Heard Island and McDonald Islands Unknown Analysisinfo

IOB - Indicator of Behavior (27)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Lang

en14
es12
it2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Country

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Actors

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Activities

Interest

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

Qualcomm 4 Gen 1 Mobile Platform4
Qualcomm 4 Gen 2 Mobile Platform4
Qualcomm 460 Mobile Platform4
Qualcomm 480 5G Mobile Platform4
Qualcomm 662 Mobile Platform4

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vulnerabilities

#VulnerabilityBaseTemp0dayTodayExpRemEPSSCTICVE
1Google Android RCS Service ShannonRcsService.java registerGsmaServiceIntentReceiver permission6.56.4$5k-$25k$5k-$25kNot DefinedOfficial Fix0.000420.02CVE-2023-21149
2EnvoThemes Envo Extra Plugin cross site scripting5.04.9$0-$5k$0-$5kNot DefinedNot Defined0.000450.00CVE-2024-32456
3TP-Link Omada ER605 Remote Code Execution5.65.4$0-$5k$0-$5kNot DefinedOfficial Fix0.000650.04CVE-2024-5244
4netkit Telnet telnetd utility.c buffer overflow9.89.8$5k-$25k$5k-$25kNot DefinedNot Defined0.645540.02CVE-2020-10188
5Cisco Firepower System Software SMBv2/SMv3 data processing6.46.1$5k-$25k$0-$5kNot DefinedOfficial Fix0.001610.00CVE-2018-0455
6vsftpd deny_file3.73.6$0-$5k$0-$5kNot DefinedOfficial Fix0.002210.04CVE-2015-1419
7ROG Live Service link following6.56.4$0-$5k$0-$5kNot DefinedNot Defined0.000600.00CVE-2022-22262
8Ubuntu Linux ntp Package crontab access control6.46.3$5k-$25k$0-$5kProof-of-ConceptOfficial Fix0.000790.00CVE-2016-0727
9Google Android IntentResolver information disclosure4.44.3$5k-$25k$0-$5kNot DefinedOfficial Fix0.000420.07CVE-2023-21312
10Qualcomm 4 Gen 1 Mobile Platform WLAN HAL information disclosure5.04.9$0-$5k$0-$5kNot DefinedOfficial Fix0.000430.00CVE-2023-28566
11Qualcomm 4 Gen 1 Mobile Platform WLAN HAL information disclosure5.04.9$0-$5k$0-$5kNot DefinedOfficial Fix0.000430.00CVE-2023-28568
12SMTP2GO Plugin Setting cross site scripting2.42.4$0-$5k$0-$5kNot DefinedNot Defined0.000450.06CVE-2023-28496
13Facebook WhatsApp Video Call heap-based overflow8.07.9$5k-$25k$0-$5kNot DefinedOfficial Fix0.004530.00CVE-2022-36934
14ZTE ZXHN F680 Gateway Name cross site scripting3.53.5$0-$5k$0-$5kNot DefinedNot Defined0.000540.03CVE-2022-23136
15Intel oneAPI DPC++ Compiler access control8.18.0$5k-$25k$0-$5kNot DefinedOfficial Fix0.000440.04CVE-2022-40196
16Rundeck Plugin HTTP Endpoint authorization3.93.9$0-$5k$0-$5kNot DefinedNot Defined0.000540.00CVE-2022-41233
17Microsoft Windows Remote Desktop Client Remote Code Execution8.88.1$25k-$100k$5k-$25kUnprovenOfficial Fix0.017450.03CVE-2022-22017
18Apache Airflow CNCF Kubernetes Provider KubernetesPodOperator injection6.96.8$5k-$25k$0-$5kNot DefinedOfficial Fix0.001370.00CVE-2023-33234
19StrawberryPerl Strawberry access control7.57.4$0-$5k$0-$5kNot DefinedNot Defined0.001140.06CVE-2022-36564
20CoreFTP HTTP PUT Request path traversal6.35.7$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.003990.07CVE-2022-22836

IOC - Indicator of Compromise (11)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

TTP - Tactics, Techniques, Procedures (7)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IDTechniqueClassVulnerabilitiesAccess VectorTypeConfidence
1T1006CAPEC-139CWE-23Path TraversalpredictiveHigh
2T1055CAPEC-10CWE-74Improper Neutralization of Data within XPath ExpressionspredictiveHigh
3TXXXX.XXXCAPEC-XXXCWE-XXXxxxx Xxxxx Xxxx XxxxxxxxxpredictiveHigh
4TXXXXCAPEC-XXCWE-XXX, CWE-XXXXxxxxxxxx Xxxx Xxxxxxxxxxx XxxxxxxxxxpredictiveHigh
5TXXXXCWE-XXX7xx Xxxxxxxx XxxxxxxxpredictiveHigh
6TXXXXCWE-XXXXxxxxxxxxx XxxxxxpredictiveHigh
7TXXXXCAPEC-XXXCWE-XXXXxxxxxxxxx Xx Xxxxxxx Xxxxx Xxxxxxx Xxxxxxxxx XxxxxxxxxxxpredictiveHigh

IOA - Indicator of Attack (5)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1FileC:\StrawberrypredictiveHigh
2FilecrontabpredictiveLow
3Filexxxxxxxxxxxxxxxxx.xxxxpredictiveHigh
4Filexxxxxxx.xpredictiveMedium
5Libraryxxxxx.xxxpredictiveMedium

References (3)

The following list contains external sources which discuss the actor and the associated activities:

This view requires CTI permissions

Just purchase a CTI license today!