Type stringclasses 20 values | Text stringlengths 1 236 | Score float64 0.22 0.96 | Original Sentence ID int64 0 6.64k | Original Sentence stringlengths 6 383 | __index_level_0__ int64 0 16.8k |
|---|---|---|---|---|---|
ACT | B-Hack | 0.840576 | 0 | The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . | 0 |
MAL | RATs | 0.908671 | 0 | The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . | 1 |
MAL | Poison Ivy, | 0.857213 | 0 | The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . | 2 |
MAL | non-public backdoors | 0.895978 | 0 | The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . | 3 |
ACT | B-Hack | 0.492564 | 1 | The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China . | 4 |
LOC | Hong Kong | 0.908435 | 1 | The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China . | 6 |
LOC | China | 0.874845 | 1 | The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China . | 7 |
LOC | China-based | 0.91062 | 2 | Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past . | 8 |
ACT | B-Hack | 0.839563 | 3 | The B-Hack has targeted B- I- I- in the past . | 9 |
TIME | August 2015, | 0.922677 | 4 | In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . | 10 |
APT | B-Hack | 0.602912 | 4 | In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . | 11 |
ACT | spear phishing | 0.920835 | 4 | In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . | 12 |
TOOL | emails | 0.910212 | 4 | In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . | 13 |
TIME | August 2015, | 0.924401 | 5 | In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . | 14 |
APT | B-Hack I-Hack | 0.650264 | 5 | In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . | 15 |
ACT | spear phishing | 0.920845 | 5 | In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . | 16 |
TOOL | emails | 0.91857 | 5 | In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . | 17 |
TIME | August 2015, | 0.926459 | 6 | In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- . | 18 |
APT | B-Hack | 0.577689 | 6 | In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- . | 19 |
ACT | spear phishing | 0.920502 | 6 | In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- . | 20 |
TOOL | emails | 0.909348 | 6 | In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- . | 21 |
ACT | B-Hack | 0.514801 | 7 | The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . | 22 |
ACT | spear phishing | 0.917702 | 7 | The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . | 23 |
TOOL | emails | 0.913469 | 7 | The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . | 24 |
LOC | Western B- | 0.539095 | 7 | The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . | 25 |
MAL | LOWBALL malware | 0.909248 | 8 | Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer . | 26 |
TOOL | Dropbox | 0.8765 | 8 | Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer . | 27 |
FILE | upload.bat | 0.921574 | 8 | Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer . | 28 |
APT | B-Hack | 0.586779 | 9 | We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command . | 29 |
MAL | BUBBLEWRAP | 0.897504 | 9 | We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command . | 30 |
MAL | Backdoor.APT.FakeWinHTTPHelper) | 0.926246 | 9 | We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command . | 31 |
TOOL | Dropbox | 0.908121 | 9 | We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command . | 32 |
MAL | BUBBLEWRAP | 0.915228 | 10 | We have previously observed the B-Hack I-Hack use BUBBLEWRAP . | 33 |
MAL | LOWBALL | 0.909896 | 11 | The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets . | 34 |
APT | B-Hack | 0.879412 | 11 | The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets . | 35 |
MAL | BUBBLEWRAP | 0.911871 | 11 | The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets . | 36 |
ACT | B-Hack | 0.86782 | 12 | The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . | 37 |
LOC | China | 0.91041 | 12 | The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . | 39 |
LOC | Hong Kong | 0.892197 | 12 | The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . | 40 |
ACT | B-Hack | 0.630397 | 13 | An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . | 41 |
LOC | China | 0.909487 | 13 | An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . | 43 |
LOC | Hong Kong | 0.89445 | 13 | An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . | 44 |
ACT | B-Hack | 0.79037 | 14 | The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . | 45 |
LOC | Hong Kong | 0.850038 | 14 | The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . | 46 |
MAL | remote access Trojans | 0.884607 | 14 | The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . | 48 |
MAL | Poison Ivy | 0.880922 | 14 | The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . | 49 |
ACT | B-Hack | 0.79037 | 15 | The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . | 50 |
LOC | Hong Kong | 0.850038 | 15 | The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . | 51 |
MAL | remote access Trojans | 0.884607 | 15 | The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . | 53 |
MAL | Poison Ivy | 0.880922 | 15 | The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . | 54 |
ACT | B-Hack, | 0.691863 | 16 | The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . | 55 |
TIME | 2008, | 0.670438 | 16 | The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . | 56 |
TIME | August 2013, | 0.928345 | 18 | In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations . | 57 |
SECTEAM | FireEye | 0.921984 | 18 | In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations . | 58 |
APT | B-Hack | 0.917984 | 18 | In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations . | 59 |
MAL | Poison Ivy RAT | 0.861063 | 18 | In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations . | 60 |
TIME | March 2014, | 0.917722 | 19 | In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . | 61 |
ACT | B-Hack | 0.714112 | 19 | In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . | 62 |
LOC | Asia-Pacific | 0.910206 | 19 | In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . | 63 |
LOC | US-based | 0.897967 | 19 | In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . | 64 |
TIME | March 2014, | 0.917722 | 20 | In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . | 65 |
ACT | B-Hack | 0.714112 | 20 | In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . | 66 |
LOC | Asia-Pacific | 0.910206 | 20 | In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . | 67 |
LOC | US-based | 0.897967 | 20 | In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . | 68 |
SECTEAM | FireEye, | 0.924375 | 21 | According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . | 69 |
APT | B-Hack | 0.921267 | 21 | According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . | 70 |
TOOL | emails | 0.898365 | 21 | According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . | 71 |
VULNAME | exploit | 0.924827 | 21 | According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . | 72 |
IDTY | Microsoft Office | 0.908622 | 21 | According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . | 73 |
VULNAME | vulnerabilities | 0.925486 | 21 | According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . | 74 |
MAL | LOWBALL | 0.90779 | 21 | According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . | 75 |
SECTEAM | FireEye, | 0.924375 | 22 | According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . | 76 |
APT | B-Hack | 0.921267 | 22 | According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . | 77 |
TOOL | emails | 0.898365 | 22 | According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . | 78 |
VULNAME | exploit | 0.924827 | 22 | According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . | 79 |
IDTY | Microsoft Office | 0.908622 | 22 | According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . | 80 |
VULNAME | vulnerabilities | 0.925486 | 22 | According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . | 81 |
MAL | LOWBALL | 0.90779 | 22 | According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . | 82 |
APT | B-Hack's | 0.709281 | 23 | The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . | 83 |
TOOL | Dropbox | 0.898827 | 23 | The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . | 84 |
MAL | BUBBLEWRAP | 0.913397 | 23 | The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . | 85 |
LOC | China-based | 0.916265 | 24 | Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . | 86 |
APT | B-Hack | 0.537172 | 24 | Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . | 87 |
LOC | Hong Kong | 0.893878 | 24 | Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . | 88 |
APT | B-Hack | 0.917579 | 25 | Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . | 89 |
LOC | Hong Kong | 0.920369 | 25 | Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . | 90 |
SECTEAM | FireEye | 0.922921 | 26 | This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . | 91 |
LOC | Chinese-based | 0.874423 | 26 | This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . | 92 |
ACT | spear phishing | 0.913003 | 26 | This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . | 93 |
TOOL | emails, | 0.914939 | 26 | This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . | 94 |
ACT | B-Hack | 0.592985 | 26 | This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . | 95 |
LOC | Asia-Pacific, | 0.921936 | 26 | This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . | 96 |
ACT | B-Hack | 0.923203 | 27 | The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . | 97 |
MAL | Poison Ivy RAT | 0.874404 | 27 | The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . | 98 |
MAL | WinHTTPHelper malware | 0.91827 | 27 | The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . | 99 |
ACT | B-Hack | 0.923203 | 28 | The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . | 100 |
MAL | Poison Ivy RAT | 0.874404 | 28 | The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . | 101 |
MAL | WinHTTPHelper malware | 0.91827 | 28 | The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . | 102 |
SECTEAM | FireEye | 0.919897 | 29 | FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper . | 103 |
MAL | Poison Ivy: | 0.883367 | 29 | FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper . | 104 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.