Dalbit 解析

IOB - Indicator of Behavior (116)

タイムライン

言語

en58
zh54
ja2
es2

国・地域

cn90
us22

アクター

アクティビティ

関心

タイムライン

タイプ

ベンダー

製品

ONLYOFFICE Document Server8
Microsoft Windows8
Linux Kernel4
Trend Micro OfficeScan XG4
Trend Micro Apex One4

脆弱性

#脆弱性BaseTemp0day本日修復EPSSCTICVE
1Microsoft IIS クロスサイトスクリプティング5.24.7$5k-$25k$0-$5kProof-of-ConceptOfficial Fix0.005480.08CVE-2017-0055
2Apache HTTP Server HTTP/2 Request 特権昇格6.46.4$5k-$25k$5k-$25kNot DefinedNot Defined0.006060.00CVE-2020-9490
3Trend Micro Apex One 特権昇格6.56.5$0-$5k$0-$5kHighNot Defined0.000620.00CVE-2020-24557
4Oracle WebLogic Server Core 情報の漏洩7.57.3$5k-$25k$0-$5kNot DefinedOfficial Fix0.008600.05CVE-2023-21931
5Oracle Enterprise Data Quality General 未知の脆弱性5.35.1$5k-$25k$0-$5kNot DefinedOfficial Fix0.001620.05CVE-2020-13956
6Bouncy Castle for Java ASN.1 org.bouncycastle.openssl.PEMParser サービス拒否4.54.4$0-$5k$0-$5kNot DefinedOfficial Fix0.000450.00CVE-2023-33202
7Fortinet FortiOS SSL-VPN メモリ破損9.89.6$25k-$100k$5k-$25kHighOfficial Fix0.018420.04CVE-2024-21762
8PolicyKit polkitd polkitbackendinteractiveauthority.c authentication_agent_new サービス拒否4.03.8$0-$5k$0-$5kNot DefinedOfficial Fix0.000420.03CVE-2015-3218
9Modicon /EcoStruxure Control ExpertUnity Pro/M340/M580 Downstream Component 特権昇格8.58.2$0-$5k$0-$5kNot DefinedOfficial Fix0.002330.04CVE-2020-7475
10Microsoft ASP.NET Security Feature 弱い認証7.47.2$5k-$25k$0-$5kNot DefinedOfficial Fix0.004240.06CVE-2018-8171
11Clash Configuration File cfw-setting.yaml 特権昇格8.08.0$0-$5k$0-$5kNot DefinedNot Defined0.003890.04CVE-2023-24205
12Apache NiFi 特権昇格5.65.5$5k-$25k$0-$5kNot DefinedOfficial Fix0.001000.02CVE-2023-34212
13Schneider Electric Modicon M580 Access Control 特権昇格8.58.5$0-$5k$0-$5kNot DefinedNot Defined0.013600.00CVE-2018-7847
14Oracle Retail Sales Audit Sales Audit Maintenance サービス拒否7.57.2$5k-$25k$0-$5kNot DefinedOfficial Fix0.014190.05CVE-2017-12626
15XINJE XD5E-30R-E Modbus サービス拒否6.86.6$0-$5k$0-$5kProof-of-ConceptNot Defined0.000490.08CVE-2023-5462
16Yongyou UFIDA-NC PrintTemplateFileServlet.java ディレクトリトラバーサル6.76.5$0-$5k$0-$5kProof-of-ConceptNot Defined0.001130.04CVE-2023-4748
17Schneider Electric EcoStruxure Control Expert Modbus 特権昇格8.58.5$0-$5k$0-$5kNot DefinedNot Defined0.002010.00CVE-2022-37300
18Schneider Electric Modicon M580 Modbus 特権昇格4.84.8$0-$5k$0-$5kNot DefinedNot Defined0.001030.00CVE-2020-7537
19Synology DiskStation Manager synorelayd 特権昇格6.86.5$0-$5k$0-$5kNot DefinedOfficial Fix0.001910.04CVE-2021-26566
20Intel CPU Gather Date Sampling Downfall 情報の漏洩4.54.5$5k-$25k$0-$5kNot DefinedNot Defined0.001500.00CVE-2022-40982

キャンペーン (1)

These are the campaigns that can be associated with the actor:

  • South Korea

IOC - Indicator of Compromise (9)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

TTP - Tactics, Techniques, Procedures (15)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (38)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDクラスIndicatorタイプ信頼度
1File/baseOpLog.dopredictive
2File/cgi-bin/luci/api/authpredictive
3File/debug/pprofpredictive
4File/uncpath/predictive
5File/uploadpredictive
6File/xx-xxxxx/xxxxx-xxxx.xxxpredictive
7Filexxxxx.xxx?xxxxxx=xxxxxx_xxxxxxxpredictive
8Filexxxxx.xxx?x=xxxxx&x=xxxx&x=xxxxpredictive
9Filexxxx_xx.xxpredictive
10Filexxx-xxxxxxx.xxxxpredictive
11Filexxxxxxx.xxxpredictive
12Filexxxxxxxxxxxxxx-xxxxxxxxxxxxx/xxx/xxxx/xxxx/xxx/xxxxxxxxxxxx/xxxxxxxxx/xxxxxxxxxxxxxxxxxxx/xxxxxxxxxxxxxxxxxxxxxxxxxxx.xxxxpredictive
13Filexxxxx.xxxpredictive
14Filexxxx.xpredictive
15Filexxxxxx.xx.x.xpredictive
16Filexxxxxxxxx/xxxxxxx/xxxxxx/xxxxxxxxxx.xxxpredictive
17Filexxx_xxxxxx.xpredictive
18Filexxx/xxxx/xxx_xxxxx.xpredictive
19Filexxxxxxxxxxx_xxxxxxxxxxxx.xxpredictive
20Filexxxxxxxxxxxxx/xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx.xpredictive
21Filexxxxxxxxxxxxxxxxxxxxxxxx.xxxxpredictive
22Filexxxxxxxxxx_xxxxxxx.xxxpredictive
23Filexxxxx-xxxxxxpredictive
24Filexxxxxx.xxxpredictive
25Libraryxxxxxxxxxx.xxxpredictive
26Libraryxxxxxx.xx.xpredictive
27Argument$_xxxxxx[xxxx_xxxx]predictive
28Argumentxxxxxxxxxpredictive
29Argumentxxxxxxxxxxxxxpredictive
30Argumentxxxxxpredictive
31Argumentxxxxxxpredictive
32Argumentxxxxxxxxpredictive
33Argumentxxpredictive
34Argumentxxxxxxxxxxx/xxxxxxxxxpredictive
35Argumentxxxxxx.xxxxpredictive
36Argumentxxxxxxxxpredictive
37Argumentxxxxxxpredictive
38Argumentxxxxx_xxpredictive

参考 (2)

The following list contains external sources which discuss the actor and the associated activities:

Do you know our Splunk app?

Download it now for free!