Type stringclasses 20
values | Text stringlengths 1 236 | Score float64 0.18 0.97 | Original Sentence ID int64 0 663 | Original Sentence stringlengths 823 2.47k | __index_level_0__ int64 1 17.4k |
|---|---|---|---|---|---|
MAL | RATs | 0.916168 | 0 | The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China . Multiple China-based B-Hack I-Ha... | 1 |
MAL | Poison Ivy, | 0.793064 | 0 | The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China . Multiple China-based B-Hack I-Ha... | 2 |
MAL | non-public backdoors | 0.865846 | 0 | The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China . Multiple China-based B-Hack I-Ha... | 3 |
LOC | Hong Kong | 0.882876 | 0 | The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China . Multiple China-based B-Hack I-Ha... | 5 |
LOC | China | 0.90018 | 0 | The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China . Multiple China-based B-Hack I-Ha... | 7 |
LOC | China-based | 0.896986 | 0 | The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China . Multiple China-based B-Hack I-Ha... | 8 |
APT | B-Hack I-Hack I-Hack | 0.667352 | 0 | The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China . Multiple China-based B-Hack I-Ha... | 9 |
TIME | August 2015, | 0.895174 | 0 | The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China . Multiple China-based B-Hack I-Ha... | 11 |
APT | B-Hack I-Hack | 0.919357 | 0 | The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China . Multiple China-based B-Hack I-Ha... | 16 |
TOOL | emails | 0.929184 | 0 | The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China . Multiple China-based B-Hack I-Ha... | 18 |
APT | B-Hack | 0.920107 | 0 | The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China . Multiple China-based B-Hack I-Ha... | 20 |
ACT | spear phishing | 0.931238 | 0 | The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China . Multiple China-based B-Hack I-Ha... | 24 |
LOC | Western | 0.848532 | 0 | The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China . Multiple China-based B-Hack I-Ha... | 26 |
MAL | LOWBALL malware | 0.835351 | 0 | The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China . Multiple China-based B-Hack I-Ha... | 27 |
FILE | upload.bat | 0.924361 | 0 | The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China . Multiple China-based B-Hack I-Ha... | 30 |
MAL | BUBBLEWRAP | 0.898728 | 0 | The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China . Multiple China-based B-Hack I-Ha... | 32 |
MAL | Backdoor.APT.FakeWinHTTPHelper) | 0.894809 | 0 | The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China . Multiple China-based B-Hack I-Ha... | 33 |
TOOL | Dropbox | 0.917587 | 0 | The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China . Multiple China-based B-Hack I-Ha... | 34 |
APT | B-Hack I-Hack | 0.594081 | 1 | We have previously observed the B-Hack I-Hack use BUBBLEWRAP . The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets . The B-Hack linked to China and alleged to ... | 35 |
MAL | BUBBLEWRAP | 0.904569 | 1 | We have previously observed the B-Hack I-Hack use BUBBLEWRAP . The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets . The B-Hack linked to China and alleged to ... | 36 |
MAL | LOWBALL | 0.908619 | 1 | We have previously observed the B-Hack I-Hack use BUBBLEWRAP . The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets . The B-Hack linked to China and alleged to ... | 37 |
LOC | China | 0.928306 | 1 | We have previously observed the B-Hack I-Hack use BUBBLEWRAP . The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets . The B-Hack linked to China and alleged to ... | 41 |
LOC | Hong Kong | 0.892855 | 1 | We have previously observed the B-Hack I-Hack use BUBBLEWRAP . The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets . The B-Hack linked to China and alleged to ... | 47 |
MAL | remote access Trojans | 0.856725 | 1 | We have previously observed the B-Hack I-Hack use BUBBLEWRAP . The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets . The B-Hack linked to China and alleged to ... | 54 |
MAL | Poison Ivy | 0.868136 | 1 | We have previously observed the B-Hack I-Hack use BUBBLEWRAP . The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets . The B-Hack linked to China and alleged to ... | 55 |
APT | B-Hack, | 0.915825 | 1 | We have previously observed the B-Hack I-Hack use BUBBLEWRAP . The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets . The B-Hack linked to China and alleged to ... | 56 |
TIME | 2008, | 0.876563 | 1 | We have previously observed the B-Hack I-Hack use BUBBLEWRAP . The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets . The B-Hack linked to China and alleged to ... | 57 |
TIME | August 2013, | 0.801381 | 1 | We have previously observed the B-Hack I-Hack use BUBBLEWRAP . The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets . The B-Hack linked to China and alleged to ... | 59 |
SECTEAM | FireEye | 0.93383 | 1 | We have previously observed the B-Hack I-Hack use BUBBLEWRAP . The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets . The B-Hack linked to China and alleged to ... | 60 |
MAL | Poison Ivy RAT | 0.837977 | 1 | We have previously observed the B-Hack I-Hack use BUBBLEWRAP . The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets . The B-Hack linked to China and alleged to ... | 62 |
TIME | March 2014, | 0.915978 | 1 | We have previously observed the B-Hack I-Hack use BUBBLEWRAP . The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets . The B-Hack linked to China and alleged to ... | 63 |
APT | B-Hack | 0.918766 | 1 | We have previously observed the B-Hack I-Hack use BUBBLEWRAP . The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets . The B-Hack linked to China and alleged to ... | 64 |
LOC | Asia-Pacific | 0.918388 | 1 | We have previously observed the B-Hack I-Hack use BUBBLEWRAP . The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets . The B-Hack linked to China and alleged to ... | 65 |
LOC | US-based | 0.600505 | 1 | We have previously observed the B-Hack I-Hack use BUBBLEWRAP . The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets . The B-Hack linked to China and alleged to ... | 66 |
TIME | March 2014, | 0.924031 | 2 | In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of... | 67 |
LOC | Asia-Pacific | 0.909832 | 2 | In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of... | 69 |
LOC | US-based | 0.858964 | 2 | In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of... | 70 |
SECTEAM | FireEye, | 0.927181 | 2 | In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of... | 71 |
VULNAME | exploit | 0.9238 | 2 | In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of... | 74 |
VULNAME | vulnerabilities | 0.916563 | 2 | In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of... | 76 |
MAL | LOWBALL | 0.85389 | 2 | In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of... | 77 |
TOOL | emails | 0.920506 | 2 | In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of... | 80 |
IDTY | Microsoft Office | 0.782646 | 2 | In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of... | 82 |
APT | B-Hack's | 0.885879 | 2 | In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of... | 85 |
TOOL | Dropbox | 0.918949 | 2 | In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of... | 86 |
MAL | BUBBLEWRAP | 0.909308 | 2 | In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of... | 87 |
LOC | China-based | 0.917493 | 2 | In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of... | 88 |
APT | B-Hack I-Hack | 0.891355 | 2 | In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of... | 89 |
APT | B-Hack | 0.92341 | 2 | In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of... | 91 |
LOC | Hong Kong | 0.902223 | 2 | In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of... | 92 |
LOC | Chinese-based | 0.632044 | 2 | In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of... | 94 |
ACT | spear phishing | 0.926458 | 2 | In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of... | 95 |
TOOL | emails, | 0.927084 | 2 | In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of... | 96 |
LOC | Asia-Pacific, | 0.9114 | 2 | In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of... | 98 |
MAL | Poison Ivy RAT | 0.80449 | 2 | In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of... | 104 |
MAL | WinHTTPHelper malware | 0.903471 | 2 | In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of... | 105 |
SECTEAM | FireEye | 0.929927 | 2 | In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of... | 106 |
MAL | Poison Ivy: | 0.791696 | 2 | In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of... | 108 |
APT | B- | 0.607578 | 3 | The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 201... | 109 |
LOC | US-based | 0.875324 | 3 | The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 201... | 111 |
TIME | 14th March | 0.857223 | 3 | The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 201... | 112 |
LOC | China's | 0.873347 | 3 | The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 201... | 114 |
SECTEAM | FireEye | 0.920285 | 3 | The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 201... | 115 |
APT | B-Hack's B- | 0.818463 | 3 | The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 201... | 116 |
TIME | 2013 | 0.925641 | 3 | The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 201... | 117 |
LOC | China, | 0.910671 | 3 | The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 201... | 120 |
LOC | Shanghai | 0.917137 | 3 | The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 201... | 121 |
LOC | Chinese | 0.663982 | 3 | The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 201... | 124 |
APT | B-Hack | 0.916998 | 3 | The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 201... | 126 |
MAL | BISCUIT | 0.913322 | 3 | The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 201... | 127 |
TIME | 2007 | 0.913254 | 3 | The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 201... | 128 |
MAL | publicly available backdoors | 0.776662 | 3 | The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 201... | 130 |
MAL | Poison Ivy | 0.864085 | 3 | The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 201... | 131 |
MAL | Gh0st RAT | 0.86629 | 3 | The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 201... | 132 |
LOC | China | 0.922848 | 3 | The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 201... | 136 |
LOC | China-based | 0.819334 | 3 | The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 201... | 138 |
TIME | mid-2006 | 0.919992 | 3 | The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 201... | 139 |
APT | B-Hack's | 0.912064 | 4 | B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack .... | 140 |
IDTY | People's Republic of China (PRC) | 0.774124 | 4 | B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack .... | 141 |
SECTEAM | Arbor | 0.932183 | 4 | B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack .... | 142 |
MAL | HIGHTIDE | 0.911907 | 4 | B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack .... | 145 |
MAL | HIGHTIDE backdoor | 0.867069 | 4 | B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack .... | 147 |
TIME | October 2012 | 0.924463 | 4 | B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack .... | 149 |
TIME | May 2014, | 0.930449 | 4 | B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack .... | 150 |
SECTEAM | FireEye | 0.925909 | 4 | B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack .... | 151 |
MAL | RIPTIDE, | 0.898205 | 4 | B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack .... | 153 |
PROT | HTTP | 0.45017 | 4 | B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack .... | 154 |
IDTY | Microsoft | 0.80128 | 4 | B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack .... | 157 |
TOOL | Word | 0.638341 | 4 | B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack .... | 158 |
VULID | CVE-2012-0158 | 0.928563 | 4 | B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack .... | 159 |
MAL | RIPTIDE | 0.91327 | 4 | B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack .... | 161 |
APT | They | 0.903133 | 4 | B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack .... | 164 |
MAL | RATs | 0.922553 | 4 | B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack .... | 165 |
MAL | Poison Ivy, | 0.892746 | 4 | B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack .... | 166 |
MAL | non-public backdoors | 0.883322 | 4 | B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack .... | 167 |
LOC | China-based | 0.922436 | 4 | B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack .... | 168 |
ACT | spear phishing | 0.924581 | 4 | B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack .... | 172 |
TOOL | emails | 0.913341 | 4 | B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack .... | 173 |
LOC | Western B- | 0.889426 | 4 | B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack .... | 174 |
APT | B-Hack | 0.922416 | 4 | B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack .... | 175 |
End of preview. Expand in Data Studio
README.md exists but content is empty.
- Downloads last month
- 2