Atlantida Analysisinfo

IOB - Indicator of Behavior (436)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Language

en274
de102
ru48
es8
pl4

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Country

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Actors

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Activities

Interest

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

Microsoft Windows6
MikroTik RouterOS6
Linux Kernel6
OpenSSH6
FreeBSD4

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vulnerabilities

These are the vulnerabilities that we have identified as researched, approached, or attacked.

#VulnerabilityBaseTemp0dayTodayExpCouKEVEPSSCTICVE
1Thomas R. Pasawicz HyperBook Guestbook Password Database gbconfiguration.dat Hash information disclosure5.35.2$5k-$25kCalculatingHighWorkaroundpossible0.029560.00CVE-2007-1192
2DZCP deV!L`z Clanportal config.php code injection7.36.6$0-$5k$0-$5kProof-of-ConceptOfficial fix 0.009700.00CVE-2010-0966
3TikiWiki tiki-register.php input validation7.36.6$0-$5k$0-$5kProof-of-ConceptOfficial fix 0.042771.58CVE-2006-6168
4Joomla CMS com_easyblog sql injection6.36.1$5k-$25k$5k-$25kNot definedNot defined 0.000000.30
5FreeBSD FPU x87 Register information disclosure4.03.8$0-$5k$0-$5kNot definedOfficial fix 0.000000.00
6Russcom Network Loginphp register.php cross site scripting4.34.1$0-$5k$0-$5kProof-of-ConceptUnavailable 0.004270.02CVE-2006-2160
7Jelsoft vBulletin register.php denial of service7.37.3$0-$5k$0-$5kNot definedNot defined 0.006900.00CVE-2006-4272
8CONTROLzx HMS register_domain.php cross site scripting3.53.3$0-$5k$0-$5kProof-of-ConceptNot defined 0.000000.04
9nginx request smuggling6.96.9$0-$5k$0-$5kNot definedNot defined 0.000000.20CVE-2020-12440
10Ultimate PHP Board register.php5.35.3$0-$5k$0-$5kNot definedNot defined 0.003240.08CVE-2006-3206
11SloughFlash SF-Users register.php cross site scripting4.34.1$0-$5k$0-$5kProof-of-ConceptNot defined 0.005270.00CVE-2006-2167
12Linux Kernel FXSAVE x87 Register cryptographic issues4.33.9$5k-$25k$0-$5kProof-of-ConceptOfficial fix 0.000780.00CVE-2006-1056
13X7 Group X7 Chat register.php cross site scripting4.33.9$0-$5k$0-$5kProof-of-ConceptOfficial fix 0.005270.00CVE-2006-2282
14Kailash Nadh boastMachine Admin Interface register.php cross site scripting4.33.8$0-$5k$0-$5kProof-of-ConceptUnavailable 0.005070.00CVE-2006-3826
15GeoClassifieds Enterprise register.php cross site scripting3.53.3$0-$5k$0-$5kProof-of-ConceptNot defined 0.000000.00
16PhotoPost PHP register.php privileges management5.35.3$0-$5k$0-$5kNot definedNot defined 0.000000.05
17Tritanium Bulletin Board register.php cross site scripting4.34.1$0-$5k$0-$5kProof-of-ConceptNot defined 0.004270.02CVE-2006-1815
18CMS Made Simple News Module Time-Based sql injection7.77.7$0-$5k$0-$5kProof-of-ConceptNot definedexpected0.922250.00CVE-2019-9053
19Moment.js path traversal6.96.7$0-$5k$0-$5kNot definedOfficial fix 0.005390.00CVE-2022-24785

IOC - Indicator of Compromise (4)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDIP addressHostnameActorCampaignsIdentifiedTypeConfidence
145.144.232.99ib.systemsAtlantida05/25/2025verifiedVery High
2XXX.X.XXX.XXxxx-xx.xx.xxxxxxxXxxxxxxxx05/25/2025verifiedVery High
3XXX.XXX.XXX.XXXxxxxxxxx07/30/2024verifiedVery High
4XXX.XXX.XXX.XXXXxxxxxxxx10/25/2024verifiedVery High

TTP - Tactics, Techniques, Procedures (16)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (94)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1File/admin/config/uploadicon.phppredictiveHigh
2File/admin/index2.htmlpredictiveHigh
3File/advanced-tools/nova/bin/netwatchpredictiveHigh
4File/api/baskets/{name}predictiveHigh
5File/application/index/controller/Databasesource.phppredictiveHigh
6File/cgi-bin/nas_sharing.cgipredictiveHigh
7File/forum/away.phppredictiveHigh
8File/inquiries/view_inquiry.phppredictiveHigh
9File/ipms/imageConvert/imagepredictiveHigh
10File/livesite/edit_designer_region.phppredictiveHigh
11File/ndmComponents.jspredictiveHigh
12File/v1/sql-runnerpredictiveHigh
13Fileaddguest.cgipredictiveMedium
14Filexxxxx\xxxxx\xxxxxxx\xxxxxxxx.xxxpredictiveHigh
15Filexxxxxx/xxxxxxx/xxxx/xxxxx.xxxpredictiveHigh
16Filexxxxxxx.xxxpredictiveMedium
17Filexxxxxx-xxxxxxxx.xxxpredictiveHigh
18Filexxxxxxx-xxxxxx-xxxxxx.xxxpredictiveHigh
19Filexxxxxxx_xxx.xxxpredictiveHigh
20Filexxxx/xxxxxxxxxxxxxxx.xxxpredictiveHigh
21Filexxxxxxx/xxxxx/xxxxx/xxxxxx-xxx.xpredictiveHigh
22Filexxxxxxxxxxx.xxxpredictiveHigh
23Filexxxxx.xxxpredictiveMedium
24Filexxxxxxxxxxxx.xxxpredictiveHigh
25Filexxxx.xxxpredictiveMedium
26Filexxxx.xpredictiveLow
27Filexxx/xxxxxx.xxxpredictiveHigh
28Filexxx/xxxxxxxxxxx/xxxxxxx.xxxpredictiveHigh
29Filexxxxx.xxxpredictiveMedium
30Filexxxxx.xxxpredictiveMedium
31Filexxxxx.xxxpredictiveMedium
32Filexxxxx/predictiveLow
33Filexxxxxxx.xxxpredictiveMedium
34Filexxxx/xxx_xxxxx.xxxpredictiveHigh
35Filexxxx_xxxxxxx.xxxpredictiveHigh
36Filexxxxx_xxx.xxxpredictiveHigh
37Filexxxxxxxx.xxxxpredictiveHigh
38Filexxxxxxxx.xxxpredictiveMedium
39Filexxxxxxxx/xxxxx/xxxxxxxx?xxxxxxxxpredictiveHigh
40Filexxxxxxxx_xxxxxx.xxxpredictiveHigh
41Filexxx.xpredictiveLow
42Filexxxxxxx/xxxxxxxx.xxxpredictiveHigh
43Filexxx/xxxxxx/xxxx/xxxxxx.xxpredictiveHigh
44Filexxxxx.xxxpredictiveMedium
45Filexxxxxxxxx/xxxxxxxxxxpredictiveHigh
46Filexxxxxxxxx_xxxxxx.xxxpredictiveHigh
47Filexxxx-xxxxxxxx.xxxpredictiveHigh
48Filexxxxx_xxxxxx.xxxpredictiveHigh
49Filexx-xxxxxxxx/xxxxx-xx-xxxxx.xxxpredictiveHigh
50Filexxxx.xxpredictiveLow
51Libraryxxxxxx.xxxxx.xxxxxxxxpredictiveHigh
52Argumentxx_xxxx_xxxxpredictiveMedium
53ArgumentxxxxxxxxxpredictiveMedium
54ArgumentxxxxxxpredictiveLow
55ArgumentxxxxxxxxpredictiveMedium
56ArgumentxxxpredictiveLow
57ArgumentxxxxxpredictiveLow
58Argumentx[xxxxx]predictiveMedium
59ArgumentxxxxxxxxxxxpredictiveMedium
60ArgumentxxxxxxxxpredictiveMedium
61Argumentxxxxxxx=xxxxxxxxpredictiveHigh
62ArgumentxxxxpredictiveLow
63ArgumentxxxxxxxxpredictiveMedium
64ArgumentxxxxxxxpredictiveLow
65ArgumentxxxxxxxxxxpredictiveMedium
66Argumentxxxx_xxxxxpredictiveMedium
67ArgumentxxpredictiveLow
68Argumentxx_xxxxxxpredictiveMedium
69ArgumentxxxxxxxxpredictiveMedium
70ArgumentxxxxxpredictiveLow
71Argumentxxxxx_xxxxxx_xxx/xxxxx_xxxx_xxxxxxxxpredictiveHigh
72Argumentxxxxx_xxxxpredictiveMedium
73Argumentxxxx_xxxxxpredictiveMedium
74Argumentxxxxxxx_xxxpredictiveMedium
75Argumentxx_xxxxpredictiveLow
76ArgumentxxxxxxpredictiveLow
77ArgumentxxxpredictiveLow
78ArgumentxxxpredictiveLow
79ArgumentxxxxxxpredictiveLow
80ArgumentxxxxxxxpredictiveLow
81ArgumentxxxxxxpredictiveLow
82Argumentxxxx_xxxxpredictiveMedium
83ArgumentxxxxxxxxxxpredictiveMedium
84ArgumentxxxxpredictiveLow
85ArgumentxxxxxpredictiveLow
86ArgumentxxxxxpredictiveLow
87ArgumentxxxxxxxxpredictiveMedium
88ArgumentxxxxxxxpredictiveLow
89ArgumentxxxpredictiveLow
90Input Value../predictiveLow
91Input Value</xxxxxx >predictiveMedium
92Input Value<xxx xxx="xxxx://x"; xx xxxxxxx="$(’x').xxxx(’xxxxxx’)" />predictiveHigh
93Pattern|xx|predictiveLow
94Network Portxxx/xxxxpredictiveMedium

References (3)

The following list contains external sources which discuss the actor and the associated activities:

Samples (1)

The following list contains associated samples:

This view requires CTI permissions

Just purchase a CTI license today!