Type stringclasses 20 values | Text stringlengths 1 236 | Score float64 0.18 0.97 | Original Sentence ID int64 0 663 | Original Sentence stringlengths 823 2.47k | __index_level_0__ int64 1 17.4k |
|---|---|---|---|---|---|
MAL | RATs | 0.916168 | 0 | The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China . Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past . The B-Hack has targeted B- I- I- in the past . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer . We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command . | 1 |
MAL | Poison Ivy, | 0.793064 | 0 | The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China . Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past . The B-Hack has targeted B- I- I- in the past . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer . We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command . | 2 |
MAL | non-public backdoors | 0.865846 | 0 | The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China . Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past . The B-Hack has targeted B- I- I- in the past . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer . We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command . | 3 |
LOC | Hong Kong | 0.882876 | 0 | The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China . Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past . The B-Hack has targeted B- I- I- in the past . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer . We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command . | 5 |
LOC | China | 0.90018 | 0 | The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China . Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past . The B-Hack has targeted B- I- I- in the past . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer . We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command . | 7 |
LOC | China-based | 0.896986 | 0 | The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China . Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past . The B-Hack has targeted B- I- I- in the past . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer . We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command . | 8 |
APT | B-Hack I-Hack I-Hack | 0.667352 | 0 | The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China . Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past . The B-Hack has targeted B- I- I- in the past . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer . We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command . | 9 |
TIME | August 2015, | 0.895174 | 0 | The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China . Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past . The B-Hack has targeted B- I- I- in the past . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer . We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command . | 11 |
APT | B-Hack I-Hack | 0.919357 | 0 | The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China . Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past . The B-Hack has targeted B- I- I- in the past . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer . We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command . | 16 |
TOOL | emails | 0.929184 | 0 | The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China . Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past . The B-Hack has targeted B- I- I- in the past . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer . We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command . | 18 |
APT | B-Hack | 0.920107 | 0 | The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China . Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past . The B-Hack has targeted B- I- I- in the past . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer . We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command . | 20 |
ACT | spear phishing | 0.931238 | 0 | The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China . Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past . The B-Hack has targeted B- I- I- in the past . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer . We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command . | 24 |
LOC | Western | 0.848532 | 0 | The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China . Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past . The B-Hack has targeted B- I- I- in the past . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer . We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command . | 26 |
MAL | LOWBALL malware | 0.835351 | 0 | The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China . Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past . The B-Hack has targeted B- I- I- in the past . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer . We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command . | 27 |
FILE | upload.bat | 0.924361 | 0 | The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China . Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past . The B-Hack has targeted B- I- I- in the past . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer . We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command . | 30 |
MAL | BUBBLEWRAP | 0.898728 | 0 | The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China . Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past . The B-Hack has targeted B- I- I- in the past . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer . We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command . | 32 |
MAL | Backdoor.APT.FakeWinHTTPHelper) | 0.894809 | 0 | The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China . Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past . The B-Hack has targeted B- I- I- in the past . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer . We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command . | 33 |
TOOL | Dropbox | 0.917587 | 0 | The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China . Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past . The B-Hack has targeted B- I- I- in the past . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer . We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command . | 34 |
APT | B-Hack I-Hack | 0.594081 | 1 | We have previously observed the B-Hack I-Hack use BUBBLEWRAP . The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets . The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations . In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . | 35 |
MAL | BUBBLEWRAP | 0.904569 | 1 | We have previously observed the B-Hack I-Hack use BUBBLEWRAP . The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets . The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations . In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . | 36 |
MAL | LOWBALL | 0.908619 | 1 | We have previously observed the B-Hack I-Hack use BUBBLEWRAP . The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets . The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations . In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . | 37 |
LOC | China | 0.928306 | 1 | We have previously observed the B-Hack I-Hack use BUBBLEWRAP . The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets . The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations . In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . | 41 |
LOC | Hong Kong | 0.892855 | 1 | We have previously observed the B-Hack I-Hack use BUBBLEWRAP . The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets . The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations . In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . | 47 |
MAL | remote access Trojans | 0.856725 | 1 | We have previously observed the B-Hack I-Hack use BUBBLEWRAP . The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets . The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations . In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . | 54 |
MAL | Poison Ivy | 0.868136 | 1 | We have previously observed the B-Hack I-Hack use BUBBLEWRAP . The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets . The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations . In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . | 55 |
APT | B-Hack, | 0.915825 | 1 | We have previously observed the B-Hack I-Hack use BUBBLEWRAP . The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets . The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations . In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . | 56 |
TIME | 2008, | 0.876563 | 1 | We have previously observed the B-Hack I-Hack use BUBBLEWRAP . The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets . The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations . In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . | 57 |
TIME | August 2013, | 0.801381 | 1 | We have previously observed the B-Hack I-Hack use BUBBLEWRAP . The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets . The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations . In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . | 59 |
SECTEAM | FireEye | 0.93383 | 1 | We have previously observed the B-Hack I-Hack use BUBBLEWRAP . The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets . The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations . In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . | 60 |
MAL | Poison Ivy RAT | 0.837977 | 1 | We have previously observed the B-Hack I-Hack use BUBBLEWRAP . The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets . The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations . In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . | 62 |
TIME | March 2014, | 0.915978 | 1 | We have previously observed the B-Hack I-Hack use BUBBLEWRAP . The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets . The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations . In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . | 63 |
APT | B-Hack | 0.918766 | 1 | We have previously observed the B-Hack I-Hack use BUBBLEWRAP . The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets . The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations . In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . | 64 |
LOC | Asia-Pacific | 0.918388 | 1 | We have previously observed the B-Hack I-Hack use BUBBLEWRAP . The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets . The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations . In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . | 65 |
LOC | US-based | 0.600505 | 1 | We have previously observed the B-Hack I-Hack use BUBBLEWRAP . The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets . The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations . In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . | 66 |
TIME | March 2014, | 0.924031 | 2 | In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper . | 67 |
LOC | Asia-Pacific | 0.909832 | 2 | In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper . | 69 |
LOC | US-based | 0.858964 | 2 | In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper . | 70 |
SECTEAM | FireEye, | 0.927181 | 2 | In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper . | 71 |
VULNAME | exploit | 0.9238 | 2 | In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper . | 74 |
VULNAME | vulnerabilities | 0.916563 | 2 | In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper . | 76 |
MAL | LOWBALL | 0.85389 | 2 | In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper . | 77 |
TOOL | emails | 0.920506 | 2 | In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper . | 80 |
IDTY | Microsoft Office | 0.782646 | 2 | In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper . | 82 |
APT | B-Hack's | 0.885879 | 2 | In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper . | 85 |
TOOL | Dropbox | 0.918949 | 2 | In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper . | 86 |
MAL | BUBBLEWRAP | 0.909308 | 2 | In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper . | 87 |
LOC | China-based | 0.917493 | 2 | In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper . | 88 |
APT | B-Hack I-Hack | 0.891355 | 2 | In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper . | 89 |
APT | B-Hack | 0.92341 | 2 | In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper . | 91 |
LOC | Hong Kong | 0.902223 | 2 | In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper . | 92 |
LOC | Chinese-based | 0.632044 | 2 | In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper . | 94 |
ACT | spear phishing | 0.926458 | 2 | In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper . | 95 |
TOOL | emails, | 0.927084 | 2 | In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper . | 96 |
LOC | Asia-Pacific, | 0.9114 | 2 | In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper . | 98 |
MAL | Poison Ivy RAT | 0.80449 | 2 | In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper . | 104 |
MAL | WinHTTPHelper malware | 0.903471 | 2 | In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper . | 105 |
SECTEAM | FireEye | 0.929927 | 2 | In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper . | 106 |
MAL | Poison Ivy: | 0.791696 | 2 | In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper . | 108 |
APT | B- | 0.607578 | 3 | The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai . These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . B-Hack were a highly prolific B-Hack I-Hack operating out of China . B-Hack is a China-based B-Hack I-Hack, active since mid-2006 . | 109 |
LOC | US-based | 0.875324 | 3 | The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai . These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . B-Hack were a highly prolific B-Hack I-Hack operating out of China . B-Hack is a China-based B-Hack I-Hack, active since mid-2006 . | 111 |
TIME | 14th March | 0.857223 | 3 | The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai . These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . B-Hack were a highly prolific B-Hack I-Hack operating out of China . B-Hack is a China-based B-Hack I-Hack, active since mid-2006 . | 112 |
LOC | China's | 0.873347 | 3 | The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai . These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . B-Hack were a highly prolific B-Hack I-Hack operating out of China . B-Hack is a China-based B-Hack I-Hack, active since mid-2006 . | 114 |
SECTEAM | FireEye | 0.920285 | 3 | The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai . These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . B-Hack were a highly prolific B-Hack I-Hack operating out of China . B-Hack is a China-based B-Hack I-Hack, active since mid-2006 . | 115 |
APT | B-Hack's B- | 0.818463 | 3 | The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai . These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . B-Hack were a highly prolific B-Hack I-Hack operating out of China . B-Hack is a China-based B-Hack I-Hack, active since mid-2006 . | 116 |
TIME | 2013 | 0.925641 | 3 | The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai . These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . B-Hack were a highly prolific B-Hack I-Hack operating out of China . B-Hack is a China-based B-Hack I-Hack, active since mid-2006 . | 117 |
LOC | China, | 0.910671 | 3 | The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai . These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . B-Hack were a highly prolific B-Hack I-Hack operating out of China . B-Hack is a China-based B-Hack I-Hack, active since mid-2006 . | 120 |
LOC | Shanghai | 0.917137 | 3 | The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai . These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . B-Hack were a highly prolific B-Hack I-Hack operating out of China . B-Hack is a China-based B-Hack I-Hack, active since mid-2006 . | 121 |
LOC | Chinese | 0.663982 | 3 | The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai . These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . B-Hack were a highly prolific B-Hack I-Hack operating out of China . B-Hack is a China-based B-Hack I-Hack, active since mid-2006 . | 124 |
APT | B-Hack | 0.916998 | 3 | The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai . These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . B-Hack were a highly prolific B-Hack I-Hack operating out of China . B-Hack is a China-based B-Hack I-Hack, active since mid-2006 . | 126 |
MAL | BISCUIT | 0.913322 | 3 | The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai . These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . B-Hack were a highly prolific B-Hack I-Hack operating out of China . B-Hack is a China-based B-Hack I-Hack, active since mid-2006 . | 127 |
TIME | 2007 | 0.913254 | 3 | The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai . These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . B-Hack were a highly prolific B-Hack I-Hack operating out of China . B-Hack is a China-based B-Hack I-Hack, active since mid-2006 . | 128 |
MAL | publicly available backdoors | 0.776662 | 3 | The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai . These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . B-Hack were a highly prolific B-Hack I-Hack operating out of China . B-Hack is a China-based B-Hack I-Hack, active since mid-2006 . | 130 |
MAL | Poison Ivy | 0.864085 | 3 | The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai . These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . B-Hack were a highly prolific B-Hack I-Hack operating out of China . B-Hack is a China-based B-Hack I-Hack, active since mid-2006 . | 131 |
MAL | Gh0st RAT | 0.86629 | 3 | The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai . These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . B-Hack were a highly prolific B-Hack I-Hack operating out of China . B-Hack is a China-based B-Hack I-Hack, active since mid-2006 . | 132 |
LOC | China | 0.922848 | 3 | The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai . These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . B-Hack were a highly prolific B-Hack I-Hack operating out of China . B-Hack is a China-based B-Hack I-Hack, active since mid-2006 . | 136 |
LOC | China-based | 0.819334 | 3 | The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai . These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . B-Hack were a highly prolific B-Hack I-Hack operating out of China . B-Hack is a China-based B-Hack I-Hack, active since mid-2006 . | 138 |
TIME | mid-2006 | 0.919992 | 3 | The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai . These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . B-Hack were a highly prolific B-Hack I-Hack operating out of China . B-Hack is a China-based B-Hack I-Hack, active since mid-2006 . | 139 |
APT | B-Hack's | 0.912064 | 4 | B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack . From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families . | 140 |
IDTY | People's Republic of China (PRC) | 0.774124 | 4 | B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack . From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families . | 141 |
SECTEAM | Arbor | 0.932183 | 4 | B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack . From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families . | 142 |
MAL | HIGHTIDE | 0.911907 | 4 | B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack . From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families . | 145 |
MAL | HIGHTIDE backdoor | 0.867069 | 4 | B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack . From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families . | 147 |
TIME | October 2012 | 0.924463 | 4 | B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack . From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families . | 149 |
TIME | May 2014, | 0.930449 | 4 | B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack . From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families . | 150 |
SECTEAM | FireEye | 0.925909 | 4 | B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack . From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families . | 151 |
MAL | RIPTIDE, | 0.898205 | 4 | B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack . From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families . | 153 |
PROT | HTTP | 0.45017 | 4 | B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack . From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families . | 154 |
IDTY | Microsoft | 0.80128 | 4 | B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack . From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families . | 157 |
TOOL | Word | 0.638341 | 4 | B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack . From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families . | 158 |
VULID | CVE-2012-0158 | 0.928563 | 4 | B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack . From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families . | 159 |
MAL | RIPTIDE | 0.91327 | 4 | B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack . From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families . | 161 |
APT | They | 0.903133 | 4 | B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack . From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families . | 164 |
MAL | RATs | 0.922553 | 4 | B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack . From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families . | 165 |
MAL | Poison Ivy, | 0.892746 | 4 | B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack . From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families . | 166 |
MAL | non-public backdoors | 0.883322 | 4 | B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack . From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families . | 167 |
LOC | China-based | 0.922436 | 4 | B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack . From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families . | 168 |
ACT | spear phishing | 0.924581 | 4 | B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack . From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families . | 172 |
TOOL | emails | 0.913341 | 4 | B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack . From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families . | 173 |
LOC | Western B- | 0.889426 | 4 | B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack . From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families . | 174 |
APT | B-Hack | 0.922416 | 4 | B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack . From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families . | 175 |
End of preview. Expand
in Data Studio
README.md exists but content is empty.
- Downloads last month
- 6