Dataset Viewer
Auto-converted to Parquet Duplicate
id
int64
1
978
title
stringlengths
1
120
start_line
int64
59
237k
end_line
int64
132
237k
lines
int64
30
3.31k
path
stringlengths
27
27
text
stringlengths
577
300k
1
Sofacy Group’s Parallel Attacks .
59
132
74
data/reports_final/0001.txt
Sofacy Group’s Parallel Attacks . The Sofacy group remains a persistent global threat . Unit 42 and others have shown in the first half of 2018 how this threat actor group continues to target multiple organizations throughout the world with a strong emphasis on government , diplomatic and other strategic organizations ...
2
Sofacy Uses DealersChoice to Target European Government Agency .
133
193
61
data/reports_final/0002.txt
Sofacy Uses DealersChoice to Target European Government Agency . Back in October 2016 , Unit 42 published an initial analysis on a Flash exploitation framework used by the Sofacy threat group called DealersChoice . The attack consisted of Microsoft Word delivery documents that contained Adobe Flash objects capable of l...
3
Corporate IoT – a path to intrusion .
194
285
92
data/reports_final/0003.txt
Corporate IoT – a path to intrusion . Several sources estimate that by the year 2020 some 50 billion IoT devices will be deployed worldwide . IoT devices are purposefully designed to connect to a network and many are simply connected to the internet with little management or oversight . Such devices still must be ident...
4
Sofacy Attacks Multiple Government Entities .
286
384
99
data/reports_final/0004.txt
Sofacy Attacks Multiple Government Entities . Release_Time : 2018-02-28Report_URL : https://unit42.paloaltonetworks.com/unit42-sofacy-attacks-multiple-government-entities/The Sofacy group ( AKA APT28 , Fancy Bear , STRONTIUM , Sednit , Tsar Team , Pawn Storm ) is a well-known adversary that remains highly active in the...
5
Sofacy Continues Global Attacks and Wheels Out New Cannon Trojan .
385
471
87
data/reports_final/0005.txt
Sofacy Continues Global Attacks and Wheels Out New Cannon Trojan . Release_Time : 2018-11-20Report_URL : https://unit42.paloaltonetworks.com/unit42-sofacy-continues-global-attacks-wheels-new-cannon-trojan/In late October and early November 2018 , Unit 42 intercepted a series of weaponized documents that use a technique...
6
THE DUKES 7 YEARS OF RUSSIAN CYBERESPIONAGE .
472
638
167
data/reports_final/0006.txt
THE DUKES 7 YEARS OF RUSSIAN CYBERESPIONAGE . The Dukes are a well-resourced , highly dedicated and organized cyberespionage group that we believe has been working for the Russian Federation since at least 2008 to collect intelligence in support of foreign and security policy decision-making . The Dukes primarily targe...
7
2015 : The Dukes up the ante .
664
704
41
data/reports_final/0007.txt
2015 : The Dukes up the ante . The end of January 2015 saw the start of the most high- volume Duke campaign seen thus far , with thousands of recipients being sent spear-phishing emails that contained links to compromised websites hosting CozyDuke . Curiously , the spear-phishing emails were strikingly similar to the ...
8
2015 : Continuing surgical strikes with CosmicDuke .
705
754
50
data/reports_final/0008.txt
2015 : Continuing surgical strikes with CosmicDuke . In addition to the notably overt and large-scale campaigns with CozyDuke and CloudDuke , the Dukes also continued to engage in more covert , surgical campaigns using CosmicDuke . The latest of these campaigns that we are aware of occurred during the spring and early...
9
Malware Testing Environment Tied to TEMP.Veles .
772
853
82
data/reports_final/0009.txt
Malware Testing Environment Tied to TEMP.Veles . We identified a malware testing environment that we assess with high confidence was used to refine some TEMP.Veles tools . At times , the use of this malware testing environment correlates to in-network activities of TEMP.Veles , demonstrating direct operational support ...
10
Threat Group 3390 Cyberespionage .
854
976
123
data/reports_final/0010.txt
Threat Group 3390 Cyberespionage . Dell SecureWorks Counter Threat Unit (TM ) ( CTU ) researchers investigated activities associated with Threat Group-3390 ( TG-3390 ) . Analysis of TG-3390 's operations , targeting , and tools led CTU researchers to assess with moderate confidence the group is located in the People's ...
11
APT Targets Financial Analysts with CVE-2017-0199 .
977
1,016
40
data/reports_final/0011.txt
APT Targets Financial Analysts with CVE-2017-0199 . On April 20 , Proofpoint observed a targeted campaign focused on financial analysts working at top global financial firms operating in Russia and neighboring countries . These analysts were linked by their coverage of the telecommunications industry , making this targ...
12
Suckfly : Revealing the secret life of your code signing certificates .
1,017
1,160
144
data/reports_final/0012.txt
Suckfly : Revealing the secret life of your code signing certificates . Release_Time : 2016-03-15 Report_URL : https://community.broadcom.com/symantecenterprise/communities/community-home/librarydocuments/viewdocument?DocumentKey=62e325ae-f551-4855-b9cf-28a7d52d1534&CommunityKey=1ecf5f55-9545-44d6-b0f4-4e4a7f5f5e68&tab...
13
THE DUKES 7 YEARS OF RUSSIAN CYBERESPIONAGE .
1,161
1,258
98
data/reports_final/0013.txt
THE DUKES 7 YEARS OF RUSSIAN CYBERESPIONAGE . TOOLS AND TECHNIQUES OF THE DUKES . PINCHDUKE : First known activity November 2008 , Most recent known activity Summer 2010 , C&C communication methods HTTP(S) , Known toolset components Multiple loaders , Information stealer . The PinchDuke toolset consists of multiple loa...
End of preview. Expand in Data Studio
README.md exists but content is empty.
Downloads last month
61