BlotchyQuasar Analysisinfo

IOB - Indicator of Behavior (21)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Language

en14
es6
pt2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Country

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Actors

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Activities

Interest

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

Spidersales2
Pilotgroup eLMS Pro2
Cannot PHP infoBoard2
WordPress2
SourceCodester Library Management System2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vulnerabilities

These are the vulnerabilities that we have identified as researched, approached, or attacked.

#VulnerabilityBaseTemp0dayTodayExpCouKEVEPSSCTICVE
1Tiandy IP Cameras Service Port 3001 information disclosure6.46.1$0-$5k$0-$5kProof-of-ConceptWorkaround 0.044380.05CVE-2017-15236
2Joomla CMS sql injection7.37.0$5k-$25k$0-$5kHighOfficial fixexpected0.941940.00CVE-2015-7297
3Utopia Software Utopia News Pro editnews.php sql injection7.36.9$0-$5k$0-$5kProof-of-ConceptNot defined 0.013430.00CVE-2005-4223
4Google Android FLV File memory corruption4.44.2$5k-$25k$0-$5kNot definedOfficial fix 0.001140.00CVE-2016-10420
5SourceCodester Library Management System delete.php sql injection8.07.9$0-$5k$0-$5kNot definedNot defined 0.000820.07CVE-2022-36735
6Cannot PHP infoBoard access control7.36.6$0-$5k$0-$5kProof-of-ConceptNot defined 0.014800.04CVE-2008-4334
7NullSoft WinAmp FLV File memory corruption6.86.3$0-$5k$0-$5kNot definedNot defined 0.000590.00CVE-2017-10725
8NullSoft WinAmp FLV File memory corruption7.06.5$0-$5k$0-$5kNot definedNot defined 0.003640.02CVE-2017-10726
9Cisco Clean Access Secure Smart Manager File Upload file.jsp privileges management5.34.9$5k-$25k$0-$5kProof-of-ConceptWorkaround 0.000000.00
10Black Tie Project Category ID categorie.php3 Path information disclosure5.35.3$0-$5k$0-$5kNot definedNot defined 0.008080.00CVE-2002-0446
11PHP base64_encode /GD Library integer coercion10.09.5$5k-$25k$0-$5kNot definedOfficial fix 0.004030.00CVE-2003-0861
12phpBB BBcode Page acp_bbcodes.php cross-site request forgery6.56.4$0-$5k$0-$5kNot definedOfficial fix 0.002220.00CVE-2019-16993
13phpforum mainfile.php privileges management7.37.0$0-$5k$0-$5kNot definedOfficial fix 0.007500.00CVE-2003-0559
14Ubisoft Uplay Desktop Client URI upc.exe input validation7.56.8$5k-$25k$0-$5kProof-of-ConceptNot defined 0.016120.00CVE-2018-15832
15WordPress Admin Shell privileges management7.36.6$25k-$100k$0-$5kFunctionalWorkaround 0.000000.00
16Spidersales viewCart.asp sql injection9.88.8$0-$5k$0-$5kProof-of-ConceptOfficial fix 0.005610.00CVE-2004-0348
17AVTECH IP Camera/NVR/DVR CloudSetup.cgi command injection9.89.5$0-$5k$0-$5kNot definedUnavailable 0.000000.06
18Pilotgroup eLMS Pro subscribe.php cross site scripting4.34.3$0-$5k$0-$5kHighUnavailablepossible0.011520.00CVE-2010-2356

IOC - Indicator of Compromise (1)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDIP addressHostnameActorCampaignsIdentifiedTypeConfidence
169.167.8.118BlotchyQuasar09/06/2024verifiedVery High

TTP - Tactics, Techniques, Procedures (5)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (18)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1File/admin/delete.phppredictiveHigh
2File/cgi-bin/supervisor/CloudSetup.cgipredictiveHigh
3Filecategorie.php3predictiveHigh
4Filexxxxxxxx.xxxpredictiveMedium
5Filexxxx.xxxpredictiveMedium
6Filexxxxxxxx/xxx/xxx_xxxxxxx.xxxpredictiveHigh
7Filexxxxxxxx.xxxpredictiveMedium
8Filexxxxxxxxx.xxxpredictiveHigh
9Filexxx.xxxpredictiveLow
10Filexxxxxxxx.xxxpredictiveMedium
11ArgumentxxxxxxpredictiveLow
12ArgumentxxxpredictiveLow
13Argumentxxxxxx_xxpredictiveMedium
14ArgumentxxxxxxxpredictiveLow
15Argumentxxxx_xxxxpredictiveMedium
16ArgumentxxxxxxpredictiveLow
17ArgumentxxxxxxpredictiveLow
18Input ValuexxpredictiveLow

References (2)

The following list contains external sources which discuss the actor and the associated activities:

This view requires CTI permissions

Just purchase a CTI license today!