2015-2590) in July 2015 .
|
The JHUHUGIT implant became a relatively popular first stage for the B- I- and was used again with a Java zero-day (CVE-2015-2590) in July 2015.
| 331
|
Malware
|
JHUHUGIT
|
JHUHUGIT
| 0.829248
| 129
|
While the JHUHUGIT (and more recently, " JKEYSKW ") implant used in most of the B- I-, high profile victims are being targeted with another first level implant, representing the latest evolution of their AZZY Trojan .
|
While the JHUHUGIT (and more recently, " JKEYSKW ") implant used in most of the B- I-, high profile victims are being targeted with another first level implant, representing the latest evolution of their AZZY Trojan.
| 332
|
Malware
|
JKEYSKW
|
JKEYSKW
| 0.914762
| 129
|
While the JHUHUGIT (and more recently, " JKEYSKW ") implant used in most of the B- I-, high profile victims are being targeted with another first level implant, representing the latest evolution of their AZZY Trojan .
|
While the JHUHUGIT (and more recently, " JKEYSKW ") implant used in most of the B- I-, high profile victims are being targeted with another first level implant, representing the latest evolution of their AZZY Trojan.
| 333
|
Malware
|
AZZY
|
AZZY
| 0.931227
| 129
|
While the JHUHUGIT (and more recently, " JKEYSKW ") implant used in most of the B- I-, high profile victims are being targeted with another first level implant, representing the latest evolution of their AZZY Trojan .
|
While the JHUHUGIT (and more recently, " JKEYSKW ") implant used in most of the B- I-, high profile victims are being targeted with another first level implant, representing the latest evolution of their AZZY Trojan.
| 334
|
Malware
|
B-Hack
|
B-Hack
| 0.855004
| 130
|
Once a foothold is established, B-Hack trys to upload more backdoors, USB stealers as well as other hacking tools such as " Mimikatz " for lateral movement .
|
Once a foothold is established, B-Hack trys to upload more backdoors, USB stealers as well as other hacking tools such as " Mimikatz " for lateral movement.
| 335
|
System
|
USB
|
USB
| 0.842204
| 130
|
Once a foothold is established, B-Hack trys to upload more backdoors, USB stealers as well as other hacking tools such as " Mimikatz " for lateral movement .
|
Once a foothold is established, B-Hack trys to upload more backdoors, USB stealers as well as other hacking tools such as " Mimikatz " for lateral movement.
| 336
|
System
|
USB
|
USB
| 0.758723
| 131
|
Once a foothold is established, they try to upload more backdoors, USB stealers as well as other hacking tools such as " Mimikatz " for lateral movement .
|
Once a foothold is established, they try to upload more backdoors, USB stealers as well as other hacking tools such as " Mimikatz " for lateral movement.
| 337
|
Malware
|
Zebrocy
|
Zebrocy
| 0.833189
| 132
|
The B-Hack I-Hack I-Hack continues to target B- I- in the EU, US, and former Soviet states to deliver the Zebrocy tool as a payload .
|
The B-Hack I-Hack I-Hack continues to target B- I- in the EU, US, and former Soviet states to deliver the Zebrocy tool as a payload.
| 338
|
Malware
|
Cannon
|
Cannon.
| 0.80971
| 133
|
Of note, we also discovered the B-Hack I-Hack using a very similar delivery document to deliver a new Trojan called Cannon .
|
Of note, we also discovered the B-Hack I-Hack using a very similar delivery document to deliver a new Trojan called Cannon.
| 339
|
Malware
|
Komplex
|
Komplex
| 0.889899
| 134
|
Komplex shares a significant amount of functionality and traits with another tool used by B-Hack – the Carberp variant that B-Hack had used in previous B- I- on systems running Windows .
|
Komplex shares a significant amount of functionality and traits with another tool used by B-Hack – the Carberp variant that B-Hack had used in previous B- I- on systems running Windows.
| 340
|
Malware
|
Carberp
|
Carberp
| 0.796879
| 134
|
Komplex shares a significant amount of functionality and traits with another tool used by B-Hack – the Carberp variant that B-Hack had used in previous B- I- on systems running Windows .
|
Komplex shares a significant amount of functionality and traits with another tool used by B-Hack – the Carberp variant that B-Hack had used in previous B- I- on systems running Windows.
| 342
|
Organization
|
B-Hack
|
B-Hack
| 0.919362
| 134
|
Komplex shares a significant amount of functionality and traits with another tool used by B-Hack – the Carberp variant that B-Hack had used in previous B- I- on systems running Windows .
|
Komplex shares a significant amount of functionality and traits with another tool used by B-Hack – the Carberp variant that B-Hack had used in previous B- I- on systems running Windows.
| 343
|
System
|
Windows
|
Windows.
| 0.997936
| 134
|
Komplex shares a significant amount of functionality and traits with another tool used by B-Hack – the Carberp variant that B-Hack had used in previous B- I- on systems running Windows .
|
Komplex shares a significant amount of functionality and traits with another tool used by B-Hack – the Carberp variant that B-Hack had used in previous B- I- on systems running Windows.
| 344
|
System
|
OS X
|
OS X
| 0.96334
| 135
|
The B-Hack I-Hack created the Komplex Trojan to use in B- I- targeting the OS X operating system – a move that showcases their continued evolution toward multi-platform B- .
|
The B-Hack I-Hack created the Komplex Trojan to use in B- I- targeting the OS X operating system – a move that showcases their continued evolution toward multi-platform B-.
| 345
|
Malware
|
B-Hack
|
B-Hack's
| 0.8942
| 136
|
The Komplex Trojan revealed a design similar to B-Hack's Carberp variant Trojan, which we believe may have been done in order to handle compromised Windows and OS X systems using the same C2 server application with relative ease .
|
The Komplex Trojan revealed a design similar to B-Hack's Carberp variant Trojan, which we believe may have been done in order to handle compromised Windows and OS X systems using the same C2 server application with relative ease.
| 346
|
Malware
|
Carberp
|
Carberp
| 0.875628
| 136
|
The Komplex Trojan revealed a design similar to B-Hack's Carberp variant Trojan, which we believe may have been done in order to handle compromised Windows and OS X systems using the same C2 server application with relative ease .
|
The Komplex Trojan revealed a design similar to B-Hack's Carberp variant Trojan, which we believe may have been done in order to handle compromised Windows and OS X systems using the same C2 server application with relative ease.
| 347
|
System
|
Windows
|
Windows
| 0.997658
| 136
|
The Komplex Trojan revealed a design similar to B-Hack's Carberp variant Trojan, which we believe may have been done in order to handle compromised Windows and OS X systems using the same C2 server application with relative ease .
|
The Komplex Trojan revealed a design similar to B-Hack's Carberp variant Trojan, which we believe may have been done in order to handle compromised Windows and OS X systems using the same C2 server application with relative ease.
| 348
|
System
|
OS X
|
OS X
| 0.993219
| 136
|
The Komplex Trojan revealed a design similar to B-Hack's Carberp variant Trojan, which we believe may have been done in order to handle compromised Windows and OS X systems using the same C2 server application with relative ease .
|
The Komplex Trojan revealed a design similar to B-Hack's Carberp variant Trojan, which we believe may have been done in order to handle compromised Windows and OS X systems using the same C2 server application with relative ease.
| 349
|
Malware
|
MiniDuke
|
MiniDuke,
| 0.873966
| 137
|
This whitepaper explores the tools - such as MiniDuke, CosmicDuke, OnionDuke, CozyDuke, etc- of the B-Hack, a well-resourced, highly dedicated and organized B-Hack I-Hack that we believe has been working for the Russian Federation since at least 2008 to collect intelligence in support of foreign and security policy decision-making .
|
This whitepaper explores the tools - such as MiniDuke, CosmicDuke, OnionDuke, CozyDuke, etc- of the B-Hack, a well-resourced, highly dedicated and organized B-Hack I-Hack that we believe has been working for the Russian Federation since at least 2008 to collect intelligence in support of foreign and security policy decision-making.
| 350
|
Malware
|
CosmicDuke
|
CosmicDuke,
| 0.940369
| 137
|
This whitepaper explores the tools - such as MiniDuke, CosmicDuke, OnionDuke, CozyDuke, etc- of the B-Hack, a well-resourced, highly dedicated and organized B-Hack I-Hack that we believe has been working for the Russian Federation since at least 2008 to collect intelligence in support of foreign and security policy decision-making .
|
This whitepaper explores the tools - such as MiniDuke, CosmicDuke, OnionDuke, CozyDuke, etc- of the B-Hack, a well-resourced, highly dedicated and organized B-Hack I-Hack that we believe has been working for the Russian Federation since at least 2008 to collect intelligence in support of foreign and security policy decision-making.
| 351
|
Malware
|
OnionDuke
|
OnionDuke,
| 0.944418
| 137
|
This whitepaper explores the tools - such as MiniDuke, CosmicDuke, OnionDuke, CozyDuke, etc- of the B-Hack, a well-resourced, highly dedicated and organized B-Hack I-Hack that we believe has been working for the Russian Federation since at least 2008 to collect intelligence in support of foreign and security policy decision-making .
|
This whitepaper explores the tools - such as MiniDuke, CosmicDuke, OnionDuke, CozyDuke, etc- of the B-Hack, a well-resourced, highly dedicated and organized B-Hack I-Hack that we believe has been working for the Russian Federation since at least 2008 to collect intelligence in support of foreign and security policy decision-making.
| 352
|
Malware
|
CozyDuke
|
CozyDuke,
| 0.934483
| 137
|
This whitepaper explores the tools - such as MiniDuke, CosmicDuke, OnionDuke, CozyDuke, etc- of the B-Hack, a well-resourced, highly dedicated and organized B-Hack I-Hack that we believe has been working for the Russian Federation since at least 2008 to collect intelligence in support of foreign and security policy decision-making .
|
This whitepaper explores the tools - such as MiniDuke, CosmicDuke, OnionDuke, CozyDuke, etc- of the B-Hack, a well-resourced, highly dedicated and organized B-Hack I-Hack that we believe has been working for the Russian Federation since at least 2008 to collect intelligence in support of foreign and security policy decision-making.
| 353
|
Malware
|
B-Hack
|
B-Hack,
| 0.764212
| 137
|
This whitepaper explores the tools - such as MiniDuke, CosmicDuke, OnionDuke, CozyDuke, etc- of the B-Hack, a well-resourced, highly dedicated and organized B-Hack I-Hack that we believe has been working for the Russian Federation since at least 2008 to collect intelligence in support of foreign and security policy decision-making .
|
This whitepaper explores the tools - such as MiniDuke, CosmicDuke, OnionDuke, CozyDuke, etc- of the B-Hack, a well-resourced, highly dedicated and organized B-Hack I-Hack that we believe has been working for the Russian Federation since at least 2008 to collect intelligence in support of foreign and security policy decision-making.
| 354
|
Malware
|
B
|
B-Hack
| 0.655604
| 137
|
This whitepaper explores the tools - such as MiniDuke, CosmicDuke, OnionDuke, CozyDuke, etc- of the B-Hack, a well-resourced, highly dedicated and organized B-Hack I-Hack that we believe has been working for the Russian Federation since at least 2008 to collect intelligence in support of foreign and security policy decision-making .
|
This whitepaper explores the tools - such as MiniDuke, CosmicDuke, OnionDuke, CozyDuke, etc- of the B-Hack, a well-resourced, highly dedicated and organized B-Hack I-Hack that we believe has been working for the Russian Federation since at least 2008 to collect intelligence in support of foreign and security policy decision-making.
| 355
|
Malware
|
B
|
B-Hack
| 0.626127
| 138
|
The B-Hack are a well-resourced, highly dedicated and organized B-Hack I-Hack that we believe has been working for the Russian Federation since at least 2008 to collect intelligence in support of foreign and security policy decision-making .
|
The B-Hack are a well-resourced, highly dedicated and organized B-Hack I-Hack that we believe has been working for the Russian Federation since at least 2008 to collect intelligence in support of foreign and security policy decision-making.
| 357
|
Malware
|
B
|
B-Hack
| 0.739708
| 139
|
The B-Hack are known to employ a vast arsenal of malware toolsets, which we identify as MiniDuke, CosmicDuke, OnionDuke, CozyDuke, CloudDuke, SeaDuke, HammerDuke, PinchDuke, and GeminiDuke .
|
The B-Hack are known to employ a vast arsenal of malware toolsets, which we identify as MiniDuke, CosmicDuke, OnionDuke, CozyDuke, CloudDuke, SeaDuke, HammerDuke, PinchDuke, and GeminiDuke.
| 358
|
Malware
|
MiniDuke
|
MiniDuke,
| 0.94423
| 139
|
The B-Hack are known to employ a vast arsenal of malware toolsets, which we identify as MiniDuke, CosmicDuke, OnionDuke, CozyDuke, CloudDuke, SeaDuke, HammerDuke, PinchDuke, and GeminiDuke .
|
The B-Hack are known to employ a vast arsenal of malware toolsets, which we identify as MiniDuke, CosmicDuke, OnionDuke, CozyDuke, CloudDuke, SeaDuke, HammerDuke, PinchDuke, and GeminiDuke.
| 360
|
Malware
|
CosmicDuke
|
CosmicDuke,
| 0.968546
| 139
|
The B-Hack are known to employ a vast arsenal of malware toolsets, which we identify as MiniDuke, CosmicDuke, OnionDuke, CozyDuke, CloudDuke, SeaDuke, HammerDuke, PinchDuke, and GeminiDuke .
|
The B-Hack are known to employ a vast arsenal of malware toolsets, which we identify as MiniDuke, CosmicDuke, OnionDuke, CozyDuke, CloudDuke, SeaDuke, HammerDuke, PinchDuke, and GeminiDuke.
| 361
|
Malware
|
OnionDuke
|
OnionDuke,
| 0.970647
| 139
|
The B-Hack are known to employ a vast arsenal of malware toolsets, which we identify as MiniDuke, CosmicDuke, OnionDuke, CozyDuke, CloudDuke, SeaDuke, HammerDuke, PinchDuke, and GeminiDuke .
|
The B-Hack are known to employ a vast arsenal of malware toolsets, which we identify as MiniDuke, CosmicDuke, OnionDuke, CozyDuke, CloudDuke, SeaDuke, HammerDuke, PinchDuke, and GeminiDuke.
| 362
|
Malware
|
CozyDuke
|
CozyDuke,
| 0.957653
| 139
|
The B-Hack are known to employ a vast arsenal of malware toolsets, which we identify as MiniDuke, CosmicDuke, OnionDuke, CozyDuke, CloudDuke, SeaDuke, HammerDuke, PinchDuke, and GeminiDuke .
|
The B-Hack are known to employ a vast arsenal of malware toolsets, which we identify as MiniDuke, CosmicDuke, OnionDuke, CozyDuke, CloudDuke, SeaDuke, HammerDuke, PinchDuke, and GeminiDuke.
| 363
|
Malware
|
CloudDuke
|
CloudDuke,
| 0.957579
| 139
|
The B-Hack are known to employ a vast arsenal of malware toolsets, which we identify as MiniDuke, CosmicDuke, OnionDuke, CozyDuke, CloudDuke, SeaDuke, HammerDuke, PinchDuke, and GeminiDuke .
|
The B-Hack are known to employ a vast arsenal of malware toolsets, which we identify as MiniDuke, CosmicDuke, OnionDuke, CozyDuke, CloudDuke, SeaDuke, HammerDuke, PinchDuke, and GeminiDuke.
| 364
|
Malware
|
SeaDuke
|
SeaDuke,
| 0.95899
| 139
|
The B-Hack are known to employ a vast arsenal of malware toolsets, which we identify as MiniDuke, CosmicDuke, OnionDuke, CozyDuke, CloudDuke, SeaDuke, HammerDuke, PinchDuke, and GeminiDuke .
|
The B-Hack are known to employ a vast arsenal of malware toolsets, which we identify as MiniDuke, CosmicDuke, OnionDuke, CozyDuke, CloudDuke, SeaDuke, HammerDuke, PinchDuke, and GeminiDuke.
| 365
|
Malware
|
HammerDuke
|
HammerDuke,
| 0.966132
| 139
|
The B-Hack are known to employ a vast arsenal of malware toolsets, which we identify as MiniDuke, CosmicDuke, OnionDuke, CozyDuke, CloudDuke, SeaDuke, HammerDuke, PinchDuke, and GeminiDuke .
|
The B-Hack are known to employ a vast arsenal of malware toolsets, which we identify as MiniDuke, CosmicDuke, OnionDuke, CozyDuke, CloudDuke, SeaDuke, HammerDuke, PinchDuke, and GeminiDuke.
| 366
|
Malware
|
PinchDuke
|
PinchDuke,
| 0.972437
| 139
|
The B-Hack are known to employ a vast arsenal of malware toolsets, which we identify as MiniDuke, CosmicDuke, OnionDuke, CozyDuke, CloudDuke, SeaDuke, HammerDuke, PinchDuke, and GeminiDuke .
|
The B-Hack are known to employ a vast arsenal of malware toolsets, which we identify as MiniDuke, CosmicDuke, OnionDuke, CozyDuke, CloudDuke, SeaDuke, HammerDuke, PinchDuke, and GeminiDuke.
| 367
|
Malware
|
GeminiDuke
|
GeminiDuke.
| 0.968235
| 139
|
The B-Hack are known to employ a vast arsenal of malware toolsets, which we identify as MiniDuke, CosmicDuke, OnionDuke, CozyDuke, CloudDuke, SeaDuke, HammerDuke, PinchDuke, and GeminiDuke .
|
The B-Hack are known to employ a vast arsenal of malware toolsets, which we identify as MiniDuke, CosmicDuke, OnionDuke, CozyDuke, CloudDuke, SeaDuke, HammerDuke, PinchDuke, and GeminiDuke.
| 368
|
Malware
|
Duke
|
Duke
| 0.983384
| 140
|
The origins of the Duke toolset names can be traced back to when researchers at Kaspersky Labs coined the term " MiniDuke " to identify the first Duke-related malware they found .
|
The origins of the Duke toolset names can be traced back to when researchers at Kaspersky Labs coined the term " MiniDuke " to identify the first Duke-related malware they found.
| 369
|
Organization
|
Kaspersky Lab
|
Kaspersky Labs
| 0.98401
| 140
|
The origins of the Duke toolset names can be traced back to when researchers at Kaspersky Labs coined the term " MiniDuke " to identify the first Duke-related malware they found .
|
The origins of the Duke toolset names can be traced back to when researchers at Kaspersky Labs coined the term " MiniDuke " to identify the first Duke-related malware they found.
| 370
|
Malware
|
MiniDuke
|
MiniDuke
| 0.921052
| 140
|
The origins of the Duke toolset names can be traced back to when researchers at Kaspersky Labs coined the term " MiniDuke " to identify the first Duke-related malware they found .
|
The origins of the Duke toolset names can be traced back to when researchers at Kaspersky Labs coined the term " MiniDuke " to identify the first Duke-related malware they found.
| 371
|
Malware
|
Duke
|
Duke-related
| 0.978453
| 140
|
The origins of the Duke toolset names can be traced back to when researchers at Kaspersky Labs coined the term " MiniDuke " to identify the first Duke-related malware they found .
|
The origins of the Duke toolset names can be traced back to when researchers at Kaspersky Labs coined the term " MiniDuke " to identify the first Duke-related malware they found.
| 372
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.