Strider Analyse

IOB - Indicator of Behavior (52)

Zeitverlauf

Sprache

en46
it4
de2

Land

us16
it12
cn2
fr2
de2

Akteure

Aktivitäten

Interesse

Zeitverlauf

Typ

Hersteller

Produkt

NVIDIA Windows GPU Display Driver4
KMS Controls BAC-A1616BC BACnet2
IBM Spectrum Protect Plus2
IBM DB22
IBM DB2 Connect Server2

Schwachstellen

#SchwachstelleBaseTemp0dayHeuteAusMasCTIEPSSCVE
1Van Ons WP GDPR Compliance Plugin $wpdb->prepare erweiterte Rechte8.58.2$0-$5kWird berechnetHighOfficial Fix0.000.97286CVE-2018-19207
2IBM Cognos Controller Web UI Cross Site Scripting4.84.8$5k-$25k$0-$5kNot DefinedNot Defined0.000.00050CVE-2019-4136
3lshell erweiterte Rechte8.18.1$0-$5k$0-$5kNot DefinedOfficial Fix0.010.00348CVE-2016-6902
4lshell erweiterte Rechte8.18.1$0-$5k$0-$5kNot DefinedOfficial Fix0.010.00352CVE-2016-6903
5OpenBSD OpenSSH PKCS 11 erweiterte Rechte7.47.1$5k-$25k$0-$5kProof-of-ConceptOfficial Fix0.030.02999CVE-2023-38408
6Linux Kernel dr_domain.c dr_domain_init_resources erweiterte Rechte5.55.4$5k-$25k$0-$5kNot DefinedOfficial Fix0.000.00043CVE-2023-23006
7PHPStore Wholesales track.php SQL Injection7.37.3$0-$5k$0-$5kHighUnavailable0.030.00366CVE-2008-5493
8cpCommerce document.php SQL Injection7.37.0$0-$5k$0-$5kHighOfficial Fix0.020.00064CVE-2009-1345
9e107 CMS secure_img_render.php erweiterte Rechte7.36.9$0-$5k$0-$5kProof-of-ConceptNot Defined0.040.03019CVE-2004-2041
10PHPOutsourcing IdeaBox include.php erweiterte Rechte7.36.4$0-$5k$0-$5kUnprovenUnavailable0.050.17410CVE-2008-5199
11socialMPN article.php SQL Injection7.37.3$0-$5k$0-$5kNot DefinedNot Defined0.000.00129CVE-2005-2031
12Coppermine Photo Gallery init.inc.php erweiterte Rechte7.36.9$0-$5k$0-$5kProof-of-ConceptNot Defined0.050.09075CVE-2004-1988
13Pmachine lib.inc.php erweiterte Rechte7.37.0$0-$5k$0-$5kNot DefinedOfficial Fix0.040.02869CVE-2003-1086
14Bitrix24 Web Application Firewall Cross Site Scripting5.25.2$0-$5k$0-$5kNot DefinedNot Defined0.070.00113CVE-2020-13483
15PrestaShop Authentication schwache Authentisierung8.57.5$0-$5k$0-$5kNot DefinedOfficial Fix0.020.00231CVE-2020-4074
16Trojan-Spy.Win32.WebCenter.a Service Port 80 web.exe Information Disclosure5.34.9$0-$5k$0-$5kProof-of-ConceptWorkaround0.000.00000
17Oracle Argus Safety Letters Information Disclosure4.34.1$5k-$25k$0-$5kNot DefinedOfficial Fix0.000.00054CVE-2021-2110
18VMware ESXi/Workstation/Fusion XHCI USB Controller Information Disclosure4.44.2$0-$5k$0-$5kNot DefinedOfficial Fix0.000.00060CVE-2020-3965
19NVIDIA Windows GPU Display Driver DirectX 11 User Mode Driver x.dll Information Disclosure4.44.4$0-$5k$0-$5kNot DefinedNot Defined0.050.00044CVE-2020-5965
20Apple iOS/iPadOS WebRTC Pufferüberlauf6.05.8$25k-$100k$5k-$25kNot DefinedOfficial Fix0.000.00042CVE-2019-2050

Kampagnen (1)

These are the campaigns that can be associated with the actor:

  • ProjectSauron

IOC - Indicator of Compromise (11)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

TTP - Tactics, Techniques, Procedures (12)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IDTechniqueSchwachstellenZugriffsartTypAkzeptanz
1T1006CWE-425Path TraversalprädiktivHigh
2T1055CWE-74Improper Neutralization of Data within XPath ExpressionsprädiktivHigh
3T1059CWE-94Argument InjectionprädiktivHigh
4TXXXX.XXXCWE-XXXxxxx Xxxx XxxxxxxxxprädiktivHigh
5TXXXXCWE-XXX, CWE-XXXXxxxxxxxx Xxxx Xxxxxxxxxxx XxxxxxxxxxprädiktivHigh
6TXXXX.XXXCWE-XXXXxxx-xxxxx XxxxxxxxxxxprädiktivHigh
7TXXXXCWE-XXXxxxxxx Xxxxx Xx Xxxxxxxxxx Xxxxxxxxxx XxxxxxxxxprädiktivHigh
8TXXXXCWE-XXXxx XxxxxxxxxprädiktivHigh
9TXXXXCWE-XXXXxxxxxxxxxx XxxxxxxxxxprädiktivHigh
10TXXXX.XXXCWE-XXXXxxxxxxx Xxxxxx XxxxprädiktivHigh
11TXXXXCWE-XXXXxxxxxxxxx Xx Xxxxxxx Xxxxx Xxxxxxx Xxxxxxxxx XxxxxxxxxxxprädiktivHigh
12TXXXXCWE-XXX, CWE-XXXXxxxxxxxxxxxx XxxxxxprädiktivHigh

IOA - Indicator of Attack (30)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDKlasseIndicatorTypAkzeptanz
1File.procmailrcprädiktivMedium
2Filearticle.phpprädiktivMedium
3FileBC_Logon.swfprädiktivMedium
4FileC:\Windows\SysWOW64\webcenter\web.exeprädiktivHigh
5Filexxxxxxxxxx/xxxxxx/xxxxxxxxx.xxxx/xxxx.xxx/prädiktivHigh
6Filexxxxxxxx.xxxprädiktivMedium
7Filexxxxxxx/xxx/xxxxxxxx/xxxxxxxx/xxxx/xxxx/xxxxxxxx/xx_xxxxxx.xprädiktivHigh
8Filexxxxxxx.xxxprädiktivMedium
9Filexxxxx.xxxprädiktivMedium
10Filexxxx.xxx.xxxprädiktivMedium
11Filexxxxxxx/xxxx.xprädiktivHigh
12Filexxxxxxx/xxxxxxx/xxx_xxxxxxx.xprädiktivHigh
13Filexxxxxx_xxx_xxxxxx.xxxprädiktivHigh
14Filexxxxx.xxxprädiktivMedium
15Filexx-xxxxxxxx/xxxxxxxxx.xxxprädiktivHigh
16Libraryx:\xxxxxxx\xxxxxxxx\xxxxxxxxxxx\xxxxxxxxxxxxxx\xxxxxxxx.xxx_xxxxx_xxxxxxxxxxxxxxxx\xxxxx\xxxxxxxxxxx.xxxprädiktivHigh
17Libraryxxx/xxxx/xxxxxxxxxxxxxxxxxxx.xxxxx.xxxprädiktivHigh
18Libraryxxxxxxxx/x.xxxprädiktivHigh
19Libraryxx/xxx.xxx.xxxprädiktivHigh
20Argumentxxxxxxxx_xxxxprädiktivHigh
21Argumentxxx_x_xxxprädiktivMedium
22Argumentxxxxxx_xxxxx_xxxprädiktivHigh
23ArgumentxxxxxxxxprädiktivMedium
24ArgumentxxprädiktivLow
25Argumentxx_xxxxxxxxprädiktivMedium
26Argumentxxxxx[xxxxx][xx]prädiktivHigh
27Argumentxxxx_xxx_xxxx_xxxxprädiktivHigh
28Argumentxx_xxxxprädiktivLow
29ArgumentxxxprädiktivLow
30Input ValuexxxxxxxprädiktivLow

Referenzen (2)

The following list contains external sources which discuss the actor and the associated activities:

Do you need the next level of professionalism?

Upgrade your account now!