Type
stringclasses
20 values
Text
stringlengths
1
236
Score
float64
0.22
0.96
Original Sentence ID
int64
0
6.64k
Original Sentence
stringlengths
6
383
__index_level_0__
int64
0
16.8k
SECTEAM
B-Hack
0.894922
30
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March .
105
ACT
B-
0.860412
30
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March .
106
LOC
US-based
0.797209
30
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March .
107
TIME
14th March
0.907973
30
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March .
108
APT
B-Hack
0.741731
31
Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack .
109
LOC
China's
0.760568
31
Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack .
110
SECTEAM
FireEye
0.91372
32
FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- .
111
TIME
2013
0.932951
32
FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- .
112
APT
B-Hack
0.915182
33
The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai .
113
LOC
China,
0.919423
33
The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai .
114
LOC
Shanghai
0.921468
33
The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai .
115
APT
B-Hack
0.793946
34
These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are .
116
LOC
China
0.904818
34
These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are .
117
LOC
Chinese
0.830825
34
These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are .
118
ACT
B-Hack
0.456508
35
B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently .
120
MAL
BISCUIT
0.914141
35
B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently .
121
TIME
2007
0.895446
35
B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently .
122
APT
B-Hack
0.870776
36
While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT .
123
MAL
publicly available backdoors
0.893754
36
While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT .
124
MAL
Poison Ivy
0.885893
36
While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT .
125
MAL
Gh0st RAT
0.875761
36
While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT .
126
APT
B-Hack
0.885329
38
B-Hack were a highly prolific B-Hack I-Hack operating out of China .
127
APT
B-Hack I-Hack
0.546523
38
B-Hack were a highly prolific B-Hack I-Hack operating out of China .
128
LOC
China
0.905237
38
B-Hack were a highly prolific B-Hack I-Hack operating out of China .
129
APT
B-Hack
0.616168
39
B-Hack is a China-based B-Hack I-Hack, active since mid-2006 .
130
LOC
China-based
0.913584
39
B-Hack is a China-based B-Hack I-Hack, active since mid-2006 .
131
TIME
mid-2006
0.914219
39
B-Hack is a China-based B-Hack I-Hack, active since mid-2006 .
132
APT
B-Hack's
0.923422
40
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals .
133
IDTY
People's Republic of China (PRC)
0.859631
40
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals .
134
SECTEAM
Arbor
0.924401
41
Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE .
135
SECTEAM
FireEye
0.924829
41
Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE .
136
APT
B-Hack
0.920796
41
Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE .
137
MAL
HIGHTIDE
0.915758
41
Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE .
138
MAL
RIPTIDE
0.917077
42
However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack .
139
MAL
HIGHTIDE backdoor
0.893206
42
However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack .
140
APT
B-Hack
0.912141
42
However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack .
141
TIME
October 2012
0.920859
43
From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server .
142
TIME
May 2014,
0.920735
43
From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server .
143
SECTEAM
FireEye
0.920085
43
From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server .
144
APT
B-Hack
0.738239
43
From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server .
145
MAL
RIPTIDE,
0.911154
43
From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server .
146
PROT
HTTP
0.493688
43
From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server .
147
MAL
B-Hack
0.565396
44
Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 .
148
MAL
HIGHTIDE
0.91301
44
Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 .
149
TOOL
Microsoft Word
0.891662
44
Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 .
150
VULID
CVE-2012-0158
0.924615
44
Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 .
151
SECTEAM
FireEye
0.927595
45
FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset .
152
MAL
RIPTIDE
0.9136
45
FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset .
153
MAL
HIGHTIDE
0.911978
45
FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset .
154
APT
B-Hack
0.702506
45
FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset .
155
MAL
RATs
0.907135
46
They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors .
156
MAL
Poison Ivy,
0.879596
46
They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors .
157
MAL
non-public backdoors
0.893036
46
They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors .
158
LOC
China-based
0.916122
47
A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- .
159
SECTEAM
FireEye
0.916107
47
A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- .
160
ACT
B-Hack
0.514801
48
The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- .
161
ACT
spear phishing
0.917702
48
The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- .
162
TOOL
emails
0.913469
48
The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- .
163
LOC
Western B-
0.539095
48
The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- .
164
APT
B-Hack
0.663848
49
About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families .
165
FILE
Backdoor.APT.Aumlib
0.520621
49
About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families .
166
FILE
Backdoor.APT.Ixeshe
0.562068
49
About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families .
167
LOC
China
0.917835
50
With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc .
168
APT
B-Hack I-Hack
0.573452
51
B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc .
169
APT
B-Hack, B-Hack, B-Hack I-Hack, B-Hack,
0.892652
51
B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc .
170
TIME
January
0.740376
52
The new B- mark the first significant stirrings from the B-Hack since it went silent in January in the wake of a detailed expose of the B-Hack and its exploits — and a retooling of what security researchers believe is a massive spying operation based in China .
171
LOC
China
0.909803
52
The new B- mark the first significant stirrings from the B-Hack since it went silent in January in the wake of a detailed expose of the B-Hack and its exploits — and a retooling of what security researchers believe is a massive spying operation based in China .
172
TIME
November 26, 2015,
0.926672
53
Between November 26, 2015, and December 1, 2015, known and suspected China-based B-Hack launched several B- I- I- targeting Japan and Taiwan in the B-, B- I-, B- and B- I- I- .
173
TIME
December 1, 2015,
0.916638
53
Between November 26, 2015, and December 1, 2015, known and suspected China-based B-Hack launched several B- I- I- targeting Japan and Taiwan in the B-, B- I-, B- and B- I- I- .
174
LOC
China-based
0.919823
53
Between November 26, 2015, and December 1, 2015, known and suspected China-based B-Hack launched several B- I- I- targeting Japan and Taiwan in the B-, B- I-, B- and B- I- I- .
175
APT
B-Hack
0.781489
53
Between November 26, 2015, and December 1, 2015, known and suspected China-based B-Hack launched several B- I- I- targeting Japan and Taiwan in the B-, B- I-, B- and B- I- I- .
176
LOC
Japan
0.905167
53
Between November 26, 2015, and December 1, 2015, known and suspected China-based B-Hack launched several B- I- I- targeting Japan and Taiwan in the B-, B- I-, B- and B- I- I- .
177
LOC
Taiwan
0.912725
53
Between November 26, 2015, and December 1, 2015, known and suspected China-based B-Hack launched several B- I- I- targeting Japan and Taiwan in the B-, B- I-, B- and B- I- I- .
178
TIME
November 26, 2015,
0.900574
54
Between November 26, 2015, and December 1, 2015, known and suspected China-based B-Hack I-Hack launched several B- I- I- targeting Japanese and Taiwanese organizations in the B-, B- I-, B- and B- I- I- .
179
TIME
December 1, 2015,
0.839577
54
Between November 26, 2015, and December 1, 2015, known and suspected China-based B-Hack I-Hack launched several B- I- I- targeting Japanese and Taiwanese organizations in the B-, B- I-, B- and B- I- I- .
180
LOC
China-based
0.908512
54
Between November 26, 2015, and December 1, 2015, known and suspected China-based B-Hack I-Hack launched several B- I- I- targeting Japanese and Taiwanese organizations in the B-, B- I-, B- and B- I- I- .
181
APT
B-Hack
0.536032
54
Between November 26, 2015, and December 1, 2015, known and suspected China-based B-Hack I-Hack launched several B- I- I- targeting Japanese and Taiwanese organizations in the B-, B- I-, B- and B- I- I- .
182
TIME
November 26, 2015,
0.847944
55
On November 26, 2015, a suspected China-based B-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I- .
183
LOC
China-based
0.914201
55
On November 26, 2015, a suspected China-based B-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I- .
184
APT
B-Hack
0.913646
55
On November 26, 2015, a suspected China-based B-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I- .
185
LOC
Japanese
0.488049
55
On November 26, 2015, a suspected China-based B-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I- .
186
ACT
spear phishing
0.924995
55
On November 26, 2015, a suspected China-based B-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I- .
187
TOOL
emails
0.924097
55
On November 26, 2015, a suspected China-based B-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I- .
188
TIME
November 26, 2015,
0.856473
56
On November 26, 2015, a suspected China-based B-Hack I-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I- .
189
LOC
China-based
0.900268
56
On November 26, 2015, a suspected China-based B-Hack I-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I- .
190
APT
B-Hack
0.757733
56
On November 26, 2015, a suspected China-based B-Hack I-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I- .
191
ACT
spear phishing
0.926982
56
On November 26, 2015, a suspected China-based B-Hack I-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I- .
192
TOOL
emails
0.927012
56
On November 26, 2015, a suspected China-based B-Hack I-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I- .
193
LOC
China-based
0.800094
57
While attribution of the first two B- I- I- is still uncertain, we attribute the second December B- I- to the China-based B-Hack I-Hack that we refer to as B-Hack .
194
ACT
spear phishing
0.923408
58
B-Hack I-Hack sent spear phishing emails to two Taiwanese B- I- .
195
TOOL
emails
0.906688
58
B-Hack I-Hack sent spear phishing emails to two Taiwanese B- I- .
196
MAL
ELMER backdoor
0.899948
60
It is possible, although not confirmed, that B-Hack was also responsible for targeting this B- I-, given both the timeframe and the use of the same n-day to eventually deploy the ELMER backdoor .
197
LOC
Hong Kong
0.890286
61
Despite the differing sponsorship, penetration of Hong Kong and Taiwan-based B- I- continues to be a priority for China-based B-Hack .
198
LOC
Taiwan-based
0.910686
61
Despite the differing sponsorship, penetration of Hong Kong and Taiwan-based B- I- continues to be a priority for China-based B-Hack .
199
LOC
China-based
0.91068
61
Despite the differing sponsorship, penetration of Hong Kong and Taiwan-based B- I- continues to be a priority for China-based B-Hack .
200
APT
B-Hack
0.37351
61
Despite the differing sponsorship, penetration of Hong Kong and Taiwan-based B- I- continues to be a priority for China-based B-Hack .
201
ACT
B-Hack
0.90197
62
The suspected B-Hack targeting of the Taiwanese B- I- – in addition to the Taiwanese B- I- – further supports this possibility .
202
PROT
IP
0.648994
63
B-Hack was embedding the encoded CnC IP address for the BLACKCOFFEE malware in legitimate Microsoft TechNet profiles pages and forum threads, a method some in the information security community call a " dead drop resolver " .
203
MAL
BLACKCOFFEE malware
0.875771
63
B-Hack was embedding the encoded CnC IP address for the BLACKCOFFEE malware in legitimate Microsoft TechNet profiles pages and forum threads, a method some in the information security community call a " dead drop resolver " .
204
IDTY
Microsoft
0.894654
63
B-Hack was embedding the encoded CnC IP address for the BLACKCOFFEE malware in legitimate Microsoft TechNet profiles pages and forum threads, a method some in the information security community call a " dead drop resolver " .
205