Type stringclasses 20 values | Text stringlengths 1 236 | Score float64 0.22 0.96 | Original Sentence ID int64 0 6.64k | Original Sentence stringlengths 6 383 | __index_level_0__ int64 0 16.8k |
|---|---|---|---|---|---|
TOOL | TechNet | 0.61833 | 63 | B-Hack was embedding the encoded CnC IP address for the BLACKCOFFEE malware in legitimate Microsoft TechNet profiles pages and forum threads, a method some in the information security community call a " dead drop resolver " . | 206 |
SECTEAM | information security community | 0.848976 | 63 | B-Hack was embedding the encoded CnC IP address for the BLACKCOFFEE malware in legitimate Microsoft TechNet profiles pages and forum threads, a method some in the information security community call a " dead drop resolver " . | 207 |
LOC | China-based | 0.918694 | 64 | B-Hack, also known as B-Hack, is a China-based B-Hack I-Hack that FireEye Intelligence has observed conducting network intrusions against U.S. | 208 |
SECTEAM | FireEye | 0.922124 | 64 | B-Hack, also known as B-Hack, is a China-based B-Hack I-Hack that FireEye Intelligence has observed conducting network intrusions against U.S. | 209 |
LOC | U.S. | 0.924429 | 64 | B-Hack, also known as B-Hack, is a China-based B-Hack I-Hack that FireEye Intelligence has observed conducting network intrusions against U.S. | 210 |
SECTEAM | FireEye | 0.912845 | 66 | FireEye has monitored B-Hack's use of BLACKCOFFEE variants since 2013 to masquerade malicious communication as normal web traffic by disguising the CnC communication as queries to web search engines . | 211 |
APT | B-Hack's | 0.920857 | 66 | FireEye has monitored B-Hack's use of BLACKCOFFEE variants since 2013 to masquerade malicious communication as normal web traffic by disguising the CnC communication as queries to web search engines . | 212 |
MAL | BLACKCOFFEE | 0.91427 | 66 | FireEye has monitored B-Hack's use of BLACKCOFFEE variants since 2013 to masquerade malicious communication as normal web traffic by disguising the CnC communication as queries to web search engines . | 213 |
TIME | since 2013 | 0.577488 | 66 | FireEye has monitored B-Hack's use of BLACKCOFFEE variants since 2013 to masquerade malicious communication as normal web traffic by disguising the CnC communication as queries to web search engines . | 214 |
MAL | BLACKCOFFEE | 0.914274 | 67 | The use of BLACKCOFFEE demonstrates B-Hack's evolving use of public websites to hide in plain sight . | 215 |
APT | B-Hack's | 0.922854 | 67 | The use of BLACKCOFFEE demonstrates B-Hack's evolving use of public websites to hide in plain sight . | 216 |
ACT | B-Hack | 0.303761 | 68 | B-Hack is a stealthy and extremely successful B-Hack I-Hack I-Hack (B-Hack) I-Hack known to target a broad range of verticals since at least 2009, including B-, B-, B-, B- I- I-, B-, B-, and B- I- . | 217 |
TIME | 2009, | 0.836992 | 68 | B-Hack is a stealthy and extremely successful B-Hack I-Hack I-Hack (B-Hack) I-Hack known to target a broad range of verticals since at least 2009, including B-, B-, B-, B- I- I-, B-, B-, and B- I- . | 218 |
APT | B-Hack | 0.676008 | 69 | The B-Hack then installed the hcdLoader RAT, which installs as a Windows service and provides command line access to the compromised system . | 219 |
MAL | hcdLoader | 0.913766 | 69 | The B-Hack then installed the hcdLoader RAT, which installs as a Windows service and provides command line access to the compromised system . | 220 |
OS | Windows | 0.858309 | 69 | The B-Hack then installed the hcdLoader RAT, which installs as a Windows service and provides command line access to the compromised system . | 221 |
ACT | B-Hack I-Hack | 0.809356 | 70 | The malware used by the B-Hack I-Hack has ties to the HTTPBrowser malware family, and uses DNS requests as a command and control mechanism . | 222 |
MAL | HTTPBrowser malware family, | 0.842611 | 70 | The malware used by the B-Hack I-Hack has ties to the HTTPBrowser malware family, and uses DNS requests as a command and control mechanism . | 223 |
PROT | DNS | 0.821493 | 70 | The malware used by the B-Hack I-Hack has ties to the HTTPBrowser malware family, and uses DNS requests as a command and control mechanism . | 224 |
MAL | HTTPBrowser, | 0.904245 | 71 | These URIs result in the download of an installer, which creates a PE of the malware typically known as HTTPBrowser, but called Token Control by the B-Hack I-Hack themselves (based upon the PDB strings found within many of the samples). | 225 |
MAL | Token Control | 0.845288 | 71 | These URIs result in the download of an installer, which creates a PE of the malware typically known as HTTPBrowser, but called Token Control by the B-Hack I-Hack themselves (based upon the PDB strings found within many of the samples). | 226 |
APT | B-Hack I-Hack | 0.884912 | 71 | These URIs result in the download of an installer, which creates a PE of the malware typically known as HTTPBrowser, but called Token Control by the B-Hack I-Hack themselves (based upon the PDB strings found within many of the samples). | 227 |
TOOL | PDB | 0.842952 | 71 | These URIs result in the download of an installer, which creates a PE of the malware typically known as HTTPBrowser, but called Token Control by the B-Hack I-Hack themselves (based upon the PDB strings found within many of the samples). | 228 |
APT | B-Hack | 0.758197 | 72 | B-Hack seemed to be going after B- I- I-, Chinese dissident groups and B-, B-, B- and B- I- that could benefit the Chinese economy . | 229 |
LOC | Chinese | 0.769061 | 72 | B-Hack seemed to be going after B- I- I-, Chinese dissident groups and B-, B-, B- and B- I- that could benefit the Chinese economy . | 231 |
APT | B-Hack | 0.80142 | 73 | B-Hack seemed to be going after B- I- I-, Chinese dissident groups and other B- target, as well as certain B- targets and other B- targets in B- and B- I- that could benefit the Chinese economy . | 232 |
MAL | B- | 0.794071 | 73 | B-Hack seemed to be going after B- I- I-, Chinese dissident groups and other B- target, as well as certain B- targets and other B- targets in B- and B- I- that could benefit the Chinese economy . | 235 |
LOC | Chinese | 0.867158 | 73 | B-Hack seemed to be going after B- I- I-, Chinese dissident groups and other B- target, as well as certain B- targets and other B- targets in B- and B- I- that could benefit the Chinese economy . | 237 |
TIME | mid 2000s, | 0.900802 | 74 | B-Hack I-Hack (also known as B-Hack or B-Hack I-Hack) is a separate Russian-based B-Hack I-Hack, which has been active since mid 2000s, and has been responsible for targeted B- I- against the B-, B-, B-, B- and B- I- . | 238 |
MAL | APT28 malware, | 0.90717 | 75 | APT28 malware, in particular the family of modular backdoors that we call CHOPSTICK, indicates a formal code development environment . | 239 |
MAL | CHOPSTICK, | 0.910166 | 75 | APT28 malware, in particular the family of modular backdoors that we call CHOPSTICK, indicates a formal code development environment . | 240 |
APT | B-Hack's | 0.673925 | 76 | However, three themes in B-Hack's targeting clearly reflects areas of specific interest to an Eastern European B-, most likely the Russian government . | 241 |
LOC | Eastern European | 0.852436 | 76 | However, three themes in B-Hack's targeting clearly reflects areas of specific interest to an Eastern European B-, most likely the Russian government . | 242 |
IDTY | Russian government | 0.901052 | 76 | However, three themes in B-Hack's targeting clearly reflects areas of specific interest to an Eastern European B-, most likely the Russian government . | 243 |
IDTY | Russian government | 0.896909 | 77 | We identified three themes in B-Hack's lures and registered domains, which together are particularly relevant to the Russian government . | 244 |
LOC | U.S. | 0.922411 | 78 | Georgian military security issues, particularly with regard to U.S. | 245 |
ACT | B-Hack I-Hack | 0.584263 | 79 | cooperation and NATO, provide a strong incentive for Russian state-sponsored B-Hack I-Hack to steal information that sheds light on these topics . | 246 |
MAL | B-Hack I-Hack | 0.506762 | 80 | Instead, we observed the two Russian B-Hack I-Hack compromise the same systems and engage separately in the theft of identical credentials . | 247 |
LOC | Russian | 0.468245 | 81 | B-Hack's malware settings suggest that the developers have done the majority of their work in a Russian language build environment during Russian business hours, which suggests that the Russian government is B-Hack's sponsor . | 249 |
IDTY | Russian government | 0.905668 | 81 | B-Hack's malware settings suggest that the developers have done the majority of their work in a Russian language build environment during Russian business hours, which suggests that the Russian government is B-Hack's sponsor . | 250 |
APT | B-Hack's | 0.744548 | 81 | B-Hack's malware settings suggest that the developers have done the majority of their work in a Russian language build environment during Russian business hours, which suggests that the Russian government is B-Hack's sponsor . | 251 |
APT | B-Hack's | 0.913734 | 82 | We believe that B-Hack's targeting of the MOD aligns with Russian threat perceptions . | 252 |
LOC | Russian | 0.688372 | 82 | We believe that B-Hack's targeting of the MOD aligns with Russian threat perceptions . | 253 |
APT | B-Hack | 0.774854 | 83 | We assess that B-Hack is most likely sponsored by the Russian government . | 254 |
IDTY | Russian government | 0.886808 | 83 | We assess that B-Hack is most likely sponsored by the Russian government . | 255 |
APT | B-Hack's | 0.874217 | 84 | Given the available data, we assess that B-Hack's work is sponsored by the Russian government . | 256 |
IDTY | Russian government | 0.893891 | 84 | Given the available data, we assess that B-Hack's work is sponsored by the Russian government . | 257 |
TIME | 2015 | 0.921066 | 85 | The targets were similar to a 2015 B- I- — individuals in Russia and the former Soviet states, current and former B- and B- I- in the U.S. | 258 |
LOC | Russia | 0.874442 | 85 | The targets were similar to a 2015 B- I- — individuals in Russia and the former Soviet states, current and former B- and B- I- in the U.S. | 259 |
LOC | former Soviet | 0.787211 | 85 | The targets were similar to a 2015 B- I- — individuals in Russia and the former Soviet states, current and former B- and B- I- in the U.S. | 260 |
LOC | U.S. | 0.762665 | 85 | The targets were similar to a 2015 B- I- — individuals in Russia and the former Soviet states, current and former B- and B- I- in the U.S. | 261 |
LOC | Europe, | 0.896074 | 86 | and Europe, individuals working in the B- and B- supply chain, and B- and B- — but also included email accounts linked to the November 2016 United States presidential election . | 262 |
TOOL | email | 0.889094 | 86 | and Europe, individuals working in the B- and B- supply chain, and B- and B- — but also included email accounts linked to the November 2016 United States presidential election . | 263 |
TIME | November 2016 | 0.921192 | 86 | and Europe, individuals working in the B- and B- supply chain, and B- and B- — but also included email accounts linked to the November 2016 United States presidential election . | 264 |
LOC | United States | 0.846429 | 86 | and Europe, individuals working in the B- and B- supply chain, and B- and B- — but also included email accounts linked to the November 2016 United States presidential election . | 265 |
ACT | B-Hack | 0.416347 | 87 | The targets of B-Hack include B-, B- and B- I- . | 266 |
APT | B-Hack's | 0.898069 | 88 | Some of B-Hack's more commonly used tools are the SOURFACE downloader, its second stage backdoor EVILTOSS, and a modular family of implants that we call CHOPSTICK . | 267 |
MAL | SOURFACE downloader, | 0.858043 | 88 | Some of B-Hack's more commonly used tools are the SOURFACE downloader, its second stage backdoor EVILTOSS, and a modular family of implants that we call CHOPSTICK . | 268 |
MAL | EVILTOSS, | 0.90086 | 88 | Some of B-Hack's more commonly used tools are the SOURFACE downloader, its second stage backdoor EVILTOSS, and a modular family of implants that we call CHOPSTICK . | 269 |
MAL | modular family of implants | 0.863918 | 88 | Some of B-Hack's more commonly used tools are the SOURFACE downloader, its second stage backdoor EVILTOSS, and a modular family of implants that we call CHOPSTICK . | 270 |
MAL | CHOPSTICK | 0.909604 | 88 | Some of B-Hack's more commonly used tools are the SOURFACE downloader, its second stage backdoor EVILTOSS, and a modular family of implants that we call CHOPSTICK . | 271 |
ACT | B-Hack | 0.760443 | 89 | While B-Hack continues to primarily threaten organizations and individuals operating in Russia and former Soviet states, this B- illustrates its willingness to expand its scope to other targets that have intelligence of interest to the Russian government . | 272 |
IDTY | Russian government | 0.728142 | 89 | While B-Hack continues to primarily threaten organizations and individuals operating in Russia and former Soviet states, this B- illustrates its willingness to expand its scope to other targets that have intelligence of interest to the Russian government . | 273 |
SECTEAM | CTU | 0.920593 | 90 | CTU researchers assess with moderate confidence that the B-Hack is operating from the Russian Federation and is gathering intelligence on behalf of the Russian government . | 274 |
MAL | B-Hack | 0.479356 | 90 | CTU researchers assess with moderate confidence that the B-Hack is operating from the Russian Federation and is gathering intelligence on behalf of the Russian government . | 275 |
LOC | Russian | 0.464856 | 90 | CTU researchers assess with moderate confidence that the B-Hack is operating from the Russian Federation and is gathering intelligence on behalf of the Russian government . | 276 |
IDTY | Russian government | 0.732819 | 90 | CTU researchers assess with moderate confidence that the B-Hack is operating from the Russian Federation and is gathering intelligence on behalf of the Russian government . | 277 |
ACT | B-Hack | 0.474059 | 91 | This intelligence has been critical to protecting and informing our clients, exposing this threat, and strengthening our confidence in attributing B-Hack to the Russian Government . | 278 |
ACT | B-Hack | 0.84273 | 92 | Our visibility into the operations of B-Hack - a B-Hack we believe the Russian Government sponsors - has given us insight into some of the B-'s targets, as well as its objectives and the B- designed to further them . | 279 |
APT | B-'s | 0.727609 | 92 | Our visibility into the operations of B-Hack - a B-Hack we believe the Russian Government sponsors - has given us insight into some of the B-'s targets, as well as its objectives and the B- designed to further them . | 280 |
TIME | 2007, | 0.911657 | 93 | Since at least 2007, B-Hack has engaged in extensive operations in support of Russian strategic interests . | 281 |
APT | B-Hack | 0.893634 | 93 | Since at least 2007, B-Hack has engaged in extensive operations in support of Russian strategic interests . | 282 |
LOC | U.S., Europe, | 0.761872 | 94 | B- I- I- has primarily targeted entities in the U.S., Europe, and the countries of the former Soviet Union, including B-, B-, B- I-, B- I-, and B- and B- opposed to the current Russian Government . | 283 |
LOC | former Soviet Union, | 0.89634 | 94 | B- I- I- has primarily targeted entities in the U.S., Europe, and the countries of the former Soviet Union, including B-, B-, B- I-, B- I-, and B- and B- opposed to the current Russian Government . | 284 |
LOC | U.S., Europe, | 0.740568 | 95 | B- I- I- has primarily targeted entities in the U.S., Europe, and the countries of the former Soviet Union, including B- and B-, B- I-, B- I-, and B- and B- opposed to the current Russian Government . | 285 |
LOC | former Soviet Union, | 0.894705 | 95 | B- I- I- has primarily targeted entities in the U.S., Europe, and the countries of the former Soviet Union, including B- and B-, B- I-, B- I-, and B- and B- opposed to the current Russian Government . | 286 |
LOC | Russia | 0.915347 | 96 | Over the past two years, Russia appears to have increasingly leveraged B-Hack to conduct information operations commensurate with broader strategic military doctrine . | 287 |
MAL | B-Hack | 0.899916 | 96 | Over the past two years, Russia appears to have increasingly leveraged B-Hack to conduct information operations commensurate with broader strategic military doctrine . | 288 |
TIME | December 29, 2016, | 0.937193 | 99 | On December 29, 2016, the Department of Homeland Security (DHS) and Federal Bureau of Investigation (FBI) released a Joint Analysis Report confirming FireEye's long held public assessment that the Russian Government sponsors B-Hack . | 289 |
SECTEAM | Department of Homeland Security (DHS) | 0.601647 | 99 | On December 29, 2016, the Department of Homeland Security (DHS) and Federal Bureau of Investigation (FBI) released a Joint Analysis Report confirming FireEye's long held public assessment that the Russian Government sponsors B-Hack . | 290 |
IDTY | Federal Bureau of Investigation (FBI) | 0.547874 | 99 | On December 29, 2016, the Department of Homeland Security (DHS) and Federal Bureau of Investigation (FBI) released a Joint Analysis Report confirming FireEye's long held public assessment that the Russian Government sponsors B-Hack . | 291 |
SECTEAM | FireEye's | 0.928563 | 99 | On December 29, 2016, the Department of Homeland Security (DHS) and Federal Bureau of Investigation (FBI) released a Joint Analysis Report confirming FireEye's long held public assessment that the Russian Government sponsors B-Hack . | 292 |
TIME | October 2014, | 0.927198 | 100 | In October 2014, FireEye released B-Hack: A Window into Russia's B- I- I-, and characterized B-Hack's B- as aligning with the Russian Government's strategic intelligence requirements . | 293 |
SECTEAM | FireEye | 0.922078 | 100 | In October 2014, FireEye released B-Hack: A Window into Russia's B- I- I-, and characterized B-Hack's B- as aligning with the Russian Government's strategic intelligence requirements . | 294 |
TIME | October 2014, | 0.925396 | 101 | In October 2014, FireEye released B-Hack: A Window into Russia's Cyber Espionage Operations', and characterized B-Hack's B- as aligning with the Russian Government's strategic intelligence requirements . | 295 |
SECTEAM | FireEye | 0.922046 | 101 | In October 2014, FireEye released B-Hack: A Window into Russia's Cyber Espionage Operations', and characterized B-Hack's B- as aligning with the Russian Government's strategic intelligence requirements . | 296 |
LOC | Russia's | 0.794116 | 101 | In October 2014, FireEye released B-Hack: A Window into Russia's Cyber Espionage Operations', and characterized B-Hack's B- as aligning with the Russian Government's strategic intelligence requirements . | 297 |
ACT | Cyber Espionage | 0.889737 | 101 | In October 2014, FireEye released B-Hack: A Window into Russia's Cyber Espionage Operations', and characterized B-Hack's B- as aligning with the Russian Government's strategic intelligence requirements . | 298 |
ACT | B-Hack | 0.824309 | 102 | B-Hack targets Russian B- and B- Pussy Riot via spear-phishing emails . | 299 |
ACT | spear-phishing | 0.920426 | 102 | B-Hack targets Russian B- and B- Pussy Riot via spear-phishing emails . | 300 |
TOOL | emails | 0.896535 | 102 | B-Hack targets Russian B- and B- Pussy Riot via spear-phishing emails . | 301 |
IDTY | WADA's | 0.908918 | 103 | Our investigation of B-Hack's compromise of WADA's network, and our observations of the surrounding events reveal how Russia sought to counteract a damaging narrative and delegitimize the institutions leveling criticism . | 302 |
LOC | Russia | 0.915448 | 103 | Our investigation of B-Hack's compromise of WADA's network, and our observations of the surrounding events reveal how Russia sought to counteract a damaging narrative and delegitimize the institutions leveling criticism . | 303 |
TIME | 2014 | 0.92063 | 104 | Since releasing our 2014 report, we continue to assess that B-Hack is sponsored by the Russian Government . | 304 |
APT | B-Hack | 0.911673 | 104 | Since releasing our 2014 report, we continue to assess that B-Hack is sponsored by the Russian Government . | 305 |
IDTY | Russian Government | 0.493908 | 104 | Since releasing our 2014 report, we continue to assess that B-Hack is sponsored by the Russian Government . | 306 |
TIME | 2014 | 0.923187 | 105 | In our 2014 report, we identified B-Hack as a suspected Russian government-sponsored B-Hack I-Hack . | 307 |
TIME | 2014 | 0.917499 | 106 | For full details, please reference our 2014 report, B-Hack: A Window into Russia's B- I- I- . | 308 |
LOC | Russia's | 0.738661 | 106 | For full details, please reference our 2014 report, B-Hack: A Window into Russia's B- I- I- . | 309 |
LOC | U.S. | 0.921926 | 107 | The B-Hack I-Hack, which according to the U.S. | 310 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.