FakeAlert Analysis

IOB - Indicator of Behavior (39)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Lang

en34
de2
fr2
es2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Country

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Actors

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Activities

Interest

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

Microsoft Windows2
Maran PHP Shop2
McAfee Network Security Management2
ESMI PayPal Storefront2
HotScripts Clone Script2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vulnerabilities

#VulnerabilityBaseTemp0dayTodayExpRemCTIEPSSCVE
1Samsung UWB Stack memory corruption6.05.9$0-$5k$0-$5kNot DefinedOfficial Fix0.040.01086CVE-2022-25818
2Cisco Linksys EA2700 URL information disclosure4.34.1$5k-$25k$0-$5kProof-of-ConceptUnavailable0.080.00000
3Basti2web Book Panel books.php sql injection7.37.0$0-$5k$0-$5kHighOfficial Fix0.080.00986CVE-2009-4889
4HotScripts Clone Script software-description.php sql injection7.36.9$0-$5k$0-$5kProof-of-ConceptNot Defined0.050.00986CVE-2007-6084
5Apple iOS/iPadOS Kernel out-of-bounds write7.87.6$25k-$100k$5k-$25kHighOfficial Fix0.030.01363CVE-2022-32894
6Asana Desktop information disclosure4.34.1$0-$5k$0-$5kNot DefinedOfficial Fix0.060.01055CVE-2022-26877
7Google Android App Pinning LockTaskController.java shouldLockKeyguard improper authentication6.05.8$5k-$25k$0-$5kNot DefinedOfficial Fix0.040.01036CVE-2021-0472
8XAMPP xampp-contol.ini privileges management7.06.7$0-$5k$0-$5kNot DefinedOfficial Fix0.070.23860CVE-2020-11107
9McAfee Network Security Management Command Line Interface information disclosure5.95.7$0-$5k$0-$5kNot DefinedOfficial Fix0.010.01036CVE-2020-7284
10Maran PHP Shop prod.php sql injection7.37.3$0-$5k$0-$5kHighUnavailable0.030.00986CVE-2008-4879
11Microsoft Windows Media Player ENCDEC.DLL code injection9.89.4$25k-$100k$5k-$25kNot DefinedOfficial Fix0.030.49719CVE-2011-3401
12ESMI PayPal Storefront products1h.php cross site scripting4.34.1$0-$5k$0-$5kProof-of-ConceptNot Defined0.020.06790CVE-2005-0936
13Instant Photo Gallery content.php sql injection6.36.3$0-$5kCalculatingNot DefinedNot Defined0.030.00000
14TeamPass Access Control items.queries.php access control7.27.0$0-$5k$0-$5kNot DefinedOfficial Fix0.050.00885CVE-2017-15055
15AFFcommerce ItemReview.php sql injection6.36.3$0-$5k$0-$5kNot DefinedNot Defined0.050.00000
16Gempar Script Toko Online shop_display_products.php sql injection7.36.9$0-$5k$0-$5kProof-of-ConceptNot Defined0.080.00986CVE-2009-0296
17Google Chrome Utility Process race condition9.89.4$25k-$100k$0-$5kNot DefinedOfficial Fix0.020.06523CVE-2011-3961
18Itechscripts iTechBids detail.php sql injection7.36.9$0-$5k$0-$5kProof-of-ConceptNot Defined0.010.00986CVE-2008-0776
19MidiCart PHP Shopping Cart item_show.php sql injection6.36.0$0-$5k$0-$5kProof-of-ConceptNot Defined0.040.00000
20UAEPD Shopping Cart Script products.php sql injection7.37.1$0-$5k$0-$5kHighUnavailable0.020.02800CVE-2014-1618

IOC - Indicator of Compromise (13)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

TTP - Tactics, Techniques, Procedures (6)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IDTechniqueVulnerabilitiesAccess VectorTypeConfidence
1T1059CWE-94Cross Site ScriptingpredictiveHigh
2T1059.007CWE-79, CWE-80Cross Site ScriptingpredictiveHigh
3TXXXXCWE-XXX, CWE-XXXXxxxxxxxx Xxxx Xxxxxxxxxxx XxxxxxxxxxpredictiveHigh
4TXXXXCWE-XXX7xx Xxxxxxxx XxxxxxxxpredictiveHigh
5TXXXXCWE-XXXxx XxxxxxxxxpredictiveHigh
6TXXXXCWE-XXXXxxxxxxxxxxxxpredictiveHigh

IOA - Indicator of Attack (29)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1File/getcfg.phppredictiveMedium
2Filebooks.phppredictiveMedium
3Filecoders/tiff.cpredictiveHigh
4Filecontent.phppredictiveMedium
5Filexxxxxx.xxxpredictiveMedium
6Filexxxxxxx.xxxpredictiveMedium
7Filexxxxxxxxxx.xxxpredictiveHigh
8Filexxxxx.xxxxxxx.xxxpredictiveHigh
9Filexxxx_xxxx.xxxpredictiveHigh
10Filexxxxxxxxxxxxxxxxxx.xxxxpredictiveHigh
11Filexxxx.xxxpredictiveMedium
12Filexxxxxxxx.xxxpredictiveMedium
13Filexxxxxxxxxx.xxxpredictiveHigh
14Filexxxx_xxxxxxx_xxxxxxxx.xxxpredictiveHigh
15Filexxxxxxxx-xxxxxxxxxxx.xxxpredictiveHigh
16Filexxxxxxxxx.xxpredictiveMedium
17Filexxxxx-xxxxxx.xxxpredictiveHigh
18Libraryxxxxxx.xxxpredictiveMedium
19ArgumentxxxxxxpredictiveLow
20ArgumentxxxpredictiveLow
21Argumentxxx_xxpredictiveLow
22ArgumentxxxpredictiveLow
23Argumentxxxx_xxpredictiveLow
24ArgumentxxpredictiveLow
25Argumentxxxx_xxpredictiveLow
26ArgumentxxxxxxxxpredictiveMedium
27Input Valuexxxx -x xxxxxxxx=xxxxxx.xxxxxxx xxxx://xxx.xxx.x.x/xxxxxx.xxxpredictiveHigh
28Pattern|xx|xx|xx|predictiveMedium
29Network Portxxx xxxxxx xxxxpredictiveHigh

References (2)

The following list contains external sources which discuss the actor and the associated activities:

Interested in the pricing of exploits?

See the underground prices here!