AV Tech Support Scam Analysis

IOB - Indicator of Behavior (21)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Lang

en16
ru6

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Country

cn10
ru10
pl2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Actors

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Activities

Interest

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

SAP IDES Systems2
PCRE2
Linksys WRT1900ACS2
DedeCMS2
Huawei HarmonyOS2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vulnerabilities

#VulnerabilityBaseTemp0dayTodayExpRemEPSSCTICVE
1mintplex-labs anything-llm POST server-side request forgery7.97.8$0-$5k$0-$5kNot DefinedOfficial Fix0.000430.04CVE-2024-0440
2QNAP QTS/QuTS hero/QuTScloud command injection5.45.3$0-$5k$0-$5kNot DefinedOfficial Fix0.003050.04CVE-2023-47218
3Tenda AC9 fromSetIpMacBind stack-based overflow8.88.5$0-$5k$0-$5kNot DefinedNot Defined0.000430.04CVE-2024-25748
4DedeCMS article_allowurl_edit.php code injection6.35.7$0-$5k$0-$5kProof-of-ConceptNot Defined0.001180.16CVE-2023-2928
5Sangfor Next-Gen Application Firewall loadfile.php information disclosure4.74.7$0-$5k$0-$5kNot DefinedNot Defined0.000790.00CVE-2023-30804
6Tongda OA delete.php sql injection7.57.3$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.000630.08CVE-2023-5019
7ITFlow settings.php cross site scripting3.53.4$0-$5k$0-$5kNot DefinedOfficial Fix0.000450.02CVE-2024-25344
8Huawei HarmonyOS/EMUI Wi-Fi Module missing authentication4.34.3$5k-$25k$5k-$25kNot DefinedNot Defined0.000430.03CVE-2022-48621
9FasterXML jackson-databind deserialization6.86.5$0-$5k$0-$5kNot DefinedOfficial Fix0.004310.04CVE-2021-20190
10LG Signage TV webOS code injection6.86.8$5k-$25k$5k-$25kNot DefinedNot Defined0.000430.04CVE-2024-1885
11SAP IDES Systems os command injection6.86.7$5k-$25k$0-$5kNot DefinedOfficial Fix0.000430.03CVE-2024-22132
12Microsoft Windows Media Center MCL File ehshell.exe xml external entity reference6.55.9$100k and more$0-$5kProof-of-ConceptUnavailable0.000000.00
13Rarlab UnRAR Unpack pathname traversal6.36.0$0-$5k$0-$5kHighOfficial Fix0.905490.04CVE-2022-30333
14Microsoft Intune Management Extension Remote Code Execution8.17.1$25k-$100k$0-$5kUnprovenOfficial Fix0.010070.00CVE-2021-31980
15DevExpress.XtraReports.UI deserialization5.55.3$0-$5k$0-$5kNot DefinedNot Defined0.015020.00CVE-2021-36483
16MikroTik RouterOS bfd null pointer dereference4.34.1$0-$5kCalculatingNot DefinedOfficial Fix0.002090.00CVE-2020-20220
17Linux Kernel Array Access xfrm_user.c __xfrm_policy_unlink out-of-bounds5.95.7$5k-$25k$0-$5kNot DefinedOfficial Fix0.000450.03CVE-2019-15666
18Linksys WRT1900ACS Cookie Base64 cryptographic issues6.56.5$0-$5k$0-$5kNot DefinedNot Defined0.000460.03CVE-2019-7311
19Google Chrome Blink access control5.85.6$25k-$100k$0-$5kNot DefinedOfficial Fix0.001190.00CVE-2017-5027
20PCRE pcregrep information disclosure5.35.1$5k-$25k$0-$5kNot DefinedOfficial Fix0.004690.00CVE-2015-8393

IOC - Indicator of Compromise (5)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

TTP - Tactics, Techniques, Procedures (8)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (10)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1File/nova/bin/bfdpredictiveHigh
2Fileehshell.exepredictiveMedium
3Filexxxxxxx/xx/xxxxxx/xxxxx_xxxxxxxxxxxxx/xxxxxx.xxxpredictiveHigh
4Filexxx/xxxx/xxxx_xxxx.xpredictiveHigh
5Filexxxxxxxx.xxxpredictiveMedium
6Filexxxx_xxxx/xxxxxxxx.xxxpredictiveHigh
7Filexxxxxxx/xxxx/xxxxxxx_xxxxxxxx_xxxx.xxxpredictiveHigh
8Argument-xpredictiveLow
9ArgumentxxxxxxxpredictiveLow
10Argumentxxxxxxxxxxxxx_xxpredictiveHigh

References (2)

The following list contains external sources which discuss the actor and the associated activities:

Do you know our Splunk app?

Download it now for free!