Grobios 解析

IOB - Indicator of Behavior (20)

タイムライン

言語

en16
zh4

国・地域

us14
cn6

アクター

アクティビティ

関心

タイムライン

タイプ

ベンダー

製品

Microsoft IIS2
Kentico2
NotificationX Plugin2
WSO2 API Manager2
WSO2 Identity Server2

脆弱性

#脆弱性BaseTemp0day本日修復EPSSCTICVE
1Adobe Dreamweaver 特権昇格5.35.1$0-$5k$0-$5kNot DefinedOfficial Fix0.000570.03CVE-2021-21055
2Atmail Remote Code Execution9.89.4$0-$5k$0-$5kNot DefinedOfficial Fix0.002510.04CVE-2013-5033
3WSO2 API Manager File Upload 特権昇格9.89.8$0-$5k$0-$5kHighNot Defined0.973060.07CVE-2022-29464
4Keysight IXIA Hawkeye licenses クロスサイトスクリプティング4.44.3$0-$5k$0-$5kProof-of-ConceptNot Defined0.000830.07CVE-2023-1860
5Microsoft IIS クロスサイトスクリプティング5.24.7$5k-$25k$0-$5kProof-of-ConceptOfficial Fix0.005480.00CVE-2017-0055
6PHP PHAR phar.c phar_parse_pharfile 情報の漏洩6.46.3$5k-$25k$0-$5kNot DefinedOfficial Fix0.005760.04CVE-2018-20783
7NotificationX Plugin SQL Statement SQLインジェクション5.65.4$0-$5k$0-$5kNot DefinedOfficial Fix0.024140.04CVE-2022-0349
8Ametys CMS auto-completion Plugin en.xml 情報の漏洩5.35.1$0-$5k$0-$5kNot DefinedOfficial Fix0.006060.07CVE-2022-26159
9Joomla CMS Password Reset 特権昇格7.37.0$5k-$25k$0-$5kNot DefinedOfficial Fix0.002070.00CVE-2012-1598
10Joomla CMS Password Reset 弱い暗号化5.35.1$5k-$25k$0-$5kNot DefinedOfficial Fix0.016990.00CVE-2011-4321
11Joomla CMS Web Server Configuration クロスサイトスクリプティング5.25.1$5k-$25k$0-$5kNot DefinedOfficial Fix0.001030.00CVE-2019-7742
12Microweber controller.php 情報の漏洩6.46.1$0-$5k$0-$5kNot DefinedOfficial Fix0.010020.00CVE-2020-13405
13Fengoffice Feng Office クロスサイトスクリプティング4.34.3$0-$5k$0-$5kHighUnavailable0.001920.00CVE-2014-5343
14Wargaming World of Warships Replay Remote Code Execution6.36.1$0-$5k$0-$5kNot DefinedNot Defined0.005170.05CVE-2022-31265
15WordPress WP_Query SQLインジェクション6.36.2$5k-$25k$0-$5kNot DefinedOfficial Fix0.945850.00CVE-2022-21661
16ISPConfig SQLインジェクション6.36.3$0-$5k$0-$5kNot DefinedOfficial Fix0.001520.03CVE-2021-3021
17Kentico CMS File Upload 特権昇格7.57.4$0-$5k$0-$5kNot DefinedOfficial Fix0.002490.03CVE-2018-19453
18Kentico File Upload 特権昇格5.25.1$0-$5k$0-$5kNot DefinedOfficial Fix0.001380.02CVE-2019-19493

IOC - Indicator of Compromise (1)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDIPアドレスHostnameアクターキャンペーンIdentifiedタイプ信頼度
1169.239.129.17rns.za.zappiehost.comGrobios2018年05月17日verified

TTP - Tactics, Techniques, Procedures (7)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IDTechniqueクラス脆弱性アクセスベクタータイプ信頼度
1T1059.007CAPEC-209CWE-79Cross Site Scriptingpredictive
2T1068CWE-264Execution with Unnecessary Privilegespredictive
3TXXXXCAPEC-108CWE-XXXxx Xxxxxxxxxpredictive
4TXXXXCAPEC-38CWE-XXXXxxxxxxxx Xxxxxx Xxxxpredictive
5TXXXXCAPEC-116CWE-XXXXxxxxxxxxx Xx Xxxxxxx Xxxxx Xxxxxxx Xxxxxxxxx Xxxxxxxxxxxpredictive
6TXXXXCAPEC-CWE-XXXXxxxxxxxxxxxx Xxxxxxpredictive
7TXXXX.XXXCAPEC-1CWE-XXXXxxxxxxxxx Xxxxxxxxxxxxxx Xx Xxxxxxxx Xxxx Xxxxxxxxxpredictive

IOA - Indicator of Attack (8)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDクラスIndicatorタイプ信頼度
1File/licensespredictive
2File/uncpath/predictive
3Filexxx/xxxx/xxxx.xpredictive
4Filexxxxxxx/xxx/xxxxxxx/xxxxxx/xxxx-xxxxxxxxxx/<xxxxxx>/xx.xxxpredictive
5Filexxxxxxxxx/xxxxxxx/xxxxx/xxxxxxxxxx/xxxxxxxxxx.xxxpredictive
6Argumentxx_xxpredictive
7Argumentxxxxpredictive
8Input Valuexxxxx"><xxxxxx>xxxxx(%xxxxxxxxxxxx%xx)</xxxxxx>predictive

参考 (2)

The following list contains external sources which discuss the actor and the associated activities:

Might our Artificial Intelligence support you?

Check our Alexa App!