Dataset Viewer
Auto-converted to Parquet Duplicate
Type
stringclasses
20 values
Text
stringlengths
1
236
Score
float64
0.22
0.96
Original Sentence ID
int64
0
6.64k
Original Sentence
stringlengths
6
383
__index_level_0__
int64
0
16.8k
ACT
B-Hack
0.840576
0
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors .
0
MAL
RATs
0.908671
0
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors .
1
MAL
Poison Ivy,
0.857213
0
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors .
2
MAL
non-public backdoors
0.895978
0
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors .
3
ACT
B-Hack
0.492564
1
The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China .
4
LOC
Hong Kong
0.908435
1
The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China .
6
LOC
China
0.874845
1
The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China .
7
LOC
China-based
0.91062
2
Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past .
8
ACT
B-Hack
0.839563
3
The B-Hack has targeted B- I- I- in the past .
9
TIME
August 2015,
0.922677
4
In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television .
10
APT
B-Hack
0.602912
4
In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television .
11
ACT
spear phishing
0.920835
4
In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television .
12
TOOL
emails
0.910212
4
In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television .
13
TIME
August 2015,
0.924401
5
In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television .
14
APT
B-Hack I-Hack
0.650264
5
In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television .
15
ACT
spear phishing
0.920845
5
In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television .
16
TOOL
emails
0.91857
5
In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television .
17
TIME
August 2015,
0.926459
6
In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- .
18
APT
B-Hack
0.577689
6
In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- .
19
ACT
spear phishing
0.920502
6
In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- .
20
TOOL
emails
0.909348
6
In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- .
21
ACT
B-Hack
0.514801
7
The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- .
22
ACT
spear phishing
0.917702
7
The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- .
23
TOOL
emails
0.913469
7
The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- .
24
LOC
Western B-
0.539095
7
The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- .
25
MAL
LOWBALL malware
0.909248
8
Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer .
26
TOOL
Dropbox
0.8765
8
Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer .
27
FILE
upload.bat
0.921574
8
Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer .
28
APT
B-Hack
0.586779
9
We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command .
29
MAL
BUBBLEWRAP
0.897504
9
We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command .
30
MAL
Backdoor.APT.FakeWinHTTPHelper)
0.926246
9
We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command .
31
TOOL
Dropbox
0.908121
9
We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command .
32
MAL
BUBBLEWRAP
0.915228
10
We have previously observed the B-Hack I-Hack use BUBBLEWRAP .
33
MAL
LOWBALL
0.909896
11
The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets .
34
APT
B-Hack
0.879412
11
The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets .
35
MAL
BUBBLEWRAP
0.911871
11
The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets .
36
ACT
B-Hack
0.86782
12
The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong .
37
LOC
China
0.91041
12
The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong .
39
LOC
Hong Kong
0.892197
12
The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong .
40
ACT
B-Hack
0.630397
13
An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong .
41
LOC
China
0.909487
13
An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong .
43
LOC
Hong Kong
0.89445
13
An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong .
44
ACT
B-Hack
0.79037
14
The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy .
45
LOC
Hong Kong
0.850038
14
The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy .
46
MAL
remote access Trojans
0.884607
14
The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy .
48
MAL
Poison Ivy
0.880922
14
The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy .
49
ACT
B-Hack
0.79037
15
The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy .
50
LOC
Hong Kong
0.850038
15
The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy .
51
MAL
remote access Trojans
0.884607
15
The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy .
53
MAL
Poison Ivy
0.880922
15
The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy .
54
ACT
B-Hack,
0.691863
16
The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- .
55
TIME
2008,
0.670438
16
The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- .
56
TIME
August 2013,
0.928345
18
In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations .
57
SECTEAM
FireEye
0.921984
18
In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations .
58
APT
B-Hack
0.917984
18
In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations .
59
MAL
Poison Ivy RAT
0.861063
18
In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations .
60
TIME
March 2014,
0.917722
19
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- .
61
ACT
B-Hack
0.714112
19
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- .
62
LOC
Asia-Pacific
0.910206
19
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- .
63
LOC
US-based
0.897967
19
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- .
64
TIME
March 2014,
0.917722
20
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- .
65
ACT
B-Hack
0.714112
20
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- .
66
LOC
Asia-Pacific
0.910206
20
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- .
67
LOC
US-based
0.897967
20
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- .
68
SECTEAM
FireEye,
0.924375
21
According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL .
69
APT
B-Hack
0.921267
21
According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL .
70
TOOL
emails
0.898365
21
According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL .
71
VULNAME
exploit
0.924827
21
According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL .
72
IDTY
Microsoft Office
0.908622
21
According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL .
73
VULNAME
vulnerabilities
0.925486
21
According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL .
74
MAL
LOWBALL
0.90779
21
According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL .
75
SECTEAM
FireEye,
0.924375
22
According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL .
76
APT
B-Hack
0.921267
22
According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL .
77
TOOL
emails
0.898365
22
According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL .
78
VULNAME
exploit
0.924827
22
According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL .
79
IDTY
Microsoft Office
0.908622
22
According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL .
80
VULNAME
vulnerabilities
0.925486
22
According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL .
81
MAL
LOWBALL
0.90779
22
According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL .
82
APT
B-Hack's
0.709281
23
The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP .
83
TOOL
Dropbox
0.898827
23
The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP .
84
MAL
BUBBLEWRAP
0.913397
23
The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP .
85
LOC
China-based
0.916265
24
Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement .
86
APT
B-Hack
0.537172
24
Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement .
87
LOC
Hong Kong
0.893878
24
Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement .
88
APT
B-Hack
0.917579
25
Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement .
89
LOC
Hong Kong
0.920369
25
Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement .
90
SECTEAM
FireEye
0.922921
26
This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose .
91
LOC
Chinese-based
0.874423
26
This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose .
92
ACT
spear phishing
0.913003
26
This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose .
93
TOOL
emails,
0.914939
26
This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose .
94
ACT
B-Hack
0.592985
26
This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose .
95
LOC
Asia-Pacific,
0.921936
26
This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose .
96
ACT
B-Hack
0.923203
27
The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- .
97
MAL
Poison Ivy RAT
0.874404
27
The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- .
98
MAL
WinHTTPHelper malware
0.91827
27
The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- .
99
ACT
B-Hack
0.923203
28
The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- .
100
MAL
Poison Ivy RAT
0.874404
28
The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- .
101
MAL
WinHTTPHelper malware
0.91827
28
The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- .
102
SECTEAM
FireEye
0.919897
29
FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
103
MAL
Poison Ivy:
0.883367
29
FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
104
End of preview. Expand in Data Studio
README.md exists but content is empty.
Downloads last month
35