Type stringclasses 20 values | Text stringlengths 1 236 | Score float64 0.22 0.96 | Original Sentence ID int64 0 6.64k | Original Sentence stringlengths 6 383 | __index_level_0__ int64 0 16.8k |
|---|---|---|---|---|---|
MAL | open source tool Responder | 0.890563 | 6,536 | B-Hack is using novel techniques involving the EternalBlue exploit and the open source tool Responder to spread laterally through networks and likely target travelers . | 16,541 |
MAL | Carbanak | 0.918958 | 6,537 | Carbanak is a remote backdoor (initially based on Carberp), designed for B-Hack, data exfiltration and to provide remote access to infected machines . | 16,542 |
MAL | Carberp), | 0.915953 | 6,537 | Carbanak is a remote backdoor (initially based on Carberp), designed for B-Hack, data exfiltration and to provide remote access to infected machines . | 16,543 |
MAL | Carbanak | 0.913725 | 6,538 | If found on the target system, Carbanak will try to exploit a known vulnerability in Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, Windows 8, and Windows Server 2012, CVE-2013-3660, for local privilege escalation . | 16,544 |
VULNAME | exploit | 0.93119 | 6,538 | If found on the target system, Carbanak will try to exploit a known vulnerability in Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, Windows 8, and Windows Server 2012, CVE-2013-3660, for local privilege escalation . | 16,545 |
OS | Windows | 0.912351 | 6,538 | If found on the target system, Carbanak will try to exploit a known vulnerability in Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, Windows 8, and Windows Server 2012, CVE-2013-3660, for local privilege escalation . | 16,547 |
VULID | CVE-2013-3660, | 0.920492 | 6,538 | If found on the target system, Carbanak will try to exploit a known vulnerability in Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, Windows 8, and Windows Server 2012, CVE-2013-3660, for local privilege escalation . | 16,553 |
MAL | Remote Desktop Protocol (RDP), Carbanak | 0.86268 | 6,539 | To enable connections to the infected computer using the Remote Desktop Protocol (RDP), Carbanak sets Termservice service execution mode to Auto . | 16,554 |
TIME | February 2015, | 0.91931 | 6,540 | Just a few months later, in February 2015, we announced the discovery of Carbanak, a B-Hack I-Hack that used custom malware and APT techniques to steal millions of dollars while infecting hundreds of B- I- in at least 30 countries . | 16,555 |
MAL | Carbanak, | 0.911645 | 6,540 | Just a few months later, in February 2015, we announced the discovery of Carbanak, a B-Hack I-Hack that used custom malware and APT techniques to steal millions of dollars while infecting hundreds of B- I- in at least 30 countries . | 16,556 |
ACT | B-Hack I-Hack | 0.900012 | 6,540 | Just a few months later, in February 2015, we announced the discovery of Carbanak, a B-Hack I-Hack that used custom malware and APT techniques to steal millions of dollars while infecting hundreds of B- I- in at least 30 countries . | 16,557 |
ACT | APT techniques | 0.921564 | 6,540 | Just a few months later, in February 2015, we announced the discovery of Carbanak, a B-Hack I-Hack that used custom malware and APT techniques to steal millions of dollars while infecting hundreds of B- I- in at least 30 countries . | 16,558 |
ACT | B-Hack I-Hack, | 0.713567 | 6,541 | Dubbed B-Hack I-Hack, this massive data stealing campaign is the first known campaign seen in the wild to exploit the Man-in-the-Disk vulnerability revealed by Check Point Research earlier last year . | 16,559 |
VULNAME | exploit | 0.940976 | 6,541 | Dubbed B-Hack I-Hack, this massive data stealing campaign is the first known campaign seen in the wild to exploit the Man-in-the-Disk vulnerability revealed by Check Point Research earlier last year . | 16,560 |
VULNAME | Man-in-the-Disk | 0.909032 | 6,541 | Dubbed B-Hack I-Hack, this massive data stealing campaign is the first known campaign seen in the wild to exploit the Man-in-the-Disk vulnerability revealed by Check Point Research earlier last year . | 16,561 |
ACT | spear-phishing | 0.909176 | 6,542 | This time, however, TA459 opportunistically used spear-phishing emails with a Microsoft Word attachment exploiting the recently patched CVE-2017-0199 to deploy the ZeroT Trojan, which in turn downloaded the PlugX Remote Access Trojan (RAT). | 16,562 |
TOOL | emails | 0.901606 | 6,542 | This time, however, TA459 opportunistically used spear-phishing emails with a Microsoft Word attachment exploiting the recently patched CVE-2017-0199 to deploy the ZeroT Trojan, which in turn downloaded the PlugX Remote Access Trojan (RAT). | 16,563 |
FILE | Microsoft Word attachment | 0.909598 | 6,542 | This time, however, TA459 opportunistically used spear-phishing emails with a Microsoft Word attachment exploiting the recently patched CVE-2017-0199 to deploy the ZeroT Trojan, which in turn downloaded the PlugX Remote Access Trojan (RAT). | 16,564 |
VULID | CVE-2017-0199 | 0.926223 | 6,542 | This time, however, TA459 opportunistically used spear-phishing emails with a Microsoft Word attachment exploiting the recently patched CVE-2017-0199 to deploy the ZeroT Trojan, which in turn downloaded the PlugX Remote Access Trojan (RAT). | 16,565 |
MAL | ZeroT Trojan, | 0.878537 | 6,542 | This time, however, TA459 opportunistically used spear-phishing emails with a Microsoft Word attachment exploiting the recently patched CVE-2017-0199 to deploy the ZeroT Trojan, which in turn downloaded the PlugX Remote Access Trojan (RAT). | 16,566 |
MAL | PlugX Remote Access Trojan (RAT). | 0.868245 | 6,542 | This time, however, TA459 opportunistically used spear-phishing emails with a Microsoft Word attachment exploiting the recently patched CVE-2017-0199 to deploy the ZeroT Trojan, which in turn downloaded the PlugX Remote Access Trojan (RAT). | 16,567 |
ACT | spear-phishing | 0.915639 | 6,543 | This time, however, attackers opportunistically used spear-phishing emails with a Microsoft Word attachment exploiting the recently patched CVE-2017-0199 to deploy the ZeroT Trojan, which in turn downloaded the PlugX Remote Access Trojan (RAT). | 16,568 |
TOOL | emails | 0.897286 | 6,543 | This time, however, attackers opportunistically used spear-phishing emails with a Microsoft Word attachment exploiting the recently patched CVE-2017-0199 to deploy the ZeroT Trojan, which in turn downloaded the PlugX Remote Access Trojan (RAT). | 16,569 |
FILE | Microsoft Word attachment | 0.904582 | 6,543 | This time, however, attackers opportunistically used spear-phishing emails with a Microsoft Word attachment exploiting the recently patched CVE-2017-0199 to deploy the ZeroT Trojan, which in turn downloaded the PlugX Remote Access Trojan (RAT). | 16,570 |
VULID | CVE-2017-0199 | 0.925123 | 6,543 | This time, however, attackers opportunistically used spear-phishing emails with a Microsoft Word attachment exploiting the recently patched CVE-2017-0199 to deploy the ZeroT Trojan, which in turn downloaded the PlugX Remote Access Trojan (RAT). | 16,571 |
MAL | ZeroT Trojan, | 0.864169 | 6,543 | This time, however, attackers opportunistically used spear-phishing emails with a Microsoft Word attachment exploiting the recently patched CVE-2017-0199 to deploy the ZeroT Trojan, which in turn downloaded the PlugX Remote Access Trojan (RAT). | 16,572 |
MAL | PlugX Remote Access Trojan (RAT). | 0.882119 | 6,543 | This time, however, attackers opportunistically used spear-phishing emails with a Microsoft Word attachment exploiting the recently patched CVE-2017-0199 to deploy the ZeroT Trojan, which in turn downloaded the PlugX Remote Access Trojan (RAT). | 16,573 |
FILE | malicious.DOC | 0.918888 | 6,544 | Data from the early part of this year shows that the Taidoor attackers rampantly used malicious.DOC files to exploit a Microsoft Common Controls vulnerability, CVE-2012-0158 . | 16,574 |
VULNAME | exploit | 0.939051 | 6,544 | Data from the early part of this year shows that the Taidoor attackers rampantly used malicious.DOC files to exploit a Microsoft Common Controls vulnerability, CVE-2012-0158 . | 16,575 |
IDTY | Microsoft | 0.911571 | 6,544 | Data from the early part of this year shows that the Taidoor attackers rampantly used malicious.DOC files to exploit a Microsoft Common Controls vulnerability, CVE-2012-0158 . | 16,576 |
TOOL | Common Controls | 0.843549 | 6,544 | Data from the early part of this year shows that the Taidoor attackers rampantly used malicious.DOC files to exploit a Microsoft Common Controls vulnerability, CVE-2012-0158 . | 16,577 |
VULNAME | vulnerability, | 0.85118 | 6,544 | Data from the early part of this year shows that the Taidoor attackers rampantly used malicious.DOC files to exploit a Microsoft Common Controls vulnerability, CVE-2012-0158 . | 16,578 |
VULID | CVE-2012-0158 | 0.923535 | 6,544 | Data from the early part of this year shows that the Taidoor attackers rampantly used malicious.DOC files to exploit a Microsoft Common Controls vulnerability, CVE-2012-0158 . | 16,579 |
FILE | documents | 0.904725 | 6,545 | The documents attached to spear-phishing e-mails used in both B- contain code that exploits CVE-2012-0158, which despite its age remains one of the most common Microsoft Word vulnerabilities being exploited by multiple threat actors . | 16,580 |
ACT | spear-phishing e-mails | 0.90829 | 6,545 | The documents attached to spear-phishing e-mails used in both B- contain code that exploits CVE-2012-0158, which despite its age remains one of the most common Microsoft Word vulnerabilities being exploited by multiple threat actors . | 16,581 |
VULID | CVE-2012-0158, | 0.923685 | 6,545 | The documents attached to spear-phishing e-mails used in both B- contain code that exploits CVE-2012-0158, which despite its age remains one of the most common Microsoft Word vulnerabilities being exploited by multiple threat actors . | 16,582 |
TOOL | Microsoft Word | 0.909815 | 6,545 | The documents attached to spear-phishing e-mails used in both B- contain code that exploits CVE-2012-0158, which despite its age remains one of the most common Microsoft Word vulnerabilities being exploited by multiple threat actors . | 16,583 |
VULNAME | vulnerabilities | 0.898567 | 6,545 | The documents attached to spear-phishing e-mails used in both B- contain code that exploits CVE-2012-0158, which despite its age remains one of the most common Microsoft Word vulnerabilities being exploited by multiple threat actors . | 16,584 |
VULID | CVE-2013-3906 | 0.913558 | 6,546 | If the document was delivered with macros instead of exploits (CVE-2012-0158, CVE-2013-3906 or CVE-2014-1761), then the document contained instructions for enabling macros . | 16,585 |
VULID | CVE-2014-1761), | 0.917733 | 6,546 | If the document was delivered with macros instead of exploits (CVE-2012-0158, CVE-2013-3906 or CVE-2014-1761), then the document contained instructions for enabling macros . | 16,586 |
APT | B-Hack | 0.915777 | 6,547 | Lately, B-Hack has been sending multiple RTF files exploiting CVE-2017-8570 . | 16,587 |
FILE | RTF files | 0.88565 | 6,547 | Lately, B-Hack has been sending multiple RTF files exploiting CVE-2017-8570 . | 16,588 |
VULID | CVE-2017-8570 | 0.916185 | 6,547 | Lately, B-Hack has been sending multiple RTF files exploiting CVE-2017-8570 . | 16,589 |
VULNAME | exploit | 0.902023 | 6,548 | The documents that exploit CVE2017-11882 download another payload — an HTML Application (HTA) file toting a malicious Visual Basic (VBS) script — from the server, which is executed accordingly by the command-line tool mshta.exe . | 16,590 |
VULID | CVE2017-11882 | 0.921068 | 6,548 | The documents that exploit CVE2017-11882 download another payload — an HTML Application (HTA) file toting a malicious Visual Basic (VBS) script — from the server, which is executed accordingly by the command-line tool mshta.exe . | 16,591 |
TOOL | HTML Application | 0.565861 | 6,548 | The documents that exploit CVE2017-11882 download another payload — an HTML Application (HTA) file toting a malicious Visual Basic (VBS) script — from the server, which is executed accordingly by the command-line tool mshta.exe . | 16,592 |
TOOL | Visual Basic | 0.734808 | 6,548 | The documents that exploit CVE2017-11882 download another payload — an HTML Application (HTA) file toting a malicious Visual Basic (VBS) script — from the server, which is executed accordingly by the command-line tool mshta.exe . | 16,593 |
FILE | mshta.exe | 0.91473 | 6,548 | The documents that exploit CVE2017-11882 download another payload — an HTML Application (HTA) file toting a malicious Visual Basic (VBS) script — from the server, which is executed accordingly by the command-line tool mshta.exe . | 16,594 |
SECTEAM | Kaspersky Lab's | 0.811352 | 6,549 | Kaspersky Lab's products detect the Microsoft Office exploits used in the B- I-, including Exploit.MSWord.CVE-2010-333, Exploit.Win32.CVE-2012-0158 . | 16,595 |
IDTY | Microsoft Office | 0.903542 | 6,549 | Kaspersky Lab's products detect the Microsoft Office exploits used in the B- I-, including Exploit.MSWord.CVE-2010-333, Exploit.Win32.CVE-2012-0158 . | 16,596 |
VULNAME | exploits | 0.917824 | 6,549 | Kaspersky Lab's products detect the Microsoft Office exploits used in the B- I-, including Exploit.MSWord.CVE-2010-333, Exploit.Win32.CVE-2012-0158 . | 16,597 |
FILE | Exploit.MSWord.CVE-2010-333, Exploit.Win32.CVE-2012-0158 | 0.934754 | 6,549 | Kaspersky Lab's products detect the Microsoft Office exploits used in the B- I-, including Exploit.MSWord.CVE-2010-333, Exploit.Win32.CVE-2012-0158 . | 16,598 |
FILE | files | 0.876967 | 6,550 | The files exploit the well-known Microsoft Office vulnerability, CVE-2012-0158, to execute malicious code in order to take control of the targeted systems . | 16,599 |
VULNAME | exploit | 0.905119 | 6,550 | The files exploit the well-known Microsoft Office vulnerability, CVE-2012-0158, to execute malicious code in order to take control of the targeted systems . | 16,600 |
TOOL | Microsoft Office | 0.893652 | 6,550 | The files exploit the well-known Microsoft Office vulnerability, CVE-2012-0158, to execute malicious code in order to take control of the targeted systems . | 16,601 |
VULID | CVE-2012-0158, | 0.917815 | 6,550 | The files exploit the well-known Microsoft Office vulnerability, CVE-2012-0158, to execute malicious code in order to take control of the targeted systems . | 16,602 |
VULID | CVE-2017-0143 | 0.920039 | 6,551 | CVE-2017-0143 was also used by two other exploit tools—EternalRomance and EternalSynergy—that were released as part of the Shadow Brokers leak in April 2017 . | 16,603 |
VULNAME | exploit | 0.907891 | 6,551 | CVE-2017-0143 was also used by two other exploit tools—EternalRomance and EternalSynergy—that were released as part of the Shadow Brokers leak in April 2017 . | 16,604 |
FILE | tools—EternalRomance | 0.912955 | 6,551 | CVE-2017-0143 was also used by two other exploit tools—EternalRomance and EternalSynergy—that were released as part of the Shadow Brokers leak in April 2017 . | 16,605 |
FILE | EternalSynergy—that | 0.914197 | 6,551 | CVE-2017-0143 was also used by two other exploit tools—EternalRomance and EternalSynergy—that were released as part of the Shadow Brokers leak in April 2017 . | 16,606 |
TIME | April 2017 | 0.919716 | 6,551 | CVE-2017-0143 was also used by two other exploit tools—EternalRomance and EternalSynergy—that were released as part of the Shadow Brokers leak in April 2017 . | 16,607 |
TOOL | RTF | 0.887448 | 6,552 | this RTF exploits again the CVE-2017_1882 on eqnedt32.exe . | 16,608 |
VULID | CVE-2017_1882 | 0.918118 | 6,552 | this RTF exploits again the CVE-2017_1882 on eqnedt32.exe . | 16,609 |
FILE | eqnedt32.exe | 0.918373 | 6,552 | this RTF exploits again the CVE-2017_1882 on eqnedt32.exe . | 16,610 |
FILE | sample | 0.888518 | 6,553 | The analyzed RTF files share the same object dimension (objw2180\objh300) used to track the RTF weaponizer in our previous report, however, the sample was not exploiting CVE-2017-11882 or CVE-2018-0802 . | 16,611 |
VULID | CVE-2017-11882 | 0.916521 | 6,553 | The analyzed RTF files share the same object dimension (objw2180\objh300) used to track the RTF weaponizer in our previous report, however, the sample was not exploiting CVE-2017-11882 or CVE-2018-0802 . | 16,612 |
VULID | CVE-2018-0802 | 0.915896 | 6,553 | The analyzed RTF files share the same object dimension (objw2180\objh300) used to track the RTF weaponizer in our previous report, however, the sample was not exploiting CVE-2017-11882 or CVE-2018-0802 . | 16,613 |
FILE | RTF files | 0.900055 | 6,554 | After further analysis, it was discovered that the RTF files were exploiting the CVE-2018-0798 vulnerability in Microsoft’s Equation Editor (EQNEDT32). | 16,614 |
VULID | CVE-2018-0798 | 0.915499 | 6,554 | After further analysis, it was discovered that the RTF files were exploiting the CVE-2018-0798 vulnerability in Microsoft’s Equation Editor (EQNEDT32). | 16,615 |
IDTY | Microsoft’s | 0.498415 | 6,554 | After further analysis, it was discovered that the RTF files were exploiting the CVE-2018-0798 vulnerability in Microsoft’s Equation Editor (EQNEDT32). | 16,616 |
TOOL | Equation Editor | 0.758274 | 6,554 | After further analysis, it was discovered that the RTF files were exploiting the CVE-2018-0798 vulnerability in Microsoft’s Equation Editor (EQNEDT32). | 16,617 |
SECTEAM | Anomali | 0.927906 | 6,555 | Anomali Researchers were able to identify multiple samples of malicious RTF documents ITW using the same exploit for CVE-2018-0798 . | 16,618 |
FILE | ITW | 0.906466 | 6,555 | Anomali Researchers were able to identify multiple samples of malicious RTF documents ITW using the same exploit for CVE-2018-0798 . | 16,619 |
VULNAME | exploit | 0.92824 | 6,555 | Anomali Researchers were able to identify multiple samples of malicious RTF documents ITW using the same exploit for CVE-2018-0798 . | 16,620 |
VULID | CVE-2018-0798 | 0.918448 | 6,555 | Anomali Researchers were able to identify multiple samples of malicious RTF documents ITW using the same exploit for CVE-2018-0798 . | 16,621 |
TOOL | Word | 0.909476 | 6,556 | Upon opening of the MS Word document, our embedded file exploits CVE-2017-11882 to drop a malicious fake Norton Security Shell Extension module, 'NavShExt.dll', which is then injected into iexplore.exe to install the backdoor, begin collection, and activate command and control . | 16,622 |
VULID | CVE-2017-11882 | 0.921538 | 6,556 | Upon opening of the MS Word document, our embedded file exploits CVE-2017-11882 to drop a malicious fake Norton Security Shell Extension module, 'NavShExt.dll', which is then injected into iexplore.exe to install the backdoor, begin collection, and activate command and control . | 16,623 |
FILE | 'NavShExt.dll', | 0.872164 | 6,556 | Upon opening of the MS Word document, our embedded file exploits CVE-2017-11882 to drop a malicious fake Norton Security Shell Extension module, 'NavShExt.dll', which is then injected into iexplore.exe to install the backdoor, begin collection, and activate command and control . | 16,624 |
FILE | iexplore.exe | 0.921236 | 6,556 | Upon opening of the MS Word document, our embedded file exploits CVE-2017-11882 to drop a malicious fake Norton Security Shell Extension module, 'NavShExt.dll', which is then injected into iexplore.exe to install the backdoor, begin collection, and activate command and control . | 16,625 |
VULNAME | exploit | 0.926053 | 6,557 | Moving through the infection process, NetWitness Endpoint detects the initial exploit CVE-2017-1182 in action as the Microsoft Equation Editor, 'EQNEDT32.exe', scores high for potentially malicious activity . | 16,626 |
VULID | CVE-2017-1182 | 0.922997 | 6,557 | Moving through the infection process, NetWitness Endpoint detects the initial exploit CVE-2017-1182 in action as the Microsoft Equation Editor, 'EQNEDT32.exe', scores high for potentially malicious activity . | 16,627 |
FILE | Microsoft Equation Editor, | 0.909448 | 6,557 | Moving through the infection process, NetWitness Endpoint detects the initial exploit CVE-2017-1182 in action as the Microsoft Equation Editor, 'EQNEDT32.exe', scores high for potentially malicious activity . | 16,628 |
FILE | BalkanDoor | 0.919482 | 6,558 | In some of the latest samples of BalkanDoor detected in 2019, the malware is distributed as an ACE archive, disguised as a RAR archive (i.e, not an executable file), specially crafted to exploit the WinRAR ACE vulnerability CVE-2018-20250 . | 16,629 |
TIME | 2019, | 0.906578 | 6,558 | In some of the latest samples of BalkanDoor detected in 2019, the malware is distributed as an ACE archive, disguised as a RAR archive (i.e, not an executable file), specially crafted to exploit the WinRAR ACE vulnerability CVE-2018-20250 . | 16,630 |
VULNAME | exploit | 0.94094 | 6,558 | In some of the latest samples of BalkanDoor detected in 2019, the malware is distributed as an ACE archive, disguised as a RAR archive (i.e, not an executable file), specially crafted to exploit the WinRAR ACE vulnerability CVE-2018-20250 . | 16,631 |
TOOL | WinRAR | 0.905537 | 6,558 | In some of the latest samples of BalkanDoor detected in 2019, the malware is distributed as an ACE archive, disguised as a RAR archive (i.e, not an executable file), specially crafted to exploit the WinRAR ACE vulnerability CVE-2018-20250 . | 16,632 |
VULID | CVE-2018-20250 | 0.919415 | 6,558 | In some of the latest samples of BalkanDoor detected in 2019, the malware is distributed as an ACE archive, disguised as a RAR archive (i.e, not an executable file), specially crafted to exploit the WinRAR ACE vulnerability CVE-2018-20250 . | 16,633 |
LOC | China | 0.731452 | 6,559 | The China Chopper actor activity starts with the download and execution of two exploit files which attempt to exploit the Windows vulnerabilities CVE-2015-0062, CVE-2015-1701 and CVE-2016-0099 to allow the B-Hack to modify other objects on the server . | 16,634 |
TOOL | Chopper | 0.755417 | 6,559 | The China Chopper actor activity starts with the download and execution of two exploit files which attempt to exploit the Windows vulnerabilities CVE-2015-0062, CVE-2015-1701 and CVE-2016-0099 to allow the B-Hack to modify other objects on the server . | 16,635 |
VULNAME | exploit | 0.927557 | 6,559 | The China Chopper actor activity starts with the download and execution of two exploit files which attempt to exploit the Windows vulnerabilities CVE-2015-0062, CVE-2015-1701 and CVE-2016-0099 to allow the B-Hack to modify other objects on the server . | 16,637 |
OS | Windows | 0.883266 | 6,559 | The China Chopper actor activity starts with the download and execution of two exploit files which attempt to exploit the Windows vulnerabilities CVE-2015-0062, CVE-2015-1701 and CVE-2016-0099 to allow the B-Hack to modify other objects on the server . | 16,638 |
VULID | CVE-2015-0062, CVE-2015-1701 | 0.918615 | 6,559 | The China Chopper actor activity starts with the download and execution of two exploit files which attempt to exploit the Windows vulnerabilities CVE-2015-0062, CVE-2015-1701 and CVE-2016-0099 to allow the B-Hack to modify other objects on the server . | 16,639 |
VULID | CVE-2016-0099 | 0.919454 | 6,559 | The China Chopper actor activity starts with the download and execution of two exploit files which attempt to exploit the Windows vulnerabilities CVE-2015-0062, CVE-2015-1701 and CVE-2016-0099 to allow the B-Hack to modify other objects on the server . | 16,640 |
MAL | B-Hack | 0.919814 | 6,559 | The China Chopper actor activity starts with the download and execution of two exploit files which attempt to exploit the Windows vulnerabilities CVE-2015-0062, CVE-2015-1701 and CVE-2016-0099 to allow the B-Hack to modify other objects on the server . | 16,641 |
FILE | archive | 0.910191 | 6,560 | The following archive caught our attention for exploiting a WinRAR unacev2 module vulnerability and for having interesting content . | 16,642 |
TOOL | WinRAR | 0.900104 | 6,560 | The following archive caught our attention for exploiting a WinRAR unacev2 module vulnerability and for having interesting content . | 16,643 |
VULNAME | vulnerability | 0.828634 | 6,560 | The following archive caught our attention for exploiting a WinRAR unacev2 module vulnerability and for having interesting content . | 16,644 |
TOOL | emails | 0.903445 | 6,561 | In all emails sent to these government officials, the actor used the same attachment: a malicious Microsoft Word document that exploited the CVE-2012-0158 vulnerability to drop a malicious payload . | 16,645 |
IDTY | government officials, | 0.910583 | 6,561 | In all emails sent to these government officials, the actor used the same attachment: a malicious Microsoft Word document that exploited the CVE-2012-0158 vulnerability to drop a malicious payload . | 16,646 |
FILE | malicious Microsoft Word document | 0.913642 | 6,561 | In all emails sent to these government officials, the actor used the same attachment: a malicious Microsoft Word document that exploited the CVE-2012-0158 vulnerability to drop a malicious payload . | 16,647 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.