WindShift Analyse

IOB - Indicator of Behavior (83)

Zeitverlauf

Sprache

en76
pt8

Land

Akteure

Aktivitäten

Interesse

Zeitverlauf

Typ

Hersteller

Produkt

Microsoft Windows10
Apache HTTP Server4
Microsoft IIS4
Multivendor Marketplace Solution for WooCommerce2
phpThumb2

Schwachstellen

#SchwachstelleBaseTemp0dayHeuteAusMasEPSSCTICVE
1Cisco SD-WAN CLI Privilege Escalation8.18.0$5k-$25k$0-$5kNot DefinedOfficial Fix0.000440.00CVE-2022-20818
2Cisco IOS XE Self-Healing erweiterte Rechte7.37.2$25k-$100k$5k-$25kNot DefinedOfficial Fix0.000420.06CVE-2022-20855
3Apple iOS ImageIO Denial of Service6.46.3$25k-$100k$0-$5kNot DefinedOfficial Fix0.035330.00CVE-2016-1811
4Acme Mini HTTPd Terminal erweiterte Rechte5.35.3$0-$5k$0-$5kNot DefinedNot Defined0.003030.04CVE-2009-4490
5Cisco SD-WAN CLI Privilege Escalation8.18.0$5k-$25k$0-$5kNot DefinedOfficial Fix0.000420.00CVE-2022-20775
6Apple iOS CommonCrypto Information Disclosure5.45.3$25k-$100k$0-$5kNot DefinedOfficial Fix0.001810.00CVE-2016-1802
7Microsoft IIS Cross Site Scripting5.24.7$5k-$25k$0-$5kProof-of-ConceptOfficial Fix0.005480.24CVE-2017-0055
8Microsoft Word wwlib Remote Code Execution8.07.1$5k-$25k$0-$5kProof-of-ConceptOfficial Fix0.453520.00CVE-2023-21716
9Linux Kernel TPM Device Pufferüberlauf7.67.5$5k-$25k$0-$5kNot DefinedOfficial Fix0.000420.00CVE-2022-2977
10D-Link Go-RT-AC750 gena.php erweiterte Rechte7.67.6$5k-$25k$5k-$25kNot DefinedNot Defined0.001210.03CVE-2022-36523
11Multivendor Marketplace Solution for WooCommerce Order Status Cross Site Request Forgery4.34.2$0-$5k$0-$5kNot DefinedOfficial Fix0.000530.00CVE-2022-2657
12taviso Lotus 1-2-3 Worksheet process_fmt Pufferüberlauf7.06.9$0-$5k$0-$5kNot DefinedOfficial Fix0.000680.00CVE-2022-39843
13image-tiler erweiterte Rechte8.58.4$0-$5k$0-$5kNot DefinedOfficial Fix0.001940.00CVE-2020-28451
14Apple macOS Kernel Information Disclosure3.33.2$0-$5k$0-$5kNot DefinedOfficial Fix0.000620.00CVE-2022-32817
15Irfan Skiljan IrfanView ShowPlugInSaveOptions_W Pufferüberlauf5.95.9$0-$5k$0-$5kNot DefinedNot Defined0.000570.00CVE-2020-23561
16Microsoft Windows Defender Credential Guard Privilege Escalation8.37.3$25k-$100k$5k-$25kUnprovenOfficial Fix0.000430.00CVE-2022-34711
17Microsoft Windows Kerberos Privilege Escalation8.88.1$25k-$100k$5k-$25kUnprovenOfficial Fix0.001210.00CVE-2022-30165
18Microsoft Windows Kerberos AppContainer Privilege Escalation8.98.1$25k-$100k$5k-$25kUnprovenOfficial Fix0.000430.00CVE-2022-30164
19Microsoft Windows Network File System Remote Code Execution9.88.9$25k-$100k$5k-$25kUnprovenOfficial Fix0.889090.04CVE-2022-30136
20Vmware Workspace ONE Access schwache Authentisierung9.89.1$25k-$100k$0-$5kFunctionalOfficial Fix0.584830.00CVE-2022-22972

Kampagnen (1)

These are the campaigns that can be associated with the actor:

  • WindShift

IOC - Indicator of Compromise (7)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

TTP - Tactics, Techniques, Procedures (13)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (27)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDKlasseIndicatorTypAkzeptanz
1File.procmailrcprädiktivMedium
2File/cgi-bin/wapopenprädiktivHigh
3File/htdocs/upnpinc/gena.phpprädiktivHigh
4File/it-IT/splunkd/__raw/services/get_snapshotprädiktivHigh
5File/xxxxxxx/xxxxx/xxxxx.xxxprädiktivHigh
6File/xxxxxxx/prädiktivMedium
7Filexxxxx/xxxx/xxxxxxxxxxx/xxxxxxx.xprädiktivHigh
8Filexxxx/xxxxxxxxxxxx.xxxprädiktivHigh
9Filexxxxxxxx.xxxprädiktivMedium
10Filexxx.xxx?xxx=xxxxx_xxxxprädiktivHigh
11Filexxxxxxxxxxxxxx/xxxxxxx.xxxprädiktivHigh
12Filexxxxxxxx.xxxprädiktivMedium
13Filexx-xxxxxxxxxxx.xxxprädiktivHigh
14File~/xx-xxxxxxxx.xxxprädiktivHigh
15Argument$_xxxxxx['xxx_xxxx']prädiktivHigh
16Argument--xxxx=xxxprädiktivMedium
17ArgumentxxxxxxxxprädiktivMedium
18ArgumentxxxprädiktivLow
19ArgumentxxxxxxxxxxprädiktivMedium
20ArgumentxxxxxxxxprädiktivMedium
21ArgumentxxxxxprädiktivLow
22Argumentxxxxxx_xxprädiktivMedium
23Argumentxxxx_xxxxprädiktivMedium
24ArgumentxxxprädiktivLow
25ArgumentxxxprädiktivLow
26Argumentxxxxxxxx/xxxxprädiktivHigh
27Input Value../..prädiktivLow

Referenzen (3)

The following list contains external sources which discuss the actor and the associated activities:

Want to stay up to date on a daily basis?

Enable the mail alert feature now!