Type
stringclasses 20
values | Text
stringlengths 1
236
| Score
float64 0.22
0.96
| Original Sentence ID
int64 0
6.64k
| Original Sentence
stringlengths 6
383
| __index_level_0__
int64 0
16.8k
|
|---|---|---|---|---|---|
ACT
|
B-Hack
| 0.840576
| 0
|
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors .
| 0
|
MAL
|
RATs
| 0.908671
| 0
|
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors .
| 1
|
MAL
|
Poison Ivy,
| 0.857213
| 0
|
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors .
| 2
|
MAL
|
non-public backdoors
| 0.895978
| 0
|
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors .
| 3
|
ACT
|
B-Hack
| 0.492564
| 1
|
The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China .
| 4
|
LOC
|
Hong Kong
| 0.908435
| 1
|
The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China .
| 6
|
LOC
|
China
| 0.874845
| 1
|
The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China .
| 7
|
LOC
|
China-based
| 0.91062
| 2
|
Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past .
| 8
|
ACT
|
B-Hack
| 0.839563
| 3
|
The B-Hack has targeted B- I- I- in the past .
| 9
|
TIME
|
August 2015,
| 0.922677
| 4
|
In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television .
| 10
|
APT
|
B-Hack
| 0.602912
| 4
|
In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television .
| 11
|
ACT
|
spear phishing
| 0.920835
| 4
|
In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television .
| 12
|
TOOL
|
emails
| 0.910212
| 4
|
In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television .
| 13
|
TIME
|
August 2015,
| 0.924401
| 5
|
In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television .
| 14
|
APT
|
B-Hack I-Hack
| 0.650264
| 5
|
In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television .
| 15
|
ACT
|
spear phishing
| 0.920845
| 5
|
In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television .
| 16
|
TOOL
|
emails
| 0.91857
| 5
|
In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television .
| 17
|
TIME
|
August 2015,
| 0.926459
| 6
|
In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- .
| 18
|
APT
|
B-Hack
| 0.577689
| 6
|
In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- .
| 19
|
ACT
|
spear phishing
| 0.920502
| 6
|
In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- .
| 20
|
TOOL
|
emails
| 0.909348
| 6
|
In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- .
| 21
|
ACT
|
B-Hack
| 0.514801
| 7
|
The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- .
| 22
|
ACT
|
spear phishing
| 0.917702
| 7
|
The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- .
| 23
|
TOOL
|
emails
| 0.913469
| 7
|
The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- .
| 24
|
LOC
|
Western B-
| 0.539095
| 7
|
The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- .
| 25
|
MAL
|
LOWBALL malware
| 0.909248
| 8
|
Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer .
| 26
|
TOOL
|
Dropbox
| 0.8765
| 8
|
Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer .
| 27
|
FILE
|
upload.bat
| 0.921574
| 8
|
Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer .
| 28
|
APT
|
B-Hack
| 0.586779
| 9
|
We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command .
| 29
|
MAL
|
BUBBLEWRAP
| 0.897504
| 9
|
We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command .
| 30
|
MAL
|
Backdoor.APT.FakeWinHTTPHelper)
| 0.926246
| 9
|
We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command .
| 31
|
TOOL
|
Dropbox
| 0.908121
| 9
|
We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command .
| 32
|
MAL
|
BUBBLEWRAP
| 0.915228
| 10
|
We have previously observed the B-Hack I-Hack use BUBBLEWRAP .
| 33
|
MAL
|
LOWBALL
| 0.909896
| 11
|
The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets .
| 34
|
APT
|
B-Hack
| 0.879412
| 11
|
The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets .
| 35
|
MAL
|
BUBBLEWRAP
| 0.911871
| 11
|
The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets .
| 36
|
ACT
|
B-Hack
| 0.86782
| 12
|
The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong .
| 37
|
LOC
|
China
| 0.91041
| 12
|
The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong .
| 39
|
LOC
|
Hong Kong
| 0.892197
| 12
|
The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong .
| 40
|
ACT
|
B-Hack
| 0.630397
| 13
|
An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong .
| 41
|
LOC
|
China
| 0.909487
| 13
|
An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong .
| 43
|
LOC
|
Hong Kong
| 0.89445
| 13
|
An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong .
| 44
|
ACT
|
B-Hack
| 0.79037
| 14
|
The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy .
| 45
|
LOC
|
Hong Kong
| 0.850038
| 14
|
The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy .
| 46
|
MAL
|
remote access Trojans
| 0.884607
| 14
|
The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy .
| 48
|
MAL
|
Poison Ivy
| 0.880922
| 14
|
The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy .
| 49
|
ACT
|
B-Hack
| 0.79037
| 15
|
The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy .
| 50
|
LOC
|
Hong Kong
| 0.850038
| 15
|
The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy .
| 51
|
MAL
|
remote access Trojans
| 0.884607
| 15
|
The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy .
| 53
|
MAL
|
Poison Ivy
| 0.880922
| 15
|
The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy .
| 54
|
ACT
|
B-Hack,
| 0.691863
| 16
|
The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- .
| 55
|
TIME
|
2008,
| 0.670438
| 16
|
The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- .
| 56
|
TIME
|
August 2013,
| 0.928345
| 18
|
In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations .
| 57
|
SECTEAM
|
FireEye
| 0.921984
| 18
|
In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations .
| 58
|
APT
|
B-Hack
| 0.917984
| 18
|
In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations .
| 59
|
MAL
|
Poison Ivy RAT
| 0.861063
| 18
|
In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations .
| 60
|
TIME
|
March 2014,
| 0.917722
| 19
|
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- .
| 61
|
ACT
|
B-Hack
| 0.714112
| 19
|
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- .
| 62
|
LOC
|
Asia-Pacific
| 0.910206
| 19
|
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- .
| 63
|
LOC
|
US-based
| 0.897967
| 19
|
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- .
| 64
|
TIME
|
March 2014,
| 0.917722
| 20
|
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- .
| 65
|
ACT
|
B-Hack
| 0.714112
| 20
|
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- .
| 66
|
LOC
|
Asia-Pacific
| 0.910206
| 20
|
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- .
| 67
|
LOC
|
US-based
| 0.897967
| 20
|
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- .
| 68
|
SECTEAM
|
FireEye,
| 0.924375
| 21
|
According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL .
| 69
|
APT
|
B-Hack
| 0.921267
| 21
|
According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL .
| 70
|
TOOL
|
emails
| 0.898365
| 21
|
According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL .
| 71
|
VULNAME
|
exploit
| 0.924827
| 21
|
According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL .
| 72
|
IDTY
|
Microsoft Office
| 0.908622
| 21
|
According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL .
| 73
|
VULNAME
|
vulnerabilities
| 0.925486
| 21
|
According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL .
| 74
|
MAL
|
LOWBALL
| 0.90779
| 21
|
According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL .
| 75
|
SECTEAM
|
FireEye,
| 0.924375
| 22
|
According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL .
| 76
|
APT
|
B-Hack
| 0.921267
| 22
|
According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL .
| 77
|
TOOL
|
emails
| 0.898365
| 22
|
According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL .
| 78
|
VULNAME
|
exploit
| 0.924827
| 22
|
According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL .
| 79
|
IDTY
|
Microsoft Office
| 0.908622
| 22
|
According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL .
| 80
|
VULNAME
|
vulnerabilities
| 0.925486
| 22
|
According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL .
| 81
|
MAL
|
LOWBALL
| 0.90779
| 22
|
According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL .
| 82
|
APT
|
B-Hack's
| 0.709281
| 23
|
The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP .
| 83
|
TOOL
|
Dropbox
| 0.898827
| 23
|
The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP .
| 84
|
MAL
|
BUBBLEWRAP
| 0.913397
| 23
|
The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP .
| 85
|
LOC
|
China-based
| 0.916265
| 24
|
Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement .
| 86
|
APT
|
B-Hack
| 0.537172
| 24
|
Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement .
| 87
|
LOC
|
Hong Kong
| 0.893878
| 24
|
Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement .
| 88
|
APT
|
B-Hack
| 0.917579
| 25
|
Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement .
| 89
|
LOC
|
Hong Kong
| 0.920369
| 25
|
Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement .
| 90
|
SECTEAM
|
FireEye
| 0.922921
| 26
|
This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose .
| 91
|
LOC
|
Chinese-based
| 0.874423
| 26
|
This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose .
| 92
|
ACT
|
spear phishing
| 0.913003
| 26
|
This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose .
| 93
|
TOOL
|
emails,
| 0.914939
| 26
|
This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose .
| 94
|
ACT
|
B-Hack
| 0.592985
| 26
|
This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose .
| 95
|
LOC
|
Asia-Pacific,
| 0.921936
| 26
|
This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose .
| 96
|
ACT
|
B-Hack
| 0.923203
| 27
|
The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- .
| 97
|
MAL
|
Poison Ivy RAT
| 0.874404
| 27
|
The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- .
| 98
|
MAL
|
WinHTTPHelper malware
| 0.91827
| 27
|
The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- .
| 99
|
ACT
|
B-Hack
| 0.923203
| 28
|
The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- .
| 100
|
MAL
|
Poison Ivy RAT
| 0.874404
| 28
|
The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- .
| 101
|
MAL
|
WinHTTPHelper malware
| 0.91827
| 28
|
The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- .
| 102
|
SECTEAM
|
FireEye
| 0.919897
| 29
|
FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
| 103
|
MAL
|
Poison Ivy:
| 0.883367
| 29
|
FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
| 104
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.