DDG v3014 Analysisinfo

IOB - Indicator of Behavior (46)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Language

en30
fr10
pl2
sv2
ru2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Country

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Actors

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Activities

Interest

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

Oracle MySQL Server6
xvid2
D-Link DAP-1360U2
TFM MMPlayer2
Intel AMT2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vulnerabilities

These are the vulnerabilities that we have identified as researched, approached, or attacked.

#VulnerabilityBaseTemp0dayTodayExpCouKEVEPSSCTICVE
1xvid Windows Media Player decoder_create memory corruption10.09.5$0-$5k$0-$5kNot definedOfficial fix 0.048160.00CVE-2009-0894
2TFM MMPlayer memory corruption10.010.0$0-$5k$0-$5kHighUnavailablepossible0.632610.00CVE-2009-2566
3Rockwell Rslogix 5000 Design And Configuration Software Password Protection credentials management8.47.3$0-$5k$0-$5kUnprovenOfficial fix 0.000030.00CVE-2014-0755
4Rockwell Automation RSLogix Micro Starter Lite RSS Project File memory corruption8.68.6$0-$5kCalculatingNot definedNot defined 0.002280.00CVE-2016-5814
5Cisco CallManager SIP Request Stored information disclosure5.34.9$5k-$25kCalculatingProof-of-ConceptOfficial fix 0.006320.00CVE-2006-4032
6Intel Express 500 IP Packet denial of service5.35.3$5k-$25k$0-$5kNot definedNot defined 0.007390.00CVE-2000-0764
7Oracle MySQL Server DDL denial of service4.44.3$0-$5k$0-$5kNot definedOfficial fix 0.000960.00CVE-2022-21444
8TAC Vista Web Interface isalogin.dll path traversal5.34.8$0-$5k$0-$5kProof-of-ConceptOfficial fix 0.007630.00CVE-2005-3040
9ImageMagick png.c RelinquishMagickMemory free use after free5.45.1$0-$5k$0-$5kNot definedOfficial fix 0.002230.00CVE-2017-12671
10Foscam R2C IP Camera Running System FW/Application FW Firmware Patch race condition8.18.1$0-$5k$0-$5kNot definedNot defined 0.001840.00CVE-2022-28743
11transmission Torrent File variant.c use after free7.57.2$0-$5k$0-$5kNot definedOfficial fix 0.023840.00CVE-2018-10756
12Ligeo Download server-side request forgery3.53.2$0-$5k$0-$5kProof-of-ConceptNot defined 0.516490.00CVE-2021-46107
13Oracle Database 11g Enterprise Manager access control7.37.3$5k-$25k$0-$5kHighNot definedexpected0.914110.00CVE-2012-1675
14Post-scriptum RedLine cross site scripting4.33.9$0-$5k$0-$5kProof-of-ConceptOfficial fix 0.004850.04CVE-2011-3863
15Oracle MySQL Server DDL denial of service4.44.2$0-$5k$0-$5kNot definedOfficial fix 0.004800.00CVE-2020-14867
16Oracle MySQL Server DDL denial of service4.94.8$5k-$25k$0-$5kNot definedOfficial fix 0.002650.00CVE-2019-2644
17D-Link DAP-1360U Ping privileges management7.17.1$5k-$25k$5k-$25kNot definedOfficial fix 0.034100.00CVE-2020-26582
18Oracle MySQL Server DDL access control4.94.8$5k-$25k$0-$5kNot definedOfficial fix 0.009580.00CVE-2019-2495
19xvid Windows Media Player memory corruption10.09.0$0-$5k$0-$5kProof-of-ConceptOfficial fix 0.066670.00CVE-2009-0893
20Oracle MySQL Server DDL access control4.94.8$5k-$25k$0-$5kNot definedOfficial fix 0.002700.00CVE-2019-2494

IOC - Indicator of Compromise (4)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDIP addressHostnameActorCampaignsIdentifiedTypeConfidence
11.125.125.5DDG v301411/16/2018verifiedLow
2XX.XX.XXX.XXXXxx Xxxxx11/16/2018verifiedLow
3XX.X.XX.XXXXxx Xxxxx11/16/2018verifiedLow
4XXX.XX.XXX.XXXxxxxxxxx.xx-xxx-xx-xxx.xxxXxx Xxxxx11/17/2018verifiedLow

TTP - Tactics, Techniques, Procedures (8)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (5)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1FileaspxpredictiveLow
2Filecoders/png.cpredictiveMedium
3Filexxxxxxxxxxxxxxx/xxxxxxx.xpredictiveHigh
4Libraryxxxxxxxx.xxxpredictiveMedium
5ArgumentxxxxxxxxpredictiveMedium

References (2)

The following list contains external sources which discuss the actor and the associated activities:

This view requires CTI permissions

Just purchase a CTI license today!