text
stringlengths 284
1.86k
|
---|
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Android services are components that can be made to execute independently in the background without the victim 's knowledge .' [/INST] [Android:B-System, services:O, are:O, components:O, that:O, can:O, be:O, made:O, to:O, execute:O, independently:O, in:O, the:O, background:O, without:O, the:O, victim:O, 's:O, knowledge:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'MainService is the brain of this spyware and controls almost everything—from stealing the victim 's data to deleting it .' [/INST] [MainService:O, is:O, the:O, brain:O, of:O, this:O, spyware:O, and:O, controls:O, almost:O, everything—from:O, stealing:O, the:O, victim:O, 's:O, data:O, to:O, deleting:O, it:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'All of its capabilities are discussed later in this blog .' [/INST] [All:O, of:O, its:O, capabilities:O, are:O, discussed:O, later:O, in:O, this:O, blog:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Hide Icon Figure 3 : Code showing the hiding icon and starting service .' [/INST] [Hide:O, Icon:O, Figure:O, 3:O, ::O, Code:O, showing:O, the:O, hiding:O, icon:O, and:O, starting:O, service:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'As MainService is the main controller , the developer has taken the appropriate actions to keep it functional and running at all times .' [/INST] [As:O, MainService:O, is:O, the:O, main:O, controller:O, ,:O, the:O, developer:O, has:O, taken:O, the:O, appropriate:O, actions:O, to:O, keep:O, it:O, functional:O, and:O, running:O, at:O, all:O, times:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The malware developer uses various tactics to do so , and one of them is using Android 's broadcast receivers .' [/INST] [The:O, malware:O, developer:O, uses:O, various:O, tactics:O, to:O, do:O, so:O, ,:O, and:O, one:O, of:O, them:O, is:O, using:O, Android:B-System, 's:O, broadcast:O, receivers:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Broadcast receivers are components that allow you to register for various Android events .' [/INST] [Broadcast:O, receivers:O, are:O, components:O, that:O, allow:O, you:O, to:O, register:O, for:O, various:O, Android:B-System, events:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In this case , it registers three broadcast receivers : MyReceiver - Triggers when the device is booted .' [/INST] [In:O, this:O, case:O, ,:O, it:O, registers:O, three:O, broadcast:O, receivers:O, ::O, MyReceiver:O, -:O, Triggers:O, when:O, the:O, device:O, is:O, booted:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Intercept Call - Triggers on incoming and outgoing calls .' [/INST] [Intercept:O, Call:O, -:O, Triggers:O, on:O, incoming:O, and:O, outgoing:O, calls:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'AlarmReceiver - Triggers every three minutes .' [/INST] [AlarmReceiver:O, -:O, Triggers:O, every:O, three:O, minutes:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'MyReceiver and AlarmReceiver start the MainService whenever appropriate events occur .' [/INST] [MyReceiver:O, and:O, AlarmReceiver:O, start:O, the:O, MainService:O, whenever:O, appropriate:O, events:O, occur:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'This tactic is very common among malware developers to ensure the malware is not killed by the Android OS or by any other means .' [/INST] [This:O, tactic:O, is:O, very:O, common:O, among:O, malware:O, developers:O, to:O, ensure:O, the:O, malware:O, is:O, not:O, killed:O, by:O, the:O, Android:B-System, OS:O, or:O, by:O, any:O, other:O, means:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Figure 4 shows MyReceiver in action where it eventually calls the MainService service .' [/INST] [Figure:O, 4:O, shows:O, MyReceiver:O, in:O, action:O, where:O, it:O, eventually:O, calls:O, the:O, MainService:O, service:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Broadcast Receiver Figure 4 : MyReceiver broadcast receiver .' [/INST] [Broadcast:O, Receiver:O, Figure:O, 4:O, ::O, MyReceiver:O, broadcast:O, receiver:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The InterceptCall receiver is triggered whenever there is an incoming or outgoing call .' [/INST] [The:O, InterceptCall:O, receiver:O, is:O, triggered:O, whenever:O, there:O, is:O, an:O, incoming:O, or:O, outgoing:O, call:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'It sets particular parameters in relation to call details and a further service named calls takes the control as seen in Figure 5 .' [/INST] [It:O, sets:O, particular:O, parameters:O, in:O, relation:O, to:O, call:O, details:O, and:O, a:O, further:O, service:O, named:O, calls:O, takes:O, the:O, control:O, as:O, seen:O, in:O, Figure:O, 5:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Call Service Figure 5 : Code for the calls service As seen above , the calls service stores incoming call details in .mp3 format in the /sdcard/DCIM/.dat/ directory with file name appended with , In_ '' for incoming calls and , Out_ '' for outgoing calls .' [/INST] [Call:O, Service:O, Figure:O, 5:O, ::O, Code:O, for:O, the:O, calls:O, service:O, As:O, seen:O, above:O, ,:O, the:O, calls:O, service:O, stores:O, incoming:O, call:O, details:O, in:O, .mp3:O, format:O, in:O, the:O, /sdcard/DCIM/.dat/:O, directory:O, with:O, file:O, name:O, appended:O, with:O, ,:O, In_:O, '':O, for:O, incoming:O, calls:O, and:O, ,:O, Out_:O, '':O, for:O, outgoing:O, calls:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'How these recorded calls are sent to the command and control server ( CnC ) is taken care of by MainService , which is discussed next .' [/INST] [How:O, these:O, recorded:O, calls:O, are:O, sent:O, to:O, the:O, command:O, and:O, control:O, server:O, (:O, CnC:O, ):O, is:O, taken:O, care:O, of:O, by:O, MainService:O, ,:O, which:O, is:O, discussed:O, next:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'MainService is the central controller of this spyware .' [/INST] [MainService:O, is:O, the:O, central:O, controller:O, of:O, this:O, spyware:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'It controls each and every functionality based on the commands sent by the command and control ( C & C ) server .' [/INST] [It:O, controls:O, each:O, and:O, every:O, functionality:O, based:O, on:O, the:O, commands:O, sent:O, by:O, the:O, command:O, and:O, control:O, (:O, C:O, &:O, C:O, ):O, server:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'As soon as this service is started , it creates two processes that take care of connection and disconnection to the C & C server .' [/INST] [As:O, soon:O, as:O, this:O, service:O, is:O, started:O, ,:O, it:O, creates:O, two:O, processes:O, that:O, take:O, care:O, of:O, connection:O, and:O, disconnection:O, to:O, the:O, C:O, &:O, C:O, server:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'This functionality can be seen in Figure 6 .' [/INST] [This:O, functionality:O, can:O, be:O, seen:O, in:O, Figure:O, 6:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'TimerTask Figure 6 : The timer task .' [/INST] [TimerTask:O, Figure:O, 6:O, ::O, The:O, timer:O, task:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'MainService has the following capabilities : Steal SMS messages Send SMS messages Steal the victim 's location Capture photos Execute commands Capture screenshots Call phone numbers Initiate other apps Steal Facebook credentials , etc All of the above functionalities take place on the basis of commands sent by the attacker .' [/INST] [MainService:O, has:O, the:O, following:O, capabilities:O, ::O, Steal:O, SMS:O, messages:O, Send:O, SMS:O, messages:O, Steal:O, the:O, victim:O, 's:O, location:O, Capture:O, photos:O, Execute:O, commands:O, Capture:O, screenshots:O, Call:O, phone:O, numbers:O, Initiate:O, other:O, apps:O, Steal:O, Facebook:B-System, credentials:O, ,:O, etc:O, All:O, of:O, the:O, above:O, functionalities:O, take:O, place:O, on:O, the:O, basis:O, of:O, commands:O, sent:O, by:O, the:O, attacker:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Stolen data is stored in external storage under the /DCIM/ directory with a hidden sub-directory named , .dat '' .' [/INST] [Stolen:O, data:O, is:O, stored:O, in:O, external:O, storage:O, under:O, the:O, /DCIM/:O, directory:O, with:O, a:O, hidden:O, sub-directory:O, named:O, ,:O, .dat:O, '':O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Below is the list of all the commands catered by the C & C server .' [/INST] [Below:O, is:O, the:O, list:O, of:O, all:O, the:O, commands:O, catered:O, by:O, the:O, C:O, &:O, C:O, server:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Command Action Unistxcr Restart the app dowsizetr Send the file stored in the /sdcard/DCIM/.dat/ directory to the C & C server Caspylistx Get a list of all hidden files in the /DCIM/.dat/ directory spxcheck Check whether call details are collected by the spyware S8p8y0 Delete call details stored by the spyware screXmex Take screenshots of the device screen Batrxiops Check battery status L4oclOCMAWS Fetch the victim 's location GUIFXB Launch' [/INST] [Command:O, Action:O, Unistxcr:O, Restart:O, the:O, app:O, dowsizetr:O, Send:O, the:O, file:O, stored:O, in:O, the:O, /sdcard/DCIM/.dat/:O, directory:O, to:O, the:O, C:O, &:O, C:O, server:O, Caspylistx:O, Get:O, a:O, list:O, of:O, all:O, hidden:O, files:O, in:O, the:O, /DCIM/.dat/:O, directory:O, spxcheck:O, Check:O, whether:O, call:O, details:O, are:O, collected:O, by:O, the:O, spyware:O, S8p8y0:O, Delete:O, call:O, details:O, stored:O, by:O, the:O, spyware:O, screXmex:O, Take:O, screenshots:O, of:O, the:O, device:O, screen:O, Batrxiops:O, Check:O, battery:O, status:O, L4oclOCMAWS:O, Fetch:O, the:O, victim:O, 's:O, location:O, GUIFXB:O, Launch:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'the fake Facebook login page IODBSSUEEZ Send a file containing stolen Facebook credentials to the C & C server FdelSRRT Delete files containing stolen Facebook credentials chkstzeaw Launch Facebook LUNAPXER Launch apps according to the package name sent by the C & C server Gapxplister Get a list of all installed applications DOTRall8xxe Zip all the stolen files and store in the /DCIM/.dat/ directory Acouxacour Get a list of accounts on the victim 's device Fimxmiisx Open the camera' [/INST] [the:O, fake:O, Facebook:B-System, login:O, page:O, IODBSSUEEZ:O, Send:O, a:O, file:O, containing:O, stolen:O, Facebook:B-System, credentials:O, to:O, the:O, C:O, &:O, C:O, server:O, FdelSRRT:O, Delete:O, files:O, containing:O, stolen:O, Facebook:B-System, credentials:O, chkstzeaw:O, Launch:O, Facebook:B-System, LUNAPXER:O, Launch:O, apps:O, according:O, to:O, the:O, package:O, name:O, sent:O, by:O, the:O, C:O, &:O, C:O, server:O, Gapxplister:O, Get:O, a:O, list:O, of:O, all:O, installed:O, applications:O, DOTRall8xxe:O, Zip:O, all:O, the:O, stolen:O, files:O, and:O, store:O, in:O, the:O, /DCIM/.dat/:O, directory:O, Acouxacour:O, Get:O, a:O, list:O, of:O, accounts:O, on:O, the:O, victim:O, 's:O, device:O, Fimxmiisx:O, Open:O, the:O, camera:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Scxreexcv4 Capture an image micmokmi8x Capture audio Yufsssp Get latitude and longitude GExCaalsss7 Get call logs PHOCAs7 Call phone numbers sent by the C & C server Gxextsxms Get a list of inbox SMS messages Msppossag Send SMS with message body sent by the C & C server Getconstactx Get a list of all contacts Rinxgosa Play a ringtone bithsssp64 Execute commands sent by the C & C server DOWdeletx Deletes' [/INST] [Scxreexcv4:O, Capture:O, an:O, image:O, micmokmi8x:O, Capture:O, audio:O, Yufsssp:O, Get:O, latitude:O, and:O, longitude:O, GExCaalsss7:O, Get:O, call:O, logs:O, PHOCAs7:O, Call:O, phone:O, numbers:O, sent:O, by:O, the:O, C:O, &:O, C:O, server:O, Gxextsxms:O, Get:O, a:O, list:O, of:O, inbox:O, SMS:O, messages:O, Msppossag:O, Send:O, SMS:O, with:O, message:O, body:O, sent:O, by:O, the:O, C:O, &:O, C:O, server:O, Getconstactx:O, Get:O, a:O, list:O, of:O, all:O, contacts:O, Rinxgosa:O, Play:O, a:O, ringtone:O, bithsssp64:O, Execute:O, commands:O, sent:O, by:O, the:O, C:O, &:O, C:O, server:O, DOWdeletx:O, Deletes:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'the file specified by the C & C server Deldatall8 Delete all files stored in the /sdcard/DCIM/.dat/ directory We do n't have the space to cover all of the commands , but let 's take a look at some of the major ones .' [/INST] [the:O, file:O, specified:O, by:O, the:O, C:O, &:O, C:O, server:O, Deldatall8:O, Delete:O, all:O, files:O, stored:O, in:O, the:O, /sdcard/DCIM/.dat/:O, directory:O, We:O, do:O, n't:O, have:O, the:O, space:O, to:O, cover:O, all:O, of:O, the:O, commands:O, ,:O, but:O, let:O, 's:O, take:O, a:O, look:O, at:O, some:O, of:O, the:O, major:O, ones:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Facebook phishing One of the interesting features of this spyware is the ability to steal Facebook credentials using a fake login page , similar to phishing .' [/INST] [Facebook:B-System, phishing:O, One:O, of:O, the:O, interesting:O, features:O, of:O, this:O, spyware:O, is:O, the:O, ability:O, to:O, steal:O, Facebook:B-System, credentials:O, using:O, a:O, fake:O, login:O, page:O, ,:O, similar:O, to:O, phishing:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Upon receiving the command GUIFXB , the spyware launches a fake Facebook login page .' [/INST] [Upon:O, receiving:O, the:O, command:O, GUIFXB:O, ,:O, the:O, spyware:O, launches:O, a:O, fake:O, Facebook:B-System, login:O, page:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'As soon as the victim tries to log in , it stores the victim 's credentials in /storage/0/DCIM/.fdat Facebook Login Figure 7 : Fake Facebook login The second command is IODBSSUEEZ , which further sends stolen credentials to the C & C server , as seen in Figure 8 .' [/INST] [As:O, soon:O, as:O, the:O, victim:O, tries:O, to:O, log:O, in:O, ,:O, it:O, stores:O, the:O, victim:O, 's:O, credentials:O, in:O, /storage/0/DCIM/.fdat:O, Facebook:B-System, Login:O, Figure:O, 7:O, ::O, Fake:O, Facebook:B-System, login:O, The:O, second:O, command:O, is:O, IODBSSUEEZ:O, ,:O, which:O, further:O, sends:O, stolen:O, credentials:O, to:O, the:O, C:O, &:O, C:O, server:O, ,:O, as:O, seen:O, in:O, Figure:O, 8:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Stolen Data Figure 8 : Sending data to the attacker .' [/INST] [Stolen:O, Data:O, Figure:O, 8:O, ::O, Sending:O, data:O, to:O, the:O, attacker:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'This functionality can be easily further extended to steal other information , such as bank credentials , although we did not see any banks being targeted in this attack .' [/INST] [This:O, functionality:O, can:O, be:O, easily:O, further:O, extended:O, to:O, steal:O, other:O, information:O, ,:O, such:O, as:O, bank:O, credentials:O, ,:O, although:O, we:O, did:O, not:O, see:O, any:O, banks:O, being:O, targeted:O, in:O, this:O, attack:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Calling functionality Command PHOCAs7 initiates calling functionality .' [/INST] [Calling:O, functionality:O, Command:O, PHOCAs7:O, initiates:O, calling:O, functionality:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The number to call is received along with the command , as seen in Figure 9 .' [/INST] [The:O, number:O, to:O, call:O, is:O, received:O, along:O, with:O, the:O, command:O, ,:O, as:O, seen:O, in:O, Figure:O, 9:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Call Command Figure 9 : The calling functionality .' [/INST] [Call:O, Command:O, Figure:O, 9:O, ::O, The:O, calling:O, functionality:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The phone number is fetched from a response from the C & C server and is stored in str3 variable , which further is utilized using the tel : function .' [/INST] [The:O, phone:O, number:O, is:O, fetched:O, from:O, a:O, response:O, from:O, the:O, C:O, &:O, C:O, server:O, and:O, is:O, stored:O, in:O, str3:O, variable:O, ,:O, which:O, further:O, is:O, utilized:O, using:O, the:O, tel:O, ::O, function:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Stealing SMS The Gxextsxms command is responsible for fetching all the SMS messages from the victim 's device and sending it over to the C & C server .' [/INST] [Stealing:O, SMS:O, The:O, Gxextsxms:O, command:O, is:O, responsible:O, for:O, fetching:O, all:O, the:O, SMS:O, messages:O, from:O, the:O, victim:O, 's:O, device:O, and:O, sending:O, it:O, over:O, to:O, the:O, C:O, &:O, C:O, server:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Stealing SMS Figure 10 : Stealing SMS messages .' [/INST] [Stealing:O, SMS:O, Figure:O, 10:O, ::O, Stealing:O, SMS:O, messages:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Similarly , there are many crucial commands that further allow this spyware to perform additional functionality , such as executing commands sent by the C & C , clicking photos , capturing screenshots , stealing location information , and more .' [/INST] [Similarly:O, ,:O, there:O, are:O, many:O, crucial:O, commands:O, that:O, further:O, allow:O, this:O, spyware:O, to:O, perform:O, additional:O, functionality:O, ,:O, such:O, as:O, executing:O, commands:O, sent:O, by:O, the:O, C:O, &:O, C:O, ,:O, clicking:O, photos:O, ,:O, capturing:O, screenshots:O, ,:O, stealing:O, location:O, information:O, ,:O, and:O, more:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Further analysis Upon further research , we found this spyware to be developed by a framework similar to Spynote and Spymax , meaning this could be an updated version of these Trojan builders , which allow anyone , even with limited knowledge , to develop full-fledged spyware .' [/INST] [Further:O, analysis:O, Upon:O, further:O, research:O, ,:O, we:O, found:O, this:O, spyware:O, to:O, be:O, developed:O, by:O, a:O, framework:O, similar:O, to:O, Spynote:B-Malware, and:O, Spymax:B-Malware, ,:O, meaning:O, this:O, could:O, be:O, an:O, updated:O, version:O, of:O, these:O, Trojan:O, builders:O, ,:O, which:O, allow:O, anyone:O, ,:O, even:O, with:O, limited:O, knowledge:O, ,:O, to:O, develop:O, full-fledged:O, spyware:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Many of the functionalities seen in this spyware are similar to Spynote and Spymax based on the samples we analyzed with some modifications .' [/INST] [Many:O, of:O, the:O, functionalities:O, seen:O, in:O, this:O, spyware:O, are:O, similar:O, to:O, Spynote:B-Malware, and:O, Spymax:B-Malware, based:O, on:O, the:O, samples:O, we:O, analyzed:O, with:O, some:O, modifications:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'This spyware sample communicates over dynamic DNS .' [/INST] [This:O, spyware:O, sample:O, communicates:O, over:O, dynamic:O, DNS:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'By doing so , attackers can easily set up the Trojan to communicate back to them without any need for high-end servers .' [/INST] [By:O, doing:O, so:O, ,:O, attackers:O, can:O, easily:O, set:O, up:O, the:O, Trojan:O, to:O, communicate:O, back:O, to:O, them:O, without:O, any:O, need:O, for:O, high-end:O, servers:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Other common functionalities include executing commands received from the attacker , taking screenshots of the victim 's device , fetching locations , stealing SMS messages and most common features that every spyware may poses .' [/INST] [Other:O, common:O, functionalities:O, include:O, executing:O, commands:O, received:O, from:O, the:O, attacker:O, ,:O, taking:O, screenshots:O, of:O, the:O, victim:O, 's:O, device:O, ,:O, fetching:O, locations:O, ,:O, stealing:O, SMS:O, messages:O, and:O, most:O, common:O, features:O, that:O, every:O, spyware:O, may:O, poses:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Stealing Facebook credentials using fake Facebook activity is something we did n't observe in Spynote/Spymax versions but was seen in this spyware .' [/INST] [Stealing:O, Facebook:B-Organization, credentials:O, using:O, fake:O, Facebook:B-Organization, activity:O, is:O, something:O, we:O, did:O, n't:O, observe:O, in:O, Spynote/Spymax:B-Malware, versions:O, but:O, was:O, seen:O, in:O, this:O, spyware:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'This framework allows anyone to develop a malicious app with the desired icon and communication address .' [/INST] [This:O, framework:O, allows:O, anyone:O, to:O, develop:O, a:O, malicious:O, app:O, with:O, the:O, desired:O, icon:O, and:O, communication:O, address:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Some of the icons used can be seen below .' [/INST] [Some:O, of:O, the:O, icons:O, used:O, can:O, be:O, seen:O, below:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'We found 280 such apps in the past three months .' [/INST] [We:O, found:O, 280:O, such:O, apps:O, in:O, the:O, past:O, three:O, months:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'A complete list of hashes can be found here .' [/INST] [A:O, complete:O, list:O, of:O, hashes:O, can:O, be:O, found:O, here:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'icons Figure 11 : Icons used to pose as famous apps .' [/INST] [icons:O, Figure:O, 11:O, ::O, Icons:O, used:O, to:O, pose:O, as:O, famous:O, apps:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'All of these apps are developed by the same framework and hence have the same package name and certificate information as seen in Figure 12. certificate Figure 12 : Package name and certificate information .' [/INST] [All:O, of:O, these:O, apps:O, are:O, developed:O, by:O, the:O, same:O, framework:O, and:O, hence:O, have:O, the:O, same:O, package:O, name:O, and:O, certificate:O, information:O, as:O, seen:O, in:O, Figure:O, 12.:O, certificate:O, Figure:O, 12:O, ::O, Package:O, name:O, and:O, certificate:O, information:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Conclusion Due to the ubiquitous nature of mobile devices and the widespread use of Android , it is very easy for attackers to victimize Android users .' [/INST] [Conclusion:O, Due:O, to:O, the:O, ubiquitous:O, nature:O, of:O, mobile:O, devices:O, and:O, the:O, widespread:O, use:O, of:O, Android:B-System, ,:O, it:O, is:O, very:O, easy:O, for:O, attackers:O, to:O, victimize:O, Android:B-System, users:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In such situations , mobile users should always take the utmost precautions while downloading any applications from the internet .' [/INST] [In:O, such:O, situations:O, ,:O, mobile:O, users:O, should:O, always:O, take:O, the:O, utmost:O, precautions:O, while:O, downloading:O, any:O, applications:O, from:O, the:O, internet:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'It is very easy to trick victims to fall for such attacks .' [/INST] [It:O, is:O, very:O, easy:O, to:O, trick:O, victims:O, to:O, fall:O, for:O, such:O, attacks:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Users looking forward to using the TikTok app amidst the ban might look for alternative methods to download the app .' [/INST] [Users:O, looking:O, forward:O, to:O, using:O, the:O, TikTok:B-System, app:O, amidst:O, the:O, ban:O, might:O, look:O, for:O, alternative:O, methods:O, to:O, download:O, the:O, app:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In doing so , users can mistakenly install malicious apps , such as the spyware mentioned in this blog .' [/INST] [In:O, doing:O, so:O, ,:O, users:O, can:O, mistakenly:O, install:O, malicious:O, apps:O, ,:O, such:O, as:O, the:O, spyware:O, mentioned:O, in:O, this:O, blog:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The precautions you take online have been covered extensively in almost all of our blogs ; even so , we believe this information bears repeating .' [/INST] [The:O, precautions:O, you:O, take:O, online:O, have:O, been:O, covered:O, extensively:O, in:O, almost:O, all:O, of:O, our:O, blogs:O, ;:O, even:O, so:O, ,:O, we:O, believe:O, this:O, information:O, bears:O, repeating:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Please follow these basic precautions during the current crisis—and at all times : Install apps only from official stores , such as Google Play .' [/INST] [Please:O, follow:O, these:O, basic:O, precautions:O, during:O, the:O, current:O, crisis—and:O, at:O, all:O, times:O, ::O, Install:O, apps:O, only:O, from:O, official:O, stores:O, ,:O, such:O, as:O, Google:B-System, Play:I-System, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Never click on unknown links received through ads , SMS messages , emails , or the like .' [/INST] [Never:O, click:O, on:O, unknown:O, links:O, received:O, through:O, ads:O, ,:O, SMS:O, messages:O, ,:O, emails:O, ,:O, or:O, the:O, like:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Always keep the , Unknown Sources '' option disabled in the Android device .' [/INST] [Always:O, keep:O, the:O, ,:O, Unknown:O, Sources:O, '':O, option:O, disabled:O, in:O, the:O, Android:B-System, device:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'This disallows apps to be installed on your device from unknown sources .' [/INST] [This:O, disallows:O, apps:O, to:O, be:O, installed:O, on:O, your:O, device:O, from:O, unknown:O, sources:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'We would also like to mention that if you come across an app hiding it 's icon , always try to search for the app in your device settings ( by going to Settings - > Apps - > Search for icon that was hidden ) .' [/INST] [We:O, would:O, also:O, like:O, to:O, mention:O, that:O, if:O, you:O, come:O, across:O, an:O, app:O, hiding:O, it:O, 's:O, icon:O, ,:O, always:O, try:O, to:O, search:O, for:O, the:O, app:O, in:O, your:O, device:O, settings:O, (:O, by:O, going:O, to:O, Settings:O, -:O, >:O, Apps:O, -:O, >:O, Search:O, for:O, icon:O, that:O, was:O, hidden:O, ):O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In the case of this spyware , search for app named TikTok Pro .' [/INST] [In:O, the:O, case:O, of:O, this:O, spyware:O, ,:O, search:O, for:O, app:O, named:O, TikTok:B-System, Pro:I-System, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'MITRE TAGS Action Tag ID App auto-start at device boot T1402 Input prompt T1411 Capture SMS messages T1412 Application discovery T1418 Capture audio T1429 Location tracking T1430 Access contact list T1432 Access call log T1433 Commonly used port T1436 Standard application layer protocol T1437 Masquerage as legitimate application T1444 Suppress application icon T1508 Capture camera T1512 Screen capture T1513 Foreground persistence T1541 DualToy : New Windows Trojan Sideloads Risky Apps to Android and iOS Devices' [/INST] [MITRE:B-Organization, TAGS:O, Action:O, Tag:O, ID:O, App:O, auto-start:O, at:O, device:O, boot:O, T1402:O, Input:O, prompt:O, T1411:O, Capture:O, SMS:O, messages:O, T1412:O, Application:O, discovery:O, T1418:O, Capture:O, audio:O, T1429:O, Location:O, tracking:O, T1430:O, Access:O, contact:O, list:O, T1432:O, Access:O, call:O, log:O, T1433:O, Commonly:O, used:O, port:O, T1436:O, Standard:O, application:O, layer:O, protocol:O, T1437:O, Masquerage:O, as:O, legitimate:O, application:O, T1444:O, Suppress:O, application:O, icon:O, T1508:O, Capture:O, camera:O, T1512:O, Screen:O, capture:O, T1513:O, Foreground:O, persistence:O, T1541:O, DualToy:B-Malware, ::O, New:O, Windows:B-System, Trojan:O, Sideloads:O, Risky:O, Apps:O, to:O, Android:B-System, and:O, iOS:B-System, Devices:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'By Claud Xiao September 13 , 2016 at 5:00 AM Over the past two years , we ’ ve observed many cases of Microsoft Windows and Apple iOS malware designed to attack mobile devices .' [/INST] [By:O, Claud:O, Xiao:O, September:O, 13:O, ,:O, 2016:O, at:O, 5:00:O, AM:O, Over:O, the:O, past:O, two:O, years:O, ,:O, we:O, ’:O, ve:O, observed:O, many:O, cases:O, of:O, Microsoft:B-System, Windows:I-System, and:O, Apple:B-System, iOS:I-System, malware:O, designed:O, to:O, attack:O, mobile:O, devices:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'This attack vector is increasingly popular with malicious actors as almost everyone on the planet carries at least one mobile device they interact with throughout any given day .' [/INST] [This:O, attack:O, vector:O, is:O, increasingly:O, popular:O, with:O, malicious:O, actors:O, as:O, almost:O, everyone:O, on:O, the:O, planet:O, carries:O, at:O, least:O, one:O, mobile:O, device:O, they:O, interact:O, with:O, throughout:O, any:O, given:O, day:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Thanks to a relative lack of security controls applied to mobile devices , these devices have become very attractive targets for a broad range of malicious actors .' [/INST] [Thanks:O, to:O, a:O, relative:O, lack:O, of:O, security:O, controls:O, applied:O, to:O, mobile:O, devices:O, ,:O, these:O, devices:O, have:O, become:O, very:O, attractive:O, targets:O, for:O, a:O, broad:O, range:O, of:O, malicious:O, actors:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'For example : WireLurker installed malicious apps on non-jailbroken iPhones Six different Trojan , Adware and HackTool families launched “ BackStab ” attacks to steal backup archives of iOS and BlackBerry devices The HackingTeam ’ s RCS delivered its Spyware from infected PCs and Macs to jailbroken iOS devices and BlackBerry phones Recently , we discovered another Windows Trojan we named “ DualToy ” which side loads malicious or risky apps to both Android and iOS devices via a USB connection .' [/INST] [For:O, example:O, ::O, WireLurker:B-Malware, installed:O, malicious:O, apps:O, on:O, non-jailbroken:O, iPhones:O, Six:O, different:O, Trojan:O, ,:O, Adware:O, and:O, HackTool:B-Malware, families:I-Malware, launched:O, “:O, BackStab:O, ”:O, attacks:O, to:O, steal:O, backup:O, archives:O, of:O, iOS:B-System, and:O, BlackBerry:B-System, devices:O, The:O, HackingTeam:B-Malware, ’:O, s:O, RCS:B-Malware, delivered:O, its:O, Spyware:O, from:O, infected:O, PCs:O, and:O, Macs:O, to:O, jailbroken:O, iOS:B-System, devices:O, and:O, BlackBerry:B-System, phones:O, Recently:O, ,:O, we:O, discovered:O, another:O, Windows:B-System, Trojan:O, we:O, named:O, “:O, DualToy:B-Malware, ”:O, which:O, side:O, loads:O, malicious:O, or:O, risky:O, apps:O, to:O, both:O, Android:B-System, and:O, iOS:B-System, devices:O, via:O, a:O, USB:B-System, connection:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'When DualToy began to spread in January 2015 , it was only capable of infecting Android devices .' [/INST] [When:O, DualToy:B-Malware, began:O, to:O, spread:O, in:O, January:O, 2015:O, ,:O, it:O, was:O, only:O, capable:O, of:O, infecting:O, Android:B-System, devices:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'However , within six months the malicious actors added the capability to infect iOS devices .' [/INST] [However:O, ,:O, within:O, six:O, months:O, the:O, malicious:O, actors:O, added:O, the:O, capability:O, to:O, infect:O, iOS:B-System, devices:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'DualToy is still active and we have detected over 8,000 unique samples belonging to this Trojan family to date .' [/INST] [DualToy:B-Malware, is:O, still:O, active:O, and:O, we:O, have:O, detected:O, over:O, 8,000:O, unique:O, samples:O, belonging:O, to:O, this:O, Trojan:O, family:O, to:O, date:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'It mainly targets Chinese users , but has also successfully affected people and organizations in the United States , United Kingdom , Thailand , Spain , and Ireland .' [/INST] [It:O, mainly:O, targets:O, Chinese:O, users:O, ,:O, but:O, has:O, also:O, successfully:O, affected:O, people:O, and:O, organizations:O, in:O, the:O, United:O, States:O, ,:O, United:O, Kingdom:O, ,:O, Thailand:O, ,:O, Spain:O, ,:O, and:O, Ireland:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Credential phishing and an Android banking Trojan combine in Austrian mobile attacks NOVEMBER 03 , 2017 Overview Credential phishing , banking Trojans , and credit card phishing schemes are common threats that we regularly observe both at scale and in more targeted attacks .' [/INST] [Credential:O, phishing:O, and:O, an:O, Android:B-System, banking:O, Trojan:O, combine:O, in:O, Austrian:O, mobile:O, attacks:O, NOVEMBER:O, 03:O, ,:O, 2017:O, Overview:O, Credential:O, phishing:O, ,:O, banking:O, Trojans:O, ,:O, and:O, credit:O, card:O, phishing:O, schemes:O, are:O, common:O, threats:O, that:O, we:O, regularly:O, observe:O, both:O, at:O, scale:O, and:O, in:O, more:O, targeted:O, attacks:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'However , Proofpoint researchers have recently observed phishing attacks that incorporate all of these elements in a single , multistep scheme involving the Marcher Android banking Trojan targeting customers of large Austrian banks .' [/INST] [However:O, ,:O, Proofpoint:B-Organization, researchers:O, have:O, recently:O, observed:O, phishing:O, attacks:O, that:O, incorporate:O, all:O, of:O, these:O, elements:O, in:O, a:O, single:O, ,:O, multistep:O, scheme:O, involving:O, the:O, Marcher:B-Malware, Android:O, banking:O, Trojan:O, targeting:O, customers:O, of:O, large:O, Austrian:O, banks:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Attacks involving Marcher have become increasingly sophisticated , with documented cases involving multiple attack vectors and a variety of targeted financial services and communication platforms [ 1 ] [ 2 ] .' [/INST] [Attacks:O, involving:O, Marcher:B-Malware, have:O, become:O, increasingly:O, sophisticated:O, ,:O, with:O, documented:O, cases:O, involving:O, multiple:O, attack:O, vectors:O, and:O, a:O, variety:O, of:O, targeted:O, financial:O, services:O, and:O, communication:O, platforms:O, [:O, 1:O, ]:O, [:O, 2:O, ]:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In this case , a threat actor has been targeting customers of Bank Austria , Raiffeisen Meine Bank , and Sparkasse since at least January 2017 .' [/INST] [In:O, this:O, case:O, ,:O, a:O, threat:O, actor:O, has:O, been:O, targeting:O, customers:O, of:O, Bank:O, Austria:O, ,:O, Raiffeisen:O, Meine:O, Bank:O, ,:O, and:O, Sparkasse:O, since:O, at:O, least:O, January:O, 2017:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The attacks described here begin with a banking credential phishing scheme , followed by an attempt to trick the victim into installing Marcher , and finally with attempts to steal credit card information by the banking Trojan itself .' [/INST] [The:O, attacks:O, described:O, here:O, begin:O, with:O, a:O, banking:O, credential:O, phishing:O, scheme:O, ,:O, followed:O, by:O, an:O, attempt:O, to:O, trick:O, the:O, victim:O, into:O, installing:O, Marcher:B-Malware, ,:O, and:O, finally:O, with:O, attempts:O, to:O, steal:O, credit:O, card:O, information:O, by:O, the:O, banking:O, Trojan:O, itself:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Analysis Marcher is frequently distributed via SMS , but in this case , victims are presented with a link in an email .' [/INST] [Analysis:O, Marcher:B-Malware, is:O, frequently:O, distributed:O, via:O, SMS:O, ,:O, but:O, in:O, this:O, case:O, ,:O, victims:O, are:O, presented:O, with:O, a:O, link:O, in:O, an:O, email:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Oftentimes , the emailed link is a bit.ly shortened link , used to potentially evade detection .' [/INST] [Oftentimes:O, ,:O, the:O, emailed:O, link:O, is:O, a:O, bit.ly:O, shortened:O, link:O, ,:O, used:O, to:O, potentially:O, evade:O, detection:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The link leads to a phishing page that asks for banking login credentials or an account number and PIN .' [/INST] [The:O, link:O, leads:O, to:O, a:O, phishing:O, page:O, that:O, asks:O, for:O, banking:O, login:O, credentials:O, or:O, an:O, account:O, number:O, and:O, PIN:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Figure 1 shows one such landing page using stolen branding from Bank Austria .' [/INST] [Figure:O, 1:O, shows:O, one:O, such:O, landing:O, page:O, using:O, stolen:O, branding:O, from:O, Bank:O, Austria:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Figure 1 : Landing page for phishing scheme asking for the victim ’ s signatory number and PIN using stolen branding from Bank Austria Because the actor delivered phishing links using the bit.ly URL shortener , we can access delivery statistics for this particular campaign .' [/INST] [Figure:O, 1:O, ::O, Landing:O, page:O, for:O, phishing:O, scheme:O, asking:O, for:O, the:O, victim:O, ’:O, s:O, signatory:O, number:O, and:O, PIN:O, using:O, stolen:O, branding:O, from:O, Bank:B-System, Austria:I-System, Because:O, the:O, actor:O, delivered:O, phishing:O, links:O, using:O, the:O, bit.ly:B-Indicator, URL:O, shortener:O, ,:O, we:O, can:O, access:O, delivery:O, statistics:O, for:O, this:O, particular:O, campaign:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The link resolves to a URL designed to appear legitimate , with a canonical domain of sicher97140 [ .' [/INST] [The:O, link:O, resolves:O, to:O, a:O, URL:O, designed:O, to:O, appear:O, legitimate:O, ,:O, with:O, a:O, canonical:O, domain:O, of:O, sicher97140:B-Indicator, [:I-Indicator, .:I-Indicator] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: '] info including the “ bankaustria ” brand .' [/INST] []:I-Indicator, info:I-Indicator, including:O, the:O, “:O, bankaustria:O, ”:O, brand:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Figure 2 : Bit.ly statistics for a phishing landing page targeting Bank Austria customers The actor appears to have recently begun using “ .top ” top-level domains ( TLDs ) for their phishing landing pages and have implemented a consistent naming structure as shown below .' [/INST] [Figure:O, 2:O, ::O, Bit.ly:B-Indicator, statistics:O, for:O, a:O, phishing:O, landing:O, page:O, targeting:O, Bank:B-System, Austria:I-System, customers:O, The:O, actor:O, appears:O, to:O, have:O, recently:O, begun:O, using:O, “:O, .top:O, ”:O, top-level:O, domains:O, (:O, TLDs:O, ):O, for:O, their:O, phishing:O, landing:O, pages:O, and:O, have:O, implemented:O, a:O, consistent:O, naming:O, structure:O, as:O, shown:O, below:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Earlier this year , the actor used “ .pw ” TLDs while the Bank Austria scheme highlighted above used “ .info ” .' [/INST] [Earlier:O, this:O, year:O, ,:O, the:O, actor:O, used:O, “:O, .pw:O, ”:O, TLDs:O, while:O, the:O, Bank:B-System, Austria:I-System, scheme:O, highlighted:O, above:O, used:O, “:O, .info:O, ”:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Some recent campaigns against other bank customers also used “ .gdn ” TLDs .' [/INST] [Some:O, recent:O, campaigns:O, against:O, other:O, bank:O, customers:O, also:O, used:O, “:O, .gdn:O, ”:O, TLDs:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Other attacks on Bank Austria customers that we observed resolved to the following .top domains : Oct 23 , 2017 hxxp : //online.bankaustria.at.id8817062 [ .' [/INST] [Other:O, attacks:O, on:O, Bank:B-System, Austria:I-System, customers:O, that:O, we:O, observed:O, resolved:O, to:O, the:O, following:O, .top:O, domains:O, ::O, Oct:O, 23:O, ,:O, 2017:O, hxxp:B-Indicator, ::I-Indicator, //online.bankaustria.at.id8817062:I-Indicator, [:I-Indicator, .:I-Indicator] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: '] top/ Oct 23 , 2017 hxxp : //online.bankaustria.at.id8817461 [ .' [/INST] []:I-Indicator, top/:I-Indicator, Oct:O, 23:O, ,:O, 2017:O, hxxp:B-Indicator, ::I-Indicator, //online.bankaustria.at.id8817461:I-Indicator, [:I-Indicator, .:I-Indicator] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: '] top/ Oct 23 , 2017 hxxp : //online.bankaustria.at.id8817465 [ .' [/INST] []:I-Indicator, top/:I-Indicator, Oct:O, 23:O, ,:O, 2017:O, hxxp:B-Indicator, ::I-Indicator, //online.bankaustria.at.id8817465:I-Indicator, [:I-Indicator, .:I-Indicator] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: '] top/ Oct 23 , 2017 hxxp : //online.bankaustria.at.id8817466 [ .' [/INST] []:I-Indicator, top/:I-Indicator, Oct:O, 23:O, ,:O, 2017:O, hxxp:B-Indicator, ::I-Indicator, //online.bankaustria.at.id8817466:I-Indicator, [:I-Indicator, .:I-Indicator] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: '] top/ Oct 23 , 2017 hxxp : //online.bankaustria.at.id8817469 [ .' [/INST] []:I-Indicator, top/:I-Indicator, Oct:O, 23:O, ,:O, 2017:O, hxxp:B-Indicator, ::I-Indicator, //online.bankaustria.at.id8817469:I-Indicator, [:I-Indicator, .:I-Indicator] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: '] top/ Oct 17 , 2017 hxxp : //online.bankaustria.at.id58712 [ .' [/INST] []:I-Indicator, top/:I-Indicator, Oct:O, 17:O, ,:O, 2017:O, hxxp:B-Indicator, ::I-Indicator, //online.bankaustria.at.id58712:I-Indicator, [:I-Indicator, .:I-Indicator] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: '] top/ Oct 17 , 2017 hxxp : //online.bankaustria.at.id58717 [ .' [/INST] []:I-Indicator, top/:I-Indicator, Oct:O, 17:O, ,:O, 2017:O, hxxp:B-Indicator, ::I-Indicator, //online.bankaustria.at.id58717:I-Indicator, [:I-Indicator, .:I-Indicator] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: '] top/ Oct 17 , 2017 hxxp : //online.bankaustria.at.id58729 [ .' [/INST] []:I-Indicator, top/:I-Indicator, Oct:O, 17:O, ,:O, 2017:O, hxxp:B-Indicator, ::I-Indicator, //online.bankaustria.at.id58729:I-Indicator, [:I-Indicator, .:I-Indicator] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: '] top/ Oct 17 , 2017 hxxp : //online.bankaustria.at.id58729 [ .' [/INST] []:I-Indicator, top/:I-Indicator, Oct:O, 17:O, ,:O, 2017:O, hxxp:B-Indicator, ::I-Indicator, //online.bankaustria.at.id58729:I-Indicator, [:I-Indicator, .:I-Indicator] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: '] top/ Oct 17 , 2017 hxxp : //online.bankaustria.at.id87721 [ .' [/INST] []:I-Indicator, top/:I-Indicator, Oct:O, 17:O, ,:O, 2017:O, hxxp:B-Indicator, ::I-Indicator, //online.bankaustria.at.id87721:I-Indicator, [:I-Indicator, .:I-Indicator] </s> |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.