Letscall Analysisinfo

IOB - Indicator of Behavior (18)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Language

en14
zh4

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Country

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Actors

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Activities

Interest

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

ZkTeco ZAM170-NF2
Kentico CMS2
Cisco IOS XE2
Qualcomm Snapdragon Auto2
Tiki2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vulnerabilities

These are the vulnerabilities that we have identified as researched, approached, or attacked.

#VulnerabilityBaseTemp0dayTodayExpCouKEVEPSSCTICVE
1ZkTeco ZAM170-NF os command injection9.99.7$0-$5k$0-$5kNot definedNot defined 0.011340.00CVE-2023-3939
2Qualcomm Snapdragon Auto HAB Message resource consumption6.16.0$5k-$25k$0-$5kNot definedOfficial fix 0.000560.08CVE-2022-22101
3Google Chrome Javascript use after free6.46.3$25k-$100k$0-$5kAttackedOfficial fixverified0.791040.00CVE-2019-5825
4Tenda AC8/AC10/AC18 HTTP Request telnet command injection7.26.5$0-$5k$0-$5kProof-of-ConceptNot defined 0.007880.05CVE-2025-0528
5Cisco IOS XE Express Forwarding mismatched memory management routines6.96.8$5k-$25k$0-$5kNot definedOfficial fix 0.000190.00CVE-2025-20189
6Cisco IOS XE Access Point Image Download Feature hard-coded credentials9.99.7$25k-$100k$5k-$25kNot definedOfficial fix 0.041330.08CVE-2025-20188
7ZkTeco ZAM170-NF path traversal9.99.7$0-$5k$0-$5kNot definedNot defined 0.003470.00CVE-2023-3941
8Tiki Admin Password tiki-login.php improper authentication8.07.7$0-$5k$0-$5kNot definedOfficial fixexpected0.911380.86CVE-2020-15906
9Pligg cloud.php sql injection6.36.3$0-$5k$0-$5kNot definedNot defined 0.000000.64
10Citrix NetScaler ADC/NetScaler Gateway OpenID openid-configuration ns_aaa_oauthrp_send_openid_config CitrixBleed memory corruption8.38.2$100k and more$0-$5kAttackedOfficial fixverified0.943780.06CVE-2023-4966
11LogicBoard CMS away.php redirect6.36.1$0-$5k$0-$5kNot definedUnavailable 0.000000.41
12Shenzhen Youkate Industrial Facial Love Cloud Payment System Account SystemMng.ashx privileges management8.17.9$0-$5k$0-$5kProof-of-ConceptNot defined 0.000660.00CVE-2023-6099
13Kubelet seccomp Profile improper validation of specified type of input4.44.3$0-$5k$0-$5kNot definedNot defined 0.000070.02CVE-2023-2431
14Telerik Progress UI for ASP.NET AJAX Telerik.Web.UI inadequate encryption8.58.4$0-$5k$0-$5kAttackedOfficial fixverified0.922790.00CVE-2017-11317
15Kentico CMS CMS Administration Dashboard install.aspx access control8.58.2$0-$5k$0-$5kNot definedOfficial fixexpected0.895140.04CVE-2017-17736

IOC - Indicator of Compromise (10)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDIP addressHostnameActorCampaignsIdentifiedTypeConfidence
135.243.122.211211.122.243.35.bc.googleusercontent.comLetscall07/11/2023verifiedHigh
245.43.215.98Letscall07/11/2023verifiedHigh
3XX.XX.XXX.XXXXxxxxxxx07/11/2023verifiedHigh
4XXX.XXX.XXX.XXXXxxxxxxx07/11/2023verifiedHigh
5XXX.XXX.XXX.XXXXxxxxxxx07/11/2023verifiedHigh
6XXX.XXX.XXX.XXXXxxxxxxx07/11/2023verifiedHigh
7XXX.XX.XX.XXxxxxxxx07/11/2023verifiedHigh
8XXX.XX.XX.XXXxxxxxxx07/11/2023verifiedHigh
9XXX.XX.XX.XXXxxxxxxx07/11/2023verifiedHigh
10XXX.XXX.XXX.XXXXxxxxxxx07/11/2023verifiedHigh

TTP - Tactics, Techniques, Procedures (7)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IDTechniqueClassVulnerabilitiesAccess VectorTypeConfidence
1T1006CAPEC-139CWE-23Path TraversalpredictiveHigh
2T1068CAPEC-122CWE-264, CWE-269Execution with Unnecessary PrivilegespredictiveHigh
3TXXXX.XXXCAPEC-XXXCWE-XXXXxxx-xxxxx XxxxxxxxxxxpredictiveHigh
4TXXXXCAPEC-XXXCWE-XX, CWE-XXXxxxxxx Xxxxx Xx Xxxxxxxxxx Xxxxxxxxxx XxxxxxxxxpredictiveHigh
5TXXXX.XXXCAPEC-XXXCWE-XXXXxxx XxxxxxxxpredictiveHigh
6TXXXXCAPEC-XXXCWE-XXXxx XxxxxxxxxpredictiveHigh
7TXXXXCAPEC-XXXCWE-XXXXxxxxxxxxxxxx XxxxxxpredictiveHigh

IOA - Indicator of Attack (10)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1File/forum/away.phppredictiveHigh
2File/goform/telnetpredictiveHigh
3File/xxxxx/xxx/.xxxx-xxxxx/xxxxxx-xxxxxxxxxxxxxpredictiveHigh
4File/xxxxxxxxx.xxxxpredictiveHigh
5Filexxxxx.xxxpredictiveMedium
6Filexxxxxxxxxx/xxxxxxx.xxxxpredictiveHigh
7Filexxxx-xxxxx.xxxpredictiveHigh
8ArgumentxxxxxxxxxxpredictiveMedium
9ArgumentxxxxxxxxxxxxpredictiveMedium
10Input ValuexxpredictiveLow

References (2)

The following list contains external sources which discuss the actor and the associated activities:

This view requires CTI permissions

Just purchase a CTI license today!