Type stringclasses 20 values | Text stringlengths 1 236 | Score float64 0.22 0.96 | Original Sentence ID int64 0 6.64k | Original Sentence stringlengths 6 383 | __index_level_0__ int64 0 16.8k |
|---|---|---|---|---|---|
SECTEAM | B-Hack | 0.894922 | 30 | The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . | 105 |
ACT | B- | 0.860412 | 30 | The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . | 106 |
LOC | US-based | 0.797209 | 30 | The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . | 107 |
TIME | 14th March | 0.907973 | 30 | The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . | 108 |
APT | B-Hack | 0.741731 | 31 | Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . | 109 |
LOC | China's | 0.760568 | 31 | Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . | 110 |
SECTEAM | FireEye | 0.91372 | 32 | FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . | 111 |
TIME | 2013 | 0.932951 | 32 | FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . | 112 |
APT | B-Hack | 0.915182 | 33 | The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai . | 113 |
LOC | China, | 0.919423 | 33 | The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai . | 114 |
LOC | Shanghai | 0.921468 | 33 | The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai . | 115 |
APT | B-Hack | 0.793946 | 34 | These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . | 116 |
LOC | China | 0.904818 | 34 | These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . | 117 |
LOC | Chinese | 0.830825 | 34 | These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . | 118 |
ACT | B-Hack | 0.456508 | 35 | B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . | 120 |
MAL | BISCUIT | 0.914141 | 35 | B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . | 121 |
TIME | 2007 | 0.895446 | 35 | B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . | 122 |
APT | B-Hack | 0.870776 | 36 | While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . | 123 |
MAL | publicly available backdoors | 0.893754 | 36 | While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . | 124 |
MAL | Poison Ivy | 0.885893 | 36 | While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . | 125 |
MAL | Gh0st RAT | 0.875761 | 36 | While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . | 126 |
APT | B-Hack | 0.885329 | 38 | B-Hack were a highly prolific B-Hack I-Hack operating out of China . | 127 |
APT | B-Hack I-Hack | 0.546523 | 38 | B-Hack were a highly prolific B-Hack I-Hack operating out of China . | 128 |
LOC | China | 0.905237 | 38 | B-Hack were a highly prolific B-Hack I-Hack operating out of China . | 129 |
APT | B-Hack | 0.616168 | 39 | B-Hack is a China-based B-Hack I-Hack, active since mid-2006 . | 130 |
LOC | China-based | 0.913584 | 39 | B-Hack is a China-based B-Hack I-Hack, active since mid-2006 . | 131 |
TIME | mid-2006 | 0.914219 | 39 | B-Hack is a China-based B-Hack I-Hack, active since mid-2006 . | 132 |
APT | B-Hack's | 0.923422 | 40 | B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . | 133 |
IDTY | People's Republic of China (PRC) | 0.859631 | 40 | B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . | 134 |
SECTEAM | Arbor | 0.924401 | 41 | Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . | 135 |
SECTEAM | FireEye | 0.924829 | 41 | Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . | 136 |
APT | B-Hack | 0.920796 | 41 | Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . | 137 |
MAL | HIGHTIDE | 0.915758 | 41 | Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . | 138 |
MAL | RIPTIDE | 0.917077 | 42 | However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack . | 139 |
MAL | HIGHTIDE backdoor | 0.893206 | 42 | However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack . | 140 |
APT | B-Hack | 0.912141 | 42 | However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack . | 141 |
TIME | October 2012 | 0.920859 | 43 | From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . | 142 |
TIME | May 2014, | 0.920735 | 43 | From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . | 143 |
SECTEAM | FireEye | 0.920085 | 43 | From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . | 144 |
APT | B-Hack | 0.738239 | 43 | From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . | 145 |
MAL | RIPTIDE, | 0.911154 | 43 | From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . | 146 |
PROT | HTTP | 0.493688 | 43 | From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . | 147 |
MAL | B-Hack | 0.565396 | 44 | Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . | 148 |
MAL | HIGHTIDE | 0.91301 | 44 | Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . | 149 |
TOOL | Microsoft Word | 0.891662 | 44 | Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . | 150 |
VULID | CVE-2012-0158 | 0.924615 | 44 | Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . | 151 |
SECTEAM | FireEye | 0.927595 | 45 | FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . | 152 |
MAL | RIPTIDE | 0.9136 | 45 | FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . | 153 |
MAL | HIGHTIDE | 0.911978 | 45 | FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . | 154 |
APT | B-Hack | 0.702506 | 45 | FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . | 155 |
MAL | RATs | 0.907135 | 46 | They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . | 156 |
MAL | Poison Ivy, | 0.879596 | 46 | They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . | 157 |
MAL | non-public backdoors | 0.893036 | 46 | They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . | 158 |
LOC | China-based | 0.916122 | 47 | A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . | 159 |
SECTEAM | FireEye | 0.916107 | 47 | A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . | 160 |
ACT | B-Hack | 0.514801 | 48 | The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . | 161 |
ACT | spear phishing | 0.917702 | 48 | The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . | 162 |
TOOL | emails | 0.913469 | 48 | The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . | 163 |
LOC | Western B- | 0.539095 | 48 | The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . | 164 |
APT | B-Hack | 0.663848 | 49 | About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families . | 165 |
FILE | Backdoor.APT.Aumlib | 0.520621 | 49 | About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families . | 166 |
FILE | Backdoor.APT.Ixeshe | 0.562068 | 49 | About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families . | 167 |
LOC | China | 0.917835 | 50 | With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc . | 168 |
APT | B-Hack I-Hack | 0.573452 | 51 | B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc . | 169 |
APT | B-Hack, B-Hack, B-Hack I-Hack, B-Hack, | 0.892652 | 51 | B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc . | 170 |
TIME | January | 0.740376 | 52 | The new B- mark the first significant stirrings from the B-Hack since it went silent in January in the wake of a detailed expose of the B-Hack and its exploits — and a retooling of what security researchers believe is a massive spying operation based in China . | 171 |
LOC | China | 0.909803 | 52 | The new B- mark the first significant stirrings from the B-Hack since it went silent in January in the wake of a detailed expose of the B-Hack and its exploits — and a retooling of what security researchers believe is a massive spying operation based in China . | 172 |
TIME | November 26, 2015, | 0.926672 | 53 | Between November 26, 2015, and December 1, 2015, known and suspected China-based B-Hack launched several B- I- I- targeting Japan and Taiwan in the B-, B- I-, B- and B- I- I- . | 173 |
TIME | December 1, 2015, | 0.916638 | 53 | Between November 26, 2015, and December 1, 2015, known and suspected China-based B-Hack launched several B- I- I- targeting Japan and Taiwan in the B-, B- I-, B- and B- I- I- . | 174 |
LOC | China-based | 0.919823 | 53 | Between November 26, 2015, and December 1, 2015, known and suspected China-based B-Hack launched several B- I- I- targeting Japan and Taiwan in the B-, B- I-, B- and B- I- I- . | 175 |
APT | B-Hack | 0.781489 | 53 | Between November 26, 2015, and December 1, 2015, known and suspected China-based B-Hack launched several B- I- I- targeting Japan and Taiwan in the B-, B- I-, B- and B- I- I- . | 176 |
LOC | Japan | 0.905167 | 53 | Between November 26, 2015, and December 1, 2015, known and suspected China-based B-Hack launched several B- I- I- targeting Japan and Taiwan in the B-, B- I-, B- and B- I- I- . | 177 |
LOC | Taiwan | 0.912725 | 53 | Between November 26, 2015, and December 1, 2015, known and suspected China-based B-Hack launched several B- I- I- targeting Japan and Taiwan in the B-, B- I-, B- and B- I- I- . | 178 |
TIME | November 26, 2015, | 0.900574 | 54 | Between November 26, 2015, and December 1, 2015, known and suspected China-based B-Hack I-Hack launched several B- I- I- targeting Japanese and Taiwanese organizations in the B-, B- I-, B- and B- I- I- . | 179 |
TIME | December 1, 2015, | 0.839577 | 54 | Between November 26, 2015, and December 1, 2015, known and suspected China-based B-Hack I-Hack launched several B- I- I- targeting Japanese and Taiwanese organizations in the B-, B- I-, B- and B- I- I- . | 180 |
LOC | China-based | 0.908512 | 54 | Between November 26, 2015, and December 1, 2015, known and suspected China-based B-Hack I-Hack launched several B- I- I- targeting Japanese and Taiwanese organizations in the B-, B- I-, B- and B- I- I- . | 181 |
APT | B-Hack | 0.536032 | 54 | Between November 26, 2015, and December 1, 2015, known and suspected China-based B-Hack I-Hack launched several B- I- I- targeting Japanese and Taiwanese organizations in the B-, B- I-, B- and B- I- I- . | 182 |
TIME | November 26, 2015, | 0.847944 | 55 | On November 26, 2015, a suspected China-based B-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I- . | 183 |
LOC | China-based | 0.914201 | 55 | On November 26, 2015, a suspected China-based B-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I- . | 184 |
APT | B-Hack | 0.913646 | 55 | On November 26, 2015, a suspected China-based B-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I- . | 185 |
LOC | Japanese | 0.488049 | 55 | On November 26, 2015, a suspected China-based B-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I- . | 186 |
ACT | spear phishing | 0.924995 | 55 | On November 26, 2015, a suspected China-based B-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I- . | 187 |
TOOL | emails | 0.924097 | 55 | On November 26, 2015, a suspected China-based B-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I- . | 188 |
TIME | November 26, 2015, | 0.856473 | 56 | On November 26, 2015, a suspected China-based B-Hack I-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I- . | 189 |
LOC | China-based | 0.900268 | 56 | On November 26, 2015, a suspected China-based B-Hack I-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I- . | 190 |
APT | B-Hack | 0.757733 | 56 | On November 26, 2015, a suspected China-based B-Hack I-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I- . | 191 |
ACT | spear phishing | 0.926982 | 56 | On November 26, 2015, a suspected China-based B-Hack I-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I- . | 192 |
TOOL | emails | 0.927012 | 56 | On November 26, 2015, a suspected China-based B-Hack I-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I- . | 193 |
LOC | China-based | 0.800094 | 57 | While attribution of the first two B- I- I- is still uncertain, we attribute the second December B- I- to the China-based B-Hack I-Hack that we refer to as B-Hack . | 194 |
ACT | spear phishing | 0.923408 | 58 | B-Hack I-Hack sent spear phishing emails to two Taiwanese B- I- . | 195 |
TOOL | emails | 0.906688 | 58 | B-Hack I-Hack sent spear phishing emails to two Taiwanese B- I- . | 196 |
MAL | ELMER backdoor | 0.899948 | 60 | It is possible, although not confirmed, that B-Hack was also responsible for targeting this B- I-, given both the timeframe and the use of the same n-day to eventually deploy the ELMER backdoor . | 197 |
LOC | Hong Kong | 0.890286 | 61 | Despite the differing sponsorship, penetration of Hong Kong and Taiwan-based B- I- continues to be a priority for China-based B-Hack . | 198 |
LOC | Taiwan-based | 0.910686 | 61 | Despite the differing sponsorship, penetration of Hong Kong and Taiwan-based B- I- continues to be a priority for China-based B-Hack . | 199 |
LOC | China-based | 0.91068 | 61 | Despite the differing sponsorship, penetration of Hong Kong and Taiwan-based B- I- continues to be a priority for China-based B-Hack . | 200 |
APT | B-Hack | 0.37351 | 61 | Despite the differing sponsorship, penetration of Hong Kong and Taiwan-based B- I- continues to be a priority for China-based B-Hack . | 201 |
ACT | B-Hack | 0.90197 | 62 | The suspected B-Hack targeting of the Taiwanese B- I- – in addition to the Taiwanese B- I- – further supports this possibility . | 202 |
PROT | IP | 0.648994 | 63 | B-Hack was embedding the encoded CnC IP address for the BLACKCOFFEE malware in legitimate Microsoft TechNet profiles pages and forum threads, a method some in the information security community call a " dead drop resolver " . | 203 |
MAL | BLACKCOFFEE malware | 0.875771 | 63 | B-Hack was embedding the encoded CnC IP address for the BLACKCOFFEE malware in legitimate Microsoft TechNet profiles pages and forum threads, a method some in the information security community call a " dead drop resolver " . | 204 |
IDTY | Microsoft | 0.894654 | 63 | B-Hack was embedding the encoded CnC IP address for the BLACKCOFFEE malware in legitimate Microsoft TechNet profiles pages and forum threads, a method some in the information security community call a " dead drop resolver " . | 205 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.