Type
stringclasses
20 values
Text
stringlengths
1
236
Score
float64
0.22
0.96
Original Sentence ID
int64
0
6.64k
Original Sentence
stringlengths
6
383
__index_level_0__
int64
0
16.8k
MAL
open source tool Responder
0.890563
6,536
B-Hack is using novel techniques involving the EternalBlue exploit and the open source tool Responder to spread laterally through networks and likely target travelers .
16,541
MAL
Carbanak
0.918958
6,537
Carbanak is a remote backdoor (initially based on Carberp), designed for B-Hack, data exfiltration and to provide remote access to infected machines .
16,542
MAL
Carberp),
0.915953
6,537
Carbanak is a remote backdoor (initially based on Carberp), designed for B-Hack, data exfiltration and to provide remote access to infected machines .
16,543
MAL
Carbanak
0.913725
6,538
If found on the target system, Carbanak will try to exploit a known vulnerability in Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, Windows 8, and Windows Server 2012, CVE-2013-3660, for local privilege escalation .
16,544
VULNAME
exploit
0.93119
6,538
If found on the target system, Carbanak will try to exploit a known vulnerability in Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, Windows 8, and Windows Server 2012, CVE-2013-3660, for local privilege escalation .
16,545
OS
Windows
0.912351
6,538
If found on the target system, Carbanak will try to exploit a known vulnerability in Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, Windows 8, and Windows Server 2012, CVE-2013-3660, for local privilege escalation .
16,547
VULID
CVE-2013-3660,
0.920492
6,538
If found on the target system, Carbanak will try to exploit a known vulnerability in Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, Windows 8, and Windows Server 2012, CVE-2013-3660, for local privilege escalation .
16,553
MAL
Remote Desktop Protocol (RDP), Carbanak
0.86268
6,539
To enable connections to the infected computer using the Remote Desktop Protocol (RDP), Carbanak sets Termservice service execution mode to Auto .
16,554
TIME
February 2015,
0.91931
6,540
Just a few months later, in February 2015, we announced the discovery of Carbanak, a B-Hack I-Hack that used custom malware and APT techniques to steal millions of dollars while infecting hundreds of B- I- in at least 30 countries .
16,555
MAL
Carbanak,
0.911645
6,540
Just a few months later, in February 2015, we announced the discovery of Carbanak, a B-Hack I-Hack that used custom malware and APT techniques to steal millions of dollars while infecting hundreds of B- I- in at least 30 countries .
16,556
ACT
B-Hack I-Hack
0.900012
6,540
Just a few months later, in February 2015, we announced the discovery of Carbanak, a B-Hack I-Hack that used custom malware and APT techniques to steal millions of dollars while infecting hundreds of B- I- in at least 30 countries .
16,557
ACT
APT techniques
0.921564
6,540
Just a few months later, in February 2015, we announced the discovery of Carbanak, a B-Hack I-Hack that used custom malware and APT techniques to steal millions of dollars while infecting hundreds of B- I- in at least 30 countries .
16,558
ACT
B-Hack I-Hack,
0.713567
6,541
Dubbed B-Hack I-Hack, this massive data stealing campaign is the first known campaign seen in the wild to exploit the Man-in-the-Disk vulnerability revealed by Check Point Research earlier last year .
16,559
VULNAME
exploit
0.940976
6,541
Dubbed B-Hack I-Hack, this massive data stealing campaign is the first known campaign seen in the wild to exploit the Man-in-the-Disk vulnerability revealed by Check Point Research earlier last year .
16,560
VULNAME
Man-in-the-Disk
0.909032
6,541
Dubbed B-Hack I-Hack, this massive data stealing campaign is the first known campaign seen in the wild to exploit the Man-in-the-Disk vulnerability revealed by Check Point Research earlier last year .
16,561
ACT
spear-phishing
0.909176
6,542
This time, however, TA459 opportunistically used spear-phishing emails with a Microsoft Word attachment exploiting the recently patched CVE-2017-0199 to deploy the ZeroT Trojan, which in turn downloaded the PlugX Remote Access Trojan (RAT).
16,562
TOOL
emails
0.901606
6,542
This time, however, TA459 opportunistically used spear-phishing emails with a Microsoft Word attachment exploiting the recently patched CVE-2017-0199 to deploy the ZeroT Trojan, which in turn downloaded the PlugX Remote Access Trojan (RAT).
16,563
FILE
Microsoft Word attachment
0.909598
6,542
This time, however, TA459 opportunistically used spear-phishing emails with a Microsoft Word attachment exploiting the recently patched CVE-2017-0199 to deploy the ZeroT Trojan, which in turn downloaded the PlugX Remote Access Trojan (RAT).
16,564
VULID
CVE-2017-0199
0.926223
6,542
This time, however, TA459 opportunistically used spear-phishing emails with a Microsoft Word attachment exploiting the recently patched CVE-2017-0199 to deploy the ZeroT Trojan, which in turn downloaded the PlugX Remote Access Trojan (RAT).
16,565
MAL
ZeroT Trojan,
0.878537
6,542
This time, however, TA459 opportunistically used spear-phishing emails with a Microsoft Word attachment exploiting the recently patched CVE-2017-0199 to deploy the ZeroT Trojan, which in turn downloaded the PlugX Remote Access Trojan (RAT).
16,566
MAL
PlugX Remote Access Trojan (RAT).
0.868245
6,542
This time, however, TA459 opportunistically used spear-phishing emails with a Microsoft Word attachment exploiting the recently patched CVE-2017-0199 to deploy the ZeroT Trojan, which in turn downloaded the PlugX Remote Access Trojan (RAT).
16,567
ACT
spear-phishing
0.915639
6,543
This time, however, attackers opportunistically used spear-phishing emails with a Microsoft Word attachment exploiting the recently patched CVE-2017-0199 to deploy the ZeroT Trojan, which in turn downloaded the PlugX Remote Access Trojan (RAT).
16,568
TOOL
emails
0.897286
6,543
This time, however, attackers opportunistically used spear-phishing emails with a Microsoft Word attachment exploiting the recently patched CVE-2017-0199 to deploy the ZeroT Trojan, which in turn downloaded the PlugX Remote Access Trojan (RAT).
16,569
FILE
Microsoft Word attachment
0.904582
6,543
This time, however, attackers opportunistically used spear-phishing emails with a Microsoft Word attachment exploiting the recently patched CVE-2017-0199 to deploy the ZeroT Trojan, which in turn downloaded the PlugX Remote Access Trojan (RAT).
16,570
VULID
CVE-2017-0199
0.925123
6,543
This time, however, attackers opportunistically used spear-phishing emails with a Microsoft Word attachment exploiting the recently patched CVE-2017-0199 to deploy the ZeroT Trojan, which in turn downloaded the PlugX Remote Access Trojan (RAT).
16,571
MAL
ZeroT Trojan,
0.864169
6,543
This time, however, attackers opportunistically used spear-phishing emails with a Microsoft Word attachment exploiting the recently patched CVE-2017-0199 to deploy the ZeroT Trojan, which in turn downloaded the PlugX Remote Access Trojan (RAT).
16,572
MAL
PlugX Remote Access Trojan (RAT).
0.882119
6,543
This time, however, attackers opportunistically used spear-phishing emails with a Microsoft Word attachment exploiting the recently patched CVE-2017-0199 to deploy the ZeroT Trojan, which in turn downloaded the PlugX Remote Access Trojan (RAT).
16,573
FILE
malicious.DOC
0.918888
6,544
Data from the early part of this year shows that the Taidoor attackers rampantly used malicious.DOC files to exploit a Microsoft Common Controls vulnerability, CVE-2012-0158 .
16,574
VULNAME
exploit
0.939051
6,544
Data from the early part of this year shows that the Taidoor attackers rampantly used malicious.DOC files to exploit a Microsoft Common Controls vulnerability, CVE-2012-0158 .
16,575
IDTY
Microsoft
0.911571
6,544
Data from the early part of this year shows that the Taidoor attackers rampantly used malicious.DOC files to exploit a Microsoft Common Controls vulnerability, CVE-2012-0158 .
16,576
TOOL
Common Controls
0.843549
6,544
Data from the early part of this year shows that the Taidoor attackers rampantly used malicious.DOC files to exploit a Microsoft Common Controls vulnerability, CVE-2012-0158 .
16,577
VULNAME
vulnerability,
0.85118
6,544
Data from the early part of this year shows that the Taidoor attackers rampantly used malicious.DOC files to exploit a Microsoft Common Controls vulnerability, CVE-2012-0158 .
16,578
VULID
CVE-2012-0158
0.923535
6,544
Data from the early part of this year shows that the Taidoor attackers rampantly used malicious.DOC files to exploit a Microsoft Common Controls vulnerability, CVE-2012-0158 .
16,579
FILE
documents
0.904725
6,545
The documents attached to spear-phishing e-mails used in both B- contain code that exploits CVE-2012-0158, which despite its age remains one of the most common Microsoft Word vulnerabilities being exploited by multiple threat actors .
16,580
ACT
spear-phishing e-mails
0.90829
6,545
The documents attached to spear-phishing e-mails used in both B- contain code that exploits CVE-2012-0158, which despite its age remains one of the most common Microsoft Word vulnerabilities being exploited by multiple threat actors .
16,581
VULID
CVE-2012-0158,
0.923685
6,545
The documents attached to spear-phishing e-mails used in both B- contain code that exploits CVE-2012-0158, which despite its age remains one of the most common Microsoft Word vulnerabilities being exploited by multiple threat actors .
16,582
TOOL
Microsoft Word
0.909815
6,545
The documents attached to spear-phishing e-mails used in both B- contain code that exploits CVE-2012-0158, which despite its age remains one of the most common Microsoft Word vulnerabilities being exploited by multiple threat actors .
16,583
VULNAME
vulnerabilities
0.898567
6,545
The documents attached to spear-phishing e-mails used in both B- contain code that exploits CVE-2012-0158, which despite its age remains one of the most common Microsoft Word vulnerabilities being exploited by multiple threat actors .
16,584
VULID
CVE-2013-3906
0.913558
6,546
If the document was delivered with macros instead of exploits (CVE-2012-0158, CVE-2013-3906 or CVE-2014-1761), then the document contained instructions for enabling macros .
16,585
VULID
CVE-2014-1761),
0.917733
6,546
If the document was delivered with macros instead of exploits (CVE-2012-0158, CVE-2013-3906 or CVE-2014-1761), then the document contained instructions for enabling macros .
16,586
APT
B-Hack
0.915777
6,547
Lately, B-Hack has been sending multiple RTF files exploiting CVE-2017-8570 .
16,587
FILE
RTF files
0.88565
6,547
Lately, B-Hack has been sending multiple RTF files exploiting CVE-2017-8570 .
16,588
VULID
CVE-2017-8570
0.916185
6,547
Lately, B-Hack has been sending multiple RTF files exploiting CVE-2017-8570 .
16,589
VULNAME
exploit
0.902023
6,548
The documents that exploit CVE2017-11882 download another payload — an HTML Application (HTA) file toting a malicious Visual Basic (VBS) script — from the server, which is executed accordingly by the command-line tool mshta.exe .
16,590
VULID
CVE2017-11882
0.921068
6,548
The documents that exploit CVE2017-11882 download another payload — an HTML Application (HTA) file toting a malicious Visual Basic (VBS) script — from the server, which is executed accordingly by the command-line tool mshta.exe .
16,591
TOOL
HTML Application
0.565861
6,548
The documents that exploit CVE2017-11882 download another payload — an HTML Application (HTA) file toting a malicious Visual Basic (VBS) script — from the server, which is executed accordingly by the command-line tool mshta.exe .
16,592
TOOL
Visual Basic
0.734808
6,548
The documents that exploit CVE2017-11882 download another payload — an HTML Application (HTA) file toting a malicious Visual Basic (VBS) script — from the server, which is executed accordingly by the command-line tool mshta.exe .
16,593
FILE
mshta.exe
0.91473
6,548
The documents that exploit CVE2017-11882 download another payload — an HTML Application (HTA) file toting a malicious Visual Basic (VBS) script — from the server, which is executed accordingly by the command-line tool mshta.exe .
16,594
SECTEAM
Kaspersky Lab's
0.811352
6,549
Kaspersky Lab's products detect the Microsoft Office exploits used in the B- I-, including Exploit.MSWord.CVE-2010-333, Exploit.Win32.CVE-2012-0158 .
16,595
IDTY
Microsoft Office
0.903542
6,549
Kaspersky Lab's products detect the Microsoft Office exploits used in the B- I-, including Exploit.MSWord.CVE-2010-333, Exploit.Win32.CVE-2012-0158 .
16,596
VULNAME
exploits
0.917824
6,549
Kaspersky Lab's products detect the Microsoft Office exploits used in the B- I-, including Exploit.MSWord.CVE-2010-333, Exploit.Win32.CVE-2012-0158 .
16,597
FILE
Exploit.MSWord.CVE-2010-333, Exploit.Win32.CVE-2012-0158
0.934754
6,549
Kaspersky Lab's products detect the Microsoft Office exploits used in the B- I-, including Exploit.MSWord.CVE-2010-333, Exploit.Win32.CVE-2012-0158 .
16,598
FILE
files
0.876967
6,550
The files exploit the well-known Microsoft Office vulnerability, CVE-2012-0158, to execute malicious code in order to take control of the targeted systems .
16,599
VULNAME
exploit
0.905119
6,550
The files exploit the well-known Microsoft Office vulnerability, CVE-2012-0158, to execute malicious code in order to take control of the targeted systems .
16,600
TOOL
Microsoft Office
0.893652
6,550
The files exploit the well-known Microsoft Office vulnerability, CVE-2012-0158, to execute malicious code in order to take control of the targeted systems .
16,601
VULID
CVE-2012-0158,
0.917815
6,550
The files exploit the well-known Microsoft Office vulnerability, CVE-2012-0158, to execute malicious code in order to take control of the targeted systems .
16,602
VULID
CVE-2017-0143
0.920039
6,551
CVE-2017-0143 was also used by two other exploit tools—EternalRomance and EternalSynergy—that were released as part of the Shadow Brokers leak in April 2017 .
16,603
VULNAME
exploit
0.907891
6,551
CVE-2017-0143 was also used by two other exploit tools—EternalRomance and EternalSynergy—that were released as part of the Shadow Brokers leak in April 2017 .
16,604
FILE
tools—EternalRomance
0.912955
6,551
CVE-2017-0143 was also used by two other exploit tools—EternalRomance and EternalSynergy—that were released as part of the Shadow Brokers leak in April 2017 .
16,605
FILE
EternalSynergy—that
0.914197
6,551
CVE-2017-0143 was also used by two other exploit tools—EternalRomance and EternalSynergy—that were released as part of the Shadow Brokers leak in April 2017 .
16,606
TIME
April 2017
0.919716
6,551
CVE-2017-0143 was also used by two other exploit tools—EternalRomance and EternalSynergy—that were released as part of the Shadow Brokers leak in April 2017 .
16,607
TOOL
RTF
0.887448
6,552
this RTF exploits again the CVE-2017_1882 on eqnedt32.exe .
16,608
VULID
CVE-2017_1882
0.918118
6,552
this RTF exploits again the CVE-2017_1882 on eqnedt32.exe .
16,609
FILE
eqnedt32.exe
0.918373
6,552
this RTF exploits again the CVE-2017_1882 on eqnedt32.exe .
16,610
FILE
sample
0.888518
6,553
The analyzed RTF files share the same object dimension (objw2180\objh300) used to track the RTF weaponizer in our previous report, however, the sample was not exploiting CVE-2017-11882 or CVE-2018-0802 .
16,611
VULID
CVE-2017-11882
0.916521
6,553
The analyzed RTF files share the same object dimension (objw2180\objh300) used to track the RTF weaponizer in our previous report, however, the sample was not exploiting CVE-2017-11882 or CVE-2018-0802 .
16,612
VULID
CVE-2018-0802
0.915896
6,553
The analyzed RTF files share the same object dimension (objw2180\objh300) used to track the RTF weaponizer in our previous report, however, the sample was not exploiting CVE-2017-11882 or CVE-2018-0802 .
16,613
FILE
RTF files
0.900055
6,554
After further analysis, it was discovered that the RTF files were exploiting the CVE-2018-0798 vulnerability in Microsoft’s Equation Editor (EQNEDT32).
16,614
VULID
CVE-2018-0798
0.915499
6,554
After further analysis, it was discovered that the RTF files were exploiting the CVE-2018-0798 vulnerability in Microsoft’s Equation Editor (EQNEDT32).
16,615
IDTY
Microsoft’s
0.498415
6,554
After further analysis, it was discovered that the RTF files were exploiting the CVE-2018-0798 vulnerability in Microsoft’s Equation Editor (EQNEDT32).
16,616
TOOL
Equation Editor
0.758274
6,554
After further analysis, it was discovered that the RTF files were exploiting the CVE-2018-0798 vulnerability in Microsoft’s Equation Editor (EQNEDT32).
16,617
SECTEAM
Anomali
0.927906
6,555
Anomali Researchers were able to identify multiple samples of malicious RTF documents ITW using the same exploit for CVE-2018-0798 .
16,618
FILE
ITW
0.906466
6,555
Anomali Researchers were able to identify multiple samples of malicious RTF documents ITW using the same exploit for CVE-2018-0798 .
16,619
VULNAME
exploit
0.92824
6,555
Anomali Researchers were able to identify multiple samples of malicious RTF documents ITW using the same exploit for CVE-2018-0798 .
16,620
VULID
CVE-2018-0798
0.918448
6,555
Anomali Researchers were able to identify multiple samples of malicious RTF documents ITW using the same exploit for CVE-2018-0798 .
16,621
TOOL
Word
0.909476
6,556
Upon opening of the MS Word document, our embedded file exploits CVE-2017-11882 to drop a malicious fake Norton Security Shell Extension module, 'NavShExt.dll', which is then injected into iexplore.exe to install the backdoor, begin collection, and activate command and control .
16,622
VULID
CVE-2017-11882
0.921538
6,556
Upon opening of the MS Word document, our embedded file exploits CVE-2017-11882 to drop a malicious fake Norton Security Shell Extension module, 'NavShExt.dll', which is then injected into iexplore.exe to install the backdoor, begin collection, and activate command and control .
16,623
FILE
'NavShExt.dll',
0.872164
6,556
Upon opening of the MS Word document, our embedded file exploits CVE-2017-11882 to drop a malicious fake Norton Security Shell Extension module, 'NavShExt.dll', which is then injected into iexplore.exe to install the backdoor, begin collection, and activate command and control .
16,624
FILE
iexplore.exe
0.921236
6,556
Upon opening of the MS Word document, our embedded file exploits CVE-2017-11882 to drop a malicious fake Norton Security Shell Extension module, 'NavShExt.dll', which is then injected into iexplore.exe to install the backdoor, begin collection, and activate command and control .
16,625
VULNAME
exploit
0.926053
6,557
Moving through the infection process, NetWitness Endpoint detects the initial exploit CVE-2017-1182 in action as the Microsoft Equation Editor, 'EQNEDT32.exe', scores high for potentially malicious activity .
16,626
VULID
CVE-2017-1182
0.922997
6,557
Moving through the infection process, NetWitness Endpoint detects the initial exploit CVE-2017-1182 in action as the Microsoft Equation Editor, 'EQNEDT32.exe', scores high for potentially malicious activity .
16,627
FILE
Microsoft Equation Editor,
0.909448
6,557
Moving through the infection process, NetWitness Endpoint detects the initial exploit CVE-2017-1182 in action as the Microsoft Equation Editor, 'EQNEDT32.exe', scores high for potentially malicious activity .
16,628
FILE
BalkanDoor
0.919482
6,558
In some of the latest samples of BalkanDoor detected in 2019, the malware is distributed as an ACE archive, disguised as a RAR archive (i.e, not an executable file), specially crafted to exploit the WinRAR ACE vulnerability CVE-2018-20250 .
16,629
TIME
2019,
0.906578
6,558
In some of the latest samples of BalkanDoor detected in 2019, the malware is distributed as an ACE archive, disguised as a RAR archive (i.e, not an executable file), specially crafted to exploit the WinRAR ACE vulnerability CVE-2018-20250 .
16,630
VULNAME
exploit
0.94094
6,558
In some of the latest samples of BalkanDoor detected in 2019, the malware is distributed as an ACE archive, disguised as a RAR archive (i.e, not an executable file), specially crafted to exploit the WinRAR ACE vulnerability CVE-2018-20250 .
16,631
TOOL
WinRAR
0.905537
6,558
In some of the latest samples of BalkanDoor detected in 2019, the malware is distributed as an ACE archive, disguised as a RAR archive (i.e, not an executable file), specially crafted to exploit the WinRAR ACE vulnerability CVE-2018-20250 .
16,632
VULID
CVE-2018-20250
0.919415
6,558
In some of the latest samples of BalkanDoor detected in 2019, the malware is distributed as an ACE archive, disguised as a RAR archive (i.e, not an executable file), specially crafted to exploit the WinRAR ACE vulnerability CVE-2018-20250 .
16,633
LOC
China
0.731452
6,559
The China Chopper actor activity starts with the download and execution of two exploit files which attempt to exploit the Windows vulnerabilities CVE-2015-0062, CVE-2015-1701 and CVE-2016-0099 to allow the B-Hack to modify other objects on the server .
16,634
TOOL
Chopper
0.755417
6,559
The China Chopper actor activity starts with the download and execution of two exploit files which attempt to exploit the Windows vulnerabilities CVE-2015-0062, CVE-2015-1701 and CVE-2016-0099 to allow the B-Hack to modify other objects on the server .
16,635
VULNAME
exploit
0.927557
6,559
The China Chopper actor activity starts with the download and execution of two exploit files which attempt to exploit the Windows vulnerabilities CVE-2015-0062, CVE-2015-1701 and CVE-2016-0099 to allow the B-Hack to modify other objects on the server .
16,637
OS
Windows
0.883266
6,559
The China Chopper actor activity starts with the download and execution of two exploit files which attempt to exploit the Windows vulnerabilities CVE-2015-0062, CVE-2015-1701 and CVE-2016-0099 to allow the B-Hack to modify other objects on the server .
16,638
VULID
CVE-2015-0062, CVE-2015-1701
0.918615
6,559
The China Chopper actor activity starts with the download and execution of two exploit files which attempt to exploit the Windows vulnerabilities CVE-2015-0062, CVE-2015-1701 and CVE-2016-0099 to allow the B-Hack to modify other objects on the server .
16,639
VULID
CVE-2016-0099
0.919454
6,559
The China Chopper actor activity starts with the download and execution of two exploit files which attempt to exploit the Windows vulnerabilities CVE-2015-0062, CVE-2015-1701 and CVE-2016-0099 to allow the B-Hack to modify other objects on the server .
16,640
MAL
B-Hack
0.919814
6,559
The China Chopper actor activity starts with the download and execution of two exploit files which attempt to exploit the Windows vulnerabilities CVE-2015-0062, CVE-2015-1701 and CVE-2016-0099 to allow the B-Hack to modify other objects on the server .
16,641
FILE
archive
0.910191
6,560
The following archive caught our attention for exploiting a WinRAR unacev2 module vulnerability and for having interesting content .
16,642
TOOL
WinRAR
0.900104
6,560
The following archive caught our attention for exploiting a WinRAR unacev2 module vulnerability and for having interesting content .
16,643
VULNAME
vulnerability
0.828634
6,560
The following archive caught our attention for exploiting a WinRAR unacev2 module vulnerability and for having interesting content .
16,644
TOOL
emails
0.903445
6,561
In all emails sent to these government officials, the actor used the same attachment: a malicious Microsoft Word document that exploited the CVE-2012-0158 vulnerability to drop a malicious payload .
16,645
IDTY
government officials,
0.910583
6,561
In all emails sent to these government officials, the actor used the same attachment: a malicious Microsoft Word document that exploited the CVE-2012-0158 vulnerability to drop a malicious payload .
16,646
FILE
malicious Microsoft Word document
0.913642
6,561
In all emails sent to these government officials, the actor used the same attachment: a malicious Microsoft Word document that exploited the CVE-2012-0158 vulnerability to drop a malicious payload .
16,647