Earth Berberoka Analysis

IOB - Indicator of Behavior (49)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Lang

en28
zh20
fr2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Country

cn42
us8

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Actors

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Activities

Interest

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

HP HP-UX2
codemirror2
Microsoft Word2
Xampp2
DrayTek Vigor 29602

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vulnerabilities

#VulnerabilityBaseTemp0dayTodayExpRemCTIEPSSCVE
1DrayTek Vigor 2960/Vigor 3900/Vigor 300B HTTP mainfunction.cgi format string6.36.1$0-$5k$0-$5kNot DefinedNot Defined0.030.00611CVE-2021-42911
2Microsoft Windows SMB denial of service6.66.5$5k-$25k$5k-$25kNot DefinedOfficial Fix0.000.00072CVE-2022-32230
3Hitachi Vantara Pentaho Security Model applicationContext-spring-security.xml access control5.35.2$0-$5k$0-$5kNot DefinedNot Defined0.040.41557CVE-2021-31602
4SuiteCRM Privilege Escalation6.36.0$0-$5k$0-$5kNot DefinedOfficial Fix0.030.00370CVE-2021-45897
5Thomas R. Pasawicz HyperBook Guestbook Password Database gbconfiguration.dat Hash information disclosure5.35.2$5k-$25k$0-$5kHighWorkaround0.040.01621CVE-2007-1192
6Cisco ASA VPN certificate validation7.47.2$5k-$25k$0-$5kNot DefinedOfficial Fix0.040.00378CVE-2018-0227
7XAMPP cds-fpdf.php sql injection8.58.5$0-$5k$0-$5kNot DefinedUnavailable0.040.04671CVE-2019-8923
8Xampp Installation default permission6.36.1$0-$5k$0-$5kNot DefinedNot Defined0.080.00074CVE-2022-29376
9Bootstrap add_product.php cross site scripting3.53.5$0-$5k$0-$5kNot DefinedNot Defined0.000.00059CVE-2022-26624
10Micro-Star MSI Afterburner Driver RTCore64.sys privileges management6.56.5$0-$5k$0-$5kNot DefinedNot Defined0.000.00051CVE-2019-16098
11F5 BIG-IP iControl REST Authentication bash missing authentication9.89.3$5k-$25k$0-$5kProof-of-ConceptOfficial Fix0.030.97505CVE-2022-1388
12HP HP-UX at memory corruption9.38.8$25k-$100k$0-$5kProof-of-ConceptNot Defined0.050.00042CVE-2002-1614
13SAP Commerce Cloud virtualjdbc extension code injection8.58.5$5k-$25k$5k-$25kNot DefinedNot Defined0.020.00345CVE-2019-0344
14Microsoft Windows Remote Procedure Call Runtime Remote Code Execution9.88.9$100k and more$5k-$25kUnprovenOfficial Fix0.000.01389CVE-2022-26809
15Keycloak server-side request forgery7.36.8$0-$5k$0-$5kFunctionalOfficial Fix0.030.36659CVE-2020-10770
16Oracle Business Intelligence Enterprise Edition Analytics Web General Remote Code Execution9.89.4$100k and more$5k-$25kNot DefinedOfficial Fix0.030.91033CVE-2020-2950
17Wyze Cam Pan v2/Cam v2/Cam v3 improper authentication7.47.2$0-$5k$0-$5kNot DefinedOfficial Fix0.030.00108CVE-2019-9564
18FasterXML jackson-databind Deserialization slf4j-ext deserialization8.57.5$0-$5k$0-$5kNot DefinedOfficial Fix0.030.02106CVE-2018-14718
19Cisco HyperFlex HX Data Platform Web-based Management Interface missing authentication6.56.2$5k-$25k$0-$5kNot DefinedOfficial Fix0.030.97246CVE-2021-1499
20Ivanti EPM Cloud Services Appliance code injection6.36.3$0-$5k$0-$5kNot DefinedNot Defined0.030.95030CVE-2021-44529

IOC - Indicator of Compromise (5)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

TTP - Tactics, Techniques, Procedures (8)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IDTechniqueVulnerabilitiesAccess VectorTypeConfidence
1T1059CWE-94Cross Site ScriptingpredictiveHigh
2T1059.007CWE-79Cross Site ScriptingpredictiveHigh
3TXXXXCWE-XXX, CWE-XXX, CWE-XXXX2xx Xxxxxxxxxxxxxxxx: Xxxx Xxxxxx Xxxxxxxxxxx Xxx Xxx XxxxxxxpredictiveHigh
4TXXXXCWE-XXXxxxxxx XxxxxxxxxpredictiveHigh
5TXXXXCWE-XXXXxxxxxxxxx XxxxxxpredictiveHigh
6TXXXXCWE-XXXxx XxxxxxxxxpredictiveHigh
7TXXXX.XXXCWE-XXXXxxxxxxx Xxxxxxxxxxx XxxxxxxxxxpredictiveHigh
8TXXXXCWE-XXXXxxxxxxxxxxxxpredictiveHigh

IOA - Indicator of Attack (18)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1File/mgmt/tm/util/bashpredictiveHigh
2File/uncpath/predictiveMedium
3File/usr/bin/atpredictiveMedium
4File/xxxxxx/xxxxx/xxx_xxxxxxx.xxxpredictiveHigh
5Filexxxxxxxxxxxxxxxxxx-xxxxxx-xxxxxxxx.xxxpredictiveHigh
6Filexxx-xxxx.xxxpredictiveMedium
7Filexxxx/xxxxxxxxxxxxxxx.xxxpredictiveHigh
8Filexxxxxxxxxxxx.xxxpredictiveHigh
9Filexxxx_xxxx_xxxxpredictiveHigh
10Libraryxxxxxxxx.xxxpredictiveMedium
11Argumentxx_xxpredictiveLow
12ArgumentxxxxpredictiveLow
13ArgumentxxxxxxxxpredictiveMedium
14Argumentxxxxx_xxxxxxpredictiveMedium
15Argumentxxxxxxx_xxxpredictiveMedium
16ArgumentxxxxxpredictiveLow
17ArgumentxxxxxxxxpredictiveMedium
18Input Valuex=xpredictiveLow

References (2)

The following list contains external sources which discuss the actor and the associated activities:

Might our Artificial Intelligence support you?

Check our Alexa App!