QNAPCrypt Analysisinfo

IOB - Indicator of Behavior (23)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Lang

en24

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Country

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Actors

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Activities

Interest

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

nginx2
Mlffat2
Microsoft Outlook Web App2
QNAP Multimedia Console2
QNAP QTS2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vulnerabilities

#VulnerabilityBaseTemp0dayTodayExpRemEPSSCTICVE
1nginx request smuggling6.96.9$0-$5k$0-$5kNot DefinedNot Defined0.002410.26CVE-2020-12440
2SourceCodester Block Inserter for Dynamic Content view_post.php sql injection6.36.0$0-$5k$0-$5kProof-of-ConceptNot Defined0.001300.07CVE-2024-2073
3Fortinet FortiOS SSL-VPN Daemon null pointer dereference7.57.4$0-$5k$0-$5kNot DefinedOfficial Fix0.000470.04CVE-2023-29180
4QNAP Multimedia Console/QTS/Media Streaming Add-on command injection9.08.8$0-$5k$0-$5kNot DefinedOfficial Fix0.001080.04CVE-2023-23369
5OpenSSH Authentication Username information disclosure5.34.8$5k-$25k$0-$5kHighOfficial Fix0.068840.05CVE-2016-6210
6Mikrotik RouterOS SNMP out-of-bounds8.07.7$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.003700.02CVE-2022-45315
7Odoo Community/Enterprise Database Manager access control8.58.3$0-$5k$0-$5kNot DefinedNot Defined0.008480.00CVE-2018-14885
81C:Enterprise URL Parameter information disclosure5.95.6$0-$5k$0-$5kNot DefinedOfficial Fix0.001410.03CVE-2021-3131
9Hikvision Wwireless Bridge Web Server access control7.37.3$0-$5k$0-$5kNot DefinedNot Defined0.002190.00CVE-2022-28173
10Synology DiskStation Manager Web Interface info.cgi Reflected cross site scripting5.55.1$0-$5k$0-$5kProof-of-ConceptWorkaround0.000000.06
11Online Student Admission sql injection6.35.7$0-$5k$0-$5kProof-of-ConceptNot Defined0.002730.00CVE-2022-28467
12Mini-Inventory-and-Sales-Management-System Inventory cross-site request forgery3.53.4$0-$5k$0-$5kNot DefinedNot Defined0.000440.00CVE-2021-44321
13TightVNC InitialiseRFBConnection out-of-bounds write8.58.5$0-$5k$0-$5kNot DefinedNot Defined0.010720.00CVE-2019-15679
14Host Web Server phpinfo.php phpinfo information disclosure5.35.2$5k-$25k$0-$5kNot DefinedWorkaround0.000000.03
15Microsoft Outlook Web App redir.aspx authentication spoofing5.35.0$5k-$25k$0-$5kProof-of-ConceptUnavailable0.000000.02
16Teradata Virtual Machine Community Edition Temp File t2a.pl access control9.89.8$0-$5k$0-$5kNot DefinedNot Defined0.022400.00CVE-2016-7489
17Microsoft SQL Server Virtual Function access control6.36.0$25k-$100k$0-$5kNot DefinedOfficial Fix0.066490.04CVE-2015-1763
18Mlffat index.php sql injection7.36.9$0-$5k$0-$5kProof-of-ConceptNot Defined0.001070.00CVE-2009-2585
19Microsoft IIS FTP Server memory corruption7.57.2$25k-$100k$0-$5kHighOfficial Fix0.968440.00CVE-2010-3972
20WordPress wp_crop_image path traversal5.95.8$5k-$25k$0-$5kProof-of-ConceptNot Defined0.805300.04CVE-2019-8943

IOC - Indicator of Compromise (4)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDIP addressHostnameActorCampaignsIdentifiedTypeConfidence
1167.99.218.114QNAPCrypt09/08/2022verifiedMedium
2XXX.XXX.XX.XXXxxxxxxxx08/11/2021verifiedLow
3XXX.XXX.XXX.XXXxxxxxxxx.xxxx.xxxxxx.xxxXxxxxxxxx06/17/2022verifiedMedium
4XXX.XX.XXX.XXxxxx.xx-xxx-xx-xxx.xxxXxxxxxxxx02/12/2024verifiedHigh

TTP - Tactics, Techniques, Procedures (7)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (15)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1File/opt/teradata/gsctools/bin/t2a.plpredictiveHigh
2File/webman/info.cgipredictiveHigh
3Fileaccount/gallery.phppredictiveHigh
4Filexxxxx.xxxpredictiveMedium
5Filexxx/xxxxx.xxxxpredictiveHigh
6Filexxxxxxx.xxxpredictiveMedium
7Filexxxx_xxxxxxx_xxxxxxxx.xxxpredictiveHigh
8Filexxxx_xxxx.xxxpredictiveHigh
9Argumentxxx_xxpredictiveLow
10Argumentxxxx/xxxxxx/xxxpredictiveHigh
11ArgumentxxpredictiveLow
12ArgumentxxxxxxxxpredictiveMedium
13ArgumentxxxxxxxxxxxxxxxxpredictiveHigh
14ArgumentxxxpredictiveLow
15Input Value.xxx?/../../xxxx.xxxpredictiveHigh

References (5)

The following list contains external sources which discuss the actor and the associated activities:

Samples (5)

The following list contains associated samples:

This view requires CTI permissions

Just purchase a CTI license today!