task
stringclasses
7 values
dataset
stringclasses
34 values
subset
stringclasses
1 value
instruction
stringclasses
7 values
content
stringlengths
1
8.18k
output
stringlengths
4
3.74k
schema
stringclasses
79 values
negative_labels
stringclasses
55 values
json
stringlengths
14
6.84k
system_prompt
stringclasses
7 values
EE
CASIE
train
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
OneLogin has revealed more about the attack on its systems , confirming that a " threat actor " had accessed database tables including " information about users , apps , and various types of keys . "
data breach: the attack
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
{"events": [{"event_type": "data breach", "trigger": "the attack", "arguments": []}]}
You are an expert in Event Extraction. Your task is to extract events and their arguments from the given text. Follow these guidelines: 1. Identify event triggers and their types from the schema. 2. For each event, extract its arguments with their roles. 3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'. 4. If no events are found, return 'None'.
EE
CASIE
train
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
Now , another vendor going by the handle of CosmicDark is selling a database containing 100,759,591 user accounts stolen from of Youku Inc. , a popular video service in China .
data breach: is selling | attacker: CosmicDark | compromised data: a database | compromised data: user accounts | number of data: 100,759,591
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
{"events": [{"event_type": "data breach", "trigger": "is selling", "arguments": [{"name": "CosmicDark", "role": "attacker"}, {"name": "a database", "role": "compromised data"}, {"name": "100,759,591", "role": "number of data"}, {"name": "user accounts", "role": "compromised data"}]}]}
You are an expert in Event Extraction. Your task is to extract events and their arguments from the given text. Follow these guidelines: 1. Identify event triggers and their types from the schema. 2. For each event, extract its arguments with their roles. 3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'. 4. If no events are found, return 'None'.
EE
CASIE
train
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
We had a threat of a hack of a movie being stolen .
data breach: a hack
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
{"events": [{"event_type": "data breach", "trigger": "a hack", "arguments": []}]}
You are an expert in Event Extraction. Your task is to extract events and their arguments from the given text. Follow these guidelines: 1. Identify event triggers and their types from the schema. 2. For each event, extract its arguments with their roles. 3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'. 4. If no events are found, return 'None'.
EE
CASIE
train
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
As I wrote earlier this month , the surge of extortion attacks impacting organizations has led to a number of fake extortion threats , including empty ransomware demands where actors contact organizations , lie about the organization ’s data being encrypted , and ask for money to remove the non-existent threat .
ransom: empty ransomware demands
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
{"events": [{"event_type": "ransom", "trigger": "empty ransomware demands", "arguments": []}]}
You are an expert in Event Extraction. Your task is to extract events and their arguments from the given text. Follow these guidelines: 1. Identify event triggers and their types from the schema. 2. For each event, extract its arguments with their roles. 3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'. 4. If no events are found, return 'None'.
EE
CASIE
train
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
For their part , LeakBase said since this data breach is n't in the public domain , they will not add the records to their service and it will not be searchable .
data breach: this data breach
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
{"events": [{"event_type": "data breach", "trigger": "this data breach", "arguments": []}]}
You are an expert in Event Extraction. Your task is to extract events and their arguments from the given text. Follow these guidelines: 1. Identify event triggers and their types from the schema. 2. For each event, extract its arguments with their roles. 3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'. 4. If no events are found, return 'None'.
EE
CASIE
train
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
Similar to the above warning , the fake HMRC email advises that you have to click on a link to complete and submit the refund form .
phishing: advises | attack pattern: click on a link to complete and submit the refund form | tool: the fake HMRC email | victim: you
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
{"events": [{"event_type": "phishing", "trigger": "advises", "arguments": [{"name": "the fake HMRC email", "role": "tool"}, {"name": "click on a link to complete and submit the refund form", "role": "attack pattern"}, {"name": "you", "role": "victim"}]}]}
You are an expert in Event Extraction. Your task is to extract events and their arguments from the given text. Follow these guidelines: 1. Identify event triggers and their types from the schema. 2. For each event, extract its arguments with their roles. 3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'. 4. If no events are found, return 'None'.
EE
CASIE
train
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
Experts say hackers using Cerber ransomware usually demand $ 1,000 in bitcoin from infected users .
ransom: usually demand | attack pattern: using Cerber ransomware | payment method: in bitcoin | price: 1,000 | victim: hackers
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
{"events": [{"event_type": "ransom", "trigger": "usually demand", "arguments": [{"name": "1,000", "role": "price"}, {"name": "in bitcoin", "role": "payment method"}, {"name": "using Cerber ransomware", "role": "attack pattern"}, {"name": "hackers", "role": "victim"}]}]}
You are an expert in Event Extraction. Your task is to extract events and their arguments from the given text. Follow these guidelines: 1. Identify event triggers and their types from the schema. 2. For each event, extract its arguments with their roles. 3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'. 4. If no events are found, return 'None'.
EE
CASIE
train
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
Once the attackers have their malware loaded onto the point - of - sale devices , they can remotely capture data from each card swiped at that cash register .
data breach: can remotely capture | attack pattern: have their malware loaded | attacker: the attackers | attacker: they | compromised data: card | compromised data: data | victim: cash register | victim: the point - of - sale devices
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
{"events": [{"event_type": "data breach", "trigger": "can remotely capture", "arguments": [{"name": "cash register", "role": "victim"}, {"name": "card", "role": "compromised data"}, {"name": "data", "role": "compromised data"}, {"name": "they", "role": "attacker"}, {"name": "the point - of - sale devices", "role": "victim"}, {"name": "have their malware loaded", "role": "attack pattern"}, {"name": "the attackers", "role": "attacker"}]}]}
You are an expert in Event Extraction. Your task is to extract events and their arguments from the given text. Follow these guidelines: 1. Identify event triggers and their types from the schema. 2. For each event, extract its arguments with their roles. 3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'. 4. If no events are found, return 'None'.
EE
CASIE
train
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
“ The bug is exploitable remotely if the remote management option is set and can also be exploited given access to the router over LAN or WLAN , ” he explained .
discover vulnerability: be exploited | capabilities: given access to the router over LAN or WLAN | vulnerability: bug
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
{"events": [{"event_type": "discover vulnerability", "trigger": "be exploited", "arguments": [{"name": "bug", "role": "vulnerability"}, {"name": "given access to the router over LAN or WLAN", "role": "capabilities"}]}]}
You are an expert in Event Extraction. Your task is to extract events and their arguments from the given text. Follow these guidelines: 1. Identify event triggers and their types from the schema. 2. For each event, extract its arguments with their roles. 3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'. 4. If no events are found, return 'None'.
EE
CASIE
train
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
" The alleged list of email addresses and passwords appears to have been obtained from previously compromised third - party services . "
data breach: compromised | victim: third - party services
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
{"events": [{"event_type": "data breach", "trigger": "compromised", "arguments": [{"name": "third - party services", "role": "victim"}]}]}
You are an expert in Event Extraction. Your task is to extract events and their arguments from the given text. Follow these guidelines: 1. Identify event triggers and their types from the schema. 2. For each event, extract its arguments with their roles. 3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'. 4. If no events are found, return 'None'.
EE
CASIE
train
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
Computers across the world were locked up Friday and users ’ files held for ransom when dozens of countries were hit in a cyber-extortion attack that targeted hospitals , companies and government agencies .
ransom: were hit
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
{"events": [{"event_type": "ransom", "trigger": "were hit", "arguments": []}]}
You are an expert in Event Extraction. Your task is to extract events and their arguments from the given text. Follow these guidelines: 1. Identify event triggers and their types from the schema. 2. For each event, extract its arguments with their roles. 3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'. 4. If no events are found, return 'None'.
EE
CASIE
train
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
In an email sent to users on 26th December , the site explained that hackers were able to conduct this breach by exploiting a known vulnerability in outdated vBulletin forum software .
discover vulnerability: explained | discoverer: the site | time: 26th December
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
{"events": [{"event_type": "discover vulnerability", "trigger": "explained", "arguments": [{"name": "the site", "role": "discoverer"}, {"name": "26th December", "role": "time"}]}]}
You are an expert in Event Extraction. Your task is to extract events and their arguments from the given text. Follow these guidelines: 1. Identify event triggers and their types from the schema. 2. For each event, extract its arguments with their roles. 3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'. 4. If no events are found, return 'None'.
EE
CASIE
train
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
When done it will display the ransom note to let the victim know that they have been infected .
ransom: will display | attack pattern: have been infected | tool: the ransom note | victim: the victim | victim: they
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
{"events": [{"event_type": "ransom", "trigger": "will display", "arguments": [{"name": "the ransom note", "role": "tool"}, {"name": "the victim", "role": "victim"}, {"name": "they", "role": "victim"}, {"name": "have been infected", "role": "attack pattern"}]}]}
You are an expert in Event Extraction. Your task is to extract events and their arguments from the given text. Follow these guidelines: 1. Identify event triggers and their types from the schema. 2. For each event, extract its arguments with their roles. 3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'. 4. If no events are found, return 'None'.
EE
CASIE
train
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
The extortion and the transactions in the ransomware programs themselves have become a profitable business for cybercriminals .
ransom: The extortion | attacker: cybercriminals | tool: the ransomware programs
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
{"events": [{"event_type": "ransom", "trigger": "The extortion", "arguments": [{"name": "the ransomware programs", "role": "tool"}, {"name": "cybercriminals", "role": "attacker"}]}]}
You are an expert in Event Extraction. Your task is to extract events and their arguments from the given text. Follow these guidelines: 1. Identify event triggers and their types from the schema. 2. For each event, extract its arguments with their roles. 3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'. 4. If no events are found, return 'None'.
EE
CASIE
train
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
In addition , the group also released a second set of files , which were encrypted with a password the group promised to provide to the winner of online bidding war .
data breach: released | attacker: group | compromised data: files | purpose: provide to the winner of online bidding war
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
{"events": [{"event_type": "data breach", "trigger": "released", "arguments": [{"name": "group", "role": "attacker"}, {"name": "files", "role": "compromised data"}, {"name": "provide to the winner of online bidding war", "role": "purpose"}]}]}
You are an expert in Event Extraction. Your task is to extract events and their arguments from the given text. Follow these guidelines: 1. Identify event triggers and their types from the schema. 2. For each event, extract its arguments with their roles. 3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'. 4. If no events are found, return 'None'.
EE
CASIE
train
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
, but still I did n’t leak out the whole contents of the backup files , instead I tweeted out my findings and thought to wait for FBI ’s response " Now let ’s sit and wait for the FBI ’s response .
discover vulnerability: tweeted out | discoverer: I | vulnerability: my findings | vulnerable system owner: FBI
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
{"events": [{"event_type": "discover vulnerability", "trigger": "tweeted out", "arguments": [{"name": "FBI", "role": "vulnerable system owner"}, {"name": "I", "role": "discoverer"}, {"name": "my findings", "role": "vulnerability"}]}]}
You are an expert in Event Extraction. Your task is to extract events and their arguments from the given text. Follow these guidelines: 1. Identify event triggers and their types from the schema. 2. For each event, extract its arguments with their roles. 3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'. 4. If no events are found, return 'None'.
EE
CASIE
train
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
It eventually confirmed a breach in late August that involved cards used from Feb. 16 , 2016 and July 7 , 2016 at nearly all of its restaurants and hotels .
data breach: a breach | compromised data: cards | time: from Feb. 16 , 2016 and July 7 , 2016 | time: late August | victim: hotels | victim: its restaurants
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
{"events": [{"event_type": "data breach", "trigger": "a breach", "arguments": [{"name": "late August", "role": "time"}, {"name": "cards", "role": "compromised data"}, {"name": "from Feb. 16 , 2016 and July 7 , 2016", "role": "time"}, {"name": "its restaurants", "role": "victim"}, {"name": "hotels", "role": "victim"}]}]}
You are an expert in Event Extraction. Your task is to extract events and their arguments from the given text. Follow these guidelines: 1. Identify event triggers and their types from the schema. 2. For each event, extract its arguments with their roles. 3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'. 4. If no events are found, return 'None'.
EE
CASIE
train
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
Unfortunately , however , as is the case with most ransomware attacks , the stakes of losing years worth of important data is always quite high and the ransom demanded usually very small , leading most victims to give in to the attackers ’ demands before even reaching out to law enforcement .
ransom: the ransom demanded | victim: victims
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
{"events": [{"event_type": "ransom", "trigger": "the ransom demanded", "arguments": [{"name": "victims", "role": "victim"}]}]}
You are an expert in Event Extraction. Your task is to extract events and their arguments from the given text. Follow these guidelines: 1. Identify event triggers and their types from the schema. 2. For each event, extract its arguments with their roles. 3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'. 4. If no events are found, return 'None'.
EE
CASIE
train
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
Around that time , the hacking gang , which has also extorted non-film entities in the past , tweeted out that it had stolen content from a number of other media companies .
ransom: extorted | attacker: the hacking gang | time: the past
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
{"events": [{"event_type": "ransom", "trigger": "extorted", "arguments": [{"name": "the hacking gang", "role": "attacker"}, {"name": "the past", "role": "time"}]}]}
You are an expert in Event Extraction. Your task is to extract events and their arguments from the given text. Follow these guidelines: 1. Identify event triggers and their types from the schema. 2. For each event, extract its arguments with their roles. 3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'. 4. If no events are found, return 'None'.
EE
CASIE
train
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
The attacks on MongoDB databases have been going on for more than a week and servers from across the globe have been targeted .
ransom: The attacks | time: more than a week | victim: MongoDB databases
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
{"events": [{"event_type": "ransom", "trigger": "The attacks", "arguments": [{"name": "MongoDB databases", "role": "victim"}, {"name": "more than a week", "role": "time"}]}]}
You are an expert in Event Extraction. Your task is to extract events and their arguments from the given text. Follow these guidelines: 1. Identify event triggers and their types from the schema. 2. For each event, extract its arguments with their roles. 3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'. 4. If no events are found, return 'None'.
EE
CASIE
train
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
Security experts said the recent cyber attack highlighted how sophisticated phishing scams are being used to fool even two of the biggest tech companies .
phishing: phishing scams | victim: tech companies
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
{"events": [{"event_type": "phishing", "trigger": "phishing scams", "arguments": [{"name": "tech companies", "role": "victim"}]}]}
You are an expert in Event Extraction. Your task is to extract events and their arguments from the given text. Follow these guidelines: 1. Identify event triggers and their types from the schema. 2. For each event, extract its arguments with their roles. 3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'. 4. If no events are found, return 'None'.
EE
CASIE
train
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
A typical bank would have patched this critical vulnerability within a few days , ” said Pravin Kothari , CEO of CipherCloud , a cloud security company .
patch vulnerability: have patched | releaser: A typical bank | time: a few days | vulnerability: this critical vulnerability
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
{"events": [{"event_type": "patch vulnerability", "trigger": "have patched", "arguments": [{"name": "A typical bank", "role": "releaser"}, {"name": "this critical vulnerability", "role": "vulnerability"}, {"name": "a few days", "role": "time"}]}]}
You are an expert in Event Extraction. Your task is to extract events and their arguments from the given text. Follow these guidelines: 1. Identify event triggers and their types from the schema. 2. For each event, extract its arguments with their roles. 3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'. 4. If no events are found, return 'None'.
EE
CASIE
train
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
W - 2 scams start with spear phishing emails usually directed at finance and HR personnel .
phishing: W - 2 scams | tool: spear phishing emails | victim: HR personnel | victim: finance
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
{"events": [{"event_type": "phishing", "trigger": "W - 2 scams", "arguments": [{"name": "finance", "role": "victim"}, {"name": "spear phishing emails", "role": "tool"}, {"name": "HR personnel", "role": "victim"}]}]}
You are an expert in Event Extraction. Your task is to extract events and their arguments from the given text. Follow these guidelines: 1. Identify event triggers and their types from the schema. 2. For each event, extract its arguments with their roles. 3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'. 4. If no events are found, return 'None'.
EE
CASIE
train
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
Hence , through compromising this particular cord , a hacker can extract all sorts of data from your mobile including pictures , emails , contact numbers , SMS messages , etc. , without your knowledge obviously .
data breach: can extract | attacker: a hacker | compromised data: SMS messages | compromised data: contact numbers | compromised data: emails | compromised data: pictures | compromised data: sorts of data | victim: your mobile
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
{"events": [{"event_type": "data breach", "trigger": "can extract", "arguments": [{"name": "a hacker", "role": "attacker"}, {"name": "sorts of data", "role": "compromised data"}, {"name": "your mobile", "role": "victim"}, {"name": "pictures", "role": "compromised data"}, {"name": "emails", "role": "compromised data"}, {"name": "contact numbers", "role": "compromised data"}, {"name": "SMS messages", "role": "compromised data"}]}]}
You are an expert in Event Extraction. Your task is to extract events and their arguments from the given text. Follow these guidelines: 1. Identify event triggers and their types from the schema. 2. For each event, extract its arguments with their roles. 3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'. 4. If no events are found, return 'None'.
EE
CASIE
train
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
Taking into account the copycat nature of the malware scene , this new trick of collecting driver 's license information will most likely spread to other PoS malware families .
data breach: collecting | compromised data: driver #$%#s license information | tool: PoS malware families
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
{"events": [{"event_type": "data breach", "trigger": "collecting", "arguments": [{"name": "driver #$%#s license information", "role": "compromised data"}, {"name": "PoS malware families", "role": "tool"}]}]}
You are an expert in Event Extraction. Your task is to extract events and their arguments from the given text. Follow these guidelines: 1. Identify event triggers and their types from the schema. 2. For each event, extract its arguments with their roles. 3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'. 4. If no events are found, return 'None'.
EE
CASIE
train
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
He then sent emails to employees of the two unnamed victim companies , described as multinational internet firms , asking them to wire money that they actually owed to the Asian company to the sham Latvian company ’s accounts , prosecutors said .
phishing: sent | attacker: He | tool: emails | victim: employees | victim: the two unnamed victim companies
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
{"events": [{"event_type": "phishing", "trigger": "sent", "arguments": [{"name": "He", "role": "attacker"}, {"name": "emails", "role": "tool"}, {"name": "the two unnamed victim companies", "role": "victim"}, {"name": "employees", "role": "victim"}]}]}
You are an expert in Event Extraction. Your task is to extract events and their arguments from the given text. Follow these guidelines: 1. Identify event triggers and their types from the schema. 2. For each event, extract its arguments with their roles. 3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'. 4. If no events are found, return 'None'.
EE
CASIE
train
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
According to Barracuda Networks , aviation - themed phishing attacks contain links to spoofed airline sites , threat actors personalize the phishing page in a way to trick victims into providing business information .
phishing: spoofed | tool: links | trusted entity: airline sites
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
{"events": [{"event_type": "phishing", "trigger": "spoofed", "arguments": [{"name": "airline sites", "role": "trusted entity"}, {"name": "links", "role": "tool"}]}]}
You are an expert in Event Extraction. Your task is to extract events and their arguments from the given text. Follow these guidelines: 1. Identify event triggers and their types from the schema. 2. For each event, extract its arguments with their roles. 3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'. 4. If no events are found, return 'None'.
EE
CASIE
train
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
The men used simple spear - phishing emails sent to the high - ranking officials they wanted to infect .
phishing: sent | attack pattern: used simple spear - phishing emails | attacker: The men | attacker: they | purpose: wanted to infect | victim: the high - ranking officials
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
{"events": [{"event_type": "phishing", "trigger": "sent", "arguments": [{"name": "the high - ranking officials", "role": "victim"}, {"name": "they", "role": "attacker"}, {"name": "used simple spear - phishing emails", "role": "attack pattern"}, {"name": "wanted to infect", "role": "purpose"}, {"name": "The men", "role": "attacker"}]}]}
You are an expert in Event Extraction. Your task is to extract events and their arguments from the given text. Follow these guidelines: 1. Identify event triggers and their types from the schema. 2. For each event, extract its arguments with their roles. 3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'. 4. If no events are found, return 'None'.
EE
CASIE
train
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
BEC attacks are essentially Phishing scams , or Spear Phishing since the criminals have a specific target .
phishing: Phishing scams
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
{"events": [{"event_type": "phishing", "trigger": "Phishing scams", "arguments": []}]}
You are an expert in Event Extraction. Your task is to extract events and their arguments from the given text. Follow these guidelines: 1. Identify event triggers and their types from the schema. 2. For each event, extract its arguments with their roles. 3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'. 4. If no events are found, return 'None'.
EE
CASIE
train
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
® In a follow - up statement , WhatsApp denied accusations that it had inserted what amounted to a backdoor in its messaging code : The Guardian posted a story this morning claiming that an intentional design decision in WhatsApp that prevents people from losing millions of messages is a “ backdoor ” allowing governments to force WhatsApp to decrypt message streams .
discover vulnerability: posted | discoverer: The Guardian | time: this morning
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
{"events": [{"event_type": "discover vulnerability", "trigger": "posted", "arguments": [{"name": "The Guardian", "role": "discoverer"}, {"name": "this morning", "role": "time"}]}]}
You are an expert in Event Extraction. Your task is to extract events and their arguments from the given text. Follow these guidelines: 1. Identify event triggers and their types from the schema. 2. For each event, extract its arguments with their roles. 3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'. 4. If no events are found, return 'None'.
EE
CASIE
train
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
Nicky works in Tencent ’s Security Platform Department and is responsible for finding vulnerabilities in various products and services .
discover vulnerability: is responsible for finding | discoverer: Nicky | vulnerability: vulnerabilities | vulnerable system: services | vulnerable system: various products
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
{"events": [{"event_type": "discover vulnerability", "trigger": "is responsible for finding", "arguments": [{"name": "vulnerabilities", "role": "vulnerability"}, {"name": "various products", "role": "vulnerable system"}, {"name": "services", "role": "vulnerable system"}, {"name": "Nicky", "role": "discoverer"}]}]}
You are an expert in Event Extraction. Your task is to extract events and their arguments from the given text. Follow these guidelines: 1. Identify event triggers and their types from the schema. 2. For each event, extract its arguments with their roles. 3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'. 4. If no events are found, return 'None'.
EE
CASIE
train
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
Other messages threaten the user with police action if payment is not made .
ransom: payment is not made | attack pattern: threaten the user with police action | tool: messages
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
{"events": [{"event_type": "ransom", "trigger": "payment is not made", "arguments": [{"name": "threaten the user with police action", "role": "attack pattern"}, {"name": "messages", "role": "tool"}]}]}
You are an expert in Event Extraction. Your task is to extract events and their arguments from the given text. Follow these guidelines: 1. Identify event triggers and their types from the schema. 2. For each event, extract its arguments with their roles. 3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'. 4. If no events are found, return 'None'.
EE
CASIE
train
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
The hacking group has supposedly found vulnerabilities in Snapchat ’s systems and managed to steal 1.7 million user data and leaked them on the dark web .
data breach: steal | compromised data: user data | number of data: 1.7 million
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
{"events": [{"event_type": "data breach", "trigger": "steal", "arguments": [{"name": "1.7 million", "role": "number of data"}, {"name": "user data", "role": "compromised data"}]}]}
You are an expert in Event Extraction. Your task is to extract events and their arguments from the given text. Follow these guidelines: 1. Identify event triggers and their types from the schema. 2. For each event, extract its arguments with their roles. 3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'. 4. If no events are found, return 'None'.
EE
CASIE
train
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
— Hacker Fantastic ( @hackerfantastic ) April 14 , 2017 But just hours later , Microsoft announced that many of the vulnerabilities were addressed in a security update released a month ago .
patch vulnerability: were addressed | patch: a security update | releaser: Microsoft | vulnerability: the vulnerabilities
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
{"events": [{"event_type": "patch vulnerability", "trigger": "were addressed", "arguments": [{"name": "the vulnerabilities", "role": "vulnerability"}, {"name": "Microsoft", "role": "releaser"}, {"name": "a security update", "role": "patch"}]}]}
You are an expert in Event Extraction. Your task is to extract events and their arguments from the given text. Follow these guidelines: 1. Identify event triggers and their types from the schema. 2. For each event, extract its arguments with their roles. 3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'. 4. If no events are found, return 'None'.
EE
CASIE
train
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
The IRS advises the bogus email appears to come from the recipient ’s software provider and typically has a subject line that reads something like : “ Software Support Update ” or “ Important Software System Upgrade . ”
phishing: appears to come from | tool: the bogus email | trusted entity: the recipient ’s software provider
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
{"events": [{"event_type": "phishing", "trigger": "appears to come from", "arguments": [{"name": "the recipient ’s software provider", "role": "trusted entity"}, {"name": "the bogus email", "role": "tool"}]}]}
You are an expert in Event Extraction. Your task is to extract events and their arguments from the given text. Follow these guidelines: 1. Identify event triggers and their types from the schema. 2. For each event, extract its arguments with their roles. 3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'. 4. If no events are found, return 'None'.
EE
CASIE
train
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
Potential partners also receive payment instantly when a victim pays their ransom , adding another level of transparency to this partnership .
ransom: pays their ransom | victim: victim
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
{"events": [{"event_type": "ransom", "trigger": "pays their ransom", "arguments": [{"name": "victim", "role": "victim"}]}]}
You are an expert in Event Extraction. Your task is to extract events and their arguments from the given text. Follow these guidelines: 1. Identify event triggers and their types from the schema. 2. For each event, extract its arguments with their roles. 3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'. 4. If no events are found, return 'None'.
EE
CASIE
train
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
Hackers leaked 1.4 GB data , which included customers ' financial records , credit card numbers and PIN codes as well as banking details pertaining to the Al - Thani Qatar Royal Family and Al Jazeera journalists .
data breach: leaked | attacker: Hackers | compromised data: PIN codes | compromised data: banking details | compromised data: credit card numbers | compromised data: data | compromised data: financial records | number of data: 1.4 GB | victim: customers
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
{"events": [{"event_type": "data breach", "trigger": "leaked", "arguments": [{"name": "Hackers", "role": "attacker"}, {"name": "data", "role": "compromised data"}, {"name": "1.4 GB", "role": "number of data"}, {"name": "customers", "role": "victim"}, {"name": "financial records", "role": "compromised data"}, {"name": "credit card numbers", "role": "compromised data"}, {"name": "PIN codes", "role": "compromised data"}, {"name": "banking details", "role": "compromised data"}]}]}
You are an expert in Event Extraction. Your task is to extract events and their arguments from the given text. Follow these guidelines: 1. Identify event triggers and their types from the schema. 2. For each event, extract its arguments with their roles. 3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'. 4. If no events are found, return 'None'.
EE
CASIE
train
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
Most if not all online services have had their fair share of security issues , and most of them managed to get discovered and fixed by people like Ormandy .
discover vulnerability: have had their fair share | discoverer: not all online services | vulnerability: security issues
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
{"events": [{"event_type": "discover vulnerability", "trigger": "have had their fair share", "arguments": [{"name": "security issues", "role": "vulnerability"}, {"name": "not all online services", "role": "discoverer"}]}]}
You are an expert in Event Extraction. Your task is to extract events and their arguments from the given text. Follow these guidelines: 1. Identify event triggers and their types from the schema. 2. For each event, extract its arguments with their roles. 3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'. 4. If no events are found, return 'None'.
EE
CASIE
train
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
In some cases , attackers may have accessed messages and content in chat rooms , HipChat said in a Monday blog post .
data breach: have accessed | attacker: attackers | compromised data: content | compromised data: messages | victim: chat rooms
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
{"events": [{"event_type": "data breach", "trigger": "have accessed", "arguments": [{"name": "messages", "role": "compromised data"}, {"name": "attackers", "role": "attacker"}, {"name": "content", "role": "compromised data"}, {"name": "chat rooms", "role": "victim"}]}]}
You are an expert in Event Extraction. Your task is to extract events and their arguments from the given text. Follow these guidelines: 1. Identify event triggers and their types from the schema. 2. For each event, extract its arguments with their roles. 3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'. 4. If no events are found, return 'None'.
EE
CASIE
train
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
The ransomware needs to connect to a C&C server to work and to receive the ransom note and warning to display : Interestingly enough , only users of Windows 7 or 10 are in danger from this particular piece of ransomware , as it wo n’t run on other versions of the OS .
ransom: receive | attack pattern: connect to a C&C server to work | tool: The ransomware | tool: the ransom note
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
{"events": [{"event_type": "ransom", "trigger": "receive", "arguments": [{"name": "The ransomware", "role": "tool"}, {"name": "connect to a C&C server to work", "role": "attack pattern"}, {"name": "the ransom note", "role": "tool"}]}]}
You are an expert in Event Extraction. Your task is to extract events and their arguments from the given text. Follow these guidelines: 1. Identify event triggers and their types from the schema. 2. For each event, extract its arguments with their roles. 3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'. 4. If no events are found, return 'None'.
EE
CASIE
train
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
In the emails , they did n't ask for a ransom to stop the attacks , but a fee for having already carried out what they called a DDoS protection test .
ransom: ask for a ransom | attacker: they
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
{"events": [{"event_type": "ransom", "trigger": "ask for a ransom", "arguments": [{"name": "they", "role": "attacker"}]}]}
You are an expert in Event Extraction. Your task is to extract events and their arguments from the given text. Follow these guidelines: 1. Identify event triggers and their types from the schema. 2. For each event, extract its arguments with their roles. 3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'. 4. If no events are found, return 'None'.
EE
CASIE
train
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
According to its latest notification , however , Neiman Marcus Group now says full payment card numbers and expiration dates were exposed in the 2015 incident .
data breach: incident | time: 2015
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
{"events": [{"event_type": "data breach", "trigger": "incident", "arguments": [{"name": "2015", "role": "time"}]}]}
You are an expert in Event Extraction. Your task is to extract events and their arguments from the given text. Follow these guidelines: 1. Identify event triggers and their types from the schema. 2. For each event, extract its arguments with their roles. 3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'. 4. If no events are found, return 'None'.
EE
CASIE
train
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
In Nayana 's first announcement a few days later , it said the hackers demanded 550 bitcoins to free up all the servers -- about $ 1.62 million .
ransom: demanded | attacker: the hackers | price: 1.62 million | price: 550 bitcoins | victim: the servers
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
{"events": [{"event_type": "ransom", "trigger": "demanded", "arguments": [{"name": "the hackers", "role": "attacker"}, {"name": "550 bitcoins", "role": "price"}, {"name": "the servers", "role": "victim"}, {"name": "1.62 million", "role": "price"}]}]}
You are an expert in Event Extraction. Your task is to extract events and their arguments from the given text. Follow these guidelines: 1. Identify event triggers and their types from the schema. 2. For each event, extract its arguments with their roles. 3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'. 4. If no events are found, return 'None'.
EE
CASIE
train
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
Ransomware perhaps hit healthcare the hardest in 2016 , with some reports claiming 88 percent of all ransomware affected hospitals .
ransom: hit | time: 2016 | tool: Ransomware | tool: ransomware | victim: healthcare | victim: hospitals
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
{"events": [{"event_type": "ransom", "trigger": "hit", "arguments": [{"name": "2016", "role": "time"}, {"name": "Ransomware", "role": "tool"}, {"name": "ransomware", "role": "tool"}, {"name": "hospitals", "role": "victim"}, {"name": "healthcare", "role": "victim"}]}]}
You are an expert in Event Extraction. Your task is to extract events and their arguments from the given text. Follow these guidelines: 1. Identify event triggers and their types from the schema. 2. For each event, extract its arguments with their roles. 3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'. 4. If no events are found, return 'None'.
EE
CASIE
train
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
In a majority of the cases , once ransomware enters a system , there is no way a user can remove it without losing some files or data , even if one pay the ransom .
ransom: pay the ransom | tool: ransomware | victim: a system | victim: a user
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
{"events": [{"event_type": "ransom", "trigger": "pay the ransom", "arguments": [{"name": "a system", "role": "victim"}, {"name": "a user", "role": "victim"}, {"name": "ransomware", "role": "tool"}]}]}
You are an expert in Event Extraction. Your task is to extract events and their arguments from the given text. Follow these guidelines: 1. Identify event triggers and their types from the schema. 2. For each event, extract its arguments with their roles. 3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'. 4. If no events are found, return 'None'.
EE
CASIE
train
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
Unfortunately , such a search can be easily replicated – “ even with limited resources such as a standard PC and a broadband DSL connection ” – by individuals or groups intent of discovering vulnerabilities in software for future exploitation .
discover vulnerability: discovering | discoverer: groups | discoverer: individuals | vulnerability: vulnerabilities | vulnerable system: software
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
{"events": [{"event_type": "discover vulnerability", "trigger": "discovering", "arguments": [{"name": "software", "role": "vulnerable system"}, {"name": "vulnerabilities", "role": "vulnerability"}, {"name": "groups", "role": "discoverer"}, {"name": "individuals", "role": "discoverer"}]}]}
You are an expert in Event Extraction. Your task is to extract events and their arguments from the given text. Follow these guidelines: 1. Identify event triggers and their types from the schema. 2. For each event, extract its arguments with their roles. 3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'. 4. If no events are found, return 'None'.
EE
CASIE
train
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
Any personal identifiable data a user shared with the app was vulnerable to possible exfiltration by a hacker .
discover vulnerability: was vulnerable | vulnerable system: the app
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
{"events": [{"event_type": "discover vulnerability", "trigger": "was vulnerable", "arguments": [{"name": "the app", "role": "vulnerable system"}]}]}
You are an expert in Event Extraction. Your task is to extract events and their arguments from the given text. Follow these guidelines: 1. Identify event triggers and their types from the schema. 2. For each event, extract its arguments with their roles. 3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'. 4. If no events are found, return 'None'.
EE
CASIE
train
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
The vulnerability was discovered by researchers from the hacking collective the Exploiteers ( formerly GTVHacker ) , who have found vulnerabilities in the Samsung SmartCam devices in the past .
discover vulnerability: was discovered | discoverer: GTVHacker | discoverer: researchers | discoverer: the Exploiteers | vulnerability: The vulnerability
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
{"events": [{"event_type": "discover vulnerability", "trigger": "was discovered", "arguments": [{"name": "researchers", "role": "discoverer"}, {"name": "The vulnerability", "role": "vulnerability"}, {"name": "the Exploiteers", "role": "discoverer"}, {"name": "GTVHacker", "role": "discoverer"}]}]}
You are an expert in Event Extraction. Your task is to extract events and their arguments from the given text. Follow these guidelines: 1. Identify event triggers and their types from the schema. 2. For each event, extract its arguments with their roles. 3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'. 4. If no events are found, return 'None'.
EE
CASIE
train
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
To lure users into downloading , the apps promised a rapid increase in the number of followers , likes and comments for an Instagram account .
phishing: lure | trusted entity: the apps | victim: users
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
{"events": [{"event_type": "phishing", "trigger": "lure", "arguments": [{"name": "users", "role": "victim"}, {"name": "the apps", "role": "trusted entity"}]}]}
You are an expert in Event Extraction. Your task is to extract events and their arguments from the given text. Follow these guidelines: 1. Identify event triggers and their types from the schema. 2. For each event, extract its arguments with their roles. 3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'. 4. If no events are found, return 'None'.
EE
CASIE
train
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
Satan 's ransom note instructs victims to install the Tor browser and then redirected to an .
ransom: instructs | tool: Satan | tool: ransom note | victim: victims
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
{"events": [{"event_type": "ransom", "trigger": "instructs", "arguments": [{"name": "ransom note", "role": "tool"}, {"name": "victims", "role": "victim"}, {"name": "Satan", "role": "tool"}]}]}
You are an expert in Event Extraction. Your task is to extract events and their arguments from the given text. Follow these guidelines: 1. Identify event triggers and their types from the schema. 2. For each event, extract its arguments with their roles. 3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'. 4. If no events are found, return 'None'.
EE
CASIE
train
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
Apple patched the vulnerability with Monday 's release of iOS 10.3.1 .
patch vulnerability: patched | releaser: Apple | vulnerability: the vulnerability
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
{"events": [{"event_type": "patch vulnerability", "trigger": "patched", "arguments": [{"name": "the vulnerability", "role": "vulnerability"}, {"name": "Apple", "role": "releaser"}]}]}
You are an expert in Event Extraction. Your task is to extract events and their arguments from the given text. Follow these guidelines: 1. Identify event triggers and their types from the schema. 2. For each event, extract its arguments with their roles. 3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'. 4. If no events are found, return 'None'.
EE
CASIE
train
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
Unfortunately , many people run older versions of Windows , but Microsoft has been very active in issuing patches for them -- including for the now - unsupported XP .
patch vulnerability: issuing | patch: patches | releaser: Microsoft | vulnerable system version: XP | vulnerable system version: older versions | vulnerable system: Windows
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
{"events": [{"event_type": "patch vulnerability", "trigger": "issuing", "arguments": [{"name": "Microsoft", "role": "releaser"}, {"name": "Windows", "role": "vulnerable system"}, {"name": "patches", "role": "patch"}, {"name": "older versions", "role": "vulnerable system version"}, {"name": "XP", "role": "vulnerable system version"}]}]}
You are an expert in Event Extraction. Your task is to extract events and their arguments from the given text. Follow these guidelines: 1. Identify event triggers and their types from the schema. 2. For each event, extract its arguments with their roles. 3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'. 4. If no events are found, return 'None'.
EE
CASIE
train
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
This extract contained only members ’ email addresses and user ID which can be used to find members ’ publicly available online profiles .
data breach: extract | compromised data: email addresses | compromised data: user ID | victim: members
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
{"events": [{"event_type": "data breach", "trigger": "extract", "arguments": [{"name": "email addresses", "role": "compromised data"}, {"name": "user ID", "role": "compromised data"}, {"name": "members", "role": "victim"}]}]}
You are an expert in Event Extraction. Your task is to extract events and their arguments from the given text. Follow these guidelines: 1. Identify event triggers and their types from the schema. 2. For each event, extract its arguments with their roles. 3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'. 4. If no events are found, return 'None'.
EE
CASIE
train
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
Link11 , who tracked those attacks , claimed the group used a DDoS botnet built with the Mirai IoT malware and asked for 5 Bitcoin ( $ 6,000 ) to stop attacks .
ransom: asked for | attack pattern: used a DDoS botnet built with the Mirai IoT malware | attacker: the group | price: 5 Bitcoin | price: 6,000
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
{"events": [{"event_type": "ransom", "trigger": "asked for", "arguments": [{"name": "5 Bitcoin", "role": "price"}, {"name": "6,000", "role": "price"}, {"name": "used a DDoS botnet built with the Mirai IoT malware", "role": "attack pattern"}, {"name": "the group", "role": "attacker"}]}]}
You are an expert in Event Extraction. Your task is to extract events and their arguments from the given text. Follow these guidelines: 1. Identify event triggers and their types from the schema. 2. For each event, extract its arguments with their roles. 3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'. 4. If no events are found, return 'None'.
EE
CASIE
train
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
Three months on from the global WannaCry cyberattack , someone has withdrawn funds acquired when victims paid ransoms .
ransom: paid ransoms | attacker: someone | victim: victims
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
{"events": [{"event_type": "ransom", "trigger": "paid ransoms", "arguments": [{"name": "victims", "role": "victim"}, {"name": "someone", "role": "attacker"}]}]}
You are an expert in Event Extraction. Your task is to extract events and their arguments from the given text. Follow these guidelines: 1. Identify event triggers and their types from the schema. 2. For each event, extract its arguments with their roles. 3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'. 4. If no events are found, return 'None'.
EE
CASIE
train
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
The breach exposed names , contact information , email addresses , purchase histories and the last four digits of payment card numbers .
data breach: exposed | compromised data: contact information | compromised data: email addresses | compromised data: names | compromised data: purchase histories | compromised data: the last four digits of payment card numbers
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
{"events": [{"event_type": "data breach", "trigger": "exposed", "arguments": [{"name": "names", "role": "compromised data"}, {"name": "contact information", "role": "compromised data"}, {"name": "email addresses", "role": "compromised data"}, {"name": "purchase histories", "role": "compromised data"}, {"name": "the last four digits of payment card numbers", "role": "compromised data"}]}]}
You are an expert in Event Extraction. Your task is to extract events and their arguments from the given text. Follow these guidelines: 1. Identify event triggers and their types from the schema. 2. For each event, extract its arguments with their roles. 3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'. 4. If no events are found, return 'None'.
EE
CASIE
train
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
The Fatboy ransomware is dynamic in the way it targets its victims ; the amount of ransom demanded is determined by the victim ’s location .
ransom: ransom demanded | tool: Fatboy ransomware | victim: victims
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
{"events": [{"event_type": "ransom", "trigger": "ransom demanded", "arguments": [{"name": "Fatboy ransomware", "role": "tool"}, {"name": "victims", "role": "victim"}]}]}
You are an expert in Event Extraction. Your task is to extract events and their arguments from the given text. Follow these guidelines: 1. Identify event triggers and their types from the schema. 2. For each event, extract its arguments with their roles. 3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'. 4. If no events are found, return 'None'.
EE
CASIE
train
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
In October , 2016 , 277 ransomware attacks were reported to Government Computer Emergency Response Team in Hong Kong , China .
ransom: ransomware attacks | place: China | place: Hong Kong | time: October , 2016
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
{"events": [{"event_type": "ransom", "trigger": "ransomware attacks", "arguments": [{"name": "October , 2016", "role": "time"}, {"name": "Hong Kong", "role": "place"}, {"name": "China", "role": "place"}]}]}
You are an expert in Event Extraction. Your task is to extract events and their arguments from the given text. Follow these guidelines: 1. Identify event triggers and their types from the schema. 2. For each event, extract its arguments with their roles. 3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'. 4. If no events are found, return 'None'.
EE
CASIE
train
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
The first big botnet made up of TVT devices was discovered by Sucuri in June 2016 , consisted of over 25,000 bots , and was used to launch Layer 7 DDoS attacks of up to 50,000 requests per second .
discover vulnerability: was discovered | capabilities: launch Layer 7 DDoS attacks | discoverer: Sucuri | time: June 2016 | vulnerable system: TVT devices
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
{"events": [{"event_type": "discover vulnerability", "trigger": "was discovered", "arguments": [{"name": "Sucuri", "role": "discoverer"}, {"name": "June 2016", "role": "time"}, {"name": "TVT devices", "role": "vulnerable system"}, {"name": "launch Layer 7 DDoS attacks", "role": "capabilities"}]}]}
You are an expert in Event Extraction. Your task is to extract events and their arguments from the given text. Follow these guidelines: 1. Identify event triggers and their types from the schema. 2. For each event, extract its arguments with their roles. 3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'. 4. If no events are found, return 'None'.
EE
CASIE
train
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
It only leaks the username , and whether or not that user has enabled remote access ; but this would provide enough for an attacker to try follow - up phishing attacks to try and get the user 's credentials .
data breach: leaks | compromised data: the username
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
{"events": [{"event_type": "data breach", "trigger": "leaks", "arguments": [{"name": "the username", "role": "compromised data"}]}]}
You are an expert in Event Extraction. Your task is to extract events and their arguments from the given text. Follow these guidelines: 1. Identify event triggers and their types from the schema. 2. For each event, extract its arguments with their roles. 3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'. 4. If no events are found, return 'None'.
EE
CASIE
train
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
The presidential election commission said in statement that it would hold a meeting later on Saturday after Macron ’s campaign informed it about the hack and publishing of the data .
data breach: hack | compromised data: data
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
{"events": [{"event_type": "data breach", "trigger": "hack", "arguments": [{"name": "data", "role": "compromised data"}]}]}
You are an expert in Event Extraction. Your task is to extract events and their arguments from the given text. Follow these guidelines: 1. Identify event triggers and their types from the schema. 2. For each event, extract its arguments with their roles. 3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'. 4. If no events are found, return 'None'.
EE
CASIE
train
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
The actors charge varying amounts in Bitcoin to provide the decryption keys to the victim .
ransom: charge | attacker: The actors | payment method: in Bitcoin | victim: the victim
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
{"events": [{"event_type": "ransom", "trigger": "charge", "arguments": [{"name": "in Bitcoin", "role": "payment method"}, {"name": "the victim", "role": "victim"}, {"name": "The actors", "role": "attacker"}]}]}
You are an expert in Event Extraction. Your task is to extract events and their arguments from the given text. Follow these guidelines: 1. Identify event triggers and their types from the schema. 2. For each event, extract its arguments with their roles. 3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'. 4. If no events are found, return 'None'.
EE
CASIE
train
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
Over the past two years , the survey found , the average cost of a data breach to a healthcare organization was more than $ 2.2 million .
data breach: a data breach | damage amount: 2.2 million | time: past two years | victim: a healthcare organization
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
{"events": [{"event_type": "data breach", "trigger": "a data breach", "arguments": [{"name": "a healthcare organization", "role": "victim"}, {"name": "2.2 million", "role": "damage amount"}, {"name": "past two years", "role": "time"}]}]}
You are an expert in Event Extraction. Your task is to extract events and their arguments from the given text. Follow these guidelines: 1. Identify event triggers and their types from the schema. 2. For each event, extract its arguments with their roles. 3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'. 4. If no events are found, return 'None'.
EE
CASIE
train
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
At the time , the bank was adamant that the " vast majority " of users were able to gain access to their accounts and move money around as normal .
data breach: gain access | compromised data: their accounts | victim: the bank | victim: users
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
{"events": [{"event_type": "data breach", "trigger": "gain access", "arguments": [{"name": "users", "role": "victim"}, {"name": "their accounts", "role": "compromised data"}, {"name": "the bank", "role": "victim"}]}]}
You are an expert in Event Extraction. Your task is to extract events and their arguments from the given text. Follow these guidelines: 1. Identify event triggers and their types from the schema. 2. For each event, extract its arguments with their roles. 3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'. 4. If no events are found, return 'None'.
EE
CASIE
train
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
One week ago a global cyberattack dubbed “ unprecedented ” by Europol began infecting an estimated 200,000 of the world ’s computers , starting a seven - day countdown to the destruction of data if victims did not pay a ransom .
ransom: a global cyberattack | time: One week ago
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
{"events": [{"event_type": "ransom", "trigger": "a global cyberattack", "arguments": [{"name": "One week ago", "role": "time"}]}]}
You are an expert in Event Extraction. Your task is to extract events and their arguments from the given text. Follow these guidelines: 1. Identify event triggers and their types from the schema. 2. For each event, extract its arguments with their roles. 3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'. 4. If no events are found, return 'None'.
EE
CASIE
train
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
An attacker would have send the victim an email tricking them into clicking through a password reset link , he says .
phishing: have send | attacker: An attacker | tool: an email | victim: the victim
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
{"events": [{"event_type": "phishing", "trigger": "have send", "arguments": [{"name": "An attacker", "role": "attacker"}, {"name": "the victim", "role": "victim"}, {"name": "an email", "role": "tool"}]}]}
You are an expert in Event Extraction. Your task is to extract events and their arguments from the given text. Follow these guidelines: 1. Identify event triggers and their types from the schema. 2. For each event, extract its arguments with their roles. 3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'. 4. If no events are found, return 'None'.
EE
CASIE
train
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
Clearly the attacks that this industry has been experiencing are not something casual or fleeting .
data breach: the attacks | victim: this industry
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
{"events": [{"event_type": "data breach", "trigger": "the attacks", "arguments": [{"name": "this industry", "role": "victim"}]}]}
You are an expert in Event Extraction. Your task is to extract events and their arguments from the given text. Follow these guidelines: 1. Identify event triggers and their types from the schema. 2. For each event, extract its arguments with their roles. 3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'. 4. If no events are found, return 'None'.
EE
CASIE
train
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
Cyber security experts reveal they have found a second massive computer virus which has affected hundreds of thousands of computers world - wide , like the WannaCry cyber attack last week , has affected hundreds of thousands of computers world - wide and may have North Korean origins .
ransom: WannaCry cyber attack | time: last week | victim: computers
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
{"events": [{"event_type": "ransom", "trigger": "WannaCry cyber attack", "arguments": [{"name": "last week", "role": "time"}, {"name": "computers", "role": "victim"}]}]}
You are an expert in Event Extraction. Your task is to extract events and their arguments from the given text. Follow these guidelines: 1. Identify event triggers and their types from the schema. 2. For each event, extract its arguments with their roles. 3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'. 4. If no events are found, return 'None'.
EE
CASIE
train
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
At last count , 110 organizations have reported successful Phishing attacks targeting W - 2 records , placing more than 120,000 taxpayers at risk for identity fraud .
phishing: Phishing attacks | purpose: targeting W - 2 records | victim: organizations
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
{"events": [{"event_type": "phishing", "trigger": "Phishing attacks", "arguments": [{"name": "targeting W - 2 records", "role": "purpose"}, {"name": "organizations", "role": "victim"}]}]}
You are an expert in Event Extraction. Your task is to extract events and their arguments from the given text. Follow these guidelines: 1. Identify event triggers and their types from the schema. 2. For each event, extract its arguments with their roles. 3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'. 4. If no events are found, return 'None'.
EE
CASIE
train
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
Nicky works in Tencent ’s Security Platform Department and is responsible for finding vulnerabilities in various products and services .
discover vulnerability: is responsible for finding | discoverer: Nicky | vulnerability: vulnerabilities | vulnerable system: services | vulnerable system: various products
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
{"events": [{"event_type": "discover vulnerability", "trigger": "is responsible for finding", "arguments": [{"name": "vulnerabilities", "role": "vulnerability"}, {"name": "various products", "role": "vulnerable system"}, {"name": "services", "role": "vulnerable system"}, {"name": "Nicky", "role": "discoverer"}]}]}
You are an expert in Event Extraction. Your task is to extract events and their arguments from the given text. Follow these guidelines: 1. Identify event triggers and their types from the schema. 2. For each event, extract its arguments with their roles. 3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'. 4. If no events are found, return 'None'.
EE
CASIE
train
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
Then , in early 2016 , the Callisto Group began sending highly targeted spear phishing emails with malicious attachments that contained , as their final payload , the “ Scout ” malware tool from the HackingTeam RCS Galileo platform .
phishing: sending | attacker: the Callisto Group | time: early 2016 | tool: spear phishing emails
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
{"events": [{"event_type": "phishing", "trigger": "sending", "arguments": [{"name": "the Callisto Group", "role": "attacker"}, {"name": "early 2016", "role": "time"}, {"name": "spear phishing emails", "role": "tool"}]}]}
You are an expert in Event Extraction. Your task is to extract events and their arguments from the given text. Follow these guidelines: 1. Identify event triggers and their types from the schema. 2. For each event, extract its arguments with their roles. 3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'. 4. If no events are found, return 'None'.
EE
CASIE
train
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
They would then proceed to kindly steal your log in details and try to log into your account to take your money .
data breach: steal | attacker: They | compromised data: your log in details | purpose: take your money
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
{"events": [{"event_type": "data breach", "trigger": "steal", "arguments": [{"name": "take your money", "role": "purpose"}, {"name": "your log in details", "role": "compromised data"}, {"name": "They", "role": "attacker"}]}]}
You are an expert in Event Extraction. Your task is to extract events and their arguments from the given text. Follow these guidelines: 1. Identify event triggers and their types from the schema. 2. For each event, extract its arguments with their roles. 3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'. 4. If no events are found, return 'None'.
EE
CASIE
train
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
At the time I was writing , the monitoring to the bitcoin wallet address used to receive the payment of the victims revealed that none has paid the ransom .
ransom: has paid the ransom
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
{"events": [{"event_type": "ransom", "trigger": "has paid the ransom", "arguments": []}]}
You are an expert in Event Extraction. Your task is to extract events and their arguments from the given text. Follow these guidelines: 1. Identify event triggers and their types from the schema. 2. For each event, extract its arguments with their roles. 3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'. 4. If no events are found, return 'None'.