BBtok Analysisinfo

IOB - Indicator of Behavior (77)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Language

en68
de4
it4
es2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Country

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Actors

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Activities

Interest

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

Serendipity4
YaBB2
Ecommerce Online Store Kit2
Virtual Programming VP-ASP2
D-Link DIR-865L2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vulnerabilities

These are the vulnerabilities that we have identified as researched, approached, or attacked.

#VulnerabilityBaseTemp0dayTodayExpCouKEVEPSSCTICVE
1DZCP deV!L`z Clanportal config.php code injection7.36.6$0-$5k$0-$5kProof-of-ConceptOfficial fix 0.009700.27CVE-2010-0966
2OpenBB read.php sql injection7.37.0$0-$5k$0-$5kNot definedOfficial fix 0.003260.00CVE-2005-1612
3YaBB cross site scripting3.53.4$0-$5k$0-$5kNot definedOfficial fix 0.002440.03CVE-2005-4426
4WoltLab Burning Book addentry.php sql injection7.36.8$0-$5k$0-$5kFunctionalUnavailable 0.009570.02CVE-2006-5509
5Devilz Clanportal sql injection7.37.0$0-$5kCalculatingHighOfficial fix 0.004720.02CVE-2006-6339
6deV!Lz Clanportal index.php sql injection7.37.1$0-$5k$0-$5kHighUnavailablepossible0.005720.03CVE-2008-4889
7Project Worlds Student Project Allocation System Admin Login Module admin_login.php cross site scripting4.94.8$0-$5k$0-$5kProof-of-ConceptNot defined 0.002200.13CVE-2024-0726
8Simple Art Gallery adminHome.php sliderPicSubmit unrestricted upload7.17.1$0-$5k$0-$5kNot definedNot defined 0.002010.08CVE-2023-1415
9Horde Webmail Redirect go.php privileges management5.34.7$0-$5k$0-$5kProof-of-ConceptUnavailable 0.000000.06
10Adobe Flash Player Concurrency memory corruption8.07.7$25k-$100k$0-$5kProof-of-ConceptOfficial fixpossible0.736750.02CVE-2017-2930
11D-Link DIR-865L register_send.php improper authentication7.57.1$5k-$25k$0-$5kProof-of-ConceptNot defined 0.003540.05CVE-2013-3096
12MyBB Remote Code Execution9.89.4$25k-$100k$0-$5kNot definedOfficial fix 0.003820.00CVE-2015-2786
13Linux Foundation Xen EFLAGS Register SYSENTER input validation6.25.9$5k-$25k$0-$5kNot definedOfficial fix 0.000740.00CVE-2013-1917
14Mike Spice My Classifieds classifieds.cgi privileges management5.35.1$0-$5k$0-$5kNot definedOfficial fix 0.011570.00CVE-2002-1600
15Yongyou UFIDA-NC PrintTemplateFileServlet.java path traversal6.76.5$0-$5k$0-$5kProof-of-ConceptNot defined 0.005980.00CVE-2023-4748
16Microsoft Windows Message Queuing Remote Code Execution9.89.2$25k-$100k$0-$5kHighOfficial fixexpected0.921620.00CVE-2023-21554
17Cocos Engine web-interface-check.yml command injection7.77.6$0-$5k$0-$5kNot definedOfficial fix 0.098110.01CVE-2023-26493
18Joomla sql injection6.36.3$5k-$25k$5k-$25kNot definedNot defined 0.000290.00CVE-2022-23797
19Paessler PRTG Network Monitor path traversal6.36.3$0-$5k$0-$5kNot definedNot defined 0.002800.00CVE-2023-31450
20Tiki Admin Password tiki-login.php improper authentication8.07.7$0-$5k$0-$5kNot definedOfficial fixexpected0.869682.83CVE-2020-15906

IOC - Indicator of Compromise (6)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDIP addressHostnameActorCampaignsIdentifiedTypeConfidence
137.148.205.2626.205.148.37.host.secureserver.netBBtok10/28/2024verifiedVery High
250.62.182.11.182.62.50.host.secureserver.netBBtok10/28/2024verifiedVery High
3XXX.XXX.XXX.XXXXxxxx09/20/2023verifiedHigh
4XXX.XXX.XXX.XXXXxxxx10/23/2023verifiedHigh
5XXX.XX.XXX.XXXxxxxx.xx-xxx-xx-xxx.xxXxxxx10/23/2023verifiedHigh
6XXX.XXX.XXX.XXXXxxxx09/20/2023verifiedHigh

TTP - Tactics, Techniques, Procedures (10)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (54)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1File/forum/away.phppredictiveHigh
2File/horde/util/go.phppredictiveHigh
3File/inc/HTTPClient.phppredictiveHigh
4File/SASWebReportStudio/logonAndRender.dopredictiveHigh
5Fileaddentry.phppredictiveMedium
6Fileadd_edit_cat.asppredictiveHigh
7Fileadmin/category.inc.phppredictiveHigh
8Filexxxxxxxxx.xxxpredictiveHigh
9Filexxxxx_xxxxx.xxxpredictiveHigh
10Filexxxx.xxxpredictiveMedium
11Filexxxxxxxx.xxxpredictiveMedium
12Filexxxxxxxxxxx.xxxpredictiveHigh
13Filexxxxxxx.xxxpredictiveMedium
14Filexxxx.xxxpredictiveMedium
15Filexxxx.xxxpredictiveMedium
16Filexxx/xxxxxx.xxxpredictiveHigh
17Filexxx/xxxxxxxxxxx/xxxxxxx.xxxpredictiveHigh
18Filexxxxxxx/xxxxxxxxx_xxxxxxx.xxx.xxxpredictiveHigh
19Filexxxxx.xxxpredictiveMedium
20Filexxxxxxxxx/xxxxxxxx.xxxpredictiveHigh
21Filexxx/xxxx_xxx.xxxpredictiveHigh
22Filexxxxxxxxxxxxxxxxxxxxxxxx.xxxxpredictiveHigh
23Filexxxx.xxxpredictiveMedium
24Filexxxx.xxxpredictiveMedium
25Filexxxxxxxx_xxxx.xxxpredictiveHigh
26Filexxxx.xxxpredictiveMedium
27Filexxxxxxxxxxxxxx.xxxpredictiveHigh
28Filexxxx-xxxxx.xxxpredictiveHigh
29Filexxx-xxxxxxxxx-xxxxx.xxxpredictiveHigh
30Filexx-xxxxxxxx/xxxx-xxx/xxxxxxxxx/xxxxx-xx-xxxx-xxxxx-xxxxxxxxxx.xxxpredictiveHigh
31Filexx-xxxxx.xxxpredictiveMedium
32Filexxxx.xxpredictiveLow
33File~/xxx/xxxx-xxxxxxxxx.xxxpredictiveHigh
34ArgumentxxxxxxxxpredictiveMedium
35ArgumentxxxpredictiveLow
36ArgumentxxxxxxxxxpredictiveMedium
37ArgumentxxxxxxxxpredictiveMedium
38Argumentxxxxxxxx[xxxxxxx]predictiveHigh
39Argumentxxx_xxpredictiveLow
40ArgumentxxxpredictiveLow
41ArgumentxxxxpredictiveLow
42ArgumentxxxxxxxxpredictiveMedium
43ArgumentxxpredictiveLow
44ArgumentxxxpredictiveLow
45ArgumentxxxxpredictiveLow
46ArgumentxxpredictiveLow
47ArgumentxxxpredictiveLow
48ArgumentxxxxxpredictiveLow
49Argumentxxxxxx_xxxxxxx_xxxxxxxxx_xxxx/xxxxxx_xxxxxxx_xxxxxxx_xxxxpredictiveHigh
50ArgumentxxxpredictiveLow
51ArgumentxxxpredictiveLow
52ArgumentxxxpredictiveLow
53ArgumentxxxxxpredictiveLow
54Input Valuexxxx%xx%xxxxxxxx%xxxxxxx(%xxxxxxxx%xx)%xx/xxxxxx%xxpredictiveHigh

References (3)

The following list contains external sources which discuss the actor and the associated activities:

This view requires CTI permissions

Just purchase a CTI license today!