Grayling 解析

IOB - Indicator of Behavior (100)

タイムライン

言語

en90
it6
de2
es2

国・地域

us96
cn2

アクター

アクティビティ

関心

タイムライン

タイプ

ベンダー

製品

Google Android4
Tritanium Scripts Tritanium Bulletin Board2
TeamCal2
Mail Masta Plugin2
Woltlab Burning Board2

脆弱性

#脆弱性BaseTemp0day本日修復EPSSCTICVE
1Thomas R. Pasawicz HyperBook Guestbook Password Database gbconfiguration.dat Hash 情報の漏洩5.35.2$5k-$25k計算中HighWorkaround0.020160.00CVE-2007-1192
2DZCP deV!L`z Clanportal config.php 特権昇格7.36.6$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.009430.67CVE-2010-0966
3MGB OpenSource Guestbook email.php SQLインジェクション7.37.3$0-$5k$0-$5kHighUnavailable0.013021.01CVE-2007-0354
4PHPWind goto.php クロスサイトスクリプティング4.34.3$0-$5k$0-$5kNot DefinedNot Defined0.002540.04CVE-2015-4135
5Google Android Qualcomm メモリ破損9.89.6$100k 以上$5k-$25kNot DefinedOfficial Fix0.003210.02CVE-2016-5344
6Microsoft Exchange Server Privilege Escalation8.87.7$25k-$100k$5k-$25kUnprovenOfficial Fix0.011920.02CVE-2023-21529
7Apple macOS 特権昇格8.07.9$5k-$25k$0-$5kHighOfficial Fix0.000800.00CVE-2023-41993
8Google Android StorageManagerService.java 情報の漏洩4.44.3$5k-$25k$0-$5kNot DefinedOfficial Fix0.000420.00CVE-2022-20219
9Spring Framework Incomplete Fix CVE-2018-1270 特権昇格8.58.4$0-$5k$0-$5kNot DefinedOfficial Fix0.249420.03CVE-2018-1275
10Alt-N MDaemon Worldclient 特権昇格4.94.7$5k-$25k$0-$5kNot DefinedOfficial Fix0.000900.04CVE-2021-27182
11Fortinet FortiGate HTTP Header 未知の脆弱性6.46.1$0-$5k$0-$5kNot DefinedOfficial Fix0.000840.00CVE-2020-15938
12D-Link DIR-655 C apply_sec.cgi Blank 特権昇格8.58.4$5k-$25k$0-$5kNot DefinedOfficial Fix0.014220.00CVE-2019-13560
13DrayTek Vigor2960/Vigor3900/Vigor300B mainfunction.cgi 特権昇格9.89.8$25k-$100k$25k-$100kHighNot Defined0.970790.05CVE-2020-8515
14Woltlab Burning Board register.php クロスサイトスクリプティング4.34.1$0-$5k$0-$5kProof-of-ConceptNot Defined0.009570.00CVE-2007-1443
15Wheatblog add_comment.php クロスサイトスクリプティング4.34.3$0-$5k$0-$5kNot DefinedNot Defined0.001540.00CVE-2006-7002
16TeamCal register.php ディレクトリトラバーサル3.33.3$0-$5k$0-$5kNot DefinedNot Defined0.000000.00
17Public Warehouse Light Blog add_comment.php クロスサイトスクリプティング4.34.1$0-$5k$0-$5kHighOfficial Fix0.010620.00CVE-2007-3131
18Drupal comment_form_add_preview 特権昇格10.09.0$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.033910.00CVE-2007-0626
19Mail Masta Plugin campaign_save.php SQLインジェクション6.76.4$0-$5k$0-$5kProof-of-ConceptNot Defined0.003160.03CVE-2017-6098
20MantisBT Gravatar Plugin Content Security Policy クロスサイトスクリプティング4.54.3$0-$5k$0-$5kNot DefinedOfficial Fix0.001730.00CVE-2016-7111

IOC - Indicator of Compromise (3)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDIPアドレスHostnameアクターキャンペーンIdentifiedタイプ信頼度
13.0.93.185ec2-3-0-93-185.ap-southeast-1.compute.amazonaws.comGrayling2023年10月29日verified
2XX.XXX.XXX.XXXxxxxxxx2023年10月29日verified
3XXX.XXX.XX.XXXxxx-xxx-xx-xxx-xxxx.xxxxxxxxxxxx.xxxXxxxxxxx2023年10月29日verified

TTP - Tactics, Techniques, Procedures (11)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IDTechniqueクラス脆弱性アクセスベクタータイプ信頼度
1T1006CAPEC-126CWE-22Path Traversalpredictive
2T1055CAPEC-10CWE-74Improper Neutralization of Data within XPath Expressionspredictive
3T1059CAPEC-242CWE-94Argument Injectionpredictive
4TXXXX.XXXCAPEC-209CWE-XX, CWE-XXXxxxx Xxxx Xxxxxxxxxpredictive
5TXXXXCAPEC-CWE-XXXXxxxxxxxx Xxxx Xxxxxxxxxxx Xxxxxxxxxxpredictive
6TXXXX.XXXCAPEC-178CWE-XXXXxxx Xxxxxxxxpredictive
7TXXXXCAPEC-CWE-XXX7xx Xxxxxxxx Xxxxxxxxpredictive
8TXXXXCAPEC-108CWE-XXXxx Xxxxxxxxxpredictive
9TXXXXCAPEC-CWE-XXXXxxxxxxxxxx Xxxxxxxxxxpredictive
10TXXXXCAPEC-116CWE-XXXXxxxxxxxxx Xx Xxxxxxx Xxxxx Xxxxxxx Xxxxxxxxx Xxxxxxxxxxxpredictive
11TXXXXCAPEC-CWE-XXXXxxxxxxxxxxxx Xxxxxxpredictive

IOA - Indicator of Attack (19)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDクラスIndicatorタイプ信頼度
1File/inc/campaign_save.phppredictive
2Fileadclick.phppredictive
3Fileadd_comment.phppredictive
4Fileapply_sec.cgipredictive
5Filexxx-xxx/xxxxxxxxxxxx.xxxpredictive
6Filexxxx/xxxxxxxxxxxxxxx.xxxpredictive
7Filexxxxx.xxxpredictive
8Filexxxx.xxxpredictive
9Filexxx/xxxxxx.xxxpredictive
10Filexxxxxxxx.xxxpredictive
11Filexxxxxxxxxxxxxxxxxxxxx.xxxxpredictive
12Argumentxxx::xxxxxxx::xxxxxx/xxx::xxxxxxx::xxxxxxxxxxpredictive
13Argumentxxxxxxxxpredictive
14Argumentxxxxxxx=xxxxxxxxpredictive
15Argumentxxpredictive
16Argumentxxxxpredictive
17Argumentxxxx_xxpredictive
18Argumentxxxxx_xxxxxxpredictive
19Argumentxxxpredictive

参考 (2)

The following list contains external sources which discuss the actor and the associated activities:

Interested in the pricing of exploits?

See the underground prices here!