BlueNoroff Análisis

IOB - Indicator of Behavior (68)

Cronología

Idioma

en62
de2
ru2
zh2

País

us56
jp6
vn4

Actores

Ocupaciones

Interesar

Cronología

Escribe

Proveedor

Producto

PHP4
jforum2
Zoho ManageEngine ServiceDesk Plus2
WordPress2
PunBB2

Vulnerabilidad

#VulnerabilidadBaseTemp0dayHoyExpConCTIEPSSCVE
1Thomas R. Pasawicz HyperBook Guestbook Password Database gbconfiguration.dat Hash divulgación de información5.35.2$5k-$25k$0-$5kHighWorkaround0.020.02016CVE-2007-1192
2Microsoft Windows Domain Name Service Privilege Escalation6.66.1$25k-$100k$5k-$25kUnprovenOfficial Fix0.000.01058CVE-2023-28223
3HTTP/2 Stream Rapid Reset denegación de servicio6.46.3$0-$5k$0-$5kHighOfficial Fix0.020.70585CVE-2023-44487
4Apache James Server escalada de privilegios8.17.9$5k-$25k$0-$5kNot DefinedOfficial Fix0.030.78935CVE-2015-7611
5Frappe Framework sql injection7.57.4$0-$5k$0-$5kNot DefinedOfficial Fix0.020.00274CVE-2019-14966
6Alt-N MDaemon Worldclient escalada de privilegios4.94.7$5k-$25k$0-$5kNot DefinedOfficial Fix0.060.00090CVE-2021-27182
7Ivanti Endpoint Manager Mobile autenticación débil9.99.7$0-$5k$0-$5kHighOfficial Fix0.000.96231CVE-2023-35078
8Hitachi Vantara Pentaho Business Analytics Server Data Lineage cifrado débil6.36.3$0-$5k$0-$5kNot DefinedOfficial Fix0.000.00135CVE-2021-45447
9Oracle Application Server sql injection5.35.1$5k-$25k$0-$5kNot DefinedOfficial Fix0.030.00322CVE-2007-0286
10Live555 Streaming Media parseRTSPRequestString Remote Code Execution7.37.3$0-$5k$0-$5kNot DefinedNot Defined0.000.87706CVE-2013-6934
11Oracle Solaris Utility Local Privilege Escalation7.77.5$5k-$25k$0-$5kNot DefinedOfficial Fix0.050.00043CVE-2023-21985
12Appindex MWChat start_lobby.php escalada de privilegios7.36.9$0-$5k$0-$5kProof-of-ConceptNot Defined0.020.01895CVE-2005-1869
13Coinsoft Technologies phpCOIN db.php directory traversal5.34.8$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.020.03877CVE-2005-4212
14Damien Benier MyAlbum language.inc.php escalada de privilegios7.36.7$0-$5k$0-$5kProof-of-ConceptUnavailable0.030.09238CVE-2006-5865
15SourceCodester Grade Point Average GPA Calculator index.php cross site scripting4.44.3$0-$5k$0-$5kProof-of-ConceptNot Defined0.000.00062CVE-2023-1743
16SourceCodester Grade Point Average GPA Calculator index.php divulgación de información5.45.2$0-$5k$0-$5kProof-of-ConceptNot Defined0.000.00097CVE-2023-1769
17OpenResty API ngx_http_lua_subrequest.c escalada de privilegios7.47.1$0-$5k$0-$5kNot DefinedOfficial Fix0.040.00580CVE-2020-11724
18OpenResty ngx.req.get_post_args sql injection8.58.2$0-$5k$0-$5kNot DefinedOfficial Fix0.030.00637CVE-2018-9230
19Netgate pf Sense ACME Package acme_certificate_edit.php cross site scripting4.84.7$0-$5k$0-$5kNot DefinedOfficial Fix0.000.00085CVE-2020-21219
20Microsoft IIS IP/Domain Restriction escalada de privilegios6.55.7$25k-$100k$0-$5kUnprovenOfficial Fix0.030.00817CVE-2014-4078

IOC - Indicator of Compromise (9)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

TTP - Tactics, Techniques, Procedures (11)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IDTechniqueVulnerabilidadVector de accesoEscribeConfianza
1T1006CWE-21, CWE-22Path TraversalpredictiveAlto
2T1040CWE-319Authentication Bypass by Capture-replaypredictiveAlto
3T1055CWE-74Improper Neutralization of Data within XPath ExpressionspredictiveAlto
4TXXXXCWE-XXXxxxxxxx XxxxxxxxxpredictiveAlto
5TXXXX.XXXCWE-XX, CWE-XXXxxxx Xxxx XxxxxxxxxpredictiveAlto
6TXXXXCWE-XXX, CWE-XXXXxxxxxxxx Xxxx Xxxxxxxxxxx XxxxxxxxxxpredictiveAlto
7TXXXXCWE-XXXxxxxxx Xxxxx Xx Xxxxxxxxxx Xxxxxxxxxx XxxxxxxxxpredictiveAlto
8TXXXXCWE-XXX7xx Xxxxxxxx XxxxxxxxpredictiveAlto
9TXXXXCWE-XXXxx XxxxxxxxxpredictiveAlto
10TXXXXCWE-XXXXxxxxxxxxx Xx Xxxxxxx Xxxxx Xxxxxxx Xxxxxxxxx XxxxxxxxxxxpredictiveAlto
11TXXXXCWE-XXX, CWE-XXXXxxxxxxxxxxxx XxxxxxpredictiveAlto

IOA - Indicator of Attack (40)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClaseIndicatorEscribeConfianza
1File/mgmt/tm/util/bashpredictiveAlto
2File14all.cgi/14all-1.1.cgi/traffic.cgi/mrtg.cgipredictiveAlto
3Fileacme_certificate_edit.phppredictiveAlto
4Fileauth.phppredictiveMedio
5Filebooks.phppredictiveMedio
6Fileclass_gw_2checkout.phppredictiveAlto
7Filexxxx_xxxxxxxx/xx.xxxpredictiveAlto
8Filexxxx/xxxxxxxxxxxxxxx.xxxpredictiveAlto
9Filexxxxxxxxxxxx.xxxpredictiveAlto
10Filexxx/xxxxxx.xxxpredictiveAlto
11Filexxxxx.xxxpredictiveMedio
12Filexxxxxxx.xxxpredictiveMedio
13Filexxxxxxxx.xxx.xxxpredictiveAlto
14Filexxx_xxxx_xxx_xxxxxxxxxx.xpredictiveAlto
15Filexxxxxxx.xxxpredictiveMedio
16Filexxxxx.xxxpredictiveMedio
17Filexxxxxxxx/xxxxx/xxxxxxxx?xxxxxxxxpredictiveAlto
18Filexxxxxx_xxxxx.xxx/xxxxx_xxxxxxx_xxxxxxxxxx.xxpredictiveAlto
19Filexxxxxxxx.xxxpredictiveMedio
20Filexxxxx_xxxxx.xxxpredictiveAlto
21Filexxxx_x_xxxxxx.xxx.xxxpredictiveAlto
22Filexxxxxx.xxxpredictiveMedio
23Libraryxxxxxx[xxxxxx_xxxxpredictiveAlto
24Argumentxxx_xxxxpredictiveMedio
25ArgumentxxxxxxxxpredictiveMedio
26ArgumentxxxxxxpredictiveBajo
27ArgumentxxxpredictiveBajo
28Argumentxxxxxx[xxxxxx_xxxx]predictiveAlto
29ArgumentxxxxxxxxpredictiveMedio
30ArgumentxxpredictiveBajo
31ArgumentxxxxxxxxxxxpredictiveMedio
32Argumentxxxxxxx_xxxpredictiveMedio
33Argumentxxxxx_xxxpredictiveMedio
34ArgumentxxxxpredictiveBajo
35ArgumentxxxxxxxxpredictiveMedio
36ArgumentxxxxpredictiveBajo
37ArgumentxxxxxxxxxxpredictiveMedio
38Argumentxxxxxx_xxxxpredictiveMedio
39Argument_xxxx[_xxx_xxxx_xxxxpredictiveAlto
40Input Valuexxx://xxxxxx/xxxx=xxxxxxx.xxxxxx-xxxxxx/xxxxxxxx=xxxxx_xxxxxpredictiveAlto

Referencias (3)

The following list contains external sources which discuss the actor and the associated activities:

Want to stay up to date on a daily basis?

Enable the mail alert feature now!