Zeppelin 解析

IOB - Indicator of Behavior (16)

タイムライン

言語

en14
ru2

国・地域

us10
me4
lv2

アクター

アクティビティ

関心

タイムライン

タイプ

ベンダー

製品

SAP BASIS2
Node.js2
10Web Photo Gallery Plugin2
Microsoft IIS2
HCL Traveler Web Admin2

脆弱性

#脆弱性BaseTemp0day本日修復EPSSCTICVE
1Backdoor.Win32.Redkod.d Service Port 4820 弱い認証7.36.4$0-$5k$0-$5kProof-of-ConceptWorkaround0.000000.00
2Microsoft IIS FTP Server メモリ破損7.57.2$25k-$100k$0-$5kHighOfficial Fix0.969920.05CVE-2010-3972
3Node.js 特権昇格6.56.4$0-$5k$0-$5kNot DefinedOfficial Fix0.000450.07CVE-2024-21892
4simple-git listRemote Remote Code Execution7.87.8$0-$5k$0-$5kNot DefinedOfficial Fix0.021110.06CVE-2022-25860
5SAP BASIS 特権昇格8.88.6$5k-$25k$0-$5kNot DefinedOfficial Fix0.000990.00CVE-2022-41264
6Node.js Module._load 特権昇格7.67.6$0-$5k$0-$5kNot DefinedNot Defined0.000910.03CVE-2023-32002
7pesign systemd Service 特権昇格5.95.9$0-$5k$0-$5kNot DefinedNot Defined0.000440.00CVE-2022-3560
8WordPress ディレクトリトラバーサル5.75.6$5k-$25k$0-$5kNot DefinedOfficial Fix0.004000.20CVE-2023-2745
9Social Login and Register Plugin 弱い認証6.36.1$0-$5k$0-$5kNot DefinedNot Defined0.012210.03CVE-2023-2982
10HCL Traveler Web Admin LotusTraveler.nsf クロスサイトスクリプティング5.55.5$0-$5k$0-$5kNot DefinedNot Defined0.000540.00CVE-2022-27561
11301 Redirects - Easy Redirect Manager Plugin WordPress SQLインジェクション6.76.4$0-$5k$0-$5kNot DefinedOfficial Fix0.000640.00CVE-2021-24142
12WordPress Editor 情報の漏洩4.34.1$5k-$25k$0-$5kNot DefinedOfficial Fix0.006560.06CVE-2021-29450
13WordPress Media Library Parser XML External Entity6.36.0$5k-$25k$0-$5kNot DefinedOfficial Fix0.010610.02CVE-2021-29447
1410Web Photo Gallery Plugin model.php SQLインジェクション8.07.7$0-$5k$0-$5kNot DefinedOfficial Fix0.001380.00CVE-2021-24139

IOC - Indicator of Compromise (2)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDIPアドレスHostnameアクターキャンペーンIdentifiedタイプ信頼度
145.142.213.167katitoons.comZeppelin2022年05月12日verified
2XXX.XXX.XXX.XXXXxxxxxxx2022年05月12日verified

TTP - Tactics, Techniques, Procedures (7)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IDTechniqueクラス脆弱性アクセスベクタータイプ信頼度
1T1006CAPEC-126CWE-22Path Traversalpredictive
2T1059CAPEC-242CWE-94Argument Injectionpredictive
3TXXXX.XXXCAPEC-209CWE-XXXxxxx Xxxx Xxxxxxxxxpredictive
4TXXXX.XXXCAPEC-191CWE-XXXXxxx-xxxxx Xxxxxxxxxxxpredictive
5TXXXXCAPEC-CWE-XXXXxxxxxxxxx Xxxxxxpredictive
6TXXXXCAPEC-108CWE-XXXxx Xxxxxxxxxpredictive
7TXXXXCAPEC-116CWE-XXXXxxxxxxxxx Xx Xxxxxxx Xxxxx Xxxxxxx Xxxxxxxxx Xxxxxxxxxxxpredictive

IOA - Indicator of Attack (5)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDクラスIndicatorタイプ信頼度
1File/etc/pki/pesignpredictive
2Filefrontend/models/model.phppredictive
3Filexxxxxxxxxxxxx.xxxpredictive
4Argumentxxx_xxxxxx_xpredictive
5Argumentxxxxxx xxxxpredictive

参考 (2)

The following list contains external sources which discuss the actor and the associated activities:

Might our Artificial Intelligence support you?

Check our Alexa App!