AnyDesk Analysisinfo

IOB - Indicator of Behavior (72)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Language

en66
ru4
es2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Country

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Actors

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Activities

Interest (70)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

Tenda AC10U8
MitraStar GPT-2741GNAC-N22
WP ERP Plugin2
lmxcms2
magmi2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vulnerabilities (20)

These are the vulnerabilities that we have identified as researched, approached, or attacked.

#VulnerabilityBaseTemp0dayTodayExpCouKEVEPSSCTICVE
1Tenda AC10U fromSetWirelessRepeat stack-based overflow6.46.3$0-$5k$0-$5kProof-of-ConceptNot defined 0.073420.23CVE-2024-0930
2WordPress Customizer path traversal7.06.7$5k-$25k$0-$5kNot definedOfficial fix 0.305470.00CVE-2017-14722
3eSyndicat Directory Software suggest-listing.php cross site scripting3.53.5$0-$5k$0-$5kNot definedNot defined 0.000001.65
4Microsoft Windows COM+ Event System Service type confusion8.17.7$25k-$100k$5k-$25kAttackedOfficial fixVerified0.009840.00CVE-2022-41033
5TRENDnet TEW-800MB POST Request os command injection7.26.8$0-$5k$0-$5kProof-of-ConceptNot definedpossible0.582510.33CVE-2024-0918
6openCryptoki RSA PKCS#1 v1.5 timing discrepancy4.84.7$0-$5k$0-$5kNot definedOfficial fix 0.002290.00CVE-2024-0914
7WP ERP Plugin sql injection5.95.9$0-$5k$0-$5kNot definedNot defined 0.006780.00CVE-2024-0913
8Johnson Controls C-CURE 9000 log file3.13.0$0-$5k$0-$5kNot definedOfficial fix 0.000500.00CVE-2024-0912
9TRENDnet TEW-815DAP POST Request do_setNTP command injection8.38.0$0-$5k$0-$5kProof-of-ConceptNot definedpossible0.476830.45CVE-2024-0919
10Tenda AC10U saveParentControlInfo stack-based overflow6.46.3$0-$5k$0-$5kProof-of-ConceptNot defined 0.000730.21CVE-2024-0931
11Tenda AC10U formSetDeviceName stack-based overflow6.46.3$0-$5k$0-$5kProof-of-ConceptNot defined 0.001590.33CVE-2024-0923
12D-Link DIR-816 A2 Web setDeviceSettings os command injection6.46.3$5k-$25k$0-$5kProof-of-ConceptNot defined 0.178960.33CVE-2024-0921
13Tenda AC10U formWifiWpsOOB stack-based overflow6.46.3$0-$5k$0-$5kProof-of-ConceptNot defined 0.001720.11CVE-2024-0926
14Tenda AC10U formQuickIndex stack-based overflow6.46.3$0-$5k$0-$5kProof-of-ConceptNot defined 0.001590.22CVE-2024-0922
15Microsoft Windows CSC Service heap-based overflow7.87.2$25k-$100k$0-$5kProof-of-ConceptOfficial fixExpected0.831660.00CVE-2024-26229
16Linux Kernel amdkfd calculation6.66.5$5k-$25k$0-$5kNot definedOfficial fix 0.000220.00CVE-2024-41011
17laravel-s Laravel.php file inclusion7.67.6$0-$5k$0-$5kNot definedNot defined 0.002650.00CVE-2023-29931
18nasirkhan Laravel Starter Password Reset forgot-password response discrepancy4.24.2$0-$5k$0-$5kProof-of-ConceptNot defined 0.001840.00CVE-2024-6056
19B&R Industrial Automation Runtime System Diagnostics Manager cross site scripting5.25.2$0-$5k$0-$5kNot definedNot defined 0.002330.00CVE-2022-4286
20Synology VPN Plus Server Remote Desktop out-of-bounds write9.99.7$0-$5k$0-$5kNot definedOfficial fix 0.034120.00CVE-2022-43931

IOC - Indicator of Compromise (4)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDIP addressHostnameActorCampaignsIdentifiedTypeConfidence
152.89.196.49ec2-52-89-196-49.us-west-2.compute.amazonaws.comAnyDesk04/02/2024VerifiedLow
2XXX.XXX.XX.XXXxxx-xxx-xx-xxx.xxxxxxxxxxxx.xxxXxxxxxx08/19/2025VerifiedVery High
3XXX.XX.XXX.XXXXxxxxxx04/02/2024VerifiedHigh
4XXX.XX.X.XXXxxx.xxxxxxxxxxxxxxxxxxx.xxxxXxxxxxx04/02/2024VerifiedHigh

TTP - Tactics, Techniques, Procedures (12)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (36)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1File/forgot-passwordPredictiveHigh
2File/goform/setDeviceSettingsPredictiveHigh
3File/goform/SetNetControlListPredictiveHigh
4File/index.php/newsletter/subscriber/new/PredictiveHigh
5File/sqlitemanager/main.php?dbsel=-1%20or%2072%20=%2072PredictiveHigh
6File/xxx/xxxxxxxxxx/xxxxxxx.xxxPredictiveHigh
7Filexxxxxxx/xxxxxxxxxxx.xPredictiveHigh
8Filexxxxxxx.xxxPredictiveMedium
9Filexxxxxxxxxx.xxxxx.xxxPredictiveHigh
10Filexxxxxxx/xxxxxxx/xxxxxxx.xxxx?xxxxPredictiveHigh
11Filexxxxxxxx/xxxxxxxx/xxxxx-xxxxxxxx-xxxxx.xxxPredictiveHigh
12Filexxxxx.xxxPredictiveMedium
13FilexxxxxxxxxxPredictiveMedium
14Filexxxxxxx-xxxxxxx.xxxPredictiveHigh
15Filexxxxxxxxxxxx.xxxPredictiveHigh
16Filexx-xxxxxxxx/xxxx.xxxPredictiveHigh
17Filexxx/xxxxxxxx/xxxxxxx.xxxPredictiveHigh
18Argumentxxxxxxxx/xxxx/xxxxPredictiveHigh
19ArgumentxxxxxxxxxPredictiveMedium
20ArgumentxxxxxxxPredictiveLow
21ArgumentxxxxxPredictiveLow
22ArgumentxxxxxxxxPredictiveMedium
23ArgumentxxPredictiveLow
24ArgumentxxxxxPredictiveLow
25ArgumentxxxxPredictiveLow
26ArgumentxxxxxxxPredictiveLow
27Argumentxxxxxxxxxxx/xxxxxxxxxPredictiveHigh
28ArgumentxxxxxxxxxxxxxPredictiveHigh
29Argumentxxxx_xxxxPredictiveMedium
30ArgumentxxxxxxxxxxxxxxxxxxxxPredictiveHigh
31ArgumentxxxxxPredictiveLow
32ArgumentxxxxxxxxxxxxxxxxPredictiveHigh
33ArgumentxxxxPredictiveLow
34Argumentxxxxxx_xxxxxxPredictiveHigh
35Input Valuex) xxx xxxxxxxxx(x,xxxxxx(xxxx,xxxx()),x)#PredictiveHigh
36Input ValuexxxxxxxxPredictiveMedium

References (4)

The following list contains external sources which discuss the actor and the associated activities:

This view requires CTI permissions

Just purchase a CTI license today!