Calypso Analysisinfo

IOB - Indicator of Behavior (200)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Language

en156
zh24
de8
it4
ja4

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Country

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Actors

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Activities

Interest

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

Apache HTTP Server8
Microsoft Windows8
Cacti6
WordPress6
Redis4

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vulnerabilities

These are the vulnerabilities that we have identified as researched, approached, or attacked.

#VulnerabilityBaseTemp0dayTodayExpCouKEVEPSSCTICVE
1DZCP deV!L`z Clanportal config.php code injection7.36.6$0-$5k$0-$5kProof-of-ConceptOfficial fix 0.009700.20CVE-2010-0966
2Thomas R. Pasawicz HyperBook Guestbook Password Database gbconfiguration.dat Hash information disclosure5.35.2$5k-$25kCalculatingHighWorkaroundpossible0.029560.00CVE-2007-1192
3Cacti graph_settings.php code injection7.37.3$0-$5k$0-$5kNot definedNot defined 0.013370.00CVE-2014-5261
4Linux Kernel File Permission sysctl_net.c net_ctl_permissions input validation5.14.9$5k-$25k$0-$5kNot definedOfficial fix 0.000440.04CVE-2013-4270
5Cacti Utility api_poller.php sql injection7.37.0$0-$5k$0-$5kNot definedOfficial fix 0.011470.03CVE-2013-1434
6SonicWall SMA100 SSLVPN mod_httprp stack-based overflow8.18.1$0-$5k$0-$5kNot definedNot defined 0.000970.07CVE-2024-53703
7cbeust testng XML File Parser JarFileUtils.java testngXmlExistsInJar path traversal6.36.2$0-$5k$0-$5kNot definedOfficial fix 0.002760.20CVE-2022-4065
8Redis Lua sandbox8.88.8$0-$5k$0-$5kAttackedNot definedverified0.943850.08CVE-2022-0543
9Sourcecodester Online Project Time Management System Users.php save_employee sql injection6.35.7$0-$5k$0-$5kProof-of-ConceptNot defined 0.003560.00CVE-2022-26293
10Atlassian JIRA Server/Data Center Dashboard Gadgets Preference Resource authorization7.37.0$0-$5k$0-$5kNot definedOfficial fixpossible0.642130.07CVE-2020-36287
11OpenVPN Access Server LDAP improper authentication8.58.2$0-$5k$0-$5kNot definedOfficial fix 0.004310.00CVE-2020-8953
12Navarino Infinity URL information disclosure6.46.4$0-$5k$0-$5kNot definedNot defined 0.034680.00CVE-2018-5386
13jQuery dataType script.js Cross-Domain cross site scripting5.24.9$0-$5k$0-$5kNot definedOfficial fix 0.098420.02CVE-2015-9251
14Craig Patchett Fileseek FileSeek.cgi path traversal5.34.8$0-$5k$0-$5kProof-of-ConceptOfficial fix 0.054490.06CVE-2002-0611
15Cacti graph_settings.php sql injection7.37.3$0-$5k$0-$5kNot definedNot defined 0.007620.00CVE-2014-5262
16Cacti snmp.php code injection7.37.0$0-$5k$0-$5kNot definedOfficial fix 0.010440.00CVE-2013-1435
17Microsoft Windows Service Pack 3 privileges management5.35.1$25k-$100k$0-$5kNot definedOfficial fix 0.000000.04
18Ideal BB.NET forums.aspx cross site scripting3.53.3$0-$5k$0-$5kProof-of-ConceptNot defined 0.000000.00
19DCP-Portal forums.php sql injection7.37.3$0-$5k$0-$5kNot definedNot defined 0.000000.05
20Kayako SupportSuite User Registration cross site scripting3.53.5$0-$5k$0-$5kNot definedNot defined 0.000000.05

Campaigns (1)

These are the campaigns that can be associated with the actor:

  • Kazakhstan

IOC - Indicator of Compromise (18)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

TTP - Tactics, Techniques, Procedures (17)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (99)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1File.htaccesspredictiveMedium
2File/admin/user/manage/addpredictiveHigh
3File/api.phppredictiveMedium
4File/exportpredictiveLow
5File/iisadminpredictiveMedium
6File/inc/jquery/uploadify/uploadify.phppredictiveHigh
7File/inc/parser/xhtml.phppredictiveHigh
8File/includes/lib/detail.phppredictiveHigh
9File/MIME/INBOX-MM-1/predictiveHigh
10File/ptms/classes/Users.phppredictiveHigh
11File/public/plugins/predictiveHigh
12File/scripts/iisadmin/bdir.htrpredictiveHigh
13File/xxxxxxxx/xxxxxxx.xxxpredictiveHigh
14File/xxxxxxxx/xxx/xxxxxxxxx.xxxpredictiveHigh
15File/xxx-xxx/xxx.xxxpredictiveHigh
16File/xxx/xxxxxxxx.xxxpredictiveHigh
17Filexxxxxxxxxxx.xxxpredictiveHigh
18Filexxx_xxxxxx.xxxpredictiveHigh
19Filexxxxxxxxxxx/xxxxxxxxxxx/xxxxx/xxxxxx.xxxpredictiveHigh
20Filexxxxxx.xxxpredictiveMedium
21Filexxx.xxxpredictiveLow
22Filexxxxxxxx_xxxxxxx.xxxpredictiveHigh
23Filexxx.xxxpredictiveLow
24Filexxxxxxxxxx.xxxpredictiveHigh
25Filexxxx/xxxxxxxxxxxxxxx.xxxpredictiveHigh
26Filexxxxxx.xxxpredictiveMedium
27Filexxxxxxx_xxxxxx.xxxpredictiveHigh
28Filexxxxxxxx.xxxpredictiveMedium
29Filexxxxxx.xxxxpredictiveMedium
30Filexxxxxx.xxxpredictiveMedium
31Filexxxx.xxxpredictiveMedium
32Filexxxxx_xxxxxxxx.xxxpredictiveHigh
33Filexxxxxxxxxx\xxxxxx\xxxxxxxxxxxxx.xxxpredictiveHigh
34Filexxxxx_xxxxxx.xxxpredictiveHigh
35Filexxx/xxxxxx.xxxpredictiveHigh
36Filexxx/xxxxxxxxxxx/xxxxxxx.xxxpredictiveHigh
37Filexxxxx.xxxpredictiveMedium
38Filexxxx_xxxxxxxx.xxxxpredictiveHigh
39Filexxxxxx/xxxxxxxxx.xxxpredictiveHigh
40Filexxx/xxxx/xx/xxxxxx.xxxpredictiveHigh
41Filexxx/xxxxxx_xxx.xpredictiveHigh
42Filexxxxxxx/xxxxxxxxxxxxxxxx/xxxxxxxxx/xxxxxxxx.xxxxpredictiveHigh
43Filexxxxxxxx.xxxpredictiveMedium
44Filexxxxxxxx_xxxx.xxxpredictiveHigh
45Filexxxxxxxxxxxx_xxxxxxxx.xxx.xxxpredictiveHigh
46Filexxxxxx.xxpredictiveMedium
47Filexxxxxxxxx.xxxpredictiveHigh
48Filexxxxxxxxxxxx.xxxpredictiveHigh
49Filexxxxxxxxxxxxxxxx.xxxpredictiveHigh
50Filexxxxxxxxxxxxxxxxxx.xxxxpredictiveHigh
51Filexxxx.xxxpredictiveMedium
52Filexxxx-xxxpredictiveMedium
53Filexxxxxx-xxxx/xxx/xxxx/xxxx/xxx/xxxxxx/xxxxxxxxxxxx.xxxxpredictiveHigh
54Filexxxxxxxxx.xxxpredictiveHigh
55Filexxxxxxxxxxx.xxxpredictiveHigh
56Filexxxxxxx.xxxpredictiveMedium
57Filexxxxxxxx.xxxpredictiveMedium
58Filexx-xxxxx.xxxpredictiveMedium
59Libraryxxxxxxx.xxxpredictiveMedium
60Libraryxxx/xxxxxx/xxxxxx.xxxpredictiveHigh
61Libraryxxx/xxx.xxxpredictiveMedium
62Libraryxxxxxx/xxxxxxxxx/xxxxx.xxxpredictiveHigh
63ArgumentxxxxpredictiveLow
64ArgumentxxxxxxxxpredictiveMedium
65ArgumentxxxxxpredictiveLow
66ArgumentxxxpredictiveLow
67ArgumentxxxxxxxxpredictiveMedium
68Argumentxxxx[xxxx]predictiveMedium
69Argumentxxxxx->xxxxpredictiveMedium
70ArgumentxxxxpredictiveLow
71ArgumentxxxxxxxxpredictiveMedium
72ArgumentxxxxxxpredictiveLow
73Argumentxxxxxxx[xx_xxx_xxxx]predictiveHigh
74ArgumentxxxxpredictiveLow
75Argumentxxxx/xxxxpredictiveMedium
76ArgumentxxxxpredictiveLow
77ArgumentxxpredictiveLow
78ArgumentxxxxxxxxxxpredictiveMedium
79ArgumentxxxxxxxpredictiveLow
80ArgumentxxxxxxpredictiveLow
81Argumentxxx_xxxxxpredictiveMedium
82Argumentxxxxxxxxx_xxxxxxxx_xxxxpredictiveHigh
83ArgumentxxxxxxxpredictiveLow
84ArgumentxxxxxpredictiveLow
85ArgumentxxxxxxxxxxxxxxpredictiveHigh
86ArgumentxxxxxxxxxxpredictiveMedium
87ArgumentxxxpredictiveLow
88Argumentxxxxxxx_xxpredictiveMedium
89ArgumentxxxxxxxxxpredictiveMedium
90ArgumentxxxxxxpredictiveLow
91ArgumentxxxxxxxxxpredictiveMedium
92ArgumentxxxpredictiveLow
93ArgumentxxxxpredictiveLow
94ArgumentxxxxxxxxpredictiveMedium
95Argumentxxxxxxxx/xxxxxxxxpredictiveHigh
96Argumentxxxx->xxxxxxxpredictiveHigh
97Input Value;xx xxx.xxx.x.xxx xxxx -x /xxx/xxxx;predictiveHigh
98Input Value??x:\predictiveLow
99Network Portxxx/xxxx (xx-xxx)predictiveHigh

References (3)

The following list contains external sources which discuss the actor and the associated activities:

This view requires CTI permissions

Just purchase a CTI license today!