Type
stringclasses
20 values
Text
stringlengths
1
236
Score
float64
0.22
0.96
Original Sentence ID
int64
0
6.64k
Original Sentence
stringlengths
6
383
__index_level_0__
int64
0
16.8k
TOOL
TechNet
0.61833
63
B-Hack was embedding the encoded CnC IP address for the BLACKCOFFEE malware in legitimate Microsoft TechNet profiles pages and forum threads, a method some in the information security community call a " dead drop resolver " .
206
SECTEAM
information security community
0.848976
63
B-Hack was embedding the encoded CnC IP address for the BLACKCOFFEE malware in legitimate Microsoft TechNet profiles pages and forum threads, a method some in the information security community call a " dead drop resolver " .
207
LOC
China-based
0.918694
64
B-Hack, also known as B-Hack, is a China-based B-Hack I-Hack that FireEye Intelligence has observed conducting network intrusions against U.S.
208
SECTEAM
FireEye
0.922124
64
B-Hack, also known as B-Hack, is a China-based B-Hack I-Hack that FireEye Intelligence has observed conducting network intrusions against U.S.
209
LOC
U.S.
0.924429
64
B-Hack, also known as B-Hack, is a China-based B-Hack I-Hack that FireEye Intelligence has observed conducting network intrusions against U.S.
210
SECTEAM
FireEye
0.912845
66
FireEye has monitored B-Hack's use of BLACKCOFFEE variants since 2013 to masquerade malicious communication as normal web traffic by disguising the CnC communication as queries to web search engines .
211
APT
B-Hack's
0.920857
66
FireEye has monitored B-Hack's use of BLACKCOFFEE variants since 2013 to masquerade malicious communication as normal web traffic by disguising the CnC communication as queries to web search engines .
212
MAL
BLACKCOFFEE
0.91427
66
FireEye has monitored B-Hack's use of BLACKCOFFEE variants since 2013 to masquerade malicious communication as normal web traffic by disguising the CnC communication as queries to web search engines .
213
TIME
since 2013
0.577488
66
FireEye has monitored B-Hack's use of BLACKCOFFEE variants since 2013 to masquerade malicious communication as normal web traffic by disguising the CnC communication as queries to web search engines .
214
MAL
BLACKCOFFEE
0.914274
67
The use of BLACKCOFFEE demonstrates B-Hack's evolving use of public websites to hide in plain sight .
215
APT
B-Hack's
0.922854
67
The use of BLACKCOFFEE demonstrates B-Hack's evolving use of public websites to hide in plain sight .
216
ACT
B-Hack
0.303761
68
B-Hack is a stealthy and extremely successful B-Hack I-Hack I-Hack (B-Hack) I-Hack known to target a broad range of verticals since at least 2009, including B-, B-, B-, B- I- I-, B-, B-, and B- I- .
217
TIME
2009,
0.836992
68
B-Hack is a stealthy and extremely successful B-Hack I-Hack I-Hack (B-Hack) I-Hack known to target a broad range of verticals since at least 2009, including B-, B-, B-, B- I- I-, B-, B-, and B- I- .
218
APT
B-Hack
0.676008
69
The B-Hack then installed the hcdLoader RAT, which installs as a Windows service and provides command line access to the compromised system .
219
MAL
hcdLoader
0.913766
69
The B-Hack then installed the hcdLoader RAT, which installs as a Windows service and provides command line access to the compromised system .
220
OS
Windows
0.858309
69
The B-Hack then installed the hcdLoader RAT, which installs as a Windows service and provides command line access to the compromised system .
221
ACT
B-Hack I-Hack
0.809356
70
The malware used by the B-Hack I-Hack has ties to the HTTPBrowser malware family, and uses DNS requests as a command and control mechanism .
222
MAL
HTTPBrowser malware family,
0.842611
70
The malware used by the B-Hack I-Hack has ties to the HTTPBrowser malware family, and uses DNS requests as a command and control mechanism .
223
PROT
DNS
0.821493
70
The malware used by the B-Hack I-Hack has ties to the HTTPBrowser malware family, and uses DNS requests as a command and control mechanism .
224
MAL
HTTPBrowser,
0.904245
71
These URIs result in the download of an installer, which creates a PE of the malware typically known as HTTPBrowser, but called Token Control by the B-Hack I-Hack themselves (based upon the PDB strings found within many of the samples).
225
MAL
Token Control
0.845288
71
These URIs result in the download of an installer, which creates a PE of the malware typically known as HTTPBrowser, but called Token Control by the B-Hack I-Hack themselves (based upon the PDB strings found within many of the samples).
226
APT
B-Hack I-Hack
0.884912
71
These URIs result in the download of an installer, which creates a PE of the malware typically known as HTTPBrowser, but called Token Control by the B-Hack I-Hack themselves (based upon the PDB strings found within many of the samples).
227
TOOL
PDB
0.842952
71
These URIs result in the download of an installer, which creates a PE of the malware typically known as HTTPBrowser, but called Token Control by the B-Hack I-Hack themselves (based upon the PDB strings found within many of the samples).
228
APT
B-Hack
0.758197
72
B-Hack seemed to be going after B- I- I-, Chinese dissident groups and B-, B-, B- and B- I- that could benefit the Chinese economy .
229
LOC
Chinese
0.769061
72
B-Hack seemed to be going after B- I- I-, Chinese dissident groups and B-, B-, B- and B- I- that could benefit the Chinese economy .
231
APT
B-Hack
0.80142
73
B-Hack seemed to be going after B- I- I-, Chinese dissident groups and other B- target, as well as certain B- targets and other B- targets in B- and B- I- that could benefit the Chinese economy .
232
MAL
B-
0.794071
73
B-Hack seemed to be going after B- I- I-, Chinese dissident groups and other B- target, as well as certain B- targets and other B- targets in B- and B- I- that could benefit the Chinese economy .
235
LOC
Chinese
0.867158
73
B-Hack seemed to be going after B- I- I-, Chinese dissident groups and other B- target, as well as certain B- targets and other B- targets in B- and B- I- that could benefit the Chinese economy .
237
TIME
mid 2000s,
0.900802
74
B-Hack I-Hack (also known as B-Hack or B-Hack I-Hack) is a separate Russian-based B-Hack I-Hack, which has been active since mid 2000s, and has been responsible for targeted B- I- against the B-, B-, B-, B- and B- I- .
238
MAL
APT28 malware,
0.90717
75
APT28 malware, in particular the family of modular backdoors that we call CHOPSTICK, indicates a formal code development environment .
239
MAL
CHOPSTICK,
0.910166
75
APT28 malware, in particular the family of modular backdoors that we call CHOPSTICK, indicates a formal code development environment .
240
APT
B-Hack's
0.673925
76
However, three themes in B-Hack's targeting clearly reflects areas of specific interest to an Eastern European B-, most likely the Russian government .
241
LOC
Eastern European
0.852436
76
However, three themes in B-Hack's targeting clearly reflects areas of specific interest to an Eastern European B-, most likely the Russian government .
242
IDTY
Russian government
0.901052
76
However, three themes in B-Hack's targeting clearly reflects areas of specific interest to an Eastern European B-, most likely the Russian government .
243
IDTY
Russian government
0.896909
77
We identified three themes in B-Hack's lures and registered domains, which together are particularly relevant to the Russian government .
244
LOC
U.S.
0.922411
78
Georgian military security issues, particularly with regard to U.S.
245
ACT
B-Hack I-Hack
0.584263
79
cooperation and NATO, provide a strong incentive for Russian state-sponsored B-Hack I-Hack to steal information that sheds light on these topics .
246
MAL
B-Hack I-Hack
0.506762
80
Instead, we observed the two Russian B-Hack I-Hack compromise the same systems and engage separately in the theft of identical credentials .
247
LOC
Russian
0.468245
81
B-Hack's malware settings suggest that the developers have done the majority of their work in a Russian language build environment during Russian business hours, which suggests that the Russian government is B-Hack's sponsor .
249
IDTY
Russian government
0.905668
81
B-Hack's malware settings suggest that the developers have done the majority of their work in a Russian language build environment during Russian business hours, which suggests that the Russian government is B-Hack's sponsor .
250
APT
B-Hack's
0.744548
81
B-Hack's malware settings suggest that the developers have done the majority of their work in a Russian language build environment during Russian business hours, which suggests that the Russian government is B-Hack's sponsor .
251
APT
B-Hack's
0.913734
82
We believe that B-Hack's targeting of the MOD aligns with Russian threat perceptions .
252
LOC
Russian
0.688372
82
We believe that B-Hack's targeting of the MOD aligns with Russian threat perceptions .
253
APT
B-Hack
0.774854
83
We assess that B-Hack is most likely sponsored by the Russian government .
254
IDTY
Russian government
0.886808
83
We assess that B-Hack is most likely sponsored by the Russian government .
255
APT
B-Hack's
0.874217
84
Given the available data, we assess that B-Hack's work is sponsored by the Russian government .
256
IDTY
Russian government
0.893891
84
Given the available data, we assess that B-Hack's work is sponsored by the Russian government .
257
TIME
2015
0.921066
85
The targets were similar to a 2015 B- I- — individuals in Russia and the former Soviet states, current and former B- and B- I- in the U.S.
258
LOC
Russia
0.874442
85
The targets were similar to a 2015 B- I- — individuals in Russia and the former Soviet states, current and former B- and B- I- in the U.S.
259
LOC
former Soviet
0.787211
85
The targets were similar to a 2015 B- I- — individuals in Russia and the former Soviet states, current and former B- and B- I- in the U.S.
260
LOC
U.S.
0.762665
85
The targets were similar to a 2015 B- I- — individuals in Russia and the former Soviet states, current and former B- and B- I- in the U.S.
261
LOC
Europe,
0.896074
86
and Europe, individuals working in the B- and B- supply chain, and B- and B- — but also included email accounts linked to the November 2016 United States presidential election .
262
TOOL
email
0.889094
86
and Europe, individuals working in the B- and B- supply chain, and B- and B- — but also included email accounts linked to the November 2016 United States presidential election .
263
TIME
November 2016
0.921192
86
and Europe, individuals working in the B- and B- supply chain, and B- and B- — but also included email accounts linked to the November 2016 United States presidential election .
264
LOC
United States
0.846429
86
and Europe, individuals working in the B- and B- supply chain, and B- and B- — but also included email accounts linked to the November 2016 United States presidential election .
265
ACT
B-Hack
0.416347
87
The targets of B-Hack include B-, B- and B- I- .
266
APT
B-Hack's
0.898069
88
Some of B-Hack's more commonly used tools are the SOURFACE downloader, its second stage backdoor EVILTOSS, and a modular family of implants that we call CHOPSTICK .
267
MAL
SOURFACE downloader,
0.858043
88
Some of B-Hack's more commonly used tools are the SOURFACE downloader, its second stage backdoor EVILTOSS, and a modular family of implants that we call CHOPSTICK .
268
MAL
EVILTOSS,
0.90086
88
Some of B-Hack's more commonly used tools are the SOURFACE downloader, its second stage backdoor EVILTOSS, and a modular family of implants that we call CHOPSTICK .
269
MAL
modular family of implants
0.863918
88
Some of B-Hack's more commonly used tools are the SOURFACE downloader, its second stage backdoor EVILTOSS, and a modular family of implants that we call CHOPSTICK .
270
MAL
CHOPSTICK
0.909604
88
Some of B-Hack's more commonly used tools are the SOURFACE downloader, its second stage backdoor EVILTOSS, and a modular family of implants that we call CHOPSTICK .
271
ACT
B-Hack
0.760443
89
While B-Hack continues to primarily threaten organizations and individuals operating in Russia and former Soviet states, this B- illustrates its willingness to expand its scope to other targets that have intelligence of interest to the Russian government .
272
IDTY
Russian government
0.728142
89
While B-Hack continues to primarily threaten organizations and individuals operating in Russia and former Soviet states, this B- illustrates its willingness to expand its scope to other targets that have intelligence of interest to the Russian government .
273
SECTEAM
CTU
0.920593
90
CTU researchers assess with moderate confidence that the B-Hack is operating from the Russian Federation and is gathering intelligence on behalf of the Russian government .
274
MAL
B-Hack
0.479356
90
CTU researchers assess with moderate confidence that the B-Hack is operating from the Russian Federation and is gathering intelligence on behalf of the Russian government .
275
LOC
Russian
0.464856
90
CTU researchers assess with moderate confidence that the B-Hack is operating from the Russian Federation and is gathering intelligence on behalf of the Russian government .
276
IDTY
Russian government
0.732819
90
CTU researchers assess with moderate confidence that the B-Hack is operating from the Russian Federation and is gathering intelligence on behalf of the Russian government .
277
ACT
B-Hack
0.474059
91
This intelligence has been critical to protecting and informing our clients, exposing this threat, and strengthening our confidence in attributing B-Hack to the Russian Government .
278
ACT
B-Hack
0.84273
92
Our visibility into the operations of B-Hack - a B-Hack we believe the Russian Government sponsors - has given us insight into some of the B-'s targets, as well as its objectives and the B- designed to further them .
279
APT
B-'s
0.727609
92
Our visibility into the operations of B-Hack - a B-Hack we believe the Russian Government sponsors - has given us insight into some of the B-'s targets, as well as its objectives and the B- designed to further them .
280
TIME
2007,
0.911657
93
Since at least 2007, B-Hack has engaged in extensive operations in support of Russian strategic interests .
281
APT
B-Hack
0.893634
93
Since at least 2007, B-Hack has engaged in extensive operations in support of Russian strategic interests .
282
LOC
U.S., Europe,
0.761872
94
B- I- I- has primarily targeted entities in the U.S., Europe, and the countries of the former Soviet Union, including B-, B-, B- I-, B- I-, and B- and B- opposed to the current Russian Government .
283
LOC
former Soviet Union,
0.89634
94
B- I- I- has primarily targeted entities in the U.S., Europe, and the countries of the former Soviet Union, including B-, B-, B- I-, B- I-, and B- and B- opposed to the current Russian Government .
284
LOC
U.S., Europe,
0.740568
95
B- I- I- has primarily targeted entities in the U.S., Europe, and the countries of the former Soviet Union, including B- and B-, B- I-, B- I-, and B- and B- opposed to the current Russian Government .
285
LOC
former Soviet Union,
0.894705
95
B- I- I- has primarily targeted entities in the U.S., Europe, and the countries of the former Soviet Union, including B- and B-, B- I-, B- I-, and B- and B- opposed to the current Russian Government .
286
LOC
Russia
0.915347
96
Over the past two years, Russia appears to have increasingly leveraged B-Hack to conduct information operations commensurate with broader strategic military doctrine .
287
MAL
B-Hack
0.899916
96
Over the past two years, Russia appears to have increasingly leveraged B-Hack to conduct information operations commensurate with broader strategic military doctrine .
288
TIME
December 29, 2016,
0.937193
99
On December 29, 2016, the Department of Homeland Security (DHS) and Federal Bureau of Investigation (FBI) released a Joint Analysis Report confirming FireEye's long held public assessment that the Russian Government sponsors B-Hack .
289
SECTEAM
Department of Homeland Security (DHS)
0.601647
99
On December 29, 2016, the Department of Homeland Security (DHS) and Federal Bureau of Investigation (FBI) released a Joint Analysis Report confirming FireEye's long held public assessment that the Russian Government sponsors B-Hack .
290
IDTY
Federal Bureau of Investigation (FBI)
0.547874
99
On December 29, 2016, the Department of Homeland Security (DHS) and Federal Bureau of Investigation (FBI) released a Joint Analysis Report confirming FireEye's long held public assessment that the Russian Government sponsors B-Hack .
291
SECTEAM
FireEye's
0.928563
99
On December 29, 2016, the Department of Homeland Security (DHS) and Federal Bureau of Investigation (FBI) released a Joint Analysis Report confirming FireEye's long held public assessment that the Russian Government sponsors B-Hack .
292
TIME
October 2014,
0.927198
100
In October 2014, FireEye released B-Hack: A Window into Russia's B- I- I-, and characterized B-Hack's B- as aligning with the Russian Government's strategic intelligence requirements .
293
SECTEAM
FireEye
0.922078
100
In October 2014, FireEye released B-Hack: A Window into Russia's B- I- I-, and characterized B-Hack's B- as aligning with the Russian Government's strategic intelligence requirements .
294
TIME
October 2014,
0.925396
101
In October 2014, FireEye released B-Hack: A Window into Russia's Cyber Espionage Operations', and characterized B-Hack's B- as aligning with the Russian Government's strategic intelligence requirements .
295
SECTEAM
FireEye
0.922046
101
In October 2014, FireEye released B-Hack: A Window into Russia's Cyber Espionage Operations', and characterized B-Hack's B- as aligning with the Russian Government's strategic intelligence requirements .
296
LOC
Russia's
0.794116
101
In October 2014, FireEye released B-Hack: A Window into Russia's Cyber Espionage Operations', and characterized B-Hack's B- as aligning with the Russian Government's strategic intelligence requirements .
297
ACT
Cyber Espionage
0.889737
101
In October 2014, FireEye released B-Hack: A Window into Russia's Cyber Espionage Operations', and characterized B-Hack's B- as aligning with the Russian Government's strategic intelligence requirements .
298
ACT
B-Hack
0.824309
102
B-Hack targets Russian B- and B- Pussy Riot via spear-phishing emails .
299
ACT
spear-phishing
0.920426
102
B-Hack targets Russian B- and B- Pussy Riot via spear-phishing emails .
300
TOOL
emails
0.896535
102
B-Hack targets Russian B- and B- Pussy Riot via spear-phishing emails .
301
IDTY
WADA's
0.908918
103
Our investigation of B-Hack's compromise of WADA's network, and our observations of the surrounding events reveal how Russia sought to counteract a damaging narrative and delegitimize the institutions leveling criticism .
302
LOC
Russia
0.915448
103
Our investigation of B-Hack's compromise of WADA's network, and our observations of the surrounding events reveal how Russia sought to counteract a damaging narrative and delegitimize the institutions leveling criticism .
303
TIME
2014
0.92063
104
Since releasing our 2014 report, we continue to assess that B-Hack is sponsored by the Russian Government .
304
APT
B-Hack
0.911673
104
Since releasing our 2014 report, we continue to assess that B-Hack is sponsored by the Russian Government .
305
IDTY
Russian Government
0.493908
104
Since releasing our 2014 report, we continue to assess that B-Hack is sponsored by the Russian Government .
306
TIME
2014
0.923187
105
In our 2014 report, we identified B-Hack as a suspected Russian government-sponsored B-Hack I-Hack .
307
TIME
2014
0.917499
106
For full details, please reference our 2014 report, B-Hack: A Window into Russia's B- I- I- .
308
LOC
Russia's
0.738661
106
For full details, please reference our 2014 report, B-Hack: A Window into Russia's B- I- I- .
309
LOC
U.S.
0.921926
107
The B-Hack I-Hack, which according to the U.S.
310