DNSpionage Analysis

IOB - Indicator of Behavior (20)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Lang

en10
de4
fr4
pl2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Country

us16
fr2
ua2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Actors

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Activities

Interest

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

Joomla CMS4
AOL ICQ2
OSClass2
Roundcube Webmail2
WordPress2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vulnerabilities

#VulnerabilityBaseTemp0dayTodayExpRemCTIEPSSCVE
1Microsoft PowerPoint memory corruption6.56.3$5k-$25k$0-$5kNot DefinedOfficial Fix0.000.26158CVE-2017-8743
2Joomla CMS sql injection7.36.9$5k-$25k$0-$5kProof-of-ConceptNot Defined0.030.00264CVE-2013-1453
3PHP Link Directory Administration Page index.html cross site scripting4.34.3$0-$5k$0-$5kNot DefinedNot Defined1.210.00374CVE-2007-0529
4Phplinkdirectory PHP Link Directory conf_users_edit.php cross-site request forgery6.36.0$0-$5k$0-$5kProof-of-ConceptNot Defined0.030.00526CVE-2011-0643
5AlienVault Open Source Security Information Management code injection9.89.4$0-$5k$0-$5kHighOfficial Fix0.000.95348CVE-2014-3804
6Intelliants Subrion CMS Members Administrator cross-site request forgery4.34.2$0-$5k$0-$5kNot DefinedNot Defined0.000.00150CVE-2020-18326
7SonicWALL SMA 100/SMA 200/SMA 210/SMA 400/SMA 410/SMA 500v File Path access control6.56.2$0-$5k$0-$5kNot DefinedOfficial Fix0.000.78714CVE-2021-20034
8HGiga OAKlouds Mobile Portal Network Interface Card Setting Page os command injection9.89.6$0-$5k$0-$5kNot DefinedNot Defined0.000.00167CVE-2021-37913
9Siemens Cerberus DMS/Desigo CC Compact/Desigo CC CCOM Communication deserialization6.36.0$5k-$25k$0-$5kNot DefinedOfficial Fix0.030.00478CVE-2021-37181
10Apache Struts OGNL Evaluation Privilege Escalation6.36.3$5k-$25k$5k-$25kProof-of-ConceptOfficial Fix0.000.97007CVE-2020-17530
11Thomas R. Pasawicz HyperBook Guestbook Password Database gbconfiguration.dat Hash information disclosure5.35.2$5k-$25k$0-$5kHighWorkaround0.030.01798CVE-2007-1192
12OSClass index.php findBySlug sql injection7.37.0$0-$5k$0-$5kNot DefinedOfficial Fix0.000.00450CVE-2012-0973
13AOL ICQ MCRegEx__Search memory corruption7.36.4$25k-$100k$0-$5kProof-of-ConceptOfficial Fix0.020.35348CVE-2006-4662
14GitLab Enterprise Edition Access Control permission assignment6.76.4$0-$5k$0-$5kNot DefinedOfficial Fix0.000.00064CVE-2019-16170
15Joomla CMS index.php privileges management7.06.3$5k-$25k$0-$5kProof-of-ConceptOfficial Fix0.030.01497CVE-2012-1563
16Zemanta Search Everything index.php sql injection7.37.0$0-$5k$0-$5kHighOfficial Fix0.000.00185CVE-2014-2316
17Roundcube Webmail rcube_washtml.php cross site scripting4.34.1$0-$5k$0-$5kNot DefinedOfficial Fix0.020.00489CVE-2015-1433
18WordPress Password Reset wp-login.php mail password recovery6.15.8$5k-$25k$0-$5kProof-of-ConceptNot Defined0.080.02827CVE-2017-8295

Campaigns (1)

These are the campaigns that can be associated with the actor:

  • Middle East

IOC - Indicator of Compromise (3)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDIP addressHostnameActorCampaignsIdentifiedTypeConfidence
1185.20.184.138185.20.184.138.deltahost-ptrDNSpionageMiddle East03/27/2022verifiedHigh
2XXX.XX.XXX.Xxxx.xx.xxx.x.xxxxxxxxx-xxxXxxxxxxxxxXxxxxx Xxxx03/27/2022verifiedHigh
3XXX.XXX.XXX.XXxxx.xxx.xxx.xx.xxxxxxxxx-xxxXxxxxxxxxxXxxxxx Xxxx03/27/2022verifiedHigh

TTP - Tactics, Techniques, Procedures (7)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IDTechniqueVulnerabilitiesAccess VectorTypeConfidence
1T1059CWE-94Cross Site ScriptingpredictiveHigh
2T1059.007CWE-79, CWE-80Cross Site ScriptingpredictiveHigh
3TXXXXCWE-XXX, CWE-XXXX2xx Xxxxxxxxxxxxxxxx: Xxxx Xxxxxx Xxxxxxxxxxx Xxx Xxx XxxxxxxpredictiveHigh
4TXXXXCWE-XXXxxxxxx XxxxxxxxxpredictiveHigh
5TXXXXCWE-XXXxx XxxxxxxxxpredictiveHigh
6TXXXXCWE-XXXXxx.xxx Xxxxxxxxxxxxxxxx: Xxxxxxxx Xx Xxxxxxxxxxxxx XxxxpredictiveHigh
7TXXXXCWE-XXXXxxxxxxxxxxxxpredictiveHigh

IOA - Indicator of Attack (11)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1Fileadmin/conf_users_edit.phppredictiveHigh
2Filedata/gbconfiguration.datpredictiveHigh
3Filexxxxx.xxxxpredictiveMedium
4Filexxxxx.xxxpredictiveMedium
5Filexx-xxxxx.xxxpredictiveMedium
6Libraryxxxxxxx/xxx/xxxxxxxxx/xxxxx_xxxxxxx.xxxpredictiveHigh
7ArgumentxxxxxxxxxpredictiveMedium
8ArgumentxxxxpredictiveLow
9Argumentxxxx xxxxxxxpredictiveMedium
10Argumentxxxxx[xxxxxx]predictiveHigh
11ArgumentxxxxxxxxxpredictiveMedium

References (2)

The following list contains external sources which discuss the actor and the associated activities:

Might our Artificial Intelligence support you?

Check our Alexa App!