Vice Society Analysis

IOB - Indicator of Behavior (638)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Lang

en440
de56
fr52
es30
zh18

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Country

de484
us24
fr2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Actors

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Activities

Interest

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

Google Android12
Microsoft Windows12
Linux Kernel12
Qualcomm Snapdragon Mobile8
PHP8

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vulnerabilities

#VulnerabilityBaseTemp0dayTodayExpRemCTIEPSSCVE
1Mozilla Firefox ThirdPartyUtil race condition5.04.8$5k-$25k$0-$5kNot DefinedOfficial Fix0.050.00050CVE-2022-42930
2Grafana Dashboard path traversal3.53.4$0-$5k$0-$5kNot DefinedNot Defined0.070.00168CVE-2022-32275
3Questions For Confluence App hard-coded credentials8.58.4$0-$5k$0-$5kNot DefinedOfficial Fix0.030.97342CVE-2022-26138
4Ignite Realtime Spark Chat Message Credentials missing encryption6.56.5$0-$5k$0-$5kNot DefinedNot Defined0.040.00234CVE-2020-12772
5Wildog flask-file-server send_file path traversal7.47.3$0-$5k$0-$5kNot DefinedNot Defined0.030.00154CVE-2022-31527
6iText iTextPDF GhostscriptHelper.java command injection5.55.3$0-$5k$0-$5kNot DefinedOfficial Fix0.040.00138CVE-2021-43113
7Elecom WRC-1167GHBK-S Request code injection6.76.7$0-$5k$0-$5kNot DefinedNot Defined0.040.00042CVE-2023-37565
8Trend Micro Apex Central cross site scripting4.44.4$5k-$25k$5k-$25kNot DefinedNot Defined0.000.00045CVE-2023-32536
9Ashlar-Vellum Cobalt CO File Parser stack-based overflow7.87.8$0-$5k$0-$5kNot DefinedNot Defined0.090.00000CVE-2023-34287
10Cilium information disclosure3.73.7$0-$5k$0-$5kNot DefinedOfficial Fix0.000.00046CVE-2023-34242
11ChiKoi load_file sql injection7.67.5$0-$5k$0-$5kNot DefinedNot Defined0.050.00076CVE-2023-24084
12Easy Google Maps Plugin AJAX Action cross-site request forgery5.05.0$0-$5k$0-$5kNot DefinedNot Defined0.000.00064CVE-2023-2526
13IBOS mark&op=delFromSend sql injection7.16.9$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.130.00061CVE-2023-1747
14Adobe Dimension File out-of-bounds7.06.9$0-$5k$0-$5kNot DefinedOfficial Fix0.030.00063CVE-2023-25887
15Openfind Mail2000 File Upload cross site scripting4.44.4$0-$5k$0-$5kNot DefinedNot Defined0.060.00048CVE-2023-22902
16ONLYOFFICE Docs libgcc_s.so.1 untrusted search path6.56.5$0-$5k$0-$5kNot DefinedNot Defined0.040.00053CVE-2022-48422
17Tenda W20E formSetSysTime buffer overflow7.67.5$0-$5k$0-$5kNot DefinedNot Defined0.050.00087CVE-2023-26806
18Samsung Smart Phone SoftSim TA access control4.94.9$0-$5k$0-$5kNot DefinedOfficial Fix0.000.00042CVE-2023-21453
19Array Networks APV Packet command injection5.95.8$0-$5k$0-$5kNot DefinedOfficial Fix0.040.00081CVE-2023-28460
20Client Logo Carousel Plugin Shortcode Attribute cross site scripting4.44.4$0-$5k$0-$5kNot DefinedNot Defined0.000.00045CVE-2023-0073

IOC - Indicator of Compromise (4)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDIP addressHostnameActorCampaignsIdentifiedTypeConfidence
15.161.136.176static.176.136.161.5.clients.your-server.deVice Society09/07/2022verifiedHigh
2X.XXX.XX.XXXxxx Xxxxxxx09/07/2022verifiedHigh
3XXX.XX.XXX.XXXxxx Xxxxxxx09/07/2022verifiedHigh
4XXX.XXX.XX.XXXxxxx.xxxxxxxxxxx.xxxxXxxx Xxxxxxx09/07/2022verifiedHigh

TTP - Tactics, Techniques, Procedures (26)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IDTechniqueVulnerabilitiesAccess VectorTypeConfidence
1T1006CWE-21, CWE-22, CWE-23, CWE-36Pathname TraversalpredictiveHigh
2T1040CWE-294, CWE-319Authentication Bypass by Capture-replaypredictiveHigh
3T1055CWE-74InjectionpredictiveHigh
4T1059CWE-94Cross Site ScriptingpredictiveHigh
5T1059.007CWE-79, CWE-80Cross Site ScriptingpredictiveHigh
6T1068CWE-250, CWE-264, CWE-269, CWE-274, CWE-284J2EE Misconfiguration: Weak Access Permissions for EJB MethodspredictiveHigh
7TXXXXCWE-XXX, CWE-XXXXxxx Xxx Xxxxxxxxx Xxxxxxxxxxx XxxxxxxxpredictiveHigh
8TXXXX.XXXCWE-XXXXxxxxxxx Xxxxxxxxxxx Xx Xxxxxxxxx Xxxxxxxxxxxxxx XxxxxxxxpredictiveHigh
9TXXXXCWE-XX, CWE-XXXxxxxxx XxxxxxxxxpredictiveHigh
10TXXXX.XXXCWE-XXXXxxx XxxxxxxxpredictiveHigh
11TXXXXCWE-XXX, CWE-XXX7xx Xxxxxxxx XxxxxxxxpredictiveHigh
12TXXXXCWE-XXX, CWE-XXXXxxxxxxxxx XxxxxxpredictiveHigh
13TXXXX.XXXCWE-XXXXXxxxxxxxxxx Xxxxxxx Xxxxxxxxxx XxxxxxxxxxpredictiveHigh
14TXXXXCWE-XXXxx XxxxxxxxxpredictiveHigh
15TXXXX.XXXCWE-XXXXxxxxxxx XxxxxxxxxxxxxpredictiveHigh
16TXXXXCWE-XXX, CWE-XXX, CWE-XXXXxx.xxx Xxxxxxxxxxxxxxxx: Xxxxxxxx Xx Xxxxxxxxxxxxx XxxxpredictiveHigh
17TXXXXCWE-XXXXxxxxxxxx Xxxxxxx Xx Xxxxxxxxx XxxxxxxxxxxpredictiveHigh
18TXXXXCWE-XXX, CWE-XXXXxxxxxxxx Xxxxxx XxxxpredictiveHigh
19TXXXX.XXXCWE-XXXXxxxxxxx Xxxxxx XxxxpredictiveHigh
20TXXXX.XXXCWE-XXXXxxxxxxx Xxxxxxxxxxx XxxxxxxxxxpredictiveHigh
21TXXXX.XXXCWE-XXXXxxxxxxxpredictiveHigh
22TXXXXCWE-XXX, CWE-XXXXxxxxxxxxxxxxpredictiveHigh
23TXXXX.XXXCWE-XXXxxxxxxxxxxxxpredictiveHigh
24TXXXXCWE-XXX, CWE-XXX, CWE-XXX, CWE-XXXX2xx Xxxxxxxxxxxxxxxx: Xxxx Xxxxxxxxxxxx Xxxxxxx XxxxxxxxxxpredictiveHigh
25TXXXX.XXXCWE-XXX, CWE-XXX, CWE-XXXXxx Xxxxxxxxxx XxxxxpredictiveHigh
26TXXXX.XXXCWE-XXXXxxxxxxxxxxx XxxxxxpredictiveHigh

IOA - Indicator of Attack (235)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1File.python-versionpredictiveHigh
2File/?r=email/api/mark&op=delFromSendpredictiveHigh
3File/Applications/Utilities/TerminalpredictiveHigh
4File/cardo/apipredictiveMedium
5File/cgi-bin/wapopenpredictiveHigh
6File/cgi-bin/webprocpredictiveHigh
7File/classes/Master.php?f=delete_paymentpredictiveHigh
8File/cms/category/listpredictiveHigh
9File/ctcprotocol/ProtocolpredictiveHigh
10File/dashboard/contactpredictiveHigh
11File/etc/tomcat8/Catalina/attackpredictiveHigh
12File/etc/uci-defaultspredictiveHigh
13File/goform/setSnmpInfopredictiveHigh
14File/goform/WifiBasicSetpredictiveHigh
15File/Home/debit_credit_ppredictiveHigh
16File/mgmt/tm/util/bashpredictiveHigh
17File/nova/bin/consolepredictiveHigh
18File/ossn/administrator/com_installerpredictiveHigh
19File/Source/C++/Core/Ap4DataBuffer.cpppredictiveHigh
20File/squashfs-root/www/HNAP1/control/SetWizardConfig.phppredictiveHigh
21File/src/helper.cpredictiveHigh
22File/uncpath/predictiveMedium
23File/user-utils/users/md5.jsonpredictiveHigh
24File/user/check.phppredictiveHigh
25File/var/avamar/f_cache.datpredictiveHigh
26File/xxxxxxxx_xxxxx/xxxxx/?xxxx=xxxxxxxxxxx/xxxxxx_xxx_xxxxxxxxpredictiveHigh
27File/xxxxxxxxxx.xxxpredictiveHigh
28File/xx-xxxxxpredictiveMedium
29File/xx-xxxxx/xxxxx-xxxx.xxxpredictiveHigh
30File/xx-xxxxxxxx/xxxxxxxxx.xxxpredictiveHigh
31File/_xxx_xxx/xxxxxx.xxxpredictiveHigh
32Filex.x.x.xxxxpredictiveMedium
33Filexxxxxxxxxx.xxxxpredictiveHigh
34Filexxxxx/xxxxxx.xxxpredictiveHigh
35Filexxxxxxx/xxx-xxxxxxxxxxxx.xxxpredictiveHigh
36Filexx-xxxxx.xxxpredictiveMedium
37Filexxx/xx-xxxxx-xxxxxxx/xxx-xx-xxxxx-xxxxxxx.xxxpredictiveHigh
38Filexxxxxxxxx.xxx/xxxxxxxxxx.xxx/xxxxxxxx.xxx/xxxxxxxxxxxxxxxx.xxx/xxxxxxxx.xxxpredictiveHigh
39Filexxx/xxxxxxxx/xxxx/xxxxxxxxxxxxxxxxx.xxxxpredictiveHigh
40Filexxxx/xxxxxxx/xxxxxx/xxxxxx_xx.xpredictiveHigh
41Filexxxxxxx.xxxxpredictiveMedium
42Filexxxxxxx_xxxx.xxxpredictiveHigh
43Filexxxxxxx.xxpredictiveMedium
44Filexxxxxxxxxxxx.xxx/xxxxxxxxxxx.xxx/xxxxxxxxxxx.xxx/xxxxxxxxxxx.xxxpredictiveHigh
45Filexxxx/xxxxxxxxxx/xxxxxxxxxxxxxxxxxxxxxxxxx.xxxxpredictiveHigh
46Filexxxxx-xx-xxxxxx-xxxxx.xxxpredictiveHigh
47Filexxxxx.xxxxxxxxx_xxxxx.xxxpredictiveHigh
48Filexxxxx.xxxxxx.xxxpredictiveHigh
49Filexxxxx.xxxpredictiveMedium
50Filexxxxxx/xxx.xpredictiveMedium
51Filexxxxxx/xxxxxxx.xpredictiveHigh
52Filexxxxxx.xxxpredictiveMedium
53Filexxxxxxxxxxxxxxxxx.xxxpredictiveHigh
54Filexxxxxx/xxx/x_xxxxxxxx_xxxxxxxx.xpredictiveHigh
55FilexxxxxpredictiveLow
56Filex_xxxxxxpredictiveMedium
57Filexx_xxxx.xpredictiveMedium
58Filexxxx/xxxxxxxx-xxxxxx-xxxpredictiveHigh
59Filexxxxxxxxxxxxxxx.xxxxpredictiveHigh
60Filexxxxxx_x_x.xxxpredictiveHigh
61Filexxxxxxxx.xxxpredictiveMedium
62Filexxxxxxx/xxxxx/xxxxxxxxxxx/xxxxxx/xxxxx.xpredictiveHigh
63Filexxxxxxx/xxx/xxxxxx/xx_xx.xpredictiveHigh
64Filexxxxxxx.xxxxpredictiveMedium
65Filexxxxxx.xxxpredictiveMedium
66Filexxxx-xxxx.xxxpredictiveHigh
67Filexxxx/xxxxxxxxxx/xxxxxx-xxxxxx.xpredictiveHigh
68Filexxxxxxxxxxxxxxxxx.xxxpredictiveHigh
69Filexxxx.xpredictiveLow
70Filexxx/xxxxxxxx/xxxx_xxxxx.xpredictiveHigh
71Filexxxx.xxxpredictiveMedium
72Filexxx_xxxx.xpredictiveMedium
73Filexxxx-xxxxxxxx.xpredictiveHigh
74Filexxx-xxx-xxxxxxxx.xpredictiveHigh
75Filexxxxxxxxxxxxxxxxx.xxxxpredictiveHigh
76Filexxxxxxxx/xxxx_xxxxpredictiveHigh
77Filexxx-xxxxx.xxxpredictiveHigh
78Filexxxxxxxxx.xxxpredictiveHigh
79Filexxx/xxxxxxxx.xxxpredictiveHigh
80Filexxxxx.xxxpredictiveMedium
81Filexxxxx.xxxxpredictiveMedium
82Filexxxxx.xxxpredictiveMedium
83Filexxxxxx.xxxpredictiveMedium
84Filexxxxxxx/xxxxx.xxxpredictiveHigh
85Filexxx/xxx_xxxxxxxxxx.xpredictiveHigh
86Filexxxx_xxxxxx.xxxpredictiveHigh
87Filexxxxxx.xpredictiveMedium
88Filexxxxxx/xxxxxx.xpredictiveHigh
89Filexxxxxx_x.xx.xpredictiveHigh
90Filexxxxx.xxxpredictiveMedium
91Filexxxxx_xxxxxxx.xxxpredictiveHigh
92Filexxxx/predictiveLow
93Filexxxxxxxx.xxpredictiveMedium
94Filexxxxxx.xpredictiveMedium
95Filexxxxxxxxxxxxxxx.xxxpredictiveHigh
96Filexxxxxxx/xxxxx/xxx/xxxx.xxxpredictiveHigh
97Filexxxxxxxx.xpredictiveMedium
98Filexxx_xxxx.xpredictiveMedium
99Filexxxxxxx_xxxxxxxxx.xpredictiveHigh
100Filexxxxxxx.xxxpredictiveMedium
101Filexxxxxx-xxxxxx.xpredictiveHigh
102Filexxxxxxxxx.xxxxxxpredictiveHigh
103Filexxxxxxxxx.xxx.xxxpredictiveHigh
104Filexxxxxx-xxxx-xxxxx.xpredictiveHigh
105Filexxxxxxx/xxxx/xxxxx/xxx_xxxxx.xpredictiveHigh
106Filexxxxx.xxxpredictiveMedium
107FilexxxxpredictiveLow
108Filexxxxxxxxxxxx/xxx.xxx/xxxxx/xxxxx/xxxxxxxxxxx/xxxxxxxxxxxxxxxx.xxpredictiveHigh
109Filexxxx.xxxpredictiveMedium
110Filexxxxxx.xxxpredictiveMedium
111Filexxxxxx.xxxpredictiveMedium
112Filexxxxx.xpredictiveLow
113Filexxxx_xxxx.xxxpredictiveHigh
114Filexxxxxxxxxxxxxx.xxxpredictiveHigh
115Filexxxxxx-xxxxxxx-xxxxx.xxxpredictiveHigh
116FilexxxxxpredictiveLow
117Filexxxx_xxx_xx.xpredictiveHigh
118Filexxxx_xxxxxx_xxxxxx.xxxpredictiveHigh
119Filexxxxxxx.xxx.xxxpredictiveHigh
120Filexxxxx.xxxpredictiveMedium
121Filexxxxxxx.xxxpredictiveMedium
122Filexxxx.xxxpredictiveMedium
123Filexxxxx/xxxx/xxxxx.xpredictiveHigh
124Filexxxxxxx.xxxpredictiveMedium
125Filexxx/xxx/xxxxxxx/xxxx.xxxpredictiveHigh
126Filexxxxxxxx.xxxpredictiveMedium
127Filexxxxxx.xxxxpredictiveMedium
128Filexxxxxx-xxxx-xxxxxx.xxxpredictiveHigh
129Filexxx-xxxx.xpredictiveMedium
130Filexxxxxxxxxxxxxxxx.xxxpredictiveHigh
131Filexxx_xxxxx.xpredictiveMedium
132Filexxxxxxx.xxxpredictiveMedium
133Filexxxx.xxxxpredictiveMedium
134Filexxxx/xxxxxxxx/xxxxxxxx.xxxxpredictiveHigh
135Filexxxxxxx.xpredictiveMedium
136Filexxxxxxxxxxxx.xxxpredictiveHigh
137Filexxxxxxxxxxxxx.xxxpredictiveHigh
138Filexxxxxx.xpredictiveMedium
139Filexx-xxxxx/xxxx.xxxpredictiveHigh
140Filexx-xxxxxxx/xxxxxxx/xxxxxxxx-xxxxxxxxxx/xx-xxx-xxxpredictiveHigh
141Filexx-xxxxxxxx.xxxpredictiveHigh
142Filexxxx/xxxx_xxxxxxx_xxx.xpredictiveHigh
143Filexxx.xxxxpredictiveMedium
144FilexxxxxxxpredictiveLow
145File~/.xxxxxxxpredictiveMedium
146File~/xxxxx/xxxx/xxxxxxxx.xxxpredictiveHigh
147File~/xxxx/xxx/xxxxxxx/xxxxxxxxxx/xxxxxx.xxxpredictiveHigh
148Library/xxx/xxx/xxxx/xxxx.xxxpredictiveHigh
149Libraryxxxxxxxxx.xxx/xxxxxxxxx.xxxpredictiveHigh
150Libraryxxxxxxxxxx.xxxpredictiveHigh
151Libraryxxx/xxxxxxx-xxxxxxxxx-x.x.x.xxxpredictiveHigh
152Libraryxxx/xxxx/xxxxxxxxxxxx.xxxpredictiveHigh
153Libraryxxxxxxxxxx_xxxxxx.xxxpredictiveHigh
154Libraryxxxxxxx.xxxxxx.xxxpredictiveHigh
155Libraryxxxxxx.xxxxx.xxxxxxxxpredictiveHigh
156Libraryxxxxxxxxx/xxxx-xxx.xxpredictiveHigh
157Libraryxxxx_xxxxxxxxxx_xxxxxpredictiveHigh
158Library~/xxx/xxxxx/xxxxx-xxxxx-xxxxxxx.xxxpredictiveHigh
159Argument-xpredictiveLow
160Argument-x/--xxxxxx-xxx/--xxxpredictiveHigh
161ArgumentxxxxxxxxxpredictiveMedium
162ArgumentxxxxxxpredictiveLow
163Argumentxxxxxxx_xxpredictiveMedium
164ArgumentxxxxxxxxxxpredictiveMedium
165Argumentxxxxxx-xxpredictiveMedium
166Argumentxxx_xxxxxxpredictiveMedium
167Argumentxxxxxxxxx xxxxxxxpredictiveHigh
168ArgumentxxxxpredictiveLow
169Argumentxxxx_xxxxxx=xxxxpredictiveHigh
170Argumentxx/xxxxx/xxxxxx/xxxxpredictiveHigh
171ArgumentxxxxxxxxxxpredictiveMedium
172ArgumentxxxxxxpredictiveLow
173ArgumentxxxxxxxxpredictiveMedium
174ArgumentxxpredictiveLow
175ArgumentxxxxpredictiveLow
176ArgumentxxxxpredictiveLow
177ArgumentxxxxxxxxxxpredictiveMedium
178Argumentxxxx_xxxxpredictiveMedium
179Argumentxxxxxxxxx/xxxxxxpredictiveHigh
180ArgumentxxxxxxxpredictiveLow
181ArgumentxxxxxxxxpredictiveMedium
182Argumentxxxx_xxxxxxxpredictiveMedium
183ArgumentxxpredictiveLow
184Argumentxx_xxxxxx_xxxxxxpredictiveHigh
185ArgumentxxxxxxxxxxxxpredictiveMedium
186ArgumentxxxxxxpredictiveLow
187ArgumentxxxpredictiveLow
188Argumentxxxxxxx/xxxxxx_xxpredictiveHigh
189Argumentxxxxxx xxxxxxxpredictiveHigh
190ArgumentxxxxxxxxxxxxxpredictiveHigh
191Argumentxxxxxxxxx_xxxxxxxx_xxxxpredictiveHigh
192Argumentxxxxxxx/xxxxxxxxpredictiveHigh
193Argumentxxxxxxx.xxpredictiveMedium
194Argumentxxxxx_xxxxxxpredictiveMedium
195ArgumentxxxxpredictiveLow
196Argumentxxx-xxxxxxxpredictiveMedium
197ArgumentxxxxpredictiveLow
198ArgumentxxxxxpredictiveLow
199ArgumentxxxxxxxxxpredictiveMedium
200ArgumentxxxxxxxxxpredictiveMedium
201Argumentxxxx_xxxxxpredictiveMedium
202ArgumentxxxxxxxxxxxpredictiveMedium
203Argumentx_xxxxpredictiveLow
204Argumentxxxxxx xxxxpredictiveMedium
205Argumentxxxxxxx_xxxpredictiveMedium
206ArgumentxxxxxxxpredictiveLow
207Argumentxxxxxxx_xxxxpredictiveMedium
208ArgumentxxxxxxpredictiveLow
209Argumentxxxxx/xxxxxpredictiveMedium
210ArgumentxxxxxxxxpredictiveMedium
211Argumentxxxx_xxpredictiveLow
212Argumentxxx_xxxxxxxpredictiveMedium
213Argumentxxxx_xxpredictiveLow
214ArgumentxxxxpredictiveLow
215Argumentxxxxxxxx-xxxxxxxxpredictiveHigh
216ArgumentxxxxpredictiveLow
217ArgumentxxxxpredictiveLow
218ArgumentxxxxpredictiveLow
219Argumentxxxxx/xxxxxxpredictiveMedium
220Argumentxxxxxx.xxxxxxxxpredictiveHigh
221ArgumentxxxxxxxpredictiveLow
222Argumentxxxx/xxxxx/xxxxpredictiveHigh
223Argument_xxxx_xxxxxx/_xxxx_xxxxxxxx/_xxxx_xxxxxpredictiveHigh
224Argument_xxxxx_xxxxx_xxxxx_xxxx_xxxx/_xxxxx_xxxxx_xxxxxxx_xxxxpredictiveHigh
225Input Value-xpredictiveLow
226Input Value../predictiveLow
227Input Value../..predictiveLow
228Input Value/..predictiveLow
229Input Value<xxx xxx=x xxxxxxx=xxxxx`x`>predictiveHigh
230Input Value\xpredictiveLow
231Patternxxxxx.xxxpredictiveMedium
232Network Portxxxxx xxx-xxx, xxxpredictiveHigh
233Network Portxxx/xxxxpredictiveMedium
234Network Portxxx/xxxxpredictiveMedium
235Network Portxxx/xxx, xxx/xxx, xxx/xxxx, xxx/xxxxpredictiveHigh

References (2)

The following list contains external sources which discuss the actor and the associated activities:

Do you want to use VulDB in your project?

Use the official API to access entries easily!