Gaza Cybergang Analysisinfo

IOB - Indicator of Behavior (46)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Language

en40
de6

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Country

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Actors

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Activities

Interest

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

Microsoft Windows4
WordPress4
Joomla2
Siemens Polarion2
vsftpd2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vulnerabilities

These are the vulnerabilities that we have identified as researched, approached, or attacked.

#VulnerabilityBaseTemp0dayTodayExpCouKEVEPSSCTICVE
1jforum username User input validation5.35.3$0-$5k$0-$5kNot definedNot defined 0.004430.06CVE-2019-7550
2Samsung Gallery Lockscreen access control3.53.4$0-$5k$0-$5kNot definedOfficial fix 0.000660.00CVE-2024-20827
3IBM Watson CP4D Data Stores allocation of resources6.46.4$5k-$25k$0-$5kNot definedOfficial fix 0.000820.00CVE-2023-27540
4IBM Watson Knowledge Catalog on Cloud Pak for Data csv injection7.47.3$5k-$25k$0-$5kNot definedOfficial fix 0.001110.00CVE-2023-28958
5IBM Watson Knowledge Catalog on Cloud Pak for Data Request denial of service5.45.3$5k-$25k$0-$5kNot definedOfficial fix 0.000750.00CVE-2023-28955
6Joomla Webservice Endpoint access control5.45.4$5k-$25k$0-$5kAttackedNot definedverified0.945320.08CVE-2023-23752
7Atlassian JIRA Server/Data Center Service Management Addon injection6.46.3$0-$5k$0-$5kNot definedOfficial fix 0.007120.00CVE-2021-39128
8magmi new cross-site request forgery8.07.6$0-$5k$0-$5kProof-of-ConceptUnavailablepossible0.709890.07CVE-2020-5776
9Microsoft Exchange Server information disclosure5.44.7$5k-$25k$0-$5kUnprovenOfficial fixexpected0.904220.06CVE-2021-41349
10Microsoft IIS Unicode path traversal7.36.6$5k-$25k$0-$5kProof-of-ConceptOfficial fixexpected0.866850.00CVE-2000-0884
11Siemens Polarion Web Page Generator Reflected cross site scripting3.53.5$5k-$25k$0-$5kNot definedOfficial fix 0.004020.00CVE-2019-13934
12Cisco Unified Communications Manager SOAP API Endpoint code injection8.88.4$5k-$25k$0-$5kNot definedOfficial fix 0.023300.02CVE-2021-1362
13Lenovo Integrated Management Module 2 Web Administration memory corruption8.58.5$0-$5k$0-$5kNot definedNot defined 0.006160.00CVE-2017-3774
14vsftpd Service Port 6200 os command injection8.58.1$25k-$100k$0-$5kProof-of-ConceptWorkaroundexpected0.942260.21CVE-2011-2523
15TP-LINK TD-8840t HTTP Request tools_admin_1 cross-site request forgery4.64.2$0-$5k$0-$5kProof-of-ConceptNot defined 0.000000.00
16Revive Adserver Flash Cross-Domain Policy crossdomain.xml access control7.37.0$0-$5k$0-$5kNot definedOfficial fix 0.006470.04CVE-2015-7369
17Oracle E-Business Suite iRecruitment5.35.3$5k-$25k$5k-$25kNot definedNot defined 0.004200.00CVE-2010-2408
18Octopus Deploy Package unrestricted upload5.35.3$0-$5k$0-$5kNot definedNot defined 0.005750.00CVE-2019-19084
19Cisco IOS XAUTH IKE Authentication improper authentication6.56.2$5k-$25k$0-$5kNot definedOfficial fix 0.005720.00CVE-2005-1058
20Microsoft IIS backdoor9.89.6$25k-$100k$5k-$25kNot definedWorkaround 0.000000.07

Campaigns (1)

These are the campaigns that can be associated with the actor:

  • Electric Powder

IOC - Indicator of Compromise (10)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

TTP - Tactics, Techniques, Procedures (11)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (17)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1File/index.php/newsletter/subscriber/new/predictiveHigh
2Fileapi_poller.phppredictiveHigh
3Filecrossdomain.xmlpredictiveHigh
4Filexxx/xxxxxx/xxxxxx/xxxxxxxxxxx/xxx.xxxpredictiveHigh
5Filexxxxx/xxxxx_xxxxx_xpredictiveHigh
6Filexxxxxxx/xxxx_xxxxxxxxxx.xxxpredictiveHigh
7Filexxxxxxxx/xxxxx/xxxxxxxx?xxxxxxxxpredictiveHigh
8Filexxxxx.xxxpredictiveMedium
9Filexx-xxxxxxxx/xxxxx-xx-xxxxx.xxxpredictiveHigh
10Libraryx:\xxxxxxx\xxxxxxxx\xxxxxxxxxxx\xxxxxxxxxxxxxx\xxxxxxxx.xxx_xxxxx_xxxxxxxxxxxxxxxx\xxxxx\xxxxxxxxxxx.xxxpredictiveHigh
11Libraryxxxxxx.xxxpredictiveMedium
12ArgumentxxxpredictiveLow
13Argumentxxxxxxxx.xxxxpredictiveHigh
14ArgumentxxxpredictiveLow
15Argumentxxxx->xxxxxxxpredictiveHigh
16Input Valuexx-xxxx://predictiveMedium
17Network Portxxx/xxxxpredictiveMedium

References (3)

The following list contains external sources which discuss the actor and the associated activities:

This view requires CTI permissions

Just purchase a CTI license today!