Quietcanary Analysisinfo

IOB - Indicator of Behavior (28)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Language

en20
zh2
de2
es2
it2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Country

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Actors

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Activities

Interest

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

DZCP deV!L`z Clanportal4
YaBB2
TWIG2
myPHPCalendar2
Craig Patchett Fileseek2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vulnerabilities

These are the vulnerabilities that we have identified as researched, approached, or attacked.

#VulnerabilityBaseTemp0dayTodayExpCouKEVEPSSCTICVE
1DZCP deV!L`z Clanportal config.php code injection7.36.6$0-$5k$0-$5kProof-of-ConceptOfficial fix 0.009700.39CVE-2010-0966
2PHP Outburst Easynews admin.php memory corruption7.36.9$0-$5k$0-$5kProof-of-ConceptUnavailable 0.060880.10CVE-2006-5412
3nginx SPDY memory corruption7.36.4$0-$5k$0-$5kUnprovenOfficial fix 0.105580.05CVE-2014-0133
4YaBB yabb.pl cross site scripting4.34.1$0-$5k$0-$5kProof-of-ConceptNot defined 0.005210.00CVE-2004-2402
5PHPizabi index.php path traversal6.55.7$0-$5k$0-$5kUnprovenUnavailable 0.023180.30CVE-2008-3723
6DZCP deV!L`z Clanportal browser.php information disclosure5.35.0$0-$5k$0-$5kProof-of-ConceptNot defined 0.081890.30CVE-2007-1167
7Appindex MWChat start_lobby.php file inclusion7.36.9$0-$5k$0-$5kProof-of-ConceptNot defined 0.010930.00CVE-2005-1869
8phpShop index.php file inclusion7.37.3$0-$5k$0-$5kNot definedNot defined 0.010750.00CVE-2004-2010
9Craig Patchett Fileseek FileSeek.cgi path traversal5.34.8$0-$5k$0-$5kProof-of-ConceptOfficial fix 0.054490.02CVE-2002-0611
10myPHPCalendar admin.php file inclusion7.36.6$0-$5k$0-$5kProof-of-ConceptNot defined 0.019440.00CVE-2006-6812
11Microsoft Exchange Outlook Web Access access control5.34.6$25k-$100k$0-$5kUnprovenOfficial fix 0.051430.02CVE-2014-6319
12cPanel Script privileges management5.34.8$0-$5k$0-$5kProof-of-ConceptUnavailable 0.000000.00
13phpMyAdmin File code injection5.04.5$5k-$25k$0-$5kProof-of-ConceptOfficial fix 0.161330.05CVE-2013-3239
14phpMyAdmin Parameter Validation schema_export.php sql injection6.36.0$5k-$25k$0-$5kNot definedOfficial fix 0.004650.00CVE-2013-5003
15Drupal Password Reset access control6.55.7$0-$5k$0-$5kUnprovenOfficial fix 0.005960.00CVE-2015-2559
16ultimate-form-builder-lite Plugin admin-ajax.php sql injection8.58.2$0-$5k$0-$5kNot definedOfficial fix 0.022050.00CVE-2017-15919
17Apache HTTP Server mod_rewrite numeric error6.36.0$5k-$25k$0-$5kHighOfficial fixexpected0.927390.02CVE-2006-3747
18Microsoft IIS FastCGI memory corruption7.37.0$25k-$100k$0-$5kNot definedOfficial fix 0.166750.00CVE-2010-2730
19Microsoft IIS FTP Server memory corruption7.57.2$25k-$100k$0-$5kHighOfficial fixexpected0.916890.00CVE-2010-3972
20TWIG sql injection7.37.1$0-$5k$0-$5kNot definedWorkaround 0.006030.00CVE-2001-1348

IOC - Indicator of Compromise (1)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDIP addressHostnameActorCampaignsIdentifiedTypeConfidence
1194.67.209.186ih465921.dedic.myihor.ruQuietcanary01/16/2023verifiedMedium

TTP - Tactics, Techniques, Procedures (7)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (21)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1Fileadmin.phppredictiveMedium
2FileFileSeek.cgipredictiveMedium
3Fileinc/config.phppredictiveHigh
4Filexxx/xxxxxxxxxxx/xxxxxxx.xxxpredictiveHigh
5Filexxxxx.xxxpredictiveMedium
6Filexxxxxx_xxxxxx.xxxpredictiveHigh
7Filexxxxx_xxxxx.xxxpredictiveHigh
8Filexxxx-xxxxxxxxx.xxxpredictiveHigh
9Filexx-xxxxx/xxxxx-xxxx.xxxpredictiveHigh
10Filexxxx.xxpredictiveLow
11Libraryxxxxxx[xxxxxx_xxxxpredictiveHigh
12Argument$_xxxx['xxx_xxxx_xxxxxx']predictiveHigh
13ArgumentxxxxxxxxpredictiveMedium
14Argumentxxxx_xxxpredictiveMedium
15ArgumentxxxxxpredictiveLow
16Argumentxxx_xxxpredictiveLow
17Argumentxxxxxx[xxxxxx_xxxx]predictiveHigh
18Argumentxx_xxxxx_xxpredictiveMedium
19ArgumentxxxxpredictiveLow
20Argumentxxxx/xxxxpredictiveMedium
21ArgumentxxpredictiveLow

References (2)

The following list contains external sources which discuss the actor and the associated activities:

This view requires CTI permissions

Just purchase a CTI license today!