SpeakUp Analysis

IOB - Indicator of Behavior (108)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Lang

en102
de2
pl2
fr2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Country

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Actors

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Activities

Interest

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

Apple iOS4
Atlassian JIRA4
Apple macOS2
Cost Calculator Plugin2
Google Android2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vulnerabilities

#VulnerabilityBaseTemp0dayTodayExpRemCTIEPSSCVE
1Thomas R. Pasawicz HyperBook Guestbook Password Database gbconfiguration.dat Hash information disclosure5.35.2$5k-$25k$0-$5kHighWorkaround0.040.04187CVE-2007-1192
2Rittal PDU-3C002DEC/CMCIII-PU-9333E0FB os command injection7.57.5$0-$5k$0-$5kNot DefinedNot Defined0.060.01086CVE-2020-11953
3Backdoor.Win32.Psychward.b Service Port 8888 hard-coded credentials7.36.4$0-$5k$0-$5kProof-of-ConceptWorkaround0.060.00000
4Echelon SmartServer 1/SmartServer 2/i.LON 100/i.LON 600 improper authentication8.58.5$0-$5k$0-$5kNot DefinedNot Defined0.010.00885CVE-2018-8859
5Cybozu Garoon behavioral workflow5.35.3$0-$5k$0-$5kNot DefinedNot Defined0.000.01055CVE-2022-27661
6GitLab Community Edition/Enterprise Edition Rrunner Jobs API access control4.34.2$0-$5k$0-$5kNot DefinedOfficial Fix0.030.00890CVE-2022-2227
7Barco TransForm N Control Room Management Suite Web Application cross site scripting3.53.4$0-$5k$0-$5kNot DefinedOfficial Fix0.040.00885CVE-2022-26974
8BigBlueButton Chat Message information disclosure5.45.3$0-$5k$0-$5kNot DefinedOfficial Fix0.000.00950CVE-2022-29232
9wolfSSL BASE64 PEM File Decoding timing discrepancy2.22.2$0-$5k$0-$5kNot DefinedNot Defined0.010.00885CVE-2021-24116
10Google Go IP Address net.ParseCIDR access control7.37.0$5k-$25k$0-$5kNot DefinedOfficial Fix0.000.01537CVE-2021-29923
11Camunda Modeler IPC Message writeFile state issue7.07.0$0-$5k$0-$5kNot DefinedNot Defined0.010.01055CVE-2021-28154
12cocoapods-downloader argument injection6.86.7$0-$5k$0-$5kNot DefinedOfficial Fix0.070.02055CVE-2022-21223
13Deno privileges management8.68.5$0-$5k$0-$5kNot DefinedOfficial Fix0.030.00885CVE-2022-24783
14Rockwell Automation ISaGRAF Runtime credentials storage5.55.5$0-$5k$0-$5kNot DefinedNot Defined0.010.01963CVE-2020-25184
15Cost Calculator Plugin Cost Calculator Post's Layout path traversal5.55.3$0-$5k$0-$5kNot DefinedNot Defined0.030.00885CVE-2021-24820
16Zabbix SAML authentication spoofing8.28.2$0-$5k$0-$5kNot DefinedNot Defined0.030.16531CVE-2022-23131
17Shared Groovy Libraries Plugin protection mechanism5.55.5$0-$5k$0-$5kNot DefinedNot Defined0.080.02096CVE-2022-25183
18Sangoma Corporation Switchvox access control4.34.3$0-$5k$0-$5kNot DefinedNot Defined0.040.00885CVE-2021-45310
19Samsung Smartphone Edge Panel information disclosure2.72.7$0-$5k$0-$5kNot DefinedOfficial Fix0.030.00885CVE-2022-24001
20perM strncpy buffer overflow5.55.3$0-$5k$0-$5kNot DefinedOfficial Fix0.030.01018CVE-2021-38172

IOC - Indicator of Compromise (5)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

TTP - Tactics, Techniques, Procedures (15)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (34)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1File/cgi-bin/kerbynetpredictiveHigh
2File/damicms-master/admin.php?s=/Article/doeditpredictiveHigh
3File/etc/quaggapredictiveMedium
4File/main?cmd=invalid_browserpredictiveHigh
5Filebackend/upcean.cpredictiveHigh
6Filexxxxxxxxx.xxxpredictiveHigh
7Filexxxxxxxxxxxxxxxxxxxxxxxx.xxxxpredictiveHigh
8Filexxxx/xxxxxxxxxxxxxxx.xxxpredictiveHigh
9Filexxxx-xxxxxxxx-xxxxxx.xxxpredictiveHigh
10Filexxxx/xxxx_xxxxxxxx_xxx/xxx_xxxxpredictiveHigh
11Filexxxxxxxxx.xxxpredictiveHigh
12Filexx_xxx_xx.xpredictiveMedium
13Filexxx/xxxxx/xxxx-xxxxxxxx.xxxpredictiveHigh
14Filexxxxx.xxxpredictiveMedium
15Filexxxxxxx.xxxpredictiveMedium
16Filexxxxxxx.xxxpredictiveMedium
17Filexxxx/xxxxxxxxxxxxxx.xxxxpredictiveHigh
18Filexxxxxxx:xxxxxxxxxxxxxxxxpredictiveHigh
19Filexx_xxxx/xx/predictiveMedium
20Filexxxx.xxxpredictiveMedium
21FilexxxxxxxpredictiveLow
22Libraryxxxxxxxxxx.xxxpredictiveHigh
23ArgumentxxxpredictiveLow
24ArgumentxxxxxxxxxxxxxxxpredictiveHigh
25ArgumentxxxxxxxxxxxxpredictiveMedium
26ArgumentxxxxxxpredictiveLow
27Argumentxxxxxx_xxxxx_xxxpredictiveHigh
28ArgumentxxpredictiveLow
29ArgumentxxpredictiveLow
30Argumentxxxx xxxxxpredictiveMedium
31ArgumentxxxxxxxxxxxxxxxxxxxpredictiveHigh
32ArgumentxxxxxxxpredictiveLow
33ArgumentxxxxpredictiveLow
34Input Value%xx%xxxxx%xx/xxx/xxxxxx%xx%xxpredictiveHigh

References (2)

The following list contains external sources which discuss the actor and the associated activities:

Do you need the next level of professionalism?

Upgrade your account now!