Coldriver Analysisinfo

IOB - Indicator of Behavior (17)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Language

en12
ru6

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Country

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Actors

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Activities

Interest

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

PHPOutsourcing IdeaBox2
IdeaBox2
McAfee E-Mail Gateway2
Grafana Enterprise2
Microsoft Windows2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vulnerabilities

These are the vulnerabilities that we have identified as researched, approached, or attacked.

#VulnerabilityBaseTemp0dayTodayExpCouKEVEPSSCTICVE
1Telesquare SDT-CW3B1 os command injection7.36.6$0-$5k$0-$5kProof-of-ConceptNot definedexpected0.942630.06CVE-2021-46422
2GFI Kerio Connect 2FASetup jsonrpc stack-based overflow7.17.0$0-$5k$0-$5kNot definedOfficial fix 0.001340.04CVE-2023-25267
3IdeaBox generformlib_date.php privileges management7.36.1$0-$5k$0-$5kUnprovenOfficial fix 0.000000.07
4PHPOutsourcing IdeaBox include.php code injection7.36.4$0-$5k$0-$5kUnprovenUnavailable 0.027860.00CVE-2008-5199
5SourceCodester Simple Membership System club_edit_query.php sql injection6.76.5$0-$5k$0-$5kProof-of-ConceptNot defined 0.000460.27CVE-2023-4844
6Oracle WebLogic Server WebLogic Console5.35.1$25k-$100k$0-$5kNot definedOfficial fix 0.002870.09CVE-2013-1504
7ClearSwift MAILsweeper denial of service7.56.7$5k-$25k$0-$5kProof-of-ConceptOfficial fix 0.005310.06CVE-2006-3215
8OpenSSL DTLS CBC Encryption cryptographic issues5.35.1$5k-$25k$0-$5kNot definedOfficial fix 0.011540.07CVE-2011-4108
9McAfee E-Mail Gateway Attachment memory corruption7.57.5$25k-$100k$5k-$25kNot definedNot defined 0.000000.00
10Microsoft Windows Bind Filter Driver information disclosure4.94.3$25k-$100k$0-$5kUnprovenOfficial fix 0.004610.00CVE-2021-40468
11Cisco IOS XE AAA uninitialized pointer9.89.6$25k-$100k$0-$5kNot definedOfficial fix 0.014460.00CVE-2021-1619
12Google Chrome V8 type confusion7.57.4$25k-$100k$5k-$25kAttackedOfficial fixverified0.105180.06CVE-2022-1364
13Dahua IP Camera/PTZ Dome Camera password recovery5.55.5$0-$5k$0-$5kNot definedNot defined 0.005880.02CVE-2021-33046
14Grafana api_jsonrpc.php source code4.34.3$0-$5k$0-$5kNot definedNot definedexpected0.816120.03CVE-2022-26148
15Grafana Enterprise Dashboard permission6.76.4$0-$5k$0-$5kNot definedOfficial fix 0.002780.00CVE-2021-27962
16Grafana Query Editor cross site scripting4.44.4$0-$5k$0-$5kNot definedNot defined 0.004240.05CVE-2018-1000816

IOC - Indicator of Compromise (1)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDIP addressHostnameActorCampaignsIdentifiedTypeConfidence
145.133.216.15vm1959787.stark-industries.solutionsColdriver01/19/2024verifiedHigh

TTP - Tactics, Techniques, Procedures (9)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (8)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1Fileapi_jsonrpc.phppredictiveHigh
2Fileclub_edit_query.phppredictiveHigh
3Filexxxxxxxxxxxx_xxxx.xxxpredictiveHigh
4Filexxxxxxx.xxxpredictiveMedium
5Filexxxxxxx/xxx/xxxxxxxpredictiveHigh
6Argumentxxxx_xxpredictiveLow
7ArgumentxxxxxxxxpredictiveMedium
8ArgumentxxxxxxxxxxxxxxxxxxxpredictiveHigh

References (2)

The following list contains external sources which discuss the actor and the associated activities:

This view requires CTI permissions

Just purchase a CTI license today!