Dataset Viewer
Auto-converted to Parquet Duplicate
Type
stringclasses
20 values
Text
stringlengths
1
236
Score
float64
0.18
0.97
Original Sentence ID
int64
0
663
Original Sentence
stringlengths
823
2.47k
__index_level_0__
int64
1
17.4k
MAL
RATs
0.916168
0
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China . Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past . The B-Hack has targeted B- I- I- in the past . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer . We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command .
1
MAL
Poison Ivy,
0.793064
0
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China . Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past . The B-Hack has targeted B- I- I- in the past . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer . We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command .
2
MAL
non-public backdoors
0.865846
0
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China . Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past . The B-Hack has targeted B- I- I- in the past . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer . We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command .
3
LOC
Hong Kong
0.882876
0
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China . Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past . The B-Hack has targeted B- I- I- in the past . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer . We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command .
5
LOC
China
0.90018
0
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China . Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past . The B-Hack has targeted B- I- I- in the past . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer . We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command .
7
LOC
China-based
0.896986
0
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China . Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past . The B-Hack has targeted B- I- I- in the past . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer . We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command .
8
APT
B-Hack I-Hack I-Hack
0.667352
0
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China . Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past . The B-Hack has targeted B- I- I- in the past . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer . We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command .
9
TIME
August 2015,
0.895174
0
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China . Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past . The B-Hack has targeted B- I- I- in the past . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer . We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command .
11
APT
B-Hack I-Hack
0.919357
0
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China . Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past . The B-Hack has targeted B- I- I- in the past . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer . We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command .
16
TOOL
emails
0.929184
0
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China . Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past . The B-Hack has targeted B- I- I- in the past . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer . We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command .
18
APT
B-Hack
0.920107
0
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China . Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past . The B-Hack has targeted B- I- I- in the past . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer . We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command .
20
ACT
spear phishing
0.931238
0
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China . Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past . The B-Hack has targeted B- I- I- in the past . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer . We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command .
24
LOC
Western
0.848532
0
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China . Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past . The B-Hack has targeted B- I- I- in the past . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer . We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command .
26
MAL
LOWBALL malware
0.835351
0
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China . Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past . The B-Hack has targeted B- I- I- in the past . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer . We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command .
27
FILE
upload.bat
0.924361
0
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China . Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past . The B-Hack has targeted B- I- I- in the past . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer . We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command .
30
MAL
BUBBLEWRAP
0.898728
0
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China . Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past . The B-Hack has targeted B- I- I- in the past . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer . We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command .
32
MAL
Backdoor.APT.FakeWinHTTPHelper)
0.894809
0
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China . Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past . The B-Hack has targeted B- I- I- in the past . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer . We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command .
33
TOOL
Dropbox
0.917587
0
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China . Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past . The B-Hack has targeted B- I- I- in the past . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer . We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command .
34
APT
B-Hack I-Hack
0.594081
1
We have previously observed the B-Hack I-Hack use BUBBLEWRAP . The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets . The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations . In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- .
35
MAL
BUBBLEWRAP
0.904569
1
We have previously observed the B-Hack I-Hack use BUBBLEWRAP . The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets . The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations . In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- .
36
MAL
LOWBALL
0.908619
1
We have previously observed the B-Hack I-Hack use BUBBLEWRAP . The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets . The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations . In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- .
37
LOC
China
0.928306
1
We have previously observed the B-Hack I-Hack use BUBBLEWRAP . The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets . The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations . In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- .
41
LOC
Hong Kong
0.892855
1
We have previously observed the B-Hack I-Hack use BUBBLEWRAP . The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets . The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations . In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- .
47
MAL
remote access Trojans
0.856725
1
We have previously observed the B-Hack I-Hack use BUBBLEWRAP . The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets . The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations . In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- .
54
MAL
Poison Ivy
0.868136
1
We have previously observed the B-Hack I-Hack use BUBBLEWRAP . The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets . The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations . In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- .
55
APT
B-Hack,
0.915825
1
We have previously observed the B-Hack I-Hack use BUBBLEWRAP . The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets . The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations . In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- .
56
TIME
2008,
0.876563
1
We have previously observed the B-Hack I-Hack use BUBBLEWRAP . The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets . The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations . In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- .
57
TIME
August 2013,
0.801381
1
We have previously observed the B-Hack I-Hack use BUBBLEWRAP . The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets . The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations . In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- .
59
SECTEAM
FireEye
0.93383
1
We have previously observed the B-Hack I-Hack use BUBBLEWRAP . The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets . The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations . In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- .
60
MAL
Poison Ivy RAT
0.837977
1
We have previously observed the B-Hack I-Hack use BUBBLEWRAP . The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets . The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations . In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- .
62
TIME
March 2014,
0.915978
1
We have previously observed the B-Hack I-Hack use BUBBLEWRAP . The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets . The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations . In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- .
63
APT
B-Hack
0.918766
1
We have previously observed the B-Hack I-Hack use BUBBLEWRAP . The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets . The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations . In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- .
64
LOC
Asia-Pacific
0.918388
1
We have previously observed the B-Hack I-Hack use BUBBLEWRAP . The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets . The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations . In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- .
65
LOC
US-based
0.600505
1
We have previously observed the B-Hack I-Hack use BUBBLEWRAP . The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets . The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations . In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- .
66
TIME
March 2014,
0.924031
2
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
67
LOC
Asia-Pacific
0.909832
2
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
69
LOC
US-based
0.858964
2
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
70
SECTEAM
FireEye,
0.927181
2
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
71
VULNAME
exploit
0.9238
2
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
74
VULNAME
vulnerabilities
0.916563
2
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
76
MAL
LOWBALL
0.85389
2
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
77
TOOL
emails
0.920506
2
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
80
IDTY
Microsoft Office
0.782646
2
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
82
APT
B-Hack's
0.885879
2
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
85
TOOL
Dropbox
0.918949
2
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
86
MAL
BUBBLEWRAP
0.909308
2
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
87
LOC
China-based
0.917493
2
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
88
APT
B-Hack I-Hack
0.891355
2
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
89
APT
B-Hack
0.92341
2
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
91
LOC
Hong Kong
0.902223
2
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
92
LOC
Chinese-based
0.632044
2
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
94
ACT
spear phishing
0.926458
2
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
95
TOOL
emails,
0.927084
2
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
96
LOC
Asia-Pacific,
0.9114
2
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
98
MAL
Poison Ivy RAT
0.80449
2
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
104
MAL
WinHTTPHelper malware
0.903471
2
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
105
SECTEAM
FireEye
0.929927
2
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
106
MAL
Poison Ivy:
0.791696
2
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
108
APT
B-
0.607578
3
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai . These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . B-Hack were a highly prolific B-Hack I-Hack operating out of China . B-Hack is a China-based B-Hack I-Hack, active since mid-2006 .
109
LOC
US-based
0.875324
3
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai . These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . B-Hack were a highly prolific B-Hack I-Hack operating out of China . B-Hack is a China-based B-Hack I-Hack, active since mid-2006 .
111
TIME
14th March
0.857223
3
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai . These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . B-Hack were a highly prolific B-Hack I-Hack operating out of China . B-Hack is a China-based B-Hack I-Hack, active since mid-2006 .
112
LOC
China's
0.873347
3
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai . These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . B-Hack were a highly prolific B-Hack I-Hack operating out of China . B-Hack is a China-based B-Hack I-Hack, active since mid-2006 .
114
SECTEAM
FireEye
0.920285
3
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai . These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . B-Hack were a highly prolific B-Hack I-Hack operating out of China . B-Hack is a China-based B-Hack I-Hack, active since mid-2006 .
115
APT
B-Hack's B-
0.818463
3
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai . These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . B-Hack were a highly prolific B-Hack I-Hack operating out of China . B-Hack is a China-based B-Hack I-Hack, active since mid-2006 .
116
TIME
2013
0.925641
3
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai . These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . B-Hack were a highly prolific B-Hack I-Hack operating out of China . B-Hack is a China-based B-Hack I-Hack, active since mid-2006 .
117
LOC
China,
0.910671
3
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai . These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . B-Hack were a highly prolific B-Hack I-Hack operating out of China . B-Hack is a China-based B-Hack I-Hack, active since mid-2006 .
120
LOC
Shanghai
0.917137
3
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai . These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . B-Hack were a highly prolific B-Hack I-Hack operating out of China . B-Hack is a China-based B-Hack I-Hack, active since mid-2006 .
121
LOC
Chinese
0.663982
3
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai . These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . B-Hack were a highly prolific B-Hack I-Hack operating out of China . B-Hack is a China-based B-Hack I-Hack, active since mid-2006 .
124
APT
B-Hack
0.916998
3
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai . These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . B-Hack were a highly prolific B-Hack I-Hack operating out of China . B-Hack is a China-based B-Hack I-Hack, active since mid-2006 .
126
MAL
BISCUIT
0.913322
3
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai . These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . B-Hack were a highly prolific B-Hack I-Hack operating out of China . B-Hack is a China-based B-Hack I-Hack, active since mid-2006 .
127
TIME
2007
0.913254
3
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai . These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . B-Hack were a highly prolific B-Hack I-Hack operating out of China . B-Hack is a China-based B-Hack I-Hack, active since mid-2006 .
128
MAL
publicly available backdoors
0.776662
3
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai . These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . B-Hack were a highly prolific B-Hack I-Hack operating out of China . B-Hack is a China-based B-Hack I-Hack, active since mid-2006 .
130
MAL
Poison Ivy
0.864085
3
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai . These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . B-Hack were a highly prolific B-Hack I-Hack operating out of China . B-Hack is a China-based B-Hack I-Hack, active since mid-2006 .
131
MAL
Gh0st RAT
0.86629
3
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai . These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . B-Hack were a highly prolific B-Hack I-Hack operating out of China . B-Hack is a China-based B-Hack I-Hack, active since mid-2006 .
132
LOC
China
0.922848
3
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai . These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . B-Hack were a highly prolific B-Hack I-Hack operating out of China . B-Hack is a China-based B-Hack I-Hack, active since mid-2006 .
136
LOC
China-based
0.819334
3
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai . These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . B-Hack were a highly prolific B-Hack I-Hack operating out of China . B-Hack is a China-based B-Hack I-Hack, active since mid-2006 .
138
TIME
mid-2006
0.919992
3
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai . These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . B-Hack were a highly prolific B-Hack I-Hack operating out of China . B-Hack is a China-based B-Hack I-Hack, active since mid-2006 .
139
APT
B-Hack's
0.912064
4
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack . From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families .
140
IDTY
People's Republic of China (PRC)
0.774124
4
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack . From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families .
141
SECTEAM
Arbor
0.932183
4
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack . From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families .
142
MAL
HIGHTIDE
0.911907
4
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack . From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families .
145
MAL
HIGHTIDE backdoor
0.867069
4
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack . From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families .
147
TIME
October 2012
0.924463
4
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack . From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families .
149
TIME
May 2014,
0.930449
4
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack . From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families .
150
SECTEAM
FireEye
0.925909
4
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack . From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families .
151
MAL
RIPTIDE,
0.898205
4
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack . From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families .
153
PROT
HTTP
0.45017
4
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack . From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families .
154
IDTY
Microsoft
0.80128
4
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack . From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families .
157
TOOL
Word
0.638341
4
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack . From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families .
158
VULID
CVE-2012-0158
0.928563
4
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack . From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families .
159
MAL
RIPTIDE
0.91327
4
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack . From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families .
161
APT
They
0.903133
4
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack . From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families .
164
MAL
RATs
0.922553
4
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack . From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families .
165
MAL
Poison Ivy,
0.892746
4
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack . From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families .
166
MAL
non-public backdoors
0.883322
4
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack . From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families .
167
LOC
China-based
0.922436
4
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack . From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families .
168
ACT
spear phishing
0.924581
4
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack . From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families .
172
TOOL
emails
0.913341
4
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack . From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families .
173
LOC
Western B-
0.889426
4
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack . From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families .
174
APT
B-Hack
0.922416
4
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack . From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families .
175
End of preview. Expand in Data Studio
README.md exists but content is empty.
Downloads last month
27