Bronze Union Analyse

IOB - Indicator of Behavior (29)

Zeitverlauf

Sprache

zh16
en14

Land

cn28
us2

Akteure

Aktivitäten

Interesse

Zeitverlauf

Typ

Hersteller

Produkt

ArcGIS Server2
Palo Alto PAN-OS2
TickFa2
D-Link DIR-6452
Oracle MySQL Server2

Schwachstellen

#SchwachstelleBaseTemp0dayHeuteAusMasCTIEPSSCVE
1glorylion JFinalOA SysOrg.java SQL Injection6.35.7$0-$5k$0-$5kProof-of-ConceptNot Defined0.000.00148CVE-2023-0758
2UJCMS Jspxcms ?new erweiterte Rechte7.67.6$0-$5k$0-$5kNot DefinedNot Defined0.020.00260CVE-2022-23329
3Microsoft .NET/.NET Framework/Visual Studio Remote Code Execution8.17.4$5k-$25k$0-$5kUnprovenOfficial Fix0.000.00207CVE-2023-24897
4Microsoft .NET/.NET Framework/Visual Studio Remote Code Execution8.17.4$5k-$25k$0-$5kUnprovenOfficial Fix0.000.00125CVE-2023-24895
5Microsoft .NET Framework Information Disclosure5.04.7$5k-$25k$0-$5kUnprovenOfficial Fix0.020.00050CVE-2022-41064
6MyBatis Plus SQL Injection8.07.9$0-$5k$0-$5kNot DefinedOfficial Fix0.030.00073CVE-2023-25330
7SourceCodester Apartment Visitor Management System action-visitor.php SQL Injection7.57.3$0-$5k$0-$5kProof-of-ConceptNot Defined0.060.00142CVE-2022-2772
8Amcrest IP2M-841B HTTP Endpoint videotalk schwache Authentisierung7.47.4$0-$5k$0-$5kNot DefinedNot Defined0.020.10144CVE-2019-3948
9IBM Cognos Business Intelligence Cross Site Scripting4.34.1$5k-$25kWird berechnetHighOfficial Fix0.000.00178CVE-2012-4835
10Synacor Zimbra Collaboration Suite amavisd public erweiterte Rechte7.67.6$0-$5k$0-$5kNot DefinedNot Defined0.060.95689CVE-2022-41352
11Moxiecode TinyMCE Compressor PHP tiny_mce_gzip.php Directory Traversal6.55.9$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.000.00639CVE-2005-4600
12ArcGIS Server SQL Injection7.37.3$0-$5k$0-$5kNot DefinedNot Defined0.090.00073CVE-2021-29099
13Synology DiskStation Manager WebAPI Directory Traversal7.37.0$0-$5kWird berechnetNot DefinedOfficial Fix0.000.00109CVE-2021-29087
14crelly-slider Plugin File Upload wp_ajax_crellyslider_importSlider erweiterte Rechte7.57.4$0-$5k$0-$5kNot DefinedOfficial Fix0.020.00090CVE-2019-15866
15hymeleaf-spring5 Template erweiterte Rechte6.36.3$0-$5k$0-$5kNot DefinedNot Defined0.060.04766CVE-2021-43466
16Hitachi Energy RTU500 Bidirectional Communication Interface Denial of Service6.46.4$0-$5k$0-$5kNot DefinedNot Defined0.020.00090CVE-2021-35533
17Tiny Tiny RSS OTP Code schwache Authentisierung6.05.8$0-$5k$0-$5kNot DefinedOfficial Fix0.000.00090CVE-2021-28373
18Tiny Tiny RSS Cross Site Scripting5.25.1$0-$5kWird berechnetNot DefinedOfficial Fix0.000.00089CVE-2017-1000035
19phpMyAdmin unspezifizierte Cross-Site Scripting Schwachstelle6.36.0$25k-$100k$0-$5kHighOfficial Fix0.000.00432CVE-2008-2960
20ThinkPHP erweiterte Rechte8.58.4$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.030.97456CVE-2019-9082

Kampagnen (1)

These are the campaigns that can be associated with the actor:

  • Bronze Union

IOC - Indicator of Compromise (9)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

TTP - Tactics, Techniques, Procedures (8)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IDTechniqueSchwachstellenZugriffsartTypAkzeptanz
1T1006CWE-22Path TraversalprädiktivHigh
2T1055CWE-74Improper Neutralization of Data within XPath ExpressionsprädiktivHigh
3TXXXX.XXXCWE-XXXxxxx Xxxx XxxxxxxxxprädiktivHigh
4TXXXXCWE-XXXXxxxxxxxx Xxxx Xxxxxxxxxxx XxxxxxxxxxprädiktivHigh
5TXXXXCWE-XXXxx XxxxxxxxxprädiktivHigh
6TXXXX.XXXCWE-XXXXxxxxxxx XxxxxxxxxxxxxprädiktivHigh
7TXXXXCWE-XXXXxxxxxxxxx Xx Xxxxxxx Xxxxx Xxxxxxx Xxxxxxxxx XxxxxxxxxxxprädiktivHigh
8TXXXX.XXXCWE-XXXXxxxxxxxxx Xxxxxxxxxxxxxx Xx Xxxxxxxx Xxxx XxxxxxxxxprädiktivHigh

IOA - Indicator of Attack (16)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDKlasseIndicatorTypAkzeptanz
1File/getcfg.phpprädiktivMedium
2File/opt/zimbra/jetty/webapps/zimbra/publicprädiktivHigh
3File/videotalkprädiktivMedium
4Filexxxxxx-xxxxxxx.xxxprädiktivHigh
5Filexxxx_xxxx.xprädiktivMedium
6Filexxxxxx/?x=xxxxx/\xxxxx\xxx/xxxxxxxxxxxxxx&xxxxxxxx=xxxx_xxxx_xxxx_xxxxx&xxxx[x]=xxxxxx&xxxx[x][]prädiktivHigh
7Filexxx/xxxx/xxxx/xxx/xxxxxxxxx/xxx/xxxxxx/xxxxx/xxxxxx.xxxxprädiktivHigh
8Filexxxxxx.xxxprädiktivMedium
9Filexxxx_xxx_xxxx.xxxprädiktivHigh
10Argumentxxxxxx/xxxxxxprädiktivHigh
11ArgumentxxprädiktivLow
12ArgumentxxxxprädiktivLow
13ArgumentxxxxxxxxprädiktivMedium
14ArgumentxxxprädiktivLow
15Input Valuexxxx -x xxxxxxxx=xxxxxx.xxxxxxx xxxx://xxx.xxx.x.x/xxxxxx.xxxprädiktivHigh
16Network Portxxx xxxxxx xxxxprädiktivHigh

Referenzen (3)

The following list contains external sources which discuss the actor and the associated activities:

Do you know our Splunk app?

Download it now for free!