KeyBoy 解析

IOB - Indicator of Behavior (1000)

タイムライン

言語

en994
zh6

国・地域

us988
hk12

アクター

アクティビティ

関心

タイムライン

タイプ

ベンダー

製品

Google Android4
Ubiquiti EdgeRouter X2
SourceCodester Alphaware Simple E-Commerce System2
PbootCMS2
PHPEMS2

脆弱性

#脆弱性BaseTemp0day本日修復EPSSCTICVE
1TRENDnet TEW-652BRP Web Management Interface get_set.ccp 特権昇格8.88.6$0-$5k$0-$5kProof-of-ConceptNot Defined0.000760.12CVE-2023-0611
2TRENDNet TEW-811DRU httpd guestnetwork.asp メモリ破損7.57.3$0-$5k$0-$5kProof-of-ConceptNot Defined0.000600.12CVE-2023-0617
3TRENDnet TEW-652BRP Web Service cfg_op.ccp メモリ破損7.56.8$0-$5k$0-$5kProof-of-ConceptNot Defined0.000970.08CVE-2023-0618
4TRENDnet TEW-652BRP Web Interface ping.ccp 特権昇格8.17.8$0-$5k$0-$5kProof-of-ConceptNot Defined0.010490.04CVE-2023-0640
5TRENDnet TEW-811DRU Web Management Interface wan.asp メモリ破損6.56.3$0-$5k$0-$5kProof-of-ConceptNot Defined0.001330.07CVE-2023-0637
6TRENDnet TEW-811DRU httpd security.asp メモリ破損7.57.3$0-$5k$0-$5kProof-of-ConceptNot Defined0.001370.04CVE-2023-0613
7Netgear WNDR3700v2 Web Interface サービス拒否4.34.2$5k-$25k$0-$5kProof-of-ConceptNot Defined0.001350.16CVE-2023-0850
8TP-Link Archer C50 Web Management Interface サービス拒否6.56.3$0-$5k$0-$5kProof-of-ConceptNot Defined0.000740.05CVE-2023-0936
9SourceCodester E-Commerce System クロスサイトスクリプティング4.14.0$0-$5k$0-$5kProof-of-ConceptNot Defined0.000520.04CVE-2023-1569
10SourceCodester Alphaware Simple E-Commerce System SQLインジェクション7.06.8$0-$5k$0-$5kProof-of-ConceptNot Defined0.001710.04CVE-2023-1504
11Ubiquiti EdgeRouter X OSPF 特権昇格 [係争状態]8.17.8$0-$5k$0-$5kProof-of-ConceptNot Defined0.010490.00CVE-2023-1458
12SourceCodester E-Commerce System setDiscount.php SQLインジェクション6.66.5$0-$5k$0-$5kProof-of-ConceptNot Defined0.001710.08CVE-2023-1505
13SourceCodester Alphaware Simple E-Commerce System edit_customer.php SQLインジェクション7.06.8$0-$5k$0-$5kProof-of-ConceptNot Defined0.001710.08CVE-2023-1502
14SourceCodester Alphaware Simple E-Commerce System admin_index.php SQLインジェクション7.06.8$0-$5k$0-$5kProof-of-ConceptNot Defined0.001710.04CVE-2023-1503
15OpenStack Nova noVNC Redirect4.94.7$0-$5k$0-$5kNot DefinedOfficial Fix0.925960.04CVE-2021-3654
16Google Android U-Boot Privilege Escalation7.67.5$25k-$100k$5k-$25kNot DefinedOfficial Fix0.000830.04CVE-2023-48425
17Google Android メモリ破損3.93.4$25k-$100k$5k-$25kUnprovenOfficial Fix0.000000.00
18RaidenMAILD Mail Server ディレクトリトラバーサル4.34.2$0-$5k$0-$5kNot DefinedNot Defined0.000530.03CVE-2024-32399
19PbootCMS クロスサイトスクリプティング3.63.6$0-$5k$0-$5kProof-of-ConceptNot Defined0.000520.20CVE-2024-1018
20WordPress SQLインジェクション6.86.7$5k-$25k$0-$5kNot DefinedOfficial Fix0.004670.00CVE-2022-21664

IOC - Indicator of Compromise (4)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDIPアドレスHostnameアクターキャンペーンIdentifiedタイプ信頼度
145.125.12.147spk.cloudie.hkKeyBoy2022年03月27日verified
2XXX.XX.XXX.XXXXxxxxx2022年03月27日verified
3XXX.XXX.XXX.XXXXxxxxx2022年03月27日verified
4XXX.XXX.XXX.XXXxxxxx2022年03月27日verified

TTP - Tactics, Techniques, Procedures (5)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IDTechniqueクラス脆弱性アクセスベクタータイプ信頼度
1T1006CAPEC-126CWE-22Path Traversalpredictive
2TXXXX.XXXCAPEC-209CWE-XXXxxxx Xxxx Xxxxxxxxxpredictive
3TXXXXCAPEC-136CWE-XXXxxxxxx Xxxxx Xx Xxxxxxxxxx Xxxxxxxxxx Xxxxxxxxxpredictive
4TXXXX.XXXCAPEC-178CWE-XXXXxxx Xxxxxxxxpredictive
5TXXXXCAPEC-108CWE-XXXxx Xxxxxxxxxpredictive

IOA - Indicator of Attack (27)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDクラスIndicatorタイプ信頼度
1File/admin.php?p=/Area/index#tab=t2predictive
2File/ecommerce/admin/settings/setDiscount.phppredictive
3File/webeditor/predictive
4File/wireless/guestnetwork.asppredictive
5File/xxxxxxxx/xxxxxxxx.xxxpredictive
6Filexxxxx/xxxxx_xxxxx.xxxpredictive
7Filexxxxx/xxxx/xxxxxxxxxx.xxx?xxxxxx=xxxxpredictive
8Filexxx_xx.xxxpredictive
9Filexxxxxxxx/xxxx_xxxxxxxx.xxxpredictive
10Filexxx_xxx.xxxpredictive
11Filexxxx.xxxpredictive
12Filexxx.xxxpredictive
13Libraryxxx/xxxxxxx.xxx.xxxpredictive
14Argumentxxxxpredictive
15Argumentxxxxxx_xxx_xxpredictive
16Argumentxxxxxxxxpredictive
17Argumentxxxxx/xxxxxxxxpredictive
18Argumentxxxxxxxxx/xx/xxxxxxxxpredictive
19Argumentxxpredictive
20Argumentxxxxpredictive
21Argumentxxxxxxxx/xxxxxxxxpredictive
22Argumentx_xxxxpredictive
23Input Valuexxxxxx xxx (xxxxxx xxxx xxxx (xxxxxx(xxxxx(x)))xxxx)predictive
24Input Value<xxxxxx>xxxxx('x')</xxxxxx>predictive
25Input Valuex' xxxxx xxxxx(x) xxx 'xxxx'='xxxxpredictive
26Input Valuexxxxx' xxx (xxxxxx xxxx xxxx (xxxxxx(xxxxx(x)))xxxx)-- xxxxpredictive
27Input Valuexxxxx%xxxxxx.xxx ' xxx (xxxxxx xxxx xxxx (xxxxxx(xxxxx(x)))xxxx) xxx 'xxxx'='xxxxpredictive

参考 (2)

The following list contains external sources which discuss the actor and the associated activities:

Do you know our Splunk app?

Download it now for free!