Bonaire, Sint Eustatius and Saba Unknown Análisis

IOB - Indicator of Behavior (9)

Cronología

Idioma

en10

País

Actores

Ocupaciones

Interesar

Cronología

Escribe

Proveedor

Producto

Harmonic NSG 90002
Marketo MA2
Artifex Ghostscript2
Microsoft IIS2
Intel Chipset Device Software2

Vulnerabilidad

IOC - Indicator of Compromise (29)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDdirección IPHostnameActorCampañasIdentifiedEscribeConfianza
145.12.70.30shttp-ashen.get-eye.comBonaire and Sint Eustatius and Saba Unknown2022-11-09verifiedAlto
245.12.71.30Bonaire and Sint Eustatius and Saba Unknown2022-11-09verifiedAlto
346.36.203.160Bonaire and Sint Eustatius and Saba Unknown2022-11-09verifiedAlto
446.36.203.168Bonaire and Sint Eustatius and Saba Unknown2022-11-09verifiedAlto
546.36.203.170Bonaire and Sint Eustatius and Saba Unknown2022-11-09verifiedAlto
663.245.41.0Bonaire and Sint Eustatius and Saba Unknown2023-04-21verifiedAlto
7XX.XXX.XX.XXxxxxxx Xxx Xxxx Xxxxxxxxx Xxx Xxxx Xxxxxxx2023-04-21verifiedAlto
8XX.XX.XXX.XXxxxxxx Xxx Xxxx Xxxxxxxxx Xxx Xxxx Xxxxxxx2023-04-21verifiedAlto
9XX.XX.XXX.XXxxxxxx Xxx Xxxx Xxxxxxxxx Xxx Xxxx Xxxxxxx2023-04-21verifiedAlto
10XXX.XXX.XXX.XXxxxxxx Xxx Xxxx Xxxxxxxxx Xxx Xxxx Xxxxxxx2022-11-09verifiedAlto
11XXX.X.XX.XXxxxxxx Xxx Xxxx Xxxxxxxxx Xxx Xxxx Xxxxxxx2022-11-09verifiedAlto
12XXX.X.XX.Xxxx-xxxxxxxx.xxxx.xxxxx.xxxXxxxxxx Xxx Xxxx Xxxxxxxxx Xxx Xxxx Xxxxxxx2022-11-09verifiedAlto
13XXX.XXX.XX.Xxxx-xxxxxxxxx.xxxx.xxxxx.xxxXxxxxxx Xxx Xxxx Xxxxxxxxx Xxx Xxxx Xxxxxxx2022-11-09verifiedAlto
14XXX.XXX.XXX.Xxxx-xxxxxxxxx.xxxx.xxxxx.xxxXxxxxxx Xxx Xxxx Xxxxxxxxx Xxx Xxxx Xxxxxxx2023-04-21verifiedAlto
15XXX.XXX.XXX.Xxxx-xxxxxxxxx.xxxx.xxxxx.xxxXxxxxxx Xxx Xxxx Xxxxxxxxx Xxx Xxxx Xxxxxxx2023-04-21verifiedAlto
16XXX.XXX.XXX.Xxxx-xxxxxxxxx.xxxx.xxxxx.xxxXxxxxxx Xxx Xxxx Xxxxxxxxx Xxx Xxxx Xxxxxxx2023-04-21verifiedAlto
17XXX.X.XX.XXxxxxxx Xxx Xxxx Xxxxxxxxx Xxx Xxxx Xxxxxxx2022-11-09verifiedAlto
18XXX.XX.XXX.XXxxxxxx Xxx Xxxx Xxxxxxxxx Xxx Xxxx Xxxxxxx2022-11-09verifiedAlto
19XXX.XXX.XXX.Xxxxx-xxxxxxxx.xxxx.xxxxxxx.xxxXxxxxxx Xxx Xxxx Xxxxxxxxx Xxx Xxxx Xxxxxxx2022-11-09verifiedAlto
20XXX.XXX.XX.XXxxxxxx Xxx Xxxx Xxxxxxxxx Xxx Xxxx Xxxxxxx2022-11-09verifiedAlto
21XXX.XXX.XX.XXXXxxxxxx Xxx Xxxx Xxxxxxxxx Xxx Xxxx Xxxxxxx2023-04-21verifiedAlto
22XXX.XXX.XX.XXXxxxxxx Xxx Xxxx Xxxxxxxxx Xxx Xxxx Xxxxxxx2023-04-21verifiedAlto
23XXX.XXX.XXX.XXXxxxxxx Xxx Xxxx Xxxxxxxxx Xxx Xxxx Xxxxxxx2023-04-21verifiedAlto
24XXX.XX.XX.XXXxxxxxx Xxx Xxxx Xxxxxxxxx Xxx Xxxx Xxxxxxx2022-11-09verifiedAlto
25XXX.XX.XXX.XXXxxxxxx Xxx Xxxx Xxxxxxxxx Xxx Xxxx Xxxxxxx2022-11-09verifiedAlto
26XXX.X.XXX.XXxxxxxx Xxx Xxxx Xxxxxxxxx Xxx Xxxx Xxxxxxx2022-11-09verifiedAlto
27XXX.XX.XXX.XXxxxxxx Xxx Xxxx Xxxxxxxxx Xxx Xxxx Xxxxxxx2022-11-09verifiedAlto
28XXX.XXX.XX.XXxxxxxx Xxx Xxxx Xxxxxxxxx Xxx Xxxx Xxxxxxx2022-11-09verifiedAlto
29XXX.XXX.XX.XXxxxxxx Xxx Xxxx Xxxxxxxxx Xxx Xxxx Xxxxxxx2023-04-21verifiedAlto

TTP - Tactics, Techniques, Procedures (6)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IDTechniqueClaseVulnerabilidadVector de accesoEscribeConfianza
1T1006CAPEC-126CWE-22Path TraversalpredictiveAlto
2T1059.007CAPEC-209CWE-79Cross Site ScriptingpredictiveAlto
3TXXXXCAPEC-CWE-XXXXxxxxxxxx Xxxx Xxxxxxxxxxx XxxxxxxxxxpredictiveAlto
4TXXXX.XXXCAPEC-191CWE-XXXXxxx-xxxxx XxxxxxxxxxxpredictiveAlto
5TXXXXCAPEC-1CWE-XXXXxxxxxxxxx XxxxxxpredictiveAlto
6TXXXXCAPEC-116CWE-XXXXxxxxxxxxx Xx Xxxxxxx Xxxxx Xxxxxxx Xxxxxxxxx XxxxxxxxxxxpredictiveAlto

IOA - Indicator of Attack (9)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClaseIndicatorEscribeConfianza
1File/uncpath/predictiveMedio
2Fileadmin_store_formpredictiveAlto
3Filexxxx-xxxxxxpredictiveMedio
4Libraryxxxxx.xxxpredictiveMedio
5Argumentxxxxxxxxxxx_xxxxx_xxxx_xxxxxxxxpredictiveAlto
6ArgumentxxxxxxxxpredictiveMedio
7ArgumentxxxxxxxxxxxxxxxxxxxpredictiveAlto
8Input Value..predictiveBajo
9Input Valuexxxxxxxx/xxxxxxxx/xxxxxxxxxpredictiveAlto

Referencias (3)

The following list contains external sources which discuss the actor and the associated activities:

Do you want to use VulDB in your project?

Use the official API to access entries easily!